Table of contents
The role of privacy in onchain systemsCore features and architecturePractical use casesUser benefitsAvailability and next stepsFrequently asked questions
Chainlink unveiled its Confidential Compute service on November 8, 2025, marking a step forward in addressing privacy challenges within blockchain technology. This new offering aims to enable private smart contracts across different blockchains, allowing institutions to process sensitive data without exposure. The service integrates with Chainlink’s existing tools to support confidential transactions and calculations, which could increase the appeal of onchain financing for larger players.
Speaking at the SmartCon 2025 event, Lorenz Breidenbach, head of research at Chainlink Labs, said: marked the role of Confidential Compute in bridging privacy gaps for institutional adoption. He explained that without robust privacy measures, bringing traditional banking and capital markets onto blockchains remains difficult, as companies need to protect customer information, trading strategies and operational details.
The Role of Privacy in Onchain Systems
Blockchains operate on the principles of transparency, where every transaction and smart contract is publicly verifiable. While this design promotes trust and open participation by eliminating the need for intermediaries, it also creates hurdles for financial institutions. Sensitive elements, such as business logic or customer data, pose risks in a fully open environment, which has slowed broader institutional involvement.
The co-founder of Chainlink has noted that privacy is a crucial element for the widespread use of cryptocurrency, highlighting its importance in unlocking mainstream applications. Traditional financial systems rely on confidentiality to maintain competitiveness and comply with regulations, from capital markets to derivatives trading. Without similar on-chain protections, tokenization of complex assets, such as private credit or fund allocations, becomes impractical as investor data or pricing terms can leak.
Confidential Compute attempts to solve these problems by combining privacy with the inherent verifiability of blockchain. It builds on previous innovations from Chainlink Labs, including technologies such as Town Crier And DECOto create a framework in which proprietary data is hidden during processing. This approach avoids the tradeoffs common with isolated, privacy-oriented blockchains or specialized cryptographic methods, which can limit interoperability or performance.
Core functions and architecture
Chainlink Confidential Compute works via the Chainlink Runtime Environment (CRE)an orchestration layer that manages workflows across blockchains and external systems. CRE handles data entry, API connections, compliance checks and cross-chain interactions, now enhanced with confidential computing to keep elements like business logic and external connectivity private throughout the process.
Two key innovations distinguish this architecture. First, decentralized secret management uses Chainlink Distributed Key Generation (DKG) and the Vault Decentralized Oracle Network (DON). Secrets, such as API credentials or proprietary data, are encrypted and distributed to independent node operators. When necessary for a workflow, nodes only provide decryption shares after verifying authorizations and attestations. The system ensures that no entity has access to the full secret, with the enclave discarding it immediately after use.
Second, the framework supports flexible execution of confidential workflows. Initially, it uses Trusted Execution Environments (TEEs) for efficient processing, isolating data at the hardware level to minimize computation overhead compared to methods such as secure multi-party computation or fully homomorphic encryption. Users can access only the necessary information on a need-to-know model, improving security without sacrificing speed. Future iterations plan to integrate other technologies, such as zero-knowledge proofs, as they progress, giving developers choices based on specific requirements.
Each workflow generates cryptographic attestations, which verify execution without revealing details. These can include encrypted data for auditors or regulators, adding layers of auditability while maintaining confidentiality. This end-to-end verifiability aligns with blockchain standards, allowing users to securely confirm operations.
Practical use cases
Chainlink Confidential Compute opens doors to various applications previously limited by privacy concerns. For example, it supports private transactions where details such as amounts or positions are hidden, enabling confidential value exchanges on-chain.
In tokenization of real-world assets (RWAs)institutions can bring instruments such as bonds or private credit pools onto blockchains without disclosing investor information or deal terms. This goes beyond simple assets such as treasury bills, to more complicated financial products that require discretion.
Data providers benefit from confidential data distribution, where proprietary information (benchmark indexes or valuations) is shared only with approved subscribers. Smart contracts can perform operations on this data without exposure, facilitating monetization and triggering automated actions such as token transactions.
Cross-chain interoperability increases privacy, enabling transactions between public and private blockchains without revealing data to node operators. Use cases include delivery versus payment settlements, where tokenized assets and stablecoins interact seamlessly across chains.
For identity and compliance, the service verifies credentials with existing providers without on-chain exposure. It can issue simple yes/no attestations or act as a recertification of credentials for efficient on-chain checks, supporting regulations such as KYC and AML while preserving user privacy.
Additionally, confidential API access handles sensitive interactions, such as payments or market feeds. Credentials are only decrypted within the TEE, used briefly and discarded, preventing leaks. This extends to complex scenarios such as processing encrypted credit card information for transactions.
Examples from the Chainlink ecosystem illustrate these possibilities. Partnerships with ANZ and ADDX have used similar privacy tools to enable cross-border tokenized asset access, with confidentiality needs met through private transactions.
Benefits for users
The service provides privacy-preserving connectivity, allowing users to integrate existing data and systems with blockchains without exposure. It works in public and private chains, avoids supplier lock-in and enables broad implementation.
Decentralized secret management reduces risk by exposing only minimal data per calculation. Verifiable computing, supported by multi-cloud setups and encryption, meets institutional security needs. Cryptographic attestations provide proof of proper execution and promote trust in private workflows.
Overall, these elements create a scalable foundation for onchain markets, combining privacy with performance and interoperability.
Availability and next steps
Early access to Chainlink Confidential Compute via CRE is scheduled for early 2026, with general availability later that year. Interested parties can white paper for technical details.
The architecture’s flexibility positions it for future improvements, integrating emerging privacy technologies as they mature.
By addressing privacy barriers, Confidential Compute contributes to the maturation of blockchain finance, potentially accelerating institutional participation through secure, verifiable tools.
Sources:
- Chainlink confidential calculation overview (Chainlink Blog): https://blog.chain.link/chainlink-confidential-compute/
- Confidential Compute whitepaper (Chainlink Research): https://research.chain.link/confidential-compute.pdf
- Chainlink Runtime Environment (CRE) Documentation: https://chain.link/chainlink-runtime-environment
- Town Crier Protocol (Chainlink Research): https://research.chain.link/town-crier.pdf
- DECO protocol (Chainlink research): https://research.chain.link/deco.pdf
