Advanced Search
MyIDEAS: Login

Full-Truthful Implementation in Nash Equilibria

Contents:

Author Info

  • Hideki Mizukami
  • Takuma Wakayama

Abstract

We consider full-truthful Nash implementation, which requires that truth telling by each agent should be a Nash equilibrium of a direct revelation mechanism, and that the set of Nash equilibrium outcomes of the mechanism should coincide with the f -optimal outcome. We show that restricted monotonicity together with an auxiliary condition called boundedness is both necessary and sufficient for full-truthful Nash implementation. We also prove that full-truthful Nash implementation is equivalent to secure implementation (Saijo et al. (2005)). This gives us an alternative characterization of securely implementable social choice functions.

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://www.iser.osaka-u.ac.jp/library/dp/2006/DP0672.pdf
Download Restriction: no

Bibliographic Info

Paper provided by Institute of Social and Economic Research, Osaka University in its series ISER Discussion Paper with number 0672.

as in new window
Length:
Date of creation: Sep 2006
Date of revision:
Handle: RePEc:dpr:wpaper:0672

Contact details of provider:
Postal: 6-1 Mihogaoka, Ibaraki, Osaka 567-0047
Fax: 81-6-6879-8583
Email:
Web page: http://www.iser.osaka-u.ac.jp/index-e.html
More information through EDIRC

Related research

Keywords:

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Dutta, Bhaskar & Sen, Arunava, 1991. "A Necessary and Sufficient Condition for Two-Person Nash Implementation," Review of Economic Studies, Wiley Blackwell, vol. 58(1), pages 121-28, January.
  2. Cason, Timothy N. & Saijo, Tatsuyoshi & Sjostrom, Tomas & Yamato, Takehiko, 2003. "Secure Implementation Experiments: Do Strategy-proof Mechanisms Really Work?," Working Papers 4-03-1, Pennsylvania State University, Department of Economics.
  3. Jackson, Matthew O, 1992. "Implementation in Undominated.Strategies: A Look at Bounded Mechanisms," Review of Economic Studies, Wiley Blackwell, vol. 59(4), pages 757-75, October.
  4. Alvin E. Roth & Tayfun Sönmez & M. Utku Ünver, 2004. "Kidney Exchange," The Quarterly Journal of Economics, MIT Press, vol. 119(2), pages 457-488, May.
  5. Tatsuyoshi Saijo & Tomas Sjostrom & Takehiko Yamato, 2005. "Secure Implementation," Economics Working Papers 0056, Institute for Advanced Study, School of Social Science.
  6. Dasgupta, Partha S & Hammond, Peter J & Maskin, Eric S, 1979. "The Implementation of Social Choice Rules: Some General Results on Incentive Compatibility," Review of Economic Studies, Wiley Blackwell, vol. 46(2), pages 185-216, April.
  7. Atila Abdulkadiroglu & Tayfun Smez, 2003. "School Choice: A Mechanism Design Approach," Discussion Papers 0203-18, Columbia University, Department of Economics.
  8. Jackson Matthew O. & Palfrey Thomas R. & Srivastava Sanjay, 1994. "Undominated Nash Implementation in Bounded Mechanisms," Games and Economic Behavior, Elsevier, vol. 6(3), pages 474-501, May.
  9. Eric Maskin, 1998. "Nash Equilibrium and Welfare Optimality," Harvard Institute of Economic Research Working Papers 1829, Harvard - Institute of Economic Research.
  10. Moore, John & Repullo, Rafael, 1990. "Nash Implementation: A Full Characterization," Econometrica, Econometric Society, vol. 58(5), pages 1083-99, September.
  11. Tatamitani, Yoshikatsu, 2001. "Implementation by self-relevant mechanisms," Journal of Mathematical Economics, Elsevier, vol. 35(3), pages 427-444, June.
  12. Roth, Alvin E, 1984. "The Evolution of the Labor Market for Medical Interns and Residents: A Case Study in Game Theory," Journal of Political Economy, University of Chicago Press, vol. 92(6), pages 991-1016, December.
Full references (including those not matched with items on IDEAS)

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as in new window

Cited by:
  1. Yuji Fujinaka & Takuma Wakayama, 2007. "Secure Implementation in Economies with Indivisible Objects and Money," ISER Discussion Paper 0699, Institute of Social and Economic Research, Osaka University.

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:dpr:wpaper:0672. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Fumiko Matsumoto).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.