Skip to main content

Relationship between Approximability and Request Structures in the Minimum Certificate Dispersal Problem

  • Conference paper
Computing and Combinatorics (COCOON 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5609))

Included in the following conference series:

  • 967 Accesses

Abstract

Given a graph G = (V,E) and a set R ⊆ V×V of requests, we consider to assign a set of edges to each node in G so that for every request (u, v) in R the union of the edge sets assigned to u and v contains a path from u to v. The Minimum Certificate Dispersal Problem (MCD) is defined as one to find an assignment that minimizes the sum of the cardinality of the edge set assigned to each node. In this paper, we give an advanced investigation about the difficulty of MCD by focusing on the relationship between its (in)approximability and request structures. We first show that MCD with general R has Θ(logn) lower and upper bounds on approximation ratio under the assumption P ≠ NP, where n is the number of nodes in G. We then assume R forms a clique structure, called Subset-Full, which is a natural setting in the context of the application. Interestingly, under this natural setting, MCD becomes to be 2-approximable, though it has still no polynomial time approximation algorithm whose factor better than 677/676 unless P = NP. Finally, we show that this approximation ratio can be improved to 3/2 for undirected variant of MCD with Subset-Full.

This work is supported in part by KAKENHI no. 19700058, 21500013 and 21680001, Asahi-glass Foundation, Inamori Foundation and Hori Information Science Promotion Foundation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alon, N., Moshkovitz, D., Safra, S.: Algorithmic construction of sets for k-restrictions. ACM Transactions on Algorithms 2(2), 153–177 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  2. Arora, S., Lund, C.: Hardness of approximation. In: Hochbaum, D. (ed.) Approximation Algorithms for NP-hard problems, pp. 399–446. PWS publishing company (1995)

    Google Scholar 

  3. Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  4. Chlebík, M., Chlebíková, J.: Complexity of approximating bounded variants of optimization problems. Theoretical Computer Science 354(3), 320–338 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  5. Gouda, M.G., Jung, E.: Certificate dispersal in ad-hoc networks. In: Proceeding of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), March 2004, pp. 616–623 (2004)

    Google Scholar 

  6. Gouda, M.G., Jung, E.: Stabilizing certificate dispersal. In: Tixeuil, S., Herman, T. (eds.) SSS 2005. LNCS, vol. 3764, pp. 140–152. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Hubaux, J., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceeding of the 2nd ACM international symposium on Mobile ad hoc networking and computing (Mobihoc 2001), October 2001, pp. 146–155 (2001)

    Google Scholar 

  8. Jung, E., Elmallah, E.S., Gouda, M.G.: Optimal dispersal of certificate chains. In: Guerraoui, R. (ed.) DISC 2004. LNCS, vol. 3274, pp. 435–449. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Wolsey, L.A.: An analysis of the greedy algorithm for the submodular set covering problem. Combinatorica 2(4), 385–393 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  10. Zheng, H., Omura, S., Uchida, J., Wada, K.: An optimal certificate dispersal algorithm for mobile ad hoc networks. IEICE Transactions on Fundamentals E88-A(5), 1258–1266 (2005)

    Google Scholar 

  11. Zheng, H., Omura, S., Wada, K.: An approximation algorithm for minimum certificate dispersal problems. IEICE Transactions on Fundamentals E89-A(2), 551–558 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Izumi, T., Izumi, T., Ono, H., Wada, K. (2009). Relationship between Approximability and Request Structures in the Minimum Certificate Dispersal Problem. In: Ngo, H.Q. (eds) Computing and Combinatorics. COCOON 2009. Lecture Notes in Computer Science, vol 5609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02882-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02882-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02881-6

  • Online ISBN: 978-3-642-02882-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics