Hedging the Treasury Lock
Mario Pucci
Banca IMI SpA, Milan, Italy.
DOI: 10.4236/jmf.2019.93018   PDF    HTML   XML   2,874 Downloads   8,709 Views   Citations

Abstract

The Treasury lock is a common pre-hedging derivative strategy the Street offers to their corporate clients. The paper provides a justification of the common practice of booking a short position in the Treasury lock as a forward contract on the underlying benchmark and a short position in the Then-Current Treasury lock as a forward contract on underlying benchmark rolled over the life of the contract.

Share and Cite:

Pucci, M. (2019) Hedging the Treasury Lock. Journal of Mathematical Finance, 9, 301-324. doi: 10.4236/jmf.2019.93018.

1. Introduction

1.1. Trade Description

In the Treasury lock transaction, termed T-Lock in the following, a Client willing to pre-hedge a prospected USD bond or loan issuance (Hedging Future Bond Issuance [1] , Valtchev [2] , LOCKING IN TREASURY RATES WITH TREASURY LOCK [3] ) will seek to enter a long T-Lock position with the Bank , with a given Expiry and written on a prescribed Security (most traditionally, a Treasury bond). Samples of T-Lock contracts within the ISDA Master Agreement framework can be found in [4] .

Being the driver of the fixed rate paid by the borrower the sum of its credit spread and the benchmark interest rate, the goal of such pre-hedge strategy is locking, when deemed economical, the interest rate component a few months ahead of the issue date. When considering a T-Lock as pre-hedge, the client is looking at the Treasury curve as the interest rates benchmark as opposed to looking at the swap rate curve. The choice of engaging in a T-Lock in lieu of a forward starting swap is mainly driven by the relative cost between the two strategies. An extensive illustration of the rationale for the use of T-Locks in comparison with other pre-hedging strategies can be found in Adam and Smith [5] .

Being long a T-Lock, at strike L (a.k.a. Locked Yield), means receiving at Expiry an amount equal to

N ( IRR L ) RiskFactor (1)

where:

• N is the notional

• IRR is the internal rate of return of the prescribed security, prevailing at Expiry

• RiskFactor is minus the change of the bond’s price corresponding to a unitary shift of its internal rate of return1

The financing nature of the transaction, for which the hedge is intended, sees Expiry normally, at most, around 6 months (up to 12 months in very unusual cases) and L normally chosen to be close to the IRR seen at trade date, whilst deemed satisfactory enough by the Client to be locked at this level.

The Security can either be a specific existing Treasury (and the trade termed T-Lock as such or Standard T-Lock) or a Treasury to be identified at Expiry, i.e., the then On-The-Run n-Year benchmark ( n = 1 , , 30 , usually n = 5 , 7 , 10 and the trade termed Then-Current-T-Lock).

In both cases, if at Expiry the Treasury yield has increased, the Client will receive a dollar amount compensating the extra cost they will be incurring in borrowing money at a rate linked to the Treasury curve. Vice versa, Treasury yield tapering will generate a loss to the Client which, in turn, is financially compensated by a lesser cost in the borrowing transaction—in other words, via a long T-Lock position the Client is synthetically shorting the Security to the Bank until Expiry.

Hedge accounting-wise, the T-Lock can be designated as hedging item in a cash flow hedge relationship with an anticipated transaction, i.e., the borrowing transaction (the hedged item). As such, up until expiry the T-Lock P & L will be set aside in OCI. Then, if at expiry the borrowing materializes the P & L arisen from the T-Lock will be released amortized during the life of bond/loan (partially) offsetting, on a running basis, the cash flows generated during the debt servicing. On the other hand, if the financial close for the hedged item is not reached, the full P & L is recycled as a cost/income entry at expiry (Ramirez [6] [7] [8] , In depth: Achieving hedge accounting in practice under IFRS 9 [7] , Hedge accounting under IFRS 9 [9] ).

1.2. Pricing the Standard T-Lock

To begin with, recall that, if P ( y ) is the price of the underlying Security as a function of the yield y, the internal rate of return IRR is by definition the yield such that

P mkt = P ( IRR ) (2)

with P mkt the (dirty) price of the bond.

The T-Lock prescribes the use of the compounded interest formula

P t ( y ) = i = 1 n 1 1 + α i y + c i = 1 n α i j = 1 i 1 1 + α j y , (3)

where c is the coupon rate of the bond, t 0 t is the issue date, t 1 < < t n the coupon payment dates (with t 1 > t 0 ) and α 1 , , α n the accrual factors. When t lies in a coupon period, i.e., t 0 < t t 1 , where t 0 is the last coupon payment date, the formula generalizes to

P t ( y ) = ( 1 1 + α 1 y ) t 1 t t 1 t 0 ( i = 2 n 1 1 + α i y + c i = 2 n α i j = 2 i 1 1 + α j y ) (4)

which is basically (3) multiplied by the stub discount.

Defining the risk factor as

RiskFactor t = P t ( y ) y | y = IRR t (5)

then the T-Lock payoff at t e is equal to

g = a RiskFactor t e ( IRR t e L ) (6)

where a = + 1 for a long (unitary) position and a = 1 for a short (unitary) position and RiskFactor, IRR are evaluated at t e .

From a different angle, at the first order,

g = a P t e ( y ) y | y = IRR t e ( IRR t e L ) (7)

~ a ( P t e ( L ) P t e ( IRR t e ) ) (8)

= a ( P t e ( L ) P t e mkt ) (9)

so the T-Lock measures the gap between the market price of the bond and its price with flows discounted at rate L.

We will show that (9) actually identifies a overhedge/underhedge of the T-Lock, respectively for a = 1 and a = 1 .

In an arbitrage-free valuation framework, the general pricing formula (Hunt and Kennedy ( [8] , Corollary 7.34) reads

v t = a D t t e E t t e [ RiskFactor t e ( IRR t e L ) ] (10)

where the expected value conditional on the information available at t is computed with respect the t e -forward measure and D t t e is the risk-free zero coupon bond seen at t with maturity t e . Due to the short term under consideration ( t e t 0.5 ) and the quality of the issuer (the US government), default risk is ignored.

Working out the value from the formula above requires quite a modelling and computational effort but, because IRR t e can be interpreted as the (stubbed) swap rate (on a bond yield curve) fixing at t e , if the uncertainty about RiskFactor t e is ignored, the former summand can be seen as the payoff of a CMS-let based on the bond curve, i.e., in other words, that of a Constant Maturity Treasury swaplet (see Pucci [10] for a treatment of Constant Maturity Treasury swaps under relaxed assumptions where default of the bond issuer is also considered). Yet this interpretation is misleading because freezing RiskFactor t e overshadows, and actually reverses, a key feature. Indeed, while a CMS-let has always positive convexity, the T-Lock has instead (at least locally near the Locked Yield) negative convexity as will be shown in Section 2.3 (page 16) Equation (43).

Given the complexity of addressing the modelling issues behind (10), let alone the availablity of a pricing function in the front office systems, a quick fix for the Bank to price and trade a short T-Lock position, in light of the typically short tenors clients need to cover, has been found in representing it as a plain forward contract. The following part of the paper analyzes the rationale of such operational practice.

1.3. Approximating a T-Lock as a Forward Contract

From (9), it can be seen that the payoff of a long Standard T-Lock struck at L may be approximated, at first order, by the t-value of a short forward contract struck at P t e ( L ) . Moreover, because the convexity of the T-Lock is negative in non-extreme scenarios away for the current yield as shown in Section 2.3, such forward contract constitutes a overhedge for the trade, as can be also observed from the joint plot in Figure 1, with respect to security price, for a 3-month T-Lock written on the 10Y benchmark as of 24 January 2019, i.e. Treasury, coupon 3.125%, maturity 25 November 2028 (ISIN US9128285M81). The spot internal rate of return is 2.717% ( P mkt = 104.1055 , cleanprice = 103.4922 ), the 3-months repo rate r repo = 2.46 % , forward internal rate of return IRR = 2.53 % ( forwarddirtyprice = 104.74 % , forwardcleanprice = 103.36 % ) and L = 2.717 % .

The identification of such overhedge suggests that a short position on the T-Lock may be proxied by a long position on the forward contract on the same underlying and struck at

K = P t e ( L ) (11)

~ ForwardPrice t ( t e ) + RiskFactor t e ( IRR t L ) (12)

where:

ForwardPrice t ( t e ) is the t e -forward price at t for delivery of the Security at time t e .

Figure 1. T-lock payoff and its overhedge.

RiskFactor t e is the risk factor of the Security as computed at time t e

IRR t is the t e -forward internal rate of return of the Security as computed at time t, i.e., the rate such that

P t e ( IRR t ) = ForwardPrice t ( t e ) (13)

at t < t e .

The forward contract proxy defined above may be regarded as a convenient representation of the Standard T-Lock in a practical situation where the T-Lock typology is not available in the trader’s front office risk management systems. In a later section we will analyse the risk generated by such approximation under standard mathematical assumptions that will make the treatment easier.

Because the security is not determined at inception, for the booking of the Then-Current-T-Lock a further issue arises. A natural extension is booking a Then-Current-T-Lock as a forward contract on the on-the-run benchmark as seen at inception and revise the booking each time a new on-the-run is taken over so that at t e the proxy contract will match the real payout to the Client. Thus, for the purpose of investigating the pricing of a Then-Current-T-Lock, we turn our attention to the effect of replacing the security in the proxy forward contract.

Switching underlying security will lead to a new strike

K ^ = P ^ t e ( L ) (14)

with a strike gap, at first order,

StrikeGap = K ^ K (15)

= F ^ orwardPrice t ( t e ) ForwardPrice t ( t e ) + R ^ iskFactor t e ( I ^ RR t L ) RiskFactor t e ( IRR t L ) (16)

We can see that, ignoring the jump in RiskFactor, a reasonable assumption if the switch is actually a benchmark replacement within the same tenor (e.g. 10Y) or within close-”in-the-run” bonds, the strike gap reads

StrikeGap = F ^ orwardPrice t ( t e ) ForwardPrice t ( t e ) + RiskFactor t e ( I ^ RR t IRR t ) (17)

The intuition is that the StrikeGap will generally be small if the switch is within close-”on-the-run” bonds but we will focus on this issue later in Section 3.1 turning our attention to a more meaningful measure, the P & L of the proxy forward contract.

From now on we will use Euler’s notation

D x k [ f ( x ) ] k f ( x ) x k

for high-order differentials.

2. Hedging the Standard T-Lock

In the current section we will look at the greeks (Hull [11] , Chapter 19) generated by a standard T-Lock position, bearing in mind though that the same results apply to the Then-Current-T-Lock in-between roll events. The first two subsections are dedicated to the delta and gamma while in the third we touch on the practical implementation of the hedging strategy via the repo trade.

For ease of computation, we will assume the bond price to have the following functional form (Hull [11] , Section 4.8, page 91], Taleb [12] , page 184) with respect to the yield

P t ( y ) = e ( t n t ) y + c t i > t n α i e ( t i t ) y (18)

where c is the coupon rate of the bond and α i its accrual factors

Under this assumption, with R the internal rate of return,

g ( R ) = a D y [ P ] | y = R ( R L ) (19)

~ a ( P ( L ) P ( R ) ) (20)

= a ( e ( t n t e ) L + c t i > t e n α i e ( t i t e ) L P mkt ) (21)

Also, the first, second and third derivative of P ( y ) are easily computed, respectively, as

D y [ P t ] = ( t n t ) e ( t n t ) y c t i > t n α i ( t i t ) e ( t i t ) y (22)

which is a negative quantity (or null in limiting cases),

D y 2 [ P t ] = ( t n t ) 2 e ( t n t ) y + c t i > t n α i ( t i t ) 2 e ( t i t ) y , (23)

i.e., the so-called convexity of the bond (Taleb [12] , page 184)

1 P D y 2 [ P ] (24)

which is positive, and finally,

D y 3 [ P t ] = ( t n t ) 3 e ( t n t ) y c t i > t n α i ( t i t ) 3 e ( t i t ) y (25)

which is negative.

As a consequence, the T-Lock payoff as a function of the yield

g ( y ) = a D y [ P ] ( y L ) (26)

has first and second derivative, respectively,

D y [ g ] = a y [ D y [ P ] ( y L ) ] (27)

= a [ D y 2 [ P ] ( y L ) + D y [ P ] ] (28)

and

D y 2 [ g ] = a [ D y 3 [ P ] ( y L ) + 2 D y 2 [ P ] ] (29)

2.1. The Overhedge Error

We’re now in the position of being able to evaluate the accuracy of approximation (9) which, looking at it backward, boils down to substituting P with its first order Taylor polynomial. The approximation is a (global) overhedge because the remainder

R 1 ( y ) = P ( y ) P ( L ) D y 1 [ P ] ( y L ) (30)

has a unique stationary point at y = L which is also a maximum, since the second derivative of R 1 ( y ) is negative.

Moreover, recalling the Remainder Estimation Theorem (see Apostol [13] ) which states that, for a differential function P and all y in an interval I containing a point a, the error in using the Taylor polynomial of degree n to approximate P satisfies

| R n ( y ) | M | y a | n + 1 ( n + 1 ) ! (31)

where M is the maximum value of | D y n + 1 [ P ] | in the interval I, for n = 1 , a = L we have that

| R 1 ( y ) | M | y L | 2 2 (32)

where, because the third derivative of P (that is, the first derivative of D y 2 [ P ] ), is negative, M = D y 2 [ P ] ( min I ) is taken to be the value at the left-most point of the interval which is roughly (taking the extreme case y = 0 )

( t n t ) 2 + c t i > t n ( t i t ) 2 α i (33)

As an illustration, for the 10Y benchmark roughly

M ~ 150 (34)

if we exclude the possibility of negative yields, an event that has never occurred (minimum yield for the 1Y Constant Maturity Treasury is 0.08% attained in September 2011). If we assume a 30% yield change, which is an upper bound for a short term such as 6 months for the 10Y benchmark, the dollar error amounts to 0.005% on 100% of notional.

2.2. Delta of the T-Lock

Thanks to the smoothness of P ( y ) the greeks can be obtained by interchanging expected value and differentiation so for an analysis of delta and gamma of the T-Lock we will just look at the first and second derivatives of the payoff. From (28), when a = 1 , for | y L | small enough (which is a reasonable assumption with short term expiries under typical business conditions),

D y [ g ] > 0 (35)

so that the delta of the (long) T-Lock is negative

D P [ g ] = D y [ g ] D P [ y ] < 0 (36)

which is consistent with the previous comment about T-Lock being equivalent to shorting the security.

More precisely, resolving (28) for L, when a = 1

D y [ g ] > 0 and Δ < 0 iff L > y + D y [ P ] D y 2 [ P ] (37)

hence, because of the sign of the derivatives, we have a sharp lower bound smaller than y.

Turning things around

D y [ g ] > 0 and Δ < 0 iff y L < D y [ P ] D y 2 [ P ] > 0 (38)

so, at least intuitively because the RHS of the inequality is also a function of y, as long as y does not overshoot L, the delta remains negative.

Taking into account the discounting, a trader, after booking the T-Lock position via proxy forward as argued in Section 1.3, may delta hedge a short position via shorting an amount of bond equal to

Δ ~ D t t e D P [ g ] (39)

and continuously re-adjust the hedge as market and time move. So the question is how trading the delta will affect the bank’s P & L, so we turn our attention to the gamma.

2.3. Gamma of the T-Lock

In the following we investigate effectiveness of the replication via Δ -hedging of a T-Lock. From section (A) we have

D P 2 [ g ] = D y 2 [ g ] [ D P [ y ] ] 2 + D y [ g ] D P 2 [ y ] (40)

= D y 2 [ g ] [ 1 / D y [ P ] ] 2 D y [ g ] [ D y 2 [ P ] / ( D y [ P ] ) 3 ] (41)

From (28) and (29), the gamma of the T-Lock locally, i.e., | y L | small enough, satifies

D P 2 [ g ] ~ a [ 2 D y 2 [ P ] ] [ 1 / D y [ P ] ] 2 + a [ D y [ P ] ] [ D y 2 [ P ] / ( D y [ P ] ) 3 ]

= a [ 2 D y 2 [ P ] ] [ 1 / D y [ P ] ] 2 + a [ D y 2 [ P ] / ( D y [ P ] ) 2 ] (42)

= a [ D y 2 [ P ] ] [ 1 / D y [ P ] ] 2 (43)

So, when a = 1 , with | y L | small enough, the Gamma is negative (i.e., the convexity of the T-Lock is negative), so dynamically replicating a T-Lock will, (not so) locally around L, generate rebalancing profits. In other words, dynamically replicating a long T-Lock via (10) and its delta assuming no volatility will be a overhedge, hence generating a non-negative P & L for the trader (see Carr and Madan [14] , Equation (9)). More precisely, using (41), we see that

Γ < 0 iff ( y L ) [ ( D y 2 [ P ] ) 2 D y [ P ] D y 3 [ P ] ] > D y [ P ] D y 2 [ P ] (44)

The latter factor satisfies

( D y 2 [ P ] ) 2 D y [ P ] D y 3 [ P ] < 0 (45)

Proof. Thanks to (87) (Appendix C), noting that the leading summands ( D y 2 [ P ( 0 ) ] ) 2 and D y 1 [ P ( 0 ) ] D y 3 [ P ( 0 ) ] cancel each other, we see that

( D y 2 [ P ] ) 2 D y [ P ] D y 3 [ P ] = ( D y 2 [ P ( 0 ) ] + c D y 2 [ A ] ) 2 + ( D y [ P ( 0 ) ] + c D y [ A ] ) ( D y 3 [ P ( 0 ) ] + c D y 3 [ A ] ) (46)

= c [ 2 D y 2 [ P ( 0 ) ] D y 2 [ A ] D y 1 [ P ( 0 ) ] D y 3 [ A ] D y 3 [ P ( 0 ) ] D y 1 [ A ] ] + c 2 [ ( D y 2 [ A t ] ) 2 D y 1 [ A t ] D y 3 [ A t ] ] < 0 (47)

This is because both summands are negative (from (88) and (89)) and the fact that c > 0 .

Finally, (44) and (45) yield

Γ < 0 iff y L < D y [ P ] D y 2 [ P ] ( D y 2 [ P ] ) 2 D y [ P ] D y 3 [ P ] > 0 (48)

so, by the same argument shown above, as long as y does not overshoot L, the gamma remains negative as well. In Figure 2 we have plotted the T-Lock payoff along with its first derivative, i.e., its delta at expiry, with respect to security price. Also, notice in Figure 3 how both the delta and the gamma (here only reported at expiry for illustration) turn positive, as predicted by (37) and (48), in extreme high rate scenarios.

Figure 2. T-lock delta.

Figure 3. T-lock gamma.

2.4. Replication of the T-Lock via Repo

We have already investigated the impact of delta hedging a short position in the T-Lock. The reader may have already noticed that what we have actually been looking at is the delta and gamma of the T-Lock with respect to the forward price of the bond, in other words the delta and gamma with respect to the forward contract as main security to be used in the replication strategy. This is actually appropriate since the shorting-the-bond requires to hedge the short position in the T-Lock can generally be accomplished only via a (reverse) repo trade and the delta (36), in terms of hedge ratio, is to be interpreted as the size of the corresponding repo to trade (for an extensive description of the workings of repo business see [15] ). Indeed, in Equation (13), but also in the exact approach (10), the repo rate comes into play because (see Section D).

ForwardPrice t ( t e ) = P t mkt ( 1 + r t t e repo ( t e t ) ) c t < t i t e α i ( 1 + r t i t e repo ( t e t i ) ) (49)

where r u v repo is the (simply compounded) forward repo rate for the period u v . We assume a zero haircut, which is a good approximation given the credit quality of the Treasury.

Due to (49), (13) and (22), since by the chain rule and assuming a flat short-term repo curve,

g ( r repo ) r repo = g ( y ) y | y = R t y ( P ) P | P = ForwardPrice t ForwardPrice ( r repo ) r repo (50)

the sensitivity of the T-Lock to the repo rate is negative, so the higher the repo rate the cheaper is the long position.

The typical bid-ask spread for a repo transaction is 5 basis points. For instance, as of 24 Jan 2019, we report the repo curve in Table 1 for GC (General Collateral) which shows positive repo rates for all tenors but, since the security is normally chosen to be a benchmark Treasury, a specialness (negative) premium may apply so the repo rate may be significantly lower, increasing the fair value of the T-Lock position. Historically, in times of liquidity squeeze, the specialness has seen the repo rate on the 10Y Treasury momentarily drop into the negative axis at minus three hundred basis points (see Leong [16] ).

In passing, it’s also interesting to note that given the current regime in the EUR market, being repo rates in the negative space, a hypothetical T-Lock written on a European treasury bond would be more expensive relative to a traditional trade on a US Treasury.

3. Trading the Then-Current-T-Lock

As already represented in Section 1.3, in a Then-Current-T-Lock the underlying security is determined at t e as the currently on-the-run benchmark. In the special and idealized case where t e is coincides with the issue date of the new benchmark, the value at t < t e of a long(short) Then-Current-T-Lock struck at L is proxied by a short (long) forward contract struck at

K = 1 + RiskFactor t e ( R t L ) (51)

where

RiskFactor t e is that of the Proxy Security as computed at time t e

Ÿ R t is the t e -forward internal rate of return of the Proxy Security as computed at time t (see Equation (13))

Table 1. Repo rates for the 10Y as of 24 Jan 2019.

• Proxy Security is a traded security chosen in lieu of the yet unknown underlying, e.g., the on-the-run security as determined at time t.

At t roll the new security must be selected and a new strike populated, the strike gap being

StrikeGap = R ^ iskFactor t e ( R ^ t roll L ) RiskFactor t e ( R t roll L ) = ( R ^ iskFactor t e RiskFactor t e ) ( R ^ t roll L ) RiskFactor t e ( R t roll R ^ t roll ) (52)

In practice such a coincidence does not hold and because at inception the underlying security may be unknown and definitely not listed or identifiable in the position keeping system, the trader, via the procedure described in Section 1.3, may book the trade approximating the Then-Current-T-Lock as a Standard T-Lock with underlying security specified as the security that is on-the-run at trade inception. At each benchmark roll date t roll , the booking is revised with the on-the-run at t roll benchmark, generating a switch P & L, the roll P & L.

We will show in the approximated derivation (66) that the roll P & L must be small in special conditions. This is all the more the case at a on-the-run succession, i.e., when the security rolls from the previous on-the-run benchmark to the new on-the-run issue. Indeed, the new on-the-run will normally have an internal rate of return in line with the existing level and, if we also take into account that because of the high frequency of issue (e.g. trimestral for the 10Y) the on-the-run succession normally brings a new coupon that is very close to that of the previous on-the-run, the roll P & L is potentially even less significant.

3.1. The Roll P & L

In this section we will present an approximated formula for the Roll P & L that will allow us, in the conclusive part of the paper, to compute statistical estimates.

To keep things simple, assume the security is switched from a bond with coupon rate c to a bond with coupon rate c ^ , all other details remaining equal. The net present value changes from

π t = D t t e [ K F t ( t e ) ] (53)

to

π ^ t = D t t e [ K ^ F ^ t ( t e ) ] (54)

The P & L due to the switch is

π ^ t π t = D t t e [ ( K ^ K ) ( F ^ t ( t e ) F t ( t e ) ) ] (55)

with K = P t e ( L ) , K ^ = P ^ t e ( L ) and

P ^ t ( y ) = e ( t n t ) y + c ^ t i > t n α i e ( t i t ) y (56)

so that

K ^ K = ( c ^ c ) t i > t e n α i e ( t i t e ) L (57)

Now, by definition

F t ( t e ) = P t e ( R t ) (58)

and

F ^ t ( t e ) = P ^ t e ( R ^ t ) (59)

therefore

F ^ t ( t e ) F t ( t e ) = P ^ t e ( R ^ t ) P t e ( R t ) (60)

= [ P ^ t e ( R ^ t ) P t e ( R ^ t ) ] + [ P t e ( R ^ t ) P t e ( R t ) ] (61)

= ( c ^ c ) t i > t e n α i e ( t i t e ) R ^ t + [ P t e ( R ^ t ) P t e ( R t ) ] (62)

where, when t n t e is small, i.e., the bond at t e is close to the bond’s maturity, the last summand

P t e ( R ^ t ) P t e ( R t ) = e ( t n t e ) R ^ t e ( t n t e ) R t (63)

+ c t i > t e n α i ( e ( t i t e ) R ^ t e ( t i t e ) R t ) (64)

can be approximated, at first order, as

P t e ( R ^ t ) P t e ( R t ) ~ [ ( t n t e ) + c t i > t e n α i ( t i t e ) ] ( R t R ^ t ) (65)

so that the (forward) P & L satisfies

π ^ t π t D t t e = ( c ^ c ) [ t i > t e n α i e ( t i t e ) L t i > t e n α i e ( t i t e ) R ^ t ] (66)

[ P t e ( R ^ t ) P t e ( R t ) ] (67)

~ ( c ^ c ) [ t i > t e n α i e ( t i t e ) L t i > t e n α i e ( t i t e ) R ^ t ] (68)

+ ( R ^ t R t ) [ ( t n t e ) + c t i > t e n α i ( t i t e ) ] (69)

~ ( c ^ c ) ( R ^ t L ) t i > t e n α i ( t i t e ) (70)

+ ( R ^ t R t ) [ ( t n t e ) + c t i > t e n α i ( t i t e ) ] (71)

Similarly, it can be shown that

π ^ t π t D t t e ~ ( c c ^ ) ( L R t ) t i > t e n α i ( t i t e ) (72)

+ ( R ^ t R t ) [ ( t n t e ) + c ^ t i > t e n α i ( t i t e ) ] (73)

Therefore, in as a much as

t n t e is small

• L is close to R t

• there is no significant gap in the internal rate of return between the two securities

The security change generates little P & L in the forward contract position.

More generally, in order to allow for longer tenor benchmarks, having defined

A t ( y ) = t i > t n α i e ( t i t ) y , (74)

the removal of the restriction that t n t e is small leaves us with

π ^ t π t D t t e = ( c ^ c ) [ A t e ( L ) A t e ( R ^ t ) ] + [ P t e ( R t ) P t e ( R ^ t ) ] ~ ( c ^ c ) D y [ A t e ] | y = R ^ t ( L R ^ t ) + D y [ P t e ] | y = R ^ t ( R t R ^ t ) (75)

where

D y [ A t ] = t i > t n α i ( t i t ) e ( t i t ) y , (76)

Having (75) at hand, we are now able to assess the impact of switching the underlying security of the contract at the issue of a new benchmark. To this aim, in the next section we will look at a stylized description of how a new benchmark is constructed, where we ignore the change in the tenor structure of the bond, only focusing on the determination of a new par coupon rate so that the new benchmark is priced at par.

3.2. Forming the New Benchmark

Treasury benchmarks are periodically reissued by means of an auction mechanism. The US government yearly publishes an auction calendar ( [17] ).

The roll process is described in the graph (Figure 4), where the bracketed exponent on P ( ) is a placeholder for the coupon rate, a process that runs as follows:

• First the internal rate of return R t of the current benchmark is evaluated

• The prospected coupon c ^ of the new benchmark is located so that the new issue is at par, i.e., P t ( c ^ ) ( R t ) = 1

• Then the auction will filter through market appetite determining a final coupon rate c ^

• Finally, the new internal rate of return R ^ t is implied from P t ( c ^ ) ( R ^ t ) .

Figure 4. The auction process.

It’s clear that if the market confirms the new issue “at the old level” we land on R ^ t = R t so, as can be elicited from Equation (75), minimizing the roll P & L.

Because the above assumptions are normally not verified, to estimate the roll risk in practice, in Section 4.3 we will resort to a statistical analysis based on the history of auctions.

4. Statistical Analysis

Looking at market data from January 2008 for the 2Y, 5Y and 10Y Treasury benchmark (see Figures 5-7), we have the following summary statistics in Table 2. The summary shows the average, the standard deviation and the two classic percentiles of the sample. Note that, in order to encompass non-standard scenarios, the data set includes the 2007 crisis.

Figure 5. Treasury 2Y: Internal rate of return and risk factor.

Figure 6. Treasury 5Y: Internal rate of return and risk factor.

Figure 7. Treasury 10Y: Internal rate of return and risk factor.

Table 2. Treasuries: Internal rate of return statistics.

In the following sections we will use such historical data to verify in practice our guess regarding the efficacy of managing the risk generated by short T-Lock positions by booking them as forward contracts. The statistical anaysis is aimed at estimating:

1) The overhedge error (Section 4.1) due to the payoff approximation illustrated in Section 1.3.

2) The gamma negativity bounds (Section 4.2), that is the stability of negative sign of the gamma across market scenarios.

3) The roll risk (Section 4.3) due to the P & L of the Bank generated during the life of the contract by the mispecification and consequent revision of the security underlying the sold T-Lock.

4.1. Overhedge Error Estimation

We first look at the overhedge error (9) by extracting a historical estimation for (32). Considering a 6M T-Lock on the 10Y benchmark, we find (Table 3) that | y L | 2 is on average 0.004% and at most (i.e. at 0.05% percentile) 0.0206%, and consequently (also recalling the estimate (34)), from (32) we have that the overhedge error is on average 0.32% of the notional and most likely bounded above by 1.55%, an event that materialized during the 2011 crisis that led to US

Table 3. Overhedge error.

downgrade by the major rating agencies (Brandimarte and Bases [18] ). For the estimations in Table 3 we have assumed to be in a typical business case where the locked yield L to be set at the IRR seen at inception t, so that y L is taken to be the 6-month performance R t + 6M R t of the IRR. For ease of reading we omit reporting estimates for other cases, such as 3M, yielding similar results.

4.2. Negative Gamma Bounds

Considering the same historical window, in the following we have considered a daily time series of the upper bound (48) and reported in Tables 4-6 the relevant statistics. A move of such magnitude within the typical features (expiry and at-the-money strike) of a T-Lock trade is highly unlikely and has never been recorded being outside ordinary levels of core governative yields.

4.3. Assessment of the Roll Risk

We have considered roll data from January 2008 for the 10Y Treasury benchmark. It is a very large time window which is chosen to encompass extreme historical scenarios.

From Table 7, we see that, for the 10Y, the IRR change at roll dates tends to be higher than the IRR change on the whole sample. Consequently we expect P & L change an unfavourable on the T-Lock position at each benchmark switch.

To further the analysis, in the following we will look at the statistics regarding the actual P & L. Ignoring the discounting effect, which is a reasonable approximation by virtue of the short time horizon under scrutiny, we have considered a time series of (75) and computed the relevant percentiles and value-at-risk for the (forward) net present value of the forward contract for 1M, 3M, 6M, 12M expiries and 3% locked yield. From the point of view of the trader selling the T-Lock on the 10Y (Table 8): the average roll generates for the trader roughly a −0.105% of the notional loss which peaks at −1.04% at the 95-th percentile for the shortest expiry.

For the 5Y benchmark, data are more comfortable, showing a lower roll risk, both in the average and in the 95-percentile for all expiries (Table 9). For the 2Y benchmark, data are generally showing a lower roll risk, both in the average and in the 95-percentile for all expiries. We have also detected a robust insensitivity of the reported computation results to the choice of strike, so we here only focus on an indicative 3% level (Table 10).

Table 4. Upper bound for negative gamma for the 10Y.

Table 5. Upper bound for negative gamma for the 5Y.

Table 6. Upper bound for negative gamma for the 2Y.

Table 7. Treasury 10Y: Yield change.

Table 8. Roll P & L for the 10Y.

Table 9. Roll P & L for the 5Y.

Table 10. Roll P & L for the 2Y.

5. Valuation Adjustments

Just as any derivative, a position on the T-Lock carries counterparty risk (see Gregory [19] , Morini and Prampolini [20] ). As such, CVA and DVA should also be included in the book value of the trade and in the final price to the client.

The calculation of such adjustments is a run-of-the-mill task for a bank dealing in derivatives but, whereas it may be argued that short-term trades generally attract low counterparty risk, we also notice that a T-Lock short position is subject to systemic wrong-way counterparty risk. Indeed, on a distressed scenario where the corporate market is undermined, a flight-to-quality ensuing regime may concurrently lower the Treasury spreads increasing the Bank exposure to the Client. It is difficult though to envision a situation where the corporate sector suffers and the banks thrive so it may be argued that the adverse move of the CVA may be offset by a specular increase in the DVA component, lowering the potential impact of wrong-way-risk on the bank’s balance sheet.

As for the FVA (Andresen, Duffie and Song [21] , Morini and Prampolini [20] , Albanese and Andreasen [22] ), having noticed that the natural hedge is a repo trade, a funding cost arises from the cash leg of the hedge the Bank is posting to borrow the security or from the collateralization mechanism if the repo is CSA-assisted or cleared.

From the point of view of the dealer bank, capital costs (KVA) are also minimal allowing for a interesting profitability of T-Locks although, by the same token, the trade will not afford high mark-ups.

Turning our attention to the proxy booking proposed, the overhedge nature the approximation will underestimate the exposure generated by the short T-Lock position, therefore underestimating the “contra” contribution (see Albanese and Andreasen [22] ) of counterparty risk, funding value adjustments and KVA. Nevertheless the short-term nature of the transaction under investigation will mitigate the consequences of such underestimation considering that XVA’s for at-the-money trades are normally priced at a fraction of the carried exposure.

6. Conclusions

We have shown that a long Standard T-Lock position has negative convexity, so the trader may safely (over-)replicate it by booking a linear trade, a proxy forward contract, which is a natural overhedge. In other words, a trader willing to sell a Standard T-Lock position can book the trade as a forward contract written on the same security and with the same expiry as that of the T-Lock contract. Being an overhedge, the forward contract will generate a conservative representation of bank’s P & L associated to the position. The negative convexity will ensure that delta hedging the positions will generate gamma profits. This comes in handy when the front office risk management system does not feature the T-Lock as a typology.

Moreover, we have shown that a T-Lock position is historically little sensitive to the benchmark roll. Therefore, a trader may book a Then-Current-T-Lock trade as a proxy forward contract written on the security that is on-the-run benchmark at inception and remain confident that revising the booking at roll dates to update the underlying will statistically generate a negligible P & L, while again, thanks to the negative convexity of the T-Lock, delta hedging the position in between roll dates will generate gamma profits.

Appendix

A. Simple Math

Below we recall simple facts about first and second derivatives of differentiable functions. If f and g are differentiable then

( f g ) = f g (77)

and

( f g ) = ( f g ) ( g ) 2 + ( f g ) g (78)

As a consequence, if f invertible and differentiable then

( f 1 ) = 1 f (79)

and

( f 1 ) = f ( f ) 3 (80)

B. Key Derivatives

Noting that

P t ( c ) ( y ) = P t ( 0 ) ( y ) + c A t ( y ) , (81)

and

D y [ P t ( c ) ] = ( t n t ) e ( t n t ) y + c D y [ A t ] (82)

= D y [ P t ( 0 ) ] + c D y [ A t ] (83)

we can work out that

D y k [ P ( c ) ] = ( t t n ) k e ( t n t ) y + c t i > t n α i ( t t i ) k e ( t i t ) y (84)

D y k [ A t ] = t i > t n α i ( t t i ) k e ( t i t ) y , (85)

and

D y k [ P t ( c ) ] = ( t t n ) k e ( t n t ) y + c D y k [ A t ] (86)

= D y k [ P t ( 0 ) ] + c D y k [ A t ] (87)

C. More Math

Setting q i = ( t t i ) , Q i = α i e ( t i t ) y we see that

D y 1 [ P t ( 0 ) ] D y 3 [ A t ] + D y 3 [ P t ( 0 ) ] D y 1 [ A t ] 2 D y 2 [ P t ( 0 ) ] D y 2 [ A t ] 0 (88)

because

q n Q n t i > t q i 3 Q i + q n 3 Q n t i > t q i Q i 2 q n 2 Q n t i > t q i Q i = t i > t Q i Q n q i q n [ q i q n ] 2

is a clearly non-negative.

Moreover,

( D y 2 [ A t ] ) 2 D y 1 [ A t ] D y 3 [ A t ] < 0 (89)

because

[ t i > t q i Q i ] [ t i > t q i 3 Q i ] [ t i > t q i 2 Q i ] 2 = t i > t , t j > t Q i Q j [ q i q j ] 2 > 0 (90)

Indeed,

t i > t q i Q i t i > t q i 3 Q i [ t i > t q i 2 Q i ] 2 = i j q i q j 3 Q i Q j i j q i 2 q j 2 Q i Q j (91)

= i < j ( q i q j 3 + q i 3 q j ) Q i Q j i < j 2 q i 2 q j 2 Q i Q j

= i < j ( q i q j 3 + q i 3 q j ) Q i Q j 2 q i 2 q j 2 Q i Q j (92)

= i < j q i q j ( q i 2 + q j 2 ) Q i Q j 2 q i 2 q j 2 Q i Q j (93)

= i < j q i q j Q i Q j ( q i q j ) 2 (94)

is clearly positive2.

D. The Forward Price and the Repo

A coupon security/dividend security X is a security that pays a discrete stream of cashflows c i , each at time T i . It could be either a stock or a coupon bond.

If h cut is the haircut, the T-forward price of the security, paying a dividend c i at time T i , i = 1 , , n , is

ForwardPrice t ( T ) = X t [ ( 1 h cut ) e r repo ( T t ) + h cut e r fun ( T t ) ] (95)

t < T i T c i e ( h cut r fun + ( 1 h cut ) r repo ) ( T T i ) (96)

where r repo is the repo rate, r fun is the funding rate for unsecured borrowing. Both rates are assumed continuously compounded and flat for ease of illustration.

Assuming first h cut = 0 , in a repo trade with dividends/coupons with maturity T the trader

1) Borrows in the time interval [ T 0 , T 1 ] an amount X t of cash at rate r repo until T, with which s/he buys bond from the market and immediately transfers it to the repo counterparty.

2) Then for each on each bond schedule node, receive coupon and decrease the borrowed outstanding in the repo by.

3) At T, s/he gets the bond back, sells it in the market and returns all outstanding borrowed cash to the repo counterparty.

We describe our position by the quantity which represent the cash owned (plus sign)/owed (minus sign) to the repo counterparty, the repo account.

At start on the repo trade our repo account amounts to. At each coupon payment we decrease the outstanding by the coupon amount. For instance, at the repo account becomes

(97)

Then, recursively, for, at

(98)

and finally from to T it accrues to the terminal value

(99)

Working out the recursion we see the repo cash account grows as

Lemma 1. For all,

(100)

So at maturity the strategy is worth

(101)

In other words, the trader enters at t a contract at zero cost and ends up, via the repo strategy, at T with a in exchange for, which means, by definition, that is the T-forward price of the security

(102)

If, on the other hand, due to market illiquidity the repo trade is not viable for the given security, the formula still holds but with in lieu of

(103)

The two cases (102), (103) are the extreme cases:

: all funding is secured since based on the repo trade

: there is no repo trade, all funding is unsecured.

Finally, for a generic haircut we obtain a “blend” formula:

(104)

(105)

which may be derived from a strategy where coupon payments are distributed between repo redemption and unsecured funding redemption according to the their relative weights.

NOTES

*This paper expresses the views of its author and does not represent the opinion of Banca IMI SpA, which is not responsible for any use that may be made of its contents. Special thanks to Valeria Penn, Stefano De Nuccio, Luca Dominici, Luca Lovati, Luca Finicelli, Silvia Frasson and Emma Cardamone.

1In other words, RiskFactor = 10000 DV01 , where DV01 represents the price change corresponding to a basis point positive shift in the bond’s yield.

2For ease of reading, in the above summations we have omitted typing the conditions t i > t and t j > t .

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] The PNC Financial Services Group (2019) Hedging Future Bond Issuance.
https://www.pnc.com/en/corporate-and-institutional/financing/lending-options/pnc-real-estate/News-Articles-and-Transaction-Spotlights/REArticles/how-to-hedge-future-bond-issuance.html
[2] Valtchev, Y. (2015) Corporate Treasury Risk Management.
http://financedocbox.com/Options/75981452-Corporate-treasury-risk-management.html
[3] Bank of Montreal (1997) Locking in Treasury Rates with Treasury Locks.
https://www.bmocm.com/common/scripts/getfile.aspx?fileID=67
[4] US Securities and Exchange Commission (2005) Eight Treasury Rate Lock Agreements.
https://www.sec.gov/Archives/edgar/data/31978/000119312505099245/dex1002.htm
[5] Adams, J. and Smith, D.J. (2011) Pre-Issuance Hedging of Fixed-Rate Debt. Journal of Applied Corporate Finance, 23, 102-112.
https://doi.org/10.1111/j.1745-6622.2011.00356.x
[6] Ramirez, J. (2015) Accounting for Derivatives: Advanced Hedging under IFRS. Wiley, Hoboken.
https://doi.org/10.1002/9781119065876
[7] PWC (2017) In Depth: Achieving Hedge Accounting in Practice under IFRS 9.
[8] Hunt, P.J. and Kennedy, J.E. (2004) Financial Derivatives in Theory and Practice. Wiley Series in Probability and Statistics, Hoboken.
https://doi.org/10.1002/0470863617
[9] EY (2014) Hedge Accounting under IFRS 9.
[10] Pucci, M. (2014) Constant Maturity Treasury Convexity Correction. International Journal of Theoretical and Applied Finance, 17, Article ID: 1450051.
https://doi.org/10.1142/S0219024914500514
[11] Hull, J.C. (2015) Options, Futures and Other Derivatives. Ninth Edition, Prentice Hall,Upper Saddle River.
[12] Taleb, N. (1996) Dynamic Hedging. John Wiley & Sons, Hoboken.
[13] Tom, A. (1967) Calculus. Wiley, Hoboken.
[14] Carr, P. and Madan, D. (2002) Towards a Theory of Volatility Trading.
http://pricing.online.fr/docs/TradingVolatilityStrat.pdf
[15] ICMA Group (2015) Frequently Asked Questions on Repo.
http://www.icmagroup.org/Regulatory-Policy-and-Market-Practice/short-term-markets/Repo-Markets/frequently-asked-questions-on-repo
[16] Leong, R. (2014) Bearish Bond Bets Send U.S. Repo Rates into the Red.
https://www.reuters.com/article/markets-usa-repos-idUSL2N0OR10J20140610
[17] U.S. Department of the Treasury (2019) Tentative Auction Schedule of U.S. Treasury Securities.
https://www.treasurydirect.gov/instit/annceresult/press/press.htm
[18] Brandimarte, W. and Bases, D. (2011) United States Loses Prized AAA Credit Rating from S&P. August 7, 2011.
[19] Jon, G. (2010) Counterparty Credit Risk. Wiley, Hoboken.
[20] Morini, M. and Prampolini, A. (2016) Risky Funding: A Unified Framework for Counterparty and Liquidity Charges. Landmarks in XVA.
[21] Andersen, L., Duffie, D. and Song, Y. (2019) Funding Value Adjustments. The Journal of Finance, 74, 145-192.
https://doi.org/10.1111/jofi.12739
[22] Albanese, D., Andersen, L. and Iachibino, S. (2015) FVA Accounting, Risk Management and Collateral Trading. Risk Magazine, January.
https://doi.org/10.2139/ssrn.2517301

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.