Buss Arith
Buss Arith
Buss Arith
Abstract
This is a survey of basic facts about bounded arithmetic and about
the relationships between bounded arithmetic and propositional proof
complexity. We introduce the theories S2i and T2i of bounded
arithmetic and characterize their proof theoretic strength and their
provably total functions in terms of the polynomial time hierarchy.
We discuss other axiomatizations of bounded arithmetic, such as
minimization axioms. It is shown that the bounded arithmetic
hierarchy collapses if and only if bounded arithmetic proves that the
polynomial hierarchy collapses.
We discuss Frege and extended Frege proof length, and the two
translations from bounded arithmetic proofs into propositional proofs.
We present some theorems on bounding the lengths of propositional
interpolants in terms of cut-free proof length and in terms of the
lengths of resolution refutations. We then define the Razborov-
Rudich notion of natural proofs of P 6= NP and discuss Razborov’s
theorem that certain fragments of bounded arithmetic cannot prove
superpolynomial lower bounds on circuit size, assuming a strong
cryptographic conjecture. Finally, a complete presentation of a proof
of the theorem of Razborov is given.
2
this algorithm is (y − 1) · (|x| + |y|) steps.
The feasible algorithm: This algorithm can be called the fourth-grade
algorithm for multiplication (in California, this would be taught in the fourth
grade). This is the usual grade school algorithm for multiplication; e.g., to
multiply 6 and 5 in binary notation, one writes:
110 (= 6)
101 (= 5)
110
000
110
11110 (= 30)
Clearly the infeasible algorithm has exponential runtime (but not poly-
nomial runtime); whereas the feasible algorithm is polynomial time.
Remarks: From our theoretical viewpoint, we are primarily interested in
the asymptotic behavior of the algorithms. We are also usually not interested
in constant factors. Thus, the fact that modern day computers have builtin
operations for multiplication of 32-bit or even 64-bit integers does not make a
significant difference, since it only speeds up the above estimates of runtime
by a factor of 32 or 64. Likewise, the fact that computers are currently
doubling in speed every couple years does not affect our interest in feasible
versus infeasible. (Actually, the doubling of speed is one of the primary
3
reasons for neglecting constant factors in runtime.)† The quadratic time,
O(n2 ), algorithm for multiplication is not asymptotically optimal: O(n log n)
runtime is possible using fast Fourier transform techniques.
We let |x| = dlog2 (x + 1)e denote the length of the binary representation
of x. We write |~x| =|x1 |, |x2 |, . . . , |xk |.
Remark: For us, functions and predicates are arithmetic: polynomial time
means in terms of the length |x| of the input x . Generally, computer
scientists use the convention that functions and predicates operate on strings
of symbols; but this is equivalent to operations on integers, if one identifies
integers with their binary representation.
Cobham [15] defined F P as the closure of some base functions under
composition and limited iteration on notation. As base functions, we can
take 0, S (successor), b 12 xc , 2 · x,
½
1 if x ≤ y
x≤y =
0 otherwise
½
y if x > 0
Choice(x, y, z) =
z otherwise
f (~x, 0) = g(~x)
f (~x, y) = h(~x, y, f (~x, b 12 yc))
however, if should not be expected to continue forever, since presumably physical limits
will eventually be met. It is interesting to note that if the rate of increase could be
sustained indefinitely, then exponential time algorithms would actually be feasible, since
one would merely wait a polynomial amount of time for computer power to increase
sufficiently to run the algorithm quickly.
4
A nondeterministic Turing machine makes “choices” or “guesses”: the
machine accepts its input iff there is at least one sequence of choices that
leads to an accepting state. On the other hand, a co-nondeterministic Turing
machine makes “universal choices”: it accepts iff every possible sequence of
choices leads to an accepting state. NP is defined to be the set of predicates
accepted by non-deterministic polynomial time Turing machines. The class
coNP is defined to equal the set of predicates accepted by co-nondeterministic
Turing machines, i.e., coNP is the set of complements of NP predicates. For
example, the set of (codes of) satisfiable propositional formulas is in NP .
And the set of (codes of) tautologies is in coNP .
We now give a second, equivalent, purely logical method of defining NP
and coNP .
for some B ∈ P and some polynomial p . The class coNP is similarly defined
with a universal polynomially bounded quantifier.
5
. .
. .
. .
∆p3 p
3
⊇
Πp2 Σp2
⊇
⊇
⊆
∆p2 p
2
⊆
⊇
coNP = Πp1 Σp1 = NP
⊇
⊇
P = ∆p1 p
1 = FP
2 Bounded Arithmetic
A constructive proof system is one in which proofs of existence contain, or
imply the existence of, algorithms for finding the object which is proved to
exist. For a feasibly constructive system, the algorithm will be feasible, not
merely effective. For instance, if ∀x∃yA(x, y) is provable then there should
be a feasible algorithm to find y as a function of x. In the next section, we
introduce feasible proof systems for number theory: more precisely, S21 will
be a feasible proof system, and other systems, S2i and T2i are systems that
have proof-theoretic strength corresponding to higher levels of the polynomial
time hierarchy.
6
(successor), +, ·, b 12 xc , |x| , # and relation symbol ≤ , where
x#y = 2|x|·|y|
Definition Σb0 = Πb0 is the set of formulas with only sharply bounded
quantifiers.
If A ∈ Σbk then (∀x ≤ |t|)A and (∃x ≤ t)A are in Σbk and (∀x ≤ t)A
is in Πbk+1 . Dually, if A ∈ Πbk then (∃x ≤ |t|)A and (∀x ≤ t)A are in Πbk
and (∃x ≤ t)A is in Σbk+1 . For formulas not in prenex form, we say that
a formula is in Σbi (resp., Πbi ) iff prenex operations can be used to put the
formula in to the prenex Σb1 (resp., Πbi ) form defined above.
One of the primary justifications for the definition of Σbi - and Πbi -formulas
is the following theorem.
7
• The original use of the # function was by E. Nelson [38]; his primary
reason for its introduction was that the growth rate of # allows a
smooth treatment of sequence coding and of the metamathematics of
substitution. Wilkie and Paris [50] independently introduced the axiom
Ω1 (“xlog x is total”) for similar reasons, since it gives similar growth
rate.
The original use of polynomially bounded quantifiers was by Bennett [1];
they were first defined in form given above by [3, 4].
Definition Let i ≥ 0. The following are axiom schemes often used for
theories of bounded arithmetic.
Σbk -IND: A(0) ∧ (∀x)(A(x) ⊃ A(x + 1)) ⊃ (∀x)A(x) for A ∈ Σbk .
Σbk -PIND: A(0) ∧ (∀x)(A(b 12 xc) ⊃ A(x)) ⊃ (∀x)A(x) for A ∈ Σbk .
Σbk -LIND: A(0) ∧ (∀x)(A(x) ⊃ A(x + 1)) ⊃ (∀x)A(|x|) for A ∈ Σbk .
The axiom schemes Σbk -LIND and Σbk -PIND typically are equivalent and are
(strictly?) weaker than Σbk -IND. Since exponentiation is not provably total
in Bounded Arithmetic, the |x| function is not provably surjective; therefore,
the LIND axioms do not appear to equal to the IND axioms in strength.
T2 is equivalent to I∆0 + Ω1 (see Parikh [40] and Wilkie and Paris [50])
modulo differences in the nonlogical language.
8
(1) The BASIC axioms, and
(2) The Σbi -PIND axioms.
S2−1 = T2−1 has no induction axioms. S2 is the union of the S2i ’s.
Remark: The theory S21 , which we will relate closely to polynomial
computability, is defined by PIND on NP properties (in light of Theorem 2).
9
2.5 Bootstrapping Theorems
Theorem 4 [3, 4] Every polynomial time function is Σb1 -definable by S21
and every polynomial time predicate is ∆b1 -definable by S21 .
The above theorem shows that S21 , and the Σbi -definable functions and
∆b1 -definablepredicates are sufficiently strong to introduce polynomial time
properties. We will omit the proof of this theorem here: for details, the
reader can refer to Buss [3, 4], some improvements to the bootstrapping can
be found in Buss-Ignjatović [13] and a proof outline can be found in [7].
Alternative approaches to bootstrapping in different settings are given by
Wilkie-Paris [50] and in Hájek-Pudlák [25].
A large part of the importance of Σb1 -definable functions and ∆b1 -
predicates comes from the following theorem:
and
(∀y ≤ r(~s))(Af (~s, y) ⊃ ϕ(y)).
Note that the first formula is in Σbi and the second is in Πbi . Thus, for
i odd, any Σbi -formula involving f is equivalent to one not involving f by
transforming atomic subformulas as above using the first equivalent formula
for positively occurring subformulas and the second equivalent formula for
negatively occurring subformulas. For i even, the roles of positive and
negative occurrences are reversed. (We have omitted some details from this
proof, since it is also necessary to remove f from terms in quantifier bounds;
this is possible because of the known bound r(~x) on the value of f (~x) .) 2
10
Theorem 6 (Buss [3, 4]) Let i ≥ 1 . Let A be a Σbi -formula. Suppose
S2i ` (∀~x)(∃y)A(~x, y). Then there is a Σbi -formula B and a function f ∈ pi
and a term t so that
The most interesting case of the above theorems and corollary is probably
the i = 1 case. For this, we have:
Corollary 9 The Σb1 -definable functions of S21 are precisely the polynomial
time functions.
Theorem 10 ( i ≥ 1). Suppose A(~x) ∈ Σbi and B(~x) ∈ Πbi and S2i ` A ↔
B . Then there is a predicate Q ∈ ∆pi so that, for all ~n ,
Conversely, if Q ∈ ∆pi then there are A and B so that the above holds.
In other words, the ∆bi -definable predicates of S2i are precisely the ∆pi -
predicates.
The most interesting case of the last theorem is again probably the i = 1
case. For this, we have:
11
We shall sketch a proof of the main theorem below; but first, we need to
take a diversion into the sequent calculus. The sequent calculus and the cut
elimination theorem will be one of the main tools in our proof of the main
theorems.
A1 , A2 , . . . , An → B1 , B2 , . . . , Bk
(A1 ∧ A2 ∧ · · · ∧ An ) ⊃ (B1 ∨ B2 ∨ · · · ∨ Bk )
12
Γ → ∆, A B, Γ → ∆ A, Γ → ∆, B
A ⊃ B, Γ → ∆ Γ → ∆, A ⊃ B
A(b), Γ → ∆ Γ → ∆, A(t)
(∃x)A(x), Γ → ∆ Γ → ∆, (∃x)A(x)
A(t), Γ → ∆ Γ → ∆, A(b)
(∀x)A(x), Γ → ∆ Γ → ∆, (∀x)A(x)
In the quantifier inferences, the free variable b is called the eigenvariable and
must not appear in the lower sequent.
Γ→ ∆ Γ→ ∆
A, Γ → ∆ Γ → ∆, A
Γ, A, B, Π → ∆ Γ → ∆, A, B, Λ
Γ, B, A, Π → ∆ Γ → ∆, B, A, Λ
A, A, Γ → ∆ Γ → ∆, A, A
A, Γ → ∆ Γ → ∆, A
Γ → ∆, A A, Π → Λ
Cut:
Γ, Π → ∆, Λ
The system LK , as defined above, gives a sound and complete proof
system for first-order logic. It is probably the most elegant way of
formulating first-order logic; and a primary factor in its elegance is the
following fundamental theorem:
Theorem 12 (Gentzen [23])
• LK is complete.
• LK without the Cut inference is complete.
In particular, if P is an LK-proof of Γ → ∆ then there is a cut-free proof
P ∗ of Γ → ∆. There is an effective (but not feasible) procedure to obtain
P ∗ from P .
Examination of the rules of inference for LK reveals that, with the
exception of the cut rule, every inference has the subformula property that
the formulas in the hypotheses of the inference are subformulas of formulas
in the conclusion (the lower sequent) of the inference. More precisely, every
formula in the upper sequents is obtained from a subformula of a formula
in the lower sequent, possibly after substitution of a term for a (formerly)
bound variable. In other words, every formula in an upper sequent is a
subformula in the wide sense of some formula in the lower sequent.
Thus, if there are no cuts, the logical complexity of formulas in the proof
will be at most the logical complexity of formulas in the endsequent Γ → ∆ .
We therefore say that cut-free sequent calculus proofs enjoy the subformula
property.
13
3.2 Sequent Calculus Formulations of Bounded
Arithmetic
We now wish to formulate a sequent calculus version of the theories of
bounded arithmetic in a way that preserves the essence of the this subformula
property. We there for enlarge LK as follows:
(1) Allow equality axioms and BASIC axioms as initial sequents. An initial
sequent will contain only atomic formulas.
(2) Add inferences for bounded quantifiers (the variable b occurs only as
indicated):
b ≤ s, A(b), Γ → ∆ Γ → ∆, A(t)
(∃x ≤ s)A(x), Γ → ∆ t ≤ s, Γ → ∆, (∃x ≤ s)A(x)
A(t), Γ → ∆ b ≤ s, Γ → ∆, A(b)
t ≤ s, (∀x ≤ s)A(x), Γ → ∆ Γ → ∆, (∀x ≤ s)A(x)
A(b), Γ → ∆, A(b + 1)
Σbi -IND
A(0), Γ → ∆, A(t)
Definition S2i and T2i are formulated as sequent calculus systems with
BASIC axioms as initial sequents and with Σbi -PIND and Σbi -IND inference
rules, respectively. With side formulas, the induction inferences are
equivalent to the induction axioms.
The next theorem is due to Gentzen and Takeuti (for fragments of Peano
arithmetic).
14
Theorem 13 Free-Cut Elimination Theorem If P is an S2i -proof (or
T2i -proof ) then there is a proof P ∗ in the same theory with the same endsequent
which contains no free cuts.
In a free-cut free proof, every formula will be a subformula (in the wide
sense) of an induction formula, of a formula in an axiom or of a formula in
the conclusion.
In S2i and T2i , cut formulas may be restricted to be Σbi -formulas.
Therefore, if Γ → ∆ is a sequent of Σbi -formulas which is a consequence
of S2i or T2i , then Γ → ∆ has an S2i -proof or T2i -proof (respectively) such
that every formula appearing in the proof is in Σbi .
→ (∃y)A(~c, y).
Therefore, by free-cut elimination, there is an S2i proof P ∗ of
→ (∃y ≤ t)A(~c, y)
such that every formula in P ∗ is a Σbi -formula.
Step 2: Given the proof P ∗ we will extract an algorithm to compute
a function f (~c) such that A(~n, f (~n)) is true for all n . The function f
will be in pi and will be Σbi -defined by S2i . Furthermore, S2i will prove
(∀~x)A(~x, f (~x)). Thus, P ∗ can be thought of as a program plus a proof that
it is correct.
Step 1 is immediate from the free-cut elimination theorem. Before, we
can carry out Step 2, we need to introduce the Witness predicate.
(2) If B = C ∨ D then
Witnessi,~
a
a) ⇔ Witnessi,~
B (w, ~
a
a) ∨ Witnessi,~
C (β(1, w), ~
a
D (β(2, w), ~
a).
(3) If B = C ∧ D then
Witnessi,~
a
a) ⇔ Witnessi,~
B (w, ~
a
a) ∧ Witnessi,~
C (β(1, w), ~
a
D (β(2, w), ~
a).
15
(4) If B = (∃x ≤ t)C(~a, x) then
Witnessi,~
a
a) ⇔ β(1, w) ≤ t ∧ Witnessi,~
B (w, ~
a,b
C(~ a,b) (β(2, w), ~
a, β(1, w)).
Witnessi,~
a
a) ⇔ (∀x ≤ |t|)Witnessi,~
B (w, ~
a,b
C(~ a,b) (β(x + 1, w), ~
a, x).
(2) Witnessi,~
a p
B ∈ ∆i ( = P if i = 1).
(3) Witnessi,~
a b i
B is ∆i with respect to S2 .
16
(4) S2i ` (∀a, ~c)[g(w, a, ~c) ≤ tB (a, ~c)]
S2i ` Witnessi,~
c
(∃y≤t)A (g(~
c), ~c)
y = β(1, g(~c)).
17
Ψ-MIN: (Minimization)
Ψ-replacement:
(∀x ≤ |t|)(∃y ≤ s)A(x, y) ↔
↔ (∃w ≤ SqBd(t, s))(∀x ≤ |t|)(A(x, β(Sx, w)) ∧ β(Sx, w) ≤ s)
strong Ψ -replacement:
(∃w ≤ SqBd(t, s))(∀x ≤ |t|)
[(∃y ≤ s)A(x, y) ↔ A(x, β(Sx, w)) ∧ β(Sx, w) ≤ s]
S2i+1 Â T2i
Σbi+1
Due to space limitations, we shall only sketch proofs of two of the facts
pictured in the above figure.
18
Proof Suppose A is ∆bi w.r.t. S2i . Assume (∀x)(A(x) ⊃ A(x + 1)) and
argue inside S2i . Let B(x, z) be the formula
(∀x)(A(0) ⊃ A(x)) 2
The second result is concerns the conservation results between T2i and
S2i+1 :
This means that any ∀∃Σbi+1 -formula which is S2i+1 -provable is also
T2i -provable.
19
Definition A Polynomial Local Search (PLS), problem is specified by two
polynomial time functions N, c and a polynomial time predicate F which
satisfy the following conditions:
(1) c(s, x) is a cost function,
(2) N (s, x) is a neighborhood function, such that for all s such that F (s, x)
holds, we have
c(N (s, x), x) ≤ c(s, x) and F (N (s, x), x).
(3) {s : F (s, x)} is the solution space for input x. F (0, x) always holds;
and if F (s, x), then |s| < p(|x|) for p some polynomial.
A solution to the PLS problem is a (multivalued) function f , s.t., for all x,
c(N (f (x), s), s) = c(f (x), x) and F (f (x), x).
Theorem 19 [14] Suppose T21
proves (∀x)(∃y)A(x, y) where A ∈ Σb1 . Then
there is a PLS function f (x) = y and a polynomial time function π such that
T21 ` (∀x)A(x, π ◦ f (x)).
Furthermore, every PLS function (and every function π ◦ f ) is Σb1 -definable
by T21 .
Corollary 20 The same holds for S22 by conservativity of S22 over T21 .
Proof-idea: A free-cut free T21 -proof can be transformed into a PLS
problem. 2
20
The KPT Witnessing Theorem (Theorem 22 below) applies this theorem
to the theories T2i . In order to do this, however, we must re-axiomatize T2i
to have purely universal axioms. In order to give a set of purely universal
axioms, we must enlarge the language of T2i by adding function symbols all
p
i+1 -functions. Of course, we want to have only a conservative extension
of T2i when we enlarge the language: By Theorem 18, T2i can already
Σbi+1 -define all bi+1 functions; therefore, we can add symbols for these
functions to the language of T2i and add the defining equations for these new
function symbols and still have a conservative extension of T2i .
Towards this end, we define:
21
(2) T2i proves
∀ϕ(∃` ≤ n)(∃hw1 , . . . , w` i)
[(∀j ≤ `)(wj satisfies ϕj ) ∧ “` = n or ϕ`+1 is unsatisfiable”]
22
Proof of claim: If the latter condition is true, then the only way for
hϕ` , . . . , ϕk i to not be “preadvice”, (which it isn’t, by definition of “advice”)
is for ϕ` to be satisfied by f` (ϕ, w) ~ for some ϕ1 , . . . , ϕ`−1 , w1 , . . . , w`−1 . 2
is a Σp2 -property.
Similar methods work for i ≥ 1 . Q.E.D.
If the answer to this question is “Yes”, then NP = coNP. This is since the
set of tautologies is coNP complete and having a polynomial size F -proof is
an NP property.
The size of Frege proofs is measured in terms of the number of symbols
occurring in the proof. Of course, the number of symbols may be large either
because there are a lot of steps in the proof, or because the formulas which
occur in the proof are large. In the latter case, there will generally be many
repeated subformulas; this motivates the definition of “extended Frege proof
systems” where repeated subformulas may be abbreviated by new symbols.
23
Definition The extended Frege (eF ) proof system is a Frege proof system
plus the extension rule:
Extension Rule: whenever q is a variable which has not been used in the
proof so far and does not appear in the final line of the proof or in ϕ then
we may infer
q ↔ ϕ.
This allows us to use q as abbreviation for ϕ. By iterating uses of extension
rule the extension rule can apparently make proofs logarithmically smaller
by reducing the formula size.
Tseı̌tin [49] first used the extension rule, for resolution proofs. See also
Statman [47] and Cook-Reckhow [18, 19]. Statman proved that the number
of symbols in an extended Frege proof can be polynomially bounded in terms
on the number of steps in the proof.
To prove this theorem, note that if f is such a proof system, then then
a formula is a tautology iff it has a proof of polynomial length. Therefore,
the coNP complete property of being a tautology would be in NP , so NP
would equal coNP . Conversely, an NP algorithm can be turned into a proof
system, by letting its accepting computations serve as proofs.
24
Definition Let S and T be proof systems (with the same propositional
language). S simulates T iff there is a polynomial p so that for any
T -proof of size n there is an S -proof of the same formula of size ≤ p(n) . S
p-simulates T iff the S -proof is obtainable as a polynomial time function of
the T -proof.
Open Question: Is there a maximal proof system which simulates all other
propositional proof systems?
states that n + 1 pigeons can’t fit singly into n holes. pi,j means “pigeon i
is in hole j ”.
Cook and Reckhow had proposed P HPn as an example for showing that
F could not simulate eF . However, Theorem 27 implies this is not the case.
Presently there are no very good candidates of combinatorial principles that
might separate F from eF ; the paper [2] describes some attempts to find
such combinatorial principles.
25
5.4 P HPn has Polysize eF -Proofs
The pigeonhole principle provides a nice example of how extended Frege
(eF ) proofs can grow exponentially larger when translated straightforwardly
into Frege (F ) proofs. Although it is known (Theorem 27) that PHP
has polynomial size Frege proofs, the proofs are rather different than the
extended Frege proofs below.
We first give an intuitive, conceptual version of a proof of the pigeonhole
principle and then describe how it is formalized as an extended Frege proof.
Let [n] = {0, 1, 2, . . . , n}.
26
6.1 S21 and Polysize eF Proofs
P V is an equational theory of polynomial time functions; above, we
discussed P V1 = T20 ( p1 ) which is the conservative first-order extension
of P V . P V was first introduced by Cook [16], who showed that there is
an intimate translation between P V -proofs and polynomial size eF -proofs.
Namely, he showed that if A(x) is a polynomial time equation provable in
n
PV, then there is a family of tautologies A such that
n
(1) A is a polynomial size propositional formula,
n
(2) A says that A(x) is true whenever |x| ≤ n,
n
(3) A has polynomial size eF -proofs.
(Some generalizations of these results have been proved by Dowd [21] for
PSPACE and Krajı́ček and Pudlak [34] for various of the theories of bounded
arithmetic.)
In these notes, we shall prove the version of Cook’s theorem for S21
and Πb2 -formulas A. (Our proof below follows the version in [12]). This
version is completely analogous to Cook’s original theorem, in view of the
∀Σb1 -conservativity of S21 over P V1 .
27
Next we define t m to be a vector of polynomial size formulas that
define (compute) the term t for values of length ≤ m . For this it is useful
to think of formulas as being circuits of fanout 1.
^
m−1
EQm (~
p, ~q) is (pk ↔ qk ).
k=0
28
Definition Assume A ∈ Πb2 and A is in NINF and m ≥ qA (n) . Define
n
A m inductively by:
n n n
(1) s=t m is EQm ( s m, t m)
n n n
(2) s≤t m
is LEm ( s m
, t m
)
n n
(3) ¬A m is ¬ A m for A atomic.
n n n
(4) A ∧ B m
is A m
∧ B m
n n n
(5) A∨B m is A m ∨ B m
n n
(6) (∃x ≤ t)A(x) m is x ≤ t ∧ A(x) m ({εi /vi }i=0 )
A x n−1
n n
(7) (∀x ≤ t)A(x) m
is ¬x ≤ t ∨ A(x) m i /vi }i=0 )
({µA x n−1
n V
m−1 n
(8) (∀x ≤ |t|)A(x) m
is ¬k ≤ |t| ∨ A(k) m
Note that |t| ≤ m (by our
k=0
assumption on m).
n W
m−1 n
(9) (∃x ≤ |t|)A(x) m is k ≤ |t| ∧ A(k) m
k=0
n
Proposition 29 The formula A m
is equivalent to A in that A(~a) is true
n
( |ai | ≤ n) iff for all truth assignments to the universal variables in A m
n
there is an assignment to the existential variables which satisfies A m.
¬Γ ∨ ∆ .
29
Case (1): A logical axiom B → B . Obviously
¬B ∨ B = ¬B ∨ B
has straightforward polynomial size F -proofs using techniques from [6] that
allow formalization of addition and multiplication in Frege proofs.
Case (3) The proof ends with a contraction:
Γ→∆, B, B
Γ→∆, B
Recall that all three B ’s are assigned different existential and universal
variables. The induction hypothesis says there are polynomial size eF -proofs
of
¬Γ ∨ ∆ ∨ B ∨ B .
Modify these proofs by (1) identifying the universal variables for different
B ’s; (2) at the end of the proof use extension to define
where ~²00 are the existential variables for the lower B and the others are the
existential variables for the upper B ’s; and (3) then extend to a proof of
¬Γ ∨ ∆ ∨ B (~²00 ).
Γ → ∆, B B, Π → Λ
Γ, Π → ∆, Λ
¬Γ ∨ ¬Π ∨ ∆ ∨ Λ
30
consists of the first proof above followed by the second proof except with the
µ
~ ’s changed to ~² ’s followed by a (simulated) cut.
Case (5) For Σb1 -PIND inferences, iterate the construction for Cut and
contractions.
Case (6) If the proof ends with:
Γ→∆, A(t)
t ≤ s, Γ→∆, (∃x ≤ s)A(x)
Let ~² be the existential variables for (∃x ≤ s)A . The desired eF -proof
contains:
(a) Extension: ~² ↔ t .
(b) The proof from the induction hypothesis of
¬Γ ∨ ∆ ∨ A(t) .
¬t ≤ s ∨ ¬Γ ∨ ∆ ∨ (t ≤ s ∧ A(t)) .
(d) A derivation of
¬t ≤ s ∨ ¬Γ ∨ ∆ ∨ (∃x ≤ s)A(x)
31
Proof of Theorem 31 from Theorem 33: (Idea) Suppose there is a G proof
P of a tautology ϕ. A polynomial size eF proof of ϕ is constructed as
follows: Let p~ be the free variables in ϕ(~
p) . Reason inside eF . First show
that if ¬ϕ then there is an F -proof P1 of ¬ϕ(~ p) where p~ denotes a vector
of >’s and ⊥’s: the truth values of p~ . By substituting p~ for p~ in P and
combining this with P1 , we construct a G-proof P2 of a contradiction. This
proof has size polynomial in |P | since P1 has size polynomial in |ϕ| ≤ |P |.
By Theorem 33 there is a polynomial size eF -proof of ConG (|P2 |) so the
assumption that ¬ϕ is impossible; i.e., ϕ is true. 2
ψ(p)
ψ(ϕ)
32
6.4 Translation from I∆0 /S2 into Constant Depth Frege
Paris and Wilkie [41] developed the following translation between provability
in I∆0 (or I∆0 + Ω1 ) and the lengths of constant depth Frege proofs. The
theory I∆0 + Ω1 is essentially identical to the theory S2 = T2 — the only
difference is the choice of first-order language: I∆0 uses the first-order
language containing the symbols 0, S, +, · and ≤. Actually, we shall work
with I∆0 (α, f ) or S2 (α, f ) where α and/or f are allowed to be new
predicate or function symbols (resp.) which may be used in induction
axioms.
PW
^
^
value(t)
PW
(5) [(∀x ≤ t)A(x)] is [A(i)] .
i=0
PW
_
_
value(t)
PW
(6) [(∃x ≤ t)A(x)] is [A(i)] .
i=0
Proof (Idea) Given an I∆0 (α, f ) proof P (x) of A(x) and given n ≥ 0 ,
replace x everywhere with n , to get a proof P (n) of A(n) . W.l.o.g., P (x)
is free-cut free, so has only bounded formulas. Replace every formula B
in P (n) with its translation B PW . Thus every sequent Γ → ∆ in P (n)
becomes a propositional sequent ΓPW → ∆PW .
(a) Size of new formulas. A simple size analysis gives that there is a
constant c such that for every formula A ∈ P (n) , the formula APW as at
most nc many symbols. This is since every term t(n) is bounded by nc and
there are finitely many formulas A in P (n) .
(b) Size of propositional proofs of ΓPW → ∆PW is likewise bounded by nd
for some constant d . To prove this, consider how the propositional proof is
33
obtained from the proof P (n) : the general idea is to work from the bottom of
the proof upwards, always considering sequents in P (n) with values assigned
to all the free variables.
(b.i) A ∃ ≤:right inference in P (n) :
Γ → ∆, B(s)
s ≤ t, Γ → ∆, (∃x ≤ t)B(x)
a ≤ t, Γ → ∆, B(a)
Γ → ∆, (∀x ≤ t)B(x)
{>, ΓPW →∆ PW
, B(i)PW }i=0
t
∧:right’s
V
V
t
Γ PW
→∆ PW
, B(i) PW
i=0
Other inferences are handled similarly. Since the proof P (n) has constant
size, and since the values of terms are ≤ nα , for some constant α , the size
bound is proved. 2
34
When Ω1 is present as an axiom, then the function x 7→ xlog x is total. In
this case, an argument similar to the above establishes the following theorem:
The above two theorems can be sharpened in the case of S2i - and
T2i -proofs. First, at the cost of adding a finite set polynomial time functions
such as the Gödel β function, we may assume that every formula in Σbi (α, f )
or Πbi (α, f ) consists of exactly i bounded quantifiers, then a sharply bounded
quantifier and then a Boolean combination of atomic formulas of the form
α(t) or f (t) = s or which do not use α or f . [Basically, because of the
quantifier exchange property and by contracting like quantifiers.] With this
convention, then if A ∈ Σbi or A ∈ Πbi then the translation APW is a depth
i + 1 propositional formula where the bottom depth has polylogarithmic
fanin. This gives the following theorem:
Proof Analogous to the above proof. We leave the details to the reader.
35
Let τ1 , . . . , τn be the truth assignments to p1 , . . . , pk for which it is
possible to make A(~ p, ~q) true by further assignment of truth values to ~q .
Let C(~ p) say that one of τ1 , . . . , τn holds for p~ , i.e.,
n ³
_
_ ´
(i) (i) (i)
C = p 1 ∧ p2 ∧ . . . ∧ p k
i=1
where ½
(i) pj if τi (pj ) =True
pj =
¬pj otherwise
p, ~q) |= C(~
Then clearly, A(~ p) . Also, by the comment at the beginning of the
p) |= B(~
proof, C(~ p, ~r). 2
Note that C(~
p) may be exponentially larger than A(~
p, ~q) and B(~
p, ~r) .
Example: Let p1 , . . . , pk code the binary representation of a k -bit
integer P . Let A(~ p, ~q) be a formula which is satisfiable iff P is composite
(e.g. q codes two integers > 1 with product P ). Let B(~ p, ~r) be a formula
which is satisfiable iff P is prime (i.e., ~r codes a Pratt-primality witness).
P is prime ⇔ ∃~rB(~
p, ~r)
⇔ ¬∃~qA(~
p, ~q).
p, ~q) ⊃ ¬B(~
and A(~ p, ~r) is a tautology.
An interpolant C(~ p) must express “ p~ codes a composite”.
Generalizing the above example gives:
Theorem 41 (Mundici [37] If there is a polynomial upper bound on the
circuit size of interpolants in propositional logic, then
N P/poly ∩ coNP/poly = P/poly
Proof Let ∃~qA(~ p) and ∀~rB(~
p, ~q) express an N P/poly property R(~ p, ~r)
express R(~
p) in coNP/poly form. Then
∃~qA(~
p, ~q) |= ∀~rB(~
p, ~r),
which is equivalent to
p, ~q) ⊃ B(~
A(~ p, ~r)
being a tautology. Let C(~
p) be a polynomial size interpolant s.t.,
p, ~q) ⊃ C(~
A(~ p) and p) ⊃ B(~
C(~ p, ~r)
are tautologies. Thus
∃~qA(~
p, ~q) |= C(~
p) |= ∀~rB(~
p, ~r),
p) ⇔ C(~
I.e., R(~ p) and R(~
p) has a polynomial size circuit, so R(~
p) is in
P/poly . 2
36
7.2 Cut-Free Proofs and Interpolant Size
Definition Let P K be the propositional fragment of the Gentzen sequent
calculus. The size of a P K -proof, |P |, is the number of steps in P .
Normally, sequent calculus proofs are treelike; however, sometime we consider
non-treelike proofs, and in this case, we write |P |dag to denote the size of P .
V (A) denotes the set of free variables in A . For C a formula, |C| is the
number of ∧ ’s and ∨ ’s in C .
The next theorem states that tree-like cut-free proofs have interpolants
of polynomial formula size, and general cut-free proofs have interpolants of
polynomial circuit size.
Remark: The theorem also holds for proofs which have cuts only on
formulas D such that V (D) ⊆ {~
p, ~r} or V (D) ⊆ {~
p, ~r}.
(2) V (C) ⊆ {~
p}, and
(3) The polynomial size bounds hold too.
Base Case: Initial sequent. If the initial sequent is of the form qi → qi , take
C to be ⊥ since
qi → qi , ⊥ and ⊥→
are valid. For an initial sequent of the form ri → ri , take C to be > . For
an initial sequent pi → pi , C will be either >, ⊥ , pi or (¬pi ) depending
on how the pi ’s are split into Γ1 , Γ2 , ∆1 , ∆2 .
Induction Step: There are a number of cases, depending on the type of the
last inference in the proof.
37
Γ → ∆, A, B
Γ → ∆, A ∨ B
the interpolant for the upper sequent still works for the lower sequent,
i.e., use C such that
Γ1 → ∆1 , A, B, C and C, Γ2 → ∆2 ,
or
Γ1 → ∆1 , C and C, Γ2 → ∆2 , A, B,
depending on whether A ∨ B is in ∆1 or ∆2 (respectively).
(2) For last inference an ∧ :right:
Γ → ∆, A Γ → ∆, B
Γ → ∆, A ∧ B
(2.a) If A ∧ B is in ∆1 , apply the induction hypothesis twice to have
interpolants CA and CB so that
Γ1 →∆−
1 , A, CA CA , Γ2 →∆2
Γ1 →∆−
1 , B, CB CB , Γ2 →∆2
are valid. Now the derivations
Γ1 → ∆−1 , A, CA Γ1 → ∆−
1 , B, CB
Γ1 → ∆−
1 , A, CA ∨ CB Γ1 → ∆−
1 , B, CA ∨ CB
Γ1 → ∆−
1 , A ∧ B, CA ∨ CB
and
CA , Γ2 → ∆2 CB , Γ2 → ∆2
CA ∨ CB , Γ2 → ∆2
show (CA ∨ CB ) is an interpolant.
(2b) If A ∧ B is in ∆2 applying the induction hypothesis twice gives
CA and CB so that
Γ1 →∆1 , CA CA , Γ2 →∆−
2 ,A
Γ1 →∆1 , CB CB , Γ2 →∆−
2 ,B
are valid. Now the two following derivations show (CA ∧ CB ) is
an interpolant:
CA , Γ2 → ∆−
2 ,A CB , Γ2 → ∆−
2 ,B
CA ∧ CB , Γ2 → ∆−
2 ,A CA ∧ CB , Γ2 → ∆−
2 ,B
CA ∧ CB , Γ2 → ∆−
2 ,A ∧ B
Γ1 → ∆1 , CA Γ1 → ∆1 , CB
Γ1 → ∆1 , CA ∧ CB
The other cases are similar and the size bounds on C are immediate. 2
38
7.3 Interpolation Theorems for Resolution
We start with a quick review of the well-known system of resolution for
propositional logic.
C ∪ {p} D ∪ {p}
C ∪D
For such resolution inferences, we assume w.l.o.g. that p, p 6∈ C and p, p 6∈ D .
A resolution refutation of a set Γ of clauses is a derivation of the empty
clause ∅ from Γ by resolution inferences.
A1 (~ p, ~q) → ¬B1 (~
p, ~q), . . . , Ak (~ p, ~r), . . . , ¬B` (~
p, ~r)
A1 (~ p, ~q) → C(~
p, ~q), . . . , Ak (~ p)
and
p) → ¬B1 (~
C(~ p, ~r), . . . , ¬B` (~
p, ~r)
are valid. 2
39
Theorem 45 (Krajı́ček [32]) Let {Ai (~ p, ~q)}i ∪ {Bj (~
p, ~r)}j have a refutation
R of n resolution inferences. Then an interpolant, C(~ p) , can be chosen with
O(n) symbols in dag representation.
If R is tree-like, then C(~
p) is a formula with O(n) symbols.
F ∪ {ri } G ∪ {ri }
(4) For an inference
F ∪G
set CF ∪G = CF ∪{ri } ∧ CG∪{ri } .
F ∪ {pi } G ∪ {pi }
(5) For an inference
F ∪G
set CF ∪G = (pi ∧ CF ∪{pi } ) ∨ (pi ∧ CG∪{pi } ) .
40
Definition When A is a formula, LE(A) is a set of clauses which define
the meanings of the extensions variables for all subformulas of A; to wit:
LE(p) = ∅
½ ¾
LE(¬A) = LE(A) ∪ {σ¬A , σA }, {σ¬A , σA }
| {z } | {z }
¬σA ⊃σ¬A σ¬A ⊃¬σA
½ ¾
LE(A ∧ B) = LE(A) ∪ LE(B) ∪ {σA∧B , σA }, {σA∧B , σB }, {σA∧B , σA , σB }
| {z } | {z } | {z }
σA∧B ⊃σA σA∧B ⊃σB σA ∧σB ⊃σA∧B
½ ¾
LE(A ∨ B) = LE(A) ∪ LE(B) ∪ {σA , σA∨B }, {σB , σA∨B }, {σA , σB , σA∨B }
| {z } | {z } | {z }
σA ⊃σA∨B σB ⊃σA∨B σA∨B ⊃σA ∨σB
p, ~q)}i ∪ {Bj (~
{Ai (~ p, ~r)}j ∪ LE(~
p, ~q) ∪ LE(~
p, ~r)
Claim C(~
p) is the desired interpolant.
41
8 Natural Proofs, Interpolation and Bounded
Arithmetic
8.1 Natural Proofs
The notion of natural proofs was introduced by Razborov and Rudich [44].
In order for a proof to be a natural proof of P 6= NP , it must give a
suitably constructive way of proving that certain Boolean functions are not
in P (for example, the Boolean function Sat which recognized satisfiable
propositional formulas). More precisely, a proof is natural provided it is
possible to use the proof method to find a family Cn of Boolean functions
which satisfies the property of the next definition. We represent a Boolean
function fn (x1 , . . . , xn ) by its truth table (which of course has size N = 2n );
therefore, an n-ary Boolean functions is identified with a string of 2n 0 ’s
and 1’s.
42
some circuit C of size S ,
¯ ¯
¯ ¯
¯ P rob [C(Gn (x))=1] − P rob [C(y)=1]¯ ≥ 1
¯x∈{0,1}n y∈{0,1} 2n ¯ S
43
Σbi (α, β)-formulas (which are Σbi -formulas in which α and β may appear).
We let Σb∞ (α) denote all bounded formulas in the language of S2 plus α .
And we define the class of formulas SΣbi to equal
SΣbi = Σbi (Σb∞ (α), Σb∞ (β))
where Σb1 (X) indicates the closure of X under ∧ , ∨, sharply bounded
quantification and existential bounded quantification, where Πb1 (X) is
defined similarly and
Σbi+1 (X) = Σb1 (Πbi (X))
and Πbi+1 (X) is similarly defined.
The split versions of S2i and T2i are defined as follows:
Definition
SS2i = BASIC + SΣbi -PIND
ST2i = BASIC + SΣbi -IND
We now describe the way in which circuits are coded in the theories S2i (α)
and T2i (α), and the way in which superpolynomial lower bounds on circuit
size are expressed in these theories. Let N ≥ 0 and n = |N | ≈ log N ( where
n = |x| ). Also suppose t(n) = nω(1) (this will be the superpolynomial lower
bound) — note that the fact that t(n) = nω(1) need not be provable in S2 .
Finally, suppose that S(N, x) is a Σb∞ -formula.
Definition Let LB(t, S, α) be the statement
·
¬ α codes a circuit of size ≤ t(n) such that
¸
(∀x ∈ {0, 1} )(α(x) = 1 ↔ S(N, x))
n
where
(1) The free variables of LB(t, S, α) are N and α .
(2) By “α encodes a circuit” we mean that α encodes gate types and gate
connections in some straightforward manner, plus, α may encode the
full truth table description of the functions computed by every gate in
the circuit!
Theorem 50 If S22 (α) ` LB(t, S, α), then SS22 ` SLB(t, S, α, β) where
SLB(t, S, α, β) is
·
¬ α codes a circuit of size ≤ t(n)/2 − 1 and
β codes a circuit of size ≤ t(n)/2 − 1 such that ¸
∀x ∈ {0, 1}n ((α ⊕ β)(x) = 1 ↔ S(N, x))
44
Proof If ¬SLB(t, S, α, β), then the circuit α0
⊕
¡¡ @@
¡ @
¯L ¯L α0
¯ L ¯ L
¯ L ¯ L
¯ α L ¯ β L
¯ L ¯ L
Corollary 52 If the SPRNG conjecture holds, then S22 does not prove
superpolynomial lower bounds on circuit size for any bounded formula (i.e.,
for any polynomial time hierarchy predicate).
The proof of Theorem 51 takes up the rest of this paper. We shall prove
that if
ST21 ` CC(t, γ, α), CC(t, S ⊕ γ, β) → ,
45
then there are quasipolynomial size circuits which are natural against P/poly .
The first step of the proof involves converting an ST21 -proof and the
sequent into a constant-depth propositional proof using the general method
of Theorem 38. We then convert this to a resolution refutation with limited
extension and finally apply the Interpolation Theorem 47. The interpolant
obtained in this way will serve as a natural proof against P/poly .
Ei,j
i=0 j=0
where each formula Ei,j either (1) is ±pi or (2) involves only p~, ~q or
(3) involves only p~, ~r .
Suppose we have a ST21 -proof of
where
(1) {Ai (~
p, ~q)}i is a set of clauses stating that ~q codes a circuit of size t
computing the function γ with graph given by p~ .
46
(2) {Bj (~
p, ~q)}j is a set of clauses stating that ~r codes a circuit of size t
computing the function γ ⊕ f .
^
^
p1 ^
^
pc0
^
^
q1 ^
^
qc00
E1,i , . . . , Ec0 ,i → F1,i , . . . , Fc00 ,i
i=1 i=1 i=1 i=1
E1,1 , E1,2 , . . . , E1,p1 , E2,1 , . . . , Ec0 ,pc0 → F1,i1 , F1,i2 , . . . , Fc00 ,ic00
O(1) O(1))
Since each qi = 2n and c00 = O(1) , this still only 2n many
sequents.
(b) Build a new proof of all these sequents. The hardest case of making this
V
V
p
a valid new proof, is the case of a cut on Fi . For this, an inference
i=1
V
V
p V
V
p
Γ → ∆, Fi Fi , Γ → ∆
i=1 i=1
Γ→ ∆
47
is replaced by p cuts; i.e., by
Γ∗ → ∆∗ , F1 F1 , F2 , . . . , Fp , Γ∗ → ∆∗
Γ → ∆ , F2
∗ ∗
F2 , F3 , . . . , Fp , Γ∗ → ∆∗
Γ∗ → ∆∗ , F3 F3 , . . . , Fp , Γ∗ → ∆∗
·
·
·
Γ∗ → ∆∗
At the end of the second step, we have a treelike sequent calculus proof of
A1 (~
p, ~q), . . . , Ak (~
p, ~q), B1 (~ p, ~r) →
p, ~r), . . . B` (~
such that every formula in in the proof is a disjunction of formulas which
either involve just p~ and ~q or involve just p~ and ~r .
48
Proof By induction on m. — splits into cases depending on the last
inference of the proof:
W
Case (1) Γ → ∆ is A → A . If A = Ai , then
49
Case 5 Suppose the last inference is a cut:
W W
Γ → ∆, i Ai i Ai , Γ → ∆
Γ→ ∆
and
(Γ→∆)LE
{σA1 , . . . , σAu }
R2
=⇒ ∅
LE(~p, ~q)
LE(~p, ~r)
Q.E.D. Lemma.
p) = 0, then {Ai (~
(1) if C(~ p, ~q)}i is unsatisfiable, and
p) = 1, then {Bj (~
(2) if C(~ p, ~q)}j is unsatisfiable.
O(1)
Note the size of C(~ p) is 2n which is quasipolynomial in N = 2n . In
case (1), when C(~ p) = 0, the function γ(x) does not have a circuit of size
t = nω(1) . In case (2), when C(~ p) = 1 , the function (γ ⊕ f )(x) does not
have a circuit of size t = nω(1) . (Recall f (x) does not have a circuit of size
2t + 1.)
50
Definition Let
df
C ∗ (~ p)) ∨ C(~
p) = (¬C(~ p ⊕ f ),
where p~ ⊕ f is p0 ⊕ f (0), . . . pN −1 ⊕ f (N − 1) . (Each f (i) is 0 or 1, of
course.)
References
[1] J. Bennett, On Spectra, PhD thesis, Princeton University, 1962.
