Next Article in Journal
A Novel Fractional Multi-Order High-Gain Observer Design to Estimate Temperature in a Heat Exchange Process
Previous Article in Journal
Efficient Formulation for Vendor–Buyer System Considering Optimal Allocation Fraction of Green Production
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Simplified Approach to the Pricing of Vulnerable Options with Two Underlying Assets in an Intensity-Based Model

School of Natural Sciences, Seoul National University of Science and Technology, Seoul 01811, Republic of Korea
Axioms 2023, 12(12), 1105; https://doi.org/10.3390/axioms12121105
Submission received: 27 October 2023 / Revised: 29 November 2023 / Accepted: 2 December 2023 / Published: 7 December 2023
(This article belongs to the Special Issue Applied Mathematical Models of Option Pricing)

Abstract

:
In this paper, we study a simplified approach to determine the pricing formula for vulnerable options involving two correlated underlying assets. We utilize an intensity-based model to describe the credit risk associated with these vulnerable options. Without the change of measure technique, we derive pricing formulas for vulnerable options involving two underlying assets based on the probabilistic approach. We provide closed-form pricing formulas for two specific types of options: the vulnerable exchange option and the vulnerable foreign equity option. Finally, we present numerical results to demonstrate the accuracy of our formulas using the Monte-Carlo method and the effect of various parameters on the price of options.

1. Introduction

The pricing problem of options with credit risk, also known as “vulnerable options”, has been extensively studied by numerous researchers. Vulnerable options are financial derivatives that take into account the credit risk of the counterparty. In general, two models have been used to model credit risk are the structural model and the intensity-based model. The structural model, proposed by Merton [1], Black and Cox [2] and Geske [3], depends on the option issuer’s firm value process. A credit event occurs in the structural model if the firm value process falls below the option issuer’s liability value at maturity. The intensity-based model, initially developed by Jarrow and Turnbull [4], Lando [5] and Jarrow and Yu [6], determines a credit event based on the jump of a Poisson process with a given intensity. In other words, the event is triggered by the first jump of the process, and there is no direct relationship between the option issuer’s value and the credit event.
The research on vulnerable options began primarily with a structural approach. As a result, the structural model has been used in many studies in the past to model credit risk in vulnerable option pricing. Credit events occur in the structural model when a firm’s asset value falls below a specified threshold. Johnson and Stulz [7] were the first to introduce a vulnerable European option pricing model in which the option is the counterparty’s sole liability. Klein [8] extended the results of Johnson and Stulz [7] by allowing the option writer to have other liabilities and providing a correlation between the underlying asset and the counterparty’s asset. Liao and Huang [9] considered the option issuer’s potential default during the remaining life of the option and developed pricing formulas for vulnerable options with stochastic interest rate. Jeon and Kim [10] used the Mellin transform approach to develop the works of [9] as two types of options. More recently, Wang [11], He et al. [12], Kim et al. [13] and Jeon et al. [14] investigated the pricing of vulnerable options in the presence of stochastic volatility affecting asset price processes. In addition, there have been numerous research on vulnerable options with multi-assets [15,16,17,18,19].
We utilize an intensity-based model to capture credit risk for this study since it is commonly used to evaluate the prices of credit derivatives such as credit default swaps (CDS) [20,21], defaultable bonds [22], total return swap (TRS) [23,24], and others. We use an intensity-based model to investigate the pricing of vulnerable options with multi-assets. There have recently been studies on vulnerable options within the framework of the intensity-based model. Fard [25] derived a pricing formula for vulnerable option under a generalized jump model and used an intensity-based model to account for counterparty credit risk. Wang [26] applied Generalized AutoRegressive Conditional Heteroskedasticity (GARCH) model for the underlying asset process and an intensity-based model for counterparty credit risk to obtain a solution for the price of vulnerable options under a discrete time model. Koo and Kim [27] chose an intensity-based model to capture the option issuer’s credit event and provided an explicit analytical valuation formula for a catastrophe put option with default risk using the multidimensional Girsanov theorem. Moreover, Pasricha and Goel [28] investigated a vulnerable power exchange option with two underlying assets within an intensity-based model using a doubly stochastic Poisson process to model the counterparty’s credit event and assuming correlation among the three underlying assets in both the continuous and jump components. Wang [29] derived explicit pricing formula for vulnerable Asian option within an intensity-based model when the underlying asset process follows a two-factor stochastic volatility model.
We present a simple method for pricing vulnerable options with two underlying assets within an intensity-based model in this paper,. Based on Fard’s model [25], we assume that the default intensity process, which is correlated with the underlying assets, follows a mean-reverting Ornstein-Uhlenbeck (OU) process. However, unlike Fard’s approach, we do not use the change of measure technique. Instead, we provide a simplified valuation method for pricing vulnerable options with correlated underlying assets that is based on the probabilistic approach. Using this proposed method, we derive closed-form pricing formulas for vulnerable exchange option and vulnerable foreign equity option in particular. Furthermore, we examine the accuracy of the formulas using the Monte Carlo (MC) simulation.
The rest of the paper is organized as follows. In Section 2, we introduce the underlying assets for pricing vulnerable options, along with an intensity-based model to account for credit risk. In Section 3, we provide the valuation formulas for vulnerable exchange options and vulnerable foreign equity options. Additionally, we introduce the lemmas used in option pricing. In Section 4, we carry out some numerical experiments to show the accuracy of our formulas obtained in Section 3. Finally, in Section 5, we present concluding remarks.

