HTML version from LaTeX source using LaTeXML, with custom CSS/JS rendering. For the definitive version, see PDF.

Effective Communication in Cheap-Talk Gamesthanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments.

Sidartha Gordon LEDA, Université Paris-Dauphine, email: sidartha.gordon@dauphine.psl.eu    Navin Kartik Department of Economics, Yale University, email: nkartik@gmail.com    Melody Lo Department of Economics, National Taiwan University, email: peiyulo2006@gmail.com       Wojciech Olszewski Department of Economics, Northwestern University, email: wo@kellogg.northwestern.edu    Joel Sobel Department of Economics, University of California, San Diego, email: jsobel@ucsd.edu
March 2026

This paper presents equilibrium selection arguments based on learning and dominance in the Crawford and Sobel (1982) model of cheap talk. Our starting point is to restrict players to monotonic strategies with respect to an exogenous ordering of messages. That by itself does not alter equilibrium outcomes. However, under a standard regularity condition, robust best-response dynamics from arbitrary initial conditions converges to a unique equilibrium: the “most informative” equilibrium with “maximally exaggerated” language. We also offer a process of iterated deletion of weakly dominated strategies that selects the same equilibrium.

JEL Classification Numbers: C72, D83.
Keywords: Communication, Learning, Dominance, Equilibrium Selection.

1 Introduction

Talk is a useful way to communicate private information in strategic situations, as formalized by Crawford and Sobel (1982) and Green and Stokey (2007). However, these—and other—models of cheap talk typically have multiple equilibrium outcomes, including an uninformative one in which no information is transmitted. A central concern in the literature has been finding conditions under which communication is effective, that is in which the predicted outcome involves non-trivial information transmission.

This paper contributes to that effort. We develop arguments that lead to the selection of equilibria with effective communication in the Crawford and Sobel (1982) (hereafter CS) model. We present two sets of arguments, one based on learning (best-response dynamics) and one based on deductive reasoning (iterated dominance). Although the approaches are distinct, there is a common thread. In either case, we obtain the same selection of not only the payoff-relevant outcome, but also the use of language.

The CS model has an informed Sender communicating to an uninformed Receiver. The Receiver responds to the Sender’s message by making a decision that is payoff relevant to both players. Talk is cheap because neither party’s payoffs depend directly on the message. CS characterize the set of equilibrium outcomes in a one-dimensional environment with an “upward-bias” conflict of interest: the Sender always prefers higher decisions than the Receiver. There is a finite upper bound, N, on the number of distinct actions that the Receiver takes in equilibrium; for each N=1,,N, there is an equilibrium in which the Receiver takes N distinct actions. In addition, under a regularity condition (“Condition M” in CS), the equilibrium outcome for each such N is unique, and the ex-ante expected payoff for both Sender and Receiver is strictly increasing in N. The outcome with N actions is typically what applications focus on.

The multiple-equilibria problem arises in three different ways in cheap-talk games. First, some messages may not be used in equilibrium, and there will typically be many specifications of the Receiver’s off-path behavior that support the equilibrium. This kind of off-path indeterminacy is familiar in games with incomplete information. The second kind of multiplicity, message indeterminacy, is about which messages are used in equilibrium and their meaning. Given any equilibrium, one can generate another equilibrium by permuting the interpretation of messages. This reflects an arbitrariness of language. It would be of limited concern if all equilibria induce the same mapping from Sender types to Receiver actions.111The word used to describe the color of a white house in Paris is “blanche” and in Warsaw is “biały”. What matters is that French speakers and Polish speakers classify the same set of houses as white (and their audiences understand that) rather than the particular word used to describe the color.

However, there is a more problematic kind of multiplicity, outcome or type-action indeterminacy. Cheap-talk games invariably have an uninformative equilibrium222To be precise, they typically have many uninformative equilibria when one takes into account the first two kinds of multiplicity., but often also have informative equilibria in which the Receiver takes at least two different actions with positive probability. In the CS model, this arises when the conflict of interest is not too large, and the aforementioned upper bound N is at least 2. Indeed, as N grows unboundedly as conflict vanishes, the outcome multiplicity can be severe. It is this kind of multiplicity that we are primarily concerned with. Our approach to addressing it, however, starts from a hypothesis that mitigates the degree of message indeterminacy.

Formally, we augment the CS model with a total order on the message space (taken to be finite, of size at least N) and restrict players to strategies that are monotonic with respect to that order. This defines a monotonic cheap-talk game. We view this formulation as a way to incorporate exogenous meaning or conventions into communication: players enter the strategic setting with a shared ordering of messages and it is common knowledge that they will behave in a way that is consistent with this ordering. Monotonic strategies rule out certain kinds of message indeterminacy: it allows for grades B and A to respectively mean “average” and “above average” in one equilibrium, while they could respectively mean “above average” and “excellent” in another equilibrium; but B can never mean “above average” when A means “average”.333We do not suggest, of course, that nonmonotonic strategies are never relevant; consider irony or sarcasm. We are concerned with settings in which players do not entertain such language use—grading being one example.

The idea that convention governs the interpretation of messages follows Lewis (1969); modeling it as a common-knowledge restriction on which strategies players use follows Myerson and Weibull (2015). Importantly, our monotonicity restriction alone does not rule out any equilibrium outcome of the CS game. Players have monotonic best responses to monotonic opponent strategies, and by itself, the monotonicity convention only restrains how language can be used to support equilibrium outcomes. However, classic approaches to equilibrium selection, which generally appear to have no bite absent the monotonicity convention, are now fruitful.

Our first approach is based on best-response dynamics. Starting from an arbitrary pair of monotonic Sender and Receiver strategies, we study the iteration of robust best responses for each player. Robustness handles indifference: how a player chooses between multiple best responses stemming from either off-path messages (for the Receiver) or on-path multiplicity (for the Sender). Roughly, a strategy x is a robust best response to some opponent strategy if all small perturbations of the opponent’s strategy have best responses close to x. Each player has a unique (up to a measure-zero qualification) robust best response to any opponent strategy. We establish in Proposition 1 that under the CS regularity condition, the iteration of robust best responses from arbitrary initial conditions in the monotonic-cheap talk game converges to a unique strategy profile, which is an equilibrium. This equilibrium uses only the highest N messages, and its outcome is the N-action outcome of CS.

Our second approach is based on iterated dominance. Throughout, by “dominance” we mean “weak dominance”. As the cheap-talk game is a sequential-move Bayesian game, we view the appropriate notion of dominance to be interim dominance: the standard notion of dominance must hold for each type (up to a measure-zero qualification) of the Sender; and on the Receiver side, for each message that is received with positive probability.444So a Sender strategy s interim weakly dominates s against a set of Receiver strategies if all (except perhaps a set of measure zero) Sender types weakly prefer s to s against every Receiver strategy under consideration, and a positive measure of types strictly prefer s to s against some Receiver strategy. A Receiver strategy a interim weakly dominates a against a set of Sender strategies if the Receiver weakly prefers a to a no matter which positive-probability message is sent by any of the Sender strategies, and there is some positive-probability message under some Sender strategy such that the Receiver strictly prefers a to a. We study a process of iterated deletion of interim weakly dominated strategies (IDIWDS) in the monotonic cheap-talk game. This process is related to robust best response iteration, but iterative deletions are justified by iterative applications of interim dominance. Proposition 2 establishes that, under the CS regularity condition, our process of IDIWDS selects a unique strategy profile, which is an equilibrium—the same equilibrium as selected by robust best-response iteration. As interim dominance implies dominance (and because there is a unique surviving strategy profile), this process also yields the same selection through iterated deletion of weakly dominated strategies.

The upshot is that both our selection results identify not only the N-action outcome, but an equilibrium in which that is induced via the highest N messages. In other words, there is maximal exaggeration or inflated language. We find this intuitive in light of the Sender’s upward bias, and experimental tests of the CS model do show evidence of inflated language (Cai and Wang, 2006; Wang, Spezio, and Camerer, 2010).

The proofs for both our approaches operate via an analysis of two sequences of strategy profiles. The sequences are defined by specifying extreme initial conditions—one “highest” and one “lowest”—and then iterating robust best responses. The highest (resp., lowest) initial condition is that the Receiver takes the highest (resp., lowest) undominated action in response to every message and the Sender always sends the lowest (resp., highest) message. We show that the sequences defined by iteration from these conditions are suitably monotone—the highest sequence decreases while the lowest sequence increases—and they both converge to equilibria. We then appeal to Chen, Kartik, and Sobel’s (2008) no-incentive-to-separate (NITS) condition on equilibria. They showed that any N-action outcome always satisfies NITS, and it is the unique NITS outcome under CS’s regularity condition. We establish that so long as there is a unique NITS outcome, our two sequences have a common limit (Theorem 1/Proposition 1). This limit equilibrium satisfies NITS and hence induces N actions. Moreover, it is the highest N messages that are used in this equilibrium; all lower off-path messages would elicit the lowest undominated action, in line with NITS’s defining property. We thus provide a foundation for the NITS condition. Our results on robust best-response iteration follow because any sequence of robust best responses, starting from an arbitrary initial condition, must be sandwiched between the highest and lowest sequences. Our results on IDIWDS follow because we can show that strategies larger than the higher limit or lower than the lower limit are eventually deleted by our process. The exact process of iterated deletion involves nuances to deal with unused messages, but roughly speaking involves deleting in each round (on the basis of interim dominance) all strategies that are more extreme than the highest and lowest sequences’ strategies.

