Single transferable vote resists strategic voting

We give evidence that Single Tranferable Vote (STV) is computationally resistant to manipulation: It is NP-complete to determine whether there exists a (possibly insincere) preference that will elect a favored candiate, even in an election for a single seat. Thus strategic voting under STV is qualitatively more difficult than under other commonly-used voting schemes. Furthermore, this resistance to manipulation is inherent to STV and does not depend on hopeful extraneous assumptions like the presumed difficulty of learning the preferences of the other voters. We also prove that it is NP-complete to recognize when an STV election violates monotonicity. This suggests that non-monotonicity in STV elections might be perceived as less threatening since it is in effect “hidden” and hard to exploit for strategic advantage.

[1]  H. Moulin Condorcet's principle implies the no show paradox , 1988 .

[2]  D. Saari Susceptibility to manipulation , 1990 .

[3]  H. Moulin Axioms of Cooperative Decision Making , 1988 .

[4]  Peter C. Fishburn,et al.  Monotonicity paradoxes in the theory of elections , 1982, Discret. Appl. Math..

[5]  Ron Holzman,et al.  To vote or not to vote: What is the quota? , 1989, Discret. Appl. Math..

[6]  David Austen-Smith,et al.  Monotonicity in Electoral Systems , 1991, American Political Science Review.

[7]  John R. Chamberlin An investigation into the relative manipulability of four voting systems , 1985 .

[8]  Peter C. Fishburn,et al.  Paradoxes of Preferential Voting , 1983 .

[9]  M. Trick,et al.  The computational difficulty of manipulating an election , 1989 .

[10]  Craig A. Tovey,et al.  Recognizing majority-rule equilibrium in spatial voting games , 1991 .

[11]  Eitan Muller,et al.  The equivalence of strong positive association and strategy-proofness , 1977 .

[12]  P. Fishburn,et al.  Voting Procedures , 2022 .

[13]  Hannu Nurmi Probability models in constitutional choice , 1990 .

[14]  Shmuel Nitzan,et al.  The vulnerability of point-voting schemes to preference variation and strategic manipulation , 1985 .

[15]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[16]  Gideon Doron,et al.  Single Transferrable Vote: An Example of a Perverse Social Choice Function , 1977 .

[17]  P. Gärdenfors Manipulation of social choice functions , 1976 .

[18]  Steven J. Brams,et al.  The AMS Nomination Procedure Is Vulnerable to ‘Truncation of Preferences’ , 1982 .

[19]  T. Saijo,et al.  On constant maskin monotonic social choice functions , 1987 .

[20]  J. Mill Considerations on Representative Government , 1861 .

[21]  M. Trick,et al.  Voting schemes for which it can be difficult to tell who won the election , 1989 .

[22]  I. D. Hill,et al.  Algorithm Supplement: Single Transferable Vote by Meek's Method , 1987 .

[23]  A. Gibbard Manipulation of Voting Schemes: A General Result , 1973 .

[24]  Peter C. Fishburn,et al.  Alternative Voting Systems , 1991 .

[25]  M. Satterthwaite Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions , 1975 .