Approximating Electoral Control Problems
Pith reviewed 2026-05-18 13:43 UTC · model grok-4.3
The pith
Electoral control problems under plurality, approval, and Condorcet are completely classified by their approximability in weighted and unweighted settings.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
We completely determine for each of the standard control problems under plurality, approval, and Condorcet, whether they are approximable, and we prove our results in both the weighted and unweighted voter settings.
What carries the argument
Standard electoral control problems of adding or deleting candidates or voters to ensure a preferred candidate wins, analyzed via polynomial-time approximation ratios.
If this is right
- Control problems shown approximable admit efficient algorithms that find near-optimal sets of additions or deletions.
- Inapproximable problems admit no polynomial-time algorithm with any constant-factor guarantee unless P equals NP.
- The approximability status is established separately and completely for the weighted-voter case where voters carry different strengths.
- These optimization results extend earlier exact decision-complexity classifications for the same three voting rules.
Where Pith is reading between the lines
- Election designers could favor rules where more control actions are inapproximable to raise the bar against realistic attacks.
- The same classification method could be applied to additional rules such as Borda or ranked-choice voting.
- Practical election-monitoring tools might incorporate the approximable cases as models for likely attacker behavior.
- Weighted versus unweighted distinctions suggest that influence distribution among voters affects how hard control attacks are to approximate.
Load-bearing premise
The classification assumes the standard control problems are exactly those previously formalized in the literature as adding or deleting candidates or voters, and that approximability uses usual polynomial-time approximation ratio definitions for NP-hard optimization problems.
What would settle it
Discovery of a polynomial-time approximation algorithm for any control problem the paper classifies as inapproximable, or an inapproximability proof for one classified as approximable, under plurality, approval, or Condorcet would disprove the complete determination.
read the original abstract
Much research in electoral control -- one of the most studied form of electoral attacks, in which an entity running an election alters the structure of that election to yield a preferred outcome -- has focused on giving decision complexity results, e.g., membership in P, NP-completeness, or fixed-parameter tractability. Approximability on the other hand has received little attention in electoral control, despite its prevalence in the study of other forms of electoral attacks, such as manipulation and bribery. Early work established preliminary results about popular voting rules such as plurality, approval, and Condorcet. In this paper, we completely determine for each of the "standard" control problems under plurality, approval, and Condorcet, whether they are approximable, and we prove our results in both the weighted and unweighted voter settings.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper claims to completely classify the approximability status (in the standard sense of polynomial-time approximation ratios for the corresponding optimization problems) of all standard electoral control variants—constructive and destructive control by adding or deleting candidates or voters—under the plurality, approval, and Condorcet voting rules. The classification is provided for both the weighted and unweighted voter models, with explicit approximation algorithms or gap-preserving reductions supplied for each case.
Significance. If the results hold, this work supplies the first exhaustive map of approximability for electoral control, a gap that has persisted despite extensive decision-complexity results in the literature. The dual treatment of weighted and unweighted settings, together with the use of standard approximation-ratio definitions and gap-preserving reductions, makes the classification directly usable for both theoretical follow-up and practical algorithm design in computational social choice.
minor comments (3)
- §3, Definition 2: the formalization of the optimization version of control by deleting voters should explicitly state whether the objective is to minimize the number of deletions or to maximize the margin of victory; the current wording leaves this ambiguous for the approximation guarantee.
- Table 1: the row for 'Condorcet, constructive, add candidates, weighted' lists 'APX-hard' without citing the specific reduction or theorem number that establishes the inapproximability gap.
- §5.2, Algorithm 1: the running-time analysis claims O(n^3) but the pseudocode contains an implicit enumeration over subsets whose size is bounded only by the parameter; clarify whether this is FPT or merely polynomial for fixed weights.
Simulated Author's Rebuttal
We thank the referee for their positive summary of our results and for recommending minor revision. We are pleased that the exhaustive approximability classification for electoral control under plurality, approval, and Condorcet rules (in both weighted and unweighted settings) is viewed as filling a longstanding gap in the literature.
Circularity Check
No significant circularity; results rest on independent reductions and prior definitions
full rationale
The manuscript classifies approximability for each standard electoral control variant (constructive/destructive, add/delete candidates/voters) under plurality, approval, and Condorcet, in weighted and unweighted settings. It supplies explicit polynomial-time approximation algorithms or gap-preserving reductions for each case, drawing on established NP-hardness results and standard approximation-ratio definitions from the literature. No step reduces a claimed result to a fitted parameter, self-citation chain, or definitional equivalence; each approximability status is derived separately via case analysis and external complexity tools. The derivation is therefore self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption Standard definitions of control actions (add/delete candidates/voters) and voting rules (plurality, approval, Condorcet) as used in prior work.
- standard math Polynomial-time approximation ratio is the appropriate measure for these optimization problems.
Reference graph
Works this paper leans on
-
[1]
N. Betzler, R. Bredereck, J. Chen, and R. Niedermeier. Studies in computational aspects of voting--- A parameterized complexity perspective. In The Multivariate Algorithmic Revolution and Beyond , pages 318--363. Springer-Verlag Lecture Notes in Computer Science \#7370 , 2012
work page 2012
- [2]
-
[3]
E. Brelsford, P. Faliszewski, E. Hemaspaandra, H. Schnoor, and I. Schnoor. Approximability of manipulating elections. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence , pages 44--49. AAAI Press, July 2008
work page 2008
-
[4]
P. Bredereck, P. Faliszewski, R. Niedermeier, P. Skowron, and N. Talmon. Mixed integer programming with convex/concave constraints: Fixed-parameter tractability and applications to multicovering and voting. Theoretical Computer Science , 814:86--105, 2020
work page 2020
-
[5]
D. Baumeister and J. Rothe. Preference aggregation by voting. In J. Rothe, editor, Economics and Computation: An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division , pages 233--367. Springer Nature Switzerland, 2024
work page 2024
- [6]
-
[7]
J. Bartholdi , III, C. Tovey, and M. Trick. How hard is it to control an election? Mathematical and Computer Modeling , 16(8--9):27--40, 1992
work page 1992
-
[8]
B. Carleton, M. Chavrimootoo, L. Hemaspaandra, D. Narv\' a ez, C. Taliancich, and H. Welles. Separating and collapsing electoral control types. Journal of Artificial Intelligence Research , 81:71--116, 2024
work page 2024
-
[9]
B. Carleton, M. Chavrimootoo, L. Hemaspaandra, D. Narv\' a ez, C. Taliancich, and H. Welles. Search versus search for collapsing electoral control types. In Proceedings of the 21st European Conference on Multi-Agent Systems , pages 217--236. Springer Lecture Notes in Computer Science \#15685 , 2025
work page 2025
-
[10]
H. Chen, L. Chen, S. Ye, and G. Zhang. On extensions of min- k -union ^ . In Proceedings of the 30th Annual International Computing and Combinatorics Conference , pages 29--41. Springer-Verlag, August 2024
work page 2024
-
[11]
E. Chlamt \'a c , M. Dinitz, and Y. Makarychev. Minimizing the union: Tight approximations for small set bipartite vertex expansion. In Proceedings of the 28th Annual ACM - SIAM Symposium on Discrete Algorithms , pages 881--899. Society for Industrial and Applied Mathematics, January 2017
work page 2017
-
[12]
M. Chavrimootoo, G. Erd\' e lyi, E. Hemaspaandra, L. Hemaspaandra, M. Kotler-Berkowitz, Z. Nie, M. Reidy, and E. Smith. More natural models of electoral control by partition, 2025. In Preparation
