Online concealed correlation and bounded rationality

Correlation of players' actions may evolve in the common course of the play of a repeated game with perfect monitoring (“online correlation”). In this paper we study the concealment of such correlation from a boundedly rational player. We show that “strong” players, i.e., players whose strategic complexity is less stringently bounded, can orchestrate the online correlation of the actions of “weak” players, where this correlation is concealed from an opponent of “intermediate” strength. The feasibility of such “online concealed correlation” is reflected in the individually rational payoff of the opponent and in the equilibrium payoffs of the repeated game.

[1]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[2]  Itzhak Gilboa,et al.  Infinite Histories and Steady Orbits in Repeated Games , 1994 .

[3]  Ron Peretz Correlation through bounded recall strategies , 2013, Int. J. Game Theory.

[4]  E. Kalai Bounded Rationality and Strategic Complexity in Repeated Games , 1987 .

[5]  Penélope Hernández,et al.  Optimal use of communication resources , 2006 .

[6]  Abraham Neyman,et al.  Finitely Repeated Games with Finite Automata , 1998, Math. Oper. Res..

[7]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[8]  Tristan Tomala,et al.  Secret Correlation in Repeated Games with Imperfect Monitoring , 2007, Math. Oper. Res..

[9]  Abraham Neyman,et al.  Cooperation, Repetition, and Automata , 1997 .

[10]  Mihalis Yannakakis,et al.  On complexity as bounded rationality (extended abstract) , 1994, STOC '94.

[11]  A. Rubinstein Finite automata play the repeated prisoner's dilemma , 1986 .

[12]  H. W. Kuhn,et al.  11. Extensive Games and the Problem of Information , 1953 .

[13]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[14]  E. Lehrer Repeated Games with Stationary Bounded Recall Strategies , 1988 .

[15]  Abraham Neyman,et al.  Online Concealed Correlation by Boundedly Rational Players , 2003 .

[16]  O. Gossner Sharing a long secret in a few public words , 2000 .

[17]  R. Aumann Survey of Repeated Games , 1981 .

[18]  Ehud Lehrer Finitely Many Players with Bounded Recall in Infinitely Repeated Games , 1994 .

[19]  Sylvain Sorin,et al.  Cooperation Through Repetition: Complete Information , 1997 .

[20]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[21]  P. W. Jones,et al.  Bandit Problems, Sequential Allocation of Experiments , 1987 .

[22]  Elchanan Ben-Porath,et al.  Repeated games with Finite Automata , 1993 .

[23]  A. Neyman Bounded complexity justifies cooperation in the finitely repeated prisoners' dilemma , 1985 .

[24]  Abraham Neyman,et al.  Learning Effectiveness and Memory Size , 2008 .

[25]  O. Gossner Repeated games played by cryptographically sophisticated players , 1998 .

[26]  Noga Alon,et al.  The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.