Abstract
Path-disruption games, recently introduced by Bachrach and Porat, are coalitional games played on graphs where one or multiple adversaries each seeks to reach a given target vertex from a given source vertex, while a coalition of agents seeks to prevent that from happening by blocking every path from the source to the target for each adversary. These coalitional games model, for instance, security issues in computer networks. Inspired by bribery in voting, we introduce the notion of bribery for path-disruption games. We analyze the question of how hard it is to decide whether the adversaries can bribe some of the agents such that no coalition will form that blocks all paths for them. We show that this problem is NP-complete for a single adversary and complete for \({\Sigma }^{\mathrm {P}}_{2} = \text {NP}^{\text {NP}}\), the second level of the polynomial hierarchy, for the case of multiple adversaries. We also expand the model by allowing uncertainty about the targets: In probabilistic path-disruption games, we assign to each vertex the probability that an adversary wants to reach it, and we study the complexity of problems related to common solution concepts (such as the core and the ε-core) and other properties of such games.
Similar content being viewed by others
Notes
Two players i and j in a coalitional game G = (N, v) are said to be symmetric if for all coalitions \(C \subseteq N \smallsetminus \{i,j\}\), we have v(C ∪ {i}) = v(C ∪ {j}).
MCVC, a decision problem mentioned by Bachrach and Porat [5], is defined as follows: Given a graph G = (U, E), m vertex pairs (s j , t j ), 1 ≤ j ≤ m, a weight function \(w:U\to \mathbb {Q}_{\geq 0}\), and a bound \(K\in \mathbb {Q}_{\geq 0}\), does there exist a subset U ′⊆U such that \({\sum }_{u\in U^{\prime }} w(u)\leq K\) and the induced subgraph \(G|_{U\smallsetminus U^{\prime }}\) contains no path linking a pair (s j , t j ), 1 ≤ j ≤ m? It is known that MCVC belongs to P for problem instances with m < 3, yet is NP-complete for problem instances with m ≥ 3. The related optimization problem for m < 3 can be solved in polynomial time using the same algorithm as the decision problem with a corresponding output (see also Dahlhaus et al. [18]).
By “possible target” we mean each vertex that has a positive probability of being a target.
References
Alon, N., Awerbuch, B., Azar, Y., Buchbinder, N., Noar, J.: A general approach to online network optimization problems. ACM Transactions on Algorithms 2(4), 640–660 (2006)
Aziz, H., Savani, R.: Hedonic games. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. (eds.) Handbook of Computational Social Choice, chap 15. To appear. Cambridge University Press, Cambridge (2016)
Aziz, H., Sørensen, T.: Path coalitional games. Tech. Rep. arXiv:1103.3310v2 [cs.GT], ACM Computing Research Repository (CoRR) (2011)
Aziz, H., Bachrach, Y., Elkind, E., Paterson, M.: False-name manipulations in weighted voting games. J. Artif. Intell. Res. 40, 57–93 (2011)
Bachrach, Y., Porat, E.: Path-disruption games. In: Proceedings of the 9th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 1123–1130 (2010)
Bachrach, Y., Rosenschein, J.: Computing the Banzhaf power index in network flow games. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 323–329 (2007)
Bachrach, Y., Rosenschein, J.: Power in threshold network flow games. Journal of Autonomous Agents and Multi-Agent Systems 18(1), 106–132 (2009)
Bachrach, Y., Shah, N.: Reliability weighted voting games. In: Proceedings of the 6th International Symposium on Algorithmic Game Theory, Lecture Notes in Computer Science #8146, pp 38–49. Springer, Berlin Heidelberg New York (2013)
Bachrach, Y., Elkind, E., Meir, R., Pasechnik, D., Zuckerman, M., Rothe, J., Rosenschein, J.: The cost of stability in coalitional games. In: Proceedings of the 2nd International Symposium on Algorithmic Game Theory, Lecture Notes in Computer Science #5814, pp 122–134. Springer, Berlin Heidelberg New York (2009)
