# Mechanism Design via Differential Privacy

@article{McSherry2007MechanismDV, title={Mechanism Design via Differential Privacy}, author={Frank McSherry and Kunal Talwar}, journal={48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)}, year={2007}, pages={94-103} }

We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic agents, which must encourage players to honestly report information. Specifically, we show that the recent notion of differential privacv, in addition to its own intrinsic virtue, can ensure that participants have limited effect on the outcome of the mechanism, and as a consequence have limited incentive to lie. More… Expand

#### Topics from this paper

#### 1,647 Citations

Privacy-aware mechanism design

- Computer Science, Economics
- EC '12
- 2012

A new model of privacy-aware agents where agents need only have a conservative upper bound on how loss of privacy adversely affects their utility is proposed, in deviation from prior modeling which required full characterization. Expand

Truthful Mechanisms for Agents That Value Privacy

- Computer Science
- ACM Trans. Economics and Comput.
- 2016

This work proposes a new, general way of modeling privacy in players’ utility functions that only assumes that if an outcome o has the property that any report of player i would have led to o with approximately the same probability, then o has a small privacy cost to player i. Expand

Universally utility-maximizing privacy mechanisms

- Computer Science
- STOC '09
- 2009

Every potential user u, no matter what its side information and preferences, derives as much utility from M* as from interacting with a differentially private mechanism Mu that is optimally tailored to u, subject to differential privacy. Expand

A General Privacy-Preserving Auction Mechanism for Secondary Spectrum Markets

- Computer Science
- IEEE/ACM Transactions on Networking
- 2016

This paper presents PISA, which is a PrIvacy preserving and Strategy-proof Auction mechanism for spectrum allocation and extensively evaluate its performance, which shows that PISA achieves good spectrum allocation efficiency with light computation and communication overheads. Expand

Approximately optimal mechanism design via differential privacy

- Computer Science, Economics
- ITCS '12
- 2012

A generic mechanism that allows for approximate optimal implementation of insensitive objective functions in ex-post Nash equilibrium and if values are private then the same mechanism is strategy proof is designed. Expand

Truthful mechanisms for agents that value privacy

- Economics
- EC '13
- 2013

Recent work has constructed economic mechanisms that are both truthful and differentially private. In these mechanisms, privacy is treated separately from the truthfulness; it is not incorporated in… Expand

Approximately Optimal Mechanism Design Via Differential Privacy

- 2011

We study the implementation challenge in an abstract interdependent values model and an arbitrary objective function. We design a mechanism that allows for approximate optimal implementation of… Expand

Efficiency and Privacy Tradeoffs in Mechanism Design

- Computer Science
- AAAI
- 2011

This work analyzes the tradeoff between privacy and efficiency in second-price auctions and facility location problems and shows that sacrifices in efficiency can provide gains in privacy (and communication), in both the average and worst case. Expand

Extremal Mechanisms for Local Differential Privacy

- Computer Science, Mathematics
- J. Mach. Learn. Res.
- 2014

It is shown that for all information theoretic utility functions studied in this paper, maximizing utility is equivalent to solving a linear program, the outcome of which is the optimal staircase mechanism, which is universally optimal in the high and low privacy regimes. Expand

Mechanism design in large games: incentives and privacy

- Computer Science, Mathematics
- ITCS
- 2014

The main technical result is an algorithm for computing a correlated equilibrium of a large game while satisfying joint differential privacy, which ends up satisfying a strong privacy property as well. Expand

#### References

SHOWING 1-10 OF 62 REFERENCES

An approximate truthful mechanism for combinatorial auctions with single parameter agents

- Computer Science, Mathematics
- SODA '03
- 2003

This work devise a version of randomized rounding that is incentive compatible, giving a truthful mechanism for combinatorial auctions with single parameter agents (e.g., "single minded bidders") that approximately maximizes the social value of the auction. Expand

Algorithmic mechanism design (extended abstract)

- Computer Science
- STOC '99
- 1999

The standard tools of mechanism design are applied to algorithmic problems and in particular to the shortest path problem, for which the standard tools do not suffice, and several theorems regarding this problem are presented. Expand

Single-value combinatorial auctions and implementation in undominated strategies

- Mathematics, Computer Science
- SODA '06
- 2006

A general deterministic technique to decouple the algorithmic allocation problem from the strategic aspects, by a procedure that converts any algorithm to a dominant-strategy ascending mechanism, which achieves an approximation to the social welfare close to the best possible in polynomial time. Expand

Towards a characterization of truthful combinatorial auctions

- Mathematics, Computer Science
- 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings.
- 2003

It is shown that truthful mechanisms for combinatorial auctions (and related restricted domains) must be "almost affine maximizers" if they also satisfy an additional requirement of "independence of irrelevant alternatives" and this implies the near-helplessness of such truthful polynomial-time auctions in all cases where exact optimization is computationally intractable. Expand

Derandomization of auctions

- Mathematics, Computer Science
- STOC '05
- 2005

This work gives a fairly general derandomization technique for turning any randomized mechanism into an asymmetric deterministic one with approximately the same revenue and shows that asymmetry is nearly as powerful as randomization for solving optimal mechanism design problems. Expand

Truthful approximation mechanisms for restricted combinatorial auctions

- Computer Science, Economics
- Games Econ. Behav.
- 2002

A set of techniques are developed that allow constructing efficiently computable truthful mechanisms for combinatorial auctions in the special case where each bidder desires a specific known subset of items and only the valuation is unknown by the mechanism (the single parameter case). Expand

On the expected payment of mechanisms for task allocation

- Computer Science
- PODC '04
- 2004

A novel general protocol combining the advantages of incentive compatible and non-incentive compatible mechanisms is constructed and it is demonstrated that many task allocation problems can be reduced to shortest paths. Expand

Collusion-resistant mechanisms for single-parameter agents

- Computer Science
- SODA '05
- 2005

We consider the problem of designing mechanisms with the incentive property that no coalition of agents can engage in a collusive strategy that results in an increase in the combined utility of the… Expand

Incentive-compatible online auctions for digital goods

- Computer Science
- SODA '02
- 2002

This work defines a model for online auctions for digital goods and examines auctions in which bidders have an incentive to bid their true valuations, that is, incentive-compatible auctions, and gives a randomized auction which is within a factor O(exp√log log h) of the benchmark. Expand

Online ascending auctions for gradually expiring items

- Computer Science, Economics
- SODA '05
- 2005

This paper designs two auctions that perform well under a wide class of selfish, "semi-myopic", strategies, and suggests a new notion of "Set-Nash" equilibrium, where one cannot pin-point a single best- response strategy, but rather only a set of possible best-response strategies. Expand