614 research outputs found
Generation of cubic graphs and snarks with large girth
We describe two new algorithms for the generation of all non-isomorphic cubic
graphs with girth at least which are very efficient for
and show how these algorithms can be efficiently restricted to generate snarks
with girth at least .
Our implementation of these algorithms is more than 30, respectively 40 times
faster than the previously fastest generator for cubic graphs with girth at
least 6 and 7, respectively.
Using these generators we have also generated all non-isomorphic snarks with
girth at least 6 up to 38 vertices and show that there are no snarks with girth
at least 7 up to 42 vertices. We present and analyse the new list of snarks
with girth 6.Comment: 27 pages (including appendix
Some snarks are worse than others
Many conjectures and open problems in graph theory can either be reduced to
cubic graphs or are directly stated for cubic graphs. Furthermore, it is known
that for a lot of problems, a counterexample must be a snark, i.e. a bridgeless
cubic graph which is not 3--edge-colourable. In this paper we deal with the
fact that the family of potential counterexamples to many interesting
conjectures can be narrowed even further to the family of
bridgeless cubic graphs whose edge set cannot be covered with four perfect
matchings. The Cycle Double Cover Conjecture, the Shortest Cycle Cover
Conjecture and the Fan-Raspaud Conjecture are examples of statements for which
is crucial. In this paper, we study parameters which have
the potential to further refine and thus enlarge the set of
cubic graphs for which the mentioned conjectures can be verified. We show that
can be naturally decomposed into subsets with increasing
complexity, thereby producing a natural scale for proving these conjectures.
More precisely, we consider the following parameters and questions: given a
bridgeless cubic graph, (i) how many perfect matchings need to be added, (ii)
how many copies of the same perfect matching need to be added, and (iii) how
many 2--factors need to be added so that the resulting regular graph is Class
I? We present new results for these parameters and we also establish some
strong relations between these problems and some long-standing conjectures.Comment: 27 pages, 16 figure
On cubic bridgeless graphs whose edge-set cannot be covered by four perfect matchings
The problem of establishing the number of perfect matchings necessary to
cover the edge-set of a cubic bridgeless graph is strictly related to a famous
conjecture of Berge and Fulkerson. In this paper we prove that deciding whether
this number is at most 4 for a given cubic bridgeless graph is NP-complete. We
also construct an infinite family of snarks (cyclically
4-edge-connected cubic graphs of girth at least five and chromatic index four)
whose edge-set cannot be covered by 4 perfect matchings. Only two such graphs
were known. It turns out that the family also has interesting
properties with respect to the shortest cycle cover problem. The shortest cycle
cover of any cubic bridgeless graph with edges has length at least
, and we show that this inequality is strict for graphs of .
We also construct the first known snark with no cycle cover of length less than
.Comment: 17 pages, 8 figure
On the Cryptographic Hardness of Local Search
We show new hardness results for the class of Polynomial Local Search problems (PLS):
- Hardness of PLS based on a falsifiable assumption on bilinear groups introduced by Kalai, Paneth, and Yang (STOC 2019), and the Exponential Time Hypothesis for randomized algorithms. Previous standard model constructions relied on non-falsifiable and non-standard assumptions.
- Hardness of PLS relative to random oracles. The construction is essentially different than previous constructions, and in particular is unconditionally secure. The construction also demonstrates the hardness of parallelizing local search.
The core observation behind the results is that the unique proofs property of incrementally-verifiable computations previously used to demonstrate hardness in PLS can be traded with a simple incremental completeness property
Desenvolvimentos da Conjetura de Fulkerson
Orientador: Christiane Neme CamposDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de ComputaçãoResumo: Em 1971, Fulkerson propôs a seguinte conjetura: todo grafo cúbico sem arestas de corte admite seis emparelhamentos perfeitos tais que cada aresta do grafo pertence a exatamente dois destes emparelhamentos. A Conjetura de Fulkerson tem desafiado pesquisadores desde sua publicação. Esta conjetura é facilmente verificada para grafos cúbicos 3-aresta-coloráveis. Portanto, a dificuldade do problema reside em estabelecer a conjetura para grafos cúbicos sem arestas de corte que não possuem 3-coloração de arestas. Estes grafos são chamados snarks. Nesta dissertação, a Conjetura de Fulkerson e os snarks são introduzidos com ¿ênfase em sua história e resultados mais relevantes. Alguns resultados relacionados à Conjetura de Fulkerson são apresentados, enfatizando suas conexões com outras conjeturas. Um breve histórico do Problema das Quatro Cores e suas relações com snarks também são apresentados. Na segunda parte deste trabalho, a Conjetura de Fulkerson é verificada para algumas famílias infinitas de snarks construídas com o método de Loupekine, utilizando subgrafos do Grafo de Petersen. Primeiramente, mostramos que a família dos LP0-snarks satisfaz a Conjetura de Fulkerson. Em seguida, generalizamos este resultado para a família mais abrangente dos LP1-snarks. Além disto, estendemos estes resultados para Snarks de Loupekine construídos com subgrafos de snarks diferentes do Grafo de PetersenAbstract: In 1971, Fulkerson proposed a conjecture that states that every bridgeless cubic graph has six perfect matchings such that each edge of the graph belongs to precisely two of these matchings. Fulkerson's Conjecture has been challenging researchers since its publication. It is easily verified for 3-edge-colourable cubic graphs. Therefore, the difficult task is to settle the conjecture for non-3-edge-colourable bridgeless cubic graphs, called snarks. In this dissertation, Fulkerson's Conjecture and snarks are presented with emphasis in their history and remarkable results. We selected some results related to Fulkerson's Conjecture, emphasizing their reach and connections with other conjectures. It is also presented a brief history of the Four-Colour Problem and its connections with snarks. In the second part of this work, we verify Fulkerson's Conjecture for some infinite families of snarks constructed with Loupekine's method using subgraphs of the Petersen Graph. More specifically, we first show that the family of LP0-snarks satisfies Fulkerson's Conjecture. Then, we generalise this result by proving that Fulkerson's Conjecture holds for the broader family of LP1-snarks. We also extend these results to even more general Loupekine Snarks constructed with subgraphs of snarks other than the Petersen GraphMestradoCiência da ComputaçãoMestre em Ciência da Computaçã
The Bottleneck Complexity of Secure Multiparty Computation
In this work, we initiate the study of bottleneck complexity as a new communication efficiency measure for secure multiparty computation (MPC). Roughly, the bottleneck complexity of an MPC protocol is defined as the maximum communication complexity required by any party within the protocol execution.
We observe that even without security, bottleneck communication complexity is an interesting measure of communication complexity for (distributed) functions and propose it as a fundamental area to explore. While achieving O(n) bottleneck complexity (where n is the number of parties) is straightforward, we show that: (1) achieving sublinear bottleneck complexity is not always possible, even when no security is required. (2) On the other hand, several useful classes of functions do have o(n) bottleneck complexity, when no security is required.
Our main positive result is a compiler that transforms any (possibly insecure) efficient protocol with fixed communication-pattern for computing any functionality into a secure MPC protocol while preserving the bottleneck complexity of the underlying protocol (up to security parameter overhead). Given our compiler, an efficient protocol for any function f with sublinear bottleneck complexity can be transformed into an MPC protocol for f with the same bottleneck complexity.
Along the way, we build cryptographic primitives - incremental fully-homomorphic encryption, succinct non-interactive arguments of knowledge with ID-based simulation-extractability property and verifiable protocol execution - that may be of independent interest
- …