Deterministic Even-Cycle Detection in Broadcast CONGEST
Abstract
We show that, for every , -freeness can be decided in rounds in the Broadcast CONGEST model, by a deterministic algorithm. This (deterministic) round-complexity is optimal for up to logarithmic factors thanks to the lower bound for -freeness by Drucker et al. [PODC 2014], which holds even for randomized algorithms. Moreover it matches the round-complexity of the best known randomized algorithms by Censor-Hillel et al. [DISC 2020] for , and by Fraigniaud et al. [PODC 2024] for . Our algorithm uses parallel BFS-explorations with deterministic selections of the set of paths that are forwarded at each round, in a way similar to what was done for the detection of odd-length cycles, by Korhonen and Rybicki [OPODIS 2017]. However, the key element in the design and analysis of our algorithm is a new combinatorial result bounding the “local density” of graphs without -cycles, which we believe is interesting on its own.
Keywords and phrases:
local computing, CONGEST modelCategory:
Track A: Algorithms, Complexity and GamesCopyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Distributed algorithmsFunding:
Research supported in part by the European QuantERA project QOPT (ERA-NET Cofund 2022-25), the French ANR project DUCAT (ANR-20-CE48-0006), the French PEPR integrated project EPiQ (ANR-22-PETQ-0007), the French project FQPS (ANR-21-CMAQ-0001), and the Japanese grants JSPS KAKENHI 24H00071, JST ASPIRE JPMJAP2302 and MEXT Q-LEAP JPMXS0120319794.Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele PuppisSeries and Publisher:

1 Introduction
In the context of distributed computing in networks, deciding -freeness for a given (connected) graph has attracted a lot of attention in the standard CONGEST model (see, e.g., the survey [2]). Indeed, this problem is inherently local, and thus the main concern is measuring the amount of information that must be exchanged between the nodes for solving it. Recall that the CONGEST model [11] assumes processing nodes connected as an -node graph . Computation proceeds as a sequence of rounds. During each round, every node can send an -bit message to each of its neighbors, receive the messages sent by its neighbors, and perform some individual computation. In the broadcast version of the model, which is the one used in this paper, it is required that, at each round, each node sends the same message to all its neighbors. An algorithm decides -freeness if, for every graph , the following holds: If contains a subgraph isomorphic to then at least one node rejects, otherwise all nodes accept.
For every , let denote the -node cycle. It is known that, for every , there exists a deterministic algorithm deciding -freeness in rounds [9], which is optimal up to logarithmic factors. It is however possible to decide the presence of even-size cycles in a sub-linear number of rounds. In particular, there exists a deterministic algorithm deciding -freeness in rounds [4], which is optimal up to logarithmic factors, even for randomized algorithms. For every , there exist randomized algorithms deciding -freeness in rounds [3, 6]. The algorithms in [3], based on the “local threshold” technique, apply to , whereas the algorithms in [6], based on the “global threshold” technique, apply to all .
All aforementioned randomized algorithms are 1-sided, i.e., if contains a -cycle, then the probability that at least one node rejects is at least , but if does not contain a -cycle, then the probability that all nodes accept is 1. Of course, the error probability of these algorithms can be made as small as desired by mere repetition. Yet, it may still be the case that contains a -cycle that is not detected, even if this occurs with arbitrarily small probability. This raises the question of whether -freeness can be decided by a deterministic algorithm (which would thus provide absolute success) without increasing the round complexity. This is the case for all odd cycles of length , and for 4-cycles [4, 9]. We show that this holds for all even cycles as well, by establishing the following result.
Theorem 1.
For every , there is a deterministic algorithm solving -freeness in rounds in the Broadcast CONGEST model.
Our deterministic algorithm solving -freeness in rounds is generic, parameterized by . For , i.e., for -freeness, our algorithm coincides with the one in [4]. In fact, our algorithm can be viewed as a generalisation of the latter. As for the algorithms in [3, 6], they distinguish the case of light cycles, i.e., -cycles containing solely nodes with degree smaller than , from the case of heavy cycles, i.e., -cycles containing at least one node with degree at least . Light cycles can be easily detected deterministically by flooding, in rounds [3, 6], and the main issue is to show that heavy cycles can also be detected deterministically in rounds. We show that this is indeed possible.
Our algorithm (for detecting heavy cycles) relies on combining the Representative Lemma by Monien [10], with a new “Density Theorem”. In a nutshell, the Representative Lemma can be used to show that, as already observed in [8, 9], for each source node , it is not necessary for intermediate nodes to forward all prefixes of paths with endpoint for eventually finding one path forming a cycle containing , but forwarding a constant number of prefixes suffices. Our density theorem is used to show that, if a node has to forward prefixes of paths in total (i.e., corresponding to source nodes ), then there must exist a -cycle in the graph . More precisely, our theorem states the following.
Theorem 2.
Let be an -node graph. For every , and every integer , let be the set of nodes that are reachable from by a simple path of length exactly . For every integer , if there exist and such that
then there is a -cycle in .
Combining the Representative Lemma by Monien [10] with our density theorem, our algorithm for heavy -cycles boils down to flooding the network for steps with path-prefixes originated at all heavy nodes , under the following simple condition: at every step , if a node has to forward prefixes coming from more than heavy nodes then rejects.
If flooding is completed without any rejection then the Representative Lemma guarantees that a -cycle will be detected if any. Instead, if flooding aborts at some rejecting nodes, then the density theorem guarantees that this rejection is legitimate as there must exist a -cycle.
2 Model and Preliminary Results
This section recalls the standard (Broadcast) CONGEST model, and takes benefit of the 4-cycle detection algorithm in [4] for introducing the reader with some of the techniques that will be reused throughout the paper. This is particularly the case of the Representative Lemma by Monien [10], which is the basis for implementing a filtering technique enabling to bound the congestion of cycle-detection algorithms.
2.1 The Broadcast CONGEST Model
The CONGEST model [11] assumes processing nodes connected by a network modeled as an arbitrary -node graph . (All graphs are supposed to be connected and simple, i.e., no multiple edges nor self-loops.) Each node in has an identifier taken from a polynomial range of identifiers, and thus encoded on bits. Each identifier is unique in the network. Computation proceeds as a sequence of synchronous rounds. All nodes start synchronously, at round 1. At each round, every node can (1) send an -bit message to each of its neighbors in , i.e., to each node , (2) receive the messages sent by its neighbors, and (3) perform some individual computation. No limit is placed on the amount of computation that each node performs at each round. Initially, every node knows its identifier and the size of the graph it belongs to. No other information about the graph is provided to the nodes. All nodes perform the same algorithm, but the behavior of the nodes may vary along the course of execution of that algorithm, depending on the information acquired by them in each round (including their IDs).
The Broadcast CONGEST model is a restricted variant of the CONGEST model which requires each node to send the same bit message to all its neighbors, at every round. (Of course, the messages sent by a same node at two different rounds may be different.)
2.2 Deciding -Freeness
The optimal (deterministic) algorithm for detecting 4-cycles in [4] can be artificially rewritten as Algorithm 1. Let us say that a node is light if its degree satisfies , and is heavy otherwise.
Phase 1 in Algorithm 1 is aiming at finding light 4-cycles, i.e., 4-cycles containing only light nodes. The for-loop of Instruction 5 consumes at most rounds, as it involves light nodes only, i.e., the light node has at most neighbors, and thus at most light neighbors. If a light 4-cycle is detected at Instruction 8, then rejects appropriately.
Phase 2 is aiming at finding heavy 4-cycles, that is, 4-cycles containing at least one heavy node. The for-loop of Instruction 17 also consumes at most rounds, merely because it is performed only if . The main observation is that it is legal for a node to reject if . This is due to the following simple fact.
Lemma 3.
For every -node graph , if there exists such that the inequality holds, then contains a 4-cycle.
Proof.
Let and .
If there is that has two distinct neighbors and in , then form a 4-cycle. Suppose on the contrary that every has at most one neighbor in . Then,
Thanks to Lemma 3, since implies that , we get that contains a 4-cycle, and thus it is indeed legal for to reject at Instruction 15.
Our generic algorithm for detecting -cycles for every follows the general idea of Algorithm 1 in the sense that:
-
1.
it is also split into two phases, one for light cycles (i.e., containing only nodes with degree smaller than ), and one for heavy cycles (i.e., containing at least one node with degree at least ), and
-
2.
it also utilizes a threshold as in Instruction 14, which is tuned depending on .
