Partial ex-post verifiability and unique implementation of social choice functions

This study investigates the unique implementation of a social choice function in iterative dominance in the ex-post term. We assume partial ex-post verifiability; that is, after determining an allocation, the central planner can only observe partial information about the state as verifiable. We demonstrate a condition of the state space, termed ``full detection," under which any social choice function is uniquely implementable even if the range of the players' lies, which the ex-post verifiable information directly detects, is quite narrow. To prove this, we construct a dynamic mechanism according to which each player announces his (or her) private signal before the other players observe this signal at an earlier stage, and each player also announces the state at a later stage. In this construction, we can impose several severe restrictions, such as boundedness, permission of only tiny transfers off the equilibrium path, and no permission of transfers on the equilibrium path. This study does not assume either expected utility or quasi-linearity.

[1]  Hitoshi Matsushima,et al.  Implementation without expected utility: ex-post verifiability , 2019, Social Choice and Welfare.

[2]  Elchanan Ben-Porath,et al.  Implementation with partial provability , 2012, J. Econ. Theory.

[3]  Arunava Sen,et al.  VIRTUAL IMPLEMENTATION IN NASH EQUILIBRIUM , 1991 .

[4]  Colin Camerer,et al.  Decision processes for low probability events: Policy implications , 1989 .

[5]  I. Segal,et al.  Dynamic Mechanism Design , 2022 .

[6]  E. Maskin Nash Equilibrium and Welfare Optimality , 1999 .

[7]  Navin Kartik,et al.  Implementation with Evidence , 2012 .

[8]  Michele Lombardi,et al.  Virtual Implementation by Bounded Mechanisms: Complete Information , 2019, SSRN Electronic Journal.

[9]  Eric Maskin,et al.  Chapter 5 Implementation theory , 2002 .

[10]  Hitoshi Matsushima,et al.  Virtual implementation in iteratively undominated strategies: complete information , 1992 .

[11]  Matthew O. Jackson,et al.  A crash course in implementation theory , 2001, Soc. Choice Welf..

[12]  Hitoshi Matsushima A new approach to the implementation problem , 1988 .

[13]  Tilman Börgers,et al.  An introduction to the theory of mechanism design , 2015 .

[14]  Hitoshi Matsushima Dynamic Implementation, Verification, and Detection , 2017 .

[15]  Rakesh V. Vohra,et al.  Dynamic mechanism design , 2012 .

[16]  John. Moore,et al.  Subgame Perfect Implementation , 1988 .

[17]  Hitoshi Matsushima,et al.  Behavioral Aspects of Implementation Theory , 2008 .

[18]  Thomas R. Palfrey,et al.  Nash Implementation Using Undominated Strategies , 1991 .

[19]  E. Maskin,et al.  Implementation Theory∗ , 2002 .

[20]  T. Palfrey Implementation in Bayesian Equilibrium: The Multiple Equilibrium Problem in Mechanism Design , 1990 .

[21]  Antonio Penta Robust dynamic implementation , 2015, J. Econ. Theory.

[22]  John. Moore,et al.  Implementation in Environments with Complete Information (Now published as 'Implementation, Contracts and Renegotiation in Environments with Complete Information' in J-J Laffont (ed.), Advances in Economic Theory: Invited Papers to the World Congress of the Econometric Society, vol.I (1992), pp.182- , 1991 .

[23]  M. Jackson Implementation in Undominated Strategies: A Look at Bounded Mechanisms , 1992 .

[24]  Hitoshi Matsushima,et al.  Role of honesty in full implementation , 2008, J. Econ. Theory.

[25]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .