Optimal False-name-proof Single-Item Redistribution Mechanisms

被引:0
|
作者
Tsuruta, Shunsuke [1 ]
Oka, Masaaki [1 ]
Todo, Taiki [1 ]
Kawasaki, Yujiro [1 ]
Guo, Mingyu [2 ]
Sakurai, Yuko [1 ]
Yokoo, Makoto [1 ]
机构
[1] Kyushu Univ, Fukuoka, Fukuoka 8190395, Japan
[2] Adelaide Univ, Adelaide, SA 5005, Australia
关键词
Mechanism design; Redistribution; False-name-proofness;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the celebrated Vickrey auction is strategy-proof and guaranteed to achieve an efficient allocation in a single-object auction, if there exists no outside party (i.e., a seller or an auctioneer) with the right to collect the payment, the collected payment will be wasted. Redistribution mechanisms try to redistribute the payment to participating agents as much as possible without violating strategy-proofness. However, when a losing agent can obtain part of the payment, she may have an incentive to participate under multiple identities and receive a greater share of the redistribution. Our goal is to develop false-name-proof redistribution mechanisms that are robust against such manipulations. First, we prove that no mechanism simultaneously satisfies false-name-proofness and allocative efficiency, except for the Vickrey auction. Next, we propose a class of false-name-proof redistribution mechanisms, which are characterized by several parameters. We show that each mechanism in the class is not dominated by any other false-name-proof mechanism in terms of social welfare. Precisely, by choosing these parameters appropriately, all instances of this class are guaranteed to achieve at least the same amount of social welfare obtained by any false-name-proof mechanism. Furthermore, we formalize an optimization problem that determines appropriate parameter values based on prior information about participating agents.
引用
收藏
页码:221 / 228
页数:8
相关论文
共 25 条
  • [21] False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values
    Terada, Kenji
    Yokoo, Makoto
    Systems and Computers in Japan, 2006, 37 (13): : 89 - 98
  • [22] False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values
    Terada, K
    Yokoo, M
    INTELLIGENT AGENTS AND MULTI-AGENT SYSTEMS, PROCEEDINGS, 2002, 2413 : 48 - 62
  • [23] An optimal and a heuristic algorithm for the single-item retrieval problem in puzzle-based storage systems with multiple escorts
    Yalcin, Altan
    Koberstein, Achim
    Schocke, Kai-Oliver
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2019, 57 (01) : 143 - 165
  • [24] Characterization of Strategy-Proof, Revenue Monotone Combinatorial Auction Mechanisms and Connection with False-Name-Proofness
    Todo, Taiki
    Iwasaki, Atsushi
    Yoko, Makoto
    INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2009, 5929 : 561 - 568
  • [25] On optimal mechanisms in the two-item single-buyer unit-demand setting
    Thirumulanathan, D.
    Sundaresan, Rajesh
    Narahari, Y.
    JOURNAL OF MATHEMATICAL ECONOMICS, 2019, 82 : 31 - 60