Skye protocol

"cB SKYE empowers organisations to instantly deploy decentralized value chain ecosystems, build protocol-driven solutions or smart contracts to enhance g/local trade across all sectors."

cB Tech Adviser - Philippe Heurtel

cB Tech Adviser - Philippe Heurtel


From solo start-ups to the world’s largest enterprises and industries, irrespective of their stage or use case, cB SKYE DLT protocol allows the fast and cost-effective building of efficient, highly automated, disintermediated and secure trading ecosystems with the highest levels of data integrity, confidentiality and availability.

While blockchain history started in the early 1980's with building blocks (punt intended) such as Ralph Merkle's seminal hash trees, Lamport's, Shostak's & Pease's work on the Byzantine Generals Problem, basis for consensus protocols, then in 1993, Cynthia Dwork & Moni Naor's computing cost invention, cB has been a protagonist, mover & shaker in the industrial DLT (Distributed Ledger Technology) sector for the past 2 decades. Of note have been the world-first paper on decentralized money ("the money-poly conundrum", G. Di Noto, May 2008, ENV100 unit, Griffiths University, Australia), followed by the 2014 commercial release of NEXT+, the first-ever Distributed Ecosystem Management platform, including SKYE DLT protocol, with another seminal, peer-reviewed, paper in late 2017 setting the scene for unchained quantum-based DLT ("From Block to Bloch", G. Di Noto, T. Shrivastava, R. Bhatnagar, K. Chandrasekaran, U. Beyer, QTECH conference, Paris, July 2018).

Blockchain history

DLT security at the core

Aside from its virtually unlimited TPS (Transactions Per Second) architecture, native interoperability consensus-neutral features, an important differentiator between SKYE and other blockchain protocols is its triplex structure which extends KEYSTONE elasticity inner benefits to ledger distribution. Such intertwined architecture unleashes true full on-chain data storage, instant code-less multi-stage smart contracts (time-dependent DLT ecosystems) and permissioned DLT registries on any workflowed data (across 25+ functional modules including on-chain e-docs and comms). Most importantly, SKYE allows security at the core, as opposed to sidelined add-on security layers which typically increase systems' potential attack surfaces.

cB stack security features span 50+ independent domains across all physical & logical components, including multi-cloud vendor-neutral infrastructure, physical facilities periodic audits, internal caging, metal servers access, redundant multilayered architecture, cross-site DRM, policies, SOEs, SOPs, node segregations, 8-levels end-to-end encryption, reputational risk management, data flows live analysis, code integrity, automated software quality assurance, multi-level data validations, atomic security profiles, compliance audits, cyber-defense, automated silent cyber-hunting and many more safety measures. cB solutions guarantee that the security level of clients' information ecosystems is constantly higher than that of any conventional on-premise or cloud ones.