1 Introduction

A central topic of mechanism design theory concerns the ability of agents to earn information rents. Both casual observation and economic intuition suggest that possession of relevant private information confers a positive rent. However, this insight is at odds with the finding of Crémer and McLean (henceforth CM) (1985, 1988). They show that, in models having common priors supported on a fixed finite number of types, the set of priors which admit full surplus extraction (FSE) is generic.

The analysis of CM has been challenged on several grounds: their conclusion is not robust to the cases where the agents are risk averse or are protected by limited liability (Roberts 1991; Demougin and Garvie 1991), or to the case with competition among principals (Peters 2003). Heifetz and Neeman (2006) show that CM’s genericity result hinges on their implicit common-knowledge assumption that each agent has a fixed finite number of types. FSE is generically impossible in both a geometric and a measure-theoretical sense when convex combination of priors is allowed. Another major critique towards CM comes from its vulnerability to collusion among agents. The intuition is simple. In the FSE mechanism, payments to and from agents depend on the reports of other agents. The agents have strong incentives to collude, especially in nearly independent environments where these payments are very large.

Collusion is a widespread and noxious phenomenon in reality. Typically, it imposes severe limits on what can be achieved by the mechanism designer, and thus it is generally regarded as a factor that reduces the principal’s payoff in addition to asymmetric information. The pioneering work that studies collusion in principal-multiagent setting is due to Laffont and Martimort (hereafter LM) (1997, 2000). They offer a tractable modeling framework for analyzing the role of colluders’ information asymmetry in collusion-proof mechanism design. A difference is found for independent and correlated types. In procurement/public good settings with two agents, they show that the optimal outcome can be made collusion-proof at no cost to the principal if the agents’ types are independent (LM 1997), but if the types are correlated, preventing collusion entails a strict cost to the principal (LM 2000). In a duopoly model, Pouyet (2002) shows that under strongly negative correlation, the principal can prevent collusion at no cost. But he does not consider the possibility of reallocation/arbitrage.

In LM’s procurement and public good settings, two agents may consume certain amount of goods in a non-excludable way. As such, there is no need and it is technologically impossible to divide the goods between them. However, in a private goods setting, e.g., in monopoly pricing problem, buyers have incentives to reallocate their total purchases obtained from the principal. Thus, the mechanism designer should make an optimal contractual response preventing the agents from (i) manipulating their reports, (ii) exchanging side transfers, and (iii) conducting arbitrage.Footnote 1 Jeon and Menicucci (hereafter JM) (2005) extend LM’s model by incorporating arbitrage. They show that collusion is preventable at no cost with uncorrelated types in a nonlinear pricing model that allows collusive consumers to conduct reallocations on their initial purchases. They do not, however, consider a more interesting case where agents’ types are correlated.

Che and Kim (hereafter CK) (2006) advance on these fronts by developing a more general method for collusion-proofing a mechanism. They show that agents’ collusion, including both reporting manipulation and arbitrage, is harmless to the principal in a broad class of circumstances. Any payoff the principal can attain in the absence of collusion, including the second-best efficiency is attainable with uncorrelated types, and the first-best efficiency is also attainable for cases with correlated types and more than three agents.Footnote 2 Their analysis is quite general in terms of the number of colluders, the distribution of types, and the production technology. They also allow collusion to take place between a subgroup of agents rather than being pervasive. However, while they give a satisfactory answer in a broad class of environments, they leave unanswered an important question about whether collusion is harmless in the two-agent correlated-type environment.Footnote 3 It is still unknown what outcome could be implemented in a two-agent environment when types are correlated and arbitrage is allowed. We are trying to fill this gap in the present paper.

Our results depart from and contribute to the existing literature in the following aspects. Firstly, our two-agent result complements CK’s work and gives a more general answer to the question whether or not collusion with both reports manipulation and arbitrage is harmful.Footnote 4 Our findings are that collusion can sometimes be prevented at no cost if correlation is strongly negative; but it always incurs a strict cost to the principal if correlation is positive or weakly negative. From the perspective of rents extraction, we extend CM’s work by showing that the FSE result is immune to collusion in the environment with strongly negative correlation.

Secondly, we extend the result of LM (2000) by considering both arbitrage and negative correlation. LM (2000) characterize the collusion-proof mechanism in procurement/public good environments. It is unnecessary and impossible to split the goods between consumers. In contrast, we discuss the private good problem. Consumers could conduct arbitrage on their total purchases. Moreover, LM’s model considers only positive correlation, while we consider negative correlation as well. We find that a strongly negative correlation between agents may greatly facilitate the principal’s fighting against collusion.

Lastly, we also extend the work of JM (2005). They consider information manipulation and arbitrage with only independent types. We extend their model to correlated environments, which is obvious more practically applicable. Their result could be regarded as a special case of ours when the correlation approaches zero.

The rest of this paper is organized as follows. Section 2 describes the economic environment studied and reviews as a benchmark the optimal pricing mechanism without collusion. Section 3 characterizes the coalitional incentive and no-arbitrage constraints which must be satisfied by an optimal weakly collusion-proof mechanism. Section 4 describes the collusion-proof implementation of the first-best allocation under strongly negative correlation. Section 5 characterizes the optimal collusion-proof mechanism with weak (both negative and positive) correlations. Section 6 discusses the case with an almost perfectly positive correlation. Section 7 gives conclusions.

2 The model

2.1 Preferences, information, and mechanisms

A monopolistic seller can produce any amount of homogeneous goods at a constant marginal cost c and sells the goods to two buyers whose consumptions are \(q_i,i\in \{1,2\}\). Buyer i obtains utility \(\theta _iV(q_i)-t_i\) from consuming \(q_i\) units of goods and paying \(t_i\) units of money to the seller. \(V(\cdot )\) is an increasing concave function with \(V(0)=0, V'(x)>0, V''(x)<0,\forall x>0\), and satisfies the Inada conditions: \(\lim _{x\rightarrow +\infty } V'(x)=0, \lim _{x\rightarrow 0} V'(x)=+\infty \). A consumer privately observes his own type \(\theta _i\in \Theta \equiv \{\theta _{L},\theta _{H }\}\), with \(\Delta \theta \equiv \theta _{H}-\theta _{L}\). The probabilities \(p(\theta _1,\theta _2)\) of each state \((\theta _1,\theta _2)\in \Theta ^2\) are common knowledge prior beliefs. For simplicity, we write \(p_{LL}=p(\theta _{L},\theta _{L}),p_{LH}=p(\theta _{L},\theta _{H})= p(\theta _{H},\theta _{L}),p_{HH}=p(\theta _{H},\theta _{H}).\) We also denote by \(\rho \equiv p_{LL}p_{HH}-p_{LH}^2\) the degree of correlation between the agents’ types.Footnote 5

The monopolistic seller designs a grand sale mechanism \(\mathbf M \) to maximize her expected profit. Considering the Revelation Principle, we can restrict our attention to a direct revelation mechanism which maps any pair of reports \((\widehat{\theta _1},\widehat{\theta _2})\) into a combination of consumptions and payments: \(\mathbf M =\{q_1(\widehat{\theta _1},\widehat{\theta _2}),q_2(\widehat{\theta _1},\widehat{\theta _2}), t_1(\widehat{\theta _1},\widehat{\theta _2}),t_2(\widehat{\theta _1},\widehat{\theta _2})\}, \forall (\widehat{\theta _1},\widehat{\theta _2})\in \Theta ^2\).Footnote 6 We assume that buyers are ex ante identical, for notational simplicity, we focus on anonymous mechanism in which the consumption and payment of a buyer depend only on the reports and not on his identity.Footnote 7 Then we denote by \(t_{kl}\) for \(k,l\in \{H,L\}\) the tax paid by an agent whose report is \(\theta _k\) and the other agent’s report is \(\theta _l\), and \(q_{kl}\) is defined analogously, the rent obtained by agent is denoted by \(\pi _{kl}=\theta _kV(q_{kl})-t_{kl}.\) Let \(\mathbf q =(q_{LL},q_{LH},q_{HL},q_{HH})\in \mathbb {R}^4_{+}\) , \(\mathbf t =(t_{LL},t_{LH},t_{HL},t_{HH})\in \mathbb {R}^4\) and \(\varvec{\pi } =(\pi _{LL},\pi _{LH},\pi _{HL},\pi _{HH})\in \mathbb {R}^4\) denote, respectively, the vectors of quantities, transfers and rents.

2.2 Coalition formation

Applying the methodology of LM (1997, 2000), we model the buyers’ coalition formation by a side-contract, denoted by \(\mathbf S \), offered by a benevolent uninformed third party, whose aim is to maximize the total payoff of agents. The maximizing problem is subject to the buyers’ incentive compatibility and participation constraints written with respect to the utility they obtain when the grand mechanism \(\mathbf M \) is played non-cooperatively. We study a collusive arrangement that allows the agents (i) to collectively manipulate their reports to the principal and to exchange transfers in a budget-balanced way, and (ii) to reallocate quantities assigned by the grand contract. The timing of the overall game of contract offer and coalition formation is the following:

  • Stage 1 Buyers learn their respective “types” \(\theta _i,i=1,2\).

  • Stage 2 The seller proposes a grand sale mechanism \(\mathbf M \). If any buyer vetoes it, all buyers get their reservation utility normalized exogenously at zero and the following stages do not occur.

  • Stage 3 The third party proposes a side mechanism \(\mathbf S \) to the buyers. If anyone refuses this side mechanism, \(\mathbf M \) is played non-cooperatively. If both buyers accept \(\mathbf S \), they report their types to the third party who enforces manipulation of report into \(\mathbf M \), and commits to enforce the corresponding side transfers and reallocation within the coalition.

  • Stage 4 Reports are sent into the grand mechanism. Quantities and payments specified in \(\mathbf M \) are enforced. Quantities reallocation and side transfers specified in \(\mathbf S \), if any, are implemented.

Formally, a side mechanism \(\mathbf S \) takes the following form:

$$\begin{aligned} \mathbf S =\left\{ \phi (\tilde{\theta }_1,\tilde{\theta }_2),x_1(\tilde{\theta }_1, \tilde{\theta }_2,\tilde{\phi }),x_2(\tilde{\theta }_1, \tilde{\theta }_2,\tilde{\phi }),y_1(\tilde{\theta }_1,\tilde{\theta }_2),y_2(\tilde{\theta }_1,\tilde{\theta }_2)\right\} , \forall (\tilde{\theta }_1,\tilde{\theta }_2)\in \Theta ^2. \end{aligned}$$

\(\tilde{\theta }_i\) is buyer i’s report to the third party. \(\phi (\cdot )\) is the report manipulation function which maps any pair of reports \((\tilde{\theta }_1, \tilde{\theta }_2)\) submitted by the buyers to the third-party into a pair of reports to the principal. To convexify the third-party’s feasible set, stochastic manipulations are allowed. Let \(\tilde{\phi }\in \Theta ^2\) denote an outcome of \(\phi (\cdot )\). Then, \(\phi (\cdot )\) specifies the probability \(p^{\phi }(\tilde{\theta }_1,\tilde{\theta }_2, \tilde{\phi })\) in which the third party, after receiving reports \((\tilde{\theta }_1,\tilde{\theta }_2)\), requires the buyers to report \(\tilde{\phi }\) to the principal. When \(p^{\phi }(\tilde{\theta }_1,\tilde{\theta }_2, \cdot )\) is a degenerated lottery that assigns probability one to some \(\tilde{\phi }\in \Theta ^2\), we get a deterministic manipulation. \(y_i(\tilde{\theta }_1, \tilde{\theta }_2)\) denotes the monetary transfer from the third party to buyer i. \(y_i\) does not need to depend on \(\tilde{\phi }\) because of quasi linearity of a buyer’s payoff in money. \(x_i(\tilde{\theta }_1, \tilde{\theta }_2,\tilde{\phi })\) represents the quantity of goods buyer i receives from the third party when \(\tilde{\phi }\) is reported to the seller and \((\tilde{\theta }_1, \tilde{\theta }_2)\) are reported to the third party. Such a reallocation rule maximizes the buyers’ joint surplus subject to the total amount of goods being allocated to them by an incentive compatible grand mechanism.Footnote 8 Since the third party is neither a source of goods nor money, we assume that a side mechanism should satisfy the ex post budget-balance constraints for the reallocation of goods and for the side transfers, respectively

$$\begin{aligned} \sum _{i=1}^2x_i(\tilde{\theta }_1, \tilde{\theta }_2,\tilde{\phi })=0 \text{ and } \sum _{i=1}^2y_i(\tilde{\theta }_1, \tilde{\theta }_2)=0, \forall (\tilde{\theta }_1, \tilde{\theta }_1)\in \Theta ^2 \text{ and } \forall \tilde{\phi }\in \Theta ^2. \end{aligned}$$

Let \(U^{M}(\theta _i)\) denote the expected payoff of \(\theta _i\) in truthful equilibrium of \(\mathbf M \). The side mechanism must guarantee to an agent a utility level at least as large as what he expects from playing non-cooperatively the grand mechanism and then getting a utility \(U^{M}(\theta _i)\).

