A Note on the Computational Complexity of Unsmoothened Vertex Attack Tolerance
نویسنده
چکیده
We have previously introduced vertex attack tolerance (VAT) and unsmoothened VAT (UVAT), denoted respectively as τ(G) = minS⊂V |S| |V−S−Cmax(V−S)|+1 and τ̂(G) = minS⊂V |S| |V−S−Cmax(V−S)| , where Cmax(V − S) is the largest connected component in V − S, as appropriate mathematical measures of resilience in the face of targeted node attacks for arbitrary degree networks. Here we prove the hardness of approximating τ̂ under various plausible computational complexity hypotheses. 1. Definitions and Preliminaries Given a connected, undirected graph G = (V,E), the Vertex Attack Tolerance of G is denoted by τ(G) defined as follows:[3, 7, 2] τ(G) = min S⊂V,S 6=∅ { |S| |V − S −Cmax(V − S)|+ 1 } where Cmax(V −S) is the largest connected component in V −S. As in [2], we refer to connected, undirected graphs G = (V,E) with more than one node (|V | ≥ 2) as non-trivial. Remark 1.1. [2] For nontrivial G = (V,E), 0 < τ(G) ≤ 1. VAT was originally introduced as τ̂ (UVAT for “unsmoothened VAT”), of which τ is a smoothened variation, defined as follows[3, 7]: τ̂ = min S⊂V,S 6=∅ { |S| |V − S − Cmax(V − S)| } where Cmax(V −S) is the largest connected component in V −S. Note that for any graph G = (V,E) such that G is not a clique, the pair of nodes u, v Preprint submitted to arXiv March 29, 2016
منابع مشابه
On the computational complexity of finding a minimal basis for the guess and determine attack
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...
متن کاملBiclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity
In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...
متن کاملA note on the security of two improved RFID protocols
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
متن کاملReduction of Computational Complexity in Finite State Automata Explosion of Networked System Diagnosis (RESEARCH NOTE)
This research puts forward rough finite state automata which have been represented by two variants of BDD called ROBDD and ZBDD. The proposed structures have been used in networked system diagnosis and can overcome cominatorial explosion. In implementation the CUDD - Colorado University Decision Diagrams package is used. A mathematical proof for claimed complexity are provided which shows ZBDD ...
متن کاملk-Efficient partitions of graphs
A set $S = {u_1,u_2, ldots, u_t}$ of vertices of $G$ is an efficientdominating set if every vertex of $G$ is dominated exactly once by thevertices of $S$. Letting $U_i$ denote the set of vertices dominated by $u_i$%, we note that ${U_1, U_2, ldots U_t}$ is a partition of the vertex setof $G$ and that each $U_i$ contains the vertex $u_i$ and all the vertices atdistance~1 from it in $G$. In this ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1603.08430 شماره
صفحات -
تاریخ انتشار 2016