Statistiques
| Révision :

root / CharacterizingPH / LCC17 / lcc2017.tex @ 269

Historique | Voir | Annoter | Télécharger (24,08 ko)

1 184 adas
\documentclass[a4paper]{article}
2 184 adas
3 184 adas
\usepackage{amssymb}
4 186 adas
\usepackage{amsmath}
5 184 adas
\usepackage{amsthm}
6 184 adas
\usepackage{hyperref}
7 184 adas
\setcounter{tocdepth}{3}
8 184 adas
9 184 adas
\newtheorem*{conjecture*}{Conjecture}
10 186 adas
\newtheorem*{theorem*}{Theorem}
11 184 adas
\newcommand{\fph}{\mathbf{PH}}
12 184 adas
13 184 adas
14 184 adas
\title{An implicit characterisation of the polynomial hierarchy in an unbounded arithmetic }
15 184 adas
\author{Patrick Baillot \and Anupam Das}
16 184 adas
%\date{ Univ Lyon, CNRS, ENS de Lyon, Universit\'e Claude Bernard Lyon 1, LIP
17 184 adas
%	%\\[2ex] \today
18 184 adas
%	}
19 184 adas
\date{ Univ Lyon, CNRS, ENS de Lyon, UCB Lyon 1, LIP
20 184 adas
	%\\[2ex] \today
21 184 adas
	}
22 184 adas
	\newcommand{\ph}{\mathbf{PH}}
23 184 adas
	\newcommand{\pspace}{\mathbf{PSPACE}}
24 184 adas
	\newcommand{\fpspace}{\mathbf{FPSPACE}}
25 184 adas
	\newcommand{\ptime}{\mathbf{P}}
26 184 adas
	\newcommand{\fptime}{\mathbf{FP}}
27 184 adas
	\newcommand{\nc}{\mathbf{NC}}
28 184 adas
	\newcommand{\ac}{\mathbf{AC}}
29 184 adas
	\newcommand{\exptime}{\mathbf{EXP}}
30 184 adas
31 184 adas
32 184 adas
\begin{document}
33 184 adas
\maketitle
34 184 adas
35 184 adas
%\begin{itemize}
36 184 adas
%\item a big picture: logic methods for complexity classes:
37 184 adas
%
38 184 adas
%\begin{tabular}{c|c}
39 184 adas
%ground & higher-order\\
40 184 adas
%quantifiers  & type-level\\
41 184 adas
%PSPACE    & $k$-EXP\\
42 184 adas
%PH  &              P\\
43 184 adas
%P  &\\
44 184 adas
%$NC_i$&
45 184 adas
%\end{tabular}
46 184 adas
%
47 184 adas
%\item  state of the art on arithmetics for complexity classes:
48 184 adas
%
49 184 adas
%\begin{tabular}{c|c|c|c}
50 184 adas
%{\small model of comp. $\backslash$ extracted program } & Cobham & mon. constraints & BC-like \\
51 184 adas
%\hline &&\\
52 184 adas
%formula & PH, $\square_i$&&\\
53 184 adas
%               & bounded induction (Buss) &&\\
54 184 adas
%               \hline &&\\
55 184 adas
%equational &&& P\\
56 184 adas
%&&& (intrinsic theories: Leivant) \\
57 184 adas
%\hline &&\\
58 184 adas
%applicative &&PH & P \\
59 184 adas
% &&(Kahle-Oitavem)& (Cantini)
60 184 adas
%\end{tabular}
61 184 adas
%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
62 184 adas
%\item an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
63 184 adas
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
64 184 adas
%\item the setting we will consider:
65 184 adas
%\begin{itemize}
66 184 adas
%\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
67 184 adas
%\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
68 184 adas
%\end{itemize}
69 184 adas
%\item Our conjecture: ramified first-order modal classical logic with full induction, for equational programs, characterize the class PH.
70 184 adas
%
71 184 adas
%the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
72 184 adas
%\end{itemize}
73 184 adas
%
74 184 adas
%\newpage
75 184 adas
76 184 adas
\section{Introduction and motivation}
77 184 adas
Today, there are countless approaches towards characterising complexity classes via logic.
78 184 adas
Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory.
79 184 adas
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
80 184 adas
81 184 adas
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
82 184 adas
A somewhat orthogonal distinction is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}.
83 184 adas
84 186 adas
While implicit constraints may be preferable since no bounds occur in the characterisation itself \emph{per se}, explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes. For instance, the polynomial hierarchy, $\ph$, and its levels can be neatly characterised by the theories $S^i_2$ of \emph{bounded arithmetic}, using bounds on quantifiers to control complexity \cite{Buss86book}.\footnote{Other approaches to $\ph$ exist, but also use explicit bounds, e.g.\ \cite{Cook:2010:LFP:1734064}, \cite{KahOit:13:ph-levels}.}
85 186 adas
%
86 186 adas
%Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}.
87 186 adas
%
88 184 adas
89 186 adas
In this work we improve the situation by using implicit methods in first-order theories to characterise $\ph$.
90 186 adas
To achieve this we work with a function algebra of Bellantoni from \cite{BellantoniThesis} in which to extract programs, and use the \emph{witness function method} of Buss to extract programs at ground type and preserve quantifier information, necessary to delineate the levels of $\ph$.
91 184 adas
92 269 adas
93 269 adas
94 269 adas
95 186 adas
%One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}.
96 186 adas
%In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories.
97 186 adas
%This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}.
98 184 adas
99 186 adas
%\section{State of the art}
100 186 adas
%As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory.
101 186 adas
%As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.}
102 186 adas
%%, distinguished by the type level of programs extracted:
103 184 adas
%
104 186 adas
%\bigskip
105 184 adas
%
106 186 adas
%\begin{tabular}{c|c|c}
107 186 adas
%Class &	Ground & Higher order\\
108 186 adas
%	\hline
109 186 adas
%%	quantifiers  & type-level\\
110 186 adas
%	$\nc^i$    & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\
111 186 adas
%	$\ptime$  &  $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\
112 186 adas
%	$\Box_i$  & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & -  \\
113 186 adas
%	$\ph$& $S_2$ & - \\
114 186 adas
%	$\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\
115 186 adas
%%	$k$-$\exptime$ & -  & $\mathit{ELL}(k)$ \\
116 186 adas
%	Elementary & $I\Delta_0 + \exp$  & $\mathit{ELL}\;  \cite{Girard94:lll}$
117 186 adas
%\end{tabular}
118 186 adas
%
119 186 adas
%\bigskip
120 186 adas
%
121 186 adas
%\noindent
122 186 adas
%Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'.
123 186 adas
%%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture.
124 186 adas
%%
125 186 adas
%% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several
126 186 adas
%  Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular:
127 186 adas
% \begin{itemize}
128 186 adas
%   \item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra;
129 186 adas
%   \item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra.
130 186 adas
% \end{itemize}
131 186 adas
%We classify some known characterisations from the literature according to these two parameters in  the following table:
132 186 adas
%\bigskip
133 186 adas
%
134 186 adas
%\begin{tabular}{c|c|c}
135 184 adas
%	{
136 184 adas
%		%\small model of comp. $\backslash$ extracted program
137 186 adas
%		} & bounded rec. programs & tiered rec. programs \\
138 184 adas
%	\hline &&\\
139 186 adas
%	formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\
140 186 adas
%%	& bounded induction (Buss \cite{Buss86book}) &\\
141 184 adas
%	\hline &&\\
142 186 adas
%	equational && $\ptime$\\
143 186 adas
%	&& (Leivant \cite{Leivant94:intrinsic-theories}) \\
144 184 adas
%	\hline &&\\
145 186 adas
%	applicative & $\ptime$ (Strahm \cite{Strahm03})  & $\ptime$ \\
146 186 adas
%	&$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02})
147 184 adas
%\end{tabular}
148 186 adas
%
149 186 adas
%%TODO: improve table to make clear columns and rows, explicit and implicit columns.
150 186 adas
%%
151 186 adas
%%\begin{tabular}{c|c|c|c}
152 186 adas
%%	{
153 186 adas
%%		%\small model of comp. $\backslash$ extracted program
154 186 adas
%%		} & Cobham & mon. constraints & BC-like \\
155 186 adas
%%	\hline &&\\
156 186 adas
%%	formula & PH, $\square_i$&&\\
157 186 adas
%%	& bounded induction (Buss) &&\\
158 186 adas
%%	\hline &&\\
159 186 adas
%%	equational &&& P\\
160 186 adas
%%	&&& (Leivant) \\
161 186 adas
%%	\hline &&\\
162 186 adas
%%	applicative &&PH & P \\
163 186 adas
%%	&&(Kahle-Oitavem)& (Cantini)
164 186 adas
%%\end{tabular}
165 186 adas
%
166 186 adas
%\bigskip
167 186 adas
%
168 186 adas
%\noindent
169 186 adas
%%%% DICEFOPARA revision hereafter
170 186 adas
%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the formula style of specification (first row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
171 186 adas
%%
172 186 adas
%%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
173 186 adas
%%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy.
174 184 adas
175 184 adas
176 186 adas
\section{Methodology}
177 186 adas
We describe some of the techniques used in this work, before briefly giving our main results in the next section.
178 184 adas
179 184 adas
\subsection{Implicit programs for $\ph$}
180 186 adas
Extracting programs at ground type seems to be a necessity in order to delineate the levels of $\ph$.\footnote{Indeed we are not aware of any `higher-type' characterisation of $\ph$.} Therefore the natural programs in which to extract our witnesses will come from \emph{recursion theoretic} characterisations.
181 186 adas
Of these, only the Bellantoni framework from \cite{BellantoniThesis}, which extends safe recursive programs \cite{BellantoniCook92} by \emph{predicative minimisation} constitutes an implicit characterisation, and so we extract our programs into this function algebra, henceforth denoted $\mu$BC.
182 184 adas
183 184 adas
\subsection{Constraints on induction}
184 186 adas
An appealing feature of the bounded arithmetic approach is that bounds on (bounded) quantifier alternation in induction formulae precisely delimit the levels of $\ph$, and we are able to replicate this property, only for unbounded quantifiers.
185 186 adas
Naturally, another constraint is required to stop ourselves from exhausting the arithmetical hierarchy once bounds are dismissed, and for this we use essentially a \emph{ramification} of individuals: explicit predicates $N_0, N_1 , \dots$ are used similarly to Peano's $N$ predicate to intuitively indicate `how sure' we are that a variable denotes a genuine natural number.
186 184 adas
187 186 adas
In fact, two predicates suffice and their relationship is entirely governed by the equation $N_1 (x) \iff \square N_0 (x)$, under the laws of the modal logic $\mathit{S4}$.
188 186 adas
The distinction between the two predicates corresponds to the distinction between safe and normal variables in BC  programs, which was an observation from previous work \cite{BaillotDas16}.
189 184 adas
A similar phenomenon occurs in Cantini's work \cite{Cantini02}, which presents a characterisation of $\ptime$ in an \emph{applicative theory}, in order to extract BC programs.
190 184 adas
While he allows arbitrary alternation of unbounded quantifiers, note that his induction is \emph{positive}, and so universal quantifiers cannot vary over certified natural numbers, i.e.\ individuals in $N$. In fact this sort of unbounded quantification is also compatible with our approach of \cite{BaillotDas16}.
191 184 adas
%with an approach in previous work where we characterised $\ptime$ in a \emph{linear logic}, also extracting BC programs %\cite{BaillotDas16}.
192 184 adas
193 269 adas
The idea of using ramified theories in implicit complexity, inducting on normal variables rather than safe, is largely due to Leivant \cite{Leivant94:intrinsic-theories}, who introduced \emph{intrinsic theories} for an arbitrary free algebra.
194 269 adas
The same idea was also used in \cite{OstrinWainer05} for a theory of arithmetic characterising the elementary functions, somewhat reworking of Leivant's work.
195 269 adas
The main difference in this work, which is why we are able to characterise $\ph$, is that for our model of computation we simply use formulas of the theory rather than equational specifications used in \cite{Leivant94:intrinsic-theories} and \cite{OstrinWainer05}. This indeed has a significant effect on the complexity class characterised, as observed in \cite{BelHof:02}.
196 269 adas
%In this way, we extend rather certain work in Bellantoni's thesis \cite{BellantoniThesis}, where theories for $\ptime$ are presented.
197 184 adas
198 184 adas
\subsection{Extraction at ground type}
199 186 adas
We rely on the \emph{witness function method} for extracting functions at bounded type.
200 184 adas
%This was pioneered by Buss, although independently used by Mints beforehand.
201 184 adas
The idea is as follows:
202 184 adas
\begin{enumerate}
203 184 adas
	\item\label{item:de-morgan} Reduce a proof to \emph{De Morgan} normal form, with formulae over the basis $\{ \bot, \top, \vee , \wedge , \exists, \wedge \}$ and negation restricted to atoms.
204 184 adas
	\item\label{item:free-cut} Conduct a \emph{free-cut elimination} on the proof, resulting in a proof whose formulae are restricted to
205 184 adas
	essentially just subformulae of the conclusion, axioms and nonlogical steps.
206 269 adas
	\item\label{item:interp} Extract witnesses inductively from the proof into an appropriate function algebra, verifying the necessary semantic properties along the way.
207 186 adas
	\end{enumerate}
208 184 adas
209 186 adas
	\ref{item:de-morgan} ensures that our extraction works at ground type, rather than higher types which are typically necessary when negation has larger scope.
210 186 adas
	At the same time it preserves the quantifier alternation information that is crucial to distinguishing the levels of $\ph$.
211 186 adas
	\ref{item:free-cut} allows us to assume that all formulae in a proof have logical complexity bounded by that of induction formulae.
212 186 adas
	This means that, when extracting programs via \ref{item:interp}, quantifier alternation of induction formulae corresponds to the depth of minimisation operators in a $\mu$BC program, allowing for a level-by-level correspondence with the polynomial hierarchy.
213 184 adas
214 186 adas
215 186 adas
%	We point out that, in some ways, this is similar to approaches from applicative theories, which typically use free-cut elimination followed by a direct \emph{realisability} argument, e.g.\ in \cite{Strahm03}, \cite{Cantini02} and \cite{KahOit:13:ph-levels}.
216 186 adas
%	Indeed this could have been possible in our previous work \cite{BaillotDas16}, as Cantini did in his work \cite{Cantini02}, for a characterisation of $\ptime$.
217 186 adas
%	However, in this case, since the quantifiers are unbounded the realisability argument is apparently not readily formalised, and it is therefore quite natural to pursue a \emph{bona fide} proof interpretation.
218 186 adas
219 186 adas
	%%% Following part has been removed in the revised DICEFOPARA version
220 186 adas
	%For this, it seems we need to go one level higher than type 1 functions to verify semantic properties of witnesses of first-order formulae, themselves considered as genuine type 1 functions. Intuitively this is simply an inlining of \emph{Skolemisation}, although the idea of extending `witness predicates' to type 1 objects resembles methods from second-order bounded arithmetic, e.g.\ \cite{Cook:2010:LFP:1734064}.
221 186 adas
	%Unlike in the bounded arithmetic setting, due to the apparent unboundedness of programs in the $\mu$BC framework, we will need a formal witness predicate implemented itself as a BC-like program, hence the need for a proof interpretation rather than a realisability approach.
222 186 adas
	%% since we cannot externally certify the complexity of the predicate when unbounded quantifiers abound.
223 186 adas
	%Fortunately, we believe that it suffices to consider $\mu$BC-programs with \emph{holes}, rather than a full characterisation of type 2 $\ph$, but verifying that such an approach could work represents the outstanding technical component of this work-in-progress.
224 186 adas
225 186 adas
226 184 adas
	\subsection{Completeness for PH}
227 186 adas
	In the other direction, showing completeness for $\ph$, we are able to formalise a more-or-less standard argument, e.g.\ from bounded arithmetic \cite{Buss86book}, where applications of minimisation in a program correspond to applications of the \emph{well ordering property} in arithmetic.
228 184 adas
	This is in turn is a corollary of induction but, in this case, crucially relies on the use of \emph{right-contraction} in the logic.
229 184 adas
	It seems that this feature is crucial in distinguishing these theories from `linear' variants like in previous work \cite{BaillotDas16}, and in particular work of Bellantoni and Hofmann \cite{BelHof:02} where, without right-contraction, any number of quantifier alternations still corresponds to only polynomial time computation.
230 184 adas
231 186 adas
	%	* PB: I would suggest to skip **
232 186 adas
	%
233 186 adas
	%	TODO or skip? If so just say that we formalise the standard argument (with explanation, e.g.\ minimisation, WOP, induction) but rely on safety of quantification rather than boundedness, which should come for free by inspection.
234 186 adas
	%
235 184 adas
236 184 adas
237 184 adas
238 186 adas
	%\begin{conjecture*}
239 186 adas
	%	First-order classical modal logic $\mathit{S4}$ with induction restricted to non-modal formulae, over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
240 186 adas
	%\end{conjecture*}
241 186 adas
	% ALTERNATIVE SUGGESTION
242 186 adas
	%\begin{conjecture*}
243 186 adas
	%	First-order ramified classical  logic with induction restricted to \textit{safe} formulae (that is to say not containing any $N_1$), over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
244 186 adas
	%\end{conjecture*}
245 184 adas
246 184 adas
247 186 adas
	%	As mentioned, we will
248 186 adas
	%
249 186 adas
	%	[copied]
250 186 adas
	%
251 186 adas
	%	%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
252 186 adas
	%
253 186 adas
	%	the setting we will consider:
254 186 adas
	%	\begin{itemize}
255 186 adas
	%		\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
256 186 adas
	%		\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
257 186 adas
	%	\end{itemize}
258 186 adas
	%
259 184 adas
260 186 adas
	%	the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
261 186 adas
	%
262 186 adas
	%
263 186 adas
	%
264 186 adas
	%\subsection{Extending previous work}
265 186 adas
	%
266 186 adas
	%
267 186 adas
	%\subsection{Witness function method}
268 186 adas
	%%keep this subsection?
269 186 adas
	%
270 186 adas
	%
271 186 adas
	%\subsection{Relation to previous work}
272 186 adas
	%
273 186 adas
	%an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
274 186 adas
	%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
275 184 adas
276 186 adas
\section{Results}
277 186 adas
%As we mentioned, the goal of this work-in-progress is to arrive at an implicit characterisation of PH.
278 186 adas
%We explain our approach in more detail here.
279 186 adas
Due to space constraints, we give only an informal account of our results.
280 184 adas
281 186 adas
\medskip
282 186 adas
283 186 adas
\noindent
284 186 adas
	We define a family of theories $B^i$ over the language $\{0,s,+,\times, \# , |\cdot|,\lfloor \frac{\cdot}{2} \rfloor \}$ of bounded arithmetic augmented with two predicates, $N_0$ and $N_1$, which act as ramifiers for our theory.
285 186 adas
	These replicate the distinction between safe and normal input, respectively, for $\mu$BC programs.
286 186 adas
		We set $N_1 \subseteq N_0$ and crucially have the following non-logical inference step:\footnote{Seen from the modal point of view, this is a form of \emph{necessitation} for models whose second-order parts are closed under first-order comprehension.}
287 186 adas
	\[
288 186 adas
	\frac{\vdash \forall \vec x \in N_1 . \exists \vec y \in N_0 . A(\vec x , \vec y)}{\vdash \forall \vec x \in N_1 . \exists \vec y \in N_1 . A(\vec x , \vec y)}
289 186 adas
	\]
290 186 adas
291 186 adas
292 186 adas
293 186 adas
	For the arithmetic function symbols we give their basic defining axioms as for the theories $S^i_2$ from \cite{Buss86book}, only relativising quantifiers to match their safe-normal sorting of arguments from the Bellantoni-Cook framework.\footnote{For instance, $s, +, |\cdot|,\lfloor \frac{\cdot}{2} \rfloor $ take $N_0$ arguments, $\times$ takes one $N_0$ and one $N_1$, and $\#$ takes two $N_1$ arguments. All terms are in $N_0$.}
294 186 adas
295 186 adas
	We define the $\Sigma^{N_0}_i $-$\Pi^{N_0}_i$ formula hierarchy analogously to the (bounded) arithmetical hierarchy, only counting alternations of `safe quantifiers', i.e.\ those relativised to $N_0$.
296 186 adas
	The theory $B^i_2$ contains the axiom schema of \emph{normal polynomial induction} on $\Sigma^{N_0}_i$ formulae $A$:
297 186 adas
	\[
298 186 adas
	\left(A(0) \wedge \forall u \in N_1 . (A\left(\lfloor \tfrac{u}{2} \rfloor\right) \supset A(u) )\right) \supset \forall u \in N_1 . A(u)
299 186 adas
	\]
300 186 adas
%	where $A$ is $\Sigma^{N_0}_i$.
301 186 adas
302 186 adas
	Our main result is the following:
303 186 adas
	\begin{theorem*}
304 186 adas
		$B^i_2$ proves the totality of precisely the $\Box^p_i$ functions.
305 186 adas
	\end{theorem*}
306 186 adas
307 186 adas
308 186 adas
309 186 adas
310 186 adas
%\section{Conclusions}
311 186 adas
%We surveyed the state of the art for representing function classes proof theoretically by logics and theories, and considered the problem of finding an implicit characterisation of $\ph$.
312 186 adas
%Identifying the witness function method as a useful tool for witness extraction at bounded type level, a seemingly important prerequisite for characterising $\ph$, we sought to calibrate an appropriate theory of arithmetic for witness extraction to the $\mu$BC characterisation of $\ph$.
313 186 adas
%%We presented a conjecture that a ramified theory suffices to carry out this characterisation, based on previous work by ourselves and others
314 186 adas
%We presented a conjecture that a modal theory suffices to carry out this characterisation, based on previous work by ourselves and others\cite{BaillotDas16} \cite{Cantini02} \cite{BelHof:02} and proving this result constitutes the outstanding work-in-progress.
315 186 adas
316 184 adas
\bibliographystyle{plain}
317 184 adas
\bibliography{biblio}
318 184 adas
319 184 adas
\end{document}