Tight Bounds on the Message Complexity of Distributed Tree Verification

S. Kutten, Peter Robinson, Ming Ming Tan
{"title":"Tight Bounds on the Message Complexity of Distributed Tree Verification","authors":"S. Kutten, Peter Robinson, Ming Ming Tan","doi":"10.4230/LIPIcs.OPODIS.2023.26","DOIUrl":null,"url":null,"abstract":"We consider the message complexity of verifying whether a given subgraph of the communication network forms a tree with specific properties both in the KT-$\\rho$ (nodes know their $\\rho$-hop neighborhood, including node IDs) and the KT-$0$ (nodes do not have this knowledge) models. We develop a rather general framework that helps in establishing tight lower bounds for various tree verification problems. We also consider two different verification requirements: namely that every node detects in the case the input is incorrect, as well as the requirement that at least one node detects. The results are stronger than previous ones in the sense that we assume that each node knows the number $n$ of nodes in the graph (in some cases) or an $\\alpha$ approximation of $n$ (in other cases). For spanning tree verification, we show that the message complexity inherently depends on the quality of the given approximation of $n$: We show a tight lower bound of $\\Omega(n^2)$ for the case $\\alpha \\ge \\sqrt{2}$ and a much better upper bound (i.e., $O(n \\log n)$) when nodes are given a tighter approximation. On the other hand, our framework also yields an $\\Omega(n^2)$ lower bound on the message complexity of verifying a minimum spanning tree (MST), which reveals a polynomial separation between ST verification and MST verification. This result holds for randomized algorithms with perfect knowledge of the network size, and even when just one node detects illegal inputs, thus improving over the work of Kor, Korman, and Peleg (2013). For verifying a $d$-approximate BFS tree, we show that the same lower bound holds even if nodes know $n$ exactly, however, the lower bound is sensitive to $d$, which is the stretch parameter.","PeriodicalId":361168,"journal":{"name":"International Conference on Principles of Distributed Systems","volume":"40 9","pages":"26:1-26:22"},"PeriodicalIF":0.0000,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Principles of Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/LIPIcs.OPODIS.2023.26","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We consider the message complexity of verifying whether a given subgraph of the communication network forms a tree with specific properties both in the KT-$\rho$ (nodes know their $\rho$-hop neighborhood, including node IDs) and the KT-$0$ (nodes do not have this knowledge) models. We develop a rather general framework that helps in establishing tight lower bounds for various tree verification problems. We also consider two different verification requirements: namely that every node detects in the case the input is incorrect, as well as the requirement that at least one node detects. The results are stronger than previous ones in the sense that we assume that each node knows the number $n$ of nodes in the graph (in some cases) or an $\alpha$ approximation of $n$ (in other cases). For spanning tree verification, we show that the message complexity inherently depends on the quality of the given approximation of $n$: We show a tight lower bound of $\Omega(n^2)$ for the case $\alpha \ge \sqrt{2}$ and a much better upper bound (i.e., $O(n \log n)$) when nodes are given a tighter approximation. On the other hand, our framework also yields an $\Omega(n^2)$ lower bound on the message complexity of verifying a minimum spanning tree (MST), which reveals a polynomial separation between ST verification and MST verification. This result holds for randomized algorithms with perfect knowledge of the network size, and even when just one node detects illegal inputs, thus improving over the work of Kor, Korman, and Peleg (2013). For verifying a $d$-approximate BFS tree, we show that the same lower bound holds even if nodes know $n$ exactly, however, the lower bound is sensitive to $d$, which is the stretch parameter.
分布式树验证信息复杂性的严格界限
我们考虑了在 KT-$\rho$(节点知道自己的 $\rho$-跳邻域,包括节点 ID)和 KT-$0$(节点不知道)模型中,验证通信网络的给定子图是否形成了具有特定属性的树的信息复杂度。我们开发了一个相当通用的框架,有助于为各种树验证问题建立严格的下界。我们还考虑了两种不同的验证要求:即在输入不正确的情况下每个节点都能检测到,以及至少有一个节点能检测到。我们假设每个节点都知道图中的节点数 $n$(在某些情况下)或 $n$ 的近似值 $\alpha$(在其他情况下),在这个意义上,我们的结果比以前的结果更强。对于生成树验证,我们证明信息复杂度本质上取决于所给定的 $n$ 近似值的质量:我们展示了在 $\alpha \ge \sqrt{2}$ 的情况下的$\Omega(n^2)$ 的严格下限,以及当节点被赋予更严格的近似值时的更好的上限(即 $O(n \log n)$)。另一方面,我们的框架还给出了验证最小生成树(MST)的信息复杂度的$\Omega(n^2)$下限,揭示了ST验证和MST验证之间的多项式分离。这一结果适用于完全了解网络规模的随机算法,甚至在只有一个节点检测到非法输入的情况下也是如此,从而改进了 Kor、Korman 和 Peleg(2013 年)的工作。对于验证 $d$ 近似 BFS 树,我们证明即使节点完全知道 $n$,同样的下界也是成立的,不过,下界对作为伸展参数的 $d$ 很敏感。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信