Skip to main content

Privacy and Truthful Equilibrium Selection for Aggregative Games

  • Conference paper
  • First Online:
Web and Internet Economics (WINE 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9470))

Included in the following conference series:

Abstract

We study a very general class of games — multi-dimensional aggregative games — which in particular generalize both anonymous games and weighted congestion games. For any such game that is also large, we solve the equilibrium selection problem in a strong sense. In particular, we give an efficient weak mediator: a mechanism which has only the power to listen to reported types and provide non-binding suggested actions, such that (a) it is an asymptotic Nash equilibrium for every player to truthfully report their type to the mediator, and then follow its suggested action; and (b) that when players do so, they end up coordinating on a particular asymptotic pure strategy Nash equilibrium of the induced complete information game. In fact, truthful reporting is an ex-post Nash equilibrium of the mediated game, so our solution applies even in settings of incomplete information, and even when player types are arbitrary or worst-case (i.e. not drawn from a common prior). We achieve this by giving an efficient differentially private algorithm for computing a Nash equilibrium in such games. The rates of convergence to equilibrium in all of our results are inverse polynomial in the number of players n. We also apply our main results to a multi-dimensional market game.

Our results can be viewed as giving, for a rich class of games, a more robust version of the Revelation Principle, in that we work with weaker informational assumptions (no common prior), yet provide a stronger solution concept (ex-post Nash versus Bayes Nash equilibrium). In comparison to previous work, our main conceptual contribution is showing that weak mediators are a game theoretic object that exist in a wide variety of games – previously, they were only known to exist in traffic routing games. We also give the first weak mediator that can implement an equilibrium optimizing a linear objective function, rather than implementing a possibly worst-case Nash equilibrium.

The full version of this extended abstract can be found on arXiv [9].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    In the economics literature, aggregative games have more restricted aggregator function: \(S_k({\varvec{x}}) = \sum _{i=1}^n x_i\). The games we study are more general, and sometimes referred to as generalized aggregative games.

  2. 2.

    Note that the influence that any single player’s action has on the utility of others is also bounded by \(\gamma \). If \(\gamma =o(1/n)\), then any player’s utility is essentially independent of other players’ actions. Therefore, we further assume that \(\gamma = \varOmega (1/n)\) for the problem to be interesting. This will also simplify some statements.

  3. 3.

    Sometimes called best react [4], and apparent best response [19].

  4. 4.

    We show that \(\mathcal {E}(\zeta )\) is non-empty for \(\zeta \ge \gamma \sqrt{8n\log (2mn)}\) in the full version.

  5. 5.

    In the full version of this paper, we also present details of the non-private algorithm to compute equilibrium for aggregative games.

References

  1. Arora, S., Hazan, E., Kale, S.: The multiplicative weights update method: a meta-algorithm and applications. Theory Comput. 8(1), 121–164 (2012)

    Article  MathSciNet  Google Scholar 

  2. Ashlagi, I., Monderer, D., Tennenholtz, M.: Mediators in position auctions. Games Econ. Behav. 67(1), 2–21 (2009)

    Article  MathSciNet  Google Scholar 

  3. Azevedo, E.M., Budish, E.: Strategyproofness in the large as a desideratum for market design. In: Proceedings of the 13th ACM Conference on Electronic Commerce, EC 2012, p. 55 (2012)

    Google Scholar 

  4. Babichenko, Y.: Best-reply dynamic in large aggregative games. SSRN (2013). abstract 2210080

    Google Scholar 

  5. Barman, S., Ligett, K.: Finding any nontrivial coarse correlated equilibrium is hard. In: Proceedings of the Sixteenth ACM Conference on Economics and Computation, EC 2015, pp. 815–816 (2015)

    Google Scholar 

  6. Blum, A., Morgenstern, J., Sharma, A., Smith, A.: Privacy-preserving public information for sequential games. In: Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS 2015, pp. 173–180 (2015)

    Google Scholar 

  7. Chen, X., Durfee, D., Orfanou, A.: On the complexity of Nash equilibria in anonymous games. In: Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, pp. 381–390 (2015)

    Google Scholar 

  8. Chen, Y., Chong, S., Kash, I.A., Moran, T., Vadhan, S.: Truthful mechanisms for agents that value privacy. In: Proceedings of the 14th ACM Conference on Electronic Commerce, EC 2013, pp. 215–232 (2013)

    Google Scholar 

  9. Cummings, R., Kearns, M., Roth, A., Wu, Z.S.: Privacy and truthful equilibrium selection for aggregative games, CoRR, abs/1407.7740 (2014)

    Google Scholar 

  10. Daskalakis, C., Papadimitriou, C.H.: Discretized multinomial distributions and Nash equilibria in anonymous games. In: Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, pp. 25–34 (2008)

    Google Scholar 

  11. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theoret. Comput. Sci. 9(3–4), 211–407 (2014)

    MathSciNet  Google Scholar 

  12. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Dwork, C., Naor, M., Reingold, O., Rothblum, G.N., Vadhan, S.: On the complexity of differentially private data release: efficient algorithms and hardness results. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 381–390 (2009)

    Google Scholar 

  14. Dwork, C., Rothblum, G.N., Vadhan, S.: Boosting and differential privacy. In: Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, FOCS 2010, pp. 51–60 (2010)

    Google Scholar 

  15. Ghosh, A., Ligett, K.: Privacy and coordination: computing on databases with endogenous participation. In: Proceedings of the 14th ACM Conference on Electronic Commerce, EC 2013, pp. 543–560 (2013)

    Google Scholar 

  16. Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, FOCS 2010, pp. 61–70 (2010)

    Google Scholar 

  17. Hsu, J., Roth, A., Roughgarden, T., Ullman, J.: Privately solving linear programs. In: Esparza, J., Fraigniaud, P., Husfeldt, T., Koutsoupias, E. (eds.) ICALP 2014. LNCS, vol. 8572, pp. 612–624. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  18. Kannan, S., Morgenstern, J., Roth, A., Wu, Z.S.: Approximately stable, school optimal, and student-truthful many-to-one matchings (via differential privacy). In: Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, pp. 1890–1903 (2015)

    Google Scholar 

  19. Kearns, M., Mansour, Y.: Efficient Nash computation in large population games with bounded influence. In: Proceedings of the 18th Conference on Uncertainty in Artificial Intelligence, UAI 2002, pp. 259–266 (2002)

    Google Scholar 

  20. Kearns, M., Pai, M., Roth, A., Ullman, J.: Mechanism design in large games: incentives and privacy. In: Proceedings of the 5th Conference on Innovations in Theoretical Computer Science, ITCS 2014, pp. 403–410 (2014)

    Google Scholar 

  21. McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2007, pp. 94–103 (2007)

    Google Scholar 

  22. Monderer, D., Tennenholtz, M.: k-implementation. In: Proceedings of the 4th ACM Conference on Electronic Commerce, EC 2003, pp. 19–28 (2003)

    Google Scholar 

  23. Monderer, D., Tennenholtz, M.: Strong mediated equilibrium. Artif. Intell. 173(1), 180–195 (2009)

    Article  MathSciNet  Google Scholar 

  24. Roger, R.B.: Optimal auction design. Math. Oper. Res. 6(1), 58–73 (1981)

    Article  MathSciNet  Google Scholar 

  25. Nissim, K., Orlandi, C., Smorodinsky, R.: Privacy-aware mechanism design. In: Proceedings of the 13th ACM Conference on Electronic Commerce, EC 2012, pp. 774–789 (2012)

    Google Scholar 

  26. Nissim, K., Smorodinsky, R., Tennenholtz, M.: Approximately optimal mechanism design via differential privacy. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS 2012, pp. 203–213 (2012)

    Google Scholar 

  27. Pai, M.M., Roth, A.: Privacy and mechanism design. SIGecom Exch. 12(1), 8–29 (2013)

    Article  Google Scholar 

  28. Rogers, R.M., Roth, A.: Asymptotically truthful equilibrium selection in large congestion games. In: Proceedings of the 15th ACM Conference on Economics and Computation, EC 2014, pp. 771–782 (2014)

    Google Scholar 

  29. Xiao, D.: Is privacy compatible with truthfulness? In: Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS 2013, pp. 67–86 (2013)

    Google Scholar 

Download references

Acknowledgments

Research supported in part by NSF grants 1253345, 1101389, CNS-1254169, US-Israel Binational Science Foundation grant 2012348, Simons Foundation grant 361105, a Google Faculty Research Award, and the Alfred P. Sloan Foundation. Research performed while the first author was visiting the University of Pennsylvania.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachel Cummings .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cummings, R., Kearns, M., Roth, A., Wu, Z.S. (2015). Privacy and Truthful Equilibrium Selection for Aggregative Games. In: Markakis, E., Schäfer, G. (eds) Web and Internet Economics. WINE 2015. Lecture Notes in Computer Science(), vol 9470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48995-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48995-6_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48994-9

  • Online ISBN: 978-3-662-48995-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics