On the Existential Theory of the Reals Enriched with Integer Powers of a Computable Number
Abstract
This paper investigates , that is the extension of the existential theory of the reals by an additional unary predicate for the integer powers of a fixed computable real number . If all we have access to is a Turing machine computing , it is not possible to decide whether an input formula from this theory is satisfiable. However, we show an algorithm to decide this problem when
-
is known to be transcendental, or
-
is a root of some given integer polynomial (that is, is algebraic).
In other words, knowing the algebraicity of suffices to circumvent undecidability. Furthermore, we establish complexity results under the proviso that enjoys what we call a polynomial root barrier. Using this notion, we show that the satisfiability problem of is
-
in ExpSpace if is an algebraic number, and
-
in 3Exp if is a logarithm of an algebraic number, Euler’s , or the number , among others.
To establish our results, we first observe that the satisfiability problem of reduces in exponential time to the problem of solving quantifier-free instances of the theory of the reals where variables range over . We then prove that these instances have a small witness property: only finitely many integer powers of must be considered to find whether a formula is satisfiable. Our complexity results are shown by relying on well-established machinery from Diophantine approximation and transcendental number theory, such as bounds for the transcendence measure of numbers.
As a by-product of our results, we are able to remove the appeal to Schanuel’s conjecture from the proof of decidability of the entropic risk threshold problem for stochastic games with rational probabilities, rewards and threshold [Baier et al., MFCS, 2023]: when the base of the entropic risk is and the aversion factor is a fixed algebraic number, the problem is (unconditionally) in Exp.
Keywords and phrases:
Theory of the reals with exponentiation, decision procedures, computabilityCopyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Computing methodologies Symbolic and algebraic algorithmsAcknowledgements:
We would like to thank Michael Benedikt and Dmitry Chistikov for the insightful discussions on the paper [Avigad and Yin, Theor. Comput. Sci., 2007], and Andrew Scoones and James Worrell for providing guidance through the number theory literature. We are also grateful to the anonymous referees for comments and corrections.Funding:
This work is part of a project that is partially funded by the Madrid Regional Government (César Nombela grant 2023-T1/COM-29001), and by MCIN/AEI/10.13039/501100011033/FEDER, EU (grant PID2022-138072OB-I00).Editors:
Olaf Beyersdorff, Michał Pilipczuk, Elaine Pimentel, and Nguyễn Kim ThắngSeries and Publisher:

1 Introduction
Tarski’s exponential function problem asks to determine the decidability of the validity problem from the first-order (FO) theory of the structure . This theory, hereinafter denoted , extends the FO theory of the reals (a.k.a. Tarski arithmetic) with the exponential function . A celebrated result by Macintyre and Wilkie establishes an affirmative answer to Tarski’s problem conditionally to the truth of Schanuel’s conjecture, a profound conjecture from transcendental number theory [24]. Recent years have seen this result being used as a black-box to establish conditional decidability results for numerous problems stemming from dynamical systems [14, 2] automata theory [15, 13], neural networks verification [19, 21], the theory of stochastic games [5], and differential privacy [7].
As it is often the case when appealing to a result as a black-box, some of the computational tasks resolved by relying on the work in [24] do not require the full power of . Consequently, it is natural to ask whether some of these tasks can be tackled without relying on unproven conjectures, perhaps by reduction to tame fragments or variants of . A few results align with this question:
-
In the papers [3, 1, 28], Achatz, Anai, McCallum and Weispfenning introduce a procedure to decide sentences of the form , where is a formula from Tarski arithmetic, and is any analytic and strongly transcendental function (see [28, Section 2] for the precise definition). Since enjoys such properties, this result shows a non-trivial fragment of that is unconditionally decidable. The procedure is implemented in the tool Redlog [16]. No complexity bound is known.
-
In [17], van den Dries proves decidability of the extension of Tarski arithmetic with the unary predicate interpreted as the set , i.e., the set of all integer powers of . While this result is achieved by model-theoretic arguments, an effective quantifier elimination procedure was later given by Avigad and Yin [4]. Their procedure runs in Tower, and in fact it requires non-elementary time already for the elimination of a single quantified variable. The choice of the base for the integer powers is somewhat arbitrary: in [18], the decidability is extended to any fixed algebraic number (i.e., a number that is root of some polynomial equation; see Section 3 for background knowledge on computable, algebraic and transcendental numbers), and in fact Avigad and Yin’s procedure is also effective for any such number. Considering any two satisfying yields undecidability, as shown by Hieronymi in [20].
When comparing the two lines of work discussed above, it becomes apparent that there is a balance to be struck between reasoning about transcendental numbers, the path followed by the first set of works, and developing algorithms that are well-behaved from a complexity standpoint, the path taken in particular in [4]. Our aim with this paper is to somewhat bridge this gap: we add to the second line of work by studying predicates for integer powers of bases that may be transcendental, all the while maintaining complexity upper bounds.
From now on, we write to denote the existential fragment of the FO theory of the structure , where is a fixed real number. In this paper, we examine the complexity of deciding the satisfiability problem of for different choices of the number . The following theorem summarises our results.
Theorem 1.
Fix a real number . The satisfiability problem for is
-
1.
in ExpSpace whenever is an algebraic number;
-
2.
in 3Exp if ;
-
3.
decidable whenever is a computable transcendental number.
Theorem 1 has a catch, however. To be effective, the algorithm for deciding requires:
In summary, Theorem 1 shows that is decidable for every fixed computable number , as long as it is known whether is algebraic or transcendental, and in the former case having access to a canonical representation of .
The results in Theorem 1 are obtained by (i) reducing the satisfiability problem for to the problem of solving instances of where all variables range over , and (ii) showing that a solution over can be found by only looking at a “small” set of integer powers of (a small witness property). In proving Step (ii), we also obtain a quantifier elimination procedure for sentences of , that is formulae where no variable occurs free. This procedure provides a partial answer to the question raised in [4] regarding the complexity of removing a single existential variable in Tarski arithmetic extended with : within sentences of the existential fragment, such an elimination step can be performed in elementary time.
Coming back to our initial question on identifying computational tasks that might not need the full power of , as a by-product of our results we show that the entropic risk threshold problem for stochastic games studied by Baier, Chatterjee, Meggendorfer and Piribauer [5] is unconditionally decidable in Exp even when the base of the entropic risk is (or algebraic) and the aversion factor is any (fixed) algebraic number.
2 Approaching complexity bounds with root barriers
Theorems 1.1 and 1.2 are instances of a more general result concerning classes of computable real numbers. To properly introduce this result, it is beneficial to go back to Macintyre and Wilkie’s work on . The exact statement made in [24] is that is decidable as soon as the following computational problem, implied by Schanuel’s conjecture, is established:
Conjecture 2.
There is a procedure that for input , with , returns a positive integer with the following property: for every non-singular111A solution of is said to be non-singular whenever the determinant of the Jacobian matrix is, once evaluated at , non-zero. We give this definition only for completeness of the discussion on 2. It is not used in this paper. solution of the system of equalities , either or .
Above, is the set of all -variate exponential-polynomials with integer coefficients. As remarked in [24], is guaranteed to exist by Khovanskii’s theorem [22], hence the crux of the problem concerns how to effectively compute such a number starting from and . The purpose of the dichotomy “either or ” is in part to resolve what is a fundamental problem when working with computable real numbers. Let to be a vector of computable numbers. Consider the problem of establishing, given in input a polynomial with integer coefficients, whether is positive, negative, or zero. This polynomial sign evaluation task is a well-known undecidable problem. Intuitively, the undecidability arises from the possibility that any approximation of might yield , even though . However, when working under the hypothesis that either or , the problem becomes decidable: it suffices to compute an approximation enjoying , and then check whether . If the answer is positive, then , otherwise and have the same sign.
The same issue occurs in : under the sole hypothesis that is computable, we cannot even check if holds. However, what we can do is to draw some inspiration from Conjecture 2, and introduce as a further assumption the existence of what we call a root barrier of . Below, , and given a polynomial we write for its degree and for its height (i.e., the maximum absolute value of a coefficient of ).
Definition 3.
A function is a root barrier of if for every non-constant polynomial with integer coefficients, either or .
To avoid non-elementary bounds on the runtime of our algorithms, we focus on computable numbers having root barriers that are polynomial expressions of the form , where are some positive constants and is the ceiling function. We call such functions polynomial root barriers, highlighting the fact that then in Definition 3 is bounded by a polynomial in the bit size of . The aforestated Theorem 1.2 is obtained by instantiating the following Theorem 4.2 to natural choices of .
Theorem 4.
Let be a real number computable by a polynomial-time Turing machine, and let be a root barrier of , for some .
-
1.
If , then the satisfiability problem for is in 2Exp.
-
2.
If , then the satisfiability problem for is in 3Exp.
3 Preliminaries
In this section, we fix our notation, introduce background knowledge on computable, algebraic and transcendental numbers, and define the existential theory .
Sets, vectors, and basic functions.
Given a finite set , we write for its cardinality. Given , we write for the closed interval . We use parenthesis and for open intervals, hence writing, e.g., for the set . We write for the set of integers . Given , , and a binary relation (e.g., ), we define . The endpoints of are its supremum and infimum, if they exist. For instance, the endpoints of the interval are the numbers and , while the endpoints of are the numbers and , where stands for the floor function.
Given a positive real number with , we write for the logarithm function of base . We abbreviate and as and , respectively.
Unless stated explicitly, all integers encountered by our algorithms are encoded in binary; note that can be represented using bits. Similarly, each rational is encoded as a ratio of two coprime integers and encoded in binary, with .
Integer polynomials.
An integer polynomial in variables is an expression , where and for every and . In the context of algorithms, we assume the coefficients to be given in binary encoding, and the exponents to be given in unary encoding. We rely on the following notions:
-
The height of , denoted , is defined as .
-
The degree of , denoted , is defined as .
-
Given , the partial degree of in , denoted , is .
-
The bit size of , denoted , is defined as .
Computable numbers, and algebraic and transcendental numbers.
A real number is said to be computable whenever there is a (deterministic) Turing machine that given in input written in unary (e.g., over the alphabet ) returns a rational number (represented as described above) such that . We thus have , and for this reason is said to be computed by (or computes ). The computable numbers form a field [31]; we will later need the following two statements regarding their closure under product and reciprocal.
Lemma 5.
Given Turing machines and computing reals and , one can construct a Turing machine computing . If and run in polynomial time, then so does .
Lemma 6.
Given a Turing machine computing a non-zero real number , one can construct a Turing machine computing . If runs in polynomial time, then so does .
A real number is algebraic if it is a root of some univariate non-zero integer polynomial. Otherwise, is transcendental. We often denote algebraic numbers by . Throughout the paper, we consider the following canonical representation: an algebraic number is represented by a triple where is a non-zero integer polynomial and are (representations of) rational numbers such that is the only root of belonging to .
The existential theory .
Let be a computable real number. We consider the structure extending the signature of the FO theory of the reals with the constant and the unary integer power predicate interpreted as . Formulae from the existential theory of this structure, denoted , are built from the grammar
where belongs to , the argument of the predicate is a variable, and is an integer polynomial involving and variables . For convenience of notation, is in this context seen as a variable of the polynomial , so that we can rely on the previously defined notions of height, degree and bit size. We remark that, then, is independent of whereas depends on the integers occurring as powers of . The bit size of a formula , denoted as , is the number of bits required to write down (where is stored symbolically, using a constant number of symbols). Similarly, we write and for the maximum degree and height of polynomials occurring in , respectively.
The semantics of formulae from is standard; it is the one of the FO theory of the reals, plus a rule stating that is true whenever evaluates to a number in . The grammar above features disjunctions (), conjunctions (), true () and false (), but it does not feature negation () on top of atomic formulae. This restriction is w.l.o.g.: is equivalent to the formula stating that is either non-positive or strictly between two successive integer powers of , whereas and are equivalent to , and , respectively. We still sometimes write negations in formulae, but these occurrences should be seen as shortcuts. The grammar also avoids polynomials in the scope of , since is equivalent to . We write whenever entails .
4 An algorithm for deciding
Fix a computable number that is either transcendental or has a polynomial root barrier. In this section, we discuss our procedure for deciding the satisfiability of formulae in . For simplicity, we assume for now . The general case of is handled in Section 4.5.
The pseudocode of the procedure is given in Algorithm 1. To keep it as simple as possible, we use nondeterminism in line 8 instead of implementing, e.g., a routine backtracking algorithm. The procedure assumes the input formula to be quantifier-free (this is without loss of generality, since is an existential theory), and it is split into three steps, which we discuss in the forthcoming three subsections.
4.1 Step I (lines 1–6): reducing the variables to integer powers of
The first step reduces the problem of finding a solution over to the problem of finding a solution over . Below, we denote by the existential theory of the structure . Formulae from this theory are built from the grammar of , except they do not feature predicates , as they are now trivially true.
For reducing to , we observe that every can be factored as where belongs to and is either (if ) or it belongs, in absolute value, to the interval . In the case of , this factorisation is unique, and corresponds to the largest element of that is less or equal to the absolute value of , i.e., . The procedure uses this fact to replace every occurrence of a variable in the input formula with two fresh variables and (see the for loop of line 1), where is set to satisfy either or (the latter is short for the formula ), and is (implicitly) assumed to belong to . This allows to replace all occurrences of the predicate with (line 3). We obtain in this way an equivalent formula from the existential theory of the reals, but where the variables are assumed to range over .
After the updates performed by the for loop, the procedure eliminates the variables by appealing to a quantifier elimination procedure for the FO theory of the reals, named RealQE in the pseudocode. We remind the reader that a quantifier elimination procedure is an algorithm that, from an input (quantified) formula, produces an equivalent quantifier-free formula. Since such a procedure preserves formula equivalence, we can use it to eliminate even if are assumed to range over . The constant appearing in the formula is treated as an additional free variable by RealQE. The output formula belongs to , as required. This concludes the first step of the algorithm.
To perform the quantifier elimination step, we rely on the quantifier elimination procedure for the (full) FO theory of the reals developed by Basu, Pollack and Roy [8]. This procedure achieves the theoretically best-known bounds for the output formula, not only for arbitrary quantifier alternation but also for the existential fragment (i.e., when taking below).
Theorem 7 ([8, Theorem 1.3.1]).
There is an algorithm with the following specification:
- Input:
-
A formula from the first-order theory of .
- Output:
-
A quantifier-free formula equivalent to ,
where every is from .
Suppose the input formula to be of the form , where , every is or , and is a quantifier-free formula with atomic formulae satisfying and . Then, the output formula satisfies
and the algorithm runs in time .
4.2 Step II (lines 7 and 8): solving
The second step of the procedure searches for a solution to the quantifier-free formula in line 6. For every variable in , the algorithm guesses an integer , encoded in unary, from a finite set . Implicitly, this guess is setting . The next proposition shows that can be computed from and the base , i.e., has a small witness property.
Proposition 8.
Fix . There is an algorithm with the following specification:
- Input:
-
A quantifier-free formula from .
- Output:
-
A finite set such that is satisfiable if and only if
has a solution in the set .
To be effective, the algorithm requires knowing either that is a computable transcendental number, or two integers for which is a root barrier of . In the latter case, the elements in are bounded in absolute value by , where and .
We defer a sketch of the proof of Proposition 8 (perhaps the main technical contribution of the paper) to Section 5. Note that the bound on given in the final statement of Proposition 8 is in general triply exponential in , but it becomes doubly exponential if the root barrier is such that . The two statements in Theorem 4 stem from this distinction.
