Abstract 1 Introduction 2 Preliminaries 3 A Prover-Delayer Game for Tree-Like Narrow Resolution 4 Twinned Graphs and Pebble Games 5 Compressing CFI Graphs 6 The Super-Linear Lower Bound with Roadblocks 7 Supercritical Width versus Tree-Like Size Trade-Offs References

Supercritical Size-Width Tree-Like Resolution Trade-Offs for Graph Isomorphism

Christoph Berkholz ORCID Technische Universität Ilmenau, Germany Moritz Lichter ORCID RWTH Aachen University, Germany Harry Vinall-Smeeth ORCID Technische Universität Ilmenau, Germany
Abstract

We study the refutation complexity of graph isomorphism in the tree-like resolution calculus. Torán and Wörz [42] showed that there is a resolution refutation of narrow width k for two graphs if and only if they can be distinguished in (k+1)-variable first-order logic (FOk+1). While DAG-like narrow width k resolution refutations have size at most nk, tree-like refutations may be much larger. We show that there are graphs of order n, whose isomorphism can be refuted in narrow width k but only in tree-like size 2Ω(nk/2). This is a supercritical trade-off where bounding one parameter (the narrow width) causes the other parameter (the size) to grow above its worst case. The size lower bound is super-exponential in the formula size and improves a related supercritical trade-off by Razborov [35]. To prove our result, we develop a new variant of the k-pebble EF-game for FOk to reason about tree-like refutation size in a similar way as the Prover-Delayer games in proof complexity. We analyze this game on the compressed CFI graphs introduced by Grohe, Lichter, Neuen, and Schweitzer [25]. Using a recent improved robust compressed CFI construction of de Rezende, Fleming, Janett, Nordström, and Pang [19], we obtain a similar bound for width k (instead of the stronger but less common narrow width) and make the result more robust.

Keywords and phrases:
Proof complexity, Resolution, Width, Tree-like size, Supercritical trade-off, Lower bound, Finite model theory, CFI graphs
Funding:
Moritz Lichter: Funded by the European Union (ERC, SymSim, 101054974). Views and opinions expressed are those of the author(s) and do not necessarily reflect those of the European Union or the ERC. Neither the European Union nor the granting authority can be held responsible for them.
Copyright and License:
[Uncaptioned image] © Christoph Berkholz, Moritz Lichter, and Harry Vinall-Smeeth; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Proof complexity
Related Version:
Full Version: https://doi.org/10.48550/arXiv.2407.17947 [14]
Funding:
Christoph Berkholz and Harry Vinall-Smeeth: Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) - project number 414325841.
Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał Skrzypczak

1 Introduction

A common theme in proof complexity is the difficulty of refuting a given CNF formula in a particular proof system. There are many variants of this problem depending on the proof system and the notion of difficulty under investigation. We focus on (variants of) resolution, perhaps the most-studied proof system. Here typical measures of difficulty include the minimum width, depth, space, and (tree-like) size over all refutations of the input formula.

By analyzing the proof complexity of formulas that encode natural combinatorial problems, we also gain insights about the inherent complexity of these problems. In this paper, we focus on the graph isomorphism problem, the complexity status of which is still unknown [30]. On the one hand, Babai [4] showed in a breakthrough result that graph isomorphism is solvable in quasi-polynomial time (see also [26]), which makes it a rare natural candidate for a problem that might be neither NP-complete nor polynomial-time solvable. On the other hand, only relatively weak complexity lower bounds are known [39]. This motivates the study of the hardness of graph isomorphism from other perspectives, such as proof complexity.

In this direction, Torán [40] showed that graph isomorphism is hard for resolution: There are non-isomorphic graphs on n vertices such that every resolution refutation certifying non-isomorphism has size 2Ω(n). Graph isomorphism and the Weisfeiler-Leman algorithm – a well-known algorithm in the context of graph isomorphism – have both been studied in different proof systems, including Sherali-Adams [3, 28], (extended) polynomial calculus [12, 13, 33], sum-of-squares [32], cutting planes [41], and in extensions of resolution with different symmetry rules [36, 41]. We are interested in “tree-like” refutations, which intuitively means that whenever we want to use a clause in a proof step we have to re-derive it. Tree-like resolution corresponds exactly to Boolean decision trees and is closely related to the DPLL algorithm. We will be concerned with “trade-offs” between the width – i.e. the maximum number of literals occurring in any clause – and the size of tree-like refutations.

Studying trade-offs – i.e.​ situations where in order for a refutation to be “easy” with respect to one measure, it has to be “hard” with respect to another – is a prominent theme in proof complexity. For example, there are trade-offs between size and space [5, 9], between width and depth, and between width and size [11, 16, 38]. There are two senses in which a trade-off can be particularly strong. Firstly, a trade-off is robust if it not only shows that one measure A has to be large when another measure B is small, but also that B can be increased over some (hopefully) wide range without that the bound on A decreasing. Secondly, a trade-off is supercritical if, in case we restrict B, the measure A must be larger than the general upper bound on A (over all formulas) in the case that B is not restricted.

In fact, one of the first supercritical trade-offs for resolution – proved by Razborov [35] – concerns tree-like size and width: For every k=k(n), there are k-CNF formulas over n variables that can be refuted in width O(k), but such that every tree-like refutation of minimum width requires depth nΩ(k) and size 2nΩ(k). When the width is unrestricted then, for each unsatisfiable formula over n variables, there is a tree-like refutation of size at most 2n. Hence, when bounding the width, the tree-like refutation size increases beyond its worst-case and gets super-exponential in the variable number. This trade-off is not only supercritical but also robust: The lower bounds also hold for width-k refutations for larger k<n1ε/k.

One drawback of Razborov’s trade-off is that it is not supercritical if we measure size and width with respect to the formula size rather than the number of variables. While the k-CNF formula of Razborov uses n variables, it has size about N:=nΘ(k). Thus in terms of the formula size N, the bound on tree-like resolution size is roughly 2N. Our first main result concerns narrow resolution [21] which extends resolution by an additional rule avoiding side effects caused by large width clauses in the input formula. It is closely related to first-order logic: The width and the depth of narrow graph isomorphism refutations correspond to the number of variables and the quantifier depth respectively of first-order formulas distinguishing graphs [41]. We show a supercritical trade-off with respect to formula size between width and size for tree-like narrow resolution applied to graph isomorphism formulas.

Theorem 1.

For all integers k3 and n, there are two non-isomorphic colored graphs 𝒢 and  of order Θ(n) and color class size 16 such that

  1. 1.

    there is a width-k narrow resolution refutation of 𝖨𝖲𝖮(𝒢,), and

  2. 2.

    every width-k tree-like narrow resolution refutation of 𝖨𝖲𝖮(𝒢,) has size 2Ω(nk/2).

Narrow resolution is stronger than resolution; in particular, the minimal width of a narrow resolution refutation is at most the minimal width of a (plain) resolution refutation. The formula 𝖨𝖲𝖮(𝒢,), which encodes graph isomorphism of 𝒢 and , has size O(n4) for graphs of order n. Thus, Theorem 1 indeed yields a supercritical trade-off between width and tree-like size for narrow resolution with respect to the formula size. Building upon very recent work due to de Rezende, Fleming, Janett, Nordström, and Pang [19], who provided a not only supercritical but also robust variant of the trade-off in [25], we can show that Theorem 1 also applies to usual (non-narrow) resolution and the trade-off can be made somewhat robust.

Theorem 2.

For all integers k3, 1t25k1, and n, there are two colored graphs 𝒢 and  of order Θ(n) and color class size 16 such that

  1. 1.

    there is a width-(k+16) resolution refutation of 𝖨𝖲𝖮(𝒢,), and

  2. 2.

    every width-(k+t1) tree-like resolution refutation of 𝖨𝖲𝖮(𝒢,) has size 2Ω(nk/(t+1)).

With this theorem, we address Razborov’s call for supercritical bounds in terms of formula size [35]. Moreover, our trade-off applies to formulas encoding a natural combinatorial problem and is somewhat robust for t>16 and sufficiently large k. Since the maximum size of a width k tree-like refutation is 2O(nk), our lower bounds are almost optimal in this range. Our proof utilizes machinery from finite model theory: We introduce a new Ehrenfeucht–Fraïssé style game played on two graphs and show that lower bounds for this game imply lower bounds on the tree-like size of narrow resolution refutations of the corresponding graph isomorphism formula.

Razborov’s Trade-Off and Weisfeiler-Leman.

To prove his trade-off, Razborov used a compression technique, known as hardness condensation [35, 15], that is based on xorification and variable reuse and converts large but hard formulas into smaller ones that are still hard. Xorification is a well-known technique which replaces every variable in a formula by an XOR of fresh variables. Xorification, or variable substitution in general, has found many applications in proof complexity (see e.g. [10, 8, 9, 6]). Razborov’s compression technique was adapted to the Weisfeiler-Leman (WL) algorithm – an important algorithm in the field of graph isomorphism [23, 4, 27]. The algorithm, parameterized by a dimension k, is a graph isomorphism heuristic, that is, whenever it distinguishes two graphs they are not isomorphic but, for every k, it fails to distinguish all non-isomorphic graphs [17]. Of particular interest is the number of iterations needed by the k-dimensional WL-algorithm to distinguish two graphs; this almost corresponds to the quantifier depth needed in (k+1)-variable first-order logic with counting to distinguish them. Berkholz and Nordström [15] adapted Razborov’s compression technique to construct k-ary relational structures for which the k-dimensional WL-algorithm requires nΩ(k/logk) iterations; here the best known upper bound is O(nk1/logn) [24]. From the perspective of trade-offs, first-order logic (without a bound on the variables) requires at most quantifier depth n to distinguish all non-isomorphic graphs, which means this trade-off is also supercritical. The lower bound was recently improved to nΩ(k) [24].

The trade-offs described above have a common drawback: They are supercritical with respect to the number of variables and the number of vertices of the structures, respectively, but not with respect to the formula size or the size of the structure (in terms of the number of tuples in the k-ary relations). The common reason is that hardness condensation turns 3-CNF formulas into k-CNF formulas and 3-ary structures into k-ary ones. But recently, Grohe, Lichter, Neuen, and Schweitzer [25] introduced a powerful new compression technique for the so-called Cai-Fürer-Immerman (CFI) graphs [17] to prove a lower bound of Ω(nk/2) for the iteration number of the k-dimensional WL-algorithm on graphs of order n. The bound not only improves the known ones, it is also a bound on graphs and, as graphs have size O(n2), the lower bound is supercritical with respect to the structure size. The inspiration for this paper was to see if this new technique yields analogous proof complexity results.

Our Techniques and New Games.

Tree-like refutations can be (almost) exponentially larger than their non-tree-like counterparts [7]. The usual tool to prove width-k tree-like size lower bounds is the Prover-Delayer game [34]. Prover maintains a partial assignment to at most k variables. In each round, Prover forgets one variable and asks Delayer for an assignment to another one. Delayer can either give such an assignment or allow Prover to set it; in the latter case Delayer scores a point. Prover wants to find an inconsistent partial assignment and Delayer wants to gain as many points as possible. If Delayer has a strategy to score p points, then every width-k tree-like refutation has size at least 2p. On xorified formulas, where each variable v is replaced with an XOR of v0 and v1, Delayer can always gain a point when Prover queries v0 or v1 so long as the other one is not already assigned. This leads to tree-like size lower bounds exponential in the depth of a refutation [43].

However, the xorification of a graph isomorphism formula is not necessarily a graph isomorphism formula. Since we are interested in such formulas, our idea is to instead apply xorification on the level of graphs. We show that twins in a graph, i.e., vertices with the same neighborhood, can play the role of XORs in a formula: When we isomorphically map a pair of twins in one graph to a pair of twins in the other graph, the image of the first twin can be chosen arbitrary. We consider twinned graphs, where every vertex is replaced by a pair of twins. Ultimately, we want to show that the narrow tree-like refutation size of a twinned graph is exponential in the refutation depth of the original graph. Unfortunately, there seems to be no generic argument for this. To show that this is indeed the case for the graphs we consider, we introduce a variant of the Prover-Delayer game suited for narrow resolution. Then we use techniques from finite model theory to show lower bounds for this game. For other examples of finite-model-theoretic techniques in proof complexity see, e.g. [11, 1, 22].

We cannot reuse the correspondence between width-(k1) narrow resolution and k-variable first-order logic [42], or equivalently the k-pebble game [29], because we care about tree-like size, not only about width and depth. The issue is that assigning a variable to one or to zero in graph isomorphism formulas is not symmetric: In terms of isomorphisms, fixing the image of a vertex is usually more restrictive than forbidding a single vertex as the image of another vertex. We introduce a new pebble game, called the k-pebble game with blocking, which captures this difference between one and zero assignments. Round lower bounds in the pebble game with blocking imply exponential size lower bounds for tree-like resolution.

Another game is involved in this lower bound. The hardness of uncompressed CFI graphs for k-variable first-order logic is captured by the k-Cops and Robber game [37, 25], which forgets about the CFI construction and instead considers the simpler underlying base graphs. For compressed CFI graphs, this game was modified to the compressed k-Cops and Robber game [25]. To obtain lower bounds for the k-pebble game with blocking, we have to introduce a blocking mechanism to the compressed k-Cops and Robber game. Via all these games, we obtain the 2Ω(nk/2) narrow width-k tree-like size lower bound in Theorem 1.

From Narrow to Plain Resolution.

We lift Theorem 1 to (non-narrow) resolution. Since lower bounds for narrow resolution imply lower bounds for resolution, transferring the lower bounds is trivial. But it is unclear whether the relevant isomorphism formula can be refuted in (non-narrow) width k. By increasing the width by the maximal color class size of these graphs (which is 16), we can simulate the narrow resolution refutation by a plain resolution refutation. But now the lower bound from Theorem 1 does not apply anymore. At this point, the aforementioned result from [19] comes to hand: The compression of the CFI graphs get modified to obtain, for every fixed t<k, graphs whose isomorphism formula can be refuted in narrow width k but every narrow width k+t refutation has depth at least Ω(nk/(t+1)). So the lower bound is robust within the range from k to k+t1. This construction can be seen as an interpolation between the original compression [25] with round lower bound Ω(nk/2) and the linear round lower bound Ω(n) by Fürer [20]; both appear as special cases for t=1 and t=k. Our approach with twinned graphs also applies to the improved construction implying a narrow width-(k+t) tree-like size lower bound of 2Ω(nk/(t1)), but we need to restrict the range of t even further. For k large enough and t>16 we can actually refute isomorphism of the graphs in (non-narrow) width k+t and finally obtain a supercritical trade-off between width and tree-like size for resolution with respect to formula size (Theorem 2).

Further Related Work.

How the robust compressed CFI construction [19] yields a supercritical width-depth trade-off for resolution was presented at the Oberwolfach workshop Proof Complexity and Beyond [2]. The resulting preprint [19] also contains a trade-off for tree-like resolution. A key difference is that our trade-off applies to graph-isomorphism formulas. Also, different techniques are used. We cannot apply hardness condensation techniques to graph isomorphism formulas but apply a form of xorification on the level of graphs and analyze them using model theoretic techniques. In contrast, the trade-off of [19] is obtained via xorification; the parameters obtained are within a constant factor of one-another.

2 Preliminaries

Graphs.

An (undirected) graph 𝒢 is a tuple (V,E) where V is a finite set of vertices and E(V2) is a set of edges. The vertex set of 𝒢 is denoted by V𝒢 and the edge set of 𝒢 by E𝒢. For WV𝒢, the subgraph of 𝒢 induced by W is denoted by 𝒢[W]. The distance between two vertices u,vV𝒢 is the number of edges in a shortest path between u and v in 𝒢. The distance between U,WV𝒢 is the minimal distance of all uU and vW. We will sometimes consider directed graphs, where the set of edges is a subset of V𝒢2, but we mention this explicitly. A directed graph is acyclic, if it does not contain a (directed) cycle. A source (or sink) is a vertex without incoming (or outgoing) edges. A colored graph 𝒢 is a tuple (V,E,χ) such that (V,E) is a graph and χ is a map V. We interpret χ as a vertex coloring of 𝒢 and denote it by χ𝒢. The color class of uV𝒢 is the set χ𝒢1(χ𝒢(u)) of vertices of the same color as u. The color class size of 𝒢 is the maximal cardinality of its color classes. The graph 𝒢 is ordered if χ is injective. We can see every graph as a colored graph in which every vertex is colored 0. An isomorphism of colored graphs 𝒢 and is a bijection f:V𝒢V such that, for all u,vV𝒢, we have χ𝒢(u)=χ(f(u)), and {u,v}E𝒢 if and only if {f(u),f(v)}E. If there is such an isomorphism, 𝒢 and  are isomorphic.

Resolution.

A literal is a proposition variable x or its negation x¯:=¬x. We set ¬x¯=x. A clause C is a finite set of literals {λ1,,λk}. We may write clauses as disjunctions, e.g., C=(λ1λk). A CNF formula F is a finite set of clauses {C1,,Cm}, which we may write as a conjunction F=(C1Cm). The set of variables occurring in a clause C is 𝗏𝖺𝗋(C) and for a CNF formula F it is 𝗏𝖺𝗋(F):=CF𝗏𝖺𝗋(C). A (partial) assignment for a CNF formula F is a (partial) map σ:𝗏𝖺𝗋(F){0,1}. The domain of σ is 𝖽𝗈𝗆(σ). The size of σ is |𝖽𝗈𝗆(σ)|. The assignment σ violates a clause CF if 𝗏𝖺𝗋(C)𝖽𝗈𝗆(σ) and σ satisfies no literal in C. For a variable x𝗏𝖺𝗋(F) and a Boolean value δ{0,1}, let σ[xδ] be the assignment with domain 𝖽𝗈𝗆(σ){x} derived from σ that sets x to δ, i.e., σ[xδ](x)=δ and σ[xδ](y)=σ(y) for all y𝖽𝗈𝗆(σ){x}. For partial assignments σ and σ, we write σσ if 𝖽𝗈𝗆(σ)𝖽𝗈𝗆(σ) and σ(x)=σ(x) for all x𝖽𝗈𝗆(σ). For k, we write [k]:={1,,k}. We now introduce the proof systems studied in this paper.

Definition 3 (Narrow Resolution [21]).

A narrow resolution derivation π of a clause D from a CNF formula F is a directed acyclic graph π=(V,E) whose vertices are labeled with clauses, D is the label of a source of π, and all sinks of π are labeled with clauses in F. Moreover, for every vertex vV, its clause C is derived from the clauses C1,,C labeling the vertices, to which v has an outgoing edge, by one of the following three rules.

  1. 1.

    Axiom Rule: =0 and CF.

  2. 2.

    Resolution Rule: =2 and C1=Ax, C2=Bx¯, and C=AB.

  3. 3.

    Narrow Resolution Rule: 2 and, up to reordering, C=(Aλ1λ1)F is an axiom, C=(AA1A1), and Ci=(Aiλi¯) for all i[1].

A resolution derivation is a narrow resolution derivation using only Rules 1 and 2. The derivation π is tree-like if π is a tree. In this case we call the unique source the root and the sinks leaves. The size |π| of the derivation π is the number of vertices |V|. The depth of π is the length of the longest directed path in it. The width of a clause C is its number of literals. The width of a derivation w(π) is the maximal width of all clauses in π. The narrow width of a derivation w(π) is the maximal number of literals among all those clauses in π that are not axioms. A k-narrow derivation is a narrow resolution derivation of narrow width at most k. A derivation of the empty clause from F is a refutation of F.

3 A Prover-Delayer Game for Tree-Like Narrow Resolution

In this section, we introduce a game that allows us to prove lower bounds on the size of k-narrow tree-like refutations of graph isomorphism formulas. We now introduce these formulas. Let 𝒢 and be n-vertex colored graphs; following [42], we define a CNF formula 𝖨𝖲𝖮(𝒢,) whose solutions correspond to isomorphisms 𝒢. For all vertices uV𝒢 and vV, we add a propositional variable xu,v. The variables xu,v have the intended meaning that u is mapped to v. The CNF formula 𝖨𝖲𝖮(𝒢,) contains three types of clause.

  • Color Clauses: for each vertex uV𝒢, let Wu:=χ1(χ𝒢(u)) be the vertices of with the same color as u. Add the clause vWuxu,v to encode that u is mapped to a vertex of the same color. For each vV, let Wv:=χ𝒢1(χ(v)) and add the clause uWvxu,v.

  • Bijection Clauses: For all uV𝒢 and distinct v,wV, we add the clause (¬xu,v¬xu,w) to encode that an isomorphism is a function. For all distinct u,vV𝒢 and wV, we add the clause (¬xu,w¬xv,w) to encode injectivity of the desired isomorphism.

  • Edge Clauses: for all u,uV𝒢 and v,vV with uu such that {u,u}E𝒢 if and only if {v,v}E, we include the clause ¬xu,v¬xu,v to encode the edge relation.

The formula 𝖨𝖲𝖮(𝒢,) has O(n2) variables, O(n4) clauses, width equal to the maximal color class size of 𝒢 and (unless every vertex gets a unique color; in this case the width is two), and is satisfiable if and only if 𝒢 is isomorphic to .

The 𝒌-Narrow Prover-Delayer Game.

Let 𝒢 and be non-isomorphic colored graphs. The k-narrow Prover-Delayer game on 𝒢, is played by two players, Prover and Delayer, who construct partial assignments for 𝖨𝖲𝖮(𝒢,) as follows. The game begins with the empty assignment σ0=. Let σt1 be the assignment after the (t1)-th round. In round t, Prover chooses σσt1 with |𝖽𝗈𝗆(σ)|k1 and makes one of the following kinds of moves.

  1. 1.

    Resolution Move: Prover chooses a variable x𝖽𝗈𝗆(σ). Delayer chooses a response.

    1. (a)

      Committal Response: Delayer responds with δ{0,1} and sets σt:=σ[xδ].

    2. (b)

      Point Response: Delayer gets a point; Prover picks δ{0,1} and sets σt:=σ[xδ].

  2. 2.

    Narrow Move: Prover chooses a color clause C from 𝖨𝖲𝖮(𝒢,). Again Delayer chooses one of two response types.

    1. (a)

      Committal Response: Delayer chooses some xCσ1(0) and sets σt:=σ[x1].

    2. (b)

      Point Response: Delayer chooses distinct x,yCσ1(0) and gets a point; Prover chooses z{x,y} and sets σt:=σ[z1].

If the assignment σt violates a clause of 𝖨𝖲𝖮(𝒢,), the game ends and Prover wins. Otherwise, the game continues in round t+1. Prover has an r-point strategy if, no matter how Delayer plays, Prover can always win the game while limiting Delayer to at most r points. If Prover does not have an r-point strategy, then Delayer has an (r+1)-point strategy. It will be useful to start the k-narrow Prover-Delayer game on 𝒢, from assignments σ. In this case, the game starts at σ0=σ. By constructing strategies for Delayer, the game can be used to show tree-like size lower bound for resolution refutations of graph isomorphism formulas.

Lemma 4.

For all k1, colored graphs 𝒢,, and k-narrow tree-like refutations π of 𝖨𝖲𝖮(𝒢,), Prover has a (log(|π|))-point strategy in the (k+1)-narrow Prover-Delayer game on 𝒢,.

Proof Sketch.

Prover follows π starting at the empty clause at the root. If a resolution rule is applied to a variable x, then Prover makes a resolution move for x. Similarly, Prover follows narrow resolution moves. If Delayer makes a committal response, Prover moves to the corresponding child in π. If Delayer makes a point response, Prover moves to the child with the smallest subtree “below it”, at least halving the size of the subtree at the current position. Prover wins if a leaf is reached, so Delayer can score at most log(|π|) points.

The 𝒌-pebble Game and Narrow Resolution.

We next recall the connection between (k1)-narrow resolution refutations and the k-variable fragment of first order logic [42]. For an integer k, we write k for the set of first order formulas using at most k distinct variables. We denote the set of k-formulas with quantifier depth at most r by k,r. If two graphs 𝒢 and satisfy the same sentences of k or k,r, the graphs are k-equivalent or k,r-equivalent, respectively, and we write 𝒢k or 𝒢k,r, respectively.

These equivalences are characterized by the following game: Let 𝒢 and be (colored) graphs and k,r. The r-round k-pebble game on 𝒢, is played by two players, Spoiler and Duplicator. A position of the game is a pair (α,β) of partial assignments α:[k]V𝒢 and β:[k]V such that 𝖽𝗈𝗆(α)=𝖽𝗈𝗆(β). These maps define positions of up to k pebble pairs on 𝒢 and . Duplicator aims to show that 𝒢 and  are isomorphic; Spoiler tries to show they are not. Initially, no pebbles are placed. Let (αt,βt) be the position at the end of round t<r. At the beginning of round t+1, Spoiler picks one of the graphs, say 𝒢, and i[k]. The i-th pebble pair is picked up and Spoiler places the i-th pebble for 𝒢 on some uV𝒢 yielding the map αt+1. Duplicator responds by placing the i-th pebble for on a vertex of yielding βt+1. If (αt+1,βt+1) does not induce a partial isomorphism, meaning that α(i)β(i) is not an isomorphism of the induced subgraphs 𝒢[{α(i)i𝖽𝗈𝗆(α)}] and [{β(i)i𝖽𝗈𝗆(β)}], then Spoiler wins. Otherwise, if t+1<r, the play continues in the next round. If t+1=r, then Duplicator wins. A player (Spoiler or Duplicator) has a winning strategy, if they can win independently of the moves of the other player.

Theorem 5 ([29, 42]).

Let k,r. The following are equivalent:

  1. 1.

    𝒢≄k,r, i.e., 𝒢 and are not k,r-equivalent.

  2. 2.

    Spoiler has a winning strategy in the r-round k-pebble game on 𝒢,.

  3. 3.

    There is a (k1)-narrow resolution refutation of 𝖨𝖲𝖮(𝒢,) of depth at most r.

It will sometimes be convenient to start the game from position (α0,β0)(,); nothing else in the rules of the games changes in this case. Similarly, we may sometimes not specify the number of rounds in advance; in this case the game only ends if Spoiler wins.

4 Twinned Graphs and Pebble Games

In this section, we introduce the twinned graph construction, which we described on a high-level in the introduction. This will allow us to transfer lower bounds on the k-pebble game with blocking to lower bounds on the k-narrow Prover-Delayer game (and therefore to lower bounds on (k1)-narrow tree like refutation size).

Given a colored graph 𝒢, we define a new colored graph as follows. For each vertex uV𝒢, set 𝒳𝒢(u):={u0,u1}, where u0 and u1 are fresh vertices; intuitively these are copies of u. We define the twinned graph 𝒳(𝒢) with vertex set V𝒳(𝒢):=uV𝒢𝒳𝒢(u) and edge set

E𝒳(𝒢) :={{x,y}|x𝒳𝒢(u),y𝒳𝒢(v),{u,v}E𝒢}{𝒳𝒢(u)|uV𝒢}.

We give u0 and u1 the same color in 𝒳(𝒢) as u has in 𝒢. For notational convenience, we define u^0:=u1 and u^1:=u0. Moreover, we define 𝒳𝒢1(ui):=u for i{0,1}.

We first show that – under a mild condition – if there is a k-narrow refutation of 𝖨𝖲𝖮(𝒢,), then there is a k-narrow refutation of 𝖨𝖲𝖮(𝒳(𝒢),𝒳()). To state the condition, we need the following notion. Two distinct vertices u,vV𝒢 are twins if for every wV𝒢{u,v}, we have that {u,w}E𝒢 if and only if {v,w}E𝒢. That is, the neighborhoods of u and v in 𝒢 are, apart from u and v themselves, identical. Twins u and v are connected twins if {u,v}E𝒢. Note that if 𝒢 has no connected twins, then 𝒳(𝒢) has exactly one pair of connected twins for each vertex in 𝒢. This leads to the following observation.

Lemma 6.

Let k3 and 𝒢 and be colored graphs that do not have connected twins. If 𝒢≄k,r, then 𝒳(𝒢)≄k,r+1𝒳().

By applying Theorem 5 we obtain the following corollary.

Corollary 7.

Let k2 and 𝒢 and be colored graphs that have no connected twins. If there exists a k-narrow refutation of 𝖨𝖲𝖮(𝒢,) of depth d, then there exists a k-narrow refutation of 𝖨𝖲𝖮(𝒳(𝒢),𝒳()) of depth d+1.

It turns out that Prover-Delayer lower bounds on our twinned graphs are implied by round lower bounds for certain pebble games on the original graphs. The normal k-pebble game is the wrong tool for this task; intuitively, the reason is the asymmetry between setting a variable of a graph isomorphism formula to zero or one.

The 𝒌-Pebble Game with Blocking.

Let 𝒢 and be colored graphs and k,r. We define the r-round k-pebble game with blocking on 𝒢 and as follows. The game is played in rounds by Spoiler and Duplicator. A position in the game is a triple (α,β,c) of partial maps α:[k]V𝒢, β:[k]V, and c:[k]{𝗋𝖾𝗀𝗎𝗅𝖺𝗋,𝖻𝗅𝗈𝖼𝗄𝗂𝗇𝗀} with 𝖽𝗈𝗆(α)=𝖽𝗈𝗆(β)=𝖽𝗈𝗆(c). The first two maps give the positions of the pebbles and c marks each pair of pebbles as either regular or blocking. Regular pebbles (possibly) define partial isomorphisms as before, but blocking ones forbid certain ones as follows.

Definition 8 (Partial Isomorphism with Blocking).

Let (α,β,c) be a position in the r-round k-pebble game with blocking on 𝒢 and , R:=c1(𝗋𝖾𝗀𝗎𝗅𝖺𝗋), and B:=c1(𝖻𝗅𝗈𝖼𝗄𝗂𝗇𝗀). Then (α,β,c) induces a partial isomorphism with blocking if (α|R,β|R) induces a partial isomorphism and if every regular pebble respects every blocking pebble. Formally, this means that for every pB and qR, we have (α(p),β(p))(α(q),β(q)).

In the initial position (α0,β0,c0), all maps are empty. Let (αt,βt,ct) be the position after the t-th round. At the beginning of the (t+1)-th round, Spoiler can make either a regular move or a blocking move. A regular move works in the same way as a move in the k-pebble game; the pebble pair moved in this turn is then marked 𝗋𝖾𝗀𝗎𝗅𝖺𝗋. For a blocking move, Spoiler picks p[k] and places the p-th pebble in 𝒢 on some vertex uV𝒢 and in on some vertex vV. Duplicator next decides how to mark this pair. If Duplicator chooses 𝗋𝖾𝗀𝗎𝗅𝖺𝗋, then the round ends. If instead Duplicator chooses 𝖻𝗅𝗈𝖼𝗄𝗂𝗇𝗀, then the round continues and Spoiler can again choose to make either a regular or a blocking move. If (αt+1,βt+1,ct+1) does not induce a partial isomorphism with blocking, then Spoiler wins and the game ends. Otherwise if t+1<r, the game continues in round t+2. If t+1=r, then Duplicator wins.

We write 𝒢k,r if Duplicator has a winning strategy in the r-round k-pebble game with blocking. If 𝒢k,r for all r, then we write 𝒢k. As for the k-pebble game, it will also be convenient to consider variants of the k-pebble game with blocking where we start from arbitrary positions or do not specify the number of rounds in advance. Note that while in the (non-blocking) k-pebble game it never makes sense for Spoiler to place a pebble on an already pebbled vertex, this is not the case in the k-pebble game with blocking.

Spoiler and Duplicator meet Prover and Delayer.

We end the section by connecting the k-pebble game with blocking to the k-narrow Prover-Delayer game via the following lemma.

Lemma 9.

Let 𝒢 and be colored graphs and k2 an integer. If 𝒢k,r, then Delayer has an r-point strategy in the k-narrow Prover-Delayer game on 𝒳(𝒢),𝒳().

Proof Sketch.

In the k-narrow Prover-Delayer game on 𝒳(𝒢),𝒳(), Delayer simulates positions of the k-pebble game with blocking on 𝒢, . Intuitively, whenever a 𝗋𝖾𝗀𝗎𝗅𝖺𝗋 pebble pair is placed on vertices u and v (and there is not already a pebble pair on u and v), Delayer should score a point since it “does not matter” whether we map u0 to v0 or to v1. As the round counter of the k-pebble game with blocking only advances when a pebble pair is marked as 𝗋𝖾𝗀𝗎𝗅𝖺𝗋, filling in the details is relatively straightforward. Lemmas 4 and 9 finally connect the pebble game with blocking to tree-like refutation size.

Theorem 10.

Let k1, and r and 𝒢 and be colored graphs. If 𝒢k+1,r, then every k-narrow tree-like refutation of 𝖨𝖲𝖮(𝒳(𝒢),𝒳()) has size at least 2r.

5 Compressing CFI Graphs

By what we have seen so far (Corollary 7 and Theorem 10), to prove Theorem 1 it suffices to show that Duplicator can survive a large number of rounds in the k-pebble game with blocking on suitably chosen colored graphs 𝒢,. In this section, we describe a framework which allows us to construct such graphs.

Concretely, we recall a recent approach to construct pairs of graphs that require quantifier depth Ω(nk/2) to be distinguished in k-variable first order logic k (and also with counting) [25]. The key idea is a novel compression technique of the so-called Cai-Fürer-Immerman (CFI) graphs [17] and a concrete compression construction for CFI graphs over grids. Having introduced this construction, we give a method for proving lower bounds for the k-pebble game with blocking on compressed CFI graphs. To do this, we first recall a variant of the Cops and Robber game, which can be used to derive lower bounds on the k-pebble game on compressed CFI graphs, and then extend this game with an appropriate notion of blocking.

CFI Graphs.

Let 𝒢=(V𝒢,E𝒢) be a connected ordered graph, called a base graph, and f:E𝒢𝔽2 be a function, where 𝔽2 is the two-element field. From 𝒢 and f we derive the colored CFI graph 𝖢𝖥𝖨(𝒢,f): Vertices of 𝒢 are called base vertices. Every base vertex of 𝒢 is replaced by a CFI gadget and gadgets of adjacent vertices are connected. The vertices of the CFI gadget for a degree d base vertex uV𝒢 are the pairs (u,a¯) for all d-tuples a¯=(a1,,ad)𝔽2d with i=1dai=0. The vertex (u,a¯) has origin u. Vertices inherit the color of their origin. Since every vertex of the base graph has a unique color, the vertices of each gadget form a color class of the CFI graph. For all adjacent base vertices u,vV𝒢, we add the following edges between the gadgets for u and v: Let u be the i-th neighbor of v and v be the j-th neighbor of u according to the order on V𝒢. There is an edge between vertices (u,a¯) and (v,b¯) if and only if ai+bj=f({u,v}), where ai is the i-th entry of a¯ and bj is the j-th entry of b¯. See Figure 1 for an example. We say that two functions f,g:E𝒢𝔽2 twist an edge eE𝒢 or the edge eE𝒢 is twisted by f and g if f(e)g(e). It is known that 𝖢𝖥𝖨(𝒢,f)≇𝖢𝖥𝖨(𝒢,g) if and only if f and g twist an odd number of edges [17].

Compressing CFI Graphs.

CFI graphs are a well-studied tool to derive lower bounds for k-variable logic with counting or other logics, see e.g. [17, 20, 15, 18, 31]. This construction and its generalizations have also been used to derive proof complexity lower bounds on graph isomorphism in various proof systems [40, 12, 13, 32, 41, 36]. We now discuss the method of compressing CFI graphs [25]. The goal is to reduce the size of the resulting graph while essentially preserving the hardness of it. The main idea is to identify the gadgets of certain base vertices. The hardness of the resulting compressed CFI graphs heavily depends on which gadgets get identified and can be analyzed using a variant of the Cops and Robber game. We now present this framework.

Definition 11 (Graph Compression).

An equivalence relation  on V𝒢 is a 𝒢-compression if for all u,u,v,vV𝒢 it satisfies the following two conditions:

  1. 1.

    If uv, then u and v are non-adjacent and of the same degree.

  2. 2.

    If {u,v},{u,v}E𝒢, uu, vv, and u is the i-th neighbor of v (according to the order on V𝒢), then u is the i-th neighbor of v.

Let V𝒢2 be a 𝒢-compression. It induces an equivalence relation on 𝖢𝖥𝖨(𝒢,f) (independently of the function f:E𝔽2), which we also denote by , via (u,a¯)(v,b¯) if and only if uv and a¯=b¯. Contracting all -equivalence classes in 𝖢𝖥𝖨(𝒢,f) into a single vertex yields the colored graph 𝖢𝖥𝖨(𝒢,f)/: the vertices of 𝖢𝖥𝖨(𝒢,f)/ are the -equivalence classes u/:={wV𝖢𝖥𝖨(𝒢,f)|wu}, and u/ and v/ are adjacent if there are uu and vv such that u and v are adjacent in 𝖢𝖥𝖨(𝒢,f). Observe that 𝖢𝖥𝖨(𝒢,f)/ is loop-free by the condition on that equivalent vertices of 𝒢 are non-adjacent. The color of a -equivalence class in 𝖢𝖥𝖨(𝒢,f)/ is the minimal color of one of its members in 𝖢𝖥𝖨(𝒢,f). To obtain reasonable graphs, f has to be compatible with the compression  in the following sense.

(a) The base graph with the compression.
(b) The corresponding (uncompressed) CFI graph.
(c) The precompressed CFI graph.
(d) The compressed CFI graph.
Figure 1: Compressed CFI graphs for a grid of height 2 as base graph, a very simple compression, which only identifies two base vertices, and the function that assigns 0 to all edges. The compression on the base graph and the induced one on the precompressed CFI graph is drawn in magenta.
Definition 12 (Compressible).

A function f:E𝒢𝔽2 is -compressible if f({u,v})=f({u,v}) for all vertices u,v,u,vV𝒢 such that {u,v},{u,v}E𝒢, uu, and vv.

Definition 13 (Compressed CFI).

For a 𝒢-compression  and a -compressible function f:E𝒢𝔽2, the graph (𝖢𝖥𝖨(𝒢,f),) expanding the colored graph 𝖢𝖥𝖨(𝒢,f) with is a precompressed CFI graph, and the colored graph 𝖢𝖥𝖨(𝒢,f)/ is a compressed CFI graph.

Precompressed CFI graphs can also be seen as edge-colored graphs that use two colors for the edges – one the the regular edges and one for the equivalence relation. An example is shown in Figure 1. The round number of the bijective k-pebble game (a variant of the k-pebble game that characterizes equivalence of k-variable first order logic with counting quantifiers) on precompressed and compressed CFI graphs are almost equal [25]. The corresponding statement for the k-pebble game with blocking is proved similarly.

Lemma 14.

Let k3, r, be a 𝒢-compression, and f,g:E𝒢𝔽2 be -compressible.

  1. 1.

    𝖢𝖥𝖨(𝒢,f)≄k,r𝖢𝖥𝖨(𝒢,g) implies (𝖢𝖥𝖨(𝒢,f),)≄k,r(𝖢𝖥𝖨(𝒢,g),).

  2. 2.

    (𝖢𝖥𝖨(𝒢,f),)≄k,r(𝖢𝖥𝖨(𝒢,g),) implies 𝖢𝖥𝖨(𝒢,f)/≄k,r𝖢𝖥𝖨(𝒢,g)/.

  3. 3.

    𝖢𝖥𝖨(𝒢,f)/≄k,r𝖢𝖥𝖨(𝒢,g)/ implies (𝖢𝖥𝖨(𝒢,f),)≄k,r+2(𝖢𝖥𝖨(𝒢,g),).

The Compressed Cops and Robber Game.

The ability of the bijective k-pebble game to distinguish non-isomorphic CFI graphs is captured by the k-Cops and Robber game [37, 25]. A variant of this game – the compressed k-Cops and Robber game – provides lower bounds for compressed CFI graphs. To see this, we consider isomorphisms of CFI graphs. These always twist an even number of edges and can be described in terms of paths in the base graphs by twistings (defined below). Moreover, if these paths are compatible with the compression, they induce isomorphisms of compressed CFI graphs. For ordered base graphs, these twistings correspond one-to-one with isomorphisms of the (compressed) CFI graphs.

Definition 15 (Twisting).

A set T{(u,v)|{u,v}E} is called a 𝒢-twisting if, for every uV, the set T({u}×V) is of even size. The twisting T

  • twists an edge {u,v}E if the set T contains exactly one of (u,v) and (v,u) and

  • fixes a vertex uV if T({u}×V)=.

To obtain a reasonable notion of twistings for isomorphisms of compressed CFI graphs, the twistings have to be compatible with the compression. For more details on (compressed) CFI graphs, their isomorphisms, and twistings, we refer to the original paper [25].

Definition 16 (Compressible Twisting).

For a 𝒢-compression , a 𝒢-twisting T is called -compressible if the following holds for all u,uV with uu: Let u and u be of degree d. Then for every i[d], we have (u,vi)T if and only if (u,vi)T, where vi is the i-th neighbor of u and vi is the i-th neighbor of u (according to the order on 𝒢).

The compressed k-Cops and Robber game [25] is played on a base graph 𝒢 and a 𝒢-compression . The Cops Player places cops on up to k -equivalence classes and the robber is placed on one edge of 𝒢. Initially, only the robber is placed. The game proceeds in rounds:

  1. 1.

    The Cops Player picks up a cop and announces a new -equivalence class C for this cop.

  2. 2.

    The robber moves. To move from the current edge e1 to another edge e2, the robber has to provide a -compressible 𝒢-twisting that only twists the edges e1 and e2 and that fixes every vertex contained in a cop-occupied -equivalence class.

  3. 3.

    The cop that was picked up in Step 1 is placed on C. The next round starts.

The robber is caught if the two endpoints of the robber-occupied edge are contained in cop-occupied -classes. The cops have a winning strategy in r rounds, if they can catch the robber in r rounds independently of the moves of the robber. Similarly, the robber has a strategy for the first r rounds if the robber can avoid being caught for r rounds independently of the moves of the Cops Player. The winner of the compressed game depends on the initial position of the robber. This game yields lower bounds for the (bijective) k-pebble game:

Lemma 17 ([25]).

Let be a 𝒢-compression and suppose f,g:E𝒢𝔽2 only twist a single edge e. If the robber, initially placed on the edge e, has a strategy for the first r rounds in the compressed k-Cops and Robber game on 𝒢 and , then (𝖢𝖥𝖨(𝒢,f),)k,r(𝖢𝖥𝖨(𝒢,g),).

Introducing Roadblocks for Cops.

To obtain lower bounds for the k-pebble game with blocking, we add “roadblocks” to the compressed Cops and Robber game and prove a blocking analogue of Lemma 17. Let 𝒢 be an ordered graph. A roadblock for a vertex uV𝒢 is a nonempty set N{(u,v)|{u,v}E𝒢} of (directed) edges incident to u of even size. A 𝒢-twisting T avoids a roadblock N for a vertex u if T{u}×V𝒢N. In particular, T may contain a strict superset or subset of N. If T does not avoid N, then T uses N. A roadblock for a -equivalence class C is a nonempty set N[d] of even size, where d is the unique degree of the vertices in C. A 𝒢-twisting T avoids the roadblock N on C if, for every vertex uC, the twisting T avoids the roadblock Nu:={(u,vi)|iN} for u, where vi denotes the i-th neighbor of u. If T is -compressible and does not avoid N, then T uses Nu for every vertex uC; we say that T uses N. Let M[d] be the set of all i[d] such that T contains the edge to the i-th neighbor of some and, since T is -compressible, of every uC. We write T(N) for the symmetric difference of N and M.

The compressed and blocking k-Cops and Robber game is played on a base graph 𝒢 and a 𝒢-compression . The Cops Player controls cops and roadblocks. The total number of cops and roadblocks is k but the number of each may vary during the game. Cops and roadblocks are placed on -equivalence classes and the robber is located on an edge. Initially, only the robber is placed. A round of the game proceeds as follows: The Cops Player picks up a cop or a roadblock and can choose to play a cop move or a blocking move.

  1. 1.

    A cop move proceeds similarly to the non-blocking game. First, the Cops Player announces a -equivalence class C. Next, the robber moves. To move from an edge e1 to another edge e2, the robber provides a -compressible 𝒢-twisting T that only twists the edges e1 and e2, fixes every vertex contained in a cop-occupied -equivalence class, and avoids every roadblock. Afterwards, a cop is placed on the announced class C.

  2. 2.

    For a blocking move, the Cops Player announces a -equivalence class C and a roadblock N for C. Next, the robber moves with a -compressible 𝒢-twisting T as in the cop move. If T uses N, then a cop is placed on C. Otherwise, the roadblock N is placed on C.

  3. 3.

    The existing roadblocks are updated. If a roadblock N is placed on a class C, then it is replaced by the roadblock T(N) on C. Because in both a cop and a blocking move T avoids all roadblocks, T(N) will always be a nonempty set. If a roadblock was placed in this move, the Cops Player can again choose to play either a cop or a blocking move without increasing the round counter.

The notion of the robber being caught or having a strategy for the first r round is the same as in the non-blocking game. As in the non-blocking game, the starting edge of the robber is important. The following lemma is proved similarly to Lemma 17.

Lemma 18.

Suppose is a 𝒢-compression and f,g:E𝒢𝔽2 only twist a single edge e. If the robber, initially placed on the edge e, has a strategy for the first r rounds in the compressed and blocking k-Cops and Robber game on 𝒢 and , then (𝖢𝖥𝖨(𝒢,f),)k,r(𝖢𝖥𝖨(𝒢,g),).

The -compressible twistings of the robber induce isomorphisms of the compressed CFI graphs, which respect all currently placed pebbles. These are used to move the twisted edge (“the robber”) away from the pebbles. Cops correspond to 𝗋𝖾𝗀𝗎𝗅𝖺𝗋 pebble pairs and roadblocks to 𝖻𝗅𝗈𝖼𝗄𝗂𝗇𝗀 ones. The case distinction in Point 2 whether a cop roadblock is placed ensures that in a blocking move in the pebble game with blocking the pebble pair gets marked as 𝗋𝖾𝗀𝗎𝗅𝖺𝗋 or 𝖻𝗅𝗈𝖼𝗄𝗂𝗇𝗀 consistently with the current isomorphism. Updating the roadblocks in Point 3 corresponds to applying the isomorphism induced by the twisting T to them.

6 The Super-Linear Lower Bound with Roadblocks

We now present and analyze the robust compressed CFI construction of [19]. This work shows that the robber can survive for a large number of rounds in the compressed Cops and Robber game for certain compressions. This section shows that the robber also has a strategy for a large number of rounds in the game with roadblocks. By Lemma 18 and Theorem 10, such a result implies a lower bound on tree-like refutation size for graph isomorphism formulas.

6.1 Compressing Cylindrical Grids

Fix an integer k3 and a sufficiently large integer w. Set f(k):=4k. Let p1,,pk be pairwise coprime numbers such that w2piw for every i[k]. For all sufficiently large w, such numbers exist [25]. Set J:=f(k)p1pk. Let 𝒞 be the k×J cylindrical grid, that is, the k×J grid, in which we also connect the top and bottom row. The vertices of 𝒞 are pairs (i,j) for all i[k] and j[J]. They are ordered lexicographically. We think of the first component as the row index and the second component as the column index. We refer to the first f(k) columns as the left end of 𝒞, and to the last f(k) columns as the right end of 𝒞. We use addition on row indices in a modulo-like manner, e.g., the (k+1)-th row is the first one and pk+1=p1. For each t[k1], we define the following equivalence t via:

(i,j)t(i,j)i=i;f(k)<j,jJf(k);and jj is divisible by f(k)pipi+t.

These equivalences are 𝒞-compressions [19]. Note that the vertices in the left or the right end of 𝒞 are in singleton t-equivalence classes. The vertices in between are identified periodically, but the period is different in every row. It is not hard to show that there are Θ(wt+1) t-equivalence classes. Together with the fact that CFI gadgets for degree 4 base vertices have 8 vertices, this implies the next lemma:

Lemma 19.

For all t[k1] and t-compressible f:E𝒞𝔽2, the graph 𝖢𝖥𝖨(𝒞,f)/t has order Θ(wt+1) (where k and t are seen as constants) and color class size 8.

While the order of the graphs is Θ(wt+1), the robber has a strategy for Ω(wk) rounds:

Theorem 20 ([19]).

For every t[k1], consider the compressed (k+t)-Cops and Robber game played on 𝒞 and t. If the robber is initially placed on an edge on the left or right end of 𝒞, then the robber has a strategy for the first Ω(J)=Ω(wk) rounds.

Unfortunately, this theorem does not lift to the game with roadblocks; in order to lift it, we investigate the strategy of the robber in more detail: The robber is always located in either the left or right end of the grid. On uncompressed grids of height k, the optimal strategy of the Cops Player with at most 2k cops is to separate the left from the right end of grid using the cops and to move this separator slowly towards the robber (by at most a constant number of columns in each round). So the robber can avoid getting caught for a number of rounds linear in the length of the grid: when a newly announced cop is about to form a separator, the robber moves to the end furthest from the separator. In the compressed game, the strategy is similar. However, the suitable notion of a separator and the analysis of the situations in which the robber can move from the one end of the grid to the other are more complicated. We now describe them on an informal level to illustrate the central ideas. For formal details and more explanations, we refer to the original works [19, 25].

To move the robber from one end of the grid to the other, we use t-compressible 𝒞-twistings that twist exactly two edges, one in the first and one in the last column. Such twistings are called t-end-to-end twistings and are obtained from -periodic paths [25]. Intuitively, these are paths from the first to the last column in the grid 𝒞, which repeat every  columns. This means that an -periodic path is defined by a path in columns 0 to 1 repeating every  columns. If  is the greatest common divisor of the compression periods of all the rows used by the path, then the path induces a t-end-to-end twisting:

Lemma 21 ([19, 25]).

Let t[k1], π=(u1,,um) be an -periodic path, and I[k] be the set of all rows of which π contains vertices. If =gcd{f(k)pipi+t|iI}, then π induces the t-compressible 𝒞-twisting {(ui,ui1),(ui,ui+1)| 1<i<m}.

We now turn to a suitable notion of “a separator” for the compressed grid. Let W be a set of t-equivalence classes. A t-virtual cordon [19] for W is a separator SV𝒞 that separates the left from the right end of the grid 𝒞 and satisfies additional conditions on the vertices that S is allowed to contain. For example, if W contains only one class of row i, then S may only contain a single vertex from that class. A set W is t-critical, if there is a t-virtual cordon for W and there is no periodic path satisfying the conditions of Lemma 21 that avoids all vertices of the classes in W (and actually even more). Intuitively, for t-critical sets the robber cannot move between both ends. For non-t-critical sets of size at most k+t1 (so in situations where at least one cop is picked up), this is always possible using periodic paths.

Lemma 22 ([19]).

Let t[k1] and let W be a set of at most k+t1 many t-equivalence classes. If W is not t-critical, then there is a t-end-to-end-twisting avoiding all classes in W.

The minimal distance of the robber to an inclusion-wise minimal t-virtual cordon for W measures the distance between the robber and the cops. When an announced cop will make the position t-critical, the robber moves to the end to which this distance is larger. This distance decreases by at most a constant in each round [19]. So, the robber still has a strategy for a number of rounds linear in the grid length. Since the compressed CFI graphs are much smaller, we get a much better bound for the k-pebble game on the compressed CFI graphs.

6.2 Cops do not Benefit From Roadblocks

We now show that for the 𝒞-compressions of the previous section, the Cops Player does not benefit from roadblocks. This means that, although blocking moves possibly allow the Cops Player to make multiple moves per round, the number of rounds the robber can avoid getting caught does not change asymptotically compared to the game without roadblocks. Note that converting a roadblock to a cop only makes it harder for the robber to move. To see this, observe that a roadblock prevents the robber from passing through a vertex (or class) using a specified set of incident edges, while a cops prevents the robber from passing through the vertex (or class) at all.

Lemma 23.

Let t[k1] and c25k1 be integers. Consider the compressed and blocking (k+c)-Cops and Robber game on 𝒞 and t and assume that cops are placed in at most c rows. Then there is a t-end-to-end twisting that avoids all cop-occupied t-equivalence classes and avoids all roadblocks.

Proof Sketch.

We call a roadblock horizontal if it blocks the use of exactly the two horizontal incident edges of a vertex or t-class. If there are no horizontal roadblocks in a cop-free row, then the straight path through that row is a t-end-to-end twisting and we are done. Assume for a contradiction, that no t-end-to-end twisting exists. A cop-free row is lonely, if it is sandwiched by cop-occupied rows. We show that there have to be additional (non-horizontal) roadblocks in each non-lonely row. To do this we construct, for non-lonely rows i and i+1, two 2-periodic paths that only use vertices from rows i and i+1, avoid all horizontal roadblocks, and do not share the same incident edges of any vertex in rows i and i+1 (see Figure 2). By Lemma 21, if there are no non-horizontal roadblocks in rows i and i+1, then these path would induce t-end-to-end twistings. Because the two paths do not use common incident edges, an additional roadblock is required for each one to block the path. This allows us to lower bound the number of roadblocks in terms of c and to contradict the assumption that c25k1. Hence, the desired t-end-to-end twisting exists.

Figure 2: The two 2-periodic paths (in blue and in green) constructed in the proof of Lemma 23. Edges in and between rows i and i+1 in the cylindrical grid are drawn in black. Both paths never use the same incident edges of any vertex. Avoided horizontal roadblocks are drawn in orange.

Using the previous lemma, we are ready to prove the main technical result of this section.

Lemma 24.

Let 1t25k1 be an integer. Then the robber, initially placed on the left or right end of 𝒞, has a strategy for the first Ω(J) rounds in the compressed and blocking (k+t)-Cops and Robber game on 𝒞 and t.

Proof Sketch.

We will convert all roadblocks into cops and make the game harder for the robber. In this way, we use the notions of t-critical sets and t-virtual cordons for these positions. The robber always stays at one end of the grid: If the current position is not critical, the robber stays at the current end, until an announced cop or roadblock (seen as a cop) makes the position critical. Then using the t-end-to-end twisting from Lemma 22 the robber moves to the end of the grid with larger distance to every minimal t-virtual cordon. This distance is in Ω(J) [19]. If the current position is critical, we show that blocking moves only allow the Cops Player to decrease this distance by O(k), via a case distinction on the number of cop-occupied rows. While this is at most 25k1, the robber can always use the t-end-to-end twisting given by Lemma 23 to switch ends. Otherwise, the number of cop-occupied rows is at least 25k. In this case, all intermediate positions between the blocking moves share at least one row in which only one and the same cop is placed, so by inductively applying [19, Proposition 4.10], we show that the minimal t-virtual cordon before and after the blocking moves are contained within O(k) subsequent columns.

So, starting from a distance of Ω(J), the robber has a strategy such that this distance decreases by at most O(k) in each round. Hence, the robber has a strategy for the first Ω(J/O(k))=Ω(J) rounds (since k is seen as a constant). Finally, for sufficiently large n and choosing w=nt+1, Lemmas 241419, and 18 together imply the desired round lower bound for the (k+t)-pebble game with blocking.

Theorem 25.

For all integers k3, 1t25k1, and n, there are two colored graphs 𝒢 and  of order Θ(n) and color class size 8 such that

  1. 1.

    𝒢≄k+1, that is, Spoiler wins the (k+1)-pebble game on 𝒢,, and

  2. 2.

    𝒢k+t,Ω(nk/(t+1)), that is, Duplicator has a strategy for the first Ω(nk/(t+1)) rounds in the (k+t)-pebble game with blocking on 𝒢,.

7 Supercritical Width versus Tree-Like Size Trade-Offs

We finally derive our main results; starting with narrow resolution.

Theorem 26.

For all integers k3, 1t25k1, and n, there are two colored graphs 𝒢 and  of order Θ(n) and color class size 16 such that

  1. 1.

    there is a k-narrow resolution refutation of 𝖨𝖲𝖮(𝒢,), and

  2. 2.

    every (k+t1)-narrow tree-like resolution refutation of 𝖨𝖲𝖮(𝒢,) has size 2Ω(nk/(t+1)).

Proof.

Let k3 and 1t25k1. By Theorem 25, for all n, there are graphs 𝒢 and  of color class size 8 and order Θ(n) such that 𝒢≄k+1 and 𝒢k+t,Ω(nk/(t+2)). It is easy to see that 𝒳(𝒢) and 𝒳() have color class size 16. By Theorem 5 and Lemma 6, there is a k-narrow resolution refutation for 𝖨𝖲𝖮(𝒳(𝒢),𝒳()). Moreover, from Lemma 9 it follows that Delayer has a strategy to score Ω(nk/(t+1)) points in the (k+t)-narrow Prover-Delayer game on 𝒳(𝒢),𝒳(). Therefore, by Lemma 4, the result follows. Theorem 1 is the case t=1 of Theorem 26. We now lift Theorem 26 to usual resolution (without the narrow resolution rule). First, if 𝒢 and  have color class size c, then we can convert every k-narrow refutation of 𝖨𝖲𝖮(𝒢,) into a (usual) refutation of 𝖨𝖲𝖮(𝒢,) of width k+c. Second, a width-k refutation is in particular a width-k narrow refutation. Theorem 2 follows immediately. Note that while Assertion 2 of Theorem 2 provides a lower bound for all t25k1, Assertion 1 only guarantees a refutation of width k+16. Therefore, the existing refutation must be large only for k45 and 17t25k1 .

Conclusion and Open Questions.

We established a new super-critical (narrow) width vs. tree-like size trade-off on graph isomorphism formulas for resolution. The lower bound of 2Ω(nk/2) obtained for t=1 in Theorems 2 and 26 is close to the upper bound of 2nk for the tree-like size of resolution of (narrow) width k. We exploited a compressed variant of the CFI graphs and round number lower bounds in the k-pebble game on them. However, we had to move from the k-pebble game to the k-pebble game with blocking, and reprove the round number lower bounds in this setting. This raises the question of whether there is a generic translation from round number lower bounds in the k-pebble game to tree-like size resolution lower bounds. Another question is whether the decrease in the robustness in the trade-off from 2k in [19] to 75k in Theorem 26 is necessary. More broadly, we ask for a more robust compression or trade-off that can be applied to a much wider range than 2k.

References

  • [1] Albert Atserias and Víctor Dalmau. A combinatorial characterization of resolution width. J. Comput. Syst. Sci., 74(3):323–334, 2008. doi:10.1016/J.JCSS.2007.06.025.
  • [2] Albert Atserias, Meena Mahajan, Jakob Nordström, and Alexander Razborov. Proof complexity and beyond. Oberwolfach Report, 2024. Workshop held 24–29 March 2024. doi:10.14760/OWR-2024-15.
  • [3] Albert Atserias and Elitza N. Maneva. Sherali-Adams relaxations and indistinguishability in counting logics. SIAM J. Comput., 42(1):112–137, 2013. doi:10.1137/120867834.
  • [4] László Babai. Graph isomorphism in quasipolynomial time [extended abstract]. In 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, Cambridge, MA, USA, June 18-21, 2016, pages 684–697. ACM, 2016. doi:10.1145/2897518.2897542.
  • [5] Paul Beame, Chris Beck, and Russell Impagliazzo. Time-space trade-offs in resolution: Superpolynomial lower bounds for superlinear space. SIAM J. Comput., 45(4):1612–1645, 2016. doi:10.1137/130914085.
  • [6] Chris Beck, Jakob Nordström, and Bangsheng Tang. Some trade-off results for polynomial calculus: extended abstract. In Symposium on Theory of Computing Conference, STOC’13, Palo Alto, CA, USA, June 1-4, 2013, pages 813–822. ACM, 2013. doi:10.1145/2488608.2488711.
  • [7] Eli Ben-Sasson, Russell Impagliazzo, and Avi Wigderson. Near optimal separation of tree-like and general resolution. Comb., 24(4):585–603, 2004. doi:10.1007/S00493-004-0036-5.
  • [8] Eli Ben-Sasson and Jakob Nordström. Short proofs may be spacious: An optimal separation of space and length in resolution. In 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA, pages 709–718. IEEE Computer Society, 2008. doi:10.1109/FOCS.2008.42.
  • [9] Eli Ben-Sasson and Jakob Nordström. Understanding space in proof complexity: Separations and trade-offs via substitutions. In Innovations in Computer Science - ICS 2011, Tsinghua University, Beijing, China, January 7-9, 2011. Proceedings, pages 401–416. Tsinghua University Press, 2011. URL: http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/3.html.
  • [10] Eli Ben-Sasson and Avi Wigderson. Short proofs are narrow - resolution made simple. In Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, USA, pages 517–526. ACM, 1999. doi:10.1145/301250.301392.
  • [11] Christoph Berkholz. On the complexity of finding narrow proofs. In 53rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2012, New Brunswick, NJ, USA, October 20-23, 2012, pages 351–360. IEEE Computer Society, 2012. doi:10.1109/FOCS.2012.48.
  • [12] Christoph Berkholz and Martin Grohe. Limitations of algebraic approaches to graph isomorphism testing. In Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I, volume 9134 of Lecture Notes in Computer Science, pages 155–166. Springer, 2015. doi:10.1007/978-3-662-47672-7_13.
  • [13] Christoph Berkholz and Martin Grohe. Linear diophantine equations, group CSPs, and graph isomorphism. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017, Barcelona, Spain, Hotel Porta Fira, January 16-19, pages 327–339. SIAM, 2017. doi:10.1137/1.9781611974782.21.
  • [14] Christoph Berkholz, Moritz Lichter, and Harry Vinall-Smeeth. Supercritical size-width tree-like resolution trade-offs for graph isomorphism. CoRR, 2024. arXiv preprint. doi:10.48550/arXiv.2407.17947.
  • [15] Christoph Berkholz and Jakob Nordström. Near-optimal lower bounds on quantifier depth and Weisfeiler-Leman refinement steps. In 31st Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2016, New York, NY, USA, July 5-8, 2016, pages 267–276, 2016. doi:10.1145/2933575.2934560.
  • [16] Christoph Berkholz and Jakob Nordström. Supercritical space-width trade-offs for resolution. SIAM J. Comput., 49(1):98–118, 2020. doi:10.1137/16M1109072.
  • [17] Jin-yi Cai, Martin Fürer, and Neil Immerman. An optimal lower bound on the number of variables for graph identification. Combinatorica, 12(4):389–410, 1992. doi:10.1007/BF01305232.
  • [18] Anuj Dawar, Erich Grädel, and Moritz Lichter. Limitations of the invertible-map equivalences. J. Log. Comput., September 2022. doi:10.1093/logcom/exac058.
  • [19] Susanna F. de Rezende, Noah Fleming, Duri Andrea Janett, Jakob Nordström, and Shuo Pang. Truly supercritical trade-offs for resolution, cutting planes, monotone circuits, and Weisfeiler-Leman. CoRR, abs/2411.14267, 2024. arXiv preprint. doi:10.48550/arXiv.2411.14267.
  • [20] Martin Fürer. Weisfeiler-Lehman refinement requires at least a linear number of iterations. In 28th International Colloquium on Automata, Languages, and Programming, ICALP 2001, Crete, Greece, July 8-12, 2001, Proceedings, volume 2076 of Lecture Notes in Computer Science, pages 322–333. Springer, 2001. doi:10.1007/3-540-48224-5_27.
  • [21] Nicola Galesi and Neil Thapen. Resolution and pebbling games. In Theory and Applications of Satisfiability Testing, 8th International Conference, SAT 2005, St. Andrews, UK, June 19-23, 2005, Proceedings, volume 3569 of Lecture Notes in Computer Science, pages 76–90. Springer, 2005. doi:10.1007/11499107_6.
  • [22] Erich Grädel, Martin Grohe, Benedikt Pago, and Wied Pakusa. A finite-model-theoretic view on propositional proof complexity. Log. Methods Comput. Sci., 15(1), 2019. doi:10.23638/LMCS-15(1:4)2019.
  • [23] Martin Grohe. Fixed-point definability and polynomial time on graphs with excluded minors. J. ACM, 59(5):27:1–27:64, 2012. doi:10.1145/2371656.2371662.
  • [24] Martin Grohe, Moritz Lichter, and Daniel Neuen. The iteration number of the Weisfeiler-Leman algorithm. ACM Trans. Comput. Log., 26(1):6:1–6:31, 2025. doi:10.1145/3708891.
  • [25] Martin Grohe, Moritz Lichter, Daniel Neuen, and Pascal Schweitzer. Compressing CFI graphs and lower bounds for the Weisfeiler-Leman refinements. In 64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023, Santa Cruz, CA, USA, November 6-9, 2023, pages 798–809. IEEE, 2023. doi:10.1109/FOCS57990.2023.00052.
  • [26] Martin Grohe and Daniel Neuen. Recent advances on the graph isomorphism problem. In Surveys in Combinatorics, 2021: Invited lectures from the 28th British Combinatorial Conference, Durham, UK, July 5-9, 2021, pages 187–234. Cambridge University Press, 2021. doi:10.1017/9781009036214.006.
  • [27] Martin Grohe and Daniel Neuen. Isomorphism for tournaments of small twin width. In 51st International Colloquium on Automata, Languages, and Programming, ICALP 2024, July 8-12, 2024, Tallinn, Estonia, volume 297 of LIPIcs, pages 78:1–78:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.ICALP.2024.78.
  • [28] Martin Grohe and Martin Otto. Pebble games and linear equations. J. Symb. Log., 80(3):797–844, 2015. doi:10.1017/JSL.2015.28.
  • [29] Neil Immerman. Upper and lower bounds for first order expressibility. J. Comput. Syst. Sci., 25(1):76–98, 1982. doi:10.1016/0022-0000(82)90011-3.
  • [30] Richard M. Karp. Reducibility among combinatorial problems. In Proceedings of a symposium on the Complexity of Computer Computations, held March 20-22, 1972, at the IBM Thomas J. Watson Research Center, Yorktown Heights, New York, USA, The IBM Research Symposia Series, pages 85–103. Plenum Press, New York, 1972. doi:10.1007/978-1-4684-2001-2_9.
  • [31] Moritz Lichter. Witnessed symmetric choice and interpretations in fixed-point logic with counting. In 50th International Colloquium on Automata, Languages, and Programming (ICALP 2023), volume 261 of LIPIcs, pages 133:1–133:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPIcs.ICALP.2023.133.
  • [32] Ryan O’Donnell, John Wright, Chenggang Wu, and Yuan Zhou. Hardness of robust graph isomorphism, Lasserre gaps, and asymmetry of random graphs. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pages 1659–1677. SIAM, 2014. doi:10.1137/1.9781611973402.120.
  • [33] Benedikt Pago. Finite model theory and proof complexity revisited: Distinguishing graphs in Choiceless Polynomial Time and the extended polynomial calculus. In 31st EACSL Annual Conference on Computer Science Logic, CSL 2023, February 13-16, 2023, Warsaw, Poland, volume 252 of LIPIcs, pages 31:1–31:19. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.CSL.2023.31.
  • [34] Pavel Pudlák and Russell Impagliazzo. A lower bound for DLL algorithms for k-SAT (preliminary version). In Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, January 9-11, 2000, San Francisco, CA, USA, pages 128–136. ACM/SIAM, 2000. URL: http://dl.acm.org/citation.cfm?id=338219.338244.
  • [35] Alexander A. Razborov. A new kind of tradeoffs in propositional proof complexity. J. ACM, 63(2):16:1–16:14, 2016. doi:10.1145/2858790.
  • [36] Pascal Schweitzer and Constantin Seebach. Resolution with symmetry rule applied to linear equations. In 38th International Symposium on Theoretical Aspects of Computer Science, STACS 2021, March 16-19, 2021, Saarbrücken, Germany (Virtual Conference), volume 187 of LIPIcs, pages 58:1–58:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPIcs.STACS.2021.58.
  • [37] Paul D. Seymour and Robin Thomas. Graph searching and a min-max theorem for tree-width. J. Comb. Theory, Ser. B, 58(1):22–33, 1993. doi:10.1006/jctb.1993.1027.
  • [38] Neil Thapen. A tradeoff between length and width in resolution. Theory Comput., 12(1):1–14, 2016. doi:10.4086/TOC.2016.V012A005.
  • [39] Jacobo Torán. On the hardness of graph isomorphism. SIAM J. Comput., 33(5):1093–1108, 2004. doi:10.1137/S009753970241096X.
  • [40] Jacobo Torán. On the resolution complexity of graph non-isomorphism. In Theory and Applications of Satisfiability Testing - SAT 2013 - 16th International Conference, Helsinki, Finland, July 8-12, 2013. Proceedings, volume 7962 of Lecture Notes in Computer Science, pages 52–66. Springer, 2013. doi:10.1007/978-3-642-39071-5_6.
  • [41] Jacobo Torán and Florian Wörz. Cutting planes width and the complexity of graph isomorphism refutations. In 26th International Conference on Theory and Applications of Satisfiability Testing, SAT 2023, July 4-8, 2023, Alghero, Italy, volume 271 of LIPIcs, pages 26:1–26:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.SAT.2023.26.
  • [42] Jacobo Torán and Florian Wörz. Number of variables for graph differentiation and the resolution of graph isomorphism formulas. ACM Trans. Comput. Log., 24(3):23:1–23:25, 2023. doi:10.1145/3580478.
  • [43] Alasdair Urquhart. The depth of resolution proofs. Stud Logica, 99(1-3):349–364, 2011. doi:10.1007/S11225-011-9356-9.