Tiger Research: Why Financial Institutions Prefer Selective Privacy

iconOdaily
Share
Share IconShare IconShare IconShare IconShare IconShare IconCopy
AI summary iconSummary

expand icon
Tiger Research highlights selective privacy as an increasing focus for financial institutions in 2026, particularly under CFT (Combating Financial Terrorism) regulations. While blockchain transparency remains a core advantage, it poses a threat to corporate and investment privacy. Fully anonymous assets like Monero do not meet KYC/AML (Know Your Customer/Anti-Money Laundering) requirements. Institutional investors are supporting solutions such as the Canton Network, which enable privacy without compromising compliance. Although BTC continues to attract attention as a hedge against inflation, privacy tools are increasingly viewed as equally essential for institutional operations. Zcash's "all-or-nothing" privacy model is outpaced by Canton's more flexible approach.

This article is written byTiger ResearchOne of the defining narratives of 2026 will be "privacy." As institutional participants dominate the cryptocurrency space, privacy has become a key technological feature in bridging blockchain and real-world commerce.

Key Points

  • The core advantage of blockchain—transparency—may expose corporate trade secrets and investment strategies, posing significant risks to businesses.
  • Privacy models that offer complete anonymity, such as Monero, do not support KYC or AML, making them unsuitable for regulated institutions.
  • Financial institutions require selective privacy, which can protect transaction data while remaining compatible with regulatory compliance.
  • Financial institutions must determine how to connect with open Web3 markets to achieve expansion.

1. Why is blockchain privacy necessary?

One of the core characteristics of blockchain is transparency. Anyone can inspect transactions on the chain in real time, including who sent the funds, to whom they were sent, the amount involved, and when they were sent.

However, from an institutional perspective, this transparency brings obvious issues. Imagine a scenario where the market can observe exactly how much NVIDIA transfers to Samsung Electronics, or precisely when a hedge fund deploys capital. This visibility would fundamentally alter competitive dynamics.

An individual's tolerance level for information disclosure differs from what businesses and financial institutions can accept. Transaction histories of companies and the timing of institutional investments constitute highly sensitive information.

Therefore, it is unrealistic to expect institutions to operate on a blockchain where all activities are fully exposed. For these participants, a system without privacy is more of an abstract ideal with limited practical application than a useful infrastructure.

2. Forms of Blockchain Privacy

Blockchain privacy is typically divided into two categories:

  • Complete anonymous privacy
  • Selective Privacy

The key difference lies in whether the information can be disclosed when the other party needs to verify it.

2.1. Complete Anonymous Privacy

Complete anonymous privacy, in simple terms, is about hiding everything.

The sender, receiver, and transaction amount are all hidden. This model directly contrasts with traditional blockchains, which prioritize transparency by default.

The primary goal of a fully anonymous system is to prevent third-party surveillance. Rather than enabling selective disclosure, they aim to completely prevent external observers from extracting meaningful information.

Source:Tiger Research

The image above shows a Monero transaction record, a representative example of complete anonymity and privacy. Unlike transparent blockchains, details such as the transfer amount and transaction counterparties are not visible.

Two characteristics explain why this model is considered fully anonymous:

  • Total Output:The ledger does not display specific numbers, but instead shows values as "confidential." Transactions are recorded, but their contents cannot be deciphered.
  • Ring signature size:Although a single sender initiates the transaction, the ledger mixes it with multiple decoys, making it appear as if multiple parties are sending funds simultaneously.

These mechanisms ensure that transaction data remains opaque to all external observers, without exception.

2.2. Selective Privacy

Selective privacy operates based on different assumptions. Transactions are public by default, but users can choose to make specific transactions private by using designated privacy-enabled addresses.

Zcash provides a clear example. When initiating a transaction, users can choose between two address types:

  • Transparent Address:All transaction details are publicly visible, similar to Bitcoin.
  • Filtered address:Transaction details are encrypted and hidden.

Source:Tiger Research

The figure above illustrates which elements Zcash can encrypt when using shielded addresses. Transactions sent to shielded addresses are recorded on the blockchain, but their contents are stored in an encrypted form.

Although the existence of the transaction is still visible, the following information is hidden:

  • Address Type:Use screened (Z) addresses instead of transparent (T) addresses.
  • Transaction history:The ledger confirms that a transaction has occurred.
  • Amount, Sender, Recipient:All are encrypted and cannot be observed from the outside.
  • View permissions:Only parties granted the viewing key can inspect the transaction details.

This is the core of selective privacy.Transactions are stored on the blockchain, but users control who can view their contents. When necessary, users can share viewing keys to prove transaction details to a specific party, while all other third parties remain unable to access the information.

3. Why Financial Institutions Prefer Selective Privacy

Most financial institutions have Know Your Customer (KYC) and Anti-Money Laundering (AML) obligations for each transaction. They must retain transaction data internally and respond promptly to requests from regulators or supervisory authorities.

However, in an environment built upon complete anonymity and privacy, all transaction data is irreversibly hidden. Since the information cannot be accessed or disclosed under any circumstances, institutions are structurally unable to fulfill their compliance obligations.

A representative example is the Canton Network, which has been adopted by the Depository Trust & Clearing Corporation (DTCC) and is currently being used.More than 400 companiesFor institutional use. In contrast, although Zcash is also a selective privacy project, its adoption by institutions in the real world is quite limited.

What is the reason for this difference?

Source:Tiger Research

Zcash provides selective privacy, but users cannot choose which specific information to disclose. Instead, they must decide whether to disclose the entire transaction.

For example, in a transaction where "A sends 100 dollars to B," Zcash does not allow hiding only the amount. The transaction itself must be fully hidden or fully disclosed.

In institutional transactions, different parties require different information. Not all participants need access to all data within a single transaction. However, Zcash's structure forces a binary choice between full disclosure and complete privacy, making it unsuitable for institutional transaction workflows.

In contrast, Canton allows transaction information to be split into individual components for management. For example, if a regulator only requires the transaction amount between A and B, Canton enables institutions to provide only that specific information. This feature is achieved through Daml, the smart contract language used by the Canton Network.

Other reasons why institutions adopt Canton were mentioned previously.Canton ResearchThere is a more detailed introduction in the middle.

4. Privacy Blockchain in the Institutional Era

Privacy blockchains evolve as demands change.

Early projects like Monero aimed to protect personal anonymity. However, as financial institutions and businesses began entering the blockchain environment, the meaning of privacy has shifted.

Privacy is no longer defined as making transactions invisible to everyone. Instead, the core objective has shifted to protecting transactions while still meeting regulatory requirements.

This shift explains why selective privacy models like the Canton Network have gained attention. Institutions need more than just privacy technologies; they require infrastructure designed to match the workflows of real-world financial transactions.

In response to these demands, more institution-focused privacy initiatives continue to emerge. Looking ahead, the key differentiating factor will be how effectively privacy technologies can be applied in real transaction environments.

Alternative forms of privacy that contradict the current institutional-driven trends may emerge. However, in the short term, privacy blockchains may continue to develop around institutional transactions.

Source:Tiger Research

Disclaimer: The information on this page may have been obtained from third parties and does not necessarily reflect the views or opinions of KuCoin. This content is provided for general informational purposes only, without any representation or warranty of any kind, nor shall it be construed as financial or investment advice. KuCoin shall not be liable for any errors or omissions, or for any outcomes resulting from the use of this information. Investments in digital assets can be risky. Please carefully evaluate the risks of a product and your risk tolerance based on your own financial circumstances. For more information, please refer to our Terms of Use and Risk Disclosure.