Abstract
We present an interesting new protocol where participants in a securities exchange may submit cryptographically encrypted rules directly to an exchange rather than orders to buy and sell. We define this in two parts: a secure, partially trusted computer that runs the exchange and proves its actions correct, and a set of participants who define the rules and submit them to the exchange. At each “tick” of the exchange, market prices are taken from the national market system, all submitted rules are evaluated, with any resulting trades executed at market prices. Cryptography reduces information leakage, masks participants’ intent, and provides for verification. A cryptographic audit trail proves that all transactions executed by the exchange are according to a set of published exchange rules and the encrypted trading rules.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bogetoft, P., Damgård, I., Jakobsen, T., Nielsen, K., Pagter, J., Toft, T.: A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 142–147. Springer, Heidelberg (2006)
Boudot, F.: Efficient Proofs that a Committed Number Lies in an Interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431–444. Springer, Heidelberg (2000)
Bunge, J.: ’dark pool’ settlement shines light on potential abuses. The Wall Street Journal (October 25, 2011)
Coron, J.-S., Mandal, A., Naccache, D., Tibouchi, M.: Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 487–504. Springer, Heidelberg (2011)
Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-key System. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169–178 (2009)
Gentry, C., Halevi, S.: Implementing Gentry’s Fully-Homomorphic Encryption Scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)
Harris, L.: Trading and Exchanges. Oxford University Press (2003)
Johnson, J., Tabb, L.: Groping in the dark: Navigating crossing networks and other dark pools of liquidity (January 31, 2007)
Kaufman, E.E., Levin, C.M.: Preventing the next flash crash. The New York Times (May 5, 2011)
Keim, D.B., Madhavan, A.: The upstairs market for large-block transactions: Analysis and measurement of price effects. Review of Finacial Studies 9, 1–36 (1996)
Kiayias, A., Yung, M.: Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 311–325. Springer, Heidelberg (2006)
Madhavapeddy, A., Singh, S.: Reconfigurable data processing for clouds. In: Proc. IEEE 19th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), May 1-3 (2011)
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–239. Springer, Heidelberg (1999)
Parkes, D.C., Rabin, M.O., Shieber, S.M., Thorpe, C.A.: Practical secrecy-preserving, verifiably correct and trustworthy auctions. In: Electronic Commerce Research and Applications (2008) (to appear)
Rabin, M.O., Servedio, R.A., Thorpe, C.: Highly efficient secrecy-preserving proofs of correctness of computations and applications. In: Proc. IEEE Symposium on Logic in Computer Science (2007)
Szydlo, M.: Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 156–171. Springer, Heidelberg (2005)
Thorpe, C., Parkes, D.C.: Cryptographic Combinatorial Securities Exchanges. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 285–304. Springer, Heidelberg (2009)
Thorpe, C., Parkes, D.C.: Cryptographic Securities Exchanges. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 163–178. Springer, Heidelberg (2007)
U.S. CFTC and U.S. SEC. Findings Regarding the Market Events of May 6, 2010 (September 30, 2010)
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. Cryptology ePrint Archive, Report 2009/616 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thorpe, C., Willis, S.R. (2012). Cryptographic Rule-Based Trading. In: Keromytis, A.D. (eds) Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science, vol 7397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32946-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-32946-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32945-6
Online ISBN: 978-3-642-32946-3
eBook Packages: Computer ScienceComputer Science (R0)