Results 1  10
of
39
Some Consequences of Cryptographical Conjectures for . . .
, 1995
"... We show that there is a pair of disjoint NPsets, whose disjointness is provable in S 1 2 and which cannot be separated by a set in P=poly, if the cryptosystem RSA is secure. Further we show that factoring and the discrete logarithm are implicitly definable in any extension of S 1 2 admittin ..."
Abstract

Cited by 74 (8 self)
 Add to MetaCart
We show that there is a pair of disjoint NPsets, whose disjointness is provable in S 1 2 and which cannot be separated by a set in P=poly, if the cryptosystem RSA is secure. Further we show that factoring and the discrete logarithm are implicitly definable in any extension of S 1 2 admitting an NP definition of primes about which it can prove that no number satisfying the definition is composite. As a corollary we obtain that the Extended Frege (EF) proof system does not admit feasible interpolation theorem unless the RSA cryptosystem is not secure, and that an extension of EF by tautologies p (p primes), formalizing that p is not composite, as additional axioms does not admit feasible interpolation theorem unless factoring and the discrete logarithm are in P=poly . The NP 6= coNP conjecture is equivalent to the statement that no propositional proof system (as defined in [6]) admits polynomial size proofs of all tautologies. However, only for few proof systems occur...
An application of boolean complexity to separation problems in bounded arithmetic
 Proc. London Math. Society
, 1994
"... We develop a method for establishing the independence of some Zf(a)formulas from S'2(a). In particular, we show that T'2(a) is not VZ*(a)conservative over S'2(a). We characterize the Z^definable functions of T2 as being precisely the functions definable as projections of polynomial local search ( ..."
Abstract

Cited by 54 (15 self)
 Add to MetaCart
We develop a method for establishing the independence of some Zf(a)formulas from S'2(a). In particular, we show that T'2(a) is not VZ*(a)conservative over S'2(a). We characterize the Z^definable functions of T2 as being precisely the functions definable as projections of polynomial local search (PLS) problems. Although it is still an open problem whether bounded arithmetic S2 is finitely axiomatizable, considerable progress on this question has been made: S2 +1 is V2f+1conservative over T'2 [3], but it is not V2!f+2conservative unless £f+2 = Ylf+2 [10], and in addition, T2 is not VZf+1conservative over S'2 unless LogSpace s? = Af+1 [8]. In particular, S2 is not finitely axiomatizable provided that the polynomialtime hierarchy does not collapse [10]. For the theory S2(a) these results imply (with some additional arguments) absolute results: S'2 + (a) is V2f+,(a)conservative but not VZf+2(a)conservative over T'2(a), and T'2(a) is not VZf+i(c*)conservative over S'2(a). Here a represents a new uninterpreted predicate symbol adjoined to the language of arithmetic which may be used in induction formulas; from a computer science perspective, a represents an oracle. In this paper we pursue this line of investigation further by showing that T'2(a) is also not V2f(a)conservative over S'2(a). This was known for / = 1, 2 by [9,17] (see also [2]), and our present proof uses a version of the pigeonhole principle similar to the arguments in [2,9]. Perhaps more importantly, we formulate a general method (Theorem 2.6) which can be used to show the unprovability of other 2f(a)formulas from S'2(a). Our methods are analogous in spirit to the proof strategy of [8]: prove a witnessing theorem to show that provability of a Zf+1(a)formula A in S'2(a) implies that it is witnessed by a function of certain complexity and then employ techniques of boolean complexity to construct an oracle a such that the formula A cannot be witnessed by a function of the prescribed complexity. Our formula A shall be 2f(a) and thus we can use the original witnessing theorem of [2]. The boolean complexity used is the same as in [8], namely Hastad's switching lemmas [6].
Predicative Recursion and Computational Complexity
, 1992
"... The purpose of this thesis is to give a "foundational" characterization of some common complexity classes. Such a characterization is distinguished by the fact that no explicit resource bounds are used. For example, we characterize the polynomial time computable functions without making any direct r ..."
Abstract

Cited by 45 (3 self)
 Add to MetaCart
The purpose of this thesis is to give a "foundational" characterization of some common complexity classes. Such a characterization is distinguished by the fact that no explicit resource bounds are used. For example, we characterize the polynomial time computable functions without making any direct reference to polynomials, time, or even computation. Complexity classes characterized in this way include polynomial time, the functional polytime hierarchy, the logspace decidable problems, and NC. After developing these "resource free" definitions, we apply them to redeveloping the feasible logical system of Cook and Urquhart, and show how this firstorder system relates to the secondorder system of Leivant. The connection is an interesting one since the systems were defined independently and have what appear to be very different rules for the principle of induction. Furthermore it is interesting to see, albeit in a very specific context, how to retract a second order statement, ("inducti...
Witnessing Functions in Bounded Arithmetic and Search Problems
, 1994
"... We investigate the possibility to characterize (multi)functions that are \Sigma b i definable with small i (i = 1; 2; 3) in fragments of bounded arithmetic T2 in terms of natural search problems defined over polynomialtime structures. We obtain the following results: 1. A reformulation of known ..."
Abstract

Cited by 35 (4 self)
 Add to MetaCart
We investigate the possibility to characterize (multi)functions that are \Sigma b i definable with small i (i = 1; 2; 3) in fragments of bounded arithmetic T2 in terms of natural search problems defined over polynomialtime structures. We obtain the following results: 1. A reformulation of known characterizations of (multi)functions that are \Sigma b 1  and \Sigma b 2 definable in the theories S 1 2 and T 1 2 . 2. New characterizations of (multi)functions that are \Sigma b 2  and \Sigma b 3  definable in the theory T 2 2 . 3. A new nonconservation result: the theory T 2 2 (ff) is not 8\Sigma b 1 (ff) conservative over the theory S 2 2 (ff). To prove that the theory T 2 2 (ff) is not 8\Sigma b 1 (ff)conservative over the theory S 2 2 (ff), we present two examples of a \Sigma b 1 (ff)principle separating the two theories: (a) the weak pigeonhole principle WPHP (a 2 ; f; g) formalizing that no function f is a bijection between a 2 and a with the inverse...
Theories for Complexity Classes and their Propositional Translations
 Complexity of computations and proofs
, 2004
"... We present in a uniform manner simple twosorted theories corresponding to each of eight complexity classes between AC and P. We present simple translations between these theories and systems of the quanti ed propositional calculus. ..."
Abstract

Cited by 30 (7 self)
 Add to MetaCart
We present in a uniform manner simple twosorted theories corresponding to each of eight complexity classes between AC and P. We present simple translations between these theories and systems of the quanti ed propositional calculus.
Relating the Bounded Arithmetic and Polynomial Time Hierarchies
 Annals of Pure and Applied Logic
, 1994
"... The bounded arithmetic theory S 2 is finitely axiomatized if and only if the polynomial hierarchy provably collapses. If T 2 equals S then T 2 is equal to S 2 and proves that the polynomial time hierarchy collapses to # , and, in fact, to the Boolean hierarchy over # and to # i+1 / ..."
Abstract

Cited by 27 (1 self)
 Add to MetaCart
The bounded arithmetic theory S 2 is finitely axiomatized if and only if the polynomial hierarchy provably collapses. If T 2 equals S then T 2 is equal to S 2 and proves that the polynomial time hierarchy collapses to # , and, in fact, to the Boolean hierarchy over # and to # i+1 /poly .
Structure and Definability in General Bounded Arithmetic Theories
, 1999
"... This paper is motivated by the questions: what are the \Sigma ..."
Abstract

Cited by 18 (6 self)
 Add to MetaCart
This paper is motivated by the questions: what are the \Sigma
Lifting Independence Results in Bounded Arithmetic
 ARCHIVE FOR MATHEMATICAL LOGIC
, 1999
"... We investigate the problem how to lift the non  8\Sigma b 1 (ff)  conservativity of T 2 2 (ff) over S 2 2 (ff) to the expected non  8\Sigma b i (ff)  conservativity of T i+1 2 (ff) over S i+1 2 (ff), for i ? 1. We give a nontrivial refinement of the "lifting method" developed in [4, 8 ..."
Abstract

Cited by 14 (2 self)
 Add to MetaCart
We investigate the problem how to lift the non  8\Sigma b 1 (ff)  conservativity of T 2 2 (ff) over S 2 2 (ff) to the expected non  8\Sigma b i (ff)  conservativity of T i+1 2 (ff) over S i+1 2 (ff), for i ? 1. We give a nontrivial refinement of the "lifting method" developed in [4, 8], and we prove a sufficient condition on a 8\Sigma b 1 (f)consequence of T2 (f) to yield the nonconservation result. Further we prove that Ramsey's theorem, a 8\Sigma b 1 (ff)  formula, is not provable in T 1 2 (ff), and that 8\Sigma b j (ff)  conservativity of T i+1 2 (ff) over T i 2 (ff) implies 8\Sigma b j (ff)  conservativity of the whole T2 (ff) over T i 2 (ff), for any j
Bounded Arithmetic and Propositional Proof Complexity
 in Logic of Computation
, 1995
"... This is a survey of basic facts about bounded arithmetic and about the relationships between bounded arithmetic and propositional proof complexity. We introduce the theories S 2 of bounded arithmetic and characterize their proof theoretic strength and their provably total functions in terms of t ..."
Abstract

Cited by 10 (0 self)
 Add to MetaCart
This is a survey of basic facts about bounded arithmetic and about the relationships between bounded arithmetic and propositional proof complexity. We introduce the theories S 2 of bounded arithmetic and characterize their proof theoretic strength and their provably total functions in terms of the polynomial time hierarchy. We discuss other axiomatizations of bounded arithmetic, such as minimization axioms. It is shown that the bounded arithmetic hierarchy collapses if and only if bounded arithmetic proves that the polynomial hierarchy collapses. We discuss Frege and extended Frege proof length, and the two translations from bounded arithmetic proofs into propositional proofs. We present some theorems on bounding the lengths of propositional interpolants in terms of cutfree proof length and in terms of the lengths of resolution refutations. We then define the RazborovRudich notion of natural proofs of P NP and discuss Razborov's theorem that certain fragments of bounded arithmetic cannot prove superpolynomial lower bounds on circuit size, assuming a strong cryptographic conjecture. Finally, a complete presentation of a proof of the theorem of Razborov is given. 1 Review of Computational Complexity 1.1 Feasibility This article will be concerned with various "feasible" forms of computability and of provability. For something to be feasibly computable, it must be computable in practice in the real world, not merely e#ectively computable in the sense of being recursively computable.
The strength of replacement in weak arithmetic
 Proceedings of the Nineteenth Annual IEEE Symposium on Logic in Computer Science
, 2004
"... The replacement (or collection or choice) axiom scheme BB(Γ) asserts bounded quantifier exchange as follows: ∀i<a  ∃x
Abstract

Cited by 10 (3 self)
 Add to MetaCart
The replacement (or collection or choice) axiom scheme BB(Γ) asserts bounded quantifier exchange as follows: ∀i<a  ∃x<aφ(i,x) → ∃w ∀i<aφ(i,[w]i) proves the scheme where φ is in the class Γ of formulas. The theory S1 2 BB(Σb 1), and thus in S1 2 every Σb1 formula is equivalent to a strict Σb1 formula (in which all nonsharplybounded quantifiers are in front). Here we prove (sometimes subject to an assumption) that certain theories weaker than S1 2 do not prove either BB(Σb1) or BB(Σb0). We show (unconditionally) that V 0 does not prove BB(ΣB 0), where V 0 (essentially IΣ 1,b 0) is the twosorted theory associated with the complexity class AC0. We show that PV does not prove BB(Σb 0), assuming