2. The Model

We assume that there are no arbitrage opportunities in the economy represented by a filtered complete probability space ( Ω , F , { F ( t ) } , Q ) where Q is a risk-neutral probability measure and { F ( t ) } satisfies the usual conditions. Under the measure Q, the dynamics of two underlying assets are assumed to be
d S 1 ( t ) = r S 1 ( t ) d t + σ 1 S 1 ( t ) d W 1 ( t ) , d S 2 ( t ) = r S 2 ( t ) d t + σ 2 S 2 ( t ) d W 2 ( t ) ,
where r is a risk-free interest rate, σ i , ( i = 1 , 2 ) is volatility, and W 1 ( t ) and W 2 ( t ) are the correlated standard Brownian motions satisfying d W 1 ( t ) d W 2 ( t ) = ρ 12 d t . As in Fard [25], we assume that the process of default intensity is given by
d λ ( t ) = a ( b λ ( t ) ) d t + σ 3 d W 3 ( t ) ,
where a , b and σ 3 are positive constants and W 3 ( t ) is the standard Brownian motion satisfying d W 1 ( t ) d W 3 ( t ) = ρ 13 d t and d W 2 ( t ) d W 3 ( t ) = ρ 23 d t . With the process λ ( t ) , the default time τ of option issuer is defined by
P ( τ > t ) = E Q e 0 t λ ( s ) d s , t [ 0 , T ] ,
where T is the maturity and E Q [ · ] denotes the expectation under the measure Q. Define F S i ( t ) , ( i = 1 , 2 ) be the σ -field generated by the price processes of underlying asset i , ( i = 1 , 2 ) such that F S i ( t ) = σ ( S i ( s ) , s t ) , ( i = 1 , 2 ) . Similarly, the filtration of the default intensity F λ ( t ) and the filtration of the default time H ( t ) are defined as F λ ( t ) = σ ( λ ( s ) , s t ) and H ( t ) = σ ( 1 { τ s } , s t ) , respectively. Then, the enlarged filtration F ( t ) is generated by F ( t ) = F S 1 ( t ) F S 2 ( t ) F λ ( t ) H ( t ) , where 1 { } is the indicator function.
Let w be the recovery rate of the vulnerable option. Then, based on the results of Lando [5] and Fard [25], the price of vulnerable option with two underlying assets at time 0 in the intensity based model can be expressed as
C = e r T E Q w · h ( S 1 ( T ) , S 2 ( T ) ) 1 { τ T } + h ( S 1 ( T ) , S 2 ( T ) ) 1 { τ > T } | F ( 0 ) = w e r T E Q h ( S 1 ( T ) , S 2 ( T ) ) | F ( 0 ) + ( 1 w ) e r T E Q e 0 T λ ( s ) d s h ( S 1 ( T ) , S 2 ( T ) ) | F ( 0 ) ,
where h ( · , · ) denotes the payoff function of option and w is a constant satisfying 0 < w < 1 .

