Investment Compliance in Hedge Funds using Zero Knowledge Proofs
نویسندگان
چکیده
منابع مشابه
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs
This work introduces a new tool for a fund manager to verifiably communicate portfolio risk characteristics to an investor. We address the classic dilemma: How can an investor and fund manager build trust when the two party’s interests are not aligned? In addition to high returns, a savvy investor would like a fund’s composition to reflect his own risk preferences. Hedge funds, on the other han...
متن کاملThe duality of option investment strategies for hedge funds
This paper explores the structure of optimal investment strategies using stochastic programming and duality theory in investment portfolios containing options for a hedge fund manager who attempts to beat a benchmark. Explicit optimal conditions for option investments are obtained for several models.
متن کاملIncentives in Hedge Funds
We investigate a game of delegated portfolio management such as hedge funds featuring risk-neutrality, hidden types, and hidden actions. We show that capital gain tax plays the decisive role in solving the incentive problem. We characterize the constrained optimal fee scheme and capital gain tax rate; the fee after taxation must be linear and affected by gains and losses in a low-powered and sy...
متن کاملSome Zero-Knowledge Proofs
Consider a general proof system for a language in NP. That is, suppose we have a language L 2 NP and a string x 2 L. For example, let L be GRAPH-ISOMORPHISM and x = (G0; G1) a pair of isomorphic graphs. Suppose Victor is not convinced that x 2 L, so he calls his friend Peggy (who is infinitely powerful) and asks for a proof. Peggy agrees, because she’s nice that way, applies her infinite power,...
متن کاملZero-Knowledge Identity Proofs
The problem of proving identity, according to Bishop in [2], can generally be solved using some of the following things: (1) something you know (like a password), (2) something you have (like an identification badge), (3) something you are (such as a fingerprint), and (4) where you are (such as your computer’s internet address). Many identification schemes focus on the first problem, proving kn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of The British Blockchain Association
سال: 2021
ISSN: 2516-3949,2516-3957
DOI: 10.31585/jbba-4-1-(9)2021