Mathematical Proofs for Truthful Rebate Mechanisms (TFRM)

Written by escholar | Published 2025/07/01
Tech Story Tags: blockchain-economics | transaction-fee-mechanisms | allocative-efficiency-(ae) | user-incentive-compatibility | miner-incentive-compatibility | robust-tfrm-(r-tfrm) | vcg-mechanism | blockchain-fee-rebates

TLDRThis appendix presents formal mathematical proofs for theorems and claims introduced in Sections 4–7 of the TFRM study, validating redistribution and truthfulness constraints.via the TL;DR App

Table of Links

Abstract and 1. Introduction

  1. Related Work

  2. Preliminaries

    3.1 TFMs: Desirable Properties

    3.2 Groves’ Redistribution Mechanism (RM)

  3. IDEAL-TFRM: Impossibility of Achieving Strictly Positive Redistribution Index

  4. Transaction Fee Redistribution Mechanism (TFRM)

  5. R-TFRM: A TFRM Robust to Miner Manipulation

    6.1 R-TFRM: Analyzing Impact of Miner Manipulation on Rebate and Miner Revenue

  6. R2-TFRM: Robust and Rational TFRM

  7. Conclusion and References

A. Proofs for Results from Section 4 and 5

B. Proofs for Results from Section 6

C. Proofs for Results from Section 7

A PROOFS FOR RESULTS FROM SECTION 4 AND 5

A.1 Proof of Theorem 2

Theorem (Ideal-TFRM Impossibility). Ifπ‘Ÿ β˜… is an anonymous rebate function that satisfies Theorem 1, no Ideal-TFRM can guarantee a non-zero redistribution index (RI) in the worst case.

A.2 Proof of Theorem 3

B PROOFS FOR RESULTS FROM SECTION 6

B.1 Proof of Claim 1

B.2 Proof of Claim 2

B.3 Proof of Claim 3

B.4 Proof of Claim 4

B.5 Proof of Theorem 4

Theorem*. For any𝑛 and π‘˜ such that𝑛 β‰₯ π‘˜+2, the R-TFRMmechanism is unique. The fraction redistributed to the top-k users in the worst-case is given by:*

B.6 Proof of Theorem 5

C PROOFS FOR RESULTS FROM SECTION 7

C.1 Proof of Theorem 6

C.2 Proof of Theorem 7

Proof. Similar to Theorem 5, the fraction of redistribution remains constant. For every true user (not fake), the π›Όπ‘˜/𝑛 fraction of the payment is returned back as the rebate in expectation.

Authors:

(1) Sankarshan Damle, IIIT, Hyderabad, Hyderbad, India (sankarshan.damle@research.iiit.ac.in);

(2) Manisha Padala, IISc, Bangalore, Bangalore, India (manishap@iisc.ac.in);

(3) Sujit Gujar, IIIT, Hyderabad, Hyderbad, India (sujit.gujar@iiit.ac.in).


This paper is available on arxiv under CC BY 4.0 DEED license.


Written by escholar | We publish the best academic work (that's too often lost to peer reviews & the TA's desk) to the global tech community
Published by HackerNoon on 2025/07/01