Multimode Control Attacks on Elections

In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections--attempts to improve the election outcome by such actions as adding/deleting candidates or voters. That work has led to many results on how algorithms can be used to find attacks on elections and how complexity-theoretic hardness results can be used as shields against attacks. However, all the work in this line has assumed that the attacker employs just a single type of attack. In this paper, we model and study the case in which the attacker launches a multipronged (i.e., multimode) attack. We do so to more realistically capture the richness of reallife settings. For example, an attacker might simultaneously try to suppress some voters, attract new voters into the election, and introduce a spoiler candidate. Our model provides a unified framework for such varied attacks, and by constructing polynomial-time multiprong attack algorithms we prove that for various election systems even such concerted, flexible attacks can be perfectly planned in deterministic polynomial time.

[1]  David Eppstein,et al.  Simultaneous strong separations of probabilistic and unambiguous complexity classes , 1992, Mathematical systems theory.

[2]  Piotr Faliszewski,et al.  Using complexity to protect elections , 2010, Commun. ACM.

[3]  Hong Liu,et al.  Parameterized complexity of control problems in Maximin election , 2010, Inf. Process. Lett..

[4]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[5]  Lane A. Hemaspaandra,et al.  Lower bounds and the hardness of counting properties , 2004, Theor. Comput. Sci..

[6]  Kenneth Kunen,et al.  On the Structure and Complexity of Infinite Sets with Minimal Perfect Hash Functions , 1991, FSTTCS.

[7]  Lane A. Hemaspaandra,et al.  Guarantees for the success frequency of an algorithm for finding Dodgson-election winners , 2009, J. Heuristics.

[8]  Mohammed J. Zaki,et al.  The Complexity of Finding Top-Toda-Equivalence-Class Members , 2004, Theory of Computing Systems.

[9]  Lane A. Hemaspaandra,et al.  A Note on Linear-Nondeterminism, Linear-Sized, Karp-Lipton Advice for the P-Selective Sets , 1998, J. Univers. Comput. Sci..

[10]  Noam Nisan,et al.  Elections Can be Manipulated Often , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[11]  Lane A. Hemaspaandra Teaching Computational Complexity: Resources to Treasure , 1994, SIGA.

[12]  Piotr Faliszewski,et al.  The shield that never was: societies with single-peaked preferences are more open to manipulation and control , 2009, TARK '09.

[13]  Lane A. Hemachandra Algorithms from complexity theory: polynomial-time operations for complex sets , 1990 .

[14]  Rüdiger Reischuk,et al.  Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science , 1996 .

[15]  Lane A. Hemaspaandra,et al.  Rice-Style Theorems for Complexity Theory , 2001 .

[16]  Rolf Niedermeier,et al.  Invitation to Fixed-Parameter Algorithms , 2006 .

[17]  Paul G. Spirakis,et al.  Proceedings of the 28th International Colloquium on Automata, Languages and Programming, , 2001 .

[18]  Piotr Faliszewski,et al.  Llull and Copeland Voting Computationally Resist Bribery and Constructive Control , 2009, J. Artif. Intell. Res..

[19]  Costas S. Iliopoulos,et al.  Symposium on Theoretical Aspects of Computer Science , 2008 .

[20]  Ariel D. Procaccia,et al.  Socially desirable approximations for Dodgson's voting rule , 2010, EC '10.

[21]  Lane A. Hemaspaandra,et al.  On Sets with Efficient Implicit Membership Tests , 1991, SIAM J. Comput..

[22]  Jörg Rothe,et al.  Powers-of-Two Acceptance Suffices for Equivalence and Bounded Ambiguity Problems , 1996, Electron. Colloquium Comput. Complex..

[23]  Lane A. Hemaspaandra,et al.  Guarantees for the success frequency of an algorithm for finding Dodgson-election winners , 2005, J. Heuristics.

[24]  Mogens Nielsen,et al.  Proceedings of the 25th International Symposium on Mathematical Foundations of Computer Science , 2000 .

[25]  Piotr Faliszewski,et al.  The complexity of manipulative attacks in nearly single-peaked electorates , 2011, TARK XIII.

[26]  Jörg Rothe,et al.  A second step towards complexity-theoretic analogs of Rice's Theorem , 2000, Theor. Comput. Sci..

[27]  D. Wallace,et al.  Some Properties of a Probabilistic Model for Global Wiring , 1981, 18th Design Automation Conference.

[28]  Yann Chevaleyre,et al.  Possible Winners when New Candidates Are Added: The Case of Scoring Rules , 2010, AAAI.

[29]  Juris Hartmanis,et al.  On Sparse Oracles Separating Feasible Complexity Classes , 1988, Inf. Process. Lett..

[30]  Jörg Rothe,et al.  Hybrid Elections Broaden Complexity‐Theoretic Resistance to Control , 2006, IJCAI.

[31]  Giorgio Ausiello,et al.  Proceedings of the 16th International Colloquium on Automata, Languages and Programming , 1989 .

[32]  Lane A. Hemaspaandra,et al.  Optimal Series-Parallel Trade-offs for Reducing a Function to Its Own Graph , 2002, Inf. Comput..

[33]  Piotr Faliszewski,et al.  Open questions in the theory of semifeasible computation , 2006, SIGA.

[34]  Lane A. Hemaspaandra,et al.  Optimal Separations for Parallel versus Sequential Self-Checking: Parallelism Can Exponentially Incr , 1998 .

[35]  Cristian S. Calude,et al.  Journal of Universal Computer Science , 1994, J. Univers. Comput. Sci..

[36]  M. Trick,et al.  Voting schemes for which it can be difficult to tell who won the election , 1989 .

[37]  Piotr Faliszewski,et al.  Copeland voting: ties matter , 2008, AAMAS.

[38]  Rolf Niedermeier,et al.  A logic for causal reasoning , 2003, IJCAI 2003.

[39]  Jörg Rothe,et al.  Creating Strong, Total, Commutative, Associative One-Way Functions from Any One-Way Function in Complexity Theory , 1999, J. Comput. Syst. Sci..

[40]  Jörg Rothe,et al.  Exact analysis of Dodgson elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP , 1997, JACM.

[41]  Lane A. Hemaspaandra,et al.  SIGACT news complexity theory column 61 , 2008, SIGA.

[42]  Piotr Faliszewski,et al.  The Complexity of Bribery in Elections , 2006, AAAI.

[43]  Nadja Betzler,et al.  Parameterized complexity of candidate control in elections and related digraph problems , 2008, Theor. Comput. Sci..

[44]  Piotr Faliszewski,et al.  How Hard Is Bribery in Elections? , 2006, J. Artif. Intell. Res..

[45]  Ildikó Schlotter,et al.  Multivariate Complexity Analysis of Swap Bribery , 2010, Algorithmica.

[46]  Friedrich Pukelsheim,et al.  The electoral writings of Ramon Llull , 2001 .

[47]  Sanjay Jain,et al.  On the Limitations of Locally Robust Positive Reductions , 1989, FSTTCS.

[48]  Russell Bent,et al.  On Bounded-Weight Error-Correcting Codes , 1999, ArXiv.

[49]  Jörg Rothe,et al.  On Approximating Optimal Weighted Lobbying, and Frequency of Correctness Versus Average-Case Polynomial Time , 2007, FCT.

[50]  Patrice Enjalbert,et al.  Proceedings of the 11th Annual Symposium on Theoretical Aspects of Computer Science , 1994 .

[51]  Michael A. Trick,et al.  How hard is it to control an election? Math , 1992 .

[52]  L. A. Hemaspaandra,et al.  Computational Aspects of Approval Voting , 2010 .

[53]  Heribert Vollmer,et al.  The satanic notations , 1995, SIGACT News.

[54]  Jin-Yi Cai,et al.  On the Power of Parity Polynomial Time , 1989, STACS.