3. The Valuation of Vulnerable Options with Two Underlying Assets

In this section, we present a simplified approach for pricing of vulnerable options with two underlying assets based on Equation (1). The proposed approach provides the option pricing formula without the method of changing measure. We now introduce the lemmas to obtain the pricing formulas.
Lemma 1.
Let X 1 and X 2 be random variables which have a bivariate normal distribution. Then, for any constant k,
E [ e X 1 1 { X 2 k } ] = e E [ X 1 ] + Var [ X 1 ] 2 N Cov ( X 1 , X 2 ) + E [ X 2 ] k Var [ X 2 ] ,
where Var is the variance operator, Cov is the covariance operator and N is the cumulative standard normal distribution function.
Proof. 
For convenience, we write expectations and variances of random variables as
E [ X 1 ] = μ 1 , Var [ X 1 ] = σ 1 2 , E [ X 2 ] = μ 2 , Var [ X 2 ] = σ 2 2 ,
respectively.
By the conditional distribution of X 1 given X 2 and the moment generating functions of normal variables, we have
E [ e X 1 1 { X 2 k } ] = E [ E [ e X 1 | X 2 ] 1 { X 2 k } ] = E [ e μ 1 + ρ σ 1 σ 2 ( X 2 μ 2 ) + 1 2 σ 1 2 ( 1 ρ 2 ) 1 { X 2 k } ] = e μ 1 ρ σ 1 σ 2 μ 2 + 1 2 σ 1 2 ( 1 ρ 2 ) E [ e ρ σ 1 σ 2 X 2 1 { X 2 k } ] ,
where k is some constant and ρ is the correlation between X 1 and X 2 . Then, by the change of variable X 2 = μ 2 + σ 2 Z 2 , we have
E [ e ρ σ 1 σ 2 X 2 1 { X 2 k } ] = e ρ σ 1 σ 2 μ 2 E [ e ρ σ 1 Z 2 1 { Z 2 k μ 2 σ 2 } ] = e ρ σ 1 σ 2 μ 2 + 1 2 ρ 2 σ 1 2 k μ 2 σ 2 e 1 2 ( Z 2 ρ σ 1 ) 2 2 π d Z 2 .
This completes the proof. □
Lemma 2.
Let X 1 , X 2 and X 3 be random variables which have a trivariate normal distribution. Then,
E [ e X 3 g ( X 1 , X 2 ) ] = E [ e X 3 ] E [ g ( X 1 Cov ( X 1 , X 3 ) , X 2 Cov ( X 2 , X 3 ) ] ,
for which the expectations exist for any function g ( · , · ) .
Proof. 
Let us define the function f ^ such that
f ^ ( x 1 , x 2 ) : = e x 3 f ( x 1 , x 2 , x 3 ) d x 3 ,
where f is the joint density function of ( X 1 , X 2 , X 3 ) . Then, we have
E e X 3 g ( X 1 , X 2 ) = e x 3 g ( x 1 , x 2 ) f ( x 1 , x 2 , x 3 ) d x 1 d x 2 d x 3 = g ( x 1 , x 2 ) f ^ ( x 1 , x 2 ) d x 1 d x 2 .
We now consider the moment generating function (MGF) of ( X 1 , X 2 , X 3 ) . That is, MGF of ( X 1 , X 2 , X 3 ) is given by ϕ ( s , t , u ) = E [ e s X 1 + t X 2 + u X 3 ] . If g ( x 1 , x 2 ) = e x 1 + x 2 , we can find that
ϕ ( s , t , 1 ) = E [ e s X 1 + t X 2 X 3 ] = e s x 1 + t x 2 f ^ ( x 1 , x 2 ) d x 1 d x 2 .
Here, s X 1 + t X 2 X 3 has a normal distribution. It follows that
ϕ ( s , t , 1 ) = exp s E [ X 1 ] + t E [ X 2 ] E [ X 3 ] + s 2 Var [ X 1 ] 2 + t 2 Var [ X 2 ] 2 + Var [ X 3 ] 2 + s t Cov [ X 1 , X 2 ] t Cov [ X 2 , X 3 ] s Cov [ X 1 , X 3 ] = e E [ X 3 ] + Var [ X 3 ] 2 × exp s ( E [ X 1 ] Cov [ X 1 , X 3 ] ) + s 2 Var [ X 1 ] 2 + t ( E [ X 2 ] Cov [ X 2 , X 3 ] ) + t 2 Var [ X 2 ] 2 + s t Cov [ X 1 , X 2 ] = E [ e X 3 ] E [ exp s ( X 1 Cov [ X 1 , X 3 ] ) + t ( X 2 Cov [ X 2 , X 3 ] ) ] .
Since MGF uniquely determines the distribution, f ^ ( x 1 , x 2 ) / E [ e X 3 ] becomes a density function of ( X 1 Cov [ X 1 , X 3 ] , X 2 Cov [ X 2 , X 3 ] ) . Therefore, we conclude that
E e X 3 g ( X 1 , X 2 ) = E [ e X 3 ] g ( x 1 , x 2 ) f ^ ( x 1 , x 2 ) E [ e X 3 ] d x 1 d x 2 .
This completes the proof. □
We investigate the pricing of vulnerable options with two underlying assets under the intensity based model using Lemmas 1 and 2. Specifically, we deal with two kinds of options: vulnerable foreign equity option and vulnerable exchange option, and derive the closed-form pricing formulas of the options.

