<<

Extensive form games "…nest description"

Strategic form# games

Coalition form# games "coarsest description"

Coalition form games: data consists of a mapping that assigns to each coalition a payo¤ or set of payo¤s that are attainable through some joint course of action. The analysis is typically axiomatic and solution concepts in- clude , stable sets, nucleolus,

Strategic form games: data consists of a set of players, an action sets and payo¤ functions. Solution concepts in- clude , dominant solutions, and its many re…nements

Extensive form games: data consists of a directed graph that describes the temporal order of play, the actions and information that are available when a player moves, payo¤s, etc. Solution concepts include all strategic form concepts plus concepts like perfection and se- quentiality. Strategic form games (SFG):

Players: N = 1; ::; n f g

Strategies: Ai = ? 6

Payo¤s: (a ; ::; an) A An g (a ; ::; an) 1 2 1   7! i 1 2 R

Some Notation:

A=A An 1     

A i = j=iAj  6

If a A; then a i denotes the "projection" of a onto 2 A i; i.e., a i = (aj)j=i 6

If a i A i; then (a i; bi) := (a1; ::; bi; ::; an) 2 2 A An 1     

If a A; then (a i; ai) = a 2 Nash equilibrium: A strategy pro…le (a ; ::; a ) A is 1 n 2 a Nash equilibrium for the SFG if

ai arg max gi(a i; ai) for each i N: 2 ai Ai 2 2

Dominant Strategy equilibrum: : A strategy a^ A i 2 i is a dominant strategy for i if

a^i arg max gi(a i; ai) 2 a A i2 i for each a i A i: 2

A strategy pro…le (a ; ::; a ) A is a dominant strategy 1 n 2 equilibrium for the SFG if ai is a dominant strategy for each i, i.e.,

ai arg max gi(a i; ai) 2 a A i2 i for each i N and each a i A i: 2 2 Every DS equilibrium is a Nash quilibrium but the con- verse is false.

N = 1; 2 f g A = T;B 1 f g A = L; R 2 f g

LR T 1,1 -1,1 B 1,-1 0,0

(a1; a2) = (T;L) is a Nash equilibrium; neither T nor L is a dominant strategy.

(a1; a2) = (B;R) is a Nash equilibrium; both B and R are dominant strategies.

Important Question: Is (T;L) more "robust" than (B;R)?

Answer: Not clear Main Existence Result:

The classic …nite-dimensional existence result goes back to the work of Nash and the proof relies on …xed point theory.

Theorem: Suppose that

(i) each Ai is a nonempty, convex, compact subset of Rmi

(ii) each function a g (a) is continuous on A 7! i

(ii) each function ai gi(a i; ai) is quasiconcave on 7! Ai for each a i A i: 2

Then the SFG has an equilibrium.

This result includes the existence of mixed strategy equi- libria in …nite games as a special case. Adding incomplete information: The General Inter- dependent Values Model

Players: N = 1; ::; n f g

Actions: Ai = ? 6

Types: Ti (T T1 Tn;T i = j=iTj) ,        6 assume …nite only for simplicity of presentation

Common prior: P  := probability measures de- 2 T …ned on T with P (t) > 0 for all t T 2

Payo¤s: (a; t) A T gi(a t)) R 2  7! j 2

Strategy for player i:  : T A i i ! i

Notation:  i(t i) := (j(tj))j=i 6 Ex-post payo¤ to player i of type t T who chooses i 2 i action ai when opponents with type pro…le t i choose the strategy pro…le  i = (j)j=i : 6 Ui( i(t i); ai t i; ti) := gi(1(t1); ::; ai; ::; n(tn) t i; ti) j j

The basic soluition for games with incomplete information was proposed by Harsanyi:

Bayes-Nash equilibrium: (Harsanyi) A strategy pro- …le ( ; ::;  ) A is a Bayes-Nash equilibrium for the 1 n 2 asymmetric information game with private values if

i(ti) arg max Ui( i(t i); ai t i; ti)P (t i ti) 2 ai Ai j j 2 t i T i X2 for each i N and each t T : 2 i 2 i Ex Post Nash equilibrium: A strategy pro…le ( ; ::;  ) 1 n 2 A is an ex-post Nash equilibrium if

i(ti) arg max Ui( i(t i); ai t i; ti) 2 ai Ai j 2 for all i N , ti Ti and t i T i . 2 2 2

Ex Post Dominant Strategy equilibrium: A strategy pro…le i is an ex-post dominant strategy for player i if

i(ti) arg max Ui(a i; ai t i; ti) 2 a A j i2 i for each ti Ti and each a i A i: 2 2

A strategy pro…le ( ; ::;  ) A is an ex-post dominant 1 n 2 strategy equilibrium for the asymmetric information game with private values if i is a dominant strategy for each i, i.e., if

i(ti) arg max Ui(a i; ai t i; ti) 2 a A j i2 i for all i N; ti Ti; t i T i; and a i A i: 2 2 2 2 From the de…nitions, we have the following taxonomy;

Ex Post DS equilibrium Ex Post Nash equilibrium ) Bayes Nash equilibrium ) The Basic Implementation Problem: economic agents: N = 1; ::; n f g types of agent i: Ti (…nite) common prior: P T := probability measures de- …ned on T with P (t2) > 0 for all t T 2 set of social alternatives: C valuation function of agent i : private values

vi : C Ti R+  ! where vi(c; ti) denotes payo¤ to an agent i of type ti when the social is c C. 2 valuation function of agent i : interdependent val- ues

vi : C T R+  ! where vi(c; t) denotes payo¤ to an agent i given type pro…le t when the social outcome is c C. 2 Choice Problems and Mechanisms: social choice problem: a collection (v1; ::; vn;P ) where P  : 2 T outcome function: a mapping q : T C that speci…es ! an outcome in C for each pro…le of announced types. direct mechanism: a collection (q; x1; ::; xn) where q : T C ! is an outcome function and

xi : T R ! is a transfer function. De…nition: Let (v1; ::; vn;P ) be a social choice problem.

An outcome function is outcome e¢ cient if for each t 2 T;

q(t) arg max vj(c; t). 2 c C 2 j N X2

A payment system (x ; ::; xn) is feasible if for each t 1 2 T;

xj(t) 0 . j N  X2 Individual rationality

Let (v1; ::; vn;P ) be a social choice problem.

A mechanism (q; (xi)) is ex post individually rational for agent i if

Ui(t i; ti ti) 0 for all (t i; ti) T: j  2

A mechanism (q; (xi)) is interim individually rational for agent i if

Ui(t i; ti ti)P (t i ti) 0 for all ti Ti: j j  2 t i T i X2

Obviously, ex post IR implies interim IR. : The problem

In a world of in which a benign decision maker knows the actual pro…le of types, then "implementation" of an e¢ cient social outcome is simple:

Step 1: Given t T; compute q(t) arg maxc C j N vj(c; t) 2 2 2 2 P Step 2: De…ne x (t) = v (q(t); t) (you pay exactly i i your valuation)

Step 3: By repeating steps 1 and 2 for each t T; you 2 have constructed a mechanism (q; (xi)) that is feasible, outcome e¢ cient and even ex post individually rational

Now suppose that the benign decision maker does not know the actual type pro…le but tells the agents that, upon hearing their announcements, he will choose a social outcome and monetary transfers according to the mech- anism (q; (xi)) constructed above. Will agents truthfully report their types? Typically, the answer is typically "no" for this particular mechanism. Incentive Compatibility: Private Values

Abusing notation, let

vi(c; t) = vi(c; ti)

A direct mechanism (q; (xi)) induces a game of incom- plete information in which the agents are the players. In this game, A = T and a strategy is a map  : T T ; i i i i ! i i.e., agent i reports i(ti) to the decision maker when his true type is ti:

The ex post payo¤ to agent i when i reports ti0 and true type pro…le is (t i; ti) and the other agents use reporting strategies  i is Ui( i(t i); ti0 t i; ti) j = vi(q( i(t i); ti0); ti) + xi( i(t i); ti0):

If j(tj) = tj for all j; then this ex post payo¤ is simply

Ui(t i; ti0 t i; ti) j = vi(q(t i; ti0); ti) + xi(t i; ti0): The goal of : given a social choice rule q, …nd transfers (xi) so that the associated direct mechanism (q; (xi)) induces a game of incomplete information in which truthful reporting is an equilibrium, i.e.,  is an equilibrium where i(ti) = ti for all i.

Remarks:

Note the inde…nite article: we wish to construct a mech-  anism in which truthful reporting is an equilibrium. It will almost never be the unique equilibrium.

We have several notions of equilibrium corresponding  to varying degrees of robustness. These are discussed on the next slide. De…nition: Let (v1; ::; vn;P ) be a social choice problem with private values.

A mechanism (q; (xi)) is: interim incentive compatible if truthful reporting is a Bayes-Nash equilibrium: for each i N and all t ; t 2 i i0 2 Ti

Ui(t i; ti0 ti)P (t i ti) j j t i T i X2 Ui(t i; ti ti)P (t i ti)  j j t i T i X2 ex post incentive compatible if truthful reporting is an ex post Nash equilibrium: for all i N, all t ; t T and 2 i i0 2 i all t i T i, 2 Ui(t i; ti0 ti) Ui(t i; ti ti): j  j Let q be an outcome e¢ cient social choice function. The Vickrey-Clark-Groves (pivotal) transfers are de…ned as follows:

q (t) = vj(q(t); tj) max vj(c; tj) i c C 2 3 j N i 2 j N i 2Xn 6 2Xn 7 for each t T: The resulting mechanism4 (q; ( q)) is5 the 2 i VCG mechanism with private valuations.

Remarks:

Agents are assessed the cost that they impose on the  remaining agents.

It is straightforward to show that the VCG mechanism  is ex post individually rational and feasible.

Furthermore, the VCG mechanism is ex post incentive  compatible: in the private values model, truthful report- ing is an ex post Nash equilibrium. In the private values model, a dominant strategy. In fact, truthful reporting is actually an ex post DS equilibrium. Special case of VCG Mechanisms: Second price auc- tions with private values

If i receives the object, his value is the nonnegative num- ber wi(ti) .

In this framework,

q(t) = (q1(t); ::; qn(t)) where each q (t) 0 and q (t) + + qn(t) 1 and i  1    

vi(q(t i; ti0); ti) + xi(t i; ti0) = qi(t i; ti0)wi(ti) + xi(t i; ti0):

Finally, outcome e¢ ciency means that

qi(t)wi(ti) = max wi(t) : i N f g i N 2 X2 Let

w(t) := max w^i(ti) i

I(t) = i N w^ (t ) = w (t ) f 2 j i i  i g and, again for simplicity of presentation, suppose that I(t) = 1: If j j q (t) = 1 if I(t) = i i f g = 0 if I(t) = i 6 f g then q is outcome e¢ cient. De…ning

w i(t i) := max wj(tj) j:j=if g 6 then the VCG transfers associated with q are given by

i(t) = w i(t i) if I(t) = i f g = 0 if I(t) = i : 6 f g Why does the second price auction induce truthful announcements in the private values case?

Suppose that (t i; ti) the true type pro…le and ti0 is i’s announcement. If i is the winner when he is honest (i.e., I(t i; ti) = i ); then honesty yields a payo¤ of f g wi(ti) w i(t i) 0:  However, a lie (i.e., t = t )) results in one of two pos- i0 6 i sibilities: either I(t i; ti0) = i in which case his payo¤ f g remains

wi(ti) w i(t i) or i is a loser and his payo¤ is 0.

What about interdependent values? Incentive Compatibility: Interdependent Values

De…nition: Let (v1; ::; vn;P ) be a social choice problem. A mechanism (q; (xi)) is: interim incentive compatible if truthful revelation is a Bayes-Nash equilibrium: for each i N and all t ; t 2 i i0 2 Ti

Ui(t i; ti0 ti)P (t i; t i ti) j j t i T i X2 Ui(t i; ti t i; ti)P (t i ti)  j j t i T i X2 ex post (Nash) incentive compatible if truthful revelation is an ex post Nash equilibrium: for all i N, all t ; t 2 i i0 2 Ti and all t i T i, 2 Ui(t i; ti0 ti) Ui(t i; ti ti): j  j A "super robust notion of incentive compatibility is pos- sible. From the previous slide, recall that a mechanism (q; (xi)) is: ex post (Nash) incentive compatible if truthful revelation is an ex post Nash equilibrium: for all i N, all t ; t 2 i i0 2 Ti and all t i T i, 2 Ui(t i; ti0 ti) Ui(t i; ti ti): j  j

A mechanism (q; (xi)) is ex post DS incentive compatible if truthful revelation is an ex post DS equilibrium: for all i N, all ti; ti0 Ti and all t i; s i T i, 2 2 2 vi(q(s i; ti0); t i; ti) + xi(s i; ti0) vi(q(s i; ti); t i; ti) + xi(s i; ti):  Remarks:

ex post DS incentive compatible ex post (Nash)  ) incentive compatible interim incentive compatible )

ex post DS incentive compatibility is simply too strong  to be useful

good news: in the private values special case, ex post  DS incentive compatibility and ex post (Nash) incentive compatibility coincide and reduce to the previous de…ni- tion of DS incentive compatibility provided above for the private values case. What about extending the VCG mechanism to the case of interdependent values?

Let q be an outcome e¢ cient social choice function.

The Generalized Vickrey-Clark-Groves (pivotal) transfers are de…ned as follows: for each t T; 2

q (t) = vj(q(t); t) max vj(c; t) i c C 2 3 j N i 2 j N i 2Xn 6 2Xn 7 4 5 q The resulting mechanism (q; ( i )) is the GVCG mech- anism with interdependent valuations. Remarks:

Agents are again assessed the cost that they impose on  the remaining agents.

It is straightforward to show that the GVCG mechanism  is ex post individually rational and feasible.

If v depends only on t , then the GVCG mechanism  i i reduces to the classical VCG mechanism for private value problems

In general, however, the GVCG mechanism will not even  satisfy interim IC.

Question: Are there any circumstances under which the GVCG mechanism will be ex post IC?

Answer: Yes An application of Implementation Theory with In- terdependent Valuations: Cybersecurity

Agents: N = set of nodes/users of a computer network

Node i’stype: ti is a measure of i’s"vulnerability", e.g., i’slocation in the network, i’sattractiveness to attackers, i’scurrent level of security resource qi = quantity of resource allocated to security at node i vi(qi; t) = i’swillingness to pay for qi units of the secu- rity resource given vulnerability pro…le t = (t1; ::; tn)

Not unreasonable assumptions: @v i 0 @x  @v i 0 @ti  @v i 0; j = i @tj  6 @v @v i i; j = i @ti  @tj 6 Suppose that

(q1(t); ::; qn(tn)) arg min vi(ci; t1; ::; tn) 2 (c1;::;cn) C 2 Xi Now …nd a system of transfers x = (x1; ::; xn) so that (q; x) is IC and IR. For this implementation problem with interdep valuations, we can de…ne the GVCG mechanism but it has desirable incentive properties only in special circumstances. A more realistic cybersecurity model

Given a security resource allocation (q1; ::; qn) and a vul- nerability pro…le (t1; ::; tn), let

G(q1; ::; qn; t1; ::; tn) denote the expected monetary value of the damage in- curred by the network if a node is attacked.

Example: Given (q1; ::; qn) and (t1; ::; tn), the network administrator knows/estimates that a malevolent agent will attack node i with prob i(q1; ::; qn; t1; ::; tn)

If node i is attacked, then wi(qi; t1; ::; tn) = expected value of network damage incurred.

In this case,

G(q1; ::; qn; t1; ::; tn) = i(q1; ::; qn; t1; ::; tn)wi(qi; t1; ::; tn) Xi As a further specialization, suppose that

i(q1; ::; qn; t1; ::; tn) = i(qi; t1; ::; tn) and

v (q ; t) =  (q ; t ; ::; tn)w (q ; t ; ::; tn): i i i i 1 i i 1 Then the incentives of the users and the system adminis- trator are "aligned" but this is not a realistic assumption. Reasonable assumptions:

t  (q ; ::; qn; t ; ::; tn) is increasing i 7! i 1 1 t  (q ; ::; qn; t ; ::; tn) is decreasing, j = i j 7! i 1 1 6 q  (q ; ::; qn; t ; ::; tn) is decreasing i 7! i 1 1 qi wi(qi; t i; ti) is decreasing 7! ti wi(qi; t i; ti) is increasing 7! If

q(t) arg min G(q ; ::; qn; t ; ::; tn) 2 q 1 1 then we want to …nd a system of transfers x = (x1; ::; xn) so that (q; x) is IC and IR.

For this implementation problem with interdependent val- uations, the GVCG mechanism is generally irrelevant even in the case of private values in which vi(x; t) = vi(x; ti)!!

So we need transfers di¤erent from the VCG/GVCG if we want to implement the outcome function q. The "typical" with a continuum of types: The case of independent private values

Types: t T = [a ; b ] i 2 i i i

Probabilistic structure: fi := density function for the distribution of agent i’stype t = (t ; ::; tn) T f(t) = f (t ) f (t ) 1 2 7! 1 1    1 1 t i T i f i(t i) = fj(tj) 2 7! j=i Y6

maximize H(x(t); q(t); t)f(t)dt ZT ti arg max vi(q(t i; ti0); ti) xi(t i; ti0) f i(t i)dt i for all i; ti 2 t0 T i i Z h i [vi(q(t i; ti); ti) xi(t i; ti)] f i(t i)dt i for all i; ti T i Z Example: The Optimal Auction Design Problem (My- erson, MOR, 1980)

An outcome is pro…le of probabilities denoted q(t) = (q1(t); ::; qn(t)) and i’sex post expected payo¤ is:

vi(q(t i; ti0); ti) xi(t i; ti0) = qi(t i; ti0)ti xi(t i; ti0) The seller then chooses a mechanism (q; x) that solves Problem A:

maximize xi(t) f(t)dt T 2 3 Z Xi 4 5 ti arg max qi(t i; ti0)wi(ti) xi(t i; ti0) f i(t i)dt i for all i; ti 2 t0 T i i Z h i qi(t i; ti0)wi(ti) xi(t i; ti) f i(t i)dt i for all i; ti T i Z h i q (t) 0 and q (t) + + qn(t) 1 i  1     Example: The Optimal De- sign Problem (Ulku, 2009)

Let denote a …nite set of objects. An outcome is pro…le of subsets of denoted

S(t) = (S1(t); ::; Sn(t)) and i’sex post expected payo¤ is:

vi(S(t i; ti0); ti) xi(t i; ti0) The seller then chooses a mechanism (S; x) that solves

maximize xi(t) f(t)dt T 2 3 Z Xi 4 5 ti arg max vi(S(t i; ti0); ti) xi(t i; ti0) f i(t i)dt i for all i; ti 2 t0 T i i Z h i vi(S(t i; ti0); ti) xi(t i; ti) f i(t i)dt i for all i; ti T i Z h i Si(t) Sj(t) = ?; i = j and S1(t) Sn(t) \ 6 [    [  Example of a combinatorial auction design problem: Click Auctions

= 1; :::; m be the set of ad positions that will be displayedf by ang internet search engine after a keyword search ranked from top to bottom. k k interpreted as the number of user clicks on the2 ad7! displayed at that position.

Suppose that the positions 1; ::; m are ranked according to "clicks per unit time" so that > > m: 1    Let N = 1; :::; n be the set of potential advertisers. f g

The value of position k to advertiser i of type ti who is assigned position k is de…ned as gi( k; t) where k < j implies gi( k; ti) > gi( j; ti):

Possible valuations for sets of positions:

vi(S; ti) = max gi( k; ti) k S f g 2 vi(S; ti) = gi( k; ti) k S X2 An "atypical" mechanism design with a continuum of types: Cybersecurity

Agents: N = set of nodes/users of a computer network

Node i’stype: ti is a measure of i’s"vulnerability", e.g., i’slocation in the network, i’sattractiveness to attackers, i’scurrent level of security resource qi = quantity of resource allocated to security at node i vi(x; t) = i’swillingness to pay for x units of the security resource given vulnerability pro…le t = (t1; ::; tn)

G(q1; ::; qn; t1; ::; tn) = expected monetary value of the damage incurred by the network given security resource allocation (q1; ::; qn) and vulnerability pro…le (t1; ::; tn). Model 1: Suppose that 0 <  1:  minimize [G(q(t); t) + (1 )C(q(t))] f(t)dt ZT IC;IR x (t) C(q(t)) for all t i  Xi

Model 2: Suppose that 0 < < 1:

minimize C(q(t))f(t)dt ZT IC;IR G(q(t); t) for all t  x (t) C(q(t)) for all t i  Xi How do we solve the "basic" optimal auction design prob- lem? Myerson proved the following fundamental result:

Theorem: If q solves the problem

1 Fi(ti) maximize ti qi(ti) f(t)dt s.t. T 2 fi(ti) ! 3 Z Xi q (t)4 0 and q (t) + + qn(t)5 1 i  1     ti qi(t i; ti)f i(t i)dt i is nondecreasing for all i; ti 7! T i Z and if ti xi(t) = qi(t)ti qi(t i; y)dy Zai then (q; x) solves Problem A. An observation: If q solves Problem B

1 Fi(ti) maximize ti qi(ti) f(t)dt s.t. T 2 fi(ti) ! 3 Z Xi q (t)4 0 and q (t) + + qn(t)5 1 i  1     and if ti qi(t i; ti)f i(t i)dt i is nondecreasing for all i; ti 7! T i Z then q solves Problem A. Problem B is simple to solve. Choose t T: 2

1 Fi(ti) If maxi ti 0; let q (t) = 0 for all t. fi(ti) i   

1 Fi(ti) If maxi ti > 0; let fi(ti)   1 Fi(ti) i(t) arg max ti 2 i ( fi(ti) ) and let q (t) = 1: i(t) Of course, this simple solution may not solve the real mechanism design problem unless we know that ti qi(t i; ti)f i(t i)dt i is nondecreasing for all i; ti 7! T i Z