Effective Communication in Cheap-Talk Games††thanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments.
This paper presents equilibrium selection arguments based on learning and dominance in the Crawford and Sobel (1982) model of cheap talk. Our starting point is to restrict players to monotonic strategies with respect to an exogenous ordering of messages. That by itself does not alter equilibrium outcomes. However, under a standard regularity condition, robust best-response dynamics from arbitrary initial conditions converges to a unique equilibrium: the “most informative” equilibrium with “maximally exaggerated” language. We also offer a process of iterated deletion of weakly dominated strategies that selects the same equilibrium.
JEL
Classification Numbers: C72, D83.
Keywords: Communication, Learning, Dominance, Equilibrium Selection.
1 Introduction
Talk is a useful way to communicate private information in strategic situations, as formalized by Crawford and Sobel (1982) and Green and Stokey (2007). However, these—and other—models of cheap talk typically have multiple equilibrium outcomes, including an uninformative one in which no information is transmitted. A central concern in the literature has been finding conditions under which communication is effective, that is in which the predicted outcome involves non-trivial information transmission.
This paper contributes to that effort. We develop arguments that lead to the selection of equilibria with effective communication in the Crawford and Sobel (1982) (hereafter CS) model. We present two sets of arguments, one based on learning (best-response dynamics) and one based on deductive reasoning (iterated dominance). Although the approaches are distinct, there is a common thread. In either case, we obtain the same selection of not only the payoff-relevant outcome, but also the use of language.
The CS model has an informed Sender communicating to an uninformed Receiver. The Receiver responds to the Sender’s message by making a decision that is payoff relevant to both players. Talk is cheap because neither party’s payoffs depend directly on the message. CS characterize the set of equilibrium outcomes in a one-dimensional environment with an “upward-bias” conflict of interest: the Sender always prefers higher decisions than the Receiver. There is a finite upper bound, , on the number of distinct actions that the Receiver takes in equilibrium; for each , there is an equilibrium in which the Receiver takes distinct actions. In addition, under a regularity condition (“Condition M” in CS), the equilibrium outcome for each such is unique, and the ex-ante expected payoff for both Sender and Receiver is strictly increasing in . The outcome with actions is typically what applications focus on.
The multiple-equilibria problem arises in three different ways in cheap-talk games. First, some messages may not be used in equilibrium, and there will typically be many specifications of the Receiver’s off-path behavior that support the equilibrium. This kind of off-path indeterminacy is familiar in games with incomplete information. The second kind of multiplicity, message indeterminacy, is about which messages are used in equilibrium and their meaning. Given any equilibrium, one can generate another equilibrium by permuting the interpretation of messages. This reflects an arbitrariness of language. It would be of limited concern if all equilibria induce the same mapping from Sender types to Receiver actions.111The word used to describe the color of a white house in Paris is “blanche” and in Warsaw is “biały”. What matters is that French speakers and Polish speakers classify the same set of houses as white (and their audiences understand that) rather than the particular word used to describe the color.
However, there is a more problematic kind of multiplicity, outcome or type-action indeterminacy. Cheap-talk games invariably have an uninformative equilibrium222To be precise, they typically have many uninformative equilibria when one takes into account the first two kinds of multiplicity., but often also have informative equilibria in which the Receiver takes at least two different actions with positive probability. In the CS model, this arises when the conflict of interest is not too large, and the aforementioned upper bound is at least . Indeed, as grows unboundedly as conflict vanishes, the outcome multiplicity can be severe. It is this kind of multiplicity that we are primarily concerned with. Our approach to addressing it, however, starts from a hypothesis that mitigates the degree of message indeterminacy.
Formally, we augment the CS model with a total order on the message space (taken to be finite, of size at least ) and restrict players to strategies that are monotonic with respect to that order. This defines a monotonic cheap-talk game. We view this formulation as a way to incorporate exogenous meaning or conventions into communication: players enter the strategic setting with a shared ordering of messages and it is common knowledge that they will behave in a way that is consistent with this ordering. Monotonic strategies rule out certain kinds of message indeterminacy: it allows for grades B and A to respectively mean “average” and “above average” in one equilibrium, while they could respectively mean “above average” and “excellent” in another equilibrium; but B can never mean “above average” when A means “average”.333We do not suggest, of course, that nonmonotonic strategies are never relevant; consider irony or sarcasm. We are concerned with settings in which players do not entertain such language use—grading being one example.
The idea that convention governs the interpretation of messages follows Lewis (1969); modeling it as a common-knowledge restriction on which strategies players use follows Myerson and Weibull (2015). Importantly, our monotonicity restriction alone does not rule out any equilibrium outcome of the CS game. Players have monotonic best responses to monotonic opponent strategies, and by itself, the monotonicity convention only restrains how language can be used to support equilibrium outcomes. However, classic approaches to equilibrium selection, which generally appear to have no bite absent the monotonicity convention, are now fruitful.
Our first approach is based on best-response dynamics. Starting from an arbitrary pair of monotonic Sender and Receiver strategies, we study the iteration of robust best responses for each player. Robustness handles indifference: how a player chooses between multiple best responses stemming from either off-path messages (for the Receiver) or on-path multiplicity (for the Sender). Roughly, a strategy is a robust best response to some opponent strategy if all small perturbations of the opponent’s strategy have best responses close to . Each player has a unique (up to a measure-zero qualification) robust best response to any opponent strategy. We establish in Proposition 1 that under the CS regularity condition, the iteration of robust best responses from arbitrary initial conditions in the monotonic-cheap talk game converges to a unique strategy profile, which is an equilibrium. This equilibrium uses only the highest messages, and its outcome is the -action outcome of CS.
Our second approach is based on iterated dominance. Throughout, by “dominance” we mean “weak dominance”. As the cheap-talk game is a sequential-move Bayesian game, we view the appropriate notion of dominance to be interim dominance: the standard notion of dominance must hold for each type (up to a measure-zero qualification) of the Sender; and on the Receiver side, for each message that is received with positive probability.444So a Sender strategy interim weakly dominates against a set of Receiver strategies if all (except perhaps a set of measure zero) Sender types weakly prefer to against every Receiver strategy under consideration, and a positive measure of types strictly prefer to against some Receiver strategy. A Receiver strategy interim weakly dominates against a set of Sender strategies if the Receiver weakly prefers to no matter which positive-probability message is sent by any of the Sender strategies, and there is some positive-probability message under some Sender strategy such that the Receiver strictly prefers to . We study a process of iterated deletion of interim weakly dominated strategies (IDIWDS) in the monotonic cheap-talk game. This process is related to robust best response iteration, but iterative deletions are justified by iterative applications of interim dominance. Proposition 2 establishes that, under the CS regularity condition, our process of IDIWDS selects a unique strategy profile, which is an equilibrium—the same equilibrium as selected by robust best-response iteration. As interim dominance implies dominance (and because there is a unique surviving strategy profile), this process also yields the same selection through iterated deletion of weakly dominated strategies.
The upshot is that both our selection results identify not only the -action outcome, but an equilibrium in which that is induced via the highest messages. In other words, there is maximal exaggeration or inflated language. We find this intuitive in light of the Sender’s upward bias, and experimental tests of the CS model do show evidence of inflated language (Cai and Wang, 2006; Wang, Spezio, and Camerer, 2010).
The proofs for both our approaches operate via an analysis of two sequences of strategy profiles. The sequences are defined by specifying extreme initial conditions—one “highest” and one “lowest”—and then iterating robust best responses. The highest (resp., lowest) initial condition is that the Receiver takes the highest (resp., lowest) undominated action in response to every message and the Sender always sends the lowest (resp., highest) message. We show that the sequences defined by iteration from these conditions are suitably monotone—the highest sequence decreases while the lowest sequence increases—and they both converge to equilibria. We then appeal to Chen, Kartik, and Sobel’s (2008) no-incentive-to-separate (NITS) condition on equilibria. They showed that any -action outcome always satisfies NITS, and it is the unique NITS outcome under CS’s regularity condition. We establish that so long as there is a unique NITS outcome, our two sequences have a common limit (Theorem 1/Proposition 1). This limit equilibrium satisfies NITS and hence induces actions. Moreover, it is the highest messages that are used in this equilibrium; all lower off-path messages would elicit the lowest undominated action, in line with NITS’s defining property. We thus provide a foundation for the NITS condition. Our results on robust best-response iteration follow because any sequence of robust best responses, starting from an arbitrary initial condition, must be sandwiched between the highest and lowest sequences. Our results on IDIWDS follow because we can show that strategies larger than the higher limit or lower than the lower limit are eventually deleted by our process. The exact process of iterated deletion involves nuances to deal with unused messages, but roughly speaking involves deleting in each round (on the basis of interim dominance) all strategies that are more extreme than the highest and lowest sequences’ strategies.
As mentioned at the outset, there has been substantial interest in refining predictions in cheap-talk games, including specifically for the CS model. We defer a detailed discussion of the literature to Section 6. Here we just note that each element of our approach has antecedents. For example, Kartik (2009) and Chen (2011) also appeal to monotonic strategies in variants of the CS model (they use it as an equilibrium refinement in games with lying costs or nonstrategic types); whereas iteration of best responses and dominance are classical game-theoretic refinements. Our results show how powerful these classical approaches become in the (unperturbed) CS model, under the restriction to monotonic strategies. But cheap talk introduces some subtle issues in the iteration arguments stemming from indifferences. Hence we appeal to robust best response iteration, and also offer only a specific—although broadly intuitive—order of elimination for IDIWDS. We do not prove that the outcome is order independent, although we conjecture that it is.
Outline.
The remainder of the introduction presents a simple example to illustrate ideas. Section 2 introduces the monotonic cheap-talk game we study and some basic properties of equilibria. Section 3 develops our key concepts of robust best responses and dominance. Section 4 shows how our iterative arguments work in a uniform-quadratic two-message example, providing intuition for the formal arguments. Section 5 then presents the main results. Section 6 discusses related literature. Omitted proofs are in the appendices.
1.1 A Common-Interest Example
The example below does not fit into our main model, but it provides the simplest illustration of how monotonicity in conjunction with dominance/learning arguments can yield selection in a cheap-talk game.
There are two equiprobable Sender types (high and low), two Receiver actions (also high and low, and ), and two messages the Sender chooses from (also high and low, and ). Both players receive a payoff of two if the action matches the type and a payoff of zero otherwise. A pure strategy for the Sender is a pair where the Sender sends message when her type is low and when her type is high. Similarly, a Receiver pure strategy is a pair where is the action taken after message low and after message high. The strategic form of the game is given in the following table, where rows correspond to Sender strategies and columns to the Receiver.
|
|
There are two efficient pure-strategy equilibria, and , in which the Sender distinguishes between the states and the Receiver correctly interprets this information. The former is more intuitive than the latter, as the latter flips the natural association of types with messages and messages with actions. But the game also has an uninformative and ex-ante Pareto inefficient equilibrium in which the Sender mixes uniformly between and and the Receiver mixes uniformly between and .555There are also other inefficient equilibria, in pure and mixed strategies. The mixed-strategy equilibrium, as well as both efficient pure-strategy equilibria, satisfy standard refinements from perfection to strategic stability.
Our approach is to replace the original game by a game in which non-monotonic strategies are not available. Monotonicity here is with respect to the natural ordering on messages (), types (lowhigh), and actions (). The strategic form of the monotonic cheap-talk game is:
|
|
Deleting non-monotonic strategies has eliminated some inefficient equilibria but it does not eliminate any equilibrium outcome, i.e., equilibrium mapping from types to (distributions over) actions. In particular, the previous mixed-strategy equilibrium outcome is replicated in an equilibrium where the Sender plays (or ) and the Receiver mixes uniformly over and . However, weak dominance now selects the equilibrium, which is efficient. Note that weak dominance has no power in the original game. It is the combination of monotonic strategies—which eliminates certain (but not all) kinds of message indeterminacy—and an equilibrium refinement that yields selection.
Instead of applying weak dominance in the monotonic game, we can also obtain the same selection through a version of best-response dynamics starting from any initial condition. For an arbitrary initial condition—in particular, an inefficient pure-strategy equilibrium—standard best-response dynamics are clearly not sufficient. Our approach is to require robust best responses: a best response such that there is a “nearby” best response to any “nearby” opponent strategy. Because of weakly dominant strategies in this example, it is straightforward that the unique robust best response to any Sender strategy is and similarly the unique robust best response to any Receiver strategy is . So one iteration of robust best responses converges to the efficient equilibrium. Again, robust best response iteration would not provide selection in the original game.666In the original game, robust best-response dynamics are not even well defined. In particular, the Receiver has no robust best response in the original game to the Sender strategy : intuitively, any nondegenerate mixture over and has a unique best response of , while any nondegenerate mixture over and has a unique best response of . Thus, no single Receiver strategy has a “nearby” best response to each Sender strategy “near” .
Balkenborg, Hofbauer, and Kuzmics (2015, Section 6) and Myerson and Weibull (2015, Example 6) use the same example to illustrate the power of other refinement arguments. Both papers also select an efficient outcome, but not by the route of monotonicity. Balkenborg, Hofbauer, and Kuzmics eliminate the Sender strategies and on grounds of not being “refined best responses” (cf. footnote 10) and point out that only the efficient outcomes are locally stable equilibria of a best-response dynamic that avoids those strategies. Myerson and Weibull show that only the efficient equilibria satisfy their notion of being “settled”. These approaches are defined for finite games; we are not aware of existing extensions to infinite games like that of CS.
2 Model
2.1 The Cheap-Talk Game
We start from the CS model (Crawford and Sobel, 1982). There are two players. A Sender privately observes his type drawn from a continuous density on . The Sender then sends a message from a set , where is large enough (elaborated below). The Receiver observes and chooses an action . Payoffs are for the Sender and for the Receiver. For each player , the payoff function is twice continuously differentiable, strictly concave in (), and strictly supermodular (), where subscripts denote partial derivatives as usual. Each player has a type-dependent ideal action, .
Assume the Sender has an upward bias: for all . We normalize and ; this implies that we can restrict attention to actions in , as other actions are strictly dominated for the Receiver.777The sender’s ideal action exceeds for some types, but for those types the most preferred “feasible” action is .
2.2 The Structure of Equilibria
A pure strategy for the Sender is a mapping , while a pure strategy for the Receiver is a mapping . The notion of equilibrium is Bayes-Nash. An equilibrium outcome is the mapping from types to (distributions over) actions.
CS demonstrate that for equilibrium outcomes (and up to measure zero sets of types) it is without loss to consider only pure strategy equilibria. There is a positive integer such that for every , there is an equilibrium in which there are induced actions (i.e., actions played with ex-ante positive probability); moreover, there is no equilibrium that induces strictly more than actions. For any , let
| (1) |
be the Receiver’s optimal action when she only learns that the Sender’s type lies in . Any equilibrium can be characterized by cutoffs , and actions such that
| (2) |
for , and
| (3) |
for . Any equilibrium has distinct messages played with positive probability and types in pooling on a common message. Condition (2) states that the cutoff types are indifferent between pooling with types immediately below or immediately above. Condition (3) states that the Receiver best responds to information in the Sender’s message. Ranging over , conditions (2) and (3) fully characterize all the equilibrium outcomes (up to measure zero sets, stemming from the Sender’s behavior at the cutoffs; we ignore measure-zero qualifications hereafter).
In general, there can be multiple equilibrium outcomes for a given . CS introduce a technical regularity condition (Condition “(M)” in their paper) that guarantees uniqueness for each .888For completeness, we restate their condition here. For , let A (forward) solution to (2) of length is a sequence such that for and . CS’ regularity condition requires that for any two solutions to (2) of length , and with and , it holds that for all . The condition is satisfied, in particular, by the leading “uniform-quadratic” example in CS, which has been the focus of many applications. Here the prior density is on , the Receiver’s utility is , and the Sender’s utility is for some bias parameter .
CS prove that when the regularity condition holds, then not only is there a unique equilibrium outcome for each , but moreover, the ex-ante equilibrium expected utility for both the Sender and Receiver is strictly increasing in . That provides one argument for the salience of the equilibrium outcome.
Our analysis will use the following condition from Chen, Kartik, and Sobel (2008).
Definition 1.
An equilibrium satisfies No Incentive to Separate (NITS) if
NITS states that the lowest type of the Sender prefers her equilibrium payoff to the payoff she would receive if the Receiver knew her type (and responded optimally). Chen, Kartik, and Sobel (2008) show that every equilibrium with induced actions satisfies NITS, and that under CS’ regularity condition, only the unique equilibrium outcome with actions satisfies NITS.
2.3 The Monotonic Cheap-Talk Game
So far, the message space has been abstract. From now on, we assume it is finite and ordered: where is a positive integer and for each . Here “” denotes the order on ; one can take . We are interested in settings with , where is the upper bound on equilibrium actions described in the previous subsection. However, as the backbones of our analysis hold even when , we only invoke when necessary.
Our key assumption is that players can only use monotonic strategies: mappings for the Sender and for the Receiver that are (weakly) increasing. We study the monotonic cheap-talk game in which players’ (pure) strategy sets are the monotonic strategies. Denote the Receiver’s (pure) monotonic strategy set by and the Sender’s (pure) monotonic strategy set by .
As discussed in the introduction, we view imposing such monotonicity as capturing a shared language convention. Given the Sender’s upward bias, we view it as plausible that higher types must use higher messages, and the Receiver must interpret higher messages accordingly. While the original game allows for arbitrary permutations of messages, we restrict attention to strategies where the ordinal ranking of messages is preserved in use and interpretation.
Monotonicity by itself does not alter the set of equilibrium outcomes. Given any equilibrium of the original game with cutoffs , the same outcome obtains in an equilibrium of the monotonic cheap-talk game. In particular, we can support the outcome using only the highest messages: for each , the pool sends message , and the Receiver responds to message with . Off path, the Receiver can, for example, respond to any message (where ) with the lowest on-path action, .
Nevertheless, focusing on monotonic strategies is restrictive in two ways. The less-important aspect is that either player may have non-monotonic best responses to a monotonic strategy of the opponent. This is due to indifferences. Specifically, the Sender’s (unique) best response to any strictly monotonic Receiver strategy is monotonic, and the Sender always has a monotonic best response to any monotonic Receiver strategy. But if the Receiver takes the same action after two messages, the Sender could optimally choose between them non-monotonically. Similarly, the Receiver has a monotonic best response to any monotonic Sender strategy, and any Receiver best response must be monotonic over the messages that the Sender uses with positive probability (i.e., on path). But if there are unused messages, the Receiver could optimally respond to those in a manner that violates monotonicity.
A more fundamental issue is that the Receiver may have only non-monotonic best responses to mixtures of monotonic Sender strategies.999For example, suppose types are uniformly distributed and there are three messages: . Consider two monotonic Sender strategies: one sends for and otherwise; the other sends for and otherwise. Under a 50-50 mixture of those two strategies, . Hence, a Receiver with quadratic-loss utility (under which the optimal action is the expected type) only has non-monotonic best responses even on path. Intuitively, this is because a message may reveal information about which strategy in the mixture was played, shifting the Receiver’s posterior in ways that can break action monotonicity. This means that in the original game, even if the Receiver conjectures that the Sender uses only (mixtures of) monotonic strategies, best responses or dominance need not deliver monotonic Receiver strategies.
3 Key Concepts
For our analysis, it is convenient to view monotonic (pure) strategies as -dimensional vectors, where is the number of messages. Abusing notation a little, a monotonic Sender strategy is a vector of cutoffs satisfying
Types in the interval send message , and type sends message . When , message is unused by the strategy . A monotonic Receiver strategy is a vector of actions satisfying
Upon receiving message , the Receiver takes action .
Hereafter, “strategy” without qualification should be understood as a “(pure) monotonic strategy” and viewed as a vector with increasing coordinates.
3.1 Robust Best Responses
We compare vectors, and hence strategies, using the component-wise order. We use the sup norm on vectors: and similarly for actions. Convergence of strategies (e.g., or ) is with respect to this norm.
Definition 2.
A strategy for either player is a robust best response to opponent strategy if for every there exists such that: if , there exists a best response to with .
Intuitively, a strategy is a robust best response (RBR) if small perturbations of the opponent’s strategy have nearby best responses.101010Our notion is related to that of a “refined best response” in Balkenborg, Hofbauer, and Kuzmics (2013, 2015). They study finite normal-form games and require a refined best response to remain exactly optimal against certain nearby opponent strategies. A natural adaptation of their concept to continuous strategy spaces would be that a strategy is a refined best response if there is some sequence of nearby opponent strategies whose unique best responses converge to that strategy. Our RBR definition is stronger: it requires that every nearby opponent strategy admits a nearby best response. Hence RBRs may not exist absent our restriction to monotonic strategies, whereas (the adaptation of) refined best responses do exist. One can show that convergence of the iteration in the monotonic cheap-talk game is guaranteed under either notion and yields the same limit; without the monotonicity restriction, the iteration of refined best responses will generally not converge, though when it does, the limit outcome is the same as in the monotonic game. This rules out best responses that are only justified by knife-edged indifferences; in particular, it pins down Receiver actions after unused messages and pins down Sender tie-breaking when there are multiple messages that lead to the same action.
For example, there are many best responses to the Sender’s strategy because this strategy does not use message . However, the unique RBR prescribes action in response to , because any best response to a strategy with must prescribe an action close to after message . Similarly, any Sender strategy is a best response to the Receiver strategy . However, assuming , which implies for some , the unique Sender RBR is , i.e., message for types , and message for types .
To describe the Sender’s RBR in general, fix a Receiver strategy . Each Sender RBR cutoff is the type that is indifferent between adjacent actions, or the relevant boundary type if there is no indifferent type. Formally, for each , define as follows:
-
•
If : the unique type indifferent between and , or if all types prefer , or if all types prefer .
-
•
If : the type for whom is the ideal action, or if , or if .111111Given the Sender’s upward bias and our normalization of and , this last case of can be ignored when we restrict attention to actions in .
The Sender’s RBR to is .
Lemma 1.
Each player has a unique robust best response to any opponent strategy, and this robust best response is continuous and increasing in the opponent’s strategy.
Below, we will consider iteration of RBRs. We interpret such iteration as adaptive best-response dynamics, in which RBRs provide a form of protection against slight noise in expectations of opponent behavior.
3.2 Bounding Sequences
Our analysis revolves around two sequences of strategy profiles, generated by iterating RBRs from extreme initial conditions. The highest (in vector order) initial conditions are:
Under , all types send message ; under , all messages lead to action . The lowest initial conditions are:
Under , all types send message ; under , all messages lead to action .
Now iteratively define and as follows, for integers :
Lemma 2.
The sequences and are ordered, monotonic, and converge to equilibria:
-
1.
and for all ;
-
2.
and for all ;
-
3.
and for all ;
-
4.
, , , and ;121212In other words, converges, with its limit denoted , and so on.
-
5.
The limits and are equilibria in robust best responses.
These two sequences and underpin both of our selection arguments. In particular, for our learning-based selection, we will show that any robust best-response sequence starting from arbitrary initial conditions is sandwiched between these bounds; hence when the bounds have a common limit, so does every RBR sequence.
3.3 Dominance
We define the dominance notion here; the formal iterated deletion procedure and results are in Section 5.2.
Definition 3.
Fix sets of monotonic strategies and .
-
1.
A Receiver strategy interim (weakly) dominates relative to if:
-
(a)
for every and every message sent with positive probability under (i.e., ), action yields higher expected payoff than does conditional on the pool of types sending ; and
-
(b)
for at least one such pair , the expected payoff is strictly higher from than from .
-
(a)
-
2.
A Sender strategy interim (weakly) dominates relative to if:
-
(a)
for every and almost every type , type prefers the induced action under to that under ; and
-
(b)
there exist and a positive-measure set such that, against , every type strictly prefers the induced action under to that under .
-
(a)
It is natural to consider interim (rather than ex-ante) dominance because the Sender observes his type while the Receiver observes the message.131313Shimoji and Watson (1998) define a related notion of “conditional dominance” for finite extensive-form games, ruling out strategies with actions that are strictly dominated conditional on reaching an information set. For both players, interim dominance implies ex-ante dominance (or just dominance, for short).141414Let be player ’s expected payoff from the strategy profile . Fix any and . A Receiver strategy (weakly) dominates a strategy if for every , with strict inequality for some . Sender dominance is analogous. The converse is not generally true because interim dominance does not allow for the compensation across messages/types that dominance permits.
We will see that the limits and characterize the set of strategies that survive a process of IDIWDS. Roughly, we will show that at each round of deletion , strategies outside the bounds and are interim dominated at that round. The formal treatment in Section 5.2 is a little more involved because it must overcome an issue that the Sender’s robust best responses may leave low messages unused, while interim dominance for the Receiver only has bite at on-path messages.
4 A Two-Message Uniform-Quadratic Example
Before presenting the formal results, we illustrate the main ideas using the uniform-quadratic specification with bias . This is the range in which the underlying CS cheap-talk game has precisely two equilibrium outcomes: an uninformative one in which action is induced by all types; and an informative outcome in which types below induce action , while types above induce action .
Consider the monotonic cheap-talk game with two messages: , with . A Sender strategy is then described by a single cutoff : types below send , and types above send . A Receiver strategy is with , where each is the response to message .
4.1 Robust Best-Response Iteration
For the uniform-quadratic specification, robust best-response iteration from any , as defined in Section 3.1, yields:
| (4) | ||||
| (5) |
The equations in (4) reflect that the Receiver’s optimal action after each used message is her conditional expectation of the Sender’s type. Equation 5 reflects that the indifferent type (if it exists) is below the midpoint of the actions, with the max operator accounting for the possibility that all types prefer the higher action.
For , substituting Equation 4 into Equation 5 and vice versa (and using ) yields:
| (6) | ||||
| (7) |
It is now straightforward to verify that converges to
which match the informative equilibrium outcome. This means that an uninformative equilibrium is not the limit of any robust best-response sequence, no matter the initial conditions. In particular, although the uninformative Sender strategy with is a best response to the constant Receiver strategy , the Sender’s (unique) robust best response is the informative strategy , to which is not a best response.
We next consider our two bounding sequences.151515In this example, we already established that all robust best-response sequences have a common limit. What is more general is that the bounding sequences sandwich all robust best-response sequences. Moreover, the bounding sequences are crucial for our iterated dominance arguments, even in this example. The lower bounding sequence starts from and ; the upper bounding sequence starts from and . Because , , and , the lower sequence increases towards the fixed point; because , , and , the upper sequence decreases towards the fixed point. We see from (6) and (7) that any robust best-response sequence is sandwiched between these two sequences. Table 1 illustrates the two sequences numerically when .
| 0 | 0 | (0, 0) | 1 | (1, 1) |
|---|---|---|---|---|
| 1 | 0 | (0, 0.5) | 0.9 | (0.5, 1) |
| 2 | 0.15 | (0, 0.5) | 0.65 | (0.45, 0.95) |
| 4 | 0.225 | (0.075, 0.575) | 0.475 | (0.3, 0.8) |
| 6 | 0.2625 | (0.1125, 0.6125) | 0.3875 | (0.225, 0.7375) |
| limit | 0.3 | (0.15, 0.65) | 0.3 | (0.15, 0.65) |
4.2 Iterated Deletion of Dominated Strategies
We now explain how the bounding sequences also characterize a process of iterated deletion of interim (weakly) dominated strategies.
Round 1: We assess interim dominance relative to all monotonic strategies, and .
-
•
For the Receiver, any strategy with is interim dominated: against any Sender strategy that uses (i.e., when ), action is strictly better than any after message , because the message reveals the Sender’s type is in . Symmetrically, any strategy with is interim dominated. So we can delete all Receiver strategies except those with , or equivalently, .161616No strategy within these bounds is interim dominated at this stage. For any distinct , there is a Sender strategy against which is strictly better than after , and vice-versa. An analogous point applies to . Note also that absent the restriction to monotonic Sender strategies, no Receiver strategy would be interim dominated.
-
•
For the Sender, all types strictly above weakly prefer the higher action for all Receiver strategies, and strictly so whenever . Any cutoff is thus interim dominated by , noting that types below send the same message under both cutoffs and . So we can delete all Sender strategies except those with .171717No Sender strategy within these bounds is interim dominated at this stage. Raising the cutoff from to hurts types in whenever and ; lowering the cutoff to hurts types in whenever and .
Round 2: We assess interim dominance relative to the strategies surviving from round 1. For the Receiver, given , the mean of types sending is at most and the mean of types sending is at most , so any strategy with or is interim dominated. Hence, we delete all Receiver strategies except those in . For the Sender, given , any is interim dominated; given , any is interim dominated. Hence we delete all Sender strategies except those with in .
Subsequent rounds: Reasoning analogously, in each round , interim domination relative to the surviving strategies from the previous round deletes Receiver strategies outside and Sender strategies outside . The limit of this deletion process yields the unique survivor .
This process of IDIWDS is canonical: in each round, we delete all the interim dominated strategies for each player.181818The “interim” qualification is important. As noted in Section 3.3, all interim dominated strategies are (weakly) dominated. So the current deletion process also yields selection via iterated deletion of dominated strategies. But there may be dominated strategies that are not interim dominated at any given round (hence not deleted in that round by our process), because of “cross-compensation” across types for the Sender or across messages for the Receiver. For example, one can check that in the first round, any Receiver strategy with is dominated; but it is not interim dominated as explained in footnote 16. In this example, we can show that the order of deletion does not actually matter; more generally, we do not have such a proof. Furthermore, when we allow for additional messages—in particular, when —there are nuances in our process of iterated deletion that Section 5.2 handles.
5 Results
5.1 Robust Best-Response Iteration
We write and of vectors in the component-wise sense. Recall that a sequence of robust best responses is pinned down by its initial conditions .
Theorem 1.
For any robust best-response sequence :
and consequently
The theorem says that starting from arbitrary initial conditions, the sequence generated by robust best-response iteration is sandwiched between and , and hence the players’ strategies only accumulate within and . That is, play is asymptotically bounded by the two equilibria and .191919Although it is not implied by the theorem, one can show that any robust best-response sequence converges even when (); see Olszewski (2022).
While in general the two bounding equilibria can be distinct, even in terms of outcomes, they coincide under a standard condition. To establish that, we use the following two properties of the bounding equilibria (indeed, of any equilibrium in which the Receiver’s strategy is a robust best response). The first says that all unused messages are at the bottom and elicit action , and the second says that they satisfy NITS when .
Lemma 3.
Let be an equilibrium in which is a robust best response. The set of messages unused by is a lower set: there exists such that and . Moreover, all unused messages would lead to action : if , then .
The idea is that if has an unused message above a used message , then being a robust best response to pins down its off-path action at . This in turn implies that the off-path action is either strictly between two consecutive on-path actions, or strictly above all on-path actions. Either way, some types would deviate to message , a contradiction.
Lemma 4.
Let be an equilibrium in which is a robust best response. If , then satisfies NITS.
This lemma follows from the previous one if has unused messages. If uses all messages, then induces actions, and any such equilibrium satisfies NITS.
Proposition 1.
Assume .
-
1.
Any robust best-response sequence converges to an equilibrium that satisfies NITS, and conversely any NITS equilibrium outcome is the outcome of the limit of some robust-best response sequence.
-
2.
If there is a unique equilibrium outcome satisfying NITS, then all robust best-response sequences converge to the same equilibrium, namely , which uses the highest messages.
Proof of Proposition 1.
(Part 1.) Olszewski (2022, Corollary 1) implies that any robust best-response sequence converges; the limit is an equilibrium in robust best responses by the continuity of robust best responses (Lemma 1). It follows from Lemma 4 that the limit equilibrium satisfies NITS. Conversely, take any NITS equilibrium outcome with induced actions. Specify the initial conditions such that ) induces that outcome with the highest messages used, and for any unused message (i.e., ). Robust best response iteration from these initial conditions is constant.
(Part 2.) Now assume a unique equilibrium outcome satisfying NITS. Let . As satisfies NITS (by the first part), Chen, Kartik, and Sobel (2008, Proposition 1) implies that induces actions (otherwise, there would be multiple equilibrium outcomes satisfying NITS). As all messages used by induce distinct actions under , it follows from Lemma 3 that uses the highest messages and for . As satisfies NITS and could have been either or , the hypothesis of a unique NITS outcome implies . The result now follows from Theorem 1. ∎
The first part of the proposition says that, given enough messages, robust best response iteration from arbitrary initial conditions selects only the NITS equilibrium outcomes, and all of them. This includes all the equilibrium outcomes with actions, and under some conditions, rules out all outcomes with fewer actions than some threshold (Chen, Kartik, and Sobel, 2008, Propositions 1 and 2). The second part of the proposition further says if there is a unique NITS equilibrium outcome—e.g., when CS’ regularity condition holds—then robust best response iteration selects not just the unique equilibrium outcome but also a unique equilibrium. In this equilibrium, the Sender uses maximal exaggeration (i.e., the highest messages) to induce the actions.202020Consider the case of , i.e., there are only a limited number of available messages. Lemma 3 still implies that if the limit of any robust best-response sequence has unused messages, then that limit equilibrium satisfies NITS. Hence, if no equilibrium with strictly fewer than actions satisfies NITS, then all robust best-response sequences converge to equilibria that use all messages. If, in addition, there is a unique -action equilibrium outcome, then , and all robust best-response sequences converge to the same equilibrium, whose outcome is the one with actions. Note that the CS regularity condition assures the hypotheses in both previous sentences. Indeed, in the two-message example of Section 4, the logic for robust best-response iteration (or iterated dominance) selecting the informative equilibrium did not use . If instead , then , but the arguments given there still apply verbatim to select the informative equilibrium.
