This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Evolutionary stability of cooperation in indirect reciprocity under noisy and private assessment

Yuma Fujimoto Research Center for Integrative Evolutionary Science, SOKENDAI (The Graduate University for Advanced Studies). Shonan Village, Hayama, Kanagawa 240-0193, Japan Universal Biology Institute (UBI), the University of Tokyo. 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033, Japan. CyberAgent, Inc.. 40-1, Udagawa-cho, Shibuya-ku, Tokyo 150-0042, Japan. [email protected] Hisashi Ohtsuki Research Center for Integrative Evolutionary Science, SOKENDAI (The Graduate University for Advanced Studies). Shonan Village, Hayama, Kanagawa 240-0193, Japan Department of Evolutionary Studies of Biosystems, SOKENDAI. Shonan Village, Hayama, Kanagawa 240-0193, Japan.
Abstract

Indirect reciprocity is a mechanism that explains large-scale cooperation in humans. In indirect reciprocity, individuals use reputations to choose whether or not to cooperate with a partner and update others’ reputations. A major question is how the rules to choose their actions and the rules to update reputations evolve. In the public reputation case, where all individuals share the evaluation of others, social norms called Simple Standing (SS) and Stern Judging (SJ) have been known to maintain cooperation. However, in the case of private assessment where individuals independently evaluate others, the mechanism of maintenance of cooperation is still largely unknown. This study theoretically shows for the first time that cooperation by indirect reciprocity can be evolutionarily stable under private assessment. Specifically, we find that SS can be stable, but SJ can never be. This is intuitive because SS can correct interpersonal discrepancies in reputations through its simplicity. On the other hand, SJ is too complicated to avoid an accumulation of errors, which leads to the collapse of cooperation. We conclude that moderate simplicity is a key to success in maintaining cooperation under the private assessment. Our result provides a theoretical basis for evolution of human cooperation.

1 Introduction

Cooperation benefits others but is costly to the cooperator itself. Nevertheless, cooperation is widespread from microscopic to macroscopic scales, such as among microorganisms, animals, humans, and nations. One way to sustain cooperation is that agents conditionally cooperate with others who cooperate with them, which is realized by, for example, repeated interactions [1, 2, 3] and partner choice [4, 5, 6, 7]. Such conditional cooperation based on personal experiences is applicable only to a small population where members can interact directly and repeatedly with most of the others.

However, cooperative behavior is observed even in a large-scale society (e.g., human societies). Since individuals inevitably encounter strangers there, they need reputations of those strangers in order not to cooperate unconditionally. Only individuals with good reputations can receive cooperation. The system that individuals indirectly reward others via their reputations as described above is called indirect reciprocity [8, 9, 10]. In reality, humans are particularly interested in reputations and gossip about themselves and others [11, 12, 13]. Furthermore, many experiments have pointed out that gossips concern cooperative behaviors [14, 15, 16].

Errors that inevitably occur in actions and in assessment hinder cooperation by indirect reciprocity. Indeed, the simplest social norm called image scoring [9, 10] fails to maintain full cooperation under errors [17, 18] (a similar failure is also seen in direct reciprocity [19, 20, 18]). This is because one erroneous defection triggers further defection. Nevertheless, previous studies have theoretically shown that cooperation can be maintained by the so-called “leading eight” social norms [21, 22] even in the presence of such errors when all individuals share the reputation of the same individual (i.e., public assessment). Public reputation cases have been thoroughly studied for about two decades [23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37]. When individuals cannot share their evaluations of the same target (i.e., private assessment), however, errors cast a shadow over cooperation more crucially. In this case, a single disagreement in opinions between two individuals can lead to further disagreements [38, 39, 40, 41, 42]. Whether cooperation is maintained under the noisy and private assessment is still largely unsolved in theory and is one of the major open problems in studies of indirect reciprocity [43, 44, 36].

Previous studies have shown that maintaining cooperation with indirect reciprocity is very difficult under noisy and private assessment. For example, Hilbe et al. [42] showed by an evolutionary simulation that the above leading eight strategies cannot succeed in cooperation under private assessment. Some studies [45, 46, 47] have demonstrated the emergence of cooperation under noisy and private assessment, but under the restrictive assumption that only local mutations in the strategy space are allowed, thus excluding the possibility that a fully cooperative strategy is directly invaded by free-riders. Other studies have shown that a mechanism to synchronize opinions between individuals has a positive influence on cooperation in indirect reciprocity, such as empathy, generosity, spatial structure, and so on [48, 49, 50, 51, 52, 53, 54, 55, 56, 57].

Most of these studies of private assessment have been performed by computer simulations [45, 42]. This is because two-dimensional information of who assigns a reputation to whom (its matrix representation is called “image matrix” [38, 58, 39, 59]) becomes too complex to analyze. For example, its possible transition is illustrated in Fig. 1-A, where a single assessment error can be amplified with time, leading to a mosaic structure in the image matrix. An evolutionary analysis between wild-type and mutant makes the image matrix further complex because the image matrix now includes four compartments based on different rules of reputation assignment adopted by wild-type and mutant individuals (Fig. 1-B). In spite of these difficulties, here we report that we have successfully developed an analytical machinery to study the image matrix by applying a technique previously developed by the authors [60]. This enables us to make a general prediction of when cooperation is sustained under noisy and private assessment over the full parameter region.

In the following, we will first introduce the setting of indirect reciprocity under noisy and private assessment and explain a method to analytically calculate the expected payoff of each individual through analyzing a complex image matrix. Then, we will discuss which strategy can be an evolutionarily stable strategy (ESS) [61, 62] under which condition, and provide intuitive reasons for the result. To our knowledge, this is the first systematic study that has analytically investigated evolutionary stability of strategies in indirect reciprocity under noisy and private assessment.

Refer to caption
Figure 1: A. An illustration showing how an assessment error amplifies. In all the three panels, there are 1st, 2nd, and 3rd persons, and the 3×33\times 3 image matrices and straight arrows indicate the reputations among them. In the left panel, good reputations are assigned among all of them, hence they achieve cooperation. In the center, the 2nd person cooperates with the 1st person, but the 3rd person erroneously assigns a bad reputation to the 2nd person. In the right, the 3rd person defects with the 2nd person based on its bad reputation in the eyes of the 3rd person, but because the 1st and 2nd persons believe that the 2nd person is good, they assign bad reputations to the 3rd person. B. An illustration showing the complexity of the image matrix. The left panel shows that wild-types and mutants are mixed in the population and that four kinds of reputations exist; WW\mathrm{WW} from wild-type to wild-type, WM\mathrm{WM} from mutant to wild-type, MW\mathrm{MW} from wild-type to mutant, and MM\mathrm{MM} from mutant to mutant. The right panel shows that the image matrix is decomposed into the corresponding four components, each of which has a different reputation structure.

Model

We consider a model of indirect reciprocity in a well-mixed population of size NN. We assume that, in every step, a binary reputation is assigned independently from everyone to everyone, either good or bad, which is summarized by image matrix {βji}\{\beta_{ji}\}, where βji=1\beta_{ji}=1 (resp. βji=0\beta_{ji}=0) if individual ii assigns a good (resp. bad) reputation to individual jj. The model proceeds as follows. First, a donor and a recipient are randomly chosen from this population. Next, the donor takes its action, cooperation or defection, to the recipient. When the donor cooperates, the donor incurs a cost c(>0)c(>0) but gives a benefit b(>c)b(>c) to the recipient instead. On the other hand, when the donor defects, no change occurs in the payoff of the donor or the recipient. Here, a rule that specifies how the donor chooses its action is called “action rule”. Throughout this paper, we assume that all the individuals adopt the “discriminator” action rule [9, 63], with which they choose cooperation (resp. defection) to a good (resp. bad) recipient in their own eyes; that is, donor ii chooses cooperation toward recipient jj if βji=1\beta_{ji}=1, and chooses defection if βji=0\beta_{ji}=0. We assume that the donor unintentionally takes the opposite action to the intended one with probability 0e1<1/20\leq e_{1}<1/2 (action error). All the individuals in the population observe this social interaction between the donor and the recipient and independently update the reputation of the donor in their eyes.

A rule that specifies how each observer updates the reputations of the others is called its “social norm”. In models of public reputation, it has often been assumed that all the individuals in the population adopt the same social norm [21, 64, 29] (but see [38]), otherwise, they cannot share the reputation of the same individual. Because we consider a model of private reputation here, however, we instead assume that individuals can adopt different social norms. This study deals with a situation where each observer (say, kk) refers to (i) whether the donor (say, ii) cooperates (C) or defects (D) (first-order information) and (ii) whether the recipient (say, jj) is good (G) or bad (B) in the eyes of the observer (second-order information, represented by βjk\beta_{jk}) when this observer updates the reputation of the donor in the eyes of the observer, denoted by βik\beta_{ik}. Such social norms are called “second-order” social norms [10, 18, 33, 36]. An observer who adopts a second-order social norm can face four different cases, denoted by GC(“toward a Good recipient the donor Cooperates”), BC(“toward a Bad recipient the donor Cooperates”), GD(“toward a Good recipient the donor Defects”), and BD(“toward a Bad recipient the donor Defects”), respectively, and in each case, the observer assigns either a good (G) or bad (B) reputation to the donor. Thus, a social norm is represented by a four-letter string. For example, GBBG\mathrm{GBBG} is the social norm that assigns to the donor a good reputation in GC- and BD-cases, and a bad reputation in BC- and GD-cases. There are 24=162^{4}=16 such social norms in total, and we lexicographically order them with the rule that G comes first and B comes second, and number them from S01S_{01} to S16S_{16}. Table 1 shows a full list of 16 social norms studied here. When updating the reputation, each observer independently commits an assessment error with probability 0<e2<1/20<e_{2}<1/2, in which case he/she accidentally assigns the opposite reputation to the intended one to the donor.

Table 1: All 16 second-order social norms in this study
Social norm GC BC GD BD
S01S_{01} (ALLG) G G G G
S02S_{02} G G G B
S03S_{03} (SS; Simple Standing) G G B G
S04S_{04} (SC; Scoring) G G B B
S05S_{05} G B G G
S06S_{06} G B G B
S07S_{07} (SJ; Stern Judging) G B B G
S08S_{08} (SH; Shunning) G B B B
S09S_{09} B G G G
S10S_{10} B G G B
S11S_{11} B G B G
S12S_{12} B G B B
S13S_{13} B B G G
S14S_{14} B B G B
S15S_{15} B B B G
S16S_{16} (ALLB) B B B B

Several norms are especially important in previous studies, so we explain them below. We call S01S_{01} ALLG and call S16S_{16} ALLB because these norms unconditionally assign good or bad reputations. Next, S03S_{03}, S04S_{04}, S07S_{07}, and S08S_{08} belong to G\astB\ast family. These norms share the same feature that they regard cooperation toward a good recipient as good, and defection toward a good recipient as bad. They only differ when the recipient is bad in the observer’s eyes. First, S04S_{04} is called Scoring (SC), which regards cooperation toward a bad recipient as good and defection toward a bad recipient as bad, and therefore reputation assignment is independent of whether the recipient is good or bad in the observer’s eyes (thus, categorized as a first-order norm). Next, S07S_{07} is called Stern Judging (SJ), which regards cooperation toward a bad recipient as bad and defection toward a bad recipient as good, as opposed to SC. Third, S03S_{03} is called Simple Standing (SS) and it regards any action toward a bad recipient as good, and therefore it is the most generous norm in this family. Finally, S08S_{08} is called Shunning (SH) and it regards any action toward a bad recipient as bad, and therefore it is the most intolerant one. Notably, SJ and SS are the two second-order norms that are included in the “leading eight” norms [21], which are norms that can successfully maintain cooperation under the noisy and public reputation that are found in the search within third-order norms. In particular, SJ has long been considered promising because it is evolutionarily successful [23] and because it sustains a very high level of cooperation despite its simplicity [33, 36]. SJ always suggests only one correct action to keep you good; it recommends cooperation toward good individuals and defection toward bad ones, and failure to follow this rule leads to a bad reputation. Under the noisy public reputation, SH cannot achieve full cooperation against itself but can prevent the invasion of ALLB (see SI for detailed calculation).

Under these settings, the strategy of an individual is its social norm. For this reason, we use “strategy” and “(social) norm” interchangeably in the following. We ask which strategy is evolutionarily stable. To this end, we study invasibility of a mutant strategy against a wild-type one. A strategy is ESS if it is not invaded by any other 15 mutant strategies. To derive their payoffs, we need to analyze the image matrix, which we shall perform below.

Analysis of reputation structure

Let us consider a situation where individuals with mutant norm M{\rm M} invade the population of wild-type norm W(M){\rm W}(\neq{\rm M}). Here, the proportion of mutants is given by δ\delta. By extending the Fujimoto & Ohtsuki’s method [60] we can describe the image matrix by two probability distributions. Specifically, take a focal individual whose norm is A{W,M}A\in\{{\rm W},{\rm M}\}, and let pAAp_{AA^{\prime}} (hereafter called “goodness”) be the proportion of individuals among norm AA^{\prime} users who assign a good reputation to the focal individual, for A{W,M}A^{\prime}\in\{{\rm W},{\rm M}\}. Thus, a wild-type individual is characterized by a pair of goodnesses, (pWW,pWM)(p_{\mathrm{WW}},p_{\mathrm{WM}}), and we represent its distribution over all wild-type individuals by ΦW(pWW,pWM)\Phi_{\rm W}(p_{\mathrm{WW}},p_{\mathrm{WM}}). In the same way, a mutant is characterized by a pair of goodnesses, (pMW,pMM)(p_{\mathrm{MW}},p_{\mathrm{MM}}), and ΦM(pMW,pMM)\Phi_{\rm M}(p_{\mathrm{MW}},p_{\mathrm{MM}}) represents its distribution over all mutants. In SI, we derive the dynamics of ΦW\Phi_{\rm W} and ΦM\Phi_{\rm M} by formulating a stochastic transition of the donor’s goodnesses under the assumption of N1N\gg 1 (the population is large), δ1\delta\ll 1 (mutants are rare), and Nδ1N\delta\gg 1 (yet the number of mutants is sufficiently large). Then, we derive the equilibrium distributions, ΦW\Phi_{\rm W}^{*} and ΦM\Phi_{\rm M}^{*}. These equilibrium distributions give expected payoffs of wild-types and mutants, which enable us to study the invasibility condition of mutants to wild-types (see SI again).

Refer to caption
Figure 2: Illustrations of our method to analyze reputation structure. A. In the left panel, an example of image matrix is shown. We analyze this image matrix divided into four parts; whether the reputing side is wild-type (W) or mutant (M) and whether the reputed side is W or M. In the right panel, a pair of goodnesses of each individual from wild-types (colored green) and mutants (blue) are extracted from the image matrix. Because the pair of goodnesses correlate with each other, we consider the joint probability distribution of them, denoted by ΦW\Phi_{\rm W} and ΦM\Phi_{\rm M}. B. We analytically calculated this joint probability distribution. One can see that the analytical estimation (the left panel) well fits the simulation (right). In both the panels, we assume (W,M)=(S09,S03)({\rm W},{\rm M})=(S_{09},S_{03}), N=5000N=5000, δ=0.1\delta=0.1, and (e1,e2)=(0,0.1)(e_{1},e_{2})=(0,0.1). In the numerical simulation, we used 30003000 samples of image matrices from time t=51,,3050t=51,\cdots,3050 (a random donor’s goodness is updated NN times per unit time of tt). On the other hand, in the theoretical analysis, we introduced the cutoff of 100j+100-100\leq j\leq+100. Each number near the heat peaks indicates the class label jj. C. Rules for labeling individual classes. Each class corresponds to one Gaussian distribution. Each box (labelled by j\{0}j\in\mathbb{Z}\backslash\{0\}) indicates a class. The destination of each arrow indicates the class that the donor moves to after taking cooperation (C) or defection (D) toward the recipient that belongs to the class that the arrow originates. For example, a donor that cooperated with class j=2j=-2 recipient moves to class j=+1j=+1.

We find that each of the two equilibrium distributions is well approximated by a weighted sum of two-dimensional Gaussian functions with zero covariance, where each Gaussian can be systematically labeled by a nonzero integer, j\{0}j\in\mathbb{Z}\backslash\{0\} (see an example in Fig. 2-B and the rule of labeling in Fig. 2-C). Hence the number of Gaussians that appear in the sum is infinitely but countably many. In some cases, however, these labels degenerate (i.e., two or more Gaussians are identical but they are given different labels) and the number of Gaussians can be finite. Weights to Gaussians decay exponentially as jj becomes large positive or large negative, so a truncation at some finite number of terms approximates well the infinite sum for numerical calculations.

ESS norms

Based on the analysis of the image matrix above, we have studied pairwise invasibility for all the pairs of wild-type W\rm W and mutant M\rm M. In the following, we set the action error rate as e1=0e_{1}=0, because this error, especially when it is small positive, does not have a qualitative impact on our results as far as we studied. Thus, the cost-benefit ratio b/cb/c and the assessment error rate e2e_{2} are our environmental parameters.

We first find that the four strategies, S06S_{06}, S07S_{07}(SJ), S10S_{10}, and S11S_{11}, are completely indistinguishable, both as wild-types and as mutants. This is because these norms always give the goodness of 1/21/2 to anyone in the population at equilibrium due to an accumulation of assessment errors and hence they appear to choose cooperation and defection in a random manner. In particular, they are neutral to each other. For these reasons, we will discuss only S07S_{07}(SJ) as a representative of them and exclude the other three in the following analysis.

Our exhaustive analysis demonstrates that only three norms, S03S_{03}(SS), S08S_{08}(SH), and S16S_{16}(ALLB) can be ESS, and all the others cannot. As shown in Fig. 3-A, ALLB is ESS independent of b/cb/c and e2e_{2}, because it is the norm that assigns a bad reputation to everyone, saves the own cost, and provides no benefit to others. On the other hand, SS and SH achieve ESS for some b/cb/c and e2e_{2}; there are upper and lower bounds of b/cb/c for them to be ESS, which depend on e2e_{2}. Below we will look at its details.

Refer to caption
Figure 3: Details of ESS analysis. A. Invasibility between all pairs of the social norms. The left, center, and right panels respectively show the cases of b/c1.1b/c\leq 1.1, =3=3, and 20\geq 20. Numbers in rows (resp. columns) indicate the labels of wild-type (resp. mutant) norms. Each circle (resp. cross) mark indicates that the invasion by mutants is successful (resp. unsuccessful). Each bar mark indicates that the wild-type and mutant norms are neutral. All the panels are based on e2=0.1e_{2}=0.1 and 10000j+10000-10000\leq j\leq+10000. B. The ESS parameter region for norms S03S_{03}(SS) (left) and S08S_{08}(SH) (right). In each panel, the horizontal (resp. vertical) axis indicates e2e_{2} (resp. b/cb/c). The blue (resp. red) color indicates that the norm is ESS (resp. not ESS). C. Comparison between analytical and numerical calculations of the ESS region of S03S_{03}(SS). The horizontal and vertical axis are the same as in B. The cyan (resp. pink) line indicates the theoretical upper (resp. lower) bound (the same as the left panel in B). Blue (resp. red) dots, connected by lines, indicate the numerical estimates of the upper (resp. lower) bound. Those estimates were calculated based on agent-based simulations of image matrix with N=10000N=10000, δ=0.03\delta=0.03. The average of 5050 samples from generations 51t10051\leq t\leq 100 were used, except for in the calculation of the upper bound (blue dots) for e2<0.1e_{2}<0.1 where we instead used the average of 30003000 samples from 51t305051\leq t\leq 3050 to reduce errors in estimation. D. A comparison between public (top row) and private (bottom row) assessment cases of how wild-type SS individuals evaluate other SS individuals (left column) and how wild-type SS individuals evaluate mutant ALLB individuals (right column). In each panel, the horizontal and vertical axes indicate individual goodness and its frequency, respectively. Positions and heights of bars are correct only up to order e2e_{2}. We see that SS gives high goodness to most of the SS individuals (left column), that SS gives low goodness to most of the ALLB individuals (right column), and that the difference between the top and bottom rows is minor (in a scale of O(e2)O(e_{2})). Thus, SS is robust against the invasion by ALLB under both public and private assessment. E. Similar comparison to D was made for wild-type SJ and mutant ALLB. We see that SJ gives high goodness to most of the SS individuals under public assessment (top left), that SJ gives low goodness to most of the ALLB individuals (top right), but that SJ gives goodness of 1/21/2 to both SJ (bottom left) and ALLB (bottom right) individuals under private assessment. Thus, SJ is robust against the invasion by ALLB under public assessment while it is not under private assessment.

Conditions for ESS

The ESS condition of S03S_{03}(SS) is shown in Fig. 3-B. When b/cb/c exceeds the upper bound, the norm is invaded by S01S_{01}(ALLG) (compare the right and center panels of Fig. 3-A). On the other hand, when b/cb/c falls below the lower bound, the norm is invaded by S04S_{04}(SC) (compare the left and center panels of Fig. 3-A). Fig. 3-C shows that these theoretical bounds are also supported by individual-based simulations. Notably, the smaller e2e_{2} is, the wider the ESS region of S03S_{03}(SS) becomes.

The ESS region of S08S_{08}(SH) is quite narrow in comparison to that of S03S_{03}(SS), as seen in Fig. 3-B. In addition, when b/cb/c exceeds the upper bound or falls below the lower bound, the norm is invaded by S04S_{04}(SC) and S16S_{16}(ALLB), respectively. The range of b/cb/c-ratios that make SH evolutionarily stable is the widest at an intermediate e2e_{2} (about 0.10.1).

In contrast to these results, we find that S07S_{07}(SJ), which is known to be a successful norm when reputation is public, is invaded by norms such as S16S_{16}(ALLB) and S08S_{08}(SH) independent of the value of b/cb/c (and also independent of e2e_{2}), and therefore that it is never an ESS. This is summarized in Fig. 3-A.

To summarize, SS, SH, and SJ are all the ESS norms under the public assessment, but whether they remain ESS in the private assessment critically differs. This difference is clearly understood by focusing on how the reputation structure they give differs between the public and private reputation cases under a sufficiently small but positive assessment error rate, e21e_{2}\ll 1. Let us consider below, for example, whether each norm can prevent the invasion of ALLB, a potential invader norm.

Success of Simple Standing: The reputation structure that S03S_{03}(SS) gives differs little between the public and private reputation cases (see Fig. 3-D). Under the public reputation (see SI for the calculation), SS assigns good reputations to SS themselves (represented by the bar at goodness =1=1 in the top-left panel in Fig. 3-D), while bad reputations to ALLB (represented by the bar at goodness =0=0 in the top-right panel in Fig. 3-D). Thus, SS distinguishes between SS itself and the invader ALLB and prevents the invasion of ALLB. Even under the private reputation, SS still assigns good reputations to SS themselves (see the bottom-left panel in Fig. 3; high goodness of 1e21-e_{2} are given to the fraction 12e21-2e_{2} of SS individuals, for example), and assigns bad reputations to ALLB (see the bottom-right panel in Fig. 3; low goodness of 2e22e_{2} are given to the fraction 13e21-3e_{2} of ALLB individuals, for example). Thus, the distinction between SS and ALLB is maintained. For that reason, SS succeeds in achieving ESS even under the private assessment. The cooperation rate at this ESS is as high as 12e21-2e_{2} for small e2e_{2}, so it entails nearly perfect cooperation.

Failure of Stern Judging: Contrary to SS, the reputation structure that S07S_{07}(SJ) gives extremely differs between the public and private reputation cases (see Fig. 3-E). Under the public reputation (see SI for the calculation), wild-type SJ gives high goodness to other SJ (top-left in Fig. 3-E) and wild-type SJ gives low goodness to ALLB (top-right in Fig. 3-E). Thus, SJ prevents the invasion of ALLB. Under the private assessment, however, SJ gives goodness of 1/2 to other SJ individuals (bottom-left in Fig. 3-E) [39] while SJ gives goodness of 1/2 to ALLB individuals as well (bottom-right in Fig. 3-E). Thus, the distinction between SJ and ALLB is lost. This is why SJ fails to be ESS under the private assessment.

Shunning can be ESS, but the level of cooperation is low: We can understand why S08S_{08}(SH) achieves ESS only in a narrow region under private reputation (see SI for the detailed calculation and see Fig. S3 for the illustration for easy interpretation). Under the public reputation, SH gives good reputations to the half of other SH and bad reputations to the other half (top-left in Fig. S3) while SH gives bad reputations to almost all ALLB (top-right in Fig. S3). Thus, SH prevents the invasion of ALLB. Under private reputation, on the other hand, SH gives low goodness to both SH and ALLB (bottom-left and bottom-right in Fig. S3). Here, however, SH has a slightly better chance to receive good reputations than ALLB, in the order of e22e_{2}^{2}. This explains why SH prevents the invasion from ALLB only in a narrow region and also explains why its ESS condition becomes more strict for a smaller assessment error rate, e2e_{2}. The cooperation rate at a realized ESS is as low as e2e_{2} for small e2e_{2}, so we conclude that S08S_{08}(SH) does not contribute to cooperation.

Discussion

This study considered indirect reciprocity under noisy and private assessment. We focused on goodness of individual (i.e., what proportion of individuals gives the individual good reputations) between different norms and developed an analytical method to calculate the distribution of goodness at equilibrium. Using this methodology we studied whether a mutant norm succeeds in the invasion into a wild-type norm. Although both S03S_{03}(SS) and S07S_{07}(SJ) can be ESS under public reputation, we found that their evolutionary stability is totally different under private assessment. In particular, we found that S03S_{03}(SS) remains to be ESS under private assessment if the assessment error rate is small, while S07S_{07}(SJ) cannot be ESS no matter how small the error rate is.

The reason for this difference between S03S_{03}(SS) and S07S_{07}(SJ) comes from the difference in the complexity of these two norms. In the world of private assessment, errors in assessment accumulate independently among observers, which is a potential source of collapse of cooperation in the population. However, since S03S_{03}(SS) regards a cooperating donor as good no matter whether the recipient is good or bad, a discrepancy in the opinion toward the recipient between two different observers does not produce further discrepancy; those two observers can agree that such a cooperating donor is good. In contrast, S07S_{07}(SJ) is more complex than S03S_{03}(SS) and recipient’s reputation is always decisive information (see Table 1), so this complexity becomes an obstacle for correcting discrepancy between observers.

Hilbe et al. [42] studied by computer simulations whether the leading eight norms can sustain cooperation under the noisy and private assessment. They concluded that S03S_{03}(SS) (referred to as “L3” in their paper) and S07S_{07}(SJ) (“L6”) fail to achieve cooperation, which is contrary to our result. This difference is because we studied evolutionary stability in a deterministic model, while they studied fixation probability in a stochastic model. Because those two criteria are different, drawing a general conclusion is difficult, but the significance of our study lies in that we have shown that cooperation can be evolutionarily sustained even under private assessment.

A future direction of this study would be to examine ESS conditions of social norms when some of the assumptions are changed. For example, we have assumed second-order norms, in which individuals refer to a donor’s action (first-order information) and a recipient’s reputation (second-order one) when they update the donor’s reputation. However, humans may use more complex norms than the second-order ones. Studying the effect of higher-order information  [65, 32, 33, 36], such as the previous reputation of the donor (third-order information), would further deepen our understanding. We have also assumed that all individuals simultaneously update their opinions toward the same donor. However, in a real society, the number of people who can observe a single person’s behavior is limited. Thus, the effect of asynchronous updates of reputations is worth studying. Last but not least, we have implicitly assumed that game interactions last sufficiently long so that we can use equilibrium distributions of goodness for calculating payoffs (i.e. discount factor is 11). However, the effect of initial reputation cannot necessarily be ignored in some cases.

In conclusion, we have demonstrated that cooperation can be evolutionarily stable even under the noisy and private assessment. Specifically, we have shown that Stern Judging, which is one of the most leading norms under public reputation, cannot distinguish between cooperators and defectors under private assessment and thus fails to achieve ESS. On the other hand, we have revealed that Simple Standing can be stable in a wide range of parameters. Based on these results, we predict that Simple Standing should play a key role in sustaining cooperation by indirect reciprocity under noisy private assessment. These findings provide a rigid theoretical basis for understanding human cooperation and pave the way for future studies in biology, psychology, sociology, and economics.

Acknowledgement

Y.F. acknowledges the support by JSPS KAKENHI Grant Number JP21J01393. H.O. acknowledges the support by JSPS KAKENHI Grant Number JP19H04431.

References

  • [1] Robert L Trivers. The evolution of reciprocal altruism. The Quarterly Review of Biology, 46(1):35–57, 1971.
  • [2] Robert Axelrod and William D Hamilton. The evolution of cooperation. Science, 211(4489):1390–1396, 1981.
  • [3] Robert Axelrod. The Evolution of Cooperation. Basic, New York, 1984.
  • [4] Toshio Yamagishi, Nahoko Hayashi, and Nobuhito Jin. Prisoner’s dilemma networks: selection strategy versus action strategy. In Social dilemmas and cooperation, pages 233–250. Springer, 1984.
  • [5] Ronald Noë and Peter Hammerstein. Biological markets: supply and demand determine the effect of partner choice in cooperation, mutualism and mating. Behavioral Ecology and Sociobiology, 35(1):1–11, 1994.
  • [6] Ronald Noë and Peter Hammerstein. Biological markets. Trends in Ecology & Evolution, 10(8):336–339, 1995.
  • [7] Pat Barclay. Strategies for cooperation in biological markets, especially for humans. Evolution and Human Behavior, 34(3):164–175, 2013.
  • [8] Richard D Alexander. The biology of moral systems. Aldine de Gruyter: New York, 1987.
  • [9] Martin A Nowak and Karl Sigmund. Evolution of indirect reciprocity by image scoring. Nature, 393(6685):573–577, 1998.
  • [10] Martin A Nowak and Karl Sigmund. Evolution of indirect reciprocity. Nature, 437(7063):1291–1298, 2005.
  • [11] Nicholas Emler. Gossip, reputation, and social adaptation. University Press of Kansas, 1994.
  • [12] Robin Ian MacDonald Dunbar. Grooming, gossip, and the evolution of language. Harvard University Press, 1998.
  • [13] Robin IM Dunbar. Gossip in evolutionary perspective. Review of General Psychology, 8(2):100–110, 2004.
  • [14] Matthew Feinberg, Robb Willer, Jennifer Stellar, and Dacher Keltner. The virtues of gossip: reputational information sharing as prosocial behavior. Journal of Personality and Social Psychology, 102(5):1015, 2012.
  • [15] Matthew Feinberg, Robb Willer, and Michael Schultz. Gossip and ostracism promote cooperation in groups. Psychological Science, 25(3):656–664, 2014.
  • [16] Junhui Wu, Daniel Balliet, and Paul AM Van Lange. Reputation, gossip, and human cooperation. Social and Personality Psychology Compass, 10(6):350–364, 2016.
  • [17] Karthik Panchanathan and Robert Boyd. A tale of two defectors: the importance of standing for evolution of indirect reciprocity. Journal of Theoretical Biology, 224(1):115–126, 2003.
  • [18] Karl Sigmund. The calculus of selfishness. Princeton University Press, 2010.
  • [19] Martin Nowak and Karl Sigmund. A strategy of win-stay, lose-shift that outperforms tit-for-tat in the prisoner’s dilemma game. Nature, 364(6432):56–58, 1993.
  • [20] Jianzhong Wu and Robert Axelrod. How to cope with noise in the iterated prisoner’s dilemma. Journal of Conflict Resolution, 39(1):183–189, 1995.
  • [21] Hisashi Ohtsuki and Yoh Iwasa. How should we define goodness?—reputation dynamics in indirect reciprocity. Journal of Theoretical Biology, 231(1):107–120, 2004.
  • [22] Hisashi Ohtsuki and Yoh Iwasa. The leading eight: social norms that can maintain cooperation by indirect reciprocity. Journal of Theoretical Biology, 239(4):435–444, 2006.
  • [23] Jorge M Pacheco, Francisco C Santos, and Fabio AC C Chalub. Stern-judging: A simple, successful norm which promotes cooperation under indirect reciprocity. PLoS Computational Biology, 2(12):e178, 2006.
  • [24] Shinsuke Suzuki and Eizo Akiyama. Evolution of indirect reciprocity in groups of various sizes and comparison with direct reciprocity. Journal of Theoretical Biology, 245(3):539–552, 2007.
  • [25] Francisco C Santos, Fabio ACC Chalub, and Jorge M Pacheco. A multi-level selection model for the emergence of social norms. In European Conference on Artificial Life, pages 525–534. Springer, 2007.
  • [26] Feng Fu, Christoph Hauert, Martin A Nowak, and Long Wang. Reputation-based partner choice promotes cooperation in social networks. Physical Review E, 78(2):026117, 2008.
  • [27] Shinsuke Suzuki and Eizo Akiyama. Evolutionary stability of first-order-information indirect reciprocity in sizable groups. Theoretical Population Biology, 73(3):426–436, 2008.
  • [28] Satoshi Uchida and Karl Sigmund. The competition of assessment rules for indirect reciprocity. Journal of Theoretical Biology, 263(1):13–19, 2010.
  • [29] Hisashi Ohtsuki, Yoh Iwasa, and Martin A Nowak. Reputation effects in public and private interactions. PLoS Computational Biology, 11(11):e1004527, 2015.
  • [30] Fernando P Santos, Francisco C Santos, and Jorge M Pacheco. Social norms of cooperation in small-scale societies. PLoS Computational Biology, 12(1):e1004709, 2016.
  • [31] Fernando P Santos, Jorge M Pacheco, and Francisco C Santos. Evolution of cooperation under indirect reciprocity and arbitrary exploration rates. Scientific Reports, 6(1):1–9, 2016.
  • [32] Tatsuya Sasaki, Isamu Okada, and Yutaka Nakai. The evolution of conditional moral assessment in indirect reciprocity. Scientific reports, 7(1):1–8, 2017.
  • [33] Fernando P Santos, Francisco C Santos, and Jorge M Pacheco. Social norm complexity and past reputations in the evolution of cooperation. Nature, 555(7695):242–245, 2018.
  • [34] Fernando Santos, Jorge Pacheco, and Francisco Santos. Social norms of cooperation with costly reputation building. Proceedings of the AAAI Conference on Artificial Intelligence, 32(1), Apr. 2018.
  • [35] Chengyi Xia, Carlos Gracia-Lázaro, and Yamir Moreno. Effect of memory, intolerance, and second-order reputation on cooperation. Chaos: An Interdisciplinary Journal of Nonlinear Science, 30(6):063122, 2020.
  • [36] Fernando P Santos, Jorge M Pacheco, and Francisco C Santos. The complexity of human cooperation under indirect reciprocity. Philosophical Transactions of the Royal Society B, 376(1838):20200291, 2021.
  • [37] Shirsendu Podder, Simone Righi, and Károly Takács. Local reputation, local selection, and the leading eight norms. Scientific Reports, 11(1):1–10, 2021.
  • [38] Satoshi Uchida. Effect of private information on indirect reciprocity. Physical Review E, 82(3):036111, 2010.
  • [39] Satoshi Uchida and Tatsuya Sasaki. Effect of assessment error and private information on stern-judging in indirect reciprocity. Chaos, Solitons & Fractals, 56:175–180, 2013.
  • [40] Isamu Okada, Tatsuya Sasaki, and Yutaka Nakai. Tolerant indirect reciprocity can boost social welfare through solidarity with unconditional cooperators in private monitoring. Scientific Reports, 7(1):1–11, 2017.
  • [41] Isamu Okada, Tatsuya Sasaki, and Yutaka Nakai. A solution for private assessment in indirect reciprocity using solitary observation. Journal of Theoretical Biology, 455:7–15, 2018.
  • [42] Christian Hilbe, Laura Schmid, Josef Tkadlec, Krishnendu Chatterjee, and Martin A Nowak. Indirect reciprocity with private, noisy, and incomplete information. Proceedings of the National Academy of Sciences, 115(48):12241–12246, 2018.
  • [43] Samuel Bowles and Herbert Gintis. A cooperative species. In A Cooperative Species. Princeton University Press, 2011.
  • [44] Isamu Okada. A review of theoretical studies on indirect reciprocity. Games, 11(3):27, 2020.
  • [45] Hitoshi Yamamoto, Isamu Okada, Satoshi Uchida, and Tatsuya Sasaki. A norm knockout method on indirect reciprocity to reveal indispensable norms. Scientific Reports, 7(1):1–7, 2017.
  • [46] Sanghun Lee, Yohsuke Murase, and Seung Ki Baek. Local stability of cooperation in a continuous model of indirect reciprocity. Scientific Reports, 11(1):1–13, 2021.
  • [47] Sanghun Lee, Yohsuke Murase, and Seung Ki Baek. A second-order perturbation theory for the continuous model of indirect reciprocity. arXiv preprint arXiv:2203.03920, 2022.
  • [48] Eleanor Brush, Åke Brännström, and Ulf Dieckmann. Indirect reciprocity with negative assortment and limited information can promote cooperation. Journal of Theoretical Biology, 443:56–65, 2018.
  • [49] Roger M Whitaker, Gualtiero B Colombo, and David G Rand. Indirect reciprocity and the evolution of prejudicial groups. Scientific Reports, 8(1):1–14, 2018.
  • [50] Arunas L Radzvilavicius, Alexander J Stewart, and Joshua B Plotkin. Evolution of empathetic moral evaluation. Elife, 8:e44269, 2019.
  • [51] Marcus Krellner and The Anh Han. Putting oneself in everybody’s shoes-pleasing enables indirect reciprocity under private assessments. In Artificial Life Conference Proceedings 32, pages 402–410. MIT Press One Rogers Street, Cambridge, MA 02142-1209, USA, 2020.
  • [52] Ji Quan, Xiukang Yang, Xianjia Wang, Jian-Bo Yang, Kaibiao Wu, and Zilong Dai. Withhold-judgment and punishment promote cooperation in indirect reciprocity under incomplete information. EPL (Europhysics Letters ), 128(2):28001, 2020.
  • [53] Marcus Krellner and The Anh Han. Pleasing enhances indirect reciprocity-based cooperation under private assessment. Artificial Life, 31:1–31, 2021.
  • [54] Laura Schmid, Pouya Shati, Christian Hilbe, and Krishnendu Chatterjee. The evolution of indirect reciprocity under action and assessment generosity. Scientific Reports, 11(1):1–14, 2021.
  • [55] Taylor A Kessinger and Joshua B Plotkin. Indirect reciprocity in populations with group structure. arXiv preprint arXiv:2204.10811, 2022.
  • [56] Ji Quan, Jiacheng Nie, Wenman Chen, and Xianjia Wang. Keeping or reversing social norms promote cooperation by enhancing indirect reciprocity. Chaos, Solitons & Fractals, 158:111986, 2022.
  • [57] Pengfei Gu and Yanling Zhang. Reputation-based rewiring promotes cooperation in complex network. In Advances in Guidance, Navigation and Control, pages 1405–1415. Springer, 2022.
  • [58] Karl Sigmund. Moral assessment in indirect reciprocity. Journal of Theoretical Biology, 299:25–30, 2012.
  • [59] Koji Oishi, Takashi Shimada, and Nobuyasu Ito. Group formation through indirect reciprocity. Physical Review E, 87(3):030801, 2013.
  • [60] Yuma Fujimoto and Hisashi Ohtsuki. Reputation structure in indirect reciprocity under noisy and private assessment. Scientific Reports, 12(1):1–13, 2022.
  • [61] J Maynard-Smith and George R Price. The logic of animal conflict. Nature, 246(5427):15–18, 1973.
  • [62] John Maynard-Smith. Evolution and the Theory of Games. Cambridge university press, 1982.
  • [63] Martin A Nowak and Karl Sigmund. The dynamics of indirect reciprocity. Journal of Theoretical Biology, 194(4):561–574, 1998.
  • [64] Hisashi Ohtsuki and Yoh Iwasa. Global analyses of evolutionary dynamics and exhaustive search for social norms that maintain cooperation by reputation. Journal of Theoretical Biology, 244(3):518–531, 2007.
  • [65] Robert Sugden. The economics of rights, co-operation and welfare. Basil Blackwell, 1986.

Supplementary Material

S1 Calculation of joint distribution of goodnesses

This section proposes an analytical method to obtain the reputation structure under indirect reciprocity. We assume a situation where rare mutants with norm M{\rm M} of ratio δ\delta invade other wild-types with norm W{\rm W} of ratio 1δ1-\delta. We denote the population ratio of norm A{W,M}A\in\{{\rm W},{\rm M}\} as ρA\rho_{A}; ρA=1δ\rho_{A}=1-\delta when A=WA={\rm W}, while ρA=δ\rho_{A}=\delta when A=MA={\rm M}. To characterize the reputation structure, we define piAp_{iA} as a proportion of individuals of norm AA who assign good reputations to individual ii. We call piAp_{iA} a goodness of individual ii from norm A{W,M}A\in\{{\rm W},{\rm M}\}.

In the following, let us consider a stochastic transition of piAp_{iA} in each round. In a single round, a recipient and a donor are chosen and labeled as iRi_{\rm R} and iDi_{\rm D}, respectively. In this round, piDAOp_{i_{\rm D}A_{\rm O}}, i.e., the goodness of donor from norm AOA_{\rm O}, changes into the next goodness piDAOp_{i_{\rm D}A_{\rm O}}^{\prime} for all AO{W,M}A_{\rm O}\in\{{\rm W},{\rm M}\}. Below, we formulate the stochastic change separately for cases that the donor chooses to cooperate or defect.

C-map case: First, we consider a case that the donor cooperates with the recipient, occurring with a probability of

h(piRAD):=piRAD(1e1)+(1piRAD)e1.\displaystyle h(p_{i_{\rm R}A_{\rm D}}):=p_{i_{\rm R}A_{\rm D}}(1-e_{1})+(1-p_{i_{\rm R}A_{\rm D}})e_{1}. (1)

In this case, NρAOpiDAON\rho_{A_{\rm O}}p_{i_{\rm D}A_{\rm O}}^{\prime}, i.e., the number of observers with norm AOA_{\rm O} who give good reputations to the donor in the next round, follows a probability distribution of

NρAOpiDAON1+N2,\displaystyle N\rho_{A_{\rm O}}p_{i_{\rm D}A_{\rm O}}^{\prime}\sim N_{1}+N_{2}, (2)
N1(NρAOpiRAO,aAOGC),\displaystyle N_{1}\sim{\cal B}(N\rho_{A_{\rm O}}p_{i_{\rm R}A_{\rm O}},a^{\rm GC}_{A_{\rm O}}), (3)
N2(NρAO(1piRAO),aAOBC).\displaystyle N_{2}\sim{\cal B}(N\rho_{A_{\rm O}}(1-p_{i_{\rm R}A_{\rm O}}),a^{\rm BC}_{A_{\rm O}}). (4)

Here, (n,a){\cal B}(n,a) denotes a binomial distribution with success probability aa and trial number nn. In addition, aAOXYa^{XY}_{A_{\rm O}} denotes the probability that an observer with norm AOA_{\rm O} who evaluates the recipient as X{G,B}X\in\{{\rm G},{\rm B}\} newly gives a good reputation to the donor whose action is Y{C,D}Y\in\{{\rm C},{\rm D}\}. aAOGCa^{\rm GC}_{A_{\rm O}}, aAOBCa^{\rm BC}_{A_{\rm O}}, aAOGDa^{\rm GD}_{A_{\rm O}}, and aAOBDa^{\rm BD}_{A_{\rm O}} are obtained by converting corresponding G\rm G and B\rm B pivots into 1e21-e_{2} and e2e_{2} in Table 1 of the main manuscript. Instead of (3), we use a shorthand notation;

NρAOpiDAO(NρAOpiRAO,aAOGC)+(NρAO(1piRAO),aAOBC).\displaystyle N\rho_{A_{\rm O}}p_{i_{\rm D}A_{\rm O}}^{\prime}\sim{\cal B}(N\rho_{A_{\rm O}}p_{i_{\rm R}A_{\rm O}},a^{\rm GC}_{A_{\rm O}})+{\cal B}(N\rho_{A_{\rm O}}(1-p_{i_{\rm R}A_{\rm O}}),a^{\rm BC}_{A_{\rm O}}). (5)

Because NρAON\rho_{A_{\rm O}} is sufficiently large, the mean and variance of piDAOp_{i_{\rm D}A_{\rm O}}^{\prime} are given by

E[piDAO]\displaystyle\textrm{E}[p_{i_{\rm D}A_{\rm O}}^{\prime}] =piRAO(aAOGCaAOBC=:ΔfAOC)+aAOBC(=:fAOC(piRAO)),\displaystyle=p_{i_{\rm R}A_{\rm O}}(\underbrace{a^{\rm GC}_{A_{\rm O}}-a^{\rm BC}_{A_{\rm O}}}_{=:\Delta f_{A_{\rm O}}^{\rm C}})+a^{\rm BC}_{A_{\rm O}}\quad(=:f_{A_{O}}^{\rm C}(p_{i_{\rm R}A_{\rm O}})), (6)
Var[piDAO]\displaystyle\textrm{Var}[p_{i_{\rm D}A_{\rm O}}^{\prime}] =piRAOaAOGC(1aAOGC)+(1piRAO)aAOBC(1aAOBC)NρAO=e2(1e2)NρAO(=:ρAO1s2).\displaystyle=\frac{p_{i_{\rm R}A_{\rm O}}a^{\rm GC}_{A_{\rm O}}(1-a^{\rm GC}_{A_{\rm O}})+(1-p_{i_{\rm R}A_{\rm O}})a^{\rm BC}_{A_{\rm O}}(1-a^{\rm BC}_{A_{\rm O}})}{N\rho_{A_{\rm O}}}=\frac{e_{2}(1-e_{2})}{N\rho_{A_{\rm O}}}\quad(=:\rho_{A_{\rm O}}^{-1}s^{2}). (7)

In (6), fAOCf_{A_{\rm O}}^{\rm C} represents a map from the recipient’s goodness in the present round to the donor’s goodness in the next round. Because this map is applied only when the donor cooperates, we call it “C-map”.

D-map case: On the other hand, we consider a case that the donor defects with the recipient, occurring with a probability of

1h(piRAD)=(1piRAD)(1e1)+piRADe1.\displaystyle 1-h(p_{i_{\rm R}A_{\rm D}})=(1-p_{i_{\rm R}A_{\rm D}})(1-e_{1})+p_{i_{\rm R}A_{\rm D}}e_{1}. (8)

In this case, NρAOpiDAON\rho_{A_{\rm O}}p_{i_{\rm D}A_{\rm O}}^{\prime} follows a probability distribution of

NρAOpiDAO(NρAOpiRAO,aAOGD)+(NρAO(1piRAO),aAOBD).\displaystyle N\rho_{A_{\rm O}}p_{i_{\rm D}A_{\rm O}}^{\prime}\sim{\cal B}(N\rho_{A_{\rm O}}p_{i_{\rm R}A_{\rm O}},a^{\rm GD}_{A_{\rm O}})+{\cal B}(N\rho_{A_{\rm O}}(1-p_{i_{\rm R}A_{\rm O}}),a^{\rm BD}_{A_{\rm O}}). (9)

From this equation, the mean and variance of piDAOp_{i_{\rm D}A_{\rm O}}^{\prime} are given by

E[piDAO]\displaystyle\textrm{E}[p_{i_{\rm D}A_{\rm O}}^{\prime}] =piRAO(aAOGDaAOBD=:ΔfAOD)+aAOBD(=:fAOD(piRAO)),\displaystyle=p_{i_{\rm R}A_{\rm O}}(\underbrace{a^{\rm GD}_{A_{\rm O}}-a^{\rm BD}_{A_{\rm O}}}_{=:\Delta f_{A_{\rm O}}^{\rm D}})+a^{\rm BD}_{A_{\rm O}}\quad(=:f_{A_{\rm O}}^{\rm D}(p_{i_{\rm R}A_{\rm O}})), (10)
Var[piDAO]\displaystyle\textrm{Var}[p_{i_{\rm D}A_{\rm O}}^{\prime}] =piRAOaAOGD(1aAOGD)+(1piRAO)aAOBD(1aAOBD)NρAO=e2(1e2)NρAO(=:ρAO1s2).\displaystyle=\frac{p_{i_{\rm R}A_{\rm O}}a^{\rm GD}_{A_{\rm O}}(1-a^{\rm GD}_{A_{\rm O}})+(1-p_{i_{\rm R}A_{\rm O}})a^{\rm BD}_{A_{\rm O}}(1-a^{\rm BD}_{A_{\rm O}})}{N\rho_{A_{\rm O}}}=\frac{e_{2}(1-e_{2})}{N\rho_{A_{\rm O}}}\quad(=:\rho_{A_{\rm O}}^{-1}s^{2}). (11)

Because the map fAODf_{A_{\rm O}}^{\rm D} is applied when the donor defects, we call it D-map in the same way as C-map.

The above C-map fSkCf_{S_{k}}^{\rm C} and D-map fSkDf_{S_{k}}^{\rm D} are illustrated in Fig. 1 for all Sk𝒮S_{k}\in{\cal S}.

Refer to caption
FIG. S 1: Materials for the reputation structure for all the second-order norms W=Sk{\rm W}=S_{k}. Green solid (resp. broken) lines indicate C-map fWCf_{\rm W}^{\rm C} (resp. D-map fWDf_{\rm W}^{\rm D}) of the norm. Gray lines indicate the identity map, which shows the fixed points of the C-map and D-map as the crossing points with these maps. The orange distribution shows the probability density function of goodnesses pWWp_{\mathrm{WW}} when W=Sk{\rm W}=S_{k}. All the panels are output under N=2000N=2000, δ=0\delta=0, and (e1,e2)=(0,0.1)(e_{1},e_{2})=(0,0.1). Numbers over each peak indicate jj.

