Abstract 1 Introduction 2 Preliminaries 3 Circuit Size Hierarchies in Bounded Arithmetic 4 Provability of Formula Size Bounds in ๐—ฃ๐—ฉ๐Ÿ References

Provability of the Circuit Size Hierarchy and Its Consequences

Marco Carmosino IBM Research, Cambridge, MA, USA Valentine Kabanets Simon Fraser University, Burnaby, Canada Antonina Kolokolova Memorial University of Newfoundland, St. John, Canada Igor C. Oliveira University of Warwick, UK Dimitrios Tsintsilidas University of Warwick, UK
Abstract

The Circuit Size Hierarchy (๐–ข๐–ฒ๐–งba) states that if a>bโ‰ฅ1 then the set of functions on n variables computed by Boolean circuits of size na is strictly larger than the set of functions computed by circuits of size nb. This result, which is a cornerstone of circuit complexity theory, follows from the non-constructive proof of the existence of functions of large circuit complexity obtained by Shannon in 1949.

Are there more โ€œconstructiveโ€ proofs of the Circuit Size Hierarchy? Can we quantify this? Motivated by these questions, we investigate the provability of ๐–ข๐–ฒ๐–งba in theories of bounded arithmetic. Among other contributions, we establish the following results:

  1. (i)

    Given any a>b>1, ๐–ข๐–ฒ๐–งba is provable in Bussโ€™s theory ๐–ณ22.

  2. (ii)

    In contrast, if there are constants a>b>1 such that ๐–ข๐–ฒ๐–งba is provable in the theory ๐–ณ21, then there is a constant ฮต>0 such that ๐–ฏ๐–ญ๐–ฏ requires non-uniform circuits of size at least n1+ฮต.

In other words, an improved upper bound on the proof complexity of ๐–ข๐–ฒ๐–งba would lead to new lower bounds in complexity theory.

We complement these results with a proof of the Formula Size Hierarchy (๐–ฅ๐–ฒ๐–งba) in ๐–ฏ๐–ต1 with parameters a>2 and b=3/2. This is in contrast with typical formalizations of complexity lower bounds in bounded arithmetic, which require ๐– ๐–ฏ๐–ข1 or stronger theories and are not known to hold even in ๐–ณ21.

Keywords and phrases:
Bounded Arithmetic, Circuit Complexity, Hierarchy Theorems
Copyright and License:
[Uncaptioned image]โ€‚ยฉย Marco Carmosino, Valentine Kabanets, Antonina Kolokolova, Igor C. Oliveira, and
Dimitrios Tsintsilidas; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation โ†’ Complexity theory and logic
; Theory of computation โ†’ Proof complexity ; Theory of computation โ†’ Circuit complexity ; Theory of computation โ†’ Proof theory
Related Version:
Full Version: https://eccc.weizmann.ac.il/report/2024/145/
Acknowledgements:
We thank Emil Jeล™รกbek for a discussion about witnessing theorems in bounded arithmetic. We are also grateful to Hanlin Ren for a suggestion that improved our bounds in Corollary 10.
Funding:
This work received support from the Royal Society University Research Fellowship URFโˆ–R1โˆ–191059; the UKRI Frontier Research Guarantee Grant EP/Y007999/1; the Centre for Discrete Mathematics and its Applications (DIMAP) at the University of Warwick, and the Natural Sciences and Engineering Research Council of Canada.
Editor:
Raghu Meka

1 Introduction

1.1 Context and Motivation

The existence of Boolean functions requiring large circuits can be shown by a non-constructive counting argument, as established by Shannon in 1949 [24]. It follows from Shannonโ€™s seminal result and a simple padding argument that if a>bโ‰ฅ1 there are functions computable by circuits of size na that cannot be computed by circuits of size nb. In other words, the classification of Boolean functions by their minimum circuit size forms a strict hierarchy.

Obtaining a โ€œconstructiveโ€ form of these results has been a holy grail in computational complexity theory for several decades due to its connections to derandomization and as an approach to separating ๐–ฏ and ๐–ญ๐–ฏ. For instance, if there is a polynomial-time algorithm that given 1n outputs the truth-table of a function f:{0,1}logโกnโ†’{0,1} that requires circuits of size nฮฉโข(1), then ๐–ฏ=๐–ก๐–ฏ๐–ฏ [9]. In results of this form, a constructive form of the (non-constructive) proof of the existence of hard functions is interpreted computationally as the existence of an algorithm of bounded complexity that computes a hard function.

In this paper, rather than focusing on the existence of algorithms to capture the constructiveness of a statement, we explore this notion from the perspective of mathematical logic, specifically concerning its provability in certain mathematical theories. We are interested in identifying the weakest theory capable of establishing the aforementioned circuit size hierarchy for Boolean circuits and related results.

As one of our contributions, we present a tight connection between the computational and proof-theoretic perspectives. We demonstrate that proving the non-uniform circuit size hierarchy in a theory known as ๐–ณ21 implies the existence of a function in ๐–ฏ๐–ญ๐–ฏ that requires Boolean circuits of size at least n1+ฮต. The latter is a frontier question in complexity theory (see, e.g.,ย [5]). Thus, in a precise sense, developing more constructive proofs of the circuit size hierarchy would lead to significant progress on explicit circuit lower bounds.

We now proceed to describe this result and other contributions of this work in detail.

1.2 Results

We will be concerned with standard theories of bounded arithmetic. These theories are designed to capture proofs that manipulate and reason with concepts from a specified complexity class. Notable examples include Cookโ€™s theory ๐–ฏ๐–ต1 [7], which formalizes polynomial-time reasoning; Jeล™รกbekโ€™s theory ๐– ๐–ฏ๐–ข1 [10, 11, 13], which extends ๐–ฏ๐–ต1 by incorporating the dual weak pigeonhole principle for polynomial-time functions and formalizes probabilistic polynomial-time reasoning; and Bussโ€™s theories ๐–ณ2i [2], which incorporate induction principles corresponding to various levels of the polynomial-time hierarchy.

For an introduction to bounded arithmetic, we refer to [3]. For its connections to computational complexity and a discussion on the formalization of complexity theory, we refer to [23].111In particular, the reference [23] contains a detailed discussion of some aspects of the formalization of the statements appearing below. Here we only recall that theory ๐–ฏ๐–ต1 corresponds essentially to ๐–ณ20 [12], and that ๐–ณ20โІ๐–ณ21โІ๐–ณ22 correspond to the first levels of Bussโ€™s hierarchy. A brief overview of the theories is provided in Section 2.

For a given nโˆˆโ„•, we use ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[sโข(n)] to denote the set of Boolean functions f:{0,1}nโ†’{0,1} computed by circuits of size at most sโข(n). Similarly, when referring to formula size, we write ๐–ฅ๐–ฎ๐–ฑ๐–ฌ๐–ด๐–ซ๐– โข[sโข(n)]. We use ๐–ฒ๐–จ๐–น๐–คโข[sโข(n)] to denote the set of languages LโІ{0,1}โˆ— that admit a sequence of circuits of size at most sโข(n).

Circuit Size Hierarchy

For rationals a>bโ‰ฅ1 and n0, we consider the following sentence:222The abbreviation nโˆˆ๐–ซ๐—ˆ๐—€ denotes that n is the length of a variable N (see, e.g.,ย [23] for more details).

๐–ข๐–ฒ๐–ง[a,b,n0]โ‰กโˆ€nโ‰ฅn0โˆˆ๐–ซ๐—ˆ๐—€,โˆƒcircuitD:{0,1}nโ†’{0,1}of sizeโ‰คna,
โˆ€circuitC:{0,1}nโ†’{0,1}of sizeโ‰คnb,โˆƒxโˆˆ{0,1}nsuch thatD(x)โ‰ C(x).

In other words, ๐–ข๐–ฒ๐–งโข[a,b,n0] states that ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[na]โŠˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[nb] whenever nโ‰ฅn0.

Next, we state our first result.

Theorem 1.

The following results hold:

  1. (i)

    For every choice of rationals a and b with a>b>1, and for every large enough n0โˆˆโ„•,

    ๐–ณ22โŠข๐–ข๐–ฒ๐–งโข[a,b,n0].
  2. (ii)

    If there are rationals a>b>1 and a constant n0โˆˆโ„• such that

    ๐–ณ21โŠข๐–ข๐–ฒ๐–งโข[a,b,n0],

    then there is a constant ฮต>0 and a language Lโˆˆ๐–ฏ๐–ญ๐–ฏ such that Lโˆ‰๐–ฒ๐–จ๐–น๐–คโข[n1+ฮต].

  3. (iii)

    Similarly to the previous item, if ๐–ฏ๐–ต1โŠข๐–ข๐–ฒ๐–งโข[a,b,n0], there is Lโˆˆ๐–ฏ such that Lโˆ‰๐–ฒ๐–จ๐–น๐–คโข[n1+ฮต].

To put it another way, we can establish a circuit size hierarchy within the theory ๐–ณ22. If this result could also be proven in the theory ๐–ณ21, it would lead to a significant breakthrough in circuit lower bounds. Thus, by enhancing the proof complexity upper bound for the provability of the circuit size hierarchy, we can achieve new circuit lower bounds.

The proof technique of Item (ii) also applies to the theory ๐–ณ22, which combined with Item (i) gives us a superlinear lower bound for a language in ๐–ฏฮฃ2p, but this is already known by Kannanโ€™s theorem [15].

Note that in Theorem 1 Items (ii) and (iii) we obtain a lower bound against circuits of size n1+ฮต, where the constant ฮต>0 depends on the proof of ๐–ข๐–ฒ๐–งโข[a,b,n0] in the corresponding theory. In other words, while the sentence claims the existence of hardness against circuits of size nb, we are only able to extract a weaker lower bound for an explicit problem.

In our next result, we describe a setting where we can extract all the hardness from a proof of the corresponding sentence.

Succinct Circuit Size Hierarchy

We define what we call the succinct version of the circuit size hierarchy, where we substitute the upper bound circuit with a collection of labelled examples for the function, which can always represent a circuit. For rationals a>bโ‰ฅ1 and n0, we consider the following sentence:

๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0]โ‰ก โˆ€nโ‰ฅn0โˆˆ๐–ซ๐—ˆ๐—€,โˆƒcollectionโข{(x1,b1),โ€ฆ,(xโ„“,bโ„“)}โขof sizeโขโ„“โ‰คnaโขwith
|xi|=nโˆง|bi|=1โขfor eachโขiโˆˆ[โ„“]โขandโขxiโ‰ xjโขfor distinctย โขi,jโˆˆ[โ„“],
โˆ€circuitC:{0,1}nโ†’{0,1}of sizeโ‰คnb,โˆƒiโˆˆ[โ„“]s.t.C(xi)โ‰ bi.

In other words, ๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0] states that for every nโ‰ฅn0 there is a collection of โ„“โ‰คna labelled examples such that every circuit of size at most nb disagrees with at least one of its labels. The truth of this statement can be validated by a counting argument, similarly with the circuit size hierarchy proof.

We obtain the following results on the proof complexity of the succinct circuit size hierarchy.

Theorem 2.

The following results hold:

  1. (i)

    For every choice of rationals a>b>1 and for every large enough n0โˆˆโ„•,

    ๐–ณ22โŠข๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0].
  2. (ii)

    If there are rationals a>b>1 and a constant n0โˆˆโ„• such that

    ๐–ณ21โŠข๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0],

    then there is a language Lโˆˆ๐–ฏ๐–ญ๐–ฏ such that Lโˆ‰๐–ฒ๐–จ๐–น๐–คโข[nb].

In our final result, we investigate the provability of size hierarchies for more restricted computational models in ๐–ณ21 and weaker theories.

Formula Size Hierarchy

For rationals a>bโ‰ฅ1 and n0, we consider the following sentence:

๐–ฅ๐–ฒ๐–ง[a,b,n0]โ‰กโˆ€nโ‰ฅn0โˆˆ๐–ซ๐—ˆ๐—€,โˆƒformulaF:{0,1}nโ†’{0,1}of sizeโ‰คna,
โˆ€formulaG:{0,1}nโ†’{0,1}of sizeโ‰คnb,โˆƒxโˆˆ{0,1}nsuch thatF(x)โ‰ G(x).

