This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: Texas Tech University, 2500 Broadway, Lubbock, TX 79409, USA 11email: [email protected] 11email: [email protected] 22institutetext: University of Texas Rio Grande Valley,1201 W University Dr, Edinburg, TX 78539, USA 22email: [email protected]33institutetext: University of Texas San Antonio,1 UTSA Circle, San Antonio, TX 78249, USA 33email: [email protected] 44institutetext: Auburn University at Montgomery,7430 East Dr, Montgomery, AL 36117, USA 44email: [email protected] 55institutetext: University of Houston, 4800 Calhoun Rd, Houston, TX 77004, USA 55email: [email protected] 55email: [email protected] 66institutetext: Amazon Web Services, Seatle, USA 66email: [email protected]

Computational Complexity Characterization of Protecting Elections from Bribery 111A 2 page extended abstract has been published at the Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS’18)

Lin Chen 11    Ahmed Sunny Lei Xu 1122    Shouhuai Xu 33    Zhimin Gao 44    Yang Lu 55    Weidong Shi 55    Nolan Shah 66
Abstract

The bribery problem in election has received considerable attention in the literature, upon which various algorithmic and complexity results have been obtained. It is thus natural to ask whether we can protect an election from potential bribery. We assume that the protector can protect a voter with some cost (e.g., by isolating the voter from potential bribers). A protected voter cannot be bribed. Under this setting, we consider the following bi-level decision problem: Is it possible for the protector to protect a proper subset of voters such that no briber with a fixed budget on bribery can alter the election result? The goal of this paper is to give a full picture on the complexity of protection problems. We give an extensive study on the protection problem and provide algorithmic and complexity results. Comparing our results with that on the bribery problems, we observe that the protection problem is in general significantly harder. Indeed, it becomes Σ2p\Sigma_{2}^{p}-complete even for very restricted special cases, while most bribery problems lie in NP. However, it is not necessarily the case that the protection problem is always harder. Some of the protection problems can still be solved in polynomial time, while some of them remain as hard as the bribery problem under the same setting.

Keywords:
Voting, complexity, NP-hardness, Σ2p\Sigma_{2}^{p}-hardness

1 Introduction

In an election, there are a set of candidates and a set of voters. Each voter has a preference list of candidates. Given these preference lists, a winner is determined based on some voting rule, examples of which will be elaborated later.

In the context of election, the bribery problem has received considerable attention (see, for example, [1, 7, 8, 12, 14]). In this problem, there is an attacker who attempts to manipulate the election by bribing some voters, who will then report preference lists of the attacker’s choice (rather than the voters’ own preference lists). Each voter has a price for being bribed, and the attacker has an attack budget for bribing voters. There are two kinds of attackers: constructive vs. destructive. A constructive attacker attempts to make its designated candidate win an election, whereas the designated candidate would not win the election should there be no attacker. In contrast, a destructive attacker attempts to make its designated candidate lose the election, whereas the designated candidate would win the election should there be no attacker. The research question is: Given an attack budget for bribing, whether or not a (constructive or destructive) attacker can achieve its goal?

In this paper, we initiate the study of a new problem, called the protection problem, which extends the bribery problem as follows. There are also a set of candidates, a set of voters, and a bribery attacker. Each voter also has a preference list of candidates. There is also a voting rule according to which a winner is determined. Going beyond the bribery problem, the protection problem further considers a defender, who aims to protect elections from bribery. More specifically, the defender is given a defense budget and can use the defense budget to award some of the voters so that they cannot be bribed by the attacker anymore. This leads to an interesting problem: Given a defense budget, is it possible to protect an election from an attacker with a given attack budget for bribing voters (i.e., assuring that the attacker cannot achieve its goal)?

Our contributions. We introduce the problem of protecting elections from bribery, namely the protection problem. Given a defense budget for rewarding some of the voters and an attack budget for bribing some of the rest voters, the protection problem asks whether or not the defender can protect the election. We investigate the protection problem against the aforementioned two kinds of bribery attackers: constructive vs. destructive.

We present a characterization on the computational complexity of the protection problem (summarized in Table 1 in Section 5). The characterization is primarily concerning the voting rule of rr-approval, which will be elaborated in Section 2. At a high level, our results can be summarized as follows. (i) The protection problem is hard and might be much harder than the bribery problem. For example, the protection problem is Σ2p\Sigma_{2}^{p}-complete in most cases, while the bribery problem is in NP  under the same settings. (ii) The destructive protection problem (i.e., protecting elections against a destructive attacker) is no harder than the constructive protection problem (i.e., protecting elections against a constructive attacker) in all of the settings we considered. In particular, the destructive protection problem is Σ2p\Sigma_{2}^{p}-hard only when the voters are weighted and have arbitrary prices, while the constructive protection problem is Σ2p\Sigma_{2}^{p}-hard even when the voters are unweighted and have the unit price. (iii) Voter weights and prices have completely different effects on the computational complexity of the protection problem. For example, the constructive protection problem is coNP-hard in one case but is in P  in another case.

Related Work. The problem of protecting elections from attacks seemingly has not received the due attention. Very recently, Yin et al. [20] considered the problem of defending elections against an attacker who can delete (groups of) voters. That is, the investigation is in the context of the control problem, where the attacker attempts to manipulate an election by adding or deleting some voters. The control problem has been extensively investigated (see, for example, [4, 9, 10, 20]). Although the control problem is related to the bribery problem, the means used by the attacker in the control problem (i.e., attacker adding or deleting some voters) is different from the means used by the attacker in the bribery problem (i.e., attacker changing the preference lists of the bribed voters). We investigate the protection problem, which is defined in the context of the bribery problem rather than the control problem. That is, the problem we investigate is different from the problem investigated by Yin et al. [20].

The protection problem we study is inspired by the bribery problem. Faliszewski et al. [8] gave the first characterization on the complexity of the bribery problem, including some dichotomy theorems. In the bribery problem, the attacker can pay a fixed, but voter-dependent, price to arbitrarily manipulate the preference list of a bribed voter. The complexity of the bribery problem under the scoring rule of rr-approval or rr-veto for small values of rr was addressed later by Lin [15] and Bredereck and Talmon [2]. There are also studies on measuring the bribery price in different ways (see, e.g., [1, 6, 12]).

Technically, the protection problem is related to the bi-level optimization problem, especially the bi-level knapsack problem ([3, 5, 17, 18]). In the bi-level knapsack problem, there is a leader and a follower. The leader makes a decision first (e.g., packing a subset of items into the knapsack), and then the follower solves an optimization problem given the leader’s decision (e.g., finding the most profitable subset of items that have not been packed by the leader). The problem asks for the decision of the leader such that a certain objective function is optimized (e.g., minimizing the profit of the follower). The protection problem we study can be formulated as the bi-level problem by letting the defender award some voters who therefore cannot be bribed by the attacker anymore, and then the attacker bribes some of the remaining voters as an attempt to manipulate the election.

2 Problem definition

Election model. Consider a set of mm candidates 𝒞={c1,c2,,cm}\mathcal{C}=\{c_{1},c_{2},\ldots,c_{m}\} and a set of nn voters 𝒱={v1,v2,,vn}\mathcal{V}=\{v_{1},v_{2},\ldots,v_{n}\}. Each voter vjv_{j} has a preference list of candidates, which is essentially a permutation of candidates, denoted as τj\tau_{j}. The preference of vjv_{j} is denoted by (cτj(1),cτj(2),,cτj(m))(c_{\tau_{j}(1)},c_{\tau_{j}(2)},\ldots,c_{\tau_{j}(m)}), meaning that vjv_{j} prefers candidate cτj(z)c_{\tau_{j}(z)} to cτj(z+1)c_{\tau_{j}(z+1)}, where z=1,2,z=1,2,\ldots. Since τj\tau_{j} is a permutation over {1,2,,m}\{1,2,\ldots,m\}, we denote by τj1\tau_{j}^{-1} the inverse of τj\tau_{j}, meaning that τj1(i)\tau_{j}^{-1}(i) is the position of candidate cic_{i} in vector (cτj(1),cτj(2),,cτj(m))(c_{\tau_{j}(1)},c_{\tau_{j}(2)},\ldots,c_{\tau_{j}(m)}).

Voting rules. In this paper, we focus on the scoring rule (or scoring protocol) that maps a preference list to a mm-vector α=(α1,α2,,αm)\alpha=(\alpha_{1},\alpha_{2},\ldots,\alpha_{m}), where αi\alpha_{i}\in\mathbb{N} is the score assigned to the ii-th candidate on the preference list of voter vjv_{j} and α1α2αm\alpha_{1}\geq\alpha_{2}\geq\ldots\geq\alpha_{m}. Given that τj\tau_{j} is the preference list of vjv_{j}, candidate cτj(i)c_{\tau_{j}(i)} receives a score of αi\alpha_{i} from vjv_{j}. The total score of a candidate is the summation of the scores it received from the voters. The winner is the candidate that receives the highest total score. We focus on a single-winner election, meaning that only one winner is selected. In the case of a tie, a random candidate with the highest total score is selected. However, our results remain valid for all-natural variation of selecting a single winner.

We say a scoring rule is non-trivial, if α1>αm\alpha_{1}>\alpha_{m} (i.e., not all scores are the same). There are many (non-trivial) scoring rules, including the popular rr-approval, plurality, veto, Borda count and so on. In the case of rr-approval, α=(1,1,,1r,0,0,,0mr)\alpha=(\underbrace{1,1,\ldots,1}_{r},\underbrace{0,0,\ldots,0}_{m-r}). In the case of plurality, α=(1,0,,0)\alpha=(1,0,\ldots,0). In the case of veto, α=(1,1,,1,0)\alpha=(1,1,\ldots,1,0). It is clear that plurality and veto are special cases of the scoring rule of rr-approval.

Weights of voters. Voters can have different weights. Let wjw_{j}\in\mathbb{N} be the weight of voter vjv_{j}. In a weighted election, the total score of a candidate is the weighted sum of the scores a candidate receives from the voters. For example, candidate cic_{i} receives a score wjατj1(i)w_{j}\cdot\alpha_{\tau_{j}^{-1}(i)} from voter vjv_{j}.

By re-indexing all of the candidates, we can set, without loss of generality, cmc_{m} as the winner in the absence of bribery.

Adversarial models. We consider an attacker that does not belong to 𝒞𝒱\mathcal{C}\cup\mathcal{V} but attempts to manipulate the election by bribing some voters. Suppose voter vjv_{j} has a bribing price pjbp_{j}^{b}, meaning that vjv_{j}, upon receiving a bribery of amount pjbp_{j}^{b} from the attacker, will change its preference list to the list given by the attacker. The attacker has a total budget BB. As in the bribery problem, we also consider two kinds of attackers:

  • Constructive attacker: This attacker attempts to make a designated candidate win the election, meaning that the designated candidate is the only candidate who gets the highest score.

  • Destructive attacker: This attacker attempts to make a designated candidate lose the election, meaning that there is another candidate that gets a strictly higher score than the designated candidate does.

Protection. In the protection problem, voter vjv_{j}, upon receiving an award of amount pjap_{j}^{a} (or awarding price) from the defender, will always report its preference list faithfully and cannot be bribed. Note that pjap_{j}^{a} may have multiple interpretations, such as monetary award, economic incentives or the cost of isolating voters from bribery. We say a voter vjv_{j} is awarded if vjv_{j} receives an award of pjap_{j}^{a}.

Problem statement. We formalize our problem as follows.

The constructive protection problem (i.e., protecting elections against constructive attackers): Input: A set 𝒞\mathcal{C} of mm candidates. A set 𝒱\mathcal{V} of nn voters, each with a weight wj>0w_{j}\in\mathbb{Z}_{>0}, a preference list τj\tau_{j}, an awarding price of pja>0p_{j}^{a}\in\mathbb{Z}_{>0} and a bribing price of pjb>0p_{j}^{b}\in\mathbb{Z}_{>0}. A scoring rule for selecting a single winner. A defender with a defense budget F0F\in\mathbb{Z}_{\geq 0}. An attacker with an attack budget B0B\in\mathbb{Z}_{\geq 0} attempting to make candidate cmc_{m} win the election. Output: Decide whether there exists a 𝒱F𝒱{\mathcal{V}}_{F}\subseteq{\mathcal{V}} such that j:vj𝒱FpjaF\sum_{j:v_{j}\in{\mathcal{V}}_{F}}p_{j}^{a}\leq F; and for any subset 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F} with j:vj𝒱BpjbB\sum_{j:v_{j}\in{\mathcal{V}}_{B}}p_{j}^{b}\leq B, cmc_{m} does not get a strictly higher score than any other candidate despite the attacker bribing the voters belonging to 𝒱B{\mathcal{V}}_{B} (i.e., bribing 𝒱B{\mathcal{V}}_{B}).