In both phases, paths are broadcast among the nodes in the network. That is, every node participating in the broadcast sends its identifiers to its neighbors, which concatenate their identifiers, and forward the resulting 1-edge path to their neighbors. After rounds of such a process, every node receives a set of paths, each of the form , concatenates its identifier to each of these paths, and forwards the resulting set of paths, each of the form to all its neighbors. In itself, such a process would however create huge congestion. Indeed, the number of paths circulating in the network would grow exponentially. Nevertheless, reducing drastically the number of paths can be achieved thanks to a simple application of the Representative Lemma by Monien [10], as it was done in, e.g., [8, 9], which is explained a bit further in the text. Before that, let us quickly cover the study of so-called light cycles, for which broadcast works without filtering.
2.3 Detection of Light -Cycles
For every , the detection of light -cycles, i.e. of -cycles containing only nodes of degree at most , can be done in a straightforward manner in rounds. It is indeed sufficient to consider the subgraph of the input graph induced by the light nodes of . The detection proceeds by looking for all -cycles passing through , for all nodes in parallel.
Specifically, the algorithm proceeds by flooding, during phases. At the first phase (which lasts one round), every forms the path consisting of the single node , and sends it to all its neighbors in . At every phase , for every node , and for every simple path received by during phase , if , then appends its identifier to for forming the path , which is forwarded to all of ’s neighbors in .
After phases, if a node has received a simple path from a neighbor , and a simple path from a neighbor , with , , and , then rejects. Otherwise accepts. We show that this simple flooding algorithm detects light -cycles in rounds.
Lemma 4.
For every , there is a deterministic algorithm running in rounds in -node graphs under the Broadcast CONGEST model such that, for every graph , if contains a light -cycle (i.e., a cycle containing only nodes of degree smaller than ) then at least one node rejects, otherwise all nodes accept.
Proof.
We analyze the simple flooding algorithm described above. Whenever a node rejects, this is because it has received a simple path from , and a simple path from , with , , and , which implies that is a -cycle, i.e., there is indeed a light -cycle in . Conversely, let be a light -cycle. The two paths and will be received by node after phases, leading node to reject, as desired.
For the round-complexity, it is sufficient to notice that, by definition, has maximum degree at most . It follows that, for every , and for every , the number of simple paths of length with one end equal to is at most . As a consequence, the round complexity of the flooding algorithm is
as claimed.
The main difficulty is detecting heavy cycles, that is, cycles containing at least one node of degree at least . Among other techniques, one needs filtered flooding, explained in the next section.
2.4 Filtered Flooding
2.4.1 Representative Lemma
Monien [10] defines a representative of a family of subsets of ground set as follows.
Definition 5.
For every integer , every family of subsets of , and every , a family of sets is a -representative of if, for every set of size , the following holds:
Note that it follows directly from the definition that the -representativity property is transitive, which is important as our algorithm for -freeness will perform several nested iterations of computing a -representative set.
Fact 1.
For every , , and , if is -representative for , and is -representative for , then is -representative for .
The following lemma says that if the sets in the family have bounded size , then there exists a -representative of with bounded size.
Lemma 6 (Monien [10]).
For every integer , every such that , and every family of subsets of , if for all , then there exists a -representative family of such that
To get a flavor of this lemma, observe that if and , then the bound of Lemma 6 is tight. Indeed, is then the set of all subsets of of size , meaning that . Now suppose that , then any is such that but there is no that does not intersect . The only -representative family of is itself.
2.4.2 Application to Cycle Detection
The Representative Lemma (Lemma 6) is particularly useful in the context of -cycle detection for limiting congestion. Indeed, let us assume that one is questioning whether there is a -cycle in the -node graph containing a given node . One way to proceed is to let broadcast its identifier for rounds. That is, at step , sends to all its neighbors. Then, at step , every neighbor appends its identifier to encode the 1-edge path , and forwards this path to all its neighbors. More generally, if the flooding process is not filtered, then, at step , a node receiving a simple path with appends to whenever , and forwards the resulting augmented path to all its neighbors. At the end of step , if a node has received two simple paths and with , , and , then has detected a -cycle containing .
The absence of filtering in the above process may result in an exponential increase of the number of paths to be forwarded by an intermediate node . This can be avoided using Lemma 6 by the following filtering process. Let us assume that, at step , a node receives a collection of -node simple paths, all with endpoint . Each path can be viewed as a set of nodes, i.e., a subset of the -node set with cardinality . Let . Lemma 6 says that there exists of cardinality such that, for every simple path from to , if there exists a path that does not intersect with , i.e., such that is a -cycle containing , then there exists a path that does not intersect with , i.e., such that is also a -cycle containing . The filtering process consists for node to forward the family , after concatenating itself to every path in it, instead of . By the filtering technique, we have the following.
Fact 2.
Each intermediate node forwards at most paths of size and of endpoint at each round .
Hence, the number of paths forwarded by a node is constant for a fixed . As a consequence, we get the following.
Fact 3.
For every , every -node graph , and every , checking whether there is a -path in containing takes at most rounds in the Broadcast CONGEST model.
3 Deterministic Even-Cycle Detection
This section is dedicated to the proof of Theorem 1 assuming that the density theorem holds (cf. Theorem 2). The density theorem will be established in the next section. We start here by describing our algorithm for deciding -freeness, and then we proceed to the proof of Theorem 1.
3.1 Algorithm Description
Algorithm 2 solves the detection of -cycles. As Algorithm 1, it is split into two phases, one aiming at detecting light -cycles, and one aiming at detecting heavy -cycles, where a -cycle is light if it contains only nodes of degree smaller than , and it is heavy otherwise. The second phase, that is, the detection of heavy cycles, uses the filtering techniques (see Instruction 29) based on Lemma 6, and detailed in Section 2.4.2. The detection of light cycles has already been described and analyzed in Section 2.3, and this section focuses on Phase 2, i.e., the detection of heavy cycles, starting at Instruction 18.
In Algorithm 2, every node of a graph maintains a collection of local variables. The set contains all heavy neighbors of in , thanks to Instruction 1. For every , the set contains a collection of simple paths with endpoints and . At the beginning of -th iteration of the for-loop of Instruction 23, contains paths of length exactly , which are eventually updated at the end of the -th iteration (cf. Instruction 35) to paths of length . At each iteration, the set is the set of nodes such that there is at least one path from to in , i.e., is not empty.
The main point in Algorithm 2 is the test performed at Instruction 25, which stipulates that if is too big, i.e., if is connected to too many (heavy) nodes by a path of length at iteration , then rejects. If does not reject, then it carries on the flooding of path-prefixes, by applying filtering for preserving the fact that, for each , at every iteration (cf. Fact 2). At the end of each iteration of the for-loop of Instruction 23, node appends to each path received during that iteration (see Instruction 35). That is, node appends to each path not containing , for all neighbors , and it resets accordingly.
Finally, if node has received two paths and of length , both in for some , i.e., both with endpoints and , such that the concatenation of and forms a -cycle, then rejects.
3.2 Proof of Theorem 1
In absence of the threshold condition at Instruction 25, Algorithm 2 merely consists of building longer and longer paths between and some nodes , such that if there exists and for which there exists two paths and of length between and that are internally disjoint, that is if form a -cycle, will detect that fact, and reject accordingly. As already discussed before, the filtering of Instruction 29 does not prevent the algorithm from finding such paths, if any. The main issue is that Algorithm 2 stops at iteration whenever . Let us show that stopping under this condition is fine, as it implies the existence of a -cycle.
Let us assume that there exists a node such that, at iteration of the for-loop of Instruction 23, . At iteration , is the set of heavy nodes such that there is a simple path of length exactly starting at and ending at . Using the notation of Theorem 2, let be the set of nodes that are reachable from by a simple path of length exactly . We have . It follows that
(1) |
By Theorem 2, contains a -cycle, and thus node rejects rightfully.
It remains to show that the round complexity of Algorithm 2 is . Phase 1, dedicated to the search of light -cycles, takes this many rounds, as established in Lemma 4. Let us show that Phase 2, dedicated to the search of heavy -cycles, has the same complexity. By Fact 3, for every node and every heavy node , the final set at iteration at Instruction 35 is built after at most rounds. By the threshold condition of Instruction 25, the number of families to be transmitted by is at most . So, in total, Phase 2 of Algorithm 2 performs in at most rounds, that is rounds for a fixed . This completes the proof of Theorem 1 (under the assumption that Theorem 2 holds). ∎
4 Proof of Density Theorem
4.1 General Construction
This section is dedicated to the proof of Theorem 2. Let be an -node graph. Let , , and . Let be the set of nodes of that are reachable from by a simple path of length exactly , and let us assume that
Our goal is to show that there is a -cycle in . In the following, we fix
(2) |
Let be the set of edges incident to at least one node in . Let be the set of edges whose both endpoints are in , and let .
