24.07.2014 Views

Secure Implementation Experiments: Do Strategy-proof Mechanisms ...

Secure Implementation Experiments: Do Strategy-proof Mechanisms ...

Secure Implementation Experiments: Do Strategy-proof Mechanisms ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

for the profile v= ( v1, v2 )<br />

f<br />

f<br />

f<br />

is denoted by f( v) = ( y ( v), t ( v))<br />

, where y ( v ) is the level of the<br />

f f f<br />

public good and t ( v) = ( t 1<br />

( v), t 2<br />

( v))<br />

is the transfer vector.<br />

Definition 3. The SCF f is strategy-<strong>proof</strong> if<br />

f f f f<br />

1 1 2 1 1 2 1 1 2 1 1 2<br />

v ( y ( v , ~ v )) + t ( v , ~ v ) ≥ v ( y ( ~ v , ~ v )) + t ( ~ v , ~ v ) for all ~ v ∈V<br />

and ~ v ∈ V ; and<br />

f f f f<br />

2 1 2 2 1 2 2 1 2 2 1 2<br />

1 1<br />

2 2<br />

v ( y ( v , v )) + t ( v , v ) ≥ v ( y ( v , v )) + t ( v , v ) for all ~ v ∈V<br />

and ~ v ∈ V .<br />

1 1<br />

2 2<br />

By the Revelation Principle (Gibbard, 1973), strategy-<strong>proof</strong>ness is necessary for dominant<br />

strategy implementation, and therefore also for secure implementation. However, the following<br />

additional condition, called the rectangular property, is necessary for secure implementation.<br />

Definition 4. The SCF f satisfies the rectangular property if for all vv , ~ ∈ V, if<br />

f f f f<br />

1 1 2 1 1 2 1 1 2 1 1 2<br />

v ( y ( v , ~ v )) + t ( v , ~ v ) = v ( y ( ~ v , ~ v )) + t ( ~ v , ~ v ) and<br />

f f f f<br />

2 1 2 1 1 2 2 1 2 2 1 2<br />

v ( y ( ~ v , v )) + t ( ~ v , v ) = v ( y ( ~ v , ~ v )) + t ( ~ v , ~ v ) ,<br />

then f ( v1, v2 ) = f(~ v , ~ v )<br />

1 2 .<br />

Saijo et al. (2003) show that the rectangular property is necessary and sufficient for sure<br />

implementation: 7<br />

7 To see why the rectangular property is necessary for secure implementation intuitively, suppose that the direct<br />

revelation mechanism g = f securely implements the SCF f. Let n = 2 and ( v1, v2 ) be the true preference profile.<br />

Suppose u1( f( v1, ~ v2)) = u1( f( ~ v1, ~ v2)) , i.e.,<br />

f f f f<br />

(*) v1( y ( v1, ~ v2)) + t1 ( v1, ~ v2) = v1( y ( ~ v1, ~ v2)) + t1 ( ~ v1, ~ v2)<br />

.<br />

In other words, agent 1 is indifferent between reporting the true preference v 1 and reporting another preference ~ v 1<br />

when agent 2’s report is ~ v 2 . Since reporting v 1 is a dominant strategy by strategy-<strong>proof</strong>ness, it follows from (*) that<br />

f f f f<br />

v1( y ( ~ v1, ~ v2)) t1 ( ~ v1, ~ v2) v1( y ( v1, ~ v2)) t1 ( v1, ~ f<br />

f<br />

+ = + v2)<br />

≥ v1( y ( v1′ , ~ v2)) + t1 ( v1′<br />

, ~ v2) for all v1′ ∈V1,<br />

that is, reporting ~ v 1 is one of agent 1’s best responses when agent 2 reports ~ v 2 .<br />

Next suppose that u2( f( ~ v1, v2)) = u2( f( ~ v1, ~ v2))<br />

, i.e.,<br />

f f f f<br />

(**) v2( y ( ~ v1, v2)) + t1 ( ~ v1, v2) = v2( y ( ~ v1, ~ v2)) + t2 ( ~ v1, ~ v2)<br />

.<br />

f f f f<br />

By using an argument similar to the above, it is easy to see that v2( y ( ~ v1, ~ v2)) + t2 ( ~ v1, ~ v2) = v2( y ( ~ v1, v2)) + t2 ( ~ v1, v2)<br />

f<br />

f<br />

≥ v2( y ( ~ v1, v2′ )) + t1 ( ~ v1, v2′<br />

) for all v2′ ∈V2 ,<br />

14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!