Financial Risk Management for Cryptocurrencies
()
About this ebook
Providing insights into the analysis and management of cryptocurrencies, and serving as a starting point for a more in-depth risk analysis, this book will appeal to professionals and researchers interested in familiarizing themselves with the risks in cryptocurrencies, including academics, portfolio managers, risk-managers, quants, financial professionals, regulators, economists, asset managers and traders.
Related to Financial Risk Management for Cryptocurrencies
Related ebooks
The Quantum Financial System Rating: 0 out of 5 stars0 ratingsBitcoin Blockchain A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsLiquidity A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsAsset Management Handbook: The Ultimate Guide to Asset Management Software, Appraisals and More Rating: 0 out of 5 stars0 ratingsI Don't Trust You: But Blockchain and Bitcoin Will Help Rating: 0 out of 5 stars0 ratingsCrisis Wasted?: Leading Risk Managers on Risk Culture Rating: 0 out of 5 stars0 ratingsThe Power of Datafication: Disruption, reconstruction and the rise of new business engines Rating: 0 out of 5 stars0 ratingsBlockchain In Insurance A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsData Privacy Fintech A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCorporate Debt Restructuring in Emerging Markets: A Practical Post-Pandemic Guide Rating: 0 out of 5 stars0 ratingsThe 1% Difference: Small Change-Big Impact Rating: 5 out of 5 stars5/5Demystifying IT: The Language of IT for the CEO Rating: 0 out of 5 stars0 ratings8 Steps Away From Becoming a Millionaire: Growth Series, #1 Rating: 0 out of 5 stars0 ratingsBlockchain Business Models A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsBlockchain in Oil and Gas A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsInformation Privacy A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsBlockchain Consortium The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsBlockchain in Marketing A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsPricing Audit A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsArchitecting Enterprise Blockchain Solutions Rating: 0 out of 5 stars0 ratingsBlockchain and Banking: How Technological Innovations Are Shaping the Banking Industry Rating: 0 out of 5 stars0 ratingsDelivery Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsStratégie: Business Intelligence & Analytics Rating: 0 out of 5 stars0 ratingsBlockchain Business A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsNew Frontiers of Sovereign Investment Rating: 0 out of 5 stars0 ratingsCentral Bank Digital Currencies: The Future of Money Rating: 0 out of 5 stars0 ratingsUnlocking The Secrets Of Bitcoin And Cryptocurrency: Crypto Currency Made Easy Rating: 1 out of 5 stars1/5
Mathematics For You
Quantum Physics for Beginners Rating: 4 out of 5 stars4/5Algebra - The Very Basics Rating: 5 out of 5 stars5/5My Best Mathematical and Logic Puzzles Rating: 4 out of 5 stars4/5Calculus Made Easy Rating: 4 out of 5 stars4/5What If?: Serious Scientific Answers to Absurd Hypothetical Questions Rating: 5 out of 5 stars5/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Algebra I Workbook For Dummies Rating: 3 out of 5 stars3/5Math Magic: How To Master Everyday Math Problems Rating: 3 out of 5 stars3/5Relativity: The special and the general theory Rating: 5 out of 5 stars5/5Mental Math Secrets - How To Be a Human Calculator Rating: 5 out of 5 stars5/5Basic Math & Pre-Algebra For Dummies Rating: 4 out of 5 stars4/5Pre-Calculus For Dummies Rating: 5 out of 5 stars5/5Real Estate by the Numbers: A Complete Reference Guide to Deal Analysis Rating: 0 out of 5 stars0 ratingsAlgebra II For Dummies Rating: 3 out of 5 stars3/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5The Golden Ratio: The Divine Beauty of Mathematics Rating: 5 out of 5 stars5/5Limitless Mind: Learn, Lead, and Live Without Barriers Rating: 4 out of 5 stars4/5Sneaky Math: A Graphic Primer with Projects Rating: 0 out of 5 stars0 ratingsStatistics: a QuickStudy Laminated Reference Guide Rating: 0 out of 5 stars0 ratingsBasic Math & Pre-Algebra Workbook For Dummies with Online Practice Rating: 4 out of 5 stars4/5Calculus For Dummies Rating: 4 out of 5 stars4/5How to Solve It: A New Aspect of Mathematical Method Rating: 4 out of 5 stars4/5The Little Book of Mathematical Principles, Theories & Things Rating: 3 out of 5 stars3/5Algebra I For Dummies Rating: 4 out of 5 stars4/5Intermediate Algebra Rating: 0 out of 5 stars0 ratingsMental Math: Tricks To Become A Human Calculator Rating: 5 out of 5 stars5/5Homework Helpers: Geometry Rating: 5 out of 5 stars5/5Geometry For Dummies Rating: 4 out of 5 stars4/5
Reviews for Financial Risk Management for Cryptocurrencies
0 ratings0 reviews
Book preview
Financial Risk Management for Cryptocurrencies - Eline Van der Auwera
Part IIntroduction to Cryptocurrencies
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2020
E. Van der Auwera et al.Financial Risk Management for CryptocurrenciesSpringerBriefs in Financehttps://doi.org/10.1007/978-3-030-51093-0_1
1. Blockchain
Eline Van der Auwera¹ , Wim Schoutens², Marco Petracco Giudici³ and Lucia Alessi⁴
(1)
Department of Finance, Accounting and Tax, KU Leuven, Brussel, Belgium
(2)
Department of Mathematics, KU Leuven, Heverlee, Belgium
(3)
Joint Research Centre - IPSC - G09, European Commission, Ispra, Italy
(4)
Joint Research Center, European Commission, Ispra, Italy
Abstract
In 2008, the world was introduced to a new concept: Bitcoin. Although it took several years to become known among a broad public, it is considered to be a revolutionary idea. This section gives a broad overview of the Blockchain technology behind Bitcoin.