Bachrach, Y., Meir, R., Feldman, M., Tennenholtz, M.: Solving cooperative reliability games. In: Proceedings of the 27th Conference on Uncertainty in Artificial Intelligence, pp 27–34. AUAI Press (2011)
Baumeister, D., Rothe, J.: Preference aggregation by voting. In: Rothe, J. (ed.) Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap 4, pp 197–325. Springer, Berlin Heidelberg New York (2015)
Baumeister, D., Faliszewski, P., Lang, J., Rothe, J.: Campaigns for lazy voters: Truncated ballots. In: Proceedings of the 11th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 577–584 (2012)
Baumeister, D., Erdélyi, G., Erdélyi, O., Rothe, J.: Complexity of manipulation and bribery in judgment aggregation for uniform premise-based quota rules. Math. Soc. Sci. 76, 19–30 (2015)
Baumeister, D., Erdélyi, G., Rothe, J.: Judgment aggregation. In: Rothe, J. (ed.) Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap 6, pp 361–391. Springer, Berlin Heidelberg New York (2015)
Brandt, F., Conitzer, V., Endriss, U.: Computational Social Choice. In: Weiß, G. (ed.) Multiagent Systems. 2nd edn., pp 213–283. MIT Press, Cambridge (2013)
Brandt, F., Conitzer, V., Endriss. U., Lang, J., Procaccia, A. (eds.): Handbook of Computational Social Choice. Cambridge University Press, Cambridge (2016). To appear
Chalkiadakis, G., Elkind, E., Wooldridge, M.: Computational Aspects of Cooperative Game Theory. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan and Claypool (2011)
Dahlhaus, E., Johnson, D., Papadimitriou, C., Seymour, P., Yannakakis, M.: The complexity of mulititerminal cuts. SIAM J. Comput. 23(4), 864–894 (1994)
Dimitrov, D., Borm, P., Hendrickx, R., Sung, S.: Simple priorities and core stability in hedonic games. Soc. Choice Welf. 26(2), 421–433 (2006)
Dubey, P., Shapley, L.: Mathematical properties of the Banzhaf power index. Math. Oper. Res. 4(2), 99–131 (1979)
Elkind, E, Rothe, J: Cooperative game theory. In: Rothe, J. (ed.) Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap 3, pp 135–193. Springer, Berlin Heidelberg New York (2015)
Elkind, E., Goldberg, L., Goldberg, P., Wooldridge, M.: Computational complexity of weighted threshold games. In: Proceedings of the 22nd AAAI Conference on Artificial Intelligence, pp 718–723. AAAI Press (2007)
Elkind, E., Faliszewski, P., Slinko, A.: Swap bribery. In: Proceedings of the 2nd International Symposium on Algorithmic Game Theory, Lecture Notes in Computer Science #5814, pp 299–310. Springer, Berlin Heidelberg New York (2009)
Endriss, U.: Judgment aggregation. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. (eds.) Handbook of Computational Social Choice. To appear. Cambridge University Press, chap 17, Cambridge (2016)
Endriss, U., Grandi, U., Porello, D.: Complexity of judgment aggregation. J. Artif. Intell. Res. 45, 481–514 (2012)
Faliszewski, P., Rothe, J.: Control and bribery in voting. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. (eds.) Handbook of Computational Social Choice, chap 7. To appear. Cambridge University Press, Cambridge (2016)
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.: How hard is bribery in elections? J. Artif. Intell. Res. 35, 485–532 (2009)
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L., Rothe, J.: Llull and Copeland voting computationally resist bribery and constructive control. J. Artif. Intell. Res. 35, 275–341 (2009)
Faliszewski, P., Reisch, Y., Rothe, J., Schend, L.: Complexity of manipulation, bribery, and campaign management in Bucklin and fallback voting. Journal of Autonomous Agents and Multi-Agent Systems 29(6), 1091–1124 (2015)
Faliszewski, P., Rothe, I., Rothe, J.: Noncooperative game theory. In: Rothe, J. (ed.) Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap 2, pp 41–134. Springer, Berlin Heidelberg New York (2015)
Hespanha, J., Kim, H., Sastry, S.: Multiple-agent probabilistic pursuit-evasion games. In: Proceedings of the 38th IEEE Conference on Decision and Control, pp 2432–2437. IEEE Computer Society Press, Los Alamitos (1999)
Jain, M., Korzhyk, D., Vaněk, O., Conitzer, V., Pěchouček, M., Tambe, M.: A double oracle algorithm for zero-sum security games on graphs. In: Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 327–334 (2011)
Jones, N.: Space-bounded reducibility among combinatorial problems. J. Comput. Syst. Sci. 11, 68–75 (1975)
Karp, R.: Reducibility among combinatorial problems. In: Miller, R., Thatcher, J. (eds.) Complexity of Computer Computations, pp 85–103. Plenum, New York (1972)
Li, X., Mao, Y.: A survey on the generalized connectiviy of graphs. Tech. Rep. arXiv:1207.1838v2 [math.CO], ACM Computing Research Repository (CoRR) (2014)
Marple, A., Rey, A., Rothe, J.: Bribery in multiple-adversary path-disruption games is hard for the second level of the polynomial hierarchy (extended abstract). In: Proceedings of the 13th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 1375–1376 (2014)
Maschler, M., Peleg, B., Shapley, L.: Geometric properties of the kernel, nucleolus, and related solution concepts. Math. Oper. Res. 4(4), 303–338 (1979)
Meyer, A., Stockmeyer, L.: The equivalence problem for regular expressions with squaring requires exponential space. In: Proceedings of the 13th IEEE Symposium on Switching and Automata Theory, pp 125–129. IEEE Computer Society Press, Los Alamitos (1972)
von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)
Nisan, N., Roughgarden, T., Tardos, É., Vazirani, V. (eds.): Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)
Osborne, M., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)
Papadimitriou, C.: Computational Complexity. Addison-Wesley, Reading (1994)
Peleg, B., Sudhölter, P.: Introduction to the Theory of Cooperative Games. Kluwer, Norwell (2003)
Peters, D.: \({\Sigma }_{2}^p\)-complete problems on hedonic games. Tech. Rep. arXiv:1509.02333v1 [cs.GT], ACM Computing Research Repository (CoRR) (2015)
Rey, A., Rothe, J.: Complexity of merging and splitting for the probabilistic Banzhaf power index in weighted voting games. In: Proceedings of the 19th European Conference on Artificial Intelligence, pp 1021–1022. IOS Press, Amsterdam (2010)
Rey, A., Rothe, J.: Merging and splitting for power indices in weighted voting games and network flow games on hypergraphs. In: Proceedings of the 5th European Starting AI Researcher Symposium, pp 277–289. IOS Press, Amsterdam (2010)
Rey, A., Rothe, J.: Bribery in path-disruption games. In: Proceedings of the 2nd International Conference on Algorithmic Decision Theory, Lecture Notes in Artificial Intelligence #6992, pp 247–261. Springer, Berlin Heidelberg New York (2011)
Rey, A., Rothe, J.: Probabilistic path-disruption games. In: Proceedings of the 20th European Conference on Artificial Intelligence, IOS Press, pp. 923–924, an extended version appears in the proceedings of the 6th European Starting AI Researcher Symposium, pp 264–269. IOS Press, Amsterdam (2012)
Rey, A., Rothe, J.: False-name manipulation in weighted voting games is hard for probabilistic polynomial time. J. Artif. Intell. Res. 50, 573–601 (2014)
Rey, A., Rothe, J., Schadrack, H., Schend, L.: Toward the complexity of the existence of wonderfully stable partitions and strictly core stable coalition structures in hedonic games. In: Proceedings of the 11th Conference on Logic and the Foundations of Game and Decision Theory (2014)
Rey, A., Rothe, J., Schadrack, H., Schend, L.: Toward the complexity of the existence of wonderfully stable partitions and strictly core stable coalition structures in enemy-oriented hedonic games. Annals of Mathematics and Artificial Intelligence (to appear)
