(Translated by https://www.hiragana.jp/)
Sybil-Proof Mechanism for Information Propagation with Budgets

Sybil-Proof Mechanism for Information Propagation with Budgets

Junjie Zheng1    Xu Ge1    Bin Li 2    Dengji Zhao 1∗
1ShanghaiTech University
2Nanjing University of Science and Technology
{zhengjj, gexu, zhaodj}@shanghaitech.edu.cn, cs.libin@njust.edu.cn
Abstract

This paper examines the problem of distributing rewards on social networks to improve the efficiency of crowdsourcing tasks for sponsors. To complete the tasks efficiently, we aim to design reward mechanisms that incentivize early-joining agents to invite more participants to the tasks. Nonetheless, participants could potentially engage in strategic behaviors, e.g., not inviting others to the tasks, misreporting their capacity for the tasks, or creaking fake identities (aka Sybil attacks), to maximize their own rewards. The focus of this study is to address the challenge outlined above by designing effective reward mechanisms. To this end, we propose a novel reward mechanism, called Propagation Reward Distribution Mechanism (PRDM), for the general information propagation model with limited budgets. It is proved that the PRDM can not only incentivize all agents to contribute their full efforts to the tasks and share the task information to all their neighbors in the social networks, but can also prevent them from Sybil attacks.

1 Introduction

The widespread availability of mobile Internet devices has fostered greater interconnectedness among individuals via social networks and amplified the impact of information spread through social connections.Corresponding Author. In certain fields, including viral marketing Leskovec et al. (2006), crowdsourcing distribution Singer and Mittal (2011); Doan et al. (2011), answer querying Kleinberg and Raghavan (2005), sponsors frequently incentivize participants with monetary rewards to gather as much data or sell as many products as possible. In 2005, Amazon launched a crowdsourcing platform called Amazon Mechanical Turk (MTurk) to gather data from non-professionals. On the MTurk platform, the sponsors can post tasks and rewards, and then the workers claim the tasks and receive payments accordingly based on the quantity and quality of their completed tasks. Many studies requiring extensive data started collecting data through MTurk Sorokin and Forsyth (2008). One study in 2019 showed that more than 250,000 people have completed at least one task on MTurk Robinson et al. (2019). However, a large percentage of these workers are fixed, which is mainly because that inviting new people to join is not beneficial. Making existing workers invite more people to participate can significantly improve efficiency.

In this paper, we aim to adequately utilize people’s connections in the network to design a reward distribution mechanism Zhang and Zhao (2022). This mechanism incentivizes agents to invite more people to participate by the reward distribution, which eventually improves the overall completion efficiency. The first difficulty is distributing the rewards within a constrained budget. The mechanism should motivate agents to spread the information in their social network as much as possible. In the DARPA network challenge Pickard et al. (2010); Tang et al. (2011), the winning team from MIT used a pioneering mechanism to effectively motivate people to spread information and quickly found all ten red balloons. In multi-level marketing Emek et al. (2011a); Drucker and Fleischer (2012), the seller expects to sell more products by attracting more people to purchase. In our problem setting, we also need to properly allocate the limited budget to participants.

Another difficulty is resolving Sybil attacks in social networks. A Sybil attack is when participants create multiple false identities to accomplish specific purposes. Sybil attacks are widespread and easily performed, affecting eventual results and harming others Alothali et al. (2018); Yu et al. (2006); Zhang et al. (2014). Traditional defense approaches are mainly focused on the communication domain Chen et al. (2021); Jamshidi et al. (2019); Zhang and Lee (2019). Scholars have extensively studied this phenomenon in various domains, such as the Vickrey-Clarke-Groves process in auction theory is vulnerable to Sybil attacks Yokoo et al. (2004), and Yokoo et al. Yokoo et al. (2001) developed a new protocol against false-name bids. In Bitcoin transactions, Babaioff et al. Babaioff et al. (2012) devised a scheme that rewards information propagation to prevent Sybil attacks to make more revenue. In crowdsourcing, individuals have different abilities, such as computing power, purchasing advertising, or providing data. Emek et al. Emek et al. (2011b) solved the problem of Sybil attacks in viral marketing by rewarding propagation behavior based on the size of a maximum perfect binary tree. We aim to use this authentic contribution information to design an information propagation mechanism that defends against Sybil attacks.

In this paper, our mechanism drives improvements in the following dimensions.

  • We propose a model that quantifies an agent’s contribution by introducing the concept of capacity. The model considers the general setting of Sybil attacks.

  • We propose a novel natural mechanism to allocate rewards that maximize information propagation within a limited budget while resisting Sybil attacks.

Related work. With a fixed budget, Shi et al. Shi et al. (2020) devised a mechanism that maximizes information propagation but is not resistant to Sybil attacks. Chen et al. Chen and Li (2021) designed a special scenario of a free market with lotteries, where participants have a strong incentive to maximize the diffusion of information, and false-name manipulations fail to yield excessive rewards. In the answer querying problem, Zhang et al. Zhang et al. (2020) designed a mechanism that incentivizes the agents to propagate the requestor’s query information while making the Sybil attack unavailable for additional gain. However, their mechanism only solves the scene of a single problem query in a tree. Hong et al. Chen et al. (2022) solved the problem of Sybil attacks in diffusion auctions by removing possible fake agents by graph-structured methods, providing a new approach to tackle similar issues.

The remainder of this paper is organized as follows. Section 2 describes the fundamental setup and definition of the model. Section 3 shows our mechanism and an example of running the mechanism. Section 4 shows the properties of our mechanism. In Section 5, we discuss these properties. In Section 6, we summarize our work and discuss possible future directions.

2 The Model

We consider the crowdsourcing problem powered by social networks, where a sponsor expects to leverage the social connections to recruit more participants (or agents) to some crowdsourcing task, e.g., data collecting. For convenience, we model the social connections of all agents as a directed graph G=(V,E)𝐺𝑉𝐸G=(V,E)italic_G = ( italic_V , italic_E ), where V𝑉Vitalic_V represents the set of vertices and E𝐸Eitalic_E denotes the edge set. Except for the sponsor s𝑠sitalic_s, the graph G𝐺Gitalic_G consists of a set N={1,,n}𝑁1𝑛N=\{1,\ldots,n\}italic_N = { 1 , … , italic_n } of agents who can contribute to the task, i.e., V={s}N𝑉𝑠𝑁V=\{s\}\cup Nitalic_V = { italic_s } ∪ italic_N. For each agent iN𝑖𝑁i\in Nitalic_i ∈ italic_N, we denote by cisubscript𝑐𝑖c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT the maximum contribution capacity (or simply, capacity) of i𝑖iitalic_i for the task, e.g., cisubscript𝑐𝑖c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT can denote the affordable number of pictures that need to be labeled. For any two agents i,jV𝑖𝑗𝑉i,j\in Vitalic_i , italic_j ∈ italic_V, there is an edge (i,j)E𝑖𝑗𝐸(i,j)\in E( italic_i , italic_j ) ∈ italic_E if and only if agent i𝑖iitalic_i can invite agent j𝑗jitalic_j. Given an edge (i,j)E𝑖𝑗𝐸(i,j)\in E( italic_i , italic_j ) ∈ italic_E, we say j𝑗jitalic_j is a child of i𝑖iitalic_i and use nisubscript𝑛𝑖n_{i}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT to denote the set of i𝑖iitalic_i’s children in G𝐺Gitalic_G. Without promotions, the sponsor can only recruit her direct children nssubscript𝑛𝑠n_{s}italic_n start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT to the task, and within such small number of participants the task may fail to be accomplished. To attract more agents, the sponsor plans to reward the participants to incentivize them to further spread the task information to their children, under a total budget of B𝐵Bitalic_B, and the amount of each participant’s reward is determined by her reports, including her performance on the task and her diffusion efforts.

As usual, let ti=(ni,ci)subscript𝑡𝑖subscript𝑛𝑖subscript𝑐𝑖t_{i}=(n_{i},c_{i})italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ( italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) be agent i𝑖iitalic_i’s private type, where nisubscript𝑛𝑖n_{i}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT denotes the set of her children and ci>0subscript𝑐𝑖0c_{i}>0italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT > 0 is her capacity. In addition, denote by 𝐭=(t1,,tn)𝐭subscript𝑡1subscript𝑡𝑛\mathbf{t}=(t_{1},\ldots,t_{n})bold_t = ( italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) the type profile of all agents, and 𝐭isubscript𝐭𝑖\mathbf{t}_{-i}bold_t start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT the type profile of all agents except agent i𝑖iitalic_i, i.e., 𝐭=(ti,𝐭i)𝐭subscript𝑡𝑖subscript𝐭𝑖\mathbf{t}=(t_{i},\mathbf{t}_{-i})bold_t = ( italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ). For convenience’s sake, we use 𝒯i=𝒫(N)×+subscript𝒯𝑖𝒫𝑁superscript\mathcal{T}_{i}=\mathcal{P}(N)\times\mathbb{R}^{+}caligraphic_T start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = caligraphic_P ( italic_N ) × blackboard_R start_POSTSUPERSCRIPT + end_POSTSUPERSCRIPT to denote the type space of agent i𝑖iitalic_i where 𝒫(N)𝒫𝑁\mathcal{P}(N)caligraphic_P ( italic_N ) is the power set of the set N𝑁Nitalic_N, and 𝒯=×𝒯i\mathcal{T}=\times\mathcal{T}_{i}caligraphic_T = × caligraphic_T start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT to denote the space of all type profiles. As tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is private information, agent i𝑖iitalic_i can cheat the sponsor to benefit herself. Let ti=(ni,ci)subscriptsuperscript𝑡𝑖superscriptsubscript𝑛𝑖subscriptsuperscript𝑐𝑖t^{\prime}_{i}=(n_{i}^{\prime},c^{\prime}_{i})italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ( italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_c start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) be the type reported by agent i𝑖iitalic_i, i.e., i𝑖iitalic_i diffused information to nisuperscriptsubscript𝑛𝑖n_{i}^{\prime}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT and contributed cisubscriptsuperscript𝑐𝑖c^{\prime}_{i}italic_c start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT to the task. Since agent i𝑖iitalic_i is unaware of other agents in the graph who are not her children and cannot contribute more than her capacity, we require that ninisuperscriptsubscript𝑛𝑖subscript𝑛𝑖n_{i}^{\prime}\subseteq n_{i}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and ci(0,ci]subscriptsuperscript𝑐𝑖0subscript𝑐𝑖c^{\prime}_{i}\in(0,c_{i}]italic_c start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ ( 0 , italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ]. Similarly, let 𝐭=(ti,𝐭i)superscript𝐭subscriptsuperscript𝑡𝑖subscriptsuperscript𝐭𝑖\mathbf{t}^{\prime}=(t^{\prime}_{i},\mathbf{t}^{\prime}_{-i})bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) denote the report profile of all agents, where 𝐭isubscriptsuperscript𝐭𝑖\mathbf{t}^{\prime}_{-i}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT represents the report profile of all agents except agent i𝑖iitalic_i. Accordingly, we use 𝒯i=𝒫(ni)×(0,ci]subscriptsuperscript𝒯𝑖𝒫subscript𝑛𝑖0subscript𝑐𝑖\mathcal{T}^{\prime}_{i}=\mathcal{P}(n_{i})\times(0,c_{i}]caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = caligraphic_P ( italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) × ( 0 , italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ] to denote the space of tisubscriptsuperscript𝑡𝑖t^{\prime}_{i}italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, 𝒯=×𝒯i\mathcal{T}^{\prime}=\times\mathcal{T}^{\prime}_{i}caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = × caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT the space of 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, and 𝒯i=×ji𝒯j\mathcal{T}^{\prime}_{-i}=\times_{j\neq i}\mathcal{T}^{\prime}_{j}caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT = × start_POSTSUBSCRIPT italic_j ≠ italic_i end_POSTSUBSCRIPT caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT the space of 𝐭isubscriptsuperscript𝐭𝑖\mathbf{t}^{\prime}_{-i}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT.

Definition 1.

Given a report profile 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, we say agent i𝑖iitalic_i is active if there exists a sequence of agents {i1,i2,,ik}subscript𝑖1subscript𝑖2subscript𝑖𝑘\{i_{1},i_{2},\ldots,i_{k}\}{ italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_i start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT }, where i1ns,inikformulae-sequencesubscript𝑖1subscript𝑛𝑠𝑖superscriptsubscript𝑛subscript𝑖𝑘i_{1}\in n_{s},i\in n_{i_{k}}^{\prime}italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ∈ italic_n start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT , italic_i ∈ italic_n start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT and ijnij1subscript𝑖𝑗superscriptsubscript𝑛subscript𝑖𝑗1i_{j}\in n_{i_{j-1}}^{\prime}italic_i start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_n start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_j - 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT holds for any 1<jk1𝑗𝑘1<j\leq k1 < italic_j ≤ italic_k.

That is, an agent is an active agent if there is a “diffusion path” from the sponsor to her. Note that only active agents are real participants of the crowdsourcing task. Based on the definition of active agents, we next introduce the concept of active network.

Definition 2.

Given a report profile 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, we use G(𝐭)=(V(𝐭),E(𝐭))𝐺superscript𝐭𝑉superscript𝐭𝐸superscript𝐭G(\mathbf{t}^{\prime})=(V(\mathbf{t}^{\prime}),E(\mathbf{t}^{\prime}))italic_G ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = ( italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) , italic_E ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) ) (or G=(V,E)superscript𝐺superscript𝑉superscript𝐸G^{\prime}=(V^{\prime},E^{\prime})italic_G start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = ( italic_V start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_E start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) for short) to denote the active network generated by 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, where Vsuperscript𝑉V^{\prime}italic_V start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is the set of all active agents and E={(i,j)|(iV,jni)(i=s,jns)}superscript𝐸conditional-set𝑖𝑗formulae-sequence𝑖superscript𝑉𝑗superscriptsubscript𝑛𝑖formulae-sequence𝑖𝑠𝑗subscript𝑛𝑠E^{\prime}=\{(i,j)|(i\in V^{\prime},j\in n_{i}^{\prime})\vee(i=s,j\in n_{s})\}italic_E start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = { ( italic_i , italic_j ) | ( italic_i ∈ italic_V start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j ∈ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) ∨ ( italic_i = italic_s , italic_j ∈ italic_n start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT ) }.

The active network represents all agents that do participate in the task. Given any report profile 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, the sponsor only need to reward agents in the active networks.

Definition 3.

A reward distribution mechanism M=(ri)iN𝑀subscriptsubscript𝑟𝑖𝑖𝑁M=(r_{i})_{i\in N}italic_M = ( italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) start_POSTSUBSCRIPT italic_i ∈ italic_N end_POSTSUBSCRIPT on the social network consists of a set of reward functions, where ri:𝒯:subscript𝑟𝑖superscript𝒯r_{i}:\mathcal{T}^{\prime}\to\mathbb{R}italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT : caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT → blackboard_R is the reward function for i𝑖iitalic_i and ri(𝐭)=0subscript𝑟𝑖superscript𝐭0r_{i}(\mathbf{t}^{\prime})=0italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = 0 for an inactive agent i𝑖iitalic_i.

Given any report profile 𝐭𝒯superscript𝐭superscript𝒯\mathbf{t}^{\prime}\in\mathcal{T}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, ri(𝐭)subscript𝑟𝑖superscript𝐭r_{i}(\mathbf{t}^{\prime})italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) outputs the reward to i𝑖iitalic_i. If an agent is not in the active network, her reward is always zero as she does not participate in the task and contributes nothing. When 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is clear from the context, we write as 𝐫𝐫\mathbf{r}bold_r and risubscript𝑟𝑖r_{i}italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for short. In the following, we define some desirable properties that a reward mechanism should satisfy. First, the reward mechanism should be individually rational, which guarantees that each participant is willing to stay in the mechanism.

Definition 4.

A reward distribution mechanism M𝑀Mitalic_M is individually rational (IR) if ri(𝐭)0subscript𝑟𝑖superscript𝐭0r_{i}(\mathbf{t}^{\prime})\geq 0italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) ≥ 0 for all graph G𝐺Gitalic_G, all iN𝑖𝑁i\in Nitalic_i ∈ italic_N and all report profile 𝐭𝒯superscript𝐭superscript𝒯\mathbf{t}^{\prime}\in\mathcal{T}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT.

If a reward mechanism is not individually rational, then in certain cases some participants will pay to the sponsor and the best reply is leaving the mechanism. Therefore, the individually rational property is also known as the participation constraint. Besides the IR property, the sponsor also expects an agent to authentically contribute all her abilities and invite all her children to the task.

Definition 5.

A reward distribution mechanism M𝑀Mitalic_M is incentive compatible (IC) if the following inequality

ri(ti,𝐭i)ri(ti,𝐭i)subscript𝑟𝑖subscript𝑡𝑖subscriptsuperscript𝐭𝑖subscript𝑟𝑖subscriptsuperscript𝑡𝑖subscriptsuperscript𝐭𝑖r_{i}(t_{i},\mathbf{t}^{\prime}_{-i})\geq r_{i}(t^{\prime}_{i},\mathbf{t}^{% \prime}_{-i})italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) ≥ italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) (1)

holds for all graph G𝐺Gitalic_G, all iN𝑖𝑁i\in Nitalic_i ∈ italic_N, all ti𝒯isubscript𝑡𝑖subscript𝒯𝑖t_{i}\in\mathcal{T}_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ caligraphic_T start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, all ti𝒯isubscriptsuperscript𝑡𝑖subscriptsuperscript𝒯𝑖t^{\prime}_{i}\in\mathcal{T}^{\prime}_{i}italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and all 𝐭i𝒯isubscriptsuperscript𝐭𝑖subscriptsuperscript𝒯𝑖\mathbf{t}^{\prime}_{-i}\in\mathcal{T}^{\prime}_{-i}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ∈ caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT.

Incentive compatibility implies that diffusing the task information to all children and contributing all her efforts to the task is a dominant strategy for all agents. As the sponsor is endowed with a fixed budget, the total rewards to agents are limited.

Definition 6.

A reward distribution mechanism M𝑀Mitalic_M is budget balanced (BB) if

i=1nri(𝐭)=Bsubscriptsuperscript𝑛𝑖1subscript𝑟𝑖superscript𝐭𝐵\sum^{n}_{i=1}{r_{i}(\mathbf{t}^{\prime})}=B∑ start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = italic_B (2)

for all graph G𝐺Gitalic_G, all iN𝑖𝑁i\in Nitalic_i ∈ italic_N and all report profile 𝐭𝒯superscript𝐭superscript𝒯\mathbf{t}^{\prime}\in\mathcal{T}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT.

Definition 7.

A reward distribution mechanism M𝑀Mitalic_M is asymptotically budget balanced (ABB) if

limiNciiNri(𝐭)=Bsubscriptsubscript𝑖𝑁superscriptsubscript𝑐𝑖subscript𝑖𝑁subscript𝑟𝑖superscript𝐭𝐵\lim_{\sum_{i\in N}{c_{i}^{\prime}}\to\infty}\sum_{i\in N}{r_{i}(\mathbf{t}^{% \prime})}=Broman_lim start_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i ∈ italic_N end_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT → ∞ end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i ∈ italic_N end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = italic_B (3)

for all graph G𝐺Gitalic_G, all iN𝑖𝑁i\in Nitalic_i ∈ italic_N and all report profile 𝐭𝒯superscript𝐭superscript𝒯\mathbf{t}^{\prime}\in\mathcal{T}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT.

The ABB property requires the sponsor’s budget to be fully distributed to agents when the sum of all agents’ contributions goes to infinity. If a reward mechanism is IR and IC, then agents are motivated to contribute all their capacities and propagate the task information to all their children. However, as the agents are individuals distributed in the network, they can easily create fake identities or even fake social networks to gain more reward. Such behaviors are called Sybil attack or false-name attack, and a good reward mechanism should prevent such kind of behavior. Next, we give a formal definition of Sybil attacks.

Definition 8.

A Sybil attack of agent i𝑖iitalic_i is denoted by an attacking type report ai=(νi,τi)𝒜isubscript𝑎𝑖subscript𝜈𝑖subscript𝜏𝑖subscript𝒜𝑖a_{i}=(\nu_{i},\tau_{i})\in\mathcal{A}_{i}italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ( italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_τ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ∈ caligraphic_A start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, where νi={i,i1,,im}subscript𝜈𝑖𝑖subscript𝑖1subscript𝑖𝑚\nu_{i}=\{i,i_{1},\ldots,i_{m}\}italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = { italic_i , italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT } is a set of fake identities and accordingly τi={ti,ti1,,tim}subscript𝜏𝑖subscriptsuperscript𝑡𝑖subscriptsuperscript𝑡subscript𝑖1subscriptsuperscript𝑡subscript𝑖𝑚\tau_{i}=\{t^{\prime}_{i},t^{\prime}_{i_{1}},\ldots,t^{\prime}_{i_{m}}\}italic_τ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = { italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , … , italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT end_POSTSUBSCRIPT } are their reports, where

  • jνicjcisubscript𝑗subscript𝜈𝑖subscriptsuperscript𝑐𝑗subscript𝑐𝑖\sum_{j\in\nu_{i}}{c^{\prime}_{j}}\leq c_{i}∑ start_POSTSUBSCRIPT italic_j ∈ italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_c start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≤ italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT;

  • njniνisuperscriptsubscript𝑛𝑗subscript𝑛𝑖subscript𝜈𝑖n_{j}^{\prime}\subseteq n_{i}\cup\nu_{i}italic_n start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∪ italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for all jνi𝑗subscript𝜈𝑖j\in\nu_{i}italic_j ∈ italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

In other words, agent i𝑖iitalic_i can create arbitrary number of fake identities and arbitrary social connections between these identities. Let us consider a special case of Sybil attack: all the fake nodes are invited by the inviters of node i𝑖iitalic_i.

Definition 9.

A parallel Sybil attack of agent i𝑖iitalic_i is a special kind of Sybil attack, where νi={i,i1,,im}subscript𝜈𝑖𝑖subscript𝑖1subscript𝑖𝑚\nu_{i}=\{i,i_{1},\ldots,i_{m}\}italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = { italic_i , italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT } is a set of fake identities invited by the parents of i𝑖iitalic_i.

A Parallel Sybil attack implies only fake in parallel, where the fake participants are all invited by at least one inviter of the agent committing the attack. With the definition of Sybil attacks, we intend to design reward mechanisms that can defend against Sybil attacks.

Definition 10.

A reward distribution mechanism M𝑀Mitalic_M is Sybil-proof (SP), if the inequality

jνirj(ai,𝐭i)ri(ti,𝐭i)subscript𝑗subscript𝜈𝑖subscript𝑟𝑗subscript𝑎𝑖subscriptsuperscript𝐭𝑖subscript𝑟𝑖subscript𝑡𝑖subscriptsuperscript𝐭𝑖\sum_{j\in\nu_{i}}{r_{j}(a_{i},\mathbf{t}^{\prime}_{-i})}\leq r_{i}(t_{i},% \mathbf{t}^{\prime}_{-i})∑ start_POSTSUBSCRIPT italic_j ∈ italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) ≤ italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) (4)

holds for all graph G𝐺Gitalic_G, all iN𝑖𝑁i\in Nitalic_i ∈ italic_N, all ti𝒯isubscript𝑡𝑖subscript𝒯𝑖t_{i}\in\mathcal{T}_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ caligraphic_T start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, all 𝐭i𝒯isubscriptsuperscript𝐭𝑖subscriptsuperscript𝒯𝑖\mathbf{t}^{\prime}_{-i}\in\mathcal{T}^{\prime}_{-i}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ∈ caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT and ai𝒜isubscript𝑎𝑖subscript𝒜𝑖a_{i}\in\mathcal{A}_{i}italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ caligraphic_A start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, where (ai,𝐭i)=(ti,ti1,,tim,𝐭i)subscript𝑎𝑖subscriptsuperscript𝐭𝑖subscriptsuperscript𝑡𝑖subscriptsuperscript𝑡subscript𝑖1subscriptsuperscript𝑡subscript𝑖𝑚subscriptsuperscript𝐭𝑖(a_{i},\mathbf{t}^{\prime}_{-i})=(t^{\prime}_{i},t^{\prime}_{i_{1}},\ldots,t^{% \prime}_{i_{m}},\mathbf{t}^{\prime}_{-i})( italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) = ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , … , italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) is the report profile of all agents under Sybil attack aisubscript𝑎𝑖a_{i}italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. The mechanism is parallel Sybil-proof (PSP) if the Sybil attacks satisfy the situation of parallel Sybil attacks.

The SP property may be too strong to be held, and we next introduce a mild condition for Sybil-proofness, called γ𝛾\gammaitalic_γ-SP.

Definition 11.

A reward distribution mechanism M𝑀Mitalic_M is γ𝛾\gammaitalic_γ-Sybil-proof (γ𝛾\gammaitalic_γ-SP), if the inequality

jνirj(ai,𝐭i)γri(ti,𝐭i)subscript𝑗subscript𝜈𝑖subscript𝑟𝑗subscript𝑎𝑖subscriptsuperscript𝐭𝑖𝛾subscript𝑟𝑖subscript𝑡𝑖subscriptsuperscript𝐭𝑖\sum_{j\in\nu_{i}}{r_{j}(a_{i},\mathbf{t}^{\prime}_{-i})}\leq\gamma r_{i}(t_{i% },\mathbf{t}^{\prime}_{-i})∑ start_POSTSUBSCRIPT italic_j ∈ italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) ≤ italic_γ italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) (5)

holds for all graph G=(V,E)𝐺𝑉𝐸G=(V,E)italic_G = ( italic_V , italic_E ), all iN𝑖𝑁i\in Nitalic_i ∈ italic_N, all ti𝒯isubscript𝑡𝑖subscript𝒯𝑖t_{i}\in\mathcal{T}_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ caligraphic_T start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, all 𝐭i𝒯isubscriptsuperscript𝐭𝑖subscriptsuperscript𝒯𝑖\mathbf{t}^{\prime}_{-i}\in\mathcal{T}^{\prime}_{-i}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ∈ caligraphic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT and ai𝒜isubscript𝑎𝑖subscript𝒜𝑖a_{i}\in\mathcal{A}_{i}italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ caligraphic_A start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

In the following contents, we focus on designing reward mechanisms that satisfy IR, IC and other expected properties.

3 Propagation Reward Distribution Mechanism

This section introduces a novel reward distribution mechanism called Propagation Reward Distribution Mechanism (PRDM). PRDM starts by layering a given network and then determines the final rewards for each agent by the contribution phase and propagation phase.

The goal of all agents is to get more rewards except that the sponsor wants to maximize the information propagation instead of receiving a reward. Sponsor s𝑠sitalic_s will always diffuse the information to all the children. For a given report profile 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, we generate the active network G(𝐭)=(V(𝐭),E(𝐭))𝐺superscript𝐭𝑉superscript𝐭𝐸superscript𝐭G(\mathbf{t}^{\prime})=(V(\mathbf{t}^{\prime}),E(\mathbf{t}^{\prime}))italic_G ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = ( italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) , italic_E ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) ). In Gsuperscript𝐺G^{\prime}italic_G start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, define the depth of agent i𝑖iitalic_i as the length of the shortest path from s𝑠sitalic_s to i𝑖iitalic_i, written as dep(i)𝑑𝑒𝑝𝑖dep(i)italic_d italic_e italic_p ( italic_i ). Therefore, different agents can be divided into different layers based on their depths, and define the k𝑘kitalic_k-th layer lk={iV|dep(i)=k}subscript𝑙𝑘conditional-set𝑖superscript𝑉𝑑𝑒𝑝𝑖𝑘l_{k}=\{i\in V^{\prime}|dep(i)=k\}italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = { italic_i ∈ italic_V start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT | italic_d italic_e italic_p ( italic_i ) = italic_k } as the set of all agents with depth k𝑘kitalic_k.

Since we only allow information to be propagated from the previous layer to the next layer, for all ilk𝑖subscript𝑙𝑘i\in l_{k}italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, only the edges from agent i𝑖iitalic_i to the agents in the (k+1)𝑘1(k+1)( italic_k + 1 )-th layer are retained. By the above processing, we construct a layered directed graph based on 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. Figure 1 shows an example of how to get the corresponding layered graph from an active network. In the obtained layered graph, for any ilk𝑖subscript𝑙𝑘i\in l_{k}italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, define pisubscript𝑝𝑖p_{i}italic_p start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT as the set of all parents of i𝑖iitalic_i in (k1)𝑘1(k-1)( italic_k - 1 )-th layer.

Refer to caption
Figure 1: An example of transforming an active network (a) into a layered graph (b).
Input: A report profile 𝐭superscript𝐭\mathbf{t}^{\prime}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, a fixed budget B𝐵Bitalic_B and parameters cs>0subscript𝑐𝑠0c_{s}>0italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT > 0 and β[0,1/2]𝛽012\beta\in[0,1/2]italic_β ∈ [ 0 , 1 / 2 ]
1 Construct the active network G(𝐭)=(V(𝐭),E(𝐭))𝐺superscript𝐭𝑉superscript𝐭𝐸superscript𝐭G(\mathbf{t}^{\prime})=(V(\mathbf{t}^{\prime}),E(\mathbf{t}^{\prime}))italic_G ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = ( italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) , italic_E ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) );
2 Compute the depth of each agent who is on the graph G(𝐭)𝐺superscript𝐭G(\mathbf{t}^{\prime})italic_G ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) to obtain the layer sets l1,l2,,ldsubscript𝑙1subscript𝑙2subscript𝑙𝑑l_{1},l_{2},\ldots,l_{d}italic_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_l start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_l start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT;
3 For k=1,2,,d𝑘12𝑑k=1,2,\ldots,ditalic_k = 1 , 2 , … , italic_d, let Ck=cs+iV(𝐭),dep(i)kcisuperscriptsubscript𝐶𝑘subscript𝑐𝑠subscriptformulae-sequence𝑖𝑉superscript𝐭𝑑𝑒𝑝𝑖𝑘superscriptsubscript𝑐𝑖C_{k}^{\prime}=c_{s}+\sum_{i\in V(\mathbf{t}^{\prime}),dep(i)\leq k}{c_{i}^{% \prime}}italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_i ∈ italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) , italic_d italic_e italic_p ( italic_i ) ≤ italic_k end_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT be the total contribution of s𝑠sitalic_s and layer l1,l2,,lksubscript𝑙1subscript𝑙2subscript𝑙𝑘l_{1},l_{2},\ldots,l_{k}italic_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_l start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT;
4 Contribution phase: Initialize each agent’s weight wi=0subscript𝑤𝑖0w_{i}=0italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = 0 for iN𝑖𝑁i\in Nitalic_i ∈ italic_N, and the initial budget of the first layer is B1=Bsubscript𝐵1𝐵B_{1}=Bitalic_B start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_B;
5 for k=1,2,,d𝑘12𝑑k=1,2,\ldots,ditalic_k = 1 , 2 , … , italic_d do
6       for each agent ilk𝑖subscript𝑙𝑘i\in l_{k}italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT do
7             wi=ciCkBksubscript𝑤𝑖superscriptsubscript𝑐𝑖superscriptsubscript𝐶𝑘subscript𝐵𝑘w_{i}=\frac{c_{i}^{\prime}}{C_{k}^{\prime}}B_{k}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT;
8            
9      Bk+1=Bkilkwisubscript𝐵𝑘1subscript𝐵𝑘subscript𝑖subscript𝑙𝑘subscript𝑤𝑖B_{k+1}=B_{k}-\sum_{i\in l_{k}}{w_{i}}italic_B start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT = italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT - ∑ start_POSTSUBSCRIPT italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT;
10      
11Propagation phase: Initialize each agent’s reward ri=wisubscript𝑟𝑖subscript𝑤𝑖r_{i}=w_{i}italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for all il1𝑖subscript𝑙1i\in l_{1}italic_i ∈ italic_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT, and ri=(1β)wisubscript𝑟𝑖1𝛽subscript𝑤𝑖r_{i}=(1-\beta)w_{i}italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ( 1 - italic_β ) italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for iNl1𝑖𝑁subscript𝑙1i\in N\setminus l_{1}italic_i ∈ italic_N ∖ italic_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT;
12 for k=2,3,,d𝑘23𝑑k=2,3,\ldots,ditalic_k = 2 , 3 , … , italic_d do
13       for each agent ilk𝑖subscript𝑙𝑘i\in l_{k}italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT do
14             for each agent jpi𝑗subscript𝑝𝑖j\in p_{i}italic_j ∈ italic_p start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT do
15                   rj=rj+cjmpicmβwisubscript𝑟𝑗subscript𝑟𝑗superscriptsubscript𝑐𝑗subscript𝑚subscript𝑝𝑖superscriptsubscript𝑐𝑚𝛽subscript𝑤𝑖r_{j}=r_{j}+\frac{c_{j}^{\prime}}{\sum_{m\in p_{i}}{c_{m}^{\prime}}}\beta w_{i}italic_r start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT + divide start_ARG italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_m ∈ italic_p start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_β italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT;
16                  
17            
18      
Output: the reward vector 𝐫(𝐭)𝐫superscript𝐭\mathbf{r}(\mathbf{t}^{\prime})bold_r ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT )
Algorithm 1 Propagation Reward Distribution Mechanism

PRDM is divided into a contribution phase and a propagation phase. In the contribution phase, the corresponding weight is determined by each agent’s depth and contribution. In the propagation phase, the weight is redistributed according to agents’ propagation and output agents’ final reward. In PRDM, the parameter cssubscript𝑐𝑠c_{s}italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT is a virtual capacity of the sponsor, which is utilized to deliver the budget to the following layers. The parameter β𝛽\betaitalic_β measures what proportion of the rewards an agent gives her invitees. With the above definitions, the general procedure of PRDM is shown in Algorithm 1.

Refer to caption
Figure 2: An example of PRDM on input B=100𝐵100B=100italic_B = 100, cs=20subscript𝑐𝑠20c_{s}=20italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT = 20, β=0.2𝛽0.2\beta=0.2italic_β = 0.2, each agent has a contribution of 10101010. (a) the invitation relationship among the sponsor and each agent. (b) each layer’s initial budget Bksubscript𝐵𝑘B_{k}italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and each agent’s weight wisubscript𝑤𝑖w_{i}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT in contribution phase. (c) the transfer of reward during propagation phase and each agent’s final reward risubscript𝑟𝑖r_{i}italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

3.1 An Example of PRDM

In this subsection, we show an example of the mechanism in operation. An instance is shown in Figure 2 to give an illustration of PRDM. The sponsor transmits the information to the first layer l1={1,2,3}subscript𝑙1123l_{1}=\{1,2,3\}italic_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = { 1 , 2 , 3 }. After that, l2={4,5,6}subscript𝑙2456l_{2}=\{4,5,6\}italic_l start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = { 4 , 5 , 6 } and l3={7,8}subscript𝑙378l_{3}=\{7,8\}italic_l start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT = { 7 , 8 }. The invitation relationships among all the agents are presented in Figure 2(a).

Assuming a budget B=100𝐵100B=100italic_B = 100, we set β=0.2𝛽0.2\beta=0.2italic_β = 0.2 and cs=20subscript𝑐𝑠20c_{s}=20italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT = 20, all agents report a contribution of 10101010. The process of distributing rewards using PRDM is as follows.

Contribution phase:

  • Step 1: C1superscriptsubscript𝐶1C_{1}^{\prime}italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is the total contribution of sponsor s𝑠sitalic_s and agents 1111, 2222, and 3333. We can calculate C1=20+310=50superscriptsubscript𝐶12031050C_{1}^{\prime}=20+3*10=50italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = 20 + 3 ∗ 10 = 50 and the budget B1=B=100subscript𝐵1𝐵100B_{1}=B=100italic_B start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_B = 100, so that each of them has weight

    w1=w2=w3=1050100=20subscript𝑤1subscript𝑤2subscript𝑤3105010020w_{1}=w_{2}=w_{3}=\frac{10}{50}*100=20italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_w start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = italic_w start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT = divide start_ARG 10 end_ARG start_ARG 50 end_ARG ∗ 100 = 20
  • Step 2: Calculate the budget B2=B1w1w2w3=40subscript𝐵2subscript𝐵1subscript𝑤1subscript𝑤2subscript𝑤340B_{2}=B_{1}-w_{1}-w_{2}-w_{3}=40italic_B start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = italic_B start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT - italic_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT - italic_w start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - italic_w start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT = 40 and C2=C1+310=80superscriptsubscript𝐶2superscriptsubscript𝐶131080C_{2}^{\prime}=C_{1}^{\prime}+3*10=80italic_C start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + 3 ∗ 10 = 80. Then we obtain the weight of the agent 4444, 5555, and 6666 as

    w4=w5=w6=108040=5subscript𝑤4subscript𝑤5subscript𝑤61080405w_{4}=w_{5}=w_{6}=\frac{10}{80}*40=5italic_w start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT = italic_w start_POSTSUBSCRIPT 5 end_POSTSUBSCRIPT = italic_w start_POSTSUBSCRIPT 6 end_POSTSUBSCRIPT = divide start_ARG 10 end_ARG start_ARG 80 end_ARG ∗ 40 = 5
  • Step 3: Similarly, B3=B2w4w5w6=25subscript𝐵3subscript𝐵2subscript𝑤4subscript𝑤5subscript𝑤625B_{3}=B_{2}-w_{4}-w_{5}-w_{6}=25italic_B start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT = italic_B start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - italic_w start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT - italic_w start_POSTSUBSCRIPT 5 end_POSTSUBSCRIPT - italic_w start_POSTSUBSCRIPT 6 end_POSTSUBSCRIPT = 25, C3=C2+210=100superscriptsubscript𝐶3superscriptsubscript𝐶2210100C_{3}^{\prime}=C_{2}^{\prime}+2*10=100italic_C start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_C start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + 2 ∗ 10 = 100, so the weight of agents 7777 and 8888 is

    w7=w8=1010025=2.5subscript𝑤7subscript𝑤810100252.5w_{7}=w_{8}=\frac{10}{100}*25=2.5italic_w start_POSTSUBSCRIPT 7 end_POSTSUBSCRIPT = italic_w start_POSTSUBSCRIPT 8 end_POSTSUBSCRIPT = divide start_ARG 10 end_ARG start_ARG 100 end_ARG ∗ 25 = 2.5

Propagation phase:

  • Step 4: The initial reward for agents is the weight calculated in the contribution phase

    r1=r2=r3=20;subscript𝑟1subscript𝑟2subscript𝑟320\displaystyle r_{1}=r_{2}=r_{3}=20;italic_r start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT = 20 ;
    r4=r5=r6=(1β)5=4;subscript𝑟4subscript𝑟5subscript𝑟61𝛽54\displaystyle r_{4}=r_{5}=r_{6}=(1-\beta)*5=4;italic_r start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 5 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 6 end_POSTSUBSCRIPT = ( 1 - italic_β ) ∗ 5 = 4 ;
    r7=r8=(1β)2.5=2subscript𝑟7subscript𝑟81𝛽2.52\displaystyle r_{7}=r_{8}=(1-\beta)*2.5=2italic_r start_POSTSUBSCRIPT 7 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 8 end_POSTSUBSCRIPT = ( 1 - italic_β ) ∗ 2.5 = 2
  • Step 5: Agent 4444 and agent 5555 transfer 0.20.20.20.2 of their weights to agent 1111 respectively as rewards; agent 6666 transfers β2=0.22=0.1𝛽20.220.1\frac{\beta}{2}=\frac{0.2}{2}=0.1divide start_ARG italic_β end_ARG start_ARG 2 end_ARG = divide start_ARG 0.2 end_ARG start_ARG 2 end_ARG = 0.1 of her weights to agent 2222 and agent 3333

    \displaystyle\dashrightarrow r1=r1+βw4=21;subscript𝑟1subscript𝑟1𝛽subscript𝑤421\displaystyle r_{1}=r_{1}+\beta*w_{4}=21;italic_r start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT + italic_β ∗ italic_w start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT = 21 ;
    \displaystyle\dashrightarrow r1=r1+βw5=22;subscript𝑟1subscript𝑟1𝛽subscript𝑤522\displaystyle r_{1}=r_{1}+\beta*w_{5}=22;italic_r start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT + italic_β ∗ italic_w start_POSTSUBSCRIPT 5 end_POSTSUBSCRIPT = 22 ;
    \displaystyle\dashrightarrow r2=r2+β/2w6=20.5,subscript𝑟2subscript𝑟2𝛽2subscript𝑤620.5\displaystyle r_{2}=r_{2}+\beta/2*w_{6}=20.5,italic_r start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT + italic_β / 2 ∗ italic_w start_POSTSUBSCRIPT 6 end_POSTSUBSCRIPT = 20.5 ,
    r3=r3+β/2w6=20.5subscript𝑟3subscript𝑟3𝛽2subscript𝑤620.5\displaystyle r_{3}=r_{3}+\beta/2*w_{6}=20.5italic_r start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT + italic_β / 2 ∗ italic_w start_POSTSUBSCRIPT 6 end_POSTSUBSCRIPT = 20.5
  • Step 6: Similarly, we consider the transfer of agent 7777 and agent 8888

    \displaystyle\dashrightarrow r4=r4+βw7=4.5;subscript𝑟4subscript𝑟4𝛽subscript𝑤74.5\displaystyle r_{4}=r_{4}+\beta*w_{7}=4.5;italic_r start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT + italic_β ∗ italic_w start_POSTSUBSCRIPT 7 end_POSTSUBSCRIPT = 4.5 ;
    \displaystyle\dashrightarrow r6=r6+βw8=4.5subscript𝑟6subscript𝑟6𝛽subscript𝑤84.5\displaystyle r_{6}=r_{6}+\beta*w_{8}=4.5italic_r start_POSTSUBSCRIPT 6 end_POSTSUBSCRIPT = italic_r start_POSTSUBSCRIPT 6 end_POSTSUBSCRIPT + italic_β ∗ italic_w start_POSTSUBSCRIPT 8 end_POSTSUBSCRIPT = 4.5

The final reward is 𝐫=(22,20.5,20.5,4.5,4,4.5,2,2)𝐫2220.520.54.544.522\mathbf{r}=(22,20.5,20.5,4.5,4,4.5,2,2)bold_r = ( 22 , 20.5 , 20.5 , 4.5 , 4 , 4.5 , 2 , 2 ) according to PRDM. Each component of 𝐫𝐫\mathbf{r}bold_r represents the reward of the corresponding agent. Note that we still have B4=B3w7w8=20subscript𝐵4subscript𝐵3subscript𝑤7subscript𝑤820B_{4}=B_{3}-w_{7}-w_{8}=20italic_B start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT = italic_B start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT - italic_w start_POSTSUBSCRIPT 7 end_POSTSUBSCRIPT - italic_w start_POSTSUBSCRIPT 8 end_POSTSUBSCRIPT = 20 available for further propagation.

4 Properties of PRDM

In this section, we show several properties of PRDM. We start by discussing the straightforward properties of PRDM, and then we illustrate how PRDM maximizes information propagation and defends against Sybil attacks.

For the convenience contents of the following formulation, denote CSsuperscriptsubscript𝐶𝑆C_{S}^{\prime}italic_C start_POSTSUBSCRIPT italic_S end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT as the sum of the contributions of the set S𝑆Sitalic_S, e.g., Clksuperscriptsubscript𝐶subscript𝑙𝑘C_{l_{k}}^{\prime}italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is the total contribution of k𝑘kitalic_k-th layer. Recall that when k𝑘kitalic_k is an integer, Cksuperscriptsubscript𝐶𝑘C_{k}^{\prime}italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT denotes the total contribution of the first k𝑘kitalic_k layers.

Theorem 1.

The Propagation Reward Distribution Mechanism is asymptotically budget balanced.

Proof.

In PRDM, the division of the initial budget B𝐵Bitalic_B is performed only in the contribution phase, which implies iNri=iNwisubscript𝑖𝑁subscript𝑟𝑖subscript𝑖𝑁subscript𝑤𝑖\sum_{i\in N}{r_{i}}=\sum_{i\in N}{w_{i}}∑ start_POSTSUBSCRIPT italic_i ∈ italic_N end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_i ∈ italic_N end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. Recall that for an active network G=(V,E)superscript𝐺superscript𝑉superscript𝐸G^{\prime}=(V^{\prime},E^{\prime})italic_G start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = ( italic_V start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_E start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ), the sponsor s𝑠sitalic_s has a virtual contribution cs>0subscript𝑐𝑠0c_{s}>0italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT > 0 and Ck=cs+iV(𝐭),dep(i)kcisuperscriptsubscript𝐶𝑘subscript𝑐𝑠subscriptformulae-sequence𝑖𝑉superscript𝐭𝑑𝑒𝑝𝑖𝑘superscriptsubscript𝑐𝑖C_{k}^{\prime}=c_{s}+\sum_{i\in V(\mathbf{t}^{\prime}),dep(i)\leq k}{c_{i}^{% \prime}}italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_i ∈ italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) , italic_d italic_e italic_p ( italic_i ) ≤ italic_k end_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is the total contribution of s𝑠sitalic_s and all the agents in layer l1,,lksubscript𝑙1subscript𝑙𝑘l_{1},\ldots,l_{k}italic_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT.

According to PRDM, each layer can only divide a part of the remaining reward from the previous layer. Suppose that there are d𝑑ditalic_d layers. We focus on Bksubscript𝐵𝑘B_{k}italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, which is the residual budget of layer lksubscript𝑙𝑘l_{k}italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT inherited from the upper layer. Generally, for k=1,,d1𝑘1𝑑1k=1,\ldots,d-1italic_k = 1 , … , italic_d - 1, we have Bk+1=Bkilkwisubscript𝐵𝑘1subscript𝐵𝑘subscript𝑖subscript𝑙𝑘subscript𝑤𝑖B_{k+1}=B_{k}-\sum_{i\in l_{k}}{w_{i}}italic_B start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT = italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT - ∑ start_POSTSUBSCRIPT italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. Specially, let Bd+1=Bdildwisubscript𝐵𝑑1subscript𝐵𝑑subscript𝑖subscript𝑙𝑑subscript𝑤𝑖B_{d+1}=B_{d}-\sum_{i\in l_{d}}{w_{i}}italic_B start_POSTSUBSCRIPT italic_d + 1 end_POSTSUBSCRIPT = italic_B start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT - ∑ start_POSTSUBSCRIPT italic_i ∈ italic_l start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT be the budget that has not been distributed. Then, we can infer that

i=1nrisuperscriptsubscript𝑖1𝑛subscript𝑟𝑖\displaystyle\sum_{i=1}^{n}{r_{i}}∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT =i=1nwi=k=1dilkwiabsentsuperscriptsubscript𝑖1𝑛subscript𝑤𝑖superscriptsubscript𝑘1𝑑subscript𝑖subscript𝑙𝑘subscript𝑤𝑖\displaystyle=\sum_{i=1}^{n}{w_{i}}=\sum_{k=1}^{d}{\sum_{i\in l_{k}}{w_{i}}}= ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT
=k=1d(BkBk+1)=BBd+1absentsuperscriptsubscript𝑘1𝑑subscript𝐵𝑘subscript𝐵𝑘1𝐵subscript𝐵𝑑1\displaystyle=\sum_{k=1}^{d}{(B_{k}-B_{k+1})}=B-B_{d+1}= ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_d end_POSTSUPERSCRIPT ( italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT - italic_B start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ) = italic_B - italic_B start_POSTSUBSCRIPT italic_d + 1 end_POSTSUBSCRIPT

Next, we show that Bd+1subscript𝐵𝑑1B_{d+1}italic_B start_POSTSUBSCRIPT italic_d + 1 end_POSTSUBSCRIPT converges to 0 when the total contribution goes to infinity. Starting from the first layer, we can get

B1=subscript𝐵1absent\displaystyle B_{1}=italic_B start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = B𝐵\displaystyle\ Bitalic_B
B2=subscript𝐵2absent\displaystyle B_{2}=italic_B start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = B1il1wi=B1il1ciC1B1=csC1Bsubscript𝐵1subscript𝑖subscript𝑙1subscript𝑤𝑖subscript𝐵1subscript𝑖subscript𝑙1superscriptsubscript𝑐𝑖superscriptsubscript𝐶1subscript𝐵1subscript𝑐𝑠superscriptsubscript𝐶1𝐵\displaystyle\ B_{1}-\sum_{i\in l_{1}}{w_{i}}=B_{1}-\sum_{i\in l_{1}}{\frac{c_% {i}^{\prime}}{C_{1}^{\prime}}}B_{1}=\frac{c_{s}}{C_{1}^{\prime}}Bitalic_B start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT - ∑ start_POSTSUBSCRIPT italic_i ∈ italic_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_B start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT - ∑ start_POSTSUBSCRIPT italic_i ∈ italic_l start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = divide start_ARG italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B
B3=subscript𝐵3absent\displaystyle B_{3}=italic_B start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT = B2il2wi=B2il2ciC2B2=csC2Bsubscript𝐵2subscript𝑖subscript𝑙2subscript𝑤𝑖subscript𝐵2subscript𝑖subscript𝑙2superscriptsubscript𝑐𝑖superscriptsubscript𝐶2subscript𝐵2subscript𝑐𝑠superscriptsubscript𝐶2𝐵\displaystyle\ B_{2}-\sum_{i\in l_{2}}{w_{i}}=B_{2}-\sum_{i\in l_{2}}{\frac{c_% {i}^{\prime}}{C_{2}^{\prime}}}B_{2}=\frac{c_{s}}{C_{2}^{\prime}}Bitalic_B start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - ∑ start_POSTSUBSCRIPT italic_i ∈ italic_l start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_B start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - ∑ start_POSTSUBSCRIPT italic_i ∈ italic_l start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = divide start_ARG italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B

Similarly, for k=2,,d𝑘2𝑑k=2,\ldots,ditalic_k = 2 , … , italic_d, we have Bk=csCk1Bsubscript𝐵𝑘subscript𝑐𝑠superscriptsubscript𝐶𝑘1𝐵B_{k}=\frac{c_{s}}{C_{k-1}^{\prime}}Bitalic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = divide start_ARG italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B. Then, when the total contribution goes to infinity, Cd=i=1ncisuperscriptsubscript𝐶𝑑superscriptsubscript𝑖1𝑛superscriptsubscript𝑐𝑖C_{d}^{\prime}=\sum_{i=1}^{n}{c_{i}^{\prime}}\to\inftyitalic_C start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT → ∞, hence Bd+1=csCdB0subscript𝐵𝑑1subscript𝑐𝑠superscriptsubscript𝐶𝑑𝐵0B_{d+1}=\frac{c_{s}}{C_{d}^{\prime}}B\to 0italic_B start_POSTSUBSCRIPT italic_d + 1 end_POSTSUBSCRIPT = divide start_ARG italic_c start_POSTSUBSCRIPT italic_s end_POSTSUBSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_d end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B → 0.

The above theorem indicates that PRDM will allocate all of the sponsor’s budget to the agents when the total contribution is large enough. Meanwhile, the sponsor does not need to pay extra budgets for the contributions of extra participants.

Theorem 2.

The Propagation Reward Distribution Mechanism is individually rational.

Proof.

Intuitively, any agent i𝑖iitalic_i in a social network G𝐺Gitalic_G, at any stage of PRDM, does not need to pay a fee, so ri0subscript𝑟𝑖0r_{i}\geq 0italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≥ 0 holds.

Actually, for any agent iG(𝐭)𝑖𝐺superscript𝐭i\in G(\mathbf{t}^{\prime})italic_i ∈ italic_G ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) of the active network, they always have a positive reward ri>0subscript𝑟𝑖0r_{i}>0italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT > 0. Furthermore, Theorem 3 shows that an agent maximize the reward when she truthfully report her type.

Theorem 3.

The Propagation Reward Distribution Mechanism is incentive compatible.

Proof.

By the definition of incentive compatible, PRDM needs to satisfy that for any agent iN𝑖𝑁i\in Nitalic_i ∈ italic_N, for any report profile 𝐭isubscriptsuperscript𝐭𝑖\mathbf{t}^{\prime}_{-i}bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT of others, truthfully reporting her private type tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is a dominant strategy. The report tisubscriptsuperscript𝑡𝑖t^{\prime}_{i}italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT of agent i𝑖iitalic_i consists of the contributions cisuperscriptsubscript𝑐𝑖c_{i}^{\prime}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT and the set of children nisuperscriptsubscript𝑛𝑖n_{i}^{\prime}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. Hence for any agent iN𝑖𝑁i\in Nitalic_i ∈ italic_N, we need to prove the following two parts

  • Agent i𝑖iitalic_i contributes as much as she is capable ci=cisuperscriptsubscript𝑐𝑖subscript𝑐𝑖c_{i}^{\prime}=c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT to maximize her reward.

  • Agent i𝑖iitalic_i invites all her children ni=nisuperscriptsubscript𝑛𝑖subscript𝑛𝑖n_{i}^{\prime}=n_{i}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT to maximize her reward.

Part 1: if agent i𝑖iitalic_i is not in the active network G(𝐭)=(V(𝐭),G(\mathbf{t}^{\prime})=(V(\mathbf{t}^{\prime}),italic_G ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = ( italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) , E(𝐭))E(\mathbf{t}^{\prime}))italic_E ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) ), the reward is zero regardless of how much she contributes, so ci=cisuperscriptsubscript𝑐𝑖subscript𝑐𝑖c_{i}^{\prime}=c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT maximizes her reward. For any iV(𝐭)𝑖𝑉superscript𝐭i\in V(\mathbf{t}^{\prime})italic_i ∈ italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ), assume that agent i𝑖iitalic_i is in the k𝑘kitalic_k-th layer (1<k<d1𝑘𝑑1<k<d1 < italic_k < italic_d) in the layered graph with d𝑑ditalic_d layers and agent i𝑖iitalic_i is the only parent of her children in (k+1)𝑘1(k+1)( italic_k + 1 )-th layer. Thus for any 0<cici0superscriptsubscript𝑐𝑖subscript𝑐𝑖0<c_{i}^{\prime}\leq c_{i}0 < italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ≤ italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, any ninisuperscriptsubscript𝑛𝑖subscript𝑛𝑖n_{i}^{\prime}\subseteq n_{i}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and 0β120𝛽120\leq\beta\leq\frac{1}{2}0 ≤ italic_β ≤ divide start_ARG 1 end_ARG start_ARG 2 end_ARG, we have

ri(ti,𝐭i)=(1β)ciCk1+ci+Clk{i}Bk+βClk+1niCk1+ci+Clk{i}+Clk+1Ck1Ck1+ci+Clk{i}Bkmissing-subexpressionsubscript𝑟𝑖subscriptsuperscript𝑡𝑖subscriptsuperscript𝐭𝑖1𝛽superscriptsubscript𝑐𝑖superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘𝑖subscript𝐵𝑘missing-subexpression𝛽superscriptsubscript𝐶subscript𝑙𝑘1superscriptsubscript𝑛𝑖superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘𝑖superscriptsubscript𝐶subscript𝑙𝑘1superscriptsubscript𝐶𝑘1superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘𝑖subscript𝐵𝑘\begin{aligned} &r_{i}(t^{\prime}_{i},\mathbf{t}^{\prime}_{-i})=(1-\beta)\frac% {c_{i}^{\prime}}{C_{k-1}^{\prime}+c_{i}^{\prime}+C_{l_{k}\setminus\{i\}}^{% \prime}}B_{k}\\ &+\beta\frac{C_{l_{k+1}\cap n_{i}^{\prime}}^{\prime}}{C_{k-1}^{\prime}+c_{i}^{% \prime}+C_{l_{k}\setminus\{i\}}^{\prime}+C_{l_{k+1}}^{\prime}}\frac{C_{k-1}^{% \prime}}{C_{k-1}^{\prime}+c_{i}^{\prime}+C_{l_{k}\setminus\{i\}}^{\prime}}B_{k% }\end{aligned}start_ROW start_CELL end_CELL start_CELL italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) = ( 1 - italic_β ) divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL + italic_β divide start_ARG italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ∩ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG divide start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_CELL end_ROW

(6)

where Clk{i}superscriptsubscript𝐶subscript𝑙𝑘𝑖C_{l_{k}\setminus\{i\}}^{\prime}italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is the total contribution in k𝑘kitalic_k-th layer except i𝑖iitalic_i, Clk+1nisubscript𝐶subscript𝑙𝑘1superscriptsubscript𝑛𝑖C_{l_{k+1}\cap n_{i}^{\prime}}italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ∩ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT is the total contribution of i𝑖iitalic_i’s children in (k+1)𝑘1(k+1)( italic_k + 1 )-th layer. The first term of ri(ti,𝐭i)subscript𝑟𝑖subscriptsuperscript𝑡𝑖subscriptsuperscript𝐭𝑖r_{i}(t^{\prime}_{i},\mathbf{t}^{\prime}_{-i})italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) in Equation (6) is the reward reserved by i𝑖iitalic_i. The second term is the reward coming from the next layer. All quantities except cisuperscriptsubscript𝑐𝑖c_{i}^{\prime}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT are fixed, so the first term increases as cisuperscriptsubscript𝑐𝑖c_{i}^{\prime}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT increases and the second term decreases as cisuperscriptsubscript𝑐𝑖c_{i}^{\prime}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT increases. Consider the worst case: Clk{i}=0superscriptsubscript𝐶subscript𝑙𝑘𝑖0C_{l_{k}\setminus\{i\}}^{\prime}=0italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = 0, Clk+1ni=Clk+1subscript𝐶subscript𝑙𝑘1superscriptsubscript𝑛𝑖subscript𝐶subscript𝑙𝑘1C_{l_{k+1}\cap n_{i}^{\prime}}=C_{l_{k+1}}italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ∩ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT = italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT, β=12𝛽12\beta=\frac{1}{2}italic_β = divide start_ARG 1 end_ARG start_ARG 2 end_ARG when the first term decreases the fastest while the second term increases the slowest, ri(ti,𝐭i)subscript𝑟𝑖subscriptsuperscript𝑡𝑖subscriptsuperscript𝐭𝑖r_{i}(t^{\prime}_{i},\mathbf{t}^{\prime}_{-i})italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) can be reduced as

ri(ti,𝐭i)subscript𝑟𝑖subscriptsuperscript𝑡𝑖subscriptsuperscript𝐭𝑖\displaystyle r_{i}(t^{\prime}_{i},\mathbf{t}^{\prime}_{-i})italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT )
=\displaystyle== 121Ck1(ci+Ck1Clk+1Ck1+ci+Clk+1)Bk121superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶𝑘1superscriptsubscript𝐶subscript𝑙𝑘1superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘1subscript𝐵𝑘\displaystyle\frac{1}{2}\frac{1}{C_{k-1}^{\prime}}\left(c_{i}^{\prime}+\frac{C% _{k-1}^{\prime}C_{l_{k+1}}^{\prime}}{C_{k-1}^{\prime}+c_{i}^{\prime}+C_{l_{k+1% }}^{\prime}}\right)B_{k}divide start_ARG 1 end_ARG start_ARG 2 end_ARG divide start_ARG 1 end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG ( italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + divide start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG ) italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT
=\displaystyle== 121Ck1+ciciCk1+cici+ciClk+1+Ck1Clk+1Ck1+ci+Clk+1Bk121superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝑐𝑖superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝑐𝑖superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘1superscriptsubscript𝐶𝑘1superscriptsubscript𝐶subscript𝑙𝑘1superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘1subscript𝐵𝑘\displaystyle\frac{1}{2}\frac{1}{C_{k-1}^{\prime}+c_{i}^{\prime}}\frac{c_{i}^{% \prime}C_{k-1}^{\prime}+c_{i}^{\prime}c_{i}^{\prime}+c_{i}^{\prime}C_{l_{k+1}}% ^{\prime}+C_{k-1}^{\prime}C_{l_{k+1}}^{\prime}}{C_{k-1}^{\prime}+c_{i}^{\prime% }+C_{l_{k+1}}^{\prime}}B_{k}divide start_ARG 1 end_ARG start_ARG 2 end_ARG divide start_ARG 1 end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT
=\displaystyle== 12(Ck1+ci)(ci+Clk+1)(Ck1+ci)(Ck1+ci+Clk+1)Bk12superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘1superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘1subscript𝐵𝑘\displaystyle\frac{1}{2}\frac{(C_{k-1}^{\prime}+c_{i}^{\prime})(c_{i}^{\prime}% +C_{l_{k+1}}^{\prime})}{(C_{k-1}^{\prime}+c_{i}^{\prime})(C_{k-1}^{\prime}+c_{% i}^{\prime}+C_{l_{k+1}}^{\prime})}B_{k}divide start_ARG 1 end_ARG start_ARG 2 end_ARG divide start_ARG ( italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) ( italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) end_ARG start_ARG ( italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) ( italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT
=\displaystyle== 12ci+Clk+1Ck1+ci+Clk+1Bk12superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘1superscriptsubscript𝐶𝑘1superscriptsubscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘1subscript𝐵𝑘\displaystyle\frac{1}{2}\frac{c_{i}^{\prime}+C_{l_{k+1}}^{\prime}}{C_{k-1}^{% \prime}+c_{i}^{\prime}+C_{l_{k+1}}^{\prime}}B_{k}divide start_ARG 1 end_ARG start_ARG 2 end_ARG divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT (7)

Since ri(ti,𝐭i)subscript𝑟𝑖subscriptsuperscript𝑡𝑖subscriptsuperscript𝐭𝑖r_{i}(t^{\prime}_{i},\mathbf{t}^{\prime}_{-i})italic_r start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT ) is a monotonically increasing function of cisuperscriptsubscript𝑐𝑖c_{i}^{\prime}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, agent i𝑖iitalic_i receives the highest reward when ci=cisuperscriptsubscript𝑐𝑖subscript𝑐𝑖c_{i}^{\prime}=c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. Furthermore, if k=1𝑘1k=1italic_k = 1, agent i𝑖iitalic_i is in the first layer and is not required to distribute rewards to the previous layer, the first term in Equation (6) will be larger. If k=d𝑘𝑑k=ditalic_k = italic_d, agent i𝑖iitalic_i is in the last layer and has no rewards from the next layer, so the second term in Equation (6) is 00. If agent i𝑖iitalic_i is not the only parent of her children in (k+1)𝑘1(k+1)( italic_k + 1 )-th layer, the second term in the equation  (6) decreases more slowly. All of these cases will be better than the worst case we discussed in Equation (7). Therefore ci=cisuperscriptsubscript𝑐𝑖subscript𝑐𝑖c_{i}^{\prime}=c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT maximizes the reward of agent i𝑖iitalic_i.

Part 2: if agent i𝑖iitalic_i is not in the active network G(𝐭)=(V(𝐭)G(\mathbf{t}^{\prime})=(V(\mathbf{t}^{\prime})italic_G ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = ( italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ), E(𝐭))E(\mathbf{t}^{\prime}))italic_E ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) ), again her reward is always equal to 00. If iV(𝐭)𝑖𝑉superscript𝐭i\in V(\mathbf{t}^{\prime})italic_i ∈ italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ), for all ninisuperscriptsubscript𝑛𝑖subscript𝑛𝑖n_{i}^{\prime}\subset n_{i}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊂ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, she add one more child jni𝑗subscript𝑛𝑖j\in n_{i}italic_j ∈ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT into nisuperscriptsubscript𝑛𝑖n_{i}^{\prime}italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. Suppose agent j𝑗jitalic_j is already in V(𝐭)𝑉superscript𝐭V(\mathbf{t}^{\prime})italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ). In that case, we consider that j𝑗jitalic_j is in the layer below i𝑖iitalic_i, i𝑖iitalic_i gets an additional reward without affecting the existing reward, and i𝑖iitalic_i’s reward remains unchanged if j𝑗jitalic_j is in other layers. Alternatively j𝑗jitalic_j is a new agent in the active network, then j𝑗jitalic_j must be in the next layer of i𝑖iitalic_i, the reward of i𝑖iitalic_i changes from (1β)ciCkBk+βClk+1niCk+1Bk+11𝛽superscriptsubscript𝑐𝑖superscriptsubscript𝐶𝑘subscript𝐵𝑘𝛽subscript𝐶subscript𝑙𝑘1superscriptsubscript𝑛𝑖superscriptsubscript𝐶𝑘1subscript𝐵𝑘1(1-\beta)\frac{c_{i}^{\prime}}{C_{k}^{\prime}}B_{k}+\beta\frac{C_{l_{k+1}\cap n% _{i}^{\prime}}}{C_{k+1}^{\prime}}B_{k+1}( 1 - italic_β ) divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + italic_β divide start_ARG italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ∩ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT to (1β)ciCkBk+βcj+Clk+1nicj+Ck+1Bk+11𝛽superscriptsubscript𝑐𝑖superscriptsubscript𝐶𝑘subscript𝐵𝑘𝛽superscriptsubscript𝑐𝑗subscript𝐶subscript𝑙𝑘1superscriptsubscript𝑛𝑖superscriptsubscript𝑐𝑗superscriptsubscript𝐶𝑘1subscript𝐵𝑘1(1-\beta)\frac{c_{i}^{\prime}}{C_{k}^{\prime}}B_{k}+\beta\frac{c_{j}^{\prime}+% C_{l_{k+1}\cap n_{i}^{\prime}}}{c_{j}^{\prime}+C_{k+1}^{\prime}}B_{k+1}( 1 - italic_β ) divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + italic_β divide start_ARG italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ∩ italic_n start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT end_ARG start_ARG italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT, which is obviously increased. Hence when agent i𝑖iitalic_i invites all her children, she maximizes the reward.

In conclusion, PRDM is incentive compatible, which indicates that truthful report is the dominant strategy for all agents. In other words, all agents will maximize information propagation while making the largest contributions within their capacity.

Next, we will discuss the property of Sybil-proofness.

Theorem 4.

The Propagation Reward Distribution Mechanism is parallel Sybil-proof.

Proof.

Suppose agent ilk𝑖subscript𝑙𝑘i\in l_{k}italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT (1kd1𝑘𝑑1\leq k\leq d1 ≤ italic_k ≤ italic_d). When agent i𝑖iitalic_i does commit a parallel Sybil attack to be νi={i,i1,,im}subscript𝜈𝑖𝑖subscript𝑖1subscript𝑖𝑚\nu_{i}=\{i,i_{1},\ldots,i_{m}\}italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = { italic_i , italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT }. It can be simply deduced from the proof of incentive compatible that for all nodes in the set νisubscript𝜈𝑖\nu_{i}italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, their dominant strategy is making the largest contributions within their capacity and invites all their children. However, their capacity is limited by jνicjcisubscript𝑗subscript𝜈𝑖subscriptsuperscript𝑐𝑗subscript𝑐𝑖\sum_{j\in\nu_{i}}{c^{\prime}_{j}}\leq c_{i}∑ start_POSTSUBSCRIPT italic_j ∈ italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_c start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≤ italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, which means that truthful reports without creating fake nodes will maximize the benefit of agent i𝑖iitalic_i.

Then we discuss the more general situation of Sybil attacks. Before giving the main conclusion, we first present two lemmas. Lemma 1 concludes that an agent cannot increase her weight in contribution phase by making fake nodes.

Refer to caption
Figure 3: (a) is the case where agent i𝑖iitalic_i does not commit Sybil attacks, the black node represents agent i𝑖iitalic_i, and the white nodes represent real participants that i𝑖iitalic_i invites. (b) shows the situation where i𝑖iitalic_i conducts fake nodes one layer down in which the dashed node represent all the nodes generated by i𝑖iitalic_i. (c) is the most general form of a Sybil attacks.
Lemma 1.

Each agent iV(𝐭)𝑖𝑉superscript𝐭i\in V(\mathbf{t}^{\prime})italic_i ∈ italic_V ( bold_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) cannot increase the total weight in contribution phase by committing Sybil attack ai=(νi,τi)subscript𝑎𝑖subscript𝜈𝑖subscript𝜏𝑖a_{i}=(\nu_{i},\tau_{i})italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ( italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_τ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ).

Proof.

Suppose agent ilk𝑖subscript𝑙𝑘i\in l_{k}italic_i ∈ italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT (1kd1𝑘𝑑1\leq k\leq d1 ≤ italic_k ≤ italic_d). When agent i𝑖iitalic_i does not commit a Sybil attack, the network is shown in Figure 3(a), the weight of i𝑖iitalic_i is wi=ciCkBksubscript𝑤𝑖superscriptsubscript𝑐𝑖superscriptsubscript𝐶𝑘subscript𝐵𝑘w_{i}=\frac{c_{i}^{\prime}}{C_{k}^{\prime}}B_{k}italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT. Let us first show that an agent cannot increase her weight by making several fake nodes as her own children. For convenience, we denote νi=νi{i}subscript𝜈𝑖subscript𝜈𝑖𝑖\nu_{-i}=\nu_{i}\setminus\{i\}italic_ν start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT = italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∖ { italic_i }.

Without loss of generality, let ci=cisuperscriptsubscript𝑐𝑖subscript𝑐𝑖c_{i}^{\prime}=c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. After committing Sybil attack ai=(νi,τi)subscript𝑎𝑖subscript𝜈𝑖subscript𝜏𝑖a_{i}=(\nu_{i},\tau_{i})italic_a start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = ( italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_τ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ), agent i𝑖iitalic_i can transfer part of her contribution δ𝛿\deltaitalic_δ to her fake nodes (0<δ<ci0𝛿subscript𝑐𝑖0<\delta<c_{i}0 < italic_δ < italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT) and jνicj=δsubscript𝑗subscript𝜈𝑖superscriptsubscript𝑐𝑗𝛿\sum_{j\in\nu_{-i}}{c_{j}^{\prime}}=\delta∑ start_POSTSUBSCRIPT italic_j ∈ italic_ν start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT = italic_δ. Let 𝒲i(δ)=jνiwjsubscript𝒲𝑖𝛿subscript𝑗subscript𝜈𝑖subscript𝑤𝑗\mathcal{W}_{i}(\delta)=\sum_{j\in\nu_{i}}{w_{j}}caligraphic_W start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_δ ) = ∑ start_POSTSUBSCRIPT italic_j ∈ italic_ν start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT be the total weight of i𝑖iitalic_i and all her fake nodes. According to PRDM, as shown in Figure 3(b), when all the fake nodes are in the next layer of i𝑖iitalic_i, we have

𝒲i(0)=ciCk1+ci+Clk{i}Bk𝒲i(δ)=ciδCk1+ci+Clk{i}δBk+δCk1+ci+Clk{i}+Clk+1νiCk1Ck1+ci+Clk{i}δBkmissing-subexpressionsubscript𝒲𝑖0subscript𝑐𝑖superscriptsubscript𝐶𝑘1subscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘𝑖subscript𝐵𝑘missing-subexpressionsubscript𝒲𝑖𝛿subscript𝑐𝑖𝛿superscriptsubscript𝐶𝑘1subscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘𝑖𝛿subscript𝐵𝑘missing-subexpression𝛿superscriptsubscript𝐶𝑘1subscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘𝑖superscriptsubscript𝐶subscript𝑙𝑘1subscript𝜈𝑖superscriptsubscript𝐶𝑘1superscriptsubscript𝐶𝑘1subscript𝑐𝑖superscriptsubscript𝐶subscript𝑙𝑘𝑖𝛿subscript𝐵𝑘\begin{aligned} &\mathcal{W}_{i}(0)=\frac{c_{i}}{C_{k-1}^{\prime}+c_{i}+C_{l_{% k}\setminus\{i\}}^{\prime}}B_{k}\\ &\mathcal{W}_{i}(\delta)=\frac{c_{i}-\delta}{C_{k-1}^{\prime}+c_{i}+C_{l_{k}% \setminus\{i\}}^{\prime}-\delta}B_{k}\\ &+\frac{\delta}{C_{k-1}^{\prime}+c_{i}+C_{l_{k}\setminus\{i\}}^{\prime}+C_{l_{% k+1}\setminus\nu_{-i}}^{\prime}}\frac{C_{k-1}^{\prime}}{C_{k-1}^{\prime}+c_{i}% +C_{l_{k}\setminus\{i\}}^{\prime}-\delta}B_{k}\end{aligned}start_ROW start_CELL end_CELL start_CELL caligraphic_W start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( 0 ) = divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL caligraphic_W start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_δ ) = divide start_ARG italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_δ end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT - italic_δ end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL + divide start_ARG italic_δ end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ∖ italic_ν start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG divide start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_ARG start_ARG italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT - italic_δ end_ARG italic_B start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_CELL end_ROW

It can be shown that for any δ𝛿\deltaitalic_δ, there is 𝒲i(0)𝒲i(δ)=PQsubscript𝒲𝑖0subscript𝒲𝑖𝛿𝑃𝑄\mathcal{W}_{i}(0)-\mathcal{W}_{i}(\delta)=\frac{P}{Q}caligraphic_W start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( 0 ) - caligraphic_W start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_δ ) = divide start_ARG italic_P end_ARG start_ARG italic_Q end_ARG, where

P=𝑃absent\displaystyle P=italic_P = δClk{i}(Clk{i}+Clk+1νi+Ck1+ci)𝛿superscriptsubscript𝐶subscript𝑙𝑘𝑖superscriptsubscript𝐶subscript𝑙𝑘𝑖superscriptsubscript𝐶subscript𝑙𝑘1subscript𝜈𝑖superscriptsubscript𝐶𝑘1subscript𝑐𝑖\displaystyle\ \delta C_{l_{k}\setminus\{i\}}^{\prime}\left(C_{l_{k}\setminus% \{i\}}^{\prime}+C_{l_{k+1}\setminus\nu_{-i}}^{\prime}+C_{k-1}^{\prime}+c_{i}\right)italic_δ italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ( italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∖ { italic_i } end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ∖ italic_ν start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT + italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT )
+δCk1Clk+1νi0𝛿superscriptsubscript𝐶𝑘1superscriptsubscript𝐶subscript𝑙𝑘1subscript𝜈𝑖0\displaystyle+\delta C_{k-1}^{\prime}C_{l_{k+1}\setminus\nu_{-i}}^{\prime}\geq 0+ italic_δ italic_C start_POSTSUBSCRIPT italic_k - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT italic_C start_POSTSUBSCRIPT italic_l start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT ∖ italic_ν start_POSTSUBSCRIPT - italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ≥ 0
Q=𝑄absent\displaystyle Q=italic_Q = (Ck1+ci+Clk{i})(