Contextually Private Mechanisms

@article{Haupt2022ContextuallyPM,
  title={Contextually Private Mechanisms},
  author={Andrea B. Haupt and Zo{\"e} Hitzig},
  journal={Proceedings of the 23rd ACM Conference on Economics and Computation},
  year={2022}
}
  • A. Haupt, Zoë Hitzig
  • Published 20 December 2021
  • Computer Science
  • Proceedings of the 23rd ACM Conference on Economics and Computation
Consider a mechanism design environment in which a designer sequentially queries agents' private information to determine the outcome of a choice rule. The designer's social and technological environment constrains the set of access protocols that it can use. In high-tech environments, arbitrary cryptographic protocols are admissible, and so privacy concerns do not constrain the set of available choice rules. In other environments, privacy desiderata are needed to guide design. A protocol is… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 61 REFERENCES

Unconditional privacy in social choice

It is proved that there exists no SWF that is non-dictatorial, Paretian, monotonic, and privately computable (any three of these properties can be achieved) and it is shown that replacing privacy with anonymity enables the joint computation of arbitrary symmetric SWFs.

Mechanism Design via Differential Privacy

It is shown that the recent notion of differential privacv, in addition to its own intrinsic virtue, can ensure that participants have limited effect on the outcome of the mechanism, and as a consequence have limited incentive to lie.

Privacy-aware mechanism design

A new model of privacy-aware agents where agents need only have a conservative upper bound on how loss of privacy adversely affects their utility is proposed, in deviation from prior modeling which required full characterization.

On the Existence of Unconditionally Privacy-Preserving Auction Protocols

It turns out that the first-price sealed-bid auction can be emulated by an unconditionally fully private protocol, but the protocol's round complexity is exponential in the bid size, and there is no more efficient protocol.

Bayesian privacy

Modern information technologies make it possible to store, analyze, and trade unprecedented amounts of detailed information about individuals. This has led to public discussions on whether

Strategy-Proof Allocation Mechanisms at Differentiable Points

Consider allocation mechanisms that are single valued and where each agent's strategy space is a set of a priori admissible utility functions. Such an allocation mechanism is strategy-proof if, for

Privacy and mechanism design

This paper is a survey of recent work at the intersection of mechanism design and privacy. The connection is a natural one, but its study has been jump-started in recent years by the advent of

A Theory of Simplicity in Games and Mechanism Design

A general class of simplicity standards that vary the foresight abilities required of agents in extensive-form games are introduced, and the widespread popularity of the well-known Random Priority mechanism is explained by characterizing it as the unique mechanism that is efficient, fair, and simple to play.

Menu Mechanisms

We investigate menu mechanisms: dynamic mechanisms where at each history, an agent selects from a menu of his possible assignments. We consider both ex-post implementation and full implementation,
...