Lemma 7 (S. Burr [1]).
Every -edge graph contains a bipartite subgraph with at least edges.
Thanks to Lemma 7, there exists a bipartite subgraph of the graph induced by with at least edges. Let be the set of edges of this bipartite graph, hence .
Furthermore, also induces a bipartite subgraph as all of its edges have exactly one end in .
Let be the bipartite graph defined as the subgraph of induced by if , or as the subgraph of induced by otherwise. That is,
Let be a partition of the vertices of , such that
Note that some nodes in may also belong to . satisfies the following.
Fact 4.
is a bipartite subgraph of with at least edges.
Proof.
We have
Since
the claim follows.
To prove the existence of a -cycle in , we will prove that there exist three simple paths , , and in such that:
-
is of length for some connecting a node to some node .
-
is a path in of length connecting to a node . Note that, since is bipartite, alternates between nodes in and nodes in .
-
is a path of length connecting to .
Moreover, our construction will guarantee that , and are internally disjoint, in the sense that , , and . This is sufficient for establishing Theorem 2 as is a -cycle in . To exhibit these three paths, let us introduce some notations.
4.2 The Sets In and Out
For every , and every , let us denote by the set of simple paths of length exactly with one endpoint equal to , and the other endpoint equal to some node in .
For every , and , we define the two sets and as subsets of edges from . Intuitively, the set can be viewed as a set of edges that sends to its neighbors at round in a (virtual) distributed protocol that broadcasts sets of edges of throughout the network , and can be viewed as a set of edges that receives from its neighbors at round of this protocol. Let denote the set of edges incident to in . For every , let
(3) |
That is, can be viewed as the initialization of the aforementioned (virtual) broadcast protocol, i.e., initially, every node in sends its incident edges in to its neighbors in . Now, let us define the sets and for every and , where, again, can be viewed as the set of edges received by at round (which were sent by ’s neighbors at round ), and can be viewed as the set of edges forwarded by at round . A key point is that does not forward all the received edges, but a carefully chosen subset of these edges.
Formally, for every and every , let
(4) |
That is, merges all edges from sets for all neighbors of such that at least one path in can be extended into a path in (see Figure 1).
To define , we first define the sets and , the subsets of edges respectively in and incident to node (see Figure 2). For every , for every node of , i.e., for every , and every , let
(5) |
For every vertex , and every , we construct the edge-set by defining, for each , a subset of containing edges of incident to . First, for every and , we set
For every and , and for every , we set
(6) |
The definition of when requires more care. Let be the subgraph of induced by all edges in where one keeps only the large sets , that is,
(7) |
Note that, by construction, every edge is either in , or in the set where is incident to .
We are now going to update iteratively, by repeating the following sequence of “peeling” operations as long as they can be applied, i.e., as long as vertices can be removed. This sequence of operations bears similarities with the computation of the -core of a graph, but the vertices of the partitions and of are here treated separately.
The peeling process applied to
Repeat until no nodes can be removed:
-
1.
Remove from all vertices of degree smaller than , along with their incident edges in , and update the degree of each vertex in accordingly;
-
2.
Remove from all vertices of degree smaller than , along with their incident edges in , and update the degree of each vertex in accordingly;
-
3.
For every , we set
(8) That is, is defined as the set of edges incident to that were removed from together with at this iteration.
For any triple , , and satisfying , if the value of has not been set in the above process, then it is set to . That is, for every ,
Finally, we set
(9) |
Note that, for every , , and , we have
This equality is extended to define, for every triple , , and ,
4.3 Core Graphs
The graph resulting from the above iterated process of edge- and vertex-removal from is denoted by . The core graphs play an important role in our proof. Indeed, we will show (see Lemma 9) that if is non-empty for some and , then contains a -cycle. The density theorem will then follow from the fact (established in Lemma 10) that there exists and such that is non-empty.
Before proving Lemmas 9 and 10, let us establish a collection of statements for helping understanding the construction above. The fact below illustrates why one can view the sets and as produced by a (virtual) protocol broadcasting edges of throughout the network .
Fact 5.
For every simple path in with , we have that, for every ,
Proof.
By definition of set , the set of simple paths of length exactly with one endpoint equal to , and the other endpoint equal to some node in , we have that, for every ,
Then by definition (Eq. (4)) of , it follows that .
Lemma 8.
For every , , and with and , there is a simple path in such that , , and .
To gain intuition about this statement, one can follow the idea of the virtual distributed protocol mentioned since the beginning of Section 4.2. This lemma states that any edge that was received by during the virtual protocol was first broadcast by itself and forwarded along a path from to .
Proof.
Let . We show the following statement by induction on down to . There is a simple path
such that for some node , and .
-
The base case is . By definition of (cf. Eq. (4)), there exists such that for some , and . Furthermore, by definition of , we have .
-
For the induction step, let us assume that the claim is true for where . By induction, , and, by construction of , it also holds that . This follows directly from Eq. (6), or from Eq. (8) after having noticed that, thanks to Eq. (7), . Using Eq. (4) as in the base case, all points in the claim are satisfied.
Applying the claim for , we get that there exists a path such that for some node , , and for all . The latter ensures that the path is simple. Using the definition of the set for , it follows that . Moreover, since is incident to , and since , we get .
Fact 6.
For all and , every node satisfies .
Proof.
The claim follows directly from Eq. (7), and the fact that .
Fact 7.
For all and , every node is of degree at least in the graph .
Proof.
The claim follows directly from the fact that, in the construction of , all nodes with degree smaller than are removed (cf. Steps 1 and 2 in the peeling).
Fact 8.
For every , , and , we have .
Proof.
The claim follows from the construction of set . If the set was constructed by Eq. (6) then , and its size is smaller than . If the set was constructed by Eq. (8) then it contains edges adjacent to in that were removed, precisely because the current degree of was smaller than . The remaining case is for which the claim holds trivially.
Fact 9.
For every , , and , we have
Proof.
Let us consider an edge with and . By Eq. (5), we have . The edge satisfies one and only one of the following four cases.
-
1.
joins by applying Eq. (6);
-
2.
is removed from along with vertex (cf. Step 1 in the peeling);
- 3.
-
4.
is never removed from – in this case, belongs to ;
In the first and third cases, we have thanks to Eq. (9), and thus . The second case applies to at most edges from . Finally, at most edges satisfy the fourth case.
We are now ready to establish one of the two main arguments in the proof of our density theorem (see proof in Appendix A).
Lemma 9.
If there exist and such that then there is a -cycle in .
Lemma 10.
There exists and such that .
Proof.
The proof goes by contradiction. Let us assume that, for every and every , we have . We are going to show that this implies , contradicting Fact 4 (recall that was defined in Equation 2). Let . By definition of , there exists a simple path of length between and in . By definition, , and . For establishing the contradiction, let us revisit the recursive construction of the sets for to . By Fact 5, for all , we have . Thus, since , Fact 9 yields that
Therefore, we get that, for every and ,
As is one of the two parts of the bipartite graph , Fact 8 implies that
The latter inequality is the desired contradiction.
Proof of Theorem 2.
5 Conclusion
We have proved that, for every , there exists a deterministic distributed algorithm that decides whether the input graph is -free in rounds under the CONGEST model. This result is based on a new result in graph theory, which essentially states that when some form of “local density” exceeds a certain threshold (that depends on ) in a graph, that graph must contain a -cycle.
We point out that our deterministic algorithm for -freeness can be used to solve the same problem in the Quantum CONGEST model in rounds, following the same approach as in [6]. Informally, the approach consists in three steps : (1) apply the “diameter reduction” technique of [5], which allows to reduce the problem to graphs of polylogarithmic diameter, (2) operate a “congestion reduction” on Algorithm 2 to make it work in a constant number of CONGEST rounds, at the cost of reducing the probability for cycle detection to , and (3) eventually use an “amplification technique” based on quantum Grover search to obtain a constant probability of detecting a , if exists, in rounds. The same round complexity was already attained in [6], but the new algorithm is considerably simpler.
Note that the constant in our density theorem is not tight, at least for some values of and . For instance, for , and , our theorem states that if there exists such that , then there is a -cycle in whereas, in fact, there is a -cycle in already when . We let as an open problem the determination, for every and , of the smallest value such that the existence of a node for which implies the existence of a -cycle.
Arguably one of the main open problems in the field of distributed subgraph detection under the CONGEST model is whether is the best round-complexity that can be achieved for -cycle detection, whether it be by deterministic or randomized algorithms, up to polylogarithmic factors. It is known to be the case for , i.e., the round-complexity of -freeness is , but it is open for . In other words, is it true that, for every , -freeness cannot be decided under the CONGEST model in rounds?
References
- [1] Stefan A Burr. Antidirected subtrees of directed graphs. Canadian Mathematical Bulletin, 25(1):119–120, 1982.
- [2] Keren Censor-Hillel. Distributed subgraph finding: Progress and challenges. In 48th Int. Coll. on Automata, Languages, and Programming (ICALP), volume 198 of LIPIcs, pages 3:1–3:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021.
- [3] Keren Censor-Hillel, Orr Fischer, Tzlil Gonen, François Le Gall, Dean Leitersdorf, and Rotem Oshman. Fast distributed algorithms for girth, cycles and small subgraphs. In 34th International Symposium on Distributed Computing (DISC), volume 179 of LIPIcs, pages 33:1–33:17. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPICS.DISC.2020.33.
- [4] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. On the power of the congested clique model. In 33rd ACM Symposium on Principles of Distributed Computing (PODC), pages 367–376, 2014. doi:10.1145/2611462.2611493.
- [5] Talya Eden, Nimrod Fiat, Orr Fischer, Fabian Kuhn, and Rotem Oshman. Sublinear-time distributed algorithms for detecting small cliques and even cycles. Distributed Computing, 35(3):207–234, June 2022. doi:10.1007/S00446-021-00409-3.
- [6] Pierre Fraigniaud, Maël Luce, Frédéric Magniez, and Ioan Todinca. Even-cycle detection in the randomized and quantum CONGEST model. In 43rd ACM Symposium on Principles of Distributed Computing (PODC), pages 209–219. ACM, 2024. doi:10.1145/3662158.3662767.
- [7] Pierre Fraigniaud, Maël Luce, Frédéric Magniez, and Ioan Todinca. Deterministic even-cycle detection in broadcast congest, 2025. Full version of this paper. doi:10.48550/arXiv.2412.11195.
- [8] Pierre Fraigniaud and Dennis Olivetti. Distributed detection of cycles. ACM Trans. Parallel Comput., 6(3):12:1–12:20, 2019. doi:10.1145/3322811.
- [9] Janne H. Korhonen and Joel Rybicki. Deterministic subgraph detection in broadcast CONGEST. In 21st International Conference on Principles of Distributed Systems (OPODIS), volume 95 of LIPIcs, pages 4:1–4:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2017. doi:10.4230/LIPICS.OPODIS.2017.4.
- [10] Burkhard Monien. How to find long paths efficiently. In North-Holland Mathematics Studies, volume 109, pages 239–254. Elsevier, 1985.
- [11] David Peleg. Distributed computing: a locality-sensitive approach. SIAM, 2000.
Appendix A Proof of Lemma 9
We construct the aforementioned paths , and whose union forms a -cycle (see Figure 3). Note that, as a subgraph of , which is itself a subgraph of the bipartite graph , is also bipartite. Its two parts are merely and . Let be an edge of such that and . By Lemma 8, there exists a simple path
such that , , and
We aim at constructing a path in that starts at , and ends at some node , of length . We build this path iteratively, by increasing its length. For the base case, note that , and thus, by Fact 7, we get that
It follows that there exists
The node belongs to , and the path is initialized to . For the induction step, let us assume that a path
has been constructed, with and . As , and since, by Fact 7,
we get that there exists
We have . The path can thus be extended into the path . Moreover, as and
we get that there exists
We have . The path can thus be extended into the path
We can proceed with the construction until we get a path
of length , as desired.
We now aim at extending into a -cycle, by constructing a simple path starting at and ending at that does not intersect . For this purpose, let us consider the set of edges:
Together, and contain exactly vertices. By Fact 8, we have that, for every ,
from which it follows that
Therefore,
Let us now consider the set of vertices in that are also in , i.e.,
We have , and thus
Since , it follows from Fact 6 that . As a consequence,
Therefore, there exists such that , and, for every and every ,
By Lemma 8, there exists a path such that , , and, for every ,
Thus does not intersect , and it intersects only at . Therefore, the union of the three paths
forms a -cycle, which concludes the proof. ∎