Being Corrupt Requires Being Clever, But Detecting Corruption Doesn't

We consider a variation of the problem of corruption detection on networks posed by Alon, Mossel, and Pemantle '15. In this model, each vertex of a graph can be either truthful or corrupt. Each vertex reports about the types (truthful or corrupt) of all its neighbors to a central agency, where truthful nodes report the true types they see and corrupt nodes report adversarially. The central agency aggregates these reports and attempts to find a single truthful node. Inspired by real auditing networks, we pose our problem for arbitrary graphs and consider corruption through a computational lens. We identify a key combinatorial parameter of the graph $m(G)$, which is the minimal number of corrupted agents needed to prevent the central agency from identifying a single corrupt node. We give an efficient (in fact, linear time) algorithm for the central agency to identify a truthful node that is successful whenever the number of corrupt nodes is less than $m(G)/2$. On the other hand, we prove that for any constant $\alpha > 1$, it is NP-hard to find a subset of nodes $S$ in $G$ such that corrupting $S$ prevents the central agency from finding one truthful node and $|S| \leq \alpha m(G)$, assuming the Small Set Expansion Hypothesis (Raghavendra and Steurer, STOC '10). We conclude that being corrupt requires being clever, while detecting corruption does not. Our main technical insight is a relation between the minimum number of corrupt nodes required to hide all truthful nodes and a certain notion of vertex separability for the underlying graph. Additionally, this insight lets us design an efficient algorithm for a corrupt party to decide which graphs require the fewest corrupted nodes, up to a multiplicative factor of $O(\log n)$.

[1]  Jie Xu,et al.  Sequentially t-Diagnosable Systems: A Characterization and Its Applications , 1995, IEEE Trans. Computers.

[2]  Odd-Helge Fjeldstad,et al.  Fighting Fiscal Corruption: Lessons From the Tanzania Revenue Authority , 2003 .

[3]  Gregory F. Sullivan,et al.  A Polynomial Time Algorithm for Fault Diagnosability , 1984, FOCS.

[4]  Prasad Raghavendra,et al.  Reductions between Expansion Problems , 2010, 2012 IEEE 27th Conference on Computational Complexity.

[5]  Euiwoong Lee,et al.  Partitioning a graph into small pieces with applications to path transversal , 2016, Mathematical Programming.

[6]  Toniann Pitassi,et al.  Inapproximability of Treewidth, One-Shot Pebbling, and Related Layout Problems , 2011, APPROX-RANDOM.

[7]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[8]  Euiwoong Lee Partitioning a graph into small pieces with applications to path transversal , 2017, SODA 2017.

[9]  S. Louis Hakimi,et al.  On Models for Diagnosable Systems and Probabilistic Fault Diagnosis , 1976, IEEE Transactions on Computers.

[10]  Sudhakar M. Reddy,et al.  Distributed fault-tolerance for large multiprocessor systems , 1980, ISCA '80.

[11]  Walid Ben-Ameur,et al.  The k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}-separator problem: polyhedra, complexity and ap , 2014, Journal of Combinatorial Optimization.

[12]  John R. Gilbert,et al.  Approximating Treewidth, Pathwidth, Frontsize, and Shortest Elimination Tree , 1995, J. Algorithms.

[13]  S. Louis Hakimi,et al.  Characterization of Connection Assignment of Diagnosable Systems , 1974, IEEE Transactions on Computers.

[14]  Subhash Khot,et al.  On the power of unique 2-prover 1-round games , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.

[15]  Jeroen H. G. C. Rutten,et al.  Disconnecting graphs by removing vertices: a polyhedral approach , 2007 .

[16]  Richard P. Nielsen,et al.  "Corruption Networks and Implications For Ethical Corruption Reform" , 2003 .

[17]  Gerald M. Masson,et al.  An 0(n2.5) Fault Identification Algorithm for Diagnosable Systems , 1984, IEEE Transactions on Computers.

[18]  Tiko Kameda,et al.  A Diagnosing Algorithm for Networks , 1975, Inf. Control..

[19]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[20]  GERNOT METZE,et al.  On the Connection Assignment Problem of Diagnosable Systems , 1967, IEEE Trans. Electron. Comput..

[21]  Simon Mukwembi,et al.  Corruption and its detection: a graph-theoretic approach , 2017, Comput. Math. Organ. Theory.

[22]  Noga Alon,et al.  Corruption Detection on Networks , 2015, ArXiv.

[23]  Prasad Raghavendra,et al.  Graph expansion and the unique games conjecture , 2010, STOC '10.