Asset Tokenization in Financial Markets 2025

Page 48 of 63 · WEF_Asset_Tokenization_in_Financial_Markets_2025.pdf

Contents48 6.1 Infrastructure When different financial institutions adopt tokenization, they need to decide upon the underlying infrastructure. Three models of programmable ledgers are presented, two permissioned and one permissionless, with varying benefits. Permissioned ledgers Financial markets have historically used private- and public-permissioned programmable ledgers because of the native functions of control and oversight, which can mitigate AML, KYC, legal and fraud risks and enable dispute resolution. This environment allows for efficient data sharing and secure record-keeping, bolstering trust, as only approved entities can read or write transactions. At the same time, in a permissioned setup, broader participation is possible but still governed by strict rules of entry. For example, JP Morgan’s Kinexys platform has processed more than $1.5 trillion in notional value since its inception in 2021 by offering DLT-based payments, intraday repo and collateral services.133 Another example is Citi’s Integrated Digital Assets Platform (CIDAP), which offers an array of use cases across tokenized deposits, trade processing, bond exchange and private fund tokenization.134Design choices TABLE 6 Key programmable ledger models CATEGORY Description Transaction permissions Data viewability Governance modelOpen access: No entry barriers and any user with internet access can submit transactionsRestricted access: Participants vetted and approved by trusted authorities can submit transactions Controlled transparency: Targeted privacy measures feasible (e.g. selective disclosure) Moderately centralized: Governance through permissioned entities who validate the networkClosed and selective entry: Typically, enterprises and known counterparties can submit transactions Strict confidentiality: Default confidentiality with complete control over data exposure Highly centralized: Even narrower onboarding of permissioned entities to validate the networkFully transparent by default: Privacy achievable through additional tools (e.g. ZK proofs) Highly decentralized: Consensus among independent nodes (e.g. proof-of-stake) Scalability and performanceHigh throughput: Optimized for regulatory compliance and institutional transactionsHigh throughput: Purpose-built for enterprise- level volume and with predictable performanceVaries significantly: Dependent on consensus algorithms (e.g. proof-of-work is not natively scalable, while proof-of-stake is scalable) Compliance and regulatory alignmentStrong compliance: Designed for regulated activities and integration with legacy infrastructureHighest compliance: Explicitly designed for internal regulatory adherence, auditability and granular controlMinimal by default: Compliance possible but requires additional processes or layers Liquidity and market accessModerate liquidity: Dependent on size and influence of the managing consortium, targeted towards institutional-grade asset poolsVariable liquidity: Access tightly controlled but can be engineered for high internal liquidity within members, suitable for discrete tradingHigh liquidity: Driven by network effects, global participation and interoperability; suitable for broadly traded assets and digital currencies Infrastructure requirementsModerate barrier to entry: Stable, predictable operational costs aligned with enterprise standardsHigh barrier to entry: Lowest marginal transaction costs; ideal for large, structured transactionsLow barrier to entry: Moderate–high operational and transaction costs based on network feesPUBLIC-PERMISSIONLESS PUBLIC-PERMISSIONED PRIVATE-PERMISSIONED — Open, decentralized networks where anyone can join, transact and validate transactions without prior approval — Ideal for broad participation and innovation but with variable performance and limited default privacy— Networks open to selected, vetted participants, typically regulated entities — Blend decentralization with controlled governance, providing viewability, high performance and regulatory alignment— Fully controlled and centralized networks with restricted access to pre-approved participants — Optimized for high performance, confidentiality, regulatory compliance and internal institutional use cases
Ask AI what this page says about a topic: