Turning Lemons into Peaches using Secure Computation

10/04/2018
by   Stav Buchsbaum, et al.
0

In many cases, assessing the quality of goods is hard. For example, when purchasing a car, it is hard to measure how pollutant the car is since there are infinitely many driving conditions to be tested. Typically, these situations are considered under the umbrella of information asymmetry and as Akelrof showed may lead to a market of lemons. However, we argue that in many of these situations, the problem is not the missing information but the computational challenge of obtaining it. In a nut-shell, if verifying the value of goods requires a large amount of computation or even infinite amounts of computation, the buyer is forced to use a finite test that samples, in some sense, the quality of the goods. However, if the seller knows the test, then the seller can over-fit the test and create goods that pass the quality test despite not having the desired quality. We show different solutions to this situation including a novel approach that uses secure computation to hide the test from the seller to prevent over-fitting.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/02/2019

Secure Computation in Decentralized Data Markets

Decentralized data markets gather data from many contributors to create ...
research
06/08/2021

Giving Commands to a Self-Driving Car: How to Deal with Uncertain Situations?

Current technology for autonomous cars primarily focuses on getting the ...
research
10/15/2020

How to Sell Hard Information

The seller of an asset has the option to buy hard information about the ...
research
09/27/2018

Sharing Information with Competitors

We study the mechanism design problem in the setting where agents are re...
research
01/23/2023

Using Excel software to calculate Bayesian factors: taking goodness of fit test (Chi-square test) as an example

Taking the goodness of fit test (Chi test) as an example, this paper att...
research
11/15/2019

Situation Coverage Testing for a Simulated Autonomous Car – an Initial Case Study

It is hard to test autonomous robot (AR) software because of the range a...
research
05/31/2019

Human-Usable Password Schemas: Beyond Information-Theoretic Security

Password users frequently employ passwords that are too simple, or they ...

Please sign up or login with your details

Forgot password? Click here to reset