Révision 233

CSL17/intro.tex (revision 233)
54 54
  %Then we describe an encoding of sequences which will be instrumental in the proof of our result. 
55 55
  We present our arithmetic theories $\arith^i$ in Sect.~\ref{sect:arithmetic} and prove our soundness result, that the provably total functions of $\arith^i$ are in $\fph_i$, in Sect.~\ref{sect:soundness}. Finally, we prove the completeness result, that all $\fph_i$ functions have a representation provably total in $\arith^i$, in Sect.~\ref{sect:completeness}, and present conclusions in Sect.~\ref{sect:conclusion}.
56 56
  
57
  We are able to include only brief outlines of our technical results in this paper, in particular for our soundness and completeness results, Thms.~\ref{sect:soundness} and \ref{thm:completeness} respectively. 
58
  More detailed proofs can be found in the technical report \cite{BaiDas17:fph-techreport}.
57 59
  
60
  
58 61
%  \patrick{
59 62
%  \begin{itemize}
60 63
%  \item our goal: design an unbounded arithmetic for FPH.
CSL17/completeness.tex (revision 233)
1 1
\section{Completeness}\label{sect:completeness}
2

  
2
We now turn to proving the converse result to the last section, that our theories $\arith^i$ are strong enough to represent any $\fphi i $ function.
3 3
The main result of this section is the following:
4 4

  
5 5
\begin{theorem}
6 6
	\label{thm:completeness}
7 7
	For every $\mubci{i-1}$ program $f(\vec u ; \vec x)$ (which is in $\fphi i$), there is a $\Sigma^{\safe}_i$ formula $A_f(\vec u, \vec x)$ such that $\arith^i$ proves $\forall^{\normal} \vec u, \forall^{\safe} \vec x, \exists^{\safe} ! y. A_f(\vec u , \vec x , y )$ and $\Nat \models \forall \vec u , \vec x. A_f(\vec u , \vec x , f(\vec u ; \vec x))$.
8 8
\end{theorem}
9
\begin{proof}[Sketch](A more detailed proof can be found in Appendix \ref{appendix:completeness})
10

  
11
 The proof proceeds by induction on the construction of $\mubci{i-1}$ program $f(\vec u ; \vec x)$ to construct a suitable formula $A_f(\vec u, \vec x)$ .  The case of initial functions is easy, by using the formulas we gave in Sect. \ref{sect:graphsbasicfunctions}. The case of safe composition is also simple, and makes use of the $\rais$ rule. The two key cases are thus those of predicative recursion and predicative minimisation. 
9
\begin{proof}[Proof sketch]
10
 The proof proceeds by induction on the construction of $\mubci{i-1}$ program $f(\vec u ; \vec x)$ to construct a suitable formula $A_f(\vec u, \vec x)$ .  The case of initial functions is easy, by using the formulas we gave in Sect. \ref{sect:graphsbasicfunctions}. The case of safe composition is also simple, and makes use of the $\rais$ rule and simply combines previously defined graphs by \emph{modus ponens} (or, equivalently, $\cut$) and logical steps. 
11
 Naturally, the interesting cases are predicative recursion and predicative minimisation. 
12 12
 
13
 For predicative recursion, the basic idea is to follow the classical simulation of primitive recursion in arithmetic, adapted to recursion on notation, by encoding the sequence of recursive calls as an integer $w$. The main technical difficulty is to have a decoding predicate $\beta (k, w, y)$ (the $k$th element of the sequence represented by $w$ is $y$) which is sorted in a suitable way so that the formula $A_f$  is in the same class $\Sigma^{\safe}_i$ as $A_g$,  $A_{h_0}$ and $A_{h_1}$.  This can be obtained by defining  the predicate $\beta (k, w, y)$ with $k$ in $\normal$ and $w$, $y$ in $\safe$.
13
 For predicative recursion, the basic idea is to follow the classical simulation of primitive recursion in arithmetic, adapted to recursion on notation, by encoding the sequence of recursive calls as an integer $w$. 
14
 The main technical difficulty is the representation of (de)coding functions $\beta (k, x)$ (``the $k$th element of the sequence $x$'') and $\langle x,y \rangle$ (``the pair $(x,y)$'').
15
 For this we represent instead the length-bounded variants of these functions given towards the end of Sect.~\ref{sect:prelims}, relying on the bounded minimisation and polychecking results, Lemmas~\ref{lem:bounded-minimisation} and \ref{lem:bounded-minimisation}, to find appropriate length bounds.
16
%  which is sorted in a suitable way so that the formula $A_f$  is in the same class $\Sigma^{\safe}_i$ as $A_g$,  $A_{h_0}$ and $A_{h_1}$.  This can be obtained by defining  the predicate $\beta (k, w, y)$ with $k$ in $\normal$ and $w$, $y$ in $\safe$.
14 17

  
15 18
 
16
 For predicative minimisation finally, assume $f$ is defined by  $\mu x^{+1} . g(\vec u ; \vec x , x) =_2 0$. By induction hypothesis we have a $\Sigma^{\safe}_{i-1}$ formula $A_g (\vec u , \vec x , x , y)$  satisfying the property. We then define $A_f(\vec u ; \vec x , z)$ as the following $\Sigma^{\safe}_{i}$ formula:
19
 For predicative minimisation, assume $f$ is defined as  $\succ 1 \mu x .( g(\vec u ; \vec x , x) =_2 0)$ (or $0$ if no such $x$ exists).
20
  By induction hypothesis we have a $\Sigma^{\safe}_{i-1}$ formula $A_g (\vec u , \vec x , x , y)$  satisfying the property. We then define $A_f(\vec u ; \vec x , z)$ as the following $\Sigma^{\safe}_{i}$ formula:
17 21
\[
18 22
\begin{array}{rl}
19 23
&\left(
......
28 32
\right)
29 33
\end{array}
30 34
\]
31
As in the bounded arithmetic $S_2$ (\cite{Buss86book}, Thm 20, p. 58),  $\arith^i$ can prove a minimisation principle for $\cmin{\Sigma^\safe_{i-1}}$ formulas, which we apply to the formula  $\exists x^\safe , y^\safe .  (A_g (\vec u ,\vec x , x , y) \cand y=_2 0)$. From that we can prove the totality of $A_f(\vec u ; \vec x , z)$ as required.
35
As for the analogous bounded arithmetic theory $S^i_2$ (\cite{Buss86book}, Thm 20, p. 58),  $\arith^i$ can prove a minimisation principle for $\cmin{\Sigma^\safe_{i-1}}$ formulas, allowing us to extract the \emph{least} witness of a safe existential, which we apply to $\exists x^\safe , y^\safe .  (A_g (\vec u ,\vec x , x , y) \cand y=_2 0)$. From here we are able to readily prove the totality of $A_f(\vec u ; \vec x , z)$, notably relying crucially on classical reasoning.
32 36

  
33 37
\end{proof}
34 38

  
CSL17/ph-biblio.bib (revision 233)
1
@techreport{BaiDas17:fph-techreport,
2
	title={An implicit characterisation of the polynomial hierarchy in an unbounded arithmetic},
3
	author={Patrick Baillot and Anupam Das},
4
	year={2017},
5
	note={\url{http://www.anupamdas.com/fph-unbounded-arithmetic.pdf}}
6
	}
7

  
1 8
@incollection{bellantoni1995fph,
2 9
	title={Predicative recursion and the polytime hierarchy},
3 10
	author={Bellantoni, Stephen},
CSL17/soundness.tex (revision 233)
153 153
Now we can prove the soundness result:
154 154
	
155 155
	\begin{proof}
156
		[Proof of Thm.~\ref{thm:soundness} from Lemma~\ref{lem:proof-interp}]
156
		[Proof sketch of Thm.~\ref{thm:soundness} from Lemma~\ref{lem:proof-interp}]
157 157
		Suppose $\arith^i \proves \forall \vec u^\normal . \exists x^\safe . A(\vec u ; x)$. By inversion and Thm.~\ref{thm:normal-form} there is a $\arith^i$ proof $\pi$ of $\normal (\vec u ) \seqar \exists x^\safe. A(\vec u ; x )$ in typed variable normal form.
158 158
By Lemma~\ref{lem:proof-interp}, we have a $\mubci{i-1}$ function $f^\pi$ with $\wit{\vec u ;}{\exists x^\safe . A} (l, \vec u ; f(\vec u \mode l;)) =1$.
159 159
By the definition of $\wit{}{}$ and Prop.~\ref{prop:wit-rfn} we have that $\exists x . A(\vec u \mode l; x)$ is true just if $A(\vec u \mode l ; \beta (q(l), 1 ; f(\vec u \mode l;) ))$ is true.
CSL17/main.tex (revision 233)
30 30

  
31 31
\Copyright{Patrick Baillot and Anupam Das}%mandatory, please use full first names. LIPIcs license is "CC-BY";  http://creativecommons.org/licenses/by/3.0/
32 32

  
33
\subjclass{Dummy classification %-- please refer to \url{http://www.acm.org/about/class/ccs98-html}
33
\subjclass{F.4.1 Mathematical Logic %-- please refer to \url{http://www.acm.org/about/class/ccs98-html}
34 34
	}% mandatory: Please choose ACM 1998 classifications from http://www.acm.org/about/class/ccs98-html . E.g., cite as "F.1.1 Models of Computation". 
35
\keywords{Dummy keyword -- please provide 1--5 keywords}% mandatory: Please provide 1-5 keywords
35
\keywords{Polynomial hierarchy,
36
	Implicit complexity,
37
	Proof theory,
38
	Bounded arithmetic,
39
	Witness extraction,
40
	Ramification.}% mandatory: Please provide 1-5 keywords
36 41
% Author macros::end %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
37 42

  
38 43
%Editor-only macros:: begin (do not touch as author)%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
......
92 97
\newpage
93 98
\appendix
94 99
\input{appendix-arithmetic}
95
%\input{pv-theories}	
96
\input{appendix-sequent-calculus}
97
\input{appendix-soundness}
98
\input{appendix-completeness}
100
%%\input{pv-theories}	
101
%\input{appendix-sequent-calculus}
102
%\input{appendix-soundness}
103
%\input{appendix-completeness}
99 104

  
100 105
\end{document}
101
\grid
106

  

Formats disponibles : Unified diff