Skip to main content

Complexity of Conformant Election Manipulation

  • Conference paper
  • First Online:
Fundamentals of Computation Theory (FCT 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14292))

Included in the following conference series:

Abstract

It is important to study how strategic agents can affect the outcome of an election. There has been a long line of research in the computational study of elections on the complexity of manipulative actions such as manipulation and bribery. These problems model scenarios such as voters casting strategic votes and agents campaigning for voters to change their votes to make a desired candidate win. A common assumption is that the preferences of the voters follow the structure of a domain restriction such as single peakedness, and so manipulators only consider votes that also satisfy this restriction. We introduce the model where the preferences of the voters define their own restriction and strategic actions must “conform” by using only these votes. In this model, the election after manipulation will retain common domain restrictions. We explore the computational complexity of conformant manipulative actions and we discuss how conformant manipulative actions relate to other manipulative actions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    We will see that this rule exhibits very unusual complexity behavior. This rule has also been referred to as “best-worst” in social choice (see, e.g., [24]).

  2. 2.

    Exact Perfect Bipartite Matching [30] is defined in Sect. 3.3. As mentioned there the complexity of this problem is still open. And so Theorem 5 is a trichotomy theorem unless we solve a 40-year-old open problem.

References

  1. Bartholdi, J., Tovey, C., Trick, M.: The computational difficulty of manipulating an election. Soc. Choice Welfare 6(3), 227–241 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  2. Bartholdi, J., Tovey, C., Trick, M.: How hard is it to control an election? Math. Comput. Model. 16(8/9), 27–40 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  3. Baumeister, D., Roos, M., Rothe, J., Schend, L., Xia, L.: The possible winner problem with uncertain weights. In: Proceedings of the 20th European Conference on Artificial Intelligence, pp. 133–138 (2012)

    Google Scholar 

  4. Betzler, N., Dorn, B.: Towards a dichotomy of finding possible winners in elections based on scoring rules. J. Comput. Syst. Sci. 76(8), 812–836 (2010)

    Article  MATH  Google Scholar 

  5. Betzler, N., Niedermeier, R., Woeginger, G.: Unweighted coalitional manipulation under the Borda rule is NP-hard. In: Proceedings of the 22nd International Joint Conference on Artificial Intelligence, pp. 55–60 (2011)

    Google Scholar 

  6. Black, D.: On the rationale of group decision-making. J. Polit. Econ. 56(1), 23–34 (1948)

    Article  Google Scholar 

  7. Brelsford, E., Faliszewski, P., Hemaspaandra, E., Schnoor, H., Schnoor, I.: Approximability of manipulating elections. In: Proceedings of the 23rd National Conference on Artificial Intelligence, pp. 44–49 (2008)

    Google Scholar 

  8. Conitzer, V., Sandholm, T., Lang, J.: When are elections with few candidates hard to manipulate? J. ACM 54(3), 1–33 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  9. Davies, J., Katsirelos, G., Narodytska, N., Walsh, T., Xia, L.: Complexity of and algorithms for the manipulation of Borda, Nanson’s and Baldwin’s voting rules. Artif. Intell. 217, 20–42 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  10. Dey, P., Misra, N., Narahari, Y.: Frugal bribery in voting. Theor. Comput. Sci. 676, 15–32 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  11. Edmonds, J.: Maximum matching and a polyhedron with 0,1-vertices. J. Res. National Bureau Standards–B. Math. Math. Phys. 69B(1/2), 125–130 (1965)

    Google Scholar 

  12. Edmonds, J., Johnson, E.: Matching: a well-solved class of integer linear programs. In: Combinatorial Structures and Their Applications (Gordon and Breach), pp. 89–92 (1970)

    Google Scholar 

  13. Erdélyi, G., Neveling, M., Reger, C., Rothe, J., Yang, Y., Zorn, R.: Towards completing the puzzle: complexity of control by replacing, adding, and deleting candidates or voters. Auton. Agent. Multi-Agent Syst. 35(41), 1–48 (2021)

    Google Scholar 

  14. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.: How hard is bribery in elections? J. Artif. Intell. Res. 35, 485–532 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  15. Faliszewski, P., Rothe, J.: Control and bribery in voting. In: Handbook of Computational Social Choice, pp. 146–168. Cambridge University Press (2016)

    Google Scholar 

  16. Fitzsimmons, Z., Hemaspaandra, E.: Insight into voting problem complexity using randomized classes. In: Proceedings of the 31st International Joint Conference on Artificial Intelligence, pp. 293–299 (2022)

    Google Scholar 

  17. Fitzsimmons, Z., Hemaspaandra, E.: Complexity of conformant election manipulation. Tech. Rep. arXiv:2307.11689 [cs.GT], arXiv.org (2023)

  18. Fitzsimmons, Z., Hemaspaandra, E.: Using weighted matching to solve 2-approval/veto control and bribery. In: Proceedings of the 26th European Conference on Artificial Intelligence (2023), to appear

    Google Scholar 

  19. Garey, M., Johnson, D.: Computers and Intractability: a guide to the theory of NP-completeness. W. H, Freeman and Company (1979)

    Google Scholar 

  20. Gerards, A.: Matching. In: M.B. et al., (ed.) Handbooks in OR and MS Vol. 7, chap. 3, pp. 135–224. Cambridge University Press (1995)

    Google Scholar 

  21. Hemaspaandra, E., Hemaspaandra, L., Schnoor, H.: A control dichotomy for pure scoring rules. In: Proceedings of the 28th AAAI Conference on Artificial Intelligence, pp. 712–720 (2014)

    Google Scholar 

  22. Hemaspaandra, E., Schnoor, H.: Dichotomy for pure scoring rules under manipulative electoral actions. In: Proceedings of the 22nd European Conference on Artificial Intelligence, pp. 1071–1079 (2016)

    Google Scholar 

  23. Karp, R.: Reducibility among combinatorial problems. In: Proceedings of Symposium on Complexity of Computer Computations, pp. 85–103 (1972)

    Google Scholar 

  24. Kurihara, T.: Axiomatic characterisations of the basic best-worst rule. Econ. Lett. 172, 19–22 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  25. Lin, A.: The complexity of manipulating \(k\)-approval elections. In: Proceedings of the 3rd International Conference on Agents and Artificial Intelligence, pp. 212–218 (2011)

    Google Scholar 

  26. Loreggia, A., Narodytska, N., Rossi, F., Venable, K., Walsh, T.: Controlling elections by replacing candidates or votes. In: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems, pp. 1737–1738 (2015)

    Google Scholar 

  27. Mirrlees, J.: An exploration in the theory of optimum income taxation. Rev. Econ. Stud. 38(2), 175–208 (1971)

    Article  MATH  Google Scholar 

  28. Mulmuley, K., Vazirani, U., Vazirani, V.: Matching is as easy as matrix inversion. Combinatorica 7(1), 105–113 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  29. Neveling, M., Rothe, J., Weishaupt, R.: The possible winner problem with uncertain weights revisited. In: Proceedings of the 23rd International Symposium on Fundamentals of Computation Theory, pp. 399–412 (2021)

    Google Scholar 

  30. Papadimitriou, C., Yannakakis, M.: The complexity of restricted spanning tree problems. J. ACM 29(2), 285–309 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  31. Tutte, W.: A short proof of the factor theorem for finite graphs. Can. J. Math. 6, 347–352 (1954)

    Article  MathSciNet  MATH  Google Scholar 

  32. Walsh, T.: Uncertainty in preference elicitation and aggregation. In: Proceedings of the 22nd National Conference on Artificial Intelligence, pp. 3–8 (2007)

    Google Scholar 

  33. Xia, L.: Computing the margin of victory for various voting rules. In: Proceedings of the 12th ACM Conference on Electronic Commerce, pp. 982–999 (2012)

    Google Scholar 

  34. Yang, Y., Shrestha, Y., Guo, J.: On the complexity of bribery with distance restrictions. Theor. Comput. Sci. 760, 55–71 (2019)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by grant NSF-DUE-1819546. We thank the anonymous reviewers for their helpful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zack Fitzsimmons .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fitzsimmons, Z., Hemaspaandra, E. (2023). Complexity of Conformant Election Manipulation. In: Fernau, H., Jansen, K. (eds) Fundamentals of Computation Theory. FCT 2023. Lecture Notes in Computer Science, vol 14292. Springer, Cham. https://doi.org/10.1007/978-3-031-43587-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-43587-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-43586-7

  • Online ISBN: 978-3-031-43587-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy