<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>One-Way Communication Complexity of Minimum Vertex Cover in General Graphs</title></titleStmt>
			<publicationStmt>
				<publisher>Schloss Dagstuhl – Leibniz-Zentrum für Informatik</publisher>
				<date>01/01/2025</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10650553</idno>
					<idno type="doi">10.4230/lipics.icalp.2025.66</idno>
					
					<author>Mahsa Derakhshan</author><author>Andisheh Ghasemi</author><author>Rajmohan Rajaraman</author><author>Keren Censor-Hillel</author><author>Fabrizio Grandoni</author><author>Joel Ouaknine</author><author>Gabriele Puppis</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[{"Abstract":["We study the communication complexity of the Minimum Vertex Cover (MVC) problem on general graphs within the k-party one-way communication model. Edges of an arbitrary n-vertex graph are distributed among k parties. The objective is for the parties to collectively find a small vertex cover of the graph while adhering to a communication protocol where each party sequentially sends a message to the next until the last party outputs a valid vertex cover of the whole graph. We are particularly interested in the trade-off between the size of the messages sent and the approximation ratio of the output solution.\r\nIt is straightforward to see that any constant approximation protocol for MVC requires communicating Ω(n) bits. Additionally, there exists a trivial 2-approximation protocol where the parties collectively find a maximal matching of the graph greedily and return the subset of vertices matched. This raises a natural question: What is the best approximation ratio achievable using optimal communication of O(n)? We design a protocol with an approximation ratio of (2-2^{-k&#43;1}&#43;ε) and O(n) communication for any desirably small constant ε &gt; 0, which is strictly better than 2 for any constant number of parties. Moreover, we show that achieving an approximation ratio smaller than 3/2 for the two-party case requires n^{1 &#43; Ω(1/lg lg n)} communication, thereby establishing the tightness of our protocol for two parties.\r\nA notable aspect of our protocol is that no edges are communicated between the parties. Instead, for any 1 ≤ i &lt; k, the i-th party only communicates a constant number of vertex covers for all edges assigned to the first i parties. An interesting consequence is that the communication cost of our protocol is O(n) bits, as opposed to the typical Ω(nlog n) bits required for many graph problems, such as maximum matching, where protocols commonly involve communicating edges."]}]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>We study the communication complexity of the Minimum Vertex Cover (MVC) problem for general graphs within the k-party one-way communication model. In this model, the edges of an arbitrary n-vertex graph G = (V, E) are distributed among k parties, labeled from 1 to k. The objective is for the parties to collectively find a small vertex cover of the graph G while adhering to the following communication protocol: Each party, in sequence, sends a message to the next party, starting from the first one, and ultimately, the last party outputs a valid vertex cover of G. In this work, we focus particularly on the trade-off between the size of the messages sent and the approximation ratio of the output solution.</p><p>Extensive literature addresses various problems within this communication model, such as graph connectivity, set cover, minimum cut, and maximum matching. (See e.g., <ref type="bibr">[17,</ref><ref type="bibr">18,</ref><ref type="bibr">23,</ref><ref type="bibr">5,</ref><ref type="bibr">16,</ref><ref type="bibr">7]</ref>). The model, first introduced by Yao <ref type="bibr">[26]</ref> in 1979 also has close relations with streaming algorithms, which has further contributed to the significant attention it has received. However, to the best of our knowledge, this is the first work to consider the minimum vertex cover problem for general graphs in this communication model.</p><p>It is straightforward to see that a message of size &#8486;(n) is necessary to achieve any constant approximation ratio for the Minimum Vertex Cover (MVC) problem; for example, if the entire graph is given to the first party and the MVC has size n/2. Moreover, with slight adjustments to a lower bound for the maximum bipartite matching problem <ref type="bibr">[17]</ref>, we prove that to achieve any approximation ratio smaller than 3/2 in the two-party case, &#969;(n) communication is necessary. On the positive side, there exists a trivial 2-approximation protocol where the parties collectively find a maximal matching of the graph greedily and return the subset of vertices matched in the maximal matching. Therefore, a natural question arises: &#9654; Question 1. Is it possible to achieve better than a 2-approximation with the optimal communication complexity of O(n)?</p><p>We note that this question was, in fact, open even with n 2-&#8486;(<ref type="foot">foot_0</ref>) communication. In this work, we answer the question affirmatively for any constant number of parties. We design a protocol with the approximation ratio being a function of the number of parties. This protocol is optimal when there are only two parties. The approximation ratio and communication complexity of our protocol are as follows.</p><p>&#9654; Theorem 1. For any k &#8805; 2 and any desirably small &#1013; &gt; 0, there exists a randomized MVC protocol in the k-party one-way communication model with an expected approximation ratio of (2 -2 -k+1 + &#1013;), in which each party communicates a message of size O k,&#1013; (n) 1 . This approximation ratio is tight for k = 2 up to a factor of 1 + &#1013;.</p><p>An interesting aspect of our protocol is that no edges are communicated between the parties. Instead, for any 1 &#8804; i &lt; k, the i-th party communicates only a constant number of vertex covers (dependent on &#1013; and k) of all the edges assigned to the first i parties. As a result, the communication cost of our protocol is O(n) bits, in contrast to the typical &#8486;(n log n) bits required for approximating many graph problems <ref type="bibr">[23]</ref>, such as maximum matching, where protocols often involve communicating edges.</p><p>While the problem studied in this work is information-theoretical rather than computational, it is worth noting that our protocol is not polynomial-time. This is expected, as achieving any approximation ratio better than 2 for the minimum vertex cover problem is known to be computationally hard under the unique games conjecture <ref type="bibr">[19]</ref>. Additionally, our protocol can be considered non-explicit because we provide an existential proof for parts of our protocol rather than explicitly constructing it in full (due to the use of von Neumann's Minimax Theorem). However, the protocol can, in principle, be identified through a brute-force search in doubly exponential time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Relation to streaming algorithms</head><p>A key motivation behind studying the communication complexity of one-way protocols for graph problems is due to its relations with the streaming model <ref type="bibr">[15]</ref>. In the single-pass streaming model, the edges of an n-vertex graph arrive sequentially in a stream in an arbitrary order. A streaming algorithm needs to construct a solution using a limited memory smaller than the input size. Any lower bounds established for the communication complexity in the one-way model directly imply lower bounds for the memory requirements in the streaming model. This, indeed, has been the standard approach for proving streaming lower bounds. Similarly, any protocol developed within the communication framework can provide insights into designing streaming algorithms.</p><p>A long-standing, central open question in streaming literature is whether it is possible to achieve better than a 0.5-approximate matching in &#213;(n) space with only a single pass. Even estimating the size of the maximum matching (the dual of minimum vertex cover) within a factor greater than 0.5 remains unresolved in this setting. The same holds true for surpassing a 2-approximation for Minimum Vertex Cover (MVC) in bipartite graphs, as well as the seemingly more challenging problem of approximating MVC on general graphs.</p><p>Our work highlights an important point for those aiming to prove the impossibility of better-than-2 approximation for streaming MVC within O(n) space: the standard approach of using the one-way communication model with a constant number of parties does not suffice, as we present a protocol that achieves better-than-2 approximation when k is a constant. On a positive note, we hope that our protocol will inspire the development of space-efficient streaming algorithms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1">Our Techniques</head><p>In this section, we provide a brief overview of our protocol. A more detailed explanation of the protocol for two parties is presented in Section 2, and the multi-party protocol is formally introduced and analyzed in Section 3. A lower bound for the two-party case is presented in Section 4, and the proof of main theorem put together in Section 5.</p><p>In our protocol, each party i, for 1 &#8804; i &lt; k, communicates a set of vertex covers of the edges assigned to parties 1 through i. This information is clearly sufficient for the last party to obtain a valid vertex cover of the entire graph. Interestingly, it turns out that communicating only a constant number<ref type="foot">foot_1</ref> of vertex covers provides enough information to find a sufficiently small vertex cover of the whole graph. To construct this message, each party i must solve several instances of the following problem: Let S be one of the vertex covers communicated to party i, and let D B be a distribution on the edges assigned to the future parties (i + 1 to k). Given this information, party i aims to add a subset of vertices to S to cover her edges while ensuring that this does not significantly increase the final approximation ratio.</p><p>Let c v denote the probability of the vertex belonging to the optimal solution given the distribution D B . Player i must choose which vertices to add to S. To make this decision, she assigns weights to the vertices, where higher weights show a poorer fit for inclusion in the solution. The player then computes the minimum-weighted vertex cover based on these assigned weights. We aim to design the weight assignments so that vertices with higher weights are less likely to be selected. Additionally, we aim to provide earlier players with less flexibility in their choices, as they have access to less information. To achieve this, we define the weight function as:</p><p>where (2 -&#946; k-i ) is the approximation ratio achievable in a protocol with k -i parties (the number of remaining parties). This means that if i is the second to last party (i.e., k -i = 1), then she sets w v = 1 -c v since a single party protocol finds the optimal solution (&#946; 1 = 1). Finally, analyzing the approximation ratio boils down to upper-bounding the weight of this minimum weight vertex cover which we discuss further in Sections 3.1 and 3.3. Once this upper bound is established, we use an inductive proof to show that party i can add a subset of vertices to S ensuring E |solution outputted by the final party|</p><p>where the expectation is taken over D B . Ideally, we would prefer this to be an instancewise approximation ratio, where the upper bound holds for the expectation of the ratio rather than for the ratio of expectations. In such a case, a simple application of von Neumann's Minimax Theorem would suffice to establish the existence of our desired protocol. Nevertheless, this upper bound, combined with a simple trick (also used by Assadi and Behnezhad <ref type="bibr">[2]</ref>), can still give us the same approximation ratio with a small additive loss.</p><p>The key idea is that if the Minimum Vertex Cover of all instances in the support of the distribution D B have nearly the same size, then the per-instance approximation ratio and the ratio of expectations will also be approximately equal. To use this, each party discretizes the range of possible optimal solution sizes into a constant number of intervals. Each party then solves a separate instance of the problem under the assumption that the true optimal solution size falls within a particular interval. For each of these size estimates, the party is facing a distinct problem instance. The number of size estimates (or "guesses") each party makes depends on their position among the k parties. Later parties in the protocol are allowed more error, meaning they make a larger number of guesses to refine their estimate. Ultimately, the total number of vertex covers that the last party receives is proportional to the product of the guesses made by the first k -1 parties. See Figure <ref type="figure">2</ref> for a depiction of this protocol.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2">Related Work</head><p>In recent works, several advancements in the communication complexity of various graphrelated problems have been made. Assadi et al. <ref type="bibr">[6]</ref> established optimal lower bounds for approximating the Set Cover problem in the two-party communication model, which also corresponds with a streaming algorithm, thereby addressing both streaming and communication complexities. Additionally, Abboud et al. <ref type="bibr">[1]</ref> investigated the same communication model for exact answers, which included back-and-forth communication, while Dark et al. <ref type="bibr">[12]</ref> modified this model to include deletions. The model has also been studied by Assadi et al. <ref type="bibr">[4]</ref> in a simultaneous framework under random partitions. Moreover, Naidu and Shah <ref type="bibr">[22]</ref> as well as Chitnis et al. <ref type="bibr">[11]</ref> contributed relevant insights in the dynamic data stream model, particularly concerning the vertex cover problem.</p><p>Most related to our work is the rich literature on the communication complexity of the maximum matching problem. (See e.g., <ref type="bibr">[17,</ref><ref type="bibr">10,</ref><ref type="bibr">3,</ref><ref type="bibr">21]</ref>) Within the &#213;(n) one-way communication regime, Goel, Kapralov, and Khanna have established a protocol for bipartite matching that achieves a tight approximation ratio of 2/3 in the two-party case <ref type="bibr">[17]</ref>. For general graphs, the same tight approximation ratio is achieved by Assadi and Bernstein <ref type="bibr">[3]</ref>. In scenarios involving more than two parties (k &gt; 2), the work of <ref type="bibr">Behnezhad and Khanna [9]</ref> implies the existence of protocols with an approximation ratio of 0.6 and 0.53, respectively, for three and four parties, and 0.5 + &#8486; 1/k (1) for any k &gt; 4. Furthermore, Singla and Lee <ref type="bibr">[21]</ref> provide 0.5 + 2 -O(k) approximation protocols for the more restricted model where each party has to irrevocably add some of their edges to the matching instead of communicating an arbitrary message of size &#213;(n).</p><p>Given the duality between maximum matching and minimum vertex cover (MVC) on bipartite graphs, these results can be used to approximate the size of bipartite MVC. However, simply having an approximate matching does not suffice to construct an approximate MVC. Although it would not be surprising if some of these works also have implications for finding an approximate MVC for bipartite graphs, to the best of our knowledge, there is no explicit study of MVC within the model discussed in this paper, even for bipartite graphs. General graphs, however, which are the main focus of this work, are a completely different story, as the MVC can be up to two times the maximum matching. Therefore, the ideas developed for approximating matching matching are not of much use here.</p><p>Another line of work related to this paper is the study of the stochastic minimum vertex cover problem <ref type="bibr">[8,</ref><ref type="bibr">13,</ref><ref type="bibr">14]</ref>. In this problem, we are given a graph G = (V, E) and an existence probability for each edge e &#8712; E. Edges of G are realized (or exist) independently with these probabilities, forming the realized subgraph G. The existence of an edge in G can only be verified using edge queries. The goal of this problem is to find a near-optimal vertex cover of G using a small number of queries. Most related to our work is the 1.5 approximation algorithm designed by Derakhshan et al <ref type="bibr">[13]</ref>. Their algorithm first commits a subset of vertices S to the final solution, then queries any edge in G which is not covered by S, and adds an MVC of the realized edges to the solution. This effectively results in a solution which covers all edges of G. The core of their algorithm is their choice of set S.</p><p>The stochastic vertex cover algorithm of <ref type="bibr">[13]</ref> can be used to attack the special case of the two-party communication model as follows. Let us assume that Alice (the first party) in addition to her own graph also has a distribution over Bob's graph (the second party). In other words, she has a distribution over the whole graph with her edges having an existence probability of one. (Unlike the stochastic model, existence of edges are not independent here.) We observe that in this case if Alice follows the algorithm of <ref type="bibr">[13]</ref> and only communicates subset S to Bob, they will be able to find a vertex cover whose expected size is at most 1.5 times the expected size of the optimal solution. Moreover, we show that the assumption regarding the knowledge of distribution can be lifted via techniques from <ref type="bibr">[2]</ref> allowing for a 1.5 approximation in the 2-party communication model. However, for the multi-party case, which is the main focus of this work, while the technical insights from this work are helpful, it does not imply any approximation ratio better than 2. To address this challenge, we extend the argument of <ref type="bibr">[13]</ref> to bound the cost of a suitably weighted vertex cover in the 2-party case and leverage that to further generalize to the k-party case, beating the threshold of 2 for the approximation ratio.