Abstract
We study Incentive Trees for motivating the participation of people in crowdsourcing or human tasking systems. In an Incentive Tree, each participant is rewarded for contributing to the system, as well as for soliciting new participants into the system, who then themselves contribute to it and/or themselves solicit new participants. An Incentive Tree mechanism is an algorithm that determines how much reward each individual participant receives based on all the participants’ contributions, as well as the structure of the solicitation tree. The sum of rewards paid by the mechanism to all participants is linear in the sum of their total contribution. In this paper, we investigate the possibilities and limitations of Incentive Trees via an axiomatic approach by defining a set of desirable properties that an Incentive Tree mechanism should satisfy. We give a mutual incompatibility result showing that there is no Incentive Tree mechanism that simultaneously achieves all the properties. We then present two novel families of Incentive Tree mechanisms. The first family of mechanisms achieves all desirable properties, except that it fails to protect against a certain strong form of multi-identity attack; the second set of mechanisms achieves all properties, including the strong multi-identity protection, but fails to give participants the opportunity to achieve unbounded reward. Given the above impossibility result, these two mechanisms are effectively the best we can hope for. Finally, our model and results generalize recent studies on multi-level marketing mechanisms.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
There has been substantial interest in crowdsourcing and human-computation systems. These systems are based on mobilizing and utilizing people’s work in order to quickly and efficiently achieve certain tasks. Commercial offerings such as Gigwalk or Amazon’s Mechanical Turk allow users to submit tasks and recruit people to complete those tasks. Crowdsourcing is increasingly being used as the method of choice to obtain large-scale user data, such as environmental data, application traces, or to generate indoor-localization maps, e.g. [14, 17]. One key challenge in successfully deploying any such system is the question of how to incentivize people to actually perform tasks and contribute meaningfully. In fact, the same challenge is found in many other systems that rely on user contributions. For example, systems such as social forums, file-sharing services, public computing projects (e.g. SETI@Home), collaborative reference work, etc. suffer from the well-known network-effect bootstrapping problem. These systems can become self-sustaining when the scale of the participation list exceeds a certain threshold, but below this threshold, they may not provide sufficient inherent benefit for users to participate in.
One common type of incentive mechanisms for raising user participation in such systems are Incentive Trees. Incentive Trees are referral-based mechanisms in which (i) each participant is rewarded for contributing to the system, and (ii) a participant that has already joined the system can make referrals, and thereby solicit new participants to also join the system and contribute to it. The mechanism incentivizes such solicitations by making a solicitor’s reward depend on the contributions (and recursively also on their further solicitations, etc) made by such solicitees. Incentive Trees have been widely used in a variety of domains and under different names, e.g., in referral trees, multi-level marketing schemes, affiliate marketing or even in the form of the infamous illegal Pyramid Schemes. The question of how people can be incentivized using Incentive Trees to participate in crowdsourcing or network-effect systems is of significant interest and—starting from the work on Lottery Trees in [7], and most prominently through the work by the MIT team on the Red Balloon Challenge [13]—has recently attracted significant interest from the research community, e.g. [3, 9].
In this work, we study the foundations of Incentive Trees. An Incentive Tree Mechanism takes as input a weighted tree, where each node’s weight denotes its contribution to the system, and the tree structure reflects the solicitation history. Based on this input, the mechanism then computes a reward for each node in the tree in such a way that the sum of rewards is linear in the sum of contributions. The question is, how should this reward function look like? Ideally, an Incentive Tree Mechanism is constructed such that every participant is optimally incentivized to both (i) contribute to the system as much as possible, and (ii) solicit as many new and itself highly-contributing and highly-solicitating participants as possible. As we will see, simultaneously achieving both contribution and solicitation incentive is challenging, especially if the mechanism should satisfy additional properties, such as fairness or robustness to strategic behavior.
In this paper, we take an axiomatic approach. We define a set of basic, desirable properties which ideally an Incentive Tree Mechanism should satisfy. These include trivial properties such as the continuing solicitation and continuing contribution incentive properties, as well as more sophisticated properties that relate to the mechanisms resilience to strategic behavior. These are critically important. In web-based campaigns for example, resilience to multi-identity (Sybil [6]) attacks is key as it is often easy to forge identities by creating new free email accounts, and then “referring oneself” in order to get extra reward.
Results We study 8 desirable properties of Incentive Trees, that have also been studied in earlier work on Incentive Trees and multi-level marketing; and suitably generalize these properties to our new model. As it turns out, our new model necessitates fundamentally different algorithmic approach–the previously proposed mechanisms do not achieve an maximal set of desirable properties. We present two novel families of Incentive Tree reward mechanisms, both of which are based on algorithmic techniques previously unused in the literature on multi-level marketing or Incentive Trees. The first family of mechanisms achieves all desirable properties, except that it fails to protect against a certain strong form of Sybil attack (technically, it satisfies all properties except property Unprofitable Generalized Sybil Attack). The second family of mechanisms does yield protection against the strong form of Sybil attack, but fails to give participants the opportunity to achieve unbounded reward (technically, it satisfies all properties except Unbounded Reward Opportunity). Both mechanisms are resilient to the well-known multi-identity attacks discussed above. Finally, we show that under some mild assumptions, these two mechanisms are essentially the best we can hope for. Specifically, we give an impossibility result showing that no reward scheme can simultaneously achieve property Unprofitable Generalized Sybil Attack and Unbounded Reward Opportunity, while maintaining the other properties. Thus, our results imply that both of our mechanisms achieve a notion of optimality relative to the axiomatic properties we define in this paper: The mechanisms are optimal in the sense that they achieve a maximal mutually satisfiable subset of properties.
1.1 Related work
The two most closely related works are by Douceur and Moscibroda on Lottery Trees [7], and by Emek et al. on multi-level marketing schemes [9]. The former work is aimed at motivating people to participate in networked systems and bootstrapping such systems by network effect. The paper addresses the following question: Assuming that some system organizer is willing to spend a fixed amount of money incentivizing people to do a specific type of work, how should the system be organized to maximize the resulting work? The authors propose Lottery Trees, formalize a set of desirable properties, prove impossibility results, and devise two non-trivial mechanisms, one of which achieves near-optimality in terms of achieved desirable properties. However, there is a fundamental difference between our Incentive Tree model and the one in [7]. In our model, the total amount of reward distributed to the participants grows linearly in the total contribution (thus, it is a multi-level marketing-type model), whereas in [7], the total reward is a fixed, constant value. This difference significantly changes the achievable properties as well as the algorithmic design of the incentive mechanisms. Indeed, the optimal algorithm in [7] (Pachira) is no longer optimal in our setting and cannot be easily adjusted (see Sect. 4.2).
The work by Emek et al. [9] has initiated the algorithmic study of multi-level marketing mechanisms. It proposes mechanisms for a model in which users can purchase items (specifically, each user can purchase one item of a fixed unit price). Participants join the system by buying a product, and can then refer friends to also buy this product. The paper proposes several properties of such unit-price multi-level marketing schemes and shows mechanisms that achieve a subset of these properties. The Incentive Tree model we study in this paper can directly be translated into the multi-level marketing context. When viewed in this context, our work is a substantially generalized version of the model in [9]: Participants correspond to buyers, and a participant’s contribution corresponds to the amount of goods purchased. The difference is that whereas in [9], each buyer can only purchase a single item of unit price (i.e., each participant makes the same contribution to the system), in our model participants can make arbitrary contributions, i.e., each buyer can buy goods at arbitrary price. This generalized version of the problem yields a richer structure, and allows us to generalize the desirable properties in meaningful ways. The results in this paper directly apply to this generalized version of the multi-level marketing model. Moreover, as in the above case, the algorithmic structure of incentive mechanisms for the generalized model are substantially different than in the more simplistic case with single items of unit price.
In addition to these two works, there has recently been many other work on incentive systems. For example, Cebrian et al. [3] studies the Red Balloon Challenge [13] with split contracts and shows that in contrast to fixed-payment contracts, split contracts are robust to nodes’ selfishness. The Bitcoin system by Babaioff et al. [2] studies a problem similar to multi-level marketing. It uses a game-theoretic solution concept to study a problem in which agents are incentivized to forward sensitive information in such a way that the overall system performance is maximized. The work of Drucker and Fleischer [8] considers a multi-level marketing model with multi-items proving properties defined in [9]. Ghosh and McAfee [10] provide a game-theoretic model within which the design and performance of mechanisms for incentivizing high-quality user generated content can be analyzed. Other related work such as [4, 11] on query incentive networks and the corresponding efficient sybil-proof incentive mechanisms, Domingos and Richardson [5] on finding influential users in a social network, Anderson et al. [1] on influencing and steering user behavior, or Tennenholtz [15] on the effects of social structure on behavior and norms, is only loosely related to our work. Finally, incentive mechanisms have also been used in mobile systems to recruit people [14, 18]. Besides incentive-mechanisms, Sybil attack resilience has also been studied in other contexts, for example in voting [16].
2 Model
In our model, participants can join a system and contribute to it (e.g. by doing work such as finding weather balloons, uploading crowd-sourced data, solving tasks, etc). For a participant u, we denote its contribution by C(u), \(C(u)\ge 0\). Participants can also solicit new participants. Such referrals induce a referral forest F. Each participant is a node in F, and there is a directed edge (u, v) between two participants u and v if u has joined the system in response to a solicitation by v. In other words, if u joins the system via a referral by v, it becomes a child-node of v in F. A new participant u who joins the system independently of any solicitation joins F as an independent node. For simplicity, we consider the equivalent referral-tree T, in which there is an imaginary root node r with contribution \(C(r)=0\), and all root-nodes in F are children of r. T is a weighted tree in which the weight of a node u is its contribution to the system C(u). We denote by \(C(T)=\sum _{u\in T}{C(u)}\) the total contribution in the system.
A reward mechanism is a function that takes as input the weighted referral tree T, and computes for each \(u\in T\) a non-negative real reward, denoted by R(u). Following [9], we impose a budget constraint on this function: The system administrator is willing to spend no more than a certain fraction \(\varPhi \le 1\) of the total accumulated contribution on rewarding participants. That is, the upper bound of total reward \(R(T)=\sum _{u\in T}{R(u)}\) paid to participants grows linearly in the total contribution, i.e., \(R(T)\le \varPhi \cdot C(T)\). While in principle, any function satisfying these properties defines a possible reward mechanism, a well-functioning mechanism should maintain several desirable properties, which we define in Sect. 3.
Generalized multi-level marketing When viewed in the context of multi-level marketing, our model generalizes the model of Emek et al. [9], allowing buyers to purchase not just a single item of unit price or multi-items, but purchase items at arbitrary prices. Buyers can purchase goods from a seller. For some buyer u, her contribution to the system C(u) is the total cost of the goods purchased. The seller is willing to return a certain fraction of his total income in the form of rewards R(u) to the buyers. Notice that in this context, the amount of money a buyer u effectively ends up paying for the goods is his payment, \(Pay(u)=C(u)-R(u)\). And since a buyer’s reward can potentially exceed his cost (if he accumulates many contributing descendants), we also consider the profit as \(P(u)=R(u)-C(u)\).
Comparison to existing models The two main parameters in our model are contribution and reward. Many existing models have restrictions on either or both parameters. The Pachira in [7], Geometric Mechanism in [9] as well as the winning strategy in the DARPA network challenge [13] require the total reward to be fixed. In [9, 13] the contribution of each node is the same, while in [7], contributions are allowed to be variable. In previous multilevel marketing models [8, 9], the total reward is linear in the total contribution, but the contribution (payment) of each node is fixed. We generalize and unify these models such that (i) each participant can make different contributions of arbitrary size, and ii) the total reward paid to participants is a linear fraction of the total system contribution. As we will see, these generalizations have major implications on the structure of the resulting incentive mechanisms. None of the existing incentive mechanisms performs well in the new model, or can be easily adjusted. The new model requires novel algorithmic techniques.
Tree notation We use standard tree notation. \(T_u\) denotes the subtree rooted at node u. \(p_T(u)\) denotes the parent of a node u in T. Finally, \(dep_p(u)\) denotes the depth of u in a tree \(T_p\), i.e., the distance between u and p. To simplify notation, we define \(dep_p(u)=-\infty \) if \(u\notin T_p\).
3 Desirable properties
In this section, we define the set of desirable properties that an Incentive Tree mechanism should ideally satisfy. All these properties are inspired by related properties defined in [7] for Lottery Trees; or in [9] for multi-level marketing; and they are adjusted appropriately to our new generalized model with arbitrary contributions.
3.1 Basic properties
Continuing contribution incentive (CCI) [7] A reward mechanism satisfies CCI if it provides a participant u with increasing reward in response to an increase of u’s contribution. This encourages participants to continue contributing to the system (e.g., to continue purchasing goods from the seller). Formally, given a referral tree T. If a node \(u\in T\) increases its contribution, \(C'(u)>C(u)\), and the contribution of all other nodes \(v\in T{\setminus } \{u\}\) remains the same, \(C'(v)=C(v)\), then the reward of u increases: \(R'(u)>R(u)\).
Continuing solicitation incentive (CSI) [7] A reward mechanism satisfies CSI if every participant always has an incentive to solicit new participants. This encourages ongoing solicitation and ensures continuing growth of the system. Let \(T_u\) and \(T'_u\) be the subtree rooted at u before and after a new participant has joined the system in u’s subtree. Then, \(R'(u)>R(u)\).
Reward proportional to contribution ( \(\phi \) -RPC) [7] This property suggests that a reward mechanism should maintain some basic notion of fairness among the participants, the degree of which is determined by the parameter \(\phi \). We say that a reward mechanism satisfies \(\phi \)-RPC for some \(0\le \phi \le 1\), if a participant u who contributes C(u), should at least receive a reward of \(R(u)\ge \phi C(u)\). In other words, every participant should receive at least a \(\phi \)-fraction of his contribution to the system. Note that we assume \(\phi \le \varPhi \) since otherwise no reward mechanism can satisfy the \(\phi \)-RPC property.
Unbounded reward opportunity (URO) [9] This property demands that there should be no limit to the reward a participant can potentially receive, even when his own contribution is fixed by constant. Formally, a reward mechanism satisfies URO if for every positive real R, C(u) and positive integer k, there exist k trees \(T_1,\ldots ,T_k\) attached to u in the referral tree such that \(R(u)\ge R\).
Profitable opportunity (PO) The PO property is a weaker version of URO. It suggests that a buyer with any positive contribution has the opportunity to get positive profit (reward minus contribution). Formally, a reward mechanism satisfies PO if for every positive real C(u) and positive integer k, there exist k trees \(T_1,\ldots ,T_k\) attached to u in the referral tree such that \(R(u)\ge C(u)\). A mechanism that satisfies URO satisfies PO.
Subtree locality (SL) [9] This property demands that the reward paid to a participant u is determined uniquely by its subtree \(T_u\), \(R(u)=f(T_u)\). The property ensures that each user is credited only for actions (contributions and solicitations) performed by itself, or its descendants. Violation of this property can have undesirable consequences. For example, the reward of a user could increase or decrease without him having taken any action (no new purchases or newly solicited buyers in his subtree). Note that as an important special case, the SL property subsumes the so-called Unprofitable Solicitor Bypassing (USB) property defined in [7]. This property demands that for a new participant, it should not matter where in the tree he joins, such that a new participant has no incentive to join the system as a child of someone other than his solicitor. Thus, the SL property prevents certain types of strategic behavior. Specifically, if a new participant has an incentive to join the system not as child of the participant that solicited him, then participants may altogether lose interest in soliciting new referrals.
3.2 Sybil-attack resilience properties
It is desirable that a reward mechanism is robust against strategic behavior by participants. In particular, we seek mechanisms that are resilient against multi-identity attacks, commonly known as Sybil-attacks [6]. A participant who is able to forge multiple identities (which is typically simple in web-based applications) should not be able to use this ability and “cheat” the mechanism for his own benefit. Previous work has defined two different definitions of Sybil resilience.
Unprofitable Sybil attack (USA) [7] This property is taken directly from [7], and it captures the classic notion of Sybil resilience. The USA property imposes that no participant can increase his profit purely by pretending to have multiple identities: A mechanism satisfies USA if a participant with a given contribution cannot increase his reward by joining the system as a set of Sybil nodes instead of joining as a single node. In other words, a participant who makes a certain contribution to the system should never have a benefit of “splitting” himself and its contribution up and making this contributions as two or more identities, even if these “Sybil identities” join the tree as if referring themselves.
Unprofitable generalized Sybil attack (UGSA) This property is strictly stronger than USA, and subsumes USA as a special case. It is a generalization of the so-called Profitable Sybil Attack or Split Proof property from [9], where it was defined for the restricted single-item multi-level marketing model. The property demands that a participant can never increase his profit by joining the tree as multiple identities, even if by doing so, he increases his contributions, i.e., purchases additional goods.
We can formally define USA and UGSA as follows. Given a tree \(T_0\). Let u be a participant that joins the tree. Let \(T'_1\) be the tree that results when u joins T as a single node. Alternatively, u can join the tree as a set of Sybil nodes \(S_u=\{u_1,\ldots ,u_k\}\), which can be arbitrarily connected in the referral tree. Let \(T''_1\) be the tree that results when u joins T as the Sybil node set \(S_u\). Let \(J=v_1,v_2,\ldots \) be an arbitrary sequence of new participants joining the tree, and let \(T'_1, T'_2,\ldots \) and \(T''_1, T''_2,\ldots \) be a sequence of trees resulting from these joins. Notice that in the case u joins as a set of Sybil nodes, there can be many different such sequences because any new child solicited by u can join as a child of any of the Sybil nodes \(u_1,\ldots ,u_k\). Finally, let \(R'_i(u), C'_i(u)\) be the reward and cost of u in \(T'_i\), and let \(R''_i(u)=\sum _{j=1,\ldots ,k}{R''_i(u_j)}, C''_i(u)=\sum _{j=1,\ldots ,k}{C''_i(u_j)}\) be the total reward and cost of u in \(T''_i\), respectively. We say that a reward mechanism satisfies USA if for any \(i>0\), \(R'_i(u) \ge R''_i(u)\), if \(C'_i(u) = C''_i(u)\). We say that a reward mechanism satisfies UGSA if for any \(i>0\), \(R'_i(u) - C'_i(u) \ge R''_i(u)- C''_i(u)\), if \(C'_i(u) \le C''_i(u)\). As mentioned, the UGSA property strictly subsumes the USA property by taking \(C'_i(u) = C''_i(u)\).
The difference between USA and UGSA is illustrated in Fig. 1. USA requires that a participant p who contributes a certain amount \(C_p\) be unable to increase his reward by joining as multiple identities \(p_1,p_2,\ldots \). Therefore, participant p in the right figure must receive at least as much reward as participant p in the middle figure. Notice that the total contribution of p remains the same; only the number of identities in the tree change. So, assume that the participant p starts out as shown in the right figure, with a contribution of 2 and a single identity. Then, he decides to split up into two identities of contribution 1 each. An incentive mechanism satisfies USA, if this splitting up does not benefit p.
UGSA is a stronger property: It additionally demands that p’s profit (=reward-cost) in the middle figure cannot exceed his profit in the left figure. For example, assume that the participant p starts out as shown in the left figure, with a contribution of 1 and a single identity. Then, he decides to split up and increase its contribution to \(1+1=2\). An incentive mechanism satisfies UGSA, if this identity splitting does not benefit p.
It is interesting to discuss the relative importance of these properties from the point of view of the system administrator or the seller in a multi-level marketing context. USA is clearly a desirable property from his point of view because if USA is violated, he will simply pay too much reward for no additional contribution. The case of UGSA may be less obvious; and its importance depends on the specific circumstances. In particular, it is possible that UGSA is violated even though the seller does not actually lose money (i.e., if the contribution exceeds the reward). This is possible if the Sybil buyer p increases his contribution not at the cost of the system administrator, but at the cost of other participants in the system, for instance the parent of p. However, if this is the case—i.e., UGSA is violated not at the cost of the seller, but at the cost of some ancestors of p—then there is nuanced breakdown of the incentive structure: If nodes may profit from Sybils at the expense of their referrers, the referrer is not incentivized to recruit more nodes. Thus, UGSA is a desirable property to maintain, even if a violation may not always be at the cost of the seller.
When discussing our TDRM mechanism (end of Sect. 5), we will give a concrete example of TDRM violating UGSA.
4 Existing Incentive Tree mechanisms and impossibility result
In this section, we briefly review existing (multi-level marketing and Incentive Tree) algorithms and analyze which desirable properties they achieve. Then observing that each existing algorithm can only achieve a subset of desirable properties, we give an impossibility proof showing that there can be no reward mechanism that simultaneously satisfies PO and UGSA.
4.1 Geometric mechanism
The simple geometric reward mechanism is commonly used, e.g. in [13]. The idea is that a certain fraction a of a node’s contribution “bubbles-up” to its parent, a fraction \(a^2\) bubbles up to its grand-parents, etc. Given two constants \(0<a<1\) and \(b\ge \phi \) such that \(b\le (1-a)\varPhi \), the reward of a participant u in the \((a,b)-geometric\) mechanism is defined as follows.
The condition \(b\le (1-a)\varPhi \) is to ensure the budget constraint. Specifically, the total reward that a node u is responsible for is at most \(b\frac{1}{1-a}C(u)\), which should be less than \(\varPhi C(u)\). The fairness property \(\phi -RPC\) is satisfied if we also set \(b\ge \phi \). It is easy to derive the following theorem.
Theorem 1
The (a, b)-Geometric Mechanism with \(\phi \le b\le (1-a)\varPhi \) achieves all desirable properties, except USA and UGSA.
The reason why USA (and thus, UGSA) is violated is also easy to see. A node can increase his reward by splitting itself into multiple Sybil nodes that are linked to each other as a chain. Some of the “bubbled-up” reward is then handed to other Sybil nodes of u and the total sum of rewards accumulated by u is larger than if u joins as a single node.
4.2 Multi-level marketing mechanisms derived from Incentive Tree mechanisms
In [7], two Incentive Tree mechanisms are given (called Luxor and Pachira) for a model in which the total reward in the system is a fixed constant. Any such Incentive Tree Mechanism A for the fixed total reward model can be transformed into an Incentive Tree Mechanism L-A in our model by simply multiplying the reward paid to a user u by a factor of \(\varPhi C(T)\) (assuming that the total reward is normalized to 1). Applying this transformation to Luxor and Pachira yields two mechanisms L-Luxor and L-Pachira. As it turns out, L-Luxor is very similar to the (a, b)-Geometric Mechanism, and achieves the same properties. On the other hand, L-Pachira is interesting. For two parameters \(0\le \beta \le 1\) and \(\delta >0\), the \((\beta ,\delta )\)-L-Pachira Mechanism is defined as follows. The main technique for Pachira to achieve USA is to utilize the concave function \(\pi (x)\), that is, according to Jensen’s Inequality, the splitting will decrease a participant’s reward.
It was shown in [7] that Pachira achieves USA, and the same proof carries over to L-Pachira as well. Moreover, \(\phi -RPC\) can be satisfied by setting \(\beta \ge \phi /\varPhi \). Pachira does not satisfy the CSI property in the Incentive Tree model. But when transforming it into the multi-level marketing model, L-Pachira does achieve CSI, although the fact is not straight-forward. On the other hand, it is easy to see that L-Pachira fails to satisfy the SL constraint, because of its dependency on the total system contribution C(T).
Theorem 2
The \((\beta ,\delta )\)-L-Pachira Mechanism with \(\beta \ge \phi /\varPhi \) achieves all desirable properties, except SL and UGSA.
4.3 Split-proof mechanism
For the single-item multi-level marketing model studied in [9], Emek et al. give a mechanism that achieves several properties, including the single-item model equivalent of UGSA and URO. This algorithm is based on the idea of computing a deepest binary subtree of the referral tree and then computing the rewards based on that subtree. Unfortunately, this fails the basic CSI property because depending on the number of direct children it has, a node may no longer have an incentive to directly solicit additional children.
4.4 Impossibility result
The subsequent constructions of our two new mechanisms are motivated by the following impossibility result, which suggests that if a mechanism satisfies the SL property, then UGSA and PO (and thus URO) are mutually incompatible. Since SL is a fundamental property, this result motivates our search for (i) a mechanism that achieves all the properties except UGSA (Sect. 5) and (ii) a mechanism that achieves all the properties except PO/URO (Sect. 6).
Theorem 3
There is no Incentive Tree mechanism that can simultaneously achieve SL, PO and UGSA.