3.1. Vulnerable Exchange Option

Margrabe [30] first derived the closed-form pricing formula of the european exchange option which provides the option holder the right to exchange one risky asset for another. Since its introduction by Margrabe [30], the option has become one of the most popular exotic options in the over-the-counter (OTC) market. We assume that the dynamics of underlying assets and default intensity follow the processes defined in the previous section. From Equation (1), the vulnerable exchange option price at time 0 with maturity T is given by
V ( 0 ) = ( 1 w ) e r T E Q e 0 T λ ( s ) d s ( S 1 ( T ) S 2 ( T ) ) + | F ( 0 ) + w e r T E Q ( S 1 ( T ) S 2 ( T ) ) + | F ( 0 ) : = ( 1 w ) e r T V 1 + w e r T V 2 .
Then, using the Lemmas 1 and 2, we can derive the closed-form pricing formula of vulnerable exchange option in the intensity based model.
Theorem 1.
The price of vulnerable exchange option at time 0 is given by
V ( 0 ) = ( 1 w ) Λ 1 S 1 ( 0 ) e σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s N ( d 1 ) S 2 ( 0 ) e σ 2 σ 3 ρ 23 a 0 T u ( s , T , a ) d s N ( d 2 ) + w S 1 ( 0 ) N ( d ^ 1 ) S 2 ( 0 ) N ( d ^ 2 ) ,
where
d 1 = ln S 1 ( 0 ) S 2 ( 0 ) + 1 2 σ 2 T + σ 2 σ 3 ρ 23 σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s σ T , d 2 = d 1 σ T , d ^ 1 = ln S 1 ( 0 ) S 2 ( 0 ) + 1 2 σ 2 T σ T , d ^ 2 = d ^ 1 σ T , Λ 1 = exp b T λ ( 0 ) b a ( 1 e a T ) + σ 3 2 2 a 2 0 T u 2 ( s , T , a ) d s , u ( s , T , a ) = 1 e a ( T s ) , σ 2 = σ 1 2 + σ 2 2 2 ρ 12 σ 1 σ 2 .
Proof. 
Using Lemma 2, we can decompose V 1 into two expectations as follows.
V 1 = E Q e 0 T λ ( s ) d s ( S 1 ( T ) S 2 ( T ) ) + | F ( 0 ) = e b T λ ( 0 ) b a ( 1 e a T ) E Q e X 3 | F ( 0 ) × E Q g ( X 1 Cov ( X 1 , X 3 ) , X 2 Cov ( X 2 , X 3 ) ) | F ( 0 ) ,
where X 1 = σ 1 W 1 ( T ) , X 2 = σ 2 W 2 ( T ) , X 3 = σ 3 a 0 T u ( s , T , a ) d W 3 ( s ) and
g ( x , y ) = ( S 1 ( 0 ) e ( r 1 2 σ 1 2 ) T + x S 2 ( 0 ) e ( r 1 2 σ 2 2 ) T + y ) + .
Using the Ito isometry, we find that the random variable X 3 is normally distributed with mean 0 and variance σ 3 2 a 2 0 T u 2 ( s , T , a ) d s . Then, the first expectation in Equation (4) can be calculated easily. Next, let us consider the second expectation in Equation (4). The expectation can be represented by
E Q g ( X 1 Cov ( X 1 , X 3 ) , X 2 Cov ( X 2 , X 3 ) ) | F ( 0 ) = S 1 ( 0 ) e ( r 1 2 σ 1 2 ) T σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s × E Q e X 1 1 { S 1 ( T ) e Cov ( X 1 , X 3 ) > S 2 ( T ) e Cov ( X 2 , X 3 ) } | F ( 0 ) S 2 ( 0 ) e ( r 1 2 σ 2 2 ) T σ 2 σ 3 ρ 23 a 0 T u ( s , T , a ) d s × E Q e X 2 1 { S 1 ( T ) e Cov ( X 1 , X 3 ) > S 2 ( T ) e Cov ( X 2 , X 3 ) } | F ( 0 ) .
X 1 X 2 is normally distributed with mean 0 and variance σ 2 T . Then, by applying Lemma 1, we can calculate two expectations in Equation (5).
E Q e X i 1 { S 1 ( T ) e Cov ( X 1 , X 3 ) > S 2 ( T ) e Cov ( X 2 , X 3 ) } | F ( 0 ) = e σ i 2 2 T N ( d i ) , f o r i = 1 , 2 .
This completes the formula for V 1 . Finally, since V 2 is Margrabe’s formula which is well known, we can obtain the pricing formula for vulnerable exchange option. □
Remark 1.
Theorem 1 is also applicable to the vulnerable european options in the intensity based model. The vulnerable european call option price can be obtained by setting strike K = S 2 ( 0 ) e r T and σ 2 = 0 .

