A New Way to Trade Options Without Collateral

cover
25 Dec 2024
  1. Abstract and Introduction

  2. Preliminaries

  3. Overview

  4. Protocol

    4.1 Efficient Option Transfer Protocol

    4.2 Holder Collateral-Free Cross-Chain Options

  5. Security Analysis

    5.1 Option Transfer Properties

    5.2 Option Properties

  6. Implementation

  7. Related Work

  8. Conclusion and Discussion, and References

A. Codes

B. Proofs

4.2 Holder Collateral-Free Cross-Chain Options

We want to remove the need for upfront collateral from Alice without using a cross-chain bridge. Allowing Alice direct access to the exercise secret risks Bob’s asset since Alice has no collateral. To address this, we resort to economic incentives and let Bob control the exercise secret while Alice retains the right to penalize Bob. In addition to the usual collateral, Bob locks a valuable asset on πΆβ„Žπ‘Žπ‘–π‘›π΄ as a guarantee. If Bob fails to release the exercise secret when Alice exercises her right, she receives Bob’s guarantee as compensation, incentivizing Bob to cooperate.

Figure 2: Collateral-Free Cross-Chain Swap Options if both Alice and Bob are honest, where Alice generates 𝐴 and 𝐻(𝐴), Bob generates 𝐡 and𝐻(𝐡), then they exchange𝐻(𝐴) and𝐻(𝐡).

Suppose Alice and Bob reach an agreement that Alice pays Bob 𝑃 as a premium on a chain denoted by πΆβ„Žπ‘Žπ‘–π‘›π‘ƒ . The option takes effective at 𝑇𝐴 meaning that Alice obtains the right to exchange 𝐴𝑠𝑠𝑒𝑑𝐴 for 𝐴𝑠𝑠𝑒𝑑𝐡 before 𝑇𝐸. Bob’s guarantee is 𝐴𝑠𝑠𝑒𝑑𝐺 .

The protocol involves two kinds of asset settlement: first for option establishment (or activation, we use them interchangably) and second for option exercise. We therefore introduce two secrets:

(1) Activation secret 𝐴, used for Alice to pay the premium and activate the option; and (2) Exercise secret 𝐡, used for Alice to pay 𝐴𝑠𝑠𝑒𝑑𝐴 to Bob in exchange for 𝐴𝑠𝑠𝑒𝑑𝐡 when the option is exercised. Secret 𝐴 is generated by Alice and 𝐡 is generated by Bob.

The protocol is divided into two phases. Figure 2 shows the execution process of this protocol if both parties are honest.

(1) Setup phase: Alice and Bob activate an option. Alice obtains option and Bob obtains premium.

(2) Exercise/Abandon phase: Alice can either exercise the option or abandon it.

In the setup phase, Alice and Bob will establish this option similarly to a vanilla HTLC. Alice locks 𝑃 with a hashlock 𝐻(𝐴) in a contract on any chain. Bob creates two contracts, πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄ on πΆβ„Žπ‘Žπ‘–π‘›π΄ and πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΅ on πΆβ„Žπ‘Žπ‘–π‘›π΅, which are used in the option. The option remains inactive until Alice reveals the activation secret 𝐴 before 𝑇𝐴, at which point the state updates to active and Bob gets Alice’s premium. πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄ holds Bob’s guarantee, 𝐴𝑠𝑠𝑒𝑑𝐺 , until the option expires. If Alice exercises the option and Bob fulfills his obligation by revealing the exercise secret 𝐡, 𝐴𝑠𝑠𝑒𝑑𝐺 is refunded to Bob. If Bob fails to fulfills his obligation, 𝐴𝑠𝑠𝑒𝑑𝐺 will be transferred to Alice. πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΅ locks Bob’s collateral, 𝐴𝑠𝑠𝑒𝑑𝐡, using 𝐻(𝐡).

I. Setup Phase.

(1) Alice randomly selects a secret 𝐴 as activation secret, and computes its hash value 𝐻(𝐴). Bob generates 𝐡 and 𝐻(𝐡), which serve as the exercise secret and hashlock.

(2) Alice locks 𝑃 with hashlock 𝐻(𝐴) on the agree-uponπΆβ„Žπ‘Žπ‘–π‘›π‘ƒ with timeout 𝑇𝐴 + Ξ”.

(3) If Bob observes that Alice has honestly deposited the premium, Bob should, at any time before 𝑇𝐴 βˆ’ Ξ”:

(a) Create πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄ on πΆβ„Žπ‘Žπ‘–π‘›π΄ and πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΅ on πΆβ„Žπ‘Žπ‘–π‘›π΅. These contracts are initially in an inactive state, and record the holder and writer, activation time 𝑇𝐴 and option expiration time 𝑇𝐸.

(b) Escrow the guarantee 𝐴𝑠𝑠𝑒𝑑𝐺 on πΆβ„Žπ‘Žπ‘–π‘›π΄, and lock principal 𝐴𝑠𝑠𝑒𝑑𝐡 on πΆβ„Žπ‘Žπ‘–π‘›π΅ with hashlock 𝐻(𝐡).

(4) If Alice observes that Bob has created contracts and made deposits, Alice reveals 𝐴 at 𝑇𝐴 on both chains to activate the option. If not, transaction aborts, Bob calls refund() and retrieves 𝐴𝑠𝑠𝑒𝑑𝐺 and 𝐴𝑠𝑠𝑒𝑑𝐡. Alice refunds 𝑃.

II. Exercise/Abandon Phase.

(1) Exercise: If Alice wants to exercise the option at 𝑇𝐡 before expiration, she calls exercise() and deposits 𝐴𝑠𝑠𝑒𝑑𝐴 into πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄, then within one Ξ”:

(a) If Bob reveals 𝐡 and calls fulfill() on πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄, then he obtains both 𝐴𝑠𝑠𝑒𝑑𝐴 and 𝐴𝑠𝑠𝑒𝑑𝐺 . Upon observing 𝐡, Alice obtains 𝐴𝑠𝑠𝑒𝑑𝐡 with 𝐡 from πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΅.

(b) If Bob does not reveal 𝐡, Alice calls claim() onπΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄ after 𝑇𝐡 + Ξ” to receive 𝐴𝑠𝑠𝑒𝑑𝐺 as compensation.

(2) Abandon: If Alice does not call exercise() before or at 𝑇𝐸, then the option is abandoned and Bob can call refund() on πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄ and πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΅ to refund 𝐴𝑠𝑠𝑒𝑑𝐺 and 𝐴𝑠𝑠𝑒𝑑𝐡.

Timeouts. The latest deadline 𝑇𝐡 is no later than 𝑇𝐸. If Bob fails to fulfill his obligations, then Alice receives 𝐴𝑠𝑠𝑒𝑑𝐺 by 𝑇𝐸 + 2Ξ”. Therefore, the lock period for 𝐴𝑠𝑠𝑒𝑑𝐺 in πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄ is 𝑇𝐸 +Ξ” if Alice waives the option, or extends to𝑇𝐸 +2Ξ” if Alice exercises the option. Alice exercises the option and receives 𝐴𝑠𝑠𝑒𝑑𝐡 by𝑇𝐸 +2Ξ”. Therefore, the lock period for 𝐴𝑠𝑠𝑒𝑑𝐡 in πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΅ is 𝑇𝐸 + 2Ξ”.

4.2.1 Integration: Efficient Cross-Chain Options without Upfront Holder Collateral. We incorporate the efficient option transfer protocol to enable a collateral-free option transfer process. From the option transfer perspective, the roles of the holder and writer are reversed, as Bob owns the exercise secret. Bob deposits 𝐴𝑠𝑠𝑒𝑑𝐺 and 𝐴𝑠𝑠𝑒𝑑𝐡 in πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄ and πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΅. In the transfer of Bob’s position, hashlock 𝐻(𝐡) must remain consistent.

Take Bob transferring writer to Dave as an example. It is similar to the Protocol 4.1.1 with three notable differences. Suppose Bob reaches an agreement with Dave to transfer the writer position. Dave is able to buy Bob’s risky asset with its obligation at the price of π‘Š π‘Ÿπ‘–π‘‘π‘’π‘ŸπΉπ‘’π‘’ before or at π‘‡π‘Š . First, Dave must choose a new hashlock as the exercise secret, and similarly, Bob needs to use his private key π‘ π‘˜π΅ to sign Dave’s new hashlock 𝐻(𝐷), which means message π‘š = (π‘Ž, (Dave.π‘Žπ‘‘π‘‘π‘Ÿπ‘’π‘ π‘ , 𝐻(𝐷), π‘π‘˜π· )). Second, Alice can use Bob’s private key π‘ π‘˜π΅ to reclaim 𝐴𝑠𝑠𝑒𝑑𝐡 and guarantee, 𝐴𝑠𝑠𝑒𝑑𝐺 . Third, if Alice wants to exercise the option and makes the deposit after Bob reveals the signature during the transfer process, the transfer continues, and Dave must forward the signature to obtain the writer’s position. Dave should fulfill his obligation and reveal the exercise secret at π‘‡π‘Š βˆ’ Ξ” on πΆπ‘œπ‘›π‘‘π‘Ÿπ‘Žπ‘π‘‘π΄.

As a result of the support for concurrent bidding, our protocol can effectively defend against phantom bid attack. In phantom bid attack, an adversary creates multiple virtual buyers who offer higher prices but do not finalize the transfer. In the previous protocol [12] which attempts to transfer the option to a buyer sequentially, in face of such an attack, the option holder/writer cannot sell their positions in a reasonable time since the virtual buyers are exhausting the option transfer window.

With our proposed protocol, an adversary option buyer cannot launch this attack. This is due to the use of a signature for option transfer settlement, rather than a hashlock used in the previous protocol. By this signature scheme, once a buyer is chosen by the seller, the option transfer can be finalized. There is no time window for the buyer to choose to finalize the option transfer or abort.

Authors:

(1) Zifan Peng, The Hong Kong University of Science and Technology (Guangzhou) Guangzhou, Guangdong, China ([email protected]);

(2) Yingjie Xue, The Hong Kong University of Science and Technology (Guangzhou) Guangzhou, Guangdong, China ([email protected]);

(3) Jingyu Liu, The Hong Kong University of Science and Technology (Guangzhou) Guangzhou, Guangdong, China ([email protected]).


This paper is available on arxiv under CC BY 4.0 license.