Skip to main content
Log in

Control in the presence of manipulators: cooperative and competitive cases

  • Published:
Autonomous Agents and Multi-Agent Systems Aims and scope Submit manuscript

A Correction to this article was published on 12 October 2020

This article has been updated

Abstract

Control and manipulation are two of the most studied types of attacks on elections. In this paper, we study the complexity of control attacks on elections in which there are manipulators. We study both the case where the “chair” who is seeking to control the election is allied with the manipulators, and the case where the manipulators seek to thwart the chair. In the latter case, we see that the order of play substantially influences the complexity. We prove upper bounds, holding over every election system with a polynomial-time winner problem, for all standard control cases, and some of these bounds are at the second or third level of the polynomial hierarchy, and we provide matching lower bounds to prove these tight. Nonetheless, for important natural systems the complexity can be much lower. We prove that for approval and plurality elections, the complexity of even competitive clashes between a controller and manipulators falls far below those high bounds, even as low as polynomial time. Yet for a Borda-voting case we show that such clashes raise the complexity unless NP = coNP.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Change history

  • 12 October 2020

    Unfortunately, a post-galley copyediting error altered the contents of cells in the Condorcet Elections columns of the table in Footnote 7.

Notes

  1. Work by Hemaspaandra, Hemaspaandra, and Menton has shown that in the nonunique winner model some of the seemingly different standard control problems in fact are identical, as to when the given type of control can be successfully accomplished. In particular, Hemaspaandra et al. [40] have proven that for each election system \(\mathcal E\), and for each given election (CV) and each candidate \(p \in C\), p can be made a nonwinner by partitioning of candidates in the TE model (respectively, the TP model) if and only if p can be made a nonwinner by runoff partitioning of candidates in the TE model (respectively, the TP model) [40].

  2. In a slight abuse of notation, we here are using the W in \((C,(V \cup W)-V')\) to denote the votes that W—which came in as a collection of blank slates—was as assigned by the quantification in the just-prior statement. The same holds also in the next two parts of this definition.

  3. To be clear, we now give in full the definitions of \(\mathcal {E}\hbox {-}\,\text {DCDV}\,\hbox {-}\,\text {CF}\)-ManipulatorFocus and \(\mathcal {E}\hbox {-}\,\text {DCDV}\,\hbox {-}\,\text {MF}\)-ManipulatorFocus (in particular, in the nonunique-winner model that is the model of this paper). In each case, the definition is what one would naturally expect, namely, for the given problem and for the given ordering of the chair and the manipulators, the definitions are capturing whether the manipulators can assure that the candidate p can be made, or blocked from being, a winner.

    Name::

    \(\mathcal E\)-CCDV-CF\(\hbox {-ManipulatorFocus}\)/\(\mathcal E\)-CCDV-MF\(\hbox {-ManipulatorFocus}\)

    Given::

    An election \((C,V \cup W)\) (where V and W denote the nonmanipulative and manipulative voters respectively), a preferred candidate \(p \in C\), and a delete limit \(k \in { \mathbb {N} }\).

    Question (CF-ManipulatorFocus)::

    Does it hold that for each subcollection \(V' \subseteq (V \cup W)\) satisfying \(\Vert V'\Vert \le k\), there exists a way for the manipulators to set their votes such that p is a winner of \((C,(V \cup W)-V')\) under election system \(\mathcal E\)?

    Question (MF-ManipulatorFocus)::

    Does there exists a way that the manipulators can set their votes so that for each subcollection \(V' \subseteq (V \cup W)\) satisfying that \(\Vert V'\Vert \le k\), it holds that p is a winner of \((C,(V \cup W)-V')\) under election system \(\mathcal E\)?

  4. The third-level case has to overcome the specific, and as far as we know new, worry that in the second round, the first-round vote of the manipulators is no longer available. Yet in a “\(\forall \exists \forall \)” context (which is the quantifier structure that models \(\mathrm{coNP}^{\mathrm{NP}^\mathrm{NP}}\)), a particular existential choice has to handle only a particular value of the first \(\forall \). So to make the construction work, we need to in some sense have the first-round votes, which are no longer available, still cast a clear and usable shadow forward into the second round, at least in certain cases in the image of the reduction. We achieve this, in particular by shaping the election system itself carefully to help realize this unusual effect. Otherwise, we would not be capturing the right quantifier structure.

  5. We are using here the fact that a boolean formula can in a straightforward way be represented as a string and encoded in the name of candidate \(c_0\).

  6. We set \(k = 2\ell \) instead of the obvious choice of \(\ell \) since then the same proof can be used for the similar cases that appear in the technical report [33], and this also nicely handles the case of “control by unlimited adding of candidates.”

  7. So that the reader has it easily at hand while viewing Theorem 4.5, we include here the central content of that table (each of whose results is from Bartholdi et al. [3] or Hemaspaandra et al. [42]):

     

    Plurality

    Condorcet

    Approval

    Control by

    Constr.

    Destr.

    Constr.

    Destr.

    Constr.

    Destr.

    Adding candidates

    NPC

    NPC

    P

    P

    P

    P

    Deleting candidates

    NPC

    NPC

    P

    P

    P

    P

    Adding voters

    P

    P

    NPC

    P

    NPC

    P

    Deleting voters

    P

    P

    NPC

    P

    NPC

    P

    Partitioning candidates

    TE: NPC

    TE: NPC

    TE: P

    TE: P

    TE: P

    TE: P

     

    TP: NPC

    TP: NPC

    TP: P

    TP: P

    TP: P

    TP: P

    Runoff partitioning candidates

    TE: NPC

    TE: NPC

    TE: P

    TE: P

    TE: P

    TE: P

     

    TP: NPC

    TP: NPC

    TP: P

    TP: P

    TP: P

    TP: P

    Partitioning voters

    TE: P

    TE: P

    TE: NPC

    TE: P

    TE: NPC

    TE: P

     

    TP: NPC

    TP: NPC

    TP: NPC

    TP: P

    TP: NPC

    TP: P

    We mention that our theorem’s claim holds despite the fact that this table of [42] is about the unique-winner case, and despite the fact that the AC/Adding Candidates case of the table refers to so-called unlimited adding and (as is now standard) we use AC/Adding Candidates to refer to (limited) adding.

  8. We here and in many other places write the somewhat strange, awkward phrase “a unique winner” rather than the seemingly more natural phrase “the unique winner.” We do so to avoid giving the impression that there necessarily is a unique winner—as opposed for example to perhaps having no winners or perhaps having multiple winners.

    We mention in passing that WARP itself is very closely connected to immunity to destructive control by deleting candidates (DCDC); in particular, they are the same. To see this, we need to discuss a notion from the literature: immunity. An election system is said to be immune to destructive control by deleting candidates if for every election instance (CV) and every candidate \(c \in C\) it holds that: If c is a winner in that election instance, then for every candidate set \(C'\) satisfying \(\{c\} \subseteq C' \subseteq C\) it holds that c is a winner in the election with candidate set C and vote set V (masked down to the candidates in \(C'\)). This notion, destructive control by deleting candidates, is due to the seminal control paper of Bartholdi et al. [3], except their paper is in the unique-winner model and our paper is in the nonunique-winner model. Yang [69] has observed that WARP implies, in the nonunique-winner model, immunity to destructive control by deleting candidates. We here add the observation that the converse also holds, since the definitions of the two concepts are in fact the same. Thus the following holds.

