Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms

نویسندگان

  • Atsushi Iwasaki
  • Vincent Conitzer
  • Yoshifusa Omori
  • Yuko Sakurai
  • Taiki Todo
  • Mingyu Guo
  • Makoto Yokoo
چکیده

This paper analyzes the worst-case efficiency ratio of falsename-proof combinatorial auction mechanisms. False-nameproofness generalizes strategy-proofness by assuming that a bidder can submit multiple bids under fictitious identifiers. Even the well-known Vickrey-Clarke-Groves mechanism is not false-name-proof. It has previously been shown that there is no false-name-proof mechanism that always achieves a Pareto efficient allocation. Consequently, if false-name bids are possible, we need to sacrifice efficiency to some extent. This leaves the natural question of how much surplus must be sacrificed. To answer this question, this paper focuses on worst-case analysis. Specifically, we consider the fraction of the Pareto efficient surplus that we obtain and try to maximize this fraction in the worst-case, under the constraint of false-name-proofness. As far as we are aware, this is the first attempt to examine the worst-case efficiency of false-name-proof mechanisms. We show that the worst-case efficiency ratio of any falsename-proof mechanism that satisfies some apparently minor assumptions is at most 2/(m + 1) for auctions with m different goods. We also observe that the worst-case efficiency ratio of existing false-name-proof mechanisms is generally 1/m or 0. Finally, we propose a novel mechanism, called the adaptive reserve price mechanism that is false-nameproof when all bidders are single-minded. The worst-case efficiency ratio is 2/(m + 1), i.e., optimal.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The effect of false-name bids in combinatorial auctions: new fraud in internet auctions

We examine the effect of false-name bids on combinatorial auction protocols. Falsename bids are bids submitted by a single bidder using multiple identifiers such as multiple e-mail addresses. The obtained results are summarized as follows: 1) The Vickrey-Clarke-Groves (VCG) mechanism, which is strategy-proof and Pareto efficient when there exists no false-name bids, is not false-name-proof, 2) ...

متن کامل

Optimal false-name-proof single-item redistribution mechanisms

Although the celebrated Vickrey auction is strategy-proof and guaranteed to achieve an efficient allocation in a singleobject auction, if there exists no outside party (i.e., a seller or an auctioneer) with the right to collect the payment, the collected payment will be wasted. Redistribution mechanisms try to redistribute the payment to participating agents as much as possible without violatin...

متن کامل

False-name-proofness with bid withdrawal

We study a more powerful variant of false-name manipulation in Internet auctions: an agent can submit multiple false-name bids, but then, once the allocation and payments have been decided, withdraw some of her false-name identities (have some of her falsename identities refuse to pay). While these withdrawn identities will not obtain the items they won, their initial presence may have been ben...

متن کامل

False-name bidding in first-price combinatorial auctions with incomplete information

False-name bids are bids submitted by a single agent under multiple fictitious names such as multiple e-mail addresses. False-name bidding can be a serious fraud in Internet auctions since identifying each participant is virtually impossible. It is shown that even the theoretically well-founded Vickrey-Clarke-Groves auction (VCG) is vulnerable to falsename bidding. Thus, several auction mechani...

متن کامل

False - name - Proof Combinatorial Auction Mechanisms ( extended abstract )

Although the Internet provides an excellent infrastructure for executing combinatorial auctions, we must consider the possibility of new types of cheating. For example, a bidder may try to profit from submitting false bids under fictitious names such as multiple e-mail addresses. Such an action is very difficult to detect since identifying each participant on the Internet is virtually impossibl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010