Kate Larson

Introduction

Auction Protocols Common Introduction to Auctions Protocols Revenue and Optimal Auctions Common Value Auctions

Vulnerabilities Kate Larson in Auctions

Beyond Single Cheriton School of Computer Science Item Auctions University of Waterloo Summary Outline

Auctions

Kate Larson 1 Introduction Introduction

Auction Protocols 2 Auction Protocols Common Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Revenue and Optimal Auctions Auctions Common Value Auctions Vulnerabilities in Auctions Beyond Single 3 Vulnerabilities in Auctions Item Auctions

Summary 4 Beyond Single Item Auctions

5 Summary Auctions

Auctions Kate Larson Methods for allocating goods, tasks, resources,... Introduction Participants Auction auctioneer Protocols Common Auction bidders Protocols Revenue and Optimal Auctions Enforced agreement between auctioneer and the Common Value Auctions winning bidder(s) Vulnerabilities in Auctions Easily implementable (e.g. over the Internet) Beyond Single Conventions Item Auctions

Summary Auction: one seller and multiple buyers : one buyer and multiple sellers Todays lecture will discuss the theory in the context of auctions, but this applies to reverce auctions as well (at least in 1-item settings). Auction Settings

Auctions

Kate Larson

Introduction Private value: the value of the good depends only on

Auction the agent’s own preferences Protocols e.g a cake that is not resold of showed off Common Auction Protocols Revenue and Common value: an agent’s value of an item is Optimal Auctions Common Value determined entirely by others’ values (valuation of the Auctions item is identical for all agents) Vulnerabilities in Auctions e.g. treasury bills Beyond Single Item Auctions Correlated value (interdependent value): agent’s

Summary value for an item dpends partly on its own preferences and partly on others’ value for it e.g. auctioning a transportation task when bidders can handle it or reauction it to others Outline

Auctions

Kate Larson 1 Introduction Introduction

Auction Protocols 2 Auction Protocols Common Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Revenue and Optimal Auctions Auctions Common Value Auctions Vulnerabilities in Auctions Beyond Single 3 Vulnerabilities in Auctions Item Auctions

Summary 4 Beyond Single Item Auctions

5 Summary Four Common Auctions

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value First-price, sealed-bid auction Auctions Vulnerabilities in Auctions

Beyond Single Item Auctions

Summary English auction aka first-price open-cry auction

Auctions

Kate Larson

Introduction Protocol: Each bidder is free to raise their bid. When

Auction no bidder is willing to raise, the auction ends and the Protocols Common Auction highest bidder wins. Highest bidder pays its last bid. Protocols Revenue and Optimal Auctions Strategy: Series of bids as a function of agent’s private Common Value Auctions value, prior estimates of others’ valuations, and past Vulnerabilities bids in Auctions

Beyond Single Best strategy: Item Auctions Variations: Summary Auctioneer controls the rate of increase Open-exit: Bidders have to openly declare exit with no re-entering possibilities First-price sealed-bid auction

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Protocol: Each bidder submits one bid without Protocols Revenue and knowing others’ bids. The highest bidder wins the item Optimal Auctions Common Value at the price of it’s bid Auctions Vulnerabilities Strategy: Bid as a function of agent’s private value and in Auctions its prior estimates of others’ valuations Beyond Single Item Auctions Best strategy: Summary Example

Auctions

Kate Larson Assume there are 2 agents (1 and 2) with values v1, v2 Introduction drawn uniformly from [0, 1]. Utility of agent i if it bids bi and Auction Protocols wins is ui = vi − bi . Common Auction Protocols How should 1 bid? (i.e. what is b(v ) = z?). Revenue and 1 Optimal Auctions Common Value Auctions Z 2z 2 Vulnerabilities U1 = (v1 − z)dz = (v1 − z)2z = 2zv1 − 2z in Auctions z=0 Beyond Single Item Auctions Note: given z = b2(v2) = v2/2, 1 only wins if v2 < 2z

Summary Therefore, 2 arg max[2zv1 − 2z ] = v1/2 z

Similar arguement for agent 2, assuming b1(v1) = v1/2. Example

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Assume that there are 2 risk-neutral bidders, 1 and 2. Protocols Revenue and Optimal Auctions Agent 1 knows that 2’s value is 0 or 100 with equal Common Value Auctions probability Vulnerabilities in Auctions 1’s value of 400 is common knowledge Beyond Single Item Auctions What is a Nash equilibrium?

Summary Dutch auction Descending auction

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Protocols Protocol: Auctioneer continuously lowers the price Revenue and Optimal Auctions until a bidder takes the item at the current price Common Value Auctions Strategy: Bid as a function of agent’s private value and Vulnerabilities in Auctions prior estimates of others’ valuations Beyond Single Item Auctions Best strategy:

Summary Dutch (Aalsmeer) flower auction

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Auctions

Vulnerabilities in Auctions

Beyond Single Item Auctions

Summary Dutch (Aalsmeer) flower auction

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Auctions

Vulnerabilities in Auctions

Beyond Single Item Auctions

Summary Vickrey Auction aka Second price, sealed bid auction

Auctions

Kate Larson

Introduction

Auction Protocol: Each bidder submits one bid without Protocols Common Auction knowing the others’ bids. The highest bidder wins and Protocols Revenue and pays an amount equal to the second highest bid. Optimal Auctions Common Value Auctions Strategy: Bid as a function of agent’s private value and Vulnerabilities its prior estimates of others’ valuations. in Auctions

Beyond Single Best strategy: Item Auctions Widely advocated for computational multiagent systems Summary Old (Vickrey 1961) but not widely used by humans Results for Private Value Auctions

Auctions

Kate Larson

Introduction

Auction Protocols Dutch and first-price sealed-bid auctions are Common Auction Protocols strategically equivalent Revenue and Optimal Auctions Common Value For risk neutral agents, Vickrey and English auctions Auctions are strategically equivalent Vulnerabilities in Auctions Dominant strategies Beyond Single Item Auctions All four auctions allocate item efficiently

Summary Assuming no reservation price for the auctioneer Outline

Auctions

Kate Larson 1 Introduction Introduction

Auction Protocols 2 Auction Protocols Common Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Revenue and Optimal Auctions Auctions Common Value Auctions Vulnerabilities in Auctions Beyond Single 3 Vulnerabilities in Auctions Item Auctions

Summary 4 Beyond Single Item Auctions

5 Summary Revenue

Auctions Theorem () Kate Larson Suppose that Introduction

Auction values are independently and identically distributed and Protocols Common Auction all bidders are risk neutral. Protocols Revenue and Optimal Auctions Then any symmetric and increasing equilibrium of any Common Value Auctions standard auction, such that the expected payment of a Vulnerabilities bidder with value zero is zero, yields the same expected in Auctions revenue. Beyond Single Item Auctions

Summary Revenue equivalence fails to hold if agents are not risk neutral. Risk averse bidders: Dutch, first-price ≥ Vickrey, English Risk seeking bidders: Dutch, first-price ≤ Vickrey, English Optimal Auctions

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Auctions

Vulnerabilities in Auctions

Beyond Single Item Auctions

Summary Outline

Auctions

Kate Larson 1 Introduction Introduction

Auction Protocols 2 Auction Protocols Common Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Revenue and Optimal Auctions Auctions Common Value Auctions Vulnerabilities in Auctions Beyond Single 3 Vulnerabilities in Auctions Item Auctions

Summary 4 Beyond Single Item Auctions

5 Summary Common Value Auctions

Auctions

Kate Larson

Introduction In a , the item has some unknown Auction value and each agent has some partial information about Protocols Common Auction the value. Each agent i has signal Xi ∈ [0, ωi ]. The value V Protocols Revenue and of the item is Optimal Auctions Common Value Auctions V = v(X1,..., Xn) Vulnerabilities in Auctions Examples Beyond Single Item Auctions Art auctions and resale

Summary Construction companies effected by common events (e.g. weather) Oil drilling Common Value Auctions

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Protocols Revenue and At time of the common value is unknown Optimal Auctions Common Value Auctions Bidders may have imperfect estimates about the value Vulnerabilities True value only observed after the auction has taken in Auctions place Beyond Single Item Auctions

Summary Winner’s Curse

Auctions

Kate Larson

Introduction

Auction Protocols No agent knows for sure the true value of the item Common Auction Protocols The winner is the agent who made the highest guess Revenue and Optimal Auctions Common Value If bidders all had “reasonable” information about the Auctions value, then the average of all guesses should be Vulnerabilities in Auctions correct

Beyond Single i.e. the winner has overbid! Item Auctions

Summary Agents should shade their bids downward (even in English and Vicrey auctions). Results for Non-Private Value Auctions

Auctions

Kate Larson

Introduction Dutch and first-price sealed-bid are strategically Auction Protocols equivalent Common Auction Protocols Vickrey and English are not strategically equivalent Revenue and Optimal Auctions Common Value All four auctions are efficient Auctions

Vulnerabilities in Auctions Theorem (Revenue Non-Equivalence) Beyond Single Item Auctions With more than 2 bidders, the expected revenues are not

Summary the same:

English ≥ Vickrey ≥ Dutch = first-price sealed-bid Bidder Collusion

Auctions

Kate Larson

Introduction

Auction Example: v1 = 20 and vi = 18 for other bidders. Protocols Common Auction Collusive agreement for English auction: 1 bids 6 and Protocols Revenue and others bid 5. This is self-enforcing Optimal Auctions Common Value Auctions Collusive agreement for Vickrey auction: 1 bids 20 and Vulnerabilities others bid 5. This is self-enforcing in Auctions

Beyond Single In first-price or Dutch auction, if 1 bids below 18, others Item Auctions are motivated to break the collusion Summary Need to identify coalition parties Misbehaving Auctioneers

Auctions

Kate Larson

Introduction Shill bidding is bidding to artifically increase an item’s Auction Protocols price. Common Auction Protocols In theory, only a problem in non-private value auctions Revenue and Optimal Auctions English and all-pay auctions are vulnerable Common Value Auctions Classic analysis ignores the possibility of shills Vulnerabilities Vickrey, first-price, and Dutch are not vulnerable in Auctions

Beyond Single In Vickrey auction, auctioneer can overstate 2nd Item Auctions highest bid Summary Auctioneer can refuse to sell once the auction has closed Undesirable Information Revelation

Auctions

Kate Larson

Introduction

Auction Protocols Vickrey and English auctions reveal agents’ strategic Common Auction Protocols marginal cost information since truthful bidding is a Revenue and Optimal Auctions dominant strategy Common Value Auctions Observed problems with subcontractors Vulnerabilities in Auctions First-price and Dutch may not reveal this information as accurately Beyond Single Item Auctions No dominant strategy and bidding decisions depend on Summary beliefs of others Beyond Single Item Auctions

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Protocols Revenue and Optimal Auctions Common Value Multi-Item Auctions (Combinatorial Auctions) Auctions

Vulnerabilities Position Auctions in Auctions

Beyond Single Item Auctions

Summary Summary

Auctions

Kate Larson

Introduction

Auction Protocols Common Auction Auctions are nontrivial but often analyzable Protocols Revenue and Important to understand merits and limitations Optimal Auctions Common Value Unintuitive auctions may have better properties (i.e. Auctions

Vulnerabilities Vickrey auction) in Auctions Choice of a good auction depends on the setting in Beyond Single Item Auctions which the protocol is used Summary