4.3 Step III (line 9): polynomial sign evaluation
The last step of the procedure checks if the assignment is a solution to . Observe that is a Boolean combination of polynomial (in)equalities , where may occur with negative powers (as some may be negative). This is unproblematic, as one can make all powers non-negative by rewriting each (in)equality as , where is the smallest negative integer occurring as a power of in (or if such an integer does not exist). After this small update, line 9 boils down to determining the sign that each polynomial in the formula has when evaluated at . This enables us to simplify all inequalities to either or , to then return or depending on the Boolean structure of . Let us thus focus on the required sign evaluation problem, which we denote by . Its specification is the following:
- Input:
-
A univariate integer polynomial .
- Output:
-
The symbol from such that .
Solving when is transcendental.
It is a standard fact that becomes solvable whenever is any computable transcendental number. Indeed, in this case must be different from , and one can rely on the fast-convergence sequence of rational numbers to find such that is guaranteed to be less than . The sign of then agrees with the sign of , and the latter can be easily computed. In general, the asymptotic running time of this algorithm cannot be bounded.
Solving when has a (polynomial) root barrier.
A similar algorithm as the one given for transcendental numbers can be defined for numbers with a polynomial root barrier; and in this case its running time can be properly analysed. The pseudocode of such a procedure is given in Algorithm 2, and it should be self-explanatory. We stress that running this algorithm requires access to the root barrier and the Turing machine .
Lemma 9.
Algorithm 2 respects its specification.
Proof sketch.
If , then and have the same sign, because is an upper bound to the absolute value of every root of [30, Chapter 8]. If instead, by studying the derivative of in the interval containing , one finds , with defined as in line 1. Then, either and , or and and have the same sign.
When is a polynomial root barrier, the integer from line 1 can be written in unary using polynomially many digits with respect to . This yields the following lemma.
Lemma 10.
Let be a number computed by a Turing machine and having a polynomial root barrier . If runs in polynomial time, then so does Algorithm 2.
4.4 Correctness and running time of Algorithm 1
Since lines 1–5 preserve the satisfiability the input formula, by chaining Theorem 7, Proposition 8, and Lemma˜9, we conclude that Algorithm 1 is correct.
Lemma 11.
Algorithm 1 respects its specification.
This establishes Theorem 1.3 restricted to bases . Analogously, when is a number with a polynomial root barrier , by pairing Lemma 11 with a complexity analysis of Algorithm 1, one shows Theorem 4 restricted to bases . In performing this analysis, we observe that the bottleneck of the procedure is given by the guesses of the integers performed lines 7 and 8. The absolute value of these integers is either doubly or triply exponential in the size of the input formula , depending on whether . A deterministic implementation of the procedure can iterate through all their values in doubly or triply exponential time.
4.5 Handling small bases
We now extend our algorithm so that it works assuming instead of just , hence completing the proofs of Theorem 1.3 and Theorem 4. Let be computable and either transcendental or with a polynomial root barrier. First, observe that we can call the procedure for on input in order to check if , or .
If , we replace in the input formula every occurrence of with , obtaining a formula from the existential theory of the reals, which we can solve by Theorem 7. If , we call Algorithm 1. Suppose then . In this case, we replace every occurrence of with , and opportunely multiply by integer powers of both sides of polynomials inequalities in order to eliminate the constant . In this way, we obtain from an equivalent formula in . Since , we can now call Algorithm 1; provided we first establish the properties of required to run this algorithm. These properties indeed hold:
-
1.
If is transcendental, then so is . This is because the algebraic numbers form a field.
-
2.
If has a polynomial root barrier , then is also a root barrier of . Indeed, consider an integer polynomial with height , and assume . Since is a root barrier of , we have , which in turns implies that , where the last inequality uses .
-
3.
From a Turing machine computing , we can construct a Turing machine computing . Lemma 6 gives this construction, and shows that runs in polynomial time if so does .
5 Finding solutions over integer powers of
In this section we give a sketch of the proof of Proposition 8, i.e., we show that has a small witness property. The proof is split into two parts:
-
1.
We first give a quantifier-elimination-like procedure for . Instead of targeting formula equivalence, we only focus on equisatisfiability: given a formula , with quantifier-free, the procedure derives an equisatisfiable quantifier-free formula . Preserving equisatisfiability, instead of equivalence, is advantageous complexity-wise. (Our procedure preserves equivalence for sentences, as these are equivalent to or .)
-
2.
By analysing our quantifier elimination procedure, we derive the bounds on the set from Proposition 8 that are required to complete the proof. This step is similar to the quantifier relativisation technique for Presburger arithmetic (see, e.g., [34, Theorem 2.2]).
Some of the core mechanisms of our quantifier-elimination-like procedure follow observations done by Avigad and Yin for their (equivalence-preserving) quantifier elimination procedure [4]. Apart from targeting equisatisfiability, a key property of our procedure is that it does not require appealing to a quantifier elimination procedure for the theory of the reals. The procedure in [4] calls such a procedure once for each eliminated variable instead.
5.1 Quantifier elimination
Fix a real number . In this section, we rely on some auxiliary notation and definitions:
-
We often see an integer polynomial as a polynomial in variables having as coefficients univariate integer polynomials on , i.e., , where the notation is short for the monomial , with .
-
We sometimes write polynomial (in)equalities using Laurent polynomials, i.e., polynomials with negative powers. For instance, Lemma 12 below features equalities with monomials where may be a negative integer. Laurent polynomials are just a shortcut for us, as one can opportunely manipulate the (in)equalities to make all powers non-negative (as we did in Section 4.3): a polynomial (in)equality is rewritten as , where (resp. ) is the smallest negative integer occurring as a power of (resp. ) in (or if such a negative integer does not exist). Observe that this transformation does not change the number of monomials nor the height of the polynomial , but it may double the degree of each variable and of .
-
Given a formula , a variable and a Laurent polynomial , we write for the formula obtained from by replacing every occurrence of by , and then updating all polynomial (in)equalities with negative degrees in the way described above.
-
We write for the function mapping to the largest integer power of that is less or equal than , i.e., is the only element of satisfying .
The relation , where is an integer polynomial, is definable in as . To obtain a quantifier elimination procedure, we must first understand what values can take given . The next lemma answers this question.
Lemma 12.
Let , where each is a univariate integer polynomial. In the theory , the formula entails the formula , for some finite set . Moreover:
-
I.
If is a computable transcendental number, there is an algorithm computing from .
-
II.
If has a root barrier , for some , then
with , and .
Proof sketch.
A suitable set can be found as follows. Let be the set of all univariate integer polynomials for which there are , numbers , and integer polynomials such that and
-
1.
the polynomials are recursively defined as
-
2.
the real numbers are all non-zero, and is (strictly) positive,
-
3.
for every , the number belongs to the interval .
Items 1–3 ensure the set to be finite. We define the (finite) set
By induction on , one can prove that any finite set that includes respects the property in the first statement of the lemma. To prove the remaining statements of the lemma (Items (I) and (II)) one shows how to effectively compute an overapproximation of the set . In the case of having a polynomial root barrier, this overapproximation is obtained by bounding the values of , , and , for every .
We now give the high-level idea of the quantifier elimination procedure, which is also depicted in Figure 1. Let be a quantifier-free formula of , and be the variable we want to eliminate. Suppose to evaluate the variables with elements in , hence obtaining a univariate formula . The set of all solutions over the reals of can be decomposed into a finite set of disjoint intervals. (This follows from the o-minimality of the FO theory of the reals [26, Chapter 3.3].) Figure 1 shows these intervals as dashed rectangles. Around the endpoints of these intervals the truth of changes, and therefore for each such endpoint there must be a non-constant polynomial in such that . If an interval with endpoint contains an element of , then it contains one that is “close” to :
-
If is the right endpoint of an interval, at least one among and belongs to the interval. The first case is depicted in Figure 1. The latter case occurs when belongs to but not to the interval.
-
If is the left endpoint of an interval, then of belongs to the interval. The latter case occurs when belongs to and also to the interval.
Note that we have restricted the endpoint to be positive, so that is well-defined. The only case were we may not find such an endpoint is when is true for every . But finding an element of is in this case simple: we can just pick . Since is positive, we can split it into with and (so, ). To obtain quantifier elimination, our goal is then to characterise, symbolically as a finite set of polynomials , the set of all possible values for . In this way, we will be able to eliminate the variable by considering the polynomials , and representing the integer powers of that are “close” to endpoints. The following lemma provides the required characterisation.
Lemma 13.
Let , where each is an integer polynomial, be the set of monomials occurring in some , and . Then,
holds (in the theory ) for some finite set . Moreover:
-
I.
If is a computable transcendental number, there is an algorithm computing from .
-
II.
If has a root barrier , for some , then,
with , and .
Proof sketch.
By following the arguments in [4, Lemma 3.9], one shows that the premise of the entailment in the statement entails a disjunction over formulae of the form
where , with , and . Afterwards, we rely on Lemma 12 to remove the occurrences of from the above formulae, establishing in this way the first statement of the lemma. Items (I) and (II) follow from the analogous items in Lemma 12. To achieve the bounds in Item (II) we also rely on the fact that . This follows from a simple computation, noticing that since is not a root of the polynomial , by the definition of root barrier we have .
By relying on the characterisation, given in Lemma 13, of the values that can take, where is the root of some polynomial, and by applying our previous observation that satisfiability can be witnessed by picking elements of that are “close” to (i.e., the numbers , or ), we obtain the following key lemma.
Lemma 14.
Let be a quantifier-free formula from . Then, is equivalent to
() |
where is the set of all polynomials in featuring , plus the polynomial , and each is the set obtained by applying Lemma 13 to , with and fresh variables.
To eliminate the variable , we now consider each disjunct from Formula ( ‣ 14) and, roughly speaking, substitute with . We do not need however to introduce th roots, as shown in the following lemma.
Lemma 15.
Let be a quantifier-free formula from , with . Let , and . Then, is equivalent to
where , , and is a vector of fresh variables.
Proof sketch.
Consider a solution to the equality . Each evaluates to a number of the form , with and . Since is of the form for some , we must have that is divisible by . Observe that the set in the statement of the lemma contains all possible vectors satisfying this divisibility condition.
At the formula level, consider a vector , and replace in every variable with the term . After this replacement, the equality can be rewritten as , where the division is without remainder. We can therefore substitute with in , eliminating it.
5.2 Quantifier relativisation
Looking closely at how a quantifier-free formula of evolves as we chain Lemmas 14 and 15 to eliminate all variables, we see that the resulting variable-free formula is a finite disjunction of formulae that are obtained from via a sequence of substitutions stemming from Lemma 15. As an example, for a formula in three variables , each is obtained by applying a sequence of substitutions of the form:
We can “backpropagate” these substitutions to the initial variables , associating to each one of them an integer power of . In the above example, we obtain the system
By Lemmas 13, 14, and 15, we can restrict the integers occurring as powers of in the resulting system of substitutions to a finite set. Since the disjunction is finite, this implies that, under the hypothesis that is a computable number that is either transcendental or has a polynomial root barrier, it is possible to compute a finite set witnessing the satisfiability of . That is, the sentence is equivalent to
Proposition 8 follows (in particular, the bound on for the case of with a polynomial root barrier is derived by iteratively applying the bounds in Lemmas 13, 14, and 15).
