Investment Compliance in Hedge Funds using Zero Knowledge Proofs

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Risk Assurance for Hedge Funds Using Zero Knowledge Proofs

This work introduces a new tool for a fund manager to verifiably communicate portfolio risk characteristics to an investor. We address the classic dilemma: How can an investor and fund manager build trust when the two party’s interests are not aligned? In addition to high returns, a savvy investor would like a fund’s composition to reflect his own risk preferences. Hedge funds, on the other han...

متن کامل

The duality of option investment strategies for hedge funds

This paper explores the structure of optimal investment strategies using stochastic programming and duality theory in investment portfolios containing options for a hedge fund manager who attempts to beat a benchmark. Explicit optimal conditions for option investments are obtained for several models.

متن کامل

Incentives in Hedge Funds

We investigate a game of delegated portfolio management such as hedge funds featuring risk-neutrality, hidden types, and hidden actions. We show that capital gain tax plays the decisive role in solving the incentive problem. We characterize the constrained optimal fee scheme and capital gain tax rate; the fee after taxation must be linear and affected by gains and losses in a low-powered and sy...

متن کامل

Some Zero-Knowledge Proofs

Consider a general proof system for a language in NP. That is, suppose we have a language L 2 NP and a string x 2 L. For example, let L be GRAPH-ISOMORPHISM and x = (G0; G1) a pair of isomorphic graphs. Suppose Victor is not convinced that x 2 L, so he calls his friend Peggy (who is infinitely powerful) and asks for a proof. Peggy agrees, because she’s nice that way, applies her infinite power,...

متن کامل

Zero-Knowledge Identity Proofs

The problem of proving identity, according to Bishop in [2], can generally be solved using some of the following things: (1) something you know (like a password), (2) something you have (like an identification badge), (3) something you are (such as a fingerprint), and (4) where you are (such as your computer’s internet address). Many identification schemes focus on the first problem, proving kn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of The British Blockchain Association

سال: 2021

ISSN: 2516-3949,2516-3957

DOI: 10.31585/jbba-4-1-(9)2021