Next Article in Journal
Relationship between Occupational Pension, Corporate Social Responsibility (CSR), and Organizational Resilience: A Study on Listed Chinese Companies
Next Article in Special Issue
Determining Safe Withdrawal Rates for Post-Retirement via a Ruin-Theory Approach
Previous Article in Journal / Special Issue
Intangible Assets and Analysts’ Overreaction and Underreaction to Earnings Information: Empirical Evidence from Saudi Arabia
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Asymptotic Methods for Transaction Costs

by
Eberhard Mayerhofer
Department of Mathematics & Statistics, University of Limerick, V94 T9PX Limerick, Ireland
Risks 2024, 12(4), 64; https://doi.org/10.3390/risks12040064
Submission received: 27 February 2024 / Revised: 29 March 2024 / Accepted: 1 April 2024 / Published: 4 April 2024
(This article belongs to the Special Issue Optimal Investment and Risk Management)

Abstract

:
We propose a general approximation method for the determination of optimal trading strategies in markets with proportional transaction costs, with a polynomial approximation of the residual value function. The method is exemplified by several problems, from optimally tracking benchmarks and hedging the log contract to maximizing utility from terminal wealth. Strategies are also approximated by practically executable, discrete trades. We identify the necessary trade-off between the trading frequency and trade size to ensure satisfactory agreement with the theoretically optimal, continuous strategies of infinite activity.

1. Introduction

It was explained to me that the effects on which one was working were so vanishingly small that without the greatest possible precision in computation they might have been missed altogether.
Norbert Wiener1
Optimal trading strategies in a Black–Scholes market or its extensions face challenges when applied to realistic markets with friction, including transaction costs, price impacts, or margin requirements. For instance, employing a constant proportion trading strategy or a standard Delta hedge in the Black–Scholes model becomes practically infeasible in the presence of a relative bid–ask spread ε , as it may lead to immediate bankruptcy due to trading policies of infinite variation. In order to maintain solvency in markets with proportional transaction costs, the trading frequency is adjusted to finite variation, involving the minimal trades necessary to stay close to the target exposures. The deviation from this target exposure is of order ε 1 / 3 , while the impact on the transaction costs is of the second order (that is, of magnitude ε 2 / 3 , cf. Shreve and Soner (1994); Gerhold et al. (2014); Kallsen and Muhle-Karbe (2017); Rogers (2004)). Determining long-run optimal trading strategies or solutions to infinite horizon problems involves solving specific free boundary problems. These problems define the boundaries that limit the maximum deviation of a portfolio statistic ξ t from the target, where these statistics commonly represent the proportion of wealth in the risky asset, the risky–safe ratio, or transformed variants. For constant investment opportunities, an investor refrains from trading when ξ t is outside a constant region [ ξ , ξ + ] , engaging in minimal trading only at the boundaries ξ ± to maintain the statistic within the interval. This strategy is embodied by a diffusion with two reflecting boundaries and is referred to as a control limit policy Taksar et al. (1988). The parameterization of the involved equations and the methods to solve them are customized for each specific setup. However, the analytical methods are highly technical, making them suitable for an expert audience. Moreover, the resulting optimal trading policies are reflected diffusions (cf. Tanaka (1979)), making them impractical for implementation as they entail infinite activity.
The aim of this paper is to address these challenges by introducing asymptotic methods, both for the approximation of the value functions in various problems and the design of asymptotically optimal trading policies that can be executed in real trading environments. Asymptotic methods have proved instrumental in understanding the sensitivity of trading boundaries and welfare to different market and risk aversion parameters (cf. the ingenious insights of Constantinides (1986) based on numerical computation, with the financial interpretation of the asymptotic expansions derived in Kallsen and Muhle-Karbe (2017); Gerhold et al. (2012, 2014).
First, we employ finite activity strategies to approximate control limit policies. In contrast to reflected diffusions, these strategies can be implemented in a real trading environment. They involve trades of fixed size aimed at re-aligning a portfolio statistic with its frictionless target, such as adjusting the proportion of wealth π t in the risky asset when reaching π ± . Acknowledging the insightful contribution of Shreve and Soner (1994, Appendix B), which highlights that no-trade regions typically scale with a size proportional to ε 1 / 3 , discrete trades in this context must be of the same or higher order as the bid–ask spread. The findings of this paper offer an alternative answer to the question of Rogers (2004) regarding the ε 2 / 3 effect of proportional transaction costs on welfare. Approximating the control limit policy with trades of fixed size reveals that the transaction costs, at the leading order, are a product of the bid–ask spread ( ε ), trade size ( ε α / 3 for α 1 ), and trading frequency (proportional to ε 1 3 ( α + 1 ) ), resulting in the same cost of order ε 2 / 3 , irrespective of the smallness of the trades (dictated by the parameter α ) or the objective under consideration.
Second, we put forward a general approximation method for pertinent free boundary problems, which often2 can be expressed as
F ( g , g , g ) = 0 ,
g ( π ) = 1 , g ( π + ) = 1 ε ,
g ( π ) = 0 , g ( π + ) = 0 .
Here, an unknown scalar g = g ( π ) representing the proportion of wealth π in the risky asset is involved. The function g must satisfy a second-order ODE (1) between the buy and sell boundaries π and π + and boundary conditions (2) and (3). While the latter are universal, the ODE (1) identifies the specific objective under consideration. The approximation method relies on a polynomial expansion of the scalar function g and an asymptotic Ansatz for the trading boundaries π ± .
The parameter ε in the condition (2) represents the relative bid–ask spread of the risky asset S, where one purchases the asset at time t at the ask price S t and sells it at the slightly lower price ( 1 ε ) S t (ibid). This boundary condition’s specific form lends itself to the financial interpretation of a frictionless price S ˜ with a functional form expressed as S ˜ t : = g ( π t ) S t . This serves as a potential shadow price, which is a fictitious risky asset evolving within the bid–ask spread S t ( 1 ε ) S ˜ t S t and which aligns precisely with the bid or ask of S whenever the optimal strategy for S ˜ involves executing trades. This asset is indeed a shadow price for power and log-utility, as noted in previous studies by Gerhold et al. (2013, 2014); Guasoni and Muhle-Karbe (2013). However, for certain local criteria, it might only serve as an asymptotic shadow price (or none at all), as discussed in Kallsen and Muhle-Karbe (2017); Mayerhofer (2024). Notwithstanding this issue, our method is applicable for equations both in the original markets and in potential shadow markets. A distinctive aspect of this paper lies in its examination of Neuberger’s log contract Neuberger (1994) and its dynamic hedge under proportional transaction costs, supplementing the well-explored objectives with known solutions in the literature. Due to the straightforward form of its free boundary problem, our analysis may serve as a valuable introductory example for graduate students delving into the realm of optimization under proportional transaction costs.

Program of Paper

The paper’s structure is organized as follows. Section 2 introduces the market model, encompassing a risky Black–Scholes asset with transaction costs, along with the presentation of relevant admissible strategies for this study. Section 3 comprises three distinct parts.
Section 3.1 investigates three strategies and evaluates their performance in terms of the trading frequency and long-run cost. This includes the examination of minimal trades (control limit policies; see Section 3.1.1), maximal trades (discrete trades directly to the target; see Section 3.1.2), and small trades (sufficiently small trades to closely align with control limit policies; see Section 3.1.3). Section 3.2 is dedicated to optimization problems related to tracking specific targets. It includes the computation of asymptotic approximations for the free boundary problem for leveraged ETFs (see Section 3.2.1) and optimally hedging a log contract (see Section 3.2.4). Section 3.3 examines classical objectives with a long-run horizon, featuring the risk-averse investor (Section 3.3.1), the log-utility investor (Section 3.3.2), and the risk-neutral investor (Section 3.3.3). The interpretation and discussion of these results are presented in Section 4.

2. Materials and Methods

In our financial market model, there are two tradable assets: a risk-free asset with continuous compounding at a rate r 0 and a risky asset S with ask price S t , governed by the dynamics
d S t S t = ( μ + r ) d t + σ d B t , S 0 , σ > 0 , μ 0 ,
where B denotes a standard Brownian motion. We introduce a relative bid–ask spread ε > 0 , ensuring that the risky asset is sold at ( 1 ε ) S t .
In markets with friction, the trading strategies need to be modified so as to ensure solvency. In the presence of transaction costs, solvency constraints dictate that only finite-variation trading strategies are viable.3 Let X t be the safe position and Y t the risky position. Furthermore, denote by ( φ t ) t 0 and ( φ t ) t 0 the cumulative number of shares bought and sold, respectively. The total wealth, assessed at the ask, is given by w t = X t + Y t = X t + φ t S t , where φ t = φ t φ t .
In this paper, we study two types of trading strategies. For continuous φ t , the self-financing condition reads
X t = X 0 + 0 t r X u d u 0 t S u d φ u + ( 1 ε ) 0 t S u d φ u , Y t = Y 0 + 0 t S u d φ u 0 t S u d φ u + 0 t φ u d S u .
If φ t is a finite activity jumps process of the pure jump type, such that
φ t = s t Δ φ s , φ t = s t Δ φ s ,
then the self-financing condition reads
X t = X 0 + 0 t r X u d u u t S u Δ φ t + ( 1 ε ) u t S u Δ φ u , Y t = Y 0 + u t S u Δ φ u u t S u Δ φ u + 0 t φ u d S u .
The following defines admissible strategies.
Definition 1.
The trading policy ( x = X 0 + φ 0 Y 0 , φ t = φ t φ t ) is admissible if
(i) 
( φ t ) t 0 and ( φ t ) t 0 are right-continuous, increasing, and non-anticipating processes;
(ii) 
It is self-financing, satisfying (5) resp. (6).
The collection of admissible trading policies is denoted by Φ.
Depending on the specific optimization criterion, some extra integrability or solvency conditions may apply. (Since we focus on asymptotic methods to solve a range of free boundary problems, we refrain from formulating them explicitly.)
The next statement elaborates the dynamics of wealth, its fraction in the risky asset, and the ratio of risky and safe investment.
Lemma 1.
For any admissible, continuous trading strategy φ, we have
d ζ t ζ t = μ d t + σ d B t + ( 1 + ζ t ) d φ t φ t ( 1 + ( 1 ε ) ζ t ) d φ t φ t , d w t w t = r d t + π t ( μ d t + σ d B t ε d φ t φ t ) , d π t π t = ( 1 π t ) ( μ d t + σ d B t ) π t ( 1 π t ) σ 2 d t + d φ t φ t ( 1 ε π t ) d φ t φ t .
If φ t is of the pure jump type (cf. (6)), the same statistics satisfy similar equations, perhaps most rigorously stated in integral form:
ζ t = ζ 0 + 0 t ζ s μ d s + σ d B s + s t ζ s ( 1 + ζ s ) Δ φ s φ s s t ζ s ( 1 + ( 1 ε ) ζ s ) Δ φ s φ s , w t = w 0 + r 0 t w s d s + 0 t w s π s ( μ d s + σ d B s ) s t ε w s Δ φ s φ s , π t = π 0 + 0 t π s ( 1 π s ) ( μ d s + σ d B s ) 0 t π s 2 ( 1 π s ) σ 2 d s + s t π s Δ φ s φ s s t π s ( 1 ε π s ) Δ φ s φ s .
Proof. 
The dynamics (7) are stated and proven in (Guasoni and Mayerhofer 2019, Lemma A.2), which can be adapted for discrete trades, so as to obtain (8). □

3. Results

3.1. Transaction Cost Asymptotics

Reflected diffusions are continuous processes and of finite variation by construction; therefore, strategies of this kind are admissible in the presence of proportional transaction costs. While optimal across a range of optimization criteria in theory, they are practically unrealized due to actual trades occurring discretely in time. In this section, we approximate continuous trading policies with those that trade fixed amounts of the risky asset, thus introducing jumps. The primary challenge lies in quantifying the minimal trade size required to achieve nearly optimal performance. While larger trades align better with a target, they also incur greater costs (cf. Figure 1).
In this section, we investigate the transaction costs and trading frequency associated with three strategies aimed at maintaining a portfolio statistic near a target. These strategies include the following.
(i)
Minimal trades: These strategies operate continuously, engaging in minimal trading at the boundaries of specific no-trade regions (cf. the first plot of Figure 1 (black lines)).
(ii)
Maximal trades: These strategies reset a portfolio statistic to its target value once it reaches these boundaries (cf. the first second plot in Figure 1 (red lines)).
(iii)
Small trades: These involve smaller trades than (ii) made in the direction of the target value.
The general framework involves a geometric Brownian motion ξ with a drift parameter M and diffusion parameter Σ evolving in an interval [ ξ , ξ + ] , reflected at its boundaries ξ ± . The financial interpretation of ξ varies among examples, representing either the risky–safe ratio ζ t or the risky position Y t . Similarly, the processes that confine the GBM within [ ξ , ξ + ] vary, influencing the definition of the transaction costs.
Each subsection begins by outlining this general setup of a reflected or resetted geometric Brownian motion. We introduce two types of transaction costs: the average transaction costs (ATC), measuring the negative contribution to infinitesimal returns due to a non-zero bid–ask spread, and the transaction costs (TRC), which quantify the actual long-term cost per time unit. The ATC arises for leveraged ETFs in Section 3.2.1 and for the risk-neutral investor in Section 3.3.3 as a penalty in the objective4, whereas the TRC provides the penalty for the log contract in Section 3.2.4.

3.1.1. Minimal Trades

The dynamics of a reflected GBM are
d ξ t = ξ t M d t + Σ d W t + d L t d U t ,
where L resp. U are local times, with the only points of increase (resp. decrease) on ξ t = ξ (resp. ξ t = ξ + ).
We shall need the stationary density of a reflected diffusion (Guasoni and Mayerhofer 2019, Lemma B.5).
Lemma 2.
Let ξ < ξ + . Then, there exists an admissible trading strategy φ ^ such that the risky–safe ratio ξ t satisfies SDE (7). Moreover, ( ξ t , φ ^ t , φ ^ t ) is a reflected diffusion on the interval [ ξ , ξ + ] . In particular, if ξ > 0 , then ξ t has stationary density that equals
ν ( ξ ) : = 2 μ σ 2 1 ξ + 2 μ σ 2 1 ξ 2 μ σ 2 1 ξ 2 μ σ 2 2 , ξ [ ξ , ξ + ] ,
and, if ξ + < 1 , then
ν ( ξ ) : = 2 μ σ 2 1 | ξ | 2 μ σ 2 1 | ξ + | 2 μ σ 2 1 | ξ | 2 μ σ 2 2 , ξ [ ξ , ξ + ] .
The trading strategy in Lemma 2 is called the “control limit policy”, cf. Taksar et al. (1988); Mayerhofer (2024).
We start with the following.
Lemma 3.
L : = lim T 1 T 0 T d L t = lim T 1 T L t = Σ 2 2 2 M / Σ 2 1 ( ξ + / ξ ) 2 M / Σ 2 1 1 ,
U : = lim T 1 T U t = Σ 2 2 1 2 M / Σ 2 ( ξ + / ξ ) 1 2 M / Σ 2 1 .
Proof. 
(cf. Gerhold et al. 2014, Lemma C.2, which is a slightly different version, with a different proof.) For convenience, we perform a logarithm transformation. The process η t : = log ( ξ t ) is a reflected Brownian motion on [ η , η + ] , where η ± = log ( ξ ± ) , with dynamics
d η t = ( M Σ 2 / 2 ) d t + Σ d W t + d L t d U t .
To extract L , we apply Itô’s formula to the function f ( η ) = 1 2 ( η + η ) 2 η + η . As f ( η + ) = 0 , and f ( η ) = 1 , we obtain
f ( η T ) = f ( η 0 ) L T + ( M Σ 2 / 2 ) 0 T f ( η t ) d t + Σ 0 T f ( η ) d W t + Σ 2 2 1 η + η T .
Dividing by T and letting it tend to infinity, we have
lim T L T T = lim T M Σ 2 / 2 T 0 T f ( η t ) d t + Σ 2 2 ( η + η ) .
The limit on the right side can be computed by the Ergodic Theorem (Borodin and Salminen 2002, Chapter II) such that
lim T 1 T 0 T f ( η t ) d t = η η + f ( u ) g ( u ) d u ,
where the stationary density g of η follows from Lemma 2
g ( η ) = 2 M Σ 2 1 e ( 2 M Σ 2 1 ) η + e ( 2 M Σ 2 1 ) η e ( 2 M Σ 2 1 ) η , η [ η , η + ] .
In total,
lim T L T T = Σ 2 2 2 M / Σ 2 1 e ( η + η ) ( 2 M / Σ 2 1 ) 1 ,
from which (10) follows. A similar argument produces (11). □
We consider now two important examples, which both are encountered in this paper. The first one trades, so as to keep the risky position approximately constant, a strategy that is required in the optimal replication of a log contract.
Proposition 1.
For y > 0 , consider the strategy that trades minimally, by only buying at y < y and selling at y + > y as much as necessary to keep the risky position Y t in the interval [ y , y + ] . If the trading boundaries are of the form5
y ± = y ± A ± ε 1 / 3 B ± ε 2 / 3 + O ( 1 ) ,
with A ± > 0 , and B ± R , then the long-run, average transaction costs are
T R C : = lim T ε T 0 T S t d φ t = ε y + × σ 2 2 1 2 ( μ + r ) / σ 2 ( y + / y ) 1 2 ( μ + r ) / σ 2 1 .
For sufficiently small ε, we have the following asymptotic formula:
T R C = σ 2 y 2 2 ( A + + A ) ε 2 / 3 + σ 2 2 μ + r σ 2 + A + 2 A 2 + y ( B + B ) ( A + + A ) 2 ε + O ( ε 4 / 3 ) .
Proof. 
Since the risky position Y t = φ t S t , we have TRC = lim T ε T 0 T Y t d φ t φ t . It follows that Y t is a reflected geometric Brownian motion such as Y t = ξ t in (9) with M = μ + r , Σ = σ and d L t = d φ t φ t , d U t = d φ t φ t . Thus, Formula (13) is an application of Lemma 3. Inserting the asymptotics of the trading boundaries (12) into (13), we produce a formal power series in δ = ε 1 / 3 to obtain (14). □
The next strategy trades so as to keep the proportion of wealth approximately constant.
Proposition 2.
For Λ > 0 , consider the strategy that trades minimally, by only buying at π < Λ and selling at π + > Λ as much as necessary to keep the proportion of wealth in the risky asset π t in the interval [ π , π + ] . If the trading boundaries are of the form
π ± = Λ ± A ± ε 1 / 3 B ± ε 2 / 3 + O ( 1 ) ,
with A ± > 0 , and B ± R , then the long-run, average transaction costs are
A T C : = lim T ε T 0 T π t d φ t φ t = ε π + ( 1 π + ) 1 ε π + × σ 2 2 1 2 ( μ + r ) / σ 2 ( π + ( 1 π ) π ( 1 π + ) ) 1 2 ( μ + r ) / σ 2 1 .
For sufficiently small ε, we have the following asymptotic formula:
A T C = σ 2 Λ 2 ( Λ 1 ) 2 2 ( A + + A ) ε 2 / 3 + σ 2 ( Λ 1 ) Λ 2 ( A + + A ) 2 × μ σ 2 ( A + A ) 2 A 2 ( Λ 1 )
+ 2 A A + Λ + A + 2 ( 3 Λ 1 ) ( Λ 1 ) Λ ( B B + ) × ε + O ( ε 4 / 3 ) .
Proof. 
We change to the risky–safe ratio ζ t = π t 1 π t , such that the new trading boundaries have asymptotics
ζ ± = Λ 1 Λ ± A ± ( Λ 1 ) 2 ε 1 / 3 A ± 2 + B ± ( Λ 1 ) ( Λ 1 ) 3 ε 2 / 3 + O ( ε ) .
The risky–safe ratio satisfies the dynamics (7) and thus is a geometric Brownian motion of the form (9), where M = μ and Σ = σ , while
d L t = ( 1 + ζ t ) d φ t φ t , d U t = ( 1 + ( 1 ε ) ζ t ) d φ t φ t .
The rest of the proof is similar to that of Proposition 1. □
Remark 1.
The second-order coefficients B ± of the trading boundaries (15) only enter the third-order term of the average trading costs (16), and their impact depends on the difference B + B . For a range of criteria, including the ones in the present paper, we have B + = B , whence these coefficients do not impact the average trading costs at the third order.

