1 Introduction

Reaching an agreement could be hard. The seminal works of Gibbard [30] and Satterthwaite [59] show that one cannot devise a general procedure for aggregating the preferences of strategic agents to a single outcome, besides trivial procedures that a-priori ignore all agents except one (that is, the outcome is based on the preference of a predefined agent) or a-priori rule out all outcomes except two (that is, regardless of the preferences of the agents, the outcome is one of two predefined outcomes). The problem is that agents might act strategically, aiming to get an outcome that they prefer, so there might be scenarios in which for any profile of actions (a possible agreement) at least one of the agents prefers changing her action. Note that while we refer to a procedure and later to a mechanism, this impossibility is not technical but conceptual. We identify a procedure with the conceptual mapping induced by the procedure from the opinions of the agents to an agreement, while the procedure itself could be complex and abstract, e.g., to have several rounds or include a deliberation process between the agents (cheap-talk). For simplicity of terms, we refer to the direct mechanism that implements this mapping. That is, we think of an exogenous entity, the designer, who receives as input the opinions of the agents and returns as output the aggregated decision. This assumption does not hurt the generality, as according to the revelation principle [46], any general procedure is equivalent (w.r.t. the properties we study) to such a direct mechanism.

In many natural scenarios, it is exogenously given that the preferences satisfy some additional rationality property. Hence, the mechanism need not be defined for any profile of preferences, giving rise to mechanisms that are not prone to the above drawbacks. Two prominent examples are Vickrey–Clarke–Groves (VCG) mechanisms and generalized-median mechanisms. VCG mechanisms [12, 32, 55, 72] are the mechanisms that are resistant to manipulations like the ones described above for scenarios in which the preferences of agents are quasi-linear with respect to money [41, Def. 3.b.7],Footnote 1 and monetary transfers are allowed (that is, the outcome space is closed under monetary exchanges between the agents or between the agents and the designer). The second example, Generalized-median mechanisms, does not include monetary transfers and has more of an ordinal flavor. Generalized-median mechanisms [42] are the mechanisms that are resistant to manipulations like above when it is known that the preferences are single-peaked w.r.t. the real line [5]. That is, the outcomes are locations on the real line and each agent has a unique optimal location, \(\ell ^{\star }\), on the line. The preference of an agent over the locations to the right of \(\ell ^{\star }\) is derived by the proximity to \(\ell ^{\star }\), and the preference over the locations to the left of \(\ell ^{\star }\) is derived similarly. For example, in the Euclidean single-peaked case, the preferences for all agents are minimizing the distance to their respective optimal locations.

1.1 The facility location problem

A natural generalization of the second scenario is the facility location problem. In this problem, we are given a metric space over the outcomes (that is, a distance function between outcomes) and it is assumed that the preference of each of the agents is defined by the distance to her optimal outcome: An agent with an optimal outcome \(\ell ^{\star }\) prefers an outcome a over an outcome b if and only if a is closer to \(\ell ^{\star }\) than b. For ease of presentation, throughout this paper, we assume that there are finitely many agents and finitely many locations, and in Sect. 7.1 discuss the extension to the infinite case. In the finite case, a natural way to represent the metric space is using a weighted undirected graph. That is, having a vertex (location) for each outcome and weighted edges between vertices s.t. the distance between any two locations equals the distance between the two respective vertices (or generally to the length of the shortest path between them). Roughly speaking, given such a graph one seeks to find a mechanism that on one hand does not a-priori ignore some of the agents or rule out some of the locations, and on the other hand, is resistant to manipulations of the agents. Facility location problems and, moreover, facility location problems in which the underlying distance metric is a non-trivial combinatorial structure model many real-life scenarios of group decision making in which it is natural to assume some homogeneity between the preferences of different agents (e.g., an additional rationality assumption). These examples include not only locating a common facility, like a school, a bus stop, or a library, but also more general agreement scenarios with a common metric, e.g., a partition of a common budget to several tasks, committee selection, or group decision making with multi-dimensional criteria. Following the story of the facility location problem, we sometimes refer to the outcome of the mechanism as the facility. In this work, we look for mechanisms that satisfy the following desired properties:

Anonymity: The mechanism should not a-priori ignore agents and, moreover, we desire it to treat the agents equally in the following strong sense. The mechanism should be a function of the agents’ votes (which we also refer to as ballots) but not their identities. Formally, the outcome of the mechanism should be invariant to any permutation of the ballots. In practice, most voting systems satisfy this property by first accumulating the different (physical) ballots, thus losing the agents’ identities, and next applying the mechanism on the identity-less ballots.

We would also like the mechanism to treat the locations in an a-priori fair manner. Because of the inherent asymmetry induced by the graph, it is unreasonable to require that all locations are treated equally (i.e., neutrality of the mechanism). Instead, we require the following much weaker property of non-imposition.

Non-imposition/citizen sovereignty [1, 44]: The mechanism should not a-priori rule out a location, and each location should be the outcome of some profile. Formally, the mapping to a facility location should be an onto function.

Furthermore, the mechanism should respect the preferences of the agents and aim to optimize the aggregated welfare of the agents.

Pareto-optimality: The mechanism should not return a location \(\ell \) if there exists another location \(\ell ^{\prime }\) s.t. switching from \(\ell \) to \(\ell ^{\prime }\) benefits one of the agents (move the facility closer to her) while not hurting any of the other agents. In particular, if there exists a unique location that is unanimously most-preferred by all agents, then it must be the outcome. Note that any reasonable notion of aggregated welfare optimization entails Pareto-optimality.

Strategy-proofness: An agent should not be able to change the outcome to a location she strictly prefers by reporting a location different from her true location.

Abstention-proofness:Footnote 2 An agent should not be able to change the outcome to a location she strictly prefers by not casting a ballot.

False-name-proofness: An agent should not be able to change the outcome to a location she strictly prefers by casting more than one ballot.Footnote 3False-name manipulations received less attention in the classic social choice literature since in most voting scenarios there exists a central authority that can enforce a ‘one person, one vote’ principle (but cannot enforce participation or truthful voting). In contrast, many of the voting and aggregation scenarios nowadays are run in a distributed manner on some network and include virtual identities or avatars, which can be easily generated, so a manipulation of an agent pretending to represent many voters is eminent.

Resistance to group manipulations: We also consider a generalization of the above three properties dealing with manipulations of a coalition of agents. We define the preference of a coalition as the unanimous preference of its members. That is, a coalition C weakly prefers an outcome a over an outcome b if all the agents in C weakly prefer a over b. Equivalently, C strictly prefers a over b if

\({\mathbf{(i)}}\):

all the agents in C weakly prefer a over b (C weakly prefers a over b), and

\({\mathbf{(ii)}}\):

at least one agent in C strictly prefers a over b (C does not weakly prefer b over a).

We require that a coalition should not be able to change the outcome to a location it strictly prefers by its members casting untruthful ballots, abstaining, or casting more than one ballot. We note that for onto mechanisms this property entails Pareto-optimality. Nevertheless, we prefer to think of Pareto-optimality as an efficiency requirement and not as a manipulation-resistance requirement.

1.2 Our contribution

In this paper, we define a family of unweighted undirected graphs, which we name \(ZV\)-line graphs, and show a general mechanism for facility location over these graphs that satisfies the desired properties. Roughly speaking, in a \(ZV\)-line graph there are two categories of locations, \(Z\)-locations and \(V\)-locations (and we also refer to them as \(Z\)-vertices and \(V\)-vertices), and the facility is commonly (except if all agents unanimously agree differently) positioned on a \(Z\)-location.Footnote 4 For instance, the \(Z\)-locations could represent commercial locations for locating a public mall, or the set of status-quo outcomes. The mechanism is Pareto-optimal and in particular, it satisfies citizen sovereignty and does not a-priori rule out any location; It is anonymous, so in particular, no agent is ignored; But on the other hand, it is resistant to all the above manipulations. Our mechanism for the \(ZV\)-line graphs family unifies the few mechanisms that are known and it induces mechanisms for many other graphs.Footnote 5 To the best of our knowledge, this is the first work to show a general false-name-proof mechanism for a general family of graphs.

Below, we show several common elementary graphs that are \(ZV\)-line graphs to demonstrate the richness and naturality of this family. The full formal definition of \(ZV\)-line graphs is given in Sects. 3 and 4, and we describe more examples for \(ZV\)-line graphs in Sects. 3.1 and 4.1. Consider the following family of graphs (which is a sub-family of the \(ZV\)-line graphs family and captures the gist of our mechanism). Let \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) be a bipartite unweighted undirected graph with a vertex set \({\mathcal{V}}\) and an edge set \({\mathcal{E}}\). That is, there exists a partition of the verticesFootnote 6\({\mathcal{V}}=V\mathop {{\dot{\cup }}} Z\) s.t. there are no edges between \(V\)-locations and no edges between \(Z\)-locations. We require that

\(\varvec{(a)}\):

There exists a predefined order over the \(Z\)-locations, which we refer to as a left-to-right order.

\(\varvec{(b)}\):

Any of the \(V\)-locations is connected to a contiguous sequence of \(Z\)-locations.

Similar to the single-peaked consistency case [5], one can think of this constraint as a homogeneity constraint over the preferences of agents, i.e., as representing a restriction over the possible preference profiles, focusing on scenarios where voters’ preferences are derived from some common structure. Our mechanism for these graphs:

\(\blacktriangleright \):

The mechanism returns the leftmost Pareto-optimal \(Z\)-location if one exists.Footnote 7

\(\blacktriangleright \):

If no location in \(Z\) is Pareto-optimal, then necessarily all agents voted for the same location, and the mechanism returns this location.

For example, bicliques (full bipartite graphs) can be represented as a \(ZV\)-line graph in which each \(V\)-location is connected to all the \(Z\)-locations (For example, Fig. 1). We use below for \(Z\)-locations and \(\varvec{\blacklozenge }\) for \(V\)-locations).

Fig. 1
figure 1

The (5, 7)-biclique (Color figure online)

Our mechanism for biclique graphs:

\(\blacktriangleright \):

If all agents voted unanimously for the same location, the mechanism returns this location.

\(\blacktriangleright \):

If all agents voted for \(V\)-locations, the mechanism returns the leftmost \(Z\)-location.

\(\blacktriangleright \):

Otherwise, the mechanism returns the leftmost \(Z\)-location that was voted for.

Notice that in this case, the order over the \(Z\)-locations is arbitrary (as well as the choice of one of the sides to be the \(Z\)-locations) in the sense that it is not derived from the graph but is a parameter of the mechanism. For instance, the order might represent the social norm of the society.

A second example is the discrete line graph, which can be represented as a \(ZV\)-line graph in which every two consecutive \(Z\)-locations are connected by a unique \(V\)-location (For example, Fig. 2).

Fig. 2
figure 2

The line graph of 16 locations (Color figure online)

Using this representation we can show strategy-proof, false-name-proof, anonymous, Pareto-optimal facility location mechanisms for the discrete line that are distinct from the characterization of these mechanisms for the continuous line of Todo et al. [67]. Todo et al. [67, Thm. 2] showed that the strategy-proof, false-name-proof, anonymous, Pareto-optimal facility mechanisms for the continuous line are the mechanisms that return the closest Pareto-optimal location to some predefined location, which are a subfamily of the generalized median mechanisms. The mechanism for the discrete line that corresponds to the above representation as a \(ZV\)-line graph is:

\(\blacktriangleright \):

If all agents voted unanimously for the same location, the mechanism returns this location.

\(\blacktriangleright \):

If the leftmost ballot (according to the order of the line) is a \(V\)-location, the mechanism returns the \(Z\)-location to its right.

\(\blacktriangleright \):

If the leftmost ballot is a \(Z\)-location, the mechanism returns this location.

In particular, this mechanism commonly returns one of the \(Z\)-locations, which constitute only fifty percent of the vertices.

Two elementary graphs that are generalizations of (the \(ZV\)-line graph representation of) the discrete line graph can be seen in Fig. 3 in which every two consecutive \(Z\)-locations are connected by two \(V\)-locations, and the \(2\times n\) grid (For example, see Fig. 4) which can be represented as a \(ZV\)-line graph in which every three consecutive \(Z\)-locations are connected by a unique \(V\)-location (see Fig. 5).

Fig. 3
figure 3

A generalization of the discrete line graph (Color figure online)

Fig. 4
figure 4

The \(2\times 7\) grid

Fig. 5
figure 5

The \(2\times 7\) grid (Color figure online)

A common property to all the above examples is their regularity. All the \(V\)-locations have the same degree and all the \(Z\)-locations have the same degree. An example we encountered of a non-regular graph for which a mechanism exists is which can be represented as a non-regular bipartite \(ZV\)-line graph as can be seen in Fig. 6.

Fig. 6
figure 6

Representing as a \(ZV\)-line graph (Color figure online)

In the definition of the \(ZV\)-line graphs family (Definition 5) we extend the above family (and extend the mechanism accordingly) in two steps:

  • First, we extend it to define simple \(ZV\)-line graphs (Definition 3) by allowing edges between \(Z\)-locations under a connectivity constraint, similar to the connectivity constraint we had on edges between \(V\)-locations and \(Z\)-locations. A \(Z\)-location can be connected (in addition to \(V\)-locations as above), to a consecutive sequence of \(Z\)-locations to its immediate right and a consecutive sequence of \(Z\)-locations to its immediate left (and any of the sequences might be empty).

  • Second, replacing any location in a \(Z\)-line graph by a tree, a clique, or any other \(ZV\)-line graph.

For example, the \(ZV\)-line graph in Fig. 7 is the outcome of taking a graph of the type of Fig. 3 and (See also Fig. 12 and the description next to it)

\(\varvec{(a)}\):

adding an edge between the second and third \(Z\)-locations,

\(\varvec{(b)}\):

replacing some of the locations by cliques, trees, and bicliques, which are \(ZV\)-line graphs.

Fig. 7
figure 7

A (non-simple) \(ZV\)-line graph (Color figure online)

In particular, as we discuss in Sects. 3.1 and 4.1, the \(ZV\)-line graphs family includes natural families like trees, cliques, bicliques, and block graphs [33], as well as all connected graphs of at most five locations (except the cycle of five locations) and all graphs for which (as far as we found) a false-name-proof mechanism was known to the community.

Last, we discuss two families of graphs: discrete cycles and recursive \(ZV\)-line graphs, that is, \(ZV\)-line graphs that are defined via a recursive construction, e.g., trees, cliques, and block graphs. We show that for recursive \(ZV\)-line graphs, a recursive simple mechanism is easily derived from our result. We show that there are no group-manipulation-resistant, Pareto-optimal, anonymous mechanisms for cycles of size greater than 5, and that cycles of size lower than 5 are \(ZV\)-line graphs. The cycle of size five is not a \(ZV\)-line graph, and we show the family of group-manipulation-resistant, Pareto-optimal, anonymous mechanisms for this graph, which is similar to the mechanism we present for \(ZV\)-line graphs.

1.3 Related work

Facility location problems model many common natural settings in which each agent is characterized by her ideal location and based on these locations a facility is positioned, (with some objective function in mind, e.g., locating bus stops to minimize the distance to the costumers or locating railroad stations to minimize the unpredictability of delivery schedules). The study of facility location problems arose from combinatorial optimization and aimed at finding the optimal placement of a facility or facilities to minimize transportation costs for servicing customers. Besides locating actual facilities, the problem has also found a wide range of applications in other fields such as healthcare and clustering. It is also used for modeling more abstract scenarios, not of a geographical nature, like elections (both for single winners and for committees). Because of its practical importance, variations of facility location problems have attracted significant attention for a long time from different fields, such as operations research, theoretical computer science, economics, and computational social choice.

The study of facility location problems when considering that the agents are strategic and might report untruthfully was first studied by Moulin [42]. In his work, Moulin [42] characterized the strategy-proof facility location mechanisms for the continuous line when the preferences of the agents can be represented using a single-peaked function of the facility location. Border and Jordan [6] characterized the strategy-proof facility location mechanisms for the continuous line when the agents’ preferences are derived by the Euclidean distance, and Schummer and Vohra [60] considered the cases of the continuous cycle and trees. Problems of facility location on discrete graphs were also studied by Dokow et al. [18], who characterized the strategy-proof mechanisms for discrete lines and discrete cycles.

Other variants of the facility location problem were also considered in the literature. Church and Garfinkel [11], Ibara and Nagamochi [34], Cheng et al. [10] studied facets of the obnoxious facility location problem (also called the locating a bad problem or single-dipped preferences). In this settings, the preference of an agent is to position the facility as far as possible from her ideal location, e.g., when positing a central polluting or noisy common facility; Feigenbaum and Sethuraman [22]; Zou and Li [82] analyzed scenarios in which the facility might be beneficial for some of the agents but obnoxious to others; Procaccia and Tennenholtz [53] studied scenarios in which an agent controls multiple locations; Feldman et al. [25] studied the impact of constraining the input language of the agents; and Wada et al. [73] studied a dynamic version of the problem, when agents join and leave over time and there is a cost of moving the facility, and a dynamic population version when the number of agents is not a-priori known to the designer.

The problem of positioning several facilities was also studied extensively. E.g., when the preference of an agent is defined by the distance facility closest to her [8, 20, 28, 29, 39, 53], farthest from her [8], the average distance to a facility [61], or some (individual) convex combination of the distances [27].

For a more extensive survey on facility location problems in general, we refer the reader to the book of Farahani and Hekmatfar [21]. For a more recent survey, especially of the computational aspects of the strategic questions, we refer the interested reader to the work of Chan et al. [7].

False-name-proofness was first introduced by Yokoo et al. [79, (based on a series of previous conference papers)] in the framework of combinatorial auctions. In this work, the authors showed that the VCG mechanism does not satisfy false-name-proofness in the general case, and they proposed a property of the preferences under which this mechanism becomes false-name-proof. A similar concept was also studied in the framework of peer-to-peer systems by Douceur [19] under the name Sybil attacks.

Following this work, a series of false-name-proof for various specific scenarios had been developed: Yokoo et al. [78], Yokoo [76] and Zhao et al. [81] presented mechanisms for combinatorial auctions which are false-name-proof under additional constraints on the valuations; Tsuruta et al. [70] studies redistributed mechanisms for single-item auctions; Yokoo et al. [77], Iwasaki et al. [35], and Terada and Yokoo [64] presented mechanisms for multi-unit auctions; Sakurai and Yokoo [56], Sakurai and Yokoo [57] and Yokoo et al. [80] presented mechanisms for double auction scenarios; and Suyama and Yokoo [63] studied combinatorial multi-attribute procurement auctions. For general combinatorial auctions, Yokoo et al. [78] and later Yokoo et al. [78], Lehmann et al. [38] conditions on the valuation guaranteeing that false-name bidding is not profitable in the VCG mechanism, and Todo et al. [66] showed that sub-additivity of the allocation rules characterizes the false-name-proof mechanisms.

Similar false-name-manipulation concepts were defined and analyzed for other scenarios as well. Conitzer [15] analyzed false-name-proof mechanisms in voting scenarios; Moulin [45] studied a related problem of routing-proofness in networks; Penna et al. [52] studied cost-sharing games; Todo et al. [68] studied mechanisms for online auction mechanisms, in which bidders arrive and depart over time; Todo and Conitzer [65] studied matching mechanisms; and Tsuruta et al. [71] studied false-name-proof cake-cutting procedures. A similar concept was also applied for cooperative games by Aziz et al. [4] and Lasisi and Allan [37]. In these works, they analyzed, given a weighted voting scenario, by how much an agent can change her power (as measured by the Shapley–Shubik index or the Banzhaf index), by splitting her weight among several false-name identities.

Last, in addition to the design of false-name-proof mechanisms, more direct ways to fight false-name-manipulations were also considered in the literature. For instance, adding a cost to sending too many false-name ballots [74, 75] (e.g., using CAPTCHA), attempting to create tests that are easy for a person to pass once but difficult to pass more than once [14], or adding a weak-verification procedure of some the identities (e.g., limiting the number of submissions per IP address or verifying identity uniqueness for a small number of agent groups [13]).Footnote 8 For a short survey of this literature, we refer the interested reader to the work of Conitzer and Yokoo [16].

False-name-proof mechanisms for facility location scenarios were first studied by Todo et al. [67]. In this work, the authors characterized the false-name-proof mechanisms for facility location on the continuous line and on continuous trees. This work is the closest to ours in the false-name-proof mechanism design for facility location literature (In fact, this is the only work we are aware of that precedes the AAMAS version of our work [49]). The proof techniques we use here are different from the techniques used by Todo et al. [67]. In their work, they essentially note that any manipulation-resistant mechanism is in particular strategy-proof and using this insight to reduce the characterization problem to previous characterizations of strategy-proof mechanisms. In our work, we do not use previous characterizations but prove the properties directly.

The problem of positioning an obnoxious facility on a graph was studied by Ono et al. [51] and Todo et al. [69]. In their work, Ono et al. [51] also defined the property of rename-proofness (which is a weakening of false-name-proofness but still a generalization of strategy-proofness), and studied this property for both deterministic and random mechanisms. False-name-proof mechanisms for positioning several facilities (under heterogeneous preferences) were also studied by Sonoda et al. [62] and Ono et al. [51].

An interesting recent addition to this literature was presented by Okada et al. [50]. In this work, the authors apply automated mechanism design [58] techniques to show existence and non-existence of false-name-proof mechanisms for facility location for several graphs by translating the question to the question of formula satisfiability and using a Boolean satisfiability (SAT) solver.

1.3.1 Approximate mechanism design

The characterization of manipulation-resistant mechanisms for facility location is highly related to problems in Approximate mechanism design without money [53]. In these problems, agents are characterized using cardinal utilities, and the designer seeks to find an outcome maximizing a desired target function (e.g., the sum of utilities, the product of utilities, or the minimal utility). These works bound the trade-off between the target function and manipulation-resistance. They bound the loss to the target function due to manipulation-resistance constraints.

For instance, bounds on the sum of costs (the Harsanyi social welfare) were derived for false-name-proof facility location mechanisms on the continuous line and continuous trees by Todo et al. [67], strategy-proof facility location on the continuous cycle by Alon et al. [3], and for strategy-proof facility location on the discrete cycle by Dokow et al. [18]. Alon et al. [2, 3], Fotakis and Tzamos [28], and Schummer and Vohra [60] proved bounds on the maximum cost of an agent due to requiring strategy-proofness, Feldman and Wilf [24] bounded the approximation of the optimal \(L_{2}\) norm (sum of the squared distances of the agents) due to requiring strategy-proofness, and Feigenbaum et al. [23] bounded the approximation of the optimal \(L_{p}\) norm. The approximation bounds for the problem of positioning several facilities (where the cost of an agent is her distance to the closest facility) was studied by (to name a few) Fotakis and Tzamos [29], Fotakis and Tzamos [28], Lu et al. [40], and Procaccia and Tennenholtz [53].

For a more extensive survey on approximation bounds for facility location problems, we refer the interested reader to the surveys by Cheng and Zhou [9] and by Chan et al. [7].

In this work, we do not analyze the approximation implications of the characterization, and in particular, we do not assume a specific cardinal representation of the preference of agents. Yet, we claim that for most natural representations and target functions, the approximation ratio is expected to be bad. For example, recall the mechanism for biclique graphs (Fig. 1). In this mechanism, the facility might be positioned on an ‘extremely’ left \(Z\)-location. Moreover, the facility might be very far from the vast majority of the agents, resulting in a very bad approximation ratio for most reasonable target functions. This phenomenon is not specific to biclique graphs. For most \(ZV\)-line graphs, due to the false-name-proof requirement, the facility might be positioned on a location extremely far from almost all agents, resulting in a very bad approximation ratio (roughly, the number of agents times the diameter of the graph) for most reasonable target functions. As we show in Sect. 5.1, this phenomenon is not unique to facility location problems. One faces similar lower bounds on the approximability in voting scenarios, auctions, and other mechanism design problems.

Note that modeling the agents using cardinal utilities and looking for a false-name-proof mechanism maximizing, e.g., the sum of utilities (instead of Pareto-optimality), will not circumvent this problem. Roughly speaking, the false-name-proofness means that the designer must act as-if each of the agents represents the vast majority of society since an agent should not benefit even from casting a colossal number of identical ballots. Hence, a choice to benefit some agents at the expense of others (i.e., returning a non-Pareto-optimal location) will result in an unbounded loss. Thus, we claim that when one aims to construct false-name-proof mechanisms, Pareto-optimality is essentially equivalent to most social welfare target functions, so this expected bad approximation is also expected under most cardinal notions of efficiency.

2 Model

Consider a graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) with a set of vertices \({\mathcal{V}}\) and a set of undirected unweighted edges \({\mathcal{E}}\subseteq \left( {\begin{array}{c}{\mathcal{V}}\\ 2\end{array}}\right) \). We refer to the vertices \(v\in {\mathcal{V}}\) also as locations and use the two terms interchangeably. The distance between two locations \(v,u\in {\mathcal{V}}\), denoted \(d\left( v,u\right) \), is the length of the shortest path connecting v and u, and the distance between a location \(v\in {\mathcal{V}}\) and a set of locations \(S\subseteq {\mathcal{V}}\), \(d\left( v,S\right) \), is defined as the minimal distance between v and a location in S. For simplicity, we assume the graph is connected, so the distances are finite, and in Sect. 7.1 discuss the extension to disconnected graphs. We define \({\mathcal{B}}\left( v,d\right) \), the ball of radius \(d\geqslant 0\) around a location \(v\in {\mathcal{V}}\), to be the set of locations of distance at most d from v,

$$\begin{aligned} {\mathcal{B}}\left( v,d\right) =\left\{ u\in {\mathcal{V}}\;\vert \;d\left( v,u\right) \leqslant d\right\} \text {.} \end{aligned}$$

We say that two locations are neighbors if there is an edge connecting them and denote by \(N\left( v\right) \) the set of neighbors of a location v.

An instance of the facility location problem over \({\mathcal{G}}\) comprises n agents who are located on vertices of \({\mathcal{V}}\). Formally, we represent it by a location profile \({\varvec{x}}\in {\mathcal{V}}^{n}\) where \(x_{i}\) is the location of Agent i and n is the number of agents in the profile. We also use the notation \({\mathcal{V}}^{\star }\) for the set of all profiles of a finite number of agents, i.e., \({\mathcal{V}}^{\star }=\bigcup _{t\geqslant 0}{\mathcal{V}}^{t}\). We use the notations \(x_{C}\) for the location profile of the agents in a given coalition of agents C and \(x_{-C}\) for the location profile of the agents outside of the coalition C. In this work, we assume the preference of an agent is defined by her distance to the facility: An agent located on \(x_{}\in {\mathcal{V}}\) strictly prefers the facility being positioned on \(v\in {\mathcal{V}}\) over it being positioned on \(u\in {\mathcal{V}}\) if \(d\left( x_{},v\right) <d\left( x_{},u\right) \). In particular, the most preferred facility location for an agent is her own location. Given an instance \({\varvec{x}}\), we would like to position a facility on a vertex of the graph while taking into account the preferences of the agents over the locations. We also think of \({\mathcal{F}}\) as a voting procedure: Each agent casts a ballot with her location, and based on the ballots, \({\mathcal{F}}\) returns the location for the facility.

A general facility location mechanism (or shortly a mechanism) defines a location for the facility for all location profiles of all sizes (i.e., for any number of ballots). We introduce the notation \({\mathcal{V}}^{\star }=\bigcup _{t\geqslant 0}{\mathcal{V}}^{t}\) for the set of all profiles of a finite number of agents. Hence, we represent the mechanism by a function \({\mathcal{F}}:{\mathcal{V}}^{\star }\rightarrow {\mathcal{V}}\). We say that a mechanism is anonymous if the outcome \({\mathcal{F}}\left( {\varvec{x}}\right) \) does not depend on the identities of the agents, i.e., it can be defined as a function of the ballot tally, the number of ballots for each of the locations.

2.1 Manipulation-resistance

A strategic agent might act untruthfully if she thinks it might cause the mechanism to return a location she prefers (that is, a location closer to her). In this work, we consider the following manipulation types:

  • Misreport: An agent might report to the mechanism a location different from her true location.

  • False-name-vote: An agent might pretend to be several agents and submit several (not necessarily identical) ballots.Footnote 9

  • Abstention: An agent might choose not to participate in the mechanism at all.

A mechanism in which no agent benefits from these manipulations, regardless of the ballots of the other agents, is said to be strategy-proof, false-name-proof, and abstention-proof, respectively. We also consider a generalization of these manipulations to manipulations of a coalition, and say a mechanism is group-manipulation-resistant if no coalition can change the outcome, by misreporting, false-name-voting, or abstaining, to a different location that they unanimously agree is no worse than the original outcome (that is, when they vote truthfully) and at least one agent in the coalition strictly prefers the new outcome over the original outcome. Note that this is a rather strong manipulation-resistance requirement. A coalition cannot find a deviation that is beneficial for one of its members without hurting one of its other members, not even one in which different agents use different types of individual deviations.

