Abstract:We show the role of unmediated talk with computational complexity bounds as both an information transmission and a coordination device for the class of two-player games with incomplete information and rational parameters. We prove that any communication equilibrium payoff of such games can be reached as a Bayesian-Nash equilibrium payoff of the game extended by a two phase universal mechanism of interim computationally restricted pre-play communication. The communication protocols are designed with the help of… Show more
“…For one thing, work has continued on secret sharing and multiparty computation, taking faulty and rational behavior into account (e.g., [Abraham, Dolev, Gonen, and Halpern 2006;Dani, Movahedi, Rodriguez, and Saia 2011;Fuchsbauer, Katz, and Naccache 2010;Gordon and Katz 2006;Lysyanskaya and Triandopoulos 2006]). There has also been work on when and whether a problem that can be solved with a trusted third party can be converted to one that can be solved using cheap talk, without a third party, a problem that has also attracted the attention of game theorists (e.g., [Abraham, Dolev, Gonen, and Halpern 2006;Abraham, Dolev, and Halpern 2008;Barany 1992;Ben-Porath 2003;Dodis, Halevi, and Rabin 2000;Forges 1990;Heller 2005;Izmalkov, Lepinski, and Micali 2011;Lepinski, Micali, Peikert, and Shelat 2004;McGrew, Porter, and Shoham 2003;Shoham and Tennenholtz 2005;Urbano and Vila 2002;Urbano and Vila 2004]). This is relevant because there are a number of well-known distributed computing problems that can be solved easily by means of a "trusted" mediator.…”
We do a game-theoretic analysis of leader election, under the assumption that each agent prefers to have some leader than to have no leader at all. We show that it is possible to obtain a fair Nash equilibrium, where each agent has an equal probability of being elected leader, in a completely connected network, in a bidirectional ring, and a unidirectional ring, in the synchronous setting. In the asynchronous setting, Nash equilibrium is not quite the right solution concept. Rather, we must consider ex post Nash equilibrium; this means that we have a Nash equilibrium no matter what a scheduling adversary does. We show that ex post Nash equilibrium is attainable in the asynchronous setting in all the networks we consider, using a protocol with bounded running time. However, in the asynchronous setting, we require that n > 2. We can get a fair -Nash equilibrium if n = 2 in the asynchronous setting, under some cryptographic assumptions (specifically, the existence of a pseudo-random number generator and polynomially-bounded agents), using ideas from bit-commitment protocols. We then generalize these results to a setting where we can have deviations by a coalition of size k. In this case, we can get what we call a fair k-resilient equilibrium if n > 2k; under the same cryptographic assumptions, we can a get a k-resilient equilibrium if n = 2k. Finally, we show that, under minimal assumptions, not only do our protocols give a Nash equilibrium, they also give a sequential equilibrium [Kreps and Wilson 1982], so players even play optimally off the equilibrium path.
“…For one thing, work has continued on secret sharing and multiparty computation, taking faulty and rational behavior into account (e.g., [Abraham, Dolev, Gonen, and Halpern 2006;Dani, Movahedi, Rodriguez, and Saia 2011;Fuchsbauer, Katz, and Naccache 2010;Gordon and Katz 2006;Lysyanskaya and Triandopoulos 2006]). There has also been work on when and whether a problem that can be solved with a trusted third party can be converted to one that can be solved using cheap talk, without a third party, a problem that has also attracted the attention of game theorists (e.g., [Abraham, Dolev, Gonen, and Halpern 2006;Abraham, Dolev, and Halpern 2008;Barany 1992;Ben-Porath 2003;Dodis, Halevi, and Rabin 2000;Forges 1990;Heller 2005;Izmalkov, Lepinski, and Micali 2011;Lepinski, Micali, Peikert, and Shelat 2004;McGrew, Porter, and Shoham 2003;Shoham and Tennenholtz 2005;Urbano and Vila 2002;Urbano and Vila 2004]). This is relevant because there are a number of well-known distributed computing problems that can be solved easily by means of a "trusted" mediator.…”
We do a game-theoretic analysis of leader election, under the assumption that each agent prefers to have some leader than to have no leader at all. We show that it is possible to obtain a fair Nash equilibrium, where each agent has an equal probability of being elected leader, in a completely connected network, in a bidirectional ring, and a unidirectional ring, in the synchronous setting. In the asynchronous setting, Nash equilibrium is not quite the right solution concept. Rather, we must consider ex post Nash equilibrium; this means that we have a Nash equilibrium no matter what a scheduling adversary does. We show that ex post Nash equilibrium is attainable in the asynchronous setting in all the networks we consider, using a protocol with bounded running time. However, in the asynchronous setting, we require that n > 2. We can get a fair -Nash equilibrium if n = 2 in the asynchronous setting, under some cryptographic assumptions (specifically, the existence of a pseudo-random number generator and polynomially-bounded agents), using ideas from bit-commitment protocols. We then generalize these results to a setting where we can have deviations by a coalition of size k. In this case, we can get what we call a fair k-resilient equilibrium if n > 2k; under the same cryptographic assumptions, we can a get a k-resilient equilibrium if n = 2k. Finally, we show that, under minimal assumptions, not only do our protocols give a Nash equilibrium, they also give a sequential equilibrium [Kreps and Wilson 1982], so players even play optimally off the equilibrium path.
“…At the same time, another line of research has shown applicative and theoretical results for cooperative services for what is known as the BAR model (Byzantine, acquiescent [33] and rational) [5,26,33] . Another related line of research asks whether a problem that can be solved with a mediator can be converted to a cheap talk based solution [2,3,6,7,9,11,21,22,24,29,30,31]. This approach is very strong because there are many results that are based on a mediator, which other players cannot trust under the rationality assumption, if we can convert mediator based protocols to be based on cheap talk, many of the previous works that do not assume rationality may become relevant under this assumption.…”
Following [4] we extend and generalize the game-theoretic model of distributed computing, identifying different utility functions that encompass different potential preferences of players in a distributed system. A good distributed algorithm in the game-theoretic context is one that prohibits the agents (processors with interests) from deviating from the protocol; any deviation would result in the agent losing, i.e., reducing its utility at the end of the algorithm. We distinguish between different utility functions in the context of distributed algorithms, e.g., utilities based on communication preference, solution preference, and output preference. Given these preferences we construct two basic building blocks for game theoretic distributed algorithms, a wake-up building block resilient to any preference and in particular to the communication preference (to which previous wake-up solutions were not resilient), and a knowledge sharing building block that is resilient to any and in particular to solution and output preferences. Using the building blocks we present several new algorithms for consensus, and renaming as well as a modular presentation of the leader election algorithm of [4].
“…Ben-Porath (1998) does not rely on any cryptographic tool, but obtains a similar result by allowing the players to make use of urns or envelopes while they talk. Generalizations to games with incomplete information are proposed by Krishna (2007) and Izmalkov et al (2011) for the latter approach, and by Urbano and Vila (2004) for the cryptographic approach. The common feature of these solutions (as opposed to ours) is that at every stage, cheap talk is relaxed in some way: limited computational ability or physical hard devices are used to exchange messages at every stage.…”
Section: Can All Canonical Communication Equilibrium Outcomes Be Implmentioning
We show that essentially every communication equilibrium of any finite Bayesian game with two players can be implemented as a strategic form correlated equilibrium of an extended game, in which before choosing actions as in the Bayesian game, the players engage in a possibly infinitely long (but in equilibrium almost surely finite), direct, cheap talk.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.