{"title":"Etherless Ethereum tokens: Simulating native tokens in Ethereum","authors":"John Andrews , Michele Ciampi , Vassilis Zikas","doi":"10.1016/j.jcss.2023.02.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.001","url":null,"abstract":"<div><p>Standardized Ethereum tokens, e.g., ERC-20 tokens, have become the norm in fundraising (through ICOs) and kicking off blockchain-based DeFi applications. However, they require the user's wallet to hold both tokens and ether to pay the gas fee for making a transaction. This makes for a cumbersome user experience, and complicates, from the user perspective, the process of transitioning to a different smart-contract enabled blockchain, or to a newly launched blockchain. We formalize, instantiate, and analyze in a composable manner a system that we call <em>Etherless Ethereum Tokens</em> (in short, EETs), which allows the token users to transact in a closed-economy manner, i.e., having only tokens on their wallet and paying any transaction fees in tokens rather than Ether/Gas. In the process, we devise a methodology for capturing Ethereum token-contracts in the Universal Composability (UC) framework, which can be of independent interest.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 55-72"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giuseppe Liotta , Ignaz Rutter , Alessandra Tappini
{"title":"Parameterized complexity of graph planarity with restricted cyclic orders","authors":"Giuseppe Liotta , Ignaz Rutter , Alessandra Tappini","doi":"10.1016/j.jcss.2023.02.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.007","url":null,"abstract":"<div><p>We study the complexity of testing whether a biconnected graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span> is planar with the constraint that some cyclic orders of the edges incident to its vertices are allowed while some others are forbidden. The allowed cyclic orders are described by associating every vertex <em>v</em> of <em>G</em> with a set <span><math><mi>D</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span> of FPQ-trees. Let <em>tw</em> be the treewidth of <em>G</em> and let <span><math><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span> be the maximum number of FPQ-trees per vertex. We show that the problem is FPT when parameterized by <span><math><mtext>tw</mtext><mo>+</mo><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>, paraNP-hard when parameterized by <span><math><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>, and W[1]-hard when parameterized by <em>tw</em>. We also consider NodeTrix planar representations of clustered graphs, where clusters are adjacency matrices and inter-cluster edges are non-intersecting simple curves. We prove that NodeTrix planarity with fixed sides is FPT when parameterized by the size of clusters plus the treewidth of the graph obtained by collapsing clusters to single vertices, provided that this graph is biconnected.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 125-144"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complexity of word problems for HNN-extensions","authors":"Markus Lohrey","doi":"10.1016/j.jcss.2023.02.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.005","url":null,"abstract":"<div><p><span>The computational complexity of the word problem in HNN-extension of groups is studied. HNN-extension is a fundamental construction in combinatorial group theory. It is shown that the word problem for an ascending HNN-extension of a group </span><em>H</em> is logspace reducible to the so-called compressed word problem for <em>H</em>. The main result of the paper states that the word problem for an HNN-extension of a hyperbolic group <em>H</em><span> with cyclic associated subgroups can be solved in polynomial time<span>. This result can be easily extended to fundamental groups of graphs of groups with hyperbolic vertex groups and cyclic edge groups.</span></span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 145-157"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bankrupting Sybil despite churn","authors":"Diksha Gupta , Jared Saia , Maxwell Young","doi":"10.1016/j.jcss.2023.02.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.004","url":null,"abstract":"<div><p><span>A Sybil attack<span> occurs when an adversary controls multiple system identifiers (IDs). Limiting the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A popular tool for enforcing a bad minority is resource burning (RB): the verifiable consumption of a network resource. Unfortunately, typical RB defenses require non-Sybil (good) IDs to consume at least as many resources as the adversary. We present a new defense, </span></span><span>Ergo</span>, that guarantees (1) there is always a bad minority; and (2) during a significant attack, the good IDs consume asymptotically less resources than the bad. Specifically, despite high churn, the good-ID RB rate is <span><math><mi>O</mi><mo>(</mo><msqrt><mrow><mi>T</mi><mi>J</mi></mrow></msqrt><mo>+</mo><mi>J</mi><mo>)</mo></math></span>, where <em>T</em> is the adversary's RB rate, and <em>J</em> is the good-ID join rate. We show this RB rate is asymptotically optimal for a large class of algorithms, and we empirically demonstrate the benefits of <span>Ergo</span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 89-124"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How heavy independent sets help to find arborescences with many leaves in DAGs","authors":"Cristina G. Fernandes , Carla N. Lintzmayer","doi":"10.1016/j.jcss.2023.02.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.006","url":null,"abstract":"<div><p>Trees with many leaves have applications for broadcasting a message to all recipients simultaneously. Internal nodes of a broadcasting tree require more expensive technology to forward the messages received. We address a problem that captures the main goal: finding spanning trees with few internal nodes in a given network. The <span>Maximum Leaf Spanning Arborescence</span> problem consists of, given a directed graph <em>D</em>, finding a spanning arborescence of <em>D</em>, if one exists, with the maximum number of leaves. This problem is NP-hard in general and MaxSNP-hard in the rooted directed acyclic graphs class. This paper explores a relationship between <span>Maximum Leaf Spanning Arborescence</span> in rooted directed acyclic graphs and maximum weight set packing. The latter problem is related to independent sets on particular classes of intersection graphs. Exploiting this relation, we derive a 7/5-approximation for <span>Maximum Leaf Spanning Arborescence</span> on rooted directed acyclic graphs, improving on the previous 3/2-approximation.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 158-174"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the exact amount of missing information that makes finding possible winners hard","authors":"Palash Dey , Neeldhara Misra","doi":"10.1016/j.jcss.2023.02.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.003","url":null,"abstract":"<div><p>In the <em>possible winner</em> problem, we need to compute if a set of partial votes can be completed such that a given candidate wins the election under some specific voting rule. In this paper, we determine the smallest number of undetermined pairs per partial vote for which the <span>Possible Winner</span> problem is <span><math><mi>NP</mi></math></span>-complete. In particular, we find the exact values of <em>t</em> for which the <span>Possible Winner</span> problem transitions to being <span><math><mi>NP</mi></math></span>-complete from being in <span><math><mi>P</mi></math></span>, where <em>t</em> is the maximum number of undetermined pairs in every vote. We demonstrate tight results for a broad class of scoring rules, Copeland<sup><em>α</em></sup> for every <span><math><mi>α</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>]</mo></math></span>, maximin, and Bucklin voting rules. A somewhat surprising aspect of our results is that for many of these rules, the <span>Possible Winner</span> problem turns out to be hard even if every vote has at most one undetermined pair of candidates.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 32-54"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parameterised temporal exploration problems","authors":"Thomas Erlebach , Jakob T. Spooner","doi":"10.1016/j.jcss.2023.01.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.003","url":null,"abstract":"<div><p>We study the fixed-parameter tractability of the problem of deciding whether a given temporal graph admits a temporal walk that visits all vertices (temporal exploration) or, in some variants, a certain subset of the vertices. In the strict variant, edges must be traversed in strictly increasing timesteps; in the non-strict variant, any number of edges can be traversed in each timestep. For both variants, we give <span>FPT</span> algorithms for finding a temporal walk that visits a given set <em>X</em> of vertices, parameterised by <span><math><mo>|</mo><mi>X</mi><mo>|</mo></math></span>, and for finding a temporal walk that visits at least <em>k</em> distinct vertices, parameterised by <em>k</em>. We also show <span><math><mtext>W</mtext><mo>[</mo><mn>2</mn><mo>]</mo></math></span>-hardness for a set version of temporal exploration. For the non-strict variant, we give an <span>FPT</span> algorithm for temporal exploration parameterised by the lifetime, and show that temporal exploration can be solved in polynomial time if the graph in each timestep has at most two connected components.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 73-88"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bipartite 3-regular counting problems with mixed signs","authors":"Jin-Yi Cai, Austen Z. Fan, Yin Liu","doi":"10.1016/j.jcss.2023.01.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.006","url":null,"abstract":"<div><p>We prove a complexity dichotomy for a class of counting problems expressible as bipartite 3-regular Holant problems. These are also counting CSP problems where every constraint has arity 3 and every variable is read-thrice. For every problem of the form <span><math><mi>Holant</mi><mspace></mspace><mrow><mo>(</mo><mi>f</mi><mo>|</mo><msub><mrow><mo>=</mo></mrow><mrow><mn>3</mn></mrow></msub><mo>)</mo></mrow></math></span>, where <em>f</em> is any integer (or equivalently, rational)-valued ternary symmetric constraint function on Boolean variables, we prove that it is either P-time computable or #P-hard, depending on an explicit criterion of <em>f</em>. The constraint function can take both positive and negative values, allowing for cancellations. In addition, we discover a new phenomenon: there is a set <span><math><mi>F</mi></math></span> with the property that for every <span><math><mi>f</mi><mo>∈</mo><mi>F</mi></math></span> the problem <span><math><mi>Holant</mi><mspace></mspace><mrow><mo>(</mo><mi>f</mi><mo>|</mo><msub><mrow><mo>=</mo></mrow><mrow><mn>3</mn></mrow></msub><mo>)</mo></mrow></math></span> is planar P-time computable but #P-hard in general, yet its planar tractability is by a <em>combination</em> of a holographic transformation by <span><math><mo>[</mo><mtable><mtr><mtd><mn>1</mn></mtd><mtd><mn>1</mn></mtd></mtr><mtr><mtd><mn>1</mn></mtd><mtd><mo>−</mo><mn>1</mn></mtd></mtr></mtable><mo>]</mo></math></span> to FKT <em>together</em> with an independent global argument.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 15-31"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicolas Maack , Hendrik Molter , Rolf Niedermeier , Malte Renken
{"title":"On finding separators in temporal split and permutation graphs","authors":"Nicolas Maack , Hendrik Molter , Rolf Niedermeier , Malte Renken","doi":"10.1016/j.jcss.2023.01.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.004","url":null,"abstract":"<div><p>We study the NP-hard <span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span><span> problem on temporal graphs<span>, which are graphs with fixed vertex sets but edge sets that change over discrete time steps. We tackle </span></span><span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span><span> by restricting the layers (i.e., graphs characterized by edges that are present at a certain point in time) to specific graph classes. We restrict the layers of the temporal graphs to be either all split graphs or all permutation graphs (both being perfect graph classes) and provide both intractability and tractability results. In particular, we show that in general </span><span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span> remains NP-hard both on temporal split and temporal permutation graphs, but we also spot promising islands of fixed-parameter tractability particularly based on parameterizations that measure the amount of “change over time”.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 1-14"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elijah Hradovich , Marek Klonowski , Dariusz R. Kowalski
{"title":"Restrained medium access control on adversarial shared channels","authors":"Elijah Hradovich , Marek Klonowski , Dariusz R. Kowalski","doi":"10.1016/j.jcss.2023.103463","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103463","url":null,"abstract":"<div><p>We study the fundamental problem of utilization of the channel shared by stations competing to transmit packets on the channel. In their turn, packets are continuously injected into stations' queues by an adversary at a rate at most <em>ρ</em><span> packets per round. The aim of the distributed medium access control algorithms is to successfully transmit packets and maintain system stability (bounded queues). We further restrain algorithms by introducing an upper bound </span><em>k</em> on the allowed number of active stations in any given round. We construct adaptive and full sensing protocols with optimal throughput 1 and almost optimal throughput <span><math><mn>1</mn><mo>−</mo><mi>ϵ</mi></math></span> (for any positive <em>ϵ</em>), respectively, in a constant-restrained channel. On the opposite side, we show that restricted protocols based on schedules known in advance suffer from a substantial drop of throughput, at most <span><math><mi>min</mi><mo></mo><mo>{</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><mo>,</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>log</mi><mo></mo><mi>n</mi></mrow></mfrac><mo>}</mo></math></span>. We compare our algorithms experimentally with well-known backoff protocols.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103463"},"PeriodicalIF":1.1,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}