1 Introduction

The concept of word-of-mouth advertising is built upon the idea that referrals between individuals can lead to a contagion of opinion in a population. In this way, a small number of initial adopters can generate a cascade of influence, significantly impacting the adoption of a new product. While this concept has been very well studied in the marketing and sociology literature [15], recent popularity of online social networking has made it possible to obtain rich data and directly target individuals based on network topology. Indeed, a potential advantage of advertising served via online social networks is that the platform could preferentially target central individuals, impacting the overall effectiveness of its advertisers’ campaigns.

Various models of network influence spread have arisen recently in the literature, with a focus on the algorithmic problem of deciding which individuals to target as initial adopters (or “seeds”) [68]. One commonality among many of these (stochastic) models is that the expected number of eventual adopters is a non-decreasing submodular function of the seed set. This implies that natural greedy methods [9] can be used to choose initial adopters so as to approximately maximize an advertiser’s expected influence. Of course, actually applying such algorithms requires intimate knowledge of the social network, which may not be readily available to all advertisers. However, the owners of the network data (e.g. Facebook or Google) could more easily find potentially influential individuals to target. Our goal is to study the problem faced by a network platform that wishes to provide this service to its advertisers.

Consider the following framework. An online social network platform sells advertising space by contract, offering a price per impression to advertising firms. Each firm has an advertising budget, which determines a number of ad impressions they wish to display. As an additional service to the firms, the platform attempts to optimize the placement of advertisements so to maximize influence diffusion. This optimization is to be provided as a service to the advertisers, with the primary goal of making the social network more attractive as a marketing platform. The network provider thus faces an algorithmic problem: maximize the total influence of the advertisers given their budgets (i.e. number of impressions). This problem may be complicated by competition between advertisers, which results in negative externalities upon each others’ product adoptions. Moreover, since advertising budgets are private, there is also a game-theoretic component to the problem: the placement algorithm should not incentivize firms to reduce their budgets. This may happen if, due to properties of the algorithm, lower-budget advertisers might obtain higher expected influence than advertisers with higher budgets.

Crucial to this problem formulation is the way in which influence is modeled by the advertising platform. We present a general submodular assignment problem with negative externalities, which captures most previous influence models that have been proposed in the literature [1013]. Within this framework, we consider the optimization problem faced by a central mechanism that must determine the seed nodes for each advertiser, given the advertisers’ budget constraints. The goal of the mechanism is to maximize the overall efficiency of the marketing campaigns, but the advertisers are strategic and may under-report their budgets to increase their own product adoption rates.

Two points of clarification are in order. First, our formulation differs from a line of prior work that studies equilibria of the game in which each advertiser selects their seed set directly [11, 13]. Such a game supposes that each advertiser has detailed knowledge of the social network topology, the ability to compute or converge to equilibrium strategies, and the power to target arbitrary individuals in the network. Our work differs in that we assume that the targeted advertising goes through an intermediary (the social network), which selects seed sets on the players’ behalf.

Second, we suppose that advertiser budgets and the price per impression are set exogenously (or, alternatively, that the seeds correspond to special offers or other interventions of limited quantity). As such, we do not explicitly model the problem of maximizing revenue; rather, the role of our mechanism is to decide where to place the purchased impressions so as to maximize the social welfare (i.e. the total influence spread). In this sense our framework is closer in spirit to matching algorithms for display advertising [14, 15] than to revenue-optimal mechanism design. There are many ways in which this model could be enriched, such as by endogenizing budgets or allowing complex pricing schemes that depend upon expected influence. We leave these as avenues for future work, though we note that such extensions presuppose that agents have sufficient knowledge of the spread process and graph topology to accurately value initial adoption sets.

Our general model of competitive influence captures prior models from the literature such as those discussed in the related works Sect. 1.2 to follow. (Further discussion of the relation to other models appears in Appendix “Relation with Other Diffusion Models”.) The model treats influence spread as a submodular process, with some extra conditions that relate the influence of different firms; namely, an adverse competition assumption that reflects the competitive nature of the process, as well as mechanism indifference and agent indifference assumptionsFootnote 1 that will be introduced in Sect. 1.1. Our model of competitive influence spread is described formally in Sect. 2.

We wish to design mechanisms that are strategyproof, in that rational agents are incentivized to truthfully reveal their budgets. In particular, an agent should not be able to increase its expected influence by reducing its requested number of seeds (i.e. budget). The difficulty in avoiding such non-monotonicities is that the expected outcome of an advertiser can be negatively impacted by externalities imposed by the allocation to its opponents, which can depend on the budget declarations in a non-trivial manner.

1.1 Our Results

We design two different \(\frac{e}{e-1}\)-approximate strategyproof mechanisms for the competitive influence maximization problem. Our main result is the strategyproof mechanism for use when there are two competing advertisers. This result assumes that the social welfare (i.e. the expected number or weight of nodes that are eventually influenced) is independent of the manner in which elements are partitioned among the players (mechanism indifference). This mechanism uses a novel technique for monotonizing the expected utilities of the agents using geometric properties of the problem in the two-player case.

Our second and more natural mechanism is for three or more players, under an additional (and also common) natural restriction on the influence spread process. Specifically, we require that the payoff of a player does not depend on the manner in which the elements allocated to her competitors are partitioned among the competitors (agent indifference). We note that both the mechanism and agent indifference assumptions are implicit in many prior models of influence spread [10], [11]. Interestingly, our analysis here makes crucial use of the presence of three or more players, and indeed we show in Sect. 3.1 that this mechanism fails to be strategyproof when only two players are present, even with these two additional assumptions.Footnote 2

Our mechanisms run in time polynomial in the budgets submitted by the agents and in the size of the underlying ground set. This dependence on the budget values is necessary, as the mechanism constructs a solution consisting of sets of this size. Our dependence on the size of the underlying ground set is captured by oracle queries for an element that maximizes a marginal increase in social welfare. Given oracle access to queries of this nature, our algorithm would run in time polynomial in the declared budgets. Generally speaking, the spread process itself is randomized and as in [6, 7], the oracle can be viewed as providing an element that approximately maximizes the marginal gain by sampling enough trials of this process [6, 7]. Our analysis also holds when such approximate marginal maximizers are used to implement our underlying greedy algorithm; following the exposition in [17], such an approximate maximizer provides an approximation that approaches \(\frac{e}{e-1}\) as the oracle approximation approaches 1. We will simplify our discussion throughout by assuming it is possible to find elements that exactly maximize marginal gains in social welfare.

1.2 Related Work

Models of influence spread in networks, covering both cascade and threshold phenomena, are well-studied in the sociology and marketing literature [1, 2]. The (non-competitive) problem of maximizing influence in social networks was theoretically modelled by Kempe et al. [6, 7]. Subsequent papers extended these models to a competitive setting in which there are multiple advertisers. Carnes et al. [10] suggested the Wave Propagation model and the Distance Based model, which were based on the Independent Cascade model. Additionally, Dubey et al. [18], Bharathi et al. [11], Kosta et al. [19], and Apt et al. [20] also studied various competitive models. The main issue that these models addressed was how to arbitrate ties in each step of the process, determining which technology a node will assume when reached by several technologies at once. The main algorithmic task addressed by these models is choosing the optimal set of nodes for a player entering an existing market, in which the competitor’s choice of initial nodes is already known. Borodin et al. [12] presented the OR model which proposes a different approach, in which the previously studied, non-competitive diffusion models proceed independently for each technology as a first phase of the process, after which the nodes decide between each technology according to some decision function.

Independent of our initial work [21], Goyal and Kearns [13] provided bounds on the efficiency of equilibria (i.e. the price of anarchy) in a competitive influence game played by two players. Their influence spread model is characterized by switching functions (specifying the process by which a node decides to adopt a product) and selection functions (specifying the manner in which nodes decide which product to adopt). They demonstrate that an equilibrium of the resulting game yields half of the optimal social welfare, given that the switching functions are concave. Their model is closely related to our own. Specifically, the social welfare function is monotone and satisfies the mechanism indifference assumption, and concavity of the switching function implies that the social welfare is submodular (by [8]), so our mechanism for two players applies to their model as wellFootnote 3. Goyal and Kearns also note that their results extend to \(k > 2\) players, resulting in an approximation factor of 2k, when the selection function is linear; this linearity implies our agent indifference assumption, and hence our mechanism for three or more players also applies. However, we note that the Goyal and Kearns results on efficiency at equilibrium are satisfied without an intervening mechanism and hence are incomparable with the mechanism results of this paper.

Finally, to the best of our knowledge, there is only one other paper that considers a mechanism design problem in the context of competitive influence spread. Namely, Singer [22] considers a social network where the nodes are viewed as agents who have private costs for hosting a product and the mechanism has a budget for inducing some set of initial nodes to become hosts. The mechanism wishes to maximize the number of nodes that will eventually be influenced and each agent wishes to maximize their profit equal to the inducement received minus its private cost.

2 Preliminaries

We consider a setting in which there is a ground set \(U = \{e_1, \ldots , e_n\}\) of n elements (e.g. nodes in a social network), and k players. An allocation is some \((S_1,\ldots , S_k) \in 2^U \times \cdots \times 2^U\); that is, an assignment of setFootnote 4 \(S_i\) to each player i.

We are given functions \(f_i :2^U \times \cdots 2^U \rightarrow \mathbb R_{\ge 0}\), denoting the expected values of players \(i=1,\ldots ,k\), for allocation \((S_1,\ldots ,S_k)\). We define \(f = \sum _{i=1}^k f_i\), so that \(f(\mathbf {S})=f(S_i,\mathbf {S_{-i}})\) denotes the total expected welfare of the allocation \((\mathbf {S})=(S_1,\ldots ,S_k)=(S_i, \mathbf {S_{-i}})\).

We will require that functions f, and \(f_1,\ldots , f_k\) satisfy certain properties, motivated by known properties of influence spread models studied in the literature. First, we will assume that f is a submodular non-decreasing function, in the following sense. For any \(S_i \subseteq S'_i\), \(\mathbf {S_{-i}}\), and \(e \in U\), we have \(f(S_i,\mathbf {S_{-i}}) \le f(S'_i,\mathbf {S_{-i}})\) and

$$\begin{aligned} f(S_i \cup \{e\},\mathbf {S_{-i}}) - f(S_i,\mathbf {S_{-i}}) \ge f(S'_i \cup \{e\}, \mathbf {S_{-i}}) - f(S'_i,\mathbf {S_{-i}}). \end{aligned}$$

We will also require that for all \(i=1,\ldots ,k\), the function \(f_i\) be non-decreasing in the allocation to player i, so that \(f_i(S_i,\mathbf {S_{-i}}) \le f_i(S'_i,\mathbf {S_{-i}})\) for any \(S_i \subseteq S'_i\). These assumptions are all rather standard in spread models.

A more substantive property of the social welfare function f that we assume is mechanism indifference (MeI) which we define as follows: \(f(\mathbf {S}) = f(\mathbf {S}')\) whenever the sets \(\bigcup _i S_i\) and \(\bigcup _i S_i'\) are equal. In words, this assumption means the social welfare function is invariant, regardless of the manner in which we divide the total set of allocated items. Going back to our motivating setting of competitive influence diffusion processes, this assumption pertains to scenarios in which the final decision of whether to adopt some technology is independent of the division of the total marketing resources (i.e., the initial allocated nodes). We note that to the best of our knowledge, most of the competitive diffusion models that are studied in the literature have this property (see Appendix “Relation with Other Diffusion Models”).

For our result concerning three of more players we will need the agent indifference (AgI) property defined as follows: \(f_i(S_i, \mathbf {S}_{-i}) = f_i(S_i, \mathbf {S}'_{-i})\) whenever sets \(\bigcup _{j \ne i} S_j\) and \(\bigcup _{j \ne i} S_j'\) are equal. That is, each agent’s utility depends on the set of items allocated to the other players, but not on how the items are partitioned among those players. We will call this the Agent Indifference (AgI) assumption. Notice that in the two-players case, this assumption is vacuous. We again note that many of the existing competitive influence models satisfy this property.

We impose one final model assumption with regard to the competitive aspect of the model, which we call adverse competition; namely, each \(f_i\) is non-increasing in the allocation to other players. That is, for all \(j \ne i\), \(f_i(S_j,\mathbf {S_{-j}}) \ge f_i(S'_j,\mathbf {S_{-j}})\) for any \(S_j \subseteq S'_j\). This assumption captures our intuition that, in a competitive influence model, the presence of additional adopters for one player can only impede the spread of influence for another player. We discuss the motivation for and necessity of this assumption in Appendix “Relation with Other Diffusion Models”.

2.1 The Algorithmic Problem and Overall Approach

We study the following task. We assume an influence spread maximization problem with unit cost to influence an initial node. Given the agents’ budgets \(b_1,\ldots ,b_k \ge 0\), which then denotes the number of initial nodes that each agent wants to initially influence (their reported budgets), we wish to find sets \(S_1,\ldots , S_k \subseteq V\), with \(|S_i| = b_i\), for all \(i=1,\ldots ,k\), such that \(f(S_1,\ldots ,S_k)\) is maximized. In order to decouple the task of estimating the stochastic influence function from the combinatorial problem at hand, we assume we are given oracle access to the functions f and \(f_1, \ldots , f_k\)Footnote 5

Suppose that \(\mathcal {A}\) is a deterministic algorithm for the above problem, so that \(\mathcal {A}(b_1,\ldots ,b_k)\) denotes an allocation for any \(b_1,\ldots ,b_k \ge 0\). We say that \(\mathcal {A}\) is monotone if, for all budget vectors \(\mathbf {b}=(b_1,\ldots ,b_k) \in \mathbb {Z}^k_{\ge 0}\), \(f_i(\mathcal {A}(b_i,\mathbf {b_{-i}})) \le f_i(\mathcal {A}(b_i+1,\mathbf {b_{-i}}))\), for each player \(i=1,\ldots ,k\). We extend this definition to randomized algorithms in the natural way, by taking expectations over the outcomes returned by \(\mathcal {A}\).

We will assume that each agent i has a type \(\tilde{b_i}\), representing the maximum number of elements they can be allocated. This corresponds to the agent’s true budget. The utility of player i for allocation \(\mathbf {S}=(S_1,\ldots ,S_k)\) is

$$\begin{aligned} u_i(\mathbf {S}) = {\left\{ \begin{array}{ll} f_i(S_i,{\mathbf{S}_\mathbf{{-i}}}) \quad &{} \text {if}\,|S_i| \le \tilde{b_i}\\ -\infty &{} \text {otherwise.} \end{array}\right. } \end{aligned}$$

Note that the second part of the definition of the utility function essentially means that the agent should not be allocated additional nodes beyond what is permitted by his budget (i.e., the agents have hard budgets). We then say that algorithm \(\mathcal {A}\) is strategyproof if, for all \(\mathbf {b} \in \mathbb {Z}^k_{\ge 0}\) and \(b_i' \le b_i\), \(u_i(\mathcal {A}(b_i',\mathbf {b_{-i}})) \le u_i(\mathcal {A}(b_i, \mathbf {b_{-i}}))\). In other words, an algorithm is strategyproof if it incentivizes each agent to report its type truthfully.

Due to the above assumptions, we observe that the optimization problem of maximizing the social welfare function \(f(\cdot )\) subject to the reported budgets can be stated in the framework of maximizing a submodular set-function subject to a cardinality constraint that has been studied by Nemhauser et al. [23]. Namely, given a non-decreasing and submodular set function \(g: 2^X \rightarrow \mathbb {R}_{\ge 0}\) over a universe X, and a cardinality constraint T, the goal is to find a set \(S \subseteq X\) that maximizes g(S).

Put in terms of our setting, we can set the cardinality constraint to be \(B=\sum _{i=1}^kb_i\), the social welfare function can be re-expressed as the following single-parameter, non-decreasing, and submodular objective function \(g(\cdot )\):

$$\begin{aligned} g(T)=f(\mathbf {S}), \text { where }T=\bigcup _{i=1}^kS_i. \end{aligned}$$
(1)

This alternative objective function g(T) conforms to the single-parameter convention of submodular set-functions. However, we will mostly refer to the former objective \(f(\mathbf {S})\) for clarity and succinctness

As a result of this correspondence with the framework of submodular function maximization, we will make use of the well-known greedy algorithm due to Nemhauser et al. [17, 23] for selecting the total set of nodes to be allocated to the agents, which will give us an \(e/(e-1)\) approximation ratio of the optimal social welfare. The algorithm operates as follows: starting from an empty set \(S =\emptyset \), while \(|S| < B\), the algorithm adds to S the element \(x \in U \setminus S\) that maximizes the marginal contribution to the function \(g(\cdot )\). As Nemhauser et al. show, this “hill-climbing” algorithm admits a \(e/(e-1)\) approximation to the optimal social welfare.

The hill-climbing algorithm admits the total set of elements that will be allocated to all the agents. Thus, the algorithmic problem that we will address is how to partition this total set of nodes among the agents in a manner that incentivizes the agents to truthfully report their budgets. More specifically, if we denote the collective budget of the agents by \(B = \sum _{i=1}^kb_i\), we will employ the greedy hill-climbing algorithm to generate the sequence \((e^*_1,\ldots ,e^*_B)\) of nodes that are to be allocated to the agents, where the ordering is taken with respect to the iterative addition process. Then, our algorithms will decide, for each \(j =1,\ldots ,B\), to which agent \(v^*_j\) will be assigned.

Importantly, notice that due to our MeI assumption, our mechanisms will always allocate the agents disjoint sets of vertices, as allocating different agents the same vertex will have no effect on the social welfare. Henceforth, we will assume that our general influence spread model satisfies both the MeI and adverse competition assumptions. We will only need to utilize the AgI assumption in Sect. 4 when we consider the mechanism for \(k > 2\) players.

3 A Strategyproof Mechanism for Two Players

In this section we describe our mechanism for allocating nodes when there are two agents. The case of \(k > 2\) agents is handled in Sect. 4, under the additional AgI assumption that is vacuously true for the case \(k=2\). Our mechanism is based on the greedy algorithm described in Sect. 2.

3.1 Counter Examples When There are Two Agents

In Sect. 3.2 we carefully construct a distribution for determining which player will receive each of the initial nodes that have been chosen by the natural greedy algorithm. This distribution will induce strategyproofness for two players. To motivate these algorithmic gymnastics, we now demonstrate that more natural orderings fail to result in strategyproofness.

We begin by considering the “dictatorship” ordering, in which one player is first allocated nodes up to his budget, and only then is the other player allocated nodes. We will refer to the agents as A and B, and their utilities as \(f_A\) and \(f_B\) respectively; suppose that A is the dictator. For the purposes of our example we will describe \(f_A\) and \(f_B\) in terms of the following concrete (but simple) competitive influence spread processFootnote 6 on an undirected network \(G = (V,E)\).

Suppose that each agent is given an initial seed set, say \(S_A\) and \(S_B\). For agent A, each node in \(S_A\) is given a single chance to activate each of its neighbors independently, which it does with probability \(p=0.9\). (Note that this activation process is not recursive; it affects only the neighbors of \(S_A\)). We then, independently, allow each node in seed set \(S_B\) to attempt to activate each of its neighbors, resulting in a set of nodes activated by B. To determine the final influence sets, any node activated only by A is influenced by A, any activated only by B is influenced by B, and any node activated by both will choose between the two agents uniformly at random. The value of \(f_A(S_A, S_B)\) is the expected number of nodes influenced by A at the end of this process, and similarly for \(f_B\). One can easily show that an agent’s influence is non-decreasing in its seed set, that the sum of influences is submodular non-decreasing, and that the functions satisfy adverse competition.

Fig. 1
figure 1

The counter-example for the dictatorship ordering

Our network is as follows (see Fig. 1). The graph consists of two components; one is the complete bipartite graph \(K_{2,10}\), and the other is the star \(K_{1,4}\). Let \(w_1\) and \(w_2\) be the two nodes of degree 10, and let v be the center of the star. We claim that the greedy algorithm paired with the dictatorship ordering is not strategyproof for this network. Suppose each agent declares a budget of 1; in this case, the algorithm will allocate \(w_1\) to agent A, then it will allocate v to agent B (since \(4p > 10(1-(1-p)^2)-10p\), which means that v maximizes the marginal gain in social welfare). This results in an expected influence of \(10p = 9\) for agent A. In the case where A has a budget of 2 (and B’s budget is still 1), the greedy algorithm will allocate \(w_1\) and v to agent A (for the same reason as before), and will give \(w_2\) to agent B. In this case, the influence of agent A becomes \(4p + 10(p \cdot (1-p) + \frac{p^2}{2}) = 8.55 < 9\), so in particular his influence is not non-decreasing in his declaration.

The above construction can be modified to show that various other agent orderings for the greedy algorithm fail to result in strategyproof mechanisms. Appendix “Counterexamples When There are Two Agents (Extended Discussion)” provides the following examples:

  1. 1.

    The Round Robin ordering: the mechanism alternates between the players when allocating a node.

  2. 2.

    Always choosing the player having the smallest current unsatisfied budget breaking ties in favor of player A.

  3. 3.

    Taking a uniformly random choice over all orderings with the required number of allocations to A and B.

The last example is particularly relevant, since in Sect. 4 we show that for the case of \(k>2\) agents, taking a uniformly random permutation over the allocation in combination with the greedy hill-climbing algorithm results in a strategyproof algorithm that admits an \(\frac{e}{e-1}\) approximation to the optimal social welfare. In contrast, for the case of \(k=2\), and even under the extra AgI assumption placed in Sect. 4, the uniformly random mechanism is not strategyproof. Footnote 7

3.2 A Strategyproof Mechanism for Two Agents

Theorem 1

In the case of two strategic agents, there exists a strategyproof mechanism that admits a \(e/(e-1)\)-approximation of the maximal social welfare. Furthermore, the algorithm runs in polynomial time.

As previously mentioned, our mechanism is divided into two stages: first, we select the sets of nodes to be allocated to the agents (using the greedy hill-climbing algorithm described in the preliminaries). Then, we randomly construct a permutation that maps the nodes selected in the first stages to the agents in a manner that respects their budgets, and that incentivizes truthful reporting of budgets.

The idea behind our construction, at a high level, is as follows. We will construct the distribution for use with budgets (ab) recursively. Writing \(t = a+b\), we first generate the two distributions for the case \(t=1\) (which are trivial), followed by \(t=2\), etc. To construct the distribution for budgets (ab), we consider the following thought experiment. We will choose an ordering in one of two ways. Either we choose a permutation according to the distribution for budget pair \((a-1,b)\) and then append a final allocation to A, or else choose a permutation according to the distribution for budget pair \((a,b-1)\) and append an allocation to agent B. If we choose the former option with some probability \(\alpha \), and the latter with probability \(1-\alpha \), this defines a probability distribution for budget pair (ab).

What we will show is that, assuming our distributions are constructed to adhere to certain invariants, we can choose this \(\alpha \) such that the resulting randomized algorithm (i.e., the greedy algorithm applied to permutations drawn from the constructed distributions) will be monotone. That is, the expected influence of agent A under the distribution for (ab) is at least that of the distribution for \((a-1,b)\), and similarly for agent B. The existence of such an \(\alpha \) is not guaranteed in general; we will need to prove that our constructed distributions satisfy an additional “cross-monotonicity” property in order to guarantee that such an \(\alpha \) exists.

One problem with the above technique is that it does not bound the size of the support of the distributions. In general there will be exponentially many possible permutations to randomize over, leading to exponential computational complexity to compute the value of \(\alpha \) for each pair of a and b. One might attempt to overcome such issues by sampling to estimate the required probabilities, but this introduces the possibility of non-monotonicities due to sampling error, which we would like to avoid. We demonstrate that each distribution we construct can be “pruned” so that its support contains at most three permutations, while still retaining its monotonicity properties. In this way, we guarantee that our recursive process requires only polynomially many queries (to the influence functions) in order to choose a permutation.

3.2.1 The Allocation Algorithm

Our algorithm will proceed by first selecting the set of \(a+b\) nodes, using the greedy hill-climbing algorithm, while remembering the order of their selections. The second stage of our algorithm consists of choosing a distribution over orders in which nodes are allocated to the two agents. This will be stored in a matrix M, where M[ab] contains a distribution over sequences \((y_1, \cdots , y_t) \in \{A,B\}^{a+b}\), containing a ‘A’s and b ‘B’s. We then choose a sequence from distribution M[ab] and greedily construct a final allocation with respect to that ordering. We begin by describing the manner in which the allocation is made, given the distribution over orderings. The algorithm is given as Algorithm 1.

figure a

An important property of the allocation algorithm that we will require for our analysis is that, given a sequence drawn from distribution M[ab], the allocation is chosen myopically (due to the nature of the greedy algorithm). That is, items are chosen for the agents in the order dictated by the given sequence, independent of subsequent allocations. We will use this property to construct the distribution M[ab], which will be tailored to the greedy algorithm to ensure strategyproofness.

Recall that the approximation ratio for the greedy algorithm guarantees that Algorithm 1 will be a \(e/(e-1)\)-approximation to the optimal total influence, and because of the mechanism indifference property, this approximation guarantee will hold regardless of how we partition the total set among the agents. It remains only to demonstrate that we can construct our distributions in such a way that the expected payoff to each agent is monotone non-decreasing in his budget.

3.3 Constructing Matrix M

We describe the procedure ConstructDistributions, used in Algorithm 1, to generate distributions over orderings of assignments to agents A and B. We will build table \(M[\cdot ,\cdot ]\) recursively, where M[ab] describes the distribution corresponding to budgets a and b. Our procedure will terminate when the required entry has been constructed.

We think of M[ab] as a distribution over sequences of the form \((y_1, \cdots , y_{a+b})\), where \(y_i \in \{A,B\}\). For any given sequence, the corresponding allocation is determined since the greedy algorithm applied in Algorithm 1 is deterministic. We can therefore also think of M[ab] as a distribution over allocations, and in what follows we will refer to “allocations drawn from M[ab]” without further comment.

Note that M[0, b] must assign probability 1 to the sequence \((B, B, \cdots , B)\), and similarly M[a, 0] assigns probability 1 to \((A, A, \cdots , A)\). We will construct the remaining entries of the table M[ab] in increasing order of \(a+b\).

Before describing the recursive procedure for filling the table, we provide some notation. Given M, we will write \(w^A(a,b)\) for the expected value of agent A under the distribution of allocations returned by M[ab]. Similarly, \(w^B(a,b)\) will be the expected value of agent B, and \(w(a,b) = w^A(a,b) + w^B(a,b)\) is the expected total welfare. For notational convenience, set \(w^A(a,b) = w^B(a,b) = 0\) if \(a < 0\) or \(b < 0\).

We will construct M so that the following invariants hold for all \(a > 0\) and \(b > 0\):

  1. 1.

    \(w^A(a,b) \ge w^A(a-1,b+1)\).

  2. 2.

    \(w^A(a,b) \ge w^A(a-1,b)\).

  3. 3.

    \(w^B(a,b) \ge w^B(a,b-1)\).

  4. 4.

    The support of M[ab] contains at most 3 sequences.

The first invariant is a type of cross-monotonicity property, which will help us to construct the entries of matrix M. The second two desiderata capture the monotonicity properties we require of our algorithm. Note that if M satisfies these properties, then Algorithm 1 will be monotone and hence strategyproof. The final property limits the complexity of constructing and sampling from M[ab], implying that Algorithm 1 runs in polynomial time.

We now describe the way in which we construct distribution M[ab], given distributions \(M[a',b']\) for all \(a'+b' < a+b\). We consider two distributions: the first selects a sequence according to \(M[a-1,b]\) and appends an “A”, and the second selects a sequence according to \(M[a,b-1]\) and appends a \(``B''\). Call these two distributions \(D_1\) and \(D_2\), respectively. What we would like to do is find some \(\alpha \), \(0 \le \alpha \le 1\), such that if we choose from distribution \(D_1\) with probability \(\alpha \) and distribution \(D_2\) with probability \(1 - \alpha \), then the resulting combined distribution (for M[ab]) will satisfy \(w^A(a,b) \ge w^A(a-1,b)\) and \(w^B(a,b) \ge w^B(a,b-1)\). Of course, this combined distribution may have support of size up to 6 (3 from \(D_1\) and 3 from \(D_2\)) but we will show that it can be pruned to a distribution with the same expected influence for agents A and B, with at most 3 permutations in its support.

Our main technical lemma, Lemma 1, demonstrates that an appropriate value of \(\alpha \), as described in the process sketched above, is guaranteed to exist and can be found efficiently. Before stating the lemma we introduce some helpful notation. Write \(\varDelta ^{\oplus B}(a,b) = w(a,b) - w(a,b-1) \ge 0\). That is, \(\varDelta ^{\oplus B}(a,b)\) is the marginal gain in total welfare when agent B increases his budget from \(b-1\) to b. Note that due to the manner in which the algorithm operates, \(\varDelta ^{\oplus B}(a,b) \ge 0\), as this is just the marginal increase obtained when adding an item in iteration \(a+b\) of the greedy part of the algorithm (lines 3–4). Also note that due to MeI and the manner by which the algorithm selects the initial nodes, this value is solely determined by the sum \(a+b\).

Lemma 1

It is possible to construct table M in such a way that the following properties hold for all \(a+b \ge 1\):

  1. 1.

    \(w^A(a,b) \ge w^A(a-1,b+1)\)

  2. 2.

    \(w^A(a,b) \ge w^A(a-1,b)\)

  3. 3.

    \(w^A(a,b) \le w^A(a,b-1) + \varDelta ^{\oplus B}(a,b)\)

Furthermore, the entries of M can be computed in polynomial time.

Notice that condition 3 in Lemma 1 implies that agent B’s valuation is monotone increasing with his budget:

$$\begin{aligned} w^A(a,b-1)\ge & {} w^A(a,b) - \varDelta ^{\oplus B}(a,b) \nonumber \\= & {} w^A(a,b) - [ w(a,b) - w(a,b-1) ] \nonumber \\= & {} w^A(a,b) - \left[ \left( w^A(a,b) + w^B(a,b) \right) \right. \nonumber \\&- \left. \left( w^A(a,b-1) + w^B(a,b-1)\right) \right] \nonumber \\= & {} w^A(a,b-1) + w^B(a,b-1) - w^B(a,b) \nonumber \\\Rightarrow & {} w^B(a,b) \ge w^B(a,b-1) \end{aligned}$$
(2)

Proof

We will proceed by induction on \(t = a+b\). The result is trivial for \(t = 1\).

Given \(t=a+b>1\), we generate distribution M[ab] by constructing a value \(\alpha \), then with probability \(\alpha \) we choose from the distribution of sequences (i.e. specifying an order of allocations) \(M[a-1,b]\) and append A, or else with probability \(1-\alpha \) we choose from the distribution \(M[a,b-1]\) and append B. We must show the existance of some \(\alpha \) value such that the three conditions required by Lemma 1 will hold. \(\square \)

Conditions 2 and 3 of the lemma describe an interval in which the value \(w^A(a,b)\) must fall, call it \(I_m^{a,b}\). That is,

$$\begin{aligned} I_m^{a,b} = [w^A(a-1, b), w^A(a,b-1) + \varDelta ^{\oplus B}(a,b)]. \end{aligned}$$

Claim 1 shows that this interval is non-empty.

Claim 1

\(w^A(a-1,b) \le w^A(a,b-1) + \varDelta ^{\oplus B}(a,b)\).

Proof

This follows by induction using condition 1 of the Lemma, which implies \(w^A(a-1,b) \le w^A(a,b-1) \le w^A(a,b-1) + \varDelta ^{\oplus B}(a,b)\). \(\square \)

Let \(W_1^A(a,b)\) (respectively, \(W_1^B(a,b)\)) denote the expected payoff of agent A (respectively, agent B) if we let \(\alpha =1\). That is, \(W_1^A(a,b)\) is the expected influence of agent A if we select a permutation from \(M[a-1,b]\) and append A, then use this permutation when applying our greedy algorithm. We define \(W_0^A(a,b)\) and \(W_0^B(a,b)\) similarly for \(\alpha =0\). The following claim follows from the adverse competition assumption.

Claim 2

\(W_1^A(a,b) \ge w^A(a-1,b)\) and \(W_0^A(a,b) \le w^A(a,b-1)\).

Proof

The first part of the claim follows because, for each fixed ordering in the support of \(M[a-1,b]\), appending an A to that ordering can only increase the welfare of agent A. Likewise, the second part of the claim follows because, for each ordering in the support of \(M[a,b-1]\), appending a B can only decrease the welfare of agent A (due to adverse competition).\(\square \)

We think of \(W^A_1(a,b)\) and \(W^A_0(a,b)\) as the influence for agent A for distributions that we can construct. Let \(I_c^{a,b}\) denote the interval between \(W^A_1(a,b)\) and \(W^A_0(a,b)\). Note that we do not know which of \(W^A_1(a,b)\) or \(W^A_0(a,b)\) is greater. Claim 2 implies that:

Claim 3

\(I^{a,b}_m \cap I^{a,b}_c \ne \emptyset \).

Proof

It cannot be that \(I^{a,b}_c\) lies entirely above \(I^{a,b}_m\), since \(W_0^A(a,b) \le w^A(a,b-1) \le w^A(a,b-1) + \varDelta ^{\oplus B}(a,b)\). Also, it cannot be that \(I^{a,b}_c\) lies entirely below \(I^{a,b}_m\), since \(W_1^A (a,b)\ge w^A(a-1,b)\). Thus \(I^{a,b}_m \cap I^{a,b}_c \ne \emptyset \).\(\square \)

We can therefore write \(I^{a,b} = I^{a,b}_m \cap I^{a,b}_c\). Note that any point in \(I^{a,b}\) corresponds to a lottery (choosing any of the interval’s endpoint with some probability) we can construct for M[ab], which will satisfy conditions 2 and 3 of our Lemma. It remains to show that we can choose this point so that condition 1 of Lemma 1 will also be satisfied. Our claim is that if we always choose \(\alpha \) so that \(w^A(a,b)\) is the minimum endpoint of \(I^{a,b}\), then condition 1 will be satisfied.

With the above in mind, we will set

$$\begin{aligned} \alpha =\arg \min _{\alpha \in [0,1]}\left\{ \alpha W_1^A(a,b) + (1-\alpha )W_0^A(a,b) \in I^{a,b} \right\} \end{aligned}$$
(3)

Note that if we use this value of \(\alpha \) to randomize between appending A to a permutation drawn from \(M[a-1,b]\) and appending B to a permutation from \(M[a,b-1]\), then the resulting value of \(w^A(a,b)\) will indeed be \(\min I^{a,b}\).

For all \(a' + b' = t\), define \(M[a',b']\) as described above. We now argue that this choice satisfies condition 1 of Lemma 1.

Claim 4

If \(a \ge 1\) then \(w^A(a,b) \ge w^A(a-1,b+1)\).

Proof

Note first that \(w^A(a,b) \ge w^A(a-1,b)\), since \(w^A(a,b) \in I^{a,b}_m\). Consider now the value of \(w^A(a-1,b+1)\), which is the minimum of \(I^{a-1,b+1}_c \cap I^{a-1,b+1}_m\). We will now bound the value of \(w^A(a-1,b+1)\), by providing an upper bound on both the minimal endpoint of \(I_c^{a-1,b+1}\) and the minimal endpoint of \(I_m^{a-1,b+1}\).

For budgets \((a-1,b+1)\), the lower endpoint of \(I^{a-1,b+1}_m\) is \(w^A(a-2,b+1)\). On the other hand, \(I^{a-1,b+1}_c\) contains point \(W_0^A(a-1,b+1)\), which is the influence to agent A when we choose a permutation according to \(M[a-1,b]\) and append a ‘B’. However, since allocating an additional item to agent B in any fixed allocation can only degrade agent A’s payoff, it must be that \(W_0^A(a-1,b+1) \le w^A(a-1,b)\).

Thus the lower endpoint of \(I^{a-1,b+1}_m \cap I^{a-1,b+1}_c\) is at most \(\max \{w^A(a-2,b+1),w^A(a-1,b)\}\). But \(w^A(a-2,b+1) \le w^A(a-1,b)\) by induction (using condition 1 of Lemma 1).

We therefore conclude \(w^A(a-1,b+1) \le \max \{w^A(a-2,b+1),w^A(a-1,b)\} \le w^A(a-1,b) \le w^A(a,b)\), as required. \(\square \)

We have shown that table M can be filled with distributions that satisfy the conditions of Lemma 1. It remains to discuss the complexity of computing the entries of M. To this point we have not bounded the size of our distributions’ supports. We will modify the argument to show that the number of permutations required for each table entry M[ab] can be limited to only three, by induction on t.

Consider the distribution constructed for M[ab]. By the inductive hypothesis, since \(M[a-1,b]\) and \(M[a,b-1]\) each have support of size 3, the support of this distribution has size at most 6: the three permutations in the support of \(M[a-1,b]\) with A appended, plus the three permutations in the support of \(M[a,b-1]\) with B appended. Each of these six permutations determines an allocation, say \((S_1, T_1), \cdots , (S_6, T_6)\). For each allocation, we consider the two-dimensional point \((f_A(S_i,T_i), f_B(S_i,T_i))\) representing the welfare to A and B for the given allocation. We can interpret our construction of M[ab] as implementing a point \((w^A(a,b), w^B(a,b))\) with certain properties, such that this point lies in the convex hull of the six points \((f_A(S_1,T_1), f_B(S_1,T_1)), \cdots , (f_A(S_6,T_6), f_B(S_6,T_6))\).

We now use the following well-known theorem [24]:

Lemma 2

(Carathéodory’s theorem) Given a set \(V \subset \mathbb {R}^n\) and a point \(p \in Conv V\) in the convex hull of V, there exists a subset \(A \subset V\) such that \(|A| \le n + 1\) and \(p \in Conv A\).

It must therefore be that our point \((w^A(a,b), w^B(a,b))\) lies in the convex hull of at most three of the points \((f_A(S_1,T_1),\)

\(f_B(S_1,T_1)), \cdots , (f_A(S_6,T_6), f_B(S_6,T_6))\). It follows that there exists a distribution with a support that consists of three of the six permutations corresponding to (ab). Finding this distribution can be done in constant time by considering \(\left( {\begin{array}{c}6\\ 3\end{array}}\right) \) sets of three allocations.Footnote 8 We can therefore construct M[ab] as a distribution over at most 3 permutations, concluding the proof of Lemma 1.

The proof of Lemma 1 is constructive: it implies a recursive method for constructing the table M of distributions. That is, the procedure ConstructDistributions from Algorithm 1 (with input (ab)) will proceed by filling table M in increasing order of t, up to \(a+b\), by choosing the value of \(\alpha \) for each table entry as in the proof of Lemma 1, then storing the implied distribution over three permutations. Note that we can explicitly store the allocations corresponding to the permutations in the table, making it simple to compute the submodular function values needed to determine \(\alpha \) (which is stored as well). We conclude, given this implementation of ConstructDistributions, that Algorithm 1 is a polytime strategyproof 2-approximation to the 2-agent influence maximization problem.

4 A Strategyproof Mechanism for Three or More Players

To construct a strategyproof mechanism for \(k > 2\) players, beyond the MeI and adverse competition assumptions, we will impose the additional agent indiffernce (AgI) property of the influence functions \(f_1, \cdots , f_k\). We show that, under these assumptions, there is a natural mechanism that is strategyproof when there are at least three players. In fact, it turns out that having three or more players in such a setting allows for a much simpler ordering than in the mechanism for the case of only two playersFootnote 9.

We note that the models for competitive influence spread proposed by Carnes et al. [10] and Bharathi et al. [11] are based on a cascade model of influence spread, and satisfy both the MeI and AgI assumptions.

4.1 The Uniform Random Greedy Mechanism

Consider Algorithm 2, which we refer to as the uniform random greedy mechanism. This mechanism proceeds by first greedily selecting which subset of the ground set elements to allocate. It then chooses an ordering of the players’ bids uniformly at random from the set of all possible orderings, then assigns the selected elements to the players in this randomly chosen order. Note that this always results in a disjoint allocation.

figure b

The MeI assumption implies that the random greedy mechanism obtains a constant factor approximation to the optimal social welfare. We now claim that, under the MeI and AgI assumptions, this mechanism is strategyproof as long as there are at least 3 players.

Theorem 2

If there are \(k \ge 3\) players and the AgI and MeI assumptions hold, then Algorithm 2 is a strategyproof mechanism. Furthermore, Algorithm 2 approximates the social welfare to within a factor of \(\frac{e}{e-1}\) from the optimum.

Proof

As before, notice that lines 2–5 are an implementation of the standard greedy algorithm for maximizing a non-decreasing, submodular set-function subject to a uniform matroid constraint, as described in [17, 23], and hence gives the specified approximation ratio.

Next, we show that Algorithm 2 is strategyproof. Fix bid profile \(\mathbf {b}\) and let \(t = \sum _i b_i\). Let I be the union of all allocations made by Algorithm 2 on bid profile \(\mathbf {b}\); note that I depends only on t, due to MeI. Furthermore, each agent i will be allocated a uniformly random subset of I of size \(b_i\). Thus, the expected utility of agent i can be expressed as a function of \(b_i\) and t, due to AgI. We can therefore write \(w^i(b, t)\) for the expected utility of agent i when \(b_i = b\) and \(\sum _{j} b_j = t\) (recall that we let w(t) denote the total social welfare when \(\sum _i b_i = t\)).

We now claim that \(w^i(b,t) = \frac{b}{t} w(t)\) for all i and all \(0 \le b \le t\). Note that this implies the desired result, since if our claim is true then for all i and all \(0 \le b \le t\) we will have

$$\begin{aligned} w^i(b,t) = \frac{b}{t} w(t) \le \frac{b+1}{t+1} w(t+1) = w^i(b+1,t+1) \end{aligned}$$

which implies the required monotonicity condition.

It now remains to prove the claim. The adverse competition assumption implies that \(w^i(0,t) \le w^i(0,0) = 0\) for all i and t. We next show that \(w^i(1,t) = w^j(1,t)\) for all i, j, and \(t \ge 1\). If \(t = 1\) then this follows from the MeI assumption. So take \(t \ge 2\) and pick any three agents i, j, and \(\ell \). Then, by the AgI assumption, we have

$$\begin{aligned} w^i(1,t) = w(t) - w^{\ell }(t-1,t) = w^j(1,t). \end{aligned}$$

We next show that \(w^i(b,t) = w^i(1,t) + w^i(b-1,t)\) for all i, all \(b \ge 2\), and all \(t \ge b\). Pick any three agents i, j, and \(\ell \), any \(b \ge 2\), and any \(t \ge b\). Then, by the AgI assumption,

$$\begin{aligned} w^i(b,t)= & {} w(t) - w^{\ell }(t-b,t) \\= & {} w(t) - [w(t) - w^i(b-1,t) - w^j(1,t)] \\= & {} w^i(b-1,t) + w^j(1,t) \\= & {} w^i(b-1,t) + w^i(1,t). \end{aligned}$$

It then follows by simple induction that \(w^i(b,t) = bw^i(1,t)\) for all \(1 \le b \le t\). But now note that \(w(t) = w^i(1,t) + w^j(t-1,t) = tw^i(1,t)\), and hence \(w^i(1,t) = \frac{1}{t}w(t)\) and therefore \(w^i(b,t) = \frac{b}{t} w(t)\) for all \(0 \le b \le t\), as required. \(\square \)

Note that the proof of Theorem 2 makes crucial use of the fact that there are at least three players. Indeed, in Appendix “Counterexamples When There are Two Agents (Extended Discussion)” we give an example satisfing the MeI and (vacuously) AgI assumptions for which the random greedy algorithm is not strategyproof for two players.

5 Conclusions

We have presented a general framework for mechanisms that allocate items given an underlying submodular process. Although we have explicitly referred to spread processes over social networks, we only require oracle access to the outcome values, and thus our methods apply to any similar settings which uphold the properties we have required from the processes. We build on natural greedy algorithms to construct efficient strategyproof mechanisms that guarantee constant approximations to the social welfare.

The obvious open questions concern the removal of the MeI and AgI assumptions. For the case of \(k = 2\) agents, is the MeI assumption necessary? For \(k > 2\) agents, can we eliminate either or both of the MeI and AgI assumptions? As discussed in Appendix “Tightness of Approach: More than Two Players”, it seems that a fundamentally new approach would be required to obtain an O(1)-approximate strategyproof mechanism for \(k > 2\) players.

Another natural and challenging extension would be to assume that nodes have costs for being initially allocated and then replace the cardinality constraint on each agent by a knapsack constraint. To do so, the most direct approach would be to try to utilize the known approximation for maximizing a non decreasing submodular function subject to one [25] or multiple [26] knapsack constraints. These methods do not seem to readily lend themselves to the approach we have been able to exploit in the case of cardinality constraints. We have also assumed a “demand satisfaction” condition dictating that each agent must receive their reported budget for initial adopters. Demand satisfaction is appropriate in settings where the mechanism can be seen to be fulfilling contracts. Can we relax this condition in some meaningful way? Without the demand satisfaction condition, it is trivial to achieve a strategyproof k approximation by allocating all initial elements to the agent who can achieve the most utlility. Can we improve upon this trivial approximation factor without imposing the MeI and AgI assumptions?