Professional Documents
Culture Documents
Introduction
Assumption 2: Price-Taker
Assumption 4: No-Institutional
Restrictions
{ w1 , w2 ,L wn }
S. T .
(2.1)
E{U ( Z W0 Z j )}
W0
Where
is the random variable
n
Z 1 w j Z j
return per dollar on the optimal portfolio.
With the concavity assumptions on U, if
the variance-covariance matrix of the
return is nonsingular and an interior
solution exists, the the solution is
unique.
{ w1 , w2 ,L wn }
(2.4) {w ,w ,L w }
1
j 1, 2, L , n
w
can be rewritten as
1 j ( Z j R ) R
n
Where Z
If it is assumed that the variancecovariance matrix of the returns on
the risky securities is nonsingular
and an interior solution exits, then
the solution is unique.
A(W ) is
U (W )W
R (W )
A(W )W
U (W )
U (WC ) E{U (W )}
Proof: By hypothesis
Z Ze
E
{
U
(
ZW
)}
E
{
U
(
Z
W
)}
0
e
0
then trivially
.
If
But Z is a feasible portfolio andZ e is
Ze Z
an efficient portfolio. By contradiction,
Hence Z e Z s ( Z s Z p ) Z s s
So Z Z
e
Therefore ,for s 0, Z is riskier than Z
e
in the Rothschild-Stiglitz. This contradicts
that
is an efficient
portfolio.
Ze
Corollary 2.3: Let denote the set of n
securities and
denote
the same set of
that is replace with .
securities except
Z s , then all risk Z s
If
and
Z s Zinvestor
E{ s | Z }prefer
0
averse
would
to choose
s s
K
concave function such that Vfor
dZ eK
E{VK ( Z j R )} 0
j 1, 2, L , n
W0 1
VK E{V }
YK
Random variable
cov(VK , Z eK )
bpK
Definition: The measure of risk
portfolio P relative to efficient
Z eK
portfolio K with random variable
return
is defined by
of
b cov(YK , Z P )
K
p
and
E{V (Z
j
R )} E{VK ( Z P R )} 0
By a similar argument,
E{VK ( Z e R )} 0
Hence,
K
K
K
cov(VK , Z e ) E[VK ( Z e Z e )]
E[VK ( Z eK R R Z eK )]
K
K
E[VK ( Z e R )] E[VK ( R Z e )]
( R Z ) E[VK ]
K
e
and
cov(VK , Z P ) ( R Z P ) E{VK }
K
Z
By Corollary 2.1 e, R
. Therefore
Z p R b (Z R)
K
p
K
e
E{U ([ w* Z j (1 w* ) Z ]W0 )( Z j Z )}
Z j R b (Z R)
*
j
Z j
W0 E{U ( Z Z j ) }
Zj
Therefore (,Zif
, b ) lies above the riskreturn line in the
plane, then
the investor would prefer to increase
his holding in security j.
individual securities.
The ordering of securities by their
systematic risk relative to a given
efficient portfolio will be identical
with their ordering relative to any
other efficient portfolio.
Lemma 2.1:
K
b
portfolios, then for any p portfolio
p,
L bp
.
Proof : From Theorem 2.4
L
Ze R
b K
Ze R
K
L
b
K
p
Zp R
Z R
K
e
b
L
p
Zp R
Z eL R
R
b
Property 3: p
if and only if
p 0
for every efficient portfolio K.
Property 4: Let p and q denote any
two feasible portfolios and let K and L
K K
denote any two efficient portfolios.
bp bq
L L
if andbponly
bq if
b b b
K
p
K
L
L
p
b b b
K
q
K L
L q
cov(
Z
,
V
)
E
{
,
V
}
q
q
L
p
L
But
implies
for every efficient portfolio L.
n
Property 6: If a feasible
portfolio
K p has
bp 1 j b Kj
(1 ,L , n )
portfolio weight
,then
K
j
dZ e
dZ e
with strict
inequality holding
over some finite
Ze
probability measureZ of Z ,then
p
q
portfolio p is riskier than portfolio q
Ze
G p ( Z e ) E{Z p | Z e }
and
.
Where
,
is the
realized return on an efficient portfolio.
Proof:
bp bq cov[Y ( Z e ), Z p Z q ] E[Y ( Z e )( Z p Z q )]
E[Y ( Z e )( E{Z p | Z e } E{Z q | Z e })]
E[Y ( Z e )(Ge ( Z p ) Ge ( Z q ))
cov[Y ( Z e ), Ge ( Z p ) Ge ( Z q )]
Y (Ze )
Ge ( Z p ) Ge ( Z q )
is a strictly increasing function,
is a nondecreasing function, so
bp bq cov[Y ( Z e ), Ge ( Z p ) Ge ( Z q )] 0
Zq
Theorem 2.6: IfZ p and
denote the
returns on portfolio p and q
Ze
respectively and if, for each possible
dG
p (Ze )
value
of dGq ( Z e,) a pq
dZ e
dZ e
then
bp bq a pq
Z p Z q ,a
a pqconstant,
(Z e R)
and
.
Gehypothesis
( Z p ) Ge ( Z q ) a pq h
Proof: By
bp bq cov[Y ( Z e ), Ge ( Z p ) Ge ( Z q )]
cov[Y ( Z e ), a pq Z e h] a pq
Z p R bp ( Z e R ) R bq ( Z e R ) a pq ( Z e R ) Z q a pq ( Z e R )
dG p ( Z e )
(II)
dG p ( Z e )
(III)
dG p ( Z e )
(IV)
dZ e
dZ e
dZ e
R Z p Ze
, then
R Zp
, then
ap
, a constant, then
Z p R a p ( Z e R)
Ze
M
such funds
is a particularly
important spanning set.
When such spanning obtain, the
investors portfolio-selection problem
can be separated into two steps.
However, if the smallest funds can be
constructed only if the fund
managers know the preferences,
endowments, and probability beliefs
of each investor.
j 1,L
portfolio with
j fraction allocated to
security
j,
p
Zp
n
1 p 1 j to the security with
allocated
j allocated to
return ; and
a
Z with
R preturn
[b R (1
a )]
the riskless
R,
j
p security
j
1 j if
Z ,then
R
is chosen such that
is riskless security
and therefore
but
can be
chosen arbitrarily. So we get the
result.
, n;
( X 1 ,L A, Xnecessary
Theorem 2.10:
and
m , R)
{aij }for
sufficient condition
to
m
span
there exist number
Z j R is1 athat
ij ( X i R ) j 1, 2, L , n.
such that
Proof:
, then
M
M
1 ij 1 such thatZ j 1 ij X i .
m
Because
Mj 1 1 ij
XM R
m
Zand
substituting
1 aij ( X i R) j 1, 2,L , n. , we
j R
have
ij aij
m
i we
1,L pick
, m the Mjportfolio
1 1 ijweights
M
for
and Z j 1 ij X i , from
f
which it follows
that
.But
Z n ) be written as
every portfolio( Zin
1 ,L , can
a portfolio combination of
and R.
If ( X 1 ,L , X m , R) span
Proof:
If the rank of
, then X
are linearly independent. Moreover
m
m
hence, if the
rank
of
then
there
{aij }
Z j Z j 1 aij ( X i X i )
exist number
such that
m
j 1,L , n
Z j b j 1 aij X i
for
. Therefore
m
b j Z j 1 aij X i
where f
by Theorem 2.10
span
span
even if investors do not agree
1 ,L , X m , R )
on the joint distribution( Xof
m
, Hence
,
( 1)R
E
{
U
( Z )( Z j R)} 0
b
Proof: Let Z p Z j 1 i X i (1 1 i )R
m
Z p R [ Z j R 1 aij ( X i R )] by
j
m
construction ,
and hence cov(Z ,V ) 0
E{ j } 0
p
K
Therefore the systematic risk of
portfolio
p,
is zero. From Theorem 2.4
K
bp
Zp R
therefore
m
Z j R 1 aij ( X i R )
Z j R 1 aij ( X i R ) j
m
where
, then
E{ j | X 1 ,L , X m } 0
( X 1 ,L , X m , R )
span the set of efficient portfolios e .
Proof:
Z 1 w j Z j 1 w j [ R 1 aij ( X i R ) j ]
n
K
e
1 w j R 1 1 w j aij ( X i R ) 1 w Kj j
n
R 1 iK ( X i R) K
m
m
Where K n wK a
K
1 j ij
1 w K j
i
Construct portfolio
m K
m K
Z 1 i X i (1 1 i ) R
Thus K
K where
K
Ze Z
E{ | Z } 0
Hence, for K
, K is riskier than Z,
Ze
0
which contradicts that K is and
efficient portfolio. So Z e
. We get
K
0
the result.
j
0
every efficient portfolio. By Theorem
2.13, K
E{ j | X } 0
E{ j | X } 0
so
f
e
Since
is contained in
, any
e
a
(
X
ij i R) j
j
1
with
, we can determining the
and Z j Z j
aij Z j
( Z1 ,L , Z n ) contain no
Proposition 2.4: If
j
redundant securities,
denotes the
fraction of portfolio X allocated to
w j j, and
security
denotes the fraction
of any risk-averse investors optimal
1,L , n, j,
portfolio allocated toj security
then for every such risk-averse
investor w
j
*
k
j , k 1, 2,L , n
1 j
n
*
j
*
k
and
,then
* the
* portfolio with
( ,L n )
proportions 1
is called the Optimal
Combination of Risky Assets.
e
e
(
X
,
R
)
Proposition 2.5: If
span
, then
is a convex set.
Z e1 1 ( X R ) R
Z e2 2 ( X R ) R
Proof: Let
and 1 2 , Z Z e1 (1 ) Z e2. By
substitution, the expression for Z can be
rewritten as Z ( Z e1 R) R , where
.Therefore by Proposition
( 2 )(1 )
1
2.2, Z isan
efficient portfolio. It follow
by induction that for any integer k and
number
such that
and
0 i 1, i 1,L , k
i
is the return on an
k
k
k
i
i 1, Z 1 i Z e
1
efficient portfolio. Hence , e is a convex
set.
V
n
VR
Theorem 2.14: If
is a convex set,
and if the securities market is in
equilibrium, then a market portfolio
is an efficient portfolio.
j 0 Vj
1
k
W
, where
is
the
initial
wealth
0
K
n
K
of investor
1 W0 K, W0 1 V j VR
W
. Define
and
k 1,L K
W
K
k
M
w
j 1,L , n. of a
1 j. kBy j definition
Z j R portfolio
market
Multiplying
and summing
K byn k
K
K
w
(
Z
R
)
(
Z
R)
k 1
j
j
K
1
1
over j, it follows that
k
k
0
1 iM ( Z j R ) Z M R
n
ZM
because1 k 1, Z M 1 K Z k . Hence,
is a convex combination of the
e
market portfolio
is contained in
.
The efficiency of the market portfolio
provides a rigorous microeconomic
justification for the use of a
representative man to derive
equilibrium prices in aggregated
economic models.
K
R
because
,
. Hence
The market portfolio is the only risky
portfolio where the sign of its
equilibrium expected excess return can
always be predicted.
e
Returning to the special case where
is spanned by a single risky portfolio
and the riskless security, the market
portfolio is efficient. So the risky
spanning portfolio can always be
chosen to be the market portfolio.
e
(
Z
,
R
)
Theorem 2.15: If M
span , then
the equilibrium expected return on
security j can be Zwritten
as
j R
j (Z M R)
where
cov( Z j , Z M )
j
var( Z M )
cov( Z j , X )
a
, j 1,L , n.
j
Where
var(
X
)
denote the set
of portfolios
min
contained in f such that there exists
no other portfolio
in
with the same
f
a smaller variance.
expected return and
of and
denote the ijth element of
ij
min
. So all portfolios
in
with
expect return u, we need solutions
the problemmin n n
S .T Z ( )
Z ( R) R
ij
jR 0, j 1, 2L , n
If
then
and
R
Consider the case when
. The n
n conditions
first-order
0 1 j ij u ( Z i Rare
) i 1, 2,L , n
Multiplying by
1 1
i i (Zi R) 0
ij
n
u var[ Z ( )] ( R)
v (Zi R
) j 1,L , n
1 ijFrom
(a).
this solution we
j
u
prove
This
have
min with
R and call its
portfolio in
return X. Then we have
Z ( ) ( X R) R
Therefore a p ae
Thus
var( Z p ) a 2p var( X ) var( p ) a p var( X ) var( Z e )
Hence, Z e is contained
inmin
.
Theorem 2.18: If( Z1 ,L , Z n ) have a
joint normal probability distribution,
then there exists a portfolio with
e
return
( X , R)X suchthat
span
.
R)
Proof: By hypothesis
p ( Z1 ,L Z i ,L Z n ) p( Z i ,L Z1 ,L Z n )for each set
of given values. Therefore every risk
averse investor will choose
.
But
1 i
this is true for all i. Hence , all investor
will hold all risky securities in the same
relative proportions. Then
span e
( X , R)
V j 1
vik cov( X k ,V j )( X j R )
R
V j Z jV j 0
Proof: By linear independence
m
by Theorem 2.12
V j V j 0 [ R 1 aij ( X i R ) j ]
E{ j | X 1 ,L , X m } 0
where
. Take
expectations, we have
V j V j 0 [ R 1 aij ( X i R)]
m
Vj0
m
1
vik cov( X k ,V j )( X j R )
R
q
1
fk 0 V j 0 (I j )
and only
, where
is
Ai
Ai (Wif) 1 (ai bW ) 0
the absolute risk-aversion function for
investor
i u
in .
The End
thanks