Overcoming free riding in multi-party computations - The anonymous case

Abstract This paper addresses the question of multi-party computation in a model with asymmetric information. Each agent has a private value (secret), but in contrast to standard models, the agent incurs a cost when retrieving the secret. There is a social choice function the agents would like to compute and implement. All agents would like to perform a joint computation, which input is their vector of secrets. However, agents would like to free-ride on others' contribution. A mechanism which elicits players' secrets and performs the desired computation defines a game. A mechanism is ‘appropriate’ if it (weakly) implements the social choice function for all secret vectors. namely, if there exists an equilibrium in which it is able to elicit (sufficiently many) agents' secrets and perform the computation, for all possible secret vectors. We show that ‘appropriate’ mechanisms approach agents sequentially and that they have low communication complexity.

[1]  Nathan Linial,et al.  The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[2]  P. Klemperer Auction Theory: A Guide to the Literature , 1999 .

[3]  Craig Boutilier,et al.  A Constraint-Based Approach to Preference Elicitation and Decision Making , 1997 .

[4]  H. Young Condorcet's Theory of Voting , 1988, American Political Science Review.

[5]  Yoav Shoham,et al.  Towards a general theory of non-cooperative computation , 2003, TARK '03.

[6]  Moshe Tennenholtz,et al.  On Rational Computability and Communication Complexity , 2001, Games Econ. Behav..

[7]  Nathan Linial,et al.  Collective coin flipping, robust voting schemes and minima of Banzhaf values , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[8]  J. Banks,et al.  Information Aggregation, Rationality, and the Condorcet Jury Theorem , 1996, American Political Science Review.

[9]  Oded Goldreich,et al.  The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[10]  Richard P. McLean,et al.  Optimal Selling Strategies under Uncertainty for a Discriminating Monopolist When Demands Are Interdependent , 1985 .

[11]  Andrew Postlewaite,et al.  Asymmetric Information Bargaining Problems with Many Agents , 1990 .

[12]  D. Fudenberg,et al.  When Are Nonanonymous Players Negligible , 1998 .

[13]  N. Persico Committee Design with Endogenous Information , 2004 .

[14]  Nathan Linial,et al.  Games Computers Play: Game-Theoretic Aspects of Computing , 1992 .

[15]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[16]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[17]  Michele Piccione,et al.  Sequential Voting Procedures in Symmetric Binary Elections , 2000, Journal of Political Economy.

[18]  Joel Friedman,et al.  On the bit extraction problem , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.

[19]  Dino Gerardi,et al.  Information Acquisition in Committees , 2007 .

[20]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[21]  T. Feddersen,et al.  Voting Behavior and Information Aggregation in Elections with Private Information , 1997 .

[22]  D. Fudenberg,et al.  When Are Nonanonymous Players Negligible , 1996 .

[23]  Anat R. Admati,et al.  Joint Projects without Commitment , 1991 .

[24]  Dan Levin,et al.  Equilibrium in Auctions with Entry , 1994 .

[25]  Tuomas Sandholm,et al.  Minimal Preference Elicitation in Combinatorial Auctions , 2001, IJCAI 2001.

[26]  R. Rob Pollution claim settlements under private information , 1989 .

[27]  Leslie M. Marx,et al.  Dynamic Voluntary Contribution to a Public Project , 2000 .

[28]  Dino Gerardi,et al.  Committee Design in the Presence of Communication , 2003 .

[29]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[30]  Rann Smorodinsky,et al.  Pivotal Players and the Characterization of Influence , 2000, J. Econ. Theory.

[31]  R. Myerson Optimal coordination mechanisms in generalized principal–agent problems , 1982 .

[32]  Moshe Tennenholtz,et al.  Non-cooperative computation: Boolean functions with correctness and exclusivity , 2005, Theor. Comput. Sci..

[33]  T. Feddersen,et al.  Convicting the Innocent: The Inferiority of Unanimous Jury Verdicts under Strategic Voting , 1996, American Political Science Review.

[34]  Tuomas Sandholm,et al.  Preference elicitation in combinatorial auctions , 2001, AAMAS '02.

[35]  Oded Goldreich,et al.  The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) , 1985, FOCS.