A Folk Theorem for Contract Games with Multiple Principals and Agents

Size: px
Start display at page:

Download "A Folk Theorem for Contract Games with Multiple Principals and Agents"

Transcription

1 A Folk Theorem for Contract Games with Multiple Principals and Agents Siyang Xiong March 27, 2013 Abstract We fully characterize the set of deteristic equilibrium allocations in a competing contract game with multiple principals and agents. Compared to similar folk theorems in the literature, our main theorem relaxes an indispensable assumption on equilibrium existence in Yamashita [8], and does not require a particular communication protocol as required in Peters and Troncoso-Valverde [6]. I thank Eddie Dekel, Songying Fang, Mike Peters, Balázs Szentes, Stephen Wolff, Takuro Yamashita and anonymous referees for helpful comments. I thank the National Science Foundation (grant SES ) for financial support. All remaining errors are my own. Department of Economics, Rice University, xiong@rice.edu 1

2 1 Introduction In the presence of asymmetric information, economic players may write contracts to elicit other players information, in order to make optimal decisions. Most of the large literature on contract theory focuses on the classical principal-agent (i.e., one principal and one or multiple agents) model and the common-agency (i.e., one agent and multiple principals) model. 1 However, both multiple principals and multiple agents are usually involved in many economic situations. For example, there are many competing insurance companies that offer different policies, and there are many consumers trying to find the best insurance plans. To understand such situations, we study a two-stage multi-principal-multi-agent game in this paper. In this contract game, the payoffs of the players 2 depend on both the states and the actions. States are privately observed by the agents, while actions are chosen by the principals. In stage 1, the principals offer contracts, which specify their committed actions contingent on the messages reported by the agents. In stage 2, the agents report messages and the contracts are executed. Our objective is to fully characterize the set of deteristic equilibrium allocations 3 in this contract game. Our main result (Theorem 1) says that the equilibrium allocations are fully characterized by two incentive compatibility (IC) conditions for the agents and the principals. truthful reporting by the agents forms a Bayes Nash equilibrium (I) agents: ; in the direct mechanisms defined by the allocation (II) principals: every principal is endowed with a -max- value (as defined in (5)); under the allocation, every principal achieves utility larger than the -max- value. Condition (I) must hold in every equilibrium; the intuition is the same as the revelation principle in the classical principal-agent model. However, the revelation principle 1 See Bolton and Dewatripont [1] and Martimort [4] for surveys on the principal-agent model and the comon-agency model, respectively. 2 Throughout the paper, we use she and he to refer to a principal and an agent, respectively. We use players to refer to both principals and agents. 3 We discuss stochastic equilibrium allocations in Section

3 ignores IC for the principals, so we need condition (II). The -max- value in condition (II) has the same role as the -max value in a usual 2-player normal-form game given other principals and agents strategies, principal j can always find a contract that guarantees her -max- value. As a result, in any equilibrium, all principals must achieve utility larger than the -max- values, i.e., condition (II) must hold in every equilibrium. Conversely, for any allocation satisfying conditions (I) and (II), we construct an equilibrium to implement the allocation. Specifically, for any principal k, principals k can find punishing contracts c k k under which principal k achieves utility less than her max- value. 4 Then, the intuition of the equilibrium construction is clear: in stage 1, each principal offers a set of contracts, which includes the equilibrium-allocation contract and the punishing contracts; in stage 2, the agents choose the equilibrium-allocation contract on the equilibrium path and they choose the punishing contracts c k k whenever principal k deviates from the equilibrium path. Yamashita [8] s theorem shares a similar intuition. However, his proof requires the agents play pure strategies in the subgames in stage 2, which poses a technical problem a pure-strategy equilibrium does not exist in many games. To eliate this problem, Yamashita assumes the equilibrium existence for all the possible subgames in stage 2. Equivalently, any contracts that induce no pure-strategy Nash equilibrium in stage 2 are automatically excluded from the principals choice sets in stage 1. This limits the scope of Yamashita s theorem, as illustrated by Example 1 in Section 2. In this example, market information is observed only by two agents who have diametrically opposed preferences. Thus, any contract offered by the principal defines a zero-sum game for the agents. Since pure-strategy Nash equilibria exist only in degenerate zero-sum games, no valid contract can extract the market information. As a result, the unique equilibrium allocation is inefficient. In this paper, we allow for mixed strategies in stage 2. Under some usual technical conditions (i.e., compact message spaces and continuous contracts), a mixed-strategy Nash equilibrium always exists in stage 2 (Glicksberg s Theorem, see [2]). Hence, we do not need the equilibrium existence assumption in [8]. Equivalently, we do not place any restrictions on the set of contracts offered by the principals in stage 1. As a result, our 4 We adopt the standard notation of letting k denote all members of a group other than individual k. 3

4 folk theorem expands the scope of Yamashita s theorem. For instance, if we allow for mixed-strategy equilibria in Example 1, the principals can find a contract to elicit market information. Consequently, an efficient equilibrium allocation exists. It is worth noting that each principal in our contract game is allowed to offer only a single contract, while we let each principal offer a set of contracts, as suggested by the equilibrium construction above. One methodological contribution of this paper is to introduce a way to embed such a set of contracts into one single valid contract. One caveat of our equilibrium characterization is that it is complicated, because the -max- values are hard to compute. Peters and Troncoso-Valverde [6] provide a much simpler characterization, but they require a particular complicated protocol for communication among the players. 5 We discuss these issues in Sections 5.4 and 5.5. The remainder of the paper is organized as follows. An illustrating example is provided in Section 2. The model is defined in Section 3. We present the main result in Section 4. Section 5 concludes with discussions. Technical proofs can be found in Appendix A. 2 Pure-strategy implementation versus mixed-strategy implementation: an example We use the following simple example to illustrate the major difference between our setup and that in Yamashita [8]: mixed strategies are allowed in our setup, while only pure strategies are valid in [8]. Example 1 There are two agents i 1,i 2, and one principal j. 6 The state is θ 0, 1 Θ, which is uniformly distributed. Suppose i 1 and i 2 observe θ, but j does not. Principal j has to choose an action a 1, 0, 1 A. The players are expected-utility maximizers, with Bernoulli utility 5 The complicated communication protocol is rarely observed in most economic situations. In such cases, our folk theorem applies. 6 For simplicity, we consider only two agents and one principal. The example remains valid if we add additional payoff-irrelevant agents and principals (i.e., these agents do not observe the states, these principals do not take payoff-relevant actions, and their payoffs are always constant). 4

5 functions defined as follows: u j a, θ 0, if a 0; 2, if a 1 θ; 3, if a 1 and θ 0; u i1 a, θ a; u i2 a, θ a. Following Yamashita [8], a valid contract for principal j is a function c j : M i1 M i2 A, where M i1 and M i2 are some exogenously given message spaces for i 1 and i 2, respectively. Upon receiving the contract, the agents send their messages and then the contract is executed. Pure-strategy implementation As in [8], the agents are required to play pure strategies, and we assume the existence of pure-strategy equilibria in the subgames defined by all the valid contracts of the principal. Equivalently, any contract that induces no pure-strategy Nash equilibria in stage 2 is not available to j. For every a A, let z a denote the constant allocation, in which a is taken at both states by principal j. It is easy to draw the following observations. (1) Only constant allocations can be implemented by pure-strategy equilibria. 7 (2) Principal j strictly prefers z a0 to z a1 or z a1. By 1 and 2, z a0 is the unique equilibrium allocation, under which the players achieve a payoff of 0. We show below that z a0 is not ex-ante pareto efficient. 7 Suppose otherwise. I.e., a at θ 0 and a a at θ 1 is implemented by some contract c j and some pure-strategy Nash equilibrium m 1, m 2 at θ 0 and m1, 2 m at θ 1. Suppose cj m 1, m2 a. Without loss of generality, suppose a i1 a and a i2 a. By the IC of i 2 at state θ 0, we have a i2 a. Hence, we have a i2 a i2 a. Furthermore, by the IC of i 1 at state θ 1, we have a i1 a, which implies a i2 a, contradicting a i2 a i2 a. 5

6 Mixed-strategy implementation Consider the contract ζ j for principal j defined as follows: 8 Suppose we allow the agents to play mixed strategies. ζ j : m 2 m 2 m 2 m 1 a 0 a 1 a 1 m 1 a 0 a 1 a 1 The following strategy profile of the agents forms a mixed-strategy Nash equilibrium in the game defined by ζ j. agent i 1 : at both states, report m 1 and m 1 with equal probability (i.e., 1 2 ); agent i 2 : at state θ 0, report m 2 with probability 1 at state θ 1, report m 2 and m 2 with equal probability (i.e., 1 2 ). Under this equilibrium, the agents fully reveal the true states, and principal j achieves the maximal ex-ante payoff , while both agents get an ex-ante payoff of 0. Therefore, this equilibrium allocation is pareto efficient, and it pareto doates z a0. 3 Setup 3.1 The contract game There are two sets of players: the principals 1,..., J and the agents 1,..., I. Each agent i privately observes his type θ i Θ i, and each principal j has to take an action y j j. Let Θ Θ i and j. The Bernoulli utility functions for i j principal j and agent i are denoted by v j : Θ R and u i : Θ R, respectively. We assume 1, 2, Θ,,, and θ Θ is distributed according to a common prior p Θ. Let ji denote the set of messages that agent i can send to principal j. Throughout this paper, we assume ji j i 0, 1 R for every j, i. 8 The contract ζ j is not valid for prinicipal j in [8], because no pure-strategy Nash equilibrium exists in the game defined by ζ j. 6

7 A strategy of each principal j is a valid contract, i.e., a continuous function c j : ji Y j. 9 Let j denote j s strategy set and j. A strategy of i j each agent i is a (type, contract)-contingent signalling scheme, i.e., a function S i : Θ i ji. 10 Let i denote i s strategy set and i. That is, in this j i contract game, the principals first choose contracts c c j in stage 1. Upon j observing c and θ i, each agent i sends (possibly stochastic) messages to the principals in stage 2, and then the contracts are implemented. I.e., this is a 2-stage dynamic game. Each c chosen by the principals in stage 1 defines a subgame for the agents in stage 2. In every such subgame, each agent i chooses a behavior strategy s i : Θ i ji in j the set sub i Θi ji. Define sub i sub. j i We use S i and s i to denote generic elements in i and i sub, respectively. Given c, we use S i c i sub to denote the behavior strategy induced by S i and c, i.e., S i cθ i S i θ i, c. Let φ s, θ ji denote the independent 11 distribution over message j, i profiles induced by any s, θ sub Θ, i.e., φ s, θ E i i i s i θ i E i, measurable E i i ji. i j Let ψ c, m denote the independent distribution over action profiles induced by 9 We require the codomain of c j be Y j rather than Yj, so that c j can be made continuous and Glicksberg s Theorem can be applied later. 10 We implicitly embed mixed strategies of the agents into our model, i.e., a pure strategy for agent i is a function from Θ i to j ji, and a mixed strategy is a function from Θ i to 11 Given each θ Θ, every agent i takes his strategies s i θ i the distribution φ s, θ induced by s, θ is a distribution over i i I. ji. j ji independently. As a result, j ji which is independent across j 7

8 cj any c, m j, mji j, i ji, i.e., j, i yj mji yj ψ c, m j c j i, yj j j. Given c, s, θ, Γ c, s, θ, y defined below calculates the probability that the action profile y is taken by the principals: Γ c, s, θ, y m j, i ji ψ c, my d φ s, θ. Define V j : sub R and U i : sub Θ i R as follows, where, given c, s, V j c, s and U i c, s, θ i denote the expected payoffs of principal j and agent i who observes θ i, respectively: U i c, s, θ i V j c, s θθ θ i Θ i v j y, θ Γ c, s, θ, y y v j y, θ i, θ i Γ c, s, θ i, θ i, y y p θ ; p θ i, θ i p θ i, θ. i θ i Θ i In the subgame defined by any c, the continuity of c j and the compactness of ji ensure that a (mixed-strategy) Nash equilibrium (NE) always exists by j j Glicksberg s Theorem (see [2]). Let c sub denote the set of Nash equilibria in the subgame defined by c, i.e., c s sub : U i c, s i, s i, θ i U i c, s i, s i, θ i, i, θ, s Θ sub. Hence, c for any c. Throughout the paper, for every c, fix some e c e i c i c sub. (1) We adopt the solution concept of subgame perfect Nash equilibrium (SPNE) 12 for this 2-stage contract game. Specifically, it is defined as follows. 12 Throughout the paper, we use SPNE and NE to represent the equilibrium in the 2-stage contract game and the subgame in stage 2, respectively. 8

9 cj Definition 1 c, S j, S i i is a SPNE if V j cj, c j, S c j, c j Vj c j, c j, S c j, c j, j, c, (2) and S i c i c, c. 3.2 Transformation of a mixed strategy through a homeomorphism Let A and B denote two subsets of the message spaces such that A is homeomorphic to B. Fix any homeomorphism ξ : A B. In our proofs below, we need to transform a mixed strategy in A (i.e., α A) to a mixed strategy in B (i.e., β B) via the homeomorphism ξ. Specifically, for any α A, define ξ α Bas follows: ξ α E α a A : ξ a E, measurable E B. That is, ξ renames the elements in A to the homeomorphic elements in B, and ξ α is just α, respecting this renag. 4 Main result 4.1 Equilibrium allocations A (deteristic) allocation is a function z : Θ ; let z j : Θ j denote the jth projection of z. As in [8], we say z is incentive compatible iff zj u i θ i, θ i j, θ i, θ i p θ i, θ i (3) θ i Θ i θ i Θ i u i zj θji, θ i j, θ i, θ i We say an allocation z is induced by c, s sub iff Note that if z is induced by c, s, then p θ i, θ i, i, θ i, θ ji Θ j i Θ i. z θ y Γ c, s, θ, y 1, θ, y Θ Y. V j c, s v j z θ, θ p θ, j. (4) θθ 9

10 Let Z IC denote the set of incentive compatible allocations. Let Z denote the set of allocations induced by SPNEs. 13 It is easy to show Z Z IC. 14 Define v j inf c j j sup c j j sc V j note that v j is well-defined by Lemma 3 in Appendix A.1. However, c j j j : sup c j j c j j sc V j sup c j j cj, c j, s, j ; (5) cj, c j, s may or may not exist. Define sc V j cj, c j, s is well-defined. The following is our main result. Theorem 1 Z z Z IC : v j z θ, θ p θ v j for every j ; θθ v j z θ, θ p θ v j for every j /. θθ Consider the following thought experiment: We ask each agent i to report his type θ i, and require the principals carry out their actions according to z θ i i, i.e., j takes the action z j θ. Theorem 1 says that we can implement z by a SPNE in the contract game defined in Section 3.1 iff in the thought experiment, no agent finds it profitable to deviate from the truthful report and every principal j achieves at least an expected payoff of v j. 15 The only if (i.e., ) direction of the proof of Theorem 1, which is similar to that in Yamashita [8], can be found in Appendix A.2. We focus on the if (i.e., ) direction in Section I.e., Z allocation z : there exists a SPNE c, S such that z is induced by c, S c. 14 The intuition is just the revelation principle. See also the proof of Lemma 1 in Yamashita [8, p ]. 15 Different from [8], no principal in can achieve the payoff v j in any SPNE, due to the technical difficulty associated with the infinite-message mechanisms that we consider. 10

11 4.2 The proof of Theorem 1: the if direction Throughout this subsection, we fix any z Z IC such that v j z θ, θ p θ v j for θθ every j and v j z θ, θ p θ v j for every j /. We will construct a SPNE θθ c, S such that z is induced by c, S c. The following two lemmas will be used later, and their proofs can be found in Appendix A.3 and A.4. Lemma 1 There exists c, s sub such that s c and z is induced by c, s. Lemma 2 For any k, there exists c k k c k j find s c k, c k k c k, c k k satisfying jk k such that for any c k k, we can V k c k, c k k c, s k, c k k v k z θ, θ p θ. (6) θθ Lemma 1 says that z is induced by c, s and s is a NE in the subgame defined by c. Lemma 2 says that for any principal k, principals k have the punishing contracts c k k and the agents have the punishing NE s c k, c k k to deter principal k from deviating from the allocation z. It is worth noting that the principals punishing contracts c k k does not depend on the deviating strategy (i.e., c k c k ) chosen by principal k, while the agents punishing NE s c k, c k k does A sketch of the proof This contract game has two stages. In stage 1, the principals choose c, and in stage 2, the agents choose s. Ignoring the IC of the principals, Lemma 1 says that z can be implemented by c, s, and the IC of the agents is satisfied, i.e., s c. To ensure the IC of the principals, we modify the rules of the game, hypothetically. Suppose there is an extra stage between the two stages, which we call stage 1.5. In stage 1.5, every principal j observes all the contracts chosen in stage 1, and then she revises 11

12 her contract according to the following protocol 16 : revise to c k j if principal k j is the unique principal who deviates from the strategy profile c defined in Lemma 1; do not revise otherwise. Lastly, based on the final contracts offered in stage 1.5, the agents choose s in stage 2. Given the extra stage and the described protocol, the following strategy profile forms a SPNE which implements z. A) Equilibrium Path: in stage 1, the principals offer c; in stage 1.5, no revision occurs; in stage 2, the agents choose s; B) Off-Equilibrium Path - case i): in stage 1, the principals offer c k, c k c; in stage 1.5, principals k revise their contracts to c k k and principal k does not revise her contract; in stage 2, the agents choose s c k, c k k ; C) Off-Equilibrium Path - other cases: in stage 1, the principals offer c c and two or more principals deviate from c; in stage 1.5, no revision occurs; in stage 2, the agents choose e c c fixed in (1). Lemma 1 implies that z is implemented on the equilibrium path. Furthermore, the IC of the principals is satisfied: if principal k deviates unilaterally from c in stage 1, principals k would choose the punishing contracts c k k in stage 1.5 and the agents would play the punishing NE s c k, c k k in stage 2. By (6) in Lemma 2, principal k does not find it profitable to deviate from the equilibrium path in stage 1. The problem for the scheme above is that stage 1.5 does not exist in our original contract game. In particular, the principals cannot observe who deviates in stage 1, even though they have the punishing contracts to deter deviation. Instead, it is the agents (in stage 2) who can observe the deviating principal. Furthermore, in stage 2, even if the agents inform the principals about the deviating one in stage 1, the principals do not have a chance to revise their contracts after stage 1. Hence, it should be the agents that revise the contracts for the principals in stage 2. To achieve this without stage 1.5, roughly, in stage 1 on the equilibrium path, we let each principal j offer a set of contracts including c j and c k j for every k j 16 In stage 1.5, the principals follow the protocol mechanically, i.e., they do not behave strategically. 12

13 and delegate the choice of contracts to the agents in stage 2: on the equilibrium path in which no principal deviates, the agents choose c j for the principals and play s to j implement z ; on the off-equilibrium path in which principal k deviates unilaterally to c k, the agents choose c k k c for principals k and play s k, c k k to punish principal k. Still, we are facing one problem. The set of contracts described above is not a valid contract in the contract game defined in Section 3.1. We embed the set of contracts into one single valid contract in the next subsection The embedding and the extension To define each c j : ji j, we first break each ji into several parts, and i then define c j on these parts separately. For any E ji, we use c j E to denote c j i with the restricted domain E. 17 Fix any a 0, a 1,..., a 2, a 2 1 such that i 0 a 0 a 1... a 2 a Recall ji 0, 1. Define k k ji a 2k, a 2k1 for every j, i and every k 0, 1, 2,...,. That is, we fix 1 disjoint closed intervals in, and the agents use messages in these disjoint intervals to tell the principals about who deviates from the equilibrium path in stage 1: m ji 0 ji means no one deviates in stage 1, and m ji k ji (with k 0) means principal k deviates in stage 1. For every k 0, 1, 2,...,, k is homeomorphic to ; let h k : k be a homeomorphism. We use h k 1 to denote the inverse function of h k. Furthermore, let ID k : k k be the identity function, i.e., ID k m m for every m k. Since k is closed, by the Tietze Extension Theorem (see [5, p.219]), there exists a continuous function g k : k such that g k m ID k m m for every m k. That is, g k, while preserving the definition of ID k on k, extends the domain continuously to. We describe the embedding in three cases. 17 I.e., c j E : E j satisfies c j E m c j m, m E. 13

14 A) The equilibrium path: the principals offer c in stage 1. Recall s c in Lemma 1, i.e., for every i, θ Θ, we have U i c, s i, s i, θ i U i c, s i, s i, θ i, s i For every j, define c j 0 : ji i i c mji j c i j h 0 m ji i 0 ji j as follows: Θi ji. (7) j, m ji i 0 ji. i I.e., on the equilibrium path, the agents reports messages in 0 ji. Upon receiving the messages, the principals translate them to messages in ji via the homeomorphism h 0, and then implement c. follows: For every i, consider the homeomorphism H 0 : ji 0 ji defined as j j H 0 mji j For every θ i Θ i, note that s i θ i h 0 1 mji, m ji j j j ji and H 0 s i θ i j ji. 0 ji j. That is, each agent i encodes the messages via h 0 1 and transforms the strategy si to H 0 s i, while each principal j decodes messages via h 0 and transforms the strategy H 0 s i back to s i before executing the contract c j. As implied by (7), for every i, θ Θ, we have Θi U i c, H 0 s i, H 0 s i, θ i U i c, si, H0 s i, θ i, si ji 0. (8) j On the equilibrium path, if we hypothetically require agents report messages in 0 ji,(8) would imply that H 0 s is a NE in the subgame defined by c. However, agent i may deviate to report messages outside 0 ji. To make H0 s remain a NE without the hypothetical requirement, we need to extend c j 0 to c ji j as follows: ji 0 i j, i i mji c j i ji 0 j, i i m ji, m j, i i c j 0 ji i ji 0 j, i g 0 m ji, i I.e., any unilateral deviation to a message outside 0 ji is first translated to a message inside 0 ji via g0. As implied by (8), H 0 s remains a NE in the subgame defined by c j. 14.

15 B) The off-equilibrium path with unilateral deviation In stage 1, suppose principal k offers c k c k and principals k offer c k. By Lemma 2, s s c k, c k k c k, c k k, i.e., for every i, θ Θ, we have U i c k, c k k, s i, s i, θ i U i c k, c k k, si, s i, θ i, si For every j k, define c j i c mji j c k j i k ji : k ji j as follows: i h k m ji i, m ji i k ji. i Θi ji. (9) j I.e., the agents reports messages in k ji, and principals k translate them to messages in ji via h k before implementing c k k. For every i, consider the homeomorphism H k : ji j ki k ji jk defined as follows: H k m ki, mji m ki, jk For every θ i Θ i, note that s i θ i h k 1 mji jk, m ki, mji jk ji and H k s i θ i j ki k ji. jk ki k ji jk That is, each agent i encodes the messages to principals k via h k 1 and transforms the strategy s i to H k s i, while principals k decode messages via h k and transform the strategy H k s i back to s i before executing the contract c k k. As implied by (9), for every i, θ Θ, we have ck U i, c k, H k s i, H k s i, θ i s i ck U i, c k, s i, H k s i, θ i, (10) Θi ki ji k. jk If we hypothetically require agents report messages in k ji to each principal j k, (10) would imply that H k s is a NE in the subgame defined by c k, c k. However, agent i may deviate to report messages outside k ji. To make Hk s remain a NE without the hypothetical requirement, we need to extend c j k to c ji j i c j i mji c ji k i j j, i i m ji, m j, i i 15 k ji ji k j, i i as follows: ji k j, i g k m ji i.,.

16 I.e., any unilateral deviation to a message outside k ji is first translated to a message inside k ji via gk. As implied by (10), H k s remains a NE in the subgame defined by ck, c k. C) The other off-equilibrium paths In the above, we have defined each c j on the restricted domain ji k j, i. Since the restricted domain is closed and c j is kj i continuous on it, by the Tietze Extension Theorem, there exists a continuous function c j : ji j such that i c j m c j m kj which completes the definition of c j. kj i i m, ji k j, i ji k j, i, The definition of S Finally, we define S as follows: S c H 0 s; S c k, c k H k s c k, c k k, k, c k k c k ; where e c c is fixed for every c in (1). S c e c otherwise; This completes the definition of c, S. Clearly, c, S is a SPNE as argued above, and z is induced by c, S c. 5 Discussions We conclude the paper with several discussions. 16

17 5.1 Finite messages versus infinite messages Unlike Yamashita [8], we have to consider infinite-message spaces. In our proof of the if direction of Theorem 1, a message m ji sent from agent i to principal j plays two roles: i) it recommends a contract c j for principal j, and ii) it reports i s message when c j is adopted. That is, we have to establish a surjective function from the message set M ji to L M ji, where L denotes the set of potential contracts recommended by i. Clearly, such a surjective function exists only if M ji is an infinite set. Nevertheless, it is without loss of generality to focus on infinite-message mechanisms. Let Q j denote the set of all finite-message mechanisms for principal j, i.e., j q j : W ji ii j Wji, j, i. Although j j, every element in j can be represented by some element in j : For any allocation z that is induced by some q Π jj j and s q, there exist c Π jj j and s c such that z is induced by c and s. 18 Thus, any allocation, which is implementable via finite-message mechanisms, can be implemented via infinite-message mechanisms. 5.2 Stochastic equilibrium allocations For notational ease, we focus on deteristic equilibrium allocations throughout the paper. With some modification, our result also applies to stochastic equilibrium allocations. A stochastic allocation is a function β : Θ. We say a stochastic allocation β is independent if β θ is an independent distribution over Y for every θ; otherwise, we say that β is correlated. Recall that we use a direct mechanism on the equilibrium path to implement a potential equilibrium allocation. However, an implicit assumption of our model is that the principals take actions independently for each profile of messages received. Consequently, a stochastic allocation can be implemented on the equilibrium path if and only if it is independent. Hence, Theorem 1 remains true for independent stochastic equilibrium allocations. 18 The proof is similar to the proof of Lemma 1 and is omitted. 17

18 For correlated stochastic equilibrium allocations, our characterization is true if we endow the principals with the correlation-generating device used in Kalai, Kalai, Lehrer and Samet [3] and Peters and Troncoso-Valverde [6], so that, for each profile of message received, the principals are induced by the correlation device to take correlated actions. 5.3 Szentes critique Following the setup of Yamashita [8], Szentes [7] constructs a complete-information example, in which a principal cannot even achieve her -max utility. The problem, according to [7], is that the principals delegate their actions to the agents in [8]. Szentes then modifies Yamashita s model to a no-delegation model, and proves a folk theorem under the complete-information setup. 19 In Yamashita s setup, the principals are restricted to choose deteristic contracts. If we allow for random contracts, every principal in Szentes example is able to achieve her -max value. Hence, our model, which allows for random contracts, is immune to the critique raised by Szentes [7]. 5.4 A caveat and a re-interpretation A caveat of our theorem is that v j defined in (5) is difficult to compute, which seems to make Theorem 1 hard to use. However, the following result shows that we can apply Theorem 1 without knowing v j. Theorem 2 For any z Z, we have z Z IC : v j z θ, θ p θ v j z θ, θ p θ, j θθ θθ Z. Theorem 2 says that any IC allocation, which doates another SPNE allocation regarding the principals payoffs, can be implemented by a SPNE. Though Theorem 2 is immediately implied by Theorem 1, the arguments in Section 4.2 provide a constructive 19 It remains an open question to extend Szentes folk theorem to incomplete-information setups. 18

19 way to prove Theorem 2 directly. Suppose z Z is implemented by a SPNE c, S. Then, c k can be used as punishing contracts for principals k to deter principal k from deviating from the equilibrium path for z, i.e., v k z θ, θ p θ v k z θ, θ p θ V k c, S c V k c k, c k, S c k, c k, c k k, θθ θθ where the last inequality follows from the fact that c, S is a SPNE. Therefore, with c k k replaced by c k, the argument in Section 4.2 proves Theorem 2. We use the following example to illustrate the idea. Example 2 (A Public Good Project) Multiple principals decide whether to participate in a publicgood project and how much to invest if they participate. The project can be completed if and only if every principal participates. Furthermore, multiple agents privately observe the states which deteres the payoffs of the project to all the players. Clearly, it is a SPNE that no principal participates, and all players get 0 in this equilibrium. Furthermore, by Theorem 2, any IC allocation, in which the principals gets non-negative payoffs, can be implemented by a SPNE Comparison to Peters and Troncoso-Valverde [6] We differ from Yamashita [8] only on the strategy spaces: we allow for mixed strategies, but [8] does not. We differ from Peters and Troncoso-Valverde[6] on three respects. First, as in Yamashita [8], we follow the classical setup in contract theory, in which imal communication is required: the principals first offer the contracts, i.e., functions from (exogenously given) message spaces to action spaces; the agents then send their messages, and the contracts are executed. However, Peters and Troncoso-Valverde [6] requires a particular procedure of two-stage communication among all players. Due to this difference, our equilibrium characterization is more complicated than that in [6]. Hence, an alternative way to interpret [6] is that it finds a communication protocol which induces a simple and elegant characterization of equilibrium allocations. 20 To implement such an allocation, the principals use the direct mechanism on the equilibrium path; if any principal unilaterally deviates, the agents recommed non-participation for the other principals. 19

20 Second, we adopt the solution concept of SPNE, while Bayesian Nash equilibrium is adopted in [6]. That is, different from [6], we require the agents equilibrium strategy profile remains a continuation equilibrium in the subgame defined by any contract profile offered by the principals. 21 Due to this difference, we define v j as a -max- value, while [6] defines v j as a -max value, where the extra takes care of all potential equilibria in subgames. Finally, in Peters and Troncoso-Valverde [6], every player is both a principal and an agent. Through the two-stage communication procedure, all players observe anyone who deviates from the equilibrium path, and they can revise their equilibrium contracts to punishing contracts so as to punish the deviator. However, in Yamashita [8] and this paper, though the principals are endowed with punishing contracts, they have to offer their contracts before observing the deviating principal, and they cannot revise their contracts later. Furthermore, the agents, who observe the deviating principal, are not endowed with punishing contracts. Hence, it is the agents who tell the principals how to revise their equilibrium contracts to punishing contracts. Thus, different from [6], we overcome a conceptual and technical obstacle: the transmission of information regarding the deviating principal from the agents (who observe the deviator but are not endowed with punishing contracts ) to the principals (who do not observe the deviator but are endowed with punishing contracts ). A Appendix A.1 Lemma 3 Lemma 3 V j c, s is well defined for every j, c. sc Proof. Fix any j, c. Suppose inf V j c, s α. Then, for any positive integer n, there exists s n csuch that V j c, s n α sc n 1. Since sub is compact, s n has a convergent subsequence. With abuse of notation, let s n denote this convergent subsequence, i.e., s n s for some s sub. 21 See more discussion in Troncoso-Valverde [6, Section 7]. 20

21 Θi Note that ji is endowed with weak topology and i sub ji j j is endowed with product topology. Furthermore, for any j, i, θ i, both V j c, s and U i c, s, θ i are continuous on S sub. 22 Consequently, the NE is upper hemi-continuous, i.e., s n c for all n and s n s imply s c. Hence, V j c, s inf sc V j c, s α. (11) Furthermore, V j c, s n α n 1 for all n and sn s imply V j c, s lim V j c, s n lim α 1 α. (12) n n n (11) and (12) imply V j c, s α inf V j c, s. Finally, s cimplies that V j c, s sc sc is well defined. A.2 Proof of Theorem 1: the only if direction Fix any allocation z Z, i.e., there exists a SPNE c, S such that z is induced by c, S c. For notational ease, let s denote S c. Hence, by (4), we have We now show V j c, s v j z θ, θ p θ, j. θθ v j z θ, θ p θ v j if j ; θθ v j z θ, θ p θ v j if j /. θθ Suppose otherwise. I.e., there are two cases: 1) there exists j such that v j z θ, θ θθ p θ v j ; 2) there exists j such that v j z θ, θ p θ v j. θθ In case 1), V j c, s v j z θ, θ p θ θθ v j inf c j j sup c j j sc V j cj, c j, s sup c j j sc j,c j V j cj, c j, s. 22 This is immediately implied by the definition of weak topology and the fact that c is continuous. 21

22 In case 2), V j c, s v j z θ, θ p θ θθ v j inf c j j sup c j j sc V j cj, c j, s sup where the last inequality follows from j /, i.e., arg c j j does not exist. Therefore, in both cases, we have V j c, s sup c j j which implies that there exists c j j s.t. V j c, s sc j,c j V j s c j,c j V j c j, c j, S c j j sc j,c j V j sup c j j cj, c j, s, V j c j, c j, s c j, c j. I.e., V j c j, c j, S c j, c j V j c j, c j, S c j, c j, contradicting the fact that c, S is an equilibrium (i.e., (2)). sc V j cj, c j, s, cj, c j, s A.3 Proof of Lemma 1 Lemma 1 There exists c, s sub such that s c and z is induced by c, s. Proof. Recall z Z IC. Suppose every principal j offers the direct mechanism z j (where z z j ). Since j z is incentive compatible (see (3)), truthful reporting by the agents is a NE and z is implemented. That is, (3) is equivalent to zj u i θ i, θ i j, θ i, θ i p θ i, θ i (13) θ i Θ i zj u i θji, θ i θ ji j Θ i j, θ i, θ i p θ i, θ i dρ, ρ Θ i. θ i Θ i 22

23 However, z j is not a valid contract, i.e., it is not a continuous function from ji i to j. We thus need to transform every z j to a valid contract. First, based on z j : Θ i j, consider the continuous function Γ z j i j defined as follows: : Θ i i Γ z j µi i yj θ θ Θ: z j θ i y j µ i i Θ i, y j j. i µ i θ i, That is, under the direct mechanism z j, the agents report deteristic types, while Γ z j is the stochastic direct mechanism induced by z j, in which the agents report stochastic types. Clearly, truthful reporting remains a NE under Γ z j. Second, for any a, we use δ a to denote the Dirac measure on the set a. For every i, fix any injective function i : Θ i ji. We use i θ i to represent θ i, i.e., by reporting i θ i ji, agent i informs principal j of i s type θ i. Consider the continuous function Λ j : i θ i i : θ Θ Λ j i θ i i δ θi Θ i, i i, θ Θ. Since i θ i i : θ Θ is a closed subset of ji, by the Tietze Extension Theorem, there exists a continuous i function Λ j : ji i Θ i, s.t. Λ j i θ i i Λ j i i θ i i, θ Θ. That is, i θ i ji is used by agent i to inform principal j about i s type θ i, and any other message in ji reported by i would suggest a stochastic type in Θ i. Third, define c, s as follows: c j Γ z j Λ j, j ; 23

24 s i θ i δ i θ i, i, θ Θ. j I.e., c j is the generalized stochastic direct mechanism, and s i is the truthful reporting strategy. By (13), s c and z is induced by c, s. A.4 Proof of Lemma 2 Lemma 2 For any k, there exists c k k c k j k such that for any c k k, we can jk find s c k, c k k c k, c k k satisfying V k c k, c k k c, s k, c k k v k z θ, θ p θ. (14) θθ Proof. First, for any k, we will show below that there exists c k k k such that sup c k sc k k,ck k V k c k, ck k, s v k z θ, θ p θ. (15) θθ Second, fix any k and c k k described above. For any c k k, pick some s arg sc k,c k k V k c k, c k k, s. Hence, V k c k, c k k, s c k, c k k Therefore, (14) is implied by (16) and (15). sup c k k sc k,c k k V k sup c k k sc k,ck k V k c k, c k k, s c k, ck k, s. c k, c k k Finally, we prove (15) by considering two cases: k and k /. For any k, pick c k k arg sup c k k sc k,c k V k c k, c k, s. Then, sc k,ck k V k c k k c k, ck k, s sup c k k c k k sc k,c k V k v k v k z θ, θ p θ, θθ 24 c k, c k, s (16)

25 i.e., (15) holds. For any k /, since inf c k k sup c k k sc k,c k V k by the definition of "inf," we have c k k k s.t. sup c k k i.e., (15) holds. sc k, ck k V k c k, c k, s v k v k z θ, θ p θ, θθ c k, ck k, s v k z θ, θ p θ, θθ References [1] Bolton, P. and M. Dewatripont (2004): "Contract Theory," Cambridge, MA: The MIT Press. [2] Fudenberg, D. and J. Tirole (1991): "Game Theory," Cambridge, MA: The MIT Press. [3] Kalai, A.T., E. Kalai, E. Lehrer and D. Samat (2010): "A Commitment Folk Theorem," Games and Economic Behavior 69, [4] Martimort, D. (2006): "Multi-Contracting Mechanism Design," in Advances in Economics and Econometrics: Theory and Applications, Ninth World Congress, Vol. I, ed. by R. Blundell, W. K. Newey, and T. Persson. Cambridge, MA: Cambridge University Press, [5] Munkres, J. (2000): "Topology," Upper Saddle River, NJ: Prentice-Hall. [6] Peters, M. and C. Troncoso-Valverde (2013): "A Folk Theorem for Competing Mechanisms" Journal of Economic Theory, forthcog. [7] Szentes, B. (2009): "A Note on Mechanism Games with Multiple Principals and Three or More Agents by T. Yamashita," manuscript, University of Chicago. [8] Yamashita, T. (2010): "Mechanism Games with Multiple Principals and Three or More Agents," Econometrica 78,

Competition relative to Incentive Functions in Common Agency

Competition relative to Incentive Functions in Common Agency Competition relative to Incentive Functions in Common Agency Seungjin Han May 20, 2011 Abstract In common agency problems, competing principals often incentivize a privately-informed agent s action choice

More information

Mechanism Design: Basic Concepts

Mechanism Design: Basic Concepts Advanced Microeconomic Theory: Economics 521b Spring 2011 Juuso Välimäki Mechanism Design: Basic Concepts The setup is similar to that of a Bayesian game. The ingredients are: 1. Set of players, i {1,

More information

Competing Mechanism Design with Frictions

Competing Mechanism Design with Frictions Competing Mechanism Design with Frictions Seungjin Han January 23, 2014 Abstract This paper considers multiple principals competing mechanism design problems in directed search markets with frictions.

More information

Definitions and Proofs

Definitions and Proofs Giving Advice vs. Making Decisions: Transparency, Information, and Delegation Online Appendix A Definitions and Proofs A. The Informational Environment The set of states of nature is denoted by = [, ],

More information

Payoff Continuity in Incomplete Information Games

Payoff Continuity in Incomplete Information Games journal of economic theory 82, 267276 (1998) article no. ET982418 Payoff Continuity in Incomplete Information Games Atsushi Kajii* Institute of Policy and Planning Sciences, University of Tsukuba, 1-1-1

More information

Sequential Equilibria of Multi-Stage Games with Infinite Sets of Types and Actions

Sequential Equilibria of Multi-Stage Games with Infinite Sets of Types and Actions Sequential Equilibria of Multi-Stage Games with Infinite Sets of Types and Actions by Roger B. Myerson and Philip J. Reny* Draft notes October 2011 http://home.uchicago.edu/~preny/papers/bigseqm.pdf Abstract:

More information

ON THE REVELATION PRINCIPLE AND RECIPROCAL MECHANISMS IN COMPETING MECHANISM GAMES

ON THE REVELATION PRINCIPLE AND RECIPROCAL MECHANISMS IN COMPETING MECHANISM GAMES ON THE REVELATION PRINCIPLE AND RECIPROCAL MECHANISMS IN COMPETING MECHANISM GAMES MICHAEL PETERS Abstract. This paper shows how to characterize the set of outcomes functions that can be supported as equilibrium

More information

When to Ask for an Update: Timing in Strategic Communication

When to Ask for an Update: Timing in Strategic Communication When to Ask for an Update: Timing in Strategic Communication Work in Progress Ying Chen Johns Hopkins University Atara Oliver Rice University March 19, 2018 Main idea In many communication situations,

More information

Competing Mechanisms: One-Shot versus Repeated Games

Competing Mechanisms: One-Shot versus Repeated Games Competing Mechanisms: One-Shot versus Repeated Games Sambuddha Ghosh Shanghai U. of Fin. & Economics Seungjin Han McMaster University October 8, 2016 Abstract This paper studies a game where multiple principals

More information

Informed Principal in Private-Value Environments

Informed Principal in Private-Value Environments Informed Principal in Private-Value Environments Tymofiy Mylovanov Thomas Tröger University of Bonn June 21, 2008 1/28 Motivation 2/28 Motivation In most applications of mechanism design, the proposer

More information

NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA

NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA NASH IMPLEMENTATION USING SIMPLE MECHANISMS WITHOUT UNDESIRABLE MIXED-STRATEGY EQUILIBRIA MARIA GOLTSMAN Abstract. This note shows that, in separable environments, any monotonic social choice function

More information

Static Information Design

Static Information Design Static Information Design Dirk Bergemann and Stephen Morris Frontiers of Economic Theory & Computer Science, Becker-Friedman Institute, August 2016 Mechanism Design and Information Design Basic Mechanism

More information

Ex Post Cheap Talk : Value of Information and Value of Signals

Ex Post Cheap Talk : Value of Information and Value of Signals Ex Post Cheap Talk : Value of Information and Value of Signals Liping Tang Carnegie Mellon University, Pittsburgh PA 15213, USA Abstract. Crawford and Sobel s Cheap Talk model [1] describes an information

More information

Bayes Correlated Equilibrium and Comparing Information Structures

Bayes Correlated Equilibrium and Comparing Information Structures Bayes Correlated Equilibrium and Comparing Information Structures Dirk Bergemann and Stephen Morris Spring 2013: 521 B Introduction game theoretic predictions are very sensitive to "information structure"

More information

Mechanism Design: Implementation. Game Theory Course: Jackson, Leyton-Brown & Shoham

Mechanism Design: Implementation. Game Theory Course: Jackson, Leyton-Brown & Shoham Game Theory Course: Jackson, Leyton-Brown & Shoham Bayesian Game Setting Extend the social choice setting to a new setting where agents can t be relied upon to disclose their preferences honestly Start

More information

Lecture Slides - Part 4

Lecture Slides - Part 4 Lecture Slides - Part 4 Bengt Holmstrom MIT February 2, 2016. Bengt Holmstrom (MIT) Lecture Slides - Part 4 February 2, 2016. 1 / 65 Mechanism Design n agents i = 1,..., n agent i has type θ i Θ i which

More information

EC476 Contracts and Organizations, Part III: Lecture 2

EC476 Contracts and Organizations, Part III: Lecture 2 EC476 Contracts and Organizations, Part III: Lecture 2 Leonardo Felli 32L.G.06 19 January 2015 Moral Hazard: Consider the contractual relationship between two agents (a principal and an agent) The principal

More information

Subgame Perfect Equilibria in Stage Games

Subgame Perfect Equilibria in Stage Games Subgame Perfect Equilibria in Stage Games Alejandro M. Manelli Department of Economics Arizona State University Tempe, Az 85287-3806 August 2000 I am grateful to an associate editor and to two referees

More information

NBER WORKING PAPER SERIES PRICE AND CAPACITY COMPETITION. Daron Acemoglu Kostas Bimpikis Asuman Ozdaglar

NBER WORKING PAPER SERIES PRICE AND CAPACITY COMPETITION. Daron Acemoglu Kostas Bimpikis Asuman Ozdaglar NBER WORKING PAPER SERIES PRICE AND CAPACITY COMPETITION Daron Acemoglu Kostas Bimpikis Asuman Ozdaglar Working Paper 12804 http://www.nber.org/papers/w12804 NATIONAL BUREAU OF ECONOMIC RESEARCH 1050 Massachusetts

More information

Negotiation and Take it or Leave it in Common Agency

Negotiation and Take it or Leave it in Common Agency Negotiation and Take it or Leave it in Common Agency Michael Peters Department of Economics University of Toronto 150 St. George St. Toronto, Canada M5S 3G7 email:peters@economics.utoronto.ca First Draft

More information

Political Economy of Institutions and Development: Problem Set 1. Due Date: Thursday, February 23, in class.

Political Economy of Institutions and Development: Problem Set 1. Due Date: Thursday, February 23, in class. Political Economy of Institutions and Development: 14.773 Problem Set 1 Due Date: Thursday, February 23, in class. Answer Questions 1-3. handed in. The other two questions are for practice and are not

More information

On the Informed Principal Model with Common Values

On the Informed Principal Model with Common Values On the Informed Principal Model with Common Values Anastasios Dosis ESSEC Business School and THEMA École Polytechnique/CREST, 3/10/2018 Anastasios Dosis (ESSEC and THEMA) Informed Principal with Common

More information

When to Ask for an Update: Timing in Strategic Communication. National University of Singapore June 5, 2018

When to Ask for an Update: Timing in Strategic Communication. National University of Singapore June 5, 2018 When to Ask for an Update: Timing in Strategic Communication Ying Chen Johns Hopkins University Atara Oliver Rice University National University of Singapore June 5, 2018 Main idea In many communication

More information

Microeconomic Theory (501b) Problem Set 10. Auctions and Moral Hazard Suggested Solution: Tibor Heumann

Microeconomic Theory (501b) Problem Set 10. Auctions and Moral Hazard Suggested Solution: Tibor Heumann Dirk Bergemann Department of Economics Yale University Microeconomic Theory (50b) Problem Set 0. Auctions and Moral Hazard Suggested Solution: Tibor Heumann 4/5/4 This problem set is due on Tuesday, 4//4..

More information

Notes on Blackwell s Comparison of Experiments Tilman Börgers, June 29, 2009

Notes on Blackwell s Comparison of Experiments Tilman Börgers, June 29, 2009 Notes on Blackwell s Comparison of Experiments Tilman Börgers, June 29, 2009 These notes are based on Chapter 12 of David Blackwell and M. A.Girshick, Theory of Games and Statistical Decisions, John Wiley

More information

Price and Capacity Competition

Price and Capacity Competition Price and Capacity Competition Daron Acemoglu, Kostas Bimpikis, and Asuman Ozdaglar October 9, 2007 Abstract We study the efficiency of oligopoly equilibria in a model where firms compete over capacities

More information

Price and Capacity Competition

Price and Capacity Competition Price and Capacity Competition Daron Acemoglu a, Kostas Bimpikis b Asuman Ozdaglar c a Department of Economics, MIT, Cambridge, MA b Operations Research Center, MIT, Cambridge, MA c Department of Electrical

More information

1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts)

1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts) 1 Web Appendix: Equilibrium outcome under collusion (multiple types-multiple contracts) We extend our setup by allowing more than two types of agent. The agent s type is now β {β 1, β 2,..., β N }, where

More information

Preliminary Results on Social Learning with Partial Observations

Preliminary Results on Social Learning with Partial Observations Preliminary Results on Social Learning with Partial Observations Ilan Lobel, Daron Acemoglu, Munther Dahleh and Asuman Ozdaglar ABSTRACT We study a model of social learning with partial observations from

More information

Efficient Random Assignment with Cardinal and Ordinal Preferences: Online Appendix

Efficient Random Assignment with Cardinal and Ordinal Preferences: Online Appendix Efficient Random Assignment with Cardinal and Ordinal Preferences: Online Appendix James C. D. Fisher December 11, 2018 1 1 Introduction This document collects several results, which supplement those in

More information

Correlated Equilibrium in Games with Incomplete Information

Correlated Equilibrium in Games with Incomplete Information Correlated Equilibrium in Games with Incomplete Information Dirk Bergemann and Stephen Morris Econometric Society Summer Meeting June 2012 Robust Predictions Agenda game theoretic predictions are very

More information

Sender s Small Concern for Credibility and Receiver s Dilemma

Sender s Small Concern for Credibility and Receiver s Dilemma April 2012 Sender s Small Concern for Credibility and Receiver s Dilemma Hanjoon Michael Jung The Institute of Economics, Academia Sinica Abstract We model a dilemma that receivers face when a sender has

More information

Robust Predictions in Games with Incomplete Information

Robust Predictions in Games with Incomplete Information Robust Predictions in Games with Incomplete Information joint with Stephen Morris (Princeton University) November 2010 Payoff Environment in games with incomplete information, the agents are uncertain

More information

Graduate Microeconomics II Lecture 5: Cheap Talk. Patrick Legros

Graduate Microeconomics II Lecture 5: Cheap Talk. Patrick Legros Graduate Microeconomics II Lecture 5: Cheap Talk Patrick Legros 1 / 35 Outline Cheap talk 2 / 35 Outline Cheap talk Crawford-Sobel Welfare 3 / 35 Outline Cheap talk Crawford-Sobel Welfare Partially Verifiable

More information

A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations

A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations A Strict Ex-post Incentive Compatible Mechanism for Interdependent Valuations Swaprava Nath a, Onno Zoeter b a Indian Institute of Science, Bangalore b Xerox Research Centre Europe, Meylan, France Abstract

More information

Bayesian Persuasion Online Appendix

Bayesian Persuasion Online Appendix Bayesian Persuasion Online Appendix Emir Kamenica and Matthew Gentzkow University of Chicago June 2010 1 Persuasion mechanisms In this paper we study a particular game where Sender chooses a signal π whose

More information

1 The General Definition

1 The General Definition MS&E 336 Lecture 1: Dynamic games Ramesh Johari April 4, 2007 1 The General Definition A dynamic game (or extensive game, or game in extensive form) consists of: A set of players N; A set H of sequences

More information

Tijmen Daniëls Universiteit van Amsterdam. Abstract

Tijmen Daniëls Universiteit van Amsterdam. Abstract Pure strategy dominance with quasiconcave utility functions Tijmen Daniëls Universiteit van Amsterdam Abstract By a result of Pearce (1984), in a finite strategic form game, the set of a player's serially

More information

Game Theory. Monika Köppl-Turyna. Winter 2017/2018. Institute for Analytical Economics Vienna University of Economics and Business

Game Theory. Monika Köppl-Turyna. Winter 2017/2018. Institute for Analytical Economics Vienna University of Economics and Business Monika Köppl-Turyna Institute for Analytical Economics Vienna University of Economics and Business Winter 2017/2018 Static Games of Incomplete Information Introduction So far we assumed that payoff functions

More information

Government 2005: Formal Political Theory I

Government 2005: Formal Political Theory I Government 2005: Formal Political Theory I Lecture 11 Instructor: Tommaso Nannicini Teaching Fellow: Jeremy Bowles Harvard University November 9, 2017 Overview * Today s lecture Dynamic games of incomplete

More information

Information Design. Dirk Bergemann and Stephen Morris. Johns Hopkins University April 2017

Information Design. Dirk Bergemann and Stephen Morris. Johns Hopkins University April 2017 Information Design Dirk Bergemann and Stephen Morris Johns Hopkins University April 2017 Mechanism Design and Information Design Basic Mechanism Design: Fix an economic environment and information structure

More information

Asymmetric Social Norms

Asymmetric Social Norms Asymmetric Social Norms Gabriele Camera Chapman University University of Basel Alessandro Gioffré Goethe University December 8, 2016 Abstract Studies of cooperation in infinitely repeated matching games

More information

Module 16: Signaling

Module 16: Signaling Module 16: Signaling Information Economics (Ec 515) George Georgiadis Players with private information can take some action to signal their type. Taking this action would distinguish them from other types.

More information

Game Theory. Wolfgang Frimmel. Perfect Bayesian Equilibrium

Game Theory. Wolfgang Frimmel. Perfect Bayesian Equilibrium Game Theory Wolfgang Frimmel Perfect Bayesian Equilibrium / 22 Bayesian Nash equilibrium and dynamic games L M R 3 2 L R L R 2 2 L R L 2,, M,2, R,3,3 2 NE and 2 SPNE (only subgame!) 2 / 22 Non-credible

More information

Area I: Contract Theory Question (Econ 206)

Area I: Contract Theory Question (Econ 206) Theory Field Exam Summer 2011 Instructions You must complete two of the four areas (the areas being (I) contract theory, (II) game theory A, (III) game theory B, and (IV) psychology & economics). Be sure

More information

6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Potential Games

6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Potential Games 6.254 : Game Theory with Engineering Applications Lecture 8: Supermodular and Asu Ozdaglar MIT March 2, 2010 1 Introduction Outline Review of Supermodular Games Reading: Fudenberg and Tirole, Section 12.3.

More information

Notes on Mechanism Designy

Notes on Mechanism Designy Notes on Mechanism Designy ECON 20B - Game Theory Guillermo Ordoñez UCLA February 0, 2006 Mechanism Design. Informal discussion. Mechanisms are particular types of games of incomplete (or asymmetric) information

More information

Supplementary appendix to the paper Hierarchical cheap talk Not for publication

Supplementary appendix to the paper Hierarchical cheap talk Not for publication Supplementary appendix to the paper Hierarchical cheap talk Not for publication Attila Ambrus, Eduardo M. Azevedo, and Yuichiro Kamada December 3, 011 1 Monotonicity of the set of pure-strategy equilibria

More information

Costly Expertise. Dino Gerardi and Leeat Yariv yz. Current Version: December, 2007

Costly Expertise. Dino Gerardi and Leeat Yariv yz. Current Version: December, 2007 Costly Expertise Dino Gerardi and Leeat Yariv yz Current Version: December, 007 In many environments expertise is costly. Costs can manifest themselves in numerous ways, ranging from the time that is required

More information

INFORMATIONAL ROBUSTNESS AND SOLUTION CONCEPTS. Dirk Bergemann and Stephen Morris. December 2014 COWLES FOUNDATION DISCUSSION PAPER NO.

INFORMATIONAL ROBUSTNESS AND SOLUTION CONCEPTS. Dirk Bergemann and Stephen Morris. December 2014 COWLES FOUNDATION DISCUSSION PAPER NO. INFORMATIONAL ROBUSTNESS AND SOLUTION CONCEPTS By Dirk Bergemann and Stephen Morris December 2014 COWLES FOUNDATION DISCUSSION PAPER NO. 1973 COWLES FOUNDATION FOR RESEARCH IN ECONOMICS YALE UNIVERSITY

More information

Economics 201B Economic Theory (Spring 2017) Bargaining. Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7).

Economics 201B Economic Theory (Spring 2017) Bargaining. Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7). Economics 201B Economic Theory (Spring 2017) Bargaining Topics: the axiomatic approach (OR 15) and the strategic approach (OR 7). The axiomatic approach (OR 15) Nash s (1950) work is the starting point

More information

Learning Equilibrium as a Generalization of Learning to Optimize

Learning Equilibrium as a Generalization of Learning to Optimize Learning Equilibrium as a Generalization of Learning to Optimize Dov Monderer and Moshe Tennenholtz Faculty of Industrial Engineering and Management Technion Israel Institute of Technology Haifa 32000,

More information

Perfect Conditional -Equilibria of Multi-Stage Games with Infinite Sets of Signals and Actions (Preliminary and Incomplete)

Perfect Conditional -Equilibria of Multi-Stage Games with Infinite Sets of Signals and Actions (Preliminary and Incomplete) Perfect Conditional -Equilibria of Multi-Stage Games with Infinite Sets of Signals and Actions (Preliminary and Incomplete) Roger B. Myerson and Philip J. Reny Department of Economics University of Chicago

More information

ONLINE APPENDIX. Upping the Ante: The Equilibrium Effects of Unconditional Grants to Private Schools

ONLINE APPENDIX. Upping the Ante: The Equilibrium Effects of Unconditional Grants to Private Schools ONLINE APPENDIX Upping the Ante: The Equilibrium Effects of Unconditional Grants to Private Schools T. Andrabi, J. Das, A.I. Khwaja, S. Ozyurt, and N. Singh Contents A Theory A.1 Homogeneous Demand.................................

More information

Discussion Papers in Economics

Discussion Papers in Economics Discussion Papers in Economics No. 10/11 A General Equilibrium Corporate Finance Theorem for Incomplete Markets: A Special Case By Pascal Stiefenhofer, University of York Department of Economics and Related

More information

On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation

On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation MPRA Munich Personal RePEc Archive On the Pareto Efficiency of a Socially Optimal Mechanism for Monopoly Regulation Ismail Saglam Ipek University 4 May 2016 Online at https://mpra.ub.uni-muenchen.de/71090/

More information

Dynamic Common Agency

Dynamic Common Agency Dynamic Common Agency Dirk Bergemann Juuso Välimäki January 2001 Abstract A general model of dynamic common agency with symmetric information is considered. The set of truthful Markov perfect equilibrium

More information

SURPLUS SHARING WITH A TWO-STAGE MECHANISM. By Todd R. Kaplan and David Wettstein 1. Ben-Gurion University of the Negev, Israel. 1.

SURPLUS SHARING WITH A TWO-STAGE MECHANISM. By Todd R. Kaplan and David Wettstein 1. Ben-Gurion University of the Negev, Israel. 1. INTERNATIONAL ECONOMIC REVIEW Vol. 41, No. 2, May 2000 SURPLUS SHARING WITH A TWO-STAGE MECHANISM By Todd R. Kaplan and David Wettstein 1 Ben-Gurion University of the Negev, Israel In this article we consider

More information

Recap Social Choice Functions Fun Game Mechanism Design. Mechanism Design. Lecture 13. Mechanism Design Lecture 13, Slide 1

Recap Social Choice Functions Fun Game Mechanism Design. Mechanism Design. Lecture 13. Mechanism Design Lecture 13, Slide 1 Mechanism Design Lecture 13 Mechanism Design Lecture 13, Slide 1 Lecture Overview 1 Recap 2 Social Choice Functions 3 Fun Game 4 Mechanism Design Mechanism Design Lecture 13, Slide 2 Notation N is the

More information

Ex Post Nash Equilibrium in Linear Bayesian Games for Decision Making in Multi-Environments

Ex Post Nash Equilibrium in Linear Bayesian Games for Decision Making in Multi-Environments games Article Ex Post Nash Equilibrium in Linear Bayesian Games for Decision Making in Multi-Environments Abbas Edalat 1, Samira Hossein Ghorban 2, * and Ali Ghoroghi 1, 1 Department of Computing, Imperial

More information

Implementability, Walrasian Equilibria, and Efficient Matchings

Implementability, Walrasian Equilibria, and Efficient Matchings Implementability, Walrasian Equilibria, and Efficient Matchings Piotr Dworczak and Anthony Lee Zhang Abstract In general screening problems, implementable allocation rules correspond exactly to Walrasian

More information

UC Berkeley Haas School of Business Game Theory (EMBA 296 & EWMBA 211) Summer Social learning and bargaining (axiomatic approach)

UC Berkeley Haas School of Business Game Theory (EMBA 296 & EWMBA 211) Summer Social learning and bargaining (axiomatic approach) UC Berkeley Haas School of Business Game Theory (EMBA 296 & EWMBA 211) Summer 2015 Social learning and bargaining (axiomatic approach) Block 4 Jul 31 and Aug 1, 2015 Auction results Herd behavior and

More information

Basic Game Theory. Kate Larson. January 7, University of Waterloo. Kate Larson. What is Game Theory? Normal Form Games. Computing Equilibria

Basic Game Theory. Kate Larson. January 7, University of Waterloo. Kate Larson. What is Game Theory? Normal Form Games. Computing Equilibria Basic Game Theory University of Waterloo January 7, 2013 Outline 1 2 3 What is game theory? The study of games! Bluffing in poker What move to make in chess How to play Rock-Scissors-Paper Also study of

More information

ENDOGENOUS REPUTATION IN REPEATED GAMES

ENDOGENOUS REPUTATION IN REPEATED GAMES ENDOGENOUS REPUTATION IN REPEATED GAMES PRISCILLA T. Y. MAN Abstract. Reputation is often modelled by a small but positive prior probability that a player is a behavioral type in repeated games. This paper

More information

Hierarchical cheap talk

Hierarchical cheap talk Hierarchical cheap talk Attila Ambrus, Eduardo Azevedo, and Yuichiro Kamada July 15, 2009 Abstract We investigate situations in which agents can only communicate to each other through a chain of intermediators,

More information

On Competing Mechanisms under Exclusive Competition

On Competing Mechanisms under Exclusive Competition On Competing Mechanisms under Exclusive Competition Andrea Attar Eloisa Campioni Gwenaël Piaser May 23, 2018 Abstract We study games in which several principals design mechanisms in the presence of privately

More information

Introduction. 1 University of Pennsylvania, Wharton Finance Department, Steinberg Hall-Dietrich Hall, 3620

Introduction. 1 University of Pennsylvania, Wharton Finance Department, Steinberg Hall-Dietrich Hall, 3620 May 16, 2006 Philip Bond 1 Are cheap talk and hard evidence both needed in the courtroom? Abstract: In a recent paper, Bull and Watson (2004) present a formal model of verifiability in which cheap messages

More information

Wars of Attrition with Budget Constraints

Wars of Attrition with Budget Constraints Wars of Attrition with Budget Constraints Gagan Ghosh Bingchao Huangfu Heng Liu October 19, 2017 (PRELIMINARY AND INCOMPLETE: COMMENTS WELCOME) Abstract We study wars of attrition between two bidders who

More information

RECIPROCAL RELATIONSHIPS AND MECHANISM DESIGN

RECIPROCAL RELATIONSHIPS AND MECHANISM DESIGN RECIPROCAL RELATIONSHIPS AND MECHANISM DESIGN GORKEM CELIK AND MICHAEL PETERS A. We study an incomplete information game in which players can coordinate their actions by contracting among themselves. We

More information

Organizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan

Organizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan Organizational Barriers to Technology Adoption: Evidence from Soccer-Ball Producers in Pakistan David Atkin, Azam Chaudhry, Shamyla Chaudry Amit K. Khandelwal and Eric Verhoogen Sept. 016 Appendix B: Theory

More information

On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E.

On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E. Tilburg University On the Unique D1 Equilibrium in the Stackelberg Model with Asymmetric Information Janssen, M.C.W.; Maasland, E. Publication date: 1997 Link to publication General rights Copyright and

More information

9 A Class of Dynamic Games of Incomplete Information:

9 A Class of Dynamic Games of Incomplete Information: A Class of Dynamic Games of Incomplete Information: Signalling Games In general, a dynamic game of incomplete information is any extensive form game in which at least one player is uninformed about some

More information

Repeated Downsian Electoral Competition

Repeated Downsian Electoral Competition Repeated Downsian Electoral Competition John Duggan Department of Political Science and Department of Economics University of Rochester Mark Fey Department of Political Science University of Rochester

More information

EC319 Economic Theory and Its Applications, Part II: Lecture 7

EC319 Economic Theory and Its Applications, Part II: Lecture 7 EC319 Economic Theory and Its Applications, Part II: Lecture 7 Leonardo Felli NAB.2.14 27 February 2014 Signalling Games Consider the following Bayesian game: Set of players: N = {N, S, }, Nature N strategy

More information

Coordination and Cheap Talk in a Battle of the Sexes with Private Information

Coordination and Cheap Talk in a Battle of the Sexes with Private Information Department of Economics Coordination and Cheap Talk in a Battle of the Sexes with Private Information Department of Economics Discussion Paper 3-0 Chirantan Ganguly Indrajit Ray Coordination and Cheap

More information

Discussion of "Persuasion in Global Games with an Application to Stress Testing" by Nicolas Inostroza and Alessandro Pavan

Discussion of Persuasion in Global Games with an Application to Stress Testing by Nicolas Inostroza and Alessandro Pavan Discussion of "Persuasion in Global Games with an Application to Stress Testing" by Nicolas Inostroza and Alessandro Pavan Stephen Morris IUB Stern Workshop March 2017 Basic Question Some policy ingredients:

More information

Introduction to Game Theory

Introduction to Game Theory COMP323 Introduction to Computational Game Theory Introduction to Game Theory Paul G. Spirakis Department of Computer Science University of Liverpool Paul G. Spirakis (U. Liverpool) Introduction to Game

More information

Mechanism Design: Bayesian Incentive Compatibility

Mechanism Design: Bayesian Incentive Compatibility May 30, 2013 Setup X : finite set of public alternatives X = {x 1,..., x K } Θ i : the set of possible types for player i, F i is the marginal distribution of θ i. We assume types are independently distributed.

More information

Virtual Robust Implementation and Strategic Revealed Preference

Virtual Robust Implementation and Strategic Revealed Preference and Strategic Revealed Preference Workshop of Mathematical Economics Celebrating the 60th birthday of Aloisio Araujo IMPA Rio de Janeiro December 2006 Denitions "implementation": requires ALL equilibria

More information

6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2

6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 Daron Acemoglu and Asu Ozdaglar MIT October 14, 2009 1 Introduction Outline Mixed Strategies Existence of Mixed Strategy Nash Equilibrium

More information

REPEATED GAMES. Jörgen Weibull. April 13, 2010

REPEATED GAMES. Jörgen Weibull. April 13, 2010 REPEATED GAMES Jörgen Weibull April 13, 2010 Q1: Can repetition induce cooperation? Peace and war Oligopolistic collusion Cooperation in the tragedy of the commons Q2: Can a game be repeated? Game protocols

More information

Equilibria for games with asymmetric information: from guesswork to systematic evaluation

Equilibria for games with asymmetric information: from guesswork to systematic evaluation Equilibria for games with asymmetric information: from guesswork to systematic evaluation Achilleas Anastasopoulos anastas@umich.edu EECS Department University of Michigan February 11, 2016 Joint work

More information

Theory of Auctions. Carlos Hurtado. Jun 23th, Department of Economics University of Illinois at Urbana-Champaign

Theory of Auctions. Carlos Hurtado. Jun 23th, Department of Economics University of Illinois at Urbana-Champaign Theory of Auctions Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Jun 23th, 2015 C. Hurtado (UIUC - Economics) Game Theory On the Agenda 1 Formalizing

More information

Persuading a Pessimist

Persuading a Pessimist Persuading a Pessimist Afshin Nikzad PRELIMINARY DRAFT Abstract While in practice most persuasion mechanisms have a simple structure, optimal signals in the Bayesian persuasion framework may not be so.

More information

Consistent Beliefs in Extensive Form Games

Consistent Beliefs in Extensive Form Games Games 2010, 1, 415-421; doi:10.3390/g1040415 OPEN ACCESS games ISSN 2073-4336 www.mdpi.com/journal/games Article Consistent Beliefs in Extensive Form Games Paulo Barelli 1,2 1 Department of Economics,

More information

Mechanism Design. Christoph Schottmüller / 27

Mechanism Design. Christoph Schottmüller / 27 Mechanism Design Christoph Schottmüller 2015-02-25 1 / 27 Outline 1 Bayesian implementation and revelation principle 2 Expected externality mechanism 3 Review questions and exercises 2 / 27 Bayesian implementation

More information

Volume 29, Issue 3. Strategic delegation and market competitiveness

Volume 29, Issue 3. Strategic delegation and market competitiveness Volume 29, Issue Strategic delegation and market competitiveness Caterina Colombo Università di Ferrara Alessandra Chirco Università del Salento Marcella Scrimitore Università del Salento Abstract Within

More information

Mediators in Position Auctions

Mediators in Position Auctions Mediators in Position Auctions Itai Ashlagi a,, Dov Monderer b,, Moshe Tennenholtz b,c a Harvard Business School, Harvard University, 02163, USA b Faculty of Industrial Engineering and Haifa, 32000, Israel

More information

MS&E 246: Lecture 12 Static games of incomplete information. Ramesh Johari

MS&E 246: Lecture 12 Static games of incomplete information. Ramesh Johari MS&E 246: Lecture 12 Static games of incomplete information Ramesh Johari Incomplete information Complete information means the entire structure of the game is common knowledge Incomplete information means

More information

Equilibria in Games with Weak Payoff Externalities

Equilibria in Games with Weak Payoff Externalities NUPRI Working Paper 2016-03 Equilibria in Games with Weak Payoff Externalities Takuya Iimura, Toshimasa Maruta, and Takahiro Watanabe October, 2016 Nihon University Population Research Institute http://www.nihon-u.ac.jp/research/institute/population/nupri/en/publications.html

More information

Game Theory. Strategic Form Games with Incomplete Information. Levent Koçkesen. Koç University. Levent Koçkesen (Koç University) Bayesian Games 1 / 15

Game Theory. Strategic Form Games with Incomplete Information. Levent Koçkesen. Koç University. Levent Koçkesen (Koç University) Bayesian Games 1 / 15 page.1 Game Theory Strategic Form Games with Incomplete Information Levent Koçkesen Koç University Levent Koçkesen (Koç University) Bayesian Games 1 / 15 page. Games with Incomplete Information Some players

More information

Epsilon Ex Post Implementation

Epsilon Ex Post Implementation Epsilon Ex Post Implementation Mehmet Barlo Nuh Aygun Dalkiran February 10, 2014 Abstract We provide necessary and sufficient conditions for epsilon ex post implementation. Our analysis extends Bergemann

More information

Cloud Service under the Presence of Privacy Concern

Cloud Service under the Presence of Privacy Concern Appl. Math. Inf. Sci. 8, No. 5, 557-563 014 557 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.1785/amis/080554 Cloud Service under the Presence of Privacy Concern

More information

6.207/14.15: Networks Lecture 11: Introduction to Game Theory 3

6.207/14.15: Networks Lecture 11: Introduction to Game Theory 3 6.207/14.15: Networks Lecture 11: Introduction to Game Theory 3 Daron Acemoglu and Asu Ozdaglar MIT October 19, 2009 1 Introduction Outline Existence of Nash Equilibrium in Infinite Games Extensive Form

More information

Thema Working Paper n Université de Cergy Pontoise, France. Hölder Continuous Implementation. Oury Marion

Thema Working Paper n Université de Cergy Pontoise, France. Hölder Continuous Implementation. Oury Marion Thema Working Paper n 2010-06 Université de Cergy Pontoise, France Hölder Continuous Implementation Oury Marion November, 2010 Hölder Continuous Implementation Marion Oury November 2010 Abstract Building

More information

Lecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about

Lecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about 0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 7 02 December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about Two-Player zero-sum games (min-max theorem) Mixed

More information

The Folk Theorem for Finitely Repeated Games with Mixed Strategies

The Folk Theorem for Finitely Repeated Games with Mixed Strategies The Folk Theorem for Finitely Repeated Games with Mixed Strategies Olivier Gossner February 1994 Revised Version Abstract This paper proves a Folk Theorem for finitely repeated games with mixed strategies.

More information

A remark on discontinuous games with asymmetric information and ambiguity

A remark on discontinuous games with asymmetric information and ambiguity Econ Theory Bull DOI 10.1007/s40505-016-0100-5 RESEARCH ARTICLE A remark on discontinuous games with asymmetric information and ambiguity Wei He 1 Nicholas C. Yannelis 1 Received: 7 February 2016 / Accepted:

More information

Equilibrium Refinements

Equilibrium Refinements Equilibrium Refinements Mihai Manea MIT Sequential Equilibrium In many games information is imperfect and the only subgame is the original game... subgame perfect equilibrium = Nash equilibrium Play starting

More information

Robust Mechanism Design and Robust Implementation

Robust Mechanism Design and Robust Implementation Robust Mechanism Design and Robust Implementation joint work with Stephen Morris August 2009 Barcelona Introduction mechanism design and implementation literatures are theoretical successes mechanisms

More information