Keywords

1 Introduction

Similarly to classical complexity theory, studying the verification complexity of various problems is one of the major approaches in the quest to understand the complexity of network tasks. The basic idea, proposed by Korman et al. [22] under the name Proof-Labeling Schemes (PLS for short), is to assume that an oracle assigns a label to each node, so that by exchanging these labels, the nodes can collectively verify that a certain global predicate holds (see Sect. 2 for details). The verification complexity of a predicate \(\pi \) is defined to be the minimal label length which suffices to verify \(\pi \). This node-centric, space-based view was generalized in subsequent work, in which it was allowed for nodes to send different messages to different neighbors, rather than the whole local label to all neighbors. Specifically, in [5] the verification complexity is defined to be the minimal message-length required to verify the given predicate.

The distinction between these two models is natural and appears in other contexts as well, like the broadcast and the unicast flavors of congested clique, proposed by Drucker et al. [9]: in the unicast flavor, a node may send a different message to each of its neighbors, while in the broadcast flavor, all neighbors receive the same message. Following up on this model, Becker et al. [6] proposed considering a spectrum of congested clique models, where a node may send up to r distinct messages in a round, where \(1\le r<n\) is a given parameter. This model, called henceforth \(\textsc {mcast}(r)\), can be motivated by observing that r can be viewed as the number of network interfaces (NICs) a node possesses: Each interface may be connected to a subset of the neighbors, and it can send only a single message at a time.

Our Results. In this paper we present a few preliminary results concerning PLS in the \(\textsc {mcast}(r)\) model. Our main focus is on the tradeoff between the number r of different messages a node can send in one round and the verification complexity (message length) \(\kappa \). While there are problems whose verification complexity is independent of r, we prove that the verification complexity of some fundamental problems is highly dependent on r. First, we consider the problem of matching verification (mv), where every node has at most one incident edge marked, and the goal is to verify whether the set of marks implies a well defined matching, i.e., an edge is either marked in both endpoints or unmarked in both, and that this set is a matching. In [19], among other results, it is shown that maximal matching has verification complexity \(\varTheta (1)\), and that the verification complexity of maximum matching in bipartite graphs is also \(\varTheta (1)\). These results implicitly assume that the subset of edges is well defined; our results show that in fact, the main difficulty is in ensuring that both endpoints of an edge agree on its status. This motivates our next problem that focuses on consistency. Specifically, we define the primitive problem edge agreement (ea) as follows. Each node has a b-bit string for each incident edge, and a state is considered legal iff both endpoints of each edge agree on the string associated with that edge. It turns out that the arboricity of the graph, denoted \(\alpha (G)\), plays an important role in the verification complexity of \({\textsc {ea}}\) (and all problems that \({\textsc {ea}}\) can locally be reduced to). In Theorem 2, we prove that \(\kappa ({\textsc {ea}})\cdot r\in \varTheta (\alpha (G)b)\). Next, as a more sophisticated example, we consider the important problem of maximum flow (mf): In Theorem 3 we show that \(\kappa ({\textsc {mf}})\cdot r\in \varTheta (\alpha (G)\log f_{\max })\), where \(f_{\max }\) is the largest flow value over an edge. In [22], a scheme in the broadcast model to verify that the maximum flow between a given pair of nodes s and t is exactly k is given, with complexity \(O(k(\log k+\log n))\). We prove, in Theorem 4, that the verification complexity of this problem in the broadcast model is \(O(\min \left\{ \alpha (G),k\right\} (\log k+\log \varDelta ))\), which is an exponential improvement in some cases. In addition, our upper bound scales linearly with r in the \(\textsc {mcast}(r)\) model.

We also consider the congested clique model. To date, no lower bounds on the verification complexity in the congested clique were known. We show that the known technique of crossing [5] can be applied, but only in broadcast clique (i.e., \(\textsc {mcast}(1)\)). We use this argument, along with a new scheme, to obtain a tight \({\varTheta (\log n + \log w_{\max })}\) bound for MST verification in broadcast cliques, where \(w_{\max }\) denotes the largest edge weight.

We note that all results translate to randomized PLS [5]. Details of the general connection between the deterministic and randomized verification complexity can be found in the full version [26].

Related Work. Drucker et al. [9] propose a local broadcast communication in the congested clique, where every node broadcasts a message to all other nodes in each round. Becker et al. [6] proposed, still for congested cliques, a bounded number r of different messages a node can send in each round.

Verification of a given property in decentralized systems finds applications in various domains, such as, checking the result obtained from the execution of a distributed program [4, 17], establishing lower bounds on the time required for distributed approximation [8], estimating the complexity of logic required for distributed run-time verification [18], general distributed complexity theory [16], and self stabilizing algorithms [7, 21].

The notion of distributed verification in a single round was introduced by Korman et al. in [22]. The verification complexity of minimum spanning-trees (MST) was studied in [20]. Constant-round schemes were studied in [19]. Verification processes in which the global result is not restricted to be the logical conjunction of local outputs had been studied in [2, 3]. The role of unique node identifiers in local decision and verification was extensively studied in [13,14,15]. Proof-labeling schemes in directed networks were studied in [11], where both one-way and two-way communication over directed edges is considered. Verification schemes for dynamic networks, where edges may appear or disappear after label assignment and before verification, are studied in [12]. Recently, a hierarchy of local decision as an interaction between a prover and a disprover was presented in [10].

Paper Organization. The remainder of this paper is organized as follows. In Sect. 2 we formalize the model and recall some graph-theoretic concepts. In Sect. 3 we present two general techniques that apply to the \(\textsc {mcast}(r)\) model. In Sect. 4 we present results for verification of matching, edge agreement, and max-flow. In Sect. 5 we present our results for congested cliques. We conclude in Sect. 6 with some open questions and directions for future work. Many proofs are omitted due to space limitation. They can be found in the full version of the paper [26].

2 Model and Preliminaries

Computational Framework and the mcast Model. Our model is derived from the CONGEST model [27]. Briefly, a distributed network is modeled as a connected undirected graph \(G=(V,E)\), where V is the set of nodes, E is the set of edges, and every node has a unique identifier. In each synchronous round every node performs a local computation, sends a message to each of its neighbors, and receives messages from all neighbors. We denote the number of nodes |V| by n and the number of edges |E| by m. For every node \(v\in V\), let d(v) be the degree of v. We denote by \(\varDelta (G)\) the maximal degree of a node in G. We assume that the edges incident to a node v are numbered \(1,\dots ,d(v)\).

The main difference between the model considered in this paper, called \(\textsc {mcast}(r)\), and CONGEST, is that in \(\textsc {mcast}(r)\) we are given a parameter \(r\in \mathbb {N}\) such that a node may send at most r distinct messages simultaneously. More precisely, we assume that prior to sending messages, the neighbors of a node are partitioned into r disjoint subsets (some of which may be empty), such that v sends the same message to all neighbors in a subset. We emphasize that in our model, for simplicity, r is a uniform parameter for all nodes.

Proof-Labeling Schemes in the mcast Model. A configuration \(G_s\) includes an underlying graph \(G=(V,E)\) and a state assignment function \(s:V\rightarrow S\), where S is a (possibly infinite) state space. The state of a node v, denoted s(v), includes all local input to v. In particular, the state usually includes a unique node identity \(\mathrm {ID}(v)\) and, in the case of weighted graphs, the weight w(e) of each incident edge e. The state of v typically include additional data whose integrity we would like to verify. For example, node state may contain a marking of incident edges, such that the set of marked edges constitutes a spanning tree.

Let \(\mathcal{F}\) be a family of configurations, and let \(\mathcal{P}\) be a boolean predicate over \(\mathcal{F}\). A proof-labeling scheme consists of two conceptual components: a prover \({\mathbf {p}} \), and a verifier \({\mathbf {v}} \). The prover is an oracle which, given any configuration \(G_s\in \mathcal{F}\) satisfying \(\mathcal{P}\), assigns a bit string \(\ell (v)\) to every node v, called the label of v. The verifier is a distributed algorithm running at every node. At each node v, the local verifier takes as input the state s(v) of v, its label \(\ell (v)\) and based on them sends messages to all neighbors. Then, using as input the messages received from the neighbors, the local state and the local label, the local verifier computes a boolean value. If the outputs are \(\textsc {true} \) at all nodes, the global verifier \({\mathbf {v}} \) is said to accept the configuration, and otherwise (i.e., at least one local verifier outputs \(\textsc {false} \)), \({\mathbf {v}} \) is said to reject the configuration. For correctness, a proof-labeling scheme \(\varSigma =({\mathbf {p,v}})\) for \((\mathcal{F},\mathcal{P})\) must satisfy the following requirements, for every \(G_s\in \mathcal{F}\):

  • If \(\mathcal{P}(G_s)=\textsc {true} \) then, using the labels assigned by \({\mathbf {p}} \), the verifier \({\mathbf {v}} \) accepts \(G_s\).

  • If \(\mathcal{P}(G_s)=\textsc {false} \) then, for every label assignment, the verifier \({\mathbf {v}} \) rejects \(G_s\).

Given a configuration \(G_s\), we denote by \(\mathbf {c}_\varSigma (G_s)\) the vector of length |E| that contains the messages sent according to the scheme \(\varSigma \), and we refer to this vector as the communication pattern of \(\varSigma \) over \(G_s\). For an underlying graph G, we denote by L(G) the number of legal configurations of G, and by \(W_\varSigma (G)\) the number of different communication patterns of \(\varSigma \) in G, over all legal configurations. In our analysis, given an edge \((v,u)\in E\), we denote by \(M_v(e)\) the message over e from v to u.

Our central measure for PLSs is its verification complexity, defined as follows.

Definition 1

The verification complexity of a proof labeling scheme \(\varSigma =({\mathbf {p,v}})\) for the predicate \(\mathcal{P}\) over a family of configurations \(\mathcal{F}\) is the maximal length of a message generated by the verifier \({\mathbf {v}}\) based on the labels assigned to the nodes by the prover \({\mathbf {p}}\) in a configuration \(G_s\) for which \(\mathcal{P}(G_s)=\textsc {true} \).

In this paper we consider PLSs in the \(\textsc {mcast}(r)\) model, namely we impose the additional restriction that at most r distinct messages may be sent by a node.

Arboricity, Degeneracy and Average Degree. The average degree of a graph plays a central role in our study. However, graphs may have dense and sparse regions. We therefore use the following refined concepts.

Definition 2

The arboricity of a graph \(G=(V,E)\), denoted by \(\alpha (G)\), is defined as the minimum number of acyclic subsets of edges that cover E. The degeneracy of a graph G, denoted by \(\delta (G)\), is defined as the smallest value i such that the edges of G can be oriented to form a directed acyclic graph with out-degree at most i.

The following properties are well known [24, 25].