3.2. Vulnerable Foreign Equity Option

Foreign equity options are contingent claims where the payoffs are determined by underlying assets in one currency, but the actual payoff is converted to another currency at maturity. Following Kwok [31], there are four types of foreign equity options. Among them, we consider a foreign equity option call stuck in domestic currency in this paper.
Let S f ( t ) and S d ( t ) be the asset price in foreign currency and the asset price in domestic currency, respectively. We denote the exchange rate specified in domestic currency per unit of the foreign currency at time t by Y ( t ) , so that the relation between S f ( t ) and S d ( t ) is formulated as S d ( t ) = Y ( t ) S f ( t ) . We also assume that r d and r f are the domestic and foreign risk-free interest rates, respectively. As shown by Kwok and Wong [32] and Martzoukos [33], under risk-neutral probability measure Q, the price processes for S f ( t ) and S d ( t ) are given by
d S d ( t ) = ( r d q ) S d ( t ) d t + σ 1 S d ( t ) d W 1 ( t ) , d S f ( t ) = ( r f q ρ 12 σ 1 σ 2 ) S f ( t ) d t + σ 1 S f ( t ) d W 1 ( t ) ,
where q is the dividend of the asset, σ 1 is the volatility of the asset and W 1 ( t ) is the standard Brownian motion, respectively. Also, the exchange rate process Y ( t ) is given by
d Y ( t ) = ( r d r f ) Y ( t ) d t + σ 2 Y ( t ) d W 2 ( t ) ,
where σ 2 is the volatility of exchange rate and W 2 ( t ) is the standard Brownian motion satisfying d W 1 ( t ) d W 2 ( t ) = ρ 12 d t under the measure Q. Then, with the process of default intensity λ ( t ) defined in the previous section, a vulnerable foreign equity option call price in domestic currency at time 0 with domestic strike K and maturity T is given by
C ( 0 ) = ( 1 w ) e r d T E Q e 0 T λ ( s ) d s ( Y ( T ) S f ( T ) K ) + | F ( 0 ) + w e r d T E Q ( Y ( T ) S f ( T ) K ) + | F ( 0 ) : = ( 1 w ) e r d T C 1 + w e r d T C 2 .
We present the closed-form pricing formula of vulnerable foreign equity option in the the following theorem.
Theorem 2.
The price of vulnerable foreign equity option at time 0 is given by
C ( 0 ) = ( 1 w ) Λ 1 × Y ( 0 ) S f ( 0 ) e ( q + 1 2 σ f 2 ) T σ 2 σ 3 ρ 23 + σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s N ( d 1 ) K e r d T N ( d 2 ) + w Y ( 0 ) S f ( 0 ) e q T N ( d ^ 1 ) K e r d T N ( d ^ 2 ) ,
where u ( s , T , a ) and Λ 1 are defined in Theorem 1, and
d 1 = ln Y ( 0 ) S f ( 0 ) K + r d q + 1 2 σ f 2 T σ 2 σ 3 ρ 23 + σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s σ f T , d ^ 1 = ln Y ( 0 ) S f ( 0 ) K + r d q + 1 2 σ f 2 T σ f T , d 2 = d 1 σ f T , d ^ 2 = d ^ 1 σ f T , σ f 2 = σ 1 2 + σ 2 2 + 2 ρ 12 σ 1 σ 2 .
Proof. 
Similar to Theorem 1, applying Lemma 2, we can rewrite C 1 as
C 1 = E Q e 0 T λ ( s ) d s ( Y ( T ) S f ( T ) K ) + | F ( 0 ) = e b T λ ( 0 ) b a ( 1 e a T ) E Q e X 3 | F ( 0 ) × E Q g ( X 1 Cov ( X 1 , X 3 ) , X 2 Cov ( X 2 , X 3 ) ) | F ( 0 ) ,
where X 1 = σ 1 W 1 ( T ) , X 2 = σ 2 W 2 ( T ) , X 3 = σ 3 a 0 T u ( s , T , a ) d W 3 ( s ) , and
g ( x , y ) = ( Y ( 0 ) S f ( 0 ) e ( r d q 1 2 σ f 2 ) T + x + y K ) + .
The first expectation in Equation (8) can be calculated easily, and the second expectation can be represented by
E Q g ( X 1 Cov ( X 1 , X 3 ) , X 2 Cov ( X 2 , X 3 ) ) | F ( 0 ) = Y ( 0 ) S f ( 0 ) e ( r d q 1 2 σ f 2 ) T σ 2 σ 3 ρ 23 + σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s × E Q e X 1 + X 2 1 { Y ( T ) S f ( T ) e σ 2 σ 3 ρ 23 + σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s > K } | F ( 0 ) K E Q 1 { Y ( T ) S f ( T ) e σ 2 σ 3 ρ 23 + σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s > K } | F ( 0 ) .
Since X 1 + X 2 is normally distributed with mean 0 and variance σ f 2 T , the second expectation in Equation (9) is
E Q 1 { Y ( T ) S f ( T ) e σ 2 σ 3 ρ 23 + σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s > K } | F ( 0 ) = P Q Y ( T ) S f ( T ) > K e σ 2 σ 3 ρ 23 + σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s | F ( 0 ) = P Q X 1 X 2 < ln Y ( 0 ) S f ( 0 ) K + r d q + 1 2 σ f 2 T σ 2 σ 3 ρ 23 + σ 1 σ 3 ρ 13 a 0 T u ( s , T , a ) d s = N ( d 2 ) .
In Equation (9), the expectations can be calculated using Lemma 1. Moreover, C 2 can be calculated easily without the use of Lemma 2. Finally, we obtain the pricing formula combining above results . □
Remark 2.
As in Fard [25], the pricing formulas in Theorems 1 and 2 can be derived using the change of measure method. However, in the intensity based model, the approach based on Lemma 1 and Lemma 2 is simpler for pricing vulnerable options with two underlying assets.

4. Numerical Experiments

In this section, we present numerical experiments that demonstrate the impact of significant parameters on the option price and verify the accuracy of our pricing formulas. We specifically compare the pricing formula values with the option values generated using the Monte Carlo (MC) simulation method, and we provide graphs for illustrating the sensitivity analysis of parameters on the vulnerable options.

4.1. Monte Carlo Simulation

In this subsection, we show the accuracy of our approach by comparing the values by the pricing formulas in the previous section and those MC simulations with 20,000 sample paths and 500 time steps.
Using the Euler discretization, the sample paths of the processes for vulnerable exchange option are given by
ln S 1 ( t + Δ t ) = ln S 1 ( t ) + ( r 0.5 σ 1 2 ) Δ t + σ 1 Δ t ε 1 , ln S 2 ( t + Δ t ) = ln S 2 ( t ) + ( r 0.5 σ 2 2 ) Δ t + σ 2 Δ t ( ρ 12 ε 1 + 1 ρ 12 2 ε 2 ) , λ ( t + Δ t ) = λ ( t ) + a ( b λ ( t ) ) Δ t + σ 3 Δ t ( ρ 13 ε 1 + ρ 23 ^ ε 2 + 1 ρ 13 2 ρ 23 ^ 2 ε 3 ) ,
where Δ t = 1 / 1000 , ρ 23 ^ = ( ρ 23 ρ 12 ρ 13 ) / 1 ρ 12 2 , and ε 1 , ε 2 , ε 3 are identical and independent samples from the standard normal distribution with mean 0 and variance 1. The experiments’ default parameters for the vulnerable exchange option price are S 1 ( 0 ) = S 2 ( 0 ) = 100 , r = 0.03 , T = 1 , λ ( 0 ) = 0.45 , σ 1 = 0.18 , σ 2 = 0.12 , σ 3 = 0.25 , ρ 12 = ρ 13 = ρ 23 = 1 , a = 0.06 , b = 1.5 and w = 0.75 .
The values V ( 0 ) by Theorem 1 and the values using MC method are shown in Table 1. The values of ‘R-err’ in Table 1 are the relative error between values by the pricing formulas and values by the MC method defined by
R err Value by formula Value by MC Value by formula .
The results in Table 1 demonstrate that our option pricing formula is accurate. Furthermore, we find that experiments with the proposed pricing formula take less than 0.1 s on average while the Monte Carlo simulations take almost 20 s on average.
Table 2 provides comparison of vulnerable foreign equity option values calculated through our formula given in Theorem 2 and values obtained through the MC method. The processes of the vulnerable foreign equity option are discretized similarly to the processes of vulnerable exchange option. Table 2 shows the accuracy of our formula, as expected. The experiments’ default parameters for the vulnerable foreign equity option price are S f ( 0 ) = 100 , K = 100 , Y ( 0 ) = 1.1 , r d = r f = 0.03 , T = 1 , q = 0 , λ ( 0 ) = 0.45 , σ 1 = 0.18 ,   σ 2 = 0.12 , σ 3 = 0.25 , ρ 12 = ρ 13 = ρ 23 = 1 , a = 0.06 , b = 1.5 and w = 0.75 .