S2 Time evolution of reputation structure

Because the population of wild-types and mutants are sufficiently large, we can continualize the distribution of individual goodness piAp_{iA} with separating into the cases that the norm of individual ii is W{\rm W} or M{\rm M}. In the following, pAAp_{AA^{\prime}} denotes a continualized goodness of an individual with norm AA in the eyes of individuals with norm AA^{\prime}. Let us consider a time change of the distribution of pAAp_{AA^{\prime}}. As shown above, however, we should keep in mind that pAWp_{A{\rm W}} and pAMp_{A{\rm M}} are simultaneously changed by the C-map or D-map. Thus, we consider dynamics of ΦA(pAW,pAM)\Phi_{A}(p_{A{\rm W}},p_{A{\rm M}}), a joint probability distribution of pAWp_{A{\rm W}} and pAMp_{A{\rm M}}. Note that a norm of the chosen recipient is M{\rm M} only with a probability of δ\delta, which contributes the dynamics of ΦA\Phi_{A} only in a scale of O(δ)O(\delta). By ignoring this scale of O(δ)O(\delta), the dynamics of ΦA\Phi_{A} is given by

ddtΦA(pAW,pAM)=ΦA(pAW,pAM)+0101\displaystyle\frac{\mathrm{d}}{\mathrm{d}t}\Phi_{A}(p_{A{\rm W}},p_{A{\rm M}})=-\Phi_{A}(p_{A{\rm W}},p_{A{\rm M}})+\int_{0}^{1}\int_{0}^{1} {h(pWA)g(pAW;fWC(pWW),ρW1s2)g(pAM;fMC(pWM),ρM1s2)\displaystyle\{h(p^{\prime}_{{\rm W}A})g(p_{A{\rm W}};f_{\rm W}^{\rm C}(p^{\prime}_{\rm WW}),\rho_{\rm W}^{-1}s^{2})g(p_{A{\rm M}};f_{\rm M}^{\rm C}(p^{\prime}_{\rm WM}),\rho_{\rm M}^{-1}s^{2})
+(1h(pWA))g(pAW;fWD(pWW),ρW1s2)g(pAM;fMD(pWM),ρM1s2)}\displaystyle+(1-h(p^{\prime}_{{\rm W}A}))g(p_{A{\rm W}};f_{\rm W}^{\rm D}(p^{\prime}_{\rm WW}),\rho_{\rm W}^{-1}s^{2})g(p_{A{\rm M}};f_{\rm M}^{\rm D}(p^{\prime}_{\rm WM}),\rho_{\rm M}^{-1}s^{2})\}
×ΦW(pWW,pWM)dpWWdpWM.\displaystyle\times\Phi_{\rm W}(p^{\prime}_{\rm WW},p^{\prime}_{\rm WM})\mathrm{d}p^{\prime}_{\rm WW}\mathrm{d}p^{\prime}_{\rm WM}. (12)

Here, g(p;μ,σ2)g(p;\mu,\sigma^{2}) denotes a Gaussian function with the mean μ\mu and variance σ2\sigma^{2} as

g(p;μ,σ2):=12πσ2exp((pμ)22σ2).\displaystyle g(p;\mu,\sigma^{2}):=\frac{1}{\sqrt{2\pi\sigma^{2}}}\exp\left(-\frac{(p-\mu)^{2}}{2\sigma^{2}}\right). (13)

Equation (12) explains an update of the donor’s goodness per time. The first (resp. second) term in the right side represents decrements (increments) by updating goodnesses. In detail, ΦW(pWW,pWM)\Phi_{\rm W}(p^{\prime}_{\mathrm{WW}},p^{\prime}_{\mathrm{WM}}) in the second term shows the density that the recipient’s goodness is pWWp^{\prime}_{\mathrm{WW}} (resp. pWMp^{\prime}_{\mathrm{WM}}) in the eyes of wild-types (resp. mutants). h(pWA)h(p^{\prime}_{{\rm W}A}) shows the probability that the donor cooperates, and the donor’s goodnesses after the update in the eyes of observers with norm W{\rm W} and M{\rm M} are described by g(pAW;fWC(pWW),ρW1s2)g(p_{A{\rm W}};f_{\rm W}^{\rm C}(p^{\prime}_{\mathrm{WW}}),\rho_{\rm W}^{-1}s^{2}) and g(pAM;fMC(pWM),ρM1s2)g(p_{A{\rm M}};f_{\rm M}^{\rm C}(p^{\prime}_{\mathrm{WM}}),\rho_{\rm M}^{-1}s^{2}), respectively. A similar explanation holds when the donor chooses to defect.

The equilibrium state of (12), i.e., ΦA\Phi_{A}^{*}, satisfies

ΦA(pAW,pAM)=0101\displaystyle\Phi_{A}^{*}(p_{A{\rm W}},p_{A{\rm M}})=\int_{0}^{1}\int_{0}^{1} {h(pWA)g(pAW;fWC(pWW),ρW1s2)g(pAM;fMC(pWM),ρM1s2)\displaystyle\{h(p^{\prime}_{{\rm W}A})g(p_{A{\rm W}};f_{\rm W}^{\rm C}(p^{\prime}_{\rm WW}),\rho_{\rm W}^{-1}s^{2})g(p_{A{\rm M}};f_{\rm M}^{\rm C}(p^{\prime}_{\rm WM}),\rho_{\rm M}^{-1}s^{2})
+(1h(pWA))g(pAW;fWD(pWW),ρW1s2)g(pAM;fMD(pWM),ρM1s2)}\displaystyle+(1-h(p^{\prime}_{{\rm W}A}))g(p_{A{\rm W}};f_{\rm W}^{\rm D}(p^{\prime}_{\rm WW}),\rho_{\rm W}^{-1}s^{2})g(p_{A{\rm M}};f_{\rm M}^{\rm D}(p^{\prime}_{\rm WM}),\rho_{\rm M}^{-1}s^{2})\}
×ΦW(pWW,pWM)dpWWdpWM.\displaystyle\times\Phi_{\rm W}^{*}(p^{\prime}_{\rm WW},p^{\prime}_{\rm WM})\mathrm{d}p^{\prime}_{\rm WW}\mathrm{d}p^{\prime}_{\rm WM}. (14)

To solve this equation, we assume that the equilibrium state can be described by a summation of two-dimensional Gaussian functions without correlation as

ΦA(pAW,pAM)=jqAjg(pAW;μAWj,ρW1σAWj2)g(pAM;μAMj,ρM1σAMj2).\displaystyle\Phi_{A}^{*}(p_{A{\rm W}},p_{A{\rm M}})=\sum_{j}q_{Aj}g(p_{A{\rm W}};\mu_{A{\rm W}j},\rho_{\rm W}^{-1}\sigma^{2}_{A{\rm W}j})g(p_{A{\rm M}};\mu_{A{\rm M}j},\rho_{\rm M}^{-1}\sigma^{2}_{A{\rm M}j}). (15)

The assumption of Gaussian is justified by the above transition process of the donor’s goodness, where the goodness is virtually determined only by the mean and variance in a sufficiently large population. No correlation is assumed because the variance is given independently by observers with different norms.

We now derive equations which the equilibrium state satisfies for each norm A{W,M}A\in\{{\rm W},{\rm M}\}. First, substituting (15) into (14) for A=WA={\rm W}, we obtain

jqWjg(pWW;μWWj,ρW1σWWj2)g(pWM;μWMj,ρM1σWMj2)\displaystyle\sum_{j}q_{{\rm W}j}g(p_{\mathrm{WW}};\mu_{\mathrm{WW}j},\rho_{\rm W}^{-1}\sigma^{2}_{\mathrm{WW}j})g(p_{\mathrm{WM}};\mu_{\mathrm{WM}j},\rho_{\rm M}^{-1}\sigma^{2}_{\mathrm{WM}j})
=0101{h(pWW)g(pWW;fWC(pWW),ρW1s2)g(pWM;fMC(pWM),ρM1s2)\displaystyle=\int_{0}^{1}\int_{0}^{1}\{h(p^{\prime}_{\mathrm{WW}})g(p_{\mathrm{WW}};f_{\rm W}^{\rm C}(p^{\prime}_{\mathrm{WW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{WM}};f_{\rm M}^{\rm C}(p^{\prime}_{\mathrm{WM}}),\rho_{\rm M}^{-1}s^{2})
+(1h(pWW))g(pWW;fWD(pWW),ρW1s2)g(pWM;fMD(pWM),ρM1s2)}\displaystyle\hskip 28.45274pt+(1-h(p^{\prime}_{\mathrm{WW}}))g(p_{\mathrm{WW}};f_{\rm W}^{\rm D}(p^{\prime}_{\mathrm{WW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{WM}};f_{\rm M}^{\rm D}(p^{\prime}_{\mathrm{WM}}),\rho_{\rm M}^{-1}s^{2})\}
×jqWjg(pWW;μWWj,ρW1σWWj2)g(pWM;μWMj,ρM1σWMj2)dpWWdpWM,\displaystyle\hskip 28.45274pt\times\sum_{j}q_{{\rm W}j}g(p^{\prime}_{\mathrm{WW}};\mu_{\mathrm{WW}j},\rho_{\rm W}^{-1}\sigma^{2}_{\mathrm{WW}j})g(p^{\prime}_{\mathrm{WM}};\mu_{\mathrm{WM}j},\rho_{\rm M}^{-1}\sigma^{2}_{\mathrm{WM}j})\mathrm{d}p^{\prime}_{\mathrm{WW}}\mathrm{d}p^{\prime}_{\mathrm{WM}},
=jqWj0101{h(pWW)g(pWW;fWC(pWW),ρW1s2)g(pWM;fMC(pWM),ρM1s2)\displaystyle=\sum_{j}q_{{\rm W}j}\int_{0}^{1}\int_{0}^{1}\{h(p^{\prime}_{\mathrm{WW}})g(p_{\mathrm{WW}};f_{\rm W}^{\rm C}(p^{\prime}_{\mathrm{WW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{WM}};f_{\rm M}^{\rm C}(p^{\prime}_{\mathrm{WM}}),\rho_{\rm M}^{-1}s^{2})
+(1h(pWW))g(pWW;fWD(pWW),ρW1s2)g(pWM;fMD(pWM),ρM1s2)}\displaystyle\hskip 28.45274pt+(1-h(p^{\prime}_{\mathrm{WW}}))g(p_{\mathrm{WW}};f_{\rm W}^{\rm D}(p^{\prime}_{\mathrm{WW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{WM}};f_{\rm M}^{\rm D}(p^{\prime}_{\mathrm{WM}}),\rho_{\rm M}^{-1}s^{2})\}
×g(pWW;μWWj,ρW1σWWj2)g(pWM;μWMj,ρM1σWMj2)dpWWdpWM,\displaystyle\hskip 28.45274pt\times g(p^{\prime}_{\mathrm{WW}};\mu_{\mathrm{WW}j},\rho_{\rm W}^{-1}\sigma^{2}_{\mathrm{WW}j})g(p^{\prime}_{\mathrm{WM}};\mu_{\mathrm{WM}j},\rho_{\rm M}^{-1}\sigma^{2}_{\mathrm{WM}j})\mathrm{d}p^{\prime}_{\mathrm{WW}}\mathrm{d}p^{\prime}_{\mathrm{WM}},
jqWj{h(μWWj)g(pWW;fWC(pWW),ρW1s2)g(pWM;fMC(pWM),ρM1s2)\displaystyle\simeq\sum_{j}q_{{\rm W}j}\int_{-\infty}^{\infty}\int_{-\infty}^{\infty}\{h(\mu_{\mathrm{WW}j})g(p_{\mathrm{WW}};f_{\rm W}^{\rm C}(p^{\prime}_{\mathrm{WW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{WM}};f_{\rm M}^{\rm C}(p^{\prime}_{\mathrm{WM}}),\rho_{\rm M}^{-1}s^{2})
+(1h(μWWj))g(pWW;fWD(pWW),ρW1s2)g(pWM;fMD(pWM),ρM1s2)}\displaystyle\hskip 28.45274pt+(1-h(\mu_{\mathrm{WW}j}))g(p_{\mathrm{WW}};f_{\rm W}^{\rm D}(p^{\prime}_{\mathrm{WW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{WM}};f_{\rm M}^{\rm D}(p^{\prime}_{\mathrm{WM}}),\rho_{\rm M}^{-1}s^{2})\}
×g(pWW;μWWj,ρW1σWWj2)g(pWM;μWMj,ρM1σWMj2)dpWWdpWM,\displaystyle\hskip 28.45274pt\times g(p^{\prime}_{\mathrm{WW}};\mu_{\mathrm{WW}j},\rho_{\rm W}^{-1}\sigma^{2}_{\mathrm{WW}j})g(p^{\prime}_{\mathrm{WM}};\mu_{\mathrm{WM}j},\rho_{\rm M}^{-1}\sigma^{2}_{\mathrm{WM}j})\mathrm{d}p^{\prime}_{\mathrm{WW}}\mathrm{d}p^{\prime}_{\mathrm{WM}},
=jqWj{h(μWWj)g(pWW;fWC(μWWj),ρW1(s2+(ΔfWC)2σWWj2))g(pWM;fMC(μWMj),ρM1(s2+(ΔfMC)2σWMj2))}\displaystyle=\sum_{j}q_{{\rm W}j}\{h(\mu_{\mathrm{WW}j})g(p_{\mathrm{WW}};f_{\rm W}^{\rm C}(\mu_{\mathrm{WW}j}),\rho_{\rm W}^{-1}(s^{2}+(\Delta f_{\rm W}^{\rm C})^{2}\sigma_{\mathrm{WW}j}^{2}))g(p_{\mathrm{WM}};f_{\rm M}^{\rm C}(\mu_{\mathrm{WM}j}),\rho_{\rm M}^{-1}(s^{2}+(\Delta f_{\rm M}^{\rm C})^{2}\sigma_{\mathrm{WM}j}^{2}))\}
+(1h(μWWj))g(pWW;fWD(μWWj),ρW1(s2+(ΔfWD)2σWWj2))g(pWM;fMD(μWMj),ρM1(s2+(ΔfMD)2σWMj2))}.\displaystyle\hskip 28.45274pt+(1-h(\mu_{\mathrm{WW}j}))g(p_{\mathrm{WW}};f_{\rm W}^{\rm D}(\mu_{\mathrm{WW}j}),\rho_{\rm W}^{-1}(s^{2}+(\Delta f_{\rm W}^{\rm D})^{2}\sigma_{\mathrm{WW}j}^{2}))g(p_{\mathrm{WM}};f_{\rm M}^{\rm D}(\mu_{\mathrm{WM}j}),\rho_{\rm M}^{-1}(s^{2}+(\Delta f_{\rm M}^{\rm D})^{2}\sigma_{\mathrm{WM}j}^{2}))\}. (16)

This equation gives a constraint for (qWj,μWWj,σWWj2,μWMj,σWMj2)(q_{{\rm W}j},\mu_{\mathrm{WW}j},\sigma_{\mathrm{WW}j}^{2},\mu_{\mathrm{WM}j},\sigma_{\mathrm{WM}j}^{2}). Next, when A=MA={\rm M}, in a similar manner, we obtain

jqMjg(pMW;μMWj,ρW1σMWj2)g(pMM;μMMj,ρM1σMMj2)\displaystyle\sum_{j}q_{{\rm M}j}g(p_{\mathrm{MW}};\mu_{\mathrm{MW}j},\rho_{\rm W}^{-1}\sigma^{2}_{\mathrm{MW}j})g(p_{\mathrm{MM}};\mu_{\mathrm{MM}j},\rho_{\rm M}^{-1}\sigma^{2}_{\mathrm{MM}j})
=0101{h(pWM)g(pMW;fWC(pMW),ρW1s2)g(pMM;fMC(pMM),ρM1s2)\displaystyle=\int_{0}^{1}\int_{0}^{1}\{h(p^{\prime}_{\mathrm{WM}})g(p_{\mathrm{MW}};f_{\rm W}^{\rm C}(p^{\prime}_{\mathrm{MW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{MM}};f_{\rm M}^{\rm C}(p^{\prime}_{\mathrm{MM}}),\rho_{\rm M}^{-1}s^{2})
+(1h(pWM))g(pMW;fWD(pMW),ρW1s2)g(pMM;fMD(pMM),ρM1s2)}\displaystyle\hskip 28.45274pt+(1-h(p^{\prime}_{\mathrm{WM}}))g(p_{\mathrm{MW}};f_{\rm W}^{\rm D}(p^{\prime}_{\mathrm{MW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{MM}};f_{\rm M}^{\rm D}(p^{\prime}_{\mathrm{MM}}),\rho_{\rm M}^{-1}s^{2})\}
×jqMjg(pMW;μMWj,ρW1σMWj2)g(pMM;μMMj,ρM1σMMj2)dpMWdpMM\displaystyle\hskip 28.45274pt\times\sum_{j}q_{{\rm M}j}g(p^{\prime}_{\mathrm{MW}};\mu_{\mathrm{MW}j},\rho_{\rm W}^{-1}\sigma^{2}_{\mathrm{MW}j})g(p^{\prime}_{\mathrm{MM}};\mu_{\mathrm{MM}j},\rho_{\rm M}^{-1}\sigma^{2}_{\mathrm{MM}j})\mathrm{d}p^{\prime}_{\mathrm{MW}}\mathrm{d}p^{\prime}_{\mathrm{MM}}
=jqMj0101{h(pWM)g(pMW;fWC(pMW),ρW1s2)g(pMM;fMC(pMM),ρM1s2)\displaystyle=\sum_{j}q_{{\rm M}j}\int_{0}^{1}\int_{0}^{1}\{h(p^{\prime}_{\mathrm{WM}})g(p_{\mathrm{MW}};f_{\rm W}^{\rm C}(p^{\prime}_{\mathrm{MW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{MM}};f_{\rm M}^{\rm C}(p^{\prime}_{\mathrm{MM}}),\rho_{\rm M}^{-1}s^{2})
+(1h(pWM))g(pMW;fWD(pMW),ρW1s2)g(pMM;fMD(pMM),ρM1s2)}\displaystyle\hskip 28.45274pt+(1-h(p^{\prime}_{\mathrm{WM}}))g(p_{\mathrm{MW}};f_{\rm W}^{\rm D}(p^{\prime}_{\mathrm{MW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{MM}};f_{\rm M}^{\rm D}(p^{\prime}_{\mathrm{MM}}),\rho_{\rm M}^{-1}s^{2})\}
×jqMjg(pMW;μMWj,ρW1σMWj2)g(pMM;μMMj,ρM1σMMj2)dpMWdpMM\displaystyle\hskip 28.45274pt\times\sum_{j}q_{{\rm M}j}g(p^{\prime}_{\mathrm{MW}};\mu_{\mathrm{MW}j},\rho_{\rm W}^{-1}\sigma^{2}_{\mathrm{MW}j})g(p^{\prime}_{\mathrm{MM}};\mu_{\mathrm{MM}j},\rho_{\rm M}^{-1}\sigma^{2}_{\mathrm{MM}j})\mathrm{d}p^{\prime}_{\mathrm{MW}}\mathrm{d}p^{\prime}_{\mathrm{MM}}
jqMj{h(μWMj)g(pMW;fWC(pMW),ρW1s2)g(pMM;fMC(pMM),ρM1s2)\displaystyle\simeq\sum_{j}q_{{\rm M}j}\int_{-\infty}^{\infty}\int_{-\infty}^{\infty}\{h(\mu_{\mathrm{WM}j})g(p_{\mathrm{MW}};f_{\rm W}^{\rm C}(p^{\prime}_{\mathrm{MW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{MM}};f_{\rm M}^{\rm C}(p^{\prime}_{\mathrm{MM}}),\rho_{\rm M}^{-1}s^{2})
+(1h(μWMj))g(pMW;fWD(pMW),ρW1s2)g(pMM;fMD(pMM),ρM1s2)}\displaystyle\hskip 28.45274pt+(1-h(\mu_{\mathrm{WM}j}))g(p_{\mathrm{MW}};f_{\rm W}^{\rm D}(p^{\prime}_{\mathrm{MW}}),\rho_{\rm W}^{-1}s^{2})g(p_{\mathrm{MM}};f_{\rm M}^{\rm D}(p^{\prime}_{\mathrm{MM}}),\rho_{\rm M}^{-1}s^{2})\}
×jqMjg(pMW;μMWj,ρW1σMWj2)g(pMM;μMMj,ρM1σMMj2)dpMWdpMM\displaystyle\hskip 28.45274pt\times\sum_{j}q_{{\rm M}j}g(p^{\prime}_{\mathrm{MW}};\mu_{\mathrm{MW}j},\rho_{\rm W}^{-1}\sigma^{2}_{\mathrm{MW}j})g(p^{\prime}_{\mathrm{MM}};\mu_{\mathrm{MM}j},\rho_{\rm M}^{-1}\sigma^{2}_{\mathrm{MM}j})\mathrm{d}p^{\prime}_{\mathrm{MW}}\mathrm{d}p^{\prime}_{\mathrm{MM}}
=jqMj{h(μWMj)g(pMW;fWC(μMWj),ρW1(s2+(ΔfWC)2σMWj2))g(pMM;fMC(μMMj),ρM1(s2+(ΔfMC)2σMMj2))}\displaystyle=\sum_{j}q_{{\rm M}j}\{h(\mu_{\mathrm{WM}j})g(p_{\mathrm{MW}};f_{\rm W}^{\rm C}(\mu_{\mathrm{MW}j}),\rho_{\rm W}^{-1}(s^{2}+(\Delta f_{\rm W}^{\rm C})^{2}\sigma_{\mathrm{MW}j}^{2}))g(p_{\mathrm{MM}};f_{\rm M}^{\rm C}(\mu_{\mathrm{MM}j}),\rho_{\rm M}^{-1}(s^{2}+(\Delta f_{\rm M}^{\rm C})^{2}\sigma_{\mathrm{MM}j}^{2}))\}
+(1h(μWMj))g(pMW;fWD(μMWj),ρW1(s2+(ΔfWD)2σMWj2))g(pMM;fMD(μMMj),ρM1(s2+(ΔfMD)2σMMj2))}.\displaystyle\hskip 28.45274pt+(1-h(\mu_{\mathrm{WM}j}))g(p_{\mathrm{MW}};f_{\rm W}^{\rm D}(\mu_{\mathrm{MW}j}),\rho_{\rm W}^{-1}(s^{2}+(\Delta f_{\rm W}^{\rm D})^{2}\sigma_{\mathrm{MW}j}^{2}))g(p_{\mathrm{MM}};f_{\rm M}^{\rm D}(\mu_{\mathrm{MM}j}),\rho_{\rm M}^{-1}(s^{2}+(\Delta f_{\rm M}^{\rm D})^{2}\sigma_{\mathrm{MM}j}^{2}))\}. (17)

This equation gives a constraint for (qMj,μMWj,σMWj2,μMMj,σMMj2)(q_{{\rm M}j},\mu_{\mathrm{MW}j},\sigma_{\mathrm{MW}j}^{2},\mu_{\mathrm{MM}j},\sigma_{\mathrm{MM}j}^{2}).

To solve (16), let us consider a set of solutions {(μWWj,μWMj)}j\{(\mu_{\mathrm{WW}j},\mu_{\mathrm{WM}j})\}_{j}. From the equilibrium condition of (16), the equal set must be restored by applying C-map and D-map to all the elements of the set. In other words, the condition is given by

{(μWWj,μWMj)}j={(fWC(μWWj),fMC(μWMj))}j{(fWD(μWWj),fMD(μWMj))}j.\displaystyle\{(\mu_{\mathrm{WW}j},\mu_{\mathrm{WM}j})\}_{j}=\{(f_{\rm W}^{\rm C}(\mu_{\mathrm{WW}j}),f_{\rm M}^{\rm C}(\mu_{\mathrm{WM}j}))\}_{j}\cup\{(f_{\rm W}^{\rm D}(\mu_{\mathrm{WW}j}),f_{\rm M}^{\rm D}(\mu_{\mathrm{WM}j}))\}_{j}. (18)

Similarly, to obtain the equilibrium condition for (17), we should consider a set of solutions {(μMWj,μMMj)}j\{(\mu_{\mathrm{MW}j},\mu_{\mathrm{MM}j})\}_{j} satisfying

{(μMWj,μMMj)}j={(fWC(μMWj),fMC(μMMj))}j{(fWD(μMWj),fMD(μMMj))}j.\displaystyle\{(\mu_{\mathrm{MW}j},\mu_{\mathrm{MM}j})\}_{j}=\{(f_{\rm W}^{\rm C}(\mu_{\mathrm{MW}j}),f_{\rm M}^{\rm C}(\mu_{\mathrm{MM}j}))\}_{j}\cup\{(f_{\rm W}^{\rm D}(\mu_{\mathrm{MW}j}),f_{\rm M}^{\rm D}(\mu_{\mathrm{MM}j}))\}_{j}. (19)

Here, although the appearance of the variables are different, the problems are essentially between (18) and (19). Thus, the problem to be solved is

{(μj,W,μj,M)}j={(fWC(μj,W),fMC(μj,M))}j{(fWD(μj,W),fMD(μj,M))}j.\displaystyle\{(\mu_{j,{\rm W}},\mu_{j,{\rm M}})\}_{j}=\{(f_{\rm W}^{\rm C}(\mu_{j,{\rm W}}),f_{\rm M}^{\rm C}(\mu_{j,{\rm M}}))\}_{j}\cup\{(f_{\rm W}^{\rm D}(\mu_{j,{\rm W}}),f_{\rm M}^{\rm D}(\mu_{j,{\rm M}}))\}_{j}. (20)

Furthermore, because W,M𝒮{\rm W},{\rm M}\in{\cal S}, we can generalize the problem as

{(μj,S01,,μj,S16)}j={(fS01C(μj,S01),,fS16C(μj,S16))}j{(fS01D(μj,S01),,fS16D(μj,S16))}j.\displaystyle\{(\mu_{j,S_{01}},\cdots,\mu_{j,S_{16}})\}_{j}=\{(f_{S_{01}}^{\rm C}(\mu_{j,S_{01}}),\cdots,f_{S_{16}}^{\rm C}(\mu_{j,S_{16}}))\}_{j}\cup\{(f_{S_{01}}^{\rm D}(\mu_{j,S_{01}}),\cdots,f_{S_{16}}^{\rm D}(\mu_{j,S_{16}}))\}_{j}. (21)

Now, for all Sk𝒮S_{k}\in{\cal S} and, let us consider a set {μj,Sk}j\{0}\{\mu_{j,S_{k}}\}_{j\in\mathbb{Z}\backslash\{0\}} satisfying

μ+1,Sk\displaystyle\mu_{+1,S_{k}} =fSkC(μ1,Sk)=fSkC(μ2,Sk)=,\displaystyle=f_{S_{k}}^{\rm C}(\mu_{-1,S_{k}})=f_{S_{k}}^{\rm C}(\mu_{-2,S_{k}})=\cdots, (22)
μ+(j+1),Sk\displaystyle\mu_{+(j+1),S_{k}} =fSkC(μ+j,Sk),\displaystyle=f_{S_{k}}^{\rm C}(\mu_{+j,S_{k}}), (23)
μ1,Sk\displaystyle\mu_{-1,S_{k}} =fSkD(μ+1,Sk)=fSkD(μ+2,Sk)=,\displaystyle=f_{S_{k}}^{\rm D}(\mu_{+1,S_{k}})=f_{S_{k}}^{\rm D}(\mu_{+2,S_{k}})=\cdots, (24)
μ(j+1),Sk\displaystyle\mu_{-(j+1),S_{k}} =fSkD(μj,Sk),\displaystyle=f_{S_{k}}^{\rm D}(\mu_{-j,S_{k}}), (25)

(the proof for these equations will be given later). This set {μj,Sk}j\{0}\{\mu_{j,S_{k}}\}_{j\in\mathbb{Z}\backslash\{0\}} gives a solution to problem (21), and thus solves (16) and (17). In (22)-(25), we consistently label each μj,Sk\mu_{j,S_{k}} such that sequentially applying C-map (resp. D-map) j(>0)j(>0) times leads to label +j+j (resp. j-j) (see the illustration in Fig. 1). In the following, we show that such {μj,Sk}j\{0}\{\mu_{j,S_{k}}\}_{j\in\mathbb{Z}\backslash\{0\}} actually exists for all kk.

1. When neither C-map nor D-map is constant: First, we consider a case of ΔfSkC0\Delta f_{S_{k}}^{\rm C}\neq 0 and ΔfSkD0\Delta f_{S_{k}}^{\rm D}\neq 0. Four norms of k=06,07,09,10k=06,07,09,10 correspond to this case. In this case, C-map and D-map have the same fixed point (at 1/21/2). Only the position given by this fixed point is achieved at an equilibrium. Indeed, if we substitute μj,Sk=1/2\mu_{j,S_{k}}=1/2 for all j\{0}j\in\mathbb{Z}\backslash\{0\}, (22)-(25) are simultaneously satisfied without any contradiction.

2. When both C-map and D-map are constant: Second, we consider a case of ΔfSkC=0\Delta f_{S_{k}}^{\rm C}=0 and ΔfSkD=0\Delta f_{S_{k}}^{\rm D}=0. Four norms of k=01,04,13,16k=01,04,13,16 correspond to this case. Because fSkCf_{S_{k}}^{\rm C} is a constant map, (22) and (23) are satisfied by substituting the mapped value of this map into μ+j,Sk\mu_{+j,S_{k}} for all j=1,2,j=1,2,\cdots. In the same way, because fSkDf_{S_{k}}^{\rm D} is a constant map, (24) and (25) are satisfied by substituting the mapped value into μj,Sk\mu_{-j,S_{k}} for all j=1,2,j=1,2,\cdots. Thus, no contradiction occurs.

3. When only C-map is constant: Third, we consider a case of ΔfSkC=0\Delta f_{S_{k}}^{\rm C}=0 and ΔfSkD0\Delta f_{S_{k}}^{\rm D}\neq 0. Four norms k=02,03,14,15k=02,03,14,15 correspond to this case. Because fSkCf_{S_{k}}^{\rm C} is a constant map, (22) and (23) are satisfied by substituting the mapped value of this map into μ+j,Sk\mu_{+j,S_{k}} for all j=1,2,j=1,2,\cdots. Then, we define μ1,Sk\mu_{-1,S_{k}} as the value to which D-map maps all the same value μ+1,Sk=μ+2,Sk=\mu_{+1,S_{k}}=\mu_{+2,S_{k}}=\cdots, and (24) is satisfied. Finally, we sequentially define μ2,Sk,μ3,Sk,\mu_{-2,S_{k}},\mu_{-3,S_{k}},\cdots by applying D-map to μ1,Sk\mu_{-1,S_{k}} one by one. Thus, no contradiction occurs.

4. When only D-map is constant: Finally, we consider a case of ΔfSkC0\Delta f_{S_{k}}^{\rm C}\neq 0 and ΔfSkD=0\Delta f_{S_{k}}^{\rm D}=0. Four norms k=05,08,09,12k=05,08,09,12 correspond to this case. Because fSkDf_{S_{k}}^{\rm D} is a constant map, (24), (25) are satisfied by substituting the mapped value of this map into μj,Sk\mu_{-j,S_{k}} for all j=1,2,j=1,2,\cdots. Then, we define μ+1,Sk\mu_{+1,S_{k}} as the value to which D-map maps all the same value μ1,Sk=μ2,Sk=\mu_{-1,S_{k}}=\mu_{-2,S_{k}}=\cdots, and (24) is satisfied. Finally, we sequentially define μ+2,Sk,μ+3,Sk,\mu_{+2,S_{k}},\mu_{+3,S_{k}},\cdots by applying C-map to μ+1,Sk\mu_{+1,S_{k}} one by one. Thus, no contradiction occurs.

As summarized in Table 2, the set {μj,Sk}j\{0}\{\mu_{j,S_{k}}\}_{j\in\mathbb{Z}\backslash\{0\}} can be analytically described. Furthermore, we also define σj,Sk2\sigma_{j,S_{k}}^{2} as the variance in Gaussian corresponding to the mean μj,Sk\mu_{j,S_{k}}. Similarly to the mean values above, we solve the variances as

(σWWj2,σWMj2)=(σMWj2,σMMj2)=(σj,W2,σj,M2).\displaystyle(\sigma_{\mathrm{WW}j}^{2},\sigma_{\mathrm{WM}j}^{2})=(\sigma_{\mathrm{MW}j}^{2},\sigma_{\mathrm{MM}j}^{2})=(\sigma_{j,{\rm W}}^{2},\sigma_{j,{\rm M}}^{2}). (26)

The recursion that the set {σj,Sk2}j\{0}\{\sigma_{j,S_{k}}^{2}\}_{j\in\mathbb{Z}\backslash\{0\}} should satisfy is

σ+1,Sk2\displaystyle\sigma_{+1,S_{k}}^{2} =s2+(ΔfSkC)2σ1,Sk2=s2+(ΔfSkC)2σ2,Sk2=,\displaystyle=s^{2}+(\Delta f_{S_{k}}^{\rm C})^{2}\sigma_{-1,S_{k}}^{2}=s^{2}+(\Delta f_{S_{k}}^{\rm C})^{2}\sigma_{-2,S_{k}}^{2}=\cdots, (27)
σ+(j+1),Sk2\displaystyle\sigma_{+(j+1),S_{k}}^{2} =s2+(ΔfSkC)2σ+j,Sk2,\displaystyle=s^{2}+(\Delta f_{S_{k}}^{\rm C})^{2}\sigma_{+j,S_{k}}^{2}, (28)
σ1,Sk2\displaystyle\sigma_{-1,S_{k}}^{2} =s2+(ΔfSkD)2σ+1,Sk2=s2+(ΔfSkD)2σ+2,Sk2=,\displaystyle=s^{2}+(\Delta f_{S_{k}}^{\rm D})^{2}\sigma_{+1,S_{k}}^{2}=s^{2}+(\Delta f_{S_{k}}^{\rm D})^{2}\sigma_{+2,S_{k}}^{2}=\cdots, (29)
σ(j+1),Sk2\displaystyle\sigma_{-(j+1),S_{k}}^{2} =s2+(ΔfSkD)2σj,Sk2,\displaystyle=s^{2}+(\Delta f_{S_{k}}^{\rm D})^{2}\sigma_{-j,S_{k}}^{2}, (30)

and the solution exists for all SkS_{k} (see Table. 2 for the solution of these equations). Table. 2 shows {(μj,Sk,σj,Sk2)}j\{0}\{(\mu_{j,S_{k}},\sigma_{j,S_{k}}^{2})\}_{j\in\mathbb{Z}\backslash\{0\}}.

SkS_{k} μ+j,Sk\mu_{+j,S_{k}} μj,Sk\mu_{-j,S_{k}} σ+j,Sk2\sigma_{+j,S_{k}}^{2} σj,Sk2\sigma_{-j,S_{k}}^{2}
S01S_{01} 1e21-e_{2} 1e21-e_{2} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N}
S02S_{02} 1e21-e_{2} 1+(12e2)j+12\displaystyle\frac{1+(1-2e_{2})^{j+1}}{2} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N} 1(12e2)2(j+1)4N\displaystyle\frac{1-(1-2e_{2})^{2(j+1)}}{4N}
S03S_{03} 1e21-e_{2} 1{(12e2)}j+12\displaystyle\frac{1-\{-(1-2e_{2})\}^{j+1}}{2} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N} 1(12e2)2(j+1)4N\displaystyle\frac{1-(1-2e_{2})^{2(j+1)}}{4N}
S04S_{04} 1e21-e_{2} e2e_{2} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N}
S05S_{05} 1+(12e2)j+12\displaystyle\frac{1+(1-2e_{2})^{j+1}}{2} 1e21-e_{2} 1(12e2)2(j+1)4N\displaystyle\frac{1-(1-2e_{2})^{2(j+1)}}{4N} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N}
S07S_{07} 12\displaystyle\frac{1}{2} 12\displaystyle\frac{1}{2} 14N\displaystyle\frac{1}{4N} 14N\displaystyle\frac{1}{4N}
S08S_{08} 1(12e2)j+12\displaystyle\frac{1-(1-2e_{2})^{j+1}}{2} e2e_{2} 1(12e2)2(j+1)4N\displaystyle\frac{1-(1-2e_{2})^{2(j+1)}}{4N} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N}
S09S_{09} 1{(12e2)}j+12\displaystyle\frac{1-\{-(1-2e_{2})\}^{j+1}}{2} 1e21-e_{2} 1(12e2)2(j+1)4N\displaystyle\frac{1-(1-2e_{2})^{2(j+1)}}{4N} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N}
S12S_{12} 1+{(12e2)}j+12\displaystyle\frac{1+\{-(1-2e_{2})\}^{j+1}}{2} e2e_{2} 1(12e2)2(j+1)4N\displaystyle\frac{1-(1-2e_{2})^{2(j+1)}}{4N} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N}
S13S_{13} e2e_{2} 1e21-e_{2} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N}
S14S_{14} e2e_{2} 1(12e2)j+12\displaystyle\frac{1-(1-2e_{2})^{j+1}}{2} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N} 1(12e2)2(j+1)4N\displaystyle\frac{1-(1-2e_{2})^{2(j+1)}}{4N}
S15S_{15} e2e_{2} 1+{(12e2)}j+12\displaystyle\frac{1+\{-(1-2e_{2})\}^{j+1}}{2} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N} 1(12e2)2(j+1)4N\displaystyle\frac{1-(1-2e_{2})^{2(j+1)}}{4N}
S16S_{16} e2e_{2} e2e_{2} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N} e2(1e2)N\displaystyle\frac{e_{2}(1-e_{2})}{N}
Table 2: Analytical solution of Gaussian functions. We omit S06S_{06}, S10S_{10}, and S11S_{11} because the results are identical to those of S07S_{07}(SJ).

We also calculate a set of the masses of Gaussian functions, i.e., {qWj}j\{0}\{q_{{\rm W}j}\}_{j\in\mathbb{Z}\backslash\{0\}} and {qMj}j\{0}\{q_{{\rm M}j}\}_{j\in\mathbb{Z}\backslash\{0\}}. By substituting the values in Table 2 into (16), we obtain the following relational expressions

qW+1=j=1h(μj,W)qWj,\displaystyle q_{{\rm W}+1}=\sum_{j=1}^{\infty}h(\mu_{-j,{\rm W}})q_{{\rm W}-j}, (31)
qW+j=h(μ+(j1),W)qW+(j1)(j=2,,),\displaystyle q_{{\rm W}+j}=h(\mu_{+(j-1),{\rm W}})q_{{\rm W}+(j-1)}\quad(j=2,\cdots,\infty), (32)
qW1=j=1(1h(μ+j,W))qW+j,\displaystyle q_{{\rm W}-1}=\sum_{j=1}^{\infty}(1-h(\mu_{+j,{\rm W}}))q_{{\rm W}+j}, (33)
qWj=(1h(μ(j1),W))qW(j1)(j=2,,).\displaystyle q_{{\rm W}-j}=(1-h(\mu_{-(j-1),{\rm W}}))q_{{\rm W}-(j-1)}\quad(j=2,\cdots,\infty). (34)

Similarly, by substituting the values in Table 2 into (17), we obtain

qM+1=j=1h(μj,M)qWj,\displaystyle q_{{\rm M}+1}=\sum_{j=1}^{\infty}h(\mu_{-j,{\rm M}})q_{{\rm W}-j}, (35)
qM+j=h(μ+(j1),M)qW+(j1)(j=2,,),\displaystyle q_{{\rm M}+j}=h(\mu_{+(j-1),{\rm M}})q_{{\rm W}+(j-1)}\quad(j=2,\cdots,\infty), (36)
qM1=j=1(1h(μ+j,M))qW+j,\displaystyle q_{{\rm M}-1}=\sum_{j=1}^{\infty}(1-h(\mu_{+j,{\rm M}}))q_{{\rm W}+j}, (37)
qMj=(1h(μ(j1),M))qW(j1)(j=2,,).\displaystyle q_{{\rm M}-j}=(1-h(\mu_{-(j-1),{\rm M}}))q_{{\rm W}-(j-1)}\quad(j=2,\cdots,\infty). (38)

(31)-(38) includes the infinite summations. Because these infinite summation cannot be analytically calculated, one should set a cutoff of the summations in the numerical calculation of (31)-(38).

Fig. 2-B in the main manuscript shows an example of ΦW(pWW,pWM)\Phi_{\rm W}^{*}(p_{\mathrm{WW}},p_{\mathrm{WM}}). In this example, the elements in {(μj,W,μj,M)}j\{0}\{(\mu_{j,{\rm W}},\mu_{j,{\rm M}})\}_{j\in\mathbb{Z}\backslash\{0\}} are all different for different jj, and thus the labeling in this study is at least necessary for the description of the reputation structure. This figure also shows that the obtained analytical solutions well approximate simulations of the image matrix.

S3 Calculation of expected payoff

In order to consider an evolutionary process, we derive expected payoffs of wild-types W{\rm W} and mutants M{\rm M} from joint probability distribution of goodnesses, i.e., ΦW\Phi^{*}_{\rm W} and ΦM\Phi^{*}_{\rm M}. In the limit that mutants are rare δ0\delta\to 0, the expected payoffs of the wild-types uWu_{\rm W} and mutants uMu_{\rm M} are given by

uW=(bc)p¯WW,uM=bp¯MWcp¯WM,\begin{split}u_{\rm W}&=(b-c)\bar{p}_{\mathrm{WW}},\\ u_{\rm M}&=b\bar{p}_{\mathrm{MW}}-c\bar{p}_{\mathrm{WM}},\\ \end{split} (39)

Here, p¯AA\bar{p}_{AA^{\prime}} indicates the average goodnesses of pAAp_{AA^{\prime}}, i.e., described as

p¯WW=0101pWWΦW(pWW,pWM)dpWWdpWM,p¯WM=0101pWMΦW(pWW,pWM)dpWWdpWM,p¯MW=0101pMWΦM(pMW,pMM)dpMWdpMM,\begin{split}\bar{p}_{\mathrm{WW}}&=\int_{0}^{1}\int_{0}^{1}p_{\mathrm{WW}}\Phi^{*}_{\rm W}(p_{\mathrm{WW}},p_{\mathrm{WM}}){\rm d}p_{\mathrm{WW}}{\rm d}p_{\mathrm{WM}},\\ \bar{p}_{\mathrm{WM}}&=\int_{0}^{1}\int_{0}^{1}p_{\mathrm{WM}}\Phi^{*}_{\rm W}(p_{\mathrm{WW}},p_{\mathrm{WM}}){\rm d}p_{\mathrm{WW}}{\rm d}p_{\mathrm{WM}},\\ \bar{p}_{\mathrm{MW}}&=\int_{0}^{1}\int_{0}^{1}p_{\mathrm{MW}}\Phi^{*}_{\rm M}(p_{\mathrm{MW}},p_{\mathrm{MM}}){\rm d}p_{\mathrm{MW}}{\rm d}p_{\mathrm{MM}},\\ \end{split} (40)

This average goodness can be analytically calculated by Gaussian approximation of ΦA(pAW,pAM)\Phi^{*}_{A}(p_{A{\rm W}},p_{A{\rm M}}). According to the conditions for the ESS, mutants can invade the population of wild-types if uW>uMu_{\rm W}>u_{\rm M}.

Regions where a mutant norm can invade a wild-type norm are given by Fig. 2. From this figure, we can obtain the invasibilities for a certain b/cb/c, as shown in Fig. 3-A in the main manuscript.

Refer to caption
FIG. S 2: Regions for possible invasions in the evolutionary processes. The row and column indicate the wild-type and mutant norms, respectively. The matrix shows the region of b/c(>1)b/c(>1) where the mutant invades the wild-type. In some pairs of wild-type and mutant norms, the mutant always or never succeeds in invading the wild-types for all b/c(>1)b/c(>1). The calculation is based on e1=0e_{1}=0 and e2=0.1e_{2}=0.1.

S4 Calculation of equilibrium state in public reputation

In this section, we derive the equilibrium distribution of reputations under public assessment, based on the previous study [28]. The basic setting is the same whether the reputation is publicly shared or privately held. We assume a population of size NN which consists of mutants with norm M{\rm M} and wild-type individuals with norm WM{\rm W}\neq{\rm M}. A donor and a recipient are randomly chosen every round. The donor chooses cooperation to the good recipient and defection to the bad recipient. Here, the donor erroneously chooses the opposite action to the intended one with probability 0e1<1/20\leq e_{1}<1/2. Then, all the individuals update their reputations of the donor. The difference between the public and private reputation cases is seen in the observers’ ways to update reputations. We assume that one mutant observer and one wild-type observer are chosen as representatives of each norm, and each gives a good or bad reputation to the donor according to its norm. Here, each representative observer commits an assignment error independently, in which case it erroneously assigns the opposite reputation to the intended one with probability 0<e2<1/20<e_{2}<1/2. (such an assessment error was not assumed in [28]) Then, all the individuals with the same norm copy the reputation of the donor assigned by their representative. Thus, the reputation of the same individual, even an erroneously assigned one, is shared among all the individuals with the same norm. In other words, each individual at any given time has two reputations, one is shared by all the mutant individuals, and the other is shared by all the wild-type individuals in the population.

Here we specifically consider the situation where rare mutants with norm M=S16{\rm M}=S_{16}(ALLB) invades a wild-type population with norm WM{\rm W}\neq{\rm M}. We use the same definition of pAAp_{AA^{\prime}}, i.e., goodness of an individual with norm AA in the eyes of norm AA^{\prime} users. Because reputations are public, pAAp_{AA^{\prime}} can be either 11 (the individual is assigned as good from all) or 0 (the individual is assigned as bad from all). Below we will derive p¯AA\bar{p}_{AA^{\prime}}, the probability that a norm AA user has a good reputation in the eyes of norm AA^{\prime} users.

Since the mutant norm is ALLB, the probability that mutants assign a good reputation to the donor is always aMGC=aMBC=aMGD=aMBD=e2a_{\rm M}^{\rm GC}=a_{\rm M}^{\rm BC}=a_{\rm M}^{\rm GD}=a_{\rm M}^{\rm BD}=e_{2}. Thus we obtain p¯WM=p¯MM=e2\bar{p}_{\mathrm{WM}}=\bar{p}_{\mathrm{MM}}=e_{2}.

Next we aim to solve the equilibrium average goodnesses in the eyes of wild-types, p¯WW\bar{p}_{\mathrm{WW}} and p¯MW\bar{p}_{\mathrm{MW}}. First, let us calculate p¯WW\bar{p}_{\mathrm{WW}}, which is relevant when the donor and the observer use norm W\rm W. Note that we can assume that the recipient uses norm W\rm W, because mutants are rare. p¯WW\bar{p}_{\mathrm{WW}} should satisfy

p¯WW=p¯WW{(1e1)aWGC+e1aWGD}+(1p¯WW){e1aWBC+(1e1)aWBD},\bar{p}_{\mathrm{WW}}=\bar{p}_{\mathrm{WW}}\{(1-e_{1})a_{\rm W}^{\rm GC}+e_{1}a_{\rm W}^{\rm GD}\}+(1-\bar{p}_{\mathrm{WW}})\{e_{1}a_{\rm W}^{\rm BC}+(1-e_{1})a_{\rm W}^{\rm BD}\}, (41)

The equality between the left- and right-hand sides shows that the proportion of good individuals balances before and after updating the chosen donor’s reputation. In the right-hand side, p¯WW\bar{p}_{\mathrm{WW}} and 1p¯WW1-\bar{p}_{\mathrm{WW}} in the first and the second terms indicate the probabilities that a randomly chosen recipient of norm W\rm W is good or bad from the viewpoint of norm W\rm W, respectively. When the recipient is good, the donor chooses cooperation or defection with probabilities (1e1)(1-e_{1}) and e1e_{1}. Then, aWGCa_{\rm W}^{\rm GC} and aWGDa_{\rm W}^{\rm GD} indicate the probabilities that the cooperating or defecting donor receives a good reputation from observers of norm W\rm W. When the recipient is bad, the donor chooses cooperation or defection with probabilities e1e_{1} and (1e1)(1-e_{1}). Then, aWBCa_{\rm W}^{\rm BC} and aWBDa_{\rm W}^{\rm BD} indicate the probabilities that the cooperating or defecting donor receives a good reputation from observers of norm W\rm W. The solution is

p¯WW=(1e1)aWBD+e1aWBC1{(1e1)(aWGCaWBD)+e1(aWGDaWBC)}.\bar{p}_{\mathrm{WW}}=\frac{(1-e_{1})a_{\rm W}^{\rm BD}+e_{1}a_{\rm W}^{\rm BC}}{1-\{(1-e_{1})(a_{\rm W}^{\rm GC}-a_{\rm W}^{\rm BD})+e_{1}(a_{\rm W}^{\rm GD}-a_{\rm W}^{\rm BC})\}}. (42)

Second, let us calculate p¯MW\bar{p}_{\mathrm{MW}}, which is relevant when the donor uses norm M{\rm M} and the observer uses norm W{\rm W}. Note that we can once again assume that the recipient uses norm W\rm W because mutants are rare. p¯MW\bar{p}_{\mathrm{MW}} should satisfy

p¯MW=p¯WW{h(e2)aWGC+(1h(e2))aWGD}+(1p¯WW){h(e2)aWBC+(1h(e2))aWBD}.\displaystyle\bar{p}_{\mathrm{MW}}=\bar{p}_{\mathrm{WW}}\{h(e_{2})a_{\rm W}^{\rm GC}+(1-h(e_{2}))a_{\rm W}^{\rm GD}\}+(1-\bar{p}_{\mathrm{WW}})\{h(e_{2})a_{\rm W}^{\rm BC}+(1-h(e_{2}))a_{\rm W}^{\rm BD}\}. (43)

Here, p¯WW\bar{p}_{\mathrm{WW}} and (1p¯WW)(1-\bar{p}_{\mathrm{WW}}) in the first and second terms of the right-hand side indicate the probabilities that the recipient is good or bad from the viewpoint of norm W{\rm W}, respectively. In both terms, h(e2)(=e2(1e1)+(1e2)e1)h(e_{2})(=e_{2}(1-e_{1})+(1-e_{2})e_{1}) and 1h(e2)1-h(e_{2}) are the probabilities that the donor with norm M\rm M executes cooperation or defection, which is independent of whether the recipient is good or bad from the viewpoint of norm W\rm W. In the first term, aWGCa_{\rm W}^{\rm GC} and aWGDa_{\rm W}^{\rm GD} indicate the probabilities that the cooperating and defecting donor receives a good reputation from the observers of norm W{\rm W}. In the second term, aWBCa_{\rm W}^{\rm BC} and aWBDa_{\rm W}^{\rm BD} indicate the probabilities that the cooperating and defecting donor receives a good reputation from the observers of norm W{\rm W}.

We summarize the solutions, p¯WW\bar{p}_{\mathrm{WW}} and p¯MW\bar{p}_{\mathrm{MW}}, in Table 3.

SkS_{k} p¯WW\bar{p}_{\mathrm{WW}} p¯MW\bar{p}_{\mathrm{MW}} p¯WW|e1=0\bar{p}_{\mathrm{WW}}|_{e_{1}=0} p¯MW|e1=0\bar{p}_{\mathrm{MW}}|_{e_{1}=0}
S01S_{01} 1e21-e_{2} == 1e21-e_{2} 1e21-e_{2} 1e21-e_{2}
S02S_{02} e1+e22e1e2e1+2e22e1e2\displaystyle\frac{e_{1}+e_{2}-2e_{1}e_{2}}{e_{1}+2e_{2}-2e_{1}e_{2}} << e1+e22e1e2+e222e1e222e23+4e1e23e1+2e22e1e2\displaystyle\frac{e_{1}+e_{2}-2e_{1}e_{2}+e_{2}^{2}-2e_{1}e_{2}^{2}-2e_{2}^{3}+4e_{1}e_{2}^{3}}{e_{1}+2e_{2}-2e_{1}e_{2}} 12\displaystyle\frac{1}{2} 12+12e2e22\displaystyle\frac{1}{2}+\frac{1}{2}e_{2}-e_{2}^{2}
S03S_{03} 1e21+e12e1e2\displaystyle\frac{1-e_{2}}{1+e_{1}-2e_{1}e_{2}} >> (1e2)(2e1+3e26e1e22e22+4e1e22)1+e12e1e2\displaystyle\frac{(1-e_{2})(2e_{1}+3e_{2}-6e_{1}e_{2}-2e_{2}^{2}+4e_{1}e_{2}^{2})}{1+e_{1}-2e_{1}e_{2}} 1e21-e_{2} 3e25e22+2e233e_{2}-5e_{2}^{2}+2e_{2}^{3}
S04S_{04} 12\displaystyle\frac{1}{2} >> e1+2e24e1e22e22+4e1e22\displaystyle e_{1}+2e_{2}-4e_{1}e_{2}-2e_{2}^{2}+4e_{1}e_{2}^{2} 12\displaystyle\frac{1}{2} 2e22e222e_{2}-2e_{2}^{2}
S05S_{05} 1e1e2+2e1e21e1+2e1e2\displaystyle\frac{1-e_{1}-e_{2}+2e_{1}e_{2}}{1-e_{1}+2e_{1}e_{2}} >> 1e1e2+2e1e2e22+2e1e22+2e234e1e231e1+2e1e2\displaystyle\frac{1-e_{1}-e_{2}+2e_{1}e_{2}-e_{2}^{2}+2e_{1}e_{2}^{2}+2e_{2}^{3}-4e_{1}e_{2}^{3}}{1-e_{1}+2e_{1}e_{2}} 1e21-e_{2} 1e2e22+2e231-e_{2}-e_{2}^{2}+2e_{2}^{3}
S06S_{06} 12\displaystyle\frac{1}{2} == 12\displaystyle\frac{1}{2} 12\displaystyle\frac{1}{2} 12\displaystyle\frac{1}{2}
S07S_{07} 1e1e2+2e1e2\displaystyle 1-e_{1}-e_{2}+2e_{1}e_{2} >> 2e1+3e22e1212e1e26e22+12e12e2+24e1e22+4e2324e12e2216e1e23+16e12e23\displaystyle 2e_{1}+3e_{2}-2e_{1}^{2}-12e_{1}e_{2}-6e_{2}^{2}+12e_{1}^{2}e_{2}+24e_{1}e_{2}^{2}+4e_{2}^{3}-24e_{1}^{2}e_{2}^{2}-16e_{1}e_{2}^{3}+16e_{1}^{2}e_{2}^{3} 1e21-e_{2} 3e26e22+4e233e_{2}-6e_{2}^{2}+4e_{2}^{3}
S08S_{08} e2e1+2e22e1e2\displaystyle\frac{e_{2}}{e_{1}+2e_{2}-2e_{1}e_{2}} >> e2(2e1+3e26e1e22e22+4e1e22)e1+2e22e1e2\displaystyle\frac{e_{2}(2e_{1}+3e_{2}-6e_{1}e_{2}-2e_{2}^{2}+4e_{1}e_{2}^{2})}{e_{1}+2e_{2}-2e_{1}e_{2}} 12\displaystyle\frac{1}{2} 32e2e22\displaystyle\frac{3}{2}e_{2}-e_{2}^{2}
S09S_{09} 1e22e12e2+2e1e2\displaystyle\frac{1-e_{2}}{2-e_{1}-2e_{2}+2e_{1}e_{2}} << (1e2)(22e13e2+6e1e2+2e224e1e22)2e12e2+2e1e2\displaystyle\frac{(1-e_{2})(2-2e_{1}-3e_{2}+6e_{1}e_{2}+2e_{2}^{2}-4e_{1}e_{2}^{2})}{2-e_{1}-2e_{2}+2e_{1}e_{2}} 12\displaystyle\frac{1}{2} 132e2+e22\displaystyle 1-\frac{3}{2}e_{2}+e_{2}^{2}
S10S_{10} e1+e22e1e2\displaystyle e_{1}+e_{2}-2e_{1}e_{2} << 2e1+3e22e1212e1e26e22+12e12e2+24e1e22+4e2324e12e2216e1e23+16e12e23\displaystyle 2e_{1}+3e_{2}-2e_{1}^{2}-12e_{1}e_{2}-6e_{2}^{2}+12e_{1}^{2}e_{2}+24e_{1}e_{2}^{2}+4e_{2}^{3}-24e_{1}^{2}e_{2}^{2}-16e_{1}e_{2}^{3}+16e_{1}^{2}e_{2}^{3} e2e_{2} 3e26e22+4e233e_{2}-6e_{2}^{2}+4e_{2}^{3}
S11S_{11} 12\displaystyle\frac{1}{2} == 12\displaystyle\frac{1}{2} 12\displaystyle\frac{1}{2} 12\displaystyle\frac{1}{2}
S12S_{12} e1+e22e1e21+e12e1e2\displaystyle\frac{e_{1}+e_{2}-2e_{1}e_{2}}{1+e_{1}-2e_{1}e_{2}} << e1+2e24e1e23e22+6e1e22+2e234e1e231+e12e1e2\displaystyle\frac{e_{1}+2e_{2}-4e_{1}e_{2}-3e_{2}^{2}+6e_{1}e_{2}^{2}+2e_{2}^{3}-4e_{1}e_{2}^{3}}{1+e_{1}-2e_{1}e_{2}} e2e_{2} 2e23e22+2e232e_{2}-3e_{2}^{2}+2e_{2}^{3}
S13S_{13} 12\displaystyle\frac{1}{2} << 1e12e2+4e1e2+2e224e1e22\displaystyle 1-e_{1}-2e_{2}+4e_{1}e_{2}+2e_{2}^{2}-4e_{1}e_{2}^{2} 12\displaystyle\frac{1}{2} 12e2+2e221-2e_{2}+2e_{2}^{2}
S14S_{14} e21e1+2e1e2\displaystyle\frac{e_{2}}{1-e_{1}+2e_{1}e_{2}} << e2(22e13e2+6e1e2+2e224e1e22)1e1+2e1e2\displaystyle\frac{e_{2}(2-2e_{1}-3e_{2}+6e_{1}e_{2}+2e_{2}^{2}-4e_{1}e_{2}^{2})}{1-e_{1}+2e_{1}e_{2}} e2e_{2} 2e23e22+2e232e_{2}-3e_{2}^{2}+2e_{2}^{3}
S15S_{15} 1e1e2+2e1e22e12e2+2e1e2\displaystyle\frac{1-e_{1}-e_{2}+2e_{1}e_{2}}{2-e_{1}-2e_{2}+2e_{1}e_{2}} >> 1e12e2+4e1e2+3e226e1e222e23+4e1e232e12e2+2e1e2\displaystyle\frac{1-e_{1}-2e_{2}+4e_{1}e_{2}+3e_{2}^{2}-6e_{1}e_{2}^{2}-2e_{2}^{3}+4e_{1}e_{2}^{3}}{2-e_{1}-2e_{2}+2e_{1}e_{2}} 12\displaystyle\frac{1}{2} 1212e2+e22\displaystyle\frac{1}{2}-\frac{1}{2}e_{2}+e_{2}^{2}
S16S_{16} e2\displaystyle e_{2} == e2\displaystyle e_{2} e2e_{2} e2e_{2}
Table 3: Analytical solution of reputation structure under public assessment. Here, the equality (i.e., ==) and inequality (i.e., >> or <<) signs show the relations between p¯WW\bar{p}_{\mathrm{WW}} and p¯MW\bar{p}_{\mathrm{MW}} for all of 0e1<1/20\leq e_{1}<1/2 and 0<e2<1/20<e_{2}<1/2.

Based on Table 3, we can see how the reputation structure differs between the public and private reputation cases. The reputation structure for norms S03S_{03}(SS) and S07S_{07}(SJ) are illustrated in Fig. 3-D and E in the main manuscript, while that of S08S_{08}(SH) is in Fig. 3.

Refer to caption
FIG. S 3: Illustration of how the wild-type SH gives reputations to the self and mutant ALLB norms. In each panel, the horizontal and vertical axes indicate the goodness and its frequency, respectively. Positions and heights of bars are correct only up to order e22e_{2}^{2}. By comparing the upper panels with the lower ones, we can see that the reputation from SH differs significantly between the public and private reputation cases. In the private reputation case, SH still manages to distinguish the self norm with ALLB, but only with the difference of order of e22e_{2}^{2}.

S5 Numerical algorithm and error estimate

This section provides how to computationally calculate (31)-(34) and (35)-(38) with sufficient accuracy.

Instead of (31)-(34), we aim to compute

QW+1:=1,\displaystyle Q_{{\rm W}+1}:=1, (44)
QW+j:=h(μ+(j1),W)QW+(j1)(j=2,,),\displaystyle Q_{{\rm W}+j}:=h(\mu_{+(j-1),{\rm W}})Q_{{\rm W}+(j-1)}\quad(j=2,\cdots,\infty), (45)
QW1:=j=1(1h(μ+j,W))QW+j,\displaystyle Q_{{\rm W}-1}:=\sum_{j=1}^{\infty}(1-h(\mu_{+j,{\rm W}}))Q_{{\rm W}+j}, (46)
QWj:=(1h(μ(j1),W))QW(j1)(j=2,,),\displaystyle Q_{{\rm W}-j}:=(1-h(\mu_{-(j-1),{\rm W}}))Q_{{\rm W}-(j-1)}\quad(j=2,\cdots,\infty), (47)

(see Fig. 4 for the illustration of this computation). Via these equations, we obtain qWjq_{{\rm W}j} by rescaling QWjQ_{{\rm W}j} as

qWj=QWjk=±1±QWk,\displaystyle q_{{\rm W}j}=\frac{Q_{{\rm W}j}}{\sum_{k=\pm 1}^{\pm\infty}Q_{{\rm W}k}}, (48)

which satisfies (31)-(34). We should also obtain average goodnesses

p¯WA=j=±1±QWjμj,Aj=±1±QWj,\displaystyle\bar{p}_{{\rm W}A}=\frac{\sum_{j=\pm 1}^{\pm\infty}Q_{{\rm W}j}\mu_{j,A}}{\sum_{j=\pm 1}^{\pm\infty}Q_{{\rm W}j}}, (49)

in order to obtain Fig. 2.

In a practical computer simulation, we approximate (44)-(47) by

Q^W+1:=1,\displaystyle\hat{Q}_{{\rm W}+1}:=1, (50)
Q^W+j:=h(μ+(j1),W)Q^W+(j1)(j=2,,jmax),\displaystyle\hat{Q}_{{\rm W}+j}:=h(\mu_{+(j-1),{\rm W}})\hat{Q}_{{\rm W}+(j-1)}\quad(j=2,\cdots,j_{\max}), (51)
Q^W+j:=0(j=jmax+1,,),\displaystyle\hat{Q}_{{\rm W}+j}:=0\quad(j=j_{\max}+1,\cdots,\infty), (52)
Q^W1:=j=1(1h(μ+j,W))Q^W+j=j=1jmax(1h(μ+j,W))Q^W+j,\displaystyle\hat{Q}_{{\rm W}-1}:=\sum_{j=1}^{\infty}(1-h(\mu_{+j,{\rm W}}))\hat{Q}_{{\rm W}+j}=\sum_{j=1}^{j_{\max}}(1-h(\mu_{+j,{\rm W}}))\hat{Q}_{{\rm W}+j}, (53)
Q^Wj:=(1h(μ(j1),W))Q^W(j1)(j=2,,jmax),\displaystyle\hat{Q}_{{\rm W}-j}:=(1-h(\mu_{-(j-1),{\rm W}}))\hat{Q}_{{\rm W}-(j-1)}\quad(j=2,\cdots,j_{\max}), (54)
Q^Wj:=0(j=jmax+1,,),\displaystyle\hat{Q}_{{\rm W}-j}:=0\quad(j=j_{\max}+1,\cdots,\infty), (55)

with sufficient large jmax(=104)j_{\max}(=10^{4}) (see Fig. 4 for the illustration of this computation). We will show below that these computationally obtained Q^Wj\hat{Q}_{{\rm W}j} well approximate QWjQ_{{\rm W}j}. Note that in the following calculations we use the fact that

e2μj,A1e2\displaystyle e_{2}\leq\mu_{j,A}\leq 1-e_{2} (56)

holds for all j=±1,,±j=\pm 1,\cdots,\pm\infty and AA.

Refer to caption
FIG. S 4: An illustration of numerical algorithm and error estimation of the masses. The black and gray arrows show how theoretical calculations of (44)-(47) are performed, whereas only black arrows are relevant in the computation of (50)-(55). Each box shows the size of QWjQ_{{\rm W}j}. The gray part in each box shows the size of approximation error, QWjQ^WjQ_{{\rm W}j}-\hat{Q}_{{\rm W}j}. Apart from QWjQ_{{\rm W}j}, the area surrounded by dots show the calculation of QM+1Q_{{\rm M}+1}.

From the definition, we obtain

QW+jQ^W+j=0(j=1,,jmax).\displaystyle Q_{{\rm W}+j}-\hat{Q}_{{\rm W}+j}=0\quad(j=1,\cdots,j_{\max}). (57)

Then, we obtain

QW+j=QW+1k=1j1μ+k,W(1e2)j1,\displaystyle Q_{{\rm W}+j}=Q_{{\rm W}+1}\prod_{k=1}^{j-1}\mu_{+k,{\rm W}}\leq(1-e_{2})^{j-1}, (58)
j=jmax+1(QW+jQ^W+j)=j=jmax+1QW+jj=jmax+1(1e2)j1=1e2(1e2)jmax.\displaystyle\Rightarrow\sum_{j=j_{\max}+1}^{\infty}(Q_{{\rm W}+j}-\hat{Q}_{{\rm W}+j})=\sum_{j=j_{\max}+1}^{\infty}Q_{{\rm W}+j}\leq\sum_{j=j_{\max}+1}^{\infty}(1-e_{2})^{j-1}=\frac{1}{e_{2}}(1-e_{2})^{j_{\max}}. (59)

Then, we have

QW1=j=1QW+j(1μ+j,W)=j=1jmaxQW+j(1μ+j,W)=Q^W1+j=jmax+1QW+j(1μ+j,W)Q^W1+1e2(1e2)jmax,\displaystyle Q_{{\rm W}-1}=\sum_{j=1}^{\infty}Q_{{\rm W}+j}(1-\mu_{+j,{\rm W}})=\underbrace{\sum_{j=1}^{j_{\max}}Q_{{\rm W}+j}(1-\mu_{+j,{\rm W}})}_{=\hat{Q}_{{\rm W}-1}}+\sum_{j=j_{\max}+1}^{\infty}Q_{{\rm W}+j}(1-\mu_{+j,{\rm W}})\leq\hat{Q}_{{\rm W}-1}+\frac{1}{e_{2}}(1-e_{2})^{j_{\max}}, (60)
QWj=QW1k=1j1(1μk,W)=Q^W1k=1j1(1μk,W)=Q^Wj+(QW1Q^W1)k=1j1(1μk,W)Q^Wj+1e2(1e2)jmax+j1,\displaystyle\Rightarrow Q_{{\rm W}-j}=Q_{{\rm W}-1}\prod_{k=1}^{j-1}(1-\mu_{-k,{\rm W}})=\underbrace{\hat{Q}_{{\rm W}-1}\prod_{k=1}^{j-1}(1-\mu_{-k,{\rm W}})}_{=\hat{Q}_{{\rm W}-j}}+(Q_{{\rm W}-1}-\hat{Q}_{{\rm W}-1})\prod_{k=1}^{j-1}(1-\mu_{-k,{\rm W}})\leq\hat{Q}_{{\rm W}-j}+\frac{1}{e_{2}}(1-e_{2})^{j_{\max}+j-1}, (61)
j=1jmax(QWjQ^Wj)1e22(1e2)jmax,\displaystyle\Rightarrow\sum_{j=1}^{j_{\max}}(Q_{{\rm W}-j}-\hat{Q}_{{\rm W}-j})\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}, (62)

We also obtain

QW1=j=1QW+j(1μ+j,W)j=1QW+j1e2,\displaystyle Q_{{\rm W}-1}=\sum_{j=1}^{\infty}Q_{{\rm W}+j}(1-\mu_{+j,{\rm W}})\leq\sum_{j=1}^{\infty}Q_{{\rm W}+j}\leq\frac{1}{e_{2}}, (63)
QWj=QW1k=1j1(1μk,W)1e2(1e2)j1,\displaystyle\Rightarrow Q_{{\rm W}-j}=Q_{{\rm W}-1}\prod_{k=1}^{j-1}(1-\mu_{-k,{\rm W}})\leq\frac{1}{e_{2}}(1-e_{2})^{j-1}, (64)
j=jmax+1(QWjQ^Wj)=j=jmax+1QWjj=jmax+11e2(1e2)j1=1e22(1e2)jmax.\displaystyle\Rightarrow\sum_{j=j_{\max}+1}^{\infty}(Q_{{\rm W}-j}-\hat{Q}_{{\rm W}-j})=\sum_{j=j_{\max}+1}^{\infty}Q_{{\rm W}-j}\leq\sum_{j=j_{\max}+1}^{\infty}\frac{1}{e_{2}}(1-e_{2})^{j-1}=\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}. (65)

From the above error estimations, we can obtain upper and lower bounds of (48) and (49) as

Q^Wjj=±1±jmaxQ^Wj+3e22(1e2)jmaxqWjQ^Wj+1e2(1e2)jmaxj=±1±jmaxQ^Wj.\displaystyle\frac{\hat{Q}_{{\rm W}j}}{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}+\frac{3}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}\leq q_{{\rm W}j}\leq\frac{\hat{Q}_{{\rm W}j}+\frac{1}{e_{2}}(1-e_{2})^{j_{\max}}}{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}}. (66)
j=±1±jmaxQ^Wjμj,Aj=±1±jmaxQ^Wj+3e22(1e2)jmaxp¯WAj=±1±jmaxQ^Wjμj,A+3e22(1e2)jmaxj=±1±jmaxQ^Wj.\displaystyle\frac{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}\mu_{j,A}}{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}+\frac{3}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}\leq\bar{p}_{{\rm W}A}\leq\frac{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}\mu_{j,A}+\frac{3}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}}. (67)

Here, we used

Q^WjQWj\displaystyle\hat{Q}_{{\rm W}j}\leq Q_{{\rm W}j} =Q^Wj+(QWjQ^Wj)\displaystyle=\hat{Q}_{{\rm W}j}+(Q_{{\rm W}j}-\hat{Q}_{{\rm W}j}) (68)
Q^Wj+maxj(QWjQ^Wj)=QW1Q^W11e2(1e2)jmaxQ^Wj+1e2(1e2)jmax,\displaystyle\leq\hat{Q}_{{\rm W}j}+\underbrace{\max_{j}(Q_{{\rm W}j}-\hat{Q}_{{\rm W}j})}_{=Q_{{\rm W}-1}-\hat{Q}_{{\rm W}-1}\leq\frac{1}{e_{2}}(1-e_{2})^{j_{\max}}}\leq\hat{Q}_{{\rm W}j}+\frac{1}{e_{2}}(1-e_{2})^{j_{\max}}, (69)
j=±1±jmaxQ^Wjj=±1±QWj\displaystyle\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}\leq\sum_{j=\pm 1}^{\pm\infty}Q_{{\rm W}j} =j=±1±jmaxQ^Wj+j=±1±(QWjQ^Wj)\displaystyle=\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}+\sum_{j=\pm 1}^{\pm\infty}(Q_{{\rm W}j}-\hat{Q}_{{\rm W}j}) (70)
=j=±1±jmaxQ^Wj+j=1jmax+1(QWjQ^Wj)1e22(1e2)jmax+j=jmax+1(QW+jQ^W+j)1e2(1e2)jmax+j=jmax+1(QWjQ^Wj)1e22(1e2)jmax\displaystyle=\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}+\underbrace{\sum_{j=1}^{j_{\max}+1}(Q_{{\rm W}j}-\hat{Q}_{{\rm W}-j})}_{\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}+\underbrace{\sum_{j=j_{\max}+1}^{\infty}(Q_{{\rm W}+j}-\hat{Q}_{{\rm W}+j})}_{\leq\frac{1}{e_{2}}(1-e_{2})^{j_{\max}}}+\underbrace{\sum_{j=j_{\max}+1}^{\infty}(Q_{{\rm W}-j}-\hat{Q}_{{\rm W}-j})}_{\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}} (71)
j=±1±jmaxQ^Wj+3e22(1e2)jmax,\displaystyle\leq\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}+\frac{3}{e_{2}^{2}}(1-e_{2})^{j_{\max}}, (72)
j=±1±jmaxQ^Wjμj,Aj=±1±QWjμj,A\displaystyle\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}\mu_{j,A}\leq\sum_{j=\pm 1}^{\pm\infty}Q_{{\rm W}j}\mu_{j,A} j=±1±jmaxQ^Wjμj,A+j=±1±(QWjQ^Wj)\displaystyle\leq\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}\mu_{j,A}+\sum_{j=\pm 1}^{\pm\infty}(Q_{{\rm W}j}-\hat{Q}_{{\rm W}j}) (73)
j=±1±jmaxQ^Wjμj,A+3e22(1e2)jmax.\displaystyle\leq\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm W}j}\mu_{j,A}+\frac{3}{e_{2}^{2}}(1-e_{2})^{j_{\max}}. (74)

In the same way, let us consider (35)-(38) and compute

QM+1:=j=1h(μj,M)QWj,\displaystyle Q_{{\rm M}+1}:=\sum_{j=1}^{\infty}h(\mu_{-j,{\rm M}})Q_{{\rm W}-j}, (75)
QM+j:=h(μ+(j1),M)QW+(j1)(j=2,,),\displaystyle Q_{{\rm M}+j}:=h(\mu_{+(j-1),{\rm M}})Q_{{\rm W}+(j-1)}\quad(j=2,\cdots,\infty), (76)
QM1:=j=1(1h(μ+j,M))QW+j,\displaystyle Q_{{\rm M}-1}:=\sum_{j=1}^{\infty}(1-h(\mu_{+j,{\rm M}}))Q_{{\rm W}+j}, (77)
QMj:=(1h(μ(j1),M))QW(j1)(j=2,,).\displaystyle Q_{{\rm M}-j}:=(1-h(\mu_{-(j-1),{\rm M}}))Q_{{\rm W}-(j-1)}\quad(j=2,\cdots,\infty). (78)

Via these equations, we obtain qWjq_{{\rm W}j} by rescaling QMjQ_{{\rm M}j} as

qMj=QMjk=±1±QMk,\displaystyle q_{{\rm M}j}=\frac{Q_{{\rm M}j}}{\sum_{k=\pm 1}^{\pm\infty}Q_{{\rm M}k}}, (79)

which satisfies (35)-(38). We also need to obtain average goodnesses

p¯MA=j=±1±QMjμj,Aj=±1±QMj,\displaystyle\bar{p}_{{\rm M}A}=\frac{\sum_{j=\pm 1}^{\pm\infty}Q_{{\rm M}j}\mu_{j,A}}{\sum_{j=\pm 1}^{\pm\infty}Q_{{\rm M}j}}, (80)

in order to obtain Fig. 2.

In a practical computer simulation, we approximate (75)-(78) by

Q^M+1:=j=1h(μj,M)Q^Wj=j=1jmaxh(μj,M)Q^Wj,\displaystyle\hat{Q}_{{\rm M}+1}:=\sum_{j=1}^{\infty}h(\mu_{-j,{\rm M}})\hat{Q}_{{\rm W}-j}=\sum_{j=1}^{j_{\max}}h(\mu_{-j,{\rm M}})\hat{Q}_{{\rm W}-j}, (81)
Q^M+j:=h(μ+(j1),M)Q^W+(j1)(j=2,,jmax),\displaystyle\hat{Q}_{{\rm M}+j}:=h(\mu_{+(j-1),{\rm M}})\hat{Q}_{{\rm W}+(j-1)}\quad(j=2,\cdots,j_{\max}), (82)
Q^M+j:=0(j=jmax+1,,),\displaystyle\hat{Q}_{{\rm M}+j}:=0\quad(j=j_{\max}+1,\cdots,\infty), (83)
Q^M1:=j=1(1h(μ+j,M))Q^W+j=j=1jmax(1h(μ+j,M))Q^W+j,\displaystyle\hat{Q}_{{\rm M}-1}:=\sum_{j=1}^{\infty}(1-h(\mu_{+j,{\rm M}}))\hat{Q}_{{\rm W}+j}=\sum_{j=1}^{j_{\max}}(1-h(\mu_{+j,{\rm M}}))\hat{Q}_{{\rm W}+j}, (84)
Q^Mj:=(1h(μ(j1),M))Q^W(j1)(j=2,,jmax),\displaystyle\hat{Q}_{{\rm M}-j}:=(1-h(\mu_{-(j-1),{\rm M}}))\hat{Q}_{{\rm W}-(j-1)}\quad(j=2,\cdots,j_{\max}), (85)
Q^Mj:=0(j=jmax+1,,),\displaystyle\hat{Q}_{{\rm M}-j}:=0\quad(j=j_{\max}+1,\cdots,\infty), (86)

with sufficient large jmax(=104)j_{\max}(=10^{4}).

By exactly similar calculations, we obtain

QM+jQ^M+j=0(j=2,,jmax),\displaystyle Q_{{\rm M}+j}-\hat{Q}_{{\rm M}+j}=0\quad(j=2,\cdots,j_{\max}), (87)
j=jmax+1(QM+jQ^M+j)1e2(1e2)jmax,\displaystyle\sum_{j=j_{\max+1}}^{\infty}(Q_{{\rm M}+j}-\hat{Q}_{{\rm M}+j})\leq\frac{1}{e_{2}}(1-e_{2})^{j_{\max}}, (88)
j=1jmax(QMjQ^Mj)1e22(1e2)jmax,\displaystyle\sum_{j=1}^{j_{\max}}(Q_{{\rm M}-j}-\hat{Q}_{{\rm M}-j})\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}, (89)
j=jmax+1(QMjQ^Mj)1e22(1e2)jmax.\displaystyle\sum_{j=j_{\max+1}}^{\infty}(Q_{{\rm M}-j}-\hat{Q}_{{\rm M}-j})\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}. (90)

The difference from QWjQ_{{\rm W}j} exists only in j=+1j=+1, as

QM+1\displaystyle Q_{{\rm M}+1} =j=1QWjμj,M=j=1jmaxQ^Wjμj,M=q^M+1+j=1jmax(QWjQ^Wj)μj,M1e22(1e2)jmax+j=jmax+1Q^Wjμj,M1e22(1e2)jmax\displaystyle=\sum_{j=1}^{\infty}Q_{{\rm W}-j}\mu_{-j,{\rm M}}=\underbrace{\sum_{j=1}^{j_{\max}}\hat{Q}_{{\rm W}-j}\mu_{-j,{\rm M}}}_{=\hat{q}_{{\rm M}+1}}+\underbrace{\sum_{j=1}^{j_{\max}}(Q_{{\rm W}-j}-\hat{Q}_{{\rm W}-j})\mu_{-j,{\rm M}}}_{\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}+\underbrace{\sum_{j=j_{\max}+1}^{\infty}\hat{Q}_{{\rm W}-j}\mu_{-j,{\rm M}}}_{\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}} (91)
Q^M+1+2e22(1e2)jmax,\displaystyle\leq\hat{Q}_{{\rm M}+1}+\frac{2}{e_{2}^{2}}(1-e_{2})^{j_{\max}}, (92)

(see the area surrounded by dots in Fig. 4 for the illustration of this computation).

From the above error estimations, we can obtain upper and lower bounds of (79) and (80) as

Q^Mjj=±1±jmaxQ^Mj+5e22(1e2)jmaxqMjQ^Mj+2e22(1e2)jmaxj=±1±jmaxQ^Mj,\displaystyle\frac{\hat{Q}_{{\rm M}j}}{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}+\frac{5}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}\leq q_{{\rm M}j}\leq\frac{\hat{Q}_{{\rm M}j}+\frac{2}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}}, (93)
j=±1±jmaxQ^Mjμj,Aj=±1±jmaxQ^Mj+5e22(1e2)jmaxp¯MAj=±1±jmaxQ^Mjμj,A+5e22(1e2)jmaxj=±1±jmaxQ^Mj.\displaystyle\frac{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}\mu_{j,A}}{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}+\frac{5}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}\leq\bar{p}_{{\rm M}A}\leq\frac{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}\mu_{j,A}+\frac{5}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}{\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}}. (94)

Here, we used

Q^MjQMj\displaystyle\hat{Q}_{{\rm M}j}\leq Q_{{\rm M}j} =Q^Mj+(QMjQ^Mj)\displaystyle=\hat{Q}_{{\rm M}j}+(Q_{{\rm M}j}-\hat{Q}_{{\rm M}j}) (95)
Q^Mj+maxj(QMjQ^Mj)=QM+1Q^M+11e22(1e2)jmaxQ^Mj+1e22(1e2)jmax,\displaystyle\leq\hat{Q}_{{\rm M}j}+\underbrace{\max_{j}(Q_{{\rm M}j}-\hat{Q}_{{\rm M}j})}_{=Q_{{\rm M}+1}-\hat{Q}_{{\rm M}+1}\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}\leq\hat{Q}_{{\rm M}j}+\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}, (96)
j=±1±jmaxQ^Mjj=±1±QMj\displaystyle\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}\leq\sum_{j=\pm 1}^{\pm\infty}Q_{{\rm M}j} =j=±1±jmaxQ^Mj+(QM+1Q^M+1)2e22(1e2)jmax+j=1jmax(QMjQ^Mj)1e22(1e2)jmax\displaystyle=\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}+\underbrace{(Q_{{\rm M}+1}-\hat{Q}_{{\rm M}+1})}_{\leq\frac{2}{e_{2}^{2}}(1-e_{2})^{j_{\max}}}+\underbrace{\sum_{j=1}^{j_{\max}}(Q_{{\rm M}-j}-\hat{Q}_{{\rm M}-j})}_{\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}} (97)
+j=jmax+1(QM+jQ^M+j)1e2(1e2)jmax+j=jmax+1(QMjQ^Mj)1e22(1e2)jmax\displaystyle\quad+\underbrace{\sum_{j=j_{\max}+1}^{\infty}(Q_{{\rm M}+j}-\hat{Q}_{{\rm M}+j})}_{\leq\frac{1}{e_{2}}(1-e_{2})^{j_{\max}}}+\underbrace{\sum_{j=j_{\max}+1}^{\infty}(Q_{{\rm M}-j}-\hat{Q}_{{\rm M}-j})}_{\leq\frac{1}{e_{2}^{2}}(1-e_{2})^{j_{\max}}} (98)
j=±1±jmaxQ^Mj+5e22(1e2)jmax,\displaystyle\leq\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}+\frac{5}{e_{2}^{2}}(1-e_{2})^{j_{\max}}, (99)
j=±1±jmaxQ^Mjμj,Aj=±1±QMjμj,A\displaystyle\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}\mu_{j,A}\leq\sum_{j=\pm 1}^{\pm\infty}Q_{{\rm M}j}\mu_{j,A} j=±1±jmaxQ^Mjμj,A+j=±1±(QMjQ^Mj)\displaystyle\leq\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}\mu_{j,A}+\sum_{j=\pm 1}^{\pm\infty}(Q_{{\rm M}j}-\hat{Q}_{{\rm M}j}) (100)
j=±1±jmaxQ^Mjμj,A+5e22(1e2)jmax.\displaystyle\leq\sum_{j=\pm 1}^{\pm j_{\max}}\hat{Q}_{{\rm M}j}\mu_{j,A}+\frac{5}{e_{2}^{2}}(1-e_{2})^{j_{\max}}. (101)