This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Polynomial Voting Rules

Wenpin Tang Department of Industrial Engineer and Operations Research, Columbia University. [email protected]  and  David D. Yao Department of Industrial Engineer and Operations Research, Columbia University. [email protected]
Abstract.

We propose and study a new class of polynomial voting rules for a general decentralized decision/consensus system, and more specifically for the PoS (Proof of Stake) protocol. The main idea, inspired by the Penrose square-root law and the more recent quadratic voting rule, is to differentiate a voter’s voting power and the voter’s share (fraction of the total in the system). We show that while voter shares form a martingale process that converge to a Dirichlet distribution, their voting powers follow a super-martingale process that decays to zero over time. This prevents any voter from controlling the voting process, and thus enhances security. For both limiting results, we also provide explicit rates of convergence. When the initial total volume of votes (or stakes) is large, we show a phase transition in share stability (or the lack thereof), corresponding to the voter’s initial share relative to the total. We also study the scenario in which trading (of votes/stakes) among the voters is allowed, and quantify the level of risk sensitivity (or risk averse) in three categories, corresponding to the voter’s utility being a super-martingale, a sub-martingale, and a martingale. For each category, we identify the voter’s best strategy in terms of participation and trading.

Key words: Cryptocurrency, economic incentive, fluid limit, phase transition, polynomial voting rules, Proof of Stake protocol, stability, urn models.

AMS 2020 Mathematics Subject Classification: 60C05, 60F05, 60G42, 91B08.

1. Introduction

Voting, in the traditional sense, refers to a set of rules for a community of individuals or groups (“voters”) to reach an agreement, or to make a collective decision on some choices and ranking problems. In today’s world, “voting” has become a ubiquitous notion that includes any decentralized decision-making protocol or system, where the voters are often abstract entities (“virtual”), and the voting process automated; and the purpose of reaching consensus is often non-social and non-political, such as to enhance the overall security of an industrial operation or infrastructure (Garcia-Molina (1982); Lamport et al. (1982)). Examples include cloud computing (Armbrust et al. (2009); Dean and Ghemawat (2008)), smart power grids (Huang and Baliga (2009)), and more recently, trading or payment platforms and exchanges built upon the blockchain technology (Nakamoto (2008); Wood (2014)).

At the core of a blockchain is the consensus protocol, which specifies a set of voting rules for the participants (“miners” or validators) to agree on an ever-growing log of transactions (the “longest chain”) so as to form a distributed ledger. There are several existing blockchain protocols, among which the most popular are Proof of Work (PoW, Nakamoto (2008)) and Proof of Stake (PoS, King and Nadal (2012); Wood (2014)). In the PoW protocol, miners compete with each other by solving a hashing puzzle. The miner who solves the puzzle first receives a reward (a number of coins) and whose work validates a new block’s addition to the blockchain. Hence, while the competition is open to everyone, the chance of winning is proportional to a miner’s computing power.

In the PoS protocol, there is a bidding mechanism to select a miner to do the work of validating a new block. Participants who choose to join the bidding are required to commit some “stakes” (coins they own), and the winning probability is proportional to the number of stakes committed. Hence, a participant in a PoS blockchain is actually a “bidder,” as opposed to a “miner” — only the winning bidder becomes the miner validating the block. (Any participant who chooses not to join the bidding can be viewed as a bidder who commits zero stakes.) Needless to add, bidding exists long before the PoS protocol, and has been widely used in many applications, such as auctions and initial public offerings (IPOs).

Let’s explore the PoS bidding mechanism a bit more formally. Suppose a voter (or bidder) kk is in possession of nk,tn_{k,t} votes (or stakes) at time tt, an index that counts the rounds of voting or bidding in the protocol; and Nt:=knk,tN_{t}:=\sum_{k}n_{k,t} is the total number of votes over all voters. Hence, voter kk’s share, fraction of the total, is πk,t:=nk,t/Nt\pi_{k,t}:=n_{k,t}/N_{t}. Following a traditional voting rule, voter kk’s chance or probability of winning, which we call voting power, will be equal to πk,t\pi_{k,t}, voter kk’s share. Yet, this doesn’t have to be the case. That is, any voter’s voting power needs not be equal to the voter’s share (of the system total). Indeed, there are often good reasons for the two to be different.

Historically, the English scholar Lionel Penrose famously proposed a square-root voting rule (Penrose (1946)), around the time when the United Nations was founded shortly after WWII. According to Penrose, a world assembly such as the UN should designate each country a number of votes that is proportional to the square root of its population. The obvious implication (which may or may not be what Penrose initially intended) is to limit the voting power of nations with very large populations. In the same spirit, the quadratic voting rule has attracted much attention in recent years (Lalley and Weyl (2018)). The idea is that each voter be given a budget (in dollars, for instance); the voter can cast multiple votes on any single or subset of choices or candidates on the ballot, with xx votes (for any choice) costing x2x^{2} dollars. Under both voting rules, the voting power is different from the voter’s share or representation in the system, population in the first case, and the budget in the second case.

Inspired by these ideas, we propose a class of polynomial voting rules, denoted Poly(α)\texttt{Poly}(\alpha), which grant every voter kk a voting power that scales the voter’s share πk,t\pi_{k,t} by a factor NtαN_{t}^{-\alpha} for α0\alpha\geq 0. When α=0\alpha=0, this reduces to the traditional voting case of power==share, which is a linear rule. When α=1\alpha=1, the rule resembles the square-root or the quadratic voting rules mentioned above in spirit, in terms of decoupling voting power from a voter’s share, but of course differs in both the application context and implementation schemes. As we will demonstrate, the general Poly(α)\texttt{Poly}(\alpha) rule is a time change of the Poly(0)\texttt{Poly}(0) rule, with the parameter α\alpha measuring how much the traditional α=0\alpha=0 rule is “slowed down,” namely, the voting power is diminished over time.

There are (at least) two reasons to consider slowed-down voting schemes in blockchains.

  • First, the block-generation time requires to be lower bounded due to network delay (see (Shi, 2020, Section 14.3)). Specifically, there is the principle of security:

    (1v)honest power>γdishonest power,orv<1γdishonest powerhonest power.(1-v)\cdot\mbox{honest power}>\gamma\cdot\mbox{dishonest power},\quad\mbox{or}\quad v<1-\frac{\gamma\cdot\mbox{dishonest power}}{\mbox{honest power}}. (1.1)

    Here “honest/dishonest power” refers to the voting power of honest/dishonest bidders. The parameter γ\gamma is a user-defined security factor; e.g., γ=2\gamma=2 means, honest power is expected to be twice as much as dishonest power; hence, γ\gamma measures how secure a distributed system is. When honest bidders broadcast their validation results, dishonest bidders may exploit network delay to attack; equivalently, network delay will reduce the honest power. Thus the term “1v1-v” plays the role of a discount factor, with vv proportional to network delay (the more severe network delay is, the smaller the discount 1v1-v is, and hence the larger vv is). Honest power is discounted also because honest bidders follow exactly the protocol while dishonest bidders do not comply with the rules. As we will illustrate (in the remarks following Theorem 6) slowing down the voting process enhances security. This is because decreasing voting power over time will increase the block generation time, which will mitigate network delay and make the principle of security (1.1) “easier” to hold.

  • Second, PoS blockchains suffer from malicious attacks known as Nothing at Stake (see e.g. Deirmentzoglou et al. (2019)). As pointed out in Bagaria et al. (2019), for the PoS longest-chain protocol, honest bidders focus exclusively on the longest chain while dishonest bidders can work simultaneously on all existing blocks. They showed that the PoS longest-chain is less secure than its PoW counterpart, assuming both honest and dishonest parties have constant voting power over time. However, as dishonest bidders have more flexibility, it is (much) more likely that they win and get rewarded, and their advantage is only amplified over time. This makes “constant voting power” highly undesirable. There are two general approaches to solving this problem: (i) adjust the amount of reward over time, (ii) slow down the voting process; both are aimed at preventing dishonest bidders from overpowering honest bidders as time evolves.

Here is an overview of our main findings and results. We prove that under the Poly(α)\texttt{Poly}(\alpha) voting rule, voter shares form a martingale process that converges to a Dirichlet distribution as tt\to\infty, while their voting powers follow a super-martingale process that decreases to zero over time (Theorem 6); and for both limits we also explicitly characterize their rates of convergence. Thus, the Poly(α)\texttt{Poly}(\alpha) voting scheme enhances security, preventing any voter or any group of voters from controlling the voting process and overpowering the system.

We further group the voters into two categories: large and small, according to the initial (time zero) votes they own relative to the total (N0N_{0}). When N0N_{0} is large, which is the case in most applications, we show a phase transition in the stability of voter shares across the two categories (Proposition 7). Notably, the same phenomenon is demonstrated under the traditional voting rule (α=0\alpha=0), refer to Roşu and Saleh (2021); Tang (2022). Our result establishes that this phase transition is in fact universal, in the sense that it applies to all values of α(0)\alpha(\geq 0).

We also study the scenario in which trading (of votes/stakes) among the voters (or “bidders”) is allowed, motivated by PoS applications in cryptocurrency. For α=0\alpha=0, the trading scenario has been recently studied in Roşu and Saleh (2021). Not only our model is more general, in allowing any α0\alpha\geq 0, our results are also richer and sharper (Theorem 9). For instance, we quantify the level of risk sensitivity (or risk-averse) that results in three cases according to the voter’s utility being a super-martingale, a sub-martingale or a martingale. Each case will lead to a best strategy for the voter, including “non-participation” (not to participate at all in the bidding) and “buy out” (buying as many stakes as what is available), which are not considered in Roşu and Saleh (2021). Note that “buy-out” is a monopoly, and it is desirable to limit the number of stakes that any voter can acquire in a single round. This is studied in our subsequent paper Tang and Yao (2023) on trading PoS stakes with volume constraint. See also Tang (2023) for various problems (including transaction costs and voter’s collective behavior) related to the PoS trading.

The key to our analysis relies on the study of the random process NtN_{t} (the total volume of votes/stakes at time tt), which is a time-homogeneous Markov chain. We develop some asymptotic results for this Markov chain, including large-deviation bounds (Theorem 3) and a fluid limit (Proposition 5).

In the remainder of this paper there are two main sections. Section 2 studies the Poly(α)\texttt{Poly}(\alpha) voting model from a general perspective, focusing on the associated stochastic processes, such as NtN_{t}, voter shares, and voting powers; their long-term behavior and limits, some of which are further characterized by concentration inequalities or large-deviation bounds. Section 3 concerns two aspects of the Poly(α)\texttt{Poly}(\alpha) voting rule that are more closely associated with the application of PoS in cryptocurrency: (a) the evolution of bidder shares over time and the phase transition phenomenon mentioned above; (b) the issue of incentive and risk-sensitivity when trading is allowed. Concluding remarks and suggestions for further research are collected in Section 4.

2. The Poly(α)\texttt{Poly}(\alpha) Voting Model

In this section, we develop a formal model for the Poly(α)\texttt{Poly}(\alpha) voting rule, focusing on the stochastic processes associated with the model, their properties and limiting behavior.

First, here is a list of some of the common notation used throughout the paper.

  • +\mathbb{N}_{+} denotes the set of positive integers, and \mathbb{R} denotes the set of real numbers.

  • =d\stackrel{{\scriptstyle d}}{{=}} denotes equal in distribution, and d\stackrel{{\scriptstyle d}}{{\longrightarrow}} denotes convergence in distribution.

  • a=𝒪(b)a=\mathcal{O}(b) means ab\frac{a}{b} is bounded from above as bb\to\infty; a=Θ(b)a=\Theta(b) means ab\frac{a}{b} is bounded from below and above as bb\to\infty; and a=o(b)a=o(b) or bab\gg a means ab\frac{a}{b} decays towards zero as bb\to\infty.

  • dW(μ,ν)d_{W}(\mu,\nu) denotes the 11-Wasserstein distance between two probability distributions μ\mu and ν\nu. Refer to (Villani, 2009, Chapter 6).

We use C,C,C′′C,C^{\prime},C^{\prime\prime} etc to denote generic constants (which may change from line to line).

The voters, referred to as bidders below, are the participants in the decentralized system, where they engage in rounds of bidding following a pre-specified voting rule (the “consensus protocol”) so as to win more votes, or stakes. (The PoS protocol described in the Introduction provides a concrete instance to motivate the model here.) Let K+K\in\mathbb{N}_{+} be the total number of bidders, which will stay fixed throughout the paper; and let [K]:={1,,K}[K]:=\{1,\ldots,K\} denote the set of all bidders.

Time is discrete, indexed by t=0,1,2,t=0,1,2,\dots, and corresponds to the rounds of bidding mentioned above. Bidder kk initially owns nk,0n_{k,0} stakes. Let N:=k=1Knk,0N:=\sum_{k=1}^{K}n_{k,0} denote the total number of initial stakes owned by all KK bidders. The term bidder share refers to the fraction of stakes each bidder owns. So the initial bidder shares (πk,0,k[K])(\pi_{k,0},\,k\in[K]) are given by

πk,0:=nk,0N,k[K].\pi_{k,0}:=\frac{n_{k,0}}{N},\quad k\in[K]. (2.1)

Similarly, nk,tn_{k,t} denotes the number of stakes owned by bidder kk at time t+t\in\mathbb{N}_{+}, and the corresponding share is

πk,t:=nk,tNt,k[K],with Nt:=k=1Knk,t.\pi_{k,t}:=\frac{n_{k,t}}{N_{t}},\quad k\in[K],\quad\mbox{with }N_{t}:=\sum_{k=1}^{K}n_{k,t}. (2.2)

Here NtN_{t} is the total number of stakes at time tt, and thus N0=NN_{0}=N. (We shall often refer to NtN_{t} as the “volume of stakes” or, simply, “volume.”) Clearly, for each t0t\geq 0, (πk,t,k[K])(\pi_{k,t},\,k\in[K]) forms a probability distribution on [K][K].

In each period tt, a single stake (or “reward”) is distributed as follows: each bidder kk receives the reward with probability

θk,t:=nk,tNt1+α=πk,tNtα,\theta_{k,t}:=\frac{n_{k,t}}{N_{t}^{1+\alpha}}=\frac{\pi_{k,t}}{N_{t}^{\alpha}}, (2.3)

and receives nothing with probability 1θk,t1-\theta_{k,t}. Clearly, θk,t\theta_{k,t} is bidder kk’s reward rate, as 1/θk,t1/\theta_{k,t} is the average number of rounds for bidder kk to win an additional unit of stake. To the extent the reward is coupled with the voting mechanism outlined above, θk,t\theta_{k,t} can also be viewed as bidder kk’s voting power at time tt. (Below, we use the terms “reward rate” and “voting power” interchangeably if there is no ambiguity.) When α=0\alpha=0, the voting power θk,t\theta_{k,t} coincides with the bidder share πk,t\pi_{k,t}, which is the Pólya urn framework in Roşu and Saleh (2021), and in Tang (2022).

Let Sk,tS_{k,t} be the random event that bidder kk receives one unit of reward in period tt. Thus, the number of stakes owned by each bidder evolves as follows,

nk,t=nk,t1+1Sk,t,k[K];n_{k,t}=n_{k,t-1}+1_{S_{k,t}},\quad k\in[K]; (2.4)

or simply,

nk,t={nk,t1with probability1θk,t1,nk,t1+1with probabilityθk,t1.n_{k,t}=\left\{\begin{array}[]{lcl}n_{k,t-1}&\mbox{with probability}&1-\theta_{k,t-1},\\ n_{k,t-1}+1&\mbox{with probability}&\theta_{k,t-1}.\end{array}\right. (2.5)

Accordingly, the total number of stakes NtN_{t} evolves as follows, taking into account k=1Knk,t=Nt\sum_{k=1}^{K}n_{k,t}=N_{t},

Nt={Nt1with probability11/Nt1α,Nt1+1with probability1/Nt1α.N_{t}=\left\{\begin{array}[]{lcl}N_{t-1}&\mbox{with probability}&1-1/N_{t-1}^{\alpha},\\ N_{t-1}+1&\mbox{with probability}&1/N_{t-1}^{\alpha}.\end{array}\right. (2.6)

The counting process (Nt,t0)(N_{t},\,t\geq 0) specified in (2.6) evolves as a time-homogeneous Markov chain on {N,N+1,}\{N,N+1,\ldots\}, in contrast with the Pólya urn (with a constant reward) in which NtN_{t} grows deterministically and linearly in tt. As we will see in the next subsection, the Poly(α)\texttt{Poly}(\alpha) voting rule slows down the distribution of rewards, so the volume of stakes grows sublinearly. This is consistent with the volume growth in many cryptocurrencies such as Bitcoin and Ethereum.

Let 𝒏t=(n1,t,,nK,t)\boldsymbol{n}_{t}=(n_{1,t},\ldots,n_{K,t}) be the vector of bidder stakes at time tt. An alternative (and useful) characterization of (𝒏t,t0)(\boldsymbol{n}_{t},\,t\geq 0) is given as follows.

Proposition 1.

Let (Lt,t0)(L_{t},\,t\geq 0) be a counting process with arrivals occurring at 0=T0<T1<0=T_{0}<T_{1}<\cdots, such that the inter-arrival times are independent, with Tk+1TkT_{k+1}-T_{k}, for every k0k\geq 0, following a geometric distribution with success probability parameter (N+k)α(N+k)^{-\alpha}. Define the process (𝐥t,t0)(\boldsymbol{l}_{t},\,t\geq 0) by

𝒍t=𝒍Tkfor Tkt<Tk+1,\boldsymbol{l}_{t}=\boldsymbol{l}_{T_{k}}\quad\mbox{for }T_{k}\leq t<T_{k+1},

where (𝐥Tk,k0)(\boldsymbol{l}_{T_{k}},\,k\geq 0) is a copy of the Pólya urn process with KK colors and NN initial balls. Then, we have (𝐧t,t0)=d(𝐥t,t0)(\boldsymbol{n}_{t},\,t\geq 0)\stackrel{{\scriptstyle d}}{{=}}(\boldsymbol{l}_{t},\,t\geq 0), where 𝐧t\boldsymbol{n}_{t} is the process of bidder stakes defined above.

Proof.

It is clear from the dynamics in (2.6) that the two counting processes (Nt,t0)(N_{t},\,t\geq 0) and (Lt,t0)(L_{t},\,t\geq 0) have the same distribution. Given 𝒏t\boldsymbol{n}_{t}, the probability that the next (unit of) stake goes to bidder kk is nk,tNt1+α/1Ntα=nk,tNt\frac{n_{k,t}}{N_{t}^{1+\alpha}}/\frac{1}{N_{t}^{\alpha}}=\frac{n_{k,t}}{N_{t}} by the craps principle. The connection to the Pólya urn process with KK colors (voters) and NN initial balls (stakes) is obvious. ∎

The above proposition implies that the Pólya urn is embedded in the process of stakes (𝒏t,t0)(\boldsymbol{n}_{t},\,t\geq 0) through a random time change (Nt,t0)(N_{t},\,t\geq 0). This fact will be used below to study the long-time behavior of bidder shares and reward rates in §2.2. But we first study in the next subsection how the issuance of rewards is slowed down under the Poly(α)\texttt{Poly}(\alpha) voting rule.

2.1. The volume (Nt,t0)(N_{t},\,t\geq 0)

Let t\mathcal{F}_{t} be the filtration generated by the random events (Sk,r:k[K],rt)(S_{k,r}:k\in[K],\,r\leq t).

Proposition 2 (Long-time behavior of NtN_{t}).

Under the Poly(α)\texttt{Poly}(\alpha) voting rule, the following results hold:

  • (i)

    The process (Nt,t0)(N_{t},\,t\geq 0) is an t\mathcal{F}_{t}-sub-martingale, and its compensator is

    At=kt1Nkαfor t1.A_{t}=\sum_{k\leq t-1}N_{k}^{-\alpha}\quad\mbox{for }t\geq 1.
  • (ii)

    There is the convergence in probability:

    Nt1+αt1+αas t.\frac{N_{t}^{1+\alpha}}{t}\longrightarrow 1+\alpha\quad\mbox{as }t\to\infty. (2.7)
Proof.

(i) It suffices to note that 𝖤(Nt+1|t)=Nt+Ntα{\bf\sf E}(N_{t+1}\,|\,\mathcal{F}_{t})=N_{t}+N_{t}^{-\alpha}, for all t0t\geq 0.

(ii) Apply the method of moments by computing 𝖤(Nt(1+α)j){\bf\sf E}(N_{t}^{(1+\alpha)j}) for all jj. For j=1j=1, we have by definition

𝖤(Nt+11+αNt1+α|Nt=x)\displaystyle{\bf\sf E}(N_{t+1}^{1+\alpha}-N_{t}^{1+\alpha}\,|\,N_{t}=x) =(1+x)1+α1xα+x1+α(11xα)x1+α\displaystyle=(1+x)^{1+\alpha}\frac{1}{x^{\alpha}}+x^{1+\alpha}\left(1-\frac{1}{x^{\alpha}}\right)-x^{1+\alpha}
=1+α+𝒪(x1)as x.\displaystyle=1+\alpha+\mathcal{O}(x^{-1})\quad\mbox{as }x\to\infty.

It is clear that with probability one NtN_{t}\to\infty as tt\to\infty. As a result, 𝖤(Nt+11+αNt1+α)1+α{\bf\sf E}(N_{t+1}^{1+\alpha}-N_{t}^{1+\alpha})\to 1+\alpha as tt\to\infty which yields

𝖤Nt1+α(1+α)tas t.{\bf\sf E}N_{t}^{1+\alpha}\sim(1+\alpha)t\quad\mbox{as }t\to\infty. (2.8)

Next for j=2j=2, we have

𝖤(Nt+12(1+α)Nt2(1+α)|Nt=x)=2(1+α)x1+α+𝒪(xα)as x.{\bf\sf E}(N_{t+1}^{2(1+\alpha)}-N_{t}^{2(1+\alpha)}\,|\,N_{t}=x)=2(1+\alpha)x^{1+\alpha}+\mathcal{O}(x^{\alpha})\quad\mbox{as }x\to\infty.

Thus, 𝖤(Nt+12(1+α)Nt2(1+α))=(2(1+α)+o(1))𝖤Nt1+α2(1+α)2t{\bf\sf E}(N_{t+1}^{2(1+\alpha)}-N_{t}^{2(1+\alpha)})=\left(2(1+\alpha)+o(1)\right){\bf\sf E}N_{t}^{1+\alpha}\sim 2(1+\alpha)^{2}t by (2.8). Then we get 𝖤(Nt2(1+α))(1+α)2t2{\bf\sf E}(N_{t}^{2(1+\alpha)})\sim(1+\alpha)^{2}t^{2} as tt\to\infty. We proceed by induction. Assuming that 𝖤(Ntj(1+α))(1+α)jtj{\bf\sf E}(N_{t}^{j(1+\alpha)})\sim(1+\alpha)^{j}t^{j} as tt\to\infty, we get

𝖤(Nt(1+α)(j+1)Nt(1+α)(j+1))=((j+1)(1+α)+o(1))𝖤(Ntj(1+α))(j+1)(1+α)j+1tj,{\bf\sf E}(N_{t}^{(1+\alpha)(j+1)}-N_{t}^{(1+\alpha)(j+1)})=((j+1)(1+\alpha)+o(1)){\bf\sf E}(N_{t}^{j(1+\alpha)})\sim(j+1)(1+\alpha)^{j+1}t^{j},

which implies that 𝖤(Nt(1+α)(j+1))(1+α)j+1tj+1{\bf\sf E}(N_{t}^{(1+\alpha)(j+1)})\sim(1+\alpha)^{j+1}t^{j+1} as tt\to\infty. Thus, we have

𝖤(Nt(1+α)j)(1+α)jtjas t,j=1,2,{\bf\sf E}(N_{t}^{(1+\alpha)j})\sim(1+\alpha)^{j}t^{j}\quad\mbox{as }t\to\infty,\quad j=1,2,\ldots

By the method of moments (see e.g. (Billingsley, 1995, Section 30)), Nt(1+α)/tN_{t}^{(1+\alpha)}/t converges in distribution, and thus in probability to 1+α1+\alpha. ∎

The proposition gives the growth rate of the volume of stakes: NtN_{t} grows as ((α+1)t)11+α((\alpha+1)t)^{\frac{1}{1+\alpha}} as tt\to\infty. Part (i) suggests that Ntkt1NkαN_{t}\sim\sum_{k\leq t-1}N_{k}^{-\alpha}, which is consistent with the limit in (2.7). When α=0\alpha=0, NtN_{t} follows the (deterministic) linear growth of the Pólya urn model (with a constant reward). For α=1\alpha=1, NtN_{t} grows as t\sqrt{t}.

Even more important is the question, how does NtN_{t} “fluctuate” around its growth trajectory ((α+1)t)11+α((\alpha+1)t)^{\frac{1}{1+\alpha}}; specifically, how to establish large-deviation bounds on NtN_{t}? This is addressed in the next theorem, along with a corollary that confirms NtN_{t}’s concentration around its growth trajectory, for large tt.

Theorem 3 (Large deviations for NtN_{t}).

Define a function fα()f_{\alpha}(\cdot),

fα:λ(0,)(1+α)λlogλ(1+α)λ+1λα.f_{\alpha}:\lambda\in(0,\infty)\;\mapsto\;(1+\alpha)\lambda\log\lambda-(1+\alpha)\lambda+\frac{1}{\lambda^{\alpha}}\in\mathbb{R}.

Let λ(α)<λ+(α)\lambda_{-}(\alpha)<\lambda_{+}(\alpha) be the two roots of fα()f_{\alpha}(\cdot) on (,)(-\infty,\infty). Under the Poly(α)\texttt{Poly}(\alpha) voting rule, the following results hold:

  • (i)

    For each λ<λ(α)\lambda<\lambda_{-}(\alpha), and for any ε>0\varepsilon>0,

    𝖯(Nt<λt11+α)exp((1ε)fα(λ)t11+α)as t.{\bf\sf P}(N_{t}<\lambda t^{\frac{1}{1+\alpha}})\leq\exp\left(-(1-\varepsilon)f_{\alpha}(\lambda)\,t^{\frac{1}{1+\alpha}}\right)\quad\mbox{as }t\to\infty. (2.9)
  • (ii)

    For each λ>λ+(α)\lambda>\lambda_{+}(\alpha), and for any ε>0\varepsilon>0,

    𝖯(Nt>λt11+α)exp((1ε)fα(λ)t11+α)as t.{\bf\sf P}(N_{t}>\lambda t^{\frac{1}{1+\alpha}})\leq\exp\left(-(1-\varepsilon)f_{\alpha}(\lambda)\,t^{\frac{1}{1+\alpha}}\right)\quad\mbox{as }t\to\infty. (2.10)
Proof.

Without loss of generality, assume that N0=1N_{0}=1. Note that (Nt,t0)(N_{t},\,t\geq 0) has increments {0,1}\{0,1\}, so there are (tk)\binom{t}{k} paths ending at Nt=k+1N_{t}=k+1 (one has to choose kk upward steps “11” out of tt steps). Moreover, the probability of each path ending at Nt=k+1N_{t}=k+1 is upper bounded by

1(k!)α(11(k+1)α)tk,\frac{1}{(k!)^{\alpha}}\left(1-\frac{1}{(k+1)^{\alpha}}\right)^{t-k},

since the kk upward “11” steps contribute 1/k!1/k!, and the remaining tkt-k flat “0” steps have at most probability (11(k+1)α)tk\left(1-\frac{1}{(k+1)^{\alpha}}\right)^{t-k}. Thus,

𝖯(Ntm+1)kmakand𝖯(Nt>m)kmak{\bf\sf P}(N_{t}\leq m+1)\leq\sum_{k\leq m}a_{k}\quad\mbox{and}\quad{\bf\sf P}(N_{t}>m)\leq\sum_{k\geq m}a_{k}

where

ak:=(tk)1(k!)α(11(k+1)α)tk.a_{k}:=\binom{t}{k}\frac{1}{(k!)^{\alpha}}\left(1-\frac{1}{(k+1)^{\alpha}}\right)^{t-k}. (2.11)

Standard analysis shows that there are 0<k1<k20<k_{1}<k_{2} such that aka_{k} is nondecreasing on [1,k1)[1,k_{1}) and [k2,t)[k_{2},t). As we will see, k1λ(α)t11+αk_{1}\sim\lambda_{-}(\alpha)\,t^{\frac{1}{1+\alpha}} and k2λ+(α)t11+αk_{2}\sim\lambda_{+}(\alpha)\,t^{\frac{1}{1+\alpha}} as tt\to\infty. The idea is to study the term aka_{k} with k=λt11+αk={\lambda t^{\frac{1}{1+\alpha}}} for λ>0\lambda>0 as tt\to\infty. By Stirling’s formula,

(tλt11+α)12πλt12(1+α)exp(λα1+αt11+αlogt+(λλlogλ)t11+α+o(t11+α)),\binom{t}{\lambda t^{\frac{1}{1+\alpha}}}\sim\frac{1}{\sqrt{2\pi\lambda}}t^{-\frac{1}{2(1+\alpha)}}\exp\left(\frac{\lambda\alpha}{1+\alpha}t^{\frac{1}{1+\alpha}}\log t+(\lambda-\lambda\log\lambda)t^{\frac{1}{1+\alpha}}+o\left(t^{\frac{1}{1+\alpha}}\right)\right),
(λt11+α)!2πλt12(1+α)exp(λ1+αt11+αlogt+(λlogλλ)t11+α),\left(\lambda t^{\frac{1}{1+\alpha}}\right)!\sim\sqrt{2\pi\lambda}\,t^{\frac{1}{2(1+\alpha)}}\exp\left(\frac{\lambda}{1+\alpha}t^{\frac{1}{1+\alpha}}\log t+(\lambda\log\lambda-\lambda)t^{\frac{1}{1+\alpha}}\right),

and

(11λαtα1+α)tλt11+α=exp(t11+αλα+o(t11+α)).\left(1-\frac{1}{\lambda^{\alpha}t^{\frac{\alpha}{1+\alpha}}}\right)^{t-\lambda t^{\frac{1}{1+\alpha}}}=\exp\left(-\frac{t^{\frac{1}{1+\alpha}}}{\lambda^{\alpha}}+o\left(t^{\frac{1}{1+\alpha}}\right)\right).

Combining the above estimates yields

aλt(2πλ)1+α2t12exp(fα(λ)t11+α).a_{\lambda\sqrt{t}}\sim(2\pi\lambda)^{-\frac{1+\alpha}{2}}t^{-\frac{1}{2}}\exp\left(-f_{\alpha}(\lambda)\,t^{\frac{1}{1+\alpha}}\right). (2.12)

Note that fα(λ)=(1+α)logλαλ1αf^{\prime}_{\alpha}(\lambda)=(1+\alpha)\log\lambda-\alpha\lambda^{-1-\alpha}, which is increasing from -\infty to \infty on [0,)[0,\infty). The unique stationary point of fαf_{\alpha} on [0,)[0,\infty) is achieved at λ\lambda_{*} such that λα+1logλ=α1+α\lambda_{*}^{\alpha+1}\log\lambda_{*}=\frac{\alpha}{1+\alpha}, so it is clear that λ>1\lambda_{*}>1. We have

fα(λ)=(α1)λα(1+α)λ<0.f_{\alpha}(\lambda_{*})=(\alpha-1)\lambda_{*}^{-\alpha}-(1+\alpha)\lambda_{*}<0.

Thus, the function λfα(λ)\lambda\to f_{\alpha}(\lambda) has two roots λ(α)<λ+(α)\lambda_{-}(\alpha)<\lambda_{+}(\alpha) on [0,)[0,\infty), and fα>0f_{\alpha}>0 on (0,λ(α))(λ+(α),)(0,\lambda_{-}(\alpha))\cup(\lambda_{+}(\alpha),\infty). As a result, for each λ<λ(α)\lambda<\lambda_{-}(\alpha) we have

𝖯(Nt<λt11+α)Cλt12+11+αexp(fα(λ)t11+α)exp((1ε)fα(λ)t11+α)as t,{\bf\sf P}(N_{t}<\lambda t^{\frac{1}{1+\alpha}})\leq C_{\lambda}t^{-\frac{1}{2}+\frac{1}{1+\alpha}}\exp\left(-f_{\alpha}(\lambda)\,t^{\frac{1}{1+\alpha}}\right)\leq\exp\left(-(1-\varepsilon)f_{\alpha}(\lambda)\,t^{\frac{1}{1+\alpha}}\right)\,\mbox{as }t\to\infty,

and each λ>λ+(α)\lambda>\lambda_{+}(\alpha) we have

𝖯(Nt>λt11+α)Cλt12exp(fα(λ)t11+α)exp((1ε)fα(λ)t11+α)as t.{\bf\sf P}(N_{t}>\lambda t^{\frac{1}{1+\alpha}})\leq C^{\prime}_{\lambda}t^{\frac{1}{2}}\exp\left(-f_{\alpha}(\lambda)\,t^{\frac{1}{1+\alpha}}\right)\leq\exp\left(-(1-\varepsilon)f_{\alpha}(\lambda)\,t^{\frac{1}{1+\alpha}}\right)\,\mbox{as }t\to\infty.

The theorem above gives exponential deviation bounds for NtN_{t} when it is either sufficiently small (below λ(α)t11+α\lambda_{-}(\alpha)t^{\frac{1}{1+\alpha}}), or sufficiently large (above λ+(α)t11+α\lambda_{+}(\alpha)t^{\frac{1}{1+\alpha}}). Note that there is a gap between the two bounding curves, since for each α>0\alpha>0, λ(α)<(1+α)11+α<λ+(α)\lambda_{-}(\alpha)<(1+\alpha)^{\frac{1}{1+\alpha}}<\lambda_{+}(\alpha). (For instance, for α=1\alpha=1, λ(1)0.56<2<2.51λ+(1)\lambda_{-}(1)\approx 0.56<\sqrt{2}<2.51\approx\lambda_{+}(1).) The gap is due to the combinatorial estimates in our proof, which may very well be improved. Refer to the Appendix 5.1 for a numerical procedure that shrinks the gap.

As a corollary, the volume of stakes NtN_{t} concentrates around ((1+α)t)11+α((1+\alpha)t)^{\frac{1}{1+\alpha}} for large tt.

Corollary 4.

Under the Poly(α)\texttt{Poly}(\alpha) voting rule, we have, for each δ>0\delta>0,

𝖯(|Nt((1+α)t)11+α|>δt11+α)=𝒪(t11+α)as t.{\bf\sf P}\left(|N_{t}-((1+\alpha)t)^{\frac{1}{1+\alpha}}|>\delta t^{\frac{1}{1+\alpha}}\right)=\mathcal{O}(t^{-\frac{1}{1+\alpha}})\quad\mbox{as }t\to\infty. (2.13)
Proof.

Note that N0Ntt+N0N_{0}\leq N_{t}\leq t+N_{0}, and by Theorem 3, we get λ1t11+αNtλ2t11+α\lambda_{1}t^{\frac{1}{1+\alpha}}\leq N_{t}\leq\lambda_{2}t^{\frac{1}{1+\alpha}} with probability 1exp(Cλt11+α)1-\exp(-C\lambda t^{\frac{1}{1+\alpha}}) for some λ1,λ2,C>0\lambda_{1},\lambda_{2},C>0. Thus,

𝔼Nt1=𝒪(t11+α)and𝔼Ntα=𝒪(tα1+α).\mathbb{E}N_{t}^{-1}=\mathcal{O}(t^{-\frac{1}{1+\alpha}})\quad\mbox{and}\quad\mathbb{E}N_{t}^{\alpha}=\mathcal{O}(t^{\frac{\alpha}{1+\alpha}}).

According to the proof of Proposition 2 (ii), we have

𝔼(Nt+11+αNt1+α)=1+α+𝒪(𝔼Nt1)and𝔼(Nt+12(1+α)Nt2(1+α))=2(1+α)𝔼Nt1+α+𝒪(𝔼Ntα).\mathbb{E}(N_{t+1}^{1+\alpha}-N_{t}^{1+\alpha})=1+\alpha+\mathcal{O}(\mathbb{E}N_{t}^{-1})\quad\mbox{and}\quad\mathbb{E}(N_{t+1}^{2(1+\alpha)}-N_{t}^{2(1+\alpha)})=2(1+\alpha)\mathbb{E}N_{t}^{1+\alpha}+\mathcal{O}(\mathbb{E}N_{t}^{\alpha}).

Therefore, 𝔼Nt1+α=(1+α)t+𝒪(tα1+α)\mathbb{E}N_{t}^{1+\alpha}=(1+\alpha)t+\mathcal{O}(t^{\frac{\alpha}{1+\alpha}}) and 𝔼(Nt2(1+α))=(1+α)2t2+𝒪(t1+2α1+α)\mathbb{E}(N_{t}^{2(1+\alpha)})=(1+\alpha)^{2}t^{2}+\mathcal{O}(t^{\frac{1+2\alpha}{1+\alpha}}), which implies 𝖵𝖺𝗋(Nt1+α)=𝒪(t1+2α1+α){\bf\sf Var}(N_{t}^{1+\alpha})=\mathcal{O}(t^{\frac{1+2\alpha}{1+\alpha}}). Hence,

𝖯(|Nt1+α(1+α)t|>δt)=𝒪(t11+α)for t.{\bf\sf P}\left(|N_{t}^{1+\alpha}-(1+\alpha)t|>\delta t\right)=\mathcal{O}(t^{-\frac{1}{1+\alpha}})\quad\mbox{for }t\to\infty.

Taking λ<λ(α)\lambda<\lambda_{-}(\alpha), we have

𝖯(|Nt((1+α)t)11+α|>δt11+α)\displaystyle\quad\,{\bf\sf P}\left(|N_{t}-((1+\alpha)t)^{\frac{1}{1+\alpha}}|>\delta t^{\frac{1}{1+\alpha}}\right)
𝖯(Nt<λt11+α)+𝖯(|Nt((1+α)t)11+α|>δt11+α,Ntλt11+α)\displaystyle\leq{\bf\sf P}\left(N_{t}<\lambda t^{\frac{1}{1+\alpha}}\right)+{\bf\sf P}\left(|N_{t}-((1+\alpha)t)^{\frac{1}{1+\alpha}}|>\delta t^{\frac{1}{1+\alpha}},\,N_{t}\geq\lambda t^{\frac{1}{1+\alpha}}\right)
exp(Ct11+α)+𝖯(|Nt1+α(1+α)t|>C′′t),\displaystyle\leq\exp(-C^{\prime}t^{\frac{1}{1+\alpha}})+{\bf\sf P}(|N_{t}^{1+\alpha}-(1+\alpha)t|>C^{\prime\prime}t),

for some C,C′′>0C^{\prime},C^{\prime\prime}>0 (depending on α,δ,λ\alpha,\delta,\lambda). Combining the above estimates yield (2.13). ∎

Recall that the process (Nt,t0)(N_{t},\,t\geq 0) is a time-homogenous Markov chain. The path properties of a general time-homogenous Markov chain (Zt,t0)(Z_{t},\,t\geq 0) has long been studied since the work of Lamperti (1960, 1962, 1963). The basic idea is to study the recurrence, or transience of (Zt,t0)(Z_{t},\,t\geq 0) based on

m1(x)=𝖤(Zt+1Zt|Zt=x)andm2(x)=𝖤((Zt+1Zt)2|Zt=x).m_{1}(x)={\bf\sf E}(Z_{t+1}-Z_{t}\,|\,Z_{t}=x)\quad\mbox{and}\quad m_{2}(x)={\bf\sf E}((Z_{t+1}-Z_{t})^{2}\,|\,Z_{t}=x).

For instance, if lim supx2xm1(x)+m2(x)0\limsup_{x\to\infty}2xm_{1}(x)+m_{2}(x)\leq 0 then (Zt,t0)(Z_{t},\,t\geq 0) is recurrent; and if lim infx2xm1(x)+m2(x)>0\liminf_{x\to\infty}2xm_{1}(x)+m_{2}(x)>0 then (Zt,t0)(Z_{t},\,t\geq 0) is transient. The regime corresponding to m1(x)=o(1)m_{1}(x)=o(1) is called the Markov chain with asymptotic zero drift, and features active research (see e.g. Denisov et al. (2016); Menshikov et al. (2017)). Specializing to the process (Nt,t0)(N_{t},\,t\geq 0), we have

m1(x)=m2(x)=1xα.m_{1}(x)=m_{2}(x)=\frac{1}{x^{\alpha}}.

Interestingly, there seem to be few results on the Lamperti’s problem where both m1(x)m_{1}(x) and m2(x)m_{2}(x) decreases to zero as xx\to\infty, except that (Nt,t0)(N_{t},\,t\geq 0) is transient. Observe that (Nt,t0)(N_{t},\,t\geq 0) is nondecreasing, and

𝖵𝖺𝗋(Nt+1|Nt=x)=(11xα)21xα+(1xα)2(11xα),{\bf\sf Var}(N_{t+1}\,|\,N_{t}=x)=\left(1-\frac{1}{x^{\alpha}}\right)^{2}\frac{1}{x^{\alpha}}+\left(-\frac{1}{x^{\alpha}}\right)^{2}\left(1-\frac{1}{x^{\alpha}}\right),

where the “upward” contribution (11xα)21xα\left(1-\frac{1}{x^{\alpha}}\right)^{2}\frac{1}{x^{\alpha}} is larger than the “downward” counterpart 1x2α(11xα)\frac{1}{x^{2\alpha}}\left(1-\frac{1}{x^{\alpha}}\right) as xx\to\infty. In the similar spirit to Lamperti (1962), the asymptotic growth (2.7) hinges on a degenerate fluid approximation of the process (Nt,t0)(N_{t},\,t\geq 0), as stated in the following proposition.

Proposition 5 (Fluid limit of NtN_{t}).

Under the Poly(α)\texttt{Poly}(\alpha) voting rule, we have

(Nnun11+α,u0)d(Xu,u0)as n in 𝒞[0,),\left(\frac{N_{nu}}{n^{\frac{1}{1+\alpha}}},\,u\geq 0\right)\stackrel{{\scriptstyle d}}{{\longrightarrow}}(X_{u},\,u\geq 0)\quad\mbox{as }n\to\infty\mbox{ in }\mathcal{C}[0,\infty), (2.14)

where NsN_{s} for non-integer ss is defined by the linear interpolation of the chain (Nt,t0)(N_{t},\,t\geq 0), and Xu=((1+α)u)11+αX_{u}=\left((1+\alpha)u\right)^{\frac{1}{1+\alpha}}, u0u\geq 0 is the solution to the ordinary differential equation dXu=XuαdtdX_{u}=X_{u}^{-\alpha}dt with X0=0X_{0}=0.

Proof.

Fix T>0T>0. It suffices to prove the weak convergence (2.14)\eqref{eq:fluid} on [0,T][0,T]. By Proposition 2 (ii), there is the convergence in probability N[nT]/n11+αXTN_{[nT]}/n^{\frac{1}{1+\alpha}}\to X_{T} as nn\to\infty. Given ε>0\varepsilon>0, there is n(ε)>0n(\varepsilon)>0 such that for any n>n(ε)n>n(\varepsilon),

𝖯(N[nT]/n11+α<2XT)>1ε.{\bf\sf P}\left(N_{[nT]}/n^{\frac{1}{1+\alpha}}<2X_{T}\right)>1-\varepsilon.