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.3">Preliminaries</head><p>In this work, we consider the one-way k-party communication model, focusing on randomized protocols where each party utilizes private random bits. The primary interest in this model is information-theoretical, with parties assumed to be computationally unbounded. The communication cost is measured by the worst-case length of the messages exchanged between any two parties. For standard definitions and further details, we refer to the textbook by Kushilevitz and Nisan <ref type="bibr">[20]</ref>.</p><p>We have a base graph G = (V, E) which is distributed among k parties in a way that each party i has the graph</p><p>The objective of the parties is to collectively find a small vertex cover of the graph G while adhering to the following communication protocol: Starting from the first party, each party 1 &#8804; i &lt; k, in turn, sends a message M i and ultimately, the last party outputs a valid vertex cover of G. I C A L P 2 0 2 5 66:6</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>One-Way Communication Complexity of MVC in General Graphs</head><p>Notation. We define MVC(.) as a function that, for any given graph, returns its minimum vertex cover. The size of the minimum vertex cover for an input graph is denoted by &#964; (.), and OPT represents the minimum vertex cover of the input graph G, implying that |OPT| = &#964; (G) is the optimal solution size.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">An Overview of the Two-Party Protocol</head><p>As a warm-up, we consider a two-party version of the problem with Alice and Bob as the first and second parties, respectively. Let G A = (V, E A ) and G B = (V, E B ) represent the subgraphs given to Alice and Bob. In this section, we provide an overview of our protocol for two parties with O(n) communication for a constant &#1013; &gt; 0 that can be made arbitrarily small. We later prove this is a 3/2 + &#1013;-approximate protocol.</p><p>Consider a simplified version of the problem where Alice, in addition to G A , also knows the size of the minimum vertex cover of the whole graph G = G A &#8746; G B . We will later discuss how to lift this assumption. For this case, the protocol we consider is simple: Alice communicates a carefully constructed vertex cover X of her subgraph (not necessarily the minimum vertex cover) to Bob. This construction is randomized, and we argue that it is possible to pick X that will lead to an expected approximation ratio of 3/2.</p><p>Let us analyze the approximation ratio achieved by a fixed X. The final solution picked by Bob will be the union of X and a minimum vertex cover of G B [V \X]. Hence, the approximation ratio will be:</p><p>A Two-Player Game. We can view the problem faced by Alice as a zero-sum two-player game between her and an adversary, both of whom know G A and the size of the optimal solution represented by opt. Alice's strategy is to select a subset X &#8838; V of vertices that covers G A . The adversary's strategy is to select G B such that &#964; (G B &#8746; G A ) = opt. We let the adversary's utility be the approximation ratio defined in Equation 3 since that is what Alice wants to minimize. Note that a mixed strategy of Alice in this game (a distribution over vertex covers of G A ) is equivalent to a randomized algorithm for picking X in the original problem. Therefore, we are interested in proving that Alice has a mixed strategy for selecting X such that no pure strategy of the adversary obtains utility larger than 3/2 against it. The Minimax Theorem due to von Neumann <ref type="bibr">[24]</ref> implies the following about this game:</p><p>&#9654; Proposition 2. In the described game, if for any mixed strategy chosen by the adversary, there exists a pure strategy X for Alice such that the adversary's expected utility is at most 3/2, then there exists a mixed strategy for Alice that ensures the expected utility of the adversary is at most 3/2 for any strategy the adversary employs.</p><p>Due to Proposition 2, the problem is reduced to proving that given any distribution D B over G B , there exists a vertex cover X of G A with an instance-wise approximation ratio of at most 3/2. Given distribution D B , let c v denote the probability of a vertex being in the optimal solution of</p><p>After calculating these probabilities (which is possible without computational limitations), Alice constructs a vertex-weighted subgraph with the weight of any vertex v &#8712; V being w v = 1 -c v . She then lets X be the minimum weight vertex cover of G A . These steps are formalized in Algorithm 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>66:7</head><p>Algorithm 1 Minimum Weighted Vertex Cover 2-Party Algorithm.</p><p>We now provide some intuition behind Algorithm 1. Let W (X) be the sum of the weight of the vertices in X. We claim that W (X) is the expected difference between opt and the size of the solution outputted by the algorithm. For any vertex in X, its weight is essentially the difference between its contribution to X and its contribution to the optimal solution. In other words, this weight is the cost of including that vertex in X.</p><p>We observe that since Bob calculates the exact minimum vertex cover (MVC) for the edges that X does not cover, the total weight W (X) acts as an upper bound on the expected difference between the optimal solution and the solution found by the algorithm. This is exactly what we want to minimize, which is why Alice sets weights as w v = 1 -c v and takes a minimum weight vertex cover of G A .</p><p>Following this observation, to prove the desired approximation ratio, we need to show an upper bound of</p><p>Proving this turns out to be a technically challenging problem, which we tackle in Section 3.3 (in more generality) 3 . Our proof uses the probabilistic method and shows that the expected weight of a particular randomized vertex cover of G A is at most half the optimal vertex cover cost of G. To construct this randomized vertex cover, we follow a similar approach as the stochastic vertex cover algorithm of <ref type="bibr">[13]</ref>. In particular, we organize the vertices into three groups based on the c v values and a suitable threshold t &gt; 1/2:</p><p>. We include all vertices from the third group. The vertices in the first group can be omitted from a vertex cover as all their edges in G A are to vertices in the third group. Finally, we include those vertices from the middle group that are selected in a minimum vertex cover of a graph G A &#8746; G B drawn randomly based on the distribution D B . We extend the argument of <ref type="bibr">[13]</ref> to analyze the weight of the above randomized vertex cover, which we then leverage to both establish the inequality 4 as well as crucially generalize to the case of k players.</p><p>Using inequality 4, we then prove for the 2-player case that</p><p>Here,</p><p>is the expected size of the output since Bob returns the union of X and a minimum vertex cover of the remaining graph. Observe that by definition of weights, for any vertex we have c v + w v = 1. As a result we can write</p><p>3 Inequality 4 follows from Lemma 8 with parameter &#946; = 1.</p><p>I C A L P 2 0 2 5 66:8</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>One-Way Communication Complexity of MVC in General Graphs</head><p>This, however, is not an instance-wise approximation ratio. By invoking Yao's minimax principle and using the assumption that the size of the solution is fixed, we are able to ensure that there is a randomized protocol that achieves an instance-wise approximation ratio of 3/2 under the fixed size assumption.</p><p>Lifting the Knowledge of Size. So far, we have discussed our protocol, assuming that Alice knows the size of the optimal solution. To lift this assumption, we use a standard approach which is also used by Assadi and Behnezhad <ref type="bibr">[2]</ref>. Given a constant &#1013; &#8712; (0, 1), we create &#8968;log 1+&#1013; 2&#8969; instances of the problem. In the i-th instance, Alice guesses the size of the optimal solution to be in the range</p><p>For each of her guesses, she communicates a different vertex cover of G A . It is easy to show that if one of these guesses is correct, the subset Alice communicates for that guess allows Bob to find a 3/2 + &#1013; approximation ratio. These guesses together cover the case of &#964; (G) &lt; 2&#964; (G A ). To address the case of &#964; (G) &#8805; 2&#964; (G A ), Alice also communicates an MVC of her graph. In this scenario, the size of the output would be at most</p><p>Putting the pieces together, Alice can guarantee an expected approximation ratio of 3/2 + &#1013; by communicating a message of size n&#8968;log 1+&#1013; 2&#8969;.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The k-Party Protocol</head><p>In this section, we present the general k-party protocol, which builds on the sketch of the 2-party protocol presented in Section 2. Our protocol simulates a series of two-party protocols between any party i and a second party encapsulating all the remaining parties i + 1 to k. However, it is important to note that a naive approach of composing arbitrary 3/2approximate two-party protocols may not yield an effective k-party protocol. For instance, consider the graph presented in Figure <ref type="figure">1</ref> consisting of sets A, B, C, and D, each containing n/4 vertices. These sets are connected by two bipartite matchings, M 1 between A and B, and M 2 between C and D, and a complete graph K over B &#8746; C. For this graph, the optimal vertex cover is B &#8746; C of size n/2. Suppose the first party receives M 1 , the second party receives M 2 and the third party receives K. A 3/2-approximate two-party protocol may select M 1 for the first party and M 2 for the second party, leading to an overall solution of size n, which would be 2-approximate. We address this challenge by carefully selecting vertices, prioritized by the c v values, and setting weights so that the optimal solution for the remaining graph becomes progressively smaller as the protocol proceeds with the parties.</p><p>We give an overview of our k-party protocol. Following the framework of the 2-party protocol, the first party makes several guesses about the size of opt, with the number of guesses depending only on k and parameter &#1013; &gt; 0, which can be made arbitrarily small. For each guess (which is an interval) the first party constructs a vertex cover for her graph and communicates all these vertex covers to the next party. Figure <ref type="figure">2</ref> depicts our protocol.</p><p>For any 1 &lt; i &lt; k, the i-th party receives a message M , which is a set of sets of vertices. Each element S &#8712; M is a vertex cover of &#8746; 1&#8804;l&lt;i G l . For each S &#8712; M , party i constructs a new instance of the problem. She assumes S will be in the final vertex cover and lets</p><p>] be the subgraph of G i not covered by S. At this point, party i faces a similar problem to the first party in a (k -i)-party setting with the assigned subgraph being G &#8242; i .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>66:9</head><p>C n/2 . . . Therefore, she starts by making a number of guesses about &#964; (G[V \S]). We use b i to refer to the number of guesses party i needs to make and later discuss its exact value. For each guess, she picks a vertex cover of G &#8242; i and takes its union with S as a vertex cover of &#8746; 1&#8804;j&#8804;i G j . Repeating this for all elements of M results in constructing</p><p>She then communicates all of these to the next party. Since the number of guesses is only a function of k and &#1013;, the size of the message is O k,&#1013; (n).