3.1.2. Maximal Trades

In this section, we consider the process ξ t on [ ξ , ξ + ] that satisfies
ξ t = ξ 0 + 0 t ξ s M d s + Σ d W s + s t Δ L s s t Δ U s
with fixed jump sizes, such that we reset ξ t to some point ξ ( ξ , ξ + ) , whenever it hits ξ ± . We compute the average, long-run jump sizes, and then compute the transaction costs for constant proportion trading strategies, similar to Section 3.1.1. By taking logarithms, we obtain η t : = log ( ξ t ) , which is a resetted Brownian motion on [ η , η + ] , where η ± = log ( ξ ± ) , satisfying the dynamics
η t = η 0 + ( M Σ 2 / 2 ) t + Σ W t + s t Δ l s s t Δ u s .
Whenever η t hits η (resp. η + ), it is reset to η = log ( ξ ) . Thus, we have Δ l = η η = log ( ξ / ξ ) , and Δ u = η + η = log ( ξ + / ξ ) . Define the differential operator
A f ( x ) = Σ 2 2 f ( x ) + ( M Σ 2 / 2 ) f ( x ) .
By construction, η is a Markov process on [ η , η + ] .6 By Itô’s formula, for any f C 2 ( [ η , η + ] ) ,
f ( η t ) = f ( η 0 ) + 0 t σ f ( η s ) d W s + 0 t A f ( η s ) d s + ( f ( η ) f ( η ) ) | { s t : Δ L s > 0 } ( f ( η + ) f ( η ) ) | { s t : Δ U s > 0 } .
Thus, η solves the martingale problem for ( A , D ( A ) ) , where D ( A ) constitutes those functions f C b ( [ η , η + ] ) for which f ( η ) = f ( η ) = f ( η + ) and thus f ( η t ) 0 t A f ( η s ) d s is a martingale.
Lemma 4.
The process η is ergodic, with stationary density
φ ( η ) = a 1 + b 1 e α η f o r η η η , a 2 + b 2 e α η f o r η η η + ,
where α = 2 M / Σ 2 1 and
a 1 = b 1 e α η , a 2 = b 2 e α η + , b 1 = e α η e α η + ( η η ) e α ( η + η ) + ( η + η ) e α ( η + + η ) + ( η η + ) e α ( η + η + ) , b 2 = e α η e α η ( η η ) e α ( η + η ) + ( η + η ) e α ( η + + η ) + ( η η + ) e α ( η + η + ) .
The ergodic theorem applies, such that, for any bounded continuous7 function f,
lim T 1 T 0 T f ( η s ) d s = η η + f ( u ) φ ( u ) d u .
Proof. 
To derive the stationary density φ , we solve the adjoint equation
A φ = Σ 2 2 φ ( η ) ( M Σ 2 / 2 ) φ ( η ) = 0
for φ 1 on ( η , η ) and for φ 2 on ( η , η + ) , where φ i ( η ) = a i + b i e α η ( i = 1 , 2 ). The constants a i and b i are determined by insisting on continuity ( φ 1 ( η ) = φ 2 ( η ) ), vanishing density at the boundaries ( φ 1 ( η ) = φ 2 ( η + ) = 0 ), and mass one ( η η + φ ( u ) d u = 1 ).
To prove the ergodicity, we assume, for brevity of exposition, that M = Σ 2 / 2 and that η = η + η + 2 (the general case can be proven similarly but is more tedious due to the lengthy formulas). Furthermore, by shifting the process, we can assume, without loss of generality, that η = 0 . In this case, the stationary density takes the specific form
φ ( η ) = 2 ( η η ) ( η η ) ( η + η ) , η η η , 2 ( η + η ) ( η + η ) ( η + η ) , η η η + .
To compute the limit on the left side of (21), the starting point η 0 = η is irrelevant, as the diffusion is reset every time it hits the boundary (the integral up to the first hitting time gives a vanishing contribution to the overall limit), thus starting from η 0 = η = 0 . Therefore, we may, without loss of generality, start the process η t also initially at η 0 = 0 . Denote the consecutive exit times
τ 1 : = inf { t > 0 X t ( η , η + ) } , τ k : = inf { t > τ k 1 X t ( η , η + ) } , k 2 .
Since η t is Markovian, the inter-exit times T k : = τ k τ k 1 ( k 2 ) are independent and identically distributed τ 1 with first moment
E [ τ 1 ] = η η + Σ 2 .
Thus, by the strong law of large numbers (SLLN), almost surely,
lim N 1 N k = 1 T k = η η + Σ 2 .
Similarly, the random variables Y k : = τ k 1 τ k f ( η s ) d s are independent, identically distributed with mean E [ Y 1 ] = E [ 0 τ 1 f ( η s ) d s ] and thus by the SLLN, almost surely,
lim N 1 N k = 1 N Y k = E [ 0 τ 1 f ( η s ) d s ] .
The expectation on the right-hand side of (24) is computed in the following. Let w be the unique solution of the Dirichlet problem
A w + f = 0 , w ( η ) = w ( η + ) = 0 .
By Itô’s formula, for 0 t < τ 1 ,
w ( η t ) = w ( η 0 ) + 0 t A w ( η s ) d s + 0 t σ w ( η s ) d W s .
Since w ( η τ 1 ) = 0 , η 0 = 0 , and by (25), we obtain, by optimal stopping,
w ( 0 ) = E [ 0 τ 1 f ( η s ) d s ] .
The explicit solution of (25) is given by
w ( η ) = 2 σ 2 η η η + η η η + ( η + ξ ) f ( ξ ) d ξ η η ( η ξ ) f ( ξ ) d ξ .
Comparing this with the stationary density (22) reveals that
w ( 0 ) = | η η + | Σ 2 E [ 0 τ 1 f ( η s ) d s ] = | η η + | Σ 2 η η + f ( ξ ) φ ( ξ ) d ξ
and thus, by (24),
E [ 0 τ 1 f ( η s ) d s ] E [ τ 1 ] = η η + f ( ξ ) φ ( ξ ) d ξ .
A combination with (23) and (24) yields
lim N 1 τ N 0 τ N f ( η s ) d s = lim N k = 1 N Y k N lim N k = 1 N T k N = E [ 0 τ 1 f ( η s ) d s ] E [ τ 1 ] = η η + f ( ξ ) φ ( ξ ) d ξ .
Note that this limit involves annualizing over random horizons the τ N . It remains to show that this limit is the same for annualizing with deterministic time T. For each t 1 , let ν ( t ) be the first passage time of t, for the renewal process ( τ n ) n 1 , where τ n : = k = 1 n T k . That is,
ν ( t ) : = min { n τ n > t } .
A combination of (Gut 2009, Theorems 4.1 and 3.4.2) yields that, almost surely,
lim n ν ( t ) t = 1 E [ τ 1 ] ,
and
lim n τ ν ( n ) n = 1 .
Therefore,
lim n 1 n 0 n f ( η s ) d s = lim n τ ν ( n ) n 1 τ ν ( n ) 0 τ ν ( n ) f ( η s ) d s 1 τ ν ( n ) n τ ν ( n ) f ( η s ) d s = lim n 1 τ n 0 τ n f ( η s ) d s ,
where, because of (27), (28), and (26), the first term converges to the desired limit, whereas the second term, bounded by
f τ ν ( n ) n τ ν ( n )
converges due to (28) to zero, as n . Recalling (26) confirms this claim. □
In Figure 2, the histogram of the (approximate) distribution of η t for t = 5 years is given, along with the exact stationary distribution provided by Lemma 4. The fit of this asymmetric distribution appears to be excellent, reflecting that daily sampling is sufficient for financial data with reasonable parameter ranges, and that η approaches stationarity for a finite time horizon of five years.
We are able to count the number of downward jumps of η by appealing to the ergodic theorem.
Proposition 3.
lim T | { s < T : Δ U s > 0 } | T = ( η + η ) M Σ 2 2 + 1 2 2 M Σ 2 Θ + Σ 2 ( η + η ) ( η + η ) ,
where
Θ = ( η η ) ( η η + ) e 2 ( η + η ) M Σ 2 Σ 2 e 2 ( η + η + ) M Σ 2 Σ 2 ( η η ) e 2 ( η + η ) M Σ 2 Σ 2 + ( η + η ) e 2 ( η + η + ) M Σ 2 Σ 2 + ( η η + ) e 2 ( η + η + ) M Σ 2 Σ 2 + η + Σ 2 Σ 2 M + η + .
Proof. 
Let f be the quadratic function
f ( η ) = η ( η η η ) ( η + η ) ( η + η ) .
As, f ( η + ) f ( η ) = 1 , and f ( η ) f ( η ) = 0 , and
f ( η ) = 2 η η η ( η + η ) ( η + η )
we obtain, by Equation (19), after division by T and letting T ,
lim T | { s < T : Δ U s > 0 } | T = lim T 1 T 0 T A f ( η s ) d s .
It remains to evaluate the almost sure limit on the right side, by appealing to the ergodic theorem. Since
A f ( η ) = Σ 2 ( η + η ) ( η + η ) + ( M Σ 2 2 ) 2 η η η ( η + η ) ( η + η )
we have
lim T 1 T 0 T A f ( η s ) d s = Σ 2 ( M Σ 2 / 2 ) ( η + η ) ( η + η ) ( η + η ) + 2 M Σ 2 ( η + η ) ( η + η ) lim T 1 T 0 T η s d s .
By Lemma 4, and using the stationary density (20) of η , we obtain lim T 1 T 0 T η s d s = η η + η φ ( η ) and thus (29). □
We revisit the strategy that keeps the proportion of wealth approximately constant. The proof of the following is similar to that of Proposition 2 and thus omitted. Note that we do not give the explicit formula, which can easily be derived from the previous statements but would take up too much space here. For the same reason, we only provide asymptotics of the leading order.
Proposition 4.
For Λ 0 , 1 and μ σ 2 / 2 , consider the strategy that buys at π < Λ and sells at π + > Λ as much as necessary to bring the proportion of wealth in the risky asset π t back to Λ. If the trading boundaries are of the form
π ± = Λ ± A ± ε 1 / 3 + O ( ε 2 / 3 ) ,
with A ± > 0 , then the average transaction costs satisfy, for sufficiently small ε, the following.
(i) 
(Selling Frequency) The long-run selling frequency per unit time satisfies the asymptotics
S F = lim T | { s t : Δ U s > 0 } T = σ 2 Λ 2 ( Λ 1 ) 2 A + ( A + + A ) ε 2 / 3 + O ( ε 1 / 3 ) .
(ii) 
(Average Cost) The average transaction costs satisfy the asymptotics
A T C : = lim T ε T s t π t Δ φ t φ t = σ 2 Λ 2 ( Λ 1 ) 2 ( A + + A ) ε 2 / 3 + O ( ε )
and thus, at leading order, are twice the cost of the control limit policy (that is, Equation (16) of Proposition 2).

3.1.3. Small Trades

The cumulative number of shares bought or sold lacks absolute continuity, necessitating approximation for real-world trade applications through trades of fixed size. However, executing discrete trades toward the midpoint of the no-trade region proves suboptimal, incurring twice the transaction costs compared to control limit policies (Proposition 4 (ii)). Using the methods developed in this section, a similar outcome can be demonstrated for trades of any order comparable to the size of the no-trade region (approximately ε 1 / 3 , as indicated in Remark 2).
This prompts the question of determining the optimal trade size for a satisfactory approximation of the optimal trading policy. In the computation of the average trading costs, a crucial factor is the stationary density of the resetted or reflected diffusions (e.g., π t ). Hence, smaller trades contribute to a better approximation of the stationary density of the control limit policy, as illustrated in Figure 3. In this section, we substantiate this intuition by approximating the somewhat abstract reflected diffusion discussed in Section 3.1.1. We achieve this by employing adequately small trades, ensuring that the transaction costs align at the leading order with the control limit policy (Proposition 2).
This section is analogous to the previous one, with the modification that we trade from ξ to ξ , and from ξ + to ξ + , , where
ξ < ξ , < ξ + , < ξ + .
Define again η = log ( ξ ) ; then, for any C 2 function f, we obtain the dynamics
f ( η t ) = f ( η 0 ) + 0 t σ f ( η s ) d W s + 0 t A f ( η s ) d s + ( f ( η , ) f ( η ) ) | { s t : Δ L s > 0 } ( f ( η + ) f ( η + , ) ) | { s t : Δ U s > 0 } .
To extract the downward jumps Δ U s , we use f ( η ) = ( η η ) ( η η , ) , for which f ( η ) = f ( η , ) , and
f ( η + ) f ( η + , ) = ( η + η ) ( η + η , ) ( η + , η ) ( η + , η , ) > 0 .
Furthermore,
A f ( η ) = Σ 2 + ( M Σ 2 / 2 ) ( 2 η η η , ) .
By dividing (31) by T and letting T , we obtain
lim T | { s t : Δ U s > 0 } | T = lim T 1 T 0 T A f ( η s ) d s ( η + η ) ( η + η , ) ( η + , η ) ( η + , η , ) ,
a limit that exists almost surely and can be computed by appealing to a suitably tailored ergodic theorem, knowing the stationary density. (The proof is similar to the one in Section 3.1.2 but results in more tedious computations and longer proofs and thus is omitted.) The simulation in Figure 4 demonstrates the satisfactory agreement of the empirically computed stationary density of η T ( T = 5 years) with its exact counterpart η .
The sizes of the no-trade regions in all our examples are proportional to ε 1 / 3 ; thus, sufficiently small trades must be of the second order. We summarize the trading frequency and long-run transaction costs.8
Proposition 5.
For Λ 0 , 1 and μ σ 2 / 2 , consider the strategy that buys at π < Λ resp. sells at π + > Λ as much as necessary to bring the proportion of wealth in the risky asset π t to π + , < π + resp. π > π . If the trading boundaries are of the form (30) with A ± > 0 , and if
π ± , = π ± κ ± ε 2 / 3 + O ( ε ) ,
with κ ± > 0 , or sufficiently small ε, the following must apply.
(i) 
(Selling Frequency) The long-run selling frequency per unit time satisfies the asymptotics
S F = lim T | { s t : Δ U s > 0 } | T = σ 2 Λ 2 ( Λ 1 ) 2 2 ( A + + A ) κ + ε 1 + O ( ε 2 / 3 ) .
(ii) 
(Average Cost) The average transaction costs satisfy the asymptotics
A T C : = lim T ε T s t π t Δ φ t φ t = σ 2 Λ 2 ( Λ 1 ) 2 2 ( A + + A ) ε 2 / 3 + O ( ε )
and thus agree, at leading order, with the cost of the control limit policy (that is, Equation (16) of Proposition 2).
Remark 2.
If, instead of (33), one would use significantly larger trades, to
π ± , = π ± κ A ± ε 1 / 3 + O ( ε ) , 0 κ < 1 ,
then the selling frequency is given by
S F = lim T | { s t : Δ U s > 0 } | T = σ 2 Λ 2 ( Λ 1 ) 2 A + ( A + + A ) ( 1 κ 2 ) ε 2 / 3 + O ( ε 1 / 3 )
and the transaction costs are
A T C : = lim T ε T s t π t Δ φ t φ t = σ 2 Λ 2 ( Λ 1 ) 2 ( A + + A ) ( 1 + κ ) ε 2 / 3 + O ( ε ) .
For κ = 1 , we recover the trades to some point Λ in the no-trade region (Proposition 4), and, for any κ ( 0 , 1 ) , we obtain an ATC slightly larger at leading order than the original one. This means that such trading strategies never match the trading costs of the control limit policy at the relevant second order.

3.2. Tracking Frictionless Targets

3.2.1. Levered Funds

The manager of a leveraged (or inverse) exchange traded fund (LIETF) has to maintain a constant exposure to a constant multiple Λ of the benchmark’s S return with dynamics (4). For this section, we take the conservative view that the annualized average excess returns μ of S vanish, which is in line with the objective of a levered ETF manager to track a multiple of a benchmark’s return rather than to outperform it.9
Due to the fact that frequent trading incurs transaction costs, it is impossible to trade by perfectly matching the target leverage—such a strategy would lead to immediate bankruptcy, as it is of infinite variation. To measure the discrepancy between a fund’s excess returns (with wealth w, trading strategy φ ) and the multiple Λ of the underlying excess return (the target), we use the (cumulative) difference D t
d D t = d w t w t r d t Λ d S t S t r d t , D 0 = 0 .
The most relevant statistics of D, the tracking distance (TrD) and tracking error (TrE), are defined by
TrD : = lim sup T 1 T E lim Δ t 0 k = 1 T / Δ t ( D k Δ t D ( k 1 ) Δ t ) = ε lim inf T 1 T E 0 T π t d φ t φ t , TrE : = = lim inf T 1 T E lim Δ t 0 k = 1 T / Δ t ( D k Δ t D ( k 1 ) Δ t ) 2 1 / 2 = lim inf T E 1 T 0 ( π t Λ ) 2 σ t 2 d t 1 / 2 ,
with the quadratic variation of D being D T .
The explicit expression on the right side of (34) reveals that the negative tracking distance is equal to the average tracking costs (ATC) (cf. Guasoni and Mayerhofer (2019)). Thus, managing an LIETF means finding an optimal trade-off between the tracking distance TrD (or ATC) and tracking error TrE (for a more detailed explanation of this objective, cf. Guasoni and Mayerhofer (2023)).
Maximizing the tracking distance for a fixed tracking error can be summarized as minimizing the long-run equivalent expense ratio (EER):
EER ( φ ) : = γ 2 error 2 TrD = lim inf T 1 T E γ 2 0 T ( π t Λ ) 2 σ 2 d t + ε 0 T π t d φ t φ t ,
where the Lagrange multiplier γ > 0 is interpreted as an aversion to the tracking error.
By (Guasoni and Mayerhofer 2023, Theorem 3.1), for sufficiently small ε , the problem
max EER ( φ )
over all admissible strategies φ Φ , is well posed. There exists 0 < π < π + < such that the trading strategy φ ^ that buys at π and sells at π + to keep the risky weight π t within the interval [ π , π + ] is optimal. Furthermore, the minimum equivalent expense ratio is
EER = γ σ 2 2 ( π Λ ) 2 ,
and the optimal tracking difference and tracking error are
TrD : = lim T D T T = σ 2 2 π π + ( π + 1 ) 2 ( π + π ) ( 1 / ε π + ) , TrE : = lim T D T T = σ ( π Λ ) 2 γ π π + ( π + 1 ) 2 ( π + π ) ( 1 / ε π + ) .
The trading boundaries have the series expansion
π ± = Λ ± 3 4 γ Λ 2 ( Λ 1 ) 2 1 / 3 ε 1 / 3 Λ γ γ Λ ( Λ 1 ) 6 1 / 3 ε 2 / 3 + O ( ε ) .
In this section, we put forward an approximation method that allows us to obtain the above trading boundaries and performance measures, at high precision. First, we study the shadow market approach; second, we consider the associated HJB equations.

3.2.2. The Shadow Market

We assume that a shadow price is a continuous semimartingale with absolutely continuous differential characteristics, that is,
d S ˜ t S ˜ t = r d t + μ ˜ t d t + σ ˜ t d B t .
In the shadow market, the cumulative tracking difference D ˜ t is of the form
d D ˜ t = d F ˜ t F ˜ t r d t Λ d S ˜ t S ˜ t r d t ,
which results in the shadow equivalent expense ratio
EER ˜ ( φ ) = lim inf T 1 T E γ 2 0 T ( π ˜ t Λ ) 2 σ ˜ t 2 d t 1 T E 0 T ( π ˜ t Λ ) μ ˜ t 2 d t .
This objective is optimized by trading so that, at all times, the fraction of wealth in S ˜ equals the Merton fraction
π ˜ t = Λ + μ ˜ t γ σ ˜ t 2 .
Assume a shadow price of the form S ˜ t / S t = g ( π t ) , where the function g is assumed to be twice differentiable, satisfying g ( π ) = 1 , g ( π + ) = ( 1 ε ) , and the smooth pasting condition g ( π ± ) = 0 . This implies that
μ ˜ t = g ( π t ) ( π t ( 1 π t ) 2 σ 2 ) + 1 2 g ( π t ) π t 2 ( 1 π t ) 2 σ 2 g
and
σ ˜ t = ( σ g + g ( π ) π ( 1 π ) σ ) / g .
The proportion of wealth in the shadow asset is
π ˜ t = g ( π t ) π t g ( π t ) π t + ( 1 π t ) .
By equating (40) with (37), using (38) and (39), we obtain the following free boundary problem for g,
1 2 g π 2 ( 1 π ) 2 + g π ( 1 π ) 2 = γ ( g + g π ( 1 π ) ) 2 g π g π + ( 1 π ) Λ ,
subject to (2) and (3).
In view of Formula (36) and the results in Mayerhofer (2024), we conjecture that the trading boundaries agree for small transaction costs with (59) at the first order; furthermore, we anticipate a minor discrepancy in the second-order terms. Therefore, we conjecture that the free boundaries are of the form
π ˜ ± = Λ ± 3 4 γ Λ 2 ( Λ 1 ) 2 1 / 3 ε 1 / 3 κ ± Λ γ γ Λ ( Λ 1 ) 6 1 / 3 ε 2 / 3 + c ± ε + O ( ε 4 / 3 )
with unknown constant c ± and multiplier κ ± . Furthermore, being deprived of an explicit solution to the ODE (41), we derive an Ansatz for a polynomial approximation
g ( z ) = 1 + C ( z π ˜ ) 3 + D ( z π ˜ ) 4 + E ( z π ˜ ) 5 ) z π ˜ + π ˜ π ˜ + + 1 δ 3 + C + ( z π ˜ + ) 3 + D + ( z π ˜ + ) 4 + E + ( z π ˜ + ) 5 ) z π ˜ π ˜ + π ˜ + M 0 ( z π ˜ ) 2 ( z π ˜ + ) 2 + M + ( z π ˜ ) ( z π ˜ + ) 3 + M ( z π ˜ ) 3 ( z π ˜ + ) + G + ( z π ˜ ) ( z π ˜ + ) 2 + G ( z π ˜ + ) ( z π ˜ ) 2 + L ( z π ˜ ) ( z π ˜ + ) 4 + L ( z π ˜ ) 4 ( z π ˜ + ) ,
where the choice δ = ε 1 / 3 acknowledges that the expansions of the trading boundaries (42) are formal power series in δ .
Next, we outline how to identify the unknown constants in (42) and (43). By construction, g ( π ˜ ) = 1 and g ( π ˜ + ) = 1 ε at the third order. To satisfy g ( π ˜ + ) = 0 at the second order, we must set
G + = G
and
C = γ 6 G + ( Λ 1 ) 2 Λ 2 6 ( Λ 1 ) 2 Λ 2
and to have g ( π ˜ ) = 0 up to the second order, we need to insist on C + = C . Next, if g satisfies the ODE (41) at π ˜ ± , we obtain the coefficients D ± (lengthy expressions in terms of κ ± , M 0 , M ± ) and they satisfy
D + D = 3 4 ( M + M ) .
If we insist on g ( π ˜ ± ) = 0 at the third order, we obtain M ± as a function of M , M 0 , and κ ± . At the moment, the ODE is satisfied at the second order only at π ˜ ± . We finally insist that the ODE is asymptotically satisfied at any z in the interval, which can be represented as a convex combination of the free boundaries
z = θ π ˜ + ( 1 θ ) π ˜ + , 0 θ 1 .
In the interior of the interval, g satisfies the ODE at the second order only if
κ ± = 1 .
Furthermore, to have the ODE satisfied at the third order, we obtain
c + + c = Λ ( 1 Λ ) ,
E + = E = γ ( 99 + 2 ( 153 + 33 γ ( Λ 1 ) 137 Λ ) Λ ) 360 Λ 4 ( Λ 1 ) 4 ,
and
L + = γ ( 9 + ( 30 + 9 γ ( Λ 1 ) 29 Λ ) Λ ) 36 Λ 4 ( Λ 1 ) 4 ,
D = M 0 γ ( 3 + ( Λ ( κ + 2 ( 3 + κ ) ) 6 Λ 3 ( Λ 1 ) 3
and, similarly, if g satisfies the ODE (41) at π + , we obtain D + = D . These computations are summarized in the following result.
Proposition 6.
The optimal strategy in the market of the frictionless asset S ˜ is a control limit policy for some trading boundaries π ˜ ± . For sufficiently small ε, they satisfy the asymptotic expansion
π ˜ ± = Λ ± 3 4 γ Λ 2 ( Λ 1 ) 2 1 / 3 ε 1 / 3 + Λ γ γ Λ ( Λ 1 ) 6 1 / 3 ε 2 / 3 + O ( ε 4 / 3 )
and thus agree with the optimal policy in the original market (36) only at the first order.10