6 Proof of Theorem 1: classical numbers with polynomial root barriers
In this section, we complete the proof of Theorem 1 by establishing Theorem 1.1 and Theorem 1.2. Following Theorem 4, we discuss natural choices for the base that (i) can be computed with polynomial-time Turing machines and (ii) have polynomial root barriers.
The case of algebraic.
Let be a fixed algebraic number represented by . The following two results (the first one based on performing a dichotomy search to refine the interval ) show that one can construct a polynomial-time Turing machine for , and that has a polynomial root barrier where the integer from Theorem 4 equals .
Lemma 16.
Given an algebraic number represented by , one can construct a polynomial-time Turing machine computing .
Theorem 17 ([10, Theorem A.1]).
Let be a zero of a non-zero integer polynomial , and consider a non-constant integer polynomial . Then, either or .
By applying Theorem 4.1, Lemma 16 and Theorem 17, we deduce that the satisfiability problem for is in 2Exp. However, for algebraic numbers it is possible to obtain a better complexity result (ExpSpace) by slightly modifying Steps II and III of Algorithm 1.
Proof of Theorem 1.1.
Let be a formula in input of Algorithm 1, and to be the formula obtained from after executing lines 1–6. In lines 7 and 8, guess the integers in binary, instead of unary. These numbers have at most bits where, by Theorems 7 and 8, is exponential in . Let , with and , so that . Note that the formula
has a unique solution: for every , must be equal to . The formula is therefore equisatisfiable with the formula , which (after rewriting into when ) is a formula from the existential theory of the reals of size exponential in . Since the satisfiability problem for the existential theory of the reals is in PSpace [12], we conclude that checking whether is satisfiable can be done in ExpSpace. Accounting for Steps I and II, we thus obtain a procedure running in non-deterministic exponential space (because of the guesses in lines 7 and 8), which can be determinised by Savitch’s theorem [32].
The case of among some classical transcendental numbers (proof sketch of Theorem 1.2).
In the context of transcendental numbers, root barriers are usually called transcendence measures. Several fundamental results in number theory concern deriving a transcendence measure for “illustrious” numbers, such as Euler’s , , or logarithms of algebraic numbers [29, 25, 33]. A few of these results are summarised in Table 1, which is taken almost verbatim from [33, Fig. 1 and Corollary 4.2]. All transcendence measures in the table are polynomial root barriers. Note that in the cases of and , the transcendence measures hold under further assumptions, which are given in the caption of the table.
Number | Transcendence measure from [33] | Simplified bound ( fixed) |
---|---|---|
Following Theorem 4.2, to prove Theorem 1.2 it suffices to show how to construct a polynomial-time Turing machine for every number in Table 1, and derive polynomial root barriers for the cases and without relying on the additional assumptions in the table. The following two results solve the first of these two issues.
Theorem 18 ([6]).
One can construct a polynomial-time Turing machine computing .
Lemma 19.
Given a polynomial-time Turing machine computing ,
-
1.
one can construct a polynomial-time Turing machine computing ;
-
2.
if , one can construct a polynomial-time Turing machine computing .
Proof idea.
The two Turing machines use the power series in the identities and , truncated to obtain the required accuracy.
As an example, to construct the Turing machine for we construct machines for the following sequence of numbers: and (applying Lemma 16), and (Lemma 19.2), (Lemma 6) and (Lemma 5). For , we follow the operations in .
Let us now discuss how to derive polynomial root barriers when or . In the case , Table 1 assumes to be irrational. To check whether an algebraic number represented by is rational, it suffices to factor into a product of irreducible polynomials with rational coefficients, and test for any degree factor whether the rational number belongs to . The factorisation of can be computed (in fact, in polynomial time) using LLL [23]. If such a rational number does not exist, then is irrational and the polynomial root barrier for is given in Table 1. Otherwise, and the number is algebraic. In this case, rely on the following lemma to construct a representation of , and then derive a polynomial root barrier by applying Theorem 17.
Lemma 20.
There is an algorithm that given a rational and an algebraic number represented by , computes a representation of the algebraic number .
We move to the case , which Table 1 assumes to be irrational. Since is positive, . We observe that for every , we have if and only if . (In other words, if and only if and are multiplicatively dependent.) From a celebrated result of Masser [27], the set is a finitely-generated integer lattice for which we can explicitly construct a basis (see [11] for a polynomial-time procedure). If , then is irrational and its polynomial root barrier is given in Table 1. Otherwise, since , there is with , and . We can then derive a polynomial root barrier by applying Theorem 17.
7 An application: the entropic risk threshold problem
We now apply some of the machinery developed for to remove the appeal to Schanuel’s conjecture from the decidability proof of the entropic risk threshold problem for stochastic games from [5]. Briefly, a (turn-based) stochastic game is a tuple where and are disjoint finite set of states controlled by two players, is a function from states to a finite set of actions, and is a function taking as input a state and an action from , and returning a probability distribution on the set of states. Below, we write for the probability associated to in , and set .
Starting from an initial state , a play of the game produces an infinite sequence of states (a path), to which we associate the total reward , where is a given reward function. A classical problem is to determine the strategy for one of the players that optimises (minimises or maximises) its expected total reward. Instead of expectation, the entropic risk yields the normalised logarithm of the average of the function , where the base and the risk aversion factor are real numbers, and is a random variable ranging over total rewards. We refer the reader to [5] for motivations behind this notion, as well as all formal definitions.
Fix a base and a risk aversion factor . The entropic risk threshold problem asks to determine if the entropic risk is above a threshold . The inputs of this problem are a stochastic game having rational probabilities , an initial state , a reward function and a threshold . In [5], this problem is proven to be in PSpace for and rationals, and decidable subject to Schanuel’s conjecture if and (both results also hold when and are not fixed). We improve upon the latter result, by establishing the following theorem (that assumes having representations of and ):
Theorem 21.
The problems and are in Exp for every fixed algebraic numbers . When are not fixed but part of the input, these problems are decidable.
Proof sketch.
Ultimately, in [5] the authors show that the problem is reducible in polynomial time to the problem of checking the satisfiability of a system of constraints of the following form (see [5, Equation 7] for an equivalent formula):
(1) |
where is some subset of the states of the game, , and in the notation the symbol stands for the functions or , depending on which of the two players controls . The formula has one variable for every , ranging over .
Since is equivalent to , and is equivalent to , except for the rationality of the exponents and (which we handle below), Formula 1 belongs to .
Fix to be either or algebraic, and to be algebraic. Assume to have access to representations for these algebraic numbers, so that if is represented by , then is represented by . Consider the problem of checking whether a formula of the form given by Formula 1 is satisfiable. Since does not feature predicates , but only the constant , instead of Algorithm 1 we can run the following simplified procedure:
-
I.
Update all exponents and of to be over and written in unary. (1) Compute the l.c.m. of the denominators of these exponents. (2) Rewrite every term , where is one such exponent, into . Note that . (3) Rewrite into , with fresh variable. (4) Opportunely multiply both sides of inequalities by integer powers of to make all exponents range over . (5) Change to a unary encoding for the exponents by adding further variables, as done in the proof of Theorem 1.1 (Section 6). Overall, this step takes polynomial time in .
-
II.
Eliminate and all variables with . This is done by appealing to Theorem 7, treating as a free variable. The result is a Boolean combination of polynomial inequalities over . This step runs in time exponential in .
-
III.
Evaluate . Call Algorithm 2 on each inequality, to then return or according to the Boolean structure of . Since we can construct a polynomial-time Turing machine for (Section 6), by Lemma 10 this step takes polynomial time in .
8 Conclusion and future directions
We have studied the complexity of the theory for different choices of . Particularly valuable turned out to be the introduction of root barriers (Definition 3): by relying on this notion, we have established that is in ExpSpace if is algebraic, and in 3Exp for natural choices of among the transcendental numbers, such as and .
A first natural question is how far are we from the exact complexity of these existential theories, considering that the only known lower bound is inherited from the existential theory of the reals, which lies in PSpace [12]. While we have no answer to this question, we remark that strengthening the hypotheses on may lead to better complexity bounds. For example, we claim that our ExpSpace result for algebraic numbers improves to Exp when is an integer (we aim at including this result in an extended version of this paper).
We have presented natural examples of bases having polynomial root barriers. More exotic instances are known: setting , where is an integer polynomial and is Euler’s Gamma function, results in one such base. This follows from a theorem by Bruiltet [9, Theorem B′] on the algebraic independence of and . This leads to a second natural question: are there real numbers satisfying for which the existential theory of the reals enriched with both the predicates and is decidable?
References
- [1] Melanie Achatz, Scott McCallum, and Volker Weispfenning. Deciding polynomial-exponential problems. In ISSAC, pages 215–222, 2008. doi:10.1145/1390768.1390799.
- [2] Shaull Almagor, Dmitry Chistikov, Joël Ouaknine, and James Worrell. O-minimal invariants for discrete-time dynamical systems. ACM Trans. Comput. Log., 23(2), 2022. doi:10.1145/3501299.
- [3] Hirokazu Anai and Volker Weispfenning. Deciding linear-trigonometric problems. In ISSAC, pages 14–22, 2000. doi:10.1145/345542.345567.
- [4] Jeremy Avigad and Yimu Yin. Quantifier elimination for the reals with a predicate for the powers of two. Theor. Comput. Sci., 370(1-3):48–59, 2007. doi:10.1016/J.TCS.2006.10.005.
- [5] Christel Baier, Krishnendu Chatterjee, Tobias Meggendorfer, and Jakob Piribauer. Entropic risk for turn-based stochastic games. In MFCS, volume 272, pages 15:1–15:16, 2023. doi:10.4230/LIPICS.MFCS.2023.15.
- [6] David H. Bailey, Peter B. Borwein, and Simon Plouffe. On the rapid computation of various polylogarithmic constants. Math. Comput., 66:903–913, 1997. doi:10.1090/S0025-5718-97-00856-9.
- [7] Gilles Barthe, Rohit Chadha, Paul Krogmeier, A. Prasad Sistla, and Mahesh Viswanathan. Deciding accuracy of differential privacy schemes. Proc. ACM Program. Lang., 5(POPL):1–30, 2021. doi:10.1145/3434289.