5.2 Iterated Deletion of Dominated Strategies
We present a result parallel to Theorem 1 for iterated deletion of interim dominated strategies. That is, we offer a process of iterative deletion of interim dominated strategies that leads to the strategy sets
The idea of the deletion process is intuitive: roughly speaking, in every round we delete the strategies outside and . The nuance is that at some stage the upper bound may have unused low messages (i.e., for some ), in which case those messages are unused by all strategies in , and interim dominance then has no bite at those unused messages. Our argument thus involves perturbing the upper bounds. (These perturbations are not needed when , as in the example of Section 4.)
Concretely, initialize and as the sets of all monotonic Receiver and Sender strategies. We formalize in Appendix C.1 a construction of sequences , and . The first is a sequence of strictly positive numbers converging to . The latter two are perturbations of and . Each is a strictly increasing vector (so all messages are used) with , and is the robust best response to . The iterative deletion process is that for each :
-
(R)
is obtained from by deleting every such that .
-
(S)
is obtained from by deleting every such that
We refer to this process of iterated deletion as the bounding-sequence deletion procedure. Define its limit survivor sets
Theorem 2.
Consider the bounding-sequence deletion procedure.
-
1.
For all : each Receiver strategy in is interim dominated by some strategy in relative to ; and analogously for the Sender.
-
2.
The limit survivor sets are and .
-
3.
No Receiver strategy in is interim weakly dominated by another strategy in relative to , and analogously for the Sender.
This theorem says that the bounding-sequence deletion procedure is a valid process of IDIWDS in the sense that it deletes only interim dominated strategies at each stage, the process continues so long as there are any interim dominated strategies, and the limit sets are nonempty. As interim dominance implies dominance, the process also only deletes dominated strategies at each stage. However, it is possible in general that contains strategies that are dominated but not interim dominated. That is not an issue if is a singleton; in that case our procedure is also a valid process of IDWDS.
Proposition 2.
Assume and a unique equilibrium outcome satisfying NITS. The bounding-sequence deletion procedure is a valid process of IDIWDS (and also IDWDS) that yields a unique strategy profile. This strategy profile is the same as in Proposition 1 part 2, which is an equilibrium that satisfies NITS and induces actions.
Proof.
Proposition 1 established that, under the current hypotheses, , and this profile is an equilibrium that satisfies NITS and thus induces actions. The result follows from Theorem 2. ∎
We conjecture that results similar to Theorem 2 and Proposition 2 can be obtained for any valid ID(I)WDS procedure, not just the bounding-sequence deletion procedure. The difficulty in establishing that stems from the multiplicity of best responses.
6 Related Literature
This paper unifies ideas from earlier working papers by different subsets of the authors: Lo (2007), Gordon (2010, 2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). Our goal here is to present transparently the most significant conclusions from those unpublished papers. Those papers contain analyses for other structures of conflict of interest, and other results that are more general, or simply different, in certain directions.
Iterating best responses and (weak or strict) dominance are classical ideas. Our contribution is to combine these ideas, suitably adapted for cheap talk, with the restriction to monotonic strategies and deduce the implications in the CS (Crawford and Sobel, 1982) model. The closest published papers are Sobel (2019) and Olszewski (2022), which both stemmed from the work described here. Olszewski (2022) shows, as a consequence of his more general results on sequences of iterations, that best-response iteration converges in our setting—a fact we use in Proposition 1—but does not study properties of the limit. Sobel (2019) extends Milgrom and Roberts’s (1990) arguments for supermodular games and iterated deletion of strictly dominated strategies to a broader class of games and iterated deletion of weakly dominated strategies (IDWDS). He points out that a class of monotonic cheap-talk games212121He assumes the prior is finitely supported, which technically does not subsume our setting. satisfy a weak form of supermodularity that makes it possible to bound the set of strategies that survive a process of IDWDS. His arguments are related to ours, although his deletion process is phrased via smallest and largest best responses, rather than robust best responses.222222This distinction is not crucial; our arguments could also be made via smallest and largest best responses. Importantly, he does not characterize the bounds.
Rothschild (2013) applies iterated dominance to Gricean scalar implicatures in common-interest communication, restricting agents to only use messages that are literally true. Sobel (2017) and Lo (2021)—the latter stemming from Lo (2009)—apply iterated dominance to pre-play communication in complete-information games, with strategy restrictions on the use of language.
Blume (2025) introduces a notion of language equilibrium in cheap-talk games by iterating best replies starting from a distinguished receiver strategy, interpreted as a pre-existing language. Similar to our approach, language equilibria resolve message indeterminacy and feature language inflation in finite versions of the CS setting. Our approach differs in that selection under robust best responses arises from arbitrary initial conditions; we also discuss iterated dominance.
Farrell (1993) was the first to incorporate exogenous meaning of language into cheap-talk games. His notion of neologism-proof equilibrium is based on the idea that messages have commonly-accepted meanings that are followed so long as they are consistent with incentives. Neologism-proofness does refine the set of equilibria, but it lacks general existence properties—in particular, even in the uniform-quadratic specification of CS.
The literature contains various selection arguments for the equilibrium outcome with actions in the CS model, which we now turn to.
Mensch (2020) studies existence of monotone pure-strategy perfect Bayesian equilibrium in dynamic games. His main result concerns existence of equilibria with certain monotonicity of beliefs even off path, roughly a form of “support monotonicity”. He notes that such off-path monotonicity selects NITS equilibria in the CS model. Our monotonic-strategies restriction is weaker—hence it has no selection power over outcomes by itself—but robust best responses deliver similar off-path implications. Mensch (2020) does not study iteration of robust best responses or dominance.
Kartik (2009) and Chen (2011) assume the message space equals the type space and introduce perturbations motivated by exogenous meaning: lying costs in Kartik’s case, and behavioral types in Chen’s. When perturbations vanish in both these approaches, equilibria in monotonic strategies converge to NITS outcomes with inflated or exaggerated language, as shown in Chen, Kartik, and Sobel (2008). Our approach in this paper achieves a similar selection, but we impose monotonicity on strategies directly and then apply learning/dominance arguments rather than payoff perturbations.
Dilmé (2022) selects CS equilibrium outcomes that are robust to a class of message-cost payoff perturbations. He shows that under the CS regularity condition, only the outcome with the maximal number of induced actions is robust in this sense.232323He also extends this result when the regularity condition fails or the Sender does not have an upward (or downward) bias. Dilmé’s argument, like ours and those of the papers in the last two paragraphs, operates by showing that some unused messages must lead to low off-path actions. Dilmé does not resolve message indeterminacy.
Sémirat and Forges (2025) study finite cheap-talk games and show that a dynamic adjustment process converges to an undefeated equilibrium in the sense of Mailath, Okuno-Fujiwara, and Postlewaite (1993). Similar to us, their process converges to the largest equilibrium, but the approaches differ: their finite type space allows a fully revealing strategy, which they use as their initial condition, and their adjustments are better replies rather than best replies. They do not discuss dominance arguments.
Appendix A Proofs for Section 3
Proof of Lemma 1.
First consider the Receiver. For any , the optimal action is uniquely defined by strict concavity of for each , and it is increasing in both and by the supermodularity of . It is also continuous in . Hence for any , the strategy
is a RBR, which is continuous and increasing in . It is in fact the unique RBR, because for any that is strictly increasing, there is a unique best response to ; and any RBR must coincide with the limit of those best responses as , which is the foregoing RBR.
Now consider the Sender. For any Receiver strategy , the strategy is a RBR by the construction of described before the lemma, and an increasing sequence by the monotonicity of . That it is continuous and increasing in follows from continuity and monotonicity of . The strategy is also the unique RBR because for any that is strictly increasing, there is a unique best response vector ; and any RBR must coincide with the limit of those best responses as , which is the foregoing RBR. ∎
Proof of Lemma 2.
Part (1): Lemma 1 shows that each player RBR is monotonic in the opponent’s strategy. The result follows from induction, given that at , it holds because and are the highest strategies while and are the lowest.
Part (2): As and are the highest strategies, clearly and . Thereafter we use induction: if , then , where the inequality uses the same argument as for monotonicity of the Receiver’s RBR. Similarly, following the monotonicity for the Sender’s RBR, we get that if , then .
Part (4) follows because monotone bounded sequences converge.
Appendix B Proofs for Section 5.1
Proof of Theorem 1.
Fix any initial conditions and the sequence of RBR iterations .
We first prove by induction that for all , there is sandwiching:
The case is immediate from the definitions of the bounding sequences’ extreme initial conditions: and . For the inductive step, assume and . The monotonicity of the Receiver’s RBR to the Sender’s strategy (Lemma 1) implies that , because (by construction) each of these is the RBR to Sender strategies with the same ordering. Analogously, by monotonicity of the Sender’s RBR to the Receiver’s strategy (Lemma 1), we get .
Given the sandwiching for all , the asymptotic conclusions follow from and (which was established in Lemma 2). ∎
Proof of Lemma 3.
Consider any equilibrium in which is a robust best response to . It suffices to prove the lemma’s claim about , as the property of follows from it being a robust best response. So suppose, to contradiction, that there is an unused message greater than a used message. Letting be the first used message and the first unused message above , we have . It follows that , where the inequality is by monotonicity of and the equalities are because is a robust best response to . Moreover, the monotonicity of (and ) implies that for any used message , either or . So is an off-path action distinct from all on-path actions. If there is a used message above , then lies strictly between two consecutive on-path actions, and a positive measure of types near the type that is indifferent between those consecutive on-path actions would deviate to . If there is no used message above , then is strictly above all on-path actions, and a positive measure of types near would deviate to . Either way, we contradict being an equilibrium. ∎
Proof of Lemma 4.
Assume and consider any equilibrium in which is a robust best response. If has unused messages, then the result follows from Lemma 3, because the Sender has the option to induce . If has no unused messages, then and induces distinct actions, so Proposition 1 of Chen, Kartik, and Sobel (2008) implies that it satisfies NITS. ∎
Appendix C Proofs for Section 5.2
C.1 Constructing the Perturbed Upper Bounding Sequence
Interim dominance for the Receiver concerns on-path messages (i.e., those sent with positive probability by some relevant Sender strategy). But the upper-bounding robust best-response sequence can reach a stage at which it does not use a set of low messages, in which case all the strategies between the upper and lower bound do not use those messages. To ensure that each round admits a surviving Sender strategy that uses every message—so the Receiver’s interim comparisons have an on-path witness when needed—we perturb the upper bounding Sender sequence to have strategies that are strictly increasing, which we refer to as “activation”. Let us formalize that.
For any , let be the first used message. For any , define a self-map by , where is constructed as follows (with and ):
-
1.
for all .
-
2.
For define recursively
In other words, preserves the cutoffs for all messages used by , while perturbing cutoffs for each unused lower message by assigning it a small interval of types.
Lemma 5.
For any and any , the activated vector satisfies:
-
1.
.
-
2.
for all .
-
3.
For all , .
Proof.
Parts (2) and (3) are immediate. For (1), note that the recursive definition for implies strict inequalities. ∎
Let denote the Receiver robust best response to , and denote the Sender robust best response to (as characterized in Section 3.1).
We define a sequence analogous to the upper bounding sequence from Section 3.2 by iterating robust best responses from the highest initial condition, but with a perturbation through the activation map. The activation level shrinks to zero over rounds, which will allow us to ensure a single valid deletion procedure whose limit equals the unperturbed bound sets.
To that end, initialize
and for define
Because for all (Lemma 6 below), the sequence is strictly positive, decreasing, and converges to zero. We will use the original lower bounding sequences and from Section 3.2.
Lemma 6.
For every , the strategy is strictly increasing. Consequently, is strictly increasing for every .
Proof.
For , the strategy is obtained by applying to some , so it is strictly increasing by Lemma 5. For any strictly increasing , is strictly increasing because for , strict supermodularity of implies . ∎
The next lemma parallels Lemma 2.
Lemma 7.
For every :
-
1.
and .
-
2.
and .
-
3.
, .
Consequently, for every coordinate and all integers ,
and
Proof.
Part (1): Lemma 1 shows that each player’s robust best response is monotonic, and activation can only increase cutoffs. The result follows from induction, given that and by construction.
Part (2): We use induction. Because and are the highest strategies, we have and . Assume and . Then monotonicity of implies
and monotonicity of implies
It remains to show
For coordinates with , we have . For coordinates with , we have , where the last inequality uses that is increasing (Lemma 6).
Part (3): Part (2) implies that and are bounded monotone sequences, hence they converge. It remains to note that the vanishing activation does not affect the limiting bounds: the activation only perturbs cutoffs for the unused low messages, by at most (Lemma 5). By continuity of and (Lemma 1), the limits coincide with those of the unactivated bounding sequences. This yields part (3). ∎
C.2 Elimination Lemmas
Lemma 8.
Fix and . If there exists such that either or , then is interim weakly dominated by some relative to .
Proof.
We prove the first case (); the second is analogous. Let be the smallest index with . Define by and for . We first show that , and then show that interim weakly dominates relative to .
(Feasibility.) It suffices to check (ignoring the irrelevant inequality if ). By minimality of and monotonicity of both and ,
So is an increasing vector.
As , it satisfies all past bounds: for all and all . The strategy differs from only at . By Lemma 2 and Lemma 7, is increasing and is decreasing in , so for every ,
Hence satisfies all past bounds and belongs to .
(Interim dominance.) Fix any . If is off path under , there is no interim constraint at . If is on path (i.e. , as is the case in particular when by Lemma 6), the Receiver’s expected payoff conditional on is strictly concave and maximized at . As , monotonicity of yields
Thus replacing by strictly improves the interim payoff after for every such . All other coordinates of and coincide, so interim weakly dominates . ∎
Lemma 9.
Fix and . If there exists such that either or , then is interim weakly dominated by some relative to .
Proof.
We prove the first case (); the second is analogous. Let be the smallest index with . Define by and for . Only types in change messages when switching from to ; they switch from to . We first verify that , and then show that interim weakly dominates relative to .
(Feasibility.) It suffices to check . By minimality of and monotonicity of both and ,
So is an increasing vector.
As , it satisfies all past bounds: for all and . The strategy differs from only at . By Lemma 2 and Lemma 7, is increasing and is decreasing in , so for every ,
Hence satisfies all past bounds and belongs to .
(Interim dominance.) Fix any . If then all switching types are indifferent, so they weakly prefer to . Now suppose (as is the case in particular when , by Lemma 6). As , monotonicity of (defined in Section 3.1) implies
By definition of the Sender robust best response,
and by construction of the activated upper bound, . Therefore , so every type strictly prefers to , and hence strictly prefers to against . It follows that interim weakly dominates . ∎
C.3 Survival Lemma
Lemma 10.
No Receiver strategy in is interim weakly dominated by another Receiver strategy in , relative to ; and analogously for the Sender.
Proof.
(Receiver.) Take , both in . We will argue that does not interim weakly dominate , relative to . Let . Clearly the dominance cannot hold if for all and all . So assume that is not the case, and choose an and with . Define a continuous path of Sender strategies by
As is convex, we have for all . Moreover, is affine in on each of the two subintervals and , and satisfies . Hence is not identically zero on either subinterval, and therefore for all except possibly for at most one value of in each subinterval.
Now define the continuous function
with the usual convention if . Because and are each a pair of mutual robust best responses, we have and . Because , the intermediate value theorem yields such that .
Let be the difference in the Receiver’s interim expected payoff from choosing rather than after message under . The function is continuous. Strict concavity of implies because , hence for all sufficiently close to . Choose such a with and (so is on path under ). Then cannot interim weakly dominate relative to .
(Sender.) Take , both in . We will argue that does not interim weakly dominate , relative to . Let . Clearly the dominance cannot hold if for all and all . So assume that is not the case, and choose such that for some . Suppose (the opposite case is symmetric) and let . Then , hence . Therefore every type (a set of positive measure) sends message under (and so induces action ), while under its message is at most (and so the induced action is at most ).
Now consider the path , for . As , monotonicity of gives , hence for all . For , let be the type that is indifferent between these two actions; if no indifferent type exists, set if all types prefer the higher action, or otherwise. The function is continuous on and we extend it continuously to by , because is a robust best response to . Similarly, because is a robust best response to , we have . Because , the intermediate value theorem yields such that . If , then , so every type strictly prefers to , and hence also to any lower action. Therefore, every type in strictly prefers to against . If , pick any small ; by continuity of , we have , and because , every type in strictly prefers to against ; that intersection set has positive measure because . It follows that does not interim weakly dominate relative to . ∎
C.4 Putting the Pieces Together
Proof of Theorem 2.
Part (3) is Lemma 10.
References
- Refined best reply correspondence and dynamics. Theoretical Economics 8 (1), pp. 165–192. Cited by: footnote 10.
- The refined best-response correspondence in normal form games. International Journal of Game Theory 44 (1), pp. 165–193. Cited by: §1.1, footnote 10.
- Meaning in communication games. Technical report University of Arizona. Cited by: §6.
- Overcommunication in strategic information transmission games. Games and Economic Behavior 56 (1), pp. 7–36. Cited by: §1.
- Selecting cheap-talk equilibria. Econometrica 76 (1), pp. 117–136. Cited by: Appendix B, §1, §2.2, §2.2, §5.1, §5.1, §6.
- Perturbed communication games with honest senders and naive receivers. Journal of Economic Theory 146 (2), pp. 401–424. Cited by: §1, §6.
- Strategic information transmission. Econometrica 50 (6), pp. 1431–1451. Cited by: Effective Communication in Cheap-Talk Games††thanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments., §1, §1, §2.1, §6.
- Robust information transmission. American Economic Review: Insights 5 (1), pp. 111–24. Cited by: §6.
- Meaning and credibility in cheap-talk games. Games and Economic Behavior 5 (4), pp. 514–531. Cited by: §6.
- On infinite cheap talk equilibria. Technical report Université de Montréal. Cited by: §6.
- Iteratively stable cheap talk. Technical report Université de Montréal. Cited by: Effective Communication in Cheap-Talk Games††thanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments., §6.
- A two-person game of information transmission. Journal of Economic Theory 135 (1), pp. 90–104. Cited by: §1.
- Effective communication in cheap-talk games. Technical report UCSD. Cited by: Effective Communication in Cheap-Talk Games††thanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments., §6.
- Strategic communication with lying costs. Review of Economic Studies 76 (4), pp. 1359–1395. Cited by: §1, §6.
- Convention: a philosophical study. Harvard University Press, Cambridge, MA. Cited by: §1.
- Learning in cheap-talk games. Technical report Northwestern University. Cited by: Effective Communication in Cheap-Talk Games††thanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments., §6.
- Language and coordination games. Economic Theory 72 (1), pp. 49–92. Cited by: §6.
- Common knowledge of language and iterative admissibility in a sender-receiver game. Technical report Brown University. Cited by: §6.
- Language and coordination games. Technical report University of Hong Kong. Cited by: §6.
- Belief-based refinements in signaling games. Journal of Economic Theory 60 (2), pp. 241–276. Cited by: §6.
- On the existence of monotone pure-strategy perfect Bayesian equilibrium in games with complementarities. Journal of Economic Theory 187, pp. 105–126. Cited by: §6.
- Rationalizability, learning, and equilibrium in games with strategic complementarities. Econometrica 58 (6), pp. 1255–1277. Cited by: §6.
- Tenable strategy blocks and settled equilibria. Econometrica 83 (3), pp. 943–976. Cited by: §1.1, §1.
- A result on convergence of sequences of iterations with applications to best-response dynamics. Mathematics of Operations Research 47 (3), pp. 2333–2343. Cited by: §5.1, §6, footnote 19.
- Game theory and scalar implicatures. Philosophical Perspectives 27 (1), pp. 438–478. Cited by: §6.
- Converging better response dynamics in sender receiver games. Université Paris-Dauphine. Note: forthcoming in Mathematics of Operations Research Cited by: §6.
- Conditional dominance, rationalizability, and game forms. Journal of Economic Theory 83 (2), pp. 161–195. Cited by: footnote 13.
- A note on pre-play communication. Games and Economic Behavior 102, pp. 477–486. External Links: Document Cited by: §6.
- Iterated weak dominance and interval-dominance supermodular games. Theoretical Economics 14 (1), pp. 71–102. Cited by: §6.
- Pinocchio’s pupil: using eyetracking and pupil dilation to understand truth telling and deception in sender-receiver games. American Economic Review 100 (3), pp. 984–1007. Cited by: §1.