A Folk Theorem for Contract Games with Multiple Principals and Agents
|
|
- Melissa Norman
- 5 years ago
- Views:
Transcription
1 A Folk Theorem for Contract Games with Multiple Principals and Agents Siyang Xiong March 27, 2013 Abstract We fully characterize the set of deteristic equilibrium allocations in a competing contract game with multiple principals and agents. Compared to similar folk theorems in the literature, our main theorem relaxes an indispensable assumption on equilibrium existence in Yamashita [8], and does not require a particular communication protocol as required in Peters and Troncoso-Valverde [6]. I thank Eddie Dekel, Songying Fang, Mike Peters, Balázs Szentes, Stephen Wolff, Takuro Yamashita and anonymous referees for helpful comments. I thank the National Science Foundation (grant SES ) for financial support. All remaining errors are my own. Department of Economics, Rice University, xiong@rice.edu 1
2 1 Introduction In the presence of asymmetric information, economic players may write contracts to elicit other players information, in order to make optimal decisions. Most of the large literature on contract theory focuses on the classical principal-agent (i.e., one principal and one or multiple agents) model and the common-agency (i.e., one agent and multiple principals) model. 1 However, both multiple principals and multiple agents are usually involved in many economic situations. For example, there are many competing insurance companies that offer different policies, and there are many consumers trying to find the best insurance plans. To understand such situations, we study a two-stage multi-principal-multi-agent game in this paper. In this contract game, the payoffs of the players 2 depend on both the states and the actions. States are privately observed by the agents, while actions are chosen by the principals. In stage 1, the principals offer contracts, which specify their committed actions contingent on the messages reported by the agents. In stage 2, the agents report messages and the contracts are executed. Our objective is to fully characterize the set of deteristic equilibrium allocations 3 in this contract game. Our main result (Theorem 1) says that the equilibrium allocations are fully characterized by two incentive compatibility (IC) conditions for the agents and the principals. truthful reporting by the agents forms a Bayes Nash equilibrium (I) agents: ; in the direct mechanisms defined by the allocation (II) principals: every principal is endowed with a -max- value (as defined in (5)); under the allocation, every principal achieves utility larger than the -max- value. Condition (I) must hold in every equilibrium; the intuition is the same as the revelation principle in the classical principal-agent model. However, the revelation principle 1 See Bolton and Dewatripont [1] and Martimort [4] for surveys on the principal-agent model and the comon-agency model, respectively. 2 Throughout the paper, we use she and he to refer to a principal and an agent, respectively. We use players to refer to both principals and agents. 3 We discuss stochastic equilibrium allocations in Section
3 ignores IC for the principals, so we need condition (II). The -max- value in condition (II) has the same role as the -max value in a usual 2-player normal-form game given other principals and agents strategies, principal j can always find a contract that guarantees her -max- value. As a result, in any equilibrium, all principals must achieve utility larger than the -max- values, i.e., condition (II) must hold in every equilibrium. Conversely, for any allocation satisfying conditions (I) and (II), we construct an equilibrium to implement the allocation. Specifically, for any principal k, principals k can find punishing contracts c k k under which principal k achieves utility less than her max- value. 4 Then, the intuition of the equilibrium construction is clear: in stage 1, each principal offers a set of contracts, which includes the equilibrium-allocation contract and the punishing contracts; in stage 2, the agents choose the equilibrium-allocation contract on the equilibrium path and they choose the punishing contracts c k k whenever principal k deviates from the equilibrium path. Yamashita [8] s theorem shares a similar intuition. However, his proof requires the agents play pure strategies in the subgames in stage 2, which poses a technical problem a pure-strategy equilibrium does not exist in many games. To eliate this problem, Yamashita assumes the equilibrium existence for all the possible subgames in stage 2. Equivalently, any contracts that induce no pure-strategy Nash equilibrium in stage 2 are automatically excluded from the principals choice sets in stage 1. This limits the scope of Yamashita s theorem, as illustrated by Example 1 in Section 2. In this example, market information is observed only by two agents who have diametrically opposed preferences. Thus, any contract offered by the principal defines a zero-sum game for the agents. Since pure-strategy Nash equilibria exist only in degenerate zero-sum games, no valid contract can extract the market information. As a result, the unique equilibrium allocation is inefficient. In this paper, we allow for mixed strategies in stage 2. Under some usual technical conditions (i.e., compact message spaces and continuous contracts), a mixed-strategy Nash equilibrium always exists in stage 2 (Glicksberg s Theorem, see [2]). Hence, we do not need the equilibrium existence assumption in [8]. Equivalently, we do not place any restrictions on the set of contracts offered by the principals in stage 1. As a result, our 4 We adopt the standard notation of letting k denote all members of a group other than individual k. 3
4 folk theorem expands the scope of Yamashita s theorem. For instance, if we allow for mixed-strategy equilibria in Example 1, the principals can find a contract to elicit market information. Consequently, an efficient equilibrium allocation exists. It is worth noting that each principal in our contract game is allowed to offer only a single contract, while we let each principal offer a set of contracts, as suggested by the equilibrium construction above. One methodological contribution of this paper is to introduce a way to embed such a set of contracts into one single valid contract. One caveat of our equilibrium characterization is that it is complicated, because the -max- values are hard to compute. Peters and Troncoso-Valverde [6] provide a much simpler characterization, but they require a particular complicated protocol for communication among the players. 5 We discuss these issues in Sections 5.4 and 5.5. The remainder of the paper is organized as follows. An illustrating example is provided in Section 2. The model is defined in Section 3. We present the main result in Section 4. Section 5 concludes with discussions. Technical proofs can be found in Appendix A. 2 Pure-strategy implementation versus mixed-strategy implementation: an example We use the following simple example to illustrate the major difference between our setup and that in Yamashita [8]: mixed strategies are allowed in our setup, while only pure strategies are valid in [8]. Example 1 There are two agents i 1,i 2, and one principal j. 6 The state is θ 0, 1 Θ, which is uniformly distributed. Suppose i 1 and i 2 observe θ, but j does not. Principal j has to choose an action a 1, 0, 1 A. The players are expected-utility maximizers, with Bernoulli utility 5 The complicated communication protocol is rarely observed in most economic situations. In such cases, our folk theorem applies. 6 For simplicity, we consider only two agents and one principal. The example remains valid if we add additional payoff-irrelevant agents and principals (i.e., these agents do not observe the states, these principals do not take payoff-relevant actions, and their payoffs are always constant). 4
5 functions defined as follows: u j a, θ 0, if a 0; 2, if a 1 θ; 3, if a 1 and θ 0; u i1 a, θ a; u i2 a, θ a. Following Yamashita [8], a valid contract for principal j is a function c j : M i1 M i2 A, where M i1 and M i2 are some exogenously given message spaces for i 1 and i 2, respectively. Upon receiving the contract, the agents send their messages and then the contract is executed. Pure-strategy implementation As in [8], the agents are required to play pure strategies, and we assume the existence of pure-strategy equilibria in the subgames defined by all the valid contracts of the principal. Equivalently, any contract that induces no pure-strategy Nash equilibria in stage 2 is not available to j. For every a A, let z a denote the constant allocation, in which a is taken at both states by principal j. It is easy to draw the following observations. (1) Only constant allocations can be implemented by pure-strategy equilibria. 7 (2) Principal j strictly prefers z a0 to z a1 or z a1. By 1 and 2, z a0 is the unique equilibrium allocation, under which the players achieve a payoff of 0. We show below that z a0 is not ex-ante pareto efficient. 7 Suppose otherwise. I.e., a at θ 0 and a a at θ 1 is implemented by some contract c j and some pure-strategy Nash equilibrium m 1, m 2 at θ 0 and m1, 2 m at θ 1. Suppose cj m 1, m2 a. Without loss of generality, suppose a i1 a and a i2 a. By the IC of i 2 at state θ 0, we have a i2 a. Hence, we have a i2 a i2 a. Furthermore, by the IC of i 1 at state θ 1, we have a i1 a, which implies a i2 a, contradicting a i2 a i2 a. 5
6 Mixed-strategy implementation Consider the contract ζ j for principal j defined as follows: 8 Suppose we allow the agents to play mixed strategies. ζ j : m 2 m 2 m 2 m 1 a 0 a 1 a 1 m 1 a 0 a 1 a 1 The following strategy profile of the agents forms a mixed-strategy Nash equilibrium in the game defined by ζ j. agent i 1 : at both states, report m 1 and m 1 with equal probability (i.e., 1 2 ); agent i 2 : at state θ 0, report m 2 with probability 1 at state θ 1, report m 2 and m 2 with equal probability (i.e., 1 2 ). Under this equilibrium, the agents fully reveal the true states, and principal j achieves the maximal ex-ante payoff , while both agents get an ex-ante payoff of 0. Therefore, this equilibrium allocation is pareto efficient, and it pareto doates z a0. 3 Setup 3.1 The contract game There are two sets of players: the principals 1,..., J and the agents 1,..., I. Each agent i privately observes his type θ i Θ i, and each principal j has to take an action y j j. Let Θ Θ i and j. The Bernoulli utility functions for i j principal j and agent i are denoted by v j : Θ R and u i : Θ R, respectively. We assume 1, 2, Θ,,, and θ Θ is distributed according to a common prior p Θ. Let ji denote the set of messages that agent i can send to principal j. Throughout this paper, we assume ji j i 0, 1 R for every j, i. 8 The contract ζ j is not valid for prinicipal j in [8], because no pure-strategy Nash equilibrium exists in the game defined by ζ j. 6
7 A strategy of each principal j is a valid contract, i.e., a continuous function c j : ji Y j. 9 Let j denote j s strategy set and j. A strategy of i j each agent i is a (type, contract)-contingent signalling scheme, i.e., a function S i : Θ i ji. 10 Let i denote i s strategy set and i. That is, in this j i contract game, the principals first choose contracts c c j in stage 1. Upon j observing c and θ i, each agent i sends (possibly stochastic) messages to the principals in stage 2, and then the contracts are implemented. I.e., this is a 2-stage dynamic game. Each c chosen by the principals in stage 1 defines a subgame for the agents in stage 2. In every such subgame, each agent i chooses a behavior strategy s i : Θ i ji in j the set sub i Θi ji. Define sub i sub. j i We use S i and s i to denote generic elements in i and i sub, respectively. Given c, we use S i c i sub to denote the behavior strategy induced by S i and c, i.e., S i cθ i S i θ i, c. Let φ s, θ ji denote the independent 11 distribution over message j, i profiles induced by any s, θ sub Θ, i.e., φ s, θ E i i i s i θ i E i, measurable E i i ji. i j Let ψ c, m denote the independent distribution over action profiles induced by 9 We require the codomain of c j be Y j rather than Yj, so that c j can be made continuous and Glicksberg s Theorem can be applied later. 10 We implicitly embed mixed strategies of the agents into our model, i.e., a pure strategy for agent i is a function from Θ i to j ji, and a mixed strategy is a function from Θ i to 11 Given each θ Θ, every agent i takes his strategies s i θ i the distribution φ s, θ induced by s, θ is a distribution over i i I. ji. j ji independently. As a result, j ji which is independent across j 7
8 cj any c, m j, mji j, i ji, i.e., j, i yj mji yj ψ c, m j c j i, yj j j. Given c, s, θ, Γ c, s, θ, y defined below calculates the probability that the action profile y is taken by the principals: Γ c, s, θ, y m j, i ji ψ c, my d φ s, θ. Define V j : sub R and U i : sub Θ i R as follows, where, given c, s, V j c, s and U i c, s, θ i denote the expected payoffs of principal j and agent i who observes θ i, respectively: U i c, s, θ i V j c, s θθ θ i Θ i v j y, θ Γ c, s, θ, y y v j y, θ i, θ i Γ c, s, θ i, θ i, y y p θ ; p θ i, θ i p θ i, θ. i θ i Θ i In the subgame defined by any c, the continuity of c j and the compactness of ji ensure that a (mixed-strategy) Nash equilibrium (NE) always exists by j j Glicksberg s Theorem (see [2]). Let c sub denote the set of Nash equilibria in the subgame defined by c, i.e., c s sub : U i c, s i, s i, θ i U i c, s i, s i, θ i, i, θ, s Θ sub. Hence, c for any c. Throughout the paper, for every c, fix some e c e i c i c sub. (1) We adopt the solution concept of subgame perfect Nash equilibrium (SPNE) 12 for this 2-stage contract game. Specifically, it is defined as follows. 12 Throughout the paper, we use SPNE and NE to represent the equilibrium in the 2-stage contract game and the subgame in stage 2, respectively. 8
9 cj Definition 1 c, S j, S i i is a SPNE if V j cj, c j, S c j, c j Vj c j, c j, S c j, c j, j, c, (2) and S i c i c, c. 3.2 Transformation of a mixed strategy through a homeomorphism Let A and B denote two subsets of the message spaces such that A is homeomorphic to B. Fix any homeomorphism ξ : A B. In our proofs below, we need to transform a mixed strategy in A (i.e., α A) to a mixed strategy in B (i.e., β B) via the homeomorphism ξ. Specifically, for any α A, define ξ α Bas follows: ξ α E α a A : ξ a E, measurable E B. That is, ξ renames the elements in A to the homeomorphic elements in B, and ξ α is just α, respecting this renag. 4 Main result 4.1 Equilibrium allocations A (deteristic) allocation is a function z : Θ ; let z j : Θ j denote the jth projection of z. As in [8], we say z is incentive compatible iff zj u i θ i, θ i j, θ i, θ i p θ i, θ i (3) θ i Θ i θ i Θ i u i zj θji, θ i j, θ i, θ i We say an allocation z is induced by c, s sub iff Note that if z is induced by c, s, then p θ i, θ i, i, θ i, θ ji Θ j i Θ i. z θ y Γ c, s, θ, y 1, θ, y Θ Y. V j c, s v j z θ, θ p θ, j. (4) θθ 9
10 Let Z IC denote the set of incentive compatible allocations. Let Z denote the set of allocations induced by SPNEs. 13 It is easy to show Z Z IC. 14 Define v j inf c j j sup c j j sc V j note that v j is well-defined by Lemma 3 in Appendix A.1. However, c j j j : sup c j j c j j sc V j sup c j j cj, c j, s, j ; (5) cj, c j, s may or may not exist. Define sc V j cj, c j, s is well-defined. The following is our main result. Theorem 1 Z z Z IC : v j z θ, θ p θ v j for every j ; θθ v j z θ, θ p θ v j for every j /. θθ Consider the following thought experiment: We ask each agent i to report his type θ i, and require the principals carry out their actions according to z θ i i, i.e., j takes the action z j θ. Theorem 1 says that we can implement z by a SPNE in the contract game defined in Section 3.1 iff in the thought experiment, no agent finds it profitable to deviate from the truthful report and every principal j achieves at least an expected payoff of v j. 15 The only if (i.e., ) direction of the proof of Theorem 1, which is similar to that in Yamashita [8], can be found in Appendix A.2. We focus on the if (i.e., ) direction in Section I.e., Z allocation z : there exists a SPNE c, S such that z is induced by c, S c. 14 The intuition is just the revelation principle. See also the proof of Lemma 1 in Yamashita [8, p ]. 15 Different from [8], no principal in can achieve the payoff v j in any SPNE, due to the technical difficulty associated with the infinite-message mechanisms that we consider. 10
