License: arXiv.org perpetual non-exclusive license
arXiv:2402.04485v1 [cs.LG] 07 Feb 2024

Incentivized Truthful Communication for Federated Bandits

Zhepei Wei{}^{\dagger}start_FLOATSUPERSCRIPT † end_FLOATSUPERSCRIPT    Chuanhao Li*absent{}^{\dagger*}start_FLOATSUPERSCRIPT † * end_FLOATSUPERSCRIPT    Tianze Ren{}^{\dagger}start_FLOATSUPERSCRIPT † end_FLOATSUPERSCRIPT    Haifeng Xu{}^{\ddagger}start_FLOATSUPERSCRIPT ‡ end_FLOATSUPERSCRIPT    Hongning Wang{}^{\dagger}start_FLOATSUPERSCRIPT † end_FLOATSUPERSCRIPT
{}^{\dagger}start_FLOATSUPERSCRIPT † end_FLOATSUPERSCRIPTUniversity of Virginia        {}^{\ddagger}start_FLOATSUPERSCRIPT ‡ end_FLOATSUPERSCRIPTUniversity of Chicago
{tqf5qb, cl5ev, tr2bx, hw5x}@virginia.edu   [email protected]
Equal Contribution
Abstract

To enhance the efficiency and practicality of federated bandit learning, recent advances have introduced incentives to motivate communication among clients, where a client participates only when the incentive offered by the server outweighs its participation cost. However, existing incentive mechanisms naively assume the clients are truthful: they all report their true cost and thus the higher cost one participating client claims, the more the server has to pay. Therefore, such mechanisms are vulnerable to strategic clients aiming to optimize their own utility by misreporting. To address this issue, we propose an incentive compatible (i.e., truthful) communication protocol, named Truth-FedBan, where the incentive for each participant is independent of its self-reported cost, and reporting the true cost is the only way to achieve the best utility. More importantly, Truth-FedBan still guarantees the sub-linear regret and communication cost without any overheads. In other words, the core conceptual contribution of this paper is, for the first time, demonstrating the possibility of simultaneously achieving incentive compatibility and nearly optimal regret in federated bandit learning. Extensive numerical studies further validate the effectiveness of our proposed solution.

1 Introduction

Bandit learning (Lattimore & Szepesvári, 2020) addresses the exploration-exploitation dilemma in interactive environments, where the learner repeatedly chooses actions and observes the corresponding rewards from the environment. Subject to different goals of the learner, e.g., maximizing cumulative rewards (Abbasi-Yadkori et al., 2011; Auer et al., 2002) vs., identifying the best arm (Audibert et al., 2010; Garivier & Kaufmann, 2016), bandit algorithms have been widely applied in various real-world applications, such as model selection (Maron & Moore, 1993), recommender systems (Li et al., 2010a; b), and clinical trials (Durand et al., 2018). Most recently, propelled by the increasing scales of data across various sources and public concerns about data privacy, there has been growing research effort devoted to federated bandit learning, which enables collective bandit learning among distributed learners while preserving the data privacy of each learner. Recent advances in this line of research mainly focus on addressing the communication bottleneck in the federated network, which leads to communication-efficient protocols for both non-contextual (Landgren et al., 2016; Martínez-Rubio et al., 2019; Shi et al., 2020; Zhu et al., 2021) and contextual bandits (Wang et al., 2020; Huang et al., 2021; Li et al., 2022; 2023) under various environment settings.

However, almost all previous works assume clients are altruistic in sharing their local data with the server whenever communication is triggered (Wang et al., 2020; Li & Wang, 2022a; He et al., 2022). This limits their practical deployment in real-world scenarios involving individual rational clients who share data only if provided with clear benefits. The only notable exception is Wei et al. (2023), where incentive is provided to motivate client’s participation in federated learning. Nevertheless, their protocol naively assumes the clients are truthful in reporting their participation cost; and thus, they simply calculate incentives by each client’s claimed cost, leaving it as a design flaw for strategic clients to exploit. Therefore, how to design an incentive compatible mechanism for federated bandits that ensures truthful reporting while still preserving the near-optimal regret and communication cost still remains an open research problem.

Following Wei et al. (2023)’s setting for learning contextual linear bandits in a federated environment, we develop the first incentive compatible communication protocol Truth-FedBan, which ensures the clients can only achieve their best utility by reporting the true participation costs. Specifically, instead of simply paying a client by its claimed cost, we decouple the calculation of incentive from the target client’s reported cost, while preserving individual rationality through a critical-value based payment design that depends on all other clients’ report cost. Besides the theoretical guarantee on truthfulness, we also empirically demonstrate that misreporting cost brings no benefit to the client’s utility. More encouragingly, we prove that this can be achieved without any compromise in maintaining the near-optimal performance in regret and communication cost.

On the other hand, in addition to the above desiderata, maintaining a minimal social cost is also an important objective in the incentivized communication problem, especially in practical applications. Following classical economic literature (Procaccia & Tennenholtz, 2013), social cost is defined as the sum of true participation costs among all participating clients. While incentivizing all clients’ participation ensures nearly optimal performance (Wang et al., 2020), it can be scientifically trivial (e.g., paying everyone to have all of them participate) and practically undesirable — it not only brings unnecessary burden for the server, but can also expose unnecessary clients to potential downsides of participation (e.g., privacy breaches, added resource consumption, etc.), resulting in worse social cost. Minimizing social cost while ensuring sufficient client participation is non-trivial, as it in nature is NP-hard (see Eq. (1)). Though the method proposed by Wei et al. (2023) achieves sub-linear regret and communication cost (albeit assuming truthfulness), it provides no guarantee on the social cost. In contrast, our proposed Truth-FedBan guarantees both sub-linear regret and near-optimal social cost, with only a constant-factor approximation ratio. To better illustrate our contribution, we compare the proposed Truth-FedBan with the most related works in Table 1.

Method Regret Communication Cost IR IC SC
DisLinUCB O(dTlogT)𝑂𝑑𝑇𝑇O(d\sqrt{T}\log T)italic_O ( italic_d square-root start_ARG italic_T end_ARG roman_log italic_T ) O(N2d3logT)𝑂superscript𝑁2superscript𝑑3𝑇O(N^{2}d^{3}\log T)italic_O ( italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT roman_log italic_T )
(Wang et al., 2020)
Inc-FedUCB O(dTlogT)𝑂𝑑𝑇𝑇O(d\sqrt{T}\log T)italic_O ( italic_d square-root start_ARG italic_T end_ARG roman_log italic_T ) O(N2d3logT)𝑂superscript𝑁2superscript𝑑3𝑇O(N^{2}d^{3}\log T)italic_O ( italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT roman_log italic_T )
(Wei et al., 2023)
Truth-FedBan O(dTlogT)𝑂𝑑𝑇𝑇O(d\sqrt{T}\log T)italic_O ( italic_d square-root start_ARG italic_T end_ARG roman_log italic_T ) O(N2d3logT)𝑂superscript𝑁2superscript𝑑3𝑇O(N^{2}d^{3}\log T)italic_O ( italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT roman_log italic_T )
(Our Algorithm 1)
Table 1: Comparison with related works, where IR, IC and SC represent the guarantee of individual rationality, incentive compatibility, and social cost near-optimality, respectively.

2 Related Work

2.1 Federated Bandit Learning

Federated bandit learning has been well investigated for sequential decision making in distributed environments. These studies mainly differ in how they model the clients’ and environment characteristics, which can be categorized into 1) bandit-wise: problem profile (e.g., context-free (Martínez-Rubio et al., 2019; Shi & Shen, 2021; Shi et al., 2020) vs. contextual (Wang et al., 2020)) and decision set (e.g., fixed (Huang et al., 2021) vs. time-varying (Li & Wang, 2022b)), and 2) system-wise: client type (e.g., homogeneous (He et al., 2022) vs. heterogeneous (Li & Wang, 2022a)), network type (e.g., peer-to-peer (P2P) (Dubey & Pentland, 2020) vs. star-shaped (Wang et al., 2020)), and communication type (e.g., synchronous (Li et al., 2022) vs. asynchronous (Li et al., 2023)).

Most recently, Wei et al. (2023) expand this spectrum by introducing the notion of incentivized communication, where the server has to pay the clients for their participation. Despite being free from the long-standing assumption about the client’s willingness of participation in literature, they still assume truthfulness of clients in cost reporting. Specifically, their incentive calculation is based on the client’s self-reported cost, which leads to serious vulnerability in adversarial scenarios as clients can exploit this flaw, ultimately paralyzing the federated learning system. This is particularly concerning in real-world applications where self-interested clients are motivated to strategically game the system for increased utilities, i.e., increase the difference between incentives offered by the server and actual participation costs. Our work aims to address this issue by introducing a truthful incentive mechanism under which clients reporting true costs is in their best interest, while ensuring near-optimal learning performance.

2.2 Mechanism Design

Mechanism design (Nisan & Ronen, 1999) has been playing a crucial role in the fields of economics, computer science and operation research, with fruitful auction-like real-world applications such as matching markets (Roth, 1986), resource allocation (Procaccia, 2013), online advertisement pricing (Aggarwal et al., 2006). Typically, the auctioneer (server) aims to sell/purchase one or more entries of a collection to/from multiple bidders (clients), with the objective of maximizing social welfare or minimizing social cost. The goal of mechanism design is to incentivize clients to truthfully report the values of the entries (i.e., truthfulness), while ensuring non-negative utilities if they participate in the mechanism (i.e., individual rationality).

The Vickrey-Clarke-Groves (VCG) mechanism (Vickrey, 1961; Clarke, 1971; Groves, 1973) is probably the most well-known truthful mechanism. Despite having been well explored in many theoretical studies, VCG is rarely applied in practical applications due to its computational inefficiency. This is because VCG requires finding an optimal solution to the concerned problems, which is often NP-hard (Archer & Tardos, 2001). Otherwise, truthfulness cannot be guaranteed when VCG mechanisms are applied to sub-optimal solutions (Lehmann et al., 2002). To facilitate study on this issue, Mu’Alem & Nisan (2008) identified the key character of a truthful mechanism and reduced the problem to designing a monotone algorithm (see Section 4.1). One notable recent related work is (Kandasamy et al., 2023), where the authors model repeated auctions as a bandit learning problem for the server, with clients being unaware of their values but able to provide bandit feedback based on the server’s allocation. The server’s goal is to find allocations that maximize social welfare, while ensuring the clients’ truthfulness in their feedback. In contrast, in our work, clients know their participation costs and are concerned to solve the bandit problem collectively. The server’s goal is to incentivize clients’ participation for regret minimization, while ensuring the clients’ truthfulness in cost reporting and minimizing social cost.

In terms of problem formulation, our work is closest to the hiring-a-team task in procurement auctions (Talwar, 2003; Archer & Tardos, 2007), where the server aims to incentivize a set of self-interested clients to jointly perform a task. One standard assumption in this task is that the environment is monopoly-free, i.e., no single client exists in all feasible sets (Iwasaki et al., 2007). The reason is that if a client is essential, it has the bargaining power to ask for infinite incentive. In this paper, we do not assume a monopoly-free environment, otherwise additional environment assumptions will be needed (e.g., how the context or arms should distribute across clients). Instead, we are intrigued in studying the origin and impact of the monopoly issue from both theoretical and empirical perspectives. And we also rigorously prove that we can eliminate the issue via hyper-parameter control in our mechanism (see Lemma 7).

2.3 Mechanism Design in Federated Learning

On the other hand, there have been growing efforts in investigating mechanism design in the context of federated learning (Pei, 2020; Tu et al., 2022). For example, Karimireddy et al. (2022) introduced a contract-theory based incentive mechanism to maximize data sharing while avoiding free-riding clients. In their design, every client gets different snapshots of the global model with different levels of accuracy as incentive, and truthfully reporting their data sharing costs is the best response under the proposed incentive mechanism. Therefore, there is no overall performance guarantee and their focus is on investigating the level of accuracy the system can achieve under this truthful incentive mechanism.  Le et al. (2021) also investigated truthful mechanism design in the application scenario of wireless communication, where server’s goal is to maximize the system’s social welfare, with respect to a knapsack upper bound constraint. In contrast, in our problem the server is obligated to improve the overall performance of the learning system, i.e., obtaining near-optimal regret among all clients. Furthermore, our optimization problem (defined in  Eq. (3)) aims at minimizing the social cost, with respect to a submodular lower bound constraint. Therefore, despite we share a similar idea of using the monotone participant selection rule and critical-value based payment design to guarantee truthfulness, the underlying fundamental optimization problems are completely different, and consequently their solution cannot be used to solve our problem. Besides pursuing the truthfulness guarantee in mechanism design under the collaborative/federated setting, the other related line of research focuses on designing incentive mechanisms that ensures fairness among distributed clients (Blum et al., 2021; Xu et al., 2021; Sim et al., 2020; Donahue & Kleinberg, 2023), which is also an important direction, despite being beyond the scope of our work. To our best knowledge, our work is the first attempt that studies truthful mechanism design for federated bandit learning.

3 Preliminary: Incentivized Federated Bandits

In this section, we present the incentivized communication problem for federated bandits in general and the existing solution framework under the linear reward assumption (Wang et al., 2020). More precisely, we focus our discussions on the learning objectives, including minimizing regret, communication cost, social cost, and ensuring truthfulness.

Consider a learning system with 1) N𝑁Nitalic_N distributed strategic and individual rational clients that repeatedly interact with the environment by taking actions to receive rewards, and 2) a central server responsible for motivating the clients to participate in federated learning via incentives. As in line with Wei et al. (2023), we assume the clients can only communicate with the server, forming a star-shaped communication network. Specifically, at each time step t[T]𝑡delimited-[]𝑇t\in[T]italic_t ∈ [ italic_T ], an arbitrary client it[N]subscript𝑖𝑡delimited-[]𝑁i_{t}\in[N]italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∈ [ italic_N ] chooses an arm 𝐱t𝒜tsubscript𝐱𝑡subscript𝒜𝑡\mathbf{x}_{t}\in\mathcal{A}_{t}bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∈ caligraphic_A start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT from its given arm set 𝒜tdsubscript𝒜𝑡superscript𝑑\mathcal{A}_{t}\subseteq\mathbb{R}^{d}caligraphic_A start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ⊆ blackboard_R start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT. Then, client itsubscript𝑖𝑡i_{t}italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT receives a reward yt=𝐱tθ+ηtsubscript𝑦𝑡superscriptsubscript𝐱𝑡topsubscript𝜃subscript𝜂𝑡y_{t}=\mathbf{x}_{t}^{\top}\theta_{\star}+\eta_{t}\in\mathbb{R}italic_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT italic_θ start_POSTSUBSCRIPT ⋆ end_POSTSUBSCRIPT + italic_η start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∈ blackboard_R, where θsubscript𝜃\theta_{\star}italic_θ start_POSTSUBSCRIPT ⋆ end_POSTSUBSCRIPT is the unknown parameter shared by all clients and ηtsubscript𝜂𝑡\eta_{t}italic_η start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT denotes zero-mean sub-Gaussian noise. Typically, in the centralized setting of bandit learning, a ridge regression estimator θ^t=Vg,t1bg,tsubscript^𝜃𝑡superscriptsubscript𝑉𝑔𝑡1subscript𝑏𝑔𝑡\hat{\theta}_{t}=V_{g,t}^{-1}b_{g,t}over^ start_ARG italic_θ end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_b start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT is constructed for arm selection based on the sufficient statistics from all N𝑁Nitalic_N clients at time step t𝑡titalic_t, where Vg,t=s=1t𝐱s𝐱ssubscript𝑉𝑔𝑡superscriptsubscript𝑠1𝑡subscript𝐱𝑠superscriptsubscript𝐱𝑠topV_{g,t}=\sum_{s=1}^{t}\mathbf{x}_{s}\mathbf{x}_{s}^{\top}italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_s = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT bold_x start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT bold_x start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT and bg,t=s=1t𝐱syssubscript𝑏𝑔𝑡superscriptsubscript𝑠1𝑡subscript𝐱𝑠subscript𝑦𝑠b_{g,t}=\sum_{s=1}^{t}\mathbf{x}_{s}y_{s}italic_b start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_s = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT bold_x start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_y start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT. In contrast, since communication does not occur at every time step t𝑡titalic_t in the federated setting, each client i𝑖iitalic_i only has a delayed copy of Vg,tsubscript𝑉𝑔𝑡V_{g,t}italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT and bg,tsubscript𝑏𝑔𝑡b_{g,t}italic_b start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT, denoted as Vi,t=Vg,tlast+ΔVi,t,bi,t=bg,tlast+Δbi,tformulae-sequencesubscript𝑉𝑖𝑡subscript𝑉𝑔subscript𝑡lastΔsubscript𝑉𝑖𝑡subscript𝑏𝑖𝑡subscript𝑏𝑔subscript𝑡lastΔsubscript𝑏𝑖𝑡V_{i,t}=V_{g,t_{\text{last}}}+\Delta V_{i,t},b_{i,t}=b_{g,t_{\text{last}}}+% \Delta b_{i,t}italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_V start_POSTSUBSCRIPT italic_g , italic_t start_POSTSUBSCRIPT last end_POSTSUBSCRIPT end_POSTSUBSCRIPT + roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_b start_POSTSUBSCRIPT italic_g , italic_t start_POSTSUBSCRIPT last end_POSTSUBSCRIPT end_POSTSUBSCRIPT + roman_Δ italic_b start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, where Vg,tlast,bg,tlastsubscript𝑉𝑔subscript𝑡lastsubscript𝑏𝑔subscript𝑡lastV_{g,t_{\text{last}}},b_{g,t_{\text{last}}}italic_V start_POSTSUBSCRIPT italic_g , italic_t start_POSTSUBSCRIPT last end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT italic_g , italic_t start_POSTSUBSCRIPT last end_POSTSUBSCRIPT end_POSTSUBSCRIPT are the aggregated statistics shared by the server in the last communication, and ΔVi,t,Δbi,tΔsubscript𝑉𝑖𝑡Δsubscript𝑏𝑖𝑡\Delta V_{i,t},\Delta b_{i,t}roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT , roman_Δ italic_b start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT are the accumulated local updates that client i𝑖iitalic_i has collected from the environment since tlastsubscript𝑡lastt_{\text{last}}italic_t start_POSTSUBSCRIPT last end_POSTSUBSCRIPT.

Regret and Communication Cost

One key objective of the learning system is to minimize the (pseudo) regret for all N𝑁Nitalic_N clients across the entire time horizon T𝑇Titalic_T, i.e., RT=t=1Trtsubscript𝑅𝑇superscriptsubscript𝑡1𝑇subscript𝑟𝑡R_{T}=\sum_{t=1}^{T}r_{t}italic_R start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_t = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_r start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, where rt=max𝐱𝒜t𝐄[y|𝐱]𝐄[yt|𝐱t]subscript𝑟𝑡subscript𝐱subscript𝒜𝑡𝐄delimited-[]conditional𝑦𝐱𝐄delimited-[]conditionalsubscript𝑦𝑡subscript𝐱𝑡r_{t}=\max_{\mathbf{x}\in\mathcal{A}_{t}}\mathbf{E}[y|\mathbf{x}]-\mathbf{E}[y% _{t}|\mathbf{x}_{t}]italic_r start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = roman_max start_POSTSUBSCRIPT bold_x ∈ caligraphic_A start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT bold_E [ italic_y | bold_x ] - bold_E [ italic_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT | bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ] is the instantaneous regret of client itsubscript𝑖𝑡i_{t}italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT at time step t𝑡titalic_t. Meanwhile, a low communication cost is also desired to keep the efficiency of federated learning, which is measured by the total number of scalars transferred throughout the system up to time T𝑇Titalic_T. Intuitively, more frequent communication leads to lower regret. For example, communicating at every time step recovers the centralized setting, leading to the lowest regret, but with an undesirably high communication cost. Efficient communication protocol design becomes the key to balance regret and communication cost. And using determinant ratio to measure the outdatedness of the sufficient statistics stored on the server side against those on the client side has become the reference solution to control communication in federated linear bandits (Wang et al., 2020; Li & Wang, 2022a).

Incentivized Communication

When dealing with individual rational clients, additional treatment is needed to facilitate communication, as it becomes possible that no client participates unless properly incentivized thus leading to terrible regret. In other words, client i𝑖iitalic_i only participates if its utility ui,t=i,tDi,tsubscript𝑢𝑖𝑡subscript𝑖𝑡subscript𝐷𝑖𝑡u_{i,t}=\mathcal{I}_{i,t}-D_{i,t}italic_u start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = caligraphic_I start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT - italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT is non-negative, where i,tsubscript𝑖𝑡\mathcal{I}_{i,t}caligraphic_I start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT is the server-provided incentive, and Di,tsubscript𝐷𝑖𝑡D_{i,t}italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT is the client’s participation cost. To address this challenge and maintain near-optimal learning outcome, Wei et al. (2023) pinpointed the core optimization problem in incentivized communication as follows:

minSt2S~iStD^i,ts.t.det(Vg,t(St))det(Vg,t(S~))βformulae-sequencesubscriptsubscript𝑆𝑡superscript2~𝑆subscript𝑖subscript𝑆𝑡subscript^𝐷𝑖𝑡𝑠𝑡subscript𝑉𝑔𝑡subscript𝑆𝑡subscript𝑉𝑔𝑡~𝑆𝛽\displaystyle\min\limits_{S_{t}\in 2^{\widetilde{S}}}\sum\limits_{i\in S_{t}}% \widehat{D}_{i,t}\;\;s.t.\;\;\frac{\det(V_{g,t}(S_{t}))}{\det(V_{g,t}(% \widetilde{S}))}\geq\betaroman_min start_POSTSUBSCRIPT italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∈ 2 start_POSTSUPERSCRIPT over~ start_ARG italic_S end_ARG end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT italic_s . italic_t . divide start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ) end_ARG start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( over~ start_ARG italic_S end_ARG ) ) end_ARG ≥ italic_β (1)

where D^i,tsubscript^𝐷𝑖𝑡\widehat{D}_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT is client i𝑖iitalic_i’s reported participation cost, Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT is the set of clients selected to participate at time step t𝑡titalic_t, S~={1,2,,N}~𝑆12𝑁\widetilde{S}=\{1,2,\cdots,N\}over~ start_ARG italic_S end_ARG = { 1 , 2 , ⋯ , italic_N } is the set of all clients, β𝛽\betaitalic_β is specified as an input to the algorithm, and Vg,t(S)=Vg,tlast+jSΔVj,tsubscript𝑉𝑔𝑡𝑆subscript𝑉𝑔subscript𝑡lastsubscript𝑗𝑆Δsubscript𝑉𝑗𝑡V_{g,t}(S)=V_{g,t_{\text{last}}}+\sum_{j\in S}\Delta V_{j,t}italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( italic_S ) = italic_V start_POSTSUBSCRIPT italic_g , italic_t start_POSTSUBSCRIPT last end_POSTSUBSCRIPT end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_j ∈ italic_S end_POSTSUBSCRIPT roman_Δ italic_V start_POSTSUBSCRIPT italic_j , italic_t end_POSTSUBSCRIPT. In particular, they assume the clients’ reported cost is simply the true cost, i.e., D^i,t=Di,tsubscript^𝐷𝑖𝑡subscript𝐷𝑖𝑡\widehat{D}_{i,t}=D_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT. A heuristic search algorithm is executed to solve the optimization problem whenever the standard communication event (Wang et al., 2020) is triggered. A detailed description of this communication protocol is provided in Appendix F.

Note that Wei et al. (2023)’s work is limited to a constant cost setting of Di,t=Ci𝕀(ΔVi,t𝟎)subscript𝐷𝑖𝑡subscript𝐶𝑖𝕀Δsubscript𝑉𝑖𝑡0D_{i,t}=C_{i}\cdot\mathbb{I}(\Delta V_{i,t}\neq\mathbf{0})italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_C start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ⋅ blackboard_I ( roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≠ bold_0 ), which restricts the actual cost Di,tsubscript𝐷𝑖𝑡D_{i,t}italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT of client i𝑖iitalic_i to be independent of time and its local updates ΔVi,tΔsubscript𝑉𝑖𝑡\Delta V_{i,t}roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT. In our work, we relax it to Di,t=f(ΔVi,t)subscript𝐷𝑖𝑡𝑓Δsubscript𝑉𝑖𝑡D_{i,t}=f(\Delta V_{i,t})italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_f ( roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ), where f𝑓fitalic_f can be any reasonable data valuation function, and even time-varying111In fact, our proposed Truth-FedBan works with any realization of the valuation function, as all that matters is that client i𝑖iitalic_i has a value Di,tsubscript𝐷𝑖𝑡D_{i,t}italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT for its data at time step t𝑡titalic_t.. Moreover, their proposed solution for Eq. (1) fails to provide any approximation guarantee on the objective, thus having no guarantee on the social cost. Below, we provide a formal definition of truthfulness and social cost employed in this paper.

Definition 1 (Truthfulness)

An incentive mechanism is truthful (i.e., incentive compatible) if at any time t𝑡titalic_t the utility ui,tsubscript𝑢𝑖𝑡u_{i,t}italic_u start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT of any client i𝑖iitalic_i is maximized when it reports its true participation cost, i.e., D^i,t=Di,tsubscriptnormal-^𝐷𝑖𝑡subscript𝐷𝑖𝑡\widehat{D}_{i,t}=D_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, regardless of the reported costs of the other clients’ D^i,tsubscriptnormal-^𝐷𝑖𝑡\widehat{D}_{-i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT.

Definition 2 (Social Cost)

The social cost of the learning system is defined as the total actual costs incurred by all participating clients in the incentivized client set Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, i.e., iStDi,tsubscript𝑖subscript𝑆𝑡subscript𝐷𝑖𝑡\sum_{i\in S_{t}}D_{i,t}∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT.

Note that the social cost defined above is different from the incentive cost studied in Wei et al. (2023), which is the total payment the server made to all clients. As truthfulness is assumed in their setting, the payment that the server needs to make to incentivize a client is trivially upper bounded by the client’s true cost. However, in order to ensure truthfulness in our setting, the server needs to overpay the selected clients (compared with their true cost). In the case where there exists monopoly client as introduced in Section 2.2, an infinite incentive cost is required.

4 Methodology

4.1 Characterization of Truthful Incentive Mechanisms

Our idea stems from the seminal result of Mu’Alem & Nisan (2008), who provided a characterization of a truthful incentive mechanism as a combination of a monotone selection rule and a critical value payment scheme, which reduces the problem of designing a truthful mechanism to that of designing a monotone selection rule. Though it is originally intended for combinatorial auctions in economics, we are the first to extend it to the incentivized communication problem in federated bandit learning, laying the foundations for future work.

Definition 3 (Monotonicity)

The selection rule for the set Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT is monotone if for any client i𝑖iitalic_i and any reported costs of the other clients D^i,tsubscriptnormal-^𝐷𝑖𝑡\widehat{D}_{-i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT, client i𝑖iitalic_i will remain selected whenever it reports D^i,tD^i,tsubscriptsuperscriptnormal-^𝐷normal-′𝑖𝑡subscriptnormal-^𝐷𝑖𝑡\widehat{D}^{\prime}_{i,t}\leq\widehat{D}_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≤ over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, provided it is incentivized when reporting D^i,tsubscriptnormal-^𝐷𝑖𝑡\widehat{D}_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT.

Furthermore, according to Mu’Alem & Nisan (2008), any monotone selection rule of the incentive mechanism has an associated critical payment scheme, with its definition given below.

Definition 4 (Critical Payment)

Let \mathcal{M}caligraphic_M be a monotone selection rule of the incentive mechanism and Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT be the set of selected clients, then for any client i𝑖iitalic_i and any reported costs of the other clients D^i,tsubscriptnormal-^𝐷𝑖𝑡\widehat{D}_{-i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT, there exists a critical value ci,t(,D^i,t)(+)subscript𝑐𝑖𝑡subscriptnormal-^𝐷𝑖𝑡subscriptc_{i,t}(\mathcal{M},\widehat{D}_{-i,t})\in(\mathbb{R}_{+}\cup\infty)italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ( caligraphic_M , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT ) ∈ ( blackboard_R start_POSTSUBSCRIPT + end_POSTSUBSCRIPT ∪ ∞ ) such that iSt𝑖subscript𝑆𝑡i\in S_{t}italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, D^i,t<ci,t(,D^i,t)for-allsubscriptnormal-^𝐷𝑖𝑡subscript𝑐𝑖𝑡subscriptnormal-^𝐷𝑖𝑡\forall\widehat{D}_{i,t}<c_{i,t}(\mathcal{M},\widehat{D}_{-i,t})∀ over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT < italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ( caligraphic_M , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT ), and iSt𝑖subscript𝑆𝑡i\notin S_{t}italic_i ∉ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, D^i,t>ci,t(,D^i,t)for-allsubscriptnormal-^𝐷𝑖𝑡subscript𝑐𝑖𝑡subscriptnormal-^𝐷𝑖𝑡\forall\widehat{D}_{i,t}>c_{i,t}(\mathcal{M},\widehat{D}_{-i,t})∀ over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT > italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ( caligraphic_M , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT ).

In this way, we can decouple the incentive i,tsubscript𝑖𝑡\mathcal{I}_{i,t}caligraphic_I start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT for client i𝑖iitalic_i from its reported participation cost D^i,tsubscript^𝐷𝑖𝑡\widehat{D}_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, and calculate the critical value based only on the other clients’ reported costs D^i,tsubscript^𝐷𝑖𝑡\widehat{D}_{-i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT. Formally,

i,t=ci,t(,D^i,t)𝕀(iSt)subscript𝑖𝑡subscript𝑐𝑖𝑡subscript^𝐷𝑖𝑡𝕀𝑖subscript𝑆𝑡\displaystyle\mathcal{I}_{i,t}=c_{i,t}(\mathcal{M},\widehat{D}_{-i,t})\cdot% \mathbb{I}(i\in S_{t})caligraphic_I start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ( caligraphic_M , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT ) ⋅ blackboard_I ( italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) (2)

which is fundamentally different from the incentive design in (Wei et al., 2023) where i,t=D^i,t𝕀(iSt)subscript𝑖𝑡subscript^𝐷𝑖𝑡𝕀𝑖subscript𝑆𝑡\mathcal{I}_{i,t}=\widehat{D}_{i,t}\cdot\mathbb{I}(i\in S_{t})caligraphic_I start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ⋅ blackboard_I ( italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ), as our payment method leaves no room for strategic clients to manipulate the incentive and benefit from misreporting.

4.2 Truth-FedBan: A Truthful Mechanism for Incentivized Communication

To balance regret and communication cost, while ensuring truthfulness and minimizing social cost, our proposed incentive mechanism Truth-FedBan inherits the incentivized communication protocol by Wei et al. (2023), with the distinction in implementing a truthful incentive search. As stated above, the truthfulness of clients is ensured once we devise a monotone algorithm for client selection, combined with a critical payment scheme. But straightforward monotone algorithms (e.g., a greedy algorithm ranking clients by their claimed costs) offer no guarantee on social cost. To address this challenge, we rewrite the original optimization problem in Eq. (1) into the following equivalent submodular set cover (SSC) problem, where g(S)𝑔𝑆g(S)italic_g ( italic_S ) is a submodular set function (see Definition 11).

minSt2S~iStD^i,ts.t.gt(St)logβ,gt(St)=logdet(Vg,t(St))det(Vg,t(S~))formulae-sequencesubscriptsubscript𝑆𝑡superscript2~𝑆subscript𝑖subscript𝑆𝑡subscript^𝐷𝑖𝑡𝑠𝑡formulae-sequencesubscript𝑔𝑡subscript𝑆𝑡𝛽subscript𝑔𝑡subscript𝑆𝑡subscript𝑉𝑔𝑡subscript𝑆𝑡subscript𝑉𝑔𝑡~𝑆\displaystyle\min\limits_{S_{t}\in 2^{\widetilde{S}}}\sum\limits_{i\in S_{t}}% \widehat{D}_{i,t}\;\;s.t.\;\;g_{t}(S_{t})\geq\log\beta,g_{t}(S_{t})=\log\frac{% \det(V_{g,t}(S_{t}))}{\det(V_{g,t}(\widetilde{S}))}roman_min start_POSTSUBSCRIPT italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∈ 2 start_POSTSUPERSCRIPT over~ start_ARG italic_S end_ARG end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT italic_s . italic_t . italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ≥ roman_log italic_β , italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) = roman_log divide start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ) end_ARG start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( over~ start_ARG italic_S end_ARG ) ) end_ARG (3)
Algorithm 1 Truthful Incentive Search
1:β𝛽\betaitalic_β, ϵ>0italic-ϵ0\epsilon>0italic_ϵ > 0
2:Stsubscript𝑆𝑡S_{t}\leftarrow\emptysetitalic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← ∅, S~={1,2,,N}~𝑆12𝑁\widetilde{S}=\{1,2,\cdots,N\}over~ start_ARG italic_S end_ARG = { 1 , 2 , ⋯ , italic_N }
3:bminiS~D^i,t𝑏subscript𝑖~𝑆subscript^𝐷𝑖𝑡b\leftarrow\min_{i\in\widetilde{S}}\widehat{D}_{i,t}italic_b ← roman_min start_POSTSUBSCRIPT italic_i ∈ over~ start_ARG italic_S end_ARG end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT
4:while gt(St)<(1e1)logβsubscript𝑔𝑡subscript𝑆𝑡1superscript𝑒1𝛽g_{t}(S_{t})<(1-e^{-1})\log\betaitalic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) < ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) roman_log italic_β do
5:     b(1+ϵ)b𝑏1italic-ϵ𝑏b\leftarrow(1+\epsilon)bitalic_b ← ( 1 + italic_ϵ ) italic_b
6:     Stsubscript𝑆𝑡absentS_{t}\leftarrowitalic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← Greedy(S~,b)normal-~𝑆𝑏(\widetilde{S},b)( over~ start_ARG italic_S end_ARG , italic_b )
7:return Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT
Algorithm 2 Greedy
1:S~~𝑆\widetilde{S}over~ start_ARG italic_S end_ARG, b𝑏bitalic_b
2:Stsubscript𝑆𝑡S_{t}\leftarrow\emptysetitalic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← ∅
3:while iStD^i,t<bsubscript𝑖subscript𝑆𝑡subscript^𝐷𝑖𝑡𝑏\sum_{i\in S_{t}}\widehat{D}_{i,t}<b∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT < italic_b do
4:     uargmaxjS~St:D^j,t+iStD^i,t<bgt(St{j})gt(St)D^j,t𝑢subscriptargmax:𝑗~𝑆subscript𝑆𝑡subscript^𝐷𝑗𝑡subscript𝑖subscript𝑆𝑡subscript^𝐷𝑖𝑡𝑏subscript𝑔𝑡subscript𝑆𝑡𝑗subscript𝑔𝑡subscript𝑆𝑡subscript^𝐷𝑗𝑡u\leftarrow\operatorname*{arg\,max}\limits_{j\in\widetilde{S}\setminus S_{t}:% \widehat{D}_{j,t}+\sum_{i\in S_{t}}\widehat{D}_{i,t}<b}\frac{g_{t}(S_{t}\cup\{% j\})-g_{t}(S_{t})}{\widehat{D}_{j,t}}italic_u ← start_OPERATOR roman_arg roman_max end_OPERATOR start_POSTSUBSCRIPT italic_j ∈ over~ start_ARG italic_S end_ARG ∖ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT : over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j , italic_t end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT < italic_b end_POSTSUBSCRIPT divide start_ARG italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∪ { italic_j } ) - italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j , italic_t end_POSTSUBSCRIPT end_ARG
5:     StSt{u}subscript𝑆𝑡subscript𝑆𝑡𝑢S_{t}\leftarrow S_{t}\cup\{u\}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∪ { italic_u }
6:return Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT

Inspired by Iyer & Bilmes (2013), we propose Algorithm 1 that achieves a constant-factor bi-criteria approximation for both the objective and constraint in the problem defined by Eq. (3). As outlined above, we first initialize a minimal budget (Line 2) for social cost and repeatedly increase the budget (Line 4) until the resulting client set found by Algorithm 2 satisfies the specified condition (Line 3).

In Algorithm 2, for a given budget b𝑏bitalic_b, we iteratively find the best set of clients from the complete client set until the budget cannot afford more clients. At each iteration, all the remaining non-selected clients are ranked based on their contribution-to-cost ratio (and hence being greedy). The algorithm then chooses the client with the highest ratio while ensuring the total cost of all selected clients is within the budget (Line 3 of Algorithm 2). The correctness of our method hinges on the following crucial monotonicity property that we prove. Interestingly, despite the wide use of greedy algorithms in submodular maximization, this monotonicity result is unknown in previous literature to the best of our knowledge. We thus present it as a proposition in case it is of independent interest.

Proposition 5 (Monotonicity)

Algorithm 1 is monotone.

It is not difficult to show that Algorithm 2 is monotone for a fixed input budget b𝑏bitalic_b — that is, if client i𝑖iitalic_i is selected under D^i,tsubscript^𝐷𝑖𝑡\widehat{D}_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT by Algorithm 2, it remains selected when it reports any D^i,tD^i,tsubscriptsuperscript^𝐷𝑖𝑡subscript^𝐷𝑖𝑡\widehat{D}^{\prime}_{i,t}\leq\widehat{D}_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≤ over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT. But it is highly non-trivial to prove monotonicity for Algorithm 1. This is because decreasing a client’s reported cost can cause a different output by Algorithm 2 and, consequently, terminate the search process in Algorithm 1 at a different budget b𝑏bitalic_b with a potentially different selection of participant set Stsubscript𝑆𝑡{S_{t}}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT. We prove Proposition 5 by showing the resulting objective value gt(St)subscript𝑔𝑡subscript𝑆𝑡g_{t}({S_{t}})italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) from Algorithm 2’s selection of clients is non-decreasing with respect to its input budget b𝑏bitalic_b. The proof is a bit involving since Algorithm 2 is an approximate algorithm and generally outputs sub-optimal solutions. We will have to show that the quality of these sub-optimal solutions — which can be close to or far away from the exact optimality — will not degenerate as the budget b𝑏bitalic_b increases. The proof of the above property, together with the formal proof of Proposition 5, can be found in Appendix A.

Lemma 6

If the selection rule of a truthful mechanism is computable in polynomial time, so is the critical payment scheme (Mu’Alem & Nisan, 2008).

Note that in the star-shaped communication network, only the server has the necessary information to calculate the critical value of each client, and we assume the server is committed not to tricking the clients. Due to space limit, we leave the detailed critical payment calculation to Appendix G. In particular, as we do not assume a monopoly-free environment, a client’s critical value could be infinite at a certain point, as introduced in Section 2.2. Nonetheless, Lemma 7 shows that this infinite payment issue can be essentially eliminated by hyper-parameter control. The time complexity analysis of Algorithm 1 can be found in Appendix H.

Lemma 7 (Elimination of Infinite Critical Value)

With parameter β(1+tL2/λd)d𝛽superscript1𝑡superscript𝐿2𝜆𝑑𝑑\beta\leq(1+tL^{2}/\lambda d)^{-d}italic_β ≤ ( 1 + italic_t italic_L start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT / italic_λ italic_d ) start_POSTSUPERSCRIPT - italic_d end_POSTSUPERSCRIPT in Algorithm 1, no client will be essential in any communication round at time step t𝑡titalic_t.

A detailed proof is provided in Appendix D. Building upon the properties above, we are now ready to state the main incentive guarantee of our Truth-FedBan protocol.

Theorem 8

The incentive mechanism induced by Algorithm 1 is (a) truthful in the sense that every client achieves the highest utility by reporting its true participation cost; and (b) individually rational in the sense that every client’s utility of participating in the mechanism is non-negative.

Proof  The truthfulness guarantee directly follows Lemma 5. Below, we further elaborate on the impact of misreporting. Denote Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT and Stsubscriptsuperscript𝑆𝑡S^{\prime}_{t}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT as the participant sets when client i𝑖iitalic_i truthfully reports and misreports its data sharing cost as D^i,t=Di,tsubscript^𝐷𝑖𝑡subscript𝐷𝑖𝑡\widehat{D}_{i,t}=D_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT and D^i,tDi,tsubscriptsuperscript^𝐷𝑖𝑡subscript𝐷𝑖𝑡\widehat{D}^{\prime}_{i,t}\neq D_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≠ italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, respectively. Let ci,tsubscript𝑐𝑖𝑡c_{i,t}italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT be the critical value of client i𝑖iitalic_i, and ui,tsubscript𝑢𝑖𝑡u_{i,t}italic_u start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT and ui,tsubscriptsuperscript𝑢𝑖𝑡u^{\prime}_{i,t}italic_u start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT be its utilities in the above two conditions respectively. According to Definition 4, we have iSt𝑖subscript𝑆𝑡i\in S_{t}italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT whenever D^i,t<ci,tsubscript^𝐷𝑖𝑡subscript𝑐𝑖𝑡\widehat{D}_{i,t}<c_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT < italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, and iSt𝑖subscriptsuperscript𝑆𝑡i\notin S^{\prime}_{t}italic_i ∉ italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT whenever D^i,t>ci,tsubscriptsuperscript^𝐷𝑖𝑡subscript𝑐𝑖𝑡\widehat{D}^{\prime}_{i,t}>c_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT > italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT. Moreover, if iSt𝑖subscript𝑆𝑡i\notin S_{t}italic_i ∉ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, then ui,t=0subscript𝑢𝑖𝑡0u_{i,t}=0italic_u start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 0. For simplicity, the subscript t𝑡titalic_t is omitted in the following discussion. Specifically, there are four possible cases: 1) iS𝑖𝑆i\in Sitalic_i ∈ italic_S and iS𝑖superscript𝑆i\in S^{\prime}italic_i ∈ italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, as critical payment is independent from the client’s reported cost D^isubscript^𝐷𝑖\widehat{D}_{i}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and D^isubscriptsuperscript^𝐷𝑖\widehat{D}^{\prime}_{i}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, therefore uiui=(ciDi)(ciDi)=0subscriptsuperscript𝑢𝑖subscript𝑢𝑖subscript𝑐𝑖subscript𝐷𝑖subscript𝑐𝑖subscript𝐷𝑖0u^{\prime}_{i}-u_{i}=(c_{i}-D_{i})-(c_{i}-D_{i})=0italic_u start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ( italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) - ( italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) = 0; 2) iS𝑖𝑆i\in Sitalic_i ∈ italic_S and iS𝑖superscript𝑆i\notin S^{\prime}italic_i ∉ italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, in this case, D^i=Di<ci<D^isubscript^𝐷𝑖subscript𝐷𝑖subscript𝑐𝑖subscriptsuperscript^𝐷𝑖\widehat{D}_{i}=D_{i}<c_{i}<\widehat{D}^{\prime}_{i}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT < italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT < over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. Therefore, uiui=0(ciDi)=Dici<0subscriptsuperscript𝑢𝑖subscript𝑢𝑖0subscript𝑐𝑖subscript𝐷𝑖subscript𝐷𝑖subscript𝑐𝑖0u^{\prime}_{i}-u_{i}=0-(c_{i}-D_{i})=D_{i}-c_{i}<0italic_u start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = 0 - ( italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) = italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT < 0; 3) iS𝑖𝑆i\notin Sitalic_i ∉ italic_S and iS𝑖superscript𝑆i\in S^{\prime}italic_i ∈ italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, in this case, D^i<ci<D^i=Disubscriptsuperscript^𝐷𝑖subscript𝑐𝑖subscript^𝐷𝑖subscript𝐷𝑖\widehat{D}^{\prime}_{i}<c_{i}<\widehat{D}_{i}=D_{i}over^ start_ARG italic_D end_ARG start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT < italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT < over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. Therefore, uiui=(ciDi)0<0subscriptsuperscript𝑢𝑖subscript𝑢𝑖subscript𝑐𝑖subscript𝐷𝑖00u^{\prime}_{i}-u_{i}=(c_{i}-D_{i})-0<0italic_u start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ( italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_D start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) - 0 < 0; 4) iS𝑖𝑆i\notin Sitalic_i ∉ italic_S and iS𝑖superscript𝑆i\notin S^{\prime}italic_i ∉ italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, in this case, both utilizes are zero, therefore uiui=00=0subscriptsuperscript𝑢𝑖subscript𝑢𝑖000u^{\prime}_{i}-u_{i}=0-0=0italic_u start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_u start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = 0 - 0 = 0. To conclude, there is no benefit to misreport under our truthful mechanism design in all cases, and only reporting the true data sharing cost can lead to the client’s best utility.

We now prove the individual rationality. Given the truthfulness guarantee, each client i𝑖iitalic_i reports its true cost D^i,t=Di,tsubscript^𝐷𝑖𝑡subscript𝐷𝑖𝑡\widehat{D}_{i,t}=D_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, and only gets incentivized if D^i,t<ci,tsubscript^𝐷𝑖𝑡subscript𝑐𝑖𝑡\widehat{D}_{i,t}<c_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT < italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT. Therefore, the utility of client i𝑖iitalic_i is ui,t=ci,tDi,t>0subscript𝑢𝑖𝑡subscript𝑐𝑖𝑡subscript𝐷𝑖𝑡0u_{i,t}=c_{i,t}-D_{i,t}>0italic_u start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT - italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT > 0 if client i𝑖iitalic_i gets incentivized; otherwise, ui,t=0subscript𝑢𝑖𝑡0u_{i,t}=0italic_u start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 0. In either case, client i𝑖iitalic_i is ensured to have a non-negative utility, which completes the proof.  

4.3 Learning Performance of Truth-FedBan Protocol

The truthfulness property above helps the system induce desirable clients participation behaviors. In this subsection, we demonstrate the learning performance of Truth-FedBan under these client behaviors. Our main results are the following guarantees regarding total social cost that the Truth-FedBan protocol has to suffer and the resultant regret guarantee it induces.

Theorem 9 (Social Cost)

For any ϵ>0italic-ϵ0\epsilon>0italic_ϵ > 0, using Algorithm 2 to search for participants in Algorithm 1 provides a [1+ϵ,1e1]1italic-ϵ1superscript𝑒1[1+\epsilon,1-e^{-1}][ 1 + italic_ϵ , 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ] bi-criteria approximation solution for the problem defined in Eq. (3). In other words, to maintain a social cost that is within a (1+ϵ)1italic-ϵ(1+\epsilon)( 1 + italic_ϵ ) factor of the optimal value, it necessitates a relaxation of the constraint by a factor of (1e1)1superscript𝑒1(1-e^{-1})( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ). Formally,

iStD^i,t(1+ϵ)iStD^i,t𝑎𝑛𝑑gt(St)(1e1)logβsubscript𝑖subscript𝑆𝑡subscript^𝐷𝑖𝑡1italic-ϵsubscript𝑖superscriptsubscript𝑆𝑡subscript^𝐷𝑖𝑡𝑎𝑛𝑑subscript𝑔𝑡subscript𝑆𝑡1superscript𝑒1𝛽\displaystyle\sum\limits_{i\in S_{t}}\widehat{D}_{i,t}\leq(1+\epsilon)\sum% \limits_{i\in S_{t}^{\star}}\widehat{D}_{i,t}\;\;\text{and}\;\;g_{t}(S_{t})% \geq(1-e^{-1})\log\beta∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≤ ( 1 + italic_ϵ ) ∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT and italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ≥ ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) roman_log italic_β

where Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT is the output of Algorithm 1, and Stsuperscriptsubscript𝑆𝑡normal-⋆S_{t}^{\star}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT is the ground-truth optimizer of Eq. (3).

Proof  Denote the optimal objective value of Eq. (3) as OPT. For the solution Stsuperscriptsubscript𝑆𝑡S_{t}^{\star}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT, we have OPT=iStD^i,tOPTsubscript𝑖superscriptsubscript𝑆𝑡subscript^𝐷𝑖𝑡\text{OPT}=\sum_{i\in S_{t}^{\star}}\widehat{D}_{i,t}OPT = ∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT and gt(St)logβsubscript𝑔𝑡superscriptsubscript𝑆𝑡𝛽g_{t}(S_{t}^{\star})\geq\log\betaitalic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT ) ≥ roman_log italic_β. To simplify out discussions, we omit the subscript t𝑡titalic_t and let Sbsubscript𝑆𝑏S_{b}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT and b𝑏bitalic_b be the output set and terminating budget of Algorithm 1 for solving the problem in Eq. (3), and Sbsubscript𝑆superscript𝑏S_{b^{\prime}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT and b=b/(1+ϵ)superscript𝑏𝑏1italic-ϵb^{\prime}=b/(1+\epsilon)italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_b / ( 1 + italic_ϵ ) be the set and budget at the previous iteration before termination, then we have

g(Sb)<(1e1)logβ𝑔subscript𝑆superscript𝑏1superscript𝑒1𝛽\displaystyle g(S_{b^{\prime}})<(1-e^{-1})\log\betaitalic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) < ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) roman_log italic_β (4)
g(Sb)(1e1)logβ𝑔subscript𝑆𝑏1superscript𝑒1𝛽\displaystyle g(S_{b})\geq(1-e^{-1})\log\betaitalic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ) ≥ ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) roman_log italic_β (5)

Denote Sbsubscriptsuperscript𝑆superscript𝑏S^{\star}_{b^{\prime}}italic_S start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT as the optimal solution for the subroutine search problem with budget bsuperscript𝑏b^{\prime}italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT (denote the problem solved by Algorithm 2 in Line 5 of Algorithm 1 as SubProblem). According to Sviridenko (2004), the approximation ratio of Algorithm 2 for this SubProblem is (1e1)1superscript𝑒1(1-e^{-1})( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ), i.e.,

g(Sb)(1e1)g(Sb)𝑔subscript𝑆superscript𝑏1superscript𝑒1𝑔subscriptsuperscript𝑆superscript𝑏\displaystyle g(S_{b^{\prime}})\geq(1-e^{-1})g(S^{\star}_{b^{\prime}})italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) ≥ ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) italic_g ( italic_S start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) (6)

Combining Eq. (4) and Eq. (6), we have g(Sb)<logβ𝑔subscriptsuperscript𝑆superscript𝑏𝛽g(S^{\star}_{b^{\prime}})<\log\betaitalic_g ( italic_S start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) < roman_log italic_β. Furthermore, we can show that OPT>bOPTsuperscript𝑏\text{OPT}>b^{\prime}OPT > italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT by contradiction. Assuming OPTbOPTsuperscript𝑏\text{OPT}\leq b^{\prime}OPT ≤ italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, then Ssuperscript𝑆S^{\star}italic_S start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT is a feasible solution for the SubProblem, and thus g(S)g(Sb)<logβ𝑔superscript𝑆𝑔subscriptsuperscript𝑆superscript𝑏𝛽g(S^{\star})\leq g(S^{\star}_{b^{\prime}})<\log\betaitalic_g ( italic_S start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT ) ≤ italic_g ( italic_S start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) < roman_log italic_β. However, this contradicts the fact that g(S)logβ𝑔superscript𝑆𝛽g(S^{\star})\geq\log\betaitalic_g ( italic_S start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT ) ≥ roman_log italic_β, so OPT>bOPTsuperscript𝑏\text{OPT}>b^{\prime}OPT > italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. Hence, we can show that the objective value of solution Sbsubscript𝑆𝑏S_{b}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT satisfies the following inequality:

iSbD^ib=(1+ϵ)b<(1+ϵ)OPTsubscript𝑖subscript𝑆𝑏subscript^𝐷𝑖𝑏1italic-ϵsuperscript𝑏1italic-ϵOPT\displaystyle\sum\limits_{i\in S_{b}}\widehat{D}_{i}\leq b=(1+\epsilon)b^{% \prime}<(1+\epsilon)\text{OPT}∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≤ italic_b = ( 1 + italic_ϵ ) italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT < ( 1 + italic_ϵ ) OPT (7)

This, combined with Eq. (5), concludes the proof.  
Since D^i,t=Di,tsubscript^𝐷𝑖𝑡subscript𝐷𝑖𝑡\widehat{D}_{i,t}=D_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT is guaranteed (see Theorem 8), Theorem 9 directly bounds the social cost as defined in Definition 2. Note that as indicated by Theorem 9, we can flexibly choose any desired level of social cost by adjusting the parameter ϵitalic-ϵ\epsilonitalic_ϵ, which allows us to accommodate various computation resources in practical scenarios. For example, in the case where computation is not a limiting factor and the core objective is to minimize the social cost, we can set the factor (1+ϵ)1italic-ϵ(1+\epsilon)( 1 + italic_ϵ ) to be almost 1, approaching the optimal social cost. Moreover, though this bi-criteria approximation slightly deviates from the constraint of the original problem in Eq. (3), it only incurs a constant-factor gap of (1e1)1superscript𝑒1(1-e^{-1})( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ), and Theorem 10 shows that we still attain near-optimal regret and communication cost, despite this deviation (see proof in Appendix E).

Theorem 10 (Regret and Communication Cost)

Under threshold β𝛽\betaitalic_β, with high probability the communication cost of Truth-FedBan satisfies CT=O(Nd2)P=O(N2d3logT)subscript𝐶𝑇normal-⋅𝑂𝑁superscript𝑑2𝑃𝑂superscript𝑁2superscript𝑑3𝑇C_{T}=O(Nd^{2})\cdot P=O(N^{2}d^{3}\log T)italic_C start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT = italic_O ( italic_N italic_d start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) ⋅ italic_P = italic_O ( italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT roman_log italic_T ), where P=O(NdlogT)𝑃𝑂𝑁𝑑𝑇P=O(Nd\log T)italic_P = italic_O ( italic_N italic_d roman_log italic_T ) is the total number of communication rounds, under the communication threshold Dc=TN2dlogTT2N2dRlogTlogβ(1e1)subscript𝐷𝑐𝑇superscript𝑁2𝑑𝑇superscript𝑇2superscript𝑁2𝑑𝑅𝑇superscript𝛽1superscript𝑒1D_{c}=\frac{T}{N^{2}d\log T}-\sqrt{\frac{T^{2}}{N^{2}dR\log T}}\log\beta^{(1-e% ^{-1})}italic_D start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT = divide start_ARG italic_T end_ARG start_ARG italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d roman_log italic_T end_ARG - square-root start_ARG divide start_ARG italic_T start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d italic_R roman_log italic_T end_ARG end_ARG roman_log italic_β start_POSTSUPERSCRIPT ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) end_POSTSUPERSCRIPT in Algorithm 6, where R=dlog(1+Tλd)𝑅𝑑1𝑇𝜆𝑑R=\left\lceil d\log(1+\frac{T}{\lambda d})\right\rceilitalic_R = ⌈ italic_d roman_log ( 1 + divide start_ARG italic_T end_ARG start_ARG italic_λ italic_d end_ARG ) ⌉. Furthermore, by setting β(1e1)e1Nsuperscript𝛽1superscript𝑒1superscript𝑒1𝑁\beta^{(1-e^{-1})}\geq e^{-\frac{1}{N}}italic_β start_POSTSUPERSCRIPT ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) end_POSTSUPERSCRIPT ≥ italic_e start_POSTSUPERSCRIPT - divide start_ARG 1 end_ARG start_ARG italic_N end_ARG end_POSTSUPERSCRIPT, the cumulative regret is RT=O(dTlogT)subscript𝑅𝑇𝑂𝑑𝑇𝑇R_{T}=O\left(d\sqrt{T}\log T\right)italic_R start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT = italic_O ( italic_d square-root start_ARG italic_T end_ARG roman_log italic_T ).

5 Experiments

To validate our method, we create a simulated federated bandit learning environment with context feature dimension d=5𝑑5d=5italic_d = 5 and N=25𝑁25N=25italic_N = 25 clients sequentially interacting with the environment for a fixed time horizon T𝑇Titalic_T. Due to space limit, more implementation details can be found in Appendix G. The results, averaged over 5 runs, are presented alongside the standard deviation.

5.1 Comparison between different truthful incentive mechanisms

Refer to caption
(a) Reg. & Commu. Cost
Refer to caption
(b) Inc. & Social Cost
Refer to caption
(c)  Truth-FedBan
Refer to caption
(d) Vanilla Greedy
Figure 1: Comparison between Truth-FedBan and vanilla greedy incentive mechanism.

We compare Truth-FedBan with a vanilla greedy algorithm (Algorithm 3). Despite Algorithm 3 also induces a monotone mechanism (and thus truthful), it does not admit any constant-factor approximation guarantee, hence is less theoretically exciting compared to Truth-FedBan. A comprehensive analysis regrading this baseline method can be found in Appendix B. As reported in Figure 1(a) and Figure  1(b), Truth-FedBan achieved competitive sub-linear regret and communication cost compared to DisLinUCB (Wang et al., 2020), with lower incentive and social costs compared to the baseline greedy method, validating our theoretical analysis.

5.2 Impact on Misreporting

Micro-level Study. In this experiment, we study how misreporting affects an individual, in terms of the client’s regret, incentive and utility. To do so, we randomly designate a client to keep misreporting throughout the entire time horizon while keeping the others being truthful, and compare the corresponding outcome for this client. We take truth-report as the benchmark and plot the individual’s total regret, incentive, and utility on the same chart using the normalized score (the respective value divided by that under truth-report), along with the actual value on top of each bar. As presented in Figure 1(c) and Figure 1(d), both Truth-FedBan and the greedy method demonstrate the ability to prevent client from benefiting via misreporting. It is important that the incentive payment (i.e., critical value) for the client is subject to the incentive mechanism and independent of its claimed cost. Therefore, though under-reporting may encourage the client to be selected by the incentive mechanism, its net utility essentially becomes negative. Meanwhile, despite over-reporting cost only undertakes the risk of being ruled out and losing incentives, it is surprising that this behavior leads to a slightly higher utility under the vanilla greedy incentive mechanism. We attribute this to the reduced participation cost incurred by the client — the less it participates, the less it suffers.

Refer to caption
(a) Regret
Refer to caption
(b) Communication Cost
Refer to caption
(c) Incentive Cost
Refer to caption
(d) Social Cost
Figure 2: Overall impact of misreporting.

Macro-level Study. As presented in Figure 2, we also empirically investigate how different levels of misreporting across the set of clients affect the entire federated learning system. Specifically, we vary the number of misreporting clients from 0% to 100% to investigate the impact on overall system performance, including regret, communication cost, incentive cost, and social cost. Generally, as guaranteed by our communication protocol, the overall regret under different degrees of misreporting remains virtually identical to the situation when no client misreports. Meanwhile, the communication cost tends to increase when clients under report and decrease when they over report. This aligns with our algorithm’s design, which selects clients based on their value-to-cost ratio (Line 3 in Algorithm 2). For example, when a client under reports, its ratio increases, which increases its chance to be selected in communication, hence leading to an increased communication cost.

An interesting finding that might seem contradictory to our discovery in the previous micro-level study is the overall impact of over reporting on incentive costs, which implies that the more clients over report, the higher the incentives they will receive. But our finding in the micro-level study suggests that over reporting brings no benefit to the client’s individual utility under Truth-FedBan. We note that the observation in our macro-level study is due to collusion among clients — once a sufficient group of clients colludes, the server has to increase the critical value or even pay infinity. This actually rationalizes individual client’s commitment to be truthful, as they are unaware of others clients’ decision on truthfulness. Meanwhile, this finding reveals the vulnerability of the incentivized truthful communication to collusion, leaving an interesting avenue for future work to explore. On the other hand, it can be observed that both overreporting and underreporting hurt the social cost until the misreporting ratio reaches approximately 50%. This is interesting from the perspective of societal divisions — when the society is equally divided into two parts, the social cost is at its largest. And as division decreases, the cost becomes lower. For example, when the misreporting ratio reaches 100%, meaning that everyone in the system is misreporting, the social cost resets the scenario where no one misreports, marking the establishment of a new stability in the system.

6 Conclusion

In this work, we introduce the first truthful incentivized communication protocol Truth-FedBan for federated bandit learning, where a set of strategic and individual rational clients are incentivized to truthfully report their cost to participate distributed learning. Our key contribution is to design a monotone client selection rule and its corresponding critical value based payment scheme. We establish the theoretical foundations for incentivized truthful communication, under which not only the social cost but also the regret and communication cost obtain their near-optimal performance. Numerical simulations verify our theoretical results, especially the truthfulness guarantee, i.e., individual clients’ utility can only be maximized when reporting their true cost.

Our work opens a broad new direction for future exploration. First of all, our truthful incentivized communication protocol is not only limited to federated bandit learning, but can be applied to general distributed learning environments where self-interested clients need to be incentivized for collaborative learning. Second, our truthful guarantee is proved for every round of communication, but it is unclear whether a client can do long-term planning to game the system. For example, keep over reporting until it becomes monopoly, ultimately leading to an infinite incentive for its participation. Last but not least, although we no longer assume clients are truthful, we still assume they are not malicious, i.e., they only want to maximize their own utility. In practice, it is necessary to investigate the problem under an adversarial context, e.g., malicious clients intentionally misreport their costs to hurt other clients’ utilities or system’s learning outcome.

References

  • Abbasi-Yadkori et al. (2011) Yasin Abbasi-Yadkori, Dávid Pál, and Csaba Szepesvári. Improved algorithms for linear stochastic bandits. In NIPS, volume 11, pp.  2312–2320, 2011.
  • Aggarwal et al. (2006) Gagan Aggarwal, Ashish Goel, and Rajeev Motwani. Truthful auctions for pricing search keywords. In Proceedings of the 7th ACM Conference on Electronic Commerce, pp.  1–7, 2006.
  • Archer & Tardos (2001) Aaron Archer and Éva Tardos. Truthful mechanisms for one-parameter agents. In Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp.  482–491. IEEE, 2001.
  • Archer & Tardos (2007) Aaron Archer and Éva Tardos. Frugal path mechanisms. ACM Transactions on Algorithms (TALG), 3(1):1–22, 2007.
  • Audibert et al. (2010) Jean-Yves Audibert, Sébastien Bubeck, and Rémi Munos. Best arm identification in multi-armed bandits. In COLT, pp.  41–53, 2010.
  • Auer et al. (2002) Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. Finite-time analysis of the multiarmed bandit problem. Machine learning, 47(2):235–256, 2002.
  • Blum et al. (2021) Avrim Blum, Nika Haghtalab, Richard Lanas Phillips, and Han Shao. One for one, or all for all: Equilibria and optimality of collaboration in federated learning. In International Conference on Machine Learning, pp. 1005–1014. PMLR, 2021.
  • Burden et al. (2015) Richard L Burden, J Douglas Faires, and Annette M Burden. Numerical analysis. Cengage learning, 2015.
  • Clarke (1971) Edward H Clarke. Multipart pricing of public goods. Public choice, pp.  17–33, 1971.
  • Donahue & Kleinberg (2023) Kate Donahue and Jon Kleinberg. Fairness in model-sharing games. In Proceedings of the ACM Web Conference 2023, pp. 3775–3783, 2023.
  • Dubey & Pentland (2020) Abhimanyu Dubey and AlexSandy’ Pentland. Differentially-private federated linear bandits. Advances in Neural Information Processing Systems, 33:6003–6014, 2020.
  • Durand et al. (2018) Audrey Durand, Charis Achilleos, Demetris Iacovides, Katerina Strati, Georgios D Mitsis, and Joelle Pineau. Contextual bandits for adapting treatment in a mouse model of de novo carcinogenesis. In Machine learning for healthcare conference, pp.  67–82. PMLR, 2018.
  • Garivier & Kaufmann (2016) Aurélien Garivier and Emilie Kaufmann. Optimal best arm identification with fixed confidence. In Conference on Learning Theory, pp.  998–1027. PMLR, 2016.
  • Groves (1973) Theodore Groves. Incentives in teams. Econometrica: Journal of the Econometric Society, pp. 617–631, 1973.
  • Harville (2008) David A Harville. Matrix Algebra From a Statistician’s Perspective. Springer Science & Business Media, 2008.
  • He et al. (2022) Jiafan He, Tianhao Wang, Yifei Min, and Quanquan Gu. A simple and provably efficient algorithm for asynchronous federated contextual linear bandits. In S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh (eds.), Advances in Neural Information Processing Systems, volume 35, pp.  4762–4775. Curran Associates, Inc., 2022.
  • Huang et al. (2021) Ruiquan Huang, Weiqiang Wu, Jing Yang, and Cong Shen. Federated linear contextual bandits. In M. Ranzato, A. Beygelzimer, Y. Dauphin, P.S. Liang, and J. Wortman Vaughan (eds.), Advances in Neural Information Processing Systems, volume 34, pp.  27057–27068. Curran Associates, Inc., 2021.
  • Iwasaki et al. (2007) Atsushi Iwasaki, David Kempe, Yasumasa Saito, Mahyar Salek, and Makoto Yokoo. False-name-proof mechanisms for hiring a team. In Internet and Network Economics: Third International Workshop, WINE 2007, San Diego, CA, USA, December 12-14, 2007. Proceedings 3, pp.  245–256. Springer, 2007.
  • Iyer & Bilmes (2013) Rishabh K Iyer and Jeff A Bilmes. Submodular optimization with submodular cover and submodular knapsack constraints. Advances in neural information processing systems, 26, 2013.
  • Kandasamy et al. (2023) Kirthevasan Kandasamy, Joseph E Gonzalez, Michael I Jordan, and Ion Stoica. Vcg mechanism design with unknown agent values under stochastic bandit feedback. Journal of Machine Learning Research, 24(53):1–45, 2023.
  • Karimireddy et al. (2022) Sai Praneeth Karimireddy, Wenshuo Guo, and Michael I Jordan. Mechanisms that incentivize data sharing in federated learning. arXiv preprint arXiv:2207.04557, 2022.
  • Landgren et al. (2016) Peter Landgren, Vaibhav Srivastava, and Naomi Ehrich Leonard. On distributed cooperative decision-making in multiarmed bandits. In 2016 European Control Conference (ECC), pp.  243–248. IEEE, 2016.
  • Lattimore & Szepesvári (2020) Tor Lattimore and Csaba Szepesvári. Bandit algorithms. Cambridge University Press, 2020.
  • Le et al. (2021) Tra Huong Thi Le, Nguyen H Tran, Yan Kyaw Tun, Minh NH Nguyen, Shashi Raj Pandey, Zhu Han, and Choong Seon Hong. An incentive mechanism for federated learning in wireless cellular networks: An auction approach. IEEE Transactions on Wireless Communications, 20(8):4874–4887, 2021.
  • Lehmann et al. (2002) Daniel Lehmann, Liadan Ita Oćallaghan, and Yoav Shoham. Truth revelation in approximately efficient combinatorial auctions. Journal of the ACM (JACM), 49(5):577–602, 2002.
  • Li & Wang (2022a) Chuanhao Li and Hongning Wang. Asynchronous upper confidence bound algorithms for federated linear bandits. In International Conference on Artificial Intelligence and Statistics, pp.  6529–6553. PMLR, 2022a.
  • Li & Wang (2022b) Chuanhao Li and Hongning Wang. Communication efficient federated learning for generalized linear bandits. In Alice H. Oh, Alekh Agarwal, Danielle Belgrave, and Kyunghyun Cho (eds.), Advances in Neural Information Processing Systems, 2022b.
  • Li et al. (2022) Chuanhao Li, Huazheng Wang, Mengdi Wang, and Hongning Wang. Communication efficient distributed learning for kernelized contextual bandits. In Alice H. Oh, Alekh Agarwal, Danielle Belgrave, and Kyunghyun Cho (eds.), Advances in Neural Information Processing Systems, 2022.
  • Li et al. (2023) Chuanhao Li, Huazheng Wang, Mengdi Wang, and Hongning Wang. Learning kernelized contextual bandits in a distributed and asynchronous environment. In The Eleventh International Conference on Learning Representations, 2023.
  • Li et al. (2010a) Lihong Li, Wei Chu, John Langford, and Robert E Schapire. A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th international conference on World wide web, pp.  661–670, 2010a.
  • Li et al. (2010b) Wei Li, Xuerui Wang, Ruofei Zhang, Ying Cui, Jianchang Mao, and Rong Jin. Exploitation and exploration in a performance based contextual advertising system. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.  27–36, 2010b.
  • Maron & Moore (1993) Oded Maron and Andrew Moore. Hoeffding races: Accelerating model selection search for classification and function approximation. Advances in neural information processing systems, 6, 1993.
  • Martínez-Rubio et al. (2019) David Martínez-Rubio, Varun Kanade, and Patrick Rebeschini. Decentralized cooperative stochastic bandits. Advances in Neural Information Processing Systems, 32, 2019.
  • Mu’Alem & Nisan (2008) Ahuva Mu’Alem and Noam Nisan. Truthful approximation mechanisms for restricted combinatorial auctions. Games and Economic Behavior, 64(2):612–631, 2008.
  • Nisan & Ronen (1999) Noam Nisan and Amir Ronen. Algorithmic mechanism design. In Proceedings of the thirty-first annual ACM symposium on Theory of computing, pp.  129–140, 1999.
  • Pei (2020) Jian Pei. A survey on data pricing: from economics to data science. IEEE Transactions on knowledge and Data Engineering, 34(10):4586–4608, 2020.
  • Procaccia (2013) Ariel D Procaccia. Cake cutting: Not just child’s play. Communications of the ACM, 56(7):78–87, 2013.
  • Procaccia & Tennenholtz (2013) Ariel D Procaccia and Moshe Tennenholtz. Approximate mechanism design without money. ACM Transactions on Economics and Computation (TEAC), 1(4):1–26, 2013.
  • Roth (1986) Alvin E Roth. On the allocation of residents to rural hospitals: a general property of two-sided matching markets. Econometrica: Journal of the Econometric Society, pp. 425–427, 1986.
  • Shi & Shen (2021) Chengshuai Shi and Cong Shen. Federated multi-armed bandits. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 35, pp.  9603–9611, 2021.
  • Shi et al. (2020) Chengshuai Shi, Wei Xiong, Cong Shen, and Jing Yang. Decentralized multi-player multi-armed bandits with no collision information. In International Conference on Artificial Intelligence and Statistics, pp.  1519–1528. PMLR, 2020.
  • Sim et al. (2020) Rachael Hwee Ling Sim, Yehong Zhang, Mun Choon Chan, and Bryan Kian Hsiang Low. Collaborative machine learning with incentive-aware model rewards. In International conference on machine learning, pp. 8927–8936. PMLR, 2020.
  • Sviridenko (2004) Maxim Sviridenko. A note on maximizing a submodular set function subject to a knapsack constraint. Operations Research Letters, 32(1):41–43, 2004.
  • Talwar (2003) Kunal Talwar. The price of truth: Frugality in truthful mechanisms. In Annual Symposium on Theoretical Aspects of Computer Science, pp.  608–619. Springer, 2003.
  • Tu et al. (2022) Xuezhen Tu, Kun Zhu, Nguyen Cong Luong, Dusit Niyato, Yang Zhang, and Juan Li. Incentive mechanisms for federated learning: From economic and game theoretic perspective. IEEE transactions on cognitive communications and networking, 8(3):1566–1593, 2022.
  • Vickrey (1961) William Vickrey. Counterspeculation, auctions, and competitive sealed tenders. The Journal of finance, 16(1):8–37, 1961.
  • Wang et al. (2020) Yuanhao Wang, Jiachen Hu, Xiaoyu Chen, and Liwei Wang. Distributed bandit learning: Near-optimal regret with efficient communication. In International Conference on Learning Representations, 2020.
  • Wei et al. (2023) Zhepei Wei, Chuanhao Li, Haifeng Xu, and Hongning Wang. Incentivized communication for federated bandits. In Thirty-seventh Conference on Neural Information Processing Systems, 2023.
  • Wolsey (1982) Laurence A Wolsey. An analysis of the greedy algorithm for the submodular set covering problem. Combinatorica, 2(4):385–393, 1982.
  • Xu et al. (2021) Xinyi Xu, Lingjuan Lyu, Xingjun Ma, Chenglin Miao, Chuan Sheng Foo, and Bryan Kian Hsiang Low. Gradient driven rewards to guarantee fairness in collaborative machine learning. Advances in Neural Information Processing Systems, 34:16104–16117, 2021.
  • Zhu et al. (2021) Zhaowei Zhu, Jingxuan Zhu, Ji Liu, and Yang Liu. Federated bandit: A gossiping approach. In Abstract Proceedings of the 2021 ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems, pp.  3–4, 2021.

Appendix A Proof of Monotonicity (Proposition 5)

Our proof of monotonicity relies on the submodularity property and the following lemma. Note that our proof holds true for any time step t𝑡titalic_t, and thus the subscript t𝑡titalic_t is omitted below to keep our notations simple.

Definition 11 (Submodularity)

A set function g:2Snormal-:𝑔normal-→superscript2𝑆g:2^{S}\rightarrow\mathbb{R}italic_g : 2 start_POSTSUPERSCRIPT italic_S end_POSTSUPERSCRIPT → blackboard_R is submodular, if for every ABS𝐴𝐵𝑆A\subseteq B\subseteq Sitalic_A ⊆ italic_B ⊆ italic_S and iSB𝑖𝑆𝐵i\in S\setminus Bitalic_i ∈ italic_S ∖ italic_B it holds that

g(A{i})g(A)g(B{i})g(B)𝑔𝐴𝑖𝑔𝐴𝑔𝐵𝑖𝑔𝐵\displaystyle g(A\cup\{i\})-g(A)\geq g(B\cup\{i\})-g(B)italic_g ( italic_A ∪ { italic_i } ) - italic_g ( italic_A ) ≥ italic_g ( italic_B ∪ { italic_i } ) - italic_g ( italic_B )
Lemma 12

Increasing the input budget of Algorithm 2 always leads to a no worse output. Formally, denote the output of Algorithm 2 as Sbsubscript𝑆𝑏S_{b}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT and Sbsubscript𝑆superscript𝑏normal-′S_{b^{\prime}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT under different input budgets b𝑏bitalic_b and bsuperscript𝑏normal-′b^{\prime}italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. For any budget pair b>bsuperscript𝑏normal-′𝑏b^{\prime}>bitalic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT > italic_b, we must have either Sb=Sbsubscript𝑆superscript𝑏normal-′subscript𝑆𝑏S_{b^{\prime}}=S_{b}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT = italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT or g(Sb)>g(Sb)𝑔subscript𝑆superscript𝑏normal-′𝑔subscript𝑆𝑏g(S_{b^{\prime}})>g(S_{b})italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) > italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ).

Proof of Lemma 12. Considering two input budget b𝑏bitalic_b and bsuperscript𝑏b^{\prime}italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT and the corresponding outputs Sbsubscript𝑆𝑏S_{b}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT and Sbsubscript𝑆superscript𝑏S_{b^{\prime}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT of Algorithm 2. In the following, we show that g(Sb)g(Sb)𝑔subscript𝑆superscript𝑏𝑔subscript𝑆𝑏g(S_{b^{\prime}})\geq g(S_{b})italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) ≥ italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ) if b>bsuperscript𝑏𝑏b^{\prime}>bitalic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT > italic_b. Without loss of generality, we denote Sb={j1,j2,,jn}2S~subscript𝑆𝑏subscript𝑗1subscript𝑗2subscript𝑗𝑛superscript2~𝑆S_{b}=\{j_{1},j_{2},\cdots,j_{n}\}\in 2^{\widetilde{S}}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT = { italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_j start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , italic_j start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT } ∈ 2 start_POSTSUPERSCRIPT over~ start_ARG italic_S end_ARG end_POSTSUPERSCRIPT and Sb={k1,k2,,km}2S~subscript𝑆superscript𝑏subscript𝑘1subscript𝑘2subscript𝑘𝑚superscript2~𝑆S_{b^{\prime}}=\{k_{1},k_{2},\cdots,k_{m}\}\in 2^{\widetilde{S}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT = { italic_k start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_k start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , italic_k start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT } ∈ 2 start_POSTSUPERSCRIPT over~ start_ARG italic_S end_ARG end_POSTSUPERSCRIPT as the corresponding output, where S~={1,2,,N}~𝑆12𝑁\widetilde{S}=\{1,2,\cdots,N\}over~ start_ARG italic_S end_ARG = { 1 , 2 , ⋯ , italic_N }, 1nN1𝑛𝑁1\leq n\leq N1 ≤ italic_n ≤ italic_N, 1mN1𝑚𝑁1\leq m\leq N1 ≤ italic_m ≤ italic_N.

Under different budget, the selected client in each round can vary due to the changed constraint in Line 3 of Algorithm 2. For example, under budget b𝑏bitalic_b, a client with the largest ratio may not be selected because including it would cause the total cost to exceed b𝑏bitalic_b. In contrast, under budget bsuperscript𝑏b^{\prime}italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, it can be selected due to the increased budget. Consequently, this can create different output sequences Sbsubscript𝑆𝑏S_{b}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT and Sbsubscript𝑆superscript𝑏S_{b^{\prime}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT.

Let τ𝜏\tauitalic_τ be the first time when the two sequences diverge, i.e, ji=ki,1i<τformulae-sequencesubscript𝑗𝑖subscript𝑘𝑖for-all1𝑖𝜏j_{i}=k_{i},\forall 1\leq i<\tauitalic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_k start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , ∀ 1 ≤ italic_i < italic_τ, and jτkτsubscript𝑗𝜏subscript𝑘𝜏j_{\tau}\neq k_{\tau}italic_j start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ≠ italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT. If such a τ𝜏\tauitalic_τ does not exist, the two sequences are precisely the same and we will have Sb=Sbsubscript𝑆superscript𝑏subscript𝑆𝑏S_{b^{\prime}}=S_{b}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT = italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT. In the remainder of this proof, we assume τ𝜏\tauitalic_τ exists and show that g(Sb)>g(Sb)𝑔subscript𝑆superscript𝑏𝑔subscript𝑆𝑏g(S_{b^{\prime}})>g(S_{b})italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) > italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ) consequently. Let Sbτsuperscriptsubscript𝑆𝑏𝜏S_{b}^{\tau}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ end_POSTSUPERSCRIPT and Sbτsuperscriptsubscript𝑆superscript𝑏𝜏S_{b^{\prime}}^{\tau}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ end_POSTSUPERSCRIPT be the set that contains the first τ𝜏\tauitalic_τ elements in Sbsubscript𝑆𝑏S_{b}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT and Sbsubscript𝑆superscript𝑏S_{b^{\prime}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT, so we have Sbτ1=Sbτ1superscriptsubscript𝑆𝑏𝜏1superscriptsubscript𝑆superscript𝑏𝜏1S_{b}^{\tau-1}=S_{b^{\prime}}^{\tau-1}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT = italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT. According to the greedy strategy (Line 3 of Algorithm 2), it is clear that D^kτ>i=τnD^jisubscript^𝐷subscript𝑘𝜏superscriptsubscript𝑖𝜏𝑛subscript^𝐷subscript𝑗𝑖\widehat{D}_{k_{\tau}}>\sum_{i=\tau}^{n}\widehat{D}_{j_{i}}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT end_POSTSUBSCRIPT > ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT, meaning that the cost of client kτsubscript𝑘𝜏k_{\tau}italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT is even higher than the total costs of clients in SbSbτ1subscript𝑆𝑏superscriptsubscript𝑆𝑏𝜏1S_{b}\setminus S_{b}^{\tau-1}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ∖ italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT, which is the reason that kτsubscript𝑘𝜏k_{\tau}italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT appears in the output Sbsubscript𝑆superscript𝑏S_{b^{\prime}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT under a larger budget bsuperscript𝑏b^{\prime}italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT but is not (thus is skipped) in the output Sbsubscript𝑆𝑏S_{b}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT under b𝑏bitalic_b. Moreover, this also implies that client kτsubscript𝑘𝜏k_{\tau}italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT has a larger value-to-cost ratio than that of any client in SbSbτ1subscript𝑆𝑏superscriptsubscript𝑆𝑏𝜏1S_{b}\setminus S_{b}^{\tau-1}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ∖ italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT at the τ𝜏\tauitalic_τ-th round, formally

g(Sbτ1{kτ})g(Sbτ1)D^kτ𝑔superscriptsubscript𝑆superscript𝑏𝜏1subscript𝑘𝜏𝑔superscriptsubscript𝑆superscript𝑏𝜏1subscript^𝐷subscript𝑘𝜏\displaystyle\frac{g(S_{b^{\prime}}^{\tau-1}\cup\{k_{\tau}\})-g(S_{b^{\prime}}% ^{\tau-1})}{\widehat{D}_{k_{\tau}}}divide start_ARG italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ∪ { italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT } ) - italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG g(Sbτ1{ji})g(Sbτ1)D^ji,i[τ,n]formulae-sequenceabsent𝑔superscriptsubscript𝑆𝑏𝜏1subscript𝑗𝑖𝑔superscriptsubscript𝑆𝑏𝜏1subscript^𝐷subscript𝑗𝑖for-all𝑖𝜏𝑛\displaystyle\geq\frac{g(S_{b}^{\tau-1}\cup\{j_{i}\})-g(S_{b}^{\tau-1})}{% \widehat{D}_{j_{i}}},\forall i\in[\tau,n]≥ divide start_ARG italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ∪ { italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } ) - italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG , ∀ italic_i ∈ [ italic_τ , italic_n ] (8)

For clarity, we denote the value of client kτsubscript𝑘𝜏k_{\tau}italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT as v(kτ|Sbτ1)=g(Sbτ1{kτ})g(Sbτ1)𝑣conditionalsubscript𝑘𝜏superscriptsubscript𝑆superscript𝑏𝜏1𝑔superscriptsubscript𝑆superscript𝑏𝜏1subscript𝑘𝜏𝑔superscriptsubscript𝑆superscript𝑏𝜏1v(k_{\tau}|S_{b^{\prime}}^{\tau-1})=g(S_{b^{\prime}}^{\tau-1}\cup\{k_{\tau}\})% -g(S_{b^{\prime}}^{\tau-1})italic_v ( italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) = italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ∪ { italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT } ) - italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ), quantifying how much client kτsubscript𝑘𝜏k_{\tau}italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT can improve the objective function g𝑔gitalic_g with respect to the set Sbτ1superscriptsubscript𝑆superscript𝑏𝜏1S_{b^{\prime}}^{\tau-1}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT. Then we have

i=τnv(ji|Sbτ1)D^jiD^jiv(kτ|Sbτ1)D^kτi=τnD^ji<v(kτ|Sbτ1)D^kτD^kτ=v(kτ|Sbτ1)superscriptsubscript𝑖𝜏𝑛𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝜏1subscript^𝐷subscript𝑗𝑖subscript^𝐷subscript𝑗𝑖𝑣conditionalsubscript𝑘𝜏superscriptsubscript𝑆superscript𝑏𝜏1subscript^𝐷subscript𝑘𝜏superscriptsubscript𝑖𝜏𝑛subscript^𝐷subscript𝑗𝑖𝑣conditionalsubscript𝑘𝜏superscriptsubscript𝑆superscript𝑏𝜏1subscript^𝐷subscript𝑘𝜏subscript^𝐷subscript𝑘𝜏𝑣conditionalsubscript𝑘𝜏superscriptsubscript𝑆superscript𝑏𝜏1\displaystyle\sum_{i=\tau}^{n}\frac{v(j_{i}|S_{b}^{\tau-1})}{\widehat{D}_{j_{i% }}}\cdot\widehat{D}_{j_{i}}\leq\frac{v(k_{\tau}|S_{b^{\prime}}^{\tau-1})}{% \widehat{D}_{k_{\tau}}}\sum_{i=\tau}^{n}\cdot\widehat{D}_{j_{i}}<\frac{v(k_{% \tau}|S_{b^{\prime}}^{\tau-1})}{\widehat{D}_{k_{\tau}}}\cdot\widehat{D}_{k_{% \tau}}=v(k_{\tau}|S_{b^{\prime}}^{\tau-1})∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT divide start_ARG italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG ⋅ over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT ≤ divide start_ARG italic_v ( italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ⋅ over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT < divide start_ARG italic_v ( italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG ⋅ over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT end_POSTSUBSCRIPT = italic_v ( italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT )

where the first inequality follows from  Eq. (8), and the second one holds true because D^kτ>i=τnD^jisubscript^𝐷subscript𝑘𝜏superscriptsubscript𝑖𝜏𝑛subscript^𝐷subscript𝑗𝑖\widehat{D}_{k_{\tau}}>\sum_{i=\tau}^{n}\widehat{D}_{j_{i}}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT end_POSTSUBSCRIPT > ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT. Therefore, we can derive that

v(kτ|Sbτ1)>i=τnv(ji|Sbτ1)𝑣conditionalsubscript𝑘𝜏superscriptsubscript𝑆superscript𝑏𝜏1superscriptsubscript𝑖𝜏𝑛𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝜏1\displaystyle v(k_{\tau}|S_{b^{\prime}}^{\tau-1})>\sum_{i=\tau}^{n}v(j_{i}|S_{% b}^{\tau-1})italic_v ( italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) > ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) (9)

Now we are ready to compare the objective value of Sbsubscript𝑆𝑏S_{b}italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT and Sbsubscript𝑆superscript𝑏S_{b^{\prime}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT, and show that g(Sb)>g(Sb)𝑔subscript𝑆superscript𝑏𝑔subscript𝑆𝑏g(S_{b^{\prime}})>g(S_{b})italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) > italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ). By simple decomposition, we can rewrite g(Sb)𝑔subscript𝑆𝑏g(S_{b})italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ) as follows

g(Sb)𝑔subscript𝑆𝑏\displaystyle g(S_{b})italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ) =g({j1,j2,,jn})absent𝑔subscript𝑗1subscript𝑗2subscript𝑗𝑛\displaystyle=g(\{j_{1},j_{2},\cdots,j_{n}\})= italic_g ( { italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_j start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , italic_j start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT } )
=g()+[g({j1})g()]+[g({j1,j2})g(j1)]++[g(Sb)g(Sb{jn})]absent𝑔delimited-[]𝑔subscript𝑗1𝑔delimited-[]𝑔subscript𝑗1subscript𝑗2𝑔subscript𝑗1delimited-[]𝑔subscript𝑆𝑏𝑔subscript𝑆𝑏subscript𝑗𝑛\displaystyle=g(\emptyset)+[g(\{j_{1}\})-g({\emptyset})]+[g(\{j_{1},j_{2}\})-g% ({j_{1}})]+\cdots+[g(S_{b})-g(S_{b}\setminus\{j_{n}\})]= italic_g ( ∅ ) + [ italic_g ( { italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT } ) - italic_g ( ∅ ) ] + [ italic_g ( { italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_j start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT } ) - italic_g ( italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) ] + ⋯ + [ italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ) - italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ∖ { italic_j start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT } ) ]
=g()+v(j1|Sb0)+v(j2|Sb1)++v(jn|Sbn1)absent𝑔𝑣conditionalsubscript𝑗1superscriptsubscript𝑆𝑏0𝑣conditionalsubscript𝑗2superscriptsubscript𝑆𝑏1𝑣conditionalsubscript𝑗𝑛superscriptsubscript𝑆𝑏𝑛1\displaystyle=g(\emptyset)+v(j_{1}|S_{b}^{0})+v(j_{2}|S_{b}^{1})+\cdots+v(j_{n% }|S_{b}^{n-1})= italic_g ( ∅ ) + italic_v ( italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 0 end_POSTSUPERSCRIPT ) + italic_v ( italic_j start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 1 end_POSTSUPERSCRIPT ) + ⋯ + italic_v ( italic_j start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n - 1 end_POSTSUPERSCRIPT )
=g()+i=1τv(ji|Sbi1)+p=τnv(jp|Sbp1)absent𝑔superscriptsubscript𝑖1𝜏𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝑖1superscriptsubscript𝑝𝜏𝑛𝑣conditionalsubscript𝑗𝑝superscriptsubscript𝑆𝑏𝑝1\displaystyle=g(\emptyset)+\sum_{i=1}^{\tau}v(j_{i}|S_{b}^{i-1})+\sum_{p=\tau}% ^{n}v(j_{p}|S_{b}^{p-1})= italic_g ( ∅ ) + ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ end_POSTSUPERSCRIPT italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT ) + ∑ start_POSTSUBSCRIPT italic_p = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_j start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_p - 1 end_POSTSUPERSCRIPT )

Likewise, we have

g(Sb)=g()+i=1τv(ki|Sbi1)+p=τnv(kp|Sbp1)𝑔subscript𝑆superscript𝑏𝑔superscriptsubscript𝑖1𝜏𝑣conditionalsubscript𝑘𝑖superscriptsubscript𝑆superscript𝑏𝑖1superscriptsubscript𝑝𝜏𝑛𝑣conditionalsubscript𝑘𝑝superscriptsubscript𝑆superscript𝑏𝑝1g(S_{b^{\prime}})=g(\emptyset)+\sum_{i=1}^{\tau}v(k_{i}|S_{b^{\prime}}^{i-1})+% \sum_{p=\tau}^{n}v(k_{p}|S_{b^{\prime}}^{p-1})italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) = italic_g ( ∅ ) + ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ end_POSTSUPERSCRIPT italic_v ( italic_k start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT ) + ∑ start_POSTSUBSCRIPT italic_p = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_k start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_p - 1 end_POSTSUPERSCRIPT )

Recall that ji=ki,i<τformulae-sequencesubscript𝑗𝑖subscript𝑘𝑖for-all𝑖𝜏j_{i}=k_{i},\forall i<\tauitalic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_k start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , ∀ italic_i < italic_τ, and thus we have v(ji|Sbi1)=v(ki|Sbi1),i<τformulae-sequence𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝑖1𝑣conditionalsubscript𝑘𝑖superscriptsubscript𝑆superscript𝑏𝑖1for-all𝑖𝜏v(j_{i}|S_{b}^{i-1})=v(k_{i}|S_{b^{\prime}}^{i-1}),\forall i<\tauitalic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT ) = italic_v ( italic_k start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT ) , ∀ italic_i < italic_τ. Therefore,

g(Sb)g(Sb)𝑔subscript𝑆superscript𝑏𝑔subscript𝑆𝑏\displaystyle g(S_{b^{\prime}})-g(S_{b})italic_g ( italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ) - italic_g ( italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT ) =i=τnv(ki|Sbi1)i=τnv(ji|Sbi1)absentsuperscriptsubscript𝑖𝜏𝑛𝑣conditionalsubscript𝑘𝑖superscriptsubscript𝑆superscript𝑏𝑖1superscriptsubscript𝑖𝜏𝑛𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝑖1\displaystyle=\sum_{i=\tau}^{n}v(k_{i}|S_{b^{\prime}}^{i-1})-\sum_{i=\tau}^{n}% v(j_{i}|S_{b}^{i-1})= ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_k start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT ) - ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT )
=v(kτ|Sbτ1)+i=τ+1nV(ki|Sbi1)i=τnv(ji|Sbi1)absent𝑣conditionalsubscript𝑘𝜏superscriptsubscript𝑆superscript𝑏𝜏1superscriptsubscript𝑖𝜏1𝑛𝑉conditionalsubscript𝑘𝑖superscriptsubscript𝑆superscript𝑏𝑖1superscriptsubscript𝑖𝜏𝑛𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝑖1\displaystyle=v(k_{\tau}|S_{b^{\prime}}^{\tau-1})+\sum_{i=\tau+1}^{n}V(k_{i}|S% _{b^{\prime}}^{i-1})-\sum_{i=\tau}^{n}v(j_{i}|S_{b}^{i-1})= italic_v ( italic_k start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) + ∑ start_POSTSUBSCRIPT italic_i = italic_τ + 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_V ( italic_k start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT ) - ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT )
>i=τnv(ji|Sbτ1)i=τnv(ji|Sbi1)+i=τ+1nv(ki|Sbi1)absentsuperscriptsubscript𝑖𝜏𝑛𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝜏1superscriptsubscript𝑖𝜏𝑛𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝑖1superscriptsubscript𝑖𝜏1𝑛𝑣conditionalsubscript𝑘𝑖superscriptsubscript𝑆superscript𝑏𝑖1\displaystyle>\sum_{i=\tau}^{n}v(j_{i}|S_{b}^{\tau-1})-\sum_{i=\tau}^{n}v(j_{i% }|S_{b}^{i-1})+\sum_{i=\tau+1}^{n}v(k_{i}|S_{b^{\prime}}^{i-1})> ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) - ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT ) + ∑ start_POSTSUBSCRIPT italic_i = italic_τ + 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_k start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT )
>i=τnv(ji|Sbτ1)v(ji|Sbi1)absentsuperscriptsubscript𝑖𝜏𝑛𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝜏1𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝑖1\displaystyle>\sum_{i=\tau}^{n}v(j_{i}|S_{b}^{\tau-1})-v(j_{i}|S_{b}^{i-1})> ∑ start_POSTSUBSCRIPT italic_i = italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) - italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT )
>0absent0\displaystyle>0> 0

where the first inequality directly follows Eq. (9), and the last step utilizes the submodularity property (see Definition 11) of the submodular function g𝑔gitalic_g, i.e., v(ji|Sbτ1)>v(ji|Sbi1),i>τformulae-sequence𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝜏1𝑣conditionalsubscript𝑗𝑖superscriptsubscript𝑆𝑏𝑖1for-all𝑖𝜏v(j_{i}|S_{b}^{\tau-1})>v(j_{i}|S_{b}^{i-1}),\forall i>\tauitalic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ - 1 end_POSTSUPERSCRIPT ) > italic_v ( italic_j start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i - 1 end_POSTSUPERSCRIPT ) , ∀ italic_i > italic_τ. This concludes the proof.  

Now we are ready to prove the monotonicity of Algorithm 1 by contradiction.

Proof of Proposition 5. An algorithm is monotone if a client α𝛼\alphaitalic_α remains selected by the algorithm whenever its reported cost satisfies D^α<D^αsubscript^superscript𝐷𝛼subscript^𝐷𝛼\widehat{D^{\prime}}_{\alpha}<\widehat{D}_{\alpha}over^ start_ARG italic_D start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT < over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT, provided it gets selected when reporting D^αsubscript^𝐷𝛼\widehat{D}_{\alpha}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT. Let S={i1,i2,,in}𝑆subscript𝑖1subscript𝑖2subscript𝑖𝑛S=\{i_{1},i_{2},\cdots,i_{n}\}italic_S = { italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_i start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , italic_i start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT } and b𝑏bitalic_b be the resulting participant set and budget determined by Algorithm 1 when client α𝛼\alphaitalic_α reports D^αsubscript^𝐷𝛼\widehat{D}_{\alpha}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT. Without loss of generality, we set α=ik𝛼subscript𝑖𝑘\alpha=i_{k}italic_α = italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, where 1kn1𝑘𝑛1\leq k\leq n1 ≤ italic_k ≤ italic_n, and denote Sk={i1,i2,,ik}superscript𝑆𝑘subscript𝑖1subscript𝑖2subscript𝑖𝑘S^{k}=\{i_{1},i_{2},\cdots,i_{k}\}italic_S start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT = { italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_i start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } as the set of clients selected before α𝛼\alphaitalic_α. According to the greedy selection strategy in Algorithm 2, we have

g(Sk1{α})g(Sk1)D^α>g(Sk1{i})g(Sk1)D^i,iS~Sk:D^i+jSk1D^jb:formulae-sequence𝑔superscript𝑆𝑘1𝛼𝑔superscript𝑆𝑘1subscript^𝐷𝛼𝑔superscript𝑆𝑘1𝑖𝑔superscript𝑆𝑘1subscript^𝐷𝑖for-all𝑖~𝑆superscript𝑆𝑘subscript^𝐷𝑖subscript𝑗superscript𝑆𝑘1subscript^𝐷𝑗𝑏\displaystyle\!\!\!\!\!\!\frac{g(S^{k-1}\cup\{\alpha\})-g(S^{k-1})}{\widehat{D% }_{\alpha}}>\frac{g(S^{k-1}\cup\{i\})-g(S^{k-1})}{\widehat{D}_{i}},\forall i% \in\widetilde{S}\setminus S^{k}:\widehat{D}_{i}+\sum_{j\in S^{k-1}}\widehat{D}% _{j}\leq bdivide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT ∪ { italic_α } ) - italic_g ( italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT end_ARG > divide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT ∪ { italic_i } ) - italic_g ( italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG , ∀ italic_i ∈ over~ start_ARG italic_S end_ARG ∖ italic_S start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT : over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_j ∈ italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≤ italic_b (10)

Denote Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT and bsuperscript𝑏b^{\prime}italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT as the resulting participant set and budget determined by Algorithm 1 when client α𝛼\alphaitalic_α reports D^α<D^αsubscript^superscript𝐷𝛼subscript^𝐷𝛼\widehat{D^{\prime}}_{\alpha}<\widehat{D}_{\alpha}over^ start_ARG italic_D start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT < over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT. Since decreasing client α𝛼\alphaitalic_α’s claimed cost will increase the ratio in the left-hand side of Eq. (10), it will remain selected (no later than the k𝑘kitalic_k-th round) when bbsuperscript𝑏𝑏b^{\prime}\leq bitalic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ≤ italic_b, otherwise the terminating participant set Sbsubscript𝑆superscript𝑏S_{b^{\prime}}italic_S start_POSTSUBSCRIPT italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT is not sufficient. The algorithm only deviates from this when the following condition is true:

g(Sk1{α})g(Sk1)D^α<g(Sk1{i})g(Sk1)D^i,iS~Sk:D^i+jSk1D^jb:formulae-sequence𝑔superscript𝑆𝑘1𝛼𝑔superscript𝑆𝑘1subscript^superscript𝐷𝛼𝑔superscript𝑆𝑘1𝑖𝑔superscript𝑆𝑘1subscript^𝐷𝑖𝑖~𝑆superscript𝑆𝑘subscript^𝐷𝑖subscript𝑗superscript𝑆𝑘1subscript^𝐷𝑗superscript𝑏\displaystyle\frac{g(S^{k-1}\cup\{\alpha\})-g(S^{k-1})}{\widehat{D^{\prime}}_{% \alpha}}<\frac{g(S^{k-1}\cup\{i\})-g(S^{k-1})}{\widehat{D}_{i}},\exists i\in% \widetilde{S}\setminus S^{k}:\widehat{D}_{i}+\sum_{j\in S^{k-1}}\widehat{D}_{j% }\leq b^{\prime}divide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT ∪ { italic_α } ) - italic_g ( italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT end_ARG < divide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT ∪ { italic_i } ) - italic_g ( italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG , ∃ italic_i ∈ over~ start_ARG italic_S end_ARG ∖ italic_S start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT : over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_j ∈ italic_S start_POSTSUPERSCRIPT italic_k - 1 end_POSTSUPERSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≤ italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT

According to Eq. (10), this is only possible when b>bsuperscript𝑏𝑏b^{\prime}>bitalic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT > italic_b because the increased budget allows additional candidate clients with both larger value and cost, potentially surpassing the largest affordable ratio under b𝑏bitalic_b. However, it contradicts the fact that any feasible terminating budget must be at most b𝑏bitalic_b — as Lemma 12 guarantees that a larger budget input to Algorithm 2 must always result in either exactly the same set or a different set with strictly higher objective value. Meanwhile, the terminating condition (Line 3 of Algorithm 1) ensures that the entire search process will promptly terminate once it finds the minimum budget that satisfies the constraint. Therefore, given budget b𝑏bitalic_b already satisfies the constraint, it is impossible for the algorithm to terminate with a solution that has a higher budget than b𝑏bitalic_b, which finishes the proof.  

Appendix B Greedy Incentive Search

In contrast to Algorithm 1, one straightforward alternative is to adopt the vanilla greedy method to solve the problem in Eq. (3), as presented in Algorithm 3. The idea is to iteratively rank all non-selected clients according to their individual value-to-cost ratio and choose the one with the largest ratio (Line 3-4), until the resulting participant set satisfies the constraint (Line 2).

Algorithm 3 Vanilla Greedy Incentive Search
1:Stsubscript𝑆𝑡S_{t}\leftarrow\emptysetitalic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← ∅, S~={1,2,,N}~𝑆12𝑁\widetilde{S}=\{1,2,\cdots,N\}over~ start_ARG italic_S end_ARG = { 1 , 2 , ⋯ , italic_N }
2:while gt(St)<logβsubscript𝑔𝑡subscript𝑆𝑡𝛽g_{t}(S_{t})<\log\betaitalic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) < roman_log italic_β do
3:     iargmaxjS~Stgt(St{j})g(St)D^j,t𝑖subscript𝑗~𝑆subscript𝑆𝑡subscript𝑔𝑡subscript𝑆𝑡𝑗𝑔subscript𝑆𝑡subscript^𝐷𝑗𝑡i\leftarrow\arg\max_{j\in\widetilde{S}\setminus S_{t}}\frac{g_{t}(S_{t}\cup\{j% \})-g(S_{t})}{\widehat{D}_{j,t}}italic_i ← roman_arg roman_max start_POSTSUBSCRIPT italic_j ∈ over~ start_ARG italic_S end_ARG ∖ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT divide start_ARG italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∪ { italic_j } ) - italic_g ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j , italic_t end_POSTSUBSCRIPT end_ARG
4:     StSt{i}subscript𝑆𝑡subscript𝑆𝑡𝑖S_{t}\leftarrow S_{t}\cup\{i\}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∪ { italic_i }
5:return S𝑆Sitalic_S.

It is not difficult to verify this straightforward greedy algorithm is also monotonic, as decreasing a client’s claimed cost essentially encourages its selection, thus making it a truthful mechanism. One notable difference between this greedy incentive search algorithm and our truthful incentive search (Algorithm 1) is that it does not compromise for the constraint. As a result, as pointed out by previous studies (Wolsey, 1982), this greedy algorithm does not admit any constant-factor approximation guarantee (i.e., it becomes problem instance specific), as shown in Lemma 13.

Lemma 13 (Theorem 2 of Wolsey (1982))

Under parameter β𝛽\betaitalic_β and clients’ reported participation cost D^t={D^1,t,,D^N,t}subscriptnormal-^𝐷𝑡subscriptnormal-^𝐷1𝑡normal-⋯subscriptnormal-^𝐷𝑁𝑡\widehat{D}_{t}=\{\widehat{D}_{1,t},\cdots,\widehat{D}_{N,t}\}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = { over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT 1 , italic_t end_POSTSUBSCRIPT , ⋯ , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_N , italic_t end_POSTSUBSCRIPT }, Algorithm 3 is guaranteed to obtain a participant set Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT such that

iSD^i,t(1+lnmin{λ1,λ2,λ3})iStD^i,t𝑎𝑛𝑑gt(St)logβsubscript𝑖𝑆subscript^𝐷𝑖𝑡1subscript𝜆1subscript𝜆2subscript𝜆3subscript𝑖superscriptsubscript𝑆𝑡subscript^𝐷𝑖𝑡𝑎𝑛𝑑subscript𝑔𝑡subscript𝑆𝑡𝛽\displaystyle\sum\limits_{i\in S}\widehat{D}_{i,t}\leq\left(1+\ln\min\{\lambda% _{1},\lambda_{2},\lambda_{3}\}\right)\sum\limits_{i\in S_{t}^{\star}}\widehat{% D}_{i,t}\;\;\text{and}\;\;g_{t}(S_{t})\geq\log\beta∑ start_POSTSUBSCRIPT italic_i ∈ italic_S end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≤ ( 1 + roman_ln roman_min { italic_λ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_λ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , italic_λ start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT } ) ∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT and italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ≥ roman_log italic_β

in which λ1=maxi,k{gt({i})gt()gt(Stk{i})gt(Stk)gt(Stk{i})gt(Stk)>0}subscript𝜆1subscript𝑖𝑘subscript𝑔𝑡𝑖subscript𝑔𝑡subscript𝑔𝑡superscriptsubscript𝑆𝑡𝑘𝑖subscript𝑔𝑡superscriptsubscript𝑆𝑡𝑘ketsubscript𝑔𝑡superscriptsubscript𝑆𝑡𝑘𝑖subscript𝑔𝑡superscriptsubscript𝑆𝑡𝑘0\lambda_{1}=\max\limits_{i,k}\{\frac{g_{t}(\{i\})-g_{t}(\emptyset)}{g_{t}(S_{t% }^{k}\cup\{i\})-g_{t}(S_{t}^{k})}\mid g_{t}(S_{t}^{k}\cup\{i\})-g_{t}(S_{t}^{k% })>0\}italic_λ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = roman_max start_POSTSUBSCRIPT italic_i , italic_k end_POSTSUBSCRIPT { divide start_ARG italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( { italic_i } ) - italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( ∅ ) end_ARG start_ARG italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT ∪ { italic_i } ) - italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT ) end_ARG ∣ italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT ∪ { italic_i } ) - italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT ) > 0 } where the denominator is the smallest non-zero marginal gain from adding any element iS~𝑖normal-~𝑆i\in\widetilde{S}italic_i ∈ over~ start_ARG italic_S end_ARG to the intermediate set Stksuperscriptsubscript𝑆𝑡𝑘S_{t}^{k}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT, i.e., the set contains the first k𝑘kitalic_k elements of the output set Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, and the numerator is the largest singleton value of g𝑔gitalic_g; λ2=σ1σKsubscript𝜆2subscript𝜎1subscript𝜎𝐾\lambda_{2}=\frac{\sigma_{1}}{\sigma_{K}}italic_λ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = divide start_ARG italic_σ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_ARG start_ARG italic_σ start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT end_ARG where K𝐾Kitalic_K is the total number of iterations in the greedy search and σk=maxigt(Stk{i})gt(Stk)D^i,tsubscript𝜎𝑘subscript𝑖subscript𝑔𝑡superscriptsubscript𝑆𝑡𝑘𝑖subscript𝑔𝑡superscriptsubscript𝑆𝑡𝑘subscriptnormal-^𝐷𝑖𝑡\sigma_{k}=\max\limits_{i}\frac{g_{t}(S_{t}^{k}\cup\{i\})-g_{t}(S_{t}^{k})}{% \widehat{D}_{i,t}}italic_σ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = roman_max start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT divide start_ARG italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT ∪ { italic_i } ) - italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT end_ARG; λ3=g(S~)g()g(S~)g(StK1)subscript𝜆3𝑔normal-~𝑆𝑔𝑔normal-~𝑆𝑔superscriptsubscript𝑆𝑡𝐾1\lambda_{3}=\frac{g(\widetilde{S})-g(\emptyset)}{g(\widetilde{S})-g(S_{t}^{K-1% })}italic_λ start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT = divide start_ARG italic_g ( over~ start_ARG italic_S end_ARG ) - italic_g ( ∅ ) end_ARG start_ARG italic_g ( over~ start_ARG italic_S end_ARG ) - italic_g ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K - 1 end_POSTSUPERSCRIPT ) end_ARG.

Alternatively, we can reformulate Algorithm 3 into an equivalent counterpart (Algorithm 4) that provides a bi-criteria approximation guarantee similar to Algorithm 1. Note that these two variants essentially lead to the same outcome when parameterized with β1=β(1e1)subscript𝛽1superscript𝛽1superscript𝑒1\beta_{1}=\beta^{(1-e^{-1})}italic_β start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_β start_POSTSUPERSCRIPT ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) end_POSTSUPERSCRIPT and β2=βsubscript𝛽2𝛽\beta_{2}=\betaitalic_β start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = italic_β, where β1subscript𝛽1\beta_{1}italic_β start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and β2subscript𝛽2\beta_{2}italic_β start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT are the specified hyper-parameters in Algorithm 3 and Algorithm 4, respectively.

Algorithm 4 Greedy Incentive Search (V2)
1:β𝛽\betaitalic_β, S~={1,2,,N}~𝑆12𝑁\widetilde{S}=\{1,2,\ldots,N\}over~ start_ARG italic_S end_ARG = { 1 , 2 , … , italic_N }
2:B𝐵absentB\leftarrowitalic_B ← OrderedBudget(S~)normal-~𝑆(\widetilde{S})( over~ start_ARG italic_S end_ARG )
3:Stsubscript𝑆𝑡S_{t}\leftarrow\emptysetitalic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← ∅, b0𝑏0b\leftarrow 0italic_b ← 0, k0𝑘0k\leftarrow 0italic_k ← 0
4:while gt(St)<(1e1)logβsubscript𝑔𝑡subscript𝑆𝑡1superscript𝑒1𝛽g_{t}(S_{t})<(1-e^{-1})\log\betaitalic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) < ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) roman_log italic_β do
5:     bb+B[k]𝑏𝑏𝐵delimited-[]𝑘b\leftarrow b+B[k]italic_b ← italic_b + italic_B [ italic_k ]
6:     S𝑆absentS\leftarrowitalic_S ← Greedy(S~,b)normal-~𝑆𝑏(\widetilde{S},b)( over~ start_ARG italic_S end_ARG , italic_b )
7:     kk+1𝑘𝑘1k\leftarrow k+1italic_k ← italic_k + 1
8:return Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT
Algorithm 5 OrderedBudget
1:S~={1,2,,N}~𝑆12𝑁\widetilde{S}=\{1,2,\cdots,N\}over~ start_ARG italic_S end_ARG = { 1 , 2 , ⋯ , italic_N }
2:Stsubscript𝑆𝑡S_{t}\leftarrow\emptysetitalic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← ∅, B𝐵B\leftarrow\emptysetitalic_B ← ∅
3:while S~St~𝑆subscript𝑆𝑡\widetilde{S}\setminus S_{t}\neq\emptysetover~ start_ARG italic_S end_ARG ∖ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ≠ ∅ do
4:     uargmaxjS~Stgt(St{j})gt(St)D^j,t𝑢subscriptargmax𝑗~𝑆subscript𝑆𝑡subscript𝑔𝑡subscript𝑆𝑡𝑗subscript𝑔𝑡subscript𝑆𝑡subscript^𝐷𝑗𝑡u\leftarrow\operatorname*{arg\,max}_{j\in\widetilde{S}\setminus S_{t}}\frac{g_% {t}(S_{t}\cup\{j\})-g_{t}(S_{t})}{\widehat{D}_{j,t}}italic_u ← start_OPERATOR roman_arg roman_max end_OPERATOR start_POSTSUBSCRIPT italic_j ∈ over~ start_ARG italic_S end_ARG ∖ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT divide start_ARG italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∪ { italic_j } ) - italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_j , italic_t end_POSTSUBSCRIPT end_ARG
5:     StSt{u}subscript𝑆𝑡subscript𝑆𝑡𝑢S_{t}\leftarrow S_{t}\cup\{u\}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ← italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∪ { italic_u }
6:     BB{D^u,t}𝐵𝐵subscript^𝐷𝑢𝑡B\leftarrow B\cup\{\widehat{D}_{u,t}\}italic_B ← italic_B ∪ { over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_u , italic_t end_POSTSUBSCRIPT }
7:return B𝐵Bitalic_B
Lemma 14

Under parameter β𝛽\betaitalic_β and clients’ reported participation cost D^t={D^1,t,,D^N,t}subscriptnormal-^𝐷𝑡subscriptnormal-^𝐷1𝑡normal-⋯subscriptnormal-^𝐷𝑁𝑡\widehat{D}_{t}=\{\widehat{D}_{1,t},\cdots,\widehat{D}_{N,t}\}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = { over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT 1 , italic_t end_POSTSUBSCRIPT , ⋯ , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_N , italic_t end_POSTSUBSCRIPT }, Algorithm 4 provides a bi-criteria approximation such that

iStD^i,tmaxD^t+iStD^i,t𝑎𝑛𝑑gt(St)(1e1)logβsubscript𝑖subscript𝑆𝑡subscript^𝐷𝑖𝑡subscript^𝐷𝑡subscript𝑖superscriptsubscript𝑆𝑡subscript^𝐷𝑖𝑡𝑎𝑛𝑑subscript𝑔𝑡subscript𝑆𝑡1superscript𝑒1𝛽\displaystyle\sum\limits_{i\in S_{t}}\widehat{D}_{i,t}\leq\max\widehat{D}_{t}+% \sum\limits_{i\in S_{t}^{\star}}\widehat{D}_{i,t}\;\;\text{and}\;\;g_{t}(S_{t}% )\geq(1-e^{-1})\log\beta∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≤ roman_max over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT and italic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ≥ ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) roman_log italic_β

where Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT is the output of Algorithm 1, and Stsuperscriptsubscript𝑆𝑡normal-⋆S_{t}^{\star}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT is the ground-truth optimizer of problem defined in  Eq. (1).

Proof of Lemma 14. The proof of this lemma largely repeats that of Lemma 9, with a minor difference in Eq. (7) (i.e., b=(1+ϵ)b𝑏1italic-ϵsuperscript𝑏b=(1+\epsilon)b^{\prime}italic_b = ( 1 + italic_ϵ ) italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT vs., b=b+B[k]𝑏superscript𝑏𝐵delimited-[]𝑘b=b^{\prime}+B[k]italic_b = italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_B [ italic_k ]). Unlike Algorithm 1 slightly increasing the budget by a constant factor (1+ϵ)1italic-ϵ(1+\epsilon)( 1 + italic_ϵ ), Algorithm 4 increases the budget in a pre-ordered way based on the result of Algorithm 5. Similar to Eq. (7), the subscript t𝑡titalic_t is omitted, and we have

iSbD^ib=b+B[k]maxD^+iSD^isubscript𝑖subscript𝑆𝑏subscript^𝐷𝑖𝑏superscript𝑏𝐵delimited-[]𝑘^𝐷subscript𝑖superscript𝑆subscript^𝐷𝑖\displaystyle\sum\limits_{i\in S_{b}}\widehat{D}_{i}\leq b=b^{\prime}+B[k]\leq% \max\widehat{D}+\sum\limits_{i\in S^{\star}}\widehat{D}_{i}∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≤ italic_b = italic_b start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_B [ italic_k ] ≤ roman_max over^ start_ARG italic_D end_ARG + ∑ start_POSTSUBSCRIPT italic_i ∈ italic_S start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT (11)

Additionally, it is not difficult to see gt(St)(1e1)logβsubscript𝑔𝑡subscript𝑆𝑡1superscript𝑒1𝛽g_{t}(S_{t})\geq(1-e^{-1})\log\betaitalic_g start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ≥ ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) roman_log italic_β since this is the terminating condition of Algorithm 4. Combining both completes the proof.  

Appendix C Technical Lemmas

Lemma 15 (Lemma 10 of Abbasi-Yadkori et al. (2011))

Suppose 𝐱1,𝐱2,,𝐱tdsubscript𝐱1subscript𝐱2normal-⋯subscript𝐱𝑡superscript𝑑\mathbf{x}_{1},\mathbf{x}_{2},\cdots,\mathbf{x}_{t}\in\mathbb{R}^{d}bold_x start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , bold_x start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT and for any 1st1𝑠𝑡1\leq s\leq t1 ≤ italic_s ≤ italic_t, 𝐱s2Lsubscriptnormsubscript𝐱𝑠2𝐿\|\mathbf{x}_{s}\|_{2}\leq L∥ bold_x start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ≤ italic_L. Let V¯t=λI+s=1t𝐱s𝐱ssubscriptnormal-¯𝑉𝑡𝜆𝐼superscriptsubscript𝑠1𝑡subscript𝐱𝑠superscriptsubscript𝐱𝑠top\overline{V}_{t}=\lambda I+\sum_{s=1}^{t}\mathbf{x}_{s}\mathbf{x}_{s}^{\top}over¯ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = italic_λ italic_I + ∑ start_POSTSUBSCRIPT italic_s = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT bold_x start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT bold_x start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT for some λ>0𝜆0\lambda>0italic_λ > 0. Then,

det(V¯t)(λ+tL2/d)d.subscript¯𝑉𝑡superscript𝜆𝑡superscript𝐿2𝑑𝑑\det(\overline{V}_{t})\leq(\lambda+tL^{2}/d)^{d}.roman_det ( over¯ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ≤ ( italic_λ + italic_t italic_L start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT / italic_d ) start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT .
Lemma 16 (Lemma 11 of Abbasi-Yadkori et al. (2011))

Let {Xt}t=1superscriptsubscriptsubscript𝑋𝑡𝑡1\left\{X_{t}\right\}_{t=1}^{\infty}{ italic_X start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_t = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∞ end_POSTSUPERSCRIPT be a sequence in dsuperscript𝑑\mathbb{R}^{d}blackboard_R start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT, V𝑉Vitalic_V is a d×d𝑑𝑑d\times ditalic_d × italic_d positive definite matrix and define Vt=V+s=1tXsXssubscript𝑉𝑡𝑉superscriptsubscript𝑠1𝑡subscript𝑋𝑠superscriptsubscript𝑋𝑠top{V}_{t}=V+\sum_{s=1}^{t}X_{s}X_{s}^{\top}italic_V start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = italic_V + ∑ start_POSTSUBSCRIPT italic_s = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT italic_X start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT italic_X start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT. Then we have that

log(det(Vn)det(V))t=1nXtVt112.detsubscript𝑉𝑛det𝑉superscriptsubscript𝑡1𝑛subscriptsuperscriptnormsubscript𝑋𝑡2superscriptsubscript𝑉𝑡11\log\left(\frac{\operatorname{det}\left({V}_{n}\right)}{\operatorname{det}(V)}% \right)\leq\sum_{t=1}^{n}\left\|X_{t}\right\|^{2}_{{V}_{t-1}^{-1}}.roman_log ( divide start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) end_ARG start_ARG roman_det ( italic_V ) end_ARG ) ≤ ∑ start_POSTSUBSCRIPT italic_t = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ∥ italic_X start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∥ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_V start_POSTSUBSCRIPT italic_t - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUBSCRIPT .

Further, if Xt2Lsubscriptnormsubscript𝑋𝑡2𝐿\left\|X_{t}\right\|_{2}\leq L∥ italic_X start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ≤ italic_L for all t𝑡titalic_t, then

t=1nmin{1,XtVt112}2(logdet(Vn)logdetV)2(dlog((trace(V)+nL2)/d)logdetV).superscriptsubscript𝑡1𝑛1superscriptsubscriptnormsubscript𝑋𝑡superscriptsubscript𝑉𝑡1122detsubscript𝑉𝑛det𝑉2𝑑trace𝑉𝑛superscript𝐿2𝑑det𝑉\sum_{t=1}^{n}\min\left\{1,\left\|X_{t}\right\|_{{V}_{t-1}^{-1}}^{2}\right\}% \leq 2\left(\log\operatorname{det}\left({V}_{n}\right)-\log\operatorname{det}V% \right)\leq 2\left(d\log\left(\left(\operatorname{trace}(V)+nL^{2}\right)/d% \right)-\log\operatorname{det}V\right).∑ start_POSTSUBSCRIPT italic_t = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT roman_min { 1 , ∥ italic_X start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT italic_V start_POSTSUBSCRIPT italic_t - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT } ≤ 2 ( roman_log roman_det ( italic_V start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) - roman_log roman_det italic_V ) ≤ 2 ( italic_d roman_log ( ( roman_trace ( italic_V ) + italic_n italic_L start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) / italic_d ) - roman_log roman_det italic_V ) .

Appendix D Proof of Lemma 7

Our proof utilizes the following matrix determinant lemma (Harville, 2008).

Lemma 17 (Matrix Determinant Lemma)

Let An×n𝐴superscript𝑛𝑛A\in\mathbb{R}^{n\times n}italic_A ∈ blackboard_R start_POSTSUPERSCRIPT italic_n × italic_n end_POSTSUPERSCRIPT be an invertible n-by-n matrix, and B,Cn×m𝐵𝐶superscript𝑛𝑚B,C\in\mathbb{R}^{n\times m}italic_B , italic_C ∈ blackboard_R start_POSTSUPERSCRIPT italic_n × italic_m end_POSTSUPERSCRIPT are n-by-m matrices, we have that

det(A+BC)=det(A)det(Im+CA1B)𝐴𝐵superscript𝐶top𝐴subscript𝐼𝑚superscript𝐶topsuperscript𝐴1𝐵\det(A+BC^{\top})=\det(A)\det(I_{m}+C^{\top}A^{-1}B)roman_det ( italic_A + italic_B italic_C start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT ) = roman_det ( italic_A ) roman_det ( italic_I start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT + italic_C start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_B )

Proof of Lemma 7. It is known that the infinite critical value is unavoidable for a monopoly client under the truthful mechanism design. To eliminate this issue, we first analyze the root cause of the existence of a monopoly client. Denote V~tsubscript~𝑉𝑡\widetilde{V}_{t}over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT as the covariance matrix constructed by all sufficient statistics available in the system at time step t𝑡titalic_t, and ΔVi,t=XnXnΔsubscript𝑉𝑖𝑡superscriptsubscript𝑋𝑛topsubscript𝑋𝑛\Delta V_{i,t}=X_{n}^{\top}X_{n}roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT, XnΔt×dsubscript𝑋𝑛superscriptΔ𝑡𝑑X_{n}\in\mathbb{R}^{\Delta t\times d}italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT roman_Δ italic_t × italic_d end_POSTSUPERSCRIPT. Specifically, client i𝑖iitalic_i is a monopoly, i.e., being essential to satisfy the constraint in Eq. (3) at time step t𝑡titalic_t, such that having all the other N1𝑁1N-1italic_N - 1 clients’ data still cannot satisfy the constraint. According to Lemma 17, plugging in A=V~tΔVi,t𝐴subscript~𝑉𝑡Δsubscript𝑉𝑖𝑡A=\widetilde{V}_{t}-\Delta V_{i,t}italic_A = over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT and B=C=Xn𝐵𝐶superscriptsubscript𝑋𝑛topB=C=X_{n}^{\top}italic_B = italic_C = italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT, we have

det(V~tΔVi,t)det(V~t)=1det(IΔt+Xn(V~tΔVi,t)1Xn)subscript~𝑉𝑡Δsubscript𝑉𝑖𝑡subscript~𝑉𝑡1subscript𝐼Δ𝑡subscript𝑋𝑛superscriptsubscript~𝑉𝑡Δsubscript𝑉𝑖𝑡1superscriptsubscript𝑋𝑛top\frac{\det(\widetilde{V}_{t}-\Delta V_{i,t})}{\det(\widetilde{V}_{t})}=\frac{1% }{\det(I_{\Delta t}+X_{n}(\widetilde{V}_{t}-\Delta V_{i,t})^{-1}X_{n}^{\top})}divide start_ARG roman_det ( over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) end_ARG start_ARG roman_det ( over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) end_ARG = divide start_ARG 1 end_ARG start_ARG roman_det ( italic_I start_POSTSUBSCRIPT roman_Δ italic_t end_POSTSUBSCRIPT + italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT ) end_ARG

where ΔVi,t=XnXn,XnΔt×dformulae-sequenceΔsubscript𝑉𝑖𝑡superscriptsubscript𝑋𝑛topsubscript𝑋𝑛subscript𝑋𝑛superscriptΔ𝑡𝑑\Delta V_{i,t}=X_{n}^{\top}X_{n},X_{n}\in\mathbb{R}^{\Delta t\times d}roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT roman_Δ italic_t × italic_d end_POSTSUPERSCRIPT, ΔtΔ𝑡\Delta troman_Δ italic_t represents the number of new data points in ΔVi,tΔsubscript𝑉𝑖𝑡\Delta V_{i,t}roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT. Next, we show that there exists a lower bound of the ratio above, such that as long as we set the hyper-parameter β𝛽\betaitalic_β less than the lower bound, it is guaranteed that no client can be essential. Moreover, for a positive definite matrix Ad×d𝐴superscript𝑑𝑑A\in\mathbb{R}^{d\times d}italic_A ∈ blackboard_R start_POSTSUPERSCRIPT italic_d × italic_d end_POSTSUPERSCRIPT, we have A1Iλmin(A)precedes-or-equalssuperscript𝐴1𝐼subscript𝜆𝑚𝑖𝑛𝐴A^{-1}\preccurlyeq\frac{I}{\lambda_{min}(A)}italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ≼ divide start_ARG italic_I end_ARG start_ARG italic_λ start_POSTSUBSCRIPT italic_m italic_i italic_n end_POSTSUBSCRIPT ( italic_A ) end_ARG where λmin(A)subscript𝜆𝑚𝑖𝑛𝐴\lambda_{min}(A)italic_λ start_POSTSUBSCRIPT italic_m italic_i italic_n end_POSTSUBSCRIPT ( italic_A ) denotes the minimum eigenvalue of A𝐴Aitalic_A. Plugging in A=V~tΔVi,t𝐴subscript~𝑉𝑡Δsubscript𝑉𝑖𝑡A=\widetilde{V}_{t}-\Delta V_{i,t}italic_A = over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, we have (V~tΔVi,t)1Iλmin(V~tΔVi,t)Iλprecedes-or-equalssuperscriptsubscript~𝑉𝑡Δsubscript𝑉𝑖𝑡1𝐼subscript𝜆𝑚𝑖𝑛subscript~𝑉𝑡Δsubscript𝑉𝑖𝑡precedes-or-equals𝐼𝜆(\widetilde{V}_{t}-\Delta V_{i,t})^{-1}\preccurlyeq\frac{I}{\lambda_{min}(% \widetilde{V}_{t}-\Delta V_{i,t})}\preccurlyeq\frac{I}{\lambda}( over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ≼ divide start_ARG italic_I end_ARG start_ARG italic_λ start_POSTSUBSCRIPT italic_m italic_i italic_n end_POSTSUBSCRIPT ( over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) end_ARG ≼ divide start_ARG italic_I end_ARG start_ARG italic_λ end_ARG, where λ>0𝜆0\lambda>0italic_λ > 0 is the regularization parameter defined in Eq. (12). It follows that

1det(IΔt+Xn(V~tΔVi,t)1Xn)1subscript𝐼Δ𝑡subscript𝑋𝑛superscriptsubscript~𝑉𝑡Δsubscript𝑉𝑖𝑡1superscriptsubscript𝑋𝑛top\displaystyle\frac{1}{\det(I_{\Delta t}+X_{n}(\widetilde{V}_{t}-\Delta V_{i,t}% )^{-1}X_{n}^{\top})}divide start_ARG 1 end_ARG start_ARG roman_det ( italic_I start_POSTSUBSCRIPT roman_Δ italic_t end_POSTSUBSCRIPT + italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT ) end_ARG 1det(IΔt+1λXnXn)absent1subscript𝐼Δ𝑡1𝜆subscript𝑋𝑛superscriptsubscript𝑋𝑛top\displaystyle\geq\frac{1}{\det(I_{\Delta t}+\frac{1}{\lambda}X_{n}X_{n}^{\top})}≥ divide start_ARG 1 end_ARG start_ARG roman_det ( italic_I start_POSTSUBSCRIPT roman_Δ italic_t end_POSTSUBSCRIPT + divide start_ARG 1 end_ARG start_ARG italic_λ end_ARG italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT ) end_ARG
=1det(Id+1λXnXn)=λddet(λId+ΔVi,t)absent1subscript𝐼𝑑1𝜆superscriptsubscript𝑋𝑛topsubscript𝑋𝑛superscript𝜆𝑑𝜆subscript𝐼𝑑Δsubscript𝑉𝑖𝑡\displaystyle=\frac{1}{\det(I_{d}+\frac{1}{\lambda}X_{n}^{\top}X_{n})}=\frac{% \lambda^{d}}{\det(\lambda I_{d}+\Delta V_{i,t})}= divide start_ARG 1 end_ARG start_ARG roman_det ( italic_I start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT + divide start_ARG 1 end_ARG start_ARG italic_λ end_ARG italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT italic_X start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) end_ARG = divide start_ARG italic_λ start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT end_ARG start_ARG roman_det ( italic_λ italic_I start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT + roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) end_ARG
λddet(Vi,t+λId)absentsuperscript𝜆𝑑subscript𝑉𝑖𝑡𝜆subscript𝐼𝑑\displaystyle\geq\frac{\lambda^{d}}{\det(V_{i,t}+\lambda I_{d})}≥ divide start_ARG italic_λ start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT end_ARG start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT + italic_λ italic_I start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ) end_ARG
λd(λ+tL2/d)d=(1+tL2/λd)dabsentsuperscript𝜆𝑑superscript𝜆𝑡superscript𝐿2𝑑𝑑superscript1𝑡superscript𝐿2𝜆𝑑𝑑\displaystyle\geq\frac{\lambda^{d}}{(\lambda+tL^{2}/d)^{d}}=(1+tL^{2}/\lambda d% )^{-d}≥ divide start_ARG italic_λ start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT end_ARG start_ARG ( italic_λ + italic_t italic_L start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT / italic_d ) start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT end_ARG = ( 1 + italic_t italic_L start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT / italic_λ italic_d ) start_POSTSUPERSCRIPT - italic_d end_POSTSUPERSCRIPT

where the second step holds by elementary algebra, the third step utilizes the fact that Vi,tΔVi,tsucceeds-or-equalssubscript𝑉𝑖𝑡Δsubscript𝑉𝑖𝑡V_{i,t}\succcurlyeq\Delta V_{i,t}italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≽ roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, and the last step follows from Lemma 15. Therefore, as long as we set β(1+tL2/λd)d𝛽superscript1𝑡superscript𝐿2𝜆𝑑𝑑\beta\leq(1+tL^{2}/\lambda d)^{-d}italic_β ≤ ( 1 + italic_t italic_L start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT / italic_λ italic_d ) start_POSTSUPERSCRIPT - italic_d end_POSTSUPERSCRIPT, it is guaranteed that no client will be essential at time step t𝑡titalic_t. This finishes the proof.  

Appendix E Communication Cost and Regret Analysis

As Truth-FedBan directly inherits from the basic protocol proposed in (Wei et al., 2023) with a truthful incentive mechanism, most part of the proof for communication cost and regret analysis (Theorem 4) in their paper extends to our problem setting. Therefore, with slight modifications, we can achieve the same sub-linear guarantee.

In essence, the only difference in terms of establishing the theoretical bounds for regret and communication cost between our method and (Wei et al., 2023) lies in the relaxation of the constraint in Eq. (3), which deviated from the original constraint in Eq. (1) by a constant-factor gap of (1e1)1superscript𝑒1(1-e^{-1})( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ). Moreover, as we reformulate the determinant ratio constraint (i.e., det(Vg,t(St))det(Vg,t(S~))βsubscript𝑉𝑔𝑡subscript𝑆𝑡subscript𝑉𝑔𝑡~𝑆𝛽\frac{\det(V_{g,t}(S_{t}))}{\det(V_{g,t}(\widetilde{S}))}\geq\betadivide start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ) end_ARG start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( over~ start_ARG italic_S end_ARG ) ) end_ARG ≥ italic_β) into a log determinant ratio constraint (i.e., logdet(Vg,t(St))det(Vg,t(S~))(1e1)logβsubscript𝑉𝑔𝑡subscript𝑆𝑡subscript𝑉𝑔𝑡~𝑆1superscript𝑒1𝛽\log\frac{\det(V_{g,t}(S_{t}))}{\det(V_{g,t}(\widetilde{S}))}\geq(1-e^{-1})\log\betaroman_log divide start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) ) end_ARG start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT ( over~ start_ARG italic_S end_ARG ) ) end_ARG ≥ ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) roman_log italic_β), the notion of β𝛽\betaitalic_β in our work is slightly different from that in their work. Specifically, denote the hyper-parameter in their method as β¯¯𝛽\overline{\beta}over¯ start_ARG italic_β end_ARG, then any β¯¯𝛽\overline{\beta}over¯ start_ARG italic_β end_ARG used in their theoretical results can be replaced by our notation of β𝛽\betaitalic_β via the transformation β¯=β1e1¯𝛽superscript𝛽1superscript𝑒1\overline{\beta}=\beta^{1-e^{-1}}over¯ start_ARG italic_β end_ARG = italic_β start_POSTSUPERSCRIPT 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUPERSCRIPT.

In the following, we present the corresponding theoretical results of our proposed Truth-FedBan and refer the readers to the proof details in Theorem 4 of (Wei et al., 2023).

Lemma 18 (Communication Frequency Bound)

By setting the communication threshold Dc=TN2dlogT(1e1)T2N2dRlogTlogβsubscript𝐷𝑐𝑇superscript𝑁2𝑑𝑇1superscript𝑒1superscript𝑇2superscript𝑁2𝑑𝑅𝑇𝛽D_{c}=\frac{T}{N^{2}d\log T}-(1-e^{-1})\sqrt{\frac{T^{2}}{N^{2}dR\log T}}\log\betaitalic_D start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT = divide start_ARG italic_T end_ARG start_ARG italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d roman_log italic_T end_ARG - ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) square-root start_ARG divide start_ARG italic_T start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d italic_R roman_log italic_T end_ARG end_ARG roman_log italic_β, the total number of communication rounds is upper bounded by

P=O(NdlogT)𝑃𝑂𝑁𝑑𝑇P=O(Nd\log T)italic_P = italic_O ( italic_N italic_d roman_log italic_T )

where R=dlog(1+Tλd)=O(dlogT)𝑅𝑑1𝑇𝜆𝑑𝑂𝑑𝑇R=\left\lceil d\log(1+\frac{T}{\lambda d})\right\rceil=O(d\log T)italic_R = ⌈ italic_d roman_log ( 1 + divide start_ARG italic_T end_ARG start_ARG italic_λ italic_d end_ARG ) ⌉ = italic_O ( italic_d roman_log italic_T ).

Communication Cost:

In each communication round, all clients first upload O(d2)𝑂superscript𝑑2O(d^{2})italic_O ( italic_d start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) scalars to the server and then download O(d2)𝑂superscript𝑑2O(d^{2})italic_O ( italic_d start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) scalars. According to Lemma 18, the total communication cost is CT=PO(Nd2)=O(N2d3logT)subscript𝐶𝑇𝑃𝑂𝑁superscript𝑑2𝑂superscript𝑁2superscript𝑑3𝑇C_{T}=P\cdot O(Nd^{2})=O(N^{2}d^{3}\log T)italic_C start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT = italic_P ⋅ italic_O ( italic_N italic_d start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) = italic_O ( italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT roman_log italic_T ).

Lemma 19 (Instantaneous Regret Bound)

Given parameter β𝛽\betaitalic_β, with probability 1δ1𝛿1-\delta1 - italic_δ, the instantaneous pseudo-regret rt=θ,𝐱𝐱tsubscript𝑟𝑡superscript𝜃normal-⋆superscript𝐱normal-⋆subscript𝐱𝑡r_{t}=\langle\theta^{\star},\mathbf{x}^{\star}-\mathbf{x}_{t}\rangleitalic_r start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = ⟨ italic_θ start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT , bold_x start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT - bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ⟩ in j𝑗jitalic_j-th communication round is bounded by

rt=O(dlogTδ)𝐱tV~t111β(1e1)det(Vg,tj)det(Vg,tj1)subscript𝑟𝑡𝑂𝑑𝑇𝛿subscriptnormsubscript𝐱𝑡superscriptsubscript~𝑉𝑡111superscript𝛽1superscript𝑒1subscript𝑉𝑔subscript𝑡𝑗subscript𝑉𝑔subscript𝑡𝑗1r_{t}=O\left(\sqrt{d\log\frac{T}{\delta}}\right)\cdot\|\mathbf{x}_{t}\|_{% \widetilde{V}_{t-1}^{-1}}\cdot\sqrt{\frac{1}{\beta^{(1-e^{-1})}}\cdot\frac{% \det(V_{g,t_{j}})}{\det(V_{g,t_{j-1}})}}italic_r start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = italic_O ( square-root start_ARG italic_d roman_log divide start_ARG italic_T end_ARG start_ARG italic_δ end_ARG end_ARG ) ⋅ ∥ bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∥ start_POSTSUBSCRIPT over~ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_t - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ⋅ square-root start_ARG divide start_ARG 1 end_ARG start_ARG italic_β start_POSTSUPERSCRIPT ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) end_POSTSUPERSCRIPT end_ARG ⋅ divide start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT ) end_ARG start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_g , italic_t start_POSTSUBSCRIPT italic_j - 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT ) end_ARG end_ARG

Proof of Theorem 10. We followed the notion of good epoch and bad epoch defined in (Wang et al., 2020). Combining with Lemma 16, we can bound the accumulative regret in the good epochs as,

REGgood=O(dβ1e1TlogTδlogT).𝑅𝐸subscript𝐺𝑔𝑜𝑜𝑑𝑂𝑑superscript𝛽1superscript𝑒1𝑇𝑇𝛿𝑙𝑜𝑔𝑇REG_{good}=O\left(\frac{d}{\sqrt{\beta^{1-e^{-1}}}}\cdot\sqrt{T}\cdot\sqrt{% \log\frac{T}{\delta}\cdot logT}\right).italic_R italic_E italic_G start_POSTSUBSCRIPT italic_g italic_o italic_o italic_d end_POSTSUBSCRIPT = italic_O ( divide start_ARG italic_d end_ARG start_ARG square-root start_ARG italic_β start_POSTSUPERSCRIPT 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUPERSCRIPT end_ARG end_ARG ⋅ square-root start_ARG italic_T end_ARG ⋅ square-root start_ARG roman_log divide start_ARG italic_T end_ARG start_ARG italic_δ end_ARG ⋅ italic_l italic_o italic_g italic_T end_ARG ) .

Furthermore, we can show that the regret across all bad epochs satisfies,

REGbad=O(Nd1.5DclogTδlogT).𝑅𝐸subscript𝐺𝑏𝑎𝑑𝑂𝑁superscript𝑑1.5subscript𝐷𝑐𝑇𝛿𝑇REG_{bad}=O\left(Nd^{1.5}\sqrt{D_{c}\cdot\log\frac{T}{\delta}}\log T\right).italic_R italic_E italic_G start_POSTSUBSCRIPT italic_b italic_a italic_d end_POSTSUBSCRIPT = italic_O ( italic_N italic_d start_POSTSUPERSCRIPT 1.5 end_POSTSUPERSCRIPT square-root start_ARG italic_D start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT ⋅ roman_log divide start_ARG italic_T end_ARG start_ARG italic_δ end_ARG end_ARG roman_log italic_T ) .

Using the communication threshold Dc=TN2dlogT(1e1)T2N2dRlogTlogβsubscript𝐷𝑐𝑇superscript𝑁2𝑑𝑇1superscript𝑒1superscript𝑇2superscript𝑁2𝑑𝑅𝑇𝛽D_{c}=\frac{T}{N^{2}d\log T}-(1-e^{-1})\sqrt{\frac{T^{2}}{N^{2}dR\log T}}\log\betaitalic_D start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT = divide start_ARG italic_T end_ARG start_ARG italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d roman_log italic_T end_ARG - ( 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) square-root start_ARG divide start_ARG italic_T start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d italic_R roman_log italic_T end_ARG end_ARG roman_log italic_β specified in Lemma 18, we have

RTsubscript𝑅𝑇\displaystyle R_{T}italic_R start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT =REGgood+REGbadabsent𝑅𝐸subscript𝐺𝑔𝑜𝑜𝑑𝑅𝐸subscript𝐺𝑏𝑎𝑑\displaystyle=REG_{good}+REG_{bad}= italic_R italic_E italic_G start_POSTSUBSCRIPT italic_g italic_o italic_o italic_d end_POSTSUBSCRIPT + italic_R italic_E italic_G start_POSTSUBSCRIPT italic_b italic_a italic_d end_POSTSUBSCRIPT
=O(dβ1e1TlogT)+O(Nd1.5log1.5TTN2dlogT+TNdlogTlog1β1e1)absent𝑂𝑑superscript𝛽1superscript𝑒1𝑇𝑇𝑂𝑁superscript𝑑1.5superscript1.5𝑇𝑇superscript𝑁2𝑑𝑇𝑇𝑁𝑑𝑇1superscript𝛽1superscript𝑒1\displaystyle=O\left(\frac{d}{\sqrt{\beta^{1-e^{-1}}}}\sqrt{T}\log T\right)+O% \left(Nd^{1.5}\log^{1.5}T\cdot\sqrt{\frac{T}{N^{2}d\log T}+\frac{T}{Nd\log T}% \log\frac{1}{\beta^{1-e^{-1}}}}\right)= italic_O ( divide start_ARG italic_d end_ARG start_ARG square-root start_ARG italic_β start_POSTSUPERSCRIPT 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUPERSCRIPT end_ARG end_ARG square-root start_ARG italic_T end_ARG roman_log italic_T ) + italic_O ( italic_N italic_d start_POSTSUPERSCRIPT 1.5 end_POSTSUPERSCRIPT roman_log start_POSTSUPERSCRIPT 1.5 end_POSTSUPERSCRIPT italic_T ⋅ square-root start_ARG divide start_ARG italic_T end_ARG start_ARG italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d roman_log italic_T end_ARG + divide start_ARG italic_T end_ARG start_ARG italic_N italic_d roman_log italic_T end_ARG roman_log divide start_ARG 1 end_ARG start_ARG italic_β start_POSTSUPERSCRIPT 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUPERSCRIPT end_ARG end_ARG )

Henceforth, by setting β1e1>e1Nsuperscript𝛽1superscript𝑒1superscript𝑒1𝑁\beta^{1-e^{-1}}>e^{-\frac{1}{N}}italic_β start_POSTSUPERSCRIPT 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUPERSCRIPT > italic_e start_POSTSUPERSCRIPT - divide start_ARG 1 end_ARG start_ARG italic_N end_ARG end_POSTSUPERSCRIPT, we can show that TN2dlogT>TNdlogTlog1β1e1𝑇superscript𝑁2𝑑𝑇𝑇𝑁𝑑𝑇1superscript𝛽1superscript𝑒1\frac{T}{N^{2}d\log T}>\frac{T}{Nd\log T}\log\frac{1}{\beta^{1-e^{-1}}}divide start_ARG italic_T end_ARG start_ARG italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_d roman_log italic_T end_ARG > divide start_ARG italic_T end_ARG start_ARG italic_N italic_d roman_log italic_T end_ARG roman_log divide start_ARG 1 end_ARG start_ARG italic_β start_POSTSUPERSCRIPT 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUPERSCRIPT end_ARG, and therefore

RT=O(dβ1e1TlogT)+O(dTlogT)=O(dTlogT)subscript𝑅𝑇𝑂𝑑superscript𝛽1superscript𝑒1𝑇𝑇𝑂𝑑𝑇𝑇𝑂𝑑𝑇𝑇\displaystyle R_{T}=O\left(\frac{d}{\sqrt{\beta^{1-e^{-1}}}}\sqrt{T}\log T% \right)+O\left(d\sqrt{T}\log T\right)=O\left(d\sqrt{T}\log T\right)italic_R start_POSTSUBSCRIPT italic_T end_POSTSUBSCRIPT = italic_O ( divide start_ARG italic_d end_ARG start_ARG square-root start_ARG italic_β start_POSTSUPERSCRIPT 1 - italic_e start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_POSTSUPERSCRIPT end_ARG end_ARG square-root start_ARG italic_T end_ARG roman_log italic_T ) + italic_O ( italic_d square-root start_ARG italic_T end_ARG roman_log italic_T ) = italic_O ( italic_d square-root start_ARG italic_T end_ARG roman_log italic_T )

This concludes the proof.  

Appendix F General Framework for Incentivized Federated Bandits

Algorithm 6 Incentivized Communication for Federated Linear Bandits
1:Dc0subscript𝐷𝑐0D_{c}\geq 0italic_D start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT ≥ 0, D^t={D^1,t,,D^N,t}subscript^𝐷𝑡subscript^𝐷1𝑡subscript^𝐷𝑁𝑡\widehat{D}_{t}=\{\widehat{D}_{1,t},\cdots,\widehat{D}_{N,t}\}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = { over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT 1 , italic_t end_POSTSUBSCRIPT , ⋯ , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_N , italic_t end_POSTSUBSCRIPT }, σ𝜎\sigmaitalic_σ, λ>0𝜆0\lambda>0italic_λ > 0, δ(0,1)𝛿01\delta\in(0,1)italic_δ ∈ ( 0 , 1 )
2:Initialize: [Server] Vg,0=𝟎d×dd×dsubscript𝑉𝑔0subscript0𝑑𝑑superscript𝑑𝑑V_{g,0}=\mathbf{0}_{d\times d}\in\mathbb{R}^{d\times d}italic_V start_POSTSUBSCRIPT italic_g , 0 end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_d × italic_d end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_d × italic_d end_POSTSUPERSCRIPT, bg,0=𝟎ddsubscript𝑏𝑔0subscript0𝑑superscript𝑑b_{g,0}=\mathbf{0}_{d}\in\mathbb{R}^{d}italic_b start_POSTSUBSCRIPT italic_g , 0 end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT
3:                        ΔVj,0=𝟎d×d,Δbj,0=𝟎dformulae-sequenceΔsubscript𝑉𝑗0subscript0𝑑𝑑Δsubscript𝑏𝑗0subscript0𝑑\Delta V_{-j,0}=\mathbf{0}_{d\times d},\Delta b_{-j,0}=\mathbf{0}_{d}roman_Δ italic_V start_POSTSUBSCRIPT - italic_j , 0 end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_d × italic_d end_POSTSUBSCRIPT , roman_Δ italic_b start_POSTSUBSCRIPT - italic_j , 0 end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT, j[N]for-all𝑗delimited-[]𝑁\forall j\in[N]∀ italic_j ∈ [ italic_N ]
4:         [All clients] Vi,0=𝟎d×dsubscript𝑉𝑖0subscript0𝑑𝑑V_{i,0}=\mathbf{0}_{d\times d}italic_V start_POSTSUBSCRIPT italic_i , 0 end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_d × italic_d end_POSTSUBSCRIPT, bi,0=𝟎dsubscript𝑏𝑖0subscript0𝑑b_{i,0}=\mathbf{0}_{d}italic_b start_POSTSUBSCRIPT italic_i , 0 end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT, ΔVi,0=𝟎d×dΔsubscript𝑉𝑖0subscript0𝑑𝑑\Delta V_{i,0}=\mathbf{0}_{d\times d}roman_Δ italic_V start_POSTSUBSCRIPT italic_i , 0 end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_d × italic_d end_POSTSUBSCRIPT, Δbi,0=𝟎dΔsubscript𝑏𝑖0subscript0𝑑\Delta b_{i,0}=\mathbf{0}_{d}roman_Δ italic_b start_POSTSUBSCRIPT italic_i , 0 end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT, Δti,0=0,i[N]formulae-sequenceΔsubscript𝑡𝑖00for-all𝑖delimited-[]𝑁\Delta t_{i,0}=0,\forall i\in[N]roman_Δ italic_t start_POSTSUBSCRIPT italic_i , 0 end_POSTSUBSCRIPT = 0 , ∀ italic_i ∈ [ italic_N ]
5:for t=1,2,,T𝑡12𝑇t=1,2,\dots,Titalic_t = 1 , 2 , … , italic_T do
6:     [Client itsubscript𝑖𝑡i_{t}italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT] Observe arm set 𝒜tsubscript𝒜𝑡\mathcal{A}_{t}caligraphic_A start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT
7:     [Client itsubscript𝑖𝑡i_{t}italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT] Select arm 𝐱t𝒜tsubscript𝐱𝑡subscript𝒜𝑡\mathbf{x}_{t}\in\mathcal{A}_{t}bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ∈ caligraphic_A start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT by Eq. (12) and observe reward ytsubscript𝑦𝑡y_{t}italic_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT
8:     [Client itsubscript𝑖𝑡i_{t}italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT] Update: Vit,t+=𝐱t𝐱titalic-+=subscript𝑉subscript𝑖𝑡𝑡subscript𝐱𝑡subscriptsuperscript𝐱top𝑡V_{i_{t},t}\mathrel{{+}{=}}\mathbf{x}_{t}\mathbf{x}^{\top}_{t}italic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT italic_+= bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT bold_x start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, bit,t+=𝐱tytitalic-+=subscript𝑏subscript𝑖𝑡𝑡subscript𝐱𝑡subscript𝑦𝑡b_{i_{t},t}\mathrel{{+}{=}}\mathbf{x}_{t}y_{t}italic_b start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT italic_+= bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT italic_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT
9:                            ΔVit,t+=𝐱t𝐱titalic-+=Δsubscript𝑉subscript𝑖𝑡𝑡subscript𝐱𝑡subscriptsuperscript𝐱top𝑡\Delta V_{i_{t},t}\mathrel{{+}{=}}\mathbf{x}_{t}\mathbf{x}^{\top}_{t}roman_Δ italic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT italic_+= bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT bold_x start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, Δbit,t+=𝐱tytitalic-+=Δsubscript𝑏subscript𝑖𝑡𝑡subscript𝐱𝑡subscript𝑦𝑡\Delta b_{i_{t},t}\mathrel{{+}{=}}\mathbf{x}_{t}y_{t}roman_Δ italic_b start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT italic_+= bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT italic_y start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT, Δtit,t+=1italic-+=Δsubscript𝑡subscript𝑖𝑡𝑡1\Delta t_{i_{t},t}\mathrel{{+}{=}}1roman_Δ italic_t start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT italic_+= 1
10:     if Δtit,tlogdet(Vit,t+λI)det(Vit,tΔVit,t+λI)>DcΔsubscript𝑡subscript𝑖𝑡𝑡subscript𝑉subscript𝑖𝑡𝑡𝜆𝐼subscript𝑉subscript𝑖𝑡𝑡Δsubscript𝑉subscript𝑖𝑡𝑡𝜆𝐼subscript𝐷𝑐\Delta t_{i_{t},t}\log\frac{\det(V_{i_{t},t}+\lambda I)}{\det(V_{i_{t},t}-% \Delta V_{i_{t},t}+\lambda I)}>D_{c}roman_Δ italic_t start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT roman_log divide start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT + italic_λ italic_I ) end_ARG start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT - roman_Δ italic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT + italic_λ italic_I ) end_ARG > italic_D start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT then
11:         [All clients normal-→\rightarrow Server] Upload ΔVi,tΔsubscript𝑉𝑖𝑡\Delta V_{i,t}roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, and let St~={1,2,,N}~subscript𝑆𝑡12𝑁\widetilde{S_{t}}=\{1,2,\cdots,N\}over~ start_ARG italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_ARG = { 1 , 2 , ⋯ , italic_N }
12:         [Server] Select incentivized participants St=(S~t|D^t)subscript𝑆𝑡conditionalsubscript~𝑆𝑡subscript^𝐷𝑡S_{t}=\mathcal{M}(\widetilde{S}_{t}|\widehat{D}_{t})italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = caligraphic_M ( over~ start_ARG italic_S end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT | over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT ) \triangleright Incentive Mechanism
13:         for iSt𝑖subscript𝑆𝑡i\in S_{t}italic_i ∈ italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT do
14:              [Participant inormal-→𝑖absenti\rightarrowitalic_i → Server] Upload Δbi,tΔsubscript𝑏𝑖𝑡\Delta b_{i,t}roman_Δ italic_b start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT
15:              [Server] Update: Vg,t+=ΔVi,titalic-+=subscript𝑉𝑔𝑡Δsubscript𝑉𝑖𝑡V_{g,t}\mathrel{{+}{=}}\Delta V_{i,t}italic_V start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT italic_+= roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, bg,t+=Δbi,titalic-+=subscript𝑏𝑔𝑡Δsubscript𝑏𝑖𝑡b_{g,t}\mathrel{{+}{=}}\Delta b_{i,t}italic_b start_POSTSUBSCRIPT italic_g , italic_t end_POSTSUBSCRIPT italic_+= roman_Δ italic_b start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT
16:                                   ΔVj,t+=ΔVi,titalic-+=Δsubscript𝑉𝑗𝑡Δsubscript𝑉𝑖𝑡\Delta V_{-j,t}\mathrel{{+}{=}}\Delta V_{i,t}roman_Δ italic_V start_POSTSUBSCRIPT - italic_j , italic_t end_POSTSUBSCRIPT italic_+= roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, Δbj,t+=Δbi,t,jiformulae-sequenceitalic-+=Δsubscript𝑏𝑗𝑡Δsubscript𝑏𝑖𝑡for-all𝑗𝑖\Delta b_{-j,t}\mathrel{{+}{=}}\Delta b_{i,t},\forall j\neq iroman_Δ italic_b start_POSTSUBSCRIPT - italic_j , italic_t end_POSTSUBSCRIPT italic_+= roman_Δ italic_b start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT , ∀ italic_j ≠ italic_i
17:              [Participant i𝑖iitalic_i] Update: ΔVi,t=0Δsubscript𝑉𝑖𝑡0\Delta V_{i,t}=0roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 0, Δbi,t=0Δsubscript𝑏𝑖𝑡0\Delta b_{i,t}=0roman_Δ italic_b start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 0, Δti,t=0Δsubscript𝑡𝑖𝑡0\Delta t_{i,t}=0roman_Δ italic_t start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 0          
18:         for i[N]for-all𝑖delimited-[]𝑁\forall i\in[N]∀ italic_i ∈ [ italic_N ] do
19:              [Server normal-→\rightarrow All Clients] Download ΔVi,tΔsubscript𝑉𝑖𝑡\Delta V_{-i,t}roman_Δ italic_V start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT, Δbi,tΔsubscript𝑏𝑖𝑡\Delta b_{-i,t}roman_Δ italic_b start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT
20:              [Client i𝑖iitalic_i] Update: Vi,t+=ΔVi,titalic-+=subscript𝑉𝑖𝑡Δsubscript𝑉𝑖𝑡V_{i,t}\mathrel{{+}{=}}\Delta V_{-i,t}italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT italic_+= roman_Δ italic_V start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT, bi,t+=Δbi,titalic-+=subscript𝑏𝑖𝑡Δsubscript𝑏𝑖𝑡b_{i,t}\mathrel{{+}{=}}\Delta b_{-i,t}italic_b start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT italic_+= roman_Δ italic_b start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT
21:              [Server] Update: ΔVi,t=0Δsubscript𝑉𝑖𝑡0\Delta V_{-i,t}=0roman_Δ italic_V start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT = 0, Δbi,t=0Δsubscript𝑏𝑖𝑡0\Delta b_{-i,t}=0roman_Δ italic_b start_POSTSUBSCRIPT - italic_i , italic_t end_POSTSUBSCRIPT = 0               

Algorihtm 6 shows the incentivized communication protocol proposed by Wei et al. (2023). The arm selection strategy for client itsubscript𝑖𝑡i_{t}italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT as time step t𝑡titalic_t is based on the upper confidence bound method:

𝐱t=argmax𝐱𝒜t𝐱θ^it,t1(λ)+αit,t1𝐱Vit,t11(λ)subscript𝐱𝑡subscriptargmax𝐱subscript𝒜𝑡superscript𝐱topsubscript^𝜃subscript𝑖𝑡𝑡1𝜆subscript𝛼subscript𝑖𝑡𝑡1subscriptnorm𝐱subscriptsuperscript𝑉1subscript𝑖𝑡𝑡1𝜆\mathbf{x}_{t}=\operatorname*{arg\,max}_{\mathbf{x}\in\mathcal{A}_{t}}{\mathbf% {x}^{\top}\hat{\theta}_{i_{t},t-1}(\lambda)+\alpha_{i_{t},t-1}||\mathbf{x}||_{% V^{-1}_{i_{t},t-1}(\lambda)}}bold_x start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = start_OPERATOR roman_arg roman_max end_OPERATOR start_POSTSUBSCRIPT bold_x ∈ caligraphic_A start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT bold_x start_POSTSUPERSCRIPT ⊤ end_POSTSUPERSCRIPT over^ start_ARG italic_θ end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT ( italic_λ ) + italic_α start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT | | bold_x | | start_POSTSUBSCRIPT italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT ( italic_λ ) end_POSTSUBSCRIPT (12)

where θ^it,t1(λ)=Vit,t11(λ)bit,t1subscript^𝜃subscript𝑖𝑡𝑡1𝜆subscriptsuperscript𝑉1subscript𝑖𝑡𝑡1𝜆subscript𝑏subscript𝑖𝑡𝑡1\hat{\theta}_{i_{t},t-1}(\lambda)=V^{-1}_{i_{t},t-1}(\lambda)b_{i_{t},t-1}over^ start_ARG italic_θ end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT ( italic_λ ) = italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT ( italic_λ ) italic_b start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT is the ridge regression estimator of θsubscript𝜃\theta_{\star}italic_θ start_POSTSUBSCRIPT ⋆ end_POSTSUBSCRIPT with regularization parameter λ>0𝜆0\lambda>0italic_λ > 0, Vit,t1(λ)=Vit,t1+λIsubscript𝑉subscript𝑖𝑡𝑡1𝜆subscript𝑉subscript𝑖𝑡𝑡1𝜆𝐼V_{i_{t},t-1}(\lambda)=V_{i_{t},t-1}+\lambda Iitalic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT ( italic_λ ) = italic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT + italic_λ italic_I, and αit,t1=σlogdet(Vit,t1(λ))det(λI)+2log1/δ+λsubscript𝛼subscript𝑖𝑡𝑡1𝜎subscript𝑉subscript𝑖𝑡𝑡1𝜆𝜆𝐼21𝛿𝜆\alpha_{i_{t},t-1}=\sigma\sqrt{\log{\frac{\det({V_{i_{t},t-1}(\lambda))}}{\det% {(\lambda I)}}}+2\log{1/\delta}}+\sqrt{\lambda}italic_α start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT = italic_σ square-root start_ARG roman_log divide start_ARG roman_det ( italic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t - 1 end_POSTSUBSCRIPT ( italic_λ ) ) end_ARG start_ARG roman_det ( italic_λ italic_I ) end_ARG + 2 roman_log 1 / italic_δ end_ARG + square-root start_ARG italic_λ end_ARG. Vit,t(λ)subscript𝑉subscript𝑖𝑡𝑡𝜆V_{i_{t},t}(\lambda)italic_V start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT , italic_t end_POSTSUBSCRIPT ( italic_λ ) denotes the covariance matrix constructed using the data available to client itsubscript𝑖𝑡i_{t}italic_i start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT up to time t𝑡titalic_t.

Appendix G Implementation Details

G.1 Hyper-parameter Settings

As introduced in Section 3, the proposed Truth-FedBan works with any realization of the valuation function. For demonstration purpose, we instantiate it as a combination of client’s weighted data collection cost plus its intrinsic preference cost, i.e., f(ΔVi,t)=wdet(ΔVi,t)+Ci𝑓Δsubscript𝑉𝑖𝑡𝑤Δsubscript𝑉𝑖𝑡subscript𝐶𝑖f(\Delta V_{i,t})=w\cdot\det(\Delta V_{i,t})+C_{i}italic_f ( roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) = italic_w ⋅ roman_det ( roman_Δ italic_V start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) + italic_C start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, where w=104𝑤superscript104w=10^{-4}italic_w = 10 start_POSTSUPERSCRIPT - 4 end_POSTSUPERSCRIPT, and each client i𝑖iitalic_i’s intrinsic preference cost Cisubscript𝐶𝑖C_{i}italic_C start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is uniformly sampled from U(0,100)𝑈0100U(0,100)italic_U ( 0 , 100 ). In the simulated environment (Section 5), the time horizon is T=6250𝑇6250T=6250italic_T = 6250, total number of clients N=25𝑁25N=25italic_N = 25, context dimension d=5𝑑5d=5italic_d = 5. We set the hyper-parameter ϵ=1.0italic-ϵ1.0\epsilon=1.0italic_ϵ = 1.0, β=0.5𝛽0.5\beta=0.5italic_β = 0.5 in Algorithm 1 and Algorithm 3. The tolerance factor in Algorithm 7 is γ=1.0𝛾1.0\gamma=1.0italic_γ = 1.0.

As stated in Section 4.2, we do not assume a monopoly-free environment and thus any truthful incentive mechanism has to pay essential clients infinite incentives to guarantee their participation when necessary. Nonetheless, to visualize the impact of infinite payment, we simplify it as a constant value of 104superscript10410^{4}10 start_POSTSUPERSCRIPT 4 end_POSTSUPERSCRIPT that is orders of magnitude greater than the average participation cost. and the infinite critical value is simplified.

G.2 Critical Value Calculation for Algorihtm 3

It is not difficult to show that Algorithm 3 is also monotone and thus inherently associated with a critical payment scheme to make the resulting mechanism truthful. We now elaborate on the critical value calculation method for it. And the critical value based payment scheme for Algorithm 1 can be derived in a similar spirit.

For each client αS𝛼𝑆\alpha\in Sitalic_α ∈ italic_S in the participant set S𝑆Sitalic_S (subscript t𝑡titalic_t is omitted for simplicity), the critical value cαsubscript𝑐𝛼c_{\alpha}italic_c start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT is determined as follows. First, rerun Algorithm 3 without client α𝛼\alphaitalic_α, i.e., setting S~=S~{α}superscript~𝑆~𝑆𝛼\widetilde{S}^{\prime}=\widetilde{S}\setminus\{\alpha\}over~ start_ARG italic_S end_ARG start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = over~ start_ARG italic_S end_ARG ∖ { italic_α }; if the process fails to terminate with a feasible set Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, it suggests that client α𝛼\alphaitalic_α is essential to satisfy the constraint, then its critical value is cα=subscript𝑐𝛼c_{\alpha}=\inftyitalic_c start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT = ∞. Otherwise, the process can terminate and return a feasible set, denoted as S={i1,i2,,iK}superscript𝑆subscript𝑖1subscript𝑖2subscript𝑖𝐾S^{\prime}=\{i_{1},i_{2},\cdots,i_{K}\}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = { italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_i start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , italic_i start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT }, then the critical value cαsubscript𝑐𝛼c_{\alpha}italic_c start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT is calculated by

cα=maxk[K]D^ikg(Sk1{α})g(Sk1)g(Sk1{ik})g(Sk1)subscript𝑐𝛼subscript𝑘delimited-[]𝐾subscript^𝐷subscript𝑖𝑘𝑔subscriptsuperscript𝑆𝑘1𝛼𝑔subscriptsuperscript𝑆𝑘1𝑔subscriptsuperscript𝑆𝑘1subscript𝑖𝑘𝑔subscriptsuperscript𝑆𝑘1\displaystyle c_{\alpha}=\max\limits_{k\in[K]}\widehat{D}_{i_{k}}\cdot\frac{g(% S^{\prime}_{k-1}\cup\{\alpha\})-g(S^{\prime}_{k-1})}{g(S^{\prime}_{k-1}\cup\{i% _{k}\})-g(S^{\prime}_{k-1})}italic_c start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT = roman_max start_POSTSUBSCRIPT italic_k ∈ [ italic_K ] end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ⋅ divide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ∪ { italic_α } ) - italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ) end_ARG start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ∪ { italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } ) - italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ) end_ARG (13)

where iksubscript𝑖𝑘i_{k}italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and Sksubscriptsuperscript𝑆𝑘S^{\prime}_{k}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT represent the selected client and intermediate set of Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT at k𝑘kitalic_k-th round. Denote v(α|Sk1)=g(Sk1{α})g(Sk1)𝑣conditional𝛼subscriptsuperscript𝑆𝑘1𝑔subscriptsuperscript𝑆𝑘1𝛼𝑔subscriptsuperscript𝑆𝑘1v(\alpha|S^{\prime}_{k-1})=g(S^{\prime}_{k-1}\cup\{\alpha\})-g(S^{\prime}_{k-1})italic_v ( italic_α | italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ) = italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ∪ { italic_α } ) - italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ), now suppose we are placing client α𝛼\alphaitalic_α at the k𝑘kitalic_k-th position of Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. To do so, the maximal participation cost that client α𝛼\alphaitalic_α can claim should satisfy that the corresponding value-to-cost ratio is higher than that of client iksubscript𝑖𝑘i_{k}italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, i.e., v(α|Sk1)/D^αv(ik|Sk1)/D^ik𝑣conditional𝛼subscriptsuperscript𝑆𝑘1subscript^𝐷𝛼𝑣conditionalsubscript𝑖𝑘subscriptsuperscript𝑆𝑘1subscript^𝐷subscript𝑖𝑘v(\alpha|S^{\prime}_{k-1})/\widehat{D}_{\alpha}\geq v(i_{k}|S^{\prime}_{k-1})/% \widehat{D}_{i_{k}}italic_v ( italic_α | italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ) / over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT ≥ italic_v ( italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ) / over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT. In other words, the maximal cost client α𝛼\alphaitalic_α can claim to replace iksubscript𝑖𝑘i_{k}italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT is D^α=D^ikv(α|Sk1)/v(ik|Sk1)subscript^𝐷𝛼subscript^𝐷subscript𝑖𝑘𝑣conditional𝛼subscriptsuperscript𝑆𝑘1𝑣conditionalsubscript𝑖𝑘subscriptsuperscript𝑆𝑘1\widehat{D}_{\alpha}=\widehat{D}_{i_{k}}\cdot v(\alpha|S^{\prime}_{k-1})/v(i_{% k}|S^{\prime}_{k-1})over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT = over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT ⋅ italic_v ( italic_α | italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ) / italic_v ( italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ). Therefore, the critical value cαsubscript𝑐𝛼c_{\alpha}italic_c start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT calculated in Eq. (13) ensures that as long as the client α𝛼\alphaitalic_α claims slightly less than cαsubscript𝑐𝛼c_{\alpha}italic_c start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT, it can replace at least one client in the K𝐾Kitalic_K rounds, thus becomes selected by the server. On the contrary, if D^isubscript^𝐷𝑖\widehat{D}_{i}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is higher than cαsubscript𝑐𝛼c_{\alpha}italic_c start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT, we can show that it will by no means get selected by the server. Specifically, the condition D^α>cαsubscript^𝐷𝛼subscript𝑐𝛼\hat{D}_{\alpha}>c_{\alpha}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT > italic_c start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT guarantees g(Sk1{α})g(Sk1)D^α<g(Sk1{ik})g(Sk1)D^ik,k[K]formulae-sequence𝑔subscriptsuperscript𝑆𝑘1𝛼𝑔subscriptsuperscript𝑆𝑘1subscript^𝐷𝛼𝑔subscriptsuperscript𝑆𝑘1subscript𝑖𝑘𝑔subscriptsuperscript𝑆𝑘1subscript^𝐷subscript𝑖𝑘for-all𝑘delimited-[]𝐾\frac{g(S^{\prime}_{k-1}\cup\{\alpha\})-g(S^{\prime}_{k-1})}{\hat{D}_{\alpha}}% <\frac{g(S^{\prime}_{k-1}\cup\{i_{k}\})-g(S^{\prime}_{k-1})}{\widehat{D}_{i_{k% }}},\forall k\in[K]divide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ∪ { italic_α } ) - italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT end_ARG < divide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ∪ { italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } ) - italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG , ∀ italic_k ∈ [ italic_K ]. We can start from the selection of the first client k=1𝑘1k=1italic_k = 1, and we want to guarantee client α𝛼\alphaitalic_α will not be selected. The condition tells us g(α)D^α<g(i1)D^i1𝑔𝛼subscript^𝐷𝛼𝑔subscript𝑖1subscript^𝐷subscript𝑖1\frac{g(\alpha)}{\hat{D}_{\alpha}}<\frac{g(i_{1})}{\widehat{D}_{i_{1}}}divide start_ARG italic_g ( italic_α ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT end_ARG < divide start_ARG italic_g ( italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG, where i1subscript𝑖1i_{1}italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT denotes the client that was selected in the first place when we exclude α𝛼\alphaitalic_α. We know g(i1)D^i1𝑔subscript𝑖1subscript^𝐷subscript𝑖1\frac{g(i_{1})}{\widehat{D}_{i_{1}}}divide start_ARG italic_g ( italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG is also higher than all the other clients, so algorithm will still select client i1subscript𝑖1i_{1}italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT, i.e., S1={i1}=S1subscript𝑆1subscript𝑖1superscriptsubscript𝑆1S_{1}=\{i_{1}\}=S_{1}^{\prime}italic_S start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = { italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT } = italic_S start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. Then for k=2𝑘2k=2italic_k = 2, the condition suggests g(S1{α})g(S1)D^α=g(S1{α})g(S1)D^α<g(S1{i2})g(S1)D^i2=g(S1{i2})g(S1)D^i2𝑔subscript𝑆1𝛼𝑔subscript𝑆1subscript^𝐷𝛼𝑔subscriptsuperscript𝑆1𝛼𝑔subscriptsuperscript𝑆1subscript^𝐷𝛼𝑔subscriptsuperscript𝑆1subscript𝑖2𝑔subscriptsuperscript𝑆1subscript^𝐷subscript𝑖2𝑔subscript𝑆1subscript𝑖2𝑔subscript𝑆1subscript^𝐷subscript𝑖2\frac{g(S_{1}\cup\{\alpha\})-g(S_{1})}{\hat{D}_{\alpha}}=\frac{g(S^{\prime}_{1% }\cup\{\alpha\})-g(S^{\prime}_{1})}{\hat{D}_{\alpha}}<\frac{g(S^{\prime}_{1}% \cup\{i_{2}\})-g(S^{\prime}_{1})}{\widehat{D}_{i_{2}}}=\frac{g(S_{1}\cup\{i_{2% }\})-g(S_{1})}{\widehat{D}_{i_{2}}}divide start_ARG italic_g ( italic_S start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ∪ { italic_α } ) - italic_g ( italic_S start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT end_ARG = divide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ∪ { italic_α } ) - italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_α end_POSTSUBSCRIPT end_ARG < divide start_ARG italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ∪ { italic_i start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT } ) - italic_g ( italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG = divide start_ARG italic_g ( italic_S start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ∪ { italic_i start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT } ) - italic_g ( italic_S start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) end_ARG start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_ARG. Therefore, α𝛼\alphaitalic_α will not be selected at k=2𝑘2k=2italic_k = 2 either, and S2=S2subscript𝑆2superscriptsubscript𝑆2S_{2}=S_{2}^{\prime}italic_S start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = italic_S start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. We can show client α𝛼\alphaitalic_α will not be selected in S𝑆Sitalic_S by induction.

G.3 Critical Value Calculation for Algorihtm 1

In contrast, there is no explicit formula to calculate the critical value in Truth-FedBan. Following Mu’Alem & Nisan (2008), we calculate the critical value using bisection search as described in Algorithm 7.

Algorithm 7 Critical Value Calculation (Bisection Search)
1:S~={1,2,,N}~𝑆12𝑁\widetilde{S}=\{1,2,\cdots,N\}over~ start_ARG italic_S end_ARG = { 1 , 2 , ⋯ , italic_N }, D^t={D^1,t,D^2,t,,D^N,t}subscript^𝐷𝑡subscript^𝐷1𝑡subscript^𝐷2𝑡subscript^𝐷𝑁𝑡\widehat{D}_{t}=\{\widehat{D}_{1,t},\widehat{D}_{2,t},\cdots,\widehat{D}_{N,t}\}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = { over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT 1 , italic_t end_POSTSUBSCRIPT , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT 2 , italic_t end_POSTSUBSCRIPT , ⋯ , over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_N , italic_t end_POSTSUBSCRIPT }, incentive mechanism \mathcal{M}caligraphic_M, concerned client i𝑖iitalic_i, budget b𝑏bitalic_b, tolerance γ𝛾\gammaitalic_γ
2:Initialization: L0𝐿0L\leftarrow 0italic_L ← 0, Hb𝐻𝑏H\leftarrow bitalic_H ← italic_b
3:while HL2γ𝐻𝐿2𝛾\frac{H-L}{2}\geq\gammadivide start_ARG italic_H - italic_L end_ARG start_ARG 2 end_ARG ≥ italic_γ do
4:     Calculate critical value: ciL+H2subscript𝑐𝑖𝐿𝐻2c_{i}\leftarrow\frac{L+H}{2}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ← divide start_ARG italic_L + italic_H end_ARG start_ARG 2 end_ARG
5:     Update D^:D^i,tci,t:^𝐷subscript^𝐷𝑖𝑡subscript𝑐𝑖𝑡\widehat{D}:\widehat{D}_{i,t}\leftarrow c_{i,t}over^ start_ARG italic_D end_ARG : over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ← italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT
6:     Run incentive mechanism: S=(S~;D^)𝑆~𝑆^𝐷S=\mathcal{M}(\widetilde{S};\widehat{D})italic_S = caligraphic_M ( over~ start_ARG italic_S end_ARG ; over^ start_ARG italic_D end_ARG )\triangleright Algorithm 1
7:     if iS𝑖𝑆i\in Sitalic_i ∈ italic_S then
8:         Lci,t𝐿subscript𝑐𝑖𝑡L\leftarrow c_{i,t}italic_L ← italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT
9:     else
10:         Hci,t𝐻subscript𝑐𝑖𝑡H\leftarrow c_{i,t}italic_H ← italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT      
11:Return client i𝑖iitalic_i’s critical value ci,tsubscript𝑐𝑖𝑡c_{i,t}italic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT

The idea remains the same as stated above, to calculate the critical value of a particular client, we first rerun Algorithm 1 without it in the candidate client set. If the client is essential, its critical value is ci,t=subscript𝑐𝑖𝑡c_{i,t}=\inftyitalic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = ∞. Otherwise, we can calculate the critical value via Algorithm 7. Specifically, for any participant i𝑖iitalic_i in the set Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT found by Algorithm 1, it is clear that the bound of i𝑖iitalic_i’s critical value is its claimed cost D^i,tsubscript^𝐷𝑖𝑡\widehat{D}_{i,t}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, otherwise it would not have been included in Stsubscript𝑆𝑡S_{t}italic_S start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT. Denote b𝑏bitalic_b as the terminating budget determined by Algorithm 1 when client i𝑖iitalic_i is not considered, we can also have a upper bound for ci,tbsubscript𝑐𝑖𝑡𝑏c_{i,t}\leq bitalic_c start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ≤ italic_b. With the lower and upper bound as input to Algorithm 7, it has been proven (Burden et al., 2015) that the number of iterations that Algorithm 7 needs to converge to a root to within a certain tolerance γ𝛾\gammaitalic_γ is bounded by log2(γ0γ)subscript2subscript𝛾0𝛾\lceil\log_{2}(\frac{\gamma_{0}}{\gamma})\rceil⌈ roman_log start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( divide start_ARG italic_γ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT end_ARG start_ARG italic_γ end_ARG ) ⌉, where γ0=|b|subscript𝛾0𝑏\gamma_{0}=|b|italic_γ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT = | italic_b |.

Appendix H Time Complexity Analysis of Algorithm 1

As the proposed Algorithm 1 includes a subroutine process of Algorithm 2, thus we start the time complexity analysis with Algorithm 2. Specifically, the worst-case time complexity of the while loop is O(N)𝑂𝑁O(N)italic_O ( italic_N ). The operation inside the while loop involves finding the maximum element in a set, which takes O(N)𝑂𝑁O(N)italic_O ( italic_N ) time. Therefore, the time complexity of Algorithm 2 is O(N2)𝑂superscript𝑁2O(N^{2})italic_O ( italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ).

Let M𝑀Mitalic_M be the number of iterations of the while loop (Line 3) in Algorithm 1. Hence, the time complexity of Algorithm 1 is O(MN2)𝑂𝑀superscript𝑁2O(M\cdot N^{2})italic_O ( italic_M ⋅ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ). Specifically, the worst case is to consistently increase the budget b𝑏bitalic_b until it reaches i=1ND^i,tsuperscriptsubscript𝑖1𝑁subscript^𝐷𝑖𝑡\sum_{i=1}^{N}\widehat{D}_{i,t}∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT. Therefore, we can upper bound M𝑀Mitalic_M by considering the loop-breaking case: b0(1+ϵ)Mi=1ND^i,tsubscript𝑏0superscript1italic-ϵ𝑀superscriptsubscript𝑖1𝑁subscript^𝐷𝑖𝑡b_{0}\cdot(1+\epsilon)^{M}\geq\sum_{i=1}^{N}\widehat{D}_{i,t}italic_b start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT ⋅ ( 1 + italic_ϵ ) start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT ≥ ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT, i.e., Mlog1+ϵ(i=1ND^i,tb0)𝑀subscript1italic-ϵsuperscriptsubscript𝑖1𝑁subscript^𝐷𝑖𝑡subscript𝑏0M\leq\left\lceil\log_{1+\epsilon}\left(\sum_{i=1}^{N}\frac{\widehat{D}_{i,t}}{% b_{0}}\right)\right\rceilitalic_M ≤ ⌈ roman_log start_POSTSUBSCRIPT 1 + italic_ϵ end_POSTSUBSCRIPT ( ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT end_ARG start_ARG italic_b start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT end_ARG ) ⌉, where b0=miniS~D^i,tsubscript𝑏0subscript𝑖~𝑆subscript^𝐷𝑖𝑡b_{0}=\min_{i\in\widetilde{S}}\widehat{D}_{i,t}italic_b start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT = roman_min start_POSTSUBSCRIPT italic_i ∈ over~ start_ARG italic_S end_ARG end_POSTSUBSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT. As a result, Algorithm 1 yields the following polynomial time complexity of O(log1+ϵ(i=1ND^i,tb0)N2)𝑂subscript1italic-ϵsuperscriptsubscript𝑖1𝑁subscript^𝐷𝑖𝑡subscript𝑏0superscript𝑁2O(\left\lceil\log_{1+\epsilon}\left(\sum_{i=1}^{N}\frac{\widehat{D}_{i,t}}{b_{% 0}}\right)\right\rceil\cdot N^{2})italic_O ( ⌈ roman_log start_POSTSUBSCRIPT 1 + italic_ϵ end_POSTSUBSCRIPT ( ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT end_ARG start_ARG italic_b start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT end_ARG ) ⌉ ⋅ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ).