Skip to main content

Computer-Aided Verification for Mechanism Design

  • Conference paper
  • First Online:
Web and Internet Economics (WINE 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10123))

Included in the following conference series:

Abstract

We explore techniques from computer-aided verification to construct formal proofs of incentive properties. Because formal proofs can be automatically checked, agents do not need to manually check the properties, or even understand the proof. To demonstrate, we present the verification of a sophisticated mechanism: the generic reduction from Bayesian incentive compatible mechanism design to algorithm design given by Hartline, Kleinberg, and Malekian. This mechanism presents new challenges for formal verification, including essential use of randomness from both the execution of the mechanism and from the prior type distributions.

The full version of this paper is available at https://arxiv.org/abs/1502.04052.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Our formal proofs, along with code for the \(\textsf {HOARe}^2\) tool, are available online: https://github.com/ejgallego/HOARe2/tree/master/examples/bic.

References

  1. Barrett, C., Sebastini, R., Seshia, S.A., Tinelli, C.: Satisfiability modulo theories. In: Handbook of satisfiability, vol. 185. IOS press (2009)

    Google Scholar 

  2. Barthe, G., Grégoire, B., Heraud, S., Béguelin, S.Z.: Computer-aided security proofs for the working cryptographer. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 71–90. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22792-9_5

    Chapter  Google Scholar 

  3. Barthe, G., Dupressoir, F., Grégoire, B., Kunz, C., Schmidt, B., Strub, P.-Y.: EasyCrypt: a tutorial. In: Aldini, A., Lopez, J., Martinelli, F. (eds.) FOSAD 2012-2013. LNCS, vol. 8604, pp. 146–166. Springer, Heidelberg (2014). doi:10.1007/978-3-319-10082-1_6

    Chapter  Google Scholar 

  4. Barthe, G., Gaboardi, M., Gallego Arias, E.J., Hsu, J., Roth, A., Strub, P.-Y.: Higher-order approximate relational refinement types for mechanism design and differential privacy. In: ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), Mumbai, India, pp. 55–68 (2015). http://arxiv.org/abs/1407.6845

    Google Scholar 

  5. Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409–426. Springer, Heidelberg (2006). doi:10.1007/11761679_25

    Chapter  Google Scholar 

  6. Brânzei, S., Procaccia, A.D.: Verifiably truthful mechanisms. In: ACM SIGACT Innovations in Theoretical Computer Science (ITCS), Princeton, New Jersey (2014)

    Google Scholar 

  7. Caminati, M.B., Kerber, M., Lange, C., Rowat, C.: Sound auction specification and implementation. In: ACM SIGecom Conference on Economics and Computation (EC), Portland, Oregon, pp. 547–564 (2015). http://doi.acm.org/10.1145/2764468.2764511

  8. Christodoulou, G., Koutsoupias, E.: The price of anarchy of finite congestion games. In: ACM SIGACT Symposium on Theory of Computing (STOC), Baltimore, Maryland, pp. 67–73. ACM (2005). http://dl.acm.org/citation.cfm?id=1060600

  9. Clarke, E.H.: Multipart pricing of public goods. Public Choice 11(1), 17–33 (1971)

    Article  Google Scholar 

  10. Conitzer, V.: Computational aspects of preference aggregation. PhD thesis, IBM (2006)

    Google Scholar 

  11. Conitzer, V., Sandholm, T.: Complexity of mechanism design. In: Conference on Uncertainty in Artificial Intelligence (UAI), Edmonton, Alberta, pp. 103–110. Morgan Kaufmann Publishers Inc. (2002)

    Google Scholar 

  12. Daskalakis, C., Goldberg, P.W., Papadimitriou, C.H.: The complexity of computing a Nash equilibrium. SIAM J. Comput. 39(1), 195–259 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  13. Goldberg, A.V., Hartline, J.D., Karlin, A.R., Saks, M., Wright, A.: Competitive auctions. Games Econ. Behav. 55(2), 242–269 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  14. Groves, T.: Incentives in teams. Econ. J. Econ. Soc. 41(4), 617–631 (1973)

    MathSciNet  MATH  Google Scholar 

  15. Halevi, S.: A plausible approach to computer-aided cryptographic proofs. Cryptology ePrint Archive, Report 2005/181 (2005). https://eprint.iacr.org/2005/181.pdf

  16. Hart, S., Mansour, Y.: The communication complexity of uncoupled Nash equilibrium procedures. In: ACM SIGACT Symposium on Theory of Computing (STOC), San Diego, California, pp. 345–353. ACM (2007)

    Google Scholar 

  17. Hartline, J.D., Kleinberg, R., Malekian, A.: Bayesian incentive compatibility via matchings. In: ACM-SIAM Symposium on Discrete Algorithms (SODA), San Francisco, California, pp. 734–747. SIAM (2011)

    Google Scholar 

  18. Kerber, M., Lange, C., Rowat, C.: An introduction to mechanized reasoning. CoRR, abs/1603.02478, 2016. http://arxiv.org/abs/1603.02478

  19. Li, S.: Obviously strategy-proof mechanisms. SSRN Electron. J. http://dx.doi.org/10.2139/ssrn.2560028

  20. Milgrom, P., Segal, I.: Deferred acceptance auctions and radio spectrum reallocation (2014). http://www.as.huji.ac.il/sites/default/files/DA%20Heuristic%20Auctions%20June-2014.pdf

  21. Mu’alem, A.: A note on testing truthfulness. In: Electronic Colloquium on Computational Complexity (ECCC), No. 130 (2005)

    Google Scholar 

  22. Roughgarden, T.: Selfish Routing and the Price of Anarchy, vol. 174. MIT Press, Cambridge (2005)

    MATH  Google Scholar 

  23. Sandholm, T.: Automated mechanism design: a new application area for search algorithms. In: Rossi, F. (ed.) CP 2003. LNCS, vol. 2833, pp. 19–36. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45193-8_2

    Chapter  Google Scholar 

  24. Vickrey, W.: Counterspeculation, auctions, and competitive sealed tenders. J. Finan. 16(1), 8–37 (1961)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers for their careful reading; their suggestions have significantly improved this work. This work was partially supported by NSF grants TWC-1513694, CNS-1237235, CNS-1565365 and a grant from the Simons Foundation (\(\#360368\) to Justin Hsu).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Justin Hsu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag GmbH Germany

About this paper

Cite this paper

Barthe, G., Gaboardi, M., Arias, E.J.G., Hsu, J., Roth, A., Strub, PY. (2016). Computer-Aided Verification for Mechanism Design. In: Cai, Y., Vetta, A. (eds) Web and Internet Economics. WINE 2016. Lecture Notes in Computer Science(), vol 10123. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54110-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-54110-4_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-54109-8

  • Online ISBN: 978-3-662-54110-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics