dc.contributor.advisor | Robert M. Townsend. | en_US |
dc.contributor.author | Zhang, Nicolas Xuan-Yi. | en_US |
dc.contributor.other | Massachusetts Institute of Technology. Institute for Data, Systems, and Society. | en_US |
dc.contributor.other | Technology and Policy Program. | en_US |
dc.contributor.other | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. | en_US |
dc.date.accessioned | 2021-05-24T20:24:11Z | |
dc.date.available | 2021-05-24T20:24:11Z | |
dc.date.copyright | 2021 | en_US |
dc.date.issued | 2021 | en_US |
dc.identifier.uri | https://hdl.handle.net/1721.1/130798 | |
dc.description | Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, February, 2021 | en_US |
dc.description | Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, February, 2021 | en_US |
dc.description | Cataloged from the official PDF of thesis. | en_US |
dc.description | Includes bibliographical references (pages 116-121). | en_US |
dc.description.abstract | Encryption - the process of encoding information - mitigates the damage that comes from obstacles to exchange: private information, limited communication, and limited commitment. Here I would emphasize specifically that encryption is a way to implement optimized solutions to bilateral and multi-agent mechanism design problems as smart contracts. To illustrate how such encryption schemes could be relevant to economic applications, I first revisit "classical" problems such as auction design with private values, constrained-optimal hybrid insurance and credit schemes for markets suffering from liquidity problem. The common thread in each of these applications is that messages are kept secret from other agents in a contract and from third parties, communication channels are optimized, and data are secured and immutable. Agents can commit to arrangements and to the way they are implemented, without inconsistencies, even in evolving situations where they would have liked to renege. | en_US |
dc.description.abstract | I make use in particular of homomorphic encryption, HE, and multi-party computation, MPC, which I will describe in details in the text and concretely implement. I will first decompose and examine the different technological components of encryption, to, by "translating them" into individual tools that I implement for the aforementioned cases, present here a "cookbook" on how to use cryptography technologies to implement mechanism design solutions. I will always keep in mind the various possible combinations of technologies and the engineering trade-offs associated to each, in the hope that economic and policy designers will be able to adapt these recipes to design new solutions to the problems they will be facing. I then provide a more in-depth example of an "end to end" treatment of a complex economic topic, that of fiat monetary anchoring. | en_US |
dc.description.abstract | I will model it using our mechanism design framework, calibrate it through empirical analysis, and propose concrete policies and designs, leveraging encryption. | en_US |
dc.description.statementofresponsibility | by Nicolas Xuan-Yi Zhang. | en_US |
dc.format.extent | 121 pages | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Massachusetts Institute of Technology | en_US |
dc.rights | MIT theses may be protected by copyright. Please reuse MIT thesis content according to the MIT Libraries Permissions Policy, which is available through the URL provided. | en_US |
dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
dc.subject | Institute for Data, Systems, and Society. | en_US |
dc.subject | Technology and Policy Program. | en_US |
dc.subject | Electrical Engineering and Computer Science. | en_US |
dc.title | Encryption to implement mechanism design solutions | en_US |
dc.type | Thesis | en_US |
dc.description.degree | S.M. in Technology and Policy | en_US |
dc.description.degree | S.M. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Institute for Data, Systems, and Society | en_US |
dc.contributor.department | Technology and Policy Program | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Engineering Systems Division | |
dc.identifier.oclc | 1252202600 | en_US |
dc.description.collection | S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program | en_US |
dc.description.collection | S.M. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science | en_US |
dspace.imported | 2021-05-24T20:24:11Z | en_US |
mit.thesis.degree | Master | en_US |
mit.thesis.department | TPP | en_US |
mit.thesis.department | ESD | en_US |
mit.thesis.department | IDSS | en_US |
mit.thesis.department | EECS | en_US |