In other words, ๐–ฅ๐–ฒ๐–งโข(a,b,n0) states that ๐–ฅ๐–ฎ๐–ฑ๐–ฌ๐–ด๐–ซ๐– โข[na]โŠˆ๐–ฅ๐–ฎ๐–ฑ๐–ฌ๐–ด๐–ซ๐– โข[nb] whenever nโ‰ฅn0.

We establish that for some parameters a formula size hierarchy is provable already inย ๐–ฏ๐–ต1.

Theorem 3.

Consider rationals a>2 and b=3/2, and let n0 be a large enough positive integer. Then

๐–ฏ๐–ต1โŠข๐–ฅ๐–ฒ๐–งโข[a,b,n0].

While many lower bounds can be proven in ๐– ๐–ฏ๐–ข1 and stronger theories (see [22, 23, 4] and references therein), Theorem 3 provides an example of a non-trivial lower bound (under a โ€œLogโ€ formalization; see [23, Section 4.1]) that can be established in ๐–ฏ๐–ต1, which might be of independent interest.

1.3 Techniques

The proofs of Items (ii) and (iii) in Theorem 1 are inspired by arguments from [18, 17] that rely on a combination of a witnessing theorem with a term elimination strategy. Recall that the witnessing theorem allows us to extract computational information from a proof of the sentence in the theory. Roughly speaking, in our context this implies that the first existential quantifier in the sentence ๐–ข๐–ฒ๐–งโข[a,b,n0], which corresponds to a circuit computing a hard function, can be witnessed by a finite number of terms t1,โ€ฆ,tk of the corresponding theory. In ๐–ฏ๐–ต1, a term yields a polynomial-time function, while in ๐–ณ21 a term yields a polynomial-time function with access to an ๐–ญ๐–ฏ oracle. The main difficulty is that (1) for a given input length n it is not clear which term among t1,โ€ฆ,tk succeeds in constructing a hard function, and (2) for a term to succeed we must provide counter-examples to the candidate witnesses provided by previous terms.

As in previous papers, we assume that the conclusion of the theorem does not hold, and use this assumption to rule out the correctness of each term. This leads to a contradiction, meaning that the original sentence is not provable in the corresponding theory. Implementing this plan requires a careful argument, and we are currently only able to carry it out under a complexity inclusion in ๐–ฒ๐–จ๐–น๐–คโข[n1+ฮต] as opposed to ๐–ฒ๐–จ๐–น๐–คโข[nb]. The proof of the result is given in Section 3.1.

On the other hand, in the case of the succinct circuit size hierarchy, the argument for Item (ii) of Theorem 2 is simpler and allows us to start with the weaker assumption that ๐–ฏ๐–ญ๐–ฏโІ๐–ฒ๐–จ๐–น๐–คโข[nb]. Without getting into the technical details, the main reason for not losing hardness in this result is that given a labelled list of examples and access to an ๐–ญ๐–ฏ oracle, we can efficiently compute a minimum size circuit that agrees with this list of inputs. Consequently, we can check if a candidate labelled list provided by a term is indeed hard, or produce a counter-example when this is not the case. The same computation is not available in the case of Theorem 1, since it is not clear how to efficiently compute with access to an ๐–ญ๐–ฏ oracle if a given circuit admits a smaller equivalent circuit. The proof of Item (ii) of Theorem 2 appears in Section 3.2.

The proofs of Theorem 1 Item (i) and Theorem 2 Item (i) are given in Section 3.3. The formalization of these hierarchies in ๐–ณ22 is easily done with access to the dual Weak Pigeonhole Principle for polynomial-time functions, a principle which is known to be available in ๐–ณ22. In more detail, ๐–ข๐–ฒ๐–ง follows from ๐–ฒ๐–ข๐–ฒ๐–ง in ๐–ฏ๐–ต1, while ๐–ฒ๐–ข๐–ฒ๐–ง can be established in theory ๐– ๐–ฏ๐–ข1, which is contained in ๐–ณ22.

Finally, in the proof of Theorem 3 we formalize in ๐–ฏ๐–ต1 that the parity function on n bits can be computed by formulas of size Oโข(n2) and require formulas of size ฮฉโข(n3/2). This yields in ๐–ฏ๐–ต1 a proof of ๐–ฅ๐–ฒ๐–งโข[a,b,n0] for any choice of parameters a>2, large enough n0, and b=3/2. The upper bound on the complexity of parity follows from a straightforward formalization of the correctness of the formula obtained via a divide-and-conquer procedure. On the other hand, in order to show the formula lower bound we formalize Subbotovskayaโ€™s argument [25] based on the method of restrictions. To implement the proof in ๐–ฏ๐–ต1, we directly define an efficient refuter that given a small formula outputs an input string where it fails to compute the parity function. The correctness of the refuter is established by induction using an induction principle available in the theory ๐–ฒ21. We then rely on a conservation result showing that the proof can also be done in ๐–ฏ๐–ต1. A detailed exposition of the argument appears in Section 4.

2 Preliminaries

2.1 Complexity Theory

We employ standard definitions from complexity theory, such as basic complexity classes, Boolean circuits, and Boolean formulas (see,ย e.g.,ย [1]).

Let โ„• represent the set of non-negative integers. For any aโˆˆโ„•, let |a| denote the length of its binary representation, defined as |a|โ‰œโŒˆlog2โก(a+1)โŒ‰. For a constant kโ‰ฅ1, a function f:โ„•kโ†’โ„• is said to be computable in polynomial time if fโข(x1,โ€ฆ,xk) can be computed in time polynomial in |x1|,โ€ฆ,|xk|. For convenience, we might write |xโ†’|โ‰œ|x1|,โ€ฆ,|xk|. The class ๐–ฅ๐–ฏ denotes the set of polynomial-time computable functions. Although the definition of polynomial time typically refers to a machine model, ๐–ฅ๐–ฏ can also be defined in a machine-independent manner as the closure of a set of base functions โ„ฑ (not described here) under composition and limited recursion on notation. A function fโข(xโ†’,y) is defined from functions gโข(xโ†’), hโข(xโ†’,y,z), and kโข(xโ†’,y) by limited recursion on notation if

fโข(xโ†’,0) =gโข(xโ†’)
fโข(xโ†’,y) =hโข(xโ†’,y,fโข(xโ†’,โŒŠy/2โŒ‹))
fโข(xโ†’,y) โ‰คkโข(xโ†’,y)

for every sequence (xโ†’,y) of natural numbers. Cobham [6] established that ๐–ฅ๐–ฏ is the smallest class of functions that contains the base functions โ„ฑ and is closed under composition and limited recursion on notation.

2.2 Bounded Arithmetic

2.2.1 Logical Theories

We recall the definitions of some standard theories of bounded arithmetic. For more details, the reader can consult [16, 8, 20].

Cookโ€™s Theory ๐—ฃ๐—ฉ [7]

The theory ๐–ฏ๐–ต1 is designed to model the set โ„• of natural numbers with the standard interpretations for constants and function symbols like 0,+,ร—, etc. The vocabulary (language) of ๐–ฏ๐–ต, denoted โ„’๐–ฏ๐–ต, includes a function symbol for each polynomial-time algorithm f:โ„•kโ†’โ„•, where k is any constant. These function symbols and their defining axioms are derived using Cobhamโ€™s characterization of polynomial-time functions discussed above. While Cookโ€™s ๐–ฏ๐–ต was an equational theory, it was later extended in [19] to a first-order theory ๐–ฏ๐–ต1, which includes an induction axiom scheme that simulates binary search. It can be shown that ๐–ฏ๐–ต1 allows induction over quantifier-free formulas (i.e., polynomial-time predicates).

๐–ฏ๐–ต1 can be formulated with all axioms as universal formulas (i.e., โˆ€xโ†’โขฯ•โข(xโ†’), where ฯ• is free of quantifiers). Thus, ๐–ฏ๐–ต1 is a universal theory. Although the definition of ๐–ฏ๐–ต1 is quite technical, the theory is fairly robust and the details of its definition are often unnecessary for practical purposes. In particular, ๐–ฏ๐–ต1 has an equivalent formalizations that does not rely on Cobhamโ€™s result, e.g. [12].

Jeล™รกbekโ€™s Theory ๐—”๐—ฃ๐—–๐Ÿ [10, 11, 13]

๐– ๐–ฏ๐–ข1 extends ๐–ฏ๐–ต1 with the dual Weak Pigeonhole Principle (๐–ฝ๐–ถ๐–ฏ๐–ง๐–ฏ) for ๐–ฏ๐–ต1 functions:

๐– ๐–ฏ๐–ข1โ‰œ๐–ฏ๐–ตโˆช{๐–ฝ๐–ถ๐–ฏ๐–ง๐–ฏโข(f)โˆฃfโˆˆโ„’๐–ฏ๐–ต}.

Each sentence ๐–ฝ๐–ถ๐–ฏ๐–ง๐–ฏโข(f) postulates that, for every length n=|N| and for every choice of zโ†’, there is y<(1+1/n)โ‹…2n such that fโข(zโ†’,x)โ‰ y for every x<2n. It is known that ๐– ๐–ฏ๐–ข1 is contained in ๐–ณ22 [21].

Bussโ€™s Theories ๐—ฆ๐Ÿ๐’Š and ๐—ง๐Ÿ๐’Š [2]

The language โ„’B for these theories includes predicate symbols = and โ‰ค, constant symbols 0 and 1, and function symbols S (successor), +, โ‹…, โŒŠx/2โŒ‹, |x| (interpreted as the length of x), and # (interpreted as xโข#โขy=2|x|โ‹…|y|, known as โ€œsmashโ€).

Recall that a bounded quantifier is a quantifier of the form Qโขyโ‰คt, where Qโˆˆ{โˆƒ,โˆ€} and t is a term not involving y. Similarly, a sharply bounded quantifier is one of the form Qโขyโ‰ค|t|. A formula where each quantifier appears bounded (or sharply bounded) is called a bounded (or sharply bounded) formula.

We can create a hierarchy of formulas by counting alternations of bounded quantifiers. The class ฮ 0b=ฮฃ0b contains the sharply bounded formulas. Recursively, for each iโ‰ฅ0, the classes ฮฃib and ฮ ib are defined by the quantifier structure of the sentence, ignoring sharply bounded quantifiers. For instance, if ฯ†โˆˆฮฃ0b and ฯˆโ‰œโˆƒyโ‰คtโข(xโ†’)โขฯ†โข(y,xโ†’), then ฯˆโˆˆฮฃ1b. For the general case of the definition, see [16]. It is known that for each iโ‰ฅ1, a predicate Pโข(xโ†’) is in ฮฃip (the i-th level of the polynomial hierarchy) if and only if there is a ฮฃib-formula that agrees with it over โ„•.

These theories share a common set of finitely many axioms, BASIC, which postulate the expected arithmetic behavior of the constants, predicates, and function symbols. The only difference among the theories is the type of induction axiom scheme each one postulates.

๐–ณ2i is a theory in the language โ„’B that extends BASIC by including the induction axiom ๐–จ๐–ญ๐–ฃ:

ฯ†โข(0)โˆงโˆ€xโข(ฯ†โข(x)โ†’ฯ†โข(x+1))โ†’โˆ€xโขฯ†โข(x)

for all ฮฃib-formulas ฯ†โข(a). The formula ฯ†โข(a) may contain other free variables in addition to a.

๐–ฒ2i is a theory in the language โ„’B that extends BASIC by including the polynomial induction axiom ๐–ฏ๐–จ๐–ญ๐–ฃ:

ฯ†โข(0)โˆงโˆ€xโข(ฯ†โข(โŒŠx/2โŒ‹)โ†’ฯ†โข(x))โ†’โˆ€xโขฯ†โข(x)

for all ฮฃib-formulas ฯ†โข(a). The formula ฯ†โข(a) may contain other free variables in addition to a.

Theory ๐—ฆ๐Ÿ๐Ÿโข(๐—ฃ๐—ฉ)

When proving some results in ๐–ฒ21, it is often convenient to use a more expressive vocabulary that easily describes any polynomial-time function. This can be done in a conservative manner, meaning the power of the theory is not increased. Specifically, let ฮ“ be a set of โ„’B-formulas. We say that a polynomial-time function f:โ„•kโ†’โ„• is ฮ“-definable in ๐–ฒ21 if there exists a formula ฯˆโข(xโ†’,y)โˆˆฮ“ such that the following conditions are met:

  1. (i)

    For every aโ†’โˆˆโ„•k, fโข(aโ†’)=b if and only if โ„•โŠงฯ†โข(aโ†’,b).

  2. (ii)

    ๐–ฒ21โŠขโˆ€xโ†’โข(โˆƒyโข(ฯ†โข(xโ†’,y)โˆงโˆ€zโข(ฯ†โข(xโ†’,z)โ†’y=z))).

Every function fโˆˆ๐–ฅ๐–ฏ is ฮฃ1b-definable in ๐–ฒ21. By incorporating all functions in ๐–ฅ๐–ฏ into the vocabulary of ๐–ฒ21 and extending the axioms of ๐–ฒ21 with their defining equations, we obtain a theory ๐–ฒ21โข(๐–ฏ๐–ต). This theory allows polynomial-time predicates to be referred to using quantifier-free formulas. ๐–ฒ21โข(๐–ฏ๐–ต) remains conservative over ๐–ฒ21, meaning any โ„’B-sentence provable in ๐–ฒ21โข(๐–ฏ๐–ต) is also provable in ๐–ฒ21. Finally, it is known that ๐–ฒ21โข(๐–ฏ๐–ต) proves the polynomial induction scheme for both ฮฃ1b-formulas and ฮ 1b-formulas within the extended vocabulary.

2.2.2 The KPT Witnessing Theorem

The following witnessing theorem (a variant of Herbrandโ€™s theorem) is proved in [19] (cf.ย also [16, Theoremย 7.4.1]) for universal theories (like the theory ๐–ฏ๐–ต1).

Theorem 4 (KPT Theorem for โˆ€โˆƒโˆ€โˆƒ sentences).

Let ๐–ณ be a universal theory with vocabulary โ„’. Let ฯ† be an open โ„’-formula, and suppose that

๐–ณโŠขโˆ€xโขโˆƒyโขโˆ€zโขโˆƒwโขฯ†โข(x,y,z,w).

Then there is a finite sequence s1,โ€ฆ,sk of โ„’-terms such that

๐–ณโŠขโˆ€x,z1,โ€ฆ,zkโข(ฯˆโข(x,s1โข(x),z1)โˆจฯˆโข(x,s2โข(x,z1),z2)โˆจโ‹ฏโˆจฯˆโข(x,skโข(x,z1,โ€ฆ,zkโˆ’1),zk)),

where

ฯˆโข(x,y,z)โ‰œโˆƒwโขฯ†โข(x,y,z,w).

We can also apply the KPT Theorem to each theory ๐–ณ2i (for iโ‰ฅ1) using a conservative extension of the theory that admits a universal axiomatization. The corresponding theory is called ๐–ฏ๐–ตi+1 [19]. In ๐–ฏ๐–ตi+1, each term is equivalent to an ๐–ฅ๐–ฏฮฃip function over the standard model. This leads to the following result.

Theorem 5 (Consequence of the KPT Theorem for Theory ๐–ณ2i).

Let iโ‰ฅ1, ฯ†โข(x,y,w,z) be a ฮ ib-formula, and suppose that

๐–ณ2iโŠขโˆ€xโขโˆƒyโขโˆ€zโขโˆƒwโขฯ†โข(x,y,w,z).

Then there is a finite sequence f1,โ€ฆ,fk of function symbols, each corresponding to an ๐–ฅ๐–ฏฮฃip function, such that

โ„•โŠงโˆ€x,z1,โ€ฆ,zkโข(ฯˆโข(x,f1โข(x),z1)โˆจฯˆโข(x,f2โข(x,z1),z2)โˆจโ‹ฏโˆจฯˆโข(x,fkโข(x,z1,โ€ฆ,zkโˆ’1),zk)),

where

ฯˆโข(x,y,z)โ‰œโˆƒwโขฯ†โข(x,y,z,w).

3 Circuit Size Hierarchies in Bounded Arithmetic

3.1 Explicit Circuit Lower Bounds from Provability in ๐—ฃ๐—ฉ๐Ÿ and ๐—ง๐Ÿ๐Ÿ

In this section, we prove Theorem 1 Items (ii) and Items (iii).

Theorem 6 (Theorem 1 Item (iii)).

If there are rationals a>b>1 and n0โˆˆโ„• such that

๐–ฏ๐–ต1โŠข๐–ข๐–ฒ๐–งโข[a,b,n0],

then there is a constant ฮต>0 and a language Lโˆˆ๐–ฏ such that Lโˆ‰๐–ฒ๐–จ๐–น๐–คโข[n1+ฮต].

Proof.

Towards a contradiction, suppose that ๐–ฏ๐–ต1โŠข๐–ข๐–ฒ๐–งโข[a,b,n0] for rationals a>b>1 and some constant n0 and that PโІโ‹‚ฮต>0๐–ฒ๐–จ๐–น๐–คโข[n1+ฮต]. The sentence ๐–ข๐–ฒ๐–งโข[a,b,n0] has the form โˆ€โˆƒโˆ€โˆƒ:

๐–ข๐–ฒ๐–งโข[a,b,n0]โ‰œโˆ€nโ‰ฅn0โˆˆ๐–ซ๐—ˆ๐—€,โˆƒcircuitโขDโขโˆ€circuitโขCโขฯˆa,bโข(n,D,C),

where ฯˆa,bโข(n,D,C) is the existential formula:

ฯˆa,bโข(n,D,C)โ‰œโˆƒxโข|x|โ‰คnโˆง๐–ฒ๐–จ๐–น๐–คโข(D)โ‰คnaโˆง(๐–ฒ๐–จ๐–น๐–คโข(C)โ‰คnbโ†’Dโข(x)โ‰ Cโข(x)).

Therefore, we can apply the KPT Theorem (Theorem 4), which provides ๐–ฏ๐–ต1-terms, equivalently ๐–ฅ๐–ฏ functions, s1,โ€ฆ,sk, where k is a constant, such that

โ„•โŠงฯˆa,bโข(n,s1โข(1(n)),C1)โˆจฯˆa,bโข(n,s2โข(1(n),C1),C2)โˆจโ‹ฏโˆจฯˆa,bโข(n,skโข(1(n),C1,โ€ฆ,Ckโˆ’1),Ck). (1)

In the formula above the circuits C1,โ€ฆ,Ck are universally quantified.

Next, we use PโІโ‹‚ฮต>0๐–ฒ๐–จ๐–น๐–คโข[n1+ฮต] to refute each of these disjuncts. We start by considering the following language, Dโข-Eval:

Algorithmย 1 The pseudocode of an algorithm that decides the language Dโข-Eval.
Input :ย A string x and a sequence โŸจC1,C2,โ€ฆ,CrโŸฉ of rโ‰คkโˆ’1 circuits
1 Define nโ‰œ|x|;
2 Simulate sr+1โข(1(n),C1,โ€ฆ,Cr) and interpret the output as a Boolean circuit D:{0,1}nโ†’{0,1};
// We assume w.l.o.g.ย thatย D is a valid n-bit circuit of size โ‰คna, since otherwise the disjunct is trivially false.
Evaluate D on input x and output the result.

D-Eval is in ๐–ฏ due to the fact that s1,โ€ฆ,skโˆˆ๐–ฅ๐–ฏ and circuit evaluation is in ๐–ฅ๐–ฏ. By our assumption on the circuit complexity of the complexity class ๐–ฏ, for every input length m and every ฮต>0, Dโข-Evalโˆˆ๐–ฒ๐–จ๐–น๐–คโข[m1+ฮต], so we can choose

ฮต0โ‰œb1/(2โขk)โˆ’1>0

and have Dโข-Evalโˆˆ๐–ฒ๐–จ๐–น๐–คโข[mb1/(2โขk)]. We also define the constants

ฯตiโ‰œbi/kandฮดiโ‰œb(2โขiโˆ’1)/(2โขk)

for i=1,โ€ฆ,k. Note that ฯตi=(1+ฮต0)โขฮดi and ฮดi+1>ฯตi.

We start by refuting ฯˆa,bโข(n,s1โข(1(n)),C1). We consider inputs of the form x,ฮป to Dโข-Eval, where ฮป is the empty sequence. Then the input has length n+c , where c=Oโข(logโกn) accounts for the overhead in the encoding of the input. We consider the circuit C1โˆ—โˆˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[(n+c)1+ฮต0], which evaluates as Dโข-Eval on inputs of length n+c, and we fix the input variables not related to x to represent the empty sequence. The resulting circuit has as input an n-bit string x and computes according to s1โข(1(n)) by definition of the Dโข-Eval algorithm. For sufficiently large n, we have that n+cโ‰คnฮด1โ‡’(n+c)1+ฮต0โ‰คn(1+ฮต0)โขฮด1=nฯต1, therefore we have the circuit C1โˆ—โˆˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[nฯต1] which agrees with the circuit s1โข(1(n)) on all n-bit inputs. Since ฯต1โ‰คb, we have that โ„•โŠงฬธฯˆa,bโข(n,s1โข(1(n)),C1โˆ—).

We can apply a similar argument to the next disjunct using the aforementioned circuit C1โˆ—. In more detail, we consider the input (x,โŸจC1โˆ—โŸฉ) on Dโข-Eval, which has length m=n+9โขnฯต1โขlogโก(nฯต1)+cโ‰คnฮด2 for sufficiently large n due to ฮด2>ฯต1, and a corresponding circuit C2โˆ—โˆˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[m1+ฮต0] provided by the circuit upper bound hypothesis. Similarly, we can fix the 9โขnฯต1โขlogโก(nฯต1)+c variables not related to the input string x. This provides an n-bit circuit C2โˆ—โˆˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[nฯต2] that computes according to the circuit s2โข(1(n),C1โˆ—), due to the definition of the Dโข-Eval algorithm. Since ฯต2<b, we have that โ„•โŠงฬธฯˆa,bโข(n,s2โข(1(n),C1โˆ—),C2โˆ—).

Inductively, if we have circuits C1โˆ—,C2โˆ—,โ€ฆ,Ciโˆ— for some iโ‰คkโˆ’1 of sizes at most nฯต1,nฯต2,โ€ฆ,nฯตi, respectively, we consider the input (x,โŸจC1โˆ—,โ€ฆ,Ciโˆ—โŸฉ) to Dโข-Eval, which has length m=n+9โขnฯต1โขlogโก(nฯต1)+โ‹ฏ+9โขnฯตiโขlogโก(nฯตi)+cโ‰คnฮดi+1 for sufficiently large n. Therefore, by taking a corresponding m1+ฮต0-size circuit for Dโข-Eval and fixing all the inputs except for x, we get the circuit Ci+1โˆ—โˆˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[nฯตi+1]โІ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[nb] which agrees with the circuit si+1โข(1(n),C1โˆ—,โ€ฆ,Ciโˆ—) on all n-bit inputs. Consequently, โ„•โŠงฬธฯˆa,bโข(n,si+1โข(1(n),C1โˆ—,โ€ฆ,Ciโˆ—),Ci+1โˆ—).

Overall, we can refute all disjuncts in Equation 1, which gives us a contradiction. This completes the proof. โ—€

Theorem 7 (Theorem 1 Item (ii)).

If there are rationals a>b>1 and n0โˆˆโ„• such that

๐–ณ21โŠข๐–ข๐–ฒ๐–งโข[a,b,n0],

then there is a constant ฮต>0 and a language Lโˆˆ๐–ฏ๐–ญ๐–ฏ such that Lโˆ‰๐–ฒ๐–จ๐–น๐–คโข[n1+ฮต].

Proof.

In this case, provability in ๐–ณ21 provides by the KPT Theorem (Theorem 5) functions s1,โ€ฆ,sk which are in ๐–ฅ๐–ฏ๐–ญ๐–ฏ instead of ๐–ฅ๐–ฏ as in the previous proof. Therefore, the algorithm Dโข-Eval is in ๐–ฏ๐–ญ๐–ฏ and we use the upper bound ๐–ฏ๐–ญ๐–ฏโІโ‹‚ฮต>0๐–ฒ๐–จ๐–น๐–คโข[n1+ฮต] to get a contradiction in the same way as above. โ—€

Note that in the arguments above we have no control over the constant ฮต>0. It depends on the number of disjuncts obtained from the KPT Theorem, which depends on the supposed proof of the hierarchy sentence.

3.2 Extracting All the Hardness from Proofs of a Succinct Hierarchy Theorem

In this section, we prove Theorem 2 Item (ii).

Theorem 8 (Theorem 2 Item (ii)).

If there are rationals a>b>1 and a constant n0โˆˆโ„• such that

๐–ณ21โŠข๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0],

then there is a language Lโˆˆ๐–ฏ๐–ญ๐–ฏ such that Lโˆ‰๐–ฒ๐–จ๐–น๐–คโข[nb].

Proof.

The main idea here is to use the proof of ๐–ฒ๐–ข๐–ฒ๐–ง in order to define a Turing machine M which runs in polynomial time using an ๐–ญ๐–ฏ oracle and its language is hard against nb-size circuits.

Starting from ๐–ณ21โŠข๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0], we see that the structure of the sentence is โˆ€โˆƒโˆ€โˆƒ:

๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0]โ‰œโˆ€nโ‰ฅn0โˆˆ๐–ซ๐—ˆ๐—€,โˆƒcollectionโขโ„ฑ,โˆ€circuitโขCโขฯ•a,bโข(n,โ„ฑ,C),

where ฯ•a,bโข(n,โ„ฑ,C) is the formula that states that โ„ฑ is a collection {(x1,b1),โ€ฆ,(xโ„“,bโ„“)} with โ„“โ‰คna, where |xi|=n and |bi|=1, and that if C is a circuit on n variables and of size โ‰คnb, then there is some iโˆˆ[โ„“] such that Cโข(xi)โ‰ bi (we can move the existential quantifier at the front of the formula).

Thus, by the KPT Theorem (Theorem 5), there are ๐–ฅ๐–ฏ๐–ญ๐–ฏ functions f1,โ€ฆ,fk, where k is a fixed constant, such that

โ„•โŠงฯ•a,bโข(n,f1โข(1(n)),C1)โˆจฯ•a,bโข(n,f2โข(1(n),C1),C2)โˆจโ‹ฏโˆจฯ•a,bโข(n,fkโข(1(n),C1,โ€ฆ,Ckโˆ’1),Ck). (2)

From the relation above, we can see that one of the functions f1,โ€ฆ,fk will output a collection that refutes every circuit of size โ‰คnb. If it is not f1, then there is a counterexample circuit C1, which is used as extra input in f2 and so on. Since f1,โ€ฆ,fk are in ๐–ฅ๐–ฏ๐–ญ๐–ฏ, we can simulate this procedure in a ๐–ฏ๐–ญ๐–ฏ Turing machine Ma,b, described below.

โ–ถย Remark.

In contrast with Algorithm 1, the algorithm of the Turing machine Ma,b does not need to have the counterexample circuits as input, since it can guess and check them during its process, using the ๐–ญ๐–ฏ oracle. This difference in the input size is what gives us the nb lower bound instead of n1+ฯต.

Algorithmย 2 The Turing machine Ma,b, whose language is hard for nb-size circuits.
Input :ย A bit-string x
1 Define nโ‰œ|x|;
2 forย i=1,โ€ฆ,kย do
3โ€‚ย โ€ƒSimulate fi with input 1(n) and, if i>1, C1,โ€ฆ,Ciโˆ’1. Interpret the output as a collection โ„ฑ={(x1,b1),โ€ฆ,(xโ„“,bโ„“)} with โ„“=na;
4โ€‚ย โ€ƒ Check with an ๐–ญ๐–ฏ oracle whether there exists a circuit C of size โ‰คnb, such that Cโข(xi)=bi for all iโˆˆ[โ„“];
5โ€‚ย โ€ƒ If not or if i=k, exit the for-loop with the current โ„ฑ;
6โ€‚ย โ€ƒ If there is such a circuit, then use the ๐–ญ๐–ฏ oracle to find it and name it Ci.
7 end for
If the pair (x,1) is in the collection โ„ฑ, then accept. Else reject.

It is easy to see that the language Lโข(Ma,b) recognised by the Turing machine Ma,b, is in ๐–ฏ๐–ญ๐–ฏ. It suffices to show that Lโข(Ma,b)โˆ‰๐–ฒ๐–จ๐–น๐–คโข[nb].

Consider a circuit Cโˆˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[nb]. We will show that it fails to recognise Lโข(Ma,b). Assume that the for-loop in Algorithm 2 ends in the r-th iteration with rโ‰คk. We fix the circuits C1,C2,โ€ฆ,Crโˆ’1 found by the algorithm. Then the formula ฯ•a,bโข(n,frโข(1(n),C1,โ€ฆ,Crโˆ’1),C) always holds. If r<k and C did not satisfy it, then the ๐–ญ๐–ฏ oracle would find C as a counterexample and it would continue to the (r+1)-th iteration. If r=k, then by the construction of C1,C2,โ€ฆ,Ckโˆ’1, the formulas ฯ•a,bโข(n,fiโข(1(n),C1,โ€ฆ,Ciโˆ’1),Ci) for i<k do not hold, which means by Equation 2 that ฯ•a,bโข(n,fkโข(1(n),C1,โ€ฆ,Ckโˆ’1),C) is true.

Since โ„ฑโ‰กfrโข(1(n),C1,โ€ฆ,Crโˆ’1), from ฯ•a,bโข(n,โ„ฑ,C) we get that there is some iโˆˆ[โ„“], such that Cโข(xi)โ‰ bi. However, if bi=1, then xiโˆˆLโข(Ma,b), and if bi=0, then xiโˆ‰Lโข(Ma,b). In both cases, the circuit C fails to recognise the language Lโข(Ma,b), and the proof is complete. โ—€

3.3 Formalization in ๐—ง๐Ÿ๐Ÿ

In this section, we prove Theorem 1 Item (i) and Theorem 2 Item (i). To achieve this, we show that the succinct circuit size hierarchy is provable in ๐– ๐–ฏ๐–ข1, which is contained in ๐–ณ22. We then observe that the circuit size hierarchy is easily provable from the succinct circuit size hierarchy.

Theorem 9.

For every choice of rationals a>b>1 and for every large enough n0โˆˆโ„•,

๐– ๐–ฏ๐–ข1โŠข๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0].

In particular, ๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0] is provable in ๐–ณ22.

Proof.

We define the polynomial-time function, f, which takes as input the description of a circuit, C, of size nb, which means that the length of the description of C is 9โขnbโขlogโกnb, and outputs a bit string y of length na with the property that for all i=0,1,โ€ฆ,naโˆ’1, yi=Cโข(i).

The correctness of the polynomial-time algorithm f is provable in ๐–ฏ๐–ต1. In other words,

๐–ฏ๐–ต1โŠข โˆ€nโˆˆ๐–ซ๐—ˆ๐—€โข(|x|โ‰ค9โขnbโขlogโกnbโˆง|y|โ‰คna)โ†’
(|f(x)|โ‰คnaโˆง(f(x)=yโ†”โˆ€i<nayi=๐–ค๐—๐–บ๐—…(x,i))). (3)

The quantifier โˆ€iโ‰คna is sharply bounded, so this formula is provable in ๐–ฏ๐–ต1.

The theory ๐– ๐–ฏ๐–ข1 includes the ๐–ฝ๐–ถ๐–ฏ๐–ง๐–ฏ axiom for all ๐–ฏ๐–ต functions with input length n and output length n+1, or equivalently input length n and output length m with n<m. From the first part of Equation (3.3), the input length of f is 9โขnbโขlogโกnb, while the output length is na. Furthermore, it is provable in ๐–ฏ๐–ต1 that there is some constant n0, such that โˆ€nโ‰ฅn0โขna>9โขnbโขlogโกnb. Therefore, we can use the axiom:

๐–ฝ๐–ถ๐–ฏ๐–ง๐–ฏโข(f)โ‰œโˆ€nโ‰ฅn0โขโˆƒyโข(|y|=na)โขโˆ€xโข(|x|=9โขnbโขlogโกnb)โขfโข(x)โ‰ y (4)

Every circuit of size nb can be described by a string of size 9โขnbโขlogโกnb, which means that

โˆ€Cโˆˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[nb]โข|C|โ‰ค9โขnbโขlogโกnb.

Also, from the second part of Equation (3.3), using the notation for the circuit C, we get that

fโข(C)โ‰ yโ†”โˆƒi<naโขCโข(i)โ‰ yi.

Substituting the last two relations to Equation 4, we get that

๐– ๐–ฏ๐–ข1โŠขโˆ€nโ‰ฅn0โˆˆ๐–ซ๐—ˆ๐—€โขโˆƒyโข(|y|=na)โขโˆ€Cโˆˆ๐–ข๐–จ๐–ฑ๐–ข๐–ด๐–จ๐–ณโข[nb]โขโˆƒi<naโขCโข(i)โ‰ yi,

which is equivalent with ๐–ฒ๐–ข๐–ฒ๐–งโข[a,b,n0], if we interpret y as the collection

โ„ฑyโ‰œ{(0,y0),(1,y1),โ€ฆ}.

โ—€

Corollary 10.

For every choice of rationals a>b>1 and for every large enough n0โˆˆโ„•,

๐–ณ22โŠข๐–ข๐–ฒ๐–งโข[a,b,n0].
Proof.

Since a>b, there is some rational ฯต>0, such that aโˆ’ฯต>b. From Theorem 9, we have got a collection โ„ฑ={(x1,b1),โ€ฆ,(xโ„“,bโ„“)} of size โ„“โ‰คnaโˆ’ฯต, such that for all circuits C of size less than nb, there exists iโˆˆ[โ„“] such that Cโข(xi)โ‰ bi. So, we only need to prove that

๐–ฏ๐–ต1โŠขโˆƒcircuitD:{0,1}nโ†’{0,1}of sizeโ‰คna,โˆ€iโˆˆ[โ„“]D(xi)=bi,

and then we can easily deduce that ๐– ๐–ฏ๐–ข1โŠข๐–ข๐–ฒ๐–งโข[a,b,n0]. The same holds also for ๐–ณ22.

It is sufficient to argue in ๐–ฏ๐–ต1 that there is a polynomial-time function ๐–ข๐—‚๐—‹๐–ผ๐—Ž๐—‚๐—โข(โ„ฑ) such that given the collection โ„ฑ from Theorem 9 outputs a circuit D:{0,1}nโ†’{0,1} of the required size such that โˆ€iโˆˆ[โ„“]โขDโข(xi)=bi. In order to optimize the circuit size, we use that the obtained collection has a specific structure. More precisely, we have that for any iโˆˆ[โ„“], the strings xi is the n-bit binary representation of the integer iโˆ’1. Therefore, we can construct the circuit D in the following way: For every n-bit string xi such that (xi,1)โˆˆโ„ฑ, we construct the term Ti, which is the conjunction of the first |โ„“| least significant bits of xi (we put the literal zj if the j-th bit of xi is 1 and ยฌzj if the j-th bit of xi is 0, where jโ‰ค|โ„“|). Then we make the DNF

Dโ‰œโ‹(xi,1)โˆˆโ„ฑTi.

It is easy to see that D agrees with all the pairs of the collection โ„ฑ. For an arbitrary pair (xi,bi), if bi=1, then the bits of xi satisfy the term Ti, hence Dโข(xi)=1. Otherwise, if bi=0, we know that the first |โ„“| least significant bits of xi do not satisfy any term of the disjunction (since for all i, xiโ‰คโ„“), thus we get that Dโข(xi)=0.

The DNF D can be viewed as a circuit and its correctness is easily provable in ๐–ฏ๐–ต1. This circuit has size at most naโˆ’ฯตโข|โ„“| (derived by |โ„“|โˆ’1 โˆง-gates for each one of the at most naโˆ’ฯต terms and at most naโˆ’ฯต โˆจ-gates for the final disjunction), which is at most naโˆ’ฯตโข(logโกnaโˆ’ฯต+1). For large enough n0, we can prove that โˆ€nโ‰ฅn0,naโˆ’ฯตโข(logโกnaโˆ’ฯต+1)โ‰คna, hence we have the desired result. โ—€

4 Provability of Formula Size Bounds in ๐—ฃ๐—ฉ๐Ÿ

In this section, we prove Theorem 3. To achieve this, we establish that:

  1. 1.

    The parity function on n bits requires formulas of size โ‰ฅn3/2 (Section 4.1).

  2. 2.

    The parity function on n bits can be computed by formulas of size Oโข(n2)โ‰คna for any fixed rational a>2 and large enough n (Section 4.2).

  3. 3.

    Consequently, the formula size hierarchy holds with parameters a>2 and b=3/2, provided that n0 is large enough (Section 4.3).

4.1 Subbotovskayaโ€™s Lower Bound

4.1.1 High-Level Details of the Formalization

In this section, we sketch a formalization in ๐–ฏ๐–ต1 of the proof that the parity function on n bits requires Boolean formulas of size โ‰ฅn3/2 [25].333For concreteness, we let the size of a Boolean formula F be the number of leaves of F labeled by an input literal. We allow leaves that are labeled by constants, but we do not charge for them. Consequently, a constant function has formula complexity 0, while a non-constant function has formula complexity at least 1. We adapt the argument presented in [14, Section 6.3], which proceeds as follows:

  1. 1.

    [14, Lemma 6.8]: Given a Boolean formula F on n-bit inputs, it is possible to fix one of its variables so that the resulting formula F1 satisfies

    ๐–ฒ๐—‚๐—“๐–พโข(F1)โ‰ค(1โˆ’1/n)3/2โ‹…๐–ฒ๐—‚๐—“๐–พโข(F).

    In order to pick the variable to be restricted and its value, one first โ€œnormalizesโ€ the formula F, as implicitly described in [14, Claim 6.9] (see more details below).

  2. 2.

    [14, Theorem 6.10]: By applying this result โ„“โ‰œnโˆ’k times, it is possible to obtain a formula Fโ„“ on k-bit inputs such that

    ๐–ฒ๐—‚๐—“๐–พโข(Fโ„“)โ‰ค๐–ฒ๐—‚๐—“๐–พโข(F)โ‹…(1โˆ’1/n)3/2โ‹…(1โˆ’1/(nโˆ’1))3/2โขโ€ฆโข(1โˆ’1/(k+1))3/2=๐–ฒ๐—‚๐—“๐–พโข(F)โ‹…(k/n)3/2.
  3. 3.

    [14, Example 6.11]: If the initial formula F computes the parity function, by setting โ„“=nโˆ’1 we obtain

    1โ‰ค๐–ฒ๐—‚๐—“๐–พโข(Fโ„“)โ‰ค(1/n)3/2โ‹…๐–ฒ๐—‚๐—“๐–พโข(F),

    and consequently ๐–ฒ๐—‚๐—“๐–พโข(F)โ‰ฅn3/2.

We recommend reading this section with [14, Section 6.3] at hand. We will slightly modify the argument when formalizing the lower bound in ๐–ฏ๐–ต1. In more detail, given a small formula F, we recursively construct (and establish correctness by induction) an n-bit input y witnessing that F does not compute the parity function. (Actually, for technical reasons related to the induction step, we will simultaneously construct an n-bit input yn0 witnessing that F does not compute the parity function and an n-bit input yn1 witnessing that F does not compute the negation of the parity function.)

Let sโข(n) be a size bound and โŠ•(x) be a ๐–ฏ๐–ต function that computes the parity of the binary string described by x, i.e., โŠ•(x)โ‰œx1โŠ•x2โŠ•โ€ฆโŠ•xn, where xi denotes the i-th bit of x. To simplify notation, we tacitly view x as a binary string. We assume that the formalization employs a well-behaved function symbol โŠ• such that ๐–ฏ๐–ต1 proves the basic properties of the parity function, e.g., ๐–ฏ๐–ต1โŠขโŠ•(x1)=1โˆ’โŠ•(x) and ๐–ฏ๐–ต1โŠขโŠ•(xโข0)=โŠ•(x).

We consider the following โ„’๐–ฏ๐–ต-sentence stating that the parity function requires formulas of size at least sโข(n) for every input length nโ‰ฅ1:

๐–ฅ๐–ซ๐–กsโ‰œโˆ€Nโˆ€nโˆ€F(n=|N|โ‰ฅ1โˆง๐–ฒ๐—‚๐—“๐–พ(F)<s(n)โ†’โˆƒx(|x|โ„“=nโˆง๐–ค๐—๐–บ๐—…(F,x)โ‰ โŠ•(x)),

where for convenience of notation we use the function symbol |w|โ„“ to compute the bit-length of the string represented by w (under some reasonable encoding).

Theorem 11.

Let sโข(n)โ‰œn3/2. Then ๐–ฏ๐–ต1โŠข๐–ฅ๐–ซ๐–กs.

Proof.

Given bโˆˆ{0,1}, we introduce the function โŠ•b(x)โ‰œโŠ•(x)+bโข(๐—†๐—ˆ๐–ฝโขโ€„2). In order to prove ๐–ฅ๐–ซ๐–กs in ๐–ฏ๐–ต1, we explicitly consider a polynomial-time function Rโข(1(n),F,b) with the following properties:555For convenience, we often write 1(n) instead of explicitly considering parameters N and n=|N|. We might also write just Fโข(x) instead of ๐–ค๐—๐–บ๐—…โข(F,x).

  1. 1.

    Let bโˆˆ{0,1}.

  2. 2.

    If ๐–ฒ๐—‚๐—“๐–พโข(F)<sโข(n) then Rโข(1(n),F,b) outputs an n-bit string ynb such that ๐–ค๐—๐–บ๐—…โข(F,ynb)โ‰ โŠ•b(ynb).

In other words, Rโข(1(n),F,b) witnesses that the formula F does not compute the function โŠ•b over n-bit strings. Note that the correctness of R is captured by the bounded universal sentence:

๐–ฑ๐–พ๐–ฟR,sโ‰œโˆ€1(n)โขโˆ€Fโข(๐–ฒ๐—‚๐—“๐–พโข(F)<sโข(n)โ†’|yn0|โ„“=|yn1|โ„“=nโˆงFโข(yn0)โ‰ โŠ•0(yn0)โˆงFโข(yn1)โ‰ โŠ•1(yn1)),

where we employed the abbreviations yn0โ‰œRโข(1(n),F,0) and yn1โ‰œRโข(1(n),F,1). Our plan is to define R and show that ๐–ฏ๐–ต1โŠข๐–ฑ๐–พ๐–ฟR,s. Note that this implies ๐–ฅ๐–ซ๐–กs in ๐–ฏ๐–ต1. Jumping ahead, the correctness of Rโข(1(n),F,b) will be established by polynomial induction on N (equivalently, induction on n=|N|). Since ๐–ฑ๐–พ๐–ฟR,s is a universal sentence and ๐–ฒ21 is โˆ€ฮฃ1b-conservative over ๐–ฏ๐–ต1, polynomial induction for ๐–ญ๐–ฏ and ๐–ผ๐—ˆ๐–ญ๐–ฏ predicates (admissible in ๐–ฒ21; see, e.g.,ย [16, Section 5.2]) is available during the formalization. More details follow.

The procedure Rโข(1(n),F,b) makes use of a few polynomial-time sub-routines (discussed below) and is defined in the following way:

Algorithmย 3 Refuter Algorithm Rโข(1(n),F,b).
Input :ย 1(n) for some nโ‰ฅ1, formula F over n-bit inputs, bโˆˆ{0,1}.
1 Let sโข(n)โ‰œn3/2. If ๐–ฒ๐—‚๐—“๐–พโข(F)โ‰ฅsโข(n) return โ€œerrorโ€;
2 If ๐–ฒ๐—‚๐—“๐–พโข(F)=0, F computes a constant function bFโˆˆ{0,1}. In this case, return the n-bit string ynbโ‰œy1bโข0nโˆ’1 such that โŠ•b(y1bโข0nโˆ’1)โ‰ bF;
3 Let F~โ‰œ๐–ญ๐—ˆ๐—‹๐—†๐–บ๐—…๐—‚๐—“๐–พโข(1(n),F);
// F~ satisfies [14, Claim 6.9], ๐–ฒ๐—‚๐—“๐–พโข(F~)โ‰ค๐–ฒ๐—‚๐—“๐–พโข(F), โˆ€xโˆˆ{0,1}nโขFโข(x)=F~โข(x).
4 Let ฯโ‰œ๐–ฅ๐—‚๐—‡๐–ฝโข-โข๐–ฑ๐–พ๐—Œ๐—๐—‹๐—‚๐–ผ๐—๐—‚๐—ˆ๐—‡โข(1(n),F~), where ฯ:[n]โ†’{0,1,โ‹†} and |ฯโˆ’1โข(โ‹†)|=nโˆ’1;
// ฯ restricts a suitable variable xi to a bit ci, as in [14, Lemma 6.8].
5 Let Fโ€ฒโ‰œ๐– ๐—‰๐—‰๐—…๐—’โข-โข๐–ฑ๐–พ๐—Œ๐—๐—‹๐—‚๐–ผ๐—๐—‚๐—ˆ๐—‡โข(1(n),F~,ฯ). Moreover, let bโ€ฒโ‰œbโŠ•ci and nโ€ฒโ‰œnโˆ’1;
// Fโ€ฒ is an nโ€ฒ-bit formula; โˆ€zโˆˆ{0,1}ฯโˆ’1โข(โ‹†)โขFโ€ฒโข(z)=F~โข(zโˆชxiโ†ฆci).
6 Let ynโ€ฒbโ€ฒโ‰œRโข(1nโ€ฒ,Fโ€ฒ,bโ€ฒ) and return the n-bit string ynbโ‰œynโ€ฒbโ€ฒโˆชyiโ†ฆci;
๐—ก๐—ผ๐—ฟ๐—บ๐—ฎ๐—น๐—ถ๐˜‡๐—ฒโข(๐Ÿ(๐’),๐‘ญ) and its properties (in ๐—ฆ๐Ÿ๐Ÿ)

We say that a subformula G of F is a neighbor of a leaf z if either zโˆงG or zโˆจG is a subformula of F. We say that a formula F over variables {x1,โ€ฆ,xn} is in normal form if for every iโˆˆ[n] and every literal zโˆˆ{xi,xiยฏ}, if z is a leaf of F and G is a neighbor of z in F, then G does not contain the variable xi.

Lemma 12.

There is a polynomial-time function ๐–ญ๐—ˆ๐—‹๐—†๐–บ๐—…๐—‚๐—“๐–พโข(1(n),F) that given a Boolean formula F over n input variables, outputs a formula F~ over n input variables such that the following holds:

  1. (i)

    ๐–ฒ๐—‚๐—“๐–พโข(F~)โ‰ค๐–ฒ๐—‚๐—“๐–พโข(F).

  2. (ii)

    For every input xโˆˆ{0,1}n, F~โข(x)=Fโข(x).

  3. (iii)

    F~ is in normal form.

  4. (iv)

    F~ is either a constant 0 or 1, or F~ contains no leaves labeled by constants 0 and 1.

Moreover, the correctness of ๐–ญ๐—ˆ๐—‹๐—†๐–บ๐—…๐—‚๐—“๐–พโข(1(n),F) is provable in ๐–ฒ21.

Proof Sketch..

It is enough to verify that the proof of [14, Claim 6.9] provides such a polynomial-time function and that its correctness can be established in ๐–ฒ21. In more detail, if F is not in normal form, we can efficiently compute a literal zโˆˆ{xi,xiยฏ} and a neighbor G of z that violates the corresponding property. As shown in [14, Claim 6.9], we can fix any leaf zโ€ฒโˆˆ{xi,xiยฏ} in G by an appropriate constant c so that the resulting formula F1 satisfies conditions (i) and (ii) of Lemma 12. After at most โ„“โ‰œ๐–ฒ๐—‚๐—“๐–พโข(F) iterations, we obtain a sequence F1,โ€ฆ,Fโ„“ of formulas such that F~โ‰œFโ„“ satisfies conditions (i), (ii), and (iii) of the lemma. Moreover, condition (iv) can always be guaranteed by simplifying the final formula, i.e., by replacing subformulas 0โˆจG by G, 1โˆจG by 1, 0โˆงG by 0, and 1โˆงG by G. The correctness of F~โ‰œ๐–ญ๐—ˆ๐—‹๐—†๐–บ๐—…๐—‚๐—“๐–พโข(1(n),F) can be established by polynomial induction for ๐–ผ๐—ˆ๐–ญ๐–ฏ predicates (i.e., ฮ 1b formulas), which is available in ๐–ฒ21. โ—€

๐—™๐—ถ๐—ป๐—ฑโข-โข๐—ฅ๐—ฒ๐˜€๐˜๐—ฟ๐—ถ๐—ฐ๐˜๐—ถ๐—ผ๐—ปโข(๐Ÿ(๐’),๐‘ญ~) and its properties (in ๐—ฆ๐Ÿ๐Ÿ)

We argue in ๐–ฒ21 and follow the argument from the proof of [14, Lemma 6.8]. Let F~ be a formula over n input variables in normal form. We focus on the non-trivial case, and assume that nโ‰ฅ2, ๐–ฒ๐—‚๐—“๐–พโข(F~)โ‰ฅ2, and that F~ contains no leaves labeled by constants. Let ๐–ข๐—ˆ๐—Ž๐—‡๐—โข(1(n),F,i) be a polynomial-time algorithm that outputs the number of leaves of F that contain the variable xi (including its appearances as xiยฏ). Let w=(w1,โ€ฆ,wn) be the corresponding sequence of multiplicities, i.e., wiโ‰œ๐–ข๐—ˆ๐—Ž๐—‡๐—โข(1(n),F,i). Note that โˆ‘iwi=s~, where s~โ‰œ๐–ฒ๐—‚๐—“๐–พโข(F~).

We claim that ๐–ฒ21 proves the existence of an index iโˆˆ[n] such that wiโ‰ฅs~/n. First, for each jโˆˆ[n], we define the cumulative sum vjโ‰œโˆ‘iโ‰คjwj. Let vโ‰œ(v0,v1,โ€ฆ,vn) be the corresponding sequence, where we set v0โ‰œ0. Notice that vn=s~. Since v contains n+1 elements, it can be efficiently computable from w. We now argue by induction on n that for some index jโˆˆ[n] we have vjโˆ’vjโˆ’1โ‰ฅvn/n. This implies that wj=vjโˆ’vjโˆ’1โ‰ฅvn/n=s~/n, as desired.

If n=1, then v1โˆ’v0=v1=v1/1 and the result holds for j=1. Assume the result holds for nโˆ’1, and consider vn. If vnโˆ’vnโˆ’1โ‰ฅvn/n, we can pick j=n and we are done. Otherwise, vnโˆ’1โ‰ฅvnโˆ’vn/n=vnโข(nโˆ’1)/n. By the induction hypothesis, there is an index jโˆˆ[nโˆ’1] such that vjโˆ’vjโˆ’1โ‰ฅvnโˆ’1/(nโˆ’1). Using the lower bound on vnโˆ’1, we get that vjโˆ’vjโˆ’1โ‰ฅvn/n, which concludes the proof.

Consequently, ๐–ฒ21 proves the existence of a variable xi which appears tโ‰ฅs~/n times as a leaf of F~. Let z1,โ€ฆ,zt be the leaves of F~ labeled by either xi or xiยฏ. Recall that we assume that nโ‰ฅ2, ๐–ฒ๐—‚๐—“๐–พโข(F~)โ‰ฅ2, and that F~ satisfies conditions (iii) and (iv) of Lemma 12. Therefore, each leaf zj has a neighbor subformula Gj in F~ that contains some leaf labeled by a literal not in {xi,xiยฏ}. For this reason, if we set xi to an appropriate constant cj, Gj will disappear from F, thereby erasing at least another leaf not among z1,โ€ฆ,zt. As in the proof of [14, Lemma 6.8], if we let cโˆˆ{0,1} be the constant that appears more often among c1,โ€ฆ,ct and set xiโ†ฆc in the restriction ฯ, all the leaves z1,โ€ฆ,zt will be eliminated from F~ together with at least t/2 additional leaves.666The existence of such a constant c can be proved in ๐–ฒ21 in a way that is similar to the proof that some variable xi appears in at least s~/n leaves. Thus the total number of eliminated leaves, which we specify using a polynomial-time function ๐–ญ๐—Ž๐—†๐–ฑ๐–พ๐—†๐—ˆ๐—๐–พ๐–ฝโข(1(n),F~,ฯ), satisfies

๐–ญ๐—Ž๐—†๐–ฑ๐–พ๐—†๐—ˆ๐—๐–พ๐–ฝโข(1(n),F~,ฯ)โ‰ฅt+t2โ‰ฅ3โขs~2โขn.

Overall, it follows that

๐–ฒ21โŠข F~=๐–ญ๐—ˆ๐—‹๐—†๐–บ๐—…๐—‚๐—“๐–พโข(1(n),F)โˆงฯ=๐–ฅ๐—‚๐—‡๐–ฝโข-โข๐–ฑ๐–พ๐—Œ๐—๐—‹๐—‚๐–ผ๐—๐—‚๐—ˆ๐—‡โข(1(n),F~)โ†’
๐–ญ๐—Ž๐—†๐–ฑ๐–พ๐—†๐—ˆ๐—๐–พ๐–ฝโข(1(n),F~,ฯ)โ‰ฅ32โขnโ‹…๐–ฒ๐—‚๐—“๐–พโข(F~).
๐—”๐—ฝ๐—ฝ๐—น๐˜†โข-โข๐—ฅ๐—ฒ๐˜€๐˜๐—ฟ๐—ถ๐—ฐ๐˜๐—ถ๐—ผ๐—ปโข(๐Ÿ(๐’),๐‘ญ~,๐†) and its properties (in ๐—ฆ๐Ÿ๐Ÿ)

We only sketch the details. This is simply a polynomial-time algorithm that, given a formula F~ on n input variables and a restriction ฯ:[n]โ†’{0,1,โˆ—} with |ฯโˆ’1โข(โ‹†)|=nโˆ’1 (i.e.,ย ฯ restricts a single variable xi to a constant ciโˆˆ{0,1}), outputs a formula Fโ€ฒ over nโˆ’1 input variables that sets every literal zโˆˆ{xi,xiยฏ} to the corresponding constant and simplifies the resulting formula, e.g., replaces subformulas 0โˆจG by G, 1โˆจG by 1, 0โˆงG by 0, and 1โˆงG by G. Additionally, for Fโ€ฒ=๐– ๐—‰๐—‰๐—…๐—’โข-โข๐–ฑ๐–พ๐—Œ๐—๐—‹๐—‚๐–ผ๐—๐—‚๐—ˆ๐—‡โข(1(n),F~,ฯ), we have

๐–ฒ21โŠข ๐–ฒ๐—‚๐—“๐–พโข(Fโ€ฒ)โ‰ค๐–ฒ๐—‚๐—“๐–พโข(F~)โˆ’๐–ญ๐—Ž๐—†๐–ฑ๐–พ๐—†๐—ˆ๐—๐–พ๐–ฝโข(1(n),F~,ฯ)โˆง
โˆ€zโˆˆ{0,1}ฯโˆ’1โข(โ‹†)โขFโ€ฒโข(z)=F~โข(zโˆชxiโ†ฆci). (5)

Using the computed bound on ๐–ญ๐—Ž๐—†๐–ฑ๐–พ๐—†๐—ˆ๐—๐–พ๐–ฝโข(1(n),F~,ฯ) for ฯ=๐–ฅ๐—‚๐—‡๐–ฝโข-โข๐–ฑ๐–พ๐—Œ๐—๐—‹๐—‚๐–ผ๐—๐—‚๐—ˆ๐—‡โข(1(n),F~), we obtain that for F~ and Fโ€ฒ defined as above (with sโ€ฒโ‰œ๐–ฒ๐—‚๐—“๐–พโข(Fโ€ฒ) and s~โ‰œ๐–ฒ๐—‚๐—“๐–พโข(F~)), and assuming that nโ‰ฅ2,

๐–ฒ21โŠขsโ€ฒโ‰คs~โˆ’32โขnโ‹…s~=s~โ‹…(1โˆ’32โขn)โ‰คs~โ‹…(1โˆ’1n)3/2. (6)

The last inequality uses that ๐–ฒ21โŠขโˆ€a,aโ‰ฅ2โ†’(1โˆ’3/(2โขa))2โ‰ค(1โˆ’1/a)3, which one can easily verify.

Note that Rโข(1(n),F,b) runs in time polynomial in n+|F|+|b| and that it is definable in ๐–ฒ21. Next, we establish the correctness of Rโข(1(n),F,b) in ๐–ฒ21 .

Lemma 13.

Let sโข(n)โ‰œn3/2. Then ๐–ฒ21โŠข๐–ฑ๐–พ๐–ฟR,s.

Proof.

We consider the formula ฯ†โข(N) defined as

โˆ€Fโขโˆ€n=|N|โ‰ฅ1โข(๐–ฒ๐—‚๐—“๐–พโข(F)<sโข(n))โ†’(|yn0|โ„“=|yn1|โ„“=nโˆงFโข(yn0)โ‰ โŠ•0(yn0)โˆงFโข(yn1)โ‰ โŠ•1(yn1)),

where as before we use yn0โ‰œRโข(1(n),F,0) and yn1โ‰œRโข(1(n),F,1). Note that ฯ†โข(N) is a ฮ 1b formula. Below, we argue that

๐–ฒ21โŠขฯ†โข(1)and๐–ฒ21โŠขโˆ€Nโขฯ†โข(โŒŠN/2โŒ‹)โ†’ฯ†โข(N).

Then, by polynomial induction for ฮ 1b formulas (available in ๐–ฒ21) and using that ฯ†โข(0) trivially holds, it follows that ๐–ฒ21โŠขโˆ€Nโขฯ†โข(N). In turn, this yields ๐–ฒ21โŠข๐–ฑ๐–พ๐–ฟR,s.

Base Case: ๐—ฆ๐Ÿ๐ŸโŠข๐‹โข(๐Ÿ).

In this case, for a given formula F and length n, the hypothesis of ฯ†โข(1) is satisfied only if n=1 and ๐–ฒ๐—‚๐—“๐–พโข(F)=0. Let y10โ‰œRโข(1,F,0) and y11โ‰œRโข(1,F,1). We need to prove that

|y10|โ„“=|y11|โ„“=1โˆงFโข(y10)โ‰ โŠ•0(y10)โˆงFโข(y11)โ‰ โŠ•1(y11).

Since n=1 and ๐–ฒ๐—‚๐—“๐–พโข(F)=0, F evaluates to a constant bF on every input bit. The statement above is implied by Line 2 in the definition of Rโข(n,F,b).

(Polynomial) Induction Step: ๐—ฆ๐Ÿ๐ŸโŠขโˆ€๐‘ตโข๐‹โข(โŒŠ๐‘ต/๐ŸโŒ‹)โ†’๐‹โข(๐‘ต).

Fix an arbitrary N, let nโ‰œ|N|, and assume that ฯ†โข(โŒŠN/2โŒ‹) holds. By the induction hypothesis, for every formula Fโ€ฒ with ๐–ฒ๐—‚๐—“๐–พโข(Fโ€ฒ)<nโ€ฒโฃ3/2, where nโ€ฒโ‰œnโˆ’1, we have

|ynโ€ฒ0|โ„“=|ynโ€ฒ1|โ„“=nโ€ฒโˆงFโ€ฒโข(ynโ€ฒ0)โ‰ โŠ•0(ynโ€ฒ0)โˆงFโ€ฒโข(ynโ€ฒ1)โ‰ โŠ•1(ynโ€ฒ1), (7)

where ynโ€ฒ0โ‰œRโข(1nโ€ฒ,Fโ€ฒ,0) and ynโ€ฒ1โ‰œRโข(1nโ€ฒ,Fโ€ฒ,1).

Now let nโ‰ฅ2, and let F be a formula over n-bit inputs of size <n3/2. By the size bound on F, Rโข(1(n),F,b) ignores Line 1. If ๐–ฒ๐—‚๐—“๐–พโข(F)=0, then similarly to the base case it is trivial to check that the conclusion of ฯ†โข(N) holds. Therefore, we assume that ๐–ฒ๐—‚๐—“๐–พโข(F)โ‰ฅ1 and Rโข(1(n),F,b) does not stop at Line 2. Let F~โ‰œ๐–ญ๐—ˆ๐—‹๐—†๐–บ๐—…๐—‚๐—“๐–พโข(1(n),F) (Line 3), ฯโ‰œ๐–ฅ๐—‚๐—‡๐–ฝโข-โข๐–ฑ๐–พ๐—Œ๐—๐—‹๐—‚๐–ผ๐—๐—‚๐—ˆ๐—‡โข(1(n),F~) (Line 4), Fโ€ฒโ‰œ๐– ๐—‰๐—‰๐—…๐—’โข-โข๐–ฑ๐–พ๐—Œ๐—๐—‹๐—‚๐–ผ๐—๐—‚๐—ˆ๐—‡โข(1(n),F~,ฯ) (Line 5), nโ€ฒโ‰œnโˆ’1 (Line 5), and bโ€ฒโ‰œbโŠ•ci (Line 5), where ฯ restricts the variable xi to the bit ci. Moreover, for convenience, let sโ‰œ๐–ฒ๐—‚๐—“๐–พโข(F), s~โ‰œ๐–ฒ๐—‚๐—“๐–พโข(F~), and sโ€ฒโ‰œ๐–ฒ๐—‚๐—“๐–พโข(Fโ€ฒ). By Lemma 12 Item (i), Equationหœ6, and the bound s<n3/2,

๐–ฒ21โŠขsโ€ฒโ‰คs~โ‹…(1โˆ’1/n)3/2โ‰คsโ‹…(1โˆ’1/n)3/2<n3/2โ‹…(1โˆ’1/n)3/2=(nโˆ’1)3/2.

