Startseite Credibly Confidential Contracts
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Credibly Confidential Contracts

  • Alice Peng-Ju Su ORCID logo EMAIL logo
Veröffentlicht/Copyright: 23. Juni 2025

Abstract

Confidential contracts are signed to protect the identity of contracting parties from disclosure. However, such confidentiality is not credible if outsiders can perfectly infer the identity of the contracting parties in equilibrium. A confidential contract is credibly confidential when an inactive player uninvolved in the contract holds a non-degenerate Bayesian belief on the identity of the agent in the contractual relationship. The main research questions are whether and through what channel the preference for credible confidentiality influences incentive provision within a contract and how confidentiality concerns affect the endogenous formation of contractual relationships. With a preference for confidentiality, an agent’s participation is motivated by a confidentiality premium, which amplifies the conventional tradeoff between efficiency and risk premium. Confidentiality concerns thus distort incentives within a contractual relationship when the agent is risk-averse. Furthermore, the principal may deliberately contract with a less efficient agent with a higher equilibrium probability to reduce the confidentiality premium, leading to an inefficient match. Credible confidentiality provides an explanation for the distortion of incentive provision within a contractual relationship and an inefficient formation of contractual relationships even when the principal and the agents are rational and well-informed.

JEL Classification: D86; D83; J41

Corresponding author: Alice Peng-Ju Su, Department of Economics, National Taipei University, 151 University Rd., Sanxia Dist., New Taipei City, 237303, Taiwan, E-mail:

Award Identifier / Grant number: MoST 108-2410-H-305-031-MY2

Acknowledgment

I appreciate all the helpful comments from the anonymous referees. Financial support from the National Science and Technology Council, Taiwan (MoST 108-2410-H-305-031-MY2) is gratefully acknowledged.

Appendix A: Proofs

The principal’s contracting problem

max e , t 1 , t 0 , p i N p i q ( e i | v i ) ( 1 t 1 i ) ( 1 q ( e i | v i ) ) t 0 i i N η 0 ( p i α 0 ) 2

subject to

q ( e i | v i ) u ( t 1 i ) + ( 1 q ( e i | v i ) ) u ( t 0 i ) c e i η i ( p i α i ) 2 0 ( I R i ) ,
e i arg max e q ( e | v i ) u ( t 1 i ) + ( 1 q ( e | v i ) ) u ( t 0 i ) c e η i ( p i α i ) 2 ( I C i ) ,

and

i p i 1 .

A.1: Proof of Proposition 1

Disutility of identity exposure does not depend on the content of the contract, so the contract proposed to agent i with probability p i , C i * = t 1 i * , t 0 i * implementing e i * , solves the reduced problem

max e i , t 1 i , t 0 i q ( e i | v i ) ( 1 t 1 i ) ( 1 q ( e i | v i ) ) t 0 i

subject to

q ( e i | v i ) u ( t 1 i ) + ( 1 q ( e i | v i ) ) u ( t 0 i ) c e i η i ( p i α i ) 2 0 ( I R i )

and

e i arg max e q ( e | v i ) u ( t 1 i ) + ( 1 q ( e | v i ) ) u ( t 0 i ) c e η i ( p i α i ) 2 ( I C i ) .

For any t1i > t0i, the incentive compatibility constraint (IC i ) can be replaced by the local incentive compatibility q′(e i |v i ) ⋅ (u(t1i) − u(t0i)) − c = 0. Incentive compatibility only depends on the difference in transfer. The individual rationality constraint (IR i ) is binding. For any pair of transfer (t0i, t1i) such that (IR i ) is slacking, there is an alternative pair t 0 i , t 1 i < ( t 0 i , t 1 i ) that generates u t 0 i = u ( t 0 i ) ε and u t 1 i = u ( t 1 i ) ε such that q ( e i | v i ) ( u ( t 1 i ) ε ) + ( 1 q ( e i | v i ) ) ( u ( t 0 i ) ε ) c e i η i ( p i α i ) 2 0 and that local incentive compatibility is unaffected. The principal clearly prefers t 0 i , t 1 i to (t0i, t1i). By binding (IR i ) and local incentive compatibility, the optimal transfer schedule t 1 i * , t 0 i * to implement effort e i * has

u t 0 i * = c e i * q e i * | v i q e i * | v i + η i ( p i α i ) 2 u t 1 i * = c e i * + 1 q e i * | v i q e i * | v i + η i ( p i α i ) 2 .

With q e i * | v i > 0 and q e i * | v i > 0 for any e i * > 0 , the optimal transfer schedule satisfies t 1 i * > t 0 i * .

◼ Risk-Neutral Agent with u(t) = t.

Binding (IR i ) implies that q e i * | v i t 1 i * + 1 q e i * | v i t 0 i * c e i * = η i ( p i α i ) 2 > 0 . The excessive transfer beyond the cost of effort is to motivate agent i to participate when he is averse to identity exposure, defined as the confidentiality premium m * = q e i * | v i t 1 i * + 1 q e i * | v i t 0 i * c e i * = η i ( p i α i ) 2 .

With binding individual rationality, the effort e i * implemented by t 1 i * , t 0 i * solves

max e q ( e | v i ) c e η i ( p i α i ) 2 .

The expected transfer is a sum of the total cost of effort and confidentiality premium, with the latter being independent of effort choice. The contract thus implements the efficient level of effort e i * = e ̄ i arg max e q ( e | v i ) c e .

◼ Risk-Averse Agent with u′′(t) < 0.

Denote u 0 i * u t 0 i * and u 1 i * u t 1 i * . With binding individual rationality, the effort e i * implemented by t 1 i * , t 0 i * solves

max e q ( e | v i ) q ( e | v i ) u 1 u 1 i * ( 1 q ( e | v i ) ) u 1 u 0 i * .

The first-order optimality condition has q ( e | v i ) = q ( e | v i ) u 1 u 1 i * u 1 u 0 i * + q ( e | v i ) 1 u t 1 i * u 1 i * e + ( 1 q ( e | v i ) ) 1 u t 0 i * u 0 i * e , which can be rearranged to q ( e | v i ) = q ( e | v i ) u 1 u 1 i * u 1 u 0 i * + 1 u t 1 i * 1 u t 0 i * q ( e | v i ) ( 1 q ( e | v i ) ) q ( e | v i ) c ( q ( e | v i ) ) 2 . At η i  = 0, the solution corresponds to the second-best effort in a standard contracting problem with a risk-averse agent. The difference in transfers u 1 u 1 i * u 1 u 0 i * is increasing in the disutility of identity exposure as u 1 u 1 i * u 1 u 0 i * d ( μ i | η i , α i ) = 1 u t 1 i * 1 u t 0 i * > 0 , given a strictly concave utility of transfer and t 1 i * > t 0 i * . The difference in inverse marginal utilities 1 u t 1 i * 1 u t 0 i * are also increasing in the disutility of identity exposure if u t 1 i * 1 u t 0 i * 1 d ( μ i | η i , α i ) = u t 1 i * u t 1 i * 3 + u t 0 i * u t 0 i * 3 > 0 , which holds if the absolute risk aversion is not sharply decreasing in transfer. Therefore, the right-hand-side of the first-order condition is increasing in d(μ i |η i , α i ). The marginal contractual cost of effort for the principal is increasing in the disutility of identity exposure. The optimal effort to implement is further distorted downwards from the second-best.

A.2: Proof of Lemma 1, Proposition 2, and Corollary 1

Anticipating the optimal contracts proposed with probability p = (p1, p2, …, p n ) in Proposition 1, the principal contracts with agent i with probability p i * that

max p i N p i q e i * | v i c e i * η i ( p i α i ) 2 η 0 ( p i α 0 ) 2

subject to ∑ i p i ≤ 1. Denote λ as the Lagrange multiplier to this constraint and λ* as its equilibrium measure.

By the first-order optimality conditions, q e i * | v i c e i * η i ( p i α i ) 2 p i η i 2 ( p i α i ) η 0 2 ( p i α 0 ) λ * 0 , p i q e i * | v i c e i * η i ( p i α i ) 2 p i η i 2 ( p i α i ) η 0 2 ( p i α 0 ) λ * = 0 , and (1 − ∑ i p i ) ⋅ λ* = 0. By the second order conditions, −η i ⋅ (3 ⋅ p i  − 2 ⋅ α i ) − η0 < 0 if η0 > 2 ⋅ η i α i for all p i or p i > 2 3 α i 1 3 η 0 η i . For any agent i to whom the principal proposes a contract with a positive probability p i * > 0 , it satisfies q e i * | v i c e i * η i ( p i * α i ) 2 p i * η i 2 ( p i * α i ) η 0 2 ( p i * α 0 ) = λ * . It is optimal to propose a contract to agent −i with probability p i * = 0 if q e i * | v i c e i * η i α i 2 + η 0 2 α 0 < λ * .

Denote the surplus in the contractual relationship with agent i as s ( v i ) q e i * | v i c e i * . Suppose that among all agents to whom the principal proposes a contract with a positive probability, agent h has the highest matching value. Any other agent lh with l > 0 has v l  < v h . In equilibrium, p h * , p l * > ( 0,0 ) satisfies s ( v h ) η h ( p h * α h ) 2 p h * η h 2 ( p h * α h ) η 0 2 ( p h * α 0 ) = s ( v l ) η l ( p l * α l ) 2 p l * η l 2 ( p l * α l ) η 0 2 ( p l * α 0 ) from the optimality conditions in Lemma 1, which can be rearranged to s ( v h ) s ( v l ) η 0 2 ( p h * p l * ) = η h ( p h * α h ) ( 3 p h * α h ) η l ( p l * α l ) ( 3 p l * α l ) . The left-hand side of this equation is the difference in surplus and the difference in the principal’s disutility of identity exposure, while the right-hand side is the difference in the marginal confidentiality premium.

To see conditions under which the equilibrium has p l * > p h * , evaluate each side of the equation at p l = p h * . It is more likely for the principal to contract with agent l who has a lower matching value if and only if s ( v h ) s ( v l ) < η h ( p h * α h ) ( 3 p h * α h ) η l ( p h * α l ) ( 3 p h * α l ) . The right-hand side of this inequality is the difference in marginal expected confidentiality premium if the principal proposes a contract to agent h and agent l with the same probability p h * , denoted as Δ α h , α l , p h * η h ( p h * α h ) ( 3 p h * α h ) η l ( p h * α l ) ( 3 p h * α l ) . If s ( v h ) s ( v l ) < Δ α h , α l , p h * , q e l * | v l c e l * η l ( p h * α l ) 2 p h * η l 2 ( p h * α l ) η 0 2 ( p h * α 0 ) > λ * , the principal has incentive to raise p l * above p h * . If p l * > p h * , by the optimality conditions, q e l * | v l c e l * η l ( p h * α l ) 2 p h * η l 2 ( p h * α l ) η 0 2 ( p h * α 0 ) > λ * = q e h * | v h c e h * η h ( p h * α h ) 2 p h * η h 2 ( p h * α h ) η 0 2 ( p h * α 0 ) , which can be rearranged to s ( v h ) s ( v l ) < Δ α h , α l , p h * .

Given s(v h ) > s(v l ), s ( v h ) s ( v l ) < Δ α h , α l , p h * only if Δ α h , α l , p h * > 0 . Several cases are possible for Δ α h , α l , p h * > 0 : (i) p h * > max { α h , α l } or p h * < min { α h 3 , α l 3 } , and η l < η h , (ii) p h * max { α h 3 , α l 3 } , min { α h , α l } , and η l > η h , (iii) α h > α l and p h * α l 3 , min { α h 3 , α l } , or α h < α l and p h * max { α l 3 , α h } , α l . To conclude, it is more likely for the principal to contract with agent l, who has a lower matching value, if only if the surplus loss from contracting with agent l is lower than the reduced contracting cost in the form of marginal confidentiality premium, i.e. s ( v h ) s ( v l ) < Δ α h , α l , p h * , which occurs only if one of the above three scenarios hold.

In the special scenario where only the principal cares about identity exposure, η0 > 0 = η i for all agent i, optimality conditions in Lemma 1 implies s ( v h ) s ( v l ) η 0 2 ( p h * p l * ) = 0 . Therefore, p h * > p l * for any v h  > v l .

A.3: Example

Let q ( e | v i ) = v i e , where e ∈ [0, 1] and v i  ∈ (0, 1]. The efficient level of effort is e i * arg max e v i e c e = v i 2 c 2 . The maximum surplus in the contractual relationship with agent i is thus s ( v i ) = v i 4 c . By Proposition 1, the efficient level of effort is implemented within a contractual relationship. We focus on the equilibrium distribution of contractual relationships.

If the agents prefer being completely off the radar, i.e. α = 0, and the principal is not averse to identity exposure, i.e. η0 = 0, only case (i) in Proposition 2 applies, and the optimality conditions in Lemma 1 have

v h 12 c = η h p h 2 + λ v l 12 c = η l p l 2 + λ 1 = p h + p l , o r r e a r r a n g e d t o v h v l 12 c = η h p h 2 η l p l 2 1 = p h + p l .

Plugging the second equation into the first, we find

v h v l 12 c = ( η h η l ) p h 2 + ( 2 p h 1 ) η l v h v l 12 c = ( η h η l ) p l 2 ( 2 p l 1 ) η h .

If η h  < η l , the optimality conditions hold only at p h * > 1 2 > p l * . Inefficient organization occurs only if η h  > η l . Both equality hold at p h = p l = 1 2 if and only if v h v l 12 c = η h η l 4 . If v h v l 12 c > η h η l 4 > 0 , the optimality conditions hold at p h * > 1 2 > p l * . If 0 < v h v l 12 c < η h η l 4 , the optimality conditions hold at p h * < 1 2 < p l * . The equilibrium distribution of contractual relationships is inefficient if and only if v h v l 3 c < η h η l .