Let K(ε):=max(2XT,maxnn(ε)(N0+[nT])/n11+α)K(\varepsilon):=\max(2X_{T},\max_{n\leq n(\varepsilon)}(N_{0}+[nT])/n^{\frac{1}{1+\alpha}}). We have 𝖯(N[nT]/n11+α<K(ε))>1ε{\bf\sf P}(N_{[nT]}/n^{\frac{1}{1+\alpha}}<K(\varepsilon))>1-\varepsilon for each n+n\in\mathbb{N}_{+}. Note that for each n+n\in\mathbb{N}_{+}, the process Nn,T:=(N[nT]/n11+α, 0tT)N^{n,T}:=\left(N_{[nT]}/n^{\frac{1}{1+\alpha}},\,0\leq t\leq T\right) is nondecreasing. Thus,

𝖯(Nn,T[0,T]×[0,K(ε)])>1ε.{\bf\sf P}\left(N^{n,T}\in[0,T]\times[0,K(\varepsilon)]\right)>1-\varepsilon.

So the sequence of processes (Nn,T,n+)(N^{n,T},\,n\in\mathbb{N}_{+}) is tight. Moreover, for each t[0,T]t\in[0,T], N[nt]/n11+αN_{[nt]}/n^{\frac{1}{1+\alpha}} converges in probability to XtX_{t} as nn\to\infty. Then for 0t1<<tk0\leq t_{1}<\cdots<t_{k}, the vector (N[nt1]/n11+α,,N[ntk]/n11+α)(N_{[nt_{1}]}/n^{\frac{1}{1+\alpha}},\cdots,N_{[nt_{k}]}/n^{\frac{1}{1+\alpha}}) converges in probability to (Xt1,,Xtk)(X_{t_{1}},\cdots,X_{t_{k}}), i.e. the convergence in finite-dimensional distributions. The weak convergence follows readily from the tightness and the convergence in finite-dimensional distributions (see e.g. (Billingsley, 1999, Chapter 2)). ∎

Note that the fluid limit in the proposition is different from the fluid limit in the literature of stochastic networks, where it usually takes the form of a FSLLN (functional strong law of large numbers) concerning a renewal process and the associated counting process. In that setting, the convergence (to a deterministic function of time) is stronger – the almost sure convergence, and uniformly on [0,T][0,T]. Refer to (Chen and Yao, 2001, §6.1). Here, the process (Nt,t0)(N_{t},\,t\geq 0) is non-renewal, thus the FSLLN limit does not apply; yet there is still the weak convergence, and the limit is still a deterministic function of time (Xu,u0)(X_{u},\,u\geq 0), explicitly characterized above. Another notable point is, in the FSLLN setting, both time and space are scaled by the same scaling factor nn whereas in (2.14) the time scaling remains the same, and the space scaling is by n11+αn^{\frac{1}{1+\alpha}}. But this is only because (Nt,t0)(N_{t},\,t\geq 0) grows in the order of t11+αt^{\frac{1}{1+\alpha}} (Proposition 2 (ii)), whereas a renewal (counting) process grows linearly in tt.

2.2. Bidder shares and voting powers

Here we study the evolution and the long-time behavior of (πk,t,k[K])(\pi_{k,t},\,k\in[K]) and (θk,t,k[K])(\theta_{k,t},\,k\in[K]). Recall that the Dirichlet distribution with parameters (a1,,aK)(a_{1},...,a_{K}), which we denote by Dir(a1,,aK)\mbox{Dir}(a_{1},...,a_{K}), has support on the standard simplex {(x1,,xK)+K:k=1Kxk=1}\{(x_{1},\ldots,x_{K})\in\mathbb{R}_{+}^{K}:\sum_{k=1}^{K}x_{k}=1\} and has density

f(x1,xK)=Γ(k=1Kak)k=1KΓ(ak)k=1Kxkak1,f(x_{1},\ldots x_{K})=\frac{\Gamma(\sum_{k=1}^{K}a_{k})}{\prod_{k=1}^{K}\Gamma(a_{k})}\prod_{k=1}^{K}x_{k}^{a_{k}-1},

where Γ(z)=0xz1ex𝑑x\Gamma(z)=\int_{0}^{\infty}x^{z-1}e^{-x}dx is the Gamma function. For K=2K=2, the Dirichlet distribution reduces to the beta distribution, denoted as Beta(a1,a2)\mbox{Beta}(a_{1},a_{2}). It is easily seen that if (x1,,xK)=dDir(a1,,aK)(x_{1},\ldots,x_{K})\stackrel{{\scriptstyle d}}{{=}}\mbox{Dir}(a_{1},\ldots,a_{K}) then for each k[K]k\in[K], xk=dBeta(ak,jkaj)x_{k}\stackrel{{\scriptstyle d}}{{=}}\mbox{Beta}(a_{k},\sum_{j\neq k}a_{j}).

Theorem 6 (Long-time behavior).

Under the Poly(α)\texttt{Poly}(\alpha) voting rule, we have the following limiting distributions.

  • (i)

    Bidder shares: the process (πk,t,t0)(\pi_{k,t},\,t\geq 0) is an t\mathcal{F}_{t}-martingale, and with probability one,

    (π1,t,,πK,t)(π1,,,πK,)as t,(\pi_{1,t},\ldots,\pi_{K,t})\longrightarrow(\pi_{1,\infty},\ldots,\pi_{K,\infty})\quad\mbox{as }t\rightarrow\infty, (2.15)

    where (π1,,,πK,)=dDir(n1,0,,nK,0)(\pi_{1,\infty},\ldots,\pi_{K,\infty})\stackrel{{\scriptstyle d}}{{=}}\mbox{Dir}(n_{1,0},\ldots,n_{K,0}). Moreover, for each k[K]k\in[K],

    dW(πk,t,Beta(nk,0,Nnk,0))=𝒪(t11+α)as t.d_{W}\left(\pi_{k,t},\,\mbox{Beta}\left(n_{k,0},\,N-n_{k,0}\right)\right)=\mathcal{O}(t^{-\frac{1}{1+\alpha}})\quad\mbox{as }t\to\infty. (2.16)
  • (ii)

    Voting powers: the process (θk,t,t0)(\theta_{k,t},\,t\geq 0) is an t\mathcal{F}_{t}-super-martingale, and for α>0\alpha>0, with probability one, θk,t0\theta_{k,t}\rightarrow 0 as tt\to\infty for each k[K]k\in[K]. Moreover, for each k[K]k\in[K],

    (1+α)α1+αtα1+αθk,tdBeta(nk,0,Nnk,0)as t.(1+\alpha)^{\frac{\alpha}{1+\alpha}}t^{\frac{\alpha}{1+\alpha}}\theta_{k,t}\stackrel{{\scriptstyle d}}{{\longrightarrow}}\mbox{Beta}\left(n_{k,0},\,N-n_{k,0}\right)\quad\mbox{as }t\to\infty. (2.17)
Proof.

(i) By (2.2) and (2.5), it is easily seen that for each k[K]k\in[K] and t0t\geq 0,

𝖤(πk,t+1|t)=nk,tNt(11Ntα)+nk,tNt+1Ntnk,tNt1+α+nk,t+1Nt+1nk,tNt1+α.{\bf\sf E}(\pi_{k,t+1}\,|\,\mathcal{F}_{t})=\frac{n_{k,t}}{N_{t}}\left(1-\frac{1}{N_{t}^{\alpha}}\right)+\frac{n_{k,t}}{N_{t}+1}\,\frac{N_{t}-n_{k,t}}{N_{t}^{1+\alpha}}+\frac{n_{k,t}+1}{N_{t}+1}\,\frac{n_{k,t}}{N_{t}^{1+\alpha}}. (2.18)

Recognizing the first term on the right side of (2.18), nk,tNt=πk,t\frac{n_{k,t}}{N_{t}}=\pi_{k,t}, while all other terms sum up to zero, we conclude that (πk,t,t0)(\pi_{k,t},\,t\geq 0) is an t\mathcal{F}_{t}-martingale. The convergence in (2.15) follows from the martingale convergence theorem (see e.g. (Durrett, 2019, Section 4.2)). By Proposition 1, (𝒏t,t0)(\boldsymbol{n}_{t},\,t\geq 0) is a time-changed Pólya urn. So the limiting shares (π1,,,πK,)(\pi_{1,\infty},\ldots,\pi_{K,\infty}) have the same distribution as that of the Pólya urn, which is Dir(n1,0,,nK,0)\mbox{Dir}(n_{1,0},\ldots,n_{K,0}).

Let (𝒏t,t0)(\boldsymbol{n}^{\dagger}_{t},\,t\geq 0) be the Pólya urn with nk,0=nk,0n^{\dagger}_{k,0}=n_{k,0}, and (πk,t,,πK,t)(\pi^{\dagger}_{k,t},\ldots,\pi^{\dagger}_{K,t}) be the corresponding shares. Set Z=dBeta(nk,0,Nnk,0)Z\stackrel{{\scriptstyle d}}{{=}}\mbox{Beta}\left(n_{k,0},N-n_{k,0}\right). By Goldstein and Reinert (2013), we have for each k[K]k\in[K],

dW(πk,t,Z)=𝒪(t1)as t.d_{W}\left(\pi^{\dagger}_{k,t},\,Z\right)=\mathcal{O}(t^{-1})\quad\mbox{as }t\to\infty. (2.19)

Taking λ<λ(α)\lambda<\lambda_{-}(\alpha), we get

dW(πk,t,Z)\displaystyle d_{W}(\pi_{k,t},\,Z) 𝖯(Nt<λt11+α)+dW(πk,t1Ntλt11+α,Z)\displaystyle\leq{\bf\sf P}(N_{t}<\lambda t^{\frac{1}{1+\alpha}})+d_{W}\left(\pi_{k,t}1_{N_{t}\geq\lambda t^{\frac{1}{1+\alpha}}},\,Z\right)
C𝖯(Nt<λt11+α)+sλt11+αdW((πk,t|Nt=s),Z)𝖯(Nt=s)\displaystyle\leq C{\bf\sf P}(N_{t}<\lambda t^{\frac{1}{1+\alpha}})+\sum_{s\geq\lambda t^{\frac{1}{1+\alpha}}}d_{W}((\pi_{k,t}|N_{t}=s),Z){\bf\sf P}(N_{t}=s)
=C𝖯(Nt<λt11+α)+sλt11+αdW(πk,sN,Z)𝖯(Nt=s)\displaystyle=C{\bf\sf P}(N_{t}<\lambda t^{\frac{1}{1+\alpha}})+\sum_{s\geq\lambda t^{\frac{1}{1+\alpha}}}d_{W}(\pi^{\dagger}_{k,s-N},Z){\bf\sf P}(N_{t}=s)
Cexp(Ct11+α)+C′′t11+α,\displaystyle\leq C\exp(-C^{\prime}t^{\frac{1}{1+\alpha}})+C^{\prime\prime}t^{-\frac{1}{1+\alpha}},

where the last inequality follows from Theorem 3 and (2.19). This yields the bound (2.16).

(ii) Applying the same derivation as in (2.18) but to θk,t\theta_{k,t} instead, we have

𝖤(θk,t+1|t)=πk,tNtα(11Ntα)+Ntπk,t(Nt+1)1+α1πk,tNtα+Ntπk,t+1(Nt+1)1+απk,tNtα.{\bf\sf E}(\theta_{k,t+1}\,|\,\mathcal{F}_{t})=\frac{\pi_{k,t}}{N_{t}^{\alpha}}\left(1-\frac{1}{N_{t}^{\alpha}}\right)+\frac{N_{t}\pi_{k,t}}{(N_{t}+1)^{1+\alpha}}\cdot\frac{1-\pi_{k,t}}{N_{t}^{\alpha}}+\frac{N_{t}\pi_{k,t}+1}{(N_{t}+1)^{1+\alpha}}\cdot\frac{\pi_{k,t}}{N_{t}^{\alpha}}.

The last two terms add up to πk,tNtα(Nt+1)α=θk,t(Nt+1)α\frac{\pi_{k,t}}{N_{t}^{\alpha}(N_{t}+1)^{\alpha}}=\frac{\theta_{k,t}}{(N_{t}+1)^{\alpha}}. Thus, we have

𝖤(θk,t+1|t)=θk,t(11Ntα+1(Nt+1)α)θk,t,{\bf\sf E}(\theta_{k,t+1}\,|\,\mathcal{F}_{t})=\theta_{k,t}\left(1-\frac{1}{N_{t}^{\alpha}}+\frac{1}{(N_{t}+1)^{\alpha}}\right)\leq\theta_{k,t},

i.e. (θk,t,t0)(\theta_{k,t},\,t\geq 0) is an t\mathcal{F}_{t}-super-martingale for each kk. Recall that Ntαθk,t=πk,tN_{t}^{\alpha}\theta_{k,t}=\pi_{k,t} so θk,tNtα\theta_{k,t}\leq N_{t}^{-\alpha} which converges to 0 with probability one. By (i), Ntαθk,tN_{t}^{\alpha}\theta_{k,t} converges almost surely, and hence in distribution to ZZ. By Proposition 2, Nt/((1+α)t)11+αN_{t}/((1+\alpha)t)^{\frac{1}{1+\alpha}} converges in probability to 11. We then apply Slutsky’s theorem to get the convergence in (2.17). ∎

Several remarks are in order. Part (i) of Theorem 6 shows that the bidder shares form a martingale, and converges to a Dirichlet distribution (independent of α\alpha). This should be expected from the fact that the underlying bidder stakes (𝒏t,t0)(\boldsymbol{n}_{t},\,t\geq 0) is a time-changed Pólya urn; refer to Proposition 1. What’s more revealing is the Wasserstein bound in (2.16) between a bidder’s share and its limit. In fact, a matching lower bound can also be established (which we leave to the interested reader). Thus, the convergence rate of the bidder shares is exactly of order t11+αt^{-\frac{1}{1+\alpha}}. (Also refer to Proposition 7 below for further discussions on the stability of the bidder shares when the initial stakes N:=N0N:=N_{0} is large.)

Part (ii) of the theorem implies that each bidder’s voting power decays to zero at rate tα1+αt^{-\frac{\alpha}{1+\alpha}}. Or, equivalently, the reward rate is slowed down: it takes a time of order Θ(tα1+α)\Theta(t^{\frac{\alpha}{1+\alpha}}) for any bidder to be rewarded a new (unit of) stake. This enhances security, so that no bidder can manipulate or control the bidding/voting process; while the level of decentralization remains unchanged. This also means the principle of security in (1.1) becomes “easier” to hold at large time tt, since (due to the network delay) vNtα0v\propto N_{t}^{-\alpha}\downarrow 0 as tt\to\infty. On the other hand, if the reward is associated with transaction validation (which does not need to be), then the time required to validate a new block becomes uncontrolled in the long run. A possible remedy is to dynamically tune the parameter α\alpha over time, as detailed in the Appendix 5.2.

