Games Computers (and Computer Scientists) Play Avi Wigderson.

Slides:



Advertisements
Similar presentations
Wonders of the Digital Envelope
Advertisements

Nash’s Theorem Theorem (Nash, 1951): Every finite game (finite number of players, finite number of pure strategies) has at least one mixed-strategy Nash.
Lecturer: Moni Naor Algorithmic Game Theory Uri Feige Robi Krauthgamer Moni Naor Lecture 8: Regret Minimization.
Sep. 8, 2014 Lirong Xia Introduction to MD (mooncake design or mechanism design)
Calibrated Learning and Correlated Equilibrium By: Dean Foster and Rakesh Vohra Presented by: Jason Sorensen.
An Introduction to... Evolutionary Game Theory
MIT and James Orlin © Game Theory 2-person 0-sum (or constant sum) game theory 2-person game theory (e.g., prisoner’s dilemma)
Game Theory 1. Game Theory and Mechanism Design Game theory to analyze strategic behavior: Given a strategic environment (a “game”), and an assumption.
Shengyu Zhang The Chinese University of Hong Kong.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
Game Theory Eduardo Costa. Contents What is game theory? Representation of games Types of games Applications of game theory Interesting Examples.
Seminar In Game Theory Algorithms, TAU, Agenda  Introduction  Computational Complexity  Incentive Compatible Mechanism  LP Relaxation & Walrasian.
Short course on quantum computing Andris Ambainis University of Latvia.
An Introduction to Game Theory Part I: Strategic Games
SARANI SAHABHATTACHARYA, HSS ARNAB BHATTACHARYA, CSE 07 JAN, 2009 Game Theory and its Applications.
GAME THEORY By Ben Cutting & Rohit Venkat. Game Theory: General Definition  Mathematical decision making tool  Used to analyze a competitive situation.
Proof, Computation, & Randomness Kurt Gödel John von Neumann and Theoretical Computer Science Avi Wigderson School of Mathematics Institute for Advanced.
Eponine Lupo.  Game Theory is a mathematical theory that deals with models of conflict and cooperation.  It is a precise and logical description of.
Slide 1 of 13 So... What’s Game Theory? Game theory refers to a branch of applied math that deals with the strategic interactions between various ‘agents’,
Algoritmi per Sistemi Distribuiti Strategici
Lecture 1 - Introduction 1.  Introduction to Game Theory  Basic Game Theory Examples  Strategic Games  More Game Theory Examples  Equilibrium  Mixed.
Review: Game theory Dominant strategy Nash equilibrium
Agent Technology for e-Commerce Chapter 10: Mechanism Design Maria Fasli
1 Introduction APEC 8205: Applied Game Theory. 2 Objectives Distinguishing Characteristics of a Game Common Elements of a Game Distinction Between Cooperative.
Advanced Microeconomics Instructors: Wojtek Dorabialski & Olga Kiuila Lectures: Mon. & Wed. 9:45 – 11:20 room 201 Office hours: Mon. & Wed. 9:15 – 9:45.
UNIT II: The Basic Theory Zero-sum Games Nonzero-sum Games Nash Equilibrium: Properties and Problems Bargaining Games Bargaining and Negotiation Review.
Introduction to Game Theory and Behavior Networked Life CIS 112 Spring 2009 Prof. Michael Kearns.
Algorithms, Games and the Internet Christos H. Papadimitriou UC Berkeley
Games of Chance Introduction to Artificial Intelligence COS302 Michael L. Littman Fall 2001.
Competitive Analysis of Incentive Compatible On-Line Auctions Ron Lavi and Noam Nisan SISL/IST, Cal-Tech Hebrew University.
Game Theory April 9, Prisoner’s Dilemma  One-shot, simultaneous game  Nash Equilibrium (individually rational strategies) is not Pareto Optimal.
Communication Networks A Second Course Jean Walrand Department of EECS University of California at Berkeley.
UNIT II: The Basic Theory Zero-sum Games Nonzero-sum Games Nash Equilibrium: Properties and Problems Bargaining Games Bargaining and Negotiation Review.
6.896: Topics in Algorithmic Game Theory Spring 2010 Constantinos Daskalakis vol. 1:
Experts Learning and The Minimax Theorem for Zero-Sum Games Maria Florina Balcan December 8th 2011.
Minimax strategies, Nash equilibria, correlated equilibria Vincent Conitzer
1. problem set 6 from Osborne’s Introd. To G.T. p.210 Ex p.234 Ex p.337 Ex. 26,27 from Binmore’s Fun and Games.
How to play ANY mental game
Chapter 9 Games with Imperfect Information Bayesian Games.
CPS 173 Mechanism design Vincent Conitzer
Randomness (and Pseudorandomness) Avi Wigderson IAS, Princeton
Introduction 1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A.
© 2009 Institute of Information Management National Chiao Tung University Lecture Note II-3 Static Games of Incomplete Information Static Bayesian Game.
A quantum protocol for sampling correlated equilibria unconditionally and without a mediator Iordanis Kerenidis, LIAFA, Univ Paris 7, and CNRS Shengyu.
Agents that can play multi-player games. Recall: Single-player, fully-observable, deterministic game agents An agent that plays Peg Solitaire involves.
Wonders of the Digital Envelope Avi Wigderson Institute for Advanced Study.
Mechanism Design CS 886 Electronic Market Design University of Waterloo.
Standard and Extended Form Games A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor, SIUC.
Slide 1 Vitaly Shmatikov CS 380S Introduction to Secure Multi-Party Computation.
Peter van Emde Boas: Games and Computer Science 1999 GAMES AND COMPUTER SCIENCE Theoretical Models 1999 Peter van Emde Boas References available at:
The Design & Analysis of the Algorithms Lecture by me M. Sakalli Download two pdf files..
Regret Minimizing Equilibria of Games with Strict Type Uncertainty Stony Brook Conference on Game Theory Nathanaël Hyafil and Craig Boutilier Department.
1 Topics covered in the course Games in extensive and strategic (normal form) Games in extensive and strategic (normal form) Backwards induction (zermelo’s.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Networks and Games Christos H. Papadimitriou UC Berkeley christos.
Mixed Strategies and Repeated Games
1 What is Game Theory About? r Analysis of situations where conflict of interests is present r Goal is to prescribe how conflicts can be resolved 2 2 r.
Lecture 12. Game theory So far we discussed: roulette and blackjack Roulette: – Outcomes completely independent and random – Very little strategy (even.
5.1.Static Games of Incomplete Information
When Can Limited Randomness Be Used in Repeated Games? Moni Naor Weizmann Institute of Science Joint work with Pavel Hubáček and Jon Ullman Columbia University.
Advanced Subjects in GT Outline of the tutorials Static Games of Complete Information Introduction to games Normal-form (strategic-form) representation.
Game Theory By Ben Cutting & Rohit Venkat.
CPS Mechanism design Michael Albert and Vincent Conitzer
Cryptography and Pseudorandomness
Instructor: Ruta Mehta TA: TBA
Vincent Conitzer Mechanism design Vincent Conitzer
Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer
Economics and Computation
M9302 Mathematical Models in Economics
Normal Form (Matrix) Games
Presentation transcript:

Games Computers (and Computer Scientists) Play Avi Wigderson

Games Computer Science Game Theory = Information Processing by Computers Agents Competing Cooperating Faulty Colluding Secretive Adversarial Computationally Bounded Communicating Digitally

Plan Complexity of Games Implementation of Games Design of Games Games against Clairvoyance

Complexity of Games

Theorem [Zermelo] : In every finite win/lose perfect information 2-player game, White or Black can force a win. Extensive Form Question: Can a winning strategy be efficiently computed?

Rectangle Game m n m=4 n= Theorem: White has a winning strategy. Proof: Assume Black has a winning strategy. Then White can mimic it and win. Contradiction! Question: What is the winning strategy? 4 5 1

Zero-Sum Games Matching Pennies (simultaneous play) H HT T Strategic Form “ Best ” strategy for each player is to flip a fair coin. Game value is m n v ij -v ij i j Theorem [von Neumann ‘28]: Every 0-sum game has a (Min-Max) value. Question: Can the value, strategies be computed? Theorem [Khachian ‘80]: Yes – Efficient linear programming algorithm.

Nash Equilibrium Chicken [Aumann] C CD D Strategic Form Probabilistic strategies (S w, S b ). Nash Equilibrium: No player has an incentive to change its strategy given the opponent’s strategy. here S w =S b = [C with prob ¾, D with prob ¼] Theorem [Nash]: Every (matrix) game has an equilibrium. Question: Can the players compute (any) equilibrium? Best known algorithm: exponential time (infeasible).

Implementing Games

The Millionaires’ Problem AliceBob BA Both want to know who is richer Neither gets any other information Question: Is that possible?

Joint random decisions CD C D Nash eq. With Independent Strategies Nash eq. With Correlated Strategies [Aumann] 3/4 1/4 3/41/4 Expected value = 3/4 Prob[CC] = 9/16 Prob[CD] = 3/16 Prob[DC] = 3/16 Prob[DD] = 1/16 Prob[CD] = 1/2 Prob[DC] = 1/2 Prob[CC] = 0 Prob[DD] = 0 Expected value = 1 Question: How to flip a coin jointly?

Simultaneity HT H T 1/2 Expected value = 0 (if they play simultaneously) Question: How do we guarantee simultaneity? xWxW xBxB A computational representation: outcome Parity Function x W x B Parity(x W, x B ) P

Privacy vs. Resilience Q 1 : How to guarantee x 1  5? Q 2 : How to guarantee x 1 remains private? Majority Function x1x1 x3x3 x 1 x 2 x 3 Majority(x 1, x 2, x 3 ) Voting M x2x2 Millionaire ’ s Problem Poker Any game

Completeness Theorem Every game, with any secrecy requirements, can be digitally implemented s.t. no collusion of the bad players can affect: * correctness (rules, outcome) * privacy (no information leaks) Theorem [Yao, Goldreich – Micali – Wigderson]: 1.More than 1/2 of the players are honest 2.Players computationally bounded 3.Trap-door functions exist (e.g. factoring integers is hard) Hard problems can be useful!

Correct & Private digital implementation Secrets Preferences Strategies Trusted party Ideal implementation 12n s1s1 s2s2 snsn Internet Digital implementation

How to ensure Privacy Oblivious Computation [Yao] f(inputs) PMP MP P 1

How to ensure Correctness Definition [Goldwasser-Micali-Rackoff]: zero-knowledge proofs: Convincing Reveal no information Theorem [Goldreich-Micali-Wigderson]: Every provable mathematical statement has a zero-knowledge proof. Corollary: Players can be forced to act legally, without fear of compromising secrets.

Where is Waldo? [Naor]

Designing Games

How to minimze players ’ influence Public Information Model [Ben-Or—Linial] : Joint random coin flipping Every good player flips, then combine Function Influence Parity 1 Majority 1/7 P parity M majority M MM M Iterated Majority 1/8 Theorem [Kahn—Kalai—Linial] : For every function, some player has non-proportional influence. Theorem [Alon—Naor] : There are “multi-round” functions for which no player has non-proportional influence.

How to achieve cooperation, efficiency, truthfulness Players (agents) are selfish Auction Question: How to get players to bid their true values? Theorem [Clarke — Groves — Vickery]: 2 nd price auction achieves truthfulness. Internet Games Question: How to get players to cooperate? [Nisan]: Distributed algorithmic mechanism design. [Papadimitriou]: Algorithms, Games & the Internet New CS Issues: Pricing, incentives New GT Issues: Complexity, Algorithms

Coping with Uncertainty Competing against Clairvoyance

On-line Problems Investor ’ s Problem (One-way trading) day price Profit/loss Muggle ’ s action Wizard ’ s action

On-line problems are everywhere: Computer operating systems Taxi dispatchers Investors ’ decisions Battle decisions

Competitive Analysis [Tarjan — Slator]: For every sequence of events, Bound the competitive ratio: muggle-cost(sequence) wizard-cost(sequence) Can be achieved in many settings. Huge, successful theory. “ Online Computation and Competitive Analysis ” [Borodin — El-Yaniv]

... Nature... Alice Nature... Alice Bob Information Sets Player’s action depends only on its information set Every Game? Any secrecy requirements? Incomplete information Game in Extensive form

Completeness Theorems Every game, with any secrecy requirements, can be digitally implemented s.t. no collusion of the bad players can affect: * correctness (rules, outcome) * privacy (no information leaks) Theorem [Yao, Goldreich – Micali – Wigderson]: 1.More than 1/2 are honest 2.Players computationally bounded 3.Trap-door functions exist (e.g. factoring integers is hard) Theorem [Ben-Or – Goldwasser – Wigderson]: 1 ’. 2 ’. At least 3 players, more than 2/3 are honest 3 ’. Private pairwise communication