Skip to main content

Hybrid Voting Protocols and Hardness of Manipulation

  • Conference paper
Algorithms and Computation (ISAAC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3827))

Included in the following conference series:

Abstract

This paper addresses the problem of constructing voting protocols that are hard to manipulate. We describe a general technique for obtaining a new protocol by combining two or more base protocols, and study the resulting class of (vote-once) hybrid voting protocols, which also includes most previously known manipulation-resistant protocols. We show that for many choices of underlying base protocols, including some that are easily manipulable, their hybrids are NP-hard to manipulate, and demonstrate that this method can be used to produce manipulation-resistant protocols with unique combinations of useful features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bartholdi III, J.J., Tovey, C.A., Orlin, J.B.: The Computational Difficulty of Manipulating an Election. Social Choice and Welfare 6, 227–241 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  2. Bartholdi III, J.J., Orlin, J.B.: Single Transferable Vote Resists Strategic Voting. Social Choice and Welfare 8(4), 341–354 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  3. Conitzer, V., Sandholm, T.: Complexity of Manipulating Elections with Few Candidates. In: Proceedings of the Eighteenth National Conference on Artificial Intelligence and Fourteenth Conference on Innovative Applications of Artificial Intelligence, Edmonton, Alberta, Canada, July 28 — August 1, pp. 314–319. AAAI Press, Menlo Park (2002)

    Google Scholar 

  4. Conitzer, V., Sandholm, T.: Universal Voting Protocol Tweaks to Make Manipulation Hard. In: Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), Acapulco, Mexico, August 9–15, pp. 781–788 (2003)

    Google Scholar 

  5. Dwork, C., Kumar, R., Naor, M., Sivakumar, D.: Rank aggregation methods for the Web, In. In: Proc. 10th International World-Wide Web Conference (WWW), pp. 613–622

    Google Scholar 

  6. Elkind, E., Lipmaa, H.: Small Coalitions Cannot Manipulate Voting. In: Proceedings of Financial Cryptography and Data Security - Ninth International Conference, February 28–March 3, The Commonwealth of Dominica (2005)

    Google Scholar 

  7. Ephrati, E., Rosenschein, J.S.: Multi-Agent Planning as a Dynamic Search for Social Consensus. In: Proceedings of the International Joint Conference on Artificial Intelligence, IJCAI (1993)

    Google Scholar 

  8. Gibbard, A.F.: Manipulation of Voting Schemes: A General Result. Econometrica 41, 597–601 (1973)

    Article  MathSciNet  Google Scholar 

  9. Fagin, R., Kumar, R., Mahdian, M., Sivakumar, D., Vee, E.: Comparing and Aggregating Rankings with Ties. In: Proceedings of 23rd ACM Symposium on Principles of Database Systems (PODS), pp. 47–58

    Google Scholar 

  10. Pennock, D.M., Horvitz, E., Lee Giles, C.: Social Choice Theory and Recommender Systems: Analysis of the Axiomatic Foundations of Collaborative Filtering. In: Proceedings of the Seventeenth National Conference on Artificial Intelligence (July 2000)

    Google Scholar 

  11. Satterthwaite, M.A.: The Existence of Strategy-Proof Voting Procedures: A Topic in Social Choice Theory. PhD thesis, University of Wisconsin, Madison (1973)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Elkind, E., Lipmaa, H. (2005). Hybrid Voting Protocols and Hardness of Manipulation. In: Deng, X., Du, DZ. (eds) Algorithms and Computation. ISAAC 2005. Lecture Notes in Computer Science, vol 3827. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11602613_22

Download citation

  • DOI: https://doi.org/10.1007/11602613_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30935-2

  • Online ISBN: 978-3-540-32426-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics