Non-exploitable protocols for repeated cake cutting

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

We introduce the notion of exploitability in cut-and-choose protocols for repeated cake cutting. If a cut-and-choose protocol is repeated, the cutter can possibly gain information about the chooser from her previous actions, and exploit this information for her own gain, at the expense of the chooser. We define a generalization of cut-and-choose protocols-forced-cut protocols-in which some cuts are made exogenously while others are made by the cutter, and show that there exist non-exploitable forced-cut protocols that use a small number of cuts per day: When the cake has at least as many dimensions as days, we show a protocol that uses a single cut per day. When the cake is 1-dimensional, we show an adaptive non-exploitable protocol that uses 3 cuts per day, and a non-adaptive protocol that uses n cuts per day (where n is the number of days). In contrast, we show that no non-adaptive non-exploitable forced-cut protocol can use a constant number of cuts per day. Finally, we show that if the cake is at least 2-dimensional, there is a non-adaptive non-exploitable protocol that uses 3 cuts per day.

Cite

CITATION STYLE

APA

Tamuz, O., Vardi, S., & Ziani, J. (2018). Non-exploitable protocols for repeated cake cutting. In 32nd AAAI Conference on Artificial Intelligence, AAAI 2018 (pp. 1226–1233). AAAI press. https://doi.org/10.1609/aaai.v32i1.11472

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free