Skip to main content

Advertisement

Log in

Computational aspects of strategic behaviour in elections with top-truncated ballots

  • Published:
Autonomous Agents and Multi-Agent Systems Aims and scope Submit manuscript

Abstract

Understanding when and how computational complexity can be used to protect elections against different manipulative actions has been a highly active research area over the past two decades. Much of this literature, however, makes the assumption that the voters or agents specify a complete preference ordering over the set of candidates. There are many multiagent systems applications, and even real-world elections, where this assumption is not warranted, and this in turn raises a series of questions on the impact of partial voting on the complexity of manipulative actions. In this paper, we focus on two of these questions. First, we address the question of how hard it is to manipulate elections when the agents specify only top-truncated ballots. Here, in particular, we look at the weighted manipulation problem—both constructive and destructive manipulation—when the voters are allowed to specify top-truncated ballots, and we provide general results for all scoring rules, for elimination versions of all scoring rules, for the plurality with runoff rule, for a family of election systems known as Copeland\(^{\alpha }\), and for the maximin protocol. The second question we address is the impact of top-truncated voting on the complexity of manipulative actions in electorates with structured preference profiles. In particular, we consider electorates that are single-peaked and we show how, for many voting protocols, allowing top-truncated voting reimposes the \(\mathcal {NP}\)-hardness shields that normally vanish in such electorates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. NP-completeness for three candidates does not automatically imply that it is equally hard for a larger number of candidates (for example, see [29, Theorem 4.2] where it is shown that manipulating the 3-veto voting rule is NP-complete for five candidates, but polynomial when there are at least six candidates). Therefore, future work will have to resolve this issue.

  2. Although Conitzer et al. [13] use the unique winner model, it can be verified that the result holds for the non-unique winner model as well.

  3. Bottom orders can be useful in scenarios where one is indifferent between some candidates at the top but truly dislike some other candidates; there are several papers in computational social choice that look at bottom orders (see, e.g., [6, 29, 33]).

References

  1. Barberá, S. (2007). Indifferences and domain restrictions. Analyse & Kritik, 29(2), 146–162.

    Article  Google Scholar 

  2. Bartholdi, J., & Trick, M. A. (1986). Stable matching with preferences derived from a psychological model. Operations Research Letters, 5(4), 165–169.

    Article  MathSciNet  MATH  Google Scholar 

  3. Bartholdi, J. J., Tovey, C. A., & Trick, M. A. (1992). How hard is it to control an election? Mathematical and Computer Modelling, 16(8–9), 27–40.

    Article  MathSciNet  MATH  Google Scholar 

  4. Bartholdi, J. J, I. I. I., & Orlin, J. B. (1991). Single transferable vote resists strategic voting. Social Choice and Welfare, 8(4), 341–354.

    Article  MathSciNet  MATH  Google Scholar 

  5. Bartholdi, J. J, I. I. I., Tovey, C. A., & Trick, M. A. (1989). The computational difficulty of manipulating an election. Social Choice and Welfare, 6(3), 227–241.

    Article  MathSciNet  MATH  Google Scholar 

  6. Baumeister, D., Faliszewski, P., Lang, J., & Rothe, J. (2012). Campaigns for lazy voters: Truncated ballots. In Proceedings of the 11th international conference on autonomous agents and multiagent systems (AAMAS), pp. 577–584.

  7. Black, D. (1948). On the rationale of group decision-making. The Journal of Political Economy, 56(1), 23–34.

    Article  Google Scholar 

  8. Black, D., Newing, R. A., McLean, I., McMillan, A., & Monroe, B. L. (1958). The theory of committees and elections. Berlin: Springer.

    Google Scholar 

  9. Brandt, F., Brill, M., Hemaspaandra, E., & Hemaspaandra, L. A. (2015). Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates. Journal of Artificial Intelligence Research, 53, 439–496.

    MathSciNet  MATH  Google Scholar 

  10. Briskorn, D., Erdélyi, G., & Reger, C. (2015). Bribery under partial information. In Proceedings of the 2nd workshop on exploring beyond the worst case in computational social choice (EXPLORE).

  11. Cantala, D. (2004). Choosing the level of a public good when agents have an outside option. Social Choice and Welfare, 22(3), 491–514.

    Article  MathSciNet  MATH  Google Scholar 

  12. Coleman, T., & Teague, V. (2007). On the complexity of manipulating elections. In Proceedings of the 13th Australasian symposium on theory of computing, pp. 25–33.

  13. Conitzer, V., Sandholm, T., & Lang, J. (2007). When are elections with few candidates hard to manipulate? Journal of the ACM, 54(3), 14.

    Article  MathSciNet  MATH  Google Scholar 

  14. Conitzer, V., Endriss, U., Lang, J., & Procaccia, A. D. (Eds.). (2016). Handbook of computational social choice. Cambridge: Cambridge University Press.

    Google Scholar 

  15. Copeland, A. H. (1951). A reasonable social welfare function. In Seminar on applications of mathematics to social sciences. University of Michigan

  16. Dey, P., Misra, N., & Narahari, Y. (2016). Complexity of manipulation with partial information in voting. In Proceedings of the 25th international joint conference on artificial intelligence (IJCAI), pp. 229–235.

  17. Doignon, J. P., & Falmagne, J. C. (1994). A polynomial time algorithm for unidimensional unfolding representations. Journal of Algorithms, 16(2), 218–233.

    Article  MathSciNet  MATH  Google Scholar 

  18. Duggan, J., & Schwartz, T. (2000). Strategic manipulability without resoluteness or shared beliefs: Gibbard–Satterthwaite generalized. Social Choice and Welfare, 17(1), 85–93.

    Article  MathSciNet  MATH  Google Scholar 

  19. Dwork, C., Kumar, R., Naor, M., & Sivakumar, D. (2001). Rank aggregation methods for the web. In Proceedings of the 10th international conference on world wide web, pp. 613–622

  20. Emerson, P. (2013). The original Borda count and partial voting. Social Choice and Welfare, 40(2), 353–358.

    Article  MathSciNet  MATH  Google Scholar 

  21. Ephrati, E., & Rosenschein, J. S. (1993). Multi-agent planning as a dynamic search for social consensus. In Proceedings of the 13th international joint conference on artificial intelligence (IJCAI), vol. 93, pp. 423–429.

  22. Erdélyi, G., & Reger, C. (2016). Possible bribery in k-approval and k-veto under partial information. In Proceedings of the international conference on artificial intelligence: methodology, systems, and applications (AIMSA), Berlin: Springer, pp. 299–309.

  23. Erdélyi, G., Lackner, M., & Pfandler, A. (2013). Computational aspects of nearly single-peaked electorates. In Proceedings of the 27th AAAI conference on artificial intelligence (AAAI), pp. 283–289.

  24. Escoffier, B., Lang, J., & Öztürk, M. (2008). Single-peaked consistency and its complexity. In Proceedings of the 18th European conference on artificial intelligence (ECAI), pp. 366–370.

  25. Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. A. (2009a). How hard is bribery in elections? Journal of Artificial Intelligence Research, 35, 485–532.

    MathSciNet  MATH  Google Scholar 

  26. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. A., & Rothe, J. (2009b). Llull and copeland voting computationally resist bribery and constructive control. Journal of Artificial Intelligence Research, 35, 275–341.

  27. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. A., & Rothe, J. (2009). A richer understanding of the complexity of election systems. In Fundamental problems in computing, Berlin: Springer, pp. 375–406.

  28. Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. A. (2010). Using complexity to protect elections. Communications of the ACM, 53(11), 74–82.

    Article  Google Scholar 

  29. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L. A., & Rothe, J. (2011). The shield that never was: Societies with single-peaked preferences are more open to manipulation and control. Information and Computation, 209(2), 89–107.

    Article  MathSciNet  MATH  Google Scholar 

  30. Faliszewski, P., Hemaspaandra, E., & Hemaspaandra, L. A. (2014). The complexity of manipulative attacks in nearly single-peaked electorates. Artificial Intelligence, 207, 69–99.

    Article  MathSciNet  MATH  Google Scholar 

  31. Fishburn, P. C. (1977). Condorcet social choice functions. SIAM Journal on applied Mathematics, 33(3), 469–489.

    Article  MathSciNet  MATH  Google Scholar 

  32. Fitzsimmons, Z. (2015). Single-peaked consistency for weak orders is easy. In Proceedings of the 15th conference on theoretical aspects of rationality and knowledge (TARK), pp. 127–140.

  33. Fitzsimmons, Z., & Hemaspaandra, E. (2015). Complexity of manipulative actions when voting with ties. In Proceedings of the 4th international conference on algorithmic decision theory (ADT), pp. 103–119.

  34. Fitzsimmons, Z., & Hemaspaandra, E. (2016). Modeling single-peakedness for votes with ties. In Proceedings of the 8th European starting AI researcher symposium (STAIRS), pp. 63–74.

