Abstract 1 Introduction 2 Background 3 Initial Observations 4 Distributed Set and Approximate Preference Aggregation 5 Arrovian Impossibilities in Synchronous and Asynchronous Systems 6 Related Work 7 Conclusion References

Distributed Agreement in the Arrovian Framework

Kenan Wood ORCID Davidson College, NC, USA Hammurabi Mendes ORCID Davidson College, NC, USA Jonad Pulaj ORCID Davidson College, NC, USA
Abstract

Preference aggregation is a fundamental problem in voting theory, in which public input rankings of a set of alternatives (called preferences) must be aggregated into a single preference that satisfies certain soundness properties. The celebrated Arrow Impossibility Theorem is equivalent to a distributed task in a synchronous fault-free system that satisfies properties such as respecting unanimous preferences, maintaining independence of irrelevant alternatives (IIA), and non-dictatorship, along with consensus since only one preference can be decided.

In this work, we study a weaker distributed task in which crash faults are introduced, IIA is not required, and the consensus property is relaxed to either k-set agreement or ϵ-approximate agreement using any metric on the set of preferences. In particular, we prove several novel impossibility results for both of these tasks in both synchronous and asynchronous distributed systems. We additionally show that the impossibility for our ϵ-approximate agreement task using the Kendall tau or Spearman footrule metrics holds under extremely weak assumptions.

Keywords and phrases:
Approximate Agreement, Set Agreement, Preference Aggregation, Voting Theory, Impossibility
Copyright and License:
[Uncaptioned image] © Kenan Wood, Hammurabi Mendes, and Jonad Pulaj; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Distributed algorithms
; Mathematics of computing Discrete mathematics
Editors:
Silvia Bonomi, Letterio Galletta, Etienne Rivière, and Valerio Schiavoni

1 Introduction

Preference aggregation is a classical problem in voting theory where every voter publishes an input vote (e.g. a single most-favorable candidate, a linear ranking of all the candidates, weighted rankings of candidates, etc.) and a typically centralized system aggregates the votes into a single decision outcome, according to some choice rule. Various soundness properties of preference aggregation algorithms are desirable, such as preservation of unanimous votes (unanimity), the notion that the outcome is not totally dictated by a small set of voters (non-dictatorship), and many more [8].

One of the first and most-celebrated fundamental results in voting theory was proved by Kenneth Arrow in 1951 [3]. His theorem considers the preference aggregation problem where input votes and the decision outcomes consist of weak linear rankings of the alternatives (candidates). In addition to unanimity and non-dictatorship, Arrow considered independence of irrelevant alternatives (IIA), which requires that the outcome of the preference aggregation rule with respect to the relative ordering of any two alternatives should only depend on the voters’ initial relative ordering of those two alternatives, and none of the other “irrelevant” pairs. Arrow’s Impossibility Theorem asserts that no deterministic preference aggregation algorithm can satisfy unanimity, non-dictatorship, and IIA simultaneously.

This result has received significant attention from the voting theory community. There are many generalizations of Arrow’s theorem and a plethora of different proofs, including elementary proofs that directly exploit the unanimity and IIA axioms [24], as well as others using more advanced mathematics like algebraic topology [6], and fixpoint methods in metric space topology [41, 17].

There are recent advancements stemming from the methods used in distributed computing that yield better geometric/topological understanding of Arrow’s Impossibility Theorem. Specifically, Lara, Rajsbaum, and Raventós-Pujo [40, 30] use techniques from combinatorial topology to prove a generalization of Arrow’s theorem that sheds light on the result’s geometric and topological structure. In general, combinatorial topology has also been successful in proving a myriad of impossibility and complete characterization results in distributed computing [27, 36, 23, 32].

In this work, we introduce novel distributed tasks that combine aspects from well-studied problems such as set agreement [9, 34, 37, 12, 21, 10] and approximate agreement [33, 35, 20, 38, 2, 31], as well as voting theoretic properties in the Arrovian framework. Specifically, we study two tasks that require unanimity on the correct processes along with either k-set agreement – meaning at most k different preferences are decided – or ϵ-approximate agreement – meaning any two decisions are within a distance ϵ apart, with respect to a specified metric. It is important to observe that the tasks presented here are significantly weaker than a naïve translation of the properties in Arrow’s Impossibility Theorem; both the IIA and non-dictatorship properties are absent from our problem definition, and consensus is weakened to set or approximate agreement. In fact, we show in Section 4 that a natural formulation of generalized non-dictatorship properties is actually implied by unanimity on the correct processes.

The main contributions of this paper are the following.

  1. 1.

    In our main result, Theorem 33, we formally show that under the relatively weak property that there exists some set of input preferences with a variably fine-grained cyclic structure (see Definitions 30 and 31), neither of our Arrovian tasks are solvable for reasonable agreement parameters and sufficiently many alternatives, despite the apparent weakening of consensus.

  2. 2.

    We also prove that for the special cases of ϵ-approximate preference aggregation, when the distances between preferences are measured using the well-established Kendall tau [28, 29] or Spearman footrule [13] metrics, no algorithm exists if ϵ is less than a certain large quantity, expressed in terms of the metric diameter, presented in Definition 7.

  3. 3.

    We present a unified analysis that captures synchronous and asynchronous systems simultaneously, meant intentionally to shed light on the fundamental structural properties of the problem – such as cyclic preference patterns – that cause the impossibility.

The rest of this paper is organized as follows. Section 2 provides the necessary background on relations (Subsection 2.1) and introduces distributed aggregation maps in the context of synchronous fault-free distributed algorithms (Subsection 2.2). In Section 3, we prove some initial observations which are simple generalizations of Arrow’s theorem in the context of distributed aggregation maps. Section 4 formally introduces the intersection of the Arrovian framework and set and approximate agreement tasks discussed above, and proves our remark that a non-dictatorship property is nonrestrictive. The main results of this paper are in Section 5, and specifically, can be found in Theorem 33 and its corollaries.

2 Background

In this section, we present the necessary background on relations, and introduce the notation of a distributed aggregation map and some of its relevant properties. Throughout this paper, we use the following notation: for a positive integer n, let [n]{1,,n}.

2.1 Relations

A relation on a set X is a subset of X×X. If R is a relation we usually write x𝑅y as shorthand for (x,y)R. A relation RX×X is reflexive provided x𝑅x for all xX; it is antisymmetric or strict provided that x𝑅y and y𝑅x imply x=y for all x,yX; R is complete if for every pair x,yX, it follows that x𝑅y or y𝑅x; R is said to be transitive provided that for every x,y,zX, x𝑅y and y𝑅z imply x𝑅z. Given a relation R and elements a,b, we often write aRb for a𝑅b and aRb for a𝑅b but a𝑅b. The strict part of R is defined by

st(R){(a,b)R:b𝑅a},

that is, the pairs in R without equivalence. So, ast(R)b if and only if aRb. If R is any relation on X and YX, we define the restriction of R to Y to be the subrelation R|YR(Y×Y) of R. Similarly, if 𝐑=(R1,,Rn) is a vector of relations on X and YX, we define the restriction 𝐑|Y(R1|Y,,Rn|Y).

The set of all reflexive complete transitive relations, called preferences, on a set X is denoted P(X); the set of all antisymmetric reflexive complete transitive relations, called strict preferences, on X is denoted L(X). A subset of P(X) is called a domain. A profile on X is an element of k=1P(X)k; usually, we consider only profiles in P(X)n or P(X)nt, where n is the number of processes and t is the maximum number of faulty processes.

2.2 Distributed Aggregation Maps

Consider a synchronous distributed message-passing system with n processes {p1,,pn}. In this subsection, we consider only deterministic fault-free models of computation. In particular, we are interested in algorithms of the following type. Let X be a finite set of alternatives (also called candidates) and let WI,WOP(X) be domains of preferences; we denote the size of X by m. Suppose processes take inputs from WI, and after communicating, decide a preference in WO satisfying certain desirable properties of a distributed voting system. Given these assumptions, distributed algorithms where processes have inputs in WI and decide values in WO are completely characterized by functions F:WInWOn. To see this, since such algorithms are fault-free, every process has complete information after only one round of communication, so that the determinism of the algorithm guarantees the given map; the opposite direction is similarly trivial. This motivates the following definition.

Definition 1 (Distributed Aggregation Map).

A distributed aggregation map on an n-process system with input domain WIP(X) and output domain WOP(X) is a map from WIn to WOn.

The properties we are interested in obtaining are characterized in the following definitions. For the rest of this section, let F be an n-process distributed aggregation map with input domain WI and output domain WO.

Definition 2 (Unanimity).

We say that F satisfies unanimity if the following holds: for all a,bX and for all 𝐑WIn such that aRib for all i[n], we have aF(𝐑)ib for all i[n].

Definition 3 (IIA).

The map F satisfies independence of irrelevant alternatives (IIA) if for all a,bX and all 𝐑,𝐒WIn such that 𝐑|{a,b}=𝐒|{a,b}, it follows that F(𝐑)|{a,b}=F(𝐒)|{a,b}.

The following definition of decisiveness is standard terminology in the voting theory community [8], but the motivation is as follows: a set S is decisive if all of the strict rankings between pairs are always dictated by the strict relations of the inputs in S.

Definition 4 (Decisive).

A set S[n] is said to be decisive if S is nonempty and the following holds: for all a,bX and all 𝐑WIn such that a𝐑ib for all iS, it follows that aF(𝐑)jb for all j[n].

Definition 5 (Dictatorship).

If F has a decisive set of size at most k, we say that F is a k-dictatorship or that F is k-dictatorial; if k=1, we say that F is simply a dictatorship or that F is dictatorial.

In this paper, we are interested in set agreement and approximate agreement relaxations of the consensus property that is usually assumed in the Arrovian framework. Given a vector or list v, define set(v) to be the set of entries in v.

Definition 6 (Set Agreement).

If for all 𝐑WIn, we have |set(F(𝐑))|k, then we say that F satisfies k-set agreement. The property of 1-set agreement is called consensus.

Before describing the approximate agreement condition, we introduce some definitions and corresponding notation commonly used throughout this paper.

Definition 7 (Metric Diameter).

If d is a metric on a finite set Y and AY, we define the diameter of A with respect to d by diamd(A)maxx,yAd(x,y). The diameter of a list v of elements of Y is defined to be the diameter of the set of values it contains, and is written diamd(v).

Definition 8 (Approximate Agreement).

If d is a metric on a domain containing WO, then we say that F satisfies ϵ-agreement (for ϵ0) with respect to d if every 𝐑WIn satisfies diamd(F(𝐑))ϵ.

Our main results in Section 5 pay special attention to the following natural metrics [28, 29, 13] on L(X) which are useful measures of distance in the context of approximate agreement. The Kendall tau metric measures the number of pairs of alternatives that differ, while Spearman’s footrule measures that cumulative distance between the ranks of each of the alternatives. These metrics are formally described below.

Definition 9 (Kendall tau).

Define the Kendall tau metric on L(X), denoted 𝙺𝚃, by 𝙺𝚃(R,S)|{(a,b)X×X:aRbbSa}| for all R,SL(X).

Definition 10 (Rank and Spearman’s footrule).

Given RL(X) and aX, define the rank of a in R by rankR(a)|{bX:bRa}|. The Spearman footrule on L(X) is a metric 𝚂𝙵 defined by 𝚂𝙵(R,S)aX|rankR(a)rankS(a)| for all R,SL(X).

The following results with respect to diameter in the Kendall tau or Spearman footrule metrics can be found in [13], but are otherwise easy to prove.

Proposition 11.

If |X|=m, then diam𝙺𝚃(L(X))=m2m2 and diam𝚂𝙵(L(X))=m22.

Since we are interested in distributed analogues to Arrow’s Theorem, we introduce the following definition.

Definition 12.

We say that a domain WP(X) is Arrow-Complete (AC) if every distributed aggregation map on n processes with input domain W and output domain P(X) that satisfies unanimity, IIA, and consensus is dictatorial.

Arrow’s Impossibility Theorem then states the following.

Theorem 13 (Arrow).

If n2 and m3, then P(X) is AC.

In [8], Arrow’s theorem has also been generalized to show that any domain satisfying a certain chain rule is AC if n2 and m3.

3 Initial Observations

In this section, we state and prove our initial observations as a starting point for discussing our main theorem and corollaries in Section 5. In particular, we prove two impossibility results related to distributed aggregation maps when the consensus condition is weakened to either set agreement or approximate agreement. The core of both arguments relies on a simple coordinate-by-coordinate reduction of a distributed aggregation map. Although we find these preliminary results interesting, the main contributions of this paper can be found at the end of Section 5 (see Theorem 33 and its corollaries in Section 5). In particular, our main results are impossibility theorems in fault-prone distributed systems with either synchronous or asynchronous communication between processes.

Proposition 14.

Let k be a positive integer such that k<n and k<|W|, where W is an AC domain. Furthermore, assume there is a set PW of size at least k+1 such that for any two distinct R,RP, there exists a,bX satisfying aRb and bRa. Every distributed aggregation map on W satisfying k-set agreement, unanimity, and IIA is k-dictatorial.

Proposition 15.

Let W be an AC domain that contains some strict preference. Let d be a metric on W. If ϵ<diamd(WL(X)), then every distributed aggregation map on W satisfying ϵ-agreement (with respect to d), unanimity, and IIA is dictatorial.

The key observation underlying the proofs of both of these results is the following lemma. The proof is based on a simple coordinate-by-coordinate reduction from any distributed aggregation map to a distributed aggregation map satisfying consensus. In observing that this reduction preserves unanimity and IIA, we exploit Arrow-Completeness to show that each reduced map is a dictatorship. This shows that every output coordinate is in a sense “dictated” by an input coordinate, which is unique under a very weak condition. It is important to note that we are not claiming to reprove Arrow’s theorem in any way, and instead, we are building on a domain that already satisfies Arrow’s theorem.

Lemma 16.

Suppose W is an AC domain. Let F:WnP(X)n be a distributed aggregation map. Suppose F satisfies unanimity and IIA, and let j[n]. Then we have the following.

  1. 1.

    Then there exists some i[n] such that for all a,bX and 𝐑Wn such that aRib, we have aF(𝐑)jb.

  2. 2.

    If W contains some two preferences R,R and a,bX such that aRb and bRa, then the i above is unique.

Proof.

Construct a map Fj:WnP(X)n by setting Fj(𝐑)=(F(𝐑)j)i[n] for all 𝐑Wn. It is clear Fj satisfies consensus. It is also easy to show that since F satisfies unanimity and IIA, Fj also satisfies unanimity and IIA. Since W is AC, it follows that Fj is dictatorial. Thus (1) follows from the construction of Fj and Definition 4.

To show the second part, suppose i and i be two elements of [n] satisfying the above criteria. Consider a preference profile 𝐑 such that Ri=R and Ri=R, where R and R are defined in the lemma statement. Let a,bX such that aRb and bRa. By the assumption on i and i, we know that aF(𝐑)jb (as Ri=R and i satisfies (1)) and bF(𝐑)ja (as Ri=R and i satisfies (1)), which is a contradiction. Thus (2) follows.

We are now ready to prove Proposition 14 and Proposition 15.

Proof of Proposition 14.

Let P be defined as in the theorem statement. By Lemma 16, every j[n] can be uniquely mapped to some δ(j)[n] such that for all a,bX and 𝐑Wn such that aRδ(j)b, we have aF(𝐑)jb. Let S={δ(j):j[n]}. It is clear by construction that S is a decisive set for F, so it remains to show that |S|k. Suppose for contradiction that |S|k+1. Let SS such that |S|=k+1. It follows that there exists an injection g:SP. Also, fix an injection Δ:S[n] such that Δ(i)δ1(i) for all i[n]. Construct any profile 𝐑Wn such that for all iS, we have Ri=g(i)P. Suppose i,iS are distinct. Consider Δ(i) and Δ(i), which are distinct as Δ is injective. Observe that since g is a bijection, g(i)g(i). By definition of P and noting that g(i),g(i)P, there exists a,bX such that aRib and bRia. As δ(Δ(i))=i and δ(Δ(i))=i, the definition of δ implies that aF(𝐑)Δ(i)b and bF(𝐑)Δ(i)a. This shows that F(𝐑)Δ(i)F(𝐑)Δ(i); that is, every F(𝐑)Δ(i) is distinct over all iS. In particular, this shows that

|set(F(𝐑))||{F(𝐑)Δ(i):iS}|=|S|=k+1>k.

This contradicts the k-set agreement property of F. Hence |S|k, which shows F is k-dictatorial.

Proof of Proposition 15.

Suppose F is a distributed aggregation map on W that satisfies unanimity and IIA. Suppose for contradiction that F is not dictatorial. For each j[n], let δ(j)[n] such that for all a,bX and 𝐑Wn such that aRδ(j)b, we have aF(𝐑)jb, which is well-defined by Lemma 16. Since F is not dictatorial, not all values of δ(j) for j[n] are equal, so that there exists distinct j,j[n] where δ(j)δ(j). Let i=δ(j) and i=δ(j). This implies that for all 𝐑Wn if RiL(X), then F(𝐑)j=Ri, and if RiL(X), then F(𝐑)j=Ri.

So let R,RWL(X) such that d(R,R)=diam(WL(X)). Construct a profile 𝐑Wn such that Ri=R and Ri=R. As RiL(X), the above remark shows that F(𝐑)j=R. Similarly, F(𝐑)j=R. By construction of R and R, if ϵ<diam(WL(X)), then F does not satisfy ϵ-agreement with respect to d, a contradiction.

4 Distributed Set and Approximate Preference Aggregation

In this section and the next, we study distributed aggregation algorithms in the presence of process failures, in both synchronous and asynchronous communication models. The previous impossibility theorems in Section 3 were only in the synchronous fault-free case, so naively introducing failures into the system only makes the task at hand more difficult, and so the impossibility trivially holds. Hence we will discard the IIA property, as it is typically viewed as the most restrictive and least necessary for preference aggregation. Additionally, we discard the dictatorship properties as well, only requiring unanimity and agreement. We will find in this section and the next that we still obtain a plethora of impossibilities, despite this apparent simplification.

For the rest of this paper, consider a set of n processes, {p1,,pn}, at most t (with 1t<n) of them suffering crash failures. Let X be any finite set of m2 alternatives. Let WI,WOP(X) be input and output domains, respectively. The identity of process pi is defined to be i. Let C be the set of correct process identities in a given execution of a distributed algorithm.

We focus on the following two problems, which consider distributed aggregation functions in a message-passing distributed system in the crash failure model.

Definition 17 (k-Set Preference Aggregation).

Let k1. The k-set preference aggregation task with respect to WI,WO has the following specifications. Each process pi selects a private input preference RiWI. Every correct process pi decides a value SiWO satisfying:

  • k-set agreement. At most k different orders are decided: |Si:iC|k.

  • Unanimity. For all a,bX, if every correct pi has aRib, then aSib for all iC.

Definition 18 (ϵ-Approximate Preference Aggregation).

Let ϵ0; let d be a metric on a subset of P(X) containing WO. The ϵ-approximate preference aggregation task with respect to WI,WO,d has the following specifications. Each process pi selects a private input preference RiWI. Every correct process pi decides a value SiWO satisfying:

  • ϵ-approximate agreement. All correct decisions are at most ϵ apart: diamd({Si:iC})ϵ.

  • Unanimity. For all a,bX, if every correct pi has aRib, then aSib for all iC.

Even without the IIA and non-dictatorship properties seen in Propositions 14 and 15 (the deterministic synchronous fault-free case), a significant amount of structure is still imposed on algorithms solving either of these tasks, particularly because of the strength of this unanimity property together with an agreement condition, as we shall see in Section 5.

Another reason for the lack of non-dictatorship criteria in ϵ-approximate and k-set preference aggregation is that these properties are often implied by the unanimity condition. We make this precise in the following definition and proposition, noting that its proof is based on an indistinguishability argument commonly seen in distributed computing [18, 5].

A distributed algorithm A is k-dictatorial provided that the following holds for all admissible executions: there is a nonempty set T[n] with |T|k such that if every correct process pi has input Ri and output Si and TC, then aRib for all iT (a,bX) implies aSib for all iC. A domain WP(X) is non-trivial if there are two preferences R,SW and two alternatives a,bX such that aRb and bSa.

Proposition 19.

Suppose WI is non-trivial. Any algorithm in any synchrony model that satisfies unanimity is not k-dictatorial if 1kt.

Proof.

Suppose A is an algorithm that satisfies unanimity, and assume 1kt. Let R,RWI and a,bX such that aRb and bRa. Let T[n] such that 1|T|k. Consider an execution Ξ of A where every process is non-faulty and every process pi for iT has input R and every other process has input R. Since |T|kt, there exists an admissible execution Ξ that is identical to Ξ except the set of faulty processes is precisely T. By unanimity, in Ξ, processes pi with i[n]T must decide SiWO satisfying bSia. Since Ξ and Ξ are indistinguishable executions for any pi with i[n]T, it follows that each such pi decides some SiWO satisfying bSia. Since a is ranked higher than b for all inputs of processes with identity in T, this shows that A is not k-dictatorial.

We will make use of the following synchrony notation in the next sections. Define the synchrony of a distributed system to be sync if the system is synchronous and async if the system is asynchronous. Let the synchrony of the distributed system at hand be denoted 𝚝𝚜𝚢𝚗𝚌. Additionally, we say that an execution of a distributed algorithm in a particular model of computation (synchrony and maximum number of faults) is admissible if the execution satisfies the synchrony requirements and its number of faults is at most the maximum number of faults permissible by the model of computation.

5 Arrovian Impossibilities in Synchronous and Asynchronous Systems

In this section, we present strong impossibility results for both synchronous and asynchronous systems and both k-set and ϵ-approximate preference aggregation tasks. We begin with a simple definition that allows us to treat both synchrony models simultaneously.

Definition 20 (Synchronous Process Number).

Define the synchronous process number n¯(𝚝𝚜𝚢𝚗𝚌) of a synchrony 𝚝𝚜𝚢𝚗𝚌{sync,async} by

n¯(𝚝𝚜𝚢𝚗𝚌){n,if 𝚝𝚜𝚢𝚗𝚌=syncnt,if 𝚝𝚜𝚢𝚗𝚌=async.

Next we describe a convenient map that captures the relation between input and output of correct processes in an arbitrary admissible execution. Note that these reductions are not topological in nature as in [27, 10, 34, 36], and are merely convenient tools used in our impossibility results.

Definition 21 (Execution Map: sync).

If A is a distributed algorithm in the sync synchrony model with inputs in WI and outputs in WO, define a map 𝙵Async:WInWOn as follows: for each 𝐑WIn, deterministically fix an execution of A where all processes are correct and each pi has input Ri; let Si be the output of each pi, and set 𝙵Async(𝐑)𝐒=(S1,,Sn).

In the following definition, we choose the set of nt correct processes in the given executions to be p1,,pnt (and the faulty set to be pnt+1,,pn) for notational convenience, but this labeling is rather arbitrary.

Definition 22 (Execution Map: async).

Let A be an algorithm in async synchrony model. Define a map 𝙵Aasync:WIntWOnt by setting 𝙵Aasync(𝐑) for each 𝐑WInt as follows: deterministically fix an admissible execution of A where pnt+1,,pn are the t faulty processes that crash before sending any messages, and pi has input Ri for i[nt], and the correct processes p1,,pnt communicate perfectly synchronously for the duration of the execution; let Si be the decided value of pi; let 𝙵Aasync(𝐑)(S1,,Snt)=𝐒.

In either synchrony cases for 𝚝𝚜𝚢𝚗𝚌{sync,async} of the above reductions, Definition 20 shows that the reduced map is from WIn¯(𝚝𝚜𝚢𝚗𝚌) to WOn¯(𝚝𝚜𝚢𝚗𝚌). Note that even when A is a nondeterministic algorithm in the above definitions, a deterministic execution can still be chosen. For the rest of this section, fix a synchrony model 𝚝𝚜𝚢𝚗𝚌{sync,async}.

Observation 23.

If A is an algorithm that satisfies k-set agreement in the 𝚝𝚜𝚢𝚗𝚌 synchrony model, then the map 𝙵A𝚝𝚜𝚢𝚗𝚌 satisfies k-set agreement.

Observation 24.

If A is an algorithm that satisfies ϵ-approximate agreement in the 𝚝𝚜𝚢𝚗𝚌 synchrony model, then the map 𝙵A𝚝𝚜𝚢𝚗𝚌 satisfies ϵ-approximate agreement.

The following definition of u-unanimity for distributed aggregation maps can be seen as a kind of unanimity that is preserved under u-of-n¯(𝚝𝚜𝚢𝚗𝚌) thresholds.

Definition 25 (u-Unanimity).

A map F:WIn¯(𝚝𝚜𝚢𝚗𝚌)WOn¯(𝚝𝚜𝚢𝚗𝚌) satisfies u-unanimity for an integer u if for all a,bX and 𝐑WIn¯(𝚝𝚜𝚢𝚗𝚌), the set T{i[n¯(𝚝𝚜𝚢𝚗𝚌)]:aRib} satisfying |T|u implies that aF(𝐑)ib for all iT.

The next auxiliary lemma is a simple application of a classical indistinguishability argument in distributed computing [18, 5], and connects distributed unanimity with u-unanimity for appropriate u.

Lemma 26.

If A is an algorithm that satisfies unanimity in the 𝚝𝚜𝚢𝚗𝚌 synchrony model, then the map 𝙵A𝚝𝚜𝚢𝚗𝚌 satisfies (n¯(𝚝𝚜𝚢𝚗𝚌)t)-unanimity.

Proof.

First, suppose 𝚝𝚜𝚢𝚗𝚌=async. Consider any a,bX and 𝐑WIn¯(𝚝𝚜𝚢𝚗𝚌)=WInt. Suppose the set T{i[nt]:aRib} satisfies |T|n¯(𝚝𝚜𝚢𝚗𝚌)t=n2t. Let Ξ be the execution of A that defines 𝙵Aasync(𝐑). Construct a new execution Ξ that sends and receives the same messages as Ξ (and in the same order) but the set of faulty process identities is [nt]T instead of {nt+1,,n}, and the processes with identity greater than nt have their messages delayed until after every other process has decided; we may assume that each pi for i>nt has input Ri satisfying aRib, so that every iC satisfies aRib. Immediately, we know that processes pi for iT must decide 𝙵Aasync(𝐑)i in Ξ. Furthermore, there are |[nt]T|=(nt)|T|(nt)(n2t)=t faulty processes in Ξ since |T|n2t. This implies that the execution Ξ is admissible in the async model since asynchronous communication delays may be unbounded (but still finite). It follows that every iT satisfies a𝙵Aasync(𝐑)ib since pi decides 𝙵Aasync(𝐑)i in Ξ and A respects unanimity. Hence 𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑) satisfies (n¯(𝚝𝚜𝚢𝚗𝚌)t)-unanimity.

The proof for the case when 𝚝𝚜𝚢𝚗𝚌=sync is similar, but we include it here for completeness. Suppose 𝚝𝚜𝚢𝚗𝚌=sync. Suppose A is an algorithm with inputs from WI and outputs from WO that satisfies unanimity. Let a,bX and 𝐑WIn; let T{i[n]:aRib}, and assume |T|nt. Let Ξ be the execution of A that defines 𝙵Async(𝐑) from Definition 21. Let Ξ be an execution of A obtained from Ξ by letting each pj for j[n]T be faulty but still send and receive exactly the same messages as in Ξ. Immediately by construction, for all iT, pi decides 𝙵Async(𝐑)i in Ξ. Since |T|nt, we know |[n]T|t, which shows that Ξ is an admissible execution of A. Since, in Ξ, every correct process pi (for iT) has aRib, and since A satisfies unanimity, it follows that every pi for iT decides a preference that ranks a above b. It follows that a𝙵Async(𝐑)ib for all iT, as desired. Hence 𝙵Async(𝐑)i satisfies (n¯(𝚝𝚜𝚢𝚗𝚌)t)-unanimity.

A simple consequence of our auxiliary results thus far is the following. Suppose tn/2 and let A be an algorithm that satisfies unanimity. Then by Lemma 26, F=𝙵Aasync satisfies 0-unanimity, so that if i[nt] and 𝐑WInt has RiL(X), then F(𝐑)i=Ri. Hence, k-set preference aggregation is impossible in the async synchrony model as long as k<nt and |WIL(X)|nt. Similarly, ϵ-approximate preference aggregation is impossible in the async synchrony model if WIL(X) and ϵ<diamd(WIL(X)). Hence most of the interesting cases in the asynchronous communication model are when t<n/2.

Our main results in this section rely on the definitions below, inspired by the Mendes–Herlihy algorithm [33] for approximate agreement in d, except with minor differences.

Definition 27 (Unanimity Set).

For an indexed set M={Rα}αJWI, define the unanimity set of M by

unanimity(M){SWO:a,bX,[(αJ,aRαb)aSb]}.

Thus, given an indexed set M={Rα}αJWI for some J[n], the unanimity set of M is the set of admissible output rankings required by unanimity, when process pα has input Rα. The next lemma introduces the concept of safe area in this context.

Definition 28 (Safe Area).

Let M={Rα}αJWI, where J[n] and |J|>t. For each iJ, let

safei(M)TJ:|T|=|J|tiTunanimity({Rα:αT}),

called the safe area of M with respect to pi.

We often slightly abuse notation by treating a tuple (xi)i=1k as an indexed set {xi}i[k], as we do in the following lemma. This next lemma shows the connection between unanimity of an algorithm and the safe area concept above.

Lemma 29.

Let F:WIn¯(𝚝𝚜𝚢𝚗𝚌)WOn¯(𝚝𝚜𝚢𝚗𝚌) be a distributed aggregation map that satisfies (n¯(𝚝𝚜𝚢𝚗𝚌)t)-unanimity. Then for all i[n¯(𝚝𝚜𝚢𝚗𝚌)] and all 𝐑WIn¯(𝚝𝚜𝚢𝚗𝚌), we have F(𝐑)isafei(𝐑).

Proof.

Let i[n¯(𝚝𝚜𝚢𝚗𝚌)] and 𝐑WIn¯(𝚝𝚜𝚢𝚗𝚌). Let us prove that F(𝐑)isafei(𝐑). Suppose T[n¯(𝚝𝚜𝚢𝚗𝚌)] such that iT and |T|=n¯(𝚝𝚜𝚢𝚗𝚌)t. It suffices to show that F(𝐑)iunanimity({Rα:αT}). To this end, suppose a,bX such that for all αT, aRαb. Since F satisfies (n¯(𝚝𝚜𝚢𝚗𝚌)t)-unanimity and |T|n¯(𝚝𝚜𝚢𝚗𝚌)t, it follows that aF(𝐑)ib as iT. This shows that F(𝐑)iunanimity({Rα:αT}), as desired.

To show an impossibility, we seek cases where safei(𝐑)={Ri} for all i. This leads to the notion of a k-cyclic profile, expressed through Definitions 30 and 31. For convenience in the following definition and in the proof of Lemma 32 below, we use the following shorthand notation. If X1 and X2 are disjoint nonempty subsets of X and RWI, we write X1RX2 as shorthand for x1X1,x2X2,x1Rx2; that is, we write X1RX2 if and only if R ranks every element of X1 above every element of X2.

Definition 30 (Cyclic Preference List).

Let 1km. A k-cyclic preference list in WI is a list of k distinct preferences R1,,Rk in WI such that the following holds: there exists a partition X1Xk of X into nonempty sets and preferences BjL(Xj) for j[k] such that every Ri for i[k] respects the preferences of every Bj (that is, Ri|Xj=Bj for all j) and satisfies

XiRiXi+1RiRiXkRiX1RiRiXi1.

In this case, the preferences Bj for j[k] are called the blocks of R1,,Rk.

Definition 31 (Cyclic Profile).

Let 1km. A k-cyclic profile with synchrony 𝚝𝚜𝚢𝚗𝚌 is a profile 𝐑WIn¯(𝚝𝚜𝚢𝚗𝚌) such that WI has a k-cyclic preference list R1,,Rk and there is an equitable partition111A partition 𝒫 of a finite set S is equitable if |P|{|X|/|𝒫|,|X|/|𝒫|} for all P𝒫. We allow empty sets in this partition since we may have k>n¯(𝚝𝚜𝚢𝚗𝚌), forcing at least one of the sets to be empty. A1Ak of [n¯(𝚝𝚜𝚢𝚗𝚌)] where for all i[k] and jAi, we have Rj=Ri.

The set of all k-cyclic profiles with synchrony 𝚝𝚜𝚢𝚗𝚌 is denoted 𝒞k𝚝𝚜𝚢𝚗𝚌. Finally, let

𝒞𝚝𝚜𝚢𝚗𝚌n¯(𝚝𝚜𝚢𝚗𝚌)tkm𝒞k𝚝𝚜𝚢𝚗𝚌.

Let us show that this definition of cyclic profiles satisfies the intuition stated above.

Lemma 32.

If 𝐑𝒞𝚝𝚜𝚢𝚗𝚌, then for all i[n¯(𝚝𝚜𝚢𝚗𝚌)], we have safei(𝐑)={Ri}WO.

Proof.

Let 𝐑𝒞𝚝𝚜𝚢𝚗𝚌 and let i[n¯(𝚝𝚜𝚢𝚗𝚌)]. It is obvious from the definition of safei(𝐑) that {Ri}WOsafei(𝐑). Now suppose Ssafei(𝐑). Clearly SWO, so it remains to show S=Ri. Since 𝐑𝒞𝚝𝚜𝚢𝚗𝚌, there exists some integer k with n¯(𝚝𝚜𝚢𝚗𝚌)tkm, and there exists a k-cyclic preference list R1,,Rk along with an equitable partition A1Ak of [n¯(𝚝𝚜𝚢𝚗𝚌)] satisfying Definition 31; let j[k] be the unique integer such that iAj. Since R1,,Rk is k-cyclic, there exists a partition X1Xk of X into nonempty sets, and BjL(Xj) for j[k] that satisfies the properties in Definition 30.

Since every i[n¯(𝚝𝚜𝚢𝚗𝚌)] and j[k] satisfy Ri|Xj=BjL(X), it is easy to see that S|Xj=Bj, as Ssafei(𝐑). Let j1,j2[k] such that Xj1RiXj2 and there exists no j3[k] such that Xj1RiXj3RiXj2. Notice that Ri=Rj since iAj. It is easy to show that for all j[k], we have Xj1RjXj2 if and only if jj2; this implies that for all i[n¯(𝚝𝚜𝚢𝚗𝚌)], we have Xj1RiXj2 if and only if iAj2. In particular, this shows that iAj2. Furthermore, since A1Ak is an equitable partition of [n¯(𝚝𝚜𝚢𝚗𝚌)] and kn¯(𝚝𝚜𝚢𝚗𝚌)t, we have

|Aj2|n¯(𝚝𝚜𝚢𝚗𝚌)kn¯(𝚝𝚜𝚢𝚗𝚌)n¯(𝚝𝚜𝚢𝚗𝚌)/t=t.

We now let T[n¯(𝚝𝚜𝚢𝚗𝚌)]Aj2. Hence iT and |T|n¯(𝚝𝚜𝚢𝚗𝚌)t. It follows from Definition 28 that Sunanimity({Rα:αT}). By Definition 27, it follows that Xj1SXj2.

Since Rj=Ri, the definition of j and Definition 30 show that

XjRiXj+1RiRiXkRiX1RiRiXj1.

Since the choice of j1,j2 was arbitrary in the above argument, this implies that

XjSXj+1SSXkSX1SSXj1.

Thus, because S|Xj=Bj=Ri|Xj for all j[k], we obtain S=Ri, as desired.

We are now ready to state and prove our main impossibility theorem.

Theorem 33 (Main).

Let k<n. Then there is no algorithm solving k-set preference aggregation in the synchrony model 𝚝𝚜𝚢𝚗𝚌 if there exists a j-cyclic profile in 𝒞𝚝𝚜𝚢𝚗𝚌 for some j>k. Similarly, there is no algorithm solving ϵ-approximate preference aggregation in the synchrony model 𝚝𝚜𝚢𝚗𝚌 if 𝒞𝚝𝚜𝚢𝚗𝚌 and ϵ<max𝐑𝒞𝚝𝚜𝚢𝚗𝚌diamd(𝐑).

Proof.

Suppose k<n¯(𝚝𝚜𝚢𝚗𝚌), which is always true if 𝚝𝚜𝚢𝚗𝚌=sync. Suppose 𝐑𝒞𝚝𝚜𝚢𝚗𝚌 is a j-cyclic profile for some j>k. Suppose A is an algorithm that solves k-set preference aggregation in the 𝚝𝚜𝚢𝚗𝚌 synchrony model. Then the map 𝙵A𝚝𝚜𝚢𝚗𝚌 satisfies k-set agreement and (n¯(𝚝𝚜𝚢𝚗𝚌)t)-unanimity by Observation 23 and Lemma 26. Since 𝐑 is j-cyclic and j>k and k<n¯(𝚝𝚜𝚢𝚗𝚌), there exists a set S[n¯(𝚝𝚜𝚢𝚗𝚌)] such that |S|=k+1 and every Ri is distinct over all iS. Then by Lemma 29, for all iS, we have 𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑)isafei(𝐑). By Lemma 32, safei(𝐑){Ri} for all iS, which implies that 𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑)i=Ri for all iS. Since |S|=k+1, this shows that 𝙵A𝚝𝚜𝚢𝚗𝚌 does not satisfy k-set agreement, a contradiction. This proves the result when k<n¯(𝚝𝚜𝚢𝚗𝚌).

Now, suppose kn¯(𝚝𝚜𝚢𝚗𝚌), so 𝚝𝚜𝚢𝚗𝚌=async. Suppose there exists a j-cyclic profile in 𝒞𝚝𝚜𝚢𝚗𝚌=𝒞async for some k<jn. This profile can be extended to a j-cyclic profile 𝐑WIn. Since j>n¯(async)=nt, we know jnt+1nt, so that 𝐑𝒞sync. Since we have already proved the synchronous case, this shows that there is no algorithm that solves k-set preference aggregation in the sync synchrony model, so certainly no algorithm solves the task in the async model (such an algorithm necessarily allows synchronous executions).

