Information Concealing Games

被引:1
|
作者
Sarkar, Saswati [1 ]
Altman, Eitan [2 ]
Vaidyanathan, Pramod [3 ]
机构
[1] Univ Penn, Dept Elect & Syst Engn, Philadelphia, PA 19104 USA
[2] INRIA, F-06902 Sophia Antipolis, France
[3] Citigroup, New York, NY 10013 USA
关键词
Approximation algorithms; computational tractability; information concealing; leader follower games; perfect Bayesian equilibrium; signaling games; NASH EQUILIBRIA;
D O I
10.1109/TIT.2010.2053899
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A system with an n-dimensional state vector and a controller and an actor is considered. The controller has complete information about the system state, and reveals a certain "minimum" amount of information to the actor. The actor takes certain actions based on the information the controller reveals, and the actions fetch certain utilities for each entity. Both the controller and actor seek to maximize their individual utilities by respectively selecting the information to reveal and the actions to adopt. This decision problem forms the basis of several technical and social systems, and can be formulated as a signaling game. It is shown that the Perfect Bayesian Equilibrium of this game has several counterintuitive properties and can be obtained as a saddle point of a different two person zero sum game. The computation time for saddle points using standard linear programs however turns out to be superexponential in n, which leads to computational intractability even for moderate n. Algorithms for computing saddle point policies using a computation time that is exponential in n are presented. Finally, simple linear time computable policies that approximate the saddle-point policies within guaranteeable approximation ratios are obtained.
引用
收藏
页码:4608 / 4630
页数:23
相关论文
共 50 条
  • [1] Information concealing games
    Sarkar, Saswati
    Altman, Eitan
    El-Azouzi, Rachid
    Hayel, Yezekael
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 166 - 170
  • [2] Concealing Education Into Games
    Vidakis, Nikolas
    Syntychakis, Efthymios
    Kalafatis, Konstantinos
    Varhalamas, Petros
    Triantafyllidis, Georgios
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON GAMES BASED LEARNING (ECGBL 2015), 2015, : 554 - 563
  • [3] The Firm as a Means of Concealing Information
    Li, Shiqiang
    LABOUR-ENGLAND, 2011, 25 (04): : 468 - 484
  • [4] On the robustness of concealing cost information in oligopoly
    Hornig, Stephan O.
    Stadler, Manfred
    ECONOMICS BULLETIN, 2006, 12
  • [5] Concealing information in security hologram using interferometry
    Sharma, Amit Kumar
    Chauhan, Prashant
    Varshney, Anshu D.
    OPTICA APPLICATA, 2022, 52 (03) : 385 - 394
  • [6] An assistant tool for concealing personal information in text
    Iwakura, Tomoya
    Okamoto, Seishi
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INTERACTING IN INFORMATION ENVIRONMENTS, PT 2, PROCEEDINGS, 2007, 4558 : 38 - +
  • [7] Analysis of network protocols the ability of concealing the information
    Noskov, Anton
    Jakab, Frantisek
    2016 INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA), 2016,
  • [8] Assistant tool for concealing personal information in text
    Iwakura, Tomoya
    Okamoto, Seishi
    Matsui, Kunio
    Fujitsu Scientific and Technical Journal, 2007, 43 (02): : 212 - 219
  • [9] MEASURES OF CRIME CONCEALING WITH USE OF INFORMATION TECHNOLOGIES
    Malyshkin, P. V.
    MORDOVIA UNIVERSITY BULLETIN, 2014, 4 : 42 - 47
  • [10] DNA-inspired information concealing: A survey
    Kencl, Lukas
    Loebl, Martin
    COMPUTER SCIENCE REVIEW, 2010, 4 (04) : 251 - 262