1 A CHARACTERIZATION AND SOME PROPERTIES OF THE BANZHAF-COLEMAN-DUBEY-SHAPLEY SENSITIVITY INDEX 1 Rana Barua, Statistics-Mathematics Unit, Satya R. Chakravarty, Economic Research Unit, Sonali Roy, Economic Research Unit, Palash Sarkar, Applied Statistics Unit, Indian Statistical Institute, Kolkata, India. Correspondent: Satya R. Chakravarty Economic Research Unit Indian Statistical Institute 203 B.T. Road Kolkata – 700108 INDIA Fax: 913325778893 e-mail: [email protected]1 For comments and suggestions, we are grateful to two anonymous referees.
27
Embed
A CHARACTERIZATION OF THE BANZHAF - isical.ac.inrana/sensitivity.pdf · A CHARACTERIZATION AND SOME PROPERTIES OF THE BANZHAF-COLEMAN-DUBEY-SHAPLEY SENSITIVITY INDEX1 Rana Barua,
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
law for the spectral values of f and is known as Parseval’s Theorem (see, for example,
Ding et al., 1991).
The next result states a useful property of Walsh Transform (see Canteaut et.al.,2000,
Proposition 5). For a vector space E , we define ⊥E to be the vector space which is
orthogonal to E , i.e., ⊥E = { }Evvuu ∈∀= ,0,: .
Theorem 4: Let f and g be n -variable functions and E be a subspace of nF2 . Then
( ) ( )∑∑⊥∈∈
=Eu
fEw
f uCEwW 2 (19)
See (Sarkar and Maitra, 2002) for a discussion of the above results in a more general
setting.
5.2 The Results
In this subsection, we present the results mentioned at the beginning of section 5
along with complete proofs. First we generalize the notion of swing. The notion of swing
is quite general in the sense that we do not require monotonicity (condition (iii) in
definition1) for swing to be defined.
Definition 12: Given a game ( )VNG ;= ∈ ∗F , and Ni ∈ , number of negative swings of
i is defined as
( ) {} ( ) {}( ){ }1: =∪−−⊆=− iSVSViNSGmi .
For any ( )VNG ;= ∈ ∗F , we write
( ) ( )∑∈
−− =Ni
i GmGm . (20)
The following proposition, whose proof is very easy, states the relationship between
( )Gmi− and ( )Gmi .
Proposition 5: Let ( )VNG ;= ∈ ∗F be arbitrary. Then for any Ni ∈ , ( )Gmi− = ( )Gmi .
Proposition 6: Let ( )VNG ;= ∈ ∗F . Then ( )Gm =0 if and only if G satisfies
monotonicity, that is, condition (iii) in definition 1.
20
Proof: The sufficiency part of the proof is easy to verify. We therefore establish the
necessity. If ( )Gm =0, then ( )Gmi =0 for all Ni ∈ . Let S and T be two coalitions in G
such that ( ) 1=SV and TS ⊆ . Then we need to show that ( ) 1=TV . This is shown by
induction on STr −= . For 0=r , we have T = S and the result follows trivially.
Assume that the result is true for 1−r . Let T ′ be such that TTS ⊆′⊆ and T ′ = 1−r .
By induction hypothesis ( ) 1=′TV . Let Nj ∈ such that { }jTT ∪′= . If possible, let
( ) 0=TV . Then ( ) 0=′TV and ( ) 1=TV , which in turn implies that ( ) 0≠Gm j . This
contradicts the assumption that ( ) 0=Gmi for all Ni ∈ . Therefore G will fulfil
monotonicity. �
Corollary 7: Let ( )VNG ;= ∈ ∗F . Then ( ) ( ) ( )GmGMGMNi
i == ∑∈
if and only if G is
monotone.
Corollary 8: Let ( )VNG ;= ∈ ∗F . Then ( ) ( )GBGB + = ( )GB , that is ( )GB = 0 if and
only if G meets monotonicity.
Remarks:
(a) Propositions 5 and 6 show that a game does not have negative swing if and only if it
is monotone.
(b) Since ( ) ( ) ( )GmGMGm −= and ( ) 0≥Gm , ( )Gm is maximized if and only if G
satisfies monotonicity.
(c) It is evident that ( )GM can be regarded as a sensitivity index on the set ∗F .
Given ( )VNG ;= ∈ ∗F , we now express ( )Gmi in terms of the autocorrelation
values of V . For Ni ∈ , let iε be the −n vector, which has 1 in the thi position and 0
elsewhere.