As mentioned at the outset, there has been substantial interest in refining predictions in cheap-talk games, including specifically for the CS model. We defer a detailed discussion of the literature to Section 6. Here we just note that each element of our approach has antecedents. For example, Kartik (2009) and Chen (2011) also appeal to monotonic strategies in variants of the CS model (they use it as an equilibrium refinement in games with lying costs or nonstrategic types); whereas iteration of best responses and dominance are classical game-theoretic refinements. Our results show how powerful these classical approaches become in the (unperturbed) CS model, under the restriction to monotonic strategies. But cheap talk introduces some subtle issues in the iteration arguments stemming from indifferences. Hence we appeal to robust best response iteration, and also offer only a specific—although broadly intuitive—order of elimination for IDIWDS. We do not prove that the outcome is order independent, although we conjecture that it is.

Outline.

The remainder of the introduction presents a simple example to illustrate ideas. Section 2 introduces the monotonic cheap-talk game we study and some basic properties of equilibria. Section 3 develops our key concepts of robust best responses and dominance. Section 4 shows how our iterative arguments work in a uniform-quadratic two-message example, providing intuition for the formal arguments. Section 5 then presents the main results. Section 6 discusses related literature. Omitted proofs are in the appendices.

1.1 A Common-Interest Example

The example below does not fit into our main model, but it provides the simplest illustration of how monotonicity in conjunction with dominance/learning arguments can yield selection in a cheap-talk game.

There are two equiprobable Sender types (high and low), two Receiver actions (also high and low, H and L), and two messages the Sender chooses from (also high and low, h and l). Both players receive a payoff of two if the action matches the type and a payoff of zero otherwise. A pure strategy for the Sender is a pair (i,j) where the Sender sends message i when her type is low and j when her type is high. Similarly, a Receiver pure strategy is a pair (i,j) where i is the action taken after message low and j after message high. The strategic form of the game is given in the following table, where rows correspond to Sender strategies and columns to the Receiver.

(H,H) (L,H) (H,L) (L,L)
(h,h) 1,1 1,1 1,1 1,1
(h,l) 1,1 0,0 2,2 1,1
(l,h) 1,1 2,2 0,0 1,1
(l,l) 1,1 1,1 1,1 1,1

There are two efficient pure-strategy equilibria, ((l,h),(L,H)) and ((h,l),(H,L)), in which the Sender distinguishes between the states and the Receiver correctly interprets this information. The former is more intuitive than the latter, as the latter flips the natural association of types with messages and messages with actions. But the game also has an uninformative and ex-ante Pareto inefficient equilibrium in which the Sender mixes uniformly between (h,l) and (l,h) and the Receiver mixes uniformly between (H,L) and (L,H).555There are also other inefficient equilibria, in pure and mixed strategies. The mixed-strategy equilibrium, as well as both efficient pure-strategy equilibria, satisfy standard refinements from perfection to strategic stability.

Our approach is to replace the original game by a game in which non-monotonic strategies are not available. Monotonicity here is with respect to the natural ordering on messages (l<h), types (low<high), and actions (L<H). The strategic form of the monotonic cheap-talk game is:

(H,H) (L,H) (L,L)
(h,h) 1,1 1,1 1,1
(l,h) 1,1 2,2 1,1
(l,l) 1,1 1,1 1,1

Deleting non-monotonic strategies has eliminated some inefficient equilibria but it does not eliminate any equilibrium outcome, i.e., equilibrium mapping from types to (distributions over) actions. In particular, the previous mixed-strategy equilibrium outcome is replicated in an equilibrium where the Sender plays (l,l) (or (h,h)) and the Receiver mixes uniformly over (L,L) and (H,H). However, weak dominance now selects the ((l,h),(L,H)) equilibrium, which is efficient. Note that weak dominance has no power in the original game. It is the combination of monotonic strategies—which eliminates certain (but not all) kinds of message indeterminacy—and an equilibrium refinement that yields selection.

Instead of applying weak dominance in the monotonic game, we can also obtain the same selection through a version of best-response dynamics starting from any initial condition. For an arbitrary initial condition—in particular, an inefficient pure-strategy equilibrium—standard best-response dynamics are clearly not sufficient. Our approach is to require robust best responses: a best response such that there is a “nearby” best response to any “nearby” opponent strategy. Because of weakly dominant strategies in this example, it is straightforward that the unique robust best response to any Sender strategy is (L,H) and similarly the unique robust best response to any Receiver strategy is (l,h). So one iteration of robust best responses converges to the ((l,h),(L,H)) efficient equilibrium. Again, robust best response iteration would not provide selection in the original game.666In the original game, robust best-response dynamics are not even well defined. In particular, the Receiver has no robust best response in the original game to the Sender strategy (h,h): intuitively, any nondegenerate mixture over (h,h) and (l,h) has a unique best response of (L,H), while any nondegenerate mixture over (h,h) and (h,l) has a unique best response of (H,L). Thus, no single Receiver strategy has a “nearby” best response to each Sender strategy “near” (h,h).

Balkenborg, Hofbauer, and Kuzmics (2015, Section 6) and Myerson and Weibull (2015, Example 6) use the same example to illustrate the power of other refinement arguments. Both papers also select an efficient outcome, but not by the route of monotonicity. Balkenborg, Hofbauer, and Kuzmics eliminate the Sender strategies (h,h) and (l,l) on grounds of not being “refined best responses” (cf. footnote 10) and point out that only the efficient outcomes are locally stable equilibria of a best-response dynamic that avoids those strategies. Myerson and Weibull show that only the efficient equilibria satisfy their notion of being “settled”. These approaches are defined for finite games; we are not aware of existing extensions to infinite games like that of CS.

2 Model

2.1 The Cheap-Talk Game

We start from the CS model (Crawford and Sobel, 1982). There are two players. A Sender privately observes his type t drawn from a continuous density f>0 on [0,1]. The Sender then sends a message m from a set M, where M is large enough (elaborated below). The Receiver observes m and chooses an action a. Payoffs are uS(a,t) for the Sender and uR(a,t) for the Receiver. For each player i=S,R, the payoff function ui is twice continuously differentiable, strictly concave in a (uaai<0), and strictly supermodular (uati>0), where subscripts denote partial derivatives as usual. Each player i has a type-dependent ideal action, ai(t):=argmaxaui(a,t).

Assume the Sender has an upward bias: aS(t)>aR(t) for all t[0,1]. We normalize aR(0):=0 and aR(1):=1; this implies that we can restrict attention to actions in [0,1], as other actions are strictly dominated for the Receiver.777The sender’s ideal action exceeds 1 for some types, but for those types the most preferred “feasible” action is 1.

2.2 The Structure of Equilibria

A pure strategy for the Sender is a mapping s:[0,1]M, while a pure strategy for the Receiver is a mapping a:M. The notion of equilibrium is Bayes-Nash. An equilibrium outcome is the mapping from types to (distributions over) actions.

CS demonstrate that for equilibrium outcomes (and up to measure zero sets of types) it is without loss to consider only pure strategy equilibria. There is a positive integer N such that for every n{1,,N}, there is an equilibrium in which there are n induced actions (i.e., actions played with ex-ante positive probability); moreover, there is no equilibrium that induces strictly more than N actions. For any 0t<t′′<1, let

aR(t,t′′):=argmaxatt′′uR(a,t)f(t)𝑑t (1)

be the Receiver’s optimal action when she only learns that the Sender’s type lies in [t,t′′]. Any equilibrium can be characterized by cutoffs 0=t0< t1<<tn=1, and actions 0<a1an<1 such that

uS(ai+1,ti)uS(ai,ti)=0 (2)

for i=1,,n1, and

ai=aR(ti1,ti) (3)

for i=1,,n. Any equilibrium has n distinct messages played with positive probability and types in (ti,ti+1) pooling on a common message. Condition (2) states that the cutoff types are indifferent between pooling with types immediately below or immediately above. Condition (3) states that the Receiver best responds to information in the Sender’s message. Ranging over n{1,,N}, conditions (2) and (3) fully characterize all the equilibrium outcomes (up to measure zero sets, stemming from the Sender’s behavior at the cutoffs; we ignore measure-zero qualifications hereafter).

In general, there can be multiple equilibrium outcomes for a given n{2,,N}. CS introduce a technical regularity condition (Condition “(M)” in their paper) that guarantees uniqueness for each n.888For completeness, we restate their condition here. For ti1titi+1, let V(ti1,ti,ti+1):=uS(aR(ti,ti+1),ti)uS(aR(ti1,ti),ti). A (forward) solution to (2) of length L is a sequence t0<<tL such that V(ti1,ti,ti+1)=0 for i{1,,L1} and t0<t1. CS’ regularity condition requires that for any two solutions to (2) of length L, (t0,,tL) and (t0,,tL) with t0=t0 and t1<t1, it holds that ti<ti for all i2. The condition is satisfied, in particular, by the leading “uniform-quadratic” example in CS, which has been the focus of many applications. Here the prior density is f(t)=1 on [0,1], the Receiver’s utility is uR(a,t)=(at)2, and the Sender’s utility is uS(a,t)=(atb)2 for some bias parameter b>0.

CS prove that when the regularity condition holds, then not only is there a unique equilibrium outcome for each n{1,,N}, but moreover, the ex-ante equilibrium expected utility for both the Sender and Receiver is strictly increasing in N. That provides one argument for the salience of the N equilibrium outcome.

Our analysis will use the following condition from Chen, Kartik, and Sobel (2008).

Definition 1.

An equilibrium (s,a) satisfies No Incentive to Separate (NITS) if

uS(a(s(0)),0)uS(aR(0),0).

NITS states that the lowest type of the Sender prefers her equilibrium payoff to the payoff she would receive if the Receiver knew her type (and responded optimally). Chen, Kartik, and Sobel (2008) show that every equilibrium with N induced actions satisfies NITS, and that under CS’ regularity condition, only the unique equilibrium outcome with N actions satisfies NITS.

2.3 The Monotonic Cheap-Talk Game

So far, the message space has been abstract. From now on, we assume it is finite and ordered: M:={m1,,mN}, where N is a positive integer and mi<mi+1 for each i{1,,N1}. Here “<” denotes the order on M; one can take M. We are interested in settings with NN, where N is the upper bound on equilibrium actions described in the previous subsection. However, as the backbones of our analysis hold even when N<N, we only invoke NN when necessary.

Our key assumption is that players can only use monotonic strategies: mappings [0,1]M for the Sender and M[0,1] for the Receiver that are (weakly) increasing. We study the monotonic cheap-talk game in which players’ (pure) strategy sets are the monotonic strategies. Denote the Receiver’s (pure) monotonic strategy set by 𝒜 and the Sender’s (pure) monotonic strategy set by 𝒮.

As discussed in the introduction, we view imposing such monotonicity as capturing a shared language convention. Given the Sender’s upward bias, we view it as plausible that higher types must use higher messages, and the Receiver must interpret higher messages accordingly. While the original game allows for arbitrary permutations of messages, we restrict attention to strategies where the ordinal ranking of messages is preserved in use and interpretation.

Monotonicity by itself does not alter the set of equilibrium outcomes. Given any equilibrium of the original game with cutoffs 0=t0<t1<<tn=1, the same outcome obtains in an equilibrium of the monotonic cheap-talk game. In particular, we can support the outcome using only the highest messages: for each i{1,,n}, the pool (ti1,ti) sends message mN(ni), and the Receiver responds to message mi with aR(ti1,ti). Off path, the Receiver can, for example, respond to any message mi (where i<Nn+1) with the lowest on-path action, aR(0,t1).

Nevertheless, focusing on monotonic strategies is restrictive in two ways. The less-important aspect is that either player may have non-monotonic best responses to a monotonic strategy of the opponent. This is due to indifferences. Specifically, the Sender’s (unique) best response to any strictly monotonic Receiver strategy is monotonic, and the Sender always has a monotonic best response to any monotonic Receiver strategy. But if the Receiver takes the same action after two messages, the Sender could optimally choose between them non-monotonically. Similarly, the Receiver has a monotonic best response to any monotonic Sender strategy, and any Receiver best response must be monotonic over the messages that the Sender uses with positive probability (i.e., on path). But if there are unused messages, the Receiver could optimally respond to those in a manner that violates monotonicity.

A more fundamental issue is that the Receiver may have only non-monotonic best responses to mixtures of monotonic Sender strategies.999For example, suppose types are uniformly distributed and there are three messages: m1<m2<m3. Consider two monotonic Sender strategies: one sends m1 for t<0.9 and m3 otherwise; the other sends m1 for t<0.95 and m2 otherwise. Under a 50-50 mixture of those two strategies, 𝔼[tm2]=0.975>0.95=𝔼[tm3]. Hence, a Receiver with quadratic-loss utility (under which the optimal action is the expected type) only has non-monotonic best responses even on path. Intuitively, this is because a message may reveal information about which strategy in the mixture was played, shifting the Receiver’s posterior in ways that can break action monotonicity. This means that in the original game, even if the Receiver conjectures that the Sender uses only (mixtures of) monotonic strategies, best responses or dominance need not deliver monotonic Receiver strategies.

3 Key Concepts

For our analysis, it is convenient to view monotonic (pure) strategies as N-dimensional vectors, where N is the number of messages. Abusing notation a little, a monotonic Sender strategy is a vector of cutoffs t:=(t0,t1,,tN) satisfying

0=t0t1t2tN=1.

Types in the interval [ti1,ti) send message mi, and type 1 sends message mN. When ti1=ti, message mi is unused by the strategy t. A monotonic Receiver strategy is a vector of actions a:=(a1,a2,,aN) satisfying

0a1a2aN1.

Upon receiving message mi, the Receiver takes action ai.

Hereafter, “strategy” without qualification should be understood as a “(pure) monotonic strategy” and viewed as a vector with increasing coordinates.

3.1 Robust Best Responses

We compare vectors, and hence strategies, using the component-wise order. We use the sup norm on vectors: tt:=maxi|titi| and similarly for actions. Convergence of strategies (e.g., tt or aa) is with respect to this norm.

Definition 2.

A strategy σ for either player is a robust best response to opponent strategy ω if for every ε>0 there exists δ>0 such that: if ωω<δ, there exists a best response σ to ω with σσ<ε.

Intuitively, a strategy is a robust best response (RBR) if small perturbations of the opponent’s strategy have nearby best responses.101010Our notion is related to that of a “refined best response” in Balkenborg, Hofbauer, and Kuzmics (2013, 2015). They study finite normal-form games and require a refined best response to remain exactly optimal against certain nearby opponent strategies. A natural adaptation of their concept to continuous strategy spaces would be that a strategy is a refined best response if there is some sequence of nearby opponent strategies whose unique best responses converge to that strategy. Our RBR definition is stronger: it requires that every nearby opponent strategy admits a nearby best response. Hence RBRs may not exist absent our restriction to monotonic strategies, whereas (the adaptation of) refined best responses do exist. One can show that convergence of the iteration in the monotonic cheap-talk game is guaranteed under either notion and yields the same limit; without the monotonicity restriction, the iteration of refined best responses will generally not converge, though when it does, the limit outcome is the same as in the monotonic game. This rules out best responses that are only justified by knife-edged indifferences; in particular, it pins down Receiver actions after unused messages and pins down Sender tie-breaking when there are multiple messages that lead to the same action.

For example, there are many best responses to the Sender’s strategy (0,1/2,1/2,1) because this strategy does not use message m2. However, the unique RBR prescribes action aR(1/2) in response to m2, because any best response to a strategy (0,t1,t2,1)(0,1/2,1/2,1) with t1<t2 must prescribe an action close to aR(1/2) after message m2. Similarly, any Sender strategy is a best response to the Receiver strategy (1/2,1/2,1/2). However, assuming aS(0)<1/2, which implies aS(t1)=1/2 for some t1(0,1), the unique Sender RBR is (0,t1,t1,1), i.e., message m1 for types [0,t1), and message m3 for types [t1,1].

More generally, the Receiver RBR to Sender strategy (0=t0,,tN=1) is

(aR(t0,t1),,aR(ti1,ti),,aR(tN1,tN)),

where aR(ti1,ti) is defined in Equation 1 if ti1<ti and aR(ti1,ti):=aR(ti) if ti1=ti.

To describe the Sender’s RBR in general, fix a Receiver strategy a=(a1,,aN). Each Sender RBR cutoff is the type that is indifferent between adjacent actions, or the relevant boundary type if there is no indifferent type. Formally, for each i{1,,N1}, define τ(ai,ai+1) as follows:

  • If ai<ai+1: the unique type indifferent between ai and ai+1, or 0 if all types prefer ai+1, or 1 if all types prefer ai.

  • If ai=ai+1: the type (aS)1(ai) for whom ai is the ideal action, or 0 if ai<aS(0), or 1 if ai>aS(1).111111Given the Sender’s upward bias and our normalization of aR(0)=0 and aR(1)=1, this last case of ai>aS(1) can be ignored when we restrict attention to actions in [0,1].

The Sender’s RBR to a is (0,τ(a1,a2),,τ(aN1,aN),1).

Lemma 1.

Each player has a unique robust best response to any opponent strategy, and this robust best response is continuous and increasing in the opponent’s strategy.

Below, we will consider iteration of RBRs. We interpret such iteration as adaptive best-response dynamics, in which RBRs provide a form of protection against slight noise in expectations of opponent behavior.

3.2 Bounding Sequences

Our analysis revolves around two sequences of strategy profiles, generated by iterating RBRs from extreme initial conditions. The highest (in vector order) initial conditions are:

t¯0:=(0,1,1,,1)anda¯0:=(1,1,,1).

Under t¯0, all types send message m1; under a¯0, all messages lead to action 1. The lowest initial conditions are:

t¯0:=(0,0,,0,1)anda¯0:=(0,0,,0).

Under t¯0, all types send message mN; under a¯0, all messages lead to action 0.

Now iteratively define (t¯k+1,a¯k+1) and (t¯k+1,a¯k+1) as follows, for integers k0:

a¯k+1 :=Receiver’s RBR to t¯k and a¯k+1:=Receiver’s RBR to t¯k,
t¯k+1 :=Sender’s RBR to a¯k and t¯k+1:=Sender’s RBR to a¯k.
Lemma 2.

The sequences (t¯k,a¯k)k=0 and (t¯k,a¯k)k=0 are ordered, monotonic, and converge to equilibria:

  1. 1.

    t¯ikt¯ik and a¯ika¯ik for all i,k;

  2. 2.

    t¯ikt¯ik+1 and a¯ika¯ik+1 for all i,k;

  3. 3.

    t¯ikt¯ik+1 and a¯ika¯ik+1 for all i,k;

  4. 4.

    t¯kt¯, a¯ka¯, t¯kt¯, and a¯ka¯;121212In other words, t¯k converges, with its limit denoted t¯, and so on.

  5. 5.

    The limits (t¯,a¯) and (t¯,a¯) are equilibria in robust best responses.

These two sequences (t¯k,a¯k)k=0 and (t¯k,a¯k)k=0 underpin both of our selection arguments. In particular, for our learning-based selection, we will show that any robust best-response sequence starting from arbitrary initial conditions is sandwiched between these bounds; hence when the bounds have a common limit, so does every RBR sequence.

3.3 Dominance

We define the dominance notion here; the formal iterated deletion procedure and results are in Section 5.2.

Definition 3.

Fix sets of monotonic strategies 𝒮𝒮 and 𝒜𝒜.

  1. 1.

    A Receiver strategy a𝒜 interim (weakly) dominates a𝒜 relative to 𝒮 if:

    1. (a)

      for every t𝒮 and every message mi sent with positive probability under t (i.e., ti1<ti), action ai yields higher expected payoff than does ai conditional on the pool of types sending mi; and

    2. (b)

      for at least one such pair (t,mi), the expected payoff is strictly higher from ai than from ai.

  2. 2.

    A Sender strategy t𝒮 interim (weakly) dominates t𝒮 relative to 𝒜 if:

    1. (a)

      for every a𝒜 and almost every type τ[0,1], type τ prefers the induced action under t to that under t; and

    2. (b)

      there exist a𝒜 and a positive-measure set E[0,1] such that, against a, every type τE strictly prefers the induced action under t to that under t.

It is natural to consider interim (rather than ex-ante) dominance because the Sender observes his type while the Receiver observes the message.131313Shimoji and Watson (1998) define a related notion of “conditional dominance” for finite extensive-form games, ruling out strategies with actions that are strictly dominated conditional on reaching an information set. For both players, interim dominance implies ex-ante dominance (or just dominance, for short).141414Let Ui(t,a) be player i’s expected payoff from the strategy profile (t,a)𝒮×𝒜. Fix any 𝒮𝒮 and 𝒜𝒜. A Receiver strategy a𝒜 (weakly) dominates a strategy a𝒜 if UR(t,a)UR(t,a) for every t𝒮, with strict inequality for some t𝒮. Sender dominance is analogous. The converse is not generally true because interim dominance does not allow for the compensation across messages/types that dominance permits.

We will see that the limits (t¯,a¯) and (t¯,a¯) characterize the set of strategies that survive a process of IDIWDS. Roughly, we will show that at each round of deletion k0, strategies outside the bounds (t¯k,a¯k) and (t¯k,a¯k) are interim dominated at that round. The formal treatment in Section 5.2 is a little more involved because it must overcome an issue that the Sender’s robust best responses may leave low messages unused, while interim dominance for the Receiver only has bite at on-path messages.

4 A Two-Message Uniform-Quadratic Example

Before presenting the formal results, we illustrate the main ideas using the uniform-quadratic specification with bias b(1/12,1/4). This is the range in which the underlying CS cheap-talk game has precisely two equilibrium outcomes: an uninformative one in which action 0.5 is induced by all types; and an informative outcome in which types below 1/22b induce action 1/4b, while types above 1/22b induce action 3/4b.

Consider the monotonic cheap-talk game with two messages: M={m1,m2}, with m1<m2. A Sender strategy is then described by a single cutoff t1[0,1]: types below t1 send m1, and types above send m2. A Receiver strategy is a=(a1,a2)[0,1]2 with a1a2, where each aj is the response to message mj.

4.1 Robust Best-Response Iteration

For the uniform-quadratic specification, robust best-response iteration from any (ak,tk), as defined in Section 3.1, yields:

a1k+1 =t1k2,a2k+1=t1k+12, (4)
t1k+1 =max{0,a1k+a2k2b}. (5)

The equations in (4) reflect that the Receiver’s optimal action after each used message is her conditional expectation of the Sender’s type. Equation 5 reflects that the indifferent type (if it exists) is b below the midpoint of the actions, with the max operator accounting for the possibility that all types prefer the higher action.

For k1, substituting Equation 4 into Equation 5 and vice versa (and using b<1/4) yields:

t1k+2 =t1k2+14b, (6)
a1k+2 =a1k2+18b2,a2k+2=a2k2+38b2. (7)

It is now straightforward to verify that (t1k,a1k,a2k) converges to

t1=122b,a1=14b,a2=34b,

which match the informative equilibrium outcome. This means that an uninformative equilibrium is not the limit of any robust best-response sequence, no matter the initial conditions. In particular, although the uninformative Sender strategy with t1{0,1} is a best response to the constant Receiver strategy a=(0.5,0.5), the Sender’s (unique) robust best response is the informative strategy t1=1/2b, to which a=(0.5,0.5) is not a best response.

We next consider our two bounding sequences.151515In this example, we already established that all robust best-response sequences have a common limit. What is more general is that the bounding sequences sandwich all robust best-response sequences. Moreover, the bounding sequences are crucial for our iterated dominance arguments, even in this example. The lower bounding sequence (t¯k,a¯k) starts from t¯10=0 and a¯0=(0,0); the upper bounding sequence (t¯k,a¯k) starts from t¯10=1 and a¯0=(1,1). Because t¯10=0<t1, a¯10=0<a1, and a¯20=0<a2, the lower sequence increases towards the fixed point; because t¯10=1>t1, a¯10=1>a1, and a¯20=1>a2, the upper sequence decreases towards the fixed point. We see from (6) and (7) that any robust best-response sequence is sandwiched between these two sequences. Table 1 illustrates the two sequences numerically when b=0.1.

k t¯1k a¯k t¯1k a¯k
0 0 (0, 0) 1 (1, 1)
1 0 (0, 0.5) 0.9 (0.5, 1)
2 0.15 (0, 0.5) 0.65 (0.45, 0.95)
4 0.225 (0.075, 0.575) 0.475 (0.3, 0.8)
6 0.2625 (0.1125, 0.6125) 0.3875 (0.225, 0.7375)
limit 0.3 (0.15, 0.65) 0.3 (0.15, 0.65)
Table 1: Bounding sequences for b=0.1, N=2. For brevity, we display only some iterates.

4.2 Iterated Deletion of Dominated Strategies

We now explain how the bounding sequences also characterize a process of iterated deletion of interim (weakly) dominated strategies.

Round 1: We assess interim dominance relative to all monotonic strategies, 𝒮 and 𝒜.

  • For the Receiver, any strategy with a2<a¯21=0.5 is interim dominated: against any Sender strategy that uses m2 (i.e., when t1<1), action 0.5 is strictly better than any a2<0.5 after message m2, because the message reveals the Sender’s type is in [t1,1]. Symmetrically, any strategy with a1>a¯11=0.5 is interim dominated. So we can delete all Receiver strategies except those with a10.5a2, or equivalently, a¯1aa¯1.161616No strategy within these bounds is interim dominated at this stage. For any distinct a1,a1[0,0.5], there is a Sender strategy against which a1 is strictly better than a1 after m1, and vice-versa. An analogous point applies to a2,a2[0.5,1]. Note also that absent the restriction to monotonic Sender strategies, no Receiver strategy would be interim dominated.

  • For the Sender, all types strictly above t¯11=1b weakly prefer the higher action for all Receiver strategies, and strictly so whenever a1<a2. Any cutoff t1>t¯11 is thus interim dominated by t¯11, noting that types below t¯11 send the same message under both cutoffs t1 and t¯11. So we can delete all Sender strategies except those with 0=t¯11t1t¯11.171717No Sender strategy within these bounds is interim dominated at this stage. Raising the cutoff from t1[0,1b] to t1>t1 hurts types in (t1,t1) whenever a1<a2 and (a1+a2)/2<t1+b; lowering the cutoff to t1<t1 hurts types in (t1,t1) whenever a1<a2 and (a1+a2)/2>t1+b.

Round 2: We assess interim dominance relative to the strategies surviving from round 1. For the Receiver, given t1t¯11=1b, the mean of types sending m1 is at most (1b)/2 and the mean of types sending m2 is at most 1b/2, so any strategy with a1>(1b)/2=a¯12 or a2>1b/2=a¯22 is interim dominated. Hence, we delete all Receiver strategies except those in [a¯2,a¯2]. For the Sender, given a21/2=a¯21, any t1<1/4b=t¯12 is interim dominated; given a11/2=a¯21, any t1>3/4b=t¯12 is interim dominated. Hence we delete all Sender strategies except those with in [t¯12,t¯12].

Subsequent rounds: Reasoning analogously, in each round k>1, interim domination relative to the surviving strategies from the previous round deletes Receiver strategies outside [a¯k,a¯k] and Sender strategies outside [t¯1k,t¯1k]. The limit of this deletion process yields the unique survivor (t1,a).

This process of IDIWDS is canonical: in each round, we delete all the interim dominated strategies for each player.181818The “interim” qualification is important. As noted in Section 3.3, all interim dominated strategies are (weakly) dominated. So the current deletion process also yields selection via iterated deletion of dominated strategies. But there may be dominated strategies that are not interim dominated at any given round (hence not deleted in that round by our process), because of “cross-compensation” across types for the Sender or across messages for the Receiver. For example, one can check that in the first round, any Receiver strategy with a2>a1+1/2 is dominated; but it is not interim dominated as explained in footnote 16. In this example, we can show that the order of deletion does not actually matter; more generally, we do not have such a proof. Furthermore, when we allow for additional messages—in particular, when N>N—there are nuances in our process of iterated deletion that Section 5.2 handles.

5 Results

5.1 Robust Best-Response Iteration

We write lim inf and lim sup of vectors in the component-wise sense. Recall that a sequence of robust best responses (tk,ak)k0 is pinned down by its initial conditions (t0,a0).

Theorem 1.

For any robust best-response sequence (tk,ak)k=0:

t¯ktkt¯kanda¯kaka¯kfor all k,

and consequently

t¯lim infktklim supktkt¯anda¯lim infkaklim supkaka¯.

The theorem says that starting from arbitrary initial conditions, the sequence generated by robust best-response iteration is sandwiched between (t¯k,a¯k)k0 and (t¯k,a¯k)k0, and hence the players’ strategies only accumulate within [t¯,t¯] and [a¯,a¯]. That is, play is asymptotically bounded by the two equilibria (t¯,a¯) and (t¯,a¯).191919Although it is not implied by the theorem, one can show that any robust best-response sequence converges even when (t¯,a¯)(t¯,a¯); see Olszewski (2022).

While in general the two bounding equilibria can be distinct, even in terms of outcomes, they coincide under a standard condition. To establish that, we use the following two properties of the bounding equilibria (indeed, of any equilibrium in which the Receiver’s strategy is a robust best response). The first says that all unused messages are at the bottom and elicit action aR(0)=0, and the second says that they satisfy NITS when NN.

Lemma 3.

Let (t,a) be an equilibrium in which a is a robust best response. The set of messages unused by t is a lower set: there exists {0,,N1} such that t0==t=0 and 0<t+1<<tN=1. Moreover, all unused messages would lead to action aR(0)=0: if >1, then a1==a=0.

The idea is that if t has an unused message mi above a used message mk, then a being a robust best response to t pins down its off-path action at ai=aR(ti)>ak. This in turn implies that the off-path action ai is either strictly between two consecutive on-path actions, or strictly above all on-path actions. Either way, some types would deviate to message mi, a contradiction.

Lemma 4.

Let (t,a) be an equilibrium in which a is a robust best response. If NN, then (t,a) satisfies NITS.

This lemma follows from the previous one if t has unused messages. If t uses all messages, then (t,a) induces N actions, and any such equilibrium satisfies NITS.

Proposition 1.

Assume NN.

  1. 1.

    Any robust best-response sequence converges to an equilibrium that satisfies NITS, and conversely any NITS equilibrium outcome is the outcome of the limit of some robust-best response sequence.

  2. 2.

    If there is a unique equilibrium outcome satisfying NITS, then all robust best-response sequences converge to the same equilibrium, namely (t,a):=(t¯,a¯)=(t¯,a¯), which uses the N highest messages.

Proof of Proposition 1.

(Part 1.) Olszewski (2022, Corollary 1) implies that any robust best-response sequence converges; the limit is an equilibrium in robust best responses by the continuity of robust best responses (Lemma 1). It follows from Lemma 4 that the limit equilibrium satisfies NITS. Conversely, take any NITS equilibrium outcome with n induced actions. Specify the initial conditions such that (t0,a0) induces that outcome with the n highest messages used, and ai0=0 for any unused message mi (i.e., iNn). Robust best response iteration from these initial conditions is constant.

(Part 2.) Now assume a unique equilibrium outcome satisfying NITS. Let (t,a){(t¯,a¯),(t¯,a¯)}. As (t,a) satisfies NITS (by the first part), Chen, Kartik, and Sobel (2008, Proposition 1) implies that (t,a) induces N actions (otherwise, there would be multiple equilibrium outcomes satisfying NITS). As all messages used by t induce distinct actions under a, it follows from Lemma 3 that t uses the N highest messages and ti=ai=0 for i{1,,NN}. As (t,a) satisfies NITS and could have been either (t¯,a¯) or (t¯,a¯), the hypothesis of a unique NITS outcome implies (t¯,a¯)=(t¯,a¯). The result now follows from Theorem 1. ∎

The first part of the proposition says that, given enough messages, robust best response iteration from arbitrary initial conditions selects only the NITS equilibrium outcomes, and all of them. This includes all the equilibrium outcomes with N actions, and under some conditions, rules out all outcomes with fewer actions than some threshold (Chen, Kartik, and Sobel, 2008, Propositions 1 and 2). The second part of the proposition further says if there is a unique NITS equilibrium outcome—e.g., when CS’ regularity condition holds—then robust best response iteration selects not just the unique N equilibrium outcome but also a unique equilibrium. In this equilibrium, the Sender uses maximal exaggeration (i.e., the N highest messages) to induce the N actions.202020Consider the case of N<N, i.e., there are only a limited number of available messages. Lemma 3 still implies that if the limit of any robust best-response sequence has unused messages, then that limit equilibrium satisfies NITS. Hence, if no equilibrium with strictly fewer than N actions satisfies NITS, then all robust best-response sequences converge to equilibria that use all N messages. If, in addition, there is a unique N-action equilibrium outcome, then (t¯,a¯)=(t¯,a¯), and all robust best-response sequences converge to the same equilibrium, whose outcome is the one with N actions. Note that the CS regularity condition assures the hypotheses in both previous sentences. Indeed, in the two-message example of Section 4, the logic for robust best-response iteration (or iterated dominance) selecting the informative equilibrium did not use b>1/12. If instead b<1/12, then N>2=N, but the arguments given there still apply verbatim to select the informative equilibrium.

5.2 Iterated Deletion of Dominated Strategies

We present a result parallel to Theorem 1 for iterated deletion of interim dominated strategies. That is, we offer a process of iterative deletion of interim dominated strategies that leads to the strategy sets

𝒜:={a¯aa¯}and𝒮:={t¯tt¯}.

The idea of the deletion process is intuitive: roughly speaking, in every round k0 we delete the strategies outside [a¯k,a¯k] and [t¯k,t¯k]. The nuance is that at some stage the upper bound t¯k may have unused low messages (i.e., t¯ik=0 for some i), in which case those messages are unused by all strategies in [t¯k,t¯k], and interim dominance then has no bite at those unused messages. Our argument thus involves perturbing the upper bounds. (These perturbations are not needed when NN, as in the example of Section 4.)

Concretely, initialize 𝒜0:=𝒜 and 𝒮0:=𝒮 as the sets of all monotonic Receiver and Sender strategies. We formalize in Appendix C.1 a construction of sequences (εk)k0, (t¯~k)k0 and (a¯~k)k0. The first is a sequence of strictly positive numbers converging to 0. The latter two are perturbations of (t¯k)k0 and (a¯k)k0. Each t¯~k is a strictly increasing vector (so all messages are used) with t¯~kt¯kεk, and a¯~k is the robust best response to t¯~k. The iterative deletion process is that for each k0:

  1. (Rk)

    𝒜k+1 is obtained from 𝒜k by deleting every a such that a[a¯k+1,a¯~k+1].

  2. (Sk)

    𝒮k+1 is obtained from 𝒮k by deleting every t such that t[t¯k+1,t¯~k+1]

We refer to this process of iterated deletion as the bounding-sequence deletion procedure. Define its limit survivor sets

𝒜:=k0𝒜kand𝒮:=k0𝒮k.
Theorem 2.

Consider the bounding-sequence deletion procedure.

  1. 1.

    For all k0: each Receiver strategy in 𝒜k𝒜k+1 is interim dominated by some strategy in 𝒜k relative to 𝒮k; and analogously for the Sender.

  2. 2.

    The limit survivor sets are 𝒜=𝒜 and 𝒮=𝒮.

  3. 3.

    No Receiver strategy in 𝒜 is interim weakly dominated by another strategy in 𝒜 relative to 𝒮, and analogously for the Sender.

This theorem says that the bounding-sequence deletion procedure is a valid process of IDIWDS in the sense that it deletes only interim dominated strategies at each stage, the process continues so long as there are any interim dominated strategies, and the limit sets are nonempty. As interim dominance implies dominance, the process also only deletes dominated strategies at each stage. However, it is possible in general that (𝒮,𝒜) contains strategies that are dominated but not interim dominated. That is not an issue if (𝒮,𝒜) is a singleton; in that case our procedure is also a valid process of IDWDS.

Proposition 2.

Assume NN and a unique equilibrium outcome satisfying NITS. The bounding-sequence deletion procedure is a valid process of IDIWDS (and also IDWDS) that yields a unique strategy profile. This strategy profile is the same as in Proposition 1 part 2, which is an equilibrium that satisfies NITS and induces N actions.

Proof.

Proposition 1 established that, under the current hypotheses, (𝒮,𝒜)={(t¯,a¯)}={(t¯,a¯)}, and this profile is an equilibrium that satisfies NITS and thus induces N actions. The result follows from Theorem 2. ∎

We conjecture that results similar to Theorem 2 and Proposition 2 can be obtained for any valid ID(I)WDS procedure, not just the bounding-sequence deletion procedure. The difficulty in establishing that stems from the multiplicity of best responses.

6 Related Literature

This paper unifies ideas from earlier working papers by different subsets of the authors: Lo (2007), Gordon (2010, 2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). Our goal here is to present transparently the most significant conclusions from those unpublished papers. Those papers contain analyses for other structures of conflict of interest, and other results that are more general, or simply different, in certain directions.

Iterating best responses and (weak or strict) dominance are classical ideas. Our contribution is to combine these ideas, suitably adapted for cheap talk, with the restriction to monotonic strategies and deduce the implications in the CS (Crawford and Sobel, 1982) model. The closest published papers are Sobel (2019) and Olszewski (2022), which both stemmed from the work described here. Olszewski (2022) shows, as a consequence of his more general results on sequences of iterations, that best-response iteration converges in our setting—a fact we use in Proposition 1—but does not study properties of the limit. Sobel (2019) extends Milgrom and Roberts’s (1990) arguments for supermodular games and iterated deletion of strictly dominated strategies to a broader class of games and iterated deletion of weakly dominated strategies (IDWDS). He points out that a class of monotonic cheap-talk games212121He assumes the prior is finitely supported, which technically does not subsume our setting. satisfy a weak form of supermodularity that makes it possible to bound the set of strategies that survive a process of IDWDS. His arguments are related to ours, although his deletion process is phrased via smallest and largest best responses, rather than robust best responses.222222This distinction is not crucial; our arguments could also be made via smallest and largest best responses. Importantly, he does not characterize the bounds.

Rothschild (2013) applies iterated dominance to Gricean scalar implicatures in common-interest communication, restricting agents to only use messages that are literally true. Sobel (2017) and Lo (2021)—the latter stemming from Lo (2009)—apply iterated dominance to pre-play communication in complete-information games, with strategy restrictions on the use of language.

Blume (2025) introduces a notion of language equilibrium in cheap-talk games by iterating best replies starting from a distinguished receiver strategy, interpreted as a pre-existing language. Similar to our approach, language equilibria resolve message indeterminacy and feature language inflation in finite versions of the CS setting. Our approach differs in that selection under robust best responses arises from arbitrary initial conditions; we also discuss iterated dominance.

Farrell (1993) was the first to incorporate exogenous meaning of language into cheap-talk games. His notion of neologism-proof equilibrium is based on the idea that messages have commonly-accepted meanings that are followed so long as they are consistent with incentives. Neologism-proofness does refine the set of equilibria, but it lacks general existence properties—in particular, even in the uniform-quadratic specification of CS.

The literature contains various selection arguments for the equilibrium outcome with N actions in the CS model, which we now turn to.

Mensch (2020) studies existence of monotone pure-strategy perfect Bayesian equilibrium in dynamic games. His main result concerns existence of equilibria with certain monotonicity of beliefs even off path, roughly a form of “support monotonicity”. He notes that such off-path monotonicity selects NITS equilibria in the CS model. Our monotonic-strategies restriction is weaker—hence it has no selection power over outcomes by itself—but robust best responses deliver similar off-path implications. Mensch (2020) does not study iteration of robust best responses or dominance.

Kartik (2009) and Chen (2011) assume the message space equals the type space and introduce perturbations motivated by exogenous meaning: lying costs in Kartik’s case, and behavioral types in Chen’s. When perturbations vanish in both these approaches, equilibria in monotonic strategies converge to NITS outcomes with inflated or exaggerated language, as shown in Chen, Kartik, and Sobel (2008). Our approach in this paper achieves a similar selection, but we impose monotonicity on strategies directly and then apply learning/dominance arguments rather than payoff perturbations.

Dilmé (2022) selects CS equilibrium outcomes that are robust to a class of message-cost payoff perturbations. He shows that under the CS regularity condition, only the outcome with the maximal number of induced actions is robust in this sense.232323He also extends this result when the regularity condition fails or the Sender does not have an upward (or downward) bias. Dilmé’s argument, like ours and those of the papers in the last two paragraphs, operates by showing that some unused messages must lead to low off-path actions. Dilmé does not resolve message indeterminacy.

Sémirat and Forges (2025) study finite cheap-talk games and show that a dynamic adjustment process converges to an undefeated equilibrium in the sense of Mailath, Okuno-Fujiwara, and Postlewaite (1993). Similar to us, their process converges to the largest equilibrium, but the approaches differ: their finite type space allows a fully revealing strategy, which they use as their initial condition, and their adjustments are better replies rather than best replies. They do not discuss dominance arguments.


Appendix A Proofs for Section 3

Proof of Lemma 1.

First consider the Receiver. For any ti1ti, the optimal action aR(ti1,ti) is uniquely defined by strict concavity of uR(,τ) for each τ, and it is increasing in both ti1 and ti by the supermodularity of uR. It is also continuous in [ti1,ti]. Hence for any t=(t0,t1,,tN), the strategy

(aR(t0,t1),,aR(ti1,ti),,aR(tN1,tN))

is a RBR, which is continuous and increasing in t. It is in fact the unique RBR, because for any t that is strictly increasing, there is a unique best response to t; and any RBR must coincide with the limit of those best responses as tt, which is the foregoing RBR.

Now consider the Sender. For any Receiver strategy a=(a1,,aN), the strategy (0=t0,τ(a1,a2),,τ(aN1,aN),tN=1) is a RBR by the construction of τ(,) described before the lemma, and an increasing sequence by the monotonicity of a. That it is continuous and increasing in a follows from continuity and monotonicity of τ(,). The strategy is also the unique RBR because for any a that is strictly increasing, there is a unique best response vector t; and any RBR must coincide with the limit of those best responses as aa, which is the foregoing RBR. ∎

Proof of Lemma 2.

Part (1): Lemma 1 shows that each player RBR is monotonic in the opponent’s strategy. The result follows from induction, given that at k=0, it holds because t¯0 and a¯0 are the highest strategies while t¯0 and a¯0 are the lowest.

Part (2): As t¯0 and a¯0 are the highest strategies, clearly a¯1a¯0 and t¯1t¯0. Thereafter we use induction: if t¯kt¯k1, then a¯ik+1=aR(t¯i1k,t¯ik)aR(t¯i1k1,t¯ik1)=a¯ik, where the inequality uses the same argument as for monotonicity of the Receiver’s RBR. Similarly, following the monotonicity for the Sender’s RBR, we get that if a¯ka¯k1, then t¯k+1t¯k.

Part (3) is analogous to part (2).

Part (4) follows because monotone bounded sequences converge.

Part (5) follows because each player’s RBR is continuous in the opponent’s strategy (Lemma 1), so limits of RBR sequences are mutual robust best responses. ∎

Appendix B Proofs for Section 5.1

Proof of Theorem 1.

Fix any initial conditions (t0,a0) and the sequence of RBR iterations (tk,ak)k0.

We first prove by induction that for all k0, there is sandwiching:

t¯ktkt¯kanda¯kaka¯k.

The case k=0 is immediate from the definitions of the bounding sequences’ extreme initial conditions: t¯0t0t¯0 and a¯0a0a¯0. For the inductive step, assume t¯ktkt¯k and a¯kaka¯k. The monotonicity of the Receiver’s RBR to the Sender’s strategy (Lemma 1) implies that a¯k+1ak+1a¯k+1, because (by construction) each of these is the RBR to Sender strategies with the same ordering. Analogously, by monotonicity of the Sender’s RBR to the Receiver’s strategy (Lemma 1), we get t¯k+1tk+1t¯k+1.

Given the sandwiching for all k, the asymptotic conclusions follow from t¯kt¯ and t¯kt¯ (which was established in Lemma 2). ∎

Proof of Lemma 3.

Consider any equilibrium (t,a) in which a is a robust best response to t. It suffices to prove the lemma’s claim about t, as the property of a follows from it being a robust best response. So suppose, to contradiction, that there is an unused message greater than a used message. Letting mk be the first used message and mi the first unused message above mk, we have 0=tk1<tkti1=ti1. It follows that ak=aR(tk1,tk)<aR(ti)=ai, where the inequality is by monotonicity of aR and the equalities are because a is a robust best response to t. Moreover, the monotonicity of t (and aR) implies that for any used message j, either aj<ai or aj>ai. So ai is an off-path action distinct from all on-path actions. If there is a used message above mi, then ai lies strictly between two consecutive on-path actions, and a positive measure of types near the type that is indifferent between those consecutive on-path actions would deviate to mi. If there is no used message above mi, then ai is strictly above all on-path actions, and a positive measure of types near 1 would deviate to mi. Either way, we contradict (t,a) being an equilibrium. ∎

Proof of Lemma 4.

Assume NN and consider any equilibrium (t,a) in which a is a robust best response. If t has unused messages, then the result follows from Lemma 3, because the Sender has the option to induce aR(0)=0. If t has no unused messages, then N=N and (t,a) induces N distinct actions, so Proposition 1 of Chen, Kartik, and Sobel (2008) implies that it satisfies NITS. ∎

Appendix C Proofs for Section 5.2

C.1 Constructing the Perturbed Upper Bounding Sequence

Interim dominance for the Receiver concerns on-path messages (i.e., those sent with positive probability by some relevant Sender strategy). But the upper-bounding robust best-response sequence can reach a stage at which it does not use a set of low messages, in which case all the strategies between the upper and lower bound do not use those messages. To ensure that each round admits a surviving Sender strategy that uses every message—so the Receiver’s interim comparisons have an on-path witness when needed—we perturb the upper bounding Sender sequence to have strategies that are strictly increasing, which we refer to as “activation”. Let us formalize that.

For any t=(0=t0,,tN=1), let j(t):=min{i{1,,N}:ti>0} be the first used message. For any ε(0,1), define a self-map Actε:𝒮𝒮 by t^t, where t is constructed as follows (with t0=0 and tN=1):

  1. 1.

    ti:=t^i for all ij(t^).

  2. 2.

    For i=j(t^)1,j(t^)2,,1 define recursively ti:=min{ε,ti+1/2}.

In other words, Actε preserves the cutoffs for all messages used by t^, while perturbing cutoffs for each unused lower message by assigning it a small interval of types.

Lemma 5.

For any t^ and any ε(0,1), the activated vector t:=Actε(t^) satisfies:

  1. 1.

    0=t0<t1<<tN=1.

  2. 2.

    ti=t^i for all ij(t^).

  3. 3.

    For all i<j(t^), tiε.

Proof.

Parts (2) and (3) are immediate. For (1), note that the recursive definition titi+1/2 for i<j(t^) implies strict inequalities. ∎

Let RBRR(t) denote the Receiver robust best response to t, and RBRS(a) denote the Sender robust best response to a (as characterized in Section 3.1).

We define a sequence analogous to the upper bounding sequence from Section 3.2 by iterating robust best responses from the highest initial condition, but with a perturbation through the activation map. The activation level shrinks to zero over rounds, which will allow us to ensure a single valid deletion procedure whose limit equals the unperturbed bound sets.

To that end, initialize

ε0:=1,t¯~ 0:=(0,1,1,,1),a¯~ 0:=(1,1,,1),

and for k0 define

εk+1 :=min(εk/2,t¯~1k),
a¯~k+1 :=RBRR(t¯~k),t¯^k+1:=RBRS(a¯~k),t¯~k+1:=Actεk+1(t¯^k+1).

Because t¯~1k>0 for all k1 (Lemma 6 below), the sequence (εk)k0 is strictly positive, decreasing, and converges to zero. We will use the original lower bounding sequences (t¯k)k0 and (a¯k)k0 from Section 3.2.

Lemma 6.

For every k1, the strategy t¯~k is strictly increasing. Consequently, a¯~k is strictly increasing for every k1.

Proof.

For k1, the strategy t¯~k is obtained by applying Actεk to some t¯^k, so it is strictly increasing by Lemma 5. For any strictly increasing t, RBRR(t) is strictly increasing because for 0x<y<z1, strict supermodularity of uR implies aR(x,y)<aR(y,z). ∎

The next lemma parallels Lemma 2.

Lemma 7.

For every k0:

  1. 1.

    t¯kt¯~k and a¯ka¯~k.

  2. 2.

    t¯~k+1t¯~k and a¯~k+1a¯~k.

  3. 3.

    t¯~kt¯, a¯~ka¯.

Consequently, for every coordinate i and all integers 1rk+1,

a¯ira¯ik+1a¯~ik+1a¯~ir,

and

t¯irt¯ik+1t¯~ik+1t¯~ir.
Proof.

Part (1): Lemma 1 shows that each player’s robust best response is monotonic, and activation can only increase cutoffs. The result follows from induction, given that t¯0t¯~ 0 and a¯0a¯~ 0 by construction.

Part (2): We use induction. Because t¯~ 0 and a¯~ 0 are the highest strategies, we have a¯~ 1a¯~ 0 and t¯~ 1t¯~ 0. Assume t¯~kt¯~k1 and a¯~ka¯~k1. Then monotonicity of RBRR implies

a¯~k+1RBRR(t¯~k)RBRR(t¯~k1)a¯~k,

and monotonicity of RBRS implies

t¯^k+1RBRS(a¯~k)RBRS(a¯~k1)t¯^k.

It remains to show

t¯~k+1Actεk+1(t¯^k+1)Actεk(t¯^k)t¯~k.

For coordinates i1 with t¯^ik+1>0, we have t¯~ik+1=t¯^ik+1t¯^ikt¯~ik. For coordinates i1 with t¯^ik+1=0, we have t¯~ik+1εk+1t¯~1kt¯~ik, where the last inequality uses that t¯~k is increasing (Lemma 6).

Part (3): Part (2) implies that (t¯~k)k0 and (a¯~k)k0 are bounded monotone sequences, hence they converge. It remains to note that the vanishing activation does not affect the limiting bounds: the activation only perturbs cutoffs for the unused low messages, by at most εk0 (Lemma 5). By continuity of RBRR and RBRS (Lemma 1), the limits coincide with those of the unactivated bounding sequences. This yields part (3). ∎

C.2 Elimination Lemmas

Lemma 8.

Fix k0 and a𝒜k. If there exists i{1,,N} such that either ai>a¯~ik+1 or ai<a¯ik+1, then a is interim weakly dominated by some b𝒜k relative to 𝒮k.

Proof.

We prove the first case (ai>a¯~ik+1); the second is analogous. Let i be the smallest index with ai>a¯~ik+1. Define b by bi:=a¯~ik+1 and bj:=aj for ji. We first show that b𝒜k, and then show that b interim weakly dominates a relative to 𝒮k.

(Feasibility.) It suffices to check bi1bibi+1 (ignoring the irrelevant inequality if i{1,N}). By minimality of i and monotonicity of both a and a¯~k+1,

bi1=ai1a¯~i1k+1a¯~ik+1=bi<aiai+1=bi+1.

So b is an increasing vector.

As a𝒜k, it satisfies all past bounds: ai[a¯ir,a¯~ir] for all i{1,,N} and all rk. The strategy b differs from a only at i. By Lemma 2 and Lemma 7, a¯r is increasing and a¯~r is decreasing in r, so for every rk,

a¯ira¯ik+1bi=a¯~ik+1a¯~ir.

Hence b satisfies all past bounds and belongs to 𝒜k.

(Interim dominance.) Fix any t𝒮k. If mi is off path under t, there is no interim constraint at i. If mi is on path (i.e. ti1<ti, as is the case in particular when t=t¯~k by Lemma 6), the Receiver’s expected payoff conditional on mi is strictly concave and maximized at aR(ti1,ti). As tt¯~k, monotonicity of aR(,) yields

aR(ti1,ti)aR(t¯~i1k,t¯~ik)=a¯~ik+1=bi<ai.

Thus replacing ai by bi strictly improves the interim payoff after mi for every such t. All other coordinates of b and a coincide, so b interim weakly dominates a. ∎

Lemma 9.

Fix k0 and t𝒮k. If there exists i{1,,N1} such that either ti>t¯~ik+1 or ti<t¯ik+1, then t is interim weakly dominated by some s𝒮k relative to 𝒜k.

Proof.

We prove the first case (ti>t¯~ik+1); the second is analogous. Let i be the smallest index with ti>t¯~ik+1. Define s by si:=t¯~ik+1 and sj:=tj for ji. Only types in [si,ti) change messages when switching from t to s; they switch from mi to mi+1. We first verify that s𝒮k, and then show that s interim weakly dominates t relative to 𝒜k.

(Feasibility.) It suffices to check si1sisi+1. By minimality of i and monotonicity of both t and t¯~k+1,

si1=ti1t¯~i1k+1t¯~ik+1=si<titi+1=si+1.

So s is an increasing vector.

As t𝒮k, it satisfies all past bounds: ti[t¯ir,t¯~ir] for all i{0,,N} and rk. The strategy s differs from t only at i. By Lemma 2 and Lemma 7, t¯r is increasing and t¯~r is decreasing in r, so for every rk,

t¯irt¯ik+1si=t¯~ik+1t¯~ir.

Hence s satisfies all past bounds and belongs to 𝒮k.

(Interim dominance.) Fix any a𝒜k. If ai=ai+1 then all switching types are indifferent, so they weakly prefer s to t. Now suppose ai<ai+1 (as is the case in particular when a=a¯~k, by Lemma 6). As aa¯~k, monotonicity of τ(,) (defined in Section 3.1) implies

τ(ai,ai+1)τ(a¯~ik,a¯~i+1k).

By definition of the Sender robust best response,

τ(a¯~ik,a¯~i+1k)=t¯^ik+1,

and by construction of the activated upper bound, t¯^ik+1t¯~ik+1=si. Therefore τ(ai,ai+1)si, so every type τ[si,ti) strictly prefers ai+1 to ai, and hence strictly prefers s to t against a. It follows that s interim weakly dominates t. ∎

C.3 Survival Lemma

Lemma 10.

No Receiver strategy in 𝒜 is interim weakly dominated by another Receiver strategy in 𝒜, relative to 𝒮; and analogously for the Sender.

Proof.

(Receiver.) Take aa, both in 𝒜. We will argue that a does not interim weakly dominate a, relative to 𝒮. Let I:={i{1,,N}:aiai}. Clearly the dominance cannot hold if ti1=ti for all iI and all t𝒮. So assume that is not the case, and choose an iI and tw𝒮 with ti1w<tiw. Define a continuous path of Sender strategies (tλ)λ[0,1] by

tλ:={(12λ)t¯+2λtw,λ[0,12],(22λ)tw+(2λ1)t¯,λ[12,1].

As 𝒮 is convex, we have tλ𝒮 for all λ. Moreover, tiλti1λ is affine in λ on each of the two subintervals [0,12] and [12,1], and satisfies ti1/2ti11/2=tiwti1w>0. Hence tiλti1λ is not identically zero on either subinterval, and therefore ti1λ<tiλ for all λ(0,1) except possibly for at most one value of λ in each subinterval.

Now define the continuous function

g(λ):=aR(ti1λ,tiλ),

with the usual convention aR(x,y)=aR(x) if x=y. Because (t¯,a¯) and (t¯,a¯) are each a pair of mutual robust best responses, we have g(0)=a¯i and g(1)=a¯i. Because ai[a¯i,a¯i], the intermediate value theorem yields λ0[0,1] such that g(λ0)=ai.

Let Πi(λ) be the difference in the Receiver’s interim expected payoff from choosing ai rather than ai after message mi under tλ. The function Πi is continuous. Strict concavity of uR implies Πi(λ0)>0 because aiai=g(λ0), hence Πi(λ)>0 for all λ sufficiently close to λ0. Choose such a λ with Πi(λ)>0 and ti1λ<tiλ (so mi is on path under tλ). Then a cannot interim weakly dominate a relative to 𝒮.

(Sender.) Take tt, both in 𝒮. We will argue that t does not interim weakly dominate t, relative to 𝒜. Let I:={i{1,,N1}:titi}. Clearly the dominance cannot hold if ai=ai+1 for all iI and all a𝒜. So assume that is not the case, and choose iI such that ai<ai+1 for some a𝒜. Suppose ti>ti (the opposite case is symmetric) and let i:=max{jI:tj>tj}. Then ti<titi+1, hence E:=[ti,ti)[ti,ti+1). Therefore every type τE (a set of positive measure) sends message mi+1 under t (and so induces action ai+1), while under t its message is at most mi (and so the induced action is at most ai).

Now consider the path aλ:=(1λ)a¯+λa¯𝒜, for λ[0,1]. As t¯iti>ti, monotonicity of aR gives a¯i+1>aR(t¯i1,t¯i)=a¯i, hence ai+1λ>aiλ for all λ>0. For λ(0,1], let c(λ):=τ(aiλ,ai+1λ) be the type that is indifferent between these two actions; if no indifferent type exists, set c(λ):=0 if all types prefer the higher action, or c(λ):=1 otherwise. The function c is continuous on (0,1] and we extend it continuously to λ=0 by c(0):=t¯i, because t¯ is a robust best response to a¯. Similarly, because t¯ is a robust best response to a¯, we have c(1)=t¯i. Because ti[t¯i,t¯i], the intermediate value theorem yields λ[0,1] such that c(λ)=ti. If λ>0, then ai+1λ>aiλ, so every type τ>ti strictly prefers ai+1λ to aiλ, and hence also to any lower action. Therefore, every type in E strictly prefers t to t against aλ. If λ=0, pick any small λ>0; by continuity of c, we have c(λ)<ti, and because ai+1λ>aiλ, every type in (c(λ),ti)E strictly prefers t to t against aλ; that intersection set has positive measure because c(λ)<ti. It follows that t does not interim weakly dominate t relative to 𝒜. ∎

C.4 Putting the Pieces Together

Proof of Theorem 2.

Part (3) is Lemma 10.

For part (1), Lemma 8 establishes what is needed for the Receiver deletions in (Rk), and Lemma 9 for the Sender deletions in (Sk).

For part (2), Lemma 7 implies that for each k,

𝒜k={a𝒜:a¯kaa¯~k}and𝒮k={t𝒮:t¯ktt¯~k}.

Taking intersections over k and using a¯ka¯, a¯~ka¯, t¯kt¯, and t¯~kt¯ (Lemma 2 and Lemma 7) yields

𝒜={a𝒜:a¯aa¯}𝒜and𝒮={t𝒮:t¯tt¯}𝒮.

References

  • D. Balkenborg, J. Hofbauer, and C. Kuzmics (2013) Refined best reply correspondence and dynamics. Theoretical Economics 8 (1), pp. 165–192. Cited by: footnote 10.
  • D. Balkenborg, J. Hofbauer, and C. Kuzmics (2015) The refined best-response correspondence in normal form games. International Journal of Game Theory 44 (1), pp. 165–193. Cited by: §1.1, footnote 10.
  • A. Blume (2025) Meaning in communication games. Technical report University of Arizona. Cited by: §6.
  • H. Cai and J. T. Wang (2006) Overcommunication in strategic information transmission games. Games and Economic Behavior 56 (1), pp. 7–36. Cited by: §1.
  • Y. Chen, N. Kartik, and J. Sobel (2008) Selecting cheap-talk equilibria. Econometrica 76 (1), pp. 117–136. Cited by: Appendix B, §1, §2.2, §2.2, §5.1, §5.1, §6.
  • Y. Chen (2011) Perturbed communication games with honest senders and naive receivers. Journal of Economic Theory 146 (2), pp. 401–424. Cited by: §1, §6.
  • V. P. Crawford and J. Sobel (1982) Strategic information transmission. Econometrica 50 (6), pp. 1431–1451. Cited by: Effective Communication in Cheap-Talk Gamesthanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments., §1, §1, §2.1, §6.
  • F. Dilmé (2022) Robust information transmission. American Economic Review: Insights 5 (1), pp. 111–24. Cited by: §6.
  • J. Farrell (1993) Meaning and credibility in cheap-talk games. Games and Economic Behavior 5 (4), pp. 514–531. Cited by: §6.
  • S. Gordon (2010) On infinite cheap talk equilibria. Technical report Université de Montréal. Cited by: §6.
  • S. Gordon (2011) Iteratively stable cheap talk. Technical report Université de Montréal. Cited by: Effective Communication in Cheap-Talk Gamesthanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments., §6.
  • J. R. Green and N. L. Stokey (2007) A two-person game of information transmission. Journal of Economic Theory 135 (1), pp. 90–104. Cited by: §1.
  • N. Kartik and J. Sobel (2015) Effective communication in cheap-talk games. Technical report UCSD. Cited by: Effective Communication in Cheap-Talk Gamesthanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments., §6.
  • N. Kartik (2009) Strategic communication with lying costs. Review of Economic Studies 76 (4), pp. 1359–1395. Cited by: §1, §6.
  • D. Lewis (1969) Convention: a philosophical study. Harvard University Press, Cambridge, MA. Cited by: §1.
  • M. P. Lo and W. Olszewski (2018) Learning in cheap-talk games. Technical report Northwestern University. Cited by: Effective Communication in Cheap-Talk Gamesthanks: This paper combines results from three projects: Gordon (2011), Kartik and Sobel (2015), and Lo and Olszewski (2018). We are grateful to many seminar audiences and to Pierpaolo Battigalli, Andreas Blume, Richard Brady, Vincent Crawford, Françoise Forges, Sjaak Hurkens, Hongcheng Li, Philip Neary, Alexsandr Levkun, Jeffrey Mensch, Stéphan Sémirat, Olivier Tercieux, Yuehui Wang, Joel Watson, and Yangfan Zhou for useful comments., §6.
  • M. Lo (2021) Language and coordination games. Economic Theory 72 (1), pp. 49–92. Cited by: §6.
  • P. Lo (2007) Common knowledge of language and iterative admissibility in a sender-receiver game. Technical report Brown University. Cited by: §6.
  • P. Lo (2009) Language and coordination games. Technical report University of Hong Kong. Cited by: §6.
  • G. J. Mailath, M. Okuno-Fujiwara, and A. Postlewaite (1993) Belief-based refinements in signaling games. Journal of Economic Theory 60 (2), pp. 241–276. Cited by: §6.
  • J. Mensch (2020) On the existence of monotone pure-strategy perfect Bayesian equilibrium in games with complementarities. Journal of Economic Theory 187, pp. 105–126. Cited by: §6.
  • P. Milgrom and J. Roberts (1990) Rationalizability, learning, and equilibrium in games with strategic complementarities. Econometrica 58 (6), pp. 1255–1277. Cited by: §6.
  • R. B. Myerson and J. W. Weibull (2015) Tenable strategy blocks and settled equilibria. Econometrica 83 (3), pp. 943–976. Cited by: §1.1, §1.
  • W. Olszewski (2022) A result on convergence of sequences of iterations with applications to best-response dynamics. Mathematics of Operations Research 47 (3), pp. 2333–2343. Cited by: §5.1, §6, footnote 19.
  • D. Rothschild (2013) Game theory and scalar implicatures. Philosophical Perspectives 27 (1), pp. 438–478. Cited by: §6.
  • S. Sémirat and F. Forges (2025) Converging better response dynamics in sender receiver games. Université Paris-Dauphine. Note: forthcoming in Mathematics of Operations Research Cited by: §6.
  • M. Shimoji and J. Watson (1998) Conditional dominance, rationalizability, and game forms. Journal of Economic Theory 83 (2), pp. 161–195. Cited by: footnote 13.
  • J. Sobel (2017) A note on pre-play communication. Games and Economic Behavior 102, pp. 477–486. External Links: Document Cited by: §6.
  • J. Sobel (2019) Iterated weak dominance and interval-dominance supermodular games. Theoretical Economics 14 (1), pp. 71–102. Cited by: §6.
  • J. T. Wang, M. Spezio, and C. F. Camerer (2010) Pinocchio’s pupil: using eyetracking and pupil dilation to understand truth telling and deception in sender-receiver games. American Economic Review 100 (3), pp. 984–1007. Cited by: §1.
HTML version from LaTeX source using LaTeXML, with custom CSS/JS rendering. For the definitive version, see PDF.