Control by Deleting Candidates
- Control by Deleting Candidates is a framework where an external agent removes up to k candidates to sway election outcomes.
- The method distinguishes between constructive and destructive control, with many voting systems exhibiting NP-hard or W[2]-hard resistance to such manipulations.
- Empirical studies show that while worst-case complexity is high, practical heuristics can enable feasible manipulation in moderate-sized, real-world elections.
Control by deleting candidates is a central paradigm in computational social choice, capturing manipulative actions that alter an election’s candidate pool to change the outcome. Under this framework, an external agent (“the chair”) strategically removes up to candidates from an election to either ensure that a distinguished candidate wins (constructive control) or prevent that candidate from winning (destructive control). The complexity analysis of such control actions has proved essential for understanding the robustness, security, and strategic vulnerability of various voting systems.
1. Formal Definitions and Core Variants
For voting systems where the candidate set is finite, let denote an election with candidate set and voter multiset or list . Given a distinguished candidate , and an integer , two canonical control problems are defined:
- Constructive Control by Deleting Candidates (CCDC):
Is there a set , such that in the reduced election , is the unique winner?
- Destructive Control by Deleting Candidates (DCDC):
Is there a set , such that in , is not the unique winner?
The specification of “unique winner” is critical for most theoretical analyses and greatly impacts complexity (Erdélyi et al., 2011).
2. Complexity Landscape across Voting Rules
Candidate-deletion control is widely used to measure the “resistance” of voting systems—i.e., whether realizing a manipulation is computationally hard. A rule is called resistant to a control type if the corresponding decision problem is NP-hard (susceptible and intractable).
- Plurality, Bucklin, Fallback, Borda, SP-AV: All show NP-hardness (i.e., resistance) for both constructive and destructive candidate deletion (Erdélyi et al., 2011, Erdélyi et al., 2010, Erdélyi et al., 2010, 0806.0535, Zhou et al., 2024).
- Schulze Rule: CCDC is NP-complete, but destructive candidate deletion (Schulze-DCDC) is polynomial-time solvable (Maushagen et al., 2024).
- Ranked Pairs: Both CCDC and DCDC are NP-complete (Maushagen et al., 2024).
- Participatory Budgeting (PB): For advanced PB rules (Phrágmen, Equal-Shares), CCDC is NP-complete, while for GreedyAV and GreedyCost, tractability depends on cost encoding (Faliszewski et al., 23 Jan 2026).
- Amendment/Successive Procedures: Control by deleting candidates is polynomial-time solvable for amendment () and full-amendment () rules, while successive and generalized -amendment become W[1]-hard with certain parameters (solution size, number of undeleted candidates) (Yang, 1 Jan 2025).
- Counting Variants: For Plurality and -Approval, the counting version (#CCDC)—finding the number of deletion sets yielding a given winner—is #P-complete on unrestricted ballots (Wojtas et al., 2014).
| System/Scenario | Constructive CCDC | Destructive DCDC |
|---|---|---|
| Bucklin, Fallback, Borda, SP-AV | NP-hard, often W[2]-hard | NP-hard, often W[2]-hard |
| Schulze | NP-complete | Polynomial (in P) |
| Ranked Pairs | NP-complete | NP-complete |
| PB (Phrágmen, ES, most Greedy) | NP-complete | NP-complete |
Context: NP-hardness proofs typically use reductions from Hitting Set, Dominating Set, or Exact Cover problems. Parameterized complexity, such as W[2]- or W[1]-hardness for deletion-budget or number of voters , is prevalent and provides a more nuanced picture for small or structured elections (Erdélyi et al., 2011, Zhou et al., 2024, Chen et al., 2014).
3. Methodologies: Reductions and Algorithms
Most resistance results are established via reductions:
- Bucklin and Fallback Voting: Reductions from k-Dominating Set or Hitting Set produce instances where successfully controlling the election is equivalent to finding a dominating set of specified size (Erdélyi et al., 2011, Erdélyi et al., 2010, Erdélyi et al., 2010).
- SP-AV: Reductions from Hitting Set, with sophisticated “coercion” mechanisms to maintain vote admissibility after candidate deletion (0806.0535).
- Borda: Gadget-based reductions from Dominating Set ensure only deletion sets corresponding to dominating sets can make the distinguished candidate win (Zhou et al., 2024).
- Schulze: A corrected 3SAT-based construction that maps clause satisfaction to candidate deletions, leveraging McGarvey’s trick in the Weighted Majority Graph (Maushagen et al., 2024).
- PB Rules: Encodings use set/project analogues, approval ballots, and budget constraints to simulate RX3C, with GreedyAV/GreedyCost algorithms exhibiting polynomial-time solutions if costs are in unary (Faliszewski et al., 23 Jan 2026).
Common sophisticated proof constructs include group voting blocks, ballot coercion mechanisms, and path-preserving vertex cuts in majority graphs (for Schulze). Parameterized reductions are essential for obtaining W[2]- or W[1]-hardness (Erdélyi et al., 2010, Zhou et al., 2024, Chen et al., 2014, Yang, 1 Jan 2025).
Algorithmic methodologies are either exhaustive (brute-force search over candidate subsets, dynamic programming on vote profiles) or rely on combinatorial preordering and pruning. For rules where winner computation is in polynomial time, feasible algorithms exist for small or , or in combinatorial settings with limited candidate bundling (Chen et al., 2014).
4. Theoretical Insights and Parameterized Complexity
A major finding is that resistance is prevalent across most natural voting systems with polynomial-time winner determination. However, parameterized analyses reveal subtle exceptions:
- W[2]-Hardness: Bucklin, fallback, and Borda CCDC are W[2]-hard when parameterized by deletion limit (Erdélyi et al., 2011, Erdélyi et al., 2010, Zhou et al., 2024).
- W[1]-Hardness by Voter Number: Borda, -Approval, Copeland, and combinatorial CCDC are W[1]-hard for parameter (number of voters), even if suffices for intractability (Chen et al., 2014).
- FPT Regimes: Plurality and maximin rules admit polynomial-time or FPT algorithms for voter-parameterized CCDC (Chen et al., 2014).
- Special Cases: For amendment and full-amendment procedures, polynomial-time algorithms exist regardless of ; for successive procedures, W[1]-hardness holds unless deletions focus only on ’s agenda successors (Yang, 1 Jan 2025).
- Top-truncated Voting: Borda CCDC with truncated votes () is NP-hard and W[2]-hard for ; only (single nominee) admits an efficient solution (Zhou et al., 2024).
5. Empirical Results and Practical Tractability
Experimental investigations reveal that although worst-case CCDC is NP-hard, practical tractability is observed in moderately sized random elections:
- Experimental Success Rates: In Impartial Culture models, constructive CCDC succeeds in 30–50% for ; destructive CCDC success rates approach 90% (Rothe et al., 2012).
- Computational Cost: Even for up to 128, per-instance running times are sub-second for plurality, with Bucklin and fallback taking longer for negative instances (Rothe et al., 2012).
- No Sharp Phase Transition: Success-rate curves and cost distributions show monotonic increases without a “critical regime” of computational intractability (Rothe et al., 2012).
- Practical Heuristics: Depth-first search with pruning, candidate harm preordering, and dynamic-programming implementations facilitate feasible manipulations in practice, despite theoretical resistance (Rothe et al., 2012).
A plausible implication is that the nominal computational complexity barrier is “diffuse” in realistic settings and concentrated only in adversarially constructed instances.
6. Applications and Extensions
Candidate deletion control is not only a theoretical device but serves as an evaluative metric in participatory budgeting (PB), especially for assessing the strength of losing projects:
- PB Strength Measures: Deletion-based scores, minimum-deletion distances, and rivalry heat-maps quantify how “close” a project was to winning, and how budgetary competition structures outcomes (Faliszewski et al., 23 Jan 2026).
- Probability Analyses: Winning probabilities under random deletions, and correlation with bribery-style measures, reveal orthogonal aspects of project performance (Faliszewski et al., 23 Jan 2026).
- Combinatorial Control: Bundled candidate deletion (where deleting one candidate forces removal of a group) is significantly harder unless committee/voter sizes are extremely small (Chen et al., 2014).
A plausible implication is that control by deleting candidates, both as an analytic tool and as a manipulation model, offers insights into election security, system robustness, and fine-grained policy evaluation.
7. Comparative Tables, Open Questions, and Future Directions
The following table summarizes resistance status for major rules:
| Voting Rule | Winner Complexity | CCDC Resistance | DCDC Resistance | Parameterized Hardness (budget ) |
|---|---|---|---|---|
| Bucklin/Fallback | P | NP-hard | NP-hard | W[2]-hard |
| Borda | P | NP-hard | NP-hard | W[2]-hard |
| SP-AV | P | NP-hard | NP-hard | NP-hard |
| Plurality | P | NP-hard | NP-hard | FPT in |
| Schulze | P | NP-hard | P | |
| Ranked Pairs | P | NP-hard | NP-hard | |
| PB Advanced Rules | P | NP-hard | NP-hard |
Editor’s term: “parameterized candidate-deletion control (pCCDC)” refers to the paradigm analyzing complexity in terms of , , or other instance parameters.
Open questions and future research directions include the complexity landscape for multimode control combinations, empirical evaluation on alternative vote models, and combinatorial extensions in real-world settings (Yang, 1 Jan 2025, Faliszewski et al., 23 Jan 2026).