A Crash Course in Implementation Theory
A Crash Course in Implementation Theory
A Crash Course in Implementation Theory
2001
9
9
9
9
Abstract. This paper is meant to familiarize the audience with some of the
fundamental results in the theory of implementation and provide a quick
progression to some open questions in the literature.
1 Introduction
There are many economic, social, and political situations where individuals interact to make decisions that aect them collectively. Examples range
from voting to elect representatives or choose a public policy, to trading in
a market. Based on their preferences over the possible outcomes of the interaction, individuals may act strategically in order to inuence the outcome to
their advantage. For instance, in an election a voter might vote for his or her
second ranked candidate if the voter's favorite candidate has no chance of
being elected; or in an auction a buyer may select a bid considering tradeos between the probability of winning the auction and the price to be paid.
The specic design of the institution through which individuals interact, for
instance the rules of the election or auction, can have a profound impact on
the strategic behavior of the members of the society and on the outcomes of
the process. Implementation theory is a study of the relationship between the
structure of the institution through which individuals interact and the outcome of that interaction.
This paper grew out of lectures given at the NATO Advanced Study Institute on
Game Theory and Resource Allocation: The Axiomatic Approach, which took place
at SUNY Stony Brook in July of 1997. I thank the organizers and especially William
Thomson for organizing the institute and the participants for feedback on the lectures.
I thank Salvador Barbera for detailed suggestions an earlier version of this manuscript,
and Maurice Salles and an anonymous referee for helpful comments.
656
M. O. Jackson
Game theory plays a central role in the modeling of the strategic interaction studied in implementation theory. In many applications of game theory,
the game modeling interaction is taken as given and analyzed to predict the
actions of individuals and the resulting outcome. In implementation theory,
instead of taking the game as given, it is something to be designed. Often, one
thinks of the desired outcomes as the given and analyses whether there exist
game forms for which the strategic properties induce individuals to (always)
choose actions that lead to the desired outcomes. An example of an implementation question is: how can we design an auction to be sure that the individual who most highly values an object is sure to be the winner of the auction?1 In this view, implementation theory is a normative branch and game
theory is a positive branch of the same tree, and implementation theory is the
design or reverse engineering process associated with game theory. Of course,
this view is a bit caricatured, but indicates that there is a close relationship
between the tools and understandings developed in implementation theory
and game theory.
To get a feeling for the type of questions that are analyzed in implementation theory let us start by looking at a classic example. Consider a society or
committee holding an election to select one out of a set of candidates. Each
member of the society has a preference ranking over the candidates. The society may have certain aspirations regarding which candidate should be
selected as a function of the preferences of the members of the society. For
instance, it may wish to avoid selecting a candidate who is Pareto dominated
by another candidate (i.e., a candidate ranked lower than another candidate
by all members of society). It may also wish to select a Condorcet winner (a
candidate who defeats any other candidate in a pairwise comparison according
to a majority of voters' preferences) if such a candidate exists. If these were the
goals of the society then the implementation question would be, ``Does there
exist an election procedure for which for each possible prole of preference
rankings of the voters, each equilibrium outcome of the election procedure
would be Pareto optimal and Condorcet consistent?''
In order to answer this question one has to make precise what an election
procedure is and what equilibrium outcomes are. This is the point at which
game theoretic tools are used. The election procedure is modeled as a game
form or what is commonly referred to as a mechanism in the literature. It
species a set of possible actions or messages that each member of society
can use, and then the outcome (in this case the candidate elected) as a function of the actions or messages sent by the members of society. For instance
one could have each member of society submit their ranking of the candidates. If there are m candidates, then one could award a candidate m points
for each voter whose submitted ranking places them highest, m 1 points
for each voter's submitted ranking places them second highest, and so on.
1 For an analysis of this particular problem from a mechanism design point of view,
see Dasgupta and Maskin (1997). I will discuss the relationship and dierence between
mechanism design and implementation.
Implementation theory
657
The elected candidate is the one who has the most points, with ties broken
according to some pre-specied rule. This is the mechanism corresponding to
Borda's (1781) scoring method. Of course, it may not be in a society member's
best interest to report their true preference ranking. This is where equilibrium
concepts from game theory are used to make predictions concerning strategic
behavior. A solution concept such as Nash equilibrium can be used to predict
the preference rankings that will be reported by voters as a function of the
voters' true preference rankings. Depending on the class of mechanisms that
are admitted (e.g., how complicated we allow the message spaces to be) and
which equilibrium concept that is used, we can end up with dierent answers
concerning the possibility of selecting Pareto optimal outcomes and being
Condorcet consistent.2
In the above example a very concrete question was posed. We asked
whether it was possible to design election procedures that possess specic
properties, or in the language of the theory, whether it is possible to implement correspondences (mapping preference proles into social outcomes) with
specic properties. Also, we focused our attention on a specic setting. While
this is one way to proceed in analyzing implementation, it does not directly3
provide a general understanding of implementation that moves across dierent problems. Another way to proceed, is to take a more abstract approach
to the implementation problem and attempt to fully characterize what can
be implemented. That is, we can search for properties that precisely identify
which correspondences are implementable and which are not, and also identify implementing mechanisms. These properties can then be applied to specic settings to check whether a given correspondence can be implemented.
Such general characterization results have been produced with remarkably
little in terms of assumptions on the structure of the set of alternatives or the
feasible preferences of individuals. As we shall see, the theory has alternated
between fairly general and abstract theorems that cover a wide variety of
potential applications, and more focused and detailed theorems that apply
to particular settings or correspondences.
In what follows, I concentrate on a specic progression in the literature
and in doing so provide a biased view that often reects my own perspective
on the literature. These lectures are meant to be an introduction to the theory
rather than a survey,4 and so I do this without apology. At points I provide
2 The Borda scoring mechanism will not satisfy Condorcet consistency. Moreover, as
we shall see in Example 3, if we use Nash equilibrium as a solution concept then it will
be impossible to always select Pareto optimal outcomes and be Condorcet consistent.
However, as shown for instance in Dutta and Sen (1993) and Jackson et al. (1994), under
the solution concepts of backwards induction or undominated Nash equilibrium it will
be possible to always select Pareto optimal outcomes and be Condorcet consistent.
3 Nevertheless, I will come back to discuss why an approach of cataloguing the
answers to such narrower questions may turn out to be a useful approach to developing
the theory.
4 Surveys of various aspects of the literature may be found in Moulin (1982), Moore
(1992), Palfrey (1992, 1995), Palfrey and Srivastava (1993), Allen (1997), and Corchon
658
M. O. Jackson
opinions concerning assumptions and results, which are quite critical. This is
meant to constructively point out limitations of some of the existing results
and suggest potential directions for future research.
In what follows I assume that the reader has an introductory level knowledge of game theory (and thus has seen notions such as Nash equilibrium) and
is also familiar with some concepts from microeconomics such as preference
relations and Walrasian equilibrium.
2 Denitions and an example
2.1 Individuals
A nite group of individuals interact. N denotes both the set of individuals
and its cardinality. Generic individuals are represented as i, j, and k.
2.2 Outcomes
The set of outcomes is denoted A, and generic elements are represented as
a, b, c, d.
The set of outcomes may be nite or innite depending on the application.
For example, consider the design of a voting procedure to elect one of a nite
number of candidates. In that case, N is the set of voters and A is the nite
set of candidates. As another example, consider the design of a market where
individuals interact to exchange l dierent goods. In that case N is the set
of economic agents, and A H RNl
represents the nal allocation of goods
(including labor, leisure, consumption goods, etc.) that are possible given the
endowments and production possibilities.
2.3 Preferences
Individual i's preferences are represented by a binary relation R i over A that
is complete and transitive. The notation aR i b indicates that i weakly prefers
alternative a to b. The strict preference relation associated with R i is denoted
Pi (where aPi b if and only if it is not the case that bR i a). The notation R denotes a prole R R1 ; . . . ; RN , and R i ; R i denotes the prole where the
i-th entry of R is replaced with R i .
The set of admissible proles of preferences is the set P. Depending on the
application, P may impose restrictions on the preferences. For instance, in the
context of the exchange of private goods it may be assumed that preferences
are convex, continuous, and non-decreasing. I will sometimes refer to a prole
of preferences as being the state of the environment.
(1998). While these lectures are not meant to survey the literature, the Bibliography
that I include here is fairly comprehensive. The exception is that I do not include references to the large literature related to dominant strategy implementation as Salvador
Barbera (2001) oers lectures on strategy-proofness in this same volume.
Implementation theory
659
660
M. O. Jackson
Implementation theory
661
662
M. O. Jackson
Implementation theory
663
Fig. 1.
664
M. O. Jackson
Table 1.
Individual 2
R2
x 1 12 ; 12, x 2 12 ; 12
R1
Individual 1
x 1 12 ; 79, x 2 12 ; 29
Table 2.
Individual 2
Left
Individual 1
R1
R
Right
x 1 12 ; 12, x 2 12 ; 12
1
x 0; 1, x 1; 0
2
2
7 1
x 1 11
18 ; 3, x 18 ; 3
x 1 12 ; 79, x 2 12 ; 29
cannot Nash implement the Walrasian correspondence. This is just an illustration of Hurwicz's point.15
Let us now expand individual 2's strategies to include two possible announcements ``Left'' and ``Right''. We will design the mechanism so that it
is a strictly dominant strategy for individual 1 to say R 1 when the state is R 1 ,
and R 1 when it is R 1 . Moreover, this can be done so that it is a strict best response for individual 2 to say ``Left'' if individual 1 is playing R 1 , and to
say ``Right'' if individual 1 is saying R 1 .
For the mechanism in Table 2, the unique Nash equilibrium in state R 1 ; R 2
is R 1 ; Left which results in the Walrasian allocation for that state, and similarly for the state R 1 ; R 2 the unique Nash equilibrium is R 1 ; Right. This
mechanism thus implements the Walrasian correspondence (for this simple
two state environment) in Nash equilibrium. The mechanism also implements
the desired correspondence in the iterative elimination of strictly dominated
strategies, and most other solution concepts.
As is consistent with Hurwicz's privacy preserving point, it was necessary
for us to have individual 2 play a role even though only 1's preferences vary.
One thing to note about the above mechanism, is that individual 2 does not
simply ``report'' what she knows about individual 1. Individual 2 would have
an incentive to say that it was state R 1 , even if it was state R 1 . Thus, the agents'
incentives in this regard are opposed. Instead, allowing individual 2 to have a
non-trivial message space allows us to create a richer mechanism; and in particular to exploit switches in individual 1's preferences between the two states.
For instance, the ``R 1 , Left'' entry is one that individual 1 prefers to ``R 1 , Left''
15 This also illustrates that no mechanism can implement the Walrasian correspondence in dominant strategies, as it would have to take this form when looking only at
the strategies used based on these preferences.
Implementation theory
665
in state R 1 but not in state R 1 . Thus, the o-diagonal entries are critical to the
working of the mechanism and were not chosen by chance. This begins to hint
at an important necessary condition for Nash implementation that I discuss
next.
The contrast between the workings of the two mechanisms above points
out the importance of considering a large class of mechanisms for the implementation problem, and most notably to include mechanisms that do more
than simply ask individuals to report their preferences. Although the mechanism in Table 2 can be regarded as a direct mechanism if one thinks of asking each individual to report the state, the entries in the o-diagonals are still
critical to successful implementation. Moreover, there are problems where implementation can only be achieved by mechanisms that are more complicated.
In order to develop a deeper understanding of this, let us now analyze Nash
implementation.
3 Nash implementation
The seminal work on Nash implementation by Maskin (1999),16 not only
provides us with an understanding of what is implementable in Nash equilibrium, but it also provides a blueprint for the techniques and approach that
underlie many of the general characterization results in the literature. Thus, it
is useful to study Nash implementation in some detail.
3.1 Monotonicity two ways
Maskin identied an intuitive necessary condition for Nash implementation
that he called monotonicity.17 This condition may be expressed in two dierent ways. It is a trivial exercise to see that the statements are equivalent.
Nevertheless, I present each of them separately as these expressions correspond to dierent expressions in the implementation problem, and it is useful
to emphasize each of these points of view.
Suppose that a social choice correspondence F is Nash implementable.
What can we deduce about F ? Its implementability implies that there exists
an implementing mechanism M; g. So consider a preference prole R and
an alternative a A F R. Since F is Nash implementable there exists a prole
of actions m A M such that m is a Nash equilibrium at R and gm a.
Next, suppose that there exists another preference prole R such that a B
F R. The fact that M; g Nash implements F then implies that m cannot
be a Nash equilibrium at R. Thus, there must exist an agent i and a deviation mi that i prefers to mi at R i . That is, there must exist i and mi such
16 The paper circulated as a working paper from 1977 to 1998.
17 This condition previously appeared in the social choice literature under the name
strong positive association (e.g., see Muller and Satterthwaite 1977). The name monotonicity, however, stuck and has recently been referred to as Maskin-monotonicity by
several authors. This condition diers from the monotonicity condition discussed in the
context of social welfare orderings (e.g., see Moulin 1988 for a review of some results
regarding monotonic social welfare orderings).
666
M. O. Jackson
b
Fig. 2a,b.
Implementation theory
667
and the o-diagonal entries satisfy the monotonicity conditions that are necessary for implementation.
To develop a fuller understanding of monotonicity, let us examine the
condition from a dierent, but formally equivalent perspective.
^
Consider a preference prole R and alternative a A F R. Suppose that R
^
is such that for each i if aR i b, then aR i b. This says that a's standing in i's
^ so that a is still weakly
preference ranking has has not fallen from R to R,
^ i to each b it was weakly preferred to under R i . From Nash
preferred under R
implementability we know that there exists m which is a Nash equilibrium at
^ i for any i and potential m
^ i . Given that
R. This implies that gmR i gm i ; m
^ i b, it must be that gmR
^ i gm i ; m
^ i for any i and potential
aR i b implies aR
^ and so a A F R.
^ This leads to
^ i . Thus, m is also a Nash equilibrium at R
m
the following statement of monotonicity.
A social choice correspondence F is monotonic if for any R, a A F R, and
^ such that for each i and b aR i b implies aR
^ i b, a A F R.
^
R,
Thus, monotonicity requires that if a A F R and for each i the upper
^ i through a is a subset of the upper contour set of R i through
contour set of R
^
a, then a A F R.
This condition is represented in Fig. 3, below.
One statement of monotonicity follows the reasoning that if an alternative
is to be implemented at one prole but not another, then it must have fallen in
someone's rankings in order to break the Nash equilibrium via some deviation. The other statement of monotonicity follows the reasoning that if an alternative is implemented at one prole and rises in each individual's rankings
at another preference prole, then prole of actions leading to the alternative
which form a Nash equilibrium at the rst prole must still be a Nash equilibrium prole at the second prole. These conditions are obviously equivalent
as one is simply the contra-positive of the other. Nevertheless, it is still useful
to consider both statements. The rst emphasizes that there must exist some
preference reversal if an equilibrium at one prole is to be broken at another.
This suggests natural relationships with various preference crossing properties,
such as the Spence-Mirrlees condition. The second emphasizes that if the
Fig. 3.
668
M. O. Jackson
Implementation theory
669
670
M. O. Jackson
basic idea is that there is a possibility for complete agreement which falls under (1). This allows outcomes in F R to be sustained as equilibrium outcomes. As it is possible for the individuals all to announce the same R; a; n
even when the state is R and a B F R, part (2) of the denition of g allows
monotonicity to work so that some i can deviate and announce R; b; n and
obtain b. Part (3) then allows any individual other than i to obtain any outcome they like, which rules out equilibria that fall under (2), unless b is most
preferred by all j 0 i in which case by no veto power, b A F R.
As discussed previously, no veto power is not a necessary condition and
can be restrictive. So it is worthwhile to identify a set of conditions that is
both necessary and sucient for Nash implementation. Such conditions have
been obtained by Moore and Repullo (1990). Although these conditions are
more complicated, they do provide additional insight and I refer the reader to
the Moore and Repullo (1990) paper for more detail.20
Theorem 2 requires that N b 3. The case of N 2 is of obvious importance as there are many bilateral interactions that one would like the theory
to handle. Interestingly, there are non-trivial dierences between the case of
N 2 and N b 3. To get a rough idea of the additional considerations that
appear for the case of N 2, notice that the mechanism used to prove Theorem
2 makes use of the fact that when N 1 agents announce the same thing, then
one can identify an i who is demanding a dierent alternative as in (2) of
the denition of g. With 2 agents this is not possible and an additional necessary condition appears, which arises from considerations of what happens
when agent 1 plays a strategy that should be played in one state and agent 2
plays a strategy that should be played in another state. Characterizations for
the case of N 2 appear in Dutta and Sen (1991b) and Moore and Repullo
(1990). While the full characterization is complex, an intuitive sucient condition called the ``non-empty lower intersection condition'' appears in Dutta
and Sen (1991b), and I refer the interested reader there for details.
3.3 The restrictiveness of monotonicity
There are aspects of monotonicity that make it a strong and restrictive
condition, and a condition that is more easily motivated as a necessary condition of Nash implementation than by direct normative argument. Consider
^ i b. Monotonicity
^ such that for each i and b aR i b implies aR
a A F R and R
^
requires that a A F R. Two aspects of the strength of this condition are as
follows. First, it is allowed for a to be strictly preferred to b under R i and in^ i . Thus, there is a limited sense in which a could have
dierent to b under R
^ and yet monotonicity still requires that
gotten worse in moving from R to R,
^
a lie in F R. The reasoning based on Nash implementation makes it clear as
to why this is a necessary condition, but this makes it a condition that will be
20 See Danilov (1989) and Yamato (1992) for elegant full characterizations in some
specic settings and Sjostrom (1991) for an algorithm for verifying the necessary and
sucient conditions.
Implementation theory
671
Fig. 4.
672
M. O. Jackson
Implementation theory
673
674
M. O. Jackson
Implementation theory
675
Let me outline a proof for each of these results, as the ideas are fairly
straightforward. A formal proof, although notationally heavy, can be easily
eshed out by the reader.
1
First, let c^ be the lottery that places equal weight on every alternative in
K
A 0 . We construct G as follows. For any a A A consider the lottery 1 ea e^
c.
Transforming any lottery to this corresponding lottery we are sure to have an
``interior'' lottery, or one that puts weight on each alternative. This mapping
denes a G that is e-close to F. The proof is completed by showing that given
either of the restrictions, such an interior G27 is necessarily monotonic. Consider any R, and R, and 1 ea e^
c A GR such that 1 ea e^
c B GR.
First let us treat the case where F is ordinal and preferences are monotone.
Since GR 0 GR, it follows from the ordinality of F that we can nd i such
that Rpi 0 Rpi . So there are alternatives d A A 0 and d A A 0 such that dPpi d and
1
1
d
dPpi d. From the denition of c^, the lottery b 1 ea e^
c
d
2K
2K
is well-dened and in fact interior.28 Since preferences are monotone, it follows that 1 ea e^
cP i b and bP i 1 e e^
c. Thus, G is monotonic.
For the case where preferences satisfy the von Neumann-Morgenstern
axioms, the proof is quite similar. Note that if GR 0 GR, then there is some
i for whom R i 0 R i . Then, given the linearity of von Neumann-Morgenstern
preferences, we can nd lotteries e A A and e A A such that ePi e and ePi e.
This is pictured in the following gure for the case where A 0 consists of three
alternatives.
1
1
e again fullls the requirements to
Letting b 1 ea e^
c
e
2K
2K
ensure that G is monotonic.
In this setting, given that every social choice correspondence satisfying
suitable conditions is close to one that is monotonic, is any such social choice
26 Here the social choice correspondence is dened on the domain of preferences and
not on the domain of utility functions. If one wants to use the set of von NeumannMorgenstern utility functions as the domain, then the social choice correspondence
must be constant across utility functions that are ane transformations of each other.
27 The reader can check that the following argument is easily adaptable to show that
any interior social choice correspondence is monotonic on these domains.
28 Here d and d represent the lotteries given weight one to d and d. These convex
combinations can be made directly as A is a Euclidean simplex.
676
M. O. Jackson
Fig. 5.
Implementation theory
677
probabilities these may turn out to be the outcome of the mechanism. In order
for the virtual implementation arguments to be valid, agents must take these
small probabilities seriously and base decisions on them, with full expectations
that these outcomes will be enforced if they happen to be selected by the lottery. It is perfectly possible that an outcome which is bad for all agents is randomly selected, and the arguments underlying virtual implementation require
that the agents cannot change this outcome (for example, by renegotiating to
some other outcome).
Second, the assumptions of von Neumann-Morgenstern preferences or of
ordinality coupled with monotone preferences are strong ones and critical to
the arguments. Von Neumann-Morgenstern preferences are assumed in many
economics models because of their nice linearity with respect to probabilities,
which allows for a very tractable analysis. However, we should always be cautious in interpreting results that rely critically on that linearity, rather than just
using it for tractability. In other words, if our results are robust to variations
in the set of preferences then working with von Neumann-Morgenstern preferences for tractability's sake is ne. However, if the results depend in a special way on a restriction to the domain of von Neumann-Morgenstern preferences, then we should be cautious in applying the results. Arguably, virtual
implementation relies critically on the linearity of preferences (or ordinality of
F coupled with monotone preferences31) because it implies that the crossing
conditions needed for monotonicity will be satised at all interior points! Once
one allows for slight amounts of non-linearity in preferences over lotteries,
then the crossing conditions are not automatically satised, and monotonicity
once again becomes restrictive.
5 Renements
Another avenue in the theory is implementation under various renements of
Nash equilibrium.32 As we saw in the Nash implementation theorems, it is
easy to ensure that a given desired outcome is an equilibrium outcome while
it is dicult to rule out undesired equilibria. This is where the necessity of
the monotonicity condition arises and what limits our ability to implement.
31 Ordinality coupled with the monotone preference condition plays a similar role to
the linearity. If F R 0 F R, then some agent's preferences must dier over at least
two underlying alternatives in A 0 . Then at any interior lottery there must be a crossing
of this agent's indierence curves, as substituting a slight amount of one of these two
underlying alternatives for the other will be ranked in opposite ways by the two preferences.
32 When I use the word renements, I use it literally to mean a solution concept which
always selects a subset of Nash equilibria, such as undominated Nash equilibrium, subgame perfect equilibrium, coalition-proof Nash equilibrium, strong equilibrium, and
trembling hand perfect equilibrium. Implementation in other solution concepts that are
not renements of Nash equilibrium, such as protective criterion or iterative elimination of weakly dominated strategies also appear in the literature (e.g., Barbera and
Dutta 1982 and Abreu and Matsushima 1994), but are not discussed here.
678
M. O. Jackson
Implementation theory
679
680
M. O. Jackson
come is implemented (as in (1) in the mechanism proving Theorem 2), there
is a possibility for some individuals to deviate and allow for some ``test'' pair
of alternatives which serve the role of changing which strategies are weakly
dominated, and there is some use of an integer game (as in (3)) to rule out
certain undesired congurations of strategies. However, the mechanisms are
more complex in terms of how and when the test pairs apply in order to take
advantage of weak dominance arguments. Rather than exhaust the reader with
the details of the mechanisms, I present a simple example that illustrates an
implementing mechanism for Theorem 5 in a specic case. The example is
also useful for another purpose: it points out a serious caveat that we should
have regarding implementing mechanisms.
Example 4 (Jackson 1992). Let N 2 and A fa; bg. R1 R 2 is such that
aPi b, and R1 is such that bP1 a.
Consider F R1 ; R 2 fbg and F R1 ; R 2 fag. This is a peculiar social
choice correspondence as it goes exactly against the preferences of the agents.
But it is then convincing36 that if we can implement this social choice correspondence then we can implement any social choice correspondence. The following mechanism does the trick.
m1
m1
m2
b
b
b
b
..
.
~2
m
a
a
b
b
..
.
^2
m
a
a
a
b
..
.
a
a
a
a
..
.
a
a
a
a
..
.
a
b
b
b
..
.
a
b
b
b
..
.
a
b
b
b
..
.
a
b
b
b
..
.
a
b
b
b
..
.
a
a
a
a
..
.
b
a
a
a
..
.
b
a
a
a
..
.
b
a
a
a
..
.
b
a
a
a
..
.
...
...
...
...
b
a
a
a
..
.
b
b
a
a
..
.
b
b
b
a
..
.
b
b
b
b
..
.
b
b
b
b
..
.
...
...
...
...
.
In this table, the and .. indicate a countable continuation of the series
of entries and corresponding strategies.37 Let us check that the mechanism
implements the stated social choice correspondence. First, m 2 is undominated
for 2 since it is the only strategy that results in a against m 1 . Second, any
strategy in the right half of the mechanism for individual 2 is dominated by
~ 2 . Next, m
~ 2 is dominated by m
^ 2 . Next, m
^ 2 is domiindividual 2's strategy m
nated by the strategy immediately to its right; and so forth. This leaves m 2 as
36 The hard-to-convince reader is referred to Jackson (1992) for the proof of Theorem 5.
37 Each individual here has a message set that is divided into two sets that are both
countably innite. So for instance, m 2 gets b against every message in 1's rst set and a
against every message in 1's second set.
Implementation theory
681
the only undominated strategy for individual 2. A similar analysis for player 1
leads to a unique undominated strategy of m 1 at R 1 , and of m 1 at R 1 . Thus,
the mechanism implements the stated F.
The elimination of dominated strategies is a questionable practice in the
~ 2, m
^ 2 ; . . . ; each strategy is
above mechanism. For instance, in the sequence m
eliminated by the next, but there is no undominated or `best' strategy in that
string. We end up predicting that individual 2 will not play any of these strategies, but will play m 2 instead, even though it does worse in some situations
than any of the eliminated strategies.38
As shown in Jackson (1992) this is not simply a problem when dealing with
implementation in undominated strategies, but also holds for undominated
Nash implementation. This example can be modied to have three individuals
and implement essentially the same social choice function in undominated Nash
equilibrium, via a mechanism with similar diculties. Moreover, in each of the
examples the same is true of every implementing mechanism.
To address the questionable removal of dominated strategies in Example
4, we can rule out the use of such mechanisms by requiring that the implementing mechanism be bounded. This requires that when a strategy is dominated, it be dominated by some undominated strategy.39
5.1 Bounded mechanisms
A mechanism M; g is bounded relative to P if for every i and R A P,
whenever mi A Mi is dominated at R i , then it is dominated by some message
mi A Mi that is undominated at R i .
This denition makes reference to the preference domain, and so boundedness is a condition relative to an environment. A nite mechanism is bounded
regardless of the environment due to the transitivity of the domination relation.
However, an innite mechanism's boundedness property may depend on the
domain of preferences in question.
If we require implementation via a bounded mechanism, then Theorem 5
no longer holds and necessary conditions arise.
F is strategy-resistant if for all i, R A P and R i such that R i ; R i A P
and for each b A F R i ; R i , there exists a A F R (possibly a b) such that
aR i b.
38 As an aside, the use of the integer game in the mechanism used for Nash implementation (i.e., proving Theorem 2) may have bothered you. As no domination arguments were used there, the issues are slightly dierent than that in Example 4. However,
the integer game used in proving Theorem 2 had a similar feature in that it could produce situations where agents have no best response (i.e., if they have beliefs that have
positive probability that some other individual will use any integer). I will return to
discuss this issue after discussing the domination issues.
39 An alternative approach, would be to modify the concept of domination so that
weakly dominated strategies are eliminated only if they are dominated by some undominated strategy. (Timothy Van Zandt suggested this alternative approach in a discussion of Jackson 1992). As is easily seen from the proof of Theorem 6, the same
restrictions on implementation ensue with either approach.
682
M. O. Jackson
This condition has a avor of strategy-proofness, but is dened for correspondences. If we think of i at R, considering a manipulation by acting in
accordance with R i , we nd that for whatever outcome i may hope for, b A
F R i ; R i , there is some outcome a A F R which is at least as good as b. This
condition is very strong: it reduces to strategy-proofness when F is a function.
The following theorem illustrates the impact of requiring boundedness in
implementation via undominated strategies.
Theorem 6 (Jackson 1992). If a social choice correspondence is implementable
in undominated strategies via a bounded mechanism, then it is strategy-resistant.
The proof of this theorem is quite easy. Let F be implemented in undominated strategies via the bounded mechanism M; g. Consider i, R A P
and R i such that R i ; R i A P and consider any b A F R i ; R i . Since F is
implemented, there exists m A UDM; g; R i ; R i such that gm b. Either
b A F R, in which case let a b, or it must be that mi is dominated by some
~ i ; m i . Since m
~ i ; m i is undomi~ i that is undominated at R i . Let a gm
m
nated at R, it follows that a A F R, and from the denition of domination, it
follows that that aR i b.
Thus, we end up with a stark contrast between what is implementable in
undominated strategies when we can use any mechanism and when we can
only use bounded mechanisms. This suggests it is very important to understand the restrictions imposed by considering only mechanisms for which a
given solution concept is appropriate.
Boundedness ends up restricting the class of social choice correspondences that are implementable in undominated Nash equilibrium as well. That
is studied in Jackson et al. (1994). It turns out to introduce a necessary condition (the chained condition) that is weaker than monotonicity and strategyresistance, but nonetheless rules out some well-known correspondences. The
reader is referred to that paper for details.
While boundedness is a condition that is natural to require when we examine elimination of dominated strategies, or solution concepts like undominated Nash equilibrium or iterative elimination of weakly dominated
strategies, it is not an obvious condition to require when considering Nash
equilibrium, or subgame perfect equilibrium, where the elimination of dominated strategies is never an issue. However, there are conditions that one
might like to impose on mechanisms so that such solution concepts are reasonable.
5.2 Mixed strategies
The denition of Nash equilibrium that we worked with in proving Theorem 2,
does not consider mixed strategies. Even giving a proper denition of mixed
strategy equilibrium requires additional structure as preferences have to be dened over lotteries on alternatives, and since message spaces may be uncountably innite one has to take care. Without tackling these technical issues, let us
Implementation theory
683
consider an example that shows that worrying about the possibility of mixedstrategy equilibria makes a dierence.
