paint-brush
How Blockchain Contracts Ensure Fairness, Flexibility, and Compensation for Option Holdersโ€‚by@escholar
103 reads New Story

How Blockchain Contracts Ensure Fairness, Flexibility, and Compensation for Option Holders

tldt arrow

Too Long; Didn't Read

Blockchain contracts protect option holders by ensuring fairness, allowing flexible exercises, and compensating users if the option exercise fails.
featured image - How Blockchain Contracts Ensure Fairness, Flexibility, and Compensation for Option Holders
EScholar: Electronic Academic Papers for Scholars HackerNoon profile picture
  1. Abstract and Introduction

  2. Preliminaries

  3. Overview

  4. Protocol

    4.1 Efficient Option Transfer Protocol

    4.2 Holder Collateral-Free Cross-Chain Options

  5. Security Analysis

    5.1 Option Transfer Properties

    5.2 Option Properties

  6. Implementation

  7. Related Work

  8. Conclusion and Discussion, and References


A. Codes

B. Proofs

B.2 Option

Theorem 6. Protocol 4.2 satisfies option correctness: If both the Alice and Bob are conforming, then if Alice does not exercise the right, Alice doesnโ€™t lose the ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ด and Bob doesnโ€™t lose the ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐บ and ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ต; or if Alice exercise the right, then Alice will receive ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ต and Bob will receive ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ด and ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐บ .


Proof. According to Protocol 4.2, it is evident that if Alice escrows her collateral in the ๐ถ๐‘œ๐‘›๐‘ก๐‘Ÿ๐‘Ž๐‘๐‘ก๐ด contract and calls ๐‘’๐‘ฅ๐‘’๐‘Ÿ๐‘๐‘–๐‘ ๐‘’ (), then a conforming Bob will reveal the pre-image ๐ต in ๐ถ๐‘œ๐‘›๐‘ก๐‘Ÿ๐‘Ž๐‘๐‘ก๐ด to reclaim the guarantee ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐บ and Aliceโ€™s collateral ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ด. Subsequently, Alice can use ๐ต to obtain ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ต. If Alice does not escrow the collateral, Bob will not reveal ๐ต. After the option expires at ๐‘‡๐ธ +2ฮ”, Bob can call๐‘๐‘™๐‘Ž๐‘–๐‘š() and ๐‘Ÿ๐‘’ ๐‘“ ๐‘ข๐‘›๐‘‘ () on the respective chains to reclaim ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐บ and ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ต.


Theorem 7. Protocol 4.2 satisfies exercisablity: During the transfer from Bob to Dave, the option remains active, allowing Alice to exercise the option without any delays.


Proof. According to Protocol 4.2.1, during the transfer from Bob to Dave, Alice can make a deposit and exercise her option at any time. If the transfer is in the Setup Phase, Bob will need to reveal ๐ต to fulfill his obligation and revoke the transfer. It is important to note that Dave can use ๐ต to reclaim ๐‘‡ ๐‘Ÿ๐‘Ž๐‘›๐‘ ๐‘Š . If the transfer is in the Attempt Phase and Bob acts maliciously by using ๐ต to take ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐บ , Alice can use ๐ต to obtain ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ต. Dave will need to use ๐ต on ๐ถ๐‘œ๐‘›๐‘ก๐‘Ÿ๐‘Ž๐‘๐‘ก๐ต to withdraw the transfer. Otherwise, when Dave uses ๐œŽ๐‘š to change the writer and the hash lock, he will reveal a new preimage secret ๐ท, which Alice can then use to obtain ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐ต.


Theorem 8. Protocol 4.2 satisfies failure compensation: Before expiration, Alice can exercise the option successfully, or if the exercise fails, she is compensated with the guarantee deposited by Bob.


Proof. By Theorem 6, if Alice successfully exercises her option, she will receive Bobโ€™s collateral. Otherwise, after Alice makes a deposit and calls ๐‘’๐‘ฅ๐‘’๐‘Ÿ๐‘๐‘–๐‘ ๐‘’ (), ๐ถ๐‘œ๐‘›๐‘ก๐‘Ÿ๐‘Ž๐‘๐‘ก๐ด can invoke ๐‘–๐‘ ๐ท๐‘’๐‘๐‘œ๐‘ ๐‘–๐‘ก๐‘’๐‘‘ () to determine if the exercise has occurred. If Bob does not fulfill his obligation within a period of ฮ”, Alice can call ๐‘๐‘™๐‘Ž๐‘–๐‘š() to obtain ๐ด๐‘ ๐‘ ๐‘’๐‘ก๐บ as compensation, and Bob will lose his guarantee.


Authors:

(1) Zifan Peng, The Hong Kong University of Science and Technology (Guangzhou) Guangzhou, Guangdong, China ([email protected]);

(2) Yingjie Xue, The Hong Kong University of Science and Technology (Guangzhou) Guangzhou, Guangdong, China ([email protected]);

(3) Jingyu Liu, The Hong Kong University of Science and Technology (Guangzhou) Guangzhou, Guangdong, China ([email protected]).


This paper is available on arxiv under CC BY 4.0 license.