Bundling Attacks in Judgment Aggregation
نویسندگان
چکیده
We consider judgment aggregation over multiple independent issues, where the chairperson has her own opinion, and can try to bias the outcome by bundling several issues together. Since for each bundle judges must give a uniform answer on all issues, different partitions of the issues may result in an outcome that significantly differs from the “true”, issue-wise, decision. We prove that the bundling problem faced by the chairperson, i.e. trying to bias the outcome towards her own opinion, is computationally difficult in the worst case. Then we study the probability that an effective bundling attack exists as the disparity between the opinions of the judges and the chair varies. We show that if every judge initially agrees with the chair on every issue with probability of at least 1/2, then there is almost always a bundling attack (i.e. a partition) where the opinion of the chair on all issues is approved. Moreover, such a partition can be found efficiently. In contrast, when the probability is lower than 1/2 then the chair cannot force her opinion using bundling even on a single issue.
منابع مشابه
Complexity of Manipulative Attacks in Judgment Aggregation for Premise-Based Quota Rules1
Endriss et al. [26] initiated the complexity-theoretic study of problems related to judgment aggregation. We extend their results for manipulating two specific judgment aggregation procedures to a whole class of such procedures, namely to uniform premise-based quota rules. In addition, we consider incomplete judgment sets and the notions of top-respecting and closeness-respecting preferences in...
متن کاملComputational Aspects of Manipulation and Control in Judgment Aggregation
We study computational aspects of various forms of manipulation and control in judgment aggregation, with a focus on the premise-based procedure. For manipulation, we in particular consider incomplete judgment sets and the notions of top-respecting and closeness-respecting preferences introduced by Dietrich and List [DL07]. This complements previous work on the complexity of manipulation in jud...
متن کاملCryptanalyses of Candidate Branching Program Obfuscators
We describe new cryptanalytic attacks on the candidate branching program obfuscator proposed by Garg, Gentry, Halevi, Raykova, Sahai and Waters (GGHRSW) using the GGH13 graded encoding, and its variant using the GGH15 graded encoding as specified by Gentry, Gorbunov and Halevi. All our attacks require very specific structure of the branching programs being obfuscated, which in particular must h...
متن کاملArrow's theorem in judgment aggregation
In response to recent work on the aggregation of individual judgments on logically connected propositions into collective judgments, it is often asked whether judgment aggregation is a special case of Arrowian preference aggregation. We argue the opposite. After proving a general impossibility result on judgment aggregation, we construct an embedding of preference aggregation into judgment aggr...
متن کاملBundling and Competition on the Internet
The Internet has significantly reduced the marginal cost of producing and distributing digital information goods. It also coincides with the emergence of new competitive strategies such as large-scale bundling. In this paper, we show that bundling can create “economies of aggregation” for information goods if their marginal costs are very low, even in the absence of network externalities or eco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013