Gordo Ps
Gordo Ps
Gordo Ps
Abstract. We study the dynamic hedging of portfolios of options and other deriva-
tive securities in the presence of transaction costs. Following Bensaid, Lesne, Pages &
Scheinkman (1992), we examine hedging strategies which are risk-averse and have the
least initial cost, in the framework of a multiperiod binomial model. This paper considers
the asymptotic limit of the model as the number of trading periods becomes large.p This
limit is characterized in terms of nonlinear diusion equations. If A = k=( dt) < 1
(k is the roundrip transaction cost, is the volatility and dt is the lag between trading
dates), the optimal cost approaches the solution of a nonlinear Black-Scholes-type
p equa-
p in which the volatility is dynamically adjusted upward to 1 + A or downward to
tion
1 A according to the local convexity of the solution. For A = 1, the upward ad-
justment is similar but the downward adjustment assigns zero nominal volatility to the
underlying asset for long-Gamma positions. In the latter case, the optimal cost function
is the solution of a free-boundary problem. We also characterize the associated hedging
strategies. We shown that if A < 1, it is optimal to replicate the nal payo via \nonlinear
Delta hedging". On the other hand, if A = 1, the optimal strategies are path-dependent,
non-unique and typically super-replicate the nal payo.
(1)
Courant Institute of Mathematical Sciences, New York University, N.Y.,N.Y.,10012.
(2)
These results were obtained as part of the rst author's doctoral dissertation.
(3)
Partially supported by the Institute for Advanced Study, Princeton, N.J.,08540 .
1
1. Introduction and Statement of the Main Results
The problem of accounting for transaction costs in the dynamic hedging of derivative
securities has attracted considerable attention from theoreticians and practitioners. S-
trategies which account for transaction costs and pricing models that incorporate the costs
into the premium have considerable practical interest, especially for trading derivatives in
markets with moderate or low liquidity.
The problem can be formulated in terms of an agent that buys and sells options on the
stock of a company. At some point in time, he or she decides to hedge the \book", or
options portfolio, against future price
uctuations. The agent would like to determine the
least costly strategy, taking into account the projected transaction costs due to dynamic
hedging. The initial cost of such strategy can be interpreted as the minimal capital reserve
needed to protect the portfolio against future market moves.1
We shall make the assumption that the agent is totally risk-averse: only strategies
which ensure non-negative cash-
ows after closing all positions are deemed admissible.
This assumption is important in the framework of this paper but by no means necessary.
Several theorists have considered hedging strategies which allow for losses but maximize a
utility function assigned to the agent (Constantinides (1979,1986), Hodges and Neuberger
(1989), Davis, Panas and Zariphopolou (1993)). In principle, a utility-based approach
may present greater
exibility2 but has the disadvantage of producing utility-dependent
results. For this and other reasons, total risk-aversion plays a central role in the assessment
of transaction costs in derivative strategies.
Risk-averse hedging in the presence of transaction costs was rst considered by Leland
(1985) for the log-normal model and later by Boyle and Vorst (1992) for the binomial
lattice. Both papers consider only the problem of hedging a single option. A non-trivial
generalization of the Leland model applicable to option portfolios and exotic options was
proposed later by Hoggard, Whalley and Wilmott (1993), based on dynamic replication of
the payo. However, Boyle and Vorst and Hoggard et al. both observed that replication
may not always be feasible since it can lead to innite option prices when transaction costs
exceed a critical value and the agent is long Gamma (as in the case of a long call position).
Avellaneda and Paras (1994) examined this issue, which is related to the mathemat-
ical ill-posedness of the replication equation. They proposed an explanation for the ill-
posedness, which points to a fundamental dierence between long and short options posi-
tions in markets with large bid-oer spreads. The risk-averse seller of an option is obliged
to dynamically hedge his or her exposure in the cash market, regardless of transaction
1 Throughout this paper, we consider only dynamic hedging with shares of stock and a money-market
account. Of course, in practice, traders also hedge their books with other derivative securities to (among
other things) diminish the transaction costs. We assume that the agent has already taken a denite
position in the derivatives market and seeks to hedge the \residual" exposure with a position in the cash
market.
2
The utility framework contains risk-aversion as a special case in which losses are assigned \innitely
negative utility".
2
costs. On the other hand, the buyer of the option risks only the initial premium: hedging
is done primarily to oset the time-decay in the option's value. It is intuitively clear (and
can be proved mathematically) that if transaction costs in the cash market are suciently
large, Delta-hedging to oset time-decay is impossible. This key observation applies also
to option portfolios: if transaction costs are high and volatility is low, Delta-hedging a
position which is long-Gamma is counterproductive. In such situations, a temporary hold-
ing strategy is preferable, since it does not carry immediate market risk as long as capital
reserves are suciently high. Based on this observation, Avellaneda and Paras proposed a
new scheme for pricing and hedging option portfolios which is based on solving an obsta-
cle problem for Leland's volatility-adjusted PDE. The corresponding dynamic hedges are
non-Markovian (path-dependent) and dominate { or super-replicate { the nal payo.
The aforementioned strategies are based on replication or super-replication. This raises
the question of characterizing strategies which minimize the initial cost of hedging. How
are the two concepts related ? The least-initial-cost formulation was rst considered by
Bensaid, Lesne, Pages and Scheinkman (1992) (BLPS) in the framework of a nite-period
binomial tree, using a a dynamic programming algorithm (see Section 2, equation 2.10).
Due to dependency on the previous stock holdings, the BLPS optimal hedging strategies
are path-dependent, with some notable exceptions. For instance, in the case of a short
option settled in shares, Bensaid et al. showed that it is always optimal to replicate the
payo. This result has an interesting consequence: the BLPS least-initial-cost strategy
for a short option corresponds, in the asymptotic limit of many trading periods, to a
Black-Scholes pricing formula with volatility adjusted upwards to re
ect transaction costs,
analogous to the Boyle and Vorst (1992) formula.3
The least-initial-cost pricing and hedging of complex options portfolios is the main
subject of this paper. Our approach consists in characterizing the solutions of the BLPS
algorithm in the limit of innitely many trading periods for general contingent claims. We
show that the algorithm admits a simple interpretation in this asymptotic limit. In fact,
the optimal initial costs satisfy nonlinear partial dierential equations analogous to those
proposed by Hoggard et al. and by Avellaneda and Paras, with minor changes in the values
of the adjusted volatilities that re
ect the dierence between the normal and binomial
statistics. As a consequence of this result, we determine precisely in which instances the
BLPS algorithm gives rise to replicating strategies and when the optimal strategies are
path-dependent and dominating. We also show that whenever path-dependency holds for
BLPS, the hedging strategies are essentially analogous to those proposed by Avellaneda and
Paras (1994) for the log-normal model. Thus, path-dependency occurs when (i) transaction
costs exceed a critical level and (ii) the agent is long-Gamma for some level of the spot
price.
3
terms of the binomial probability model. In this framework, there are N +1 trading dates,
the last one being the expiration date. The lag between successive trading dates is xed.
The impact of imperfect liquidity is modeled through a bid-oer spread in the cash market,
assuming that the agent will buy stock at the oer and sell at the bid. The bid/oer prices
for one share of stock are dened as
S bid = Sn k
1 2 and S ask = Sn k
1+ 2 ;
n n
where Sn is the average between the bid and oer and k represents the (percentage) round-
trip transaction cost for buying/selling stock, i.e.,4
k = Sn S Sn :
ask bid
For simplicity, we assume that k is constant. The change in the average stock price over a
single period is modeled by a two-state random variable
p Sn U
Sn
1-p Sn D
with probabilities p and 1 p for upward and downward moves. We also assume that the
dollar return for lending/borrowing over one trading period is R (constant), and that U ,
D and R satisfy the \pure" no-arbitrage condition
D < 1+R < U :
4
Mathematically, conditions (i) and (ii) are satised if and only if
k=2
D 11 + k= < 1 + R < U 11 + k=2 :
2 k=2
The risk-feasibility of an asset depends on how much its price is expected to oscillate
over a single trading period in relation to the round-trip transaction costs. As we shall see,
the BLPS optimal strategies are very dierent according to whether risk-feasibility holds
or not. If the stock is risk-feasible, replicating strategies are always optimal for arbitrary
contingent claims. Otherwise, replication may not be optimal.
To illustrate the sub-optimality of replicating strategies, we consider a simple example.
Example 1.2 Assume there is a single trading period. An agent wishes to hedge a
short position in a hypothetical claim contingent on the value of a non-risk-feasible stock.
Assume that this claim pays $1 in the \up" state and $0 in the \down" state. Consider
rst the case in which the agent has no endowment in shares. Opening and subsequently
closing any position in shares after one period will result in an overall loss under both states
of the world. Hence, it follows that the initial hedging cost of any replicating portfolio
using shares and an interest-bearing money-market account must exceed the present value
of $1 (the maximum liability). On the other hand, simply holding the present value of
$1 (i.e., $(1 + R) 1 ) in cash constitutes a (cheaper) dominating riskless strategy. Notice,
however, that the situation is dierent if either (i) the agent has an endowment in shares
or (ii) if the contingent claim is settled in shares rather than in cash. In such cases, a
replicating strategy may be cheaper than $(1 + R) 1 because transaction costs are lower
for the agent. As a matter of fact, the reader can verify that it is optimal to replicate when
the agent's endowment in shares exceeds 1=[S0(1 k=2)(U D)] shares in Case (i) and
1=[S0(U D)] in Case (ii) (See Section 3). This suggests that, aside from the risk-feasibility
of the underlying cash instrument, the agent's endowment and the form of payment may
determine whether the it is optimal to replicate or not.
For a binomial model with a large number N of trading periods per year | and hence
with small duration between successive trading dates dt = T=N 1 | risk-feasibility is
equivalent to
A pk < 1; (1.1)
dt
where is the annualized stock volatility. We shall refer to A as the Leland number.
