skip to main content
research-article
Free Access

Using complexity to protect elections

Published:01 November 2010Publication History
Skip Abstract Section

Abstract

Computational complexity may truly be the shield against election manipulation.

References

  1. Ajtai, M. Worst-case complexity, average-case complexity and lattice problems. Documenta Mathematica, Extra Volume ICM III (1998), 421--428.Google ScholarGoogle Scholar
  2. Bartholdi, III, J. and Orlin, J. Single transferable vote resists strategic voting. Social Choice and Welfare 8, 4 (1991) 341--354.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bartholdi, III, J., Tovey, C. and Trick, M. The computational difficulty of manipulating an election. Social Choice and Welfare 6, 3 (1989) 227--241.Google ScholarGoogle ScholarCross RefCross Ref
  4. Bartholdi, III, J., Tovey, C. and Trick, M. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare 6, 2 (1989) 157--165.Google ScholarGoogle ScholarCross RefCross Ref
  5. Bartholdi, III, J., Tovey, C. and Trick, M. How hard is it to control an election? Mathematical and Computer Modeling 16, 8/9 (1992), 27--40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Betzler, N., Fellows, M., Guo, J., Niedermeier, R. and Rosamond, F. Fixed-parameter algorithms for Kemeny scores. In Proceedings of the 4th International Conference on Algorithmic Aspects in Information and Management. Lecture Notes in Computer Science #5034 (June 2008). Springer-Verlag, 60--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Betzler, N., Guo, J., Niedermeier, R. Parameterized computational complexity of Dodgson and Young elections. In Proceedings of the 11th Scandinavian Workshop on Algorithm Theory. Lecture Notes in Computer Science #5124 (July 2008). Springer-Verlag, 402--413. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Brelsford, E., Faliszewski, P., Hemaspaandra, E., Schnoor, H., and Schnoor, I. Approximability of manipulating elections. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence (July 2008). AAAI Press, 44--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Caragiannis, I., Covey, J., Feldman, M., Homan, C. Kaklamanis, C., Karanikolas, N., Procaccia, A. and Rosenschein, J. On the approximability of Dodgson and Young elections. In Proceedings of the 20th Annual ACM-SIAM Symposium on Discrete Algorithms (Jan. 2009). Society for Industrial and Applied Mathematics, 1058--1067. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chevaleyre, Y., Endriss, U., Lang, J. and Maudet, N. A short introduction to computational social choice. In Proceedings of the 33rd International Conference on Current Trends in Theory and Practice of Computer Science. Lecture Notes in Computer Science #4362 (Jan. 2007). Springer-Verlag, 51--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Christian, R., Fellows, M., Rosamond, F. and Slinko, A. On complexity of lobbying in multiple referenda. Review of Economic Design 11, 3 (2007), 217--224.Google ScholarGoogle ScholarCross RefCross Ref
  12. Conitzer, V., Davenport, A. and Kalagnanam, J. Improved bounds for computing Kemeny rankings. In Proceedings of the 21st National Conference on Artificial Intelligence (July 2006). AAAI Press, 620--626. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Conitzer, V., and Sandholm, T. Universal voting protocol tweaks to make manipulation hard. In Proceedings of the 18th International Joint Conference on Artificial Intelligence (Aug. 2003). Morgan Kaufmann, 781--788. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Conitzer, V. and Sandholm, T. Nonexistence of voting rules that are usually hard to manipulate. In Proceedings of the 21st National Conference on Artificial Intelligence (July 2006). AAAI Press, 627--634. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Conitzer, V., Sandholm, T. and Lang, J. When are elections with few candidates hard to manipulate? Journal of the ACM 54, 3 (2007), Article 14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Dobzinski, S. and Procaccia, A. Frequent manipulability of elections: The case of two voters. In Proceedings of the 4th International Workshop on Internet and Network Economics. (Dec. 2008). Springer-Verlag Lecture Notes in Computer Science #5385, 653--664 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Duggan, J. and Schwartz, T. Strategic manipulability without resoluteness or shared beliefs: Gibbard--Satterthwaite generalized. Social Choice and Welfare 17, 1 (2000), 85--93Google ScholarGoogle ScholarCross RefCross Ref
  18. Dwork, C., Kumar, R., Naor, M. and Sivakumar, D. Rank aggregation methods for the Web. In Proceedings of the 10th International World Wide Web Conference (Mar. 2001). ACM Press, NY, 613--622. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Elkind, E. and Lipmaa, H. Hybrid voting protocols and hardness of manipulation. In Proceedings of the 16th Annual International Symposium on Algorithms and Computation (Dec. 2005). Springer-Verlag Lecture Notes in Computer Science #3872, 206--215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ephrati, E. and Rosenschein, J. A heuristic technique for multi-agent planning. Annals of Mathematics and Artificial Intelligence 20, 1--4 (1997), 13--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Erdélyi, G., Hemaspaandra, L., Rothe, J. and Spakowski, H. Generalized juntas and NP-hard sets. Theoretical Computer Science 410, 38--40 (2009), 3995--4000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Erdélyi, G., Nowak, M. and Rothe, J. Sincere-strategy preference-based approval voting fully resists constructive control and broadly resists destructive control. Mathematical Logic Quarterly 55, 4 (2009), 425--443.Google ScholarGoogle ScholarCross RefCross Ref
  23. Faliszewski, P. Nonuniform bribery (short paper). In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (May 2008), 1569--1572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Faliszewski, P., Hemaspaandra, E. and Hemaspaandra, L. How hard is bribery in elections? Journal of Artificial Intelligence Research 35 (2009), 485--532. Google ScholarGoogle ScholarCross RefCross Ref
  25. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. Llull and Copeland voting computationally resist bribery and constructive control. Journal of Artificial Intelligence Research 35 (2009), 275--341. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. A richer understanding of the complexity of election systems. In Fundamental Problems in Computing: Essays in Honor of Professor Daniel J. Rosenkrantz. S. Ravi and S. Shukla, eds. Springer, 2009, 375--406.Google ScholarGoogle Scholar
  27. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. In Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge (July 2009). ACM Digital Library, 118--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Friedgut, E., Kalai, G. and Nisan, N. Elections can be manipulated often. In Proceedings of the 49th IEEE Symposium on Foundations of Computer Science (Oct. 2008). IEEE Computer Society, 243--249. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Hemaspaandra, E., Hemaspaandra, L. Dichotomy for voting systems. Journal of Computer and System Sciences 73, 1 (2007), 73--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP. Journal of the ACM 44, 6 (1997), 806--825. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. Anyone but him: The complexity of precluding an alternative. Artificial Intelligence 171, 5--6 (2007), 255--285. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Hemaspaandra, E., Hemaspaandra, L. and Rothe, J. Hybrid elections broaden complexity-theoretic resistance to control. Mathematical Logic Quarterly 55, 4 (2009), 397--424.Google ScholarGoogle ScholarCross RefCross Ref
  33. Hemaspaandra, E., Spakowski, H. and Vogel, J. The complexity of Kemeny elections. Theoretical Computer Science 349, 3 (2005), 382--391. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Hemaspaandra, L. and Zimand, M. Strong self-reducibility precludes strong immunity. Mathematical Systems Theory 29, 5 (1996), 535--548.Google ScholarGoogle ScholarCross RefCross Ref
  35. Homan, C. and Hemaspaandra, L. Guarantees for the success frequency of an algorithm for finding Dodgson-election winners. Journal of Heuristics 15, 4 (2009), 403--423. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Kenyon-Mathieu, C. and Schudy, W. How to rank with few errors. In Proceedings of the 39th ACM Symposium on Theory of Computing (June 2007). ACM Press, 95--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Levin, L. Average case complete problems. SIAM Journal of Computing 15, 1 (1986), 285--286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Li, M. and Vitányi, P. Average case complexity under the universal distribution equals worst-case complexity. Information Processing Letters 42, 3 (1992), 145--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. McCabe-Dansted, J., Pritchard, G. and Slinko, A. Approximability of Dodgson's rule. Social Choice and Welfare 31, 2 (2008), 311--330.Google ScholarGoogle ScholarCross RefCross Ref
  40. Meir, R., Procaccia, A., Rosenschein, J. and Zohar, A. The complexity of strategic behavior in multi-winner elections. Journal of Artificial Intelligence Research 33 (2008), 149--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Pennock, D., Horvitz, E. and Giles, C. Social choice theory and recommender systems: Analysis of the axiomatic foundations of collaborative filtering. In Proceedings of the 17th National Conference on Artificial Intelligence (July/Aug. 2000). AAAI Press, 729--734. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Procaccia, A. and Rosenschein, J. Junta distributions and the average-case complexity of manipulating elections. Journal of Artificial Intelligence Research 28 (2007), 157--181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Rothe, J., Spakowski, H. and Vogel, J. Exact complexity of the winner problem for Young elections. Theory of Computing Systems 36, 4 (2003), 375--386.Google ScholarGoogle ScholarCross RefCross Ref
  44. Schöning, U. Complete sets and closeness to complexity classes. Mathematical Systems Theory 19, 1 (1986), 29--42.Google ScholarGoogle ScholarCross RefCross Ref
  45. Simon, H. The Sciences of the Artificial. MIT Press, 1969. Third edition, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Walsh, T. Uncertainty in preference elicitation and aggregation. In Proceedings of the 22nd AAAI Conference on Artificial Intelligence (July 2007), AAAI Press, 3--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Xia, L. and Conitzer, V. Generalized scoring rules and the frequency of coalitional manipulability. In Proceedings of the 9th ACM Conference on Electronic Commerce (July 2008). ACM Press, NY, 109--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Xia, L. and Conitzer, V. A sufficient condition for voting rules to be frequently manipulable. In Proceedings of the 9th ACM Conference on Electronic Commerce (July 2008). ACM Press, NY, 99--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Zuckerman, M. Procaccia, A. and Rosenschein, J. Algorithms for the coalitional manipulation problem. Artificial Intelligence 173, 2 (2009), 392--412. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Using complexity to protect elections

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image Communications of the ACM
                  Communications of the ACM  Volume 53, Issue 11
                  November 2010
                  112 pages
                  ISSN:0001-0782
                  EISSN:1557-7317
                  DOI:10.1145/1839676
                  Issue’s Table of Contents

                  Copyright © 2010 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 November 2010

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article
                  • Popular
                  • Refereed

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                HTML Format

                View this article in HTML Format .

                View HTML Format