manipulation and control for approval voting and other voting systems

64
Manipulation and Control for Approval Voting and Other Voting Systems Jörg Rothe Oxford Meeting for COST Action IC1205 on Computational Social Choice April 16, 2013

Upload: abie

Post on 24-Feb-2016

58 views

Category:

Documents


1 download

DESCRIPTION

Manipulation and Control for Approval Voting and Other Voting Systems. Jörg Rothe Oxford Meeting for COST Action IC1205 o n Computational Social Choice April 16, 2013. Introduction. S ocial C hoice T heory voting theory preference aggregation judgment aggregation - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Manipulation and Controlfor Approval Voting andOther Voting Systems

Jörg Rothe

Oxford Meeting for COST Action IC1205on Computational Social Choice

April 16, 2013

Page 2: Manipulation  and Control for Approval Voting and Other  Voting  Systems

IntroductionSocial Choice Theory

voting theory preference aggregation judgment aggregation

Theoretical Computer Science artificial intelligence algorithm design computational complexity theory

- worst-case/average-case complexity- optimization, etc.

• voting in multiagent systems

• multi-criteria decision making

• meta search, etc. ...Software agents

can systematically

analyze elections to find

optimal strategies

Page 3: Manipulation  and Control for Approval Voting and Other  Voting  Systems

IntroductionSocial Choice Theory

voting theory preference aggregation judgment aggregation

Theoretical Computer Science artificial intelligence algorithm design computational complexity theory

- worst-case/average-case complexity- optimization, etc.

Software agents can

systematically analyze

elections to find optimal

strategies

Computational Social Choice

computational barriers to prevent • manipulation• control• bribery

Page 4: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Computational Social Choice

With the power of NP-hardness vulcans have constructed complexity shields to protect elections against many

types of manipulation and control.

Page 5: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Computational Social Choice

With the power of NP-hardness vulcans have constructed complexity shields to protect elections against many

types of manipulation and control.

Question: Are NP-hardness complexity

shields enough? Or do they evaporate for

single-peaked electorates?

Page 6: Manipulation  and Control for Approval Voting and Other  Voting  Systems

NP-Hardness Shields to Protect Elections

NP-hardness shields

Manipulation & Control inSingle-peaked Electorates

Elections & Voting Systems

Manipulation & Control

Proof Sketch: CCAV in Approval

Page 7: Manipulation  and Control for Approval Voting and Other  Voting  Systems

NP-Hardness Shields to Protect Elections

NP-hardness shields

Manipulation & Control inSingle-peaked Electorates

Elections & Voting Systems

Manipulation & Control

Proof Sketch: CCAV in Approval

Page 8: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Elections An election is a pair (C,V) with

a finite set C of candidates:

a finite list V of voters. Voters are represented by their preferences over C:

either by linear orders:

> > >

or by approval vectors: (1,1,0,1)

Voting system: determines winners from the preferences

Page 9: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsApproval Voting (AV) votes are approval vectors in C1,0

v1 1 1 0 1v2 0 1 0 0v3 1 1 0 1v4 0 0 1 0v5 1 0 1 1v6 1 0 0 1

Page 10: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsApproval Voting (AV) votes are approval vectors in winners: all candidates with the most approvals

v1 1 1 0 1v2 0 1 0 0v3 1 1 0 1v4 0 0 1 0v5 1 0 1 1v6 1 0 0 1∑ 4 3 2 4

C1,0

Page 11: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsApproval Voting (AV) votes are approval vectors in winners: all candidates with the most approvals

winners:

v1 1 1 0 1v2 0 1 0 0v3 1 1 0 1v4 0 0 1 0v5 1 0 1 1v6 1 0 0 1∑ 4 3 2 4

C1,0

Page 12: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsPositional Scoring Rules (for m candidates) defined by scoring vector with

each voter gives points to the candidate on position i winners: all candidates with maximum score

),...,,( 21 m m ...21

i

Borda: Plurality Voting (PV):

k-Approval (m-k-Veto): Veto (Anti-Plurality):

)0,...,0,1(1

m

)0,...,0,1,...,1( kmk

)0,...,2,1( mm

)0,1,...,1(

Page 13: Manipulation  and Control for Approval Voting and Other  Voting  Systems

- 4:0 2:2 3:1

0:4 - 1:3 2:2

2:2 3:1 - 2:2

1:3 2:2 2:2 -

Voting SystemsPairwise Comparison

v1: > > > v3: > > >v2: > > > v4: > > >

Condorcet: beats all other candidates

strictlyCopeland : 1 point for

victory points for tie

Maximin: maximum of theworst pairwise comparison

0,1α

α

1α Hi, I am Ramon Llull. In 1299, I

came up with the voting system

that these guys now study!

