On the Consistency of Circuit Lower Bounds
for Non-Deterministic Time111An extended abstract of part of this work appeared as [2].

Albert Atserias222Universitat Politècnica de Catalunya i Centre de Recerca Matemàtica, Barcelona, Spain. Supported in part by Project PID2019-109137GB-C22 (PROOFS) and the Severo Ochoa and María de Maeztu Program for Centers and Units of Excellence in R&D (CEX2020-001084-M) of the Spanish State Research Agency.    Sam Buss333University of California, San Diego, USA. Supported in part by Simons Foundation grant 578919.
   Moritz Müller444Universität Passau, Passau, Germany.
Abstract

We prove the first unconditional consistency result for superpolynomial circuit lower bounds with a relatively strong theory of bounded arithmetic. Namely, we show that the theory 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} is consistent with the conjecture that 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}, i.e., some problem that is solvable in non-deterministic exponential time does not have polynomial size circuits. We suggest this is the best currently available evidence for the truth of the conjecture. The same techniques establish the same results with 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP} replaced by the class of problems decidable in non-deterministic barely superpolynomial time such as 𝖭𝖳𝖨𝖬𝖤(nO(logloglogn))𝖭𝖳𝖨𝖬𝖤superscript𝑛𝑂𝑛\mathsf{NTIME}(n^{O(\log\log\log n)}). Additionally, we establish a magnification result on the hardness of proving circuit lower bounds.

1 Introduction

Bounded arithmetics are fragments of Peano arithmetic that formalize reasoning with concepts and constructions of bounded computational complexity. Their language is tailored so that natural classes of bounded formulas define important complexity classes. For example, the set of all bounded formulas defines precisely the problems in 𝖯𝖧𝖯𝖧\mathsf{PH} and the set of Σ1bsubscriptsuperscriptΣ𝑏1\Sigma^{b}_{1}-formulas those in 𝖭𝖯𝖭𝖯\mathsf{NP}. The central theories are comprised in Buss’ hierarchy [6]

𝖲21𝖳21𝖲22𝖳22𝖳2𝖵20𝖵21subscriptsuperscript𝖲12subscriptsuperscript𝖳12subscriptsuperscript𝖲22subscriptsuperscript𝖳22subscript𝖳2subscriptsuperscript𝖵02subscriptsuperscript𝖵12\textstyle\mathsf{S}^{1}_{2}\subseteq\mathsf{T}^{1}_{2}\subseteq\mathsf{S}^{2}_{2}\subseteq\mathsf{T}^{2}_{2}\subseteq\cdots\subseteq\mathsf{T}_{2}\subseteq\mathsf{V}^{0}_{2}\subseteq\mathsf{V}^{1}_{2} (1)

The theory 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} can be understood as formalizing 𝖯𝖯\mathsf{P}-reasoning, and 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2} as formalizing 𝖤𝖷𝖯𝖤𝖷𝖯\mathsf{EXP}-reasoning. The levels of 𝖳2subscript𝖳2\mathsf{T}_{2} are determined by induction schemes for properties of bounded computational complexity. E.g., 𝖳21subscriptsuperscript𝖳12\mathsf{T}^{1}_{2} has induction for 𝖭𝖯𝖭𝖯\mathsf{NP}, and 𝖳2subscript𝖳2\mathsf{T}_{2} for 𝖯𝖧𝖯𝖧\mathsf{PH}. Intuitively, these theories can construct and reason with polynomially large objects of various computational complexities. The theories 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} and 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2} are extensions with a second sort of variables ranging over bounded sets of numbers and are given by comprehension schemes. Intuitively, these sets represent exponentially large objects.

Low levels of the bounded arithmetic hierarchy formalize a considerable part of contemporary complexity theory. This includes some advanced topics such as the Arthur-Merlin hierarchy [17], hardness amplification [16], Toda’s theorem [7], and the PCP Theorem [30]. We refer to [26, Section 5] for a list of successful formalizations. Concerning circuit complexity, the topic of this paper, Jeřábek proved that his theory of approximate counting [15, 16, 17], which sits below 𝖳22subscriptsuperscript𝖳22\mathsf{T}^{2}_{2}, formalizes Rabin’s primality test, and proves that it is in 𝖯/𝗉𝗈𝗅𝗒𝖯𝗉𝗈𝗅𝗒\mathsf{P/poly} [16, Example 3.2.10, Lemma 3.2.9]. Concerning lower bounds, many of the known (weak) circuit lower bounds can be formalized in a theory of approximate counting [26] and thus also in the theory 𝖳22subscriptsuperscript𝖳22\mathsf{T}^{2}_{2}. For example, the 𝖠𝖢0superscript𝖠𝖢0\mathsf{AC}^{0} lower bound for parity has been formalized in [26, Theorem 1.1] via probabilistic reasoning with Furst, Saxe and Sipser’s random restrictions [13], and in [22, Theorem 15.2.3] via Razborov’s [32] proof of Håstad’s switching lemma.

Razborov asked in his seminal work from 1995 for the “right fragment capturing the kind of techniques existing in Boolean complexity” [32, p.344]. Showing that any theory that is strong enough to capture these techniques cannot prove lower bounds for general circuits would give a precise sense in which current techniques are insufficient. This however seems to be very difficult. We refer to [34, Introduction] or [23, Ch.27-30] for a description of the resulting research program, and to [31] for a recent result.

In contrast to unprovability, the first and final words of Krajíček’s 1995 monograph [22] ask for consistency results555The citations to follow refer not to circuit lower bounds but to 𝖯𝖭𝖯𝖯𝖭𝖯\mathsf{P}\not=\mathsf{NP}., namely to prove the conjecture in question “for nonstandard models of systems of bounded arithmetic”. These are “not ridiculously pathological structures, and a part of the difficulty in constructing them stems exactly from the fact that it is hard to distinguish these structures, by the studied properties, from natural numbers” [22, p.xii]. In particular, showing that a given conjecture is consistent with certain bounded arithmetics, already low ones, would exhibit a world where both the conjecture and a considerable part of complexity theory are true.

We therefore interpret consistency results as giving precise evidence for the truth of the conjecture. This is without doubt preferable to appealing to intuitions, or alluding to the experience that the conjectures appear to be theoretically coherent, exactly because a consistency result gives a precise meaning to this coherence.

1.1 Previous consistency results

Being well motivated, consistency results are also hard to come by, and not much is known. In particular, it is unknown whether 𝖭𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NP}\not\subseteq\mathsf{P/poly} is consistent with 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}.

It is not straightforward to formalize 𝖭𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NP}\not\subseteq\mathsf{P/poly} because exponentiation is not provably total in bounded arithmetics. On the formal level, call a number n𝑛n small if 2nsuperscript2𝑛2^{n} exists. A size-ncsuperscript𝑛𝑐n^{c} circuit can be coded by a binary string of length at most 10nclog(nc)10superscript𝑛𝑐superscript𝑛𝑐10\cdot n^{c}\cdot\log(n^{c}), and hence by a number below 210nclog(nc)superscript210superscript𝑛𝑐superscript𝑛𝑐2^{10\cdot n^{c}\cdot\log(n^{c})}; this bound exists for small n𝑛n.

On the formal level, an 𝖭𝖯𝖭𝖯\mathsf{NP}-problem is represented by a Σ1bsubscriptsuperscriptΣ𝑏1\Sigma^{b}_{1}-formula φ(x)𝜑𝑥\varphi(x). A sentence expressing that the problem defined by φ(x)𝜑𝑥\varphi(x) has size ncsuperscript𝑛𝑐n^{c} circuits looks as follows:

αφc:=n𝐿𝑜𝑔>1C<2ncx<2n(C(x)=1φ(x)).\alpha^{c}_{\varphi}:=\ \forall n{\in}\mathit{Log}_{>1}\ \exists C{<}2^{n^{c}}\ \forall x{<}2^{n}\ (C(x){=}1\leftrightarrow\varphi(x)).

Here, the quantifier on n𝑛n ranges over small numbers above 111. We think of the quantifier on C𝐶C as ranging over circuits of encoding-size ncsuperscript𝑛𝑐n^{c}, and of the quantifier on x𝑥x as ranging over length n𝑛n binary strings. Counting the \exists hidden in φ𝜑\varphi, this is a bounded for-allfor-all\forall\exists\forall\exists-sentence (namely a Σ3bfor-allsubscriptsuperscriptΣ𝑏3\forall\Sigma^{b}_{3}-sentence).

Now more precisely, the central question whether 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} is consistent with 𝖭𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NP}\not\subseteq\mathsf{P/poly} asks for a Σ1bsubscriptsuperscriptΣ𝑏1\Sigma^{b}_{1}-formula φ(x)𝜑𝑥\varphi(x) such that 𝖲21+{¬αφcc}subscriptsuperscript𝖲12conditional-setsubscriptsuperscript𝛼𝑐𝜑𝑐\mathsf{S}^{1}_{2}+\big{\{}\neg\alpha^{c}_{\varphi}\mid c\in\mathbb{N}\big{\}} is consistent. As mentioned a model witnessing this consistency would be a world where a considerable part of complexity theory is true and the 𝖭𝖯𝖭𝖯\mathsf{NP}-problem defined by φ𝜑\varphi does not have polynomial-size circuits. This is faithful in that there also exists an 𝖭𝖯𝖭𝖯\mathsf{NP}-machine M𝑀M that cannot be simulated by small circuits in the model. Namely, 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} proves that φ(x)𝜑𝑥\varphi(x) is equivalent to a formula

y<2ndy is an accepting computation of M on x𝑦superscript2superscript𝑛𝑑y is an accepting computation of M on x\exists y{<}2^{n^{d}}\textit{``$y$ is an accepting computation of $M$ on $x$''} (2)

for a suitable 𝖭𝖯𝖭𝖯\mathsf{NP}-machine M𝑀M, namely a model-checker for φ𝜑\varphi. Here, the constant d𝑑d stems from the polynomial running time of M𝑀M. We write αMc:=αφcassignsubscriptsuperscript𝛼𝑐𝑀subscriptsuperscript𝛼𝑐𝜑\alpha^{c}_{M}:=\alpha^{c}_{\varphi} for φ(x)𝜑𝑥\varphi(x) equal to (2). One can also fix the machine M𝑀M in advance to a universal one, namely a model-checker Msuperscript𝑀M^{*} for an 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}-provably 𝖭𝖯𝖭𝖯\mathsf{NP}-complete problem (e.g., 𝖲𝖠𝖳𝖲𝖠𝖳\mathsf{SAT}).

The predominant approach to the consistency of circuit lower bounds is based on witnessing theorems: a proof of αMcsubscriptsuperscript𝛼𝑐𝑀\alpha^{c}_{M} in some bounded arithmetic implies a low-complexity algorithm that computes a witness C𝐶C from 1nsuperscript1𝑛1^{n}. E.g., if the theory has feasible witnessing in 𝖯𝖯\mathsf{P}, then it does not prove αφcsubscriptsuperscript𝛼𝑐𝜑\alpha^{c}_{\varphi} for any c𝑐c unless the problem defined by φ(x)𝜑𝑥\varphi(x) is in 𝖯𝖯\mathsf{P}. However, 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} is only known to have feasible witnessing in 𝖯𝖯\mathsf{P} for bounded for-all\forall\exists-sentences and αφcsubscriptsuperscript𝛼𝑐𝜑\alpha^{c}_{\varphi} is a for-allfor-all\forall\exists\forall\exists-sentence.

Fortunately, a self-reducibility argument implies that the quantifier complexity of this formula can be reduced. Up to suitable changes of c𝑐c, the formula αMcsubscriptsuperscript𝛼𝑐superscript𝑀\alpha^{c}_{M^{*}} is 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}-provably equivalent to the following sentence of lower quantifier complexity:

βMc:=n𝐿𝑜𝑔>1C<2ncD<2ncx<2ny<2nd(C(x)=0¬y is an accepting computation of M on x)(C(x)=1D(x) is an accepting computation of M on x),subscriptsuperscript𝛽𝑐superscript𝑀assignfor-all𝑛subscript𝐿𝑜𝑔absent1𝐶superscript2superscript𝑛𝑐𝐷superscript2superscript𝑛𝑐for-all𝑥superscript2𝑛for-all𝑦superscript2superscript𝑛𝑑missing-subexpressionmissing-subexpressionlimit-from𝐶𝑥0y is an accepting computation of M on xmissing-subexpressionmissing-subexpression𝐶𝑥1D(x) is an accepting computation of M on x\begin{array}[]{lcl}\beta^{c}_{M^{*}}&:=&\forall n{\in}\mathit{Log}_{>1}\ \exists C{<}2^{n^{c}}\ \exists D{<}2^{n^{c}}\ \forall x{<}2^{n}\ \forall y{<}2^{n^{d}}\\ &&\quad(C(x){=}0\to\neg\textit{``$y$ is an accepting computation of $M^{*}$ on $x$''})\ \wedge\\ &&\quad(C(x){=}1\to\textit{``$D(x)$ is an accepting computation of $M^{*}$ on $x$''}),\end{array}

where d𝑑d stems from the polynomial runtime of Msuperscript𝑀M^{*}. We define

𝖭𝖯𝖯/𝗉𝗈𝗅𝗒:={¬βMcc}.assign𝖭𝖯𝖯/𝗉𝗈𝗅𝗒conditional-setsubscriptsuperscript𝛽𝑐superscript𝑀𝑐\textit{``$\mathsf{NP}\not\subseteq\mathsf{P/poly}$''}\ :=\ \big{\{}\neg\beta^{c}_{M^{*}}\mid c\in\mathbb{N}\big{\}}.

Note, βMcsubscriptsuperscript𝛽𝑐superscript𝑀\beta^{c}_{M^{*}} is a bounded for-allfor-all\forall\exists\forall-sentence (namely a Σ2bfor-allsubscriptsuperscriptΣ𝑏2\forall\Sigma^{b}_{2}-sentence). For such sentences, 𝖲22subscriptsuperscript𝖲22\mathsf{S}^{2}_{2} has feasible witnessing in 𝖯𝖭𝖯superscript𝖯𝖭𝖯\mathsf{P}^{\mathsf{NP}} [6], and 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} has feasible witnessing by certain interactive polynomial-time computations [21]. This was exploited by Cook and Krajíček [12] to prove666𝖯tt𝖭𝖯subscriptsuperscript𝖯𝖭𝖯tt\mathsf{P}^{\mathsf{NP}}_{\mathrm{tt}} denotes polynomial time with non-adaptive queries to an 𝖭𝖯𝖭𝖯\mathsf{NP}-oracle. In [12] a distinct but similar formalization of 𝖭𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NP}\not\subseteq\mathsf{P/poly} is used. that 𝖭𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NP}\not\subseteq\mathsf{P/poly} is consistent with 𝖲22subscriptsuperscript𝖲22\mathsf{S}^{2}_{2} unless 𝖯𝖧𝖯𝖭𝖯𝖯𝖧superscript𝖯𝖭𝖯\mathsf{PH}\subseteq\mathsf{P}^{\mathsf{NP}}, and with 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} unless 𝖯𝖧𝖯tt𝖭𝖯𝖯𝖧subscriptsuperscript𝖯𝖭𝖯tt\mathsf{PH}\subseteq\mathsf{P}^{\mathsf{NP}}_{\mathrm{tt}}. Since the complexity of witnessing increases with the strength of the theory, it seems questionable whether this method yields insights for much stronger theories: by the Karp-Lipton Theorem [19]𝖯𝖧𝖭𝖯𝖭𝖯not-subset-of-or-equals𝖯𝖧superscript𝖭𝖯𝖭𝖯\mathsf{PH}\not\subseteq\mathsf{NP}^{\mathsf{NP}} implies that 𝖭𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NP}\not\subseteq\mathsf{P/poly} is true, and true sentences are consistent with any true theory. Moreover, the focus of this work is on unconditional consistency results.

Using similar methods, a recent line of works [24, 8, 9, 10] achieved unconditional consistency results for fixed-polynomial lower bounds, even for 𝖯𝖯\mathsf{P} instead of 𝖭𝖯𝖭𝖯\mathsf{NP} (based on [36]). For example, the main result in [8] implies that 𝖲22+¬αφcsubscriptsuperscript𝖲22superscriptsubscript𝛼𝜑𝑐\mathsf{S}^{2}_{2}+\neg\alpha_{\varphi}^{c} and 𝖲21+¬αψcsubscriptsuperscript𝖲12superscriptsubscript𝛼𝜓𝑐\mathsf{S}^{1}_{2}+\neg\alpha_{\psi}^{c} are consistent for certain formulas φ(x)𝜑𝑥\varphi(x) and ψ(x)𝜓𝑥\psi(x) that define problems in 𝖯𝖭𝖯superscript𝖯𝖭𝖯\mathsf{P}^{\mathsf{NP}} and 𝖭𝖯𝖭𝖯\mathsf{NP}, respectively. Again it seems questionable whether the underlying methods can yield insights for much stronger theories: by Kannan [18], the lower bound stated by ¬αχcsuperscriptsubscript𝛼𝜒𝑐\neg\alpha_{\chi}^{c} is true for some formula χ(x)𝜒𝑥\chi(x) defining a problem in 𝖭𝖯𝖭𝖯superscript𝖭𝖯𝖭𝖯\mathsf{NP}^{\mathsf{NP}}. Moreover, the formulas above depend on c𝑐c and new ideas seem to be required to reach the unconditional consistency of superpolynomial lower bounds.

1.2 New consistency results

The purpose of this paper is to prove the unconditional consistency of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly} with the comparatively strong theory 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2}. Consistency results for 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} are meaningful, since 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} is stronger than 𝖳22subscriptsuperscript𝖳22\mathsf{T}^{2}_{2} which, as discussed earlier, can formalize many results in complexity theory. Our approach is not via witnessing but via simulating comprehension.

The problems in 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP} are naturally represented on the formal level by Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formulas φ(x)𝜑𝑥\varphi(x): an existentially quantified set variable followed by a bounded formula. We discuss three ways to formalize 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}, namely with {¬αφcc1}conditional-setsubscriptsuperscript𝛼𝑐𝜑𝑐1\{\neg\alpha^{c}_{\varphi}\mid c\geqslant 1\} for a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula φ(x)𝜑𝑥\varphi(x), with {¬αM0cc1}conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀0𝑐1\{\neg\alpha^{c}_{M_{0}}\mid c\geqslant 1\} and with {¬βM0cc1}conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐1\{\neg\beta^{c}_{M_{0}}\mid c\geqslant 1\} for a suitable universal 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M0subscript𝑀0M_{0}. We now discuss these formalizations; they are analogous to the formalizations discussed in the previous section.

The “direct formalization” of the consistency of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly} is based on the formulas αφcsubscriptsuperscript𝛼𝑐𝜑\alpha^{c}_{\varphi}. These are defined similarly as before but with φ𝜑\varphi a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula:

Definition 1.

Let c𝑐c\in\mathbb{N} and let φ=φ(x)𝜑𝜑𝑥\varphi=\varphi(x) be a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula (with only one free variable x𝑥x, and in particular without free variables of the set sort). Define

αφc:=n𝐿𝑜𝑔>1C2ncx<2n(C(x)φ(x)).\alpha_{\varphi}^{c}\ :=\ \forall n{\in}\mathit{Log}_{>1}\ \exists C{\leqslant}2^{n^{c}}\forall x{<}2^{n}\ \big{(}C(x)\leftrightarrow\varphi(x)\big{)}.

Then our direct formalization of the consistency of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly} is:

Theorem 2.

There exists φ(x)Σ^11,b𝜑𝑥subscriptsuperscript^Σ1𝑏1\varphi(x)\in\hat{\Sigma}^{1,b}_{1} such that 𝖵20+{¬αφcc}subscriptsuperscript𝖵02conditional-setsubscriptsuperscript𝛼𝑐𝜑𝑐\mathsf{V}^{0}_{2}+\big{\{}\neg\alpha^{c}_{\varphi}\mid c\in\mathbb{N}\big{\}} is consistent.

Theorem 2 can be strengthened to establish the consistency of 𝖭𝖤𝖷𝖯𝖯𝖧/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝖧𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{PH/poly} (see Section 2.3) but our focus is on 𝖯/𝗉𝗈𝗅𝗒𝖯𝗉𝗈𝗅𝗒\mathsf{P/poly}.

Theorem 2 is proved in Section 2.2 but in hindsight is not hard to prove. For φ(x)𝜑𝑥\varphi(x) take a formula negating the pigeonhole principle: it states that there exists a set coding an injection from {0,,x+1}0𝑥1\{0,\ldots,x+1\} into {0,,x}0𝑥\{0,\ldots,x\}, and thus is expressible as a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula. The intermediate steps in the usual proof of the pigeonhole principle involve further sets encoding injections, and these can also expressed with Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formulas. If these formulas were computed by polynomial-size circuits, then we could use quantifier-free induction to show that the pigeonhole principle is provable in 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2}. But it is well known that this is not the case (see [22, Corollary 12.5.5]).

Concerning the faithfulness of the direct formalization we get, as before, a model of 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} where a certain 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine cannot be simulated by small circuits. Indeed, for an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M we can write the formula (2) using instead of y𝑦\exists y a quantification Y𝑌\exists Y for a set variable Y𝑌Y:

YY is an accepting computation of M on x.𝑌Y is an accepting computation of M on x\exists Y\textit{``$Y$ is an accepting computation of $M$ on $x$''}. (3)

Roughly, an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine is one such that 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} can verify a suitable bound on its runtime; we defer the details to Section 3.1. It turns out that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} proves that every Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula φ(x)𝜑𝑥\varphi(x) is equivalent to (3) for a suitable M𝑀M, namely a model-checker for φ(x)𝜑𝑥\varphi(x). Proving this is not trivial because 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} is agnostic about the existence of computations of exponential-time machines. One of our contributions is to prove it; we give the details in Section 3.

Definition 3.

For an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M and c𝑐c\in\mathbb{N} we set αMc:=αψcassignsubscriptsuperscript𝛼𝑐𝑀subscriptsuperscript𝛼𝑐𝜓\alpha^{c}_{M}:=\alpha^{c}_{\psi} where ψ𝜓\psi is the formula (3).

Intuitively, 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} does not know whether non-trivial exponential-size sets exist, namely sets not given by bounded formulas. But then, how meaningful is the consistency statement of Theorem 2 or the corresponding statement for {¬αMcc1}conditional-setsubscriptsuperscript𝛼𝑐𝑀𝑐1\{\neg\alpha^{c}_{M}\mid c\geqslant 1\}? These sentences contain (universal and) existential set quantifiers. It turns out that we can move again to a suitably modified sentence βMcsubscriptsuperscript𝛽𝑐𝑀\beta^{c}_{M} of lower quantifier complexity, namely a sentence all of whose set quantifiers are universal (i.e., Π11,bfor-allsubscriptsuperscriptΠ1𝑏1\forall\Pi^{1,b}_{1}): such sentences do not entail the existence of non-trivial large sets. This does not follow from simple self-reducibility arguments but is a deep result of complexity theory, namely the Easy Witness Lemma of Impagliazzo, Kabanets and Wigderson [14, Theorem 31]. We use Williams’ version as stated in [38, Lemma 3.1] (see [39, Theorem 3.1] for the equivalence):

Lemma 4 (Easy Witness Lemma).

If 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\subseteq\mathsf{P/poly}, then every 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine has polynomial-size oblivious witness circuits.

An oblivious witness circuit for a machine M𝑀M and input length n𝑛n is a circuit D𝐷D with at least n𝑛n inputs such that for every x𝑥x of length n𝑛n, if M𝑀M accepts x𝑥x, then 𝑡𝑡(Dx)𝑡𝑡subscript𝐷𝑥\mathit{tt}(D_{x}) encodes an accepting computation of M𝑀M on x𝑥x. Here, the circuit Dxsubscript𝐷𝑥D_{x} is obtained from D𝐷D by fixing the first n𝑛n inputs to the bits of x𝑥x, and 𝑡𝑡(Dx)𝑡𝑡subscript𝐷𝑥\mathit{tt}(D_{x}) is the truth table of Dxsubscript𝐷𝑥D_{x}. In the statement of the lemma, polynomial-size refers to polynomial in n𝑛n, and the qualifier oblivious refers to the fact that D𝐷D depends only on the length of x𝑥x, not on x𝑥x itself.

In the language of two-sorted bounded arithmetic the string 𝑡𝑡(Dx)𝑡𝑡subscript𝐷𝑥\mathit{tt}(D_{x}) corresponds to the set Dx()subscript𝐷𝑥D_{x}(\cdot) of numbers accepted by Dxsubscript𝐷𝑥D_{x}. We thus define the formula βMcsubscriptsuperscript𝛽𝑐𝑀\beta^{c}_{M} by replacing D(x)𝐷𝑥D(x) by Dx()subscript𝐷𝑥D_{x}(\cdot) and yfor-all𝑦\forall y by Yfor-all𝑌\forall Y:

Definition 5.

For c𝑐c\in\mathbb{N} and an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M we set

βMc:=n𝐿𝑜𝑔>1C<2ncD<2ncx<2nY(C(x)=0¬Y is an accepting computation of M on x)(C(x)=1Dx() is an accepting computation of M on x).superscriptsubscript𝛽𝑀𝑐assignfor-all𝑛subscript𝐿𝑜𝑔absent1𝐶superscript2superscript𝑛𝑐𝐷superscript2superscript𝑛𝑐for-all𝑥superscript2𝑛for-all𝑌missing-subexpressionmissing-subexpressionlimit-from𝐶𝑥0Y is an accepting computation of M on xmissing-subexpressionmissing-subexpression𝐶𝑥1Dx() is an accepting computation of M on x\begin{array}[]{lcl}\beta_{M}^{c}&:=&\forall n{\in}\mathit{Log}_{>1}\ \exists C{<}2^{n^{c}}\ \exists D{<}2^{n^{c}}\ \forall x{<}2^{n}\ \forall Y\\ &&\quad(C(x){=}0\ \to\ \neg\textit{``$Y$ is an accepting computation of $M$ on $x$''})\ \wedge\\ &&\quad(C(x){=}1\ \to\ \textit{``$D_{x}(\cdot)$ is an accepting computation of $M$ on $x$''}).\end{array}

In Section 4.1 we define a suitable universal explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M0subscript𝑀0M_{0} and arrive at our formalization of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}:

Definition 6.

𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒:={¬βM0cc}.assign𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐\textit{``$\mathsf{NEXP}\not\subseteq\mathsf{P/poly}$''}:=\{\neg\beta^{c}_{M_{0}}\mid c\in\mathbb{N}\}.

The main result of this paper is:

Theorem 7.

The theory 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} is consistent with both formalizations of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}; concretely, 𝖵20+{¬αM0c:c}subscriptsuperscript𝖵02conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀0𝑐\mathsf{V}^{0}_{2}+\{\lnot\alpha^{c}_{M_{0}}:c\in\mathbb{N}\} and 𝖵20+{¬βM0c:c}subscriptsuperscript𝖵02conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐\mathsf{V}^{0}_{2}+\{\lnot\beta^{c}_{M_{0}}:c\in\mathbb{N}\} are consistent.

In the notation introduced above, this gives:

Corollary 8.

𝖵20+𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒subscriptsuperscript𝖵02𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{V}^{0}_{2}+\textit{``$\mathsf{NEXP}\not\subseteq\mathsf{P/poly}$''} is consistent.

Both {¬αM0c:c}conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀0𝑐\{\lnot\alpha^{c}_{M_{0}}:c\in\mathbb{N}\} and {¬βM0c:c}conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐\{\lnot\beta^{c}_{M_{0}}:c\in\mathbb{N}\} are formalizations of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}. The first has the advantage of being more direct whereas the second has the advantage of having lower quantifier complexity: βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} is Π11,bfor-allsubscriptsuperscriptΠ1𝑏1\forall\Pi^{1,b}_{1} while αM0csubscriptsuperscript𝛼𝑐subscript𝑀0\alpha^{c}_{M_{0}} is Σb(Π11,b)for-allsubscriptsuperscriptΣ𝑏subscriptsuperscriptΠ1𝑏1\forall\Sigma^{b}_{\infty}(\Pi^{1,b}_{1}). In addition, being Π11,bfor-allsubscriptsuperscriptΠ1𝑏1\forall\Pi^{1,b}_{1} is instrumental for our magnification result discussed below (Theorem 11). It is easy to see that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} proves that {¬αM0c:c}conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀0𝑐\{\lnot\alpha^{c}_{M_{0}}:c\in\mathbb{N}\} implies {¬βM0c:c}conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐\{\lnot\beta^{c}_{M_{0}}:c\in\mathbb{N}\}. The converse implication is true too, but depends on the Easy Witness Lemma. It is open whether 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} proves this implication or the Easy Witness Lemma.

We emphasize here that our formalization of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly} through the universal machine M0subscript𝑀0M_{0} and the αM0csubscriptsuperscript𝛼𝑐subscript𝑀0\alpha^{c}_{M_{0}} and βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} sentences refers exclusively to the setting of non-relativized complexity classes.

Second we show that 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP} can be lowered to just above 𝖭𝖯𝖭𝖯\mathsf{NP}. For k𝑘k\in\mathbb{N}, define log(k)nsuperscript𝑘𝑛\log^{(k)}n inductively by log(1)n:=lognassignsuperscript1𝑛𝑛\log^{(1)}n:=\log n, and log(k+1)n:=loglog(k)nassignsuperscript𝑘1𝑛superscript𝑘𝑛\log^{(k+1)}n:=\log\log^{(k)}n. We prove:

Theorem 9.

𝖵20+𝖭𝖳𝖨𝖬𝖤(nO(log(k)n))𝖯/𝗉𝗈𝗅𝗒subscriptsuperscript𝖵02𝖭𝖳𝖨𝖬𝖤(nO(log(k)n))𝖯/𝗉𝗈𝗅𝗒\mathsf{V}^{0}_{2}+\textit{``$\mathsf{NTIME}(n^{O(\log^{(k)}n)})\not\subseteq\mathsf{P/poly}$''} is consistent for every positive k𝑘k\in\penalty 10000\mathbb{N}.

The formalization and proof proceeds similarly and relies on an Easy Witness Lemma for barely superpolynomial time by Murray and Williams [27]. Theorem 9 “almost” settles the central question for the consistency of 𝖭𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NP}\not\subseteq\mathsf{P/poly} with a strong bounded arithmetic. Closing the tiny gap, however, seems to require some new ideas.

1.3 Simulating comprehension

The proof of the consistency of circuit lower bounds is based on the complexity of constant depth propositional proofs for the pigeonhole principle. We shall see that 𝖵20+αM0csubscriptsuperscript𝖵02subscriptsuperscript𝛼𝑐subscript𝑀0\mathsf{V}^{0}_{2}+\alpha^{c}_{M_{0}} (and thus 𝖵20+βM0csubscriptsuperscript𝖵02subscriptsuperscript𝛽𝑐subscript𝑀0\mathsf{V}^{0}_{2}+\beta^{c}_{M_{0}}) proves the pigeonhole principle. This implies Theorem 7 as it is well-known that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} cannot prove this principle. Thereby, Theorem 7 is ultimately based on the exponential lower bound for this principle in bounded depth Frege systems [1, 4]. On a high level, while the approach based on witnessing uses complexity theoretic methods, our approach is based on methods that arose from mathematical logic, in particular forcing (cf. [3]).

The {¬βM0c}subscriptsuperscript𝛽𝑐subscript𝑀0\{\lnot\beta^{c}_{M_{0}}\} formulation of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly} provides an additional insight into the consistency lower bound. By the Easy Witness Lemma, the inclusion 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\subseteq\mathsf{P/poly} implies that a rich collection of sets is represented by circuits (via their truth tables). A weak theory can quantify over circuits and hence implicitly over this collection. Thus, intuitively, βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} should enable a weak theory to simulate a two-sorted theory of considerable strength. More precisely, we show that βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} can be used to simulate a considerable fragment of Σ11,bsubscriptsuperscriptΣ1𝑏1\Sigma^{1,b}_{1}-comprehension, i.e., a considerable fragment of 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2}.

The sketched idea can be made explicit as follows. By 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) we denote the two-sorted variant of 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}. Its models consist of two universes M𝑀M and 𝒳𝒳\mathcal{X} interpreting the number and the set sort, respectively. Given such a model that additionally satisfies βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} for some c𝑐c\in\mathbb{N}, we will show in Lemma 45 that shrinking 𝒳𝒳\mathcal{X} to the sets represented by circuits in M𝑀M yields a model of 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2}. This has two interesting consequences. The first is:

Theorem 10.

Let 𝖳𝖳\mathsf{T} be a theory that contains 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) but does not prove all number-sort consequences of 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2}. Then 𝖳+𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒𝖳𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{T}+\textit{``$\mathsf{NEXP}\not\subseteq\mathsf{P/poly}$''} is consistent.

By a number-sort formula we mean one that does not use set-sort variables. Note that the corollary refers to number-sort sentences of arbitrary unbounded quantifier complexity. It is conjectured that 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2} has more number-sort consequences than all other theories mentioned so far. But this is known only for 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} [37, 20], and there even for Π1bfor-allsubscriptsuperscriptΠ𝑏1\forall\Pi^{b}_{1}-sentences. Theorem 10 directly infers evidence for the truth of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly} from progress in mathematical logic on understanding independence. Loosely speaking, we view it in line with the belief that it is mathematical logic that ultimately bears on fundamental complexity-theoretic conjectures (see e.g. again the preface of [22]).

The second consequence is:

Theorem 11.

If 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) does not prove “𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}”, then 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2} does not prove “𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}”.

This is a magnification result on the hardness of proving circuit lower bounds: it infers strong hardness (for 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2}) from weak hardness (for 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)). The term magnification has been coined in [28] in the context of circuit lower bounds where such results are currently intensively investigated (cf. [11]). In proof complexity such results are rare so far. An example in propositional proof complexity appears in [26, Proposition 4.14]. Magnification results are interesting because they reveal inconsistencies in common beliefs about what is and what is not within the reach of currently available techniques. Theorem 11 might foster hopes to complete Razborov’s program to find a precise barrier in circuit complexity (cf. Remark 46).

2 Consistency of the direct formalization

In this section we provide the details of the simple proof of Theorem 2. We begin by recalling the necessary preliminaries on bounded arithmetic. This will be needed also in later sections. We refer to [22, Ch.5] for the missing details.

2.1 Preliminaries: bounded arithmetic

Bounded arithmetics have language xy𝑥𝑦x{\leqslant}y, 00, 111, x+y𝑥𝑦x{+}y, xy𝑥𝑦x{\cdot}y, x/2𝑥2\lfloor x{/}2\rfloor, x#y𝑥#𝑦x{\#}y, |x|𝑥|x|, and built-in equality x=y𝑥𝑦x{=}y. Note that Cantor’s pairing x,y𝑥𝑦\langle x,y\rangle is given by a term. Iterating it gives x1,,xksubscript𝑥1subscript𝑥𝑘\langle x_{1},\ldots,x_{k}\rangle for k>2𝑘2k>2. A number x𝑥x is called small if it satisfies the formula yx=|y|𝑦𝑥𝑦\exists y\ x{=}|y|. We abbreviate yx=|y|𝑦𝑥𝑦\exists y\ x{=}|y| by x𝐿𝑜𝑔𝑥𝐿𝑜𝑔x{\in}\mathit{Log} and x𝐿𝑜𝑔1<x𝑥𝐿𝑜𝑔1𝑥x{\in}\mathit{Log}\wedge 1{<}x by x𝐿𝑜𝑔>1𝑥subscript𝐿𝑜𝑔absent1x{\in}\mathit{Log}_{>1}. The quantifiers x𝐿𝑜𝑔>1for-all𝑥subscript𝐿𝑜𝑔absent1\forall x{\in}\mathit{Log}_{>1} and x𝐿𝑜𝑔>1𝑥subscript𝐿𝑜𝑔absent1\exists x{\in}\mathit{Log}_{>1} range over small numbers above 111. If x=|y|𝑥𝑦x=|y|, we write 2xsuperscript2𝑥2^{x} for 1#y1#𝑦1\#y and similarly for other exponential functions. E.g., a formula of the form x𝐿𝑜𝑔>1 2x2for-all𝑥subscript𝐿𝑜𝑔absent1superscript2superscript𝑥2\forall x{\in}\mathit{Log}_{>1}\ \ldots\ 2^{x^{2}}\ldots stands for the formula xy(1<xx=|y|y#y)for-all𝑥for-all𝑦1𝑥𝑥𝑦𝑦#𝑦\forall x\forall y\ (1{<}x\wedge x{=}|y|\to\ldots\ y\#y\ldots).

Theories.

The theories of bounded arithmetic are given by a set 𝖡𝖠𝖲𝖨𝖢𝖡𝖠𝖲𝖨𝖢\mathsf{BASIC} of universal sentences determining the meaning of the symbols, plus induction schemes. For a set of formulas ΦΦ\Phi, the set (of the universal closures) of formulas

φ(x¯,0)y<z(φ(x¯,y)φ(x¯,y+1))φ(x¯,z),𝜑¯𝑥0for-all𝑦𝑧𝜑¯𝑥𝑦𝜑¯𝑥𝑦1𝜑¯𝑥𝑧\varphi(\bar{x},0)\wedge\forall y{<}z\ (\varphi(\bar{x},y)\to\varphi(\bar{x},y+1))\to\varphi(\bar{x},z),

for φΦ𝜑Φ\varphi\in\Phi, is the scheme of ΦΦ\Phi-induction. Restricting to small numbers z𝑧z gives the scheme of ΦΦ\Phi-length induction; formally, replace z𝑧z by |z|𝑧|z| above. Here, and throughout, when writing a formula ψ𝜓\psi as ψ(x¯)𝜓¯𝑥\psi(\bar{x}) we mean that all free variables of ψ𝜓\psi are among x¯¯𝑥\bar{x}.

The set ΣbsubscriptsuperscriptΣ𝑏\Sigma^{b}_{\infty} contains all bounded formulas, and Σib,ΠibsubscriptsuperscriptΣ𝑏𝑖subscriptsuperscriptΠ𝑏𝑖\Sigma^{b}_{i},\Pi^{b}_{i}, for i𝑖i\in\mathbb{N}, are subsets of ΣbsubscriptsuperscriptΣ𝑏\Sigma^{b}_{\infty} that are defined by counting alternations of bounded quantifiers xt,xtformulae-sequence𝑥𝑡for-all𝑥𝑡\exists x{\leqslant}t,\forall x{\leqslant}t, not counting sharply bounded ones x|t|,x|t|formulae-sequence𝑥𝑡for-all𝑥𝑡\exists x{\leqslant}|t|,\forall x{\leqslant}|t|. In particular, Σ0b=Π0bsubscriptsuperscriptΣ𝑏0subscriptsuperscriptΠ𝑏0\Sigma^{b}_{0}=\Pi^{b}_{0} is the set of sharply bounded formulas. The theories 𝖳2isubscriptsuperscript𝖳𝑖2\mathsf{T}^{i}_{2} are defined by 𝖡𝖠𝖲𝖨𝖢+Σib-induction𝖡𝖠𝖲𝖨𝖢Σib-induction\mathsf{BASIC}+\text{$\Sigma^{b}_{i}$-induction}. The theories 𝖲2isubscriptsuperscript𝖲𝑖2\mathsf{S}^{i}_{2} are defined by 𝖡𝖠𝖲𝖨𝖢+Σib-length-induction𝖡𝖠𝖲𝖨𝖢Σib-length-induction\mathsf{BASIC}+\text{$\Sigma^{b}_{i}$-length-induction}. Full bounded arithmetic 𝖳2:=i𝖳2iassignsubscript𝖳2subscript𝑖subscriptsuperscript𝖳𝑖2\mathsf{T}_{2}:=\bigcup_{i\in\mathbb{N}}\mathsf{T}^{i}_{2} has ΣbsubscriptsuperscriptΣ𝑏\Sigma^{b}_{\infty}-induction.

Two-sorted theories.

Two-sorted bounded arithmetics are obtained by adding a new set of variables X,Y,𝑋𝑌X,Y,\ldots of the set sort. Original variables x,y,𝑥𝑦x,y,\ldots are of the number sort. We shall use capital letters also for number-sort variables. Therefore, for clarity, from now on we write 2Xsubscript2𝑋\exists_{2}X and 2Xsubscriptfor-all2𝑋\forall_{2}X for quantifiers on set-sort variables X𝑋X. The language is enlarged by adding a binary relation xX𝑥𝑋x{\in}X between the number and the set sort. A number-sort formula is one that uses only the number sort. In particular, it has no set-sort parameters. By a term we mean a term in the number sort. We write Xz𝑋𝑧X{\leqslant}z for y(yXyz)for-all𝑦𝑦𝑋𝑦𝑧\forall y\ (y{\in}X\to y{\leqslant}z).

Models have the form (M,𝒳)𝑀𝒳(M,\mathcal{X}) where M𝑀M is a universe for the number sort and 𝒳𝒳\mathcal{X} is a universe for the set sort. The symbol \in is interpreted by a subset of M×𝒳𝑀𝒳M\times\mathcal{X}. The standard model is (,[]<ω)superscriptdelimited-[]absent𝜔(\mathbb{N},[\mathbb{N}]^{<\omega}) where []<ωsuperscriptdelimited-[]absent𝜔[\mathbb{N}]^{<\omega} is the set of finite subsets of \mathbb{N}; the number sort symbols are interpreted as usual over \mathbb{N} and \in by actual element-hood.

The sets Σb(α),Σib(α),Πib(α)subscriptsuperscriptΣ𝑏𝛼subscriptsuperscriptΣ𝑏𝑖𝛼subscriptsuperscriptΠ𝑏𝑖𝛼\Sigma^{b}_{\infty}(\alpha),\Sigma^{b}_{i}(\alpha),\Pi^{b}_{i}(\alpha) are defined as Σb,Σib,ΠibsubscriptsuperscriptΣ𝑏subscriptsuperscriptΣ𝑏𝑖subscriptsuperscriptΠ𝑏𝑖\Sigma^{b}_{\infty},\Sigma^{b}_{i},\Pi^{b}_{i}, allowing free set-variables and the symbol \in, but not allowing set-sort quantifiers, nor set-sort equalities X=Y𝑋𝑌X{=}Y. Another name for the set Σb(α)subscriptsuperscriptΣ𝑏𝛼\Sigma^{b}_{\infty}(\alpha) is Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}. The theories 𝖳2i(α)subscriptsuperscript𝖳𝑖2𝛼\mathsf{T}^{i}_{2}(\alpha)𝖲2i(α)subscriptsuperscript𝖲𝑖2𝛼\mathsf{S}^{i}_{2}(\alpha), and 𝖳2(α)subscript𝖳2𝛼\mathsf{T}_{2}(\alpha), are given by 𝖡𝖠𝖲𝖨𝖢𝖡𝖠𝖲𝖨𝖢\mathsf{BASIC} and analogous induction schemes as before, namely Σib(α)subscriptsuperscriptΣ𝑏𝑖𝛼\Sigma^{b}_{i}(\alpha)-induction, Σib(α)subscriptsuperscriptΣ𝑏𝑖𝛼\Sigma^{b}_{i}(\alpha)-length induction, and Σb(α)subscriptsuperscriptΣ𝑏𝛼\Sigma^{b}_{\infty}(\alpha)-induction, respectively. Additionally, we add the following axioms with the set sort. Recalling the notation Xz𝑋𝑧X{\leqslant}z introduced above, the new axioms are (the universal closures of):

set-boundedness axiom: zXz𝑧𝑋𝑧\exists z\ X{\leqslant}z.
extensionality axiom: XzYzyz(yXyY)X=YX{\leqslant}z\wedge Y{\leqslant}z\wedge\forall y{\leqslant}z\ (y{\in}X\leftrightarrow y{\in}Y)\to X{=}Y.

We add the scheme of (bounded) Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension, given by (the universal closures of) the formulas

2Yzyz(yYφ(X¯,x¯,y)),\exists_{2}Y{\leqslant}z\ \forall y{\leqslant}z\ \big{(}y\in Y\leftrightarrow\varphi(\bar{X},\bar{x},y)\big{)}, (4)

where φ(X¯,x¯,y)𝜑¯𝑋¯𝑥𝑦\varphi(\bar{X},\bar{x},y) is Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha) with respect to the theory defined over the two-sorted language as 𝖡𝖠𝖲𝖨𝖢𝖡𝖠𝖲𝖨𝖢\mathsf{BASIC} plus Σ1b(α)subscriptsuperscriptΣ𝑏1𝛼\Sigma^{b}_{1}(\alpha)-length-induction, i.e., this theory proves φ(X¯,x¯,y)𝜑¯𝑋¯𝑥𝑦\varphi(\bar{X},\bar{x},y) equivalent to both a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula and a Σ1b(α)subscriptsuperscriptΣ𝑏1𝛼\Sigma^{b}_{1}(\alpha)-formula.

For example, this scheme implies that there is a set Y𝑌Y as described when φ(X¯,x¯,y)𝜑¯𝑋¯𝑥𝑦\varphi(\bar{X},\bar{x},y) is fX¯(x¯,y)=1superscript𝑓¯𝑋¯𝑥𝑦1f^{\bar{X}}(\bar{x},y){=}1 where fX¯(x¯,y)superscript𝑓¯𝑋¯𝑥𝑦f^{\bar{X}}(\bar{x},y) is a function that is Σ1b(α)subscriptsuperscriptΣ𝑏1𝛼\Sigma^{b}_{1}(\alpha)-definable in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha). The superscript indicates that X¯¯𝑋\bar{X} comprises all the free variables of the set sort that appear in the Σ1b(α)subscriptsuperscriptΣ𝑏1𝛼\Sigma^{b}_{1}(\alpha)-formula that defines fX¯(x¯,y)superscript𝑓¯𝑋¯𝑥𝑦f^{\bar{X}}(\bar{x},y). It is well known [6] that these are precisely the functions that are computable in polynomial time with oracles denoted by the set variables. We do not distinguish 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} (or 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)) from its variant in the language 𝖯𝖵𝖯𝖵\mathsf{PV} (resp., 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)) which has a symbol for all polynomial time functions (resp., with oracles denoted by the set variables). We shall often use that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves induction for quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas (cf. [22, Lemma 5.2.9]). We write quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas with latin capital letters; e.g., F(X¯,x¯)𝐹¯𝑋¯𝑥F(\bar{X},\bar{x}).

A piece of notation.

For formulas φ(Y,X¯,x¯)𝜑𝑌¯𝑋¯𝑥\varphi(Y,\bar{X},\bar{x}) and ψ(Z¯,z¯,u)𝜓¯𝑍¯𝑧𝑢\psi(\bar{Z},\bar{z},u) we write

φ(ψ(Z¯,z¯,),X¯,x¯)𝜑𝜓¯𝑍¯𝑧¯𝑋¯𝑥\varphi\big{(}\psi(\bar{Z},\bar{z},\cdot),\bar{X},\bar{x}\big{)}

for the formula obtained from φ𝜑\varphi by replacing every atomic subformula of the form tY𝑡𝑌t{\in}Y, for t𝑡t a term, by the formula ψ(Z¯,z¯,t)𝜓¯𝑍¯𝑧𝑡\psi(\bar{Z},\bar{z},t), preceded by any necessary renaming of the bound variables of φ𝜑\varphi to avoid the capturing of free variables. We use this notation only for formulas φ𝜑\varphi without set equalities.

Genuine two-sorted theories.

It is easy to see that the theories 𝖳2i(α),𝖲2i(α)subscriptsuperscript𝖳𝑖2𝛼subscriptsuperscript𝖲𝑖2𝛼\mathsf{T}^{i}_{2}(\alpha),\mathsf{S}^{i}_{2}(\alpha) have the same number sort consequences as 𝖳2i,𝖲2i,subscriptsuperscript𝖳𝑖2subscriptsuperscript𝖲𝑖2\mathsf{T}^{i}_{2},\mathsf{S}^{i}_{2}, respectively. Also 𝖳2i(α),𝖲2i(α)subscriptsuperscript𝖳𝑖2𝛼subscriptsuperscript𝖲𝑖2𝛼\mathsf{T}^{i}_{2}(\alpha),\mathsf{S}^{i}_{2}(\alpha) are conservative over their subtheories without Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. Intuitively, the two-sorted versions of bounded arithmetics are the usual ones plus syntactic sugar. Genuine set-sorted theories are obtained from 𝖳2(α)subscript𝖳2𝛼\mathsf{T}_{2}(\alpha) by adding (bounded) ΦΦ\Phi-comprehension for certain sets of formulas ΦΦ\Phi, i.e., (4) for φ(X¯,x¯,y)𝜑¯𝑋¯𝑥𝑦\varphi(\bar{X},\bar{x},y) in ΦΦ\Phi.

The set Σ1,bsubscriptsuperscriptΣ1𝑏\Sigma^{1,b}_{\infty} contains all two-sorted formulas with quantifiers of both sorts, but bounded number-sort quantifiers. Again we disallow set equalities. The sets Σi1,b,Πi1,bsubscriptsuperscriptΣ1𝑏𝑖subscriptsuperscriptΠ1𝑏𝑖\Sigma^{1,b}_{i},\Pi^{1,b}_{i}, for i𝑖i\in\mathbb{N}, are subsets of Σ1,bsubscriptsuperscriptΣ1𝑏\Sigma^{1,b}_{\infty} defined by counting the alternations of set quantifiers (and not counting number quantifiers). A Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula is of the form

2Yφ(X¯,Y,x¯)subscript2𝑌𝜑¯𝑋𝑌¯𝑥\exists_{2}Y\ \varphi(\bar{X},Y,\bar{x}) (5)

where φ(X¯,Y,x¯)𝜑¯𝑋𝑌¯𝑥\varphi(\bar{X},Y,\bar{x}) is a Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-formula.

For i𝑖i\in\mathbb{N} the theory 𝖵2isubscriptsuperscript𝖵𝑖2\mathsf{V}^{i}_{2} is given by Σi1,bsubscriptsuperscriptΣ1𝑏𝑖\Sigma^{1,b}_{i}-comprehension. In particular, 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} is given by Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-comprehension. It has the same number-sort consequences as 𝖳2subscript𝖳2\mathsf{T}_{2}.

Remark 12.

Sometimes, the sets Σi1,b(α)subscriptsuperscriptΣ1𝑏𝑖𝛼\Sigma^{1,b}_{i}(\alpha) are defined with bounded set quantifiers Xt𝑋𝑡\exists X{\leqslant t} and Xtfor-all𝑋𝑡\forall X{\leqslant}t. The difference is not essential: for every Σ1,bsubscriptsuperscriptΣ1𝑏\Sigma^{1,b}_{\infty}-formula φ(X¯,Y,x¯)𝜑¯𝑋𝑌¯𝑥\varphi(\bar{X},Y,\bar{x}) there is a term t(x¯)𝑡¯𝑥t(\bar{x}) such that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves

t(x¯)y(φ(X¯,Y,x¯)φ(X¯,Yy,x¯))t(\bar{x}){\leqslant}y\to\big{(}\varphi(\bar{X},Y,\bar{x})\leftrightarrow\varphi(\bar{X},Y^{\leqslant y},\bar{x})\big{)}

where Yysuperscript𝑌absent𝑦Y^{\leqslant y} stands for ψ(Y,y,)𝜓𝑌𝑦\psi(Y,y,\cdot) with ψ(Y,y,u):=(uyuY)assign𝜓𝑌𝑦𝑢𝑢𝑦𝑢𝑌\psi(Y,y,u):=(u{\leqslant}y\wedge u{\in}Y). By Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension, 2Yφsubscript2𝑌𝜑\exists_{2}Y\varphi is 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)-provably equivalent to 2Yt(x¯)φsubscript2𝑌𝑡¯𝑥𝜑\exists_{2}Y{\leqslant}t(\bar{x})\ \varphi. It follows that every Σi1,b(α)subscriptsuperscriptΣ1𝑏𝑖𝛼\Sigma^{1,b}_{i}(\alpha)-formula is 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)-provably equivalent to one with bounded set sort quantifiers.

Remark 13.

Disallowing set equalities is convenient but inessential in the sense that 𝖵2isubscriptsuperscript𝖵𝑖2\mathsf{V}^{i}_{2} does not change when set equalities are allowed in Σi1,bsubscriptsuperscriptΣ1𝑏𝑖\Sigma^{1,b}_{i}. Indeed, let φ(X¯,x¯)𝜑¯𝑋¯𝑥\varphi(\bar{X},\bar{x}) be a Σi1,bsubscriptsuperscriptΣ1𝑏𝑖\Sigma^{1,b}_{i}-formula except that set equalities are allowed. Then there is a Σi1,bsubscriptsuperscriptΣ1𝑏𝑖\Sigma^{1,b}_{i}-formula φ(X¯,x¯,u)superscript𝜑¯𝑋¯𝑥𝑢\varphi^{*}(\bar{X},\bar{x},u) (without set equalities and) with bounded set quantifiers such that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves

u(φ(X¯,x¯)φ(X¯,x¯,u)).\exists u\ \big{(}\varphi(\bar{X},\bar{x})\leftrightarrow\varphi^{*}(\bar{X},\bar{x},u)\big{)}.
Proof.

The formula φsuperscript𝜑\varphi^{*} is defined by a straightforward recursion on φ𝜑\varphi. For example, if φ𝜑\varphi is X1=X2subscript𝑋1subscript𝑋2X_{1}{=}X_{2}, then φsuperscript𝜑\varphi^{*} is yu(yX1yX2)yu(yX2yX1)for-all𝑦𝑢𝑦subscript𝑋1𝑦subscript𝑋2for-all𝑦𝑢𝑦subscript𝑋2𝑦subscript𝑋1\forall y{\leqslant}u\ (y{\in}X_{1}\to y{\in}X_{2})\wedge\forall y{\leqslant}u\ (y{\in}X_{2}\to y{\in}X_{1}); a u𝑢u witnessing the equivalence is any common upper bound on X1subscript𝑋1X_{1} and X2subscript𝑋2X_{2}. If φ𝜑\varphi is 2Yψ(X¯,Y,x¯)subscript2𝑌𝜓¯𝑋𝑌¯𝑥\exists_{2}Y\psi(\bar{X},Y,\bar{x}) and ψ=ψ(X¯,Y,x¯,u)superscript𝜓superscript𝜓¯𝑋𝑌¯𝑥𝑢\psi^{*}=\psi^{*}(\bar{X},Y,\bar{x},u) is already defined, then φsuperscript𝜑\varphi^{*} is 2Yt(x¯,u)ψ(X¯,Y,x¯,u)subscript2𝑌𝑡¯𝑥𝑢superscript𝜓¯𝑋𝑌¯𝑥𝑢\exists_{2}Y{\leqslant}t(\bar{x},u)\ \psi^{*}(\bar{X},Y,\bar{x},u) where the term t𝑡t is chosen according to the previous remark. ∎

Circuits.

A circuit with s𝑠s gates is coded by a number below 210s|s|superscript210𝑠𝑠2^{10\cdot s\cdot|s|}. On the formal level we shall only consider small circuits, i.e., s𝐿𝑜𝑔𝑠𝐿𝑜𝑔s\in\mathit{Log}, so 210s|s|superscript210𝑠𝑠2^{10\cdot s\cdot|s|} exists. We use capital letters C,D,E𝐶𝐷𝐸C,D,E for number variables when they are intended to range over circuits. There is a 𝖯𝖵𝖯𝖵\mathsf{PV}-function 𝑒𝑣𝑎𝑙(C,x)𝑒𝑣𝑎𝑙𝐶𝑥\mathit{eval}(C,x) that (in the standard model) takes a circuit C𝐶C with, say, n|C|𝑛𝐶n\leqslant|C| input gates, and evaluates it on inputs x<2n𝑥superscript2𝑛x<2^{n}. This means that the input gates of C𝐶C are assigned the bits of the length-n𝑛n binary representation of x𝑥x; we assume 𝑒𝑣𝑎𝑙(C,x)=0𝑒𝑣𝑎𝑙𝐶𝑥0\mathit{eval}(C,x)=0 if x2n𝑥superscript2𝑛x\geqslant 2^{n} or if C𝐶C does not code a circuit.

It is notationally convenient to have circuits take finite tuples x¯=(x1,,xk)¯𝑥subscript𝑥1subscript𝑥𝑘\bar{x}=(x_{1},\ldots,x_{k}) as inputs; formally, such a circuit has k𝑘k sequences of input gates, the i𝑖i-th taking the bits of xisubscript𝑥𝑖x_{i}. Again, 𝑒𝑣𝑎𝑙(C,x¯)𝑒𝑣𝑎𝑙𝐶¯𝑥\mathit{eval}(C,\bar{x}) denotes the evaluation function; it outputs 00 if any xisubscript𝑥𝑖x_{i} has length bigger than the length of its allotted input sequence. Our circuits have exactly one output gate, so 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} proves 𝑒𝑣𝑎𝑙(C,x¯)<2𝑒𝑣𝑎𝑙𝐶¯𝑥2\mathit{eval}(C,\bar{x}){<}2. We write C(x¯)𝐶¯𝑥C(\bar{x}) for the quantifier-free 𝖯𝖵𝖯𝖵\mathsf{PV}-formula 𝑒𝑣𝑎𝑙(C,x¯)=1𝑒𝑣𝑎𝑙𝐶¯𝑥1\mathit{eval}(C,\bar{x}){=}1; in some places we also write C(x¯)=1𝐶¯𝑥1C(\bar{x}){=}1 and C(x¯)=0𝐶¯𝑥0C(\bar{x}){=}0 instead of C(x¯)𝐶¯𝑥C(\bar{x}) and ¬C(x¯)𝐶¯𝑥\neg C(\bar{x}), respectively.

For a circuit C𝐶C taking (+k)𝑘(\ell+k)-tuples as inputs and an \ell-tuple x¯¯𝑥\bar{x} we let Cx¯subscript𝐶¯𝑥C_{\bar{x}} be the circuit obtained by fixing the first \ell inputs to x¯¯𝑥\bar{x}; it takes k𝑘k-tuples as inputs. Formally, Cx¯subscript𝐶¯𝑥C_{\bar{x}} is a 𝖯𝖵𝖯𝖵\mathsf{PV}-term with variables C,x¯𝐶¯𝑥C,\bar{x} and 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves (Cx¯(y¯)C(x¯,y¯))subscript𝐶¯𝑥¯𝑦𝐶¯𝑥¯𝑦(C_{\bar{x}}(\bar{y})\leftrightarrow C(\bar{x},\bar{y})) and |Cx¯||C|subscript𝐶¯𝑥𝐶|C_{\bar{x}}|{\leqslant}|C|.

Lemma 14.

For every quantifier-free 𝖯𝖵𝖯𝖵\mathsf{PV}-formula F(x¯)𝐹¯𝑥F(\bar{x}) there is a c𝑐c\in\mathbb{N} such that 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} proves

n𝐿𝑜𝑔>1C<2ncx¯<2n(C(x¯)F(x¯)).\forall n{\in}\mathit{Log}_{>1}\ \exists C{<}2^{n^{c}}\ \forall\bar{x}{<}2^{n}\ \big{(}C(\bar{x})\leftrightarrow F(\bar{x})\big{)}.

On the formal level, if Y𝑌Y is a set and C𝐶C is a circuit, then we say that Y𝑌Y is represented by C𝐶C if y(C(y)yY)\forall y\ (C(y)\leftrightarrow y{\in}Y). In our notation, such set Y𝑌Y is written C()𝐶C(\cdot), or 𝑒𝑣𝑎𝑙(C,)=1𝑒𝑣𝑎𝑙𝐶1\mathit{eval}(C,\cdot){=}1. More precisely, for a formula φ(Y,X¯,x¯)𝜑𝑌¯𝑋¯𝑥\varphi(Y,\bar{X},\bar{x}) and a circuit C𝐶C we write

φ(C(),X¯,x¯),𝜑𝐶¯𝑋¯𝑥\varphi\big{(}C(\cdot),\bar{X},\bar{x}\big{)},

for the formula obtained from φ𝜑\varphi by replacing every formula of the form tY𝑡𝑌t{\in}Y by C(t)𝐶𝑡C(t), i.e., by 𝑒𝑣𝑎𝑙(C,t)=1𝑒𝑣𝑎𝑙𝐶𝑡1\mathit{eval}(C,t){=}1. Note that if the set Y𝑌Y is represented by a circuit with n𝑛n inputs, then Y<2n𝑌superscript2𝑛Y{<}2^{n}, provably in 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}. For example, we shall use circuits to represent computations of exponential-time machines M𝑀M. Using the notation introduced in Section 3.1,

C()𝐶C(\cdot) is a halting computation of M𝑀M on x¯¯𝑥\bar{x}

is a Π1bsubscriptsuperscriptΠ𝑏1\Pi^{b}_{1}-formula with free variables C,x¯𝐶¯𝑥C,\bar{x} stating that the circuit C𝐶C represents a halting computation of M𝑀M on x¯¯𝑥\bar{x}.

2.2 Consistency of the direct formalization for 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}

The set of Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formulas without free variables of the set sort is a natural class of formulas defining, in the standard model, all the problems in 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}. For such a formula ψ𝜓\psi it is straightforward to write down a set of sentences (a.k.a. a theory) stating that ψ𝜓\psi does not have polynomial-size circuits. We explicitly define this direct formalization of 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly} as the set of all sentences of the form ¬αψcsubscriptsuperscript𝛼𝑐𝜓\neg\alpha^{c}_{\psi}, for c𝑐c\in\mathbb{N}, for the sentence αψcsubscriptsuperscript𝛼𝑐𝜓\alpha^{c}_{\psi} defined in the introduction, and then argue that its consistency with 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} follows from known lower bounds in proof complexity.

We are ready to prove Theorem 2.

Proof of Theorem 2:.

The (functional) pigeonhole principle 𝑃𝐻𝑃(x)𝑃𝐻𝑃𝑥\mathit{PHP}(x) is the following Π11,bsubscriptsuperscriptΠ1𝑏1\Pi^{1,b}_{1}-formula:

2X(\displaystyle\forall_{2}X\ \big{(} yx+1zx¬y,zX𝑦𝑥1for-all𝑧𝑥𝑦𝑧limit-from𝑋\displaystyle\exists y{\leqslant}x{+}1\ \forall z{\leqslant}x\ \neg\langle y,z\rangle{\in}X\ \vee
yx+1zxzx(¬z=zy,zXy,zX)𝑦𝑥1𝑧𝑥superscript𝑧limit-from𝑥𝑧superscript𝑧𝑦𝑧𝑋𝑦superscript𝑧𝑋\displaystyle\exists y{\leqslant}x{+}1\ \exists z{\leqslant}x\ \exists z^{\prime}{\leqslant}x\ (\neg z{=}z^{\prime}\wedge\langle y,z\rangle{\in}X\wedge\langle y,z^{\prime}\rangle{\in}X)\ \vee
yx+1yx+1zx(¬y=yy,zXy,zX)).\displaystyle\exists y{\leqslant}x{+}1\ \exists y^{\prime}{\leqslant}x{+}1\ \exists z{\leqslant}x\ (\neg y{=}y^{\prime}\wedge\langle y,z\rangle{\in}X\wedge\langle y^{\prime},z\rangle{\in}X)\big{)}.

Note that ψ=ψ(x):=¬𝑃𝐻𝑃(x)𝜓𝜓𝑥assign𝑃𝐻𝑃𝑥\psi=\psi(x):=\neg\mathit{PHP}(x) is (logically equivalent to) a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula. For the sake of contradiction assume that 𝖵20+{¬αψcc}subscriptsuperscript𝖵02conditional-setsubscriptsuperscript𝛼𝑐𝜓𝑐\mathsf{V}^{0}_{2}+\big{\{}\neg\alpha^{c}_{\psi}\mid c\in\mathbb{N}\big{\}} is inconsistent. By compactness, there exists c𝑐c\in\mathbb{N} such that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} proves αψcsubscriptsuperscript𝛼𝑐𝜓\alpha^{c}_{\psi}.

Claim: 𝖵20+αψcsubscriptsuperscript𝖵02subscriptsuperscript𝛼𝑐𝜓\mathsf{V}^{0}_{2}+\alpha^{c}_{\psi} proves 𝑃𝐻𝑃(x)𝑃𝐻𝑃𝑥\mathit{PHP}(x).

The claim implies the theorem: it is well known [22, Corollary 12.5.5] that there is an expansion (M,RM)𝑀superscript𝑅𝑀(M,R^{M}) of a model M𝑀M of 𝖡𝖠𝖲𝖨𝖢𝖡𝖠𝖲𝖨𝖢\mathsf{BASIC} by an interpretation RMMsuperscript𝑅𝑀𝑀R^{M}\subseteq M of a new predicate R𝑅R such that RMsuperscript𝑅𝑀R^{M} is bounded and witnesses ¬𝑃𝐻𝑃(n)𝑃𝐻𝑃𝑛\neg\mathit{PHP}(n) for some (nonstandard) nM𝑛𝑀n\in M, and, further, (M,RM)𝑀superscript𝑅𝑀(M,R^{M}) models induction for bounded formulas. Let 𝒴𝒴\mathcal{Y} be the collection of bounded sets definable in (M,RM)𝑀superscript𝑅𝑀(M,R^{M}) by bounded formulas. Then (M,𝒴)𝑀𝒴(M,\mathcal{Y}) is a model of 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} with RM𝒴superscript𝑅𝑀𝒴R^{M}\in\mathcal{Y}, so (M,𝒴)¬𝑃𝐻𝑃(n)models𝑀𝒴𝑃𝐻𝑃𝑛(M,\mathcal{Y})\models\neg\mathit{PHP}(n).

We are left to prove the claim. Argue in 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} and set n:=max{|x|,2}assign𝑛𝑥2n:=\max\{|x|,2\}. Then αψcsubscriptsuperscript𝛼𝑐𝜓\alpha^{c}_{\psi} gives a circuit C𝐶C such that

ux(¬C(u)𝑃𝐻𝑃(u)).\forall u{\leqslant}x\ (\neg C(u)\leftrightarrow\mathit{PHP}(u)).

We observe that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} proves that 𝑃𝐻𝑃(x)𝑃𝐻𝑃𝑥\mathit{PHP}(x) is inductive, i.e.,

𝑃𝐻𝑃(0)u<x(𝑃𝐻𝑃(u)𝑃𝐻𝑃(u+1)).𝑃𝐻𝑃0for-all𝑢𝑥𝑃𝐻𝑃𝑢𝑃𝐻𝑃𝑢1\mathit{PHP}(0)\wedge\forall u{<}x\ (\mathit{PHP}(u)\to\mathit{PHP}(u+1)). (6)

Indeed, if X𝑋X is a set that witnesses ¬𝑃𝐻𝑃(u+1)𝑃𝐻𝑃𝑢1\neg\mathit{PHP}(u+1), then we construct a set Y𝑌Y that witnesses ¬𝑃𝐻𝑃(u)𝑃𝐻𝑃𝑢\neg\mathit{PHP}(u) as follows. If there does not exist any vu+1𝑣𝑢1v{\leqslant}u{+}1 with v,uX𝑣𝑢𝑋\langle v,u\rangle{\in}X, then the set Y:=Xassign𝑌𝑋Y:=X itself is the witness we want. On the other hand, if there exists vu+1𝑣𝑢1v{\leqslant}u{+}1 with  v,uX𝑣𝑢𝑋\langle v,u\rangle{\in}X, then let Y𝑌Y be the set of pairs z=x,y𝑧𝑥𝑦z=\langle x,y\rangle such that the two projections x=π1(z)𝑥subscript𝜋1𝑧x=\pi_{1}(z) and y=π2(z)𝑦subscript𝜋2𝑧y=\pi_{2}(z) satisfy the formula φ(x,y,u,v)𝜑𝑥𝑦𝑢𝑣\varphi(x,y,u,v) below, for the fixed parameters u𝑢u and v𝑣v:

φ(x,y,u,v):=xuy<u((x>vx1,yX)(x<vx,yX)).assign𝜑𝑥𝑦𝑢𝑣𝑥𝑢𝑦𝑢𝑥𝑣𝑥1𝑦𝑋𝑥𝑣𝑥𝑦𝑋\displaystyle\varphi(x,y,u,v):=x{\leqslant}u\wedge y{<}u\wedge\big{(}(x{>}v\wedge\langle x{-}1,y\rangle{\in}X)\vee(x{<}v\wedge\langle x,y\rangle{\in}X)\big{)}.

Here, x1𝑥1x{-}1 denotes the (truncated) predecessor 𝖯𝖵𝖯𝖵\mathsf{PV}-function. In the definition of Y𝑌Y we used the two projections π1subscript𝜋1\pi_{1} and π2subscript𝜋2\pi_{2}, also as 𝖯𝖵𝖯𝖵\mathsf{PV}-functions. Since the definition of Y𝑌Y is a quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula, the set Y𝑌Y exists by quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-comprehension, and it is clear by construction that it witnesses ¬𝑃𝐻𝑃(u)𝑃𝐻𝑃𝑢\neg\mathit{PHP}(u).

To complete the proof, plug ¬C(u)𝐶𝑢\neg C(u) for 𝑃𝐻𝑃(u)𝑃𝐻𝑃𝑢\mathit{PHP}(u) in (6) and quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-induction gives ¬C(x)𝐶𝑥\neg C(x), and hence 𝑃𝐻𝑃(x)𝑃𝐻𝑃𝑥\mathit{PHP}(x). ∎

Remark 15.

The model (M,𝒳)𝑀𝒳(M,\mathcal{X}) that witnesses the above consistency is a model of 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} where 𝑃𝐻𝑃(n)𝑃𝐻𝑃𝑛\mathit{PHP}(n) fails for some nonstandard nM𝑛𝑀n\in M: otherwise α¬𝑃𝐻𝑃1subscriptsuperscript𝛼1𝑃𝐻𝑃\alpha^{1}_{\neg\mathit{PHP}} would be true and witnessed by trivial circuits that always reject.

2.3 A strengthening to 𝖯𝖧/𝗉𝗈𝗅𝗒𝖯𝖧𝗉𝗈𝗅𝗒\mathsf{PH/poly}

While our focus is on 𝖯/𝗉𝗈𝗅𝗒𝖯𝗉𝗈𝗅𝗒\mathsf{P/poly}, in this section we point out a version of Theorem 2 stating the consistency of 𝖭𝖤𝖷𝖯𝖯𝖧/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝖧𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{PH/poly}.

For i>0𝑖0i>0, let Ti(e,t,x)subscript𝑇𝑖𝑒𝑡𝑥T_{i}(e,t,x) denote a universal ΣibsubscriptsuperscriptΣ𝑏𝑖\Sigma^{b}_{i}-formula: for every ΣibsubscriptsuperscriptΣ𝑏𝑖\Sigma^{b}_{i}-formula φ(x)𝜑𝑥\varphi(x), there are e,d𝑒𝑑e,d\in\mathbb{N} such that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} (in fact, 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} [22, Corollary 6.1.4]) proves

φ(x)Ti(e,2|x|d+d,x).𝜑𝑥subscript𝑇𝑖𝑒superscript2superscript𝑥𝑑𝑑𝑥\varphi(x)\leftrightarrow T_{i}(e,2^{|x|^{d}+d},x).

Intuitively, the parameter |x|d+dsuperscript𝑥𝑑𝑑|x|^{d}+d serves as a runtime bound of a suitable model-checker coded by e𝑒e. Thus, the formulas Ti(e,2|x|d+d,x)subscript𝑇𝑖𝑒superscript2superscript𝑥𝑑𝑑𝑥T_{i}(e,2^{|x|^{d}+d},x) for varying c,d𝑐𝑑c,d\in\mathbb{N} define (in the standard model) precisely the problems in the i𝑖i-th level Σi𝖯subscriptsuperscriptΣ𝖯𝑖\Sigma^{\mathsf{P}}_{i}of the polynomial hierarchy 𝖯𝖧𝖯𝖧\mathsf{PH}.

We incorporate nonuniformity as follows. Again, let π1,π2subscript𝜋1subscript𝜋2\pi_{1},\pi_{2} be the 𝖯𝖵𝖯𝖵\mathsf{PV}-functions computing the projections for pairs x,y𝑥𝑦\langle x,y\rangle. Define

Ti(a,x):=Ti(π1(a),2|a|,π2(a),x).assignsuperscriptsubscript𝑇𝑖𝑎𝑥subscript𝑇𝑖subscript𝜋1𝑎superscript2𝑎subscript𝜋2𝑎𝑥T_{i}^{\prime}(a,x):=T_{i}(\pi_{1}(a),2^{|a|},\langle\pi_{2}(a),x\rangle).

Thus, a𝑎a determines the runtime bound and some “advice” π2(a)subscript𝜋2𝑎\pi_{2}(a). Then Q𝑄Q\subseteq\mathbb{N} is in 𝖯𝖧/𝗉𝗈𝗅𝗒𝖯𝖧𝗉𝗈𝗅𝗒\mathsf{PH/poly} if there exists i>0𝑖0i>0 and a function a(n)𝑎𝑛a(n) such that |a(n)|𝑎𝑛|a(n)| is polynomially bounded in n𝑛n and such that for all x𝑥x we have xQ𝑥𝑄x\in Q if and only if Ti(a(|x|),x)superscriptsubscript𝑇𝑖𝑎𝑥𝑥T_{i}^{\prime}(a(|x|),x) is true (in the standard model).

Definition 16.

Let i,c𝑖𝑐i,c\in\mathbb{N} and let φ=φ(x)𝜑𝜑𝑥\varphi=\varphi(x) be a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula (with only one free variable x𝑥x, and in particular without free variables of the set sort). Define

αφi,c:=n𝐿𝑜𝑔>1a2ncx<2n(Ti(a,x)φ(x)).\alpha_{\varphi}^{i,c}\ :=\ \forall n{\in}\mathit{Log}_{>1}\ \exists a{\leqslant}2^{n^{c}}\forall x{<}2^{n}\ \big{(}T^{\prime}_{i}(a,x)\leftrightarrow\varphi(x)\big{)}.

It is clear that {¬αφi,ci,c}conditional-setsubscriptsuperscript𝛼𝑖𝑐𝜑𝑖𝑐\bigl{\{}\neg\alpha^{i,c}_{\varphi}\mid i,c\in\mathbb{N}\bigr{\}} is true if and only if the 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-problem defined by φ(x)𝜑𝑥\varphi(x) does not belong to 𝖯𝖧/𝗉𝗈𝗅𝗒𝖯𝖧𝗉𝗈𝗅𝗒\mathsf{PH/poly}. Hence, the following states the consistency of 𝖭𝖤𝖷𝖯𝖯𝖧/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝖧𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{PH/poly}:

Theorem 17.

There exists φ(x)Σ^11,b𝜑𝑥subscriptsuperscript^Σ1𝑏1\varphi(x)\in\hat{\Sigma}^{1,b}_{1} such that 𝖵20+{¬αφi,ci,c}subscriptsuperscript𝖵02conditional-setsubscriptsuperscript𝛼𝑖𝑐𝜑𝑖𝑐\mathsf{V}^{0}_{2}+\bigl{\{}\neg\alpha^{i,c}_{\varphi}\mid i,c\in\mathbb{N}\bigr{\}} is consistent.

This is proved in almost exactly the same way as the just-given proof of Theorem 2. The only difference is that, working in a model of 𝖵20+αφi,csubscriptsuperscript𝖵02subscriptsuperscript𝛼𝑖𝑐𝜑\mathsf{V}^{0}_{2}+\alpha^{i,c}_{\varphi}, the circuit C(x)𝐶𝑥C(x) is replaced with the formula Ti(a,x)subscriptsuperscript𝑇𝑖𝑎𝑥T^{\prime}_{i}(a,x) for an advice string a2|x|c𝑎superscript2superscript𝑥𝑐a\leqslant 2^{|x|^{c}}. The details are left to the reader.

3 Formally verified model-checkers

We shall need to formally reason about certain straightforwardly defined exponential time machines, namely model-checkers and universal machines. A model-checker Mφsubscript𝑀𝜑M_{\varphi} for a formula φ(X¯,x¯)𝜑¯𝑋¯𝑥\varphi(\bar{X},\bar{x}) has oracle access to X¯¯𝑋\bar{X} and, on input x¯¯𝑥\bar{x}, decides whether φ(X¯,x¯)𝜑¯𝑋¯𝑥\varphi(\bar{X},\bar{x}) is true. For example, by nesting a loop for each bounded quantifier, Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-formulas have straightforward model-checkers that run in exponential time and polynomial space. We define such model-checkers with care, so that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) verifies their time and space bounds as well as their correctness. This correctness statement has to be formulated carefully because, in general, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) cannot prove that a halting computation of MφX¯subscriptsuperscript𝑀¯𝑋𝜑M^{\bar{X}}_{\varphi} on x¯¯𝑥\bar{x} exists. Thus, proving correctness means to show that if a computation exists, then it does what it is supposed to do. To prove this we use some constructions that are similar in spirit to those in [5].

3.1 Preliminaries: explicit machines

In short, a machine will be called explicit if the theory 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that its halting computations terminate within a specified number of steps, using no more than a specified amount of space in its work tapes, and by querying its oracles no further than a specified position.

Machine model.

Our model of computation is the multi-tape oracle Turing machine with one-sided infinite tapes (i.e., cells indexed by \mathbb{N}) and an alphabet containing {0,1}01\{0,1\}. The content of cell 00 is fixed to a fixed symbol marking the end of the tape. At the start, the heads scan cell 111. The machines can be deterministic or non-deterministic. Such a machine M𝑀M has read-only input tapes, and work tapes and oracle tapes. If there are k𝑘k input tapes, then its inputs are k𝑘k-tuples x¯=(x1,,xk)¯𝑥subscript𝑥1subscript𝑥𝑘\bar{x}=(x_{1},\ldots,x_{k}) of numbers with the length-|xi|subscript𝑥𝑖|x_{i}| binary representation of xisubscript𝑥𝑖x_{i} written on the i𝑖i-th input tape. The length of the input is |x¯|=maxi|xi|¯𝑥subscript𝑖subscript𝑥𝑖|\bar{x}|=\max_{i}|x_{i}|. If M𝑀M does not have oracle tapes, then it is a machine without oracles. If M𝑀M has 11\ell\geqslant 1 oracle tapes, then we write MX¯superscript𝑀¯𝑋M^{\bar{X}} for the machine with oracles X¯=(X1,,X)¯𝑋subscript𝑋1subscript𝑋\bar{X}=(X_{1},\ldots,X_{\ell}). When the machine enters a special query state, it moves to one out of 2superscript22^{\ell} many special answer states which codes the answers to the \ell queries written on the \ell oracle tapes, i.e., whether the number written (in binary) on the i𝑖i-th oracle tape belongs to Xisubscript𝑋𝑖X_{i} or not.

A partial space-s𝑠s time-t𝑡t query-q𝑞q computation of MX¯superscript𝑀¯𝑋M^{\bar{X}} on x¯¯𝑥\bar{x} comprises t+1𝑡1t+1 configurations, the first one being the starting configuration, every other being a successor of the previous one, and repeating halting configurations, if any. Being space-s𝑠s means that the largest visited cell on each tape is at most s𝑠s, and being query-q𝑞q means that the largest visited cell on each oracle tape is at most most |q|𝑞|q|; in other words, all queries have length at most |q|𝑞|q|. Query lengths are bounded by |q|𝑞|q| instead of q𝑞q so that all queries are restricted to have polynomial length.

Coding computations.

Fix a machine M𝑀M. Let s,t,q𝑠𝑡𝑞s,t,q\in\mathbb{N} and consider a partial space-s𝑠s, time-t𝑡t, query-q𝑞q computation of M𝑀M on an unspecified input with unspecified oracles. A configuration is coded by an (s+1)𝑠1(s{+}1)-tuple (q,c0,,cs1)𝑞subscript𝑐0subscript𝑐𝑠1(q,c_{0},\ldots,c_{s-1}) of numbers: q𝑞q codes the current state of the machine; cisubscript𝑐𝑖c_{i} codes, for each tape, a position bit indicating whether the index of the currently scanned cell is at most i𝑖i and, for each work or oracle tape, the content of cell i𝑖i. We assume that these numbers are smaller than M𝑀M (the machine is (coded by) a number), so we get an (s+1)×(t+1)𝑠1𝑡1(s{+}1)\times(t{+}1) matrix of such numbers. This matrix is coded by the set Y𝑌Y of numbers bounded by s,t,|M|𝑠𝑡𝑀\langle s,t,|M|\rangle that contains exactly those i,j,k𝑖𝑗𝑘\langle i,j,k\rangle such that is𝑖𝑠i\leqslant sjt𝑗𝑡j\leqslant tk<|M|𝑘𝑀k<|M| and the (i,j)𝑖𝑗(i,j)-entry of the matrix has k𝑘k-bit 111.

The details of the encoding are irrelevant. What is required is that there is a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function fYsuperscript𝑓𝑌f^{Y} such that fY(t,s,q,j)superscript𝑓𝑌𝑡𝑠𝑞𝑗f^{Y}(t,s,q,j) gives, about the j𝑗j-th configuration, a number coding the state, the positions of the heads, the contents of the cells they scan, and the numbers that are written in binary in the first |q|𝑞|q| cells of the oracle tapes. In the encoding sketched above, to find the position of a specific head, fYsuperscript𝑓𝑌f^{Y} uses binary search to find is𝑖𝑠i\leqslant s where its position bit flips; computing the oracle queries is possible because the oracle tapes contain numbers below 2|q|superscript2𝑞2^{|q|}. Having fYsuperscript𝑓𝑌f^{Y}, it is straightforward to write a natural Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula stating

Y is a partial space-s time-t query-q computation of MX¯ on x¯.Y is a partial space-s time-t query-q computation of MX¯ on x¯\textit{``$Y$ is a partial space-$s$ time-$t$ query-$q$ computation of~{}$M^{\bar{X}}$ on~{}$\bar{x}$''}. (7)

The free variables of this formula are Y,X¯,x¯,s,t,q𝑌¯𝑋¯𝑥𝑠𝑡𝑞Y,\bar{X},\bar{x},s,t,q. Exceptionally, we shall also consider M𝑀M on the formal level, in which case M𝑀M is an additional free number variable. All quantifiers in the Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula (7) can be 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)-provably bounded by p(s,t,|q|,|M|,|x¯|)𝑝𝑠𝑡𝑞𝑀¯𝑥p(s,t,|q|,|M|,|\bar{x}|) for a polynomial p𝑝p, where |x¯|¯𝑥|\bar{x}| stands for |x1|,,|xk|subscript𝑥1subscript𝑥𝑘|x_{1}|,\ldots,|x_{k}|. If M𝑀M is a machine without oracles, the formula is 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)-provably equivalent to the one with q=0𝑞0q=0, and we omit ‘query-q𝑞q’. We also omit ‘space s𝑠s’ if s=t𝑠𝑡s=t. Further, replacing ‘partial’ by ‘halting’ or ‘accepting’ or ‘rejecting’ are obvious modifications of the formula.

Explicit machines.

Binary search gives a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function timeY(s,t)superscripttime𝑌𝑠𝑡\textit{time}^{Y}(s,t) such that, provably in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha), if Y𝑌Y is a halting time-t𝑡t space-s𝑠s query-q𝑞q computation of MX¯superscript𝑀¯𝑋M^{\bar{X}} on x¯¯𝑥\bar{x}, then timeY(s,t)superscripttime𝑌𝑠𝑡\textit{time}^{Y}(s,t) is the minimal jt𝑗𝑡j\leqslant t such that the j𝑗j-th configuration in Y𝑌Y is halting. We make the further assumption that M𝑀M never writes blank (but can write a copy of this symbol), so heads leave marks on visited cells. Binary search can then compute the maximal non-blank cell in the j𝑗j-th configuration on any tape. By quantifier-free induction for 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that this cell number is non-decreasing for j=0,1,,t𝑗01𝑡j=0,1,\ldots,t. Hence, there is a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function spaceY(s,t)superscriptspace𝑌𝑠𝑡\textit{space}^{Y}(s,t) such that, provably in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha), if Y𝑌Y is a halting time-t𝑡t space-s𝑠s query-q𝑞q computation of MX¯superscript𝑀¯𝑋M^{\bar{X}} on x¯¯𝑥\bar{x}, then spaceY(s,t)superscriptspace𝑌𝑠𝑡\textit{space}^{Y}(s,t) is the maximal cell visited in Y𝑌Y on any tape. Similarly, there is a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function queryY(s,t)superscriptquery𝑌𝑠𝑡\textit{query}^{Y}(s,t) that computes the maximal cell visited on a query tape.

Definition 18.

