Li, Yiting and Wang, Chien-Chiang (2019): Cryptocurrency, Imperfect Information, and Fraud.
PDF
MPRA_paper_94309.pdf Download (1MB) |
Abstract
We study cryptocurrency in a monetary economy with imperfect information. The network imperfection provides traders opportunities to engage in double spending fraud, but the trackability of transaction messages allows us to impose proof-of-work (PoW), proof-of-stake (PoS), and currency exclusion to mitigate fraud incentives. However, PoW consumes energy, and PoS requires extra cryptocurrency to be held as deposits, so deterring fraud may not be optimal. We find that forks can serve as signals to detect double spending fraud and to trigger punishments. If the probability is high that forks appear under double spending, imposing PoW and PoS to deter fraud is optimal; otherwise, it is optimal to save the cost but allow for double spending. Finally, by endogenizing the incentives to double spend and the size of PoW and PoS, we show that cryptocurrency economy can achieve efficient allocation as the imperfectness of the internet is sufficiently low.
Item Type: | MPRA Paper |
---|---|
Original Title: | Cryptocurrency, Imperfect Information, and Fraud |
English Title: | Cryptocurrency, Imperfect Information, and Fraud |
Language: | English |
Keywords: | cryptocurrency, money, search, imperfect information, fraud |
Subjects: | D - Microeconomics > D8 - Information, Knowledge, and Uncertainty > D80 - General E - Macroeconomics and Monetary Economics > E4 - Money and Interest Rates > E40 - General G - Financial Economics > G1 - General Financial Markets > G10 - General |
Item ID: | 94309 |
Depositing User: | Chien-Chiang Wang |
Date Deposited: | 05 Jun 2019 20:30 |
Last Modified: | 29 Sep 2019 02:15 |
References: | Andolfatto, D. (2007). Incentives and the limits to deflationary policy. manuscript. Berentsen, A., M. Molico, and R. Wright (2002). Indivisibilities, lotteries, and monetary exchange. Journal of Economic Theory 107(1), 70�94. Cavalcanti, R. and E. Nosal (2011). Counterfeiting as private money in mechanism design. Journal of Money, Credit and Banking, 43(Supplement 2), 625�636. Chiu, J. and T. Koeppl (2017). The economics of cryptocurrencies: Bitcoin and beyond. Working Paper. Garay, J., A. Kiayias, and N. Leonardos (2015). The bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology-EUROCRYPT 2015, 281�310. Kocherlakota, R. N. (1998). Money is memory. Journal of Economic Theory 81(2), 232�251. Kocherlakota, R. N. and N.Wallace (1998). Incomplete record-keeping and optimal payment arrangements. Journal of Economic Theory 81, 272�289. Lagos, R. and R. Wright (2005). A unified framework for monetary theory and policy analysis. Journal of Political Economy 113(3), 463�484. Li, Y., G. Rocheteau, and P.-O. Weill (2012). Liquidity and the threat of fraudulent assets. Journal of Political Economy 120(5), 815�846. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Pass, R., L. Seeman, and A. Shelat (2016). Analysis of the blockchain protocol in asynchronous networks. IACR Cryptology ePrint Archive, 281�310. Rocheteau, G. and R. Wright (2005). Money in search equilibrium, in competitive equilibrium, and in competitive search equilibrium. Econometrica 73(1), 175�202. Shell, K. and R. Wright (1993). Indivisibilities, lotteries, and sunspot equilibria. Economic Theory 3, 1�17. |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/94309 |