Révision 219

CSL17/soundness.tex (revision 219)
70 70
	\]
71 71
\end{definition}
72 72

  
73
\anupam{Above and below definitions need to be with respect to a typing of variables which terms respect.}
73 74

  
75

  
74 76
\begin{proposition}
75 77
	$\charfn{}{A} (l, \vec u ; \vec x)$ is the characteristic function of $A (\vec u \mode l ; \vec x \mode l)$.
76 78
\end{proposition}
......
78 80
\begin{definition}
79 81
	[Length bounded witness function]
80 82
	We now define $\Wit{\vec u ; \vec x}{A} (l , \vec u ; \vec x)$ for a $\Sigma_{i+1}$-formula $A$ with free variables amongst $\vec u; \vec x$.
81
	\[
82
	\begin{array}{rcl}
83
	\Wit{\vec u ; \vec x}{A} (l, \vec u ; \vec x , w) & \dfn & \charfn{}{A} (l, \vec u ; \vec x)  \text{ if $A$ is $\Pi_i$} \\
84
	\smallskip
85
	\Wit{\vec u ; \vec x}{A \cor B} (l,\vec u ; \vec x , \vec w^A , \vec w^B) & \dfn & \cor ( ; \Wit{\vec u ; \vec x}{A} (l,\vec u ; \vec x , \vec w^A) ,\Wit{\vec u ; \vec x}{B} (l,\vec u ; \vec x , \vec w^B)  )  \\
86
	\smallskip
87
	\Wit{\vec u ; \vec x}{A \cand B} (l,\vec u ; \vec x , \vec w^A , \vec w^B) & \dfn & \cand ( ; \Wit{\vec u ; \vec x}{A} (l,\vec u ; \vec x , \vec w^A) ,\Wit{\vec u ; \vec x}{B} (l,\vec u ; \vec x , \vec w^B)  )  \\
88
	\smallskip
89
	\Wit{\vec u ; \vec x}{\exists x^\safe . A(x)} (l,\vec u ; \vec x , \vec w , w) & \dfn & \Wit{\vec u ; \vec x , x}{A(x)} ( l,\vec u ; \vec x , w , \vec w )
90
	\\
91
	\smallskip
92
	\Wit{\vec u ; \vec x}{\forall u \leq |t(\vec u;)| . A(x)} (l , \vec u ; \vec x, w) & \dfn & 
93
	\forall u \leq |t(\vec u;)| . \Wit{u , \vec u ; \vec x}{A(u)} (l, u , \vec u ; \vec x, \beta(u;w) )
94
	\end{array}
95
	\]
83
	For a $\Sigma^\safe_i$ formula $A$ with free variables amongst $(\vec u ; \vec x)$, with $\vec x$ occurring only hereditarily safe in terms, we define the \emph{length-bounded witness function} $\wit{\vec u ; \vec x}{A} (l, \vec u ; \vec x , w)$ and its \emph{bounding polynomial} $b_A (l)$ as follows:
84
	\begin{itemize}
85
		\item If $A$ is $\Pi^\safe_{i-1}$ then $\wit{\vec u ; \vec x}{A} (l, \vec u ; \vec x , w) \dfn \charfn{\vec u ; \vec x}{A} (l, \vec u ; \vec x )$.
86
		\item If $A$ is $B \cor C$ then 
87
		\[
88
		\wit{\vec u ; \vec x}{A} (l, \vec u ;\vec x , w) 
89
		\quad \dfn \quad
90
		\orfn ( ; \wit{\vec u ; \vec x}{B} (l, \vec u ; \vec x , \beta (b_B (l) , 0 ; w ) ) , \wit{\vec u ; \vec x}{C} (l, \vec u ; \vec x , \beta (b_C (l) , 0 ; w ) )  )
91
		\]
92
		and we may set $b_A = O(b_B + b_C)$.
93
		\item Similarly if $A $ is $B \cand C$, but with $\andfn$ in place of $\orfn$.
94
%		\item If $A$ is $B \cand C$ then
95
%			\[
96
%			\wit{\vec u ; \vec x}{A} (l, \vec u ;\vec x , w) 
97
%			\quad \dfn \quad
98
%			\andfn ( ; \wit{\vec u ; \vec x}{B} (l, \vec u ; \vec x , \beta (b_B (l) , 0 ; w ) ) , \wit{\vec u ; \vec x}{C} (l, \vec u ; \vec x , \beta (b_C (l) , 0 ; w ) )  )
99
%			\]
100
%			and we may set $b_A = O(b_B + b_C)$.
101
		\item If $A$ is $\forall u \leq |t(\vec u;)| . B(u)$ then 
102
		\[
103
		\wit{\vec u ; \vec x}{A}
104
		\quad \dfn\quad
105
		\forall u\normal \leq |t|.
106
		\wit{u, \vec u ; \vec x}{B(u)} (l, u, \vec u ; \vec x , \beta( b_{B(t)} (l) , u ; w ) )
107
		\]
108
		appealing to Lemma~\ref{lem:sharply-bounded-recursion}, where we may set $b_A = O(b_{B(t)}^2 )$.
109
		\item Similarly if $A$ is $\exists u^\normal \leq |t(\vec u;)|. A'(u)$, but with $\exists u \leq |t|$ in place of $\forall u \leq |t|$.
110
		\item If $A$ is $\exists x^\safe . B(x) $ then
111
		\[
112
		\wit{\vec u ; \vec x}{A}
113
		\quad \dfn \quad
114
		\wit{\vec u ; \vec x , x}{B(x)} ( l, \vec u ; \vec x , \beta( b_{B} (l) , 0;w ) , \beta (q(l) , 1 ;w ))
115
		\]
116
		where $q$ is obtained by the polychecking and bounded minimisation lemmata for $\wit{\vec u ; \vec x , x}{B(x)}$.
117
		We may set $b_A = O(b_B + q )$.
118
	\end{itemize}
119
%	\[
120
%	\begin{array}{rcl}
121
%	\wit{\vec u ; \vec x}{A} (l, \vec u ; \vec x , w) & \dfn & \charfn{}{A} (l, \vec u ; \vec x)  \text{ if $A$ is $\Pi_i$} \\
122
%	\smallskip
123
%	\wit{\vec u ; \vec x}{A \cor B} (l,\vec u ; \vec x , \vec w^A , \vec w^B) & \dfn & \cor ( ; \wit{\vec u ; \vec x}{A} (l,\vec u ; \vec x , \vec w^A) ,\wit{\vec u ; \vec x}{B} (l,\vec u ; \vec x , \vec w^B)  )  \\
124
%	\smallskip
125
%	\wit{\vec u ; \vec x}{A \cand B} (l,\vec u ; \vec x , \vec w^A , \vec w^B) & \dfn & \cand ( ; \wit{\vec u ; \vec x}{A} (l,\vec u ; \vec x , \vec w^A) ,\wit{\vec u ; \vec x}{B} (l,\vec u ; \vec x , \vec w^B)  )  \\
126
%	\smallskip
127
%	\wit{\vec u ; \vec x}{\exists x^\safe . A(x)} (l,\vec u ; \vec x , \vec w , w) & \dfn & \wit{\vec u ; \vec x , x}{A(x)} ( l,\vec u ; \vec x , w , \vec w )
128
%	\\
129
%	\smallskip
130
%	\wit{\vec u ; \vec x}{\forall u \leq |t(\vec u;)| . A(x)} (l , \vec u ; \vec x, w) & \dfn & 
131
%	\forall u \leq |t(\vec u;)| . \wit{u , \vec u ; \vec x}{A(u)} (l, u , \vec u ; \vec x, \beta(u;w) )
132
%	\end{array}
133
%	\]
134
%	\anupam{need length bounding for sharply bounded quantifiers}
96 135
\end{definition}
97 136

