By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Static Revelation Principle for Transaction Fee Mechanisms | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Static Revelation Principle for Transaction Fee Mechanisms | HackerNoon
Computing

Static Revelation Principle for Transaction Fee Mechanisms | HackerNoon

News Room
Last updated: 2025/08/04 at 7:11 PM
News Room Published 4 August 2025
Share
SHARE

Table of Links

Abstract and 1. Introduction

1.1 Our Contributions

1.2 TFM Incentive-Compatibility Notions: A Cheat Sheet

  1. Definitions

    2.1 Transaction Fee Mechanism

    2.2 Incentive Compatibility Notions

  2. Preliminary: Myerson’s Lemma

  3. Warmup: Impossibility of UIC + MIC + Global SCP for Deterministic Mechanisms

  4. Impossibility of UIC + MIC + Global SCP for Randomized Mechanisms and 5.1 Proof Roadmap

    5.2 Formal Proofs

  5. Feasibility and Impossibility of UIC + MIC + OCA-Proof

    6.1 A Non-Truthful Mechanism with UIC + MIC + OCA-Proof

    6.2 Impossibility of UIC + MIC + OCA-Proof for Truthful Mechanisms

  6. How to Circumvent the Impossibilities and 7.1 Allowing the Globally Optimal Strategy to Coordinate

    7.2 Allowing the Globally Optimal Strategy to Output Multiple Bids

    7.3 Inclusion-Rule-Respecting and 7.4 Discussions and Open Questions Regarding the Use of Cryptography

  7. Static Revelation Principle for Transaction Fee Mechanisms

    8.1 Static Revelation Principle: Bidding Rules That Output Single Bid

    8.2 Static Revelation Principle: Allowing Bidding Rules that Output Multiple Bids

A. Comparison of Collusion-Resilience Notions

References

8 Static Revelation Principle for Transaction Fee Mechanisms

Informally speaking, the revelation principle says that any mechanism can be simulated by an equivalent truthful mechanism. Whenever the revelation principle holds, without loss of generality, we may assume that the users’ honest bidding strategy is simply truth-telling. We focus here on a revelation principle for “static” mechanisms in which users interact with a mechanism simply by submitting a bid.[10]

TFMs differ from traditional auctions in that they additionally need to satisfy MIC and collusion resilience, and also the separation of the inclusion rule (executed by the miner) and the confirmation/payment rules (executed by the blockchain). Therefore, revelation principles are not “automatic.” In this section, we prove that for any fixed c, the revelation principle holds for TFMs that must satisfy UIC, MIC, and c-SCP. As a direct corollary, the revelation principle holds for TFMs that satisfy UIC, MIC, and global SCP. The main subtlety in the proof is that when we bake the user’s non-truth-telling bidding rule β into the mechanism itself, not only do we need to have the miner’s inclusion rule execute β, the blockchain’s confirmation/payment rules must also double-check the correct enforcement of β again. Otherwise, a strategic miner may not honestly enforce β.

Notice that we focus on the mechanisms that satisfy c-SCP instead of OCA-proofness in this section. c-SCP requires that following the honest bidding rule and the honest inclusion rule is a dominant strategy for a coalition consisting of the miner and at most c users. For a non-truthful mechanism with the bidding rule β, β is used by users to satisfy both the UIC and the c-SCP conditions. In Section 8.1, we assume the honest bidding rule β only outputs a single bid. in Section 8.2, we generalize the proof so that β can output any non-negative number of bids.

8.1 Static Revelation Principle: Bidding Rules That Output Single Bid

Theorem 8.1 (Static revelation principle). Let c be any natural number. Suppose Π is a nontruthful TFM for block size k that is UIC, MIC, and c-SCP with an individually rational bidding rule β. If β always outputs a single bid, then there exists a truthful TFM Π′ for block size k that is UIC, MIC, and c-SCP such that 1) the honest bidding rule is truth-telling, and 2) given any vector of true values, the outcome under an honest execution of Π is identically distributed as the outcome under an honest execution of Π′.

Notice that β is individually rational under Π, so the payment corresponding to the bid β(v) never exceeds v. Thus, under the induced mechanism Π′, the payment never exceeds the bid, so the individual rationality of the payment rule is respected.

Next, by directly checking the syntax, the user’s confirmation probability and expected payment when submitting a bid b under Π′ is identically distributed to submitting a bid β(b) under Π assuming the miner follows the inclusion rule. Similarly, the miner’s revenue when creating a block B under Π′ is identically distributed to creating a block β(B) under Π. Thus, the outcome under an honest execution of Π is identically distributed as the outcome under an honest execution of Π′.

Finally, we show that the induced mechanism Π′ satisfies UIC, MIC, and global SCP. Since submitting a bid b and creating a block B under Π′ is equivalent to submitting a bid β(b) and creating a block β(B) under Π, respectively, the fact that Π′ satisfies UIC and global SCP directly follows from the fact that Π satisfies UIC and global SCP under the user’s honest bidding rule β.


[10] More generally, typical revelation principles in auction theory transform non-direct mechanisms (in which the action space may be different from the valuation space, for example due to multiple rounds of user-mechanism interaction) into a direct mechanisms.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google Pixel 9a drops to a new record-low price, saving you $100
Next Article Infinix GT 30 5G+ With 144Hz AMOLED, Dimensity 7400 Launching In India On August 8
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

All 2025 Motorola Razr foldables are on sale!
News
The HackerNoon Newsletter: Our Communication No Longer Belongs to Us (8/4/2025) | HackerNoon
Computing
Medvedev warns Trump ‘expect more’ as Russia walks out of missile treaty
News
Agentic AI and the Rise of Outcome Engineering | HackerNoon
Computing

You Might also Like

Computing

The HackerNoon Newsletter: Our Communication No Longer Belongs to Us (8/4/2025) | HackerNoon

2 Min Read
Computing

Agentic AI and the Rise of Outcome Engineering | HackerNoon

6 Min Read
Computing

OpenAI Is Winning the AI Race, But Losing the Business Game | HackerNoon

13 Min Read
Computing

Meet Localazy, Winner of Startups of The Year 2024 in Brno, South Moravian Region/Localization | HackerNoon

14 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?