When Can Limited Randomness Be Used in Repeated Games?
The central result of classical game theory states that every finite normal form game has a Nash equilibrium, provided that players are allowed to use randomized (mixed) strategies. However, in practice, humans are known to be bad at generating random-like sequences, and true random bits may be unavailable. Even if the players have access to enough random bits for a single instance of the game their randomness might be insufficient if the game is played many times.
In this work, we ask whether randomness is necessary for equilibria to exist in finitely repeated games. We show that for a large class of games containing arbitrary two-player zero-sum games, approximate Nash equilibria of the n-stage repeated version of the game exist if and only if both players have \(\varOmega (n)\) random bits. In contrast, we show that there exists a class of games for which no equilibrium exists in pure strategies, yet the n-stage repeated version of the game has an exact Nash equilibrium in which each player uses only a constant number of random bits.
When the players are assumed to be computationally bounded, if cryptographic pseudorandom generators (or, equivalently, one-way functions) exist, then the players can base their strategies on “random-like” sequences derived from only a small number of truly random bits. We show that, in contrast, in repeated two-player zero-sum games, if pseudorandom generators do not exist, then \(\varOmega (n)\) random bits remain necessary for equilibria to exist.
KeywordsLimited randomness Repeated games Nash equilibrium
- 3.Budinich, M., Fortnow, L.: Repeated matching pennies with limited randomness. In: ACM EC 2011, pp. 111–118 (2011)Google Scholar
- 6.Halpern, J.Y., Pass, R.: Algorithmic rationality: Game theory with costly computation. J. Econ. Theory (2014)Google Scholar
- 9.Hubáček, P., Naor, M., Ullman, J.: When can limited randomness be used in repeated games? CoRR abs/1507.01191 (2015). http://arxiv.org/abs/1507.01191
- 10.Impagliazzo, R.: Pseudo-random generators for cryptography and for randomized algorithms. Ph.D. thesis, University of California, Berkeley (1992)Google Scholar
- 11.Impagliazzo, R., Luby, M.: One-way functions are essential for complexity based cryptography (extended abstract). In: FOCS 1989, pp. 230–235 (1989)Google Scholar
- 13.Naor, M., Rothblum, G.N.: Learning to impersonate. In: ICML 2006, pp. 649–656 (2006)Google Scholar
- 15.Yao, A.C.: Theory and applications of trapdoor functions (extended abstract). In: FOCS 1982, pp. 80–91 (1982)Google Scholar