    An election system \(\mathcal E\) satisfies WARP if and only if \(\mathcal E\) is immune to DCDC (destructive control by deleting candidates).

    Again, like all the results in this paper, the above if and only if statement is with respect to the nonunique-winner model. We mention, for context, that in the unique-winner model (which is not the model we are using in this paper), the analogous result holds if one looks instead at unique-WARP, namely, we have the following result.

    An election system \(\mathcal E\) satisfies unique-WARP if and only if \(\mathcal E\) is, in the unique-winner model, immune to DCDC (destructive control by deleting candidates).

    This result’s “only if” direction is stated in [42] and this result’s “if” direction clearly also holds, again as the definitions of the two notions in fact are the same. Finally, Yang [69] (respectively, Hemaspaandra et al. [42]) states that in the nonunique-winner model (respectively, unique-winner model), that WARP (respectively, unique-WARP) implies immunity to constructive control by adding candidates. We observe that the converse directions for each of those claims hold, for the same reasons as mentioned above for the DCDC cases, thus yielding two additional if and only if results.

  9. Is it going unnaturally far to study systems that satisfy both WARP and unique-WARP? We do not think so. Indeed, to put our use of two properties in context, we mention that even combined they are a weaker assumption about the election system than is even a certain different version of WARP that is sometimes used. The version of WARP that we are using here is precisely that found for example in Baumeister and Rothe’s survey of preference aggregation [6]. This version focuses on the individual candidate and what happens when other candidates are removed, namely, that winning does not turn into not winning for any unremoved candidate. The other version, and to avoid confusion let us refer to it as WARP\('\), focuses on whether when one removes candidates the winner set is always exactly the previous winner set intersected with the remaining set of candidates. WARP\('\) clearly implies both WARP and unique-WARP. And so Theorem 4.9 would certainly remain true if in it one were to replace the phrase “both WARP and unique-WARP” with simply “WARP\('\)”.

References

  1. Bartholdi III, J., & Orlin, J. (1991). Single transferable vote resists strategic voting. Social Choice and Welfare, 8(4), 341–354.

    MathSciNet  MATH  Google Scholar 

  2. Bartholdi III, J., Tovey, C., & Trick, M. (1989). The computational difficulty of manipulating an election. Social Choice and Welfare, 6(3), 227–241.

    MathSciNet  MATH  Google Scholar 

  3. Bartholdi III, J., Tovey, C., & Trick, M. (1992). How hard is it to control an election? Mathematical and Computer Modeling, 16(8–9), 27–40.

    MathSciNet  MATH  Google Scholar 

  4. Baumeister, D., Roos, M., & Rothe, J. (2011). Computational complexity of two variants of the possible winner problem. In Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (pp. 853–860). International Foundation for Autonomous Agents and Multiagent Systems.

  5. Baumeister, D., Roos, M., Rothe, J., Schend, L., & Xia, L. (2012). The possible winner problem with uncertain weights. In Proceedings of the 20th European Conference on Artificial Intelligence (pp. 133–138). IOS Press.

  6. Baumeister, D., & Rothe, J. (2016). Preference aggregation by voting. In J. Rothe (Ed.), Economics and computation: An introduction to algorithmic game theory, computational social choice, and fair division (pp. 197–325). Berlin: Springer.

    Google Scholar 

  7. Brandt, F., Brill, M., Hemaspaandra, E., & Hemaspaandra, L. (2015). Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates. Journal of Artificial Intelligence Research, 53, 439–496.

    MathSciNet  MATH  Google Scholar 

  8. Brandt, F., Conitzer, V., & Endriss, U. (2013). Computational social choice. In G. Weiss (Ed.), Multiagent systems (2nd ed., pp. 213–284). Cambridge: MIT Press.

    Google Scholar 

  9. Chevaleyre, Y., Endriss, U., Lang, J., & Maudet, N. (2007). A short introduction to computational social choice. In Proceedings of the 33rd International Conference on Current Trends in Theory and Practice of Computer Science, Lecture Notes in Computer Science #4362 (pp. 51–69). Springer.

  10. Chevaleyre, Y., Lang, J., Maudet, N., & Monnot, J. (2010). Possible winners when new candidates are added: The case of scoring rules. In Proceedings of the 24th AAAI conference on artificial intelligence (pp. 762–767). AAAI Press.

  11. Chevaleyre, Y., Lang, J., Maudet, N., Monnot, J., & Xia, L. (2012). New candidates welcome! Possible winners with respect to the addition of new candidates. Mathematical Social Sciences, 64(1), 74–88.

    MathSciNet  MATH  Google Scholar 

  12. Condorcet, J. Essai sur l’Application de L’Analyse à la Probabilité des Décisions Rendues à la Pluralité des Voix (1785). Facsimile reprint of original published in Paris, 1972, by the Imprimerie Royale.

  13. Congleton, R. (2010). Perfecting parliament: Constitutional reform, liberalism, and the rise of Western democracy. Cambridge: Cambridge University Press.

  14. Conitzer, V., Sandholm, T., & Lang, J. (2007). When are elections with few candidates hard to manipulate? Journal of the ACM, 54(3), 14.

    MathSciNet  MATH  Google Scholar 

  15. Conitzer, V., & Walsh, T. (2016). Barriers to manipulation in voting. In F. Brandt, V. Conitzer, U. Endriss, J. Lang, & A. Procaccia (Eds.), Handbook of computational social choice (pp. 127–145). Cambridge: Cambridge University Press.

    Google Scholar 

  16. Eiter, T., Gottlob, G., & Mannila, H. (1997). Disjunctive datalog. ACM Transactions on Database Systems, 22(3), 364–418.

    Google Scholar 

  17. Elkind, E., Gan, J., Obraztsova, S., Rabinovich, Z., & Voudouris, A. (2019). Protecting elections by recounting ballots. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (pp. 259–265).

  18. Ephrati, E., & Rosenschein, J. (1997). A heuristic technique for multi-agent planning. Annals of Mathematics and Artificial Intelligence, 20(1–4), 13–67.

    MathSciNet  MATH  Google Scholar 

  19. Erdélyi, G., Fellows, M., Rothe, J., & Schend, L. (2015). Control complexity in Bucklin and fallback voting: A theoretical analysis. Journal of Computer and System Sciences, 81(4), 632–660.

    MathSciNet  MATH  Google Scholar 

  20. Erdélyi, G., Nowak, M., & Rothe, J. (2009). Sincere-strategy preference-based approval voting fully resists constructive control and broadly resists destructive control. Mathematical Logic Quarterly, 55(4), 425–443.

    MathSciNet  MATH  Google Scholar 

  21. Fagin, R., Kumar, R., & Sivakumar, D. (2003). Efficient similarity search and classification via rank aggregation. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data (pp. 301–312). ACM Press.

  22. Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. (2009). How hard is bribery in elections? Journal of Artificial Intelligence Research, 35, 485–532.

    MathSciNet  MATH  Google Scholar 

  23. Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. (2010). Using complexity to protect elections. Communications of the ACM, 53(11), 74–82.

    Google Scholar 

  24. Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. (2011). Multimode control attacks on elections. Journal of Artificial Intelligence Research, 40, 305–351.

    MathSciNet  MATH  Google Scholar 

  25. Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. (2014). The complexity of manipulative attacks in nearly single-peaked electorates. Journal of Artificial Intelligence Research, 207, 69–99.

    MathSciNet  MATH  Google Scholar 

  26. Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. (2015). Weighted electoral control. Journal of Artificial Intelligence Research, 52, 507–542.

