Statistiques
| Révision :

root / CharacterizingPH / draft.tex @ 234

Historique | Voir | Annoter | Télécharger (19,69 ko)

1 133 adas
\documentclass[a4paper]{article}
2 132 adas
3 127 pbaillot
\usepackage{amssymb}
4 131 adas
\usepackage{amsthm}
5 135 adas
\usepackage{hyperref}
6 135 adas
\setcounter{tocdepth}{3}
7 131 adas
8 133 adas
\newtheorem*{conjecture*}{Conjecture}
9 135 adas
\newcommand{\fph}{\mathbf{PH}}
10 131 adas
11 135 adas
12 134 adas
\title{Towards an implicit characterisation of the polynomial hierarchy in an unbounded arithmetic \\ {\small Work in progress} }
13 132 adas
\author{Patrick Baillot \and Anupam Das}
14 136 pbaillot
\date{ Univ Lyon, CNRS, ENS de Lyon, UCB Lyon 1, LIP
15 133 adas
	%\\[2ex] \today
16 133 adas
	}
17 137 adas
18 137 adas
	\newcommand{\ph}{\mathbf{PH}}
19 137 adas
	\newcommand{\pspace}{\mathbf{PSPACE}}
20 137 adas
	\newcommand{\fpspace}{\mathbf{FPSPACE}}
21 137 adas
	\newcommand{\ptime}{\mathbf{P}}
22 137 adas
	\newcommand{\fptime}{\mathbf{FP}}
23 137 adas
	\newcommand{\nc}{\mathbf{NC}}
24 137 adas
	\newcommand{\ac}{\mathbf{AC}}
25 137 adas
	\newcommand{\exptime}{\mathbf{EXP}}
26 132 adas
27 132 adas
28 127 pbaillot
\begin{document}
29 127 pbaillot
\maketitle
30 131 adas
31 129 adas
%\begin{itemize}
32 129 adas
%\item a big picture: logic methods for complexity classes:
33 129 adas
%
34 129 adas
%\begin{tabular}{c|c}
35 129 adas
%ground & higher-order\\
36 129 adas
%quantifiers  & type-level\\
37 129 adas
%PSPACE    & $k$-EXP\\
38 129 adas
%PH  &              P\\
39 129 adas
%P  &\\
40 129 adas
%$NC_i$&
41 129 adas
%\end{tabular}
42 129 adas
%
43 129 adas
%\item  state of the art on arithmetics for complexity classes:
44 129 adas
%
45 129 adas
%\begin{tabular}{c|c|c|c}
46 129 adas
%{\small model of comp. $\backslash$ extracted program } & Cobham & mon. constraints & BC-like \\
47 129 adas
%\hline &&\\
48 129 adas
%formula & PH, $\square_i$&&\\
49 129 adas
%               & bounded induction (Buss) &&\\
50 129 adas
%               \hline &&\\
51 129 adas
%equational &&& P\\
52 129 adas
%&&& (intrinsic theories: Leivant) \\
53 129 adas
%\hline &&\\
54 129 adas
%applicative &&PH & P \\
55 129 adas
% &&(Kahle-Oitavem)& (Cantini)
56 129 adas
%\end{tabular}
57 129 adas
%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
58 129 adas
%\item an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
59 129 adas
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
60 129 adas
%\item the setting we will consider:
61 129 adas
%\begin{itemize}
62 129 adas
%\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
63 129 adas
%\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
64 129 adas
%\end{itemize}
65 129 adas
%\item Our conjecture: ramified first-order modal classical logic with full induction, for equational programs, characterize the class PH.
66 129 adas
%
67 129 adas
%the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
68 129 adas
%\end{itemize}
69 129 adas
%
70 129 adas
%\newpage
71 127 pbaillot
72 129 adas
\section{Introduction and motivation}
73 129 adas
Today, there are countless approaches towards characterising complexity classes via logic.
74 132 adas
Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory.
75 139 adas
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
76 129 adas
77 142 adas
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
78 142 adas
Perhaps a more important (and somewhat orthogonal) distinction for the \textsc{Dice-Fopara} community is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}.
79 129 adas
80 142 adas
Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}.
81 129 adas
82 139 adas
In this line of work we attempt to ameliorate the situation by using implicit methods to delineate fine-grained hierarchies of feasible complexity classes, namely the \emph{polynomial hierarchy}, $\ph$.
83 139 adas
One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}.
84 142 adas
In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories.
85 136 pbaillot
This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}.
86 129 adas
87 129 adas
\section{State of the art}
88 137 adas
As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory.
89 142 adas
As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.}
90 139 adas
%, distinguished by the type level of programs extracted:
91 129 adas
92 132 adas
\bigskip
93 132 adas
94 132 adas
\begin{tabular}{c|c|c}
95 142 adas
Class &	Ground & Higher order\\
96 132 adas
	\hline
97 132 adas
%	quantifiers  & type-level\\
98 142 adas
	$\nc^i$    & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\
99 140 pbaillot
	$\ptime$  &  $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\
100 142 adas
	$\Box_i$  & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & -  \\
101 137 adas
	$\ph$& $S_2$ & - \\
102 142 adas
	$\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\
103 137 adas
%	$k$-$\exptime$ & -  & $\mathit{ELL}(k)$ \\
104 140 pbaillot
	Elementary & $I\Delta_0 + \exp$  & $\mathit{ELL}\;  \cite{Girard94:lll}$
105 127 pbaillot
\end{tabular}
106 127 pbaillot
107 132 adas
\bigskip
108 132 adas
109 132 adas
\noindent
110 142 adas
Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'.
111 140 pbaillot
%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture.
112 142 adas
%
113 140 pbaillot
% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several
114 142 adas
  Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular:
115 140 pbaillot
 \begin{itemize}
116 142 adas
   \item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra;
117 142 adas
   \item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra.
118 140 pbaillot
 \end{itemize}
119 142 adas
We classify some known characterisations from the literature according to these two parameters in  the following table:
120 132 adas
\bigskip
121 140 pbaillot
122 140 pbaillot
\begin{tabular}{c|c|c}
123 129 adas
	{
124 129 adas
		%\small model of comp. $\backslash$ extracted program
125 140 pbaillot
		} & bounded rec. programs & tiered rec. programs \\
126 129 adas
	\hline &&\\
127 142 adas
	formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\
128 142 adas
%	& bounded induction (Buss \cite{Buss86book}) &\\
129 129 adas
	\hline &&\\
130 142 adas
	equational && $\ptime$\\
131 140 pbaillot
	&& (Leivant \cite{Leivant94:intrinsic-theories}) \\
132 129 adas
	\hline &&\\
133 142 adas
	applicative & $\ptime$ (Strahm \cite{Strahm03})  & $\ptime$ \\
134 142 adas
	&$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02})
135 127 pbaillot
\end{tabular}
136 129 adas
137 140 pbaillot
%TODO: improve table to make clear columns and rows, explicit and implicit columns.
138 140 pbaillot
%
139 140 pbaillot
%\begin{tabular}{c|c|c|c}
140 140 pbaillot
%	{
141 140 pbaillot
%		%\small model of comp. $\backslash$ extracted program
142 140 pbaillot
%		} & Cobham & mon. constraints & BC-like \\
143 140 pbaillot
%	\hline &&\\
144 140 pbaillot
%	formula & PH, $\square_i$&&\\
145 140 pbaillot
%	& bounded induction (Buss) &&\\
146 140 pbaillot
%	\hline &&\\
147 140 pbaillot
%	equational &&& P\\
148 140 pbaillot
%	&&& (Leivant) \\
149 140 pbaillot
%	\hline &&\\
150 140 pbaillot
%	applicative &&PH & P \\
151 140 pbaillot
%	&&(Kahle-Oitavem)& (Cantini)
152 140 pbaillot
%\end{tabular}
153 140 pbaillot
154 132 adas
\bigskip
155 132 adas
156 132 adas
\noindent
157 142 adas
Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
158 140 pbaillot
%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy.
159 129 adas
160 137 adas
\section{Towards an implicit theory for $\ph$}
161 129 adas
%As we mentioned, the goal of this work-in-progress is to arrive at an implicit characterisation of PH.
162 137 adas
We explain our approach for this work-in-progress in more detail here, referring to previous work when analogous methods are used.
163 129 adas
164 137 adas
\subsection{Implicit programs for $\ph$}
165 137 adas
Since we want to remain at ground type, the natural programs in which to extract our witnesses will come from recursion theoretic characterisations, cf.\ the table above. Indeed, as we have already mentioned, we are not aware of any `higher-type' characterisation of $\ph$.
166 137 adas
Of these, only the Bellantoni framework from \cite{BellantoniThesis}, which extends BC-programs by \emph{predicative minimisation} constitutes an implicit characterisation, and so we will look to extract our programs into this function algebra, henceforth denoted $\mu$BC.
167 130 adas
168 133 adas
\subsection{Constraints on induction}
169 137 adas
An appealing feature of the bounded arithmetic approach is that bounds on (bounded) quantifier alternation in induction formulae precisely delimit the levels of $\ph$, and one of our desiderata is to replicate this property, only for unbounded quantifiers.
170 137 adas
Naturally, another constraint will be required to stop ourselves from exhausting the arithmetical hierarchy once bounds are dismissed, and for this we use essentially a \emph{ramification} of individuals: explicit predicates $N_0, N_1 , \dots$ will be used similarly to Peano's $N$ predicate to intuitively indicate `how sure' we are that a variable denotes a genuine natural number.
171 130 adas
172 137 adas
In fact, two predicates will suffice and their relationship is entirely governed by the equation $N_1 (x) \iff \square N_0 (x)$, under the laws of the modal logic $\mathit{S4}$.
173 137 adas
The distinction between the two predicates corresponds to the distinction between safe and normal variables in BC-like programs, which was an observation from previous work \cite{BaillotDas16}.
174 137 adas
A similar phenomenon occurs in Cantini's work \cite{Cantini02}, which presents a characterisation of $\ptime$ in an \emph{applicative theory}, in order to extract BC programs.
175 141 pbaillot
While he allows arbitrary alternation of unbounded quantifiers, note that his induction is \emph{positive}, and so universal quantifiers cannot vary over certified natural numbers, i.e.\ individuals in $N$. In fact this sort of unbounded quantification is also compatible with our approach of \cite{BaillotDas16}.
176 141 pbaillot
%with an approach in previous work where we characterised $\ptime$ in a \emph{linear logic}, also extracting BC programs %\cite{BaillotDas16}.
177 133 adas
178 133 adas
179 133 adas
180 133 adas
\subsection{Extraction at ground type}
181 141 pbaillot
As we did in \cite{BaillotDas16}, we will rely on the \emph{witness function method} for extracting functions at bounded type.
182 142 adas
%This was pioneered by Buss, although independently used by Mints beforehand.
183 142 adas
The idea is as follows:
184 137 adas
\begin{enumerate}
185 137 adas
	\item\label{item:de-morgan} Reduce a proof to \emph{De Morgan} normal form, with formulae over the basis $\{ \bot, \top, \vee , \wedge , \exists, \wedge \}$ and negation restricted to atoms.
186 137 adas
	\item\label{item:free-cut} Conduct a \emph{free-cut elimination} on the proof, resulting in a proof whose formulae are restricted to
187 137 adas
	essentially just subformulae of the conclusion, axioms and nonlogical steps.
188 137 adas
	\item\label{item:interp} Extract witnesses inductively from the proof, with appropriate semantic properties of these programs verified by an interpretation into a (classical) quantifier-free theory.
189 137 adas
\end{enumerate}
190 133 adas
191 137 adas
\ref{item:de-morgan} ensures that our extraction works at ground type, rather than higher types which are typically necessary when negation has larger scope.
192 137 adas
At the same time it preserves the quantifier alternation information that is crucial to distinguishing the levels of $\ph$.
193 137 adas
\ref{item:free-cut} allows us to assume that all formulae in a proof have logical complexity bounded by that of induction formulae.
194 137 adas
This means that, when extracting programs via \ref{item:interp}, quantifier alternation of induction formulae corresponds to the depth of minimisation operators in a $\mu$BC program, and so potentially allows for a level-by-level correspondence with the polynomial hierarchy.
195 133 adas
196 137 adas
197 142 adas
We point out that, in some ways, this is similar to approaches from applicative theories, which typically use free-cut elimination followed by a direct \emph{realisability} argument, e.g.\ in \cite{Strahm03}, \cite{Cantini02} and \cite{KahOit:13:ph-levels}.
198 137 adas
Indeed this could have been possible in our previous work \cite{BaillotDas16}, as Cantini did in his work \cite{Cantini02}, for a characterisation of $\ptime$.
199 137 adas
However, in this case, since the quantifiers are unbounded the realisability argument is apparently not readily formalised, and it is therefore quite natural to pursue a \emph{bona fide} proof interpretation.
200 137 adas
For this, it seems we need to go one level higher than type 1 functions to verify semantic properties of witnesses of first-order formulae, themselves considered as genuine type 1 functions. Intuitively this is simply an inlining of \emph{Skolemisation}, although the idea of extending `witness predicates' to type 1 objects resembles methods from second-order bounded arithmetic, e.g.\ \cite{Cook:2010:LFP:1734064}.
201 141 pbaillot
Unlike in the bounded arithmetic setting, due to the apparent unboundedness of programs in the $\mu$BC framework, we will need a formal witness predicate implemented itself as a BC-like program, hence the need for a proof interpretation rather than a realisability approach.
202 137 adas
% since we cannot externally certify the complexity of the predicate when unbounded quantifiers abound.
203 137 adas
Fortunately, we believe that it suffices to consider $\mu$BC-programs with \emph{holes}, rather than a full characterisation of type 2 $\ph$, but verifying that such an approach could work represents the outstanding technical component of this work-in-progress.
204 129 adas
205 133 adas
206 133 adas
	\subsection{Completeness for PH}
207 137 adas
	In the other direction, showing completeness for $\ph$, it seems straightforward to formalise a standard argument, e.g.\ from bounded arithmetic \cite{Buss86book}, where applications of minimisation in a program correspond to the \emph{well ordering property} in arithmetic.
208 137 adas
	This is in turn is a corollary of induction but, in this case, crucially relies on the use of \emph{right-contraction} in the logic.
209 137 adas
	It seems that this feature is crucial in distinguishing these theories from `linear' variants like in previous work \cite{BaillotDas16}, and in particular work of Bellantoni and Hofmann \cite{BelHof:02} where, without right-contraction, any number of quantifier alternations still corresponds to only polynomial time computation.
210 136 pbaillot
211 137 adas
%	* PB: I would suggest to skip **
212 137 adas
%
213 137 adas
%	TODO or skip? If so just say that we formalise the standard argument (with explanation, e.g.\ minimisation, WOP, induction) but rely on safety of quantification rather than boundedness, which should come for free by inspection.
214 137 adas
%
215 133 adas
	\subsection{Putting it all together}
216 133 adas
217 137 adas
To summarise the main goal of this work-in-progress, we are aiming for a variation of the following result:
218 131 adas
219 131 adas
220 133 adas
\begin{conjecture*}
221 137 adas
	First-order classical modal logic $\mathit{S4}$ with induction restricted to non-modal formulae, over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
222 133 adas
\end{conjecture*}
223 130 adas
224 133 adas
225 133 adas
%	As mentioned, we will
226 133 adas
%
227 133 adas
%	[copied]
228 133 adas
%
229 133 adas
%	%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
230 133 adas
%
231 133 adas
%	the setting we will consider:
232 133 adas
%	\begin{itemize}
233 133 adas
%		\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
234 133 adas
%		\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
235 133 adas
%	\end{itemize}
236 133 adas
%
237 133 adas
238 133 adas
%	the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
239 133 adas
%
240 133 adas
%
241 133 adas
%
242 133 adas
%\subsection{Extending previous work}
243 133 adas
%
244 133 adas
%
245 133 adas
%\subsection{Witness function method}
246 133 adas
%%keep this subsection?
247 133 adas
%
248 133 adas
%
249 133 adas
%\subsection{Relation to previous work}
250 133 adas
%
251 133 adas
%an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
252 133 adas
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
253 127 pbaillot
254 129 adas
\section{Conclusions}
255 137 adas
We surveyed the state of the art for representing function classes proof theoretically by logics and theories, and considered the problem of finding an implicit characterisation of $\ph$.
256 137 adas
Identifying the witness function method as a useful tool for witness extraction at bounded type level, a seemingly important prerequisite for characterising $\ph$, we sought to calibrate an appropriate theory of arithmetic for witness extraction to the $\mu$BC characterisation of $\ph$.
257 137 adas
We presented a conjecture that a modal theory suffices to carry out this characterisation, based on previous work by ourselves and others \cite{BaillotDas16} \cite{Cantini02} \cite{BelHof:02} and proving this result constitutes the outstanding work-in-progress.
258 130 adas
259 137 adas
\bibliographystyle{plain}
260 135 adas
\bibliography{biblio}
261 135 adas
262 127 pbaillot
\end{document}