1 / 35

the effect of false-name bids in combinatorial auctions: new fraud in internet auctions

the effect of false-name bids in combinatorial auctions: new fraud in internet auctions Makoto Yokoo Yuko Sakurai Shigeo Matsubara

barton
Download Presentation

the effect of false-name bids in combinatorial auctions: new fraud in internet auctions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. the effect of false-name bids in combinatorial auctions: new fraud in internet auctions Makoto Yokoo Yuko Sakurai Shigeo Matsubara presented by: Wenjie Xiao

  2. outline • Introduction • Formalization • Effect of false-name bids in combinatorial auction • Sufficient condition for VCG to be false-name-proof • Discussion • Conclusions and future work

  3. introduction • Internet auction in electronic commerce • Conventional auctions VS Combinatorial auctions • Excellent environment for executing combinatorial auction • New cheating type!!

  4. introduction • False-name bids bids submitted by a single bidder using multiple identifiers such as multiple e-mail addresses. • False-name-proof we call a protocol is false-name-proof if truth-telling without using false-name bids is a dominant strategy for each bidder.

  5. introduction • Collusion VS false-name bids • restricted subclass of collusion: - false-name bids - group-strategy-proof • False-name proof != group-strategy-proof (talked about later)

  6. Formalization • Model of a combinatorial auction in which false-name bids are possible • Modified the presented model so that it can handle false-name bids • Assume a quasi-linear private value model which no allocative externality

  7. Formalization • Set of bidders N={1,2,..n} • Agent 0 is an auctioneer, who is willing to sell a set of goods of A={a1,a2 …al} • Each bidder i has his own preferences over subset of A • Privately observes a type θi for each bidder i, θi is drawn from a set Θ

  8. Formalization • Definition 1: the utility of bidder i is represented as v(B, θi )+ ti Where: B is the subset of A which bidder i obtained ti is a monetary transfer v(.) is evaluation value of given set of goods and type.

  9. Formalization • Assumption: 1). V is normalized by v(∅, θi ) = 0. 2). Free disposal v(B’, θi ) ≥v(B, θi ) for all B’ ⊆ B 3). For auctioneer (agent 0) v(B, θ0)=0 for any subset of goods B

  10. Formalization • Definition 2. • There exists a set of identifiers M = {id1, id2, . . . , idm}. Furthermore, • there exists a mapping function φ, where φ :N → 2M\ {∅}. 2Mis a power set of M. • φ(i)represents a set of identifiers a bidder i can use. And is private information of bidder i • Assume - for all i , |φ(i)| ≥ 1 and - Ui φ(i) =M hold - for all i ≠ j , φ(i)∩φ(j)=∅ holds. • the set of signals are represented as T = Θ × (2M \ ∅), where the signal of bidder i is (θi ,φ(i)) ∈ T

  11. Formalization • Define a combinatorial auction protocol • Restrict our attention to: - almost anonymous mechanisms - auction protocol, in which the set of messages for each identifier is Θ ∪ {0},

  12. Formalization • Definition 3. A combinatorial auction protocol is defined by Γ = (k(·), t (·)). • We call k(·) allocation function and t (·) transfer function. Let us represent a profile of types, each of which is declared under each identifier as θ = (θid1, θid2, . . . ,θidm), where θidi∈ Θ ∪ {0}. • 0 is a special type declaration used when a bidder is not willing to participate in the auction: • k(θ) = (k0(θ ), kid1(θ ), . . . , kidm(θ )), where kidi(θ ) ⊆ A, • t (θ) = (t0(θ ), tid1(θ ), . . . , tidm(θ )), where t0(θ ), tidi(θ ) ∈ R. • R denotes the set of real numbers. Here, t0(θ ) represents the revenue of the auctioneer and −tidi(θ ) represents the payment of idi

  13. Formalization • Assumption: • Allocation feasibility constraints: Forall i ≠ j , kidi(θ ) ∩ kidj(θ )=∅, kidi(θ ) ∩ k0(θ )=∅, kidj(θ ) ∩ k0(θ )=∅. Ui=1m kidi(θ ) ∪ k0(θ ) = A. • Budget constraint: t0(θ )=− ∑1≤i≤mtidi (θ ). • Non-participation constraint: For all θ, if θidi= 0, then kidi(θ )=∅ and tidi(θ ) = 0.

  14. Formalization • Assumption for case of ties • in an almost anonymous mechanism, the following condition is satisfied: • For a declared type profile θ = (θid1, θid2, . . . ,θidm), if θidi = θidj , then v(kidi(θ ), θidi )+tidi(θ ) = v(kidj(θ ), θidj)+ tidj(θ ) holds.

  15. Formalization • Definition 4. For an allocation function k(.), if for all k = (k0, kid1, . . . ,kidm), which satisfies the allocation feasibility constraints, and • ∑1≤i≤mv(kidi(θ), θidi)≥ ∑1≤i≤mv(kidi, θidi)holds. • then k(·) is Pareto efficient • Let us denote a Pareto efficient allocation function as k∗(·).

  16. Formalization • Definition 5. • A strategy s of bidder i is a function s : T → (Θ∪{0})Msuch that • s(θi ,φ(i)) ∈ (Θ ∪{0})|φ(i)| for every (θi ,φ(i)) ∈ T . That is, s(θi ,φ(i)) = (θi,1, . . . ,θi,mi ), • where θi,j ∈ Θ ∪ {0} and |φ(i)| = mi.

  17. Formalization • Definition 6. • For bidder i, a strategy s*(θi,φ(i)) = (s*i,1, . . . , s*i,mi) is a dominant strategy if for all type profiles θ∼i , (θi,1, . . . ,θi,mi ), where θ=((s*i,1, . . . , s*i,mi),θ∼i), θ’=((θi,1, . . . ,θi,mi ),θ∼i), v(ski(θ ), θi)+ sti(θ ) ≥ v(ski (θ’), θi)+ sti (θ’) holds.

  18. Formalization • Definition 7. We say a mechanisms is false-name-proof when for all bidder i , s*(θi ,φ(i)) =(θi , 0, . . ., 0) is a dominant strategy.

  19. Effect of false-name bids in combinatorial auctions • First consider the effect in VCG • Definition 8. • In the VCG mechanism, k∗(·) is used for determining the allocation, and the transfer function is determined as follows. • tidi(θ)=[∑j≠iv(k*(θ), θidj)]-[∑j≠iv(k*-idi(θ), θidj)]. • Where k*-idi(θ) is an allocation k that maximizes ∑j≠iv(kidj, θidj) • i.e. in VCG, each bidder is required to pay the decreased amount of the surplus.

  20. Effect of false-name bids in combinatorial auctions • Example: • Proposition 1: (generally in combinatorial auctions) in combinatorial auctions, there exists no false-name-proof auction protocol that satisfied pareto efficiency. • Proof by counter example proof: assuming there exists a false-name-proof, pareto efficiency protocol.

  21. Effect of false-name bids in combinatorial auctions • Proof (cont.) a1 a2 both a1 and a2 bidder 1: (b, 0, b); bidder 2: (0, 0, b + c); bidder 3: (0, b, b). - b>c, so by pareto efficiency, bidder 1 gets good a1 and bidder 3 get good a2 - let Pb denote the payment of bidder 1. - if bidder 1 declares his evaluation value for good a1 as b’=c+e and the allocation does not change. And let payment to be Pb’ - Pb’ <= b’ - Pb<=Pb’ (by dominant strategy) => Pb <= c+e (same for bidder 3)

  22. Effect of false-name bids in combinatorial auctions • Proof (cont.) a1 a2 both a1 and a2 bidder 1: (b, b, 2b); bidder 2: (0, 0, b + c); bidder 3: (0, 0, 0). - payment is P2b for bidder 1 and P2b <= 2*Pb <= 2c+2e a1 a2 both a1 and a2 bidder 1: (d, d, 2d); bidder 2: (0, 0, b + c); bidder 3: (0, 0, 0). - c+e<d<b and b+c >2*d, good got by bidder 2 - bidder 1 declare his evaluation value as (b,b,2b) instead of (d,d,2d), payment is P2b<=2c+2e (bidder 1) <=2d

  23. Effect of false-name bids in combinatorial auctions • Bidder 1 can increase the utility by overstating his true evaluation values • in combinatorial auctions, there exists no false-name-proof auction protocol that satisfied pareto efficiency. • Note: - proposition 1 holds in more general setting. - Relies on the model defined before, but not for free disposal. - Not rely on the fact that the mechanism is almost anonymous

  24. Sufficient condition where VCG is false-name-proof • Definition 9. For a set of bidders and their types Y = {(y1, θy1), (y2, θy2), . . .} and a set of goods B ⊆ A, we define surplus function U as follows. Let us denote KB,Yas a set of feasible allocations of B to Y : • U(B,Y) = max k∈KB,Y ∑ (yi ,θyi )∈Y v(kyi, θyi ). • Define U(A,Y) as UA(Y ).

  25. Sufficient condition where VCG is false-name-proof • Definition 10. We say UA(·) is concave over bidders if for all possible sets of bidders Y,Z, and W, where Y ⊆ Z, the following condition holds: UA(Z ∪ W) − UA(Z) ≥UA(Y ∪ W) − UA(Y ). • Proposition 2. The VCG mechanism is false-name-proof if the following conditions are satisfied: • Θ satisfies that UA(·) is concave for every subset of bidders with types in Θ. • Each declared type is in Θ ∪ {0}.

  26. Sufficient condition where VCG is false-name-proof • Definition 11. Given a price vector p = (pa1,…, pal), we denote Di(p)={B⊂A: v(B, θi)−∑ aj∈B Paj≥ v(C, θi)−∑aj∈Cpaj ,∀C ⊂ A}. • Di(p) represents the collection of bundles that maximize the net utility of bidder i under price vector p. • - if for any two price vectors p and p’ such that p’ ≥ p, p’aj= paj, and aj ∈ B ∈ Di(p), - then there exists B ∈ Di(p) such that aj∈ B. - so gross substitutes condition is satisfied.

  27. Sufficient condition where VCG is false-name-proof • Another sufficient condition – submodularity. • Definition 12: We say U is submodular for a set of bidders X, if the following condition is satisfied for all sets B ⊆ A and C ⊆ A: U(B,X) + U(C,X) ≥U(B ∪ C,X) +U(B ∩ C,X). • Proposition 3: (sufficient condition) If U is submodular for all set of bidders X ⊆ N, then UA is concave.

  28. Sufficient condition where VCG is false-name-proof • Proposition 4. (necessary condition) If U is not submodular for a set of bidders X and a set of goods B and C, i.e., U(B,X) + U(C,X) <U(B ∪ C,X) + U(B ∩ C,X), then we can create a situation where for a set of bidders Y , although U is submodular for Y , UA is not concave for X∪Y . where A = B ∪ C.

  29. Discussion • Group-strategy-proof protocols • Group-strategy-proof is not false-name proof • Also, false-name proof not necessary to be group-strategy-proof.

  30. Discussion • Definition: (group-strategy-proof) An auction protocol is group-strategy proof if there exists no group of bidders that satisfies the following condition. • if telling the false information - Uf(i)≥ Ut(i) for all i in N - at least one i in N s.t Uf(i) > Ut(i)

  31. Discussion • if a protocol is false-name-proof, but it is not necessary to be a group-strategy-proof. • Example: 2 bidders and 2 goods, Θ = {θ1, θ2, θ3, θ4}, • • θ1: (10, 9, 18); • • θ2: (9, 10, 18); • • θ3: (10, 0, 10); • • θ4: (0, 10, 10). • v({a1}, θi) + v({a2}, θi) ≥ v({a1, a2}, θi)

  32. Discussion • A protocol is group-strategy-proof, but not false-name-proof • Protocol: The auctioneer sets a reservation price p. The winner is chosen randomly from the bidders whose declared evaluation value is larger than p. The winner pays p.

  33. conclusion • False-name bids & False-name proof • Defined model • Connected to VCG • There exists no false-name-proof combinatorial auction protocol that satisfies pareto efficiency. • Point the sufficient condition where the VCG mechanism is false-name-proof • Group-strategy-poof

  34. Future work Consider the false-name bids in: • no theoretical bound on the efficiency loss • Multi-unit auction • Situation where multiple buyers and sellers bit to exchange a designated good

  35. Question?

More Related