[2] M. L. Bonet, S. R. Buss, and T. Pitassi, Are there hard examples
for Frege systems?, in Feasible Mathematics II, P. Clote and J. Remmel,
eds., Boston, 1995, Birkhäuser, pp. 30–56.
[3] S. R. Buss, Bounded Arithmetic, PhD thesis, Princeton University,
1985.
[4] , Bounded Arithmetic, Bibliopolis, 1986. Revision of 1985 Princeton
University Ph.D. thesis.
[5] , The Boolean formula value problem is in ALOGTIME, in Proceed-
ings of the 19-th Annual ACM Symposium on Theory of Computing,
May 1987, pp. 123–131.
[6] , Polynomial size proofs of the propositional pigeonhole principle,
Journal of Symbolic Logic, 52 (1987), pp. 916–927.
[7] , An introduction to proof theory. Typeset manuscript, to appear
in S.R. Buss (ed.) Handbook of Proof Theory, North-Holland, 199?
51
[8] , Axiomatizations and conservation results for fragments of bounded
arithmetic, in Logic and Computation, proceedings of a Workshop held
Carnegie-Mellon University, 1987, vol. 106 of Contemporary Mathemat-
ics, American Mathematical Society, 1990, pp. 57–84.
[9] , Propositional consistency proofs, Annals of Pure and Applied
Logic, 52 (1991), pp. 3–29.
[10] , On Herbrand’s theorem, in Logic and Computational Complexity,
Lecture Notes in Computer Science #960, D. Leivant, ed., Berlin, 1995,
Springer Verlag, pp. 195–209.
[11] , Relating the bounded arithmetic and polynomial-time hierarchies,
Annals of Pure and Applied Logic, 75 (1995), pp. 67–77.
[12] S. R. Buss and et al., Weak formal systems and connections to
computational complexity. Student-written Lecture Notes for a Topics
Course at U.C. Berkeley, January–May 1988.
[13] S. R. Buss and A. Ignjatović, Unprovability of consistency statements
in fragments of bounded arithmetic, Annals of Pure and Applied Logic,
74 (1995), pp. 221–244.
[14] S. R. Buss and J. Krajı́ček, An application of Boolean complexity to
separation problems in bounded arithmetic, Proc. London Math. Society,
69 (1994), pp. 1–21.
[15] A. Cobham, The intrinsic computational difficulty of functions, in
Logic, Methodology and Philosophy of Science, Proceedings of the
Second International Congress, held in Jerusalem, 1964, Y. Bar-Hillel,
ed., Amsterdam, 1965, North-Holland.
[16] S. A. Cook, Feasibly constructive proofs and the propositional calculus,
in Proceedings of the Seventh Annual ACM Symposium on Theory of
Computing, 1975, pp. 83–97.
[17] , Computational complexity of higher type functions, in Proceedings
of the International Congress of Mathematicians, 1990, pp. 55–69.
[18] S. A. Cook and R. A. Reckhow, On the lengths of proofs in the
propositional calculus, preliminary version, in Proceedings of the Sixth
Annual ACM Symposium on the Theory of Computing, 1974, pp. 135–
148.
[19] , The relative efficiency of propositional proof systems, Journal of
Symbolic Logic, 44 (1979), pp. 36–50.
[20] W. Craig, Linear reasoning. A new form of the Herbrand-Gentzen
theorem, Journal of Symbolic Logic, 22 (1957), pp. 250–268.
52
[21] M. Dowd, Propositional representation of arithmetic proofs, in Pro-
ceedings of the 10th ACM Symposium on Theory of Computing, 1978,
pp. 246–252.
[22] , Model-theoretic aspects of P 6= N P . Typewritten manuscript,
1985.
53
[35] J. Krajı́ček, P. Pudlák, and G. Takeuti, Bounded arithmetic and
the polynomial hierarchy, Annals of Pure and Applied Logic, 52 (1991),
pp. 143–153.
[36] R. E. Ladner, The circuit value problem is log space complete for P,
SIGACT News, 7 (1975), pp. 18–20.
[37] D. Mundici, Tautologies with a unique Craig interpolant, Annals of
Pure and Applied Logic, 27 (1984), pp. 265–273.
[38] E. Nelson, Predicative Arithmetic, Princeton University Press, 1986.
[39] C. H. Papadimitriou, On graph-theoretic lemmata and complexity
classes (extended abstract), in Proceedings of the 31st IEEE Symposium
on Foundations of Computer Science (Volume II), IEEE Computer
Society, 1990, pp. 794–801.
[40] R. J. Parikh, Existence and feasibility in arithmetic, Journal of
Symbolic Logic, 36 (1971), pp. 494–508.
[41] J. B. Paris and A. J. Wilkie, ∆0 sets and induction, in Open Days
in Model Theory and Set Theory, W. Guzicki, W. Marek, A. Pelc, and
C. Rauszer, eds., 1981, pp. 237–248.
[42] A. A. Razborov, On provably disjoint NP-pairs, Tech. Rep. RS-94-
36, Basic Research in Computer Science Center, Aarhus, Denmark,
November 1994. http://www.brics.dk/index.html.
[43] , Unprovability of lower bounds on the circuit size in certain
fragments of bounded arithmetic, Izvestiya of the RAN, 59 (1995),
pp. 201–224.
[44] A. A. Razborov and S. Rudich, Natural proofs, in Proceedings of
the 26-th Annual ACM Symposium on Theory of Computing, 1994,
pp. 204–213.
[45] R. A. Reckhow, On the Lengths of Proofs in the Propositional Calculus,
PhD thesis, Department of Computer Science, University of Toronto,
1976. Technical Report #87.
[46] J. Siekmann and G. Wrightson, Automation of Reasoning, vol. 1&2,
Springer-Verlag, Berlin, 1983.
[47] R. Statman, Complexity of derivations from quantifier-free Horn
formulae, mechanical introduction of explicit definitions, and refinement
of completeness theorems, in Logic Colloquium ’76, Amsterdam, 1977,
North-Holland, pp. 505–517.
[48] L. J. Stockmeyer, The polynomial-time hierarchy, Theoretical Com-
put. Sci., 3 (1976), pp. 1–22.
54
[49] G. S. Tsejtin, On the complexity of derivation in propositional logic,
Studies in Constructive Mathematics and Mathematical Logic, 2 (1968),
pp. 115–125. Reprinted in: [46, vol 2].
[50] A. J. Wilkie and J. B. Paris, On the scheme of induction for bounded
arithmetic formulas, Annals of Pure and Applied Logic, 35 (1987),
pp. 261–302.
[51] C. Wrathall, Complete sets and the polynomial-time hierarchy,
Theoretical Comput. Sci., 3 (1976), pp. 23–33.
55