Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
prediction-markets-and-information-theory
Blog

Why On-Chain Privacy and Scalability Are Currently Incompatible

A first-principles analysis of the fundamental trade-off between transaction privacy and network throughput, explaining why high-frequency markets cannot be both private and scalable with current ZK technology.

introduction
THE ZERO-SUM GAME

Introduction

The fundamental design of blockchains forces a direct trade-off between transaction privacy and network scalability.

Privacy requires computation overhead. Zero-knowledge proofs (ZKPs) and secure multi-party computation (MPC) add significant verification work for every private transaction, which directly consumes the finite computational budget of a block.

Scalability demands data compression. Layer 2 solutions like Arbitrum and Optimism batch transactions to reduce on-chain load, but their fraud proofs or validity proofs require all transaction data to be publicly available for verification, destroying privacy.

The base layer is the bottleneck. Even privacy-focused chains like Aztec or Monero hit throughput ceilings because their cryptographic primitives (e.g., zk-SNARKs, ring signatures) are computationally intensive, making them incompatible with high-throughput, data-available designs like Celestia.

Evidence: A private token transfer on Aztec consumes ~10x more gas than a public one on Ethereum, and its network processes orders of magnitude fewer transactions per second than a transparent rollup like StarkNet.

thesis-statement
THE ZERO-SUM GAME

The Core Conflict: Proof Generation vs. State Updates

Privacy and scalability are locked in a zero-sum game because the cryptographic proofs that enable one directly conflict with the state updates required for the other.

Privacy requires proof generation. Protocols like Aztec and Aleo execute transactions off-chain and submit validity proofs (ZK-SNARKs) to the L1, hiding all data. This creates a verification bottleneck as the L1 must process a computationally heavy proof for every private state update, limiting throughput.

Scalability requires state updates. Optimistic Rollups like Arbitrum and Optimism post compressed transaction data (calldata) on-chain, allowing anyone to recompute the chain's state. This public data availability is the foundation for fast, cheap transactions but destroys all privacy by design.

The trade-off is absolute. You cannot have a private, scalable L2 today. A ZK-Rollup like zkSync must choose: publish full state diffs for scalability (like StarkNet) and lose privacy, or hide data with proofs and sacrifice throughput. Validity proofs and data availability are mutually exclusive.

Evidence: Aztec, a leading private rollup, shut down its public DeFi bridge because the cost of generating ZK proofs for simple transfers made it economically non-viable at scale, demonstrating the real-world cost of this conflict.

ON-CHAIN PRIVACY TRADEOFFS

The Performance Penalty: Private vs. Public Transaction Benchmarks

Quantifying the scalability and cost overhead of privacy-preserving transactions versus standard public execution on leading L1/L2 platforms.

Metric / FeaturePublic Transaction (Baseline)zk-SNARK Privacy (e.g., Aztec, Zcash)TEE-Based Privacy (e.g., Oasis, Secret Network)Mixer / CoinJoin (e.g., Tornado Cash)

Throughput (Max TPS)

~50,000 (Solana)

~300 (Aztec Connect)

~1,000 (Oasis)

~15 (Tornado Cash on Ethereum)

Latency (Finality)

< 2 sec (Optimism)

~20 min (Zcash block + proving)

< 6 sec (Oasis)

~12 min (Ethereum block time)

Cost Overhead (Gas Multiplier)

1x

100x - 1000x

5x - 10x

1.5x - 3x

State Growth (Per TX)

~100 bytes

~10 KB (proof + note)

~500 bytes (encrypted)

~200 bytes (anonymity set)

Trust Assumptions

Code is law

Trusted setup (some circuits), math

Hardware manufacturer (Intel SGX)

Anonymity set size, no theft

Programmability

Turing-complete (EVM, SVM)

Limited circuit logic

Turing-complete within secure enclave

Deposit/Withdraw only

Cross-Chain Composability

Native (Layer 2s, IBC)

Bridges required (zk.money)

Bridges required

Bridges required (often centralized)

Regulatory Attack Surface

Transparent ledger

Proof validity, compliance tools

TEE compromise, legal pressure

Anonymity set poisoning, OFAC sanctions

deep-dive
THE ZERO-SUM GAME

The Scalability-Privacy Tradeoff

Current scaling architectures fundamentally leak data, making true on-chain privacy impossible without sacrificing performance.

Data Availability is the enemy of privacy. Layer 2s like Arbitrum and Optimism publish all transaction data to Ethereum for security, creating a permanent, public record. This public data availability is incompatible with protocols like Aztec or Zcash that require data to be hidden to function.

Provers become centralized bottlenecks. Validity proofs (ZKPs) for private transactions are computationally intensive. Scaling this process requires centralized prover networks, reintroducing the trust assumptions that decentralization aims to eliminate. This creates a direct tradeoff between throughput and censorship resistance.

Shared sequencers leak metadata. Networks using shared sequencers (like Espresso or Astria) for scalability batch transactions from many users. The sequencer sees the plaintext origin, destination, and timing of every private transaction, creating a massive metadata vulnerability that breaks privacy guarantees.

Evidence: Tornado Cash, a privacy tool on Ethereum, was neutralized not by breaking its cryptography, but by analyzing the public data patterns on-chain. This proves that any system relying on public data availability for scaling is inherently vulnerable to chain analysis.

protocol-spotlight
THE SCALABILITY-PRIVACY TRILENMA

Case Studies in Compromise: How Protocols Navigate the Trade-Off

Zero-knowledge proofs and optimistic rollups promise both, but real-world deployments reveal a fundamental tension between throughput, cost, and anonymity.

01

Aztec's ZK-Rollup: Privacy at a Price

Aztec Network built a fully private L2 using ZK-SNARKs, but its architecture reveals the core trade-off. Every private transaction requires a complex proof, making it computationally expensive and slow compared to transparent alternatives like Arbitrum or Optimism.

  • Key Benefit: Full transaction privacy (sender, receiver, amount).
  • Key Trade-off: ~10-100x higher gas cost per private action versus public L2s.
  • Key Trade-off: Limited throughput due to proof generation bottlenecks.
10-100x
Higher Cost
~20 TPS
Peak Capacity
02

Tornado Cash: The Privacy Pool Compromise

Tornado Cash offered strong on-chain privacy via deposit/withdraw anonymity sets, but its architecture is inherently unscalable. Each mix requires multiple on-chain transactions, creating high fixed costs and latency, making it unsuitable for high-frequency DeFi.

  • Key Benefit: Strong anonymity for asset origin obfuscation.
  • Key Trade-off: Non-scalable model: each user action is a separate, costly L1 transaction.
  • Key Trade-off: Poor composability; private assets are siloed from transparent DeFi apps.
L1 Gas
Per Tx Cost
Minutes
Withdrawal Time
03

zkSync & Scroll: Scaling Wins, Privacy Loses

General-purpose ZK-Rollups like zkSync Era and Scroll optimize for scalability and EVM-equivalence, sacrificing native privacy. They batch thousands of transparent transactions into a single proof, achieving ~2,000+ TPS but leaving all data publicly visible on L1.

  • Key Benefit: High throughput and low cost for public transactions.
  • Key Trade-off: No default privacy; all user activity is transparent and analyzable.
  • Key Compromise: Privacy must be added as an optional, application-layer feature (e.g., using ZKPs in a smart contract).
2k+ TPS
Theoretical Scale
$0.01-0.10
Tx Cost Target
04

The Layer 2 Dilemma: Data Availability is the Killer

True scalability for private systems is blocked by Data Availability (DA). Validiums like StarkEx keep data off-chain for scale but introduce trust assumptions. Full privacy requires hiding all data, which conflicts with the need for public DA to ensure security and permissionless verification.

  • Key Problem: Hiding transaction data (encryption/zk) removes public verifiability, requiring a trusted committee.
  • Key Trade-off: Choose: Public DA (scalable, transparent) vs. Private DA (limited, trusted).
  • Emerging Fix: Projects like Avail and Celestia explore DA layers, but privacy adds another layer of complexity.
Trusted
DA Committee
100x+
Throughput Gain
05

Penumbra & Namada: Application-Specific Privacy

These protocols avoid the general-purpose bottleneck by building privacy into specific application domains. Penumbra is a private DEX for Cosmos, and Namada is a multi-chain privacy layer. They achieve better performance by limiting scope but sacrifice universal composability.

  • Key Benefit: Efficient, scalable privacy for a defined use case (e.g., trading, shielding).
  • Key Trade-off: Not a general-purpose chain; privacy is siloed within the protocol's own state.
  • Key Trade-off: Interoperability with the broader transparent ecosystem remains a challenge.
Domain-Specific
Architecture
~1s
Swap Finality
06

The Future: Hybrid Networks & ZK Coprocessors

The endgame isn't a single chain doing both. The compromise is architectural separation: a scalable, transparent settlement layer (Ethereum L1, Celestia) paired with dedicated privacy layers (Aztec, Polygon Miden) or ZK coprocessors (like RISC Zero) that compute private proofs off-chain. Privacy becomes a scalable service, not a chain property.

  • Key Solution: Decouple execution (private) from settlement & DA (public).
  • Key Benefit: Enables modular scaling; each layer optimizes for one property.
  • Key Challenge: Complex cross-layer communication and liquidity fragmentation.
Modular
Stack Design
Service
Privacy Model
counter-argument
THE HARDWARE HYPE

Steelman: "ZK Hardware Acceleration Solves Everything"

The argument that specialized hardware will universally solve on-chain privacy and scalability is a seductive but flawed oversimplification.

Proving cost is the bottleneck. ZK-SNARKs and ZK-STARKs require massive computational power to generate proofs, making private transactions prohibitively expensive without hardware acceleration from firms like Ingonyama or Cysic.

Hardware accelerates, not abstracts. ASICs and GPUs lower the cost per proof but do not eliminate the fundamental trade-off: privacy requires more computation. A shielded transaction on Aztec will always be heavier than a public one on Arbitrum.

Scalability demands data availability. Hardware speeds up execution proofs for rollups like zkSync, but scalability is gated by data publishing. A 100k TPS ZK-rollup still requires 100k TPS of data on Ethereum or an alternative DA layer like Celestia.

Evidence: Even with hardware, a private transfer on a ZK-rollup costs ~$0.50, while a public one costs <$0.01. The overhead for privacy is a 50x multiplier that hardware reduces but cannot erase.

takeaways
THE PRIVACY-SCALE TRADEOFF

TL;DR for Builders and Investors

Zero-knowledge proofs promise both privacy and scalability, but current implementations force a painful architectural choice.

01

The Problem: Public Data is a Scaling Asset

Layer 2s like Arbitrum and Optimism scale by compressing and batching public transaction data to Ethereum. This model relies on data availability for security and fraud proofs. Private transactions, by definition, cannot be compressed or verified in this way, breaking the core scaling mechanism.

  • Key Constraint: Private data cannot be posted to a public data availability layer like Ethereum calldata or Celestia.
  • Result: Forces a choice: scale publicly or process privately at L1 cost.
-99%
Cost Benefit Lost
L1 Cost
Fallback
02

The Solution: ZKPs with Private Mempools

Protocols like Aztec and Penumbra use zero-knowledge proofs to create private state transitions, but must run their own sequencers and mempools. Scaling requires building an entire parallel, privacy-preserving execution and settlement stack, which fragments liquidity and composability.

  • Architecture: Requires a dedicated zkVM (e.g., Noir) and a private mempool for transaction ordering.
  • Trade-off: Achieves privacy but sacrifices the network effects and shared security of a public L2 like zkSync or Starknet.
Isolated
Liquidity
Full Stack
Overhead
03

The Hybrid Approach: Privacy as a Layer 3

The emerging model is to build application-specific Layer 3s or zk-co-processors on top of scalable L2s. The L2 handles public, cheap settlement, while the L3 manages private computation via ZKPs. This is the path for Fhenix (FHE) and specialized privacy apps.

  • Mechanics: Private state is proven and settled on a public L2, inheriting its security and liquidity.
  • Limitation: Still early; introduces complexity and latency for cross-layer messaging.
L2 Security
Inherits
~2s+
Added Latency
04

The Verifier's Dilemma: Proving Cost vs. Throughput

Generating a ZKP for a private transaction is computationally intensive (~500ms-2s). Batching proofs for scale (as Scroll or Polygon zkEVM do) is impossible if the transactions' contents are private and unrelated. This creates a direct conflict: privacy increases per-tx proving cost, destroying the economies of scale that make L2s cheap.

  • Bottleneck: Private proofs are non-amortizable. Each proof is unique and costly.
  • Metric: Throughput is capped by the proving time of a single, complex private transaction.
10-100 TPS
Max (Private)
1000+ TPS
Max (Public)
05

The Investor Lens: Market Size vs. Technical Debt

Investing in on-chain privacy infra is a bet on regulated DeFi and institutional adoption. However, the technical debt is immense—you're funding R&D for cryptography, distributed systems, and novel VM design. Contrast with investing in a general-purpose L2, which is a bet on broader adoption of existing public blockchain use cases.

  • Opportunity: The ~$10B+ private payments and institutional finance market.
  • Risk: Building a full-stack alternative to Ethereum's execution layer with a fraction of the developer mindshare.
$10B+
Addressable Market
High
R&D Burn
06

The Builder's Playbook: Start with Selective Privacy

Full-chain privacy is a trap. The viable path is selective privacy for specific actions (e.g., shielded voting, private bids on Uniswap). Use existing ZK toolkits (zkSNARKs, zkSTARKs) to create privacy features that settle on public L2s. This avoids the scalability cliff while delivering real user value.

  • Tactic: Use ZKPs for specific functions, not the entire VM state.
  • Examples: Tornado Cash for assets, Semaphore for identity, Aztec Connect for DeFi (deprecated).
Modular
Integration
L2 Native
Scalability
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Why On-Chain Privacy and Scalability Are Incompatible | ChainScore Blog