For the second part, suppose 𝒞𝚝𝚜𝚢𝚗𝚌 and ϵ<max𝐑𝒞𝚝𝚜𝚢𝚗𝚌diamd(𝐑). Suppose A is an algorithm that solves ϵ-approximate preference aggregation in the 𝚝𝚜𝚢𝚗𝚌 synchrony model. Then the map 𝙵A𝚝𝚜𝚢𝚗𝚌 satisfies ϵ-approximate agreement and (n¯(𝚝𝚜𝚢𝚗𝚌)t)-unanimity by Observation 24 and Lemma 26. Pick any 𝐑argmax𝐑𝒞𝚝𝚜𝚢𝚗𝚌diamd(𝐑). Let i,j[n¯(𝚝𝚜𝚢𝚗𝚌)] such that d(Ri,Rj)=diamd(𝐑). Then d(Ri,Rj)>ϵ. By Lemma 29, 𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑)isafei(𝐑) and 𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑)jsafej(𝐑). Lemma 32 implies safei(𝐑){Ri} and safej(𝐑){Rj}, so that that 𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑)i=Ri and 𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑)j=Rj. It follows that

d(𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑)i,𝙵A𝚝𝚜𝚢𝚗𝚌(𝐑)j)=d(Ri,Rj)>ϵ,

which contradicts the ϵ-agreement property of 𝙵A𝚝𝚜𝚢𝚗𝚌. The theorem follows.

Let us now show some consequences of this theorem on special cases. First, we consider k-set preference aggregation on full domains, which contain all strict preferences on X.

Corollary 34 (k-Set Impossibility: Full Domain).

Suppose L(X)WIP(X). If mn¯(𝚝𝚜𝚢𝚗𝚌)t and k<min{m,n}, then there is no algorithm solving k-set preference aggregation on WI,WO in the synchrony model 𝚝𝚜𝚢𝚗𝚌.

Proof.

Suppose mn¯(𝚝𝚜𝚢𝚗𝚌)t and k<min{m,n}, so k<m and k<n. Write X={a1,,am}. Consider an m-cyclic preference list R1,,Rm in L(X) given by setting each Xi={ai} and Bi to be the only preference in L(Xi) and using the relations in Definition 30. Let 𝐑L(X)n¯(𝚝𝚜𝚢𝚗𝚌) be an m-cyclic profile constructed using Definition 31 and any equitable partition A1Am of [n¯(𝚝𝚜𝚢𝚗𝚌)]. Since mn¯(𝚝𝚜𝚢𝚗𝚌)t, we know that 𝐑𝒞𝚝𝚜𝚢𝚗𝚌. The result follows from Theorem 33 since 𝐑 is m-cyclic and k<n and k<m.

For our analysis of the ϵ-approximate preference aggregation problem, we consider the Kendall tau metric (Definition 9) and Spearman’s footrule metric (Definition 10) on L(X).

The assumption that j is even in the following result is only for simplicity of algebraic expressions, and is not fundamental to the result itself.

Corollary 35 (ϵ-Approximate Kendall Tau: General Impossibility).

Suppose there exists a j-cyclic profile 𝐑𝒞𝚝𝚜𝚢𝚗𝚌 for some jn¯(𝚝𝚜𝚢𝚗𝚌)t such that each block of 𝐑 is on at least 1 alternatives. If ϵ<j2/42, then no algorithm solves ϵ-approximate preference aggregation on WI,WO,𝙺𝚃 in the 𝚝𝚜𝚢𝚗𝚌 synchrony model. In particular, if j is even and δjm, then ϵ-approximate preference aggregation is impossible in the 𝚝𝚜𝚢𝚗𝚌 synchrony model for

ϵ<δ22diam𝙺𝚃(WI).

Proof.

Since there exists a j-cyclic profile for some jn¯(𝚝𝚜𝚢𝚗𝚌)t, then WI has a j-cyclic preference list R1,,Rj; let X1,,Xj be the blocks of R1,,Rj, each of size at least . It follows that there exists a j-cyclic profile 𝐑𝒞𝚝𝚜𝚢𝚗𝚌 (constructed with the preference list R1,,Rj) such that R1,Rj/2+1set(𝐑). Observe that for all a,bX, we have R1|{a,b}Rj/2+1|{a,b} if and only if aX1Xj/2 and bXj/2+1Xj or vice versa (see Figure 1); hence 𝙺𝚃(R1,Rj/2+1)=(i=1j/2|Xi|)(i=j/2+1j|Xi|).

Let ϵ<j2/42. Then, since =δmj and by definition of a j-cyclic preference list,

diam𝙺𝚃(set(𝐑)) 𝙺𝚃(R1,Rj/2+1)=(i=1j/2|Xi|)(i=j/2+1j|Xi|)
j/2(jj/2)=j/2j/22=j2/42>ϵ.

The first part then follows from Theorem 33 since ϵ<max𝐑𝒞𝚝𝚜𝚢𝚗𝚌diam𝙺𝚃(set(𝐑)). For the second part, suppose j is even and =δmj for some real δ>0. Then, by the first part, ϵ-approximate agreement is impossible if ϵ<j2/42. By Proposition 11,

j2/42=j24(δmj)2=δ22m22δ22diam𝙺𝚃(L(X))δ22diam𝙺𝚃(WI).

Hence ϵ<δ22diam𝙺𝚃(WI) implies ϵ<j2/42, proving the result.

Consider the δ value in the context of Corollary 35 (and in the next corollary). Observe that δ is at least the ratio of the smallest block size to the average block size mj. We necessarily have δ<1, but the closer δ is to 1, the more the partition X1Xj of X is evenly distributed and closer to being equitable.

R1Rj/2+1B1Bj/2+1B2Bj/2+2Bj/2BjBj/2+1B1Bj/2+2B2BjBj/2
Figure 1: Visualization of R1 and Rj/2+1 in the proofs of Corollaries 35 and 36.
Corollary 36 (ϵ-Approximate Spearman Footrule: General Impossibility).

Suppose there exists a j-cyclic profile 𝐑𝒞𝚝𝚜𝚢𝚗𝚌 for some jn¯(𝚝𝚜𝚢𝚗𝚌)t such that each block of 𝐑 is on at least 1 alternatives. If ϵ<j2/22, then no algorithm solves ϵ-approximate preference aggregation on WI,WO,𝚂𝙵 in the 𝚝𝚜𝚢𝚗𝚌 synchrony model. In particular, if j is even and δjm, then ϵ-approximate preference aggregation is impossible in the 𝚝𝚜𝚢𝚗𝚌 synchrony model for

ϵ<δ2diam𝚂𝙵(WI).

Proof.

The proof of this result is almost identical to the proof of Corollary 35. Let R1,,Rj and 𝐑𝒞𝚝𝚜𝚢𝚗𝚌 and X1,,Xj be defined as in the proof of Corollary 35. Observe that for every aX1Xj/2, we have |rankR1(a)rankRj/2(a)|=i=j/2+1j|Xi| and for all aXj/2+1Xj, we have |rankR1(a)rankRj/2(a)|=i=1j/2|Xi|. See Figure 1 for a visualization of these observations.

If ϵ<j2/22, then the observations above imply

diam𝚂𝙵(set(𝐑)) 𝚂𝙵(R1,Rj/2+1)=2(i=1j/2|Xi|)(i=j/2+1j|Xi|)
=2𝙺𝚃(R1,Rj/2+1)2j2/42=j2/22>ϵ.

The result follows by Theorem 33. The second part of this corollary holds similarly to the proof of Corollary 35. Suppose j is even and write =δmj. The result immediately follows from the first part of this corollary and the inequality

j2/22=j22(δmj)2=δ2m22δ2diam𝚂𝙵(L(X))δ2diam𝚂𝙵(WI),

which follows from the equality diam𝚂𝙵(L(X))=m22 in Proposition 11.

We conclude this section by analyzing approximate preference aggregation on the full domain consisting of all strict preferences on X.

Corollary 37 (ϵ-Approximate Kendall Tau: Full Domain Impossibility).

Assume WI=WO=L(X). If mn¯(𝚝𝚜𝚢𝚗𝚌)t, then no algorithm solves ϵ-approximate preference aggregation on WI,WO,𝙺𝚃 in the 𝚝𝚜𝚢𝚗𝚌 synchrony model, if ϵ<m2/4, and in particular, if ϵ<12diam𝙺𝚃(L(X)).

Proof.

Using the construction in the proof of Corollary 34, there exists a m-cyclic profile 𝐑𝒞𝚝𝚜𝚢𝚗𝚌. Since the blocks of 𝐑 form an equitable partition of X, each block contains exactly one alternative. Since mn¯(𝚝𝚜𝚢𝚗𝚌)t, Corollary 35 shows that there is no ϵ-approximate preference aggregation algorithm (on WI,WO,𝙺𝚃) in the 𝚝𝚜𝚢𝚗𝚌 synchrony model for ϵ<m2/412=m2/4. The second part of the result follows from the following inequality: 12diam𝙺𝚃(L(X))=m2m4m24. The first equality holds by Proposition 11 and the last inequality is obvious if m4, and one may easily verify that it is true when m3.

Corollary 38 (ϵ-Approximate Spearman Footrule: Full Domain Impossibility).

Assume WI=WO=L(X). If mn¯(𝚝𝚜𝚢𝚗𝚌)t, then no algorithm solves ϵ-approximate preference aggregation on WI,WO,𝚂𝙵 in the 𝚝𝚜𝚢𝚗𝚌 synchrony model, if ϵ<m2/2, and in particular, if ϵ<diam𝚂𝙵(L(X)).

Proof.

Using a similar argument as the previous corollary and by Corollary 36, we have the following. If mn¯(𝚝𝚜𝚢𝚗𝚌)t, then there is no ϵ-approximate preference aggregation algorithm (on WI,WO,𝚂𝙵) in the 𝚝𝚜𝚢𝚗𝚌 synchrony model for ϵ<m2/2. The second part of the result follows from the equality diam𝚂𝙵(L(X))=m2/2, which holds by Proposition 11.

6 Related Work

The Arrovian framework in voting theory has already received a lot of attention; however, its intersection with distributed computing appears to be recent. To the best of our knowledge, distributed combinatorial topology techniques such as the index lemma on simplicial complexes were first used in 2022 [40] to prove the base case (m=3, n=2) of Arrow’s theorem topologically, and then extended via induction. This work was later improved in 2024 [30] by proving a domain-generalization of Arrow’s theorem using only distributed combinatorial topology on all cases. Other work has studied social welfare and social choice distributed algorithms satisfying consensus and significantly weaker validity conditions (e.g. preserving unanimity of only the highest ranked alternative) than our unanimity condition [11].

The theory in the Arrovian framework itself is full of rich results. In particular, Arrow’s theorem and domain-generalizations thereof have been proved via many combinatorial methods [8, 24], as well as techniques from algebraic topology [6] and fixed-point methods in metric spaces [41, 17]. More generally, (algebraic) topological techniques have proven successful in voting theory. For example, the Gibbard–Satterthwaite theorem – which shows the non-existence of a social choice function (inputs being preferences and output being a single alternative) satisfying surjectivity and strategy-proofness – has been proven using combinatorial methods and algebraic topological methods [26, 7].

On the distributed computing side, the k-set agreement task (in which processes must decide on at most k values with a notion of decision validity) was introduced in [9]. Other formulations of this task may be found in [39]. The ϵ-approximate agreement distributed task on the real line was well-studied in [14, 16] and was proven to be solvable in fully asynchronous systems with relatively high resilience, despite the consensus unsolvability in such systems with only one crash fault [19]. These results were later generalized to multidimensional approximate agreement in [33, 35]. Multidimensional approximate agreement has been studied extensively since then [1, 25, 15, 22, 4]. Discrete versions of approximate agreement have been formulated on graphs and simplicial complexes [38, 2, 31]; these tasks are somewhat similar to the ϵ-approximate preference aggregation task discussed in this paper.

7 Conclusion

In this paper, we propose two novel distributed tasks in the Arrovian framework and prove strong impossibility results on these tasks in crash-prone, synchronous and asynchronous systems. We adapt previously well-studied distributed tasks – namely, set and approximate agreement – to the context of preference aggregation, by replacing the respective validity properties with unanimity on the correct processes. Our impossibility results are very general, and apply to k-set preference aggregation on a full domain, and ϵ-approximate preference aggregation with both the Kendall tau and Spearman footrule metrics.

Using the Kendall tau metric on a domain of strict preferences illuminates a particularly fascinating connection to a more general “metric space approximate agreement” task. One may embed the given domain into a higher dimensional Euclidean space by examining the order of each pair of alternatives and mapping it to a binary real. With such an embedding, one may think of the approximate preference aggregation task (with the Kendall tau metric) as a more traditional multidimensional approximate agreement problem, where the convexity and agreement properties are with respect to the Euclidean L1 “taxicab” metric (instead of the usual L2 metric) and the definition of convexity is adjusted to a more “total” convexity. Many of the lemmas in this paper easily generalize to this metric space framework. Exploration of this more general approximate agreement task would be interesting future work.

Another interesting direction for future work is the following. In our execution map of an asynchronous algorithm, we make a rather arbitrary choice for the set of silent (initially crashed) processes (see the sentence before Definition 22). Using a more rich view and including all possible sets of silent processes in the map (or other techniques) could potentially generate a simplicial complex that captures this information. It would be highly insightful to determine if topological methods could be used in this way to obtain stronger asynchronous results in our Arrovian framework, but also in the more general metric space framework discussed above.

References

  • [1] Ittai Abraham, Dahlia Malkhi, and Alexander Spiegelman. Asymptotically optimal validated asynchronous byzantine agreement. Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019. URL: https://api.semanticscholar.org/CorpusID:197660727.
  • [2] Dan Alistarh, Faith Ellen, and Joel Rybicki. Wait-free approximate agreement on graphs. In Structural Information and Communication Complexity: 28th International Colloquium, SIROCCO 2021, Wrocław, Poland, June 28 – July 1, 2021, Proceedings, pages 87–105, Berlin, Heidelberg, 2021. Springer-Verlag. doi:10.1007/978-3-030-79527-6_6.
  • [3] Kenneth J. Arrow. Social Choice and Individual Values. John Wiley & Sons, 1951.
  • [4] Hagit Attiya and Faith Ellen. The Step Complexity of Multidimensional Approximate Agreement. In Eshcar Hillel, Roberto Palmieri, and Etienne Rivière, editors, 26th International Conference on Principles of Distributed Systems (OPODIS 2022), volume 253 of Leibniz International Proceedings in Informatics (LIPIcs), pages 6:1–6:12, Dagstuhl, Germany, 2023. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.OPODIS.2022.6.
  • [5] Hagit Attiya and Sergio Rajsbaum. Indistinguishability. Commun. ACM, 63(5):90–99, April 2020. doi:10.1145/3376902.
  • [6] Y.M. Baryshnikov. Unifying impossibility theorems: A topological approach. Advances in Applied Mathematics, 14(4):404–415, 1993. doi:10.1006/aama.1993.1020.
  • [7] Yuliy Baryshnikov and Joseph Root. A topological proof of the gibbard–satterthwaite theorem. Economics Letters, 234:111447, 2024. doi:10.1016/j.econlet.2023.111447.
  • [8] Donald E. Campbell and Jerry S. Kelly. Chapter 1 impossibility theorems in the arrovian framework. In Handbook of Social Choice and Welfare, volume 1 of Handbook of Social Choice and Welfare, pages 35–94. Elsevier, 2002. doi:10.1016/S1574-0110(02)80005-4.
  • [9] Soma Chaudhuri. More choices allow more faults: set consensus problems in totally asynchronous systems. Inf. Comput., 105(1):132–158, July 1993. doi:10.1006/inco.1993.1043.
  • [10] Soma Chaudhuri, Maurice Erlihy, Nancy A. Lynch, and Mark R. Tuttle. Tight bounds for k-set agreement. J. ACM, 47(5):912–943, September 2000. doi:10.1145/355483.355489.
  • [11] Himanshu Chauhan and Vijay K. Garg. Democratic elections in faulty distributed systems. In Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, and Prasun Sinha, editors, Distributed Computing and Networking, pages 176–191, Berlin, Heidelberg, 2013. Springer Berlin Heidelberg. doi:10.1007/978-3-642-35668-1_13.
  • [12] Carole Delporte-Gallet, Hugues Fauconnier, Eli Gafni, and Sergio Rajsbaum. Black art: Obstruction-free k-set agreement with —mwmr registers—  ¡ —proccesses—. In Vincent Gramoli and Rachid Guerraoui, editors, Networked Systems, pages 28–41, Berlin, Heidelberg, 2013. Springer Berlin Heidelberg. doi:10.1007/978-3-642-40148-0_3.
  • [13] Persi Diaconis and R. L. Graham. Spearman’s Footrule as a Measure of Disarray. Journal of the Royal Statistical Society: Series B (Methodological), 39(2):262–268, December 2018. doi:10.1111/j.2517-6161.1977.tb01624.x.
  • [14] Danny Dolev, Nancy Lynch, Shlomit Pinter, Eugene Stark, and William Weihl. Reaching approximate agreement in the presence of faults. Journal of the ACM, 33(3):499–516, May 1986. doi:10.1145/5925.5931.
  • [15] Mose Mizrahi Erbes and Roger Wattenhofer. Asynchronous approximate agreement with quadratic communication. arXiv preprint, 2024. doi:10.48550/arXiv.2408.05495.
  • [16] A. Fekete. Asynchronous approximate agreement. In Proceedings of the sixth annual ACM symposium on principles of distributed computing (PODC), pages 64–76, New York, NY, USA, 1987. doi:10.1145/41840.41846.
  • [17] Frank Feys and Helle Hansen. Arrow’s theorem through a fixpoint argument. Electronic Proceedings in Theoretical Computer Science, 297:175–188, July 2019. doi:10.4204/EPTCS.297.12.
  • [18] Faith Fich and Eric Ruppert. Hundreds of impossibility results for distributed computing. Distributed Computing, 16(2):121–163, September 2003. doi:10.1007/s00446-003-0091-y.
  • [19] Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374–382, April 1985. doi:10.1145/3149.214121.
  • [20] Pierre Fraigniaud, Ami Paz, and Sergio Rajsbaum. A speedup theorem for asynchronous computation with applications to consensus and approximate agreement. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, PODC’22, pages 460–470, New York, NY, USA, 2022. Association for Computing Machinery. doi:10.1145/3519270.3538422.
  • [21] Pierre Fraigniaud, Sergio Rajsbaum, Matthieu Roy, and Corentin Travers. The opinion number of set-agreement. In Marcos K. Aguilera, Leonardo Querzoni, and Marc Shapiro, editors, Principles of Distributed Systems, pages 155–170, Cham, 2014. Springer International Publishing. doi:10.1007/978-3-319-14472-6_11.
  • [22] Matthias Függer and Thomas Nowak. Fast multidimensional asymptotic and approximate consensus. ArXiv, abs/1805.04923, 2018. arXiv:1805.04923.
  • [23] Hugo Rincon Galeana, Sergio Rajsbaum, and Ulrich Schmid. Continuous Tasks and the Asynchronous Computability Theorem. In Mark Braverman, editor, 13th Innovations in Theoretical Computer Science Conference (ITCS 2022), volume 215 of Leibniz International Proceedings in Informatics (LIPIcs), pages 73:1–73:27, Dagstuhl, Germany, 2022. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2022.73.
  • [24] John Geanakoplos. Three brief proofs of arrow’s impossibility theorem. Economic Theory, 26(1):211–215, July 2005. doi:10.1007/s00199-004-0556-7.
  • [25] Diana Ghinea, Chen-Da Liu-Zhang, and Roger Wattenhofer. Multidimensional approximate agreement with asynchronous fallback. Cryptology ePrint Archive, Paper 2023/449, 2023. URL: https://eprint.iacr.org/2023/449.
  • [26] Allan Gibbard. Manipulation of voting schemes: A general result. s.n., 1998.
  • [27] Maurice Herlihy, D. N. Kozlov, and Sergio Rajsbaum. Distributed computing through combinatorial topology. Elsevier/Morgan Kaufmann, 2014.
  • [28] M. G. Kendall. A new measure of rank correlation. Biometrika, 30(1/2):81–93, 1938. URL: http://www.jstor.org/stable/2332226.
  • [29] M.G. Kendall. Rank Correlation Methods. C. Griffin, 1948. URL: https://books.google.com/books?id=hiBMAAAAMAAJ.
  • [30] Isaac Lara, Sergio Rajsbaum, and Armajac Raventós-Pujol. A generalization of arrow’s impossibility theorem through combinatorial topology, July 2024. arXiv:2402.06024.
  • [31] Jérémy Ledent. Brief announcement: Variants of approximate agreement on graphs and simplicial complexes. In Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, PODC’21, pages 427–430, New York, NY, USA, 2021. Association for Computing Machinery. doi:10.1145/3465084.3467946.
  • [32] Hammurabi Mendes. Byzantine Computability and Combinatorial Topology. PhD thesis, Brown University, USA, 2016. URL: https://cs.brown.edu/research/pubs/theses/phd/2016/mendes.hammurabi.pdf.
  • [33] Hammurabi Mendes and Maurice Herlihy. Multidimensional approximate agreement in byzantine asynchronous systems. In Dan Boneh, Tim Roughgarden, and Joan Feigenbaum, editors, Symposium on Theory of Computing Conference, STOC’13, Palo Alto, CA, USA, June 1-4, 2013, pages 391–400. ACM, 2013. doi:10.1145/2488608.2488657.
  • [34] Hammurabi Mendes and Maurice Herlihy. Tight bounds for connectivity and set agreement in byzantine synchronous systems. In Andréa W. Richa, editor, 31st International Symposium on Distributed Computing, DISC 2017, October 16-20, 2017, Vienna, Austria, volume 91 of LIPIcs, pages 35:1–35:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2017. doi:10.4230/LIPICS.DISC.2017.35.
  • [35] Hammurabi Mendes, Maurice Herlihy, Nitin H. Vaidya, and Vijay K. Garg. Multidimensional agreement in byzantine systems. Distributed Comput., 28(6):423–441, 2015. doi:10.1007/S00446-014-0240-5.
  • [36] Hammurabi Mendes, Christine Tasson, and Maurice Herlihy. Distributed computability in byzantine asynchronous systems. In David B. Shmoys, editor, Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 704–713. ACM, 2014. doi:10.1145/2591796.2591853.
  • [37] Achour Mostefaoui, Sergio Rajsbaum, and Michel Raynal. The combined power of conditions and failure detectors to solve asynchronous set agreement. In Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC ’05, pages 179–188, New York, NY, USA, 2005. Association for Computing Machinery. doi:10.1145/1073814.1073848.
  • [38] Thomas Nowak and Joel Rybicki. Byzantine Approximate Agreement on Graphs. In Jukka Suomela, editor, 33rd International Symposium on Distributed Computing (DISC 2019), volume 146 of Leibniz International Proceedings in Informatics (LIPIcs), pages 29:1–29:17, Dagstuhl, Germany, 2019. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.DISC.2019.29.
  • [39] R. De Prisco, D. Malkhi, and M. Reiter. On k-set consensus problems in asynchronous systems. IEEE Transactions on Parallel & Distributed Systems, 12(01):7–21, January 2001. doi:10.1109/71.899936.
  • [40] Sergio Rajsbaum and Armajac Raventós-Pujol. A distributed combinatorial topology approach to arrow’s impossibility theorem. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, PODC’22, page 471–481, New York, NY, USA, 2022. Association for Computing Machinery. doi:10.1145/3519270.3538433.
  • [41] Yasuhito Tanaka. On the equivalence of the arrow impossibility theorem and the brouwer fixed point theorem. Applied Mathematics and Computation, 172(2):1303–1314, 2006. Special issue for The Beijing-HK Scientific Computing Meetings. doi:10.1016/j.amc.2005.02.054.