3.2.3. The Original Market

Due to (Guasoni and Mayerhofer 2023, Theorem 3.1), for a small enough bid–ask spread ε , there exist some trading boundaries π < π + such that the policy φ ^ that buys minimally at π and sells minimally at π + so as to maintain the fraction of wealth π t between π and π + is optimal.
The trading boundaries are obtained in terms of the risky–safe ratio ζ . These are of the form π ± = ζ ± 1 + ζ ± , where ζ ± are part of the solution to the free boundary problem for the triple (W, ζ ± ), with a scalar function W satisfying
1 2 ζ 2 W ( ζ ) + ζ W ( ζ ) γ ( 1 + ζ ) 2 Λ ζ 1 + ζ = 0 , W ( ζ ) = 0 , W ( ζ ) = 0 ,
W ( ζ + ) = ε ( 1 + ζ + ) ( 1 + ( 1 ε ) ζ + ) , W ( ζ + ) = ε ( ε 2 ( 1 ε ) ζ + 2 ) ( 1 + ζ + ) 2 ( 1 + ( 1 ε ) ζ + ) 2 ,
which has a unique solution for which ζ < ζ + . To allow the adoption of the method of Section 3.2.2, we use the transformation
ζ g ( π ( ζ ) ) 1 + ζ g ( π ( ζ ) ) = ζ 1 + ζ ζ W ( ζ ) , π ( ζ ) = ζ 1 + ζ
which translates (45) and (46) into the following problem for ( g = g ( π ) , π ± )
2 γ ( π ( g ( π ) 1 ) + 1 ) 3 ( π Λ ) + 2 π ( π ( g ( π ) 1 ) + 1 ) g ( π ) + π g ( π ) + g ( π ) 2 2 g ( π ) + 1 + g ( π ) 2 1 π 2 ( g ( π ) 4 g ( π ) g ( π ) 2 g ( π ) + π 2 3 g ( π ) + 4 g ( π ) 2 2 g ( π ) + 2 g ( π ) g ( π ) + g ( π ) + 3 + 2 g ( π ) 3 6 g ( π ) 2 2 + π 3 ( g ( π ) 1 ) g ( π ) 2 g ( π ) 2 + π 3 g ( π ) 2 g ( π ) 2 + 4 g ( π ) + g ( π ) g ( π ) + 2 g ( π ) 6 + 2 g ( π ) 3 + 4 + 2 g ( π ) 3 2 ) = 0
subject to (2) and (3).
We use again the general Ansatz for g in (43) and the Ansatz (42) for the trading boundaries, relabeling them as π ± . Since the boundary conditions are the same as in Section 3.2.2, we obtain the exact same coefficients G + = G and C + = C .
Since the ODE is different, we have to compute the remaining coefficients again. If g satisfies the ODE (41) at π ± , we have the coefficients D ± (lengthy expressions in terms of κ ± , M 0 , M ± , but different from the shadow market) and they satisfy also
D + D = 3 4 ( M + M ) .
If we insist on g ( π ± ) = 0 at the third order, we have M ± as a function of M , M 0 , and κ ± . If we finally insist on the ODE being satisfied at any z in the no-trade region, then g satisfies the ODE only if
κ ± = 1 .
This sign is opposite to the shadow market solution. This provides an alternative proof to Guasoni and Mayerhofer (2023) of the asymptotics of the optimal policy (36). We finally discuss the transaction costs.
Remark 3.
For the trading boundaries (36) (optimal in the original market) and (44) (optimal in a potential shadow market), we have the transaction costs
ATC = 3 σ 2 γ γ Λ ( Λ 1 ) 6 4 / 3 ε 2 / 3 + σ 2 2 Λ 2 ( Λ 1 ) ε + O ( ε 4 / 3 ) .
Note that this is precisely the asymptotic expansion of the negative tracking difference (35), which may be found in (Guasoni and Mayerhofer 2023, Theorem 3.1, Equation (17)).

3.2.4. Neuberger’s Log Contract

In a frictionless market with a risky asset S that is a continuous semimartingale, and cash earning zero interest ( r = 0 ),11 a variance swap can be perfectly replicated by the combination of a static hedge in options to replicate the log contract and a dynamic hedge with an exposure in a risky position Y t constant at all times to some y > 0 . Such a strategy results in insolvency under proportional costs.
Let us again assume that the ask price is given by (4), and the proportional costs are equal to ε ( 0 , 1 ) . Because investment opportunities are constant, the variance swap is trivial, with a vanishing net cashflow upon maturity T. Since
log ( S T / S 0 ) = 0 T d S t S t σ 2 T 2 ,
we consider instead dynamic hedging y > 0 units of the log contract that pays log ( S T / S 0 ) at time T > 0 .12 This is a non-trivial question in itself as it requires us to modify the frictionless strategy Y t = y to remain solvent. This task can be attempted by finding a non-anticipating, finite-variation strategy that minimizes the squared hedging error
1 T E 0 T ( Y t y ) d S t S t T = 1 T E 0 T ( Y t y ) 2 σ 2 d t
while keeping the annualized transaction costs
ε T E 0 T Y t d φ t φ t
acceptable. With γ > 0 , the aversion to the hedging error, we minimize
γ σ 2 2 1 T E 0 T ( Y t y ) 2 d t + ε T E 0 T Y t d φ t φ t .
Please note that even when the transaction costs are zero, a self-financing strategy that maintains Y t at a constant value of y may, with low probability, necessitate excessively large funds by time T to cover the rebalancing costs, rendering the strategy potentially insolvent. This issue arises because the fair value of a log contract is given by
L t = log ( S t ) σ 2 2 ( T t )
thus being a Brownian motion with drift. This challenge is addressed by entering in futures positions on the underlying S rather than trading S itself and linking the futures position to the shorted log contract, which is also futures traded with L t as the settlement price. This results in changes in the futures positions being immediately offset by the log contract, providing a perfect hedge (cf. Neuberger 1994, p. 78). In the following, we only implicitly adopt these mechanics, by ignoring the solvency issue.
For tractability reasons, we resort to an infinite time horizon, and thus minimize
γ σ 2 2 lim T 1 T E 0 T ( Y t y ) 2 d t + ε lim T 1 T E 0 T Y t d φ t φ t
over all admissible strategies. For time horizons such as five years, and daily hedging, the strategies typically approximate well those for the finite horizon objective (48). (cf. the robustness checks in (Guasoni and Mayerhofer 2023, Section 6.2 and Figure 6)). For shorter maturities, such as those aligning with the expiry of European calls or inputs, the slight adjustment of the analysis may be necessary. This adjustment yields time-dependent strategies instead of the steady-state solutions discussed earlier. The rigorous treatment of the finite time horizon remains a subject for future research.
We introduce now the hedging exercise. Knowing the perfect target, we conjecture that it is optimal to not engage in trading, as long as Y t ranges in [ y , y + ] , where y < y < y + , and to trade minimally at the boundaries y ± , so as to keep the risky position Y inside the interval. In other words, Y is a stationary process, realized by the reflected diffusion
d Y t = Y t d φ t φ t d φ t φ t + d S t S t = Y t d L t d U t + μ d t + σ d B t ,
with φ being supported on Y t = y , and φ being supported on Y t = y + . In a similar manner as in Lemma 2, we obtain the following.
Lemma 5.
For 0 < y < y + , there exists an admissible trading strategy φ ^ such that the risky position Y t satisfies SDE (48). Moreover, ( Y t , φ ^ t , φ ^ t ) is a reflected diffusion on the interval [ y , y + ] . In particular, Y t has a stationary density that equals
ν ( y ) : = 2 μ σ 2 1 y + μ σ 2 1 y 2 μ σ 2 1 y 2 μ σ 2 2 , y [ y , y + ] .
Next, we give a heuristic derivation of the HJB equations, which will allow us to identify an optimal strategy. While the heuristics provided here to derive the free boundary problem follow the arguments of Guasoni and Mayerhofer (2019) for local mean variance, the resulting equations are different.
For finite horizon T, we have the objective
max φ Φ E γ σ 2 0 T y Y t Y t 2 2 d t ε 0 T Y t d φ t φ t .
Assuming that the value function V depends on Y t and time t only, the objective’s conditional value is
F φ ( t ) = γ σ 2 0 t y Y s Y s 2 2 d s ε 0 t Y s d φ s φ s + V ( t , Y t ) .
Applying the Itô formula, we have
d F φ ( t ) = γ σ 2 y Y t Y t 2 2 d t ε Y t d φ t φ t + V t d t + y V d Y t + 1 2 y 2 V Y t t ,
and thus F φ satisfies the dynamics
d F φ ( t ) = γ σ 2 y Y t γ σ 2 2 Y t 2 + V t + σ 2 2 Y t 2 y 2 V y + ( μ + r ) Y t y V d t Y t y V + ε d φ t φ t + Y t y V d φ t φ t + σ Y t y V d W t .
The martingale principle of optimal control implies that the process F φ ( t ) is a supermartingale for any strategy φ but a martingale for the optimal one. Thus,
ε V y 0 .
Similarly, it follows that
γ σ 2 y y γ σ 2 2 y 2 + V t + σ 2 2 y 2 y 2 V + μ y y V 0 ,
In order to obtain a steady-state solution, we assume that V ( t , y ) = κ ( T t ) y W ( z ) d z for a constant κ , which represents the average long-run performance. With this assumption, the previous inequalities become
0 W ( y ) ε , γ σ 2 y y γ σ 2 2 y 2 κ σ 2 2 y 2 W ( y ) μ y W ( y ) 0 .
We conjecture now, similarly as in Guasoni and Mayerhofer (2019), that the first is an inequality on some interval [ y , y + ] , which becomes an equality at the boundary of the interval, and thus
σ 2 2 y 2 W ( y ) + μ y W ( y ) γ σ 2 y y + γ σ 2 2 y 2 + κ = 0 for y [ y , y + ] , W ( y ) = 0 , W ( y + ) = ε .
This problem is a second-order ODE with two free boundaries and two unknown constants. To identify the latter, we use the smooth pasting conditions
W ( y ) = 0 , W ( y + ) = 0 .
Let h ( y ) : = γ σ 2 y y γ σ 2 2 y 2 . The initial conditions W ( y ) = W ( y ) = 0 identify κ = h ( y ) , and thus the ODE becomes
σ 2 2 y 2 W ( y ) + μ y W ( y ) = h ( y ) h ( y ) .
The solution of the corresponding initial value problem (which can be found by the variation of constants) is given by
W ( y ) = 2 σ 2 y α y y ( h ( u ) h ( y ) ) u α 2 d u , where α = 2 μ σ 2 .
Insisting on the terminal conditions, W ( y ± ) = ε and W ( y ± ) = 0 , we obtain the following system of non-linear equations for ( y , y + ):
y y + ( h ( u ) h ( y ) ) u α 2 d u = ε σ 2 2 y + α ,
y y + ( h ( u ) h ( y ) ) u α 2 d u = y + α 1 α ( h ( y + ) h ( y ) ) .
Lemma 6.
For sufficiently small ε, the system (51) and (52) has a unique solution y ± , with the asymptotics (54) satisfying
y ± = y ± 3 y 2 4 γ 1 / 3 ε 1 / 3 γ y 6 1 / 3 μ γ σ 2 ε 2 / 3 + O ( ε ) .
Proof. 
We set δ = ε 1 / 3 . We derive the following Ansatz for the asymptotic expansions of the boundaries
y ± = y ± A ± ε 1 / 3 B ± ε 2 / 3 + O ( ε ) .
For δ 0 , the integral on the right-hand side of the equations vanishes. We develop this integral asymptotically for small δ . To this end, observe that
d d δ y y + ( h ( u ) h ( y ) ) u α 2 d u = y + α 2 ( h ( y + ) h ( y ) ) d y + d δ h ( y ) y + α 1 α 1 y α 1 α 1 d y d δ .
Developing this expression as a formal power series in δ and then integrating once yields the asymptotic expansion of the left side of the Equations (51) and (52). (Alternatively, one can integrate explicitly. The present method has the advantage of being applicable to general functions h, not only the quadratic one considered here.) Developing also the right sides shows that the first equation’s leading term is of the third order, and the second one has a second-order term. To make them vanish, we use the following system of equations,
( 2 A A + ) ( A + A + ) 2 γ = 3 y 2 , A 2 = A + 2
which implies
A + = A = 3 y 2 4 γ 1 / 3 .
Next, to satisfy (51) at the fourth order, we equate the fourth-order term to zero, obtaining
B = γ y 6 1 / 3 μ γ σ 2 ,
and, to satisfy (52) at the third order, we must have B + = B . This establishes the asymptotics (53). □
We now proceed to the asymptotic method, to provide the following.
Alternative Proof of Lemma 6. 
For g = 1 W , the free boundary problem (49) and (50) takes the form
1 2 y 2 g ( y ) + ( 2 α + 1 ) y g ( y ) + 2 α g ( y ) + γ ( y y ) 2 α = 0 , g ( Y ) = 1 , g ( Y + ) = 1 ε , g ( Y ) = 0 , g ( Y + ) = 0 ,
which is essentially of the form (1)–(3) except that g is a function of the risky position Y, instead of π . We use an Ansatz similar to (43) for g but with L + L (otherwise, the ODE cannot be satisfied at the third order in the interior of the interval), and we assume G + = G (guided by the previous two problems). Noting that the variable z is interpreted as the risky position y, rather than its proportion of wealth,
g ( y ) = 1 + C ( y y ) 3 + D ( y y ) 4 + E ( y y ) 5 ) y y + y y + + 1 δ 3 + C + ( y y + ) 3 + D + ( y y + ) 4 + E + ( y y + ) 5 ) y y y + y + M 0 ( y y ) 2 ( y y + ) 2 + M + ( y y ) ( y y + ) 3 + M ( y y ) 3 ( y y + ) + G + ( y y ) ( y y + ) 2 + G + ( y y + ) ( y y ) 2 + + L + ( y y ) ( y y + ) 4 + L ( y y ) 4 ( y y + ) .
Moreover, we use the Ansatz (54) for the trading boundaries, assuming knowledge of the first-order terms.13 Thus, we only need to identify the coefficients B ± in
y ± = y ± 3 y 2 4 γ 1 / 3 ε 1 / 3 B ± ε 2 / 3 + O ( ε ) .
By construction, g ( y ) = 1 and g ( y + ) = 1 ε at the third order. To satisfy g ( y + ) = 0 at the second order, we must set
C = G + γ 6 y 2 .
Similarly, to have g ( y ) = 0 at the second order, we need C + = G + . Next, if g satisfies the ODE (55) at y + , we have
D + = 1 48 12 M 0 + 36 M + + 6 γ y 3 + 6 1 / 3 ( B + + B ) γ 5 / 3 y 10 / 3
and if g satisfies the ODE (55) at y , we have
D + = D + 3 4 ( M + M ) .
If we insist on g ( y ) = 0 at the third order, we have
M + = M = M 0 + 6 y 1 / 3 γ + 6 1 / 3 ( 5 B 3 B + ) γ 5 / 3 12 y 10 / 3 .
Next, we insist that the ODE is satisfied at any y in the interior of the no-trade region [ y , y + ] , i.e., for any
y = θ y + ( 1 θ ) y + , 0 < θ < 1 .
g satisfies the ODE at the second order only if
B = γ y 6 1 / 3 μ γ σ 2 .
We set B + = B , anticipating the same asymmetry in the second-order expansion, as in other problems14 Thus, in the interior of the interval, g satisfies the ODE at the third order only if E + = E and E + , L , L + , C x = ( C 1 + C 2 ) / 4 satisfy a system of four linear equations; its Jacobian is non-singular with determinant
29160 y 12 γ 2 0 ,
thus leading to a unique solution. The unique solution of this system ensures that the free boundary problem is satisfied at the third order, which completes this independent proof of Lemma 6. □

