Trading Under the Proof-of-Stake Protocol – A Continuous-Time Control Approach
@article{Tang2022TradingUT, title={Trading Under the Proof-of-Stake Protocol – A Continuous-Time Control Approach}, author={Wenpin Tang and David D. Yao}, journal={SSRN Electronic Journal}, year={2022} }
. We develop a continuous-time control approach to optimal trading in a Proof-of-Stake (PoS) blockchain, formulated as a consumption-investment problem that aims to strike the optimal balance between a participant’s (or agent’s) utility from holding/trading stakes and utility from consumption. We present solutions via dynamic programming and the Hamilton-Jacobi-Bellman (HJB) equations. When the utility functions are linear or convex, we derive close-form solutions and show that the bang-bang…
References
SHOWING 1-10 OF 31 REFERENCES
Stability of shares in the Proof of Stake Protocol -- Concentration and Phase Transitions
- Computer Science, Mathematics
- 2022
A dynamical population model for the PoS protocol, which allows the number of investors to grow over the time is proposed and analyzed, and the thresholds for stability are characterized.
Evolution of Shares in a Proof-of-Stake Cryptocurrency
- Economics, MathematicsManag. Sci.
- 2021
Without trading, the investor shares in the cryptocurrency are martingales that converge to a well-defined limiting distribution and are stable in the long run and are robust to allowing trading when investors are risk neutral.
On the Financing Benefits of Supply Chain Transparency and Blockchain Adoption
- BusinessManag. Sci.
- 2020
We develop a theory that shows signaling a firm’s fundamental quality (e.g., its operational capabilities) to lenders through inventory transactions to be more efficient—it leads to less costly…
Mean Field Game Approach to Bitcoin Mining
- Computer Science, Mathematics
- 2020
An analysis of the Proof-of-Work consensus algorithm, used on the Bitcoin blockchain, using a Mean Field Game framework, and shows that in equilibrium the security of the underlying blockchain is either constant, or increases with the demand for the underlying cryptocurrency.
Blockchain Without Waste: Proof-of-Stake
- MathematicsThe Review of Financial Studies
- 2020
This paper provides the first formal economic model of the most famous alternative, Proof-of-Stake (PoS), and establishes conditions under which PoS generates consensus.
The Energy Footprint of Blockchain Consensus Mechanisms Beyond Proof-of-Work
- Computer Science2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C)
- 2021
This paper formalises a basic consumption model for PoS blockchains by applying it to six archetypal blockchains, and confirms the concerns around the energy footprint of PoW by showing that Bitcoin's energy consumption exceeds the energy consumption of all PoS-based systems analysed by at least three orders of magnitude.
The Economics of Cryptocurrencies – Bitcoin and Beyond
- Economics, Computer ScienceCanadian Journal of Economics/Revue canadienne d'économique
- 2022
The optimal design of cryptocurrencies is studied and quantitatively how well such currencies can support bilateral trade is assessed and it is pointed out that cryptocurrencies can potentially challenge retail payment systems provided scaling limitations can be addressed.
Pitfalls of Bitcoin’s Proof-of-Work: R&D Arms Race and Mining Centralization
- Computer Science
- 2020
A game theoretical model where firms invest in research and development before competing in a Bitcoin mining game shows that firms fail to capture the surplus created from their research, and quantitatively demonstrates that the mining industry has a tendency towards centralization.
A Mean Field Games Model for Cryptocurrency Mining
- Economics
- 2019
We propose a mean field game model to study the question of how centralization of reward and computational power occur in the Bitcoin-like cryptocurrencies. Miners compete against each other for…
Bitcoin: A Peer-to-Peer Electronic Cash System
- Computer Science
- 2008
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.