Thus Fโ€ฒ is a formula on nโ€ฒ-bit inputs of size <nโ€ฒโฃ3/2. Recall that for a given bโˆˆ{0,1} we have bโ€ฒ=bโŠ•ci. Let ynโ€ฒbโ€ฒโ‰œRโข(1nโ€ฒ,Fโ€ฒ,bโ€ฒ) (Line 6). By the first condition in the induction hypothesis (Equationหœ7) and the definition of each ynbโ‰œynโ€ฒbโ€ฒโˆชyiโ†ฆci, we have |yn0|โ„“=|yn1|โ„“=n. Below, we also rely on the last two conditions in the induction hypothesis (Equationหœ7), Lemma 12 Item (ii), and the last condition in Equation (5). We derive the following statements, where bโˆˆ{0,1}:

Fโ€ฒโข(ynโ€ฒbโ€ฒ) โ‰ โŠ•bโ€ฒ(ynโ€ฒbโ€ฒ),
Fโข(ynb) =Fโ€ฒโข(ynโ€ฒbโ€ฒ),
Fโข(ynb) โ‰ โŠ•bโ€ฒ(ynโ€ฒbโ€ฒ).

Notice that

โŠ•bโ€ฒ(ynโ€ฒbโ€ฒ)=โŠ•bโŠ•ci(ynโ€ฒbโ€ฒ)=ciโŠ•(โŠ•b(ynโ€ฒbโ€ฒ))=ciโŠ•(โŠ•b(ynb)โŠ•ci)=โŠ•b(ynb).

These statements imply that, for each bโˆˆ{0,1}, Fโข(ynb)โ‰ โŠ•b(ynb). In other words, the conclusion of ฯ†โข(N) holds. This completes the proof of the induction step. โ—€

As explained above, the provability of ๐–ฑ๐–พ๐–ฟR,s in ๐–ฒ21 implies its provability in ๐–ฏ๐–ต1. Since ๐–ฏ๐–ต1โŠข๐–ฑ๐–พ๐–ฟR,sโ†’๐–ฅ๐–ซ๐–กs, this completes the proof of Theorem 11. โ—€

4.1.2 On the Low-Level Details of the Formalization

In order to make our presentation accessible to a broader audience, in this section we provide more details about the formalization of algorithms and about the proofs of their basic properties. However, due to space restriction, the section is included only in the full version.

4.2 Upper Bound

In this section, we show that the parity function on n bits can be computed by formulas of size Oโข(n2), provably in ๐–ฏ๐–ต1. We can formalize this upper bound in the language of ๐–ฏ๐–ต, defining an โ„’๐–ฏ๐–ต-sentence stating that the parity function can be computed by a formula of size sโข(n) for every input length nโ‰ฅ1:

๐–ฅ๐–ด๐–กsโ‰œโˆ€Nโˆ€nโˆƒF(n=|N|โ‰ฅ1โˆง๐–ฒ๐—‚๐—“๐–พ(F)<s(n)โˆงโˆ€x(|x|โ‰คnโ†’๐–ค๐—๐–บ๐—…(F,x)=โŠ•n0(x)).
Theorem 14.

Let sโข(n)โ‰œ4โขn2. Then ๐–ฏ๐–ต1โŠข๐–ฅ๐–ด๐–กs.

Proof.

๐–ฅ๐–ด๐–กs is a โˆ€ฮฃ2b sentence and our intended theory is ๐–ฏ๐–ต1. In order to implement some inductive proofs, it will be helpful to reduce the complexity of the formula. For this, we introduce a new polynomial-time function, ๐–ฏ๐–บ๐—‹๐–ฅ๐—ˆ๐—‹๐—†โข(1(n)), which generates the desired formula that computes the parity function on n bits. Since it is a polynomial-time function, there is a symbol for it in ๐–ฏ๐–ต and we can use it in the new formalization:

๐–ฅ๐–ด๐–กsโ€ฒโ‰œ โˆ€Nโˆ€n(n=|N|โ‰ฅ1โˆง๐–ฒ๐—‚๐—“๐–พ(๐–ฏ๐–บ๐—‹๐–ฅ๐—ˆ๐—‹๐—†(1(n)))<s(n)โˆง
โˆ€xโข(|x|โ‰คnโ†’๐–ค๐—๐–บ๐—…โข(๐–ฏ๐–บ๐—‹๐–ฅ๐—ˆ๐—‹๐—†โข(1(n)),x)=โŠ•n0(x)).

It is immediate that ๐–ฅ๐–ด๐–กsโ€ฒโ‡’๐–ฅ๐–ด๐–กs, thus we focus on proving ๐–ฅ๐–ด๐–กsโ€ฒ. We continue with the following steps:

  1. 1.

    We prove an upper bound of n2 for the formulas calculating the parity function and its negation, when n is a power of 2.

  2. 2.

    We use this construction to derive the 4โขn2 upper bound for any n.

Next, we define a polynomial-time algorithm ๐–ฏ๐–บ๐—‹โข(1(n)) which computes a formula that calculates the parity function on n bits and a formula that calculates the negation of the parity function on n bits, if n is a power of 2.

Algorithmย 4 ๐–ฏ๐–บ๐—‹โข(1(n)) outputs Boolean formulas for โŠ•n0 and โŠ•n1 when n is a power of 2.
Input :ย 1(n) for some nโ‰ฅ1.
1 Let kโ‰œ|nโˆ’1|. If nโ‰ 2k (n is not a power of 2), then return โ€œerrorโ€;
// F will compute the parity function, while Fยฏ will compute its negation
2 ifย k=0ย then
3โ€‚ย โ€ƒDefine F to be the formula with one leaf x1 and Fยฏ to be the formula with one leaf ยฌx1.
4 else ifย kโ‰ฅ1ย then
โ€‚ย โ€ƒ // Construct a pair (F,Fยฏ) of formulas on input bits x1,โ€ฆ,x2k as follows:
5โ€‚ย โ€ƒ Let (F1,F1ยฏ)โ‰œ๐–ฏ๐–บ๐—‹โข(1n/2), and define a corresponding pair (F2,F2ยฏ):
6โ€‚ย โ€ƒ In F2 and Fยฏ2, relabel the leaves by putting x2kโˆ’1+i instead of xi for every i=1,โ€ฆ,2kโˆ’1;
7โ€‚ย โ€ƒ Now let Fโ‰œ(F1โˆจF2)โˆง(Fยฏ1โˆจFยฏ2) and Fยฏโ‰œ(F1โˆงF2)โˆจ(Fยฏ1โˆงFยฏ2).
8 end if
return (F,Fยฏ).
Lemma 15.

If n is a power of 2, the algorithm ๐–ฏ๐–บ๐—‹โข(1(n)) correctly outputs two formulas (F,Fยฏ) of size n2 which calculate the parity function and its negation, provably in ๐–ฒ21โข(๐–ฏ๐–ต).

Proof.

We split the proof of the correctness for the algorithm ๐–ฏ๐–บ๐—‹โข(1(n)) into 3 properties:

  1. 1.

    ฯ•1โข(n)โ‰œF,Fยฏโˆˆ๐–ต๐– ๐–ซ๐–จ๐–ฃ๐–ฅ๐–ฎ๐–ฑ๐–ฌโข(n), where ๐–ต๐– ๐–ซ๐–จ๐–ฃ๐–ฅ๐–ฎ๐–ฑ๐–ฌโข(n) is the set of formulas on n variables;

  2. 2.

    ฯ•2โข(n)โ‰œ๐–ฒ๐—‚๐—“๐–พโข(F)=๐–ฒ๐—‚๐—“๐–พโข(Fยฏ)=n2;

  3. 3.

    ฯ•3โข(n)โ‰œโˆ€xโข|x|โ‰คnโ†’๐–ค๐—๐–บ๐—…โข(F,x)=โŠ•n0(x)โˆง๐–ค๐—๐–บ๐—…โข(Fยฏ,x)=โŠ•n1(x).

For now we only care about the case that n is a power of 2, so we prove these properties conditionally (equivalently we prove (n=(nโˆ’1)โข#โข1)โ†’ฯ•โข(n)).777It is easy to check that this is true if and only if n is a power of 2. That is why it suffices to use polynomial induction on n, which is available in ๐–ฒ21, since our formulas are at most ฮ 1b.

We skip the proof of ฯ•1, which is proven by simple induction as below, using the fact that if F1,F2 are formulas then F1โˆงF2 and F1โˆจF2 are also formulas.

Property 2: ๐—ฆ๐Ÿ๐ŸโŠขฯ•๐Ÿโข(๐’).

For the base case, ฯ•2โข(1), we have k=0, which means that the output (F,Fยฏ)โ‰œ๐–ฏ๐–บ๐—‹โข(11) will be two formulas with one leaf each, hence

๐–ฒ๐—‚๐—“๐–พโข(F)=๐–ฒ๐—‚๐—“๐–พโข(Fยฏ)=1.

For the induction step, we need ๐–ฒ21โŠขโˆ€nโขฯ•2โข(โŒŠn/2โŒ‹)โ†’ฯ•2โข(n). If n is not a power of 2, then the statement is true by default. In the case of n being a power of 2, we fix k=|nโˆ’1| and we want to prove equivalently:

๐–ฒ21โŠขฯ•2โข(2kโˆ’1)โ†’ฯ•2โข(2k).

Assume that ฯ•2โข(2kโˆ’1)โ‰กฯ•2โข(n/2) holds. From Line 8 we have that

F=(F1โˆจF2)โˆง(Fยฏ1โˆจFยฏ2)โขย andย โขFยฏ=(F1โˆงF2)โˆจ(Fยฏ1โˆงFยฏ2), (8)

where (F1,F1ยฏ) and (F2,F2ยฏ) are copies of ๐–ฏ๐–บ๐—‹โข(1n/2). From the induction hypothesis, this means that ๐–ฒ๐—‚๐—“๐–พโข(F1)=๐–ฒ๐—‚๐—“๐–พโข(F1ยฏ)=๐–ฒ๐—‚๐—“๐–พโข(F2)=๐–ฒ๐—‚๐—“๐–พโข(F2ยฏ)=(n/2)2=22โข(kโˆ’1). Therefore, from (Equation 8) and the properties of the function ๐–ฒ๐—‚๐—“๐–พ, we get

๐–ฒ๐—‚๐—“๐–พโข(F)=๐–ฒ๐—‚๐—“๐–พโข(F1)+๐–ฒ๐—‚๐—“๐–พโข(F1ยฏ)+๐–ฒ๐—‚๐—“๐–พโข(F2)+๐–ฒ๐—‚๐—“๐–พโข(F2ยฏ)=4โ‹…22โข(kโˆ’1)=22โขk=n2.

Similarly for Fยฏ, which means that ฯ•2โข(2k)โ‰กฯ•2โข(n) holds. This completes the proof of the induction for ฯ•2.

Property 3: ๐—ฆ๐Ÿ๐ŸโŠขฯ•๐Ÿ‘โข(๐’).

Here the base case is trivial: for Fโ‰œx1 and xโˆˆ{0,1}, then ๐–ค๐—๐–บ๐—…โข(F,x)=x=โŠ•10(x). Similarly for Fยฏ.

For the induction step, we assume as above that n=2k and we want to prove:

๐–ฒ21โŠขฯ•3โข(2kโˆ’1)โ†’ฯ•3โข(2k).

We assume that ฯ•2โข(2kโˆ’1)โ‰กฯ•2โข(n/2) holds and we write F in the form

F=(F1โˆจF2)โˆง(Fยฏ1โˆจFยฏ2)โขย andย โขFยฏ=(F1โˆงF2)โˆจ(Fยฏ1โˆงFยฏ2),

where (F1,F1ยฏ) and (F2,F2ยฏ) are copies of ๐–ฏ๐–บ๐—‹โข(1n/2). Therefore, instead of ๐–ค๐—๐–บ๐—…โข(F,x), we can calculate

๐–ค๐—๐–บ๐—…โข((F1โˆจF2)โˆง(Fยฏ1โˆจFยฏ2),x).

We need to prove that ๐–ค๐—๐–บ๐—…โข(F,x)=โŠ•n0(x) for all x with |x|โ‰คn. So, taking one such x we can split its binary representation into two parts x1,x2 with lengths |x1|,|x2|โ‰คn/2, such that x=(x2โขx1)b=x1+2n/2โขx2.

The input to subformulas F2,F2ยฏ from the definition are the bits x2kโˆ’1+i for i=1,โ€ฆ,2kโˆ’1, which means that their input is x2. Similarly, the input to subformulas F1,F1ยฏ is x1. Hence, we can define

b1โ‰œ๐–ค๐—๐–บ๐—…โข(F1,x1) b3โ‰œ๐–ค๐—๐–บ๐—…โข(F1ยฏ,x1)
b2โ‰œ๐–ค๐—๐–บ๐—…โข(F2,x2) b4โ‰œ๐–ค๐—๐–บ๐—…โข(F2ยฏ,x2)

From the properties of the evaluation function and the form of F, we can prove in ๐–ฒ21 that ๐–ค๐—๐–บ๐—…โข(F,x)=(b1โˆจb2)โˆง(b3โˆจb4), where the symbols โˆจ,โˆง are used as Boolean symbols here.

However, since |x1|,|x2|โ‰คn/2 and (F1,F1ยฏ)=(F2,F2ยฏ)=๐–ฏ๐–บ๐—‹โข(1n/2), from the induction hypothesis we get that

b1=โŠ•0(x1) b3=โŠ•1(x1)=1โˆ’b1
b2=โŠ•0(x2) b4=โŠ•1(x2)=1โˆ’b2

Next, it is easy to prove by checking all the 4 cases that

โˆ€b1,b2โˆˆ{0,1}โข(b1โˆจb2)โˆง((1โˆ’b1)โˆจ(1โˆ’b2))=b1โŠ•b2,

and as a result, we get

๐–ค๐—๐–บ๐—…โข(F,x)=(โŠ•0(x1))โŠ•(โŠ•0(x2))=โŠ•0(x2โขx1)=โŠ•0(x)

by the properties of the parity function. Similarly, we can prove that ๐–ค๐—๐–บ๐—…โข(Fยฏ,x)=โŠ•n1(x), which concludes the induction. โ—€

For the general case, we use a simple padding argument. For a number n, we can define the number

n~โ‰œ(nโˆ’1)โข#โข1.

This number is the least power of 2 that is greater or equal to n. It is easy to see that

๐–ฏ๐–ต1โŠขnโ‰คn~<2โขn.

If we replace ๐–ฏ๐–บ๐—‹๐–ฅ๐—ˆ๐—‹๐—†โข(1(n)) by ๐–ฏ๐–บ๐—‹1โข(1n~) (the first coordinate of ๐–ฏ๐–บ๐—‹(1n~)), we have by the above lemma that

  1. 1.

    ๐–ฒ๐—‚๐—“๐–พโข(๐–ฏ๐–บ๐—‹๐–ฅ๐—ˆ๐—‹๐—†โข(1(n)))=๐–ฒ๐—‚๐—“๐–พโข(๐–ฏ๐–บ๐—‹1โข(1n~))=n~2<(2โขn)2=sโข(n).

  2. 2.

    For all x with |x|โ‰คn, we have |x|โ‰คn~, which by the lemma gives us

    ๐–ค๐—๐–บ๐—…โข(๐–ฏ๐–บ๐—‹๐–ฅ๐—ˆ๐—‹๐—†โข(1n),x)=๐–ค๐—๐–บ๐—…โข(๐–ฏ๐–บ๐—‹1โข(1n~),x)=โŠ•n~0(x).

    Since |x|โ‰คn, we also have โŠ•n~0(x)=โŠ•n0(x). Consequently, we have ๐–ค๐—๐–บ๐—…โข(๐–ฏ๐–บ๐—‹๐–ฅ๐—ˆ๐—‹๐—†โข(1n),x)=โŠ•n0(x).

These two together show that ๐–ฏ๐–ต1โŠข๐–ฅ๐–ด๐–กsโ€ฒ and the proof is complete. โ—€

4.3 Formula Size Hierarchy

In this section, we provide the proof of Theorem 3.

Theorem 16 (Theorem 3).

Consider rationals a>2 and b=3/2, and let n0 be a large enough positive integer. Then

๐–ฏ๐–ต1โŠข๐–ฅ๐–ฒ๐–งโข[a,b,n0].
Proof.

We combine the results of Section 4.1 and Section 4.2. We argue in ๐–ฏ๐–ต1. From Theorem 11, we get that

โˆ€nโˆˆ๐–ซ๐—ˆ๐—€โขโˆ€Fโˆˆ๐–ฅ๐–ฎ๐–ฑ๐–ฌ๐–ด๐–ซ๐– โข[n3/2]โขโˆƒxโข(|x|โ‰คnโˆงFโข(x)โ‰ โŠ•n(x)), (9)

and from Theorem 14, we have that

โˆ€nโˆˆ๐–ซ๐—ˆ๐—€โขโˆƒGโˆˆ๐–ฅ๐–ฎ๐–ฑ๐–ฌ๐–ด๐–ซ๐– โข[4โขn2]โขโˆ€xโข(|x|โ‰คnโ†’Gโข(x)=โŠ•n(x)).

We can eliminate the constant 4 from the latter using that a>2 and choosing a large enough n0, such that for every nโ‰ฅn0, naโ‰ฅ4โขn2 (provably in ๐–ฏ๐–ต1). Consequently,

โˆ€nโ‰ฅn0โˆˆ๐–ซ๐—ˆ๐—€โขโˆƒGโˆˆ๐–ฅ๐–ฎ๐–ฑ๐–ฌ๐–ด๐–ซ๐– โข[na]โขโˆ€xโข(|x|โ‰คnโ†’Gโข(x)=โŠ•n(x)). (10)

Finally, combining Equation 9 and Equation 10, we get that

โˆ€nโ‰ฅn0โˆˆ๐–ซ๐—ˆ๐—€โขโˆƒGโˆˆ๐–ฅ๐–ฎ๐–ฑ๐–ฌ๐–ด๐–ซ๐– โข[na]โขโˆ€Fโˆˆ๐–ฅ๐–ฎ๐–ฑ๐–ฌ๐–ด๐–ซ๐– โข[n3/2]โขโˆƒxโข(|x|โ‰คnโˆงFโข(x)โ‰ Gโข(x)),

which is exactly the formula size hierarchy, ๐–ฅ๐–ฒ๐–งโข[a,b,n0], for our choice of parameters a>2 and b=3/2. โ—€

References

  • [1] Sanjeev Arora and Boaz Barak. Computational Complexity โ€“ A Modern Approach. Cambridge University Press, 2009. URL: http://www.cambridge.org/catalogue/catalogue.asp?isbn=9780521424264.
  • [2] Samuelย R. Buss. Bounded Arithmetic. Bibliopolis, 1986.
  • [3] Samuelย R. Buss. Bounded arithmetic and propositional proof complexity. In Logic of Computation, pages 67โ€“121. Springer Berlin Heidelberg, 1997.
  • [4] Lijie Chen, Jiatu Li, and Igorย C. Oliveira. Reverse mathematics of complexity lower bounds. In Symposium on Foundations of Computer Science (FOCS), 2024.
  • [5] Lijie Chen, Dylanย M. McKay, Codyย D. Murray, and R.ย Ryan Williams. Relations and equivalences between circuit lower bounds and Karp-Lipton theorems. In Computational Complexity Conference (CCC), pages 30:1โ€“30:21, 2019. doi:10.4230/LIPIcs.CCC.2019.30.
  • [6] Alan Cobham. The intrinsic computational difficulty of functions. Proc. Logic, Methodology and Philosophy of Science, pages 24โ€“30, 1965.
  • [7] Stephenย A. Cook. Feasibly constructive proofs and the propositional calculus (preliminary version). In Symposium on Theory of Computing (STOC), pages 83โ€“97, 1975. doi:10.1145/800116.803756.
  • [8] Stephenย A. Cook and Phuong Nguyen. Logical Foundations of Proof Complexity. Cambridge University Press, 2010. doi:10.1017/CBO9780511676277.
  • [9] Russell Impagliazzo and Avi Wigderson. Pโ€‰=โ€‰BPP if E requires exponential circuits: Derandomizing the XOR lemma. In Symposium on the Theory of Computing (STOC), pages 220โ€“229, 1997. doi:10.1145/258533.258590.
  • [10] Emil Jeล™รกbek. Dual weak pigeonhole principle, boolean complexity, and derandomization. Annals of Pure and Applied Logic, 129(1-3):1โ€“37, 2004. doi:10.1016/j.apal.2003.12.003.
  • [11] Emil Jeล™รกbek. Weak pigeonhole principle and randomized computation. PhD thesis, Charles University in Prague, 2005.
  • [12] Emil Jeล™รกbek. The strength of sharply bounded induction. Mathematical Logic Quarterly, 52(6):613โ€“624, 2006. doi:10.1002/malq.200610019.
  • [13] Emil Jeล™รกbek. Approximate counting in bounded arithmetic. Journal of Symbolic Logic, 72(3):959โ€“993, 2007. doi:10.2178/jsl/1191333850.
  • [14] Stasys Jukna. Boolean Function Complexity: Advances and Frontiers. Springer, 2012. doi:10.1007/978-3-642-24508-4.
  • [15] Ravi Kannan. Circuit-size lower bounds and non-reducibility to sparse sets. Information and Control, 55(1):40โ€“56, 1982. doi:10.1016/S0019-9958(82)90382-5.
  • [16] Jan Krajรญฤek. Bounded Arithmetic, Propositional Logic, and Complexity Theory. Encyclopedia of Mathematics and its Applications. Cambridge University Press, 1995.
  • [17] Jan Krajรญฤek. Small circuits and dual weak PHP in the universal theory of p-time algorithms. ACM Transactions on Computational Logic (TOCL), 22(2):1โ€“4, 2021. doi:10.1145/3446207.
  • [18] Jan Krajรญฤek and Igorย C. Oliveira. Unprovability of circuit upper bounds in Cookโ€™s theory PV. Logical Methods in Computer Science, 13(1), 2017. doi:10.23638/LMCS-13(1:4)2017.
  • [19] Jan Krajรญฤek, Pavel Pudlรกk, and Gaisi Takeuti. Bounded arithmetic and the polynomial hierarchy. Annals of Pure and Applied Logic, 52(1-2):143โ€“153, 1991. doi:10.1016/0168-0072(91)90043-L.
  • [20] Jan Krajรญฤek. Proof Complexity. Encyclopedia of Mathematics and its Applications. Cambridge University Press, 2019. doi:10.1017/9781108242066.
  • [21] Alexis Maciel, Toniann Pitassi, and Alanย R. Woods. A new proof of the weak pigeonhole principle. Journal of Computer and System Sciences, 64(4):843โ€“872, 2002. doi:10.1006/jcss.2002.1830.
  • [22] Moritz Mรผller and Jรกn Pich. Feasibly constructive proofs of succinct weak circuit lower bounds. Annals of Pure and Applied Logic, 171(2), 2020. doi:10.1016/j.apal.2019.102735.
  • [23] Igorย C. Oliveira. Meta-mathematics of computational complexity theory. Preprint, 2024.
  • [24] Claudeย E. Shannon. The synthesis of two-terminal switching circuits. The Bell System Technical Journal, 28(1):59โ€“98, 1949. doi:10.1002/j.1538-7305.1949.tb03624.x.
  • [25] Bellaย A. Subbotovskaya. Realization of linear functions by formulas using +, โ‹…, โˆ’. In Soviet Math. Dokl, 1961.