Robustly Self-Ordered Graphs: Constructions and Applications to Property Testing

A graph G is called self-ordered (a.k.a asymmetric) if the identity permutation is its only automorphism. Equivalently, there is a unique isomorphism from G to any graph that is isomorphic to G. We say that G = (V,E) is robustly self-ordered if the size of the symmetric difference between E and the edge-set of the graph obtained by permuting V using any permutation π : V → V is proportional to the number of non-fixed-points of π. We show that robustly self-ordered bounded-degree graphs exist (in abundance), and that they can be constructed efficiently, in a strong sense. Specifically, given the index of a vertex in such a graph, it is possible to find all its neighbors in polynomial-time (i.e., in time that is poly-logarithmic in the size of the graph). We provide two very different constructions, in tools and structure. The first, a direct construction, is based on proving a sufficient condition for robust self-ordering, which requires that an auxiliary graph, on pairs of vertices of the original graph, is expanding. In this case the original graph is (not only robustly self-ordered but) also expanding. The second construction proceeds in three steps: It boosts the mere existence of robustly self-ordered graphs, which provides explicit graphs of sublogarithmic size, to an efficient construction of polynomial-size graphs, and then, repeating it again, to exponential-size (robustly self-ordered) graphs that are locally constructible. This construction can yield robustly self-ordered graphs that are either expanders or highly disconnected, having logarithmic size connected components. We also consider graphs of unbounded degree, seeking correspondingly unbounded robustness parameters. We again demonstrate that such graphs (of linear degree) exist (in abundance), and give an explicit construction. This turns out to require very different tools, and the definition and constructions of new pseudo-random objects. Specifically, we show that the construction of such graphs reduces to the construction of non-malleable two-source extractors with very weak parameters but with an additional natural feature. Next, we reduce the construction of such non-malleable two-source extractors to the construction of “relocation-detecting” codes. Loosely speaking, in such code permuting arbitrarily the coordinates of a random codeword yields a string that is far any other codeword. We conclude by showing how to construct relocation-detecting codes (of various types, including ones with constant rate). We demonstrate that robustly self-ordered bounded-degree graphs are useful towards obtaining lower bounds on the query complexity of testing graph properties both in the bounded-degree and the dense graph models. Indeed, their robustness offers efficient, local and distance preserving reductions from testing problems on ordered structures (like sequences) to the unordered (effectively unlabeled) graphs. One of the results that we obtain, via such a reduction, is a subexponential separation between the complexities of testing and tolerant testing of graph properties in the bounded-degree graph model. The authors’ affiliation and grant acknowledgements apear in the Acknowledgements section.

[1]  Alexander Lubotzky,et al.  Discrete groups, expanding graphs and invariant measures , 1994, Progress in mathematics.

[2]  Venkatesan Guruswami,et al.  Non-malleable Coding Against Bit-Wise and Split-State Tampering , 2013, Journal of Cryptology.

[3]  Béla Bollobás,et al.  THE ASYMPTOTIC NUMBER OF UNLABELLED REGULAR GRAPHS , 1982 .

[4]  Oded Goldreich On Testing Hamiltonicity in the Bounded Degree Graph Model , 2020, Electron. Colloquium Comput. Complex..

[5]  László Babai,et al.  Graph isomorphism in quasipolynomial time [extended abstract] , 2015, STOC.

[6]  Oded Goldreich,et al.  Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..

[7]  David Ellis,et al.  The expansion of random regular graphs , 2011 .

[8]  N. Linial,et al.  Expander Graphs and their Applications , 2006 .

[9]  Benny Sudakov,et al.  On the asymmetry of random regular graphs and random graphs , 2002, Random Struct. Algorithms.

[10]  Dana Ron,et al.  Property testing and its connection to learning and approximation , 1998, JACM.

[11]  Omer Reingold,et al.  Assignment testers: towards a combinatorial proof of the PCP-theorem , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[12]  Svante Janson,et al.  Permutation Pseudographs and Contiguity , 2002, Combinatorics, Probability and Computing.

[13]  Ronitt Rubinfeld,et al.  Robust Characterizations of Polynomials with Applications to Program Testing , 1996, SIAM J. Comput..

[14]  Oded Goldreich,et al.  Introduction to Property Testing , 2017 .

[15]  Kenji Obata,et al.  A lower bound for testing 3-colorability in bounded-degree graphs , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[16]  Lance Fortnow,et al.  Tolerant versus intolerant testing for Boolean properties , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[17]  M. Murty Ramanujan Graphs , 1965 .

[18]  Eli Ben-Sasson,et al.  Robust PCPs of Proximity, Shorter PCPs, and Applications to Coding , 2004, SIAM J. Comput..

[19]  B. Bollobás Distinguishing Vertices of Random Graphs , 1982 .

[20]  László Babai,et al.  Graph isomorphism in quasipolynomial time [extended abstract] , 2016, STOC.

[21]  G. David Forney,et al.  Concatenated codes , 2009, Scholarpedia.

[22]  P. Erdös ASYMMETRIC GRAPHS , 2022 .

[23]  B. Abdolmaleki Non-Malleable Codes , 2017 .

[24]  Dana Ron,et al.  Property Testing in Bounded Degree Graphs , 2002, STOC '97.

[25]  Yevgeniy Dodis,et al.  Non-malleable extractors and symmetric key cryptography from weak secrets , 2009, STOC '09.

[26]  Y. Cho,et al.  Discrete Groups , 1994 .

[27]  Oded Goldreich,et al.  Hierarchy Theorems for Property Testing , 2011, computational complexity.

[28]  J. Bourgain,et al.  Uniform expansion bounds for Cayley graphs of SL2(Fp) , 2008 .

[29]  Vipul Goyal,et al.  Non-malleable extractors and codes, with their many tampered extensions , 2015, IACR Cryptol. ePrint Arch..

[30]  Ronitt Rubinfeld,et al.  Tolerant property testing and distance approximation , 2006, J. Comput. Syst. Sci..

[31]  Oded Goldreich,et al.  Every set in P is strongly testable under a suitable encoding , 2018, Electron. Colloquium Comput. Complex..

[32]  Eugene M. Luks,et al.  Isomorphism of graphs of bounded valence can be tested in polynomial time , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).

[33]  Avi Wigderson,et al.  Non-adaptive vs Adaptive Queries in the Dense Graph Testing Model , 2020, Electron. Colloquium Comput. Complex..