False-name-proof mechanism design without money
نویسندگان
چکیده
Mechanism design studies how to design mechanisms that result in good outcomes even when agents strategically report their preferences. In traditional settings, it is assumed that a mechanism can enforce payments to give an incentive for agents to act honestly. In many Internet application domains, however, introducing monetary transfers is impossible or undesirable. Also, in such highly anonymous settings as the Internet, declaring preferences dishonestly is not the only way to manipulate the mechanism. It is often possible for an agent to pretend to be multiple agents and submit multiple reports under different identifiers, e.g., by creating different e-mail addresses. The effect of such "false-name manipulations" can be more serious in a mechanism without monetary transfers, since submitting multiple reports would have no risk. I present a case study of false-name-proof mechanism design without money. In the basic setting, agents are located on a real line (or a tree), and the mechanism must select the location of a public facility: the cost of an agent is its distance to the facility. This setting is called the facility location problem and can represent various situations where an agent's preference is single-peaked. I first introduce a characterization of deterministic false-name-proof facility location mechanisms in this setting. I then present some results on competitive analysis for false-name-proof facility location mechanisms. Finally I will discuss how the model could be extended to the situation where the mechanism must select the locations of two public facilities.
منابع مشابه
Coexistence of utilitarian efficiency and false-name-proofness in social choice
The class of Groves mechanisms has been attracting much attention in mechanism design literature due to two attractive characteristics: utilitarian efficiency (also called social welfare maximization) and dominant strategy incentive compatibility. However, when strategic agents can create multiple fake identities and reveal more than one preference under them, a refined characteristic called fa...
متن کاملFairness and False-Name Manipulations in Randomized Cake Cutting
Cake cutting has been recognized as a fundamental model in fair division, and several envy-free cake cutting algorithms have been proposed. Recent works from the computer science field proposed novelmechanisms for cake cutting, whose approaches are based on the theory of mechanism design; these mechanisms are strategy-proof, i.e., no agent has any incentive to misrepresent her utility function,...
متن کاملOptimal false-name-proof single-item redistribution mechanisms
Although the celebrated Vickrey auction is strategy-proof and guaranteed to achieve an efficient allocation in a singleobject auction, if there exists no outside party (i.e., a seller or an auctioneer) with the right to collect the payment, the collected payment will be wasted. Redistribution mechanisms try to redistribute the payment to participating agents as much as possible without violatin...
متن کاملCharacterization of false-name-proof social choice mechanisms
Mechanism Design has been developed as a significant tool to model and analyze markets, economies, and societies in the real-world. On the Internet, however, we face some unexpected problems such as false-name manipulations, and traditional mechanism design does not work sufficiently. In this thesis, we will developmechanism design into amore applicable theory for computer sciences and economic...
متن کاملFalse-Name-Proof Mechanisms for Hiring a Team
We study the problem of hiring a team of selfish agents to perform a task. Each agent is assumed to own one or more elements of a set system, and the auctioneer is trying to purchase a feasible solution by conducting an auction. Our goal is to design auctions that are truthful and false-name-proof, meaning that it is in the agents’ best interest to reveal ownership of all elements (which may no...
متن کامل