Security Design: Signaling versus Speculative Markets
We determine optimal security design and retention of asset-backed securities by a privately informed issuer with positive NPV uses for immediate cash. In canonical models, investors revert to prior beliefs if issuers pool at zero-retentions (originate-to-distribute), and separating equilibria are welfare-dominated since separation entails signaling via asset-retention and underinvestment. However, we show speculative markets arise if and only if issuers pool, creating previously overlooked costs. Pooling induces socially costly information acquisition by speculators. Further, in pooling equilibria, issuers never sell safe claims, leaving uninformed investors exposed to adverse selection and distorting risk sharing. In such equilibria, issuers retain zero interest in the asset, and speculator effort is maximized by splitting cash flow into a risky senior ("debt") tranche and residual junior ("equity") claim. Optimal leverage trades off per-unit speculator gains against endogenous declines in uninformed debt trading. Issuer incentives to implement the pooling equilibrium, with distorted risk sharing, are strong precisely when efficient risk sharing, achieved through separation, has high social value. In such cases, a tax on issuer proceeds can raise welfare by encouraging issuer retentions. Taxation dominates mandatory skin-in-the-game as a policy response, since the latter creates gratuitous underinvestment.
|Date of creation:||Apr 2011|
|Date of revision:|
|Contact details of provider:|| Postal: |
Phone: 44 - 20 - 7183 8801
Fax: 44 - 20 - 7183 8820
|Order Information:|| Email: |
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Ulf Axelson, 2007. "Security Design with Investor Private Information," Journal of Finance, American Finance Association, vol. 62(6), pages 2587-2632, December.
- Dow, James, 1998. "Arbitrage, Hedging, and Financial Innovation," Review of Financial Studies, Society for Financial Studies, vol. 11(4), pages 739-55.
- Maskin, Eric & Tirole, Jean, 1992. "The Principal-Agent Relationship with an Informed Principal, II: Common Values," Econometrica, Econometric Society, vol. 60(1), pages 1-42, January.
- Guillaume Plantin, 2011.
"Good Securitization, Bad Securitization,"
IMES Discussion Paper Series
11-E-04, Institute for Monetary and Economic Studies, Bank of Japan.
- Peter M. DeMarzo, 2005. "The Pooling and Tranching of Securities: A Model of Informed Intermediation," Review of Financial Studies, Society for Financial Studies, vol. 18(1), pages 1-35.
- Gorton, Gary & Pennacchi, George, 1990. " Financial Intermediaries and Liquidity Creation," Journal of Finance, American Finance Association, vol. 45(1), pages 49-71, March.
- Fulghieri, Paolo & Lukin, Dmitry, 2001. "Information production, dilution costs, and optimal security design," Journal of Financial Economics, Elsevier, vol. 61(1), pages 3-42, July.
- Arnoud W A Boot & Anjan V Thakor, 1992.
CEPR Financial Markets Paper
0020, European Science Foundation Network in Financial Markets, c/o C.E.P.R, 77 Bastwick Street, London EC1V 3PZ..
- Franklin Allen, Douglas Gale, 1988.
"Optimal Security Design,"
Review of Financial Studies,
Society for Financial Studies, vol. 1(3), pages 229-263.
- Franklin Allen & Douglas Gale, . "Optimal Security Design," Rodney L. White Center for Financial Research Working Papers 26-87, Wharton School Rodney L. White Center for Financial Research.
- Peter DeMarzo & Darrell Duffie, 1999. "A Liquidity-Based Model of Security Design," Econometrica, Econometric Society, vol. 67(1), pages 65-100, January.
- Nachman, David C & Noe, Thomas H, 1994. "Optimal Design of Securities under Asymmetric Information," Review of Financial Studies, Society for Financial Studies, vol. 7(1), pages 1-44.
When requesting a correction, please mention this item's handle: RePEc:cpr:ceprdp:8336. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ()The email address of this maintainer does not seem to be valid anymore. Please ask to update the entry or send us the correct address
If references are entirely missing, you can add them using this form.