The destructive protection problem (i.e., protecting elections against destructive attackers): Input: A set 𝒞\mathcal{C} of mm candidates. A set 𝒱\mathcal{V} of nn voters, each with a weight wj>0w_{j}\in\mathbb{Z}_{>0}, a preference list τj\tau_{j}, an awarding price of pja>0p_{j}^{a}\in\mathbb{Z}_{>0} and a bribing price of pjb>0p_{j}^{b}\in\mathbb{Z}_{>0}. A scoring rule for selecting a single winner. Suppose cmc_{m} is the winner if no voter is bribed. A defender with a defense budget F0F\in\mathbb{Z}_{\geq 0}. An attacker with an attack budget B0B\in\mathbb{Z}_{\geq 0} attempting to make cmc_{m} lose the election by making c𝒞{cm}c\in\mathcal{C}\setminus\{c_{m}\} get a strictly higher score than cmc_{m} does. Output: Decide if there exists a 𝒱F𝒱{\mathcal{V}}_{F}\subseteq{\mathcal{V}} such that j:vj𝒱FpjaF\sum_{j:v_{j}\in{\mathcal{V}}_{F}}p_{j}^{a}\leq F; and for any subset 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F} such that j:vj𝒱BpjbB\sum_{j:v_{j}\in{\mathcal{V}}_{B}}p_{j}^{b}\leq B, no candidate c𝒞{cm}c\in\mathcal{C}\setminus\{c_{m}\} can get a strictly higher score than cmc_{m} does despite the attacker bribing 𝒱B{\mathcal{V}}_{B}.

Further terminology and notations. We denote by W(ci)W(c_{i}) the total score obtained by candidate cic_{i} in the absence of bribery (i.e., no voter is bribed). If the defender can select 𝒱F{\mathcal{V}}_{F} such that no constructive or destructive attacker can succeed, we say the defender succeeds. We call our problem as the (constructive or destructive) weighted-$-protection problem, where “weighted” indicates that the voters are weighted and “$” indicates that arbitrary awarding and bribing prices are involved. In addition to investigating the general weighted-$-protection problem, we also investigate the following special cases of it:

  • the $-protection problem with wj=1w_{j}=1 for each jj (i.e., the voters are not weighted);

  • the weighted-protection problem with pja=pjb=1p_{j}^{a}=p_{j}^{b}=1 for each jj (i.e., voters are associated with the unit awarding price and the unit bribing price);

  • the unit-protection problem with wj=pja=pjb=1w_{j}=p_{j}^{a}=p_{j}^{b}=1 for each jj (i.e., voters are not weighted, and are associated with the unit awarding price and the unit bribing price).

  • the symmetric protection problem with pja=pjbp_{j}^{a}=p_{j}^{b} for each jj (i.e., the awarding price and the bribing price are always the same), while noting that different voters may have different prices.

3 The Case of Constantly Many Candidates

3.1 The Weighted-$-Protection Problem

The goal of this subsection is to prove the following theorem.

Theorem 3.1

For any non-trivial scoring rule, both the constructive and destructive weighted-$-protection problem, is Σ2p\Sigma_{2}^{p}-complete.

The theorem follows from Lemma 1 and Lemma 2 below, which shows the Σ2p\Sigma_{2}^{p} membership and Σ2p\Sigma_{2}^{p}-hardness, respectively.

Lemma 1

For any non-trivial scoring rule, both the constructive and destructive weighted-$-protection problems are in Σ2p\Sigma_{2}^{p}.

Lemma 2

For any non-trivial scoring rule, both the constructive and destructive weighted-$-protection problems are both Σ2p\Sigma_{2}^{p}-hard even if there are only m=2m=2 candidates.

Proof sketch. The proof of Lemma 2 follows from De-Negre (DNeg) variant of bi-level knapsack problem, which is proved to be Σ2p\Sigma_{2}^{p}-hard by Caprara et al. [3]. We give a brief explanation. In this De-Negre variant, there are an adversary and a packer. The adversary has a reserving budget F¯\bar{F} and the packer has a packing budget B¯\bar{B}. There is a set of nn items, each having a price p¯ja\bar{p}_{j}^{a} to the adversary, a price p¯jb\bar{p}_{j}^{b} to the packer, and a weight w¯j=p¯jb\bar{w}_{j}=\bar{p}_{j}^{b} to both the adversary and the packer. The adversary first reserves a subset of items whose total price is no more than F¯\bar{F}. Then the packer solves the knapsack problem with respect to the remaining items that are not reserved; i.e., the packer will select a subset of the remaining items whose total price is no more than B¯\bar{B} but their total weight is maximized. The De-Negre variant asks if the adversary can reserve a proper subset of items such that the total weight of the unreserved items that are selected by the packer is no more than some parameter WW. The De-Negre variant is similar to the weighted-$-protection protection problem, because we can view the defender and attacker in the protection problem respectively as the adversary and packer in the bi-level knapsack problem. In the case of a single-winner election with m=2m=2 candidates, the goal of the defender is to assure that the constructive attacker cannot make the loser get a strictly higher score than the winner by bribing. This is essentially the same as ensuring that the constructive attacker cannot bribe a subset of non-awarded voters whose total weight is higher than a certain threshold, which is the same as the bi-level knapsack problem. ∎

3.2 The Weighted-Protection Problem

This is a special case of the weighted-$-protection problem when pja=pjb=1p_{j}^{a}=p_{j}^{b}=1.

The following theorem used by Faliszewski et al. [8] was originally proved for another problem. In our context, F=0F=0 and thus 𝒱F={\mathcal{V}}_{F}=\emptyset, it is NP-hard to decide if the constructive attacker can succeed or, equivalently, if the defender cannot succeed. Hence, it is coNP-hard to decide if the defender can succeed and Theorem 3.2 follows.

Theorem 3.2

(By Faliszewski et al. [8]) If mm is a constant, the constructive weighted-protection problem is coNP-hard for any scoring rule that α2,α3,,αm\alpha_{2},\alpha_{3},\ldots,\alpha_{m} are not all equal (i.e., it does not hold that α2=α3==αm\alpha_{2}=\alpha_{3}=\ldots=\alpha_{m}).

In contrast, the destructive version is easy. Using the fact that mm, the number of candidates, is a constant, we can prove the following Theorem 3.3 through suitable enumerations.

Theorem 3.3

If mm is a constant, then the destructive weighted-protection problem is in P  for any scoring rule.

3.3 The $-Protection Problem

This is the special case of the protection problem with wj=1w_{j}=1 for every jj. The following two theorems illustrate the significant difference (in terms of complexity) between the general problem and its special case with symmetricity (i.e., pja=pjbp_{j}^{a}=p_{j}^{b}).

Theorem 3.4

For constant mm and any non-trivial scoring rule, both the constructive and destructive $-protection problems are NP-complete.

Theorem 3.5

For constant mm, both destructive and constructive symmetric $-protection problems are in PP for any scoring rule.

4 The Case of Arbitrarily Many Candidates

4.1 The Case of Constructive Attacker

The following Theorem 4.1 shows Σ2p\Sigma_{2}^{p}-hardness for the most special cases of the constructive weighted-$-protection problem, namely wj=pja=pjb=1w_{j}=p_{j}^{a}=p_{j}^{b}=1 (unit-protection). It thus implies readily the Σ2p\Sigma_{2}^{p}-hardness for the more general constructive $-protection and constructive weighted-protection.

Theorem 4.1

For arbitrary mm, the rr-approval constructive unit-protection problem is Σ2p\Sigma_{2}^{p}-complete.

Membership in Σ2p\Sigma_{2}^{p} follows directly from Lemma 1. To prove Theorem 4.1, it suffices to show the following.

Lemma 3

For arbitrary mm, the rr-approval constructive unit-protection problem is Σ2p\Sigma_{2}^{p}-hard even if r=4r=4.

To prove Lemma 3, we reduce from a variant of the \exists\forall 3 dimensional matching problem (or \exists\forall3DM), which is called \exists\forall3DM and defined below. The classical \exists\forall 3DM is Σ2p\Sigma_{2}^{p}-hard  proved by Mcloughlin [16]. By leveraging the proof by Mcloughlin  [16], we can show the Σ2p\Sigma_{2}^{p}-hardness of the \exists\forall3DM problem.

\exists\forall3DM: Given a parameter tt, three disjoint sets of elements WW, XX, YY of the same cardinality, and two disjoint subsets M1M_{1} and M2M_{2} of W×X×YW\times X\times Y such that M1M_{1} contains each element of WXYW\cup X\cup Y at most once. Does there exist a subset U1M1U_{1}\subseteq M_{1} such that |U1|=t|U_{1}|=t and for any U2M2U_{2}\subseteq M_{2}, U1U2U_{1}\cup U_{2} is not a perfect matching (where a perfect matching is a subset of triples in which every element of WXYW\cup X\cup Y appears exactly once)?

Proof (Proof of Lemma 3)

Given an arbitrary instance of \exists\forall 3DM, we construct an instance of the constructive unit-protection problem in rr-approval election as follows. Recall that r=4r=4 and thus every voter votes for 4 candidates.

Suppose |W|=|X|=|Y|=n|W|=|X|=|Y|=n, |M1|=m1|M_{1}|=m_{1}, |M2|=m2|M_{2}|=m_{2}.

There are 3n+23n+2 key candidates, including:

  • 3n3n key candidates, each corresponding to one distinct element of WXYW\cup X\cup Y and we call them element candidates. The score of every element candidate is n+ξn+\xi;

  • one key candidate called leading candidate, whose total score is n+t+ξ1n+t+\xi-1;

  • one key candidate called designated candidate, whose total score is ξ\xi.

Here ξ\xi is some sufficiently large integer, e.g., we can choose ξ=(m1+m2)n\xi=(m_{1}+m_{2})n. Besides key candidates, there are also many dummy candidates, each of score either 11 or m1t+1m_{1}-t+1. The number of dummy candidates will be determined later.

There are m1+m2(m1t+1)m_{1}+m_{2}(m_{1}-t+1) key voters, including:

  • m1m_{1} key voters, each corresponding to a distinct triple in M1M_{1} and we call them M1M_{1}-voters. For each (wi,xj,yk)M1(w_{i},x_{j},y_{k})\in M_{1}, the corresponding voter votes for the 33 candidates corresponding to elements wiw_{i}, xjx_{j}, yky_{k} together with the leading candidate;

  • m2(m1t+1)m_{2}\cdot(m_{1}-t+1) key voters, each distinct triple in M2M_{2} corresponds to exactly m1t+1m_{1}-t+1 voters and we call them M2M_{2}-voters. For every (wi,xj,yk)M2(w_{i},x_{j},y_{k})\in M_{2}, each of its m1t+1m_{1}-t+1 corresponding voters vote for the 33 candidates corresponding to elements wiw_{i}, xjx_{j}, yky_{k} together with one distinct dummy candidate. Since the m1t+1m_{1}-t+1 voters are identical, we can view them as m1t+1m_{1}-t+1 copies, i.e., every M2M_{2}-voter has m1t+1m_{1}-t+1 copies.

Besides key voters, there are also sufficiently many dummy voters. Each dummy voter votes for exactly one key candidate and 3 distinct dummy candidates. Dummy voters and dummy candidates are used to make sure that the score of key candidates are exactly as we have described. More precisely, if we only count the scores of key candidates contributed by key voters, then the element candidate corresponding to zWXYz\in W\cup X\cup Y has a score of d(z)=d1(z)+(m1t+1)d2(z)d(z)=d_{1}(z)+(m_{1}-t+1)d_{2}(z) where di(z)d_{i}(z) is the number of occurrences of zz in the triple set MiM_{i} for i=1,2i=1,2, and the leading candidate has a score of m1m_{1}. Hence, there are exactly n+ξd(z)n+\xi-d(z) dummy voters who vote for the element candidate corresponding to zz, and n+t+ξ1m1n+t+\xi-1-m_{1} dummy voters who vote for the leading candidate.

Overall, we create zWXY(n+ξd(z))+n+t+ξm11\sum_{z\in W\cup X\cup Y}(n+\xi-d(z))+n+t+\xi-m_{1}-1 dummy voters, and 3zWXY(n+ξd(z))+3(n+t+ξm11)+m23\sum_{z\in W\cup X\cup Y}(n+\xi-d(z))+3(n+t+\xi-m_{1}-1)+m_{2} dummy candidates.

As the leading candidate is the current winner, the constructive unit-protection problem asks whether the election can be protected against an attacker attempting to make the designated candidate win. The defense budget is F=m1tF=m_{1}-t and the attack budget is B=nB=n. In the following we show that the defender succeeds if and only if the given \exists\forall 3DM instance admits a feasible solution U1U_{1}.

“Yes” Instance of \exists\forall 3DM \to “Yes” Instance of Constructive Unit-Protection. Suppose the instance of \exists\forall 3DM admits a feasible solution U1U_{1}, we show that the answer for constructive unit-protection problem is “Yes”.

Recall that each M1M_{1}-voter corresponds to a distinct triple (wi,xj,yk)(w_{i},x_{j},y_{k}) in M1M_{1} and votes for 4 candidates – the leading candidate and the three candidates corresponding to wi,xj,ykw_{i},x_{j},y_{k}. We do not award M1M_{1}-voters corresponding to the triples in U1U_{1}, but award all of the remaining M1M_{1}-voters. The resulting cost is exactly F=m1tF=m_{1}-t. In what follows we show that after awarding voters this way, the attacker cannot make the designated candidate win.

Suppose on the contrary, the attacker can make the designated candidate win by bribing αt\alpha\leq t voters among the M1M_{1}-voters, βm2\beta\leq m_{2} voters among the M2M_{2}-voters, and γ\gamma dummy voters. We claim that the following inequalities hold:

α+β+γn\displaystyle\alpha+\beta+\gamma\leq n~{} (1a)
4α+3β+γ3n+t\displaystyle 4\alpha+3\beta+\gamma\geq 3n+t~{} (1b)

Inequality (1a) follows from the fact that the attack budget is nn and the attacker can bribe at most nn voters. Inequality (1b) holds because of the following. Given that a candidate can get at most one score from each voter and that the attacker can bribe at most nn voters, bribing voters can make the designated candidate obtain a score at most n+ξn+\xi. Hence, the score of each key candidate other than the designated one should be at most n+ξ1n+\xi-1. Recall that without bribery, each of the 3n3n element candidate has a score of n+ξn+\xi and the leading candidate has a score of n+t+ξ1n+t+\xi-1. Hence, the attacker should decrease at least 1 score from each element candidate and tt scores from the leading candidate, leading to a total score of 3n+t3n+t. Note that an M1M_{1}-voter contributes 1 score to 4 key candidates, therefore it contributes in total a score of 44 to the key candidates. Similarly an M2M_{2}-voter contributes a score of 33, and a dummy voter contributes a score of 11 to the key candidates. Therefore, by bribing (for example) an M1M_{1}-voter, the total score of all the element candidates and the leading candidate can decrease by at most 44. Thus, inequality (1b) holds.

In the following we derive a contradiction based on Inequalities (1a) and (1b). By plugging γnαβ\gamma\leq n-\alpha-\beta into Inequality (1b), we have 3α+2β2n+t.3\alpha+2\beta\geq 2n+t. Since βnα\beta\leq n-\alpha, we have 3α+2βα+2n2n+t3\alpha+2\beta\leq\alpha+2n\leq 2n+t. Hence, 3α+2β=α+2n=2n+t3\alpha+2\beta=\alpha+2n=2n+t, and we have α=t\alpha=t and β=nt\beta=n-t. Note that the defender has awarded every M1M_{1}-voter except the ones corresponding to U1U_{1}, where |U1|=t|U_{1}|=t. Hence, every voter corresponding to the triples in U1U_{1} is bribed. Furthermore, as Inequality (1b) is tight, bribing voters makes the designated candidate have a score of n+ξn+\xi, while making each of the other key candidates have a score of n+ξ1n+\xi-1. This means that the score of each element candidate decreases exactly by 11. Hence, the attacker has selected a subset of M2M_{2}-voters such that together with the M1M_{1}-voters corresponding to triples in U1U_{1}, these voters contribute exactly a score of 1 to every element candidate. Let U2U_{2} be the set of triples to which the bribed M2M_{2}-voters correspond, then U1U2U_{1}\cup U_{2} forms a 3-dimensional matching, which is a contradiction to the fact that U1U_{1} is a feasible solution to the \exists\forall 3DM instance. Thus, the attacker cannot make the designated candidate win and the answer for the constructive unit-protection problem is “Yes”.

\say

No Instance of \exists\forall 3DM \to \sayNo Instance of Constructive Unit-Protection. Suppose for any U1M1U_{1}\subseteq M_{1}, |U1|=t|U_{1}|=t there exists U2M2U_{2}\in M_{2} such that U1U2U_{1}\cup U_{2} is a perfect matching, we show that the answer to the constructive unit-protection problem is “No”. Consider an arbitrary set of voters awarded by the defender. Among the awarded voters, let HH be the set of triples that corresponds to the awarded M1M_{1}-voters. As |H|m1t|H|\leq m_{1}-t, |M1H|t|M_{1}\setminus H|\geq t. We select an arbitrary subset H1M1HH_{1}\subseteq M_{1}\setminus H such that |H1|=t|H_{1}|=t. There exists some H2M2H_{2}\subseteq M_{2} such that H1H2H_{1}\cup H_{2} is a perfect matching, and we let the attacker bribe the set of voters corresponding to triples in H1H2H_{1}\cup H_{2}. Note that this is always possible as every M2M_{2}-voter has m1t+1m_{1}-t+1 copies, so no matter which M2M_{2}-voters are awarded the briber can always select one M2M_{2}-voter corresponding to each triple in H2H_{2}. It is easy to see that by bribing these voters, the score of every element candidate decreases by 11, and the score of the leading voter decreases by tt. Meanwhile, let each bribed voter vote for the designated candidate and three distinct dummy candidates, then the designated candidate has a score of n+ξn+\xi and becomes a winner, i.e., the answer to the constructive unit-protection problem is “No”. ∎

Remark. The proof of Lemma 3 can be easily modified to prove the Σ2p\Sigma_{2}^{p}-hardness of rr-approval constructive unit-protection problem for any fixed r4r\geq 4. Specifically, we can make the same reduction, and add dummy candidates such that every voter additionally votes for exactly r4r-4 distinct dummy candidates.

4.2 The Case of Destructive Attacker

Theorem 4.2

Both rr-approval destructive weighted-protection and rr-approval (symmetric) $-protection problems are NP-complete.

The proof of Theorem 4.2 is based on a crucial observation of the equivalence between the destructive weighted-$-protection problem (under an arbitrary scoring rule) and the minmax vector addition problem we introduce (see Appendix 7.1). The full proof of Theorem 4.2 can be found in Appendix 7.6.

5 Summary of Results

The preceding characterization of the computational complexity of the protection problem in various settings is summarized in Table 1.

Table 1: Summary of results for single-winner election under the rr-approval scoring rule: “Symmetric” means pja=pjbp_{j}^{a}=p_{j}^{b} for every jj and “asymmetric” means otherwise; hardness results that are proved for the case with only two candidates (i.e., m=2m=2) are marked with a “\diamond” (Note that when m=2m=2, the 11-approval rule is the same as the plurality, veto or Borda scoring rule. It can be shown that with a slight modification, the hardness results hold for any non-trivial scoring rule); algorithmic results (marked with a “P”) hold for arbitrary scoring rules; the complexity of the protection problem against a destructive attacker with wj=pja=pjb=1w_{j}=p_{j}^{a}=p_{j}^{b}=1 remains open; for most variants of the protection problem against a constructive attacker, we only provide hardness results and we do not know yet whether or not they belong to the class of coNP-complete or Σ2p\Sigma_{2}^{p}-complete proble.
# of candidates Model parameters Destructive attacker Constructive attacker
constant Weighted, Priced, Asymmetric Σ2p\Sigma_{2}^{p}-complete \hskip 2.84526pt\diamond (Thm 3.1) Σ2p\Sigma_{2}^{p}-complete \hskip 2.84526pt\diamond (Thm 3.1)
Weighted, pja=pjb=1p_{j}^{a}=p_{j}^{b}=1 P  (Thm 3.3) coNP-hard (Thm 3.2)
wj=1w_{j}=1, Priced, Asymmetric NP-complete \hskip 2.84526pt\diamond (Thm 3.4) NP-complete \hskip 2.84526pt\diamond (Thm 3.4)
wj=1w_{j}=1, Priced, Symmetric P  (Thm 3.5) P  (Thm 3.5)
wj=1w_{j}=1, pja=pjb=1p_{j}^{a}=p_{j}^{b}=1 P (Thm 3.5) P (Thm 3.5)
arbitrary Weighted, Priced, Asymmetric Σ2p\Sigma_{2}^{p}-complete \hskip 2.84526pt\diamond (Thm 3.1) Σ2p\Sigma_{2}^{p}-complete \hskip 2.84526pt\diamond (Thm 3.1)
Weighted, pja=pjb=1p_{j}^{a}=p_{j}^{b}=1 NP-complete (Thm 4.2) Σ2p\Sigma_{2}^{p}-hard (Thm 4.1)
wj=1w_{j}=1, Priced, Asymmetric NP-complete (Thm 4.2) Σ2p\Sigma_{2}^{p}-hard (Thm 4.1)
wj=1w_{j}=1, Priced, Symmetric NP-complete (Thm 4.2) Σ2p\Sigma_{2}^{p}-hard (Thm 4.1)
wj=1w_{j}=1, pja=pjb=1p_{j}^{a}=p_{j}^{b}=1 ? Σ2p\Sigma_{2}^{p}-hard (Thm 4.1)

We remark three natural open problems for future research. One is the complexity of the destructive protection problem with wj=pja=pjb=1w_{j}=p_{j}^{a}=p_{j}^{b}=1. It is not clear whether the problem is in P  or is NP-complete. Another is the constructive protection problem with pja=pjb=1p_{j}^{a}=p_{j}^{b}=1 and arbitrary voter weights. We only show its coNP-hardness, it is not clear whether or not this problem is coNP-complete. The third problem is the complexity of rr-approval constructive unit-protection problem when r={1,2,3}r=\{1,2,3\} as our hardness proof only holds when r4r\geq 4.

6 Conclusion

We introduced the protection problem and characterized its computational complexity. We showed that the problem, in general, is Σ2p\Sigma_{2}^{p}-complete, and identified settings in which the problem becomes easier. Moreover, we showed the protection problem in some parameter settings is polynomial-time solvable, suggesting that these parameter settings can be used for real-work election applications.

In addition to the open problems mentioned in Section 5, the following are also worth investigating. First, our hardness results would motivate the study of approximation or FPT (fixed parameter tractable) algorithms for the protection problem. Note that even polynomial time approximation schemes can exist for Σ2p\Sigma_{2}^{p}-hard problems (see, e.g., By Caparara et al. [3]). It is thus desirable that a similar result can be obtained for some variants of the protection problem. Second, how effective is this approach when applied towards the problem of defending against other types of attackers that can, e.g., add or delete votes? Third, much research remains to be done in extending the protection problem to accommodate other scoring rules such as Borda and Copeland.

7 Appendix

7.1 Destructive Weighted-Protection – an Equivalent Formulation

We provide an equivalent formulation of the destructive weighted-protection problem under any scoring rule α=(α1,,αm)\alpha=(\alpha_{1},\cdots,\alpha_{m}), which will be very useful for several proofs throughout this paper.

The minmax vector addition problem: Input: A vector Λ=(Λ(c1),Λ(c2),,Λ(cm1))\vec{\Lambda}=(\Lambda(c_{1}),\Lambda(c_{2}),\ldots,\Lambda(c_{m-1})) where Λ(ci)\Lambda(c_{i}) is the score of cic_{i} in the absence of bribery. An (m1)(m-1)-vector Δj=(Δ1j,Δ2j,,Δ(m1),j)\vec{\Delta}_{j}=(\Delta_{1j},\Delta_{2j},\ldots,\Delta_{(m-1),j}) for each voter vjv_{j} where Δij=α1ατj1(i)+ατj1(m)αm\Delta_{ij}=\alpha_{1}-\alpha_{\tau_{j}^{-1}(i)}+\alpha_{\tau_{j}^{-1}(m)}-\alpha_{m}. Awarding price pjap_{j}^{a} and bribing price pjbp_{j}^{b} for voter vjv_{j}, j=1,2,,nj=1,2,\ldots,n. Defense budget FF and attack budget BB. Output: Decide if there exists a subset 𝒱F𝒱{\mathcal{V}}_{F}\subseteq{\mathcal{V}} such that j:vj𝒱FpjaF\sum_{j:v_{j}\in\in{\mathcal{V}}_{F}}p_{j}^{a}\leq F; and For any subset 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F} with j:vj𝒱BpjbB\sum_{j:v_{j}\in{\mathcal{V}}_{B}}p_{j}^{b}\leq B, it holds that Λ+j:vj𝒱BwjΔjΛ(cm),\left\|\vec{\Lambda}+\sum_{j:v_{j}\in{\mathcal{V}}_{B}}w_{j}\vec{\Delta}_{j}\right\|_{\infty}\leq\Lambda(c_{m}), where \left\|\cdot\right\|_{\infty} is the infinity norm (i.e., the maximal absolute value among the m1m-1 coordinates).

Lemma 4

The answer to the destructive weighted-$-protection problem is “Yes” if and only if the answer to the corresponding minmax vector addition problem is “Yes”.

Proof

A “Yes” Instance of Minmax Vector Addition \rightarrow A “Yes” Instance of Destructive Weighted-$-Protection. Suppose the answer to the minmax vector addition problem is “Yes.” Then, there exists some 𝒱F𝒱{\mathcal{V}}_{F}^{*}\subseteq{\mathcal{V}} such that for any 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F}^{*} with j:vj𝒱BpjbB\sum_{j:v_{j}\in{\mathcal{V}}_{B}}p_{j}^{b}\leq B, it holds that

Λ+j:vj𝒱BwjΔjΛ(cm).\displaystyle\left\|\vec{\Lambda}+\sum_{j:v_{j}\in{\mathcal{V}}_{B}}w_{j}\vec{\Delta}_{j}\right\|_{\infty}\leq\Lambda(c_{m}). (2)

For showing a contradiction, suppose the answer for the destructive weighted-$-protection problem is “No”. In this case, even if the defender awards the voters in 𝒱F{\mathcal{V}}_{F}^{*}, the attacker can still make cmc_{m} lose by bribing some subset 𝒱B{\mathcal{V}}_{B}^{*} of voters. Note that if cmc_{m} does not win, there must exist some other candidate, say, cic_{i}, who gets a strictly higher score than cmc_{m} after the attacker bribes some voters. Let us compare their scores before and after bribing voters. Before bribing voters, the scores of cic_{i} and cmc_{m} are Λ(ci)\Lambda(c_{i}) and Λ(cm)\Lambda(c_{m}), respectively. Recall that a candidate ckc_{k} is at the position of τj1(k)\tau_{j}^{-1}(k) on the preference list of vjv_{j}, therefore any vj𝒱Bv_{j}\in{\mathcal{V}}_{B}^{*} contributes a score of ατj1(i)\alpha_{\tau_{j}^{-1}(i)} to Λ(ci)\Lambda(c_{i}), and contributes a score of ατj1(m)\alpha_{\tau_{j}^{-1}(m)} to Λ(cm)\Lambda(c_{m}). After bribing voters, the preference list of vjv_{j} is changed, but regardless of the change, vjv_{j} contributes at least αm\alpha_{m} to cmc_{m} and at most α1\alpha_{1} to cic_{i}. Let the scores of cic_{i} and cmc_{m} after bribing voters be Λ(ci)\Lambda^{\prime}(c_{i}) and Λ(cm)\Lambda^{\prime}(c_{m}), respectively. Then, it follows that

Λ(ci)Λ(ci)+j:vj𝒱Bwj(α1ατj1(i))\displaystyle\Lambda^{\prime}(c_{i})\leq\Lambda(c_{i})+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}w_{j}(\alpha_{1}-\alpha_{\tau_{j}^{-1}(i)})
Λ(cm)Λ(cm)+j:vj𝒱Bwj(αmατj1(m)).\displaystyle\Lambda^{\prime}(c_{m})\geq\Lambda(c_{m})+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}w_{j}(\alpha_{m}-\alpha_{\tau_{j}^{-1}(m))}.

Since Λ(ci)>Λ(cm)\Lambda^{\prime}(c_{i})>\Lambda^{\prime}(c_{m}), we have

Λ(ci)+j:vj𝒱Bwj(α1ατj1(i))>Λ(cm)+j:vj𝒱Bwj(αmατj1(m)),\Lambda(c_{i})+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}w_{j}(\alpha_{1}-\alpha_{\tau_{j}^{-1}(i)})>\Lambda(c_{m})+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}w_{j}(\alpha_{m}-\alpha_{\tau_{j}^{-1}(m)}),

that is,

Λ(ci)+j:vj𝒱BwjΔij>Λ(cm),\Lambda(c_{i})+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}w_{j}\Delta_{ij}>\Lambda(c_{m}),

which contradicts Eq. (2). Thus, the answer to the destructive weighted-$-protection problem is “Yes”.

A “Yes” Instance of Destructive Weighted-$-Protection \rightarrow A “Yes” Instance of Minmax Vector Addition. Suppose the answer to the destructive weighted-$-protection problem is “Yes” by awarding the voters in 𝒱F{\mathcal{V}}_{F}^{*}. We show that the answer to the corresponding instance of minmax vector addition problem is “Yes”. Suppose on the contrary the answer is “No.” Then, for 𝒱F{\mathcal{V}}_{F}^{*} there exists some 𝒱B𝒱𝒱F{\mathcal{V}}_{B}^{*}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F}^{*} such that

Λ+j:vj𝒱BwjΔj>Λ(cm).\displaystyle\left\|\vec{\Lambda}+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}w_{j}\vec{\Delta}_{j}\right\|_{\infty}>\Lambda(c_{m}).

Consequently, there must exist some 1im11\leq i\leq m-1 such that Λ(ci)+j:vj𝒱BΔij>Λ(cm)\Lambda(c_{i})+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}\Delta_{ij}>\Lambda(c_{m}). By plugging in Δij\Delta_{ij}, we have

Λ(ci)+j:vj𝒱Bwj(α1ατj1(i))>Λ(cm)+j:vj𝒱Bwj(αmατj1(m)).\Lambda(c_{i})+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}w_{j}(\alpha_{1}-\alpha_{\tau_{j}^{-1}(i)})>\Lambda(c_{m})+\sum_{j:v_{j}\in{\mathcal{V}}_{B}^{*}}w_{j}(\alpha_{m}-\alpha_{\tau_{j}^{-1}(m)}).

This means that if the defender awards the voters in 𝒱F{\mathcal{V}}_{F}^{*}, then the attacker can bribe the voters in 𝒱B{\mathcal{V}}_{B}^{*} to change their preference lists such that for any vj𝒱Bv_{j}\in{\mathcal{V}}_{B}^{*}, candidate cic_{i} is on top of the list and cmc_{m} is at bottom of the list. By doing this, cic_{i} gets a strictly higher score than cmc_{m}. This contradicts the fact that the answer to the destructive weighted-$-protection problem is “Yes”. Hence, the answer to the minmax vector addition problem is “Yes”. ∎

7.2 Voter Dominance and Preliminary Observations

Let SmS_{m} be the set of permutations over {c1,c2,,cm}\{c_{1},c_{2},\ldots,c_{m}\}. Each element of SmS_{m} can be a preference list. Let 𝒱h𝒱{\mathcal{V}}^{h}\subseteq{\mathcal{V}} be the set of voters whose preference list is the hh-th element of SmS_{m}.

For two voters vjv_{j} and vjv_{j^{\prime}} , we say vjv_{j} dominates vjv_{j^{\prime}} (or vjv_{j^{\prime}} is dominated by vjv_{j}), denoted by vjvjv_{j^{\prime}}\prec v_{j}, if any of the following two conditions hold: (i) The following holds and at least one of the inequalities is strict:

(τj=τj)(wjwj)(pjapja)(pjbpjb).(\tau_{j}=\tau_{j^{\prime}})~{}\wedge~{}(w_{j}\geq w_{j^{\prime}})~{}\wedge~{}(p_{j}^{a}\leq p_{j^{\prime}}^{a})~{}\wedge~{}(p_{j}^{b}\leq p_{j^{\prime}}^{b}).

(ii) The following holds:

(τj=τj)(wj=wj)(pja=pja)(pjb=pjb)(j<j).\displaystyle(\tau_{j}=\tau_{j^{\prime}})\wedge(w_{j}=w_{j^{\prime}})\wedge(p_{j}^{a}=p_{j^{\prime}}^{a})\wedge(p_{j}^{b}=p_{j^{\prime}}^{b})\wedge(j^{\prime}<j).

Note that the domination relation is only defined between the voters who have the same preference. Intuitively, if vjvjv_{j^{\prime}}\prec v_{j}, then vjv_{j} is more “important” than vjv_{j^{\prime}} because vjv_{j} has a greater weight but is “cheaper” to bribe or award (i.e., more valuable to both the attacker and the defender).

We have the following lemmas.

Lemma 5

Consider the destructive weighted-$-protection problem with 𝒱F𝒱{\mathcal{V}}_{F}\subseteq{\mathcal{V}} being the set of awarded voters. Suppose the attacker can succeed by bribing a subset 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F} of voters. If vjvjv_{j^{\prime}}\prec v_{j}, vj𝒱Bv_{j^{\prime}}\in{\mathcal{V}}_{B} and vj(𝒱F𝒱B)v_{j}\not\in({\mathcal{V}}_{F}\cup{\mathcal{V}}_{B}), then the attacker can succeed by bribing (𝒱B{vj}){vj}({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}.

Towards the proof, we need Lemma 4, which states that the destructive weighted-$-protection problem is equivalent to another problem called minmax vector addition. The reader may refer to Section 4.2 for the definition of this problem. The following observation follows directly from the definition of Δij\Delta_{ij} which is included in the definition of minmax vector addition.

Observation 1

If vjvjv_{j^{\prime}}\prec v_{j}, then ΔijΔij\Delta_{ij^{\prime}}\leq\Delta_{ij} for 1im11\leq i\leq m-1.

Assuming Lemma 4, we can prove Lemma 5 as follows.

Proof (Proof of Lemma 5)

We prove the lemma by applying an exchange argument to the minmax vector addition problem, which is equivalent to the destructive weighted-$-protection by Lemma 4. Suppose by bribing voters in 𝒱B{\mathcal{V}}_{B} the destructive attacker can make cmc_{m} lose. Then, it follows that j:vj𝒱BpjbB\sum_{j:v_{j}\in{\mathcal{V}}_{B}}p_{j}^{b}\leq B and

Λ+j:j𝒱BwjΔj>Λ(cm).||\vec{\Lambda}+\sum_{j:j\in{\mathcal{V}}_{B}}w_{j}\vec{\Delta}_{j}||_{\infty}>\Lambda(c_{m}).

As vjv_{j} dominates vjv_{j^{\prime}}, ΔijΔij\Delta_{ij}\geq\Delta_{ij^{\prime}} and wjwjw_{j}\leq w_{j^{\prime}}. Hence,

j:j(𝒱B{vj}){vj}pjbB\sum_{j:j\in({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}}p_{j}^{b}\leq B

and

Λ+j:j(𝒱B{vj}){vj}wjΔj>Λ(cm).||\vec{\Lambda}+\sum_{j:j\in({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}}w_{j}\vec{\Delta}_{j}||_{\infty}>\Lambda(c_{m}).

That is, the briber can also win by bribing voters in (𝒱B{vj}){vj}({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}. ∎

Lemma 6

Consider the destructive weighted-$-protection problem. Suppose the defender succeeds by awarding a subset 𝒱F𝒱{\mathcal{V}}_{F}\subseteq{\mathcal{V}} of voters. If vjvjv_{j^{\prime}}\prec v_{j}, vj𝒱Fv_{j^{\prime}}\in{\mathcal{V}}_{F} and vj𝒱Fv_{j}\not\in{\mathcal{V}}_{F}, then the defender can succeed by awarding (𝒱F{vj}){vj}({\mathcal{V}}_{F}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}.

Proof

We again use an exchange argument to the minmax vector addition problem. Let 𝒱A=𝒱F{vj}{\mathcal{V}}_{A}={\mathcal{V}}_{F}\setminus\{v_{j^{\prime}}\}. Suppose on the contrary that the defender cannot win by fixing voters in 𝒱A{vj}{\mathcal{V}}_{A}\cup\{v_{j}\}, then there exists some 𝒱B𝒱(𝒱A{vj}){\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus({\mathcal{V}}_{A}\cup\{v_{j}\}) such that j:vj𝒱BpjbB\sum_{j:v_{j}\in{\mathcal{V}}_{B}}p_{j}^{b}\leq B and

Λ+j:j𝒱BwjΔj>Λ(cm).||\vec{\Lambda}+\sum_{j:j\in{\mathcal{V}}_{B}}w_{j}\vec{\Delta}_{j}||_{\infty}>\Lambda(c_{m}).

