Mechanism Design in Large Games: Incentives and Privacy ∗

Mechanism Design in Large Games: Incentives and Privacy ∗

Mechanism Design in Large Games: Incentives and Privacy ∗ [Extended Abstract]† Michael Kearns Mallesh M. Pai Department of Computer and Department of Economics Information Science University of Pennsylvania University of Pennsylvania Philadelphia, PA Philadelphia, PA [email protected] [email protected] Aaron Roth Jonathan Ullman Department of Computer and School of Engineering and Information Science Applied Sciences University of Pennsylvania Harvard University Philadelphia, PA Cambridge, MA [email protected] [email protected] ABSTRACT correlated equilibrium of a large game while satisfying joint We study the problem of implementing equilibria of com- differential privacy. plete information games in settings of incomplete informa- Although our recommender mechanisms are designed to tion, and address this problem using “recommender mech- satisfy game-theoretic properties, our solution ends up satis- anisms.” A recommender mechanism is one that does not fying a strong privacy property as well. No group of players have the power to enforce outcomes or to force participa- can learn “much” about the type of any player outside the tion, rather it only has the power to suggestion outcomes on group from the recommendations of the mechanism, even the basis of voluntary participation. We show that despite if these players collude in an arbitrary way. As such, our these restrictions, recommender mechanisms can implement algorithm is able to implement equilibria of complete in- equilibria of complete information games in settings of in- formation games, without revealing information about the complete information under the condition that the game is realized types. large—i.e. that there are a large number of players, and any player’s action affects any other’s payoff by at most a small Categories and Subject Descriptors amount. Theory of Computation [Algorithmic Game Theory and Our result follows from a novel application of differential Mechanism Design]: Algorithmic Mechanism Design privacy. We show that any algorithm that computes a cor- related equilibrium of a complete information game while satisfying a variant of differential privacy—which we call Keywords joint differential privacy—can be used as a recommender Game Theory, Mechanism Design, Large Games, Differen- mechanism while satisfying our desired incentive properties. tial Privacy Our main technical result is an algorithm for computing a 1. INTRODUCTION ∗We gratefully acknowledge the support of NSF Grant CCF- A useful simplification common in game theory is the 1101389. We thank Nabil Al-Najjar, Eduardo Azevdeo, Eric model of games of complete (or full) information. Infor- Budish, Tymofiy Mylovanov, Andy Postlewaite, Al Roth mally, in a game of complete information, each player knows and Tim Roughgarden for helpful comments and discussions. with certainty the utility function of every other player. In †A full version of this working paper appears on the arXiv games of complete information, there are a number of solu- preprint site [KPRU13]. tion concepts at our disposal, such as Nash equilibrium and correlated equilibrium. Common to these is the idea that each player is playing a best response against his opponents— Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed because of randomness, players might be uncertain about for profit or commercial advantage and that copies bear this notice and the full cita- what actions their opponents are taking, but they under- tion on the first page. Copyrights for components of this work owned by others than stand their opponents’ incentives exactly. ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- In many situations, it is unreasonable to assume that play- publish, to post on servers or to redistribute to lists, requires prior specific permission ers have exact knowledge of each other’s utilities. For exam- and/or a fee. Request permissions from [email protected]. ple, players may have few means of communication outside ITCS’14, January 12–14, 2014, Princeton, New Jersey, USA. of the game, or may regard their type as valuable private Copyright 2014 ACM 978-1-4503-2698-8/14/01 ...$15.00. http://dx.doi.org/10.1145/2554797.2554834. information. These are games of incomplete (or partial) in- 403 formation, which are commonly modeled as Bayesian games that in such games there exists a recommender mechanism in which the players’ utilities functions, or types, are drawn such that for any prior on agent types, it is an approximate from a commonly known prior distribution. The most com- Bayes-Nash equilibrium for every agent in the game to opt mon solution concept in such games is Bayes-Nash Equilib- in to the proxy, and then follow its recommended action. rium. This stipulates that every player i, as a function of his Moreover, when players do so, the resulting play forms an type, plays an action that maximizes his expected payoff, in approximate correlated equilibrium of the full information expectation both over the random draw of the types of his game. The approximation error we require tends to 0 as the opponents from the prior distribution and over the possible number of players grows. randomization of the other players. Unsurprisingly, equilibrium welfare can suffer in games 1.1 Overview of Techniques and Results of incomplete information, because coordination becomes A tempting approach is to use the following form of proxy: more difficult amongst players who do not know each other’s The proxy accepts a report of each agent’s type, which de- types. One way to measure the quality of equilibria is via the fines an instance of a full information game. It then com- “price of anarchy”—how much worse the social welfare can putes a correlated equilibrium of the full information game, be in an equilibrium outcome, as opposed to the welfare- and suggests an action to each player which is a draw from maximizing outcome. The price of anarchy can depend this correlated equilibrium. By definition of a correlated significantly on the notion of equilibrium. For example, equilibrium, if all players opt into the proxy, then they can 1 Roughgarden [Rou12] notes that even smooth games that do no better than subsequently following the recommended have a constant price of anarchy under full information so- action. However, this proxy does not solve the problem, as lution concepts (e.g. Nash or correlated equilibrium) can it may not be in a player’s best interest to opt in, even if the have an unboundedly large price of anarchy under partial in- other n 1 players do opt in! Intuitively, by opting out, the formation solution concepts (e.g. Bayes-Nash Equilibrium). player can− cause the proxy to compute a correlated equilib- Therefore, given a game of partial information, where all rium of the wrong game, or to compute a different correlated that we can predict is that players will choose some Bayes- equilibrium of the same game!2 The problem is an instance Nash Equilibrium (if even that), it may be preferable to im- of the well known equilibrium-selection problem—even in a plement an equilibrium of the complete information game game of full information, different players may disagree on defined by the actual realized types of the players. Doing their preferred equilibrium, and may have trouble coordi- so would guarantee welfare bounded by the price of anarchy nating. The problem is only more difficult in settings of of the full information game, rather than suffering from the incomplete information. In our case, by opting out of the large price of anarchy of the partial information setting. In mechanism, a player can have a substantial affect on the a smooth game, we would be just as happy implementing a computed equilibrium, even if each player has only small correlated equilibrium as a Nash equilibrium, since the price affect on the utilities of other players. of anarchy is no worse over correlated equilibria. Our solution is to devise a means of computing corre- In this paper we ask whether it is possible to help coordi- lated equilibria such that any single player’s reported type nate on an equilibrium of the realized full information game to the algorithm only has a small effect on the distribution using a certain type of proxy that we call a “recommender of suggested actions to all other players. The precise no- mechanism.” That is, we augment the game with an addi- tion of “small effect” that we use is a variant of the well tional option for each player to use a proxy. If players opt in studied notion of differential privacy. It is not hard to see to using the proxy, and reveal their type to the proxy, then that computing an equilibrium of even a large game is not it will suggest some action for them to take. However, play- ers may also simply opt out of using the proxy and play the 2As a simple example, consider a large number n of people original game using any strategy they choose. We make the who must each choose whether to go to the beach (B) or assumption that if players use the proxy, then they must re- mountains (M). People privately know their types— each port their type truthfully (or, alternatively, that the proxy person’s utility depends on his own type, his action, and the has the ability to verify a player’s type and punish those fraction of other people p who go to the beach. A Beach type gets a payoff of 10p if he visits the beach, and 5(1 p) who report dishonestly). However, the proxy has very lim- if he visits the mountain.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us