Sum of Us: Truthful Self-Selection

We consider directed graphs over a set of agents, where an edge 〈i, j〉 is taken to mean that agent i trusts or supports agent j. Given such a graph, our goal is to select a subset of agents of fixed size that maximizes the sum of indegrees, that is, a subset of most popular or most trusted agents. On the other hand, each agent is only interested in being selected, and may misreport its outgoing edges to this end. This problem formulation captures realistic scenarios where agents choose among themselves, in the context of, e.g., social networks such as Twitter, reputation systems such as Epinions, and Internet search. We wish to design mechanisms—functions that map graphs to selected subsets (without making payments)—which satisfy two constraints: strategyproofness, i.e., agents cannot benefit from misreporting their outgoing edges; and approximation, that is, the mechanism must always select a subset of agents that is close to optimal in terms of the sum of indegrees. Our first major result is a surprising impossibility: no deterministic strategyproof mechanism can yield a finite approximation ratio for any k ∈ {1, . . . , n−1}, where k is the size of the selected subset and n is the number of agents. Our second major result is a randomized strategyproof mechanism that yields an approximation ratio of four for any value of k, and provides a ratio that approaches one as k grows. ∗Microsoft Israel R&D Center, 13 Shenkar Street, Herzeliya 46725, Israel, and Schools of Mathematics and Computer Science, Tel Aviv University, Tel Aviv, 69978, Israel, Email: nogaa@tau.ac.il. Research supported in part by a USA Israeli BSF grant, by a grant from the Israel Science Foundation, by an ERC advanced grant and by the Hermann Minkowski Minerva Center for Geometry at Tel Aviv University. †Institut fur Informatik, Ludwig-Maximilians-Universitat Munchen, 80538 Munchen, Germany, email: fischerf@tcs.ifi.lmu.de. Part of the work was done while the author was visiting The Hebrew University of Jerusalem. This visit was supported by a Minerva Short-Term Research Grant. ‡Microsoft Israel R&D Center, 13 Shenkar Street, Herzeliya 46725, Israel. Email: arielpro@gmail.com. §Microsoft Israel R&D Center, 13 Shenkar Street, Herzeliya 46725, Israel, and Technion, IIT, Haifa 32000, Israel. Email: moshet@microsoft.com

[1]  Ariel D. Procaccia,et al.  Incentive compatible regression learning , 2008, SODA '08.

[2]  Anna R. Karlin,et al.  Competitive auctions , 2006, Games Econ. Behav..

[3]  Uriel Feige,et al.  Noncryptographic selection protocols , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[4]  Alice Cheng,et al.  Sybilproof reputation mechanisms , 2005, P2PECON '05.

[5]  E. Friedman,et al.  Algorithmic Game Theory: Manipulation-Resistant Reputation Systems , 2007 .

[6]  N. Linial,et al.  Fast perfect-information leader-election protocols with linear immunity , 1995, Comb..

[7]  Spyridon Antonakopoulos,et al.  Fast leader-election protocols with bounded cheaters' edge , 2006, STOC '06.

[8]  Ron Lavi,et al.  Algorithmic Mechanism Design , 2008, Encyclopedia of Algorithms.

[9]  Uriel Feige,et al.  On the Competitive Ratio of the Random Sampling Auction , 2005, WINE.

[10]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[11]  Noam Nisan,et al.  Truthful randomized mechanisms for combinatorial auctions , 2006, STOC '06.

[12]  A. Gibbard Manipulation of Voting Schemes: A General Result , 1973 .

[13]  Amos Fiat,et al.  Competitive generalized auctions , 2002, STOC '02.

[14]  R. Vohra,et al.  Algorithmic Game Theory: Mechanism Design without Money , 2007 .

[15]  Moshe Tennenholtz,et al.  Strategyproof deterministic lotteries under broadcast communication , 2008, AAMAS.

[16]  W. K. Vickery,et al.  Counter-Speculation Auctions and Competitive Sealed Tenders , 1961 .

[17]  Noga Alon,et al.  The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.

[18]  Noga Alon,et al.  Strategyproof Approximation Mechanisms for Location on Networks , 2009, ArXiv.

[19]  Noga Alon,et al.  Coin-flipping games immune against linear-sized coalitions , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[20]  Theodore Groves,et al.  Incentives in Teams , 1973 .

[21]  Douglas Muzzio,et al.  APPROVAL VOTING , 1983 .

[22]  N. Nisan Introduction to Mechanism Design (for Computer Scientists) , 2007 .

[23]  E. H. Clarke Multipart pricing of public goods , 1971 .

[24]  Moshe Tennenholtz,et al.  Approximate mechanism design without money , 2009, EC '09.

[25]  A. Gibbard Manipulation of Schemes That Mix Voting with Chance , 1977 .

[26]  M. Satterthwaite Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .