Verifiable and non-verifiable anonymous mechanisms for regulating a polluting monopolist

被引:4
|
作者
Prieger, James E. [1 ]
Sanders, Nicholas J. [2 ]
机构
[1] Pepperdine Univ, Sch Publ Policy, Malibu, CA 90263 USA
[2] Coll William & Mary, Dept Econ, Williamsburg, VA 23187 USA
关键词
Surplus subsidy schemes; Polluting monopolist; Verifiable regulatory mechanisms; ASYMMETRIC INFORMATION; IMPERFECT INFORMATION; ADJUSTMENT PROCESS; MARKET-STRUCTURE; UNKNOWN DEMAND; TAXATION; COST; OLIGOPOLISTS; EXTERNALITY; ENFORCEMENT;
D O I
10.1016/j.jeem.2012.05.006
中图分类号
F [经济];
学科分类号
02 ;
摘要
Optimal regulation of a polluting natural monopolist must correct for both external damages and market power to achieve a social optimum. Existing non-Bayesian regulatory methods require knowledge of the demand function, while Bayesian schemes require knowledge of the underlying cost distribution. We introduce mechanisms adapted to use less information. Our Price-based Subsidy (PS) mechanisms give the firm a transfer that matches or approximates the incremental surplus generated each period. The regulator need not observe the abatement activity or know the demand, cost, or damage functions of the firm. All of the mechanisms induce the firm to price at marginal social cost, either immediately or asymptotically. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:410 / 426
页数:17
相关论文
共 50 条
  • [31] Dynamic Anonymous Quantum-Secure Batch-Verifiable Authentication Scheme for VANET
    Wani, Nahida Majeed
    Verma, Girraj Kumar
    Chamola, Vinay
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 7112 - 7120
  • [32] A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model
    Xiang, Ru
    Ma, Sha
    Huang, Qiong
    Li, Ximing
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 279 - 295
  • [33] A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials
    Flamini, Andrea
    Ranise, Silvio
    Sciarretta, Giada
    Scuro, Mario
    Sharif, Amir
    Tomasi, Alessandro
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 123 - 134
  • [34] VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things
    Ra, Gyeongjin
    Kim, Taehoon
    Lee, Imyeong
    IEEE ACCESS, 2021, 9 : 75945 - 75960
  • [35] Sector Mitigation Policies and Methods in China: Measurable, Reportable, and Verifiable Mechanisms
    Gu, Alun
    Teng, Fei
    Wang, Yu
    ADVANCES IN CLIMATE CHANGE RESEARCH, 2011, 2 (03) : 115 - 123
  • [36] A novel non-interactive verifiable secret sharing scheme
    Ao, Jun
    Liao, Guisheng
    Ma, Chunbo
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1525 - +
  • [37] Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications
    Sun, Jiajun
    Liu, Ningzhong
    SENSORS, 2017, 17 (09):
  • [39] Multi-Client Non-interactive Verifiable Computation
    Choi, Seung Geol
    Katz, Jonathan
    Kumaresan, Ranjit
    Cid, Carlos
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 499 - 518
  • [40] Improvements for truthful mechanisms with verifiable one-parameter selfish agents
    Ferrante, A
    Parlato, G
    Sorrentino, F
    Ventre, C
    APPROXIMATION AND ONLINE ALGORITHMS, 2006, 3879 : 147 - 160