2.3 The optimal grand-mechanism without coalition

We consider, as a benchmark, the optimal grand-mechanism without side-contracting. Absent collusion, a mechanism \(\mathbf M =(\varvec{\pi }, \mathbf q )\) is feasible if it is individually rational,

$$\begin{aligned} BIR_L{:}\,&p_{LL}\pi _{LL}+p_{LH}\pi _{LH}\geqslant 0, \end{aligned}$$
(1)
$$\begin{aligned} BIR_H{:}\,&p_{LH}\pi _{HL}+p_{HH}\pi _{HH}\geqslant 0; \end{aligned}$$
(2)

and incentive compatible,

$$\begin{aligned}&BIC_L{:}\, p_{LL}\pi _{LL}+p_{LH}\pi _{LH}\geqslant p_{LL}\pi _{HL}\nonumber \\&\quad \qquad +p_{LH}\pi _{HH}-\Delta \theta [p_{LL}V(q_{HL})+p_{LH}V(q_{HH})], \end{aligned}$$
(3)
$$\begin{aligned}&BIC_H{:}\, p_{LH}\pi _{HL}+p_{HH}\pi _{HH}\geqslant p_{LH}\pi _{LL}+p_{HH}\pi _{LH}\nonumber \\&\qquad \qquad +\Delta \theta [p_{LH}V(q_{LL})+p_{HH}V(q_{LH})]. \end{aligned}$$
(4)

Let \(\mathcal {M}\equiv \{(\varvec{\pi },\mathbf q )|\textit{subject to\ } (1) \textit{ to } (4)\}\) be the set of all feasible mechanisms. We represent the principal’s payoff as \( \varvec{\Pi }(\varvec{\pi },\mathbf q )=2\sum _{k}\sum _{l}p_{kl}\left[ \theta _kV(q_{kl})-cq_{kl}-\pi _{kl}\right] .\) Let \(\mathcal {V}\equiv \{V\in \mathbb {R}^+|V=\varvec{\Pi }(\varvec{\pi },\mathbf q ),(\varvec{\pi },\mathbf q )\in \mathcal {M}\}\) denote the set of all implementable payoffs for the principal. Of special interest is the highest implementable payoff \(\varvec{\Pi }^{SB}(\mathbf p )\equiv \sup \mathcal {V}\), which is represented as a function of probability distribution \(\mathbf p \equiv (p_{LL},p_{HH})\) and is referred to as noncollusive optimal or the second-best payoff.

Obviously, in the complete information case, the seller could implement the first-best payoff \(\varvec{\Pi }^{FB}(\mathbf p )\equiv 2\sum _{k}\sum _{l}p_{kl}\left[ \theta _kV(q^{FB}_{kl})-cq^{FB}_{kl}\right] \), where \(q_{kl}^{FB}\) is given by \(\theta _kV^{\prime }(q^{FB}_{kl})=c, \forall k,l\in \{H,L\}\). CM’s FSE result shows that under incomplete information, the first-best payoff is still achievable (i.e., \(\varvec{\Pi }^{SB}(\mathbf p )=\varvec{\Pi }^{FB}(\mathbf p )\)) if \(\rho \ne 0\). They show that there is a vector of rents \(\varvec{\pi }\), so that \((\varvec{\pi },\mathbf q ^{FB})\) satisfies all BICs and binding BIRs. Representing \(\pi _{LH}\) and \(\pi _{HL}\) by \(\pi _{LL}\) and \(\pi _{HH}\) from BIRs written with equalities, then substituting these expressions into BICs written with \(\mathbf q =\mathbf q ^{FB}\) yields

$$\begin{aligned} BIC_L^{\prime }{:}\,&\frac{\pi _{HH} \rho }{p_{LH}}+\Delta \theta (p_{LH}+ p_{LL})V\left( q^{FB}_{HH}\right) \geqslant 0, \end{aligned}$$
(5)
$$\begin{aligned} BIC_H^{\prime }{:}\,&\frac{\pi _{LL} \rho }{p_{LH}}-\Delta \theta (p_{HH}+p_{LH})V\left( q^{FB}_{LL}\right) \geqslant 0. \end{aligned}$$
(6)

We denote by \(\mathcal {M}^*(\mathbf p )\equiv \left\{ (\pi _{LL},\pi _{HH})\in \mathbb {R}^2|\textit{subject to\ }BIC_L^{\prime } \textit{\ and\ }BIC_H^{\prime }\right\} \) the reduced feasible region, within which the first-best (FSE) result is achieved. It is easy to find that the first-best outcome is implementable if and only if \(\rho \ne 0\), because \(\mathcal {M}^*(\mathbf p )\ne \varnothing \) for \(\rho \ne 0\) and \(\mathcal {M}^*(\mathbf p )=\varnothing \) if \(\rho =0\).

3 The third party’s optimization program

In this section, we study formally the third party’s optimization problem and derive the coalitional incentive and no-arbitrage constraints which must be satisfied by an optimal collusion-proof grand mechanism.

The third-party’s optimal problem is given by:

$$\begin{aligned}{}[\mathcal {P}_T]\underset{\phi (\cdot ),x_{i}(\cdot ),y_{i}(\cdot )}{\max }\sum _{(\theta _1,\theta _2)\in \Theta ^2} p(\theta _1,\theta _2)\left[ U^{1}(\theta _1)+U^{2}(\theta _2)\right] \end{aligned}$$

subject to:

$$\begin{aligned} U^{i}(\theta _i)= & {} \sum _{\theta _j\in \Theta }p(\theta _{j}|\theta _i) \left\{ \sum _{\tilde{\phi }\in \Theta ^2}p^{\phi }(\theta _i,\theta _j,\tilde{\phi }) \left[ \theta _iV\left( x_{i}\left( \theta _i,\theta _j,\tilde{\phi }\right) +q_i\left( \tilde{\phi }\right) \right) \right. \right. \\&\left. \left. +y_{i}(\theta _i,\theta _{j})-t_{i}\left( \tilde{\phi }\right) \right] \right\} \end{aligned}$$

for any \(\theta _i\in \Theta \) and \(i,j=1,2\) with \(i\ne j\);

$$\begin{aligned} \left( BIC^{S}_{i}\right) {:}\, U^{i}(\theta _i)\geqslant U^{i}(\widetilde{\theta _{i}}\mid \theta _i) \end{aligned}$$

where

$$\begin{aligned} U^{i}(\widetilde{\theta _{i}}\mid \theta _i)= & {} \sum _{\theta _j\in \Theta }p(\theta _{j}|\theta _i)\left\{ \sum _{\tilde{\phi }\in \Theta ^2}p^{\phi }(\tilde{\theta _i},\theta _j,\tilde{\phi }) \left[ \theta _iV\left( x_{i}\left( \tilde{\theta }_i,\theta _j,\tilde{\phi }\right) +q_i\left( \tilde{\phi }\right) \right) \right. \right. \\&\left. \left. +y_{i}(\tilde{\theta }_i,\theta _{j})-t_{i}\left( \tilde{\phi }\right) \right] \right\} \end{aligned}$$

for any \(\left( \theta _i,\tilde{\theta _i}\right) \in \Theta ^{2}\) and \(i,j=1,2\) with \(i\ne j\);

$$\begin{aligned} \left( BIR^{S}_{i}\right) {:}\, U^{i}(\theta _i)\geqslant U^{M}(\theta _i) \end{aligned}$$

for any \(\theta _i\in \Theta \) and \(i=1,2\);

$$\begin{aligned}&(BB:y){:}\, \sum \limits _{i=1}^{2}y_i(\theta _1,\theta _2)=0&\\&(BB:x){:}\, \sum \limits _{i=1}^{2}x_i(\theta _1,\theta _2,\widetilde{\phi })=0&\end{aligned}$$

for any \((\theta _1,\theta _2)\in \Theta ^2\) and any \(\widetilde{\phi }\in \Theta ^2.\)

Definition 1

A side mechanism \(\mathbf S \) is coalition-interim-efficient with respect to an incentive-compatible grand mechanism \(\mathbf M \) providing a reservation utility \(U^{M}(\theta )\) Footnote 9 if and only if it solves the above program \([\mathcal {P}_T]\).

Let \(\mathbf S ^{0}\equiv \{\phi (\cdot )=Id(\cdot ),x_{1}(\cdot )=x_{2}(\cdot )=0,y_{1}(\cdot )=y_{2}(\cdot )=0\}\) denote the null contract that implements no manipulation of reports, no reallocation of quantities, and no side transfers. A weakly collusion-proof mechanism is such that the third party’s optimal response to it is to offer a null side mechanism.

Definition 2

An incentive-compatible grand mechanism \(\mathbf M \) is weakly collusion-proof if and only if it is a truthtelling direct mechanism and the null side mechanism \(\mathbf S ^{0}\) is coalition-interim-efficient with respect to \(\mathbf M \).

Proposition 1

(Weak collusion-proofness principle, WCP) Any Bayesian perfect equilibrium of the two-stage game of grand and side contract offer \(\mathbf M \circ \mathbf S \) can be achieved by a weakly collusion-proof mechanism.

Proof

The proof is a straightforward adaptation of the proof of Proposition 3 of LM (2000) and hence is omitted. \(\square \)

According to the WCP, to characterize the optimal weakly collusion-proof mechanism, it suffices to add the coalitional incentive constraints (CICs) and no-arbitrage constraint (NAC), under which the third party’s best response is to offer a null side contract, to the principal’s optimization problem. Our next proposition characterizes these additional constraints.

Proposition 2

A symmetric Bayesian incentive compatible grand mechanism \(\mathbf M \) is weakly collusion-proof if and only if there exists \(\epsilon \in [0,1)\) such that:

  • The following coalitional incentive constraints are satisfied:Footnote 10

    $$\begin{aligned}&CIC_{LL,LH}{:}\,2\pi _{LL}\geqslant \pi _{LH}+\pi _{HL}+2h(\epsilon )\Delta \theta V(q_{LL}) -g(q_{LH}+q_{HL},\epsilon )\nonumber \\&\qquad \qquad -\frac{p_{HH}\epsilon \Delta \theta V(q_{LH})}{p_{LH}} \end{aligned}$$
    (7)
    $$\begin{aligned}&CIC_{LL,HH}{:}\,\pi _{LL}\geqslant \pi _{HH}-\Delta \theta V(q_{HH})-h(\epsilon )\Delta \theta [V(q_{HH})-V(q_{LL})] \end{aligned}$$
    (8)
    $$\begin{aligned}&CIC_{LH,LL}{:}\,\pi _{LH}+\pi _{HL}\geqslant 2\pi _{LL}+g(2q_{LL},\epsilon )\nonumber \\&\qquad \qquad +\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}} V(q_{LH})-2h(\epsilon )\Delta \theta V(q_{LL}) \end{aligned}$$
    (9)
    $$\begin{aligned}&CIC_{LH,HH}{:}\,\pi _{LH}+\pi _{HL}\geqslant 2\pi _{HH}-f(2q_{HH},\epsilon )+\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}}V(q_{LH}) \end{aligned}$$
    (10)
    $$\begin{aligned}&CIC_{HH,LH}{:}\,2\pi _{HH}\geqslant \pi _{HL}+\pi _{LH}+f(q_{LH}+q_{HL},\epsilon )\nonumber \\&\qquad \qquad -\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}}V(q_{LH}) \end{aligned}$$
    (11)
    $$\begin{aligned}&CIC_{HH,LL}{:}\,\pi _{HH}\geqslant \pi _{LL}+\Delta \theta V(q_{LL}) \end{aligned}$$
    (12)

    where

    $$\begin{aligned} f(x,\epsilon )= & {} 2\theta _HV\left( \frac{x}{2}\right) -\max _{x_1,x_2\geqslant 0,x_1+x_2=x}\left[ \left( \theta _L -\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}}\right) V(x_1)+\theta _HV(x_2) \right] ,\\ g(x,\epsilon )= & {} \max _{x_1,x_2\geqslant 0,x_1+x_2=x} \left[ \left( \theta _L-\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}}\right) V(x_1)+\theta _HV(x_2) \right] \\&- 2\left[ \theta _L-\Delta \theta h(\epsilon )\right] V\left( \frac{x}{2}\right) ,\\ h(\epsilon )= & {} \frac{p_{LH}^2\epsilon }{p_{LL}p_{LH}+\rho \epsilon }. \end{aligned}$$
  • The following no-arbitrage constraint is satisfied:

    $$\begin{aligned} \mathbf NAC : q_{LH}=\varphi _1(q_{LH}+q_{HL}), q_{HL}=\varphi _2(q_{LH}+q_{HL}), \end{aligned}$$
    (13)

    where

    $$\begin{aligned} \left( \varphi _1(x),\varphi _2(x)\right) =arg\max _{ x_1,x_2\geqslant 0,x_1+x_2=x}\left[ \left( \theta _{L}-\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}}\right) V(x_1)+\theta _{H}V(x_2)\right] \end{aligned}$$

    is the optimal splitting rule within a heterogenous coalition.

  • If \(\epsilon >0\), the \(\theta _H\) type’s Bayesian incentive compatibility constraint \(BIC_H\) (4) is binding.

Proof

See “Appendix”. \(\square \)

The coalitional incentive constraints prevent the third party from manipulating the agents’ reports. For instance, \(CIC_{LL,LH}\) requires that a \((\theta _{L},\theta _{L})\) coalition prefers truthtelling to reporting \((\theta _{L},\theta _{H})\). Each coalitional incentive constraint takes into account the possibility of reallocation: if both agents report the same types to the third party, each of them receives half of the total quantities available; otherwise, the total quantities are reallocated so as to maximize the coalitional total payoff evaluated at \((\theta _H, \theta _L-p_{HH}\epsilon \Delta \theta /p_{LH})\). The symmetric assumptions \(q_1(\theta _{k},\theta _{k})=q_2(\theta _{k},\theta _{k})\), for all \(k\in \{H,L\}\) imply that there is no reallocation within homogenous (i.e., LL or HH) coalitions. In heterogeneous (i.e., LH) coalitions, however, the third party has an incentive to reallocate the goods bought from the seller unless NAC is satisfied. Therefore, the optimal weakly collusion proof mechanism maximizes the seller’s expected payoff subject to constraints BICsBIRsCICs and NAC [(1)–(4), (7)–(13)].

The variable \(\epsilon \) in coalitional incentive constraints can be interpreted as a transaction cost of side contracting due to asymmetric information. If the \(\theta _{H}\) type’s incentive compatibility constraint is binding in the third party’s program, the principal has flexibility in choosing \(\epsilon \), since \(S^0\) is optimal for the third party if and only if it satisfies conditions CICs and NAC for at least one \(\epsilon \in [0,1)\). An agent usually cannot fully trust and share his private information with his collusive partners, then the third party has to face the same incentive problem faced by the principal and thus a frictional transaction cost arises within their coalition. This transaction cost is a major impediment to collusive efficiency. The principal, although can not necessarily implement the first-best allocation, is able to exploit the agents’ divergence and mutual distrust to increase the transaction cost of side contracting and thus tear apart their coalition. In constraints (7)–(13), true valuations are replaced by virtual valuations. For high-type, the virtual and true valuations are the same, i.e., \(\theta _H^v=\theta _H\); whereas for low-type, the virtual valuation is lower: \(\theta _{L,1}^{v}\equiv \theta _{L}-p_{LH}^{2}\epsilon \Delta \theta /(p_{LL}p_{LH}+\rho \epsilon )\) in a homogeneous (LL) coalition and \(\theta _{L,2}^{v}\equiv \theta _{L}-p_{HH}\epsilon \Delta \theta /p_{LH}\) in a heterogeneous (LH) coalition.

Given LM’s result that collusion incurs efficiency loss for positive correlation and JM’s result that collusion is preventable at no cost for independent types, a natural question to explore is what would happen if we allow for negative correlation.

4 The case with strongly negative correlation

In this section, we will show that the principal can implement the first-best allocation under strongly negative correlation. For the first-best allocations \(q_{LH}^{FB}\) and \(q_{HL}^{FB}\) to be resistant to arbitrage, the principal needs to set \(\epsilon =0\).Footnote 11 Also, both \(BIR_L\) and \(BIR_H\) need to be binding, since no information rent can accrue to either type. We thus obtain \(\pi _{LH}=-p_{LL}\pi _{LL}/p_{LH}\) and \(\pi _{HL}=-p_{HH}\pi _{HH}/p_{LH}\) from binding BIRs, then the remaining constraints evaluated at \(\mathbf q =\mathbf q ^{FB}\) reduce to the following conditions.

$$\begin{aligned} BIC_L(\pi _{LL},\pi _{HH})\equiv & {} \frac{\pi _{HH} \rho }{p_{LH}}+\Delta \theta \left( p_{LH}+p_{LL}\right) V\left( q^{FB}_{HH}\right) \geqslant 0, \end{aligned}$$
(14)
$$\begin{aligned} BIC_H(\pi _{LL},\pi _{HH})\equiv & {} \frac{\pi _{LL} \rho }{p_{LH}}-\Delta \theta \left( p_{HH}+p_{LH}\right) V\left( q^{FB}_{LL}\right) \geqslant 0,\end{aligned}$$
(15)
$$\begin{aligned} CIC_{LL,LH}(\pi _{LL},\pi _{HH})\equiv & {} \left( 1-p_{HH}\right) \pi _{LL}\nonumber \\&+p_{HH}\pi _{HH} +p_{LH} g\left( q_{HL}^{FB}+q_{LH}^{FB},0\right) \geqslant 0,\end{aligned}$$
(16)
$$\begin{aligned} CIC_{LL,HH}(\pi _{LL},\pi _{HH})\equiv & {} \pi _{HH}-\pi _{LL}- \Delta \theta V\left( q_{HH}^{FB}\right) \leqslant 0,\end{aligned}$$
(17)
$$\begin{aligned} CIC_{LH,LL}(\pi _{LL},\pi _{HH})\equiv & {} (1-p_{HH})\pi _{LL}+p_{HH}\pi _{HH}+p_{LH}g(2q_{LL}^{FB},0)\nonumber \\\leqslant & {} 0,\end{aligned}$$
(18)
$$\begin{aligned} CIC_{LH,HH}(\pi _{LL},\pi _{HH})\equiv & {} p_{LL}\pi _{LL}+(1-p_{LL})\pi _{HH}-p_{LH}f(2q_{HH}^{FB},0)\nonumber \\\leqslant & {} 0,\end{aligned}$$
(19)
$$\begin{aligned} CIC_{HH,LL}(\pi _{LL},\pi _{HH})\equiv & {} \pi _{HH}-\pi _{LL}- \Delta \theta V\left( q_{LL}^{FB}\right) \geqslant 0,\end{aligned}$$
(20)
$$\begin{aligned} CIC_{HH,LH}(\pi _{LL},\pi _{HH})\equiv & {} p_{LL}\pi _{LL}+(1-p_{LL})\pi _{HH}\nonumber \\&- p_{LH}f(q_{LH}^{FB}+q_{HL}^{FB},0)\geqslant 0, \end{aligned}$$
(21)
Fig. 1
figure 1

Collusion-proof implementation of the first-best allocation

We denote by \(\widehat{\mathcal {M}}(\mathbf p )= \left\{ (\pi _{LL},\pi _{HH})\in \mathbb {R}^2|\textit{subject to: }(14) \textit{ to } (21)\right\} \) the set of rent vectors which could support the first-best quantities \(\mathbf q ^{FB}\). It follows directly that the first-best outcome is achievable if and only if \(\widehat{\mathcal {M}}(\mathbf p )\ne \varnothing \). In Fig. 1, the points within parallelogram ABCD satisfy adjacent coalitional conditions \(CIC_{HH,LH}, CIC_{LH,LL}, CIC_{LH,HH}\) and \(CIC_{LL,LH}\).Footnote 12 The coordinates of points A to D are given as follows:Footnote 13

$$\begin{aligned} \pi _{LL}^A= & {} -\frac{(1-p_{LL})g\left( 2q^{FB}_{LL},0\right) +p_{HH}f\left( q^{FB}_{HL}+q^{FB}_{LH},0\right) }{2}<0,\\ \pi _{HH}^A= & {} \frac{p_{LL}g\left( 2q^{FB}_{LL},0\right) +(1-p_{HH})f\left( q^{FB}_{HL}+q^{FB}_{LH},0\right) }{2}>0;\\ \pi _{LL}^B= & {} -\frac{(1-p_{LL})g\left( 2q^{FB}_{LL},0\right) +p_{HH}f\left( 2q^{FB}_{HH},0\right) }{2}<0,\\ \pi _{HH}^B= & {} \frac{p_{LL}g\left( 2q^{FB}_{LL},0\right) +(1-p_{HH})f\left( 2q^{FB}_{HH},0\right) }{2}>0;\\ \pi _{LL}^C= & {} -\frac{p_{HH}f\left( 2q^{FB}_{HH},0\right) +(1-p_{LL})g\left( q^{FB}_{HL}+q^{FB}_{LH},0\right) }{2}<0\\ \pi _{HH}^C= & {} \frac{(1-p_{HH})f\left( 2q^{FB}_{HH},0\right) +p_{LL}g\left( q^{FB}_{HL}+q^{FB}_{LH},0\right) }{2}>0;\\ \pi _{LL}^D= & {} -\frac{(1-p_{LL})g\left( q^{FB}_{LH}+q^{FB}_{HL},0\right) +p_{HH}f\left( q^{FB}_{HL}+q^{FB}_{LH},0\right) }{2}<0,\\ \pi _{HH}^D= & {} \frac{p_{LL}g\left( q^{FB}_{LH}+q^{FB}_{HL},0\right) +(1-p_{HH})f\left( q^{FB}_{HL}+q^{FB}_{LH},0\right) }{2}>0. \end{aligned}$$

To guarantee the nonemptiness of \(\widehat{\mathcal {M}}(\mathbf p )\), the intersection O of lines \(BIC_H\) and \(BIC_L\) must lie within the union of the grey and the red regions, that is:

$$\begin{aligned}&\displaystyle \pi _{HH}^O\equiv -\frac{\Delta \theta (p_{LH}+p_{LL})p_{LH}V\left( q_{HH}^{FB}\right) }{\rho }\geqslant \pi _{HH}^A, \end{aligned}$$
(22)
$$\begin{aligned}&\displaystyle \pi _{LL}^O \equiv \frac{\Delta \theta (p_{LH}+p_{HH})p_{LH}V(q_{LL}^{FB})}{\rho }\geqslant \pi _{LL}^C, \end{aligned}$$
(23)
$$\begin{aligned}&\displaystyle CIC_{HH,LH}(\pi _{LL}^O,\pi _{HH}^O)\equiv p_{LL}\pi ^O_{LL}+(1-p_{LL})\pi ^O_{HH}\nonumber \\&\displaystyle - p_{LH}f(q_{LH}^{FB}+q_{HL}^{FB},0) \geqslant 0, \end{aligned}$$
(24)
$$\begin{aligned}&\displaystyle CIC_{LL,LH}(\pi _{LL}^O,\pi _{HH}^O)\equiv \left( 1-p_{HH}\right) \pi ^O_{LL}+p_{HH}\pi ^O_{HH}\nonumber \\&\displaystyle +p_{LH}g\left( q_{HL}^{FB}+q_{LH}^{FB},0\right) \geqslant 0. \end{aligned}$$
(25)

To characterize the first-best implementation, we start with the following lemmas.

Lemma 1

If \(2\Delta \theta V(q_{LL}^{FB})\leqslant g(q_{LH}^{FB}+q_{HL}^{FB},0)\), then the first-best outcome is achievable for distributions \((p_{LL},p_{HH})\in \mathcal {F}\equiv \{ (x,y)\in [0,1]^2|\rho (x,y)\leqslant \rho ^*(x,y)\}\); if \(2\Delta \theta V(q_{LL}^{FB})> \max \{g(q_{LH}^{FB}+q_{HL}^{FB},0), f(2q_{HH}^{FB},0)\}\), we have \(\mathcal {F}=\varnothing \), then the first-best outcome is unachievable for any feasible distribution, where

$$\begin{aligned} \rho (x,y)\equiv & {} xy-\left( \frac{1-x-y}{2}\right) ^2,\\ \rho ^*(x,y)\equiv & {} \frac{-\Delta \theta (1-x+y)(1-x-y)V(q_{LL}^{FB})}{2\left[ (1-x) g(q_{LH}^{FB}+q_{HL}^{FB},0) +yf(2q_{HH}^{FB},0)\right] }. \end{aligned}$$

Proof

See “Appendix”. \(\square \)

The following lemma shows that the ranking between \(g(q_{LH}^{FB}+q_{HL}^{FB},0)\) and \(f(2q_{HH}^{FB},0)\) depends on the agents’ risk attitude.

Lemma 2

\(g(q_{LH}^{FB}+q_{HL}^{FB},0)<(resp. =,>)f(2q_{HH}^{FB},0)\) if the absolute risk aversion \(r_a(x)\equiv -V''(x)/V'(x)\) is increasing (resp. constant, decreasing) in x.

Proof

See “Appendix”. \(\square \)

The proof in “Appendix” shows that \(g(q_{LH}^{FB}+q_{HL}^{FB},0)/f(2q_{HH}^{FB},0)=V(z^*(\xi ,\theta _L))/V(z^*(\xi ,\theta _H))\) for some \(\xi \in (\theta _L,\theta _H)\), where \(z^*(\theta _1,\theta _2)\equiv \arg \max _{z\in [0,q_{HH}^{FB}+q^*(\theta _2)]}\theta _1V(z)+\theta _2V(q_{HH}^{FB}+q^*(\theta _2)-z)\) and \(q^*(\theta )\equiv \arg \max _{q} [\theta V(q)-cq]\). So, the comparison between \(g(q_{LH}^{FB}+q_{HL}^{FB},0)\) and \(f(2q_{HH}^{FB},0)\) depends on the monotonicity of function \(z^*(\xi ,\theta _2)\) with respect to \(\theta _2\). For fixed \(\xi \), an increase of agent 2’s valuation has two opposite effects on agent 1’s allocation \(z^*\): he will capture a smaller share of the total quantities when facing a more efficient opponent (rivalry effect); but at the same time, the total size of cake to be divided between them, i.e., \(q_{HH}^{FB}+q^*(\theta _2)\), will increase (expansion effect). The net outcome hinges on the trade-off between these two counteracting effects.

With increasing absolute risk aversion, agents is inclined to take less risk as they become wealthier. This requires a more egalitarian resource distribution among them to reduce inequality and risk. The expansion effect outweighs the rivalry effect as the opponent’s valuation increases. So, \(\partial z^*(\xi ,\theta _2)/\partial \theta _2>0\) and thus \(g(q_{LH}^{FB}+q_{HL}^{FB},0)<f(2q_{HH}^{FB},0)\). The arguments for constant and decreasing absolute risk aversions are analogous.

The above Lemma 1 provides a sufficient condition for \(\mathcal {F}\ne \varnothing \), and also a necessary condition for \(\mathcal {F}\ne \varnothing \). Lemma 2 gives a condition under which these two conditions coincide. As an immediate corollary of Lemmas 1 and 2, we obtain the following result.

Proposition 3

If the agent’s preference exhibits nonincreasing absolute risk aversion, the first-best allocation is implementable for probability distributions with strongly negative correlation, i.e., \((p_{LL},p_{HH})\in \mathcal {F}\) if and only if \(g(q_{LH}^{FB}+q_{HL}^{FB},0)\geqslant 2\Delta \theta V(q_{LL}^{FB})\).Footnote 14

Fig. 2
figure 2

Regions of probability distributions for nonincreasing absolute risk aversion

The result of this proposition could be depicted by Fig. 2 in \((p_{LL},p_{HH})\) space. Letting X and Y denote, respectively, the intercepts of curve \(\rho (p_{LL},p_{HH})=\rho ^*(p_{LL},p_{HH})\) with the horizontal and vertical axes, we have

$$\begin{aligned} X= & {} \frac{g(q_{LH}^{FB}+q_{HL}^{FB},0)-2 \Delta \theta V(q_{LL}^{FB})}{g(q_{LH}^{FB}+q_{HL}^{FB},0)},\\ Y= & {} \frac{2\left[ g(q_{LH}^{FB}+q_{HL}^{FB},0)-2 \Delta \theta V(q_{LL}^{FB})\right] }{\sqrt{ \begin{array}{l} \left[ g(q_{LH}^{FB}+q_{HL}^{FB},0)+2 \Delta \theta V(q_{LL}^{FB})-f(2q_{HH}^{FB},0)\right] ^2\\ +4 f(2q_{HH}^{FB},0)\left[ g(q_{LH}^{FB}+q_{HL}^{FB},0)-2\Delta \theta V(q_{LL}^{FB})\right] \end{array} }+ \left[ \begin{array}{c} g(q_{LH}^{FB}+q_{HL}^{FB},0)+2 \Delta \theta V(q_{LL}^{FB})\\ -f(2q_{HH}^{FB},0) \end{array}\right] }. \end{aligned}$$

Since \(g(q_{LH}^{FB}+q_{HL}^{FB},0)-f(2q_{HH}^{FB},0)\geqslant 0\) whenever \(r_a(x)\) is nonincreasing, we can find easily that if \(g(q_{LH}^{FB}+g_{HL}^{FB},0)\geqslant 2\Delta \theta V(q_{LL}^{FB})\), both X and Y are nonnegative and region \(\mathcal {F}\) (the red region in Fig. 2) is nonempty, so the first-best allocation is achievable for distributions \((p_{LL},p_{HH})\in \mathcal {F}\). If \(g(q_{LH}^{FB}+g_{HL}^{FB},0)<2\Delta \theta V(q_{LL}^{FB})\), both X and Y are negative, so region \(\mathcal {F}\) vanishes, the first-best allocation is thus unachievable for any feasible distribution \((p_{LL},p_{HH})\).

For utility with constant absolute risk aversion \(V(x)=1-e^{-rx}\), expression \(g(q_{LH}^{FB}+q_{HL}^{FB},0)\geqslant 2\Delta \theta V(q_{LL}^{FB})\) is equivalent to

$$\begin{aligned} \left( \frac{\theta _H}{\theta _L}-1\right) \left( \frac{2c}{\theta _Lr}-1\right) +\frac{2c}{\theta _Lr}\left( \sqrt{\frac{\theta _L}{\theta _H}}-1\right) \geqslant 0. \end{aligned}$$

For utility with decreasing absolute risk aversion \(V(x)=\frac{x^{1-\alpha }}{1-\alpha }, g(q_{LH}^{FB}+q_{HL}^{FB},0)\geqslant 2\Delta \theta V(q_{LL}^{FB})\) is equivalent to

$$\begin{aligned} \left\{ \left[ 1+\left( \frac{\theta _L}{\theta _H}\right) ^{\frac{1}{\alpha }}\right] ^{\alpha }-2^{\alpha }\left( \frac{\theta _L}{\theta _H}\right) \right\} \left[ 1+\left( \frac{\theta _L}{\theta _H}\right) ^{\frac{1}{\alpha }}\right] ^{1-\alpha } \geqslant 2\left( 1-\frac{\theta _L}{\theta _H}\right) \left( \frac{\theta _L}{\theta _H}\right) ^{\frac{1-\alpha }{\alpha }}. \end{aligned}$$

The region of parameters for the first-best implementation in these two cases can be depicted by the following Fig. 3.

Fig. 3
figure 3

The parameter regions of \(g(q_{LH}^{FB}+q_{HL}^{FB},0)\geqslant 2\Delta \theta V(q_{LL}^{FB})\) for nonincreasing \(r_a(x)\). a \(V(x)=1-e^{-rx}\), b \(V(x)=\frac{x^{1-\alpha }}{1-\alpha }\)

Expression \(\rho (p_{LL},p_{HH})=\rho ^*(p_{LL},p_{HH})\) is equivalent to

$$\begin{aligned} p_{LL}p_{HH}-\left( \frac{1-p_{LL}-p_{HH}}{2}\right) ^{2}=-\frac{\frac{1}{2}\Delta \theta \left( 1-\frac{c}{r\theta _L}\right) (1-p_{LL}-p_{HH})}{\Delta \theta -\frac{2r}{c}\left( 1-\sqrt{\frac{\theta _L}{\theta _H}}\right) }. \end{aligned}$$

for \(V(x)=1-e^{-rx}\); and is equivalent to

$$\begin{aligned} \begin{aligned}&p_{LL}p_{HH}-\left( \frac{1-p_{LL}-p_{HH}}{2}\right) ^{2}\\&=\frac{-(1-\frac{\theta _L}{\theta _H})\left( \frac{\theta _L}{\theta _H}\right) ^{\frac{1-\alpha }{\alpha }}(1-p_{LL}-p_{HH})(1-p_{LL}+p_{HH})}{2\left\{ \begin{array}{c} (1-p_{LL})\left[ \left( 1+\left( \frac{\theta _L}{\theta _H}\right) ^{\frac{1}{\alpha }}\right) ^{\alpha }-2^{\alpha }\left( \frac{\theta _L}{\theta _H}\right) \right] \left[ 1+\left( \frac{\theta _L}{\theta _H}\right) ^{\frac{1}{\alpha }}\right] ^{1-\alpha }\\ +p_{HH}\left[ 2^{\alpha }-\left[ 1+\left( \frac{\theta _L}{\theta _H}\right) ^{\frac{1}{\alpha }}\right] ^{\alpha }\right] 2^{1-\alpha } \end{array}\right\} } \end{aligned} \end{aligned}$$

for \(V(x)=x^{1-\alpha }/(1-\alpha )\). Figure 4a (resp. Fig. 4b) depicts the contours of \(\rho =\rho ^*\) for different values of c / r (resp. \(\alpha \)) in \((p_{LL}, p_{HH})\) space with particular values \(\theta _H=6,\theta _L=2\). It is easy to see that the larger is c / r (resp. the smaller is \(\alpha \)), the larger is region \(\mathcal {F}\), and thus the more likely will the first-best allocation be obtained.

Fig. 4
figure 4

Contours of \(\rho (p_{LL},p_{HH})=\rho ^*(p_{LL},p_{HH})\) with \(\theta _H=6,\theta _L=2\). a \(V(x)=1-e^{-rx}\), b \(V(x)=\frac{x^{1-\alpha }}{1-\alpha }\)

The economic intuition behind Proposition 3 could be explained as follows. With correlated types, an agent’s report contains additional information about the other agent’s valuation. The mechanism designer could exploit this statistical interdependence to cross-check agents’ reports, thereby inducing each agent to reveal his type truthfully without leaving any informational rent to him. Naturally, such a mechanism is not ex-post budget-balanced. The uninformed mechanism designer plays the important role of a budget-breaker. She collects transfers from the agents in some states of the world, and may also have to pay them in some other states. Figure 5a, b illustrate the penalties and rewards in setups with respective negative and positive correlations. The horizontal axis displays the first, and the vertical axis the second component of a vector. When \(\rho <(resp.>)0, (p_{LH},p_{HH})\) is flatter (resp. steeper) than \((p_{LL},p_{LH})\). Vectors \((\pi _{LL},\pi _{LH})(resp.(\pi _{HL},\pi _{HH}))\) is perpendicular to \((p_{LL},p_{LH})(resp.(p_{LH},p_{HH}))\) to guarantee that a L-type (resp. H-type) agent will only get a zero expected rent. With negative (resp. positive) correlation, in order to elicit truth-telling, the principal needs to impose a penalty (resp. reward) on the agents if they both announce low types (i.e., \(\pi _{LL}< (resp.>) 0\)). Geometrically, \((\pi _{LL},\pi _{HH})\) lies to the northwest of point A in Fig. 5a, whereas it lies to the southeast of point A in Fig. 5b.

Fig. 5
figure 5

Full surplus extraction for correlated types. a Negative correlation, b positive correlation

The determination of \(\pi _{LL}\) is the outcome of two opposing forces. First, the principal is inclined to impose a penalty on the agents when they both report \(\theta _L\) to prevent their collective downward manipulations since \(\pi _{LL}\) is on the right-hand sides of \(CIC_{LH,LL}\) and \(CIC_{HH,LL}\). Second, the principal may also have incentive to impose a reward in the same state to prevent collective upward manipulations since \(\pi _{LL}\) is also on the left-hand sides of \(CIC_{LL,LH}\) and \(CIC_{LL,HH}\). As in the standard nonlinear pricing model, in order to receive information rent from the principal/seller, agents may inherently be more willing to underreport than to overreport their valuations. So, the principal is more pressured by the task of preventing downward misreport than that of preventing upward misreport. As a result, the principal will impose a punishment rather than a reward on agents when they both report low-types (\(\pi _{LL}\leqslant \pi _{LL}^A<0\)). Nevertheless, this punishment is up to the extent that the upward coalitional constraints \(CIC_{LL,LH}\) and \(CIC_{LH,HH}\) are binding, i.e., \(\pi _{LL}\geqslant \pi _{LL}^{C}\). Analogously, a moderate reward when both agents report \(\theta _H\) (i.e., \(\pi _{HH}\in [\pi _{HH}^{A}, \pi _{HH}^{C}]\subset [0,+\infty )\)) is required to deter them from collective manipulations.

We now come to the individual incentive constraints. With a positive correlation, the high-type agent’s individual incentive constraint \(BIC_H\) requires the principal to reward both agents when they report consistent messages \((\theta _L,\theta _L)\) (see Fig. 5b). As stated above, the coalitional constraints, however, requires a punishment in the same state, i.e., \(\pi _{LL}<\pi _{LL}^A<0\). This conflict between individual and coalitional constraints therefore prevents the principal from achieving the first-best allocation. Will the first-best allocation always be achievable for cases with negative correlation? The answer is no. As the negative correlation becomes weaker, the informativeness of one agent’s report on the other’s type becomes smaller. The ex post penalty and award necessary to implement the first-best allocation are both extremely large. In Fig. 5a, as the angle between \((p_{LL},p_{LH})\) and \((p_{HL},p_{HH})\) becomes smaller and smaller, point A goes to infinity in the north-west direction. But, conditions \(CIC_{LL,LH}\) and \(CIC_{LH,HH}\) together will impose a limited liability restriction on the agents which requires a finite upper bound of the level of penalty, i.e., \(\pi _{LL}\geqslant \pi _{LL}^C\). The conflict between individual and coalitional incentive constraints thus prevents the first-best outcome from being achieved for weakly negative correlation. Geometrically, since the area ABCD lies within the north-west quadrant, so \(\widehat{\mathcal {M}}(\mathbf p )=\varnothing \) for eigher \(\rho \geqslant 0\) or \(\rho <0\) but close enough to zero (see Fig. 6).

Fig. 6
figure 6

Cases in which the first-best allocation is not achievable. a \(\rho <0\) and close enough to zero, b \(\rho >0\)

If \(g(q_{LH}^{FB}+q_{HL}^{FB}, 0)<2\Delta \theta V(q_{LL}^{FB})\), then even under perfectly negative correlation (i.e., \(p_{LL}=p_{HH}=0, \rho =-1/4\)), the minimum penalty imposed on the agents for their “consistent” announcements will exceed their maximum liability imposed by the upward adjacent coalitional incentive compatibility constraints \(CIC_{LH,HH}\) and \(CIC_{LL,LH}\) , i.e., \(-\Delta \theta V(q_{LL}^{FB})<\pi _{LL}^C=-g(q_{LH}^{FB}+q_{HL}^{FB},0)/2\). The first-best allocation is thus unattainable. Notice that, the question about the necessary and sufficient condition for the first-best implementation is still open because a grey interval \((g(q_{LH}^{FB}+q_{HL}^{FB},0), \max \{g(q_{LH}^{FB}+q_{HL}^{FB},0), f(2q_{HH}^{FB},0)\} ]\) of \(2\Delta \theta V(q_{LL}^{FB})\) exists for the case with increasing absolute risk aversion. Within this interval, the nonemptiness of \(\mathcal {F}\) is inconclusive. Figure 7 provides two examples, both with \(g(q_{LH}^{FB}+q_{HL}^{FB},0)<2\Delta \theta V(q_{LL}^{FB})<f(2q_{HH}^{FB},0)\), in Fig. 7a \(\mathcal {F}\ne \varnothing \), in Fig. 7b \(\mathcal {F}=\varnothing \).Footnote 15

Fig. 7
figure 7

\(V(x)=\int _{0}^{x}e^{-5t^2}dt, \theta _H=40,c=1\). a \(\mathcal {F}\ne \varnothing ,\theta _L=39, g(q_{LH}^{FB}+q_{HL}^{FB},0)=0.39<2\Delta \theta V(q_{LL}^{FB})=0.79<f(2q_{HH}^{FB},0)=15.75\), b \(\mathcal {F}=\varnothing ,\theta _L=20, g(q_{LH}^{FB}+q_{HL}^{FB},0)=7.86<2\Delta \theta V(q_{LL}^{FB})=15.63<f(2q_{HH}^{FB},0)=15.71\)

In a related paper, Pouyet (2002) gets a similar conclusion that the first-best outcome is achievable under strongly negative correlation. However, his model does not consider the possibility of arbitrage, so it does not fit into our problem. To facilitate the comparison, we now apply Pouyet’s method to a nonlinear pricing model.Footnote 16 Absent arbitrage, for the first-best allocation to be implementable, the principal will choose a parameter \(\epsilon \in [0,1)\) and a vector of rents \((\pi _{LL},\pi _{LH},\pi _{HL},\pi _{HH})\) to satisfy the following conditions:Footnote 17

$$\begin{aligned}&CIC_{LL,LH}{: } \, 2\pi _{LL}\geqslant \pi _{LH}+\pi _{HL}-\Delta \theta V(q_{HL}^{FB})-\Delta \theta h(\epsilon ) \left[ V(q_{HL}^{FB})-V(q_{LL}^{FB})\right] \\&CIC_{LL,HH}{:} \ \pi _{LL}\geqslant \pi _{HH}-\Delta \theta V\left( q_{HH}^{FB}\right) -h(\epsilon )\Delta \theta [V\left( q_{HH}^{FB}\right) -V(q_{LL}^{FB})]\\&CIC_{LH,LL}{:} \ \pi _{LH}+\pi _{HL}\geqslant 2\pi _{LL} -\Delta \theta V(q_{LL}^{FB})\\&CIC_{LH,HH}: \ \pi _{LH}+\pi _{HL}\geqslant 2\pi _{HH}-\Delta \theta V\left( q_{HH}^{FB}\right) \\&\qquad \quad -\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}}\left[ V\left( q_{HH}^{FB}\right) -V(q_{LH}^{FB})\right] \\&CIC_{HH,LH}{:} \ 2\pi _{HH}\geqslant \pi _{HL}+\pi _{LH}+\Delta \theta V(q_{LH}^{FB})\\&CIC_{HH,LL}{: } \ \pi _{HH}\geqslant \pi _{LL}+\Delta \theta V(q_{LL}^{FB}) \end{aligned}$$

Pouyet (2002) shows that if the correlation is strongly negative, i.e., \(\rho +p_{LL}p_{LH}<0\), then there exists a \(\epsilon ^*\in (0,1)\) such that \(\rho \epsilon ^*+p_{LL}p_{LH}=0\). The principal will choose \(\epsilon \) close enough to but strictly less than \(\epsilon ^*\) to make \(h(\epsilon )\) infinitely large. With this choice, \(CIC_{LL,LH}\) and \(CIC_{LL,HH}\) can be arbitrarily satisfied. Then, the principal recovers some degrees of freedom. and uses them to make both participation constraints binding and to ensure that all the other constraints are satisfied. In our setup, however, for the first-best allocation to meet the NAC condition, the principal needs to set \(\epsilon =0\). She is thus deprived of any flexibility of choosing \(\epsilon \). In this sense, though literally similar, our result is different from and is more striking than his.

In the following section, we will discuss the cases with weak correlations, where collusion is still detrimental to the principal.

5 The cases with weak correlations

When the first-best outcome is not implementable, the standard techniques of implementation theory suggest us to focus on the cases in which \(BIC_H\) and \(BIR_L\) are binding. The difficulty, as usual, is to determine the binding coalitional constraints. To simplify the system of constraints, it is useful to give the following implementability conditions.

Lemma 3

For weak correlation (\(\rho \) is close enough to but is not zero), the schedule of weakly collusion-proof implementable consumptions satisfies the following monotonicity conditions:

$$\begin{aligned} \mathbf [M] : q_{LL}\leqslant \frac{q_{LH}+q_{HL}}{2}\leqslant q_{HH}; \end{aligned}$$
(26)

conversely, if these inequalities hold, the local coalitional incentive constraints \({ CIC}_{LL,LH}\) (7) and \({ CIC}_{LH,HH}\) (10) [or \({ CIC}_{LH,LL}\) (9) and \({ CIC}_{HH,LH}\) (11)] are binding, then all the remaining coalitional incentive constraints are indeed satisfied.

Proof

See “Appendix”. \(\square \)

Given this result, we could focus in the sequel only on the \(\theta _{L}\) agent’s individual rationality constraint (1); the \(\theta _H\) agent’s Bayesian incentive constraint (4); the adjacent coalitional incentive constraints (9), (11) or (7), (10); no-arbitrage constraint (13) and the implementability condition (26). Then we can simplify the principal’s problem as the following program \([\mathbf P ^{CP}_{-}]\) or \([\mathbf P ^{CP}_+]\).

$$\begin{aligned}&{[}{} \mathbf P ^{CP}_{-}]:\left\{ \begin{array}{c} \underset{\{\varvec{\pi },\mathbf q , \epsilon \in [0,1)\}}{\max }{\varvec{\Pi }}(\varvec{\pi },\mathbf q ) \\ \text{ subject } \text{ to: } \\ BIR_L, BIC_H, CIC_{LL,LH}, CIC_{LH,HH}, \mathbf NAC , \mathbf M \\ \left[ (1), (4), (7), (10), (13), (26)\right] , \end{array} \right. \\&{[}{} \mathbf P ^{CP}_{+}]:\left\{ \begin{array}{c} \underset{\{\varvec{\pi },\mathbf q ,\epsilon \in [0,1)\}}{\max }{\varvec{\Pi }}(\varvec{\pi },\mathbf q ) \\ \text{ subject } \text{ to: }\\ BIR_L, BIC_H, CIC_{HH,LH}, CIC_{LH,LL}, \mathbf NAC , \mathbf M \\ \left[ (1), (4), (9), (11), (13), (26)\right] . \end{array}\right. \end{aligned}$$

Next, we present a geometric argument to show that \([\mathbf P _+^{CP}]\) and \([\mathbf P _-^{CP}]\) correspond to, respectively, the cases with weakly positive and negative correlations. Getting \(\pi _{LH}=-\pi _{LL} p_{LL}/p_{LH}\) and \(\pi _{HL}= [\Delta \theta p_{HH} V\left( q_{LH}\right) +\Delta \theta p_{LH} V\left( q_{LL}\right) -\pi _{HH} p_{HH}]/p_{LH}-\rho \pi _{LL}/p_{LH}^2\) from \(BIC_H\) and \(BIR_L\) written with equalities then inserting them into the remaining constraints yields:

$$\begin{aligned}&BIR'_H(\pi _{LL},\pi _{HH})\equiv \Delta \theta p_{HH} V(q_{LH})+\Delta \theta p_{LH} V(q_{LL})-\frac{\pi _{LL} \rho }{p_{LH}}\geqslant 0 \end{aligned}$$
(27)
$$\begin{aligned}&BIC'_L(\pi _{LL},\pi _{HH})\equiv p_{LH} \Delta \theta \left[ p_{LH}^2 V(q_{HH})-p_{HH}p_{LL} V(q_{LH})\right] \nonumber \\&\qquad \qquad \qquad +\Delta \theta p_{LH}^2 p_{LL} \left[ V(q_{HL})- V(q_{LL})\right] +\rho p_{LH}\pi _{HH} +\rho p_{LL}\pi _{LL}\geqslant 0 \end{aligned}$$
(28)
$$\begin{aligned}&CIC'_{LL,LH}(\pi _{LL},\pi _{HH})\equiv p_{LH}p_{HH}\pi _{HH}+[\rho +p_{LH}(1-p_{HH})]\pi _{LL}\nonumber \\&\qquad \qquad \qquad + p_{LH}^2g\left( q_{HL}+q_{LH},\epsilon \right) \nonumber \\&\qquad \qquad \qquad -\Delta \theta (1-\epsilon )p_{HH}p_{LH}V(q_{LH})-\Delta \theta p_{LH}^2[1+2h(\epsilon )]V(q_{LL})\geqslant 0 \end{aligned}$$
(29)
$$\begin{aligned}&CIC'_{LL,HH}(\pi _{LL},\pi _{HH})\equiv \pi _{LL}-\pi _{HH}+\Delta \theta V(q_{HH}) \left[ h(\epsilon )+1\right] \nonumber \\&\qquad \qquad \qquad -\Delta \theta V(q_{LL})h(\epsilon )\geqslant 0 \end{aligned}$$
(30)
$$\begin{aligned}&CIC'_{LH,LL}(\pi _{LL},\pi _{HH})\equiv p_{LH}p_{HH}\pi _{HH}+[\rho +p_{LH}(1-p_{HH})]\pi _{LL}\nonumber \\&\qquad \qquad \qquad +g\left( 2 q_{LL},\epsilon \right) p_{LH}^2\nonumber \\&\qquad \qquad \qquad - \Delta \theta (1-\epsilon ) p_{HH}p_{LH} V(q_{LH})-\Delta \theta p_{LH}^2[1+2h(\epsilon )]V(q_{LL})\leqslant 0 \end{aligned}$$
(31)
$$\begin{aligned}&CIC'_{LH,HH}(\pi _{LL},\pi _{HH})\ equiv p_{LH}(1-p_{LL})\pi _{HH}+(\rho +p_{LH}p_{LL}) \pi _{LL}\nonumber \\&\qquad \qquad \qquad -p_{LH}^2f(2q_{HH},\epsilon )-\Delta \theta (1-\epsilon )p_{HH}p_{LH}V(q_{LH})-\Delta \theta p_{LH}^2V(q_{LL})\leqslant 0\nonumber \\ \end{aligned}$$
(32)
$$\begin{aligned}&CIC'_{HH,LL}(\pi _{LL},\pi _{HH})\equiv \pi _{HH}-\pi _{LL}-\Delta \theta V(q_{LL})\geqslant 0 \end{aligned}$$
(33)
$$\begin{aligned}&CIC'_{HH,LH}(\pi _{LL},\pi _{HH})\equiv p_{LH}\left( 1-p_{LL}\right) \pi _{HH}+(\rho +p_{LH}p_{LL})\pi _{LL}\nonumber \\&\qquad \qquad \qquad -p_{LH}^2f\left( q_{HL}+q_{LH},\epsilon \right) \nonumber \\&\qquad \qquad \qquad -p_{HH}p_{LH}(1-\epsilon )\Delta \theta V(q_{LH}) -p_{LH}^2\Delta \theta V(q_{LL})\geqslant 0 \end{aligned}$$
(34)

The feasible set \(\widehat{\mathcal {M}}(\mathbf p )\equiv \{(\pi _{LL},\pi _{HH}) \in \mathbb {R}^2|\textit{subject to }(27) \textit{ to } (34) \}\) can be depicted by the shaded area \(A'B'C'D'\) in Fig. 8. When \(\rho \) is negative and close sufficiently to zero, the feasible region lies to the right of line \(BIR_H\) and is under line \(BIC_L\).Footnote 18 To minimize expected information rent conceded to the high-type agent, the principal needs to choose the leftest point \(C'\), where adjacent upward coalitional constraints \(CIC_{LL,LH}\) and \(CIC_{LH,HH}\) are binding. When \(\rho \) is weakly positive, however, the feasible region \(A'B'C'D'\) lies to the left of line \(BIR_H\). For the purpose of reducing information rent, the principal will obviously choose the rightest point \(A'\) at the optimum, implying binding adjacent downward coalitional constraints \(CIC_{HH,LH}\) and \(CIC_{LH,LL}\).

Fig. 8
figure 8

The case with weak correlations. a \(\rho <0\), b \(\rho >0\)

Proposition 4

Assuming that the correlation \(\rho \) is negative and close enough to zero, \(\theta _L-p_{HH}\Delta \theta /p_{LH}>0\) Footnote 19, then \(\epsilon ^*=1\) is the principal’s optimal choice. The optimal weakly collusion-proof mechanism entails:

  • a monotonic schedule of consumptions represented as functions of \(\mathbf p \): \(q_{LL}^{CP}(\mathbf p )<[q_{LH}^{CP}(\mathbf p )+q_{HL}^{CP}(\mathbf p )]/2<q_{HH}^{CP}(\mathbf p )\) given by:

    $$\begin{aligned}&\left( \frac{\theta _{H}p_{LH}}{\rho +p_{LH}}\right) V'(q_{HH})+ \frac{\rho \theta _{H}V'\left( \varphi _2(2q_{HH})\right) }{\rho +p_{LH}}=c, \end{aligned}$$
    (35)
    $$\begin{aligned}&\theta _HV'(q_{HL}) -\frac{\rho (1-p_{LL})\left[ \begin{array}{c} \left( \theta _L-\frac{p_{HH}\Delta \theta }{p_{LH}}\right) V'(q_{LH})\\ -\left( \theta _{L} -\frac{p_{LH}^2\Delta \theta }{p_{LL}p_{LH}+\rho }\right) V'\left( \frac{q_{LH}+q_{HL}}{2}\right) \end{array} \right] }{2p_{LH}(\rho +p_{LH})}=c \end{aligned}$$
    (36)
    $$\begin{aligned}&\left( \theta _L-\frac{p_{HH}\Delta \theta }{p_{LH}}\right) V'(q_{LH})\nonumber \\&\quad -\frac{\rho (1-p_{LL})\left[ \begin{array}{c} \left( \theta _L-\frac{p_{HH}\Delta \theta }{p_{LH}}\right) V'(q_{LH})\\ -\left( \theta _{L} -\frac{p_{LH}^2\Delta \theta }{p_{LL}p_{LH}+\rho }\right) V'\left( \frac{q_{LH}+q_{HL}}{2}\right) \end{array} \right] }{2p_{LH}(\rho +p_{LH})}=c \end{aligned}$$
    (37)
    $$\begin{aligned}&\left( \theta _L-\frac{\Delta \theta p_{LH}^2}{\rho +p_{LL}p_{LH}}\right) V'(q_{LL})=c. \end{aligned}$$
    (38)
  • the consumptions exhibit a two-way distortion away from the first-best levels: \(q^{CP}_{HH}(\mathbf p )>q^{FB}_{HH}(\mathbf p ), q^{CP}_{HL}(\mathbf p )>q^{FB}_{HL}(\mathbf p ), q^{CP}_{LH}(\mathbf p )<q^{FB}_{LH}(\mathbf p ), q^{CP}_{LL}(\mathbf p )<q^{FB}_{LL}(\mathbf p )\).

  • a vector of rents \(\varvec{\pi }^{CP}\in \mathbb {R}^{4}\) such that \(BIR_L,BIC_H,CIC_{LL,LH},CIC_{LH,HH}\) are binding.

Proof

See “Appendix”. \(\square \)

Figure 8a provides a geometric interpretation of results in this proposition. The rents leave to the agent can be measured by the distance between point \(C'\) and line \(BIR_H\). So for the purpose of minimizing information rents, it is optimal for the principal to move \(C'\) leftward and shift \(BIR_H\) rightward. The coordinates of points \(A'\) and \(C'\) are given as follows:

$$\begin{aligned} \pi ^{A'}_{LL}= & {} -\frac{ p_{LH} \left[ \begin{array}{c} p_{HH} f\left( q_{HL}+q_{LH},\epsilon \right) -\left( 1-p_{LL}\right) f\left( 2 q_{LL},\epsilon \right) \\ -2 \Delta \theta p_{HH} (1-\epsilon ) V\left( q_{LH}\right) +\Delta \theta (p_{LH}+p_{HH}) V\left( q_{LL}\right) \end{array} \right] }{2 \left( p_{LH}+\rho \right) },\\ \pi ^{A'}_{HH}= & {} \frac{\left[ \begin{array}{c} \left[ \rho -\left( p_{HH}-1\right) p_{LH}\right] f\left( q_{HL}+q_{LH},\epsilon \right) -\left( p_{LH} p_{LL}+\rho \right) f\left( 2 q_{LL},\epsilon \right) \\ +2 \Delta \theta \left[ -p_{LL} \left( p_{HH}+p_{LH}\right) V\left( q_{LL}\right) +(1-\epsilon ) p_{HH} p_{LH} V\left( q_{LH}\right) \right] \end{array}\right] }{2 \left( p_{LH}+\rho \right) },\\ \pi ^{C'}_{LL}= & {} \frac{ p_{LH} \left[ \begin{array}{c} p_{HH} \left[ 2 \Delta \theta (1-\epsilon ) V\left( q_{LH}\right) -f\left( 2 q_{HH},\epsilon \right) \right] -\left( 1-p_{LL}\right) g\left( q_{HL}+q_{LH},\epsilon \right) \\ -2 h(\epsilon ) \left( p_{LL}-1\right) \Delta \theta V\left( q_{LL}\right) +2 \Delta \theta p_{LH} V\left( q_{LL}\right) \end{array}\right] }{2 \left( p_{LH}+\rho \right) },\\ \pi ^{C'}_{HH}= & {} \frac{\left[ \begin{array}{c} \left[ \left( 1-p_{HH}\right) p_{LH}+\rho \right] f\left( 2 q_{HH},\epsilon \right) +\left( p_{LH} p_{LL}+\rho \right) g\left( q_{HL}+q_{LH},\epsilon \right) \\ -2 h(\epsilon ) \Delta \theta V\left( q_{LL}\right) \left( p_{LH} p_{LL}+\rho \right) +2 \Delta \theta p_{LH} \left[ (1-\epsilon ) p_{HH} V\left( q_{LH}\right) +p_{LH} V\left( q_{LL}\right) \right] \end{array}\right] }{2 \left( p_{LH}+\rho \right) }. \end{aligned}$$

The sign of \(\partial \pi ^{C'}_{LL}/\partial q_{LL}\) and \(\partial \pi ^{C'}_{LL}/\partial q_{LH}\) are ambiguous, but for a weak correlation they are largely outweighed by \(\partial BIR_H/\partial q_{LL}=\Delta \theta p^2_{LH}V'(q_{LL})/\rho \) and \(\partial BIR_H/\partial q_{LH}=\Delta \theta p_{LH}p_{HH}V'(q_{LH})/\rho \), which are both negative. Also, \(\partial BIR_H/\partial q_{HL}=\partial BIR_H/\partial q_{HH}=0\), \(\partial \pi ^{C'}_{LL}/\partial q_{HL}<0\) and \(\partial \pi ^{C'}_{LL}/\partial q_{HH}<0\). So it requires downward distortions for \(q_{LL}\) and \(q_{LH}\) and upward distortions for \(q_{HL}\) and \(q_{HH}\).

To make things more transparent, we give a numerical example. Suppose that \(V(x)=x^{1-\alpha }/(1-\alpha ), \theta _H=4,\theta _L=2\). The regions where the optimal mechanisms are characterized by Proposition 4 (\(\mathcal {S}\)) (see “Appendix” for the detailed description of \(\mathcal {S}\)) and Proposition 3 (\(\mathcal {F}\)) are depicted in Fig. 9 for different values of \(\alpha \). \(\mathcal {F}\) vanishes for large \(\alpha \) (Fig. 9c, d).

Fig. 9
figure 9

\(V(x)=\frac{x^{1-\alpha }}{1-\alpha }, \theta _H=4, \theta _L=2\) a \(\alpha =0.3\), b \(\alpha =0.4\), c \(\alpha =0.6\), d \(\alpha =0.8\)

Things are quite different for weakly positive correlation. We analyze this situation in the following proposition.

Proposition 5

If the correlation \(\rho \) is positive and close sufficiently to zero, \(\theta _L-p_{HH}\Delta \theta /p_{LH}>0\), then the optimal weakly collusion-proof mechanism \(\mathbf M ^{CP}(\mathbf p )\) entails:

  • an \(\epsilon ^*\in (0,1)\) and a monotonic schedule of consumptions: \(q_{LL}^{CP}(\mathbf p )<[q_{LH}^{CP}(\mathbf p )+q_{HL}^{CP}(\mathbf p )]/2<q_{HH}^{CP}(\mathbf p )\) given by

    $$\begin{aligned}&\frac{\rho (1-p_{LL})[V(\varphi _1(2q_{LL}))-V(q_{LH})]}{2(\rho +p_{LH})}+\lambda (\epsilon ^*)V'(q_{LH})=0 \end{aligned}$$
    (39)
    $$\begin{aligned}&\left[ \frac{\theta _{L}p_{LH}-p_{HH}\Delta \theta }{\rho +p_{LH}} +\frac{\rho \theta _{H}}{\left( \rho +p_{LH}\right) p_{LL}}\right] V'(q_{LL})\nonumber \\&\quad -\frac{\rho (1-p_{LL})\theta _{H}V'\left( \varphi _2(2q_{LL})\right) }{p_{LL}(\rho +p_{LH})} =c, \end{aligned}$$
    (40)
    $$\begin{aligned}&\left[ \theta _L-\Delta \theta \frac{p_{HH}(\rho \epsilon ^*+p_{LH})}{(\rho +p_{LH})p_{LH}}\right] V^{\prime }(q_{LH})\nonumber \\&\quad -\left[ \begin{array}{c} \frac{\rho p_{HH}\theta _H\left[ V'\left( \frac{q_{LH}+q_{HL}}{2}\right) -V'(q_{HL})\right] }{2p_{LH}(\rho +p_{LH})} \\ +\lambda (\epsilon ^*)\left( \frac{\theta _L-\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}}}{p_{LH}}\right) V^{\prime \prime }(q_{LH}) \end{array} \right] =c, \end{aligned}$$
    (41)
    $$\begin{aligned}&\theta _HV^{\prime }(q_{HL})-\frac{\rho p_{HH}\theta _H\left[ V'\left( \frac{q_{LH}+q_{HL}}{2}\right) -V'(q_{HL})\right] }{2p_{LH}(\rho +p_{LH})} +\lambda (\epsilon ^*)\frac{\theta _H}{p_{LH}}V^{\prime \prime }(q_{HL})=c, \nonumber \\\end{aligned}$$
    (42)
    $$\begin{aligned}&\theta _HV'(q_{HH})=c; \end{aligned}$$
    (43)

    where nonnegative parameter

    $$\begin{aligned} \lambda (\epsilon ^*)=\frac{-\frac{\Delta \theta (1-\epsilon ^* ) p_{HH}}{p_{LH}+\rho }\left[ cp_{LH} +\frac{\rho p_{HH}\theta _H\left( V'\left( \frac{q_{HL}+q_{LH}}{2} \right) -V'\left( q_{HL}\right) \right) }{2 \left( p_{LH}+\rho \right) }\right] }{\left( \theta _L-\frac{\Delta \theta \epsilon ^* p_{HH}}{p_{LH}}\right) ^2V''\left( q_{LH}\right) +\theta _H\left[ \theta _L-\frac{\Delta \theta p_{HH} \left( p_{LH}+\rho \epsilon ^* \right) }{p_{LH} \left( p_{LH}+\rho \right) }\right] V''\left( q_{HL}\right) } \end{aligned}$$

    is the Lagrangian multiplier of NAC written with \(\epsilon =\epsilon ^*\);

  • the consumptions except \(q_{HH}^{CP}\) are distorted away from their respective first-best levels: \(q^{CP}_{HH}(\mathbf p )=q^{FB}_{HH}(\mathbf p ), q^{CP}_{HL}(\mathbf p )<q^{FB}_{HL}(\mathbf p ), q^{CP}_{LH}(\mathbf p )<q^{FB}_{LH}(\mathbf p ), q^{CP}_{LL}(\mathbf p )<q^{FB}_{LL}(\mathbf p )\);

  • a vector of rents \(\varvec{\pi }^{CP}\in \mathbb {R}^{4}\) such that \(BIC_H, BIR_L,CIC_{HH,LH},CIC_{LH,LL}\) are binding.

Proof

See “Appendix”. \(\square \)

At this point, it is worth pausing to discuss how positive correlation differs from its negative counterpart in its influence on the principal’s choice of transaction cost. Notice that two effects jointly determine the optimal \(\epsilon ^*\). On the one hand, the traditional efficiency versus rent extraction tradeoff calls for a larger downward distortion of \(q_{LH}\) than that of \(q_{HL}\) relative to their respective first-best levels.Footnote 20 So, in order to meet NAC, the principal needs to set a larger \(\epsilon ^*\) to discriminate H-type from L-type. On the other hand, \(\epsilon \) also enters directly into the expected information rent \(\mathbb {E}\varvec{\pi }\) through the binding coalitional constraints. Expressions (94) and (95) in “Appendix” show that the coalitional constraints are tightened as \(\epsilon \) decreases (resp. increases) for negative (resp. positive) correlation, since

$$\begin{aligned} \frac{\partial \mathbb {E} \varvec{\pi }}{\partial \epsilon }=\frac{-\rho }{2(\rho +p_{LH})}\left\{ \begin{array}{c} 2(1-p_{LL})h'(\epsilon )\Delta \theta \left[ V(q_{LL})-V\left( \frac{q_{HL}+q_{LH}}{2}\right) \right] \\ +\frac{p_{HH}^2\Delta \theta \left[ V(q_{LH})-V(\varphi _1(2q_{HH}))\right] }{p_{LH}} \end{array} \right\} <0 \end{aligned}$$

for \(\rho <0\) (resp. \(\partial \mathbb {E}\varvec{\pi }/\partial \epsilon =[\rho (1-p_{LL})p_{HH}\Delta \theta ]\left[ V(q_{LH})-V(\varphi _1(2q_{LL}))\right] /[2p_{LH}(\rho +p_{LH})] >0\) for \(\rho >0\)). For negative correlation, these two effects are aligned, so the principal chooses \(\epsilon ^*=1\) at the optimum.Footnote 21 For positive correlation, however, the determination of \(\epsilon ^*\) hinges on the comparison between two opposite effects, the trade-off is optimally resolved by setting \(\epsilon \) strictly below 1. The smaller is the correlation \(\rho \), the weaker is the second effect, and hence the larger is \(\epsilon ^*\). In the degenerate case of no correlation, the second effect disappears, we would have \(\epsilon ^*=1\).Footnote 22

Figure 8b give a geometric explanation to the above proposition. The principal needs to move point \(A'\) rightward and shift \(BIR_H\) leftward to minimize information rents. This requires a downward distortion for \(q_{LL}\) \(q_{LH}\) and \(q_{HL}\), but no distortion for \(q_{HH}\) since it affects neither \(\pi _{LL}^{A'}\) nor \(BIR_H\).

For positive correlation, both individual and coalitional incentive constraints are binding for downward manipulation, the efficiency versus rent extraction trade-off calls for a downward distortions of \(q_{LL}, q_{LH}\) and \(q_{HL}\), but no distortion for \(q_{HH}\), this is the standard “no distortion at the top” result. For negative correlation, however, the individual incentive constraint is binding for a downward manipulation while the coalitional incentive constraints are binding for upward manipulations. Hence, an issue similar to countervailing incentives arises and this calls for two-way distortions for quantities: \(q_{HL}\) and \(q_{HH}\) are distorted upward, whereas \(q_{LH}\) and \(q_{LL}\) are distorted downward compared to their respective first-best levels.Footnote 23

As correlation vanishes, it is easy to find from (35) to (43) that

$$\begin{aligned} \lim _{\rho \uparrow 0}q_{kl}^{CP}(\mathbf p )=\lim _{\rho \downarrow 0}q_{kl}^{CP}(\mathbf p )=q_{kl}^{CP}(\rho =0)=q_{kl}^{SB}(\rho =0),k,l\in \{H,L\}, \end{aligned}$$

where \(q_{kl}^{SB}(\rho =0)\) are given as follows

$$\begin{aligned} \left( \theta _L-\frac{p_{HH}\Delta \theta }{p_{LH}}\right) V'(q_{LL})= & {} \left( \theta _L-\frac{p_{HH}\Delta \theta }{p_{LH}}\right) V'(q_{LH})\\= & {} \theta _H V'(q_{HL})= \theta _H V'(q_{HH})=c. \end{aligned}$$

Therefore, JM’s result that the principal can achieve her payoff without collusion in a collusion-proof way for independent types could be regarded as a limit case of ours.Footnote 24

6 The case of almost perfectly positive correlation

With an almost perfectly positive correlation (\(p_{LH}\) is very close to zero, \(p_{LL}\) and \(p_{HH}\) are both very close to 1/2), agents have very likely the same type, and \(\rho \) is close to its supremum 1/4. Constraints \(CIC_{LH,HH}\) (10) and \(CIC_{HH,LH}\) (11) implies \(f(2q_{HH},\epsilon )\geqslant f(q_{LH}+q_{HL},\epsilon )\), constraints \(CIC_{LH,LL}\) (9) and \(CIC_{LL,LH}\) (7) implies \(g(q_{LH}+q_{HL},\epsilon )\geqslant g(2q_{LL},\epsilon )\). We know that \(f(x,\epsilon )\) is always increasing in x for any \(\epsilon \), so we have \(q_{HH}\geqslant (q_{LH}+q_{HL})/2\). If \(g(x,\epsilon )\) is decreasing in x, we have \(q_{LL}\geqslant (q_{LH}+q_{HL})/2\). Things are different if \(g(x,\epsilon )\) is increasing in x. On the one hand, the principal needs to set \((q_{LH}+q_{HL})/2\geqslant q_{LL}\) for the contract to be implementable; on the other hand, she needs to set \(q_{LH}\) and \(q_{HL}\) as small as possible due to tradeoff between efficiency and rent extraction. To see this, note first that the contributions of \(q_{HL}\) and \(q_{LH}\) to efficiency (i.e., term \(p_{LH}[\theta _HV(q_{HL})-cq_{HL}+\theta _LV(q_{LH})-cq_{LH}]\) in the principal’s payoff) is negligible for small \(p_{LH}\), but their contributions to the expected rent \(\mathbb {E}\varvec{\pi }\) is nonnegligible.Footnote 25 The intuition is quite simple. If there is only a small probability that agents have different valuations, quantities in this state of nature have much smaller contribution to the principal’s expected payoff than their aid to the agents to secure information rents. The principal will shutdown production in this state at almost no cost. This tightens constraint \((q_{LH}+q_{HL})/2\geqslant q_{LL}\) and thus entails partial pooling consumptions: \(q_{HH}\geqslant (q_{LH}+q_{HL})/2=q_{LL}\). To simplify the analysis, we assume in this section that the consumer’s utility function is \(V(x)=x^{1-\alpha }/(1-\alpha ), \alpha \in [0,1)\). We will show that, with an almost perfect correlation, the principal will choose a parameter \(\epsilon \) such that the virtual valuation of low-type is nonpositive, i.e., \(\theta _{L,2}^v\equiv \theta _L-p_{HH}\epsilon \Delta \theta /p_{LH}\leqslant 0\). Then \(g(x,\epsilon )= \max _{z\in [0,x]}[\theta _{H}V(z)+\theta _{L,2}^vV(x-z)]-2[\theta _L-h(\epsilon )\Delta \theta ]V(x/2)=\left[ \theta _H-2^{\alpha }(\theta _L-h(\epsilon )\Delta \theta )\right] V(x)\). If \(\theta _H\geqslant 2^{\alpha }\theta _L\), then \(g(x,\epsilon )\) is increasing in x; if \(\theta _H\leqslant 2^{\alpha }(\theta _L-\Delta \theta )\), then \(g(x,\epsilon )\) is decreasing in x. The following two propositions characterize the cases with increasing and decreasing \(g(x,\epsilon )\), respectively.

Proposition 6

With an almost perfectly positive correlation and \(\theta _H\geqslant 2^{\alpha }\theta _L\), the principal will choose an arbitrary \(\epsilon ^*\) in \([\theta _Lp_{LH}/(p_{HH}\Delta \theta ),1]\), the optimal weakly collusion-proof mechanism entails

  • partial pooling quantities \(q_{HH}^{CP}=q_{HH}^{FB}, q_{LH}^{CP}=0, q_{HL}^{CP}=2q_{LL}^{CP}\), with \(q_{LL}^{CP}\) given by

    $$\begin{aligned} q_{LL}^{CP}= & {} \left[ \max \left( 0, \frac{p_{LL}}{(1-p_{HH})} \left( \frac{(2\rho +2^{1-\alpha } p_{LH})p_{LH}\theta _H}{(\rho +p_{LH})p_{LL}}+\theta _L\right. \right. \right. \nonumber \\&\left. \left. \left. -\frac{\Delta \theta (p_{HH}-\rho )}{\rho +p_{LH}}\right) /c\right) \right] ^{1/\alpha } \end{aligned}$$
    (44)
  • a vector of information rents/transfers such that constraints \(BIC_H, BIR_L, CIC_{LH,LL}, CIC_{HH,LH}\), \(CIC_{LL,LH}\) and \(CIC_{HH,LL}\) are all binding.

Proof

See “Appendix”. \(\square \)

With an almost perfect correlation and binding constraints \(BIC_H, BIR_L, CIC_{LH,LL}\) and \(CIC_{HH,LH}\), there is only a negligible small probability that agents have different types. For the purpose of reducing information rents conceded to the agent, the principal optimally chooses \(q_{LH}\) and \(q_{HL}\) as small as possible. Meanwhile, the monotonic implementability constraints \(q_{HH}\geqslant (q_{LH}+q_{HL})/2\geqslant q_{LL}\) still need to be satisfied since functions \(f(x,\epsilon )\) and \(g(x,\epsilon )\) are both increasing in x when \(\theta _H\geqslant 2^{\alpha }\theta _L\). As a result, the principal offers a less responsive contract to the reported messages, i.e., \(q_{HH}\geqslant (q_{LH}+q_{HL})/2= q_{LL}\).

When a fixed amount \(2q_{LL}\) is available to and is distributed in a LH coalition, the NAC implies that the larger is \(\epsilon \), the smaller share will be taken by the L agent, i.e., \(dq_{LH}/d\epsilon <0\). Notice that

$$\begin{aligned} \frac{\partial r_{BIC_H}}{\partial \epsilon }= & {} \Delta \theta p_{HH}V'(q_{LH})\frac{d q_{LH}}{d \epsilon }<0,\\ \frac{\partial r_{CIC_{LH,LL}}}{\partial \epsilon }= & {} g_{\epsilon }'(2q_{LL},\epsilon )-2h'(\epsilon )\Delta \theta V(q_{LL})+\frac{p_{HH}\Delta \theta }{p_{LH}}V(q_{LH})\\&+ \frac{p_{HH}\epsilon \Delta \theta }{p_{LH}}\frac{dq_{LH}}{d\epsilon }V'(q_{LH})\\= & {} \frac{p_{HH}\epsilon \Delta \theta }{p_{LH}} \frac{dq_{LH}}{d\epsilon }V'(q_{LH})<0,\\ \frac{\partial r_{CIC_{HH,LH}}}{\partial \epsilon }= & {} f'_{\epsilon }(2q_{LL},\epsilon )-\frac{p_{HH}\Delta \theta }{p_{LH}}V(q_{LH}) -\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}} \frac{dq_{LH}}{d\epsilon }V'(q_{LH})\\= & {} -\frac{p_{HH}\epsilon \Delta \theta }{p_{LH}} \frac{dq_{LH}}{d\epsilon }V'(q_{LH})>0. \end{aligned}$$

\(\partial r_{CIC_{LH,LL}}/\partial \epsilon +\partial r_{CIC_{HH,LH}}/\partial \epsilon =0\), and the shadow cost of \(CIC_{LH,LL}\) (i.e., \(\rho (1-p_{LL})/2(\rho +p_{LH})\)) is larger than that of \(CIC_{HH,LH}\) (i.e., \(\rho p_{HH}/2(\rho +p_{LH})\)). Hence, to minimize the cost of these constraints, the principal needs to increase \(\epsilon \). Meanwhile, a larger \(\epsilon \) requires allocating more resources to the \(\theta _H\)-type agent, and less to the \(\theta _L\)-type. So the expected revenue \(2\sum _{k}\sum _{l}p_{kl}\left[ \theta _kV(q_{kl})-cq_{kl}\right] \) increases with \(\epsilon \). As a result, the principal will increase \(\epsilon \) to the extend that the virtual valuation of low type agent is non-positive, i.e., \(\epsilon ^*\geqslant (\theta _Lp_{LH})/(p_{HH}\Delta \theta )\). Any positive amount of goods initially allocated to the low-type agent will be reallocated to his high-type partner. To avoid reallocation, the principal thus gives zero amount to low-type agent in state \((\theta _L,\theta _H)\), i.e., \(q_{LH}=0\).

The set of binding constraints could be depicted in Fig. 10, in which the feasible region degenerates to line segment PQ, the coordinates of points P and Q are given as follows:

$$\begin{aligned} \pi ^P_{LL}= & {} \frac{p^2_{LH} f\left( 2 q_{LL},\epsilon \right) -\Delta \theta p_{LH}\left( p_{HH}+p_{LH}\right) V\left( q_{LL}\right) }{\rho +p_{LH}}, \end{aligned}$$
(45)
$$\begin{aligned} \pi ^P_{HH}= & {} \frac{p_{LH}^2 f\left( 2 q_{LL},\epsilon \right) +\Delta \theta p_{LL} \left( p_{HH}+p_{LH}\right) V\left( q_{LL}\right) }{\rho +p_{LH}},\end{aligned}$$
(46)
$$\begin{aligned} \pi ^Q_{LL}= & {} \frac{\left[ \begin{array}{c} p_{LH}\left( p_{HH}+2 p_{LH}\right) f\left( 2 q_{LL},\epsilon \right) -p_{LH}p_{HH}f\left( 2 q_{HH},\epsilon \right) \\ -2 \Delta \theta p_{LH} \left( p_{HH}+p_{LH}\right) V\left( q_{LL}\right) \end{array} \right] }{2 \left( p_{LH}+\rho \right) },\end{aligned}$$
(47)
$$\begin{aligned} \pi ^Q_{HH}= & {} \frac{\left[ \begin{array}{c} \left[ \rho +p_{LH}(1-p_{HH})\right] f\left( 2 q_{HH},\epsilon \right) -\left( \rho +p_{LL}p_{LH}\right) f\left( 2 q_{LL},\epsilon \right) \\ +2 \Delta \theta p_{LL} \left( p_{HH}+p_{LH}\right) V\left( q_{LL}\right) \end{array}\right] }{2 \left( p_{LH}+\rho \right) }.\nonumber \\ \end{aligned}$$
(48)

Note that the lines representing coalitional constraints \(CIC_{HH,LL}, CIC_{HH,LH}, CIC_{LH,LL}\) and \(CIC_{LL,LH}\) all pass through the optimal point P. Together with the presumed binding constraints \(BIC_H\) and \(BIR_L\), we have that the set of binding constraints includes \(BIC_H, BIR_L, CIC_{HH,LL}, CIC_{HH,LH}, CIC_{LH,LL}\) and \(CIC_{LL,LH}\).

Fig. 10
figure 10

The case with an almost perfect correlation and \(\theta _H>2^{\alpha }\theta _L\)

If the function \(g(x,\epsilon )\) is decreasing in x, the optimal contract requires a nonmonotonic schedule of consumptions \(q_{HH}>q_{LL}>(q_{LH}+q_{HL})/2\). The binding constraints are then \(BIC_H, BIR_L, CIC_{LH,LL}\) and \(CIC_{HH,LL}\). To see this, we can represent the relationships between CICs in Fig. 11. Area \(B'C'D'E'F'\) represents the feasible region. Notice that given binding \(CIC_{HH,LH}\) and \(CIC_{LH,LL}\) (at point \(A'\)), we have \(\ell _{CIC_{HH,LL}}-r_{CIC_{HH,LL}}=\pi _{HH}-\pi _{LL}-\Delta \theta V(q_{LL})=[f(q_{LH}+q_{HL},\epsilon )+g(2q_{LL},\epsilon )]/2-[h(\epsilon )+1]\Delta \theta V(q_{LL})< [f(2q_{LL},\epsilon )+g(2q_{LL},\epsilon )]/2-[h(\epsilon )+1]\Delta \theta V(q_{LL})=0, A'\) is below line \(CIC_{HH,LL}\); given binding \(CIC_{LH,LL}\) and \(CIC_{LH,HH}\) (at point \(B'\)), we have \(\ell _{CIC_{HH,LL}}-r_{CIC_{HH,LL}}=\pi _{HH}-\pi _{LL}-\Delta \theta V(q_{LL})=[f(2q_{HH},\epsilon )+g(2q_{LL},\epsilon )]/2-\Delta \theta [h(\epsilon )+1]V(q_{LL})> [f(2q_{LL},\epsilon )+g(2q_{LL},\epsilon )]/2-\Delta \theta [h(\epsilon )+1]V(q_{LL})=0, B'\) is above line \(CIC_{HH,LL}\). Hence, the optimum is attained at the rightest point \(F'\) of feasible region \(B'C'D'E'F'\), where \(BIC_H, BIR_L, CIC_{LH,LL}\) and \(CIC_{HH,LL}\) are binding.

Proposition 7

With an almost perfect correlation and \(\theta _H-2^{\alpha }(\theta _L-\Delta \theta )<0\), the principal will choose an arbitrary \(\epsilon ^*\) in \([\theta _Lp_{LH}/(p_{HH}\Delta \theta ),1]\), the optimal weakly collusion-proof mechanism \(\mathbf M ^{CP}\) entails:

  • \(q_{LH}^{CP}=0, q_{HL}^{CP}=q_{HH}^{CP}=q_{HH}^{FB}<2q_{LL}^{CP}\), where

    $$\begin{aligned} q_{LL}^{CP}=\left[ \max \left( 0, \left( \frac{\left( 2-2^{1-\alpha }\right) \rho \theta _H p_{LH}}{p_{LL} \left( p_{LH}+\rho \right) }+\frac{\Delta \theta \left( \rho -p_{HH}\right) }{p_{LH}+\rho }+\theta _L\right) /c\right) \right] ^{1/\alpha } \end{aligned}$$
    (49)
  • a vector of rents \(\varvec{\pi }\) such that \(BIR_L, BIC_H,CIC_{HH,LL},CIC_{LH,LL}\) are binding.

Proof

See “Appendix”. \(\square \)

Fig. 11
figure 11

The case with an almost perfect correlation and \(\theta _H<2^{\alpha }(\theta _L-\Delta \theta )\)

For a strong correlation and a decreasing \(g(x,\epsilon )\), the principal can offer non-monotonic schedules of consumptions in a collusion-proof way. To a low-type agent, she offers him no good when the other agent has high type, and a nonnegative amount when the other agent is also of low-type. For a high-type agent, however, the principal always offers the first-best quantity, since neither \(q_{HL}\) nor \(q_{HH}\) affects the expected information rent \(\mathbb {E}\varvec{\pi }\).

Given \(2q_{LL}>q_{LH}+q_{HL}\), a larger \(\epsilon \), on the one hand, make constraint \(CIC_{LH,LL}\) (9) easier to be satisfied since \(\partial r_{CIC_{LH,LL}}/\partial \epsilon =\Delta \theta p_{HH}[V(\varphi _1(q_{LH}+q_{HL}))-V(\varphi _1(2q_{LL}))]/p_{LH}<0\). On the other hand, a larger \(\epsilon \) demands a larger deviation away from the principal’s first-best decision (notice that in the first-best allocation \(\theta _HV'(q_{HL})=\theta _LV'(q_{LH})=c\), so \(\epsilon =0\)), and thus reduces the term \(2\sum _k\sum _lp_{kl}[\theta _kV(q_{kl})-cq_{kl}]\) in the principal’s profit. Since \(p_{LH}\) is very small, the first effect dominates. It is not very costly from an ex ante allocative point of view for the principal to choose a large \(\epsilon \). It will decrease the virtual valuation of a low-type agent to zero and thus has a tendency to favor the high-type agent to the extend that any positive amount of quantities will be reallocated from his low-type partner to him, so \(q_{LH}=0\).

With an almost perfectly positive correlation, a point worth discussing is the difference between cases with and without arbitrage. LM (2000) show that when the correlation becomes almost positively perfect, the first-best efficiency is approached. In our model, however, expression (49) converges to \(\left[ \max (0,(\theta _L-p_{HH}\Delta \theta /p_{LL})/c)\right] ^{1/\alpha }\) as \(p_{LH}\) goes to zero, which implies that the allocation does not approaches its full information value \(q^{FB}_{LL}\). The difference hinges on the role of arbitrage. When arbitrage is not allowed, an agent is only endowed with the goods initially sold to him by the principal. So, in the coalitional incentive constraints \(g(2q_{LL},\epsilon )\) and \(f(2q_{HH},\epsilon )\) need to be replaced, respectively, by \(\theta _HV(q_{LL})+(\theta _L-p_{HH}\Delta \theta \epsilon /p_{LH})V(q_{LL})-2[\theta _L-h(\epsilon )\Delta \theta ]V(q_{LL})\), and \(2\theta _H V(q_{HH})-\theta _HV(q_{HH})-(\theta _L-p_{HH}\Delta \theta \epsilon /p_{LH})V(q_{HH})\). The right-hand sides of constraints \(CIC_{LH,HH}\) (10) and \(CIC_{LH,LL}\) (9) become \(2\pi _{HH}-\Delta \theta V(q_{HH}) +p_{HH}\Delta \theta \epsilon /p_{LH}[V(q_{LH})-V(q_{HH})]\) and \(2\pi _{LL}+\Delta \theta V(q_{LL}) +p_{HH}\Delta \theta \epsilon /p_{LH}[V(q_{LH})-V(q_{LL})]\). As \(p_{LH}\) goes to zero, they both tends to \(-\infty \) for quantities satisfying \(0=q_{LH}<q_{LL}<q_{HH}\) and a positive \(\epsilon \). Therefore, these two constraints can be arbitrarily satisfied, the principal then recovers some degrees of freedom. This enables him to implement the first-best allocation in the limit case of a perfectly positive correlation. But this is not the case if arbitrage would take place. Notice that, as \(p_{LH}\rightarrow 0\), a corner solution emerges in the maximization problem within the coalition with \(\varphi _1(x)=0, \varphi _2(x)=x, \forall x>0\). We thus have \(r_{LH,LL}=2\pi _{LL}+\theta _HV(\varphi _2(2q_{LL}))+\theta _LV(\varphi _1(2q_{LL}))-2\theta _LV(q_{LL})+p_{HH}\epsilon \Delta \theta /p_{LH}[V(\varphi _1(q_{LH}+q_{HL}))-V(\varphi _1(2q_{LL}))]\rightarrow 2\pi _{LL}+\theta _HV(2q_{LL})-2\theta _LV(q_{LL}), r_{LH,HH}=2\pi _{HH}+\theta _HV(\varphi _2(2q_{HH}))+\theta _LV(\varphi _1(2q_{HH}))-2\theta _HV(q_{HH})+p_{HH}\epsilon \Delta \theta /p_{LH}[V(\varphi _1(q_{LH}+q_{HL}))-V(\varphi _1(2q_{HH}))]\rightarrow 2\pi _{HH}+\theta _HV(2q_{HH})-2\theta _HV(q_{HH})\). The possibility of arbitrage therefore prevents the right-hand sides of constraints \(CIC_{LH,LL}\) and \(CIC_{LH,HH}\) from tending to \(-\infty \), they are now both bounded from below. So, these two constraints cannot be satisfied freely, that is why the first-best allocation is not achievable for an almost perfectly positive correlation in our model.

7 Conclusion

This paper explores the collusion-proof mechanism design problem in a two-agent environment with both correlation and arbitrage. CM’s FSE mechanism shows that the principal may generically exploit the correlation between agents’ private information to elicit their truthtelling at no cost. For the purpose of protecting their rents, agents may collude at the principal’s loss by coordinating their reports and conducting arbitrage on their total purchases. As such, the principal needs to fight off collusion by designing her grand mechanism. This raises natural questions: whether and to what extend does collusion prevent the principal from implementing the first-best allocation. CK (2006) have shown that the principal can always fight off collusion at no cost in a broad class of environments with \(n \geqslant 2\) agents for uncorrelated types and \(n \geqslant 3\) agents for correlated types.

We extended CK’s analysis to the two-agent case with arbitrage and correlation. It is shown that collusion is sometimes preventable at no cost when the correlation is strongly negative. Collusion calls for distortion away from the noncollusive efficiency if correlation is close to zero. Moreover, we find that the distortionary patterns are quite different for weakly positive and negative correlations. For weakly positive correlation, the classical no distortion at the top property is preserved; for weakly negative correlation, however, the optimal collusion-proof mechanism entails two-way distortions for consumptions. For almost perfect positive correlation, in contrast to the result of LM (2000), the possibility of arbitrage prevents the principal from implementing an efficiency close sufficiently to the first-best level.

Notice that, our model does not cover all the possible cases. The cases between weak and strong correlations, and \(\theta _H\in [2^{\alpha }(\theta _L-\Delta \theta ), 2^{\alpha }\theta _L)\) for almost perfectly positive correlation are not discussed. It appears to be quite challenging to obtain a complete description of the optimal collusion-proof mechanism in all the possible cases. This analysis is left for future researches.