Social Insurance, Information Revelation, and Lack of Commitment∗

Transcription

Social Insurance, Information Revelation, and Lack of Commitment∗
Social Insurance, Information Revelation, and Lack
of Commitment
Mikhail Golosov
Princeton
Luigi Iovino
Bocconi
March 2015
Abstract
We study the optimal provision of insurance against unobservable idiosyncratic shocks in
a setting in which a benevolent government cannot commit. A continuum of agents and the
government play an in…nitely repeated game. Actions of the government are constrained only
by the threat of reverting to the worst perfect Bayesian equilibrium (PBE). We construct
a recursive problem that characterizes the resource allocation and information revelation on
the Pareto frontier of the set of PBE. We prove a version of the Revelation Principle and
…nd an upper bound on the maximum number of messages that are needed to achieve the
optimal allocation. Agents play mixed strategies over that message set to limit the amount
of information transmitted to the government. The central feature of the optimal contract
is that agents who enter the period with low implicitly-promised lifetime utilities reveal no
information to the government and receive no insurance against current period shock, while
agents with high promised utilities reveal precise information about their current shock and
receive insurance as in economies with full commitment by the government.
We thank Mark Aguiar, Fernando Alvarez, V.V. Chari, Hugo Hopenhayn, Ramon Marimon, Stephen Morris,
Chris Sleet, Pierre Yared, Sevin Yeltekin, Ariel Zetlin-Jones for invaluable suggestions and all the participants
at the seminars in Bocconi, Carnegie Mellon, EIEF, Georgetown, Minnesota, Norwegian Business School, Paris
School of Economics, Princeton, University of Lausanne, University of Vienna, Washington University, the SED
2013, the SITE 2013, the ESSET 2013 meeting in Gerzensee, 12th Hydra Workshop on Dynamic Macroeconomics
and 2014 Econometric Society meeting in Minneapolis. Golosov thanks the NSF for support and the EIEF for
hospitality. We thank Sergii Kiiashko and Pedro Olea for excellent research assistance.
1
1
Introduction
The major insight of the normative public …nance literature is that there are substantial bene…ts
from using past and present information about individuals to provide them with insurance
against shocks and incentives to work. A common assumption of the normative literature is
that the government is a benevolent social planner with perfect ability to commit. The more
information such a planner has, the more e¢ ciently she can allocate resources.1
The political economy literature has long emphasized that such commitment may be dif…cult to achieve in practice.2 Self-interested politicians and voters –whom we would broadly
refer to as “the government” –are tempted to re-optimize over time and choose new policies.
When the government cannot commit, the bene…ts of providing more information to the government are less clear. Better informed governments may allocate resources more e¢ ciently
as in the conventional normative analysis but may also be more tempted to depart from the
ex-ante desirable policies. The analysis of such environments is di¢ cult because the main
analytical tool to study private information economies –the Revelation Principle –fails when
the decision maker cannot commit.
In this paper we study optimal information revelation and resource allocation in a simple
model of social insurance – the unobservable taste shock environment of Atkeson and Lucas
(1992). This environment, together with closely related models of Green (1987), Thomas and
Worrall (1990), Phelan and Townsend (1991), provides theoretical foundation for a lot of recent work in macro and public …nance. This set up and its extensions was used to study
design of unemployment and disability insurance (Hopenhayn and Nicolini (1997), Golosov
and Tsyvinski (2006)), life cycle taxation (Farhi and Werning (2013), Golosov et al. (2011)),
human capital policies (Stantcheva (2014)), …rm dynamics (Clementi and Hopenhayn (2006)),
military con‡ict (Yared (2010)), international borrowing and lending (Dovis (2009)). In the
key departure from that literature we assume that resources are allocated by the government,
which, although benevolent, lacks commitment. We study how information revelation a¤ects
incentives of the government to provide insurance in such settings and characterize the prop1
The seminal work of Mirrlees (1971) started a large literature in public …nance on taxation, redistribution and
social insurance in presence of private information about individuals’types. Well known work of Akerlof (1978)
on “tagging” is another early example of how a benevolent government can use information about individuals
to impove e¢ ciency. For the surveys of the recent literature on social insurance and private informaiton see
Golosov et al. (2006) and Kocherlakota (2010).
2
There is a vast literature in political economy that studies frictions that policymakers face. For our purposes,
work of Acemoglu (2003) and Besley and Coate (1998) is particularly relevant who argue that ine¢ ciencies in
a large class of politico-economic models can be traced back to the lack of commitment. Kydland and Prescott
(1977) is the seminal contribution that was the …rst to analyze policy choices when the policymaker cannot
commit.
1
erties of the optimal contract.
Formally, we study a repeated game between the government and a continuum of atomless
citizens in the spirit of Chari and Kehoe (1990) and focus on the perfect Bayesian equilibria
(PBE) that are not Pareto-dominated by other PBE. The economy is endowed with a constant
amount of perishable good in each period and the government allocates that endowment among
agents. Agents receive privately observable taste shocks that follow a Markov process, which
is assumed to be iid in the baseline version of our model. Agents transmit information about
their shocks to the government by sending messages. The government uses these messages
to form posterior beliefs about realization of agents’types and allocate resources. The main
friction is that ex-post, upon learning information about the agent’s type, the government
has the temptation to allocate resources di¤erently from what is required ex-ante to provide
incentives to reveal information. The more precise information the government has about the
agents’types, the higher its payo¤ from deviation is.
Our paper makes three contributions. First, we construct a recursive formulation of our
problem. The key di¢ culty that we need to overcome is that the value of the worst equilibrium
depends on the implicit promises made to all agents. The standard recursive techniques,
that characterize optimal insurance for each history of past shocks in isolation from other
histories, do not apply directly since information that any agent reveals a¤ects the government’s
incentives to renege on the promises made to other agents. We make progress by showing how
to construct an upper bound for the value of deviation which coincides with that value if
all agents play the best PBE and takes weakly higher value for any other strategy. This
upper bound can be represented as a history-by-history integral of functions that depends only
on the current reporting strategy of a given agent, and thus can be represented recursively.
Since the original best PBE strategies still satisfy all the constraints of this modi…ed, tighter
problem, the solution to this recursive problem allows us to uncover the best PBE. The resulting
recursive problem is very simple. It is essentially a standard problem familiar from the recursive
contract literature with two modi…cations: agents are allowed to choose mixed rather than
pure strategies over their reports and there is an extra term in planner’s objective function
that captures “temptation” costs of revealing more information.
Our second contribution is to show a version of the Revelation Principle for our settings. It
is well known that standard direct revelation mechanisms, in which agents report their types
truthfully to the government, are not e¢ cient in this type of settings. Bester and Strausz
(2001) showed that, in a repeated game between one principle and one agent whose type can
take N values, the message space can be restricted to only N messages over which agents play
2
mixed reporting strategies. These techniques do not apply to economies with more than one
agent.3 We show that in our baseline version of the model with continuum of agents and iid
shocks it is without loss of generality to restrict attention to message spaces with at most 2N 1
messages. This result follows from the fact that with iid shocks our recursive characterization
satis…es single-crossing property, and therefore all messages that give any type n the highest
utility can be partitioned in three regions: those that also give the highest utility to types
n + 1 and n
2N
1 and those that give the highest utility to only type n: There can be at most
1 of such partitions and convexity of our problem implies that it is su¢ cient to have one
message per each partition.
Our third contribution is the characterization of the properties of the optimal contract and
the e¢ cient information revelation. As in the full commitment case of Atkeson and Lucas
(1992), it is optimal to allocate resources to agents with temporality high taste shocks by
implicitly promising to increase future lifetime utility of agents with temporarily low taste
shocks. As agents experience di¤erent histories of shocks, there is a distribution of promised
utilities at any given time. We show that it is e¢ cient for agents who enter the period with
di¤erent promised utilities to reveal di¤erent amounts of information. In particular, we show
that under quite general conditions agents who enter the period with low promised utilities
reveal no information about their idiosyncratic shock in that period and receive no insurance.
In contrast, under some additional assumption on the utility function and the distribution of
shocks, agents who enter the period with high promised utilities reveal their private information
fully to the government. The optimal insurance contract for such agents closely resembles the
contract when the government can commit.
The intuition for this result can be seen from comparing costs and bene…ts of revealing
information to the government. The costs are driven by the temptation to deviate from the exante optimal plan and re-optimize. When the government deviates from the best equilibrium,
it reneges on all the past implicit promises and allocates consumption to each agent based on
its posterior beliefs about agent’s current type. Therefore, the incentives for the government
to deviate depend only on the total amount information it has but not on which agents reveal
it. On the contrary, the bene…ts of information revelation depend on the e¢ ciency gains from
better information on the equilibrium path, which in turn depend on the implicit promises
with which an agent enters the period. The general lesson is that the agents for whom better
3
See also Skreta (2006) who extends the analysis to an arbitrary type space and show the optimal selling
mechanism in a game between one buyer and one seller. Bester and Strausz (2000) provide an example of an
economy with two agents to illustrate that that with more than one agent message spaces with only N elements
are restrictive.
3
information leads to the highest e¢ ciency gains on the equilibrium path should send precise
signals to the government. In Atkeson and Lucas (1992) multiplicative taste shock environment
those are the agents with high promised utility.
Participation constraints of the government prevent the emergence of the extreme inequality, known as immiseration, which is a common feature of environments with commitment. The
optimal contract exhibits mean reversion, so that agents with low current promised utilities
receive in expectation higher future promises, and vice versa. This implies that in an invariant
distribution no agent is stuck in the no-insurance region forever, and in a …nite number of steps
he reaches a point when he reveals some information about his shock and some insurance is
provided. Thus, we show that in the invariant distribution there is generally an endogenous
lower bound below which agent’s promised utility never falls.
Our paper is related to a relatively small literature on mechanism design without commitment. Roberts (1984) was one of the …rst to explore the implications of lack of commitment for
social insurance. He studied a dynamic economy in which types are private information but
do not change over time. More recently, Sleet and Yeltekin (2006), Sleet and Yeltekin (2008),
Acemoglu et al. (2010), Farhi et al. (2012) all studied versions of dynamic economies with
idiosyncratic shocks closely related to our economy but made various assumptions on commitment technology and shock processes to ensure that any information becomes obsolete once
the government deviates. In contrast, the focus of our paper is on understanding incentives to
reveal information and their interaction with the incentives of the government. Our paper is
also related to the literature on the ratchet e¤ect, e.g. Freixas et al. (1985), La¤ont and Tirole
(1988). These authors pointed out that without commitment it is di¢ cult to establish which
incentive constraints bind, which signi…cantly inhibited further development of this literature.
Some papers have thus focused on the analysis of suboptimal but tractable incentive schemes.
We show that the problem substantially simpli…es when the principal interacts with a continuum of agents since any agent’s report does not a¤ect the aggregate distribution of the signals
received by the principal. In this case we can obtain a tight characterization of the optimal
information revelation for high and low values of promised utilities.
Our results about e¢ cient information revelation are also related to the insights on optimal
monitoring in Aiyagari and Alvarez (1995). In their paper the government has commitment but
can also use a costly monitoring technology to verify the agents’reports. They characterize how
monitoring probabilities depend on the agents’promised values. Although our environment and
theirs are very di¤erent in many respects, we both share the same insight that more information
should be revealed by those agents for whom e¢ ciency gains from better information are the
4
highest. Work of Bisin and Rampini (2006) pointed out that in general it might be desirable
to hide information from a benevolent government in a two period economy. Finally, our
recursive formulation builds on the literature on recursive contracts with private information
and a patient social planner. Work of Farhi and Werning (2007) provides recursive tools that
are particularly useful in our settings.
The rest of the paper is organized as follows. Section 2 describes our baseline environment
with iid shocks. Section 3 derives the recursive characterization and shows a version of the
Revelation Principle. Section 4 analyzes e¢ cient information revelation and optimal insurance.
Section 5 extends our analysis to general Markov shocks.
2
The model
The economy is populated by a continuum of agents of total measure 1 and the government. There is an in…nite number of periods, t = 0; 1; 2; ::: The economy is endowed with
e units of a perishable good in each period. Agent’s instantaneous utility from consuming
ct units of the good in period t is given by
tU
(ct ) where U : R+ ! R is an increas-
ing, strictly concave, continuously di¤erentiable function. The utility function U satis…es
Inada conditions limc!0 U 0 (c) = 1 and limc!1 U 0 (c) = 0 and it may be bounded or un-
bounded. All agents have a common discount factor
v = limc!0 U (c) = (1
. Let v = limc!1 U (c) = (1
) and
) be the upper and lower bounds on the lifetime expected utility of
the agents (v and v may be …nite or in…nite). For our purposes it is more convenient to work
with utils rather than consumption units. Let C
The taste shock
we assume that
t
t
takes values in a …nite set
U
1
be the inverse of the utility function.
with cardinality j j: For most of the analysis
are iid across agents and across time, but we relax this assumption in Section
5. Let
( ) > 0 be the probability of realization of 2 : We assume that 1 < ::: < j j and
P
normalize
( ) = 1: We use superscript t notation to denote a history of realization
2
of any variable up to period t, e.g.
realization of history
t
t
= ( 0 ; :::; t ). Let
t
t
denote the probability of
: We assume that types are private information.
Each agent is identi…ed with a real number v 2 [v; v] which we soon interpret as a lifetime
promised utility. All consumers with the same v are treated symmetrically. The distribution
of promises v is denoted by
. As it will become clear shortly, the initial distribution
gives
us a ‡exible way to trace the Pareto frontier of the set of perfect Bayesian equilibria.
The government collects reports from agents about their types and allocates consumption
subject to the aggregate feasibility in each period. The government is benevolent and its payo¤
is given by the sum of expected lifetime utilities of all agents.
5
2.1
The game between the government and agents
The physical structure of our environment corresponds exactly to the model of Atkeson and
Lucas (1992). The constrained e¢ cient allocations that they characterize can be achieved by
the government which is able to commit in period 0 to in…nite period contracts. We focus
on the environment without commitment. We model the interaction between the government
and individuals along the lines of the literature on sustainable plans (Chari and Kehoe (1990),
Chari and Kehoe (1993)). Before formally de…ning the game we brie‡y outline its structure.
The government does not observes agents’types, so it collects information by having the agents
submit messages. More speci…cally, at the beginning of any period t the government chooses
a message set Mt from some space M: We assume that all the sets in M are endowed with
a metric, but we will not refer to this metric explicitly. All agents observe their types and
submits messages mt 2 Mt . The government allocates consumption to agents as a function of
current and past reports.
To capture the main trade-o¤ in information revelation we assume that the government
cannot commit even within a period: it can pick any feasible allocation of resources after
collecting agents’reports. This allows for a simple and transparent analysis in our benchmark
case of iid shocks. As we discuss in Section 5, much of the analysis carries through to the case
when shocks are persistent.4
We now formally de…ne our game. We start with information sets. Let S t
summary of information available to the government at the end of period t
set recursively with S
1
= :
St 1
is the space of public histories
1
be the
1: We de…ne this
St 1:
Each period has three stages. In the …rst stage the government chooses a message set
Mt : S t
1
! M. In the second stage agents send reports about their types. Each agent i
observes the realization of his type in period t;
i;t ;
and of a payo¤ irrelevant random variable
zi;t uniformly distributed on Z = [0; 1]. Each agent chooses a reporting strategy
Mt as a function of the aggregate history
realizations hit
Realizations of
hti
1
1
= vi ; mit
t
i
1
; zit
1
S t 1 ; Mt
i;t
over
; his past history of reports and sunspot
; current realization zi;t ; and the history of his shocks
are privately observed and we call them private history. Realizations of
are privately observed and we call them personal history and denote the space of hti
by Hit
1
t
i:
vi ; mti
: To economize on notation, de…ne hti
1
1
; zit and let Hit be the space of all
4
A small recent literature on social insurance without commitment sidesteps the possibility that the government may misuse information when it deviates from equilibrium strategies. For example, Acemoglu et al.
(2010) allow agents to stop interacting with the government if it deviates, while Sleet and Yeltekin (2008), Farhi
et al. (2012) assume that shocks are iid but there is commitment within the period. All these environment are
constructed so that the information about individuals becomes obsolete if the government deviates.
6
hti : Formally, the reporting strategy is de…ned as
: St
i;t
1
Hit
M
t
i
!
(Mt ) where
(Mt ) is a set of all Borel probability measures on Mt . We assume that all agents i with
the same history choose the same strategy
i;t ;
so that we can drop the subscript i from the
histories, and that the law of large numbers holds so that strategies
i;t
generate a distribution
of reports ~ t over Mt : Finally, in the last stage of the period the government chooses utility
allocations ut for each personal history ht as a function of S t = S t
space Mt , the distribution or reports ~ t , the function ut ; and
history at the beginning of the next period, S t : Let
t and
and
t
G;t
be the spaces of feasible
to denote the whole in…nite sequence of
t and
fxt g1
t=0 :
G;t
G;t
St 1
1; M ;
t
~ t : The message
constitute the aggregate
be the government strategy in period
respectively. We use boldface letters x
Note that the public history contains the realized distribution of reports ~ t . The latter
implies that only the agents’ deviations that a¤ect ~ t will be detected and punished by the
government and the other agents. In particular, since agents are atomistic, a deviation by a
single agent has no consequences for ~ t and, hence, will not be detectable by the other players.
For our purposes it is useful to keep track of two objects, the distribution of the agents’private histories and that of personal histories. For any S t = S t
t
as the measure of agents with histories ht ;
Borel set At of [v; v]
where At
1
Mt
t
set A of
t
is a Borel set of H t
some Borel set of Mt
Let
Zt
At jS t =
t t
t (h jS )
H t as
Z
Z
At
t 1
: It is de…ned recursively. Let
1 jS
1
Bm
1
=
: Any
Bz
B
and Bm ; Bz ; B are the mt -, z-, and -sections of
: The measure
dat
t t t
t (h ; jS )
~ t ; ut de…ne
can be represented as a product At = At
1
t 1
1; M ;
t
t 1
t
ht ; t jS t over space H t
dz
(d )
t
dmjS t
1
; Mt ; at
t
is de…ned as
1 ; z;
:
be the measure of agents with personal histories ht ; de…ned for each Borel
t
AjS
t
=
Z
t
t
A
t
jS t :
(1)
We require the government’s strategy to be feasible, so that it satis…es for any S t =
St
1; u
t
Z
C ut
; St
d
Ht
t
Citizens’strategies induce posterior beliefs pt over
ht
and
St
jS t
e:
t
: These beliefs are de…ned for all
and satisfy Bayes’rule, i.e. that for any Borel set A of H t and any t ;
Z
t t
pt t jS t ; h t dhjS t = t A
jS whenever t AjS t > 0:
A
7
(2)
(3)
Finally, we de…ne continuation payo¤s for agents and the government. Any pair ( ;
generates a stochastic process for utility allocation u: We use E(
pectation of the random variable xt :
St
Ht
measures generated by strategies ( ;
G) ;
t
and E(
St
;
;
G)
G)
xt to denote the ex-
! R with respect to the probability
G)
Ht
[xt jA] to denote the conditional ex-
t:
pectation given some Borel subset A of
The lifetime utility of agent v is
P1 t
then E( ; G )
t ut jv : Since the government is benevolent and utilitarian, its payo¤
t=0
R
P1 t
P1 t
is E( ; G )
E( ; G )
(dv) :
t ut =
t ut jv
t=0
t=0
De…nition 1 A Perfect Bayesian Equilibrium (PBE) is a strategy pro…le (
;
G)
and a belief
system p such that conditions (2) and (3) are satis…ed, and both agents and the government
choose
and
G
as their best responses, i.e.
Agents’ best response: for every S T 1 ; MT ; hT ; T ;
" 1
#
X
t T
T 1
T T
E( ; )
; MT ; h ;
E(( 0 ;
t ut S
i
G
i
);
G
t=T
0
i
for all
2
E(
;
G
)
1
X
t T
t ut
S
T 1
T
; MT ; h ;
t=T
(4)
and i.
n
Government’s best response: for every S~T 2 S T
"
)
"
1
X
t T
t ut
S~T
t=T
#
Z
E(
;
0
G
)
"
1; ST
1
X
o
t T
;
t ut
S~T
t=T
#
for all
0
G
2
G:
(5)
We focus on equilibria that maximize the payo¤ of the utilitarian government subject to
delivering lifetime utility of at least v to an agent that belongs to family v: We call it a best
equilibrium and de…ne it as follows
De…nition 2 A triple (
;
G; p
E(
;
) is a best equilibrium if it is a PBE such that
" 1
#
X
t
v for all v;
t ut v
G)
(6)
t=0
and there is no other PBE ( 0 ;
government,
E(
0;
0
G
)
0 ; p0 )
G
"1
X
t
that satis…es (6) and delivers a higher payo¤ to the
t ut
t=0
Throughout the paper we assume that
assume that
#
> E(
;
G
)
"
1
X
t=0
t
t ut
#
:
is such that a best equilibrium exists. We further
is such that (6) holds with equality in a best equilibrium. This assumption
8
T
#
simpli…es the recursive formulation since all the “promise keeping” constraints can be de…ned
as equalities in that case. Without this assumption our period 0 recursive formulation would
have to be de…ned as an inequality, which would make notation more bulky but not a¤ect any
of our results.
3
The recursive problem and the Revelation principle
In this section we discuss two intermediate results that are necessary for our analysis of optimal
information revelation. First, we derive the recursive problem solution which characterizes the
optimal reporting strategy and consumption allocation in best PBEs. Recursive techniques
are the standard tool to solve dynamic contracting problems, which essentially allow to solve
for optimal insurance after any given history of shocks separately from the other histories.
In our game-theoretic settings the standard approach to constructing Bellman equations is
not applicable: the government’s incentive to deviate from a best equilibrium depends on the
reporting strategies of all agents making the usual history-by-history separation of incentives is
impossible. To overcome this di¢ culty, we consider a constrained problem in which we replace
the function that characterizes the value of deviation for the government with another function
which is linear in the distribution of the past histories of reports. We show that this function
can be chosen such that a solution to the original problem is also a solution to the constrained
problem. The advantage is that the linearity of the constrained problem in the distribution
of past reports allows us to solve for the optimal contract recursively, history-by-history. The
key insight for this construction is that the Lagrange multiplier on resource constraint in the
best one shot deviation from best equilibrium strategies summarizes all relevant information.
The second result of this section characterizes the minimum dimension of the message space
M that is needed to support best PBEs. Reduction of an arbitrarily message space M to a
smaller dimension object is important for tractability of the maximization problem. This step
is similar in spirit to invoking the Revelation Principle in standard mechanism design problems
with commitment, and we refer to this result as the (generalized) Revelation principle.
Although these steps are crucial for our ultimate goal – characterization of e¢ cient information revelation – these tools are of interest in themselves. A lot of environments without
commitment share the feature that value of deviation for the “principal”depends on actions of
many agents, and the recursive techniques developed in our settings should also be applicable
to such environments. To the best of our knowledge, there is no version of the Revelation
Principle for economies with multiple agents when the principal lacks commitment. A well
known paper by Bester and Strausz (2001) developed a version the Revelation Principle for an
9
economy with one agent, but their approach and the main result do not extend to multi-agent
settings.
3.1
The recursive problem
We start by describing a PBE that delivers the lowest payo¤ to the government, to which we
refer as the worst PBE. It is easy to show that there are worst equilibria in which no information
is revealed.5 To see this, let m? (M ) be an arbitrary message from a set M 2 M. Consider a
strategy pro…le (
w;
w)
G
in which all agents report message m? (M ) with probability 1 for all
M , and the government allocates the same utility uw
t =C
The beliefs
pw
Lemma 1 (
that satisfy (3) are given by
w;
w ; pw )
G
pw
t
t
jht ; S t
1 (e)
=
t
for any message m it receives.
t
for all ht ; S t :
is a worst PBE.
Proof. The best response of the government to agents’reporting strategy
w
is to allocate
the same utility to all agents since its beliefs pw do not depend on m and C is strictly convex.
Given this allocation rule, playing
w
is optimal for agents, therefore (
that delivers the government payo¤ U (e) = (1
) : Strategy
w
G
w;
w;
w ; pw )
G
is a PBE
is feasible for any reporting
strategy that agents choose, so the government can attain payo¤ U (e) = (1
which proves that (
w ; pw )
G
) in any PBE,
is a worst PBE for the government.
Standard arguments establish that best equilibria are supported to reverting to the worst
PBE following any deviation of the government from its equilibrium strategies. We split
our problem in two parts. First, we …x any sequence of message sets M and describe the
maximization problem that characterizes the best PBE given that sequence of message sets,
which we call the best equilibria given M: We then show that the same payo¤ can be achieved
with a much simpler message set that has only a …nite number of messages. That set is
independent of M and hence without loss of generality it can be chosen as the message set in
the best PBE.
We start with several preliminary observations that simplify the notation. Since there is no
aggregate uncertainty the aggregate distribution of reports and allocations is a deterministic
sequence. Therefore, it is redundant to keep track of the aggregate history S t in best equilibria
and we drop this explicit dependence from our notation. Moreover, without loss of generality
we can restrict attention to reporting strategies
5
t
that depend on ht
1;
zt and
t;
but not
In fact, a stronger statement is true that in any worst equilibrium no information is revealed. This statement
follows from our Lemma 2.
10
on the past history of shocks
since as long as
ht ;
t
t
t 1 6
:
This results holds more generally with Markov shocks,
t 1
follows a Markov process,
is payo¤ irrelevant and agents with the same
can replicate each other strategies for all past
t 1
: This implies that all information
about agents at the beginning of period t can be summarized by the distribution of reports
t 1:
We now turn to setting up the maximization problem that characterizes best equilibria
given M: Since any deviation by the government from a best equilibrium triggers a switch to
the worst PBE, it is su¢ cient to consider only the best one-shot deviation from equilibrium
strategies by the government. The government that observes the distribution of personal
~ t ( t ) de…ned as
histories t can achieve the maximum payo¤ W
~ t ( t) =
W
subject to
Z
sup
Ht
fu(h)gh2H t
Z
E
C (u (h)) d
t
[ jh] u (h) d
e:
t
Ht
t
(7)
(8)
Therefore, any best equilibrium given M is a solution to
1
X
max E
u;
t
t ut
(9)
t=0
subject to (2),
E
1
X
s t
~ t ( t) +
W
s us
s=t
E
1
X
t
t ut
E
0
t=0
and
1
X
U (e) for all t;
1
t
t ut
for all
0
(10)
(11)
t=0
E
"
1
X
t
t ut
t=0
#
v = v:
(12)
The main di¢ culty in the analysis of problem (9) is that the sustainability constraint (10)
~ t ; which is a non-linear function of the past reports embedded in the probability
depends on W
~ t with a function that (i) is linear in t 1 ;
distribution t 1 : To make progress, we replaced W
~ t for all
(ii) is weakly greater than W
t;
~ t at a best equilibrium’s distribution of
and (iii) equals W
reports. This de…nes a more constrained maximization problem for which the best equilibrium
In the Supplementary Material we show that for any PBE ( 0 ;
delivers the same payo¤ to all agents and the government as ( 0 ;
( 0 ; 0G ; p0 )) and has the property that t does not depend on t
6
11
0
0
G; p )
0
0
G; p )
1
:
there is another PBE ( ; G ; p) which
(i.e. ( ; G ; p) is payo¤ -equivalent to
is still a solution. The linearity of the constraining function in
t 1
allows us to write the
constrained problem recursively.
Let (u ;
by
: Let
) be a solution to (9) and
w
t
be the distribution of personal histories induced
0 be a Lagrange multiplier in problem (7) given
t:
For any mapping
:
(Mt ) de…ne
Wt ( ) =
max
fu(m)gm2M
t
Z
w
t C
( u (m)
Mt
w
t e:
(u (m))) (dmj ) (d ) +
E [ jm].
Function Wt plays an important role in our analysis: We show that
R
(13)
w 0
w
t C (u
We use fuw (m)gm2Mt to denote the solution to (13), which is given by equation
!
Wt ( t ) dzt d
(m)) =
t 1
is an
upper bound for Wt ( t ) that satis…es the three properties needed for recursive characterization.
Before formally proving this result, it is useful to introduce some de…nitions. We say that
P
( ) = 1 a.s., i.e. for almost every
reporting strategies are uninformative if E [ jm] =
message m with respect to the measure generated by
. Uninformative reporting strategies
reveal no additional information other than the unconditional expectation of : All other
strategies are called informative. We also need to generalize the notion of the envelope theorem
for Wt : For any
and
0
de…ne a derivative of Wt ( ) in the direction
@Wt ( )
@ 0
Wt ((1
lim
0)
) +
Wt ( )
#0
0
as
:
With these de…nitions we can state the following lemma, which is important for all subsequent
analysis.
w
t
Lemma 2 The multiplier
and, therefore,
uw
is uniformly bounded away from 0 and belongs to a compact set
(m) belongs to a compact set in the interior of [(1
) v; (1
) v] for all
: The family of fWt gt and all the families of its directional derivaties are uniformly bounded.
Function Wt is well de…ned, convex, and is minimized if and only if
For any
t;
t 1
~ t ( t)
W
with equality if
t;
t 1
=
Z
Wt
t
Ht
t; t 1 :
0 is well-de…ned
The derivative @Wt ( ) =@
Z
@Wt ( )
=
( uw (m)
@ 0
Mt
w
t C
jht ;
for all
(uw (m)))
12
dzd
0
is uninformative.
(14)
t 1
and satis…es
0
(dmj )
(dmj )
(d ) :
(15)
Consider now a modi…ed maximization problem (9) in which we replace (10) with
Z
1
X
s t
Wt t jht 1 ;
dzd t 1 +
E
U (e) :
s us
1
t
H
s=t
The constraint set is tighter in the modi…ed problem, but (u ;
straints, therefore (u ;
(16)
) still satis…es all the con-
) is a solution to the modi…ed problem. One can then use standard
techniques (see, e.g. Marcet and Marimon (2009) and Sleet and Yeltekin (2008)) and use
Lagrangian multipliers to re-write it as
L = max E
u;
1
X
t [ t ut
tC
(ut )
t Wt ]
(17)
t=0
1
subject to (11) and (12) for some non-negative sequences
t ; t ; t t=0 , with a property that
^
; with strictly inequality if and only if constraint (16) binds in period t:7 We
t
t= t 1
interpret ^ as the e¤ective discount factor of the government in the best equilibrium. It is
t
greater than agents’discount factor
because the government also needs to take into account
how its actions a¤ects the sustainability constraints in the future. This is a general result
about the role of the lack of commitment on discounting that was highlighted, for example, by
Sleet and Yeltekin (2008) and Farhi et al. (2012).
The maximization problem (17) shows costs and bene…ts of information revelation. The
more information the agents reveal, the easier it is for the planner to maximize the costweighted utility function of the agents,
t ut
tC
(ut ) : At the same time, better information
also increases the temptation to deviate, captured by the term
t Wt :
This trade-o¤ is at the
heart of our characterization in Section 4.
We make two assumptions on the properties of these Lagrange multipliers which we maintain throughout the analysis, lim sup
t
> 0 and lim inf
t
> 0: These conditions simplify
technical arguments and in the Supplementary material we provide su¢ cient conditions for
C that ensure that these assumptions are satis…ed. Since the Langrange multipliers should
satisfy these properties much more generally – for example whenever the economy converges
to an invariant distribution and the long-run immiseration is a feature of the optimal contract
with full commitment –we opted to make assumptions on the multipliers directly.8
An important simplifying feature of the modi…ed maximization problem and the Lagrangian
(17) is that the distribution of past reports
t 1
enters the objective function and the con-
7
This representation is possible since allowing the government and agents to condition their strategies on
z convexi…es the maximization problem (9). The formal arguments are straightforward but cumbersome, we
present their sketch in the Supplementary Material.
8
Immiseration is a common feature of long-term contracts with commitment. See Ljunqvist and Sargent
(2004) for a textbook discussion and Phelan (2006) and Hosseini et al. (2013) for recent contributions to the
literature. We discuss existence of the invariant distribution in Section 5.1.
13
straints linearly. This allows us to solve for the optimal allocations and reporting strategies
separately for each history ht
1:
We do so by extending the recursive techniques developed by
Farhi and Werning (2007) who study an economy with commitment but in which the principal
is more patient than agents.
Let k0 (v) be the value of the objective function (17) for family v; de…ned as
" 1
#
X
1
k0 (v) =
max E
t ( t ut
t C (ut )
t Wt ) v
0 u;
subject to (11) and (12). The Lagrangian de…ned in (17) satis…es L =
Similarly we can de…ne9
kt (v) =
1
max E
t u;
(18)
t=0
"
1
X
s us
t+s
t+s C
(us )
t+s Ws
s=0
R
v
0 k0 (v)
#
(dv) :
(19)
subject to (11) and (12). The next proposition shows the relationship between kt (v) and
kt+1 (v) :
Proposition 1 The value function kt (v) is continuous, concave, di¤ erentiable with limv!v kt0 (v) =
1: If utility is unbounded below, then limv!
0
1 kt (v)
= 1; if utility is bounded below, then
limv!v kt0 (v) = 1. The value function kt (v) satis…es the Bellman equation
h
^
kt (v) =
max
E
u
t C (u) + t+1 kt+1 (w)
fu(m;z);w(m;z); ( jz; )g(m;z)2M
t
( jz; )2 (Mt )
Z
t Wt
i
(20)
subject to
h
i
E ^u + wj^; z
v = E [ u + w]
h
i
E 0 ^u + wj^; z for all z; ^;
(21)
0
(22)
Without loss of generality, the optimum is achieved by randomization between at most two
points, i.e. one can choose z 2 [0; 1] and set (u ( ; z 0 ) ; w ( ; z 0 ) ; ( jz 0 ; )) = (u ( ; z 00 ) ; w ( ; z 00 ) ; ( jz 00 ; ))
for all z 0 ; z 00
z and all z 0 ; z 00 > z:
Most of the proof of this proposition follows the arguments of Farhi and Werning (2007)
and is provided in the Supplementary materials. The solution to this Bellman equation is
attained by some functions uv;t (m; z) ; wv;t (m; z) ; and
v;t (mjz;
). In what follows we will
drop explicit dependence on t whenever this will not cause confusion. We can use these policy
functions to generate recursively ut and
t:
Standard arguments establish when these (u; )
are a solution to the original problem (9).
Variables (u; ) = fut ; t g1
t=0 are de…ned over slightly di¤erent spaces in problems (18) and (19). The
1
sequence of message sets is fMt g1
t=0 in (18), while it is fMs+t gt=0 in (19):
9
14
Proposition 2 If (u; ) obtains a maximum to (18), then it is generated by (uv ; wv ;
(u; ) generated by (uv ; wv ;
v)
v) :
If
is such that
t
lim E
t!1
vt = 0
(23)
then it is a solution to (18).
Condition (23) can be veri…ed in the same way as in Farhi and Werning (2007).
3.2
The Revelation Principle
The recursive problem (20) is similar to the usual recursive dynamic contract formulation
with commitment with two modi…cations. First, agents play a mixed reporting strategy over
set M rather than a pure reporting strategy over set
t Wt
: Second, there is an additional term
that captures the cost of information revelation. In this section we further simplify
the problem by showing that incentive constraints (22) impose a lot of structure on agents’
reporting strategies and simplify the message space that needs to be considered in best PBEs.
Since incentive constraints (22) hold for each z; we drop in this section the explicit dependence of strategies on the payo¤ irrelevant variable, and our arguments should be understood to
apply for any z: Let fu (m) ; w (m)gm2Mt be any allocation that satis…es (22). Let Mt ( )
be the subset of messages that give type
the highest utility, i.e.
u m0 + w m0
u (m) + w (m)
for all m 2 Mt ( ) ; m0 2 Mt :
Sum this inequality with an analogous condition for type
0
0
u (m)
u m0
Mt
0
to get
for all ; 0 ; m 2 Mt ( ) ; m0 2 Mt
0
:
(24)
One immediate implication of this equation is that any incentive compatible allocation is
monotone in types, i.e.
>
0
implies u (m)
u (m0 ) and w (m)
w (m0 ) : It follows that
each message set Mt ( i ) can be partitioned into three regions: the messages that also belong
to Mt (
i+1 ) ;
the messages that also belong to Mt (
i 1 ),
and the messages that do not belong
to any other Mt ( j ) :
The next proposition shows that it is without loss of generality to assume that agents send
only one message per each partition. Since there can be at most 2j j
1 of such partitions, it
also gives an upper bound on the cardinality of the message space needed in best PBEs.
Proposition 3 Any best PBE is payo¤ equivalent to a PBE in which agents report no more
than 2j j
1 messages after any history ht : Furthermore such PBE can be constructed so that
if m0 6= m00 then the utility allocation in equilibrium, ut , satis…es ut ht ; m 6= ut ht ; m
^ :
15
We brie‡y sketch the key steps of the arguments. Consider any partition Mt ( i )\Mt (
i+1 ) :
Equation (24) implies that (u (m) ; w (m)) must be the same for all m 2 Mt ( i ) \ Mt (
i+1 ) :
Therefore, all reporting strategies
that keep the same probability of reporting messages m 2
=
h
i
^ kt+1 (w) .
Mt ( i )\Mt ( i+1 ) have the same on-the-equilibrium-path payo¤ E
u
C
(u)
+
t+1
t
Thus, in a best BPE the reporting of messages in Mt ( i ) \ Mt (
i+1 )
must minimize the o¤-
the-equilibrium-path payo¤ E [ t Wt ]. Convexity of Wt implies that such reporting strategy
keeps posterior beliefs of the government the same for all m 2 Mt ( i ) \ Mt (
without loss of generality to allow only one message for each Mt ( i ) \ Mt (
i+1 ) :
Then it is
i+1 ) :
The reverse arguments allow to reach the same conclusion for the subset of Mt ( i ) that does
not intersect with any other Mt ( j ) ; which we denote Mtexcl ( i ) : Conditional on observing
any message sent with a positive probability from subset Mtexcl ( i ) ; the government learns
that the sender is type
i
with certainty. Therefore the o¤-the-equilibrium-path payo¤ does
not depend on the exact probability with each type
i
reports messages in Mtexcl ( i ) : Strict
convexity of the on-the-equilibrium-path payo¤ implies that the government chooses that same
(u (m) ; w (m)) for all m 2 Mtexcl ( i ), which again implies that it is without loss of generality
to restrict attention to only one message.
Proposition 3 is very useful for the characterization of the optimal incentive provision and
information revelation in the next section. It also allows us to prove a version of the Revelation
Principle in our economy. Let M be any set of cardinality 2j j
1:
Corollary 1 Any best PBE given M is payo¤ equivalent to a best PBE given Mt = M
for all t: The incentive constraint (22) for such equilibrium can be written, for each z; as
(m2i
1 j 2i 1 )
> 0 and
i u (m2i 1 )
(mj i ) [( i u (m2i
1)
+ w (m2i
+ w (m2i
1 ))
1)
i u (m)
+ w (m) ;
(25)
( i u (m) + w (m))] = 0 for all i = 1; ::; j j; m 2 M :
This result shows that in general the cardinality of message space with a continuum of
agents is …nite but bigger than the cardinality of the message space with only one agent. In
the latter case Bester and Strausz (2001) showed that without loss of generality one can restrict
attention to a message space M =
: Their result does not extend to economies with multiple
agents.10 Corollary 1 shows that even with a continuum of agents the dimensionality of the
message space remains small.
10
See Bester and Strausz (2000) for a counterexample with two agents.
16
4
Characterization
In this section we characterize properties of the e¢ cient information revelation. We start with a
simpli…ed environment that illustrates the main trade-o¤s very transparently. We then extend
the insights developed by this example to our general settings.
4.1
A simpli…ed environment
We make two simplifying assumptions in this section. First, we assume that the government
can deviate from its implicit promises in period t only if it deviates in period 0. This simpli…es
the analysis of the best equilibrium as it is su¢ cient to ensure that government’s sustainability
constraint (10) holds only in period 0. This case is isomorphic to our Lagrangian formulation
with
t
= 0 for all t > 0: Secondly, we assume that agents’preferences can be represented by
a utility function U (c) = ac1=a when 1=a < 1; with U (c) = ln c when 1=a = 0:
Under the …rst simplifying assumption the Lagrangian (17) can be written, up to a constant,
as
(
L = max E
u;
1
X
t
tC
(ut )
0 W0
t=0
)
subject to (11) and (12). First, consider the sub-game starting from t = 1: Since the sustainability constraints do not bind for all t
1; the standard Revelation principle applies and the
maximization problem that characterizes the optimal allocations is identical to that in Atkeson
and Lucas (1992). It is easy to show that the value function with CRRA preferences takes the
form
1 (v)
= const jvja when 1=a 6= 0 and
For any reporting strategy
0 (v;
2
)=
1 (v)
(M0 ) in period 0, let
0 (v;
0C
(u) +
max
fu(m);w(m)gm2M
subject to (21) and (22). Function
= const exp (v) when 1=a = 0:
0 (v;
E [
) be de…ned as
1 (v)]
0
) is interpreted as the value function for the govern-
ment on the equilibrium path if an agent plays reporting strategy : It inherits the homogeneity
property of function
1;
namely
0 (v;
) = d ( ) jvja for some constant d ( ) :
If no public randomization is allowed, the actual value function
0 (v)
= max
0 (v;
)
0 W0 (
0 (v)
is given by
):
With public randomization the maximum is taken over the convex hull of the function on the
right hand side.
Consider …rst the case when j j = 2 and agents can only play two reporting strategies:
a full information revelation strategy
in ;
when each type reports a distinct message with
17
un ;
probability 1, and a no information revelation strategy
when each type randomizes between
all messages with the same probability. Since the former strategy has higher payo¤ both onand o¤- the equilibrium path, d
Figure 1 plots
0 (v;
)
in
0 W0 (
> d(
) for
un )
in ;
2
ization. The key observation is that function
un ) only
0 W0 (
un gives higher
in
and W0
un
; as well as
in
;
0
> W0 (
0 W0
un ) :
0 (v)
in
with public random-
intersects
0(
;
un )
once, from below at some point v2 : This shows that the uninformative strategy
in
value to the government than
for all v < v2 and lower value for all v > v2 :
Allowing public randomization may further increase the government’s payo¤ and create an
intermediate region (region (v1 ; v3 ) on the graph) in which the reporing strategy is stochastic
but it does not alter the main conclusion: no information revelation is optimal for low values
of v and full information is optimal for high values of v.
To understand the intution for this result, it is useful to compare the on the equilibium
path bene…ts of information revelation,
costs W0
in
W0 (
un ) :
0
in
;
0(
;
un ) ;
to the o¤ the equilibrium path
Given our CRRA assumption, it is easy to see that the bene…ts
are monotonically increasing in v; equal to zero as v ! v and to in…nity as v ! v: The o¤ the
equilibrium path costs of information revelation do not depend on v: Therefore, there must
exist a region of low enough v where the costs of better information revelation exceed the
bene…ts and a region of high enough v where the opposite conclusion holds.
This conclusion does not depend on the fact that we restricted attention to only two
reporting strategies. When j j = 2; any
the government satis…es d
un
and
in
un ) :
> d ( ) and W0 ( ) > W0 (
have higher payo¤ than
This implies that reporting
for low and high values of v respectively.
κ(v)
strategies
in
that reveals some but not all information to
⇐
no info
⇒
full info
v
1
v
Figure 1: Value functions in the simpli…ed example. Solid line:
in
in
un
; dashed: un
0 (v)
0
0 (v)
0W
0W ( 0 ) :
When j j > 2; it is still true that W0 ( ) > W0 (
18
v
2
un )
0
3
(v) with public randomization, dotted:
and therefore no information revelation
is optimal for low enough v. However, full information revelation no longer gives strictly higher
value than any other reporting strategy on the equilibrium path. The reason for it is that
bunching might be optimal even in standard mechanism design problems with commitment.
Our result for high values of v extends if the distribution of types is such that no bunching
is desirable with commitment (equation (33) provides a su¢ cient condition for that). More
generally, it can be shown that some information revelation is desirable for high v, in particular
it is optimal for
1
to reveal his type perfectly.
Finally, we comment on the role of the assumption of constant relative risk aversion. Our
arguments for no information revelation for low values of v only used the fact that
un
provides
the lowest value to the government o¤ the equilibrium path. This is true for any preferences.
The arguments for e¢ ciency of full information revelation rely on the fact that
0 (v;
0
v;
in
) becomes unboundedly large for high values of v: A su¢ cient condition for this is that
the absolute risk aversion goes to zero as consumption goes to in…nity, and our conclusion
holds for all preferences satisfying this condition.
This example illustrates the general principle that goes beyond the particular taste-shock
model that we consider in this paper. Since the o¤ the equilibrium path costs of information
revelation do not depend on past promises (the principal simply reneges on them when deviates)
but the bene…ts do, it is optimal to reveal less information for those agents for whom the on
the equilibrium gains are lowest. The gains from better information are monotone in v in the
taste shock economy that we consider in this paper; which allows us to get sharp cut-o¤s, but
the general principle holds regardless of this property.
4.2
Characterization of the general case
In this section we study e¢ cient information revelation in our baseline model of Section 3. Let
(uv ; wv ;
v)
be a solution to (20). To streamline the exposition, in the body of the paper we
focus on interior optimum when the lower bound U (0) does not bind; many arguments are
simpler if the lower bound binds.
We start with two key optimality conditions. The …rst order conditions for uv and wv can
be re-arranged as
^
t+1
E
v
0
kt+1
(wv ) jz = kt0 (v)
(26)
C 0 (uv ) jz :
(27)
and
kt0 (v) = 1
tE
v
The …rst condition describes the law of motion for promised utilities. Since ^ t+1
19
with strict
inequality when the sustainability constraint binds in period t + 1; it shows a version of meanreversion in promised utilities. Since kt and kt+1 are concave functions with interior maxima,
it implies that period t + 1 promises have a drift towards the value that maximizes kt+1 : This
drift component implies higher future promises for low-v agents and lower promises for high-v
agents. This mean-reverting drift helps the government to relax sustainability constraints in
future periods. The second condition provides a linkage between promised and current utility
allocations.
For our purposes it is important to establish bounds for uv and wv : The optimality conditions (see Appendix for details) imply that
1
kt0 (v)
tC
1
0
(uv (m; z))
1
kt0 (v)
j j;
(28)
and
% 1
kt0 (v) +
1
^
t+1
!
1
0
kt+1
(wv (m; z))
= ^ t+1 ; %
for some numbers %; % with a property that %
kt0 (v) +
% 1
1
= ^ t+1 ! 0 as
^
j j
t+1
!
1
(29)
! 0:
Equation (28) shows the role of private information. If agents’ types were observable,
the planner would equalize the marginal costs of providing 1 util to type , 1
1
tC
0 (u) ;
to the shadow cost of past promises, kt0 (v) ; while allocating the same promised utility w
to all types. This would give more consumption to higher
types, which is not incentive
compatible. With private information the dispersion of current period consumption allocations
is smaller, which can be seen by the bounds (28). Equation (29) shows, in addition, how the
sustainability constraints in future periods interact with the provision of incentives in the
current period. It shows that bounds for future promises 1
0
kt+1
(wv ) shrink as v ! v:
When future sustainability constraints bind, the government realizes that more dispersion of
inequality tomorrow makes it harder to sustain e¢ cient outcomes, which limits the dispersion
of promises that the government gives and prevents the long run immiseration.
Conditions similar to (26)-(29) also appear in the problems in which the government can
fully commit (see Atkeson and Lucas (1992) and Farhi and Werning (2007)). Our analysis
generalizes those conditions to the environments with no commitment. A novel feature of such
environments is that complete information revelation is generally suboptimal. We next turn
to the characterization of the e¢ cient information revelation.
Suppose that it is optimal for type
to randomize between messages m0 and m00 . The
20
optimality for the reporting strategy
uv m00 ; z
t
00
uw
v m ;z
w
t C
together with the envelope theorem yields11
uv m00 ; z
tC
uv m0 ; z
=
v
tC
uv m0 ; z
00
uw
v m ;z
+ ^ t+1 kt+1 wv m00 ; z
(30)
+ ^ t+1 kt+1 wv m0 ; z
0
uw
v m ;z
w
t C
0
uw
v m ;z
:
Equation (30) captures bene…ts and costs of information revelation. The left hand side of
the equation captures the bene…ts of better information revelation on the equilibrium path.
It compares the “cost-weighted” utility that the government obtains for type
messages m0 and m00 : This term is the general form of the expression
v;
0
if it receives
in
0 (v;
un )
that appeared in our simpli…ed example in Section 4.1. The right hand side of the equation
captures the cost of information revelation o¤ the equilibrium path. If message m00 reveals
more information about
further from
than m0 ; in a sense that the expectation of
conditional on m00 is
than the expectation conditional on m0 ; this expression is positive. The right
hand side of (30) is the analogue of
0
W0
in
W0 (
un )
in Section 4.1.
Equation (30) develops the key intuition for e¢ cient information revelation. First, consider
information revelation for low values of v: Bounds (28) and (29) imply the expression on the
left hand side of (30) converges to zero as v ! v; so that the gains from information revelation
disappear for low values of v. Therefore, the optimal reporting strategy must converge to
a strategy that minimizes the o¤ the equilibrium path cost of information revelation. Such
strategy must be uninformative by Lemma 2. Note that the uninformative strategy assigns
the same posterior belief for any reported message, so that that right hand side of (30) is zero.
In the Appendix we prove a stronger result that the uninformative strategy is optimal for all
v su¢ ciently low.
Theorem 1 Suppose that the sustainability constraint (10) binds in periods t and t + 1: There
exists vt > v such that for all v 2 v; vt
strategy
v
the allocation (uv ; wv ;
v)
does not depend on z;
is uninformative and (uv (m) ; wv (m)) = (uv (m0 ) ; wv (m0 )) for all m; m0 :
We now turn to the analysis of information revelation for high values of v: Consider the
case when j j = 2: By Proposition 3 we can restrict attention to at most 3 messages, such that
reporting two of those messages reveals the type of the sender perfectly. Therefore the left
hand side of (30) compares on-the-equilibrium-path bene…ts from a message that reveals full
information about a sender and a message that reveals only some of the information. Bounds
Formally, we take a derivative of v in the direction 0 ; de…ned as 0 (m0 j ; z) =
(m00 j ; z) = 0 and 0 (mj ; z) = v (mj ; z) for all other m; ; and apply (15).
11
0
21
v
(m0 j ; z) +
v
(m00 j ; z) ;
(28) and (29) can be used to show that as long as the coe¢ cient of absolute risk aversion,
U 00 (c)=U 0 (c) goes to zero for high c; the informational gains from better information must go
to in…nity as v ! v: Since the informational costs are bounded by Lemma 2, this implies that
equation (30) cannot hold and each agent must reveal his type fully for all v high enough.
Formally, suppose that utility satis…es
Assumption 1 (decreasing absolute risk aversion) U is twice continuously di¤ erentiable
and
lim U 00 (c) =U 0 (c) = 0:
(31)
c!1
We say that
messages as type
v
reveals full information about type
i
with positive probability.
i
if no type j 6= i sends the same
Theorem 2 Suppose that Assumption 1 is satis…ed and j j = 2: Then there exists vt+ < v
vt+ ;
such that for all v
v
reveals full information about each type.
Previous arguments can also be extended for the …rst and the last type of arbitrary message
spaces.
Corollary 2 Suppose that Assumption 1 is satis…ed.
1. (no informational distortions at the top). Then
1
v
reveals full information about
for all v su¢ ciently high.
2. (no informational distortions at the bottom). Suppose in addition that %
j j 1
j j
information about
j j 1
j j
>
j j 1
+
j j
j j 1
j j 2
: Then
v
0 and
reveals full
for all v su¢ ciently high.
The …rst part of this Corollary shows that full information for the lowest type
1
is optimal
for high v: It is an informational analogue of the “no distortion at the top” result from the
mechanism design literature (see, e.g. Mirrlees (1971)). In the mechanism design version of
our environment, the incentive constraints bind upward, so that
that no other type wants to pretend to be
1:
1
is the “top type”in a sense
This property of the top types drives both the
“no distortion at the top” result in standard mechanism design models with commitment and
part 1 of Corollary 2 in our environment.
Part 2 of Corollary 2 shows that informational distortions are suboptimal for the highest
j j
as long as the types are not too close to each other. The extra condition is needed to
22
rule out bunching. When some types are close, it might be optimal to give them the same
allocations even if they reveal their type fully (as, for example, in models with commitment)
in order to provide incentives for other types. Since bunching is suboptimal with two types,
no additional conditions were necessary in Theorem 2.
More insight into the behavior of the interior types can be gained from assuming that the
utility function satis…es U (c) = ac1=a for a > 1: In this case it is easy to …nd the limiting
allocations towards (uv ; wv ;
v)
converge as v ! v: In particular, we can use homogeneity of
C and boundedness from below of u to show that for any v; kt (v0 v) =v a ! k~t (v) as v0 ! v;
where function k~t (v) is de…ned by
h
i
^
k~t (v) =
max
E
(32)
t C (u) + t+1 kt+1 (w)
fu(m);w(m); (mj )gm2M
( j )2 (M )
subject to (22) and (21). Moreover,
v
converges to a solution ~ of this problem.
The limiting problem (32) has no cost of information revelation. It is equivalent to a
standard mechanism design problem in which agents can send reports over a redundantly large
message set M : If it is suboptimal to bunch di¤erent types when agents report over
, it
is also suboptimal to bunch types when agents report over M : A su¢ cient condition to rule
out bunching in mechanism design problems is an assumption that types are not too close,
which we state as Assumption 2. It turns out to be a su¢ cient condition for full information
revelation for high enough v in our economy without commitment.
Assumption 2 The distribution of
(
n 1) [ n
n 1]
satis…es
(
n 1
n 2)
j j
X
( i)
0 for all n > 2:
(33)
i=n 1
Note that this assumption is satis…ed both in Theorem 1 and Corollary 2. Suboptimality of
bunching in the limit implies that information revelation is suboptimal for all su¢ ciently high
v: The proof of this result is a tedious but mostly straightforward application of the Theorem
of Maximum and we leave it for the Supplementary material.
Proposition 4 Suppose that U (c) = ac1=a for a > 1 and Assumption 2 is satis…ed. Then
there exists vt+ < v such that for all v
vt+ ;
v
reveals full information about each type.
Remember that we take the distribution of initial promises as given. The following lemma
then shows that, depending on the initial utility he will be allocated by the government, an
agent can remain in the no-information region or in the full-information region for an arbitrary
long time.
23
Lemma 3 (i) Assume utility is bounded below by 0. For any T > 0, there exists v0
that
vt
1 ;t
0 such
( jz; ) is uninformative for all (z; ) for t = 1; :::; T . Suppose that the sustainability
constraint (10) binds in periods t = 0; :::; T + 1, then v0 can be chosen strictly greater than 0.
(ii) Suppose the assumptions of Theorem 1 (Corollary 2) are satis…ed, then for any T > 0
there exists v0 > v0+ such that
and
5
j j)
vt
1 ;t
( jz; ) reveals full information about each type (types
1
with positive probability for t = 1; :::; T .
Extensions
We discussion two extensions of the baseline analysis.
5.1
Invariant distribution
In the previous sections we used arbitrary distributions of initial lifetime utilities
: In this
section we brie‡y discuss two implications for our analysis if
is an invariant distribution.
^
^
In this case multipliers ; and do not depend on t, with > ; > 0 needed to prevent
immiseration.12
One implication of the invariant distribution is that no agent is stuck forever in the region
in which no information is revealed. To see this, note that equation (29) shows that agent’s
promised utility strictly increases with positive probability if vt < v and strictly decreases with
positive probability if vt > v ; where v is given by k 0 (v ) = 0: Suppose there is no information
revelation for all v
v + a where a
0: Then the invariant distribution must assign all
the mass to v and, moreover, no information about agents is revealed. But in this case the
sustainability constraint is slack, which is a contradiction. Therefore the “no information”
region lies strictly below v .
Another implication of Theorem 1 and bounds (29) in this case is that there must exist
an endogenous lower bound beyond which agents’lifetime utility never falls. Once an agent’s
utility reaches that bound, he bounces from it with a positive probability. This dynamics
resembles that of Atkeson and Lucas (1995), except that in their case the utility bound was set
exogenously. Near the endogenous lower bound agent may reveal no information and receive
no insurance against that period’s shocks.
For given ^ ; ; one can follow the arguments of Farhi and Werning (2007) to show that there exists initial
distibution ~ with a property that t generated by a solution to (20) is such that t = ~ for all t: This
distribution is invariant if feasibility and sustainabilty constraints hold with equalities. We leave it for future
research to explore under which conditions these constraints are satis…ed.
12
24
5.2
Persistent shocks
We chose to focus on iid shocks in our benchmark analysis. Most of our key results extend
with few modi…cations to Markov shocks. When the shocks are Markov, let
the probability of realization of shock
assume that
j
> 0 for all ;
conditional on shock
conditional on shock
t
: Let
j
denote
in the previous period. We
be the probability of realization of
j
being realized t periods ago.
Many arguments in the persistent case are straightforward extentions of our previous analysis. We brie‡y sketch them in this section leaving the details for the Supplementary material.
Following the same steps as before, we can show that in the worst equilibrium there is no
information revelation for the government. The payo¤ in that equilibrium, unlike the iid case,
depends on the prior beliefs that the government has. The maximum payo¤ that the government can achieve in any period t is given by
Z
~
Wt ( t ) =
sup
fut+s (h)gh2H t ;s
0
Ht
1
X
s
s=0
Ept+s [ jh] ut+s (h) d
t
subject to the feasibility constraint (8) holding for all t + s and
Z
s
pt+s jht =
j
pt d jht for s > 0:
~ t ( t ) with a function that is linear in
Similarly to the iid case, we can bound W
t 1:
De…ne
the analogue of (13) as
Wt ( ; p) =
max
fut+s (m)gs
0
Mt
Z
1
X
s=0
0
s@
Z
s
(d s j )
s ut+s (m)
w
t;t+s (C
(ut+s (m))
1
e)A (dmj )
d j
then Lemma 2, and in particular bound (14), can be extended to Wt ( t ; pt ) : It is straightforward then to obtain the analogue of Lagrangian (17). This Lagrangian can then be rewritten recursively using the techniques of Fernandes and Phelan (2000), who studied an economy with persistent shocks and commitment.
v= v
period,
1
; :::; v
j j
In their formulation the state is a vector
of promised utilities and the realization of the shock in the previous
: In our environment v remains a state variable with an analogue of the promise
keeping constraints (21) holding for each type,
Z
v i = [ u (m; z) + w (m; z; )] (dmjz; ) dz
d j
i
E
u + wj
i
.
(34)
In the environments with commitment each agent plays a pure reporting strategy and
is known along the equilibrium path. In our settings
25
is not known, but the planner forms
p d
;
posterior beliefs about
: Therefore, the only di¤erence from the commitment environment
is that the posterior belief p replaces
as the state variable.
The recursive formulation is given by
kt (v; p) =
max
(u;w; )
( j )2 (M );p0 2 ( )
X
p
2
E
h
u
t
C (u) + ^
t+1 kt+1
i
0
w; p j
t
Z
Wt dz
(35)
subject to (34), the incentive constraint
E [ u + w ( ; ; ) j ; z]
E 0 [ u + w ( ; ; ) j ; z] for all z; ;
0
;
and the Bayes rule condition that requires p0 to satisfy, whenever de…ned,13
P
(mj
)
j
p
2
p0 ( jm; z) = P
:
j
p
( ; )2 2 (mj )
The analysis of dynamic mechanism design problems with persistent shocks is more involved
since the recursive problem with additional state variables is more complicated. The broad
lessons about desirability of information revelation for high and low promised values (now
in the sense of increasing each element of vector v) still holds. First of all, the example in
Section 4.1 remains virtually unchanged. More speci…cally, in the Supplementary material we
follow similar steps as in the iid case and de…ne functions
1 (v; p)
that both these functions are homogenous in v: for any x > 0;
0 (xv;
) = xa
0 (v;
). Note that v
and
1 (xv)
0 (v;
=
) : We show
xa
1 (v; p)
and
0 if 1=a 2 (0; 1) and v < 0 if 1=a < 0: We can
then conclude that no information revelation is optimal for low values of xv (i.e. x ! 0 if
1=a 2 [0; 1) and x ! 1 if 1=a < 0) and, when no bunching is desirable with commitment,
full information is optimal for high values of xv. We can also generalize Theorem 1 to the
persistent case (see the Supplementary material for details).
Proposition 5 Suppose that utility is bounded. Let
v;p
be a solution to (35) and
mative strategy. If the sustainability constraint (10) binds in periods t; then Pr (
as v ! 0 for all p.
6
an uninforv;p
! )!1
Final remarks
In this paper we took a step towards developing of theory of social insurance in a setting in
which the principal cannot commit. We focused on the simplest version of no commitment
13
Strictly speaking m should be replaces with any Borel set A of
26
(Mt ) analogously to de…nition (3).
that involves a direct, one-shot communication between the principal and agents, and showed
how such model can be incorporated into the standard recursive contracting framework with
relatively few modi…cations. Our approach can be extended to other types of communication. For example, a literature starting with a seminar work of Myerson (1982) considered
communication protocols that involve a mediator. Such protocols may further increase welfare (see, e.g. Bester and Strausz (2007)) but they require some ability to commit by the
policy maker to use the mediating device. The key di¤erence is that, after sending any message m; the agent receives a stochastic allocation, so that the incentive constraint (25) holds
in expectation rather than message-by-message. Two main insights of the paper – recursive
characterization and Theorems 1 and Theorems 2 –depend little on the detailed structure of
the incentive constraints. We believe that our analysis can be extended to such settings in a
relatively straightforward way and leave it to future research.
Another important direction that needs to be explored in future work is how the allocations
in best equilibria can be decentralized through a system of taxes and transfers. Some of the
most fruitful way to proceed may be to extend our basic set up to incorporate such margins as
labor supply or job search e¤ort, and consider decentralizations along the lines of labor taxation
in Albanesi and Sleet (2006) and unemployment insurance in Atkeson and Lucas (1995).