3. Other Results, with PoS-Crypto Applications

In this section, we present more results associated with the Poly(α)\texttt{Poly}(\alpha) model that are largely motivated by the application of PoS in cryptocurrency. There are two subsections: In the first one, §3.1, we study the the evolution of bidder shares when N:=N0N:=N_{0}, the volume of initial stakes, is large. In §3.2, we study the additional feature of allowing the bidders to trade stakes among themselves, focusing on the issue of trading incentive (or the lack thereof). We remark that the results in both subsections exhibit some type of phase transitions, and are independent of the parametric value of α\alpha, and in this sense, universal.

3.1. Evolution of bidder shares and phase transitions

As explained in the introduction, one key feature of the Poly(α)\texttt{Poly}(\alpha) model is that the reward rate, or the voting power (if the reward goes with validation work) θk,t\theta_{k,t} of any bidder kk is different from kk’s share πk,t\pi_{k,t} of the total volume of stakes at tt. We have seen from Theorem 6 (iii) that the reward rate or voting power is decreasing over time, which facilitates security. On the other hand, the evolution of the share πk,t\pi_{k,t} over time, from its initial value πk,0\pi_{k,0}, in both absolute and relative terms, is an important issue for any individual bidder kk.

In the classical Pólya urn setting, it is shown in Roşu and Saleh (2021) that for a large bidder with initial stake nk,0=Θ(N)n_{k,0}=\Theta(N), there is the stability in bidder share, in the sense that

𝖯(|πk,πk,0|>ε)0as N.{\bf\sf P}(|\pi_{k,\infty}-\pi_{k,0}|>\varepsilon)\to 0\quad\mbox{as }N\to\infty.

Furthermore, similar, albeit qualitatively different, results are revealed in Tang (2022), for small bidders (following the definition in part (ii) of the corollary below). Here we focus on the ratio πk,t/πk,0\pi_{k,t}/\pi_{k,0}. Since πk,=dBeta(nk,0,Nnk,0)\pi_{k,\infty}\stackrel{{\scriptstyle d}}{{=}}\mbox{Beta}(n_{k,0},N-n_{k,0}), the results in Tang (2022) hold. The following proposition is a refined version of (Tang, 2022, Theorem 2.1).

Proposition 7 (Phase transitions of πk,t\pi_{k,t}).

Let N0=NN_{0}=N be the total number of initial stakes. Under the Poly(α)\texttt{Poly}(\alpha) voting rule, we have

  • (i)

    For nk,0=f(N)n_{k,0}=f(N) such that f(N)f(N)\to\infty as NN\to\infty (i.e. πk,01/N\pi_{k,0}\gg 1/N), and for each ε>0\varepsilon>0 sufficiently small and each t1t\geq 1 or t=t=\infty,

    𝖯(|πk,tπk,01|>ε)1ε2f(N),{\bf\sf P}\left(\left|\frac{\pi_{k,t}}{\pi_{k,0}}-1\right|>\varepsilon\right)\leq\frac{1}{\varepsilon^{2}f(N)}, (3.1)

    which converges to 0 as NN\to\infty.

  • (ii)

    For nk,0=Θ(1)n_{k,0}=\Theta(1) (i.e. πk,0=Θ(1/N)\pi_{k,0}=\Theta(1/N)), there is the convergence in distribution

    πk,/πk,0d1nk,0γ(nk,0)as N,\pi_{k,\infty}/\pi_{k,0}\stackrel{{\scriptstyle d}}{{\longrightarrow}}\frac{1}{n_{k,0}}\gamma(n_{k,0})\quad\mbox{as }N\to\infty, (3.2)

    where γ(nk,0)\gamma(n_{k,0}) is a Gamma random variable with density xnk,01ex1x>0/Γ(nk,0)x^{n_{k,0}-1}e^{-x}1_{x>0}/\Gamma(n_{k,0}). Moreover, there is C>0C>0 (independent of tt and NN) such that

    dW(πk,tπk,0,1nk,0γ(nk,0))C(N3t11+α+1N).d_{W}\left(\frac{\pi_{k,t}}{\pi_{k,0}},\,\frac{1}{n_{k,0}}\gamma(n_{k,0})\right)\leq C\left(N^{3}t^{-\frac{1}{1+\alpha}}+\frac{1}{\sqrt{N}}\right). (3.3)
Proof.

(i) Conditioning on NtN_{t} and using the law of total variance, we get

𝖵𝖺𝗋(πk,t)=1N𝖤(Nt1)N+1πk,0(1πk,0).{\bf\sf Var}(\pi_{k,t})=\frac{1-N{\bf\sf E}(N_{t}^{-1})}{N+1}\pi_{k,0}(1-\pi_{k,0}).

It suffices to apply Chebyshev’s inequality to get the bound (3.1).

(ii) Note that

dW(πk,tπk,0,1nk,0γ(nk,0))\displaystyle d_{W}\left(\frac{\pi_{k,t}}{\pi_{k,0}},\,\frac{1}{n_{k,0}}\gamma(n_{k,0})\right) dW(πk,tπk,0,1πk,0Beta(nk,0,Nnk,0))\displaystyle\leq d_{W}\left(\frac{\pi_{k,t}}{\pi_{k,0}},\,\frac{1}{\pi_{k,0}}\mbox{Beta}(n_{k,0},N-n_{k,0})\right)
+dW(1πk,0Beta(nk,0,Nnk,0),1nk,0γ(nk,0))\displaystyle\qquad+d_{W}\left(\frac{1}{\pi_{k,0}}\mbox{Beta}(n_{k,0},N-n_{k,0}),\,\frac{1}{n_{k,0}}\gamma(n_{k,0})\right)

A careful application of Goldstein and Reinert (2013) yields a refinement of (2.19): there is C>0C>0 such that dW(πk,t,Z)CN3td_{W}(\pi^{\dagger}_{k,t},\,Z)\leq\frac{CN^{3}}{t}. Adapting the argument in Theorem 6 yields

dW(πk,tπk,0,1πk,0Beta(nk,0,Nnk,0))CN3t11+αfor some C>0.d_{W}\left(\frac{\pi_{k,t}}{\pi_{k,0}},\,\frac{1}{\pi_{k,0}}\mbox{Beta}(n_{k,0},N-n_{k,0})\right)\leq C^{\prime}N^{3}t^{-\frac{1}{1+\alpha}}\quad\mbox{for some }C^{\prime}>0. (3.4)

Next we claim that

dW(1πk,0Beta(nk,0,Nnk,0),1nk,0γ(nk,0))C′′Nfor some C′′>0,d_{W}\left(\frac{1}{\pi_{k,0}}\mbox{Beta}(n_{k,0},N-n_{k,0}),\,\frac{1}{n_{k,0}}\gamma(n_{k,0})\right)\leq\frac{C^{\prime\prime}}{\sqrt{N}}\quad\mbox{for some }C^{\prime\prime}>0, (3.5)

which can be proved by elementary calculus. Here we provide a sketch of proof. Set nk,0=1n_{k,0}=1 for simplicity. Let Xγ(1)X\sim\gamma(1), and let XX^{\prime} be the sum of N1N-1 independent γ(1)\gamma(1) random variables, independent of XX. By beta-gamma algebra, XX+X\frac{X}{X+X^{\prime}} has the same distribution as Beta(1,N1)\mbox{Beta}(1,N-1). Thus,

dW(NBeta(1,N1),γ(1))𝔼|NXX+XX|.d_{W}(N\,\mbox{Beta}(1,N-1),\gamma(1))\leq\mathbb{E}\left|\frac{NX}{X+X^{\prime}}-X\right|. (3.6)

By normal approximation, we have X+XN=1+1N𝒩(0,1)+o(N12)\frac{X+X^{\prime}}{N}=1+\frac{1}{\sqrt{N}}\mathcal{N}(0,1)+o(N^{-\frac{1}{2}}) where 𝒩(0,1)\mathcal{N}(0,1) is standard normal (see Rio (2009)). Injecting into (3.6) yields the desired bound. Finally, combining the estimates (3.4) and (3.5) gives the bound (3.3). ∎

The proposition reveals a phase transition in the stability of shares, and identifies large and small bidders, in terms of the size of their stakes, according to the categories in the two parts. A large bidder kk is guaranteed to have stability, in the precise sense characterized in (3.1), that the share ratio πk,t/πk,0\pi_{k,t}/\pi_{k,0} concentrates at 11, and converges to 11 in probability when NN\to\infty, for any t1t\geq 1 (including t=t=\infty). For small bidders, this is reversed: the concentration inequality in (3.1) becomes the anti-concentration inequality:

𝖯(|πk,πk,01|>ε)>cfor c>0 independent of ε,{\bf\sf P}\left(\left|\frac{\pi_{k,\infty}}{\pi_{k,0}}-1\right|>\varepsilon\right)>c\quad\mbox{for }c>0\mbox{ independent of $\varepsilon$}, (3.7)

implying volatility. The Wasserstein bound (3.3) is new, and it indicates that the ratio πk,t/πk,0\pi_{k,t}/\pi_{k,0} approaches the limiting Gamma distribution with an N12N^{-\frac{1}{2}} error for tN72(1+α)t\geq N^{\frac{7}{2}(1+\alpha)}. However, we do not know whether the “N3N^{3} dependence” in (3.3) is tight so the ratio πk,t/πk,0\pi_{k,t}/\pi_{k,0} may mix at a faster rate.

3.2. Participation and trading

So far, we have not considered the possibility of allowing the bidders to trade stakes (among themselves). In the classical Pólya urn model (α=0\alpha=0), it is shown in Roşu and Saleh (2021) that under certain conditions (which enforce some notion of “risk neutrality”), there will be no incentive for any bidder to trade. Here, we extend that to the Poly(α)\texttt{Poly}(\alpha) model, allowing α\alpha to take any non-negative values. Furthermore, we allow a bidder-dependent risk-sensitivity (or risk-averse) parameter δk\delta_{k}, and study the issue of incentive as it relates to δk\delta_{k}.

In the new setting of allowing trading, we need to modify the problem formulation presented at the beginning of §2. First, for each k[K]k\in[K], let νk,t\nu_{k,t} be the number of stakes that bidder kk will trade at time tt. Then, instead of (2.4), the number of stakes nk,tn_{k,t} evolves as

nk,t=nk,t1+1Sk,tnk,t+νk,t,n_{k,t}=\underbrace{n_{k,t-1}+1_{S_{k,t}}}_{n^{\prime}_{k,t}}+\nu_{k,t}, (3.8)

i.e. nk,tn^{\prime}_{k,t} denotes the number of stakes bidder kk owns in between time t1t-1 and tt, excluding those traded in period tt.

Note that νk,t\nu_{k,t} will be up to bidder kk to decide, as opposed to the random event Sk,tS_{k,t} which is exogenous; in particular, νk,t\nu_{k,t} can be negative (as well as positive or zero). We will elaborate more on this below, but note that νk,t\nu_{k,t} will be constrained such that after the updating in (3.8) nk,tn_{k,t} will remain nonnegative.

Let {Pt,t0}\{P_{t},\,t\geq 0\} be the price process of each (unit of) stake, which is a stochastic process assumed to be independent of the randomness induced by the Poly(α)\texttt{Poly}(\alpha) voting rule (specifically, the process {Sk,t}\{S_{k,t}\}). Hence, we augment the filtration {t}t0\{\mathcal{F}_{t}\}_{t\geq 0} with that of the exogenous price process {Pt,t0}\{P_{t},\,t\geq 0\} to a new filtration denoted {𝒢t}t0\{\mathcal{G}_{t}\}_{t\geq 0}. Note that the price process PtP_{t} is also assumed as exogenous in Roşu and Saleh (2021). This assumption need not be so far off, as the crypto’s price tends to be affected by market shocks (such as macroeconomics, geopolitics, breaking news, etc) much more than by trading activities. So, here we isolate the price of each stake from any bidder’s trading impact.

Let bk,tb_{k,t} denote (units of) the risk-free asset that bidder kk holds at time tt, and rfree>0r_{\tiny\mbox{free}}>0 the risk-free (interest) rate. (Here, the risk-free asset is naturally the one that underlies the above price process.) As we are mainly concerned with the effect of exchanging stakes to each individual, we allow bidders to trade stakes only internally among themselves, but not risk-free assets between them. Hence, each bidder has to trade risk-free asset with a third-party instead of trading that with another bidder.

The decision for each bidder kk at tt is hence a tuple, (νk,t,bk,t)(\nu_{k,t},b_{k,t}). Moreover, there is a terminal time, denoted Tk+T_{k}\in\mathbb{N}_{+} (i.e., Tk1T_{k}\geq 1 is integer valued), by which time bidder kk has to sell all assets, including both any risk-free asset and any stakes owned at that time, and leave the system. TkT_{k} can either be deterministic or random. In the latter case, assume it has a finite expectation, and is either adapted to {𝒢t}t0\{\mathcal{G}_{t}\}_{t\geq 0}, or independent of all other randomness (in which case augment {𝒢t}\{\mathcal{G}_{t}\} accordingly). We also allow bidder kk to leave the system and liquidate prior to TkT_{k} at a stopping time τk\tau_{k} relative to {𝒢t}t0\{\mathcal{G}_{t}\}_{t\geq 0}. Thus, bidder kk will also decide at which time τk\tau_{k} to stop and exit. To simplify the notation, we abuse τk\tau_{k} for τkTk\tau_{k}\wedge T_{k}, the minimum of τk\tau_{k} and TkT_{k}.

Let ck,tc_{k,t} denote the (free) cash flow (or, “consumption”) of bidder kk at time tt, i.e.,

ck,t=(1+rfree)bk,t1bk,tνk,tPt,1t<τk;c_{k,t}=(1+r_{\tiny\mbox{free}})b_{k,t-1}-b_{k,t}-\nu_{k,t}P_{t},\quad\forall 1\leq t<\tau_{k}; (C1)

with

bk,0=0,bk,t0,0nk,t=nk,t+νk,tNt,1t<τk;b_{k,0}=0,\;b_{k,t}\geq 0,\quad 0\leq n_{k,t}=n^{\prime}_{k,t}+\nu_{k,t}\leq N_{t},\quad\forall 1\leq t<\tau_{k}; (C2)

and

ck,τk=(1+rfree)bk,τk1+nk,τkPτk, and νk,τk=bk,τk=0.c_{k,\tau_{k}}=(1+r_{\tiny\mbox{free}})b_{k,\tau_{k}-1}+n^{\prime}_{k,\tau_{k}}P_{\tau_{k}},\quad\mbox{ and }\nu_{k,\tau_{k}}=b_{k,\tau_{k}}=0. (C3)

Observe that the equation in (C1) simply defines what’s available for “consumption” in period tt. It is simply an accounting or budget constraint on the cash flow. The requirements in (C2) are all in the spirit of disallowing shorting, on both components of the decision, the free asset bk,tb_{k,t} and the traded stakes νk,t\nu_{k,t}. In particular the latter is constrained such that νk,tnk,t\nu_{k,t}\geq-n^{\prime}_{k,t} (following nk,t0n_{k,t}\geq 0) i.e., bidder kk cannot sell more than what’s in possession at tt; it also ensures that no bidder can own a number of stakes beyond the current total volume (nk,tNtn_{k,t}\leq N_{t}). (C3) specifies how the assets are liquidated at the exit time τk\tau_{k}: both νk,τk\nu_{k,\tau_{k}} and bk,τkb_{k,\tau_{k}} will be set at zero, and all remaining stakes nk,τkn^{\prime}_{k,\tau_{k}} liquidated (cashed out at PτkP_{\tau_{k}} per unit).

Denote bidder kk’s decision (process) or “strategy” as τk\tau_{k} and (ν,b):={(νk,t,bk,t), 1tτk}(\nu,b):=\{(\nu_{k,t},b_{k,t}),\,1\leq t\leq\tau_{k}\}. The objective of bidder kk is

Uk:=maxτk,(ν,b)Uk:=maxτk,(ν,b)𝖤(t=1τkδktck,t),subject to (C1), (C2), (C3);U^{*}_{k}:=\max_{\tau_{k},(\nu,b)}U_{k}:=\max_{\tau_{k},(\nu,b)}{\bf\sf E}\left(\sum_{t=1}^{\tau_{k}}\delta_{k}^{t}c_{k,t}\right),\quad\text{subject to (C1), (C2), (C3)}; (3.9)

where δk(0,1]\delta_{k}\in(0,1] is a discount factor, a given parameter measuring the risk sensitivity of bidder kk. Clearly, bidder kk’s objective is to maximize a utility that is just the present value of kk’s total cash flow cumulated up to TkT_{k}.

We need to introduce two more processes that are related and central to understanding the dynamics of the system in the presence of trading. The first one is {Mt,t1}\{M_{t},\,t\geq 1\}, where Mt:=NtPtM_{t}:=N_{t}P_{t} denotes the market value of the volume of stakes at time tt. The second one is {Πk,t,t0}\{\Pi_{k,t},\,t\geq 0\}, for each bidder kk, defined as follows:

Πk,0:=nk,0P0,andΠk,t:=δktnk,tPtj=1t1δkjνk,jPj,t1;\Pi_{k,0}:=n_{k,0}P_{0},\quad\mbox{and}\quad\Pi_{k,t}:=\delta^{t}_{k}n^{\prime}_{k,t}P_{t}-\sum_{j=1}^{t-1}\delta_{k}^{j}\nu_{k,j}P_{j},\quad t\geq 1; (3.10)

where nk,t+1n^{\prime}_{k,t+1} follows (3.8). Note the two terms that define Πk,t\Pi_{k,t} are the discounted present values, respectively, of kk’s pre-trading stakes (nk,tn^{\prime}_{k,t}) and of the return from kk’s trading (cumulated up to t1t-1).

The connection between {Mt}\{M_{t}\} and {Πk,t}\{\Pi_{k,t}\} is presented in the following lemma, which reveals that their incremental gains (per time period) are proportional: each increment of Πk,t\Pi_{k,t} is a πk,t\pi_{k,t} fraction of the corresponding increment of MtM_{t}. In other words, πk,t\pi_{k,t} not only represents bidder kk’s share of the total volume of stakes, it also represents kk’s share of the system’s market value, with or without trading.

Lemma 8.

Under the Poly(α)\texttt{Poly}(\alpha) voting rule, along with the trading specified above, we have

𝖤(Πk,t+1|𝒢t)Πk,t=δkt+1πk,t𝖤(Mt+1|𝒢t)δktπk,tMt.{\bf\sf E}(\Pi_{k,t+1}\,|\,\mathcal{G}_{t})-\Pi_{k,t}=\delta_{k}^{t+1}\pi_{k,t}{\bf\sf E}(M_{t+1}\,|\,\mathcal{G}_{t})-\delta_{k}^{t}\pi_{k,t}M_{t}. (3.11)
Proof.

First, by (3.8) and (2.5), along with πk,t=nk,t/Nt\pi_{k,t}=n_{k,t}/N_{t}, we have

𝖤(nk,t+1|t)=nk,t(1+Nt(1+α))=nk,tNt(Nt+Ntα)=πk,t𝖤(Nt+1|t).{\bf\sf E}(n^{\prime}_{k,t+1}\,|\,\mathcal{F}_{t})=n_{k,t}(1+N_{t}^{-(1+\alpha)})=\frac{n_{k,t}}{N_{t}}(N_{t}+N_{t}^{-\alpha})=\pi_{k,t}{\bf\sf E}(N_{t+1}\,|\,\mathcal{F}_{t}). (3.12)

Next, from (3.10), we have

Πk,t+1Πk,t=δkt+1nk,t+1Pt+1δktnk,tPtδktνk,tPt,t1.\Pi_{k,t+1}-\Pi_{k,t}=\delta^{t+1}_{k}n^{\prime}_{k,t+1}P_{t+1}-\delta^{t}_{k}n^{\prime}_{k,t}P_{t}-\delta_{k}^{t}\nu_{k,t}P_{t},\quad t\geq 1. (3.13)

Furthermore, as the price process (Pt,t0)(P_{t},\,t\geq 0) is independent of t\mathcal{F}_{t}, we have

𝖤(nk,t+1Pt+1|𝒢t)\displaystyle{\bf\sf E}(n^{\prime}_{k,t+1}P_{t+1}\,|\,\mathcal{G}_{t}) =𝖤(𝖤(nk,t+1|t)Pt+1|𝒢t)\displaystyle={\bf\sf E}({\bf\sf E}(n^{\prime}_{k,t+1}\,|\,\mathcal{F}_{t})P_{t+1}\,|\,\mathcal{G}_{t})
=(3.12)πk,t𝖤(Nt+1Pt+1|𝒢t)=πk,t𝖤(Mt+1|𝒢t).\displaystyle\stackrel{{\scriptstyle\eqref{eq:mag}}}{{=}}\pi_{k,t}{\bf\sf E}(N_{t+1}P_{t+1}\,|\,\mathcal{G}_{t})=\pi_{k,t}{\bf\sf E}(M_{t+1}\,|\,\mathcal{G}_{t}).

This, along with (3.13) yields the desired expression in (3.11), along with nk,t=nk,t+νk,tn_{k,t}=n^{\prime}_{k,t}+\nu_{k,t}, nk,t=πk,tNtn_{k,t}=\pi_{k,t}N_{t}, and Mt=NtPtM_{t}=N_{t}P_{t}. ∎

The process {Πk,t}\{\Pi_{k,t}\} also connects to the utility UkU_{k} in (3.9). To see this, summing up both sides of (C1) and (C3) over tt (along with bk,0=0b_{k,0}=0 in (C2)), we have

tτkδktck,t=tτkδktck,t=δkτknτkPτkt=1τk1δktνk,tPt+t=1τk1δkt[(1+rfree)δk1]bk,t.\sum_{t\leq\tau_{k}}\delta^{t}_{k}c_{k,t}=\sum_{t\leq\tau_{k}}\delta^{t}_{k}c_{k,t}=\delta_{k}^{\tau_{k}}n^{\prime}_{\tau_{k}}P_{\tau_{k}}-\sum_{t=1}^{\tau_{k}-1}\delta^{t}_{k}\nu_{k,t}P_{t}+\sum_{t=1}^{\tau_{k}-1}\delta_{k}^{t}\left[(1+r_{\tiny\mbox{free}})\delta_{k}-1\right]b_{k,t}. (3.14)

Observe that the first two terms on the RHS are equal to Πk,τk\Pi_{k,\tau_{k}}, so we can rewrite the above as follows (after taking expectations on both sides), emphasizing the exit time τk\tau_{k} and the strategy (ν,b)(\nu,b),

Uk(τk,ν,b)=𝖤[Πk,τk(ν)]+𝖤(t=1τk1δkt[(1+rfree)δk1]bk,t);U_{k}(\tau_{k},\nu,b)={\bf\sf E}\left[\Pi_{k,\tau_{k}}(\nu)\right]+{\bf\sf E}\left(\sum_{t=1}^{\tau_{k}-1}\delta_{k}^{t}\left[(1+r_{\tiny\mbox{free}})\delta_{k}-1\right]b_{k,t}\right); (3.15)

hence, the RHS above is separable: the first term depends on (ν)(\nu) only while the second term, the summation, on (b)(b) only. Furthermore, the second term is 0\leq 0 provided (1+rfree)δk1(1+r_{\tiny\mbox{free}})\delta_{k}\leq 1 (which is the condition (a) assumed in Theorem 9 below), along with bb being non-negative, part of the feasibility in (C2). In this case, we will have Uk𝖤(Πk,τk(ν))U_{k}\leq{\bf\sf E}(\Pi_{k,\tau_{k}}(\nu)), which implies Ukmaxτk,ν𝖤(Πk,τk(ν))U^{*}_{k}\leq\max_{\tau_{k},\nu}{\bf\sf E}(\Pi_{k,\tau_{k}}(\nu)), with equality holding when bk,t=0b_{k,t}=0 for all t=1,,τkt=1,\dots,\tau_{k}.

We are now ready to present the main result regarding the utility maximization problem in (3.9). A quick word on the parameter rcrypr_{\tiny\mbox{cryp}} that will appear prominently in Theorem 9 below. Simply put, it is the rate (expected rate of return) associated with each stake (e.g., a unit of some cryptocurrency), i.e., it is the counterpart of rfreer_{\tiny\mbox{free}}, the rate for the risk-free asset. We will elaborate more on the two rates after proving the theorem. In the theorem, two strategies are singled out: the “buy-out” strategy, in which bidder kk buys up all stakes available at time 11, and then participates in the bidding process until the end; and the “non-participation” strategy, in which bidder kk turns all nk,0n_{k,0} stakes into cash, and then never participates in either bidding or trading for all t1t\geq 1. Note that the non-participation strategy is executed at τk=0\tau_{k}=0; as such, it complements the feasible class, which is for τk1\tau_{k}\geq 1 and presumes participation. The buy-out strategy clearly belongs to the feasible class.

Theorem 9 (Buy-out strategy versus non-participation).

Assume the following two conditions:

(a)δk(1+rfree)1and(b)𝖤(Mt+1|𝒢t)=(1+rcryp)Mt.{\rm(a)}\;\;\delta_{k}(1+r_{\tiny\mbox{free}})\leq 1\quad{\rm and}\quad{\rm(b)}\;\;{\bf\sf E}(M_{t+1}\,|\,\mathcal{G}_{t})=(1+r_{\tiny\mbox{cryp}})M_{t}. (3.16)

Then, under the Poly(α)\texttt{Poly}(\alpha) voting rule, the following results will hold.

First, with condition (a), the maximal utility UkU^{*}_{k} is achieved by setting bk,t=0b_{k,t}=0 for all t=1,,Tkt=1,\dots,T_{k}; i.e., Uk=maxν𝖤(Πk,Tk)U^{*}_{k}=\max_{\nu}{\bf\sf E}(\Pi_{k,T_{k}}).

In addition, all three parts of the following will hold.

  1. (i)

    If δk(1+rcryp)1\delta_{k}(1+r_{\tiny\mbox{cryp}})\leq 1, then any feasible strategy will provide no greater utility for bidder kk than the non-participation strategy, i.e., Uknk,0P0U^{*}_{k}\leq n_{k,0}P_{0}.

  2. (ii)

    If δk(1+rcryp)1\delta_{k}(1+r_{\tiny\mbox{cryp}})\geq 1, then any feasible strategy will provide no greater utility for bidder kk than the buy-out strategy. In this case, bidder kk will buy all available stakes at time 11, and participate in the bidding process until the terminal time TkT_{k}.

  3. (iii)

    If δk(1+rcryp)=1\delta_{k}(1+r_{\tiny\mbox{cryp}})=1, then, bidder kk is indifferent between the non-participation and the buy-out strategy with any exit time, both of which will provide no less utility than any feasible strategy. In other words, all strategies achieve the same utility (which is Πk,0=n0Pk,0\Pi_{k,0}=n_{0}P_{k,0}).

Moreover, when δk=δ:=(1+rcryp)1\delta_{k}=\delta:=(1+r_{\tiny\mbox{cryp}})^{-1} for all kk, then no bidder will have any incentive to trade. Consequently, the long-term behaviors (of NtN_{t}, πk,t\pi_{k,t} and θk,t\theta_{k,t}) characterized in Proposition 2, Theorem 6 and Proposition 7 will hold.

Proof.

That Uk=maxτk,ν𝖤(Πk,τk)U^{*}_{k}=\max_{\tau_{k},\nu}{\bf\sf E}(\Pi_{k,\tau_{k}}) (with bk,tb_{k,t} being set to 0 for all tt), under condition (a) in (3.16), has already been established in the discussions following (3.15). So, it suffices to prove the three parts (i)-(iii).

(i) Applying the given condition (b) in (3.16), along with the assumed inequality δk(1+rcryp)1\delta_{k}(1+r_{\tiny\mbox{cryp}})\leq 1, to the RHS of the equation in (3.11) will make it 0\leq 0; i.e.,, {Πk,t}\{\Pi_{k,t}\} is a 𝒢t\mathcal{G}_{t}-super-martingale, implying 𝖤(Πk,τk)Πk,0{\bf\sf E}(\Pi_{k,\tau_{k}})\leq\Pi_{k,0}. Since Πk,0\Pi_{k,0} is independent of ν\nu, we have

Uk=maxτk,ν𝖤(Πk,τk)Πk,0=nk,0P0,U^{*}_{k}=\max_{\tau_{k},\nu}{\bf\sf E}(\Pi_{k,\tau_{k}})\leq\Pi_{k,0}=n_{k,0}P_{0}, (3.17)

(ii) With the assumed inequality δk(1+rcryp)1\delta_{k}(1+r_{\tiny\mbox{cryp}})\geq 1, {Πk,t}\{\Pi_{k,t}\} now becomes a 𝒢t\mathcal{G}_{t}-sub-martingale; and hence, the inequality below,

𝖤(Πk,Tk)𝖤(Πk,τk)Πk,0=nk,0P0.{\bf\sf E}(\Pi_{k,T_{k}})\geq{\bf\sf E}(\Pi_{k,\tau_{k}})\geq\Pi_{k,0}=n_{k,0}P_{0}. (3.18)

To identify the optimal trading strategy {νk,j}jTk1\{\nu^{*}_{k,j}\}_{j\leq T_{k}-1}, we use backward induction (dynamic programming). To optimize νk,Tk1\nu_{k,T_{k}-1}, observe

𝖤(δkTknk,TkPTkδkTk1νk,Tk1PTk1|𝒢Tk1)\displaystyle\quad{\bf\sf E}(\delta_{k}^{T_{k}}n^{\prime}_{k,T_{k}}P_{T_{k}}-\delta_{k}^{T_{k}-1}\nu_{k,T_{k}-1}P_{T_{k}-1}\,|\,\mathcal{G}_{T_{k}-1})
=δkTk(nk,Tk1+νk,Tk1)(1+NTk1α1)𝖤(PTk|𝒢Tk1)δkTk1νk,Tk1PTk1\displaystyle=\delta_{k}^{T_{k}}(n^{\prime}_{k,T_{k}-1}+\nu_{k,T_{k}-1})\left(1+N_{T_{k}-1}^{-\alpha-1}\right){\bf\sf E}(P_{T_{k}}|\mathcal{G}_{T_{k}-1})-\delta_{k}^{T_{k}-1}\nu_{k,T_{k}-1}P_{T_{k}-1}
=δkTknk,Tk1NTk11𝖤(NTkPTk|𝒢Tk1)+δkTk1(δkNTk11𝖤(NTkPTk|𝒢Tk1)PTk1)νk,Tk1\displaystyle=\delta_{k}^{T_{k}}n^{\prime}_{k,T_{k}-1}N_{T_{k}-1}^{-1}{\bf\sf E}(N_{T_{k}}P_{T_{k}}|\mathcal{G}_{T_{k}-1})+\delta_{k}^{T_{k}-1}\left(\delta_{k}N_{T_{k}-1}^{-1}{\bf\sf E}(N_{T_{k}}P_{T_{k}}|\mathcal{G}_{T_{k}-1})-P_{T_{k}-1}\right)\nu_{k,T_{k}-1}
=δkTknk,Tk1NTk11𝖤(MTk|𝒢Tk1)+δkTk1(δkNTk11𝖤(MTk|𝒢Tk1)PTk1)νk,Tk1\displaystyle=\delta_{k}^{T_{k}}n^{\prime}_{k,T_{k}-1}N_{T_{k}-1}^{-1}{\bf\sf E}(M_{T_{k}}|\mathcal{G}_{T_{k}-1})+\delta_{k}^{T_{k}-1}\left(\delta_{k}N_{T_{k}-1}^{-1}{\bf\sf E}(M_{T_{k}}|\mathcal{G}_{T_{k}-1})-P_{T_{k}-1}\right)\nu_{k,T_{k}-1}

which is linear in νk,Tk1\nu_{k,T_{k-1}}. By assumed condition (b) in (3.16), we have

δkNTk11𝖤(MTk|𝒢Tk1)PTk1(δk(1+rcryp)1)PTk10.\delta_{k}N_{T_{k}-1}^{-1}{\bf\sf E}(M_{T_{k}}|\mathcal{G}_{T_{k}-1})-P_{T_{k}-1}\geq\left(\delta_{k}(1+r_{\tiny\mbox{cryp}})-1\right)P_{T_{k}-1}\geq 0.

Thus, (νk,Tk1|𝒢Tk1)=NTk1nk,Tk1(\nu^{*}_{k,T_{k}-1}\,|\,\mathcal{G}_{T_{k}-1})=N_{T_{k}-1}-n^{\prime}_{k,T_{k}-1}, following the (binding) constraint in (C2). That is, bidder kk’s optimal strategy at the penultimate time Tk1T_{k}-1 is to buy all available stakes at that time. Going backward, we have (νk,j|𝒢j)=Nk,jnk,j(\nu^{*}_{k,j}\,|\,\mathcal{G}_{j})=N_{k,j}-n^{\prime}_{k,j} for j1j\geq 1. Thus, the optimal trading strategy is νk,1=N1nk,1\nu^{*}_{k,1}=N_{1}-n^{\prime}_{k,1}, νk,2==νk,Tk1=0\nu^{*}_{k,2}=\cdots=\nu^{*}_{k,T_{k}-1}=0.

(iii) Under the assumed equality δk(1+rcryp)=1\delta_{k}(1+r_{\tiny\mbox{cryp}})=1, {Πk,t}\{\Pi_{k,t}\} is a 𝒢t\mathcal{G}_{t}-martingale; hence, the inequality in (3.17) now holds as equality, i.e., Uk=Πk,0=nk,0P0U^{*}_{k}=\Pi_{k,0}=n_{k,0}P_{0}. Thus. all strategies lead to the optimal utility, including any feasible strategy (in particular, the no-trading strategy) and the non-participation strategy.

The “moreover” part of the theorem is immediate. ∎

In what remains of this section, we make a few remarks on Theorem 9, in particular, to motivate and explain its required conditions. First, the rate rcrypr_{\tiny\mbox{cryp}} is determined by condition (b), the second equation in (3.16). As such, it should be distinct from rfreer_{\tiny\mbox{free}}, the latter being associated with a risk-free asset. For all practical purpose, we can assume rcrptrfreer_{\tiny\mbox{crpt}}\geq r_{\tiny\mbox{free}}, even though this is not assumed in the theorem. When this relation does hold, then condition (a) will become superfluous in cases (i) and (iii).

Second, the discount factor δk\delta_{k} in the utility objective in (3.9), a parameter that measures bidder kk’s sensitivity towards risk, plays a key role in characterizing phase transitions in terms of δk(1+rcryp)\delta_{k}(1+r_{\tiny{\mbox{cryp}}}). In case (i), the inequality δk1/(1+rcryp)\delta_{k}\leq 1/(1+r_{\tiny\mbox{cryp}}) implies bidder kk is seriously risk-averse; and this is reflected in kk’s non-participation strategy. In case (ii), the inequality holds in the opposite direction, implying bidder kk is lightly risk-averse or even a risk taker. Accordingly, kk’s strategy is to aggressively sweep up all the available stakes to reach monopoly, and participate (but not trade) until the terminal time. Also note in this case, the non-participation strategy will provide less (no greater) utility for bidder kk than the “no-trading” strategy, and certainly no greater utility than the buy-out strategy. In case (iii), the inequality becomes an equality δk=1/(1+rcryp)\delta_{k}=1/(1+r_{\tiny\mbox{cryp}}), and {Πk,t}\{\Pi_{k,t}\} becomes a martingale. Consequently, bidder kk is indifferent between non-participation and participation, and in the latter case, indifferent to all (feasible) strategies, including the buy-out (and the no-trading) strategy. Indeed, the equality δk=1/(1+rcryp)\delta_{k}=1/(1+r_{\tiny\mbox{cryp}}) is both necessary and sufficient for the no-trading strategy. This equality also has the effect to force all participating bidders to have the same risk sensitivity.

In contrast, in Roşu and Saleh (2021), there is a single rate rfreer_{\tiny\mbox{free}}, or equivalently. rcryp=rfreer_{\tiny\mbox{cryp}}=r_{\tiny\mbox{free}} is assumed, which seems difficult to justify, since in most applications (cryptocurrency in particular) rcrypr_{\tiny\mbox{cryp}} will be significantly larger than rfreer_{\tiny\mbox{free}}. Moreover, there is also a single risk sensitivity for all bidders, which is set at δ=1/(1+rfree)\delta=1/(1+r_{\tiny\mbox{free}}). Thus, Roşu and Saleh (2021) is limited to the martingale case only, reaching the same conclusion as our case (iii), that all feasible strategies, buy-out included, yields the same (expected) utility. As there is no stopping decision and super- or sub-martingale cases in Roşu and Saleh (2021), non-participation does not come up at all, neither do notions like risk-averse or risk-seeking.

The last point we want to emphasize is that the two conditions in (3.16) play very different roles. As evident from the proof of Theorem 9, condition (b) makes {Πk,t}\{\Pi_{k,t}\} a super- or sub-martingale or a martingale, according to bidder kk’s risk sensitivity as specified by the inequalities and equality applied to δk\delta_{k} (along with rfreer_{\tiny\mbox{free}}) in the three cases. Yet, to solve the maximization problem in (3.9), {Πk,t}\{\Pi_{k,t}\} needs to be connected to the utility; and this is the role played by condition (a), under which it is necessary (for optimality) to set bk,t=0b_{k,t}=0 for all t1t\geq 1, and applicable to all three cases in Theorem 9. In this sense, condition (a) alone solves half of the maximization problem, the bk,tb_{k,t} half of the strategy. In fact, it’s more than half, as the optimal ν\nu strategy is only needed in the sub-martingale case; and even there, condition (a) pins down the fact that to participate (even without trading) is better than non-participation.

Note that Theorem 9 can be readily extended. For instance, the rates rcryp(t)r_{\tiny\mbox{cryp}}(t) and rfree(t)r_{\tiny\mbox{free}}(t) can vary over the time. In this case, it suffices to modify the conditions in case (i) to

(1+supt<Tkrcryp(t))δk1and(1+supt<Tkrfree(t))δk1,\left(1+\sup_{t<T_{k}}r_{\tiny\mbox{cryp}}(t)\right)\delta_{k}\leq 1\quad\mbox{and}\quad\left(1+\sup_{t<T_{k}}r_{\tiny\mbox{free}}(t)\right)\delta_{k}\leq 1,

the conditions in case (ii) to

(1+inft<Tkrcryp(t))δk1and(1+supt<Tkrfree(t))δk1,\left(1+\inf_{t<T_{k}}r_{\tiny\mbox{cryp}}(t)\right)\delta_{k}\geq 1\quad\mbox{and}\quad\left(1+\sup_{t<T_{k}}r_{\tiny\mbox{free}}(t)\right)\delta_{k}\leq 1,

and the conditions in case (iii) to

δk=(1+rcryp)1andsupt<Tkrfree(t)rcryp,with rcryp being constant.\delta_{k}=(1+r_{\tiny\mbox{cryp}})^{-1}\quad\mbox{and}\quad\sup_{t<T_{k}}r_{\tiny\mbox{free}}(t)\leq r_{\tiny\mbox{cryp}},\quad\mbox{with }r_{\tiny\mbox{cryp}}\mbox{ being constant}.

Then, Theorem 9 will continue to hold. We can also include a processing cost κ>0\kappa>0 that any bidder selected by the Poly(α)\texttt{Poly}(\alpha) mechanism will pay to receive the reward. (This corresponds to the “mining” cost to validate the block.) In this case, the budget constraint (C1) is modified by adding a term κ1Sk,t-\kappa 1_{S_{k,t}} to the right side of the equation, and the same applies to the liquidation constraint (with tt replaced by TkT_{k}). Condition (b) in (3.16) is modified to 𝖤(Mt+1|𝒢t)=(1+rcryp)Mt+κ{\bf\sf E}(M_{t+1}\,|\,\mathcal{G}_{t})=(1+r_{\tiny\mbox{cryp}})M_{t}+\kappa.

4. Conclusions

We have proposed in this study a new Poly(α)\texttt{Poly}(\alpha) voting rule that is more general than the traditional voting rule (which is linear, corresponding to α=0\alpha=0). More importantly, the Poly(α)\texttt{Poly}(\alpha) voting rule distinguishes voting power from voter share, and hence decouples the two.

Applying the Poly(α)\texttt{Poly}(\alpha) voting rule to the PoS protocol, where the voters are the bidders (competing for “rewards,” or validation of new blocks), we show this decoupling will enhance security, a key objective of the PoS protocol. Specifically, we prove that while bidder shares form a martingale process that will converge to a Dirichlet distribution, each bidder’s voting power is a super-martingale that decreases to zero over time. For both limiting results, we explicitly characterize their rate of convergence as well. Furthermore, we show a phase transition in the stability of bidder shares in terms of each bidder’s initial share relative to the total in the system. We also study the issue of a bidder’s risk sensitivity when trading is allowed, and provide conditions under which a bidder will have no incentive to participate in the bidding process, or, if participate, will forgo trading.

In the Introduction, we mentioned two general approaches to enhance security in the PoS protocol: adjust the amount of reward over time and slow down the voting process; and the current study focuses on the latter while keeping the reward constant. It is possible to pursue a combination of both approaches, i.e., adjusting the size of reward dynamically over time in the same manner as adjusting α\alpha (for the latter, refer to §5.2 below). In another direction, it is also possible to study the trading problem in §3.2 under a suitable market impact model, where the price process PtP_{t} will be impacted by trading activities; for instance, a mean-field PoS model with linear impact (and transaction costs).


Acknowledgments: We thank anonymous referees for helpful suggestions which improve the presentation of the paper. W. Tang gratefully acknowledges financial support through NSF grants DMS-2113779 and DMS-2206038, and through a start-up grant at Columbia University. David Yao’s work is part of a Columbia-CityU/HK collaborative project that is supported by InnoHK Initiative, The Government of the HKSAR and the AIFT Lab.

5. Appendix

5.1. Improvement on λ±(α)\lambda_{\pm}(\alpha)

Theorem 3 proves large-deviation bounds on NtN_{t}. However, it does not cover the whole range. It remains open to prove such bounds in the range (λ(α),λ+(α))(\lambda_{-}(\alpha),\lambda_{+}(\alpha)); and once proved, the result will also imply the almost sure convergence of Nt/t11+αN_{t}/t^{\frac{1}{1+\alpha}} as tt\to\infty.

Here we provide a way to (slightly) improve the values of λ±(α)\lambda_{\pm}(\alpha) in Theorem 3. To simplify the presentation, we consider α=1\alpha=1 (quadratic voting rule) with λ(1)0.56\lambda_{-}(1)\approx 0.56 and λ+(1)2.51\lambda_{+}(1)\approx 2.51. The idea relies on a multi-scale analysis by splitting the interval [0,t][0,t] into [0,t/2][0,t/2] and [t/2,t][t/2,t], and the goal is to upper bound (Nt=λt)\mathbb{P}(N_{t}=\lambda\sqrt{t}) for λ>0\lambda>0. In the sequel, we neglect the polynomial factors and only focus on the exponential terms. Note that

𝖯(Nt=λt)=kλt(t/2k)(t/2λtk)1(λt)!(11k)t/2k(11λt)t/2+kλt(a′′).{\bf\sf P}(N_{t}=\lambda\sqrt{t})=\sum_{k\leq\lambda\sqrt{t}}\binom{t/2}{k}\binom{t/2}{\lambda\sqrt{t}-k}\frac{1}{(\lambda\sqrt{t})!}\underbrace{\left(1-\frac{1}{k}\right)^{t/2-k}\left(1-\frac{1}{\lambda\sqrt{t}}\right)^{t/2+k-\lambda\sqrt{t}}}_{(a^{\prime\prime})}.

Next we split the range of kλtk\leq\lambda\sqrt{t} into S1:={kat}{k(λa)t}S_{1}:=\{k\leq a\sqrt{t}\}\cup\{k\geq(\lambda-a)\sqrt{t}\}, and S2:={at<k<(λa)t}S_{2}:=\{a\sqrt{t}<k<(\lambda-a)\sqrt{t}\} with a<λ2a<\frac{\lambda}{2}. For kS1k\in S_{1}, we simply bound the term (a) by (11λt)t/2λt\left(1-\frac{1}{\lambda\sqrt{t}}\right)^{t/2-\lambda\sqrt{t}} while for kS2k\in S_{2} we bound the term (a′′a^{\prime\prime}) by (11(λa)t)t/2(λa)t(11λt)t/2at\left(1-\frac{1}{(\lambda-a)\sqrt{t}}\right)^{t/2-(\lambda-a)\sqrt{t}}\left(1-\frac{1}{\lambda\sqrt{t}}\right)^{t/2-a\sqrt{t}}. Consequently,

𝖯(Nt=λt)(kS1(t/2k)(t/2λtk))1(λt)!(11λt)t/2λt(b′′)+(kS2(t/2k)(t/2λtk))1(λt)!(11(λa)t)t/2(λa)t(11λt)t/2at(c′′).{\bf\sf P}(N_{t}=\lambda\sqrt{t})\leq\underbrace{\left(\sum_{k\in S_{1}}\binom{t/2}{k}\binom{t/2}{\lambda\sqrt{t}-k}\right)\frac{1}{(\lambda\sqrt{t})!}\left(1-\frac{1}{\lambda\sqrt{t}}\right)^{t/2-\lambda\sqrt{t}}}_{(b^{\prime\prime})}\\ +\underbrace{\left(\sum_{k\in S_{2}}\binom{t/2}{k}\binom{t/2}{\lambda\sqrt{t}-k}\right)\frac{1}{(\lambda\sqrt{t})!}\left(1-\frac{1}{(\lambda-a)\sqrt{t}}\right)^{t/2-(\lambda-a)\sqrt{t}}\left(1-\frac{1}{\lambda\sqrt{t}}\right)^{t/2-a\sqrt{t}}}_{(c^{\prime\prime})}.

Using Stirling’s formula, we get exponential bounds for the terms (b′′b^{\prime\prime}) and (c′′c^{\prime\prime}):

(b′′)exp((λlog2+2λaloga(λa)log(λa)λlogλ1λ)t),\displaystyle(b^{\prime\prime})\sim\exp\left((-\lambda\log 2+2\lambda-a\log a-(\lambda-a)\log(\lambda-a)-\lambda\log\lambda-\frac{1}{\lambda})\sqrt{t}\right), (5.1)
(c′′)exp((2λ2λlogλ12λ12(λa))t).\displaystyle(c^{\prime\prime})\sim\exp\left((2\lambda-2\lambda\log\lambda-\frac{1}{2\lambda}-\frac{1}{2(\lambda-a)})\sqrt{t}\right).

By equating the two coefficients before t\sqrt{t} in (5.1), we have

λlog2+2λaloga(λa)log(λa)λlogλ1λ)=2λ2λlogλ12λ12(λa).-\lambda\log 2+2\lambda-a\log a-(\lambda-a)\log(\lambda-a)-\lambda\log\lambda-\frac{1}{\lambda})=2\lambda-2\lambda\log\lambda-\frac{1}{2\lambda}-\frac{1}{2(\lambda-a)}.

By letting a=θλa=\theta\lambda with θ<12\theta<\frac{1}{2}, the above equation yields

λ=θ2(1θ)(log2+θlogθ+(1θ)log(1θ)).\lambda=\sqrt{\frac{\theta}{2(1-\theta)(\log 2+\theta\log\theta+(1-\theta)\log(1-\theta))}}. (5.2)

and the coefficient before t\sqrt{t} is

f(λ)=2λlogλ2λ+12λ+12(1θ)λ,f(\lambda)=2\lambda\log\lambda-2\lambda+\frac{1}{2\lambda}+\frac{1}{2(1-\theta)\lambda}, (5.3)

where θ\theta is specified by (5.2). By injecting the expression (5.2) into (5.3), ff is a function of θ\theta. It is easy to see that f(θ)f(\theta) has only one root on (0,1/2)(0,1/2) which is approximately 0.15750.1575, and λ(1)\lambda_{-}(1) is improved numerically to from 0.560.56 to 0.600.60. Similarly, the value of λ+(1)\lambda_{+}(1) is improved numerically from 2.512.51 to 2.442.44.

We can continue this procedure, for instance to split [0,t][0,t] into [0,t/3][0,t/3], [t/3,2t/3][t/3,2t/3] and [2t/3,t][2t/3,t], and so on to get better and better numerical values of λ(1)\lambda_{-}(1) and λ+(1)\lambda_{+}(1). However, it is not clear whether this approach will eventually get all the way to the threshold 21.41\sqrt{2}\approx 1.41. We conjecture that the exponential deviation holds right off the threshold (1+α)11+α(1+\alpha)^{\frac{1}{1+\alpha}}, which is supported by the numerical experiments; refer to Figure 1.

Refer to caption
(a) Histogram of N8000N_{8000} on MC simulation of 2000020000 samples.
Refer to caption
(b) xx-axis: t{1000,1500,,8000}t\in\{1000,1500,\ldots,8000\}; yy-axis: ln𝖯(Nt>2.2t)/t-\ln{\bf\sf P}(N_{t}>\sqrt{2.2\,t})/\sqrt{t} (left) and ln𝖯(Nt<1.8t)/t-\ln{\bf\sf P}(N_{t}<\sqrt{1.8\,t})/\sqrt{t} (right) on MC simulation of 2000020000 samples.
Figure 1. Volume of stakes NtN_{t} with N0=5N_{0}=5 and α=1\alpha=1 (quadratic voting).

5.2. Control of voting powers

As proved in Theorem 6, the reward rate θk,t\theta_{k,t} decays at rate Θ(tα1+α)\Theta(t^{-\frac{\alpha}{1+\alpha}}). If the reward is associated with the validation of a new block, then the duration between two consecutive validations (called “block time” below) will increase (and uncontrolled) over time. For instance, set α=1\alpha=1 (quadratic voting rule), and T=107T=10^{7} seconds (4\approx 4 months). Then, the duration required to see the next block at time TT is approximately

10 seconds ×(107/10)12=104 seconds 3 hours,10\mbox{ seconds }\times(10^{7}/10)^{\frac{1}{2}}=10^{4}\mbox{ seconds }\approx 3\mbox{ hours},

which is even much longer than the 1010 minutes block time of Bitcoin. (The block time is 1010 seconds in Ethereum, see e.g. Buterin (2014).)

One possible (and practical) solution is to dynamically “tune” the parameter α\alpha over time. Specifically, let κ\kappa denote a threshold for the expected number of rounds of bidding/voting between two validated blocks. Then,

  • set α=α0>0\alpha=\alpha_{0}>0, and apply the Poly(α0)\texttt{Poly}(\alpha_{0}) scheme up to round κ1+α01\kappa^{1+\alpha_{0}^{-1}};

  • set α=α1<α0\alpha=\alpha_{1}<\alpha_{0}, and apply the Poly(α1)\texttt{Poly}(\alpha_{1}) scheme up to round κ1+α11\kappa^{1+\alpha_{1}^{-1}}\ldots and so on.

Here κ,α0,α1,\kappa,\alpha_{0},\alpha_{1},\ldots are user-defined hyper-parameters. To illustrate, by setting κ=50\kappa=50 rounds (10\approx 10 minutes in Ethereum) and αk=(1+k)1\alpha_{k}=(1+k)^{-1} for k0k\geq 0,

  • -

    Apply the Poly(1)\texttt{Poly}(1) scheme up to round 502750^{2}\approx 7 hours;

  • -

    Apply the Poly(1/2)\texttt{Poly}(1/2) scheme up to round 503250^{3}\approx 2 weeks;

  • -

    Apply the Poly(1/3)\texttt{Poly}(1/3) scheme up to round 504250^{4}\approx 2 years;

  • -

    Apply the Poly(1/4)\texttt{Poly}(1/4) scheme up to round 50510050^{5}\approx 100 years \ldots and so on.

Similarly, by setting κ=5\kappa=5 rounds (1\approx 1 minutes in Ethereum),

  • -

    Apply the Poly(1)\texttt{Poly}(1) scheme up to round 5245^{2}\approx 4 minutes;

  • -

    Apply the the Poly(1/2)\texttt{Poly}(1/2) scheme up to round 53205^{3}\approx 20 minutes; \cdots

  • -

    Apply the Poly(1/10)\texttt{Poly}(1/10) scheme up to round 511155^{11}\approx 15 years \ldots, and so on.

It is also possible to tune the parameter α\alpha at random time points adaptive to the reward rate. That is,

  • Set α=α0>0\alpha=\alpha_{0}>0, and apply the Poly(α0)\texttt{Poly}(\alpha_{0}) scheme up to round k0k_{0} where k0k_{0} is the first time by which no new block is validated in κ\kappa rounds;

  • Set α=α1<α0\alpha=\alpha_{1}<\alpha_{0}, and apply the Poly(α0)\texttt{Poly}(\alpha_{0}) scheme up to round k1k_{1} where k1k_{1} is the first time by which no new block is validated in κ\kappa rounds since then \ldots and so on.

Note that in either case the process of stakes is a time-changed Pólya urn, so the results in Section 3 continue to hold (except that the convergence rate will depend on the choice of {αk}\{\alpha_{k}\}).

References

  • Armbrust et al. (2009) M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, and I. Stoica. Above the clouds: A Berkeley view of cloud computing. 2009. Technical Report UCB/EECS-2009-28. Available at https://www2.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf.
  • Bagaria et al. (2019) V. Bagaria, A. Dembo, S. Kannan, S. Oh, D. Tse, P. Viswanath, X. Wang, and O. Zeitouni. Proof-of-stake longest chain protocols: Security vs predictability. 2019. arXiv:1910.02218.
  • Billingsley (1995) P. Billingsley. Probability and measure. Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, Inc., New York, third edition, 1995.
  • Billingsley (1999) P. Billingsley. Convergence of probability measures. Wiley Series in Probability and Statistics: Probability and Statistics. John Wiley & Sons, Inc., New York, second edition, 1999.
  • Buterin (2014) V. Buterin. Toward a 1212-second block time. 2014. Available at https://blog.ethereum.org/2014/07/11/toward-a-12-second-block-time.
  • Chen and Yao (2001) H. Chen and D. D. Yao. Fundamentals of queueing networks, volume 46 of Applications of Mathematics. Springer-Verlag, 2001.
  • Dean and Ghemawat (2008) J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51(1):107–113, 2008.
  • Deirmentzoglou et al. (2019) E. Deirmentzoglou, G. Papakyriakopoulos, and C. Patsakis. A survey on long-range attacks for proof of stake protocols. IEEE Access, 7:28712–28725, 2019.
  • Denisov et al. (2016) D. Denisov, D. Korshunov, and V. Wachtel. At the edge of criticality: Markov chains with asymptotically zero drift. 2016. arXiv:1612.01592.
  • Durrett (2019) R. Durrett. Probability—theory and examples. Cambridge University Press, 2019.
  • Garcia-Molina (1982) H. Garcia-Molina. Elections in a distributed computing system. IEEE Trans. Comput., 31(01):48–59, 1982.
  • Goldstein and Reinert (2013) L. Goldstein and G. Reinert. Stein’s method for the beta distribution and the Pólya-Eggenberger urn. J. Appl. Probab., 50(4):1187–1205, 2013.
  • Huang and Baliga (2009) A. Q. Huang and J. Baliga. FREEDM System: Role of power electronics and power semiconductors in developing an energy internet. In 21st International Symposium on Power Semiconductor Devices & IC’s, pages 9–12, 2009.
  • King and Nadal (2012) S. King and S. Nadal. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. 2012. Available at https://decred.org/research/king2012.pdf.
  • Lalley and Weyl (2018) S. P. Lalley and E. G. Weyl. Quadratic voting: How mechanism design can radicalize democracy. In AEA Papers and Proceedings, volume 108, pages 33–37, 2018.
  • Lamperti (1960) J. Lamperti. Criteria for the recurrence or transience of stochastic process. I. J. Math. Anal. Appl., 1:314–330, 1960.
  • Lamperti (1962) J. Lamperti. A new class of probability limit theorems. J. Math. Mech., 11:749–772, 1962.
  • Lamperti (1963) J. Lamperti. Criteria for stochastic processes. II. Passage-time moments. J. Math. Anal. Appl., 7:127–145, 1963.
  • Lamport et al. (1982) L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, 4(3):382–401, 1982.
  • Menshikov et al. (2017) M. Menshikov, S. Popov, and A. Wade. Non-homogeneous random walks, volume 209 of Cambridge Tracts in Mathematics. Cambridge University Press, Cambridge, 2017. Lyapunov function methods for near-critical stochastic systems.
  • Nakamoto (2008) S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, page 21260, 2008.
  • Penrose (1946) L. S. Penrose. The elementary statistics of majority voting. J. R. Stat. Soc., 109(1):53–57, 1946.
  • Rio (2009) E. Rio. Upper bounds for minimal distances in the central limit theorem. Ann. Inst. Henri Poincaré Probab. Stat., 45(3):802–817, 2009.
  • Roşu and Saleh (2021) I. Roşu and F. Saleh. Evolution of shares in a proof-of-stake cryptocurrency. Manag. Sci., 67(2):661–672, 2021.
  • Shi (2020) E. Shi. Foundations of Distributed Consensus and Blockchains. 2020. Available at http://elaineshi.com/docs/blockchain-book.pdf.
  • Tang (2022) W. Tang. Stability of shares in the Proof of Stake protocol – concentration and phase transitions. 2022. arXiv:2206.02227.
  • Tang (2023) W. Tang. Trading and wealth evolution in the Proof of Stake protocol. 2023. arXiv:2308.01803.
  • Tang and Yao (2023) W. Tang and D. D. Yao. Trading under the proof-of-stake protocol–a continuous-time control approach. Math. Finance, 33(4):979–1004, 2023.
  • Villani (2009) C. Villani. Optimal transport, volume 338 of Grundlehren der mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Springer-Verlag, Berlin, 2009. Old and new.
  • Wood (2014) G. Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151:1–32, 2014.