{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:50:29Z","timestamp":1768423829914,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T00:00:00Z","timestamp":1670457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T00:00:00Z","timestamp":1670457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2023,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The blockchain, a decentralized ledger system, has been considered a revolutionary technology to transform businesses, including the financial markets. As peer-to-peer (P2P) lending is also known for decentralization in the sense that individuals borrow from and lend to each other directly, bypassing traditional banks, we explore the possibility and benefits of blockchains in P2P lending. We first provide an economic analysis of existing P2P lending problems, including herding and platform-borrower collusion, with and without the blockchain mechanism. We note that, compared with the existing markets, blockchain-backed P2P lending is highly effective in privacy preservation and borrower quality distinction. Since the role of intermediaries is eliminated in the blockchain world, the chance of platform-borrower collusion is also minimized. Moreover, we show that borrowers and lenders can expect additional surplus when the origination fee in traditional P2P lending is replaced with a smaller tokenization cost and when borrowers present a more accurate financial incentive in a smart contract. With the smart contract, borrowers are allowed to propose optimal interest rates based on their creditworthiness and capacity of repayment while detailed personal information is not required. Additionally, we demonstrate that small investors\u2019 surplus can be further enhanced due to the elimination of herding.<\/jats:p>","DOI":"10.1007\/s10479-022-05108-1","type":"journal-article","created":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T17:03:01Z","timestamp":1670518981000},"page":"693-716","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Is blockchain a cure for peer-to-peer lending?"],"prefix":"10.1007","volume":"321","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5279-1957","authenticated-orcid":false,"given":"Wangcheng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Wenjun","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"issue":"3","key":"5108_CR1","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1287\/opre.2016.1575","volume":"65","author":"L Ales","year":"2017","unstructured":"Ales, L., Cho, S. H., & K\u00f6rpeo\u011flu, E. (2017). Optimal award scheme in innovation tournaments. Operations Research, 65(3), 693\u2013702.","journal-title":"Operations Research"},{"key":"5108_CR2","volume-title":"Mastering Bitcoin: Unlocking digital cryptocurrencies","author":"AM Antonopoulos","year":"2014","unstructured":"Antonopoulos, A. M. (2014). Mastering Bitcoin: Unlocking digital cryptocurrencies. Sebastopol: O\u2019Reilly Media, Inc."},{"issue":"150","key":"5108_CR3","first-page":"1","volume":"20","author":"M Bazarbash","year":"2020","unstructured":"Bazarbash, M., Beaton, K., et al. (2020). Filling the gap: Digital credit and financial inclusion. International Monetary Fund Working Papers, 20(150), 1\u201330.","journal-title":"International Monetary Fund Working Papers"},{"key":"5108_CR4","doi-asserted-by":"crossref","unstructured":"Bentov, I., Gabizon, A., & Mizrahi, A. (2016). Cryptocurrencies without proof of work. In International conference on financial cryptography and data security (pp. 142\u2013157). Springer.","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"5108_CR5","doi-asserted-by":"crossref","unstructured":"Bitansky, N., Canetti, R., Chiesa, A., & Tromer, E. (2012). From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In Proceedings of the 3rd innovations in theoretical computer science conference (pp. 326\u2013349). ACM.","DOI":"10.1145\/2090236.2090263"},{"key":"5108_CR6","unstructured":"Buterin, V. (2016). Ethereum: Platform review; opportunities and challenges for private and consortium blockchains."},{"key":"5108_CR7","unstructured":"Buterin, V., et\u00a0al. (2014). A next-generation smart contract and decentralized application platform. White Paper, 3(37)."},{"issue":"12","key":"5108_CR8","doi-asserted-by":"publisher","first-page":"4175","DOI":"10.1287\/mnsc.2016.2560","volume":"63","author":"AW Butler","year":"2016","unstructured":"Butler, A. W., Cornaggia, J., & Gurun, U. G. (2016). Do local capital market conditions affect consumers\u2019 borrowing decisions? Management Science, 63(12), 4175\u20134187.","journal-title":"Management Science"},{"issue":"1","key":"5108_CR9","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s40854-016-0039-4","volume":"2","author":"Y Cai","year":"2016","unstructured":"Cai, Y., & Zhu, D. (2016). Fraud detections for online businesses: A perspective from blockchain technology. Financial Innovation, 2(1), 20.","journal-title":"Financial Innovation"},{"issue":"7","key":"5108_CR10","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/3359552","volume":"63","author":"C Catalini","year":"2020","unstructured":"Catalini, C., & Gans, J. S. (2020). Some simple economics of the blockchain. Communications of the ACM, 63(7), 80\u201390.","journal-title":"Communications of the ACM"},{"key":"5108_CR11","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292\u20132303.","journal-title":"IEEE Access"},{"issue":"5","key":"5108_CR12","doi-asserted-by":"publisher","first-page":"1754","DOI":"10.1093\/rfs\/hhz007","volume":"32","author":"LW Cong","year":"2019","unstructured":"Cong, L. W., & He, Z. (2019). Blockchain disruption and smart contracts. The Review of Financial Studies, 32(5), 1754\u20131797.","journal-title":"The Review of Financial Studies"},{"key":"5108_CR13","volume-title":"Stealth address, ring signatures, Monero","author":"NT Courtois","year":"2016","unstructured":"Courtois, N. T. (2016). Stealth address, ring signatures, Monero. London: University College London."},{"issue":"1","key":"5108_CR14","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1), 186\u2013208.","journal-title":"SIAM Journal on Computing"},{"key":"5108_CR15","unstructured":"Gough, N. (2016). Online lender Ezubao took \\$7.6 billion in Ponzi scheme, china says. The New York Times. https:\/\/www.nytimes.com\/2016\/02\/02\/business\/dealbook\/ezubao-china-fraud.html."},{"issue":"4","key":"5108_CR16","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1111\/jofi.12903","volume":"75","author":"JM Griffin","year":"2020","unstructured":"Griffin, J. M., & Shams, A. (2020). Is bitcoin really untethered? The Journal of Finance, 75(4), 1913\u20131964.","journal-title":"The Journal of Finance"},{"key":"5108_CR17","doi-asserted-by":"crossref","unstructured":"Haber, S., & Stornetta, W. S. (1990). How to time-stamp a digital document. In Conference on the theory and application of cryptography (pp. 437\u2013455). Springer.","DOI":"10.1007\/3-540-38424-3_32"},{"key":"5108_CR18","unstructured":"Han, R., Sui, Z., Yu, J., Liu, J., & Chen, S. (2019). Fact and fiction: Challenging the honest majority assumption of permissionless blockchains. Technical report, Cryptology ePrint Archive, Report 2019\/752."},{"issue":"1","key":"5108_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.intmar.2010.07.001","volume":"25","author":"M Herzenstein","year":"2011","unstructured":"Herzenstein, M., Dholakia, U., & Andrews, R. (2011). Strategic herding behavior in peer-to-peer loan auctions. Journal of Interactive Marketing, 25(1), 27\u201336.","journal-title":"Journal of Interactive Marketing"},{"key":"5108_CR20","doi-asserted-by":"crossref","unstructured":"Hileman, G., & Rauchs, M. (2017). 2017 global blockchain benchmarking study. https:\/\/ssrn.com\/abstract=3040224.","DOI":"10.2139\/ssrn.3040224"},{"issue":"1\u20132","key":"5108_CR21","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s10479-017-2668-z","volume":"266","author":"C Jiang","year":"2018","unstructured":"Jiang, C., Wang, Z., Wang, R., & Ding, Y. (2018). Loan default prediction by combining soft information extracted from descriptive text in online peer-to-peer lending. Annals of Operations Research, 266(1\u20132), 511\u2013529.","journal-title":"Annals of Operations Research"},{"issue":"1","key":"5108_CR22","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10479-020-03874-4","volume":"300","author":"T King","year":"2021","unstructured":"King, T., & Koutmos, D. (2021). Herding and feedback trading in cryptocurrency markets. Annals of Operations Research, 300(1), 79\u201396.","journal-title":"Annals of Operations Research"},{"key":"5108_CR23","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s10479-019-03255-6","volume":"294","author":"D Koutmos","year":"2019","unstructured":"Koutmos, D. (2019). Market risk and bitcoin returns. Annals of Operations Research, 294, 453\u2013477.","journal-title":"Annals of Operations Research"},{"issue":"1","key":"5108_CR24","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1287\/mnsc.1120.1560","volume":"59","author":"M Lin","year":"2013","unstructured":"Lin, M., Prabhala, N. R., & Viswanathan, S. (2013). Judging borrowers by the company they keep: Friendship networks and information asymmetry in online peer-to-peer lending. Management Science, 59(1), 17\u201335.","journal-title":"Management Science"},{"key":"5108_CR25","doi-asserted-by":"crossref","unstructured":"Malinova, K., & Park, A. (2017). Market design with blockchain technology. https:\/\/ssrn.com\/abstract=2785626.","DOI":"10.2139\/ssrn.2785626"},{"key":"5108_CR26","unstructured":"Mathews, L. (2017). Equifax data breach impacts 143 million Americans. Forbes. https:\/\/www.forbes.com\/sites\/leemathews\/2017\/09\/07\/equifax-data-breach-impacts-143-million-americans."},{"key":"5108_CR27","doi-asserted-by":"crossref","unstructured":"Mendling, J, Weber, I., van\u00a0der Aalst, W. M. P., vom Brocke, J., Cabanillas, C., Daniel, F., Debois, S., Ciccio, C. D., Dumas, M., Dustdar, S., Gal, A., Garc\u00eda-Ba\u00f1uelos, L., Governatori, G., Hull, R., Rosa, M. L., Leopold, H., Leymann, F., Recker, J., Reichert, M., Reijers, H. A., Rinderle-Ma, S., Rogge-Solti, A., Rosemann, M., Schulte, S., Singh, M. P., Slaats, T., Staples, M., Weber, B., Weidlich, M., Weske, M., Xu, X., & Zhu, L. (2017). Blockchains for business process management\u2014challenges and opportunities. Computing Research Repository (CoRR). arXiv:1704.03610.","DOI":"10.1145\/3183367"},{"key":"5108_CR28","unstructured":"Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 21260."},{"key":"5108_CR29","doi-asserted-by":"crossref","unstructured":"Peters, G. W., & Panayi, E. (2016). Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money. In Banking Beyond Banks and Money (pp. 239\u2013278). Springer.","DOI":"10.1007\/978-3-319-42448-4_13"},{"key":"5108_CR30","doi-asserted-by":"crossref","unstructured":"Rogaway, P., & Shrimpton, T. (2004). Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In International workshop on fast software encryption (pp. 371\u2013388). Springer.","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"5108_CR31","unstructured":"Rudegair, P. (2016). Lendingclub ceo fired over faulty loans. The Wall Street Journal. https:\/\/www.wsj.com\/articles\/lendingclub-ceo-resigns-over-sales-review-1462795070."},{"key":"5108_CR32","unstructured":"Szabo, N. (1994). Smart contracts. Unpublished manuscript."},{"issue":"9","key":"5108_CR33","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1287\/mnsc.1080.0884","volume":"54","author":"C Terwiesch","year":"2008","unstructured":"Terwiesch, C., & Xu, Y. (2008). Innovation contests, open innovation, and multiagent problem solving. Management Science, 54(9), 1529\u20131543.","journal-title":"Management Science"},{"key":"5108_CR34","unstructured":"Trautman, L. J. (2016). Is disruptive blockchain technology the future of financial services?https:\/\/ssrn.com\/abstract=2786186."},{"key":"5108_CR35","unstructured":"Wang, H., Greiner, M. E. (2010). Herding in multi-winner auctions. In International conference on information systems (ICIS) (p. 235)."},{"issue":"12","key":"5108_CR36","doi-asserted-by":"publisher","first-page":"4236","DOI":"10.1287\/mnsc.2016.2531","volume":"63","author":"Z Wei","year":"2016","unstructured":"Wei, Z., & Lin, M. (2016). Market mechanisms in online peer-to-peer lending. Management Science, 63(12), 4236\u20134257.","journal-title":"Management Science"},{"issue":"10","key":"5108_CR37","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"PW Wong","year":"2001","unstructured":"Wong, P. W., & Memon, N. (2001). Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10), 1593\u20131601.","journal-title":"IEEE Transactions on Image Processing"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-022-05108-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10479-022-05108-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-022-05108-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T19:14:31Z","timestamp":1674674071000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10479-022-05108-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,8]]},"references-count":37,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["5108"],"URL":"https:\/\/doi.org\/10.1007\/s10479-022-05108-1","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,8]]},"assertion":[{"value":"21 November 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}