  
98 137
\anupam{may as well use a single witness variable since need it for sharply bounded quantifiers anyway.}
......
105 144
	\anupam{check statement, need proof-theoretic version?}
106 145
\end{proposition}
107 146

  
147
By the polychecking lemma, we can assume that such a $w$ is bounded by some polynomial in $l$.
148

  
108 149
In order to prove Thm.~\ref{thm:soundness} we need the following lemma:
109 150

  
110 151

  
152
\paragraph*{Two properties needed}
153
For below, need witnesses and functions bounded by a polynomial in $l$.
154

  
111 155
\begin{lemma}
112
	[Proof interpretation]
113
	\label{lem:proof-interp}
114
	For any $\arith^i$ proof of a $\Sigma^\safe_i$ sequent $\Gamma \seqar \Delta$, there is a $\mubci{i-1}$ function $f$ such that, for any $l, \vec u , \vec x  , w$, we have:
156
		[Proof interpretation]
157
		\label{lem:proof-interp}
158
	From a normal form \todo{define, prove exists} $\arith^i$ proof $\pi$ of a $\Sigma^\safe_i$ sequent $\normal(\vec u), \safe(\vec x) , \Gamma  \seqar \Delta$
159
	there are $\mubci{i-1}$ functions $\vec f^\pi (\vec u ; \vec x , w)$ (where $\vec f^\pi = (f^\pi_B)_{B\in\Delta}$) such that, for any $l, \vec u ; \vec x  , w$, we have:
115 160
	\[
116
	\wit{\vec u ; \vec x}{ \wedge \Gamma } (l, \vec u ; \vec x , w) 
117
	\quad \leq \quad
118
	\wit{\vec u ; \vec x}{\vee \Delta} (l, \vec u ; \vec x , f(l, \vec u ; \vec x , w))
161
%	\vec a^\nu = \vec u ,
162
%	\vec b^\sigma = \vec u, 
163
	\bigwedge\limits_{A \in \Gamma} \wit{\vec u ; \vec x}{ A} (l, \vec u ; \vec x , w_A) =1
164
	\quad \implies \quad
165
	\bigvee\limits_{B\in \Delta} \wit{\vec u ; \vec x}{B} (l, \vec u ; \vec x , f^\pi_B(\vec u \mode l ; \vec x \mode l, \vec w)) = 1
119 166
	\]
120
	\anupam{maybe want $f(\vec u \mode l ; \vec x \mode l , w)$}
121
	\anupam{Also, perhaps split for formulae of $\Gamma$, to avoid lots of (de)coding}
167
	\anupam{Need $\vec w \mode p(l)$ for some $p$.}
168
	\anupam{$l$ may occur freely in the programs $f^\pi_B$}
122 169
\end{lemma}
170
For the implication above, let us simply refer to the LHS as $\Wit{\vec u ; \vec x}{\Gamma} (l , \vec u ; \vec x , \vec w)$ and the RHS as $\Wit{\vec u ; \vec x}{ \Delta} (l, \vec u ; \vec x , \vec w')$, with $\vec w'$ in place of $\vec f( \cdots )$, which is a slight abuse of notation: we assume that LHS and RHS are clear from context.
171

  
123 172
\begin{proof}
124
	We assume the proof, say $\pi$, is in integer positive free-cut free form, by the results from the previous section.
125
	This means that the predicate $\charfn{\vec u ; \vec x}{A}$ is defined for each formula $A(\vec u ; \vec x)$ occurring in a proof, so the theorem is well-stated.
173
	Since the proof is in typed variable normal form we have that each line of the proof is of the same form, i.e.\ $\normal (\vec u), \safe (\vec x) , \Gamma \seqar \Delta$ over free variables $\vec u ; \vec x$.
126 174
	We define the function $f$ inductively, by considering the various final rules of $\pi$.
127 175
	
176
	
128 177
	\paragraph*{Negation}
129 178
	Can assume only on atomic formulae, so no effect.	
179
	
180
	\paragraph*{Logical rules}
181
	Pairing, depairing. Need length-boundedness.
182
	
183
	If we have a left conjunction step:
184
	\[
185
	\vlinf{\lefrul{\cand}}{}{ \normal (\vec u ), \safe (\vec x) , A\cand B , \Gamma \seqar \Delta }{ \normal (\vec u ), \safe (\vec x) , A, B , \Gamma \seqar \Delta}
186
	\]
187
		By inductive hypothesis we have functions $\vec f (\vec u ; \vec x , w_A , w_B , \vec w)$ such that,
188
		\[
189
		\Wit{\vec u ; \vec x}{\Gamma} (l, \vec u ; \vec x , w_A , w_B , \vec w)
190
		\quad \implies \quad
191
		\Wit{\vec u ; \vec x}{\Delta} (l, \vec u ; \vec x , \vec f ( (\vec u ; \vec x) \mode l , (w_A , w_B , \vec w) \mode p(l) ))
192
		\]
193
	for some polynomial $p$.
194
	%
195
		We define $\vec f^\pi (\vec u ; \vec x , w , \vec w) \dfn \vec f (\vec u ; \vec x , \beta (p(l),0; w) , \beta(p(l),1;w),\vec w )$ and, by the bounding polynomial for pairing, it suffices to set $p^\pi = O(p)$.
196
	
197
	
198
	Right disjunction step:
199
	\[
200
		\vlinf{\rigrul{\cor}}{}{ \normal (\vec u ), \safe (\vec x) , \Gamma \seqar \Delta , A \cor B}{ \normal (\vec u ), \safe (\vec x) , \Gamma \seqar \Delta, A, B }
201
	\]
202
		$\vec f^\pi_\Delta$ remains the same as that of premiss.
203
		Let $f_A, f_B$ be the functions corresponding to $A$ and $B$ in the premiss, so that:
204
		\[
205
		\Wit{\vec u ; \vec x}{\Gamma} (l, \vec u ; \vec x , \vec w)
206
		\quad \implies \quad
207
		\Wit{\vec u ; \vec x}{\Delta} (l, \vec u ; \vec x , f_C ( (\vec u ; \vec x) \mode l , \vec w \mode p(l) ))		
208
		\]
209
		for $C = A,B$ and for some $p$, such that $f_A , f_B$ are bounded by $q(l)$ (again by IH).
210
		We define $f^\pi_{A\cor B} (\vec u ; \vec x, \vec w) \dfn \pair{q(l)}{f_A ((\vec u ; \vec x, \vec w))}{f_B ((\vec u ; \vec x, \vec w))}$.
130 211
	\paragraph*{Quantifiers}
131 212
	\anupam{Do $\exists$-right and $\forall$-right, left rules are symmetric.}
132 213
	
214
	
215
	
216
	Sharply bounded quantifiers are generalised versions of logical rules.
217
	\[
218
	\vlinf{|\forall|}{}{\normal (\vec u) , \safe (\vec x) , \Gamma \seqar  \Delta , \forall u^\normal \leq |t(\vec u;)| . A(u) }{ \normal(u) , \normal (\vec u) , \safe (\vec x) , u \leq |t(\vec u;)| , \Gamma \seqar  \Delta, A(u)  }
219
	\]
220
	By the inductive hypothesis we have functions $\vec f(u , \vec u ; \vec x , w , \vec w)$ such that:
221
	\[
222
	\Wit{u ,\vec u ; \vec x}{\lhs} ( u , \vec u ;\vec x , w , \vec w )
223
	\quad \implies \quad
224
	\Wit{u , \vec u ; \vec x}{\rhs} (u, \vec u ; \vec x , \vec f ((\vec u ; \vec x) \mode l , \vec w \mode p(l) ) )
225
	\]
226
	with $|f|\leq q(|l|)$.
227
	
228
	By Lemma~\ref{lem:sequence-creation}, we have a function $F (l , u , \vec u ; \vec x , w , \vec w) $ such that....
229
	
230
	We set $f^\pi_{\forall u^\normal \leq t . A} (\vec u ; \vec x , \vec w) \dfn F(q(|l|), t(\vec u;), \vec u ; \vec x , 0, \vec w  )$.
231
	
232
	
233
	Right existential:
234
	\[
235
	\vlinf{\rigrul{\exists}}{}{\normal(\vec u ) , \safe (\vec x) , \Gamma \seqar \Delta , \exists x . A(x)}{\normal(\vec u ) , \safe (\vec x) , \Gamma \seqar \Delta , A(t)}
236
	\]
237
	Here we assume the variables of $t$ are amongst $(\vec u ; \vec x)$, since we are in typed variable normal form.
238

  
239
	
133 240
	\paragraph*{Contraction}
134 241
	Left contraction simply duplicates an argument, whereas right contraction requires a conditional on a $\Sigma^\safe_i$ formula.
135 242

  
243
	\[
244
	\vlinf{\cntr}{}{\normal (\vec u) , \safe (\vec x) , \Gamma \seqar \Delta , A }{\normal (\vec u) , \safe (\vec x) , \Gamma \seqar \Delta , A , A}
245
	\]
246
	
247
	$\vec f^\pi_\Delta$ remains the same as that of premiss. Let $f_0 ,f_1$ correspond to the two copies of $A$ in the premiss.
248
	 We define:
249
	 \[
250
	 f^\pi_A ( \vec u ; \vec x , \vec w  )
251
	 \quad \dfn \quad
252
	 \cond (; \wit{\vec u ; \vec x}{A} ( l , \vec u ; \vec x , f_0(\vec u ; \vec x , \vec w) ) , f_1(\vec u ; \vec x , \vec w) , f_0(\vec u ; \vec x , \vec w)  )
253
	 \]
254

  
255

  
256
	\anupam{For $\normal (\vec u), \safe (\vec x)$ in antecedent, we always consider as a set, so do not display explicitly contraction rules. }
136 257
	\paragraph*{Induction}
137 258
	Corresponds to safe recursion on notation.
138
	Suppose final step is:
259
	Suppose final step is (wlog):
139 260
	\[
140
	\vlinf{\pind}{}{\Gamma , \normal (t) , A(0) \seqar A(t) , \Delta}{ \left\{\Gamma , \normal (u) , A(u) \seqar A(\succ i u ) , \Delta \right\}_{i=0,1} }
261
	\vlinf{\pind}{}{ \normal (\vec u), \safe (\vec x) , \Gamma, A(0) \seqar A(t(\vec u ;)) , \Delta}{ \left\{\normal (u) , \normal (\vec u) , \safe (\vec x) , \Gamma,  A(u) \seqar A(\succ i u ) , \Delta \right\}_{i=0,1} }
141 262
	\]
263
			\anupam{need to say in normal form part that can assume induction of this form}
142 264
	For simplicity we will assume $\Delta $ is empty, which we can always do by Prop.~\todo{DO THIS!}
143 265
	
144 266
		Now, by the inductive hypothesis, we have functions $h_i$ such that:
145 267
		\[
146
		\wit{u , \vec u ; \vec x}{LHS} (l , u , \vec u ; \vec x ,  w) =1
268
		\Wit{u , \vec u ; \vec x}{\Gamma, A(0)} (l , u , \vec u ; \vec x ,  \vec w)
147 269
		\quad \implies \quad
148
		\wit{u , \vec u ; \vec x}{RHS} (l , u , \vec u ; \vec x ,  h_i (u \mode l , \vec u \mode l ; \vec x \mode l) ) =1
270
		\Wit{u , \vec u ; \vec x}{A(\succ i u)} (l , u , \vec u ; \vec x ,  h_i ((u , \vec u) \mode l ; \vec x \mode l , \vec w) )
149 271
		\]
150
	We define $ f$ as follows:
272
	First let us define $ f$ as follows:
151 273
	\[
152 274
	\begin{array}{rcl}
153
	 f (0 , \vec u ; \vec x, \vec w^\Gamma , w^{\normal (t)} , w^{A(0)}) & \dfn &  w^{A(0)} \\
154
	 f( \succ i u , \vec u ; \vec x , \vec w^\Gamma , w^{\normal (t)} , w^{A(0)}) & \dfn & 
155
	 h_i (u , \vec u ; \vec x , \vec w^\Gamma w^{\normal (?)}, f(u , \vec u ; \vec x , \vec w ))
275
	 f (0 , \vec u ; \vec x, \vec w,  w ) & \dfn &  w\\
276
	 f( \succ i u , \vec u ; \vec x , \vec w, w) & \dfn & 
277
	 h_i (u , \vec u ; \vec x , \vec w , f(u , \vec u ; \vec x , \vec w , w ))
156 278
	\end{array}
157 279
	\]
158
	\anupam{Must check above, could be problems in recursive case.}
280
	where $\vec w$ corresponds to $\Gamma $ and $w$ corresponds to $A(0)$.
159 281
	\anupam{Wait, should $\normal (t)$ have a witness? Also there is a problem like Patrick said for formulae like: $\forall x^\safe . \exists y^\safe. (\normal (z) \cor \cnot \normal (z))$, where $z$ is $y$ or otherwise.}
282
	
283
	Now we let $f^\pi (\vec u ; \vec x , \vec w) \dfn f(t(\vec u ; ) , \vec u ; \vec x , \vec w)$.
284
	
285
	\paragraph*{Cut}
286
	If it is a cut on an induction formula, which is safe, then it just corresponds to a safe composition since everything is substituted into a safe position.
287
	Otherwise it is a `raisecut':
288
	\[
289
	\vliinf{\rais\cut}{}{\normal (\vec u ) , \normal (\vec v) , \safe (\vec x) ,\Gamma \seqar \Delta }{ \normal (\vec u) \seqar \exists x^\safe  . A(x) }{ \normal (u)  , \normal (\vec v) , \safe (\vec x) , A(u), \Gamma \seqar \Delta }
290
	\]
291
	In this case we have functions $f(\vec u ; )$ and $\vec g (u, \vec v ; \vec x , w , \vec w )$, in which case we construct $\vec f^\pi$ as:
292
	\[
293
	\vec f^\pi ( \vec u , \vec v ; \vec x , \vec w )
294
	\quad \dfn \quad
295
	\vec g ( \beta (1 ; f(\vec u ;) ) , \vec v ; \vec x , \beta(0;f(\vec u ;)) , \vec w )
296
	\]
160 297
\end{proof}
161 298

  
162 299
We are now ready to prove the soundness theorem.
CSL17/main.tex (revision 219)
30 30

  
31 31
\Copyright{Patrick Baillot and Anupam Das}%mandatory, please use full first names. LIPIcs license is "CC-BY";  http://creativecommons.org/licenses/by/3.0/
32 32

  
33
\subjclass{Dummy classification -- please refer to \url{http://www.acm.org/about/class/ccs98-html}}% mandatory: Please choose ACM 1998 classifications from http://www.acm.org/about/class/ccs98-html . E.g., cite as "F.1.1 Models of Computation". 
33
\subjclass{Dummy classification %-- please refer to \url{http://www.acm.org/about/class/ccs98-html}
34
	}% mandatory: Please choose ACM 1998 classifications from http://www.acm.org/about/class/ccs98-html . E.g., cite as "F.1.1 Models of Computation". 
34 35
\keywords{Dummy keyword -- please provide 1--5 keywords}% mandatory: Please provide 1-5 keywords
35 36
% Author macros::end %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
36 37

  
......
53 54
\maketitle
54 55

  
55 56
\begin{abstract}
56
We consider extensions of theories based on the Bellantoni-Cook function algebra for polynomial time functions (FP) by induction principles without bounds on quantifiers. Instead, we limit quantification to 'safe' arguments and show that the provably total functions are just those of the functional polynomial hierarchy (FPH). Our witness extraction proof relies on free-cut elimination in the logic, making use of the witness function method, due to Buss, rather than realisability and Dialectica approaches more common in implicit complexity. Our results closely resemble analogous ones from bounded arithmetic, only for an unbounded setting, and the proof generalises those for previous approaches characterising FP via ramified theories. 
57
\patrick{Remove: We present further comparisons to the bounded arithmetic setting and give tiered arithmetic theories analogous to the Si2 and Vi hierarchies of bounded arithmetic.} 
57
We consider extensions of theories based on the Bellantoni-Cook function algebra for polynomial time functions ($\fptime$) by induction principles without bounds on quantifiers. Instead, we limit quantification to `safe' arguments and show that the provably total functions are just those of the functional polynomial hierarchy ($\fph$). Our witness extraction proof relies on \emph{free-cut elimination} in the logic, making use of the \emph{witness function method}, due to Buss, rather than realisability and Dialectica approaches more common in implicit complexity. Our results closely resemble analogous ones from bounded arithmetic, only for an unbounded setting, and the proof generalises those for previous approaches characterising $\fptime$ via ramified theories. 
58
%\patrick{Remove: We present further comparisons to the bounded arithmetic setting and give tiered arithmetic theories analogous to the Si2 and Vi hierarchies of bounded arithmetic.} 
58 59
\end{abstract}
59 60
%\begin{abstract}
60 61
%We consider extensions of equational theories based on the Bellantoni-Cook function algebra for FPTIME by induction principles without bounds on quantifiers. Instead, we limit quantification to 'safe' variables and show that the provably total functions are just those of FPH. This closely resembles analogous results from bounded arithmetic, only for an unbounded setting, and the proof generalises those for previous approaches characterising FPTIME via the Bellantoni-Cook framework. We present further comparisons to the bounded arithmetic setting and give two-sorted arithmetic theories analogous to the Si2 and Vi hierarchies of bounded arithmetic. 
CSL17/arithmetic.tex (revision 219)
110 110

  
111 111
\begin{lemma}
112 112
[Sharply bounded lemma]
113
\label{lem:sharply-bounded-recursion}
113 114
Let $f_A$ be the characteristic function of a predicate $A(u , \vec u ; \vec x)$.
114 115
Then the characteristic functions of $\forall u \prefix v . A(u,\vec u ; \vec x)$ and $\exists u \prefix v . A(u , \vec u ; \vec x)$ are in $\bc(f_A)$.
115 116
\end{lemma}
CSL17/ph-macros.tex (revision 219)
11 11
%\theoremstyle{definition}
12 12
%\newtheorem{definition}[theorem]{Definition}
13 13

  
14
\newcommand{\lhs}{\mathit{LHS}}
15
\newcommand{\rhs}{\mathit{RHS}}
16

  
14 17
\newcommand{\Word}{\mathbb{W}}
15 18
\newcommand{\Nat}{\mathbb{N}}
16
\newcommand{\arith}{B}
19
\newcommand{\arith}{B_2}
17 20
\newcommand{\basic}{\mathit{BASIC}}
18 21

  
19 22
\newcommand{\ind}{\mathit{IND}}
......
28 31
\newcommand{\prefix}{\preccurlyeq}
29 32

  
30 33
\newcommand{\charfn}[2]{\chi^{#1}_{#2}}
31
\newcommand{\wit}[2]{\mathit{wit}^{#1}_{#2}}
34
\newcommand{\wit}[2]{\textsc{wit}^{#1}_{#2}}
32 35
\newcommand{\Wit}[2]{\mathit{Wit}^{#1}_{#2}}
33 36
\newcommand{\dfn}{:=}
34 37
\newcommand{\seqar}{\rightarrow}
......
40 43
\newcommand{\hlf}[1]{\lfloor \frac{#1}{2}\rfloor}
41 44
\newcommand{\cond}{C}
42 45
\newcommand{\smsh}{\#}
43
\newcommand{\pair}[3]{\langle ; #1,#2 , #3 \rangle}
46
\newcommand{\pair}[3]{\langle  #1;#2 , #3 \rangle}
44 47
\newcommand{\eq}{\textsc{eq}}
45 48
\newcommand{\leqfn}{\textsc{leq}}
46 49
\newcommand{\bit}{\textsc{bit}}
......
91 94
\newcommand{\ciff}{\equiv}
92 95

  
93 96
\newcommand{\size}[1]{|#1|}                        %% length of a word
94
\newcommand{\mode}{\; \underline{\mbox{mod}}\;}   %% mod 2^{|x|}
97
%\newcommand{\mode}{\; \underline{\mbox{mod}}\;}   %% mod 2^{|x|}
98
\newcommand{\mode}{\ \underline{\mathrm{mod}}\ }   %% mod 2^{|x|}
95 99

  
96 100
%%%%% RULES %%%%%%
97 101
\newcommand{\lefrul}[1]{#1\text{-}\mathit{l}}
CSL17/intro.tex (revision 219)
6 6
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
7 7

  
8 8
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
9
But a more important (and somewhat orthogonal) distinction is whether the constraints on the logic or theory are
10
\textit{explicit} or \textit{implicit}, that is to say whether they stipulate some bounds or resources, or whether the bounds are only \textit{consequence} of some logical properties. One important representant of the first category is \textit{bounded arithmetic}, which has been investigated by Buss  \cite{Buss86book}, as a first-order arithmetic with bounded quantifiers. Cobham's function algebra  \cite{Cobham}  for polynomial time is of a similar nature, and indeed is used as a tool for the study of bounded arithmetic. In the second category one can range the systems of \textit{implicit computational complexity}, like for instance function algebras based on restrictions of recursion, such as ramified or safe recursion \cite{BellantoniCook92}, arithmetics or logics based on analogous restrictions of induction \cite{Cantini02},  \cite{Leivant94:intrinsic-theories} \cite{BelHof:02},  \cite{Leivant94:found-delin-ptime} and subsystems of linear logic   \cite{Girard94:lll} \cite{Lafont04} .
9
A perhaps more important distinction is whether the constraints on the logic or theory are
10
\textit{explicit} or \textit{implicit}, that is to say whether they stipulate some bounds or resources, or whether the bounds are only \textit{consequence} of some logical properties. One important representative of the first category is \textit{bounded arithmetic}, based on theories of arithmetic where quantiiers are bounded by terms in induction or comprehension formulae \cite{Buss86book,Krajicek:1996:BAP:225488,Cook:2010:LFP:1734064}. Cobham's function algebra  \cite{Cobham}  for polynomial time is of a similar nature, and indeed is used as a tool for the study of bounded arithmetic. In the second category one can range the systems of \textit{implicit computational complexity}, like for instance function algebras based on restrictions of recursion, such as ramified or safe recursion \cite{BellantoniCook92}, arithmetics or logics based on analogous restrictions of induction \cite{Cantini02},  \cite{Leivant94:intrinsic-theories} \cite{BelHof:02},  \cite{Leivant94:found-delin-ptime} and subsystems of linear logic   \cite{Girard94:lll} \cite{Lafont04} .
11 11

  
12
 Bounded arithmetic is a deep and well-established theory, and one of its interests is its great versatility, as it has enabled to characterize a wide range of complexity classes, such as FP, the polynomial hierarchy FPH, PSPACE, NC \dots It is also tightly related to \textit{proof complexity}
13
  \cite{Cook:2010:LFP:1734064}, the research field investigating the size of propositional proofs in various proof systems. Finally it is also employed for the research direction of \textit{bounded reverse mathematics}. 
12
 Bounded arithmetic is a deep and well-established field, and one of its advantages is its great versatility, allowing a characterization of a wide range of complexity classes, such as $\ptime$, the polynomial hierarchy $\ph$, $\pspace$, $\mathbf{NC}^i$ etc. 
13
 %It is also closely related to \textit{proof complexity}, the research field investigating the size of propositional proofs in various proof systems. Finally it is also employed for the research direction of \textit{bounded reverse mathematics}. 
14 14
  
15
  Implicit computational complexity on the other hand is a slightly more recent and less unified line of research. It has the interest of delineating some specific computing disciplines which correspond to classical complexity classes and can help shed some light for instance on the foundational nature of feasibility  (see e.g. \cite{Leivant94:found-delin-ptime}). Another benefit is that implicit complexity systems can sometimes be extended into techniques for statically controlling the complexity of programs, e.g. in functional or imperative languages (\cite{Hofmann00,Hofmann03}, \cite{Marion11} \dots).  However the variety of complexity classes that have been characterized in this implicit way is not as large as for bounded arithmetic. In particular implicit complexity has not managed to characterize non-deterministic classes, such as NP or PH, in a purely logical way. Actually some characterizations of such classes do exist, but they either take the form of a function algebra or of a type system extended with a non-logical feature. 
15
  Implicit computational complexity on the other hand is a slightly more recent and less unified line of research. It aims to relate certain computing disciplines which with complexity theoretic features, and has helped shed some light on the foundational nature of `feasibility' (see e.g.~\cite{Leivant94:found-delin-ptime}). 
16
  Another benefit is that implicit complexity systems can sometimes be extended into techniques for statically controlling the complexity of programs, e.g. in functional or imperative languages (\cite{Hofmann00,Hofmann03}, \cite{Marion11} etc.).  However the variety of complexity classes that have been characterized in this implicit way is not as large as for bounded arithmetic. In particular implicit complexity has not managed to characterize non-deterministic classes, such as $\mathbf{NP}$ or $\ph$, in a purely logical way.\footnote{Actually some characterizations of such classes do exist, but they either take the form of a function algebra or of a type system extended with a non-logical feature.} 
16 17
  
17
  In fact implicit complexity has obtained many of its techniques from a detailed study of the comprehension scheme, of the primitive recursion scheme and of the structural rules of proof systems (contraction rule). But it seems to us that first-order quantification has not yet been investigated as much as it deserves. We believe that this is one reason of the modest achievements of implicit complexity concerning non-deterministic classes.
18
 Systems in implicit complexity typically imposes constraints on the comprehension scheme, the primitive recursion scheme or the structural rules of proof systems (namely \emph{contraction}). 
19
% But it seems to us that first-order quantification has not yet been investigated as much as it deserves. We believe that this is one reason of the modest achievements of implicit complexity concerning non-deterministic classes.
20
%  
21
  In the present work we aim to bridge the gap to bounded arithmetic by constructing `implicit' theories that characterise the functional polynomial hierarchy $\fph$ and its levels. We consider a base theory similar to that of bounded arithmetic, but we allow induction on \emph{unbounded} formulae, i.e.\ without any explicit bounds. 
22
%  By implicit complexity arithmetic we mean that the quantifiers employed should not be bounded quantifiers. Our motivation is to bridge the fields of bounded arithmetic and implicit complexity, and to try pave the way for the design of systems bringing together simplicity (no explicit bounds) and versatility, in which one could transfer some of the main results of bounded arithmetic.  
23
%  
24
%  Our methodology will be the following one: 
25
Naturally another constraint is in order, and for this we will use the concept of \textit{ramification} that is common in implicit complexity \cite{Leivant95,BellantoniCook92}.
26
%, adapt it in the setting of first-order arithmetic, and then explore some properties relative to quantification. First 
27
Also known as \emph{safe recursion}, ramification a discipline which aims at limiting the power of recursion by distinguishing two (or more) levels of integers: the \textit{safe} or level-0 integers (in this work $\safe$), and the \textit{normal} or level-1 ones (in this work $\normal$). 
28
In a nutshell, recursion is permitted on normal arguments, but recursive calls can only appear in safe positions. Basic operations, such as conditionals and Boolean predicates, can be performed on safe arguments. 
29
Functions defined in this way correspond to polynomial time functions \cite{BellantoniCook92}. 
18 30
  
19
  So in the present work we aim at exploring the power of first-order quantification in an implicit complexity arithmetic, and in particular we wish to characterize the polynomial hierarchy FPH and its levels. By implicit complexity arithmetic we mean that the quantifiers employed should not be bounded quantifiers. Our motivation is to bridge the fields of bounded arithmetic and implicit complexity, and to try pave the way for the design of systems bringing together simplicity (no explicit bounds) and versatility, in which one could transfer some of the main results of bounded arithmetic.  
31
  This discipline can be transposed into first-order arithmetic by adding predicates for normal and safe integers and by limiting the induction scheme by allowing induction only on normal integers, but crucially on formulae with only \emph{safe} unbounded quantifiers. 
32
  %The key step we make is to focus our attention on \textit{safe quantifiers} that is to say quantifiers on safe variables.    
33
  These safe quantifiers play a r\^ole analogous to bounded quantifiers in bounded arithmetic. In particular we will consider a hierarchy $\Sigma_i^{\safe}$ of formulas, according to the number of alternations of safe quantifiers, to define a hierarchy of theories $\arith^i$ allowing induction on $\Sigma^\safe_i$ formulae. 
34
  We show that such a theory proves the totality of precisely the $\fph_i$ functions, relying on a recursion-theoretic characterisation of $\fph$ due to Bellantoni \cite{bellantoni1995fph} to both extract programs and prove completeness of the theory with respect to $\fph_i$.
20 35
  
21
  Our methodology will be the following one: we will use the concept of \textit{ramification} coming from implicit complexity \cite{Leivant95,BellantoniCook92}, adapt it in the setting of first-order arithmetic, and then explore some properties relative to quantification. First recall that ramification, or safe recursion, is a discipline which aims at limiting the power of recursion by distinguishing two (or more) levels of integers: the \textit{safe} or level-0 integers, and the \textit{normal} or level-1 ones. In a nutshell, recursion, which is here recursion on notation (or binary words), is permitted on normal arguments, but recursive calls can only appear in safe positions. Basic operations, such as conditional, can be performed on safe arguments.  Functions defined in this way correspond to polynomial time functions \cite{BellantoniCook92}. 
36
  \medskip
37
  \noindent
38
  \textbf{Related work}. To the best of our knowledge, our work is the first characterization of the polynomial hierarchy and its levels in an implicit arithmetic. Our approach is however related to several previous works, and differs either by some of the definitions and/or by the complexity class characterized. 
39
  One particular difference is that we specify programs using arithmetic formulae, as in bounded arithmetic, rather than equational specifications or combinatory terms in other works, which seems to be important for characterizing $\fph$.
22 40
  
23
  This discipline can be transposed in first-order arithmetic by adding predicates for normal and safe integers and by limiting the induction scheme by allowing induction only on normal integers. The key step we make is to focus our attention on \textit{safe quantifiers} that is to say quantifiers on safe variables.    These safe quantifiers will play a r\^ole analogous to bounded quantifiers in bounded arithmetic. In particular we will consider a hierarchy $\Sigma_i^{\safe}$ of formulas according to the number of alternances of safe quantifiers, and we will calibrate the use of induction by restricting the class to which the induction formula can belong. We will finally characterize in this way the levels of the polynomial hierarchy.
41
%   A first axis of classification between the logics and arithmetics for complexity classes is the way by which they specify functions. The options at stake can be enumerated as follows: (i) \textit{formula specification}, as in first-order bounded arithmetic \cite{Buss86book}, (ii) \textit{equational specification}, as in Leivant's intrinsic theories   \cite{Leivant94:intrinsic-theories}, (iii) \textit{combinatory terms} as in applicative theories (e.g. \cite{Strahm03}) or $\lambda$-calculus terms. A second axis, as explained in the introduction, is whether the system is explicit or implicit.
42
%   
43
%   Our approach in this paper is to use the formula-specification point of view, because it is convenient for the polynomial hierarchy. 
44
   The arithmetic of \cite{KahOit:13:ph-levels} characterizes $\fph$, but it is not implicit, relying on axioms defining bounded schemes.
45
%   Some other works are closer to our methodology in the sense that they are implicit arithmetics and rely on a notion of ramification, but they characterize other complexity classes. 
46
   Leivant's intrinsic theories \cite{Leivant94:intrinsic-theories}  induces characterizations of $\fptime$ and elementary functions, using equational specifications, and \cite{Cantini02} obtains an analogous result for $\fptime$ using combinatory terms. 
47
   The paper \cite{BelHof:02} also provides a characterization of $\fptime$, with two differences: on the one hand induction is on arbitrarily quantified formulas, and on the other hand the underlying logic is not classical logic but a variant of linear logic, with a modality for normal arguments. Our paper \cite{BaillotDas16} proves a similar result, but with a different method.
48
   The lack of contraction is crucial here to stop the theory from exhausting higher complexity classes. 
49
   Finally the paper \cite{OstrinWainer05} also presents an implicit ramified arithmetic, with quantification on safe variables. Here equational specifications are used instead of formulas and unary integers  instead of binary integers, which leads to a characterization of the elementary functions.
24 50
  
25
  \textbf{Related work}. To the best of our knowledge, our work is the first characterization of the polynomial hierarchy and its levels in an implicit arithmetic. Our approach is however related to several previous works, and differs either by some of the definitions and/or by the complexity class characterized.
51
  \medskip
52
  \noindent
53
  \textbf{Outline.} The rest of this paper proceeds as follows. We first give some background on function algebras for $\fptime$ and $\fph$ respectively in Sect.~\ref{sect:prelims}. 
54
  %Then we describe an encoding of sequences which will be instrumental in the proof of our result. 
55
  We present our arithmetic theories $\arith^i$ in Sect.~\ref{sect:arithmetic} and prove our soundness result, that the provably total functions of $\arith^i$ are in $\fph_i$, in Sect.~\ref{sect:soundness}. Finally, we prove the completeness result, that all $\fph_i$ functions have a representation provably total in $\arith^i$, in Sect.~\ref{sect:completeness}, and present conclusions in Sect.~\ref{sect:conclusion}.
26 56
  
27
   A first axis of classification between the logics and arithmetics for complexity classes is the way by which they specify functions. The options at stake can be enumerated as follows: (i) \textit{formula specification}, as in first-order bounded arithmetic \cite{Buss86book}, (ii) \textit{equational specification}, as in Leivant's intrinsic theories   \cite{Leivant94:intrinsic-theories}, (iii) \textit{combinatory terms} as in applicative theories (e.g. \cite{Strahm03}) or $\lambda$-calculus terms. A second axis, as explained in the introduction, is whether the system is explicit or implicit.
28
   
29
   Our approach in this paper is to use the formula-specification point of view, because it is convenient for the polynomial hierarchy. The arithmetic of \cite{KahOit:13:ph-levels} characterizes PH, but it fits in the explicit approach as it uses axioms defining bounded schemes.
30
   Some other works are closer to our methodology in the sense that they are implicit arithmetics and rely on a notion of ramification, but they characterize other complexity classes. Leivant's intrinsic theories \cite{Leivant94:intrinsic-theories}  allows to characterize FP, in the equational specification approach, and \cite{Cantini02} obtains an analogous result in the combinatory terms approach. The paper \cite{BelHof:02} also provides a characterization of FP, with two differences: on the one hand induction is on arbitrarily quantified formulas, and on the other hand the underlying logic is not classical logic but a variant of linear logic, with a modality for normal arguments. Our paper \cite{BaillotDas16} proves a similar result, but with a different method. Finally the paper \cite{OstrinWainer05} also presents an implicit ramified arithmetic, with quantification on safe variables. The difference with our setting is that equational specifications are used instead of formulas, unary integers  instead of binary integers, and the class of functions characterized is that of elementary functions.
31 57
  
32
  
33
  \textbf{Outline.} The rest of the paper will proceed as follows. We first give some background on function algebras for FP and FPH respectively.  Then we describe an encoding of sequences which will be instrumental in the proof of our result. We present our arithmetical system in Sect. \ref{sect:arithmetic}, prove our soundness result, that is to say the provably total functions are in FPH, in Sect. \ref{sect:soundness}, and our completeness result, all FPH functions are provably total in the arithmetic, in Sect. \ref{sect:completeness}.
34
  
35
  
36 58
%  \patrick{
37 59
%  \begin{itemize}
38 60
%  \item our goal: design an unbounded arithmetic for FPH.
CSL17/conclusions.tex (revision 219)
1 1
\section{Conclusions}
2
\label{sect:conclusion}
2 3

  
3 4
 We have presented a ramified arithmetic parameterized by the formulas on which induction is allowed. The hierarchy of induction formulas 
4 5
$\Sigma_i^{\safe}$ is defined by the number of alternances of safe (unbounded) quantifiers. We have proved that the system $\arith^i$ with 
CSL17/ph-biblio.bib (revision 219)
1
@incollection{bellantoni1995fph,
2
	title={Predicative recursion and the polytime hierarchy},
3
	author={Bellantoni, Stephen},
4
	booktitle={Feasible Mathematics II},
5
	pages={15--29},
6
	year={1995},
7
	publisher={Springer}
8
}
1 9

  
2 10

  
3
@inproceedings{Lasson11,
-  author    = {Marc Lasson},
-  title     = {Controlling Program Extraction in Light Logics},
-  booktitle = {Proceedings of Typed Lambda Calculi and Applications - 10th International Conference,
-               {TLCA} 2011},
-  pages     = {123--137},
-  series    = {LNCS},
-  volume    = {6690},
-  publisher = {Springer},
-  year      = {2011}
- }
-
4
@inproceedings{Leivant95,
-  author    = {Daniel Leivant},
+@inproceedings{Lasson11,
11
  author    = {Marc Lasson},
12
  title     = {Controlling Program Extraction in Light Logics},
13
  booktitle = {Proceedings of Typed Lambda Calculi and Applications - 10th International Conference,
14
               {TLCA} 2011},
15
  pages     = {123--137},
16
  series    = {LNCS},
17
  volume    = {6690},
18
  publisher = {Springer},
19
  year      = {2011}
20
 }
21

  
22
@inproceedings{Leivant95,
23
  author    = {Daniel Leivant},
5 24
  title     = {Ramified recurrence and computational complexity I: Word recurrence and poly-time},
6 25
  booktitle = {Feasible mathematics II}, 
7
    pages     = {320--343},
-   publisher = {Birkhauser Boston},
-  year      = {1995},
+    pages     = {320--343},
26
   publisher = {Birkhauser Boston},
27
  year      = {1995},
8 28
 }
9 29

  
10
@inproceedings{Marion11,
-  author    = {Jean{-}Yves Marion},
-  title     = {A Type System for Complexity Flow Analysis},
-  booktitle = {Proceedings of the 26th Annual {IEEE} Symposium on Logic in Computer
-               Science, {LICS} 2011},
-  pages     = {123--132},
-   publisher = {{IEEE} Computer Society},
-  year      = {2011},
- }
30
@inproceedings{Marion11,
31
  author    = {Jean{-}Yves Marion},
32
  title     = {A Type System for Complexity Flow Analysis},
33
  booktitle = {Proceedings of the 26th Annual {IEEE} Symposium on Logic in Computer
34
               Science, {LICS} 2011},
35
  pages     = {123--132},
36
   publisher = {{IEEE} Computer Society},
37
  year      = {2011},
38
 }
11 39

  
12
@article{Hofmann03,
-  author    = {Martin Hofmann},
-  title     = {Linear types and non-size-increasing polynomial time computation},
-  journal   = {Inf. Comput.},
-  volume    = {183},
-  number    = {1},
-  pages     = {57--85},
-  year      = {2003}
-  }
40
@article{Hofmann03,
41
  author    = {Martin Hofmann},
42
  title     = {Linear types and non-size-increasing polynomial time computation},
43
  journal   = {Inf. Comput.},
44
  volume    = {183},
45
  number    = {1},
46
  pages     = {57--85},
47
  year      = {2003}
48
  }
13 49

  
14
@article{OstrinWainer05,
-  author    = {Geoffrey E. Ostrin and
-               Stanley S. Wainer},
-  title     = {Elementary arithmetic},
-  journal   = {Ann. Pure Appl. Logic},
-  volume    = {133},
-  number    = {1-3},
-  pages     = {275--292},
-  year      = {2005}
-  }
-
50
@article{OstrinWainer05,
51
  author    = {Geoffrey E. Ostrin and
52
               Stanley S. Wainer},
53
  title     = {Elementary arithmetic},
54
  journal   = {Ann. Pure Appl. Logic},
55
  volume    = {133},
56
  number    = {1-3},
57
  pages     = {275--292},
58
  year      = {2005}
59
  }
15 60

  
61

  
16 62
@article{GaboardiMarionRonchi12,
17 63
  author    = {Marco Gaboardi and
18 64
               Jean{-}Yves Marion and
CSL17/preliminaries.tex (revision 219)
1 1

  
2 2
\section{Preliminaries}
3
\label{sect:prelims}
3 4
We introduce the polynomial hierarchy and its basic properties, then the Bellantoni characterisation.
4 5

  
5 6
\anupam{Should recall polymax bounded functions and the polychecking lemma, e.g.\ from Bellantoni's FPH paper or thesis. Quite important, even if proof not given.}
......
208 209
 \end{definition}
209 210
 One then has:
210 211
 \begin{lemma}[Bounded Minimization, \cite{BellantoniThesis}]
212
 	\label{lem:bounded-minimisation}
211 213
If  $f(\vec u; \vec x,y)$ is a polynomial checking function on $\vec u$ and $q$ is a threshold, then for any $\vec u$ and $\vec x$ we have:
212 214
$$ (\exists y.   f(\vec u; \vec x,y)\mbox{ mod } 2=0) \Rightarrow (\exists y.  (\size{y}\leq q(\size{\vec{x}})+2) \mbox{ and } f(\vec u; \vec x,y) \mbox{ mod } 2=0) .$$
213 215
 \end{lemma}
214 216
 Finally we can state an important lemma about $\mubc$:
215 217
 \begin{lemma}[Polychecking Lemma, \cite{BellantoniThesis}]
218
 	\label{lem:polychecking}
216 219
 Let $\Phi$ be a class of polymax bounded polynomial checking functions. If $f(\vec u; \vec x)$ is in $\mubc(\Phi)$, then $f$ is  a polymax bounded function  polynomial checking function on $\vec u$.
217 220
 \end{lemma}
218 221
 The following property follows from \cite{BellantoniThesis, Bellantoni95}]
CSL17/sequence-coding.tex (revision 219)
63 63
\end{lemma}
64 64
\begin{proof}
65 65
	Length induction on $l$.
66
\end{proof}
66
\end{proof}
67

  
68

  
69
\subsection{Summary}
70
Assume the existence of a simple pairing function for elements of fixed size: $\pair{k,l}{x}{y}$ denotes the pair $(x \mode k , y \mode l )$.
71
An appropriate such function would `interleave' $x$ and $y$, adding delimiters as necessary.
72
We assume that $|\pair{k,l}{x}{y}| = k+O(l)$ and $\pair{k,l}{x}{y}$ satisfies the polychecking lemma.
73

  
74
We will simply write $\pair{l}{x}{y}$ for $\pair{l,l}{x}{y}$.
75

  
76
\begin{lemma}
77
	[Creating sequences]
78
	\label{lem:sequence-creation}
79
	Given a function $f(u , \vec u ; \vec x)$ there is a $\bc(f)$ function $F(l, u , \vec u ; \vec x)$ such that:
80
	\[
81
	F(l,u,\vec u ; \vec x)
82
	\quad = \quad
83
	\langle f(0, \vec u ; \vec x) \mode l , f(1, \vec u ; \vec x) \mode l , \dots , f(|u|, \vec u ; \vec x) \mode l \rangle
84
	\]
85
\end{lemma}
86
\begin{proof}
87
	We simply define $F$ by safe recursion from $f$:
88
	\[
89
	\begin{array}{rcl}
90
	F(l,0, \vec u ; \vec x) & \dfn & \langle ; f(0) \mode l \rangle \\
91
	F(l, \succ i u , \vec u ; \vec x ) & \dfn & \pair{O(|u| l) , l}{F(l, u , \vec u ; \vec x)}{f( |\succ i u| , \vec u ; \vec x )}
92
	\end{array}
93
	\]
94
	where the constants for $O(|u|l)$ are sufficiently large.
95
\end{proof}
96

  
97
\begin{lemma}
98
[Decoding sequences]
99
We can define $\beta(l,i;x)$ as $(i\text{th element of x}) \mode l$.	
100
\end{lemma}
101
\begin{proof}
102
First define $\beta (j,i;x)$ as $j$th bit of $i$th element of $x$, then use similar idea to above, by a recursion on $j$.
103
\end{proof}
104

  
105
Notice that $\beta (l,i;x)$ satisfies the polychecking lemma.
106

  
107
We define

Formats disponibles : Unified diff