4.2. Numerical Examples

Figure 1, Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6 illustrate the vulnerable exchange option prices in the intensity-based model to investigate the impact of various parameters. Figure 1 and Figure 2 present the option prices against maturity T for three recovery rate parameters w = 0.5 , 0.75 , 1 and initial intensity parameters λ ( 0 ) = 0.5 , 1.5 , 2.5 . From Figure 1 and Figure 2, we observe that option price increases when the maturity increases. As expected, in Figure 1, we can find that a lager value of w corresponds a higher price of option. We also find that option the prices decrease with an increase in λ ( 0 ) in Figure 2. Figure 3 displays option prices against volatility σ 1 of underlying asset S 1 ( t ) for three maturities T = 0.5 , 1 , 1.5 . From Figure 3, we observe that option prices increase for σ 1 > 1.2 , but decrease for σ 1 < 1.2 for all maturity. In Figure 4, we report option prices against volatility σ 3 of intensity process. Since the probability of default increases as σ 3 increases, the prices decrease with an increase in σ 3 . Figure 5 and Figure 6 show the option prices against the correlations ρ 12 and ρ 13 respectively and for three recovery rate parameters. We observe that the option prices decrease when the correlation ρ 12 increases. This is because two underlying assets S 1 ( t ) and S 2 ( t ) move in the same direction for positive correlation. Different from Figure 5, the price is constant for w = 1 . This is due to the fact that the correlation ρ 13 does not have any role because credit risk does not occur when w = 1 . If w 1 , the prices decrease as ρ 13 increases.
Figure 7, Figure 8, Figure 9, Figure 10, Figure 11 and Figure 12 illustrate the vulnerable foreign equity option prices in the intensity-based model to investigate the impact of various parameters. In most of the Figures, except for Figure 9, we can see that the behaviors of foreign equity option prices are similar to the behaviors of exchange option prices for same parameters. In contrast to Figure 3, in Figure 9, as σ 1 x increases, the option prices also increase continuously. This is due to the difference in the structure of the payoff function.

5. Concluding Remarks

In this paper, we investigate a simple approach for pricing vulnerable options with two correlated underlying assets in an intensity-based model. The mean-reverting OU process, which is correlated with the underlying assets, is used to model credit risk. We obtain option pricing formulas using the properties of three random variables without changing the measure. The approach presented in this study is easily expanded to more general vulnerable options in the intensity-based model. We derive closed-form pricing formulas for two types of options with two underlying assets using the proposed approach: exchange option and and foreign equity option. Finally, we provide numerical results using the MC simulation method to show the accuracy of our option pricing formula and graphs to illustrate the impacts of different parameters on option price.
This study employs the mean-reverting OU process for stochastic intensity based on Fard’s model [25], however it has a limitation: the intensity cannot be negative mathematically, but the mean-reverting OU process for intensity can have negative values. To overcome this problem, stochastic intensity models that do not allow negative values, such as the CIR model, should be used to vulnerable option pricing in the intensity-based model. This will be studied further in the future via the change of measure method.