3.3. Risk and Returns

3.3.1. Power Utility

Long-run power utility investors with risk aversion 1 γ > 0 maximize the equivalent safe rate
lim inf T log E [ w T ( φ ) 1 γ ] 1 1 γ
over all admissible strategies φ Φ . The shadow price, which yields an optimal trading policy, is of the form (Gerhold et al. 2012, Lemma B.2)
S ˜ t = g ( π t ) S t
with
g ( π ( ζ ) ) = w ( log ( ζ / ζ ) ) ζ 1 w ( log ( ζ / ζ ) ) ,
where w satisfies the ODE
1 2 w ( y ) + ( 1 γ ) w ( y ) w ( y ) + μ σ 2 1 2 w ( y ) = 0 .
As
w ( log ( ζ / ζ ) ) = g ( π ( ζ ) ) ζ 1 + g ( π ( ζ ) ζ ,
g satisfies the free boundary problem
z ( z 1 ) 2 ( z 1 ) z g ( z ) + 2 g ( z ) π γ + z 2 g ( z ) + z 1 + ( z 1 ) g ( z ) 2 π γ ( z 1 ) z 3 g ( z ) 2 z 2 ( π γ + γ + z ) g ( z ) 2 ( π 1 ) γ z g ( z ) 2 = 0
subject to (2) and (3). We are again using the Ansatz (43) for the polynomial approximation of g, and, inspired by the asymptotics in Mayerhofer (2024), derive the Ansatz for the trading boundaries
π ± : = π * ± 3 4 γ π * 2 ( π * 1 ) 2 1 / 3 ε 1 / 3 + κ ± × ( π * ) 2 ( 1 π * ) 6 6 γ π * ( 1 π * ) 2 / 3 ε 2 / 3 + O ( ε )
with unknown constants κ ± . By construction, g ( π ) = 1 and g ( π + ) = 1 ε at the third order. To satisfy g ( π + ) = 0 at the second order, we must set
G + = G
and
C = G γ 6 ( π 1 ) 2 π 2
and, to have g ( π ) = 0 up to the second order, we need to insist on C + = C .
Next, if g satisfies the ODE (41) at π ± at the second order, we obtain the coefficients D ± (lengthy expressions in terms of κ ± , M 0 , M ± ) and they satisfy
D + D = 3 4 ( M + M ) .
If we insist on g ( π ± ) = 0 at the third order, we have M ± as a function of M , M 0 , and κ ± .
Note that, at the moment, the ODE is satisfied at π ± at the second order only. We finally insist on the ODE being satisfied at any z in the interval, i.e.,
z = θ π + ( 1 θ ) π + , 0 < θ < 1 .
In the interior of the interval, g satisfies the ODE only if
κ ± = 0 .
In other words, the asymptotics of the trading boundaries lack the second-order terms and thus are of the form
π ± = π * ± 3 4 γ π * 2 ( π * 1 ) 2 1 / 3 ε 1 / 3 + O ( ε ) .
Remark 4.
Thus, we have an alternative proof of (Gerhold et al. 2012, Equation (2.9) of Theorem 2.2). Note that this is different from the two strategies for the myopic investor, where both the shadow market strategy, which is suboptimal, and the optimal portfolio have non-vanishing second-order terms. In fact, the optimal strategy for the myopic investor in Guasoni and Mayerhofer (2019) satisfies κ ± = γ 1 , and the shadow market strategy satisfies κ ± = ( γ 1 ) and is suboptimal (cf. (Mayerhofer 2024, Theorem 3.3), unless γ = 1 .
Remark 5.
For power utility investors, the trading boundaries are of the form (56), implying that the second terms even vanish ( B + = B = 0 , cf. Remark 1). The trading boundaries for local mean variance investors are similar, with B + = B . Moreover, for the associated asymptotic shadow, we have the same coefficients of the second order, albeit of different sign, cf. Mayerhofer (2024). Therefore, for these three strategies, the average trading costs agree for a small bid–ask spread ε up to the third order and are of the form
A T C = 3 σ 2 γ γ π * ( π * 1 ) 6 4 / 3 ε 2 / 3 μ ( γ 1 ) 2 γ π * ( π * 1 ) ε + O ( ε 4 / 3 ) .

3.3.2. Logarithmic Utility

A long-run log-utility investor maximizes the logarithmic utility of terminal wealth for an infinite time horizon,
lim sup T 1 T E [ log ( w T ( φ ) ) ]
over all admissible strategies φ Φ . For μ / σ 2 < 1 , an optimal strategy is derived in Taksar et al. (1988), with the asymptotics established in Gerhold et al. (2012), and independently by Guasoni and Mayerhofer (2019) (the latter discusses, more generally, a local mean variance objective for any risk aversion γ 0 , which agrees with log-utility for γ = 1 and includes leverage, in particular μ / σ 2 1 ). In the parameterization of Mayerhofer (2024), the shadow price put forward by Gerhold et al. (2012) is
S ˜ t = g ( π t ) S t ,
where g , π ± solve
1 2 g ( π ) π 2 ( 1 π ) 2 σ 2 = π σ 2 ( g + g ( π ) π ( 1 π ) ) 2 1 π + π g ( π ) μ g ( π ) g ( π ) ( π ( 1 π ) μ + π ( 1 π ) 2 σ 2 )
subject to (2) and (3). Note that this equation can also be obtained from the value function—more precisely, (Guasoni and Mayerhofer 2019, Theorem 3.1, Equations (3.1)–(3.5)) with the transformation (47).
Using the Ansatz (43) for a polynomial approximation of g, and the Ansatz for the trading boundaries
π ± : = π * ± 3 4 π * 2 ( π * 1 ) 2 1 / 3 ε 1 / 3 + κ ± × ( π * ) 2 ( 1 π * ) 6 6 π * ( 1 π * ) 2 / 3 ε 2 / 3 + O ( ε )
with unknown constants κ ± . Now, the same computations as in Section 3.3.1 deliver κ ± = 0 and all constants in the approximation (43) of g (they are as in Section 3.3.1, with the exception that one needs to set the specific value γ = 1 .)

3.3.3. Risk Neutrality

By Guasoni and Mayerhofer (2019), maximizing the long-run returns, ignorant to risk,
lim T 1 T E 0 T d w t w t
over all admissible strategies φ Φ , is well posed, because the transaction costs take the role of a penalty, which, typically, the variance of returns does.
Despite the trading costs, for small bid–ask spreads ε ( 0 , 1 ) , excessive leverage, around 1 / ε , can be obtained. Due to (Guasoni and Mayerhofer 2023, Theorem 3.2), for a small enough bid–ask spread ε , there exist some π < π + such that the policy that minimally buys at π and minimally sells at π + to keep the fraction of wealth invested in the risky asset between π and π + is optimal. The long-run expected return of this policy is given by
lim T 1 T 0 T d w t w t = r + μ π
and the trading boundaries have the series expansions
π = ( 1 κ ) κ 1 / 2 μ σ 2 1 / 2 ε 1 / 2 + O ( ε 1 ) , π + = κ 1 / 2 μ σ 2 1 / 2 ε 1 / 2 + O ( 1 ) ,
with κ 0.58 being the unique zero of
3 2 ξ + log ( 1 ξ ) = 0
in the unit interval.
It is important to note that the trading boundaries specified in Equation (59) exhibit singularity in their expansion, with the leading term experiencing explosive growth. Due to this characteristic, these boundaries do not align with the approach that we have employed for other optimization problems. Additionally, according to (Mayerhofer 2024, Theorem 3.10), there is no shadow price for this particular problem, not even an asymptotically optimal one, as opposed to the situation with positive risk aversion, where a shadow price exists, being optimal up to the third order (Mayerhofer 2024, Theorems 3.1 and 3.3).
Let α = μ / σ 2 and ( W , ζ , ζ + ) with ζ < ζ + be the unique solution (according to (Guasoni and Mayerhofer 2019, Theorem 3.2) of the free boundary problem
1 2 ζ 2 W ( ζ ) + ( α + 1 ) ζ W ( ζ ) + α W ( ζ ) α ( 1 + ζ ) 2 = 0 , W ( ζ ) = 0 , W ( ζ ) = 0 , W ( ζ + ) = ε ( 1 + ζ + ) ( 1 + ( 1 ε ) ζ + ) , W ( ζ + ) = ε ( ε 2 ( 1 ε ) ζ + 2 ) ( 1 + ζ + ) 2 ( 1 + ( 1 ε ) ζ + ) 2 .
We regularize the problem with the transformation
u = 1 ζ δ , δ = ε , Ψ ( · ) = W ( ζ ( · ) )
to obtain the following free boundary problem for the scalar function Ψ and boundaries u ±
( 1 + u δ ) 2 2 Ψ ( u ) + ( 1 + α ) δ ( 1 + δ u ) Ψ ( u ) + α δ 2 Ψ ( u ) α u 2 = 0 ,
Ψ ( u ) = 0 ,
Ψ ( u ) = 0 ,
Ψ ( u + ) = 1 u + ( 1 δ 2 ) δ ,
Ψ ( u + ) = δ + 2 δ 2 1 u + u + 2 δ + δ 2 1 u + 2 .
Note that, by the chain rule,
Ψ ( u ) = ( W ( ζ ( u ) ) = W ( ζ ( u ) ) d ζ d u = δ W ( ζ ( u ) ) ,
which implies (64). We now obtain the Ansatz for an approximation of the solution of (60),
Ψ ( u ) : = 2 α log ( u ) + C 1 + C 2 u + δ ( C 3 u α + C 4 ) + δ 2 ( C 5 u + C 6 u 2 α ) .
We have the following.
Lemma 7.
Ψ defined by (65) is a solution of the ODE (60) for any C i R ( 1 i 6 ).
Proof. 
We expand (60) formally in powers of δ (only those up to the second order appear as coefficients), giving the equation associated with δ 2 ,
u 2 2 Ψ 2 ( u ) + ( 1 + α ) u Ψ 2 ( u ) + α Ψ 2 ( u ) = 0 ,
the linear term associated with δ
u Ψ 1 ( u ) + ( 1 + α ) Ψ 1 ( u ) = 0 ,
and the constant term
1 2 Ψ 0 ( u ) α u 2 = 0 .
The last one gives the general solution Ψ 0 ( u ) = 2 α log ( u ) + C 1 + C 2 u , and Equation (67) gives Ψ 1 ( u ) = C 3 u α + C 4 . Finally, Equation (66) gives
Ψ 2 ( u ) = C 5 u + C 6 u 2 α .
Assume that
π ± = 1 A ± δ + B ± + C ± δ + O ( δ 2 ) ,
then
ζ ± = 1 A ± δ + A ± 2 ( B ± 1 ) δ 2 + A ± 2 ( C ± A ± ( B ± 1 ) 2 ) δ 3 + O ( δ 4 )
and thus
u ± = A ± A ± 2 ( B ± 1 ) δ A ± 2 ( C ± A ± ( B ± 1 ) 2 ) δ 2 + O ( δ 3 ) .
We first ensure that the zero-order term Ψ 0 satisfies, by default, the left boundary conditions (61) and (62). This implies that
Ψ 0 ( u ) = 2 α log ( u / u ) + 2 α u u u .
For condition (62) to be satisfied at the first order, we have C 3 = 0 . However, then, to ensure that (61) is satisfied at the first order, we need C 4 = 0 . We further set C 5 = C 6 = 0 to satisfy the same conditions at the second order. We thus have
Ψ ( u ) = Ψ ( u ) = O ( δ 3 ) .
Next, to have (63) and (64) satisfied at zero order, A ± must satisfy the system of equations
2 α log ( A / A + ) A A + A 1 A + 2 = 0 , α 1 A + 1 A 1 A + 3 = 0 .
Note that these equations recover the ones in (Guasoni and Mayerhofer 2019, D.5). By (Guasoni and Mayerhofer 2019, Lemma D.1.), the unique solution ( A , A + ) of the system (69) is
A = κ 1 / 2 1 κ σ 2 μ , A + = κ 1 / 2 σ 2 μ ,
where κ 0.5828 is the unique solution of (69).
To have (63) and (64) satisfied at the first order, we equate the respective coefficients to zero,
2 A + 2 ( B + 1 ) 1 A + 3 2 α ( A A + ) ( A ( B 1 ) A + B + + A + ) A = 0 , 3 A + 4 + 6 ( B + 1 ) A + 2 + 2 α ( B B ) = 0 ,
which yields the constants15
B = 1 + 2 A 3 A + 2 α A + 3 ( A A + ) 2 + 2 A A + ( 4 A + 3 A ) , B + = 1 + A ( 3 A 4 A + ) 2 α A + 4 ( A A + ) 2 + 2 A A + 2 ( 4 A + 3 A ) .
We must ultimately verify that the approximation of the value function and trading strategy has been carried out to a satisfactory order. To achieve this, we begin by determining the order of the average transaction costs. Since the trading boundaries experience explosive behavior as the bid–ask spread approaches zero, we anticipate a corresponding escalation in the transaction costs. This expectation is corroborated by the following analysis.
Lemma 8.
The risk-neutral investor faces average transaction costs
A T C = σ 2 ( 1 κ ) κ 3 / 2 2 ε 1 / 2 + O ( 1 ) .
Proof. 
The annualized mean trading costs for the strategy with maximum returns is given by
ATC : = ε lim T 1 T 0 T π t d φ t φ t = σ 2 ( 2 α 1 ) 2 G ( ζ + ) ζ + 1 ζ ζ + 2 γ π * 1 ,
(cf. Guasoni and Mayerhofer 2019, Lemma C.3). Expanding this formula asymptotically, by using the expression (68) for the free boundaries ζ ± , leads to
ATC = σ 2 2 ( A A + ) A + 2 ε 1 / 2 + O ( 1 )
and, thus, in view of (70), it yields (71). □
Since, by (58) and (59), the equivalent safe rate adheres to the asymptotics
r + μ π = r + μ 3 / 2 κ 1 / 2 ( 1 κ ) σ ε 1 / 2 + O ( 1 ) ,
we infer that the impact of the transaction costs on welfare is of a similar order. Notably, this situation contrasts many other problems, where the size of the no-trade region is strictly of larger order than the impact of the transaction costs on welfare (as discussed in Section 1 and referenced therein). As the coefficients B ± only contribute to the zeroth order, as seen in (72), our approximation is deemed satisfactory. This suggests that the essential effects of the transaction costs on welfare are adequately captured by the simplified analysis.

4. Discussion

In this paper, we provide asymptotic methods for a continuous-time portfolio choice under proportional transaction costs.
The first results pertain to the trading frequency and incurred cost. While, for long-run or infinite horizon optimization problems, it is typically optimal to trade such that several portfolio statistics follow a reflected diffusion, these strategies cannot be realized in a real-world trading setup. The trading is of infinite activity and thus requires not only continuous monitoring but also the execution of trades of infinitesimal size. This inspired us to develop realistic, discrete trades. In terms of the proportion of wealth in the risky asset, if the trading boundaries satisfy
| π + π | = O ( ε 1 / 3 ) ,
bulk trades to some target Λ ( π , π + ) incur average transaction costs that are twice the optimal strategy’s (Proposition 4 vs. Proposition 2), rendering them strictly suboptimal. For maximal trades (Section 3.1.2 and Remark 2), where reasonable trade sizes Δ π must be of order ε 1 / 3 (no larger than the size of the no-trade region), the trading frequency (TF) is of order ε 2 / 3 . A moment’s reflection on Proposition 4 reveals that the annualized transaction costs are, precisely at the first order, the product of the relative bid–ask spread, trading frequency, and trade size:
ATC = ε × TF × Δ π .
The same formula can be inferred for small trades (Proposition 5), where the trading frequency is much higher (order ε 1 ) but the annualized transaction costs are smaller (of the order ε 2 / 3 ). This process can be iterated, yielding the scaling law (73) (cf. Golub et al. (2018) and the references therein), for trade sizes of order ε α / 3 and associated trading frequency ε 1 3 ( α + 1 ) , where α = 1 , 2 , 3 , , resulting in the same order of the average trading costs, namely ε 2 / 3 . This scaling law provides a complementary answer to the question in Rogers (2004) concerning the effect of the proportional transaction costs being of the second order, as the annualized transaction costs of nearly optimal strategies are precisely of this order. For α , we recover the control limit policy, which is continuous. Our result is applicable to any control limit policy, irrespective of the objective in use, whereas Rogers (2004) reaches his conclusion only for the maximization of the power utility from consumption in an investment problem on an infinite horizon.
Section 3.1 offers a novel insight into the question of why the ATC may agree up to the third (!) order, despite the varying, problem-specific, second-order terms in the trading boundaries (Remark 1). If the second-order coefficients of the lower and upper trading boundaries π ± agree, they do not contribute to the asymptotics (16) of the ATC, as only their difference (here zero) gives a non-zero contribution. A notable example is the (candidate) shadow price strategy in (44) vs. the optimal strategy (36) for leveraged ETFs: the respective no-trade regions are small shifts—in opposing directions—in a symmetric region with boundaries
π ± = Λ ± 3 4 γ Λ 2 ( Λ 1 ) 2 1 / 3 ε 1 / 3 + O ( ε ) .
Note that the latter trading boundaries do not correspond to any optimization problem mentioned here or in the literature (they lack second-order terms). However, in the analogous situation for local mean variance criteria Mayerhofer (2024), a symmetric no-trade region around the Merton fraction Λ = μ γ σ 2 identifies the optimal strategy for a power utility investor Gerhold et al. (2014) (see Remark 5). In this case, three different problems, whose trading policies disagree at the second order, enjoy the same equivalent safe rate up to the third order.
In Section 3.2 and Section 3.3, we introduce a novel approximation approach addressing free boundary problems. Employing a universal polynomial Ansatz for the value function enables the resolution of the free boundary problems associated with the power utility of terminal wealth, leveraged ETF objectives, and the computation of a solvent hedge for the log contract. Remarkably, our solutions exhibit precision up to the third order, with the trading boundaries’ precision reaching the second order. This high level of precision becomes particularly relevant given that the transaction costs’ primary contribution to the objective is of the second order. These costs are solely influenced by the first-order coefficients of the trading boundaries. Consequently, the polynomial method excels in providing precision beyond what is strictly necessary.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study (Only imulations are used to produce the plots).

Conflicts of Interest

The author declares no conflicts of interest.

Notes

1
Norbert Wiener about the Manhattan project, in “I am a mathematician”, MIT Press 1964.
2
For the log contract, we use another parameterization.
3
Discrete trades occur in the context of fixed transaction costs Altarovici et al. (2015), where only a fixed number of trades maintains solvency. Finite trading speed—that is, the absolute continuity of the number of shares of the risky asset—occurs in market impact models, cf. Guasoni and Weber (2020) and the references therein. See also Bruhn et al. (2016).
4
In fact, for the log-utility, the same penalty also appears: we rewrite the finite-horizon version of objective (57), using Itô’s formula.
5
For cosmetic reasons, which shall be clear later, we subtract the second-order term from each boundary. However, since B ± may be any real number, our choice does not lead to a loss of generality.
6
In fact, η t is the unique strong solution to (18).
7
This results holds for all essentially bounded, Borel-measurable functions.
8
The majority of the computations were performed by Wolfram Mathematica, using (32).
9
Moreover, this assumption yields explicit formulas. Risk premia, stochastic interest rates, and stochastic volatility are included in the more general theory of the performance evaluation of LIETFs in Guasoni and Mayerhofer (2023).
10
A comparison with (36) shows that the signs of the second-order coefficients are switched, which is analogous to the sign switch in the shadow optimal policy for local mean variance, cf. (59) and the discussion thereafter.
11
A small modification for a non-zero interest rate applies.
12
In practice, this should be done by trading futures on S, tied to the log contract, cf. Neuberger (1994).
13
The approximation can be performed without knowing the coefficients A ± . Moreover, one can obtain higher-order coefficients with this method.
14
See the situation for leveraged ETFs in the previous section, or the local mean variance criteria Mayerhofer (2024).
15
The paper Guasoni and Mayerhofer (2019) states that B ± = 1 , which is a typing error, having no implications for their paper.

References

  1. Altarovici, Albert, Johannes Muhle-Karbe, and Halil Mete Soner. 2015. Asymptotics for fixed transaction costs. Finance and Stochastics 19: 363–414. [Google Scholar] [CrossRef]
  2. Borodin, Andrei N., and Paavo Salminen. 2002. Handbook of Brownian Motion: Facts and Formulae. Berlin/Heidelberg: Springer. [Google Scholar]
  3. Bruhn, Kenneth, Ninna Reitzel Jensen, and Mogens Steffensen. 2016. Smooth investment. Annals of Finance 12: 335–61. [Google Scholar] [CrossRef]
  4. Constantinides, George M. 1986. Capital market equilibrium with transaction costs. Journal of Political Economy 94: 842–62. [Google Scholar] [CrossRef]
  5. Gerhold, Stefan, Johannes Muhle-Karbe, and Walter Schachermayer. 2012. Asymptotics and duality for the Davis and Norman problem. Stochastics An International Journal of Probability and Stochastic Processes 84: 625–41. [Google Scholar] [CrossRef]
  6. Gerhold, Stefan, Johannes Muhle-Karbe, and Walter Schachermayer. 2013. The dual optimizer for the growth-optimal portfolio under transaction costs. Finance and Stochastics 17: 325–54. [Google Scholar] [CrossRef]
  7. Gerhold, Stefan, Stefan Guasoni, Johannes Muhle-Karbe, and Walter Schachermayer. 2014. Transaction costs, trading volume, and the liquidity premium. Finance and Stochastics 18: 1–37. [Google Scholar] [CrossRef]
  8. Golub, Anton, James B. Glattfelder, and Richard B. Olsen. 2018. The alpha engine: Designing an automated trading algorithm. In tHigh-Performance Computing in Finance. Boca Raton: Chapman and Hall/CRC, pp. 49–76. [Google Scholar]
  9. Guasoni, Paolo, and Eberhard Mayerhofer. 2019. The limits of leverage. Mathematical Finance 29: 249–84. [Google Scholar] [CrossRef]
  10. Guasoni, Paolo, and Eberhard Mayerhofer. 2023. Leveraged funds: Robust replication and performance evaluation. Quantitative Finance 23: 1155–76. [Google Scholar] [CrossRef]
  11. Guasoni, Paolo, and Johannes Muhle-Karbe. 2013. Portfolio choice with transaction costs: A user’s guide. In Paris-Princeton Lectures on Mathematical Finance. Edited by Vicky Henderson and Ronnie Sircar. Cham: Springer, pp. 169–201. [Google Scholar]
  12. Guasoni, Paolo, and Marko Hans Weber. 2020. Nonlinear price impact and portfolio choice. Mathematical Finance 30: 341–76. [Google Scholar] [CrossRef]
  13. Gut, Allan. 2009. Stopped Random Walks. Limit Theorems and Applications. Springer Series in Operations Research and Financial Engineering; New York: Springer. [Google Scholar]
  14. Kallsen, Jan, and Johannes Muhle-Karbe. 2017. The general structure of optimal investment and consumption with small transaction costs. Mathematical Finance 27: 695–703. [Google Scholar] [CrossRef]
  15. Mayerhofer, Eberhard. 2024. Almost perfect shadow prices. Journal of Risk and Financial Management 17: 70. [Google Scholar] [CrossRef]
  16. Neuberger, Anthony. 1994. The log contract. Journal of Portfolio Management 20: 74–80. [Google Scholar] [CrossRef]
  17. Rogers, L. C. G. 2004. Why is the effect of proportional transaction costs δ2/3? Mathematics of Finance 351: 303–8. [Google Scholar]
  18. Shreve, S. E., and H. M. Soner. 1994. Optimal investment and consumption with transaction costs. The Annals of Applied Probability 4: 609–92. [Google Scholar] [CrossRef]
  19. Taksar, Michael, Michael J. Klass, and David Assaf. 1988. A diffusion model for optimal portfolio selection in the presence of brokerage fees. Mathematics of Operations Research 13: 277–94. [Google Scholar] [CrossRef]
  20. Tanaka, Hiroshi. 1979. Stochastic differential equations with reflecting boundary condition in convex regions. Hiroshima Mathematical Journal 9: 163–77. [Google Scholar] [CrossRef]
Figure 1. The upper panel plots illustrate reflected (black line) and resetted (red line) centred Brownian motions with a standard deviation of 10%. Reflected diffusions execute minimal trades—here approximated with small trades—while maximal trades are characteristic of resetted diffusions (as depicted in the second plot). Crosses on the graphs mark trading dates and positions. Notably, over a ten-year period, the annualized tracking error tends to be smaller for resetted diffusions, whereas the transaction costs are generally lower for minimal trades (lower panel).
Figure 1. The upper panel plots illustrate reflected (black line) and resetted (red line) centred Brownian motions with a standard deviation of 10%. Reflected diffusions execute minimal trades—here approximated with small trades—while maximal trades are characteristic of resetted diffusions (as depicted in the second plot). Crosses on the graphs mark trading dates and positions. Notably, over a ten-year period, the annualized tracking error tends to be smaller for resetted diffusions, whereas the transaction costs are generally lower for minimal trades (lower panel).
Risks 12 00064 g001
Figure 2. For M Σ 2 / 2 = 8 % and Σ = 16 % , and η = 0.2 , η = 0 , and η + = + 0.2 , we plot the stationary density of the resetted process η . The histogram gives the value of η T for T = 5 years, from ten thousand simulated paths (daily frequency).
Figure 2. For M Σ 2 / 2 = 8 % and Σ = 16 % , and η = 0.2 , η = 0 , and η + = + 0.2 , we plot the stationary density of the resetted process η . The histogram gives the value of η T for T = 5 years, from ten thousand simulated paths (daily frequency).
Risks 12 00064 g002
Figure 3. The stationary densities converge, for smaller and smaller trades, to the stationary density of a reflected diffusion (red line). Here, η ± = ± 0.2 , η ± , = ± 0.1 (dotted line), η ± , = ± 0.15 (dashed line), and η ± , = ± 0.19 (solid line). The parameters are μ = 10 % and σ = 15 % .
Figure 3. The stationary densities converge, for smaller and smaller trades, to the stationary density of a reflected diffusion (red line). Here, η ± = ± 0.2 , η ± , = ± 0.1 (dotted line), η ± , = ± 0.15 (dashed line), and η ± , = ± 0.19 (solid line). The parameters are μ = 10 % and σ = 15 % .
Risks 12 00064 g003
Figure 4. Small trades of fixed size. For M Σ 2 / 2 = 10 % and Σ = 25 % , and η = 0.2 , η l = 0.1 , η u = 0.1 , and η + = + 0.2 , we plot the stationary density of the resetted process η . The histogram gives the value of η T for T = 5 years, from ten thousand simulated paths (daily frequency).
Figure 4. Small trades of fixed size. For M Σ 2 / 2 = 10 % and Σ = 25 % , and η = 0.2 , η l = 0.1 , η u = 0.1 , and η + = + 0.2 , we plot the stationary density of the resetted process η . The histogram gives the value of η T for T = 5 years, from ten thousand simulated paths (daily frequency).
Risks 12 00064 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mayerhofer, E. Asymptotic Methods for Transaction Costs. Risks 2024, 12, 64. https://doi.org/10.3390/risks12040064

AMA Style

Mayerhofer E. Asymptotic Methods for Transaction Costs. Risks. 2024; 12(4):64. https://doi.org/10.3390/risks12040064

Chicago/Turabian Style

Mayerhofer, Eberhard. 2024. "Asymptotic Methods for Transaction Costs" Risks 12, no. 4: 64. https://doi.org/10.3390/risks12040064

APA Style

Mayerhofer, E. (2024). Asymptotic Methods for Transaction Costs. Risks, 12(4), 64. https://doi.org/10.3390/risks12040064

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop