IDEAS home Printed from https://ideas.repec.org/a/sae/joupea/v48y2011i2p217-223.html
   My bibliography  Save this article

100 Horsemen and the empty city: A game theoretic examination of deception in Chinese military legend

Author

Listed:
  • Christopher Cotton

    (Department of Economics, University of Miami, cotton@business.miami.edu)

  • Chang Liu

    (Department of Finance, Georgia Institute of Technology)

Abstract

We present game theoretic models of two of the most famous military bluffs from history. These include the legend of Li Guang and his 100 horsemen (144 BC), and the legend of Zhuge Liang and the Empty City (228 AD). In both legends, the military commander faces a much stronger opposing army, but instead of ordering his men to retreat, he orders them to act in a manner consistent with baiting the enemy into an ambush. The stronger opposing army, uncertain whether it is facing a weak opponent or an ambush, then decides to flee and avoid battle. Military scholars refer to both stories to illustrate the importance of deception in warfare, often highlighting the creativity of the generals’ strategies. We model both situations as signaling games in which the opponent is uncertain whether the general is weak (i.e. has few soldiers) or strong (i.e. has a larger army waiting to ambush his opponent if they engage in combat). We then derive the unique Perfect Bayesian Equilibrium of the games. When the probability of a weak general is high enough, the equilibrium involves mixed strategies, with weak generals sometimes fleeing and sometimes bluffing about their strength. The equilibrium always involves the generals and their opponents acting as they did in the historical examples with at least a positive probability. When the probability of a weak general is lower (which is reasonable given the reputations of Li Guang and Zhuge Liang), then the unique equilibrium always involves bluffing by the general and retreat by his opponent.

Suggested Citation

  • Christopher Cotton & Chang Liu, 2011. "100 Horsemen and the empty city: A game theoretic examination of deception in Chinese military legend," Journal of Peace Research, Peace Research Institute Oslo, vol. 48(2), pages 217-223, March.
  • Handle: RePEc:sae:joupea:v:48:y:2011:i:2:p:217-223
    DOI: 10.1177/0022343310396265
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/0022343310396265
    Download Restriction: no

    File URL: https://libkey.io/10.1177/0022343310396265?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Fudenberg, Drew & Tirole, Jean, 1991. "Perfect Bayesian equilibrium and sequential equilibrium," Journal of Economic Theory, Elsevier, vol. 53(2), pages 236-260, April.
    2. O. G. Haywood, 1954. "Military Decision and Game Theory," Operations Research, INFORMS, vol. 2(4), pages 365-385, November.
    3. In-Koo Cho & David M. Kreps, 1987. "Signaling Games and Stable Equilibria," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 102(2), pages 179-221.
    4. Mark Walker & John Wooders, 2001. "Minimax Play at Wimbledon," American Economic Review, American Economic Association, vol. 91(5), pages 1521-1538, December.
    5. Ignacio Palacios-Huerta, 2003. "Professionals Play Minimax," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 70(2), pages 395-415.
    6. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    7. Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
    8. John C. Harsanyi, 1967. "Games with Incomplete Information Played by "Bayesian" Players, I-III Part I. The Basic Model," Management Science, INFORMS, vol. 14(3), pages 159-182, November.
    9. Michael Spence, 1973. "Job Market Signaling," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 87(3), pages 355-374.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Christopher Cotton & Chang Liu, 2010. "100 Horsemen and the Empty City: A Game Theoretic Exploration of Deception in Chinese Military Legend," Working Papers 2010-22, University of Miami, Department of Economics.
    2. Majumdar, Mukul & Yoo, Seung Han, 2011. "Strategic Analysis of Influence Peddling," Working Papers 11-04, Cornell University, Center for Analytic Economics.
    3. Sexton, Richard J., 1991. "Game Theory: A Review With Applications To Vertical Control In Agricultural Markets," Working Papers 225865, University of California, Davis, Department of Agricultural and Resource Economics.
    4. Peter Eso & James Schummer, 2005. "Robust Deviations from Signaling Equilibria," Discussion Papers 1406, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
    5. Dekel, Eddie & Siniscalchi, Marciano, 2015. "Epistemic Game Theory," Handbook of Game Theory with Economic Applications,, Elsevier.
    6. Arguedas, Carmen & Rousseau, Sandra, 2012. "Learning about compliance under asymmetric information," Resource and Energy Economics, Elsevier, vol. 34(1), pages 55-73.
    7. Drew Fudenberg & Kevin He, 2018. "Learning and Type Compatibility in Signaling Games," Econometrica, Econometric Society, vol. 86(4), pages 1215-1255, July.
    8. Giuseppe Rose, 2009. "Higher education reforms and signaling equilibria," Journal of Economic Policy Reform, Taylor and Francis Journals, vol. 12(2), pages 75-90.
    9. Yao, Zhiyong, 2012. "Bargaining over incentive contracts," Journal of Mathematical Economics, Elsevier, vol. 48(2), pages 98-106.
    10. Zhang, Chong & Yu, Man & Chen, Jian, 2022. "Signaling quality with return insurance: Theory and empirical evidence," Other publications TiSEM 184da313-a89e-4a81-9f23-c, Tilburg University, School of Economics and Management.
    11. Chong Zhang & Man Yu & Jian Chen, 2022. "Signaling Quality with Return Insurance: Theory and Empirical Evidence," Management Science, INFORMS, vol. 68(8), pages 5847-5867, August.
    12. Arianna Degan & Ming Li, 2021. "Persuasion with costly precision," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 72(3), pages 869-908, October.
    13. Mukul Majumdar & Seung Yoo, 2012. "Strategic analysis of influence peddling," International Journal of Game Theory, Springer;Game Theory Society, vol. 41(4), pages 737-762, November.
    14. Etro, Federico, 2017. "Research in economics and game theory. A 70th anniversary," Research in Economics, Elsevier, vol. 71(1), pages 1-7.
    15. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    16. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    17. Anders Gustafsson, 2019. "Busy doing nothing: why politicians implement inefficient policies," Constitutional Political Economy, Springer, vol. 30(3), pages 282-299, September.
    18. Thomas de Haan & Theo Offerman & Randolph Sloof, 2015. "Money Talks? An Experimental Investigation Of Cheap Talk And Burned Money," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 56(4), pages 1385-1426, November.
    19. Eduardo Perez & Delphine Prady, 2012. "Complicating to Persuade?," Working Papers hal-03583827, HAL.
    20. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:joupea:v:48:y:2011:i:2:p:217-223. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: http://www.prio.no/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.