Kernelization Lower Bounds for Finding Constant-Size Subgraphs

被引:3
|
作者
Fluschnik, Till [1 ]
Mertzios, George B. [2 ]
Nichterlein, Andre [1 ]
机构
[1] TU Berlin, Inst Softwaretech & Theoret Informat, Berlin, Germany
[2] Univ Durham, Dept Comp Sci, Durham, England
来源
SAILING ROUTES IN THE WORLD OF COMPUTATION | 2018年 / 10936卷
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1007/978-3-319-94418-0_19
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Kernelization is an important tool in parameterized algorithmics. Given an input instance accompanied by a parameter, the goal is to compute in polynomial time an equivalent instance of the same problem such that the size of the reduced instance only depends on the parameter and not on the size of the original instance. In this paper, we provide a first conceptual study on limits of kernelization for several polynomialtime solvable problems. For instance, we consider the problem of finding a triangle with negative sum of edge weights parameterized by the maximum degree of the input graph. We prove that a linear-time computable strict kernel of truly subcubic size for this problem violates the popular APSP-conjecture.
引用
收藏
页码:183 / 193
页数:11
相关论文
共 50 条
  • [31] Transferable Constant-Size Fair E-Cash
    Fuchsbauer, Georg
    Pointcheval, David
    Vergnaud, Damien
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 226 - 247
  • [32] Short lattice signatures with constant-size public keys
    Xie, Dong
    Peng, Haipeng
    Li, Lixiang
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5490 - 5501
  • [33] Vertex Cover Kernelization Revisited: Upper and Lower Bounds for a Refined Parameter
    Jansen, Bart M. P.
    Bodlaender, Hans L.
    28TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE (STACS 2011), 2011, 9 : 177 - 188
  • [34] Traceable constant-size multi-authority credentials
    Hebant, Chloe
    Pointcheval, David
    INFORMATION AND COMPUTATION, 2023, 293
  • [35] Expressive Attribute Based Signcryption with Constant-Size Ciphertext
    Rao, Y. Sreenivasa
    Dutta, Ratna
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 398 - 419
  • [36] Lower bounds on the leaf number in graphs with forbidden subgraphs
    Mafuta, P.
    Mukwembi, S.
    Munyira, S.
    Rodrigues, B. G.
    QUAESTIONES MATHEMATICAE, 2017, 40 (01) : 139 - 149
  • [37] Efficient Hidden Vector Encryption with Constant-Size Ciphertext
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 472 - 487
  • [38] Lower bounds for the algebraic connectivity of graphs with specified subgraphs
    Stanic, Zoran
    ELECTRONIC JOURNAL OF GRAPH THEORY AND APPLICATIONS, 2021, 9 (02) : 257 - 263
  • [39] On the lower bounds of Davenport constant
    Liu, Chao
    JOURNAL OF COMBINATORIAL THEORY SERIES A, 2020, 171
  • [40] Security Analysis of a Path Validation Scheme With Constant-Size Proof
    Wu, Yangyang
    Jiang, Changsong
    Xu, Chunxiang
    Chen, Kefei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4246 - 4248