Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

Financial Risk Management for Cryptocurrencies
Financial Risk Management for Cryptocurrencies
Financial Risk Management for Cryptocurrencies
Ebook212 pages1 hour

Financial Risk Management for Cryptocurrencies

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This book explores the emerging field of risk management and risk analysis of cryptocurrencies, an area that has been generating considerable research. It begins by providing an introduction to digital finance and the concept of cryptocurrencies and blockchain technologies. It then describes in detail the intrinsic risks involved in cryptocurrencies, an area that, to date, has not been fully documented or investigated. Lastly, it discusses the various types of risk, with a focus on design, operational, market and quantitative risks.
Providing insights into the analysis and management of cryptocurrencies, and serving as a starting point for a more in-depth risk analysis, this book will appeal to professionals and researchers interested in familiarizing themselves with the risks in cryptocurrencies, including academics, portfolio managers, risk-managers, quants, financial professionals, regulators, economists, asset managers and traders.
LanguageEnglish
PublisherSpringer
Release dateSep 20, 2020
ISBN9783030510930
Financial Risk Management for Cryptocurrencies

Related to Financial Risk Management for Cryptocurrencies

Related ebooks

Mathematics For You

View More

Related articles

Reviews for Financial Risk Management for Cryptocurrencies

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Financial Risk Management for Cryptocurrencies - Eline Van der Auwera

    Part IIntroduction to Cryptocurrencies

    © The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

    E. Van der Auwera et al.Financial Risk Management for CryptocurrenciesSpringerBriefs in Financehttps://doi.org/10.1007/978-3-030-51093-0_1

    1. Blockchain

    Eline Van der Auwera¹ , Wim Schoutens², Marco Petracco Giudici³ and Lucia Alessi⁴

    (1)

    Department of Finance, Accounting and Tax, KU Leuven, Brussel, Belgium

    (2)

    Department of Mathematics, KU Leuven, Heverlee, Belgium

    (3)

    Joint Research Centre - IPSC - G09, European Commission, Ispra, Italy

    (4)

    Joint Research Center, European Commission, Ispra, Italy

    Abstract

    In 2008, the world was introduced to a new concept: Bitcoin. Although it took several years to become known among a broad public, it is considered to be a revolutionary idea. This section gives a broad overview of the Blockchain technology behind Bitcoin.

    Keywords

    BlockchainHash pointersHash algorithmDistributed ledgerConsensus protocolProof of workProof of stakeByzantine fault toleranceDelegated proof of stake

    In 2008, the world was introduced to a new concept: Bitcoin (Satoshi 2008). Although it took several years to become known among a broad public, it is considered to be a revolutionary idea. Actually, Satoshi (2008), the proclaimed inventor of Bitcoin, never intended to create a digital currency, he merely wanted to develop a peer-to-peer electronic cash system.

    Cryptocurrencies are a side-product of digital cash. In the nineties, many people have tried but failed to create a decentralized digital cash system (BlockGeeks 2019). The newly introduced blockchain technology makes this decentralisation now possible; the fact that information is distributed and not copied, is exactly what makes blockchain technology so revolutionary. Regular currencies, like Euro or Dollar, only work because people trust the currency and double spending is annihilated through a central authority. This trust is ensured by governments and laws. Cryptocurrencies actually do not need such trust anymore, they rely on cryptographic proof. Moreover, cryptocurrencies promise its users to some extent anonymity. In addition, no government interference is needed anymore.

    Cryptocurrencies are mathematically protected digital currencies that are maintained by a network of peers. Digital signatures authorize individual transactions and ownership is passed via transaction chains. The ordering of the transactions is protected in the blockchain. By requiring difficult mathematical problems to be solved within each block, the attackers are racing against the rest of the network to solve computationally difficult problems, they are unlikely to win.

    1.1 Blockchain in a Nutshell

    Blockchain is a way of recording information on lots of devices, all at once, through the internet. The basic process of blockchain is as follows (Lisk 2018). Suppose someone makes a transaction, this transaction must then be included on the blockchain. A transaction can include a cryptocurrency exchange, contracts, records or any kind of transfer of information. The requested transaction is then broadcasted to a worldwide peer-to-peer network consisting of computers, also known as nodes. These nodes have to verify the transaction as legitimate as well as the user’s status by means of known algorithms. All the nodes perform the same activities and they all store a copy of the ledger. Once consensus between the nodes is reached, it becomes part of a block of data which contains other transactions on the ledger. If the block is complete, it competes with other blocks to become the next block of the existing blockchain. Once the block is attached and secured using cryptography, it is permanent and unalterable.

    A blockchain can be viewed as a spreadsheet duplicated thousands of times across a worldwide network of computers. This spreadsheet is regularly updated, such that new transactions can become part of the spreadsheet. The decentralized part of blockchain is a consequence of the fact that the system constitutes of a worldwide peer-to-peer network and therefore multiple locations store the same information. Thus, it ensures that the information is easily verifiable and public. As a result, the information on the blockchain is hard to corrupt. It would need a massive amount of computer power to alter the recordings. The name blockchain actually comes from the way data is stored, namely blocks hold information and are thoroughly linked by chains.

    Each block in the blockchain contains transactions, a time stamp, a digital signature to identify the account who did the recording and a unique identifying link. This link, usually created by hashing, will point to the previous block in the chain and ensures that information is unalterable. Therefore, blocks further down the chain are more secured than more recent blocks because many other blocks point to it.

    1.2 Network and Nodes

    Blockchain works peer-to-peer, there is no single central authority within the network. Information is constantly recorded and interchanged between all the participants. The users of the network are the backbone of the whole system, they trade a part of their computing resources to keep the network running. In some cases participants have the opportunity to collect transaction fees or rewards in exchange for the computing power. Nodes can have different roles in the network (Lisk 2018). Full nodes, or miners, are permanently connected and store the entire blockchain, they verify and propagate the activities and blocks in the network (S 2018). Simple payment verification (SPV) nodes, on the other hand, do not store the entire blockchain. Therefore, they rely on full nodes to receive and propagate transactions throughout the network. SPV nodes basically download the transactions which are significant for them (Satoshi 2008). All nodes are considered equal although some have different tasks. The basic tasks of a node are:

    Check the validity of transactions and add them to existing blocks or simply reject them.

    Save and store blocks of transactions.

    Broadcast and spread the transaction history to other nodes to secure synchronicity.

    A user who is interested in full autonomy and authority should run a full node. Note that depending on the consensus algorithm, the requirements to own a node may be different.

    Nodes form a random graph in the sense that a random node is connected to other random nodes (Javarone and Wright 2018), like Fig. 1.1c. All nodes are interconnected in order to verify the transactions and receive them, unlike in Fig. 1.1a, b.

    ../images/494325_1_En_1_Chapter/494325_1_En_1_Fig1_HTML.png

    Fig. 1.1

    Different types of graphs. (a) Decentralized. (b) Centralized. (c) Distributed ledger

    Nodes are able to come and go to the network in order to allow for a flexible and dynamic system. An active (online) node which goes offline, is forgotten after a predetermined amount of time to ensure a smooth working system. On the other hand, when an offline node comes back, it needs to get back up to speed. The node has to download all the blocks that were added to the blockchain while the node was offline. Theoretically, a single node can keep the blockchain afloat, however, the network would then be highly vulnerable to corruption.

    A new transaction is propagated through the network by moving over all the connections between the nodes. Eventually every node is connected to all the nodes in the network by using its peers. Once a node receives a transaction, it checks the senders righteousness and if the money has not yet been spent. Afterwards, the node sends the information to its peers until the whole network knows about the transaction. The time it takes for a whole block of transaction to go through the whole network can be quite long, this algorithm is called the flooding algorithm . For example, for Bitcoin the probability density function is shown in Fig. 1.2 (Narayanan et al. 2016). Double spending is avoided because only the transaction which links first to a certain unspent transaction, is processed. A node will also reject an unusual script. Moreover, nodes, who act dishonest, will be punished. An example of a punishment is reclaiming the award for blocks received in the past (Drescher 2017).

    ../images/494325_1_En_1_Chapter/494325_1_En_1_Fig2_HTML.png

    Fig. 1.2

    Probability density function of the time until the next block is mined in Bitcoin. The dotted line represents the 10 min time point

    A new block needs to follow the same rules to get its place in the blockchain as transactions. However, it also needs to obey a consensus criterion, which validates if all the transactions in the block are righteous and if the block is built on the current longest chain.

    1.3 Cryptographic Algorithm

    Cryptography is the method of disguising and revealing information by using mathematics (Lisk 2018). In blockchain technology, cryptography is used with a dual purpose. First, it ensures that the identity of the practitioners is hidden and second it assures that information is secured as well as the transactions.

    The mostly used cryptography method, in case of cryptocurrencies and blockchain, is public-key cryptography (Lisk 2018) . This method allows information to be passed alongside with the public key while the private key stays with the sender. Two different keys encrypt and decrypt the information, the sender’s public and private key encrypt the information, while the private key of the receiver together with the sender his public key are used for decryption. Every transaction initiates the key generation algorithm which creates a new public and private key for the sender. Moreover, the public-private-key encryption algorithm places a digital signature on a hashed digest to ensure its integrity, the hashed digest is a product of the hashing algorithm performed on the data, see Fig. 1.3. The document itself, together with the private key of the user, is used to construct the signature. Hence, the signature will not match anymore if the data is altered. Moreover, the receiver of the data is able to verify the authenticity of the document by analyzing the digital signature and the data. The receiver uses the public key to decrypt the digital signature and the hash algorithm to scan the document. If both outcomes match, then the receiver knows that the content of the message is not corrupted in transit.

    ../images/494325_1_En_1_Chapter/494325_1_En_1_Fig3_HTML.png

    Fig. 1.3

    Creation of the hashed digest with the digital signature placed on it (Lisk 2019)

    1.3.1 Hash Algorithm

    The hashing algorithm takes an input of arbitrary length and transforms this by using mathematical transformations to an output of a fixed length. Bitcoin, in particular, uses SHA-256 hashing algorithm. This particular algorithm translates every transaction to an output of seemingly random numbers of 256 bits. The input, in general, can be a transaction or a document but it can even be a block of transactions. The algorithm is in some sense deterministic, because the same input will always generate the same output. It is almost impossible to determine the actual length of the input due to the fixed length of the hashed data. A good hashing function has the following five main properties (Su 2017):

    Deterministic: Changing one single

    Enjoying the preview?
    Page 1 of 1
    pFad - Phonifier reborn

    Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

    Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


    Alternative Proxies:

    Alternative Proxy

    pFad Proxy

    pFad v3 Proxy

    pFad v4 Proxy