BTC
ETH
HTX
SOL
BNB
View Market
简中
繁中
English
日本語
한국어
ภาษาไทย
Tiếng Việt

Tiger Research: Why Do Financial Institutions Prefer Selective Privacy?

Tiger Research
特邀专栏作者
2026-01-12 02:42
This article is about 2396 words, reading the full article takes about 4 minutes
Monero, Zcash, and Canton Network: Who is the True King of Privacy?
AI Summary
Expand
  • Core Viewpoint: The blockchain privacy needs of the institutional era are shifting towards selective disclosure.
  • Key Elements:
    1. Enterprises require privacy to protect trade secrets and investment strategies.
    2. Fully anonymous models (like Monero) cannot meet compliance requirements.
    3. Financial institutions prefer selective privacy (like Canton) that supports KYC/AML.
  • Market Impact: Driving privacy technology towards compliance and auditability.
  • Timeliness Note: Medium-term impact.

This article is written by Tiger Research. One of the defining narratives for 2026 is "privacy." As institutional players become dominant in the cryptocurrency space, privacy has emerged as a key technical feature connecting blockchain with real-world commerce.

Key Takeaways

  • The core advantage of blockchain—transparency—can expose corporate trade secrets and investment strategies, posing substantial risks to businesses.
  • Fully anonymous privacy models like Monero do not support KYC or AML, making them unsuitable for regulated institutions.
  • Financial institutions require selective privacy that protects transaction data while remaining compatible with regulatory compliance.
  • Financial institutions must determine how to connect with open Web3 markets for expansion.

1. Why is Blockchain Privacy Necessary?

One of the core features of blockchain is transparency. Anyone can inspect on-chain transactions in real-time, including who sent funds, to whom, the amount, and when it was sent.

However, from an institutional perspective, this transparency presents obvious problems. Imagine a scenario where the market could observe exactly how much Nvidia transferred to Samsung Electronics, or the precise timing of a hedge fund's capital deployment. This visibility would fundamentally alter competitive dynamics.

The level of information disclosure tolerable for individuals differs from what businesses and financial institutions can accept. A company's transaction history and the timing of institutional investments constitute highly sensitive information.

Therefore, expecting institutions to operate on a blockchain where all activity is fully exposed is unrealistic. For these players, a system without privacy is less a practical infrastructure and more an abstract ideal with limited real-world application.

2. Forms of Blockchain Privacy

Blockchain privacy is generally categorized into two types:

  • Fully Anonymous Privacy
  • Selective Privacy

The key difference lies in whether information can be disclosed when verification by another party is required.

2.1. Fully Anonymous Privacy

Fully anonymous privacy, simply put, hides everything.

The sender, receiver, and transaction amount are all concealed. This model stands in direct opposition to traditional blockchains, which prioritize transparency by default.

The primary goal of fully anonymous systems is to prevent third-party surveillance. Rather than enabling selective disclosure, they aim to completely block external observers from extracting meaningful information.

Source: Tiger Research

The image above shows a Monero transaction record, a representative example of fully anonymous privacy. Unlike transparent blockchains, details like the transfer amount and counterparty are not visible.

Two characteristics illustrate why this model is considered fully anonymous:

  • Output Total: The ledger does not show specific numbers, instead displaying values as "confidential." Transactions are recorded, but their content cannot be interpreted.
  • Ring Signature Size: Although a single sender initiates the transaction, the ledger mixes it with multiple decoys, making it appear as if multiple parties are sending funds simultaneously.

These mechanisms ensure transaction data remains opaque to all external observers, without exception.

2.2. Selective Privacy

Selective privacy operates on a different assumption. Transactions are public by default, but users can choose to make specific transactions private by using designated privacy-enabled addresses.

Zcash provides a clear example. When initiating a transaction, users can choose between two address types:

  • Transparent Addresses: All transaction details are publicly visible, similar to Bitcoin.
  • Shielded Addresses: Transaction details are encrypted and hidden.

Source: Tiger Research

The image above illustrates what elements Zcash can encrypt when using shielded addresses. Transactions sent to shielded addresses are recorded on the blockchain, but their content is stored in an encrypted state.

While the existence of the transaction remains visible, the following information is hidden:

  • Address Type: Uses a shielded (Z) address instead of a transparent (T) address.
  • Transaction Record: The ledger confirms a transaction occurred.
  • Amount, Sender, Receiver: All are encrypted and unobservable from the outside.
  • Viewing Permission: Only parties granted a viewing key can inspect the transaction details.

This is the core of selective privacy. The transaction remains on-chain, but the user controls who can view its content. When necessary, users can share a viewing key to prove transaction details to another party, while all other third parties remain unable to access that information.

3. Why Financial Institutions Prefer Selective Privacy

Most financial institutions have Know Your Customer (KYC) and Anti-Money Laundering (AML) obligations for each transaction. They must retain transaction data internally and respond immediately to requests from regulators or supervisory bodies.

However, in an environment built on fully anonymous privacy, all transaction data is irreversibly hidden. Because the information cannot be accessed or disclosed under any condition, institutions are structurally unable to fulfill their compliance obligations.

A representative example is the Canton Network, which has been adopted by the Depository Trust & Clearing Corporation (DTCC) and is currently used by over 400 companies and institutions. In contrast, Zcash, although also a selective privacy project, has seen limited real-world institutional adoption.

What causes this difference?

Source: Tiger Research

Zcash offers selective privacy, but users cannot choose which information to disclose. Instead, they must choose whether to disclose the entire transaction.

For example, in a transaction where "A sends $100 to B," Zcash does not allow only the amount to be hidden. The transaction itself must be either fully hidden or fully disclosed.

In institutional transactions, different participants require different information. Not all parties need access to all data within a single transaction. However, Zcash's structure forces a binary choice between full disclosure and full privacy, making it unsuitable for institutional transaction workflows.

In contrast, Canton allows transaction information to be managed as separate components. For instance, if a regulator only requests the transaction amount between A and B, Canton enables the institution to provide only that specific information. This functionality is achieved through Daml, the smart contract language used by the Canton Network.

Other reasons for institutional adoption of Canton are covered in more detail in previous Canton research.

4. Privacy Blockchains in the Institutional Era

Privacy blockchains evolve as needs change.

Early projects like Monero aimed to protect individual anonymity. However, as financial institutions and corporations began entering the blockchain environment, the meaning of privacy shifted.

Privacy is no longer defined as making transactions invisible to everyone. Instead, the core objective has become protecting transactions while still meeting regulatory requirements.

This shift explains why selective privacy models like the Canton Network are gaining traction. Institutions need more than just privacy technology; they need infrastructure designed to match real-world financial transaction workflows.

In response to these demands, more institution-oriented privacy projects continue to emerge. Looking ahead, the key differentiator will be how effectively privacy technology can be applied to practical transaction environments.

Alternative forms of privacy that run counter to the current institution-driven trend may emerge. However, in the short term, privacy blockchains are likely to continue developing around institutional transactions.

Source: Tiger Research

invest
Privacy Computing
Welcome to Join Odaily Official Community