Proof
We prove the theorem by contradiction. Suppose a mechanism A can achieve SL, PO and UGSA. In the following proof, all reward computations are done using mechanism A.
Consider a node \(v^*\) with \(C(v^*)>0\). According to PO, there exists a case in which \(v^*\) has one child tree, and yet \(v^*\)’s profit is positive, \(P(v^*)=R(v^*)-C(v^*)>0\). We denote the child tree as \(T^*\) and its root as \(u^*\). Suppose the contribution of \(u^*\) is \(C(u^*)\) and \(T^*{\setminus }\{u^*\}\) forms a set of subtrees denoted as \(T_1,\ldots ,T_k\). According to SL, \(R(v^*)\) only depends on \(C(v^*)\) and \(T^*\). We compare two cases. The first case is exactly as described above (Fig. 2, left). The profit of \(u^*\) is \(P(u^*)=R(u^*)-C(u^*)\). In the second case (Fig. 2, right), node \(u^*\) launches a (generalized) Sybil attack by joining the referral tree as two nodes \(u_a\) and \(u_b\) with \(C(u_a)=C(v^*)\) and \(C(u_b)=C(u^*)\). Notice that the Sybil attack is generalized (i.e., of the USGA-type), since the total contribution of \(u_a\) and \(u_b\) exceeds the contribution of \(u^*\). Further notice that in the second case, the root of \(v^*\)’s descendant tree is \(u_a\); \(u_a\) is \(u_b\)’s parent; and \(u_b\) is the parent of \(T_1,\ldots ,T_k\), i.e., we keep every node in \(T^*\) unchanged except \(u^*\).
According to SL, it must hold that \(u_a\) has the same reward as \(v^*\) (with \(T^*\) attached to it), and for the same reason, \(u_b\) must have the same reward as \(u^*\). Specifically, it holds that \(R(u_a)=R(v^*)\) and \(R(u_b)=R(u^*)\). The total profit of \(u^*\)’s two Sybil nodes \(u_a\) and \(u_b\) is thus \(P'(u^*)=R(u_a)+R(u_b)-C(u_a)-C(u_b)=(R(v^*)-C(v^*))+(R(u^*)-C(u^*))>P(u^*)\). This implies that \(u^*\) can get more profit by contributing more, which violates UGSA. \(\square \)
In the following context, as the main technical contribution of this paper, we present two novel reward mechanisms, both of which achieve a maximal subset of mutually satisfiable properties. The mechanism in Sect. 5 achieves all properties except UGSA, and the mechanism in Sect. 6 achieves all properties except URO/PO.
5 Satisfying all but UGSA: topology-dependent reward mechanisms (TDRM)
We construct the mechanism in two steps. We first give an intermediate mechanism which manages to satisfy USA, but does not satisfy budget constraint. This preliminary form of the mechanism could be turned into a feasible reward mechanism that satisfies the budget constraint, but doing so would violate subtree locality (SL). We then show how we can eliminate the shortcomings of this preliminary mechanism in such a way that both budget constraint and SL are satisfied.
As we discussed in the previous section, the reason why the simple Geometric Mechanism fails the USA property is that it is beneficial for a node to split up and accumulate its own “bubbled up” rewards. This can be avoided by changing the linear dependency of a node’s reward on its own and other node’s contribution to a dependency that is of quadratic nature. Specifically, when computing the reward of a participant u, we multiply u’s contribution by the contribution of every node in u’s subtree, including itself. In this way, even though u could still accumulate “bubbled-up” rewards from its own Sybil nodes, we can show that it is always beneficial for u to focus its total contribution in a single node. The resulting mechanism works as follows.
The problem is that while the structure of this quadratic geometric reward mechanism is such that it achieves USA, it is not in fact a feasible mechanism: It fails the budget constraint. On the positive, its structure is such that it does achieve USA. To see why, consider a node u. Suppose u can benefit from splitting itself into a set of Sybil nodes \(u_1,\ldots ,u_k\), such that \(C(u)=\sum _{i=1..k}{C(u_i)}\). We can re-write the reward of u if it remains a single node as
If it splits itself into Sybil nodes, its new reward is at most
because the distance between any descendant \(v\in T_u{\setminus } u\) to any of the Sybil nodes \(u_i\) is at least as large as the original distance between u and v in T. Comparing the two expressions, it can be seen that splitting u into multiple nodes \(u_1,\ldots ,u_k\) does neither increase the first summand (because of the quadratic term), nor the second.
The fundamental problem with this approach is that in order to stay within budget, we would need to scale down the rewards R(u) that are distributed to the participants. However, the amount by which we would need to scale would depend on a global property of the referral tree, for example C(T). Thus, such a scaling would fundamentally violate the SL property. In order to overcome this problem, we would like to constrain the reward a node can obtain. This will allow us to meet the budget constraint by scaling each node’s reward by a constant factor, independent of C(T). This could easily be achieved if there was a constant upper bound \(\mu \) on the contribution C(u) of every node \(u\in T\). However, since our model allows a participant to potentially have an unlimited contribution, our mechanism simulates such an upper bound \(\mu \) by splitting each participant with contribution exceeding \(\mu \) into a set of nodes, each with contribution at most \(\mu \). The mechanism then computes the rewards in the resulting Reward Computation Tree (RCT), which may differ from the referral tree. In fact, one user can correspond to multiple nodes in the RCT. A participant’s final reward is the sum of the rewards of his corresponding nodes in the RCT.
The effect of computing the rewards in the Reward Computation Tree in this way is that for participants with very large contribution, the algorithm effectively linearizes this node’s reward with regard to its contribution. In the process, we need to be careful about not violating the USA property. Specifically, in order to make sure that this linearization does not thwart the USA-achieving structure of the quadratic reward computation, the mechanism must be careful about the way it splits participants with large contribution. In particular, our mechanism ensures that for any such split, it is the best possible split for such a participant. In other words, even though the splitting effectively reduces the reward of very large contributors (compared to the preliminary quadratic TDRM mechanism), participants can nevertheless not benefit from a Sybil attack, because they are already given the best possible split.
The TDRM mechanism works as follows. Given four parameters \(\lambda <\varPhi -\phi \), \(\mu >0\), a and b, such that \(a+b<1\), TDRM first transforms the referral tree T into a reward computation tree \(T'\), and then computes the rewards on \(T'\). We denote by C(u) and \(C'(u)\) the contributions of a node u in T and \(T'\), respectively. For a participant \(u\in T\), we define a chain \(CH_u\) of length \(N_u\) in \(T'\) as a sequence of nodes \(m^u_1,\ldots ,m^u_{N_u}\), such that \(m^u_i\) is the parent node of \(m^u_{i+1}\), for all \(i=1...N_u-1\). We call \(m^u_1\) and \(m^u_{N_u}\) the head and the tail of the chain, respectively.
Figure 3 gives an example of how the mechanism transforms the referral tree T (left) into a corresponding reward computation tree \(T'\) (right). After this transformation, TDRM first computes the rewards for each node in \(T'\) according a function similar to the one given in the preliminary TDRM mechanism. Finally, the reward of a participant \(u\in T\) is computed as the sum of all the nodes in the corresponding chain \(CH_u\) in \(T'\). It remains to show that the mechanism meets the budget constraint—we do this in the next section. With this, we can prove the following key theorem.
Theorem 4
The TDRM mechanism with parameters \(\lambda <\varPhi -\phi \), \(b<1-a\), and \(\mu >0\) achieves all desirable properties except UGSA.
Proof idea The full version of the proof is in the appendix. Here are some intuitions. At the heart of our proof is that TDRM satisfies USA. To do so, we define an \(\epsilon \hbox {-}chain\) as a chain in the reward computation tree of which only the head node can have contribution less than \(\mu \). Then consider the set of optimal partitions for u in the reward computation tree (partitions maximizing R(u)). We show that at least one optimal partition has the structure of a single \(\epsilon \hbox {-}chain\) in the RCT. In other words, we show that u’s best possible Sybil attack is to join in such a way that the resulting structure in the RCT is an \(\epsilon \hbox {-}chain\). However, since the TDRM mechanism transforms u into an \(\epsilon \hbox {-}chain\) in the RCT even if u joins as a single node, it follows that u has no benefit of joining the referral tree as multiple Sybil identities. The mechanism itself will give u the best possible split, thus giving u no incentive to split itself.
Example
To show that TDRM does indeed violate UGSA, consider the following counter-example. Let u be a participant with \(C(u)=\frac{1}{2}\mu \) and let \(v_1,\ldots ,v_k\) be u’s children with \(C(v_1)=\cdots =C(v_k)=\mu \) (\(k>\frac{1}{ab\lambda }\)). The profit of u as computed by TDRM is \(P(u)=\frac{1}{2}((ak+1)\lambda \mu b+\phi \mu -\mu )\). If we increase u’s contribution to \(C'(u)=\mu \), then we can show that the new profit of u is \(P'(u)=R'(u)-C'(u)=(ak+1)\lambda \mu b+\phi \mu -\mu \), which is larger than P(u). That is, by increasing his contribution u can increase his profit, which violates UGSA.
6 Satisfying all but URO: contribution-deterministic reward mechanisms
Given the impossibility results in Theorem 3, we cannot expect to achieve a mechanism that achieves all the desirable properties defined in this paper, in particular, we cannot hope to simultaneously achieve UGSA and URO. The TDRM mechanism in the previous section has achieved all, but UGSA. In this section, we show that we can also relax the other property, URO, and satisfy instead all the remaining properties. For this, however, entirely different algorithmic techniques are required.
The key idea is that whereas the previously discussed mechanisms are topology-dependent (i.e., the reward is among other things a function of the structural property of a node’s descendant tree), we now consider mechanisms in which the reward of a participant u is independent of the topology of its subtree. In particular, we seek mechanisms in which the reward R(u) is purely a function of u’s own contribution and the sum \(\sum _{v\in T_u}{C(v)}\) of the contributions in \(T_u\). We show that this can yield a family of mechanisms that achieve UGSA, albeit at the cost of URO.
For ease of notation, define \(x_p=C(p)\) and \(y_p=C(T_p\backslash \{p\})\) for a participant \(p \in T\). Then, we want that the reward function R(p) is purely a function of \(x_p\) and \(y_p\). What properties should this function \(R(x_p,y_p)\) have in order to satisfy the desirable properties? The SL constraint is automatically satisfied by the definition of \(R(x_p,y_p)\). The CCI property demands that \(R(x_p,y_p)\) is increasing in \(x_p\), i.e. \(0<\frac{dR(x_p,y_p)}{dx_p}\). In order to satisfy CSI, it should hold that an increase in \(y_p\) increases p’s reward, hence \(0<\frac{dR(x_p,y_p)}{dy_p}\). If we want to globally ensure the budget constraint, one way to do this is to demand that \(R(x_p,y_p)<\varPhi x_p\), and similarly, the \(\varphi \hbox {-}RPC\) property can be enforced by \(\phi x_p<R(x_p,y_p)\). It is important to point out that demanding the budget constraint to be satisfied by means of \(R(x_p,y_p)<\varPhi x_p\) implies that we cannot achieve the unbounded reward property URO. The reason is that if URO were to be satisfied, \(R(x_p,y_p)\) would need to be able to grow larger and larger as \(y_p\) increases, which would eventually violate this constraint. In order to also achieve USA, we need the condition that for any \(x'_p\), \(x''_p\) such that \(x'_p+x''_p=x_p\), it holds that \(R(x_p,y_p)\ge R(x'_p,x''_p+y_p)+R(x''_p,y_p)\), and, finally, in order to achieve UGSA (under the assumption that we already have USA satisfied), we only need \(\frac{dR(x_p,y_p)}{dx_p}<1\).
Combining these observations, we can demand that a function \(R(x_p,y_p)\) satisfies four properties. If it satisfies all of them, we call the function successfully contribution-deterministic. The properties are, for any \(x_p>0\), \(y_p\):
for any \(x'_p\), \(x''_p\) such that \(x'_p+x''_p=x_p\).
Theorem 5
If \(R(x_p,y_p)\) is a successfully contribution-deterministic function, then the reward mechanism that distributes rewards according to \(R(x_p,y_p)\) achieves all properties, except URO.
Proof
The proof follows closely along the lines of how the properties are defined. The SL constraint is obviously satisfied. CCI is satisfied because \(R(x_p,y_p)\) is increasing in \(x_p\) (Property i); CSI is satisfied because \(R(x_p,y_p)\) is increasing in \(y_p\) (Property ii); and both \(\phi \hbox {-}PPC\) and the budget constraint are clearly satisfied because of Property iii.
We prove that USA is satisfied by contradiction. Suppose there is a participant p that can maximize his reward by joining the system as \(k\ge 2\) nodes, and assume that the cardinality k is minimal among all those maximal splits. Consider two of these Sybil nodes \(p_1\) and \(p_2\), and define \(x_1=C(p_1)\), \(x_2=C(p_2)\), \(y_1=C(T_{p_1})-C(p_1)\) and \(y_2=C(T_{p_2})-C(p_2)\). There are two cases:
(a) \(p_1\) is an ancestor of \(p_2\) (or vice versa). Then we know that \(y_1\ge x_2+y_2\), \(0<\frac{dR(x_p,y_p)}{dy_p}\), so for any \(x_p\) and \(y_p\),
According to Property iv defined above, we know that
Combining these two expressions implies that the following inequality holds:
This means that p can get at least the same reward by merging \(p_1\) and \(p_2\) into one node, which contradicts our assumption.
(b) \(p_1\) is not an ancestor of \(p_2\) (or vice versa). According to Property iv, it holds that
Like in case (a), this implies that p can get at least the same reward by merging \(p_1\) and \(p_2\) which contradicts our assumption. This concludes the proof that USA is satisfied.
Finally, we prove that UGSA is satisfied. Consider some participant p. We need to compare two cases. In the first case, p joins the system as k nodes, \(p_1,\ldots ,p_k\). In the second case, p joins the system as a single node. In order to prove UGSA, we need to show that for any k and any \(\Sigma ^{k}_{i=1}C(p_i)\) which is equal to or larger than C(p), in the second case, p can get higher profit, namely \(\Sigma ^{k}_{i=1}(C(p_i)-R(C(p_i),C(T_{p_i}\backslash p_i)))\ge C(p)-R(C(p),C(T_{p}\backslash p))\). According to the USA property, we know that any participant p with a fixed cost can get the highest reward by joining the system as single node. Therefore, we can assume that there is an optimal choice in the scenario in which \(k=1\).
It remains to prove that for any \(\epsilon >0\), it holds \(x_p-R(x_p,y_p)<x_p+\epsilon -R(x_p+\epsilon ,y_p)\). According to Property i, we know that for any \(x_p\), \(y_p\),
Therefore, it follows that for any \(\epsilon >0\),
As \(\epsilon >0\), the total profit decreases, which implies that UGSA is satisfied. \(\square \)
6.1 CDRM mechanisms
The properties derived in the previous section imply a family of reward mechanisms all of which achieve all properties except URO. It remains to find specific, practical functions that belong to this family. In this section, we give two examples. First, we set \(R(x_p,y_p)=f(x_p,y_p)x_p\), so that the reward function is proportional to \(x_p\).
In both cases, it is easy to verify that the reward function does satisfy all the properties stated in the theorem. Hence, both CDRM mechanisms satisfy all our desirable properties, except URO.
7 Conclusions
In this work, we have studied Incentive Tree mechanisms, thus formalizing and generalizing previous algorithmic work on Referral Trees, Lottery Trees [7, 13] and multi-level marketing mechanisms [8, 9]. We design two families of Incentive Tree mechanisms, both of which achieve all but one among the set of axiomatic properties. Furthermore, our impossibility result suggests that this is optimal. We are encouraged that both of these mechanisms achieve the slightly weaker notion of unprofitable Sybil attack (USA). This shows that mechanisms can be designed that are provably resilient against basic forms of multi-identity attacks.
Any axiomatic approach based on a choice of desirable properties is questionable as different people may deem different properties to be more important. Indeed, as we point out, not all of the properties are equally relevant to the successful operation of an Incentive Tree scheme in practice. However, in ongoing work, we have been studying the effect of our mechanisms in practical deployments; and experience has strengthened our belief the properties defined in this paper are indeed of critical practical importance.
References
Anderson, A., Huttenlocher, D., Kleinberg, J., Leskovec, J.: Steering user behavior with badges. In: Proceedings of the 22nd International Conference on World Wide Web (WWW), pp. 95–106. ACM (2013)
Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On bitcoin and red balloons. In: Proceedings of the 13th ACM Conference on Electronic Commerce (EC), pp. 56–73. ACM (2012)
Cebrian, M., Coviello, L., Vattani, A., Voulgaris, P.: Finding red balloons with split contracts: robustness to individuals’ selfishness. In: Proceedings of the 44th Annual ACM Symposium on Theory of Computing (STOC), pp. 775–788. ACM (2012)
Chen, W., Wang, Y., Yu, D., Zhang, L.: Sybil-proof mechanisms in query incentive networks. In: Proceedings of the 14th ACM Conference on Electronic Commerce (EC), pp. 197–214. ACM (2013)
Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57–66. ACM (2001)
Douceur, JR: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) Peer-to-Peer Systems, pp. 251–260. Springer (2002)
Douceur, J.R., Moscibroda, T.: Lottery trees: motivational deployment of networked systems. In: Proceedings of SIGCOMM, pp. 121–132. ACM (2007)
Drucker, F.A., Fleischer, L.K.: Simpler sybil-proof mechanisms for multi-level marketing. In: Proceedings of the 13th ACM Conference on Electronic Commerce (EC), pp. 441–458. ACM (2012)
Emek, Y., Karidi, R., Tennenholtz, M., Zohar, A.: Mechanisms for multi-level marketing. In: Proceedings of the 12th ACM Conference on Electronic Commerce (EC), pp. 209–218. ACM (2011)
Ghosh, A., McAfee, P.: Incentivizing high-quality user-generated content. In: Proceedings of the 20th International Conference on World Wide Web (WWW), pp. 137–146. ACM (2011)
Kleinberg, J., Raghavan, P.: Query incentive networks. In: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 132–141. IEEE (2005)
Lv, Y., Moscibroda, T.: Fair and resilient incentive tree mechanisms. In: Proceedings of the 32nd Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 230–239. ACM (2013)
Pickard, G., Pan, W., Rahwan, I., Cebrian, M., Crane, R., Madan, A., Pentland, A.: Time-critical social mobilization. Science 334(6055), 509–512 (2011)
Rai, A., Chintalapudi, K.K., Padmanabhan, V.N., Sen, R.: Zee: zero-effort crowdsourcing for indoor localization. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 293–304. ACM (2012)
Tennenholtz, M.: Convention evolution in organizations and markets. Comput. Math. Organ. Theory 2(4), 261–283 (1996)
Wagman, L., Conitzer, V.: Optimal false-name-proof voting rules with costly voting. In: AAAI, pp. 190–195 (2008)
Wang, H., Sen, S., Elgohary, A., Farid, M., Youssef, M., Choudhury, R.R.: No need to war-drive: unsupervised indoor localization. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 197–210. ACM (2012)
Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 173–184. ACM (2012)
Acknowledgments
This work was supported in part by the National Basic Research Program of China Grant 2011CBA00300, 2011CBA00302, the National Natural Science Foundation of China Grant 61033001, 61061130540, and the Hi-Tech research and Development Program of China Grant 2006AA10Z216.
Author information
Authors and Affiliations
Corresponding author
Additional information
A preliminary version of this work has appeared in [12].
Appendix: Proof of Theorem 4
Appendix: Proof of Theorem 4
Proof
It will be convenient to use the following definition. Let \(S_A, S_B\) be two subsets of \(T'\). We define
Intuitively, \(B(S_A,S_B)\) is the sum of the rewards accumulated by nodes in \(S_A\) through nodes in \(S_B\). Using this definition, we can reformulate the reward function R(u) for \(u\in T\) as
There are two properties for function \(B(S_A,S_B)\). Suppose \(S,S',S^*\) are subsets of \(T'\), and \(S,S'\) are disjoint. We have
and
Budget Constraint: We start by proving that the mechanism meets the budget constraint. First, observe that the total rewards in the referral tree is equivalent to the total rewards in the reward computation tree. Then, in the reward computation tree \(T'\), it holds that
By the constraint imposed on \(\lambda \), this last expression is at most \(\varPhi \sum _{u\in T'}C(u)\), which is the budget.
We now prove the desirable properties one by one.
CCI: Consider a participant u, who increases his contribution from C(u) to \(C^*(u)=C(u)+\epsilon \). We denote by \(R^*(u)\) and \(CH^*_u=\{m^{*u}_1,\ldots ,m^{*u}_{N^*_u}\}\) the new reward and the new corresponding chain, respectively. There are two cases depending on whether u’s contribution increase leads to a change of its corresponding chain \(CH^*_u\) in the RCT, or not. We consider the two cases independently.
First, if \(N^*_u=N_u\), then only the head-node \(m^u_1\)’s contribution increases in \(T'\): \(C(m^{*u}_1)=C(m^u_1)+\epsilon \). Then, the new reward of participant u is \(R^*(u)> R(u)\).
Second, if \(N^*_u>N_u\), then we only need to consider the sub-chain in \(CH^*_u\) with \(N_u\) nodes from the leaf node up. As each node of the sub-chain has contribution \(\mu \), we get that \(R^*(u)>R(u)\).
\(\phi \)-RPC: By the definition of the R(u), it holds that \(R(u)=B(CH_u,T_{m^u_1})+\phi C(u)>\phi C(u)\).
CSI: The property holds because by the definition of R(u), the reward of a participant u is strictly increasing when a new node v attaches to u.
SL: The property holds because by the definition of R(u), the reward of a participant u is independent of any node outside of \(T_u\).
URO: Consider a participant u, whose contribution is \(C(u)=s\mu +\epsilon \), for some integer s and \(0<\epsilon \le \mu \), and suppose u has k children in the referral tree, namely there are k trees attached to u. Here s can be any non-negative integer and k can be any positive integer. We denote one of u’s children as v and the corresponding subtree as \(T_v\). Suppose v has \(\ell \) children with contribution \(\mu \). It holds that R(u) is at least \(R'(m^u_{N_u})\) in the reward computation tree. Calculating the value of \(R'(m^u_{N_u})\) using the definition, it can be shown that \(R'(m^u_{N_u})\ge \ell \cdot a^2 b \lambda \epsilon \). As \(\ell \) can become arbitrarily large, R(u) can increase to infinity.
USA: At the heart of our proof is that TDRM satisfies USA. To do so, we define an \(\epsilon \hbox {-}chain\) as a chain in the reward computation tree of which only the head node can have contribution less than \(\mu \).
USA states that no participant can increase his reward by pretending to have multiple identities. Consider a participant u that joins the referral tree as j Sybil nodes (\(j\ge 1\)), \(v_1,v_2,\ldots ,v_j\), with total contribution C(u). Further assume that u has s children, \(q_1,\ldots ,q_s\). Suppose \(v_1,v_2,\ldots ,v_j\) are transformed into k nodes \(u_1,\ldots ,u_k\) in the reward computation tree. By definition, it holds that \(C(u)=\sum ^k_{i=1}C(u_i)\) and \(C(u_i)\le \mu , i=1,\ldots ,k\). For \(q_1,\ldots ,q_s\), we denote the subtrees rooted at \(q_1,\ldots ,q_s\) in the reward computation tree as \(T_1,\ldots ,T_s\). We define a partition as any configuration of nodes \(u_1,\ldots ,u_k\), subtrees \(T_1,\ldots ,T_s\), and contributions \(C(u_i)\), \((i=1,\ldots ,k)\) in the reward computation tree that can feasibly result from node u joining the referral tree as a set of multiple Sybil nodes.
Our proof idea is as follows: Consider the set of optimal partitions for u in the reward computation tree (partitions maximizing R(u)). We show that at least one optimal partition has the structure of a single \(\epsilon \hbox {-}chain\) in the RCT. In other words, we show that u’s best possible Sybil attack is to join in such a way that the resulting structure in the RCT is an \(\epsilon \hbox {-}chain\). However, since the TDRM mechanism transforms u into an \(\epsilon \hbox {-}chain\) in the RCT even if u joins as a single node, it follows that u has no benefit of joining the referral tree as multiple Sybil identities. The mechanism itself will give u the best possible split, thus giving u no incentive to split itself (Fig. 4).
We formally prove this intuition by a sequel of structural lemmas. The lemmas describe the properties of a reward-maximizing partition \(u_1,\ldots ,u_k,T_1,\ldots ,T_s\) in the RCT, ultimately showing that the optimal such partition is an \(\epsilon \hbox {-}chain\). As a first step, notice that because we have proven SL in TDRM, we consider only \(u_1,\ldots ,u_k,T_1,\ldots ,T_s\) in the RCT. All other nodes are irrelevant for u’s reward. The first lemma shows that \(u_1,\ldots ,u_k,T_1,\ldots ,T_s\) forms a tree. Here notice that according to the soliciting sequence, \(u_i\) can not be a child of \(T_j\) (\(i=1,2,\ldots ,k\), \(j=1,2,\ldots ,s\)).
Lemma 1
If R(u) is maximized, \(u_1,\ldots ,u_k,T_1,\ldots ,T_s\) forms a tree.
Proof
We prove the lemma by contradiction. Suppose R(u) is maximized and \(u_1,\ldots ,u_k,T_1,\ldots ,T_s\) forms a forest F with more than one tree. We pick any two trees \(T_\alpha \), \(T_\beta \) in F with roots \(\alpha \) and \(\beta \). As u is the parent of \(q_1,\ldots ,q_s\), it holds that \(T_1,\ldots ,T_s\) will be attached as subtrees to \(u_1,\ldots ,u_k\). Thus, \(\alpha ,\beta \in \{u_1,\ldots ,u_k\}\). Now, assume that we attach \(T_\beta \) to \(\alpha \), thereby making it one tree. The attachment does not change the reward accumulated by nodes in \(T_\beta \), but it strictly increases the rewards accumulated by \(\alpha \) (due to the CSI property). This contradicts the assumption that R(u) is maximized. \(\square \)
Thus if R(u) is maximized, \(u_1,\ldots ,u_k\), \(T_1,\ldots ,T_s\) forms a tree. We denote this tree as \(T_u\), and define \(\overline{T_u}\) as the tree induced by \(u_1,\ldots ,u_k\), and \(\underline{T_u}\) as the forest induced by \(T_1,\ldots ,T_s\). With these definitions, we can write R(u) as
Before continuing the proof, we distinguish different parts of R(u): The inner reward \(R^i(u)= B(\overline{T_u},\overline{T_u})\) which is the part of reward purely coming from u’s own contribution, and the external reward \(R^e(u)= B(\overline{T_u},\underline{T_u})\) which is the part of reward coming from u’s descendants. Then we can rewrite R(u) as \(R(u)= R^i(u)+R^e(u)+\phi C(u).\) According to our assumption that u has a fixed contribution, the third term \(\phi C(u)\) is a constant and does not influence u’s decision.
As mentioned before, we need to prove that the best partition of u, maximizing the reward, is an \(\epsilon \hbox {-}chain\). Concretely, as \(R(u)= R^i(u)+R^e(u)+\phi C(u)\), we show that u can maximize \(R^i(u)\) and \(R^e(u)\), respectively, if \(\overline{T_u}\) is an \(\epsilon \hbox {-}chain\). Our next step is to prove u’s partition as an \(\epsilon \hbox {-}chain\) will maximize \(R^i(u)\). We transform the topology of \(\overline{T_u}\) step by step. The lemma below shows that if u wants to maximize his inner reward \(R^i(u)\) at most one node in \(\overline{T_u}\) can have contribution less than \(\mu \).
Lemma 2
If \(R^i(u)\) is maximized, there can be at most one node \(v\in \overline{T_u}\) with contribution \(C(v)<\mu \).
Proof
We prove the lemma by contradiction. Suppose there is more than one node with contribution less than \(\mu \). We denote two such nodes as x, y, i.e., \(x,y\in \overline{T_u}\) satisfying \(C(x)<\mu \) and \(C(y)<\mu \). Let \(S_u=\overline{T_u}{\setminus }\{x,y\}\), and let \(P_x,P_y\) be the set of ancestors of x, y in the reward computation tree. The inner reward of u is
To simplify the calculation, we define a function \(\gamma _p(S)=\sum _{v\in S}\frac{b\lambda }{\mu }C(v)\max \{a^{dep_p(v)},a^{dep_v(p)}\}\) for any node p in \(\overline{T_u}\).According to the definition and properties we proposed for function B(), it holds that
Expanding \(R^i(u)\) and combining the above bounds, we get
Without loss of generality, suppose \(\gamma _{x}((P_{x}\cup T_{x}){\setminus } \{x,y\})\ge \gamma _{y}((P_{y}\cup T_{y}){\setminus } \{x,y\})\). Then, consider two cases:
-
(a)
If \(C(x)+C(y)>\mu \), we can change C(x) to \(\mu \) and C(y) to \(C(x)+C(y)-\mu \).
-
(b)
If \(C(x)+C(y)\le \mu \), we can change C(x) to \(C(x)+C(y)\) and C(y) to 0.
In both cases, the change does not have an impact on the total contribution, but it increases \(R^i(u)\). Specifically, the sum of the first two expressions in (1) will increase due to the change. Then, using the fact that if for two reals A and B with \(A>B,0<t<\frac{A-B}{2},k<2\) and \(S_1=A^2+B^2+kAB\) and \(S_2=(A-t)^2+(B+t)^2+k(A-t)(B+t)\), it holds that \(S_1>S_2\), it follows that the third expression in (1) also increases. Meanwhile, the forth expression is unchanged. This leads to a contradiction because it means that this hypothetic partition does not maximize the inner reward. Therefore, if \(R^i(u)\) is maximized, there can be at most one node \(v\in \overline{T_u}\) with contribution \(C(v)<\mu \). \(\square \)
Next, we characterize the location of the at most one node in \(\overline{T_u}\) that has contribution less than \(\mu \). In the following lemma, we give the result.
Lemma 3
If \(R^i(u)\) is maximized, \(\overline{T_u}\) is an \(\epsilon \hbox {-}chain\) or a chain in which only the leaf node has contribution less than \(\mu \).
Proof
According to Lemma 2, if \(R^i(u)\) is maximized, there is at most one node with contribution less than \(\mu \) in \(\overline{T_u}\). We call it \(\epsilon \hbox {-}node\) and suppose its contribution is \(\epsilon (<\mu )\). (Here we need to pay attention that the \(\epsilon \hbox {-}node\) has contribution strictly less than \(\mu \).) We can prove the lemma by case analysis and contradiction.
- (a):
-
Suppose \(\overline{T_u}\) is not a chain. We distinguish three subcases.
- (a1):
-
Suppose in \(\overline{T_u}\), there is an \(\epsilon \hbox {-}node\) and the \(\epsilon \hbox {-}node\) is not a leaf node.
We denote the \(\epsilon \hbox {-}node\) as x with contribution \(C(x)=\epsilon \), and denote one of the leaf nodes which is a descendent of x as y with \(C(y)=\mu \). Let \(S_u=\overline{T_u}{\setminus }\{x,y\}\), and let \(P_x,P_y\) be the set of ancestors of x, y in the reward computation tree. Just copy the expansion of \(R^i(u)\) calculated in Lemma 2, we get that
Since x is the ancestor of y, we know that nodes in \(P_x\) are ancestors of both x and y and it holds that
Suppose there are n nodes in the path from y to x (not including x and y), denoted as \(S_{xy}\). Remember we have stated there is at most one \(\epsilon \hbox {-}node\). So each of these n nodes has contribution \(\mu \). Then we can infer that
Then we expand \(\gamma _{x}\) and \(\gamma _{y}\) using the union property
Then we can infer that
Then in the expression of \(R^i(u)\), if u changes C(x) to \(\mu \) and C(y) to \(\epsilon \), u will increase the sum of the second and third term in \(R^i(u)\), namely increase \(C(x)\cdot \gamma _{x}((P_{x}\cup T_{x}){\setminus } \{x,y\})+C(y)\cdot \gamma _{y}((P_{y}\cup T_{y}){\setminus } \{x,y\})\), and the other terms don’t change according to symmetry. So this change will increase \(R^i(u)\) which contradicts the assumption.
-
(a2)
Suppose in \(\overline{T}\), there is an \(\epsilon \hbox {-}node\) and the \(\epsilon \hbox {-}node\) is a leaf node.
In this case, \(\overline{T}\) has at least two leaf nodes. At least one leaf node denoted by x has contribution \(\mu \). We then want to prove that if we delete x and add a new node y with contribution \(C(y)=\mu \) and make the remain tree \(\overline{T}{\setminus }\{x\}\) attached as a subtree to y, the new inner reward of u will increase meanwhile the total contribution of u remains unchanged.
We define the new tree with y replacing x as \(\overline{T}_{new}\). Suppose there are n nodes in the path from x to y, denoted as \(S_{xy}\). Then we compare the new inner reward \(R^i(\overline{T}_{new})\) to the original inner reward \(R^i(\overline{T})\). We expand \(R^i(\overline{T}_{new})\) by using the properties of B(., .) as
As y is the root node of \(\overline{T}_{new}\), it holds that \(B(\overline{T}{\setminus }\{x\},y)=0\). Therefore,
For the original inner reward \(R^i(\overline{T})\), we have
As x is the leaf node of \(\overline{T}\), it holds that \(B(x,\overline{T}{\setminus }\{x\})=0\) and \(B(\overline{T}{\setminus }\{x\},x)=B(S_{xy},x)\). Therefore,
We find that \(R^i(\overline{T}_{new})>R^i(\overline{T})\) since \(B(y,\overline{T}{\setminus }(\{x\}\cup S_{xy}))>0\), which contradicts the assumption.
-
(a3)
Suppose in \(\overline{T}\), there is no \(\epsilon \hbox {-}node\). The proof is totally the same as in a2). We can find that the proof in a2) use the assumption only to make sure that the non-leaf nodes have contribution \(\mu \).
-
(b)
Suppose \(\overline{T}\) is a chain and there is an \(\epsilon \hbox {-}node\) which is neither the root nor the leaf of the chain.
We denote the \(\epsilon \hbox {-}node\) as x and the leaf of the chain as y. Then we prove that u can increase the inner reward by changing C(x) to \(\mu \) and changing C(y) to \(\epsilon \). The proof is similar to a1) as a chain is a special case of tree. Suppose there are n nodes in the path from y to x, denoted as \(S_{xy}\). Let \(S_u=\overline{T_u}{\setminus }\{x,y\}\), and let \(P_x,P_y\) be the set of ancestors of x, y in the reward computation tree. Here we just simplify the proof by using results in a1):
Here the only difference is that \(\overline{T}\) is a chain. So \(\gamma _{x}(T_{x}{\setminus } \{x,y,S_{xy}\})=0\). But we still have
according to \(\gamma _x(P_x)>\gamma _y(P_x)\) and \(\gamma _{x}(S_{xy})=\gamma _{y}(S_{xy})\).
This change will increase \(R^i(u)\) which contradicts the assumption.
Above all, we know if \(R^i(x)\) is maximized, \(\overline{T}\) is an \(\epsilon \hbox {-}chain\) or a chain with an \(\epsilon \hbox {-}\)node which is the leaf. We know these two topology is just reverse up-side-down. So the inner rewards are the same according to symmetry. \(\square \)
Until now, we know u can partition as an \(\epsilon \hbox {-}chain\) to maximize \(R^i(u)\). Then we begin the second main part. We want to prove u’s partition as an \(\epsilon \hbox {-}chain\) will maximize his external reward, \(R^e(u)\). In next lemma, it would be better to root each tree in \(\underline{T}\) to one leaf node in \(\overline{T}\).
Lemma 4
For any given topology \(\overline{T_u}\), suppose \(u_1,u_2,\ldots \), \(u_k\) are the nodes in \(\overline{T_u}\). There exists a partition that maximizes \(R^e(u)\) in which each tree in \(\underline{T_u}\) is attached to a single node \(u_i\), for some \(i=1,2,\ldots ,k\).
Proof
We denote the trees in \(\underline{T}\) as \(T_1,\ldots ,T_s\). Suppose \(T_1,\ldots ,T_s\) are attached to \(v_1,\ldots ,v_s\) in \(\overline{T}\). (\(v_1,\ldots ,v_s\) needn’t be different.) Then we use the definition of the external reward and get
Suppose \(u^*\) is the node in \(\overline{T}\) which can maximize \(\sum _{u\in P_{v_i}\cup \{v_i\}}C(u)a^{dep_{v_i}(u)}\). For each \(T_i\) (\(i=1,\ldots ,s\)), \(\sum _{v\in T_i}C(v)a^{dep_{v_i}{v}}\) depends only on the topology of \(T_i\). Therefore, taking the attached nodes \(v_i=u^*\) can maximize \(R^e(u)\). It indicates that there is a partition that each tree in \(\underline{T}\) is attached to one node in \(\overline{T}\). \(\square \)
We now know that \(R^e(u)\) can be maximized when each tree in \(\underline{T_u}\) is attached to a single node in \(\overline{T_u}\). For any given \(\overline{T_u}\), in order to maximize \(R^e(u)\), we thus only need to consider partition in which each tree in \(\underline{T_u}\) is attached to some node \(u^*\) in \(\overline{T_u}\). Then using this property, we show that an \(\epsilon \hbox {-}chain\) is the best partition for maximizing u’s external reward.
Lemma 5
If \(R^e(u)\) is maximized, \(\overline{T_u}\) must be an \(\epsilon \hbox {-}chain\) and \(u^*\) is the leaf node of \(\overline{T_u}\).
Proof
Firstly, let us show \(R^e(u)\) is maximized, \(\overline{T_u}\) must be a chain and \(u^*\) is a leaf node in \(\overline{T_u}\). We prove it by contradiction. Suppose \(\overline{T_u}\) is not a chain or \(u^*\) is not a leaf node in \(\overline{T_u}\). We find that there exists a leaf node \(u_L\) in \(\overline{T}\) which is not in set \(P_{u^*}\cup \{u^*\}\). We delete \(u_L\) in \(\overline{T}\) and let it be the new root \(u'_L\) of \(\overline{T}{\setminus }{u_L}\), namely relocate \(u_L\) to be the root of \(\overline{T}{\setminus }{u_L}\). We define the new tree as \(\overline{T}_{new}\). We then compare the original external reward \(R^e(u)\) and the new external reward calculated by \(\overline{T}_{new}\), \(R^e(u)'\).
From the above equality, we get a contradiction that u can increase his external reward by improvements. So if \(R^e(u)\) is maximized, \(\overline{T_u}\) must be a chain and \(u^*\) is a leaf node in \(\overline{T_u}\).
Our next step is to show \(\overline{T}\) is an \(\epsilon \hbox {-}chain\). We also prove it by contradiction. Suppose \(\overline{T}\) is a chain but not an \(\epsilon \hbox {-}chain\) and u can get the maximum external reward. Then there exists a node x which is not the root node of \(\overline{T}\) and has contribution \(C(x)<\mu \). As x is not the root, we denote x’s parent as y. Then we show that if we change C(x) to \(C(x)+\alpha \) and C(y) to \(C(y)-\alpha \), (The constraints are \(\alpha <\mu -C(x)\) and \(\alpha <C(y)\). We can take very small \(\alpha \).) u can get higher external reward. If we change the contribution like above, the new external reward becomes \(R^e(u)'\). Then we compare it to the original external reward \(R^e(u)\):
In the same way, we can write
According to the condition of TDRM that \(a<1\), we get \(R^e(u)<R^e(u)'\). So we get the contradiction and get our solution that if u wants to maximize \(R^e(u)\), he must take \(\overline{T_u}\) as an \(\epsilon \hbox {-}chain\) and \(u^*\) is the leaf node of \(\overline{T_u}\). \(\square \)
By Lemmas 3 and 5, we know that the partition which makes \(\overline{T_u}\) an \(\epsilon \hbox {-}chain\), and in which all trees in \(\underline{T_u}\) are attached to the tail node of \(\overline{T_u}\), can maximize both \(R^i(u)\) and \(R^e(u)\). According to the definition that \(R(u)=R^i(u)+R^e(u)+\phi C(u)\), we can infer that such a partition thus maximizes R(u). However, if the participant u simply joins the referral tree as a single, non-Sybil node with its entire contribution, TDRM will automatically also transform u into the same \(\epsilon \hbox {-}chain\) in the reward computation tree. Thus, u has no benefit from joining as multiple identities, which proves USA.
Rights and permissions
About this article
Cite this article
Lv, Y., Moscibroda, T. Fair and resilient Incentive Tree mechanisms. Distrib. Comput. 29, 1–16 (2016). https://doi.org/10.1007/s00446-015-0250-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00446-015-0250-y