</p><p>Finally, the last party, after receiving a message M , finds the smallest vertex cover of her graph that includes at least one subset of vertices S &#8712; M . This ensures that the final output is a valid vertex cover for the entire graph.</p><p>Two points remain to be addressed about the protocol. Consider party i and the message M she receives. First, for any S &#8712; M , we need to describe how the party forms guesses about the size of the minimum vertex cover of G[V \ S]. Party i makes b i = log 1+&#1013; 2 k-i + 1 guesses about &#964; (G[V \ S]). For any 1 &lt; l &lt; b i , the l-th guess is:</p><p>There is an additional guess &#964; (G[V \ S]) &#8805; (1 + &#1013;) bi &#964; (G &#8242; i ) to cover the remaining possibilities. The second point to address is the following: given a guess on the optimal vertex cover, how should we construct a vertex cover of</p><p>in order to obtain the desired approximation ratio? We discuss this in detail in Section 3.1 via the formulation of a twoplayer game that captures the decision process for party i. We then formalize the protocol in Section 3.2 and establish its communication complexity and approximation ratio.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">A Two-Player Game</head><p>In this section, we will discuss the sub-problems each party needs to solve in the design of our protocol. In Figure <ref type="figure">2</ref>, the construction of a message sent through any edge represents one of these sub-problems. Consider any subset of vertices S party i receives from the previous party. (For the first party, this is an empty set.), and let V &#8242; = V \ S. Assuming that S will be part of the final solution and any guess the party has about the size of the optimal solution on the remaining graph G &#8242; = G[V &#8242; ], she needs to send a message to the next party. The message will be the union of S and a vertex cover X of her remaining subgraph</p><p>To simplify the problem, we can ignore S since it is part of both the input message and the outgoing message. Therefore, in the simplified version, party i needs to solve the</p><p>1st party b 1 . . . 2nd party b 2 . . . i-th party b i . . . . . . . . . k-th party . . .</p><p>The tree of communications generated by parties using algorithm 2. The message S sent through each edge to the i-th layer is a vertex cover of the subgraphs given to the first i -1 parties. For any of these messages the i-th party receives, she constructs bi different vertex covers of</p><p>and sends their union with S to the next party. Each edge basically represents a subproblem party i needs to solve. Given S, she will make bi guesses about the size of &#964; (G &#8242; i ) and for any of these guesses, needs to solve the following subproblem: Find a vertex cover X of G &#8242; i such that committing the subset S &#8746; X to the final solution results in a good approximation ratio conditioned on the specific guess about &#964; (G &#8242; i ).</p><p>following problem. The input consists of a subgraph</p><p>and a guess about the size of the remaining optimal solution in the form of &#964; (G &#8242; ) &#8712; (O, (1 + &#1013;)O) where O is an integer number. The goal of the party is to find a vertex cover X of G &#8242; i in order to minimize the size of the final solution if subset X is committed to the final solution knowing that the rest of the parties will implement a protocol with an expected approximation ratio of at most 2 -</p><p>We can view these sub-problems as two-party problems between party i, which we will refer to as Alice, and a second party, Bob, who encapsulates parties i + 1 to k in the original problem. In this problem, Bob, instead of being able to find an exact MVC of the remaining graph, can only find a solution with an approximation ratio of at most 2 -2 i-k + 5&#1013;. In this two-party problem, we use G A = (V &#8242; , E A ) to refer to G &#8242; and G B = (V &#8242; , E B ) as the union of the subgraphs given to parties i + 1 to k in the original problem. Hence, Alice's goal here is to pick a randomized X such that it results in an expected approximation of at most 2 -2 i-k-1 + 5&#1013; for any priori fixed G B .</p><p>We reformulate this two-party problem as a two-player game. The first player is Alice, and the second player is an adversary who will determine G B .</p><p>&#9654; Definition 3 (MVC Game). Given three parameters &#946; &#8712; (0, 1), &#1013; &#8712; (0, 1) and O &#8712; (0, n) we define a two-player zero-sum game between Alice and an adversary on a graph with vertex set V &#8242; . Alice has a set of edges E A between vertices V &#8242; , which is known to both players. Alice's strategy is to select a subset X &#8838; V &#8242; of vertices that covers all edges in E A . The adversary's strategy is to select a set of edges</p><p>The adversary's utility is defined as:</p><p>The notation E B [V \ X] represents the edges in E B that are induced by the vertices in the set V \ X, meaning it includes only those edges in E B where both endpoints are in V \ X.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>66:11</head><p>We begin by proving that for any given distribution over adversary's strategies, there exists a deterministic strategy for Alice that achieves a payoff of at least (2 -&#946;/2)(1 + &#1013;).</p><p>&#9654; Lemma 4. In the MVC game presented in Definition 3, given any randomized (mixed) strategy E B of the adversary, Alice has a deterministic (pure) strategy X such that</p><p>Alice chooses a minimum weight vertex cover X of E A , where the weight of a vertex is defined as</p><p>We will prove that this choice of X satisfies the statement of the lemma. We have</p><p>In the first inequality, we use the fact that</p><p>This is due to the definition of c v s, which implies there is a vertex cover of</p><p>can only be covered by vertices in V \ X, this implies that there is also a vertex cover of E B [V \ X] which contains each vertex w.p. c v hence by linearity of expectation, we get <ref type="bibr">(8)</ref>.