Lemma 9: For any −n player game ( ) ∗∈= FVNG ; and Ni ∈ , we have
( )GM i = ( )iVn C ε
41
2 2 −− (21)
21
Proof: Let ( ) {}( ) ( ){ }1: =⊕∆⊆= SViSVNSViµ , where for any two sets A and B ,
( ) ( )ABBABA −∪−=∆ . Then it is easy to verify that
( )Gmi + ( )Gmi = ( )Viµ21
. We now compute
( ) ( ) ( ) ( )∑∈
⊕⊕−=n
i
Fx
exVxV
iVC2
1ε
= ( ) ( ){ }ixVxVx ε⊕=: - ( ) ( ){ }ixVxVx ε⊕≠:
= 22 −n ( ) ( ){ }ixVxVx ε⊕≠:
= 22 −n ( )Viµ
= 42 −n ( ( )Gmi + ( )Gmi ).
This gives us the desired result. ÿ
Corollary 10: For any −n player game ( ) ∗∈= FVNG ; , we have
( ) ( )∑=
− −=n
iiV
n CnGM1
2
41
2 ε . (22)
Thus the problem reduces to computing ( )∑=
n
iiVC
1
ε . We use algebraic techniques to
tackle this problem. The first two steps are the following.
For two −n bit vectors u and v we denote vu ≤ if ii vu ≤ for each Ni ∈ . Also by u
we denote the bitwise complement of u .
Lemma 11: For any −n player game ( ) ∗∈= FVNG ; , we have
( )∑=
n
iiVC
1
ε = ( )∑∑= ≤
−+−
n
i uVn
n
i
uWn1
2
121
2ε
. (23)
Proof: For ni ≤≤1 , let iE be the subspace of nF2 defined by iE ={ }in uFu ε≤∈ :2 .
Then ⊥
iE = { }in uFu ε≤∈ :2 = { }iε,0 . It is easy to see that 12 −= n
iE . We now apply
Theorem 4 to get ( )∑≤ iu
V uCε
= ( )∑≤
−iu
VnuW
ε
2
121
.
22
Note that ( )∑≤ iu
V uCε
= ( ) ( )iVV CC ε+0 = n2 + ( )iVC ε . Hence summing both the sides
from 1 to n we obtain the desired result. �
The next task is to simplify the right hand side of Equation (23).
Lemma 12: For any −n player game ( ) ∗∈= FVNG ; , we have
( )∑∑= ≤
n
i uV
i
uW1
2
ε = nn 22 ( ) ( )∑
∈
−nFu
V uWuwt2
2 . (24)
Proof: Let nFu 2∈ be arbitrary. The number of times ( )uWV2 occurs in the left-hand side
of Equation (24) is ( )( )uwtn − . Hence the left-hand side is equal to
( ) ( )∑∈
−nFu
V uWuwtn2
2)( = ( )∑∈ nFu
V uWn2
2 ( ) ( )∑∈
−nFu
V uWuwt2
2 .
Using Parseval’s Theorem, we have ( ) n
FuV
n
uW 22 22
=∑∈
. This gives us the desired result. �
Let ( )VN ; be a −n player game. For ni ≤≤0 , we define
( ) ( )( )
∑=∈
=iuwtFu
nV
Vn
uWiK
,2
2
2 2.
Note that using Parseval’s Theorem, we have ( ) 10
=∑=
n
iV iK . We rewrite Lemma 12 in the
following manner.
Lemma 13: ( )∑∑= ≤
n
i uV
i
uW1
2
ε = nn 22 ( )∑
=−
n
iV
n iiK0
22 (25)
Combining Corollary 10, Lemma 11 and Lemma 13 we obtain the main result.
Theorem 14: Let ( ) ∗∈= FVNG ; be an n - player game. Then
( ) 12 −= nGM ( )∑=
n
iV iiK
0
(26)
Remark: We make some observations on the complexity of computing ( )GM . Theorem
14 relates ( )GM to the Walsh transform of V . Using the fast Walsh transform algorithm,
the Walsh transform of an n -variable function can be computed in time ( )nnO 2 (see
23
MacWilliams and Sloane, 1977). From this we obtain the iK ’s in ( )nO 2 time. Hence the
value of ( )GM can be computed in time ( )nnO 2 .
Recall that an n - player game ( )VN; is balanced if the number of winning coalitions
(i.e., the weight) of V is 12 −n .
Corollary 15: Let ( ) ∗∈= FVNG ; be an n - player game. Assume further that G is
bal
24
Further, both the upper and lower bounds are attained.
Proof: We have
( )∑=
n
iV iK
1
≤ ( )∑=
n
iV iiK
0
≤ n ( )∑=
n
iV iK
1
.
Using ( )∑=
n
iV iK
1
=1 ( )0VK− we obtain
1 ( )0VK− ≤ ( )∑=
n
iV iiK
0
≤ n (1 ( )0VK− ). (28)
By definition
( ) ( ) ( )n
n
nV wW
K 2
2
2
2
222
20
0−== .
Putting this value of ( )0K in inequality (28) and using (26) we obtain the desired result.
The lower bound is attained if any one player becomes the dictator. The upper bound is
attained if G is the parity game, i.e., ( ) ( ) 2modxwtxV ≡ for all nFx 2∈ .(Note that for a
parity game the number of swings of any player i in both G and G is 22 −n . Therefore,
for such a game ( ) ( ) nGmGm == 22 −n .) �
Corollary 19: If ( ) ∗∈= FVNG ; is monotone, then
( ) ( ) nGmww
n
n
≤≤−−12
2 ( )12
2−
−n
n ww.
6. Conclusion
Dubey and Shapley(1979) argued that in a voting situation the sum of the number
of ways in which each voter can affect a ‘swing’ in the outcome is a measure of the
sensitivity of the situation. Following Felsenthal and Machover (1998) we consider a
normalized value of this sum and refer to it as the Banzhaf (1965)-Coleman (1971)-
Dubey-Shapley (1979) sensitivity index. This paper investigates some of its properties,
the main topics being a characterization from a set of independent axioms and derivation
of bounds for a very general class of games.
25
References
Banzhaf, J. F., 1965. Weighted voting doesn’t work: a mathematical analysis. Rutgers LawReview 19, 317-343.
Barua, R., Chakravarty, S.R., Roy, S., 2002. Measuring power in weighted majority games.Mimeo. Indian Statistical Institute, Calcutta.
Burgin, M., Shapley, L.S., 2001. Enhanced Banzhaf power index and its mathematical properties.WP 797, Department of Mathematics, UCLA.
Canteaut, A., Carlet, C., Charpin, P., Fontaine, C., 2000. Propagarion characteristics andcorrelation immunity of highly non-linear Boolean functions, In: Advances in Cryptology-Eurocrypt 2000, Lecture Notes in Computer Science. Springer-Verlag, New York, pp. 507-522.
Carlet, C., 1992. Partially bent functions, In: Advances in Cryptology-CRYPTO’92, LectureNotes in Computer Science. Springer-Verlag, New York, pp. 280-291.
Coleman, J.S., 1971. Control of collectives and the power of a collectivity to act, In: Lieberman,B., (Ed.) Social Choice. Gordon and Breach, New York, pp. 269-298.
Deegan, J. and Packel, E.W., 1978. A new index of power for simple n- person games. Int. J.Game Theory 7, 113-123.
Ding, C., Xiao, G., Shan, W., 1991. The stability theory of stream ciphers. Lecture Notes inComputer Science, Number 561, Springer-Verlag, New York.
Dubey, P., 1975. On the uniqueness of the Shapley value. Int. J. Game Theory 4, 131-140.
Dubey, P., Shapley, L.S., 1979. Mathematical properties of the Banzhaf power index.Mathematics of Operations Research 4, 99-131.
Felsenthal, D.S., Machover, M., 1995. Postulates and paradoxes of relative voting power – acritical reappraisal. Theory Dec. 38, 195 – 229.
Felsenthal, D., Machover, M., 1998. The Measurement of Voting Power. Edward Elgar,Cheltenham.
Hart, S., 1976. A note on edges of the n-cube. Discrete Mathematics 14, 157-163.
26
Johnston, R.J., 1978. On the measurement of power: some reactions to Laver. Environ. PlanningA 10, 907-914.
Lehrer, E., 1988. An axiomatization of the Banzhaf Value. Int. J. Game Theory 17, 89-99.
MacWilliams, F.J., Sloane, N.J.A., 1977. The Theory of Error Correcting Codes. Amsterdam,North Holland.
Nowak, A.S., 1997. On an axiomatization of the Banzhaf value without the additivity axiom. Int.J. Game Theory 26, 137-141.
Owen, G., 1978. Characterization of the Banzhaf-Coleman index. SIAM Journal of AppliedMathematics 35, 315-327.
Preneel, B., 1993. Analysis and design of cyptographic hash functions. Doctoral Dissertation,K.U. Leuven.
Sarkar, P., Maitra, S., 2002. Cross-Correlation analysis of cryptographically useful booleanfunctions and S-boxes. Theory of Computing Systems 35, 39-57.
Shapley, L.S., 1953. A value for n-person games. In: Kuhn, H.W., Tucker, A.W. (Eds.),Contributions to the Theory of Games II (Annals of Mathematics Studies). Princeton UniversityPress, Princeton, pp. 307-317.
Shapley, L.S., Shubik, M.J., 1954. A method for evaluating the distribution of power in acommittee system. Amer. Polit. Sci. Rev. 48, 787-792.
Siegenthaler, T., 1984. Correlation-immunity of nonlinear combining functions for cryptographicapplications. IEEE Transactions on Information Theory IT-30(5), 776-780.
Xiao, G., Massey, J.L., 1988. A spectral characterization of correlation-immune combiningfunctions. IEEE Transactions on Information Theory, 569-571.
Young H.P., 1985. Monotonic solutions of cooperative games. Int. J. Game Theory 14, 65-72.
Zhang, X. M., Zheng, Y., 1995. GAC- the criterion for global avalanche characteristics ofcryptographic functions. Journal for Universal Computer Science 1, 316-333.