Go To:

Paper Title Paper Authors Table Of Contents Abstract References
Home
Report a problem with this paper

Beyond Collusion Resistance: Leveraging Social Information for Plural Funding and Voting

Authors

  • Joel Miller
  • E Glen Weyl
  • Leon Erichsen

Abstract

In its 2018 introduction[2] and subsequent work[8], Quadratic Funding (QF) emerged as a uniquely optimal design for the democratic provision of public goods under the assumption of atomized participants with perfect rationality. In this paper, we aim to move past this rational and atomized portrayal of human beings and explore pluralistic QF mechanisms that recognize the influence of social connections among participants and incentivize cooperation across social differences. With this goal in mind, we define collusion resistance as a criterion against disproportional power accumulation in Quadratic Funding models that can arise from pre-existing participant relationships and argue that collusion resistant QF and plural QF are two sides of the same coin. Next, we evaluate various iterations of Quadratic Funding, testing their collusion resistance and other social and technical issues. Finally, we propose several new mechanisms, including Connection-Oriented Cluster Match, which satisfies our definition of collusion resistance. Our findings show great potential for making Quadratic Funding more pluralistic. They might also guide principles and practices of computational design that bridge the epistemological divides between classical economics and social reality.

1. Introduction

Since its introduction in 2018 [2] , Quadratic Funding (QF) along with its older cousin Quadratic Voting (QV) [12] , have shown promise as technologies capable of revolutionizing governance and providing alternatives to standard capitalist political economies.

QF is a mechanism for allocating funds to public goods. As input, QF takes contributions (in some unit of account) to a slate of projects. Say individuals 1 through n contribute c 1 through c n to a project: then QF gives that project

EQUATION (1): Not extracted; please refer to original document.

Figure 1: A visual representation of QF with three contributions. This diagram (and others like it throughout this paper) represents a contribution ci as a green square with area ci. The yellow areas represent the matching subsidy added by QF. The area of the large square is the total funding amount awarded by QF.

in funding, with externally provided matching funds making up the (always positive) difference between this sum and the simple linear sum of contributions. Figure 1 shows a geometric interpretation of the formula, which we will return to throughout this paper. Figure 1 also illustrates how the total amount of funding awarded by QF is made up partly of the contributions of individual agents and partly of an extra matching subsidy awarded by the system from an external fund. Figure 1 : A visual representation of QF with three contributions. This diagram (and others like it throughout this paper) represents a contribution c i as a green square with area c i . The yellow areas represent the matching subsidy added by QF. The area of the large square is the total funding amount awarded by QF. [2] shows that under standard mechanism design assumptions (e.g., quasi-linear utility, selfish utility-maximizing agents) and complete information, the equilibrium of QF maximizes utilitarian social welfare; [8] shows it does so uniquely among the class of mechanisms that have a "aggregative" form. In other words, QF funds projects until society as a whole would not be better off increasing funding even a tiny amount. In practice, private, primarily blockchain-based initiatives like Gitcoin [9] and clr.fund [4] already implement QF to allocate capital to Open Source software communities, to the tune of more than $70 million in grants so far. Public institutions (e.g., the executive [7] and legislative [16] government of Colorado and the government of Taiwan [19] ) also implement QV at slightly smaller scales.

c 1 c 2 c 3 √ c 1 + √ c 2 + √ c 3 √ c 1 √ c 2 √ c 3

Figure 2: Three different QF diagrams drawn to scale with each other. In each case, the sum of contributions is $8. Note that eight agents who contribute $1 each yield more funding than two agents contributing $4 each, which in turn yields more funding than one agent contributing $8.

Moreover, one can consider QF part of a more significant academic thrust to study and implement plural social technologies [20] under what has been called the Plurality paradigm. Plurality does not see people as atomized, rational agents but instead as part a rich web of social connections. It seeks to recognize those socio-cultural associations as the basis for various social technologies like financial systems, governance schemes or property relations to help people cooperate across their differences. Accordingly, one of the fundamental ideas behind pluralism is to build technologies that can coordinate communities while respecting the diversity and social complexity within those communities. QF is one such technology, partly because of its potential to prioritize cooperation across differences, also known as "consilience". One way to see this potential is to notice that a project with many different supporters collectively contributing some amount will receive much more funding than a project with only one supporter who contributes that same amount on their own. Figure 2 gives visual intuition for this fact. Under the Plurality paradigm, QF is appealing because it rewards projects liked by distinct individuals while also leaving space for people to express the strength of their preferences. Notably, small groups could still out-vote larger groups - : Three different QF diagrams drawn to scale with each other. In each case, the sum of contributions is $8. Note that eight agents who contribute $1 each yield more funding than two agents contributing $4 each, which in turn yields more funding than one agent contributing $8.

they would have to contribute more capital to do so, i.e., express more passionate preferences.

Moving from models to the real world always brings new challenges, and one practical challenge facing QF is its vulnerability to collusion. For example, what if instead of contributing $8 to a project that they benefited from, someone were able to create eight Sybil accounts and give a unit from each of them? In this case, the funding level would look like the leftmost diagram in figure 2 when really it should look like the rightmost diagram in that same figure. For QF to work in practice, surely there needs to be some way to sniff out that type of foul play. Now suppose a company did something similar by mandating that each of its eight employees give a unit to a project that benefited the company. This case smells like collusion, but simple Sybil resistance wouldn't be enough to stop it, unlike in the first example.

On the other hand, there are clear differences between eight Sybils contributing capital and eight coordinated employees. One could also imagine those eight employees contributing independently simply out of shared interest in the project (rather than due to top-down command). Here, any "collusion" would be in good faith. So how do we make sense of all these differences and wrap them up into a sensible definition of collusion resistance?

In the rest of this section, we will attempt to do just that. Along the way, we will argue that the issues surrounding "collusion" cannot be addressed simply by outlawing some subjectivelychosen set of ill-intentioned actions. Instead, we should design mechanisms that seek consilience by accounting for a broad spectrum of social connections (not just the "bad" ones). Most importantly, we will argue that this approach produces mechanisms that are more pluralistic and closer to optimal. We will then end this section by defining some notation and discussing how one can apply our results to QV.

In the rest of this paper, we will walk through currently-proposed mechanisms, examining potential issues and offering more robust mechanisms to replace them. Section 2 will cover Pairwise Discounting. Section 3 will cover Cluster Match and two new mechanisms, one of which satisfies our definition of collusion resistance. Section 4 will cover Offset Match. Section 5 will briefly describe one promising new mechanism which might combine the strengths of Offset Match and Cluster Match while avoiding the drawbacks of each. Finally, we will conclude in section 6 with a table summarizing our main results, ideas for future work, and a link to a GitHub repository with code for all of the mechanisms we discuss in this paper.

We hope this work will provide the building blocks for future theoretical and practical work on plural funding. Our analysis of new and old mechanisms in this paper is in the spirit of technical exploration, not because we believe that our new mechanisms are "better". All proposed mechanisms have strengths and weaknesses, which might lead to them thriving or failing depending on the context of their implementation. Similarly, plenty of other definitions of collusion resistance may be more or less realistic depending on context. Our goal is to paint a broad picture of the landscape of technical possibilities seen from one particular vantage point rather than shoehorn the reader toward a particular mechanism or design philosophy. As research on pluralist mechanism design moves forward, we hope this paper accounts for only a part of an ample space of technical innovation.

1.1 From Collusion Resistance To Rewarding Consilience

First, let us dig deeper into the similarities and differences between Sybil agents coordinating via some puppet master and real people coordinating via shared social ties. By Sybil agents, we mean multiple QF accounts controlled by the same entity.

Here it is helpful to ask: why are Sybil agents problematic in the first place? Their existence results in a project getting more funding than it "should" receive, but what do we mean by that? The answer is that when QF awards subsidy funding to a project (as shown in the left and middle diagrams of figure 2), it is doing so to reward agreement among independent agents -but the important word here is independent. Sybil agents controlled by a common entity are not independent, so their reward for consilience should be zero.

Seeing things from this angle helps us understand why our case of the software company might raise some red flags while still being qualitatively different from the case with Sybils. The critical thing to notice is that while each employee is a distinct human being (which cannot be said of Sybil agents), there is also one crucial axis along which they are all the same -they are all members of the company. So while we do not want to treat these eight employees as Sybil agents, we might want to award less funding than we would have awarded if those eight contributors had not been cooperating with this company. In other words, since the point of QF is to reward consilience across different agents, given less difference, there is less consilience to reward.

Moreover, besides companies, one could plausibly imagine a multitude of socio-cultural groups (e.g., family, school, sports clubs, online forums, metaverses, et cetera) meaningfully influencing the way members of those groups interact with QF mechanisms. Also, individuals may identify with different groups with different strengths. Therefore, if we want to fully understand all of the ways of conceptualizing socially connected human beings, we need to consider a spectrum of social connectivity, with Sybil agents on one end, normal socially connected individuals in the middle, and the type of selfish, isolated agents that economists like to imagine on the other end. What makes Sybil agents Sybils is that the will of one entity centrally coordinates them. They should be recognized as precisely the same because they all listen to that same entity and that entity alone. To take a rather extreme real-world example, then (and now starting to move rightward down the spectrum), we might think of a Sybil agent as similar to an individual who identifies very strongly with one specific group, and mostly coordinates their actions with the will of that group. However, most people instead belong to many overlapping social groups, each having a particular sway over that individual's actions, as highlighted by Simmel [17] 1 . Of course, the number of such groups an individual belongs to naturally varies and evolves, and some individuals may simply be in fewer groups than others. So as we move to the other end of the spectrum, individuals in fewer and fewer social groups begin to look more and more like the type of self-interested agents that economists usually put into their models -i.e., the homo economicus.

Here is the kicker. In theory, QF is the optimal way to distribute capital in a decentralized, self-organizing ecosystem if and only if we assume that all participating agents are selfish rational utility maximizers. In other words, QF treats everyone as if they were at the homo economicus end of the above spectrum: it awards extra funding for "cooperation across differences" as if the agents were all as different as they could be and would never think to cooperate based on shared social ties (which are assumed not to exist). So QF is not just sub-optimal when Sybil agents enter the picture: it is not even optimal when human beings enter the picture (see Appendix A for formal proof).

Therefore, adapting QF for "collusion resistance" is not about outlawing a specific type of attack that Sybil agents or even highly coordinated real people can carry out, since such a design philosophy would only acknowledge the other extreme end of the above spectrum. Instead, we need to design mechanisms that acknowledge the entirety of the spectrum. Our goal should be to make QF closer to optimal by calibrating the mechanism to give greater rewards for consilience when agents are more different, and at the same time respecting the fact that different agents may lie at different points in a spectrum of social connectedness. At one end of the above spectrum, when agents are identical (Sybils), the mechanism should be able to catch that and completely squash any extra funding. In the middle of the spectrum, when agents are similar to some degree, the system should be able to tamp down its rewards, or else it will overshoot funding levels past what is optimal (again, see Appendix A). Lastly, if agents really are socially atomized, the mechanism should behave like the original proposal for QF. Moreover, the mechanism should be able to account for all of these levels of social connection at once: given an instance with some sybils, some relatively connected agents, and some atomized agents, the mechanism should be able to treat all of them appropriately.

Our long-term goal as researchers should be to craft mechanisms with this type of flexibility, and in this paper we take steps toward that goal. It is essential to prevent Sybil attacks, but if we were to focus exclusively on this, we would wind up with significantly less optimal mechanisms. In any case, many of the most promising approaches to preventing Sybil attacks rely on leveraging social information [10, 3, 11] since Sybil-resistance is very hard to solve in completely trustless settings [5, 13] . So if the tools we need to prevent Sybils already use social information, we could bootstrap even better mechanisms off of that same data. Sybil-resistant and Plural mechanisms may draw on highly similar data: the intersections of social circles. Put in the words of Simmel [18] :

The groups to which an individual belongs form, so to speak, a system of coordinates, in such a way that each newly added group determines the individual more precisely and more unambiguously. The affiliation to one of them still leaves a wide scope for individuality; but the more there are, the less likely it is that other people will show the same group combination, or that these many circles will once again intersect in one point."

If identity is fundamentally social, it would be a waste to leverage such information to support mechanisms that ultimately ignore sociality; instead, we should harness it to empower socially aware, plural mechanisms.

Before we continue we should note that practically capturing complex social information is non-trivial. An in-depth discussion of this aspect of QF is in Appendix B.

1.2 A Heuristic Definition Of Collusion Resistance

In this section, we will offer a simple working definition of collusion resistance that attempts to capture all the social possibilities mentioned above. However, before formally defining collusion resistance, it is worth taking a step back and thinking intuitively about how QF doles out capital to projects since this will help us clarify what our formal definition should be capturing.

In particular, we should look at a project's QF income from one agent's perspective. Expanding the power of 2 in the formula for vanilla QF (i.e., the original, individualist formula from (1)) reveals that for any agent i, we can rewrite the funding amount as

EQUATION (2): Not extracted; please refer to original document.

From agent i's perspective, the funding amount consists of their contribution plus the root of their contribution times some constant plus another constant.

Agent i might wonder what difference they made by participating in the mechanism rather than directly contributing to the project through another payment channel. If agent i had chosen this route, then the project would have still received c i (via agent i's direct contribution) and

j,k̸ =i √ c j •

√ c k (via the other agents who did participate in QF). However, the middle term would disappear in (2) . Thus, by participating in QF, agent i brought an extra

EQUATION (3): Not extracted; please refer to original document.

of subsidy funding to the project. Notably, this quantity is O √ c i . In other words, as agent i contributes more and more (while holding others' contributions constant), the subsidy amount given by the system grows at a rate of √ c i times some constant.

Figure 3: QF with three contributors from agent 3’s perspective. Gray areas are out of agent 3’s control. The green area is agent 3’s contribution. The yellow areas are the portion of the subsidy amount that QF awards because of agent 3’s contribution (keeping everything else constant).

This phenomenon is illustrated visually in figure 3, which shows a 3-person QF funding diagram "seen" from the perspective of agent 3. For them, the green area is their contribution, and the grey areas are the amount that QF would award to the project regardless of their contribution. The yellow rectangles comprise the portion of the subsidy amount that QF awards to the project due to agent 3's participation in the mechanism (holding other contributions constant). Note that one side of each yellow rectangle has length √ c i . So as c i increases, the yellow rectangles grow in size at a rate proportional to √ c i .

The fact that a contribution of c i provokes an extra O √ c i of subsidy funding from vanilla QF is crucial since it means that there are diminishing returns on the amount of subsidy capital any one agent can get out of the system. These diminishing returns on individual inputs are the core property that we will want to retain when designing collusion-resistant QF mechanisms. Just as any one agent should see decreasing returns on the "extra capital" provoked by their contribution (i.e., the size of the yellow areas in figure 3), any group of agents (be they Sybil agents controlled by one person, or individual people coordinating via social ties) should see decreasing returns on their collective contribution, in the limit. In this work, we will call it collusion whenever groups or individuals can achieve linear (or super-linear) growth in the subsidy doled out by QF as either their collective or individual contribution grows or as they add more agents to the group. This informal definition will suffice to understand most of the arguments in the paper, but we offer a more formal definition in Appendix D in order to rigorously prove that one of our mechanisms is collusion resistant (Theorem 1, proved in Appendix E. We should be clear about some potential shortcomings of our definition. First, our definition hinges on the asymptotic properties of the funding mechanism. However, the real world does not necessarily bear out asymptotic behavior -it may not be realistic to expect agents or groups to push the mechanism by contributing asymptotically large amounts of money, even if an asymptotic vulnerability did exist. Second, although we consider the effect of new agents on the funding amount, we do not consider the effect of adding new groups because we assume that system administrators will set policies to ensure only legitimate groups participate in the system. Lastly, this is a "worst case" definition in which we consider all groups equally likely to collude (or, on the other side of the coin, equally deserving of funding attenuation in the name of consilience). Different groups may have differently strong social fabrics in practice. Indeed, we hope future work might focus on finding more comprehensive definitions and understandings of social groups beyond binary membership rosters. This work will likely look more closely at nuanced differences in how individuals relate to different groups and at nuances in how different groups may relate to each other.

c 1 c 2 c 3 √ c 3

Nevertheless, this definition will help us illuminate some important properties of QF mechanisms, which is the primary goal of this paper.

1.3 Notation

In order for our mechanisms to satisfy our anti-collusion property concerning social groups (or groups of Sybil agents), we will assume that there is some distribution of identity certificates about group memberships that legitimately conforms to the rules of the QF operator (in other words, we assume accurate information about relevant social groups).

Let us introduce some notation. Let N = {1, . . . , n} be a set of agents and let G be a bag of groups 2 . Each group g ∈ G is a non-empty subset of N . Let T i denote the groups to which agent i belongs. We will sometimes refer to G as the "group structure".

In this paper, we can think about one project at a time, so we do not need any notation for differentiating projects. Let c i denote the contribution of agent i to a project, and let c be the vector of all contributions. For a group g ∈ G, let c g denote the combined contributions of every group member, i.e., c g = i∈G c i .

In this paper, we will talk about "QF formulas". A QF formula is a function that takes in contribution and group membership information and returns a funding amount. We have already discussed one QF formula: the formula for "vanilla QF", described in (1) .

Lastly, when doing algebra, we will sometimes use O(1) and O( √ c i ) to denote generic terms that are constant with respect to c i and grow at a rate of √ c i asymptotically, respectively.

1.4 Collusion-Resistant Qv

Before continuing to the collusion-resistant QF formulas, we will take a brief detour to note that the modifications to QF discussed in this paper also directly apply to make QV more pluralistic. QV sees agents spend "voice credits" on an issue, which it converts to effective votes at quadratic costs. So if agent i spends v i voice credits towards an issue, then the effective number of votes given to that issue is

EQUATION (4): Not extracted; please refer to original document.

Notice that if we let the v i values denote contributions (i.e., letting c i = v i ), (4) can be re-written as the root of the total amount of funding under vanilla QF:

EQUATION (5): Not extracted; please refer to original document.

At first glance, this might seem like a needlessly complicated way to re-write the formula for QV. However, the point is that instead of putting the formula for vanilla QF inside the square root on the RHS of (5), we could plug in a collusion-resistant formula instead. In other words, this way of generalizing QV (as the root of the funding amount given by some QF formula) opens the door to experiments with more pluralistic quadratic voting. We refer to each yellow rectangle as an interaction term.

c 1 c 2 c 3 √ c 1 • √ c 2 √ c 1 • √ c 3 √ c 2 • √ c 3

2. Pairwise Discounting

Figure 4: The quadratic funding diagram from figure 1, with the yellow area split into rectangles. Notice that each rectangle’s area is √ ci · √ cj for some i ̸= j.

Buterin first suggested a form of Pairwise QF and Discounting in [1] . Returning to our geometric interpretation of QF will help us understand this mechanism. Figure 4 shows an example QF funding diagram, with the subsidy amount (yellow area) split into rectangles. The critical observation is that each yellow rectangle has area √ c i • √ c j for two different agents i and j (and two such rectangles exist for every distinct pair of agents). Call the area of each pair of yellow rectangles the interaction term for agents i and j. We can think of each interaction term as the portion of the subsidy that the mechanism rewards based on i and j both contributing to the project (i.e., the reward for cooperation across differences, local to just i and j). The main idea behind Pairwise Discounting is that we should scale down the areas of these yellow rectangles according to how similar any two agents are. Formally, this means introducing coefficients k i,j for each pair of agents i, j, with each k i,j being closer to 0 if i and j have a more similar social background. Inversely, k i,j should be closer to 1 if i and j have more diverse social backgrounds (with the exception that k i,i = 1 for all i). These coefficients can be calculated based on information about groups or from information about the agents' contribution amounts to the suite of projects up for funding. For example, one of us proposed [6] to define the coefficients as

EQUATION (6): Not extracted; please refer to original document.

Given some way of calculating k i,j 's, the total funding amount under Pairwise Discounting is

EQUATION (7): Not extracted; please refer to original document.

Note that with all k i,j = 1 this simplifies to the amount prescribed by vanilla QF.

2.1 Pairwise Discounting Is Vulnerable To Collusion Via Many Agents

Figure 5: Pairwise Discounting with colluding agents 2, 3, 4... and non-colluding agent 1. Removing the interaction terms for every pair of colluding agents, the colluding party can still eke out a constant amount of subsidy capital (represented by each pair of red rectangles) for every unit spent, by giving each new unit via a new agent’s account.

There is a sense in which Pairwise Discounting is vulnerable to collusion no matter how one calculates the k i,j coefficients. In the following example, let us assume that the system can perfectly tell when two agents collude or have a broad shared socio-cultural background. We will show that the agents can nevertheless exploit the system if 1) at least one non-colluding agent happens to also contribute to the project and 2) the colluding party can recruit extra agents to contribute to the project. Imagine a project with three contributors. Assume that agents 2 and 3 collude, and the system sets k 2,3 = 0. The leftmost diagram in figure 5 shows such a scenario. However, note that if agents 2 and 3 recruit agent 4 to give just $1 of funding, the subsidy amount will still go up by In other words, letting c g be the combined contributions of agents 2,3,4,..., these agents can collectively eke out O(c g ) in subsidy funding from the mechanism. This phenomenon breaks our requirement that as any group adds more members (who only join that group), they see diminishing returns on the matching funds doled out to a project.

So, calculating collusion coefficients based on the similarities between pairs of agents is insufficient to guarantee collusion resistance, at least under the assumption that colluding groups may recruit extra agents. The following mechanism, Cluster Match, gets around this vulnerability presented by looking at information about groups of agents rather than pairwise comparisons.

3. Cluster Match

Cluster Match was proposed in [20] . The idea is to put agents in the same group "under the same square root". In other words, to take the above example, if agents 2, 3, 4, ... were in a colluding group (and no other groups existed), we would calculate the total funding amount as

( √ c i + √ c 1 + c 2 + . . .) 2 .

This method fixes the vulnerability presented above -no matter how many agents the colluding group recruits, they still see diminishing returns on their collective contribution.

However, there are still some details to iron out since, in general, people can be in many social groups at once. The idea in the original proposal from [20] went as follows: let G be a bag of groups as defined in section 1.3. Then the original proposition was for Cluster Match to award

EQUATION (8): Not extracted; please refer to original document.

in funding. One way of interpreting this formula is to assume that when an individual contributes, they do it partially on behalf of each group to which they belong. So we could split this agent's contribution evenly among their groups. After doing this calculation for all agents and summing, we are then able to say that it is "as if" each group had contributed a certain amount (specifically, this amount is i∈g c i

|T i | ). So then we do vanilla QF but on the group contributions that we have constructed.

Notably, one could also imagine uneven contribution splits based on weights that signify which groups have more or less meaning to the agent. In that case, an agent might have different fractional weights for different groups. One would need to require that each weight is between 0 and 1 and that the weights collectively sum to 1. However, here we assume an even split for simplicity.

The issue with Cluster Match is that an individual i can get O(c i ) subsidy capital out of the system whenever they are in more than one group. It is easiest to see this if we consider a project with one contributor in two groups, X and Y. The left side of 6 shows a visual interpretation of the funding amount -here, it is easy to see that QF will double the capital contributed by this lone agent. With only one agent contributing, the mechanism should probably not award any subsidy, much less a linearly growing subsidy.

To be more concrete, we can show that whenever |T i | > 1, agent i can get O(c i ) in subsidy funds out of vanilla Cluster Match. That's because for any agent i, we have

EQUATION (9): Not extracted; please refer to original document.

9 shows that the total funding amount awarded under vanilla Cluster Match is at least c i • |T i | for any agent i, so whenever |T i | > 1, agent i can contribute c i and see the total funding amount increase by at least 2c i . As one can see, we would have an O(c i ) growth in matching funds here, so Cluster Match is not collusion-resistant.

3.1 Squared Cluster Match

Figure 6: Left: a QF diagram showing funding under the initially proposed Cluster Match with one contributor in two groups (note that the total funding amount is 2c1). Right: Squared Cluster Match with one contributor in two groups (note that the total funding amount is c1).

We can remedy this issue by tweaking the formula slightly. Call this new mechanism "Squared Cluster Match": it awards total funding amount Going back to our simple one-person example (shown visually on the right side of figure 6 ), we can now see that the total funding amount awarded by the mechanism, in this case, is just c i . I.e., the lone agent sees no extra capital contributed to the project. For a more general treatment of how Squared Cluster Match alleviates this problem, we can show how the math in 9 changes under the formula for squared Cluster Match. For a group g, let

  g∈G i∈g c i |T i | 2   2 . (10) (Group X) (Group Y) c 1 /2 c 1 /2 (Group X) (Group Y) c 1 /4 c 1 /4

EQUATION (12): Not extracted; please refer to original document.

where the first equality comes from expanding the power of 2 and noting that all interaction terms involving groups outside of T i are constant with respect to c i (recall that an interaction term is the portion of the subsidy funding calculated by multiplying the square roots of two entities' contribution, and is explained visually in Figure 4) . So, the total funding amount under Squared Cluster Match will be c i plus some constant O( √ c i ) terms. So the subsidy amount seen by agent i (total funding minus c i ) will not grow linearly, satisfying at least one aspect of our definition of collusion resistance. However, while individuals can not exploit Squared Cluster Match, groups of agents can. In the next section, we will explain this vulnerability in more detail and present another tweak to Cluster Match that ameliorates the issue.

3.2 Connection-Oriented Cluster Match

Figure 7: Two illustrative examples of vanilla Cluster Match, with the areas (funding amounts) of some interaction terms highlighted. In the leftmost example, group X can achieve linear growth in the subsidy amount (relative to their contribution) by exploiting the interaction term for group X and group Y . This exploit is possible because groups X and Y share members. However, the rightmost example shows that more than scaling down the interaction terms of groups that share members is needed to guarantee collusion resistance. In the rightmost example, groups A and C do not share members, but the members of A and C are in another group (group B). Therefore, even if one removed all other interaction terms, group B would still achieve a linear growth in the subsidy amount by exploiting the interaction term for groups A and C.

To motivate the next mechanism, let us consider a slightly more complicated example with three different agents. Suppose agents 1 and 2 are in group X and agents 2 and 3 are in group Y. The diagram on the left side of figure 7 shows an illustrative visual representation of Cluster Match under these conditions. The problem is that under these conditions, group X can retrieve a linearly growing amount of matching funds as they increase their collective contribution (the same is valid for group Y symmetrically, but we will focus on group X here). Let c X be the total amount Figure 7 : Two illustrative examples of vanilla Cluster Match, with the areas (funding amounts) of some interaction terms highlighted. In the leftmost example, group X can achieve linear growth in the subsidy amount (relative to their contribution) by exploiting the interaction term for group X and group Y . This exploit is possible because groups X and Y share members. However, the rightmost example shows that more than scaling down the interaction terms of groups that share members is needed to guarantee collusion resistance. In the rightmost example, groups A and C do not share members, but the members of A and C are in another group (group B). Therefore, even if one removed all other interaction terms, group B would still achieve a linear growth in the subsidy amount by exploiting the interaction term for groups A and C.

(Group X) (Group Y) c 1 2 + c 2 c 1 2 + c 3 c1 2 + c 2 • c1 2 + c 3 (Group A) c1 2 (Group B) c1 2 + c2 2 (Group C) c2 2 c1 2 • c2 2

contributed by members of the group X (so c X = c 1 + c 2 ). For simplicity, assume c 1 = c 2 = c X /2 (the results we obtain do not depend on exactly how c 1 and c 2 relate to each other). Then we can write each yellow rectangle's area as

EQUATION (13): Not extracted; please refer to original document.

The vital thing to notice here is that the first term inside the rightmost square root of (13) is c 2 X multiplied by some constant. So once we take the square root, we will have a linear expression in c X . In other words, as group X raises its contribution, they see an O(c X ) increase in matching funds. Squared Cluster Match is also vulnerable to this type of exploit, although the picture is more complex than in vanilla Cluster Match -a full explanation is in Appendix C.

In the above example, note that the linear subsidy growth enjoyed by group X came from the interaction term for groups X and Y and was due to the fact that groups X and Y shared members. One first pass at ameliorating this issue might involve somehow attenuating the interaction terms for groups that share members -say, by removing all individuals in both groups from the calculation. However, this won't suffice to solve the problem. The rightmost diagram of figure 7 shows why.

In the rightmost diagram of figure 7, we have two agents and groups A, B, and C. Agent 1 is in groups A and B, and agent 2 is in groups B and C. Similarly to above, let c B := c 1 + c 2 and c 1 = c 2 = c B /2. Now, we can write the interaction term for groups A and C as

EQUATION (14): Not extracted; please refer to original document.

which is linear in c B . So here we have subsidy growth linear in a group's contribution occurring in the interaction term for groups A and C, but it is not because groups A and C share members. Instead, a different group (B) was able to exploit the A, C interaction term to draw out linear growth in the subsidy relative to that group's contribution. Simply keeping an eye on which pairs of groups share members, and attenuating the interaction terms for those pairs of groups, is not enough to guarantee collusion resistance. One path to collusion resistance that we have found involves taking a broader look at the social connections illustrated by group memberships. The idea is to attenuate the contributions of agents within interaction terms when they are socially connected to the group on the "other side" of the interaction term, for a relatively broad definition of social connectivity. When calculating group X's side of the interaction term for groups X and Y , we will still sum over the contributions of all agents in group X, but we will attenuate each agent's contribution to various degrees within that sum. If an agent is also in group Y or they are in some shared group with some member of Y , we will take the square root of their contribution within the sum. If neither of these things are true, we will not attenuate the agent's contribution.

One way of technically specifying this is to define a function K which takes in an agent i and a group h and returns some attenuation of c i . Formally,

EQUATION (15): Not extracted; please refer to original document.

Now we can write the QF formula for a new mechanism, Connection-Oriented Cluster Match, as

g∈G i∈g c i |T i | + g∈G h̸ =g∈G i∈g K(i, h) |T i | • j∈h K(j, g) |T j | (16)

There are a few things to observe about this formula. First, note that the leftmost double-sum of 16 adds all the group contributions (i.e., the green squares in our diagrams). The sum over all distinct pairs of groups calculates the interaction terms. These interaction terms look as they would under vanilla Cluster Match, except we attenuate contributions according to K(i, h) or K(j, g). If these K() terms all evaluated to the contributions of their respective agents (e.g., if all groups had distinct members), we would recover vanilla Cluster Match.

In order to rigorously prove that Connection-Oriented Cluster Match is collusion resistant, it is necessary to lay out a more rigorous definition of collusion resistance: we do this in Appendix D. With this definition in hand, we have the following theorem: This theorem is proved in appendix E. We can also argue for the sensibility of Connection-Oriented Cluster Match by appealing to the intuitive foundations of QF. Intuitively, we want a mechanism to reward a project whenever two distinct agents like it. This idea should also apply for groups; we should reward projects liked by distinct groups. However, if two groups consist mainly of the same agents (or if most members of both groups are all in another third group), how distinct are they after all? In Connection-Oriented Cluster Match, we try to reduce the reward for "agreement across differences" between pairs of groups that are not as different.

