Statistiques
| Révision :

root / CharacterizingPH / LCC17 / lcc2017.tex @ 186

Historique | Voir | Annoter | Télécharger (23,22 ko)

1 184 adas
\documentclass[a4paper]{article}
2 184 adas
3 184 adas
\usepackage{amssymb}
4 186 adas
\usepackage{amsmath}
5 184 adas
\usepackage{amsthm}
6 184 adas
\usepackage{hyperref}
7 184 adas
\setcounter{tocdepth}{3}
8 184 adas
9 184 adas
\newtheorem*{conjecture*}{Conjecture}
10 186 adas
\newtheorem*{theorem*}{Theorem}
11 184 adas
\newcommand{\fph}{\mathbf{PH}}
12 184 adas
13 184 adas
14 184 adas
\title{An implicit characterisation of the polynomial hierarchy in an unbounded arithmetic }
15 184 adas
\author{Patrick Baillot \and Anupam Das}
16 184 adas
%\date{ Univ Lyon, CNRS, ENS de Lyon, Universit\'e Claude Bernard Lyon 1, LIP
17 184 adas
%	%\\[2ex] \today
18 184 adas
%	}
19 184 adas
\date{ Univ Lyon, CNRS, ENS de Lyon, UCB Lyon 1, LIP
20 184 adas
	%\\[2ex] \today
21 184 adas
	}
22 184 adas
	\newcommand{\ph}{\mathbf{PH}}
23 184 adas
	\newcommand{\pspace}{\mathbf{PSPACE}}
24 184 adas
	\newcommand{\fpspace}{\mathbf{FPSPACE}}
25 184 adas
	\newcommand{\ptime}{\mathbf{P}}
26 184 adas
	\newcommand{\fptime}{\mathbf{FP}}
27 184 adas
	\newcommand{\nc}{\mathbf{NC}}
28 184 adas
	\newcommand{\ac}{\mathbf{AC}}
29 184 adas
	\newcommand{\exptime}{\mathbf{EXP}}
30 184 adas
31 184 adas
32 184 adas
\begin{document}
33 184 adas
\maketitle
34 184 adas
35 184 adas
%\begin{itemize}
36 184 adas
%\item a big picture: logic methods for complexity classes:
37 184 adas
%
38 184 adas
%\begin{tabular}{c|c}
39 184 adas
%ground & higher-order\\
40 184 adas
%quantifiers  & type-level\\
41 184 adas
%PSPACE    & $k$-EXP\\
42 184 adas
%PH  &              P\\
43 184 adas
%P  &\\
44 184 adas
%$NC_i$&
45 184 adas
%\end{tabular}
46 184 adas
%
47 184 adas
%\item  state of the art on arithmetics for complexity classes:
48 184 adas
%
49 184 adas
%\begin{tabular}{c|c|c|c}
50 184 adas
%{\small model of comp. $\backslash$ extracted program } & Cobham & mon. constraints & BC-like \\
51 184 adas
%\hline &&\\
52 184 adas
%formula & PH, $\square_i$&&\\
53 184 adas
%               & bounded induction (Buss) &&\\
54 184 adas
%               \hline &&\\
55 184 adas
%equational &&& P\\
56 184 adas
%&&& (intrinsic theories: Leivant) \\
57 184 adas
%\hline &&\\
58 184 adas
%applicative &&PH & P \\
59 184 adas
% &&(Kahle-Oitavem)& (Cantini)
60 184 adas
%\end{tabular}
61 184 adas
%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
62 184 adas
%\item an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
63 184 adas
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
64 184 adas
%\item the setting we will consider:
65 184 adas
%\begin{itemize}
66 184 adas
%\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
67 184 adas
%\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
68 184 adas
%\end{itemize}
69 184 adas
%\item Our conjecture: ramified first-order modal classical logic with full induction, for equational programs, characterize the class PH.
70 184 adas
%
71 184 adas
%the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
72 184 adas
%\end{itemize}
73 184 adas
%
74 184 adas
%\newpage
75 184 adas
76 184 adas
\section{Introduction and motivation}
77 184 adas
Today, there are countless approaches towards characterising complexity classes via logic.
78 184 adas
Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory.
79 184 adas
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
80 184 adas
81 184 adas
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
82 184 adas
A somewhat orthogonal distinction is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}.
83 184 adas
84 186 adas
While implicit constraints may be preferable since no bounds occur in the characterisation itself \emph{per se}, explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes. For instance, the polynomial hierarchy, $\ph$, and its levels can be neatly characterised by the theories $S^i_2$ of \emph{bounded arithmetic}, using bounds on quantifiers to control complexity \cite{Buss86book}.\footnote{Other approaches to $\ph$ exist, but also use explicit bounds, e.g.\ \cite{Cook:2010:LFP:1734064}, \cite{KahOit:13:ph-levels}.}
85 186 adas
%
86 186 adas
%Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}.
87 186 adas
%
88 184 adas
89 186 adas
In this work we improve the situation by using implicit methods in first-order theories to characterise $\ph$.
90 186 adas
To achieve this we work with a function algebra of Bellantoni from \cite{BellantoniThesis} in which to extract programs, and use the \emph{witness function method} of Buss to extract programs at ground type and preserve quantifier information, necessary to delineate the levels of $\ph$.
91 184 adas
92 186 adas
%One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}.
93 186 adas
%In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories.
94 186 adas
%This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}.
95 184 adas
96 186 adas
%\section{State of the art}
97 186 adas
%As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory.
98 186 adas
%As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.}
99 186 adas
%%, distinguished by the type level of programs extracted:
100 184 adas
%
101 186 adas
%\bigskip
102 184 adas
%
103 186 adas
%\begin{tabular}{c|c|c}
104 186 adas
%Class &	Ground & Higher order\\
105 186 adas
%	\hline
106 186 adas
%%	quantifiers  & type-level\\
107 186 adas
%	$\nc^i$    & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\
108 186 adas
%	$\ptime$  &  $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\
109 186 adas
%	$\Box_i$  & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & -  \\
110 186 adas
%	$\ph$& $S_2$ & - \\
111 186 adas
%	$\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\
112 186 adas
%%	$k$-$\exptime$ & -  & $\mathit{ELL}(k)$ \\
113 186 adas
%	Elementary & $I\Delta_0 + \exp$  & $\mathit{ELL}\;  \cite{Girard94:lll}$
114 186 adas
%\end{tabular}
115 186 adas
%
116 186 adas
%\bigskip
117 186 adas
%
118 186 adas
%\noindent
119 186 adas
%Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'.
120 186 adas
%%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture.
121 186 adas
%%
122 186 adas
%% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several
123 186 adas
%  Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular:
124 186 adas
% \begin{itemize}
125 186 adas
%   \item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra;
126 186 adas
%   \item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra.
127 186 adas
% \end{itemize}
128 186 adas
%We classify some known characterisations from the literature according to these two parameters in  the following table:
129 186 adas
%\bigskip
130 186 adas
%
131 186 adas
%\begin{tabular}{c|c|c}
132 184 adas
%	{
133 184 adas
%		%\small model of comp. $\backslash$ extracted program
134 186 adas
%		} & bounded rec. programs & tiered rec. programs \\
135 184 adas
%	\hline &&\\
136 186 adas
%	formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\
137 186 adas
%%	& bounded induction (Buss \cite{Buss86book}) &\\
138 184 adas
%	\hline &&\\
139 186 adas
%	equational && $\ptime$\\
140 186 adas
%	&& (Leivant \cite{Leivant94:intrinsic-theories}) \\
141 184 adas
%	\hline &&\\
142 186 adas
%	applicative & $\ptime$ (Strahm \cite{Strahm03})  & $\ptime$ \\
143 186 adas
%	&$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02})
144 184 adas
%\end{tabular}
145 186 adas
%
146 186 adas
%%TODO: improve table to make clear columns and rows, explicit and implicit columns.
147 186 adas
%%
148 186 adas
%%\begin{tabular}{c|c|c|c}
149 186 adas
%%	{
150 186 adas
%%		%\small model of comp. $\backslash$ extracted program
151 186 adas
%%		} & Cobham & mon. constraints & BC-like \\
152 186 adas
%%	\hline &&\\
153 186 adas
%%	formula & PH, $\square_i$&&\\
154 186 adas
%%	& bounded induction (Buss) &&\\
155 186 adas
%%	\hline &&\\
156 186 adas
%%	equational &&& P\\
157 186 adas
%%	&&& (Leivant) \\
158 186 adas
%%	\hline &&\\
159 186 adas
%%	applicative &&PH & P \\
160 186 adas
%%	&&(Kahle-Oitavem)& (Cantini)
161 186 adas
%%\end{tabular}
162 186 adas
%
163 186 adas
%\bigskip
164 186 adas
%
165 186 adas
%\noindent
166 186 adas
%%%% DICEFOPARA revision hereafter
167 186 adas
%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the formula style of specification (first row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
168 186 adas
%%
169 186 adas
%%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
170 186 adas
%%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy.
171 184 adas
172 184 adas
173 186 adas
\section{Methodology}
174 186 adas
We describe some of the techniques used in this work, before briefly giving our main results in the next section.
175 184 adas
176 184 adas
\subsection{Implicit programs for $\ph$}
177 186 adas
Extracting programs at ground type seems to be a necessity in order to delineate the levels of $\ph$.\footnote{Indeed we are not aware of any `higher-type' characterisation of $\ph$.} Therefore the natural programs in which to extract our witnesses will come from \emph{recursion theoretic} characterisations.
178 186 adas
Of these, only the Bellantoni framework from \cite{BellantoniThesis}, which extends safe recursive programs \cite{BellantoniCook92} by \emph{predicative minimisation} constitutes an implicit characterisation, and so we extract our programs into this function algebra, henceforth denoted $\mu$BC.
179 184 adas
180 184 adas
\subsection{Constraints on induction}
181 186 adas
An appealing feature of the bounded arithmetic approach is that bounds on (bounded) quantifier alternation in induction formulae precisely delimit the levels of $\ph$, and we are able to replicate this property, only for unbounded quantifiers.
182 186 adas
Naturally, another constraint is required to stop ourselves from exhausting the arithmetical hierarchy once bounds are dismissed, and for this we use essentially a \emph{ramification} of individuals: explicit predicates $N_0, N_1 , \dots$ are used similarly to Peano's $N$ predicate to intuitively indicate `how sure' we are that a variable denotes a genuine natural number.
183 184 adas
184 186 adas
In fact, two predicates suffice and their relationship is entirely governed by the equation $N_1 (x) \iff \square N_0 (x)$, under the laws of the modal logic $\mathit{S4}$.
185 186 adas
The distinction between the two predicates corresponds to the distinction between safe and normal variables in BC  programs, which was an observation from previous work \cite{BaillotDas16}.
186 184 adas
A similar phenomenon occurs in Cantini's work \cite{Cantini02}, which presents a characterisation of $\ptime$ in an \emph{applicative theory}, in order to extract BC programs.
187 184 adas
While he allows arbitrary alternation of unbounded quantifiers, note that his induction is \emph{positive}, and so universal quantifiers cannot vary over certified natural numbers, i.e.\ individuals in $N$. In fact this sort of unbounded quantification is also compatible with our approach of \cite{BaillotDas16}.
188 184 adas
%with an approach in previous work where we characterised $\ptime$ in a \emph{linear logic}, also extracting BC programs %\cite{BaillotDas16}.
189 184 adas
190 184 adas
191 184 adas
192 184 adas
\subsection{Extraction at ground type}
193 186 adas
We rely on the \emph{witness function method} for extracting functions at bounded type.
194 184 adas
%This was pioneered by Buss, although independently used by Mints beforehand.
195 184 adas
The idea is as follows:
196 184 adas
\begin{enumerate}
197 184 adas
	\item\label{item:de-morgan} Reduce a proof to \emph{De Morgan} normal form, with formulae over the basis $\{ \bot, \top, \vee , \wedge , \exists, \wedge \}$ and negation restricted to atoms.
198 184 adas
	\item\label{item:free-cut} Conduct a \emph{free-cut elimination} on the proof, resulting in a proof whose formulae are restricted to
199 184 adas
	essentially just subformulae of the conclusion, axioms and nonlogical steps.
200 184 adas
	\item\label{item:interp} Extract witnesses inductively from the proof, with appropriate semantic properties of these programs verified by an interpretation into a (classical) quantifier-free theory.
201 186 adas
	\end{enumerate}
202 184 adas
203 186 adas
	\ref{item:de-morgan} ensures that our extraction works at ground type, rather than higher types which are typically necessary when negation has larger scope.
204 186 adas
	At the same time it preserves the quantifier alternation information that is crucial to distinguishing the levels of $\ph$.
205 186 adas
	\ref{item:free-cut} allows us to assume that all formulae in a proof have logical complexity bounded by that of induction formulae.
206 186 adas
	This means that, when extracting programs via \ref{item:interp}, quantifier alternation of induction formulae corresponds to the depth of minimisation operators in a $\mu$BC program, allowing for a level-by-level correspondence with the polynomial hierarchy.
207 184 adas
208 186 adas
209 186 adas
%	We point out that, in some ways, this is similar to approaches from applicative theories, which typically use free-cut elimination followed by a direct \emph{realisability} argument, e.g.\ in \cite{Strahm03}, \cite{Cantini02} and \cite{KahOit:13:ph-levels}.
210 186 adas
%	Indeed this could have been possible in our previous work \cite{BaillotDas16}, as Cantini did in his work \cite{Cantini02}, for a characterisation of $\ptime$.
211 186 adas
%	However, in this case, since the quantifiers are unbounded the realisability argument is apparently not readily formalised, and it is therefore quite natural to pursue a \emph{bona fide} proof interpretation.
212 186 adas
213 186 adas
	%%% Following part has been removed in the revised DICEFOPARA version
214 186 adas
	%For this, it seems we need to go one level higher than type 1 functions to verify semantic properties of witnesses of first-order formulae, themselves considered as genuine type 1 functions. Intuitively this is simply an inlining of \emph{Skolemisation}, although the idea of extending `witness predicates' to type 1 objects resembles methods from second-order bounded arithmetic, e.g.\ \cite{Cook:2010:LFP:1734064}.
215 186 adas
	%Unlike in the bounded arithmetic setting, due to the apparent unboundedness of programs in the $\mu$BC framework, we will need a formal witness predicate implemented itself as a BC-like program, hence the need for a proof interpretation rather than a realisability approach.
216 186 adas
	%% since we cannot externally certify the complexity of the predicate when unbounded quantifiers abound.
217 186 adas
	%Fortunately, we believe that it suffices to consider $\mu$BC-programs with \emph{holes}, rather than a full characterisation of type 2 $\ph$, but verifying that such an approach could work represents the outstanding technical component of this work-in-progress.
218 186 adas
219 186 adas
220 184 adas
	\subsection{Completeness for PH}
221 186 adas
	In the other direction, showing completeness for $\ph$, we are able to formalise a more-or-less standard argument, e.g.\ from bounded arithmetic \cite{Buss86book}, where applications of minimisation in a program correspond to applications of the \emph{well ordering property} in arithmetic.
222 184 adas
	This is in turn is a corollary of induction but, in this case, crucially relies on the use of \emph{right-contraction} in the logic.
223 184 adas
	It seems that this feature is crucial in distinguishing these theories from `linear' variants like in previous work \cite{BaillotDas16}, and in particular work of Bellantoni and Hofmann \cite{BelHof:02} where, without right-contraction, any number of quantifier alternations still corresponds to only polynomial time computation.
224 184 adas
225 186 adas
	%	* PB: I would suggest to skip **
226 186 adas
	%
227 186 adas
	%	TODO or skip? If so just say that we formalise the standard argument (with explanation, e.g.\ minimisation, WOP, induction) but rely on safety of quantification rather than boundedness, which should come for free by inspection.
228 186 adas
	%
229 184 adas
230 184 adas
231 184 adas
232 186 adas
	%\begin{conjecture*}
233 186 adas
	%	First-order classical modal logic $\mathit{S4}$ with induction restricted to non-modal formulae, over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
234 186 adas
	%\end{conjecture*}
235 186 adas
	% ALTERNATIVE SUGGESTION
236 186 adas
	%\begin{conjecture*}
237 186 adas
	%	First-order ramified classical  logic with induction restricted to \textit{safe} formulae (that is to say not containing any $N_1$), over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
238 186 adas
	%\end{conjecture*}
239 184 adas
240 184 adas
241 186 adas
	%	As mentioned, we will
242 186 adas
	%
243 186 adas
	%	[copied]
244 186 adas
	%
245 186 adas
	%	%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
246 186 adas
	%
247 186 adas
	%	the setting we will consider:
248 186 adas
	%	\begin{itemize}
249 186 adas
	%		\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
250 186 adas
	%		\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
251 186 adas
	%	\end{itemize}
252 186 adas
	%
253 184 adas
254 186 adas
	%	the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
255 186 adas
	%
256 186 adas
	%
257 186 adas
	%
258 186 adas
	%\subsection{Extending previous work}
259 186 adas
	%
260 186 adas
	%
261 186 adas
	%\subsection{Witness function method}
262 186 adas
	%%keep this subsection?
263 186 adas
	%
264 186 adas
	%
265 186 adas
	%\subsection{Relation to previous work}
266 186 adas
	%
267 186 adas
	%an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
268 186 adas
	%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
269 184 adas
270 186 adas
\section{Results}
271 186 adas
%As we mentioned, the goal of this work-in-progress is to arrive at an implicit characterisation of PH.
272 186 adas
%We explain our approach in more detail here.
273 186 adas
Due to space constraints, we give only an informal account of our results.
274 184 adas
275 186 adas
\medskip
276 186 adas
277 186 adas
\noindent
278 186 adas
	We define a family of theories $B^i$ over the language $\{0,s,+,\times, \# , |\cdot|,\lfloor \frac{\cdot}{2} \rfloor \}$ of bounded arithmetic augmented with two predicates, $N_0$ and $N_1$, which act as ramifiers for our theory.
279 186 adas
	These replicate the distinction between safe and normal input, respectively, for $\mu$BC programs.
280 186 adas
		We set $N_1 \subseteq N_0$ and crucially have the following non-logical inference step:\footnote{Seen from the modal point of view, this is a form of \emph{necessitation} for models whose second-order parts are closed under first-order comprehension.}
281 186 adas
	\[
282 186 adas
	\frac{\vdash \forall \vec x \in N_1 . \exists \vec y \in N_0 . A(\vec x , \vec y)}{\vdash \forall \vec x \in N_1 . \exists \vec y \in N_1 . A(\vec x , \vec y)}
283 186 adas
	\]
284 186 adas
285 186 adas
286 186 adas
287 186 adas
	For the arithmetic function symbols we give their basic defining axioms as for the theories $S^i_2$ from \cite{Buss86book}, only relativising quantifiers to match their safe-normal sorting of arguments from the Bellantoni-Cook framework.\footnote{For instance, $s, +, |\cdot|,\lfloor \frac{\cdot}{2} \rfloor $ take $N_0$ arguments, $\times$ takes one $N_0$ and one $N_1$, and $\#$ takes two $N_1$ arguments. All terms are in $N_0$.}
288 186 adas
289 186 adas
	We define the $\Sigma^{N_0}_i $-$\Pi^{N_0}_i$ formula hierarchy analogously to the (bounded) arithmetical hierarchy, only counting alternations of `safe quantifiers', i.e.\ those relativised to $N_0$.
290 186 adas
	The theory $B^i_2$ contains the axiom schema of \emph{normal polynomial induction} on $\Sigma^{N_0}_i$ formulae $A$:
291 186 adas
	\[
292 186 adas
	\left(A(0) \wedge \forall u \in N_1 . (A\left(\lfloor \tfrac{u}{2} \rfloor\right) \supset A(u) )\right) \supset \forall u \in N_1 . A(u)
293 186 adas
	\]
294 186 adas
%	where $A$ is $\Sigma^{N_0}_i$.
295 186 adas
296 186 adas
	Our main result is the following:
297 186 adas
	\begin{theorem*}
298 186 adas
		$B^i_2$ proves the totality of precisely the $\Box^p_i$ functions.
299 186 adas
	\end{theorem*}
300 186 adas
301 186 adas
302 186 adas
303 186 adas
304 186 adas
%\section{Conclusions}
305 186 adas
%We surveyed the state of the art for representing function classes proof theoretically by logics and theories, and considered the problem of finding an implicit characterisation of $\ph$.
306 186 adas
%Identifying the witness function method as a useful tool for witness extraction at bounded type level, a seemingly important prerequisite for characterising $\ph$, we sought to calibrate an appropriate theory of arithmetic for witness extraction to the $\mu$BC characterisation of $\ph$.
307 186 adas
%%We presented a conjecture that a ramified theory suffices to carry out this characterisation, based on previous work by ourselves and others
308 186 adas
%We presented a conjecture that a modal theory suffices to carry out this characterisation, based on previous work by ourselves and others\cite{BaillotDas16} \cite{Cantini02} \cite{BelHof:02} and proving this result constitutes the outstanding work-in-progress.
309 186 adas
310 184 adas
\bibliographystyle{plain}
311 184 adas
\bibliography{biblio}
312 184 adas
313 184 adas
\end{document}