Small coalitions cannot manipulate voting

19Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We demonstrate how to make voting protocols resistant against manipulation by computationally bounded malicious voters, by extending the previous results of Conitzer and Sandholm in several important directions: we use one-way functions to close a security loophole that allowed voting officials to exert disproportionate influence on the outcome and show that our hardness results hold against a large fraction of manipulating voters (rather than a single voter). These improvements address important concerns in the field of secure voting systems. We also discuss the limitations of the current approach, showing that it cannot be used to achieve certain very desirable hardness criteria. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Elkind, E., & Lipmaa, H. (2005). Small coalitions cannot manipulate voting. In Lecture Notes in Computer Science (Vol. 3570, pp. 285–297). Springer Verlag. https://doi.org/10.1007/11507840_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free