Keywords
BlockchainHash pointersHash algorithmDistributed ledgerConsensus protocolProof of workProof of stakeByzantine fault toleranceDelegated proof of stake
In 2008, the world was introduced to a new concept: Bitcoin (Satoshi 2008). Although it took several years to become known among a broad public, it is considered to be a revolutionary idea. Actually, Satoshi (2008), the proclaimed inventor of Bitcoin, never intended to create a digital currency, he merely wanted to develop a peer-to-peer electronic cash system.
Cryptocurrencies are a side-product of digital cash. In the nineties, many people have tried but failed to create a decentralized digital cash system (BlockGeeks 2019). The newly introduced blockchain technology makes this decentralisation now possible; the fact that information is distributed and not copied, is exactly what makes blockchain technology so revolutionary. Regular currencies, like Euro or Dollar, only work because people trust the currency and double spending is annihilated through a central authority. This trust is ensured by governments and laws. Cryptocurrencies actually do not need such trust anymore, they rely on cryptographic proof. Moreover, cryptocurrencies promise its users to some extent anonymity. In addition, no government interference is needed anymore.
Cryptocurrencies are mathematically protected digital currencies that are maintained by a network of peers. Digital signatures authorize individual transactions and ownership is passed via transaction chains. The ordering of the transactions is protected in the blockchain. By requiring difficult mathematical problems to be solved within each block, the attackers are racing against the rest of the network to solve computationally difficult problems, they are unlikely to win.
1.1 Blockchain in a Nutshell
Blockchain is a way of recording information on lots of devices, all at once, through the internet. The basic process of blockchain is as follows (Lisk 2018). Suppose someone makes a transaction, this transaction must then be included on the blockchain. A transaction can include a cryptocurrency exchange, contracts, records or any kind of transfer of information. The requested transaction is then broadcasted to a worldwide peer-to-peer network consisting of computers, also known as nodes. These nodes have to verify the transaction as legitimate as well as the user’s status by means of known algorithms. All the nodes perform the same activities and they all store a copy of the ledger. Once consensus between the nodes is reached, it becomes part of a block of data which contains other transactions on the ledger. If the block is complete, it competes with other blocks to become the next block of the existing blockchain. Once the block is attached and secured using cryptography, it is permanent and unalterable.
A blockchain can be viewed as a spreadsheet duplicated thousands of times across a worldwide network of computers. This spreadsheet is regularly updated, such that new transactions can become part of the spreadsheet. The decentralized part of blockchain is a consequence of the fact that the system constitutes of a worldwide peer-to-peer network and therefore multiple locations store the same information. Thus, it ensures that the information is easily verifiable and public. As a result, the information on the blockchain is hard to corrupt. It would need a massive amount of computer power to alter the recordings. The name blockchain actually comes from the way data is stored, namely blocks hold information and are thoroughly linked by chains.
Each block in the blockchain contains transactions, a time stamp, a digital signature to identify the account who did the recording and a unique identifying link. This link, usually created by hashing, will point to the previous block in the chain and ensures that information is unalterable. Therefore, blocks further down the chain are more secured than more recent blocks because many other blocks point to it.
1.2 Network and Nodes
Blockchain works peer-to-peer, there is no single central authority within the network. Information is constantly recorded and interchanged between all the participants. The users of the network are the backbone of the whole system, they trade a part of their computing resources to keep the network running. In some cases participants have the opportunity to collect transaction fees or rewards in exchange for the computing power. Nodes can have different roles in the network (Lisk 2018). Full nodes, or miners, are permanently connected and store the entire blockchain, they verify and propagate the activities and blocks in the network (S 2018). Simple payment verification (SPV) nodes, on the other hand, do not store the entire blockchain. Therefore, they rely on full nodes to receive and propagate transactions throughout the network. SPV nodes basically download the transactions which are significant for them (Satoshi 2008). All nodes are considered equal although some have different tasks. The basic tasks of a node are:
Check the validity of transactions and add them to existing blocks or simply reject them.
Save and store blocks of transactions.
Broadcast and spread the transaction history to other nodes to secure synchronicity.
A user who is interested in full autonomy and authority should run a full node. Note that depending on the consensus algorithm, the requirements to own a node may be different.
Nodes form a random graph in the sense that a random node is connected to other random nodes (Javarone and Wright 2018), like Fig. 1.1c. All nodes are interconnected in order to verify the transactions and receive them, unlike in Fig. 1.1a, b.
../images/494325_1_En_1_Chapter/494325_1_En_1_Fig1_HTML.pngFig. 1.1
Different types of graphs. (a) Decentralized. (b) Centralized. (c) Distributed ledger
Nodes are able to come and go to the network in order to allow for a flexible and dynamic system. An active (online) node which goes offline, is forgotten after a predetermined amount of time to ensure a smooth working system. On the other hand, when an offline node comes back, it needs to get back up to speed. The node has to download all the blocks that were added to the blockchain while the node was offline. Theoretically, a single node can keep the blockchain afloat, however, the network would then be highly vulnerable to corruption.
A new transaction is propagated through the network by moving over all the connections between the nodes. Eventually every node is connected to all the nodes in the network by using its peers. Once a node receives a transaction, it checks the senders righteousness and if the money has not yet been spent. Afterwards, the node sends the information to its peers until the whole network knows about the transaction. The time it takes for a whole block of transaction to go through the whole network can be quite long, this algorithm is called the flooding algorithm . For example, for Bitcoin the probability density function is shown in Fig. 1.2 (Narayanan et al. 2016). Double spending is avoided because only the transaction which links first to a certain unspent transaction, is processed. A node will also reject an unusual script. Moreover, nodes, who act dishonest, will be punished. An example of a punishment is reclaiming the award for blocks received in the past (Drescher 2017).
../images/494325_1_En_1_Chapter/494325_1_En_1_Fig2_HTML.pngFig. 1.2
Probability density function of the time until the next block is mined in Bitcoin. The dotted line represents the 10 min time point
A new block needs to follow the same rules to get its place in the blockchain as transactions. However, it also needs to obey a consensus criterion, which validates if all the transactions in the block are righteous and if the block is built on the current longest chain.
1.3 Cryptographic Algorithm
Cryptography is the method of disguising and revealing information by using mathematics (Lisk 2018). In blockchain technology, cryptography is used with a dual purpose. First, it ensures that the identity of the practitioners is hidden and second it assures that information is secured as well as the transactions.
The mostly used cryptography method, in case of cryptocurrencies and blockchain, is public-key cryptography (Lisk 2018) . This method allows information to be passed alongside with the public key while the private key stays with the sender. Two different keys encrypt and decrypt the information, the sender’s public and private key encrypt the information, while the private key of the receiver together with the sender his public key are used for decryption. Every transaction initiates the key generation algorithm which creates a new public and private key for the sender. Moreover, the public-private-key encryption algorithm places a digital signature on a hashed digest to ensure its integrity, the hashed digest is a product of the hashing algorithm performed on the data, see Fig. 1.3. The document itself, together with the private key of the user, is used to construct the signature. Hence, the signature will not match anymore if the data is altered. Moreover, the receiver of the data is able to verify the authenticity of the document by analyzing the digital signature and the data. The receiver uses the public key to decrypt the digital signature and the hash algorithm to scan the document. If both outcomes match, then the receiver knows that the content of the message is not corrupted in transit.
../images/494325_1_En_1_Chapter/494325_1_En_1_Fig3_HTML.pngFig. 1.3
Creation of the hashed digest with the digital signature placed on it (Lisk 2019)
1.3.1 Hash Algorithm
The hashing algorithm takes an input of arbitrary length and transforms this by using mathematical transformations to an output of a fixed length. Bitcoin, in particular, uses SHA-256 hashing algorithm. This particular algorithm translates every transaction to an output of seemingly random numbers of 256 bits. The input, in general, can be a transaction or a document but it can even be a block of transactions. The algorithm is in some sense deterministic, because the same input will always generate the same output. It is almost impossible to determine the actual length of the input due to the fixed length of the hashed data. A good hashing function has the following five main properties (Su 2017):
Deterministic: Changing one single