Skip to main content
Log in

Path-Disruption Games: Bribery and a Probabilistic Model

  • Published:
Theory of Computing Systems Aims and scope Submit manuscript

Abstract

Path-disruption games, recently introduced by Bachrach and Porat, are coalitional games played on graphs where one or multiple adversaries each seeks to reach a given target vertex from a given source vertex, while a coalition of agents seeks to prevent that from happening by blocking every path from the source to the target for each adversary. These coalitional games model, for instance, security issues in computer networks. Inspired by bribery in voting, we introduce the notion of bribery for path-disruption games. We analyze the question of how hard it is to decide whether the adversaries can bribe some of the agents such that no coalition will form that blocks all paths for them. We show that this problem is NP-complete for a single adversary and complete for \({\Sigma }^{\mathrm {P}}_{2} = \text {NP}^{\text {NP}}\), the second level of the polynomial hierarchy, for the case of multiple adversaries. We also expand the model by allowing uncertainty about the targets: In probabilistic path-disruption games, we assign to each vertex the probability that an adversary wants to reach it, and we study the complexity of problems related to common solution concepts (such as the core and the ε-core) and other properties of such games.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. Two players i and j in a coalitional game G = (N, v) are said to be symmetric if for all coalitions \(C \subseteq N \smallsetminus \{i,j\}\), we have v(C ∪ {i}) = v(C ∪ {j}).

  2. MCVC, a decision problem mentioned by Bachrach and Porat [5], is defined as follows: Given a graph G = (U, E), m vertex pairs (s j , t j ), 1 ≤ jm, a weight function \(w:U\to \mathbb {Q}_{\geq 0}\), and a bound \(K\in \mathbb {Q}_{\geq 0}\), does there exist a subset U U such that \({\sum }_{u\in U^{\prime }} w(u)\leq K\) and the induced subgraph \(G|_{U\smallsetminus U^{\prime }}\) contains no path linking a pair (s j , t j ), 1 ≤ jm? It is known that MCVC belongs to P for problem instances with m < 3, yet is NP-complete for problem instances with m ≥ 3. The related optimization problem for m < 3 can be solved in polynomial time using the same algorithm as the decision problem with a corresponding output (see also Dahlhaus et al. [18]).

  3. By “possible target” we mean each vertex that has a positive probability of being a target.

References

  1. Alon, N., Awerbuch, B., Azar, Y., Buchbinder, N., Noar, J.: A general approach to online network optimization problems. ACM Transactions on Algorithms 2(4), 640–660 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  2. Aziz, H., Savani, R.: Hedonic games. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. (eds.) Handbook of Computational Social Choice, chap 15. To appear. Cambridge University Press, Cambridge (2016)

    Google Scholar 

  3. Aziz, H., Sørensen, T.: Path coalitional games. Tech. Rep. arXiv:1103.3310v2 [cs.GT], ACM Computing Research Repository (CoRR) (2011)

  4. Aziz, H., Bachrach, Y., Elkind, E., Paterson, M.: False-name manipulations in weighted voting games. J. Artif. Intell. Res. 40, 57–93 (2011)

    MathSciNet  MATH  Google Scholar 

  5. Bachrach, Y., Porat, E.: Path-disruption games. In: Proceedings of the 9th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 1123–1130 (2010)

  6. Bachrach, Y., Rosenschein, J.: Computing the Banzhaf power index in network flow games. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 323–329 (2007)

  7. Bachrach, Y., Rosenschein, J.: Power in threshold network flow games. Journal of Autonomous Agents and Multi-Agent Systems 18(1), 106–132 (2009)

    Article  Google Scholar 

  8. Bachrach, Y., Shah, N.: Reliability weighted voting games. In: Proceedings of the 6th International Symposium on Algorithmic Game Theory, Lecture Notes in Computer Science #8146, pp 38–49. Springer, Berlin Heidelberg New York (2013)

    Chapter  Google Scholar 

  9. Bachrach, Y., Elkind, E., Meir, R., Pasechnik, D., Zuckerman, M., Rothe, J., Rosenschein, J.: The cost of stability in coalitional games. In: Proceedings of the 2nd International Symposium on Algorithmic Game Theory, Lecture Notes in Computer Science #5814, pp 122–134. Springer, Berlin Heidelberg New York (2009)

    Chapter  Google Scholar 

  10. Bachrach, Y., Meir, R., Feldman, M., Tennenholtz, M.: Solving cooperative reliability games. In: Proceedings of the 27th Conference on Uncertainty in Artificial Intelligence, pp 27–34. AUAI Press (2011)

  11. Baumeister, D., Rothe, J.: Preference aggregation by voting. In: Rothe, J. (ed.) Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap 4, pp 197–325. Springer, Berlin Heidelberg New York (2015)

    Google Scholar 

  12. Baumeister, D., Faliszewski, P., Lang, J., Rothe, J.: Campaigns for lazy voters: Truncated ballots. In: Proceedings of the 11th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 577–584 (2012)

  13. Baumeister, D., Erdélyi, G., Erdélyi, O., Rothe, J.: Complexity of manipulation and bribery in judgment aggregation for uniform premise-based quota rules. Math. Soc. Sci. 76, 19–30 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  14. Baumeister, D., Erdélyi, G., Rothe, J.: Judgment aggregation. In: Rothe, J. (ed.) Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap 6, pp 361–391. Springer, Berlin Heidelberg New York (2015)

    Google Scholar 

  15. Brandt, F., Conitzer, V., Endriss, U.: Computational Social Choice. In: Weiß, G. (ed.) Multiagent Systems. 2nd edn., pp 213–283. MIT Press, Cambridge (2013)

    Google Scholar 

  16. Brandt, F., Conitzer, V., Endriss. U., Lang, J., Procaccia, A. (eds.): Handbook of Computational Social Choice. Cambridge University Press, Cambridge (2016). To appear

    Google Scholar 

  17. Chalkiadakis, G., Elkind, E., Wooldridge, M.: Computational Aspects of Cooperative Game Theory. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan and Claypool (2011)

  18. Dahlhaus, E., Johnson, D., Papadimitriou, C., Seymour, P., Yannakakis, M.: The complexity of mulititerminal cuts. SIAM J. Comput. 23(4), 864–894 (1994)

    Article  MATH  Google Scholar 

  19. Dimitrov, D., Borm, P., Hendrickx, R., Sung, S.: Simple priorities and core stability in hedonic games. Soc. Choice Welf. 26(2), 421–433 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  20. Dubey, P., Shapley, L.: Mathematical properties of the Banzhaf power index. Math. Oper. Res. 4(2), 99–131 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  21. Elkind, E, Rothe, J: Cooperative game theory. In: Rothe, J. (ed.) Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap 3, pp 135–193. Springer, Berlin Heidelberg New York (2015)

    Google Scholar 

  22. Elkind, E., Goldberg, L., Goldberg, P., Wooldridge, M.: Computational complexity of weighted threshold games. In: Proceedings of the 22nd AAAI Conference on Artificial Intelligence, pp 718–723. AAAI Press (2007)

  23. Elkind, E., Faliszewski, P., Slinko, A.: Swap bribery. In: Proceedings of the 2nd International Symposium on Algorithmic Game Theory, Lecture Notes in Computer Science #5814, pp 299–310. Springer, Berlin Heidelberg New York (2009)

    Chapter  Google Scholar 

  24. Endriss, U.: Judgment aggregation. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. (eds.) Handbook of Computational Social Choice. To appear. Cambridge University Press, chap 17, Cambridge (2016)

    Google Scholar 

  25. Endriss, U., Grandi, U., Porello, D.: Complexity of judgment aggregation. J. Artif. Intell. Res. 45, 481–514 (2012)

    MathSciNet  MATH  Google Scholar 

  26. Faliszewski, P., Rothe, J.: Control and bribery in voting. In: Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. (eds.) Handbook of Computational Social Choice, chap 7. To appear. Cambridge University Press, Cambridge (2016)

    Google Scholar 

  27. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.: How hard is bribery in elections? J. Artif. Intell. Res. 35, 485–532 (2009)

    MathSciNet  MATH  Google Scholar 

  28. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L., Rothe, J.: Llull and Copeland voting computationally resist bribery and constructive control. J. Artif. Intell. Res. 35, 275–341 (2009)

    MathSciNet  MATH  Google Scholar 

  29. Faliszewski, P., Reisch, Y., Rothe, J., Schend, L.: Complexity of manipulation, bribery, and campaign management in Bucklin and fallback voting. Journal of Autonomous Agents and Multi-Agent Systems 29(6), 1091–1124 (2015)

    Article  Google Scholar 

  30. Faliszewski, P., Rothe, I., Rothe, J.: Noncooperative game theory. In: Rothe, J. (ed.) Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap 2, pp 41–134. Springer, Berlin Heidelberg New York (2015)

