Intent
Provide on-demand, scoped visibility into confidential trades and positions via threshold-controlled viewing keys and/or ZK proofs that answer regulator questions without revealing unnecessary information.Best for: Regulators need targeted visibility without blanket transparency. Enables least-privilege access with full audit trail.
Ingredients
Standards
- EAS (Ethereum Attestation Service): Access logging and disclosure audit trail
- Threshold cryptography: Multi-party key management (e.g., Shamir Secret Sharing, TSS)
- ZK predicate circuits: Answer specific queries with zero-knowledge proofs
Infrastructure
- Threshold KMS: Distributed key management system with M-of-N threshold signature scheme
- Policy engine: Evaluates disclosure requests against regulatory mandates and internal policies
- Proof generation service: Computes ZK proofs for predicate queries
Off-chain Components
- Request/approval workflow: Structured process for regulator disclosure requests
- Encrypted audit storage: Append-only log of all disclosure events
- Key rotation service: Periodic re-encryption of data with new keys
Protocol
Regulator Submits Scoped Request
Regulator specifies the scope of requested visibility:Request is cryptographically signed by authorized regulator representative.
Policy Engine Evaluates Request
Automated policy checks verify:
- Authorization: Is requestor an authorized regulator?
- Mandate: Does the cited legal mandate support this request?
- Scope: Is the requested scope reasonable and necessary?
- Precedent: Are there similar approved requests?
Log Disclosure Event via EAS
Create immutable attestation of disclosure:EAS provides:
- On-chain immutable record
- Public auditability of disclosure frequency
- Proof of proper authorization process
Guarantees
Least-Privilege Access
Least-Privilege Access
Regulators receive only the minimum information necessary:
- Scoped by account: Only specific addresses or identities
- Scoped by asset: Only specific ISINs or token contracts
- Scoped by time: Only specific date ranges
- Scoped by question: ZK proofs answer yes/no queries without raw data
| Scope Level | Regulator Sees | Regulator Does NOT See |
|---|---|---|
| Narrow | Single trade on 2026-01-15 | Other trades, account balance |
| Moderate | All trades in ISIN XYZ in January 2026 | Other assets, counterparty details |
| Broad | All activity for account 0x1234 in Q1 2026 | Other accounts, unrelated activity |
Revocable Access
Revocable Access
Time-limited keys auto-expire:
- No manual revocation required: Keys become invalid after expiry timestamp
- Granular expiry periods: 1 hour to 30 days based on use case
- Non-renewable: Expired keys cannot be extended; requires new request
- Forward secrecy: Key rotation ensures old keys cannot decrypt new data
Full Audit Trail
Full Audit Trail
Every disclosure is logged immutably:Demonstrates:
- Compliance with proportionality principles
- Audit frequency and scope
- Key lifecycle management
Zero-Knowledge Responses
Zero-Knowledge Responses
ZK proofs answer questions without revealing raw data:Example queries answerable with ZK proofs:
- Range checks: “Did account X transact more than €10M in January?”
- Proof reveals: Yes/No
- Proof does NOT reveal: Exact amount, number of trades, counterparties
- Existence proofs: “Did account X trade with sanctioned entity Y?”
- Proof reveals: Yes/No
- Proof does NOT reveal: Trade details, amounts, dates
- Statistical queries: “What is the average trade size for ISIN Z?”
- Proof reveals: Average amount
- Proof does NOT reveal: Individual trades, traders, full distribution
- Compliance checks: “Are all trades compliant with MiFID II rules?”
- Proof reveals: Yes/No, count of violations
- Proof does NOT reveal: Which trades, which rules, trader identities
Trade-offs
Key Custody Requirements
- Geographic distribution: Store key shares in different jurisdictions
- Hardware security modules (HSMs): Protect key material in tamper-resistant hardware
- Multi-signature governance: Require M-of-N authorities for key operations
- Regular audits: External verification of key custody practices
Proof Authoring Complexity
Creating ZK circuits for predicate queries requires:- Cryptography expertise: Understand circuit design and proof systems
- Testing rigor: Circuits must be audited for correctness and soundness
- Performance tuning: Complex queries may take minutes to prove
- User experience design: Abstract technical complexity from regulatory users
Key Rotation Overhead
Periodic key rotation requires re-encrypting historical data:Example Workflow
Scenario: BaFin Market Abuse Investigation
Policy Evaluation
Automated checks:
- ✅ BaFin is authorized regulator for German securities
- ✅ MAR Article 23 covers market manipulation investigations
- ✅ Date range is 31 days (within 90-day limit)
- ✅ ISIN scope is specific (not blanket request)
Internal Approval
Workflow routed to:
- Chief Compliance Officer → Approved
- Legal Counsel → Approved
View Key Generation
Threshold KMS assembles time-limited view key:
- Key scope: All trades in ISIN XS1234567890 from 2026-01-01 to 2026-01-31
- Expiry: 24 hours from issuance
- Decrypts: Trade details (amounts, counterparties, timestamps)
- Does NOT decrypt: Unrelated ISINs, trades outside date range
Security Considerations
Threshold Selection
| Threshold | Security | Availability | Best For |
|---|---|---|---|
| 2-of-3 | Moderate | High | Frequent disclosures, trusted authorities |
| 3-of-5 | High | Moderate | Balance security and operations |
| 5-of-7 | Very High | Lower | Maximum security, infrequent disclosures |
Authority Distribution
- Geographic diversity prevents single-jurisdiction seizure
- Multiple HSM vendors reduce supply chain risk
- Mix of internal/external authorities prevents insider threats
See Also
L2 Encrypted Off-chain Audit
How encrypted audit logs integrate with selective disclosure
L1 ZK Commitment Pool
On-chain privacy with selective disclosure
Modular Privacy Stack
Disclosure as a separate architectural layer
Hybrid Public-Private Modes
Selective privacy with disclosure mechanisms

