Advanced Search
MyIDEAS: Login

Secure Implementation: Strategy-Proof Mechanisms Reconsidered

Contents:

Author Info

  • Saijo, Tatsuyoshi
  • Sjöström, Tomas
  • Yamato, Takehiko

Abstract

Strategy-proofness, requiring that truth-telling is a dominant strategy, is a standard concept in social choice theory. However, the concept of strategy-proofness has serious drawbacks. First, announcing one's true preference may not be a unique dominant strategy, and using the wrong dominant strategy may lead to the wrong outcome. Second, almost all strategy-proof mechanisms have a continuum of Nash equilibria, and most of which produce the wrong outcome. Third, experimental evidence shows that most of the strategy-proof mechanisms do not work well. We argue that a possible solution to this dilemma is to require double implementation in Nash equilibrium and in dominant strategies, which we call secure implementation. We characterize environments where secure implementation is possible, and compare it with dominant strategy implementation. An interesting example of secure implementation is a Groves mechanism when preferences are single-peaked.

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://www.hss.caltech.edu/SSPapers/wp1174.pdf
Our checks indicate that this address may not be valid because: 404 Not Found. If this is indeed the case, please notify (Victoria Mason)
Download Restriction: no

Bibliographic Info

Paper provided by California Institute of Technology, Division of the Humanities and Social Sciences in its series Working Papers with number 1174.

as in new window
Length: 31 pages
Date of creation: Sep 2003
Date of revision:
Publication status: Published:
Handle: RePEc:clt:sswopa:1174

Contact details of provider:
Postal: Working Paper Assistant, Division of the Humanities and Social Sciences, 228-77, Caltech, Pasadena CA 91125
Phone: 626 395-4065
Fax: 626 405-9841
Email:
Web page: http://www.hss.caltech.edu/ss

Order Information:
Postal: Working Paper Assistant, Division of the Humanities and Social Sciences, 228-77, Caltech, Pasadena CA 91125
Email:

Related research

Keywords:

Other versions of this item:

Find related papers by JEL classification:

This paper has been announced in the following NEP Reports:

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Masso, J. & Barbera, S., 1996. "Strategy-Proof Voting on Compact Ranges," ASSET - Instituto De Economia Publica 156, ASSET (Association of Southern European Economic Theorists).
  2. Cason, Timothy N. & Saijo, Tatsuyoshi & Sjostrom, Tomas & Yamato, Takehiko, 2006. "Secure implementation experiments: Do strategy-proof mechanisms really work?," Games and Economic Behavior, Elsevier, vol. 57(2), pages 206-235, November.
  3. Laura Razzolini & Michael Reksulak & Robert Dorsey, 2007. "An Experimental Evaluation of the Serial Cost Sharing Rule," Theory and Decision, Springer, vol. 63(3), pages 283-314, November.
  4. Repullo, Rafael, 1985. "Implementation in Dominant Strategies under Complete and Incomplete Information," Review of Economic Studies, Wiley Blackwell, vol. 52(2), pages 223-29, April.
  5. Moulin, Herve, 1994. "Serial Cost-Sharing of Excludable Public Goods," Review of Economic Studies, Wiley Blackwell, vol. 61(2), pages 305-25, April.
  6. Border, Kim C & Jordan, J S, 1983. "Straightforward Elections, Unanimity and Phantom Voters," Review of Economic Studies, Wiley Blackwell, vol. 50(1), pages 153-70, January.
  7. Moulin, Herve & Shenker, Scott, 1992. "Serial Cost Sharing," Econometrica, Econometric Society, vol. 60(5), pages 1009-37, September.
  8. Tatsuyoshi Saijo & Tomas Sjöström & Takehiko Yamato, 2004. "Secure Implementation," Levine's Bibliography 122247000000000615, UCLA Department of Economics.
  9. Attiyeh, Greg & Franciosi, Robert & Isaac, R Mark, 2000. " Experiments with the Pivot Process for Providing Public Goods," Public Choice, Springer, vol. 102(1-2), pages 95-114, January.
  10. H. Moulin, 1980. "On strategy-proofness and single peakedness," Public Choice, Springer, vol. 35(4), pages 437-455, January.
  11. James Schummer & Rakesh V. Vohra, 1999. "Strategy-proof Location on a Network," Discussion Papers 1253, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
  12. Kagel, John H & Levin, Dan, 1993. "Independent Private Value Auctions: Bidder Behaviour in First-, Second- and Third-Price Auctions with Varying Numbers of Bidders," Economic Journal, Royal Economic Society, vol. 103(419), pages 868-79, July.
  13. Groves, Theodore, 1973. "Incentives in Teams," Econometrica, Econometric Society, vol. 41(4), pages 617-31, July.
  14. Mookherjee, Dilip & Reichelstein, Stefan, 1990. "Implementation via Augmented Revelation Mechanisms," Review of Economic Studies, Wiley Blackwell, vol. 57(3), pages 453-75, July.
  15. Kagel, John H & Harstad, Ronald M & Levin, Dan, 1987. "Information Impact and Allocation Rules in Auctions with Affiliated Private Values: A Laboratory Study," Econometrica, Econometric Society, vol. 55(6), pages 1275-1304, November.
  16. Kawagoe, Toshiji & Mori, Toru, 2001. " Can the Pivotal Mechanism Induce Truth-Telling? An Experimental Study," Public Choice, Springer, vol. 108(3-4), pages 331-54, September.
Full references (including those not matched with items on IDEAS)

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as in new window

Cited by:
  1. Cason, Timothy N. & Saijo, Tatsuyoshi & Sjostrom, Tomas & Yamato, Takehiko, 2006. "Secure implementation experiments: Do strategy-proof mechanisms really work?," Games and Economic Behavior, Elsevier, vol. 57(2), pages 206-235, November.

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:clt:sswopa:1174. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Victoria Mason).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.