A.4: Risk-Neutrality with Limited Liability

Suppose that the agents are risk-neutral with limited liability in the sense that the ex-post payoff from the contract (excluding the disutility of identity exposure) must not be negative. The contract proposed to agent i with probability p i , C i l l = t 1 i l l , t 0 i l l implementing e i l l , solves the reduced problem

max e i , t 1 i , t 0 i q ( e i | v i ) ( 1 t 1 i ) ( 1 q ( e i | v i ) ) t 0 i

subject to

q ( e i | v i ) t 1 i + ( 1 q ( e i | v i ) ) t 0 i c e i η i ( p i α i ) 2 0 ( I R i ) ,
e i arg max e q ( e | v i ) t 1 i + ( 1 q ( e | v i ) ) t 0 i c e η i ( p i α i ) 2 ( I C i ) ,

and

t j i c e 0 f o r j = 1,0 ( L L j ) .

With η i  = 0, the problem corresponds to the standard contracting model with limited liability. (LL0) is binding and (IR i ) is strictly satisfied. Binding limited liability and local incentive compatibility jointly imply t 0 i l l = c e i l l and t 1 i l l t 0 i l l = c q e i l l | v i . The principal implements e i l l arg max e q ( e | v i ) c e q ( e | v i ) c q e i l l | v i .

With a sufficiently low disutility of identity exposure η i η ̲ = def q e i l l | v i q e i l l | v i c ( p i α i ) 2 , the above contract does not violate (IR i ). A minor confidentiality concern does not affect the contract and the induced effort. With η i > η ̲ , the above contract violates (IR i ), so the optimal contract satisfies binding (IR i ). With a sufficiently high disutility of identity exposure η i η ¯ = def q e i * | v i q e i * | v i c ( p i α i ) 2 , where e i * is the solution to Proposition 1, limited liability constraints are strictly satisfied. The optimal contract is the same as that in Section 3 with risk neutrality. The productive effort is restored to the efficient level. As e i * > e i l l and q(e i |v i ) being increasing and concave, it is straightforward that η ̄ > η ̲ . For intermediate disutility of identity exposure, the optimal contract and the implemented effort solve binding (IR i ), local incentive compatibility, and (LL0).

References

Acquisti, Alessandro, and Hal Varian. 2005. “Conditioning Prices on Purchase History.” Marketing Science 24 (3): 367–81. https://doi.org/10.1287/mksc.1040.0103.Suche in Google Scholar

Acquisti, Alessandro, Curtis Taylor, and Liad Wagman. 2016. “The Economics of Privacy.” Journal of Economic Literature 54 (2): 442–92. https://doi.org/10.1257/jel.54.2.442.Suche in Google Scholar

Barmettler, Franziska, Ernst Fehr, and Christian Zehnder. 2012. “Big Experimenter Is Watching You! Anonymity and Prosocial Behavior in the Laboratory.” Games and Economic Behavior 75: 17–34. https://doi.org/10.1016/j.geb.2011.09.003.Suche in Google Scholar

Bergemann, Dirk, and Alessandro Bonatti. 2015. “Selling Cookies.” American Economic Journal: Microeconomics 7 (3): 259–94. https://doi.org/10.1257/mic.20140155.Suche in Google Scholar

Calzolari, Giacomo, and Alessandro Pavan. 2006. “On the Optimality of Privacy in Sequential Contracting.” Journal of Economic Theory 130: 168–204. https://doi.org/10.1016/j.jet.2005.04.007.Suche in Google Scholar

Conitzer, Vincent, Curtis Taylor, and Liad Wagman. 2012. “Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases.” Marketing Science 31 (2): 277–92. https://doi.org/10.1287/mksc.1110.0691.Suche in Google Scholar

Cox, James, and Cary Deck. 2005. “On the Nature of Reciprocal Motives.” Economic Inquiry 43 (3): 623–35. https://doi.org/10.1093/ei/cbi043.Suche in Google Scholar

Daughety, Andrew, and Jennifer Reinganum. 2010. “Public Goods, Social Pressure, and the Choice between Privacy and Publicity.” American Economic Journal: Microeconomics 2 (2): 191–221. https://doi.org/10.1257/mic.2.2.191.Suche in Google Scholar

de Cornière, Alexandre, and Romain de Nijs. 2016. “Online Advertising and Privacy.” The RAND Journal of Economics 47 (1): 48–72. https://doi.org/10.1111/1756-2171.12118.Suche in Google Scholar

Demougin, Dominique, and Carsten Helm. 2011. “Job Matching When Employment Contracts Suffer from Moral Hazard.” European Economic Review 55: 964–79. https://doi.org/10.1016/j.euroecorev.2011.04.002.Suche in Google Scholar

Dequiedt, Vianney, and David Martimort. 2015. “Vertical Contracting with Informational Opportunism.” The American Economic Review 105 (7): 2141–82. https://doi.org/10.1257/aer.20121640.Suche in Google Scholar

Fudenberg, Drew, and Jean Tirole. 1998. “Upgrades, Tradeins, and Buybacks.” The RAND Journal of Economics 29 (2): 235–58. https://doi.org/10.2307/2555887.Suche in Google Scholar

Gradwohl, Ronen, and Ran Smorodinsky. 2017. “Perception Games and Privacy.” Games and Economic Behavior 104: 293–308. https://doi.org/10.1016/j.geb.2017.04.006.Suche in Google Scholar

Grossman, Sanford J., and Oliver D. Hart. 1983. “An Analysis of the Principal-Agent Problem.” Econometrica 51 (1): 7–45. https://doi.org/10.2307/1912246.Suche in Google Scholar

Holmström, Bengt. 1979. “Moral Hazard and Observability.” The Bell Journal of Economics 10 (1): 74–91. https://doi.org/10.2307/3003320.Suche in Google Scholar

Holmström, Bengt. 2017. “Pay for Performance and beyond.” The American Economic Review 107 (7): 1753–77. https://doi.org/10.1257/aer.107.7.1753.Suche in Google Scholar

Kastl, Jakub, Marco Pagnozzi, and Salvatore Piccolo. 2018. “Selling Information to Competitive Firms.” The RAND Journal of Economics 49 (1): 254–82. https://doi.org/10.1111/1756-2171.12226.Suche in Google Scholar

Koch, Alexander K., and Eloïc Peyrache. 2008. “Mixed up? That’s Good for Motivation.” Economic Theory 34: 107–25. https://doi.org/10.1007/s00199-007-0206-y.Suche in Google Scholar

List, John, Robert Berrens, Alok Bohara, and Joe Kerkvliet. 2006. “Examining the Role of Social Isolation on Stated Preferences.” The American Economic Review 94 (3): 741–52. https://doi.org/10.1257/0002828041464614.Suche in Google Scholar

Martimort, David. 1996. “Exclusive Dealing, Common Agency, and Multiprincipals Incentive Theory.” The RAND Journal of Economics 27 (1): 1–31. https://doi.org/10.2307/2555790.Suche in Google Scholar

Mirrlees, James A. 1999, Completed in 1975. “The Theory of Moral Hazard and Unobservable Behaviour: Part I.” The Review of Economic Studies 66 (1): 3–21. https://doi.org/10.1111/1467-937x.00075.Suche in Google Scholar

Moen, Espen, and Åsa Rosén. 2011. “Incentives in Competitive Search Equilibrium.” The Review of Economic Studies 78: 733–61.10.1093/restud/rdq011Suche in Google Scholar

Piccolo, Salvatore, Emanuele Tarantino, and Giovanni Ursino. 2015. “The Value of Transparency in Multidivisional Firms.” International Journal of Industrial Organization 41: 9–18. https://doi.org/10.1016/j.ijindorg.2015.04.004.Suche in Google Scholar

Starmans, Jan. 2024. “Contracting and Search with Heterogeneous Principals and Agents.” Journal of Economic Theory 217: 105761. https://doi.org/10.1016/j.jet.2023.105761.Suche in Google Scholar

Taylor, Curtis. 2004. “Consumer Privacy and the Market for Customer Information.” The RAND Journal of Economics 35 (4): 631–50. https://doi.org/10.2307/1593765.Suche in Google Scholar

Villas-Boas, J. Miguel. 2004. “Price Cycles in Markets with Customer Recognition.” The RAND Journal of Economics 35 (3): 486–501. https://doi.org/10.2307/1593704.Suche in Google Scholar

Vorlaufer, Tobias. 2019. “Effects of Double-Anonymity on Pro- and Anti-social Behavior: Experimental Evidence from a Lab in the Field.” Journal of Behavioral and Experimental Economics 81: 216–25. https://doi.org/10.1016/j.socec.2019.07.001.Suche in Google Scholar

Received: 2024-03-07
Accepted: 2025-05-30
Published Online: 2025-06-23

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 23.11.2025 von https://www.degruyterbrill.com/document/doi/10.1515/bejte-2024-0032/html
Button zum nach oben scrollen