Lemma 1

For all graphs G, \(\alpha (G)\le \delta (G)<2\alpha (G)\).

Lemma 2

For a given graph \(G=(V,E)\), \(\alpha (G)=\max \Big \{\left\lceil m_H\over n_H-1 \right\rceil \mid V_H\subseteq V,|V_H|\ge 2\Big \}\), where \(m_H=|E_H|\) and \({n_H=|V_H|}\) over all induced subgraphs \(H=(V_H,E_H)\) of G.Footnote 1

Note that by Lemmas 1 and 2, the minimal number of outgoing edges in the best orientation of a graph G is proportional to the maximal average degree over all induced subgraphs of G.

3 Techniques for the MCAST Model

In this work, we consider problems expressible as a conjunction of edge predicates, where a node may have a different input for every edge. We present two techniques that can be used as building blocks in the design of efficient PLSs in the \(\textsc {mcast}\) model.

The first technique, which we call minimizing orientation, reduces the number of incident edges a node sends its input on. We orient the edges such that the maximum out degree is minimized. Lemma 1 ensures that the maximum out degree is bounded by \(2\alpha \). Using a minimizing orientation, we can prove the following lemma.

Lemma 3

Suppose that a verification problem \((\mathcal{F},\mathcal{P})\) is expressible as a conjunction of edge predicates, each involving variables from a single pair of neighbors. Then there exists a PLS \(\varSigma =({\mathbf {p,v}})\) for \((\mathcal{F},\mathcal{P})\) in the \(\textsc {mcast}(2\alpha )\) model with verification complexity k, where k is the length of the largest local input to an edge predicate.

Color Addressing. In the unicast model, each node receives its own message. However, if we want to use a unicast PLS in the \(\textsc {mcast}(r)\) model with \(r<2\alpha \), we may need to bundle together a few messages, and hence we need to somehow tag each part of the message with its intended recipient. Clearly this can be done by tagging each sub-message by the unique ID of recipient, but this adds \(\varTheta (\log n)\) bits to each sub-message. The color addressing technique reduces this overhead to \(O(\log \varDelta )\). The idea is that each node need only distinguish between its neighbors.Footnote 2 We solve this difficulty by coloring the nodes so that no two neighbors of a node get the same color. Formally, color addressing is a PLS \(\varSigma _{COL}=({\mathbf {p,v}})\) in the broadcast model, where the prover \({\mathbf {p}} \) first colors the nodes so that no two nodes at distance 1 or 2 receive the same color. This is possible using at most \(\varDelta ^2+\varDelta +1\in O(\varDelta ^2)\) colors, because every node has at most \(\varDelta \) neighbors and \(\varDelta ^2\) nodes at distance 2 from it. Next, the prover assigns to every incident edge of a node the color of the neighbor at the other end of the edge. The verifier \({\mathbf {v}} \) at a node v broadcasts the color assigned to v by the prover. Every node verifies that every incident edge is assigned a different color and that the color received from every edge is the color assigned by the prover to this edge.

Clearly, \(\varSigma _{COL}\) guarantees a proper coloring as desired to use for addressing, and this coloring is locally verifiable. Moreover, since a color can be represented using \(O(\log \varDelta )\) bits, we obtain local addressing with verification complexity \(O(\log \varDelta )\) in the broadcast model. We summarize in the following lemma.

Lemma 4

\(\varSigma _{COL}\) is a PLS in the broadcast model, which assigns and verifies an \(O(\log \varDelta )\)-bit coloring for proper addressing. The verification complexity of \(\varSigma _{COL}\) is \(O(\log \varDelta )\).

4 Verification Complexity Trade-Offs in the MCAST(r) Model

In this section, we study the effect of r on the verification complexity of PLSs in the \(\textsc {mcast}(r)\) model. We start with the observation that for some problems, the asymptotic verification complexity is independent of r. These problems include the deterministic verification of a spanning-tree and vertex bi-connectivity, and the randomized verification of an MST. For each of these problems, we provide a scheme for \(r=1\) with verification complexity that matches the lower bound for \(r=\varDelta \) [5, 22]. In contrast, there are problems for which the verification complexity is sensitive to r. Specifically, we present a tight bound for the matching verification problem in the broadcast model, which is reduced dramatically even for \(r=2\). Finally, we show tight bounds for the primitive problem of edge agreement and the more sophisticated application of maximum flow, which scales linearly with r.

4.1 Verification of Matchings

In the literature, in verification problems of the form “does a subset of edges satisfy a specified property,” it is usually assumed that the subset of edges is well defined, i.e., for every edge \(e=(u,v)\), the local state of v indicates that e is in the subset if and only if the local state of u indicates it. However, since edges do not have storage, an edge set is actually represented by the local state at the nodes, and hence consistency between neighbors is not always guaranteed.

In fact, there are problems for which the verification of consistency is the dominant factor of the verification complexity. In particular, consider matching problems: maximal matching, and maximum matching in bipartite graphs. Both problems are known to have constant verification complexity [19]. However, these results make the problematic assumption that the edge set in question is well defined. We consider the matching verification problem using the following definition.

Definition 3

(Matching Verification ( MV )).

Instance: At each node v, at most one edge is marked. We use \(I_v(e)\in \left\{ \textsc {true},\textsc {false} \right\} \) to denote whether e is marked in v.

Question: Is the set M of marked edges well defined, i.e., \(I_v(e)=I_u(e)\) for every edge \(e=(u,v)\in E\), and M is a matching?

We argue that in the broadcast model, the verification complexity of this problem is \(\varTheta (\log \varDelta )\). Formally, we study the problem \((\mathcal{F}_{m},{\textsc {mv}})\), where \(\mathcal{F}_{m}\) is the family of connected configurations with edge indication at each node. We obtain the following result.

Theorem 1

The verification complexity of \((\mathcal{F}_{m},{\textsc {mv}})\) in the broadcast model is \(\varTheta (\log \varDelta )\).

For the lower bound, we construct a set of configurations that must have different communication patterns. The large number of configurations implies the lower bound on message length. We use color addressing for the upper bound.

The result above says that in the broadcast model, the verification complexity of the maximal matching problem and the maximum matching in bipartite graphs is dominated by the consistency verification. Observe that in the \(\textsc {mcast}(2)\) model, the verification complexity of \((\mathcal{F}_{m},{\textsc {mv}})\) is O(1), by letting every node v send on every edge \(e=(v,u)\) the bit \(I_v(e)\): only two types of messages are needed!

We also note that for the problem of maximum matching in cycles, the asymptotic verification complexity is unchanged if we must verify consistency, since the verification complexity of this problem in the broadcast model is \(\varTheta (\log n)\) [19].

4.2 The Edge Agreement Problem

Motivated by the results for matching verification, we now formalize and study the fundamental problem of consistency across edges.

Definition 4

(b-bit Edge Agreement (EA\(_{\mathbf {b}}\))).

Instance: Each node v holds in its state a b-bit string \(B_v(e)\) for each incident edge e.

Question: Is \(B_v(e)=B_u(e)\) for every edge \(e=(u,v)\in E\)?

Let \(\mathcal{F}\) be the family of all configurations, and let \(\alpha \) denote the arboricity of the graph. Our first main result is the following tight trade-off between r (the number of different messages for a node) and verification complexity of \({\textsc {ea}}_b\).

Theorem 2

Let \(b\in \varOmega (\log \varDelta )\). For every \(1\le r \le \min \left\{ \varDelta ,2^{b/4}\right\} \), the verification complexity of \((\mathcal{F},{\textsc {ea}}_b)\) in the \(\textsc {mcast}(r)\) model is \(\varTheta (\left\lceil \frac{\alpha }{r} \right\rceil b)\).

This theorem states both an upper and a lower bound. We start with the lower bound.

Lemma 5

For every \(1\le r \le \min \left\{ \varDelta ,2^{b/4}\right\} \), the verification complexity of any PLS for \((\mathcal{F},{\textsc {ea}}_b)\) in the \(\textsc {mcast}(r)\) model is \(\varOmega ((\frac{\alpha }{r}+1)b)\).

To prove Lemma 5, we prove the following claim.

Claim

Let \(G=(V,E)\) be a graph, let \(1\le r \le \min \left\{ \varDelta ,2^{b/4}\right\} \) and consider a PLS for \((\mathcal{F},{\textsc {ea}}_b)\) in the \(\textsc {mcast}(r)\) model. For every induced subgraph \(H=(V_H,E_H)\) of G, \(W_\varSigma (H) \ge L(H)\).

Proof of Lemma

5: It is known that the non-deterministic two-party communication complexity of verifying the equality (\(\mathrm {EQ}\)) of b-bit strings is \(\varOmega (b)\) [23, Example 2.5]. Simulating a verification scheme for \((\mathcal{F},{\textsc {ea}}_b)\) on a network of one edge, is a correct non-deterministic two-party communication protocol for \(\mathrm {EQ}\). Therefore, \(\varOmega (b)\) is a lower bound for \((\mathcal{F},{\textsc {ea}}_b)\).

We now prove that \(\varOmega (\frac{\alpha }{r}b)\) is also a lower bound for \((\mathcal{F},{\textsc {ea}}_b)\). Let \(G_s\in \mathcal{F}\) be a configuration with an underlying graph \(G=(V,E)\), and let \(H=(V_H,E_H)\) be the densest induced subgraph of G, i.e., \({m_H/n_H\ge m_{H'}/n_{H'}}\) for every \(V_H'\subseteq V\). By Lemma 2, \(\alpha =\lceil m_H/(n_H-1)\rceil \). W.l.o.g., let \(V_H=\{v_1,\ldots ,v_{n_H}\}\), and let \({d_H(v_i)=|\{(v_i,v_j)\in E_H\}|}\) be the degree of node \(v_i\) in H.

We now show that for \(1\le r \le \min \left\{ \varDelta ,2^{b/4}\right\} \) and any scheme \(\varSigma \) for \((\mathcal{F},{\textsc {ea}}_b)\) with verification complexity \(\kappa <\frac{\alpha b}{4r}-2\) in the \(\textsc {mcast}(r)\) model, it holds that \(W_\varSigma (H)<L(H)\). Let \(\varSigma \) be such a verification scheme. Then

$$\begin{aligned} W_\varSigma (H)&\le \prod _{i=1}^{n_H} \left[ \genfrac(){0.0pt}0{2^\kappa }{r}\cdot r^{d_H(v_i)}\right] \end{aligned}$$
(1)
$$\begin{aligned}&\le \left( \frac{2^\kappa \cdot e}{r}\right) ^{rn_H}\cdot r^{2m_H}\end{aligned}$$
(2)
$$\begin{aligned}&< 2^{\alpha b n_H/4}\cdot r^{2m_H} \end{aligned}$$
(3)
$$\begin{aligned}&\le 2^{\frac{b}{2}m_H}\cdot r^{2m_H} \end{aligned}$$
(4)
$$\begin{aligned}&\le 2^{bm_H} = L(H). \end{aligned}$$
(5)