    Google Scholar 

  31. Hespanha, J., Kim, H., Sastry, S.: Multiple-agent probabilistic pursuit-evasion games. In: Proceedings of the 38th IEEE Conference on Decision and Control, pp 2432–2437. IEEE Computer Society Press, Los Alamitos (1999)

    Google Scholar 

  32. Jain, M., Korzhyk, D., Vaněk, O., Conitzer, V., Pěchouček, M., Tambe, M.: A double oracle algorithm for zero-sum security games on graphs. In: Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 327–334 (2011)

  33. Jones, N.: Space-bounded reducibility among combinatorial problems. J. Comput. Syst. Sci. 11, 68–75 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  34. Karp, R.: Reducibility among combinatorial problems. In: Miller, R., Thatcher, J. (eds.) Complexity of Computer Computations, pp 85–103. Plenum, New York (1972)

    Chapter  Google Scholar 

  35. Li, X., Mao, Y.: A survey on the generalized connectiviy of graphs. Tech. Rep. arXiv:1207.1838v2 [math.CO], ACM Computing Research Repository (CoRR) (2014)

  36. Marple, A., Rey, A., Rothe, J.: Bribery in multiple-adversary path-disruption games is hard for the second level of the polynomial hierarchy (extended abstract). In: Proceedings of the 13th International Joint Conference on Autonomous Agents and Multiagent Systems, IFAAMAS, pp 1375–1376 (2014)

  37. Maschler, M., Peleg, B., Shapley, L.: Geometric properties of the kernel, nucleolus, and related solution concepts. Math. Oper. Res. 4(4), 303–338 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  38. Meyer, A., Stockmeyer, L.: The equivalence problem for regular expressions with squaring requires exponential space. In: Proceedings of the 13th IEEE Symposium on Switching and Automata Theory, pp 125–129. IEEE Computer Society Press, Los Alamitos (1972)

    Google Scholar 

  39. von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)

    MATH  Google Scholar 

  40. Nisan, N., Roughgarden, T., Tardos, É., Vazirani, V. (eds.): Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)

    Google Scholar 

  41. Osborne, M., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)

    MATH  Google Scholar 

  42. Papadimitriou, C.: Computational Complexity. Addison-Wesley, Reading (1994)

    MATH  Google Scholar 

  43. Peleg, B., Sudhölter, P.: Introduction to the Theory of Cooperative Games. Kluwer, Norwell (2003)

    Book  MATH  Google Scholar 

  44. Peters, D.: \({\Sigma }_{2}^p\)-complete problems on hedonic games. Tech. Rep. arXiv:1509.02333v1 [cs.GT], ACM Computing Research Repository (CoRR) (2015)

  45. Rey, A., Rothe, J.: Complexity of merging and splitting for the probabilistic Banzhaf power index in weighted voting games. In: Proceedings of the 19th European Conference on Artificial Intelligence, pp 1021–1022. IOS Press, Amsterdam (2010)

    Google Scholar 

  46. Rey, A., Rothe, J.: Merging and splitting for power indices in weighted voting games and network flow games on hypergraphs. In: Proceedings of the 5th European Starting AI Researcher Symposium, pp 277–289. IOS Press, Amsterdam (2010)

    Google Scholar 

  47. Rey, A., Rothe, J.: Bribery in path-disruption games. In: Proceedings of the 2nd International Conference on Algorithmic Decision Theory, Lecture Notes in Artificial Intelligence #6992, pp 247–261. Springer, Berlin Heidelberg New York (2011)

    Chapter  Google Scholar 

  48. Rey, A., Rothe, J.: Probabilistic path-disruption games. In: Proceedings of the 20th European Conference on Artificial Intelligence, IOS Press, pp. 923–924, an extended version appears in the proceedings of the 6th European Starting AI Researcher Symposium, pp 264–269. IOS Press, Amsterdam (2012)

    Google Scholar 

  49. Rey, A., Rothe, J.: False-name manipulation in weighted voting games is hard for probabilistic polynomial time. J. Artif. Intell. Res. 50, 573–601 (2014)

    MathSciNet  MATH  Google Scholar 

  50. Rey, A., Rothe, J., Schadrack, H., Schend, L.: Toward the complexity of the existence of wonderfully stable partitions and strictly core stable coalition structures in hedonic games. In: Proceedings of the 11th Conference on Logic and the Foundations of Game and Decision Theory (2014)

  51. Rey, A., Rothe, J., Schadrack, H., Schend, L.: Toward the complexity of the existence of wonderfully stable partitions and strictly core stable coalition structures in enemy-oriented hedonic games. Annals of Mathematics and Artificial Intelligence (to appear)

  52. Rothe, J.: Complexity Theory and Cryptology. An Introduction to Cryptocomplexity. EATCS Texts in Theoretical Computer Science. Springer (2005)

  53. Rothe, J. (ed.): Economics and Computation. An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division. Springer Texts in Business and Economics. Springer, Berlin Heidelberg New York (2015)

    Google Scholar 

  54. Rothe, J., Schend, L.: Challenges to complexity shields that are supposed to protect elections against manipulation and control: A survey. Ann. Math. Artif. Intell. 68(1–3), 161–193 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  55. Savitch, W.: Maze recognizing automata and nondeterministic tape complexity. J. Comput. Syst. Sci. 7(4), 389–403 (1973)

    Article  MathSciNet  MATH  Google Scholar 

  56. Schlotter, I., Faliszewski, P., Elkind, E.: Campaign management under approval-driven voting rules. In: Proceedings of the 25th AAAI Conference on Artificial Intelligence, pp 726–731. AAAI Press (2011)

  57. Shapley, L.: Cores of convex games. Int. J. Game Theory 1(1), 11–26 (1971)

    Article  MathSciNet  MATH  Google Scholar 

  58. Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2009)

    MATH  Google Scholar 

  59. Smith, J., Lim, C.: Algorithms for network interdiction and fortification games. In: Cinchuluun, A., Pardalos, P., Migdalas, A., Pitsoulis, L. (eds.) Pareto Optimality, Game Theory and Equilibria, pp 609–644. Springer (2008)

  60. Stockmeyer, L.: The polynomial-time hierarchy. Theor. Comput. Sci. 3(1), 1–22 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  61. Sung, S, Dimitrov, D.: Computational complexity in additive hedonic games. Eur. J. Oper. Res. 203(3), 635–639 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  62. Washburn, A., Wood, K.: Two-person zero-sum games for network interdiction. Oper. Res. 43(2), 243–251 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  63. Woeginger, G.: Coalitions in Hedonic Games. Invited talk at COMSOC’12. Kraków, Poland (2012)

    Google Scholar 

  64. Woeginger, G: Core stability in hedonic coalition formation. In: Proceedings of the 39th International Conference on Current Trends in Theory and Practice of Computer Science, Lecture Notes in Computer Science #7741, pp 33–50. Springer, Berlin Heidelberg New York (2013)

    Google Scholar 

  65. Woeginger, G.: A hardness result for core stability in additive hedonic games. Math. Soc. Sci. 65(2), 101–104 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  66. Wrathall, C.: Complete sets and the polynomial-time hierarchy. Theor. Comput. Sci. 3, 23–33 (1977)

    Article  MathSciNet  MATH  Google Scholar 

  67. Yin, Z., Jain, M., Tambe, M., Ordóñez, F.: Risk-averse strategies for security games with execution and observational uncertainty. In: Proceedings of the 25th AAAI Conference on Artificial Intelligence, AAAI Press, pp 758–763 (2011)

Download references

Acknowledgments

We are grateful to the journal reviewers for their helpful comments, and we also thank the reviewers for the conferences ADT’11, ECAI’12, STAIRS’12, and AAMAS’14 again for their helpful comments on previous versions of parts of this paper. This work was supported in part by Deutsche Forschungsgemeinschaft grants RO 1202/12-1, RO-1202/14-1, and RO-1202/14-2, the European Science Foundation’s EUROCORES program LogICCC, and by COST Action IC1205 on Computational Social Choice. This work was done in part while the second author was visiting Stanford University and University of Rochester, and he thanks the hosts, Yoav Shoham and Lane A. Hemaspaandra, for their warm hospitality.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anja Rey.

Ethics declarations

Conflict of interests

The authors declare that they have no conflict of interest.

Additional information

Preliminary versions of parts of this paper appear in the proceedings of the 2nd International Conference on Algorithmic Decision Theory (ADT’11) [47], the 20th European Conference on Artificial Intelligence (ECAI’12) and the 6th European Starting AI Researcher Symposium (STAIRS’12) [48], and the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS’14) [36].

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rey, A., Rothe, J. & Marple, A. Path-Disruption Games: Bribery and a Probabilistic Model. Theory Comput Syst 60, 222–252 (2017). https://doi.org/10.1007/s00224-016-9669-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00224-016-9669-1

Keywords

Navigation