False-name-proofness with bid withdrawal

We study a more powerful variant of false-name manipulation in Internet auctions: an agent can submit multiple false-name bids, but then, once the allocation and payments have been decided, withdraw some of her false-name identities (have some of her false-name identities refuse to pay). While these withdrawn identities will not obtain the items they won, their initial presence may have been beneficia to the agent's other identities. We defin a mechanism to be false-name-proof with withdrawal (FNPW) if the aforementioned manipulation is never beneficial FNPW is a stronger condition than false-name-proofness (FNP). We discuss the relation between FNP and FNPW in general combinatorial auction settings. We also propose the maximum marginal value item pricing (MMVIP) mechanism, which we prove is FNPW. (The full version contains a number of other results.)

[1]  S. Bikhchandani,et al.  Weak Monotonicity Characterizes Deterministic Dominant-Strategy Implementation , 2006 .

[2]  Vincent Conitzer,et al.  Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms , 2010, AAMAS.

[3]  E. H. Clarke Multipart pricing of public goods , 1971 .

[4]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[5]  Theodore Groves,et al.  Incentives in Teams , 1973 .

[6]  Moshe Tennenholtz,et al.  Optimal auctions revisited , 1998, Artif. Intell..

[7]  Makoto Yokoo,et al.  False-name-proof combinatorial auction protocol: Groves Mechanism with SubModular Approximation , 2006, AAMAS '06.

[8]  P. Cramton The FCC Spectrum Auctions: An Early Assessment , 1997 .

[9]  D. Porter The effect of bid withdrawal in a multi-object auction , 1999 .

[10]  James Nga-kwok Liu,et al.  Autonomous agents and multi-agent systems , 1999 .

[11]  Makoto Yokoo,et al.  The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..

[12]  Michael P. Wellman,et al.  The Michigan Internet AuctionBot: a configurable auction server for human and software agents , 1998, AGENTS '98.

[13]  Michel Gendreau,et al.  Combinatorial auctions , 2007, Ann. Oper. Res..

[14]  M. Rothkopf On Auctions with Withdrawable Winning Bids , 1991 .

[15]  T. Sandholm Limitations of the Vickrey Auction in Computational Multiagent Systems , 1996 .

[16]  Vincent Conitzer,et al.  Optimal False-Name-Proof Voting Rules with Costly Voting , 2008, AAAI.

[17]  Roger B. Myerson,et al.  Optimal Auction Design , 1981, Math. Oper. Res..

[18]  Makoto Yokoo,et al.  Robust Combinatorial Auction Protocol against False-Name Bids , 2000, AAAI/IAAI.

[19]  Vincent Conitzer,et al.  Limited verification of identities to induce false-name-proofness , 2007, TARK '07.

[20]  Noam Nisan,et al.  Towards a characterization of truthful combinatorial auctions , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[21]  Barry O'Sullivan,et al.  Robust solutions for combinatorial auctions , 2005, EC '05.

[22]  Vincent Conitzer,et al.  Anonymity-Proof Voting Rules , 2008, WINE.

[23]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[24]  Makoto Yokoo,et al.  Characterizing false-name-proof allocation rules in combinatorial auctions , 2009, AAMAS.