Inequality (1) is true since for every PLS in the \(\textsc {mcast}(r)\) model with verification complexity \(\kappa \), every communication pattern can be constructed by letting each node \(v_i\) choose r different messages of size \(\kappa \) each, and for each of its \(d_H(v_i)\) neighbors, let it choose one of the r messages to send. Inequality (2) is due to the fact that \({x\atopwithdelims ()y}\le (\frac{x\cdot e}{y})^y\) for \(x,y\ge 0\). Inequality (3) follows from our assumption that \(\kappa <\frac{\alpha b}{4r}-2\). Inequality (4) follows from Lemma 2 which implies that \(\alpha \le 2m_H/n_H\), and Inequality (5) from our assumption that \(r \le 2^{b/4}\).

Therefore we may conclude that if \(\kappa <\frac{\alpha b}{4r}-2\), then, by Claim 4.2, \(\varSigma \) is not a correct verification scheme for \((\mathcal{F},{\textsc {ea}}_b)\). This concludes the proof of the lower bound.

Next, we turn to the upper bound. To this end we define a more general problem as follows.

Definition 5

(b-bit Edge \(\psi \) (E\(\psi _{\mathbf {b}}\))).

Instance: Each node v holds in its state a b-bit string \(B_v(e)\) for each incident edge e.

Question: Is \(\psi _b(B_v(e),B_u(e))=\textsc {true} \) for every edge \(e=(u,v)\), where \(\psi _b\) is a given symmetric predicate of two b-bit strings, i.e., \(\psi _b:\left\{ 0,1 \right\} ^b\times \left\{ 0,1 \right\} ^b\rightarrow \left\{ \textsc {true},\textsc {false} \right\} \) and \(\psi (s,s')=\psi (s',s)\) for all \(s,s'\in \left\{ 0,1 \right\} ^b\)?

Lemma 6

For every \(1\le r < 2\alpha \), there exists a PLS for \((\mathcal{F},{\textsc {e}\psi }_b)\) in the \(\textsc {mcast}(r)\) model with verification complexity \(O(\frac{\alpha }{r}(b+\log \varDelta ))\), and for every \(2\alpha \le r \le \varDelta \), there exists a PLS for \((\mathcal{F},{\textsc {e}\psi }_b)\) in the \(\textsc {mcast}(r)\) model with verification complexity O(b).

We sketch the proof of Lemma 6. For \(1\le r < 2\alpha \), we use minimizing orientation and color addressing. The idea is to partition the outgoing edges into r groups, and send the input strings of every group in one message, indicating the color of the destination of each string. Overall, every message consists of at most \(2\alpha /r\) pairs of size \(b+O(\log \varDelta )\) each. For \(2\alpha \le r \le \varDelta \), by Lemma 3 there exists a PLS \(\varSigma '=({\mathbf {p'},\mathbf {v'}})\) for \((\mathcal{F},{\textsc {e}\psi }_b)\) in the \(\textsc {mcast}(r)\) model with verification complexity b.

\({\textsc {ea}}_b\) is a special case of \({\textsc {e}\psi }_b\), where \(\psi \) is the equality predicate. Therefore, Lemma 6 gives a tight upper bound for \((\mathcal{F},{\textsc {ea}}_b)\) for the case \(b\in \varOmega (\log \varDelta )\). This concludes the proof of Theorem 2.

We note that Theorem 2, in conjunction with the general connection between the deterministic and randomized verification complexity [26], gives the following corollary.

Corollary 1

Let \(b\in \varOmega (\log \varDelta )\). For every \(1\le r \le \min \left\{ \varDelta ,2^{b/4}\right\} \), the randomized verification complexity of \((\mathcal{F},{\textsc {ea}}_b)\) in the \(\textsc {mcast}(r)\) model is \(\varTheta (\log (\left\lceil \frac{\alpha }{r} \right\rceil b))\).

4.3 An Advanced Example: The Maximum Flow Problem

In this section we consider a more sophisticated problem, namely Maximum Flow in the context of the \(\textsc {mcast}(r)\) model. The best previously known result [22] was for verification of “k-flow”: the goal is to verify that the maximum flow between a given pair of nodes is exactly k. The verification complexity of the scheme in the broadcast model of [22] is \(O(k(\log k+\log n))\). In Theorem 4, we show an improvement of this result and a generalization to the \(\textsc {mcast}(r)\) model.

First, we solve a slightly different problem, formalized as follows. Let \(\mathcal{F}_{st}\) be the family of configurations of graphs, where a graph in \(\mathcal{F}_{st}\) has two distinct nodes denoted s and t called source and sink, respectively, and a natural number c(e) called the capacity associated with each edge e. The \({\textsc {mf}}\) problem is defined over the family of configurations \(\mathcal{F}_{st}\) as follows.

Definition 6

(Maximum Flow ( MF )).

Instance: A configuration \(G_s\in \mathcal{F}_{st}\), where each node v has an integer f(vu) for every neighbor u.

Question: Interpreting f(vu) as the amount of flow from v to u (\(f(v,u)<0\) means flow from u to v), is f a maximum flow from s to t?

Recall that f is a legal flow iff it satisfies the following three conditions (see, e.g., [1]).

  • Anti symmetry: for every \((v,u)\in E\), \(f(v,u) = -f(u,v)\).

  • Capacity compliance: for every \((v,u)\in E\), \(|f(v,u)|\le c(v,u)\).

  • Flow conservation: for every node \(v\in V\setminus \left\{ s,t \right\} \), \(\sum _{u\in V}f(v,u) = 0\).

If all three conditions hold, then, by the max-flow min-cut theorem, f is maximum iff there is a saturated cut.

We denote by \(f_{\max }\) the maximal flow amount over all edges of G (note that \(f_{\max }\) need not be polynomial in n). Also, for a bit string \(x=x_0x_1\cdots x_k\), let \(\bar{x}=\sum _{i=0}^kx_i2^i\).

Theorem 3

Let \(\log f_{\max }\in \varOmega (\log n)\). There exists a constant \(c>1\) such that for every \(1\le r \le \min \left\{ \alpha /c,\root 4 \of {f_{\max }}\right\} \), the verification complexity of \((\mathcal{F}_{st},{\textsc {mf}})\) in the \(\textsc {mcast}(r)\) model is \(\varTheta (\log (f_{\max })\alpha /r)\).

Again, we start with the lower bound.

Lemma 7

Let \(\log f_{\max }\in \varOmega (\log n)\). There exists a constant \(c>1\) such that for every \(1\le r \le \min \left\{ \alpha /c,\root 4 \of {f_{\max }}\right\} \), the verification complexity of any PLS for \((\mathcal{F}_{st},{\textsc {mf}})\) in the \(\textsc {mcast}(r)\) model is \(\varOmega (\log (f_{\max })\alpha /r)\).

We note that the counting argument used for \({\textsc {ea}}_b\) (Lemma 5) cannot be applied to this problem. To prove the lower bound for \({\textsc {mf}}\), we show a non-trivial reduction from a problem in \((\mathcal{F},{\textsc {ea}}_b)\) to a problem in \((\mathcal{F}_{st},{\textsc {mf}})\).

Lemma 8

For every \(1\le r < 2\alpha \), there exists a PLS for \((\mathcal{F}_{st},{\textsc {mf}})\) in the \(\textsc {mcast}(r)\) model with verification complexity \(O(\frac{\alpha }{r}(\log f_{\max }+\log \varDelta ))\), and for every \(2\alpha \le r \le \varDelta \), there exists a PLS for \((\mathcal{F}_{st},{\textsc {mf}})\) in the \(\textsc {mcast}(r)\) model with verification complexity \(O(\log f_{\max })\).

The scheme used in the proof of Lemma 8 consists of two parts. First, a scheme for \(\psi \) agreement, where \(\psi (x,y)\equiv \left( \overline{x}=-\overline{y}\right) \), which, we argue, is enough in order to verify that the flow is legal. The second part is verifying a saturated s-t cut. This can be done using one bit at each node.

For \(\log f_{\max }\in \varOmega (\log n)\), Lemma 8 gives a tight upper bound for \((\mathcal{F}_{st},{\textsc {mf}})\) which concludes the proof of Theorem 3.

Consider now the k-mf problem as defined in [22] over the family of configurations \(\mathcal{F}_{st}\).

Definition 7

(k-Maximum Flow (k-MF)).

Instance: A configuration \(G_s\in \mathcal{F}_{st}\).

Question: Is the maximum flow between s and t in \(G_s\) is exactly k?

We give an upper bound for \((\mathcal{F}_{st},{ k}{\text {-}}\textsc {mf})\) in the \(\textsc {mcast}(r)\) model, which generalizes and improves the previous bound.

Theorem 4

For every \(1\le r < 2\alpha \), there exists a PLS for \((\mathcal{F}_{st},{ k}{\text {-}}\textsc {mf})\) in the \(\textsc {mcast}(r)\) model, with verification complexity \(O\left( \frac{\min \left\{ \alpha ,k\right\} }{r}(\log k+\log \varDelta )\right) \), and for every \(2\alpha \le r \le \varDelta \), there exists a PLS for \((\mathcal{F}_{st},{ k}{\text {-}}\textsc {mf})\) in the \(\textsc {mcast}(r)\) model, with verification complexity \(O(\log k)\).

Proof:

In a verification scheme for \((\mathcal{F}_{st},{ k}{\text {-}}\textsc {mf})\), the prover can assign the flow values f(vu) for every edge (vu). W.l.o.g, assume that f does not contain cycles of positive flow. In this case, \(f_{\max }\le k\) and, since the flow value over each edge is an integer, the number of incident edges of every node v carrying non-zero flow is at most 2k. By Lemma 8, and the observation that it is sufficient that every node verifies the value of flow only on edges with \(f(v,u)\ne 0\), the upper bounds follow.

To be precise, the problem solved in [22] required in addition that every node holds the value k in its state. Verifying that all nodes hold the same value k is simply an additive \(\log k\) factor to message length – every node sends its value and verifies that all its neighbors have the same value. We argue in the following lemma, that \(\varOmega (\log k)\) is a lower bound for \((\mathcal{F}_{st},{ k}{\text {-}}\textsc {mf})\) verification even if k is known to all nodes.

Lemma 9

For every \(1\le k \le 2^{\varTheta (n)}\), the verification complexity of any PLS for \((\mathcal{F}_{st},{ k}{\text {-}}\textsc {mf})\) is \(\varOmega (\log k)\), even in the unicast model and for constant degree graphs.

We use a kind of crossing argument between a family of different configurations of the same structure, to show that a scheme with verification complexity less than \(\frac{\log k}{4}\) is never a correct scheme for all configurations in the constructed family. Hence, the lower bound follows.

By Theorem 4, this lower bound is tight for \(2\alpha \le r \le \varDelta \), and the following theorem holds.

Theorem 5

For every \(1\le k \le 2^{\varTheta (n)}\) and every \(2\alpha \le r \le \varDelta \), the verification complexity of \((\mathcal{F}_{st},{ k}{\text {-}}\textsc {mf})\) in the \(\textsc {mcast}(r)\) model is \(\varTheta (\log k)\).

5 Verification in Congested Cliques

In the congested clique model, the communication network is a fully connected graph over n nodes (i.e., an n-clique). Given an input graph \(G=(V,E)\) with \(n=|V|\), the nodes of G are mapped 1–1 to the nodes of the clique, and the state of each node contains a bit for each port, indicating whether the edge to that port is in E or not, and, if the edge is present and G is weighted, the weight of the edge. We assume that the part in the state that specifies whether the edge connected to this port is in E is reliable: since verification is done with respect to the given graph as input, there is no way to verify its authenticity, but only whether the combination of input and output satisfies the given predicate. Moreover, we assume that the input is consistent, in the sense that the state at node v indicates that (vu) is an edge in E (possibly with some weight w), if and only if so does the state of u (namely edge agreement on the input graph is guaranteed).

5.1 Crossing in Congested Cliques

In what follows, we say that an edge is oriented to indicate a specific order over its endpoints.

Definition 8

(Independent Edges). Let \(G=(V,E)\) be a graph and let \(e_1=(v_1,u_1)\) and \(e_2=(v_2,u_2)\) be two oriented edges of G. The edges \(e_1\) and \(e_2\) are said to be independent if and only if \(v_1,u_1,v_2,u_2\) are four distinct nodes and \((v_1,u_2),(v_2,u_1)\notin E\).

The following definition is illustrated in Fig. 1.

Definition 9

(Crossing [5]). Let \(G=(V,E)\) be a graph, let \(e_1=(v_1,u_1)\) and \(e_2=(v_2,u_2)\) be two independent oriented edges of G, and for \(i\in \left\{ 1,2\right\} \), let \(p_i\) and \(q_i\) be the port numbers of \(e_i\) at \(v_i\) and \(u_i\) respectively. The crossing of \(e_1\) and \(e_2\) in G, denoted by \(G(e_1,e_2)\), is the graph obtained from G by replacing \(e_1\) and \(e_2\) with the edges \(e'_1=(v_1,u_2)\) and \(e'_2=(v_2,u_1)\) so that \(e'_1\) connects port \(p_1\) at \(v_1\) and port \(q_2\) at \(u_2\) and \(e'_2\) connects port \(p_2\) at \(v_2\) and port \(q_1\) at \(u_1\).

Fig. 1.
figure 1

An illustration of the crossing operation on a clique network. Solid edges are input graph edges, and dashed edged are communication-only edges. (a) edges \({e_1=(v_1,u_1)}\) and \(e_2=(v_2,u_2)\) are two independent oriented edges of an input graph G. (b) the subgraph induced by nodes \(v_1,u_1,v_2\) and \(u_2\) in \(G(e_1,e_2)\).

Consider an input graph \(G=(V,E)\) in the clique, assume that \(e_1,e_2\in E\) are independent edges and let \({G(e_1,e_2)=(V,E')}\). Note that crossing a graph over a clique network does not result in a change of state: Due to the port preservation of the crossing operation, for every node \(v\in V\) and every port \(0\le i\le n-1\), the edge (vu) on port number i in G satisfies \((v,u)\in E\) if and only if the edge \((v,u')\) on port number i in \(G(e_1,e_2)\) satisfies \((v,u')\in E'\).

Whether we can prove a lower bound for verification in the congested clique for \(r>1\) is still an open question. However, for the broadcast clique model (i.e., \(r=1\)), it turns out that we can. The following lemma is the key to proving lower bounds for PLSs in the broadcast clique.

Lemma 10

Let \(\mathcal{F}\) be a family of configurations, let \(\mathcal{P}\) be a boolean predicate over \(\mathcal{F}\), and let \(\varSigma \) be a PLS for \((\mathcal{F},\mathcal{P})\) in the broadcast clique model with verification complexity \(\kappa \). Suppose that there is a configuration \(G_s\in \mathcal{F}\) such that \(\mathcal{P}(G_s)=\textsc {true} \) and G contains q pairwise independent oriented edges \(e_1,\dots ,e_q\). If \(\kappa <\frac{\log q}{2}\), then there are \(1\le i< j\le q\) such that \(G_s(e_i,e_j)\) is accepted by \(\varSigma \).

In the proof of this lemma, we show that in the broadcast clique, if verification complexity is too small, then we can apply the pigeonhole principle on the crossing of every two edges from the set. We get that there must be two edges such that the local view of all nodes is the same for the original input graph and the crossed graph. Therefore, we conclude that with the same label assignment, both configurations (original and crossed) result in the same output.

We use the following corollary of Lemma 10 to lower-bound verification complexity of broadcast clique PLSs.

Corollary 2

Let \(\mathcal{F}\) be a family of configurations, and let \(\mathcal{P}\) be a boolean predicate over \(\mathcal{F}\). If there is a configuration \(G_s\in \mathcal{F}\) satisfying that \(\mathcal{P}(G_s)=\textsc {true} \) and G contains q pairwise independent oriented edges \(e_1,\dots ,e_q\) such that for every \(1\le i< j \le q\) it holds that \(\mathcal{P}(G_s(e_i,e_j))=\textsc {false} \), then the verification complexity of any deterministic PLS for \((\mathcal{F},\mathcal{P})\) in the broadcast clique model is \(\varOmega (\log q)\).

Note that we essentially cross two pairs of edges in the crossing operation: one pair of edges in E, and one pair of edges in \(\bar{E}\). These two pairs are uniquely associated with each other in a way that if we assume a PLS in the \(\textsc {mcast}(2)\) clique model, then we would not be able to apply the pigeonhole principle even with 1-bit messages. To see why this is true, consider any set of independent oriented edges \((v_1,u_1),\dots ,(v_q,u_q)\). For every \(i\ne j\), both edges \((v_i,u_j),(v_j,u_i)\in \bar{E}\) are associated only with the pair of edges \((v_i,u_i),(v_j,u_j)\in E\). Therefore, with a PLS in the \(\textsc {mcast}(2)\) clique model, it is possible that \(M_{v_i}(u_j)\ne M_{v_j}(u_i)\) for every \(i\ne j\) independently of other pairs. Hence, the crossing of any two edges may change the local view of at least one node. Therefore, the crossing technique can not be applied for every \(r>1\) in the congested clique.

5.2 Minimum Spanning-Tree Verification

In this section we illustrate the use of Corollary 2 and prove tight bounds for the verification complexity of the Minimum Spanning-Tree (MST) problem. Recall that an MST of a weighted graph G is a spanning tree of G whose sum of all its edge-weights is minimum among all spanning trees of G. In particular, in the clique, there is a fully connected communication network, a weighted input graph \(G=(V,E,w)\) where E is a subset of communication edges, \(w:E\rightarrow \mathbb {N}\) is the edge weight assignment, and a subset \(T\subseteq E\) is specified as the MST. It is important to notice that all specifications of edge subsets are local in the sense that every node \(v\in V\) has \(n-1\) ports and in its state there is a specification for every edge \(e_i\) on port number i whether \(e_i\in E\) and whether \(e_i\in T\). According to our assumption on the clique model, the input graph G is given in a reliable way, i.e., an edge (vu) is considered by v to be in E if and only if it is considered by u to be in E. However, this consistency has to be verified for the edges of T. In addition, since the communication network is fully connected and does not depend on the input graph G, we also consider the case where G is disconnected. In this case, we define the MST as the set of minimum spanning-trees of all connected components of G.

Let \(\mathcal{F}_{{w_{\max }}}\) be the family of all weighted configurations (not necessarily connected) with maximum weight \({w_{\max }}\). Formally, if e is an edge of the underlying weighted graph of a configuration \(G_s\in \mathcal{F}_{w_{\max }}\), then \({w(e)\le w_{\max }}\). Edge weights are assumed to be known at their endpoints.

Theorem 6

The verification complexity of \((\mathcal{F}_{{w_{\max }}},\text {MST})\) in the broadcast clique model is \(\varTheta (\log n + \log {w_{\max }})\).

The lower bound is proved in two parts. To show \(\varOmega (\log n)\) we use Corollary 2 on the input graph which is a path where all the edges are in T. The crossing of every two independent edges of the path results in a graph with a cycle component, in particular, not a tree. The \(\varOmega (\log {w_{\max }})\) part is proven by a variation of the \(\varOmega (\log {w_{\max }})\) proof in [22], which holds also for the broadcast clique model. The tight upper bound is obtained by a scheme for which we give a short sketch here. The prover roots the tree and give every node a pointer to its parent. For verification, every node sends the information about the edge connecting it to its parent – \(\mathrm {ID}\)s of the endpoints and the weight of the edge. This enables every node v to collect all the tree structure, and verify that if an incident edge (vu) is not in the tree then its weight is not smaller than every edge in the unique path between v and u in the tree. If all nodes verify this property, it means that all edges are consistent with the “red rule”, i.e., the heaviest edge of every cycle is not in the MST.

6 Conclusion

In this paper we studied the \(\textsc {mcast}(r)\) model from the perspective of verification. This angle seems particularly convenient, because it involves a single round of message exchange. (If multiple rounds are allowed, one has to consider the possibility of reconfiguring the neighbor partitions: is it allowed to partition the neighbors anew in each round, and if so, at what cost?). We focus on the relation between the number of different messages of each node and the verification complexity of proof-labeling schemes. We gave tight bounds on the verification complexity of edge agreement and max flow in the \(\textsc {mcast}(r)\) model. We have shown that in the restrictive broadcast model, a well defined matching is harder to verify than the maximality of a given matching, and that it is possible to obtain lower bounds on the verification complexity in congested cliques. Many interesting questions remain open. We list a few below.

  • Develop a theory for a restricted number of interface cards (NICs). The number of NICs limits the number of messages that can be simultaneously transmitted. In this paper we looked only at a simple case of one round of communication. We believe that developing a tractable and realistic model in which the number of NICs is a parameter is an important challenge.

  • As mentioned, in multiple round algorithms, dynamic reconfigurations can be exploited to convey information. It seems that an interesting challenge would be to account for dynamic reconfigurations.

  • We considered a model in which a single parameter r is used to indicate the restriction of all nodes. What can be said about a model in which every node has its own restriction?

  • We have given examples of problems that have a linear improvement in verification complexity as a function of r, and on the other hand, we have given examples of problems that are not sensitive at all to r. Can a characterization of problems be shown, according to their sensitivity of verification complexity to r?