- [8] Saugata Basu, Richard Pollack, and Marie-Françoise Roy. On the combinatorial and algebraic complexity of quantifier elimination. J. ACM, 43(6):1002–1045, 1996. doi:10.1145/235809.235813.
- [9] Sylvain Bruiltet. D’une mesure d’approximation simultanée à une mesure d’irrationalité: le cas de et . Acta Arith., 104(3):243–281, 2002. doi:10.4064/aa104-3-3.
- [10] Yann Bugeaud. Approximation by Algebraic Numbers. Cambridge Tracts in Mathematics. Cambridge University Press, 2004. doi:10.1017/CBO9780511542886.
- [11] Jin-yi Cai, Richard J. Lipton, and Yechezkel Zalcstein. The complexity of the A B C problem. SIAM J. Comput., 29(6):1878–1888, 2000. doi:10.1137/S0097539794276853.
- [12] John Canny. Some algebraic and geometric computations in PSPACE. In STOC, pages 460–467, 1988. doi:10.1145/62212.62257.
- [13] Dmitry Chistikov, Stefan Kiefer, Andrzej S. Murawski, and David Purser. The big-o problem. Log. Methods Comput. Sci., 18(1), 2022. doi:10.46298/LMCS-18(1:40)2022.
- [14] Mohan Dantam and Amaury Pouly. On the decidability of reachability in continuous time linear time-invariant systems. In HSCC, 2021. doi:10.1145/3447928.3456705.
- [15] Laure Daviaud, Marcin Jurdziński, Ranko Lazić, Filip Mazowiecki, Guillermo A. Pérez, and James Worrell. When are emptiness and containment decidable for probabilistic automata? JCSS, 119:78–96, 2021. doi:10.1016/j.jcss.2021.01.006.
- [16] Andreas Dolzmann and Thomas Sturm. REDLOG: computer algebra meets computer logic. SIGSAM Bull., 31(2):2–9, 1997. doi:10.1145/261320.261324.
- [17] Lou van den Dries. The field of reals with a predicate for the powers of two. Manuscripta Math., 54:187–196, 1986. doi:10.1007/BF01171706.
- [18] Lou van den Dries and Ayhan Günaydin. The fields of real and complex numbers with a small multiplicative group. Proc. Lond. Math. Soc., 93(1):43–81, 2006. doi:10.1017/S0024611506015747.
- [19] Teemu Hankala, Miika Hannula, Juha Kontinen, and Jonni Virtema. Complexity of neural network training and ETR: extensions with effectively continuous functions. In AAAI, pages 12278–12285, 2024. doi:10.1609/AAAI.V38I11.29118.
- [20] Philipp Hieronymi. Defining the set of integers in expansions of the real field by a closed discrete set. Proc. Am. Math. Soc., 138(6):2163–2168, 2010. doi:10.1090/S0002-9939-10-10268-8.
- [21] Omri Isac, Yoni Zohar, Clark W. Barrett, and Guy Katz. DNN verification, reachability, and the exponential function problem. In CONCUR, pages 26:1–26:18, 2023. doi:10.4230/LIPICS.CONCUR.2023.26.
- [22] A. G. Khovanskii. Fewnomials. Transl. Math. Monogr., 88, 1991. Translated by Smilka Zdravkovska. doi:10.1090/mmono/088.
- [23] Arjen K Lenstra, Hendrik Willem Lenstra, and László Lovász. Factoring polynomials with rational coefficients. Math. Ann., 261:515–534, 1982. doi:10.1007/bf01457454.
- [24] Angus Macintyre and Alex J. Wilkie. On the decidability of the real exponential field. In Piergiorgio Odifreddi, editor, Kreiseliana. About and Around Georg Kreisel, pages 441–467. A K Peters, 1996.
- [25] Kurt Mahler. Zur Approximation der Exponentialfunktion und des Logarithmus. Teil I. Journal für die reine und angewandte Mathematik, 166:118–150, 1932.
- [26] David Marker. Model Theory: An Introduction. Graduate Texts in Mathematics. Springer, 2002. doi:10.1007/b98860.
- [27] D. W. Masser. Linear relations on algebraic groups, pages 248–262. Cambridge University Press, 1988.
- [28] Scott McCallum and Volker Weispfenning. Deciding polynomial-transcendental problems. J. Symb. Comput., 47(1):16–31, 2012. doi:10.1016/J.JSC.2011.08.004.
- [29] J. Popken. Zur Transzendenz von e. Mathematische Zeitschrift, 29:525–541, 1929.
- [30] Q. I. Rahman and G. Schmeisser. Analytic Theory of Polynomials. Oxford University Press, September 2002. doi:10.1093/oso/9780198534938.001.0001.
- [31] H. G. Rice. Recursive real numbers. Proc. Am. Math. Soc., 5(5):784–791, 1954. doi:10.2307/2031867.
- [32] Walter J. Savitch. Relationships between nondeterministic and deterministic tape complexities. JCSS, 4(2):177–192, 1970. doi:10.1016/S0022-0000(70)80006-X.
- [33] Michel Waldschmidt. Transcendence measures for exponentials and logarithms. J. Aust. Math. Soc., 25(4):445–465, 1978. doi:10.1017/S1446788700021431.
- [34] Volker Weispfenning. The complexity of almost linear diophantine problems. J. Symb. Comput., 10(5):395–404, 1990. doi:10.1016/S0747-7171(08)80051-X.