_{1}

The Treasury lock is a common pre-hedging derivative strategy the Street offers to their corporate clients. The paper provides a justification of the common practice of booking a short position in the Treasury lock as a forward contract on the underlying benchmark and a short position in the Then-Current Treasury lock as a forward contract on underlying benchmark rolled over the life of the contract.

In the Treasury lock transaction, termed T-Lock in the following, a Client willing to pre-hedge a prospected USD bond or loan issuance (Hedging Future Bond Issuance [

Being the driver of the fixed rate paid by the borrower the sum of its credit spread and the benchmark interest rate, the goal of such pre-hedge strategy is locking, when deemed economical, the interest rate component a few months ahead of the issue date. When considering a T-Lock as pre-hedge, the client is looking at the Treasury curve as the interest rates benchmark as opposed to looking at the swap rate curve. The choice of engaging in a T-Lock in lieu of a forward starting swap is mainly driven by the relative cost between the two strategies. An extensive illustration of the rationale for the use of T-Locks in comparison with other pre-hedging strategies can be found in Adam and Smith [

Being long a T-Lock, at strike L (a.k.a. Locked Yield), means receiving at Expiry an amount equal to

N ⋅ ( IRR − L ) ⋅ RiskFactor (1)

where:

• N is the notional

• IRR is the internal rate of return of the prescribed security, prevailing at Expiry

• RiskFactor is minus the change of the bond’s price corresponding to a unitary shift of its internal rate of return^{1}

The financing nature of the transaction, for which the hedge is intended, sees Expiry normally, at most, around 6 months (up to 12 months in very unusual cases) and L normally chosen to be close to the IRR seen at trade date, whilst deemed satisfactory enough by the Client to be locked at this level.

The Security can either be a specific existing Treasury (and the trade termed T-Lock as such or Standard T-Lock) or a Treasury to be identified at Expiry, i.e., the then On-The-Run n-Year benchmark ( n = 1 , ⋯ , 30 , usually n = 5 , 7 , 10 and the trade termed Then-Current-T-Lock).

In both cases, if at Expiry the Treasury yield has increased, the Client will receive a dollar amount compensating the extra cost they will be incurring in borrowing money at a rate linked to the Treasury curve. Vice versa, Treasury yield tapering will generate a loss to the Client which, in turn, is financially compensated by a lesser cost in the borrowing transaction—in other words, via a long T-Lock position the Client is synthetically shorting the Security to the Bank until Expiry.

Hedge accounting-wise, the T-Lock can be designated as hedging item in a cash flow hedge relationship with an anticipated transaction, i.e., the borrowing transaction (the hedged item). As such, up until expiry the T-Lock P & L will be set aside in OCI. Then, if at expiry the borrowing materializes the P & L arisen from the T-Lock will be released amortized during the life of bond/loan (partially) offsetting, on a running basis, the cash flows generated during the debt servicing. On the other hand, if the financial close for the hedged item is not reached, the full P & L is recycled as a cost/income entry at expiry (Ramirez [

To begin with, recall that, if P ( y ) is the price of the underlying Security as a function of the yield y, the internal rate of return IRR is by definition the yield such that

P mkt = P ( IRR ) (2)

with P mkt the (dirty) price of the bond.

The T-Lock prescribes the use of the compounded interest formula

P t ( y ) = ∏ i = 1 n 1 1 + α i y + c ∑ i = 1 n α i ∏ j = 1 i 1 1 + α j y , (3)

where c is the coupon rate of the bond, t 0 ≥ t is the issue date, t 1 < ⋯ < t n the coupon payment dates (with t 1 > t 0 ) and α 1 , ⋯ , α n the accrual factors. When t lies in a coupon period, i.e., t 0 < t ≤ t 1 , where t 0 is the last coupon payment date, the formula generalizes to

P t ( y ) = ( 1 1 + α 1 y ) t 1 − t t 1 − t 0 ( ∏ i = 2 n 1 1 + α i y + c ∑ i = 2 n α i ∏ j = 2 i 1 1 + α j y ) (4)

which is basically (3) multiplied by the stub discount.

Defining the risk factor as

RiskFactor t = − ∂ P t ( y ) ∂ y | y = IRR t (5)

then the T-Lock payoff at t e is equal to

g = a ⋅ RiskFactor t e ⋅ ( IRR t e − L ) (6)

where a = + 1 for a long (unitary) position and a = − 1 for a short (unitary) position and RiskFactor, IRR are evaluated at t e .

From a different angle, at the first order,

g = − a ⋅ ∂ P t e ( y ) ∂ y | y = IRR t e ⋅ ( IRR t e − L ) (7)

~ a ⋅ ( P t e ( L ) − P t e ( IRR t e ) ) (8)

= a ⋅ ( P t e ( L ) − P t e mkt ) (9)

so the T-Lock measures the gap between the market price of the bond and its price with flows discounted at rate L.

We will show that (9) actually identifies a overhedge/underhedge of the T-Lock, respectively for a = 1 and a = − 1 .

In an arbitrage-free valuation framework, the general pricing formula (Hunt and Kennedy ( [

v t = a ⋅ D t t e ⋅ E t t e [ RiskFactor t e ⋅ ( IRR t e − L ) ] (10)

where the expected value conditional on the information available at t is computed with respect the t e -forward measure and D t t e is the risk-free zero coupon bond seen at t with maturity t e . Due to the short term under consideration ( t e − t ≤ 0.5 ) and the quality of the issuer (the US government), default risk is ignored.

Working out the value from the formula above requires quite a modelling and computational effort but, because IRR t e can be interpreted as the (stubbed) swap rate (on a bond yield curve) fixing at t e , if the uncertainty about RiskFactor t e is ignored, the former summand can be seen as the payoff of a CMS-let based on the bond curve, i.e., in other words, that of a Constant Maturity Treasury swaplet (see Pucci [

Given the complexity of addressing the modelling issues behind (10), let alone the availablity of a pricing function in the front office systems, a quick fix for the Bank to price and trade a short T-Lock position, in light of the typically short tenors clients need to cover, has been found in representing it as a plain forward contract. The following part of the paper analyzes the rationale of such operational practice.

From (9), it can be seen that the payoff of a long Standard T-Lock struck at L may be approximated, at first order, by the t-value of a short forward contract struck at P t e ( L ) . Moreover, because the convexity of the T-Lock is negative in non-extreme scenarios away for the current yield as shown in Section 2.3, such forward contract constitutes a overhedge for the trade, as can be also observed from the joint plot in

The identification of such overhedge suggests that a short position on the T-Lock may be proxied by a long position on the forward contract on the same underlying and struck at

K = P t e ( L ) (11)

~ ForwardPrice t ( t e ) + RiskFactor t e ⋅ ( IRR t − L ) (12)

where:

• ForwardPrice t ( t e ) is the t e -forward price at t for delivery of the Security at time t e .

• RiskFactor t e is the risk factor of the Security as computed at time t e

• IRR t is the t e -forward internal rate of return of the Security as computed at time t, i.e., the rate such that

P t e ( IRR t ) = ForwardPrice t ( t e ) (13)

at t < t e .

The forward contract proxy defined above may be regarded as a convenient representation of the Standard T-Lock in a practical situation where the T-Lock typology is not available in the trader’s front office risk management systems. In a later section we will analyse the risk generated by such approximation under standard mathematical assumptions that will make the treatment easier.

Because the security is not determined at inception, for the booking of the Then-Current-T-Lock a further issue arises. A natural extension is booking a Then-Current-T-Lock as a forward contract on the on-the-run benchmark as seen at inception and revise the booking each time a new on-the-run is taken over so that at t e the proxy contract will match the real payout to the Client. Thus, for the purpose of investigating the pricing of a Then-Current-T-Lock, we turn our attention to the effect of replacing the security in the proxy forward contract.

Switching underlying security will lead to a new strike

K ^ = P ^ t e ( L ) (14)

with a strike gap, at first order,

StrikeGap = K ^ − K (15)

= F ^ orwardPrice t ( t e ) − ForwardPrice t ( t e ) + R ^ iskFactor t e ⋅ ( I ^ RR t − L ) − RiskFactor t e ⋅ ( IRR t − L ) (16)

We can see that, ignoring the jump in RiskFactor, a reasonable assumption if the switch is actually a benchmark replacement within the same tenor (e.g. 10Y) or within close-”in-the-run” bonds, the strike gap reads

StrikeGap = F ^ orwardPrice t ( t e ) − ForwardPrice t ( t e ) + RiskFactor t e ⋅ ( I ^ RR t − IRR t ) (17)

The intuition is that the StrikeGap will generally be small if the switch is within close-”on-the-run” bonds but we will focus on this issue later in Section 3.1 turning our attention to a more meaningful measure, the P & L of the proxy forward contract.

From now on we will use Euler’s notation

D x k [ f ( x ) ] ≡ ∂ k f ( x ) ∂ x k

for high-order differentials.

In the current section we will look at the greeks (Hull [

For ease of computation, we will assume the bond price to have the following functional form (Hull [

P t ( y ) = e − ( t n − t ) y + c ∑ t i > t n α i e − ( t i − t ) y (18)

where c is the coupon rate of the bond and α i its accrual factors

Under this assumption, with R the internal rate of return,

g ( R ) = − a ⋅ D y [ P ] | y = R ⋅ ( R − L ) (19)

~ a ⋅ ( P ( L ) − P ( R ) ) (20)

= a ⋅ ( e − ( t n − t e ) L + c ∑ t i > t e n α i e − ( t i − t e ) L − P mkt ) (21)

Also, the first, second and third derivative of P ( y ) are easily computed, respectively, as

D y [ P t ] = − ( t n − t ) e − ( t n − t ) y − c ∑ t i > t n α i ( t i − t ) e − ( t i − t ) y (22)

which is a negative quantity (or null in limiting cases),

D y 2 [ P t ] = ( t n − t ) 2 e − ( t n − t ) y + c ∑ t i > t n α i ( t i − t ) 2 e − ( t i − t ) y , (23)

i.e., the so-called convexity of the bond (Taleb [

1 P D y 2 [ P ] (24)

which is positive, and finally,

D y 3 [ P t ] = − ( t n − t ) 3 e − ( t n − t ) y − c ∑ t i > t n α i ( t i − t ) 3 e − ( t i − t ) y (25)

which is negative.

As a consequence, the T-Lock payoff as a function of the yield

g ( y ) = − a ⋅ D y [ P ] ⋅ ( y − L ) (26)

has first and second derivative, respectively,

D y [ g ] = − a ⋅ ∂ ∂ y [ D y [ P ] ⋅ ( y − L ) ] (27)

= − a ⋅ [ D y 2 [ P ] ⋅ ( y − L ) + D y [ P ] ] (28)

and

D y 2 [ g ] = − a ⋅ [ D y 3 [ P ] ⋅ ( y − L ) + 2 D y 2 [ P ] ] (29)

We’re now in the position of being able to evaluate the accuracy of approximation (9) which, looking at it backward, boils down to substituting P with its first order Taylor polynomial. The approximation is a (global) overhedge because the remainder

R 1 ( y ) = P ( y ) − P ( L ) − D y 1 [ P ] ( y − L ) (30)

has a unique stationary point at y = L which is also a maximum, since the second derivative of R 1 ( y ) is negative.

Moreover, recalling the Remainder Estimation Theorem (see Apostol [

| R n ( y ) | ≤ M | y − a | n + 1 ( n + 1 ) ! (31)

where M is the maximum value of | D y n + 1 [ P ] | in the interval I, for n = 1 , a = L we have that

| R 1 ( y ) | ≤ M | y − L | 2 2 (32)

where, because the third derivative of P (that is, the first derivative of D y 2 [ P ] ), is negative, M = D y 2 [ P ] ( min I ) is taken to be the value at the left-most point of the interval which is roughly (taking the extreme case y = 0 )

( t n − t ) 2 + c ∑ t i > t n ( t i − t ) 2 α i (33)

As an illustration, for the 10Y benchmark roughly

M ~ 150 (34)

if we exclude the possibility of negative yields, an event that has never occurred (minimum yield for the 1Y Constant Maturity Treasury is 0.08% attained in September 2011). If we assume a 30% yield change, which is an upper bound for a short term such as 6 months for the 10Y benchmark, the dollar error amounts to 0.005% on 100% of notional.

Thanks to the smoothness of P ( y ) the greeks can be obtained by interchanging expected value and differentiation so for an analysis of delta and gamma of the T-Lock we will just look at the first and second derivatives of the payoff. From (28), when a = 1 , for | y − L | small enough (which is a reasonable assumption with short term expiries under typical business conditions),

D y [ g ] > 0 (35)

so that the delta of the (long) T-Lock is negative

D P [ g ] = D y [ g ] ⋅ D P [ y ] < 0 (36)

which is consistent with the previous comment about T-Lock being equivalent to shorting the security.

More precisely, resolving (28) for L, when a = 1

D y [ g ] > 0 and Δ < 0 iff L > y + D y [ P ] D y 2 [ P ] (37)

hence, because of the sign of the derivatives, we have a sharp lower bound smaller than y.

Turning things around

D y [ g ] > 0 and Δ < 0 iff y − L < − D y [ P ] D y 2 [ P ] > 0 (38)

so, at least intuitively because the RHS of the inequality is also a function of y, as long as y does not overshoot L, the delta remains negative.

Taking into account the discounting, a trader, after booking the T-Lock position via proxy forward as argued in Section 1.3, may delta hedge a short position via shorting an amount of bond equal to

Δ ~ D t t e D P [ g ] (39)

and continuously re-adjust the hedge as market and time move. So the question is how trading the delta will affect the bank’s P & L, so we turn our attention to the gamma.