</p><p>A technical part of our proof is to show v&#8712;X (1</p><p>v&#8712;V c v which we defer to Lemma 8 in Section 3.3. Combining this with <ref type="bibr">(7)</ref> gives us</p><p>Hence, we get Proof. Given any parameter &#945; &gt; 0, von Neumann's Minimax Theorem <ref type="bibr">[24]</ref> (alternatively, Yao's minimax principle <ref type="bibr">[25]</ref>) implies that in the described game, if for any mixed strategy chosen by the adversary, there exists a pure strategy X for Alice such that the adversary's expected utility is at most &#945;, then there exists a mixed strategy for Alice that ensures the expected utility of the adversary is at most &#945; for any strategy the adversary employs. By Lemma 4, for any mixed strategy of the adversary, there exists a pure strategy for Alice that achieves an expected utility of at least (2 -&#946;/2)(1 + &#1013;). This implies the existence of a mixed strategy for Alice with the same expected utility against an arbitrary adversary. &#9664;</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">The Protocol</head><p>In this section, we provide a formal statement of our protocol in Algorithm 2. We then establish in Lemma 6 that the total communication complexity is O(n) for any constant k. Finally, we prove in Lemma 7 that it results in our desired approximation ratio.</p><p>Algorithm 2 k-Party Algorithm for party i.</p><p>1 Input: subgraph G i and M i-1 (message from party i -1 and M 0 = {&#8709;}.) 2 Let &#1013; &#8712; (0, 1/5) be a given constant number.</p><p>(Remove all the vertices in S from the graph.)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>9</head><p>Apply the strategy of Lemma 5 with O and &#946; to get X l .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>10</head><p>Add X l &#8746; S to M i .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>11</head><p>Add MVC(G &#8242; i ) &#8746; S to M i . 12 if i = k then 13 return the set &#928; i with minimum size in M i . As mentioned before, parts of our protocol are non-explicit. In particular, we only show the existence of suitable subsets X 1 , . . . , X bi . In our protocol, each party i communicates a set of suitable vertex covers of the graph given to the first i parties. We do not present an efficient procedure for computing these covers, which makes our protocol non-explicit.</p><p>&#9654; Lemma 6. Given a graph G = (V, E) and k parties, if all the parties use algorithm 2 to communicate and find the vertex cover of G, the communication cost will be (k -</p><p>Proof. Since each party sends b i new subsets for each subset they receive, the number of subsets communicated between the last two parties is</p><p>Moreover, since each subset of vertices can be represented using an n-bit string, the commu-</p><p>We next establish an upper bound on the approximation ratio achieved by the protocol.</p><p>&#9654; Lemma 7. In the k-party minimum vertex cover problem, let &#960; k (G) be the size of the output if all the parties use algorithm 2 on the base graph G. Then</p><p>Proof. We will use induction on the number of parties. If k = 1, then the algorithm will output the set with the minimum size in M 1 . Since M 0 = {&#8709;}, a set in M 1 will be &#964; (G &#8242; = G[V \&#8709;] = G) that is added on line 11. Therefore, the output is &#964; (G) which gives us</p><p>proving base case for k = 1. For the inductive step, assume that the lemma statement holds for k -1 parties and any base graph G &#8242; . That is</p><p>In line 6 of the algorithm 2, let X 1 , X 2 , ..., X b1 be the subsets generated by the first party using the strategy of Lemma 5 with O and &#946; of line 9, where b 1 = log 1+&#1013; 2 k-1 . Let j be the integer number satisfying</p><p>Case 1: j &#8804; b 1 . Party 2 upon receiving X j , constructs a graph G &#8242; = G[V \X j ] since X j is committed to be in the final solution and we do not need to consider the edges of these vertices. We find a vertex cover on G &#8242; where the partitions are</p><p>Since the lemma statement holds for k -1 parties, applying algorithm 2 on a graph G &#8242; gives us a vertex cover of G &#8242; with the expected approximation ratio of (2 -1 2 (k-1)-1 + 5&#1013;).</p><p>Since &#928; k covers all the edges in G[V \X j ], a vertex cover for G is &#928; k &#8746; X j .</p><p>As a result of this, the final solution will have size &#960; k (G) = |X j | + &#960; k-1 (G &#8242; ) and results in the following inequality for the approximation ratio.</p><p>Now, we construct a version of the MVC game in which we have Alice as the first party and the adversary as the union of the next k -</p><p>As described in the game definition, Alice sends a vertex cover to Bob and aims to minimize the utility function 11. The adversary (the next k -1 parties) aims to choose edges E B in a way to maximize his utility. Let</p><p>Now using Lemma 5, Alice has a strategy such that no strategy played by the adversary obtains utility larger than (2 -&#946;/2)(1 + &#1013;).</p><p>I C A L P 2 0 2 5</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>66:14 One-Way Communication Complexity of MVC in General Graphs</head><p>By putting &#946; in Equation <ref type="formula">12</ref>we get</p><p>Since &#1013; &#8804; 1 5 , 9/2 -1 2 k-1 + 5/2&#1013; &#8804; 5. The following completes our inductive step for case 1.</p><p>As explained in the previous case, the output is at least the summation of the minimum vertex cover of G 1 and the algorithm's output on the rest of the partitions.</p><p>This completes the proof for case 2 which completes the proof. &#9664;</p><p>The upper bound of Theorem 1 follows from Lemmas 6 and 7.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">A Technical Lemma</head><p>In this section, we establish the following lemma, which is used in the proof of Lemma 4.</p><p>It helps to first establish the following claim that may be of independent interest. We defer the proof to the full version of the paper.</p><p>&#9654; Lemma 9. Let w : (0, 1] &#8594; &#8476; &#8805;0 be a function with finite support 4 . Then, we have</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proof of Lemma 8. Consider a vertex cover I</head><p>where we used c v &#8805; 1/2 for v &#8712; S 3 and S3 c v &#8804; S1 c v by definition of t. 4 We define the support of w to be the number of elements x &#8712; (0, 1] for which w(x) &gt; 0.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>66:15</head><p>We now consider the set S 2 . We derive</p><p>where the last inequality follows from Lemma 9 (with w(x) set to the number of vertices v for which</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">A Lower Bound for the Two-Party Case</head><p>We show the following lower bound, which establishes the tightness of our protocol for the two-party case.</p><p>&#9654; Lemma 10. For any constant &#949; &gt; 0, there exists a constant c &gt; 0 such that any vertex cover computed by a two party protocol with n 1+c/ lg lg n communication complexity has an approximation ratio of at least 3/2 -&#949;.</p><p>Proof. Let G be a Rusza-Szemeredi (bipartite) graph (P, Q, E) formed by n vertices on each side and k induced matchings</p><p>where &#949; 1 &gt; 0 is a constant that can be made arbitrarily small. Rusza-Szemeredi graphs with the preceding parameters have been shown to exist <ref type="bibr">[17]</ref>. We generate a random bipartite graph</p><p>, with a total of (3 + 2&#949; 1 )n vertices, as follows:</p><p>1. P , Q are as in G; P &#8242; (resp., Q &#8242; ) is a set of (1/2 + &#949; 1 )n vertices disjoint from P (resp., Q).</p><p>2. Select a subset M &#8242; i of &#949; 2 n edges uniformly at random from M i , for 1 &#8804; i &#8804; k, independently, where &#949; 2 &gt; 0 is a constant that can be set arbitrarily small. Set E 1 = &#8746; 1&#8804;i&#8804;k M &#8242; i ; we thus have |E 1 | = k&#949; 2 n. 3. Choose r uniformly at random from {1, . . . , k}. Let P r and Q r denote the vertices of M r in P and Q, respectively. Let M P and M Q denote a perfect matching between P &#8242; and P \ P r and between Q &#8242; and Q \ Q r , respectively. Set E 2 to M P &#8746; M Q . In the two-party instance, Alice receives the bipartite graph (P &#8746; P &#8242; , Q &#8746; Q &#8242; , E 1 ) and Bob receives the bipartite graph (P &#8746; P</p><p>is a vertex cover of this size. We will argue below that with probability at least 1 -o(1), any protocol with O(n) communication produces a vertex cover of size at least (3/2 + 2&#949; 2 -&#949; 3 )n, where &#949; 3 &gt; 0 is a constant that can be made arbitrarily small by suitably setting other constants, if necessary.</p><p>The proof is via a counting argument. Let G A denote the collection of all possible graphs that can be presented to Alice. By our construction above, we have</p><p>Suppose Alice sends a message with s bits to Bob; let &#981; : G A &#8594; {0, 1} s denote the mapping that Alice uses to map the graph she receives to the s-bit message she sends. For any graph H &#8712; G A , let &#915;(H) = {H &#8242; : &#981;(H &#8242; ) = &#981;(H)}. Since Bob needs to produce a valid vertex cover under all inputs, Bob needs to ensure that the vertex cover output for any input H to Alice should cover every edge in the union of all graphs in &#915;(H). Since the number of possible outputs of &#981; is 2 s , a simple averaging argument implies that there exists an H such that  <ref type="formula">1</ref>)) is at most 2 s &#8226; |G A |/2 s(1+o(1)) , which is a o(1) fraction of G A . By Lemma 11, it follows that for a randomly chosen matching M r , with probability 1 -o(1), the union of all of the edges in the graphs in &#915;(H) contains at least (1/2 -&#949; 3 )n edges from M r . Since Bob has to cover all the edges in this union, the vertex cover returned includes at least n/2 -&#949; 3 n of the vertices of M r and at least the 2(n/2 + &#949; 2 n) vertices needed to cover the edges of E 2 . This implies a vertex cover of size at least 3n/2 + 2&#949; 2 n -&#949; 3 n with probability at least <ref type="bibr">1 -o(1)</ref>.</p><p>This completes the proof of the desired claim that any protocol with o(nk) = n 1+&#8486;(1/ lg lg n) communication (for a suitable hidden constant in the &#8486; term) produces a vertex cover of size at least (3/2 + 2&#949; 2 -&#949; 3 )n with probability 1 -o(1). Therefore, there exists a constant c &gt; 0 such that no vertex cover computed by a two party protocol with n 1+c/ lg lg n communication complexity can have an approximation ratio of any constant smaller than 3/2. &#9664; Our lower bound applies to bipartite graphs. Our proof follows the approach of <ref type="bibr">[17]</ref> who established a similar lower bound for the maximum matching problem in bipartite graphs.</p><p>While the size of a maximum matching equals the size of a minimum vertex cover in bipartite graphs, there is no direct reduction between the two problems in our communication model. Indeed, though the specific graph construction we use for the vertex cover lower bound follows the same framework as for the maximum matching lower bound, the parameters and the specific arguments are different. Our parameters for the probability distribution over the bipartite graphs are similar to those used in the lower bound for stochastic vertex cover in <ref type="bibr">[13]</ref>.</p></div><note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0"><p>We use the notation O k,&#1013; (&#8226;) to indicate that the hidden constant may depend on the parameters k and &#1013;.</p></note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1"><p>This constant is independent of n, the number of vertices, but depends on k, the number of parties, and &#1013;.</p></note>
		</body>
		</text>
</TEI>
