Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Class 16: Auctions with Integrity

Class 16: Auctions with Integrity

Class 16: Auctions with Integrity
https://uvammm.github.io/class16

Markets, Mechanisms, and Machines
University of Virginia
cs4501/econ4559 Spring 2019
David Evans and Denis Nekipelov
https://uvammm.github.io/

Avatar for David Evans

David Evans

March 07, 2019
Tweet

More Decks by David Evans

Other Decks in Business

Transcript

  1. MARKETS, MECHANISMS, MACHINES University of Virginia, Spring 2019 Class 16:

    Auctions with Integrity 7 March 2019 cs4501/econ4559 Spring 2019 David Evans and Denis Nekipelov https://uvammm.github.io
  2. In-Class Auction Item for bid: +$1000 for your team’s budget

    for Project 4 Your bid is !", virtual dollars from the Project 4 budget Auction mechanism: winner: highest bid, pays !($), gets $1000 “loser”: second highest bid, pays !(&), gets nothing 1 Auction ends when last late student enters classroom (or at 9:59am). Bid by sending a slack message to #inclass: (team, bid) – to be valid, must increase previous bid by at least $1
  3. 3

  4. On-line Ad Auction Integrity How can we trust the auctioneer

    (Google, Facebook)? Verifiable Auctions Click Fraud 4
  5. Second Weighted-Price Auction Bidder Score Score-Weighted Bid Price !" #"

    !" #" !$ #$ /#" !$ #$ !$ #$ !& #& /#$ !& #& !& #& !' #' /#& … … … … 5 If auctioneer is unethical, short-term revenue maximizing, what should auctioneer charge winner?
  6. Verifiable Generalized Second-Price Auction Bidder Price !" !# !# !$

    !$ !% … … 6 Goal: Prove to winner bidder that !# is the correct price. Keep all bids other than the winners private.
  7. Verifiable Auction 7 Image from: Sebastian Angel and Michael Walfish,

    Verifiable Auctions for Online Ad Exchanges, SIGCOMM 2013. Seller: Winning Bidder: Auction outcome: ("#$$#$% &#''(), +)#,()
  8. Cryptographic Hash Function A cryptographic hash function, !(#), must satisfy

    these two properties: one-way (preimage resistance): given ℎ = !(#) it is hard to find preimage #. strong collision-resistance: hard to find any pair # and ' where !(#) = !('). 8
  9. Cryptographic Hash Function A cryptographic hash function, !(#), must satisfy

    these two properties: one-way (preimage resistance): given ℎ = !(#) it is hard to find preimage #. strong collision-resistance: hard to find any pair # and ' where !(#) = !('). 9 Ideal: “Random Oracle” Instantiation: SHA-256
  10. Implementing a Hash Function 10 IV K Å !1 #$

    Å ! 2 # 2 ... K Å !& '(!) = #+ Cipher Block Chaining Encrypt Encrypt Encrypt
  11. Hash Chain 12 Hash ! Hash Hash Hash "# =

    %#(!) "( ") "* … Assuming inverting is hard, what can you prove using "# ?
  12. Charge 13 “The best minds of my generation are thinking

    about how to make people click ads. That sucks.” Jeff Hammerbacher (Facebook → Cloudera → Mount Sinai Medicine)