Skip to main content

Cryptographic Rule-Based Trading

(Short Paper)

  • Conference paper
Financial Cryptography and Data Security (FC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7397))

Included in the following conference series:

Abstract

We present an interesting new protocol where participants in a securities exchange may submit cryptographically encrypted rules directly to an exchange rather than orders to buy and sell. We define this in two parts: a secure, partially trusted computer that runs the exchange and proves its actions correct, and a set of participants who define the rules and submit them to the exchange. At each “tick” of the exchange, market prices are taken from the national market system, all submitted rules are evaluated, with any resulting trades executed at market prices. Cryptography reduces information leakage, masks participants’ intent, and provides for verification. A cryptographic audit trail proves that all transactions executed by the exchange are according to a set of published exchange rules and the encrypted trading rules.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bogetoft, P., Damgård, I., Jakobsen, T., Nielsen, K., Pagter, J., Toft, T.: A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 142–147. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Boudot, F.: Efficient Proofs that a Committed Number Lies in an Interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431–444. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Bunge, J.: ’dark pool’ settlement shines light on potential abuses. The Wall Street Journal (October 25, 2011)

    Google Scholar 

  4. Coron, J.-S., Mandal, A., Naccache, D., Tibouchi, M.: Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 487–504. Springer, Heidelberg (2011)

    Google Scholar 

  5. Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-key System. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169–178 (2009)

    Google Scholar 

  7. Gentry, C., Halevi, S.: Implementing Gentry’s Fully-Homomorphic Encryption Scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Harris, L.: Trading and Exchanges. Oxford University Press (2003)

    Google Scholar 

  9. Johnson, J., Tabb, L.: Groping in the dark: Navigating crossing networks and other dark pools of liquidity (January 31, 2007)

    Google Scholar 

  10. Kaufman, E.E., Levin, C.M.: Preventing the next flash crash. The New York Times (May 5, 2011)

    Google Scholar 

  11. Keim, D.B., Madhavan, A.: The upstairs market for large-block transactions: Analysis and measurement of price effects. Review of Finacial Studies 9, 1–36 (1996)

    Article  Google Scholar 

  12. Kiayias, A., Yung, M.: Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 311–325. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Madhavapeddy, A., Singh, S.: Reconfigurable data processing for clouds. In: Proc. IEEE 19th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), May 1-3 (2011)

    Google Scholar 

  14. Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–239. Springer, Heidelberg (1999)

    Google Scholar 

  15. Parkes, D.C., Rabin, M.O., Shieber, S.M., Thorpe, C.A.: Practical secrecy-preserving, verifiably correct and trustworthy auctions. In: Electronic Commerce Research and Applications (2008) (to appear)

    Google Scholar 

  16. Rabin, M.O., Servedio, R.A., Thorpe, C.: Highly efficient secrecy-preserving proofs of correctness of computations and applications. In: Proc. IEEE Symposium on Logic in Computer Science (2007)

    Google Scholar 

  17. Szydlo, M.: Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 156–171. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Thorpe, C., Parkes, D.C.: Cryptographic Combinatorial Securities Exchanges. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 285–304. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  19. Thorpe, C., Parkes, D.C.: Cryptographic Securities Exchanges. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 163–178. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  20. U.S. CFTC and U.S. SEC. Findings Regarding the Market Events of May 6, 2010 (September 30, 2010)

    Google Scholar 

  21. van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. Cryptology ePrint Archive, Report 2009/616 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thorpe, C., Willis, S.R. (2012). Cryptographic Rule-Based Trading. In: Keromytis, A.D. (eds) Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science, vol 7397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32946-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32946-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32945-6

  • Online ISBN: 978-3-642-32946-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics