Abstract

A model of insider trading in continuous time in which a risk-neutral insider possesses long-lived imperfect information on a risk asset is studied. By conditional expectation theory and filtering theory, we turn it into a model with insider knowing complete information about the asset with a revised risky value and deduce its linear Bayesian equilibrium consisting of optimal insider trading strategy and semistrong pricing rule. It shows that, in the equilibrium, as the degree of insider observing the signal of the risky asset value is more and more accurate, market depth, trading intensity, and residual information are all decreasing and the total expectation profit of the insider is increasing and that the information about the asset value incorporated into the equilibrium price, which has nothing to do with the volatility of noise trades, is increasing as time goes by, but not all information of asset value is incorporated into the price in the final disclosed time due to the incompleteness of insider’s observation, though the market depth is still a time-independent constant. Some simulations are illustrated to show these features. However, it is an open question of how to make maximal profit if the insider is risk-averse.

1. Introduction

Kyle [1] first proposed a mathematical continuous auction model of insider trading and proved that as time interval goes to zero, the equilibrium of sequential trading consisting of optimal insider trading strategies and semistrong pricing rules converges to a continuous-time version in which the market depth is a time-independent constant and all private information about the asset value is incorporated into the market price. Later, Back [2] extended Kyle’s continuous-time version to a general framework and gave a characterization of the insider’s optima by applying dynamic programming method. And then, Cho [3] obtained a no expected trade theorem regardless of how much the insider is sensitive to the risk even for a larger class of price processes. Thanks to maximum principle, Aase et al. [4] solved directly the optimal problem of Kyle–Back’s continuous-time insider trading. At the same time, Biagini et al. [5] studied the insider trading model with memory. Zhou [6] also obtained a unique linear equilibrium of continuous-time insider trading with market makers observing some partial information on a risky asset. Later, Ma et al. [7] studied the existence and uniqueness of -weak solution under reference probability measure for a more general model of continuous insider trading.

Note that the abovementioned work including other work in [816] on continuous-time insider trading focuses on the case that an insider knows complete information about the underlying risky asset. To our best knowledge, there are few research studies on continuous-time insider trading with insider possessing imperfect information on the risky asset, though there is much literature on discrete-time insider trading with partial information, see [1722].

In this paper, we will study a model of continuous-time insider trading, in which a risk-neutral insider possesses imperfect information on a static risk asset traded continuously in a time interval, and investigate the impact of the accurate degree of information observed by the insider on the market equilibrium. Our main result is that it is the first time to study continuous-time insider trading with an insider knowing incomplete privation information on the risky asset and find that the more information the insider possesses, the more advantage the insider will take, but the information about the asset value cannot be incorporated into the market price all in the final disclosed time since the information about the asset value is not perfectly observed by the insider, while market depth, trading intensity, and residual information are all decreasing. These results are in accord with our economic intuition, which are similar to those in discrete-time insider trading [1719]. Clearly, our model can be extended to the one with dynamic volatility of noise trades with similar results, which is indeed equivalent to some classical models of continuous-time insider trading in [2, 4, 6, 14, 23]. Note that, for a risk-averse insider, as in [3, 2426], how to make use of imperfect information about a risky asset to maximize profit is an open question.

The rest of the paper is organized as follows. In Section 2, we propose a model of continuous-time insider trading with a risk-neutral insider under imperfect observation. In Section 3, main results about the model with its linear Bayesian equilibrium are stated. Section 4 gives some simulations. Conclusions are drawn in Section 5.

2. The Model

In the following, all random variables or processes are defined on a filtered probability space satisfying the usual hypothesis [27, 28].

As Back said in [2], in contrast to discrete-time auctions, there are three different aspects in continuous-time insider trading that we should pay attention to: (i) the insider can infer the flow of noise trades by monitoring prices continuously through without directly observing them and then can know the current price at any time; (ii) there is no advantage to observing noise trades directly for the insider; and (iii) any trading strategy of the insider that includes discrete orders or has a nonzero local martingale part does not imply that the real value is public at the end. Therefore, the above three reasonable intuitions will also be integrated into our model framework.

The model of insider trading here is a continuous version of the model with a risky neutral insider as in [22]. Similar to [1, 2, 6, 22], we assumed that there is a risk asset traded in a finite time interval [0,T], whose value is normally distributed and disclosed at the final time . Also, there are three types of agents:(1)Noise traders, or liquidities, who have no information about the risk asset value and randomly submit a total order at time, which is assumed as in [3] that , where , , and is a standard Brownian motion independent of (2)A risk-neutral insider, who at time knows both the current price of the asset and incomplete information on the asset value as , where the noise is independent of both asset value and liquidity trades , and according to the information denoted by submits an order to maximize her/his profit, where (3)Marked makers, who at time observe the total traded volume (but cannot discriminate and , respectively) and according to the observation information denoted by set market price for the risk asset value in a semistrong efficient way [1]

So, the insider is self-financing [29] and adopts a trading strategy with differentiable paths. The collection of insider’s trading volume functions and the collection of market makers’ effective pricing functions are denoted by and , respectively. Clearly, given a pair , the insider’s profit is [2]. Then, a market equilibrium is a pair of stochastic processes .

Definition 1. A linear equilibrium is defined as a pair such that the following conditions hold:(i)Maximization of profit: given the price rule , the strategy maximizes(ii)Market efficiency: given the strategy , for any time , the price

3. Main Results

In the following, we would like to turn the above model into an equivalent market with insider knowing complete information about the asset with a revised risky value and then find some kind of linear equilibrium. To do this, we need some preparations.

In the model, for any time , the insider’s and market makers’ information can be written, respectively, as

Lemma 1. Equivalent price.

Proof. Since there are only two noisy signals in the market, one is the insider’s observation and the other is the Brownian motion with respect to the noise order , then for market makers, there must beThen,where the second equality follows from the tower law of conditional expectation [30, 31], the third follows from the independence between the asset value and the Brownian motion , and the last equality follows from the filtering of normal distribution [32].

Lemma 2. Equivalent profit.

Proof. The proof is similar to that of Lemma 1.
By integration by parts,Since for any time ,both and are measurable with respect to and is independent of the Brownian motion , then from the expression of (8) and by the tower law of conditional expectation and filtering of normal distribution,Therefore, combining this with (8), we havewhere the last equality follows again by integration by parts, and the proof is completed.
By Lemmas 1 and 2, our model with insider knowing partial information becomes a continuous model with insider knowing complete information as . So, one can apply dynamic programming [2, 3] or maximum principle [4, 6, 23] to find some kind of linear equilibrium. Therefore, we here only consider such linear strategies with satisfyingwhere and are deterministic function on , with its proof omitted.

Theorem 1 (linear equilibrium). There is a unique linear equilibrium with their dynamics bywhere

At the equilibrium, the insider’s ex-post profit from time to the end time and the insider’s ex-ante profit from the beginning to the end of the insider

Remark 1. By Theorem 1,(i)(ii)(iii)That is to say, (i) trading intensity increases with time while , called market depth [1], is time-independent; (ii) the more accurate the information on the risky asset observed by the insider, the less trading intensity is while the deeper market depth is such that the insider can make higher positive profit; (iii) furthermore, the insider can earn maximum profit when observing the asset value , and with increasing, both trading intensity and market depth increase even to ; if , however, insiders' profit is decreasing even to 0; in this case, the insider basically has no private information. In other words, the insider has become a noise trader. This is completely consistent with our intuition.
Clearly, our results when and are the same as those in models with insider knowing complete information about the asset value [1, 3, 6, 7].

Proposition 1 (residual information). Let be the linear equilibrium in Theorem 1, and denote . Then,

Proof. Let be the linear equilibrium in Theorem 1. To compute the variance , we need the help of Kalman–Bucy filtering theory.
In the model, for market makers, there is a signal-observation system:Denote the optimal filter of the signal by with and and the covariance matrix at time . Then, and .
Also, denote . Then, by Theorem 12.7 in [32] or Theorem 6.3.1 in [33], it shows that the dynamics of and are, respectively, asNote that, in (19), the second vector-equation can be written in the form of components as follows:where . To solve the equations, we introduce two notations:Then, from (20) and (21), we can obtain the following two equations:where and . Also, it is easy to show thatTherefore, we haveFinally, the explicit forms of , and can be written easily as follows:So, taking the value of above, we obtain

Remark 2. Note that the variance describes the informativeness of the price [1] at time and then measures how much information has been incorporated into the equilibrium price [18]. Here, in our model at time ,and thenwhich means that the information about the asset value incorporated into the equilibrium price is increasing as time goes by but not all information about the asset value is incorporated into the price at the end time when the asset value becomes public, except complete information observed by the insider ( if approaching ); this is because of the insider’s incomplete observation on the asset value.
Note that, by expression (26), for any trade time , the residual information is only related to the variance of the risky asset value and the variance of the insider’s observation noise , but not to the volatility of noise trading volume . In fact,

Remark 3. From equation (17), we haveThen, if and only if . It shows that, as long as the insider’s information is imperfect, the residual information will never be released completely.

4. Simulations

To see some propositions of parameters, including trading intensity, market depth, residual information, and insider’s profit, varying with volatility of noise observed by the insider or trading time at the equilibrium in our model more clearly, we give some simulations according to our Theorem 1 or Proposition 1.

In the following, consider the continuous trading time (the trading final time ), the variance of the risky asset value , and the volatility of the noisy trading order . Then, at equilibrium, trading intensity, market depth, residual information, and insider’s profit can be written using Theorem 1 or Proposition 1 as follows:

Figure 1 shows that, at the equilibrium for any information with noise received by the insider, it is easy to see that w.r.t time , the market liquidity is always constant (Figure 1(a)); the transaction intensity is concave and increasing to when the time approaching the final time (Figure 1(b)); and the residual information is decreasing linearly but since the insider does not observe the whole information on the risky asset (Figure 1(c)).

Figure 2 shows that, for any time , as volatility of the observing noise in risky asset value decreases, that is to say, the degree of insider observing the signal of the risky asset value is more and more accurate, market depth (Figure 2(a)), trading intensity , and residual information are all decreasing (Figures 2(b) and 2(c)), while the total expectation profit of the insider is increasing (Figure 2(d)). These results can be understood since the more accurate the information held by the insider, the deeper the market depth is (the weaker the trading intensity and the less the residual information) such that the insider makes more profit.

5. Conclusions

In this paper, we study an extended Kyle–Back’s model in continuous-time insider trading, which allows a risk-neutral insider to possess long-lived imperfect privative information about a static risk asset traded in a finite time interval.

By applying conditional expectation theory and filtering theory, we first establish two lemmas: equivalent price (Lemma 1) and equivalent profit (Lemma 2), which can turn our model into a model with insider knowing complete information about the asset with a revised risky value. Then, by some existing results in the literature ([2, 3, 14, 23] or [4, 6]), we deduce a closed form of its linear equilibrium consisting of semistrong pricing rule and optimal insider trading strategy with insider’s ex-post and ex-ante profits (Theorem 1).

It shows that, in the equilibrium, as the degree of the signal of the risky asset value observed by the insider is more and more accurate, market depth, trading intensity, and residual information are all decreasing and the total expectation profit of the insider is increasing and that the information about the asset value incorporated into the equilibrium price, which has nothing to do with the volatility of noise trades, is increasing as time goes by but not all information of asset value is incorporated into the price in the final disclosed time due to the incompleteness of insider’s observation, though the market depth is still a time-independent constant (Remark 1). Finally, by using the vector Kalman–Bucy filtering method, we find that the information about the asset value incorporated into the equilibrium price is increasing as time goes by, but not all of its information is incorporated into the price in the final disclosed time due to the incompleteness of insider’s observation (Proposition 1 and Remark 2). These results are in accord with our economic intuition, which are similar to those for discrete-time insider trading [1719].

As pointed out in Section 2, our model of continuous-time insider trading with a risk-neutral insider, which can be extended to the one with dynamic volatility of noise trades with similar results, is indeed equivalent to some classical models of continuous-time insider trading in [2, 3, 14, 23] or [4, 6]. However, for a risk-averse insider, how to make use of incomplete information about a risky asset to maximize profit is an open question, since our result in Lemma 2 will not be valid for risk-averse utility, which leaves to the readers.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by NSF China (11861025) and Guizhou QKHPTRC[2018]5769.