11 4.2 The proof of Theorem 1: the if direction Throughout this subsection, we fix any z Z IC such that v j z θ, θ p θ v j for θθ every j and v j z θ, θ p θ v j for every j /. We will construct a SPNE θθ c, S such that z is induced by c, S c. The following two lemmas will be used later, and their proofs can be found in Appendix A.3 and A.4. Lemma 1 There exists c, s sub such that s c and z is induced by c, s. Lemma 2 For any k, there exists c k k c k j find s c k, c k k c k, c k k satisfying jk k such that for any c k k, we can V k c k, c k k c, s k, c k k v k z θ, θ p θ. (6) θθ Lemma 1 says that z is induced by c, s and s is a NE in the subgame defined by c. Lemma 2 says that for any principal k, principals k have the punishing contracts c k k and the agents have the punishing NE s c k, c k k to deter principal k from deviating from the allocation z. It is worth noting that the principals punishing contracts c k k does not depend on the deviating strategy (i.e., c k c k ) chosen by principal k, while the agents punishing NE s c k, c k k does A sketch of the proof This contract game has two stages. In stage 1, the principals choose c, and in stage 2, the agents choose s. Ignoring the IC of the principals, Lemma 1 says that z can be implemented by c, s, and the IC of the agents is satisfied, i.e., s c. To ensure the IC of the principals, we modify the rules of the game, hypothetically. Suppose there is an extra stage between the two stages, which we call stage 1.5. In stage 1.5, every principal j observes all the contracts chosen in stage 1, and then she revises 11
12 her contract according to the following protocol 16 : revise to c k j if principal k j is the unique principal who deviates from the strategy profile c defined in Lemma 1; do not revise otherwise. Lastly, based on the final contracts offered in stage 1.5, the agents choose s in stage 2. Given the extra stage and the described protocol, the following strategy profile forms a SPNE which implements z. A) Equilibrium Path: in stage 1, the principals offer c; in stage 1.5, no revision occurs; in stage 2, the agents choose s; B) Off-Equilibrium Path - case i): in stage 1, the principals offer c k, c k c; in stage 1.5, principals k revise their contracts to c k k and principal k does not revise her contract; in stage 2, the agents choose s c k, c k k ; C) Off-Equilibrium Path - other cases: in stage 1, the principals offer c c and two or more principals deviate from c; in stage 1.5, no revision occurs; in stage 2, the agents choose e c c fixed in (1). Lemma 1 implies that z is implemented on the equilibrium path. Furthermore, the IC of the principals is satisfied: if principal k deviates unilaterally from c in stage 1, principals k would choose the punishing contracts c k k in stage 1.5 and the agents would play the punishing NE s c k, c k k in stage 2. By (6) in Lemma 2, principal k does not find it profitable to deviate from the equilibrium path in stage 1. The problem for the scheme above is that stage 1.5 does not exist in our original contract game. In particular, the principals cannot observe who deviates in stage 1, even though they have the punishing contracts to deter deviation. Instead, it is the agents (in stage 2) who can observe the deviating principal. Furthermore, in stage 2, even if the agents inform the principals about the deviating one in stage 1, the principals do not have a chance to revise their contracts after stage 1. Hence, it should be the agents that revise the contracts for the principals in stage 2. To achieve this without stage 1.5, roughly, in stage 1 on the equilibrium path, we let each principal j offer a set of contracts including c j and c k j for every k j 16 In stage 1.5, the principals follow the protocol mechanically, i.e., they do not behave strategically. 12
13 and delegate the choice of contracts to the agents in stage 2: on the equilibrium path in which no principal deviates, the agents choose c j for the principals and play s to j implement z ; on the off-equilibrium path in which principal k deviates unilaterally to c k, the agents choose c k k c for principals k and play s k, c k k to punish principal k. Still, we are facing one problem. The set of contracts described above is not a valid contract in the contract game defined in Section 3.1. We embed the set of contracts into one single valid contract in the next subsection The embedding and the extension To define each c j : ji j, we first break each ji into several parts, and i then define c j on these parts separately. For any E ji, we use c j E to denote c j i with the restricted domain E. 17 Fix any a 0, a 1,..., a 2, a 2 1 such that i 0 a 0 a 1... a 2 a Recall ji 0, 1. Define k k ji a 2k, a 2k1 for every j, i and every k 0, 1, 2,...,. That is, we fix 1 disjoint closed intervals in, and the agents use messages in these disjoint intervals to tell the principals about who deviates from the equilibrium path in stage 1: m ji 0 ji means no one deviates in stage 1, and m ji k ji (with k 0) means principal k deviates in stage 1. For every k 0, 1, 2,...,, k is homeomorphic to ; let h k : k be a homeomorphism. We use h k 1 to denote the inverse function of h k. Furthermore, let ID k : k k be the identity function, i.e., ID k m m for every m k. Since k is closed, by the Tietze Extension Theorem (see [5, p.219]), there exists a continuous function g k : k such that g k m ID k m m for every m k. That is, g k, while preserving the definition of ID k on k, extends the domain continuously to. We describe the embedding in three cases. 17 I.e., c j E : E j satisfies c j E m c j m, m E. 13
14 A) The equilibrium path: the principals offer c in stage 1. Recall s c in Lemma 1, i.e., for every i, θ Θ, we have U i c, s i, s i, θ i U i c, s i, s i, θ i, s i For every j, define c j 0 : ji i i c mji j c i j h 0 m ji i 0 ji j as follows: Θi ji. (7) j, m ji i 0 ji. i I.e., on the equilibrium path, the agents reports messages in 0 ji. Upon receiving the messages, the principals translate them to messages in ji via the homeomorphism h 0, and then implement c. follows: For every i, consider the homeomorphism H 0 : ji 0 ji defined as j j H 0 mji j For every θ i Θ i, note that s i θ i h 0 1 mji, m ji j j j ji and H 0 s i θ i j ji. 0 ji j. That is, each agent i encodes the messages via h 0 1 and transforms the strategy si to H 0 s i, while each principal j decodes messages via h 0 and transforms the strategy H 0 s i back to s i before executing the contract c j. As implied by (7), for every i, θ Θ, we have Θi U i c, H 0 s i, H 0 s i, θ i U i c, si, H0 s i, θ i, si ji 0. (8) j On the equilibrium path, if we hypothetically require agents report messages in 0 ji,(8) would imply that H 0 s is a NE in the subgame defined by c. However, agent i may deviate to report messages outside 0 ji. To make H0 s remain a NE without the hypothetical requirement, we need to extend c j 0 to c ji j as follows: ji 0 i j, i i mji c j i ji 0 j, i i m ji, m j, i i c j 0 ji i ji 0 j, i g 0 m ji, i I.e., any unilateral deviation to a message outside 0 ji is first translated to a message inside 0 ji via g0. As implied by (8), H 0 s remains a NE in the subgame defined by c j. 14.
15 B) The off-equilibrium path with unilateral deviation In stage 1, suppose principal k offers c k c k and principals k offer c k. By Lemma 2, s s c k, c k k c k, c k k, i.e., for every i, θ Θ, we have U i c k, c k k, s i, s i, θ i U i c k, c k k, si, s i, θ i, si For every j k, define c j i c mji j c k j i k ji : k ji j as follows: i h k m ji i, m ji i k ji. i Θi ji. (9) j I.e., the agents reports messages in k ji, and principals k translate them to messages in ji via h k before implementing c k k. For every i, consider the homeomorphism H k : ji j ki k ji jk defined as follows: H k m ki, mji m ki, jk For every θ i Θ i, note that s i θ i h k 1 mji jk, m ki, mji jk ji and H k s i θ i j ki k ji. jk ki k ji jk That is, each agent i encodes the messages to principals k via h k 1 and transforms the strategy s i to H k s i, while principals k decode messages via h k and transform the strategy H k s i back to s i before executing the contract c k k. As implied by (9), for every i, θ Θ, we have ck U i, c k, H k s i, H k s i, θ i s i ck U i, c k, s i, H k s i, θ i, (10) Θi ki ji k. jk If we hypothetically require agents report messages in k ji to each principal j k, (10) would imply that H k s is a NE in the subgame defined by c k, c k. However, agent i may deviate to report messages outside k ji. To make Hk s remain a NE without the hypothetical requirement, we need to extend c j k to c ji j i c j i mji c ji k i j j, i i m ji, m j, i i 15 k ji ji k j, i i as follows: ji k j, i g k m ji i.,.
16 I.e., any unilateral deviation to a message outside k ji is first translated to a message inside k ji via gk. As implied by (10), H k s remains a NE in the subgame defined by ck, c k. C) The other off-equilibrium paths In the above, we have defined each c j on the restricted domain ji k j, i. Since the restricted domain is closed and c j is kj i continuous on it, by the Tietze Extension Theorem, there exists a continuous function c j : ji j such that i c j m c j m kj which completes the definition of c j. kj i i m, ji k j, i ji k j, i, The definition of S Finally, we define S as follows: S c H 0 s; S c k, c k H k s c k, c k k, k, c k k c k ; where e c c is fixed for every c in (1). S c e c otherwise; This completes the definition of c, S. Clearly, c, S is a SPNE as argued above, and z is induced by c, S c. 5 Discussions We conclude the paper with several discussions. 16
17 5.1 Finite messages versus infinite messages Unlike Yamashita [8], we have to consider infinite-message spaces. In our proof of the if direction of Theorem 1, a message m ji sent from agent i to principal j plays two roles: i) it recommends a contract c j for principal j, and ii) it reports i s message when c j is adopted. That is, we have to establish a surjective function from the message set M ji to L M ji, where L denotes the set of potential contracts recommended by i. Clearly, such a surjective function exists only if M ji is an infinite set. Nevertheless, it is without loss of generality to focus on infinite-message mechanisms. Let Q j denote the set of all finite-message mechanisms for principal j, i.e., j q j : W ji ii j Wji, j, i. Although j j, every element in j can be represented by some element in j : For any allocation z that is induced by some q Π jj j and s q, there exist c Π jj j and s c such that z is induced by c and s. 18 Thus, any allocation, which is implementable via finite-message mechanisms, can be implemented via infinite-message mechanisms. 5.2 Stochastic equilibrium allocations For notational ease, we focus on deteristic equilibrium allocations throughout the paper. With some modification, our result also applies to stochastic equilibrium allocations. A stochastic allocation is a function β : Θ. We say a stochastic allocation β is independent if β θ is an independent distribution over Y for every θ; otherwise, we say that β is correlated. Recall that we use a direct mechanism on the equilibrium path to implement a potential equilibrium allocation. However, an implicit assumption of our model is that the principals take actions independently for each profile of messages received. Consequently, a stochastic allocation can be implemented on the equilibrium path if and only if it is independent. Hence, Theorem 1 remains true for independent stochastic equilibrium allocations. 18 The proof is similar to the proof of Lemma 1 and is omitted. 17
18 For correlated stochastic equilibrium allocations, our characterization is true if we endow the principals with the correlation-generating device used in Kalai, Kalai, Lehrer and Samet [3] and Peters and Troncoso-Valverde [6], so that, for each profile of message received, the principals are induced by the correlation device to take correlated actions. 5.3 Szentes critique Following the setup of Yamashita [8], Szentes [7] constructs a complete-information example, in which a principal cannot even achieve her -max utility. The problem, according to [7], is that the principals delegate their actions to the agents in [8]. Szentes then modifies Yamashita s model to a no-delegation model, and proves a folk theorem under the complete-information setup. 19 In Yamashita s setup, the principals are restricted to choose deteristic contracts. If we allow for random contracts, every principal in Szentes example is able to achieve her -max value. Hence, our model, which allows for random contracts, is immune to the critique raised by Szentes [7]. 5.4 A caveat and a re-interpretation A caveat of our theorem is that v j defined in (5) is difficult to compute, which seems to make Theorem 1 hard to use. However, the following result shows that we can apply Theorem 1 without knowing v j. Theorem 2 For any z Z, we have z Z IC : v j z θ, θ p θ v j z θ, θ p θ, j θθ θθ Z. Theorem 2 says that any IC allocation, which doates another SPNE allocation regarding the principals payoffs, can be implemented by a SPNE. Though Theorem 2 is immediately implied by Theorem 1, the arguments in Section 4.2 provide a constructive 19 It remains an open question to extend Szentes folk theorem to incomplete-information setups. 18
19 way to prove Theorem 2 directly. Suppose z Z is implemented by a SPNE c, S. Then, c k can be used as punishing contracts for principals k to deter principal k from deviating from the equilibrium path for z, i.e., v k z θ, θ p θ v k z θ, θ p θ V k c, S c V k c k, c k, S c k, c k, c k k, θθ θθ where the last inequality follows from the fact that c, S is a SPNE. Therefore, with c k k replaced by c k, the argument in Section 4.2 proves Theorem 2. We use the following example to illustrate the idea. Example 2 (A Public Good Project) Multiple principals decide whether to participate in a publicgood project and how much to invest if they participate. The project can be completed if and only if every principal participates. Furthermore, multiple agents privately observe the states which deteres the payoffs of the project to all the players. Clearly, it is a SPNE that no principal participates, and all players get 0 in this equilibrium. Furthermore, by Theorem 2, any IC allocation, in which the principals gets non-negative payoffs, can be implemented by a SPNE Comparison to Peters and Troncoso-Valverde [6] We differ from Yamashita [8] only on the strategy spaces: we allow for mixed strategies, but [8] does not. We differ from Peters and Troncoso-Valverde[6] on three respects. First, as in Yamashita [8], we follow the classical setup in contract theory, in which imal communication is required: the principals first offer the contracts, i.e., functions from (exogenously given) message spaces to action spaces; the agents then send their messages, and the contracts are executed. However, Peters and Troncoso-Valverde [6] requires a particular procedure of two-stage communication among all players. Due to this difference, our equilibrium characterization is more complicated than that in [6]. Hence, an alternative way to interpret [6] is that it finds a communication protocol which induces a simple and elegant characterization of equilibrium allocations. 20 To implement such an allocation, the principals use the direct mechanism on the equilibrium path; if any principal unilaterally deviates, the agents recommed non-participation for the other principals. 19
20 Second, we adopt the solution concept of SPNE, while Bayesian Nash equilibrium is adopted in [6]. That is, different from [6], we require the agents equilibrium strategy profile remains a continuation equilibrium in the subgame defined by any contract profile offered by the principals. 21 Due to this difference, we define v j as a -max- value, while [6] defines v j as a -max value, where the extra takes care of all potential equilibria in subgames. Finally, in Peters and Troncoso-Valverde [6], every player is both a principal and an agent. Through the two-stage communication procedure, all players observe anyone who deviates from the equilibrium path, and they can revise their equilibrium contracts to punishing contracts so as to punish the deviator. However, in Yamashita [8] and this paper, though the principals are endowed with punishing contracts, they have to offer their contracts before observing the deviating principal, and they cannot revise their contracts later. Furthermore, the agents, who observe the deviating principal, are not endowed with punishing contracts. Hence, it is the agents who tell the principals how to revise their equilibrium contracts to punishing contracts. Thus, different from [6], we overcome a conceptual and technical obstacle: the transmission of information regarding the deviating principal from the agents (who observe the deviator but are not endowed with punishing contracts ) to the principals (who do not observe the deviator but are endowed with punishing contracts ). A Appendix A.1 Lemma 3 Lemma 3 V j c, s is well defined for every j, c. sc Proof. Fix any j, c. Suppose inf V j c, s α. Then, for any positive integer n, there exists s n csuch that V j c, s n α sc n 1. Since sub is compact, s n has a convergent subsequence. With abuse of notation, let s n denote this convergent subsequence, i.e., s n s for some s sub. 21 See more discussion in Troncoso-Valverde [6, Section 7]. 20
21 Θi Note that ji is endowed with weak topology and i sub ji j j is endowed with product topology. Furthermore, for any j, i, θ i, both V j c, s and U i c, s, θ i are continuous on S sub. 22 Consequently, the NE is upper hemi-continuous, i.e., s n c for all n and s n s imply s c. Hence, V j c, s inf sc V j c, s α. (11) Furthermore, V j c, s n α n 1 for all n and sn s imply V j c, s lim V j c, s n lim α 1 α. (12) n n n (11) and (12) imply V j c, s α inf V j c, s. Finally, s cimplies that V j c, s sc sc is well defined. A.2 Proof of Theorem 1: the only if direction Fix any allocation z Z, i.e., there exists a SPNE c, S such that z is induced by c, S c. For notational ease, let s denote S c. Hence, by (4), we have We now show V j c, s v j z θ, θ p θ, j. θθ v j z θ, θ p θ v j if j ; θθ v j z θ, θ p θ v j if j /. θθ Suppose otherwise. I.e., there are two cases: 1) there exists j such that v j z θ, θ θθ p θ v j ; 2) there exists j such that v j z θ, θ p θ v j. θθ In case 1), V j c, s v j z θ, θ p θ θθ v j inf c j j sup c j j sc V j cj, c j, s sup c j j sc j,c j V j cj, c j, s. 22 This is immediately implied by the definition of weak topology and the fact that c is continuous. 21
22 In case 2), V j c, s v j z θ, θ p θ θθ v j inf c j j sup c j j sc V j cj, c j, s sup where the last inequality follows from j /, i.e., arg c j j does not exist. Therefore, in both cases, we have V j c, s sup c j j which implies that there exists c j j s.t. V j c, s sc j,c j V j s c j,c j V j c j, c j, S c j j sc j,c j V j sup c j j cj, c j, s, V j c j, c j, s c j, c j. I.e., V j c j, c j, S c j, c j V j c j, c j, S c j, c j, contradicting the fact that c, S is an equilibrium (i.e., (2)). sc V j cj, c j, s, cj, c j, s A.3 Proof of Lemma 1 Lemma 1 There exists c, s sub such that s c and z is induced by c, s. Proof. Recall z Z IC. Suppose every principal j offers the direct mechanism z j (where z z j ). Since j z is incentive compatible (see (3)), truthful reporting by the agents is a NE and z is implemented. That is, (3) is equivalent to zj u i θ i, θ i j, θ i, θ i p θ i, θ i (13) θ i Θ i zj u i θji, θ i θ ji j Θ i j, θ i, θ i p θ i, θ i dρ, ρ Θ i. θ i Θ i 22
23 However, z j is not a valid contract, i.e., it is not a continuous function from ji i to j. We thus need to transform every z j to a valid contract. First, based on z j : Θ i j, consider the continuous function Γ z j i j defined as follows: : Θ i i Γ z j µi i yj θ θ Θ: z j θ i y j µ i i Θ i, y j j. i µ i θ i, That is, under the direct mechanism z j, the agents report deteristic types, while Γ z j is the stochastic direct mechanism induced by z j, in which the agents report stochastic types. Clearly, truthful reporting remains a NE under Γ z j. Second, for any a, we use δ a to denote the Dirac measure on the set a. For every i, fix any injective function i : Θ i ji. We use i θ i to represent θ i, i.e., by reporting i θ i ji, agent i informs principal j of i s type θ i. Consider the continuous function Λ j : i θ i i : θ Θ Λ j i θ i i δ θi Θ i, i i, θ Θ. Since i θ i i : θ Θ is a closed subset of ji, by the Tietze Extension Theorem, there exists a continuous i function Λ j : ji i Θ i, s.t. Λ j i θ i i Λ j i i θ i i, θ Θ. That is, i θ i ji is used by agent i to inform principal j about i s type θ i, and any other message in ji reported by i would suggest a stochastic type in Θ i. Third, define c, s as follows: c j Γ z j Λ j, j ; 23
24 s i θ i δ i θ i, i, θ Θ. j I.e., c j is the generalized stochastic direct mechanism, and s i is the truthful reporting strategy. By (13), s c and z is induced by c, s. A.4 Proof of Lemma 2 Lemma 2 For any k, there exists c k k c k j k such that for any c k k, we can jk find s c k, c k k c k, c k k satisfying V k c k, c k k c, s k, c k k v k z θ, θ p θ. (14) θθ Proof. First, for any k, we will show below that there exists c k k k such that sup c k sc k k,ck k V k c k, ck k, s v k z θ, θ p θ. (15) θθ Second, fix any k and c k k described above. For any c k k, pick some s arg sc k,c k k V k c k, c k k, s. Hence, V k c k, c k k, s c k, c k k Therefore, (14) is implied by (16) and (15). sup c k k sc k,c k k V k sup c k k sc k,ck k V k c k, c k k, s c k, ck k, s. c k, c k k Finally, we prove (15) by considering two cases: k and k /. For any k, pick c k k arg sup c k k sc k,c k V k c k, c k, s. Then, sc k,ck k V k c k k c k, ck k, s sup c k k c k k sc k,c k V k v k v k z θ, θ p θ, θθ 24 c k, c k, s (16)
25 i.e., (15) holds. For any k /, since inf c k k sup c k k sc k,c k V k by the definition of "inf," we have c k k k s.t. sup c k k i.e., (15) holds. sc k, ck k V k c k, c k, s v k v k z θ, θ p θ, θθ c k, ck k, s v k z θ, θ p θ, θθ References [1] Bolton, P. and M. Dewatripont (2004): "Contract Theory," Cambridge, MA: The MIT Press. [2] Fudenberg, D. and J. Tirole (1991): "Game Theory," Cambridge, MA: The MIT Press. [3] Kalai, A.T., E. Kalai, E. Lehrer and D. Samat (2010): "A Commitment Folk Theorem," Games and Economic Behavior 69, [4] Martimort, D. (2006): "Multi-Contracting Mechanism Design," in Advances in Economics and Econometrics: Theory and Applications, Ninth World Congress, Vol. I, ed. by R. Blundell, W. K. Newey, and T. Persson. Cambridge, MA: Cambridge University Press, [5] Munkres, J. (2000): "Topology," Upper Saddle River, NJ: Prentice-Hall. [6] Peters, M. and C. Troncoso-Valverde (2013): "A Folk Theorem for Competing Mechanisms" Journal of Economic Theory, forthcog. [7] Szentes, B. (2009): "A Note on Mechanism Games with Multiple Principals and Three or More Agents by T. Yamashita," manuscript, University of Chicago. [8] Yamashita, T. (2010): "Mechanism Games with Multiple Principals and Three or More Agents," Econometrica 78,
Competition relative to Incentive Functions in Common Agency
Competition relative to Incentive Functions in Common Agency Seungjin Han May 20, 2011 Abstract In common agency problems, competing principals often incentivize a privately-informed agent s action choice
More informationMechanism Design: Basic Concepts
Advanced Microeconomic Theory: Economics 521b Spring 2011 Juuso Välimäki Mechanism Design: Basic Concepts The setup is similar to that of a Bayesian game. The ingredients are: 1. Set of players, i {1,
More informationCompeting Mechanism Design with Frictions
Competing Mechanism Design with Frictions Seungjin Han January 23, 2014 Abstract This paper considers multiple principals competing mechanism design problems in directed search markets with frictions.
More informationDefinitions and Proofs
Giving Advice vs. Making Decisions: Transparency, Information, and Delegation Online Appendix A Definitions and Proofs A. The Informational Environment The set of states of nature is denoted by = [, ],
More informationPayoff Continuity in Incomplete Information Games
journal of economic theory 82, 267276 (1998) article no. ET982418 Payoff Continuity in Incomplete Information Games Atsushi Kajii* Institute of Policy and Planning Sciences, University of Tsukuba, 1-1-1
More informationSequential Equilibria of Multi-Stage Games with Infinite Sets of Types and Actions
Sequential Equilibria of Multi-Stage Games with Infinite Sets of Types and Actions by Roger B. Myerson and Philip J. Reny* Draft notes October 2011 http://home.uchicago.edu/~preny/papers/bigseqm.pdf Abstract:
More informationON THE REVELATION PRINCIPLE AND RECIPROCAL MECHANISMS IN COMPETING MECHANISM GAMES
ON THE REVELATION PRINCIPLE AND RECIPROCAL MECHANISMS IN COMPETING MECHANISM GAMES MICHAEL PETERS Abstract. This paper shows how to characterize the set of outcomes functions that can be supported as equilibrium
More informationWhen to Ask for an Update: Timing in Strategic Communication
When to Ask for an Update: Timing in Strategic Communication Work in Progress Ying Chen Johns Hopkins University Atara Oliver Rice University March 19, 2018 Main idea In many communication situations,
More informationCompeting Mechanisms: One-Shot versus Repeated Games
Competing Mechanisms: One-Shot versus Repeated Games Sambuddha Ghosh Shanghai U. of Fin. & Economics Seungjin Han McMaster University October 8, 2016 Abstract This paper studies a game where multiple principals
More informationInformed Principal in Private-Value Environments
Informed Principal in Private-Value Environments Tymofiy Mylovanov Thomas Tröger University of Bonn June 21, 2008 1/28 Motivation 2/28 Motivation In most applications of mechanism design, the proposer
More informationNASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA
NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA MARIA GOLTSMAN Abstract. This note shows that, in separable environments, any monotonic social choice function
More informationStatic Information Design
Static Information Design Dirk Bergemann and Stephen Morris Frontiers of Economic Theory & Computer Science, Becker-Friedman Institute, August 2016 Mechanism Design and Information Design Basic Mechanism
More informationEx Post Cheap Talk : Value of Information and Value of Signals
Ex Post Cheap Talk : Value of Information and Value of Signals Liping Tang Carnegie Mellon University, Pittsburgh PA 15213, USA Abstract. Crawford and Sobel s Cheap Talk model [1] describes an information
More informationBayes Correlated Equilibrium and Comparing Information Structures
Bayes Correlated Equilibrium and Comparing Information Structures Dirk Bergemann and Stephen Morris Spring 2013: 521 B Introduction game theoretic predictions are very sensitive to "information structure"
More informationMechanism Design: Implementation. Game Theory Course: Jackson, Leyton-Brown & Shoham
Game Theory Course: Jackson, Leyton-Brown & Shoham Bayesian Game Setting Extend the social choice setting to a new setting where agents can t be relied upon to disclose their preferences honestly Start
More informationLecture Slides - Part 4
Lecture Slides - Part 4 Bengt Holmstrom MIT February 2, 2016. Bengt Holmstrom (MIT) Lecture Slides - Part 4 February 2, 2016. 1 / 65 Mechanism Design n agents i = 1,..., n agent i has type θ i Θ i which
More informationEC476 Contracts and Organizations, Part III: Lecture 2
EC476 Contracts and Organizations, Part III: Lecture 2 Leonardo Felli 32L.G.06 19 January 2015 Moral Hazard: Consider the contractual relationship between two agents (a principal and an agent) The principal
More informationSubgame Perfect Equilibria in Stage Games
Subgame Perfect Equilibria in Stage Games Alejandro M. Manelli Department of Economics Arizona State University Tempe, Az 85287-3806 August 2000 I am grateful to an associate editor and to two referees
More informationNBER WORKING PAPER SERIES PRICE AND CAPACITY COMPETITION. Daron Acemoglu Kostas Bimpikis Asuman Ozdaglar
NBER WORKING PAPER SERIES PRICE AND CAPACITY COMPETITION Daron Acemoglu Kostas Bimpikis Asuman Ozdaglar Working Paper 12804 http://www.nber.org/papers/w12804 NATIONAL BUREAU OF ECONOMIC RESEARCH 1050 Massachusetts
More informationNegotiation and Take it or Leave it in Common Agency
Negotiation and Take it or Leave it in Common Agency Michael Peters Department of Economics University of Toronto 150 St. George St. Toronto, Canada M5S 3G7 email:peters@economics.utoronto.ca First Draft
More informationPolitical Economy of Institutions and Development: Problem Set 1. Due Date: Thursday, February 23, in class.
Political Economy of Institutions and Development: 14.773 Problem Set 1 Due Date: Thursday, February 23, in class. Answer Questions 1-3. handed in. The other two questions are for practice and are not
More informationOn the Informed Principal Model with Common Values
On the Informed Principal Model with Common Values Anastasios Dosis ESSEC Business School and THEMA École Polytechnique/CREST, 3/10/2018 Anastasios Dosis (ESSEC and THEMA) Informed Principal with Common
More informationWhen to Ask for an Update: Timing in Strategic Communication. National University of Singapore June 5, 2018
When to Ask for an Update: Timing in Strategic Communication Ying Chen Johns Hopkins University Atara Oliver Rice University National University of Singapore June 5, 2018 Main idea In many communication
More informationMicroeconomic Theory (501b) Problem Set 10. Auctions and Moral Hazard Suggested Solution: Tibor Heumann
Dirk Bergemann Department of Economics Yale University Microeconomic Theory (50b) Problem Set 0. Auctions and Moral Hazard Suggested Solution: Tibor Heumann 4/5/4 This problem set is due on Tuesday, 4//4..
More informationNotes on Blackwell s Comparison of Experiments Tilman Börgers, June 29, 2009
Notes on Blackwell s Comparison of Experiments Tilman Börgers, June 29, 2009 These notes are based on Chapter 12 of David Blackwell and M. A.Girshick, Theory of Games and Statistical Decisions, John Wiley
More informationPrice and Capacity Competition
Price and Capacity Competition Daron Acemoglu, Kostas Bimpikis, and Asuman Ozdaglar October 9, 2007 Abstract We study the efficiency of oligopoly equilibria in a model where firms compete over capacities
More informationPrice and Capacity Competition
Price and Capacity Competition Daron Acemoglu a, Kostas Bimpikis b Asuman Ozdaglar c a Department of Economics, MIT, Cambridge, MA b Operations Research Center, MIT, Cambridge, MA c Department of Electrical
More information1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts)
1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts) We extend our setup by allowing more than two types of agent. The agent s type is now β {β 1, β 2,..., β N }, where
More informationPreliminary Results on Social Learning with Partial Observations
Preliminary Results on Social Learning with Partial Observations Ilan Lobel, Daron Acemoglu, Munther Dahleh and Asuman Ozdaglar ABSTRACT We study a model of social learning with partial observations from
More informationEfficient Random Assignment with Cardinal and Ordinal Preferences: Online Appendix
Efficient Random Assignment with Cardinal and Ordinal Preferences: Online Appendix James C. D. Fisher December 11, 2018 1 1 Introduction This document collects several results, which supplement those in
More informationCorrelated Equilibrium in Games with Incomplete Information
Correlated Equilibrium in Games with Incomplete Information Dirk Bergemann and Stephen Morris Econometric Society Summer Meeting June 2012 Robust Predictions Agenda game theoretic predictions are very
More informationSender s Small Concern for Credibility and Receiver s Dilemma
April 2012 Sender s Small Concern for Credibility and Receiver s Dilemma Hanjoon Michael Jung The Institute of Economics, Academia Sinica Abstract We model a dilemma that receivers face when a sender has
More informationRobust Predictions in Games with Incomplete Information
Robust Predictions in Games with Incomplete Information joint with Stephen Morris (Princeton University) November 2010 Payoff Environment in games with incomplete information, the agents are uncertain
More informationGraduate Microeconomics II Lecture 5: Cheap Talk. Patrick Legros
Graduate Microeconomics II Lecture 5: Cheap Talk Patrick Legros 1 / 35 Outline Cheap talk 2 / 35 Outline Cheap talk Crawford-Sobel Welfare 3 / 35 Outline Cheap talk Crawford-Sobel Welfare Partially Verifiable
More informationA Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations
A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations Swaprava Nath a, Onno Zoeter b a Indian Institute of Science, Bangalore b Xerox Research Centre Europe, Meylan, France Abstract
More informationBayesian Persuasion Online Appendix
Bayesian Persuasion Online Appendix Emir Kamenica and Matthew Gentzkow University of Chicago June 2010 1 Persuasion mechanisms In this paper we study a particular game where Sender chooses a signal π whose
More information1 The General Definition
MS&E 336 Lecture 1: Dynamic games Ramesh Johari April 4, 2007 1 The General Definition A dynamic game (or extensive game, or game in extensive form) consists of: A set of players N; A set H of sequences
More informationTijmen Daniëls Universiteit van Amsterdam. Abstract
Pure strategy dominance with quasiconcave utility functions Tijmen Daniëls Universiteit van Amsterdam Abstract By a result of Pearce (1984), in a finite strategic form game, the set of a player's serially
More informationGame Theory. Monika Köppl-Turyna. Winter 2017/2018. Institute for Analytical Economics Vienna University of Economics and Business
Monika Köppl-Turyna Institute for Analytical Economics Vienna University of Economics and Business Winter 2017/2018 Static Games of Incomplete Information Introduction So far we assumed that payoff functions
More informationGovernment 2005: Formal Political Theory I
Government 2005: Formal Political Theory I Lecture 11 Instructor: Tommaso Nannicini Teaching Fellow: Jeremy Bowles Harvard University November 9, 2017 Overview * Today s lecture Dynamic games of incomplete
More informationInformation Design. Dirk Bergemann and Stephen Morris. Johns Hopkins University April 2017
Information Design Dirk Bergemann and Stephen Morris Johns Hopkins University April 2017 Mechanism Design and Information Design Basic Mechanism Design: Fix an economic environment and information structure
More informationAsymmetric Social Norms
Asymmetric Social Norms Gabriele Camera Chapman University University of Basel Alessandro Gioffré Goethe University December 8, 2016 Abstract Studies of cooperation in infinitely repeated matching games
More informationModule 16: Signaling
Module 16: Signaling Information Economics (Ec 515) George Georgiadis Players with private information can take some action to signal their type. Taking this action would distinguish them from other types.
More informationGame Theory. Wolfgang Frimmel. Perfect Bayesian Equilibrium
Game Theory Wolfgang Frimmel Perfect Bayesian Equilibrium / 22 Bayesian Nash equilibrium and dynamic games L M R 3 2 L R L R 2 2 L R L 2,, M,2, R,3,3 2 NE and 2 SPNE (only subgame!) 2 / 22 Non-credible
More informationArea I: Contract Theory Question (Econ 206)
Theory Field Exam Summer 2011 Instructions You must complete two of the four areas (the areas being (I) contract theory, (II) game theory A, (III) game theory B, and (IV) psychology & economics). Be sure
More information6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Potential Games
6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Asu Ozdaglar MIT March 2, 2010 1 Introduction Outline Review of Supermodular Games Reading: Fudenberg and Tirole, Section 12.3.
More informationNotes on Mechanism Designy
Notes on Mechanism Designy ECON 20B - Game Theory Guillermo Ordoñez UCLA February 0, 2006 Mechanism Design. Informal discussion. Mechanisms are particular types of games of incomplete (or asymmetric) information
More informationSupplementary appendix to the paper Hierarchical cheap talk Not for publication
Supplementary appendix to the paper Hierarchical cheap talk Not for publication Attila Ambrus, Eduardo M. Azevedo, and Yuichiro Kamada December 3, 011 1 Monotonicity of the set of pure-strategy equilibria
More informationCostly Expertise. Dino Gerardi and Leeat Yariv yz. Current Version: December, 2007
Costly Expertise Dino Gerardi and Leeat Yariv yz Current Version: December, 007 In many environments expertise is costly. Costs can manifest themselves in numerous ways, ranging from the time that is required
More informationINFORMATIONAL ROBUSTNESS AND SOLUTION CONCEPTS. Dirk Bergemann and Stephen Morris. December 2014 COWLES FOUNDATION DISCUSSION PAPER NO.
INFORMATIONAL ROBUSTNESS AND SOLUTION CONCEPTS By Dirk Bergemann and Stephen Morris December 2014 COWLES FOUNDATION DISCUSSION PAPER NO. 1973 COWLES FOUNDATION FOR RESEARCH IN ECONOMICS YALE UNIVERSITY
More informationEconomics 201B Economic Theory (Spring 2017) Bargaining. Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7).
Economics 201B Economic Theory (Spring 2017) Bargaining Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7). The axiomatic approach (OR 15) Nash s (1950) work is the starting point
More informationLearning Equilibrium as a Generalization of Learning to Optimize
Learning Equilibrium as a Generalization of Learning to Optimize Dov Monderer and Moshe Tennenholtz Faculty of Industrial Engineering and Management Technion Israel Institute of Technology Haifa 32000,
More informationPerfect Conditional -Equilibria of Multi-Stage Games with Infinite Sets of Signals and Actions (Preliminary and Incomplete)
Perfect Conditional -Equilibria of Multi-Stage Games with Infinite Sets of Signals and Actions (Preliminary and Incomplete) Roger B. Myerson and Philip J. Reny Department of Economics University of Chicago
More informationONLINE APPENDIX. Upping the Ante: The Equilibrium Effects of Unconditional Grants to Private Schools
ONLINE APPENDIX Upping the Ante: The Equilibrium Effects of Unconditional Grants to Private Schools T. Andrabi, J. Das, A.I. Khwaja, S. Ozyurt, and N. Singh Contents A Theory A.1 Homogeneous Demand.................................
More informationDiscussion Papers in Economics
Discussion Papers in Economics No. 10/11 A General Equilibrium Corporate Finance Theorem for Incomplete Markets: A Special Case By Pascal Stiefenhofer, University of York Department of Economics and Related
More informationOn the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation
MPRA Munich Personal RePEc Archive On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation Ismail Saglam Ipek University 4 May 2016 Online at https://mpra.ub.uni-muenchen.de/71090/
More informationDynamic Common Agency
Dynamic Common Agency Dirk Bergemann Juuso Välimäki January 2001 Abstract A general model of dynamic common agency with symmetric information is considered. The set of truthful Markov perfect equilibrium
More informationSURPLUS SHARING WITH A TWO-STAGE MECHANISM. By Todd R. Kaplan and David Wettstein 1. Ben-Gurion University of the Negev, Israel. 1.
INTERNATIONAL ECONOMIC REVIEW Vol. 41, No. 2, May 2000 SURPLUS SHARING WITH A TWO-STAGE MECHANISM By Todd R. Kaplan and David Wettstein 1 Ben-Gurion University of the Negev, Israel In this article we consider
More informationRecap Social Choice Functions Fun Game Mechanism Design. Mechanism Design. Lecture 13. Mechanism Design Lecture 13, Slide 1
Mechanism Design Lecture 13 Mechanism Design Lecture 13, Slide 1 Lecture Overview 1 Recap 2 Social Choice Functions 3 Fun Game 4 Mechanism Design Mechanism Design Lecture 13, Slide 2 Notation N is the
More informationEx Post Nash Equilibrium in Linear Bayesian Games for Decision Making in Multi-Environments
games Article Ex Post Nash Equilibrium in Linear Bayesian Games for Decision Making in Multi-Environments Abbas Edalat 1, Samira Hossein Ghorban 2, * and Ali Ghoroghi 1, 1 Department of Computing, Imperial
More informationImplementability, Walrasian Equilibria, and Efficient Matchings
Implementability, Walrasian Equilibria, and Efficient Matchings Piotr Dworczak and Anthony Lee Zhang Abstract In general screening problems, implementable allocation rules correspond exactly to Walrasian
More informationUC Berkeley Haas School of Business Game Theory (EMBA 296 & EWMBA 211) Summer Social learning and bargaining (axiomatic approach)
UC Berkeley Haas School of Business Game Theory (EMBA 296 & EWMBA 211) Summer 2015 Social learning and bargaining (axiomatic approach) Block 4 Jul 31 and Aug 1, 2015 Auction results Herd behavior and
More informationBasic Game Theory. Kate Larson. January 7, University of Waterloo. Kate Larson. What is Game Theory? Normal Form Games. Computing Equilibria
Basic Game Theory University of Waterloo January 7, 2013 Outline 1 2 3 What is game theory? The study of games! Bluffing in poker What move to make in chess How to play Rock-Scissors-Paper Also study of
More informationENDOGENOUS REPUTATION IN REPEATED GAMES
ENDOGENOUS REPUTATION IN REPEATED GAMES PRISCILLA T. Y. MAN Abstract. Reputation is often modelled by a small but positive prior probability that a player is a behavioral type in repeated games. This paper
More informationHierarchical cheap talk
Hierarchical cheap talk Attila Ambrus, Eduardo Azevedo, and Yuichiro Kamada July 15, 2009 Abstract We investigate situations in which agents can only communicate to each other through a chain of intermediators,
More informationOn Competing Mechanisms under Exclusive Competition
On Competing Mechanisms under Exclusive Competition Andrea Attar Eloisa Campioni Gwenaël Piaser May 23, 2018 Abstract We study games in which several principals design mechanisms in the presence of privately
More informationIntroduction. 1 University of Pennsylvania, Wharton Finance Department, Steinberg Hall-Dietrich Hall, 3620
May 16, 2006 Philip Bond 1 Are cheap talk and hard evidence both needed in the courtroom? Abstract: In a recent paper, Bull and Watson (2004) present a formal model of verifiability in which cheap messages
More informationWars of Attrition with Budget Constraints
Wars of Attrition with Budget Constraints Gagan Ghosh Bingchao Huangfu Heng Liu October 19, 2017 (PRELIMINARY AND INCOMPLETE: COMMENTS WELCOME) Abstract We study wars of attrition between two bidders who
More informationRECIPROCAL RELATIONSHIPS AND MECHANISM DESIGN
RECIPROCAL RELATIONSHIPS AND MECHANISM DESIGN GORKEM CELIK AND MICHAEL PETERS A. We study an incomplete information game in which players can coordinate their actions by contracting among themselves. We
More informationOrganizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan
Organizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan David Atkin, Azam Chaudhry, Shamyla Chaudry Amit K. Khandelwal and Eric Verhoogen Sept. 016 Appendix B: Theory
More informationOn the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E.
Tilburg University On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E. Publication date: 1997 Link to publication General rights Copyright and
More information9 A Class of Dynamic Games of Incomplete Information:
A Class of Dynamic Games of Incomplete Information: Signalling Games In general, a dynamic game of incomplete information is any extensive form game in which at least one player is uninformed about some
More informationRepeated Downsian Electoral Competition
Repeated Downsian Electoral Competition John Duggan Department of Political Science and Department of Economics University of Rochester Mark Fey Department of Political Science University of Rochester
More informationEC319 Economic Theory and Its Applications, Part II: Lecture 7
EC319 Economic Theory and Its Applications, Part II: Lecture 7 Leonardo Felli NAB.2.14 27 February 2014 Signalling Games Consider the following Bayesian game: Set of players: N = {N, S, }, Nature N strategy
More informationCoordination and Cheap Talk in a Battle of the Sexes with Private Information
Department of Economics Coordination and Cheap Talk in a Battle of the Sexes with Private Information Department of Economics Discussion Paper 3-0 Chirantan Ganguly Indrajit Ray Coordination and Cheap
More informationDiscussion of "Persuasion in Global Games with an Application to Stress Testing" by Nicolas Inostroza and Alessandro Pavan
Discussion of "Persuasion in Global Games with an Application to Stress Testing" by Nicolas Inostroza and Alessandro Pavan Stephen Morris IUB Stern Workshop March 2017 Basic Question Some policy ingredients:
More informationIntroduction to Game Theory
COMP323 Introduction to Computational Game Theory Introduction to Game Theory Paul G. Spirakis Department of Computer Science University of Liverpool Paul G. Spirakis (U. Liverpool) Introduction to Game
More informationMechanism Design: Bayesian Incentive Compatibility
May 30, 2013 Setup X : finite set of public alternatives X = {x 1,..., x K } Θ i : the set of possible types for player i, F i is the marginal distribution of θ i. We assume types are independently distributed.
More informationVirtual Robust Implementation and Strategic Revealed Preference
and Strategic Revealed Preference Workshop of Mathematical Economics Celebrating the 60th birthday of Aloisio Araujo IMPA Rio de Janeiro December 2006 Denitions "implementation": requires ALL equilibria
More information6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2
6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 Daron Acemoglu and Asu Ozdaglar MIT October 14, 2009 1 Introduction Outline Mixed Strategies Existence of Mixed Strategy Nash Equilibrium
More informationREPEATED GAMES. Jörgen Weibull. April 13, 2010
REPEATED GAMES Jörgen Weibull April 13, 2010 Q1: Can repetition induce cooperation? Peace and war Oligopolistic collusion Cooperation in the tragedy of the commons Q2: Can a game be repeated? Game protocols
More informationEquilibria for games with asymmetric information: from guesswork to systematic evaluation
Equilibria for games with asymmetric information: from guesswork to systematic evaluation Achilleas Anastasopoulos anastas@umich.edu EECS Department University of Michigan February 11, 2016 Joint work
More informationTheory of Auctions. Carlos Hurtado. Jun 23th, Department of Economics University of Illinois at Urbana-Champaign
Theory of Auctions Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Jun 23th, 2015 C. Hurtado (UIUC - Economics) Game Theory On the Agenda 1 Formalizing
More informationPersuading a Pessimist
Persuading a Pessimist Afshin Nikzad PRELIMINARY DRAFT Abstract While in practice most persuasion mechanisms have a simple structure, optimal signals in the Bayesian persuasion framework may not be so.
More informationConsistent Beliefs in Extensive Form Games
Games 2010, 1, 415-421; doi:10.3390/g1040415 OPEN ACCESS games ISSN 2073-4336 www.mdpi.com/journal/games Article Consistent Beliefs in Extensive Form Games Paulo Barelli 1,2 1 Department of Economics,
More informationMechanism Design. Christoph Schottmüller / 27
Mechanism Design Christoph Schottmüller 2015-02-25 1 / 27 Outline 1 Bayesian implementation and revelation principle 2 Expected externality mechanism 3 Review questions and exercises 2 / 27 Bayesian implementation
More informationVolume 29, Issue 3. Strategic delegation and market competitiveness
Volume 29, Issue Strategic delegation and market competitiveness Caterina Colombo Università di Ferrara Alessandra Chirco Università del Salento Marcella Scrimitore Università del Salento Abstract Within
More informationMediators in Position Auctions
Mediators in Position Auctions Itai Ashlagi a,, Dov Monderer b,, Moshe Tennenholtz b,c a Harvard Business School, Harvard University, 02163, USA b Faculty of Industrial Engineering and Haifa, 32000, Israel
More informationMS&E 246: Lecture 12 Static games of incomplete information. Ramesh Johari
MS&E 246: Lecture 12 Static games of incomplete information Ramesh Johari Incomplete information Complete information means the entire structure of the game is common knowledge Incomplete information means
More informationEquilibria in Games with Weak Payoff Externalities
NUPRI Working Paper 2016-03 Equilibria in Games with Weak Payoff Externalities Takuya Iimura, Toshimasa Maruta, and Takahiro Watanabe October, 2016 Nihon University Population Research Institute http://www.nihon-u.ac.jp/research/institute/population/nupri/en/publications.html
More informationGame Theory. Strategic Form Games with Incomplete Information. Levent Koçkesen. Koç University. Levent Koçkesen (Koç University) Bayesian Games 1 / 15
page.1 Game Theory Strategic Form Games with Incomplete Information Levent Koçkesen Koç University Levent Koçkesen (Koç University) Bayesian Games 1 / 15 page. Games with Incomplete Information Some players
More informationEpsilon Ex Post Implementation
Epsilon Ex Post Implementation Mehmet Barlo Nuh Aygun Dalkiran February 10, 2014 Abstract We provide necessary and sufficient conditions for epsilon ex post implementation. Our analysis extends Bergemann
More informationCloud Service under the Presence of Privacy Concern
Appl. Math. Inf. Sci. 8, No. 5, 557-563 014 557 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.1785/amis/080554 Cloud Service under the Presence of Privacy Concern
More information6.207/14.15: Networks Lecture 11: Introduction to Game Theory 3
6.207/14.15: Networks Lecture 11: Introduction to Game Theory 3 Daron Acemoglu and Asu Ozdaglar MIT October 19, 2009 1 Introduction Outline Existence of Nash Equilibrium in Infinite Games Extensive Form
More informationThema Working Paper n Université de Cergy Pontoise, France. Hölder Continuous Implementation. Oury Marion
Thema Working Paper n 2010-06 Université de Cergy Pontoise, France Hölder Continuous Implementation Oury Marion November, 2010 Hölder Continuous Implementation Marion Oury November 2010 Abstract Building
More informationLecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about
0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 7 02 December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about Two-Player zero-sum games (min-max theorem) Mixed
More informationThe Folk Theorem for Finitely Repeated Games with Mixed Strategies
The Folk Theorem for Finitely Repeated Games with Mixed Strategies Olivier Gossner February 1994 Revised Version Abstract This paper proves a Folk Theorem for finitely repeated games with mixed strategies.
More informationA remark on discontinuous games with asymmetric information and ambiguity
Econ Theory Bull DOI 10.1007/s40505-016-0100-5 RESEARCH ARTICLE A remark on discontinuous games with asymmetric information and ambiguity Wei He 1 Nicholas C. Yannelis 1 Received: 7 February 2016 / Accepted:
More informationEquilibrium Refinements
Equilibrium Refinements Mihai Manea MIT Sequential Equilibrium In many games information is imperfect and the only subgame is the original game... subgame perfect equilibrium = Nash equilibrium Play starting
More informationRobust Mechanism Design and Robust Implementation
Robust Mechanism Design and Robust Implementation joint work with Stephen Morris August 2009 Barcelona Introduction mechanism design and implementation literatures are theoretical successes mechanisms
More information