Statistiques
| Révision :

root / CharacterizingPH / LCC17 / lcc2017.tex @ 269

Historique | Voir | Annoter | Télécharger (24,08 ko)

1
\documentclass[a4paper]{article}
2

    
3
\usepackage{amssymb}
4
\usepackage{amsmath}
5
\usepackage{amsthm}
6
\usepackage{hyperref}
7
\setcounter{tocdepth}{3}
8

    
9
\newtheorem*{conjecture*}{Conjecture}
10
\newtheorem*{theorem*}{Theorem}
11
\newcommand{\fph}{\mathbf{PH}}
12

    
13

    
14
\title{An implicit characterisation of the polynomial hierarchy in an unbounded arithmetic }
15
\author{Patrick Baillot \and Anupam Das}
16
%\date{ Univ Lyon, CNRS, ENS de Lyon, Universit\'e Claude Bernard Lyon 1, LIP
17
%	%\\[2ex] \today
18
%	}
19
\date{ Univ Lyon, CNRS, ENS de Lyon, UCB Lyon 1, LIP
20
	%\\[2ex] \today
21
	}	
22
	\newcommand{\ph}{\mathbf{PH}}
23
	\newcommand{\pspace}{\mathbf{PSPACE}}
24
	\newcommand{\fpspace}{\mathbf{FPSPACE}}
25
	\newcommand{\ptime}{\mathbf{P}}
26
	\newcommand{\fptime}{\mathbf{FP}}
27
	\newcommand{\nc}{\mathbf{NC}}
28
	\newcommand{\ac}{\mathbf{AC}}
29
	\newcommand{\exptime}{\mathbf{EXP}}
30

    
31

    
32
\begin{document}
33
\maketitle
34

    
35
%\begin{itemize}
36
%\item a big picture: logic methods for complexity classes:
37
%
38
%\begin{tabular}{c|c}
39
%ground & higher-order\\
40
%quantifiers  & type-level\\
41
%PSPACE    & $k$-EXP\\
42
%PH  &              P\\
43
%P  &\\
44
%$NC_i$&
45
%\end{tabular}
46
%
47
%\item  state of the art on arithmetics for complexity classes:
48
%
49
%\begin{tabular}{c|c|c|c}
50
%{\small model of comp. $\backslash$ extracted program } & Cobham & mon. constraints & BC-like \\
51
%\hline &&\\
52
%formula & PH, $\square_i$&&\\
53
%               & bounded induction (Buss) &&\\
54
%               \hline &&\\
55
%equational &&& P\\
56
%&&& (intrinsic theories: Leivant) \\
57
%\hline &&\\
58
%applicative &&PH & P \\
59
% &&(Kahle-Oitavem)& (Cantini)
60
%\end{tabular}
61
%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
62
%\item an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
63
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
64
%\item the setting we will consider: 
65
%\begin{itemize}
66
%\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
67
%\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
68
%\end{itemize}
69
%\item Our conjecture: ramified first-order modal classical logic with full induction, for equational programs, characterize the class PH.
70
%
71
%the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
72
%\end{itemize}
73
%
74
%\newpage
75

    
76
\section{Introduction and motivation}
77
Today, there are countless approaches towards characterising complexity classes via logic.
78
Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory.
79
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
80

    
81
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
82
A somewhat orthogonal distinction is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}.
83

    
84
While implicit constraints may be preferable since no bounds occur in the characterisation itself \emph{per se}, explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes. For instance, the polynomial hierarchy, $\ph$, and its levels can be neatly characterised by the theories $S^i_2$ of \emph{bounded arithmetic}, using bounds on quantifiers to control complexity \cite{Buss86book}.\footnote{Other approaches to $\ph$ exist, but also use explicit bounds, e.g.\ \cite{Cook:2010:LFP:1734064}, \cite{KahOit:13:ph-levels}.}
85
%
86
%Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}.
87
%
88

    
89
In this work we improve the situation by using implicit methods in first-order theories to characterise $\ph$.
90
To achieve this we work with a function algebra of Bellantoni from \cite{BellantoniThesis} in which to extract programs, and use the \emph{witness function method} of Buss to extract programs at ground type and preserve quantifier information, necessary to delineate the levels of $\ph$.
91

    
92

    
93

    
94

    
95
%One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}.
96
%In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories.
97
%This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}.
98

    
99
%\section{State of the art}
100
%As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory.
101
%As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.}
102
%%, distinguished by the type level of programs extracted:
103
%
104
%\bigskip
105
%
106
%\begin{tabular}{c|c|c}
107
%Class &	Ground & Higher order\\
108
%	\hline
109
%%	quantifiers  & type-level\\
110
%	$\nc^i$    & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\
111
%	$\ptime$  &  $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\
112
%	$\Box_i$  & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & -  \\
113
%	$\ph$& $S_2$ & - \\
114
%	$\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\
115
%%	$k$-$\exptime$ & -  & $\mathit{ELL}(k)$ \\
116
%	Elementary & $I\Delta_0 + \exp$  & $\mathit{ELL}\;  \cite{Girard94:lll}$
117
%\end{tabular}
118
%
119
%\bigskip
120
%
121
%\noindent
122
%Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'. 
123
%%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture.
124
%%
125
%% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several 
126
%  Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular:
127
% \begin{itemize}
128
%   \item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra;
129
%   \item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra.
130
% \end{itemize}
131
%We classify some known characterisations from the literature according to these two parameters in  the following table:
132
%\bigskip
133
% 
134
%\begin{tabular}{c|c|c}
135
%	{
136
%		%\small model of comp. $\backslash$ extracted program 
137
%		} & bounded rec. programs & tiered rec. programs \\
138
%	\hline &&\\
139
%	formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\
140
%%	& bounded induction (Buss \cite{Buss86book}) &\\
141
%	\hline &&\\
142
%	equational && $\ptime$\\
143
%	&& (Leivant \cite{Leivant94:intrinsic-theories}) \\
144
%	\hline &&\\
145
%	applicative & $\ptime$ (Strahm \cite{Strahm03})  & $\ptime$ \\
146
%	&$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02})
147
%\end{tabular}
148
%
149
%%TODO: improve table to make clear columns and rows, explicit and implicit columns.
150
%%
151
%%\begin{tabular}{c|c|c|c}
152
%%	{
153
%%		%\small model of comp. $\backslash$ extracted program 
154
%%		} & Cobham & mon. constraints & BC-like \\
155
%%	\hline &&\\
156
%%	formula & PH, $\square_i$&&\\
157
%%	& bounded induction (Buss) &&\\
158
%%	\hline &&\\
159
%%	equational &&& P\\
160
%%	&&& (Leivant) \\
161
%%	\hline &&\\
162
%%	applicative &&PH & P \\
163
%%	&&(Kahle-Oitavem)& (Cantini)
164
%%\end{tabular}
165
%
166
%\bigskip
167
%
168
%\noindent
169
%%%% DICEFOPARA revision hereafter
170
%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the formula style of specification (first row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
171
%%
172
%%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
173
%%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy.
174

    
175

    
176
\section{Methodology}
177
We describe some of the techniques used in this work, before briefly giving our main results in the next section.
178

    
179
\subsection{Implicit programs for $\ph$}
180
Extracting programs at ground type seems to be a necessity in order to delineate the levels of $\ph$.\footnote{Indeed we are not aware of any `higher-type' characterisation of $\ph$.} Therefore the natural programs in which to extract our witnesses will come from \emph{recursion theoretic} characterisations. 
181
Of these, only the Bellantoni framework from \cite{BellantoniThesis}, which extends safe recursive programs \cite{BellantoniCook92} by \emph{predicative minimisation} constitutes an implicit characterisation, and so we extract our programs into this function algebra, henceforth denoted $\mu$BC.
182

    
183
\subsection{Constraints on induction}
184
An appealing feature of the bounded arithmetic approach is that bounds on (bounded) quantifier alternation in induction formulae precisely delimit the levels of $\ph$, and we are able to replicate this property, only for unbounded quantifiers.
185
Naturally, another constraint is required to stop ourselves from exhausting the arithmetical hierarchy once bounds are dismissed, and for this we use essentially a \emph{ramification} of individuals: explicit predicates $N_0, N_1 , \dots$ are used similarly to Peano's $N$ predicate to intuitively indicate `how sure' we are that a variable denotes a genuine natural number.
186

    
187
In fact, two predicates suffice and their relationship is entirely governed by the equation $N_1 (x) \iff \square N_0 (x)$, under the laws of the modal logic $\mathit{S4}$. 
188
The distinction between the two predicates corresponds to the distinction between safe and normal variables in BC  programs, which was an observation from previous work \cite{BaillotDas16}.
189
A similar phenomenon occurs in Cantini's work \cite{Cantini02}, which presents a characterisation of $\ptime$ in an \emph{applicative theory}, in order to extract BC programs. 
190
While he allows arbitrary alternation of unbounded quantifiers, note that his induction is \emph{positive}, and so universal quantifiers cannot vary over certified natural numbers, i.e.\ individuals in $N$. In fact this sort of unbounded quantification is also compatible with our approach of \cite{BaillotDas16}.
191
%with an approach in previous work where we characterised $\ptime$ in a \emph{linear logic}, also extracting BC programs %\cite{BaillotDas16}.
192

    
193
The idea of using ramified theories in implicit complexity, inducting on normal variables rather than safe, is largely due to Leivant \cite{Leivant94:intrinsic-theories}, who introduced \emph{intrinsic theories} for an arbitrary free algebra.
194
The same idea was also used in \cite{OstrinWainer05} for a theory of arithmetic characterising the elementary functions, somewhat reworking of Leivant's work.
195
The main difference in this work, which is why we are able to characterise $\ph$, is that for our model of computation we simply use formulas of the theory rather than equational specifications used in \cite{Leivant94:intrinsic-theories} and \cite{OstrinWainer05}. This indeed has a significant effect on the complexity class characterised, as observed in \cite{BelHof:02}.
196
%In this way, we extend rather certain work in Bellantoni's thesis \cite{BellantoniThesis}, where theories for $\ptime$ are presented.
197

    
198
\subsection{Extraction at ground type}
199
We rely on the \emph{witness function method} for extracting functions at bounded type.
200
%This was pioneered by Buss, although independently used by Mints beforehand. 
201
The idea is as follows:
202
\begin{enumerate}
203
	\item\label{item:de-morgan} Reduce a proof to \emph{De Morgan} normal form, with formulae over the basis $\{ \bot, \top, \vee , \wedge , \exists, \wedge \}$ and negation restricted to atoms.
204
	\item\label{item:free-cut} Conduct a \emph{free-cut elimination} on the proof, resulting in a proof whose formulae are restricted to
205
	essentially just subformulae of the conclusion, axioms and nonlogical steps.
206
	\item\label{item:interp} Extract witnesses inductively from the proof into an appropriate function algebra, verifying the necessary semantic properties along the way.
207
	\end{enumerate}
208
	
209
	\ref{item:de-morgan} ensures that our extraction works at ground type, rather than higher types which are typically necessary when negation has larger scope.
210
	At the same time it preserves the quantifier alternation information that is crucial to distinguishing the levels of $\ph$.
211
	\ref{item:free-cut} allows us to assume that all formulae in a proof have logical complexity bounded by that of induction formulae.
212
	This means that, when extracting programs via \ref{item:interp}, quantifier alternation of induction formulae corresponds to the depth of minimisation operators in a $\mu$BC program, allowing for a level-by-level correspondence with the polynomial hierarchy.
213
	
214
	
215
%	We point out that, in some ways, this is similar to approaches from applicative theories, which typically use free-cut elimination followed by a direct \emph{realisability} argument, e.g.\ in \cite{Strahm03}, \cite{Cantini02} and \cite{KahOit:13:ph-levels}.
216
%	Indeed this could have been possible in our previous work \cite{BaillotDas16}, as Cantini did in his work \cite{Cantini02}, for a characterisation of $\ptime$.
217
%	However, in this case, since the quantifiers are unbounded the realisability argument is apparently not readily formalised, and it is therefore quite natural to pursue a \emph{bona fide} proof interpretation.
218
	
219
	%%% Following part has been removed in the revised DICEFOPARA version
220
	%For this, it seems we need to go one level higher than type 1 functions to verify semantic properties of witnesses of first-order formulae, themselves considered as genuine type 1 functions. Intuitively this is simply an inlining of \emph{Skolemisation}, although the idea of extending `witness predicates' to type 1 objects resembles methods from second-order bounded arithmetic, e.g.\ \cite{Cook:2010:LFP:1734064}. 
221
	%Unlike in the bounded arithmetic setting, due to the apparent unboundedness of programs in the $\mu$BC framework, we will need a formal witness predicate implemented itself as a BC-like program, hence the need for a proof interpretation rather than a realisability approach.
222
	%% since we cannot externally certify the complexity of the predicate when unbounded quantifiers abound.
223
	%Fortunately, we believe that it suffices to consider $\mu$BC-programs with \emph{holes}, rather than a full characterisation of type 2 $\ph$, but verifying that such an approach could work represents the outstanding technical component of this work-in-progress.
224
	
225
	
226
	\subsection{Completeness for PH}
227
	In the other direction, showing completeness for $\ph$, we are able to formalise a more-or-less standard argument, e.g.\ from bounded arithmetic \cite{Buss86book}, where applications of minimisation in a program correspond to applications of the \emph{well ordering property} in arithmetic.
228
	This is in turn is a corollary of induction but, in this case, crucially relies on the use of \emph{right-contraction} in the logic.
229
	It seems that this feature is crucial in distinguishing these theories from `linear' variants like in previous work \cite{BaillotDas16}, and in particular work of Bellantoni and Hofmann \cite{BelHof:02} where, without right-contraction, any number of quantifier alternations still corresponds to only polynomial time computation.
230
	
231
	%	* PB: I would suggest to skip **
232
	%	
233
	%	TODO or skip? If so just say that we formalise the standard argument (with explanation, e.g.\ minimisation, WOP, induction) but rely on safety of quantification rather than boundedness, which should come for free by inspection.
234
	%	
235
	
236
	
237
	
238
	%\begin{conjecture*}
239
	%	First-order classical modal logic $\mathit{S4}$ with induction restricted to non-modal formulae, over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
240
	%\end{conjecture*}
241
	% ALTERNATIVE SUGGESTION
242
	%\begin{conjecture*}
243
	%	First-order ramified classical  logic with induction restricted to \textit{safe} formulae (that is to say not containing any $N_1$), over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
244
	%\end{conjecture*}
245
	
246
	
247
	%	As mentioned, we will 
248
	%	
249
	%	[copied]
250
	%	
251
	%	%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
252
	%	
253
	%	the setting we will consider: 
254
	%	\begin{itemize}
255
	%		\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
256
	%		\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
257
	%	\end{itemize}
258
	%	
259
	
260
	%	the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
261
	%
262
	%
263
	%
264
	%\subsection{Extending previous work}
265
	%
266
	%
267
	%\subsection{Witness function method}
268
	%%keep this subsection?
269
	%
270
	%
271
	%\subsection{Relation to previous work}
272
	%
273
	%an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
274
	%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
275

    
276
\section{Results}
277
%As we mentioned, the goal of this work-in-progress is to arrive at an implicit characterisation of PH. 
278
%We explain our approach in more detail here.
279
Due to space constraints, we give only an informal account of our results.
280

    
281
\medskip
282

    
283
\noindent
284
	We define a family of theories $B^i$ over the language $\{0,s,+,\times, \# , |\cdot|,\lfloor \frac{\cdot}{2} \rfloor \}$ of bounded arithmetic augmented with two predicates, $N_0$ and $N_1$, which act as ramifiers for our theory. 
285
	These replicate the distinction between safe and normal input, respectively, for $\mu$BC programs.
286
		We set $N_1 \subseteq N_0$ and crucially have the following non-logical inference step:\footnote{Seen from the modal point of view, this is a form of \emph{necessitation} for models whose second-order parts are closed under first-order comprehension.}
287
	\[
288
	\frac{\vdash \forall \vec x \in N_1 . \exists \vec y \in N_0 . A(\vec x , \vec y)}{\vdash \forall \vec x \in N_1 . \exists \vec y \in N_1 . A(\vec x , \vec y)}
289
	\]
290
	
291
	
292

    
293
	For the arithmetic function symbols we give their basic defining axioms as for the theories $S^i_2$ from \cite{Buss86book}, only relativising quantifiers to match their safe-normal sorting of arguments from the Bellantoni-Cook framework.\footnote{For instance, $s, +, |\cdot|,\lfloor \frac{\cdot}{2} \rfloor $ take $N_0$ arguments, $\times$ takes one $N_0$ and one $N_1$, and $\#$ takes two $N_1$ arguments. All terms are in $N_0$.}
294
	
295
	We define the $\Sigma^{N_0}_i $-$\Pi^{N_0}_i$ formula hierarchy analogously to the (bounded) arithmetical hierarchy, only counting alternations of `safe quantifiers', i.e.\ those relativised to $N_0$.
296
	The theory $B^i_2$ contains the axiom schema of \emph{normal polynomial induction} on $\Sigma^{N_0}_i$ formulae $A$:
297
	\[
298
	\left(A(0) \wedge \forall u \in N_1 . (A\left(\lfloor \tfrac{u}{2} \rfloor\right) \supset A(u) )\right) \supset \forall u \in N_1 . A(u)
299
	\]
300
%	where $A$ is $\Sigma^{N_0}_i$.
301
	
302
	Our main result is the following:
303
	\begin{theorem*}
304
		$B^i_2$ proves the totality of precisely the $\Box^p_i$ functions.
305
	\end{theorem*}
306
	
307
	
308

    
309

    
310
%\section{Conclusions}
311
%We surveyed the state of the art for representing function classes proof theoretically by logics and theories, and considered the problem of finding an implicit characterisation of $\ph$.
312
%Identifying the witness function method as a useful tool for witness extraction at bounded type level, a seemingly important prerequisite for characterising $\ph$, we sought to calibrate an appropriate theory of arithmetic for witness extraction to the $\mu$BC characterisation of $\ph$.
313
%%We presented a conjecture that a ramified theory suffices to carry out this characterisation, based on previous work by ourselves and others 
314
%We presented a conjecture that a modal theory suffices to carry out this characterisation, based on previous work by ourselves and others\cite{BaillotDas16} \cite{Cantini02} \cite{BelHof:02} and proving this result constitutes the outstanding work-in-progress.
315

    
316
\bibliographystyle{plain}
317
\bibliography{biblio}
318

    
319
\end{document}