Skip to main content

False-Name-Proof Multi-unit Auction Protocol Utilizing Greedy Allocation Based on Approximate Evaluation Values

  • Conference paper
  • First Online:
Intelligent Agents and Multi-Agent Systems (PRIMA 2002)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2413))

Included in the following conference series:

  • 254 Accesses

Abstract

This paper presents a new false-name-proof multi-unit auction protocol called Greedy ALlocation (GAL) protocol. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called Iterative Reducing (IR) protocol has been developed for multi-unit auctions and has proven to be false-name-proof, i.e., using false-name bids is useless. For Internet auction protocols, being false-name-proof is important since identifying each participant on the Internet is virtually impossible.

One shortcoming of the IR protocol is that it requires the auctioneer to carefully pre-determine the reservation price for one unit. Our newly developed GAL protocol is easier to use than the IR, since the auctioneer does not need to set the reservation price nor any other parameters. The evaluation results show that the GAL protocol can obtain a social surplus that is very close to Pareto efficient. Furthermore, the obtained social surplus and seller’s revenue are much better than those of the IR protocol even if the reservation price is set optimally.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sakurai, Y., Yokoo, M., Matsubara, S.: A limitation of the Generalized Vickrey Auction in Electronic Commerce: Robustness against false-name bids. In: Proceedings of the Sixteenth National Conference on Artificial Intelligence (AAAI-99). (1999) 86–92

    Google Scholar 

  2. Yokoo, M., Sakurai, Y., Matsubara, S.: The effect of false-name declarations in mechanism design: Towards collective decision making on the Internet. In: Proceedings of the Twentieth International Conference on Distributed Computing Systems (ICDCS-2000). (2000) 146–153

    Google Scholar 

  3. Rasmusen, E.: Games and Information. Blackwell (1994)

    Google Scholar 

  4. Varian, H.R.: Economic mechanism design for computerized agents. In: Proceedings of the First Usenix Workshop on Electronic Commerce. (1995)

    Google Scholar 

  5. Yokoo, M., Sakurai, Y., Matsubara, S.: Robust combinatorial auction protocol against false-name bids. Artificial Intelligence 130 (2001) 167–181

    Article  MATH  MathSciNet  Google Scholar 

  6. Yokoo, M., Sakurai, Y., Matsubara, S.: Robust multi-unit auction protocol against false-name bids. In: Proceedings of 17th International Joint Conference on Artificial Intelligence (IJCAI-2001). (2001) 1089–1094

    Google Scholar 

  7. Mas-Colell, A., Whinston, M.D., Green, J.R.: Microeconomic Theory. Oxford University Press (1995)

    Google Scholar 

  8. Sandholm, T.: An algorithm for optimal winner determination in combinatorial auction. In: Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence (IJCAI-99). (1999) 542–547

    Google Scholar 

  9. Lehmann, D., O’Callaghan, L.I., Shoham, Y.: Truth revelation in approximately efficient combinatorial auction. In: Proceedings of the First ACM Conference on Electronic Commerce (EC-99). (1999) 96–102

    Google Scholar 

  10. Shenker, S.: Fundamental design issues for the future internet. IEEE Journal on Selected Areas in Communication 13 (1995)

    Google Scholar 

  11. Ausubel, L., Cramton, P.: Demand reduction and inefficiency in multi-unit auctions. http://www.market-design.com/library.html (1998)

  12. Cao, Z., Zegura, E.W.: Utility max-min: An application-oriented bandwidth allocation scheme. In: Proceedings of the Conference on Computer Communications (IEEE Infocom-99). (1999) 793–801

    Google Scholar 

  13. van Hoesel, S., Müller, R.: Optimization in electronic markets: examples in combinatorial auctions. Netnomics 3 (2001) 23–33

    Article  Google Scholar 

  14. Fankhauser, G., Stiller, B., Vogtli, C., Plattner, B.: Reservation-based charging in an integrated services network. In: Proceedings of the 4th Institute for Operations Research and the Management Sciences Telecommunications Conference. (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Terada, K., Yokoo, M. (2002). False-Name-Proof Multi-unit Auction Protocol Utilizing Greedy Allocation Based on Approximate Evaluation Values. In: Kuwabara, K., Lee, J. (eds) Intelligent Agents and Multi-Agent Systems. PRIMA 2002. Lecture Notes in Computer Science(), vol 2413. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45680-5_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-45680-5_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44026-0

  • Online ISBN: 978-3-540-45680-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics