@article{Tamuz_Vardi_Ziani_2018, title={Non-Exploitable Protocols for Repeated Cake Cutting}, volume={32}, url={https://ojs.aaai.org/index.php/AAAI/article/view/11472}, DOI={10.1609/aaai.v32i1.11472}, abstractNote={ <p> We introduce the notion of exploitability in cut-and-choose protocols for repeated cake cutting. If a cut-and-choose protocol is repeated, the cutter can possibly gain information about the chooser from her previous actions, and exploit this information for her own gain, at the expense of the chooser. We define a generalization of cut-and-choose protocols - forced-cut protocols - in which some cuts are made exogenously while others are made by the cutter, and show that there exist non-exploitable forced-cut protocols that use a small number of cuts per day: When the cake has at least as many dimensions as days, we show a protocol that uses a single cut per day. When the cake is 1-dimensional, we show an adaptive non-exploitable protocol that uses 3 cuts per day, and a non-adaptive protocol that uses n cuts per day (where n is the number of days). In contrast, we show that no non-adaptive non-exploitable forced-cut protocol can use a constant number of cuts per day. Finally, we show that if the cake is at least 2-dimensional, there is a non-adaptive non-exploitable protocol that uses 3 cuts per day. </p> }, number={1}, journal={Proceedings of the AAAI Conference on Artificial Intelligence}, author={Tamuz, Omer and Vardi, Shai and Ziani, Juba}, year={2018}, month={Apr.} }