Asset Tokenization in Financial Markets 2025

Page 40 of 63 · WEF_Asset_Tokenization_in_Financial_Markets_2025.pdf

Contents40 4.5 Privacy and compliance Fragmented identity verification limits the growth of tokenized financial products. Standardized KYC is estimated to improve onboarding efficiency by up to 90% in fund management.101 On-chain identities offer potential but raise privacy concerns. Privacy is the capacity for individuals or organizations to dictate how and when their data is shared and is based on the principle of individuals controlling the degree to which they selectively express themselves digitally, including identifiers such as age, accredited investor status and nationality.102 On-chain identities can range from fully identifiable to pseudonymous and anonymous. However, fully anonymous identities conflict with Financial Action Task Force (FATF) guidelines, which require due diligence for every financial customer and prohibit untraceable accounts.103 Privacy-enhancing technologies (PETs) such as zero-knowledge proofs and fully homomorphic encryption protect sensitive data while enabling compliance. For example, PETs, including pseudonymization and zero- knowledge proofs, are being explored by the BIS under Project Aurum 2.0 to advance retail CBDCs.104 Although anonymity provides better privacy safeguards in theory, it poses risks to KYC and AML compliance as it could allow bad actors to obfuscate on-chain illicit activities, which amounted to nearly $25 billion in 2021.105 Customer and transaction identification is essential for complying with KYC, AML, sanctions and the Travel Rule, making anonymous transactions unsuitable for regulated markets.106 To address this, token standards such as ERC-3643 and ERC-5564 are emerging. ERC-3643 enables compliant transfers based on on-chain identity, while ERC-5564 supports privacy through stealth addresses and dynamic address generation.107 Tokeny’s DINO protocol uses ERC-3643 to facilitate compliant DvD transfers across platforms, executing only when both parties are KYC-verified.108 On-chain identity enforcement often follows allow- or deny-list models. Allow-lists enhance security but limit inclusivity, while deny-lists are more open but require constant monitoring to mitigate risks from malicious actors. Achieving privacy on-chain is not without its hurdles and trade-offs. While unlikely, storing personal data on-chain raises concerns about regulations such as the General Data Protection Regulation (GDPR)’s “right to be forgotten”.109 Because public networks have mixer and tumbler decentralized applications that can hide the trail of who sent and received crypto (by blending or shuffling transactions), users can mostly stay anonymous – even though wallet addresses are partly visible. Another hurdle is quantum-safe PETs, as not all PETs are protected against quantum attacks, which can break encryptions and leak sensitive data. Additionally, compliance with the FATF’s Travel Rule is heightened when handling tokenized asset transactions, and the number of jurisdictions requiring compliance in the form of tracking originator and beneficiary data in an on-chain setting is growing.110Barriers to adoption TABLE 4 Advantages and trade-offs of allow- and deny-list models MODEL Allow listing Deny listing— Tighter security and control — Simplified compliance checks — Clear accountability and audit trails— Reduced privacy and anonymity (must disclose information) — High maintenance overhead — Excludes unlisted (possibly legitimate) users — Reactive approach (must constantly update list) — Bad actors can create new identities — Potential for false positives or censorship— More open and inclusive — Less friction for onboarding — Default user privacy preservedADVANTAGES TRADE-OFFS
Ask AI what this page says about a topic: