scholarly journals Does the Design of Stablecoins Impact Their Volatility?

2021 ◽  
Vol 14 (2) ◽  
pp. 42
Author(s):  
Klaudia Jarno ◽  
Hanna Kołodziejczyk

In this paper, we shall compare the average volatility that characterises the main stablecoin design types with a view to answering the question of whether all stablecoin designs accomplish the goal of minimising their price fluctuations to the same degree. Our research is motivated by the lack of rigorous studies comparing volatility of different stablecoin types stressed in the literature as well as the practical importance of such a comparison from the investors’ viewpoint. We opted for a standard volatility measure, i.e., standard deviation of return rates, corrected it for autocorrelation, and detected differences between distributions of the measure in three stablecoin groups using various non-parametric tests, i.e., the Kruskal–Wallis test, the bootstrap F-test, post-hoc tests and non-parametric contrasts. We proved that stablecoins do not deliver equally on the promise to provide stable market value with tokenised funds being leaders. Tokenised funds design involves complete coverage of the stablecoin supply in units of the currency of reference as well as great dependence on the trusted third-party acting as a trustee for the collateral. Our study reveals that existing complex stablecoins designs hardly compete with this simple design in terms of volatility.

2022 ◽  
Vol 25 (1) ◽  
pp. 1-34
Author(s):  
Handan Kılınç Alper ◽  
Alpteki̇n Küpçü

Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are under-studied fields of research, with practical importance. In particular, we consider MFE scenarios where at the end of the protocol, either every participant receives every other participant’s item, or no participant receives anything. We analyze the case where a trusted third party (TTP) is optimistically available, although we emphasize that the trust put on the TTP is only regarding the fairness , and our protocols preserve the privacy of the exchanged items against the TTP. In the fair SMPC case, we prove that a malicious TTP can only harm fairness, but not security . We construct an asymptotically optimal multi-party fair exchange protocol that requires a constant number of rounds (in comparison to linear) and O(n 2 ) messages (in comparison to cubic), where n is the number of participating parties. In our protocol, we enable the parties to efficiently exchange any item that can be efficiently put into a verifiable encryption (e.g., signatures on a contract). We show how to apply this protocol on top of any SMPC protocol to achieve fairness with very little overhead (independent of the circuit size). We then generalize our protocol to efficiently handle any exchange topology (participants exchange items with arbitrary other participants). Our protocol guarantees fairness in its strongest sense: even if all n-1 other participants are malicious and colluding with each other, the fairness is still guaranteed.


Author(s):  
Xiaoyong Xu ◽  
Xianghong Meng ◽  
Shin-ichi Oka

Abstract Objective Our work aimed to investigate the association between vigorous physical activity and visit-to-visit systolic blood pressure variability (BPV). Methods We conducted a post hoc analysis of SPRINT (Systolic Blood Pressure Intervention Trial), a well-characterized cohort of participants randomized to intensive (<120 mmHg) or standard (<140 mmHg) SBP targets. We assessed whether patients with hypertension who habitually engage in vigorous physical activity would have lower visit-to-visit systolic BPV compared with those who do not engage in vigorous physical activity. Visit-to-visit systolic BPV was calculated by standard deviation (SD), average real variability (ARV), and standard deviation independent of the mean (SDIM) using measurements taken during the 1-, 2-, 3-, 6-, 9- and 12-month study visits. A medical history questionnaire assessed vigorous physical activity, which was divided into three categories according to the frequency of vigorous physical activity. Results A total of 7571 participants were eligible for analysis (34.8% female, mean age 67.9±9.3 years). During a follow-up of 1-year, vigorous physical activity could significantly reduce SD, ARV, and SDIM across increasing frequency of vigorous physical activity. There were negative linear trends between frequency of vigorous physical activity and visit-to-visit systolic BPV. Conclusions Long-term engagement in vigorous physical activity was associated with lower visit-to-visit systolic BPV.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-26
Author(s):  
Georgios Fragkos ◽  
Cyrus Minwalla ◽  
Eirini Eleni Tsiropoulou ◽  
Jim Plusquellic

Electronic cash ( e-Cash ) is a digital alternative to physical currency such as coins and bank notes. Suitably constructed, e-Cash has the ability to offer an anonymous offline experience much akin to cash, and in direct contrast to traditional forms of payment such as credit and debit cards. Implementing security and privacy within e-Cash, i.e., preserving user anonymity while preventing counterfeiting, fraud, and double spending, is a non-trivial challenge. In this article, we propose major improvements to an e-Cash protocol, termed PUF-Cash, based on physical unclonable functions ( PUFs ). PUF-Cash was created as an offline-first, secure e-Cash scheme that preserved user anonymity in payments. In addition, PUF-Cash supports remote payments; an improvement over traditional currency. In this work, a novel multi-trusted-third-party exchange scheme is introduced, which is responsible for “blinding” Alice’s e-Cash tokens; a feature at the heart of preserving her anonymity. The exchange operations are governed by machine learning techniques which are uniquely applied to optimize user privacy, while remaining resistant to identity-revealing attacks by adversaries and trusted authorities. Federation of the single trusted third party into multiple entities distributes the workload, thereby improving performance and resiliency within the e-Cash system architecture. Experimental results indicate that improvements to PUF-Cash enhance user privacy and scalability.


Author(s):  
Ajaysinh Devendrasinh Rathod ◽  
Saurabh Shah ◽  
Vivaksha J. Jariwala

In recent trends, growth of location based services have been increased due to the large usage of cell phones, personal digital assistant and other devices like location based navigation, emergency services, location based social networking, location based advertisement, etc. Users are provided with important information based on location to the service provider that results the compromise with their personal information like user’s identity, location privacy etc. To achieve location privacy of the user, cryptographic technique is one of the best technique which gives assurance. Location based services are classified as Trusted Third Party (TTP) & without Trusted Third Party that uses cryptographic approaches. TTP free is one of the prominent approach in which it uses peer-to-peer model. In this approach, important users mutually connect with each other to form a network to work without the use of any person/server. There are many existing approaches in literature for privacy preserving location based services, but their solutions are at high cost or not supporting scalability.  In this paper, our aim is to propose an approach along with algorithms that will help the location based services (LBS) users to provide location privacy with minimum cost and improve scalability.


Entropy ◽  
2021 ◽  
Vol 23 (10) ◽  
pp. 1294
Author(s):  
Kejia Zhang ◽  
Xu Zhao ◽  
Long Zhang ◽  
Guojing Tian ◽  
Tingting Song

Quantum dual-signature means that two signed quantum messages are combined and expected to be sent to two different recipients. A quantum signature requires the cooperation of two verifiers to complete the whole verification process. As an important quantum signature aspect, the trusted third party is introduced to the current protocols, which affects the practicability of the quantum signature protocols. In this paper, we propose a quantum dual-signature protocol without arbitrator and entanglement for the first time. In the proposed protocol, two independent verifiers are introduced, here they may be dishonest but not collaborate. Furthermore, strongly nonlocal orthogonal product states are used to preserve the protocol security, i.e., no one can deny or forge a valid signature, even though some of them conspired. Compared with existing quantum signature protocols, this protocol does not require a trusted third party and entanglement resources.


Sign in / Sign up

Export Citation Format

Share Document