Junta distributions and the average-case complexity of manipulating elections

Encouraging voters to truthfully reveal their preferences in an election has long been an important issue. Previous studies have shown that some voting protocols are hard to manipulate, but predictably used NP-hardness as the complexity measure. Such a worst-case analysis may be an insufficient guarantee of resistance to manipulation.Indeed, we demonstrate that NP-hard manipulations may be tractable in the average-case. For this purpose, we augment the existing theory of average-case complexity with new concepts; we consider elections distributed with respect to junta distributions, which concentrate on hard instances, and introduce a notion of heuristic polynomial time. We use our techniques to prove that a family of important voting protocols is susceptible to manipulation by coalitions, when the number of candidates is constant.

[1]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[2]  Vincent Conitzer,et al.  Nonexistence of Voting Rules That Are Usually Hard to Manipulate , 2006, AAAI.

[3]  M. Satterthwaite Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .

[4]  Inon Zuckerman,et al.  Universal Voting Protocol Tweaks to Make Manipulation Hard , 2003, IJCAI.

[5]  Noga Alon,et al.  The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.

[6]  M. Trick,et al.  The computational difficulty of manipulating an election , 1989 .

[7]  Ariel D. Procaccia,et al.  Multi-Winner Elections: Complexity of Manipulation, Control and Winner-Determination , 2007, IJCAI.

[8]  Vincent Conitzer,et al.  How many candidates are needed to make elections hard to manipulate? , 2003, TARK '03.

[9]  Vincent Conitzer,et al.  Complexity of manipulating elections with few candidates , 2002, AAAI/IAAI.

[10]  E. Ephrati A Heuristic Technique for Multiagent PlanningEithan , 1997 .

[11]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[12]  Luca Trevisan,et al.  Lecture Notes on Computational Complexity , 2004 .

[13]  Edith Elkind,et al.  Small Coalitions Cannot Manipulate Voting , 2005, Financial Cryptography.

[14]  Edith Hemaspaandra,et al.  Dichotomy for voting systems , 2005, J. Comput. Syst. Sci..

[15]  Michael A. Trick,et al.  How hard is it to control an election? Math , 1992 .

[16]  Jeffrey S. Rosenschein,et al.  Achieving Allocatively-Efficient and Strongly Budget-Balanced Mechanisms in the Network Flow Domain for Bounded-Rational Agents , 2005, IJCAI.

[17]  M. Trick,et al.  Voting schemes for which it can be difficult to tell who won the election , 1989 .

[18]  John J. Bartholdi,et al.  Single transferable vote resists strategic voting , 2015 .

[19]  Edith Elkind,et al.  Hybrid Voting Protocols and Hardness of Manipulation , 2005, ISAAC.

[20]  Sandip Sen,et al.  An automated meeting scheduling system that utilizes user preferences , 1997, AGENTS '97.

[21]  Sandip Sen,et al.  Voting for movies: the anatomy of a recommender system , 1999, AGENTS '99.