Fully-Dynamic Graph Sparsifiers Against an Adaptive Adversary

Aaron Bernstein, Jan van den Brand, Maximilian Probst Gutenberg, Danupon Nanongkai, Thatchaphol Saranurak, Aaron Sidford, He Sun

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Designing efficient dynamic graph algorithms against an adaptive adversary is a major goal in the field of dynamic graph algorithms and has witnessed many exciting recent developments in, e.g., dynamic matching (Wajc STOC'20) and decremental shortest paths (Chuzhoy and Khanna STOC'19). Compared to other graph primitives (e.g. spanning trees and matchings), designing such algorithms for graph spanners and (more broadly) graph sparsifiers poses a unique challenge since there is no fast deterministic algorithm known for static computation and the lack of a way to adjust the output slowly (known as “small recourse/replacements”). This paper presents the first non-trivial efficient adaptive algorithms for maintaining many sparsifiers against an adaptive adversary. Specifically, we present algorithms that maintain 1. a polylog(n)-spanner of size Õ(n) in polylog(n) amortized update time, 2. an O(k)-approximate cut sparsifier of size Õ(n) in Õ(n1/k) amortized update time, and 3. a polylog(n)-approximate spectral sparsifier in polylog(n) amortized update time. Our bounds are the first non-trivial ones even when only the recourse is concerned. Our results hold even against a stronger adversary, who can access the random bits previously used by the algorithms and the amortized update time of all algorithms can be made worst-case by paying sub-polynomial factors. Our spanner result resolves an open question by Ahmed et al. (2019) and our results and techniques imply additional improvements over existing results, including (i) answering open questions about decremental single-source shortest paths by Chuzhoy and Khanna (STOC'19) and Gutenberg and Wulff-Nilsen (SODA'20), implying a nearly-quadratic time algorithm for approximating minimum-cost unit-capacity flow and (ii) de-amortizing a result of Abraham et al. (FOCS'16) for dynamic spectral sparsifiers. Our results are based on two novel techniques. The first technique is a generic black-box reduction that allows us to assume that the graph is initially an expander with almost uniform-degree and, more importantly, stays as an almost uniform-degree expander while undergoing only edge deletions. The second technique is called proactive resampling: here we constantly re-sample parts of the input graph so that, independent of an adversary's computational power, a desired structure of the underlying graph can be always maintained. Despite its simplicity, the analysis of this sampling scheme is far from trivial, because the adversary can potentially create dependencies between the random choices used by the algorithm. We believe these two techniques could be useful for developing other adaptive algorithms.

    Original languageEnglish (US)
    Title of host publication49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022
    EditorsMikolaj Bojanczyk, Emanuela Merelli, David P. Woodruff
    PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
    ISBN (Electronic)9783959772358
    DOIs
    StatePublished - Jul 1 2022
    Event49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 - Paris, France
    Duration: Jul 4 2022Jul 8 2022

    Publication series

    NameLeibniz International Proceedings in Informatics, LIPIcs
    Volume229
    ISSN (Print)1868-8969

    Conference

    Conference49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022
    Country/TerritoryFrance
    CityParis
    Period7/4/227/8/22

    Keywords

    • adaptive adversary
    • dynamic graph algorithm
    • spanner
    • sparsifier

    ASJC Scopus subject areas

    • Software

    Fingerprint

    Dive into the research topics of 'Fully-Dynamic Graph Sparsifiers Against an Adaptive Adversary'. Together they form a unique fingerprint.

    Cite this