Table 1.1 shows that the Leland number takes moderate values (between 0 and 10) for
standard values of volatility, time-lag and transaction costs ( volatility of 20%, time-lags
ranging from one week to four times a day and round-trip costs of up to 6%). From this
table, we draw the heuristic conclusion that if the time-to-expiration is suciently long,
then (i) the minimum lag between trades can be taken to be small enough to warrant a
5
k/2 0.01 0.02 0.03
dt
one week
-2 0.72 1.44 2.17
1.9*10
half week
-3 1.02 2.04 3.06
9.6*10
one day
-3 1.61 3.23 4.84
3.8*10
half day
-3 2.28 4.57 6.85
1.9*10
quarter day
-4 3.23 6.46 9.69
9.6*10
Table 1.1. Leland number A for dierent values of the minimum lag between trading
dates dt (from one week to 1=4 day) with round-trip transaction costs between 2% and 6%
and volatility of 20%.
continuum description of the system, and (ii) at the same time, A can be considered to be
nite. The interesting asymptotic regime of parameters for the asymptotic analysis of the
BLPS algorithm is, in fact, dt 1 and A = O(1).5
Under these assumptions, the asymptotic analysis of the BLPS algorithm in the limit
N % 1 yields the following results:
(i) If the underlying asset is risk-feasible, the minimal initial cost of risk-averse hedg-
ing a European-style contingent claim with payo value F (S ) and expiration date
T approaches uniformly to the solution of the nonlinear diusion equation
@P + 1 S 2 b2 @ 2 P @ 2P + r S @P P
= 0; (1.2)
@t 2 @S 2 @S 2 @S
with
P (S; T ) = F (S ) ;
5
The regime dt 1, A 1, which might be considered relevant when dt is small, gives rise to
trivial buy/hold strategies. The BLPS cost function for this regime is recovered by rst letting dt % 1
and then taking the limit A 1 in the asymptotic equations (1.4) derived hereafter (cf. Avellaneda and
Paras (1994)).
6
where 2 2
b2 @@SP2 = 1 + A sign @@SP2 :
2 (1.3)
Here, r represents the annualized interest rate. Notice that, since the Leland number is
less than unity, the nonlinear parabolic equation (1.2) is well-posed. The optimal hedging
strategy corresponds to maintaining a hedge-ratio of @P @S shares of stock at each trading
date.
(ii) If the underlying asset is not risk-feasible, the minimum initial cost for hedging a
European-style contingent claim with payo value F (S ) expiring at time T can be
approximated as N % 1 by the solution of the \obstacle problem":
@P + 1 S 2 2 (1 + A) @ 2P + r S @P
@t 2 @S 2 @S P 5 0
@P + 1 S 2 2 (1 + A) @ 2 P + r S @P
@t 2 @S 2 @S P = 0
This obstacle problem reduces to a linear PDE analogous to Leland's equation if FSS is
positive for all S . Otherwise, the problem splits the (S; t)- plane into two regions: one
where the PDE is satised, and another, \the contact set", in which the value function
coincides with the \obstacle" e r(T t) F (er(T t) S ) and the nominal volatility is zero. The
corresponding dynamic hedging strategies alternate between delta-hedging and holding
periods without hedge adjustments. The times at which the agent switches from delta-
hedging to static hedging are determined by the position of the spot price with respect to
the contact set and by the Delta of the agent's portfolio.
In simple words, the asymptotic analysis of the BLPS algorithm shows that the impact
on the total hedging cost arising from
p bid-oer spreads can be taken into account by
adjusting the volatility upward to 1 + A when the agent ispshort \nonlinear Gamma"
( @ 2P=@S 2 > 0 ) and adjusting the volatility downward to 1 A or to zero when the
7
Short Call Position.
V($) V($)
A = 1.12 A = 0.94
0.2 0.2
0.15 0.15
0.1 0.1
0.05 0.05
0 0
0.8 0.9 1 1.1 S($) 0.8 0.9 1 1.1 S($)
0.15 0.15
0.1 0.1
0.05 0.05
0 0
0.8 0.9 1 1.1 S($) 0.8 0.9 1 1.1 S($)
Figure 1.1. Value of a short call position with strike price K = 1 with 6 months to expira-
tion. The parameter values are k = 1%, = 20% and dt = 0:01 (A = 0:5); 0:005 (A =
0:71); 0:003(A = 0:94) and 0:02 (A = 1:12). The curves corresponding to the PDEs
and the BLPS algorithm (thick line) are visually indistinguishable. The dotted lines represent
the intrinsic value of the call.
agent is long \nonlinear Gamma" (@ 2 P=@S 2 5 0).6 When A = 1, an adjustment to zero
volatility should be made in the latter case.
In addition to providing a characterization of least-initial-cost dynamic hedging, the
asymptotic PDEs provide an ecient computational procedure for solving approximate-
ly the BLPS algorithm. In fact, BLPS involves two state-variables | price and stock
Since P represents costs the agent's cost (liabilities), the prot-loss is P . Hence our denition of
6
Gamma.
8
Long Call Position.
V($) A = 1.12 V($) A = 0.94
0 0
0.05 0.05
0.1 0.1
0.15 0.15
0.2 0.2
0.8 0.9 1 1.1 S($) 0.8 0.9 1 1.1 S($)
0.05 0.05
0.1 0.1
0.15 0.15
0.2 0.2
0.8 0.9 1 1.1 S($) 0.8 0.9 1 1.1 S($)
Figure 1.2. Same as Figure 1.1 for a long call position. Again, the agreement between
BLPS and the nonlinear PDE s is remarkable. Notice that the long call position is priced at
intrinsic value (as if the volatility were zero) for A = 1:12.
holdings | (see equation (2.11) in Section 2), while the PDEs involve only the spot price.
More importantly, the BLPS scheme has exponential complexity in N when the underlying
asset is not risk-feasible, unlike the nite-dierence PDE solvers which are O(N 2 ). The
error which arises from the use of a nite-dierence scheme for thep PDEs (1.2) or (1.4)
to approximate the BLPS algorithm is essentially proportional to dt, and hence small.
The quality of the approximation is exhibited in Figures 1.1, 1.2, 1.3 and 1.4 for various
contingent claims under realistic values of the model parameters for equity markets.
To conclude this Introduction, we address an important issue regarding risk-feasibility
9
Short Butter
y Position.
V($) A = 1.12 V($) A = 0.94
0.1 0.1
0.08 0.08
0.06 0.06
0.04 0.04
0.02 0.02
0 0
0.8 0.9 1 1.1 0.8 0.9 1 1.1
S($) S($)
0.08 0.08
0.06 0.06
0.04 0.04
0.02 0.02
0 0
0.8 0.9 1 1.1 0.8 0.9 1 1.1
S($) S($)
Figure 1.3. Comparison between the value functions obtained from the dierential equa-
tions and the Bensaid-Lesne-Pages-Scheinkman algorithm for a short 0:9 1:0 1:1 butter
y
spread with six months to expiration. The smooth curves are the solutions of the PDEs (1.2)
or (1.4) and the oscillating curves are solutions of the BLPS algorithm. The dotted lines
represents the intrinsic value of the spread in present dollars. The parameter values are as in
Figure 1.1.
and risk-aversion. As shown above, the initial cost and the strategy to follow are deter-
mined by the Leland number A or equivalently, by the minimum lag between adjustments,
dt. The question of how to choose the Leland number in practice poses itself naturally.
Clearly, the BLPS model does not address this issue, requiring an endogenous specication
of dt. In practice, a choice of the mesh-size cannot be made without taking into account
the agent's aversion to hedge slippage between trading dates. This remark also applies to
10
Short Digital Position.
V($) A = 1.12 V($) A = 0.94
0.1 0.1
0.08 0.08
0.06 0.06
0.04 0.04
0.02 0.02
0 0
0.85 0.9 0.95 0.98 1 1.05 0.85 0.9 0.95 0.98 1 1.05
S($) S($)
0.08 0.08
0.06 0.06
0.04 0.04
0.02 0.02
0 0
0.85 0.9 0.95 0.98 1 1.05 0.85 0.9 0.95 0.98 1 1.05
S($) S($)
Figure 1.4. Same as Figure 1.3 for a digital option with 6 months to expiration. The
payo is $1 if the stock is worth more than $1 at expiry and $0 otherwise.
the asymptotic PDEs. This dependency on the time-lag is a conceptual disadvantage of the
model vis a vis the utility-dependent approaches such as Davis, Panas and Zariphopolou
(1993) which determine dt endogenously. It is clear however that small Leland numbers
correspond to large intervals between adjustments, with greater slippage risk, and large
Leland numbers correspond to smaller lags between adjustments and thus to less risk but
more transaction costs. A practical way to specify dt would be to view the slippage risk as
being determined by the magnitudes of the nonlinear Delta (@P=@S ) and nonlinear Gam-
ma ( @ 2 P=@S 2). Thus, a choice of dt can be made using either a \worst-case
2P
scenario"
time-step, or a time-step that varies according to the magnitudes of @S , @S2 and the time
@P @
to expiration. In practice, specication of dt can be done by analyzing prot/loss his-
11
tograms obtained by Monte Carlo simulation (Avellaneda and Paras (1994)). The overall
result would be to have a variable Leland number A and a PDE that would combine the
features of (1.2)-(1.3) and (1.4).7
The remaining sections of this of the paper contain a detailed mathematical analysis
of the passage from the binomial lattice model to the asymptotic PDEs. In Section 2, we
review the BLPS algorithm. In Section 3, we study two special conditions under which the
optimal hedging strategy is to replicate the payo and thus BLPS reduces to a backward-
induction algorithm on the binomial lattice. This analysis pertains to the properties of
the BLPS algorithm at the discrete level. In Section 4, we study the asymptotic behav-
ior of the algorithm in the cases when replicating strategies are optimal. The technique
used in the proofs is to derive approximate solutions of the backward-induction algorithm
using the solutions of the PDE (1.2). This requires some regularity properties of the so-
lutions as well as a \comparison principle", adapted to the nonlinear induction relation,
to evaluate rigorously the approximation error. Section 5 studies the case A = 1, when
optimal dynamic hedging is path-dependent. To characterize this regime, we construct
super-replicating strategies using the solution of the obstacle problem following Avellane-
da and Paras (1994). This leads to an upper bound on the BLPS solution in terms of
(1.4). A lower bound in terms of P (S; t) is obtained by comparing the BLPS optimal cost
with the values of certain \barrier options" that knock out on the boundary of the contact
set of the obstacle problem. The main asymptotic results are contained in Theorems 4.4,
4.5 and 5.4 in Sections 4 and 5. For the reader's convenience, the regularity properties of
equations (1.2) and (1.4) used in the proofs are presented in an Appendix.
7The use of variable-dt strategies was suggested in Whalley and Wilmott (1993) for small values of
A for which equation (1.3) remains well-posed. More recently, Grannan and Swindle (1995) investigated
strategies for hedging standard options using Leland's framework with variable time-steps. Other recent
papers which investigate option replication with transaction costs and the time-lag issue include Hodges
and Clelow (1993,1994), Flesaker and Houghston (1994), Albanese and Tompaidis (1995) and Cvitanic
and Karatzas (1995).
12
2. The Bensaid-Lesne-Pages-Scheinkman Algorithm
Consider a binomial tree with N periods, starting at the initial date t0 and ending at
the expiration date tN . A trading strategy is dened as a sequence of portfolios (n; Bn),
n = 0; . . . ; N , to be held during each period. Here, n represents the number of shares of
the underlying security held long or short and Bn the balance of a money-market account.
Adjustments of the portfolio are done at the beginning of each trading period: at time tn
an amount n n 1 of shares is traded and the balance of the operation (transaction cost
included) is added to the money-market account. A self-nanced strategy is one for which
the balance in the money-market account after adjusting the share holdings is exactly
equal to Bn . We will only consider self-nanced strategies.
At time tn, but before readjusting the position, the portfolio is composed of n 1 shares
and Bn 1(1 + R) in cash. The cost of trading n n 1 shares is
where 8
>
< (1 + k2 ) y ; y = 0
(y) = >
:
(1 k2 ) y ; y < 0:
Therefore, a self-nanced strategy satises
Bn = Bn 1(1 + R) (n n 1)Sn ; n = 1; 2; :::; N: (2.1)
Applying this relation recursively, we obtain
n
X
Bn = B0(1 + R) n (j j 1)Sj (1 + R)n j ; (2.2)
j =1
so that at time tN
N
X
BN = B0(1 + R) N (j j 1 )Sj (1 + R)N j : (2.3)
j =1
This formula shows that a self-nanced strategy is uniquely determined by the initial
money-market balance B0 and the (projected) sequence of stock holdings f0; . . . ; N g.8
A European-style derivative security is a contingent claim with payo
8
It is assumed throughout the paper that the sequence fn g dening a trading strategy is non-
anticipating with respect to the
ow of information, i.e., n = n (S0 ; S1 ; :::;Sn ).
13
N = N (SN ); BN = BN (SN )
in shares and cash, respectively, at time tN . A dominating (or risk-averse) strategy of a
short position in this claim is such that
N = N and BN = BN (2.4)
for all nal states. Note that if a dominating strategy satises N > N for some nal
state, the excess of shares can be sold and the prot credited to the money-market account.
Therefore, we can restrict our attention to risk-averse hedging strategies for which
N = N ; BN = BN : (2.5)
If a hedging strategy satises the more stringent conditions
N = N ; BN = BN (2.6)
for all nal states, we say that it is a replicating strategy.
Given an adapted sequence of stock holdings f0; . . . ; N = N g, it follows from (2.3)
that
8 9
< N
X =
B0 = maxN B (1 + R) N + (j j 1 )Sj (1 + R) j (2.7)
N
fSj gj=1 :
j =1
;
is the minimum initial cash reserve required to constitute a dominating strategy of the
contingent claim (N ; BN ).9
Assume that at time t0 an agent is short the contingent claim and has an inven-
tory of 1 shares (long or short). The minimum investment required to implement
f0; . . . ; N = N g as a risk-averse hedging strategy is given by
1S0 + (0 1)S0 + B0 ;
which represents the combined sum of the value of the initial endowment in shares, the
cost of trading 0 1 shares, and the minimum initial cash reserves necessary to
ensure that the strategy fj gNj=0 dominates the nal payo. An optimal hedging strategy
is one that, given the initial endowment 1, minimizes the sum of the last two terms,
(0 1)S0 + B0 . By denition, this is the eective cost of the strategy.
9
Here, the maximum is taken over all forward paths f Sj gNj=0 followed by the stock price.
14
According to this denition, the minimum eective cost over all possible risk-averse
hedging strategies (minimum eective cost, for short) is
8 9
< N
X =
Bbn = max
N BN (1 + R) (N n) + (j j 1 )Sj (1 + R) (j n); : (2.9)
fSj gj=n+1 : j =n+1
for n = 0; . . . ; N .
Proposition 2.1 The function Vn (; S ) satises the equation
Vn(n 1; Sn) =
(n
min n 1)Sn + 1 +1 R maxfVn+1(n; SnU ); Vn+1 (n; SnD)g (2.11)
n
15
with nal condition 10
Proof: The minimum cash reserve in eq. (2.9) can be rewritten in the form
( )
Bbn = S =max Bbn+1 + 1 (
n+1 n)Sn+1
n+1 fSn U;Sn Dg 1 + R 1 + R
1
= 1 + R fmax
n o
Bn+1 + (n+1 n)Sn+1 :
b
U;Dg
Therefore, we have
1 maxfBb + (
min Bbn = min n+1 n )Sn+1g
N
fj gj=n+1 fj gj=n+1 1 + R U;D n+1
N
We claim that the opposite inequality also holds. In fact, recall that Vn+1(n; Sn+1)
represents the minimum eective cost at time tn+1 given that the endowment is n and
the spot price is Sn+1. Because of this, the maximum of the two amounts
10
The algorithms for solving the BLPS equation can have complexity O(e N ) with > 0 for some
contingent claims. This is due to increasing complexity with the time-to-maturity of the quantity
maxfVn+1 (n ;Sn U ); Vn+1 (n ; Sn D)g as a function of n . This function must be stored in memory
to deduce Vn from Vn+1 .
16
(n n 1)Sn + 1 +1 R Vn+1(n; SnU )
and
Vn(n 1; Sn) 5
min
(n n 1)Sn + 1 +1 R maxfVn+1(n; SnU ); Vn+1(n; SnD)g : (2.14)
n
Combining (2.13) and (2.14), we obtain the nonlinear dynamic programming equation
(2.10). The nal condition in (2.11) follows from the denition of eective cost. Q.E.D.
Remark 2.2. The argument generalizes to derivative securites which deliver11a sequence
of payos at dierent dates, contingent on the value of the stock at each date. Any such
derivative security can be specied by its sequence of payos (n; Bn ), where
(2.16)
with nal condition (2.12). Also, the same equation applies to derivative securities in
which the nal date tN is a random stopping time, like barrier options, since the proof of
Proposition 2.1 does not use the fact that N is deterministic.
11
Examples of such \contingent claims" include portfolios of European options with dierent maturities
and equity-linked debt instruments with coupon payments contingent on the price of a stock or a stock
index.
17
Remark 2.3 In the formalismpresented here, forward contracts and bonds correspond to
contingent claims such that N and BN are constant. It is easy to verify that for these
claims with no optionality the unique optimal strategy is then n = N for all n. The
minimum eective cost at time tn is given by
Here, the term in brackets corresponds to the well-known cost-of-carry formula (without
transaction costs). The other two terms represent the transaction cost of the initial share
purchase/sale minus the value of the agent's endowment.
More generally, assume that the nal payo has the form N = N (SN ) + (0) and
BN = BN (SN ) + B(0) where (0) and B(0) are constants. It is then easy to verify that
if [fngNn=0; B0 ] is an optimal strategy for hedging the nal payo (N (SN ); BN (SN ))
given initial endowment 1, then [fn + (0)gNn=0; B0 + B(0) (1 + R) N ] is an optimal
strategy for hedging the payo (N ; BN ) given an initial endowment 1 + (0).
19
3. Replication vs. Super-replication:
\Fine Structure " of the BLPS Algorithm
In this section, we show that the risk-feasibility of the underlying asset is sucient to
guarantee that replicating strategies are optimal. The dynamic programming equation
(2.11) (or (2.16)) then reduces to a backward-induction relation for the pairs (n; Bn)
(see Boyle and Vorst (1992)). Another condition under which replication is optimal is
the k-convexity of the nal payo. This assumption can be seen as a discrete version of
convexity of the value the nal payo.
Prices and state-variables corresponding to dierent nodes of the binomial tree are
represented using double-index notation; e.g. Snj represents the price at time tn at the
node (n; j ).
3.1 Risk-Feasibility.
Proposition 3.1. If the underlying asset is risk-feasible, i.e., if
1 + k=2 D < 1 + R < 1 k=2 U ; (3.1)
1 k=2 1 + k=2
then
(i) the optimal sequences of stock holdings fng and of cash balances fBng are
independent of the initial endowment 1;
(ii) the optimal hedging strategy is replicating;
(iii) given the pairs (jn+1; Bnj +1) and (jn+1 j +1
+1; Bn+1 ), the hedge ratio jn is the unique
solution of the equation
(jn+1 j j +1 j +1
+1 n)Sn+1 + Bn+1 = (n+1 n )Sn+1 + Bn+1 ;
j j j j
(3.2)
Bnj = 1 +1 R ( (jn+1 j +1 j +1
+1 n )Sn+1 + Bn+1 )
j
20
Proof. Assume rst that the starting date is tN 1, that the starting state is j ; ( i:e: S =
SNj 1) and that the initial endowment is N 2. We abbreviate the notation, setting
SN 1 = SNj 1 ;
SNU = SN 1U = SNj+1 ;
SND = SN 1D = SNj ;
and
According to Equation (2.11), the optimal hedge ratio N 1 is found by solving the
minimization problem
and
We claim that U () and D () are, respectively, strictly decreasing and strictly in-
creasing functions of . To see this, we dierentiate formally Equations (3.5) and (3.6).
Accordingly,
21
dU () = 1 k S 1 1 k S U
N 1
d 2 1+R 2 N 1
5 1+
k S 1 1 k S U
N 1
2 1+R 2 N 1
k (1 k= 2) U
= 1 + 2 SN 1 1 (1 + k=2)(1 + R)
<0;
where risk-feasibility was used to obtain the last inequality. A similar calculation shows
that
dD () = 1 k S
1 1 k S D
d 2 N 1 1+R 2 N 1
k 1 k
= 1
2 SN 1 1 + R 1 + 2 SN 1D
= 1 k2 SN 1 1 (1 +(1R+)(1
k=2)D
k=2)
>0:
U (N 1) = D (n 1) ;
22
which is equivalent to
Substituting the right-hand sides of (3.8) into the self-nancing equation (2.1), we see that
the strategy (N 1; BN 1) replicates the nal payo. Equations (3.7) and (3.8) show
that N 1 and BN 1 are both functions of the spot price SN 1, independent of the initial
endowment N 2.
The procedure outlined here for time tN 1 can be repeated at earlier times tN 2, tN 3,
etc. Thus, Proposition 2 follows by induction on n.
3.2 k-Convexity.
Another condition which ensures that (n; Bn ) is path-independent and replicating is
k-convexity.
Denition 3.2. The payo (N (SN ); BN (SN )) is said to be k-convex if the following
conditions are satised:
and
j j j+1
ZSN ZSN SZN
= SNj+1(jN+1 jN )
5 1+
k S j +1
(j +1
N)
j
2 N N
(1 + k=2) Snj+1 j +1 j j +1
+1n+1 (1 k=2) Sn+1n+1 + Bn+1 Bn+1 ;
j j
nj =
(1 + k=2)Snj+1
+1 (1 k=2)Sn+1
j
(3.12)
Bnj = 1 k j +1 j +1 j +1
1 + 2 (n+1 n )Sn+1 + Bn+1
j
1+R
= 1 +1 R k
1 2 (n+1 n )Sn+1 + Bn+1 :
j j j j
(3.13)
Proof. Assume that at time tN 1 the initial endowment is N 2. The optimal hedge
ratio N 1 is the solution to the minimization problem
min
max
U;D
fU (); D ()g ;
with U and D as in (3.5), (3.6). Since the transcation cost function is convex, U
and D are also convex and so is
To show this, we shall prove rst prove that if the payo is k-convex then (3.15) has a
unique solution. Notice that (3.15) is equivalent to
8
>
>
1 + k2 (UN N 1)SN 1U
>
<
+ BNU = 1 k2 (DN N 1)SN 1D + BND (3.16)
>
>
>
:
DN < N 1 < UN :
Elementary linear algebra shows that a solution to (3.16) exists if and only if
1 k2 (UN DN ) SN 1 D 5 BND B 5 1 + k2 (UN DN ) SN 1 U :
U
N
But this is precisely condition (3.10) of the denition of k-convexity, so the claim follows.
It remains to show that the solution to (3.16) achieves the minimum of . For this
purpose, we verify that the rst-order optimality condition (3.15) holds. We have
dU (N 1) k 1
k
dN 1 = 1 2 SN 1 1 + R 1 + 2 SN 1U
k 1 k
5 1+
2 SN 1 1 + R 1 + 2 SN 1U
k U
= 1 + 2 SN 1 1 1 + R
< 0; (3.17)
and
26
dD (N 1) k 1
k
dN 1 = 1 2 SN 1 1 + R 1 2 SN 1D
= 1
k S 1 1 k S D
N 1
2 1+R 2 N 1
k D
= 1 2 SN 1 1 1 + R
> 0; (3.18)
where we used the no-arbitrage condition D < 1 + R < U . Using (3.17)-(3.18) and the
fact that (N 1) = U (N 1) = D (N 1), we conclude that
N 1 = (1 + k=2)(1N+SNk=2)
1U (1 k=2)DN SN 1 D + B N BND
U U
SN 1U (1 k=2)SN 1D (3.19)
and
BN
1
1 = 1+R 1 + k2 (UN N 1)SN 1U + BNU
= 1 +1 R 1 k2 (DN N 1)SN 1D + BND : (3.20)
27
We now show that the optimal portfolio at time tN 1, (Nj 1; BN j 1)jN=01, is a k-convex
payo. For this, we consider the diagram
UU
N
....
.... ........
......
UN 1................
..
.... ......... ..........
... ......
.. .. ......... ......
......
... .... ......
.... ......
N 2 ......... . .. DU
.
(SN 2 =S ) ...........
.
............. N
........ ...
........ .............
........ ..
........ ............
.......
.
DN 1 .................
........
........
......
DD
N
UD
N 5 N 1 5 N N 5 N 1 5 N ;
and DD (3.21)
U UU D DU
and therefore
B 1 B 1 = 1 +1 R SUD UD k U k
N + 1 1 + 2 N 1
D U D
N N
2 N 1
= 1 +1 R SUD kUD
N kUN 1 + 1 + k2 (UN 1 DN 1)
5
1 1 + k SUD(U DN 1)
N 1
1+R 2
< 1 + k2 SU (UN 1 DN 1) (3.23)
28
and
=
1 (1 k=2)SUD(U D )
N 1 N 1
1+R
Inequalities (3.22), (3.23) and (3.24) show that (N 1; BN 1) is a k-convex payo. We
have therefore proved Proposition 3.5 for n = N 1. The general proof now follows by
induction on n.
Pn n Sn + Bn
and
Qn n Sn :
These variables can be interpreted, respectively, as the value of the portfolio and the value
of its equity portion at time tn.14
In the case of risk-feasible underlying assets, explicit backward-induction equations for
the pairs ( Pn ; Qn ) can be derived by solving equation (3.7).
We shall avoid the use of superscripts by using the notation
8 8
>
< PnU+1 = Un+1SnU + BnU+1 >
< PnD+1 = Dn+1SnD + BnD+1
> >
(3.25)
: :
QUn+1 = Un+1SnU ; QDn+1 = Dn+1SnD :
13
In the rest of this section, we drop the superscript and use fn g and fBn g to represent the optimal
portfolio.
14
In this interpretation, the stock inventory is valued at the mid-price between the bid and the oer.
29
Proposition 3.6 If the underlying asset is risk-feasible, the pairs ( Pn ; Qn ) satisfy
8
>
>
>
>
>
>
< Pn = 1+1R U PnU+1 + D PnD+1 + ( 1)a 2(1+k R) U QUn+1 + ( 1)b D QDn+1
>
>
>
>
>
>
:
Qn =
1 PnU+1 PnD+1 + ( 1)a 2k
QUn+1 + ( 1)c QDn+1 ;
(3.26)
where D ; U ;
; a ; b and c, dened hereafter, are functions of ( Pn+1 ; Qn+1 ) (or, equiv-
alently, of (n+1; Bn+1)).
Specically, we have
Case 1:
Dn+1 Un+1
and
1 k2 SnD(Un+1 Dn+1) 5 BnD+1 BnU+1 5 1 + k2 SnU (Un+1 Dn+1) : (3.27)
In this case,
k
= 1+ 2 U 1 2 D ; k
U = (1 + R) (1 k=2)D ;
D = (1 + k=2)U
(1 + R) ;
and
a = +1 ; b = 1 c = +1 : (3.28)
Case 2:
Un+1 < Dn+1
and
1 + k2 SnD(Dn+1 Un+1) 5 BnU+1 BnD+1 5 1 k2 SnU (Dn+1 Un+1): (3.29)
30
In this case,
= 1 k2 U 1 + k2 D ;
U = (1 + R) (1 + k=2)D ;
D = (1 k=2)U (1 + R) ;
and
a = 1 ; b = 1 ; c = +1 : (3.30)
Case 3: Either
Dn+1 Un+1
and
1 k2 SnD(Un+1 Dn+1) > BnD+1 BnU+1;
or
Un+1 < Dn+1
and
B U
n+1 B D
n+1 > 1 k2 SnU (Dn+1 Un+1): (3.31)
= 1 k2 (U D) ;
U = (1 + R) (1 k=2)D ;
D = (1 k=2)U (1 + R) ;
and
a = 1 ; b = +1 c = 1 : (3.32)
Case 4: Either
Dn+1 Un+1
31
and
B D
B U k
> 1 + 2 SnU (Un+1 Dn+1);
n+1 n+1
or
Un+1 < Dn+1
and
1 + k2 SnD(Dn+1 Un+1) > BnU+1 BnD+1: (3.33)
In this case,
k
= 1 + 2 (U D) ;
U = (1 + R) (1 + k=2)D ;
D = (1 + k=2)U (1 + R) ;
and
a = +1 ; b = +1 c = 1 : (3.34)
Proof: The proof follows by solving for N 1 in Equation (3.7) and generalizing to
arbitrary values of n.
Proposition 3.7. If the nal payo is k-convex then the pairs (Pn; Qn ) satisfy the linear
backward-induction relation
8
>
>
>
>
>
>
< Pn = 1+1R U PnU+1 + D PnD+1 + 2(1+k R) U QUn+1 D QDn+1
>
(3.35)
>
>
>
>
>
:
Qn =
1 PnU+1 PnD+1 + 2k
QUn+1 + QDn+1 ;
with
= 1 + k2 U 1 k2 D ;
32
U = (1 + R)
(1 k=2)D ;
and
D = (1 + k=2)U (1 + R) :
Proof: The proof is immediate, since the portfolios (n; Bn) satisfy the conditions in
(3.27) for all n.
Remark 3.8. The eective cost of hedging a short position in a European option settled
in shares can be calculated from (3.35) for arbitrary values of k. On the other hand, a long
option position corresponds to a linear backward-induction equation dened by Case 2 of
Proposition 3.6 | provided that the underlying asset is risk-feasible. In both cases the
corresponding values coincide with those obtained by Boyle and Vorst (1992).
Remark 3.9. In general, D and U satisfy D + U = 1. For k > 0, D and U
are positive (in all four cases) only if the underlying asset is risk-feasible. If this condition
holds, D and U can be interpreted as \risk-neutral" probabilities for no-arbitrage pricing
with transaction costs. Otherwise, since at least one of the inequalities in (3.1) does not
hold, we have D U < 0 in Case 2 (cf. (3.30)). Thus, the scheme (3.26) becomes
numerically unstable and replicating strategies may result in negative or innite prices as
N % 1.
If k = 0, we have
U = 1 +U R DD D = U U 1 D R
and the backward-induction equations reduces to the classical result of Cox, Ross and
Rubinstein(1982)
Pn = 1+1R (U PnU+1 + D PnD+1)
8
>
<
(3.36)
>
: PnU+1 PnD+1
Qn = U D :
33
4. k -Convex Payoffs or Risk-Feasible Underlying Assets:
Asymptotics for N % +1
This section studies the backward-induction equations for N % +1. We recall rst
the standard Cox-Ross-Rubinstein scaling of the binomial tree, in which the parameters
U; D; R, and N are related to the annualized volatility, the interest rate, and the maturity
of the contingent claim. We then show that the optimal dynamic portfolio can be approxi-
mated by the solution of the partial dierential equation (1.2)-(1.3) and its derivative with
respect to the spot price.
4.1 Adjusting the model parameters.
We denote by T the time-to-maturity of a European-style derivative security and by
dt = NT
the time-interval between successive adjustments of the hedging portfolio. Following the
classical Cox, Ross, Rubinstein (1982) scaling for the binomial model, we set
8 pdt + dt
>
< U = e
> p + dt
(4.1)
:
D=e dt
and
R = erdt 1
= rdt; dt 1: (4.2)
Here, and r are the annualized volatility and interest rate, respectively. The parameter
represents the subjective drift (not adjusted for risk).15
The Leland number
A pk : (4.3)
dt
represents the \ percentage transaction costs per standard deviation for a single period".
Lemma 4.1. For dt suciently small, the underlying asset is risk-feasible if and only if
A < 1.
15
As in the classical CRR theory, the parameter will not appear in the asymptotic equations.
34
Proof. It follows from (3.1) that the underlying asset is risk-feasible if and only if
k < min U (1 + R) ; 1 + R D : (4.4)
2 U +1+R 1+R+D
and
p p
1 + R D = dt + O(dt) dt :
1 + R + D 2 + O pdt 2
p
Thus, for dt suciently small, risk-feasibility is equivalent to k=2 < dt =2 , or just
A < 1. Q.E.D.
4.2. A Comparison Principle.
h i
Denition 4.2. A hedging strategy fe j gNj=n; Ben is said to be -optimal at time tn for
the payo (N ; BN ) if:
h i
(i) fe j gNj=n; Ben + is a dominating strategy for (N ; BN );
and
h i
(ii) the eective cost of fj gj=n; Bn diers from the optimal eective cost V (; Sn)
e N e
of (N ; BN ) by at most dollars, i.e.,
V (; Sn ) Ben + (e n )Sn 5 :
35
Proposition 4.3. Consider a nal payo (N ; BN ). Assume that either this payo is
k-convex or that the underlying asset is risk-feasible. Suppose that there exist sequences
(Pen; Qen ) and (pn; qn ) having the following properties:
(i) e
Pn = Pen+1 + pn; n = 0; . . . ; N 1; (4.6)
Qen Qen+1 qn
(ii)
PeN = PN ; QeN = QN ; (4.7)
(iii) if the underlying asset is not risk-feasible, then for every n the intermediate \port-
folios" e
n Qen=Sn (4.8)
Ben Pen Qen
are k-convex for all n.
Dene (N n)
n 1 (1 + R) nmax k
(1 + R) 1 R 0 >n;S jpn0 (S )j + 2 jqn0 (S )j :
h i
Then, for each n ; 0 5 n 5 N 1 ; the strategy f gj=n e j N ; Ben is n optimal.
Proof. Let us introduce an auxiliary contingent claim with nal payo (N ; BN ) and
with intermediate payos (\coupons")
dn = qn=Sn ; (4.9)
bn pn qn
for n = 0; :::; N 1. The payos of this auxiliary security are represented in Diagram 4.1.
Let Ven(; Sn) represent its optimal eective cost given an endowment at time tn .
>From the assumptions (i) through (iii), we conclude that ( e n; B
en ) is the optimal risk-
averse strategy for hedging this security (see Remark 2.2), and that (Pen; Qen ) represents
the optimal portfolio in the variables (P; Q).
The minimum eective cost Ven (; Sn) can be estimated by stripping the intermediate
coupons from the nal payo and pricing them separately. For n0 = n, the coupon ( p0n ; qn0 )
can be purchased at
pn0 + k2 jqn0 j 5 nmax k
">n;S jpn" (S )j + 2 jqn" (S )j "n (4.10)
dollars. Its value at time tn is therefore at most "n(1 + R) (n0 n). Since the eective
cost of the auxiliary claim at time tn is at most equal to the eective cost of the original
36
... (33 ;B33 )
.........
....
(d22 ;b22...).........
.. ..
......... ..........
... ......
... ...... ......
......
(d11 ;b.11...)......... . . ... (23 ;B32 )
.... ........... ....
... ...... (d12;b12.).........
. ........ ...... ... ..
...... ... ...
0 0 ...
(d0 ;b0 ) ......... ... ................
...... ... ......
...... ... ...... ......
......
...... ..... ......
.........
(d01;b01 ) ........... ... (13 ;B31 )
...... ... ... .
..
...... . ...
...... ....... ..
.......
(d02 ;b02 )..............
......
......
......
(03 ;B30 )
Diagram 4.1.
contingent claim plus the present value of the estimated costs of the intermediate portfolios,
we conclude that
NX1
Ven(; Sn) 5 Vn (; Sn) + "n (1 + R) (j n) = Vn(; Sn) + n : (4.11)
j =n
Similarly, a lower bound for Ven(; Sn) is obtained by considering an auxiliary derivative
security that delivers, i intermediate coupons, " dollars at each trading
h in addition to the
e N
date. The strategy fj gj=n; Bn + n is clearly a dominating strategy for such security.
e
But, since the intermediate payments are all positive on account of (4.10), the strategy is
also dominating for the European contingent claim with one single payo (N ; BN ) at
time tN . Thus, we have
37
4.3 Asymptotic analysis.
We consider rst payos of the form
8
>
< N (SN ) = F 0 (SN )
>
(4.13)
:
BN (SN ) = F (Sn) SN F 0 (SN ) ;
where F (S ) is a four-times continuously dierentiable function satisfying
8 9
4 j =
S j d dS
<X F (S )
kF k sup :
j ; <1: (4.14)
S j =0
The boundedness and regularity assumption (4.14) is mathematically convenient but not
essential. In Section 4.4 we extend the results derived for the payos (4.13) to option
portfolios.
The main result of this section is:
Theorem 4.4. Let F (S ) be a function satisfying the regularity condition (4.14). Assume
that A < 1 or F(S) is convex. Let P (S; t) be the solution of the nal-value problem
8
>
> h i
> @P + 1 2 1 + A sign @ 2 P2 S 2 @@S2 P2 + rS @P
@S rP = 0
>
>
< @t 2 @S
>
(4.15)
>
>
>
>
:
P (S; T ) = F (S ):
Set
8
< Pn (Sn ) = P (Sn; tn)
> e
>
(4.16)
: e
Qn(Sn) = Sn @P
@S (Sn ; tn ) ;
and
e
n = Qen =Sn : (4.17)
Ben Pen Qen
Then:
(i) There exists a constant
C = C (r; ; ; A; T ) independent of F and dt, such that
Pn(Sn); Qn (Sn) satises the backward-induction equation
e e
38
e
Pn = Pen+1 + pn (4.18)
Qen Qen+1 qn
for n = 0; . . . ; N 1, with
Vn (; Sn ) Pen + k jQe S j S 5 C 0kF k(dt)1=2 : (4.20)
2 n n n
Proof. In view of Proposition (4.3), the proof consists in establishing that Pen is an
Qen
approximate solution to the backward-induction equation (3.26). We shall estimate the
remainders pn and qn in (4.19) using Taylor series expansions of pn and qn in powers of
p
dt.
Step 1: Reduction to r = 0: We can assume without loss of generality that R = r = 0.
In fact, this amounts simply to measuring values in dollars-at-expiration rather than in
present value.
Step 2: P (S; t) is locally convex: If PSS (S; t) = 0 in a neighborhood of the node of
interest, then the portfolio e n+1 ; Ben+1 is locally k-convex, i.e., condition (3.27) (Case 1
of Proposition 3.6) holds.
Using the denitions
, D and U in (3.28), we nd after some calculation that
p
(2 + A) dt ;
39
U 12 + (1=2)2 (1 + A) pdt ;
(2 + A)
and
D 21 + + (1 =2)2 (1 + A) pdt : (4.21)
(2 + A)
Expanding Pen+1 and Qen+1 in a Taylor series around (Sn ; tn+1), we nd that
p
PenD+1 = Pen+1 SnPeS;n+1 dt
+ 12 ( SnPeS;n+1 + Sn2 PeSS;n+1 ) 2 dt +
h i
2 3
O (jjS PSS jj0 + jjS PSSS jj0) dt3 = 2 (4.23)
and
Pen
U PenU+1 + D PenD+1
k U QeU D D
2 n+1 Qn+1 = pn
e (4.25)
and
with
h
i
jpnj
S 2 PSS
3 3=2
5 C 0 +
S PSSS
0 + kPt kt;1=2 (dt) (4.27)
and
h
i
jqnj
S 2 PSS
3
5 C 0 + S PSSS 0 + kPt kt;1=2 dt : (4.28)
Step 3: P (S; t) is locally concave: Next, we consider the case where PSS (S; t) < 0 in
a neighborhood of the node (Sn; tn). A calculation completely analogous to the previous
one shows that
and
41
where pn and qn satisfy (4.29) and (4.30). Thus, if P (; t) is concave as a function of S in a
neighborhood of the node, the recursion relation (3.26) corresponding to Case 2 is satised
to the desired order of approximation.
Step 4: Local concavity and nondegeneracy imply Case 2: Notice that we have not ver-
ied in Step 3 that the portfolios (e n+1 ; B
en+1 ) satisfy Case 2 (condition (3.29) of Proposi-
tion 3.6). This is necessary, since otherwise the estimates (4.31) and (4.32) are not relevant.
We now show that if P (S; t) is locally concave, then Case 2 indeed applies, provided that
PSS satises a non-degeneracy condition.
Setting P (S ) = P (S; tn+1), we have, as in the proof of Proposition 3.3,
SZn U
e Dn+1 eU
n+1 = jPSS (X )j dX
Sn D
and
SZn U
BenU+1 BenD+1 = X jPSS (X )j dX :
Sn D
SZn U
= Sn D (e Dn+1 e Un+1 ) + (X Sn D) jPSS (X )j dX
Sn D
eD
5 S n D (n+1 e Un+1 ) + 21 (max jPSS j )(Sn U Sn D)2
5 Sn D +
1 max jPSS j (S U Sn D) (e Dn+1 e Un+1 ) : (4.33)
2 min jPSS j n
Here, the maximum and minimum are taken over all X 2 [Sn D ; Sn U ]. Similarly,
42
SZn U
jPSS (X )j dX = Sn U
1 max jPSS j (S U Sn D) (e Dn+1 e Un+1 ) :
2 min jPSS j n
Sn D
(4.34)
We conclude that if
from the a-priori estimates given in the Appendix. Thus, we conclude that if PSS (X ) is
negative in a neighborhood of (Sn tn) and
Substituting these formulas and the Taylor expansions of Pn+1 and Qn+1 into (3.26) leads
to
and
and
p
qn = A Sn 2 dt Sn2 PSS Sn ; tn+1 + O ( jjF jj dt ) :
(4.44)
To estimate the remainders, we use the fact that S 2 PSS (S; t) is small. In fact, since
(4.39) does not hold, we may assume that
p
j Sn2 PSS Sn ; tn+1 j < 42C jjFAjj dt :
(4.45)
16 Roughly speaking, Cases 1 and 2 correspond to those nodes where the dollar-weighted curvature
S jPSS (S; t)j is suciently large. Cases 3 and 4 correspond to the vicinity of in
ection points of P (S ;t).
2
44
Substituting this inequality into (4.43) and (4.44), we conclude that pn and qn satisfy the
error estimates (4.19) when Case 3 holds. We omit the analysis of Case 4 , which is entirely
similar.
Step 6: Globally Convex Solutions: If F(S) is convex then by the maximum principle
P (S; t) is always convex. Therefore, according to Step 2 we conclude that the backward-
induction relation is satised within the error bounds given by (4.19). Furthermore, the
portfolios (e n; Ben) dened by (4.8) are always k-convex according to Proposition (3.3).
Step 7: Comparison Principle: The Theorem now follow from Proposition 4.3. In
fact, applyingh this result ini conjunction with the estimates on the remainders pn and qn,
we nd that f e j gN ; B
j =n en is a -optimal hedging strategy with
C kF k(dt)1=2 + A
2 C k F k ( dt )1=2 C kF k(dt)1=2 ;
Vn (; Sn) k
Pn + 2 jQn Snj Sn = Vn(; Sn)
e e
Ben + (e n
)Sn
5 C kF k(dt)1=2 : (4.46)
45
Pn = P (Sn ; tn) ; Qn = P (Sn ; tn) Sn @P (S@Sn ; tn) :
Then, we have
Vn (; Sn ) k
Pn + 2 jQn Snj Sn 5 C (dt)1=8 ; (4.47)
Proof. We shall proceed by approximations, reducing the proof to the case of the bounded
smooth payos treated in Theorem 4.4.
Step 1. Reduction to bounded payo: Consider a derivative security with the modied
nal payo
8
>
< N (SN ) (0)
>
:
BN (SN ) ;
where (0) represents the (constant)
slope of the function F at innity. Clearly, the payo
function N (SN ) SN + BN (SN ) = F (SN ) (0) SN is uniformly bounded.
(0)
As observed in Remark 2.3, the addition or subtraction of a xed number of shares to the
nal payo of a contingent claim induces a trivial change in the optimal hedging strategy:
the hedge-ratio is simply translated by the constant number of shares. Notice also that the
solution of the nonlinear PDE (4.15) with the modied nal payo F (SN ) (0) SN is
given by P (S; t) (0) S , where P (S; t) solves (4.15). The modied Delta is @P
@S .
(0)
Thus, since the hedging problem and the PDE are both invariant under the addition of
a linear function to the nal payo we may assume without loss of generality that F is
bounded.
Step 2. Approximation by bounded smooth payo : Given any bounded, continuous
piecewise linear function F satisfying the assumptions of the theorem and any > 0, we
can construct a function F(SN ) with the following properties:
1=2
Pn + k2 jQn Snj Sn 5 C (dt3) + C (dt)1=2 ;
()
V (; Sn) (4.52)
n
(dt)1=2
Pn + k2 jQn Snj Sn
Vn (; Sn ) 5 C + (dt)1=2 + : (4.54)
3
It is clear that the magnitude of the regularization parameter which minimizes the right-
hand side of this last expression is / C (dt)1=8 . The conclusion of Theorem 4.5 follows.
Remark 4.6: Portfolios of European-style calls and puts | settled in cash or in shares |
satisfy the assumptions of Theorem 4.5. The theorem also applies to barrier options with
continuous payos. We note, however, that Theorem 4.5 does not apply to contingent
claims with discontinuous payos, such as digital options or \up-and-out" barrier options.
Nevertheless, even in the case of discontinuous payo functions, the solution of (4.15) pro-
vides satisfactory numerical approximations to the BLPS cost function (see, for instance,
Figure 1.4 in the Introduction).
Remark 4.7 In the course of the proof we obtained also an O dt1=8 | optimal hedging
strategy, in which the hedge-ratio is the derivative of a regularized solution of the PDE
in (4.15) with payo F . This result is weaker than Theorem 4.4, since we have not
demonstrated the dt | optimality of the strategy which uses the Deltas ( @P @S ) of the
exact solution of (4.15). The reason for this is that Theorem 4.4 assumed strong regularity
condition of the payo function in order to obtain error estimates for residuals. A proof of
the optimality of the hedging strategy n = @P (@S Sn ;tn ) can be done at the expense of a
more elaborate analysis, taking into account the behavior of the Deltas in a neighborhood
48
of the jump discontinuities of F 0 , near expiration. We shall not elaborate on this point
further, observing that the dt | optimality of such strategy is well-supported by Monte-
Carlo simulations (Avellaneda and Paras (1994), for piecewise linear payos.
We note also that Theorem 4.5 does not apply directly to contingent claims with discon-
tinuous payo functions, such as digital options. Nevertheless, payos with discontinuities
can be super- and sub-dominated by piecewise linear functions which approximate the pay-
o function everywhere except near points of discontinuity. Even in the case of contingent
claims with discontinuous payo functions, the solution of (4.15) provides an satisfactory
numerical approximation to the BLPS cost function for A < 1 (see Figure 1.4).
49
5. Non-convex payoffs with A = 1
and Path-dependent strategies
We characterize the solution of the BLPS algorithm for contingent claims with mixed
convexity in the regime A = 1. Under these circumstances, the optimal strategies are path-
dependent and the BLPS algorithm does not correspond to the the backward-induction
equation (3.26). The optimal strategies and their eective cost can be characterized in the
limit N % +1 by means of a nonlinear PDE corresponding to an obstacle problem for a
Black-Scholes PDE with an adjusted volatility.
5.1 The Obstacle Problem and its associated hedging strategy.
Denition 5.1. We say that P (S; t) is the solution to the obstacle problem with payo
F (S ) if
P (S; t) = e r(T t) F (Ser(T t)) ; (5.1)
@P + 1 2 (1 + A)S 2 @ 2 P + rS @P rP 5 0 (5.2)
@t 2 @S 2 @S
for all (S; t) and
@P + 1 2(1 + A)S 2 @ 2P + rS @P rP = 0
@t 2 @S 2 @S
whenever
P (S; t) > e r(T t) F (Ser(T t)) ; (5.3)
with
P (S; T ) = F (S ) : (5.4)
Remark 5.2. This free-boundary problem has a unique solution for any bounded, contin-
uous payo function F (S ) and is mathematically well-posed. It represents a natural \con-
tinuation" of (4.15) for A = 1, which corresponds formally to solving the nal-boundary
problem for a degenerate nonlinear PDE with a diusion coecient equal to 2 (1 + A) for
PSS > 0 and 0 for PSS 5 0 (in the sense of \viscosity solutions" (see Crandall, Ishii and
Lions (1992)). For
p convex payos, it reduces to the well-known Black-Scholes equation
with volatility 1 + A proposed by Boyle and Vorst (1992) (cf. also Section 4).
The contact set associated with the obstacle problem (5.1)-(5.4) is
n o
C = (S; t) : P (S; t) = e r(T t)F (er(T t) S ) ; t < T : (5.5)
50
This is a closed set in the (S; t)-plane. We shall denote its boundary by @ C.
We will denote by Rn the ray in the (S; t)-plane which joins the points (Sn 1; tn 1) and
(Sn; tn).
Denition 5.3. We dene the hedging strategy associated with the obstacle problem as
the strategy with initial cash reserve given by
B0 = P (S; t) 0 S (5.6)
and with a sequence of stock-holdings fng obtained through the following two phase
process, starting in Phase I if (S0; t0) 2= C and in Phase II otherwise.
until the rst trading date tn0 at which the ray Rn0 intersects @ C or n0 = N . If tn0 = tN
the stock-holdings are adjusted to N = F 0 (SN ) and the strategy stops. Otherwise, the
strategy goes into Phase II.
Phase II: Static Hedging: Denote by (S ; t ) the point at which Rn0 intersects @ C (see
Figure 5.1).18 Thereafter, the hedge-ratio is maintained xed at the value
n = @P 0
@S (S ; t ) = F (S ) ; (5.8)
18 If n0 = 0 then (S ; t ) = (S0 ; t0 ).
51
Theorem 5.4. Assume that A = 1. Let F(S) be a function satisfying the regularity con-
dition (4.14) and let P (S; t) be the solution to the obstacle problem (5.1)-(5.4). Consider
the European-style contingent claim with payo
8
>
< N (SN ) = F 0 (SN )
>
(5.10)
:
BN (SN ) = F (SN ) SN F 0 (SN ) ;
and let [fngNn=0; B0 ] be the hedging strategy associated with the obstacle problem (cf.
(5.6)-(5.9)). Then, [fngNn=0; B0] is a C kF k (dt)1=2 -optimal hedging strategy for
(N ; BN ), where C is a constant which depends on ; ; A and T .
Proof. The proof of Theorem 5.4 is done by deriving upper and lower bounds on the
eective cost function Vn(; S ). Proposition 5.10 hereafter shows that P (S; t) S
C kF k (dt)1=2 is a lower bound of the minimum eective cost. Proposition 5.14 shows that
[fngNn=0; B0 + C kF k (dt)1=2 ] dominates the nal payo and hence Vn(; S ) 5 P (S; t)
S + C kF k (dt)1=2 . The Theorem follows immediately from these two propositions.
Remark 5.5 The assumptions on the payo and on the regularity of the function F
are made for mathematical convenience. The generalization of Theorem 5.4 to payos
corresponding to option portfolios is done as in the case A < 1 (See Paragraph 4.4).
We assume hereafter that r = 0, which amounts to measuring values in dollars-at-
expiration rather than in present value. The letter C will denote a generic constant which
depends on ; ; A and T and which may vary from one inequality to another.
5.2 The lower bound.
For the purposes of comparing various cost functions, it is convenient to consider models
in which the transaction cost parameter may vary from one node of the binomial tree to
another, i.e.
k = k (n ; j ) ; 05j5n5N : (5.11)
S
Figure 5.1. Schematic rendering of the binomial lattice near the contact set C. The
heavy dots represent the points in D C.
p
Vn(1)(n 1; Sn) = F (Sn ) n 1Sn + 2 dt jn 1 j Sn C kF k (dt)1=2 (5.13)
0
0
= P (A ) (Sn ; tn ) Sn + k2 jj Sn C kF k (dt)1=2 ;
0
where we used the fact that S PS(A ) is uniformly bounded. The desired estimate, (5.13),
will follow by letting A0 % 1, after we establish that
W (S; t) F (S ) (T t) ;
54
where is a positive constant. We claim that W (S; t) is a sub-solution of the equation
@P + 1 2 1 + A0 sign @ 2 P
2
@t 2 @S 2 S 2 @@SP2 = 0 (5.15)
for A0 suciently close to 1. In fact, since S 2 ddS2F2 5 kF k,
@W + 1 2 1 + A0 sign @ 2W
2
@t 2 @S 2 S 2 @@SW2
2F 2
1
= +2 2 1 + A 0 sign d S 2 ddSF2
dS 2
=
1 2 [1 A0 ] kF k
2
= 0
whenever A0 > 1 kF2k2 . Assume henceforth that A0 is in this range. Since W (S; t) is a
sub-solution of (5.15) and P (A0)(S; t) is a solution and, moreover, W ( S; T ) = P (A0 ) (S; T )
= F (S ), we conclude from the Maximum Principle that P (A0)(S; t) = W (S; t) for t < T .
Therefore,
0
lim P (A )(S; t) = W (S; t) = F (S )
A0 "1
(T t) >0:
Letting # 0 in this last inequality, we conclude that (5.14) holds, and the proof is
complete.
Lemma 5.8. Let tn0 5 tN be the rst hitting time of the set DC (with t0n = tN if the path
does not hit DC). Assume that the transaction cost is given by (5.12), and let Vcn0 (; Sn)
represent the minimum eective cost of the contingent claim with payo
8
>
< n0 (Sn0 ) = F 0 (Sn0 )
>
(5.16)
:
Bn0 (Sn0 ) = F (Sn0 ) Sn0 F 0 (Sn0 ) :
Then, for any n < n0 and any initial endowment n 1,
55
Vn(1)(n 1; Sn) = Vcn0 (n 1; Sn ) C kF k(dt)1=2 : (5.17)
Vn(1)
0 (n0 1 ; Sn0 ) = Vc0
n0 (n0 1 ; Sn0 ) C kF k (dt)1=2 : (5.18)
Inequality (5.17) then follows from Proposition 2.4. Q.E.D.
>
(5.20)
: e
Bn0 (Sn0 ) = Pn0 Qn0 ;
when t = tn0 and denote its minimum eective cost function under the transaction cost
function (5:12) by W
cn (; Sn ). Then
56
( i) Vcn0 (; Sn) = W
cn (; Sn ) C kF k (dt)1=2 (5.21)
for all n 5 n0 and all ; and
Pn + k2 jQn
(ii) W
n ( ;
c Sn) Sn j Sn 5 C jjF jj (dt)1=2 : (5.22)
This ensures that the payo (5.16) dominates (both in the number of shares and in bonds)
the payo (5.10), up to and error of order C kF k (dt)1=2 . Hence, (5.21) follows.
(ii) Since P (S; t) is convex in the complement of C, the portfolios
e n; B
( en )= (Qn =Sn; Pn Qn), with Pn and Qn given by (5.22) are k-convex as well
(1) P
as k -convex. We know that Qn satises the recursion relation
n
Pn = Pn+1 + pn n 5 n0 1;
Qn Qn+1 qn
with remainders satisfying
57
To derive an estimate for the remainders pq^^nn00 11 , observe that k and k(1) dier only by
p
by (A 1) dt along D C. Hence, the backward-induction operators and (1) satisfy
p
k (1) k _ dt
and Pn0 and Qn0 pare uniformly bounded, the remainders in (5.24) for n = n0 1 can be at
most of order O( dt).
cn (; Sn ) now follows from Proposition 4.3.20
The estimate (5.22) for W
Proposition 5.10. Let Vn(; Sn) denote the minimum eective cost function for the
contingent claim with payo (5.10), with constant k = 1.pLet P (S; t) represent the solution
of the obstacle problem with Leland number A = k=( dt). Then,
Vn( ; Sn) = P (Sn; tn) Sn + k2 jSn PS0 (Sn; tn) Snj C kF k (dt)1=2 : (5.25)
Using Lemma 5.9, eq. (5.21), we conclude that Vn(; Sn) satises the lower bound (5.25).
Q.E.D.
20In order to obtain the right estimate from Proposition 4.3, must be obtained by rst adding
the residuals jpn j + k2 jqn j which are of order O (dt)3=2 , and then adding the O (dt)1=2 term from
jpn0 1 p^n0 1 j + k2 jqn0 1 q^n0 1 j.
58
5.3 Analysis of the associated strategy and upper bound.
In this paragraph, we prove that the strategy associated with the obstacle problem
dominates the nal payo. We shall denote by n the mid-value of the hedge portfolio,
i.e.,
n n Sn + Bn : (5.27)
n n Pn n = 0; 1; :::; N ; (5.28)
where Pn is dened in (5.19). In particular, N represents the overall prot/loss generated
by the strategy associated with the obstacle problem.
k j
2 j+1 j j Sj+1 = Pj+1
j (Sj+1 Sj ) Pj + j+1 ;
0 2
nX 0 1
nX
= n + [Pj+1 Pj ] + j+1
j =n j =n+1
0 1
nX
= n + Pn0 1 Pn + j+1 :
j =n+1
60
Therefore
0 1
nX
jn0 1 nj = j (n0 1 Pn0 1 ) (n Pn ) j 5 jj+1j : (5.35)
j =n+1
Proof. Denote by (S ; t ) the point where @ C intersects R 0 1. The proof of the propo-
n
sition is divided into several steps.
t) 2 @ C we use the following convention
For any given pair (S;
Pt(S ; t ) lim Pt(S; t) ;
(S;t)!(S;
t)
(S;t)2
=C
We shall give a proof of the Proposition under the assumption that (Sn" 1; tn" 1) 2= C.
The case (Sn" 1; tn" 1) 2 C is analogous. Under this assumption, denote by S o the
value of S at which the segment joining (Sn0 ; tn" 1 ) and (Sn" 1; tn" 1) intersects @ C (see
Figure 5.2.A).
Step 1: Change in value of the hedging portfolio: The mid-value of the portfolio at time
tn" is
(SO,t n-1 )
(Sn ,t n)
Figure 5.2.a. Rendering of the boundary of the contact set and of the points (Sn0 ; tn0 )
(Sn00 ; tn00 ) and S0, used in the proof of Proposition 5.13.
V *)
)(S-S
,t*
(S*
VS
* )+
* ,t
V (S
V(S,t n)
F(S)
V(S,t n")
S
O
S* S S n"
Figure 5.2.b. Representation of the solution of the obstacle problem and the associated
hedging strategy after the point (S; t) enters C. A temporary holding strategy is implemented
after the rst hitting time, t . The value of the portfolio will then vary along the tangent
line to the graph of F (S ). Delta-hedging resumes after the portfolio Delta (the slope of the
line) and the theoretical Delta coincide at the price level Sn00 . Resuming Delta-hedging at
that time allows the agent to remain above the intrinsic value F (S ) if the market continues
to rally. 62
By Taylor expansion of the seond and third terms, we nd that
= A 2 S 2 P (S ; t ) dt + ; (5.41)
2 n" SS n" n" 3
where
j1 (Sn0Sn0 1) + k2 2 Sn0 + 3 j 5 C kF k (dt)3=2 :
Substituting (5.39)-(5.41) into (5.38), and using (5.37) we get
where
4 = 1 (Sn0 Sn0 1) + k2 2 Sn0 + 3 :
Step 2: Change in the value function: A Taylor expansion of P (S "; t ") gives n n
SZ
n" 1
SZ
n" 1
Step 3. Change in value of : Subtracting (5.43) from (5.42), and taking into account
that (5.33) holds at (Sn" 1; tn" 1), we have
o SZ
n" 1
ZS
n" n0 1 = [F 0 (S ) F 0 (S )] dS + [F 0 (S ) PS (S; tn" 1)] dS
S So
o SZ
n" 1
ZS
= [F 0 (S ) F 0 (S )] dS + [F 0 (S ) PS (S; tn" 1)] dS
S So
64
Also, P (S; tn" 1) is convex in the interval [S o; Sn" 1], therefore
F 0 (S ) > PS (Sn" 1; tn" 1 ) (5.47)
or else the rst time condition in (5.9) would be violated. The convexity in the interval
plus condition (5.47) imply
SZ
n" 1
References
D.G. Aronson (1967), \Bounds for the fundamental solution of a parabolic equation", Bull.
Amer. Math. Soc.,73, 890-896.
C. Albanese and S. Tompadis (1995), \Transaction Costs and Non-Markovian Delta-
Hedging", preprint, Department of Mathematics, University of Toronto.
M. Avellaneda and A. Paras (1994), \Dynamic hedging for derivative securities in the
presence of large transaction costs", Applied Mathematical Finance, 1, 165-193.
B. Bensaid, J. Lesne, H. Pages and J. Scheinkman (1992), \Derivative asset pricing with
transaction costs", Mathematical Finance, 2 (2), 63-86.
P.P. Boyle and T. Vorst (1992), \Option replication in discrete time with transaction
costs", J. Finance, 47, 271-293.
G. Constantinides (1979), \Multiperiod consumption and investment behavior with convex
transaction costs", Management. Sci., 25, 1127-1137.
G. Constantinides (1986), \Capital Market Equilibrium with transaction costs", J. Political
Econ. 94, 842-862.
J. C. Cox, S. Ross and M. Rubinstein (1979), \Options pricing: a simplied approach",
Journal of Financial Economics 7, 229-263
M. G. Crandall, H. Ishii and P.L. Lions (1992), \User's guide to viscosity solutions of
second-order partial dierential equations", Bulletin American Math. Soc., 27, (1), 1- 67.
J. Cvitanic and I. Karatzas (1995), Contingent claim pricing with transaction costs,
preprint, Department of Mathematics and Statistics, Columbia University.
66
M. H. Davis, V. G. Panas and T. Zariphopolou (1993), \European option pricing with
transaction costs ", SIAM J. Control and Optimization, 31, 470-493.
B. Flesaker and L. P. Houghton (1994), \Contingent claim replication in continuous time
in the presence of transaction costs", Merrill Lynch working paper.
A. Friedman (1964), Partial dierential Equations of Parabolic type, Prentice-Hall, Inc.,
Englewood Clis, N.J.
A. Friedman (1982), Variational principles and free-boundary problems, Wiley Interscience,
New York.
E. R. Grannan and G. H. Swindle (1994), \Minimizing transaction costs of option hedging
strategies", preprint, to appear in Mathematical Finance.
S. D. Hodges and L. Clelow (1993), \ Optimal Delta-hedging under transaction costs",
preprint, Financial Options Research Center, University of Warwick.
S. D. Hodges and L. Clelow (1994), \ Gamma-hedging in incomplete markets under trans-
action costs", preprint, Financial Options Research Center, University of Warwick.
S.D. Hodges and A. Neuberger (1989), \Optimal replication of contingent claims under
transaction costs", The Review of Futures markets, 8, 222-239.
T. Hoggard, E. Whalley and P. Wilmott (1993), \Hedging option portfolios in the presence
of transaction costs", to appear in Advances in Futures and Options Research
N. V. Krylov (1985), Nonlinear elliptic and parabolic equations of second order, Mathe-
matics and its Applications
D. Kinderlehrer and G. Stampacchia (1980), An introduction to variational inequalities
and their applications, Academic Press, New York.
H. E. Leland (1985), \Option pricing and replication with transaction costs", J. Finance
40, 1283-1301
J. Nash (1958), \Continuity of solutions of parabolic and elliptic equations", Amer. J.
Math., 80, 951-954.
E. Whalley and P. Wilmott (1993), \Counting the costs ", RISK, 6 p. 10
67
Appendix: Regularity of Solutions
of the Nonlinear Diffusion Equations and
Obstacle Problems
The proofs of Theorems 4.4 and 5.4 required the regularity of the solutions of the
nonlinear PDE problems (4.15) and (5.1)-(5.4). The main result that was used is
Proposition A.1. (i) Let F satisfy (4.14) and let P (S; t) be the solution of the nonlinear
problem (4.15). Then
sup S @@SPj 5 C kF k
j
j
S;t
for 0 5 j 5 3 and
kPt kt;1=2 5 C kF k ;
where
0
kPt kt;1=2 sup jPt(S; t)j + sup0 jPt(S;jtt) t0 jP1=t2(S; t )j
S;t S;t;t
We give only an outline of the proof, and refer the reader to Friedman (1964, 1982)
and Kinderlehrer-Stampacchia (1980) for for the general regularity theory of parabolic
equations.
A.1 The case A < 1.
We shall assume without loss of generality that r = 0. This changes the PDE in (4.15)
to the simpler form
Then,
j
sup @@yP (y; t) < C kF k ;
3
X
j
(A.5)
y;t
j =0
and
kPt kt;1=2 < C kF k ; (A.6)
where C is a constant that depends only on ; A and T .
Proof: (i) The uniform boundedness of P follows immediately from the Maximum Prin-
ciple applied to equation (A.3).
(ii) The estimate for Py follows by dierentiating formally (A.3) with respect to y.
Accordingly, setting Q Py , we obtain
Qt + 21 @y ~2 (Qy
Q) = 0 : (A.7)
69
The Nash estimates for the fundamental solutions of parabolic equations with bounded,
measurable coecients (see Nash (1958), Aronson (1967)) imply that there exists a con-
stant C , which depends only on A and T , such that
(iii) To estimate the second derivative with respect to y, we rewrite equation (A.7) in
the form
Qt + 21 @y G (Qy Q ) = 0 ; (A.8)
2 y y
+ 12 @y G (Qy Q)
= 1@ n
H
Q (h)
Qy Q (h)
+Q
o
: (A.9)
2 y y
D(h) = h1 Q(h)
Q :
Dt + 12 @yy
2
fG (D Q) g = 0 : (A.11)
@t + 21 @yy
2
G ( )
1 @ G () = 0:
2 y (A.12)
We analyze the dierence-quotients for , namely
2 @y H = 0: (A.13)
(h) 2 (h) (h)
where H is dened as before. We can regard this last equation as the adjoint of
@t = 21 H @yy2 + 1 H@ ;
2 y (A.14)
which is the Fokker-Plank equation of an L1-bounded semigroup (see Krylov (1985)). This
implies that the adjoint semigroup is bounded on L1.21 Hence, the dierence-quotients
(h) are bounded uniformly in h in terms of the initial data. Passing to the limit as h ! 0,
we conclude that Pyyy is uniformly bounded in terms of kF k.22
(v) The Holder-1/2 estimate for Pt. Since jS 2 PSS j is uniformly bounded, we conclude
from (A.1) that Pt is bounded in terms of kF k.
21 L1 and L1 denote, respectively, the spaces of Lebesgue integrable and uniformly bounded functions.
22 The third derivative of P is not continuous. This can be checked by writing equation (A.11) in
divergence form (as in (A.10). This equation implies that the \
uxes" H (Dy D) must be continuous
across the curves where PSS vanishes. Expressing this in terms of the variable S , we nd that the ratio of
+ =P
the third derivatives along such curves is given by PSSS SSS = (1 A)=(1+ A), where the superscripts
correspond to the sign of the second derivative on each side of of the interface.
71
Let us analyze the modulus of continuity of Pt in the variable t. Dierentiating formally
equation (A.3) with respect to t and setting Pt , we nd that
(y; T ) = 1 ~2 [ F F 1 G (F
y ] ( Fyy F y) = Fy ) ;
2 yy
2 yy
A.2 The obstacle problem for A = 1: Analogy with the Stefan problem of heat
conduction.
The obstacle problem (5.1)-(5.4) has many features in common with classical free-
boundary problems discussed in the PDE literature (Friedman (1964, 1982), Kinderlehrer
(1980)). To derive the regularity properties of solutions, we shall rst analyze the com-
patibility conditions satised by P along the free boundary. As usual, we assume that
r = 0.
Let us postulate, heuristically, that the free boundary can be represented locally as a
graph, i.e. that
(S; t) 2 @ C () S = S (t) ;
where S (t) is a smooth function. With this notation, we have
Pt + 12 2 (1 + A) S 2 PSS = 0; (A.19)
and
S_ (t) = 1
FSS (S (t)) S (S (t); t) ; (A.23)
where S = S (t) denotes the boundary of the set where vanishes. This problem is known
as the Stefan problem.23
Notice that the speed of the free-boundary is determined by the \Stefan constant"
23 Classically, the Stefan problem describes the evolution of the temperature prole of a two-phase
medium, such as ice and water. The interface condition (A.23) expresses that the velocity of the phase-
boundary is proportional to the temperature
ux across it.
73
K (S (t)) = 1
FSS (S (t)) ; (A.24)
which depends on the curvature of the payo function F . Herein lies an important dier-
ence with regards to the classical Stefan problem. If FSS (S (t)) = 1, then the free-
boundary will move with zero speed. Also, if
FSS (S (t)) = 0 , it moves with innite speed, which means that the function P (S; t)
at such times can be regarded as the new data for a Stefan problem with a dierent
location of the free-surface.
The two extreme cases, far from being pathological, correspond in fact the case of option
portfolios, when the payo F is piecewise-linear. The solution of the obstacle problem for
these cases was completely described in Avellaneda and Paras (1994). Due to the innite
curvature, the free boundaries are \pinned" exactly at those points S where the payo
function has a discontinuous second derivative and is locally concave, i.e. FSS / (S
S ). The solution of the obstacle problem reduces then to \pasting together" solutions
of two-point boundary-value problems for equation (A.19). The regularity properties of
solutions follow immediately. Aside from a nal time-interval near the expiration date T ,
where the payo function F may have concave kinks outside C, the solution of the obstacle
problem for piecewise-linear payos satises the estimates
S @@SPj < 1
3
X j
sup j
> 0
j =0 (S;t)2
= C ;t =
74