This document appears to be a biography and information about Junichi Horiguchi, the co-founder and CEO of ZEROBILLBANK LTD. It includes his work experience at IBM Japan and IBM Singapore, as well as background on ZEROBILLBANK, located in Tel Aviv, Israel. Contact information is provided at the end for the company.
Dynamic Time Warping を用いた高頻度取引データのLead-Lag 効果の推定Katsuya Ito
This paper investigates the Lead-Lag relationships in high-frequency data.
We propose Multinomial Dynamic Time Warping (MDTW) that deals with non-synchronous observation, vast data, and time-varying Lead-Lag.
MDTW directly estimates the Lead-Lags without lag candidates. Its computational complexity is linear with respect to the number of observation and it does not depend on the number of lag candidates.
The experiments adopting artificial data and market data illustrate the effectiveness of our method compared to the existing methods.
This document appears to be a biography and information about Junichi Horiguchi, the co-founder and CEO of ZEROBILLBANK LTD. It includes his work experience at IBM Japan and IBM Singapore, as well as background on ZEROBILLBANK, located in Tel Aviv, Israel. Contact information is provided at the end for the company.
Dynamic Time Warping を用いた高頻度取引データのLead-Lag 効果の推定Katsuya Ito
This paper investigates the Lead-Lag relationships in high-frequency data.
We propose Multinomial Dynamic Time Warping (MDTW) that deals with non-synchronous observation, vast data, and time-varying Lead-Lag.
MDTW directly estimates the Lead-Lags without lag candidates. Its computational complexity is linear with respect to the number of observation and it does not depend on the number of lag candidates.
The experiments adopting artificial data and market data illustrate the effectiveness of our method compared to the existing methods.
2022年7月1日に開催された「インターオペラビリティがもたらすエンタープライズブロックチェーンの進化とは【EEA Japan x Blockchain EXE】」の登壇資料です。
▼イベント詳細ページ
https://peatix.com/event/3266446/view
▼Datachainコーポレートサイト
https://www.datachain.jp/
1. The document discusses blockchain technology and decentralized applications (dapps). It provides examples of blockchain platforms and specific dapps built on platforms like Ethereum and EOS.
2. URLs are listed for various dapps and news articles about blockchain projects, applications, and companies working with distributed ledger technology.
3. The document serves as a resource for learning about the current dapp ecosystem and use cases being developed on blockchains beyond cryptocurrencies.
2. ブロックチェーンブロックチェーン,, BitcoinBitcoinの研究?の研究?
要素技術や基本的な考え方の多くは、新しくない。
電子署名 Verify verifyI verify- 電子署名
- ハッシュ関数 Req.Req.
Verify, verify,
verify, ...
I verify
if you verified.
- POW (Proof-of-Work)
- C. Dwork, M. Naor: Pricing via processing or combatting junk
mail. CRYPTO 1992.
- K. Matsuura, H. Imai: Modified aggressive modes of Internet
K E h i t t i t D i l f S i tt kKey Exchange resistant against Denial-of-Service attacks.
IEICE Trans. Info. Sys., Vol.E83-D (5), pp.972—979, 2000.
- 追記型記録や証拠の保管と分散した鎖の連携- 追記型記録や証拠の保管と分散した鎖の連携
- B. Schneier, J. Kelsey: Cryptographic support for secure logs
on untrusted machines 7th USENIX Security Symposium 1998
2
on untrusted machines. 7th USENIX Security Symposium, 1998.
では、一体、何がとくに面白いのか?
4. 情報セキュリティ経済学情報セキュリティ経済学
会議(WEIS: Workshop on the Economics of Information
Security)を中心とする国際的な研究コミュニティに15年Security)を中心とする国際的な研究コミュニティに15年
少々の歴史があり、定着してきた。
論 が揃 威 理論研究と実証研究が揃ってこそ威力を発揮する。
- 情報セキュリティに関するある問題の発生要因が「経済学的最適戦
略が直感に反し、人々がそれに従わないこと」にある。この事実を
科学的に説明し、直感を正させる。
- 情報セキュリティに関するある問題の発生要因が「人々が経済学的
最適戦略に従うままにしておくと問題が発生するにもかかわらず、
それを抑制/回避する社会制度設計など 対策が十分にとられて なそれを抑制/回避する社会制度設計などの対策が十分にとられていな
いこと」にある。この事実を科学的に説明し、十分な対策を促す。
4
5. (ポイ 制度や ) キ
ブロックチェーンの応用と好相性ブロックチェーンの応用と好相性
Loyalty Program(ポイント制度やFFP)のセキュリティ
- B.Jenjarrussakul, K.Matsuura: Analysis of Japanese loyalty programs
considering liquidity, security efforts, and actual security levels.
WEIS2014.
- 情報セキュリティ投資理論(「攻撃が生起する確率」として定義される情報セキュリティ投資理論(「攻撃が生起する確率」として定義される
「脅威」と、「攻撃が生起したという条件の下で、攻撃が成功し被害が
発生する条件付き確率」として定義される「脆弱性」を分けて定式化)
に着想を得て実証研究モデルを構築
ホテル利用ポイント航空会社のマイル ギフトバウチャー
配
送
先
変更
Bitcoinに関する地道な実証分析も色々ある。
N G d l t l P i i l ti i th Bit i t WEIS2017
ホテル利用ポイント航空会社のマイル ギフトバウチャ
更
5
- N.Gandal et.al.: Price manipulation in the Bitcoin ecosystem. WEIS2017.
6. 仮想通貨も従来から研究対象仮想通貨も従来から研究対象
抽象化されたトークンとその金融派生商品の評価
K M t S it t k d th i d i ti T h i l R t 29 C t- K. Matsuura: Security tokens and their derivatives. Technical Report 29, Centre
for Communications Systems Research, University of Cambridge, 2001.
- K. Matsuura: Digital security tokens and their derivatives. Netnomics, Vol.5, No.2, g y
pp.161‐179, 2003.
様 確率 連
1 0 0 % Trusted
様々な確率過程と関連
1 0 0 % Trusted
When I obtain ,
6
(個々の時刻での値はその時刻が来れば確定するが、
事前に正確に予測することはできない。)
7. 仮想通貨も従来から研究対象仮想通貨も従来から研究対象
• 抽象化されたトークンとその金融派生商品の評価
– K Matsuura: Security tokens and their derivatives Technical Report 29 CentreK. Matsuura: Security tokens and their derivatives. Technical Report 29, Centre
for Communications Systems Research, University of Cambridge, 2001.
– K. Matsuura: Digital security tokens and their derivatives. Netnomics, Vol.5, No.2,
pp.161‐179, 2003.
様 確率 連
1 0 0 % Trusted
様々な確率過程と関連
1 0 0 % Trusted
When I obtain ,use
7
(個々の時刻での値はその時刻が来れば確定するが、
事前に正確に予測することはできない。)
9. ブロックチェーン応用のモデルブロックチェーン応用のモデル
例: M. Andrychowicz et al.: “Secure Multiparty
Computations on Bitcoin ” Communications of theComputations on Bitcoin, Communications of the
ACM, Vol.59, No.4, pp.76-84, 2016.
前 トラ ザク イ デ ク (複数可)- 一つ前のトランザクションのインデックス(複数可)
- そのトランザクションを受け取る人の公開鍵
- 価値
- ロック時刻(そのトランザクションが有効になる時刻)
- 上記に対する「一つ前のトランザクションの所有者」の署名
他の文献を見ても、アプリ固有のコンテンツ、価値判
断に役立つ数値、取引記録としての数値、絶対時刻
や相対順序、のauthenticityを保護することが多い。
9
10. Properties ofProperties of SetokSetok
Revocation when
compromised in value:
Refundability:
Can be sold at S if
H(t)=0 when V(t)=0.
Tradability:
t∈[t0, t0+T] where
T=1(t,H(t)) and
( h) (h )
y
Can be sold at yV/h if
t∈[t0, t0+T] where
1(t,h) = 0 (h>0)
T0 (h=0).[ 0, 0 ]
T=0(t,H(t)) and
0(t,h) = T0 (h>0)
Indivisibility:
Cannot be divided
0 (h=0). into multiple pieces.
「この定義が適切」という意味ではなく「これ
らの着眼点でモデル化すると金融工学的に
取り扱いやすくなる」という意味
10
11. 事前指定した価値で買う権利事前指定した価値で買う権利
リスク移転の手段は、もちろん、他にも色々ある:
- 金融派生商品、保険、外注など様々な契約金融派 商品、保険、外注な 様 な契約
- 観測可能な数値から直接観測できない数値を推定するセンサーの役
割も果たせる可能性がある。
Additional assumptions on the setok: Additional assumptions on the setok:
Y(t)=1.
Cannot go for short (空売り不可) Cannot go for short.(空売り不可)
ヨーロッパ型コールオプション
Right to buy a share of the setok with a fixed strike Right to buy a share of the setok with a fixed strike
value K at the time of a maturity T(<t0+T0).
Divisible (i.e. one can buy/sell any amount). Divisible (i.e. one can buy/sell any amount).
Can go for short.(空売り可)
Let C(t)=c(t, H(t)) be the price process where c(t,0)=0.
11
( ) ( , ( )) p p ( , )
12. 理想的な市場の仮定理想的な市場の仮定
There are no transaction costs of trading both There are no transaction costs of trading both
in time and in money; any transaction can be
completed immediately, free of charge.completed immediately, free of charge.
The market is completely liquid, i.e. it is always
possible to buy/sell unlimited quantitiespossible to buy/sell unlimited quantities.
The selling price is equal to the buying price.
The market is free of arbitrage (無裁定仮定).
There is a riskless asset with the short rate r
(intuitively, the interest rate of the bank
account).
12
)
13. ダイナミクスダイナミクス
We consider the expected value conditioned by the information
available at the beginning of the infinitesimal time interval (t, t+dt].
Compromise (assumed to bring a
systemic risk): a Poisson process withsystemic risk): a Poisson process with
intensity .
Th l d i
Revoked if compromised
The value dynamics:
dH = (1dt)(Hdt+HdW)Hdt
p
( )( )
where and are deterministic
constants and W is a Wiener processconstants and W is a Wiener process.
13
Geometric Brownian motion unless compromised (: velocity; : volatility)
14. ウィーナー過程ウィーナー過程
(ここからしばらくは、今日は飛ばします)
W(0) = 0, dt dW= 0.
If h W( ) W( ) d W( ) W( ) If r<s<t<u, then W(u)W(t) and W(s)W(r)
are independent.
For s<t, the stochastic variable W(t)W(s)
has the Gaussian distribution N[0,(ts)1/2].
W has continuous trajectories.
Paying attention to (dt)2=0 we have Paying attention to (dt) =0, we have
dH = ()Hdt + HdW (1)
d t i i ti t h ti
14
deterministic stochastic
15. 伊藤の補題伊藤の補題
Assume that H has a stochastic
differential given by dH=dt+dWg y
where and are adapted processes,
and let x be a C1,2-function Define theand let x be a C function. Define the
process X by X(t)=x(t,H(t)). Then X has
a stochastic differential given by
2
21
( ( )) ( )
x x x x
dX H d dW
a stochastic differential given by
2
2
( , ( )) ( ).
2
dX t H t dt dW t
t h h h
(In our dynamics, =()H and =H if X is free from the Poisson jump.
15
=H and =H otherwise.)
16. 変数変換変数変換
Let G(t)=g(t,H(t)) where g(t,h)=1/h. Let G(t) g(t,H(t)) where g(t,h) 1/h.
Let us represent partial derivatives by
b i t Th It ’ f lsubscripts. Then, Ito’s formula
(considering Eqn.(1)) gives
dG={gt+()Hgh+2H2ghh/2}dt+HghdW
={0 ( )H/H2+2H2/H3}dt (H/H2)dW={0()H/H2+2H2/H3}dt(H/H2)dW
=(2+)Gdt GdW. (2)
16
17. 伊藤の補題を利用して伊藤の補題を利用してdCdCを計算を計算
Let z(t, g)=c(t, 1/g).
Then ch = zg/H2 = G2zg, ct=zt, andg g
chh=2G3zg+G4zgg.
Unless compromised, we can use Ito’s formula. If
i d C j b 0 Si (d )2 0 dcompromised, C jumps to be 0. Since (dt)2=0 and
(dt)(dW)=0, we have
dCdC
=(1dt){(ct+Hch+2H2chh/2)dt+HchdW}(dt)c
{ +( 2 )G + 2G2 /2}dt G dW (3)={ztz+(2)Gzg+2G2zgg/2}dtGzgdW. (3)
17
18. 無リスクポートフォリオの構成無リスクポートフォリオの構成
Composed of one share of the setok Composed of one share of the setok
and M options.
Let F be the monetary value (in terms
of the initial investment at the
beginning of the infinitesimal time
interval (t t+dt]) of this portfoliointerval (t, t+dt]) of this portfolio.
F = 1 + MC.
M
1
18
19. 我々は我々はdFdFを求めたいを求めたい
Remark: We should write the expected
gain conditioned by the informationg y
available at the beginning of the
infinitesimal time interval (t t+dt]infinitesimal time interval (t, t+dt].
Regarding the term that considers the
M ti (i MdC)M options (i.e. MdC), we can use
Eqn.(3).
19
20. 「「SetokSetok1枚」に相当する項の扱い1枚」に相当する項の扱い
A liquid market allows us a repetition of
immediate trades : Sell one share
(issued at the beginning of the( ssued at t e beg g o t e
infinitesimal time interval) at the end of
the time interval at the price ofthe time interval at the price of
(G+dG)/G according to the tradability,
d b h (i d t th d fand buy one share (issued at the end of
the time interval) at the fixed price 1.
Thus, the term is given by dG/G.
20
21. ダイナミクスの式を展開ダイナミクスの式を展開
By using Eqns (2) and (3) we have By using Eqns. (2) and (3), we have
dF = dG/G + MdC
= {(2+)Gdt GdW}/G +
M[{ztz+(2)Gzg+2G2zgg/2}dtGzgdW][{ t ( ) g gg/ } g ]
=[2+ztz+(2)Gzg+2G2zgg/2]dt
(MGz +1)dW (MGzg+1)dW.
By constructing the portfolio with M= 1/Gz options we can make itBy constructing the portfolio with M=1/Gzg options, we can make it
riskless (i.e. no stochastic term).
21
22. 無裁定仮定無裁定仮定
Letting M=1/(Gzg) in the deterministic termg
of the portfolio’s dynamics, we have
2+ztz+(2)Gzg+2G2zgg/2/(Gzg) t ( ) g gg/ /( g)
=+z/(Gzg)zt/(Gzg)2Gzgg/(2zg)
No arbitrage requires this to be rF where No arbitrage requires this to be rF where
F=1+MC (otherwise, free-lunch is possible).
22
24. 満期満期TTにおけるペイオフにおけるペイオフ
The option price at the maturity must be
l h ff ( id f l h)equal to the payoff (to avoid free lunch).
If h<K, the holder of the option exercises it;
he buys one share of the setok at the price 1,
with the strike value K. He immediately sells
it for the value-proportional price K/h=Kg.
If h>K, the holder of the option does not, p
exercise it.
Therefore the boundary condition of the PDE Therefore, the boundary condition of the PDE
is z(T,g)=max{0,Kg1}.
24
25. 特別な場合には解析的に解ける特別な場合には解析的に解ける
If there is no possibility of compromise
(i.e. =0), we solve
2g2z /2+rgz rz+z = 0 (5) g zgg/2+rgzgrz+zt = 0 (5)
z(T,g)=max{0,Kg1}
in the domain [0,T]xR+.
25
26. 無効化が無い場合の解析解無効化が無い場合の解析解
The solution to (5) is The solution to (5) is
z(t,g)/K=gN[d1(t,g)]er(Tt)N[d2(t,g)]/K.
Finally, we obtain
c(t,h)=KN[d1(t,h)]/her(Tt)N[d2(t,h)]1 2
where N is the cumulative distribution function
for the standard normal distribution andfor the standard normal distribution and
d1(t,h)={ln(K/h)+(r+2/2)(Tt)}/{(Tt)1/2}
d (t h) d (t h) (T t)1/2d2(t,h)=d1(t,h)(Tt)1/2.
26