Funding

This study was supported by the Research Program funded by the SeoulTech (Seoul National University of Science and Technology).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Merton, R.C. On the pricing of corporate debt: The risk structure of interest rates. J. Financ. 1974, 29, 449–470. [Google Scholar]
  2. Black, F.; Cox, J.C. Valuing corporate securities: Some effects of bond indenture provisions. J. Financ. 1976, 31, 351–367. [Google Scholar] [CrossRef]
  3. Geske, R. The valuation of corporate liabilities as compound options. J. Financ. Quant. Anal. 1977, 12, 541–552. [Google Scholar] [CrossRef]
  4. Jarrow, R.; Turnbull, S. Pricing options on financial securities subject to default risk. J. Financ. 1995, 50, 53–86. [Google Scholar] [CrossRef]
  5. Lando, D. On Cox processes and credit risky securities. Rev. Deriv. Res. 1998, 2, 99–120. [Google Scholar] [CrossRef]
  6. Jarrow, R.A.; Yu, F. Counterparty risk and the pricing of defaultable securities. J. Financ. 2001, 56, 1765–1799. [Google Scholar] [CrossRef]
  7. Johnson, H.; Stulz, R. The pricing of options with default risk. J. Financ. 1987, 42, 267–280. [Google Scholar] [CrossRef]
  8. Klein, P. Pricing Black-Scholes options with correlated credit risk. J. Bank. Financ. 1996, 20, 1211–1229. [Google Scholar] [CrossRef]
  9. Liao, S.L.; Huang, H.H. Pricing Black–Scholes options with correlated interest rate risk and credit risk: An extension. Quant. Financ. 2005, 5, 443–457. [Google Scholar] [CrossRef]
  10. Jeon, J.; Kim, G. Pricing of vulnerable options with early counterparty credit risk. N. Am. J. Econ. Financ. 2019, 47, 645–656. [Google Scholar] [CrossRef]
  11. Wang, X. Analytical valuation of Asian options with counterparty risk under stochastic volatility models. J. Futur. Mark. 2020, 40, 410–429. [Google Scholar] [CrossRef]
  12. He, W.H.; Wu, C.; Gu, J.W.; Ching, W.K.; Wong, C.W. Pricing vulnerable options under a jump-diffusion model with fast mean-reverting stochastic volatility. J. Ind. Manag. Optim. 2022, 18, 2077–2094. [Google Scholar] [CrossRef]
  13. Kim, D.; Choi, S.Y.; Yoon, J.H. Pricing of vulnerable options under hybrid stochastic and local volatility. Chaos Solitons Fractals 2021, 146, 110846. [Google Scholar] [CrossRef]
  14. Jeon, J.; Huh, J.; Kim, G. An analytical approach to the pricing of an exchange option with default risk under a stochastic volatility model. Adv. Contin. Discret. Model. 2023, 2023, 37. [Google Scholar] [CrossRef]
  15. Kim, G. Valuation of Exchange Option with Credit Risk in a Hybrid Model. Mathematics 2020, 8, 2091. [Google Scholar] [CrossRef]
  16. Wang, X. Valuing vulnerable options with two underlying assets. Appl. Econ. Lett. 2020, 27, 1699–1706. [Google Scholar] [CrossRef]
  17. Kim, D.; Yoon, J.H.; Kim, G. Closed-form pricing formula for foreign equity option with credit risk. Adv. Differ. Equations 2021, 2021, 1–17. [Google Scholar] [CrossRef]
  18. Jeon, J.; Kim, G. Power Exchange Option with a Hybrid Credit Risk under Jump-Diffusion Model. Mathematics 2021, 10, 53. [Google Scholar] [CrossRef]
  19. Dong, Z.; Tang, D.; Wang, X. Pricing vulnerable basket spread options with liquidity risk. Rev. Deriv. Res. 2023, 26, 23–50. [Google Scholar] [CrossRef]
  20. Jamshidian, F. Valuation of credit default swaps and swaptions. Financ. Stochastics 2004, 8, 343–371. [Google Scholar] [CrossRef]
  21. Leung, S.Y.; Kwok, Y.K. Credit default swap valuation with counterparty risk. Kyoto Econ. Rev. 2005, 74, 25–45. [Google Scholar]
  22. Zhang, J.; Bi, X.; Li, R.; Zhang, S. Pricing credit derivatives under fractional stochastic interest rate models with jumps. J. Syst. Sci. Complex. 2017, 30, 645–659. [Google Scholar] [CrossRef]
  23. Wang, A.; Ye, Z. Total return swap valuation with counterparty risk and interest rate risk. Abstr. Appl. Anal. 2014, 12, 412890. [Google Scholar] [CrossRef]
  24. Wang, A. The pricing of total return swap under default contagion models with jump-diffusion interest rate risk. Indian J. Pure Appl. Math. 2020, 51, 361–373. [Google Scholar] [CrossRef]
  25. Fard, F.A. Analytical pricing of vulnerable options under a generalized jump–diffusion model. Insur. Math. Econ. 2015, 60, 19–28. [Google Scholar] [CrossRef]
  26. Wang, X. Analytical valuation of vulnerable options in a discrete-time framework. Probab. Eng. Informational Sci. 2017, 31, 100–120. [Google Scholar] [CrossRef]
  27. Koo, E.; Kim, G. Explicit formula for the valuation of catastrophe put option with exponential jump and default risk. Chaos Solitons Fractals 2017, 101, 1–7. [Google Scholar] [CrossRef]
  28. Pasricha, P.; Goel, A. Pricing vulnerable power exchange options in an intensity based framework. J. Comput. Appl. Math. 2019, 355, 106–115. [Google Scholar] [CrossRef]
  29. Wang, X. Analytical valuation of vulnerable European and Asian options in intensity-based models. J. Comput. Appl. Math. 2021, 393, 113412. [Google Scholar] [CrossRef]
  30. Margrabe, W. The value of an option to exchange one asset for another. J. Financ. 1978, 33, 177–186. [Google Scholar] [CrossRef]
  31. Kwok, Y.K. Mathematical Models of Financial Derivatives; Springer: Berlin, Germany, 2008. [Google Scholar]
  32. Kwok, Y.K.; Wong, H.Y. Currency-translated foreign equity options with path dependent features and their multi-asset extensions. Int. J. Theor. Appl. Financ. 2000, 3, 257–278. [Google Scholar] [CrossRef]
  33. Martzoukos, S.H. Contingent claims on foreign assets following jump-diffusion processes. Rev. Deriv. Res. 2003, 6, 27–45. [Google Scholar] [CrossRef]
Figure 1. Price of vulnerable exchange option against T for recovery rates w = 0.5 , 0.75 , 1 .
Figure 1. Price of vulnerable exchange option against T for recovery rates w = 0.5 , 0.75 , 1 .
Axioms 12 01105 g001
Figure 2. Price of vulnerable exchange option against T for initial intensities λ ( 0 ) = 0.5 , 1.5 , 2.5 .
Figure 2. Price of vulnerable exchange option against T for initial intensities λ ( 0 ) = 0.5 , 1.5 , 2.5 .
Axioms 12 01105 g002
Figure 3. Price of vulnerable exchange option against σ 1 for maturities T = 0.5 , 1 , 1.5 .
Figure 3. Price of vulnerable exchange option against σ 1 for maturities T = 0.5 , 1 , 1.5 .
Axioms 12 01105 g003
Figure 4. Price of vulnerable exchange option against σ 3 for maturities T = 0.5 , 1 , 1.5 .
Figure 4. Price of vulnerable exchange option against σ 3 for maturities T = 0.5 , 1 , 1.5 .
Axioms 12 01105 g004
Figure 5. Price of vulnerable exchange option against ρ 12 for recovery rates w = 0.5 , 0.75 , 1 .
Figure 5. Price of vulnerable exchange option against ρ 12 for recovery rates w = 0.5 , 0.75 , 1 .
Axioms 12 01105 g005
Figure 6. Price of vulnerable exchange option against ρ 13 for recovery rates w = 0.5 , 0.75 , 1 .
Figure 6. Price of vulnerable exchange option against ρ 13 for recovery rates w = 0.5 , 0.75 , 1 .
Axioms 12 01105 g006
Figure 7. Price of vulnerable foreign equity option against T for recovery rates w = 0.5 , 0.75 , 1 .
Figure 7. Price of vulnerable foreign equity option against T for recovery rates w = 0.5 , 0.75 , 1 .
Axioms 12 01105 g007
Figure 8. Price of vulnerable foreign equity option against T for initial intensities λ ( 0 ) = 0.5 , 1.5 , 2.5 .
Figure 8. Price of vulnerable foreign equity option against T for initial intensities λ ( 0 ) = 0.5 , 1.5 , 2.5 .
Axioms 12 01105 g008
Figure 9. Price of vulnerable foreign equity option against σ 1 for maturities T = 0.5 , 1 , 1.5 .
Figure 9. Price of vulnerable foreign equity option against σ 1 for maturities T = 0.5 , 1 , 1.5 .
Axioms 12 01105 g009
Figure 10. Price of vulnerable foreign equity option against σ 3 for maturities T = 0.5 , 1 , 1.5 .
Figure 10. Price of vulnerable foreign equity option against σ 3 for maturities T = 0.5 , 1 , 1.5 .
Axioms 12 01105 g010
Figure 11. Price of vulnerable foreign equity option against ρ 12 for recovery rates w = 0.5 , 0.75 , 1 .
Figure 11. Price of vulnerable foreign equity option against ρ 12 for recovery rates w = 0.5 , 0.75 , 1 .
Axioms 12 01105 g011
Figure 12. Price of vulnerable foreign equity option against ρ 13 for recovery rates w = 0.5 , 0.75 , 1 .
Figure 12. Price of vulnerable foreign equity option against ρ 13 for recovery rates w = 0.5 , 0.75 , 1 .
Axioms 12 01105 g012
Table 1. Price of vulnerable exchange option. All experiments are conducted using the MATLAB.
Table 1. Price of vulnerable exchange option. All experiments are conducted using the MATLAB.
Vulnerable Exchange Option
S 1 ( 0 ) S 2 ( 0 ) w Price  V ( 0 ) Monte Carlo R-Err
100600.2527.76328.1851.52 × 10 2
0.531.84231.4961.08 × 10 2
0.7535.92135.9083.53 × 10 4
800.2513.71613.7381.67 × 10 3
0.515.81115.8016.01 × 10 4
0.7517.90517.9743.89 × 10 3
1000.251.5191.5451.71 × 10 2
0.51.8111.8391.54 × 10 2
0.752.1022.1177.37 × 10 3
Av. run time (s)0.03118.1211
Table 2. Price of vulnerable foreign equity option. All experiments are conducted using the MATLAB.
Table 2. Price of vulnerable foreign equity option. All experiments are conducted using the MATLAB.
Vulnerable Foreign Equity Option
S f ( 0 ) K w Price C ( 0 ) Monte CarloR-Err
100600.2537.21137.0673.87 × 10 3
0.542.12042.4547.93 × 10 3
0.7547.01946.9601.24 × 10 3
800.2524.48024.4182.53 × 10 3
0.527.66527.6774.39 × 10 4
0.7530.84930.8501.929 × 10 5
1000.2514.33214.3448.50 × 10 4
0.516.17916.1591.21 × 10 3
0.7518.02817.9842.41 × 10 3
Av. run time (s)0.03018.2574
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kim, G. A Simplified Approach to the Pricing of Vulnerable Options with Two Underlying Assets in an Intensity-Based Model. Axioms 2023, 12, 1105. https://doi.org/10.3390/axioms12121105

AMA Style

Kim G. A Simplified Approach to the Pricing of Vulnerable Options with Two Underlying Assets in an Intensity-Based Model. Axioms. 2023; 12(12):1105. https://doi.org/10.3390/axioms12121105

Chicago/Turabian Style

Kim, Geonwoo. 2023. "A Simplified Approach to the Pricing of Vulnerable Options with Two Underlying Assets in an Intensity-Based Model" Axioms 12, no. 12: 1105. https://doi.org/10.3390/axioms12121105

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop