a pesky theory of bounded arithmetic
play

A pesky theory of bounded arithmetic Leszek Koodziejczyk University - PowerPoint PPT Presentation

A pesky theory of bounded arithmetic A pesky theory of bounded arithmetic Leszek Koodziejczyk University of Warsaw (based on joint work with Buss-Thapen and Buss-Zdanowski) Kotlarski-Ratajczyk conference, B edlewo, July 2012 1 / 25 A


  1. A pesky theory of bounded arithmetic A pesky theory of bounded arithmetic Leszek Kołodziejczyk University of Warsaw (based on joint work with Buss-Thapen and Buss-Zdanowski) Kotlarski-Ratajczyk conference, B˛ edlewo, July 2012 1 / 25

  2. A pesky theory of bounded arithmetic Bounded arithmetic: quick review Language: symbols for all polytime computable functions & relations on the natural numbers. In particular, no 2 x , but we do have x log y . ˆ Σ b n formulas: ∃ x 1 < t 1 ∀ x 2 < t 2 . . . Qx n < t n ψ , where ψ open. Correspond to properties in the n -th level of the polynomial hierarchy. ◮ Full BA: induction for bounded formulas in this language. Essentially a notational variant of I ∆ 0 + Ω 1 . 2 : induction for ˆ ◮ The fragment T n Σ b n . ◮ Role of T 0 2 played by PV: a basic theory for polynomial time. (PV is to polytime as PRA is to primitive recursive). 2 / 25

  3. A pesky theory of bounded arithmetic Bounded arithmetic: motivation ◮ connections to computational complexity: ◮ witnessing theorems: if T ⊢ ∀ x ∃ y A ( x , y ) for A of the right form, then y can be found by a given kind of algorithm/search process, ◮ natural framework for stating complexity-theoretical questions, with the hope of getting independence results, ◮ connections to propositional proof complexity: arithmetical proofs can be translated into short propositional proofs. ◮ desire to understand how much combinatorics, number theory, logic etc. can be done without the exponential function. 3 / 25

  4. A pesky theory of bounded arithmetic Bounded arithmetic: relativized setting Fundamental (and seemingly hopeless) open problem: Do the theories T n 2 form a strict hierarchy? More open problems come from relativized BA, where we have a new “oracle” predicate α and allow the ptime functions/relations to query α (which gives ˆ Σ b n ( α ) , T n 2 ( α ) , PV ( α ) etc.) For instance, is is known that PV ( α ) � T 1 2 ( α ) � T 2 2 ( α ) � T 3 2 ( α ) . . . (Krajíˇ cek-Pudlák-Takeuti 1991). 4 / 25

  5. A pesky theory of bounded arithmetic Two current major open problems 2 ( α ) be separated by a ∀ ˆ 1. Can the theories T n Σ b 1 ( α ) sentence? ◮ only PV ( α ) ̸ � ∀ ˆ 1 ( α ) T 1 1 ( α ) T 2 2 ( α ) ̸ � ∀ ˆ 2 ( α ) known. Σ b Σ b 2. An “interesting” independence result for BA ( α ) with a parity quantifier, “there is an odd number of x < t such that”. ◮ e.g. for PHP: “ α is not a 1-1 function from x + 1 to x ”, already known to be independent from BA ( α ) . 5 / 25

  6. A pesky theory of bounded arithmetic Two current major open problems 2 ( α ) be separated by a ∀ ˆ 1. Can the theories T n Σ b 1 ( α ) sentence? ◮ only PV ( α ) ̸ � ∀ ˆ 1 ( α ) T 1 1 ( α ) T 2 2 ( α ) ̸ � ∀ ˆ 2 ( α ) known. Σ b Σ b 2. An “interesting” independence result for BA ( α ) with a parity quantifier, “there is an odd number of x < t such that”. ◮ e.g. for PHP: “ α is not a 1-1 function from x + 1 to x ”, already known to be independent from BA ( α ) . Main theme of this talk: in both problems, the same kind of theory seems to show up as an obstacle. 5 / 25

  7. A pesky theory of bounded arithmetic Detour: approximate counting 6 / 25

  8. A pesky theory of bounded arithmetic Weak pigeonhole principles iWPHP ( F ) : injective WPHP for function class F : no function f ∈ F is injective from y ≫ x into x , sWPHP ( F ) : surjective WPHP for function class F : no function f ∈ F is surjective from x onto y ≫ x . Typically, y ≫ x means y = x 2 , 2 x , at times has to be x ( 1 + 1 / log x ) . ◮ easy: sWPHP ( FP NP ( α ) ) ⊢ iWPHP ( α ) , ◮ likewise, iWPHP ( FP NP ( α ) ) ⊢ sWPHP ( α ) , ◮ T 2 2 ( α ) ⊢ iWPHP ( α ) , sWPHP ( α ) (Maciel-Pitassi-Woods 2002). 7 / 25

  9. A pesky theory of bounded arithmetic Approximate counting Jeˇ rábek 2005-2009: ◮ APC 1 = PV + sWPHP ( FP ) can approximate the size of polytime set X ⊆ 2 n up to 1 / poly ( n ) fraction of 2 n . ◮ APC 2 = T 1 2 + sWPHP ( FP NP ) can do the same for X ∈ P NP , while for X ∈ NP it finds surjections witnessing m և X և m + m / polylog ( m ) . 8 / 25

  10. A pesky theory of bounded arithmetic APC theories within the hierarchy APC 1 APC 2 T 3 T 1 T 2 PV 2 2 2 9 / 25

  11. A pesky theory of bounded arithmetic Peskiness of APC 2 Empirical observation: The ∀ ˆ Σ b 1 ( α ) principles used to separate low levels of the BA ( α ) hierarchy from the rest are either complete for some level (hence hard to work with) or provable in APC 2 ( α ) . Mathematical result: Bounded arithmetic with the parity quantifier, BA ⊕ , is equal to a “parity version” of APC 2 (and this relativizes). 10 / 25

  12. A pesky theory of bounded arithmetic The non-parity case 11 / 25

  13. A pesky theory of bounded arithmetic Typical separating principles Some ∀ ˆ Σ b 1 ( α ) principles separating T 1 2 ( α ) from stronger theories: ◮ iWPHP ( α ) , ◮ Ramsey’s principle: the graph determined by α on [ 0 , x ) has a homogeneous set of size ( log x ) / 2, ◮ ordering principle OP: if α is a linear ordering on [ 0 , x ) , then it has a least element (has to be Herbrandized to become ∀ ˆ Σ b 1 ( α ) ). All these, and many similar principles, are either known or easily seen to be provable in APC 2 ( α ) . 12 / 25

  14. A pesky theory of bounded arithmetic Example: APC 2 ( α ) ⊢ OP. ◮ Given x , prove by induction on y < log x that there exists z < x such that the set of elements α -smaller than z has size approximately less than than x / 2 y . ◮ Inductive step involves some additional counting arguments to show that there is z ′ α -smaller than approximately at least half of the elements α -smaller than the current z . ◮ Induction formula is Σ b 2 ( α ) , but the induction is only up to log x , so there is a conservativity result that lets us use it. 13 / 25

  15. A pesky theory of bounded arithmetic APC 2 and ∀ ˆ Σ b 1 Question: Is there a ∀ ˆ Σ b 1 ( α ) sentence separating APC 2 ( α ) from full BA ( α ) ? 14 / 25

  16. A pesky theory of bounded arithmetic APC 2 and ∀ ˆ Σ b 1 Question: Is there a ∀ ˆ Σ b 1 ( α ) sentence separating APC 2 ( α ) from full BA ( α ) ? ????? 14 / 25

  17. A pesky theory of bounded arithmetic APC 2 and ∀ ˆ Σ b 1 Question: Is there a ∀ ˆ Σ b 1 ( α ) sentence separating APC 2 ( α ) from full BA ( α ) ? ????? So, why not first consider natural fragments of APC 2 ? (Obtained by limiting induction or WPHP somewhat.) 14 / 25

  18. A pesky theory of bounded arithmetic Some fragments of APC 2 T 1 2 ( α ) + iWPHP ( FP ( α )) PV ( α ) + sWPHP ( FP NP ( α ) ) APC 1 ( α ) APC 2 ( α ) T 1 2 ( α ) + sWPHP ( FP ( α )) For the theories marked in red, we have a separation from BA ( α ) (in fact, from APC 2 ( α ) ). For the others, still no separation known. 15 / 25

  19. A pesky theory of bounded arithmetic A useful principle HOP: “For all z , it is not true that � is a linear order on [ 0 , z ) for which h is the predecessor function”. (Oracle α provides � and the bitgraph of h .) 16 / 25

  20. A pesky theory of bounded arithmetic A useful principle HOP: “For all z , it is not true that � is a linear order on [ 0 , z ) for which h is the predecessor function”. (Oracle α provides � and the bitgraph of h .) Theorem HOP is unprovable in: ◮ T 1 2 ( α ) + iWPHP ( FP ( α )) , ◮ PV ( α ) + sWPHP ( FP NP ( α ) ) . Provable in APC 2 ( α ) . Status in T 1 2 ( α ) + sWPHP ( FP ( α )) unknown! 16 / 25

  21. A pesky theory of bounded arithmetic PV + sWPHP ( FP NP ) Theorem PV ( α ) + sWPHP ( FP NP ( α ) ) ̸⊢ HOP . (note: x → 2 x version; some issues about formalization of FP NP .) 17 / 25

  22. A pesky theory of bounded arithmetic PV + sWPHP ( FP NP ) Theorem PV ( α ) + sWPHP ( FP NP ( α ) ) ̸⊢ HOP . (note: x → 2 x version; some issues about formalization of FP NP .) Proof ingredients: ◮ logic: (generalizations of) so-called KPT witnessing for ∀∃∀ and more complex consequences of PV, ◮ simplified case: x → x 2 version of sWPHP for single FP NP function f , where x is a term depending only on z , ◮ witnessing gives constant round Student-Teacher game: given v < x 2 , Student produces u < x and computation w witnessing f ( u ) = v , or witness to HOP; Teacher gives counterexamples showing that w contains a false ‘No’ answer to an NP query. 17 / 25

  23. A pesky theory of bounded arithmetic PV + sWPHP ( FP NP ) : arguing against Student ◮ Construction in stages 1 , . . . , k = lh of S-T game. At each stage, ≼ defined on all of [ 0 , z ) , but only part is settled (initially ∅ ), the points below it are tentative; ◮ Always ≫ x v ’s (initially all x 2 ) are active, the rest is discarded. 18 / 25

  24. A pesky theory of bounded arithmetic PV + sWPHP ( FP NP ) : arguing against Student ◮ Construction in stages 1 , . . . , k = lh of S-T game. At each stage, ≼ defined on all of [ 0 , z ) , but only part is settled (initially ∅ ), the points below it are tentative; ◮ Always ≫ x v ’s (initially all x 2 ) are active, the rest is discarded. ◮ At stage i order the tentative part randomly and only keep a 1 / polylog ( z ) fraction tentative, so that the least point remains tentative and at most half the active v ’s query a point that remains tentative. Discard those v ’s. 18 / 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend