Control Complexity in Fallback Voting

We study the control complexity of fallback voting. Like manipulation and bribery, electoral control describes ways of changing the outcome of an election; unlike manipulation or bribery attempts, control actions---such as adding/deleting/partitioning either candidates or voters---modify the participative structure of an election. Computational complexity can be used to protect elections from control attempts, i.e., proving an election system resistant to some type of control shows that the success of the corresponding control action, though not impossible, is computationally prohibitive. We show that fallback voting, an election system combining approval with majority voting (Brams & Sanver 2009), is resistant to each of the 14 common types of candidate control, and also to three types of voter control. The only election systems previously known to be fully resistant to candidate control are plurality (Bartholdi III et al. 1992, Hemaspaandra et al. 2007) and sincere-strategy preference-based approval voting (SP-AV) (Erdelyi et al. 2009). However, plurality has fewer resistances to voter control than fallback voting, and SP-AV (as modified by Erdelyi et al. (2009)) is arguably less natural a system than fallback voting.

[1]  Jörg Rothe,et al.  Hybrid Elections Broaden Complexity‐Theoretic Resistance to Control , 2006, IJCAI.

[2]  Douglas Muzzio,et al.  APPROVAL VOTING , 1983 .

[3]  M. Trick,et al.  The computational difficulty of manipulating an election , 1989 .

[4]  Salil P. Vadhan,et al.  Computational Complexity , 2005, Encyclopedia of Cryptography and Security.

[5]  Moni Naor,et al.  Rank aggregation methods for the Web , 2001, WWW '01.

[6]  Piotr Faliszewski,et al.  Llull and Copeland Voting Computationally Resist Bribery and Constructive Control , 2009, J. Artif. Intell. Res..

[7]  P. Fishburn,et al.  Voting Procedures , 2022 .

[8]  Vincent Conitzer,et al.  When are elections with few candidates hard to manipulate? , 2007, J. ACM.

[9]  Piotr Faliszewski,et al.  The Complexity of Bribery in Elections , 2006, AAAI.

[10]  Steven J. Brams,et al.  APPROVAL VOTING IN MULTICANDIDATE ELECTIONS , 1980 .

[11]  L. A. Hemaspaandra,et al.  Computational Aspects of Approval Voting , 2010 .

[12]  John J. Bartholdi,et al.  Single transferable vote resists strategic voting , 2015 .

[13]  Steven J. Brams,et al.  Critical Strategies Under Approval Voting: Who Gets Ruled In And Ruled Out , 2006 .

[14]  Jörg Rothe,et al.  Sincere‐Strategy Preference‐Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control , 2008, Math. Log. Q..

[15]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[16]  Jörg Rothe,et al.  Anyone but him: The complexity of precluding an alternative , 2005, Artif. Intell..

[17]  Edith Hemaspaandra,et al.  Dichotomy for voting systems , 2005, J. Comput. Syst. Sci..

[18]  Sandip Sen,et al.  Voting for movies: the anatomy of a recommender system , 1999, AGENTS '99.

[19]  Piotr Faliszewski,et al.  The shield that never was: societies with single-peaked preferences are more open to manipulation and control , 2009, TARK '09.

[20]  Ronald Fagin,et al.  Efficient similarity search and classification via rank aggregation , 2003, SIGMOD '03.

[21]  Scott Aaronson,et al.  Complexity Theory and Cryptology : An Introduction to Cryptocomplexity , 2007 .

[22]  Piotr Faliszewski,et al.  How Hard Is Bribery in Elections? , 2006, J. Artif. Intell. Res..

[23]  Eithan Ephrati,et al.  Multi-Agent Planning as a Dynamic Search for Social Consensus , 1993, IJCAI.

[24]  Peter C. Fishburn,et al.  Chapter 4 Voting procedures , 2002 .

[25]  Steven J. Brams,et al.  Voting Systems that Combine Approval and Preference , 2009, The Mathematics of Preference, Choice and Order.