Definition 1

(Group-manipulation-resistanceFootnote 10) An anonymous mechanism \({\mathcal{F}}\) is group-manipulation-resistant if there exists no coalition of agents \(C\subseteq \left\{ 1,\ldots ,n\right\} \), a profile of locations \({\varvec{x}}\in {\mathcal{V}}^{n}\), and a set of ballotsFootnote 11\({\varvec{A}}\in {\mathcal{V}}^{\star }\) s.t.

\(\mathbf {(i)}\):

All the agents in C weakly prefer \({\mathcal{F}}\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \), that is, the outcome when the agents outside of C do not change their vote and the agents of C replace their ballots by \({\varvec{A}}\), over \({\mathcal{F}}\left( {\varvec{x}}\right) \).

\(\mathbf {(ii)}\):

At least one agent in C strictly prefers \({\mathcal{F}}\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \) over \({\mathcal{F}}\left( {\varvec{x}}\right) \).

We note that for C being a singleton, this definition coincides with resistance to misreporting for \(\left| {\varvec{A}}\right| =1\), with resistance to false-name-voting for \(\left| {\varvec{A}}\right| \!>\!1\), and with resistance to abstention for \({\varvec{A}}=\emptyset \).

2.1.1 The revelation principle

One could consider more general mechanisms in which the agents vote using more abstract ballots, and define similar manipulation-resistance notions for the general framework. Applying a simple direct revelation principle [46] shows that any such general manipulation-resistant mechanism is equivalent to a manipulation-resistant mechanism in our framework: The two mechanisms implement the same mapping of the private preferences of the agents to a location for the facility, and since the above properties are defined w.r.t. the mapping they are invariant to this transformation. That is, given some general mechanism M that maps abstract actions to a location for the facility and a behavior protocol D that maps types of the agents (i.e., locations) to actions of M, if D satisfies the generalized desiderata, then the direct mechanism \(M\circ D\) satisfies our desiderata.

2.2 Efficiency

So far, we have defined the desired manipulation-resistance properties of a mechanism. On the other hand, we would also like the mechanism to respect the preferences of the agents. We would like to avoid a scenario in which, after the mechanism has been used, the agents can agree that a different location is preferable. Given a location profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\), the set of Pareto-optimal locations, \(PO\left( {\varvec{x}}\right) \), is the set of all locations that the agents cannot agree to rule out. Formally, given a location profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\) and two locations \(v,u\in {\mathcal{V}}\), we say that u Pareto-dominates v w.r.t. \({\varvec{x}}\) if

\(\mathbf {(i)}\):

all agents weakly prefer u over v and

\(\mathbf {(ii)}\):

at least one agent strictly prefers u over v.

We say that v is Pareto-optimal w.r.t. \({\varvec{x}}\) (\(v\in PO\left( {\varvec{x}}\right) \)) if it is not Pareto-dominated by any other location in \({\mathcal{V}}\). We say a mechanism is Pareto-optimal if \({\mathcal{F}}\left( {\varvec{x}}\right) \in PO\left( {\varvec{x}}\right) \) for any profile of ballots (locations) \({\varvec{x}}\).

In particular, Pareto-optimality entails unanimity, whenever all the agents unanimously vote for the same location, the mechanism outputs this location, and entails citizen sovereignty, the mechanism is onto and does not a-priori rule out any location. When all the agents unanimously vote for the same location \(\ell \), any other location is Pareto-dominated by \(\ell \), so \(\ell \) is the unique Pareto-optimal location, and the mechanism outputs \(\ell \). Citizen sovereignty is entailed since any location \(\ell \) is the output for the profile in which all ballots are equal to \(\ell \).

The Pareto-optimality correspondence has several interesting combinatorial properties which are out of the scope of this work. It is easy to see that if Agent i’s top-choice is location \(\ell \), then \(\ell \) cannot be Pareto-dominated by any other location. Hence,

Claim 1

\({\varvec{x}}\subseteq PO\left( {\varvec{x}}\right) \), for any location profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\).

A more general property is the following.

Claim 2

Given a location profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\) and two locations u and v in \({\varvec{x}}\), for any distance \(d\in \left[ 0,d\left( u,v\right) \right] \) there exists a location \(\ell \in {\mathcal{V}}\) s.t.

$$\begin{aligned} \ell \in PO\left( {\varvec{x}}\right) \text { and }\left\{ \begin{array}{l} d\left( \ell ,u\right) =d\\ d\left( \ell ,v\right) =d\left( u,v\right) -d\text {,} \end{array}\right. \end{aligned}$$

i.e., \(\ell \) is a Pareto-optimal location that lies on a shortest path between u and v.

Proof of Claim 2

Let \(\ell ^{\prime }\) be a location on some shortest path between u to v s.t. \(d\left( \ell ^{\prime },u\right) =d\) and \(d\left( \ell ^{\prime },v\right) =d\left( u,v\right) -d\). If \(\ell ^{\prime }\notin PO\left( {\varvec{x}}\right) \), then (since Pareto-dominance is an order) there exists a Pareto-optimal location \(\ell \in PO\left( {\varvec{x}}\right) \) that Pareto-dominates \(\ell ^{\prime }\), and in particular

$$\begin{aligned} d\left( \ell ,u\right) \leqslant d\left( \ell ^{\prime },u\right) \quad \text { and }\quad d\left( \ell ,v\right) \leqslant d\left( \ell ^{\prime },v\right) \text {.} \end{aligned}$$

On the other hand,

$$\begin{aligned} d\left( \ell ,u\right) +d\left( \ell ,v\right) \geqslant d\left( u,v\right) =d\left( \ell ^{\prime },u\right) +d\left( \ell ^{\prime },v\right) \text {.} \end{aligned}$$

Hence,

$$\begin{aligned} \left\{ \begin{array}{l} d\left( \ell ,u\right) =d\left( \ell ^{\prime },u\right) =d\\ d\left( \ell ,v\right) =d\left( \ell ^{\prime },v\right) =d\left( u,v\right) -d\text {.} \end{array}\right. \end{aligned}$$

\(\square \)

2.3 Relaxing false-name-proofness

The false-name-proofness property might seem too strong desideratum since we do not bound the number of false-name-ballots a manipulator might cast. Addressing this concern, we show that assuming either abstention-proofness or strategy-proofness, this property is equivalent to resistance to only one additional false-name-ballot of the manipulator.

Definition 2

(Weak false-name-proofness) We say a mechanism \({\mathcal{F}}\) is a weakly-false-name-proof mechanism, if for any Agent i there no profile \({\varvec{x}}\) in which Agent i can get an outcome she strictly prefers over \({\mathcal{F}}\left( {\varvec{x}}\right) \) by casting one additional ballot.

Proposition 1

Let \({\mathcal{F}}\) be an anonymous weakly-false-name-proof mechanism.

  • If \({\mathcal{F}}\) satisfies abstention-proofness, then \({\mathcal{F}}\) satisfies false-name-proofness.

  • If \({\mathcal{F}}\) satisfies strategy-proofness, then \({\mathcal{F}}\) satisfies false-name-proofness.

Proof

Let \({\varvec{x}}\in {\mathcal{V}}^{\star }\) be a profile and \(A=\left\{ a_{1},\ldots ,a_{k}\right\} \subseteq {\mathcal{V}}\) a multi-set of ballots and we will show that Agent i weakly prefers the outcome \({\mathcal{F}}\left( x_{i},{\varvec{x}}_{-i}\right) \) over the outcome \({\mathcal{F}}\left( A,{\varvec{x}}_{-i}\right) \), i.e., A is not a false-name manipulation for Agent i in \({\varvec{x}}\). We define the following sequence of \(\left( k+2\right) \) profiles:

$$\begin{aligned}&- {\varvec{x}}^{\left( 0\right) }=\left\langle x_{i},\,{\varvec{x}}_{-i}\right\rangle \\&- \hbox {For }t=1,\ldots ,k: {\varvec{x}}^{\left( t\right) }=\left\langle x_{i},a_{1},\ldots ,a_{t},\,{\varvec{x}}_{-i}\right\rangle \\&- {\varvec{x}}^{\left( k+1\right) }=\left\langle a_{1},\ldots ,a_{k},\,{\varvec{x}}_{-i}\right\rangle =\left\langle A,{\varvec{x}}_{-i}\right\rangle \end{aligned}$$

We assumed that the mechanism is resistant to Agent i casting one additional ballot. Hence, Agent i weakly prefers the outcome \({\mathcal{F}}\left( {\varvec{x}}^{\left( t-1\right) }\right) \) over the outcome \({\mathcal{F}}\left( {\varvec{x}}^{\left( t\right) }\right) \) for \(t=0,\ldots ,k-1\). In particular, Agent i weakly prefers \({\mathcal{F}}\left( x_{i},{\varvec{x}}_{-i}\right) \) over \({\mathcal{F}}\left( {\varvec{x}}^{\left( k-1\right) }\right) \) and over \({\mathcal{F}}\left( {\varvec{x}}^{\left( k\right) }\right) \). Now,

  • If \({\mathcal{F}}\) satisfies abstention-proofness, then Agent i weakly prefers the outcome \({\mathcal{F}}\left( {\varvec{x}}^{\left( k\right) }\right) \) over the outcome \({\mathcal{F}}\left( {\varvec{x}}^{\left( k+1\right) }\right) \) and hence also \({\mathcal{F}}\left( x_{i},{\varvec{x}}_{-i}\right) \) over the outcome \({\mathcal{F}}\left( A,{\varvec{x}}_{-i}\right) \).

  • If \({\mathcal{F}}\) satisfies strategy-proofness, then Agent i weakly prefers the outcome \({\mathcal{F}}\left( {\varvec{x}}^{\left( k-1\right) }\right) \) over the outcome \({\mathcal{F}}\left( {\varvec{x}}^{\left( k+1\right) }\right) \) and hence also \({\mathcal{F}}\left( x_{i},{\varvec{x}}_{-i}\right) \) over the outcome \({\mathcal{F}}\left( A,{\varvec{x}}_{-i}\right) \).

\(\square \)

2.4 Order-based mechanisms

A natural class of Pareto-optimal anonymous mechanisms are the Order-based mechanisms. These mechanisms are defined using an order \(\pi \) over the locations. Given a location profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\) the mechanism returns the first location according to \(\pi \) in \(PO\left( {\varvec{x}}\right) \). It is easy to see that these mechanisms are Pareto-optimal, anonymous, and invariant to agents casting the same ballot several times, i.e., these mechanisms depend of the support of \({\varvec{x}}\). In many scenarios, it is easier to analyze which properties of the order \(\pi \) will result in manipulation resistance of the mechanism than analyzing the full class of mechanisms.

In Appendix A, we show that the anonymous, Pareto-optimal, group-manipulation-resistant, order-based mechanisms are a strict subset of the anonymous, Pareto-optimal, group-manipulation-resistant mechanisms, and that there might be anonymous Pareto-optimal mechanisms which are not order-based mechanisms and even group-manipulation-resistant mechanisms that are not invariant to ballot-duplication. This, in contrast to the general voting scenario when the preferences are unconstrained. For this scenario, Conitzer [15, Corollary 1] showed that for any false-name-proof voting rule, given that a vote is cast at least once, it does not matter how many times it is cast.

Claim 3

There exists an anonymous, Pareto-optimal, group-manipulation-resistant mechanism \({\mathcal{F}}\) for the (2, 3)-biclique s.t. \({\mathcal{F}}\) is not an order-based mechanism.

Claim 4

There exists an anonymous, Pareto-optimal, group-manipulation-resistant mechanism \({\mathcal{F}}\) for the cycle of size four s.t. \({\mathcal{F}}\) is not invariant to ballot duplication. In particular, \({\mathcal{F}}\left( {\varvec{x}}\right) \) cannot be defined as a function of the support of \({\varvec{x}}\).

3 Simple \(ZV\)-line graphs

In this work, we define a family of graphs, \(ZV\)-line graphs, and present a simple and general mechanism for this family. This family is defined by introducing a simple combinatorial structure: A partition of the locations into two categories and a connectivity constraint. One could think of the partition as representing a social agreement or a social norm according to which the mechanism is defined, e.g., a subset of status-quo locations or an a-priori priority hierarchy over the locations. The connectivity constraint (as the graph in general) represents homogeneity over the preferences of different agents, that is, a restriction over the possible preference profiles, focusing on scenarios where the preferences share some common structure. This allows us to construct a group-manipulation-resistant mechanism.

We first define the basic case, the simple \(ZV\)-line graphs family, and afterwards extend it recursively to define general \(ZV\)-line graphs.Footnote 12

Definition 3

(Simple \(ZV\)-line graphs) An unweighted undirected connected graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) is a simple \(ZV\)-line graph w.r.t. a partition of the vertices into two disjoint sets \({\mathcal{V}}=V\mathop {{\dot{\bigcup }}} Z\) and a full linear order over \(Z\), if

  • There are no edges between different locations in \(V\) (\(V\)-locations), i.e., for any \(V\)-location \(v\in V\), \(N\left( v\right) \subseteq Z\).

    Moreover, for any \(V\)-location \(v\in V\), \(N\left( v\right) \) is a contiguous sequence of \(Z\)-locations.

  • For any \(Z\)-location \(z\in Z\), \({\mathcal{B}}\left( z,1\right) \cap Z\) is a contiguous sequence of \(Z\)-locations.

We say that a graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) is a simple \(ZV\)-line graph, if it is a simple \(ZV\)-line graph w.r.t. some partition of the vertices into two disjoint sets \({\mathcal{V}}=V\mathop {{\dot{\bigcup }}} Z\) and a full linear order over \(Z\).

For simplicity of description, we refer later to the order over the \(Z\)-locations as a left-to-right order. We also use the terms \(V\)-locations, \(Z\)-locations, \(V\)-vertices, and \(Z\)-vertices for the respective sets of locations.

For example, the graphs of Figs. 1235 and 6 in the introduction are all simple \(ZV\)-line graphs:

  • There are no edges between \(Z\)-locations, so \({\mathcal{B}}\left( z,1\right) \cap Z=\left\{ z\right\} \) for all \(z\in Z\), and they are ordered on a horizontal line.

  • The \(V\)-locations are the vertices denoted by \(\varvec{\blacklozenge }\).

  • Each \(V\)-location is connected to a contiguous sequence of \(Z\)-locations.

Two examples of simple \(ZV\)-line graphs with no \(V\)-locations are the clique graph with any order over the locations and the line graph with the natural order (note this is a different representation as a simple \(ZV\)-line graph from the one in Fig. 2). Note also that bicliques are \(ZV\)-line graphs w.r.t. any order over the \(Z\)-locations. That is, a graph could be a simple \(ZV\)-line graph w.r.t. several representations.

Given a simple \(ZV\)-line graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) that is a simple \(ZV\)-line graph w.r.t. a given partition of the vertices \({\mathcal{V}}=V\mathop {{\dot{\bigcup }}} Z\) and an order over \(Z\), we define the following facility location mechanism \({\mathcal{F}}_{\mathrm{sZV}}^{\star }:{\mathcal{V}}^{\star }\rightarrow {\mathcal{V}}\).

Definition 4

(\({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) - A mechanism for simple \(ZV\)-line graphs) For a simple \(ZV\)-line graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \), given a ballot profile (location reports of the agents) \({\varvec{x}}\in {\mathcal{V}}^{\star }\),

\(\blacktriangleright \):

If all agents voted unanimously to a unique location \(\ell \in {\mathcal{V}}\) (i.e., all ballots are identical), return \(\ell \).

\(\blacktriangleright \):

Otherwise, return the leftmost Pareto-optimal \(Z\)-location.

First, we claim that \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) satisfies the following properties:

\(\varvec{{\mathcal{F}}_{\mathrm{sZV}}^{\star }}\) is well-defined: (I.e., there is always a Pareto-optimal \(Z\)-location in the second case): If one of the ballots is a \(Z\)-location, then this location is Pareto-optimal. In case that all ballots are \(V\)-locations and there exist two non-identical ballots u and v, then by Claim 2 there exists a Pareto-optimal location \(\ell \) in distance 1 of u. Since all neighbors of a \(V\)-location are \(Z\)-locations, we get that \(\ell \in Z\).

\(\varvec{{\mathcal{F}}_{\mathrm{sZV}}^{\star }}\) can be computed in polynomial time: We can find all Pareto-dominated locations (i.e., \({\mathcal{V}}{\setminus }PO\left( {\varvec{x}}\right) \)) in polynomial time in the following way:

  • Foreach location \(\ell \in {\mathcal{V}}\)

  • Foreach location \(\ell ^{\prime }\in {\mathcal{V}}\)

    • If \(\forall b\in {\varvec{x}}\quad d\left( b,\ell ^{\prime }\right) \leqslant d\left( b,\ell \right) \) and \(\exists b\in {\varvec{x}}\quad d\left( b,\ell ^{\prime }\right) <d\left( b,\ell \right) \),

      • then \(\ell \) is a Pareto-dominated location.

Hence, finding \(PO\left( {\varvec{x}}\right) \) and finding the leftmost location in \(PO\left( {\varvec{x}}\right) \cap Z\) can be done in polynomial time. Since finding whether all ballots are identical can be done in polynomial time, we get that \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) can be computed in polynomial time.

\(\varvec{{\mathcal{F}}_{\mathrm{sZV}}^{\star }}\) is an order-based mechanism: \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) can be equivalently defined as returning the first Pareto-optimal location in \({\mathcal{V}}\) according to the following (predefined) order: First, check whether any of the \(Z\)-locations is a Pareto-optimal location, from left to right; Then, iterate over the \(V\)-locations in some arbitrary order. This is an equivalent definition since there is no Pareto-optimal \(Z\)-location only in case that all ballots are identical.

Note that \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) is defined w.r.t. a given partition and order, so when there are several different partitions for \({\mathcal{V}}\), e.g., when \({\mathcal{G}}\) is a biclique, different mechanisms could arise. It is also important to note that we do not assume that the agents know the partition and the order, but they know the mechanism \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\). In other words, we see this structure as a combinatorial property of a graph that derives the preferences of agents and could represent some homogeneity of the preferences or a social norm of giving priority to the \(Z\)-locations.

Proposition 2

(\({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) satisfies the desired properties) Let \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) be a simple \(ZV\)-line graph. Then \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) is an anonymous, Pareto-optimal, group-manipulation-resistant mechanism for \({\mathcal{G}}\). That is, \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) satisfies:

For any location profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\), a coalition of agents C, and a set of ballots \({\varvec{A}}\in {\mathcal{V}}^{\star }\), \({\varvec{A}}\) is not a beneficial deviation for C.Footnote 13

Proof of Proposition 2

The anonymity of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) is trivial from its definition as a function of the ballots while ignoring the identity of the agents. It is also easy to see that the outcome of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) will always be a Pareto-optimal location. Both in the first case, in which it equals the set of all ballots, and in the second case, in which it is a Pareto-optimal \(Z\)-location.

To prove the main part of the proposition, we assume towards a contradiction that there exists a profile of locations (ballots) \({\varvec{x}}\in {\mathcal{V}}^{\star }\), a coalition of agents C, and a set of ballots \({\varvec{A}}\in {\mathcal{V}}^{\star }\), s.t. the coalition C can cast \({\varvec{A}}\) and change the outcome to be \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \) that it strictly prefers. That is, all the agents in C weakly prefer \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \) over \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) ={\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}_{C},{\varvec{x}}_{-C}\right) \) and at least one agent in C, Agent i for \(i\in C\), strictly prefers \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \) over \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \). \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \in PO\left( {\varvec{x}}\right) \) and in particular the coalition of all agents does not strictly prefer \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \) over \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \). Hence, there exists an Agent j, for \(j\notin C\), who strictly prefers \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) over \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \).

\(\underline{\text{If}\;{\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right)\;\text{is\;a} \;V\text{-location}} \): Then necessarily, all the ballots in \({\varvec{x}}\) are identical and equal to \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \). In contradiction to Agent i strictly preferring \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \) over \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \).

Similarly, \(\underline{\text{if}\;{\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right)\text{is\;a}\;V\text{-location} }\): Then necessarily, all the ballots in \(\left\langle {\varvec{A}},{\varvec{x}}_{-C}\right\rangle \) are identical and equal to \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \). In contradiction to Agent j strictly preferring \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) over \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \).

\(\underline{\text{If\,both}\,{\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right)\,\text{and}\,{\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right)\,\text{are}\,Z\text{-locations}} \):

First, we prove the following two auxiliary lemmata.

Lemma (i) For any \(v\in {\mathcal{V}}\) and \(d\geqslant 1\), \({\mathcal{B}}\left( v,d\right) \cap Z\) is a non-empty contiguous sequence of \(Z\)-locations.

Proof

We prove the lemma via induction over d.

For \(d=1\): \({\mathcal{B}}\left( v,1\right) \cap Z\) is a contiguous sequence of \(Z\)-locations by the definition of simple \(ZV\)-line graphs.

For \(d\geqslant 2\): \({\mathcal{B}}\left( v,d\right) \cap Z=\bigcup _{u\in {\mathcal{B}}\left( v,1\right) }\left( {\mathcal{B}}\left( u,d-1\right) \cap Z\right) \). Next, by noticing that for any \(u\in {\mathcal{B}}\left( v,1\right) {\setminus }\left\{ v\right\} \)

  • By the induction hypothesis \({\mathcal{B}}\left( u,d-1\right) \cap Z\) is a non-empty contiguous sequence of \(Z\)-locations;

  • \(\left( {\mathcal{B}}\left( u,1\right) \cap Z\right) \bigcap \left( {\mathcal{B}}\left( v,1\right) \cap Z\right) \ne \emptyset \), since either u or v is a \(Z\)-vertex in the intersection; and

  • \(\left( {\mathcal{B}}\left( u,d-1\right) \cap Z\right) \bigcap \left( {\mathcal{B}}\left( v,d-1\right) \cap Z\right) \supseteq \left( {\mathcal{B}}\left( u,1\right) \cap Z\right) \bigcap \left( {\mathcal{B}}\left( v,1\right) \cap Z\right) \),

we set that all the operands in \(\bigcup _{u\in {\mathcal{B}}\left( v,1\right) }\left( {\mathcal{B}}\left( u,d-1\right) \cap Z\right) \) intersect the non-empty contiguous sequence of \(Z\)-locations \({\mathcal{B}}\left( v,d-1\right) \cap Z\), and hence also \({\mathcal{B}}\left( v,d\right) \cap Z\) is a non-empty contiguous sequence of \(Z\)-locations. \(\square \)

Lemma (ii) Let \({\varvec{x}}\) be a location profile s.t. \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \in Z\) and let \(v\in Z\) be a location s.t. Agent i strictly prefers v over \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \). Then \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) is to the left of v.

Proof

If \(d\left( x_{i},v\right) =0\), i.e., \(x_{i}=v\), then it is a \(Z\)-location so \(v=x_{i}\in PO\left( {\varvec{x}}\right) \cap Z\). By the definition of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\), \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) is to the left of v. Henceforth, we assume that \(d\left( x_{i},v\right) \geqslant 1\).

If \(x_{i}\) is a \(Z\)-location, then \(x_{i}\in PO\left( {\varvec{x}}\right) \cap Z\) and by the definition of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\), \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) is to the left of \(x_{i}\). Since \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \notin {\mathcal{B}}\left( x_{i},d\left( x_{i},v\right) \right) \cap Z\) and since by Lemma (i), \({\mathcal{B}}\left( x_{i},d\left( x_{i},v\right) \right) \cap Z\) is a non-empty contiguous sequence of \(Z\)-locations which includes \(x_{i}\), we get that \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) is to the left of \({\mathcal{B}}\left( x_{i},d\left( x_{i},v\right) \right) \cap Z\) and in particular to the left of v.

If \(x_{i}\) is a \(V\)-location, then since \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \ne x_{i}\) there exists an Agent j s.t. \(x_{j}\ne x_{i}\) and by Claim 2 there exists a location \(\ell \in PO\left( {\varvec{x}}\right) \) s.t. \(d\left( \ell ,x_{i}\right) =1\), i.e., \(\ell \in N\left( x_{i}\right) \). By the definition of simple \(ZV\)-line graphs, \(\ell \) is a \(Z\)-location and hence \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) is to the left of \(\ell \) (or is equal to it). Since by Lemma (i),

$$\begin{aligned} \ell \in {\mathcal{B}}\left( x_{i},1\right) \cap Z\subseteq {\mathcal{B}}\left( x_{i},d\left( x_{i},v\right) \right) \cap Z\text {,} \end{aligned}$$

both sets are contiguous sequences of \(Z\)-locations, and \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \notin {\mathcal{B}}\left( x_{i},d\left( x_{i},v\right) \right) \cap Z\), we get that \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) is to the left of v. \(\square \)

By applying Lemma (ii) for the profile \({\varvec{x}}\) and Agent i, we get that \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) is to the left of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \). Similarly, by applying this lemma for the profile \(\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \) and Agent j, we get that \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{A}},{\varvec{x}}_{-C}\right) \) is to the left of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \). Hence, we get a contradiction. \(\square \)

Note that bipartiteness of the graph is not a sufficient condition for group-manipulation-resistance of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\). For example, \(C_{6}\), the cycle of size 6, is a bipartite graph but there exists no anonymous Pareto-optimal mechanism for \(C_{6}\) which is resistant even to manipulations by a single agent (In Sect. 6, we generalize this and show that there exists no such mechanism for \(C_{n}\) for any \(n\geqslant 6\)).

Proposition 3

There is no anonymous Pareto-optimal mechanism for \(C_{6}\), the cycle of six locations, that is resistant even to manipulations of a single agent.

Proof

Assume towards a contradiction that \({\mathcal{F}}\) is a Pareto-optimal, anonymous, group-manipulation-resistant mechanism for \(C_{6}\). We denote the locations of \(C_{6}\) by \(\left\{ 0,1,2,3,4,5\right\} \), and w.l.o.g. assume that for the profile of six agents who vote for all six locations the outcome is 0 (see Fig. 8).

Fig. 8
figure 8

The cycle of size 6, \(C_6\)

For the profile \(\varvec{\left\langle 2,\,4,\,5\right\rangle }\): From resistance to false-name manipulations of the first and last agents, the outcome must be either 0 or 4 (Since any of them can change the result to be 0 by adding false-ballots). From the Pareto-optimality of \({\mathcal{F}}\), the outcome cannot be 0 which is Pareto-dominated by 4. Hence, the outcome for the profile \(\varvec{\left\langle 2,\,4,\,5\right\rangle }\) is 4.

Similarly, for the symmetric profile \(\varvec{\left\langle 1,\,2,\,4\right\rangle }\) the outcome must be 2. From false-name-resistance the outcome for the profile \(\varvec{\left\langle 2,\,4\right\rangle }\) must also be 2 (Otherwise, the first agent will cast an additional false-ballot 1 to get the outcome to be 2).

But, the second agent in the profile \(\varvec{\left\langle 2,\,4\right\rangle }\) (who is located on 4) can change the outcome to be 4 that she strictly prefers by casting one additional false-name ballot 5. So we get a contradiction. \(\square \)

We also note that Proposition 2 does not hold for weighted graphs. Consider the weighted graph in Fig. 9 and a profile in which Alice is located on \(z_{r}\) and Bob is located on v. Then the outcome of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) is \(z_{r}\), but Bob can move the facility to a preferred location \(z_{\ell }\) both \(\varvec{(i)}\) by misreporting \(z_{\ell }\); hence, \({{\mathcal{F}}^{\star }}\) is not strategy-proof; and \(\varvec{(ii)}\) by false-name-voting \(z_{\ell }\) besides his truthful ballot, hence, \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) is not false-name-proof.Footnote 14

Fig. 9
figure 9

Proposition 2 does not hold for weighted graphs

Last, we note that there exist simple mechanisms that satisfy subsets of the properties of Proposition 2:

  • The fixed mechanism, which always positions the facility on a predefined location ignoring the votes of the agents, is trivially group-manipulation-resistant and anonymous for any graph, but it is not onto and hence not Pareto-optimal.

  • A dictatorship of the first agent, i.e., a mechanism that always positions the facility on the location reported by the first agent, is not anonymous, but it is group-manipulation-resistant for any graph.Footnote 15

  • The median mechanism, which minimizes the sum of distances between the facility and the ballots, is an anonymous Pareto-optimal mechanism for any graph. For some graphs, e.g., the discrete line, it also satisfies strategy-proofness and abstention-proofness both against one manipulator and against a coalition, but an agent can benefit by casting multiple identical ballots.

  • Also the mean mechanism, which minimizes the sum of squares of the distances between the facility and the ballots, is an anonymous Pareto-optimal mechanism for any graph, but it might not be strategy-proof or false-name-proof even against one agent, e.g., for the discrete line graph (it is abstention-proof, though).

3.1 Examples of Simple \(ZV\)-line graphs

In this subsection, we study several graph families that we show are simple \(ZV\)-line graphs, by that also illustrating the richness of the family of simple \(ZV\)-line graphs. We also present some of the mechanisms for these graphs that are derived from our main result. As we saw previously, cliques, lines, and bicliques are simple \(ZV\)-line graphs.

Claim 5

For any \(n\geqslant 1\), the clique over n locations,

$$\begin{aligned} K_{n}=\left\langle {\mathcal{V}}=\left\{ 1,\ldots n\right\} ,{\mathcal{E}}=\left\{ \left( i,j\right) \;\vert \;i\ne j\right\} \right\rangle \end{aligned}$$

(that is, the graph over n locations with an edge between any two locations), is a simple \(ZV\)-line graph w.r.t. the \(Z\)-locations being all n locations with any order over them.

Claim 6

For any \(n\geqslant 1\), the discrete line of n locations,

$$\begin{aligned} P_{n}=\left\langle {\mathcal{V}}=\left\{ 1,\ldots n\right\} ,{\mathcal{E}}=\left\{ \left( i,i+1\right) \;\vert \;i=1,\ldots ,n-1\right\} \right\rangle \text {,} \end{aligned}$$

is a simple \(ZV\)-line graph w.r.t. the following partitions of \({\mathcal{V}}\)

  • w.r.t. the \(Z\)-locations being all n locations with the natural order over them;

  • w.r.t. the \(Z\)-locations being the \(\left\lceil \frac{n}{2}\right\rceil \) odd-indexed locations with the natural order over them; or in general

  • w.r.t. the \(Z\)-locations being the complement of an independent set of vertices.

(Note that these vertex partitions result in different mechanisms).

Claim 7

For any \(n,m\geqslant 1\), the biclique over n and m locations,

$$\begin{aligned} K_{m,n}=\left\langle {\mathcal{V}}=\left\{ 1,\ldots n\right\} \mathop {{\dot{\cup }}} \left\{ n+1,\ldots n+m\right\} ,{\mathcal{E}}=\left\{ \left( i,j\right) \;\vert \;i\leqslant n<j\right\} \right\rangle \end{aligned}$$

(that is, the graph with n locations on one side, m locations on the other side and an edge between any two locations of opposite sides), is a simple \(ZV\)-line graph w.r.t. \(Z\)-locations being the first n locations with any order over them and the other m locations being the \(V\)-locations.

Next, we note that all connected graph with at most five locations but one are simple \(ZV\)-line graphs.

Claim 8

Let \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) be a connected graph with at most five locations, \(\left| {\mathcal{V}}\right| \leqslant 5\). If \({\mathcal{G}}\ne C_{5}\) (the cycle of size 5), then \({\mathcal{G}}\) is a simple \(ZV\)-line graph. (\(C_{5}\) is not a simple \(ZV\)-line graphs but still there exists a group-manipulation-resistant, anonymous, Pareto-optimal mechanism for \(C_{5}\)).

We prove this claim in Appendix B by showing for each of the graphs a partition to \(V\)-locations and \(Z\)-locations with an order over the latter. In Sect. 6 we show that \(C_{5}\) is not a simple \(ZV\)-line graphs but still there exists a group-manipulation-resistant, anonymous, Pareto-optimal mechanism for \(C_{5}\) which is also an order-based mechanism.

Last, the following three propositions show that small perturbations of cliques, the outcome of adding locations or removing edges, are also simple \(ZV\)-line graphs.

Proposition 4

Let \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) be a graph with a vertex set \({\mathcal{V}}\) and an edge set \({\mathcal{E}}\), and let \({\mathcal{V}}={\widetilde{V}}\mathop {{\dot{\cup }}} V^{\left( 1\right) }\mathop {{\dot{\cup }}} V^{\left( 2\right) }\mathop {{\dot{\cup }}} \cdots \mathop {{\dot{\cup }}} V^{\left( k\right) }\) (for \(k\geqslant 1\) and \({\widetilde{V}}\ne \emptyset \)) be a partition of the vertex set \({\mathcal{V}}\) s.t. (See Fig. 10)

  • The restriction of \({\mathcal{G}}\) to \({\mathcal{V}}{\setminus }{\widetilde{V}}\) is a clique. That is, for any two locations \(v,u\notin {\widetilde{V}}\quad \left( v,u\right) \in {\mathcal{E}}\); and

  • For any location \(v\in {\widetilde{V}}\), \(N\left( v\right) =V^{\left( i\right) }\) for some partition element \(V^{\left( i\right) }\) (\(i\in \left\{ 1,\ldots ,k\right\} \))

Then \({\mathcal{G}}\) is a simple \(ZV\)-line graph.

Fig. 10
figure 10

Example 15 for Proposition 4 (Color figure online)

Proof

We claim that \({\mathcal{G}}\) is a simple \(ZV\)-line graph w.r.t. taking the \(Z\)-locations to be \(Z={\mathcal{V}}{\setminus }{\widetilde{V}}\) and an order over \(Z\) s.t. \(V^{\left( i\right) }\) is a contiguous sequence of locations for \(i=1,\ldots ,k\). Note that such an order exists since the sets \(V^{\left( i\right) }\) are disjoint.

  • There are no edges between different \(V\)-locations.

  • For any \(Z\)-location \(z\in Z\), \({\mathcal{B}}\left( z,1\right) \cap Z={\mathcal{V}}{\setminus }{\widetilde{V}}=Z\).

  • For \(i=1,\ldots ,k\), \(N\left( v_{i}\right) \) is a contiguous sequence of \(Z\)-locations by our choice of the order.

Hence, \({\mathcal{G}}\) is a simple \(ZV\)-line graph. \(\square \)

Proposition 5

Let \(K_{n}{\setminus } e\) be the outcome of removing one edge from a clique of size n. That is, \(K_{n}{\setminus } e:=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) s.t. \(\left| {\mathcal{V}}\right| =n\) and there exist two locations \(u,v\in {\mathcal{V}}\) s.t. \({\mathcal{E}}=\left( {\begin{array}{c}{\mathcal{V}}\\ 2\end{array}}\right) {\setminus }\left\{ \left( u,v\right) \right\} \). Then \({\mathcal{G}}\) is a simple \(ZV\)-line graph.

Proof

W.l.o.g., assume that \({\mathcal{E}}=\left( {\begin{array}{c}{\mathcal{V}}\\ 2\end{array}}\right) {\setminus }\left\{ \left( v_{1},v_{2}\right) \right\} \). Then by choosing \({\widetilde{V}}=\left\{ v_{1}\right\} \), \(V^{\left( 1\right) }=\) \(\left\{ v_{2},\ldots ,v_{n}\right\} \), and applying Proposition 4 we get that \(K_{n}{\setminus } e\) is a simple \(ZV\)-line graph (w.r.t. \(Z=\left\{ v_{2},\ldots ,v_{n}\right\} \) and any order over \(Z\)).\(\square \)

Generalizing Proposition 5, we get the following proposition.

Proposition 6

For \(1<m<n\), let \(K_{n}{\setminus }K_{m}\) be the outcome of removing a clique of size m from the clique of size n (See Fig11),

$$\begin{aligned} K_{n}{\setminus }K_{m}:=\left\langle {\mathcal{V}}=\left\{ 1,\ldots n\right\} ,{\mathcal{E}}=\left\{ \left( i,j\right) \;\vert \;i\ne j\right\} {\setminus }\left\{ \left( i,j\right) \;\vert \;i,j\leqslant m\text { and }i\ne j\right\} \right\rangle \text {.} \end{aligned}$$

Then \({\mathcal{G}}\) is a simple \(ZV\)-line graph.

Fig. 11
figure 11

\(K_{7}{\setminus }K_{4}\)

Proof

We define \({\widetilde{V}}=\left\{ v_{1},\ldots ,v_{m}\right\} \), \(V^{\left( 1\right) }=\left\{ v_{m+1},\ldots ,v_{n}\right\} \). We note that for any location \(v\in {\widetilde{V}}\), \(N\left( v\right) =V^{\left( 1\right) }\) and that the graph restricted to \(V^{\left( 1\right) }\) is a clique of size \(\left( n-m\right) \). Hence, by applying Proposition 4 we get that \(K_{n}{\setminus }K_{m}\) is a simple \(ZV\)-line graph (w.r.t. \(Z=\left\{ m+1,\ldots ,n\right\} \) and any order over \(Z\)). \(\square \)

4 \(ZV\)-line graphs

Next, we extend our result for a larger family of graphs. In this section, we show two recursive constructions, of graphs and of mechanisms, extending the desired mechanism for simple \(ZV\)-line graphs we showed, to a wider family which we name \(ZV\)-line graphs.

Given a graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) we say that a sequence of non-empty sets of locations \(V_{0},V_{1},\cdots ,V_{k}\subseteq {\mathcal{V}}\) (\(k\geqslant 0\)) is a non-trivial cover of \({\mathcal{V}}\) if

$$\begin{aligned} \begin{array}{l} {\mathcal{V}}=V_{0}\cup V_{1}\cup \cdots \cup V_{k}\\ \text {and }V_{i}\nsubseteq V_{j}\text { for all }i\ne j\text {.} \end{array} \end{aligned}$$

We extend the definition of simple \(ZV\)-line graphs to define general \(ZV\)-line graphs using the following inductive construction. We also define one of the locations of the \(ZV\)-line graph to be the root of the graph, and denote it by \({\mathcal{R}}\left( {\mathcal{G}}\right) \).

Definition 5

(\(ZV\)-line graphs)

  • Any simple \(ZV\)-line graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) is a \(ZV\)-line graph, and we define its root \({\mathcal{R}}\left( {\mathcal{G}}\right) \) to be its leftmost \(Z\)-location.

  • Given an unweighted undirected connected graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) and a non-trivial cover of its vertices, \(V_{\bot },V_{1},\cdots ,V_{k}\subseteq {\mathcal{V}}\) (\(k\geqslant 1\)): \({\mathcal{G}}\) is a \(ZV\)-line graph w.r.t. the cover \(V_{\bot },V_{1},\cdots ,V_{k}\) if

    1. 1.

      The projection of \({\mathcal{G}}\) on \(V_{\bot }\), \({\mathcal{G}}_{\bot }=\left\langle {\mathcal{V}}=V_{\bot },{\mathcal{E}}={\mathcal{E}}\cap \left( {\begin{array}{c}V_{\bot }\\ 2\end{array}}\right) \right\rangle \), is a \(ZV\)-line graph.

    For \(i=1,\ldots ,k\):

    1. 2.

      The projection of \({\mathcal{G}}\) on \(V_{i}\), \({\mathcal{G}}_{i}=\left\langle {\mathcal{V}}=V_{i},{\mathcal{E}}={\mathcal{E}}\cap \left( {\begin{array}{c}V_{i}\\ 2\end{array}}\right) \right\rangle \), is a \(ZV\)-line graph.

    2. 3.

      The root of \({\mathcal{G}}_{i}\), \({\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \), is the unique location in \(V_{i}\cap V_{\bot }\).

    3. 4.

      There are no edges between locations in \(\left( V_{i}{\setminus }\left\{ {\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \right\} \right) \) and locations outside of \(V_{i}\). (Equivalently, all paths between locations of \(V_{i}\) and locations outside of \(V_{i}\) include the root \({\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \)).

    4. 5.

      \(\left( V_{i}{\setminus }\left\{ {\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \right\} \right) \cap \left( V_{j}{\setminus }\left\{ {\mathcal{R}}\left( {\mathcal{G}}_{j}\right) \right\} \right) =\emptyset \quad \text { for }i\ne j\) in \(\left\{ 1,\ldots ,k\right\} \).

    If \({\mathcal{G}}\) is a \(ZV\)-line graph w.r.t. the cover \(V_{\bot },V_{1},\cdots ,V_{k}\), we define its root to be \({\mathcal{R}}\left( {\mathcal{G}}\right) ={\mathcal{R}}\left( {\mathcal{G}}_{\bot }\right) \).

We say that a graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) is a \(ZV\)-line graph, if it is either a simple \(ZV\)-line graph or a \(ZV\)-line graph w.r.t. some non-trivial cover of \({\mathcal{V}}\).

For ease of description, we refer to the inductive operation of connecting a graph \({\mathcal{G}}_{i}\) to \({\mathcal{G}}_{\bot }\) as above as planting. We extend the root function \({\mathcal{R}}\left( \cdot \right) \) to locations and sets of locations of non-simple \(ZV\)-line graphs. Given a \(ZV\)-line graph \({\mathcal{G}}\) w.r.t. a cover \(V_{\bot },V_{1},\cdots ,V_{k}\), we define the root of a location \(v\in {\mathcal{V}}\), \({\mathcal{R}}\left( v\right) \), to be v if \(v\in V_{\bot }\) and \({\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \) if \(v_{i}\in V_{i}{\setminus }V_{\bot }\) for some \(i\in \left\{ 1,\ldots ,k\right\} \). Given a set (or a profile) of locations we define the root of the set to be \({\mathcal{R}}\left( S\right) =\left\{ {\mathcal{R}}\left( v\right) \;\vert \;v\in S\right\} \), i.e., the roots of the locations in S.

For example, Fig. 7 in the introduction can be constructed in three stages in the following way (see Fig. 12).

\(\blacktriangleright \):

Figure 12a is a simple \(ZV\)-line graph as we saw in Fig. 3.

\(\blacktriangleright \):

Figure 12b is the outcome of ‘planting’ a 6-Clique (\({\mathcal{G}}_{1}\)), a \(\left( 4,4\right) \)-biclique (\({\mathcal{G}}_{2}\)), a 9-Clique (\({\mathcal{G}}_{3}\)), a line (\({\mathcal{G}}_{4}\)), a 2-clique (\({\mathcal{G}}_{5}\)), a \(\left( 1,3\right) \)-biclique (\({\mathcal{G}}_{6}\)), and a 2-Clique (\({\mathcal{G}}_{7}\)) on locations of Fig. 12a and hence it is a \(ZV\)-line graph.

\(\blacktriangleright \):

Figure 12c is the outcome of ‘planting’ a \(\left( 1,3\right) \)-biclique (\({\mathcal{G}}_{8}\)) on a location of Fig. 12b and hence it is a \(ZV\)-line graph.

Fig. 12
figure 12

A construction of the graph of Fig. 7 (Color figure online)

The combinatorial intuition, which later will help us prove our results, is captured by the following lemma.

Lemma 1

For any location \(\ell \in {\mathcal{V}}\), the preferences of an agent located on \(\ell \) and an agent located on \({\mathcal{R}}\left( \ell \right) \) over the locations of \({\mathcal{G}}_{\bot }\) are identical. That is,

$$\begin{aligned} \forall u,v\in V_{\bot }:\quad d\left( \ell ,u\right) \leqslant d\left( \ell ,v\right) \,\,\iff \,\,d\left( {\mathcal{R}}\left( \ell \right) ,u\right) \leqslant d\left( {\mathcal{R}}\left( \ell \right) ,v\right) \text {.} \end{aligned}$$

Moreover, if \(\ell \in V_{i}\) for some \(i\in \left\{ 1,\ldots ,k\right\} \), then the preferences of an agent located on \(\ell \) and an agent located on \({\mathcal{R}}\left( \ell \right) \) over the locations outside of \(V_{i}{\setminus }V_{\bot }\) are identical. That is,

$$\begin{aligned} \forall u,v\notin V_{i}{\setminus }V_{\bot }:\quad d\left( \ell ,u\right) \leqslant d\left( \ell ,v\right) \,\,\iff \,\,d\left( {\mathcal{R}}\left( \ell \right) ,u\right) \leqslant d\left( {\mathcal{R}}\left( \ell \right) ,v\right) \text {.} \end{aligned}$$

Corollary 1

For any location \(\ell \in {\mathcal{V}}\), if \(\ell \in V_{i}\) for some \(i\in \left\{ 1,\ldots ,k\right\} \), then an agent located on \(\ell \) strictly prefers \({\mathcal{R}}\left( \ell \right) ={\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \) over any other location outside of \(V_{i}\).

Given a non-simple \(ZV\)-line graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) w.r.t. a cover \(V_{\bot },V_{1},\cdots ,V_{k}\) \(\left( k\geqslant 1\right) \) and mechanisms \({\mathcal{F}}_{i}:{\varvec{x}}\in V_{i}^{\star }\rightarrow V_{i}\) for \(i=\bot ,1,\ldots ,k\), we define the following mechanism \({\mathcal{F}}_{\mathrm{rec}}^{\star }:{\mathcal{V}}^{\star }\rightarrow {\mathcal{V}}\).

Definition 6

(\({\mathcal{F}}_{\mathrm{rec}}^{\star }\) -A mechanism for non-simple \(ZV\)-line graphs) For a non-simple \(ZV\)-line graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \), given a ballot profile (location reports of the agents) \({\varvec{x}}\in {\mathcal{V}}^{\star }\),

\(\blacktriangleright \):

If there exists a subgraph \({\mathcal{G}}_{i}\) for some \(i\in \left\{ 1,\ldots ,k\right\} \) s.t. all ballots belong to \(V_{i}\), return \({\mathcal{F}}_{i}\left( {\varvec{x}}\right) \).Footnote 16

\(\blacktriangleright \):

Otherwise, let \({\mathcal{R}}\left( {\varvec{x}}\right) \) be the profile generated by replacing each ballot \(\ell \) by \({\mathcal{R}}\left( \ell \right) \), and return \({\mathcal{F}}_{\bot }\left( {\mathcal{R}}\left( {\varvec{x}}\right) \right) \). (Since \({\mathcal{R}}\left( \ell \right) \in V_{\bot }\) for any location \(\ell \in {\mathcal{V}}\), \({\mathcal{F}}_{\bot }\left( {\mathcal{R}}\left( {\varvec{x}}\right) \right) \) is well-defined.)

The mechanism \({\mathcal{F}}_{\mathrm{rec}}^{\star }\) has a similar interpretation to the interpretation of \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\), with \(V_{\bot }\) taking the role of the \(Z\)-locations: The facility is commonly positioned on a location of \({\mathcal{G}}_{\bot }\) (unless all agents unanimously agree on a different subgraph). For instance, \({\mathcal{G}}_{\bot }\) could represent commercial locations for locating a public mall, the set of status-quo outcomes, or other norms of the society.

Now, we can define our mechanism for \(ZV\)-line graphs, by applying Definition 6 recursively on \({\mathcal{G}}\) and its subgraphs (taking simple \(ZV\)-line graphs and \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) as the base of the recursion).

Definition 7

(\({{\mathcal{F}}^{\star }}\)-The mechanism for \(ZV\)-line graphs) For a \(ZV\)-line graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \), given a ballot profile (location reports of the agents) \({\varvec{x}}\in {\mathcal{V}}^{\star }\),

\(\blacktriangleright \):

If \({\mathcal{G}}\) is a simple \(ZV\)-line graph, return \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \).

\(\blacktriangleright \):

Otherwise, \({\mathcal{G}}\) is a \(ZV\)-line graph w.r.t. some cover \(V_{\bot },V_{1},\cdots ,V_{k}\) (\(k\geqslant 1\)).

\(\blacktriangleright \):

Let \({\mathcal{F}}_{\mathrm{rec}}^{\star }\) be the mechanism as defined in Definition 6 w.r.t. the cover \(V_{\bot },V_{1},\cdots ,V_{k}\) (\(k\geqslant 1\)).

\(\blacktriangleright \):

Return \({\mathcal{F}}_{\mathrm{rec}}^{\star }\left( {\varvec{x}}\right) \).

First, we claim that \({{\mathcal{F}}^{\star }}\) satisfies the following desired properties:

  • \({{\mathcal{F}}^{\star }}\) is an order-based mechanism: If \({\mathcal{G}}\) is a simple \(ZV\)-line graph, then \({{\mathcal{F}}^{\star }}={\mathcal{F}}_{\mathrm{sZV}}^{\star }\) which we already saw is an order-based mechanism.

    If \({\mathcal{G}}\) is a non-simple \(ZV\)-line graph, then \({{\mathcal{F}}^{\star }}={\mathcal{F}}_{\mathrm{rec}}^{\star }\) and we claim that \({\mathcal{F}}_{\mathrm{rec}}^{\star }\) is an order-based mechanism whenever the mechanisms \({\mathcal{F}}_{\bot },{\mathcal{F}}_{1},\ldots ,{\mathcal{F}}_{k}\) are order-based mechanisms (of the respective graphs). This property holds since

    • If \(PO\left( {\varvec{x}}\right) \cap V_{\bot }\ne \emptyset \), then by Lemma 1, \(PO\left( {\varvec{x}}\right) \cap V_{\bot }=PO\left( {\mathcal{R}}\left( {\varvec{x}}\right) \right) \cap V_{\bot }\).

    • There is no Pareto-optimal location in \({\mathcal{G}}_{\bot }\), only if all the ballots belong to a sub-graph \({\mathcal{G}}_{i}\) for some \(i\in \left\{ 1,\ldots ,k\right\} \).

    • For any \(i\in \left\{ 1,\ldots ,k\right\} \), \(PO\left( {\varvec{x}}\right) \cap \left( V_{i}{\setminus }V_{\bot }\right) \ne \emptyset \) only if all the ballots belong to \({\mathcal{G}}_{i}\).

    • For any \(i\in \left\{ \bot ,1,\ldots ,k\right\} \), \({\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \) must be the first location in the order of \({\mathcal{F}}_{i}\), since by the definition of the mechanism when all locations of \({\mathcal{G}}_{i}\) are voted for, the outcome is \({\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \).

    Hence, an equivalent order-based definition of \({\mathcal{F}}_{\mathrm{rec}}^{\star }\) is returning the first Pareto-optimal location in the following order: First, go over the locations in \({\mathcal{G}}_{\bot }\) and then iterate over the locations of the other subgraphs, while for each subgraph \({\mathcal{G}}_{i}\) iterate over its locations according to the order of \({\mathcal{F}}_{i}\).

  • \({{\mathcal{F}}^{\star }}\) can be computed in polynomial time: If \({\mathcal{G}}\) is a simple \(ZV\)-line graph, then \({{\mathcal{F}}^{\star }}={\mathcal{F}}_{\mathrm{sZV}}^{\star }\) which we already saw can be computed in polynomial time.

    Otherwise, it is enough to notice that by Definition 6, if \({\mathcal{F}}_{\bot },{\mathcal{F}}_{1},\ldots ,{\mathcal{F}}_{k}\) can be computed in polynomial time, then \({\mathcal{F}}_{\mathrm{rec}}^{\star }\) can be computed in polynomial time. So, the time complexity of \({{\mathcal{F}}^{\star }}\) can be bounded via a recursive argument.

Our main result shows that \({{\mathcal{F}}^{\star }}\) satisfies the desired efficiency and manipulation-resistance properties.

Theorem 1

(Main result) Let \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) be a \(ZV\)-line graph and let \({{\mathcal{F}}^{\star }}:{\mathcal{V}}^{\star }\rightarrow {\mathcal{V}}\) be the corresponding mechanism as defined in Definition 7. Then \({{\mathcal{F}}^{\star }}\) is an anonymous, Pareto-optimal, group-manipulation-resistant mechanism.

We prove the theorem by structural induction over the set of \(ZV\)-line graphs. We already proved the base case of simple \(ZV\)-line graphs (Proposition 2). The main ingredient in the proof is showing that these desired properties are elevated by the recursive construction of \({\mathcal{F}}_{\mathrm{rec}}^{\star }\) (Definition 6).

Proposition 7

Let \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) be an unweighted undirected connected graph with a non-trivial cover \(V_{\bot },V_{1},\cdots ,V_{k}\) \(\left( k\geqslant 1\right) \), and denote by \({\mathcal{G}}_{i}\) the subgraph \(\left\langle {\mathcal{V}}=V_{i},{\mathcal{E}}={\mathcal{E}}\cap \left( {\begin{array}{c}V_{i}\\ 2\end{array}}\right) \right\rangle \), s.t.

  • For \(i=1,\ldots ,k\), there exists a unique location in \(V_{i}\cap V_{\bot }\), which we denote by \({\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \).

  • For \(i=1,\ldots ,k\), there are no edges between locations in \(\left( V_{i}{\setminus }\left\{ {\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \right\} \right) \) and locations outside of \(V_{i}\). (Equivalently, all paths between locations of \(V_{i}\) and locations outside of \(V_{i}\) include the root \({\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \)).

  • The sets \(\left\{ V_{i}{\setminus }\left\{ {\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \right\} \right\} _{i=1,\ldots ,k}\) are pairwise disjoint.

For \(i=\bot ,1,\ldots ,k\), let \({\mathcal{F}}_{i}:{\varvec{x}}\in V_{i}^{\star }\rightarrow V_{i}\) be a mechanism for \({\mathcal{G}}_{i}\) s.t.

  • \({\mathcal{F}}_{i}\) is an anonymous, Pareto-optimal, group-manipulation-resistant mechanism.

  • For an infinite number of \(\tau \in {\mathbb{N}}\), there exists a profile \({\varvec{x}}\in V_{i}^{\star }\) in which there are at least \(\tau \) ballots for any location in \(V_{i}\) s.t. \({\mathcal{F}}_{i}\left( {\varvec{x}}\right) ={\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \).

Then, for \({\mathcal{F}}_{\mathrm{rec}}^{\star }:{\mathcal{V}}^{\star }\rightarrow {\mathcal{V}}\) as defined in Definition 6,

  • \({\mathcal{F}}_{\mathrm{rec}}^{\star }\) is an anonymous, Pareto-optimal, group-manipulation-resistant mechanism.

  • For any number \(\tau \in {\mathbb{N}}\), there exists a profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\) in which there are at least \(\tau \) ballots for any location in \({\mathcal{V}}\) s.t. \({\mathcal{F}}_{\mathrm{rec}}^{\star }\left( {\varvec{x}}\right) ={\mathcal{R}}\left( {\mathcal{G}}_{}\right) ={\mathcal{R}}\left( {\mathcal{G}}_{\bot }\right) \).

Note that we do not require the subgraphs \(V_{\bot },V_{1},\cdots ,V_{k}\) to necessarily be \(ZV\)-line graphs. This allows us to apply the recursive construction also for graphs for which an anonymous, Pareto-optimal, group-manipulation-resistant mechanism is known but are not \(ZV\)-line graphs (e.g., \(C_{5}\)). We prove Proposition 7 in Appendix C. In fact, we prove a more robust result (Proposition 12) showing that also weaker notions of manipulation-resistance can be lifted from the mechanisms for the subgraphs \({\mathcal{G}}_{i}\) to the mechanism \({{\mathcal{F}}^{\star }}\), e.g., resistance against manipulations of only some coalitions and resistance against only some types of manipulations.

Proof of Theorem 1

We prove the following using structural induction over the recursive definition of \(ZV\)-line graphs (Definition 5).

  • \({{\mathcal{F}}^{\star }}\) is an anonymous Pareto-optimal mechanism.

  • \({{\mathcal{F}}^{\star }}\) is a group-manipulation-resistant mechanism. That is, for any location profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\), a coalition of agents C, and a set of ballots \({\varvec{A}}\in {\mathcal{V}}^{\star }\), \({\varvec{A}}\) is not a beneficial deviation for C.

  • For any number \(\tau \in {\mathbb{N}}\), there exists a profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\) in which there are at least \(\tau \) ballots for any location in \({\mathcal{V}}\) s.t. \({{\mathcal{F}}^{\star }}\left( {\varvec{x}}\right) ={\mathcal{R}}\left( {\mathcal{G}}_{}\right) \).

Base (Simple \(ZV\)-line graphs): When \({\mathcal{G}}\) is a simple \(ZV\)-line graph, we showed in Proposition 2 that \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) is an anonymous, Pareto-optimal, group-manipulation-resistant mechanism. Given \(\tau \in {\mathbb{N}}\), consider the location profile \({\varvec{x}}\) in which each location in \({\mathcal{V}}\) appears in exactly \(\tau \) ballots. Then, \(PO\left( {\varvec{x}}\right) ={\mathcal{V}}\) and by Definition 4, \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\left( {\varvec{x}}\right) \) is the leftmost \(Z\)-location of \({\mathcal{G}}\), which is \({\mathcal{R}}\left( {\mathcal{G}}\right) \).

Step (Non-simple \(ZV\)-line graphs): When \({\mathcal{G}}\) is a non-simple \(ZV\)-line graph, Proposition 7 gives us that whenever the respective mechanisms \({\mathcal{F}}_{i}\) for the subgraphs \({\mathcal{G}}_{i}\) for \(i=\bot ,1,\ldots ,k\) are anonymous, Pareto-optimal, group-manipulation-resistant mechanisms and for an infinite number of \(\tau \in {\mathbb{N}}\), there exists a profile \({\varvec{x}}\in V_{i}^{\star }\) in which there are at least \(\tau \) ballots for any location in \(V_{i}\) s.t. \({\mathcal{F}}_{i}\left( {\varvec{x}}\right) ={\mathcal{R}}\left( {\mathcal{G}}_{i}\right) \), the \({{\mathcal{F}}^{\star }}\) also satisfies the above desired properties. \(\square \)

4.1 Recursive families of \(ZV\)-line graphs

Many graph families are defined using a recursive definition: That is, stating a base case that comprises an initial (and commonly small) family of simple graphs and an inductive step defining graphs in the family as a simple amalgamation of other (more basic) graphs in the family (for example, the second case of the definition of \(ZV\)-line graphs, Definition 5). Given a recursive family of \(ZV\)-line graphs, the mechanism \({{\mathcal{F}}^{\star }}\) of Theorem 1 is a recursive, and hence commonly simple, mechanism that satisfies our desiderata.

Example (i): Rooted trees

A simple example of a recursive family of \(ZV\)-line graphs is rooted trees which can be defined recursively as follows (See also Fig. 13):

  1. Base:

    A tree of height 0 is a single location (and it is also the root of the tree).

  2. Step:

    A tree of height \(h>0\) consists of a location (the root) which is connected to the roots of a non-empty set of trees s.t. the maximal height of them equals \(\left( h-1\right) \).

Fig. 13
figure 13

Trees of height 0, 1, 2 and 3. The new location (the root) added in each step is denoted by . The roots of the sub-graphs of each step are denoted by (Color figure online)

We can see that indeed these graphs are \(ZV\)-line graphs, since a tree of height 0 (single location) and trees of height 1 (bicliques) are simple \(ZV\)-line graphs and the recursive step of the definition satisfies the recursive connectivity constraint of Definition 5. Hence, we get, as a corollary of Theorem 1, that the mechanism that returns the lowest common ancestor of the ballots is an anonymous, Pareto-optimal, group-manipulation-resistant mechanism. Noting that given a tree graph, it is a rooted graph w.r.t. the root being any of the locations, we get that any mechanism \({\mathcal{F}}\) that returns the lowest common ancestor of the ballots w.r.t. some arbitrary root r, or equivalently

$$\begin{aligned} {\mathcal{F}}\left( {\varvec{x}}\right) =\mathop {\mathrm{argmin}}_{v\in PO\left( {\varvec{x}}\right) }d\left( v,r\right) \text {,} \end{aligned}$$

is an anonymous, Pareto-optimal, group-manipulation-resistant mechanism. These are also the mechanisms that Todo et al. [67] characterized as the false-name-proof, anonymous, Pareto-optimal mechanisms for the continuous tree.

Example (ii): A generalization of rooted trees

We show an anonymous, Pareto-optimal, group-manipulation-resistant mechanism for the following family of rooted graphs (that is, \(\left\langle {\mathcal{V}},\,{\mathcal{E}},\,r\right\rangle \) s.t. \({\mathcal{E}}\subseteq \left( {\begin{array}{c}{\mathcal{V}}\\ 2\end{array}}\right) \) and \(r\in {\mathcal{V}}\)). (See also Fig. 14)

Definition 8

(\({\mathcal{C}}\))

  1. Base:

    \(\left\langle \left\{ v\right\} ,\,\emptyset ,\,v\right\rangle \in {\mathcal{C}}\).

  2. Step:

    For any \(k,\ell \geqslant 1\): If \(\left\{ \left\langle {\mathcal{V}}_{i},\,{\mathcal{E}}_{i},\,r_{i}\right\rangle \right\} _{i=1}^{k}\) are graphs in \({\mathcal{C}}\) (and the \({\mathcal{V}}_{i}\) are pairwise disjoint), then also the graph

    $$\begin{aligned} \left\langle \left\{ {\widehat{r}}_{j}\right\} _{j=1}^{\ell }\mathop {{\dot{\cup }}} \left( \mathop {{\dot{\bigcup }}} _{i=1}^{k}{\mathcal{V}}_{i}\right) ,\,\left( \mathop {{\dot{\bigcup }}} _{i=1}^{k}{\mathcal{E}}_{i}\right) \mathop {{\dot{\cup }}} \left\{ \left( {\widehat{r}}_{j},r_{i}\right) \right\} _{\begin{array}{c} i=1\ldots k\\ j=1\ldots \ell \end{array} },\,{\widehat{r}}_{1}\right\rangle \end{aligned}$$

    is in \({\mathcal{C}}\). That is, adding a new layer of \(\ell \) pre-roots, a biclique between the pre-roots and the roots of the sub-graphs, and defining the new root to be one of the pre-roots.

We use the notation \(h\left( {\mathcal{G}}\right) \) for the minimal number of steps needed to generate \({\mathcal{G}}\) and call it the complexity of \({\mathcal{G}}\).

Fig. 14
figure 14

Graphs of complexity 0, 1 and 2. The new pre-roots added in each step are denoted by . The roots of the sub-graphs of each step are denoted by (Color figure online)

We note that the graphs of complexity \(h\left( {\mathcal{G}}\right) =1\) are the bicliques and that by taking \(\ell =1\) in the recursive step of the definition we get the family of rooted trees. Hence, both are sub-families of this family of graphs. We can see that indeed these graphs are \(ZV\)-line graphs by noticing that the recursive step of the definition satisfies the recursive connectivity constraint of Definition 5.

Our mechanism for these graphs:

\(\blacktriangleright \):

Find the subgraph \(G^{\prime }\) of lowest complexity s.t. all ballots belong to \(G^{\prime }\).

\(\blacktriangleright \):

If there exists a ballot for a pre-root of \(G^{\prime }\), the mechanism returns the leftmost pre-root of \(G^{\prime }\) that was voted for.

\(\blacktriangleright \):

Otherwise, the mechanism returns the leftmost pre-root of \(G^{\prime }\).

Notice that the order over the pre-roots is arbitrary, so different mechanisms could arise from different choices of orders and mechanisms for \({\mathcal{G}}_{\bot }\) (For instance, the order might represent the social norm of the society).Footnote 17

Fig. 15
figure 15

The (2,2)-biclique

Example (iii): Block graphs

Our last example is connected block graphs [33].Footnote 18

Definition 9

(Connected block graphs) A connected graph \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) is a block graph if the following equivalent conditions hold:

  • Every biconnected subgraph of \({\mathcal{G}}\) is a clique.Footnote 19

  • The intersection of any two connected subgraphs of \({\mathcal{G}}\) is either empty or connected.

  • For every four vertices \(u,v,w,x\in {\mathcal{V}}\), the largest two of the three distance sums

    $$\begin{aligned} d\left( u,v\right) +d\left( w,x\right) \text {, }\quad d\left( u,w\right) +d\left( v,x\right) \text {,\,and }\quad d\left( u,x\right) +d\left( v,w\right) \end{aligned}$$

    are equal.

In general, any connected graph \({\mathcal{G}}\) decomposes into a tree of biconnected components called the block-cut tree of the graph. The block-cut tree of a graph \({\mathcal{G}}\) is a tree \({\mathcal{T}}\left( {\mathcal{G}}\right) \) that is defined in the following way. In \({\mathcal{T}}\left( {\mathcal{G}}\right) \) there is a vertex (component-vertex) for each maximal biconnected component of \({\mathcal{G}}\) and a vertex (intersection-vertex) for each vertex in \({\mathcal{G}}\) that belongs to more than one maximal biconnected component. There is an edge in \({\mathcal{T}}\left( {\mathcal{G}}\right) \) between each component-vertex and the intersection-vertices belonging to this component.

Hence, since for connected block graphs all maximal biconnected components are cliques, a connected block graph \({\mathcal{G}}\) can be represented by its block-cut tree \({\mathcal{T}}\left( {\mathcal{G}}\right) \) s.t. each component-vertex is labeled by the size of the represented clique and each intersection-vertex is labeled by the indices of the represented vertex in the respective cliques. Moreover, any such labeled tree defines a (unique) block graph.Footnote 20

Given a block graph \({\mathcal{G}}\), its block-cut tree \({\mathcal{T}}\left( {\mathcal{G}}\right) \) induces a recursive structure decomposing \({\mathcal{G}}\) to smaller block graphs. Our mechanism is defined w.r.t. a choice of an arbitrary root of \({\mathcal{T}}\left( {\mathcal{G}}\right) \) and arbitrary orders for every clique over its locations. We can see that indeed these graphs are \(ZV\)-line graphs, by noting that cliques are simple \(ZV\)-line graphs and that the recursive step of the definition satisfies the recursive connectivity constraint of Definition 5.

Our mechanism for a connected block graph \({\mathcal{G}}\) is:

\(\blacktriangleright \):

Find the component \(G^{\prime }\) that is represented by the lowest common ancestor of the ballots.

\(\blacktriangleright \):

If one of the locations of \(G^{\prime }\) was voted for, the mechanism returns the first location of \(G^{\prime }\) (according to the order) that was voted for.

\(\blacktriangleright \):

Otherwise, the mechanism returns the first location of \(G^{\prime }\).

An equivalent definition of this family of mechanisms is returning the closest Pareto-optimal location to some arbitrary location v, breaking ties according to an arbitrary fixed order.

5 Discussion

In this work, we presented a new family of graphs, \(ZV\)-line graphs, and a generic, anonymous, Pareto-optimal, group-manipulation-resistant mechanism for the facility location problem on these graphs (Theorem 1). The mechanism \({{\mathcal{F}}^{\star }}\) we presented is not the only mechanism satisfying the desired properties. For instance, a mechanism that outputs at the second stage of Definition 4 the rightmost Pareto-optimal \(Z\)-location instead of the leftmost would also satisfy the desiderata. Generally, taking any order over the \(Z\)-locations of a simple \(ZV\)-line graph s.t. the constraints of Definition 3 hold and defining \({\mathcal{F}}_{\mathrm{sZV}}^{\star }\) accordingly will satisfy them. As we saw on Claim 4, there exists an anonymous, Pareto-optimal, group-manipulation-resistant mechanism for the cycle of size four, which is a simple \(ZV\)-line graph which is not of the template of Definition 4. On the other hand, we saw in Corollary 2 that for any anonymous, Pareto-optimal, group-manipulation-resistant mechanism \({\mathcal{H}}\) for the cycle of size four, it holds that all agents are ex-post indifferent between \({\mathcal{H}}\) and a mechanism \({\mathcal{F}}\) that is derived by Definition 4. Likewise, also the non-order-based mechanism for the (2, 3)-biclique in Claim 3 is equivalent in this ex-post indifference sense to a mechanism that is derived by Definition 4. We suspect this is also true in general and conjecture that for any \(ZV\)-line graph \({\mathcal{G}}\), the only anonymous, Pareto-optimal, group-manipulation-resistant mechanisms for \({\mathcal{G}}\) are either derived by Definition 4 or equivalent (in this ex-post indifference sense) to a mechanism which is.

Furthermore, unifying the non-existence results we had found, we think that the partition into \(Z\)-locations and \(V\)-locations is a fundamental property of a false-name-proof mechanism. The only non-\(ZV\)-line graphs for which we found an anonymous, Pareto-optimal, group-manipulation-resistant mechanism are the cycle of size 5 (See Sect. 6) and graphs derived from it by Proposition 7, e.g., the graph of Fig. 16.

Fig. 16
figure 16

\(C_{5}\) with a 4-clique planted on its left vertex and a tree planted on its right vertex

We conjecture that the cycle of size 5 is a representative extreme exception and that except for very few small graphs, there are anonymous, Pareto-optimal, group-manipulation-resistant graphs only for \(ZV\)-line graphs.

Conjecture 1

Let \({\mathcal{G}}=\left\langle {\mathcal{V}},{\mathcal{E}}\right\rangle \) be a graph and let \({\mathcal{F}}:{\mathcal{V}}^{\star }\rightarrow {\mathcal{V}}\) be an anonymous, Pareto-optimal, group-manipulation-resistant mechanism for \({\mathcal{G}}\). Then, except for few small graphs, if \({\mathcal{F}}\) is an order-based mechanism, then one of the following two cases holds

  • \(\varvec{(a)}\) \({\mathcal{G}}\) is a simple \(ZV\)-line graph w.r.t. some partition of \({\mathcal{V}}\) to \(V\)-locations and \(Z\)-locations and \({\mathcal{F}}\) is the outcome of applying Definition 4.

  • \(\varvec{(b)}\) There exists a non-trivial cover \(V_{\bot },V_{1},\cdots ,V_{k}\subseteq {\mathcal{V}}\) of \({\mathcal{V}}\) s.t.

    • \({\mathcal{G}}\) is a \(ZV\)-line graph w.r.t. the cover \(V_{\bot },V_{1},\cdots ,V_{k}\);

    • For \(i=\bot ,1,\ldots ,k\): Whenever \({\varvec{x}}\in \left( V_{i}\right) ^{\star }\), i.e., all locations are in \(V_{i}\), also \({\mathcal{F}}\left( {\varvec{x}}\right) \in V_{i}\);

    • The mechanisms \({\mathcal{F}}_{i}:\left( V_{i}\right) ^{\star }\rightarrow V_{i}^{\star }\) that are defined by \({\mathcal{F}}_{i}\left( {\varvec{x}}\right) ={\mathcal{F}}\left( {\varvec{x}}\right) \) are anonymous, Pareto-optimal, group-manipulation-resistant mechanisms, for \(i=\bot ,1,\ldots ,k\); and

    • \({\mathcal{F}}\) is the outcome of applying Definition 6 for the mechanisms \({\mathcal{F}}_{i}\).

On the other hand, if \({\mathcal{F}}\) is not an order-based mechanism, then there exists an order-based mechanism \({\mathcal{H}}\) s.t. all agents are ex-post indifferent between \({\mathcal{F}}\) and \({\mathcal{H}}\) (Hence, \({\mathcal{H}}\) is an anonymous, Pareto-optimal, group-manipulation-resistant mechanism for \({\mathcal{G}}\) too, and the first case holds for \({\mathcal{H}}\)).

Consequentially, showing that a given graph does not have such a structure could be an easy and efficient way to prove the non-existence of an anonymous, Pareto-optimal, group-manipulation-resistant mechanism. The conjecture also implies that all manipulation-resistant anonymous Pareto-optimal mechanisms (up to the above equivalence) are computationally easy to run.

5.1 Approximate mechanism design without money

Assuming Conjecture 1, one gets that whenever there is a large disagreement in the population (i.e., the agents are dispersed over many \(V_{i}\)-subgraphs), an extreme status-quo alternative must be chosen by the mechanism. This raises the natural question of how much efficiency must be sacrificed by requiring manipulation-resistance. That is, assuming the agents are quantitatively represented by a cost function (e.g., the distance to the facility or a monotone function of the distance) and analyzing the implications of manipulation-resistance on the approximability of the minimization problem of natural social cost functions, e.g., the average cost (Harsanyi social welfare), the geometric mean of the costs (similar to the Nash social welfare), or the maximum cost (Rawls’ criterion).

Assuming Conjecture 1 results in a high price of false-name-proofness for most non-trivial graphs (of the order of the number of agents times the diameter of the graph). For comparison, both the mechanism that always outputs a constant location and the random mechanism that outputs one of the ballots at random have a price of false-name-proofness of the same order. Both mechanisms, although they are not deterministic false-name-proofness Pareto-optimal mechanisms and as such are out of the scope of this work, are very simplistic and clearly could not be seen as optimizing social welfare. As we show below, this phenomenon of losing a large portion of performance due to requiring false-name-proofness is not unique to facility location problems, and also in other domains, one could get highly simplistic mechanisms with the same performance as any false-name-proof mechanism. In a sense, this is similar to the impossibility results for unconstrained voting rules of Gibbard [30] and Satterthwaite [59] for deterministic rules, and of Gibbard [31] for random voting rules.

We think this should not be surprising. The false-name-proofness property requires that an agent should not benefit even from casting a colossal number of identical ballots,Footnote 21 and hence the designer must act as if any of the ballots represents the vast majority of society. So when the ballots are dispersed enough, from the viewpoint of the designer, all locations guarantee roughly the same social value (for most natural notions of social value).

False-name-proof combinatorial auctions:

Yokoo et al. [79] showed in their work that there is no false-name-proof mechanism for combinatorial auctions which allocates the resources efficiently, and later results ([54]) showed that false-name-proofness is impossible even under a weaker maximality constraint. Following this work, Iwasaki et al. [36] showed that there is no symmetric false-name-proof mechanism (which also satisfies some apparently minor assumptions) that is guaranteed to get more than \(\frac{2}{m+1}\) of the optimal social welfare, for m being the number of resources and there are strictly more agents than resources, even when all bidders are single-minded ([36, Thm. 2]). On the other hand, this efficiency approximation is achieved by a trivial mechanism that auctions the grand bundle in a second-price auction ([36, Thm. 3]), in particular, ignoring most of its input and the combinatorial aspect of the scenario.

False-name-proof voting scenarios:

In general voting settings, Conitzer [15] showed that all neutral anonymous false-name-proof voting rules must have a non-negligible random component (and in particular could not be deterministic) and in many scenarios must be far from maximizing any reasonable quantitative efficiency criterion. For instance,

  • Unless there is unanimity among the voters on some pair of alternatives, any false-name-proof voting rule must choose the winner uniformly at random. This holds even when there are only two alternatives.

  • If there are at least three alternatives, then under any false-name-proof voting rule, for any profile, the probability of any given alternative to win is at most \(\nicefrac {2}{m}\). Moreover, even when all agents top-rank the same alternative and even when all agents hold the same preference, there is no false-name-proof voting rule which outputs this top-ranked alternative with probability higher than \(\nicefrac {2}{m}\).

False-name-proof facility-location on the continuous line:

Todo et al. [67] showed that any false-name-proof facility-location mechanism for the continuous line could not guarantee to get the sum of agents’ costs below \(\nicefrac {C}{n}\) of the optimal, for n being the number of agents and C being some (mechanism-dependent) constant. In this work, they also showed that there is no false-name-proof facility-location mechanism for the continuous line that guarantees to get the maximum cost of an agent below \(\nicefrac {1}{2}\) of the optimal. On the other hand, they showed that both approximability bounds are achieved by the false-name-proof mechanism that outputs the leftmost ballot.

6 The discrete cycle over n locations

In this section, we characterize the discrete cycle graphs over n locations, \(C_{n}\), for which a group-manipulation-resistant, anonymous, Pareto-optimal mechanism exists. In particular, we show that for a large enough cycle (\(n\geqslant 6\)), there is no anonymous Pareto-optimal mechanism that is resistant even to manipulations of a single agent. On the other hand, we show that for smaller cycles, one can construct group-manipulation-resistant, anonymous, Pareto-optimal mechanisms.

\(\varvec{C_{2}}\) , \(\varvec{C_{3}}\) , \(\varvec{C_{4}}\) :

These three graphs are \(ZV\)-line graphs: \(C_{2}\) and \(C_{3}\) are cliques and hence can be defined as \(ZV\)-line graphs with only \(Z\)-locations (and any order over them), \(C_{4}\) is a \(\left( 2,2\right) \)-biclique and hence can be defined as a \(ZV\)-line graph w.r.t. taking two non-adjacent locations to be the \(Z\)-locations (and any order over them) and two singleton \(V_{i}\)-subgraphs consisting of the other two locations. Moreover, we show that there are no other mechanisms for \(C_{2}\) and \(C_{3}\) and that all other mechanisms for \(C_{4}\) are in some sense equivalent to the above mechanism. (The proofs of the following propositions can be found in Appendix D).

Proposition 8

  • The only false-name-proof, anonymous, Pareto-optimal mechanisms for \(C_{2}\) are the two order-based mechanisms.

  • The only false-name-proof, anonymous, Pareto-optimal mechanisms for \(C_{3}\) are the six order-based mechanisms.

Proposition 9

\({\mathcal{F}}\) is a false-name-proof, anonymous, Pareto-optimal mechanism for \(C_{4}\) iff there exists a cyclic labeling of the graph by \(\left\{ a,b,c,d\right\} \) (see Fig. 17) s.t. for any profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\)

  • If all ballots are identical and equal to a location \(\ell \), then \({\mathcal{F}}\left( {\varvec{x}}\right) =\ell \).

  • If \(a\in {\varvec{x}}\), then \({\mathcal{F}}\left( {\varvec{x}}\right) =a\).

  • If \(a\notin {\varvec{x}}\) and \(c\in {\varvec{x}}\), then \({\mathcal{F}}\left( {\varvec{x}}\right) =c\).

  • If \({\varvec{x}}\) includes ballots for both location b and location d and only these two locations, then \({\mathcal{F}}\left( {\varvec{x}}\right) \in \left\{ a,c\right\} \).

Fig. 17
figure 17

The labeling of Proposition 9

Corollary 2

For any two false-name-proof, anonymous, Pareto-optimal mechanisms for \(C_{4}\) using the same labeling, \({\mathcal{F}}\) and \({\mathcal{H}}\) as above, all agents are ex-post indifferent between the two mechanisms. That is, for any profile \({\varvec{x}}\in {\mathcal{V}}^{\star }\), all agents are indifferent between the two locations \({\mathcal{F}}\left( {\varvec{x}}\right) \) and \({\mathcal{H}}\left( {\varvec{x}}\right) \).

Proof

The only scenario in which \({\mathcal{F}}\) and \({\mathcal{H}}\) differ is when \({\varvec{x}}\) includes ballots for both location b and location d and only these two locations. Any agent who is located in one of these two location is indifferent between location a and location c. \(\square \)

\(\varvec{C_{5}}\) :

It is not hard to verify that a mechanism that returns the first Pareto-optimal location according to one of the following orders – , , – is a group-manipulation-resistant mechanism. These three mechanisms are also order-based mechanisms. In Appendix D, we prove that in fact these are the only group-manipulation-resistant, anonymous, Pareto-optimal mechanisms for \(C_{5}\).

Proposition 10

The only false-name-proof, anonymous, Pareto-optimal mechanisms for \(C_{5}\) are the following 30 order-based mechanisms (see Fig. 18):

  • \(a\rightarrow b\rightarrow e\rightarrow c\rightarrow d\),

  • \(a\rightarrow b\rightarrow e\rightarrow d\rightarrow c\),

  • \(a\rightarrow b\rightarrow d\rightarrow e\rightarrow c\),

  • and their rotations and reflections.

Fig. 18
figure 18

The labeling of Proposition 10

Corollary 3

\(C_{5}\) is not a simple \(ZV\)-line graph.

Proof

By Definition 4, if \(C_{5}\) was a simple \(ZV\)-line graph, then there would be an order-based group-manipulation-resistant mechanism for it with the \(Z\)-location in the prefix of the order. But, choosing any of the five location prefixes of the orders in Proposition 10 to be the \(Z\)-locations violates the constraints of Definition 3.\(\square \)

6.1 \(\varvec{C_{n}}\) for \(\varvec{n\geqslant 6}\)

Proposition 11

For \(n\geqslant 6\) there is no anonymous Pareto-optimal mechanism for \(C_{n}\) that is resistant even only to manipulations of a single agent.

The proof generalizes the proof for \(C_{6}\) which we showed on Proposition 3. We show below the proof for large cycles of even size. The proof for the odd-sized cycles (in which a more delicate rounding in needed in the statements) can be found in Appendix D.

Proof

(for cycles of even size \(n\geqslant 6\)) Assume towards a contradiction that \({\mathcal{F}}\) is a Pareto-optimal, anonymous, manipulation-resistant mechanism for \(C_{n}\). We denote the locations of \(C_{n}\) by \(\left\{ 0,1,2,\ldots ,n-1\right\} \), and w.l.o.g. assume that for the profile of n agents who vote for all n locations the outcome is 0 (see Fig. 19).

Fig. 19
figure 19

Illustration for the proof of Proposition 11 for cycles of even size larger than 6

For the profile \(\varvec{\left\langle 2,\,1+\frac{n}{2},\,2+\frac{n}{2}\right\rangle }\): From resistance to false-name manipulations of the first and last agents, the outcome must be either 0 or 4 (Since any of them can change the result to be 0 by adding false-ballots). From the Pareto-optimality of \({\mathcal{F}}\), the outcome cannot be 0 which is Pareto-dominated by 4. Hence, the outcome for the profile \(\varvec{\left\langle 2,\,1+\left\lfloor \frac{n}{2}\right\rfloor ,\,2+\left\lfloor \frac{n}{2}\right\rfloor \right\rangle }\) is 4.

Similarly, for the profile \(\varvec{\left\langle 1,\,2,\,1+\frac{n}{2}\right\rangle }\) the outcome must be 2. From false-name-resistance of \({{\mathcal{F}}^{\star }}\), the outcome for the profile \(\varvec{\left\langle 2,\,1+\frac{n}{2}\right\rangle }\) must also be 2 (Otherwise, the first agent can cast an additional false-ballot 1 to get the outcome to be 2).

But, the second agent in the profile \(\varvec{\left\langle 2,\,1+\frac{n}{2}\right\rangle }\) (who is located on \(1+\frac{n}{2}\)) can change the outcome to be 4 which is closer to her by casting one additional false-ballot \(2+\frac{n}{2}\). So we get a contradiction. \(\square \)

7 Summary and future work

In this work, we presented a new family of graphs, \(ZV\)-line graphs, and a generic, anonymous, Pareto-optimal, group-manipulation-resistant mechanism for the facility location problem on these graphs (Theorem 1). To the best of our knowledge, the (very few) false-name-proof mechanisms that were previously known were tailored for specific graphs, and this work is the first to show a generic false-name-proof mechanism for a large family, utilizing a broad graph property and unifying all existence results that we are aware of. The construction of the mechanism is recursive (Definition 6): We derive a mechanism for a given \(ZV\)-line graph from mechanisms for its subgraphs (which might not be \(ZV\)-line graphs). Hence, it is straightforward to derive from our construction general mechanisms for recursive graph families (as exemplified in Sect. 4.1).

7.1 Relaxing the assumptions of the model

Three assumptions we had are connectivity of the graph, a finite number of agents, and a finite number of locations. One could define mechanisms for disconnected graphs, infinite graphs, or an infinite number of agents (both countable and uncountable) as well. The definitions of the desiderata extend naturally to deal with these scenarios (while constraining the profiles, manipulations, coalitions to be measurable functions or sets).

For disconnected graphs, if each connected component is a \(ZV\)-line graph, the following mechanism generalizes \({{\mathcal{F}}^{\star }}\) and it satisfies the desiderata:

\(\blacktriangleright \):

At the first stage, choose the first connected component according to some predefined order s.t. at least one agent voted for a location in this component.

\(\blacktriangleright \):

At the second stage, run \({{\mathcal{F}}^{\star }}\) taking into account only ballots in the chosen component.

Note that, just like the mechanism for the connected case, also this mechanism can be equivalently defined as an order-based mechanism with the concatenation of the respective orders of the different components.

This scenario exemplifies again the high efficiency-cost of false-name-proofness. Since the graph is disconnected, it is unavoidable that some of the agents will have no access to the facility. Nevertheless, on efficiency grounds we would like to hurt the minimal number of agents. Requiring false-name-proofness, or equivalently assuming an agent can cast any number of ballots, means essentially that the designer must be oblivious to such arguments and act as-if any of the ballots might represent the vast majority of society.Footnote 22

Recall that we saw in Claim 8 that there exist anonymous, Pareto-optimal, group-manipulation-resistant mechanisms for all connected graphs of up-to five locations. Hence, we get by the above insight anonymous, Pareto-optimal, group-manipulation-resistant mechanisms for all graphs of up-to five locations (both connected and disconnected). This is no longer true for larger graphs since we showed no such mechanism exists for the cycle of six locations.

For the scenario of an infinite number of agents, we get that \({{\mathcal{F}}^{\star }}\) still satisfies the desiderata (using the same proof).

For dealing with infinite graphs, we need to extend Definition 3 of simple \(ZV\)-line graphs and add a requirement that the linear order over the \(Z\)-locations is a well-order, that is, requiring that the leftmost location is defined for any (measurable) subset of \(Z\)-locations. Adding this assumption, our results extend (using the same proof) to show that \({{\mathcal{F}}^{\star }}\) satisfies the desiderata for infinite graphs as well (with either finite or infinite number of agents). Note that without the well-order assumption, \({{\mathcal{F}}^{\star }}\) might not be well-defined even when the number of agents is finite. For instance, consider the infinite simple \(ZV\)-line graph in Fig. 20. Then, for the profile \(\left\{ v_{1},v_{2}\right\} \) the leftmost Pareto-optimal \(Z\)-location is not defined.

Fig. 20
figure 20

Example: an infinite \(ZV\)-line graphs s.t. the leftmost Pareto-optimal \(Z\)-locations is not defined (Color figure online)

7.2 Approximate mechanism design without money

Last, an important continuation of this work is analyzing the implications for approximate mechanism design without money [53]. That is, assuming the agents are quantitatively represented by a cost function (e.g., the distance to the facility or a monotone function of the distance) and analyzing the implications of manipulation-resistance on the approximability of the minimization problem of natural social cost functions. As we saw in Sect. 5.1, we expect to get a low performance guarantee for most natural social cost functions (of the same order of magnitude as the constant mechanism and the mechanism that outputs a random ballot). Weakening the false-name-proofness does not circumvent this bad efficiency phenomenon (by Proposition 1), and as we saw, this phenomenon is common to many other scenarios in which false-name-proofness is a desired property.

Nowadays, many aggregation mechanisms are highly susceptible to double-voting and false-name voting in general (e.g., mechanisms over massive anonymous networks like the internet and also other scenarios in which vote frauds are known to be easy). We think that such results should open a discussion on the costs of these protocols (since the benefits are clear) or direct us to look for solutions outside of the scope of mechanism design like those we surveyed in Sect. 5.1.