Page 14: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Llull/Copeland Rule For FIFA World Championships or UEFA European Championships: Simply use = 1/3 as the tie value.

Difference between the Llull and the Copeland rule?What happens if the head-to-head contest ends with a tie? Llull: Both get 1 point Copeland0: Both get 0 points Copeland0.5: Both get half a point Copeland: Both get points, for a rational , 0<<1

Page 15: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsRound-based: Single Transferable Vote (STV)

v1: > > > v2: > > >v3: > > > v4: > > >

Round 1over

eliminate cand. with lowestplurality score

Round 2over

eliminate cand. with lowestplurality score

Final Round

over

eliminate cand. with lowestplurality score

Page 16: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsRound-based: Single Transferable Vote (STV)

v1: > > v2: > > v3: > > v4: > >

Round 1over

eliminate cand. with lowestplurality score

Round 2over

eliminate cand. with lowestplurality score

Final Round

over

eliminate cand. with lowestplurality score

Page 17: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsRound-based: Single Transferable Vote (STV)

v1: v2: v3: v4:

Round 1over

eliminate cand. with lowestplurality score

Round 2over

eliminate cand. with lowestplurality score

Final Round

over

… and the winner is…

Page 18: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsLevel-based: Bucklin Voting (BV)

v1: > > >v2: > > > v3: > > > v4: > > >v5: > > >

5 voters => strict majority threshold is 3

Lvl 1 1 2 2 0

Page 19: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsLevel-based: Bucklin Voting (BV)

v1: > > >v2: > > > v3: > > > v4: > > >v5: > > >

5 voters => strict majority threshold is 3

Lvl 1 1 2 2 0Lvl 2 2 2 3 3

Page 20: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsLevel-based: Bucklin Voting (BV)

v1: > > >v2: > > > v3: > > > v4: > > > Level 2 Bucklinv5: > > > winners:

5 voters => strict majority threshold is 3

Lvl 1 1 2 2 0Lvl 2 2 2 3 3

Page 21: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Voting SystemsLevel-based: Fallback Voting (FV) combines AV and BV

Candidates:

v: { , } | { , }

v: > | { , }

Bucklin winners are fallback winners. If no Bucklin winner exists (due to disapprovals),

then approval winners win.

Page 22: Manipulation  and Control for Approval Voting and Other  Voting  Systems

NP-Hardness Shields to Protect Elections

NP-hardness shields

Manipulation & Control inSingle-peaked Electorates

Elections & Voting Systems

Manipulation & Control

Proof Sketch: CCAV in Approval

Page 23: Manipulation  and Control for Approval Voting and Other  Voting  Systems

War on Electoral ControlAV

winners:

"chair": knows all preferences

v1 1 1 0 1v2 0 1 0 0v3 1 1 0 1v4 0 0 1 0v5 1 0 1 1v6 1 0 0 1∑ 4 3 2 4

Page 24: Manipulation  and Control for Approval Voting and Other  Voting  Systems

War on Electoral ControlAV winner:

"chair": knows all preferences and can change the

structure of an election

v1 1 1 0 1v2 0 1 0 0v3 1 1 0 1v4 0 0 1 0v5 1 0 1 1v6 1 0 0 1∑ 2 3 1 2

Page 25: Manipulation  and Control for Approval Voting and Other  Voting  Systems

War on Electoral ControlAV winner:

"chair": knows all preferences and can change the

structureOther types of control: of an election adding/partitioning voters deleting/adding/partitioning candidates

v1 1 1 0 1v2 0 1 0 0v3 1 1 0 1v4 0 0 1 0v5 1 0 1 1v6 1 0 0 1∑ 2 3 1 2

Page 26: Manipulation  and Control for Approval Voting and Other  Voting  Systems

NP-Hardness Shields for Control

Resistance = NP-hardness, Vulnerability = P, Immunity, and Susceptibility

Page 27: Manipulation  and Control for Approval Voting and Other  Voting  Systems

NP-Hardness Shields for Control

Page 28: Manipulation  and Control for Approval Voting and Other  Voting  Systems

References: Control J. Bartholdi, C. Tovey, and M. Trick: How Hard is it to Control an

Election? Mathematical and Computer Modelling, 1992. E. Hemaspaandra , L. Hemaspaandra, and J. Rothe: Anyone but

Him: The Complexity of Precluding an Alternative. Artificial Intelligence, 2007. (AAAI-2005)

P. Faliszewski, E. Hemaspaandra , L. Hemaspaandra, and J. Rothe: Llull and Copeland Voting Computationally Resist Bribery and Constructive Control. Journal of Artificial Intelligence Research, 2009. (AAAI-2007; AAIM-2008)

G. Erdélyi, M. Nowak, and J. Rothe: SP-AV Fully Resists Constructive Control and Broadly Resists Destructive Control. Mathematical Logic Quarterly, 2009. (MFCS-2008)

G. Erdélyi and J. Rothe: Control Complexity in Fallback Voting. Proceedings of CATS-2010.

G. Erdélyi, L. Piras, and J. Rothe: The Complexity of Voter Partition in Bucklin and Fallback Voting: Solving Three Open Problems. Proceedings of AAMAS-2011.

Page 29: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Copeland : winner

v1: > > > v3: > > >v2: > > > v4: > > >

assumption: . v4 knows the other voters‘ votes

v4 lies to make his

most preferred candidate win

Cope-land

Score- 4:0 2:2 3:1 2.5

0:4 - 1:3 2:2 0.5

2:2 3:1 - 2:2 2

1:3 2:2 2:2 - 1

War on Manipulation I like Spock but I don‘t

want him to be the

captain!!21

Page 30: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Copeland : winners

v1: > > > v3: > > >v2: > > > v4: > > >

Here: unweighted voters, single manipulator

. Other types: - coalitional

manipulation - weighted voters

Cope-land

Score- 3:1 2:2 2:2 2

1:3 - 1:3 1:3 0

2:2 3:1 - 2:2 2

2:2 3:1 2:2 - 2

War on Manipulation21

I like Spock but I don‘t

want him to be the

captain!!

Page 31: Manipulation  and Control for Approval Voting and Other  Voting  Systems

NP-Hardness Shields for Manipulation

Results due to Conitzer, Sandholm, Lang (J.ACM 2007)

Page 32: Manipulation  and Control for Approval Voting and Other  Voting  Systems

NP-Hardness Shields to Protect Elections

NP-hardness shields

Manipulation & Control inSingle-peaked Electorates

Elections & Voting Systems

Manipulation & Control

Proof Sketch: CCAV in Approval

Page 33: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Single-Peaked Preferences A collection V of votes is said to be single-peaked if

there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).

A voter‘s preference curve on galactic taxes

low galactic taxes high galactic taxes

Page 34: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).

A voter‘s > > > preference curve on galactic taxes

low galactic taxes high galactic taxes

Single-Peaked Preferences

Single-peaked preference consistent with linear order of candidates

Page 35: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).

A voter‘s > > > preference curve on galactic taxes

low galactic taxes high galactic taxes

Single-Peaked Preferences

Preference that is inconsistent with this linear order of candidates

Page 36: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Single-Peaked Preferences A collection V of votes is said to be single-peaked if

there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).

If each vote vi in V is a linear order >i over C, this means that for each triple of candidates c, d, and e:

(c L d L e or e L d L c) implies that for each i,if c >i d then d >i e.

Page 37: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Single-Peaked Preferences A collection V of votes is said to be single-peaked if

there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).

If each vote vi in V is a linear order >i over C, this means that for each triple of candidates c, d, and e:

(c L d L e or e L d L c) implies that for each i,if c >i d then d >i e.

Bartholdi & Trick (1986); Escoffier, Lang & Öztürk (2008): Given a collection V of linear orders over C, in polynomial time we can produce a linear order L witnessing V‘s single-peakedness or can determine that V is not single-peaked.

Page 38: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A collection V of votes is said to be single-peaked if there exists a linear order L over C such that each voter‘s „degree of preference“ rises to a peak and then falls (or just rises or just falls).

Single-peaked w.r.t. this order?

v1 1 1 0 0 1 nov2 0 1 1 0 0 yesv3 1 1 0 0 1 nov4 0 0 0 1 0 yesv5 1 0 0 1 1 nov6 1 0 0 0 1 no

Single-Peaked Approval Vectors

Page 39: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Removing NP-hardness shields: 3-candidate Borda veto every scoring protocol for -candidate 3-veto,

Leaving them in place: STV (Walsh, AAAI-2007) 4-candidate Borda 5-candidate 3-veto

Erecting NP-hardness shields: Artificial election system with approval votes, for

size-3-coalition unweighted manipulationResults due to Faliszewski, Hemaspaandra, Hemaspaandra & Rothe (Information & Computation 2011)

General Single-peaked

ji )0,...,0,1,...,1( ji

6mm

Constructive Coalitional Weighted Manipulation

Page 40: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Removing NP-hardness shields: Approval

Constructive control by adding voters Constructive control by deleting voters

Plurality constructive control by adding candidates destructive control by adding candidates constructive control by deleting candidates destructive control by deleting candidates

Results due to Faliszewski, Hemaspaandra, Hemaspaandra & Rothe (2011) Brandt, Brill, Hemaspaandra & Hemaspaandra (AAAI 2010)

achieved similar results for other voting systems as well (e.g., for systems satisfying the

weak Condorcet criterion) and also for constructive control by partition of voters.

General Single-peaked

Control for Single-Peaked Electorates

Page 41: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Removing NP-hardness shields: Approval

Constructive control by adding voters Constructive control by deleting voters

Plurality constructive control by adding candidates destructive control by adding candidates constructive control by deleting candidates destructive control by deleting candidates

Results due to Faliszewski, Hemaspaandra, Hemaspaandra & Rothe (2011) Brandt, Brill, Hemaspaandra & Hemaspaandra (AAAI 2010)

achieved similar results for other voting systems as well (e.g., for systems satisfying the

weak Condorcet criterion) and also for constructive control by partition of voters.

General Single-peaked

Control for Single-Peaked Electorates

Page 42: Manipulation  and Control for Approval Voting and Other  Voting  Systems

NP-Hardness Shields to Protect Elections

NP-hardness shields

Manipulation & Control inSingle-peaked Electorates

Elections & Voting Systems

Manipulation & Control

Proof Sketch: CCAV in Approval

Page 43: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

9 5

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities)

Page 44: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

9 5

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities) Which vote

types from W should we add? Especially if they are incomparable?

Page 45: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

9 5

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities) We‘ll handle

this by a „smart greedy“

algorithm.

Page 46: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

9 5

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities) Why are F, C,

B, c, f, and j dangerous but the remaining candidates can be ignored?

Page 47: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

9 5

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities) First, each

added vote will be an interval

including p. So drop all others.

Page 48: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities) First, each

added vote will be an interval

including p. So drop all others.

Page 49: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities) Now, if adding

votes from W causes p to

beat c then p must also beat

a and b.

Page 50: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities) Thus, c is a

dangerous rival for p

but a and b can safely

be ignored.

Page 51: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

2

number of approvals from voters in V for candidates that are

votes in V‘ that can be added (withmultiplicities) Likewise, f is

dangerous but d and e

can safely be ignored.

Page 52: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

2

number of approvals from voters in V for candidates that are

votes in V‘ that can be added (withmultiplicities) Likewise, j is

dangerous but g, h, and i can safely be

ignored.

Page 53: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

2

number of approvals from voters in V for candidates that are

votes in V‘ that can be added (withmultiplicities) Hey, why do

you do that step by step?Just say j is dangerous and ignore a, …, i.

Page 54: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

2

number of approvals from voters in V for candidates that are

votes in V‘ that can be added (withmultiplicities) No! Look what

happens if we add 6 votes of the type with multiplicity 7!

Page 55: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

1

1

413

2 votes in W that can be added (withmultiplicities) No! Look what

happens if we add 6 votes of the type with multiplicity 7!

Page 56: Manipulation  and Control for Approval Voting and Other  Voting  Systems

A Sample Proof Sketch

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

1

1

473

2

number of approvals from voters in V for candidates that are

votes in W that can be added (withmultiplicities) OK, that‘s not

illogical. But how does your „smart greedy“ algorithm work?

Page 57: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Smart Greedy Algorithm OK, first I need more space for that!

Page 58: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Smart Greedy Algorithm OK, first I need more space for that! In smart greedy, we eat through all dangerous

rivals to the right of p starting with the leftmost: c. To become the unique winner, p must beat c. Only votes in W whose right endpoints fall in

can help. Let B be the set of those votes. Choose votes from B starting with the rightmost left

endpoint. This is a perfectly safe strategy!

cp,

Page 59: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Smart Greedy Algorithm

1

1

473

2 votes in W that can be added (withmultiplicities)

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

Page 60: Manipulation  and Control for Approval Voting and Other  Voting  Systems

F E D C B A p a b c d e f g h i j k012345678

dangerousto be ignored

Smart Greedy Algorithm

1

1

2 votes in B that can be added (withmultiplicities)

Page 61: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Smart Greedy Algorithm

1

0

2 votes in B that can be added (withmultiplicities)

Page 62: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Smart Greedy Algorithm

1

First rival

defeated

1 votes in B that can be added (withmultiplicities)

Page 63: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Smart Greedy Algorithm OK, first I need more space for that! In smart greedy, we eat through all dangerous

rivals to the right of p starting with the leftmost: c. To become the unique winner, p must beat c. Only votes in W whose right endpoints fall in

can help. Let B be the set of those votes. Choose votes from B starting with the rightmost left

endpoint. This is a perfectly safe strategy! Iterate. If you run out of dangerous candidates on the right

of p, mirror image the societal order (i.e., reverse L) and finish off the remaining dangerous candidates until you either succeed or reach the addition limit.

cp,

Page 64: Manipulation  and Control for Approval Voting and Other  Voting  Systems

Thank you very much!

That‘s typical for you humans! Please wait

until the talk ist finished before you

start asking questions!