Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An Equilibrium Analysis of Scrip Systems

Published: 23 June 2015 Publication History

Abstract

A game-theoretic model of scrip (artificial currency) systems is analyzed. It is shown that relative entropy can be used to characterize the distribution of agent wealth when all agents use threshold strategies—that is, they volunteer to do work if and only if they have below a threshold amount of money. Monotonicity of agents' best-reply functions is used to show that scrip systems have pure strategy equilibria where all agents use threshold strategies. An algorithm is given that can compute such an equilibrium and the resulting distribution of wealth.

References

[1]
E. Adar and B. A. Huberman. 2000. Free riding on Gnutella. First Monday 5, 10 (2000).
[2]
S. Adlakha and R. Johari. 2010. Mean field equilibrium in dynamic games with complementarities. In Proceedings of the 49th IEEE Conference on Decision and Control (CDC). 6633--6638.
[3]
S. Adlakha, R. Johari, G. Y. Weintraub, and A. Goldsmith. 2010. Mean field analysis for large population stochastic games. In Proceedings of the 49th IEEE Conference on Decision and Control (CDC).
[4]
K. G. Anagnostakis and M. Greenwald. 2004. Exchange-based incentive mechanisms for peer-to-peer file sharing. In Proceedings of the International Conference on Distributed Computing Systems (ICDCS). 524--533.
[5]
C. Aperjis, M. J. Freedman, and R. Johari. 2008. Peer-assisted content distribution with prices. In Proceedings of the ACM Conference on Emerging Network Experiment and Technology (CoNEXT). Article 17.
[6]
C. Aperjis and R. Johari. 2006. A peer-to-peer system as an exchange economy. In Proceedings of the Workshop on Game Theory for Communications and Networks (Game Nets'06).
[7]
A. AuYoung, B. Chun, C. Ng, D. Parkes, A. Vahdat, and A. Snoeren. 2007. Practical market-based resource allocation. Technical Report, CS2007-0901 University of California San Diego.
[8]
M. Belenkiy, M. Chase, C. C. Erway, J. Jannotti, A. Küpçü, A. Lysyanskaya, and E. Rachlin. 2007. Making P2P accountable without losing privacy. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES). 31--40.
[9]
A. Berentsen. 2002. On the distribution of money holdings in a random-matching model. Int. Econ. Rev. 43, 3 (2002), 945--954.
[10]
A. Berentsen and G. Rocheteau. 2002. On the efficiency of monetary exchange: How divisibility of money matters. J. Monetary Econ. 49, 8 (2002), 1621--1649.
[11]
O. J. Blanchard and S. Fischer. 1989. Lectures on Macroeconomics. The MIT Press, Cambridge, MA.
[12]
J. Brunelle, P. Hurst, J. Huth, L. Kang, C. Ng, D. Parkes, M. Seltzer, J. Shank, and S. Youssef. 2006. EGG: An extensible and economics-inspired open grid computing platform. In Proceedings of the 3rd Workshop on Grid Economics and Business Models (GECON). 140--150.
[13]
B. Chun, P. Buonadonna, A. AuYoung, C. Ng, D. Parkes, J. Schneidman, A. Snoeren, and A. Vahdat. 2005. Mirage: A microeconomic resource allocation system for SensorNet testbeds. In Proceedings of the 2nd IEEE Workshop on Embedded Networked Sensors. 19--28.
[14]
B. Cohen. 2003. Incentives build robustness in BitTorrent. In Proceedings of the 1st Workshop on the Economics of Peer-to-Peer Systems (P2PECON).
[15]
T. Cover and J. Thomas. 1991. Elements of Information Theory. John Wiley & Sons, Inc., New York.
[16]
P. Dandekar, A. Goel, R. Govindan, and I. Post. 2011. Liquidity in credit networks: a little trust goes a long way. In Proceedings of the 12th ACM Conference on Electronic Commerce (EC). ACM, New York, NY, 147--156.
[17]
G. Ellison. 1994. Cooperation in the prisoner's dilemma with anonymous random matching. Rev. Econ. Stud. 61 (1994), 567--588.
[18]
M. Feldman, K. Lai, I. Stoica, and J. Chuang. 2004. Robust incentive techniques for peer-to-peer networks. In Proceedings of the ACM Conference on Electronic Commerce (EC). 102--111.
[19]
Eric. J. Friedman, Joseph. Y. Halpern, and Ian A. Kash. 2006. Efficiency and Nash equilibria in a scrip system for P2P networks. In Proceedings of the 7th ACM Conference on Electronic Commerce (EC). 140--149.
[20]
E. J. Friedman and P. Resnick. 2001. The social cost of cheap pseudonyms. J. Econ. Manag. Strategy 10, 2 (2001), 173--199.
[21]
D. Fudenberg and J. Tirole. 1991. Game Theory. MIT Press, Cambridge, MA.
[22]
E. J. Green and R. Zhou. 1998. A rudimentary random-matching model with divisible money and prices. J. Econ. Theory 81, 2 (1998), 252--271.
[23]
E. J. Green and R. Zhou. 2002. Dynamic monetary equilibrium in a random matching economy. Econometrica 70, 3 (2002), 929--969.
[24]
A. J. Grove, J. Y. Halpern, and D. Koller. 1994. Random worlds and maximum entropy. J. Artif. Intell. Res. (JAIR) 2 (1994), 33--88.
[25]
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the Conference on the World Wide Web (WWW). 403--412.
[26]
M. Gupta, P. Judge, and M. H. Ammar. 2003. A reputation system for peer-to-peer networks. In Proceedings of the Annual ACM SIGMM Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV). 144--152.
[27]
T. Hens, K. R. Schenk-Hoppe, and B. Vogt. 2007. The great Capitol Hill babysitting co-op: Anecdote or evidence for the optimum quantity of money? J. Money, Credit Bank. 9, 6 (2007), 1305--1333.
[28]
M. Humbert, H. Manshaei, and J.-P. Hubaux. 2011. One-to-n scrip systems for cooperative privacy-enhancing technologies. In Proceedings of the, 49th Annual Allerton Conference on Communication, Control, and Computing. 682--692.
[29]
J. Ioannidis, S. Ioannidis, A. D. Keromytis, and V. Prevelakis. 2002. Fileteller: Paying and getting paid for file storage. In Proceedings of the 6th International Conference on Financial Cryptography. Lecture Notes in Computer Science, Vol. 2357, Springer, 282--299.
[30]
E. T. Jaynes. 1978. Where do we stand on maximum entropy? In The Maximum Entropy Formalism, R. D. Levine and M. Tribus (Eds.), MIT Press, Cambridge, MA., 15--118.
[31]
K. Johnson, D. Simchi-Levi, and P. Sun. 2014. Analyzing scrip systems. Oper. Res. 62, 3 (2014), 524--534.
[32]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. 2003. The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the Conference on the World Wide Web (WWW). 640--651.
[33]
M. Kandori. 1992. Social norms and community enforcement. Rev. Econ. Stud. 59 (1992), 63--80.
[34]
I. A. Kash, E. J. Friedman, and J. Y. Halpern. 2007. Optimizing scrip systems: Efficiency, crashes, hoarders and altruists. In Proceedings of the 8th ACM Conference on Electronic Commerce (EC). 305--315.
[35]
I. A. Kash, E. J. Friedman, and J. Y. Halpern. 2009. Manipulating scrip systems: Sybils and collusion. In Proceedings of the 1st Conference on Auctions, Market Mechanisms and their Applications (AMMA). 13--24.
[36]
I. A. Kash, E. J. Friedman, and J. Y. Halpern. 2012. Optimizing scrip systems: Crashes, altruists, hoarders, sybils and collusion. Distrib. Comput. 25, 5 (2012), 335--357.
[37]
N. Kiyotaki and R. Wright. 1989. On money as a medium of exchange. J. Polit. Econ. 97, 4 (1989), 927--954. http://www.jstor.org/stable/1832197.
[38]
L. Lovasz and P. Winkler. 1995. Mixing of random walks and other diffusions on a graph. In Surveys in Combinatorics, P. Rowlinson (Ed.), Cambridge University Press, 119--154. citeseer.csail.mit.edu/lovasz95mixing.html.
[39]
G. Mainland, L. Kang, S. Lahaie, D. C. Parkes, and M. Welsh. 2004. Using virtual markets to program global behavior in sensor networks. In Proceedings of the 11th ACM SIGOPS European Workshop.
[40]
A. Mas-Colell, M. D. Whinston, and J. R. Green. 1995. Microeconomic Theory. Oxford University Press, Oxford.
[41]
P. Milgrom and J. Roberts. 1990. Rationalizability, learning, and equilibrium in games with strategic complementarities. Econometrica 58, 6 (1990), 1255--1277.
[42]
M. S. Miller and K. E. Drexler. 1988. Markets and computation: Agoric open systems. In The Ecology of Computation, B. Huberman (Ed.), Elsevier, 133--175.
[43]
C. Ng, P. Buonadonna, B. Chun, A. Snoeren, and A. Vahdat. 2005. Addressing strategic behavior in a deployed microeconomic resource allocator. In Proceedings of the 3rd Workshop on Economics of Peer-to-Peer Systems (P2PECON). 99--104.
[44]
R. S. Peterson and E. Gün Sirer. 2009. AntFarm: Efficient content distribution with managed swarms. In Proceedings of the 6th USENIX Symposium Networked Systems Design and Implementation (NSDI).
[45]
M. Piatek, T. Isdal, A. Krishnamurthy, and T. E. Anderson. 2008. One hop reputations for peer to peer file sharing workloads. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 1--14.
[46]
M. L. Puterman. 1994. Markov Decision Processes. Wiley.
[47]
R. Rahman, D. Hales, T. Vinko, J. A. Pouwelse, and H. J. Sips. 2010. No more crash or crunch: Sustainable credit dynamics in a P2P community. In Proceedings of the International Conference on High Performance Computing and Simulation (HPCS). 332--340.
[48]
D. M. Reeves, B. M. Soule, and T. Kasturi. 2007. Yootopia! ACM SIGecom Exchanges 6, 2 (2007), 1--26.
[49]
S. I. Resnick. 1992. Adventures in Stochastic Processes. Birkhauser.
[50]
T. Roughgarden and É. Tardos. 2002. How bad is selfish routing? J. ACM 49, 2 (2002), 236--259.
[51]
M. Sirivianos, J. Han Park, X. Yang, and S. Jarecki. 2007. Dandelion: Cooperative content distribution with robust incentives. In Proceeding of the USENIX Annual Technical Conference. 157--170.
[52]
M. Stonebraker, P. M. Aoki, W. Litwin, A. Pfeffer, A. Sah, J. Sidell, C. Stelin, and A. Yu. 1996. Mariposa: A wide-area distributed database system. VLDB J. 5, 1 (1996), 48--63.
[53]
I. E. Sutherland. 1968. A futures market in computer time. Commun. ACM 11, 6 (1968), 449--451.
[54]
A. Tarski. 1955. A lattice-theoretical fixpoint theorem and its applications. Pacific J. Math. 5 (1955), 285--309.
[55]
R. H. Timberlake. 1987. Private production of scrip-money in the isolated community. J. Money, Credit Ban. 19, 4 (1987), 437--447.
[56]
D. M. Topkis. 1979. Equilibrium points in nonzero-sum n-person submodular games. SIAM J. Control Optim. 17 (1979), 773--787.
[57]
M. van der Schaar, J. Xu, and W. Zame. 2013. Efficient online exchange via fiat money. Econ. Theory 54, 2 (2013), 211--248.
[58]
V. Vishnumurthy, S. Chandrakumar, and E. G. Sirer. 2003. KARMA: A secure economic framework for peer-to-peer resource sharing. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems (P2PECON).
[59]
Washington Metropolitan Area Transit Commission. 1970. Scrip System of the D.C. Transit System. Washington Metropolitan Area Transit Commission.
[60]
G. Y. Weintraub, C. Lanier Benkard, and B. Van Roy. 2011. Industry dynamics: Foundations for models with an infinite number of firms. J. Econ. Theory 146, 5 (2011), 1965--1994.
[61]
G. Y. Weintraub, C. Lanier Benkard, and B. Van Roy. 2008. Markov perfect industry dynamics with many firms. Econometrica 76, 6 (2008), 1375--1411.
[62]
G. Y. Weintraub, C. Lanier Benkard, and B. Van Roy. 2010. Computational methods for oblivious equilibrium. Oper. Res. 58, 4:2 (2010), 1247--1265.
[63]
L. Xiong and L. Liu. 2002. Building trust in decentralized peer-to-peer electronic communities. In Proceedings of the International Conference on Electronic Commerce Research (ICECR).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Economics and Computation
ACM Transactions on Economics and Computation  Volume 3, Issue 3
June 2015
100 pages
ISSN:2167-8375
EISSN:2167-8383
DOI:10.1145/2795422
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 June 2015
Accepted: 01 July 2014
Revised: 01 May 2013
Received: 01 April 2012
Published in TEAC Volume 3, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Artificial currency
  2. P2P networks
  3. game theory
  4. scrip systems

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • DoD Multidisciplinary University Research Initiative (MURI) program administered by the ONR
  • ONR
  • NSF
  • AFOSR

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Incentivizing Resource PoolingSSRN Electronic Journal10.2139/ssrn.4586771Online publication date: 2023
  • (2022)The Allocation of Food to Food BanksJournal of Political Economy10.1086/720332130:8(1993-2017)Online publication date: 1-Aug-2022
  • (2021)Kidney ExchangeManagement Science10.1287/mnsc.2020.395467:9(5455-5478)Online publication date: 1-Sep-2021
  • (2019)Incentive-compatible mechanisms for norm monitoring in open multi-agent systemsJournal of Artificial Intelligence Research10.1613/jair.1.1121462:1(433-458)Online publication date: 17-Apr-2019
  • (2019)Multiagent Mechanism Design Without MoneyOperations Research10.1287/opre.2018.182067:5(1417-1436)Online publication date: 1-Sep-2019
  • (2018)Incentive-compatible mechanisms for norm monitoring in open multi-agent systems (extended abstract)Proceedings of the 27th International Joint Conference on Artificial Intelligence10.5555/3304652.3304796(5543-5547)Online publication date: 13-Jul-2018
  • (2018)Technical Note-Analysis of Scrip SystemsOperations Research10.1287/opre.2017.168966:3(611-619)Online publication date: 1-Jun-2018
  • (2018)DogFish: Decentralized Optimistic Game-theoretic FIle SHaringApplied Cryptography and Network Security10.1007/978-3-319-93387-0_36(696-714)Online publication date: 2-Jul-2018
  • (2017)Incentivising monitoring in open normative systemsProceedings of the Thirty-First AAAI Conference on Artificial Intelligence10.5555/3298239.3298287(305-311)Online publication date: 4-Feb-2017
  • (undefined)Multi-Agent Mechanism Design without MoneySSRN Electronic Journal10.2139/ssrn.2928854

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media