On Domains That Admit Well-behaved Strategy-proof Social Choice Functions

Similar documents
A Characterization of Single-Peaked Preferences via Random Social Choice Functions

DICTATORIAL DOMAINS. Navin Aswal University of Minnesota, Minneapolis, USA Shurojit Chatterji Indian Statistical Institute, New Delhi, India and

MAXIMAL POSSIBILITY AND MINIMAL DICTATORIAL COVERS OF DOMAINS

The Gibbard random dictatorship theorem: a generalization and a new proof

The Structure of Strategy-Proof Social Choice:

Coalitionally strategyproof functions depend only on the most-preferred alternatives.

Non-Manipulable Domains for the Borda Count

Incentive-Compatible Voting Rules with Positively Correlated Beliefs

A General Impossibility Result on Strategy-Proof Social Choice Hyperfunctions

The Structure of Strategy-Proof Social Choice

Sufficient Conditions for Weak Group-Strategy-Proofness

Economics Bulletin, 2012, Vol. 32 No. 1 pp Introduction. 2. The preliminaries

Coalitional Structure of the Muller-Satterthwaite Theorem

arxiv: v1 [cs.gt] 10 Apr 2018

Approximation Algorithms and Mechanism Design for Minimax Approval Voting

Implementation in undominated strategies by bounded mechanisms: The Pareto Correspondence

Resource Allocation via the Median Rule: Theory and Simulations in the Discrete Case

INTEGER PROGRAMMING AND ARROVIAN SOCIAL WELFARE FUNCTIONS

Nash implementable domains for the Borda count

BIPARTITE GRAPHS AND THE SHAPLEY VALUE

arxiv: v2 [math.co] 14 Apr 2011

Tighter Bounds for Facility Games

The Axiomatic Method in Social Choice Theory:

Positive Political Theory II David Austen-Smith & Je rey S. Banks

Strategy-proof social choice on multiple singlepeaked domains and preferences for parties

The Single-Peaked Domain Revisited: A Simple Global Characterization *

6.207/14.15: Networks Lecture 24: Decisions in Groups

W. ALLEN WALLIS Institute of POLITICAL ECONOMY

THE UNIVERSITY OF KANSAS WORKING PAPERS SERIES IN THEORETICAL AND APPLIED ECONOMICS

A MAXIMAL DOMAIN FOR STRATEGY-PROOF AND NO-VETOER RULES IN THE MULTI-OBJECT CHOICE MODEL

THREE BRIEF PROOFS OF ARROW S IMPOSSIBILITY THEOREM JOHN GEANAKOPLOS COWLES FOUNDATION PAPER NO. 1116

Ordinal Bayesian Incentive Compatibility in Restricted Domains

arxiv: v2 [math.co] 7 Jan 2016

Rationalization of Collective Choice Functions by Games with Perfect Information. Yongsheng Xu

Arrow s Paradox. Prerna Nadathur. January 1, 2010

THE STRUCTURE OF 3-CONNECTED MATROIDS OF PATH WIDTH THREE

Approximation Algorithms and Mechanism Design for Minimax Approval Voting 1

Social Choice Theory. Felix Munoz-Garcia School of Economic Sciences Washington State University. EconS Advanced Microeconomics II

Parameterization of Strategy-Proof Mechanisms in the Obnoxious Facility Game

13 Social choice B = 2 X X. is the collection of all binary relations on X. R = { X X : is complete and transitive}

Single-plateaued choice

The Bargaining Set of an Exchange Economy with Discrete. Resources

Worst-case mechanism design with undominated strategies

Non Fixed-price Trading Rules in Single-crossing Classical Exchange Economies

Strategy-Proofness and Efficiency in a Mixed-Good Economy with Single-Peaked Preferences

Hans Peters, Souvik Roy, Soumyarup Sadhukhan, Ton Storcken

Anna Bogomolnaia and Matthew O. Jackson. April, This Revision: January Forthcoming: Games and Economic Behavior.

A Note on Object Allocation under Lexicographic Preferences

Approval Voting for Committees: Threshold Approaches

Appendix of Homophily in Peer Groups The Costly Information Case

Social Choice and Mechanism Design - Part I.2. Part I.2: Social Choice Theory Summer Term 2011

Hans Peters, Souvik Roy, Ton Storcken. Manipulation under k-approval scoring rules RM/08/056. JEL code: D71, D72

Identifying Groups in a Boolean Algebra

We set up the basic model of two-sided, one-to-one matching

Strategy-Proofness and the Core in House Allocation Problems

Core and Top Trading Cycles in a Market with Indivisible Goods and Externalities

Arrow s Theorem as a Corollary

Connectivity and tree structure in finite graphs arxiv: v5 [math.co] 1 Sep 2014

Unanimity, Pareto optimality and strategy-proofness on connected domains

Strategy proofness and unanimity in private good economies with single-peaked preferences

DEPARTMENT OF ECONOMICS IMPLEMENTATION IN MIXED NASH EQUILIBRIUM

Single-peaked consistency and its complexity

Ordered Value Restriction

Bayesian Persuasion Online Appendix

COALITIONALLY STRATEGY-PROOF RULES IN ALLOTMENT ECONOMIES WITH HOMOGENEOUS INDIVISIBLE GOODS

Positively responsive collective choice rules and majority rule: a generalization of May s theorem to many alternatives

Nowhere-zero flows in signed series-parallel graphs arxiv: v1 [math.co] 6 Nov 2014

Stagnation proofness and individually monotonic bargaining solutions. Jaume García-Segarra Miguel Ginés-Vilar 2013 / 04

The core of voting games: a partition approach

Existence of Nash Networks in One-Way Flow Models

Economic Core, Fair Allocations, and Social Choice Theory

Mechanism Design without Money

Characterizations of the finite quadric Veroneseans V 2n

Rules for Aggregating Information

CHAPTER 7. Connectedness

Housing Markets with Indifferences: a Tale of Two Mechanisms

Dependence and Independence in Social Choice Theory

A Note on the McKelvey Uncovered Set and Pareto Optimality

WARWICK ECONOMIC RESEARCH PAPERS

Optimal Mechanism Design without Money

Judgement Aggregation

Strategy-Proof Voting Rules over Restricted Domains

Condorcet Domains, Median Graphs and the Single-Crossing Property *

Copyright 2013 Springer Science+Business Media New York

UNIVERSITY OF KANSAS WORKING PAPERS SERIES IN THEORETICAL AND APPLIED ECONOMICS

Social Dichotomy Functions (extended abstract)

Monotonic ɛ-equilibria in strongly symmetric games

Price of Stability in Survivable Network Design

Tree sets. Reinhard Diestel

Allocating Public Goods via the Midpoint Rule

Math 145. Codimension

Countable Menger s theorem with finitary matroid constraints on the ingoing edges

An axiomatic characterization of the position value for network situations

On the intersection of infinite matroids

Approximation algorithms and mechanism design for minimax approval voting

Social Welfare Functions that Satisfy Pareto, Anonymity, and Neutrality: Countable Many Alternatives. Donald E. Campbell College of William and Mary

APPLIED MECHANISM DESIGN FOR SOCIAL GOOD

Notes on Social Choice Theory

Robust Knowledge and Rationality

Generalized Pigeonhole Properties of Graphs and Oriented Graphs

Transcription:

On Domains That Admit Well-behaved Strategy-proof Social Choice Functions Shurojit Chatterji, Remzi Sanver and Arunava Sen May 2010 Paper No. 07-2010 ANY OPINIONS EXPRESSED ARE THOSE OF THE AUTHOR(S) AND NOT NECESSARILY THOSE OF THE SCHOOL OF ECONOMICS & SOCIAL SCIENCES, SMU

On domains that admit well-behaved strategy-proof social choice functions Shurojit Chatterji, Remzi Sanver and Arunava Sen May 18, 2010 Abstract In this paper, we investigate domains which admit well-behaved, strategy-proof social choice functions. We show that if the number of voters is even, then every domain that satisfies a richness condition and admits an anonymous, tops-only, unanimous and strategy-proof social choice function, must be semi-single-peaked. Conversely every semi-single-peaked domain admits an anonymous, tops-only, unanimous and strategyproof social choice function. Semi-single-peaked domains are generalizations of singlepeaked domains on a tree introduced by Demange (1982). We provide sharper versions of the results above when tops-onlyness is replaced by tops-selectivity and the richness condition is weakened. Keywords and Phrases: Voting-rules, Strategy-proofness, Restricted Domains, Tops- Only domains. JEL Classification Numbers: D71 1 Introduction The celebrated Gibbard-Satterthwaite Theorem (Gibbard (1973), Satterthwaite (1975)) rules out the existence of strategy-proof, non-dictatorial social choice function over the complete domain of preferences. This is a powerful negative result and has stimulated a very large literature which has investigated the structure of strategy-proof social choice functions on restricted domains. One of the most salient restricted domains in this respect is the domain of single-peaked domains. It is now well-known that these domains admit a large class Singapore Management University, Singapore. Bilgi University, Istanbul, Turkey. Indian Statistical Institute, New Delhi, India. 1

of strategy-proof social choice functions satisfying additional, attractive properties such as anonymity and Pareto-efficiency. These include the median voter rule (see Moulin (1980)). Of course, single-peaked domains are also very important in Arrovian aggregation theory and forms the bedrock of the modern theory of political economy. In this paper, we address a converse question. What are the domains that admit well-behaved strategy-proof social choice functions? In particular, do single-peaked domains emerge in a natural way from a characterization of domains that admit well-behaved strategy-proof social choice functions? We consider a standard voting environment with a finite number of individuals/voters and alternatives. Preferences are assumed to be antisymmetric. We provide two partial characterizations of domains. Our first result states that if the there is an even number of individuals, then any domain that satisfies a richness condition and admits an anonymous, tops-only, unanimous and strategy-proof social choice function, is semi-single-peaked. Moreover every semi-single-peaked domain admits an anonymous, tops-only, unanimous and strategy-proof social choice function for an arbitrary number of individuals. Our second result considers the case where the tops-only condition is replaced by the tops-selectivity condition. We show that if there is an even number of individuals, then any domain that satisfies a weaker richness condition than in the first result and admits an anonymous, tops-selective, unanimous and strategy-proof social choice function, is extreme-peaked. Moreover every extreme-peaked domain admits an anonymous, tops-selective, unanimous and strategy-proof social choice function for an arbitrary number of individuals. As the name suggests, semi-single-peakedness is closely related to single-peakedness. In fact, it is a generalization of the notion of single-peaked preferences on a tree initially proposed by Demange (1982) in a different context. Semi-single-peakedness is defined in the following way. There is a tree where the nodes are alternatives. There is also a distinguished alternative on every maximal path in the tree which we refer to as the threshold on that path. The location of thresholds on different maximal paths are subject to strong restrictions. Semi-single peaked preferences on every path satisfy two restrictions: (i) they decline along the path from the peak in the direction of the threshold on that path (ii) alternatives that lie beyond the threshold are worse than the threshold. Single-peaked preferences are a special case of semi-single-peaked preferences when the underlying tree is a line and the preference restrictions are satisfied with respect to any placement of the threshold. An important respect in which semi-single-peaked preferences differ from single-peaked preferences is that, unlike the latter, restrictions are imposed in one direction. Extreme-peaked preferences are a special case of single-peaked preferences when the underlying tree is a line and the threshold is at one extremity of the line. In Section 3, we discuss semi-single peakedness at greater length and note that the domain of single-peaked preferences is the largest domain of neutral semi-single-peaked preferences. One feature of our results deserves special mention. The notions of semi-single-peakedness and extreme-peakedness are based on an underlying structure on alternatives (a tree in the 2

case of semi-single-peakedness and a line in the case of extreme-peakedness). We do not start with the assumption that there is an underlying structure of a tree or a line on alternatives; instead we uncover this structure as a consequence of our assumption that the domain admits well-behaved, strategy-proof social choice functions. The only structure that we impose on alternatives is via a richness condition on domains that we have used in our earlier papers (Aswal et al. (2003) and Chatterji and Sen (2010)). For the semi-single-peakedness result, we assume that the domain is strongly path-connected. Two alternatives a i and a j are strongly path-connected if there exists an ordering in the domain where a i and a j are ranked first and second respectively and another one where the reverse is true; moreover the rankings of other alternatives are the same in the two orderings. We require that the graph of strong connections be path connected; i.e. that we can find a path between any pair of alternatives in terms of strong connections. Importantly, we do not make any other assumptions on this graph. One of the major steps in our proof is to show that if such a domain admits a well-behaved strategy-proof social choice function, then this graph must be a tree. We go on to show that there must be appropriate thresholds on every path of the tree and that preferences must satisfy appropriate restrictions with the respect to the tree and the specification of the thresholds. For the extreme peakedness result we require an even weaker notion of path-connectedness. Two alternatives a i and a j are weakly connected if there exists an ordering in the domain where a i and a j are ranked first and second respectively and another one where the reverse is true. We say that the domain is rich if there exists a path between any pair of alternatives in terms of weak path-connectedness. We then show that if such a domain admits an anonymous, tops-selective and strategy-proof social choice function, then the graph of weak connections must be a line. In addition, the threshold must be an extreme point of the line and that preferences must be extreme-peaked. In a series of papers (Nehring and Puppe (2007b), Nehring and Puppe (2007a)) investigate the structure of strategy-proof social choice functions in an abstract algebraic setting. Formally our results are independent of theirs; however some of their results are motivated by similar concerns. We discuss the relationship between our results in Section 3.1. There are several other papers (Danilov (1994), Schummer and Vohra (2002)) that investigate the structure of strategy-proof social choice functions that choose locations on trees where preferences are single-peaked-like (such as quadratic). It is clear that our focus is different from these papers; however our results confirm that such domains are salient from the point of view of admitting well-behaved, strategy-proof social choice functions. Recently Ballester and Haeringer (2007) have provided a characterization of single-peaked preferences using axioms directly on voter preferences and profiles. In contrast, our approach focuses on domains that admit well-behaved strategy-proof social choice functions. The paper is organized as follows. In Section 2, we set out the model and the basic definitions. Sections 3 and 4 are concerned with semi-single-peaked and extreme-peaked domains respectively. Section 5 concludes. 3

2 Preliminaries We let A = {a 1,..., a m } denote the set of alternatives where > m 3. There is a finite set of voters or individuals N = {1,..., n} with n 2. Each voter i is assumed to have a linear order P i over the elements of the set A which we shall refer to as her preference ordering. For all a j, a k A, a j P i a k will signify the statement a j is strictly preferred to a k according to P i. We let P be the set of all linear orders over the elements of the set A. The set of all admissible orderings is a set D P. A preference profile P = (P 1,..., P n ) D n is a list of admissible preference orderings, one for each voter. For all s = 1,..., m, P i D, and a j A, we shall say that a j is s th ranked in P i if {a k A a j P i a k } = m s. We will write a j = r s (P i ) if a j is s th ranked in P i. The object of study of the paper is a social choice function (SCF). An SCF is a mapping f : D n A. We restrict attention to SCF s that satisfy unanimity, that is, f(p ) = a j whenever P D n is such that a j = r 1 (P i ), i = 1,..., n. We will also assume that D satisfies minimal richness, which requires that for each a j A, there exists P i D such that r 1 (P i ) = a j, j = 1,..., m. In our framework each voters preference ordering is private information; they must therefore be elicited by the mechanism designer. If an SCF is strategy-proof, then no voter can benefit by misrepresenting her preferences irrespective of her beliefs about the preference announcement of other voters. Formally, an SCF is strategy-proof if for all P = (P i, P i ) D n, and for all P i D, we have either f(p i, P i ) = f(p i, P i ) or f(p i, P i )P i f(p i, P i ). An SCF is tops-only if it is determined completely by the peaks of the voters preferences, that is, f(p ) = f(p ) whenever r 1 (P i ) = r 1 (P i ), i = 1,..., n. An SCF is top-selective if for each profile P of preference orderings, f(p ) {a k a k = r 1 (P i ), i {1,..., n}}. In order to define an anonymous SCF, we let η : N N denote a one to one function and define the η permutation of a profile P of preference orderings as the profile P η = (P η(1),..., P η(n) ). An SCF is anonymous if for any profile P and any η permutation of P, f(p ) = f(p η ). 3 Tops-Onlyness and Semi-Single-Peaked Domains In this section we investigate domains which admit a strategy-proof, anonymous, unanimous and tops-only SCF. We require domains under consideration to satisfy a further richness condition which we describe below. Definition 1 Two alternatives a j, a k are strongly connected in D, denoted a j a k, if there exists P i, P i D such that (i) r 1 (P i ) = a j = r 2 ( P i ) (ii) r 2 (P i ) = a k = r 1 ( P i ) 4

(iii) r j (P i ) = r j ( P i ), j = 3,..., m. According to the definition, two alternatives a j, a k are strongly connected if there exists an admissible ordering where a j and a k are ranked first and second respectively; another ordering where a k and a j are ranked first and second respectively while both orderings agree in the ranking of the rest of the alternatives. This notion is a strengthening of the connectedness condition (see Definition 5 below) that was introduced in Aswal et al. (2003) and used subsequently in Chatterji and Sen (2010). Definition 2 The domain D is strongly path-connected iff for all a r, a s A, there exists a sequence of alternatives a j(k) A, k = 0,..., T such that (i) a j(0) = a r (ii) a j(t ) = a s (iii) a j(k) a j(k+1), k = 0,..., T 1. It is convenient to think of strong path-connectedness in terms of graphs. Fix a domain D. Consider a graph whose nodes are the elements of A. Two nodes in this graph constitute an edge if they are strongly connected. The domain D is strongly path-connected if every pair of nodes in this graph can be joined by a sequence of edges, i.e if the graph is connected. Strong path-connectedness is a richness condition on the admissible domain of preferences in that it requires that there be sufficiently many strong connections among alternatives. This condition is satisfied by many of the admissible domains that have been studied in the literature on strategy-proofness. We give some examples below. Example 1 The domain of all preference orderings P is clearly a strongly path connected domain. The associated strong connectivity graph is the complete graph on A. Note that there are much smaller domains whose strong connectivity graph is the complete graph on A. The smallest such domain has M(M 1) orderings. Example 2 Single-Peaked Domains These domains were introduced in Black (1948) and have been extensively studied in the context of strategy-proofness. (see, for example Moulin (1980)). Let > be a linear ordering over A. A preference ordering P i is single-peaked (with respect to >) if for all a, b A, [r 1 (P i ) > a > b or b > a > r 1 (P i )] = ap i b. Alternatives are ordered, say on the real line. An ordering is single-peaked if alternative a which lies between the peak of the ordering and another alternative b, is strictly preferred to b. We will let D SP denote the set of all single-peaked preferences with respect to some fixed order >. 5

a 1 a 2 a 6 a 3 a 5 a 4 Figure 1: The graph G We claim that D SP is a strongly connected domain. To see this assume without loss of generality that a 1 > a 2 >... > a m. Note that for any ordering in D SP, if a j is first-ranked, then either a j+1 or a j 1 must be ranked-second, for any j = 2,..., m. If a 1 is first, then a 2 must be second and if a m is first, then a m 1 must be second. A critical observation is that if an ordering is single-peaked, then the ordering obtained by switching the first and second alternatives while leaving all other alternatives unchanged, is also single-peaked. Thus a 1 a 2... a m. The strong connectivity graph for this case is shown in Figure 2 below. Example 3 We can start with an arbitrary connected graph on A and construct a domain which induces the graph as its strong connectivity graph. For instance let A = {a 1, a 2, a 3, a 4, a 5, a 6 }. Consider the graph G in Figure 1. The domain D induces G as its associated strong connectivity graph. P 1 P 2 P 3 P 4 P 5 P 6 P 7 P 8 P 9 P 10 P 11 P 12 a 1 a 2 a 2 a 3 a 3 a 3 a 4 a 4 a 5 a 5 a 6 a 6 a 2 a 1 a 3 a 2 a 6 a 4 a 3 a 5 a 6 a 4 a 3 a 5 a 3 a 3 a 4 a 4 a 5 a 2 a 2 a 3 a 3 a 3 a 5 a 3 a 6 a 6 a 6 a 6 a 4 a 1 a 1 a 2 a 4 a 2 a 4 a 4 a 5 a 5 a 5 a 5 a 2 a 5 a 5 a 1 a 2 a 1 a 2 a 2 a 4 a 4 a 1 a 1 a 1 a 6 a 6 a 6 a 1 a 6 a 1 a 1 Table 1: The domain D Observe that D is not the unique domain which induces G. In fact, it is a minimal in the set of domains which induce G, i.e. there does not exist a domain of smaller size which induces G. If one assumes that domains under consideration satisfy the symmetry requirement that 6

if there exists an ordering with a j first and a k second ranked, then there exists another ordering with a k first and a j second ranked, then the maximal domain inducing G has 288 orderings. In general, suppose G is an arbitrary strong connectivity graph. Suppose G has e edges. Let D be a domain satisfying the symmetry property described above whose associated connectivity graph is G and let D denote its cardinality. Then, it is easy to verify that 2e D 2e(m 2)!. Conversely, let t be an even integer with 2e t 2e(m 2)!. Then there exists a domain D with D = t such that D induces G. We give an example below of a class of well-known domains that violate the property of strong path-connectedness. Example 4 Separable Preferences over Product Domains (LeBreton and Sen (1999), Barberá et al. (1991), Barberà et al. (1993)). In this setting the set A is the product of M component sets, i.e A A 1... A M where A j 2 for all j = 1,..., M. We shall write a typical element a A as a (a 1,..., a M ) or (a Q, a Q ) where Q {1,..., M}. The ordering P i is separable if for all Q {1,..., M}, and a, b, c, d A, we have [(a Q, c Q )P i (b Q, c Q ) = [(a Q, d Q )P i (b Q, d Q )]. We shall let D SEP denote the set of all separable preferences over A. We claim that D SEP violates path-connectedness. To see this pick P i and let r 1 (P i ) = a. Separability implies that the second ranked alternative in P i must be of the form (b k, a k ) for some b k A k and some k {1,..., M}. Assume without loss of generality that k = 1. Pick b 2 A 2 such that b 2 a 2. Since P i is separable, we must have (a 1, b 2, a {1,2} )P i (b 1, b 2, a {1,2} ). Now consider any P i D SEP such that r 1 (P i ) = (b 1, a 1 ) and r 2 (P i ) = a. Separability of P i implies that (b 1, b 2, a {1,2} )P i (a 1, b 2, a {1,2} ). Hence P i contains at least two preference reversals relative to P i contradicting part (iii) of Definition 1. Thus no pair of alternatives is strongly connected, i.e D SEP is not strong path-connected. We address the following question: what strongly connected domains D admit SCFs that are strategy-proof, anonymous, unanimous and satisfy the tops-only property? The class of domains that we will identify in this context is related to the domains initially identified in Demange (1982). In order to do so we need some additional concepts. Let G be a connected graph, the set of whose nodes is A. Recall that a path in G is a sequence {a j(k) }, k = 0,..., T such that every pair (a j(k), a j(k+1) ), k = 0,... T 1 is an edge in G. We say that G is a tree if there is a unique path linking every pair a j, a k A. In other words G contains no cycles. The graph in Figure 1 is not a tree but the graphs in Figures 2, 3, 4 are trees. A path {a j(k) }, k = 0,..., T in a tree G is maximal if there does not exist an alternative a r distinct from a j(0) or an alternative a s distinct from a j(t ) such that (a r, a j(0) ) or (a s, a j(t ) ) 7

a 1 a 2 a 3 a 4 a 5 a 6 Figure 2: Connectivity Graph G L : The Line a 3 a 2 a 1 a 6 a 5 a 4 Figure 3: Connectivity Graph G S : The Star a 1 a 3 a 2 a 5 a 4 a 6 Figure 4: Connectivity Graph G 0 are edges in G. In other words, a path is maximal if it cannot be extended by adding more edges at the ends. Note that every path in G can be extended to a maximal path. For any pair of distinct alternatives a j, a k A, we will let a j, a k denote the unique path connecting a j and a k. If a r is one of the alternatives in the sequence of alternatives which comprises the path between a j and a k, we shall simply say that a r belongs to the path between a j and a k and write it as a r a j, a k. We will let int a r, a s denote the alternatives in the path a r, a s excluding a r and a s. We will also let a j, a k denote a maximal path containing a j and a k. We shall let P(G) = {p 1,... p R } denote the set of maximal paths in G. Observation 1 Let p t P(G) and let a l / p t. We claim that there exists a unique alternative, a r p t such that every path from any a s p t to a l, contains a r. To see this, pick an arbitrary a s p t and consider the unique path a s, a l. Without loss of generality, represent this path by the sequence {a j(k) }, k = 0,... T where a j(0) = a s and a j(t ) = a l. Let k be the minimal integer such that a j(k ) p t and a j(k +1) / p t. Such an integer clearly exists. We claim that a j(k ) is the alternative a r. To verify this pick any another a s p t and suppose that the path from a s to a l does not contain a j(k ). Then we have another path from a s to a l : from a s to a j(k ) on p t and then the path {a j(k) }, k = k,... T. This contradicts the assumption that G is a tree. A similar argument shows that a r is unique. For any maximal path p t and a k / p t, let γ(p t, a k ) be the alternative a r described in the previous paragraph, i.e. a r is the unique alternative in p t with the property that every path 8

from an alternative in p t to a k contains a r. Consider for example the graph in Figure 4. Let p t = {a 1, a 2, a 3 } and let a k = a 4. Clearly a k / p t. Then γ(p t, a k ) = a 2 because all paths connecting nodes in p t contain a 2. Definition 3 Let G be a tree. The map λ : P(G) A is a Threshold Assignment Map (TAM) if there exists a k A such that (i) For all p t P(G), [a k p t ] = [λ(p t ) = a k ]. (ii) For all p t P(G), [a k / p t ] = [λ(p t ) = γ(p t, a k )]. The function λ specifies a threshold for every maximal path in G. In particular, there exists an alternative a k such that the threshold for every maximal path containing a k is a k ; for maximal paths that do not contain a k, the threshold is the unique alternative that lies on every path from an alternative on the path and a k (Observation 1). Let G be a tree and λ, a TAM (for G). We shall refer to the pair (G, λ) as an admissible pair. We give some examples of admissible pairs. Observe that there exists a unique maximal path {a 1, a 2..., a 6 } in G L. Here, the threshold for the unique maximal path can be any of the alternatives a 1,..., a 6. Formally, let λ i be the function that associates the alternative a i, i = 1, 2... 6 with the unique maximal path. Then (G L, λ i ) is an admissible pair. There are 10 maximal paths in G S of the form {a j, a 1, a k } where j, k {2, 3, 4, 5, 6} with j k. One TAM λ 1 specifies a 1 as the threshold for every maximal path. In addition, let λ j, j = 2, 3... 6 be the TAMs which specify a j as the threshold for every maximal path containing a j and a 1 for every other maximal path. The only admissible pairs here, are (G S, λ j ), j = 1, 2..., 6. Maximal paths in G 0 are as follows: p 1 = {a 1, a 2, a 3 }, p 2 = {a 4, a 5, a 6 }, p 3 = {a 1, a 2, a 5, a 4 }, p 4 = {a 1, a 2, a 5, a 6 }, p 5 = {a 3, a 2, a 5, a 4 } and p 6 = {a 3, a 2, a 5, a 6 }. Define the function λ 4 as follows: λ 4 (p 1 ) = a 2, λ 4 (p t ) = a 4 for t = 2, 3, 5 and λ 4 (t) = a 5 for t = 4, 6. Then λ 4 is a TAM and (G 0, λ 4 ) is an admissible pair. Other admissible pairs can be similarly defined. We now define restrictions on preferences. Definition 4 The domain D is semi-single-peaked with respect to the admissible pair (G, λ) such that for all P i D and all p t P(G) such that r 1 (P i ) p t, we have (i) [a r p t such that λ(p t ) r 1 (P i ), a r ] = [λ(p t )P i a r ]. (ii) [a r, a s p t such that a r, a s r 1 (P i ), λ(p t ) and a r r 1 (P i ), a s ] = [a r P i a s ]. We say that D is semi-single-peaked if there exists and admissible pair (G, λ) with respect to which it is semi-single-peaked. 9

Let P i be a semi-single peaked ordering. Let a be the peak of P i. Pick a maximal path p t containing a. Let b be the threshold for this path, i.e. λ(p t ) = b. Then, it must be the case preferences decline on the path from a to b. Moreover b is better (according to P i ) than any alternative c which is further along p t than b in the direction away from a. These restrictions are shown in the diagram below. lambda(path) Peak path Figure 5: Semi-Single Peaked Preferences Consider the admissible pair (G L, λ 3 ), i.e the λ for the unique path is a 3. Consider the preference orderings below. P 1 P 2 P 3 P 4 P 5 a 5 a 5 a 5 a 5 a 5 a 6 a 4 a 4 a 3 a 4 a 4 a 3 a 3 a 4 a 1 a 3 a 6 a 1 a 6 a 3 a 1 a 2 a 2 a 2 a 2 a 2 a 1 a 6 a 1 a 6 Table 2: Preferences in the case (G L, λ 3 ) In Table 2, preference orderings P 1, P 2 and P 3 are semi-single- peaked for (G L, λ 3 ). However P 4 and P 5 are not; P 4 and P 5 violate parts (ii) and (i) of Definition 4 respectively. Consider semi-single-peaked preferences with respect to the admissible pair (G S, λ j ), for any j = 1,..., 6. All such preference orderings are subject to the same restriction: whenever a j, j = 2,..., 6 is ranked first, a 1 must be ranked second. No other restrictions are implied. Finally, consider semi-single-peaked preferences with respect to (G 0, λ 4 ). Suppose a 1 is ranked first in P i. Then semi-single-peakedness would require (i) a 2 to be ranked above a 3 (ii) a 2 should be ranked above a 5 which in turn should be ranked above both a 4 and a 6. In Table 3, P 1, P 2 and P 3 are semi-single-peaked with respect to (G 0, λ 4 ) but P 4 and P 5 are not. Semi-single-peaked preferences are clearly related to single-peaked orders on a tree introduced by Demange (1982). An order > is single-peaked on a tree G if and only if it is 10

P 1 P 2 P 3 P 4 P 5 a 1 a 5 a 2 a 5 a 2 a 2 a 6 a 3 a 3 a 4 a 5 a 2 a 5 a 4 a 1 a 3 a 4 a 1 a 6 a 3 a 6 a 3 a 4 a 2 a 5 a 4 a 1 a 6 a 1 a 6 Table 3: Preferences in the case (G 0, λ 4 ) single-peaked on every path of G. This notion was introduced in the context of aggregation theory. In particular it was shown that a non-empty core is guaranteed for every simple game defined on the set of players N and profiles of single-peaked orders on G. Moreover, such preferences were the largest set which had the non-emptiness of the core property. We identify semi-single-peaked domains as a salient domain in a different context; we show that domains which admit well-behaved SCFs are semi-single-peaked provided they satisfy some richness conditions. It is important to point out that single-peaked orders on a tree are a subset of semisingle-peaked preferences. In fact the set of semi-single-peaked preferences is significantly larger than the set of single-peaked orders on a tree. This is because semi-single-peaked preferences are restricted only on one side of the peak. In contrast single-peaked preferences are restricted on both sides of the peak. Consider the simplest case where G is a line (Figure 2). Suppose a 3 is the peak. Then single-peakedness would require a 2 to be ranked above a 1 and a 4 to be ranked above a 5 and a 5 to be ranked above a 6. Semi-single-peakedness specifies an additional alternative, the threshold, say a 4. Suppose a 2 is the peak. We only impose restrictions on alternatives in the increasing direction from a 2 ; in particular a 3 should be better than a 4 and a 5 and a 6 must be worse than a 4. We can make the relationship between semi-single-peaked and single peaked preference on a tree, precise. Let G be a tree and let D SP (G) denote the set of single-peaked preferences on G. Let (G, λ) be an admissible pair and let D(G, λ) denote the set of semi-single-peaked preferences with respect to (G, λ). Finally, let Λ(G) denote the set of TAMs λ such that (G, λ) is admissible. The following proposition establishes the connection between singlepeakedness and semi-single-peakedness. Proposition 1 D SP (G) = λ Λ(G) D(G, λ). Proof : It is easy to check that if P i D SP (G), then P i λ Λ(G) D(G, λ). Now suppose that P i λ Λ(G) D(G, λ) but P i / D SP (G). There must therefore exist alternatives b, c and a path p t containing r 1 (P i ) and b, c such that b r 1 (P i ), c and cp i b. Let λ be a TAM where 11

the alternative a k in Definition 3 is the alternative c. Then P i violates part (ii) in Definition 4, contradicting the assumption that P i D(G, λ). Proposition 1 implies that the domain of single-peaked preferences on a tree G, is the largest domain of semi-single-peaked domains consistent with all specifications of thresholds. Single-peaked preferences are therefore, neutral within the class of semi-single-peaked preferences, i.e. one where it is not necessary to specify thresholds. We note that a meaningful notion of a neutral domain requires restrictions on the set of admissible permutations on alternatives with respect to which the neutrality property is defined. If neutrality is required with respect to all permutations of alternatives then the only neutral domain is the complete domain P. According to Proposition 1, single-peaked preferences is the neutral domain where admissible permutations can relabel thresholds arbitrarily. However the ordering generated by such a permutation must be semi-single-peaked with respect to the relabeled threshold. Can one offer a behavioural justification of semi-single-peaked preferences? For every path p t P(G), one can think of the threshold λ(p t ), as a focal point beyond (in the direction away from the peak) which preferences are comparatively vague. Consider a tax-payer s preferences over tax rates from 0 to a 100 percent. If she has a threshold of 25 percent and a peak of 10 percent, then her preferences decline till 25. Beyond this threshold, she has no views (say whether 45 percent is better than 50 percent) except that everything is worse than 25 percent. On the other hand, if her peak is 40 percent, then her preferences decline till 25 percent with everything below 25 percent less-well preferred to 25 percent. We now state our main result. Theorem 1 Let D be a strongly path-connected domain and let n be an even integer. If there exists an anonymous, tops-only, unanimous and strategy-proof SCF f : D n A, then D is semi-single peaked. Conversely, if D is a semi-single-peaked domain, then there exists an anonymous, strategy-proof, tops-only and unanimous SCF f : D n A for all integers n. Proof : We first prove the first part of the Theorem. We begin with a Proposition which is of some independent interest. Proposition 2 Let D be an arbitrary domain and let n be a positive even integer. Suppose there exists an anonymous, tops-only, unanimous and strategy-proof SCF f : D n A. Then there exists an anonymous, tops-only, unanimous and strategy-proof SCF g : D 2 A. Proof : Let f : D n A be a anonymous, tops-only and strategy-proof SCF and suppose n is even. Let N 1 = {1,..., n} and let N 2 = { n + 1,..., n}. Define g : 2 2 D2 A as follows. Pick an arbitrary pair P 1, P 2 D. Then g(p 1, P 2 ) = f(p ) where P D n and P j = P 1 for all j N 1 and P j = P 2 for all j N 2. In other words, the value of G at the two-individual profile (P 1, P 2 ) is the value of the f at the n-individual profile P where all individuals in the 12

set N 1 have the same ordering P 1 and all individuals in N 2 have the same ordering P 2. It is easy to verify that g is unanimous and tops-only (these properties are inherited from the corresponding properties in f). We show below that g is anonymous and strategy-proof. In order to show that g is anonymous, pick P 1, P 2 D. We will show that g(p 1, P 2 ) = g(p 2, P 1 ). Let P be the n-individual profile where individuals in N 1 and N 2 have the orderings P 1 and P 2 respectively and let P be the n-individual profile where individuals in N 1 and N 2 have the orderings P 2 and P 1 respectively. Consider the permutation η : N N defined by η(i) = (i + n) mod n. Observe that P is the image of P under η, i.e. P η = P. Since 2 f is anonymous, f(p ) = f( P ). But g(p 1, P 2 ) = f(p ) and g(p 2, P 1 ) = f( P ), so that g is anonymous. We now show that g is strategy-proof. Pick arbitrary orderings P 1, P 1, P 2 D. Once again let P be the n-individual profile where individuals in N 1 and N 2 have the orderings P 1 and P 2 respectively. Let g(p 1, P 2 ) = f(p ) = a. Let f(p 1, P 1,..., P 1, P 2,..., P 2 ) = b. We must have either b = a or ap 1 b; otherwise individual 1 would manipulate in P via P 1 contradicting the strategy-proofness of f. Now let f(p 1, P 1, P 1..., P 1, P 2,..., P 2 ) = c. In order to prevent individual 2 from manipulating in the profile (P 1, P 1,..., P 1, P 2,..., P 2 ) via P 1, we must have c = b or bp 1 c, i.e either c = a or ap 1 c. Progressively switching individual preferences in the set N 1 from P 1 to P 1, we obtain that if g(p 1, P 2 ) = x, then either x = a or ap 1 x. Therefore g is strategy-proof. 1 Let D be a strongly path-connected domain. Suppose that there exists n even, such that there exists f : D n A which is anonymous, tops-only, unanimous and strategy-proof. In view of Proposition 2, we can assume without loss of generality that n = 2. We will show that D is semi-single-peaked. Let f be a two-person anonymous, tops-only, unanimous and strategy-proof SCF. We shall denote the two individuals by i and j and their typical preference orderings by P i and P j respectively. Since f is tops-only we can also represent the profile (P i, P j ) by (a k, a r ) where a k and a r are the peaks of P i and P j respectively. Thus f(a k, a k ) will denote the social choice for a profile of preferences where individual i has a preference ordering whose peak is a k and j has a preference ordering whose peak is a k. We will also interchangeably use the notation (a k a l... ) to signify a preference ordering whose (i) peak is a k (ii) whose second ranked element is a l and (iii) the order of the remaining alternatives is not specified. Finally, a preference profile where individual i has the preference ordering (a k a l... ) and j has the preference ordering (a k a l...) is denoted (a k a l..., a k a l... ), and f(a k a l..., a k a l... ) will denote the outcome of f at this profile. We begin with two important properties of the relation associated with D. 1 It is clear from our proof that the following more general statement is true. Suppose that there exists an anonymous, tops-only, unanimous, strategy-proof SCF f : D n A. Then there exists an anonymous, tops-only, unanimous, strategy-proof SCF f : D m A whenever m divides n. 13

Lemma 1 Let a r, a s A such that a r a s. Then f(a r, a s ) {a r, a s }. Proof : Suppose the lemma is false, i.e let f(a r, a s ) = a k a r, a s. Since f is tops-only f(a r a s..., a s ) = a k (we are using the fact that there exists a feasible ordering a r a s... since a r a s ). But then individual i manipulates via (a s...) thereby obtaining a s since f is unanimous. Lemma 2 Let a r, a s A and suppose f(a r, a s ) = a r. Let a t be an alternative distinct from a r and a s. (i) If a t a s, then f(a r, a t ) = a r. (ii) If a t a r and a t a s, then f(a t, a s ) = a t. Proof : We consider (i) first. Since a s a t, we can find P j, P j D such that (i) r 1 (P j ) = a s = r 2 (P j) (ii) r 2 (P j ) = a t = r 1 (P j) and (iii) r l (P j ) = r l (P j), l = 3,..., m. Since f is topsonly f(a r, P j ) = a r. Suppose f(a r, P j) a r. If f(a r, P j)p j a r, then j manipulates at (a r, P j ) via P j. If a r P j f(a r, P j), then a r P jf(a r, P j) as well by construction, so that j manipulates at (a r, P j) via P j. Hence f(a r, P j) = a r. Since f is tops-only f(a r, a t ) = a r. We now show that (ii) holds. Since a t a r, we can find P i, P i D such that r 1 (P i ) = a r = r 2 (P i ) and (ii) r 2 (P i ) = a t = r 1 (P i ). Since f is tops-only f(p i, a s ) = a r. Since f is strategy-proof, it also follows from standard arguments that f(p i, a s ) {a r, a t }. Since a t a s, Lemma 1 that f(p i, a s ) {a t, a s }. Hence f(p i, a s ) = a t. Since f is tops-only f(a t, a s ) = a t as required. We can now demonstrate further important properties regarding the relation. Lemma 3 The relation does not admit cycles i.e. there does not exist a sequence a k(j), j = 0,..., T such that a k(j) a k(j+1), j = 0,..., T 1 and a k(t ) a k(0). Proof : Since a k(0) a k(1), Lemma 1 implies f(a k(0), a k(1) ) {a k(0), a k(1) }. Assume without loss of generality that f(a k(0), a k(1) ) = a k(0). Since a k(1) a k(2), Lemma 2 (i) implies f(a k(0), a k(2) ) = a k(0). Moreover applying the same argument along the sequence a k(j), j = 2,..., T, we obtain f(a k(0), a k(t ) ) = a k(0). Suppose to the contrary a k(0) a k(t ). Since f(a k(0), a k(t 1) ) = a k(0), a k(0) a k(t ) and a k(t ) a k(t 1), we can apply Lemma 2 to obtain f(a k(t ), a k(t 1) ) = a k(t ). Now applying Lemma 2 (i) repeatedly along the sequence a k(j), j = T 1,..., 0, we obtain f(a k(t ), a k(0) ) = a k(t ). By anonymity, f(a k(0), a k(t ) ) = a k(t ). But this contradicts our earlier conclusion that f(a k(0), a k(t ) ) = a k(0). We have demonstrated that the strong-connectivity graph induced by D is a tree. Let this tree be denoted by G. The set of its maximal paths will be denoted by P(G). 14

The distance between any pair a s, a r A, denoted by d(a s, a r ) is defined as {k s, r : a k a s, a r }. It is thus, the number of alternatives not including a s and a r that lie on the path between a s and a r. Lemma 4 f(a r, a s ) a r, a s for all a r, a s A. Proof : We prove the lemma by induction on d(a r, a s ). Observe first that the lemma holds in the case where d(a r, a s ) = 0 (i.e. a r = a s ) by virtue of the assumption that f is unanimous. Now suppose that f(a r, a s ) a r, a s whenever d(a r, a s ) t for some integer t < m 1. Pick a r, a s such that d(a r, a s ) = t + 1. Suppose f(a r, a s ) = a z / a r, a s. There must exist a k a r, a s such that a r a k. Note that d(a k, a s ) = t so that f(a k, a s ) a k, a s a r, a s. Since a r a k, there exists P i, P i D such that (i) r 1 (P i ) = r 2 ( P i ) = a r (ii) r 2 (P i ) = r 1 ( P i ) = a k and (iii) r j (P i ) = r j ( P i ) for j = 3,..., m. Since f is tops-only, f(p i, a s ) = a z. Moreover, using standard arguments for strategy-proofness, it follows that f( P i, a s ) = a z. Hence f(a k, a s ) = a z by tops-onlyness. Since a z / a r, a s by assumption, we have a contradiction to our earlier conclusion that f(a k, a s ) a k, a s. Pick an arbitrary pair a r, a s be such that d(a r, a s ) = 1. Let a r, a s be a maximal path. Suppose a r, a s = {a j(0),..., a j(k) = a r, a j(k+1), a j(k+2) = a s, a j(k+3)..., a j(t ) }. Lemma 5 (i) Suppose f(a r, a s ) = a r, i.e. f(a j(k), a j(k+2) ) = a j(k). Pick integers u, v such that u 0, u < v and k + v T. Then f(a j(k+u), a j(k+v) ) = a j(k+u). (ii) Suppose f(a r, a s ) = a s, i.e. f(a j(k), a j(k+2) ) = a j(k+2). Pick integers u, v such that v 0, u < v and k + u 0. Then f(a j(k+u), a j(k+v) ) = a j(k+v). Proof : We first prove (i). Consider the case where u = 0. Since f(a j(k), a j(k+2 ) = a j(k) and a j(k+1) a j(k+2), a direct application of Lemma 2(i) yields f(a j(k), a j(k+1) ) = a j(k). An identical argument yields f(a j(k), a j(k+3) ) = a j(k). Moreover, since a j(k+3) a j(k+4) etc till a j(k+v 1) a j(k+v), the same argument applied repeatedly yields f(a j(k), a j(k+v) ) = a j(k). Now consider the case where u = 1. Choose an arbitrary v such that v > 1 and k+v T. By Lemma 4, f(a j(k+1), a j(k+v) ) a j(k+1), a j(k+v). Note that since aj(k) a j(k+1), we can argue (like in the proof of Lemma 2 (ii)) that f(a j(k+1), a j(k+v) ) {a j(k), a j(k+1) }. But a j(k) / a j(k+1), a j(k+v). Hence f(a j(k+1), a j(k+v) ) = a j(k+1). Applying this argument repeatedly, we obtain f(a j(k+u), a j(k+v) ) = a j(k+u). The proof of part (ii) is the symmetric counterpart of the proof of part (i) of the Lemma and is therefore omitted. Lemma 5 says the following. Suppose we can find two alternatives a r and a s where there is exactly one alternative other than a r and a s in the (unique) path that connects a r and a s. Suppose f(a r, a s ) = a r. Then if one picks a profile, (a k, a k ) where (i) both a k and a k lie on 15

a maximal path connecting a r and a s (ii) both a k and a k lie on the segment of this maximal path which begins at a r and contains the path from a r to a s and (iii) a k is closer to a r than a k, then f(a k, a k ) = a k. Consider an arbitrary maximal path p t P(G). Assume without loss of generality that p t = {a j(0),..., a j(k),..., a j(t ) }. Consider profiles of preferences where the peaks of both individual s preferences lie on p t, i.e. profiles of the form (a j(k), a j(k+2) ), k = 1,..., T 2. In view of Lemma 4, the following cases are mutually exhaustive. Case A: There exists k {0,..., T 2} such that f(a j(k), a j(k+2) ) = a j(k+1). Case B: For all k {0,..., T 2}, f(a j(k), a j(k+2) ) {a j(k), a j(k+2) }. Suppose Case A holds. The following lemma characterizes the SCF in this case. Lemma 6 Suppose Case A holds, i.e. there exists k such that f(a j(k), a j(k+2) ) = a j(k+1). Then for any preference profile (a j(r), a j(s) ), 0 r, s T (i.e. both individual s peaks lie on p t ), a j(k+1) if min{r, s} k + 1 max{r, s} f(a j(r), a j(s) ) = a j(max{r,s}) if k + 1 > max{r, s} a j(min{r,s}) if k + 1 < min{r, s} Proof : We have assumed that f(a j(k), a j(k+2) ) = a j(k+1). We show that f(a j(k 1), a j(k+3) ) = a j(k+1) as well. Since a j(k) a j(k 1) there exists P i, P i D such that (i) r 1 (P i ) = a j(k) = r 2 ( P i ) (ii) r 2 (P i ) = a j(k 1) = r 1 ( P i ) and (iii) r j (P i ) = r j ( P i ) for j = 3,..., m. By tops-onlyness f(p i, a j(k+2)... ) = a j(k+1). Now consider f( P i, a j(k+2)... ). Since for all a l, a j(k+1) P i a l iff a j(k+1) Pi a l, strategy-proofness implies f( P i, a j(k+2)... ) = a j(k+1). By tops-onlyness, one has f(a j(k 1), a j(k+2) ) = a j(k+1). An analogous argument with respect to k + 3 applies to yield f(a j(k 1), a j(k+3) ) = a j(k+1). Repeated application of this procedure yields f(a j(r), a j(s) ) = a j(k+1) whenever min{r, s} k + 1 max{r, s}. Now take (a j(r), a j(s) ) with k + 1 > max{r, s}. As f(a j(k), a j(k+3) ) = a j(k+1), by strategyproofness, f(a j(k+1), a j(k+3) ) = a j(k+1) holds. We have f(a j(r), a j(s) ) = a j(max{r,s}) by Lemma 5 (ii). An analogous reasoning appealing to Lemma 5 (i) establishes f(a j(r), a j(s) ) = a j(min{r,s}) whenever k + 1 < min{r, s}. Consider maximal paths p t = a j(0),..., a j(t ) where Case A holds, i.e. there exists k {0,..., T 2} such that f(a j(k), a j(k+2) ) = a j(k+1). Define λ(p t ) = a j(k+1). We show that properties (i) and (ii) of Definition 4 hold. Pick P i such that r 1 (P i ) p t and let a j(r) p t be such that λ(p t ) r 1 (P i ), a j(r). It is evident from Lemma 6 that f(p i, a j(r) ) = a j(k+1) = λ(p t ). Suppose that individual deviates to P i where r 1 (P i ) = a j(r). Since f satisfies 16

unanimity, f(p i, P j ) = a j(r). Since f is strategy-proof, we must have λ(p t )P i a j(r) as required by part (i) of Definition 4. Now, pick some a j(r), a j(s) p t such that a j(r), a j(s) r 1 (P i ), λ(p t ) and a j(r) r 1 (P i ), a j(s). Let individual j have preference P j with r 1 (P j ) = a j(r). By Lemma 6, f(p i, P j ) = a j(r). Now consider a deviation by individual i to P i such that r 1 ( P i ) = a j(s). Again by Lemma 6, f( P i, P j ) = a j(s). By strategy-proofness of f, we must have a j(r) P i a j(s), as required by part (ii) of the Definition 4. Now consider a path p t = {a j(0),..., a j(k),..., a j(t ) } where Case B holds. Note that in this case we must have f(a j(0), a j(2) ) {a j(0), a j(2) }. Suppose f(a j(0), a j(2) ) = a j(0). Define λ(p t ) = a j(0). Consider any P i D with r 1 (P i ) p t. Consider a r, a s λ(p t ), r 1 (P i ) such that a r {a s, r 1 (P i )}. From Lemma 5 (i) we have f(p i, a r ) = a r and f(a s, a r ) = a s. Strategy-proofness, yields a r P i a s as required by Definition 4. Suppose f(a j(0), a j(2) ) = a j(2). There are two subcases to consider. (a) f(a j(k), a j(k+2) ) = a j(k+2) for all k {0,..., T 2}. Then, in particular f(a j(t 2), a j(t ) ) = a j(t ). Let λ(p t ) = a j(t ). Consider any P i D with r 1 (P i ) p t. Consider a r, a s λ(p t ), r 1 (P i ) such that a r a s, r 1 (P i ). By Lemma 5 (ii), f(p i, a r ) = a r and f(a s, a r ) = a s. From strategy-proofness, we must have a r P i a s, as required by Definition 4. (b) Suppose there exists t where f(a j(t), a j(t+2) ) = a j(t). Let t be the lowest index for which f(a j(t), a j(t+2) ) = a j(t) that is, f(a j(l), a j(l+2) ) = a j(l+2), 0 l < t. Therefore, f(a j(t 1), a j(t+1) ) = a j(t+1). Since a j(t+1) a j(t+2), and f(a j(t), a j(t+2) ) = a j(t), Lemma 2 (i) implies f(a j(t), a j(t+1) ) = a j(t). However, since a j(t 1) a j(t), and f(a j(t 1), a j(t+1) ) = a j(t+1), Lemma 2 (i) implies f(a j(t), a j(t+1) ) = a j(t+1). We have a contradiction. Hence this case cannot arise. We have shown that there exists a tree G and a function λ : P(G) A such that all orderings in D satisfy the restrictions in Definition 4. In order to show that D is semi-singlepeaked, we only need to show that the pair (G, λ) is admissible for G (Definition 3). For every a r, a j A, a s is the neighbour of a r on the path a j, a r if (i) a s a j, a r (ii) there does not exist a k a r, a s with a k a s, a r. In other words, a s is a neighbour of a r on the path a j, a r if a s lies on the path and there does not exist an alternative a k on the same path lying between a s and a r. We say that a s is a neighbour of a r if there exists a path containing a r and a s is a neighbour of a r on that path. Let p t P(G). Let P(p t ) denote the set of maximal paths that contain λ(p t ). Let P(p t ) = {p l P(p t ) : λ(p l ) λ(p t )}. Thus P(p t ) are those paths containing λ(p t ) with the property that their λ s do not coincide with λ(p t ). Lemma 7 Let p t be a maximal path such that P(p t ). Then there exists a unique neighbour a s of λ(p t ) such that a s p l for all p l P(p t ). Moreover λ(p l ) λ(p t ) for all p l = λ(p t ), a s. 17

Proof : Pick arbitrary p l, p l P(p t ). Let a s be the neighbour of λ(p t ) on the path λ(p l ), λ(p t ). We claim that a s p l. Suppose not. Then there exists a r distinct from a s which is the neighbour of λ(p t ) on the path λ(p t ), λ(p l ). Applying Lemma 5 (ii) to the path p l, we have f(λ(p t ), a s ) = a s. Applying the same lemma to the path p l, we have f(λ(p t ), a r ) = a r. Now consider the path a r, a s. Since G is a tree, this path contains λ(p t ). In fact a r, a s can be written as {a j(0),..., a j(k 1), a j(k), a j(k+1),... a j(t ) } where a j(k 1) = a r, a j(k) = λ(p t ) and a j(k+1) = a s. Then we have f(a j(k 1), a j(k) ) = a j(k 1) and f(a j(k), a j(k+1) ) = a j(k+1). However we have already shown in dealing with Case B, part (b) above (using Lemma 2 (i)) that f cannot behave like this. This establishes the first part of the Lemma. Suppose the second part of the Lemma is false, i.e. there exists p l = λ(p t ), a s such that λ(p l ) = λ(p t ). Applying Lemma 5 (i) to the path p l, we have f(λ(p t ), a s ) = λ(p t ). By assumption and the first part of the Lemma, there exists p l = λ(p t ), a s such that λ(p l ) λ(p t ). Applying Lemma 5 (ii) to the path p l we have f(λ(p t ), a s ) = a s, contradicting our earlier conclusion. We identify an alternative a k by the following algorithm. Start with an arbitrary maximal path p 1 t. If P(p 1 t ) =, we let λ(p 1 t ) = a k. If P(p1 t ), pick an arbitrary p 2 t P(p 1 t ). If P(p 2 t ) =, we let λ(p 2 t ) = a k. Otherwise pick p3 t P(p 2 t ) and check if P(p 3 t ) = etc. The algorithm stops whenever a k has been found. Consider the r th step of the algorithm, r > 1. Since the algorithm has not stopped at step r 1, i.e. P(p r 1 t ). Therefore there must exist a maximal path p l containing λ(p r 1 t ) such that λ(p l ) λ(p r 1 t ). It follows from the construction of the algorithm that p l contains the alternatives λ(p 1 t ), λ(p 2 t ),..., λ(p r 1 t ), i.e p l = λ(p 1 t ),..., λ(p r 1 t ). It follows from the second part of Lemma 7 that λ(p r t) λ(p 1 t ),..., λ(p r 1 t ). For any positive integer r, let D(p r t) = P(p r t ) P(p r t). These are the maximal paths discarded in the r th step of the algorithm. By definition these are paths p l which contain λ(p r t) and satisfy λ(p l ) = λ(p r t). Suppose that p r t D(p l t) for some integer l < r. From our earlier remarks, p r t λ(p 1 t ),..., λ(p r 1 t ). Also λ(p r t ) λ(p l t) contradicting our assumption that p r t D(p l t). Thus the algorithm cannot pick a maximal path in the r th step which has been discarded in an earlier step. Since the number of maximal paths is finite, this implies that the algorithm must terminate, i.e a k exists. Observe that by construction, λ(p l ) = a k for all maximal paths p l that contain a k. Now pick a maximal path p t such that a k / p t. Since G is a tree, there must exist a (unique) path containing a k that has a unique alternative in common with p t. Let this alternative be a j. In order to prove that the pair (G, λ) is an admissible pair, it suffices to prove that λ(p t ) = a j. Suppose that this is false, i.e. λ(p t ) a j. Let a r be the neighbour of a j on the path a j, λ(p t ) and let a s be the neighbour of a j on the path a j, a k. Applying Lemma 5 to the path p t, we have f(a j, a r ) = a r. Applying the same lemma to the path p l, we have 18

f(a s, a j ) = a s. Now consider the path a r, a s. Since G is a tree, this path contains a j. In fact a r, a s can be written as {a j(0),..., λ(p t ),..., a j(k 1), a j(k), a j(k+1),..., a k,..., a j(t )} where a j(k 1) = a r, a j(k) = a j and a j(k+1 ) = a s. Then we have f(a j(k 1), a j(k) ) = a j(k 1) and f(a j(k), a j(k+1) ) = a j(k+1). As we have seen earlier, this contradicts the strategy-proofness of f via Lemma 2 (i). This completes the first part of the proof. We now show that if D is semi-single-peaked (with respect to an admissible pair (G, λ)), then it admits an anonymous, tops-only, unanimous and strategy-proof SCF for all n. For any set B A, let G(B) be the minimal subgraph of G that contains B as nodes. More formally, G(B) is the unique graph that satisfies the properties below. 1. The set of nodes in G(B) contains B. 2. Let a j, a k B. The graph G(B) has an edge {a j, a k } only if {a j, a k } is an edge in G. 3. G(B) is connected. 4. a k G(B) if and only if a k a r, a j where a r, a j B. An alternative way to define G(B) would be as the minimal graph satisfying properties 1, 2 and 3 above. It is clear that G(B) exists and is a tree. For any profile P D n, let {r 1 (P )} denote the set of all first-ranked alternatives in the profile P, i.e {r 1 (P )} = {a i A r 1 (P i ) = a i for some i N}. Let a k A be the alternative specified in Definition 3 applied to the admissible pair (G, λ). Consider the graph G({r 1 (P )}). Assume a k / {r 1 (P )}. Since G is a tree and contains no cycles, there exists a unique alternative in G({r 1 (P )}) that belongs to every path from a k to {r 1 (P )}. Let this alternative be denoted by β(p ). Consider the following example. Suppose N = {1, 2, 3}. Consider the admissible pair (G 0, λ 4 ) (Figure 4) and let P be a profile such that {r 1 (P )} = {a 1, a 2, a 3 }. Then β(p ) = a 2. Define the SCF f : D n A as follows. f(p ) = { ak if a k G({r 1 (P )}) β(p ) if a k / G({r 1 (P )}) It follows immediately from the construction that f is anonymous, unanimous and topsonly. We now show that f is strategy-proof, which will conclude the proof. Fix a profile P. Observe that whether a k G({r 1 (P )}) or a k / G({r 1 (P )}), there exist individuals i and j such that f(p ) r 1 (P i ), r 1 (P j ) (since G({r 1 (P )}) only considers nodes that belong to an interval of the form r 1 (P i ), r 1 (P j ) ). Moreover these individuals can be chosen such that there does not exist an individual i such that r 1 (P i ) r 1 (P i ), f(p ) 19