By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Nash Equilibrium and Revealed Risk Exposure with Endogenous Price Impact | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Nash Equilibrium and Revealed Risk Exposure with Endogenous Price Impact | HackerNoon
Computing

Nash Equilibrium and Revealed Risk Exposure with Endogenous Price Impact | HackerNoon

News Room
Last updated: 2025/09/23 at 11:23 PM
News Room Published 23 September 2025
Share
SHARE

Table of Links

Abstract and 1. Introduction

  1. The Model Set-up
  2. Price Impact in a Market with No Transaction Costs
  3. Price Impact in a Market with Transaction Costs

Appendix A. Proofs of Section 3

Appendix B. Proofs of Section 4

References

3. Price Impact in a Market with no Transaction Costs

We are now ready to introduce the way we model investors’ price impact. For this, we first take the position of investor n and assume (for now) that she acts strategically, while the rest of the investors are price takers. This creates a best-response function that eventually leads to the Nash equilibrium when all investors apply the same strategy.

Consider again the market clearing condition (7) and assume that all the investors, besides n, act optimally through (6). In the spirit of [Ant17], we observe that market’s returns can be viewed as a function of investor n’s demand. Indeed, in this context the clearing condition is written as:

To simplify the formulas that follow, we introduce the notation for each investor’s relative risk tolerance

The following proposition deals with the solution of problem (13).

Proposition 3.1. Under Assumption 2.2, the optimization problem (13) has the following unique solution:

Henceforth, we also refer to (14) as the best-response strategy of investor n in the frictionless market.

Remark 3.2. Comparing the best-response strategy of investor n with the respective competitive optimal strategy (6) at the competitive equilibrium we directly get:

Hence, investor n has motive to decrease the volume of her demand (positive or negative) when compared to her price-taking demand. Intuitively, lower demand implies a lower equilibrium price and hence higher required return for the assets that the investor is about to buy.

3.1. Investors’ revealed risk exposure. By applying strategy (14), investor n drives the equilibrium returns to (15), i.e. to a different equilibrium. As mentioned in the introductory section, the main reason for investors’ trading in this market is to hedge their risk exposure (the other reason is to offset noise traders’ demand). When investor n applies strategy (14), she essentially reveals different hedging needs than her true ones. In order to see that, recall the price-taking demand (6), where the risk exposure is the intercept point of the affine demand function. Under price impact, investor n submits a different demand function and hence the implied risk exposure is shifted. This creates the very useful and intuitive notion of the revealed risk exposure that is formally defined below.

Definition 3.3 (Revealed risk exposure process). For any given demand process φ ∈ H2 of investor m and local returns ν ∈ H2 pinned down at the equilibrium, the revealed exposure of investor m is defined as:

With a slight abuse of notation, we distinguish between the revealed risk exposure process ζm(·) and the true exposure process, ζm of each investor m. Departing from the above definition, we derive the following result:

A reasonable question that arises is when does the strategic demand of an investor coincides with the competitive one. As stated in the following corollary, this coincidence never happens, as long as investor’s demand at competitive equilibrium is non-zero.

3.2. The Nash equilibrium returns in a market with no transaction costs. We now consider a market where all the investors act strategically by applying the strategy that is determined by problem (12). In the view of (16), the Nash equilibrium is induced as the fixed point of (17). We formally define the the Nash equilibrium returns in this context below:

The fact that solutions to the above belong in H2 is guaranteed by Assumption 2.2 and system’s linearity. In other words, Nash equilibrium demands have the form of the best-response strategy (14), but with the rest of the investors being strategic too. Armed with the above, we give the following characterization:

Theorem 3.8. Under Assumption 2.2, the unique Nash equilibrium returns in a market without transaction costs take the following form:

As Corollary 3.6 implies, Nash equilibrium is generally different than the competitive one. Indeed, using (8) and (19) we readily get that:

Another issue that stems from equilibria comparison is whether the utility gain (or utility surplus) that is created by the trading is higher or lower for each investor due to price impact. In general, competitive equilibrium is consistent with Pareto optimal allocation and hence another equilibrium allocation decreases the aggregate gain of utility. However, in individual level, Nash equilibrium may be beneficial for some investor(s). This feature appears in several recent non-competitive settings such as [AK24] and [MR17].

To this end, we define the utility surplus for each asset return ν ∈ H2 and each admissible strategy φ ∈ H2 of the investor m as:

In the view of the related literature we get the following limiting result:

:::info
Authors:

(1) Michail Anthropelos;

(2) Constantinos Stefanakis.

:::


:::info
This paper is available on arxiv under CC by 4.0 Deed (Attribution 4.0 International) license.

:::

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Best TV deal: Get the bezel-less 85-inch Samsung UHD 4K TV for its lowest price yet
Next Article Sigma 12mm F1.4 DC Contemporary Review: Capture Wide Views With Bokeh
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

AI-cloning of Lara Croft’s voice has ‘Tomb Raider’ fans and actors up in arms
News
ETH-Based Little Pepe Raises $26M In Presale | HackerNoon
Computing
These ‘Halo’ Barrels Around Los Angeles Might Be Destroying Aquatic Life – BGR
News
Elina Svitolina and Beatriz Haddad Maia end their tennis seasons early
News

You Might also Like

Computing

ETH-Based Little Pepe Raises $26M In Presale | HackerNoon

6 Min Read
Computing

Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials

6 Min Read
Computing

Beijing orders EV quality checks in price war crackdown · TechNode

3 Min Read
Computing

Why Comments Are More Valuable Than Ever on TikTok – Blog

0 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?