Asset Tokenization in Financial Markets 2025

Page 14 of 63 · WEF_Asset_Tokenization_in_Financial_Markets_2025.pdf

Contents14 Note: The table continues with additional features on the next page.FEATURE Enhances information symmetry Enables user- centricityShared system of record Flexible custodial arrangements— Off-chain synchronization – a new system of record can complicate harmonization with existing institutional books and records, possibly resulting in further reconciliations or errors. — Reversals and clawbacks – some networks do not natively offer reversibility. — Data privacy and confidentiality – the ability to comply with certain measures, such as the EU GDPR’s “right to be forgotten”.— Information symmetry – ensures visibility and auditability, driving the reduction of information asymmetry and a reduction in reconciliations. — Immutability and auditability – creates an immutable, tamper- resistant ledger that securely records and verifies asset ownership, history and rights.C— Establishes unambiguous cryptographic proof of the state of the transaction.A — Allows for the automation of key functions, such as corporate actions and asset servicing.B— Financial institutions use electronic messaging to coordinate transactions and update their own set of books and records based on structured data.A — Multiple self-contained databases lead to inefficiencies and manual reconciliations that can lead to errors and delays. — Virtually all financial assets require intermediaries for safekeeping. — Certain markets exhibit centralization risk with few parties dominating market share.— Enables self-custody through private keys at the most fundamental level. — Offers security options with multisignature and decentralized approaches.— Direct user control – allows individuals to have direct control over their digital assets and data, driving privacy, portability and user autonomy.D— Cyberattacks – the risk of third- party providers being attacked with malicious code and bypassing security. — Lost keys – the risk of users/ institutions misplacing or leaking private keys.CONVENTIONAL TOKENIZATION BENEFITS RISKSThere are five differentiated technical features of tokenization.TABLE 1 Differentiated features of tokenization Value proposition
Ask AI what this page says about a topic: