Abstract
We examine bucket-based and volume-based algorithms for privacy-preserving asset trading in a financial dark pool. Our bucket-based algorithm places orders in quantised buckets, whereas the volume-based algorithm allows any volume size but requires more complex validation mechanisms. In all cases, we conclude that these algorithms are highly efficient and offer a practical solution to the commercial problem of preserving privacy of order information in a dark pool trading venue.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Plus one engine that serves as an entry gateway for orders; therefore a total of 282 engines required.
References
Aly, A., et al.: SCALE-MAMBA v1.12: Documentation (2021). https://homes.esat.kuleuven.be/~nsmart/SCALE/Documentation.pdf
Asharov, G., Balch, T.H., Polychroniadou, A., Veloso, M.: Privacy-preserving dark pools. In: Seghrouchni, A.E.F., Sukthankar, G., An, B., Yorke-Smith, N. (eds.) Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2020, Auckland, New Zealand, 9–13 May 2020, pp. 1747–1749. International Foundation for Autonomous Agents and Multiagent Systems (2020)
Bag, S., Hao, F., Shahandashti, S.F., Ray, I.G.: SEAL: sealed-bid auction without auctioneers. Cryptology ePrint Archive, Report 2019/1332 (2019). https://eprint.iacr.org/2019/1332
Balch, T., Diamond, B.E., Polychroniadou, A.: SecretMatch: inventory matching from fully homomorphic encryption. In: Balch, T. (ed.) ICAIF 2020: The First ACM International Conference on AI in Finance, New York, NY, USA, 15–16 Oct 2020, pp. 1–17. ACM (2020). https://doi.org/10.1145/3383455.3422569
Bogetoft, P., et al.: Multiparty computation goes live. Cryptology ePrint Archive, Report 2008/068 (2008). http://eprint.iacr.org/2008/068
Bogetoft, P., Damgård, I., Jakobsen, T., Nielsen, K., Pagter, J., Toft, T.: A practical implementation of secure auctions based on multiparty integer computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 142–147. Springer, Heidelberg (2006). https://doi.org/10.1007/11889663_10
da Gama, M.B., Cartlidge, J., Polychroniadou, A., Smart, N.P., Talibi Alaoui, Y.: Kicking-the-bucket: fast privacy-preserving trading using buckets. Cryptology ePrint Archive, Report 2021/1549 (2021). https://eprint.iacr.org/2021/1549
Cartlidge, J., Smart, N.P., Alaoui, Y.T.: MPC joins the dark side. In: Galbraith, S.D., Russello, G., Susilo, W., Gollmann, D., Kirda, E., Liang, Z. (eds.) ASIACCS 19, pp. 148–159. ACM Press (2019). https://doi.org/10.1145/3321705.3329809
Cartlidge, J., Smart, N.P., Talibi Alaoui, Y.: Multi-party computation mechanism for anonymous equity block trading: a secure implementation of Turquoise Plato Uncross. Intell. Syst. Acc. Finance Manage. 28, 239–267 (2020)
Constantinides, T., Cartlidge, J.: Block Auction: A general blockchain protocol for privacy-preserving and verifiable periodic double auctions. In: 2021 IEEE International Conference on Blockchain (Blockchain) (2021)
Damgard, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure MPC for dishonest majority - or: breaking the SPDZ limits. Cryptology ePrint Archive, Report 2012/642 (2012). http://eprint.iacr.org/2012/642
Galal, H., Youssef, A.: Publicly verifiable and secrecy preserving periodic auctions. In: Workshop on Trusted Smart Contracts (WTSC) (2021). https://fc21.ifca.ai/wtsc/WTSC21paper2.pdf
Hao, F., Zieliński, P.: A 2-round anonymous veto protocol. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2006. LNCS, vol. 5087, pp. 202–211. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04904-0_28
Jutla, C.S.: Upending stock market structure using secure multi-party computation. Cryptology ePrint Archive, Report 2015/550 (2015). http://eprint.iacr.org/2015/550
Ngo, N., Massacci, F., Kerschbaum, F., Williams, J.: Practical witness-key-agreement for blockchain-based dark pools financial trading. In: Financial Cryptography and Data Security 2021 (2021). https://fc21.ifca.ai/papers/113.pdf
Parkes, D.C., Rabin, M.O., Shieber, S.M., Thorpe, C.A.: Practical secrecy-preserving, verifiably correct and trustworthy auctions, pp. 70–81. Association for Computing Machinery, New York, NY, USA (2006). https://doi.org/10.1145/1151454.1151478
Petrescu, M., Wedow, M.: Dark pools in European equity markets: emergence, competition and implications. European Central Bank: Occasional Paper Series, No. 193 (2017). https://www.ecb.europa.eu/pub/pdf/scpops/ecb.op193.en.pdf
Thorpe, C., Parkes, D.C.: Cryptographic securities exchanges. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 163–178. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77366-5_16
Thorpe, C., Parkes, D.C.: Cryptographic combinatorial securities exchanges. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 285–304. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03549-4_18
Thorpe, C., Willis, S.R.: Cryptographic rule-based trading. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 65–72. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_6
Zhu, H.: Do Dark Pools Harm Price Discovery? Rev. Finan. Stud. 27(3), 747–789 (2013)
Acknowledgments
This work has been supported in part by ERC Advanced Grant ERC-2015-AdG-IMPaCT, by the FWO under an Odysseus project GOH9718N, and by CyberSecurity Research Flanders with reference number VR20192203. Additionally, the first author is supported by the Flemish Government through FWO SBO project SNIPPET S007619N. The second author is sponsored by Refinitiv.
This paper was prepared in part for information purposes by the Artificial Intelligence Research group of JPMorgan Chase & Co and its affiliates (“JPMorgan”), and is not a product of the Research Department of JPMorgan. JPMorgan makes no representation and warranty whatsoever and disclaims all liability, for the completeness, accuracy or reliability of the information contained herein. This document is not intended as investment research or investment advice, or a recommendation, offer or solicitation for the purchase or sale of any security, financial instrument, financial product or service, or to be used in any way for evaluating the merits of participating in any transaction, and shall not constitute a solicitation under any jurisdiction or to any person, if such solicitation under such jurisdiction or to such person would be unlawful.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 International Financial Cryptography Association
About this paper
Cite this paper
da Gama, M.B., Cartlidge, J., Polychroniadou, A., Smart, N.P., Alaoui, Y.T. (2022). Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets. In: Eyal, I., Garay, J. (eds) Financial Cryptography and Data Security. FC 2022. Lecture Notes in Computer Science, vol 13411. Springer, Cham. https://doi.org/10.1007/978-3-031-18283-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-18283-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18282-2
Online ISBN: 978-3-031-18283-9
eBook Packages: Computer ScienceComputer Science (R0)