Skip to main content
Log in

False-name-proof voting with costs over two alternatives

  • Published:
International Journal of Game Theory Aims and scope Submit manuscript

Abstract

In open, anonymous settings such as the Internet, agents can participate in a mechanism multiple times under different identities. A mechanism is false-name-proof if no agent ever benefits from participating more than once. Unfortunately, the design of false-name-proof mechanisms has been hindered by a variety of negative results. In this paper, we show how some of these negative results can be circumvented by making the realistic assumption that obtaining additional identities comes at a (potentially small) cost. We consider arbitrary such costs and apply our results within the context of a voting model with two alternatives.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. See http://www.vote7.com/n7w/world.

  2. See, for instance, http://techcrunch.com/2011/01/09/quora-4/ and http://goo.gl/7JWyXE.

  3. Conitzer et al. (2010) explicitly model optional costly verification of selected users in the context of social networks.

  4. As is the case for strategy-proofness, false-name-proofness is a dominant-strategies criterion, that is, using only one identifier should be optimal regardless of one’s preferences and regardless of what the other agents do. A (weaker) Bayesian definition can also be given, but the dominant-strategies version is the one we study in this paper. For an overview of false-name-proofness, see Conitzer and Yokoo (2010).

  5. This notation suggests that all agents have the same cost function and that there is no uncertainty about this cost function. However, these assumptions are not necessary: all of our analysis goes through if \(c(t)\) is the greatest lower bound on all realizable total costs for obtaining \(t\) identifiers.

  6. As is common in the literature, voluntary participation fails in our model if there is a positive cost for the first identifier. However, voting more than once would still be a dominated strategy. That is, given that an agent is going to participate, the dominant strategy would still be to vote only once. One may also say that if the cost of the first identifier is only \(\epsilon \), then behaving truthfully is \(\epsilon \)-dominant. We do imagine settings where casting the first vote is relatively easy (e.g., when the agent comes upon the election, the agent is already logged into her existing account). It is also quite possible for the cost of the first identifier to be negative, i.e., getting the first account is actually enjoyable. For example, an agent could get a coupon after voting (ideally, a coupon of which it is useless to have more than one copy). Even if there is some effort cost to voting, this may be exceeded by the worth of the coupon, in which case all of our results go through.

  7. Since agents’ utilities are normalized to 1 for their preferred outcome and 0 for the other outcome, the units in this inequality are consistent.

  8. One can argue about the precise definition of responsiveness. For example, the rule that chooses \(A\) if the total number of votes is odd and \(B\) otherwise is more “responsive” in the sense that each additional vote changes the outcome. However, such rules violate neutrality and voluntary participation. For our purposes, a rule is most responsive if, given some constraints (neutrality, false-name-proofness), it comes as close as possible to the outcome of the majority rule.

  9. For instance, suppose that obtaining additional identifiers comes at the cost of other activities. If the time value of other activities is concave (i.e., exhibits decreasing marginal value), and if the marginal effort spent to get another identifier is roughly constant, then the opportunity cost per identifier is increasing (as it comes at the cost of ever more valuable alternative activities).

  10. A preliminary investigation of this setting with linear costs appears in Wagman and Conitzer (2008).

  11. Wagman and Conitzer (2008) introduces group false-name-proof mechanisms in a setting with linear costs. Conitzer et al. (2010) study false-name-proof voting (without costs) on social networks.

  12. To see this, note that \(c''(\cdot )\ge 0\) implies \(c(t+1)-c(t)\ge c(t)-c(t-1)\ge \ldots \ge c(2)-c(1)\). Now, since \(c(1)=0,\,c(k'+1)=c(1)+c(k'+1)\). By the above inequalities, \(c(k'+1+1)\ge c(1+1)+c(k'+1)\). Similarly, \(c(k'+1+2)\ge c(1+2)+c(k'+1),\ldots ,c(k'+1+(k-k'))\ge c(1+k-k')+c(k'+1)\). The final inequality gives \(c(k+1)\ge c(k-k'+1)+c(k'+1)\).

References

  • Anderson E, Simester D (2013) Deceptive reviews: the influential tail. Working paper

  • Byers J, Mitzenmacher M, Zervas G (2012) The groupon effect on yelp ratings: a root cause analysis. In: Proceedings of the 13th ACM conference on electronic commerce, New York

  • Chevalier J, Mayzlin D (2006) The effect of word of mouth on sales: online book reviews. J Mark Res 43(3):345–354

    Article  Google Scholar 

  • Conitzer V (2007) Limited verification of identities to induce false-name-proofness. In: Proceedings of the theoretical aspects of rationality and knowledge (TARK). Brussels, pp 102–111

  • Conitzer V (2008) Anonymity-proof voting rules. In: Proceedings of the fourth workshop on internet and network economics (WINE). Shanghai, pp 295–306

  • Conitzer V, Yokoo M (2010) Using mechanism design to prevent false-name manipulations. Airsoft Int Mag 31(4):65–77

    Google Scholar 

  • Conitzer V, Immorlica N, Letchford J, Mungala K, Liad W (2010) False-name-proof voting in social networks. In: Workshop on internet and network economics (WINE), Stanford

  • Dai W, Jin G, Lee J, Luca M (2012) Optimal aggregation of consumer ratings: an application to yelp.com, Harvard Business School Working Paper, No. 13–042

  • Dellarocas C (2006) Strategic manipulation of internet opinion forums: implications for consumers and firms. Manag Sci 52(10):1577–1593

    Article  Google Scholar 

  • Dellarocas C, Wood CA (2008) The sound of silence in online feedback: estimating trading risks in the presence of reporting bias. Manag Sci 54(3):460–476

    Article  Google Scholar 

  • Gibbard A (1973) Manipulation of voting schemes: a general result. Econometrica 41:587–602

    Article  Google Scholar 

  • Gibbard A (1977) Manipulation of schemes that mix voting with chance. Econometrica 45:665–681

    Article  Google Scholar 

  • Gibbard A (1978) Straightforwardness of game forms with lotteries as outcomes. Econometrica 46: 595–614

    Article  Google Scholar 

  • Green J, Laffont J-J (1977) Characterization of satisfactory mechanisms for the revelation of preferences for public goods. Econometrica 45:427–438

    Article  Google Scholar 

  • Iwasaki A, Conitzer V, Omori Y, Sakurai Y, Todo T, Yokoo M (2010) Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms. In: Proceedings of the ninth international joint conference on autonomous agents and multi agent systems (AAMAS), pp. 633–640

  • Luca M (2011) Reviews, reputation, and revenue: the case of yelp.com. Harvard Business School Working Paper, No. 12–016

  • Moulin H (2009) Pricing traffic in a spanning network. In: Proceedings of the ACM conference on electronic commerce (EC). Stanford, pp 21–30

  • Myerson R (1979) Incentive compatibility and the bargaining problem. Econometrica 41(1):61–73

    Article  Google Scholar 

  • Myerson R (1981) Optimal auction design. Math Oper Res 6:58–73

    Article  Google Scholar 

  • Rastegari B, Condon A, Leyton-Brown K (2007) Revenue monotonicity in combinatorial auctions. In: Proceedings of the national conference on artificial intelligence (AAAI). Vancouver, pp 122–127

  • Resnick P, Sami R (2007) The influence limiter: provably manipulation-resistant recommender systems. In RecSys: Proceedings of the 2007 ACM conference on recommender systems, pp 25–32

  • Resnick P, Sami R (2008a) Manipulation-resistant recommender systems through influence limits. SIGecom Exch 7(3):1–4

    Google Scholar 

  • Resnick P, Sami R (2008b) The information cost of manipulation-resistance in recommender systems. In RecSys: Proceedings of the 2008 ACM conference on recommender systems, pp 147–154

  • Satterthwaite M (1975) Strategy-proofness and arrow’s conditions: existence and correspondence theorems for voting procedures and social welfare functions. J Econ Theory 10:187–217

    Article  Google Scholar 

  • Wagman L, Conitzer V (2008) Optimal false-name-proof voting rules with costly voting. In: Proceedings of the national conference on artificial intelligence (AAAI). Chicago, pp 190–195

  • Yokoo M (2003) The characterization of strategy/false-name proof combinatorial auction protocols: price-oriented, rationing-free protocol. In: Proceedings of the eighteenth international joint conference on artificial intelligence (IJCAI). Acapulco, pp 733–742

  • Yokoo M, Sakurai Y, Matsubara S (2001) Robust combinatorial auction protocol against false-name bids. Artif Intell 130(2):167–181

    Article  Google Scholar 

  • Yokoo M, Sakurai Y, Matsubara S (2004) The effect of false-name bids in combinatorial auctions: new fraud in internet auctions. Games Econ Behav 46(1):174–188

    Article  Google Scholar 

Download references

Acknowledgments

We thank conference participants and participants at the Duke University Microeconomic Theory workshops; the Rice University Microeconomic Theory workshops; and Kyushu University in Japan. We especially thank Makoto Yokoo’s research group, Hervé Moulin, Lirong Xia, and anonymous referees for helpful feedback and discussions. Wagman has benefited from support from the Program for Advanced Research in the Social Sciences and from the Yahoo! Faculty Research and Engagement Program. Conitzer is grateful for support through NSF CCF-1101659, IIS-0812113, and IIS-0953756, ARO W911NF-12-1-0550 and W911NF-11-1-0332, and an Alfred P. Sloan Research Fellowship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liad Wagman.

Additional information

Early versions of this work were presented at the Twenty-Third Conference on Artificial Intelligence (AAAI 2008), where it was awarded one of two Outstanding Paper Awards; at the International Industrial Organization Conference (2009); and at the University of Chicago Institute on Computational Economics (2009). Parts were also presented at the INFORMS Annual Meeting (2008) and at the World Congress of the Game Theory Society (2008).

Appendix

Appendix

1.1 A omitted proofs

Lemma 3 \({\textit{FNP2}}\) satisfies voluntary participation and strategy-proofness.

Proof

It suffices to show that \(P_A(x_A,x_B)\) is weakly increasing in \(x_A\). From Definition 3 and the fact that \(c(\cdot )\) is nondecreasing, it immediately follows that for any \(0\le x_B<x_A,\,P_A(x_A+1,x_B)\ge P_A(x_A,x_B)\), because \(P_A(x_A,x_B) = \min _{t\in \{1,\ldots ,x_A-1\}}\{P_A(x_A-t,x_B)+c(t+1),1\} = \min _{t' \in \{2,\ldots ,x_A\}}\{P_A(x_A+1-t',x_B)+c(t'),1\} = \min _{t' \in \{2,\ldots ,x_A\}}\{P_A(x_A,x_B)+c(1), P_A(x_A+1-t',x_B)+c(t'),1\} = \min _{t' \in \{1,\ldots ,x_A\}}\{P_A(x_A+1-t',x_B)+c(t'),1\} \le \min _{t' \in \{1,\ldots ,x_A\}}\{P_A(x_A+1-t',x_B)+c(t'+1),1\} = P_A(x_A+1,x_B)\).

There are two cases left to prove: (i) for \(x>1,\,P_A(x+1,x)-P_A(x,x)\ge 0\) (monotonicity at \((x,x)\) profiles; this is not immediately clear from Definition 3 because \(P_A(x,x)=.5\) is assigned separately from the recursion) ; and (ii) for \(x_A<x_B,\,P_A(x_A+1, x_B) - P_A(x_A,x_B) \ge 0\) (monotonicity at profiles where \(x_A<x_B\)). Actually, for this second case, we will prove the equivalent statement: for \(x_B<x_A,\,P_B(x_A,x_B+1)-P_B(x_A,x_B)=P_A(x_A,x_B)-P_A(x_A,x_B+1)\ge 0\).

(i) Consider profile \((x+1,x)\). By Definition 3, \(P_A(x+1,x)=\min _{t\in \{1,\ldots ,x\}}\{P_A(x+1-t,x)+c(t+1),1\}\). In addition, for all \(t\in \{1,\ldots ,x\},\,P_A(x+1-t,x)=1-P_A(x,x+1-t)\), and \(P_A(x,x+1-t)=\min _{k\in \{1,\ldots ,x\}}\{P_A(x-k,x+1-t)+c(k+1),1\}\). Thus, \(P_A(x,x+1-t)\le P_A(x+1-t,x+1-t)+c(t)=.5+c(t)\). But then \(P_A(x+1-t,x)=1-P_A(x,x+1-t)\ge 1-(P_A(x+1-t,x+1-t)+c(t))=.5 -c(t)\). Therefore, \(P_A(x+1,x)\ge \min _{t\in \{1,\ldots ,x\}}\{.5-c(t)+c(t+1),1\}\ge .5=P_A(x,x)\). Hence, for all \(x>1,\,P_A(x+1,x)-P_A(x,x)\ge 0\).

(ii) We prove this part by induction. First, \(P_A(2,2)=0.5\le P_A(2,1)=\min \{.5+c(2),1\}\). This is the base step. Now, hypothesize that for some \(k>1,\,P_A(x_A,x_B)\ge P_A(x_A,x_B+1)\) for all \(x_B<x_A < k\). By symmetry, this induction hypothesis implies that \(P_A(x_B+1,x_A)\ge P_A(x_B,x_A)\) for all \(x_B<x_A<k\) (i.e., voluntary participation holds with respect to alternative \(B\) in a square of size \(k-1\) and a southwest vertex at \((1,1)\) in a 2-dimensional grid with \(A\) on the horizontal axis and \(B\) on the vertical axis).

Consider profile \((k,x_B)\) where \(x_B<k\) (i.e., extending the square diagonal by one grid point). If \(k=x_B+1,\,P_A(k,x_B+1)= .5 \le P_A(k,k-1)=P_A(k,x_B)\) follows directly from part (i). Suppose then without loss of generality that \(x_B+1<k\). From Definition 3, \(P_A(k,x_B+1)=\min _{t\in \{1,\ldots ,k-1\}}\{P_A(k-t,x_B+1)+c(t+1),1\}\) and \(P_A(k,x_B)=\min _{t\in \{1,\ldots ,k-1\}}\{P_A(k-t,x_B)+c(t+1),1\}\). By the induction hypothesis, for all \(t\in \{1,\ldots ,k-1\},\,P_A(k-t,x_B+1)\le P_A(k-t,x_B)\). Thus, \(P_A(k-t,x_B+1)+c(t+1) \le P_A(k-t,x_B) + c(t+1)\). But then

$$\begin{aligned} \min _{t\in \{1,\ldots ,k-1\}}\{P_A(k-t,x_B+1)+c(t+1)\}\\ \le \min _{t\in \{1,\ldots ,k-1\}}\{P_A(k-t,x_B)+c(t+1)\} \end{aligned}$$

It follows that \(P_A(k,x_B+1)\le P_A(k,x_B)\), which completes the induction. Consequently, for \(x_B<x_A,\,P_B(x_A,x_B+1)\ge P_B(x_A,x_B)\), which proves (ii). \(\square \)

Lemma 4 \({\textit{FNP2}}\) is false-name-proof.

Proof

Part 1 of Lemma 2 follows from Lemma 3. In addition, for every profile where \(x_A>x_B,\,P_A(x_A,x_B)\le \min _{t\in \{1,\ldots ,x_A-1\}} \{P_A(x_A-t,x_B)+c(t+1)\}\) follows from Definition 3. It remains to prove that for \(1<x_A\le x_B,\,P_A(x_A,x_B)\le \min _{t\in \{1,\ldots ,x_A-1\}}\{P_A(x_A-t,x_B)+c(t+1)\}\) (we actually prove that for \(1<x_B\le x_A,\,P_B(x_A,x_B)\le \min _{t\in \{1,\ldots ,x_B-1\}}\{P_B(x_A,x_B-t)+c(t+1)\}\), which is equivalent).

We begin by considering a profile \((x_A,x_B)\) where \(1<x_B<x_A\) (we treat profiles where \(x_B=x_A\) next). Consider a profile \((x_A,x_B-k)\), where \(k\in \{1,\ldots ,x_B-1\}\). For false-name-proofness, we need \(P_B(x_A,x_B)\le P_B(x_A,x_B-k)+c(k+1)\). Note that

$$\begin{aligned}&P_B(x_A,x_B)-P_B(x_A,x_B-k) \nonumber \\&\quad =1-P_A(x_A,x_B)-(1-P_A(x_A,x_B-k)) \nonumber \\&\quad = P_A(x_A,x_B-k)-P_A(x_A,x_B) \end{aligned}$$
(1)

By Definition 3, we have \(P_A(x_A,x_B)=\min _{t\in \{1,\ldots ,x_A-1\}} \{P_A(x_A-t,x_B)+c(t+1),1\}\). The case where \(P_A(x_A,x_B)=1\) holds trivially because \(P_A(x_A,x_B-k)\le 1\). Hence, assume without loss of generality that \(P_A(x_A,x_B)<1\) and let \(t^{\star }\in \{1,\ldots ,x_A\}\) be such that \(P_A(x_A,x_B)=P_A(x_A-t^{\star },x_B)+c(t^{\star }+1)\) (i.e., it is the binding constraint of the minimum). Note that due to \(P_A(x_A,x_B-k)=\min _{t\in \{1,\ldots ,x_A-1\}}\{P_A(x_A-t,x_B-k) +c(t+1),1\}, \,P_A(x_A,x_B-k)\le P_A(x_A-t^{\star },x_B-k)+c(t^{\star }+1)\) holds. Then

$$\begin{aligned}&P_A(x_A,x_B-k)-P_A(x_A,x_B) \nonumber \\&\quad \le P_A(x_A-t^{\star },x_B-k)+c(t^{\star }+1) - (P_A(x_A-t^{\star },x_B)+c(t^{\star }+1)) \nonumber \\&\quad =P_A(x_A-t^{\star },x_B-k)-P_A(x_A-t^{\star },x_B) \end{aligned}$$
(2)

If \(x_A-t^{\star }=x_B\), we can stop at this point, since \(P_A(x_A-t^{\star },x_B)=P_A(x_B,x_B)=.5\), and \(P_A(x_A-t^{\star },x_B-k)=P_A(x_B,x_B-k)\le P_A(x_B-k,x_B-k)+c(k+1)=.5+c (k+1)\). Combining this with (1) and (2), we obtain \(P_B(x_A,x_B)-P_B(x_A,x_B-k)\le c(k+1)\).

If \(x_A-t^{\star }\ne x_B\), we reiterate the above analysis. In particular, similarly to the above analysis, there exists \(t^{\star \star }\in \{1,\ldots ,x_A-t^{\star }-1\}\) such that \(P_A(x_A-t^{\star },x_B)= P_A(x_A-t^{\star }-t^{\star \star },x_B)+c(t^{\star }+t^{\star \star }+1)\). Also similarly, \(P_A(x_A-t^{\star },x_B-k)\le P_A(x_A-t^{\star }-t^{\star \star },x_B-k)+c(t^{\star }+t^{\star \star }+1)\). Thus,

$$\begin{aligned}&P_A(x_A-t^{\star },x_B-k)-P_A(x_A-t^{\star },x_B) \\&\quad \le P_A(x_A-t^{\star }-t^{\star \star },x_B-k) - P_A(x_A-t^{\star }-t^{\star \star },x_B) \end{aligned}$$

Applying this process iteratively, we either reach profile \((x_B,x_B)\), in which case the above conclusion applies, or we obtain

$$\begin{aligned} P_A(x_A,x_B-k)-P_A(x_A,x_B)\le P_A(1,x_B-k)-P_A(1,x_B) \end{aligned}$$
(3)

Since \({\textit{FNP2}}\) is defined symmetrically, \( P_A(1,x_B-k)-P_A(1,x_B)=(1-P_A(x_B-k,1))-(1-P_A(x_B,1)) =P_A(x_B,1)-P_A(x_B-k,1)\le c(k+1)\), where the inequality follows from \(P_A(x_B,1)= \min _{t\in \{1,\ldots ,x_B-1\}} \{P_A(x_B-t,1)+c(t+1),1\}\). Combining all of the above observations, we have \(P_B(x_A,x_B)-P_B(x_A,x_B-k)\le c(k+1)\).

It remains to show that for \(x>1\) and \(k\in \{1,\ldots x-1\},\,P_B(x,x)-P_B(x,x-k)=.5-P_B(x,x-k)\le c(k+1)\). Since \(P_A(x,x-k)=\min _{t\in \{1,\ldots ,x-1\}}\{P_A(x-t,x-k) +c(t+1),1\},\,P_A(x,x-k)\le P_A(x-k,x-k)+c(k+1)=.5+c(k+1)\). Thus, \(P_B(x,x)-P_B(x,x-k)=.5-(1-P_A(x,x-k))=P_A(x,x-k)-.5\le c(k+1)\). This completes the proof that \({\textit{FNP2}}\) satisfies the conditions of Lemma 2, and is therefore false-name-proof. \(\square \)

Proposition 2 For all \(0<x_B<x_A,\,{\textit{FNP2}}\) satisfies:

(i) If \(c''(\cdot )\ge 0\) then

$$\begin{aligned} P_A(x_A,x_B)=\min \{0.5 +c(2)(x_A-x_B), 1\} \end{aligned}$$

(The linear cost model in which \(c(t+1)=k\cdot t\) for \(t,k\ge 0\), whereby \(c(2)=k\), is a special case.)

(ii) Let \(\pi (\cdot )\) be defined (recursively) as follows: \(\pi (1)=0\) and \(\pi (x)=\min _{t\in \{1,\ldots ,x-1\}} \{\pi (x-t)+c(t+1)\}\) for \(x> 1\). If \(P_A(x_A,1)<1\), then \(P_A(x_A,x_B)=.5+\pi (x_A)-\pi (x_B)\)

(iii) If \(P_A(x_A,1)<1\) and \(c''(\cdot )<0\) then

$$\begin{aligned} P_A(x_A,x_B)=.5+c(x_A)-c(x_B) \end{aligned}$$

Proof

(i) Consider \(0<x_B<x_A\) and \(k,k'\in \{1,\ldots ,x_A-1\}\) such that \(k'<k\). By false-name-proofness, \(P_A(x_A-k',x_B)\le P_A(x_A-k,x_B)+c(k-k'+1)\). Since \(c(1)=0\) and \(c''(\cdot )\ge 0,\,c(k+1)\ge c(k-k'+1)+c(k'+1)\).Footnote 12 But then \(P_A(x_A-k,x_B)+c(k+1)\ge P_A(x_A-k,x_B)+c(k-k'+1)+c(k'+1)\ge P_A(x_A-k',x_B)+c(k'+1)\). Thus, the false-name-proofness constraint that \(P_A(x_A,x_B)\le P_A(x_A-k,x_B)+c(k+1)\) is already implied by the constraint \(P_A(x_A,x_B)\le P_A(x_A-k',x_B)+c(k'+1)\), where \(k'<k\). Since \(k\) and \(k'\) were arbitrarily chosen in \(\{1,\ldots ,x_A-1\}\), it follows that \(P_A(x_A,x_B)=\min \{P_A(x_A-1,x_B)+c(2),1\}\). Similarly, \(P_A(x_A-1,x_B)=\min \{P_A(x_A-2,x_B)+c(2),1\},\ldots , P_A(x_B+1,x_B)=\min \{.5+c(2),1\}\). Combining these equalities, we obtain \(P_A(x_A,x_B)=\min \{0.5 +c(2)(x_A-x_B), 1\}\).

(ii) It is straightforward to check that \(P_A(x_A,1)=\min _{t\in \{1,\ldots ,x_A-1\}}\{P_A(x_A-t,1)+c(t+1),1\}= \min \{P_A(1,1)+\pi (x_A),1\} =\min \{.5+\pi (x_A),1\}\). If \(P_A(x_A,1)<1\), then \(P_A(x_A,1)=.5+\pi (x_A)\). It also follows from Lemma 3 that for any \(k<x_A,\,P_A(k,1)=.5+\pi (k)\).

Assume \(x_A>2\). By neutrality, \(P_A(1,2)=1-P_A(2,1)=.5-\pi (2)\). We also have that \(P_A(3,2)=\min \{1,P_A(1,2)+c(3),P_A(2,2)+c(2)\}\). However, \(P_A(2,2)=.5+\pi (2)-\pi (2)=P_A(1,2)+\pi (2)\). It follows that \(P_A(3,2)=\min \{P_A(1,2)+\pi (3),1\}=\min \{.5+\pi (3)-\pi (2),1\}\). Similarly, for any \(2<k\le x_A,\,P_A(k,2)=.5+\pi (k)-\pi (2)\) (where \(P_A(k,2)<1\) follows from Lemma 3). A similar process can be done for \(P_A(k,3)\) for \(3<k\le x_A\). Specifically, assuming \(x_A>3\), we have \(P_A(1,3)=1-P_A(3,1)=.5-\pi (3),\,P_A(2,3)=1-P_A(3,2)=.5+\pi (2)- \pi (3)=P_A(1,3)+\pi (2)\), and \(P_A(3,3)=.5+\pi (3)-\pi (3)=P_A(1,3)+\pi (3)\). It then follows that \(P_A(k,3)=P_A(1,3)+\pi (k)=.5 + \pi (k)-\pi (3)\).

The proof proceeds by induction (the above being the base step). Hypothesize that for \(t\in \{1,\ldots ,k_B\},\,k_B<x_B\), and for any \(k_A\le x_A,\,P_A(k_A,t)=.5+\pi (k_A)-\pi (k_B)\) (where \(P_A(k_A,t)<1\) follows from Lemma 3 and the assumption that \(P_A(x_A,1)<1\)). By the induction hypothesis, for \(x< k_B+1,\,P_A(x,k_B+1)=1-P_A(k_B+1,x)=.5+\pi (x)-\pi (k_B+1)\). In addition, from the definition of \({\textit{FNP2}},\,P_A(k_B+1,k_B+1)=.5=.5+\pi (k_B+1)-\pi (k_B+1)\). It follows that for \(k_B+1<k_A\le x_A,\,P_A(k_A,k_B+1)=.5+\pi (k_A)-\pi (k_B+1)\), which completes the induction. Therefore, if \(P_A(x_A,1)<1\), then \(P_A(x_A,x_B)=.5+\pi (x_A)-\pi (x_B)\).

(iii) For \(k>0,\,c''(\cdot )< 0\) implies that \(c(k+1)-c(k)< c(k)-c(k-1)< \ldots < c(2)-c(1)=c(2)\). Now, since \(c(1)=0,\,c(k)=c(1)+c(k)\). By the above inequalities, \(c(k+1)< c(1+1)+c(k)\). Similarly, \(c(k+2)< c(1+2)+c(k),\ldots ,c(k+t_1)< c(1+t_1)+c(k)\). Applying a similar set of inequalities, we can obtain \(c(k+t_1+\ldots +t_m)<c(1+t_1)+\ldots +c(1+t_m)+c(k)\). It follows that \(\pi (k)=c(k)\).

Consider any \(0<x_B<x_A\) such that \(P_A(x_A,1)<\). By Part (ii), we have \(P_A(x_A,x_B)= .5+\pi (x_A)-\pi (x_B)\). Combining this with the above, we have \(P_A(x_A,x_B)= .5+c(x_A)-c(x_B)\). \(\square \)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wagman, L., Conitzer, V. False-name-proof voting with costs over two alternatives. Int J Game Theory 43, 599–618 (2014). https://doi.org/10.1007/s00182-013-0397-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00182-013-0397-3

Keywords

Navigation