By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: How to Circumvent Impossibility Theorems in Blockchain Mechanism Design | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > How to Circumvent Impossibility Theorems in Blockchain Mechanism Design | HackerNoon
Computing

How to Circumvent Impossibility Theorems in Blockchain Mechanism Design | HackerNoon

News Room
Last updated: 2025/08/04 at 7:36 PM
News Room Published 4 August 2025
Share
SHARE

Table of Links

Abstract and 1. Introduction

1.1 Our Contributions

1.2 TFM Incentive-Compatibility Notions: A Cheat Sheet

  1. Definitions

    2.1 Transaction Fee Mechanism

    2.2 Incentive Compatibility Notions

  2. Preliminary: Myerson’s Lemma

  3. Warmup: Impossibility of UIC + MIC + Global SCP for Deterministic Mechanisms

  4. Impossibility of UIC + MIC + Global SCP for Randomized Mechanisms and 5.1 Proof Roadmap

    5.2 Formal Proofs

  5. Feasibility and Impossibility of UIC + MIC + OCA-Proof

    6.1 A Non-Truthful Mechanism with UIC + MIC + OCA-Proof

    6.2 Impossibility of UIC + MIC + OCA-Proof for Truthful Mechanisms

  6. How to Circumvent the Impossibilities and 7.1 Allowing the Globally Optimal Strategy to Coordinate

    7.2 Allowing the Globally Optimal Strategy to Output Multiple Bids

    7.3 Inclusion-Rule-Respecting and 7.4 Discussions and Open Questions Regarding the Use of Cryptography

  7. Static Revelation Principle for Transaction Fee Mechanisms

    8.1 Static Revelation Principle: Bidding Rules That Output Single Bid

    8.2 Static Revelation Principle: Allowing Bidding Rules that Output Multiple Bids

A. Comparison of Collusion-Resilience Notions

References

7 How to Circumvent the Impossibilities

In this section, we discuss possible ways to circumvent the impossibilities. Recall that in the definition of OCA-proofness, we require all users act independently in the globally optimal strategy σ, and σ should only output a single bid. If we remove either of the two requirements, we can have mechanisms that satisfies UIC, MIC and OCA-proofness, where we present in Sections 7.1 and 7.2. These mechanisms are somewhat contrived and not obviously relevant for real-world blockchain protocols; the primary point of these mechanisms is to “stress-test” the definitions, and these examples highlight the subtlety of the modeling and help us to have a better understanding of the trade-offs between various notions of collusion-resilience. In Section 7.3, we consider an even weaker definition, called inclusion-rule-respecting, which might be the weakest but still meaningful definition that captures the notion of “no way to steal from the protocol.” Finally, in Section 7.4, we discuss the use of cryptography in the TFM literature, and point out a future direction by using cryptography and Bayesian incentive compatibility.

7.1 Allowing the Globally Optimal Strategy to Coordinate

OCA-proofness requires that all users act independently in the globally optimal strategy σ. However, if we remove this restriction, then the following auction would simultaneously satisfy UIC, MIC, and OCA-proof (with the aforementioned relaxation).

Posted price auction with random selection and total burning. The mechanism is parametrized with some reserve price r > 0 and block size k. Any bid that is at least r is considered eligible. Randomly select up to k bids to include in the block. All included bids are confirmed and they each pay r. All payment is burnt and the miner receives nothing. It is not hard to see that the above mechanism satisfies UIC and MIC. It also satisfies OCA-proofness with the aforementioned relaxation since the global coalition can just have the users with the top k values bid more than r, while everyone else bids 0.

Note that allowing all users to coordinate bids does not trivialize the definition, as this relaxed OCA-proofness definition still requires that the miner follow the TFM’s inclusion rule honestly. For example, in the auction above, the miner has to select k bids uniformly at random among all eligible bids.

7.2 Allowing the Globally Optimal Strategy to Output Multiple Bids

We next show that when we allow the globally optimal strategy σ to output multiple bids, then we can actually construct a truthful mechanism that satisfies UIC, MIC, and OCA-proofness. Similar to Section 6.1, we try to signal to the mechanism when everyone is adopting the globally optimal strategy σ. In this mechanism, since σ can output multiple bids, users can signal through fake bids. We assume the miner and the mechanism can distinguish whether a set of bids come from the same user. In practice, this can be implemented by checking whether these bids are signed by the same public key. Specifically, consider the following mechanism parametrized by a reserve price r > 1.

• Globally optimal strategy σ(v): If the user’s true value v ≥ r, σ(v) outputs (r, r/v) where r/v ∈ (0, 1] is a uniquely decodable encoding of the user’s true value v. Otherwise, if v < r, σ(v) simply outputs ∅, i.e., the user drops its bid.

• Inclusion rule.

• Confirmation, payment, and miner revenue rules: All included bids that are at least r are confirmed. Each confirmed bid pays r, and the miner gets nothing.

Claim 7.1. The above mechanism satisfies UIC, MIC, and a relaxed notion of OCA-proofness in which σ is allowed to output multiple bids.

Proving UIC is the most complicated part. Fix any user i. Notice that each confirmed bid pays r, so if user i’s true value is at most r, it cannot get positive utility regardless its bid. Thus, bidding truthfully is a dominant strategy. Henceforth, we assume user i’s true value is strictly larger than r. There are two possibilities.

  1. First, before user i submits its bid, the bid vector contains exactly n bids at r and n bids lie in the range (0, 1] for some n. Then, bidding truthfully will lead to Case 3, where user i’s bid is guaranteed to be included and confirmed, and thus maximizes the utility.

  2. Second, before user i submits its bid, the bid vector does not contain exactly n bids at r and n bids lie in the range (0, 1] for some n. Suppose there is no bid strictly larger than r in the bid vector before user i submits its bid. Then, if user i bids truthfully, its bid will be the only bid larger than r, and the inclusion rule goes to Case 4. Since k ≥ 1, user i’s bid is guaranteed to be included and confirmed, and thus maximizes the utility. On the other hand, suppose there are t ≥ 1 bids strictly larger than r in the bid vector before user i submits its bid. Then, the inclusion can never go to Case 1 or Case 2. If user i bids truthfully, the inclusion rule must go to Case 4, and user i’s bid is included with probability min(k, t + 1)/(t + 1). However, if the strategic bidding leads to Case 3, it must be t = 1. Then, user i’s inclusion probability has dropped from 1/2 to 0 if k = 1, or from 1 to at most 1 if k ≥ 2. On the other hand, if the strategic bidding leads to Case 4, any untruthful bidding > r leads to the same inclusion probability and the same payment, so the utility does not change, while any untruthful bidding ≤ r leads to the zero inclusion probability which leads to zero utility. Finally, notice that injecting fake bids never helps in Case 4. Thus, in all cases, the utility is better than bidding truthfully.

Recall that weakly symmetric mechanisms do not the bidders’ identities or other auxiliary information except for tie-breaking among equal bids. Because the mechanism above relies on the fact that the inclusion rule can distinguish whether a set of bids come from the same user, it may not be obvious that the mechanism satisfies weak symmetry. The next claim proves this formally.

Claim 7.2. The above mechanism satisfies weak symmetry.

Proof. To show weak symmetry, we give an equivalent description as follows. Given a bid vector b, the sorting algorithm checks whether b satisfies the condition of Case 1. If so, the sorting algorithm places the multiple r bids corresponding to the true value vector (v1, . . . , vn) (defined in Case 1 above) from high to low, and sorts the rest in the descending order. Otherwise, if b does not satisfy the condition of Case 1, the sorting algorithm sorts b in the descending order and breaks tie arbitrarily.

In the original mechanism, the only case that depends on the extra information (identity, in this case) is Case 1. By applying the sorting algorithm described above, the inclusion rule can implement Case 1 by only depending on the amount of the bids and their relative position in the sorted bid vector.

7.3 Inclusion-Rule-Respecting

It is also natural to consider a further relaxation of OCA-proofness henceforth called “inclusionrule-respecting”. In comparison with OCA-proofness, inclusion-rule-respecting only requires that the globally optimal strategy σ not involve altering the inclusion rule, and all other constraints on σ are removed. Inclusion-rule-respecting is strictly weaker than the notions in Section 7.1 and Section 7.2. Therefore, the mechanisms mentioned in Section 7.1 and Section 7.2 simultaneously satisfy UIC, MIC, and inclusion-rule-respecting too.

The “inclusion-rule-respecting” notion has an intuitive interpretation: it discourages miners from altering the intended protocol implementation; in other words, all profiting strategies can be implemented as bidding strategies above the protocol layer. In this sense, “inclusion-rulerespecting” also captures the intuition of “no way to steal from the protocol”. One can also view it as follows: global SCP captures “not stealing from the protocol” where the protocol is the union of the miner’s inclusion rule as well as users’ honest bidding strategies; and inclusion-rule-respecting captures the same notion but where the protocol is only the underlying blockchain protocol. OCA-proofness is somewhere in between.

7.4 Discussions and Open Questions Regarding the Use of Cryptography

Another interesting question is whether we can overcome the impossibilities using cryptography. Shi et al. [SCW23] showed that if the rules of the TFM are enforced through a multi-party computation protocol (henceforth called the MPC-assisted model), then we can design a finite-block TFM that simultaneously satisfies UIC, MIC, and 1-SCP (in the ex-post sense). On the other hand, Shi et al. also showed that simultaneously achieving UIC, MIC, and c-SCP for c ≥ 2 is impossible in the MPC-assisted model, even for Bayesian notions of equilibrium. Partly this is because even with an MPC protocol enforcing the inclusion rule, a strategic miner or user can still inject fake bids, and the mechanism does not know the number of bids ahead of time (i.e., the mechanism is “permissionless”). It is an interesting open question whether using cryptography and Bayesian notions of equilibrium can help us overcome the impossibilities in this paper. Specifically, Shi et al. [SCW23] suggested that the MPC-assisted model also justifies the relaxed notion of Bayesian equilibrium, since players cannot see others’ bids before posting their own.


Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The best robot vacuums you can buy
Next Article I tested Grok Imagine, and it’s no match for Google Veo 3 or Sora
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

All 2025 Motorola Razr foldables are on sale!
News
The HackerNoon Newsletter: Our Communication No Longer Belongs to Us (8/4/2025) | HackerNoon
Computing
Medvedev warns Trump ‘expect more’ as Russia walks out of missile treaty
News
Agentic AI and the Rise of Outcome Engineering | HackerNoon
Computing

You Might also Like

Computing

The HackerNoon Newsletter: Our Communication No Longer Belongs to Us (8/4/2025) | HackerNoon

2 Min Read
Computing

Agentic AI and the Rise of Outcome Engineering | HackerNoon

6 Min Read
Computing

OpenAI Is Winning the AI Race, But Losing the Business Game | HackerNoon

13 Min Read
Computing

Meet Localazy, Winner of Startups of The Year 2024 in Brno, South Moravian Region/Localization | HackerNoon

14 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?