Provably Total Functions in the Polynomial Hierarchy
Abstract
 studies the complexity of total, verifiable search problems, and represents the first layer of the total function polynomial hierarchy ().
Recently, problems in higher levels of the  have gained significant attention, partly due to their close connection to circuit lower bounds. However, very little is known about the relationships between problems in levels of the hierarchy beyond . 
Connections to proof complexity have had an outsized impact on our understanding of the relationships between subclasses of  in the black-box model. Subclasses are characterized by provability in certain proof systems, which has allowed for tools from proof complexity to be applied in order to separate  problems.
In this work we begin a systematic study of the relationship between subclasses of total search problems in the polynomial hierarchy and proof systems.
We show that, akin to , reductions to a problem in  are equivalent to proofs of the formulas expressing the totality of the problems in some -proof system. Having established this general correspondence, we examine important subclasses of . We show that reductions to the StrongAvoid problem are equivalent to proofs in a -variant of the (unary) Sherali-Adams proof system. As well, we explore the  classes which result from well-studied proof systems, introducing a number of new  classes which characterize variants of DNF resolution, as well as  classes capturing levels of -bounded-depth Frege.
Keywords and phrases:
TFNP, TFPH, Proof Complxity, CharacterizationsFunding:
Noah Fleming: Supported by NSERC.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Proof complexity ; Theory of computation Complexity classesAcknowledgements:
The authors thank Robert Robere, Toniann Pitassi, and Oliver Korten for helpful discussions.Editors:
Srikanth SrinivasanSeries and Publisher:
 Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
The class consists of the total search problems whose solutions are verifiable in polynomial time. It has received considerable attention since it captures fundamental problems in a broad range of areas whose lack of efficient algorithms is not readily explained by the theory of -completeness. Famous examples include Nash: output a Nash equilibria of a given bimatrix game; and Factoring: output a prime divisor of a given integer. itself is not believed to admit complete problems [21], and as a consequence much of the work on has focused on studying subclasses which do. However, we are limited to proving conditional or oracle separations, as a separation between any subclasses would imply .
A flurry of recent results have established a complete picture of the relationships between the major subclasses in the black-box setting, where the input is presented as a black-box oracle which can be queried [2, 12, 11, 9, 13]. These results exploited a deep connection between black-box – denoted – and proof complexity, an area which studies efficient provability in certain propositional logics, known as proof systems. The connection of proof complexity to can be summarized as follows: A reduction between two total search problems is a proof that the first is total, assuming the totality of the second. By employing this lens, it has been shown that many important subclasses are characterized by provability in certain well-studied proof systems in the sense that there is a simple proof of the totality of a search problem if and only if there is an efficient reduction of that search problem to the complete problem for that subclass [13, 12, 5, 19, 8]. This connection has been highly impactful for the study of , allowing for the rich set of tools in proof complexity to be leveraged in order to provide separations between the major subclasses.
is the first level of the total function polynomial hierarchy [14]. Recently, problems in higher levels of the polynomial hierarchy have received considerable attention, in part due to their close connection to circuit lower bounds. Indeed, consider the task of finding (the truth table of) a function which does not have circuits of size . Using a standard encoding, any circuit of size can be represented uniquely by -many bits. Consider the map which maps circuits of size to truth tables of the function that they compute. Finding a truth table of a function with high circuit complexity is equivalent to finding a string which is not in the range of . This is an instance of the RangeAvoidance problem.
Definition 1.
RangeAvoidance (or simply Avoid) is the following search problem: Given a function , find a such that for all , .
Observe that any solution to Avoid can be checked by a verifier – check that for every , . This means that Avoid belongs to the class . If there is an algorithm for solving Avoid which belongs to a class then this implies the existence of a function in which does not have small circuits – a circuit lower bound against ! This approach led to the recent breakthrough circuit lower bounds against symmetric exponential time [20, 7, 17]. Hence, understanding the complexity of is important for understanding circuit lower bounds. Indeed, the current best upper bound puts Avoid in the class of problems reducible to LOP – the problem of finding a minimum element in a total order.
contains numerous important problems beyond those connected to circuit lower bounds. For example, Avoid is the complete problem for the class which also captures the complexity of finding pseudo-random number generators, randomness extractors, and rigid matrices [16]. We can restrict Avoid to only have one more element in its range than in its domain to obtain the problem StrongAvoid.
Definition 2.
strongRangeAvoidance (or simply StrongAvoid) is the following search problem: Given a function , find an empty hole , i.e., such that for all , .
StrongAvoid is the complete problem for the class which captures the complexity of finding objects whose existence is guaranteed by the union bound, including all of [14]. Important problems have also been identified in higher levels of the polynomial hierarchy, such as those related to finding sets of large VC dimension [14].
Despite the importance of problems in levels of the polynomial hierarchy beyond , there has been little structural exploration into how they relate. Indeed, [17] provide the first black-box separation, showing that StrongAvoid is not reducible to any problem in with a unique solution (in fact, they show that it cannot be solved with non-adaptive oracle calls to any language in ). Proof complexity has had an outsized impact on proving black-box separations for . To facilitate further structural exploration of , we would like to explore to what degree proof complexity tools can be used to provide separations between classes within higher levels of the black-box total function polynomial hierarchy (denoted ).
Our Results
In this paper we begin a systematic study of the connections between the total function polynomial hierarchy in the black-box model and propositional proof complexity. First, we identify the form that proof systems which characterize subclasses take. In order to characterize subclasses, these proof systems must be able to prove the validity of depth- propositional formulas. However, they cannot be Cook-Reckhow proof systems (-verifiers) in general unless as there are syntactic subclasses of which contain all of ; a characterization of which would imply a polynomialy-bounded proof system. Recall that a class is syntactic if it admits a complete problem. We show that in order to characterize subclasses, it suffices to augment Cook-Reckhow proof systems with a -weakening rule which generalizes the resolution weakening rule to formulas; we call the resulting proof system - (see Definition 14).
To begin, we explore the limits of these characterizations, verifying that this is indeed the correct definition of a proof system for . A syntactic class is uniform is there is a polynomial-time algorithm which given outputs the instance of the complete problem for .
Theorem 3 (Informal).
The following hold:
- 
1. 
For every uniform there is a -proof system such that if and only if efficiently proves that is total.
 - 
2. 
For every well-behaved -proof system there is a uniform subclass such that if and only if proves that is total.
 
Having established this scaffolding result, we begin to explore characterizations of specific subclasses; our results for can be seen in Figure 1. First, we show that is characterized by the -variant of the Sherali-Adams proof system.
Theorem 4 (Informal).
iff there is an efficient -Sherali-Adams proof that is total.
This allows one to use an extension to the pseudo-expectation technique in order to exclude total search problems from , and hence also . Currently, no such exclusions are known.
We also consider several variants of the DNF-resolution proof system: DNF Resolution (), Circular DNF resolution (), and Reversible DNF resolution (). We introduce new classes which characterize them.
Theorem 5 (Informal).
-, -, - are characterized by the subclasses , , , respectively.
We explore how these new classes relate to natural classes, which can be seen in Figure 1. In doing so, we introduce a natural class , of problems reducible to finding a source in a DAG given a sink, which we believe may be of independent interest.
Finally, we show that our characterization of DNF resolution can be extended to characterize bounded-depth Frege in higher levels of . The depth- Frege system allows one to cut on depth- propositional formulas.
Theorem 6 (informal).
-Depth -Frege is characterized by the class .
This result is inspired by the work of Beckmann and Buss, who characterize and in bounded arithmetic [23]. It is also the analogue of Thapen’s recent characterization of bounded-depth Frege [25].
Comparison with Bounded Arithmetic.
Characterizations of classes have been studied in the uniform setting by theories of bounded arithmetic. Beckmann and Buss [3] showed that -definable functions of correspond to the class , which is defined by replacing the polynomial-time predicates and functions of the complete problem for the subclass with predicates and functions from . This results in the generalized polynomial local search problem of [23]. However, these correspondences do not stray outside of proof systems which correspond to bounded-depth Frege systems.
Comparison with [25].
Recently and independently, Thapen [25] considered reductions between black-box total search problems in the polynomial hierarchy under the notion of counter example reducibility, in order to define new subclasses. Taking the set of problems which are counter-example reducible to a problem, characterizing a class , essentially acts as a projection of to . He uses these in order to obtain characterizations. In comparison, we are interested in reductions between and characterizations of problems. As well, he shows that versions of the game induction problems [24] form subclasses which characterize bounded-depth Frege proofs of CNF formulas.
Open Problems.
In this paper we provide the framework for characterizations between total search problems in the polynomial hierarchy, leaving open many natural questions.
- 
1. 
We study decision-tree reductions, as these are the query analogue of polynomial-time reductions. However, it is natural also to consider more powerful reductions, such as -reductions. What characterizations does one obtain under such reductions?
 - 
2. 
There are several studied classes for which we do not yet have characterizations, such as and LOP. Due to the connection between StrongAvoid and Sherali-Adams, it would appear that should correspond to a variant of Sherali-Adams which produces a large negative value, rather than . However, we cannot maintain this under decision-tree reductions.
 - 3.
 
2 Preliminaries on the Total Function Polynomial Hierarchy
Subclasses of are typically defined by a simple existence principle to which everything in the class reduces. For example, any total order must have a minimal element. These existence principles naturally give rise to total search problems. Continuing the example:
Definition 7.
The Linear Ordering Principle (LOP) asks, given , to find:
- 
 
A minimal element: such that , .
 - 
 
A violation of the total order: either (i) such that , (ii) such that and , or (iii) and and .
 