In the following we investigate effectiveness of the replication via Δ -hedging of a T-Lock. From section (A) we have

D P 2 [ g ] = D y 2 [ g ] ⋅ [ D P [ y ] ] 2 + D y [ g ] ⋅ D P 2 [ y ] (40)

= D y 2 [ g ] ⋅ [ 1 / D y [ P ] ] 2 − D y [ g ] ⋅ [ D y 2 [ P ] / ( D y [ P ] ) 3 ] (41)

From (28) and (29), the gamma of the T-Lock locally, i.e., | y − L | small enough, satifies

D P 2 [ g ] ~ − a ⋅ [ 2 D y 2 [ P ] ] ⋅ [ 1 / D y [ P ] ] 2 + a ⋅ [ D y [ P ] ] ⋅ [ D y 2 [ P ] / ( D y [ P ] ) 3 ]

= − a ⋅ [ 2 D y 2 [ P ] ] ⋅ [ 1 / D y [ P ] ] 2 + a ⋅ [ D y 2 [ P ] / ( D y [ P ] ) 2 ] (42)

= − a ⋅ [ D y 2 [ P ] ] ⋅ [ 1 / D y [ P ] ] 2 (43)

So, when a = 1 , with | y − L | small enough, the Gamma is negative (i.e., the convexity of the T-Lock is negative), so dynamically replicating a T-Lock will, (not so) locally around L, generate rebalancing profits. In other words, dynamically replicating a long T-Lock via (10) and its delta assuming no volatility will be a overhedge, hence generating a non-negative P & L for the trader (see Carr and Madan [

Γ < 0 iff ( y − L ) ⋅ [ ( D y 2 [ P ] ) 2 − D y [ P ] ⋅ D y 3 [ P ] ] > D y [ P ] ⋅ D y 2 [ P ] (44)

The latter factor satisfies

( D y 2 [ P ] ) 2 − D y [ P ] ⋅ D y 3 [ P ] < 0 (45)

Proof. Thanks to (87) (Appendix C), noting that the leading summands ( D y 2 [ P ( 0 ) ] ) 2 and − D y 1 [ P ( 0 ) ] ⋅ D y 3 [ P ( 0 ) ] cancel each other, we see that

( D y 2 [ P ] ) 2 − D y [ P ] ⋅ D y 3 [ P ] = ( D y 2 [ P ( 0 ) ] + c D y 2 [ A ] ) 2 + ( D y [ P ( 0 ) ] + c D y [ A ] ) ⋅ ( D y 3 [ P ( 0 ) ] + c D y 3 [ A ] ) (46)

= c [ 2 D y 2 [ P ( 0 ) ] D y 2 [ A ] − D y 1 [ P ( 0 ) ] D y 3 [ A ] − D y 3 [ P ( 0 ) ] D y 1 [ A ] ] + c 2 [ ( D y 2 [ A t ] ) 2 − D y 1 [ A t ] ⋅ D y 3 [ A t ] ] < 0 (47)

This is because both summands are negative (from (88) and (89)) and the fact that c > 0 .

Finally, (44) and (45) yield

Γ < 0 iff y − L < D y [ P ] ⋅ D y 2 [ P ] ( D y 2 [ P ] ) 2 − D y [ P ] ⋅ D y 3 [ P ] > 0 (48)

so, by the same argument shown above, as long as y does not overshoot L, the gamma remains negative as well. In

We have already investigated the impact of delta hedging a short position in the T-Lock. The reader may have already noticed that what we have actually been looking at is the delta and gamma of the T-Lock with respect to the forward price of the bond, in other words the delta and gamma with respect to the forward contract as main security to be used in the replication strategy. This is actually appropriate since the shorting-the-bond requires to hedge the short position in the T-Lock can generally be accomplished only via a (reverse) repo trade and the delta (36), in terms of hedge ratio, is to be interpreted as the size of the corresponding repo to trade (for an extensive description of the workings of repo business see [

ForwardPrice t ( t e ) = P t mkt ( 1 + r t t e repo ( t e − t ) ) − c ∑ t < t i ≤ t e α i ( 1 + r t i t e repo ( t e − t i ) ) (49)

where r u v repo is the (simply compounded) forward repo rate for the period u → v . We assume a zero haircut, which is a good approximation given the credit quality of the Treasury.

Due to (49), (13) and (22), since by the chain rule and assuming a flat short-term repo curve,

∂ g ( r repo ) ∂ r repo = ∂ g ( y ) ∂ y | y = R t ⋅ ∂ y ( P ) ∂ P | P = ForwardPrice t ⋅ ∂ ForwardPrice ( r repo ) ∂ r repo (50)

the sensitivity of the T-Lock to the repo rate is negative, so the higher the repo rate the cheaper is the long position.

The typical bid-ask spread for a repo transaction is 5 basis points. For instance, as of 24 Jan 2019, we report the repo curve in

In passing, it’s also interesting to note that given the current regime in the EUR market, being repo rates in the negative space, a hypothetical T-Lock written on a European treasury bond would be more expensive relative to a traditional trade on a US Treasury.

As already represented in Section 1.3, in a Then-Current-T-Lock the underlying security is determined at t e as the currently on-the-run benchmark. In the special and idealized case where t e is coincides with the issue date of the new benchmark, the value at t < t e of a long(short) Then-Current-T-Lock struck at L is proxied by a short (long) forward contract struck at

K = 1 + RiskFactor t e ⋅ ( R t − L ) (51)

where

• RiskFactor t e is that of the Proxy Security as computed at time t e

R t is the t e -forward internal rate of return of the Proxy Security as computed at time t (see Equation (13))

Maturity | Bid | Ask |
---|---|---|

1 month | 2.57% | 2.52% |

3 months | 2.60% | 2.55% |

6 months | 2.63% | 2.58% |

12 months | 2.70% | 2.65% |

• Proxy Security is a traded security chosen in lieu of the yet unknown underlying, e.g., the on-the-run security as determined at time t.

At t roll the new security must be selected and a new strike populated, the strike gap being

StrikeGap = R ^ iskFactor t e ⋅ ( R ^ t roll − L ) − RiskFactor t e ⋅ ( R t roll − L ) = ( R ^ iskFactor t e − RiskFactor t e ) ⋅ ( R ^ t roll − L ) − RiskFactor t e ⋅ ( R t roll − R ^ t roll ) (52)

In practice such a coincidence does not hold and because at inception the underlying security may be unknown and definitely not listed or identifiable in the position keeping system, the trader, via the procedure described in Section 1.3, may book the trade approximating the Then-Current-T-Lock as a Standard T-Lock with underlying security specified as the security that is on-the-run at trade inception. At each benchmark roll date t roll , the booking is revised with the on-the-run at t roll benchmark, generating a switch P & L, the roll P & L.

We will show in the approximated derivation (66) that the roll P & L must be small in special conditions. This is all the more the case at a on-the-run succession, i.e., when the security rolls from the previous on-the-run benchmark to the new on-the-run issue. Indeed, the new on-the-run will normally have an internal rate of return in line with the existing level and, if we also take into account that because of the high frequency of issue (e.g. trimestral for the 10Y) the on-the-run succession normally brings a new coupon that is very close to that of the previous on-the-run, the roll P & L is potentially even less significant.

In this section we will present an approximated formula for the Roll P & L that will allow us, in the conclusive part of the paper, to compute statistical estimates.

To keep things simple, assume the security is switched from a bond with coupon rate c to a bond with coupon rate c ^ , all other details remaining equal. The net present value changes from

π t = D t t e [ K − F t ( t e ) ] (53)

to

π ^ t = D t t e [ K ^ − F ^ t ( t e ) ] (54)

The P & L due to the switch is

π ^ t − π t = D t t e [ ( K ^ − K ) − ( F ^ t ( t e ) − F t ( t e ) ) ] (55)

with K = P t e ( L ) , K ^ = P ^ t e ( L ) and

P ^ t ( y ) = e − ( t n − t ) y + c ^ ∑ t i > t n α i e − ( t i − t ) y (56)

so that

K ^ − K = ( c ^ − c ) ∑ t i > t e n α i e − ( t i − t e ) L (57)

Now, by definition

F t ( t e ) = P t e ( R t ) (58)

and

F ^ t ( t e ) = P ^ t e ( R ^ t ) (59)

therefore

F ^ t ( t e ) − F t ( t e ) = P ^ t e ( R ^ t ) − P t e ( R t ) (60)

= [ P ^ t e ( R ^ t ) − P t e ( R ^ t ) ] + [ P t e ( R ^ t ) − P t e ( R t ) ] (61)

= ( c ^ − c ) ∑ t i > t e n α i e − ( t i − t e ) R ^ t + [ P t e ( R ^ t ) − P t e ( R t ) ] (62)

where, when t n − t e is small, i.e., the bond at t e is close to the bond’s maturity, the last summand

P t e ( R ^ t ) − P t e ( R t ) = e − ( t n − t e ) R ^ t − e − ( t n − t e ) R t (63)

+ c ∑ t i > t e n α i ( e − ( t i − t e ) R ^ t − e − ( t i − t e ) R t ) (64)

can be approximated, at first order, as

P t e ( R ^ t ) − P t e ( R t ) ~ [ ( t n − t e ) + c ∑ t i > t e n α i ( t i − t e ) ] ( R t − R ^ t ) (65)

so that the (forward) P & L satisfies

π ^ t − π t D t t e = ( c ^ − c ) [ ∑ t i > t e n α i e − ( t i − t e ) L − ∑ t i > t e n α i e − ( t i − t e ) R ^ t ] (66)

− [ P t e ( R ^ t ) − P t e ( R t ) ] (67)

~ ( c ^ − c ) [ ∑ t i > t e n α i e − ( t i − t e ) L − ∑ t i > t e n α i e − ( t i − t e ) R ^ t ] (68)

+ ( R ^ t − R t ) [ ( t n − t e ) + c ∑ t i > t e n α i ( t i − t e ) ] (69)

~ ( c ^ − c ) ( R ^ t − L ) ∑ t i > t e n α i ( t i − t e ) (70)

+ ( R ^ t − R t ) [ ( t n − t e ) + c ∑ t i > t e n α i ( t i − t e ) ] (71)

Similarly, it can be shown that

π ^ t − π t D t t e ~ ( c − c ^ ) ( L − R t ) ∑ t i > t e n α i ( t i − t e ) (72)

+ ( R ^ t − R t ) [ ( t n − t e ) + c ^ ∑ t i > t e n α i ( t i − t e ) ] (73)

Therefore, in as a much as

• t n − t e is small

• L is close to R t

• there is no significant gap in the internal rate of return between the two securities

The security change generates little P & L in the forward contract position.

