13 research outputs found
Many copies in -free graphs
For two graphs and with no isolated vertices and for an integer ,
let denote the maximum possible number of copies of in an
-free graph on vertices. The study of this function when is a
single edge is the main subject of extremal graph theory. In the present paper
we investigate the general function, focusing on the cases of triangles,
complete graphs, complete bipartite graphs and trees. These cases reveal
several interesting phenomena. Three representative results are:
(i)
(ii) For any fixed , and ,
and
(iii) For any two trees and , where
is an integer depending on and (its precise definition is
given in Section 1).
The first result improves (slightly) an estimate of Bollob\'as and Gy\H{o}ri.
The proofs combine combinatorial and probabilistic arguments with simple
spectral techniques
Thresholds and expectation-thresholds of monotone properties with small minterms
Let be a finite set, let , and let denote a random
binomial subset of where every element of is taken to belong to the
subset independently with probability . This defines a product measure
on the power set of , where for
.
In this paper we study upward-closed families for which all
minimal sets in have size at most , for some positive integer
. We prove that for such a family is a
decreasing function, which implies a uniform bound on the coarseness of the
thresholds of such families.
We also prove a structure theorem which enables to identify in
either a substantial subfamily for which the first moment
method gives a good approximation of its measure, or a subfamily which can be
well approximated by a family with all minimal sets of size strictly smaller
than .
Finally, we relate the (fractional) expectation threshold and the probability
threshold of such a family, using duality of linear programming. This is
related to the threshold conjecture of Kahn and Kalai
Unjamming Lightning: A Systematic Approach
Users of decentralized financial networks suffer from inventive security exploits. Identity-based fraud prevention methods are inapplicable in these networks, as they contradict their privacy-minded design philosophy. Novel mitigation strategies are therefore needed. Their rollout, however, may damage other desirable network properties.
In this work, we introduce an evaluation framework for mitigation strategies in decentralized financial networks. This framework allows researchers and developers to examine and compare proposed protocol modifications along multiple axes, such as privacy, security, and user experience.
As an example, we focus on the jamming attack in the Lightning Network. Lightning is a peer-to-peer payment channel network on top of Bitcoin. Jamming is a cheap denial-of-service attack that allows an adversary to temporarily disable Lightning channels by flooding them with failing payments.
We propose a practical solution to jamming that combines unconditional fees and peer reputation. Guided by the framework, we show that, while discouraging jamming, our solution keeps the protocol incentive compatible. It also preserves security, privacy, and user experience, and is straightforward to implement. We support our claims analytically and with simulations. Moreover, our anti-jamming solution may help alleviate other Lightning issues, such as malicious channel balance probing
Greedy maximal independent sets via local limits
The random greedy algorithm for finding a maximal independent set in a graph
has been studied extensively in various settings in combinatorics, probability,
computer science, and even chemistry. The algorithm builds a maximal
independent set by inspecting the graph's vertices one at a time according to a
random order, adding the current vertex to the independent set if it is not
connected to any previously added vertex by an edge.
In this paper, we present a natural and general framework for calculating the
asymptotics of the proportion of the yielded independent set for sequences of
(possibly random) graphs, involving a notion of local convergence. We use this
framework both to give short and simple proofs for results on previously
studied families of graphs, such as paths and binomial random graphs, and to
study new ones, such as random trees and random planar graphs.
We conclude our work by analysing the random greedy algorithm more closely
when the base graph is a tree. We show that in expectation, the cardinality of
a random greedy independent set in the path is no larger than that in any other
tree of the same order.Comment: 26 pages. This is an extended and revised version of a conference
version presented at the 31st International Conference on Probabilistic,
Combinatorial and Asymptotic Methods for the Analysis of Algorithms
(AofA2020
Interactive Proofs for Social Graphs
We consider interactive proofs for social graphs, where the verifier has only oracle access to the graph and can query for the neighbor of a vertex , given and . In this model, we construct a doubly-efficient public-coin two-message interactive protocol for estimating the size of the graph to within a multiplicative factor . The verifier performs queries to the graph, where is the mixing time of the graph and is the average degree of the graph. The prover runs in quasi-linear time in the number of nodes in the graph.
Furthermore, we develop a framework for computing the quantiles of essentially any (reasonable) function of vertices/edges of the graph. Using this framework, we can estimate many health measures of social graphs such as the clustering coefficients and the average degree, where the verifier performs only a small number of queries to the graph.
Using the Fiat-Shamir paradigm, we are able to transform the above protocols to a non-interactive argument in the random oracle model. The result is that social media companies (e.g., Facebook, Twitter, etc.) can publish, once and for all, a short proof for the size or health of their social network. This proof can be publicly verified by any single user using a small number of queries to the graph