Characterizing false-name-proof allocation rules in combinatorial auctions

A combinatorial auction mechanism consists of an allocation rule that defines the allocation of goods for each agent, and a payment rule that defines the payment of each winner. There have been several studies on characterizing strategy-proof allocation rules. In particular, a condition called weak-monotonicity has been identified as a full characterization of strategy-proof allocation rules. More specifically, for an allocation rule, there exists an appropriate payment rule so that the mechanism becomes strategy-proof if and only if it satisfies weak-monotonicity. In this paper, we identify a condition called sub-additivity which characterizes false-name-proof allocation rules. False-name-proofness generalizes strategy-proofness, by assuming that a bidder can submit multiple bids under fictitious identifiers. As far as the authors are aware, this is the first attempt to characterize false-name-proof allocation rules. We can utilize this characterization for developing a new false-name-proof mechanism, since we can concentrate on designing an allocation rule. As long as the allocation rule satisfies weak-monotonicity and sub-additivity, there always exists an appropriate payment rule. Furthermore, by utilizing the sub-additivity condition, we can easily verify whether a mechanism is false-name-proof. To our surprise, we found that two mechanisms, which were believed to be false-name-proof, do not satisfy sub-additivity; they are not false-name-proof. As demonstrated in these examples, our characterization is quite useful for mechanism verification.

[1]  Makoto Yokoo,et al.  Robust Combinatorial Auction Protocol against False-Name Bids , 2000, AAAI/IAAI.

[2]  Ahuva Mu'alem,et al.  Mechanism design over discrete domains , 2008, EC '08.

[3]  Noam Nisan,et al.  Towards a characterization of truthful combinatorial auctions , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[4]  Eric Maskin,et al.  Chapter 5 Implementation theory , 2002 .

[5]  Makoto Yokoo,et al.  The effect of false-name bids in combinatorial auctions: new fraud in internet auctions , 2004, Games Econ. Behav..

[6]  E. Maskin,et al.  Implementation Theory∗ , 2002 .

[7]  J. Rochet A necessary and sufficient condition for rationalizability in a quasi-linear context , 1987 .

[8]  Chaitanya Swamy,et al.  Truthful mechanism design for multi-dimensional scheduling via cycle monotonicity , 2007, EC '07.

[9]  Makoto Yokoo,et al.  False-name-proof combinatorial auction protocol: Groves Mechanism with SubModular Approximation , 2006, AAMAS '06.

[10]  Michael E. Saks,et al.  Weak monotonicity suffices for truthfulness on convex domains , 2005, EC '05.

[11]  Moshe Babaioff,et al.  Computationally-feasible truthful auctions for convex bundles , 2008, Games Econ. Behav..

[12]  Moshe Babaioff,et al.  Mechanism Design for Single-Value Domains , 2005, AAAI.

[13]  Yoav Shoham,et al.  Combinatorial Auctions , 2005, Encyclopedia of Wireless Networks.

[14]  David C. Parkes,et al.  An Ironing-Based Approach to Adaptive Online Mechanism Design in Single-Valued Domains , 2007, AAAI.

[15]  Roger B. Myerson,et al.  Optimal Auction Design , 1981, Math. Oper. Res..

[16]  Eitan Muller,et al.  Strategy-Proofness: The Existence of Dominant Strategy Mechanisms , 1983 .

[17]  H. Moulin,et al.  Strategyproof sharing of submodular costs:budget balance versus efficiency , 2001 .

[18]  Toramatsu Shintani,et al.  A robust combinatorial auction mechanism against shill bidders , 2006, AAMAS '06.

[19]  Kevin Leyton-Brown,et al.  Revenue monotonicity in combinatorial auctions , 2007, SECO.

[20]  K. Arrow,et al.  Handbook of Social Choice and Welfare , 2011 .

[21]  S. Bikhchandani,et al.  Weak Monotonicity Characterizes Deterministic Dominant-Strategy Implementation , 2006 .