[55]  Gabriel Ciobanu,et al.  Proceedings of the 12th International Symposium on Fundamentals of Computation Theory , 1999 .

[56]  Piotr Faliszewski,et al.  Llull and Copeland Voting Broadly Resist Bribery and Control , 2007, AAAI.

[57]  Ariel D. Procaccia,et al.  Complexity of Strategic Behavior in Multi-Winner Elections , 2008, J. Artif. Intell. Res..

[58]  Ariel D. Procaccia,et al.  Junta distributions and the average-case complexity of manipulating elections , 2006, AAMAS '06.

[59]  Edith Hemaspaandra,et al.  The complexity of Kemeny elections , 2005, Theor. Comput. Sci..

[60]  Lane A. Hemaspaandra,et al.  Space-efficient recognition of sparse self-reducible languages , 2005, computational complexity.

[61]  Lane A. Hemaspaandra,et al.  A note on relativizing complexity classes with tally , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.

[62]  Jörg Rothe,et al.  One-way functions in worst-case cryptography: algebraic and security properties are on the house , 1999, SIGA.

[63]  S. Shapiro,et al.  Mathematics without Numbers , 1993 .

[64]  Gábor Erdélyi,et al.  Control Complexity in Fallback Voting , 2010, CATS.

[65]  Vincent Conitzer,et al.  Generalized scoring rules and the frequency of coalitional manipulability , 2008, EC '08.

[66]  Hong Liu,et al.  Parameterized computational complexity of control problems in voting systems , 2009, Theor. Comput. Sci..

[67]  Edith Hemaspaandra,et al.  Query Order in the Polynomial Hierarchy , 1997, FCT.

[68]  Vincent Conitzer,et al.  A sufficient condition for voting rules to be frequently manipulable , 2008, EC '08.

[69]  Jörg Rothe,et al.  Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete Sets , 1997, SIAM J. Comput..

[70]  Uwe Schöning,et al.  Complete sets and closeness to complexity classes , 1986, Mathematical systems theory.

[71]  Geoffrey Pritchard,et al.  Approximability of Dodgson’s rule , 2008, Soc. Choice Welf..

[72]  Jörg Rothe,et al.  Sincere‐Strategy Preference‐Based Approval Voting Fully Resists Constructive Control and Broadly Resists Destructive Control , 2008, Math. Log. Q..

[73]  Pierpaolo Degano,et al.  Proceedings of 6th Italian Conference on Theoretical Computer Science , 1998 .

[74]  J. van Leeuwen,et al.  Theoretical Computer Science , 2003, Lecture Notes in Computer Science.

[75]  D. Black The theory of committees and elections , 1959 .

[76]  Edith Hemaspaandra,et al.  RSN1-tt(NP) Distinguishes Robust Many-One and Turing Completeness , 1998, Theory of Computing Systems.

[77]  Rolf Niedermeier,et al.  Parameterized computational complexity of Dodgson and Young elections , 2010, Inf. Comput..

[78]  Edith Hemaspaandra,et al.  Dichotomy for voting systems , 2005, J. Comput. Syst. Sci..

[79]  Jörg Rothe,et al.  Bucklin Voting is Broadly Resistant to Control , 2010, ArXiv.

[80]  Nadja Betzler,et al.  Towards a Dichotomy of Finding Possible Winners in Elections Based on Scoring Rules , 2009, MFCS.

[81]  Rusins Freivalds Proceedings of the 13th International Symposium on Fundamentals of Computation Theory , 2001 .

[82]  Guy Kindler,et al.  The Geometry of Manipulation: A Quantitative Proof of the Gibbard-Satterthwaite Theorem , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[83]  Juris Hartmanis,et al.  One-Way Functions and the Nonisomorphism of NP-Complete Sets , 1991, Theor. Comput. Sci..

[84]  Ariel D. Procaccia,et al.  Complexity of unweighted coalitional manipulation under some common voting rules , 2009, IJCAI 2009.

[85]  Lane A. Hemaspaandra,et al.  Computation with Absolutely No Space Overhead , 2003, Developments in Language Theory.

[86]  Lane A. Hemaspaandra,et al.  P-immune sets with holes lack self-reducibility properties , 2003, Theor. Comput. Sci..

[87]  Piotr Faliszewski,et al.  Manipulation of copeland elections , 2010, AAMAS.

[88]  Poland ÃLódź,et al.  International Journal of Foundations of Computer Science c ○ World Scientific Publishing Company EFFICIENT ALGORITHMS FOR (δ, γ, α) AND , 2008 .

[89]  Jörg Rothe,et al.  Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory , 2005, ICTCS.

[90]  Lane A. Hemaspaandra,et al.  A moment of perfect clarity I: the parallel census technique , 2000, SIGA.

[91]  Lane A. Hemaspaandra,et al.  Almost-Everywhere Superiority for Quantum Polynomial-Time Languages , 2002 .

[92]  L. Hemachandra,et al.  On Relativization and the Existence of Turing Complete Sets , 1989 .

[93]  Juris Hartmanis,et al.  Complexity Classes without Machines: On Complete Languages for UP , 1986, Theor. Comput. Sci..

[94]  John J. Bartholdi,et al.  Single transferable vote resists strategic voting , 2015 .

[95]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[96]  Kenneth H. Rosen Handbook of Discrete and Combinatorial Mathematics, Second Edition , 2010 .

[97]  Piotr Faliszewski,et al.  On distance rationalizability of some voting rules , 2009, TARK '09.

[98]  Felix Brandt,et al.  Some Remarks on Dodgson's Voting Rule , 2009, Math. Log. Q..

[99]  Piotr Faliszewski,et al.  Cloning in Elections , 2010, AAAI.

[100]  Edith Hemaspaandra,et al.  Extending Downward Collapse from 1-versus-2 Queries to j-versus-j+1 Queries , 1999, STACS.

[101]  Vincent Conitzer,et al.  When are elections with few candidates hard to manipulate? , 2007, J. ACM.

[102]  Thomas Lengauer,et al.  Proceedings of the 7th Annual Symposium on Theoretical Aspects of Computer Science , 1990 .

[103]  Piotr Faliszewski,et al.  Advice for semifeasible sets and the complexity-theoretic cost(lessness) of algebraic properties , 2004, Int. J. Found. Comput. Sci..

[104]  Howard Straubing,et al.  Theory of Computing Systems , 2008 .

[105]  Lane A. Hemaspaandra Structure of Complexity Classes: Separations, Collapses, and Completeness , 1988, International Symposium on Mathematical Foundations of Computer Science.

[106]  Edith Hemaspaandra,et al.  Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates , 2010, AAAI.

[107]  Piotr Faliszewski,et al.  Copeland Voting Fully Resists Constructive Control , 2007, AAIM.

[108]  Jin-Yi Cai,et al.  Exact Counting is as Easy as Approximate Counting , 1986 .

[109]  Lane A. Hemaspaandra,et al.  On Checking Versus Evaluation of Multiple Queries , 1990, Inf. Comput..

[110]  M. Trick,et al.  The computational difficulty of manipulating an election , 1989 .

[111]  Juris Hartmanis,et al.  On the Structure of Solutions of Computable Real Functions , 1988 .

[112]  Lane A. Hemaspaandra,et al.  Separating Complexity Classes With Tally Oracles , 1992, Theor. Comput. Sci..

[113]  H. Young,et al.  A Consistent Extension of Condorcet’s Election Principle , 1978 .

[114]  Ariel D. Procaccia,et al.  Frequent Manipulability of Elections: The Case of Two Voters , 2008, WINE.

[115]  Werner Kuich,et al.  Proceedings of the 19th International Colloquium on Automata, Languages and Programming , 1992 .

[116]  Hannu Nurmi,et al.  Closeness Counts in Social Choice , 2008 .

[117]  Edith Hemaspaandra,et al.  Almost-Everywhere Superiority for Quantum Polynomial Time , 2002, Inf. Comput..

[118]  Lane A. Hemaspaandra,et al.  Using Inductive Counting to Simulate Nondeterministic Computation , 1990, MFCS.

[119]  Ding-Zhu Du,et al.  Proceedings of the 5th International Symposium on Algorithms and Computation , 1994 .

[120]  Vincent Conitzer,et al.  Nonexistence of Voting Rules That Are Usually Hard to Manipulate , 2006, AAAI.

[121]  Dan Suciu,et al.  Journal of the ACM , 2006 .

[122]  Piotr Faliszewski,et al.  On the role of distances in defining voting rules , 2010, AAMAS.

[123]  Edith Hemaspaandra,et al.  What's up with downward collapse: using the easy-hard technique to link Boolean and polynomial hierarchy collapses , 1998, SIGA.

[124]  Hendrik W. Lenstra,et al.  Integer Programming with a Fixed Number of Variables , 1983, Math. Oper. Res..

[125]  Andrzej Lingas,et al.  Proceedings of the 20th International Colloquium on Automata, Languages and Programming , 1993 .

[126]  Jörg Rothe,et al.  A Second Step Towards Circuit Complexity-Theoretic Analogs of Rice's Theorem , 1998, MFCS.

[127]  Rudolf Fleischer,et al.  Proceedings of the 4th international conference on Algorithmic Aspects in Information and Management , 2008 .

[128]  Ian McLean,et al.  Voting in the Medieval Papacy and Religious Orders , 2007, MDAI.

[129]  Jörg Rothe,et al.  Anyone but him: The complexity of precluding an alternative , 2005, Artif. Intell..

[130]  Jin-Yi Cai,et al.  Promise Problems and Access to Unambiguous Computation , 1992, MFCS.

[131]  Lane A. Hemaspaandra,et al.  Algebraic Properties for Selector Functions , 2004, SIAM J. Comput..

[132]  Lane A. Hemaspaandra,et al.  Reductions to Sets of Low Information Content , 1992, Complexity Theory: Current Research.

[133]  Edith Hemaspaandra,et al.  Using the No-Search Easy-Hard Technique for Downward Collapse , 2001, ArXiv.

[134]  Christian Glaßer,et al.  A moment of perfect clarity II: consequences of sparse sets hard for NP with respect to weak reductions , 2000, SIGA.

[135]  Jörg Rothe,et al.  Sincere-Strategy Preference-Based Approval Voting Broadly Resists Control , 2008, MFCS.

[136]  Piotr Faliszewski,et al.  Good Rationalizations of Voting Rules , 2010, AAAI.

[137]  Manfred J. Holler,et al.  Power, freedom, and voting , 2008 .

[138]  Kam-Wing Ng,et al.  Proceedings of the 4th International Symposium on Algorithms and Computation , 1993 .

[139]  Ariel D. Procaccia,et al.  Algorithms for the coalitional manipulation problem , 2008, SODA '08.

[140]  Arnold B. Urken,et al.  Classics of social choice , 1995 .

[141]  Lane A. Hemaspaandra,et al.  Witness-Isomorphic Reductions and the Local Search Problem (Extended Abstract) , 1995, MFCS.

[142]  Lane A. Hemaspaandra,et al.  Complexity-Theoretic Analogs of Rice''s Theorem , 1997 .

[143]  Lane A. Hemaspaandra,et al.  Computing Solutions Uniquely Collapses the Polynomial Hierarchy , 1994, SIAM J. Comput..

[144]  Donald G. Saari,et al.  A geometric examination of Kemeny's rule , 2000, Soc. Choice Welf..

[145]  Salil P. Vadhan,et al.  Computational Complexity , 2005, Encyclopedia of Cryptography and Security.

[146]  Tibor Gyimóthy,et al.  Proceedings of the 37th international conference on Current trends in theory and practice of computer science , 2011 .

[147]  Lane A. Hemaspaandra,et al.  Reducing the Number of Solutions of NP Functions , 2002, J. Comput. Syst. Sci..