Second, digital identity frameworks (such as those envisaged under eIDAS 2.0) are getting closer to reality. They are built on the same building blocks as ZK: verifiable credentials, selective disclosure and cryptographic attestations. That makes it far more realistic to issue portable “I passed KYC” or “I am not sanctioned” credentials that can be proven, not re-collected, across multiple services.

Third, supervisors are exploring privacy-enhancing technologies, including proof verification models.

What a proof-based compliance stack could look like

We already have live examples. ZK-enhanced proof-of-reserves is the best-known one: an exchange proves it has the assets to meet customer liabilities without revealing individual balances. That is a zero-knowledge assurance.

You can do the same for sanctions screening. Instead of sending the full identity every time, a wallet presents a proof that it was checked against the latest list at a specific time. The regulator, or a regulated VASP on the other side, runs a verifier node to confirm the proof is valid and up to date. It is important to note that ‘verifier nodes’ are a policy proposal that operate as an oversight infrastructure for supervisors to validate proofs without collecting bulk data.

You can also do it for segregation: a custodian proves that client assets are not co-mingled with house funds via a range or sum proof, without publishing the entire ledger. You can even layer this into smart contracts: transactions don’t execute unless the proof passes. That is “programmable compliance” – rules enforced at transaction time in ‘real time’, rather than afterwards.

For regulators, the key shift is from collecting raw data to verifying cryptographic evidence. They still get assurance, auditability and traceability when there is a legal basis to unmask. But they do not have to hold or process significant amounts of personal data by default, reducing both operational and legal risk.

Answering key questions

Regulators are already beginning to embrace targeted ZK pilots, ranging from verifiable proof-of-reserves to Travel Rule compliance that validates user attributes without exposing full datasets. As these primitives mature, they naturally scale into market-integrity controls, allowing firms to demonstrate they are within concentration and exposure limits through range and sum proofs without revealing underlying positions.

Critically, ZK is not a synonym for opacity; well-architected systems utilize selective disclosure via viewing or multi-party keys. This ensures that law enforcement access is narrow, provable and subject to due process rather than remaining universal and silent.

What regulators could require

To work across borders, we need standards: standard proof types (e.g., “not on sanctions list X as of date Y”), standard credential formats and standard verifier logic that can be inspected. That is how you avoid every exchange, wallet, or bank building its own version and creating unnecessary supervisory complexity for supervisors.

Concretely, regulators may benefit from six things:

  1. Outcomes over data (tell me what you proved, not everything you hold);
  2. Least-information proofs (prove only what is necessary for this obligation);
  3. Programmable checks (enforced at transaction time where appropriate);
  4. Strong data-availability and exit mechanisms (users can always confirm their balances and withdraw);
  5. Verifiable verifier logic (inspections, test vectors, audit logs);
  6. No generalized backdoors (disclosure only under lawful, narrow, logged processes).

Binance is a global exchange that already uses ZKPs for demonstrating reserves. Our proof-of-reserves (POR) system uses a Merkle tree – a cryptographic structure that condenses many account entries into a single “fingerprint” – together with zero-knowledge proofs to demonstrate that customer assets are fully backed without revealing individual balances. With each POR update, users can confirm that their balance is included in the tree, while ZKPs ensure that the overall totals are correct and that no negative or fake balances are included. The result is independent, privacy-preserving verification of reserves that builds trust without compromising personal data.

But this is bigger than one company. If we get this right, we can make financial compliance more precise, more respectful of privacy law, and easier to supervise.

This will take collaboration. Regulators will need to develop proof standards they accept; industry will need to align on, and incorporate the proof standards, and standard-setting bodies will ensure proof standards are interoperable across borders.

What success looks like

Success is when a user can prove legitimacy without oversharing; a bank, VASP, or exchange can meet AML/Travel Rule obligations with smaller data disclosures; a regulator can run a verifier node and get real-time assurance; and bad actors can be unmasked under clear, narrow, lawful conditions.

In short, assurance with less disclosure. As cyber risk rises, privacy laws evolve, and cross-border digital finance grows, moving from routine bulk data collection to verifiable proofs is a pragmatic upgrade to supervisory practice.

References to EU privacy law in this op-ed reflect the framework as of November 2025; the Commission’s Digital Omnibus proposals remain subject to change through the ordinary legislative process.

Note: The views expressed in this column are those of the author and do not necessarily reflect those of CoinDesk, Inc. or its owners and affiliates.

More For You

Ethereum

Regulated insurance and standardized benchmarks are pivoting staked ETH from a crypto experiment to a legitimate institutional yield asset.

About the Author

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Stories