We argue that the defender cannot win either by fixing voters in 𝒱A{vj}{\mathcal{V}}_{A}\cup\{v_{j^{\prime}}\}, which is a contradiction. Suppose the defender fixes voters in 𝒱A{vj}{\mathcal{V}}_{A}\cup\{v_{j^{\prime}}\}. There are two possibilities. If vj𝒱Bv_{j^{\prime}}\not\in{\mathcal{V}}_{B}, then we let the briber bribe voters in 𝒱B{\mathcal{V}}_{B}. It is obvious that the briber can win. Otherwise, vj𝒱Bv_{j^{\prime}}\in{\mathcal{V}}_{B}, then we let the briber bribe voters in (𝒱B{vj}){vj}({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}. Since vjv_{j} dominates vjv_{j^{\prime}}, we have j:vj(𝒱B{vj}){vj}pjbB\sum_{j:v_{j}\in({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}}p_{j}^{b}\leq B and

Λ+j:j(𝒱B{vj}){vj}wjΔj>Λ(cm).||\vec{\Lambda}+\sum_{j:j\in({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}}w_{j}\vec{\Delta}_{j}||_{\infty}>\Lambda(c_{m}).

Hence, the lemma is true. ∎

We say 𝒱¯𝒱\bar{{\mathcal{V}}}\subseteq{\mathcal{V}} is maximal (with respect to 𝒱{\mathcal{V}}) if for any v¯𝒱¯\bar{v}\in\bar{{\mathcal{V}}}, there is no v𝒱𝒱¯v\in{\mathcal{V}}\setminus\bar{{\mathcal{V}}} that can dominate v¯\bar{v}. That is, 𝒱¯\bar{{\mathcal{V}}} contains the most important voters. The following corollary follows directly from the preceding two lemmas.

Corollary 1

Consider the destructive weighted-$-protection problem. Without loss of generality, we can assume that 𝒱F{\mathcal{V}}_{F} is maximal with respect to 𝒱{\mathcal{V}} and 𝒱B{\mathcal{V}}_{B} is maximal with respect to 𝒱𝒱F{\mathcal{V}}\setminus{\mathcal{V}}_{F}.

Unfortunately, Corollary 1 does not hold for the constructive weighted-$-protection problem, which is significantly different from the destructive version of the protection problem in terms of computational complexity. Nevertheless, similar results hold for the unweighted constructive problem.

Lemma 7

Given 𝒱F𝒱{\mathcal{V}}_{F}\subseteq{\mathcal{V}} as the set of fixed voters in the constructive $-bribery-protection problem, suppose a briber can make cic_{i} win by bribing a subset 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F} of voters. If vjvjv_{j^{\prime}}\prec v_{j}, vj𝒱Bv_{j^{\prime}}\in{\mathcal{V}}_{B} and vj(𝒱F𝒱B)v_{j}\not\in({\mathcal{V}}_{F}\cup{\mathcal{V}}_{B}), then the briber can also win by bribing voters in (𝒱B{vj}){vj}({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}.

Proof

Again, we prove by an exchange argument. Suppose by bribing voters in 𝒱B{\mathcal{V}}_{B} the constructive briber can make cic_{i} win. Now we consider the following procedure: we change the preference list of vjv_{j} into the same one as that of vjv_{j^{\prime}}, and meanwhile, restore the preference list of vjv_{j^{\prime}} to the original one. As voters have the same weight, this procedure does not change the total score of every candidate, and cic_{i} is thus still the winner. Furthermore, this procedure is equivalent as we bribe (𝒱B{vj}){vj}({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}. Since vjv_{j} dominates vjv_{j^{\prime}}, the total cost of bribing (𝒱B{vj}){vj}({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\} is no more than that of bribing 𝒱B{\mathcal{V}}_{B}. Hence, the lemma is true. ∎

Lemma 8

In the constructive $-bribery-protection problem, suppose the defender can win by fixing a subset 𝒱F𝒱{\mathcal{V}}_{F}\subseteq{\mathcal{V}} of voters. If vjvjv_{j^{\prime}}\prec v_{j}, vj𝒱Fv_{j^{\prime}}\in{\mathcal{V}}_{F} and vj𝒱Fv_{j}\not\in{\mathcal{V}}_{F}, then the defender can also win by fixing voters in (𝒱F{vj}){vj}({\mathcal{V}}_{F}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}.

Proof

Suppose on the contrary that the defender cannot win by fixing voters in 𝒱F=(𝒱F{vj}){vj}{\mathcal{V}}_{F}^{\prime}=({\mathcal{V}}_{F}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}. Then the constructive briber can win by bribing voters in some subset 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F}^{\prime}. There are two possibilities. If vj𝒱Bv_{j^{\prime}}\not\in{\mathcal{V}}_{B}, then even if the defender fixes 𝒱F{\mathcal{V}}_{F} the briber can still bribe 𝒱B{\mathcal{V}}_{B} and make cic_{i} win, which is a contradiction. Otherwise vj𝒱Bv_{j^{\prime}}\in{\mathcal{V}}_{B}. If the defender fixes 𝒱F{\mathcal{V}}_{F}, we let the briber bribe (𝒱B{vj}){vj}({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}. According to Lemma 7, if the briber can win by bribing 𝒱B{\mathcal{V}}_{B}, he/she can also win by bribing (𝒱B{vj}){vj}({\mathcal{V}}_{B}\setminus\{v_{j^{\prime}}\})\cup\{v_{j}\}, again contradicting the fact that the defender can succeed by awarding 𝒱F{\mathcal{V}}_{F}. ∎

The above Lemmas implies the following.

Corollary 2

Without loss of generality, we can assume that 𝒱F{\mathcal{V}}_{F} is maximal with respect to 𝒱{\mathcal{V}}, and 𝒱B{\mathcal{V}}_{B} is maximal with respect to 𝒱𝒱F{\mathcal{V}}\setminus{\mathcal{V}}_{F} in the constructive $-bribery-protection problem.

7.3 Proofs Omitted in Section 3.1

Recall that our goal is to prove Theorem 3.1.

Theorem 3.1

For any non-trivial scoring rule, both the constructive and destructive weighted-$-protection problem, is Σ2p\Sigma_{2}^{p}-complete.

We first show Σ2p\Sigma_{2}^{p}-membership.

Lemma 1

For any non-trivial scoring rule, both the constructive and destructive weighted-$-protection problems are in Σ2p\Sigma_{2}^{p}.

For ease of proof, we use the following definition of Σ2p\Sigma_{2}^{p} from [19] (see Theorem 3 therein).

Definition 1

(By Wrathall [19]) Let Γ\Gamma be a finite set of symbols (alphabet) and Γ+\Gamma^{+} be the set of strings of symbols in Γ\Gamma. Let LΓ+L\subseteq\Gamma^{+} be a language. LΣ2pL\in\Sigma_{2}^{p} if and only if there exists polynomials ϕ1\phi_{1}, ϕ2\phi_{2} and a language LP=Σ0pL^{\prime}\in P=\Sigma_{0}^{p} such that for all xΓ+x\in\Gamma^{+},

xL if and only if (y1)ϕ1(y2)ϕ2[(x,y1,y2)L],x\in L~{}~{}~{}~{}\text{ if and only if }~{}~{}~{}~{}(\exists y_{1})_{\phi_{1}}(\forall y_{2})_{\phi_{2}}[(x,y_{1},y_{2})\in L^{\prime}],

where (y1)ϕ1(y2)ϕ2[(x,y1,y2)L](\exists y_{1})_{\phi_{1}}(\forall y_{2})_{\phi_{2}}[(x,y_{1},y_{2})\in L^{\prime}] denotes

(y1)(y2)[|y1|ϕ1(|x|) and if |y2|ϕ2(|x|),(x,y1,y2)L].(\exists y_{1})(\forall y_{2})[|y_{1}|\leq\phi_{1}(|x|)\text{ and if }|y_{2}|\leq\phi_{2}(|x|),(x,y_{1},y_{2})\in L^{\prime}].
Proof (Proof of Lemma 1)

Given an instance II of the constructive or destructive weighted-$-protection problem, we want to know if there exists a subset 𝒱F{\mathcal{V}}_{F} such that j:vj𝒱FpjaF\sum_{j:v_{j}\in{\mathcal{V}}_{F}}p_{j}^{a}\leq F and for any subset 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F} with j:vj𝒱BpjbB\sum_{j:v_{j}\in{\mathcal{V}}_{B}}p_{j}^{b}\leq B and any preference list τ^j\hat{\tau}_{j} for vj𝒱Bv_{j}\in{\mathcal{V}}_{B}, the following property (I,𝒱F,𝒱B{τ^j|vj𝒱B})\mathcal{R}(I,{\mathcal{V}}_{F},{\mathcal{V}}_{B}\cup\{\hat{\tau}_{j}|v_{j}\in{\mathcal{V}}_{B}\}) is true: By bribing voter in 𝒱B{\mathcal{V}}_{B} and change the preference list of each vj𝒱Bv_{j}\in{\mathcal{V}}_{B} to τ^j\hat{\tau}_{j}, a constructive attacker cannot make candidate cic_{i} win, or a destructive attacker cannot make cmc_{m} lose. It is easy to see that the property (I,𝒱F,𝒱B{τ^j|vj𝒱B})\mathcal{R}(I,{\mathcal{V}}_{F},{\mathcal{V}}_{B}\cup\{\hat{\tau}_{j}|v_{j}\in{\mathcal{V}}_{B}\}) can be verified in polynomial time, therefore Lemma 1 is proved. ∎

Now we prove the Σ2p\Sigma_{2}^{p}-hardness.

Lemma 2

For any non-trivial scoring rule, both the constructive and destructive weighted-$-protection problems are both Σ2p\Sigma_{2}^{p}-hard even if there are only m=2m=2 candidates.

Note that in case of m=2m=2, destructive weighted-$-bribery-protection is equivalent to constructive weighted-$-bribery-protection. We prove the Lemma 2 for the protection problem under plurality. With slight modification the proof works for any non-trivial scoring protocol for two candidates.

We reduce from the De-Negre (DNeg) variant of bi-level knapsack problem, which is proved to be Σ2p\Sigma_{2}^{p}-hard by Caprara et al. [3]. Before we describe the bi-level knapsack problem, we first introduce the classical knapsack problem, which is closely related. In the knapsack problem, given is some fixed budget B¯\bar{B} together with a set SS of items, each having a price p¯ja\bar{p}_{j}^{a} and a weight w¯j\bar{w}_{j}. The goal is to select a subset of items whose total price is no more than the given budget and the total weight is maximized. We denote by KP(S,B¯)KP(S,\bar{B}) the optimal objective value of the knapsack problem.

In the De-Negre (DNeg) variant of bi-level knapsack problem, there is an adversary and a packer. The adversary has a reserving budget F¯\bar{F} and the packer has a packing budget B¯\bar{B}. There is a set of nn items, each having a price p¯ja\bar{p}_{j}^{a} to the adversary, p¯jb\bar{p}_{j}^{b} to the packer and a weight w¯j=p¯jb\bar{w}_{j}=\bar{p}_{j}^{b} (to both the adversary and the packer). The adversary first reserves a subset of items whose total prices is no more than F¯\bar{F}. Then the packer solves the knapsack problem with respect to the remaining items that are not reserved, i.e., the packer will select a subset of remaining items whose total price is no more than B¯\bar{B} such that their total weight is maximized. The DNeg variant of the bi-level knapsack problem asks for a proper subset of items reserved by the adversary such that the total weight of items selected by the packer is minimized. More precisely, the problem can be formulated as a bi-level integer programming as follows.

The DNeg variant of bi-level knapsack problem: Minimize j=1np¯jbyj\displaystyle\sum_{j=1}^{n}\bar{p}_{j}^{b}y_{j} s.t.\displaystyle s.t.\hskip 2.84526pt j=1np¯jaxjF¯\displaystyle\sum_{j=1}^{n}\bar{p}_{j}^{a}x_{j}\leq\bar{F} where y1,y2,,yn solves the following:\displaystyle\text{where }y_{1},y_{2},\cdots,y_{n}\text{ solves the following:} Maximizej=1np¯jbyj\displaystyle\text{Maximize}\quad\sum_{j=1}^{n}\bar{p}_{j}^{b}y_{j} s.t.j=1np¯jbyjB¯\displaystyle s.t.\quad\sum_{j=1}^{n}\bar{p}_{j}^{b}y_{j}\leq\bar{B} xj+yj11jn\displaystyle\hskip 28.45274ptx_{j}+y_{j}\leq 1\quad\quad 1\leq j\leq n xj,yj{0,1}1jn\displaystyle\hskip 28.45274ptx_{j},y_{j}\in\{0,1\}\quad 1\leq j\leq n

The decision version of the DNeg variant of bi-level knapsack problem asks whether there exists a feasible solution with the objective value at most WW. The following lemma is due to Caprara et al. [3].

Lemma 9 (By Caprara et al. [3])

The decision version of the DNeg variant of bi-level knapsack problem is Σ2p\Sigma_{2}^{p}-complete.

Based on the above lemma, we are able to prove Lemma 2.

Proof (Proof of Lemma 2)

Given an arbitrary instance of the (decision version of) DNeg variant of bi-level knapsack problem, we construct an election instance as follows. There are m=2m=2 candidates. The defense and attack budgets are F=F¯F=\bar{F} and B=B¯B=\bar{B}, respectively. There are n+2n+2 voters:

  • nn key voters v1,v2,,vnv_{1},v_{2},\cdots,v_{n} who vote for c2c_{2}, each having an awarding price pja=p¯jap_{j}^{a}=\bar{p}_{j}^{a}, a bribing price pjb=p¯jbp_{j}^{b}=\bar{p}_{j}^{b}, and a weight wj=p¯jbw_{j}=\bar{p}_{j}^{b}.

  • one dummy voter vn+1v_{n+1} who votes for c2c_{2} whose weight is 2W2W, awarding price is F+1F+1 and bribing price is B+1B+1.

  • one dummy voter vn+2v_{n+2} who votes for c1c_{1} whose weight is j=1np¯jb\sum_{j=1}^{n}\bar{p}_{j}^{b}, awarding price is F+1F+1 and bribing price is B+1B+1.

Obviously c2c_{2} is the original winner. We show in the following that the constructed election instance is secure if and only if the DNeg variant of bi-level knapsack problem admits a feasible solution with an objective value at most WW.

Suppose the DNeg variant of bi-level knapsack problem admits a feasible solution with an objective value at most WW, and let xix_{i}^{*} be such a solution. As j=1np¯jaxj=j=1npjaxjF¯=F\sum_{j=1}^{n}\bar{p}_{j}^{a}x_{j}^{*}=\sum_{j=1}^{n}{p}_{j}^{a}x_{j}^{*}\leq\bar{F}=F, we let the defender award all the voters such that xj=1x_{j}^{*}=1, i.e., let 𝒱F={vj|xj=1}{\mathcal{V}}_{F}=\{v_{j}|x_{j}^{*}=1\}. According to the fact that the objective value of the bi-level knapsack problem is at most WW, and the fact that the two dummy voters can never be bribed, it follows that the optimal objective value of the following knapsack problem is at most WW:

Maximize j:vj𝒱𝒱Fpjbyj\displaystyle\sum_{j:v_{j}\in{\mathcal{V}}\setminus{\mathcal{V}}_{F}}{p}_{j}^{b}y_{j}
s.t. j𝒱𝒱FpjbyjB\displaystyle\sum_{j\in{\mathcal{V}}\setminus{\mathcal{V}}_{F}}{p}_{j}^{b}y_{j}\leq{B}

Thus, with a budget of BB the the briber can never bribe key voters whose total weight is more than WW. Note that originally the total weight of voters voting for c2c_{2} is 2W+j=1npjb2W+\sum_{j=1}^{n}p_{j}^{b}, and the total weight of voters voting for c1c_{1} is j=1npjb\sum_{j=1}^{n}p_{j}^{b}, the briber cannot succeed and the election is thus secure.

Suppose the election is secure. Then there exists some 𝒱F{\mathcal{V}}_{F} such that we can say j:vj𝒱FpjaF\sum_{j:v_{j}\in{\mathcal{V}}_{F}}p_{j}^{a}\leq F and if voters in 𝒱F{\mathcal{V}}_{F} are fixed, no briber can succeed. Note that the two dummy voters can never be protected nor bribed, whereas 𝒱F{v1,v2,,vn}{\mathcal{V}}_{F}\subseteq\{v_{1},v_{2},\cdots,v_{n}\}. Thus, among voters in {v1,v2,,vn}𝒱F\{v_{1},v_{2},\cdots,v_{n}\}\setminus{\mathcal{V}}_{F}, within a budget of BB the briber cannot bribe voters whose total weight is more than WW. This is equivalent as saying that by setting xj=1x_{j}=1 for vj𝒱Fv_{j}\in{\mathcal{V}}_{F} and xj=0x_{j}=0 otherwise, the knapsack problem for yjy_{j} does not admit a feasible solution with an objective value more than WW. Hence, the objective value of the given DNeg variant of bi-level knapsack problem is at most WW. ∎

7.4 Proofs Omitted in Section 3.2

Theorem 3.3

If mm is a constant, then the destructive weighted-protection problem is in P  for any scoring rule.

Proof

The theorem is proved by trying all different possible 𝒱F{\mathcal{V}}_{F} and check whether the attacker can succeed for each of them. By Corollary 1, for voters having the same preference, 𝒱F{\mathcal{V}}_{F} contains voters of the largest weights. Hence to determine 𝒱F{\mathcal{V}}_{F}, it suffices to know the number of voters having each preference in 𝒱F{\mathcal{V}}_{F}. There are at most m!m! different preferences, and consequently at most nm!n^{m!} different kinds of 𝒱F{\mathcal{V}}_{F}, which is polynomial when mm is constant. For each possible choice of 𝒱F{\mathcal{V}}_{F}, we check whether the attacker can succeed by trying all possible 𝒱B{\mathcal{V}}_{B} and all possible ways of changing their preferences. Firstly, by Corollary 1, for voters in 𝒱𝒱F{\mathcal{V}}\setminus{\mathcal{V}}_{F} that have the same preference list, 𝒱B{\mathcal{V}}_{B} contains the ones of the largest weights, hence using a similar argument we know there are at most nm!n^{m!} different kinds of 𝒱B{\mathcal{V}}_{B}. Given 𝒱F{\mathcal{V}}_{F} and 𝒱B{\mathcal{V}}_{B}, it remains to determine how the preference lists of voters in 𝒱B{\mathcal{V}}_{B} should be changed. Note that we do not need to specify how the preference list is changed for each vj𝒱Bv_{j}\in{\mathcal{V}}_{B}. Instead, we only need to determine the number of voters in 𝒱B{\mathcal{V}}_{B} that are changed to each preference list, which gives rise to at most nm!n^{m!} possibilities. Therefore, overall there are at most n3m!n^{3m!} different possibilities regarding 𝒱F{\mathcal{V}}_{F}, 𝒱B{\mathcal{V}}_{B} and how to alter the preference lists of voters in 𝒱B{\mathcal{V}}_{B}, which can be enumerated efficiently when mm is a constant. ∎

We remark that an argument similar to the one we used to prove Theorem 3.3 was used by Faliszewsk et al. [8].

7.5 Proofs omitted in Section 3.3

Theorem 3.4

For any non-trivial scoring rule, both the constructive and destructive $-protection problems are NP-complete.

To prove Theorem 3.4, we first show the problem belongs to NP in Lemma 10 and then show its NP-hardness in Lemma 11.

Lemma 10

For any scoring rule and arbitrary constant mm, both the constructive and destructive $-protection problems are in NP.

Proof

Note that to show the membership in NP, it suffices to show that given 𝒱F{\mathcal{V}}_{F}, we can determine in polynomial time whether the constructive/destructive attacker can succeed. Note that among voters of the same preference list in 𝒱𝒱F{\mathcal{V}}\setminus{\mathcal{V}}_{F}, 𝒱B{\mathcal{V}}_{B} always contains the ones with the smallest bribing prices. Hence, similarly as the proof of Theorem 3.3, there are at most nm!n^{m!} different kinds of 𝒱B{\mathcal{V}}_{B}. Given 𝒱B{\mathcal{V}}_{B}, a similar argument as that of Theorem 3.3 shows that there are nm!n^{m!} different ways of altering the preference lists of voters in 𝒱B{\mathcal{V}}_{B}. Hence in n2m!n^{2m!} time we can determine the whether the constructive/destructive attacker can succeed, which is polynomial if mm is a constant. ∎

Lemma 11

For any non-trivial scoring rule, both the constructive and destructive $-protection problems are NP-hard even if there are only 2 candidates.

Again, in case of two candidates, the constructive and destructive variants are identical and it suffices to prove the theorem under the scoring rule of plurality.

Towards the proof, we need the following intermediate problems.

Balanced Partition: Given a set of positive integers {a1,a2,,a2n}\{a_{1},a_{2},\cdots,a_{2n}\} where a1a2a2na_{1}\leq a_{2}\leq\cdots\leq a_{2n} and an integer qq such that j=12naj=2q\sum_{j=1}^{2n}a_{j}=2q. Determine whether there exists a subset SS of nn integers such that i:aiSai=q\sum_{i:a_{i}\in S}a_{i}=q.

The balanced partition problem is a variant of the partition problem (in which SS is not required to contain exactly nn integers). The NP-completeness of the balanced partition problem is a folklore result, which follows from a slight modification on NP-completeness proof for the partition problem  given by Garey and Johnson[11].

Using the balanced partition problem, we are able to show the NP-hardness of the following problem in Lemma 12.

Balanced partition: Given a set of positive integers {a1,a2,,a2n}\{a_{1},a_{2},\cdots,a_{2n}\} where a1a2a2na_{1}\leq a_{2}\leq\cdots\leq a_{2n} and an integer qq such that j=12naj=2q\sum_{j=1}^{2n}a_{j}=2q, an+an+1++a2n1q+1a_{n}+a_{n+1}+\cdots+a_{2n-1}\geq q+1. Determine whether there exists a subset SS of nn integers such that i:aiSai=q\sum_{i:a_{i}\in S}a_{i}=q.

Lemma 12

Balanced partition is NP-complete.

Proof

Membership in NP  is straightforward. We show balanced partition is NP-hard in the following via reduction from balanced partition.

Given an instance of the balanced partition problem where the integers are a1a2a2na_{1}\leq a_{2}\leq\cdots\leq a_{2n} and q=1/2j=12najq=1/2\cdot\sum_{j=1}^{2n}a_{j}, we construct an instance of the balanced partition problem by adding 4n4n integers, each of value 3q3q.

We first show that the constructed instance is a feasible instance. Obviously every additional integer is larger than any aja_{j} where j2nj\leq 2n. Let the additional integers be a2n+1,a2n+2,,a6na_{2n+1},a_{2n+2},\cdots,a_{6n}. In the constructed instance there are 2n=6n2n^{\prime}=6n elements, with the summation of all integers being 2q+12nq2q+12nq. Let q=q+6nqq^{\prime}=q+6nq. Obviously an+1+an+2++a2n1=9nq>q+1a_{n^{\prime}+1}+a_{n^{\prime}+2}+\cdots+a_{2n^{\prime}-1}=9nq>q^{\prime}+1. Thus, the constructed instance is a feasible instance of the balanced partition problem.

We show that the constructed instance admits a feasible partition if and only if the given balanced partition instance admits a feasible solution.

If the given balanced partition instance admits a feasible solution, then obviously the constructed balanced partition problem admits a feasible solution (by adding 2n2n of the additional integers to both sides).

Suppose the constructed balanced partition instance admits a feasible solution. We claim that among the 4n4n additional integers, there are exactly 2n2n of them in SS. Otherwise SS contains either at most 2n12n-1 of them or at least 2n+12n+1 of them. By symmetry we assume without loss of generality that SS contains at most 2n12n-1 of them, then all integers in SS add up to at most (2n1)3q+2q<q=q+6nq(2n-1)\cdot 3q+2q<q^{\prime}=q+6nq, which is a contradiction. Thus, SS contains exactly 2n2n additional integers, implying that the remaining nn integers adding up to qq, i.e., the given balanced partition instance admits a feasible solution. ∎

Proof (Proof of Lemma 11)

We will prove the NP-hardness for an election with only two candidates under 11-approval (plurality). Recall that in this case the constructive and destructive protection problem are the same.

We reduce from the balanced partition problem. Given an arbitrary instance of the balanced partition problem, we construct an instance of the $-bribery-protection problem such that the answer to the problem is “Yes” if and only the balanced partition instance admits a feasible solution.

We construct the $-bribery-protection instance as follows. There are m=2m=2 candidates. c1c_{1} is the designated candidate. Let F=4qn+qF=4qn+q, B=(4n1)q1B=(4n-1)q-1. There are 6n16n-1 voters, each of unit weight and can be divided into three groups:

  • 2n2n key voters voting for c2c_{2}, whose awarding prices are 4q+a1,4q+a2,,4q+a2n4q+a_{1},4q+a_{2},\cdots,4q+a_{2n} and bribing prices are 4qa1,4qa2,,4qa2n4q-a_{1},4q-a_{2},\cdots,4q-a_{2n}, respectively.

  • 2n12n-1 dummy voters voting for c2c_{2}, whose awarding prices are all F+1F+1 and bribing prices are all B+1B+1.

  • 2n2n dummy voters voting for c1c_{1}, whose awarding and bribing prices are all 11.

Let 𝒱={v1,v2,,vn}{\mathcal{V}}^{*}=\{v_{1},v_{2},\cdots,v_{n}\} be the set of key voters.

Obviously c2c_{2} is the original winner. We show that the answer to the constructed $-bribery-protection instance is “Yes” if and only if the balanced partition problem admits a feasible solution.

Suppose the given balanced partition instance admits a feasible solution SS. Now we let the defender fix the nn key voters whose awarding price is 4q+aj4q+a_{j} where ajSa_{j}\in S. It is easy to verify that the total awarding price is 4nq+q=F4nq+q=F, which stays within the defense budget. We argue that, no briber can alter the election result with a budget of BB. Let 𝒱F{\mathcal{V}}_{F} be the set of fixed voters. Suppose on the contrary there is a briber who can make c1c_{1} win. Given that the total attack budget is BB, the briber can only bribe key voters. Furthermore, the briber has to bribe at least nn voters. As |𝒱F|=n|{\mathcal{V}}_{F}|=n, the briber has to bribe all voters in 𝒱𝒱F{\mathcal{V}}^{*}\setminus{\mathcal{V}}_{F}. However,

j:vj𝒱𝒱Fpjb=(4n1)q>B,\sum_{j:v_{j}\in{\mathcal{V}}^{*}\setminus{\mathcal{V}}_{F}}p_{j}^{b}=(4n-1)q>B,

which is a contradiction. Thus, the answer to the constructed $-bribery-protection instance is “Yes”.

Suppose the answer to the constructed $-bribery-protection instance is “Yes”. Note that in total there are 4n14n-1 voters voting for c2c_{2} and 2n2n voters voting for c1c_{1}. Thus any briber who wants to alter the election result has to bribe at least nn voters who originally vote for c2c_{2}. Since the 2n12n-1 dummy jobs voting for c2c_{2} can never be protected nor bribed, we can fix a subset 𝒱F𝒱{\mathcal{V}}_{F}\subseteq{\mathcal{V}}^{*} such that no briber can bribe nn or more voters from 𝒱𝒱F{\mathcal{V}}^{*}\setminus{\mathcal{V}}_{F} with a budget of BB. We have the following claim.

Claim

|𝒱F|=n|{\mathcal{V}}_{F}|=n.

Proof (Proof of Claim 7.5)

We first show that |𝒱F|n|{\mathcal{V}}_{F}|\leq n. Suppose on the contrary that |𝒱F|n+1|{\mathcal{V}}_{F}|\geq n+1. Note that any key voter has an awarding price of at least 4q4q, thus the total awarding price is at least 4(n+1)q4(n+1)q. However, F=4qn+q<4(n+1)qF=4qn+q<4(n+1)q, which is a contradiction.

We now show that |𝒱F|n|{\mathcal{V}}_{F}|\geq n. Suppose on the contrary that |𝒱F|n1|{\mathcal{V}}_{F}|\leq n-1. Then there are at least n+1n+1 key voters that can be bribed and we bribe the cheapest nn voters. As p1bp2bp2nbp_{1}^{b}\geq p_{2}^{b}\geq\cdots\geq p_{2n}^{b}, the total bribing price of the cheapest nn voters among any n+1n+1 voters is at most pnb+pn+1b++p2n1b=4qn(an+an+1++a2n1)4qn(q+1)=Bp_{n}^{b}+p_{n+1}^{b}+\cdots+p_{2n-1}^{b}=4qn-(a_{n}+a_{n+1}+\cdots+a_{2n-1})\leq 4qn-(q+1)=B, whereas the briber can always bribe the cheapest nn voters and let c2c_{2} win, which contradicts the fact that the answer to the $-bribery-protection instance is “Yes”. Hence |𝒱F|n|{\mathcal{V}}_{F}|\geq n. ∎

Now the following inequalities hold simultaneously:

j:vj𝒱FpjaF=4qn+q\displaystyle\quad\sum_{j:v_{j}\in{\mathcal{V}}_{F}}p_{j}^{a}\leq F=4qn+q~{} (5a)
j:vi𝒱𝒱FpjbB+1=4(n1/2)q+q\displaystyle\quad\sum_{j:v_{i}\in{\mathcal{V}}^{*}\setminus{\mathcal{V}}_{F}}p_{j}^{b}\geq B+1=4(n-1/2)q+q~{} (5b)

Note that

j:vi𝒱𝒱Fpjb=j=12npjbj:vj𝒱Fpjb\displaystyle\sum_{j:v_{i}\in{\mathcal{V}}^{*}\setminus{\mathcal{V}}_{F}}p_{j}^{b}=\sum_{j=1}^{2n}p_{j}^{b}-\sum_{j:v_{j}\in{\mathcal{V}}_{F}}p_{j}^{b}
=\displaystyle= 4(2n1/2)qj:vj𝒱F(4qaj),\displaystyle 4(2n-1/2)q-\sum_{j:v_{j}\in{\mathcal{V}}_{F}}(4q-a_{j}),

by (5a) we have

j:vj𝒱F(4qaj)4qnq.\sum_{j:v_{j}\in{\mathcal{V}}_{F}}(4q-a_{j})\leq 4qn-q.

Using the fact that |𝒱F|=n|{\mathcal{V}}_{F}|=n, we have

j:vj𝒱Fajq.\sum_{j:v_{j}\in{\mathcal{V}}_{F}}a_{j}\geq q.

From (5b), we have

j:vj𝒱Fajq.\sum_{j:v_{j}\in{\mathcal{V}}_{F}}a_{j}\leq q.

Thus,

j:vj𝒱Faj=q,\sum_{j:v_{j}\in{\mathcal{V}}_{F}}a_{j}=q,

i.e., the given balanced partition instance admits a feasible solution. ∎

The symmetric $-protection problem (i.e., pja=pjbp_{j}^{a}=p_{j}^{b}), however, is significantly easier, as shown by Theorem 3.5.

Theorem 3.5

For constant mm, both destructive and constructive symmetric $-protection problems are in PP for any scoring rule.

Proof

The proof idea is the same as that of Theorem 3.3, namely by trying all different possible 𝒱F{\mathcal{V}}_{F}. For each 𝒱F{\mathcal{V}}_{F}, we try all possible 𝒱B{\mathcal{V}}_{B}’s and all possible ways of altering the preference of voters in 𝒱B{\mathcal{V}}_{B}. Note that every voter has the same weight and satisfies that pja=pjbp_{j}^{a}=p_{j}^{b}. Therefore, a voter with a smaller (awarding and bribing) price always dominates a voter with a larger price. By Corollary 1 and Corollary 2, for the voters having the same preference, 𝒱F{\mathcal{V}}_{F} contains the voters that have the smallest prices. Therefore, in order to determine 𝒱F{\mathcal{V}}_{F}, it suffices to know the number of voters that have the same preference, implying that there are at most nm!n^{m!} different kinds of 𝒱F{\mathcal{V}}_{F}’s. Similarly, given a 𝒱F{\mathcal{V}}_{F}, there are at most nm!n^{m!} different kinds of 𝒱B{\mathcal{V}}_{B}’s. Using the same argument as that of Theorem 3.3, for every 𝒱F{\mathcal{V}}_{F} and 𝒱B{\mathcal{V}}_{B}, there are at most nm!n^{m!} ways of altering the preferences of the voters in 𝒱B{\mathcal{V}}_{B}. Therefore, there are n3m!n^{3m!} different possibilities in total, which can be enumerated efficiently when mm is a constant. ∎

7.6 Proofs Omitted in Section 4.2

The goal is to prove Theorem 4.2.

Theorem 4.2

Both rr-approval destructive weighted-protection and rr-approval (symmetric) $-protection problems are NP-complete.

Towards the proof, we first show the NP-hardness.

Lemma 13

The rr-approval destructive weighted-protection problem is NP-hard for any r3r\geq 3.

Proof

We prove the lemma for r=3r=3. The case of r>3r>3 can be proved by introducing dummy candidates and letting each voter vote for r3r-3 distinct dummy candidate.

We reduce from a variant of 3-dimensional matching in which every element occurs at most d=O(1)d=O(1) times in the given triples, which is also known to be NP-hard  stated by Kann [13]. Given a 3DM instance with 3ζ=|WXY|3\zeta=|W\cup X\cup Y| elements and η=|M|\eta=|M| triples such that every element appears at most d=O(1)d=O(1) times in MM, we construct an instance of the destructive weighted bribery-protection problem as follows. Here we further require that ηζ+2d\eta\geq\zeta+2d. The assumption is without loss of generality since if ηζ+2d1\eta\leq\zeta+2d-1, then there are at most O(1)O(1) triples outside a perfect matching, and the existence of a perfect matching can be determined by brute-forcing within ζO(1)\zeta^{O(1)} time, which is polynomial.

For ease of description, we re-index all elements of WXYW\cup X\cup Y arbitrarily as z1,z2,,z3ζz_{1},z_{2},\cdots,z_{3\zeta}.

Let Q=2η+1Q=2\eta+1. There are 3ζ+13\zeta+1 key candidates, including the following two kinds of candidates (the function ff will be defined later):

  • 3ζ3\zeta key candidates c1c_{1} to c3ζc_{3\zeta}, with cic_{i} corresponding to ziWXYz_{i}\in W\cup X\cup Y and has a score of Qf(zi)Q\cdot f(z_{i}). We call them element candidates;

  • one key candidate c3ζ+1c_{3\zeta+1} called leading candidate, which is the original winner and has a score of Qf(z3ζ+1)Q\cdot f(z_{3\zeta+1}).

Besides key candidates, there are also sufficiently many dummy candidates cic_{i} for i>3ζ+1i>3\zeta+1, each having a score of 11. The number of dummy candidates will be determined later.

There are η\eta key voters v1v_{1} to vηv_{\eta}, each of weight QQ. Each key voter corresponds to a distinct triple in (zi,zj,zk)M(z_{i},z_{j},z_{k})\in M, and votes for the three candidates that correspond to zi,zj,zkz_{i},z_{j},z_{k}, respectively.

Besides key voters, there are also sufficiently many dummy voters vjv_{j} for j>ηj>\eta. A dummy vote has a unit weight, and votes for one key candidate and two distinct dummy candidates.

Now we determine the number of dummy voters and dummy candidates together with all the parameters. If we only consider key voters of weight QQ, then every element candidate corresponding to some ziz_{i} gets a score of Qd(zi)Q\cdot d(z_{i}) where d(zi)d(z_{i}) is the number of occurrences of zz in MM. Adopting the viewpoint of the minmax vector addition problem, for every 1jη1\leq j\leq\eta we have

Δij={0,if vj votes for ci and does not vote for c3ζ+11,if vj votes for c3ζ+1 and does not votes for ci,or vj votes for both ci and c3ζ+12,if vj votes for c3ζ+1 and does not vote for ci\Delta_{ij}=\begin{cases}0,\hskip 14.22636pt&\text{if $v_{j}$ votes for $c_{i}$ and does not vote for $c_{3\zeta+1}$}\\ 1,&\text{if $v_{j}$ votes for $c_{3\zeta+1}$ and does not votes for $c_{i}$},\\ &\text{or $v_{j}$ votes for both $c_{i}$ and $c_{3\zeta+1}$}\\ 2,&\text{if $v_{j}$ votes for $c_{3\zeta+1}$ and does not vote for $c_{i}$}\end{cases}

Let

Δmax=max1i3ζj=1ζΔij,dmax=max1i3ζd(zi).\Delta_{max}=\max_{1\leq i\leq 3\zeta}\sum_{j=1}^{\zeta}\Delta_{ij},\quad d_{max}=\max_{1\leq i\leq 3\zeta}d(z_{i}).

We define

f(zi)=2η+dmax+Δmaxj=1ηΔij,1i3ζf(z_{i})=2\eta+d_{max}+\Delta_{max}-\sum_{j=1}^{\eta}\Delta_{ij},1\leq i\leq 3\zeta

That means, candidate cic_{i}, 1i3ζ1\leq i\leq 3\zeta will get a score of Qd(zi)Q\cdot d(z_{i}) from key voters, and additionally Q[f(zi)d(zi)]0Q\cdot[f(z_{i})-d(z_{i})]\geq 0 score from dummy voters. Hence, for each cic_{i} we need to create Q[f(zi)d(zi)]Q\cdot[f(z_{i})-d(z_{i})] dummy voters.

We define

f(z3ζ+1)=2η+dmax+Δmaxζ+1.f(z_{3\zeta+1})=2\eta+d_{max}+\Delta_{max}-\zeta+1.

Note that j=1ηΔijηd>ζ\sum_{j=1}^{\eta}\Delta_{ij}\geq\eta-d>\zeta as every element appears at most dd times in triples, hence f(z3ζ+1)>f(zi)f(z_{3\zeta+1})>f(z_{i}) for 1i3ζ1\leq i\leq 3\zeta and c3ζ+1c_{3\zeta+1} is indeed the original winner.

Overall, dummy voters should contribute Q[f(zi)d(zi)]Q\cdot[f(z_{i})-d(z_{i})] to each cic_{i}, 1i3ζ1\leq i\leq 3\zeta and (ζ+1)f(z3ζ+1)(\zeta+1)f(z_{3\zeta+1}) to c3ζ+1c_{3\zeta+1}. We create in total Q[i=13ζ+1f(zi)i=13ζd(zi)]Q\cdot[\sum_{i=1}^{3\zeta+1}f(z_{i})-\sum_{i=1}^{3\zeta}d(z_{i})] dummy voters, and 2Q[i=13ζ+1f(zi)i=13ζd(zi)]2Q\cdot[\sum_{i=1}^{3\zeta+1}f(z_{i})-\sum_{i=1}^{3\zeta}d(z_{i})] dummy candidates.

Let the defense budget be F=ζF=\zeta and the attack budget be B=ηζB=\eta-\zeta.

“Yes” Instance of 3DM \to “Yes” Instance of Destructive Weighted-Bribery-Protection. Suppose the given 3DM instance admits a feasible solution, we show that the answer to destructive weighted-bribery-protection problem is “Yes”. Let TMT\subseteq M be the perfect matching. Then |T|=ζ|T|=\zeta and we let the defender protect voters corresponding to the triples in TT. Taking the viewpoint of the minmax vector addition problem. If the attacker bribes all the key voters, then W(ci)W(c_{i}) increases by exactly Qj=1ηΔijQ\cdot\sum_{j=1}^{\eta}\Delta_{ij} for 1i3ζ1\leq i\leq 3\zeta. First it is easy to see that no dummy candidate can be a winner as Qj=1ηΔij2ηQQ\cdot\sum_{j=1}^{\eta}\Delta_{ij}\leq 2{\eta}Q while Qf(z3ζ+1)(2η+1)QQ\cdot f(z_{3\zeta+1})\geq(2\eta+1)Q. Meanwhile, for each key candidate cic_{i}, 1i3ζ1\leq i\leq 3\zeta, his/her total score becomes exactly Q[f(z3ζ+1)+ζ1]Q\cdot[f(z_{3\zeta+1})+\zeta-1]. As the defender fixes a subset of key voters, we should subtract the contribution of these key voters. As the triple corresponding to these voters form a perfect matching, these voters contribute a score of exactly Q(ζ1)Q(\zeta-1) to each cic_{i}, hence after bribery every key candidate has a score at most Qf(z3ζ+1)Q\cdot f(z_{3\zeta+1}), implying that the answer to the Destructive Weighted-Bribery-Protection problem is “Yes”.

“No” Instance of 3DM \to “No” Instance of Destructive Weighted-Bribery-Protection. Suppose the given 3DM instance does not admit a perfect matching, we show that the answer to the constructed instance of the destructive weighted-bribery-protection problem is “No”. Consider an arbitrary set of voters fixed by the defender and let UU be the subset of key voters that are fixed. Obviously |U|ζ|U|\leq\zeta. If |U|<ζ|U|<\zeta, we add arbitrary key voters into UU such that its cardinality becomes ζ\zeta. Let UU^{\prime} be the set of these ζ\zeta key voters and let the attacker bribe the remaining ζη\zeta-\eta key voters. Again we take the viewpoint of the minmax vector addition problem. If the attacker bribes every key voter, then the total score of every key candidate cic_{i}, 1i3ζ1\leq i\leq 3\zeta, becomes exactly Q[f(z3ζ+1)+ζ1]Q\cdot[f(z_{3\zeta+1})+\zeta-1]. As key voters in UU are not bribed, we subtract their contribution from each cic_{i}. Note that triples corresponding to voters in UU do not form a perfect matching, thus there exists some element which appears at least twice in these triples. Let zkz_{k} be such element and we consider ckc_{k}. It is clear that Δkj=0\Delta_{kj}=0 if vjv_{j} votes for ckc_{k} and Δkj=1\Delta_{kj}=1 if vjv_{j} does not vote for ckc_{k} (note that key voters never vote for c3ζ+1c_{3\zeta+1}). Hence j:vjUΔkjζ2\sum_{j:v_{j}\in U}\Delta_{kj}\leq\zeta-2. By subtracting the contribution of voters in UU, ckc_{k} has a score at least Q[f(z3ζ+1+1)]Q\cdot[f(z_{3\zeta+1}+1)], implying that after bribery ckc_{k} will get a higher score than c3ζ+1c_{3\zeta+1}. Thus, the answer to the Destructive Weighted-Bribery-Protection problem is “No”. ∎

Note that in the preceding reduction, we only construct voters of two different weights, QQ for the key voters and 11 for the dummy voters. Recall that QQ is set to be large enough to assure that only the key voters will be considered by the defender or the attacker. Once 𝒱F{\mathcal{V}}_{F} and 𝒱B{\mathcal{V}}_{B} are restricted to be subsets of the key voters, the concrete value of QQ does not matter. Moreover, we can also prove the NP-hardness of the destructive (symmetric) $-bribery-protection problem by using essentially the same proof, except that we set key voters of price 11 and dummy voters of price exceeding budgets FF and BB, say, max{F,B}+1\max\{F,B\}+1. This leads to the following lemma.

Lemma 14

The rr-approval destructive (symmetric) $-bribery-protection problem is NP-hard for any r3r\geq 3.

Having showed the NP-hardness of the destructive weighted-protection problem, we show the problem is polynomial-time verifiable and is therefore NP-complete.

Lemma 15

The destructive weighted-protection problem can be verified in polynomial time under any scoring rule.

Proof

We leverage the minmax vector addition problem. In the case of unit price, given 𝒱F{\mathcal{V}}_{F}, the decision version of the verification problem becomes: does there exist a subset 𝒱B𝒱𝒱F{\mathcal{V}}_{B}\subseteq{\mathcal{V}}\setminus{\mathcal{V}}_{F} such that the following is true

Λ+j:vj𝒱BΔj>Λ(cm).\displaystyle\left\|\vec{\Lambda}+\sum_{j:v_{j}\in{\mathcal{V}}_{B}}\vec{\Delta}_{j}\right\|>\Lambda(c_{m}).

To answer this decision problem, it suffices to do the following for every 1im11\leq i\leq m-1: pick BB voters from 𝒱𝒱F{\mathcal{V}}\setminus{\mathcal{V}}_{F} whose ii-th coordinate Δij\Delta_{ij} is the largest, add them to Λ(ci)\Lambda(c_{i}), and check if it is greater than Λ(cm)\Lambda(c_{m}). ∎

It is, however, not clear if the destructive $-protection problem is NP-complete for arbitrary scoring rules. However, we show in the following that for any scoring rule which only assigns a constant number of different scores to a preference list, i.e., the αi\alpha_{i}’s only take O(1)O(1) distinct values, the $-protection problem can be verified in polynomial-time. As in the case of the rr-approval rule, the αi\alpha_{i}’s only take values of 11 or 0, the destructive $-protection problem is NP-complete for the rr-approval rule.

Lemma 16

The destructive (symmetric) $-protection problem can be verified in polynomial-time in nn under any scoring rule in which the αi\alpha_{i}’s only take a constant number of distinct values.

Proof

Consider the minmax vector addition problem. We observe that in the case of unit weight and that the αi\alpha_{i}’s take O(1)O(1) distinct values, Δij\Delta_{ij} only takes O(1)O(1) distinct values. For each coordinate ii, we can check if it is possible for Λ(ci)\Lambda(c_{i}) and Δij\Delta_{ij}’s to add up to some value strictly greater than Λ(cm)\Lambda(c_{m}). Note that by adding every Δij\Delta_{ij}, we need to pay a price of pjbp_{j}^{b}, hence it is essentially the knapsack problem with items having arbitrary prices but only O(1)O(1) distinct weights. Such a knapsack problem can be solved in polynomial-time, e.g., by simply guessing the number of items of the same weight. Among the items of the same weight, the optimal solution should take the ones with the cheapest price. ∎

References

  • [1] Bredereck, R., Chen, J., Faliszewski, P., Nichterlein, A., Niedermeier, R.: Prices matter for the parameterized complexity of shift bribery. Inf. Comput. 251, 140–164 (2016)
  • [2] Bredereck, R., Talmon, N.: Np-hardness of two edge cover generalizations with applications to control and bribery for approval voting. Inf. Process. Lett. 116(2), 147–152 (2016)
  • [3] Caprara, A., Carvalho, M., Lodi, A., Woeginger, G.J.: A study on the computational complexity of the bilevel knapsack problem. SIAM J. Optim. 24(2), 823–838 (2014)
  • [4] Chen, J., Faliszewski, P., Niedermeier, R., Talmon, N.: Elections with few voters: Candidate control can be easy. J. Artif. Intell. Res. 60, 937–1002 (2017)
  • [5] Chen, L., Zhang, G.: Approximation algorithms for a bi-level knapsack problem. Theor. Comput. Sci. 497, 1–12 (2013)
  • [6] Dey, P., Misra, N., Narahari, Y.: Frugal bribery in voting. Theor. Comput. Sci. 676, 15–32 (2017)
  • [7] Erdélyi, G., Reger, C., Yang, Y.: The complexity of bribery and control in group identification. Auton. Agents Multi Agent Syst. 34(1),  8 (2020)
  • [8] Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: How hard is bribery in elections? J. Artif. Intell. Res. 35, 485–532 (2009)
  • [9] Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: Weighted electoral control. J. Artif. Intell. Res. 52, 507–542 (2015)
  • [10] Faliszewski, P., Rothe, J.: Control and bribery in voting. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A.D. (eds.) Handbook of Computational Social Choice, pp. 146–168. Cambridge University Press (2016)
  • [11] Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman (1979)
  • [12] Kaczmarczyk, A., Faliszewski, P.: Algorithms for destructive shift bribery. Auton. Agents Multi Agent Syst. 33(3), 275–297 (2019)
  • [13] Kann, V.: Maximum bounded 3-dimensional matching is max snp-complete. Inf. Process. Lett. 37(1), 27–35 (1991)
  • [14] Knop, D., Koutecký, M., Mnich, M.: Voting and bribing in single-exponential time. In: Vollmer, H., Vallée, B. (eds.) 34th STACS, STACS 2017, March 8-11, 2017, Hannover, Germany. LIPIcs, vol. 66, pp. 46:1–46:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2017)
  • [15] Lin, A.: The complexity of manipulating k-approval elections. In: Filipe, J., Fred, A.L.N. (eds.) ICAART 2011 - Proceedings of the 3rd ICAART, Volume 2 - Agents, Rome, Italy, January 28-30, 2011. pp. 212–218. SciTePress (2011)
  • [16] McLoughlin, A.M.: The complexity of computing the covering radius of a code. IEEE Trans. Inf. Theory 30(6), 800–804 (1984)
  • [17] Qiu, X., Kern, W.: Improved approximation algorithms for a bilevel knapsack problem. Theor. Comput. Sci. 595, 120–129 (2015)
  • [18] Wang, Z., Xing, W., Fang, S.: Two-group knapsack game. Theor. Comput. Sci. 411(7-9), 1094–1103 (2010)
  • [19] Wrathall, C.: Complete sets and the polynomial-time hierarchy. Theor. Comput. Sci. 3(1), 23–33 (1976)
  • [20] Yin, Y., Vorobeychik, Y., An, B., Hazon, N.: Optimally protecting elections. In: Kambhampati, S. (ed.) Proceedings of the 25th IJCAI, IJCAI 2016, New York, NY, USA, 9-15 July 2016. pp. 538–545. IJCAI/AAAI Press (2016)