There is something relatively coarse about Connection-Oriented Cluster Match since every contribution is either left alone or square rooted inside interaction terms. One could imagine the function K(i, h) returning an attenuation of c i much more closely tuned to the specifics of the social situation. For example, c i could be attenuated more if the agent is actually in the other group or attenuated less if there are very few social connections between the two groups. Similarly, one could imagine the mechanism using a finer-grained measure of social distance between two agents. For example, one could imagine a mechanism that understands when two agents are not in common groups but have a multi-hop connection of some length. The present coarseness of the mechanism is due to the simplified model we are working in -using √ c i as the only attenuation option is the easiest way to prove collusion resistance under our definition. Similarly, keeping track of multi-hop social connections is not necessary to prove collusion resistance. However, the space of options for tuning a mechanism like this may be much more extensive.

There is some reason to believe that the mechanism we present in section 5, Eigen Match, addresses these issues of coarseness.

4. Offset Match

Offset Match was proposed in [20] . The basic idea is to scale down the contributions of agents according to their social centrality, thereby increasing the effect that more unique agents have on the funding amount. In this paper, Offset Match is a dark horse: the issues we will discuss (and solutions we offer) will be of a different flavor than the rest of the paper. Nevertheless, before we get to those, let us define the mechanism.

First, define the "correlation score" between any two (ordered) agents as

EQUATION (17): Not extracted; please refer to original document.

These correlation scores attempt to capture how much agent i internalizes j's utility or how much i "cares about" j. With these correlation scores in hand, the next step is to find coefficients α i solving the system of equations

EQUATION (18): Not extracted; please refer to original document.

One intuitive explanation for this system is that we are trying to find coefficients to scale correlation scores so that everyone is "cared about" equally strongly. Once we have these α i values, the funding amount prescribed by Cluster Match is

EQUATION (19): Not extracted; please refer to original document.

4.1 When is the system solvable?

The first important thing to notice about Cluster Match is that calculating the α i coefficients requires solving a system of linear equations. However

EQUATION (22): Not extracted; please refer to original document.

has no solution since requiring the first and last equalities means that α 1 + α 2 + α 3 = 2. Therefore, characterizing where this system of equations is solvable is an important first step toward understanding Offset Match's practical usability. We offer one such characterization, as described by the following Theorem.

Theorem 2. Let agent i's "group profile vector" be a vector (1 i∈g ) g∈G where 1 i∈g is an indicator variable that is 1 if i ∈ g and 0 otherwise. Then Offset Match is feasible (i.e., the system of equations has a solution) if and only if there is no linear dependence among the group profile vectors.

We prove this theorem in Appendix F.1. Two corollaries follow (again, with proofs in the appendix). First, if the number of groups is smaller than the number of agents, we are guaranteed to wind up with an unsolvable system of linear equations, rendering Offset Match useless. However, the second corollary offers good news. Assigning each agent to a new singleton group containing just that agent, we are guaranteed to get linearly independent group profile vectors; therefore, Offset Match is always feasible if we undergo this pre-processing step.

4.2 Offset Match And Individual Rationality (Ir)

So far, we have yet to mention a vital property to consider when designing QF mechanisms: individual rationality (IR). More broadly, in mechanism design literature, requiring IR means that agents' outcomes should never be made worse by participating in the mechanism. If we did not care about IR, designing a collusion-resistant mechanism would be easy: we could ignore all individual contributions and group information and return a final funding amount of zero for every project, no matter what. This mechanism prevents collusion since no individual or group of agents could use it to extract linearly growing subsidy funds. However, the problem is that no one would use it in the first place. Instead of contributing to a mechanism that just swallowed their capital and did nothing in return, agents might contribute via some other channel or not contribute anywhere at all -so the above exemplary mechanism is not individually rational. More formally, in our context, requiring IR means that if an individual contributes c i , the total funding amount should rise by at least c i .

Offset Match doesn't always satisfy IR. Characterizing exactly when Offset Match is IR and when it is not is an important area for future work, but for now, we note that one can construct an n-agent example where all but one agent has α i = 0 (the last agent has α n = 1). In other words, there exist cases where almost nobody has the incentive to use the Offset Match mechanism. Our construction details are in Appendix F.2.

It is not clear whether every IR is necessary in every setting. The property is likely critical when people use universal capital (like US dollars, bitcoin, or time) and have plenty of alternative channels to allocate that capital to. However, it might be less important in other cases. For example, a community might run QF via some currency dedicated to that community and mechanism. In this case, since agents could not use that specific currency for anything else, IR might be less of a concern.

5. Eigen Match

Before concluding, we will briefly present one more idea for a mechanism. This idea is relatively undeveloped but might be one of the most promising avenues for future work.

The idea behind this mechanism, which we call EigenMatch, is to attempt to combine the virtues of both offset and cluster match while avoiding the pitfalls of each. It is a Cluster-Matchlike procedure but under a more generalized notion of a "group". Instead of taking in a set of groups, this mechanism would work directly from a social graph.

The mechanism starts by calculating the eigenvectors of the adjacency matrix of the social graph. Then, one takes the set of all eigenvectors as the set of groups and includes each agent in each group with a weight corresponding to that agent's index of that group's eigenvector. Then, one utilizes these weights to calculate "group contribution" and does normal QF on the group contributions, as in Cluster Match.

Formally, let E be the set of eigenvectors of a social graph. Then EigenMatch might calculate the funding amount as

EQUATION (23): Not extracted; please refer to original document.

where c denotes the vector of all contributions. Note that this is just a sketch of the idea. The weights of each agent in each group do not necessarily need to be exactly that agent's weight in that group's eigenvector. Moreover, one could consider somehow using each eigenvector's eigenvalue in the calculation. Like Offset Match, this mechanism incorporates all the agent-to-agent pairwise social information contained in an n by n matrix, rather than just forming local clusters. But like Cluster Match, it is about clustering like people rather than just offsetting effects that emerge from coordination (which can potentially violate IR). We hope that further exploration of this mechanism will improve understanding of plural QF.

6. Conclusion

Table 1: Summary of Mechanisms and Results
Mechanism Key Idea Exploitable? Individually Rational?
Pairwise Dis- counting (section 2) Attenuate "interaction terms" between pairs of similar agents. Yes, goups can exploit by adding new members (sec- tion 2.1) Yes
Cluster Match (section 3) Compile contributions into different group contribution amounts, then do QF on those group contributions. Yes, individuals in more than one group and groups with shared members can exploit (section 3) Yes
Squared Clus- ter Match (sec- tion 3.1) Like Cluster Match, but individuals contribute ci/|i 2 to each group they're in. Depending on exact con- tribution amounts, groups with shared members can exploit (appendix C) Not always, depending on exact contribution amounts (appendix C)
Connection- Oriented Cluster Match (section 3.2) Like Cluster Match, but attenuate interaction terms between pairs of similar groups. No: collusion resistance is proved in Appendix E Yes
Offset Match (section 4) Calculate coefficients to estimate social cen- trality, scale down individual contributions by those coefficients, then do QF on scaled con- tributions. Unclear Not always: exist sce- narios where almost all agents have their contribu- tion erased (appendix F.2
Eigen Match (section 5) Like vanila cluster Match, but use a set of psuedo-groups based on the eigenvectors of a social graph. Unclear Unclear

We hope this paper has clarified some issues with currently proposed collusion-resistant QF mechanisms and offered better alternatives. Although we found that the already-proposed Cluster Match, Pairwise Discounting, and Offset Match were all prone to various social and technical issues, we presented several new mechanisms (Squared Cluster Match, Connection-Oriented Cluster Match, and EigenMatch) which build off of the already-proposed mechanisms in promising ways. Additionally, one new mechanism -Connection-Oriented Cluster Match -is entirely collusion resistant. On the other hand, we stress that the strengths and drawbacks we have pointed out only matter relative to the particular technical framework we have chosen for this paper. Since there are countless other technical perspectives one could take, one should not take our results as a treatise on which mechanisms are "good" and which are "bad", but instead as simply providing a deeper technical understanding of plural QF. One can find a summary of the results we have explored from our particular technical standpoint in table 1. Aside from the results listed in the table, we have shown that semi-coordinated agents break QF's optimality guarantee (appendix A); characterized the settings under which Offset Match is feasible (appendix F.1); and shown that one can use all of these results to build collusion-resistant QV mechanisms as well (section 1.4). Lastly, we have coded up all of these mechanisms and put them in a GitHub repository 3 so that others can explore them and run numerical experiments. Calculate coefficients to estimate social centrality, scale down individual contributions by those coefficients, then do QF on scaled contributions.

Unclear

Not always: exist scenarios where almost all agents have their contribution erased (appendix F.2

Match (Section 5)

Like vanila cluster Match, but use a set of psuedo-groups based on the eigenvectors of a social graph.

Unclear Unclear

We see several important avenues for future work, many of which bleed into each other. As noted in section B, it is unlikely that any mechanism could capture the full scope of social connections experienced by individuals. Therefore, it is vital to somehow estimate how distortive or harmful a plural mechanism could be in the absence of complete information. Second, we define groups and group membership in a very simple way: for us, groups are just sets and every member of a group relates to it in the same way. Research that tries to explore variance among group members, the way different groups relate to each other, and other more nuanced aspects of groups could be invaluable. Third, although we were able to show that Connection-Oriented Cluster Match is collusion-resistant, there is plenty of space to fine-tune the mechanism to make it less coarse and more practically usable. Fourth, there is much we still don't know about Squared Cluster Match, Eigen Match, and Offset Match. Lastly, we are quite curious about whether there exists some deeper theory of how socially-connected individuals make strategic decisions which can help us understand what we fundamentally mean when we talk about consilience.

On a broader scale, we also hope that this work contributes to the discussion on what economic thought can look like when we break out of the traditional framework that sees agents as selfish and isolated. Of course, there are areas of life where agents are more likely to act like homo economicus, but these areas do not represent the totality of human behavior. For example, ethnographic and economic fieldwork has shown time and time again that members of communities often behave in a way that is logical but not wholly selfish (e.g., [15, 14] ). If we are going to build tools to help these communities, we had better develop ways of thinking about how they work and incorporating those insights into what we build. Hopefully, this work can contribute to that conversation and help drive a sustainable pluralist future.

A.2 Discussion

For simplicity, we assumed in this proof that all agents internalize all other agents' utilities symmetrically. However, note that as long as some agent internalizes at least one other agent's utility to some degree, the above proof will still go through since the leftmost expression in (26) will still be greater than V ′ (F ).

However, a limitation of this proof is that despite some effort, we could not tie its modeling assumptions directly in to our definition of collusion resistance. Here, it only illustrates how naturally coordinating agents lead to sub-optimal funding levels under QF.

B Practical Considerations For Capturing Context Mechanistically

In practice, it is not easy to find the right identity policies for democratic processes like QV and QF, i.e., defining what social circles get to be recognized and participate in these mechanisms. Friedrich Schiller's 1797 question in Die Kraniche des Ibykus, "Who counts the peoples, calls the names?" seems just as relevant to the Plurality paradigm today. We believe that to optimally deploy social technologies like QF, one needs to satisfy the following properties.

• One needs to verify specific attributes about the participants that ensure the participants are affected by or knowledgeable about the questions of the democratic process. Otherwise, the process might lead to minority or local group oppression, disenfranchise essential individuals from the decision, or both phenomena [21] .

• Further, one needs to recognize participants' sociocultural attributes to increase cooperation across difference. These measures are specifically critical to address collusion resistance, as defined in the section below.

Since every collective decision comes with a unique context, it is questionable whether one can find universal solutions to these problems. The questions about "who should participate" and "which groups we should promote consilience between" depend on the substance of the funding decisions at hand. This substance is at least as much sociological as it is game-theoretical. For example, in a QV within a firm, one might want to foster consilience between different departments explicitly. In contrast, in a QV about urban infrastructure, the departments of that particular firm might be significantly less relevant (if at all) than consilience between citizens from different neighborhoods. The point we want to illustrate here is that there may hardly be a globally valid group mapping equally applicable to diverse decision-making processes. Instead, defining these parameters in a specific context will require exploration across a range of disciplines, including, for example, sociology, economics, statistics, and the opinions of the associated polity.

Because it seems unlikely that any one institution could ever understand the entire web of social connections or the full context of a democratic decision, a critical area for future work is better understanding how plural QF behaves in the absence of complete information, or in the presence of incorrect information. We are particularly interested in benchmarking plural QF against vanilla QF and other mechanisms for funding public goods (like voting or direct contribution) under these circumstances. Another related area of work involves understanding to what extent a mechanism can be strategy-proof with respect to the expression of one's social groups. In other words, it could be fruitful to design mechanisms that naturally incentivize people to honestly report relevant social information.

C Groups Can Extract Linearly Growing Subsidies Out Of Squared

Cluster Match.

To show a scenario in which a group of agents can exploit Squared Cluster Match, we will keep things simple and use the same setup as in section 3.2. Suppose we have agents {1, 2, 3} in groups X = {1, 2} and Y = {1, 3}. Also, assume that c 1 = c 2 . The funding amount under Squared Cluster Match is

EQUATION (27): Not extracted; please refer to original document.

where the RHS was attained by expanding the power of 2 and removing terms that included c 3 . Letting c X be the total amount contributed by all members of group X, we can re-write c 1 and c 2 as c X /2. Then the RHS of (27) becomes

EQUATION (28): Not extracted; please refer to original document.

for a constant k > 0 (specifically k = ( 5/4 − 1)/4). So the total funding amount minus c X is at least k • c X . In other words, as the members of X increase their contribution, the extra matching funds awarded to the project grow linearly. So Squared Cluster Match does not satisfy our definition of collusion resistance. It is worth noting that the constant k above is small (around 0.023). More work is needed to see if that is just a quirk of this example or something more deeply true about Squared Cluster Match. With this group structure, at least, we cannot get k to be arbitrarily large: some calculus reveals the biggest k we can get is k ≈ 0.107 by setting c 1 ≈ 0.2c 2 rather than c 1 = c 2 . In practice, it might be in the interest of mechanism designers reward groups who reveal themselves to the mechanism. So some mild linear increase in extra funds for groups, such as what we have identified here, might be a positive quality in some cases. By that same token, however, it is also important to note that with this group structure, when c 1 ≈ 1.5c 2 or more k becomes negative, meaning that if c 3 small enough, the entire funding amount will be less than c 1 + c 2 . In this case, it would not be rational for agents 1 and 2 to contribute anything at all (if possible, they would prefer to use another channel like PayPal to send the full amount c 1 + c 2 directly to the project). So more work is needed to explore where Squared Cluster Match incentivizes agents to report their group structures and where it discourages agents from participating in the mechanism.

D A Rigorous Definition Of Collusion Resistance

For some QF mechanism M , let M (c, G) be the amount of funding awarded to a project given contribution vector c and group structure G. Then we say that M is collusion-resistant if the following three sub-properties hold with respect to all agents i and all groups g:

1. Diminishing returns for individuals: M (c, G) − c i is O( √ c i ).

In other words, as agent i raises their contribution, the amount of subsidy capital given by M grows according to the root of their contribution.

2.

Diminishing returns for groups: Suppose all members of G scale up their contributions by a multiplicative factor of β. Then M (c, G) − c g is O( √ β). In other words, as the members of g increase their collective contribution, the subsidy capital grows according to the root of their collective contribution. To be clear, here c g represents the combined contribution of group g after contributions have been scaled up.

3. Diminishing returns from adding new members: Suppose x new agents join group g, each contributing γ. These agents can be new to the system or can have previously been in other groups as well. Then M (c, G) − c g is both O( √ x) and O( √ γ). To be clear, here c g represents the combined contribution of group g after the new members have been added.

Note that one could also expand this definition to simply require that the quantities above grow sub-linearly in the relevant variables: there is nothing special about using the square root here. However, this definition will make the proof in Appendix E more clean.

Although we imagine a certain uniformity over the behavior of agents (i.e. all agents in a group scale up their contribution by the same factor, or all new agents contribute the same amount), our definition of collusion resistance is still meaningful in scenarios with non-uniform behavior. For example, suppose that under a collusion-resistant mechanism M , the agents in some group g increased their contributions by different scalars. We could let β denote the largest scalar, and note that M's collusion resistance gives guarantees on how funding would behave if all agents had increased their contribution by a factor of β -but that scenario is itself an upper bound on the actual scenario with disparate scalars. So, transitively, we get meaningful guarantees for settings with disparate scalars as well.

EQUATION (29): Not extracted; please refer to original document.

where c i is the contribution of agent i, T i is the set of groups that agent i is in, and K(i, h) is some attenuation of c i depending on agent i's connections to group h. In particular, if i is in h or if i / ∈ h but i shares some group with some member of h, K(i, h) is √ c i . Otherwise, K(i, h) is c i .

Now for the proof of the theorem.

Proof. First, note that

EQUATION (30): Not extracted; please refer to original document.

Lastly we will consider the case where |ĝ ∩ h 1 | ≥ 1 and |ĝ ∩ h 2 | ≥ 1. Here, we know that all members ofĝ in this interaction term will have their contribution attenuated. Then examining the interaction term we have Now suppose that we fixed c i as c 0 i for every i ∈ĝ and then increased every member ofĝ's contribution by a factor of β (i.e. letting c i = βc 0 i for i ∈ĝ. Then (38), which upper bounds the interaction term, would become

EQUATION i∈h: Not extracted; please refer to original document.

EQUATION (39): Not extracted; please refer to original document.

which is O( √ β).

Diminishing returns from adding new members. Suppose that x agents join some groupĝ and donate γ each. Recall that these agents can be totally new to the system or can already be members of other groups, but here we only consider the effect of them joining groupĝ. For agents who were already in other groups, we imagine that they were donating γ before and after joiningĝ.

Because we only want to understand how funding changes as new agents joinĝ, and because agents who were already in other groups don't change their contribution amount, all interaction terms that don't directly involveĝ are constant with regard to x and γ. So we only need to examine interaction terms concerningĝ and some other group h.

If none of the x new members were in group h, then the interaction term evaluates to

EQUATION (40): Not extracted; please refer to original document.

where the constant term inside the square root represents the contributions of the members ofĝ who were already there -this amount does not depend on x or γ. Now suppose some of the x new members were in group h. This amount must be some constant y. Also note that since at least one agent is in bothĝ and h, K(i, h) and K(j,ĝ) will evaluate to √ c i and √ c j for all i ∈ĝ and j ∈ h. Now, the interaction term will be

EQUATION (42): Not extracted; please refer to original document.

which is O( √ γ) and O( √ x).

SECTION

In this framework, a person's unique desires independent of any other social ties could be represented as a singleton group containing just that person.

Electronic copy available at: https://ssrn.com/abstract=4311507

A bag is a set in which duplicate (or triplicate, et cetera) elements are allowed. We use a bag instead of a set to allow to allow multiple groups with the same members.

https://github.com/Jmiller4/plural-qf