The existence results for discontinuous games by Reny and by Simon and Zame are incomparable∗ Guilherme Carmona†

Konrad Podczeck‡

University of Surrey

Universit¨at Wien

November 6, 2017

Abstract A natural way to relate the existence theorems of Reny (1999) and Simon and Zame (1990) would be to show the following: Each game with an endogenous sharing rule satisfying the assumptions of Simon and Zame (1990) is such that the payoff correspondence has a measurable selection inducing a normalform game whose mixed extension satisfies the assumptions in Reny (1999). We present a result showing that this is not so in general, even not when the assumptions in Reny (1999) are weakened to those in Barelli and Meneghel (2013).

Journal of Economic Literature Classification Numbers: C72 Keywords: Games with an endogenous sharing rule; discontinuous games; existence of equilibrium. ∗

We wish to thank Phil Reny for very helpful comments. Financial support from Funda¸c˜ao para

a Ciˆencia e Tecnologia (under grant PTDC/EGE-ECO/105415/2008) is gratefully acknowledged. Any remaining errors are, of course, ours. † Address: University of Surrey, Faculty of Business, Economics and Law, School of Economics, Guildford, GU2 7XH, UK; email: [email protected]. ‡ Address: Institut f¨ ur Volkswirtschaftslehre, Universit¨at Wien, Oskar-Morgenstern-Platz 1, A1090 Wien, Austria; email: [email protected]

1

1

Introduction

The approaches of Reny (1999) and of Simon and Zame (1990) both provide mixed strategy equilibrium existence results for general discontinuous games. While the approach of Reny (1999) means to impose certain topological conditions on players’ payoff functions in the mixed extension of a given normal form game—summarized by the notion of “better reply security”,—the approach of Simon and Zame (1990) replaces the vector of players’ payoff function by a correspondence with certain properties and asks whether there is some measurable selection such that the induced normal form game has a mixed strategy equilibrium. As pointed out by Jackson and Swinkels (2005), in some specific contexts such as auction settings, the two approaches seem to be closely related; however, as also pointed out by these authors, “[h]ow these approaches turn out to be related ... is an open question”. In this note we address this question. We first remark that Simon and Zame’s (1990) existence result cannot be used to establish the mixed strategy equilibrium existence result of Reny (1999). Indeed, let (Xi , ui )i=1,...,n be a normal form game such that the action sets Xi are non-empty compact metric spaces and such that the mixed ∏ extension satisfies Reny’s condition of better reply security.1 Write X = ni=1 Xi , and u = (u1 , . . . , un ). Then, if one takes for the payoff correspondence Q : X → Rn the correspondence defined by setting Q(x) = {u(x)} for x ∈ X, Simon and Zame’s (1990) existence result does not apply because this latter result requires Q to be closed, which need not be true because better-reply security—regardless of whether in mixed or in pure strategies—does not imply that u is continuous. If one takes for Q the smallest upper hemi-continuous closed- and convex-valued correspondence which includes u (in the sense of set inclusion of the graphs), then Simon and Zame’s (1990) existence result cannot be used either, just because this result does not control the selection for which there is a mixed strategy equilibrium. Conversely, with (Xi )i=1,...n and X as above, let Q : X → Rn be a payoff correspondence which is upper hemi-continuous with non-empty compact convex values. Then, 1

See Section 2 for a formal definition.

2

in order that Reny’s (1999) existence result can be used to establish that of Simon and Zame (1990), one would need the existence of a measurable selection of Q that is better-reply secure in mixed strategies. This was shown to be indeed true in the setting of Carmona and Podczeck (2017), which includes the auction setting of Jackson and Swinkels (2005). Roughly, this setting considers games with an endogenous sharing rule such that any measurable selection of the payoff correspondence Q induces a normal-form game whose mixed extension is payoff secure. Choosing a selection of Q that maximizes the sum of players’ payoffs, one finds that there exists a measurable selection with the property that the sum of its coordinates is upper semi-continuous. In combination with Proposition 3.2 in Reny (1999) and the remarks preceding it, one may conclude that Q has a measurable selection such that the mixed extension of the induced normal-form game is better-reply secure. The same property holds in the setting considered by Barelli, Govindan, and Wilson (2014), because, in that setting, any measurable selection of the payoff correspondence is such that sum of its coordinates is upper semi-continuous and there is at least one selection that induces a game whose mixed extension is payoff secure. In this paper we show, however, that in a general game with an endogenous sharing rule the payoff correspondence need not have any measurable selection inducing a normal form game whose mixed extension is better-reply secure. Our result thus suggest that, in general, there is no formal relationship between the existence result of Simon and Zame (1990) and the mixed strategy existence result of Reny (1999). We also consider the notion of continuous security, which was introduced by Barelli and Meneghel (2013). The mixed strategy version of this notion amounts to a condition that is weaker than the mixed strategy version of better reply security (see Barelli and Meneghel (2013, Proposition 2.4)). Nevertheless, a similar conclusion as with better reply security is true. In fact, we show that the payoff correspondence of a game with an endogenous sharing rule need not have any measurable selection such that the mixed extension of the induced normal form game is continuously secure. Closing the introduction, we comment on a paper by Bich and Laraki (2017). For a normal form game (Xi , ui )i=1,...,n as above, and Q : X → Rn the smallest upper hemi3

continuous closed- and convex-valued correspondence which includes u = (u1 , . . . , un ), Bich and Laraki (2017) showed, using arguments from Simon and Zame (1990), that there is a pair (u′ , σ), where u′ = (u′1 , . . . , u′n ) is a measurable selection of Q, and σ a mixed strategy equilibrium of the normal form game (Xi , u′i )i=1,...,n , such that, for each player i, the expected payoff defined from σ and u′i is not smaller than the supremum of the expected payoffs that i can secure for the original payoff function ui against small deviation from σ−i by the other players. As noted by Bich and Laraki (2017) (see their Remark 4.4), this result allows for another proof of Reny’s (1999) mixed strategy existence result if the mixed extension of the original game (Xi , ui )i=1,...,n is better reply secure. However, in line with our result, this does not mean that Q has any selection to which Reny’s approach can be applied to show equilibrium existence.

2

The result

For our purposes, it suffices to consider 2-player games where each player has the closed unit interval [0, 1] as his action set. We write I = {0, 1} for the set of these players. Given i ∈ I, we write −i for I \{i}. Also, we write M for the set of Borel probability measures on [0, 1]. Thus M is the set of mixed strategies available for each of the two players. We regard M as being endowed with the narrow topology,2 and M × M with the corresponding product topology. In the context specified in the previous paragraph, a normal form game is fully determined by a bounded measurable function u = (u1 , u2 ) : [0, 1] × [0, 1] → R2 , with the interpretation that given x = (x1 , x2 ) ∈ [0, 1] × [0, 1], the payoff of player i is ui (x), i = 1, 2. Given a normal form game u : [0, 1] × [0, 1] → R2 , the mixed extension of u is the ∫ function u¯ = (¯ u1 , u¯2 ) : M × M → R2 defined by setting u¯i (σ1 , σ2 ) = [0,1] ui dσ1 × σ2 for i = 1, 2 and (σ1 , σ2 ) ∈ M × M . Thus, given (σ1 , σ2 ) ∈ M × M , u¯i (σ1 , σ2 ) is the 2

Recall that the narrow topology on M is the coarsest topology on M making the map µ 7→



f dµ

continuous for every bounded continuous real-valued function f on [0, 1]. Furthermore, recall that the Prohorov metric metricizes the narrow topology on M .

4

expected payoff of player i. A mixed strategy Nash equilibrium of the game u is a pair (σ1 , σ2 ) ∈ M × M such that u¯i (σi , σ−i ) ≥ u¯i (σi′ , σ−i ) for each i ∈ I and each σi′ ∈ M . Of course, this is equivalent to saying that (σ1 , σ2 ) is a pure strategy Nash equilibrium of the mixed extension u¯ of u. Let u be a normal form game, with mixed extension u¯. We say that u is mixedstrategy-better-reply secure if whenever (σ1 , σ2 , r1 , r2 ) ∈ M × M × R2 is a cluster point of the graph of u¯ such that (σ1 , σ2 ) is not a mixed strategy Nash equilibrium of u, there is an i ∈ I, a number α > ri , a σ ¯i ∈ M , and a neighborhood V of σ−i in M such ′ ′ that u¯i (¯ σi , σ−i ) ≥ α for all σ−i ∈ V . In other words, this amounts to the requirement

that the mixed extension u¯ of u be better-reply secure. We say that u is mixed-strategy-continuously secure if whenever (σ1 , σ2 ) ∈ M × M is not a mixed strategy Nash equilibrium, there is an α ∈ R2 , a neighborhood V of (σ1 , σ2 ) in M × M , and a closed nonempty-valued correspondence φi : V → M for each i ∈ I such that ′ (a) for any (σ1′ , σ2′ ) ∈ V and each i ∈ N , φi (σ1′ , σ2′ ) ⊆ {γi ∈ M : u¯i (γi , σ−i ) ≥ αi }, ′ (b) for any (σ1′ , σ2′ ) ∈ V , there is an i ∈ I such that σi′ ̸∈ co{γi ∈ M : u¯i (γi , σ−i )≥

αi }.3 In other words, this amounts to the requirement that the mixed extension u¯ of u be continuously secure. Given any bounded measurable function u : [0, 1] × [0, 1] → R2 , we write Qu for the smallest convex-valued and closed correspondence Q : [0, 1] × [0, 1] → R2 which includes u in the sense of set inclusion of the graphs, and we write SQu for the set of all measurable selections of Qu . Note that boundedness of u implies that Qu must actually be upper hemi-continuous with compact values; in particular, every element 3

This definition of continuous security is as in Barelli and Meneghel (2013) but it is not a sufficient

condition for the existence of equilibrium. To solve this problem, one can require φi to be convex, as in Barelli and Soza (2009), or to be included in a finite-dimensional subspace of M , as in McLennan, Monteiro, and Tourky (2011).

5

of SQu must be bounded and therefore defines a normal form game in the sense of the above specifications. Here is our result. Theorem. There is a bounded measurable function u∗ : [0, 1] × [0, 1] → R2 such that no u ∈ SQu∗ is mixed-strategy-better-reply secure. The function u∗ can be chosen in such a way that, in fact, no u ∈ SQu¯ is mixed-strategy-continuously secure. Remark. As noted in the introduction, mixed-strategy-continuous security implies mixed-strategy-better-reply security. Thus the formulation of our result contains some redundancy. We have chosen this formulation to point to the fact—see our proof below—that the conclusion concerning mixed-strategy-better-reply security can be established directly.

3

Proof of the theorem

In the sequel, “equilibrium” means “mixed strategy Nash equilibrium.” For each i ∈ N and each xi ∈ [0, 1], we write δxi for the Dirac measure at xi . Also, we write X = [0, 1] × [0, 1]. Let S1 = [2/3, 1] × [1/3, 1] and S2 = {(x1 , x2 ) ∈ X : x1 ≤ 1/4 and x1 ≤ x2 ≤ 2x1 }. Define u∗ = (u∗1 , u∗2 ) : X → R2 by setting     (1, 1) if (x1 , x2 ) ∈ S1    u∗ (x1 , x2 ) = (2, 2) if (x1 , x2 ) ∈ S2      (0, 0) if (x1 , x2 ) ∈ X \(S1 ∪ S2 ). Note that Qu∗ (0, 0) = {(2λ, 2λ) : λ ∈ [0, 1]}, Qu∗ (1, 1) = Qu∗ (0, 1) = {(0, 0)}, and Qu∗ (1, 0) = {(1, 1)}. Fix any u ∈ SQu∗ . Assume first that u is such that (δ0 , δ1 ) is an equilibrium of u. Because u(0, 1) = (0, 0) and u(0, 0) = (2λ, 2λ) for some λ ∈ [0, 1], it follows that u(0, 0) = (0, 0). Since u(1, 0) = (1, 1), it follows that (δ0 , δ0 ) is not a equilibrium 6

of u. Note that (δ0 , δ0 , 2, 2) is a cluster point of the graph of u¯ and that for each i ∈ I, u¯i (δx¯i , δx′−i ) ≤ 2 and u¯i (σi , δx′−i ) ≤ 2 for all x¯i ∈ [0, 1], σi ∈ M and x′−i ∈ [0, 1]. Thus, no player can secure a payoff strictly above 2 at (δ0 , δ0 ). Hence, u is not mixed-strategy-better-reply secure if u is such that (δ0 , δ1 ) is an equilibrium of u. Assume now that u is such that (δ0 , δ1 ) is not an equilibrium of u. Note that (δ0 , δ1 , 0, 0) is a cluster point of the graph of u¯. We show that no player can secure a payoff strictly above 0 at (δ0 , δ1 ). For player 1 this is true because u1 (x′ ) = 0 for all x′ ∈ X such that x′2 > 1/3, so that u¯1 (σ1 , δx′2 ) = 0 for all σ1 ∈ M and x′2 > 1/3. As for player 2, let ε, δ > 0 and σ2 ∈ M be given. We claim that there exists x′1 ∈ X1 such that x′1 ≤ δ/2 (which implies that the Prohorov distance between δx′1 and δ0 is less than δ) and u¯2 (δx′1 , σ2 ) < ε. To prove this claim, let ξ = min{δ/2, 1/6} and t define a sequence {αt }∞ t=0 in [0, 1] by setting αt = ξ/2 for all t ∈ N. For all t ∈ N let

Ft = [αt+1 , αt ] and Ot = (αt+1 , αt ). Observe that u2 (αt , x2 ) = 0 for all x2 ∈ [0, 1]\Ft . ∑ ∪∞ ∑∞ ∪∞ Since ∞ t=0 σ2 (Ot ) = σ2 ( t=0 Ot ) ≤ 1 and t=0 σ2 ({αt }) = σ2 ( t=0 {αt }) ≤ 1, it follows that both {t ∈ N : σ2 (Ot ) ≥ ε/6} and {t ∈ N : σ2 ({αt }) ≥ ε/6} are finite. Thus there exists t ∈ N such that σ2 ({αt }) < ε/6, σ2 ({αt+1 }) < ε/6 and σ2 (Ot ) < ε/6. This implies that σ2 (Ft ) < ε/2, so that q¯2 (δαt , σ2 ) ≤ 2σ2 (Ft ) < ε. Furthermore, αt ≤ δ/2. Thus, letting x′1 = αt , it follows that for each ε, δ > 0 and σ2 ∈ M2 , there exists x′1 ≤ δ/2 such that q¯2 (δx′1 , σ2 ) < ε. As ε > 0 is arbitrary, it follows that player 2, too, cannot secure a payoff strictly above 0 at (δ0 , δ1 ). Thus, no player can secure a payoff strictly above 0 at (δ0 , δ1 ), and we conclude that u is not mixed-strategy-betterreply secure also in case (δ0 , δ1 ) is not an equilibrium of u. As u is an arbitrary element of SQu∗ it follows that no element of SQu∗ is mixed-strategy-better-reply secure. We now modify the functions u∗ by changing the definition of the set S2 . Let A denote the set of even natural numbers that are greater or equal than 6, and for each n ∈ A, let S2n Let S2 =

{ [ ] } 1 1 = (x1 , x2 ) ∈ X : x1 ∈ , and x1 ≤ x2 ≤ 2x1 . n+1 n

∪ n∈A

S2n . The remaining elements in the above definition of u are kept

unchanged. As above, we have Qu∗ (0, 0) = {(2λ, 2λ) : λ ∈ [0, 1]}, Qu∗ (1, 0) = {(1, 1)}, 7

and Qu∗ (1, 1) = Qu∗ (0, 1) = {(0, 0)}. Fix any u ∈ SQu∗ . To see that u is not mixed-strategy-continuously secure, assume first that u is such that (δ0 , δ1 ) is an equilibrium of u. As above, this implies that (δ0 , δ0 ) is not an equilibrium of u. Suppose that u is mixed-strategy-continuously secure. Then, in particular, there is an α ∈ R2 , an open neighborhood V ⊆ M × M of (δ0 , δ0 ), and nonempty-valued closed correspondences φi : V → Xi for each i ∈ I, such that conditions (a) and (b) in the definition of continuous security hold. Let (x′1 , x′2 ) ∈ X be such that (δx′1 , δx′2 ) ∈ V , x′1 < x′2 < 2x′1 and x′1 ∈ (1/(n + 1), 1/n) for some n ∈ A. Then x′ belongs to the interior of S2n , so u(x′ ) = (2, 2). Condition (b) in the definition of mixed-strategy-continuous security therefore implies that αi > 2 for some i ∈ I. This, however, implies that condition (a) in the definition of continuous security cannot hold because ui (ˆ xi , x′−i ) ≤ 2 for all xˆi ∈ [0, 1] and all i ∈ I. This contradiction shows that u is not mixed-strategy-continuously secure. Now assume that u is such that (δ0 , δ1 ) is not an equilibrium of u. Again suppose that u is continuously secure. Then there exists α ∈ R2 , an open neighborhood V ⊆ M × M of (δ0 , δ1 ), and closed nonempty-valued correspondences φi : V → Mi for each i ∈ I, such that conditions (a) and (b) in the definition of continuous security hold. Let x′ ∈ X be such that (δx′1 , δx′2 ) ∈ V , x′1 ∈ (1/(n+1), 1/n) for some odd n ≥ 6 (i.e. n ∈ Ac ), and x′2 > 1/3. Then u1 (y1 , x′2 ) = 0 for all y1 ∈ [0, 1] and u2 (x′1 , y2 ) = 0 for all y2 ∈ [0, 1]. This, together with condition (a) in the definition of continuous security, implies that αi ≤ 0 for each i ∈ I. But then {γi ∈ M : u¯i (γi , δx′−i ) ≥ αi } = M for each i ∈ I, and condition (b) in the definition of continuous security fails. This contradiction shows that u is not mixed-strategy-continuously secure also if (δ0 , δ1 ) is not an equilibrium of u.

References Barelli, P., S. Govindan, and R. Wilson (2014): “Competition for a Majority,” Econometrica, 82, 271–314.

8

Barelli, P., and I. Meneghel (2013): “A Note on the Equilibrium Existence Problem in Discontinuous Games,” Econometrica, 81, 813–824. Barelli, P., and I. Soza (2009): “On the Existence of Nash Equilibria in Discontinuous and Qualitative Games,” University of Rochester. Bich, P., and R. Laraki (2017): “On the Existence of Approximate Equilibria and Sharing Rule Solutions in Discontinuous Games,” Theoretical Economics, 12, 79–108. Carmona, G., and K. Podczeck (2017): “Invariance of the Equilibrium Set of Games with an Endogenous Sharing Rule,” University of Surrey and Universit¨at Wien. Jackson, M., and J. Swinkels (2005): “Existence of Equilibrium in Single and Double Private Value Auctions,” Econometrica, 73, 93–139. McLennan, A., P. Monteiro, and R. Tourky (2011): “Games with Discontinuous Payoffs: a Strengthening of Reny’s Existence Theorem,” Econometrica, 79, 1643–1664. Reny, P. (1999): “On the Existence of Pure and Mixed Strategy Equilibria in Discontinuous Games,” Econometrica, 67, 1029–1056. Simon, L., and W. Zame (1990): “Discontinuous Games and Endogenous Sharing Rules,” Econometrica, 58, 861–872.

9

The existence results for discontinuous games by Reny ...

Nov 6, 2017 - Address: University of Surrey, Faculty of Business, Economics and Law, School of Economics,. Guildford, GU2 7XH, UK; email: ... Wien, Oskar-Morgenstern-Platz 1, A-. 1090 Wien, Austria; email: [email protected]. 1 .... small deviation from σ−i by the other players. As noted by Bich and Laraki ...

76KB Sizes 2 Downloads 212 Views

Recommend Documents

Strategic approximations of discontinuous games
Department of Economics, University of Chicago, Chicago, IL, USA e-mail: preny .... Moreover; if the mixed extension of G is finite-support better-reply secure ...

Nash Equilibrium in Discontinuous Games
Phone: 773$7028192; Fax: 773$702$8490; email: [email protected]. 1This literature has ... behaved best$reply correspondences (e.g., Nash 1950, 1951; Glicksberg 1952). To this end, ... to verify in practice. 2 .... be optimizing, and therefore ,x is

Further Results on the Existence of Nash Equilibria ... - Semantic Scholar
University of Chicago. May 2009 ... *Financial support from the National Science Foundation (SES#9905599, SES#0214421) is gratefully ac# knowledged.

Equilibrium in Discontinuous Games without Complete ...
Nov 17, 2015 - i G N\I, player iIs best-reply correspondence is closed and has non-empty and convex values, then G possesses a pure strategy Nash equilibrium. 2. An Application to Abstract Games. We demonstrate here how Theorem 1.3 can be applied to

Discontinuous Seam-Carving for Video Retargeting
ence to the spatial domain by introducing piece-wise spa- tial seams. Our spatial coherence measure minimizes the change in gradients during retargeting, ...

BY Morry PERRY AND PHILIP J. RENY
Reny also acknowledges support from the University of Pittsburgh's Faculty of Arts and. Sciences. We thank two ..... of Maryland, College Park, MD. FRuros, M. A. ...

A Discontinuous Galerkin Scheme for Elastic Waves ...
Two discontinuous Galerkin schemes for linear elastic waves in two and three dimen- sions with ...... The third file contains a list of boundary edges, defined by.

pdf-0961\-nodal-discontinuous-galerkin-methods-algorithms ...
... a lot more fun to enjoy. reading. Page 3 of 7. pdf-0961\-nodal-discontinuous-galerkin-methods-algori ... l-discontinuous-galerkin-methods-algorithms-analy.pdf.

EXISTENCE THEOREMS FOR QUASILINEAR ...
Lp (Ω,f), since vn p ,f → vp ,f . This shows the claim, since the subse- quence (vnk )k of (vn)n is arbitrary. By Hölder's inequality we have for all φ ∈ E, with φ = 1,. |〈F(un)−F(u),φ〉|≤. ∫. Ω f(x)|vn−v|·|φ|dx ≤ vn−vp ,f

Evidence for the existence of multiple equilibrium states ...
Mar 30, 2006 - 2 PCM, Vikram Sarabhai Space Centre, Trivandrum 695022, India. E-mail: .... this provision around 20000 data points could be acquired.

Evidence for the existence of multiple equilibrium states ...
Mar 30, 2006 - active component in organic solar cells, since they undergo .... temperature, charged particles acquire enough thermal energy to cross over the ...

new conditions for the existence of infinitely many ...
of local minima of the energy functional in suitable convex sets is exhibited. ... denote by M(ϕ, ψ, λ) the set of all global minima of the function λψ − ϕ or the ...

The Alternative to Equilibrium Existence
Feb 18, 2009 - ui(bi,a−i)−ui(a) and emphasized its use for studying Nash equilibrium, ..... sequential consistency as a useful tool for establishing equilibrium.

Team Manager Invidividual Meet Results-by Event for ...
12.9h NWI. F. Event # 19 Women 100m Dash Open. 1. -.22. 4. SO. VonKnorring, Malin. 14.24. 14.0h NWI. F. Event # 20 Men 100m Dash Open. 3 .24. 2. SR. Carroll, Paul. 11.64. 11.4h NWI. F. --- .30. ---. SO. Viter, Jake. 12.94. 12.7h NWI. F. Event # 22 Me

A Rational Existence - MOBILPASAR.COM
Conroy is a budding entomologist, that means that he likes to study insects. In fact, Conroy has an insect collection that currently contains 30 insects that fly and 45 insects that crawl. He would like his collection to contain enough insects so tha

The Realms of Divine Existence
Thus, all statements about God can only refer to His attributes as embodied by His Manifestation. (Mazhar-i-Iláhí) or ... manifest) but they are unable to claim any independent existence for themselves before the throne of God .... become illumined

Existence and the Forms of Geometry
Jan 10, 2016 - Ifyou had a way of taking a three-dimensional picture, it would he an ellipsoid. What you call as existence is multiplication, permuta- tions and ...