TY - JOUR
T1 - Efficient Strategy Computation in Zero-Sum Asymmetric Information Repeated Games
AU - Li, Lichun
AU - Shamma, Jeff S.
N1 - KAUST Repository Item: Exported on 2020-10-01
PY - 2019/8/5
Y1 - 2019/8/5
N2 - Zero-sum asymmetric information games model decision making scenarios involving two competing players whohave different information about the game being played. A particular case is that of nested information, where one (informed) player has superior information over the other (uninformed) player. This paper considers the case of nested information in repeated zero-sum games and studies the computation of strategies for both the informed and uninformed players for finite-horizon and discounted infinite-horizon nested information games. For finite-horizon settings, we exploit that for both players, the security strategy, and also the opponent's corresponding best response, depend only on the informed player's history of actions. Using this property, we formulate an LP computation of player strategies that is linear in the size of the uninformed player's action set. For the infinite-horizon discounted game, we construct LP formulations to compute the approximated security strategies for both players, and show that the worst case performance difference between the approximated security strategies and the security strategies converges to zero exponentially. Finally, we illustrate the results on a network interdiction game between an informed system administrator and an uniformed intruder.
AB - Zero-sum asymmetric information games model decision making scenarios involving two competing players whohave different information about the game being played. A particular case is that of nested information, where one (informed) player has superior information over the other (uninformed) player. This paper considers the case of nested information in repeated zero-sum games and studies the computation of strategies for both the informed and uninformed players for finite-horizon and discounted infinite-horizon nested information games. For finite-horizon settings, we exploit that for both players, the security strategy, and also the opponent's corresponding best response, depend only on the informed player's history of actions. Using this property, we formulate an LP computation of player strategies that is linear in the size of the uninformed player's action set. For the infinite-horizon discounted game, we construct LP formulations to compute the approximated security strategies for both players, and show that the worst case performance difference between the approximated security strategies and the security strategies converges to zero exponentially. Finally, we illustrate the results on a network interdiction game between an informed system administrator and an uniformed intruder.
UR - http://hdl.handle.net/10754/656544
UR - https://ieeexplore.ieee.org/document/8788623/
UR - http://www.scopus.com/inward/record.url?scp=85087479871&partnerID=8YFLogxK
U2 - 10.1109/tac.2019.2933396
DO - 10.1109/tac.2019.2933396
M3 - Article
SN - 0018-9286
VL - 65
SP - 1
EP - 1
JO - IEEE Transactions on Automatic Control
JF - IEEE Transactions on Automatic Control
IS - 7
ER -