Deep False-Name-Proof Auction Mechanisms

  • Yuko SakuraiEmail author
  • Satoshi Oyama
  • Mingyu Guo
  • Makoto Yokoo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11873)


We explore an approach to designing false-name-proof auction mechanisms using deep learning. While multi-agent systems researchers have recently proposed data-driven approaches to automatically designing auction mechanisms through deep learning, false-name-proofness, which generalizes strategy-proofness by assuming that a bidder can submit multiple bids under fictitious identifiers, has not been taken into account as a property that a mechanism has to satisfy. We extend the RegretNet neural network architecture to incorporate false-name-proof constraints and then conduct experiments demonstrating that the generated mechanisms satisfy false-name-proofness.


Mechanism design Deep learning False-name-proofness 



This work was partially supported by JSPS KAKENHI Grant Numbers JP17H0 0761, JP17KK0008 and JP18H03337, by the Kayamori Foundation of Informational Science Advancement, and by the Telecommunications Advancement Foundation. We thank Paul Dütting and his coauthors for sharing the source code for the RegretNet framework.


  1. 1.
    Conitzer, V., Sandholm, T.: Complexity of mechanism design. In: UAI, pp. 103–110 (2002)Google Scholar
  2. 2.
    Conitzer, V., Sandholm, T.: Self-interested automated mechanism design and implications for optimal combinatorial auctions. In: ACM EC, pp. 132–141 (2004)Google Scholar
  3. 3.
    Düetting, P., Feng, Z., Narasimhan, H., Parkes, D., Ravindranath, S.S.: Optimal auctions through deep learning. In: ICML, pp. 1706–1715 (2019)Google Scholar
  4. 4.
    Feng, Z., Narasimhan, H., Parkes, D.C.: Deep learning for revenue-optimal auctions with budgets. In: AAMAS, pp. 354–362 (2018)Google Scholar
  5. 5.
    Guo, M., Conitzer, V.: Computationally feasible automated mechanism design: General approach and case studies. In: AAAI, pp. 1676–1679 (2010)Google Scholar
  6. 6.
    Iwasaki, A., et al.: Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms. In: AAMAS, pp. 633–640 (2010)Google Scholar
  7. 7.
    Manisha, P., Jawahar, C.V., Gujar, S.: Learning optimal redistribution mechanisms through neural networks. In: AAMAS, pp. 345–353 (2018)Google Scholar
  8. 8.
    Yokoo, M.: Characterization of strategy/false-name proof combinatorial auction protocols: price-oriented, rationing-free protocol. In: IJCAI, pp. 733–739 (2003)Google Scholar
  9. 9.
    Yokoo, M., Sakurai, Y., Matsubara, S.: Robust combinatorial auction protocol against false-name bids. Artif. Intell. J. 130(2), 167–181 (2001)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Yuko Sakurai
    • 1
    Email author
  • Satoshi Oyama
    • 2
  • Mingyu Guo
    • 3
  • Makoto Yokoo
    • 4
  1. 1.National Institute of Advanced Industrial Science and TechnologyTokyoJapan
  2. 2.Hokkaido University/RIKENSapporoJapan
  3. 3.University of AdelaideAdelaideAustralia
  4. 4.Kyushu University/RIKENFukuokaJapan

Personalised recommendations