A Limitation of the Generalized Vickrey Auction in Electronic Commerce: Robustness against False-name Bids

نویسندگان

  • Yuko Sakurai
  • Makoto Yokoo
  • Shigeo Matsubara
چکیده

Electronic Commerce (EC) has rapidly grown with the expansion of the Internet. Among these activities, auctions have recently achieved huge popularity, and have become a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an infrastructure for much cheaper auctioning with many more sellers and buyers, we must consider the possibility of a new type of cheating, i.e., an agent tries to get some profit by submitting several bids under fictitious names (false-name bids). Although false-name bids are easier to execute than forming collusion, the vulnerability of auction protocols to false-name bids has not been discussed before. In this paper, we examine the robustness of the generalized Vickrey auction (G.V.A.) against false-name bids. The G.V.A. has the best theoretical background among various auction mechanisms, i.e., it has proved to be incentive compatible and be able to achieve a Pareto efficient allocation. We show that false-name bids may be effective, i.e., the G.V.A. loses incentive compatibility under the possibility of false-name bids, when the marginal utility of an item increases or goods are complementary. Moreover, we prove that there exists no single-round sealed-bid auction protocol that simultaneously satisfies individual rationality, Pareto efficiency, and incentive compatibility in all cases if agents can submit false-name bids.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Combinatorial Auction Protocol against False-Name Bids

This paper presents a new combinatorial auction protocol (LDS protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce (EC) and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for combinatorial auctions, we must consider the possibility of a ne...

متن کامل

Binary Multi-unit Auction against Buyer False-name Bidding

Online auction fraud is currently the number one Internet fraud. This is partially because traditional auction mechanisms fail to accommodate new perspectives of the Internet. For instance, the Generalized Vickrey Auction (GVA) for multi-unit auctions is no longer incentive compatible under buyer false-name bidding; a buyer may reduce his payment by splitting a single legitimate bid for a large...

متن کامل

Robust Multi-unit Auction Protocol against False-name Bids

This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called fals...

متن کامل

Electronic Auctions with Private Bids

Auctions are a fundamental electronic commerce technology. We describe a set of protocols for performing sealed-bid electronic auctions which preserve the privacy of the submitted bids using a form of secure distributed computation. Bids are never revealed to any party, even after the auction is completed. Both rst-price and second-price (Vickrey) auctions are supported, and the computational c...

متن کامل

Bundle Design in Robust Combinatorial Auction Protocol against False-name Bids

This paper presents a method for designing bundles in a combinatorial auction protocol that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying AI technologies. However, the possibility of a new type of cheating called a false-name bid, i.e., a bid submitted under a fictitious name, has been pointed out. A p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999