Achieving Trust without Disclosure: Dark Pools and a Role for Secrecy-Preserving Verification (Invited Paper)

Can an exchange be “dark,” so that orders are not displayed, while simultaneously trustworthy, so that the execution of trades and flow of information occur as promised? SEC actions against dark pools suggest cause for concern, and regulators seem to be moving towards requiring more disclosure. Yet there is a clear tension: trading order information is widely exploited. Therefore, institutional investors have a strong interest in keeping pre-trade information about large trades hidden. Secrecy-preserving proofs of correctness can be used to build trust without revealing unnecessary information. By performing operations on obfuscated representations of orders (perhaps encrypted or otherwise hidden), a zero knowledge proof can be provided, allowing anyone to verify correctness of trades. Crucially, this can be done without revealing any information beyond this correctness. This technology can be usefully applied to construct provably trustworthy dark pools. Additional practical protocols relax the definition of “zero knowledge" to reveal limited information, providing necessary transparency for efficient market operation while limiting information that can be exploited by observers. Coupled with Trusted Computing hardware, these protocols can provide an excellent balance of practicality with secrecy.

[1]  David C. Parkes,et al.  Cryptographic Securities Exchanges , 2007, Financial Cryptography.

[2]  Christopher Thorpe,et al.  Time-Lapse Cryptography , 2006 .

[3]  David Chaum,et al.  Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..

[4]  J. Doug Tygar,et al.  Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.

[5]  David C. Parkes,et al.  Cryptographic Combinatorial Clock-Proxy Auctions , 2009, Financial Cryptography.

[6]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[7]  M. Lewis Flash Boys: A Wall Street Revolt , 2014 .

[8]  Christopher Thorpe,et al.  Cryptographic Rule-Based Trading - (Short Paper) , 2012, Financial Cryptography.

[9]  David C. Brown,et al.  Dark Pool Exclusivity Matters , 2013 .

[10]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[11]  Michael P. Wellman,et al.  Strategic Market Choice: Frequent Call Markets vs. Continuous Double Auctions for Fast and Slow Traders , 2015, EAI Endorsed Trans. Serious Games.

[12]  Valtteri Niemi,et al.  Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.

[13]  Eric Budish,et al.  The High-Frequency Trading Arms Race: Frequent Batch Auctions as a Market Design Response , 2015 .

[14]  Moti Yung,et al.  Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions , 2012, ICALP.

[15]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[16]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[17]  M. J. Humbach,et al.  The Electronic Call Auction: Market Mechanism and Trading: Building a Better Stock Market , 1995 .

[18]  Ivan Damgård,et al.  A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation , 2006, Financial Cryptography.

[19]  Eric Budish,et al.  Implementation Details for Frequent Batch Auctions: Slowing Down Markets to the Blink of an Eye † , 2014 .

[20]  Michael P. Wellman,et al.  Latency arbitrage, market fragmentation, and efficiency: a two-market model , 2013, EC '13.

[21]  Rocco A. Servedio,et al.  Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications , 2007, 22nd Annual IEEE Symposium on Logic in Computer Science (LICS 2007).

[22]  Giovanni Di Crescenzo,et al.  Privacy for the Stock Market , 2002, Financial Cryptography.

[23]  David C. Parkes,et al.  Practical secrecy-preserving, verifiably correct and trustworthy auctions , 2006, ICEC '06.

[24]  Sean W. Smith Trusted Computing Platforms - Design and Applications , 2005 .

[25]  David C. Parkes,et al.  Cryptographic Combinatorial Securities Exchanges , 2009, Financial Cryptography.

[26]  R. Cramer,et al.  Linear Zero-Knowledgde. A Note on Efficient Zero-Knowledge Proofs and Arguments , 1996 .

[27]  Ronald L. Rivest,et al.  Time-lock Puzzles and Timed-release Crypto , 1996 .