Characterizing false-name-proof allocation rules in combinatorial auctions

نویسندگان

  • Taiki Todo
  • Atsushi Iwasaki
  • Makoto Yokoo
  • Yuko Sakurai
چکیده

A combinatorial auction mechanism consists of an allocation rule that defines the allocation of goods for each agent, and a payment rule that defines the payment of each winner. There have been several studies on characterizing strategyproof allocation rules. In particular, a condition called weakmonotonicity has been identified as a full characterization of strategy-proof allocation rules. More specifically, for an allocation rule, there exists an appropriate payment rule so that the mechanism becomes strategy-proof if and only if it satisfies weak-monotonicity. In this paper, we identify a condition called sub-additivity which characterizes false-name-proof allocation rules. Falsename-proofness generalizes strategy-proofness, by assuming that a bidder can submit multiple bids under fictitious identifiers. As far as the authors are aware, this is the first attempt to characterize false-name-proof allocation rules. We can utilize this characterization for developing a new false-name-proof mechanism, since we can concentrate on designing an allocation rule. As long as the allocation rule satisfies weak-monotonicity and sub-additivity, there always exists an appropriate payment rule. Furthermore, by utilizing the sub-additivity condition, we can easily verify whether a mechanism is false-name-proof. To our surprise, we found that two mechanisms, which were believed to be false-nameproof, do not satisfy sub-additivity; they are not false-nameproof. As demonstrated in these examples, our characterization is quite useful for mechanism verification.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

False-name-proofness with bid withdrawal

We study a more powerful variant of false-name manipulation in Internet auctions: an agent can submit multiple false-name bids, but then, once the allocation and payments have been decided, withdraw some of her false-name identities (have some of her falsename identities refuse to pay). While these withdrawn identities will not obtain the items they won, their initial presence may have been ben...

متن کامل

The effect of false-name bids in combinatorial auctions: new fraud in internet auctions

We examine the effect of false-name bids on combinatorial auction protocols. Falsename bids are bids submitted by a single bidder using multiple identifiers such as multiple e-mail addresses. The obtained results are summarized as follows: 1) The Vickrey-Clarke-Groves (VCG) mechanism, which is strategy-proof and Pareto efficient when there exists no false-name bids, is not false-name-proof, 2) ...

متن کامل

False-name-proof Combinatorial Auction Design via Single-minded Decomposition

This paper proposes a new approach to building falsename-proof (FNP) combinatorial auctions from those that are FNP only with single-minded bidders, each of whom requires only one particular bundle. Under this approach, a general bidder is decomposed into a set of single-minded bidders, and after the decomposition the price and the allocation are determined by the FNP auctions for single-minded...

متن کامل

Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms

This paper analyzes the worst-case efficiency ratio of falsename-proof combinatorial auction mechanisms. False-nameproofness generalizes strategy-proofness by assuming that a bidder can submit multiple bids under fictitious identifiers. Even the well-known Vickrey-Clarke-Groves mechanism is not false-name-proof. It has previously been shown that there is no false-name-proof mechanism that alway...

متن کامل

False - name - Proof Combinatorial Auction Mechanisms ( extended abstract )

Although the Internet provides an excellent infrastructure for executing combinatorial auctions, we must consider the possibility of new types of cheating. For example, a bidder may try to profit from submitting false bids under fictitious names such as multiple e-mail addresses. Such an action is very difficult to detect since identifying each participant on the Internet is virtually impossibl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009