work page 2025
- [13]
-
[14]
de Caritat, Marquis de Condorcet
J.-A.-N. de Caritat, Marquis de Condorcet. Essai sur l'Application de L'Analyse \` a la Probabilit\' e des D\' e cisions Rendues \` a la Pluralit\' e des Voix . 1785. Facsimile reprint of original published in Paris, 1972, by the Imprimerie Royale
work page 1972
- [15]
-
[16]
G. Erd\' e lyi, E. Hemaspaandra, and L. Hemaspaandra. More natural models of electoral control by partition. In Proceedings of the 4th International Conference on Algorithmic Decision Theory , pages 396--413. Springer-Verlag Lecture Notes in Artificial Intelligence \#9346 , September 2015
work page 2015
-
[17]
U. Feige. A threshold of n for approximating set cover. Journal of the ACM , 45(4):643--652, 1998
work page 1998
-
[18]
P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. How hard is bribery in elections? Journal of Artificial Intelligence Research , 35:485--532, 2009
work page 2009
-
[19]
P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. Multimode control attacks on elections. Journal of Artificial Intelligence Research , 40:305--351, 2011
work page 2011
-
[20]
P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. Weighted electoral control. Journal of Artificial Intelligence Research , 52:507--542, 2015
work page 2015
-
[21]
P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Llull and Copeland voting computationally resist bribery and constructive control. Journal of Artificial Intelligence Research , 35:275--341, 2009
work page 2009
-
[22]
M. Garey and D. Johnson. Computers and Intractability: A Guide to the Theory of NP -Completeness . W. H. Freeman and Company , 1979
work page 1979
-
[23]
E. Hemaspaandra and L. Hemaspaandra. Dichotomy for voting systems. Journal of Computer and System Sciences , 73(1):73--83, 2007
work page 2007
-
[24]
A. Hassidim, N. Hazon, and O. Keller. Approximating bribery in scoring rules. Proceedings of the 32nd AAAI Conference on Artificial Intelligence , 32, Apr. 2018
work page 2018
-
[25]
A. Hassidim, N. Hazon, and O. Keller. Approximating weighted and priced bribery in scoring rules. Journal of Artificial Intelligence Research , 66:1057--1098, 2019
work page 2019
-
[26]
E. Hemaspaandra, L. Hemaspaandra, and C. Menton. Search versus decision for election manipulation problems. ACM Transactions on Computation Theory , 12(\#1, Article 3):1--42, 2020
work page 2020
-
[27]
E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Anyone but him: The complexity of precluding an alternative. Artificial Intelligence , 171(5--6):255--285, 2007
work page 2007
-
[28]
R. Karp. Reducibility among combinatorial problems. In R. Miller and J. Thatcher, editors, Complexity of Computer Computations , pages 85--103, 1972
work page 1972
-
[29]
S. Kolliopoulos. Approximating covering integer programs with multiplicity constraints. Discrete Applied Mathematics , 129(2):461--473, 2003
work page 2003
-
[30]
S. Kolliopoulos and N. Young. Approximation algorithms for covering/packing integer programs. Journal of Computer and System Sciences , 71(4):495--505, 2005
work page 2005
-
[31]
A. Lin. Solving Hard Problems in Election Systems . PhD thesis, Rochester Institute of Technology, Rochester, NY, 2012
work page 2012
-
[32]
J. Rothe, editor. Economics and Computation: An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division . Springer, 2nd edition, 2024
work page 2024
-
[33]
N. Russel. Complexity of control of Borda count elections. Master's thesis, Rochester Institute of Technology, July 2007
work page 2007
-
[34]
L. Xia. Computing the margin of victory for various voting rules. In Proceedings of the 13th ACM Conference on Electronic Commerce , pages 982--999. ACM Press, June 2012
work page 2012
-
[35]
Y. Yang. Election attacks with few candidates. In Proceedings of the 21st European Conference on Artificial Intelligence , pages 1131--1132. IOS Press, August 2014
work page 2014
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.