What we can show is that if one Nash implements a social choice correspondence by a nite mechanism, then there may still exist mixed strategy
Nash equilibria that result in outcomes outside of the social choice correspondence and which may be preferable from the individuals' perspective.
Example 5 (Jackson 1992). Let N 2 and A fa; b; c; dg. Preferences are
described by aP 1 bP 1 cI 1 d (where I 1 indicates indierence), aP 2 bP 2 cP 2 d and
bP 2 aP 2 cI 2 d.
Consider F such that F R1 ; R 2 fag and F R1 ; R 2 fdg. F is Nash
implemented by the following mechanism.
1
m
^1
m
~1
m
m2
d
d
d
^2
m
c
a
b
~2
m
c
b
a
684
M. O. Jackson
Implementation theory
685
686
M. O. Jackson
Implementation theory
687
688
M. O. Jackson
P i
the transfers are freely disposable since
i t a 0. Condition (2) states that
preferences are representable by a bounded quasi-linear utility function.
Let us consider social choice functions for which F R a; 0; . . . ; 0
for every R A P. This is almost without loss of generality, since A 0 is arbitrary and if one wishes to specify transfers that do not sum to 0, for instance specifying the sharing of the cost of a public good as a function of R,
then this can be included in the specication of A 0 and the t i 's can be thought
of as additional transfers. The only loss of generality comes from condition
(2) above, which implies that any transfers included in A 0 must be bounded
in size. This bound is needed for the implementing mechanism below to
function.
Theorem 8 (Moore and Repullo 1988). Consider an environment with a nite
number of states, quasi-linear preferences represented by utility functions that
are bounded, and N 2. Any social choice function is implementable in subgame perfect equilibrium by an extensive game form of perfect information of
nite length that has no mixed strategy equilibria.
Although the theorem is stated for N 2, the mechanism below can be
extended to N > 2 (see Moore and Repullo 1988 and Moore 1992 for details).
Theorem 8 is established through the mechanism pictured below. To understand the mechanism we note two points. First, the reader can easily check
that for any quasi-linear utility functions on A 0 , u i and v i that represent different preferences on A, we can nd a; t i and b; t i with 0 b t i and 0 b t i
such that
u i a t i > u i b t i
while v i a t i < v i b t i :
Thus, in the challenge phase of the mechanism pictured below, if agent i has
announced v i and is challenged by the other agent who counters with u i , then
such a pair is invoked. Second, we can rewrite the social choice function to be
a map from proles of bounded utility functions on A 0 into allocations. So,
the implemented social choice function can be written to depend directly on
the announcements of u 1 and u 2 .
The intuition behind the mechanism is straightforward. Suppose that the
true prole of preferences corresponds to u 1 ; u 2 . If 1 announces a false preference v 1 instead of u 1 , then individual 2 can challenge 1 and say u 1 . If 1 is
challenged then 1 will end up paying a large ne no matter what occurs in the
sequel. 1 is then oered a choice between the a; t i and b; t i that distinguish
u 1 and v 1 . 1 will choose honestly, as this is the end of the tree and 1 pays a ne
regardless of the choice. If 1 chooses a; t i then this indicates that 1 was not
truthful in the rst stage, and so 2 is rewarded by receiving the ne that 1 pays.
If 1 chooses b; t i then this indicates that 2 was not truthful (either in challenging or in 2's announcement of u 1 ) and then 2 also pays a ne. This ne is
suciently large (outweighing any implemented allocation) that 2 would like
to challenge 1 if 1 lies, and not otherwise. The same reasoning applies to the
other section of the tree and so the unique subgame perfect equilibrium out-
Implementation theory
689
Fig. 6.
come is for both individuals to announce utility functions that represent their
true preferences and the correct outcome is implemented.46
While the results in this section have very optimistic implications, they
come at the expense of strong restrictions. Most importantly, one of the criticisms made of virtual implementation that it may not be credible to believe
that bad outcomes will stand is also particularly important here. In both of
46 The niteness of the state space is important in guaranteeing existence of equilibrium, as it ensures that there exists a well-dened best response of the ``challenging''
agent in the challenging subgames.
690
M. O. Jackson
Implementation theory
691
692
M. O. Jackson
new considerations that render the task of nding sucient conditions signicantly more complex than in the complete information setting. For instance, one cannot state a direct analog of Theorem 2 in a Bayesian environment. In particular, a no-veto style condition and Bayesian monotonicity need
to be carefully intertwined respecting the information structure, as discussed
in Jackson (1991).54 There are other interesting dierences that arise in a
Bayesian setting: Dutta and Sen (1994) demonstrate a simple social choice
function in a nite setting that requires a mechanism with innite message
spaces for implementation.
While progress has been made in understanding the conditions that
characterize Bayesian implementation, the full implications of the Bayesian
monotonicity condition and the extent to which it may be satised are still less
well understood. Palfrey and Srivastava (1987, 1993) make signicant headway in showing that many analyses in mechanism design and agency theory
that use incentive compatibility and invoke the revelation principle suer from
multiple equilibrium problems and the identied social choice functions fail
to satisfy Bayesian monotonicity condition. They also show that in environments with transferable utility the conditions for Bayesian implementation
are more easily satised.55 A recent paper by Serrano and Vohra (1999) sheds
more light on the restrictiveness of Bayesian implementation by showing that
Bayesian monotonicity is essentially an ordinal condition, and so implemented
social choice correspondences must be constant across dierent cardinal representations of underlying ordinal preferences. What is left open is a detailed
understanding of what can be implemented in non-transferable utility settings
when we worry not only about incentive compatibility, but also about full
implementation and thus the multiple equilibrium problem and Bayesian
monotonicity.
While Nash implementation has an obvious generalization to environments with incomplete information,56 subgame perfect implementation does
not have a unique generalization, but instead several. This is due to the variety of alternative formulations of sequential rationality under incomplete
information. In particular, varying assumptions about how individuals update beliefs o the equilibrium path results in alternative solution concepts to
be used in implementation. The two incomplete information extensive form
notions of implementation that have been analyzed are perfect Bayesian
implementation (Brusco 1995, 1997, 1998) and implementation via sequential
equilibrium (Baliga 1999 and Bergin and Sen 1998). The interesting new aspect that arises in these settings is that preference reversals can arise not only
54 See Dutta and Sen (1991c) for more on the necessary and sucient conditions for
Bayesian implementation.
55 See also Matsushima (1993).
56 Other natural extensions of complete information implementation to incomplete
information settings have been analyzed as well, such as implementation in undominated Bayesian equilibrium (Palfrey and Srivastava 1989), virtual Bayesian implementation (Duggan 1997a), and virtual implementation in iteratively undominated strategies with incomplete information (Abreu and Matsushima 1992).
Implementation theory
693
694
M. O. Jackson
ing and matching model,60 by having a player be rematched with a new bargaining partner whenever he or she opts-out of a prescribed alternative. They
show that although such an endogenous individual rationality constraint is
compatible with eciency within individual matches, it can be incompatible
with eciency from society's point of view accounting for the overall evolution
of the market which requires specic exercise of the rematching option. In other
words, it can be impossible to implement the ecient rule in such a setting.
The above approaches are based on the idea that the individuals themselves
are not bound to the mechanism, but have the ability to opt out of the prescribed
outcome either to some status quo, renegotiated outcome, or replay of the
mechanism. There might be other contexts where such an opt-out can be prevented and the outcome can be made legally binding. Nevertheless, one still has
to worry about whether the planner (or society at large) will let inecient outcomes stand ex-post. Studies which address such ``credibility'', or the ability of
the mechanism designer or planner to commit to o-equilibrium-path outcomes
that are known to be undesirable, include Chakravorti et al. (1992), Baliga et al.
(1995) and Baliga and Sjostrom (1995). These studies include the planner as a
player in the mechanism,61 in which case one can explicitly account for the
planner's preferences and behavior with regards to enforcing an outcome.
In all of the above work there are two forces at work. On the one hand,
allowing for movement away from ex-post undesirable outcomes can be improving just by itself since truly undesirable outcomes are eliminated automatically. On the other hand, this limits out of equilibrium threats that (as
we saw in the last section) can play a strong role in selecting which outcomes
are implemented. Thus, although allowing for players or the planner to alter
outcomes builds in some minimal individual rationality or eciency, it can
come at the expense of selectivity of the mechanism. While the above cited
work makes progress in understanding enforceability and credibility issues, a
complete understanding of these issues requires full modeling (endogeneity)
of the process that occurs when an outcome is opted away from by the players
or the planner. Often this process may be situation specic, and so it should
be worthwhile to analyze this issue in a variety of specic environments, which
is something this branch of the literature is just beginning to do.
7.3 Mixed strategies
We do not yet have a good understanding of what is Nash or subgame perfect implementable when one accounts for mixed strategies, by mechanisms
satisfying, for instance, the best response property.62 I discussed one approach
60 See Jackson and Palfrey (2001) for a unied approach to dealing with renegotiation,
outside options, and replay of the mechanism, in more abstract settings, with some
applications to exchange economies.
61 Including the planner as a player has an interesting theoretical byproduct: the
planner is part of the equilibrium and can thus rule out undesired equilibria unilaterally.
62 As mentioned in the discussion following Example 5, there are mechanisms that
have no mixed strategy equilibria; but those mechanisms involve integer games and fail
to have well-dened best response correspondences.
Implementation theory
695
696
M. O. Jackson
While the work described above has examined robustness with regards to
certain aspects of the behavior of players, there is almost no study of mechanisms that are immune to misspecications of the environment. The only
study in this direction that I am aware o is by Duggan and Roberts (1998),
who study how continuity of a mechanism can result in robustness with respect to small errors in specication, due to corresponding upper-hemi continuity of equilibrium correspondences.64 This suggests that an intuitive notion
of requiring some continuity of a mechanism in order to guarantee some
minimal robustness is well founded. Short of this, we are lacking even a basic
understanding of the exact limitations that are imposed by requiring implementation by mechanisms that are robust to misspecications of the domain
of preferences, beliefs, allocations, or even the number or role of various
individuals in a society.
7.5 Comparisons across solution concepts
As we have developed a deeper understanding of what is implementable in a
variety of contexts and solution concepts, it has become clear that the choice
of solution concept used to model behavior has an important bearing on what
is implementable. The class of social choice correspondences that are implementable in undominated Nash or subgame perfect equilibrium is signicantly
larger than the class of Nash implementable social choice correspondences.
What is it about solution concepts (or assumptions on individual behavior)
that accounts for this dierence? Jackson and Srivastava (1996) examine this
issue in the context of a voting setting with a nite number of strictly ranked
alternatives. They point to dierences in consideration of o-equilibrium path
behavior as the critical factor the aects how much is implementable via different solution concepts.65 While this works out cleanly in a voting context, it
is still unknown if the same is true more generally or even in other specic
contexts like exchange economies.
Tracing the characterizations of implementability back to assumptions
concerning individual behavior should be quite important. As modelers, we
often consider a solution concept as an object of choice; but ultimately it boils
down to understanding how people behave in a given context. If we understand how variations in behavior tie back to implementability, then we will
eventually be well-equipped to make prescriptions in various contexts. We are
still short of such an understanding.
7.6 Repeated and dynamic implementation
Perhaps one of the most interesting and relevant, and still least studied, questions in implementation theory is that of implementation in dynamic and re64 This holds provided one worries about mixed strategies, which Duggan and Roberts
point to as another reason for accounting for mixed strategies in implementation.
65 New work by Kaya and Koray (2000) provides interesting characterizations based
on identifying solutions that only implement monotonic social choice functions on a
given class of mechanisms.
Implementation theory
697
698
M. O. Jackson
Implementation theory
699
there are endogenous transfer payments from one player to another that may
aect the equilibrium structure of a mechanism, as in Jackson and Wilkie
(2000). The reason that this is an important issue is that the predictions of
what outcomes we might expect can be quite dierent if the individuals have
strategic choices (like deciding whether to be a candidate, or bribing other
individuals to take certain actions) that are outside of the standard implementation analysis. If such actions are available and unaccounted for then the
standard analysis that ignores such outside actions could be quite misleading.
A related matter is that an individual's preferences and behavior may depend on the mechanism itself. Glazer and Rubinstein (1998) present a context
where individuals providing messages (``opinions'') care explicitly about how
their message ends up comparing to the ultimate social decision, as they would
like to have their recommendation match the social choice. This introduces an
added layer of feedback between the mechanism and equilibrium behavior,
that presents interesting and challenging issues for implementation theory.
Such issues are generally unexplored in the theory, and one can think of any
number of examples beyond the Glazer and Rubinstein context (for instance
in principal-agent problems) where they are important.
7.9 Testing implementing mechanisms
As the theory continues to generate mechanisms for implementation, we can
begin to evaluate and compare them through testing, simulation, experiments,
and ultimately empirical work. For instance Chen (1997) compares behavior
observed in experiments involving a series of public goods mechanisms. She
attributes dierences in performance to supermodularity properties of the
mechanisms, which then helps us appreciate another feature that we might
consider in designing mechanisms. One can also test some of the canonical
mechanisms directly as done by Sefton and Yavas (1996). They ran experiments on the Abreu and Matsushima (1992a) mechanism, and present some
formidable hurdles for the theory.69
Simulations can be also be used to study the same issues, as in Cabrales
(1999). He studies adaptive learning by players in some of the canonical mechanisms for implementation. The adaptive learning algorithm Cabrales analyzes
has features that allow for complete randomization over best responses which
can kick the process out of an integer game, and thus produce convergence
to equilibrium in Nash mechanisms. Ultimately, one would like a mechanism
to perform well under a variety of processes, and to oer fast convergence to
equilibrium as players learn or evolve.
69 These just touch the surface of what can be explored, and one can check whether
various criticisms of unnatural features of mechanisms are supported by experimental
evidence. For instance, how a mechanism with an integer game would be played?
Would players play equilibrium strategies? Would they end up trying to announce high
integers? (I am sure that Caltech undergraduates could be very creative in announcing
high integers.) How would behavior depend on the social choice correspondence being
implemented? Are they more likely to coordinate on the equilibrium play when there is
alignment of preferences?
700
M. O. Jackson
There is ample room for tests, simulations, experiments, and empirical research on mechanisms to add valuable guidance and insight to the theory of
implementation. Issues such as how well various mechanisms perform when
players are not at equilibrium but learning or adjusting according to some
dynamic are quite important and some of the rst issues that come to mind
when one takes an experimental point of view; and yet have not even been
touched by implementation theory.70
References
Abreu D, Matsushima H (1992a) Virtual implementation in iteratively undominated
strategies I: Complete information. Econometrica 60: 9931008
Abreu D, Matsushima H (1992b) Virtual implementation in iteratively undominated
strategies II: Incomplete information. mimeo
Abreu D, Matsushima H (1992c) A response to Glazer and Rosenthal. Econometrica
60: 14391442
Abreu D, Matsushima H (1994) Exact implementation. J Econ Theory 64: 119
Abreu D, Sen A (1991) Virtual implementation in Nash equilibria. Econometrica 59:
9971022
Abreu D, Sen A (1990) Subgame perfect implementation: A necessary and almost
sucient condition. J Econ Theory 50: 285299
Allen B (1997) Implementation theory with incomplete information. In: Hart S, MasColell A, Cooperation: Game theoretic approaches. Springer, Berlin Heidelberg
New York
Amaros P, Moreno B (2001) Implementation of optimal contracts under adverse selection. Rev Econ Design 6: 4162
Arya A, Glover J (1995) A simple forecasting mechanism for moral hazard settings. J
Econ Theory 66: 507521
Arya A, Glover J, Hughes J (1997) Implementing coordinated team play. J Econ
Theory 74: 218232
Arya A, Glover J, Rajan U (2000) Implementation in principal-agent models of adverse selection. J Econ Theory 93: 87109
Arya A, Glover J, Young R (1995) Virtual implementation separable Bayesian environments using simple mechanisms. Games Econ Behav 9: 127138
Bag PK (1996) Ecient allocation of a ``pie'': King Solomon's dilemma. Games Econ
Behav 12: 2141
Bag PK (1997) Public goods provision: Applying Jackson-Moulin mechanisms for
restricted agent characteristics. J Econ Theory 73: 460472
Bagnoli M, Lipman B (1989) Provision of public goods: Fully implementing the core
through private contributions. Rev Econ Stud 56: 583601
Baliga S (1999) Implementation in economic environments with incomplete information: The use of multi-stage games. Games Econ Behav 27: 173183
Baliga S, Brusco S (2000) Collusion, renegotiation, and implementation. Soc Choice
Welfare 17: 69 84
Baliga S, Corchon L, Sjostrom T (1997) The theory of implementation when the
planner is a player. J Econ Theory 77: 1533
70 There is a rich literature in game theory on this topic, but it has not been looked
at from the perspective of designing mechanism to have nice learning or dynamic
properties.
Implementation theory
701
Baliga S, Sjostrom T (1998) Decentralization and collusion. J Econ Theory 83: 196
232
Baliga S, Sjostrom T (1999) Interactive implementation. Games Econ Behav 27: 3863
Bandyopadhyay T, Samuelson L (1992) Weakly implementable social choice rules.
Theory Decision 33: 135151
Barbera S (2001) An introduction to strategy-proof social choice functions. Soc Choice
Welfare 18: 619653
Barbera S, Dutta B (1982) Implementation via protective equilibria. J Math Econ 4:
4965
Barbera S, Jackson MO (2000) Choosing how to choose: Self-stable majority rules.
mimeo, Caltech
Bergin J (1993) On some recent results in incomplete information implementation.
mimeo, Queen's University
Bergin J, Sen A (1996) Implementation in generic environments. Soc Choice Welfare
13: 467478
Bergin J, Sen A (1998) Extensive form implementation in incomplete information
environments. J Econ Theory 80: 222256
Bergin J, Duggan J (1999) An implementation theoretic approach to non-cooperative
foundations. J Econ Theory 86: 5076
Bernheim D, Whinston M (1987) Coalition-proof Nash equilibrium II: Applications. J
Econ Theory 42: 1329
Blume L, Easley D (1990) Implementation of Walrasian expectations equilibria. J
Econ Theory 51: 207227
Boylan R (1998) Coalition-proof implementation. J Econ Theory 82: 132143
Brusco S (1995) Perfect Bayesian implementation. Econ Theory 5: 419444
Brusco S (1997) Implementing action proles when agents collude. J Econ Theory 73:
395424
Brusco S (1999) Implementation with extensive form games: One round of signaling
is not enough. J Econ Theory 87: 356378
Brusco S (1998a) Implementing action proles with sequential mechanisms. Rev Econ
Design 3: 271300
Brusco S (1998b) Unique implementation of the full surplus extraction outcome in
auctions with correlated types. J Econ Theory 80: 185200
Brusco S (1998c) Perfect Bayesian implementation in economic environments. mimeo,
Universidad Carlos III de Madrid
Brusco S, Jackson M (1999) The optimal design of a market. J Econ Theory 88: 139
Cabrales A (1999) Adaptive dynamics and the implementation problem with complete
information. J Econ Theory 86: 159184
Chakravorti B (1991) Strategy space reductions for feasible implementation of Walrasian performance. Soc Choice Welfare 8: 235246
Chakravorti B, Corchon L, Wilkie S (1992) Credible implementation. Games Econ
Behav (forthcoming)
Chattopadhyay S, Corchon L, Naeve J (2000) Contingent commodities and implementation. Econ Letters 68: 293298
Chen Y (1997) Dynamic stability of Nash-ecient public goods mechanisms: reconciling theory and experiments. mimeo, University of Michigan
Corchon L (1996) The theory of implementation of socially optimal decisions in economics. McMillan, London
Corchon L, Herrero C (1995) A decent proposal. mimeo, Universidad de Alicante
Corchon L, Ortuno-Ortin I (1995) Robust implementation under alternative information structures. Econ Design 1: 159172
Corchon L, Wilkie S (1996) Double implementation of the ratio correspondence by a
market mechanism. Econ Design 2: 325337
Dagan N, Serrano R, Volij O (1999) Feasible implementation of taxation methods.
Rev Econ Design 4: 5772
702
M. O. Jackson
Implementation theory
703
Groves T (1977) Ecient collective choice with compensation. In: Laont J-J, Aggregation and revelation of preferences. North-Holland, Amsterdam
Hahn G, Yannelis N (1995) Coalitional Bayesian Nash implementation in dierential
information economies. mimeo, University of Illinois
Harsanyi JC (196768) Games with incomplete information played by `Bayesian'
Players. Management Science 14: 159189, 320334, 486502
Herrero M, Srivastava S (1992) Implementation via backward induction. J Econ
Theory 56: 7088
Hong L (1995) Nash implementation in production economies. J Econ Theory 5:
401417
Hong L (1996) Bayesian implementation in exchange economies with state dependent
feasible sets and private information. Soc Choice Welfare 13: 433444
Hong L (1998) Feasible Bayesian implementation with state dependent feasible sets. J
Econ Theory 80: 201221
Hong L, Page S (1994) Reducing informational costs in endowment mechanisms. Econ
Design 1: 103117
Hurwicz L (1972) On informationally decentralized systems. In: McGuire CB, Radner
R, Decision and organization. North Holland, Amsterdam
Hurwicz L (1973) The design of mechanisms for resource allocation. Am Econ Rev
61: 130
Hurwicz L (1977) On allocations attainable through Nash equilibria. In: Laont J-J,
Aggregation and revelation of preferences. North-Holland, Amsterdam
Hurwicz L (1979) Outcome functions yielding Walrasian and Lindahl allocations at
Nash equilibrium points. Rev Econ Stud 46: 217225
Hurwicz L (1994) Economic design, adjustment processes, mechanisms and institutions. Econ Design 1: 114
Hurwicz L (1996) Feasible balanced outcome functions yielding constrained Walrasian
and Lindahl allocations at Nash equilibrium points in economies with two agents
when the designer knows the feasible set. mimeo, University of Minnesota
Hurwicz L, Schmeidler D (1978) Construction of outcome functions guaranteeing existence and pareto optimality of Nash equilibria. Econometrica 46: 14471474
Hurwicz L, Maskin E, Postlewaite A (1995) Feasible Nash implementation of social
choice correspondences when the designer does not know endowments or production sets. In: Ledyard J, The economics of information decentralization: Complexity,
eciency, and stability. Kluwer, Amsterdam
Jackson MO (1991) Bayesian implementation. Econometrica 59: 461478
Jackson MO (1992) Implementation in undominated strategies: A look at bounded
mechanisms. Rev Econ Stud 59: 757775
Jackson MO, Moulin H (1992) Implementing a public project and distributing its cost.
J Econ Theory 57: 125140
Jackson MO, Palfrey T (1998) Eciency and voluntary implementation in markets
with repeated pairwise bargaining. Econometrica 66: 13531388
Jackson MO, Palfrey T (2001) Voluntary implementation. J Econ Theory 98: 1
25
Jackson MO, Palfrey T, Srivastava S (1994) Undominated Nash implementation in
bounded mechanisms. Games Econ Behav 6: 474501
Jackson MO, Srivastava S (1992) On two person Nash implementable social choice
functions. Soc Choice Welfare 9: 263264
Jackson MO, Srivastava S (1996) Characterizations of game theoretic solution concepts
which lead to impossibility theorems. Rev Econ Stud 63: 2338
Jackson MO, Wilkie S (2000) Endogenous games and mechanisms: Side payments
among players. mimeo, Caltech
Kalai E, Ledyard J (1998) Repeated implementation. J Econ Theory 83: 308317
Kara T, Sonmez T (1996) Nash implementation of matching rules. J Econ Theory 68:
425439
704
M. O. Jackson
Implementation theory
705
Moulin H (1981) Implementing just and ecient decision making. J Publ Econ 16:
193213
Moulin H (1982) Non-cooperative implementation: A survey of recent results. Math
Soc Sci 3: 243257
Moulin H (1988) Axioms of cooperative decision making. Cambridge University Press,
Cambridge
Mount K, Reiter S (1974) The informational size of message spaces. J Econ Theory 8:
161192
Muller E, Satterthwaite M (1977) On the equivalence of strong positive association and
strategyproofness. J Econ Theory 14: 412418
Myerson R, Satterthwaite M (1983) Ecient mechanisms for bilateral trading. J Econ
Theory 29: 265281
Nagahisa RI (1994) A necessary and sucient condition for Walrasian social choice. J
Econ Theory 62: 186208
Nakamura S (1988) Feasible Nash implementation of competitive equilibria in an
economy with externalities. mimeo, University of Minnesota
Nakamura S (1990) A feasible Nash implementation of Walrasian equilibria in the two
agent economy. Econ Lett 34: 59
Nakamura S (1998) Impossibility of Nash implementation in two person economies.
Econ Design 3: 159166
Osana H (1997) Nash-implementation of the weak pareto choice rule for indecomposable environments. Rev Econ Design 3: 5774
Osana H (1990) Implementation of multi-agent incentive contracts with the principal's
renegotiation oer. Rev Econ Design 4: 161178
Palfrey T (1990) Implementation in Bayesian equilibrium: The multiple equilibrium
problem in mechanism design. In: Laont J-J, Advances in economic theory. Cambridge University Press, Cambridge
Palfrey T (1995) Implementation theory. In: Aumann R, Hart S, Handbook of game
theory (forthcoming)
Palfrey T, Srivastava S (1986) Private information in large economies. J Econ Theory
39: 3458
Palfrey T, Srivastava S (1987) On Bayesian implementable allocations. Rev Econ Stud
54: 193208
Palfrey T, Srivastava S (1989a) Implementation with incomplete information in exchange economies. Econometrica 57: 115134
Palfrey T, Srivastava S (1989b) Mechanism design with incomplete information: A
solution to the implementation problem. J Polit Econ 97: 668691
Palfrey T, Srivastava S (1991) Nash implementation using undominated strategies.
Econometrica 59: 479502
Palfrey T, Srivastava S (1993) Bayesian implementation. Harwood Academic Publishers, Switzerland
Peleg B (1996a) A continuous double implementation of the constrained Walrasian
equilibrium. Econ Design 2: 8997
Perry M, Reny P (1999) A general solution to King Solomon's dilemma. Games Econ
Behav 26: 279285
Peleg B (1996b) Double implementation of the Lindahl equilibrium by a continuous
mechanism. Econ Design 2: 311324
Piketty T (1993) Implementation of rst-best allocations via generalized tax schedules.
J Econ Theory 61: 2341
Postlewaite A (1985) Implementation via Nash equilibrium in economic environments.
In: Hurwicz L, Schmeidler D, Sonnenschein H (eds) Social goals and social organization: Essays in honor of Elisha A. Pazner. Cambridge University Press, Cambridge
Postlewaite A (1979) Manipulation via endowments. Rev Econ Stud 46: 255262
Postlewaite A, Schmeidler D (1986) Implementation in dierential information
economies. J Econ Theory 39: 1433
706
M. O. Jackson
Implementation theory
707
Sjostrom T (1996) Credibility and renegotiation of outcome functions in implementation. Japanese Econ Rev 47: 157169
Sjostrom T (1999) Undominated Nash implementation with collusion and renegotiation. Games Econ Behav 26: 337352
Sonmez T (1996) Implementation in generalized matching problems. J Math Econ
26: 169176
Suh S-C (1995) A mechanism implementing the proportional solution. Econ Design
1: 301317
Suh S-C (1996) Implementation with coalition formation: A complete characterization.
J Math Econ 25: 109122
Suh S-C (1997a) An algorithm checking strong Nash implementability. J Math Econ
25: 109122
Suh S-C (1997b) Games implementing the stable rule of marriage problems in strong
Nash equilibria. mimeo, University of Windsor
Suh S-C (2001) An algorithm for verifying the double implementability in Nash and
strong Nash equilibria. Math Soc Sci 41: 103110
Tadenuma K, Toda M (1998) Implementable stable solutions to pure matching
problems. Math Soc Sci 35: 121132
Tatamitani Y (1991) Double implementation in Nash and undominated Nash equilibria in social choice environments. mimeo, University of Tsukuba
Thomson W (1977) Comment on: L. Hurwicz On allocations attainable through
Nash equilibria. In: Laont J-J, Aggregation and revelation of preferences. NorthHolland, Amsterdam
Thomson W (1979) Maximin strategies and elicitation of preferences. In: Laont J-J,
Aggregation and revelation of preferences. North Holland, Amsterdam
Thomson W (1996) Concepts of implementation. Japanese Econ Rev 47: 133143
Thomson W (1994) Divide and permute and the implementation of solutions to the
problem of fair division. mimeo, University of Rochester
Thomson W (1999) Monotonic extensions on economic domains. Rev Econ Design
4: 1334
Tian G (1989) Implementation of the Lindahl correspondence by a single-valued, feasible, and continuous mechanism. Rev Econ Stud 56: 613621
Tian G (1990) Completely feasible continuous implementation of the Lindahl correspondence with a message space of minimal dimensions. J Econ Theory 51: 443452
Tian G (1991) Implementation of the Lindahl allocations with nontotal-nontransitive
preferences. J Publ Econ 46: 247259
Tian G (1993) Implementing Lindahl allocations by a withholding mechanism. J Math
Econ 22: 169179
Tian G (1994) Implementation of linear cost share equilibrium allocations. J Econ
Theory 64: 568584
Tian G (1996) Continuous and feasible implementation of rational expectations
Lindahl allocations. Games Econ Behav 16: 135151
Tian G (1999) Bayesian implementation in exchange economies with state dependent
preferences and feasible sets. Soc Choice Welfare 16: 99120
Tian G, Li Q (1991) Completely feasible and continuous implementation of the
Lindahl correspondence with any number of goods. Math Soc Sci 21: 6779
Tian G, Li Q (1994) An implementable and informational ecient state-ownership
system with variable returns. J Econ Theory 64: 286297
Tian G, Li Q (1995) On Nash-implementation in the presence of withholding. Games
Econ Behav 9: 222233
Trockel W (1998) An exact implementation of the Nash bargaining solution in
dominant strategies. In: Abramovich Y, Avgerinos E, Yanellis N (eds) Functional
analysis and economic theory. Springer, Berlin Heidelberg New York
van Damme E (1987) Stability and perfection of Nash equilibria. Springer, Berlin
Heidelberg New York
708
M. O. Jackson