-
Low-Power Optimal Strategy for Witsenhausen Counterexample
Authors:
Mengyuan Zhao,
Maël Le Treust,
Tobias J. Oechtering
Abstract:
We discuss the Witsenhausen counterexample from the perspective of varying power budgets and propose a low-power estimation (LoPE) strategy. Specifically, our LoPE approach designs the first decision-maker (DM) a quantization step function of the Gaussian source state, making the target system state a piecewise linear function of the source with slope one. This approach contrasts with Witsenhausen…
▽ More
We discuss the Witsenhausen counterexample from the perspective of varying power budgets and propose a low-power estimation (LoPE) strategy. Specifically, our LoPE approach designs the first decision-maker (DM) a quantization step function of the Gaussian source state, making the target system state a piecewise linear function of the source with slope one. This approach contrasts with Witsenhausen's original two-point strategy, which instead designs the system state itself to be a binary step. While the two-point strategy can outperform the linear strategy in estimation cost, it, along with its multi-step extensions, typically requires a substantial power budget. Analogous to Binary Phase Shift Keying (BPSK) communication for Gaussian channels, we show that the binary LoPE strategy attains first-order optimality in the low-power regime, matching the performance of the linear strategy as the power budget increases from zero. Our analysis also provides an interpretation of the previously observed near-optimal sloped step function ("sawtooth") structure to the Witsenhausen counterexample: In the low-power regime, power saving is prioritized, in which case the LoPE strategy dominates, making the system state a piecewise linear function with slope close to one. Conversely, in the high-power regime, setting the system state as a step function with the slope approaching zero facilitates accurate estimation. Hence, the sawtooth solution can be seen as a combination of both strategies.
△ Less
Submitted 2 September, 2025;
originally announced September 2025.
-
Bregman proximal gradient method for linear optimization under entropic constraints
Authors:
Luis M. Briceño-Arias,
Maël Le Treust
Abstract:
In this paper, we present an efficient algorithm for solving a linear optimization problem with entropic constraints -- a class of problems that arises in game theory and information theory. Our analysis distinguishes between the cases of active and inactive constraints, addressing each using a Bregman proximal gradient method with entropic Legendre functions, for which we establish an ergodic con…
▽ More
In this paper, we present an efficient algorithm for solving a linear optimization problem with entropic constraints -- a class of problems that arises in game theory and information theory. Our analysis distinguishes between the cases of active and inactive constraints, addressing each using a Bregman proximal gradient method with entropic Legendre functions, for which we establish an ergodic convergence rate of $O(1/n)$ in objective values. For a specific cost structure, our framework provides a theoretical justification for the well-known Blahut-Arimoto algorithm. In the active constraint setting, we include a bisection procedure to approximate the strictly positive Lagrange multiplier. The efficiency of the proposed method is illustrated through comparisons with standard optimization solvers on a representative example from game theory, including extensions to higher-dimensional settings.
△ Less
Submitted 13 June, 2025; v1 submitted 12 June, 2025;
originally announced June 2025.
-
Optimal Gaussian Strategies for Vector-valued Witsenhausen Counterexample with Non-causal State Estimator
Authors:
Mengyuan Zhao,
Tobias J. Oechtering,
Maël Le Treust
Abstract:
In this study, we investigate a vector-valued Witsenhausen model where the second decision maker (DM) acquires a vector of observations before selecting a vector of estimations. Here, the first DM acts causally whereas the second DM estimates non-causally. When the vector length grows, we characterize, via a single-letter expression, the optimal trade-off between the power cost at the first DM and…
▽ More
In this study, we investigate a vector-valued Witsenhausen model where the second decision maker (DM) acquires a vector of observations before selecting a vector of estimations. Here, the first DM acts causally whereas the second DM estimates non-causally. When the vector length grows, we characterize, via a single-letter expression, the optimal trade-off between the power cost at the first DM and the estimation cost at the second DM. In this paper, we show that the best linear scheme is achieved by using the time-sharing method between two affine strategies, which coincides with the convex envelope of the solution of Witsenhausen in 1968. Here also, Witsenhausen's two-point strategy and the scheme of Grover and Sahai in 2010 where both devices operate non-causally, outperform our best linear scheme. Therefore, gains obtained with block-coding schemes are only attainable if all DMs operate non-causally.
△ Less
Submitted 23 August, 2024; v1 submitted 5 August, 2024;
originally announced August 2024.
-
Continuous Random Variable Estimation is not Optimal for the Witsenhausen Counterexample
Authors:
Maël Le Treust,
Tobias Oechtering
Abstract:
Optimal design of distributed decision policies can be a difficult task, illustrated by the famous Witsenhausen counterexample. In this paper we characterize the optimal control designs for the vector-valued setting assuming that it results in an internal state that can be described by a continuous random variable which has a probability density function. More specifically, we provide a genie-aide…
▽ More
Optimal design of distributed decision policies can be a difficult task, illustrated by the famous Witsenhausen counterexample. In this paper we characterize the optimal control designs for the vector-valued setting assuming that it results in an internal state that can be described by a continuous random variable which has a probability density function. More specifically, we provide a genie-aided outer bound that relies on our previous results for empirical coordination problems. This solution turns out to be not optimal in general, since it consists of a time-sharing strategy between two linear schemes of specific power. It follows that the optimal decision strategy for the original scalar Witsenhausen problem must lead to an internal state that cannot be described by a continuous random variable which has a probability density function.
△ Less
Submitted 4 February, 2021;
originally announced February 2021.
-
Information Design for Strategic Coordination of Autonomous Devices with Non-Aligned Utilities
Authors:
Maël Le Treust,
Tristan Tomala
Abstract:
In this paper, we investigate the coordination of autonomous devices with non-aligned utility functions. Both encoder and decoder are considered as players, that choose the encoding and the decoding in order to maximize their long-run utility functions. The topology of the point-to-point network under investigation, suggests that the decoder implements a strategy, knowing in advance the strategy o…
▽ More
In this paper, we investigate the coordination of autonomous devices with non-aligned utility functions. Both encoder and decoder are considered as players, that choose the encoding and the decoding in order to maximize their long-run utility functions. The topology of the point-to-point network under investigation, suggests that the decoder implements a strategy, knowing in advance the strategy of the encoder. We characterize the encoding and decoding functions that form an equilibrium, by using empirical coordination. The equilibrium solution is related to an auxiliary game in which both players choose some conditional distributions in order to maximize their expected utilities. This problem is closely related to the literature on "Information Design" in Game Theory. We also characterize the set of posterior distributions that are compatible with a rate-limited channel between the encoder and the decoder. Finally, we provide an example of non-aligned utility functions corresponding to parallel fading multiple access channels.
△ Less
Submitted 13 November, 2017;
originally announced November 2017.
-
Persuasion with limited communication capacity
Authors:
Maël Le Treust,
Tristan Tomala
Abstract:
We consider a Bayesian persuasion problem where the persuader and the decision maker communicate through an imperfect channel that has a fixed and limited number of messages and is subject to exogenous noise. We provide an upper bound on the payoffs the persuader can secure by communicating through the channel. We also show that the bound is tight, i.e., if the persuasion problem consists of a lar…
▽ More
We consider a Bayesian persuasion problem where the persuader and the decision maker communicate through an imperfect channel that has a fixed and limited number of messages and is subject to exogenous noise. We provide an upper bound on the payoffs the persuader can secure by communicating through the channel. We also show that the bound is tight, i.e., if the persuasion problem consists of a large number of independent copies of the same base problem, then the persuader can achieve this bound arbitrarily closely by using strategies that tie all the problems together. We characterize this optimal payoff as a function of the information-theoretic capacity of the communication channel.
△ Less
Submitted 4 September, 2019; v1 submitted 13 November, 2017;
originally announced November 2017.