    MathSciNet  MATH  Google Scholar 

  27. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2009). Llull and Copeland voting computationally resist bribery and constructive control. Journal of Artificial Intelligence Research, 35, 275–341.

    MathSciNet  MATH  Google Scholar 

  28. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2009). A richer understanding of the complexity of election systems. In S. Ravi & S. Shukla (Eds.), Fundamental problems in computing: Essays in honor of Professor Daniel J. Rosenkrantz (pp. 375–406). Berlin: Springer.

    MATH  Google Scholar 

  29. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2011). The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. Information and Computation, 209(2), 89–107.

    MathSciNet  MATH  Google Scholar 

  30. Faliszewski, P., & Rothe, J. (2016). Control and bribery in voting. In F. Brandt, V. Conitzer, U. Endriss, J. Lang, & A. Procaccia (Eds.), Handbook of computational social choice (pp. 146–168). Cambridge: Cambridge University Press.

    Google Scholar 

  31. Fitzsimmons, Z., Hemaspaandra, E., & Hemaspaandra, L. (2013). Control in the presence of manipulators: Cooperative and competitive cases. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (pp. 113–119). AAAI Press.

  32. Fitzsimmons, Z., Hemaspaandra, E., & Hemaspaandra, L. (2013). Control in the presence of manipulators: Cooperative and competitive cases. Tech. Rep. arXiv:1308.0544v1 [cs.GT], Computing Research Repository, arXiv.org/corr/.

  33. Fitzsimmons, Z., Hemaspaandra, E., & Hemaspaandra, L. (2013). Control in the presence of manipulators: Cooperative and competitive cases. Tech. Rep. arXiv:1308.0544 [cs.GT], Computing Research Repository, arXiv.org/corr/. Revised, June 2017.

  34. Fitzsimmons, Z., Hemaspaandra, E., & Hemaspaandra, L. (2014). Control in the presence of manipulators: Cooperative and competitive cases. In Proceedings (Workshop Notes) of the 5th International Workshop on Computational Social Choice..

  35. Fitzsimmons, Z., Hemaspaandra, E., & Hemaspaandra, L. (2016). Manipulation complexity of same-system runoff elections. Annals of Mathematics and Artificial Intelligence, 77(3–4), 159–189.

    MathSciNet  MATH  Google Scholar 

  36. Fitzsimmons, Z., Hemaspaandra, E., Hoover, A., & Narváez, D. (2019). Very hard electoral control problems. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence (pp. 1933–1940).

  37. Ghosh, S., Mundhe, M., Hernandez, K., & Sen, S. (1999). Voting for movies: The anatomy of recommender systems. In Proceedings of the 3rd Annual Conference on Autonomous Agents (pp. 434–435). ACM Press.

  38. Gill, J. (1977). Computational complexity of probabilistic Turing machines. SIAM Journal on Computing, 6(4), 675–695.

    MathSciNet  MATH  Google Scholar 

  39. Hemaspaandra, E., & Hemaspaandra, L. (2007). Dichotomy for voting systems. Journal of Computer and System Sciences, 73(1), 73–83.

    MathSciNet  MATH  Google Scholar 

  40. Hemaspaandra, E., Hemaspaandra, L., & Menton, C. (2020). Search versus decision for election manipulation problems. ACM Transactions on Computation, 12(1), Article 3,1–42.

  41. Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (1997). Raising NP lower bounds to parallel NP lower bounds. SIGACT News, 28(2), 2–13.

    MATH  Google Scholar 

  42. Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2007). Anyone but him: The complexity of precluding an alternative. Artificial Intelligence, 171(5–6), 255–285.

    MathSciNet  MATH  Google Scholar 

  43. Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2009). Hybrid elections broaden complexity-theoretic resistance to control. Mathematical Logic Quarterly, 55(4), 397–424.

    MathSciNet  MATH  Google Scholar 

  44. Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2014). The complexity of online manipulation of sequential elections. Journal of Computer and System Sciences, 80(4), 697–710.

    MathSciNet  MATH  Google Scholar 

  45. Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2016). The complexity of manipulative actions in single-peaked societies. In J. Rothe (Ed.), Economics and computation (pp. 327–360). Berlin: Springer.

    MATH  Google Scholar 

  46. Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2017). The complexity of controlling candidate-sequential elections. Theoretical Computer Science, 678, 14–21.

    MathSciNet  MATH  Google Scholar 

  47. Hemaspaandra, E., Hemaspaandra, L., & Rothe, J. (2017). The complexity of online voter control in sequential elections. Autonomous Agents and Multi-Agent Systems, 31(5), 1055–1076.

    MATH  Google Scholar 

  48. Hemaspaandra, L., & Williams, R. (2012). An atypical survey of typical-case heuristic algorithms. SIGACT News, 43(4), 71–89.

    Google Scholar 

  49. Konczak, K., & Lang, J. (2005). Voting procedures with incomplete preferences. In Proceedings (Workshop Notes) of the IJCAI-05 Multidisciplinary Workshop on Advances in Preference Handling (pp. 124–129).

  50. Lewis, H., & Papadimitriou, C. (1981). Elements of the theory of computation. Englewood Cliffs: Prentice-Hall.

    MATH  Google Scholar 

  51. Menton, C. (2013). Normalized range voting broadly resists control. Theory of Computing Systems, 53(4), 507–531.

    MathSciNet  MATH  Google Scholar 

  52. Menton, C., & Singh, P. (2013). Control complexity of Schulze voting. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (pp. 286–292). AAAI Press.

  53. Meyer, A., & Stockmeyer, L. (1972). The equivalence problem for regular expressions with squaring requires exponential space. In Proceedings of the 13th IEEE Symposium on Switching and Automata Theory (pp. 125–129). IEEE Press.

  54. Narodytska, N., & Walsh, T. (2012). Manipulating two stage voting rules. In Proceedings (Workshop Notes) of the 4th International Workshop on Computational Social Choice (pp. 323–334).

  55. Narodytska, N., & Walsh, T. (2013). Manipulating two stage voting rules. In Proceedings of the 10th International Conference of Autonomous Agents and Multiagent Systems (pp. 423–430). International Foundation for Autonomous Agents and Multiagent Systems.

  56. Papadimitriou, C., & Yannakakis, M. (1984). The complexity of facets (and some facets of complexity). Journal of Computer and System Sciences, 28(2), 244–259.

    MathSciNet  MATH  Google Scholar 

  57. Parkes, D., & Xia, L. (2012). A complexity-of-strategic-behavior comparison between Schulze’s rule and ranked pairs. In Proceedings of the 26th AAAI Conference on Artificial Intelligence (pp. 1429–1435). AAAI Press.

  58. Pennock, D., Horvitz, E., & Giles, C. (2000). Social choice theory and recommender systems: Analysis of the axiomatic foundations of collaborative filtering. In Proceedings of the 17th National Conference on Artificial Intelligence (pp. 729–734). AAAI Press.

  59. Procaccia, A., & Rosenschein, J. (2007). Junta distributions and the average-case complexity of manipulating elections. Journal of Artificial Intelligence Research, 28, 157–181.

    MathSciNet  MATH  Google Scholar 

  60. Schaefer, M., & Umans, C. (2002). Completeness in the polynomial-time hierarchy: Part I: A compendium. SIGACT News, 33(3), 32–49.

    Google Scholar 

  61. Schaefer, M., & Umans, C. (2002). Completeness in the polynomial-time hierarchy: Part II. SIGACT News, 33(4), 22–36.

    Google Scholar 

  62. Shoham, Y., & Leyton-Brown, K. (2009). Multiagent systems: Algorithmic, game-theoretic, and logical foundations. Cambridge: Cambridge University Press.

    MATH  Google Scholar 

  63. Stockmeyer, L. (1976). The polynomial-time hierarchy. Theoretical Computer Science, 3(1), 1–22.

    MathSciNet  MATH  Google Scholar 

  64. Stockmeyer, L., & Meyer, A. (1973). Word problems requiring exponential time. In Proceedings of the 5th ACM Symposium on Theory of Computing (pp. 1–9). ACM Press.

  65. Valiant, L. (1976). The relative complexity of checking and evaluating. Information Processing Letters, 5(1), 20–23.

    MathSciNet  MATH  Google Scholar 

  66. Walsh, T. (2009). Where are the really hard manipulation problems? The phase transition in manipulating the veto rule. In Proceedings of the 21st International Joint Conference on Artificial Intelligence (pp. 324–329). AAAI Press.

  67. Wrathall, C. (1976). Complete sets and the polynomial-time hierarchy. Theoretical Computer Science, 3(1), 23–33.

    MathSciNet  MATH  Google Scholar 

  68. Xia, L., Lang, J., & Monnot, J. (2011). Possible winners when new alternatives join: New results coming up! In Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (pp. 829–836). International Foundation for Autonomous Agents and Multiagent Systems.

  69. Yang, Y. (2017). The complexity of control and bribery in majority judgment. In Proceedings of the 16th International Conference on Autonomous Agents and Multiagent Systems (pp. 1169–1177). International Foundation for Autonomous Agents and Multiagent Systems.

  70. Yang, Y., & Guo, J. (2014). Controlling elections with bounded single-peaked width. In Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems (pp. 629–636). International Foundation for Autonomous Agents and Multiagent Systems.

  71. Yin, Y., Vorobeychik, Y., An, B., & Hazon, N. (2018). Optimal defense against election control by deleting voter groups. Artificial Intelligence, 259, 32–51.

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

Earlier versions of this paper appeared in IJCAI-2013 [31] and COMSOC-2014 [34]. We are extremely grateful to the anonymous conference and journal referees, whose comments and suggestions much improved this paper. This work was supported in part by NSF Graduate Research Fellowship DGE-1102937 and by NSF Grants CCF-0915792, CCF-1101452, CCF-1101479, DUE-1819546, and CCF-2006496.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zack Fitzsimmons.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Earlier versions of this paper [31, 34] were presented at the Twenty-Third International Joint Conference on Artificial Intelligence and the Fifth International Workshop on Computational Social Choice. This work was done in part while Zack Fitzsimmons was at RIT and while Edith Hemaspaandra and Lane A. Hemaspaandra were on sabbatical visits to ETH-Zürich and the University of Düsseldorf.

Specific systems

Specific systems

In some of the proofs in this section, we use the notation \({{\text{ score}_{(C,V)}(a)}}\) to denote the score of candidate a in election (CV). When it is clear from context, we may leave out C, V, or both.

1.1 Plurality

In this subsection we prove the remaining plurality cases of Theorem 4.5.

Theorem A.1

For plurality elections, the following hold.

  1. 1.

    M+\(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)V are each in \(\mathrm{P}\).

  2. 2.

    \(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)V-\(\left[ \begin{array}{c}\mathrm{CF}\\ \mathrm{MF}\end{array}\right] \) are each in \(\mathrm{P}\).

Proof

For the constructive cooperative and the destructive competitive cases it is clear that the manipulators should all vote for p.

For the destructive cooperative and the constructive competitive cases the optimal action for the manipulators is to all vote for the same highest-scoring candidate in \(C - \{p\}\).

In all cases we can determine if the chair can be successful by assuming the manipulators vote as above and using the corresponding polynomial-time algorithm for control from Bartholdi et al. [3] (for the constructive cases) or from Hemaspaandra et al. [42] (for the destructive cases), modified in the obvious way for the nonunique-winner case (see Observation 4.6). \(\square \)

For the remaining proofs in this section, given an election (CV) containing k manipulators, we say that a candidate r is a rival of p if r can beat p pairwise, i.e., if \({{\text{ score}_{\{p,r\}}(r)}} + k > {{\text{ score}_{\{p,r\}}(p)}}\). Recall that the manipulators come in without votes (i.e., as blank slates), and so \({{\text{ score}_{\{p,r\}}(r)}}\) and \({{\text{ score}_{\{p,r\}}(p)}}\) denote the scores of r and p in the election comprised of the candidates p and r, and the nonmanipulators in V.

Lemma A.2

If there exists a partition of voters such that p is an overall winner in the “TE” model when all manipulators vote for the same highest-scoring rival r, then there exists a partition such that p is always (i.e., regardless of the votes of the manipulators) an overall winner.

Proof

Given an election (CV) where V contains k manipulators, a candidate \(p \in C\), and a highest-scoring rival r, we do the following.

Let \((V_1,V_2)\) be a partition such that p is an overall winner when all manipulators vote for r. Let \(k_1\) be the number of manipulators in \(V_1\), let \(k_2\) be the number of manipulators in \(V_2\), let \(\ell _1\) be the number of nonmanipulator votes for r in \(V_1\), and let \(\ell _2\) be the number of nonmanipulator votes for r in \(V_2\). Without loss of generality assume that p is the unique winner of \((C,V_1)\) when all manipulators vote for r. Since we can exchange a manipulator in \(V_2\) that votes for r with a nonmanipulator in \(V_1\) that votes for r without changing the outcome of the election, we can assume that there are no manipulators in \(V_2\) (i.e., \(k_2 = 0\)) or that there are no nonmanipulators voting for r in \(V_1\) (i.e., \(\ell _1 = 0\)).

We first consider the case where \(k_2 = 0\). We will construct a new partition \((\widehat{V}_1,\widehat{V}_2)\) that will work regardless of how the manipulators vote. Let \(\widehat{V}_2\) consist of \(\ell _2\) nonmanipulator votes for r, \({{\text{ score}_{V_2}(p)}}\) nonmanipulator votes for p, for every rival \(\widehat{r} \ne r\), \(min(\ell _2, score(\widehat{r}))\) votes for \(\widehat{r}\), and for every nonrival \(c \ne p\) all the nonmanipulator votes for c. Let \(\widehat{V}_1 = V-\widehat{V}_2\).

We first show that p is always the unique winner of \((C,\widehat{V}_1)\). We know that \({{\text{ score}_{V_1}(r)}} + k_1 = \ell _1 + k_1 < {{\text{ score}_{V_1}(p)}} = {{\text{ score}_{\widehat{V}_1}(p)}}\). Since there are \(k_1\) manipulators in \(\widehat{V}_1\), it suffices to show that for all \(c \ne p\), \({{\text{ score}_{\widehat{V}_1}(c)}} \le \ell _1\). This is immediate from the construction: \({{\text{ score}_{\widehat{V}_1}(r)}} = \ell _1\), for every nonrival \(c \ne p\), \({{\text{ score}_{\widehat{V}_1}(c)}} = 0\), and for every rival \(\widehat{r} \ne r\), \(\textit{score}(\,{\widehat{r}}\,) \le {{\text{ score }(r)}} = \ell _1 + \ell _2\), and so \({{\text{ score}_{\widehat{V}_1}(\,\widehat{r}\,)}} \le \ell _1\).

So the only way in which p can be precluded from winning the runoff is if there is a rival \(\widehat{r}\) of p such that \(\widehat{r}\) is the unique winner of \((C,\widehat{V}_2)\) (recall that there are no manipulators in \(\widehat{V}_2\)). Since \({{\text{ score}_{\widehat{V}_2}(r)}} = \ell _2\) and \({{\text{ score}_{\widehat{V}_2}({\,\widehat{r}\,})}} \le \ell _2\) for every rival \(\widehat{r}\), it then follows that r is the unique winner of \((C,\widehat{V}_2)\). But then \(\textit{score}{(\,{\widehat{r}}\,)} < \ell _2\) for every rival \(\widehat{r} \ne r\) and \({{\text{ score }(c)}} < \ell _2\) for every nonrival \(c \ne p\), and \({{\text{ score}_{V_2}(p)}} = {{\text{ score}_{\widehat{V}_2}(p)}} < \ell _2\). It follows that r is the unique winner of \((C,V_2)\). Then p is never an overall winner of (CV) using the partition \((V_1,V_2)\), which contradicts our assumption. It follows that p is always a winner of (CV) using the partition \((\widehat{V}_1, \widehat{V}_2)\).

It remains to show the claim for \(k_2 > 0\) and \(\ell _1 = 0\). We will again construct a new partition \((\widehat{V}_1,\widehat{V}_2)\) that will work regardless of how the manipulators vote. Let \(\widehat{V}_1\) consist of \({{\text{ score}_{V_1}(p)}}\) nonmanipulator votes for p and \(k_1\) manipulators. Then \(\widehat{V}_2\) consists of \({{\text{ score}_{V_2}(p)}}\) nonmanipulator votes for p, all nonmanipulator votes for c, \(c \ne p\), and \(k_2\) manipulators.

Since p is the unique winner of \((C,V_1)\) when all manipulators vote for r, it follows that \(k_1 < {{\text{ score}_{V_1}(p)}} = {{\text{ score}_{\widehat{V}_1}(p)}}\), and so p is always the unique winner of \((C,\widehat{V}_1)\).

So the only way in which p can be precluded from winning the runoff is if there is manipulation and a rival \(\widehat{r}\) of p such that \(\widehat{r}\) is the unique winner of \((C,\widehat{V}_2)\). Then \({{\text{ score }({\,\widehat{r}\,})}} + k_2 = {{\text{ score}_{\widehat{V}_2}(\,\widehat{r}\,)}} > {{\text{ score}_{\widehat{V}_2}(c)}}\) for all \(c \ne \widehat{r}\). In particular, \({{\text{ score }({\,\widehat{r}\,})}} + k_2 > {{\text{ score }(c)}}\) for every nonrival \(c \ne p\) and \({{\text{ score }(\,{\widehat{r}\,})}}+ k_2 > {{\text{ score}_{{V}_2}(p)}}\). Since \({{\text{ score }({\,\widehat{r}\,})}} \le {{\text{ score }(r)}} = \ell _2\), it follows that r is the unique winner of \((C,V_2)\) when all manipulators vote for r. This contradicts our assumption. It follows that p is always a winner of (CV) using the partition \((\widehat{V}_1, \widehat{V}_2)\)\(\square \)

Theorem A.3

For plurality elections, CCPV-TE-CF is in P.

Proof

Given an election (CV) and a preferred candidate of the chair \(p \in C\), p can be made a winner if and only if there exists a partition \((V_1,V_2)\) such that p is always an overall winner.

If no rivals of p exist, then clearly control is possible if and only if \(C = \{p\}\) or there is at least one vote for p (in the latter case, let \(V_1\) consist of one voter for p).

Otherwise, let r be a highest-scoring rival of p. It is immediate from Lemma A.2 that control is possible if and only if there exists a partition such that p wins when all manipulators vote for r and rank the remaining candidates in lexicographic order. This can be determined by running the polynomial-time algorithm for plurality-CCPV-TE from [42], modified in the obvious way for the nonunique-winner case (see Observation 4.6). \(\square \)

Theorem A.4

It holds that .

Proof

It immediately follows from the definition that .

Now suppose that “MF” control is possible. Then for all manipulations there exists a partition such that the preferred candidate p wins. Then either no rival to p exists, in which case “CF” control is possible since either p is the only candidate or there exists at least one vote for p. When a rival r to p exists, control is certainly possible when all the manipulators vote for r. By Lemma A.2 we know that then there exists a partition where p is always a winner, so “CF” control is possible. \(\square \)

Corollary A.5

For plurality elections, CCPV-TE-MF is in P.

Theorem A.6

For plurality elections, M+DCPV-TE is in P.

Proof

Given an election (CV) and a despised candidate of the chair \(p \in C\), we can determine in polynomial time if p can be precluded from winning by partitioning voters as follows. If there are no manipulators, run the polynomial-time algorithm for plurality-DCPV-TE from [42], modified in the obvious way for the nonunique-winner case (see Observation 4.6).

So, let \(k > 0\) denote the number of manipulators in V. If there exists a rival r to p (i.e., a candidate that can beat p pairwise, i.e., a candidate for which \({{\text{ score}_{\{p,r\}}(p)}} < {{\text{ score}_{\{p,r\}}(r)}} + k\)), then control is possible: Let \(V_2\) consist of one manipulator and let all manipulators vote for r.

If there are no rivals, we must ensure that p doesn’t make it to the runoff, i.e., we need to ensure there is a candidate \(c \ne p\) such that c ties-or-beats p in both subelections or there are two distinct candidates \(c, d \ne p\) such that c ties-or-beats p in the first subelection and d ties-or-beats p in the second subelection. It is easy to see that this can be done if and only if we are in one of the following two cases.

  1. 1.

    There are at least two candidates, c is a highest-scoring candidate in \(C - \{p\}\), and \({{\text{ score }(p)}} \le {{\text{ score }(c)}} + k\). (Have all manipulators vote for c and use partition \((V,\emptyset )\).)

  2. 2.

    There are at least three candidates, c and d are two highest-scoring candidates in \(C - \{p\}\), and \({{\text{ score }(p)}} \le {{\text{ score }(c)}}+{{\text{ score }(d)}}+k\). (Have \(V_1\) consist of \(\min ({{\text{ score }(p)}},{{\text{ score }(c)}})\) votes for p and all votes for c. The remaining votes, including all manipulators, who will vote for d, will be in \(V_2\).) \(\square \)

Lemma A.7

If there exists a partition of voters such that p is not a plurality winner in the “TE” model when all manipulators vote for p, then there exists a partition such that p can never be made a plurality winner by the manipulators.

Proof

Given an election (CV) and a candidate \(p \in C\), we do the following.

Let \((V_1,V_2)\) be a partition such that p is not a winner when all manipulators vote for p. If p can never be made a winner by the manipulators in this partition then we are done. So, suppose there exists a manipulation such that p is an overall winner (with the partition \((V_1,V_2)\)). Without loss of generality assume that p is the unique winner of \((C,V_1)\). Then p is also the unique winner in \((C,V_1)\) if all manipulators vote for p. However, since p is not an overall winner if all manipulators vote for p there is a candidate \(c \ne p\) such that if all manipulators vote for p, c is the unique winner of \((C,V_2)\) and c is the unique winner of the runoff \((\{p,c\},V)\).

Now move all manipulators from \(V_2\) to \(V_1\). Note that c remains the unique winner of \((C,V_2)\) and that c is always the unique winner of \((\{p,c\},V)\). It follows that in this new partition, p is never a winner, no matter what the manipulators do. \(\square \)

Lemma A.7 implies that is in P, since control is possible if and only if control is possible when all manipulators vote for p. This can be checked using the polynomial-time algorithm for plurality - DCPV-TE from Hemaspaandra et al. [42], modified in the obvious way for the nonunique-winner case (see Observation 4.6).

Theorem A.8

For plurality elections, DCPV-TE-CF is in P.

We will now show that Lemma A.7 also implies that plurality - DCPV-TE-MF is in P.

Theorem A.9

For plurality elections, DCPV-TE-MF is in P.

Proof

Given an election (CV) and a despised candidate of the chair \(p \in C\), we will show that we can determine in polynomial time if p can be precluded from winning by partitioning voters.

As in the “CF” case we will use Lemma A.7 to show that control is possible if and only if there exists a partition such that p is precluded from winning when all manipulators vote for p. This also implies that = .

It immediately follows from the definition that if the instance of plurality - DCPV-TE-MF is positive, then there exists a partition such that p is not a winner when all manipulators vote for p.

For the other direction, by Lemma A.7 if there exists a partition such that p is not a winner when all the manipulators vote for p, then there exists a partition \((V_1,V_2)\) such that p can never be made a winner by the manipulators. This implies that no matter what the manipulators do, there exists a partition (in fact, always the same partition) such that p is not a winner. This then implies that the instance of plurality - DCPV-TE-MF is positive. \(\square \)

1.2 Condorcet

In this subsection we prove the Condorcet cases of Theorem 4.5.

Theorem A.10

For Condorcet elections, the following hold.

  1. 1.

    M+\(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)C are each in \(\mathrm{P}\).

  2. 2.

    M+DC\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)V are both in \(\mathrm{P}\).

  3. 3.

    \(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)C-\(\left[ \begin{array}{c}\mathrm{CF}\\ \mathrm{MF}\end{array}\right] \) are each in \(\mathrm{P}\).

  4. 4.

    DC\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)V-\(\left[ \begin{array}{c}\mathrm{CF}\\ \mathrm{MF}\end{array}\right] \) are both in \(\mathrm{P}\).

Proof

For the constructive cooperative and the destructive competitive cases it is clear that the manipulators should all rank p first. The remaining candidates can be ranked in any order since this does not affect whether or not p is a Condorcet winner.

For the destructive cooperative and the constructive competitive cases the optimal action for the manipulators is to rank p last.

In all cases we can determine if the chair can be successful by assuming the manipulators vote as above and using the corresponding polynomial-time algorithm for control from Bartholdi et al. [3] (for the constructive cases) or from Hemaspaandra et al. [42] (for the destructive cases), modified in the obvious way for the nonunique-winner case (see Observation 4.6). \(\square \)

We now prove the Condorcet partition cases. Since Condorcet winners are always unique, the “TE” and “TP” cases coincide and so we will leave out this notation, following [42].

Theorem A.11

For Condorcet elections, M+\(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{PC}\\ \mathrm{RPC}\end{array}\right] \) are each in P.

Proof

Given an election (CV) and a preferred candidate of the chair \(p \in C\), we can determine in polynomial time if p can be made a winner (in the presence of manipulators) by partitioning of candidates and by runoff partitioning of candidates as follows.

The use we’re about to make of the notion of control being possible is as described immediately before Theorem 4.7. For the constructive cases we do the following. Since Condorcet elections satisfy both WARP and unique-WARP, we know from Theorems 4.7 and 4.9 that control is possible if and only if control is possible using partition \((C-\{p\},\{p\})\). Set all manipulators to rank p first. Rank the candidates that do not beat p pairwise next in all manipulator votes (in any order). Then, as long as there exists an unranked candidate c that can never be a Condorcet winner in \((C-\{p\}, V)\), rank c next in all manipulator votes.

Let \(\widehat{C}\) be the set of candidates not yet ranked by the manipulators. Notice that every \(c \in \widehat{C}\) beats p pairwise, and every \(c \in \widehat{C}\) can become a Condorcet winner in \((\widehat{C},V)\) (and thus also in (CV)).

So, to determine if control is possible, we must determine if the manipulators can vote in such a way that \((\widehat{C},V)\) has no Condorcet winner, i.e., for each \(c \in \widehat{C}\) there exists a \(c' \in \widehat{C}-\{c\}\) such that \(c'\) ties-or-beats c pairwise.

For \(\Vert V\Vert \) even, assume that there are at least two candidates in \(\widehat{C}\) and for \(\Vert V\Vert \) odd, assume there are at least three candidates in \(\widehat{C}\) (otherwise there will always be Condorcet winners). We have the following cases, depending on whether or not there is a Condorcet winner in \((\widehat{C},V)\) before the manipulators vote and depending on the parity of \(\Vert V\Vert \). Let \(k \ge 1\) denote the number of manipulators in V.

  1. 1.

    If there exists a Condorcet winner and \(\Vert V\Vert \) is even, then let c be the Condorcet winner, and let \(d \in \widehat{C}-\{c\}\). It is easy to see that each of the manipulators can vote \(c> d > \widehat{C}-\{c,d\}\) or \(d> c > \widehat{C}-\{c,d\}\) in such a way that c ties d pairwise. So, c is no longer a Condorcet winner and no other candidate becomes a Condorcet winner, since c ties-or-beats every other candidate pairwise.

  2. 2.

    If there exists a Condorcet winner and \(\Vert V\Vert \) is odd, then let c be the Condorcet winner, and let \(a,b \in \widehat{C}-\{c\}\) be such that a ties-or-beats b pairwise. Have \(\lceil k/2 \rceil \) manipulators vote \(a> b> c > \widehat{C}-\{a,b,c\}\) and \(\lfloor k/2 \rfloor \) manipulators vote \(b> c> a > \widehat{C}-\{a,b,c\}\). After this manipulation, b beats c pairwise, a beats b pairwise, and c beats every candidate in \(\widehat{C} - \{b,c\}\) pairwise.

  3. 3.

    If there is no Condorcet winner and \(\Vert V\Vert \) is even, then have \(\lfloor k/2 \rfloor \) manipulators vote \(\widehat{C}\) (i.e., the candidates in \(\widehat{C}\) in some fixed order) and \(\lfloor k/2 \rfloor \) manipulators vote \(\overleftarrow{\widehat{C}}\) (i.e., the candidates in \(\widehat{C}\) in reverse order). When k is odd, let the remaining manipulator vote arbitrarily. It is clear that no Condorcet winners are created by the manipulators.

  4. 4.

    If there is no Condorcet winner and \(\Vert V\Vert \) is odd, then we have the following cases.

    1. (a)

      If k is even, then have k/2 manipulators vote \(\widehat{C}\) and the remaining k/2 manipulators vote \(\overleftarrow{\widehat{C}}\).

    2. (b)

      If k is odd and there is no weak Condorcet winner (a weak Condorcet winner is a candidate that ties-or-beats every other candidate pairwise), then have \(\lfloor k/2 \rfloor \) manipulators vote \(\widehat{C}\) and \(\lfloor k/2 \rfloor \) manipulators vote \(\overleftarrow{\widehat{C}}\). Let the remaining manipulator vote arbitrarily. It is clear that no Condorcet winner is created by the manipulators.

    3. (c)

      If k is odd and there exists a weak Condorcet winner, then let c be a weak Condorcet winner and let a be a candidate such that a ties c pairwise. We have the following two cases.

      1. i.

        If for all \(b \in \widehat{C}-\{a,c\}\), a beats b pairwise and c beats b pairwise, then have \(\lceil k/2 \rceil \) manipulators vote \(\widehat{C}-\{a,c\}> a > c\) and have the remaining \(\lfloor k/2 \rfloor \) manipulators vote \(c> \widehat{C}-\{a,c\} > a\). So, now a beats c pairwise, and for all \(b \in \widehat{C}-\{a,c\}\)c beats b pairwise and b beats a pairwise, and thus there is still no Condorcet winner.

      2. ii.

        Otherwise, there exists a candidate \(b \in C-\{a,c\}\) such that it is not the case that a and c both beat b pairwise. Suppose there are at least three manipulators, and set their votes in the following way. (If there is only one manipulator, then since each candidate in \(\widehat{C}\) can become a Condorcet winner, all candidates in \(\widehat{C}\) tie pairwise. And so there is always a Condorcet winner after manipulation.)

        1. A.

          If a does not beat b pairwise, then let \(\lfloor k/3 \rfloor \) manipulators vote \(c> b> a > \widehat{C}-\{a,b,c\}\), \(\lfloor k/3 \rfloor \) manipulators vote \(b> a> c > \widehat{C}-\{a,b,c\}\), and \(\lfloor k/3 \rfloor \) manipulators vote \(a> c> b > \widehat{C}-\{a,b,c\}\). Note that a beats c pairwise, b beats a pairwise, and c beats every candidate in \(\widehat{C} - \{a,c\}\) pairwise, so there is no Condorcet winner. If two manipulators remain, then have one vote \(\widehat{C}\) and the other vote \(\overleftarrow{\widehat{C}}\). Otherwise, if a single manipulator remains, since a beats c pairwise after the manipulators act as above, when the one remaining manipulator votes \(c > \cdots \), no Condorcet winner is created.

        2. B.

          If a beats b pairwise, then c does not beat b pairwise. It follows that c ties b pairwise. Now switch candidates a and b, and we are in the previous case.

For the destructive cases, since Condorcet elections satisfy unique-WARP, the chair cannot, by partitioning of candidates or by runoff partitioning of candidates, cause a candidate that is a unique winner to no longer be a unique winner [42]. This implies that control is possible if and only if the manipulators can vote so that p is not a winner in (CV). It is immediate that the optimal action for the manipulators is to put p last. \(\square \)

Theorem A.12

For Condorcet elections, \(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{PC}\\ \mathrm{RPC}\end{array}\right] \)-\(\left[ \begin{array}{c}\mathrm{CF}\\ \mathrm{MF}\end{array}\right] \) are each in P.

Proof

Given an election (CV) and a preferred candidate of the chair \(p \in C\), we can determine in polynomial time if p can be made a winner by partitioning candidates and by runoff partitioning of candidates as follows.

For the constructive cases, since Condorcet elections satisfy both WARP and unique-WARP, we know from Theorems 4.7 and 4.9 (which each apply only to the TE model, but since the Condorcet election system never has more than one winner, for Condorcet elections TE and TP are in effect identical) that control is possible if and only if control is possible using partition \((C-\{p\},\{p\})\). The manipulators can preclude p from winning if and only if there is a candidate \(c \ne p\) that can be made to uniquely win \((C-\{p\},V)\) and ties-or-beats p pairwise. This can easily be checked by having all manipulators vote for c.

For the destructive cases, since Condorcet elections satisfy unique-WARP, the chair cannot, by partitioning of candidates or by runoff partitioning of candidates, cause a candidate that is a unique winner to no longer be a unique winner [42]. This implies that control is possible if and only if the manipulators cannot vote so that p becomes a winner in (CV). It is immediate that the optimal action for the manipulators is to vote for p\(\square \)

Theorem A.13

For Condorcet elections, M+DCPV is in P.

Proof

Given an election (CV) and a despised candidate of the chair \(p \in C\), we can determine in polynomial time if p can be precluded from winning by partitioning voters as follows.

If there exists a candidate \(r \in C-\{p\}\) such that when all manipulators rank p last (and ranking the remaining candidates in any order), r ties-or-beats p pairwise, then control is possible by having all manipulators rank p last and using partition \((V,\emptyset )\).

If no such candidate exists, the only way to ensure that p is not a winner is to ensure that p does not participate in the runoff. Suppose there exists a partition and a manipulation such that p is not a unique winner of either subelection. If in this partition we set all manipulators to rank p last, p still does not win either subelection. So, we can check whether we are in this case by having all manipulators rank p last, and then use the polynomial-time algorithm for Condorcet - DCPV from [42], modified in the obvious way for the nonunique-winner case (see Observation 4.6). \(\square \)

Below we state a lemma analogous to Lemma A.7, but for Condorcet elections.

Lemma A.14

If there exists a partition of voters such that p is not a Condorcet winner when all manipulators vote for p, then there exists a partition such that p can never be made a winner by the manipulators.

Proof

Given an election (CV) and a candidate \(p \in C\), we do the following.

Let \((V_1,V_2)\) be a partition such that p is not a winner when all manipulators vote for p. So, either there exists a candidate \(r \in C-\{p\}\) such that r ties-or-beats p pairwise when all manipulators vote for p, or p is not a unique winner of either subelection.

In the former case the partition \((V,\emptyset )\) will always work, and in the latter case it is clear to see that there is no way for the manipulators to make p a unique winner of either subelection, so we are done. \(\square \)

Lemma A.14 implies that is in P, since control is possible if and only if control is possible when all manipulators vote for p. This can be checked using the polynomial-time algorithm from [42], modified in the obvious way for the nonunique-winner case (see Observation 4.6).

Theorem A.15

For Condorcet elections, DCPV-CF is in P.

A similar argument as in the proof of Theorem A.9 shows that Lemma A.14 above also implies that the corresponding “MF” case is also in P.

Theorem A.16

For Condorcet elections, DCPV-MF is in P.

1.3 Approval

In this subsection we prove the Approval cases of Theorem 4.5.

Theorem A.17

For approval elections, the following hold.

  1. 1.

    M+\(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)C are each in \(\mathrm{P}\).

  2. 2.

    M+DC\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)V are both in \(\mathrm{P}\).

  3. 3.

    \(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)C-\(\left[ \begin{array}{c}\mathrm{CF}\\ \mathrm{MF}\end{array}\right] \) are each in \(\mathrm{P}\).

  4. 4.

    DC\(\left[ \begin{array}{c}\mathrm{A}\\ \mathrm{D}\end{array}\right] \)V-\(\left[ \begin{array}{c}\mathrm{CF}\\ \mathrm{MF}\end{array}\right] \) are each in \(\mathrm{P}\).

Proof

For the constructive cooperative and the destructive competitive cases it is clear that the manipulators should all approve of only p.

For the destructive cooperative and the constructive competitive cases the optimal action for the manipulators is approve of all candidates except p.

In all cases we can determine if the chair can be successful by assuming the manipulators vote as above and using the corresponding polynomial-time algorithm for control from Bartholdi et al. [3] (for the constructive cases) or from Hemaspaandra et al. [42] (for the destructive cases), modified in the obvious way for the nonunique-winner case (see Observation 4.6). \(\square \)

Theorem A.18

For approval elections, M+\(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{PC}\\ \mathrm{RPC}\end{array}\right] \)-\(\left[ \begin{array}{c}\mathrm{TE}\\ \mathrm{TP}\end{array}\right] \) are each in P.

Proof

Given an election (CV) and a preferred candidate of the chair \(p \in C\), we can determine in polynomial time if p can be made a winner (in the presence of manipulators) by partitioning of candidates and by runoff partitioning of candidates as follows. Let k denote the number of manipulators in V.

For the constructive “TE” cases we do the following. Since approval elections satisfy both WARP and unique-WARP, we know from Theorems 4.7 and 4.9 that control is possible if and only if control is possible using partition \((C-\{p\},\{p\})\). Set all manipulators to approve of p. If that makes p an overall winner of the election, we are done. If not, let c be the unique winner of subelection \((C-\{p\},V)\) (since p will participate in the runoff, the only way p can fail to then win overall is if there is a unique winner of \((C-\{p\}, V)\) who beats p in the runoff). As just mentioned parenthetically, note that after manipulation, c’s score in this case must be greater than p’s score. If for all \(d \in C - \{p,c\}\), \({{\text{ score }(c)}} > {{\text{ score }(d)}} + k\), c will always be the unique winner of \((C-\{p\},V)\) and so p will never be an overall winner. If there exists a candidate d in \(C - \{p,c\}\) such that \({{\text{ score }(c)}} \le {{\text{ score }(d)}} + k\), let \({{\text{ score }(c)}} - {{\text{ score }(d)}}\) voters approve of d (in addition to p). In this case, \((C-\{p\},V)\) does not have a unique winner and so p is an overall winner.

For the constructive “TP” cases, note that control is possible if and only if the manipulators can vote so that p becomes a winner in (CV). So the optimal action for the manipulators is to approve of only p. Similarly, for the destructive cases, control is possible if and only if the manipulators can vote so that p does not win (for the “TP” cases) or does not uniquely win (for the “TE” cases) in (CV). So the optimal action for the manipulators is to approve of all candidates except p\(\square \)

Theorem A.19

For approval elections, \(\left[ \begin{array}{c}\mathrm{C}\\ \mathrm{D}\end{array}\right] \)C\(\left[ \begin{array}{c}\mathrm{PC}\\ \mathrm{RPC}\end{array}\right] \)-\(\left[ \begin{array}{c}\mathrm{TE}\\ \mathrm{TP}\end{array}\right] \)-\(\left[ \begin{array}{c}\mathrm{CF}\\ \mathrm{MF}\end{array}\right] \) are each in P.

Proof

Given an election (CV) and a preferred candidate of the chair \(p \in C\), we can determine in polynomial time if p can be made a winner (in the presence of manipulators) by partitioning candidates and by runoff partitioning of candidates as follows.

For the constructive “TE” cases, since approval elections satisfy both WARP and unique-WARP, we know from Theorems 4.7 and 4.9 that control is possible if and only if control is possible using partition \((C-\{p\},\{p\})\). The manipulators can preclude p from winning if and only if there is a candidate \(c \ne p\) that can be made to uniquely win using partition \((C-\{p\},\{p\})\). This can easily be checked by having all manipulators approve of only c.

For the constructive “TP” cases, note that control is possible if and only if the manipulators cannot vote so that p does not become a winner in (CV). So the optimal action for the manipulators, regardless of who goes first, is to approve of all candidates except p. Similarly, for the destructive cases, control is possible if and only if the manipulators cannot vote so that p becomes a winner (for the “TP” cases) or a unique winner (for the “TE” cases) in (CV). So the optimal action for the manipulators, regardless of who goes first, is to approve of only p\(\square \)

Theorem A.20

For approval elections, M+DCPV-\(\left[ \begin{array}{c}\mathrm{TE}\\ \mathrm{TP}\end{array}\right] \) are both in P.

Proof

Given an election (CV) containing k manipulators, and a despised candidate of the chair \(p \in C\), we can determine in polynomial time if p can be precluded from winning by partitioning voters for the “TE” case as follows. Let k denote the number of manipulators in V.

  1. 1.

    If there is a candidate, \(c \ne p\) such that \({{\text{ score }(p)}} \le {{\text{ score }(c)}}+k\), then control is possible by having all manipulators disapprove of only p and using partition \((V,\emptyset )\).

  2. 2.

    If we are not in Case 1, the only way to preclude p from being a winner is if p doesn’t make it to the runoff, i.e., if there exist a partition and a manipulation such that p is not a unique winner of either subelection. If in this partition we make all manipulators vote to disapprove of only p, p is still not a unique winner of either subelection. So, we can check whether we are in this case by having all manipulators vote to disapprove of only p, and then using the polynomial-time algorithm for approval-DCPV-TE from [42], modified in the obvious way for the nonunique-winner case (see Observation 4.6).

For the “TP” case, replace “\(\le \)” by “<” in Case 1, and “unique winner” by “winner” and “approval-DCPV-TE” by “approval-DCPV-TP” in Case 2. \(\square \)

Below we state a lemma analogous to Lemma A.7, but for approval elections.

Lemma A.21

If there exists a partition of voters such that p is not an approval winner in the “TE” (“TP”) model when all manipulators approve of only p, then there exists a partition such that p can never be made an approval winner by the manipulators in the same tie-breaking model.

Proof

The proof for the “TE” case follows similarly to the proof of Lemma A.7, so we just provide the proof of the “TP” case.

Given an election (CV) and a candidate \(p \in C\), we do the following.

Let \((V_1,V_2)\) be a partition such that p is not a winner when all manipulators approve of only p. If p can never be made a winner by the manipulators in this partition then we are done. So, suppose there exists a manipulation such that p is an overall winner (with the partition \((V_1,V_2)\)). Without loss of generality p is a winner of the subelection \((C,V_1)\). Then if all manipulators in \(V_1\) approve of only p, we know that p remains a winner of \((C,V_1)\). Note we don’t get any new winners in \((C,V_1)\). Since p is not an overall winner if all manipulators approve of only p there is a candidate \(c \ne p\) such that if all manipulators vote for p, c is a winner of \((C,V_2)\) and \({{\text{ score }(c)}} > {{\text{ score }(p)}}\).

Now move all manipulators from \(V_2\) to \(V_1\). Note that c remains a winner of \((C,V_2)\) and that c will always beat p in the runoff. It follows that in this new partition, p is never a winner, no matter what the manipulators do. \(\square \)

Lemma A.21 implies that and are both in P, since control is possible if and only if (nonmanipulator) control is possible when all manipulators approve of only p. This can be checked using the corresponding polynomial-time algorithms from Hemaspaandra et al. [42], modified in the obvious way for the nonunique-winner case (see Observation 4.6).

Theorem A.22

For approval elections, DCPV-\(\left[ \begin{array}{c}\mathrm{TE}\\ \mathrm{TP}\end{array}\right] \)-CF are both in P.

Lemma A.21 above also implies that the corresponding manipulators-first cases are both in P. The proof of the following theorem follows from a similar argument as the proof of Theorem A.9.

Theorem A.23

For approval elections, DCPV-\(\left[ \begin{array}{c}\mathrm{TE}\\ \mathrm{TP}\end{array}\right] \)-MF are both in P.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fitzsimmons, Z., Hemaspaandra, E. & Hemaspaandra, L.A. Control in the presence of manipulators: cooperative and competitive cases. Auton Agent Multi-Agent Syst 34, 52 (2020). https://doi.org/10.1007/s10458-020-09475-6

Download citation

  • Published:

  • DOI: https://doi.org/10.1007/s10458-020-09475-6

Keywords

Navigation