Complexity of Manipulation and Bribery in Premise-Based Judgment Aggregation with Simple Formulas

Read original: arXiv:2402.16016 - Published 4/1/2024 by Robert Bredereck, Junjie Luo
Total Score

0

🏅

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper explores the computational complexity of manipulating or bribing voting systems in premise-based judgment aggregation, where voters make judgments on individual premises rather than directly on the final conclusion.
  • The authors analyze the complexity of two key problems: manipulation, where a voter tries to change the outcome by misreporting their judgments, and bribery, where an external agent tries to influence the outcome by changing some voters' judgments.
  • The paper focuses on judgment aggregation with "simple formulas", which are a restricted but practically relevant class of logical formulas used to represent the relationship between premises and conclusions.

Plain English Explanation

The paper looks at voting systems where people don't directly vote on the final decision, but instead vote on individual "premise" questions that together determine the outcome. The researchers investigate how hard it is for someone to unfairly influence the final outcome in two ways:

  1. Manipulation: A voter tries to change the result by lying about their own beliefs when voting.
  2. Bribery: An outside agent tries to change the result by convincing some voters to change their votes.

The researchers focus on a specific type of voting system that uses "simple formulas" to connect the individual premise votes to the final conclusion. These types of formulas are common in real-world decision-making.

The key finding is that both manipulation and bribery can be computationally difficult problems in these voting systems, meaning it's hard for someone to successfully pull off these unfair tactics. This suggests these voting methods may be more robust against strategic behavior than one might expect.

Technical Explanation

The paper analyzes the computational complexity of manipulation and bribery in premise-based judgment aggregation with "simple formulas". In this setting, a group of voters express judgments on individual premises, and these judgments are then aggregated to determine the final collective judgment on a conclusion.

The authors consider two strategic problems:

  1. Manipulation: A voter tries to change the collective judgment on the conclusion by misreporting their judgments on the premises.
  2. Bribery: An external agent tries to change the collective judgment on the conclusion by convincing a subset of voters to change their premise judgments.

For both problems, the authors show that under certain conditions on the structure of the simple formulas, the problems are computationally hard (NP-complete). This means that in the general case, it is unlikely that there are efficient algorithms to find optimal manipulation or bribery strategies.

The technical analysis involves reducing these problems to well-known NP-complete problems in computer science, such as SAT and vertex cover. The authors also identify parameter settings where the problems become tractable (polynomial-time solvable).

Critical Analysis

The paper makes a valuable contribution by rigorously analyzing the computational complexity of strategic behavior in a realistic model of judgment aggregation. The focus on "simple formulas" is particularly relevant, as these types of logical structures are common in real-world decision-making contexts.

One potential limitation is that the model assumes voters have binary judgments on the premises (accept or reject). In practice, voters may express more nuanced judgments, which could affect the complexity analysis. Additionally, the paper does not consider other types of strategic behavior, such as coalition formation, that could be relevant in judgment aggregation.

Further research could explore the implications of these complexity results for the design of practical judgment aggregation systems. For example, are there ways to leverage the computational hardness of manipulation and bribery to incentivize honest voting? Additionally, the insights from this paper could be extended to other voting frameworks beyond judgment aggregation.

Conclusion

This paper provides a detailed analysis of the computational complexity of manipulation and bribery in premise-based judgment aggregation with simple formulas. The key finding is that these strategic problems can be computationally hard, suggesting that these voting systems may be more robust against unfair influence than one might expect.

The results contribute to our understanding of the theoretical properties of judgment aggregation mechanisms and have potential practical implications for the design of more secure and trustworthy decision-making systems.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🏅

Total Score

0

Complexity of Manipulation and Bribery in Premise-Based Judgment Aggregation with Simple Formulas

Robert Bredereck, Junjie Luo

Judgment aggregation is a framework to aggregate individual opinions on multiple, logically connected issues into a collective outcome. These opinions are cast by judges, which can be for example referees, experts, advisors or jurors, depending on the application and context. It is open to manipulative attacks such as textsc{Manipulation} where judges cast their judgments strategically. Previous works have shown that most computational problems corresponding to these manipulative attacks are NP-hard. This desired computational barrier, however, often relies on formulas that are either of unbounded size or of complex structure. We revisit the computational complexity for various textsc{Manipulation} and textsc{Bribery} problems in premise-based judgment aggregation, now focusing on simple and realistic formulas. We restrict all formulas to be clauses that are (positive) monotone, Horn-clauses, or have bounded length. For basic variants of textsc{Manipulation}, we show that these restrictions make several variants, which were in general known to be NP-hard, polynomial-time solvable. Moreover, we provide a P vs. NP dichotomy for a large class of clause restrictions (generalizing monotone and Horn clauses) by showing a close relationship between variants of textsc{Manipulation} and variants of textsc{Satisfiability}. For Hamming distance based textsc{Manipulation}, we show that NP-hardness even holds for positive monotone clauses of length three, but the problem becomes polynomial-time solvable for positive monotone clauses of length two. For textsc{Bribery}, we show that NP-hardness even holds for positive monotone clauses of length two, but it becomes polynomial-time solvable for the same clause set if there is a constant budget.

Read more

4/1/2024

Total Score

0

Learning to Manipulate under Limited Information

Wesley H. Holliday, Alexander Kristoffersen, Eric Pacuit

By classic results in social choice theory, any reasonable preferential voting method sometimes gives individuals an incentive to report an insincere preference. The extent to which different voting methods are more or less resistant to such strategic manipulation has become a key consideration for comparing voting methods. Here we measure resistance to manipulation by whether neural networks of varying sizes can learn to profitably manipulate a given voting method in expectation, given different types of limited information about how other voters will vote. We trained over 70,000 neural networks of 26 sizes to manipulate against 8 different voting methods, under 6 types of limited information, in committee-sized elections with 5-21 voters and 3-6 candidates. We find that some voting methods, such as Borda, are highly manipulable by networks with limited information, while others, such as Instant Runoff, are not, despite being quite profitably manipulated by an ideal manipulator with full information. For the two probability models for elections that we use, the overall least manipulable of the 8 methods we study are Condorcet methods, namely Minimax and Split Cycle.

Read more

4/17/2024

The Complexity of Manipulation of k-Coalitional Games on Graphs
Total Score

0

The Complexity of Manipulation of k-Coalitional Games on Graphs

Hodaya Barr, Yohai Trabelsi, Sarit Kraus, Liam Roditty, Noam Hazon

In many settings, there is an organizer who would like to divide a set of agents into $k$ coalitions, and cares about the friendships within each coalition. Specifically, the organizer might want to maximize utilitarian social welfare, maximize egalitarian social welfare, or simply guarantee that every agent will have at least one friend within his coalition. However, in many situations, the organizer is not familiar with the friendship connections, and he needs to obtain them from the agents. In this setting, a manipulative agent may falsely report friendship connections in order to increase his utility. In this paper, we analyze the complexity of finding manipulation in such $k$-coalitional games on graphs. We also introduce a new type of manipulation, socially-aware manipulation, in which the manipulator would like to increase his utility without decreasing the social welfare. We then study the complexity of finding socially-aware manipulation in our setting. Finally, we examine the frequency of socially-aware manipulation and the running time of our algorithms via simulation results.

Read more

8/15/2024

Detecting and Deterring Manipulation in a Cognitive Hierarchy
Total Score

0

Detecting and Deterring Manipulation in a Cognitive Hierarchy

Nitay Alon, Lion Schulz, Joseph M. Barnby, Jeffrey S. Rosenschein, Peter Dayan

Social agents with finitely nested opponent models are vulnerable to manipulation by agents with deeper reasoning and more sophisticated opponent modelling. This imbalance, rooted in logic and the theory of recursive modelling frameworks, cannot be solved directly. We propose a computational framework, $aleph$-IPOMDP, augmenting model-based RL agents' Bayesian inference with an anomaly detection algorithm and an out-of-belief policy. Our mechanism allows agents to realize they are being deceived, even if they cannot understand how, and to deter opponents via a credible threat. We test this framework in both a mixed-motive and zero-sum game. Our results show the $aleph$ mechanism's effectiveness, leading to more equitable outcomes and less exploitation by more sophisticated agents. We discuss implications for AI safety, cybersecurity, cognitive science, and psychiatry.

Read more

5/6/2024