27
7
Appendix
7.1
Proof of Lemma 2
w
t gt
First we show that sequences f
is uniformly bounded away from 0. The objective function
w
t
in (7) is concave and the constraint set is convex, therefore there exists
t
solution to (7), uw
t h
w
t
ht 2H t
is given by
t
; satis…es C 0 uw
t h
Z
C C0
1
1
wE
t
Ht
Since E t [ jh] 2
in…nity as
w
t
1; j j
t
1
=
E
w
t
[ jh]
d
jht : The Lagrange multiplier
t
t
= e:
(36)
; the left hand side of (36) is continuous in
w
t
goes in…nity and 0 respectively. Therefore
0 such that the
w
t
and goes to 0 and
is bounded away from 0 from below
and bounded above, and these bounds can be chosen independently of t. This also implies that
the supremum to (7) is obtained. The same arguments applied to (13) establish that Wt is
well de…ned, uw (m) satis…es
1
C 0 (uw (m)) =
1
w;
t
[ jm] 2
wE
t
j j
w
t
;
(37)
and the family fWt gt is uniformly bounded. To see that Wt is convex, for any
2 [0; 1] ;
0
Wt
+ (1
00
)
=
Z
max
fu(m)gm2M
Mt
t
+ (1
)
Z
max
fu(m)gm2M
=
0
Wt
Z
max
fu(m)gm2M
+ (1
t
Z
) Wt
(u(m))]
(u(m))]
w
t C
[ u (m)
Mt
t
)
w
t C
[ u (m)
Mt
+ (1
w
t C
[ u (m)
w
t C
0
00
and
(dmj ) (d )
(dmj ) (d ) +
(u(m))]
[ u (m)
Mt
00
00
0
0;
w
t e
(dmj ) (d )
(u(m))]
00
(dmj ) (d ) +
:
To see that Wt is minimized if and only if a strategy is uninformative, consider any uninformative . From (37), the solution to (13) given
Wt ( ) = C 0
w
t C
1
1
w
t
C0
1
1
w
t
: Let
message set M and note that for any
Wt ( )
=
max
Wt ( )
Z
fu(m)gm2M
t
=
max
fu(m)gm2M
t
Mt
Z
Mt
[( u (m)
w
t C
f(E [ jm] u (m)
(u (m)))
w
t C
1
satis…es C 0 (uw
a.s. and hence
t (m)) = w
t
R
(A) =
(Aj ) (d ) for any Borel A of
( uw
t
(u (m)))
28
w
t C
(uw
t ))] (dmj ) (d )
(E [ jm] uw
t
w
t C
(uw
t ))g (dm) :
w
t e
The expression in curly bracket is non-negative, which implies that Wt ( )
all
: Moreover for informative
jE [ jA]
, there is a set of messages A with
Wt ( ) for
(A) > 0 such that
1j > 0: For all such messages the expression in curly brackets is strictly positive
since uw
t does not satisfy the optimality condition (37) for m 2 A: Since
expression above is strictly positive therefore any informative
(A) > 0; the
cannot be a minimum.
We prove (15) by using Theorem 3 in Milgrom and Segal (2002). For completeness, we
state it here adapted to our set up
Theorem 3 Let V (t) = supx2X f (x; t) where t 2 [0; 1] ; and let x (t) be a solution to this
problem given t and ft be the derivative of f with respect to t: Suppose that (i) for any t
a solution x (t) exists, (ii) fft (x; )gx2X is equicontinuous, (iii) supx2X jf (x; t) j < 1 at
t = t0 , and (iv) ft (x (t) ; t0 ) is continuous in t at t = t0 : Then V 0 (t0 ) exists and V 0 (t0 ) =
ft (x (t0 ) ; t0 ) :
In our case,
f (fug ; ) =
Z
( u (m)
Mt
w
t C
(u (m))) (1
can be maximized pointwise. For each m,
Z
w
( u (m)
t C (u (m))) (1
0
) (dmj ) +
) (mj ) +
0
(mj )
(dmj )
(d )
(d )
is continuous is u (m) and by (37) the latter can be restricted to a compact set, hence conditions
(i) and (iii) of this theorem are satis…ed. The solution, given by (37), is integrable and, thus,
so is the continuous and bounded transformation uw (m)
w
t C
Theorem 11.18 and Remark 11.23.) The derivative with respect to
Z
w
0
f (fug ; )
( u (m)
(dmj )
t C (u (m)))
(uw (m)) (Rudin (1976),
is
(dmj )
(d ) ;
Mt
and it does not depend on , therefore ff (fug ; )gfug is equicontinuous. Also, if either
R
R 0
(mj ) (d ) > 0 or
(mj ) (d ) > 0 for some m, the solution uw
t (m; ) is unique for
2 (0; 1) and, by the Theorem of the Maximum, there is a solution that is continuous in for
R
R 0
2 [0; 1]. Finally, if
(mj ) (d ) =
(mj ) (d ) = 0 for some m, we can always …nd
a solution uw
t (m; ) that is continuous in
for
2 [0; 1]. Since uw
t (m; ) is continuous in
for all m 2 Mt , we can use the dominated convergence theorem to show that f (fu ( )g ;
is continuous in
at
=
0;
0)
which veri…es condition (iv).
Since the sequence f t gt is uniformly bounded (away from zero from below), equation (37)
implies that uw
t (m) is bounded and those bounds do not depend on t: Therefore all the families
of directional derivatives f@Wt ( ) =@ 0 gt are uniformly bounded.
29
We prove (14) next. By Lagrange Duality theorem (Luenberger (1969), Theorem 1, p.
~ t ( t ) can be written as a minmax problem
224), W
Z
~
Wt ( t ) = min max
(E t [ jh] u (h)
C (u (h))) d t + e
0 fu(h)gh2H t H t
Z
w
w
max
(E t [ jh] u (h)
t C (u (h))) d t + t e
fu(h)gh2H t
=
=
max
fu(h)gh2H t
Z
Ht
Z
Wt
Ht 1
Ht
t
Z
1
Mt
jht
1
n
;
u ht
dzd
1
By de…nition of
u(ht
1
; m)
o
t
mjht
1
;
dm (d ) dzd
t 1:
where the inequality follows from the fact that
w
t
w
t C
;m
w
t
may not be a minimizer for an arbitrary
this inequality becomes equality at
t;
t:
which establishes (14).
Finally, if we can restrict Mt to be …nite (as proved in Proposition 3) then Wt ( ) is
continuous in . This is immediate as we can restrict fu (m)g to lie in a compact subset of
RjMt j and use the Theorem of the Maximum.
7.2
Proof of Proposition 3
First we prove some preliminary results. Fix z and consider any incentive compatible allocation
that satis…es (22). Let Mt ( ) be as de…ned in the text. For any i let Mt ( i ) = Mt ( i ) \
Mt (
i 1 ),
Mt+ ( i ) = Mt ( i ) \ Mt (
i+1 )
and Mtexcl ( i ) = Mt ( i ) n ([j6=i Mt ( j )) :
Lemma 4 For all i; Mt ( i ) = Mt ( i ) [ Mtexcl ( i ) [ Mt+ ( i ) :
Proof. Suppose m 2 Mt ( i ) nMtexcl ( i ) : Then there exists j such that m 2 Mt ( j ) :
Without loss of generality let
i+1 u
j
>
i:
For any m0 2 Mt (
m0 + w m0
i+1 )
i+1 u (m)
+ w (m)
and
i u (m)
+ w (m)
iu
m0 + w m0 ;
j u (m)
+ w (m)
ju
m0 + w m0 :
The sum of the …rst the second inequalities implies u (m0 )
the third inequalities implies u (m0 )
Lemma 5 Let (u ; w ;
u (m), the sum of the …rst and
u (m) ; therefore u (m0 ) = u (m) and m 2 Mt (
i+1 ) :
) be a solution to (20) for a given z: Then (u (m0 ) ; w (m0 )) =
(u (m00 ) ; w (m00 )) for all m0 ; m00 2 Mt ( t ) ; for all m0 ; m00 2 Mt+ ( t ) and for almost all (with
respect to measure
) m0 ; m00 2 Mtexcl ( i ) :
30
t 1
Proof. The …rst part of the lemma follows immediately from the discussion in the text, so
u (m) jm 2 Mtexcl ( ) ; w
^=E
we prove the second part. Let u
^=E
and consider an alternative (u0 ; w0 ;
) de…ned as (u0 (m) ; w0 (m)) = (u (m) ; w (m)) if m 2
=
Mtexcl ( ) ; and (u0 (m) ; w0 (m)) = (^
u; w)
^ if m 2 Mtexcl ( ) : For any
0
therefore
0
u
m0 + w
m0 >
0
u (m0 ) + w (m0 ) >
w (m) jm 2 Mtexcl ( )
0
0
6= ; m0 2 Mt
0
u (m) + w (m) for all m 2 Mtexcl ( ) ;
u
^ + w,
^ which implies that (u0 ; w0 ;
) satis…es (22). It
also satis…es (21) by construction, since
m 2
Mtexcl
gets the same utility from reporting any message
h
i
^ kt+1 (w) is strictly concave
( ) : The objective function E
u
C
(u)
+
t
t+1
in (u; w) ; and would take a strictly higher value at (u0 ; w0 ) than at (u ; w ) unless (u ; w ) is
constant on Mtexcl ( i ) a.s.
Lemma 6 Let (u ; w ; ) be a solution to (20) for a given z: Suppose there exists a set
P
~j
~
M
( ) > 0 and u (m0 ) = u (m00 ) for almost all (with respect to
M
Mt s.t.
~ . If t > 0 then E [ jm0 ] = E [ jm00 ] a.s:
measure ) m0 ; m00 2 M
~ and consider an alternative strategy 0 de…ned as 0 (mj ) =
Proof. Fix any m
^ 2 M
~ and 0 (mj
~j
(mj ) if m 2
= M
^ ) =
M
for all : Any agent reports any subset of
messages with a positive probability with reporting strategy
with a positive probability with
0
: Therefore the strategy pro…le
2 [0; 1]. Let
h
fm
E
u
^ ( )
only if he reports that subset
= (1
)
t Wt (
):
+
0
satis…es
(21) and (22) for any
^
t C (u ) + t+1 kt+1 (w )
Since u (m0 ) = u (m00 ) ; w (m0 ) = w (m00 ) ;
0
fm
^ ( )j
=0
=
=
i
@Wt ( )
@
w
w
~)
f(E 0 [ jm]
^ uw (m)
^
^
Pr(m 2 M
t C(u (m)))
Zt
w
w
( uw (m)
t C(u (m))) (mj )dm (d )g:
t
~
M
0 ( )j
Optimality of
= 0 implies that fm
^
h
i
w
w
~ uw (m)
E
jM
^
^
E
t C (u (m))
0 for all m;
^ so that it can be written as
h
i
w
w
~
E [ jm] uw (m)
^
t C(u (m))jM all m:
=0
~ of both sides, we obtain E
Taking expectations conditional on M
h
i
~ which implies that cov (E [ jm] ; uw (m))
E [ jm] uw (m)jM
E
optimality (37) implies that
uw
h
(m) is monotonically increasing in E
31
i
~
jM E
h
~
uw (m)j
^ M
i
0: On the other hand,
[ jm] ; and therefore
cov (E
a.s.
[ jm] ; uw (m))
0: The two conditions can be satis…ed only if E
Proof of Proposition 3 and Corollary 1.
any solution to (20) can take at most 2j j
[ jm0 ] = E
Lemmas 5 and 6 show that for a given z;
1 distinct values of (u (m) ; w (m) ; E
except for possible values that occur with probability 0 under reporting strategy
6 is stated for the case
t
> 0; but when
t
[ jm00 ]
[ jm])
(Lemma
= 0 the problem is isomorphic to the standard
mechanism design problem and usual arguments apply to show that j j distinct allocations
represent a solution). The outcomes that occur with probability zero can be replaced with any
outcome from that set of 2j j
1 distinct values. Therefore without loss of generality the set
M can be restricted to at most 2j j
1 messages in (20), and hence, by Proposition 2, to M
in the modi…ed problem (17).
It remains to verify that it is a best equilibrium since not every solution to (17) needs to be
a PBE. Let (
;
G; p
) be a best PBE that generates (u ; M ) along the equilibrium path.
By the arguments leading to construction of problem (17), (u ;
) is a solution to that prob-
lem given M : It is easy to show that any equilibrium is payo¤-equivalent to one in which the
P1 s t
us jht 1
E
allocations in period t depends only on the expected utility wt ht 1
s=t
but not on the particular realizations of shocks in the previous t
the Supplementary materials) and so we assume that (u ;
1 periods (Lemma 10 in
) satis…es this property. Pre-
vious arguments imply that after any history ht there can be at most 2j j 1 distinct
n
h
i o
values of
ut ht ; mt ; wt ht ; mt ; E
jht ; mt
that occur with probability 1 given
mt
o
n
jht ;
: Therefore it is possible to construct another strategy 0 which is incentive
t
2
compatible and delivers the same payo¤ to the agents as
tribution of histories
any Borel set A of
0
with a property that Pr
([(1
) v; (1
E C (ut ) ; which veri…es that ( 0 ;
) v]
G; p
G)
generates a dis-
2 A) = Pr ((ut ; E t ) 2 A) for
~ t ( ) and E 0 C (ut ) =
~ t ( 0t ) = W
) : Therefore W
t
0
((ut ; E
: The pair ( 0 ;
t)
) is a best PBE and proves Proposition 3.
If removing all non-distinct messages leaves fewer than jM j messages, extra messages can
be added and agents strategies extended to keep posterior probabilities for such messages the
same as for some of the original messages. By appropriately choosing which messages to add it
is possible construct strategies that satisfy (25). This argument extends for all histories, and
hence any value that k0 (v) achieves given any M; can also be achieved given Mt = M for all
t: This completes the proof of Corollary 1.
32
7.3
Proofs for Section 4
First, we use Proposition 3 to simplify our problem. We drop explicit dependence of all
variables on z and throughout this section all the results are understood to hold for all z: By
Proposition 3 we can restrict attention to messages in a set Mv of cardinality no greater than
2j j
1 such that no two distinct reports give the agent the same allocation. We use Nv to
denote cardinality of Mv and Mv ( ) to denote the set of messages in Mv that maximize agent
’s utility. The incentive constraints (22) can be written as
u m0 + w m0 ;
u (m ) + w (m )
m0 j
u m0 + w m0
( u (m ) + w (m ))
The triple (uv ; wv ;
=0 8
is a solution to
h
^
max E (1
v) u
t C (u) + t+1 kt+1 (w)
(38)
; m 2 Mv ( ) ; m0 2 Mv :
2
v)
v
u;w;
subject to (38) where
v
w
i
t Wt (
)
(39)
= kt0 (v) :14 Without loss of generality we arrange messages in Mv
so that uv (m1 ) < ::: < uv (mNv ) ; which also implies that wv (m1 ) > ::: > wv (mNv ) : Let
0
( ; m ; m0 ) and
00
( ; m ; m0 ) be Lagrange multipliers on the …rst and second constraint
(38). We set ( ; m; m0 ) = 0 for all m 2
= Mv ( ) and ( ; m; m) = 0 for all m; so that
0
;
00
are
well de…ned for all ( ; m; m0 ) :
The next lemma establishes bounds on optimal allocations that are important for establishing our main results in this section.
Lemma 7 (uv ; wv ;
(29) hold, with % =
v)
satis…es (26): For all v such that kt0 (v)
1+
^
j j
1
t+1
1
;%=
j j +1
1
^
t+1
j j
:
Proof. The …rst order conditions for wv (m) are
"
#
X ^ t+1
X
0
kt+1
(wv (m))
v (mj ) ( )+
v
2
X
( ;m0 )2
Sum over m to obtain
X
( ;m)2
Mv
"
^
( ;m0 )2
0
t+1 0
kt+1 (wv
0
#
(m))
v
; m; m0 +
v
(mj )
00
; m; m0
Mv
; m0 ; m +
Mv
1, equations (27), (28) and
v
m0 j
(mj ) ( ) =
v
0
; m0 ; m
= 0: (40)
= k 0 (v) ;
14
To see this, let v be the Lagrange multiplier on the promise keeping constraint in the original, convexi…ed
Bellman equation. By Proposition 1 and the envelope theorem it satis…es v = kt0 (v) : Form a Lagrangian with
v and observe that it can be maximized for each z separately, which yields (39).
33
which is expression (26).
For what follows, it is useful to establish bounds on the Lagrange multipliers. Consider
0
a message m1 : If Nv = 1; then trivially
Nv > 1 and let
0
be the largest
strictly suboptimal for any
with
0
>
0
: Moreover,
0
>
0
;
00
and
are two scalars equal to zero. Suppose
such that m1 2 Mv ( ) : Since sending message m1 is
( ; m0 ; m1 ) =
0
uv (m1 ) + wv (m1 )
v
(m1 j )
00
( ; m0 ; m1 ) = 0 for all ( ; m0 )
uv (m) + wv (m) and uv (m1 ) < uv (m) for
all m 6= m1 ; which implies u (m1 ) + w (m1 ) > u (m) + w (m) for all m 6= m1 if
Therefore,
0
( ; m1 ; m0 ) =
v
write (40) for m1 as
(m0 j )
^
00
( ; m1 ; m0 ) = 0 for all ( ; m0 ) with
t+1 0
kt+1 (wv
(m1 ))
v
!
0
<
<
0
:
: Thus we can
= # (m1 ) ;
(41)
where
# (m1 ) =
P
m0 2Mv
0
0
; m1 ; m0 +
m0 j
v
0
00
0
0
0
; m1 ; m0
; m0 ; m1 +
P
v (m1 j ) ( )
2
Since w is decreasing in m and kt+1 is concave,
v;
^
t+1
^
0
kt+1
(wv (m1 ))
t+1
E
v
v
m1 j
0
00
0
0
kt+1
(wv ) =
which implies that
# (m1 )
Similar steps for mNv establish # (mNv )
0:
(42)
0:
The …rst order conditions for uv (m) are
X
(1
v)
tC
0
(uv (m))
2
X
( ;m0 )2
where (m)
v
(mj ) ( )+
X
( ;m0 )2
0
; m0 ; m +
Mv
v
0
; m; m0 +
v
00
(mj )
; m; m0
Mv
m0 j
00
; m0 ; m
0 is the Lagrange multipliers on the constraint u (m)
=
(m) ; (43)
U (0) : It is zero if utility
is unbounded below. Moreover, since we assumed uv (m1 ) < ::: < uv (mNv ) ; it can only be
strictly positive for m1 even in the case when utility is bounded below.
We guess and verify that if kt0 (v) =
v
1; then
(m1 ) = 0:15 Suppose v (m1 ) = 0: Then
the …rst order condition for uv (m1 ) becomes
X
(1
v)
tC
0
(uv (m1 ))
2
15
More precisely, for a …xed
su¢ cient.
v;
v
(m1 j ) ( ) = # (m1 )
X
2
v
!
(m1 j ) ( )
0
:
(44)
maximization problem (39) is convex and thus necessary conditions are also
34
; m0 ; m1
:
Combining it with (42), it implies that
tC
0
(uv (m1 ))
(1
v) E
[ jm1 ]
v
0
and veri…es that the lower bound for uv (m1 ) does not bind. Analogous arguments establish
(1
v) E
[ jmNv ]
v
tC
0
(uv (mNv )) ;
which, together with the monotonicity assumption on uv (m) ; gives (28).
For the rest of the proof consider v that satis…es kt0 (v)
1: Summing (43) over m when
(m) = 0 implies (27). Finally, combining (41) with (44) we obtain
^
t+1 0
kt+1 (wv
(m1 )) =
v
+
v
+
1
1
1
tC
0 (u
v
(m1 ))
v
tE
v
0
0
where we used
v
0
v
(
E
v
[ jm1 ]
E
v
[ jm1 ]
1) +
1
1
0
1
0
+
+
1
1
0
tC
0
(uv (m1 ))
1
0 v
v;
[C 0 (uv )] = 1
v
to get the second inequality. Re-
arrange it to get
1
0
kt+1
(wv
0
(m1 ))
^
^
1
0
t+1
+1
1
j j
(1
+1
v)
(1
v)
1
t+1
+
1
+
^
1
t+1
^
!
t+1
!
:
This, together with monotonicity of wv (m) ; establishes the upper bound in (29). Analogous
manipulation of the …rst order condition for mNv establishes the lower bound in (29).
Finally, note that
%
and
%
1
j j
^
t+1
+1
! 0 as
j j
^
=
t+1
^
! 0 as
1
1
1
j j
1
j j
1
t+1
j j
+1
1
1
+1
1
1
! 0 since we assume that E [ ] = 1. Therefore,
! 0. Analogous arguments prove that %
^
t+1
! 0 as
j j
1
! 0.
We use this lemma to establish bounds that we use to characterize information revelation
for low v:
35
Lemma 8 (a) If utility is unbounded below and constraint (10) binds in period t+1; then there
are scalars Au;t > 0; Aw;t > 0 and vt such that for all v
vt any solution to (39) satis…es
0
uv (m)
uv m0
Au;t for all m; m0 ;
0
wv (m)
wv m0
Aw;t for all m; m0 :
(b) If utility is bounded below, without loss of generality by zero, then limv!v uv (m) = 0
and limv!v wv (m) = 0 for all m:
Proof. (a) When (10) binds in t + 1; ^ t+1 >
is unbounded below,
limv! 1 kt0 (v)
vt such that
1
2
1
^
t+1
!
1
^
> 0: When utility
t+1
= 1 and therefore expression (29) implies that there exists
0
kt+1
(wv
1
and therefore
3
2
(m))
1
^
t+1
!
for all m; v
vt :
This establishes bounds for wv (m) : The incentive constraint
1 uv
(m1 ) + wv (m1 )
1 uv
(mNv ) + wv (mNv )
together with monotonicity wv (m1 ) > ::: > wv (mNv ) ; uv (m1 ) < ::: < uv (mNv ) imply that
(wv (m1 )
w (mNv ))
1
uv (mNv )
uv (m1 )
0
establishing bounds for uv :
(b) When utility is bounded, Proposition 1 shows that limv!v kt0 (v) = 1: For any
the largest v that satisfy kt0 (v )
close to v = 0: Let v~ = E
v
: By choosing arbitrarily high
we can set v arbitrarily
[ uv + wv ] : Due to the possibility of randomization, in general
v ) : Therefore v~
v~ 6= v but kt0 (v) = kt0 (~
v
…nd
v~ = E
E
v
v
if v
v : Then
[ uv + wv ]
(45)
[ 1 uv + wv ]
X
( 1)
(mj 1 ) [ 1 uv (m) + wv (m)]
v
m2Mv (
1)
( 1 ) [ 1 uv (m1 ) + wv (m1 )]
( 1 ) wv (m1 )
0:
Here the second, third and …fth lines follows from nonnegativity of u and w; and the fourth
line follows from the fact that if
1
(mj 1 ) > 0; then (uv (m) ; wv (m)) gives the same utility to
as (uv (m1 ) ; wv (m1 )) : Since v
limv!v wv (m1 ) = 0: Since wv (m1 )
can be chosen to be arbitrarily close to 0, this implies that
wv (m) ; this implies that limv!v wv (m) = 0 for all m:
Analogous arguments show that limv!v uv (m) = 0:
36
7.3.1
Proofs for low v
We now can prove the …rst limiting result about optimal information revelation.
Lemma 9 Suppose that sustainability constraint (10) binds in periods t and t + 1. Then
v
converges to an uninformed strategy as v ! v:
Proof. Let
be any uninformative strategy. Let uv (m) = E
uv ; wv (m) = E v wv for
v
all m: Note that since uv (m) is increasing in m
uv (m1 ) = uv (m1 ) E
uv (m)
v
uv mj
j
E
v
= uv mj
j
;
and an analogues relationship holds for wv :
Pro…le (uv ; wv ; ) is incentive compatible and satis…es
E
v
[ uv + wv ] = E [ uv + wv ] :
The value of the objective function (39) evaluated as (uv ; wv ;
v)
(46)
should be higher than eval-
uated at (uv ; wv ; ) ;
E
v
h
uv
uv
tC
tC
(uv ) + ^ t+1 kt+1 (wv )
(uv ) + ^ t+1 kt+1 (wv )
t Wt ( v )
t Wt (
):
i
(47)
First, suppose that utility is bounded below, without loss of generality by zero. From
Lemma 8, uv (m) ! 0 and wv (m) ! 0 for any m as v ! 0; and therefore uv and wv also
converge to zero. Hence in the limit equation (47) becomes
lim sup
v!v
Since Wt (
v)
t (Wt (
Wt ( ) by Lemma 2 and
exists and satis…es limv!v Wt (
v)
t
)
Wt (
v ))
0:
(48)
> 0 when (10) binds in periods t, limv!v Wt (
= Wt ( ) : Wt ( ) is continuous in
v)
and achieves its mini-
mum only at uninformative reporting strategies by Lemma 2, therefore
v
must converge to
some uninformative strategy.
Now suppose that utility is unbounded below. By the mean value theorem
t (C
^
(uv (m))
t+1 (kt+1 (wv )
C (uv )) =
tC
0
(~
uv (m)) (uv (m)
uv ) ;
0
kt+1 (wv )) = ^ t+1 kt+1
(w
~v (m)) (wv (m)
wv ) ;
for some u
~v (m) that takes values between uv (m) and uv and for some w
~v (m) that takes
values between wv (m) and wv : By construction, uv (m1 )
37
uv
uv (mNv ) and wv (m1 )
wv
wv (mNv ), therefore, uv (m1 )
From (28) and (29) limv!
1C
w
~v (m)
0 (~
uv
uv (mNv ) and wv (m1 )
(m)) = 0 and limv!
w
~v (m) wv (mNv ).
0
~v (m)) = = ^ t+1 for all m:
1 kt+1 (w
We have
lim E
v
lim E
v
v! 1
=
v! 1
= 0;
h
(uv
h
tC
uv )
0
t (C
0
uv ) + ^ t+1 kt+1
(w
~v )
(~
uv ) (uv
i
kt+1 (wv ))
i
wv )
C (uv )) + ^ t+1 (kt+1 (wv )
(uv )
(wv
where the second line uses the mean value theorem and (46), and the last line uses the fact
that (uv (m)
uv ) and (wv (m)
wv ) are bounded for low v by Lemma 8. This implies that
(48) holds when utility is unbounded and that
v
converges to an uninformative strategy.
We now can prove Theorem 1.
Proof of Theorem 1. Suppose Nv > 1 for some realization of z and consider (uv ; wv ;
that solve (39) for such z: Let
allocation when priors
Wt (
=
v)
max
+
[E
m m2
: Let uw be the optimal
w
t C
[( u (m)
( uw
(u (m)))
w
t C
(uw ))]
v
(mj ) ( )
m; 2Mv
8
<
=
max
[E
fu(m)gm2Mv :
X
0
v
be the largest such that m1 2 Mv
are uninformative: Then
Wt ( )
X
fu(m)gm2Mv
0
v
v
v)
v
w
t C
[ jm1 ] u (m1 )
[ jm] u (m)
w
t C
(u (m1 ))
(u (m))
(E
v
(E
v
[ jm1 ] uw
[ jm] uw
w
t C
w
t C
0
(uw ))] @
0
(uw ))] @
X
0
v
X
0
v
v
(m1 j ) ( )A
19
=
A
(mj
)
(
)
v
;
All terms in square brackets are non-negative since the choice u (m) = uw is feasible. They
are strictly positive if E
v
[ jm] 6= 1; since uw is the optimal allocation for E [ jm] = 1: From
Lemma 9 the left hand side of this expression goes to zero as v ! v; therefore the right hand side
should also go to zero. This is possible either if (a) E v [ jm1 ] ! 1 (and hence 0v ! j j ) and
P
P
0
0
v (mj ) ( ) ! 0 for all m > m1 ; or (b)
v (m1 j ) ( ) ! 0; E v [ jm2 ] !
v
v
P
0
1 and
0
v (mj ) ( ) ! 0 for all m > m2 (and hence v ! 1 and m2 2 Mv ( 1 )). The
v
P
other possibilities are ruled out since if E v [ jm] ! 1 and
0
v (mj ) ( ) 9 0 for some
v
P
0
0
m > m2 ; then for some m0 m2 we would have
0
v (m j ) ( ) 9 0 and E v [ jm ] 9
v
1.16 Since it is impossible to have
16
Note that
all m > m2 .
1
j j
and
1
to be indi¤erent between more than two distinct
can be indi¤ererent between at most two distict allocations and therefore
38
v
1
(mj 1 ) = 0 for
allocations in the optimum, for any " > 0 there must be some vt
such that for all v
solution has Nv = 2 and either (a) m1 2 Mv
", E
E
v
E
v
j j
,
v
[ jm1 ] arbitrarily close to 1, or (b) m2 2 Mv ( 1 ) ;
m2 j
v
j j
(m1 j 1 )
v
"; E
[ jm2 ] =
v
0
uw
v (m1 ) ! C
1 (1= w ) ;
t
0
and in case (b) uw
v (m1 ) = C
1(
w
1= t )
j j
[ jm1 ] =
0
[ jm2 ] arbitrarily close to 1. In case (a) (37) implies that uw
v (m2 ) = C
1
and uw
v (m2 ) !
vt the
1
> 1 and
< 1 and
w
and
j j= t
0
1
C (1= w
t ):
We can now rule cases (a) and (b) for v low enough. Consider case (b), case (a) is ruled
out analogously. In this case
v
(30) is
1 (uv
(m2 )
(m1 j 1 ) < 1 for v low enough and the optimality condition
uv (m1 ))
+ ^ t+1 [kt+1 (wv (m2 ))
= [( 1 uw
v (m2 )
Function
1u
w
t C
w
t C
t (C
(uv (m2 ))
C (uv (m1 )))
(49)
kt+1 (wv (m1 ))]
(uw
v (m2 )))
( 1 uw
v (m1 )
w
t C
(uw
v (m1 )))] :
(u) is strictly concave and achieves its maximum u
^ at u
^ = C0
1(
w
1= t )
=
w
w
uw
v (m1 ) : Since uv (m2 ) is bounded away from uv (m1 ) ; the right hand side of (49) is strictly
negative and bounded away from 0.
When utility is bounded below, Lemma 8 established that all terms on the left hand side of
(49) go to zero as v ! v; yielding a contradiction. When utility is unbounded below, substitute
the indi¤erence condition
1 (uv
(m2 )
uv (m1 )) =
(wv (m1 )
wv (m2 )) into (49) and apply
the mean value theorem
t (C
(uv (m2 ))
C (uv (m1 ))) =
tC
0
(~
u) (uv (m2 )
uv (m1 ))
and
^
=
t+1 (kt+1 (wv
^
0
~
t+1 kt+1 (w)
(m2 ))
kt+1 (wv (m1 )))
(wv (m2 )
(wv (m2 )
wv (m1 ))
wv (m1 ))
for some u
~ 2 (uv (m1 ) ; uv (m2 )) and w
~ 2 (wv (m2 ) ; wv (m1 )) : The terms (uv (m2 )
uv (m1 ))
C 0 (~
u)
and (wv (m2 ) wv (m1 )) are bounded for small v by Lemma 8 and limv! 1 t
= 0;
0
(w)
~
= 0 by Lemma 7. Therefore, the left hand side of (49) converges
limv! 1 ^ t+1 kt+1
to zero for utilities unbounded below, yielding a contradiction. This proves that Nv = 1
and
v
is uninformative for all su¢ ciently low v independently of the realization of z: For
uninformative
v;
there is a unique (uv ; wv ) that solves (39) by strict convexity of u
39
tC
(u) :
Proofs for high v
7.3.2
We prove Corollary 2, since Theorem 2 is a special case of it.
Corollary 2. Suppose v is su¢ ciently high so that
case that
1
and
v
= kt0 (v) < 1: We …rst rule out the
send the same message with probability 1 for high v: From (41) and (44)
2
we have that there is #v
0 such that
^
t+1 0
kt+1 (wv
(m1 )) =
#v ;
v
and
tC
where ~ = (
1
and
2
1 1
+
0
(uv (m1 )) = (1
2 2) = ( 1
+
2)
v) E
>
1:
v
[ jm1 ] + #v
(1
v)
~ + #v ;
The last inequality follows from the fact that types
play message m1 with probability 1:
De…ne function f as
f (x)
1 (uv
(m1 )
x)
tC
x) + ^ t+1 kt+1 wv (m1 ) +
(uv (m1 )
This function is concave with
0
f (0) =
tC
1
0
^
(uv (m1 )) +
Let x
^v be a solution to f 0 (^
xv ) = (1
1
v)
t+1 0
kt+1 (wv
~
!
(m1 ))
> (1
v)
1
x :
~
=2 and let (^
uv ; w
^v ) = uv (m1 )
1
1
:
x
^v ; wv (m1 ) +
Since f is concave, x
^v > 0 and u
^v < uv (m1 ) ; w
^v > wv (m1 ) :
Claim 1. Allocation (^
uv ; w
^v ) satis…es bounds (28) and (29).
Let xv be a solution to f 0 (xv ) = 0: By concavity, 0 < x
^v < xv ; so we establish the claim
by proving the stronger statement that uv (m1 )
and (29). By de…nition,
"
1
1
^
t+1 0
kt+1
wv (m1 ) +
xv and wv (m1 ) +
1
#
xv
=
tC
0
1
(uv (m1 )
xv satisfy bounds (28)
xv )
and by xv > 0
tC
^
t+1 0
kt+1
0
(uv (m1 )
wv (m1 ) +
xv ) <
1
tC
^
xv
0
(uv (m1 )) ;
t+1 0
kt+1 (wv
(m1 )) :
These conditions imply that
1 (1
1 (1
v)
v)
tC
1
0
"
(uv (m1 )
^
1
xv ) <
t+1 0
kt+1
j j (1
wv (m1 ) +
40
v) ;
1
xv
#
< (1
v ) j j;
1
x
^v :
establishing the bounds (28) and (29).
Claim 2. (1
^v
v) x
! 1 as v ! v:
In Supplementary material we showed (Lemma 13) that Assumption 1 implies that there
^v such that
are numbers Bv and B
C 0 (uv (m1 ))
0
kt+1
(wv (m1 ))
Bv
2
C 0 (uv (m1 )) x
^v ;
[C 0 (uv (m1 ))]2
^v
B
2
0
kt+1
(w
^v ) x
^v ;
2 1
0
^v )
1 kt+1 (w
C 0 (^
uv )
0
kt+1
(w
^v )
^v = 1
) v; wv (m1 ) ! v then Bv = [C 0 (uv (m1 ))]2 ! 0 and B
and if u
^v ! (1
The bounds from Claim 1 establish that u
^v ! (1
^
t+1
^
0
E v kt+1
(wv )
t+1
(50)
0
kt+1
(w
^v )
2
! 0:
kt0 (v)
) v as v ! v: Since by (27)
=
0
kt+1
(wv (m1 )) ; this implies that wv (m1 ) ! v as v ! v: Therefore by
Lemma 13 the …rst terms on the right hand side of these expression go to zero as v ! v:17
We have
~
1
1
2
1
=
v
1
1
(
f 0 (0)
"
t
v
f 0 (^
xv )
0
C (uv (m1 ))
tC
C 0 (uv (m1 ))
Bv
1
[C 0 (uv (m1 ))]2
v
From Claim 1, both C 0 (uv (m1 )) = (1
v)
0
^
(^
uv ) +
2
+
1
t+1
0
kt+1
(wv
^v
B
1
and 1
1
0
kt+1
(w
^v )
2
0
kt+1
(w
^v ) = (1
0
kt+1
(w
^v )
1
v
v)
^v
v) x
the expression in curly brackets goes to 0 as v ! v: Therefore (1
Claim 3. f (^
xv )
(m1 ))
f (0) ! 1 as v ! v:
0
kt+1
(w
^v )
2
)
(1
#
^v :
v) x
are …nite, therefore
! 1:
Applying the mean value theorem,
f (^
xv )
f (0) =
f 0 (~
xv )
(1
1
v
^v
v) x
for some x
~v 2 (0; x
^v ) : Since f is concave; f 0 (0) > f 0 (~
xv ) > f 0 (^
xv ) : Therefore
h
i
1 ~
~
: The result follows from Claim 2.
1 ;
1
2
We are now ready to show that it is not optimal for types
1
and
2
f (~
xv )
1 v
2
to send the same message
with probability 1 for high enough v: Suppose it is. Consider an alternative strategy ^ v , where
^ v (mj
^ 1 ) = 1 for some message m
^ that gives allocation (^
uv ; w
^v ) ; and ^ v (mj ) =
17
v
(mj ) for
When kt is twice di¤erentiable, this result can be established without using Lemma 13. In this case kt00 (v)
2
2
00
00
0
00
kt0 (v)] =
)v C (u) = [C (u)] = 0 and limv!v kt (v) = [1
t C (uv ) ; and condition (31) implies that limu!(1
0: Claim 2 can then be established by appling the mean value theorem to the left hand side of (50).
41
all
6=
1 ; m:
Since u
^ < uv (m1 ) ; w
^ > wv (m1 ) and
1 uv
(m1 ) + wv (m1 ) =
^v
1u
+ w
^v ; this
allocation is incentive compatible and delivers utility v to the agent. Then
n
h
E^v u
=
^
t C (u) + kt+1 (w)
( 1 ) ff (^
xv )
f (0)g +
i
o
W
(^
)
t
v
t
t fWt ( v )
n
E
Wt (^ v )g :
v
h
i
^ kt+1 (w)
C
(u)
+
t
u
t Wt (
The second term is …nite since Wt is bounded by Lemma 2, therefore this expression is positive
for high v from Claim 3. This contradicts the optimality of (uv ; wv ;
Using these arguments we can also rule out type
1
v) :
sending the same message as
2
with
any positive probability. Then the optimality condition (30) implies that
n
1 uv
(m1 )
o n
^
1 uv (m2 )
t C (uv (m1 )) + kt+1 (wv (m1 ))
o
^
t C (uv (m2 )) + kt+1 (wv (m2 ))
is bounded because the expression on the right hand side of (30) is bounded for all : Therefore
the value of this strategy can exceed the value of strategy when
1
and
2
send message m2
with probability 1 by only a …nite amount. But then the arguments of the previous paragraph
lead to a contradiction.
Part 2 of Corollary 2 is proven using analogous arguments. Here we consider function
F (x)
When
j j
uv mjMv j + x
j j 1
j j
that F 0 (0) = const (1
establish that F (^
xv )
allocation for type
type
j j:
j j 1
v)
tC
>
and %
uv mjMv j + x + ^ t+1 kt+1 wv mjMv j
j j 1
+
j j
j j 1
j j 2
j j 1
x :
holds, we can show
0 ensures the boundary conditions. Previous arguments
F (0) ! 1: Note that the perturbation we consider leaves the same
j j 1,
and gives an allocation uv mjMv j + x
^v ; wv mjMv j
j j 1
x
^v to
This is incentive compatible but gives a higher value than v: The contradiction then
follows from the fact that kt (v) is a decreasing function for high enough v:
Proof of Lemma 3. Part (i). If v0 = 0 then uv0 ;0 (m; z) = wv0 ;0 (m; z) = 0 for all (m; z).
Thus, if v0 = 0, then also vt = 0 for all t > 0. The optimal
t and, by Lemma 2,
t
thus minimizes Wt ( ) for all
is uninformative for all t. Suppose that the sustainability constraint
(10) binds in periods t = 0; :::; T + 1. By Theorem 1, for all t = 1; :::; T there exists vt > 0
such that if vt
vt
vt ;t (
jz; ) is uninformative and wvt ;t (m; z) is independent of z. By
Lemma 8, if v0 ! 0 then v1 = wv0 ;0 (m; z) ! 0 for all (m; z). In turn, the latter implies that
v2 = wv1 ;1 (m; z) ! 0. Proceeding recursively, we can therefore …nd v0 such that vt < vt for
t = 1; :::; T .
Part (ii). Suppose the assumptions of Theorem 1 are satis…ed (the other case is analogous.)
42
o
v)
Then there exists v0+ such that
v0 ;0
reveals full information about each type for all v0
v0+ .
Also, the FOCs imply
^
and, moreover, k00 (v) !
t+1
E
v0 ;0
k10 (wv0 ;0 ) jz = k00 (v)
1 as v ! v. The latter implies that there cannot be a constant
K < v such that wv0 ;0 (m; z)
K with probability 1, otherwise, the FOCs would be violated
for a high enough v0 . Thus, we can always …nd a high enough v0 such that wv0 ;0 (m; z) > v1+
with positive probability. Following analogous steps as in part (i), we can guarantee that
vt = wvt
1 ;t
1 (m; z)
> vt+ with positive probability for all t = 1; :::; T .
43
References
Acemoglu, Daron, “Why not a political Coase theorem? Social con‡ict, commitment, and
politics,” Journal of Comparative Economics, December 2003, 31 (4), 620–652.
, Mikhail Golosov, and Aleh Tsyvinski, “Political economy of mechanisms,” Econometrica, 2008, 76 (3), 619.
,
, and
, “Dynamic Mirrlees Taxation under Political Economy Constraints,” Review
of Economic Studies, 2010, 77 (3), 841–881.
Aiyagari, S. Rao and Fernando Alvarez, “E¢ cient Dynamic Monitoring of Unemployment
Insurance Claims,” Mimeo, University of Chicago, 1995.
Akerlof, George A., “The Economics of "Tagging" as Applied to the Optimal Income Tax,
Welfare Programs, and Manpower Planning,” The American Economic Review, 1978, 68
(1), pp. 8–19.
Albanesi, Stefania and Christopher Sleet, “Dynamic optimal taxation with private information,” Review of Economic Studies, 2006, 73 (1), 1–30.
Atkeson, Andrew and Robert E. Lucas, “On E¢ cient Distribution with Private Information,” Review of Economic Studies, 1992, 59 (3), 427–453.
and
, “E¢ ciency and Equality in a Simple Model of E¢ cient Unemployment Insurance,”
Journal of Economic Theory, June 1995, 66 (1), 64–88.
Benveniste, L M and J A Scheinkman, “On the Di¤erentiability of the Value Function
in Dynamic Models of Economics,” Econometrica, May 1979, 47 (3), 727–32.
Besley, Timothy and Stephen Coate, “Sources of Ine¢ ciency in a Representative Democracy: A Dynamic Analysis,” American Economic Review, March 1998, 88 (1), 139–56.
Bester, Helmut and Roland Strausz, “Imperfect Commitment and the Revelation Principle: the Multi-agent Case,” Economics Letters, November 2000, 69 (2), 165–171.
and
, “Contracting with Imperfect Commitment and the Revelation Principle: The Single
Agent Case,” Econometrica, July 2001, 69 (4), 1077–98.
and
, “Contracting with imperfect commitment and noisy communication,” Journal of
Economic Theory, September 2007, 136 (1), 236–259.
44
Bisin, A. and A.A. Rampini, “Markets as bene…cial constraints on the government,”Journal of Public Economics, 2006, 90 (4-5), 601–629.
Chari, V V and Patrick J Kehoe, “Sustainable Plans,” Journal of Political Economy,
August 1990, 98 (4), 783–802.
and
, “Sustainable Plans and Debt,” Journal of Economic Theory, December 1993, 61
(2), 230–261.
Clementi, Gina Luca and Hugo A Hopenhayn, “A Theory of Financing Constraints and
Firm Dynamics,” The Quarterly Journal of Economics, 02 2006, 121 (1), 229–265.
Dovis, Alessandro, “E¢ cient Sovereign Default,” Mimeo, Penn State, 2009.
Farhi, Emmanuel and Ivan Werning, “Inequality and Social Discounting,” Journal of
Political Economy, 2007, 115 (3), 365–402.
and
, “Insurance and Taxation over the Life Cycle,” Review of Economic Studies, 2013,
80 (2), 596–635.
, Christopher Sleet, Ivan Werning, and Sevin Yeltekin, “Non-linear Capital Taxation
Without Commitment,” Review of Economic Studies, 2012, 79 (4), 1469–1493.
Fernandes, Ana and Christopher Phelan, “A Recursive Formulation for Repeated Agency
with History Dependence,” Journal of Economic Theory, 2000, 91 (2), 223–247.
Freixas, Xavier, Roger Guesnerie, and Jean Tirole, “Planning under Incomplete Information and the Ratchet E¤ect,” Review of Economic Studies, April 1985, 52 (2), 173–91.
Golosov, Mikhail, Aleh Tsyvinski, and Iván Werning, “New dynamic public …nance:
A user’s guide,” NBER Macroeconomics Annual, 2006, 21, 317–363.
and
, “Designing optimal disability insurance: A case for asset testing,” Journal of
Political Economy, 2006, 114 (2), 257–279.
, Maxim Troshkin, and Aleh Tsyvinski, “Optimal Dynamic Taxes,” NBER working
paper 17642, 2011.
Green, E. J., “Lending and the Smoothing of Uninsurable Income,” in E. C. Prescott and
N. Wallace, eds., Contractual Arrangements for Intertemporal Trade, Minneapolis: University of Minnesota Press., 1987.
45
Hopenhayn, Hugo A and Juan Pablo Nicolini, “Optimal Unemployment Insurance,”
Journal of Political Economy, April 1997, 105 (2), 412–38.
Hosseini, Roozbeh, Larry E. Jones, and Ali Shourideh, “Optimal Contracting with
Dynastic Altruism: Family Size and per Capita Consumption,”Journal of Economic Theory,
2013, 148 (5), 1806–1840.
Kocherlakota, Narayana, The New Dynamic Public Finance, Princeton University Press,
USA, 2010.
Kydland, Finn E and Edward C Prescott, “Rules Rather Than Discretion: The Inconsistency of Optimal Plans,” Journal of Political Economy, University of Chicago Press, June
1977, 85 (3), 473–91.
La¤ont, Jean-Jacques and Jean Tirole, “The Dynamics of Incentive Contracts,” Econometrica, September 1988, 56 (5), 1153–75.
Ljunqvist, Lars and Thomas Sargent, Recursive Macroeconomic Theory, MIT Press, 2004.
Luenberger, David, Optimization by Vector Space Methods, Wiley-Interscience, 1969.
Marcet, Albert and Ramon Marimon, “Recursive Contracts,”Mimeo, European University Institute, 2009.
Milgrom, Paul and Ilya Segal, “Envelope Theorems for Arbitrary Choice Sets,” Econometrica, March 2002, 70 (2), 583–601.
Mirrlees, James, “An Exploration in the Theory of Optimum Income Taxation,” Review of
Economic Studies, 1971, 38 (2), 175–208.
Myerson, Roger B., “Optimal Coordination Mechanisms in Generalized Principal-Agent
Problems,” Journal of Mathematical Economics, June 1982, 10 (1), 67–81.
Phelan, Christopher, “Opportunity and Social Mobility,”Review of Economic Studies, 2006,
pp. 487–505.
and Robert M Townsend, “Computing Multi-period, Information-Constrained Optima,”
Review of Economic Studies, Wiley Blackwell, October 1991, 58 (5), 853–81.
Roberts, Kevin, “The Theoretical Limits of Redistribution,” Review of Economic Studies,
April 1984, 51 (2), 177–95.
46
Rockafellar, R.T., Convex Analysis Princeton mathematical series, Princeton University
Press, 1972.
Royden, H.L., Real Analysis Mathematics and statistics, Macmillan, 1988.
Rudin, Walter, Principles of Mathematical Analysis, third ed., New York: McGraw-Hill
Book Co., 1976.
Skreta, Vasiliki, “Sequentially Optimal Mechanisms,”Review of Economic Studies, 2006, 73
(4), 1085–1111.
Sleet, Christopher and Sevin Yeltekin, “Credibility and endogenous societal discounting,”
Review of Economic Dynamics, July 2006, 9 (3), 410–437.
and
, “Politically credible social insurance,” Journal of Monetary Economics, 2008, 55
(1), 129–151.
Stantcheva, Stefanie, “Optimal Taxation and Human Capital Policies over the Life Cycle,”
working paper, 2014.
Stokey, Nancy L., Robert E. Lucas, and Edward C. Prescott, Recursive Methods in
Economic Dynamics, Cambridge, MA: Harvard University Press, 1989.
Thomas, J. and T. Worrall, “Income Fluctuation and Asymmetric Information: An Example of a Repeated Principal-agent Problem,” Journal of Economic Theory, 1990, 51 (2),
367–390.
Yared, Pierre, “A dynamic theory of war and peace,”Journal of Economic Theory, September 2010, 145 (5), 1921–1950.
47
8
Supplementary material
8.1
Proofs for Section 3
Lemma 10 (a) Any PBE ( ;
is payo¤ -equivalent to a PBE ( 0 ;
G ; p)
0 ; p0 )
G
0
where
sat-
is…es
St
0
t
1
t
; Mt ; ht ; ~
(b) Suppose ( ;
^ t; h
~t 2 Ht
ries h
" 1
X
s
E( ; G )
G ; p)
t 1
1
;
St
0
t
=
t
1
t
; Mt ; ht ; ^
s us
S
t 1
^t
; Mt ; h
#
= E(
;
G)
"
1
X
0 ; p0 ) payo¤ equivalent
G
t+s
S
S t 1 ; Mt ; Mt+s
for all (zt+1 ; mt+1 ; :::; zt+s ) ; all
u0t+s S t+s
1
1
^ t ; zt+1 ; mt+1 ; :::; zt+s
; Mt+s ; h
t
: St !
t
t 1
0
t
S
Ht
B; d
t 1
t 1
St
t
; Mt ; B; ^
1 ; M ; B;
t
R
~
t 1
;^
;
t 1
~
B; d
for some ^
St
R
t
A ; ^
1
t 1
B
t 1
;
St
t
R
;
t
0
;~
1 ; M ; ht ;
t
; Mt ; h
#
:
(51)
with a property that
~ t ; zt+1 ; mt+1 ; :::; zt+s ;
; Mt+s ; h
~ t ; zt+1 ; mt+1 ; :::; zt+s ; mt+s :
; Mt+s ; h
analogously to the de…nition
t;
0
t
t
ht ; ^
1
;
t
t 1
;
t 1
ht ; d
t
St
0
t
= 0; set
t
t 1
B; d
t
;
;
jS t
t
1; M
t
t 1; M
t jS
t
^t
1 ; M ; B;
t
1
;
t
=
:
t 1
~
t 1
;
=
t
t 1
A ;
;
t
t
ht ; ~
St
0
t
1 ; M ; ht ;
t
> 0 only if
1
;
t
^t
1
;
t
t 1
A ; ^
for all
;
>0
t
can replicate the strategy of
t
and achieve the same payo¤ as that agent, and
t
is the optimal choice of agent ht ; ^
t
S
~t
by
1 ; M ; ht ;
t
t 1; M
t jS
t
t 1 t 1
: Since any agent with a history
the agent with a history
s us
t 1
1
1
; t:
and personal histo-
G ; p)
jS t+s
Ht
M !
for all ^
t
0
t
1
to ( ;
= u0t+s S t+s
> 0 de…ne strategy
: For any Borel set A of
t 1
t
=
t
;
: St
t 1
;^
in the text. Let B be a Borel set of H t : For all B such that
1; M
t
t
t 1
By construction,
t 1
jS t
t 1
For B such that
0
t
;
t
t
1
1; M
t
s t 1
0
t+s
=
^ t ; zt+1 ; mt+1 ; :::; zt+s ; mt+s
; Mt+s ; h
Proof. (part a). De…ne
of
R
t
for all ~
t
s=t+1
Then there exists a PBE ( 0 ;
jS t+s
;
is a PBE and suppose that for some S t
s=t+1
0
t+s
1
1
;
; the new strategy
t
0
satis-
…es agents’best response constraint (4).
Strategies
0
induce distribution
government strategy
G
0
which satis…es
0
t
=
satis…es feasibility (2) if agents play
i
t
for all S t
0:
1; M
t
; hence the
Any posterior belief p0 that
t
all ^
1
:
satis…es (3) also satis…es
payo¤ is
E(
0;
t ut jS
G)
t
R
=
t 1
Z
Ht
=
Z
Ht
and therefore ( 0 ;
0 ; p0 )
G
p0t
Z
Z
t 1
;
j d
t 1
=
R
p0t
jS t ; ht
d
ut ht
pt
jS t ; ht
d
ut ht d
t
j d
G ; p) :
is a PBE that is payo¤ equivalent to ( ;
0
G
by
00
00
(z) = z= and
: ( ; 1] ! [0; 1] by
o
n
^ t; h
~ t ; t+s as
for all s 1, ht 2 h
0
t+s
if zt+1
jht ; zt+1 ; mt+1 ; :::; zt+s ;
t+s
(z) = (z
=
t+s
t ut jS
G)
0
G
t
;
gives a
0
G
when agents play
: Therefore
G ; p) :
0
and assume that
0
: [0; ] ! [0; 1]
) : De…ne strategies ( 0 ;
) = (1
~ t;
= ut+s h
u0t+s ht ; zt+1 ; mt+1 ; :::; mt+s
;
because otherwise
(part b). For simplicity we drop explicit dependence on S t ; Mt+1
~t ;
^ t > 0: Let
~t =
~t +
^t
= t h
and de…ne
h
t h
t h
t h
0
: Government’s
No strategy
when agents play
G
t 1
dht jS t = E(
t
would give a higher payo¤ to the government that strategy
0 ; p0 )
G
;
dht jS t
0
t
achieves the same payo¤ as ( ;
higher payo¤ to the government that strategy
( 0;
t 1
pt
t 1
0 )
G
(zt+1 ) ; mt+1 ; :::; mt+s ;
~ t;
jh
0
(zt+1 ) ; mt+1 ; :::; zt+s ;
t+s
and
^ t;
= ut+s h
u0t+s ht ; zt+1 ; mt+1 ; :::; mt+s
0
t+s
if zt+1 >
jht ; zt+1 ; mt+1 ; :::; zt+s ;
and u0s = us ;
t+s
=
t+s
00
^ t;
jh
(zt+1 ) ; mt+1 ; :::; mt+s ;
00
(zt+1 ) ; mt+1 ; :::; zt+s ;
t+s
0
s
= us for all other histories and periods s:
~ t; h
^ t could have replicated each other strategies after period t in
Agents with histories h
so they must have been indi¤erent between them. Pro…le 0 gives them the
n
o
^ t; h
~ t leaving all other histories unchanged, therefore
same utility for all histories following h
PBE ( ;
G ; p),
it is incentive compatible, i.e. satis…es (4). Strategy pro…le
probability for any realization of ut as
any p0 consistent with Bayes’rule, E
Therefore ( 0 ;
8.2
0 ; p0 )
G
0
It assigns the same
; therefore feasibility constraint (2) is satis…ed. For
t jh
t
=E
0
t jh
t
for all ht 2 H t hence (5) is satis…ed.
is a PBE which is payo¤ equivalent to ( ;
G ; p) :
Arguments for maximization problem (17) and recursive formulation
We …rst discuss convexity assumptions in problem (17). We have
ut :
0:
induces
Ht
! [(1
) v; (1
) v] : Let
t
t
: Ht
!
be a space of all such ( t ; ut ), and let
ii
(Mt ) ;
t
be a
probability measure on t : For any t and random variable x : t
! R we can deR
…ne E t x =
x (ut (m) ; t ; ) t (dmj ) d d and for an arbitrary 0t let E t 0t x =
t Mt
R
x (ut (m) ; t ; ) 0t (dmj ) d d : As before let to denote the in…nite sequence f t g1
t=0
t Mt
and extend the de…nition of expectation E
1
to V
M1
1:
With this notation,
the modi…ed problem (9) can be written as
1
X
max E
t
u
t=0
subject to
E C (u)
E
1
X
s t
u
E Wt +
s=t
E
1
X
t
u
E
(52)
U (e) for all t;
1
1
X
0
t=0
and
e
t
(53)
0
u for all
(54)
t=0
E
"
1
X
t
u v
t=0
#
v:
(55)
Note that we wrote the promise keeping constraint (55) as inequality. We do this more general
version to prove some technical results on properties of the Lagrange multipliers. We still
maintain the assumption that distribution
is such that in the optimum it holds with equality.
The objective function and constraints are linear in
and
t
t
t
and therefore convex. Let
t
t
t
be the Lagrange multipliers on (52) and (53). Then the constrained maximization
problem can be written as
max E
1
X
t
t=0
"
1+
t
X
s=0
s
!
subject to (54), (55). Rede…ning variables
Pt
Pt
t= 1 +
s=0 s and t = t = 1 +
s=0
u
t
t C (u)
=
t
#
1+
E
1
X
t
t Wt
(56)
t=0
Pt
s=0
s
; ^t =
t= t 1;
t
=
0 we obtain (17) in a more general form.
> 0 implies ^ t > and t > 0: If lim supt!1 t >
s
From the de…nitions of these variables, t
P
0 then ts=0 s ! 1 (Theorem 3.23 in Rudin (1976)) and t = t ! 1. The arguments of
P
P1 t
P1 t
Sleet and Yeltekin (2008) establish that 1
t and
t are all …nite, and
t=0 t ;
t=0
t=0
P1
P1
therefore t=0 t t and t=0 t t are also …nite.
The Lagrange multiplier
t
> 0 in any …nite t: If it is not the case, then it is possible to give
lifetime utility v to all families, which violates feasibility. The technical arguments simplify if,
in addition, lim inf
t
> 0: Su¢ cient conditions for this result are given in the following lemma
iii
Lemma 11 Let
be the best PBE. Suppose either that
ution or that U is unbounded above and
lim inf u!1 CC(u)
0 (u)
t
converges to an invariant distrib-
> 0: Then lim inf
> 0:
t
Proof. We …rst observe that it is incentive compatible to increase utility allocation for all
histories by
> 0 and that this increase satis…es (55). First, suppose that U is unbounded
above. For
> 0 de…ne
and perturbation (1
)
1+
t
+
t
(56) evaluated at t ; i.e.
"Z "
From the de…nition of
by
t
t
X
s=0
( t ; ut + ) =
t
s
t
( t ; ut ) for all ( t ; ut ) : Since
t
is optimal
is feasible, this perturbation cannot increase the value of
!
u
t C (u)
#
#
h
t
t
C (u)] d
t
0:
(dmj ) d
d
i
0
t;
1+
t
X
s=0
s
!
t
Z
[C (u + )
Since it should be true for all ; it implies that
1
E t C 0 (u)
Suppose lim inf u!1
all u
e
C(u)
C 0 (u)
:
t
> 0; which implies that there is u
~ and
> 0 such that
C(u)
C 0 (u)
for
u
~: Feasibility implies
E t C (u) = E
E
t
t
[C (u) ju < u
~] P
C (u) 0
C (u) ju
C 0 (u)
u
~ P
t
t
(u
(u < u
~) + E
u
~)
E
t
t
C (u) 0
C (u) ju
C 0 (u)
C 0 (u) ju
u
~ P
t
u
~ P
(u
t
(u
u
~)
u
~) :
Therefore,
E t C 0 (u) = E
t
C 0 (u) ju < u
~ P
max C 0 (u) P
u2[0;~
u]
max C 0 (u) +
t
t
(u < u
~) + E
(u < u
~) +
t
e
C 0 (u) ju
u
~ P
t
(u
u
~)
e
u2[0;~
u]
From strict convexity of C, C 0 (~
u) = maxu2[0;~u] C 0 (u), therefore,
t
C 0 (~
u) +
e
1
> 0:
This proves the second part of the lemma. Analogous arguments establish our result for
invariant distribution since in the invariant distribution E C 0 (u) must be …nite.
iv
If assumption lim sup
> 0 is not satis…ed, economy converges to that of Atkeson and
t
Lucas (1992), who showed that for a wide range of cost functions C (including those satisfying
conditions of Lemma 11) all the mass of the lifetime utilities eventually gets concentrated
arbitrarily close to the lower bound v; the result known as the immiseration. Immiseration
violates constraint (16) and therefore lim sup
> 0 in all speci…cations considered by Atkeson
t
and Lucas (1992).
8.2.1
Sketch of proofs of Propositions 1 and 2
We now adapt the arguments of Farhi and Werning (2007) to write problem (17) recursively.
When
t
is strictly positive with lim inf
t
> 0; the series f t gt are bounded away from zero
uniformly in t. The arguments of Lemma A2 of Farhi and Werning (2007) extend with minimal
modi…cations to problem (17) to show that it can be written in a recursive form
kt (v) = max E
2
t
h
^
t C (u) + t+1 kt+1 (w)
u
t Wt
i
subject to
v = E [ u + w]
E [ u + w]
E
0
[ u + w] for all
0
;
where kt (v) is convex. To achieve convexity of this problem, it is su¢ cient to randomize
between only two points in
t
(the arguments are identical to the proof of Lemma 3 in Acemoglu
et al. (2008)), and hence this problem can be written as
Z
i
h
0
0
0
^
kt (v) =
max
z
u
t C u + t+1 kt+1 w
0
0 0
(u ;w ; );
(u00 ;w00 ; 00 );
z2[0;1]
+ (1
z)
(dmj ) d ( )
t Wt
0
00
(dmj ) d ( )
t Wt
00
Mt
Z
h
Mt
subject to
Z
v=z
0
0
u + w
0
0
u00
tC
u00 + ^ t+1 kt+1 w00
(dmj ) d ( ) + (1
Mt
z)
Z
i
u00 + w00
00
(dmj ) d ( )
Mt
and
Z
Z
u0 + w0
0
(dmj ) d ( )
Mt
Mt
u00 + w00
00
(dmj ) d ( )
Z
ZMt
Mt
v
u0 + w0 ~ (dmj ) d ( ) for all ~
u00 + w00 ~ (dmj ) d ( ) for all ~
This is the Bellman equation (20). Then Proposition 1 and 2 can be established by direct
adaptation of arguments in Farhi and Werning (2007). We show all the results for k0 ; for
all other kt the arguments are identical. For brevity we drop explicit conditioning of all
expectations on v:
Continuity
Since k0 (v) is concave, it is continuous on (v; v) : To show that it is also continuous on the
boundaries, de…ne the value function
k0 (v) =
1
max E
;u
0
1
X
t [ t ut
tC
1
X
(ut )] + max
t=0
subject to
t t Wt
t=0
1
X
v=E
t
!
t ut :
t=0
We have k0 (v)
k0 (v) and k0 (v) is continuous. If utility is bounded below, then at v = v;
the solution to k0 sets ut = U (0) for all t and
to minimize Wt : This allocation is incentive
compatible, therefore, k0 (v) = k0 (v) : Then continuity of k0 (v) at v implies continuity of k0 (v)
at v: If utility is bounded above, then C (ut ) ! +1 as v ! v: Therefore limv!v k0 (v) =
which implies limv!v k0 (v) =
1:
Di¤ erentiability
1,
The proof is an application of the Benveniste and Scheinkman theorem (Benveniste and
Scheinkman (1979)). First, suppose that utility is unbounded. Fix any interior v0 and let
(u ;
) be the optimal allocation for that v: For any v; let u
~0 = u0 + (v
v0 ) ; u
~t = ut for all
t > 0. Since utility is unbounded, this perturbation is feasible. Then (~
u;
) satis…es (11) and
(12) for v: Let
V (v) =
1
E
0
[
1
0
We have k0 (v)
~t
t [ tu
tC
(~
ut )
t Wt ]
0C
(u0 + (v
(57)
t=0
= E
+
1
X
0 (u0 +
1
X
E
(v
v0 ))
t [ t ut
tC
(ut )
v0 ))
0 W0 ]
t Wt ]
t=1
V (v) : Function V is di¤erentiable with V 0 (v0 ) = 1
0E
C 0 (u0 ) : Since
k0 is concave, by Benveniste-Scheinkman theorem (see Theorem 4.10 in Stokey et al. (1989)),
k00 (v) exists and satis…es k00 (v) = 1
0E
C 0 (u0 )
1:
To …nd the values of k00 (v) in the limit as v approaches
K (v) = max E
u;
1
X
t=0
vi
t
[ t ut
tC
1, de…ne a function
(ut )]
subject to (12).
It it easy to show that K (v) is concave and limv!
limv!1 K 0 (v) =
1:
Let
t
= max
2 ;c 0 [
U (c)
1
1 X
k0 (v)
t c]
t t
1
=
0 t=0
E
1
X
t
and ! t =
1
X
E
0
[ t ut
t C (ut )
t]
0 (v)
= 1 and
Wt ( ) : Then
t [ t ut
t C (ut )
t]
1
X
E
t=0
t=0
K (v)
t min
1K
t t Wt
t=0
1
X
t!t
t=0
1
X
t
t
t=0
1
X
t!t;
t=0
where the …rst inequality follows from the fact that the expression in square brackets is negative and t = 0
P1 t
[ t ut
E
t=0
Since k0 (v)
t
and the second inequality follows from the fact that K (v) maximizes
tC
(ut )] without incentive constraints.
K (v)+const and K (v) is concave, limv!1 K 0 (v) =
1: Since k00 (v)
1 and limv!
1K
0 (v)
= 1; limv!
0
1 k0 (v)
= 1:
1 implies limv!1 k00 (v) =
Now suppose that utility is bounded below but unbounded above. Without loss of general-
ity, assume that U (c)
v
v0 u
0. Then for any v0 ; the allocation
is feasible), incentive compatible and attains v: Let V (v) =
1
0
E
;
is feasible (since vv0 ut > 0
h
P1
v
v
t v0 ut
t C v0 ut
t=0 t
V (v) is concave, di¤erentiable and satis…es k0 (v0 ) = V (v0 ) ; therefore, k0 (v) is di¤erentiable at
v0 by the Benveniste-Scheinkman theorem. A symmetric argument works if utility is bounded
above (without loss of generality by 0) but not below. If utility is bounded above and below,
a function V can be constructed separately for v
v0 and v > v0 : This shows that k0 (v) is
di¤erentiable.
To establish the value of the derivatives in the limits, note that when utility is bounded,
function K (v) still provides an upper bound to k0 (v) and limv!v K 0 (v) =
that limv!v k00 (v) =
v
1; which implies
1: When utility is unbounded below, we can de…ne V as in (57) for
v0 , which shows that k00 (v0 )
0
0 E C (u0 )
limv! 1 k00 (v) = 1:
limv"v0 V (v0 ) = 1
arguments as for unbounded utility establish that
1: Then the same
It remains to show the value of limv!v k00 (v) when utility is bounded below, without loss
of generality by 0. Let
1
K (v) =
subject to (12). Let
max
1
X
t
0 ut 2R+ t=0
v
"
X
( )
2
!
ut
#
t C (ut )
1
1 X
t!t
0 t=0
be a Lagrange multiplier on (12) for a given v: The …rst order condition
for ut is
1
0
t C (ut )
vii
t
t= 0
v;
(58)
t Wt
i
:
where the inequality sign is due to the non-negativity constraint on ut : This expression implies
that
then
1: Therefore for the utilities bounded below, limv!v k00 (v)
v
t
t= 0
! 0 and there is some T such that 1
T
T= 0
v
1: If lim sup
t
> 0,
> 0: For such T the optimality
condition (58) is satis…ed only for uv;T > 0: This is impossible since limv!v uv;t = 0 for all t;
therefore if lim sup
t
> 0, then limv!v
v
= 1: From the envelope theorem, K 0 (v) =
K (v) and k0 (v) =
Since the solution to this problem is incentive compatible, k0 (v)
K (v) : Therefore
limv!v k00 (v)
0
limv!v K (v)
1 with
limv!v k00 (v)
v:
= 1 if lim sup
t
> 0:
The arguments for the proof of Proposition 2 mirror the proof of Theorem 2 in Farhi and
Werning (2007).
8.3
Intermediate steps used in the proof of Theorem 2 and Corollary 2
We start with preliminary results.
Lemma 12 Suppose that f is continuous on some interval [a; b] and one of its Dini derivatives
is bounded. Then f is Lipschitz continuous on [a; b] :
Proof. Without loss of generality suppose that D+ f (t) ; de…ned as
D+ f (t)
lim sup
h!0+
is bounded by D: Let
1 (t)
f (t + h)
h
f (t)
;
= f (t) + Dt: It is continuous since f is continuous and D+
D+ f (t)+D
0: By Proposition 5.2 in Royden (1988)
implies f (t00 )
f (t0 )
D (t00
1
=
is nondecreasing, and therefore t00 > t0
t0 ) : Applying the same arguments to
combining with the previous result, we establish jf (t00 )
1 (t)
f (t0 )j
2 (t)
D jt00
=
f (t) + Dt and
t0 j for all t00 ; t0 2 [a; b] :
Lemma 13 If Assumption 1 is satis…ed, then
lim
u!(1
In particular, for any v (1
C 0 (^
u)
)v
C 00 (u)
= 0:
[C 0 (u)]2
) < a < b < v (1
C 0 (~
u)
Ba;b j^
u
(59)
) there exists a real number Ba;b such that
u
~j for all u
^; u
~ 2 [a; b] :
Moreover, for any " > 0; there is a such that Ba;b = (C 0 (b))2 < " for all b > a
(60)
a:
For any v < a < b < v such that kt0 (a) < 1; function kt0 is Lipschitz continuous on [a; b]
^a;b such that
and there exist a real number B
v)
kt0 (^
kt0 (~
v)
^a;b j^
B
v
v~j for all v^; v~ 2 [a; b] :
^a;b = (1
Moreover, for any " > 0; there is a such that B
viii
kt0 (b))2 < " for all b > a
a:
Proof. By de…nition C (U (c)) = c for all c: Di¤erentiate twice
C 0 (U (c)) U 0 (c) = 1
and
C 00 (U (c)) U 0 (c)
2
+ C 0 (U (c)) U 00 (c) = 0:
(61)
Substitute the …rst expression into the second and regroup
U 00 (c)
:
U 0 (c)
C 00 (U (c))
=
[C 0 (U (c))]2
If Assumption 1 is satis…ed, we obtain (59). Since U 00 is continuous, so is C 00 from (61).
For any u
^; u
~ 2 [a; b] with u
~<u
^;
0
C (^
u)
0
C (~
u) =
Z
u
^
C 00 (u) du
(^
u
u
~) max C 00 (u) ;
u2[a;b]
u
~
where maximum is well de…ned since C 00 is continuous. Let u
^a;b = arg maxu2[a;b] C 00 (u) and
Ba;b = C 00 (^
ua;b ) : Since C 00 (^
ua;b ) = [C 0 (^
ua;b )]2
a ! (1
C 00 (^
ua;b ) = [C 0 (b)]2 and u
^a;b ! (1
) v; condition (59) establishes (60).
) v as
Since function kt is concave and di¤erentiable, kt0 is continuous on [a; b] (Corollary 25.5.1
in Rockafellar (1972)). Let D+ be the right upper Dini derivative of kt0 , de…ned at each v0 as
D+ kt0 (v0 )
lim sup
v!v0+
kt0 (v)
v
kt0 (v0 )
:
v0
Claim 1. D+ kt0 (v0 ) satis…es
0
D+ kt0 (v0 )
V 00 (v0 );
where V (v) is de…ned in (57).
Note that by construction V is twice di¤erentiable with V 00 (v0 ) =
tE
v0
[C 00 (uv0 )],
V (v)
kt (v) for all v with equality for v = v0 and V 0 (v0 ) = kt0 (v0 ) : Since kt0 is decreas-
ing, 0
D+ kt0 (v0 ) by de…nition. Suppose D+ kt0 (v0 ) < V 00 (v0 ): Then there exists v^ > v0 ; such
that for all v 2 (v0 ; v^) ; kt0 (v) < V 0 (v) : If this is not the case, there must exist a sequence vn ;
with vn ! v0+ ; such that kt0 (vn )
kt0 (vn )
vn
V 0 (vn ) or
kt0 (v0 )
v0
V 0 (vn )
vn
V 0 (v0 )
for all vn :
v0
Taking limits and invoking twice di¤erentiability of V;
D+ kt0 (v0 )
kt0 (vn )
vn
n!1
lim sup
ix
kt0 (v0 )
v0
V 00 (v0 ) ;
which contradicts the assumption.
If kt0 (v) < V 0 (v) for all v 2 (v0 ; v^) ; then
Z
Z v^
0
kt (v) dv <
v^
V 0 (v) dv;
v0
v0
where the integrals are well de…ned since kt and V are concave and hence absolutely continuous
by Proposition 5.17 in Royden (1988). Integrating and using the fact that kt (v0 ) = V (v0 ) ; we
obtain kt (^
v ) < V (^
v ) ; establishing the contradiction. Therefore D+ kt0 (v0 )
V 00 (v0 ):
Claim 2. kt0 is Lipschitz continuous on [a; b].
It is su¢ cient to show that V 00 (v0 ) =
tE
v0
[C 00 (uv0 )] is bounded on [a; b] and apply
Lemma 12. From (28),
kt0 (a)
1
tC
1
0
(uv0 )
1
kt0 (b)
j j
for all v0 2 [a; b] :
(62)
Since kt0 (a) < 1; this bounds uv0 : C 00 achieves a maximum at that set, say at a point u
^a;b ,
^a;b = t C 00 (^
ua;b ) :
which implies that V 00 (v0 ) is bounded by B
^a;b satis…es the condition that for any " > 0; there is a such
Claim 3. Lipschitz bound B
2
^a;b = (1 kt0 (b)) < " for all b > a a:
that B
As a ! v; kt0 (a) !
close to (1
1 and therefore equation (62) implies that u
^a;b gets arbitrarily
) v for all a su¢ ciently high. By the …rst part of the lemma, this implies that
C 00 (^
ua;b ) = [C 0 (^
ua;b )]2
approaches zero for high a: Hence
^a;b
B
[1
kt0 (b)]2
=
00 u )
a;b
t C (^
[C 0 (^
ua;b )]2
C 0 (^
ua;b )
1 kt0 (b)
2
00 u )
a;b
t C (^
[C 0 (^
ua;b )]2
j j
2
t
also approaches 0 as a ! v:
8.4
Proof of Proposition 4
Suppose C satis…es
C (u) =
1 a
u for a > 1:
a
(63)
For all x > 0; de…ne a function
kt (v; x) =
1
max E
t u;
"
1
X
s us x
s+t
a 1
s+t C
(us )
xa
s=0
subject to (11) and (12). For x = 0 we set
kt (v; 0) =
1
max E
t u;
"
1
X
s=0
We prove several preliminary result …rst.
x
s+t
s+t C
(us )
#
:
s+t Ws
#
Lemma 14 Suppose C satis…es (63). Then kt (v; x) is continuous in (v; x) :
Proof. For interior (v; x) it is immediate, so we show our result for boundary: if (vn ; xn ) !
(v; 0) then kt (vn ; xn ) ! kt (v; 0) : Since jkt (vn ; xn )
jkt (v; xn )
kt (v; 0) j
kt (v; 0) j; and kt (v; x) is continuous in v for all x
jkt (vn ; xn )
kt (v; xn ) j +
0 by standard arguments, it is
su¢ cient to establish that kt (v; xn ) ! kt (v; 0) as xn ! 0:
We show our result for k0 (v; x) ; the arguments are analogous for other periods. Let
1
X
K (v; x) = max E
u;
t
xa
1
t ut
tC
(ut )
t=0
subject to (12). Analogously with the proof of Proposition 1, K (v; x) is …nite for all x
k0 (v; x)
K
(v; x) + xa
0 and
const, therefore k0 (v; x) is bounded from above, and that bound can
be chosen to be uniform for all x in the neighborhood of x = 0. Function k0 (v; x) is bounded
below because u
0; C (u)
0 and Wt is bounded. Moreover, that bound can be chosen to
be uniform for all x in the neighborhood of x = 0.
Let (ux ;
x)
be a solution to k0 (v; x) for a given x: We show next that
for all x in the neighborhood of x = 0: Since
such that
and
b00
tC
(u)
b0t
00
j j bt u
(u) is convex, there are
for all u: Since
t
x
t ut is bounded
reals b0t and b00t > 0
zero, we can pick b0
t=0
is bounded away from
to be independent of t: Then
0 k0 (v; x) = E
b0
b0
x
1
X
t
xa 1
<
0
t=0
1
X
this yields
E
x
t
uxt
t=0
Since (ux ;
x)
1
x
t C (ut )
uxt
xa E
x
1
X
t t Wt
t=0
t+E
b00
1
X
xa
t=0
1
X
t+E
t=0
For
tC
P1
x
x
1
X
t=0
1
X
t
t
xa
xa
1
1
uxt
j
00 x
j b ut
uxt
b00
xa E
xa E
b00
1
1
X
t t Wt
t=0
x
1
X
t t Wt :
t=0
t=0
b0
xa
x
1
X
t
xa E
x
t=0
1
X
t t Wt
0 k0 (v; x) :
t=0
are optimal for x; incentive compatible and provide utility v to agent,
"1
#
"1
#
X
X
0
x
E 0
E x
t
t C ut
t(
t C (ut )) ;
t=0
t=0
P
x
where the right hand side expression is well de…ned since k0 (v; x) and E x 1
t=0 t ut are
P1
x
…nite, which implies that k0 (v; 0) lim supx!0 E x
t C (ut )) : At the same time
t=0 t (
"1
#
"1
#
X
X
x a 1
x
0 a 1
0
E 0
k (v; x) = E x
xa t Wt
xa t Wt
t ut x
t ut x
t
t C (ut )
t
t C ut
t=0
t=0
xi
which implies that
lim inf k0 (v; x) = lim inf E
x!0
x
x!0
where again we used boundedness of E
x
all v:
"
P1
1
X
t(
tC
t=0
t
t=0
#
(uxt ))
k (v; 0) ;
uxt : Therefore limx!0 k0 (v; x) = k0 (v; 0) for
First, we analyze the limiting case of x = 0: It has a recursive structure
h
kt (v; 0) = max E
u;w;
i
^ kt+1 (w; 0)
C
(u;
0)
+
t
t+1
subject to (22) and (21). Any conditioning on z is redundant since C ( ; u) is strictly convex
and then the Revelation principle implies strict convexity of kt ( ; 0). One can also easily show
that kt ( ; 0) is di¤erentiable and decreasing.
Let u0v (m) ; wv0 (m) ;
0
v
(mj )
;m
be a solution to this problem.
Lemma 15 Suppose that u0v (m0 ) ; wv0 (m0 ) 6= u0v (m00 ) ; wv0 (m00 ) for some m0 ; m00 ;
0
v
0 and
(m0 j ) >
u0v m0 + wv0 m0 = u0v m00 + wv0 m00 :
Then
tC
and
0
v
u0v m0
+ ^ t+1 kt+1 wv0 m0
>
tC
u0v m00
+ ^ t+1 kt+1 wv0 m00
(64)
(m00 j ) = 0:
Proof. Suppose
tC
u0v m0
+ ^ t+1 kt+1 wv0 m0
Then setting ~ 0v (m00 j ) =
0
v
(m00 j ) +
<
0
v
tC
u0v m00
+ ^ t+1 kt+1 wv0 m00
:
(m0 j ) ; ~ 0v (m0 j ) = 0 and leaving all other re-
porting strategies unchanged satis…es (22) and (21) and delivers a strictly higher value of
h
i
^ kt+1 (w; 0) ; contradicting optimality of 0 (m0 j ) > 0:
E
C
(u)
+
t
t+1
v
Suppose (64) holds with equality. De…ned as u
~ =
wv0 (m0 ) + (1
) wv0 (m00 ) for some
u0v
(m0 ) ; wv0 (m0 )
u0v (m0 ) + (1
) u0v (m00 ) and w
~ =
2 (0; 1) : The new allocation satis…es (21) since
u0v
(m00 ) ; wv0 (m00 )
indi¤erent between
and
any ^ 6= and m
^ that ^ sends with a positive probability,
0
^u0 (m)
^
v ^ + wv (m)
: It also satis…es (22) since for
^u0 m0 + w0 m0
v
v
xii
is
and
0
^u0 (m)
^
v ^ + wv (m)
^u0 m00 + w0 m00
v
v
and therefore
0
^u0 (m)
^
v ^ + wv (m)
For any , by strict concavity of
tC
^u
~ + w
~ :
C and kt+1
(u ) + ^ t+1 kt+1 (w ) >
tC
u0v m0
+ ^ t+1 kt+1 wv0 m0
=
tC
u0v m00
+ ^ t+1 kt+1 wv0 m00
(65)
:
Augment the message space Mv with a message m? : De…ne ~ (m? j ) = 0v (m0 j ) +
0 (m00 j ) and ~ m j^ = 0 for all ^ =
6
; and ~ (mj ) = 0v (mj ) for m 2
= fm0 ; m00 ; m? g,
?
v
~ mj^ =
0
v
mj^ for all ^ 6=
and all m 6= m? : Similarly let (~
u (m? ) ; w
~ (m? )) = (u ; w )
2 (0; 1) and (~
u (m) ; w
~ (m)) = u0v (m) ; wv0 (m) for all m 6= m? : That is we consider
for any
an augmented state space and a strategy in which type
reports m? and receives (u ; w ) in
all states in which she reported m0 ; m00 leaving all other strategies and allocations unchanged.
The 3-tuple (~
u; w;
~ ~ ) is incentive compatible and delivers the same payo¤ v to the agent, but
by (65) and the fact that ~ (m? j ) > 0 delivers strictly higher value to the planner. Therefore
0
v
u0v ; wv0 ;
cannot be optimal, leading to a contradiction.
This lemma shows that each type can receive only one distinct allocation. Under some
additional conditions requiring types to be su¢ ciently spread out, we can also show that each
receives a distinct allocation from other types.
Lemma 16 Suppose condition (33) is satis…ed. Then if
0
v
0
mi j
= 0 for all
0
6= :
0
v
(mi j ) > 0 for some
; then
Proof. Previous lemma established that types can receive at most j j distinct allocations,
so we restrict attention to only j j messages. Without loss of generality u0v (m1 )
u0v
mj
j
: Suppose that there is an allocation
u0v
(mn ) ; wv0 (mn )
:::
that two types receive with
a positive probability. Due to the previous lemma, they must receive it with probability 1.
Pick the highest type that receives an allocation which is also received by some lower type.
To simplify notation, call that type
receives
u0v (mn
u0v
(mn 1 ) ; wv0 (mn 1 )
=
n
and the single crossing property implies that
u0v
(mn ) ; wv0 (mn )
. For now assume that
1) :
First, observe that it must be true that
0
n+1 uv
(mn+1 ) + wv0 (mn+1 ) >
xiii
0
n+1 uv
(mn ) + wv0 (mn ) :
u0v
n 1
(mn
also
2)
<
Otherwise, if this inequality is weak, the fact that u0v (mn+1 ) ; wv0 (mn+1 ) 6= u0v (mn ) ; wv0 (mn )
implies
0
n uv
(mn ) + wv0 (mn ) >
0
n uv
(mn+1 ) + wv0 (mn+1 ) :
But then wv0 (mn+1 ) can be decreased and wv0 (mn ) increased while keeping
0
n+1 ) wv (mn+1 )
(
(
0
n ) wv (mn )
+
constant. For small changes that will be incentive compatible, and strict
concavity of kt+1 ( ; 0) will imply that the perturbed allocation gives a higher value, contradicting optimality.
Choose " > 0 small enough so that
0
n+1 uv
Let
2 (")
=
(mn+1 ) + wv0 (mn+1 ) >
n 1
";
3 (")
1 (") =
1
=
(
n 1
n
n 2
1) [
0
n+1 uv
(mn ) + wv0 (mn ) +
(
n+1
(
n)
n 1)
":
" and
n
n
1] " +
n 1
n 2
n
X2
( i ) ":
i=1
By construction, all
1 (")
are positive and O (") ; and
8
1<
( n 1) [ n
(
3 (") =
n 1]
:
n 2)
n 1
j j
X
i=n 1
if condition (33) is satis…ed.
Consider an allocation (~
u; w)
~ de…ned as
u
~ (mn ) = u0v (mn ) +
u
~ (mn
1)
= u0v (mn
1)
(
(
";
n 1)
n)
u
~ (mi ) = u0v (mi ) for i 2
= fn
";
1; ng ;
and
w
~ ( i ) = wv0 ( i ) +
3 (")
w
~ ( i ) = wv0 ( i )
1 (")
1 (")
for i
for i > n;
n 1)
w
~ ( n ) = wv0 ( n )
2 (")
( n)
w
~ ( n 1 ) = wv0 ( n 1 ) + 2 (")
1 (") :
(
xiv
n
1 (") ;
2;
9
=
( i) "
;
0
First, observe that (~
u; w)
~ satisfy (21) since
j j
X
j j
X
( i) [ iu
~ (mi ) + w
~ (mi )]
i=1
=
(
n 1) ( n
n 1) "
+
3 (")
0
i uv
( i)
i=1
n
X2
( i)
(mi ) + wv0 (mi )
1 (")
i=1
=
(
n 1) ( n
n 1) "
+(
n 1
n 2) "
n
X2
( i)
(
n 1) [ n
n 1] "
+(
n 2)
n 1
i=1
= 0:
j
( i) "
i=1
It also satis…es incentive compatibility. Note that for small " we have u
~ (m1 )
u
~ mj
n
X2
:::
and it su¢ ces to check local downward incentive compatibility. We have
~ (mn 1 )
n 1u
=
n 1
+ w
~ (mn 1 )
n
( n 1)
"+ 1+
1+
( n)
so the incentive constraint for type
~ (mn 2 )
n 2u
=
n 2"
so the incentive for type
+(
n 2
n 1
n 1
~ (mn )
1u
(
w
~ (mn )
n 1)
(
2 (")
n)
= 0;
is satis…ed. Also
+ w
~ (mn
2)
n 2) "
~ (mn 1 )
n 2u
n 1"
w
~ (mn
1)
= 0;
is satis…ed. Similar arguments hold for all the other incentive
constraints. Finally
j j
X
( i)
i=0
=
n
X2
h
i
^
C
(~
u
(m
))
+
k
(
w
~
(m
))
i
i
t
t+1 t+1
0
( i ) kt+1
(w
~ (mi )) (
3 (")
1 ("))
X
( i)
h
0
0
^
t C uv (mi ) + t+1 kt+1 wv (mi )
0
( i ) kt+1
(w
~ (mi )) (
1 ("))
+ o (") :
i=n+1
0
Since kt+1
< 0 and under condition (33) (
3 (")
positive for " small enough. This shows that
If u0v (mn
i=0
j j
+
i=0
j j
X
2)
= u0v (mn
1) ;
1 ("))
u0v ; wv0
0; the expression above is strictly
cannot be optimal.
then the same steps as before go through if u0v (mi ) is reduced
by " for all i such that u0v (mi ) = u0v (mn
1)
and
are adjusted accordingly.
We are now ready to prove Proposition 4.
Proof of Proposition 4.
The solution to Bellman equation (20) may involve random-
ization over several v~v (z) that in expectations deliver v; but v~v (z) ! 1 for all z as v ! 1.
Consider maximization problem for a given z and assume that agents send reports over the
message set M
for all v: Using homogeneity properties of kt (v) ; if (u0v ; w0 ;
xv
v)
is a solution
i
!
to kt (v), then (ux ; wx ;
x=v
x)
1
max E
u;w;
subject to (22) and
v
h
xa
1
1
u0v ; v
1
wv0 ;
v
is a solution to the following problem for
^
t C (u) + t+1 kt+1 (w; x)
u
i
xa t Wt ( )
1 = E [ u + w] :
Since u; w are bounded from below by 0, arguments analogous to (45) establish that
h
i
2 0; ( ( 1 ) ) 1 and that ux (m) lies in a compact set. Since Lemma 14 estab-
wx (m)
lished that kt+1 (w; x) is continuous in x; the Theorem of Maximum applies and solution
correspondence (ux ; wx ;
x)
is u.h.c. in x:
We show that there cannot be several types
that send the same message m with a positive
probability for low x; which establishes the result of the Proposition. First, observe that there
must be some threshold x; such that for all x
x no two types send the same message with
probability 1. If this is not the case, we can choose a sequence xn ! 0 with solution
xn
satisfying such property, which by u.h.c. of
0
would imply that
xn
satis…es this property,
violating Lemma 16.
Next we rule out that several types send the same message with positive probability. Suppose that for any x we can …nd some x < x with this properties. There must be some type
who is indi¤erent between messages m0 and m00 : In this case condition (30) holds and takes
the form
h
xa 1 ux m0
h
xa 1 ux m00
= xa
t
tC
uw m00
+ ^ t+1 kt+1 wx m0
ux m0
i
tC
ux m00
+ ^ t+1 kt+1 wx m00
w
t C
uw m00
uw m0
w
t C
i
uw m0
:
Since ux ; uw lie in a compact set, taking sequence xn ! 0 we get, invoking upper-hemicontinuity
again,
h
tC
0
u
0
m
+^
t+1 kt+1
which violates Lemma 15.
8.5
w
0
0
m
i
h
tC
0
u
00
m
+^
t+1 kt+1
w
0
m
00
i
= 0;
Arguments for case with persistent types
In the following proofs we assume that the set of feasible utility is bounded and, without loss
of generality, we set the lower bound to 0. Also, we assume that the message set Mt chosen by
the planner is …nite for all t. The proof that in the worst equilibrium there is no information
xvi
revelation to the government is the same as in the iid case. The payo¤ of this equilibrium
depends on the government’s information that dissipates slowly due to the persistence of the
shocks. Thus, the best payo¤ for a government that deviates at time t is
~ t ( t) =
W
sup
fut+s (h)gh2H t ;s
0
Z
1
X
s
H t s=0
Ept+s [ jh] ut+s (h) d
t
(66)
subject to the feasibility constraint (8) holding for all t + s and
Z
s
j
pt d jht for s > 0:
pt+s jht =
This payo¤ is a generalization of (7) in the iid case. Similarly to that case, we can bound
~
Wt ( t ) with a function that is linear in t 1 : Given p 2 ( ), de…ne the analogue of (13) as
R s
!
Z
1
(d s j ) s ut+s (m)
X
s
:
Wt ( ; p) =
sup
(dmj ) d j
p d
w
fut+s (m)gs 0
(C
(u
(m))
e)
t+s
s=0
t;t+s
Mt
(67)
As in the iid case, let uw
t+s (m) denote the solution to (67), which is given by equation
Ept+s [ jm] =
w
t;t+s C
uw
t+s (m) .
By Langrange duality we can prove the analogue of Lemma 2 in the iid case.
Lemma 17 The multiplier
w
t;t+s
is uniformly bounded away from 0 and belongs to a com-
pact set for all t and s. Therefore, uw
t+s (m) belongs to a compact set in the interior of
[(1
) v; (1
) v] for all m; ; t; s:
Function Wt is well de…ned, continuous, convex in
t,
if and only if
t 1
is uninformative. For any
Z
~ t ( t)
Wt
W
Ht
with equality if
t ; pt ;
t 1
=
t ; pt ;
jht ;
t
Z
^t ;
t;p
t 1
uniformly bounded in t, and is minimized
,
; pt ht
1
d
t 1 dz;
(68)
:
Proof. The objective function (66) is concave and the constraint set is convex and we can
~ t ( t ) as
use the Lagrange duality and rewrite W
R
(
)
P1 s
Ept+s [ jh] ut+s (h) d t dz
t Z
s=0
H
~ t ( t) =
R
P1 s
W
min
sup
:
e
f t;s 0gs 0 fut+s (h)g
t;t+s
s=0
t
H t Z C (ut+s (h)) d t dz
h2H ;s 0
(69)
Let
w
t;t+s
be the solution to the minimization problem. Since after deviating, the government
~ t period by period.
doesn’t provide incentives, we can maximize W
Z
s
w
w
sup
Ept+s [ jh] ut+s (h)
t;t+s C (ut+s (h)) + t;t+s e d t dz:
fut+s (h)gh2H t ;s
0
Ht Z
xvii
w
t;t+s
By using the same argument as in the iid case we can show that
is uniformly bounded
away from 0 and uniformly bounded above for all s. This also proves that supremum in (69)
is achieved. Also,
~ t ( t) =
W
f
min
t;s
0gs
max
fut+s (h)gh2H t ;s
0
max
fut+s (h)gh2H t ;s
0
Z
0
R
(
1
X
s
H t Z s=0
P1
s=0
Ht Z
P1 s
t;t+s
s=0
: Since
t 1
max
fut+s (h)gh2H t ;s
=
Z
Ht 1
0
Z
Ht
max
Z fut+s (m)gs
0
Mt
1
X
s
Z s=0
Z
w
t;t+s g
Ht Z
)
d j
C (ut+s (h)) d t dz
w
t;t+s (C
(ut+s (h))
e
)
e) d t dz
may not be a minimizer for an arbitrary
w
t;t+s (C
Ept+s [ jh] ut+s (h)
t (dmj
R
Ept+s [ jh] ut+s (h) d t dz
Ept+s [ jh] ut+s (h)
where the inequality follows from the fact that f
t ; pt ;
s
1
X
pt d
s=0
equation (68) must hold.
(ut+s (h))
2
s4
R
e) d t dz
s (d
sj
)
3
ut+s (m) 5
d
w
(C
(u
(m))
e)
t+s
t;t+s
s
t 1 dz
The same arguments show that we can maximize (67) period by period, thus, if we let
R s
!
Z
(d s j ) s ut+s (m)
^ t+s ( t ; pt ) = max
W
d j
pt d
;
t (dmj )
w
fut+s (m)g
e)
t;t+s (C (ut+s (m))
Mt
the optimal uw
t+s (m) satis…es
1
C 0 (ut+s (m)) =
w
t;t+s
Z
p d
E
jm;
2
^ t+s is uniformly bounded in t + s,
which implies that W
1
;
w
t;t+s
j j
w
t;t+s
;
t,
and pt and that we can re^ t+s by the Theorem
strict ut+s (m) to a compact set. The latter implies continuity of W
^ t+s is uniformly bounded, we have that Wt ( t ; pt ) =
of the Maximum. Finally, since W
P1 s ^
Wt+s ( t ; pt ) is also bounded and continuous.
s=0
The proof that Wt is convex in
t
follows exactly the same steps as the in the iid case.
To see that Wt is minimized at an uninformative signal, let
be uninformative and note
that for any
Wt ( t ; pt ) =
max
fut+s (m)gs
max
fut+s gs
0
0
Z
Mt
Z
t (dmj
d j
pt d
)
d j
1
X
s=0
= Wt ( t ; pt )
xviii
pt d
1
X
s=0
s
s ut+s
2
s4
w
t;t+s (C
R
3
u
(m)
s
t+s
5
w
e)
t;t+s (C (ut+s (m))
s (d
(ut+s )
sj )
e)
Let
(A) =
R
(Aj ) (d ) for any Borel A of message set Mt and let uw
t+s be the optimal
solution when the strategy is uninformative, then
Wt ( t ; pt )
=
max
fut+s (m)gs
0
Wt ( t ; pt )
Z
t (dmj )
Mt
20
Z
1
X
s 4@
s
s=0
(d s j )
d j
pt d
1
s A ut+s (m)
w
t;t+s (C
(ut+s (m))
The expression in square bracket is non-negative. Moreover, if
is a set of messages A with
(A) > 0 such that jE [ jA]
uw
t+s
e)
t
w
t;t+s
C uw
t+s
is informative, then there
3
e 5
1j > 0: For all such messages
the expression in square brackets is strictly positive since uw
t does not satisfy the optimality
condition
1
C 0 (ut (m)) =
for m 2 A: Since
mative
(A) > 0; Wt ( t ; pt )
w E
t;t
[ jA]
Wt ( t ; pt ) is strictly positive and, hence, any infor-
cannot be a minimum.
Similarly to the iid case, we replace the incentive constraint for the government E
~ t ( t ) with
W
E
1
X
t s
Z
t ut
Wt
Ht
t=s
t
Z
jht ;
; pt ht
1
d
t 1 dz
P1
t s
t=s
(70)
and use standard techniques to derive the analogue of the Langrangian (17) for the persistent
case. The problem becomes
1
X
L = max E
u;
subject to
pt
for all ht
1 ; ht
t
jh
=R
R
t [ t ut
tC
(ut )
t Wt ]
(71)
t=0
mjht ;
t
t
j
mjht ;
pt
d j
1
pt
jht
d
1
d
and m; whenever de…ned, the incentive constraint
#
" 1
#
" 1
X
X
t
t
for all
E 0
u
E
u
t=0
1
;
jht
0
;
1
;
(72)
t=0
and
E
"
1
X
t
#
u v = v;
t=0
xix
(73)
t ut
1
for some non-negative sequences of Lagrange multipliers
t ; t ; t t=0 with the property that
^
with strict inequality if and only if (70) binds in period t.
t
t= t 1
Finally, we adapt the arguments in Fernandes and Phelan (2000) with minor modi…cations
and obtain a recursive representation of (71). In particular, we …rst rewrite the constranit
set in a recursive form by adding the promise-keeping constraint (34) for each type
. Since
it is no longer optimal for agents to always report their types truthfully, unlike in the case
studied in Fernandes and Phelan (2000), the agent’s previous type,
, cannot be used as a
state variable. Instead, the recursive formulation keeps track of the planner’s posterion beliefs
about
. Therefore,
kt (v; p) =
max
fu;w; g
( j )2 (M );p0 2 ( )
Z
p d
E
h
i
0
^
t C (u) + t+1 kt+1 w; p j
u
t
Z
Wt dz
(74)
subject to (34),
R
0
p ( jm; z) = R
(mj ; z)
(mj ; z)
j
p d
d j
p d
whenever de…ned, the incentive constraint
E [ u + w ( ; ; ) j ; z]
E 0 [ u + w ( ; ; ) j ; z] for all z; ;
0
:
(75)
We now extend the arguments of the simple example in Section 4.1 to the persistent case.
As in the iid case, the assumption that the government can deviate at time t
1 only if it
deviates at t = 0 implies that the Lagrangian (71) can be written as
( 1
)
X
t
L = max E
t C (ut )
0 W0
u;
t=0
subject to (72) and (73). Consider the subgame starting from t = 1. From past reports, the
planner has beliefs p 2
not bind at t
( ). Also, as in the iid case, since the sustainability constraint does
1, the standard Revelation principle applies and the agent will report his type
truthfully (let m denote the message corresponding to type .) Thus, as in Fernandes and
Phelan (2000), from time t
type. At time 1, let
1 (v; p)
2 we can replace the posterior of the planner with the agent’s
1 (v; p)
=
be de…ned as
max
fu(m);w(m; )gm2M
1; 2
subject to
v
i
=
X
m;
j
i
X
p
i
E
1C
(u) +
2 (w;
i
u (m ) + w (m ; ) j
xx
i
; 8i
)j
i
and
u m0 + w m0 ;
u (m ) + w (m ; )
The constraints are linear in (u; w), hence, if (u; w),
2 (w;
; 8m ; m0 ; :
), and
equation for some (v; p), it is immediate to see that (x u; x w),
also solve the Bellman equation for (x v; p) ; x > 0. Thus,
1 (v; p)
xa
1 (v; p)
solve the Bellman
2 (w;
), and xa
1 (v; p)
is homogenous in v. Also,
since the objective function is linear in p and the constraints are independent of p,
1 (v; p)
is
convex in p.
At time 0, for any reporting strategy
0 (v;
)=
2
(M0 ) ; let
max
E [
fu(m);w(m; )gm2M
0 (v;
0C
) be de…ned as
(u) +
1 (w; p)]
0; 2
subject to
p ( jm) = P
(mj )
( ;
whenever de…ned, (34), and (75), where
linear in (u; w) and
If
=
un
)2
P
2
2
(mj )
j
j
is the planner’s initial prior. Again, constraints are
1 (v; p)
is homogenous in v, thus, 0 (v; ) will also be homogenous in v.
P
P
un (mj )
j
> 0, then
is uninformative and Pr (m) =
2
2
p ( jm) =
un
(mj )
P
2
j
=
Pr (m)
X
2
j
:
and the optimal allocation (uun ; wun ) is uun (m) = u and wun (m; ) = w ( ) for all . Suppose
instead that
is informative, then there exist m0 , m00 , and
By convexity of
1
in p,
E
1
wun ; pin
E [
1 (w
un
such that pin ( jm0 ) 6= pin ( jm00 ).
; pun )] :
Finally, if the distribution of types is such that no bunching is desirable under commitment,
the latter implies
0 (v;
)>
0 (v;
un ).
To prove Proposition 5 we need the following Lemma.
Lemma 18 Pr (uv;p (m; z) ! 0) ! 1 and Pr (wv;p (m; z; ) ! 0) ! 1 as v ! 0, for all m; ;
and p.
xxi
Proof. From (34) for all p we have
Z
d j
v
=
v;p (dmj )
Z Mt Z
d j
[ uv;p (m; z) +
=
Z
Z
d j
[ uv;p (m;
~ z) +
Z
Z
[ uv;p (m;
~ z) + wv;p (m;
~ z;
ZZ
wv;p (m; z; ) dz, 8m; :
[ uv;p (m; z) + wv;p (m; z; )] dz
wv;p (m; z; )] dz, m 2 Supp (
v;p (
j ))
wv;p (m;
~ z; )] dz, 8m
~
)] dz, 8m;
~ .
Z
Here the fourth and …fth lines follow from nonnegativity of u and w; and the third line follows
R
from (75). Thus, limv!0 Z wv;p (m; z; ) dz = 0, 8m; ; p: Analogous arguments prove that
R
limv!0 Z uv;p (m; z) dz = 0, 8m; p. Since uv;p and wv;p are bounded below by 0; the latter
implies that Pr (uv;p (m; z) ! 0) ! 1 and Pr (wv;p (m; z; ) ! 0) ! 1 for all m; ; and p.
Proof of Proposition 5. Let
Z
uv;p (m; z) =
Mt
be any uninformative strategy. Let
d j
d
v;p (dmj
) uv;p (m; z)
and
wv;p (m; z; ) =
1
Z
v;p (dmj
) [ uv;p (m; z) + wv;p (m; z; )]
1
uv;p (m; z) :
Mt
Pro…le (uv;p ; wv;;p ; ) is incentive compatible and satis…es
Z
d j
[ uv;p (m; z) + wv;p (m; z; )] dz
v;p (dmj )
Mt Z
Z
[ uv;p (m; z) + wv;p (m; z; )] dz
=
d j
Z
Z
Z
=
d j
uv;p (m; z) +
v;p (dmj ) [ uv;p (m; z) + wv;p (m; z; )]
Z
Mt
Z
=
d j
[ uv;p (m; z) + wv;p (m; z; )] dz = v
v;p (dmj )
uv;p (m; z) dz
Mt Z
Therefore the value of the objective function (74) evaluated at (uv;p ; wv;p ;
v;p )
should be
higher than evaluated at (uv;p ; wv;p ; ) ;
Z
Z
p d
E
p d
E
Z
Z
uv;p
v;p
v;p
h
uv;p
tC
(uv;p ) + ^ t+1 kt+1 (wv;p ; p0 )
t Wt ( v;p ; p)
0
^
t C (uv;p ) + t+1 kt+1 wv;p ; p
xxii
dz
t Wt ( ; p) j
(76)
i
dz
From Lemma 18, Pr (uv;p (m; z) ! 0) ! 1 and Pr (wv;p (m; z; ) ! 0) ! 1 for all m; ; and p
and, thus, Pr (uv;p (m; z) ! 0) ! 1 and Pr (wv;p (m; z; ) ! 0) ! 1 for all m; ; and p: Also,
similarly to the iid case, Lemma 3 in Acemoglu et al. (2008) implies that it is su¢ cient to
randomize among only a …nite number of points fuv;p ; wv;p ;
Z
v;p (dmj
)
d j
Mt Z
t
Z
(Wt (
v;p ; p)
R
t Z
for all p. Since Wt (
Pr (
v;p
(uv;p (m) uv;p (m))
C (uv;p (m)))
t (C (uv;p (m))
0
^
+ t+1 (kt+1 (wv;p ; p ) kt+1 (wv;p ; p0 ))
Wt ( ; p)) dz
(Wt (
v;p ; p)
Wt ( ; p)) dz. Hence, in the limit equation (76) becomes
Z
lim sup t
(Wt ( ; p) Wt ( v;p ; p)) dz 0;
v!0
uous in
Therefore, for each p
Z
converges to
Pr (Wt (
p d
v;p g.
v;p ; p)
v;p ; p)
Z
Wt ( ; p) by Lemma 17 and
t
> 0 by assumption,
! Wt ( ; p)) ! 1 as v ! 0 for all p: By Lemma 17, Wt ( ; p) is contin-
and achieves its minimum only at uninformative reporting strategies, therefore
! ) ! 1 for all p:
xxiii
dz