Select Page

Cipher Protocol

Decentralized Data Exchange and Identity
Github Repo

Cross-chain DeFi


Cipher Protocol will revolutionize the digital asset lending market through its standardization, security, and interoperability by providing a multistage process for risk and credit evaluation and bringing to the market a new type of credit-based DeFi.

Mass Adoption


Cipher Protocol is a modularized, plugable, and customized software solution that accommodates a wide range of businesses. It allows for easy customization with future blockchains. CipherProxy implements blockchain technology for all types of companies, providing blockchains, smart contracts, distributed verification management, data exchange, and other protocols.


The Building Blocks


Cipher Protocol is a public blockchain that is specialized to handle decentralized data and identities. The project offers a variety of protocols for businesses to create their own blockchain that suits their uniqueness. Cipher ID, a mobile digital ID application, and DDXP, a decentralized data exchange protocol, are some of the protocols that are offered.

Cipher DDXP


DDXP will empower individuals, organizations, and institutions to own and monetize their own data, and to collaboratively and securely process their own data on an individual’s own devices.

Cipher DAO


 A credit-based, cross-chain DeFi lending platform. It’s decentralized governance model and risk control mechanism aim to promote a mutually beneficial relationship between borrowers, creditors, and guarantors.

Cipher Wallet


 A one-stop mobile application for the management of your digital identity, data, and assets, giving users the power to control the value of their data.

Cipher Market


 Designed to allow individuals and organizations to monetize and acquire data in a trusted, standardized, and cost-effective way.

Cipher ID


 A decentralized identity protocol that helps users manage their own data and enables blockchain-based multi-dimensional authentication provided by global verifiers.

Enterprise Use Cases


Cipher’s open-source, token-agnostic design enables enterprise users to leverage enterprise token pools, bridging private and public networks. The Cipher platform is a comprehensive suite of enterprise-grade blockchain solutions for managing and exchanging value over blockchains.

Finance & Banking

Benefit from reduced or near-zero wait times, as well as near real-time transfers of funds between institutions. And, for banks and financial institutions, depend on faster and more accurate reporting with an automated compliance process drawn on immutable data records.


Retail & Consumer Goods


 Blockchain and IoT technologies have the potential to reinforce the consumer’s demand for safe, authentic and reliable products. The retail industry is at a pivotal point where it must innovate and prioritize the interests of consumers. IoT has enabled commercial ecosystems, but it cannot enable consumer protection. But blockchain can and should.

Supply Chains & Energy


 In times of disruption, this matters more than ever. Businesses and consumers want brands to guarantee product authenticity, while supply chain participants demand responsible sourcing and better visibility to minimize disputes. Blockchain for supply chain solutions help supply chain leaders use data to handle the disruptions of today and build resiliency for the future.

Media & Entertainment


The protocol allows consumers to know the origins of their favorite movies, music and TV shows by enabling smart contracts to track content ownership. Create higher quality content and deliver a more personalized and engaging experience to consumers, while delivering more efficient, secure transactions.

In Summary

To achieve true enterprise adoption of blockchain, a company needs to provide robust solutions that have both effectiveness and viability. It is tough for companies to gauge the effectiveness of a solution without understanding its viability. That’s why CipherProxy has created a solution that not only mitigates many of the challenges, such as scalability, usability, and interoperability, but also has an enterprise-level platform that is built for today’s blockchain world. Businesses can’t stand on their own two feet without a platform that can be agile and scalable, with platforms that support multiple use cases, in the midst of an evolving market. CipherProxy is on a mission to provide those solutions. From interoperability to different layers of connectivity, CipherProxy is going all-out in creating a system that can accommodate a comprehensive range of enterprise needs. We’re not just creating a company here, we’re creating a full-fledged ecosystem that is ready for a wide range of needs. We’re taking the whole world by storm because we equip businesses with the tools they need to prosper in the future. Now, all you have to do is be a part of it.

Frequently Asked Questions



Cipher Protocol is at this stage work in progress.

This FAQ is continuously updated according to its developments. The structures and technologies to be included at genesis are not finalized and are liable to change with continued research.


What does "interoperability" mean?

Interoperability refers to the basic ability of different computerized products or systems to readily connect and exchange information with one another, in either implementation or access, without restriction.

What is Substrate?

Substrate is a modular framework that enables you to create purpose-built blockchains by composing custom or pre-built components. Learn more from their official website.

What is Cipher Protocol?

Cipher Protocol is part of the consortium of projects from Polkadot and Cosmos, united by the vision of cross-chain interoperability (cross communications) between blockchain networks and serve the purpose of a trustless, and scalable global decentralized ecosystem for all businesses and consumers.

Cipher Protocol offers a new approach to cloud computing with its Decentralized Data Exchange Protocol (DDXP) optimized for P2P data collaboration and security. This DDXP allows stakeholders to own and manage their data with full custody, making it one of the first platforms that gives them 100% control over any data use or deployment. Enterprise now have the opportunity to easily plug-in their existing data ecosystems in real time to increase value streams, privacy, security, and efficiency. Cipher makes data directly accessible in near real-time by all business units, partners/vendors, IoT devices, and machine-learning processes… etc.

What is Cipher Protocol's Decentralized Data Exchange Protocol?

Cipher Protocol’s DDXP is a decentralized data exchange and collaboration protocol. DDXP allows for the tokenization of data, data traceability, and cross-system data processing. The DDXP leverages Cipher Protocol’s layer-1 public blockchain and will be complaint with data regulations. (GDPR)

Why does Cipher Protocol need a blockchain and what is it used for?

Blockchain application brings trust, accountability, and transparency to digital transactions. The technology creates and maintains cryptographically secure, shared, and distributed ledger for transactions.

What applications does the Cipher Protocol DDXP feature?

It provides a series of methods and interfaces to meet the requirements of trust and data interoperability across multiple systems, which serves multiple business requirements and scenarios, especially the data exchange scenarios.

Peer-to-Peer Data Transmission

The data exchange system uses blockchain to support accurate search and transmission of data between two parties without having a centralized database.

Data Authorization Mechanisms

Data privacy protection and leakage prevention are always assured whilst giving the user full control of their data; each data transfer must receive authorization from all parties.

Copyright Protection of Data

Cipher stores, manages, and attests data throughout its life cycle. A digital identity is created for each copy of data from registration, request, authorization, to exchange. Copyright protection is also recorded to each copy on the blockchain.

Distributed Data Storage

A distributed data storage layer supports decentralized storage for different types of data

How does Cipher Protocol support the evolution of NFTs?

Cipher Protocol will be supporting NFT’s (non-fungible tokens) that can represent unique or fractionalized ownership of real-world or digital assets for business and applications. The DDXP offers a set of plug-and-play utilities that can be extended to any other NFT compatible network as well.

Cipher Protocol uniquely captures the critical event data relating to the issuance, transfers, and access of such tokens, ensuring that the state changes of the NFT are captured both on-chain and in the DDXP, both going through network consensus at the same time. This allows for fully automated verifications and value-transfer via smart contracts and workflow software to capture much more information and utility.

How does Cipher Protocol benefit DeFi?

The Decentralized Finance (DeFi) industry today consists mainly of the decentralized exchange of digital assets as well as the over-collateralization of digital assets to provide lending services. However, compared to mainstream financial services, it is evident that due to the lack of credit mechanisms, there are still limitations in the allocation of resources to users, and that mainstream financial service mechanisms are difficult to implement. Credit-based DeFi proposes the concept of integrating credit elements into decentralized finance. These elements can be used for credit-based lending or new asset digitization, further expanding the service model and scope of decentralized finance. It also gives DeFi greater potential to provide mainstream financial services.

Based on this concept, CipherProxy will build a decentralized autonomous organization (DAO) initiative called the CipherDAO for decentralized financial services that integrates credit elements. CipherDAO can support the construction of decentralized financial products that combine collateral value and credit evaluation, as well as further decentralized social governance and autonomy. Cipher Protocol will have cross-chain integration with other mainstream blockchain networks and will use the digital assets from these networks, as well as from its own network to build collateral pools. Additionally, Cipher Protocol’s decentralized identity data protocol supports the authentication of various kinds of assets, ranging from simple to complex, to NFT digital assets to lay a solid foundation for the addition of new types of collateral.

Credit-Based DeFi refers to DeFi products that integrate credit elements into decentralized financial services and enhance DeFi products in the following

• Credit lending: Introduces credit assessment into lending products, gradually reducing or even cancelling collateralization requirements, and realizing the application of real resource allocation.

• Asset digitization: The digitization of certain types of assets requires on-chain confirmation of a series of credit elements related to those assets,
such as ownership/asset attributes/legitimacy, etc.

• Regulatory compliance: If DeFi expands the service scope and category of the service group, compliance will become an important requirement, which will involve considering the needs of relevant assets or the credit element review of relevant users.

How does the Data Marketplace work?

Cipher Protocol’s ODM is powered by a complete data interaction protocol based on Cipher Protocol’s Layer-1 core. The process of data valuation, profit sharing, data security and privacy protection is fully decentralized.

What is the Data Marketplace used for?

With Cipher Protocol’s Open Data Marketplace, individuals and companies can monetize raw data, data processing service and insights, while still having full control over their data leveraging the unique features of public blockchain.

Companies that complete the KYB (know your business) verification with Cipher Protocols ODM are authorized to purchase any kind of data. The ODM ensures that each company acquire necessary and quality data in full compliance with regulations, especially when requesting data from individuals. Multiple secure data analysis and processing service will be available here as well.

What is "heterogenous sharding" and why does it matter?

There are three key concepts related to heterogeneous sharding namely single chain, shards, and heterogenous sharding. What is a single chain? It is analogous to a single-lane highway. ETH 1.0, EOS, NEO, hyperledger, public chains, alliance chains, and so on are all single chains. As for sharding, it is like a multi-lane highway. The advantage of a multi-lane highway is that the time needed for a huge amount of traffic to pass through is lesser than that of passing through a single-lane highway.

At the same time, sharding can be based on the current traffic to dynamically adjust the number of lanes. If one has three lanes for now, when traffic increases, one can add one, or two, or three more lanes to expand the capacity to allow more traffic to pass through. One thing to note is that, for each lane, one needs to have identical lanes with identical specifications. Such constraint requires us to consider in the first place how wide the lane should be. What kind of materials should be used? Sandstone or granite? Should we plant any greens on both sides? All these specifications are needed during the design phase. After the design, every time when we add lanes, we follow this blueprint to add identical lanes.

In the area of sharding, ETH 2.0, Zilliqa, Harmony, Near are all good examples. If so, then what is heterogenous sharding? Heterogenous sharding, like sharding, has a multi-lane highway but each lane can be designed differently. As the highway in the previous examples requires the same width and the same materials and such, the heterogenous sharding highway allows each lane to be designed differently.


How does Cipher Protocol achieve enterprise adoption?

Enterprise adoption and decentralized blockchain networks have been viewed as two opposing ideals, compounded by the scaling, decentralization, and security trilemma. Cipher Protocol resolves this paradox by way of a holistic and system-wide solution for scalability, interoperability, and seamless integration of the global app ecosystem into a decentralized economy powered by blockchain technology.

Cipher Protocol and its stakeholders are convinced that the pathway to mass adoption is through enterprise adoption. This will be realized by working with successful enterprises that already have millions of loyal users. The CipherProxy team designed an easy and straightforward SaaS solution to drive further adoption through traditional sales and marketing practices.

What is your roadmap for 2021?

Launch Testnet Q3 2021.

What is CipherProxy's business model?

In order to drive economic value for the Cipher utility token, +- 20% of all Cipher network fees will be used for network transactions, and another 20% will be allocated to the Cipher Open Data Marketplace to stimulate activity between enterprises and data engineers.

How is data custodianship governed?

Data custodianship on Cipher is governed by the following four principles:


  • Data Governance: The process of managing the availability, usability, integrity, and security of the data in enterprise systems, based on internal data standards and policies that also control data usage. Effective data governance protocols on Cipher ensure that data is consistent, trustworthy, and doesn’t get misused or compromised.
  • Data Ownership: Customer data stored on Cipher chains are fully encrypted through secure RSA encryption and partitioned per enterprise entity with a state-of-the-art identity management system. Application data is associated with anonymous, randomized IDs, non-identifiable personal information. Only users and entities with the associated private key can decrypt and deanonymize their own data.
  • Secure Collaboration: Cipher will natively implement multi-party computing techniques such as federated learning and differential privacy to allow decentralized collaboration without exposing privacy-regulated customer data to the party analyzing (part of) the data.
  • Data Compliance: Enterprises operating in regions with strict data privacy regulations such as GDPR and CCPA can leverage Cipher’s hybrid architecture to create a permissioned environment with blockchain-based authorization and audit capabilities defined by state transition functions, while still maintaining interoperability with the rest of the network.
How does Cipher comply with GDPR/CCPA regulations?

Cipher DDXP captures and stores individually encrypted customer interaction data, along with value transactions to each user’s individual ledger and individual tamper-proof and time-capsuled data structures in IPFS clusters. This allows enterprises to capture customer journeys in individual ledgers for more personalized data intelligence operations. This enables enterprises to share customer data on the Open Data Marketplaces, without exposing sensitive data.

With Cipher’s privacy tool, the Decentralized Data Explorer (DDE), enterprise apps can permit their users to look up all data collected in their tools. In this way, Cipher turns the traditional blockchain privacy issues into a win/win for both enterprises and customers.

With Cipher, customer data is guaranteed to be compliant with GDPR and CCPA privacy regulations, giving it a major competitive advantage over other CRM solutions offered in the market.


How can I stay updated with progress?

Interoperability refers to the basic ability of different computerized products or systems to readily connect and exchange information with one another, in either implementation or access, without restriction.

How can I reach the team?

Visit our Linkedin, twitter or instagram! You can also send an email to

What is the Cipher Partner Network?

The Cipher Partner Network (CPN) has been established to create universal protocol standards for the enterprise DeFi space and improve communications between the enterprises and the DeFi ecosystem. The alliance will also conduct research on emerging DeFi protocols to help avoid future crises in the community.

The content of this website was created with the assistance of GPT-3.