Robustly Self-Ordered Graphs: Constructions and Applications to Property Testing

Authors Oded Goldreich , Avi Wigderson



PDF
Thumbnail PDF

File

LIPIcs.CCC.2021.12.pdf
  • Filesize: 1.51 MB
  • 74 pages

Document Identifiers

Author Details

Oded Goldreich
  • Faculty of Mathematics and Computer Science, Weizmann Institute of Science, Rehovot, Israel
Avi Wigderson
  • School of Mathematics, Institute for Advanced Study, Princeton, USA

Acknowledgements

We are grateful to Eshan Chattopadhyay for discussions regarding non-malleable two-source extractors, and to Dana Ron for discussions regarding tolerant testing. We are deeply indebted to Jyun-Jie Liao for pointing out an error in the proof of [O. Goldreich and A. Wigderson, 2020].

Cite As Get BibTex

Oded Goldreich and Avi Wigderson. Robustly Self-Ordered Graphs: Constructions and Applications to Property Testing. In 36th Computational Complexity Conference (CCC 2021). Leibniz International Proceedings in Informatics (LIPIcs), Volume 200, pp. 12:1-12:74, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2021) https://doi.org/10.4230/LIPIcs.CCC.2021.12

Abstract

A graph G is called self-ordered (a.k.a asymmetric) if the identity permutation is its only automorphism. Equivalently, there is a unique isomorphism from G to any graph that is isomorphic to G. We say that G = (V,E) is robustly self-ordered if the size of the symmetric difference between E and the edge-set of the graph obtained by permuting V using any permutation π:V → V is proportional to the number of non-fixed-points of π. In this work, we initiate the study of the structure, construction and utility of robustly self-ordered graphs. 
We show that robustly self-ordered bounded-degree graphs exist (in abundance), and that they can be constructed efficiently, in a strong sense. Specifically, given the index of a vertex in such a graph, it is possible to find all its neighbors in polynomial-time (i.e., in time that is poly-logarithmic in the size of the graph).
We provide two very different constructions, in tools and structure. The first, a direct construction, is based on proving a sufficient condition for robust self-ordering, which requires that an auxiliary graph is expanding. The second construction is iterative, boosting the property of robust self-ordering from smaller to larger graphs. Structuraly, the first construction always yields expanding graphs, while the second construction may produce graphs that have many tiny (sub-logarithmic) connected components. 
We also consider graphs of unbounded degree, seeking correspondingly unbounded robustness parameters. We again demonstrate that such graphs (of linear degree) exist (in abundance), and that they can be constructed efficiently, in a strong sense. This turns out to require very different tools. Specifically, we show that the construction of such graphs reduces to the construction of non-malleable two-source extractors (with very weak parameters but with some additional natural features). 
We demonstrate that robustly self-ordered bounded-degree graphs are useful towards obtaining lower bounds on the query complexity of testing graph properties both in the bounded-degree and the dense graph models. Indeed, their robustness offers efficient, local and distance preserving reductions from testing problems on ordered structures (like sequences) to the unordered (effectively unlabeled) graphs. One of the results that we obtain, via such a reduction, is a subexponential separation between the query complexities of testing and tolerant testing of graph properties in the bounded-degree graph model.

Subject Classification

ACM Subject Classification
  • Theory of computation → Generating random combinatorial structures
Keywords
  • Asymmetric graphs
  • expanders
  • testing graph properties
  • two-source extractors
  • non-malleable extractors
  • coding theory
  • tolerant testing
  • random graphs

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. L. Babai. Graph isomorphism in quasipolynomial time. In 48th ACM Symposium on the Theory of Computing, pages 684-697, 2016. Google Scholar
  2. E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, and S. Vadhan. Robust pcps of proximity, shorter pcps, and applications to coding. SIAM Journal on Computing, 36 (4):889-974, 2006. Google Scholar
  3. A. Bogdanov, K. Obata, and L. Trevisan. A lower bound for testing 3-colorability in bounded-degree graphs. In 43rd IEEE Symposium on Foundations of Computer Science, pages 93-102, 2002. Google Scholar
  4. B. Bollobas. The asymptotic number of unlabelled regular graphs. J. Lond. Math. Soc., 26:201-206, 1982. Google Scholar
  5. B. Bollobas. Distinguishing vertices of random graphs. North-Holland Mathematics Studies, 62:33-49, 1982. Google Scholar
  6. J. Bourgain and A. Gamburd. Uniform expansion bounds for cayley graphs of SL₂(f_p). Annals of Mathematics,, pages 625-642, 2008. Google Scholar
  7. E. Chattopadhyay, V. Goyal, and X. Li. Non-malleable extractors and codes, with their many tampered extensions. In 48th STOC, pages 285-298, 2016. Google Scholar
  8. M. Cheraghchi and V. Guruswami. Non-malleable coding against bit-wise and split-state tampering. In 11th TCC, pages 440-464, 2014. Google Scholar
  9. B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230-261, 1988. Google Scholar
  10. I. Dinur, O. Goldreich, and T. Gur. Every set in p is strongly testable under a suitable encoding. In 10th ITCS, pages 30:1-30:17, 2019. Google Scholar
  11. I. Dinur and O. Reingold. Assignment-testers: Towards a combinatorial proof of the pcp-theorem. SIAM Journal on Computing, 36(4):975-1024, 2006. Google Scholar
  12. Y. Dodis and D. Wichs. Non-malleable extractors and symmetric key cryptography from weak secrets. In 41st STOC, pages 601-610, 2009. Google Scholar
  13. D. Ellis. Lecture 13: The expansion of random regular graphs. Lecture notes, Algebraic Methods in Combinatorics, 2011. Google Scholar
  14. P. Erdos and A. Renyi. Asymmetric graphs. Acta Mathematica Hungarica, 14(3):295-315, 1963. Google Scholar
  15. E. Fischer and L. Fortnow. Tolerant versus intolerant testing for boolean properties. Theory of Computing, 2(9):173-183, 2006. Google Scholar
  16. O. Goldreich. Introduction to Property Testing. Cambridge University Press, 2017. Google Scholar
  17. O. Goldreich. On testing hamiltonicity in the bounded degree graph model. ECCC, TR19-109, 2020. Google Scholar
  18. O. Goldreich, S. Goldwasser, and D. Ron. Property testing and its connection to learning and approximation. Journal of the ACM, pages 653-750, 1998. Google Scholar
  19. O. Goldreich, M. Krivelevich, I. Newman, and E. Rozenberg. Hierarchy theorems for property testing. Computational Complexity, 21(1):129-192, 2012. Google Scholar
  20. O. Goldreich and D. Ron. Property testing in bounded degree graphs. Algorithmica, 32(2):302-343, 2002. Google Scholar
  21. O. Goldreich and A. Wigderson. Constructing large families of pairwise far permutations: Good permutation codes based on the shuffle-exchange network. ECCC, TR20-192, 2020. Google Scholar
  22. O. Goldreich and A. Wigderson. Non-adaptive vs adaptive queries in the dense graph testing model. ECCC, TR20-160, 2020. Google Scholar
  23. O. Goldreich and A. Wigderson. Robustly self-ordered graphs: Constructions and applications to property testing. ECCC, TR20-149, 2020. Google Scholar
  24. C.S. Greenhill, S. Janson, J.H. Kim, and N.C. Wormald. Permutation pseudographs and contiguity. Combinatorics, Probability and Computing, 11:273-298, 2002. Google Scholar
  25. S. Hoory, N. Linial, and A. Wigderson. Expander graphs and their applications. Bulletin (New Series) of the American Mathematical Society, 43(4):439-561, 2006. Google Scholar
  26. J.H. Kim, B. Sudakov, and V.H. Vu. On the asymmetry of random regular graphs and random graphs. Random Structures & Algorithms, 21(3-4):216-224, 2002. Google Scholar
  27. A. Lubotzky. Discrete groups, expanding graphs and invariant measures. Progress in mathematics, 125, 1994. Google Scholar
  28. A. Lubotzky, R. Phillips, and P. Sarnak. Ramanujan graphs. Combinatorica, 8:261-277, 1988. Google Scholar
  29. E.M. Luks. Isomorphism of graphs of bounded valence can be tested in polynomial time. Journal of Computer and System Science, 25(1):42-65, 1982. Google Scholar
  30. M. Parnas, D. Ron, and R. Rubinfeld. Tolerant property testing and distance approximation. Journal of Computer and System Science, 72(6):1012-1042, 2006. Google Scholar
  31. R. Rubinfeld and M. Sudan. Robust characterization of polynomials with applications to program testing. SIAM Journal on Computing, 25(2):252-271, 1996. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail