Advertisement

Often Harder than in the Constructive Case: Destructive Bribery in CP-nets

  • Britta DornEmail author
  • Dominikus Krüger
  • Patrick Scharpfenecker
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9470)

Abstract

We study the complexity of the destructive bribery problem (an external agent tries to prevent a disliked candidate from winning by bribery actions) in voting over combinatorial domains, where the set of candidates is the Cartesian product of several issues. This problem is related to the concept of the margin of victory of an election which constitutes a measure of robustness of the election outcome and plays an important role in the context of electronic voting. In our setting, voters have conditional preferences over assignments to these issues, modelled by CP-nets. We settle the complexity of all combinations of this problem based on distinctions of four voting rules, five cost schemes, three bribery actions, weighted and unweighted voters, as well as the negative and the non-negative scenario. We show that almost all of these cases are \(\mathcal {NP}\)-complete or \(\mathcal {NP}\)-hard for weighted votes while approximately half of the cases can be solved in polynomial time for unweighted votes.

Keywords

Computational social choice Voting Bribery CP-nets Destructive 

References

  1. 1.
    Boutilier, C., Brafman, R.I., Domshlak, C., Hoos, H.H., Poole, D.: Cp-nets: a tool for representing and reasoning with conditional ceteris paribus preference statements. J. Artif. Intell. Res. 21, 135–191 (2004)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Brafman, R., Rossi, F., Salvagnin, D., Venable, K.B., Walsh, T.: Finding the next solution in constraint- and preference-based knowledge representation formalisms. In: 12th International Conference: Principles of Knowledge Representation and Reasoning, pp. 425–433. AAAI Press (2010)Google Scholar
  3. 3.
    Brandt, F., Conitzer, V., Endriss, U.: Computational social choice. In: Multiagent Systems, pp. 213–283. MIT Press (2013)Google Scholar
  4. 4.
    Conitzer, V., Lang, J., Sandholm, T.: How many candidates are needed to make elections hard to manipulate? In: 9th Conference on Theoretical Aspects of Rationality and Knowledge, pp. 201–214. ACM (2003)Google Scholar
  5. 5.
    Conitzer, V., Lang, J., Xia, L.: Hypercubewise preference aggregation in multi-issue domains. In: 22nd International Joint Conference on Artificial Intelligence, pp. 158–163. AAAI Press (2011)Google Scholar
  6. 6.
    Conitzer, V., Sandholm, T.: Complexity of manipulating elections with few candidates. In: 18th National Conference on Artificial Intelligence, pp. 314–319. AAAI Press (2002)Google Scholar
  7. 7.
    Dorn, B., Krüger, D.: On the hardness of bribery variants in voting with CP-nets. Ann. Math. Artif. Intell., 1–29 (2015). doi: 10.1007/s10472-015-9469-3MathSciNetCrossRefGoogle Scholar
  8. 8.
    Dorn, B., Krüger, D., Scharpfenecker, P.: Often harder than in the constructive case: destructive bribery in CP-nets, pp. 1–22 (2015). CoRR abs/1509.08628Google Scholar
  9. 9.
    Elkind, E., Faliszewski, P., Slinko, A.: Swap bribery. In: Mavronicolas, M., Papadopoulou, V.G. (eds.) Algorithmic Game Theory. LNCS, vol. 5814, pp. 299–310. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Faliszewski, P., Hemaspaandra, L., Hemaspaandra, E., Rothe, J.: A richer understanding of the complexity of election systems. In: Fundamental Problems in Computing: Essays in Honor of Professor Daniel J. Rosenkrantz, 1st edn., chap. 14, pp. 375–406. Springer (2009)Google Scholar
  11. 11.
    Faliszewski, P.: Nonuniform bribery. In: 7th International Joint Conference on Autonomous Agents and Multiagent Systems, vol. 3, pp. 1569–1572. IFAAMAS (2008)Google Scholar
  12. 12.
    Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: How hard is bribery in elections? J. Artif. Intell. Res. 35(2), 485–532 (2009)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: Llull and copeland voting computationally resist bribery and constructive control. J. Artif. Intell. Res. (JAIR) 35, 275–341 (2009)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York (1979)zbMATHGoogle Scholar
  15. 15.
    Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: Anyone but him: the complexity of precluding an alternative. Artif. Intell. 171(5–6), 255–285 (2007)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Lang, J.: Vote and aggregation in combinatorial domains with structured preferences. In: 20th International Joint Conference on Artificial Intelligence, pp. 1366–1371 (2007)Google Scholar
  17. 17.
    Magrino, T.R., Rivest, R.L., Shen, E.: Computing the margin of victory in IRV elections. In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections. USENIX Association (2011)Google Scholar
  18. 18.
    Maran, A., Maudet, N., Pini, M.S., Rossi, F., Venable, K.B.: A framework for aggregating influenced CP-nets and its resistance to bribery. In: 27th AAAI Conference on Artificial Intelligence, pp. 668–674. AAAI Press (2013)Google Scholar
  19. 19.
    Mattei, N., Pini, M.S., Rossi, F., Venable, K.B.: Bribery in voting with CP-nets. Ann. Math. Artif. Intell. 68(1–3), 135–160 (2013)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Norden, L., Burstein, A., Hall, J.L., Chen, M.: Post-election audits: restoring trust in elections. Brennan Center for Justice at New York University, Tech. report (2007)Google Scholar
  21. 21.
    Pini, M., Rossi, F., Venable, K.: Bribery in voting with soft constraints. In: 27th AAAI Conference on Artificial Intelligence, pp. 803–809. AAAI Press (2013)Google Scholar
  22. 22.
    Purrington, K., Durfee, E.H.: Making social choices from individuals’ CP-nets. In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1122–1124. IFAAMAS (2007)Google Scholar
  23. 23.
    Reisch, Y., Rothe, J., Schend, L.: The margin of victory in schulze, cup, and copeland elections: complexity of the regular and exact variants. In: 7th European Starting AI Researcher Symposium, pp. 250–259. IOS Press (2014)Google Scholar
  24. 24.
    Rossi, F., Venable, K.B., Walsh, T.: mCP Nets: representing and reasoning with preferences of multiple agents. In: 19th National Conference on Artificial Intelligence, pp. 729–734. AAAI Press (2004)Google Scholar
  25. 25.
    Stark, P.B.: Risk-limiting post-election audits: P-values from common probability inequalities. IEEE Trans. Inf. Forensics Secur. 4, 1005–1014 (2009)CrossRefGoogle Scholar
  26. 26.
    Xia, L.: Computing the margin of victory for various voting rules. In: ACM Conference on Electronic Commerce, EC 2012, Valencia, Spain, 4–8 June 2012, pp. 982–999. ACM (2012)Google Scholar
  27. 27.
    Xia, L., Conitzer, V., Lang, J.: Voting on multiattribute domains with cyclic preferential dependencies. In: 23rd AAAI Conference on Artificial Intelligence, pp. 202–207. AAAI Press (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  • Britta Dorn
    • 1
    Email author
  • Dominikus Krüger
    • 2
  • Patrick Scharpfenecker
    • 2
  1. 1.Department of Computer Science, Faculty of ScienceUniversity of TübingenTübingenGermany
  2. 2.Institute of Theoretical Computer ScienceUlm UniversityUlmGermany

Personalised recommendations