200 likes | 318 Views
Proof labeling schemes. Amos Korman, Weizmann Shay Kutten, Technion David Peleg, Weizmann. Goals. Local verification of global properties How expensive is local verification, compared to the computation?. Motivation: 3 coloring. (this example uses time complexity,
E N D
Proof labeling schemes Amos Korman, Weizmann Shay Kutten, Technion David Peleg, Weizmann
Goals • Local verification of global properties • How expensive is local verification, compared to the computation? Motivation: 3 coloring (this example uses time complexity, while we use a form of communication complexity)
Informal description of model Lw Sw Lv Sv Lu Su f(Gs)=1 ? We add labels to prove that. Cost of verification = label size: capture communication (may be smaller than the node’s state!)
Motivation detection Self stabilization computation Self stabilization by local detection appears in: [Afek, Kutten, Yung, 97], [Awerbuch, Patt-Shamir, Varghese, 91], [Awerbuch, Patt-Shamir, Varghese, Dolev, 94], [Awerbuch, Varghese, 91], [Arora, Gouda, 90], [Aggarwal, Kutten, 93], [Awerbuch, Kutten, Mansour, Patt-Shamir, Varghese, 93], [Dolev, Israeli, Moran, 93 and 97].
This paper: Detection • Basic examples • Impossibility results • Construction methods • Lower bounds
Difference between models Self stabilization: Design, compute and verify : (The computation is designed to be easily verified: enables short labels) This paper: Verify anygiven configuration (modularity) Example: Task: verify disjoint states on a path Design, compute and verify: label size = O(log n) Verify any given configuration: label size = (n)
The model Graph Gswith a state at each node Graph family: = { Gs} Function: f : {0,1} Example: f = spanning tree states induce subgraph H eH endpoint points at e f(Gs) = 1 the subgraph is a spanning tree.
Proof labeling scheme for and f - Marker M :Input : Gs Output: Label M(v) vin Gs : Input : NL(v), composed of: - Decoder D Output: 0 or 1 v L(x) x L(v) y s L(y) v z L(z)
Requirements Gs: f(Gs) = 1 v , D(NM(v)) = 1 f(Gs) = 0 L , v Gs s.t. D(NL(v)) = 0 Complexity measure: Size of proof = max { |M(v)| : Gs , v Gs}
Basic Examples: Example 1: Spanning Tree in Id-based Graphs Lemma: proof size is (log n). Upper bound : Given Gs s.t. f(Gs)=1 set M(v) = < id(root), distH(v,root) > root This idea was used previously, e.g., in [Arora,Gouda,90], [Aggarwal, Kutten,93], [Awerbuch, Kutten,Mansour, 93], [Afek, Dolev, 02], [Afek, Kutten, Yung, 97], [Dolev, Israeli, Moran, 97]. 0 2 1 3 2
We show a matching lower bound: v v i k path f(p) = 1 Assume M(vi) < ½ log n for every i Two pairs < M(vi),M(vi+1) > = < M(vk),M(vk+1) > M(vk) M(vi+1) M(vk-1)
Example 2: Orientation in Anonymous Trees Lemma: Proof size = O(1) 0 M(v) = dist(v, root) mod 3 1 D(NL(v)) =1 (a) u neighbor of v : 2 |L(v)-L(u)| = 1 mod 3 0 (b) L(u)+1 =L(v) mod 3 1 v u Note: the label size (O(1)) is smaller than the state size (O(log n))
What can be proven locally Id based families: every computable property is provable. Anonymous families: question reduces to proving a unique leader. L1 L5 L2 L1 L3 L2 L4 L5 L4 L3 L3 L4 L5 L2 L1
Cost of identities Transition from anonymous to id-based is sometimes possible but may be costly. Path: f = unique states (1 to n) Lemma : proof size = (n) Recall: if the design of the states and the verification are designed together: O(log n).
Construction Methods The distributed method: For given f and , if a satisfying Gs can be computed by a distributed algorithm A of message complexity m, then construct proof labels of length O(m) “documenting” an execution of A. ~
The distributed method (cont.) Formally: Consider f, and a nondeterministic distributed algorithm A s.t Gs s.t f(Gs) = 1 run A’ of A s.t. : 1) A’(G) = Gs 2) # of messages v sends in A’(G) < m 3) Each message < O(log n) bits 4) run A’, f(A’(G))=1 Lemma: Proof size of f and is O(m(log m+log n))
The distributed method (cont.) If A is syncronous and : 1) # rounds < p 2) # message of v per round < mp Lemma: Proof size of f and is min { O(m(log p+log n)), O(pmplog n)} Example : MST Lemma: proof size of MST is O(log2n+log nlog W) Lemma: proof size of MST is (log n+log W)
Construction method 2 : Composition of proofs is • k-independent set and k-clique (log n) • k- s-t vertex connectivity (log n) • k-flow O(klog n) • diameter on trees (log n+log W) • maximum matching on a path (log n+log W) Proof size of
Open problems • A potentially reach field, full with open problems • - Find Lower & upper bounds for known graph problems • - Find a structure, classes? reductions?