Contextually Private Mechanisms

Consider a mechanism design environment in which a designer sequentially queries agents' private information to determine the outcome of a choice rule. The designer's social and technological environment constrains the set of access protocols that it can use. In high-tech environments, arbitrary cryptographic protocols are admissible, and so privacy concerns do not constrain the set of available choice rules. In other environments, privacy desiderata are needed to guide design. A protocol is contextually private for a choice rule if each piece of information learned about each participant is needed to determine the outcome. We characterize choice rules that can be implemented with a contextually private protocol under different assumptions about the class of admissible protocols. Under the assumption that private information must be elicited sequentially from uniquely-identified agents, the serial dictatorship and the first-price auction have contextually private implementations. However, no other kth-price auction has a contextually private implementation, nor does any stable choice rule (in college assignment) or individually rational and efficient choice rule (in house assignment). Under a more generous assumption, which additionally allows the designer to anonymously count the number of agents whose private information has a certain property, the designer has wider scope: we describe a contextually private tâtonnement-like implementation of several choice rules that are not contextually private under the stricter assumption. The full article: https://arxiv.org/abs/2112.10812

[1]  Andrew Mackenzie,et al.  Menu Mechanisms , 2020, J. Econ. Theory.

[2]  Non-Bossiness and First-Price Auctions , 2021, SSRN Electronic Journal.

[3]  Shengwu Li,et al.  On the Computational Properties of Obviously Strategy-Proof Mechanisms , 2021, ArXiv.

[4]  Peter Troyan,et al.  A Theory of Simplicity in Games and Mechanism Design , 2019, SSRN Electronic Journal.

[5]  K. Eliaz,et al.  Bayesian privacy , 2021, Theoretical Economics.

[6]  Sophie Bade,et al.  Random Serial Dictatorship: The One and Only , 2020, Math. Oper. Res..

[7]  Ilya Segal,et al.  Clock Auctions and Radio Spectrum Reallocation , 2020, Journal of Political Economy.

[8]  Mohammad Akbarpour,et al.  Credible Auctions: A Trilemma , 2019, Econometrica.

[9]  Andrew Mackenzie,et al.  A revelation principle for obviously strategy-proof implementation , 2018, Games Econ. Behav..

[10]  Jacob D. Leshno,et al.  The Cutoff Structure of Top Trading Cycles in School Choice , 2017, The Review of Economic Studies.

[11]  Mehrdad Nojoumian,et al.  Comprehensive survey on privacy-preserving protocols for sealed-bid auctions , 2020, Comput. Secur..

[12]  Evangelos P. Markatos,et al.  No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem , 2019, Internet Measurement Conference.

[13]  De Liu Preserving Bidder Privacy in Assignment Auctions: Design and Measurement , 2019 .

[14]  Itai Ashlagi,et al.  Stable matching mechanisms are not obviously strategy-proof , 2015, J. Econ. Theory.

[15]  Helen Nissenbaum,et al.  Contextual Integrity through the Lens of Computer Science , 2017, Found. Trends Priv. Secur..

[16]  Shengwu Li Obviously Strategy-Proof Mechanisms , 2017 .

[17]  Sophie Bade,et al.  Gibbard-Satterthwaite Success Stories and Obvious Strategyproofness , 2016, EC.

[18]  William Thomson Non-bossiness , 2016, Soc. Choice Welf..

[19]  Eduardo M. Azevedo,et al.  A Supply and Demand Framework for Two-Sided Matching Markets , 2014, Journal of Political Economy.

[20]  Aaron Roth,et al.  Privacy and mechanism design , 2013, SECO.

[21]  L. S. Shapley,et al.  College Admissions and the Stability of Marriage , 2013, Am. Math. Mon..

[22]  David Xiao,et al.  Is privacy compatible with truthfulness? , 2013, ITCS '13.

[23]  Aaron Roth,et al.  Conducting truthful surveys, cheaply , 2012, EC '12.

[24]  Aaron Roth,et al.  Take It or Leave It: Running a Survey When Privacy Comes at a Cost , 2012, WINE.

[25]  Kobbi Nissim,et al.  Privacy-aware mechanism design , 2011, EC '12.

[26]  Aaron Roth,et al.  Selling privacy at auction , 2010, EC '11.

[27]  Ivan Damgård,et al.  Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.

[28]  John William Hatfield,et al.  Strategy-proof, efficient, and nonbossy quota allocations , 2009, Soc. Choice Welf..

[29]  D. MacKenzie,et al.  The use of knowledge about society , 2008 .

[30]  Felix Brandt,et al.  On the Existence of Unconditionally Privacy-Preserving Auction Protocols , 2008, TSEC.

[31]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[32]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[33]  Noam Nisan,et al.  The communication requirements of efficient allocations and supporting prices , 2006, J. Econ. Theory.

[34]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[35]  Felix Brandt,et al.  Unconditional privacy in social choice , 2005, TARK.

[36]  Lawrence M. Ausubel An Efficient Ascending-Bid Auction for Multiple Objects , 2004 .

[37]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[38]  Eyal Kushilevitz,et al.  On the structure of the privacy hierarchy , 2004, Journal of Cryptology.

[39]  M. Utku Ünver,et al.  Course Bidding at Business Schools , 2007 .

[40]  Richard P. McLean,et al.  Informational Size and Incentive Compatibility , 2001 .

[41]  M. Balinski,et al.  A Tale of Two Mechanisms: Student Placement , 1999 .

[42]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[43]  H. Nurmi,et al.  Cryptographic protocols for Vickrey auctions , 1993 .

[44]  Faruk Gul,et al.  Asymptotic efficiency in large exchange economies with asymmetric information , 1992 .

[45]  M. Rothkopf,et al.  Why Are Vickrey Auctions Rare? , 1990, Journal of Political Economy.

[46]  Eyal Kushilevitz,et al.  A zero-one law for Boolean privacy , 1989, STOC '89.

[47]  M. Satterthwaite,et al.  Strategy-Proof Allocation Mechanisms at Differentiable Points , 1981 .

[48]  L. Shapley,et al.  On cores and indivisibility , 1974 .

[49]  L. Hurwicz The Design of Mechanisms for Resource Allocation , 1973 .

[50]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .