Contract
Contract
Contents
Discrimination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
ear Pricing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.3.1 Regulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1
1.3.4 Optimal Income Taxation . . . . . . . . . . . . . . . . . . . . . . . 30
2.2 Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.3 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3 Incomplete Contracts 54
2
4 Auction Theory 64
4.4 Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
5 Matching Theory 83
3
Introduction
• What is contract? - ‘A specification of actions that named parties are supposed to take
at various times, generally as a function of the conditions that hold’ (Shavell, 2004).
− Some party might have incentive to behave opportunistically at the expense of others.
− In an ideal world, people can write a complete contingent contract that induces all
the parties to take the ‘right’ actions in every possible state of world, which leads to a
• Contract theory studies what will or should be the form of contracts in less than ideal
− Hidden action (or moral hazard ): when the involved party’s behavior cannot be per-
− Hidden information (or adverse selection): when the involved party has private infor-
− Contractual incompleteness: when contracts do not deal with all relevant contingen-
cies.
• There are many applications of contract theory, among which the followings are impor-
tant:
4
− Labor contracts
− Regulation
− Price discrimination
− Optimal taxation.
− Financial contracts
− Auctions
• In most applications, one party, called ‘principal ’, offers a contract to the other party,
called ‘agent’.
− Multiple principals + one agent (common agency), e.g. lobby groups influencing a
government agency
5
Chapter 1
• General setup
− A principal, uninformed party, who designs a contract in order to screen different types
is unknown.
− Optimal income taxation: A government designing the tax scheme for the people whose
6
− Implicit labor contract: An employer offering the wage contract to an employee whose
productivity is unknown.
In these examples, contracts correspond to the pricing scheme, investment decision, tax
• To describe the contractual situations in general, we adopt the following time line:
− At date 2, the agent accepts or rejects the contract. If rejects, then the principal and
agent get their outside utilities, which are normalized to zero. If accepts, then they go
to date 3.
We then ask what is the optimal contract in the principal’s perspective, or the contract
which maximizes the principal’s payoff. Usually, however, there are so many contracts one
can conceive of that it is not feasible to try all possible contract one by one.
• Revelation principle
− To determine the optimal contract among all possible ones, it suffices to consider
the contracts which specify one allocation for each type of agent. (e.g. the insurance
example)
− Need to make sure that each type has an incentive to select only the allocation that is
destined to him.
7
1.1 A Simple Model of Price Discrimination
Consider a transaction between a buyer (agent) and a seller (principal), where the seller
does not know perfectly how much the buyer is willing to pay.
− q = the number of units purchased and T = the total amount paid to the seller.
− We impose technical assumptions as follows: v(0) = 0, v 0 (q) > 0, and v 00 (q) < 0 for all
q.
• The seller’s preference is given by π = T − cq, where c is the seller’s production cost per
unit.
Suppose that the seller is perfectly informed about the buyer’s type. The seller can treat
each type of buyer separately and offer a type-dependent contract: (qi , Ti ) for type θi
(i = H, L).
8
− The constraint is called participation constraint (or individual rationality, (IR), con-
straint): If this constraint is not satisfied, then the agent would not participate in the
contractual relationship.
(Why?)
and
− With this solution, the seller takes all the surplus equal to
while the buyer gets no surplus. It is why this solution is called first-best or perfect
price discrimination.
Tariffs
Suppose from now on that the seller cannot observe the type of the buyer, facing the adverse
selection problem. The first-best contract above is no longer feasible. (Why?) The contract
9
set is potentially large since the seller can offer any combination of quantity-payment pair
(q, T (q)). In other words, the seller is free to choose any function T (q). Let us first consider
This is the simplest contract in which the buyer pays a uniform price P for each unit he
buys.
θi v(q) − P q, where i = L, H.
DL (P ).
− Let us define
max(P − c)D(P ).
P
D(P m )
Pm = c − .
D0 (P m )
10
− With this solution, the buyer obtains positive rents (why?) and consumes inefficiently
With two-part tariff, the seller charges a fixed fee (F ) up-front, and a price P for each
unit purchased. For any given price P , the maximum fee the seller can charge up-front is
=SL (P ) + (P − c)D(P ).
− From the first order condition, we obtain the optimal unit price P t solving
D(P t ) + SL0 (P t )
Pt = c − .
D0 (P t )
− Since SL0 (P t ) = −DL (P t ) by the envelope theorem, we have D(P t ) + SL0 (P t ) > 0; in
addition, D0 (P t ) < 0, so P t > c. Again, the quantities are inefficiently low, or qit < q̂i
for i = L, H.
− But, the inefficiency reduces compared to the linear pricing, or qit > qim , since P t < P m .
so that the seller is better off lowering the price from P m . (Intuition?)
11
• Let Bi := (qit , SL (P t ) + P t qit ) denote the bundle for type θi for i = L, H.
Here, we look for the best pricing scheme among all possible ones. In general, the pricing
scheme can be described as (q, T (q)), where the function T (q) specifies how much the buyer
has to pay for each quantity q. We do not restrict the function T (·) to be linear or affine
as before.
subject to
and
− The first two constraints are called incentive compatibility constraint, which guarantees
that each type selects the bundle that is designed for him.
12
− The next two constraints are called individual rationality or participation constraint,
which guarantees that each type is willing to participate in the seller’s contract.
− We can use the revelation principle to restrict our attention to a couple of bundles,
(qL , T (qL )) for type θL and (qH , T (qH )) for type θH . Then, defining Ti := T (qi ) for
subject to
θH v(qH ) − TH ≥ 0 (IRH )
θL v(qL ) − TL ≥ 0. (IRL )
− Note that the incentive compatibility constraint has been greatly simplified.
− If not, then the seller can raise TL and TH by small > 0, which does not violate any
− Thus, we have
TL = θL v(qL ). (1.2)
13
• Step 3: (ICH ) must be binding at the optimal solution.
− If not, then the seller can raise TH by small > 0, which does not violate any constraint
− Thus, we have
• Step 4: (IRH ) is automatically satisfied, provided that (ICH ) and (IRL ) are binding.
so (IRH ) is satisfied.
• Step 6: Eliminate TL and TH using (1.2) and (1.3) and solve the problem without any
constraint.
− For the moment, let us ignore the constraint qH ≥ qL , which will be verified later.
14
− Substituting (1.2) and (1.3), the seller’s problem is turned into
∗ ∗
− From the first-order condition, we obtain the optimal quantities, qH and qH , solving
θH v 0 (qH
∗
)=c
c
θL v 0 (qL∗ ) = (1−β) ∆θ
> c, (1.4)
1− β θL
∗
which implies qH = q̂H > q̂L > qL∗ , as desired.
− If βθL < (1 − β)∆θ, then the RHS of (1.4) becomes negative so we would have a corner
∗
solution, qL∗ = 0 and qH = q̂H . (Try to interpret this)
∗
− No distortion at the top: qH = q̂H
15
1.2 Modeling Issues in Contracting Problem
There are situations in which the agent can learn his type only after he signs a contract:
For instance, an employee who is hired to work on some project, may not know whether
his expertise is suited to the project until he starts working on it. This kind of situation
can be modeled by modifying the timeline in page 7 and assuming that the agent privately
learns his type between date 2 and 3. So, it is at the ex-ante stage that the contracting
occurs. In the original model, by contrast, the contracting has occurred at the interim stage
in which the agent is already informed of his type. We analyze the problem of designing
optimal ex-ante contract in our basic model of price discrimination, though the results that
follow are much more general, applying to any adverse selection model. To put forward
the conclusion, it is possible for the principal to achieve the first-best outcome, despite the
subject to
16
− Note that there is only one (IR) constraint that is for the agent to participate in the
− Note also that (ICL ) and (ICH ) constraints are intact since the information the agent
− As it turns out, the first-best outcome is achievable for the principal as follows:
(ii) Substitute the binding (IR) constraint into the object function to get
(iii) Choose TL and TH to make (IR) binding and, at the same time, satisfy (ICH ) and
(ICL ). (How?)
There are some lessons to be learned from the above results: First, it is not the lack
of information itself but the asymmetry of information that causes the inefficiency in the
previous section. Also, what generates a rent for the agent is the asymmetric information at
the contracting stage. In the above setup where both parties symmetrically informed at the
contracting stage, the principal only needs to satisfy the ex-ante participation constraint,
which enables the principal to push down the low type’s payoff below outside utility while
guaranteeing the high type a payoff above outside utility. So, the agent without knowing
about his type breaks even on average and thus is willing to participate. This ex ante
incentive, however, would not be enough for inducing the agent’s participation if the agent
can opt out of the contractual relationship at any stage. In such case, both types should
17
be assured of their reservation payoff at least, which will revert the principal’s problem to
So far we have assume that the agent’s outside utility is type-independent, being uniformly
equal to zero. Often, this is not very realistic. In our price discrimination model, for
instance, the high-type consumer to pay may be able to find an outside opportunity that is
more lucrative than the low-type consumer does, thereby enjoying a higher outside utility
than the latter does. This situation can easily be modeled by modifying the (IRH ) as
0
θH v(qH ) − TH ≥ ū (IRH )
We maintain all other constraints. This small change in the contracting problem leads to
• If ū ∈ [∆θv(q̂L ), ∆θv(q̂H )], then the seller as principal can achieve the first-best outcome.
− To see it, note that the first-best outcome requires (i) the first-best quantities or
0
qi = q̂i , i = H, L, and (ii) both (IRL ) and (IRH ) be binding so that TL = θL v(q̂L ) and
TH = θH v(q̂H ) − ū.
− We only need to verify that the quantities and transfers given above satisfy both (ICL )
18
By plugging the above numbers into this equation and rearranging, we obtain
∆θv(q̂H ) ≥ ū ≥ ∆θv(q̂L ),
What happens if ū > ∆θv(q̂H )?1 In this case, the first-best contract given above violates
(ICL ) only, which implies (ICL ) must be binding at the optimum. Also, analogously to
Step 5 in page 14, qH ≥ qL is necessary and sufficient for (ICH ) to be satisfied, given that
(ICL ) is binding. As before, we will ignore the constraint qH ≥ qL for the moment, which
0
can be verified later. Another observation is that (IRH ) also must be binding.2 We now
0
• Let us first focus on the case in which (ICL ) and (IRH ) are binding while (IRL ) is not.
c
θH v 0 (qH
∗∗
)= β∆θ
<c
1+ (1−β)θH
θL v 0 (qL∗∗ ) = c,
1 ∗
The same analysis and result as in the part 1.1.3 follow in case ū ≤ ∆θv(qL ), including the case ū = 0.
∗
If ū ∈ (∆θv(q̂L ), ∆θv(q̂L )), the analysis will be slightly different but yield the same qualitative result as in
1.1.3.
2
An argument to show this is a bit tedious and will be given in the class.
19
which implies that qL∗∗ = q̂L and qH
∗∗
> q̂H . In contrast to the standard case, the quantity
− It remains to check that (IRL ) is satisfied. To do so, plug the above quantities and
∗∗
ū > ∆θv(qH ). (1.5)
So the above inequality is necessary (and sufficient) for having an optimal contract in
0
which only (ICL ) and (IRH ) are binding.
∗∗
• If (1.5) is violated, that is ū ∈ (∆θv(q̂H ), ∆θv(qH )], then, (IRL ) also must be binding.
0
− Plug (IRH ) and (IRL ) (as equality) into (ICL ) (as equality) to obtain the optimal
∗∗∗
∆θv(qH ) = ū,
0
which then determines TH through the binding (IRH ) constraint.
− Then plug (IRL ) into the objective function, whose first-order condition results in the
∗∗∗ ∗∗∗
− Note that since ∆θv(q̂H ) < ū = ∆θv(qH ), we must have q̂H < qH , an upward
As seen above, if the high type entertains an attractive outside option, the participation
constraint countervails the incentive constraint so (ICH ) does not play a role in the design
of optimal contract. In other words, it is not much of a concern for the principal to save the
information rent needed to make the high type tell the truth. This leads to no downward
20
distortion at the bottom but rather an upward distortion at the top. This upward distortion
is the best way to satisfy the participation constraint for the high type while preventing
1.3.1 Regulation
The public regulators are often subject to an informational disadvantage with respect to
the regulated utility or natural monopoly. Consider a regulator concerned with protecting
consumer welfare and attempting to force a natural monopoly to charge the competitive
price. The difficulty is that the regulator does not have full knowledge of the firm’s intrinsic
cost structure.
− The firm’s cost of producing good is observable (and contractible) and given by c =
θ − e, where e > 0 stands for the cost-reducing effort. Expending effort e has cost
ψ(e) = e2 /2.
− To avoid the distortionary tax, the regulator tries to minimize its payment P = c + s
• As a benchmark, assume that there is no information asymmetry. For each type i, the
21
regulator solves
min si + ci = si + θi − ei
(ei ,si )
subject to
si − e2i /2 ≥ 0. (IRi )
− The constraint (IRi ) is binding at the solution, which is then given by êi = 1 and
− Under the asymmetric information, this contract is vulnerable to type L’s pretending
to be type H: To generate cost cH = θH −1, type L only need to exert effort e = 1−∆θ.
subject to
sL − e2L /2 ≥ 0 (IRL )
sH − e2H /2 ≥ 0 (IRH )
sH − e2H /2 = 0.
22
− Substituting these equations, the optimization problem becomes
β
e∗L = 1 and e∗H = 1 − ∆θ.
1−β
− As before, the provision of effort is efficient at the top (θL ) while distorted downward
− The downward distortion is severer as the cost differential is larger or the type is more
likely to be efficient.
Consider a loan market in which the bank (lender) offers loan contracts to the liquidity-
their investment projects succeed. Though liquidity-constrained, borrowers own some asset
that can be (only) used as collateral for a loan contract. We study how this collateral can
help the lender screen different types of borrowers, using the simple model as follows:
• Each investor has a project with a random return ỹ that can either fail (ỹ = 0) or succeed
− There are two types of investors who only differ in their failure probability: θH and
θL < θH .
23
− Letting Uk denote the reservation utility for type k, we assume that
UL UH
> . (1.6)
1 − θL 1 − θH
• There is a monopolistic lender who offers a menu of loan contracts {(Ck , Rk )}k=L,H ,
where Rk and Ck denote the repayment (in case of success) and collateral for type k.
− If the project fails, then the lender can take the specified amount of collateral from
the borrower and liquidate it to obtain δCk with δ < 1. (Thus (1 − δ)Ck corresponds
to a liquidation cost.)
− Thus, the borrower’s payoff from type k is Rk if the project succeeds and δCk if fails.
X
βk [(1 − θk )Rk + θk δCk ] (1.7)
k=H,L
payoff is given as
(1 − θk )(y − Rk ) − θk Ck .
− Note that this model has some fundamental difference from the ones we have seen so far
in the sense that the agent’s private information, θ, directly enters into the principal’s
utility function. In short, the agent’s information has an externality on the principal’s
payoff. A model with this kind of feature is generally referred to as ‘common value
model’.
• Consider as a benchmark that the lender is able to observe the borrower’s types.
24
− At an optimal contract, the individual rationality constraints given by
(1 − θL )(y − RL ) − θL CL ≥ UL (IRL )
must be binding.
− Under the constraints (IRL ) and (IRH ), (1.7) is maximized by setting Ck = 0 and
Uk
Rk = y − 1−θk
for each type k: No collateral is required at the optimal contract since
− If the lender faces the asymmetric information problem, then the above contract would
UL UH
not work since RL = y − 1−θL
<y− 1−θH
= RH from (1.6) and thus both types will
prefer announcing θL .
• Consider now the problem of finding the optimal menu of contracts for the lender who
− We need to maximize (1.7) under the (IRL ), (IRH ) and the (IC) constraints given as
− As can be seen above, what matters is to get rid of the incentive of type θH to mimic
1 − θL 1 − θH
(RL − RH ) ≤ CH − CL ≤ (RL − RH ), (1.8)
θL |{z} |{z} θH
(ICL ) (ICH )
1−θH 1−θL
which implies CH − CL ≤ 0 since θH
< θL
.
25
− Given that (ICH ) is binding and CL ≥ CH , (1.8) implies that (ICL ) is automatically
− At the optimal contract {(Ck , Rk )}k=L,H , we must have CH = 0: If CH > 0, then the
0 0 0
principal can offer an alternative contract {(CL , RL ), (CH , RH )}, where CH = CH −
0 θH
and RH = RH + 1−θH
for small > 0. With this contract, (ICH ), (IRL ), and
(IRH ) all remain the same as with the original contract and thus are satisfied. Since
0
CH < CH ≤ CL and (ICH ) is binding,(ICL ) is also satisfied by the previous argument.
θH
(1 − θH ) − δθH = θH (1 − δ) > 0,
1 − θH
− At the optimal contract, (IRL ) must be binding: Suppose it’s not binding or
We can then consider an alternative contract, {(CL0 , RL0 ), (CH , RH )}, where CL0 = CL −
θH
and RL0 = RL + 1−θH
for small > 0. With this contract, (ICH ) and (IRH ) remain
the same as with the original contract and thus are satisfied. Also, (IRL ) is satisfied
since is small. Since CL0 = CL − > CH = 0 and (ICH ) is binding, (ICL ) is satisfied
for the same reason as before. However, the principal’s payoff increases by
θH θH (1 − θL )
(1 − θL ) − δθL = θL − δ > 0,
1 − θH θL (1 − θH )
26
subject to
(1 − θL )(y − RL ) − θL CL = UL (1.11)
(1 − θH )(y − RH ) ≥ UH . (1.12)
− One can check that if RH is reduced by > 0, then RL and CL must be changed
θL (1−θH )
by θH −θL
and − (1−θθHL )(1−θ
−θL
H)
, respectively. Thus, the corresponding change of the
− In the optimal contract, we have two cases: (i) if (1.13) is positive, then (CL , RL ) =
UL
(CH , RH ) = (0, y − 1−θL
) (and (1.12) is not binding); (ii) if (1.13) is negative, (1.12) is
(a) High (low) risk type pays a high (low) interest rate but puts down no (some)
(b) In case collateral is costly or types are likely to be low or two types are close, no
Adverse selection is typical of financial markets: A lender knows less than a borrower
about the quality of a project he invests in. Because of this informational asymmetry, good
27
quality projects are denied credit so there arises inefficiency in the allocation of investment
• Consider a unit mass of borrowers who have no wealth but each own a project:
− There are two types of projects, safe and risky. A project i = s, r yields a random
(failure) with 1 − pi .
− Assume that pi Ri = m > 1 while ps > pi and Rs < Rr . That is, two types of projects
have the same expected return, but type-s is safer than type-r.
What type of lending contract should the bank offer a borrower? Under symmetric
information, the bank would be indifferent about financing either type of borrower: In
success from type-i borrowers. What if there is asymmetric information problem between
• Let us first consider contracts where the bank specifies a fixed repayment, D.
− If the bank decides to accommodate type-r only, then setting D = Rr is optimal, which
28
− If the bank decides to accommodate both types, setting D = Rs is optimal. Assuming
that each applicant has an equal chance of being financed, the bank’s profit is equal to
− Ceteris paribus, (1.15) will be higher than (1.14) when 1 − β is small enough, or when
pr is close enough to ps , in which case some “risky” borrowers cannot get credit even
• Consider a contract (xi , Di ) that offers financing with probability xi and repayment Di .
subject to
0 ≤ xi ≤ 1 for all i = s, r
βxs + (1 − β)xr ≤ α.
− The same line of reasoning as in the previous model shows (how?) that (IRs ) and
xs
Ds = Rs and Dr = Rr − (Rr − Rs ).
xr
29
• So, the proceeding problem becomes
subject to
βxs + (1 − β)xr ≤ α.
− The safe types are not fully funded but are indifferent about being funded
− The informational asymmetry does not necessarily give rise to credit rationing.
In this part, we study the trade-off between allocative efficiency and redistributive taxation
general, but may not be feasible since its size is limited by the lowest income level. To
be able to raise higher tax revenues, the tax need be based on an individual’s income-
30
• Consider an economy where each individual from a unit mass of population is endowed
with production function q = θe, where q, e, and θ denote income, effort, and ability,
respectively.
− All individuals have the same utility function u(q − t − ψ(e)), where t is the net tax
paid to (or received from) the government and ψ(e) is an increasing and convex cost
function.
utilities, solves
subject to (1.16).
− At the optimum, (1.16) is binding and the first order conditions yield
ψ 0 (êL ) = θL
ψ 0 (êH ) = θH .
31
• Under asymmetric information, the government has extra conditions to satisfy:
θH eH
θL eL − tL − ψ(eL ) ≥ θH eL − tH − ψ (ICL )
θL
θL eL
θH eH − tH − ψ(eH ) ≥ θL eL − tL − ψ . (ICH )
θH
− Substituting these two binding constraints and applying the first order condition with
ψ 0 (e∗H ) = θH
θL e∗L
0 θL 0
ψ (e∗L ) = θL − (1 − β)γ ψ 0
(e∗L )− ψ ,
θH θH
| {z }
Q
where γ := (u0L − u0H )/[βu0L + (1 − β)u0H ]. Thus, e∗H = êH but e∗L < êL , since Q > 0
(why?).
− We can interpret this result in terms of the income tax code: The marginal tax rate is
Q
equal to 0 at output qH = θH e∗H while it is equal to θL
at output qL = θL e∗L .
Let f and hi , i = 1, · · · m be concave C 1 functions defined on the open and convex set
32
Set up the Lagrangian for this problem, which is defined on U × Rm
+ , as follow:
m
X
L(x, λ) = f (x) + λi hi (x).
i=1
Here, (1.18) implies that given λ∗ , x∗ maximizes L while (1.19) implies that given x∗ ,
λ∗ minimizes L, which is why we call (x∗ , λ∗ ) saddle point. Condition (1.19) is called
Theorem 1.1 (Kuhn-Tucker). x∗ ∈ U solves the above problem if and only if there is
λ∗ ∈ Rm ∗ ∗
+ such that (x , λ ) is a saddle point of L.
at least one of the following conditions holds: (a) Df (x∗ ) 6= 0; (b) f is concave.
Remark 2. If some of the constraints, say constraints k to m, are not binding that is
also:
33
Chapter 2
• Basic setup:
− Agent takes an action that is not observable or verifiable and thus cannot be contracted
upon.
− The agent’s action generates a random outcome, which is both observable and verifi-
able.
• We are interested in
34
− When and how the unobservability of agent’s action distorts the contract away from
the first-best.
− At date 1, agent accepts or rejects the contract. If rejects, then both principal and
agent get their outside utilities, zero. If accepts, then they proceed.
− Plaintiff and attorney: Induce attorney to exert effort to increase plaintiff’s chance of
− Landlord and tenant: Induce tenant to make investment that preserve property’s value
to the landlord ← Make tenant post deposit to be forfeited if value declines too much.
1
These examples draw on Hermalin’s note.
35
2.1 A Simple 2 × 2 Model
− Agent could be idle (e = 0 or low effort) or work hard (e = 1 or high effort), which is
− The level of production, which is observable and verifiable, is stochastic, taking two
values q and q with q > q: Letting πe denote the probability that q realizes when agent
− The agent’s utility when exerting e and paid t: u(t) − ce with u(·) increasing and
• The principal can only offer a contract based on the level of q: t(q) with t := t(q) and
Ve = πe (S − t) + (1 − πe )(S − t).
π1 u(t) + (1 − π1 )u(t) − c ≥ 0.
36
2.1.1 First-Best: Complete Information Optimal Contract
In this benchmark case, we assume that the effort level can contracted upon since it is
max πe (S − t) + (1 − πe )(S − t)
t,t
− Letting λ denote the Lagrangean multiplier for the participation constraint (2.1), the
f
−πe + λπe u0 (t ) = 0
1 1 f
From this, we immediately derive λ = f = u0 (tf )
, or t = tf = tf for some tf ≥ 0.
u0 (t )
− So, the risk-neutral principal offers a full insurance to the risk-averse agent and then
− Principal prefers e = 1 if
π1 S + (1 − π1 )S − h(c) ≥ π0 S + (1 − π0 )S
or
∆π∆S
| {z } ≥ h(c) (2.2)
|{z}
expected gain first-best cost
of of
increasing effort increasing effort
37
− From now on, we assume (2.2) holds so pirncipal would prefer e = 1 without moral
hazard problem.
Suppose that there is moral hazard problem and suppose also that agent is risk-neutral,
i.e. u(t) = t. In this case, the principal can achieve the first-best outcome.
• The principal’s optimal contract to induce e = 1 must solve the following problem:
max π1 (S − t) + (1 − π1 )(S − t)
t,t
s.t. π1 t + (1 − π1 )t − c ≥ π0 t + (1 − π0 )t (2.3)
π1 t + (1 − π1 )t − c ≥ 0 (2.4)
− One contract (t, t) that achieves the first-best can be found by making both (2.4) and
• In fact, there are many other contracts that achieve the first-best. Among them, the
− The idea is to let the agent buy out the principal’s firm at a fixed price T ∗ by setting
∗0
t = S − T ∗ and t∗ 0 = S − T ∗ with T ∗ = π1 S + (1 − π1 )S − c: Easy to see that this
38
− Note that the agent’s incentive constraint is satisfied since
∗0
∆π(t − t∗ 0 ) = ∆π∆S > h(c) = c,
Let us assume that the agent has no wealth and is protected by limited liability constraint
that the transfer received by the agent should not be lower than zero:
t≥0 (2.5)
t ≥ 0. (2.6)
max π1 (S − t) + (1 − π1 )(S − t)
t,t
− One can argue that (2.3) and (2.6) must be binding, from which we obtain t∗ = 0 and
∗ c
t = ∆π
. Then, it can be checked that other constraints are automatically satisfied.
∗ π0
π1 t + (1 − π1 )t∗ − c = c > 0.
∆π
∗ π1
V1∗ := π1 (S − t ) + (1 − π1 )(S − t∗ ) = π1 S + (1 − π1 )S − c,
∆π
which is lower than her first-best payoff by as much as the agent’s rent.
39
− The principal would then like to induce e = 1 if V1∗ ≥ V0 or
π1 c π0 c
|∆π∆S ≥ =c+
{z } ∆π ∆π
expected gain |{z} |{z}
of second-best cost agent’s
increasing effort of rent
increasing effort
Let us now turn to the second source of inefficiency in a moral hazard context: Agent’s
risk aversion.
(P ) max π1 (S − t) + (1 − π1 )(S − t)
t,t
subject to
− It is not clear that (P ) is a ‘concave program’ for which the Kuhn-Tucker condition is
− Making the change of variables u := u(t) and u := u(t) or equivalently t = h(u) and
40
subject to
π1 u + (1 − π1 )u − c ≥ π0 u + (1 − π0 )u (2.9)
π1 u + (1 − π1 )u − c ≥ 0, (2.10)
Rearranging, we obtain
∆π
h0 (u∗ ) = µ + λ (2.11)
π1
∆π
h0 (u∗ ) = µ − λ . (2.12)
(1 − π1 )
− One can argue that both λ and µ are positive so that (2.9) and (2.10) are both binding:
(i) If λ = 0, then (2.11) and (2.12) imply u∗ = u∗ , which violates (2.9), a contradiction.
(ii) If µ = 0, then (2.12) implies h0 (u∗ ) < 0, which is not possible since h(·) = u−1 (·) is
an inceasing function.
1 − π0
u∗ = c
∆π
π0
u∗ = − c.
∆π
41
− Using this, one can show that the second-best cost of inducing a high effort is higher
∗
C ∗ := π1 t + (1 − π1 )t∗ =π1 h(u∗ ) + (1 − π1 )h(u∗ )
∆π∆S ≥ C ∗
2.2 Extensions
Suppose that there are n possible output levels, {q1 , · · · , qn } with q1 < q2 < · · · < qn . Each
qi is realized with probability πie given the effort level, e, with πe = (π1e , · · · , πne ).
subject to
n
X n
X
πi1 u(ti ) − c ≥ πi0 u(ti ) (2.13)
i=1 i=1
Xn
πi1 u(ti ) − c ≥ 0. (2.14)
i=1
42
− Let λ and µ denote the Lagrangian multipliers for (2.13) and (2.14), respectively.
πi1
= µπi1 + λ (πi1 − πi0 ) . (2.15)
u0 (t∗i )
arugment to show µ > 0 is very similar and thus is omitted. To show µ > 0, sum up
− One may ask under what condition t∗i is increasing with i or wage is increasing with
πi1
output level. The condition for this is that the likelihood ratio is monotone, or πi0
is
The performance of optimal contract in moral hazard setup is in part affected by how
informative a contractible variable is about an agent’s hidden action. In the extreme case
the contractible varaible pefectly reveals the agent’s action, for instance, the principal will
be able to achieve the first-best outcome. In this part, we will investigate how the principal’s
payoff is affected by the informativeness of contractible variables in less than extreme cases.
43
− We say that the information structure π is Blackwell-sufficient for the information
structure π̄. In other words, the information structure π̄ is a garbling of the original
information structure π.
Let us define C ∗ (π) and C ∗ (π̄) as the second-best costs of inducing e = 1 under the
• The information structure π is more efficient than π̄ if C ∗ (π) ≤ C ∗ (π̄), which is indeed
This wage schedule satisfies the incentive compatibility and individual rationality condi-
and ! !
n
X n
X n
X n
X n
X
c= π̄1j u(t̄∗j ) = π1i pij u(t̄∗j ) = pij u(t̄∗j ) .
j=1 j=1 i=1 i=1 j=1
44
We can also obtain by the Jensen’s inequality
n n n
! n n
!
X X X X X
π1i t0i = π1i h pij u(t̄∗j ) ≤ π1i pij h(u(t̄∗j ))
i=1 i=1 j=1 i=1 j=1
n n
! n n
! n
X X X X X
= π1i pij t̄∗j = π1i pij t̄∗j = π̄1j t̄∗j .
i=1 j=1 j=1 i=1 j=1
Pn Pn
Thus, we conclude that C ∗ (π) ≤ i=1 π1i t0i ≤ j=1 π̄1j t̄∗j = C ∗ (π̄).
Let us alternatively assume that the agent’s effort is not verifiable but can be observed
by the principal. Also, after observing the effort choice by agent but before the output
is realized, the principal can propose to renegotiate the initial contract. We investigate
whether this change in the contractual environment affects the implementability of the
It is more convenient for our analysis to generalize the setup as follows. The effort e,
which can be any nonnegative value, costs g(e). The principal’s profit, denoted S, is drawn
from [0, S] according to distribution p(S|e). The contract is now a function, t : [0, S] → R.
• Without renegotiation, the second-best contract t∗ (·) for inducing a target effort level e
and
Z S
u(t∗ (S))p(S|e)dS − g(e) = 0. (IR)
0
45
Suppose now that the principal is allowed to renegotiate after observing the agent’s
• After e0 has been chosen, the principal offers t̃(·|e0 ) in renegotiation that solves the
following program:
Z S
max
0
(S − t(S|e0 ))p(S|e0 )
t(·|e ) 0
subject to
Z S Z S
0 0
u(t(S|e ))p(S|e )dS ≥ u(t∗ (S))p(S|e0 )dS. (2.16)
0 0
− Clearly, t̃(·|e0 ) must be a full insurance contract that binds (2.16), that is
!
Z S
t̃(S|e0 ) = t̃(e0 ) := h u(t∗ (S))p(S|e0 )dS for all S ∈ [0, S].
0
− It is important to ensure that the renegotiation does not change the agent’s incentive
− What happens if the renegotiation occurs without principal observing the agent’s ef-
fort?
46
2.3 Applications
Moral hazard is pervasive in insurance markets. Let us consider a risk-averse agent with
utility function u(·) and initial wealth w. Effort e ∈ {0, 1} is a level of safety care while
ce is the cost of choosing e. Given the effort level e, an accident occurs with probability
1 − πe with the damage worth d being incurred and otherwise no damage incurrred. We
assume that without insurance, the agent would choose e = 1 (or due care), that is
where ∆π ≡ π1 − π0 > 0. Thus, the agent’s outside utility, denoted û, is given as
û = π1 u(w) + (1 − π1 )u(w − d) − c.
Let us assume that there is a competitive insurance market. In other words, there are
many insurance companies offering insurance contracts to the agent. An insurance contract
can be described by (u, u), where u (u, resp.) is the agent’s utility from his final wealth if no
accident (accident, resp.) occurs.2 Because of the competition among insurance companies,
the contract should maximize the agent’s expected utility subject to the standard incentive
compatibility constraint
c
u−u≥ , (2.17)
∆π
and the constraint that the profit of the insurance company be non-negative
47
• Without moral hazard, the incentive compatibility constraint can be ignored so the
equilibrium contract offered by insurance company must solve the following problem:
max π1 u + (1 − π1 )u − c
(u,u)
subject to (2.18).
− As in Part 2.1.1, the solution of the above problem yields u = u, which is denoted as
h(U f + c) = w − d(1 − π1 ),
− The market would not break down if the agent is (weakly) better off with insurance
• Under moral hazard, assuming that e = 1 is chosen in the equilibrium,3 the equilibrium
(P ) max(u,u) π1 u + (1 − π1 )u − c
cannot do better by inducing the agent to choose e = 0. We will later see whether and when they hold.
48
− Let λ and µ denote the Langrangian multipliers for (2.17) and (2.18). Then, the
π1 + λ = µπ1 h0 (u∗ )
and
− By the same argument as in Part 2.1.4, one can show that both λ and µ are positive
− Letting U ∗ = π1 u∗ +(1−π1 )u∗ −c denote the agent’s expected utility at the second-best,
π0
u∗ = U ∗ − c (2.20)
∆π
1 − π0
u∗ = U ∗ + c (2.21)
∆π
− Plugging (2.20) and (2.21) into the binding constraint (2.18) yields
∗ 1 − π0
∗ π0
π1 h U + + (1 − π1 )h U − c = w − d(1 − π1 ). (2.22)
∆π ∆π
− We need to check that (i) the agent has an incentive to participate or U ∗ ≥ û and (ii)
an insurance company can do better by offering a contract that induces the agent to
choose e = 0.
(1) To see (i), it is enough to note that the pair of utility (u(w), u(w − d)) satisfies
both (2.17) and (2.18) and also yields the expected utility û, which means that U ∗ ,
the expected utility obtained from the problem (P ) above, cannot be smaller than
û, as desired.
49
(2) For (ii), an insurance company should not be able to make the agent better off by
max π0 u + (1 − π0 )u − c
(u,u)
subject to
The solution of this problem is u = u = u(w − d(1 − π0 )) (Why?). Thus, (ii) will
holds if
U ∗ ≥ u(w − d(1 − π0 )) − c.
Q = Q(a1 , a2 , · · · , an ),
where ai ∈ [0, ∞) is the agent i’s action. Assume that the function Q(·) satisfies
∂Q ∂ 2Q ∂ 2Q
> 0, < 0, and ≥ 0.
∂ai ∂a2i ∂ai ∂aj
Suppose that each agent is risk-neutral: With wage wi and effort ai , the agent i’s utility
is wi − gi (ai ) with gi (·) strictly increasing and being convex. Since each agent’s effort
or individual output is not observable, a contract in the partnership can only depend
on the aggregate output: w(Q) = (w1 (Q), w2 (Q), · · · , wn (Q)). We require each wi (·) to
50
be differentiable (almost everywhere). All agents in the partnership share the aggregate
A key observation in this model is the externality among agents: If agents are rewarded for
rasing output, then one agent working hard to raise aggregate output will benefit others
• The first-best profile of actions â = (â1 , · · · ân ) solves the following problem
n
X n
X
max (wi (Q) − gi (ai )) = Q(a1 , · · · , an ) − gi (ai ).
(a1 ,··· ,an )
i=1 i=1
∂Q(â)
= gi0 (âi ) for each i. (2.24)
∂ai
• Given other agents’ actions a−i = (a1 , · · · , ai−1 , ai+1 , · · · , an ), agent i will choose an effort
− If the first-best action profile â were a Nash equilibrium, then (2.24) would imply
51
Here, the failure to achieve the first-best is partly due to the balanced-budget constraint
(2.23). Indeed, if there is a third party who can act as a budget breaker, then it is possible
• Let a third party pay wi (Q) = Q to each of agents, who in return hand over the entire
− Given this contract, each agent i optimally chooses ai = âi , the first-best level.
− Two participation constraints need to be satisfied: the third party not losing money
requires
n
X
Q(â) + zi ≥ nQ(â), (2.26)
i=1
There is some problem with the above contract: If the team performance is better than
the first-best, then the third party will be forced to overpay the agents and lose money.
Then, the agents might be able to exploit this oppotunity by deciding collusively on an
excessively high level of actions. There is an alternative contract, called Mirrlees contract,
52
• Each agent is rewarded with bonus bi if output level Q(â) is realized and punished with
− Under this contract, it is a Nash equilibrium for each agent to choose âi : given that
other agents choose â−i , each agent i will choose âi if bi and k satisfy
bi − gi (âi ) ≥ −k.
− However, this game might have other equilibria in which either only a few agents work
or all shirk.
53
Chapter 3
Incomplete Contracts
So far, the parties could write a complete contract that identifies every contingency which
• However, the parties’ ability to write such contract might well be limited for the following
reasons
− Unforseen contingencies: “Parties cannot define ex ante the contingencies that may
− Cost of writing contracts: “Even if one could foresee all contingencies, they might be
− Cost of enforcing contracts: “Courts must understand the terms of the contract and
verify the contracted upon contingencies and actions in order to enforce the contract.”
• For the above reasons, the contracts could be incomplete in the sense that they leave out
54
− The parties have to rely on ex post bargaining or renegotiation in those contingencies
− The parties’ opportunism at the ex post bargaining stage might deter each other from
55
3.1 The Holdup Problem
• Consider the following setup with one seller (S) and one buyer (B) where two parties
− At date 1 (ex ante), each party decides on how much to invest, i ∈ [0, 1] at cost φ(i)
by S, and j ∈ [0, 1] at cost ψ(j) by B. (Assume that φ(·) and ψ(·) are increasing and
convex functions.)
− At date 2 (ex post), the state of nature θ = (v, c), where v is B’s value and c S’s cost,
− The resulting payoff levels are vq − P − ψ(j) for B and P − cq − φ(i) for S.
− Assuming that cH > vH > cL > vL , the ex-post efficient level of trade is q = 1 if
θ = (vH , cL ) and q = 0 otherwise. Given this, the ex-ante efficient investment solves
• What happens if i, j, and θ are not contractible, that is the contracts are incomplete?
56
− Two parties bargain over q and P once θ is realized. According to the Nash bargaining
solution, two parties evenly split the (extra) surplus so the payoffs become
1
ij[ (vH − cL )] − ψ(j)
2
for B and
1
ij[ (vH − cL )] − φ(i)
2
for S, which lead to the first-order condition
1 1
î(vH − cL ) = ψ 0 (ĵ) and ĵ(vH − cL ) = φ0 (î) (3.2)
2 2
− Comparing (3.1) and (3.2), one can see that ĵ < j ∗ and î < i∗ , underinvestment.
One solution to the underinvestment problem due to the incomplete contract is organiza-
illustrate the point, we modify the above model and assume that only buyer makes an
investment while seller’s cost is fixed at c with vH > c > vL . Also, B and S can find
another, less efficient and competitive, trading partner: seller S 0 with cost c0 ∈ (c, vH ) and
χ > χS + χB (3.3)
so B and S can generate a greater surplus by trading with each other than with outside
partners. Also, (3.3) implies that the marginal effect of B’s investment is greater within
57
no-integration regime: B-integration and S-integration. Under i-integration, the party i
has the ownership of both B and S’s assets. The ownership title gives the owner the right
• Under no integration, B and S each hold their own assets so that if B and S fail to trade
1
j[χB + (χ − χB − χS )] − ψ(j),
2
1 1
χB + (χ − χB − χS ) = (χ + χB − χS ) = ψ 0 (jN
∗
). (3.4)
2 2
• Under the B-integration, if B and S fail to trade ex post, B obtains the outside payoff
1
j[χB + (χ − χB )] − ψ(j),
2
1 1
χB + (χ − χB ) = (χ + χB ) = ψ 0 (jB∗ ). (3.5)
2 2
• Under the S-integration, if B and S fail to trade ex post, then S obtains the outside
1
j[ (χ − χS )] − ψ(j),
2
58
which leads to the first-order condition
1
(χ − χS ) = ψ 0 (jS∗ ). (3.6)
2
that
(1) The ownership protects the investing party against the ex post opportunism of other
parties.
(2) The equilibrium allocation of ownership rights will be determined by the relative
The above model has many limitations. Among others, the ranking of investment may
depend on the particular bargaining solution assumed. More importantly, the organization
intervention may not be necessary for resolving the holdup problem, in particular when a
In this section, we show that there exists a simple contract that can induce the ex-ante
investment and resolve the holdup problem. Let us keep the model from the previous section
and assume for simplicity that there is no outside partner. We consider two contracts:
• The SPC specifies the following action to be taken unless renegotiation occurs: ‘B and
59
S trade a quantity q̂ ∈ (0, 1) at price P̂ .’ We ask if there is some q̂ that induces B to
− If θ = (vH , c), then the renegotiation will result in q = 1 since it is more efficient than
1
vH q̂ − P̂ + (1 − q̂)(vH − c).
2
− If θ = (vL , c), then the renegotiation will result in q = 0, which is more efficient than
1
vL q̂ − P̂ + q̂(c − vL ).
2
1 1
j[vH q̂ − P̂ + (1 − q̂)(vH − c)] + (1 − j)[vL q̂ − P̂ + q̂(c − vL )] − ψ(j),
2 2
1 1 1
vH (1 + q̂) − q̂vL − c = ψ 0 (j). (3.7)
2 2 2
− If some q̂ can be set to make the LHS of (3.7) equal to (vH − c), then j ∗ , efficient level,
1
LHS of (3.7) = (vH − c) < vH − c
2
while with q̂ = 1,
1 1
LHS of (3.7) = vH − vL − c > vH − c
2 2
since vL < c. Thus, by continuity, there exists q̂ ∈ (0, 1) such that the LHS of (3.7) is
60
To consider the option contract, let us now be more specific about the bargaining
protocol. After θ has been realized, the parties can simultaneously send to each other
letters containing trading offers, which the receiving party can later present as evidence to
the court. We make the simplifying assumption that there are only two trading possibilities,
• Option contracts are such that ‘S receives P0 in case of no trade, and has the option to
trade at P1 = P0 + K, where P0 and K are set to satisfy K > c and vH > P1 = P0 + K’.
− Note first that according to the contract, S would always want to trade (if there is no
− Consider first the case θ = (vL , c). In this case, it is socially efficient to trade, which
will indeed take place since (i) S prefers ‘trade’ over ‘no trade’ and (ii) B cannot make
any renegotiation offer that induces S to choose ‘no trade’ (that is makes S better with
‘no trade’ than with ‘trade at P1 ’) and at the same time makes himself better off.
− Even in the case θ = (vL , c), S would like to trade for the above reason. Then, B
will send a letter offering P00 = P1 − c(+) for ‘no trade’ so that his payoff can be
−P00 = −P1 + c instead vL − P1 (< −P1 + c). Also, B can hide whatever offers has been
sent by S.
vH − c = ψ 0 (j),
resulting in j = j ∗ .
61
3.4 Cooperative Investment and Failure of Contracts
It has been assumed so far that investments are selfish in that one party’s investment has
no direct impact on the other’s payoff. Often, however, investments are cooperative. For
example, the Fisher Body’s decision to build a plant near GM may benefit both parties
by reducing shipping costs and so on. This externality turns out to have an important
• For a simple model of cooperative investment, assume that only S invests i, which only
vH − c = φ0 (i∗ ).
1
i[ (vH − c)] − φ0 (i)
2
so S chooses î satisfying
1
(vH − c) − φ(î) = 0. (3.8)
2
• Now consider the specific-performance contract (P̂ , q̂). Once θ is realized, the renegoti-
1
P̂ − cq̂ + (1 − q̂)(vH − c).
2
62
− If θ = (vL , c) realizes, then S’s renegotiated payoff is
1
P̂ − cq̂ + q̂(c − vL ).
2
1 1
i[P̂ − cq̂ + (1 − q̂)(vH − c)] + (1 − i)[P̂ − cq̂ + q̂(c − vL )] − φ(i),
2 2
1 1
[(1 − q̂)vH + q̂vL − c] − φ0 (i) ≤ (vH − c) − φ0 (i). (3.9)
2 2
− Comparing (3.8) and (3.9) shows that S’s investment is no higher with contracts than
without.
63
Chapter 4
Auction Theory
− Empirical testability
• Different Environments
− Information: Bidders have signals which convey information about the value of auc-
tioned object
64
(2) Independent vs correlated signals
− Multi Unit:
• Our study focuses on the single-unit IPV model, whose basic setup is given as follows:
− 1 unit on sale
− Bidder i’s value: θi ∈ Θi := [θi , θi ] drawn according to distribution Fi (·) with density
fi (·)
− Each bidder i knows his value θi while others only know its distribution Fi (·).
− Bidder i’s utility: θi xi − ti , where xi is the probability of bidder i winning the object
and ti the bidder i’s payment. Each bidder’s reservation utility is zero.
Pn
− Seller’s utility: i=1 ti
− Efficiency: Whether the auctioned objects go to the bidders who value them most
highly.
65
− Revenue: How much revenue the seller raise in expectation.
66
4.1 Second-Price (or English) Auction
The auction rule is as follows: The bidder who submits the highest bidder wins the object
and pays the second highest bid. If there is a tie, then the winner is randomly determined
• It is a (weakly) dominant strategy for each bidder i to submit a bid equal to his value θi .
Proof. Consider bidder 1, say, and suppose that p1 := maxj6=i bj is the highest competing
bid. By bidding b1 , bidder 1 will win if b1 > p1 and not win if b1 < p1 . It is straightforward
that bidding θ1 is always (weakly) better than bidding some b1 < θ1 : If p1 ≤ b1 < θ1 or
strictly better than b1 . A similar argument shows that bidding θ1 is always better than
− By the same logic, it is weakly dominant for a bidder in English auction to drop out
− As a result, the object is allocated to the highest value bidder, who pays the second
RSP A := E[θ(2) ],
− Assuming that bidder are symmetric, that is Fi (·) = F (·) for some F : [θ, θ] → [0, 1],
67
which will prove useful for comparing the revenues between SPA and FPA.
− It doesn’t matter whether bidders know the others’ values or not since they play the
− There are other equilibria which are less reasonable: Bidder 1, say, always bids ∞
while others bid 0 → These equilibria might be utilized by the collusive bidders.
The rule is the same as in the second-price auction except that the winner pays his own
bid. It is very difficult to fully characterize the equilibrium bidding strategy if bidders are
asymmetric, that is Fi (·) 6= Fj (·) for i 6= j. So, we assume that bidders are symmetric. We
focus on (Bayesian) Nash equilibrium in which bidders use the symmetric and increasing
− β 0 (θi )F n−1 (θi ) + (θi − β(θi ))(F n−1 (θi ))0 = 0, (4.3)
1
It can be shown that the equilibrium bidding strategy we will discuss is indeed unique.
68
which can be rearranged to yield
0
β(θi )F n−1 (θi ) = θi (F n−1 (θi ))0 ,
and then
Z θi
β(θi )F n−1
(θi ) = s(F n−1 (s))0 ds + K.
θ
− The equilibrium bidding function in (4.4) has resulted from only considering the first-
order condition. To check that β(θ) is indeed a global optimum (or second-order con-
dition) for each type θi ∈ [θ, θ], substitute (4.4) into (4.2) to obtain
Z θ̂
n−1
(θi − θ̂)F (θ̂) + F n−1 (s)ds.
θ
− Applying the formula in (4.4) to the case of uniform distribution F (θi ) = θi on [0, 1]
yields
R θi
0
sn−1 ds n−1
β(θi ) = θi − n−1 = θi .
θi n
69
− The seller’s revenue is equal to
Z θ
RF P A := β(θ)(F n (θ))0 dθ.
θ
θ
n−1 n 0 n−1
Z
RF P A = θ(θ ) dθ = .
θ n n+1
− The seller’s revenue is the same across SPA and FPA since in FPA, the amount each
bidder i of type θi pays in expectation is given as, using the second expression in (4.4),
Z θi
F n−1
(θi )β(θi ) = s(F n−1 (s))0 ds,
θ
70
4.3 Revenue Equivalence and Optimal Auction
Here, we ask two questions: (1) Can we generalize the observation that the first-price
and second-price auctions generate the same revenue? (2) Does there exist the auction
mechanism that maximizes the seller’s revenue among all possible auction mechanisms? It
turns out that the answer to both questions are positive. To do so, we allow for bidders to
be asymmetric.
• Let us consider an auction in its most general format: Given a type realization θ =
(θ1 , · · · , θn ), xi (θ) is the probability bidder i wins the object and ti (θ) is his payment.
− For instance, at the equilibrium of the first-price auction with the uniform distribution,
1, n−1 θi if θi > maxj6=i θj
n
(xi (θ), ti (θ)) =
(0, 0)
otherwise.
− Call Xi (θi ) := Eθ−i [xi (θi , θ−i )] and Ti (θi ) := Eθ−i [ti (θi , θ−i )] interim wining probability
− If bidder i of type θi pretends to be of type θi0 (or uses the equilibrium strategy of
type θi0 ), then his expected payoff is given by ui (θi0 , θi ) := θi Xi (θi0 ) − Ti (θi0 ). Thus, his
• There are two constraints for the above auction mechanism to work well:
− The following result helps us express the above constraints in a simple form, which
71
Theorem 4.1. The constraint (IC) holds if and only if for all i,
Xi (·) is non-decreasing (M )
Z θi
Ui (θi ) = Ui (θi ) + Xi (s)ds for all θi . (Env)
θi
which yields
θi (Xi (θi0 ) − Xi (θi )) ≤ Ti (θi0 ) − Ti (θi ) ≤ θi0 (Xi (θi0 ) − Xi (θi )),
or
∂ui (θi0 , θi )
dUi (θi )
= = Xi (θi ),
dθi ∂θi 0
θ =θi i
72
− Using (Env), we can make the following substitution
Z θi
Ti (θi ) = θi Xi (θi ) − Xi (s)ds − Ui (θi ). (4.6)
θ
− Then,
n n Z
!
X X θi Z θi
E [Ti (θi )] = θi Xi (θi ) − Xi (s)ds − Ui (θi ) fi (θi )dθi ,
i=1 i=1 θi θi
same allocation and the same utility to the lowest type of each bidder, then they yield
Let us now search for the optimal auction which maximizes the seller’s revenue.
73
where
1 − Fi (θi )
Ji (θi ) =: θi − ,
fi (θi )
called “virtual valuation.” We assume that Ji (·) is non-decreasing, as is satisfied by
− Let us temporarily ignore (M ). Then, the optimal auction mechanism requires that (i)
the (IR) constraint for the lowest type be binding or Ui (θi ) = 0 and (ii) the allocation
rule be given as
1
if Ji (θi ) > max{maxj6=i Jj (θj ), 0},
x∗i (θ) =
0
otherwise.
Note that this allocation rule satisfies (M ) since Ji (·) is nondecreasing.
− Let us assume that bidders are symmetric or Fi (·) = F (·), which implies that Ji (·) =
J(·). Then,
1
if θi > maxj6=i θj and θi > θ̂,
x∗i (θ) =
0
otherwise,
where θ̂ := J −1 (0).
auction, the object is sold to the highest value bidder only if his value is greater than
n−1 1 1 n
1/2. The optimal revenue is n+1 + n+1 2
.
− How can we practically implement the optimal auction mechanism above? → Use the
first-price or the second-price auction with a reserve price set at θ̂. For instance, in the
first-price auction with a reserve price θ̂, the equilibrium bidding strategy is given as
R θi n−1
F (s)ds
θi − θ̂
if θi ≥ θ̂
F n−1 (θi )
β(θi ) =
0
otherwise.
74
− What will the optimal auction look like if bidders are asymmetric? Consider the
following example with two bidders: F1 (θ1 ) = θ and F2 (θ) = θ2 , so bidder 2 is stronger
1 − F1 (θ) 1 − θ2 1 − F2 (θ)
=1−θ < = .
f1 (θ) 2θ f2 (θ)
Thus, the optimal auction favors the weaker bidder, or handicaps the stronger bidder.
The idea behind the optimal auction is not much different from that of the monopoly
pricing. Consider a monopolist who faces n markets and assume that the market i is
populated by consumers whose value distribution follows Fi (·). So, the demand function
and the total revenue in the market i are q = 1 − Fi (p) and qFi−1 (1 − q), respectively. The
d 1 1 − Fi (p)
(qFi−1 (1 − q)) = Fi−1 (1 − q) − q −1 =p− .
dq fi (Fi (1 − q)) fi (p)
Thus, the virtual valuation of a bidder can be interpreted as a marginal revenue. The
allocation rule of the optimal auction is to sell the good to the buyer associated with the
4.4 Extensions
In this section, we relax three important assumptions we have adopted so far in order to
make the model more realistic: (1) risk-neutrality of bidders, (2) bidders with unlimited
budget, and (3) independent value distributions. We will see that relaxing the above
assumptions leads us to quite different conclusion than before. It turns out that if (1)
or (2) is relaxed, then two auctions are no longer equivalent with the seller favoring the
75
first-price auction. If (3) is relaxed, then the seller may be able to extract the entire surplus
from bidders.
So far, we have assumed that bidders are risk neutral in the sense that each bidders’ utilities
are linear in net surplus (= value minus payment). We ask here what happens to the seller’s
revenue if bidders are risk averse so that each bidder’s utility is represented by a strictly
concave function u : R+ → R satisfying u(0) = 0, u0 > 0, and u00 < 0. Then, if bidder with
value θ wins and pays b, his utility is given as u(θ − b). We maintain the assumption that
bidders’ values are identically and independently distributed in the interval [0, 1].
Proposition 4.1. With risk averse bidders, the expected revenue is higher in the first-price
Proof. In the second-price auction, it is still a dominant strategy for each bidder to bid his
or her value.
Let us examine the equilibrium strategy for the first-price auction. Letting γ : [0, 1] →
R+ denote the (symmetric) equilibrium bidding strategy, it must be that γ(0) = 0 (why?).
max
0
G(θi0 )u(θi − γ(θi0 )),
θi
where G(θi0 ) = F n−1 (θi0 ). The first-order condition for this problem is
76
Setting θi0 = θi and rearranging yield
g(θi )
β 0 (θi ) = (θi − β(θi )) ,
G(θi )
which is the same expression as (4.3) after a rearrangement. Since u being strictly concave
with u(0) = 0 implies u(x)/x > u0 (x) or u(x)/u0 (x) > x, we obtain the following: Whenever
γ(θi ) = β(θi ),
Suppose that for all x ≥ x, f 0 (x) > 0 whenever f (x) = 0. Then, f (x) > 0 for all x > x.
Defining f (θi ) := γ(θi ) − β(θi ), the function f (·) satisfies the condition in Lemma 4.1
so f (θi ) = γ(θi ) − β(θi ) > 0 for all θi ∈ (0, 1]. To conclude, in the first-price auction, the
risk aversion causes an increase in equilibrium bids while it does not in the second-price
auction.
Why does risk aversion lead to higher bid in the first-price auction? Raising one’s bid
slightly in the first-price auction is analogous to buying partial insurance: it reduces the
probability of a zero payoff and increases the chance of winning at a lower profit margin.
Risk averse bidders value this insurance, so they bid more than they would if they were
risk neutral.
77
4.4.2 Budget Constrained Bidders
Let us relax the assumption that bidders are not constrained in budgeting their bids. An
alternative assumption, among others, would be that bidders face a fixed budget equal
to B, so they cannot make any bid higher than B. Letting β(·) denote the equilibrium
strategy in the first-price auction with no budget constraint, we assume B < β(1) to avoid
a trivial case.
− The proof follows the same line as when there is no budget constraint. (Try for
yourself.)
where θ̂ satisfies
n−1
n−1
X 1 n−1
(θ̂ − β(θ̂))F (θ̂) = (θ̂ − B) (1 − F (θ̂))k F n−k−1 (θ̂).
k=0
k+1 k
− Here, θ > θ̂ bids B while θ < θ̂ bids β(θ) as if the budget were absent. And θ̂ is
− Given all other bidders employ βF (·), it is optimal for bidder i of type θi to bid βF (θi ).
(Why?)
78
• We have the following proposition.
Proposition 4.2. With the same budget B, the expected revenue is higher in the first-
Proof. The equilibrium allocation in the first-price auction is the same as the second-
price auction with a larger budget equal to θ̂. Thus, by the revenue equivalence theorem,
the first-price auction with budget B and the second-price auction with budget θ̂ > B
generate the same revenue, which is higher than the revenue generated by the second-
− A rough intuition behind this result is as follows: Without budget constraint, any given
type of bidder makes the same interim (or average) payment in two auction formats
but the payment in the SPA is random and thus sometimes exceeds the average. This
makes the budget constraint more likely to bind in the SPA, which translates into a
We now relax the assumption that values are independently distributed. Relaxing this
assumption leads to a striking result in terms of the design of optimal auction: The seller
can achieve the first-best allocation and extract all the surplus from the bidders. Here, this
• Assume that there are 2 bidders and 2 possible valuations, θH and θL < θH , for each
bidder.
79
− Let pij denote the probability that bidder 1 has θi and bidder 2 has θj .
pHH pLL
− Suppose that valuations are correlated: pLL pHH − pLH pHL 6= 0: Letting ψ := ,
pHL pLH
if ψ > 1 (< 1), then values are positively (negatively) correlated.
• Consider the general auction rule: xij = the probability that bidder 1 gets the object
and tij = bidder 1’s payment, when his value is i and bidder 2’s value is j.
− The full extraction means that (i) the allocation must be efficient
1
xHH = xLL = , xHL = 1, and xLH = 0.
2
pLH
0≥ (θL − ψθH ) − pLL (θH − θL ) + pLH (ψ − 1)tHH (4.10)
2
pLH
0≥ (θH − ψθL ) + pHL (ψ − 1)tLL . (4.11)
2
80
− Thus, we are done by choosing tHH and tLL that satisfy (4.10) and (4.11).
ties, which is what we already know from the analysis of independent types.
− As ψ gets larger beyond 1 or values become more positively correlated, (4.10) and
(4.11) can be satisfied by setting tHH and tLL lower while setting tHL and tLH relatively
higher: This is effective in giving bidders an incentive to tell truthfully whey types are
− If ψ > 1 but ψ ' 1, then tHH and tLL have to be very large, which may cause some
Let X be the choice set and [t, t] the parameter set. Consider the following problem:
Let V (t) := maxx∈X f (x, t), called value function, and x(t) := arg maxx∈X f (x, t), called
the set of maximizers. Assume for simplicity that x(t) is a singleton (though it need not
Theorem 4.3 (Envelope Theorem). Take t ∈ [t, t] and x ∈ x(t) and suppose that
∂f
f2 (x, t) exists, where f2 (x, t) = ∂t
. Then, V 0 (t) = f2 (x(t), t) whenever V 0 (t) exists.
81
Example: Consider f (x, t) = (3t − 1)x − 21 x2 and X = [0, 1] and t ∈ R. Then,
1
if t ≤ 3 if t ≤ 13
0
0
x(t) = 1
3t − 1 if 3 < t < 3 2 and V (t) = 1 2 1 2
2 (3t − 1) if 3 < t <
3
2 3t − 2 if t ≥ 23
1 if t ≥ 3
3
In addition to the assumptions in Theorem 4.3, let us assume that V 0 (t) exists almost
2
This is equivalent to assuming that the function V (·) is absolute continuous.
82
Chapter 5
Matching Theory
In this part, we will study the very basics of matching theory, which is becoming more
popular among economists both theoretically and practically. A typical matching problem
is described by a situation in which there are agents on two sides of a market who each
83
A matching mechanism is a rule that specifies a matching for each preference profile of
A matching rule that satisfies the above properties is hard to come by since they need
to be satisfied by many matchings that can arise from all possible preference profiles of
agents on two sides. It is an important task of the matching theory to find such a rule.
84
5.1 Stable Matchings
Our benchmark model is the marriage problem in which there are two finite and disjoint
set of women. The preference of each man m is represented by an ordered list, P (m), on
the set W ∪ {m}: For example, P (m) = w3 , w1 , m, w2 , · · · , wp indicates that w3 is m’s first
choice, w1 is his second choice, remaining single is his third choice, and so on. Sometimes,
we just write P (m) = w3 , w1 , ignoring the part of list that is worse than remaining single.
For another example, P (m0 ) = w2 , [w1 , w3 ], m0 , · · · , wk indicates that for man m0 , w2 is his
first choice, w1 and w3 are his second choice and indifferent, and so on. We write w >m w0
well.
• A matching µ is a one-to-one mapping from the set M ∪ W onto itself such that for each
µ(w) = m.
− We say that the matching µ is blocked by an individual, say m, if m > µ(m), or blocked
matching would not sustain if agents are well informed of one another’s preference and
85
can easily access each other.
− One can show that any stable matching is Pareto-optimal in the sense that there is no
other matching that makes some agents better off without making anyone worse off.
• Let us consider the following example with three men and three women:
P (m1 ) = w2 , w1 , w3 P (w1 ) = m1 , m3 , m2
P (m2 ) = w1 , w3 , w2 P (w2 ) = m3 , m1 , m2
P (m3 ) = w1 , w2 , w3 P (w3 ) = m1 , m3 , m2 .
w1 w2 w3
µ=
m1 m2 m3
w1 w2 w3
µ00 = .
m3 m1 m2
− The above example shows that there can be multiple stable matchings. Some inspec-
tion reveals that every man likes µ00 as well as µ0 while every woman likes µ0 as well as
µ00 .
86
− A matching is man-optimal if it is stable and every man likes it as well as any other
We ask if there is a matching rule or algorithm that always yields a stable matching whatever
• Gale and Shapley provided one such algorithm, called deferred acceptance procedure.
Step 1: Each man proposes to his first choice among the acceptable women on his
preference list; Each woman only holds her most preferred among the acceptable men
In general, at
Step k: Each man who was rejected in the previous step proposes to his next choice
among the acceptable women on his list; Each woman only holds her most preferred
among the group consisting of the new acceptable proposers and any man she has held
Termination: The process terminates when a step is reached in which no new man is
rejected; After termination, each woman is married to the man she is holding.
− There is also the woman-proposing deferred acceptance procedure in which the roles
87
− Consider the following example with 5 men and 4 women:
P (m1 ) = w1 , w2 , w3 , w4 P (w1 ) = m2 , m3 , m1 , m4 , m5
P (m2 ) = w4 , w2 , w3 , w1 P (w2 ) = m3 , m1 , m2 , m4 , m5
P (m3 ) = w4 , w3 , w1 , w2 P (w3 ) = m5 , m4 , m1 , m2 , m3
P (m4 ) = w1 , w4 , w3 , w2 P (w4 ) = m1 , m4 , m5 , m2 , m3
P (m5 ) = w1 , w2 , w4
w1 w2 w3 w4
;
m1 m2
w1 w2 w3 w4
;
m1 m5 m3 m4
thus revised to
w1 w2 w3 w4
;
m1 m2 m3 m4
Step 4: m5 proposes to w4 , who rejects m5 and holds m4 , which stops the procedure
and results in
w1 w2 w3 w4 (m5 )
µM = .
m1 m2 m3 m4 m5
88
− In our previous example with three men and three women, the man-proposing algo-
Theorem 5.1. Suppose that every agent has a strict preference list. Then, the matching
µM is man-optimal.
− Proof of stability: Suppose that man m and woman w are matched in µM but
m prefers another woman w0 . Then, it must be that at some step of the algorithm, m
proposes to w0 and she rejects m in favor of a man, say m0 , whom she prefers. This,
given how the algorithm works, means that w0 is matched in µM with a man as least
as high-ranked as m0 on her list, which implies that (m, w0 ) is not a blocking pair.
stable match at which these two are matched. We show by induction that there is no
Induction hypothesis: Up to some step t, no woman has rejected a man for whom
she is possible.
We now show that if at step t + 1, some woman w rejects some man m in favor of some
other man m0 , then w is not possible for m. To this end, we consider any matching µ
such that µ(m) = w and show that it is not stable. Suppose to the contrary that µ is
stable. Then, w0 := µ(m0 ) is possible for m0 so, by the above hypothesis, m0 has yet to
89
− Symmetrically, the woman-proposing deferred acceptance algorithm yields a stable
− One can also show that when all agents have strict preferences, the interests of two
sides are opposed on the set of stable matchings: If µ and µ0 are stable, then all men
like µ at least as well as µ0 if and only if all women like µ0 at least as well as µ.
Proof. Let µ and µ0 stable and µ(m) ≥m µ0 (m) for all m ∈ M . Suppose to the contrary
that for some w ∈ W , µ(w) >w µ0 (w). We show that µ0 cannot be stable. Let m = µ(w).
(m, w) blocks µ0 .
− Moreover, the set of stable matchings has an algebraic structure, called lattice.
In a situation where agents’ preferences are unknown, a stable matching can be implemented
by asking each agent to report his/her preference list and then running, for instance, the
deferred acceptance procedure according to the reported preference profile. With no mea-
sures to check the truthfulness of each agent’s report, however, there arises an incentive
problem, i.e. whether each agent is willing to report his/her true preference, given the
(possibly false) preferences and which maps the reported preference profile to a matching
outcome.
90
A matching mechanism defined this way will be without an incentive problem if it is
Proposition 5.1. There does exist no stable matching mechanism that is strategy-proof.
Proof. The proof is done with an example with two men and two women:
P (m1 ) = w1 , w2 P (w1 ) = m2 , m1
P (m2 ) = w2 , w1 P (w2 ) = m1 , m2 .
There are only two stable matchings, µ and ν: µ(mi ) = wi for i = 1, 2 and ν(mi ) =
that if w2 reports a preference Q(w2 ) = m1 while all others report their true preferences,
then ν is the only stable matching with respect to the reported preference profile P 0 =
(P (m1 ), P (m2 ), P (w1 ), Q(w2 )) so any stable mechanism must select ν when P 0 is reported.
Thus, w2 is better off being matching with m1 after reporting Q(w2 ) instead of her true
preference.
Despite the negative result in Proposition 5.1, Gale-Shapley algorithm works well with
• Given the man-proposing algorithm, it is a dominant strategy for each man to report his
true preference.
91
− For a proof, refer to Roth and Sotomayor (1992).
− Combined with this observation, Proposition 5.1 implies that women do have incentive
− Let us go back to the previous example with three men and three women. If the
man-proposing algorithm is run so that men are reporting truthfully, then women can
problem, an agent (college or hospital) on one side is matched to more than one agent (stu-
dent or intern) on the other side. Our analysis in the previous section can be easily extended
the college admission problem in which there are a set of colleges, C = {C1 , · · · , Cn }, and
has preference over individual students, denoted P (C) while each student can only attend
one school and has preference over C. Each college also has preference over 2S , i.e. sets
of students. We assume that the preferences of colleges over 2S are responsive in the fol-
lowing sense: For any college C and two sets of students A and A0 that are identical with
|A| = |A0 | ≤ qC except that s ∈ A\A0 and s0 ∈ A0 \A for some s, s0 ∈ S, we have A >C A0
92
if and only if s >C s0 .
• A matching is a mapping µ that satisfies the followings: (i) µ(s) ∈ C ∪ {s}; (ii) µ(C) ⊂ S
or any college-student pair, that is if there is no pair (C, s) for which C >s µ(s) and
− There is a stronger notion of stability, called group stability, that requires a matching
There is an easy way to translate the college admission model into a related marriage
problem. For a college C, treated as a men, create qC “men”, c1 , c2 · · · , cqC , each of whom
has the same preference over students as C. The preference list of each student, treated as
a woman, is then modified by replacing each entry C, wherever it appear on her list, by
• Some, but not all, results from the marriage problem generalize to college admission
problem.
− A matching of the college admission problem is stable if and only if the corresponding
− When the colleges’ preferences over individual students are strict, the matching result-
(college-optimal, resp.).
93
− In a matching mechanism that yields the student-optimal stable matchings, it is a
− However, there does not exist any matching mechanism in which it is a dominant
strategy for colleges to report their true preferences. This is proved with the following
example in which there are four students and three colleges with q1 = 2 and q2 = q3 = 1:
P (s1 ) = C3 , C1 , C2 P (C1 ) = s1 , s2 , s3 , s4
P (s2 ) = C2 , C1 , C3 P (C2 ) = s1 , s2 , s3 , s4
P (s3 ) = C1 , C3 , C2 P (C3 ) = s3 , s1 , s2 , s4
P (s4 ) = C1 , C2 , C3 .
C1 C2 C3
µ= .
{s3 , s4 } {s2 } {s1 }
Suppose now that C1 reports a false preference P 0 (C1 ) = s1 , s4 , C1 while all other
agents report their true preferences, so that the reported preference profile is P 0 =
(P 0 (C1 ), P (C2 ), P (C3 ), P (s1 ), · · · , P (s4 )). Given P 0 , a unique stable matching is
C1 C2 C3
µ0 = ,
{s1 , s4 } {s2 } {s3 }
− The above matching µ has another problem: There is a (unstable) matching that is
C1 C2 C3
µ00 = .
{s2 , s4 } {s1 } {s3 }
94
This kind of problem does not arise in the one-to-one matching.
− Consider another example in which there are three colleges with qi = 1, i = 1, 2, 3 and
three students:
P (s1 ) = C2 , C1 , C3 P (C1 ) = s1 , s3 , s2
P (s2 ) = C1 , C2 , C3 P (C2 ) = s2 , s1 , s3
P (s3 ) = C1 , C2 , C3 P (C3 ) = s2 , s1 , s3 .
C1 C2 C3
.
{s1 } {s2 } {s3 }
C1 C2 C3
.
{s2 } {s1 } {s3 }
The last example shows that if one considers that only students’ preferences are important
in evaluating the efficiency of matchings, then the stability may conflict with the Pareto
efficiency.
In this section, we study the matching problem in which the preferences of agents on one
side are not as important as those of agents on the other side. As shown in the last example
of Subsection 5.1.3, the stability and Pareto efficiency may not stand together as far as the
preferences of students are concerned. Here, we ask whether by forgoing the stability
95
requirement, we can find a matching mechanism that always yields the Pareto efficiency
We adopt the same setup as in Subsection 5.1.3 except that colleges are called (high) schools
and colleges’ preferences are treated as schools’ priority rankings. For instance, a priority
ranking of a student for a given school can be determined according to: (i) whether (s)he
has a sibling in that school; (ii) how close the school is to the student’s residence; and so
on. Students in the same priority group are randomly ordered by a lottery. We assume
that the prior rankings of schools are publicly known before a matching is implemented
• The following matching mechanism, called top trading cycles, yields a Pareto efficient
− Given the reported preference profile, the top trading cycles mechanism is run in the
following steps:
Step 1: Each student points to his/her first choice among the schools; Each school
points to the student who has the highest priority for the school; There must be at
seat in the school (s)he points to and is removed. Also, each school removed as soon
In general, at
96
Step k: Each remaining student points to his/her first choice among the remaining
schools; Each remaining school points to the student who has the highest priority for
the school; Whatever circle is found, every student in that circle is assigned a seat in
the school she points to and is removed. Also, each school is removed as soon as its
quota is filled.
Termination: The algorithm terminates when all students are assigned a seat or all
− Consider the last example in subsection 5.1.3 and apply the top trading cycle. In the
fist step, there forms a circle (s1 , C2 , s2 , C1 ). Once these are removed, in the second
C1 C2 C3
,
{s2 } {s1 } {s3 }
− The top trade cycles mechanism is Pareto efficient for the students.
97