Skip to main content
Use Case Link: Private Bonds
High-level goal: Enable institutional bond issuance and trading on public blockchains with confidential amounts, positions, and trade details while maintaining regulatory compliance, DvP settlement, and economically viable operations.

Overview

Problem Interaction

Private bond trading addresses three interconnected challenges:

Market Protection

Hide volumes, prices, and positions to prevent front-running and competitive intelligence gathering

Regulatory Compliance

Provide selective disclosure capabilities for compliance (e.g., eWpG/MiCA) and crypto-registry integration

Settlement Efficiency

Ensure atomic delivery-versus-payment with predictable costs and daily settlement cycles
These problems interact because traditional bond trading requires transparent price discovery and settlement coordination, while institutional privacy needs conflict with public blockchain transparency. The solution requires privacy-preserving infrastructure that maintains market efficiency and regulatory oversight.

Key Constraints

  • Must comply with different regulations and crypto-registry requirements
  • Atomic DvP settlement with minutes-level finality acceptable
  • Pre-trade privacy for RFQ processes and order flow
  • Production timeline of 1-2 years with proven infrastructure
  • Same-chain atomic DvP acceptable; cross-chain DvP requires trusted relayer or bridging

TLDR for Different Personas

Execute bond issuance and trading privately on a fully automated, 24/7 market while maintaining regulatory compliance and operational efficiency
Arbitrage between turnkey solutions using familiar Solidity patterns or ramping up on ZK tooling for a tighter fit with privacy requirements; choose your level of abstraction from custom circuit implementation to coprocessor-based approaches

Architecture and Design Choices

Fundamental Choice: UTXO vs Account Model

ModelPrivacyHow it Works
Account-based (ERC-20)Bolted-onBalances public by default; privacy added via encryption wrappers or shielding pools
UTXO-based (Notes)NativeValue stored as hidden commitments; only nullifiers revealed on spend
Native Privacy L2NativePrivate state at protocol level (e.g., Aztec notes)
Recommendation: UTXO-based notes with zero-knowledge proofs provide privacy by default. This model is battle-tested (Zcash, Railgun) and scales with chain throughput. Compliance layers via selective disclosure rather than retrofitting onto transparent base.
Primary Pattern: Shielding with zero-knowledge circuits Supporting Patterns:

Core Components

  • Bonds as UTXO notes (commitments hide amount + owner)
  • JoinSplit circuits for transfers
  • Merkle tree + nullifier set

Why UTXO-Based Notes?

PoC implementations demonstrate UTXO’s advantages for institutional adoption:

Production Maturity

Railgun live since 2021 (Total volume > $4b) with mainnet deployments (vs testnet alternatives)

Strongest Privacy

Hides amounts, counterparties, AND addresses (through gas relayer)

Vendor Ecosystem

White-label solutions available (Paladin, Railgun) reduce implementation burden

Trade-off

More complex cryptographic model (ZK circuits) vs simpler account-based approaches, but vendors abstract this complexity

Alternative Architectures

  • Bonds as native private notes with protocol-level privacy
  • No shielding implementation overhead — private notes is part of the execution model
  • Compliance via private contracts and selective disclosure
  • Trade-off: Ecosystem maturity, unknown throughput
  • See: Privacy L2s, Aztec Network, Miden

Compliance

Regulatory Integration Models:
ApproachViewing Key ModelGranularityRevocation
UTXOPer-note keys via secure channelPer-note (custom)Can deny future access
Privacy L2Incoming Viewing Keys (IVKs)Account-levelCan deny future access
co-SNARKsMPC-based disclosureSimilar to UTXODepends on implementation
FHEACL grants (pull-based via Gateway)Per-balance (native)No revocation per ciphertext; requires re-grant on updates
Common Capabilities:

Whitelist Enforcement

KYC-approved addresses

Attestations

Verifiable compliance credentials

Proof of Innocence

Prove compliance without revealing details

Crypto-registry Verification

eWpG/MiCA compliance
Key Differences:
  • UTXO: Most flexible (per-note disclosure); requires trusted issuer for audit trail management
  • Privacy L2 (Aztec): IVKs enable account-level viewing; nullifier keys are app-siloed for damage containment; coarser granularity than UTXO per-note model
  • FHE: Per-balance ACL control; no revocation per ciphertext, but balance updates create new ciphertexts requiring re-grant; decryption pull-based via Gateway (must actively request)

Trade-offs and Comparison

Architecture Comparison

DimensionUTXO ShieldingPrivacy L2sco-SNARKs (MPC)FHE
Trust ModelMinimal (self-custody)Minimal (client-side ZK)Delegated (3-of-3 honest)Delegated (threshold decrypt)
Privacy StrengthAmounts + addressesAmounts + addressesAmounts onlyAmounts only
Cost per TransferHighLow (L2-internal)Low (batched)Medium
ThroughputChain-dependentUnknown (2026)~200 TPS500-1000 TPS (shared)
MaturityProductionTestnet/2026TestnetTestnet
Ops InfrastructureStandard EVMBridge/L2 nodeMPC networkThreshold network
Vendor EcosystemPaladin, RailgunAztec, MidenTACEOZama, Fhenix

Open Questions

  1. Multi-Asset Bond Support: How to efficiently implement bonds with multiple tranches, currencies, or collateral types within shielded note systems?
  2. Coupon Payment Mechanisms: What patterns enable automated, privacy-preserving coupon distribution to shielded bondholders?
  3. Cross-Chain Settlement: Beyond same-chain atomic DvP, what trust models are acceptable for cross-chain bond settlement?
  1. Secondary Market Structure: How to implement private RFQ systems while maintaining price discovery efficiency?
  2. Pre-Trade Privacy: What level of order flow privacy is required before execution vs post-trade confidentiality?
  3. Market Data & Analytics: How to provide bond pricing, yield curves, and market analytics while preserving transaction privacy?
  1. Regulatory Standards: Standardization of selective disclosure formats for eWpG/MiCA compliance across jurisdictions?
  2. Legacy Integration: Bridging between on-chain privacy and traditional bond settlement systems (Euroclear, etc.)?

Example Scenarios

Scenario: Corporation issues €100M bond series with private allocation amounts
  • Privacy: Investor allocations and pricing terms confidential
  • Compliance: Crypto-registry verification and regulator disclosure
  • Settlement: Atomic delivery of bond tokens vs EURC payment

Reference Implementation

Private Bond PoC

Three implementations: Custom UTXO, Aztec L2, Zama FHE
Maturity Status (Feb 2026):
  • UTXO (Production: Railgun)
  • Privacy L2s (Testnet/2026: Aztec Ignition, Miden)
  • co-SNARKs (Testnet: TACEO Base/Arc)
  • FHE (Testnet: Zama, Fhenix)

Standards & Research

Vendor Solutions

Paladin, Railgun, Aztec, Miden, TACEO, Zama, Fhenix

Related Patterns

Related Approaches

Build docs developers (and LLMs) love