  35. Friedgut, E., Kalai, G., & Nisan, N. (2008). Elections can be manipulated often. In 2008 49th Annual IEEE symposium on foundations of computer science, IEEE, pp. 243–249.

  36. Garey, M. R., & Johnson, D. S. (1979). Computers and intractability: A guide to the theory of NP-completeness. New York, NY: W. H. Freeman & Co.

    MATH  Google Scholar 

  37. Gibbard, A. (1973). Manipulation of voting schemes: A general result. Econometrica: Journal of the Econometric Society, 41(4), 587–601.

    Article  MathSciNet  MATH  Google Scholar 

  38. Hemaspaandra, E., & Hemaspaandra, L. A. (2007). Dichotomy for voting systems. Journal of Computer and System Sciences, 73(1), 73–83.

    Article  MathSciNet  MATH  Google Scholar 

  39. Konczak, K., & Lang, J. (2005). Voting procedures with incomplete preferences. In Proceedings of the IJCAI-05 multidisciplinary workshop on advances in preference handling.

  40. Lackner, M. (2014). Incomplete preferences in single-peaked electorates. In Proceedings of the 28th AAAI conference on artificial intelligence (AAAI), pp. 742–748.

  41. Lu, T., & Boutilier, C. (2013). Multi-winner social choice with incomplete preferences. In Proceedings of the 23rd international joint conference on artificial intelligence (IJCAI), AAAI Press, pp. 263–270.

  42. Narodytska, N., & Walsh, T. (2014). The computational impact of partial votes on strategic voting. In Proceedings of the 21st European conference on artificial intelligence (ECAI), pp. 657–662.

  43. Niemi, R. G., & Wright, J. R. (1987). Voting cycles and the structure of individual preferences. Social Choice and Welfare, 4(3), 173–183.

    Article  MathSciNet  MATH  Google Scholar 

  44. Niou, E. M. (1987). A note on Nanson’s rule. Public Choice, 54(2), 191–193.

    Article  Google Scholar 

  45. Pennock, D. M., Horvitz, E., & Giles, C. L. (2000). Social choice theory and recommender systems: Analysis of the axiomatic foundations of collaborative filtering. In Proceedings of the 17th National conference on artificial intelligence (AAAI), pp. 729–734.

  46. Satterthwaite, M. A. (1975). Strategy-proofness and arrow’s conditions: Existence and correspondence theorems for voting procedures and social welfare functions. Journal of Economic Theory, 10(2), 187–217.

    Article  MathSciNet  MATH  Google Scholar 

  47. Walsh, T. (2007). Uncertainty in preference elicitation and aggregation. In Proceedings of the 22nd AAAI conference on artificial intelligence (AAAI), vol 7, pp. 3–8.

  48. Xia, L., & Conitzer, V. (2011). Determining possible and necessary winners under common voting rules given partial orders. Journal of Artificial Intelligence Research, 41(2), 25–67.

    MathSciNet  MATH  Google Scholar 

  49. Yang, Y. (2015). Manipulation with bounded single-peaked width: A parameterized study. In Proceedings of the 14th international conference on autonomous agents and multiagent systems (AAMAS), pp. 77–85.

Download references

Acknowledgements

We acknowledge the support of the Natural Sciences and Engineering Research Council of Canada (NSERC) through the Discovery Grants Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijay Menon.

Appendix: Additional proofs

Appendix: Additional proofs

1.1 Proofs for Sect. 3.3

Lemma 1

Partition\('\) is NP-complete.

Proof

It is easy to see that Partition\('\) is in \(\mathcal {NP}\). To prove \(\mathcal {NP}\)-hardness, we show a reduction from the Partition (P1) problem. Let \(\{a_1, \ldots , a_n\}\), where \(\sum _i a_i = 2M\), be an arbitrary instance of the Partition problem. Next, construct the following instance of Partition\('\)(P2):

  1. 1.

    For each \(a_i\), construct \(b_i = a_i + 2M^2\) and \(b'_i = 2M^2\).

  2. 2.

    Construct \(X_1 = X_2 = 2M^2n + 4M^2 - M\).

Now, it can be seen that \(\sum _i (b_i + b'_i) + X_1 + X_2 = 2\cdot (2n+2)\cdot 2M^2\) and that each of \(b_i, b'_i, X_1, X_2 \ge 2M^2\).

Suppose there exists a partition \(S_1, S_2\) for P1. Then it is easy to see that P2 also has a partition \(T_1\), \(T_2\) such that \(\sum T_1 = \sum T_2 = (2n+2)2M^2\), where \(T_1 = \{b_i\}_{i | a_i \in S_1} \cup \{b'_i\}_{i | a_i \in S_2} \cup \{X_1\}\) and \(T_2 = \{b_i\}_{i | a_i \in S_2} \cup \{b'_i\}_{i | a_i \in S_1} \cup \{X_2\}\).

Conversely, suppose there exists a partition for P2. This implies that there exists two subsets \(T_1, T_2\) such that \(\sum T_1 = \sum T_2 = (2n+2)2M^2\). Now, the first thing to observe is that both \(X_1, X_2\) cannot belong to the same set, because if so then the sum of the rest of the elements \(= 4nM^2 + 2M < (2n+2)2M^2\). So let us assume that \(X_1 \in T_1\) and \(X_2 \in T_2\). Also, since \(X_1 > b_i, \forall i\), we can remove \(X_1\) and \(X_2\) from the two subsets. Removing them we have \(\sum T_1 - X_1 = \sum T_2 - X_2 = M + 2nM^2\). So now we can construct \(S_1\), and \(S_2\) as follows:

$$\begin{aligned} S_1 = \{a_i\}_{i | b_i \in T_1} \\ S_2 = \{a_i\}_{i | b_i \in T_2} \end{aligned}$$

This in turn implies that P1 has a partition. \(\square \)

Lemma 2

Fixed-Difference Subset Sum is \(\mathcal {NP}\)-complete.

Proof

It is easy to see that Fixed-Difference Subset Sum is in \(\mathcal {NP}\). To prove \(\mathcal {NP}\)-hardness, we show a reduction from the Partition probem. Let \(\{k_1, \ldots , k_t\}\), where \(\sum _i k_i = 2K\), be an arbitrary instance of Partition. Next, construct the following instance \(\{\ell _1, \ldots , \ell _t, \ell '_1, \ldots , \ell '_t\}\) of Fixed-Difference Subset Sum(P2), where \(\ell _i = k_i + 2^{n + i}\), \(\ell '_i = 2^{n + i}\), and \(n = \lceil \log {2K} \rceil \).

Suppose there exists a partition \(S_1, S_2\) for P1. Then P2 has subsets \(T_1\), \(T_2\) such that \(\sum T_1 - \sum T_2 = K + \sum _{i=1}^{t} 2^{i+n}\), where \(T_1 = \{\ell _i\}_{i | k_i \in S_1} \cup \{\ell '_i\}_{i | k_i \in S_2}\) and \(T_2 = \emptyset \).

Conversely, suppose there exists subsets \(T_1\), \(T_2\) in P2 such that \(\sum T_1 - \sum T_2 = K + \sum _{i=1}^{t} 2^{i+n}\). Now, it is easy to argue that none of \(\ell _i\) or \(\ell '_i\) for \(i = 1, \ldots , t\) can belong to \(T_2\), because if so then the second term (\(\sum _{i=1}^{t} 2^{i+n}\)) of \(\sum T_1 - \sum T_2\) will not be attainable. Therefore, we can construct \(S_1\) and \(S_2\) such that \(S_1 = \{k_i\}_{i | \ell _i \in T_1}\) and \(S_2 = \{k_i\}_{i | \ell _i \notin T_1}\), and this in turn implies that P1 has a partition. \(\square \)

1.2 Additional proofs for Sect. 5.2

Theorem 27

For any 3-candidate scoring rule X that is not isomorphic to plurality or veto, in single-peaked electorates, CWCM with top-truncated votes in \(X_{\downarrow }\) is NP-complete.

Proof (sketch)

The proof here is similar to Theorem 2 and hence we only sketch the same. To prove \(\mathcal {NP}\)-hardness, we can proceed like in Theorem 2 by considering the following three cases. In all the cases we can use a reduction from the Partition problem.

  • Case 1 \(\alpha _2< \alpha _1 < 2\alpha _2\). Given an arbitrary instance of Partition, construct the following instance of CWCM with \(p\ L\ a\ L\ b\) as the linear ordering over the candidates. This linear ordering in turn restricts the set of allowed votes to \(\{(p> a> b), (a> p> b), (a> b> p), (b> a> p), (a> b \sim p), (b> a \sim p), (p > a \sim b)\}\). In S let there be a vote of weight K voting \((a> b > p)\), \((b> a > p)\), \((b > a \sim p)\), and \((p > a \sim b)\) each, and let each \(k_i\) in T have a vote of weight \(k_i\). Now, proceed like in Theorem 2.

  • Case 2 \(\alpha _1 > 2\alpha _2\). In this case, construct the following instance of CWCM with \(a\ L\ p\ L\ b\) as the linear ordering over the candidates. This linear ordering in turn restricts the set of allowed votes to \(\{(a> p> b), (p> a> b), (p> b> a), (b> p> a), (a> b \sim p), (b> a \sim p), (p > a \sim b)\}\). In S let there be a vote of weight \((2\alpha _1 - \alpha _2)K\) voting \((a> p > b)\) and \((b> p > a)\) each, and let each \(k_i\) in T have a vote of weight \((\alpha _1 - 2\alpha _2)k_i\). Now, proceed like in Theorem 2.

  • Case 3 \(\alpha _1 = 2\alpha _2\). In this case, construct the following instance of CWCM with \(a\ L\ p\ L\ b\) be the linear ordering over the candidates. In S let there be a vote of weight 3K voting \((a > b \sim p)\) and \((b > a \sim p)\) each, and let each \(k_i\) in T have a vote of weight \(k_i\). Now, proceed like in Theorem 2. \(\square \)

Theorem 28

For any 3-candidate scoring rule X that is not isomorphic to plurality, in single-peaked electorates, CWCM with top-truncated votes in \(X_{av}\) is NP-complete.

Proof (sketch)

The proof here is similar to Theorem 3 and hence we only sketch the same. To prove \(\mathcal {NP}\)-hardness, we use a reduction from Fixed-difference Subset Sum. Given an arbitrary instance of Fixed-difference Subset Sum, construct the following instance of CWCM with \(a\ L\ p\ L\ b\) as the linear ordering over the candidates. This linear ordering in turn restricts the set of allowed votes to \(\{(a> p> b), (p> a> b), (p> b> a), (b> p> a), (a> b \sim p), (b> a \sim p), (p > a \sim b)\}\). In S let there be a vote of weight 8K voting \((a > b \sim p)\) and \((b > a \sim p)\) each, vote of weight 3K voting \((p> b > a)\), and a vote of weight K voting \((p> a > b)\). In T let each \(k_i\) have a vote of weight \(2k_i\). Now, proceed like in Theorem 3. \(\square \)

Lemma 3

During each round of the eliminate(Veto), only the rightmost or the leftmost candidate in the linear ordering L is eliminated.

Proof

Let \(c_1\ L\ c_2\ L\ \cdots \ L\ c_m\) be any arbitrary linear ordering. It is clear that in the first round of eliminate(Veto) only \(c_1\) or \(c_m\) will be eliminated since all the votes only have either of them placed at the end. Also, since the votes are single-peaked, for any candidate \(c_j\), the only candidates which can be immediately on top of it in a vote where \(c_j\) is placed last are its right and left neighbours, where the right neighbour of the rightmost candidate is the leftmost one and vice-versa. Therefore, in particular, if \(c_1\) is the candidate eliminated in the first round then all its last votes gets transferred to either \(c_2\) or \(c_m\). Hence in the subsequent round only one of \(c_2\) or \(c_m\) will be eliminated. Continuing this way we can see that at every round r only one of the corner candidates in L (which now is the linear ordering over the remaining \(m -r + 1\) candidates) will be eliminated. \(\square \)

Lemma 4

The reverse of e is a single-peaked order with respect to the given linear order L.

Proof

Our claim is that \(O: (p = c_m)> c_{m-1}> \cdots > c_1\) is a valid single-peaked order with respect to L. To prove this, let us assume the contrary. This implies that there exists three candidates \(c_i\), \(c_j\), \(c_k\) such that \(c_j>_{O} c_i >_{O} c_k\), but according to the linear ordering L it is only possible that \(c_i\ L\ \cdots \ L\ c_k\ L\ \cdots \ L\ c_j\) or \(c_j\ L\ \cdots \ L\ c_k\ L\ \cdots \ L\ c_i\). Now, \(c_j>_{O} c_i >_{O} c_k\) implies that, among \(c_i, c_j,\) and \(c_k\), \(c_k\) is eliminated first, followed by \(c_i\), and then \(c_j\). But then, since at any round r only the corner elements can be eliminated (Lemma 3), \(c_k\) can never be eliminated before both \(c_i\) and \(c_j\) in either of the two linear orderings. Hence e cannot be a valid elimination order if its reverse is not single-peaked. \(\square \)

1.3 Additional proofs for Sect. 5.3

Lemma 5

For the linear order \(a\ L\ p\ L\ b\), when the input elimination order is (apb), if there exists a successful bribery, then it can be induced by the elimination order (abp) (or in other words, we do not need to consider any other elimination orders).

Proof

Since the linear order is \(a\ L\ p\ L\ b\), only the following votes are allowed: \(\{(a> p> b), (p> a> b), (p> b> a), (b> p > a)\}\). Let us assume that the total weight of all the voters voting \((a> p > b)\) is \(W_1\), those voting \((p> a > b)\) is \(W_2\), those voting \((p> b > a)\) is \(W_3\), and those voting \((b> p > a)\) is \(W_4\). Now, since the input elimination order is (apb), we have the following inequalities: (1) \(W_1 + W_2 \le W_3 + W_4\) (since a is getting eliminated in the first round, \(LV(a) \ge LV(b)\), where LV(a) is the total weight of all the voters who place a at the end), and (2) \(W_1 + W_2 + W_3 < W_4\) (since p gets eliminated in the second round). A successful bribery for p can proceed in two ways. First is if the bribery induces the elimination order (abp) and the other way is to induce the elimination order (bap). The task here is to prove that inducing (abp) is better than inducing (bap), or in other words, prove that inducing (bap) requires bribing at least one more voter than what is required to induce (abp).

To prove this, let us consider the case when the elimination order (abp) is induced. Since the input already has a getting eliminated in the first round, we only need to look at the second round and see how much total weight should be bribed so that p is saved from elimination. Once a is eliminated, \(LV(b) = W_1 + W_2 + W_3\), and \(LV(p) = W_4\). Therefore, for p to win in the second round, the weight of votes we need to bribe is at least \(D_{pb} = \left\lceil \frac{W_4 - (W_1 + W_2 + W_3)}{2} \right\rceil \). Let this bribery require \(k_1\) voters to be bribed. Moreover, note that all the bribed votes are of the form \((b> p > a)\) and they will be bribed to vote \((p> b > a)\).

Now, let us consider the second elimination order (bap). To induce this, that is to make b get eliminated in the first round, the total weight of votes we need to bribe is at least \(D_{ab} = \left\lceil \frac{(W_3 + W_4) - (W_1 + W_2)}{2} \right\rceil = \left\lceil \frac{2W_3 + W_4 - (W_1 + W_2 + W_3)}{2} \right\rceil = W_3 + \left\lceil \frac{ W_4 - (W_1 + W_2 + W_3)}{2} \right\rceil = W_3 + D_{pb}\). As a result, among voters voting \((b> p > a)\) we need to bribe a weight of at least \(D_{pb}\) so as to get b eliminated in the first round. But then, this bribery requires at least \(k_1\) voters (from above), which in turn implies that we need at least one more voter to be bribed here than in the case where the elimination order (abp) was induced. Hence, when the input elimination order is (apb) and the linear order aLpLb, for a successful bribery it is enough to induce the elimination order (abp). \(\square \)

Theorem 37

In single-peaked electorates, weighted-bribery with top-truncated votes is NP-complete for 3-candidate Baldwin’s rule.

Proof (sketch)

The proof here is similar to that of Theorem 36 and hence we only sketch the same. To prove \(\mathcal {NP}\)-hardness, we show a reduction from Partition\('\). Given an arbitrary instance \(\{a_1, \ldots , a_n\}\) of Partition\('\), construct an instance of weighted-bribery (CVpk), where \(C = \{a, b, p\}\) is the set of candidates, \(a\ L\ p\ L\ b\) is the linear order of the candidates, and V is the set of the following voters.

  1. 1.

    For each \(a_i\), construct a voter \(v_i\) whose weight is \(2a_i\) and who votes for \((b > a \sim p)\). Let T be the set of all these voters.

  2. 2.

    Construct the following set of voters S: n voters of weight 2K each voting \((b> p > a)\), n voters of weight 2K each voting \((b > a \sim p)\), n voters of weight K each voting \((a > b \sim p)\), 2 voters of weight 1 each voting \((b> p > a)\), 2 voters of weight 1 each voting \((a > b \sim p)\), and 1 voter of weight 1 voting \((p > a \sim b)\).

Set the bribe limit \(k = n\) and \(V = S \cup T\). Now, proceed like in Theorem 36. \(\square \)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Menon, V., Larson, K. Computational aspects of strategic behaviour in elections with top-truncated ballots. Auton Agent Multi-Agent Syst 31, 1506–1547 (2017). https://doi.org/10.1007/s10458-017-9369-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10458-017-9369-5

Keywords

Navigation