{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T13:37:37Z","timestamp":1769521057994,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["19J20448"],"award-info":[{"award-number":["19J20448"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["23K18777"],"award-info":[{"award-number":["23K18777"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc Choice Welf"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s00355-024-01554-x","type":"journal-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T14:03:13Z","timestamp":1727704993000},"page":"721-764","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Characterizing group strategy-proof rules in the object allocation problem with money"],"prefix":"10.1007","volume":"64","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3689-5841","authenticated-orcid":false,"given":"Hiroki","family":"Shinozaki","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"1554_CR1","unstructured":"Alva S (2017) When is manipulation all about the ones and twos? Working paper"},{"issue":"5","key":"1554_CR2","doi-asserted-by":"publisher","first-page":"1648","DOI":"10.1016\/j.jet.2010.03.006","volume":"145","author":"S Barber\u00e0","year":"2010","unstructured":"Barber\u00e0 S, Berga D, Moreno B (2010) Individual versus group strategy-proofness: when do they coincide? J Econ Theory 145(5):1648\u20131674","journal-title":"J Econ Theory"},{"issue":"4","key":"1554_CR3","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1257\/aer.20141727","volume":"106","author":"S Barber\u00e0","year":"2016","unstructured":"Barber\u00e0 S, Berga D, Moreno B (2016) Group strategy-proofness in private good economies. Am Econ Rev 106(4):1073\u20131099","journal-title":"Am Econ Rev"},{"issue":"6","key":"1554_CR4","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1111\/j.1468-0262.2005.00638.x","volume":"73","author":"D Bergemann","year":"2005","unstructured":"Bergemann D, Morris S (2005) Robust mechanism design. Econometrica 73(6):1771\u20131813","journal-title":"Econometrica"},{"issue":"1","key":"1554_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s00199-014-0819-x","volume":"61","author":"N Bu","year":"2016","unstructured":"Bu N (2016) Joint misrepresentations with bribes. Econ Theor 61(1):115\u2013125","journal-title":"Econ Theor"},{"issue":"2","key":"1554_CR6","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1016\/j.jet.2008.07.004","volume":"144","author":"Y-K Che","year":"2009","unstructured":"Che Y-K, Kim J (2009) Optimal collusion-proof auctions. J Econ Theory 144(2):565\u2013603","journal-title":"J Econ Theory"},{"key":"1554_CR7","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.jet.2018.09.005","volume":"178","author":"Y-K Che","year":"2018","unstructured":"Che Y-K, Condorelli D, Kim J (2018) Weak cartels and collusion-proof auctions. J Econ Theory 178:398\u2013435","journal-title":"J Econ Theory"},{"issue":"2","key":"1554_CR8","doi-asserted-by":"publisher","first-page":"185","DOI":"10.2307\/2297045","volume":"46","author":"P Dasgupta","year":"1979","unstructured":"Dasgupta P, Hammon P, Maskin E (1979) The implementation of social choice rules: some general results on incentive compatibility. Rev Econ Stud 46(2):185\u2013216","journal-title":"Rev Econ Stud"},{"issue":"4","key":"1554_CR9","doi-asserted-by":"publisher","first-page":"587","DOI":"10.2307\/1914083","volume":"41","author":"A Gibbard","year":"1973","unstructured":"Gibbard A (1973) Manipulation of voting schemes: a general result. Econometrca 41(4):587\u2013601","journal-title":"Econometrca"},{"issue":"6","key":"1554_CR10","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1086\/261512","volume":"95","author":"DA Graham","year":"1987","unstructured":"Graham DA, Marshall R (1987) Collusive bidder behavior at single-object second-price and English auction. J Polit Econ 95(6):1217\u20131239","journal-title":"J Polit Econ"},{"key":"1554_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2019.108682","volume":"185","author":"M Hagen","year":"2019","unstructured":"Hagen M (2019) Collusion-proof and fair auctions. Econ Lett 185:108682","journal-title":"Econ Lett"},{"key":"1554_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.geb.2023.01.002","volume":"138","author":"M Hagen","year":"2023","unstructured":"Hagen M (2023) Collusion-proof mechanisms for multi-unit procurement. Games Econ Behav 138:281\u2013298","journal-title":"Games Econ Behav"},{"key":"1554_CR13","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.geb.2013.07.005","volume":"82","author":"R Juarez","year":"2013","unstructured":"Juarez R (2013) Group strategyproof cost sharing: the role of indifferences. Games Econ Behav 82:218\u2013239","journal-title":"Games Econ Behav"},{"issue":"1","key":"1554_CR14","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1257\/0895330027166","volume":"16","author":"P Klemperer","year":"2002","unstructured":"Klemperer P (2002) What really matters in auction design. J Econ Perspect 16(1):169\u2013189","journal-title":"J Econ Perspect"},{"issue":"3","key":"1554_CR15","first-page":"579","volume":"82","author":"RP McAfee","year":"1992","unstructured":"McAfee RP, McMillan J (1992) Bidding rings. Am Econ Rev 82(3):579\u2013599","journal-title":"Am Econ Rev"},{"issue":"3","key":"1554_CR16","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1111\/j.1468-0343.1991.tb00047.x","volume":"3","author":"J McMillan","year":"1991","unstructured":"McMillan J (1991) DANGO: Japan\u2019s price-fixing conspiracies. Econ Polit 3(3):201\u2013218","journal-title":"Econ Polit"},{"key":"1554_CR17","volume-title":"Reinventing the bazaar: a natural history of markets","author":"J McMillan","year":"2003","unstructured":"McMillan J (2003) Reinventing the bazaar: a natural history of markets. W.W. Noron, New York"},{"issue":"2","key":"1554_CR18","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s003550050145","volume":"16","author":"H Moulin","year":"1999","unstructured":"Moulin H (1999) Incremental cost sharing: characterization by coalition strategy-proofness. Soc Choice Welf 16(2):279\u2013320","journal-title":"Soc Choice Welf"},{"issue":"3","key":"1554_CR19","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/PL00004200","volume":"18","author":"H Moulin","year":"2001","unstructured":"Moulin H, Shenker S (2001) Strategyproof sharing of submodular costs: budget balance versus efficiency. Econ Theor 18(3):511\u2013533","journal-title":"Econ Theor"},{"issue":"2","key":"1554_CR20","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s00355-013-0733-3","volume":"42","author":"C Mukherjee","year":"2014","unstructured":"Mukherjee C (2014) Fair and group strategy-proof good allocation with money. Soc Choice Welf 42(2):289\u2013311","journal-title":"Soc Choice Welf"},{"issue":"1","key":"1554_CR21","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1287\/moor.6.1.58","volume":"6","author":"RB Myerson","year":"1981","unstructured":"Myerson RB (1981) Optimal auction design. Math Oper Res 6(1):58\u201373","journal-title":"Math Oper Res"},{"key":"1554_CR22","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1017\/CBO9780511800481.011","volume-title":"Algorithmic game theory","author":"N Nisan","year":"2007","unstructured":"Nisan N (2007) Introduction to mechanism design (for computer scientists). In: Nisan N, Rougarden T, Tards E, Vazirani V (eds) Algorithmic game theory. Cambridge University Press, New York, pp 209\u2013241"},{"issue":"3","key":"1554_CR23","first-page":"383","volume":"3","author":"G Pavlov","year":"2008","unstructured":"Pavlov G (2008) Auction design in the presence of collusion. Theor Econ 3(3):383\u2013429","journal-title":"Theor Econ"},{"issue":"4","key":"1554_CR24","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s00453-011-9602-6","volume":"63","author":"E Pountourakis","year":"2012","unstructured":"Pountourakis E, Vidali A (2012) A complete characterization of group strategy-proof mechanisms of cost-sharing. Algorithmica 63(4):831\u2013860","journal-title":"Algorithmica"},{"issue":"2","key":"1554_CR25","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1006\/jeth.1999.2618","volume":"91","author":"J Schummer","year":"2000","unstructured":"Schummer J (2000) Manipulation through bribes. J Econ Theory 91(2):180\u2013198","journal-title":"J Econ Theory"},{"issue":"2","key":"1554_CR26","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s00355-006-0099-x","volume":"26","author":"S Serizawa","year":"2006","unstructured":"Serizawa S (2006) Pairwise strategy-proofness and self-enforcing manipulation. Soc Choice Welf 26(2):305\u2013331","journal-title":"Soc Choice Welf"},{"issue":"2","key":"1554_CR27","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00199-007-0235-6","volume":"35","author":"H Saitoh","year":"2008","unstructured":"Saitoh H, Serizawa S (2008) Vickrey allocation rule with income effect. Econ Theor 35(2):391\u2013401","journal-title":"Econ Theor"},{"issue":"2","key":"1554_CR28","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s00199-007-0311-y","volume":"37","author":"T Sakai","year":"2008","unstructured":"Sakai T (2008) Second price auctions on general preference domains: two characterizations. Econ Theor 37(2):347\u2013356","journal-title":"Econ Theor"},{"issue":"3","key":"1554_CR29","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1016\/j.jet.2012.09.015","volume":"148","author":"Y Sprumont","year":"2013","unstructured":"Sprumont Y (2013) Constrained-optimal strategy-proof assignment: beyond the Groves mechanisms. J Econ Theory 148(3):1102\u20131121","journal-title":"J Econ Theory"},{"key":"1554_CR30","doi-asserted-by":"crossref","unstructured":"Shinozaki H (2024) Shutting-out-proofness in object allocation problems with money. HIAS Discussion Paper Series HIAS-E-138","DOI":"10.2139\/ssrn.4739267"},{"key":"1554_CR31","doi-asserted-by":"crossref","unstructured":"Tierney R (2022) Incentives and efficiency in matching with transfers: towards nonquasilinear package auctions. Working paper","DOI":"10.2139\/ssrn.4101873"},{"issue":"1","key":"1554_CR32","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey W (1961) Counterspeculation, auctions, and competitive sealed tenders. J Financ 16(1):8\u201337","journal-title":"J Financ"},{"key":"1554_CR33","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1017\/CCOL0521340446.002","volume-title":"Advances in economic theory: fifth world congress","author":"R Wilson","year":"1987","unstructured":"Wilson R (1987) Game-theoretic analysis of trading process. In: Bewley T (ed) Advances in economic theory: fifth world congress. Cambridge University Press, Cambridge, pp 33\u201370"}],"container-title":["Social Choice and Welfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00355-024-01554-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00355-024-01554-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00355-024-01554-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T07:55:00Z","timestamp":1749887700000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00355-024-01554-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1554"],"URL":"https:\/\/doi.org\/10.1007\/s00355-024-01554-x","relation":{},"ISSN":["0176-1714","1432-217X"],"issn-type":[{"value":"0176-1714","type":"print"},{"value":"1432-217X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}