Statistiques
| Révision :

root / CharacterizingPH / LCC17 / lcc2017.tex @ 184

Historique | Voir | Annoter | Télécharger (20,51 ko)

1 184 adas
\documentclass[a4paper]{article}
2 184 adas
3 184 adas
\usepackage{amssymb}
4 184 adas
\usepackage{amsthm}
5 184 adas
\usepackage{hyperref}
6 184 adas
\setcounter{tocdepth}{3}
7 184 adas
8 184 adas
\newtheorem*{conjecture*}{Conjecture}
9 184 adas
\newcommand{\fph}{\mathbf{PH}}
10 184 adas
11 184 adas
12 184 adas
\title{An implicit characterisation of the polynomial hierarchy in an unbounded arithmetic }
13 184 adas
\author{Patrick Baillot \and Anupam Das}
14 184 adas
%\date{ Univ Lyon, CNRS, ENS de Lyon, Universit\'e Claude Bernard Lyon 1, LIP
15 184 adas
%	%\\[2ex] \today
16 184 adas
%	}
17 184 adas
\date{ Univ Lyon, CNRS, ENS de Lyon, UCB Lyon 1, LIP
18 184 adas
	%\\[2ex] \today
19 184 adas
	}
20 184 adas
	\newcommand{\ph}{\mathbf{PH}}
21 184 adas
	\newcommand{\pspace}{\mathbf{PSPACE}}
22 184 adas
	\newcommand{\fpspace}{\mathbf{FPSPACE}}
23 184 adas
	\newcommand{\ptime}{\mathbf{P}}
24 184 adas
	\newcommand{\fptime}{\mathbf{FP}}
25 184 adas
	\newcommand{\nc}{\mathbf{NC}}
26 184 adas
	\newcommand{\ac}{\mathbf{AC}}
27 184 adas
	\newcommand{\exptime}{\mathbf{EXP}}
28 184 adas
29 184 adas
30 184 adas
\begin{document}
31 184 adas
\maketitle
32 184 adas
33 184 adas
%\begin{itemize}
34 184 adas
%\item a big picture: logic methods for complexity classes:
35 184 adas
%
36 184 adas
%\begin{tabular}{c|c}
37 184 adas
%ground & higher-order\\
38 184 adas
%quantifiers  & type-level\\
39 184 adas
%PSPACE    & $k$-EXP\\
40 184 adas
%PH  &              P\\
41 184 adas
%P  &\\
42 184 adas
%$NC_i$&
43 184 adas
%\end{tabular}
44 184 adas
%
45 184 adas
%\item  state of the art on arithmetics for complexity classes:
46 184 adas
%
47 184 adas
%\begin{tabular}{c|c|c|c}
48 184 adas
%{\small model of comp. $\backslash$ extracted program } & Cobham & mon. constraints & BC-like \\
49 184 adas
%\hline &&\\
50 184 adas
%formula & PH, $\square_i$&&\\
51 184 adas
%               & bounded induction (Buss) &&\\
52 184 adas
%               \hline &&\\
53 184 adas
%equational &&& P\\
54 184 adas
%&&& (intrinsic theories: Leivant) \\
55 184 adas
%\hline &&\\
56 184 adas
%applicative &&PH & P \\
57 184 adas
% &&(Kahle-Oitavem)& (Cantini)
58 184 adas
%\end{tabular}
59 184 adas
%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
60 184 adas
%\item an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
61 184 adas
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
62 184 adas
%\item the setting we will consider:
63 184 adas
%\begin{itemize}
64 184 adas
%\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
65 184 adas
%\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
66 184 adas
%\end{itemize}
67 184 adas
%\item Our conjecture: ramified first-order modal classical logic with full induction, for equational programs, characterize the class PH.
68 184 adas
%
69 184 adas
%the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
70 184 adas
%\end{itemize}
71 184 adas
%
72 184 adas
%\newpage
73 184 adas
74 184 adas
\section{Introduction and motivation}
75 184 adas
Today, there are countless approaches towards characterising complexity classes via logic.
76 184 adas
Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory.
77 184 adas
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
78 184 adas
79 184 adas
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
80 184 adas
A somewhat orthogonal distinction is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}.
81 184 adas
82 184 adas
Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}.
83 184 adas
84 184 adas
In this line of work we attempt to ameliorate the situation by using implicit methods to delineate fine-grained hierarchies of feasible complexity classes, namely the \emph{polynomial hierarchy}, $\ph$.
85 184 adas
One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}.
86 184 adas
In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories.
87 184 adas
This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}.
88 184 adas
89 184 adas
\section{State of the art}
90 184 adas
As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory.
91 184 adas
As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.}
92 184 adas
%, distinguished by the type level of programs extracted:
93 184 adas
94 184 adas
\bigskip
95 184 adas
96 184 adas
\begin{tabular}{c|c|c}
97 184 adas
Class &	Ground & Higher order\\
98 184 adas
	\hline
99 184 adas
%	quantifiers  & type-level\\
100 184 adas
	$\nc^i$    & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\
101 184 adas
	$\ptime$  &  $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\
102 184 adas
	$\Box_i$  & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & -  \\
103 184 adas
	$\ph$& $S_2$ & - \\
104 184 adas
	$\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\
105 184 adas
%	$k$-$\exptime$ & -  & $\mathit{ELL}(k)$ \\
106 184 adas
	Elementary & $I\Delta_0 + \exp$  & $\mathit{ELL}\;  \cite{Girard94:lll}$
107 184 adas
\end{tabular}
108 184 adas
109 184 adas
\bigskip
110 184 adas
111 184 adas
\noindent
112 184 adas
Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'.
113 184 adas
%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture.
114 184 adas
%
115 184 adas
% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several
116 184 adas
  Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular:
117 184 adas
 \begin{itemize}
118 184 adas
   \item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra;
119 184 adas
   \item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra.
120 184 adas
 \end{itemize}
121 184 adas
We classify some known characterisations from the literature according to these two parameters in  the following table:
122 184 adas
\bigskip
123 184 adas
124 184 adas
\begin{tabular}{c|c|c}
125 184 adas
	{
126 184 adas
		%\small model of comp. $\backslash$ extracted program
127 184 adas
		} & bounded rec. programs & tiered rec. programs \\
128 184 adas
	\hline &&\\
129 184 adas
	formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\
130 184 adas
%	& bounded induction (Buss \cite{Buss86book}) &\\
131 184 adas
	\hline &&\\
132 184 adas
	equational && $\ptime$\\
133 184 adas
	&& (Leivant \cite{Leivant94:intrinsic-theories}) \\
134 184 adas
	\hline &&\\
135 184 adas
	applicative & $\ptime$ (Strahm \cite{Strahm03})  & $\ptime$ \\
136 184 adas
	&$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02})
137 184 adas
\end{tabular}
138 184 adas
139 184 adas
%TODO: improve table to make clear columns and rows, explicit and implicit columns.
140 184 adas
%
141 184 adas
%\begin{tabular}{c|c|c|c}
142 184 adas
%	{
143 184 adas
%		%\small model of comp. $\backslash$ extracted program
144 184 adas
%		} & Cobham & mon. constraints & BC-like \\
145 184 adas
%	\hline &&\\
146 184 adas
%	formula & PH, $\square_i$&&\\
147 184 adas
%	& bounded induction (Buss) &&\\
148 184 adas
%	\hline &&\\
149 184 adas
%	equational &&& P\\
150 184 adas
%	&&& (Leivant) \\
151 184 adas
%	\hline &&\\
152 184 adas
%	applicative &&PH & P \\
153 184 adas
%	&&(Kahle-Oitavem)& (Cantini)
154 184 adas
%\end{tabular}
155 184 adas
156 184 adas
\bigskip
157 184 adas
158 184 adas
\noindent
159 184 adas
%%% DICEFOPARA revision hereafter
160 184 adas
Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the formula style of specification (first row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
161 184 adas
%
162 184 adas
%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
163 184 adas
%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy.
164 184 adas
165 184 adas
\section{An implicit theory for $\ph$}
166 184 adas
%As we mentioned, the goal of this work-in-progress is to arrive at an implicit characterisation of PH.
167 184 adas
We explain our approach for this work-in-progress in more detail here, referring to previous work when analogous methods are used.
168 184 adas
169 184 adas
\subsection{Implicit programs for $\ph$}
170 184 adas
Since we want to remain at ground type, the natural programs in which to extract our witnesses will come from recursion theoretic characterisations, cf.\ the table above. Indeed, as we have already mentioned, we are not aware of any `higher-type' characterisation of $\ph$.
171 184 adas
Of these, only the Bellantoni framework from \cite{BellantoniThesis}, which extends BC-programs by \emph{predicative minimisation} constitutes an implicit characterisation, and so we will look to extract our programs into this function algebra, henceforth denoted $\mu$BC.
172 184 adas
173 184 adas
\subsection{Constraints on induction}
174 184 adas
An appealing feature of the bounded arithmetic approach is that bounds on (bounded) quantifier alternation in induction formulae precisely delimit the levels of $\ph$, and one of our desiderata is to replicate this property, only for unbounded quantifiers.
175 184 adas
Naturally, another constraint will be required to stop ourselves from exhausting the arithmetical hierarchy once bounds are dismissed, and for this we use essentially a \emph{ramification} of individuals: explicit predicates $N_0, N_1 , \dots$ will be used similarly to Peano's $N$ predicate to intuitively indicate `how sure' we are that a variable denotes a genuine natural number.
176 184 adas
177 184 adas
In fact, two predicates will suffice and their relationship is entirely governed by the equation $N_1 (x) \iff \square N_0 (x)$, under the laws of the modal logic $\mathit{S4}$.
178 184 adas
The distinction between the two predicates corresponds to the distinction between safe and normal variables in BC-like programs, which was an observation from previous work \cite{BaillotDas16}.
179 184 adas
A similar phenomenon occurs in Cantini's work \cite{Cantini02}, which presents a characterisation of $\ptime$ in an \emph{applicative theory}, in order to extract BC programs.
180 184 adas
While he allows arbitrary alternation of unbounded quantifiers, note that his induction is \emph{positive}, and so universal quantifiers cannot vary over certified natural numbers, i.e.\ individuals in $N$. In fact this sort of unbounded quantification is also compatible with our approach of \cite{BaillotDas16}.
181 184 adas
%with an approach in previous work where we characterised $\ptime$ in a \emph{linear logic}, also extracting BC programs %\cite{BaillotDas16}.
182 184 adas
183 184 adas
184 184 adas
185 184 adas
\subsection{Extraction at ground type}
186 184 adas
As we did in \cite{BaillotDas16}, we will rely on the \emph{witness function method} for extracting functions at bounded type.
187 184 adas
%This was pioneered by Buss, although independently used by Mints beforehand.
188 184 adas
The idea is as follows:
189 184 adas
\begin{enumerate}
190 184 adas
	\item\label{item:de-morgan} Reduce a proof to \emph{De Morgan} normal form, with formulae over the basis $\{ \bot, \top, \vee , \wedge , \exists, \wedge \}$ and negation restricted to atoms.
191 184 adas
	\item\label{item:free-cut} Conduct a \emph{free-cut elimination} on the proof, resulting in a proof whose formulae are restricted to
192 184 adas
	essentially just subformulae of the conclusion, axioms and nonlogical steps.
193 184 adas
	\item\label{item:interp} Extract witnesses inductively from the proof, with appropriate semantic properties of these programs verified by an interpretation into a (classical) quantifier-free theory.
194 184 adas
\end{enumerate}
195 184 adas
196 184 adas
\ref{item:de-morgan} ensures that our extraction works at ground type, rather than higher types which are typically necessary when negation has larger scope.
197 184 adas
At the same time it preserves the quantifier alternation information that is crucial to distinguishing the levels of $\ph$.
198 184 adas
\ref{item:free-cut} allows us to assume that all formulae in a proof have logical complexity bounded by that of induction formulae.
199 184 adas
This means that, when extracting programs via \ref{item:interp}, quantifier alternation of induction formulae corresponds to the depth of minimisation operators in a $\mu$BC program, and so potentially allows for a level-by-level correspondence with the polynomial hierarchy.
200 184 adas
201 184 adas
202 184 adas
We point out that, in some ways, this is similar to approaches from applicative theories, which typically use free-cut elimination followed by a direct \emph{realisability} argument, e.g.\ in \cite{Strahm03}, \cite{Cantini02} and \cite{KahOit:13:ph-levels}.
203 184 adas
Indeed this could have been possible in our previous work \cite{BaillotDas16}, as Cantini did in his work \cite{Cantini02}, for a characterisation of $\ptime$.
204 184 adas
However, in this case, since the quantifiers are unbounded the realisability argument is apparently not readily formalised, and it is therefore quite natural to pursue a \emph{bona fide} proof interpretation.
205 184 adas
206 184 adas
%%% Following part has been removed in the revised DICEFOPARA version
207 184 adas
%For this, it seems we need to go one level higher than type 1 functions to verify semantic properties of witnesses of first-order formulae, themselves considered as genuine type 1 functions. Intuitively this is simply an inlining of \emph{Skolemisation}, although the idea of extending `witness predicates' to type 1 objects resembles methods from second-order bounded arithmetic, e.g.\ \cite{Cook:2010:LFP:1734064}.
208 184 adas
%Unlike in the bounded arithmetic setting, due to the apparent unboundedness of programs in the $\mu$BC framework, we will need a formal witness predicate implemented itself as a BC-like program, hence the need for a proof interpretation rather than a realisability approach.
209 184 adas
%% since we cannot externally certify the complexity of the predicate when unbounded quantifiers abound.
210 184 adas
%Fortunately, we believe that it suffices to consider $\mu$BC-programs with \emph{holes}, rather than a full characterisation of type 2 $\ph$, but verifying that such an approach could work represents the outstanding technical component of this work-in-progress.
211 184 adas
212 184 adas
213 184 adas
	\subsection{Completeness for PH}
214 184 adas
	In the other direction, showing completeness for $\ph$, it seems straightforward to formalise a standard argument, e.g.\ from bounded arithmetic \cite{Buss86book}, where applications of minimisation in a program correspond to the \emph{well ordering property} in arithmetic.
215 184 adas
	This is in turn is a corollary of induction but, in this case, crucially relies on the use of \emph{right-contraction} in the logic.
216 184 adas
	It seems that this feature is crucial in distinguishing these theories from `linear' variants like in previous work \cite{BaillotDas16}, and in particular work of Bellantoni and Hofmann \cite{BelHof:02} where, without right-contraction, any number of quantifier alternations still corresponds to only polynomial time computation.
217 184 adas
218 184 adas
%	* PB: I would suggest to skip **
219 184 adas
%
220 184 adas
%	TODO or skip? If so just say that we formalise the standard argument (with explanation, e.g.\ minimisation, WOP, induction) but rely on safety of quantification rather than boundedness, which should come for free by inspection.
221 184 adas
%
222 184 adas
	\subsection{Putting it all together}
223 184 adas
224 184 adas
To summarise the main goal of this work-in-progress, we are aiming for a variation of the following result:
225 184 adas
226 184 adas
227 184 adas
\begin{conjecture*}
228 184 adas
	First-order classical modal logic $\mathit{S4}$ with induction restricted to non-modal formulae, over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
229 184 adas
\end{conjecture*}
230 184 adas
% ALTERNATIVE SUGGESTION
231 184 adas
%\begin{conjecture*}
232 184 adas
%	First-order ramified classical  logic with induction restricted to \textit{safe} formulae (that is to say not containing any $N_1$), over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
233 184 adas
%\end{conjecture*}
234 184 adas
235 184 adas
236 184 adas
%	As mentioned, we will
237 184 adas
%
238 184 adas
%	[copied]
239 184 adas
%
240 184 adas
%	%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
241 184 adas
%
242 184 adas
%	the setting we will consider:
243 184 adas
%	\begin{itemize}
244 184 adas
%		\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
245 184 adas
%		\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
246 184 adas
%	\end{itemize}
247 184 adas
%
248 184 adas
249 184 adas
%	the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
250 184 adas
%
251 184 adas
%
252 184 adas
%
253 184 adas
%\subsection{Extending previous work}
254 184 adas
%
255 184 adas
%
256 184 adas
%\subsection{Witness function method}
257 184 adas
%%keep this subsection?
258 184 adas
%
259 184 adas
%
260 184 adas
%\subsection{Relation to previous work}
261 184 adas
%
262 184 adas
%an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
263 184 adas
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
264 184 adas
265 184 adas
\section{Conclusions}
266 184 adas
We surveyed the state of the art for representing function classes proof theoretically by logics and theories, and considered the problem of finding an implicit characterisation of $\ph$.
267 184 adas
Identifying the witness function method as a useful tool for witness extraction at bounded type level, a seemingly important prerequisite for characterising $\ph$, we sought to calibrate an appropriate theory of arithmetic for witness extraction to the $\mu$BC characterisation of $\ph$.
268 184 adas
%We presented a conjecture that a ramified theory suffices to carry out this characterisation, based on previous work by ourselves and others
269 184 adas
We presented a conjecture that a modal theory suffices to carry out this characterisation, based on previous work by ourselves and others\cite{BaillotDas16} \cite{Cantini02} \cite{BelHof:02} and proving this result constitutes the outstanding work-in-progress.
270 184 adas
271 184 adas
\bibliographystyle{plain}
272 184 adas
\bibliography{biblio}
273 184 adas
274 184 adas
\end{document}