The approximation of efficient public good mechanisms by simple voting schemes
نویسندگان
چکیده
This paper compares the performance of simple voting rules, called referenda, to the performance of interim efficient mechanisms for the provision of a public good. In a referendum, voters simply vote for or against the provision of the public good, and production of the public good depends on whether or not the number of yes votes exceeds a prespecified threshold. Costs are shared equally. We show that in large populations for any interim efficient allocation rule, there exists a corresponding referendum that yields approximately the same total welfare when there are many individuals. Moreover, if there is a common value component to the voters’ preferences, then there is a unique approximating referendum. 2002 Elsevier Science B.V. All rights reserved.
منابع مشابه
Division of the Humanities and Social Sciences California Institute of Technology Pasadena, California 91125 the Approximation of Efficient Public Good Mechanism by Simple Voting Schemes
This paper compares the performance of simple voting rules, called referenda, to the performance of interim eÆcient mechanisms for the provision of a public good. In a referendum, voters simply vote for or against the provision of the public good, and production of the public good depends on whether or not the number of yes votes exceeds a prespeci ed threshold. Costs are shared equally. We sho...
متن کاملA New Receipt-Free E-Voting Scheme Based on Blind Signature (Abstract)
Electronic voting has attracted much interest recently and a variety of schemes have been proposed. Generally speaking, all these schemes can be divided into three main approaches: based on blind signature, based on mix networks and based on homomorphic encryption. Schemes based on blind signature are thought to be simple, efficient, and suitable for large scale elections. Fujioka, Okamoto and ...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملHow Trust Is Gained and Lost Voting Technologies and Trust
E nsuring public trust in election results has been a concern since antiquity. The Greeks carried out senatorial elections not by a simple showing of hands but by issuing little clay balls to the senators, who then cast their votes by dropping them into the appropriate pot. Paper ballots were first used by the Ro-mans; voting forms bearing the candidates' pre-printed names were introduced in Au...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کامل