Designing private voting rules is an important and pressing problem for trustworthy democracy. In this paper, under the framework of differential privacy, we propose a novel famliy of randomized voting rules based on the well-known Condorcet method, and focus on three classes of voting rules in this family: Laplacian Condorcet method (), exponential Condorcet method (), and randomized response Condorcet method (), where represents the level of noise. We prove that all of our rules satisfy absolute monotonicity, lexi-participation, probabilistic Pareto efficiency, approximate probabilistic Condorcet criterion, and approximate SD-strategyproofness. In addition, satisfies (non-approximate) probabilistic Condorcet criterion, while and satisfy strong lexi-participation. Finally, we regard differential privacy as a voting axiom, and discuss its relations to other axioms.
1 Introduction
Voting is a commonly used method for group decision making, where voters submit their preferences over a set of alternatives, and then a voting rule is applied to choose the winner. A major and classical paradigm behind the design and analysis of voting rules is the axiomatic approach (Plott 1976), under which voting rules are evaluated by their satisfaction to various normative properties, known as (voting) axioms. For example, the Condorcet criterion requires that whenever there exists a Condorcet winner, which is the alternative that beats all other alternatives in their head-to-head competitions, it must be selected as the winner.
Recently, privacy in voting has become a critical public concern. There are a series of works on examining the differential privacy (DP) (Dwork 2006) of voting (Shang et al. 2014; Hay, Elagina, and Miklau 2017; Yan, Li, and Liu 2020).
These works mainly focused on applying several randomized mechanisms to existing voting rules, proving upper bounds on the privacy-preserving level (also called privacy budget, denoted by throughout the paper), and then evaluating the utility loss (measured by accuracy or mean square error) due to randomness.
However, the upper bounds on privacy in most of them are not tight, which means that the exact privacy-preserving level of the mechanisms is unclear.
Moreover, we are not aware of a previous work on making voting private while maintaining the satisfaction to desirable voting axioms beyond strategyproofness (Lee 2015).
Therefore, the following question remains largely open.
How can we design private voting rules that satisfy desirable axiomatic properties?
Our contributions.
We propose a novel class of randomized voting rules, denoted by , based on the celebrated Condorcet method, which chooses the Condorcet winner when it exists, where Rand is a randomized function (called a mechanism in DP literature) that introduces noises to pairwise comparisons between alternatives, and represents the level of noise. To choose a winner, applies Rand with parameter to the pairwise comparisons for the input profile until a Condorcet winner appears, and then chooses it as the winner.
We focus on three classes voting rules in this family, namely , , and , which are obtained by applying the Laplace mechanism, exponential mechanism, and randomized response mechanism, respectively. Under these mechanisms, while it may take exponentially many iterations to obtain the winner by definition, we show that the winner can be efficiently sampled (Lemma 1).
p-Condorcet
-p-Condorcet
p-Pareto
a-Mono.
-SD-SP
Lexi-Par.
Strong Lexi-Par.
✓
✓
✓
✓
✗
✗
✓
✓
✓
✓
✗
✓
✓
✓
✓
Table 1: The satisfaction of our mechanisms to the voting axioms, where “✓” indicates that the row rule satisfies the column axiom, and “✗” indicates that the rule does not satisfy the axiom. The expressions in the table represent the level of satisfaction to the approximate axioms (the in -p-Condorcet and -SD-SP).
Our main technical contributions are three-fold. First, we prove that all the three classes of voting rules are differentially private by characterizing the upper and lower bounds on the privacy budget (Theorem 1). Second, we study the satisfaction of our voting rules to probabilistic variants to Condorcet criterion (p-Condorcet, requiring the winning rate of the Condorcet winner is not lower than the other alternatives), Pareto efficiency (p-Pareto, which requires the winning rate of is not lower than , if Pareto dominates ), monotonicity (a-monotonicity, which ensures the winning rate of each alternative does not decrease when her ranking is lifted by any voter simply), strategyproofness (SD-strategyproofness, SD-SP for short, which ensures that no voter can benefit herself in the sense of stochastic dominance by changing her vote), and participation (lexi-participation, which ensures that no voter can improve the result of the voting lexicographically by withdrawing her vote). Besides, we consider the approximate version of p-Condorcet (-p-Condorcet, Definition 5) and SD-SP (-SD-SP, Definition 7), and the strong version of lexi-participation (Definition 8). Our results suggest that outperforms in all aspects examined in the paper, while sometimes achieves better p-Condorcet but only satisfies standard lexi-participation, instead of the strong version (Theorems 2 - 8). The results in the second part are summarized in Table 1. Third, we investigate the relations between DP and the voting axioms. We prove that Condorcet criterion and Pareto efficiency are incompatible with DP, and capture the upper bounds of satisfaction to p-Condorcet under -DP (Proposition 4 - 6). Besides, we show that DP guarantees a lower bound of satisfaction to SD-strategyproofness (Proposition 7).
Related work and discussions.
To the best of our knowledge, DP was first applied to the rank aggregation problem in (Shang et al. 2014). They analyzed the error rates and derived upper bounds on them.
Lee proposed an algorithm which is both differentially private and robust to strategic manipulation for tournament voting rules (Lee 2015).
Hay et al. used Laplace mechanism and exponential mechanism to improve the privacy of Quicksort and Kemeny-Young method (Hay, Elagina, and Miklau 2017).
Kohli and Laskowski explored DP, strategyproofness, and anonymity for voting on single-peaked preferences (Kohli and Laskowski 2018).
Torra analyzed the privacy-preserving level of random dictatorship with DP, which is a well-known randomized voting rule (Torra 2019). He investigated the condition where random dictatorship is differentially private, and improved the mechanism to achieve DP for general cases.
Yan et al. made tradeoff between accuracy and privacy in rank aggregation to achieve local DP via Laplace mechanism and randomized response (Yan, Li, and Liu 2020).
Most of the above works did not consider the tradeoffs between privacy and those desirable properties, and the privacy bounds of them are usually not tight. Ao et al. proposed the exact version of distributional DP (Bassily et al. 2013) and studied the privacy-preserving level of several voting rules, but they did not investigate how to improve the privacy (Liu et al. 2020).
Beyond social choice, DP has also been considered in other topics of economics, such as mechanism design (Pai and Roth 2013; Xiao 2013), and matching and resource allocation (Hsu et al. 2016; Kannan et al. 2018).
There is a large literature on the analysis of randomized voting (Brandt 2017), most of them studied the satisfaction to axiomatic properties, e.g., complexity of manipulation (Walsh and Xia 2012), strategyproofness (Aziz, Brandl, and Brandt 2014, 2015), Pareto efficiency (Brandl, Brandt, and Hofbauer 2015; Gross, Anshelevich, and Xia 2017), participation (Brandl, Brandt, and Hofbauer 2019) and monotonicity (Brandl, Brandt, and Stricker 2018). The fairness properties of sortition have also been investigated (Benadè, Gölz, and Procaccia 2019; Flanigan et al. 2020, 2021).
The approximation of those properties was also studied.
Procaccia discussed how much a strategyproof randomized rule could approximate a deterministic rule (Procaccia 2010).
Birrell and Pass explored the approximate strategyproofness for randomized voting rules (Birrell and Pass 2011).
They bounded the difference of the expectations of the utility function with a parameter, but the ratio seems to be more natural for DP.
2 Preliminaries
Let denote a set of alternatives. For any , let be a set of voters. For each , the vote of voter is a linear order , where denotes the set of all linear orders over , i.e., all transitive, antireflexive, antisymmetric, and complete binary relations.
Let denote the (preference) profile.
For each , let denote the profile obtained from by removing .
A (randomized) voting rule is a mapping , where denotes the set of all probability distributions on .
Given a profile , let denote the number of voters who prefer to , i.e., . Let be the majority margin of over . Then the weighted majority graph (WMG) of can be defined: the vertices of WMG are alternatives in and there is a directed edge from to with weight if and only if . Similarly, letting , the unweighted majority graph (UMG) of can also be defined: the set of vertices is and there is an unweighted directed edge from to if and only if , where denotes the sign function, i.e., for all and . The Condorcet winner of is an alternative , such that for all , denoted by . Notice that the Condorcet winner is completely determined by the UMG, we also use to denote the Condorcet winner claimed by the UMG.
Axioms of voting.
A voting rule satisfies Condorcet criterion, if holds for all profile that exists.
The rule satisfies Pareto efficiency, if for all profile , where exists that for all .
And satisfies absolute monotonicity (Brandl, Brandt, and Stricker 2018), if holds for all , such that , , and is a pushup of in , i.e., raises the position of in , and keeps the relative position of other alternatives unchanged.
A randomized rule satisfies SD-Strategyproofness (Aziz, Brandt, and Brill 2013), if for all and that and , , for all 111In fact, absolute monotonicity and SD-strategyproof are equivalent to the nonperverseness and the strategyproofness in (Gibbard 1977), respectively..
A voting rule satisfies lexi-participation if for all that , there does not exist , such that and for all .
Differential privacy (Dwork et al. 2006) requires a function to return similar outputs while receiving similar inputs.
Definition 1(Differential privacy).
A function with domain is -differentially private (-DP for short) if for all and differing on only one record,
In other words, a function is -DP, if the ratio between the probabilities for the outputs of any pair of neighboring datasets to be in any given set must be upper bounded by .
In the context of social choice, is a voting rule and
and are two profiles differing on only one voter’s vote.
Notice that Definition 1 does not require the upper bound to be tight. The tight upper bound is captured by exact DP, formally defined as follows.
A voting rule is exact DP (-eDP for short) if it is -DP and there does not exist such that is -DP.
For both DP and eDP, the privacy budget usually is decided according to the users’ demand. For example, iOS 11 requires and iOS 10 requires (Orr 2017)222iOS has may have stronger privacy requirement for some specific data types (e.g., for Safari Auto-play intent detection data) (Apple Inc. 2017).. In the next section, we provide upper and lower bounds for the required noise level for any user-defined privacy budget.
3 Differentially Private Condorcet Methods
In this section, we propose a novel class of randomized voting rules. We apply three randomization mechanisms and obtain three classes of voting rules. By analyzing the worst cases, we prove that all of the three rules are differentially private, and our bounds of privacy budget are tight.
As mentioned in Section 2, the existence of Condorcet winner is completely determined by the UMG. In our mechanism, denoted by , a randomization mechanism Rand generates a noisy UMG for the given profile, and the voting rule outputs the Condorcet winner. If the Condorcet winner does not exist, the mechanism will generate another UMG, until the Condorcet winner exists, as shown in Mechanism 1.
Input:Profile , Parameter , Randomization Rand
Output:Winning alternative
1FunctionSelect_Rand(, ):
2
Get randomized unweighted graph with randomized mechanism Rand ;
3ifThere exists Condorcet winner for then
4return ;
5
6else
7Select_Rand(,);
8
9
10FunctionCM_Rand(, ):
11
Compute for all ;
12Select_Rand(, );
13
Mechanism 1Randomized Condorcet Method
Remark.
Notice that for each pair of alternatives , and are determined simultaneously, i.e., , if and only if . Thus, any noisy UMG produced in Mechanism 1 claims at most one Condorcet winner. In other words, our mechanism is a well-defined map from to .
In the randomization process, we adopt three different methods, which are defined as follows.
Definition 3.
Given , the three randomization mechanisms are
•
Laplace mechanism: Given profile , for any that , let for all and , where 333The Laplace distribution with scale parameter , of which the probability density function (PDF) is .. Under such a mechanism, the noisy UMG is
•
Exponential mechanism: For profile ,
•
Randomized response: For the majority margin of a given profile , if ,
If , then
The three randomization mechanisms above are denoted by LAP, EXP, and RR, respectively. For each , the Condorcet winner may not exist for the noisy UMG . Thus, our mechanism may need to perform the randomization for several times. In fact, for any given profile , the expected times of randomization is (see Appendix). However, such a mechanism with high time complexity can be sampled efficiently, as shown in the following lemma.
Lemma 1.
For any and , can be sampled as follows:
•
For any , is a probability distribution in , such that for any ,
where is the cumulative distribution function (CDF) of .
•
For any , is a probability distribution in , such that for any ,
•
For any , is a probability distribution in , such that for any ,
where .
Proof.
Since will keep performing the randomization on until the Condorcet winner for exists, the winning probability of each is determined by the conditional probability . First, for , we have
For any , the probability density function (PDF) of is (see Appendix A for the proof)
Therefore, the cumulative distribution function (CDF) is
Then we have
For , we have
For , we have
where , which completes the proof.
∎
Since there are totally alternatives, and the value of for each in Lemma 1 can be computed in time, can be sampled in time.
Now, we are ready to show the DP bounds of our rules. For simplicity , we use to denote , where . For example, when , ; when , .
Theorem 1.
Given and Rand, suppose that satisfies -eDP. When
When , .
Proof.
To prove the upper bound, we only need to prove that for each , and neighboring profiles , .
W.l.o.g., we make comparison between the winning probabilities of for profiles and . According to Lemma 1, for any , we have
When , since for any ,
Letting , we have . Due to the monotonicity of CDF, we have
Then it follows that
Further, we have
When , for any profile , we have
which indicates that
Further, we have
As a consequence,
Finally, when , for any profile , we have
Thus, for any neighboring profiles ,
Further,
Then we have
which completes the proof for the upper bound.
For the lower bounds of and , we only need to show that there exists neighboring profiles , and alternative ,
Consider the following profile (let ):
•
voters: ;
•
voters: ;
•
voter: .
And another profile :
•
voters: ;
•
voters: ;
It is quite easy to verify that and are neighboring datasets. Further, we have
Therefore,
When , we have and . Then
In other words, when ,
Then we have
Finally, for , consider the following profile (let ):
•
voters: ;
•
voters: .
And its neighboring profile :
•
voters: ;
•
voters: .
Then the majority margin of and should be
Further, we have
which completes the proof.
∎
With Theorem 1, we can get the upper and lower bounds of noise level for any given . The relations between the lower and upper bounds when and are shown in Figure 1.
Figure 1: The lower and upper bounds of privacy budget (left: , right: ).
4 Axioms-Privacy Tradeoff
In this section, we analyze our voting rules with axioms mentioned in Section 2. We show that our rules do not satisfy Condorcet criterion and Pareto efficiency. To address these challenges, we explore probabilistic variants of them. Then we discuss the satisfaction to absolute monotonicity, SD-strategyproofness, and lexi-participation.
To begin with, we analyze our voting rules with Condorcet criterion. But unfortunately, does not satisfy Condorcet criterion with any and , though it is based on the Condorcet method. Intuitively, for any and , . Then
even when is the Condorcet winner. To deal with this, we propose a probabilistic variant of Condorcet criterion, which is shown in the following definition.
Definition 4(Probabilistic Condorcet criterion).
A randomized voting rule satisfies probabilistic Condorcet criterion (p-Condorcet) if for every profile that exists and all ,
At a high level, Definition 4 is a relaxation of the Condorcet criterion, since it does not always require the voting rule to select the Condorcet winner. Further, the following theorem holds. The proof can be found in the full version.
Theorem 2.
For any , satisfies p-Condorcet.
Proof.
Since there are only one profile throughout the proof, we omit the normalization here, i.e., for profile , supposing , we have
For any , since is not the Condorcet winner, there exists a nonempty set , such that if and only if . Hence,
which completes the proof.
∎
In other words, satisfies a weak version of Condorcet criterion for any . However, the results for and are relatively negative.
Proposition 1.
and do not satisfy p-Condorcet.
Proof.
For , consider the voting instance where voters and alternatives. The ballots are as follows
•
voters: ;
•
voters: ;
Then we have
In other words,
As a result, . Since , we have
However,
In other words,
which indicates that does not satisfy p-Condorcet.
For , let , , and the profile be
•
voters: ;
•
voters: .
Then we have
In other words,
As a result, and
However,
As a consequence,
which completes the proof.
∎
To measure how much and deviate from p-Condorcet, we further extend the axiom.
Definition 5(-Probabilistic Condorcet criterion).
A randomized voting rule satisfies -probabilistic Condorcet criterion (-p-Condorcet) if for every profile that exists and for all ,
Note that a larger is more desirable, as -p-Condorcet is almost equivalent to the standard Condorcet criterion when . Especially, it reduces to p-Condorcet when .
For and , the following theorem holds.
Theorem 3.
For any ,
•
satisfies -p-Condorcet;
•
satisfies -p-Condorcet;
•
satisfies -p-Condorcet.
Proof.
Since there is only one profile , the normalization factors in Lemma 1 are not necessarily considered anymore. In other words, we suppose for the sake of simplicity that
First, we prove for . For any , letting , we have
Note that . Then holds for any . Hence
On the other hand, for any , we have
Since is not the Condorcet winner, we have and holds for any . Therefore,
Then, for every , we have
That is, satisfies -p-Condorcet.
Next, we prove for . For any profile , supposing that , we have
Since , for any . Then we have
On the other hand, for any , we have
Since the Condorcet winner of is , and holds for any . Therefore,
As a result,
which means satisfies -p-Condorcet.
Finally, for and any profile , let . Then, for any ,
Since is not the Condorcet winner, we have . Then
which completes the proof.
∎
With Theorem 3, we can obtain a more general version of Proposition 1, of which the proof is shown in the full version.
Proposition 2.
Given , satisfies p-Condorcet when ; satisfies p-Condorcet when .
Proof.
Let be a profile, of which the Condorcet winner exists. First, we prove for . Since , we have
Therefore, for all ,
which means that satisfies p-Condorcet.
Next, we prove for . When , we have
which indicates that for any ,
In other words, satisfies p-Condorcet in this case, which completes the proof.
∎
Notice that both of the LHS of the two inequalities in Proposition 2 are increasing functions of which diverge when . Thus, for any , there must exist some satisfying the inequalities.
Since the upper and lower bounds of the privacy budget can completely be determined by , we use to denote the privacy level. Also, we use the parameter in Definition 4 to denote the level of satisfaction to p-Condorcet, then the tradeoff curves when are shown in Figure 2.
Figure 2: The satisfaction of p-Condorcet with different .
Similar to the Condorcet criterion, our new class of voting rules do not satisfy Pareto efficiency either. Suppose there is an alternative , which is Pareto dominated by in profile , i.e., for all . Then for any and , we have
According to the Definition of LAP, EXP, and RR, for all , which indicates that does not satisfy Pareto efficiency. However, still dominates in another way. Formally, we have the following definition.
Definition 6(Probabilistic Pareto efficiency).
A randomized voting rule satisfies probabilistic Pareto efficiency (p-Pareto) if for each pair of alternatives that holds for all ,
This definition is a relaxation of Pareto efficiency. For our voting rules, the following theorem holds.
Theorem 4.
For any , , , and satisfy p-Pareto.
Proof.
Let be the pair of alternatives that holds for any . Then for any and any such that , we have . Further, we have
(1)
Hence, , for all . Now, we are ready to give the proof.
For , let for every . Then Equation (1) indicates that , i.e., . Hence
For , we have
which means that satisfies p-Pareto.
For , we have
which completes the proof.
∎
Unlike Condorcet and Pareto, the definition of monotonicity, strategyproofness, and participation are related to two distinct profiles. For monotonicity, we use the notion of absolute monotonicity in (Brandl, Brandt, and Stricker 2018).
Intuitively, in Mechanism 1, for any , whenever a voter switches to by lifting simply, will be more likely to defeat any in the one-on-one comparisons. As a consequence, will be more likely to be the winning alternative in our . Formally, the following theorem holds.
Theorem 5.
For any , , , and satisfy a-monotonicity.
Proof.
Let and be two profiles in , such that and is a pushup of in . Then we have, for any . Hence, for ,
which indicates that satisfies a-monotonicity.
For , we have
For , we have
which completes the proof.
∎
For strategyproofness, we use the notion of SD-strategyproofness (Aziz, Brandt, and Brill 2013), which implies the absolute monotonicity. However, the results for our rules are not so positive.
Proposition 3.
, , and do not satisfy SD-strategyproofness.
Proof.
For , let , . Consider the profiles and , where
Then for , we have
•
, and for ;
•
, and for .
Similarly, for , we have
•
, for any ;
•
, for any .
According to Theorem 1, we have
which indicates that
In other word, is not SD-strategyproof.
For , let , . Consider the following profiles:
•
: , and for ;
•
: , and for .
Then for , we have
•
, for ;
•
, and for .
Similarly, for , we have
•
, and for ;
•
, for .
According to Theorem 1, we have
which indicates that
In other word, does not satisfy SD-strategyproofness.
For , considering the same and as , we have
which indicates that
In other word, is not SD-strategyproof. That completes the proof.
∎
Similar to Definition 5, we extend the notion of SD-strategyproofness.
Definition 7(-SD-Strategyproofness).
A voting rule satisfies -SD-strategyproofness (-SD-SP for short) if for all and , such that and ,
Especially, -SD-strategyproofness reduces to the standard SD-strategyproofness when . For our rules, the following theorem holds.
Theorem 6.
For any , , and satisfy -SD-strategyproofness.
Proof.
W.l.o.g., for any neighboring profiles and , we have
Therefore, for any ,
which indicates that satisfies -SD-strategyproofness.
For , we have
Then for any ,
In other words, satisfies -SD-strategyproofness.
Finally, we prove for . For any , we have
Then for any ,
which completes the proof.
∎
Finally, we discuss the participation of our voting rules. We use the notion of lexi-participation, which requires that a participating agent is always no worse off under lexicographical order. In our rules, each participating voter can benefit herself, since the majority margin for any will increase due to her vote. Formally, the following theorem holds.
Theorem 7.
For any , , , and satisfy lexi-participation.
Proof.
Let and be two profiles satisfying . Suppose there is a nonempty set
Let denote the top-ranked alternative in . According to the definition, we have
Then for any , we have
which indicates that . Now, select the top-ranked alternative in , denoted by . Then . Since , we have
Then there must exist some , such that
Noticing that is the top-ranked alternative in , we have , i.e.,
If , there must exist another alternative , such that . Next, if , there will be some … This process will terminate after several rounds, as there are only finite number of alternatives in . That is, there must exists an alternative , such that
In other words, for any that , there exists some , such that . Therefore, satisfies lexi-participation, for all and .
∎
Theorem 7 shows that for any , will not harm any participating voter under lexicographical order. Further more, and satisfy a stronger notion, which is defined as follows.
Definition 8(Strong lexi-participation).
A voting rule satisfies strong lexi-participation if for all that , there exists , such that and for all .
Intuitively, strong lexi-participation ensures that each voter can benefit from her vote, while lexi-participation only ensures that each voter will not be harmed by her vote. For and , the following theorem holds.
Theorem 8.
For any , and satisfy strong lexi-participation.
Proof.
Let be two profiles in , such that . Suppose the top-ranked alternative of is . Then for , we have
which indicates that satisfies strong lexi-participation.
Similarly, for , we have
i.e., satisfies strong lexi-participation.
∎
However, does not satisfy strong lexi-participation, since only one vote may be not able to increase the winning probability of any alternative. For example, consider the profile , where the votes of all voters are exactly the same, . Then for any , we have and . For any that , we have and for any . Then it follows that , for all . As a result, we have
which indicates that does not satisfy strong lexi-participation.
5 Differential Privacy as a Voting Axiom
In Section 4, we explore the tradeoffs between privacy and some voting axioms. In this section, differential privacy is regarded as an axiomatic property of voting rules. The relations between DP and some of the voting axioms are discussed. Our results are summarized in Figure 3.
Figure 3: Relations between -DP and other axioms, where indicates that implies , a solid line between and indicates that are compatible with some condition, and a dash line between and means that are incompatible.
As proved previously, for any , does not satisfy Condorcet criterion under DP. Furthermore, we can prove that they are incompatible.
Proposition 4.
There is no voting rule satisfying Condorcet criterion and -DP for any .
Proof.
Suppose is -DP and satisfy Condorcet criterion. For any profile and alternative , we define the following operation with alternative :
Op: Choose a voter , whose first choice is not , let be its first choice.
Then we will obtain a profile after at most times of operations, such that . Suppose there has been totally times of operations, each time of operation forms a new profile, named i.e.,
Since is -DP, we have
However, the Condorcet criterion indicates that , which follows . Thus, , for any profile and alternative , which contradicts to the definition of randomized voting rule.
∎
Similarly, Pareto efficiency is also incompatible with DP, which indicates that the stronger notions of efficiency, e.g., PC-efficiency and SD-efficiency (Brandt 2017) are all incompatible with DP. Formally, we have the following result.
Proposition 5.
There is no voting rule satisfying Pareto efficiency and -DP for any .
Proof.
Suppose is -DP and satisfy Pareto efficiency. For any profile and alternative , we define the following operation:
Op: Choose a voter , whose last choice is not , let be its last choice.
Then we will obtain a profile after at most times of operations, where each voter’s last choice is . Suppose there has been totally times of operations, each time of operation forms a new profile, named i.e.,
Since is -DP, we have
However, the Pareto efficiency for randomized voting indicates that , as is definitely Pareto dominated in . Thus, , for any profile and alternative , which contradicts to the definition of randomized voting rule.
∎
In fact, the proofs for Propositions 4 and 5 indicate that for any DP voting rule , there is no profile and alternative , such that . To measure the incompatibility between Condorcet criterion and DP, we use the notion of -p-Condorcet. The result is shown as follows.
Proposition 6.
There is no voting rule satisfying -DP and -p-Condorcet with .
Proof.
Let be profiles that ,, , and . Then
Thus, , i.e., .
∎
The SD-strategyproofness is compatible with DP, as the trivial voting rule, i.e., , for all , satisfies SD-strategyproofness and -DP. In fact, DP admits a lower bound of satisfaction to strategyproofness. To be more precise, we use the notion of -SD-strategyproofness.
Then the following proposition holds.
Proposition 7.
Any voting rule satisfying -DP satisfies -SD-strategyproofness.
Proof.
Suppose is a voting rule satisfying -DP, and are profiles differing on only one voter’s ballot. Then, for any and any , DP indicates that
Then we have
which completes the proof.
∎
As is shown in Proposition 7, the satisfaction to strategyproofness increases when decreases. This is quite intuitive, since there is little motivation for an adversary to manipulate the voting process when the outcomes of neighboring datasets are very similar.
6 Conclusion and Future Work
In the paper, we proposed three classes of differentially private Condorcet methods and explored their accuracy-privacy tradeoff and axioms-privacy tradeoff. Further, we investivated the relations between DP and other axioms. For future work, we plan to explore more axioms for randomized voting rules and design new voting rules performing better on satisfaction to the axioms. The design and analysis of differentially private mechanisms for other social choice problems, such as multi-winner elections, fair division, and participatory budgeting, are also promising directions for future work.
References
Apple Inc. (2017)
Apple Inc. 2017.
Differential privacy overview.
Aziz, Brandl, and Brandt (2014)
Aziz, H.; Brandl, F.; and Brandt, F. 2014.
On the incompatibility of efficiency and strategyproofness in
randomized social choice.
In Proceedings of AAAI.
Aziz, Brandl, and Brandt (2015)
Aziz, H.; Brandl, F.; and Brandt, F. 2015.
Universal Pareto dominance and welfare for plausible utility
functions.
Journal of Mathematical Economics, 60: 123–133.
Aziz, Brandt, and Brill (2013)
Aziz, H.; Brandt, F.; and Brill, M. 2013.
On the tradeoff between economic efficiency and strategy proofness in
randomized social choice.
In Proceedings of AAMAS.
Bassily et al. (2013)
Bassily, R.; Groce, A.; Katz, J.; and Smith, A. 2013.
Coupled-worlds privacy: Exploiting adversarial uncertainty in
statistical data privacy.
In Proceedings of FOCS.
Benadè, Gölz, and Procaccia (2019)
Benadè, G.; Gölz, P.; and Procaccia, A. D. 2019.
No stratification without representation.
In Proceedings of EC.
Birrell and Pass (2011)
Birrell, E.; and Pass, R. 2011.
Approximately strategy-proof voting.
In Proceedings of IJCAI.
Brandl, Brandt, and Hofbauer (2015)
Brandl, F.; Brandt, F.; and Hofbauer, J. 2015.
Incentives for Participation and Abstention in Probabilistic Social
Choice.
In Proceedings of AAMAS.
Brandl, Brandt, and Hofbauer (2019)
Brandl, F.; Brandt, F.; and Hofbauer, J. 2019.
Welfare maximization entices participation.
Games and Economic Behavior, 114: 308–314.
Brandl, Brandt, and Stricker (2018)
Brandl, F.; Brandt, F.; and Stricker, C. 2018.
An Analytical and Experimental Comparison of Maximal Lottery Schemes.
In Proceedings of IJCAI.
Brandt (2017)
Brandt, F. 2017.
Rolling the Dice: Recent Results in Probabilistic Social Choice.
In Endriss, U., ed., Trends in Computational Social Choice,
chapter 1. AI Access.
Dwork (2006)
Dwork, C. 2006.
Differential Privacy.
In Proceedings of ICALP.
Dwork et al. (2006)
Dwork, C.; Kenthapadi, K.; McSherry, F.; Mironov, I.; and Naor, M. 2006.
Our data, ourselves: Privacy via distributed noise generation.
In Proceedings of Eurocrypt.
Flanigan et al. (2021)
Flanigan, B.; Gölz, P.; Gupta, A.; Hennig, B.; and Procaccia, A. D. 2021.
Fair algorithms for selecting citizens’ assemblies.
Nature, 596(7873): 548–552.
Flanigan et al. (2020)
Flanigan, B.; Gölz, P.; Gupta, A.; and Procaccia, A. D. 2020.
Neutralizing self-selection bias in sampling for sortition.
In Proceedings of NeurlPS.
Gibbard (1977)
Gibbard, A. 1977.
Manipulation of schemes that mix voting with chance.
Econometrica: Journal of the Econometric Society, 45(3):
665–681.
Gross, Anshelevich, and Xia (2017)
Gross, S.; Anshelevich, E.; and Xia, L. 2017.
Vote until two of you agree: Mechanisms with small distortion and
sample complexity.
In Proceedings of AAAI.
Hay, Elagina, and Miklau (2017)
Hay, M.; Elagina, L.; and Miklau, G. 2017.
Differentially private rank aggregation.
In Proceedings of SDM.
Hsu et al. (2016)
Hsu, J.; Huang, Z.; Roth, A.; Roughgarden, T.; and Wu, Z. S. 2016.
Private matchings and allocations.
SIAM Journal on Computing, 45(6): 1953–1984.
Kannan et al. (2018)
Kannan, S.; Morgenstern, J.; Rogers, R.; and Roth, A. 2018.
Private Pareto optimal exchange.
ACM Transactions on Economics and Computation, 6(3-4): 1–25.
Kohli and Laskowski (2018)
Kohli, N.; and Laskowski, P. 2018.
Epsilon voting: Mechanism design for parameter selection in
differential privacy.
In Proceedings of PAC.
Lee (2015)
Lee, D. T. 2015.
Efficient, private, and eps-strategyproof elicitation of tournament
voting rules.
In Proceedings of IJCAI.
Liu et al. (2020)
Liu, A.; Lu, Y.; Xia, L.; and Zikas, V. 2020.
How private are commonly-used voting rules?
In Proceedings of UAI.
Orr (2017)
Orr, A. 2017.
Google’s differential privacy may be better than Apple’s.
the Mac Observer.
Pai and Roth (2013)
Pai, M. M.; and Roth, A. 2013.
Privacy and mechanism design.
ACM SIGecom Exchanges, 12(1): 8–29.
Plott (1976)
Plott, C. R. 1976.
Axiomatic Social Choice Theory: An Overview and Interpretation.
American Journal of Political Science, 20(3): 511–596.
Procaccia (2010)
Procaccia, A. D. 2010.
Can Approximation Circumvent Gibbard-Satterthwaite?
In Proceedings of AAAI.
Shang et al. (2014)
Shang, S.; Wang, T.; Cuff, P.; and Kulkarni, S. R. 2014.
The application of differential privacy for rank aggregation: Privacy
and accuracy.
In Proceedings of FUSION.
Torra (2019)
Torra, V. 2019.
Random dictatorship for privacy-preserving social choice.
International Journal of Information Security, 19(4): 1–9.
Walsh and Xia (2012)
Walsh, T.; and Xia, L. 2012.
Lot-based voting rules.
In Proceedings of AAMAS.
Xiao (2013)
Xiao, D. 2013.
Is privacy compatible with truthfulness?
In Proceedings of ITCS.
Yan, Li, and Liu (2020)
Yan, Z.; Li, G.; and Liu, J. 2020.
Private rank aggregation under local differential privacy.
International Journal of Intelligent Systems, 35(1):
1492–1519.