To make these problems non-trivial, the input is presented as a circuit so that the search space is exponential in the number of input bits . Formally, for any , . We call a white-box encoding of the problem. Unfortunately, a separation between any pair of total search problems in the white-box model is hard to achieve, as it would imply .
Instead, we can gain intuition for the relationships between these classes by exploring their black-box variants. In this setting is given as an oracle which can be queried, but we no longer have access to the description of . A major benefit of considering the black-box model is that we can now prove unconditional separations between classes without having to resolve versus . These separations imply oracle separation in the white-box setting.
A query search problem is a sequence of relations , one for each . It is total if for every there is an such that . We think of as a bit string which can be accessed by querying individual bits, and we will measure the complexity of solving as the number of bits that must be queried. Hence, an efficient algorithm for will be one which finds a suitable while making at most -many queries to the input. We will not charge the algorithm for other computational steps, and therefore an efficient algorithm corresponds to a shallow decision tree. Total query search problems which can be computed by decision trees of depth belong to the class , where indicates that it is a black-box class. While search problems are formally defined as sequences , we will often want to speak about individual elements in the sequence. For readability, we will abuse notation and refer to elements in the sequence as total search problems; furthermore, we will often drop the subscript , and rely on context to differentiate.
In this paper we will be considering total query search problems in the polynomial hierarchy .
Definition 8.
We say that a total search problem , where , belongs to the level of the query total function polynomial hierarchy if for every
where , is a decision tree of -depth, and each .
Note that and . At this point one may ask about . Kleinberg et al. [14] showed that is efficiently reducible to , and vice versa. Hence, it does not offer a new perspective.
We can compare the complexity of total search problems by taking reductions between them. The following defines decision tree reductions between total search problems, the query analogue of polynomial-time reductions.
Definition 9.
For total search problems , there is an -formulation of if, for every and , there are functions and such that
where . The depth of the reduction is
where denotes the minimum depth of any decision tree which computes . The size of the reduction is , the number of input bits to . The complexity of the reduction is , and the complexity of reducing to is the minimum -formulation of .
We extend this definition to sequences in the natural way. If is a sequence and is a single search problem, then the complexity of reducing to is the minimum over of the complexity of reducing to . For two sequences of search problems and , the complexity of reducing to is the complexity of reducing to for each . A reduction from to is efficient if its complexity is ; we denote this by .
Syntactic and Uniform Classes.
We say that a class of total search problems has as its complete problem if for every , . We call subclasses with complete problems syntactic. Further, we say that a syntactic class is uniform if it has a complete problem which is uniformly generated – - there is a polynomial-time Turing machine which on input outputs the instance of a complete problem for that class.
3 Proof Systems for TFPH
Search problems in the black-box model are intimately tied to the complexity of propositional theorem proving. A proof is a procedure for convincing a verifier that a statement is correct. In the propositional setting, a proof convinces the verifier that a propositional formula is unsatisfiable (equivalently, its negation is a tautology).
3.1 Recap: Proof Systems for TFNP
We begin by recalling how characterizations of proof systems by subclasses occur. We will then generalize this to . Let be the language of all unsatisfiable propositional formulas.
Definition 10.
A Cook-Reckhow proof system is a polynomial-time function such that for every propositional formula ,
The size of proving an unsatisfiable formula in is .
For many proof systems there is an associated width/degree measure. For example, in resolution it is the maximum number of literals in any clause appearing in a proof, and in algebraic systems such as Sherali-Adams and Sum-of-Squares it is the maximum degree of the polynomials appearing in the proof. Characterizations of subclasses are in terms of a complexity parameter of the proof system, denoted
where is some associated width measure particular to that system. For example, for example for resolution the width measure is the number of literals in a clause, while for algebraic proof systems the width measure is typically the proof degree. This complexity measure is studied in order to account for the fact that in the black-box setting our reductions are performed by decision trees and we would like the complexity of a proof to be closely related to the complexity of a formulation; width will correspond to the depth of the decision trees in the formulation.
Typically one studies the complexity of proving the unsatisfiability of CNF formulas. As a CNF formula is falsified only when one of its clauses is falsified, a proof convinces the verifier that for every assignment there is some clause of such that . Hence, the complexity of proving that is unsatisfiable is intimately related to the complexity of exhibiting a falsified clause, given an assignment. This is known as the false clause search problem , defined as
As is unsatisfiable, this search problem is total, and if each clause of contains at most -many variables, it belongs to .
The above intuition suggests that understanding (or at least the false clause search problem) is important for understanding proof complexity. Remarkably, proof complexity is also crucial for understanding . It turns out that is equivalent to a large sub-area of proof complexity! The intuition is the following: A reduction between two total search problems is a proof that the first is total, assuming the totality of the second. By employing this lens, works have shown that many common proof systems are characterized by certain well-studied tautologies in the sense that they can prove a tautology iff there is a short reduction of that tautology to the characterizing one.
The heart of this connection is the following claim, which shows that is exactly the study of the false clause search problem. The proof proceeds by expressing the totality of any problem in as a tautology and then taking its negation.
Claim 11.
If then there is an unsatisfiable -width CNF formula such that and .
From this, characterizations of subclasses by proof systems have been derived. We say that a syntactic subclass is characterized by a proof system if for every , iff . Note that as a proof system is a polynomial-time Turing machine, any class must be which characterizes that proof system must be uniform.
3.2 Proof Systems and TFPH
The aim of this paper is to explore characterizations of classes of problems belonging to higher levels of . These will correspond to the provability of quantified formulas.
Definition 12.
A formula is the propositional translation of any quantified formula of the form
where , , and is a formula which depends on at most -many free variables (). That is, a formula is of the form
where , and . Similarly, formulas are negations of formulas.
Note that because depends on -many variables, we may assume without loss of generality (with a quasi-polynomial blow-up in size) that is a CNF/DNF formula with clauses/terms of width . Hence, a -formula is a layered circuit of depth where the gates at each layer are the same, and the gates at the first layers are allowed fanin, while the final layer is restricted to have fanin. Observe that a -formula is a low-width CNF formula.
Our aim is to characterize subclasses of the higher levels of the total function polynomial hierarchy. Towards this, we generalize the false clause search problem to formulas.
False Formula Search.
For a formula where each is a -formula, the False Formula search problem is defined as
Observe that if is unsatisfiable then is total and . The following lemma generalizes Claim 11 to say that is exactly the study of the false formula search problem.
Lemma 13.
For every and there is an unsatisfiable -formula such that iff .
Proof.
Let . Then there are -depth decision trees such that
where , is a decision tree of -depth, and each . Slightly abusing notation, let be a propositional translation of the verifier as a -formula:
where , and is computable by a -depth decision tree, and hence propositionalized as a -width CNF formula if or a -width DNF if , collapsing the top gate into . This is done as follows: Say that a root-to-leaf path in is a -path if it ends at a leaf labeled . Then, is propositionalized as
- 
 
If is even: ,
 - 
 
If is odd: ,
 
where is the conjunction of literals queried along (if a variable is queried and we take branch-, then we consider this as literal and otherwise as ). Note that in this case the outer gate of matches , and the depth collapses by . Consider the following -formula, which states that is not total:
Observe that if , then there is some such that , and hence . Conversely, if , then .
We will call the formula the propositionalization of . This lemma allows us to relate the complexity of total search problems to the provability of propositional formulas. In the remainder we will develop what provability means in this context. In particular, what are the properties of a proof system which proves the formulas that result from search problems.
A characterization of a class by a proof system proceeds by showing that the proof system can prove the correctness of reductions to the class. To discuss this, we will need to propositionalize reductions.
Reduced Formula.
Let be a problem in and let , be its verifiers. Let be an -formulation where , , then the reduced formula is the -formula defined as
where and can be represented as a -width CNF/DNF as in Lemma 13, using that both and are computable by -depth decision trees.
Reduced formulas capture formulations in the following sense. Let and be an -formulation of , where . Then for any and any path in labelled with some we have that
| (1) | 
That is, , and we say that is a weakening of .
A proof system is characterized by a class with complete problem if efficient provability of in that proof system implies low-complexity reductions to the complete problem for that class, and membership in the class implies that can prove the correctness of the reduction to . The latter takes the following form: if is a -formulation of a then
- 
i) 
From , can efficiently derive the reduced formula .
 - 
ii) 
has an efficient proof of .
 
What properties must a proof system possess in order to perform (i) and (ii) for a subclass ? If then a Cook-Reckhow proof system (an -verifier) does not suffice unless 111Indeed, for any unsatisfiable -CNF formula , .. Interestingly, what fails is step (i) – Theorem 23 shows that step (ii) can always be carried out by a Cook-Reckhow system. We will need to augment Cook-Reckhow proof systems in order to perform step (i). The issue is that Cook-Reckhow systems cannot always perform the weakening from (1). That is, if and then by correctness of the reduction, we know that for every , is a weakening of some . However, Cook-Reckhow proof systems cannot necessarily derive efficiently given . For example, if , the trivial tautology, then this is tantamount to proving that is a tautology, which is a -complete task. It will suffice to augment our proof systems to be able to do so.
Definition 14.
Let be a Cook-Reckhow proof system. A proof of a formula in the proof system - is a pair such that
- 
1. 
is a -proof that the -formula is unsatisfiable.
 - 
2. 
Each is a -formula such that there is some for which . That is, is a -weakening of .
 
The complexity of the proof is , where is the complexity of the proof .
Clearly such proofs are verifiable in . As we will see, they suffice to characterize subclasses of . Note as well that the definition of a -proof system agrees with the standard definition of any proof system which corresponds to a subclass. Indeed, -weakening is simply weakening over clauses, which can be performed in tree resolution, which characterizes .
Comparison with Proof Systems for QBF.
A line of research has explored proof systems for proving the unsatisfiability of quantified boolean formulas (QBF) (see [4] for a survey). These QBF proof systems appear to be weaker than -proof systems when restricted to -formulas. Indeed, these proof systems are typically Cook-Reckhow systems augmented with a Reduction rule, and hence lower bounds for CNF formulas from the propositional case readily apply to these proof systems. This is not the case for -proof systems, and further weakening is able to simulate Reduction.
4 Sherali-Adams and Strong Range Avoidance
We begin with an example of a characterization by showing that strongRangeAvoidance is characterized by -Sherali-Adams. A full treatment of the Sherali-Adams proof system is given in the monograph [10].
For any boolean formula , we will assume without loss of generality that all negations occur at the leaves and let be the positive literals in and be the negative literals. For any conjunct , we associate the polynomial , and refer to them also as conjuncts. A conical junta is a sum of conjuncts .
Let be any DNF. We can express as a degree polynomial
Observe that for any , iff . Henceforth we will abuse notation and refer to as both the DNF and the associated polynomial.
Throughout this section we will work with multi-linear arithmetic, associating for every variable . This has the effect of restricting the underlying linear program to -points.
Definition 15.
Let be an unsatisfiable collection of DNFs. A -Unary Sherali-Adams (which we denote by ) proof of is a weakening of together with a list of conical juntas , such that
The degree is the maximum degree among and , and the size is the number of monomials (counted with multiplicity)222This is a unary proof system as the number of monomials are counted with multiplicity, akin to writing coefficients in unary, rather than allowing for monomials with coefficients written in binary in . The complexity of the proof is , and the complexity of proving is , where the minimum is taken over all proofs of .
Note also that weakening subsumes the need to explicitly allow the additional conical junta in a proof; we could instead defined as a Nullstellensatz proof . This is because the additional junta may be introduced using weakening: for each conjunct of , weaken some in to true or . For example, can be weakened to , the polynomial encoding of which is .
Claim 16.
is sound and complete.
Proof.
Suppose that is not sound; then there exists a refutation of a satisfiable DNF ,
Let be a satisfying assignment to , meaning that for every , for any weakening of , and in particular the polynomial representation of . As juntas are non-negative over , we have that
which is a contradiction.
For completeness, let be an unsatisfiable formula. Each assignment must falsify some DNF of , which we will denote by . Let be the indicator polynomial of the assignment . We claim that the polynomial
and is therefore a proof. To see this, since we are working over the ideal , it suffices to show that the polynomial evaluates to on every . Observe that if falsifies , then ; additionally, if , then . Hence, for every ,
In the rest of this section, we show that is closely related to the search problem strongRangeAvoidance. We restate an equivalent definition next.
Definition 17.
An instance of strongRangeAvoidance is given by a map . A solution is any such that for every , .
StrongAvoid can be encoded as a CNF formula by introducing, for every , -many binary variables naming in binary the hole to which pigeon flies. For exposition, it will be convenient to think of as an -ary variable and we will denote by the indicator conjunct that is satisfied iff maps to under the given assignment
where if the bit of is and otherwise. Note that as polynomials.
We can express StrongAvoid as the unsatisfiable family of DNFs,
The main theorem of this section is the following.
Theorem 18.
For any there is a complexity- StrongAvoid-formulation of iff there is a - proof of of complexity .
We break the proof of this theorem into Lemma 19 and Lemma 22, which are proven over the following two subsections. This theorem gives necessary and sufficient conditions for separating other classes from StrongAvoid: Exhibit a pseudo-expectation (see e.g., [10]) against any -width -weakening of the propositionalization of StrongAvoid.
4.1 SA Proofs Imply sRA Reductions
Lemma 19.
If there is a size and degree - proof of , then there is a depth- reduction from to an instance of StrongAvoid of size .
To prove this lemma, it will be convenient to work with the following problem. We show that it is equivalent to StrongAvoid.
Definition 20.
The Unmetered Source of Dag (USoD) problem is defined as follows. The input is a “successor” function which defines a graph in which each vertex has fan-out but arbitrary fan-in. There is an edge from to if . To make the problem total, we enforce that the vertex is a sink; it will have fan-out but fan-in at least . The goal is to find a source; the solutions are:
- 
 
is a solution if either or , ( is not a sink).
 - 
 
is a solution if but , ( is a source).
 
Lemma 21.
. Furthermore, this reduction is by depth- decision trees.
Proof.
From an instance  of USoD, we construct an instance  of StrongAvoid as follows. For , let  and let . We claim that any solution  to this StrongAvoid instance is a source in . First observe that  as . Hence, by construction, we have that , and in particular , so  is a source. 
For the converse direction, from an instance  of StrongAvoid we construct an instance  of USoD by defining  for all  and letting . Let  be a solution to this instance of USoD, if , then, since , for all , . Otherwise,  for all , and so  for all .
Proof of Lemma 19.
Let , and let be a size and degree proof of over variables, where
for sets of indices , each is a weakening of some and each is a conjunct. We construct an instance of USoD with one node per occurrence of a (signed) monomial in . Therefore, for simplicity, we will refer to monomials as nodes and vice versa. The constant will be our distinguished sink, and we will set . We will define the remaining successor pointers as follows:
Negative Monomials. Since , there is a positive and negative copy of every monomial occurring in the proof; construct a pairing of the monomials in this way. Furthermore, under any assignment , the number of monomials which evaluate to and to is equal. For each negative monomial in , the decision tree queries the variables of and outputs as follows:
- 
i) 
If , then .
 - 
ii) 
Otherwise, let be the positive copy of that is paired with, and set .
 
This completes the description of the successor pointer for negative monomials.
Positive Monomials. For any positive monomial , the decision tree for first queries the (at most -many) variables of to determine the value of . If , then . Otherwise, we will define as follows.
We define the successor pointer for the positive monomials which belong to each first, and handle the monomials from the conjuncts later. Fix some in , where , and consider the monomials within it. We would like to satisfy the following property: there is a source within the monomials iff (i.e., the DNF ). To get some intuition, first suppose that and that all monomials in are positive – that is, . Then, the current assignment to affects as follows:
- 
 
Each monomial such that is an isolated vertex for which .
 - 
 
Each monomial for which has a single incoming edge (from ).
 - 
 
The monomial has an outgoing edge.
 
If at least one of the monomials is non-zero, we can send it to , and otherwise becomes a source (see Figure 2). Therefore, the only sources will come from the “ nodes” of falsified DNFs. To handle the general case, we use the fact that in every conjunct, under any assignment, there are at least as many non-zero positive monomials as non-zero negative monomials.
We now describe the construction in general. Consider a in . For each positive monomial in , belonging to some conjunct , the pointer will query the (at most -many) variables in . Let be the assignment to the variables of that was discovered.
If : Then . Hence, for every positive monomial in , either , in which case we have already set , or must cancel with another monomial in under . That is, , and so we define . Note that in this case there are no sources within : every monomial either evaluates to and nothing points to it, or has exactly one incoming and one outgoing edge.
If : We define the successor pointer for the monomials in so that there is a source iff every for every term of , . Let be the (non-zero) positive and negative monomials in respectively. Let
be the difference between the number of positive and negative monomials, and note that as is a conjunct and . Recall that . For each term, we will define a matching so that has only -many negative monomials without incoming edges, and every negative monomial in has an incoming edge.
- 
 
For : Define an arbitrary pairing such that each positive monomial occurs in exactly one pair and each negative monomial occurs in at most one pair. Hence we have -many negative monomials that are not paired. For each pair , define .
Note that we have now defined the successor of every positive monomial in .
 - 
 
For each : Observe that as is a conjunct, under any assignment it contains at least as many positive monomials as negative monomials. Define an arbitrary pairing such that each negative monomial occurs in exactly one pair and each positive monomial occurs in at most one pair. For each pair , define . Let be the assignment to the variables of that was discovered by the trees made by the decision tree of any of the monomials in . Let
be the difference between the number of non-zero positive and negative monomials in under .
If , then , and so the number of non-zero positive and negative monomials is equal. In this case, each negative monomial has an incoming edge, which is provided by this pairing.
Otherwise, if , then there are -many non-zero positive monomials whose successor is still undefined, and partition them into -many groups of of -many monomials each. Recall that has exactly -many negative monomials with no incoming edge, . For each , define . In this case, each monomial in and has an incoming edge.
 
Finally, we define the successor for each positive monomial in the conical junta in . We will do this individually for each . To do so, we use the fact that contains at least as many positive monomials as negative monomials in order to ensure that there is never any source among the monomials of . The successor for each positive monomial of queries the (at most -many) variables in for an assignment . Define an arbitrary pairing such that each negative monomial occurs in exactly one pair and each positive monomial occurs in at most one pair. For each pair , define . For the remaining positive monomials in whose successor is not defined, set (this choice is somewhat arbitrary).
This completes the description of the successor function (the -part of the formulation). It remains to define the output function of the formulation. For each potential solution ,
- 
 
If is a monomial from some , then is the weakening of some of , and we output .
 - 
 
Otherwise, we output an arbitrary index .
 
Finally, we prove that this formulation is correct. To do so, we show that the only monomials which do not have incoming edges belong to some for which is falsified. This suffices, as if belongs to where , then for some of of which is a weakening of. Hence, is falsified, and we have found a solution to . By the negative monomial case in the formulation, every positive monomial has an incoming edge. By the pairings constructed in the formulation, every negative monomial in each in the conical junta also has an incoming edge. As well, for each , each negative monomial in each has an incoming edge. Hence, the only potential sources belong to the terms of each . As we argued before, if , then there is no source in the monomials of , so suppose that this is not the case. As we have paired off positive and negative monomials in , the only incoming edge to each of the -many remaining negative monomials of must come from some . If there is a such that (and hence is satisfied), then has -many monomials which map to to the -many remaining negative monomials of , meaning that there is no source in . Thus, becomes a source only if and is falsified.
4.2 sRA Reductions Imply SA Proofs
We begin by observing that there is a trivial unary Sherali-Adams refutation of Range Avoidance:
where the third equality follows as we .
In the remainder of this section, we will show that unary Sherali-Adams can prove reductions to StrongAvoid.
Lemma 22.
If is a StrongAvoid-formulation of of depth and size , then there is a degree- and size - proof of .
If is a StrongAvoid-formulation of for some formula , let be the set of all root-to-leaf paths in the decision trees and , respectively. As well, for any hole , let be the set of paths in whose leaf is labeled by hole .
We can express the reduction from to StrongAvoid as the unsatisfiable formula defined as
Letting , this becomes the unsatisfiable family of DNFs
Each of the formulas is indeed a weakening of an axiom of . For a given and , the DNF is falsified if and only if is an output of the instance of StrongAvoid and is satisfied by the assignment. When is labeled with , an axiom of , the correctness of the reduction ensures that is also falsified by the assignment. Hence is a semantic weakening of the axiom . The following lemma shows that can deduce from .
Proof of Lemma 22.
We will abuse notation and let denote the decision-tree substitution of the indicator . To begin, we will weaken to , the polynomials of which are
for and . As each contains -many Boolean variables, and we are replacing each one by a depth- decision tree, the degree of is . Similarly, the size blows up by a factor of .
For any ,
| (Multiplying two distinct paths of ) | ||||
| (Summing all paths in the DT ) | ||||
| (Summing all paths in the DT ) | 
5 A Generic Correspondence
In this section we establish a general correspondence between uniform subclasses of total search problems in the polynomial hierarchy and proof systems. Our characterizations will rely on the following two properties of a -proof system:
- 
 
Reduction-Closed. For unsatisfiable formulas , if has a complexity- proof of and there is a complexity- -formulation of , then .
 - 
 
Reflective. has -complexity proofs of a reflection principle about itself – a formula encoding the soundness of this proof system; we expand on the meaning of this below.
 
We show the following, generalizing [5].
Theorem 23.
The following hold:
- 
i) 
Every uniform subclass of is characterized by a -proof system.
 - 
ii) 
Every -proof system which is reduction-closed and reflective is characterized by a subclass of .
 
We prove (i) in Subsection 5.1 and (ii) in Subsection 5.2.
5.1 A Proof System for any Problem
In this section we show how to construct a proof system from any total search problem , which we think of as the complete problem for some uniform subclass. The key insight is that one can view a decision tree reduction from a total search problem to as a proof that is total, if we take the totality of as an axiom. In what follows, we formalize this intuition. We define proofs in the canonical proof system for a subclass as reductions to one of its complete problems.
Definition 24.
Let where . The canonical proof system for , denoted , is defined as follows: A proof in consists of a triple , where
- 
 
is a -formulation (i.e., a set of decision trees) to an instance of on variables, and
 - 
 
is the reduced formula associated with this formulation.
 
is a proof of an unsatisfiable formula , where each is a -formula, if for every in there exists some such that is a -weakening of ; that is,
The size of the proof is the number of bits needed to write down , and the width of is the maximum depth among the decision trees in the formulation,
The complexity of proving in is the minimum over all -proofs of ,
This proof system is sound, since any substitution of an unsatisfiable formula remains unsatisfiable. As well, it is complete for unsatisfiable formulas, as depth- decision trees suffice to solve any total search problem. It is also verifiable by a polynomial-time machine which generates , checks that is a valid -formulation which agrees with the reduced formula , and checks that Note that this proof system agrees with the definition of [5] when .
We will show that characterizes the subclass with complete problem , proving the first direction of Theorem 23.
Lemma 25.
If , then there is a complexity- -formulation of iff .
Proof.
Let be a complexity- -formulation of . We claim that the tuple is a proof of . As , is a formula, and so the reduced formula is a -formula ( if ). As well, the size of is at most , as each clause/term on the bottom layer of has width at most and we replace it by the CNF/DNF representation of a depth- decision tree, which has width and size at most . Finally, for and , by the correctness of the formulation, we can conclude that for every there exists some such that , and so is a -weakening of .
For the converse direction, suppose that is a proof of an unsatisfiable formula , where each is a -formula. By definition, constitutes a complexity- -formulation of . Indeed, each decision tree of has depth at most and there are at most -many of them, and so this is a complexity- formulation.
5.2 A Problem for any Proof System which Reflects
In this section we show that a -proof system corresponds to a -problem if that proof system is reduction closed and reflective.
A reflection principle states that -proofs are sound; we will restrict ourselves to proofs of formulas. Typically, the provability of a proof system’s reflection principle is sufficient in order to simulate that system. In our setting, a reflection principle will falsely assert that there is a complexity- -proof of a -formula and that is satisfied by a truth assignment :
This formula will be parameterized by , the number of variables of , as well as the complexity of the proof .
SAT. The formula states that is a satisfying assignment to , where and are given as input. A generic -formula has the following structure:
where and , is a width clause if or conjunct if . Each is specified by -many -ary variables , where denotes the variable
- 
 
if ,
 - 
 
if ,
 - 
 
constant if ,
 - 
 
constant if .
 
We could allow the formula to be parameterized by . However, for simplicity, since we are considering complexity- proofs, it suffices to simply set all of these parameters to and . In this case, the number of is , and hence the number of Boolean variables of is . Then the formula Sat can be written as
where is the width- DNF (if ) or CNF (if ) defined by the following decision tree : First query the -many Boolean variables to determine the literals of . Then, query the corresponding bits of to determine if is satisfied. If it is, then outputs , and otherwise it outputs . This can be converted into a DNF or CNF in the usual way.
Proof.
The formula states that is a -proof of . A complication is that there are many different ways by which one could encode a -proof as a formula, some of which may change the difficulty of proving the reflection principle drastically. Following [5], we define one reflection principle for each encoding of a -proof; we call such an encoding a verification procedure.
Definition 26.
A verification procedure for a -proof system , parameterized by , , is a -formula which generically encodes a complexity- -proof of an -variate formula . Specifically, the formula has two sets of variables , , where:
- 
 
An assignment to the variables specifies a formula as before.
 - 
 
An assignment to the variables specifies a purported -proof of of complexity , such that any error in can be verified by an efficient -algorithm (placing ).
 - 
 
has -many variables.
 
As bounds the logarithm of the size of the proof, and the number of variables is exponential in , the second condition ensures that a violated sub-formula of can be verified by a -algorithm making -many queries.
A reflection principle for a proof system and verification procedure is
where . Often, we will suppress the subscripts .
We now prove point (ii) of Theorem 23.
Lemma 27.
Let be a -proof system that is reduction closed and reflective for some . Then for any ,
- 
i) 
If there is a complexity- -formulation of , then .
 - 
ii) 
There is a complexity -formulation of .
 
Proof.
To prove (i), suppose that there is a complexity- -formulation of . By the definition of being reduction closed, there is a proof of of complexity .
For (ii), let be a complexity- proof of in . We construct a -formulation of as follows. will hard-wire as the input to Ref, and map the input variables of to the variables of Ref. Since is a valid proof of , is always satisfied, and we can set arbitrarily for any solution corresponding to a subformula of . As is always satisfied under this reduction, the only solutions which may occur belong to . In particular, as we have mapped the input variables of to the bits , for any assignment , . Hence, we define .
6 Characterizations in
In this section we uncover characterizations of several well-studied proof systems – DNF Resolution, DNF Circular Resolution [1, 8], and DNF Reversible Resolution [12, 8]. Along the way we introduce several new classes, which are inspired by classes. These are analogs to the coloured classes introduced in [18, 8]. In Subsection 6.3 we explore the relationships between these and prominent subclasses.
The DNF resolution proof systems are extensions of the resolution proof system (and restrictions of) to allow them to operate with DNF formulas, rather than only clauses. Davis and Robere [8] gave characterizations of these systems by coloured classes. We introduce several classes which characterize the -variants of these proof systems; we believe these classes herbrandize to the coloured classes.
Definition 28.
A refutation of a -unsatisfiable formula is a sequence of -width DNF formulas where each is deduced from previous DNFs by one of the following rules:
- 
 
Axiom Introduction. Introduce for some .
 - 
 
Symmetric Cut. From and derive , where is any term.
 - 
 
Reverse Cut. From derive and , for some term .
 
The size of is the sum of the sizes of DNFs involved in , and the width is the maximum width of any DNF in . The complexity of is .
A proof is a proof in which every DNF in the sequence is used as the premise to a derivation rule at most once.
A proof has access to the additional rule
- 
 
DNF Creation. , where is any DNF formula.
 
provided that each copy of that is created in this way is derived at least as many times as it is used as the premise to a derivation rule.
The following technical lemma will be key to our characterizations.
Lemma 29 (Theorem 3.6 in [8]).
and are reduction closed.
Davis and Robere proved Lemma 29 for DNF resolution proofs of -formulas (that is, when the axioms are clauses). It is straightforward to see that it holds by exactly the same argument (Claim 1) when the axioms are DNF formulas. In Section 7 we prove this theorem for depth- Frege, for every , of which is .
In the following subsections we will prove Theorem 5, characterizing each of these proof systems by new subclasses. To define each of these classes, it will be convenient to use the following notion of a meta-pointer.
Definition 30.
Given a function , the meta-pointer is defined as
Note that, if , is -verifiable: For all , we need to verify that , which takes queries. Moreover, and are verifiable: We can non-deterministically guess such that , or such that ; in other words, they are efficiently computable if we are given (and ) as witnesses. The inclusion in of the problems presented in this chapter follows directly from this fact.
6.1 DNF Resolution
-width resolution was characterized by the subclass [6]. In this section we introduce a -variant of the -complete problem iteration and show that it characterizes -. The iteration problem encodes the principle that every DAG has a sink. The input is given by a pointer function giving the successor of a node , thought of as the next node on a root-to-leaf walk in the DAG. A solution is (i) an invalid source , (ii) a which points backwards , (iii) a sink: such that but , or (iv) a node with an undefined pointer . Our variant obfuscates the successor function. Similar ideas were used to define the problem in [15].
Definition 31.
An instance of is given by a function . A solution is a witness of a solution to the iteration instance defined by the meta-pointer :
- 
 
such that and , ( is undefined.)
 - 
 
such that . (A pointer which points backwards)
 - 
 
if . ( is not a source)
 - 
 
such that and . ( is a proper sink)
 
The class is the set of such that .
Theorem 32.
For any , there is a complexity- -formulation of iff there is a complexity - proof of .
We prove this theorem in the following two lemmas, each giving one direction.
Lemma 33.
For , if -, then there is a complexity- -formulation of .
Proof.
Let be a - proof of , where and each is a -weakening of a DNF of . Up to padding, we may assume that each DNF in the proof has the same number of terms . Consider the proof in reverse order so that ; this will be our designated source.
Let be the term of . Given an assignment to the variables of , we construct a function by setting to be:
- 
 
if is an axiom, or if ;
 - 
 
if and was derived from by the reverse cut rule or semantic weakening of an axiom;
 - 
 
if and was derived from and via symmetric cut and and if ;
 
Finally, for each solution to the instance , we define the output of the reduction to be arbitrary if does not correspond to an axiom of , and otherwise this axiom is a weakening of a DNF of , and we set . Note that in this case . Observe that computing involves evaluating at most two terms, and hence the depth of the reduction is at most twice the width of the proof. It remains to argue that the reduction is correct.
Claim 34.
The function satisfies the following properties:
- 
i) 
is defined everywhere.
 - 
ii) 
If is not an axiom of , then iff .
 - 
iii) 
If , then .
 
Assuming the claim, we see that the only type of solution to this instance are proper sinks corresponding to falsified axioms of , which are weakenings of (falsified) axioms of . Hence, returns a correct solution to .
Proof of Claim.
We prove each item, beginning with (i). Clearly is well defined for any that was not derived using the cut rule since only has one choice of value other than . So now consider such that was derived from and . For , we see that depends on two values: , and in the case where . Thus, being independent of , is always identical when not equal to .
(ii) follows from the fact that iff for all , and iff for at least one . Finally, (iii) follows by definition.
We will now prove the converse. First, we describe the encoding of as an unsatisfiable formula. For each , the -ary value of will be described by -many boolean variables , where the indicator function
where we think of as being written in its binary encoding, is its bit, and and . As well, , and
Then is the conjunction of the following subformulas:
- 
 
for each . (1 is not a source)
 - 
 
for all and such that ( is defined everywhere)
 - 
 
for all and . (Nothing points backwards)
 - 
 
for all and . ( is not a proper sink)
 
Note that the subformulas of the formula are clauses making the formula a CNF. We may then question what makes a problem and not a one. The key to understanding this resides in the size of said clauses. Indeed, for a false formula problem corresponding to a CNF to be in , we need to be able to verify if a given clause is falsified by an assignment by only querying a amount of bits. This in turn directly implies that we would need each clause to be of -width. This is not the case here because of the fourth type of axioms, which are of -width. On the other hand, considering clauses as -width DNFs, we see that this false formula problem corresponding to this formula lands indeed in . We now state the converse.
Lemma 35.
For , if there is a complexity- -formulation of , then there is a complexity- proof of .
Observe that the set of formulas contains all clauses containing all of the variables . Hence they can be cut in -many steps to obtain . Throughout the proof we will write the
as a shorthand for this derivation with .
Proof of Lemma 35.
By Lemma 29 it suffices to show that can prove . By induction from to , we will derive a set of formulas that state that does not point forward in . Combining this with the fact that the image of by cannot be undefined and may not point backwards, this is semantically equivalent to stating that points to itself. We then reach a contradiction when reaching , since must be a proper source of our graph. This will be achieved by deducing
which can be combined with axioms stating that no node points backwards for the desired statement.
The base case is trivial, as . Consider some and suppose that we have derived for all . We derive the formula as follows: Consider some and apply the reverse cut rule to in order to obtain . Now consider the cuts from to ,
to the set of formulas . Finally, we do one last cut:
which derives the formula .
Finally, once we have derived , we can derive as follows. For a fixed , starting from down to , we operate the cuts:
Once we have derived , we do one final cut:
6.2 Circular and Reversible DNF Resolution
In this section we characterize the - proof system by a -variant of the Sink-of-Line problem. An instance of Sink-of-Line is given by functions which define a graph as follows: there is a directed edge if and . A solution to this instance is either i) if is not a source in , ii) a sink in , iii) a vertex for which or is undefined. We now describe the variant.
Definition 36.
An instance of is given by functions . A solution is a witness to a solution to the SoL instance defined by the meta-pointers :
- 
 
if and ;
or and . (Predecessor or Successor of is undefined) - 
 
if or and . ( is not a source)
 - 
 
if and . ( has a pointer to )
 - 
 
for if , and ;
or and . ( is a proper sink) 
Theorem 37.
For any , there is a complexity- -formulation of iff there is a complexity - proof of .
This theorem follows by combining Lemma 38 and Lemma 42. We begin with the backwards direction, showing that can prove formulations. is encoded as an unsatisfiable formula which is the conjunction of the following
- 
 
for , and for all . ( is a source)
 - 
 
for all , . ( is not undefined)
 - 
 
for all , . ( is not undefined)
 - 
 
for all and . (Nothing points to )
 - 
 
Let , we include (No proper sinks)
- 
– 
for each and , and
 - 
– 
for and .
 
 - 
– 
 
Lemma 38.
For , if there is a -formulation of of complexity then there is a complexity - proof of .
Proof.
By Lemma 29, it suffices to show that can prove . For each , we would like to derive the set of formulas
stating that has no outgoing edges. Our proof will proceed by the following three steps:
- 
1. 
Assume for each ;
 - 
2. 
From for , deduce . Since is semantically equivalent to saying that node points to itself, if were to point to any other node, then said node would be a proper sink. Hence follows.
 - 
3. 
is in direct contradiction with axioms stating that is a source.
 
For step 1, we use the DNF creation rule,
For step 2 and , we perform the following. For with , consider and weaken it successively to get
then we cut as follows: starting with down to ,
to get . Next, starting from down to ,
and end up with the formulas . Finally,
derives . Having derived allows us to take and, starting with down to , we may cut:
to get for each . Next, starting from down to , we cut:
to get for . We may then cut one final time,
We delay the proof of the other direction until the end of this section and complete it together with the proof of the same direction as they are similar.
We characterize the by a variant of the Sink-of-Potential-Line (SoPL) problem. This is a metered variant of SoL, meaning that edges must always point towards larger numbers. An instance of SoPL is given by functions that define a graph with edges iff and . A solution is either i) if is not a source in , ii) a sink in , iii) a vertex which points backwards , or iv) a vertex if or is undefined.
Definition 39.
An instance of is given by functions . A solution is a witness to a solution to the SoPL instance defined by the meta-pointers :
- 
 
if and ;
or and .
(Predecessor or Successor of is undefined) - 
 
if or and . ( is not a source)
 - 
 
if . ( points backwards)
 - 
 
for if , and ; or and . ( is a proper sink)
 
Theorem 40.
For any , there is a complexity- -formulation of iff there is a complexity - proof of .
This theorem follows by combining Lemma 41 and Lemma 42. We begin with the backwards direction, showing that can prove formulations. is encoded as an unsatisfiable formula, which is the conjunction of the following:
- 
 
for , and for all . ( is a source)
 - 
 
for all , . ( is not undefined)
 - 
 
for all , . ( is not undefined)
 - 
 
for all and . (No backwards edges)
 - 
 
Let , we include (No proper sinks)
- 
i) 
for each and , and
 - 
ii) 
for and and .
 
 - 
i) 
 
Lemma 41.
For , if there is a -formulation of of complexity , then there is a complexity - proof of .
Proof.
By Lemma 29, it suffices to show that can prove . We will prove by induction on that does not have any outgoing edges. That is, we will derive the set of formulas:
First observe that the base case is given by the no backwards edges axioms. Assuming that we can derive , we show how to complete the proof. For , starting with down to , we cut
Next, starting from down to , we successively cut
Once all those formulas are derived, we cut one final time to finish the proof
We now describe how to derive from all with . For a given and , we start by weakening it to get and again to get . Once this is done, starting at down to , we cut
to get . Finally, from down to , we cut
Once we derived for each , we have one final cut
to get .
Finally, we prove the other direction of Theorem 40 and Theorem 37.
Lemma 42.
Let . Suppose that admits a complexity- - (-) proof. Then there is a complexity- -(-)formulation of .
Proof.
We first handle Circular DNF Resolution and discuss what needs to be changed in order to handle Reversible DNF Resolution at the end of the proof. The idea for the transformation of a proof into an formulation is the same as the transformation of a into an formulation (Lemma 33) with the addition of defining a predecessor function. Let be such a proof. By padding, we may assume that each DNF in the proof has the same number of terms. Let us consider the proof in reverse order such that .
Let be the term of . Given an assignment to the variables of , we construct a function by setting to be:
- 
 
if is an axiom, or if ;
 - 
 
if and was derived from by the reverse cut rule or semantic weakening of an axiom;
 - 
 
if and was derived from and via symmetric cut and and if ;
 
As well, define the predecessor function , as :
- 
 
if either , or the formula was deduced but never used as the premise of a rule, or if ;
 - 
 
if and is used as a premise to derive via any of the rules but the reverse cut;
 - 
 
or if and was used as the premise of the reverse cut rule to derive and . If , then and otherwise.
 
Finally, for each solution to the instance , we define the output of the reduction to be arbitrary if does not correspond to an axiom of , and otherwise this axiom is a weakening of a DNF of , and we set . Note that in this case . Observe that computing and involves evaluating at most two terms, and hence the reduction is efficient.
It remains to argue that the reduction is correct.
Claim 43.
The following hold:
- 
i) 
and are defined everywhere;
 - 
ii) 
If was used as the premise of a rule, if and only if and ;
 - 
iii) 
If , then ;
 - 
iv) 
For a pair , if and only if .
 
Assuming the claim, the only solutions are proper sinks corresponding to falsified axioms of , which are weakenings of (falsified) axioms of . Hence, returns a correct solution to .
Proof of Claim..
The proof of this claim is, at heart, the same as the proof of the claim in Lemma 33. The behavior of both functions implies that the only solutions one might get in the instance are proper sinks and that these proper sinks can only be falsified axioms. Finally, when is a proof, and for any and since the graph representation of does not include cycles, and thus we would not have fake solutions corresponding to edges pointing backwards, making our formulation a valid -formulation.
6.3 Relationships in
In this subsection, we use the characterizations that we have constructed in order to prove all of the new inclusions in Figure 1. We begin by giving a proof of the unmetered source-of-DAG problem, which is equivalent to StrongAvoid. USoD is encoded propositionally by the conjunction of the following formulas:
- 
 
and . (1 is a sink);
 - 
 
for all . ( is not a source).
 
Proposition 44.
USoD has a -complexity -proof and so .
Proof.
The strategy for the proof is:
- 
i) 
Assume that for any ;
 - 
ii) 
From the fact that for all , deduce that . Indeed if all other nodes point to themselves, can not point to anything but itself since otherwise it would qualify as a source. We also derive during this process;
 - 
iii) 
Once this is done, we will be left with the fact that for each which is in direct contradiction with the second axiom.
 
For step (i), we introduce for each via the DNF creation rule. Now, fixing some such , for , we weaken to for each and consider the case . Since , the formula is a tautology, and therefore we can introduce it. For each we cut
Then, cutting
From we can deduce , completing step (ii).
Finally, we can perform step (iii) by cutting
The size of the proof and the characterization theorem shows that . Also, the equivalence gives us
The sink-of-DAG problem is the canonical -complete problem in which one is given a source of a DAG and one wants to find a sink. Our characterization of unary Sherali-Adams by StrongAvoid proceeded via the equivalent unmetered source-of-DAG problem. Hence, it is natural to also consider a metered version of these problem, where one is given a sink of a DAG and one wants to find a source.
Definition 45.
The Source of DAG (SoD) problem is defined as follows. The input is a “successor” function which defines a graph in which each vertex has fan-out but arbitrary fan-in. There is an edge from to if . A solution to the instance is:
- 
i) 
if ; ( has a backward edge)
 - 
ii) 
if for all , ; ( is not a sink)
 - 
iii) 
if for all , . (A source)
 
We can encode SoD propositionally as the conjunction of the following formulas:
- 
i) 
; ( is a proper sink)
 - 
ii) 
for each ; (no sources)
 - 
iii) 
for any pair of nodes . (no edges pointing backwards)
 
Proposition 46.
There is a -complexity proof of , and hence .
Proof.
The strategy of the proof is as follows:
- 
i) 
Given that for each , deduce that . This must be true since otherwise is a source.
 - 
ii) 
Use the fact that the derived formulas directly contradicts the first axiom.
 
For step (i), by induction assume that we have derived for each . Weaken these formulas to get and consider the case when . Since , the formula is a tautology that we introduce, and we cut
to obtain . Next, we cut
to derive . Fianlly, cut
hence .
Observe that these proofs indicate that up to complexifying a function, it is possible to build an inverse that is also hard to compute with an efficient reduction. Also, since we know how to transform refutations (resp. refutations) into -instances (resp. -instances), following the instructions lets us concretely build those inverses.
We end this section by proving several inclusions which do not rely on our characterizations.
Proposition 47.
.
Proof.
Let  be an LOP instance on . By encoding it with  variables such that, for ,  means , and  means , we can force the purported order to always be total. An output to the LOP instance would thus either be a -minimal element or a proof that  is not an order, i.e., that the transitivity does not hold.
Consider the  instance on  meta-nodes with a meta-node for each  with . Let  be the source. It helps to think of the meta-nodes as arranged in  levels, with the first element in the label being the level a meta-node is at.
The idea is that is valid (i.e., has an outgoing edge) iff is transitive and is the -minimal value in . If , it will point to , where if is still -minimal in , and otherwise. We now formally define the nodes with index . If , then it contains a single node that points to itself. Otherwise, there are two kinds of nodes:
- Transitivity nodes.
 - 
-many nodes verifying the transitivity of . Each of those nodes is associated with 3 distinct elements . We define as follows:
- 
 
Query , and . If the answers show that is not transitive on , point to .
 - 
 
Query . If it holds, point to . Otherwise, point to .
 
 - 
 
 - Validity nodes.
 - 
-many nodes verifying the validity of . Each of those nodes is associated with a value . We define as follows:
- 
 
Query . If it does not hold, point to .
 - 
 
Query . If it holds, point to ; otherwise, point to .
 
 - 
 
 
Since every node that points out of its index does the same query to decide where to point, the meta successor is well-defined. If is not transitive, every meta-node will point to itself. The solution can thus only be of type , with this node being of the transitive type. This immediately gives us a triple in , proving is not transitive. If is indeed a total order, then it is clear that every level has a single active node; the only proper sink on level indicates the -minimal value in .
Proposition 48.
.
Proof.
Let  be an SoD instance on  vertices. Consider an LOP instance  on  values split into two groups  and . We denote elements of  by  and elements of  by , for . The group ’s goal is to “check for backward pointers”; if the -minimal element is , then  points backwards. The group  checks for loops: if the -minimal element is , then there are no backward edges. Moreover, if , then  is not a proper sink. Otherwise,  is the first node (in regular order) to not point to itself in , i.e.,  is a source.
Formally, for , we define  as follows:
- 
 
iff ;
 - 
 
iff ;
 - 
 
iff either one of the following holds:
- 
i) 
, and ;
 - 
ii) 
and ;
 - 
iii) 
, and .
 
 - 
i) 
 
Observe that is total. If it is transitive, then the minimal element is either the first source in , or if it is not a proper sink. If it is not transitive, the minimal element allows us to find a backward pointer. Theorem 1 in [14] proves that ; we prove that actually . As it is straightforward that SourceofDag reduces to UnmeteredSourceofDag, which is equivalent to empty, this implies that every class studied in this paper, apart from , contains .
Proposition 49.
.
Proof.
Let be an instance of , an problem, and let be its set of solutions. By definition of , this set is of size at most quasipolynomial in . Consider the SoD instance with nodes. Consider the extra node as . To define , run the verifier . If it accepts, point to ; otherwise, point to itself.
Any solution for the input will then point to , making it a source. The case where is not a proper sink may occur only if does not admit an output.
7 Characterizing Bounded-Depth Frege
In this section we prove Theorem 6, introducing a hierarchy of classes in the polynomial hierarchy which characterize bounded-depth Frege systems. Depth- Frege generalizes resolution to allow one to cut (resolve) over depth formulas of unbounded fanin. Recall that the depth of a formula is the length of the longest root-to-leaf path, and the size is the number of wires in the formula. The width of a -formula is defined as the maximum fanin among the gates at depth . From now on and for the remainder of this section, we assume .
Definition 50.
A Frege proof of an unsatisfiable formula is a sequence of formulas, where each is deduced from the previously derived formulas by one of the following rules:
- 
 
Axiom Introduction. Introduce for some .
 - 
 
Cut. From and derive for any formula .
 - 
 
Weakening. From derive for any formula .
 
The depth (resp. width) of a Frege proof is the maximum depth (resp width) among any of the formulas . In particular, we say that is a depth- Frege (which we denote Freged) proof if each is a -formula. The size of the proof is . The complexity of a Freged proof is , and the complexity of proving an unsatisfiable formula in Freged is the minimum complexity of any Freged proof of .
Our characterization will generalize our characterization of - by (Theorem 5). The high-level idea is to obfuscate the successor function of the problem Iter so that it is efficiently computable with access to a oracle, but not obviously efficiently computable with any weaker oracle. For , this was accomplished by replacing each node of Iter with a group of nodes , each with their own successor function, pointing to a “meta-node” in . We then treated as pointing to a meta-node iff all of pointed to . To generalize this to a problem in the layer of the polynomial hierarchy, which we call , we will take a slightly different approach. We will still replace the “meta-nodes” of Iter with groups of nodes – in fact, this is recursively repeated times in order to simulate alternating quantifiers – however, we will no longer insist that they all point to the same node. Instead, the successor will be defined by alternatively taking the minimum (corresponding to universal quantifiers) or maximum (corresponding to existential quantifiers) of the pointed-to nodes. The intuition is that the evaluation of an existentially quantified relation is true if some value of makes true, hence we should take the maximum value of over all . Similarly, the evaluation of universally quantified relation should be false unless every assignment makes output true, and so this corresponds to a minimum value of over all . This is inspired by the problems and from [23], which characterize the consequences of in bounded arithmetic.
For an integer , a product set , and a function we will denote by
if is odd, and if is even, we change the final or to its opposite. We now formalize the aforementioned intuition about the connection between quantifiers (that is, gates) and which will allow us to connect our Frege proofs to
Observation 51.
Let , where and each is a formula. Then, for any assignment , , where . Similarly, if instead begins with , then .
Proof.
The main idea is depicted Figure 3. The proof is by induction on the depth , observing that a disjunction returns the maximum value of its subformulas, while a conjunction returns the minimum value.
Definition 52.
An instance of is given by a successor function that describes a directed graph on vertices as follows. For , let denote the function where the first input is fixed to , let , and define the meta-pointer as
There is an edge from to in this graph if . A solution to is then a solution to the Iter instance defined by . In particular, a solution is a quadruple such that and either
- 
i) 
( is not a source);
 - 
ii) 
( admits a backward pointer);
 - 
iii) 
and ( is a proper sink);
 
and and witness the outermost minimums for and : if is even
and if is odd the last is replaced by a .
The class is the class of problems that admit an efficient reduction to .
One should think of the indices and in a solution to as the outer-most existential in -certificates of the computation of the successor functions for and . One reason that this problem is hard is that for the solutions where , the verifier must be able check that and or, in other words, it must be able to verify that the certificates and indeed witness a correct computation for their respective input nodes.
Proposition 53.
for all .
Proof.
Let us assume is even; the case when is odd is identical up to changing the final into a . Let be an instance of and be a solution. Writing , checking that is equivalent to checking that
Our polynomial-time verifier , given witnesses , , , , , behaves as follows:
- 
i) 
It checks that and ; if not, it outputs 333Here, denotes the concatonation of with .;
 - 
ii) 
It outputs if or ;
 - 
iii) 
Otherwise, it checks whether and ; if this is the case then it outputs , and otherwise it outputs .
 
Observe that the expression
is true iff is a solution to .
7.1 Proofs as Games
To establish the correspondence between bounded-depth Frege and it will be useful to view proofs as games. The depth- Prover-Delayer game (essentially also known as the Buss-Pudlák game [22]) for an unsatisfiable formula consists of two players, Prover and Delayer. Intuitively, the Prover is attempting to convince itself that is unsatisfiable, while the Delayer is trying to postpone this. The game proceeds in rounds, where in each round the Prover asks for the value of an arbitrary formula and the delayer responds with an answer – either (in which case the Prover remembers ) or (and the Prover remembers ). Finally, at the end of each round the Prover may forget any number of formulas from its memory. The game ends when the set of -assignments consistent with the Prover’s memory all falsify some axiom . That is, when the conjunction of the formulas in the Prover’s memory logically imply .
Definition 54.
Let be an unsatisfiable formula. A Prover strategy is a rooted fan-out DAG in which every node is labeled with a set of boolean formulas , which we call the memory at node . Let be the set of assignments which falsify all of the formulas. The labels satisfy the following:
- 
 
root. If is the root then ;
 - 
 
single child. If has one child then for some formula ;
 - 
 
two children. If has two children , then and for some formula ;
 - 
 
leaf. If has no children, then there is some for such that for all .
 
The width of the strategy is given by and its depth is given by – the off-by-one is to account for the fact that, as we will see, the conjunction of the formulas in memory will correspond to a line in Frege proof. The size of the strategy is .
As for the original Prover-Delayer game for the resolution proof system and the Buss-Pudlák game for bounded-depth Frege proofs, finding a strategy for a formula closely relates to finding a refutation.
Lemma 55.
Let be an unsatisfiable -formula. There exists a width- and size- Freged refutation of iff there is a width-, depth-, and size- Prover strategy for .
Proof.
Let be a Freged proof of . The graph of the Prover strategy will be the same as that of the proof. Beginning at the root , where , the Prover’s memory is constructed as follows: let be a node with memory ; we have several cases based on the rule used to derive the corresponding line .
- 
 
If was obtained by weakening with a formula , then . That is, the Prover forgets .
 - 
 
If was obtained by cutting and on a formula , then and . That is, the Prover queries the Delayer for the value of .
 - 
 
If was obtained by axiom introduction, then is a leaf.
 
By induction, observe that the conjunction of the formulas in logically implies , and hence the leaf case is satisfied. The width and size of the strategy are the same as the proof. The fact that is a Freged refutation (meaning that is always a -formula), gives us the depth of the strategy to be .
For the converse direction, a Prover strategy can be converted into a Frege proof by replacing each memory with the line . As each formula in memory is a or a -formula, the lines of this proof are -formulas and the proof is a Freged proof of with the same width and size as the strategy.
As seen in Section 5, for a proof system to correspond to a class it must be reduction closed. We verify that Freged satisfies this property.
Lemma 56.
Let and be unsatisfiable -formulas on variables, and suppose that there is a width- and size- Freged proof of . If is an -formulation of of depth , then has a -Freged refutation of size and width .
Proof.
Let be a size-, Freged proof of . First, we modify to be a proof of , where is the obtained by replacing each variable with the propositionalization of decision tree as defined in the reduced formula. To do so, we will view as a Prover strategy and replace each memory by . That is, instead of querying , the prover will now query the formula .
We now transform this into a Prover strategy, and hence proof, of , which is a -weakening of . To do so, consider any leaf of the Prover strategy labeled by some (corresponding to the Prover learning that is falsified). At this leaf the Prover queries the decision tree , one variable at a time. Each leaf is labeled with for some path ; an axiom of the formula of .
7.2 Chracterizing PLSd
Now we are ready to prove our characterization Theorem 6, which we state formally next.
Theorem 57.
For any , there is a complexity- -formulation of iff there is a complexity- -Freged refutation of .
We will break the theorem into two lemmas, Lemma 58 transforming Frege proofs into -formulations, and Lemma 60 together with Lemma 56 providing the converse.
Lemma 58.
Let be an unsatisfiable formula on variables. Suppose that there is a width- and size- -Freged proof of . Then admits an -formulation of size and depth .
Proof.
Let be a Freged refutation of size and width , and suppose that it is ordered in reverse topological order so that . At a high level the meta-pointer of the formula will trace a path from the root to a falsified axiom of the proof by always pointing a node , for which is false under the given assignment , to a falsified child which is guaranteed to exist by the soundness of the proof. If is false and was derived by cutting on and then should point to the child or that is falsified. To determine which of is falsified, we need to evaluate , and . Hence, we need to ensure that the size of the domain of the successor is large enough. A simple way to do so is to pre-process our proof into a proof as follows: if was derived by cutting and , then replace . Now, let be the maximum fanin at layer of any line in the proof . By padding (with, for example, or ) we may assume that every line in has the same fanin at each layer. That is,
where is a fanin- clause if and a fanin- term if . Let .
For any assignment the successor function of our instance is defined as:
- 
 
Axiom Introduction. If is an axiom then ;
 - 
 
Weakening. If is a weakening of then if and otherwise.
 - 
 
Cut. If was derived by cutting and then
- 
i) 
If is a subformula belonging to or then if and otherwise.
 - 
ii) 
is a subformula belonging to then if and otherwise.
 
 - 
i) 
 
Observe that have width and so can be evaluated by a depth- decision tree querying the variables . Finally, for each solution , the output decision tree is the constant function which returns .
The following claim asserts the correctness of the formula, completing the proof.
Claim 59.
The meta-pointer , defined from , satisfies the following properties:
- 
i) 
for any ;
 - 
ii) 
If is such that is not an axiom, then iff (recall that belongs to the proof before pre-processing);
 - 
iii) 
For any , if then .
 
Proof of Claim..
We will consider cases based on how was derived. If was deduced by axiom introduction then the claim holds by definition. If was derived by weakening , then re-parameterize the formula and let be with the first input fixed to . Then, noting that the definition of the successor in the case of weakening is equivalent to , we have
| (Observation 51) | ||||
where the switched to a because . The final equality is equivalent to
Thus, the claim holds when was derived by weakening. Finally, consider the case when was derived by cutting and . Denote by and . By partitioning the indices in this way, we will enforce that the subformulas with indices in belong to , and the remaining belong to ; that is, we take the convention that all subformulas of have index . Then,
| (Observation 51) | ||||
where we have swapped s and s using that . That is,
It follows that the claim holds in the case of the cut rule.
We now turn to establishing the forward direction of Theorem 57, converting -formulations into -Freged proofs. As observed in Lemma 56, -Freged is reduction closed. Hence, in order to establish the forward direction of Theorem 57, it suffices to show that Freged has efficient proofs of the propositional encoding of , which we describe next.
The Iterd Formula.
For simplicity (by padding) we may assume without loss of generality that in the definition of , . Our formula will be over -ary variables for and ; this may be encoded by -many binary variables which spell out the binary encoding of the value of . In particular, if has binary expansion , then the formula with the notation that and for any variable . Similarly, we write , where the negation is propagated to the literals. As well, for denote by the formula
If is odd, and
If is even.
It states that by asserting that either is not a certificate of computation for (left-hand side of the disjunction) or that the minimum is greater than (right-hand side of the disjunction). These are -formulas.
The formula is the conjunction of the following:
- 
i) 
for each , ( is a source)
 - 
ii) 
for each pair of nodes and index , (No backwards pointer)
 - 
iii) 
for each with . (No proper sinks)
 
Lemma 60.
There is a size- and width- Freged proof of .
For nodes and an index , it will be convenient to denote by the formula
which encodes that is less than or equal to . These are -formulas that will be used as cuts in the proof (or queries in the Prover’s strategy).
Proof.
We give a Prover strategy for . The idea of the strategy is as follows: the Prover will begin at the root node and will traverse the successor until they reach a solution (either points to itself, points to with , or is a proper sink). To achieve this, at each node , the Prover tries to determine the value of . They are unable to do so directly, as this would require the Prover to query a formula of depth . Instead, they determine the value of via an auction procedure, which we describe below. Once the Prover has determined such that , then either the Prover has found a solution, or otherwise the Prover forgets everything except the information necessary to infer , and queries the Delayer via the auction procedure to learn the value of . At each step, the Prover has in memory the value of for at most two nodes .
The Auction Procedure. The procedure determines a value so that is the only value compatible with the answers given by the Delayer. The procedure is in rounds . At each round the Prover queries the formula for and reacts in the following way to the answers of the Delayer:
- Round :
 - 
As soon as the Delayer answers for some , the Prover forgets all of the previously-learned formulas of the form for , retains in memory the formula , and moves to the round . If the Delayer answers to all , then the Prover knows that .
 - Round :
 - 
By induction the Prover’s memory consists only of for some . Hence, the Prover knows that , and it would like to determine whether or . As soon as the Delayer answers to the queries made during this round, for some , the Prover retains in memory only the formula , forgetting the formulas for all and . They then move to round if or halt if , as this implies that .
If the Delayer answers to all , then the Prover’s memory contains and for all , which implies that . The Prover then halts the auction procedure, keeping its memory as is.
 
Observe that there are at most -many possible states in any auction procedure. The memory of each state contains at most -many formulas, and each formula has size  and width . Hence the size of each auction phase is at most .
With the auction procedure in place, we are ready to describe the Prover strategy in detail. Beginning with the node , the Prover determines a node  such that  via the auction procedure.
- 
 
If : the Prover halts;
 - 
 
If : the Prover forgets everything in memory except for the formulas determining that and halts.
 - 
 
If , then prior to computing , the Prover’s memory already contains formulas which enforce that for some , hence they have found a solution and they halt.
 - 
 
If then the Prover had in its memory the formulas determining that for some . They forget these equalities which are not relevant to enforcing that , and the Prover moves to node .
 
This process terminates as the current node increases by at least at each step. We now calculate the number of possible states (and hence the number of lines in the corresponding Freged proof). As the auction procedure is performed once per round, and there are at most -many choices for the memory at each round (corresponding to the value of and the node pointing to ), the total size of the strategy is at most , which is where is the number of variables of the formula.
It remains to argue that this is a valid strategy for the Prover; that is, when the Prover halts, at least one axiom of the formula is violated by all assignments which satisfy their memory. There are several cases based on the reason for halting:
- 
 
If : then the memory contains for some . This is incompatible with the axiom .
 - 
 
If : there are two possibilities based on the value of . If , then the memory contains for some , contradicting the axiom . Otherwise, if then the memory contains for all and for some , contradicting the axiom .
 - 
 
If : then there are two cases based on whether . If then the memory contains and for some along with the formulas and for all . This contradicts the axiom .
Otherwise, the memory contains and for all which contradicts the axiom for all values of and . Indeed, for any node , if then will always be an argument of the minimum, regardless of its value.
 
Hence, the Prover strategy is correct.
References
- [1] Albert Atserias and Massimo Lauria. Circular (yet sound) proofs in propositional logic. ACM Trans. Comput. Log., 24(3):20:1–20:26, 2023. doi:10.1145/3579997.
 - [2] Paul Beame, Stephen A. Cook, Jeff Edmonds, Russell Impagliazzo, and Toniann Pitassi. The relative complexity of NP search problems. J. Comput. Syst. Sci., 57(1):3–19, 1998. doi:10.1006/jcss.1998.1575.
 - [3] Arnold Beckmann and Samuel R. Buss. Polynomial local search in the polynomial hierarchy and witnessing in fragments of bounded arithmetic. Journal of Mathematical Logic, 09(01):103–138, 2009. doi:10.1142/S0219061309000847.
 - [4] Olaf Beyersdorff. Proof complexity of quantified boolean logic–a survey. Mathematics for Computation (M4C), pages 353–391, 2022.
 - [5] Sam Buss, Noah Fleming, and Russell Impagliazzo. TFNP characterizations of proof systems and monotone circuits. In Yael Tauman Kalai, editor, 14th Innovations in Theoretical Computer Science Conference, ITCS 2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, USA, volume 251 of LIPIcs, pages 30:1–30:40. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.ITCS.2023.30.
 - [6] Samuel R. Buss, Leszek Aleksander Kolodziejczyk, and Neil Thapen. Fragments of approximate counting. J. Symb. Log., 79(2):496–525, 2014. doi:10.1017/jsl.2013.37.
 - [7] Lijie Chen, Shuichi Hirahara, and Hanlin Ren. Symmetric exponential time requires near-maximum circuit size. In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 1990–1999. ACM, 2024. doi:10.1145/3618260.3649624.
 - [8] Ben Davis and Robert Robere. Colourful TFNP and propositional proofs. In Amnon Ta-Shma, editor, 38th Computational Complexity Conference, CCC 2023, July 17-20, 2023, Warwick, UK, volume 264 of LIPIcs, pages 36:1–36:21. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.CCC.2023.36.
 - [9] Noah Fleming, Stefan Grosser, Toniann Pitassi, and Robert Robere. Black-box PPP is not turing-closed. In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 1405–1414. ACM, 2024. doi:10.1145/3618260.3649769.
 - [10] Noah Fleming, Pravesh Kothari, and Toniann Pitassi. Semialgebraic proofs and efficient algorithm design. Found. Trends Theor. Comput. Sci., 14(1-2):1–221, 2019. doi:10.1561/0400000086.
 - [11] Mika Göös, Alexandros Hollender, Siddhartha Jain, Gilbert Maystre, William Pires, Robert Robere, and Ran Tao. Further collapses in TFNP. Electron. Colloquium Comput. Complex., TR22-018, 2022. URL: https://eccc.weizmann.ac.il/report/2022/018.
 - [12] Mika Göös, Alexandros Hollender, Siddhartha Jain, Gilbert Maystre, William Pires, Robert Robere, and Ran Tao. Separations in proof complexity and TFNP. CoRR, abs/2205.02168, 2022. doi:10.48550/arXiv.2205.02168.
 - [13] Mika Göös, Pritish Kamath, Robert Robere, and Dmitry Sokolov. Adventures in monotone complexity and TFNP. In Avrim Blum, editor, 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, January 10-12, 2019, San Diego, California, USA, volume 124 of LIPIcs, pages 38:1–38:19. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2019. doi:10.4230/LIPIcs.ITCS.2019.38.
 - [14] Robert Kleinberg, Oliver Korten, Daniel Mitropolsky, and Christos H. Papadimitriou. Total functions in the polynomial hierarchy. In James R. Lee, editor, 12th Innovations in Theoretical Computer Science Conference, ITCS 2021, January 6-8, 2021, Virtual Conference, volume 185 of LIPIcs, pages 44:1–44:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPICS.ITCS.2021.44.
 - [15] Leszek Aleksander Kolodziejczyk and Neil Thapen. Approximate counting and NP search problems, 2021.
 - [16] Oliver Korten. The hardest explicit construction. In 62nd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2021, Denver, CO, USA, February 7-10, 2022, pages 433–444. IEEE, 2021. doi:10.1109/FOCS52979.2021.00051.
 - [17] Oliver Korten and Toniann Pitassi. Strong vs. weak range avoidance and the linear ordering principle. In 65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024, pages 1388–1407. IEEE, 2024. doi:10.1109/FOCS61266.2024.00089.
 - [18] Jan Krajícek, Alan Skelley, and Neil Thapen. NP search problems in low fragments of bounded arithmetic. J. Symb. Log., 72(2):649–672, 2007. doi:10.2178/JSL/1185803628.
 - [19] Yuhao Li, William Pires, and Robert Robere. Intersection classes in TFNP and proof complexity. In Venkatesan Guruswami, editor, 15th Innovations in Theoretical Computer Science Conference, ITCS 2024, January 30 to February 2, 2024, Berkeley, CA, USA, volume 287 of LIPIcs, pages 74:1–74:22. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.ITCS.2024.74.
 - [20] Zeyong Li. Symmetric exponential time requires near-maximum circuit size: Simplified, truly uniform. In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 2000–2007. ACM, 2024. doi:10.1145/3618260.3649615.
 - [21] Pavel Pudlák. On the complexity of finding falsifying assignments for herbrand disjunctions. Arch. Math. Log., 54(7-8):769–783, 2015. doi:10.1007/S00153-015-0439-6.
 - [22] Pavel Pudlák and Samuel R. Buss. How to lie without being (easily) convicted and the length of proofs in propositional calculus. In Leszek Pacholski and Jerzy Tiuryn, editors, Computer Science Logic, 8th International Workshop, CSL ’94, Kazimierz, Poland, September 25-30, 1994, Selected Papers, volume 933 of Lecture Notes in Computer Science, pages 151–162. Springer, 1994. doi:10.1007/BFB0022253.
 - [23] Pavel Pudlák and Neil Thapen. Alternating minima and maxima, nash equilibira and bounded arithmetic. Annals of Pure and Applied Logic, 72:604–614, 2012. doi:10.1016/J.APAL.2011.06.014.
 - [24] Alan Skelley and Neil Thapen. The provably total search problems of bounded arithmetic. Proceedings of the London Mathematical Society, 103(1):106–138, 2011.
 - [25] Neil Thapen. How to fit large complexity classes into TFNP. CoRR, 2024. doi:10.48550/arXiv.2412.09984.
 
