Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published February 2018 | Published
Book Section - Chapter Open

Non-Exploitable Protocols for Repeated Cake Cutting

Abstract

We introduce the notion of exploitability in cut-and-choose protocols for repeated cake cutting. If a cut-and-choose protocol is repeated, the cutter can possibly gain information about the chooser from her previous actions, and exploit this information for her own gain, at the expense of the chooser. We define a generalization of cut-and-choose protocols - forced-cut protocols - in which some cuts are made exogenously while others are made by the cutter, and show that there exist non-exploitable forced-cut protocols that use a small number of cuts per day: When the cake has at least as many dimensions as days, we show a protocol that uses a single cut per day. When the cake is 1-dimensional, we show an adaptive non-exploitable protocol that uses 3 cuts per day, and a non-adaptive protocol that uses n cuts per day (where n is the number of days). In contrast, we show that no non-adaptive non-exploitable forced-cut protocol can use a constant number of cuts per day. Finally, we show that if the cake is at least 2-dimensional, there is a non-adaptive non-exploitable protocol that uses 3 cuts per day.

Additional Information

© 2018 Association for the Advancement of Artificial Intelligence. Omer Tamuz was supported by a grant from the Simons Foundation (#419427). Shai Vardi was supported in part by the Linde Foundation and NSF grants CNS-1254169 and CNS-1518941. Juba Ziani was supported by NSF grants #1331343 and #1518941, and US-Israel Binational Science Foundation grant #201234.

Attached Files

Published - 17113-76573-1-PB.pdf

Files

17113-76573-1-PB.pdf
Files (536.0 kB)
Name Size Download all
md5:20c7fcd76b5c7d7d0d87d1745abcf1c7
536.0 kB Preview Download

Additional details

Created:
August 21, 2023
Modified:
October 18, 2023