Mechanism design via differential privacy

被引:1258
作者
McSherry, Frank
Talwar, Kunal
机构
来源
48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS | 2007年
关键词
D O I
10.1109/FOCS.2007.66
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic agents, which must encourage players to honestly report information. Specifically, we show that the recent notion of differential privacy [15, 14], in addition to its own intrinsic virtue, can ensure that participants have limited effect on the outcome of the mechanism, and as a consequence have limited incentive to lie. More precisely, mechanisms with differential privacy are approximate dominant strategy under arbitrary player utility functions, are automatically resilient to coalitions, and easily allow repeatability. We study several special cases of the unlimited supply auction problem, providing new results for digital goods auctions, attribute auctions, and auctions with arbitrary structural constraints on the prices. As an important prelude to developing a privacy-preserving auction mechanism, we introduce and study a generalization of previous privacy work that accommodates the high sensitivity of the auction setting, where a single participant may dramatically alter the optimal fixed price, and a slight change in the offered price may take the revenue from optimal to zero.
引用
收藏
页码:94 / 103
页数:10
相关论文
共 37 条
  • [1] ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
  • [2] Aggarwal Gagan, 2005, P 37 ANN ACM S THEOR, P619, DOI DOI 10.1145/1060590.1060682
  • [3] [Anonymous], S DISCRETE ALGORITHM
  • [4] Archer A, 2002, SIAM PROC S, P991
  • [5] Archer A, 2003, SIAM PROC S, P205
  • [6] BABIOFF M, 2006, SODA 0L, P1054
  • [7] Mechanism design via machine learning
    Balcan, MF
    Blum, A
    Hartline, JD
    Mansour, Y
    [J]. 46TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2005, : 605 - 614
  • [8] Bar-Yossef Z, 2002, SIAM PROC S, P964
  • [9] Weak monotonicity characterizes deterministic dominant-strategy implementation
    Bikhchandani, Sushil
    Chatterji, Shurojit
    Lavi, Ron
    Mu'alem, Ahuva
    Nisan, Noam
    Sen, Arunava
    [J]. ECONOMETRICA, 2006, 74 (04) : 1109 - 1132
  • [10] Online learning in online auctions
    Blum, A
    Kumar, V
    Rudra, A
    Wu, F
    [J]. THEORETICAL COMPUTER SCIENCE, 2004, 324 (2-3) : 137 - 146