More generally, in order to allow for longer tenor benchmarks, having defined

A t ( y ) = ∑ t i > t n α i e − ( t i − t ) y , (74)

the removal of the restriction that t n − t e is small leaves us with

π ^ t − π t D t t e = ( c ^ − c ) [ A t e ( L ) − A t e ( R ^ t ) ] + [ P t e ( R t ) − P t e ( R ^ t ) ] ~ ( c ^ − c ) ⋅ D y [ A t e ] | y = R ^ t ⋅ ( L − R ^ t ) + D y [ P t e ] | y = R ^ t ⋅ ( R t − R ^ t ) (75)

where

D y [ A t ] = − ∑ t i > t n α i ( t i − t ) e − ( t i − t ) y , (76)

Having (75) at hand, we are now able to assess the impact of switching the underlying security of the contract at the issue of a new benchmark. To this aim, in the next section we will look at a stylized description of how a new benchmark is constructed, where we ignore the change in the tenor structure of the bond, only focusing on the determination of a new par coupon rate so that the new benchmark is priced at par.

Treasury benchmarks are periodically reissued by means of an auction mechanism. The US government yearly publishes an auction calendar ( [

The roll process is described in the graph (

• First the internal rate of return R t of the current benchmark is evaluated

• The prospected coupon c ^ of the new benchmark is located so that the new issue is at par, i.e., P t ( c ^ ) ( R t ) = 1

• Then the auction will filter through market appetite determining a final coupon rate c ^ ′

• Finally, the new internal rate of return R ^ t is implied from P t ( c ^ ′ ) ( R ^ t ) .

It’s clear that if the market confirms the new issue “at the old level” we land on R ^ t = R t so, as can be elicited from Equation (75), minimizing the roll P & L.

Because the above assumptions are normally not verified, to estimate the roll risk in practice, in Section 4.3 we will resort to a statistical analysis based on the history of auctions.

Looking at market data from January 2008 for the 2Y, 5Y and 10Y Treasury benchmark (see Figures 5-7), we have the following summary statistics in

IRR | 2Y | 5Y | 10Y |
---|---|---|---|

AVERAGE | 0.88% | 1.61% | 2.40% |

STDEV | 0.75% | 0.61% | 0.52% |

0.05 Perc | 0.24% | 0.70% | 1.62% |

0.95 Perc | 2.59% | 2.77% | 3.34% |

In the following sections we will use such historical data to verify in practice our guess regarding the efficacy of managing the risk generated by short T-Lock positions by booking them as forward contracts. The statistical anaysis is aimed at estimating:

1) The overhedge error (Section 4.1) due to the payoff approximation illustrated in Section 1.3.

2) The gamma negativity bounds (Section 4.2), that is the stability of negative sign of the gamma across market scenarios.

3) The roll risk (Section 4.3) due to the P & L of the Bank generated during the life of the contract by the mispecification and consequent revision of the security underlying the sold T-Lock.

We first look at the overhedge error (9) by extracting a historical estimation for (32). Considering a 6M T-Lock on the 10Y benchmark, we find (

6M | y − L | ( y − L ) 2 |
---|---|---|

AVERAGE | −0.090% | 0.004% |

STDEV | 0.663% | 0.006% |

0.05 Perc | −1.44% | 3.92E−08 |

0.95 Perc | 0.93% | 0.0206% |

downgrade by the major rating agencies (Brandimarte and Bases [

Considering the same historical window, in the following we have considered a daily time series of the upper bound (48) and reported in Tables 4-6 the relevant statistics. A move of such magnitude within the typical features (expiry and at-the-money strike) of a T-Lock trade is highly unlikely and has never been recorded being outside ordinary levels of core governative yields.

We have considered roll data from January 2008 for the 10Y Treasury benchmark. It is a very large time window which is chosen to encompass extreme historical scenarios.

From

To further the analysis, in the following we will look at the statistics regarding the actual P & L. Ignoring the discounting effect, which is a reasonable approximation by virtue of the short time horizon under scrutiny, we have considered a time series of (75) and computed the relevant percentiles and value-at-risk for the (forward) net present value of the forward contract for 1M, 3M, 6M, 12M expiries and 3% locked yield. From the point of view of the trader selling the T-Lock on the 10Y (

For the 5Y benchmark, data are more comfortable, showing a lower roll risk, both in the average and in the 95-percentile for all expiries (

10Y Treasury | Upper Bound |
---|---|

AVERAGE | 11.44% |

STDEV | 0.10% |

0.05 Perc | 11.28% |

0.95 Perc | 11.61% |

5Y Treasury | Upper Bound |
---|---|

AVERAGE | 21.31% |

STDEV | 0.12% |

0.05 Perc | 21.11% |

0.95 Perc | 21.51% |

2Y Treasury | Upper Bound |
---|---|

AVERAGE | 22.47% |

STDEV | 15.20% |

0.05 Perc | 11.15% |

0.95 Perc | 25.57% |

10Y Treasury | Yield Change | Yield Change on Roll |
---|---|---|

AVERAGE | −0.0006% | 0.0123% |

STDEV | 0.0497% | 0.0571% |

0.05 Perc | −0.0760% | −0.0528% |

0.95 Perc | 0.0794% | 0.1166% |

10Y Treasury | Roll P & L (Trader’s View) | |||
---|---|---|---|---|

3.00% | 1M | 3M | 6M | 12M |

AVERAGE | −0.1085% | −0.1069% | −0.1045% | −0.0996% |

STDEV | 0.5028% | 0.4953% | 0.4841% | 0.4615% |

0.05 Perc | 0.4749% | 0.4677% | 0.4568% | 0.4352% |

0.95 Perc | −1.0395% | −1.0238% | −1.0005% | −0.9530% |

5Y Treasury | Roll P & L (Trader’s View) | |||
---|---|---|---|---|

3.00% | 1M | 3M | 6M | 12M |

AVERAGE | −0.05% | −0.04% | −0.04% | −0.04% |

STDEV | 0.22% | 0.22% | 0.21% | 0.18% |

0.05 Perc | 0.24% | 0.23% | 0.22% | 0.20% |

0.95 Perc | −0.43% | −0.42% | −0.40% | −0.35% |

2Y Treasury | Roll P & L (Trader’s View) | |||
---|---|---|---|---|

3.00% | 1M | 3M | 6M | 12M |

AVERAGE | −0.07% | −0.07% | −0.06% | −0.05% |

STDEV | 0.51% | 0.51% | 0.50% | 0.50% |

0.05 Perc | 0.32% | 0.31% | 0.31% | 0.30% |

0.95 Perc | −0.52% | -0.51% | −0.49% | −0.45% |

Just as any derivative, a position on the T-Lock carries counterparty risk (see Gregory [

The calculation of such adjustments is a run-of-the-mill task for a bank dealing in derivatives but, whereas it may be argued that short-term trades generally attract low counterparty risk, we also notice that a T-Lock short position is subject to systemic wrong-way counterparty risk. Indeed, on a distressed scenario where the corporate market is undermined, a flight-to-quality ensuing regime may concurrently lower the Treasury spreads increasing the Bank exposure to the Client. It is difficult though to envision a situation where the corporate sector suffers and the banks thrive so it may be argued that the adverse move of the CVA may be offset by a specular increase in the DVA component, lowering the potential impact of wrong-way-risk on the bank’s balance sheet.

As for the FVA (Andresen, Duffie and Song [

From the point of view of the dealer bank, capital costs (KVA) are also minimal allowing for a interesting profitability of T-Locks although, by the same token, the trade will not afford high mark-ups.

Turning our attention to the proxy booking proposed, the overhedge nature the approximation will underestimate the exposure generated by the short T-Lock position, therefore underestimating the “contra” contribution (see Albanese and Andreasen [

We have shown that a long Standard T-Lock position has negative convexity, so the trader may safely (over-)replicate it by booking a linear trade, a proxy forward contract, which is a natural overhedge. In other words, a trader willing to sell a Standard T-Lock position can book the trade as a forward contract written on the same security and with the same expiry as that of the T-Lock contract. Being an overhedge, the forward contract will generate a conservative representation of bank’s P & L associated to the position. The negative convexity will ensure that delta hedging the positions will generate gamma profits. This comes in handy when the front office risk management system does not feature the T-Lock as a typology.

Moreover, we have shown that a T-Lock position is historically little sensitive to the benchmark roll. Therefore, a trader may book a Then-Current-T-Lock trade as a proxy forward contract written on the security that is on-the-run benchmark at inception and remain confident that revising the booking at roll dates to update the underlying will statistically generate a negligible P & L, while again, thanks to the negative convexity of the T-Lock, delta hedging the position in between roll dates will generate gamma profits.

The author declares no conflicts of interest regarding the publication of this paper.

Pucci, M. (2019) Hedging the Treasury Lock. Journal of Mathematical Finance, 9, 301-324. https://doi.org/10.4236/jmf.2019.93018

A. Simple Math

Below we recall simple facts about first and second derivatives of differentiable functions. If f and g are differentiable then

( f ∘ g ) ′ = f ′ ⋅ g ′ (77)

and

( f ∘ g ) ′ ′ = ( f ″ ∘ g ) ⋅ ( g ′ ) 2 + ( f ′ ∘ g ) ⋅ g ″ (78)

As a consequence, if f invertible and differentiable then

( f − 1 ) ′ = 1 f ′ (79)

and

( f − 1 ) ′ ′ = − f ″ ( f ′ ) 3 (80)

B. Key Derivatives

Noting that

P t ( c ) ( y ) = P t ( 0 ) ( y ) + c A t ( y ) , (81)

and

D y [ P t ( c ) ] = − ( t n − t ) e − ( t n − t ) y + c D y [ A t ] (82)

= D y [ P t ( 0 ) ] + c D y [ A t ] (83)

we can work out that

D y k [ P ( c ) ] = ( t − t n ) k e − ( t n − t ) y + c ∑ t i > t n α i ( t − t i ) k e − ( t i − t ) y (84)

D y k [ A t ] = ∑ t i > t n α i ( t − t i ) k e − ( t i − t ) y , (85)

and

D y k [ P t ( c ) ] = ( t − t n ) k e − ( t n − t ) y + c D y k [ A t ] (86)

= D y k [ P t ( 0 ) ] + c D y k [ A t ] (87)

C. More Math

Setting q i = ( t − t i ) , Q i = α i e − ( t i − t ) y we see that

D y 1 [ P t ( 0 ) ] D y 3 [ A t ] + D y 3 [ P t ( 0 ) ] D y 1 [ A t ] − 2 D y 2 [ P t ( 0 ) ] D y 2 [ A t ] ≥ 0 (88)

because

q n Q n ∑ t i > t q i 3 Q i + q n 3 Q n ∑ t i > t q i Q i − 2 q n 2 Q n ∑ t i > t q i Q i = ∑ t i > t Q i Q n q i q n [ q i − q n ] 2

is a clearly non-negative.

Moreover,

( D y 2 [ A t ] ) 2 − D y 1 [ A t ] ⋅ D y 3 [ A t ] < 0 (89)

because

[ ∑ t i > t q i Q i ] [ ∑ t i > t q i 3 Q i ] − [ ∑ t i > t q i 2 Q i ] 2 = ∑ t i > t , t j > t Q i Q j [ q i − q j ] 2 > 0 (90)

Indeed,

∑ t i > t q i Q i ∑ t i > t q i 3 Q i − [ ∑ t i > t q i 2 Q i ] 2 = ∑ i ≠ j q i q j 3 Q i Q j − ∑ i ≠ j q i 2 q j 2 Q i Q j (91)

= ∑ i < j ( q i q j 3 + q i 3 q j ) Q i Q j − ∑ i < j 2 q i 2 q j 2 Q i Q j

= ∑ i < j ( q i q j 3 + q i 3 q j ) Q i Q j − 2 q i 2 q j 2 Q i Q j (92)

= ∑ i < j q i q j ( q i 2 + q j 2 ) Q i Q j − 2 q i 2 q j 2 Q i Q j (93)

= ∑ i < j q i q j Q i Q j ( q i − q j ) 2 (94)

is clearly positive^{2}.

D. The Forward Price and the Repo

A coupon security/dividend security X is a security that pays a discrete stream of cashflows c i , each at time T i . It could be either a stock or a coupon bond.

If h cut is the haircut, the T-forward price of the security, paying a dividend c i at time T i , i = 1 , ⋯ , n , is

ForwardPrice t ( T ) = X t [ ( 1 − h cut ) e r repo ( T − t ) + h cut e r fun ( T − t ) ] (95)

− ∑ t < T i ≤ T c i e ( h cut r fun + ( 1 − h cut ) r repo ) ( T − T i ) (96)

where r repo is the repo rate, r fun is the funding rate for unsecured borrowing. Both rates are assumed continuously compounded and flat for ease of illustration.

Assuming first h cut = 0 , in a repo trade with dividends/coupons with maturity T the trader

1) Borrows in the time interval [ T 0 , T 1 ] an amount X t of cash at rate r repo until T, with which s/he buys bond from the market and immediately transfers it to the repo counterparty.

2) Then for each

3) At T, s/he gets the bond back, sells it in the market and returns all outstanding borrowed cash to the repo counterparty.

We describe our position by the quantity

At start on the repo trade our repo account amounts to

Then, recursively, for

and finally from

Working out the recursion we see the repo cash account grows as

Lemma 1. For all

So at maturity the strategy is worth

In other words, the trader enters at t a contract at zero cost and ends up, via the repo strategy, at T with a

If, on the other hand, due to market illiquidity the repo trade is not viable for the given security, the formula still holds but with

The two cases (102), (103) are the extreme cases:

•

•

Finally, for a generic haircut

which may be derived from a strategy where coupon payments are distributed between repo redemption and unsecured funding redemption according to the their relative weights.