Tiger Research: Why Do Financial Institutions Prefer Selective Privacy?

marsbitОпубликовано 2026-01-12Обновлено 2026-01-12

Введение

The decisive narrative of 2026 is "privacy," becoming crucial as institutional players dominate crypto, serving as a key bridge between blockchain and real-world commerce. Blockchain's core transparency exposes corporate secrets and investment strategies, posing substantial risks. While complete anonymity models like Monero lack KYC/AML compliance, making them unsuitable for regulated entities, financial institutions require selective privacy—protecting transaction data while maintaining regulatory compatibility. Selective privacy, exemplified by Zcash, allows users to encrypt transaction details (sender, receiver, amount) using shielded addresses, with view keys enabling controlled disclosure. However, Zcash’s all-or-nothing approach limits its institutional adoption. In contrast, networks like Canton, adopted by DTCC and over 400 institutions, offer granular data disclosure, aligning with real-world compliance needs. Privacy in blockchain is evolving from total anonymity to selective, regulated models. The future will prioritize infrastructure that balances privacy with practical financial workflows, driven by institutional demand.

This article is written by Tiger Research. One of the defining narratives of 2026 is "privacy." As institutional players dominate the cryptocurrency space, privacy has become a key technological feature connecting blockchain with real-world business.

Core Points

  • The core advantage of blockchain—transparency—can expose corporate trade secrets and investment strategies, posing substantial risks to businesses.
  • Fully anonymous privacy models like Monero do not support KYC or AML, making them unsuitable for regulated institutions.
  • Financial institutions need selective privacy, which can protect transaction data while remaining compatible with regulatory compliance.
  • Financial institutions must determine how to connect with open Web3 markets for expansion.

1. Why is Blockchain Privacy Necessary?

One of the core features of blockchain is transparency. Anyone can inspect on-chain transactions in real time, including who sent the funds, to whom, the amount, and when it was sent.

However, from an institutional perspective, this transparency presents obvious problems. Imagine a scenario where the market can observe how much Nvidia transferred to Samsung Electronics, or when a hedge fund precisely deployed capital. This visibility would fundamentally alter competitive dynamics.

The level of information disclosure that individuals can tolerate differs from what businesses and financial institutions can accept. A company's transaction history and the timing of institutional investments constitute highly sensitive information.

Therefore, it is unrealistic to expect institutions to operate on a blockchain where all activities are completely exposed. For these players, a system without privacy is less of a practical infrastructure and more of an abstract ideal with limited real-world application.

2. Forms of Blockchain Privacy

Blockchain privacy is generally divided into two categories:

  • Fully Anonymous Privacy
  • Selective Privacy

The key difference lies in whether the information can be disclosed when verification by another party is required.

2.1. Fully Anonymous Privacy

Fully anonymous privacy, simply put, hides everything.

The sender, receiver, and transaction amount are all hidden. This model stands in direct opposition to traditional blockchains, which prioritize transparency by default.

The primary goal of fully anonymous systems is to prevent third-party surveillance. Rather than enabling selective disclosure, they aim to completely prevent external observers from extracting meaningful information.

Source: Tiger Research

The image above shows a Monero transaction record, a representative example of fully anonymous privacy. Unlike transparent blockchains, details such as the transfer amount and counterparty are not visible.

Two characteristics illustrate why this model is considered fully anonymous:

  • Output Totals: The ledger does not show specific numbers but displays values as "confidential." Transactions are recorded, but their content cannot be interpreted.
  • Ring Signature Size: Although a single sender initiates the transaction, the ledger mixes it with multiple decoys, making it appear as if multiple parties are sending funds simultaneously.

These mechanisms ensure that transaction data remains opaque to all external observers without exception.

2.2. Selective Privacy

Selective privacy operates on a different assumption. Transactions are public by default, but users can choose to make specific transactions private by using designated privacy-enabled addresses.

Zcash provides a clear example. When initiating a transaction, users can choose between two address types:

  • Transparent Addresses: All transaction details are publicly visible, similar to Bitcoin.
  • Shielded Addresses: Transaction details are encrypted and hidden.

Source: Tiger Research

The image above illustrates which elements Zcash can encrypt when using shielded addresses. Transactions sent to shielded addresses are recorded on the blockchain, but their content is stored in an encrypted state.

While the existence of the transaction remains visible, the following information is hidden:

  • Address Type: Uses shielded (Z) addresses instead of transparent (T) addresses.
  • Transaction Record: The ledger confirms that a transaction occurred.
  • Amount, Sender, Receiver: All are encrypted and cannot be observed externally.
  • Viewing Permissions: Only parties granted a viewing key can inspect the transaction details.

This is the core of selective privacy. Transactions remain on-chain, but users control who can view their content. When necessary, users can share a viewing key to prove transaction details to another party, while all other third parties remain unable to access that information.

3. Why Financial Institutions Prefer Selective Privacy

Most financial institutions have Know Your Customer (KYC) and Anti-Money Laundering (AML) obligations for each transaction. They must retain transaction data internally and respond immediately to requests from regulators or supervisory bodies.

However, in an environment built on fully anonymous privacy, all transaction data is irreversibly hidden. Because the information cannot be accessed or disclosed under any conditions, institutions are structurally unable to fulfill their compliance obligations.

A representative example is the Canton Network, which has been adopted by the Depository Trust & Clearing Corporation (DTCC) and is currently used by over 400 companies and institutions. In contrast, Zcash, although also a selective privacy project, has seen limited real-world institutional adoption.

What is the reason for this difference?

Source: Tiger Research

Zcash offers selective privacy, but users cannot choose which information to disclose. Instead, they must choose whether to disclose the entire transaction.

For example, in a transaction where "A sends $100 to B," Zcash does not allow only the amount to be hidden. The transaction itself must be either fully hidden or fully disclosed.

In institutional transactions, different participants require different information. Not all parties need access to all data in a single transaction. However, Zcash's structure forces a binary choice between full disclosure and full privacy, making it unsuitable for institutional transaction workflows.

In contrast, Canton allows transaction information to be divided into separate components for management. For instance, if a regulator only requires the transaction amount between A and B, Canton enables the institution to provide only that specific information. This functionality is achieved through Daml, the smart contract language used by the Canton Network.

Other reasons for institutional adoption of Canton are covered in more detail in the previous Canton Research.

4. Privacy Blockchains in the Institutional Era

Privacy blockchains evolve as demands change.

Early projects like Monero aimed to protect individual anonymity. However, as financial institutions and corporations began entering the blockchain environment, the meaning of privacy shifted.

Privacy is no longer defined as making transactions invisible to everyone. Instead, the core goal has become protecting transactions while still meeting regulatory requirements.

This shift explains why selective privacy models like the Canton Network have gained traction. Institutions need more than just privacy technology; they need infrastructure designed to match real-world financial transaction workflows.

In response to these demands, more institution-oriented privacy projects continue to emerge. Looking ahead, the key differentiator will be how effectively privacy technology can be applied to practical transaction environments.

Alternative forms of privacy that run counter to the current institution-driven trend may emerge. However, in the short term, privacy blockchain is likely to continue evolving around institutional transactions.

Source: Tiger Research

Связанные с этим вопросы

QWhy do financial institutions prefer selective privacy over fully anonymous privacy in blockchain?

AFinancial institutions prefer selective privacy because it allows them to protect sensitive transaction data while still complying with regulatory requirements like KYC and AML. Fully anonymous privacy models, such as Monero, irreversibly hide all transaction details, making it structurally impossible for institutions to fulfill their compliance obligations.

QWhat is the key difference between fully anonymous privacy and selective privacy in blockchain?

AThe key difference is that fully anonymous privacy hides all transaction details (sender, receiver, amount) from everyone, with no option for disclosure, while selective privacy allows transactions to be encrypted by default but enables users to share view keys with authorized parties (e.g., regulators) to disclose specific transaction details when needed.

QHow does Canton Network address the limitations of Zcash's selective privacy model for institutional use?

ACanton Network addresses Zcash's limitations by allowing transaction information to be broken down into separate components for granular disclosure. For example, institutions can disclose only the transaction amount to regulators without revealing other details, whereas Zcash requires a binary choice between fully hiding or fully disclosing an entire transaction.

QWhat are the risks of blockchain transparency for institutional players like corporations and hedge funds?

ABlockchain transparency risks exposing corporate trade secrets and investment strategies, such as transaction amounts between companies (e.g., Nvidia and Samsung) or the precise timing of capital deployments by hedge funds. This visibility could fundamentally alter competitive dynamics and is unacceptable for institutions handling sensitive business information.

QHow has the definition of privacy in blockchain evolved with the entry of institutional participants?

APrivacy in blockchain has evolved from protecting individual anonymity (e.g., Monero) to enabling selective disclosure that balances data protection with regulatory compliance. The focus has shifted from hiding transactions from everyone to designing infrastructure that matches real-world financial workflows, where institutions can control who sees specific transaction details.

Похожее

Three Frameworks for Ordinary People to Achieve AI Capability Leap: Say Goodbye to the Dilemma of 'Repeating Inputs Every Day'

Summary: This article outlines three frameworks for maximizing AI efficiency, moving beyond basic prompt usage. 1. **Three-Layer Evolution**: Users progress from (1) **Prompt** (one-off instructions, reset each session), to (2) **Project** (context-aware within a specific project), to (3) **Skill** (permanent, auto-applied knowledge). Most users stagnate at the first layer, repeating the same instructions daily with no cumulative improvement. Skills transform the AI from a chat tool into a personalized work system. 2. **Transaction vs. Compound Interest Mindset**: Using prompts is a linear transaction—effort and output are 1:1, and stopping resets progress. Investing time in building Skills is compound interest; a small initial time investment pays continuous dividends, as each Skill permanently elevates the AI's baseline performance. 3. **Thin Harness, Fat Skills**: The system architecture should prioritize thick, well-defined Skills (90% of the value—containing processes, standards, and domain knowledge) and a thin "harness" (the minimal technical environment). Avoid over-engineering the toolchain while neglecting the AI's actual knowledge. Skills are permanent assets that automatically improve with model updates. The key takeaway: Identify tasks you repeat, encode them into Skills (using tools like Claude's Skill Creator), and shift focus from daily prompting to building a compounding, self-improving AI system.

marsbit50 мин. назад

Three Frameworks for Ordinary People to Achieve AI Capability Leap: Say Goodbye to the Dilemma of 'Repeating Inputs Every Day'

marsbit50 мин. назад

Торговля

Спот
Фьючерсы

Популярные статьи

Как купить ONE

Добро пожаловать на HTX.com! Мы сделали приобретение Harmony (ONE) простым и удобным. Следуйте нашему пошаговому руководству и отправляйтесь в свое крипто-путешествие.Шаг 1: Создайте аккаунт на HTXИспользуйте свой адрес электронной почты или номер телефона, чтобы зарегистрироваться и бесплатно создать аккаунт на HTX. Пройдите удобную регистрацию и откройте для себя весь функционал.Создать аккаунтШаг 2: Перейдите в Купить криптовалюту и выберите свой способ оплатыКредитная/Дебетовая Карта: Используйте свою карту Visa или Mastercard для мгновенной покупки Harmony (ONE).Баланс: Используйте средства с баланса вашего аккаунта HTX для простой торговли.Третьи Лица: Мы добавили популярные способы оплаты, такие как Google Pay и Apple Pay, для повышения удобства.P2P: Торгуйте напрямую с другими пользователями на HTX.Внебиржевая Торговля (OTC): Мы предлагаем индивидуальные услуги и конкурентоспособные обменные курсы для трейдеров.Шаг 3: Хранение Harmony (ONE)После приобретения вами Harmony (ONE) храните их в своем аккаунте на HTX. В качестве альтернативы вы можете отправить их куда-либо с помощью перевода в блокчейне или использовать для торговли с другими криптовалютами.Шаг 4: Торговля Harmony (ONE)С легкостью торгуйте Harmony (ONE) на спотовом рынке HTX. Просто зайдите в свой аккаунт, выберите торговую пару, совершайте сделки и следите за ними в режиме реального времени. Мы предлагаем удобный интерфейс как для начинающих, так и для опытных трейдеров.

606 просмотров всегоОпубликовано 2024.04.12Обновлено 2025.06.06

Как купить ONE

Обсуждения

Добро пожаловать в Сообщество HTX. Здесь вы сможете быть в курсе последних новостей о развитии платформы и получить доступ к профессиональной аналитической информации о рынке. Мнения пользователей о цене на ONE (ONE) представлены ниже.

活动图片