Secure implementation experiments: Do strategy-proof mechanisms really work?
نویسندگان
چکیده
† We thank anonymous referees and an associate editor for their useful comments. 2 ABSTRACT Strategy-proofness, requiring that truth-telling is a dominant strategy, is a standard concept used in social choice theory. Saijo et al. (2003) argue that this concept has serious drawbacks. In particular, many strategy-proof mechanisms have a continuum of Nash equilibria, including equilibria other than dominant strategy equilibria. For only a subset of strategy-proof mechanisms do the set of Nash equilibria and the set of dominant strategy equilibria coincide. For example, this double coincidence occurs in the Groves mechanism when preferences are single-peaked. We report experiments using two strategy-proof mechanisms. One of them has a large number of Nash equilibria, but the other has a unique Nash equilibrium. We found clear differences in the rate of dominant strategy play between the two.
منابع مشابه
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
We design and implement TwinsCoin, the rst cryptocurrency based on a provably secure and scalable public blockchain design using both proof-of-work and proof-of-stake mechanisms. Dierent from the proof-ofwork based Bitcoin, our construction uses two types of resources, computing power and coins (i.e., stake). e blockchain in our system is more robust than that in a pure proof-of-work based s...
متن کاملOne Truth and a Thousand Lies: Focal Points in Mechanism Design∗
Truthtelling is often viewed as focal in direct mechanisms. We introduce two new notions of robust implementation based on the premise that society may be composed of “primitive” agents who, whenever confronted with a strategy profile, anchor to truthtelling and make a limited number of comparisons. Instead of comparing all possible alternative strategies as they would at a Nash equilibrium, pr...
متن کاملWitness Encryption from Instance Independent Assumptions
Witness encryption was proposed by Garg, Gentry, Sahai, and Waters as a means to encrypt to an instance, x, of an NP language and produce a ciphertext. In such a system, any decryptor that knows of a witness w that x is in the language can decrypt the ciphertext and learn the message. In addition to proposing the concept, their work provided a candidate for a witness encryption scheme built usi...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملStudy and Implementation of Lean Manufacturing in a Garment Manufacturing Company: Bangladesh Perspective
Lean manufacturing is a systematic approach to identifying and eliminating wastes (non-value added activities) through continuous improvement by conveying the product at the pull of the customer in pursuit of production. In a more basic term, more value with less work. Since lean manufacturing eliminates many of the problems associated with poor production scheduling and line balancing, lean ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Games and Economic Behavior
دوره 57 شماره
صفحات -
تاریخ انتشار 2006