Rothe, J.: Complexity Theory and Cryptology. An Introduction to Cryptocomplexity. EATCS Texts in Theoretical Computer Science. Springer (2005)
Rothe, J. (ed.): Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division. Springer Texts in Business and Economics. Springer, Berlin Heidelberg New York (2015)
Rothe, J., Schend, L.: Challenges to complexity shields that are supposed to protect elections against manipulation and control: A survey. Ann. Math. Artif. Intell. 68(1–3), 161–193 (2013)
Savitch, W.: Maze recognizing automata and nondeterministic tape complexity. J. Comput. Syst. Sci. 7(4), 389–403 (1973)
Schlotter, I., Faliszewski, P., Elkind, E.: Campaign management under approval-driven voting rules. In: Proceedings of the 25th AAAI Conference on Artificial Intelligence, pp 726–731. AAAI Press (2011)
Shapley, L.: Cores of convex games. Int. J. Game Theory 1(1), 11–26 (1971)
Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2009)
Smith, J., Lim, C.: Algorithms for network interdiction and fortification games. In: Cinchuluun, A., Pardalos, P., Migdalas, A., Pitsoulis, L. (eds.) Pareto Optimality, Game Theory and Equilibria, pp 609–644. Springer (2008)
Stockmeyer, L.: The polynomial-time hierarchy. Theor. Comput. Sci. 3(1), 1–22 (1976)
Sung, S, Dimitrov, D.: Computational complexity in additive hedonic games. Eur. J. Oper. Res. 203(3), 635–639 (2010)
Washburn, A., Wood, K.: Two-person zero-sum games for network interdiction. Oper. Res. 43(2), 243–251 (1995)
Woeginger, G.: Coalitions in Hedonic Games. Invited talk at COMSOC’12. Kraków, Poland (2012)
Woeginger, G: Core stability in hedonic coalition formation. In: Proceedings of the 39th International Conference on Current Trends in Theory and Practice of Computer Science, Lecture Notes in Computer Science #7741, pp 33–50. Springer, Berlin Heidelberg New York (2013)
Woeginger, G.: A hardness result for core stability in additive hedonic games. Math. Soc. Sci. 65(2), 101–104 (2013)
Wrathall, C.: Complete sets and the polynomial-time hierarchy. Theor. Comput. Sci. 3, 23–33 (1977)
Yin, Z., Jain, M., Tambe, M., Ordóñez, F.: Risk-averse strategies for security games with execution and observational uncertainty. In: Proceedings of the 25th AAAI Conference on Artificial Intelligence, AAAI Press, pp 758–763 (2011)
Acknowledgments
We are grateful to the journal reviewers for their helpful comments, and we also thank the reviewers for the conferences ADT’11, ECAI’12, STAIRS’12, and AAMAS’14 again for their helpful comments on previous versions of parts of this paper. This work was supported in part by Deutsche Forschungsgemeinschaft grants RO 1202/12-1, RO-1202/14-1, and RO-1202/14-2, the European Science Foundation’s EUROCORES program LogICCC, and by COST Action IC1205 on Computational Social Choice. This work was done in part while the second author was visiting Stanford University and University of Rochester, and he thanks the hosts, Yoav Shoham and Lane A. Hemaspaandra, for their warm hospitality.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors declare that they have no conflict of interest.
Additional information
Preliminary versions of parts of this paper appear in the proceedings of the 2nd International Conference on Algorithmic Decision Theory (ADT’11) [47], the 20th European Conference on Artificial Intelligence (ECAI’12) and the 6th European Starting AI Researcher Symposium (STAIRS’12) [48], and the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS’14) [36].
Rights and permissions
About this article
Cite this article
Rey, A., Rothe, J. & Marple, A. Path-Disruption Games: Bribery and a Probabilistic Model. Theory Comput Syst 60, 222–252 (2017). https://doi.org/10.1007/s00224-016-9669-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00224-016-9669-1