A Complexity-of-Strategic-Behavior Comparison between Schulze's Rule and Ranked Pairs

Schulze's rule and ranked pairs are two Condorcet methods that both satisfy many natural axiomatic properties. Schulze's rule is used in the elections of many organizations, including the Wikimedia Foundation, the Pirate Party of Sweden and Germany, the Debian project, and the Gento Project. Both rules are immune to control by cloning alternatives, but little is otherwise known about their strategic robustness, including resistance to manipulation by one or more voters, control by adding or deleting alternatives, adding or deleting votes, and bribery. Considering computational barriers, we show that these types of strategic behavior are NP-hard for ranked pairs (both constructive, in making an alternative a winner, and destructive, in precluding an alternative from being a winner). Schulze's rule, in comparison, remains vulnerable at least to constructive manipulation by a single voter and destructive manipulation by a coalition. As the first such polynomialtime rule known to resist all such manipulations, and considering also the broad axiomatic support, ranked pairs seems worthwhile to consider for practical applications.

[1]  Jörg Rothe,et al.  Sincere-Strategy Preference-Based Approval Voting Broadly Resists Control , 2008, MFCS.

[2]  K. Arrow A Difficulty in the Concept of Social Welfare , 1950, Journal of Political Economy.

[3]  Michael A. Trick,et al.  How hard is it to control an election? Math , 1992 .

[4]  Jörg Rothe,et al.  Anyone but him: The complexity of precluding an alternative , 2005, Artif. Intell..

[5]  Piotr Faliszewski,et al.  Multimode Control Attacks on Elections , 2009, IJCAI.

[6]  David Cary,et al.  Estimating the Margin of Victory for Instant-Runoff Voting , 2011, EVT/WOTE.

[7]  A. Gibbard Manipulation of Voting Schemes: A General Result , 1973 .

[8]  Piotr Faliszewski,et al.  How Hard Is Bribery in Elections? , 2006, J. Artif. Intell. Res..

[9]  Toby Walsh,et al.  Complexity of and algorithms for the manipulation of Borda, Nanson's and Baldwin's voting rules , 2014, Artif. Intell..

[10]  Toby Walsh,et al.  How Hard Is It to Control an Election by Breaking Ties? , 2013, ECAI.

[11]  T. Tideman,et al.  Independence of clones as a criterion for voting rules , 1987 .

[12]  John J. Bartholdi,et al.  Single transferable vote resists strategic voting , 2015 .

[13]  Piotr Faliszewski,et al.  AI's War on Manipulation: Are We Winning? , 2010, AI Mag..

[14]  Vincent Conitzer,et al.  Using Mechanism Design to Prevent False-Name Manipulations , 2010, AI Mag..

[15]  Markus Schulze,et al.  A new monotonic, clone-independent, reversal symmetric, and condorcet-consistent single-winner election method , 2011, Soc. Choice Welf..

[16]  Ariel D. Procaccia,et al.  Complexity of unweighted coalitional manipulation under some common voting rules , 2009, IJCAI 2009.

[17]  Piotr Faliszewski,et al.  Using complexity to protect elections , 2010, Commun. ACM.

[18]  David C. Mcgarvey A THEOREMI ON THE CONSTRUCTION OF VOTING PARADOXES , 1953 .

[19]  Ronald L. Rivest,et al.  Computing the Margin of Victory in IRV Elections , 2011, EVT/WOTE.

[20]  Jörg Rothe,et al.  Challenges to complexity shields that are supposed to protect elections against manipulation and control: a survey , 2013, Annals of Mathematics and Artificial Intelligence.

[21]  Lirong Xia,et al.  Computing the margin of victory for various voting rules , 2012, EC '12.

[22]  M. Satterthwaite Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .

[23]  Vincent Conitzer,et al.  Generalized scoring rules and the frequency of coalitional manipulability , 2008, EC '08.

[24]  Piotr Faliszewski,et al.  Llull and Copeland Voting Computationally Resist Bribery and Constructive Control , 2009, J. Artif. Intell. Res..