Counterfeit Quality and Verication in a Monetary Exchange

Similar documents
The Threat of Counterfeiting in Competitive Search Equilibrium

Heterogeneity and Lotteries in Monetary Search Models

A Unified Framework for Monetary Theory and Policy Analysis

On the Threat of Counterfeiting

Money, Barter, and Hyperinflation. Kao, Yi-Cheng Department of Business Administration, Chung Yuan Christian University

Deceptive Advertising with Rational Buyers

Economic Growth: Lecture 8, Overlapping Generations

The Threat of Counterfeiting in Competitive Search Equilibrium

problem. max Both k (0) and h (0) are given at time 0. (a) Write down the Hamilton-Jacobi-Bellman (HJB) Equation in the dynamic programming

Costly Expertise. Dino Gerardi and Leeat Yariv yz. Current Version: December, 2007

Lecture 19 Search Theoretic Models of Money. Noah Williams

Money and Banking in Search Equilibrium. Ping He. Lixin Huang. Randall Wright

Microeconomics II Lecture 4: Incomplete Information Karl Wärneryd Stockholm School of Economics November 2016

Optimal Monopoly Mechanisms with Demand. Uncertainty. 1 Introduction. James Peck and Jeevant Rampal. December 27, 2017

Monetary Policy, Price Dynamics, and Welfare

COSTLY STATE VERIFICATION - DRAFT

Some Notes on Adverse Selection

Banks, depositors and liquidity shocks: long term vs short term interest rates in a model of adverse selection

Online Appendixes for \A Theory of Military Dictatorships"

5. Externalities and Public Goods. Externalities. Public Goods types. Public Goods

5. Externalities and Public Goods

General idea. Firms can use competition between agents for. We mainly focus on incentives. 1 incentive and. 2 selection purposes 3 / 101

Economic Growth: Lecture 7, Overlapping Generations

Counterfeiting as Private Money in Mechanism Design

EC476 Contracts and Organizations, Part III: Lecture 2

Fixed Term Employment Contracts. in an Equilibrium Search Model

Kiyotaki and Wright (1993)

Data Abundance and Asset Price Informativeness. On-Line Appendix

Advanced Macroeconomics

Advanced Microeconomic Analysis, Lecture 6

Mechanism Design with Financially Constrained Agents and Costly Verication

Notes on Alvarez and Jermann, "Efficiency, Equilibrium, and Asset Pricing with Risk of Default," Econometrica 2000

Monetary Economics: Solutions Problem Set 1

Indeterminacy and Sunspots in Macroeconomics

Government Transaction Policy, the Media of Exchange and Prices

Contagious Adverse Selection

Teoria das organizações e contratos

Controlling versus enabling Online appendix

Macroeconomics IV Problem Set I

1. Money in the utility function (start)

Interviews and the Assignment of Workers to Jobs

Second Welfare Theorem

General Examination in Macroeconomic Theory SPRING 2013

Some Benefits of Cyclical Monetary Policy

Lecture 8: Incomplete Contracts

Informed Principal in Private-Value Environments

Online Appendix for Investment Hangover and the Great Recession

Eco504 Spring 2009 C. Sims MID-TERM EXAM

NTU IO (I) : Auction Theory and Mechanism Design II Groves Mechanism and AGV Mechansim. u i (x, t i, θ i ) = V i (x, θ i ) + t i,

KIER DISCUSSION PAPER SERIES

Optimal Income Taxation and Public-Goods Provision with Preference and Productivity Shocks

Mechanism Design: Dominant Strategies

Price Competition and Endogenous Valuation in Search Advertising

Information and Liquidity

Supplementary Material for \Collusion with Persistent Cost Shocks"

Mechanism Design: Basic Concepts

Deviant Behavior in Monetary Economics

Microeconomic Theory I Midterm October 2017

ECO421: Signaling. Marcin P ski. March 26, 2018

Housing with overlapping generations

Public Provision of Scarce Resources when Preferences are Non-Linear

Competition relative to Incentive Functions in Common Agency

EC487 Advanced Microeconomics, Part I: Lecture 5

Appendix (For Online Publication) Community Development by Public Wealth Accumulation

Search, Money, and Inflation under Private Information

Microeconomic Theory (501b) Problem Set 10. Auctions and Moral Hazard Suggested Solution: Tibor Heumann

Competitive Equilibrium

Capital Structure and Investment Dynamics with Fire Sales

DECENTRALIZED TRADE MITIGATES THE LEMONS PROBLEM

WORKING PAPER NO INTEREST RATE VERSUS MONEY SUPPLY INSTRUMENTS: ON THE IMPLEMENTATION OF MARKOV-PERFECT OPTIMAL MONETARY POLICY

Asset Issuance in Over-The-Counter Markets

IE 5531: Engineering Optimization I

Bertrand-Edgeworth competition with substantial product dierentiation

A Summary of Economic Methodology

EconS Microeconomic Theory II Homework #9 - Answer key

Monetary Mechanisms. Chao Gu. Department of Economics, University of Missouri. Randall Wright

Kevin X.D. Huang and Jan Werner. Department of Economics, University of Minnesota

Getting to page 31 in Galí (2008)

Some Bene ts of Cyclical Monetary Policy

Working Paper Series. Liquidity Premiums on Government Debt and the Fiscal Theory of the Price Level. Aleksander Berentsen and Christopher J.

Monopoly Regulation in the Presence of Consumer Demand-Reduction

Implementability, Walrasian Equilibria, and Efficient Matchings

ECON4515 Finance theory 1 Diderik Lund, 5 May Perold: The CAPM

Competitive Equilibrium and the Welfare Theorems

Standards vs. labels with imperfect competition and asymmetric information

Dynamic Macroeconomic Theory Notes. David L. Kelly. Department of Economics University of Miami Box Coral Gables, FL

Rice University. Fall Semester Final Examination ECON501 Advanced Microeconomic Theory. Writing Period: Three Hours

Online Appendix to A search model of costly product returns by Vaiva Petrikaitė

Design Patent Damages under Sequential Innovation

Bargaining, Contracts, and Theories of the Firm. Dr. Margaret Meyer Nuffield College

Money, Capital and Collateral

Mechanism Design: Bayesian Incentive Compatibility

A Centralized or a Decentralized Labor Market?

On Returns to Scale Assumption in Endogenous Growth

Appendix of Homophily in Peer Groups The Costly Information Case

Dynamic Markets for Lemons: Performance, Liquidity, and Policy Intervention

h Edition Money in Search Equilibrium

A Theory of Financing Constraints and Firm Dynamics by Clementi and Hopenhayn - Quarterly Journal of Economics (2006)

Search, Money, and Inflation under Private Information *

Growing competition in electricity industry and the power source structure

Transcription:

Counterfeit Quality and Verication in a Monetary Exchange Ben S.C. Fung Bank of Canada Enchuan Shao Bank of Canada Preliminary and Incomplete Abstract Recent studies on counterfeiting in a monetary search framework show that counterfeiting does not occur in a monetary equilibrium. These ndings are contrary to what we observe in the real world where counterfeiting of bank notes in some countries have recently experienced rapid increases. In this paper, we construct a model of counterfeiting in which counterfeiting exists as an equilibrium outcome. Our model shows that counterfeiting can exists as an equilbirium outcome when a competitive search environment is employed instead of a random search environment. In the model, sellers post oers and buyers direct their search based on posted oers. Since oers are pooling when sellers are uninformed, buyers can always extract some rents by using counterfeit money. Therefore, counterfeit notes can coexist with genuine notes. In addition to using competitive search, we also explicitly model the interaction between sellers' verication decisions and counterfeiters' choices of counterfeit quality. This allows us to better understand how economic policies can aect counterfeiting. 1 Introduction As the sole provider of currency in Canada, the Bank of Canada aims to supply bank notes that Canadians can use with condence. In the early 2000s, however, there was a sharp increase in counterfeit bank notes in Canada, rising to a peak of almost 500 counterfeit notes detected per million notes in circulation in 2004 from well below 100 The authors would like to thank Guillaume Rocheteau, Steve Williamson, Randy Wright and seminar participants at the Bank of Canada for their comments and useful discussions. The authors alone are responsible for all errors and omissions. bfung@bankofcanada.ca eshao@bankofcanada.ca 1

500 450 400 350 300 PPM 250 200 150 100 50 0 1960 1962 1964 1966 1968 1970 1972 1974 1976 1978 1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 2002 2004 2006 2008 Year Figure 1: Counterfeiting Activities in Canada since 1960 for most of the 1990s see Figure 1). This increase in counterfeiting could threaten the public's condence in bank notes. In response, the Bank of Canada focused its eorts on developing bank notes that are dicult to counterfeit, promoting the deterrence of counterfeiting by law enforcement and prosecutors, promoting the routine verication of bank notes by retailers, and withdrawing worn notes and more vulnerable olderseries notes from circulation. Since 2004, counterfeiting has come down considerably and is now back down to the pre-2000 level. 1 What have caused the rise in counterfeiting and the subsequent decline? What measures are eective in reducing counterfeiting? Given that anti-counterfeiting measures are costly to implement, how important is it to continue to invest in these measures when counterfeiting has subsided? Do macroeconomic variables such as ination have any eects on counterfeiting? How costly is counterfeiting to society? These questions are of interest to policy makers and academics. In order to answer these questions, one approach is to build a monetary model of counterfeiting in which money is not perfectly recognizable and can be counterfeited. The main objective of this paper is to construct a model of counterfeiting in which counterfeiting exists as an equilibrium outcome and to characterize the conditions 1 For a brief discussion of the Canadian experienc of counterfeiting, see for example Bank of Canada 2008) 2

under which such an equilibrium would exist. In addition, we would like to examine how economic policies will aect counterfeiting. 2 The literature on theoretical models of counterfeiting of bank notes is relatively small. In recent years, there has been a relatively large number of papers studying counterfeiting in the context of monetary search models. For example, Kultti 1996) studies the conditions under which a monetary equilibrium can be sustained by extending the search models of Kiyotaki and Wright 1993) while Green and Weber 1996) look at how the introduction of new issue of bank notes aect counterfeiting. Cavalcanti and Nosal 2007) argue that it is optimal to tolerate counterfeiting when transactions are dicult to mornitor and their values are small. Nosal and Wallace 2007) show that counterfeiting is only a threat and does not exist in a monetary equilibrium. However, such a threat could potentially result in the collapse of a monetary equilibrium if the cost of counterfeiting is suciently low. Li and Rocheteau 2008), with a basic set up similar to Nosal and Wallace, argue that despite the threat of counterfeiting there always exists a monetary equilibrium. However, the threat of counterfeiting will instead aect real allocations and thus social welfare. In the base model, Li and Rocheteau also nd no monetary equilibrium with counterfeiting. 3 However, the experiences in Canada discussed above and in other countires suggest that counterfeiting is more than just a threat. Indeed, many countries have experienced a rapid increase in counterfeiting of bank notes followed by a gradual decrease over the last decade or so. To explain such a phenomenon, it is important to have a model in which counterfeiting of bank notes exists as an equilibrium outcome. Our model diers from existing models of counterfeiting in several aspects. First, money is divisible as in Lagos and Wright 2005). In Kultti 1996), Cavalcanti and Nosal 2007) and Williamson 2002), however, money is indivisible and thus counterfeit notes can improve welfare by acting as private money in alleviating the money shortage problem. In Canada and other industrialized countries, money shortage is less likely to be an issue. Second, in our model buyers have to pay a xed cost to produce counterfeit notes, and a higher quality counterfeit note is more costly to produce. In turn, higher quality counterfeit notes are more dicult for the seller to detect. Third, sellers can invest in a verication technology that can detect counterfeit notes with a probability. If a seller does not invest in the technology, she will not be able to tell between genuine and counterfeit notes. The seller's decision may or may not be known to the buyer. Fourth, the market structure is such that sellers post their oers to buyers and thus buyers can direct their search based on the posted oers. Unlike Nosal and Wallace, and Li and Rocheteau, buyers cannot signal to the sellers their types. In this case, there will always be a monetary equilibrium. 2 For example, Green and Weber 1996) examine whether a policy of introducing a new style of currency that is harder to counterfeit but not immediately to withdraw from circulation all of the old issues would be able to reduce counterfeiting. Monnet 2005) studies whether ination would reduce the value of counterfeiting activities. 3 Li and Rocheteau consider two extensions in which counterfeiting can exist in equilbrium. 3

We characterize the conditions under which a monetary equilibrium with counterfeiting will exist for the case where a seller's verication choice is observable as well as the case when this decision is not observable We also nd that a higher rate of ination tends to reduce counterfeiting. This is consistent with the observation that counterfeiting is less likely to be an important problem in high ination countries and that most countries experencing a high level of counterfeiting have relatively low and stable ination. However, a higher cost of verication tends to reduce counterfeiting. This seems counterintuitive. However, since the cost of verication is higher, a seller will enter the market only if there is a higher fraction of buyers using genuine money so that he can make enough money by selling to a buyer. The rest of the paper is organized as follows. The next section describes the model environment. In Section 3, we consider the case when the seller's verication decision is public information. We derive conditions under which counterfeiting can exist in a monetary equilibrium and also study how changes in ination and the cost of verication will aect counterfeiting and the quantities traded. In Section 4, we allow the seller's verication decision to be private information. Section 5 concludes. 2 The Environment The basic economic environment is similar to Rocheteau and Wright 2005). Time is discrete and runs forever. Each period is divided into two sub-periods, day and night, during which the market structure diers. During the day, there is a Walrasian market characterized by competitive trading, while at night there is a search market characterized by bilateral trading. There is a continuum of innitely-lived agents who dier across two dimensions. First, they have private information on some of their own characteristics that will be described in detail later. Second, they belong to one of two groups in the search market, called buyers and sellers. We normalize the measure of buyers to 1. In the Walrasian market all agents produce and consume but in the search market a buyer can only consume and a seller can only produce. This specication on agents' trading roles in the search market generates a lack-ofdouble-coincidence-of-wants problem. Therefore, barter is ruled out. All meetings are assumed to be anonymous which precludes credit. These frictions make a medium of exchange essential in the search market. Goods are perishable while genuine) at money is storable and thus money can potentially be used as a medium of exchange. The stock of money at time t is given by M t and it is perfectly divisible. The money stock grows at a constrant gross rate γ, so that M t+1 = γm t, and new money is injected γ > 1) or withdrawn γ < 1) via lump sump transfers to all agents in the Walrasian market. We restrict attention to policies where γ, where 0, 1) is the discount factor, since it is easy to check that there is no equilibrium otherwise. To examine what happens when γ = which is the Friedman rule, we take the limit of equilibria as γ. Money is perfectly recognizable in the Walrasian market but imperfectly recog- 4

nizable in the search market. The recognizability problem of at money gives a buyer an incentive to produce counterfeits and extract more surplus in the bilateral trade. Buyers can produce counterfeits in any quantity, but they need to choose a quality level of counterfeits at a cost which increases with the quality level. High quality counterfeits are less likely to be detected by the seller than low quality ones. Let h [0, + ) denote the quality level of counterfeits produced by a buyer and H be the economy-wide counterfeit quality. In equilibrium h = H. Denote g h) the cost that a buyer pays to produce counterfeits of quality h. Assume that g : R + R + is an increasing and convex function and satises g 0) = 0. Counterfeits are 100% disintegrated at the end of each period as in Nosal and Wallace 2007) and this shuts down the incentive for sellers to produce or pass counterfeits. A seller can pay a xed utility cost L to invest in a technology or to exert an eort in order to verify a buyer's money holding in a bilateral meeting. If the seller does not pay the cost, he has no information about the type of money held by the buyer. If the seller exerts an eort, he will receive a public signal which reveals a buyer's holding of money according to the following probability 4 : { π h) if the buyer produces counterfeits, π H) otherwise. With the complementary probability 1 π the seller is uninformed. Let ε {0, 1} denote the public signal that a seller receives where ε = 1 indicates that the seller is informed and ε = 0 tells the opposite. Notice that detection is always imperfect and the detection probability depends on the quality of counterfeits but not the quantity. The function π : R + [0, 1] is decreasing and convex. Let a {y, n} be the action that the seller will take where a = y means that the seller invests while a = n implies he does not. The seller's action may or may not be observed by all other agents. We rst consider the case where a is observable, then in the later section we will relax this assumption to allow a to be private information. The corresponding cost with respect to a is therefore { L, if a = y f a) = 0, if a = n. The instantaneous utility of a seller at date t is U s t = v x t ) y t q t f a t ), 4 There are two detection probabilities contingent on whether a buyer produces counterfeits or not. If a buyer produces counterfeits, the seller's detection probability will depend on the individual's quality level of counterfeits. In the case of a buyer who holds only genuine money, however, the detection probability cannot depend on the individual's quality level of counterfeits since the buyer does not produce counterfeits. To be consistent with the assumption of imperfect recognizability of money, it is natural to assume that the detection probability is related to economy-wide counterfeit quality when a seller meets with a genuine money holder. Of course, in equilibrium these two probabilities are equal. 5

where x t is the quantity consumed and y t is the quantity produced during the day, q t is production at night. Lifetime utility for a seller is t=0 t Ut s. We assume that v x) > 0, v x) < 0 for all x, and there exists x > 0 such that v x ) = 1. Similarly, the instantaneous utility of a buyer is U b t = v x t ) y t + u q t ) g h t ) I {i=c}, where q t is the quantity consumed at night and I is the indicator function which is equal to 1 if the buyer chooses to produce counterfeits i = c) or 0 if the buyer holds only genuine money i = g). Lifetime utility for a buyer is t=0 t Ut b. Assume that u 0) = 0, u 0) = +, u q) > 0, and u q) < 0. There exists q and q > 0 such that u q) = q and u q ) = 1. The terms of trade are determined in the competitive search market in the spirit of Moen 1997) and Rocheteau and Wright 2005). Each seller decides whether to incur a cost to detect before entering the search market. Prior to the search process, each seller simultaneously posts an oer that species the terms at which buyers and sellers commit to trade. Specically, an oer is a schedule {qε, i d i ε} specifying the quantity traded qε i and the total monetary payment d i ε conditional on the realization of the verication signal ε and the buyer's type i. 5 In principle, the oers can be dierent across dierent types of sellers. We will discuss oers in detail when we describe the equilibrium concepts.) Buyers then observe all the posted oers and direct their search towards those sellers posting the most attractive oer. The set of sellers posting the same oer and the set of buyers directing their search towards them form a sub-market. In each sub-market, buyers and sellers meet randomly according to the matching function discussed below. When a buyer and a seller meet, the buyer decides to either accept the oer and commit to the terms it species, or abandon all trade. If the oer is accepted, the signal is realized and the buyer purchases qε i units for d i ε dollars. The probability that a buyer and a seller are paired o is independent of buyer's or seller's type. To focus on the informational frictions and to avoid unnecessary complications, we assume that individuals experience at most one match and that matching is ecient, meaning that the short-side of the market is always served in each sub-market. The probability that a buyer matches a seller is then α b θ j ) = min 1, θ 1 j ), 1) where θ j is the ratio of buyers over sellers in sub-market j, or the market tightness. Similarly, the probability that a seller matches a buyer is α s θ j ) = min 1, θ j ). 2) 5 The oer does not include the amount of counterfeits because counterfeits have no value and sellers are not willing to accept them. 6

Monetary transfers Sellers choose verification efforts Sellers post offers Random matching Verification CM DM Buyers decision on counterfeiting Centralized trade and choice of money balances Buyers search directly Bilateral trade Figure 2: Timing of Events in a period The timing of events in a period is summarized in Figure 2. At the beginning of each period, money is transferred from or back to the government. After that, buyers decide whether to produce counterfeits or not and if so, what quality of counterfeits to produce. This decision is private information. Sellers decide whether to invest in the verication technology. This decision may or may not be observable and we will consider both cases below. After that, sellers post their oers for the night market. Then the Walrasian market opens in which agents consume and produce as well as adjust their money balances. When night falls, the Walrasian market closes, and the competitive search market opens. Sub-markets are formed as a result of the competitive search process. When a buyer and a seller meet in a sub-market, the buyer chooses whether to accept or reject the oer. If the oer is accepted, the buyer hands in his holdings of money to the seller for verication. Then the seller veries and becomes informed or not depending on the signal that he receives. The pair trades according to the pre-specied terms of trade: the payment is made; the seller produces; and the buyer consumes. After matches are terminated, all agents learn the type of their money holdings and all counterfeits disintegrate. Remark 1. In the bilateral trading, once the buyer has surrendered his money holdings to the seller for verication, he does not have an incentive to take them back and replace any genuine money with counterfeits, even if he now learns that the seller cannot verify. It is because by doing so, he is signaling to the seller that the bank notes he is now giving the sellers are fake. Clearly no trade will occur since sellers never accept counterfeits willingly. Therefore, once buyers have accepted the oer, they will leave whatever money that they held on the table. This immediately implies that if a buyer decides to produce counterfeits with quality h > 0, he will not spend any genuine notes in the search market, i.e., genuine notes and counterfeits are not 7

combined together as a payment. The reason is that combining genuine and counterfeit notes does not increase the chance that counterfeits can pass through. Since the buyer has already incurred the sunk cost of producing counterfeits, the above strategy is strictly dominated by holding the same amount of genuine notes but producing no counterfeits or counterfeits with quality h = 0). Hence, we can further restrict the strategy space for buyers such that they will not hold a portfolio of genuine and counterfeit notes. In other words, if a buyer produces counterfeit notes, he will use only counterfeits to buy goods in the search market. 3 One-sided Incomplete Information In this section, we look at the case where sellers' decisions on verication are observable. We rst show that there is no separating oer when sellers are uninformed in order to rene the choice set and simplify the notation. Lemma 1. There is no separating oer when sellers are uninformed, i.e. q g 0 = q c 0 = q 0. When sellers are informed, there is no trade between a seller and a counterfeiter, i.e. q c 1 = 0. Let P t be the fraction of genuine money holders in the economy and Wt b m t ) be the value function of a buyer who enters the Walrasian market at time t holding m t units of money. 6 Since the buyer needs to choose whether to produce a counterfeit or not, his value function at the start of each period is W b t m t ) = max p t [p t W g t m t ) + 1 p t ) W c t m t )], 3) where W g and W c represent the value functions of being a holder of genuine money or a counterfeiter respectively, and p is the choice on counterfeits or holding genuine money). In equilibrium p = P. The optimal decision on P must satisfy P = 1 if W g > W c, P = 0 if W g < W c, 4) P 0, 1) if W g = W c. Denote the buyer's value function of carrying ˆm t dollars into the search market of period t by V g t ˆm t ) if he uses only genuine notes, or Vt c ˆm t ) otherwise. Similarly, Wt s m t ) and Vt s ˆm t ) are the corresponding value functions for the seller. Let the price of the consumption good in the Walrasian market be normalized to 1 and denote the price of a dollar in units of consumption in period t by φ t. The value of the agent 6 To simplify the notation, we suppress all aggregate state variables but a money holding into a subscript t for all the value functions through out the paper. 8

j {s, g, c} in the Walrasian market is W j t m t ) = max x t,y t, ˆm t [ v xt ) y t + V j t ˆm t ) ], 5) s.t. x t + φ t ˆm t = y t + φ t m t + τ t ), 6) where τ t is the nominal monetary transfers to or from) the agent. 7 Because utility is quasi-linear, the budget constraint 6) can be substituted into the objective function 5), so that the problem simplies to W j t m t ) = max x t, ˆm t [ v xt ) x t φ t ˆm t m t τ t ) + V j t ˆm t ) ]. 7) Thus, it follows that for j {s, g, c} 1. the optimal choice of x t is independent of m t with v x t ) = 1, so x t = x ; 2. the optimal choice of ˆm t is also independent of m t, and is determined by maximizing V j t ˆm t ) φ t ˆm t ; 3. the value functions W j t m t ) are linear in m t and can be rewritten as W j t m t ) = W j t 0) + φ t m t. The value functions of buyers and sellers at night depend on the submarket they visit in equilibrium, and on the money holdings they take into this sub-market. All agents have rational expectations regarding the number of buyers will be attracted by each oer that sellers post, and thus about the market tightness in each submarket. Buyers know the type of sellers that they will meet and sellers have beliefs on the fraction of genuine money holders in each sub-market. The set of oers posted in equilibrium must be such that sellers have no incentives to post deviating oers. Therefore, a sub-market is characterized by sellers' type a, the fraction of genuine money holders P a, a market tightness θ a, and an oer {qε, i d i ε} a. Let Ω be the set of all sub-markets that are active in equilibrium. An element ω Ω is then a list ω = {a, P a, θ a, {qε, i d i ε} a }. Competition between sellers on posting will force the value of all active sub-markets to be equal. The following lemma shows that the only active sub-market at night is where the sellers choose to invest in the verication technololgy: a = y. Lemma 2. The only active sub-market in equilibrium is the one where a = y. Any incentive compatible oers must satisfy Lemmas 1 and 2. Given this fact we can write down the value function for the sellers at night as Vt s ˆm t ) = max {V y t ˆm t ), Vt n ˆm t )} 7 The choices of x t, y t and ˆm t are conditional on j, but we omit the superscript to ease notation. 9

where Vt n ˆm t ) = Wt+1 s ˆm t ) = [ φ t+1 ˆm t + Wt+1 s 0) ], and [ π V y Ht ) q t ˆm t ) = L + α s 1t + Wt+1 s ˆm t + d 1t ) ) θ t ) P t + 1 π H t )) q 0t + W s t+1 ˆm t + d 0t ) ) + α s θ t ) 1 P t ) [ 1 π h t )) q 0t ) + W s t+1 ˆm t ) ] + 1 α s θ t )) W s t+1 ˆm t ) = L + α s θ t ) P t [ π Ht ) q 1t + φ t+1 d 1t ) + 1 π H t )) q 0t + φ t+1 d 0t ) + α s θ t ) 1 P t ) [1 π h t )) q 0t )] + [ φ t+1 ˆm t + Wt+1 s 0) ] If a seller chooses not to verify, she will attract only the buyers who have produced counterfeit notes of the lowest quality. Not willing to accept counterfeits since they will completely disintegrate at the end of the period, the seller will not trade at all. When a seller exerts an eort in verication, he will have to pay a cost L. With probability α s θ t ), he will meet with a potential buyer. Conditional on a successful match, the seller will produce for genuine money with probability P t. With probability 1 P t, the seller will meet with a counterfeiter and will suer a loss only when he is uninformed. Notice that to derive 8), we use the fact that Wt+1 s ˆm t ) is linear with slope φ t+1. Combining 7) and 8), the optimal choice of ˆm t solves max φ t+1 φ t ) ˆm t. ˆm t 0 ] ]. 8) The solution exists if and only if the ination rate φ t /φ t+1 >. In this case ˆm t = 0 and the seller will not carry money to the search market because he cannot derive any benet from holding money. Similarly, the value functions for a buyer at night are V g t ˆm t ) = α b θ t ) [ π Ht ) u q 1t ) + W b t+1 ˆm t d 1t ) ) + 1 π H t )) u q 0t ) + W b t+1 ˆm t d 0t ) ) + 1 α b θ t ) ) Wt+1 b ˆm t ) [ ] π = α b Ht ) u q 1t ) φ t+1 d 1t ) θ t ) 9) + 1 π H t )) u q 0t ) φ t+1 d 0t ) + [ φ t+1 ˆm t + Wt+1 b 0) ] s.t. d 1t ˆm t, 10) d 0t ˆm t. 11) if he is holding genuine money, and V c t ˆm t ) = max h t g h t ) + α b θ t ) 1 π h t )) u q 0t ) + W b t+1 ˆm t ) = max g h t ) + α b θ t ) 1 π h t )) u q 0t ) + [ φ t+1 ˆm t + Wt+1 b 0) ] 12) h t 10 ],

if he is a counterfeiter. The counterfeiter can extract the information rent from a seller who is uninformed about the quality of his notes. Again, combining 7) and 12) shows that the counterfeiter carries no money to the search market. The optimal choice of h is given by the following rst order condition: g h t ) = π h t ) u q 0t ) α b θ t ). 13) Plug the value functions at night into the value function at the beginning of the day, the daytime values for buyers and sellers can be reduced as the following W b t m t ) = v x ) x + φ t m t + τ t ) + W b t+1 0) + max p t [p t S g t + 1 p t ) S c t ], W s t m t ) = v x ) x + φ t m t + τ t ) + W b t+1 0) + max {0, S y t }. Here S j, j {g, c, y}, represents the expected trade surpluses of an agent at night which can be written as [ ] π S g t = α b Ht ) u q 1t ) φ t+1 d 1t ) θ t ) φ t φ t+1 ) ˆm t, + 1 π H t )) u q 0t ) φ t+1 d 0t ) St c = α b θ t ) 1 π h t )) u q 0t ) g h t ), [ ] π Ht ) q S y t = α s P 1t + φ t+1 d 1t ) θ t ) t + 1 π H t )) q 0t + φ t+1 d 0t ) L. 1 P t ) 1 π h t )) q 0t Given the surpluses, condition 4) on P can be written as P = 1 if S g > S c, P = 0 if S g < S c, P 0, 1) if S g = S c. 14) Conne our attention to symmetric steady state equilibrium where the real money balance remains constant. Thus, φ t+1 M t+1 = φ t M t implies that the ination rate equals the money growth rate: φ t /φ t+1 = γ. Let S j be the equilibrium expected surplus at night for j {g, c, y}. We dene the competitive search equilibrium as follows. Denition 1. A competitive search equilibrium consists of value functions W b and W s, a set { Ω, S g, S c, S y }, aggregate states P and H, a price φ, and individual's decisions on p and h, such that, for all ω Ω, 1. Symmetry: p = P and h = H. 2. The buyers' optimal choice of P must satisfy 14). 3. The quality of counterfeits should satisfy 13). 11

4. All genuine money holders attain the same expected surplus S g 0. 5. All counterfeiters attain the same expected surplus S c 0. 6. Free entry implies sellers' expected surplus equal to 0. 7. The list ω solves the following program: π H) u q 1 ) φ ) α b θ) γ d 1 S g = max + 1 π H)) u q 0 ) φ ) θ,q 0,q 1,d 0,d 1, ˆm γ d 0, 15) γ ˆmφ t γ s.t. d 0 ˆm, 16) d 1 ˆm, 17) S c = α b θ) 1 π H)) u q 0 ) g H), 18) π H) φγ ) d 1 q 1 S y P = α s θ) + 1 π H)) φγ ) d L 0 q 0 1 P ) 1 π H)) q 0 = 0. 19) Conditions 1 to 6 are straightforward. Since the same type of buyers have identical payo functions, they must attain the same expected surplus. Given that sellers are free to enter any one of the active submarkets, in equilibrium the expected surplus of a seller must be zero. Condition 7 results from a combination of optimal behavior and competition among sellers when they post oers. According to this condition, sellers cannot post oers that attract more genuine money holders without making himself worse o. Since there are innitely many counterfeiters entering the submarket as well, each sellers takes S c as given. Sellers also realize that the ratio θ is going to adjust endogenously so that 18) and 19) hold. To characterize the equilibrium, we rst state the following lemma to describe two properties of the program in 15) to 19). Lemma 3. The optimal payments are uniform and satisfy: d 0 = d 1 = ˆm. The intuition is rather simple. Since carrying money is costly for genuine money holders, buyers will carry just enough money when entering the search market to cover their largest possible payment. If the two payments are dierent, then there exists a linear combination of the two payments such that a buyer can carry less money and thus better o while satisfying all the constraints. 12

Lemma 4. Buyers and sellers trade with probability one in any active submarket: θ = α b θ) = α s θ) = 1. We can further simplify the program using Lemma 3 and 4 to show the rst proposition regarding the property of posted prices in equilibrium. Proposition 1. In any monetary equilibrium with counterfeiting, q 0 q 1 for any P 0, 1). The intuition behind Proposition 1 is straightforward. Given Lemma 3, a seller will charge the same amount of payment whether he is informed or not. However, if the seller cannot recognize the quality of the buyer's money holding, he must produce no more than post at least as high a price as in) the case when he is informed, in order to compensate for the risk that he may receive counterfeit notes. Next we are going to characterize the conditions under which a monetary equilibrium exists. Proposition 2. A monetary equilibrium exists if and only if γ, L) A, where { A γ, L) [, + ) 0, + ) u π 0) q 1 ) γ ) q 1 γ } L, 20) and q 1 satises u q 1 ) = γ. 21) Moreover, a monetary equilibrium with counterfeiting exists if and only if γ, L) int A). If the seller oers q 0 = 0 and q 1 > 0, buyers have no incentive to use counterfeits. In this case, a monetary equilibrium will exist only if the surplus of using genuine money is non-negative. Proposition 3. Suppose γ, L) int A), for any given L, there is a monetary equilibrium with counterfeiting such that 1. dp/dγ > 0 for given q 0 ; 2. dq 0 /dγ < 0 for given P. Proposition 3 says that a higher money growth rate and thus ination will increase the share of buyers using genuine money and lower the quantity traded when the seller is uninformed. In other words, higher ination tends to reduce counterfeiting. Proposition 4. Suppose γ, L) int A), for any given γ, there is a monetary equilibrium with counterfeiting such that 13

1. dp/dl > 0 for given q 0 ; 2. dq 0 /dl < 0 for given P. Proposition 4 says that a higher cost of verication for the seller leads to a higher share of buyers using genuine money and a lower quantity traded when the seller is uninformed. The latter result is rather straightforward. The former result, however, appears to be counterintuitive as one would expect a higher cost of verication will result in fewer verication and thus more counterfeiting. Since counterfeit notes are worthless to the sellers, they can gain from trade only if the buyer uses genuine money. If a seller does not verify, only counterfeiters will be attracted to the submarket. Therefore, a higher cost of verication implies that there must be more buyers using genuine money in order to entice sellers to participate in the decentralized market. tbc) Finally, we look at the policy that makes the bank notes more dicult to counterfeit. To do that, assume the cost function takes the form g h) = δg 0 h) where g 0 > 0, g 0 > 0 and δ > 1 is the policy parameter that represents the security features of bank notes. That is, higher the δ, more security features of a bank note and more dicult to counterfeit. The following proposition shows the two sided eects of such a policy. Proposition 5. For any given γ, L) int A), the eect of a change in δ is 1. dp/dδ > 0 for given H; 2. dp/dδ < 0 for given q 0. Intuition, policy implication: such policy needs to be combine with policies on verication. tbc) 4 Two-sided Incomplete Information Now we consider the case when the seller's decision on verication is not public information. In order for the seller to truthfully reveal whether he is informed or not, there should be no gain by pretending to be uninformed when indeed he is informed. Thus we have the following incentive compatibility constraint: π q 0 P q 1 ) = L. 22) Proposition 6. In any pooling monetary equilibrium with counterfeiting, P q 1 q 0 q 1 for any P 0, 1). 14

A pooling monetary equilibrium exists if and only if γ, L) B, where πu q 1 ) γ B γ, L) [, + ) 0, + ) q 1 + g γ L π ), 23) L u π + q 1 π + g = 0 and q 1 satises 21). Moreover, monetary equilibrium with counterfeiting exists if and only if γ, L) int B). [tbc] Assumption 1. For any q 0, q ], qu /u > 1 π, where π = π H q )) satises u q ) π H) + g H) = 0. [tbc] Proposition 7. Under assumption 1, the pooling equilibrium with counterfeiting has the following properties: 1. dp/dγ > 0, and dh/dγ < 0; 2. dp/dl > 0, and dh/dl < 0; 3. dp/dδ < 0, and dh/dδ > 0. 5 Conclusion In this paper, we have constructed a monetary search model in which money is not perfectly recognizable and thus can be counterfeited at a cost. We show that, under certain fairly general conditions, a monetary equilibrium with counterfeiting will exist. This result is more consistent with the recent observation that in a number of countries counterfeiting of bank notes have experienced sharp increases. Our model diers from other existing search model of counterfeiting by using a competitive search environment rather than the typical random search setup. There are, however, several assumptions in our model that may be too restrictive; for example, counterfeit notes cannot circulate across periods and thus there is no incentive for sellers to accept counterfeits. In practice, however, counterfeit bank notes tend to circulate for a short while before they are detected and sent to law enforcement agencies. In other words, sellers may accept counterfeit notes either knowingly or unknowingly. In the former case, counterfeit notes may have some value in facilitating exchanges. In future extensions, it will be of interest to consider the case that counterfeit notes disintegrate at a rate less than one. Thus it may be possible to determine the passing rate of counterfeit notes in the economy and the stock of counterfeit notes in circulation. 15

A Appendix A.1 Proof of Lemma 1 Proof. Sellers do not produce in exchange for a counterfeit because by assumption, counterfeits have no future values. Therefore if a seller posts a separating oer when he is uninformed then a holder of counterfeits can gain by duplicating the strategy of the holder of genuine money. The equilibrium cannot be sustained. A.2 Proof of Lemma 2 Proof. Suppose by contradiction that there exists an active submarket with a = n. This implies that uninformed sellers produce for genuine money. But then, buyers can gain by paying with counterfeits of the lowest quality because they know for sure that sellers cannot verify, a contradiction. A.3 Proof of Lemma 3 Proof. First notice that either one of the liquidity constraints in 16) and 17) must bind and ˆm = max {d 0, d 1 }. Then by contradiction, suppose d 0 d 1 for any oer {q 0, d 0 ), q 1, d 1 )} in equilibrium. Take ˆd = πd 1 + 1 π) d 0 < max {d 0, d 1 } = ˆm. Consider another oer where the same amount of goods are produced, but the required payments are d 0 = d 1 = ˆd. It is easy to check that this oer satises all the constraints from 16) to 19), but makes the genuine money holder better o because he can choose ˆm = ˆd < ˆm. That is the genuine money holder can save on the cost of carrying money, a contradiction. A.4 Proof of Lemma 4 Proof. Suppose θ > 1 in equilibrium for any {q 0, q 1, d}. This implies that α b θ) < 1 and α s θ) = 1. Consider an arbitrary θ 1, θ) such that α b θ ) > α b θ). Fix the same payment d, we can nd a pair q 0, q 1) together with θ to satisfy constraints 16) to 19). Specically, this can be done by choosing q 0 and q 1 to satisfy S c = α b θ ) 1 π) u q 0) g, 0 = P πq 1 + 1 π) q 0 + P φ/γ)d L. Thus we can nd q 0 and q 1 such that q 0 > q 0 and q 1 < q 1. By doing so, the genuine money holder can gain since α b θ ) πu q 1) > α b θ) πu q 1 ) and all other terms remain the same in 15). Because θ is arbitrary, this contradicts that the claim that θ > 1 is optimal. Next suppose θ < 1 in equilibrium which implies that α b θ) = 1 and α s θ) < 1. Similar argument can be applied: for given arbitrary θ θ, 1), we can nd d < d 16

and q 0, q 1 ) are xed so that all the constraints hold but the genuine money holder is strictly better o, a contradiction. A.5 Proof of Proposition 1 Proof. Using the fact that d 0 = d 1 = ˆm and α b = α s = 1, the problem 15) to 19), can be rewritten as { max π H) u q 1 ) + 1 π H)) u q 0 ) γ } q 0,q 1 P [L + P π H) q 1 + 1 π H))q 0 ] 24) s.t. S c = 1 π H)) u q 0 ) g H). 25) The objective function is obtained by substituting 19) into 15) and eliminating the payment ˆm. The rst order conditions for q 1 and q 0 are u q 1 ) = γ, 26) u q 0 ) = γ P 1 + λ), 27) where λ is the Lagrange multiplier of 25). Suppose on the contrary that q 0 > q 1 for any given P 0, 1) in equilibrium. 26) and 27) implies that 1/ [P 1 + λ)] < 1 < 1/P. We will show that if a seller deviates from q 0, q 1 ) by oering q 0, q 1) such that q 0 = q 0 ε and q 1 = q 1, for any arbitrary small ε > 0, he will attract all the genuine money holders by making the buyers using genuine money better o and those using counterfeits worst o. In this case, P = 1 in his submarket and this leads to a contradiction. First, we consider the eect of such a deviation by the seller on counterfeiters. From 13) since H is a function of q 0 and dh/dq 0 > 0, H q 0) < H q 0 ). Hence π H q 0)) > π H q 0 )). Thus this results in a lower counterfeiter's surplus. Second, consider the eect of such a deviation on buyers holding genuine money. Let q = arg max q {u q) γ/p )q} for any given P 0, 1). q must satisfy u q ) = γ P > γ = u q 1 ). By the concavity of u, it must be true that q 1 > q and u q 1 ) γ/)q 1 > u q ) γ/p )q. Since q 0 > q 0 > q 1, it follows that q 0 > q 0 > q 1 > q and thus u q 0 ) γ P q 0 < u q 0) γ P q 0 < u q ) γ P q < u q 1 ) γ q 1. 17

γ P q γ q uq) q 1 q q 0 q 0 Figure 3: Properties of function u The inequalities hold because of the concavity of u as well. See Figure 3 for illustration. Then we have the following results for the surplus of genuine money holders. S g = π u q 1 ) γ ) q 1 + 1 π) u q 0 ) γ ) P q 0 γ P L, < π u q 1) γ ) q 1 + 1 π) u q 0) γ ) P q 0 γ P L, < π u q 1) γ ) q 1 + 1 π ) u q 0) γ ) P q 0 γ P L, = S g. Therefore, the oer q 0, q 1) will make the holder of genuine money better o and the holder of counterfeits worse o which contradicts q 0, q 1 ) being an equilibrium. A.6 Proof of Proposition 2 Proof. A monetary equilibrium exists only if P > 0, i.e., some buyers would prefer to use genuine money. This requires that S g S c. From 22) and 6), it means that S g S c = π H) u q 1 ) γ ) q 1 + g H) γ P 1 π H)) q 0 γ L 0, 28) P where q 1 satises 21). Notice that from 13), H can be solved as a function of q 0, and more importantly dh/dq 0 > 0 and H 0) = 0. Thus, let : R + R + be a 18

function of q 0 which represents the left hand side of 28): q 0 ) = π H q 0 )) u q 1 ) γ ) q 1 + g H q 0 )) γ P 1 π H)) q 0 γ P L. Clearly is dierentiable. For any q 0, d = π H u q 1 ) γ ) dq 0 q 1 + g H γ γ 1 π) + P P π H q 0, = π H [u q 1 ) γ ) q 1 u q 0 ) γ )] P q 0 γ 1 π). P The second equality uses the fact that g = u q 0 ) π from 13). Since q 1 is the maximum of u q) γ/q and P 1, u q 1 ) γ/q 1 ) > u q 0 ) γ/q 0 ) u q 0 ) γ q P 0 Because π < 0 and H > 0, we conclude that d /dq 0 < 0. Suciency. If q 0 = 0, then S c = 0. Suppose 0) = π 0) u q 1 ) γ/q 1 ) γ/l 0, then S g 0 and thus P = 1. By the continuity of it is possible to nd a q 0 in the open neighborhood of 0 such that q 0 ) 0. Necessity. Obviously, if 0) < 0, then for any q 0, q 0 ) < 0) < 0 which violates condition 28). The sucient and necessary conditions for the existence of a monetary equilibrium with counterfeiting is S g = S c which implies P π H) u q 1 ) γ q 1 ) + P g H) γ 1 π H)) q 0 = γ L, 29) ). for some P 0, 1). Denote left hand side of 29) by q 0, P ). Taking the derivative of with respect to q 0 and P, we can see that is strictly decreasing in q 0 and strictly increasing in P, hence 0, 1) = max q0,p ) q 0, P ). Notice that q 0, 0) < γ/l for any q 0 > 0, if 0, 1) > γ/l, then by the mean value theorem, we can nd q 0, P ) in the open neighborhood of 0, 1) such that 29) holds and equilibrium exists. When 0, 1) γ/l, no monetary equilibrium with counterfeiting exists because q 0, P ) < 0, 1) γ/l for all P < 1. A.7 Proof of Propositions 3 and 4 Proof. The equilibrium conditions for the monetary equilibrium with counterfeiting are summarized by equations 29), 21) and 13). For given q 0, rewrite 29) as [ P π H q 0 )) u q 1 ) γ ) ] q 1 + g H q 0 )) = γ [L + 1 π H q 0))) q 0 ]. 30) Notice from 13), H is xed for given q 0, so is π and g. If γ increases, the right hand side of 30) rises. By the concavity of u, the term inside the bracket of the left 19

hand side of 30) decreases as γ. Therefore to keep the equality of 30), P must go up. Similarly, if L goes up, P will rise as well. We establish that dp/dγ > 0 and dp/dl > 0. For given P, totally dierentiate 30), we have dq 0 dγ = < 0 P πq 1 + L + 1 π) q [ ) ) 0 ] } {π h P u q 1 ) γ q 1 P u q 0 ) γ q 0 + 1 P ) γ q 0 γ 1 π) and dq 0 dl = γ [ ) ) ] } {π h P u q 1 ) γ q 1 P u q 0 ) γ q 0 + 1 P ) γ q 0 γ 1 π) < 0 A.8 Proof of Proposition 5 Proof. Rewrite equation 13) as δg 0 H) = π H) u q 0 ). For given H, q 0 is increasing in δ, while H is decreasing in δ. Therefore, dp/dδ > 0 is derived immediately from 30) for any given H. However if q 0 is xed, from 30) we obtain ) dp dh = π [P Hence dp/dδ < 0. u q 1 ) γ q 1 A.9 Proof of Proposition 6 π u q 1 ) γ q 1 + g ) ) ] > 0. P u q 0 ) γ q 0 + 1 P ) γ q 0 Proof. The pooling outcome must satisfy the seller's incentive compatibility constraint 22). Since L 0, it requires that q 0 P q 1 for given P. q 0 q 1 follows from Proposition 1. The pooling equilibrium exists if and only if S g S c and the seller has no incentive to break the pooling oer. This implies P π u q 1 ) γ q 1 ) + P g γ 1 π) q 0 γ L, 31) π q 0 P q 1 ) = L, 32) where q 1 satises 21). P < 1 and the rst inequality becomes = if S g = S c. Replace q 0 in 31) using 32), we have πp πu q 1 ) γ ) q 1 + g γ L. 33) 20

The rst order condition on H suggests ) L u π + P q 1 π + g = 0. 34) Therefore, 33) and 34) consist of a sucient and necessary condition for the existence of pooling equilibrium. We want to show that conditions in set B at 23) satises 33) and 34). Obviously, if γ, L) B, the above condition is automatically satised by setting P = 1, i.e., monetary equilibrium without counterfeiting. For the case P < 1, it requires that πp πu q 1 ) γ ) q 1 + g = γ L. 35) Because from 34), H can be written as a function of P, the left hand side of 35) can be written as a function of P as well. Denote it as P ). We want to prove that P ) = γ/l has a solution for some P 0, 1). Since 0) < γ/l and 1) > γ/l if γ, L) int B), using the mean value theorem, there is a P 0, 1) such that Equation 35) holds. A.10 Proof of Proposition 7 Proof. The equilibrium conditions for a pooling outcome can be written as P π H) u q 1 ) γ ) q 1 + g H) γ L = 0, 36) π H) u q 1 ) γ = 0, 37) π H) g H) + 1 ) L u πh) 1 = 0, 38) by collecting 21), 31) and 34). Let F P, q 1, H) be the left hand side of the above equation system. γ and L are the parameters. The derivative matrix of F with respect to γ, L) is P q 1 L γ g π π 0 D γ,l,δ) F = 1 0 0 0 u q 0 ) u 2 q 0 π )π δ 2 g 0 where q 0 = L/π + P q 1, and g 0 = g/δ. While the Jacobian matrix of the system with respect to P, q 1, H) is ) πu q 1 ) γ q 1 + g P πu q 1 ) γ P π u q 1 ) + g ) + γl π π 2 D P,q1,H)F = 0 u q 1 ) 0. u q 0 ) q u 2 q 0 ) 1 u q 0 ) P u q 0 )π L u 2 q 0 ) u 2 q 0 π g π g )π 2 g 2 21,

The determinant of D P,q1,H)F is det D P,q1,H)F ) πu q 1 ) γ ) ) u = u q 1 ) q q 0 ) π L 1 + g u 2 q 0 ) π π g π g 2 g 2 [ + P π u q 1 ) + g ) + γl ] u q 0 ) π 2 π u 2 q 0 ) q. 1 From 36), πu q 1 ) γ q 1 + g > 0. And from 38), P π u q 1 ) + g ) = P π u q 1 ) u q 0 )) < 0 since q 1 > q 0 in equilibrium. Together with π < 0, π > 0, g > 0, g > 0, u > 0 and u < 0, we can see that det D P,q1,H)F ) > 0. Apply the implicit function theorem, we have dp dγ = 1 det D P,q1,H)F ) [ P q 1 L ) u q 1 ) + P πu q 1 ) γ π ) u q 0 ) π L u 2 q 0 ) π π g π g 2 g 2 ] + P u q 0 ) u 2 q 0 ) The rst term in the bracket is negative because P q 1 L ) u q 1 ) + P π = P q 1 L π [ P π u q 1 ) + g ) + γl π 2 π πu q 1 ) γ ) ) u q 1 ) + P πu q 1 ) u q 1 )) = P [ q 1u q 1 ) 1 π) u q 1 )] L π u q 1 ) > 0 The last inequality follows by the assumption 1: dp dl = 1 det D P,q1,H)F ) q 1 u q 1 ) /u q 1 ) > 1 π > 1 π. )] The second term in the bracket is also negative. Then, dp/dγ > 0. Similarly, ) γ u q 0 ) π L π u q 1 ) u 2 q 0 ) π π g π g 2 g 2 > 0. + u q 0 ) u q 1 ) u 2 q 0 ) π 22 [ P π u q 1 ) + g ) + γl π 2 π. ],

dp dδ = < 0 1 det D P,q1,H)F ) u g 0 u q 0 ) π L q 1 ) π u q 1 ) δ 2 g 0 ) u 2 q 0 ) π π g π g 2 g [ 2 P π u q 1 ) + g ) + γl π 2 π ] dh dγ = < 0 1 det D P,q1,H)F ) [ u q 0 ) q 1 u 2 q 0 ) + u q 0 ) P u 2 q 0 ) P q 1 L ) u q 1 ) + P π πu q 1 ) γ ) q 1 + g πu q 1 ) γ )], and dh dl = 1 det D P,q1,H)F ) dh dδ = 1 det D P,q1,H)F ) γu q 1 ) u q 0 ) q 1 πu 2 q 0 ) + u q 0 ) u q 1 ) πu 2 q 0 ) πu q 1 ) γ q 1 + g g 0 u q 1 ) u q 0 ) q 1 πu 2 q 0 ) + π u q 1 ) πu q δ 2 g 0 1 ) γ q 1 + g ) < 0 ) > 0 23

References Cavalcanti, Ricardo and Ed Nosal, Couterfeiting as Private Money in Mechanism Design, 2007. Federal Reserve Bank of Cleveland. Green, Edward J. and Warren E. Weber, Will the New 100 Dollar Bill Decrease Counterfeiting, Federal Reserve Bank of Minneapolis Quaterly Review, 1996, 20, 310. Kiyotaki, Nobuhiro and Randall Wright, A Search-Theoretic Approach to Monetary Economics, American Economic Review, 1993, 83, 6377. Kultti, Klaus, A Monetary Economy with Couterfeiting, Journal of Economics, 1996, 63, 175186. Lagos, Ricardo and Randall Wright, A Unied Framework for Monetary Theory and Policy Analysis, Journal of Political Economy, 2005, 113 3), 463484. Li, Yiting and Guillaume Rocheteau, On the Threat of Counterfeiting, November 2008. University of California, Irvine. Moen, Espen R., Competitive Search Equilibrium, Journal of Political Economy, 1997, 105 2), 385411. Monnet, Cyril, Counterfeiting and Ination, August 2005. Bank. European Central Nosal, Ed and Neil Wallace, A Model of the threat of) counterfeiting, Journal of Monetary Economics, 2007, 54, 9941001. Rocheteau, Guillaume and Randall Wright, Money in Search Equilibrium, in Competitive Equilibrium, and in Competitive Search Equilibrium, Econometrica, 2005, 73, 175202. Williamson, Stephen D., Private Money and Couterfeiting, Federal Reserve Bank of Richmond Economic Quarterly, 2002, 88, 3757. 24