Download documents
Download documents

Service oriented
blockchain platform

Build and manage quantum-safe blockchain solutions with the Cellframe SDK

Scroll Down
Framework advantages
Cellframe’s original sharding implementation allows you to launch Blockchain/DAG subchains with variable consensus types in each Cell Network (shard).
Create your own blockchain solution with the Cellframe SDK. We will support you at every step of your DLT journey.
Python over C
Our Python API allows you to build simple and elegant blockchain solutions powered by the raw performance of the C engine.
Blockchain Services
Services are the future of blockchain
One of the key elements of the Cellframe network architecture
is to create and manage decentralized internet services.

By design, smart contracts in other protocols cannot interact with the resources of the operating system. Cellframe services can leverage the host machine’s computing power, bandwidth, and hard drive space. Unlike smart contracts on other protocols, where an “oracle” (a set of nodes) uploads external data unto the blockchain, Cellframe services do not require such a third party which is liable to being compromised.

A blockchain service on the Cellframe network does not have an owner address. To reduce the risk of theft, service cash flow gets distributed between the providers and no one has a private key from a contract with all the funds in it.

The development of blockchain services is like building web scripts and other system services. It’s simple, and there is no need to hire expensive blockchain engineers.



The Quantum Threat is Real

A Quantum computer with logical qubits is coming in the next 10-15 years. The NSA (US National Security Agency) and NIST (National Institute of Standards and Technology) are preparing for it and developing standards for post-quantum cryptography since 2015.

PQ Encryption by default
We have successfully implemented several quantum resistant signatures including the finalists of the second round of the NIST PQC contest, and will implement several more by 2021.
Encryption Variability
Due to the (as of yet) untested resistance of prospective PQ signatures against a fully functioning quantum computer, encryption variability is the only option for building a truly quantum-safe system.
Quantum Keys
The implementation of a quantum key exchange is scheduled for Q3 2022.
Implementations: Framework
Implementations: Framework
Blockchain Interoperability
Features :
Cellframe provides interoperability by using Cell bridges to public blockchains, so that you can connect several blockchains into a single system.
Distributed VPN and Content Delivery Network (CDN)
Features :
Our VPN is based on the concept of the bandwidth sharing economy, secured by quantum safe encryption, and where throughput is limited only by the number of nodes around the user. The traffic management system is based on a routing algorithm that ensures traffic flows not the shortest way but the fastest.
Status :
The CDN is currently under development.
Blockchain framework
Features :
The open source framework for launching fully customizable and scalable subchains, interoperable by design in the Cellframe ecosystem.
Learn more
Features :
We have introduced a solution for the protection of public and private blockchains from terminal attacks: Mirror Chains. They do not affect blockchain performance, restore the latest state in case of an attack, and can be used for interoperability features.
Status :
80% ready
Learn more
Second Layer Solutions
Features :
Cellframe Cells can act as a second layer solution for existing public chains, e.g., Ethereum or almost any other layer one platform. It can also work as a sidechain for throughput outsourcing.
Learn more
Audio/video streaming
Features :
The protocol for streaming audio and video content across the Cellframe network uses a quantum-safe encrypted channel without affecting the user experience.
Status :
70% ready
Learn more
Edge computing
Features :
Edge computing is a form of fog computing carried out on edge devices (smartphones, laptops, and PCs) as close as possible to the source of the task. The computational task is divided between the swarm (or fog) of devices concentrated around the initiator to reduce time, avoid potential pollution of the traffic channel, and lower the cost of any mistakes.
Status :
Learn more
01/ 01
Reclaim net neutrality!

Download the first decentralized VPN on the blockchain and join a true privacy network that protects your traffic from quantum and supercomputer attacks, without affecting the quality of your browsing experience.

Coming soon
Coming soon
Implementation: Areas and Examples
Notaries and Lawyers
Transparent document verification within a network of notary institutions
Real Estate Management Companies
Reputation system for tenants as well as an advertising marketplace
Universities and Training Centers
Create, design, issue and verify certificates or diplomas
License Issuers
Issuance of gun licenses, weapons registration, and driver’s licenses
Review Platforms
Verification of comment and review authenticity
Land Registry
Registration of land and buildings: agent information, rental rates, ownership history
State Labor Departments
Employer and employee record keeping, archiving of litigation history
Security Departments
Enhanced security with lower operational complexity in the tracking of access to protected objects
Plants and Factories
Tracking of unauthorized access to information or incorrect system behavior.
Airport and Railroad
Check-in with a verified multi-passport, baggage tracking, and customs checks
Local Subsidiaries
Instantly protected sync of document workflow on a protected network for all the subsidiaries of an organization
Reservations, feedback on hospitality services, loyalty programs, and client reputation systems
Travel Operators
Easy access to documents (visas, reservations, tickets, and passes)
Taxi Operators
Identification and authorization of drivers based on verified data
Professional Sports
Registers for medals, achievements, awards, records, commission meetings, and judiciary boards
Visa Centers and Embassies
Visa issuance and checking process with less overhead
Medical certificates, test results, health indicators, and registry of doctors' visits
Keeping of police records and protocols
Internet of Things
M2M data and commands exchange
Identity verification for financial services
Audit of merchandising tasks: layout, availability of goods, and authenticity of the manufacture date
Logistics Companies
Various documentation such as transit visas, export declarations, CMR, bills of lading for shipping by sea, AWB, DF, accounts and others
Payments and a single ledger format of credit and transaction history for banks
01/ 01