A machine M𝑀M is explicit if there are terms s(x¯),t(x¯),q(x¯)𝑠¯𝑥𝑡¯𝑥𝑞¯𝑥s(\bar{x}),t(\bar{x}),q(\bar{x}) such that

𝖲21(α)Y is a halting space-s time-t query-q computation of MX¯ on x¯timeY(s,t)t(x¯)spaceY(s,t)s(x¯)queryY(s,t)|q(x¯)|.subscriptsuperscript𝖲12𝛼provesY is a halting space-s time-t query-q computation of MX¯ on x¯absentmissing-subexpressionmissing-subexpressionsuperscripttime𝑌superscript𝑠superscript𝑡𝑡¯𝑥superscriptspace𝑌superscript𝑠superscript𝑡𝑠¯𝑥superscriptquery𝑌superscript𝑠superscript𝑡𝑞¯𝑥\begin{array}[]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\textit{``$Y$ is a halting space-$s^{\prime}$ time-$t^{\prime}$ query-$q^{\prime}$ computation of~{}$M^{\bar{X}}$ on~{}$\bar{x}$''}\to\\ &&\quad\textit{time}^{Y}(s^{\prime},t^{\prime})\leqslant t(\bar{x})\wedge\textit{space}^{Y}(s^{\prime},t^{\prime})\leqslant s(\bar{x})\wedge\textit{query}^{Y}(s^{\prime},t^{\prime})\leqslant|q(\bar{x})|.\end{array}

We say that the terms s=s(x¯),t=t(x¯),q=q(x¯)formulae-sequence𝑠𝑠¯𝑥formulae-sequence𝑡𝑡¯𝑥𝑞𝑞¯𝑥s=s(\bar{x}),t=t(\bar{x}),q=q(\bar{x}) witness that M𝑀M is explicit. Further, if r(x¯)𝑟¯𝑥r(\bar{x}) is another term, then we say that r=r(x¯)𝑟𝑟¯𝑥r=r(\bar{x}) witnesses that M𝑀M is an

explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine if it is non-deterministic with t=s=q=r𝑡𝑠𝑞𝑟t=s=q=r;
explicit 𝖤𝖷𝖯𝖤𝖷𝖯\mathsf{EXP}-machine if it is deterministic with t=s=q=r𝑡𝑠𝑞𝑟t=s=q=r;
explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine if it is deterministic with t=q=r𝑡𝑞𝑟t=q=r and s=|r|𝑠𝑟s=|r|;
explicit 𝖭𝖯𝖭𝖯\mathsf{NP}-machine if it is non-deterministic with t=s=|r|𝑡𝑠𝑟t=s=|r| and q=r𝑞𝑟q=r;
explicit 𝖯𝖯\mathsf{P}-machine if it is deterministic with t=s=|r|𝑡𝑠𝑟t=s=|r| and q=r𝑞𝑟q=r.

Observe that, if s,t,q𝑠𝑡𝑞s,t,q witness that M𝑀M is explicit, and s=s(x¯)superscript𝑠superscript𝑠¯𝑥s^{\prime}=s^{\prime}(\bar{x}), t=t(x¯)superscript𝑡superscript𝑡¯𝑥t^{\prime}=t^{\prime}(\bar{x}), q=q(x¯)superscript𝑞superscript𝑞¯𝑥q^{\prime}=q^{\prime}(\bar{x}) are terms such that 𝖲21s(x¯)s(x¯)t(x¯)t(x¯)q(x¯)q(x¯)provessubscriptsuperscript𝖲12𝑠¯𝑥superscript𝑠¯𝑥𝑡¯𝑥superscript𝑡¯𝑥𝑞¯𝑥superscript𝑞¯𝑥\mathsf{S}^{1}_{2}\vdash s(\bar{x}){\leqslant}s^{\prime}(\bar{x})\wedge t(\bar{x}){\leqslant}t^{\prime}(\bar{x})\wedge q(\bar{x}){\leqslant}q^{\prime}(\bar{x}), then also s,t,qsuperscript𝑠superscript𝑡superscript𝑞s^{\prime},t^{\prime},q^{\prime} witness that M𝑀M is explicit. E.g., if r𝑟r witnesses that M𝑀M is an explicit 𝖯𝖯\mathsf{P}-machine, then r𝑟r also witnesses that M𝑀M is an explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine.

Given an explicit machine M𝑀M, we omit ‘space-s𝑠s time-t𝑡t query-q𝑞q’ in (7) and its variations with ‘halting’, ‘accepting’ or ‘rejecting’. E.g. for an explicit 𝖤𝖷𝖯𝖤𝖷𝖯\mathsf{EXP}-machine M𝑀M, say witnessed by r=r(x¯)𝑟𝑟¯𝑥r=r(\bar{x}), we have a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula

Y is an accepting computation of MX¯ on x¯.Y is an accepting computation of MX¯ on x¯\textit{``$Y$ is an accepting computation of $M^{\bar{X}}$ on $\bar{x}$''}. (8)

This means that Y𝑌Y is a space-r(x¯)𝑟¯𝑥r(\bar{x}) time-r(x¯)𝑟¯𝑥r(\bar{x}) query-r(x¯)𝑟¯𝑥r(\bar{x}) computation of MX¯superscript𝑀¯𝑋M^{\bar{X}} on x¯¯𝑥\bar{x} that ends in an accepting halting configuration, and all queries zX𝑧𝑋z\in X?” during the computation satisfy z<2|r(x¯)|𝑧superscript2𝑟¯𝑥z<2^{|r(\bar{x})|}. In particular,

Yr(x¯),r(x¯),|M|𝑌𝑟¯𝑥𝑟¯𝑥𝑀Y{\leqslant}\langle r(\bar{x}),r(\bar{x}),|M|\rangle (9)

provably in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha). Furthermore, all quantifiers in the Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula (8) can be 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)-provably bounded by p(r(x¯),|M|,|x¯|)𝑝𝑟¯𝑥𝑀¯𝑥p(r(\bar{x}),|M|,|\bar{x}|) for a polynomial p𝑝p, where |x¯|¯𝑥|\bar{x}| stands for |x1|,,|xk|subscript𝑥1subscript𝑥𝑘|x_{1}|,\ldots,|x_{k}|.

Thereby, our mode of speech follows [22, Definition 8.1.2] in that the time bound is used to determine the bound on the oracle tapes.

Polynomial-time computations.

It is well-known that 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} formalizes polynomial time computations. We shall use this in the form of the following lemma.

For an explicit 𝖯𝖯\mathsf{P}-machine M𝑀M, its computations Y𝑌Y can be coded by numbers y𝑦y and we get a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula

y is a halting computation of MX¯ on x¯.y is a halting computation of MX¯ on x¯\textit{``$y$ is a halting computation of $M^{\bar{X}}$ on $\bar{x}$''}.

Here, y𝑦y is a number sort variable, and the free variables are X¯,x¯,y¯𝑋¯𝑥𝑦\bar{X},\bar{x},y. If M𝑀M has a special output tape, we agree that the output of a computation is the number whose binary representation is written in cells 1,2,121,2,\ldots up to the first cell not containing a bit. We have a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function outMsubscriptout𝑀\textit{out}_{M} such that, provably in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha), if y𝑦y is a halting computation of MX¯superscript𝑀¯𝑋M^{\bar{X}} on x¯¯𝑥\bar{x}, then outM(y,j)subscriptout𝑀𝑦𝑗\textit{out}_{M}(y,j) is the content of cell j𝑗j of the output tape in the halting configuration in case this is a bit; otherwise outM(y,j)=2subscriptout𝑀𝑦𝑗2\textit{out}_{M}(y,j){=}2. In particular, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves outM(y,j)2subscriptout𝑀𝑦𝑗2\textit{out}_{M}(y,j){\leqslant}2,

Lemma 19.

For every 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function fX¯(x¯)superscript𝑓¯𝑋¯𝑥f^{\bar{X}}(\bar{x}) there are an explicit 𝖯𝖯\mathsf{P}-machine M𝑀M and a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function gX¯(x¯)superscript𝑔¯𝑋¯𝑥g^{\bar{X}}(\bar{x}) such that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves

(y is a halting computation of MX¯ on x¯y=gX¯(x¯))\displaystyle\big{(}\textit{``$y$ is a halting computation of $M^{\bar{X}}$ on $\bar{x}$''}\leftrightarrow y{=}g^{\bar{X}}(\bar{x})\big{)}\wedge
(j<|fX¯(x¯)|outM(gX¯(x¯),j+1)=𝑏𝑖𝑡(fX¯(x¯),j))limit-from𝑗superscript𝑓¯𝑋¯𝑥subscriptout𝑀superscript𝑔¯𝑋¯𝑥𝑗1𝑏𝑖𝑡superscript𝑓¯𝑋¯𝑥𝑗\displaystyle\big{(}j{<}|f^{\bar{X}}(\bar{x})|\to\textit{out}_{M}(g^{\bar{X}}(\bar{x}),j{+}1){=}\mathit{bit}(f^{\bar{X}}(\bar{x}),j)\big{)}\wedge
(j|fX¯(x¯)|outM(gX¯(x¯),j+1)=2).𝑗superscript𝑓¯𝑋¯𝑥subscriptout𝑀superscript𝑔¯𝑋¯𝑥𝑗12\displaystyle\big{(}j{\geqslant}|f^{\bar{X}}(\bar{x})|\to\textit{out}_{M}(g^{\bar{X}}(\bar{x}),j{+}1){=}2\big{)}.

In the statement of the lemma, 𝑏𝑖𝑡(n,i)𝑏𝑖𝑡𝑛𝑖\mathit{bit}(n,i) is a 𝖯𝖵𝖯𝖵\mathsf{PV}-function computing the i𝑖i-bit of the binary representation of n𝑛n, i.e., 𝑏𝑖𝑡(n,i)=n/2imod 2𝑏𝑖𝑡𝑛𝑖𝑛superscript2𝑖mod2\mathit{bit}(n,i)=\lfloor n/2^{i}\rfloor\ \mathrm{mod}\ 2 (in the standard model). In particular, we have 𝑏𝑖𝑡(n,i)=0𝑏𝑖𝑡𝑛𝑖0\mathit{bit}(n,i)=0 for i|n|𝑖𝑛i\geqslant|n|.

3.2 Deterministic model-checkers

For every Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-formula φ=φ(X¯,x¯)𝜑𝜑¯𝑋¯𝑥\varphi=\varphi(\bar{X},\bar{x}) in the language 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha) we define its bounding term 𝑏𝑡φ(x¯)subscript𝑏𝑡𝜑¯𝑥\mathit{bt}_{\varphi}(\bar{x}) as follows:

  1. 1.

    𝑏𝑡φ=0subscript𝑏𝑡𝜑0\mathit{bt}_{\varphi}=0 if φ𝜑\varphi is atomic,

  2. 2.

    𝑏𝑡φ=𝑏𝑡ψsubscript𝑏𝑡𝜑subscript𝑏𝑡𝜓\mathit{bt}_{\varphi}=\mathit{bt}_{\psi} if φ=¬ψ𝜑𝜓\varphi=\neg\psi,

  3. 3.

    𝑏𝑡φ=𝑏𝑡ψ+𝑏𝑡θsubscript𝑏𝑡𝜑subscript𝑏𝑡𝜓subscript𝑏𝑡𝜃\mathit{bt}_{\varphi}=\mathit{bt}_{\psi}+\mathit{bt}_{\theta} if φ=(ψθ)𝜑𝜓𝜃\varphi=(\psi\wedge\theta),

  4. 4.

    𝑏𝑡φ=𝑏𝑡ψ(x¯,t(x¯))+t(x¯)subscript𝑏𝑡𝜑subscript𝑏𝑡𝜓¯𝑥𝑡¯𝑥𝑡¯𝑥\mathit{bt}_{\varphi}=\mathit{bt}_{\psi}(\bar{x},t(\bar{x}))+t(\bar{x}) if φ=yt(x¯)ψ(X¯,x¯,y)𝜑𝑦𝑡¯𝑥𝜓¯𝑋¯𝑥𝑦\varphi=\exists y{\leqslant}t(\bar{x})\ \psi(\bar{X},\bar{x},y).

Lemma 20.

For every Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-formula φ=φ(X¯,x¯)𝜑𝜑¯𝑋¯𝑥\varphi=\varphi(\bar{X},\bar{x}) there are an explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine MφX¯superscriptsubscript𝑀𝜑¯𝑋M_{\varphi}^{\bar{X}}, a Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-formula Cφ(X¯,x¯,u)subscript𝐶𝜑¯𝑋¯𝑥𝑢\mathit{C}_{\varphi}(\bar{X},\bar{x},u), terms rφ(x¯),sφ(x¯)subscript𝑟𝜑¯𝑥subscript𝑠𝜑¯𝑥r_{\varphi}(\bar{x}),s_{\varphi}(\bar{x}), and a polynomial pφ(m,n¯)subscript𝑝𝜑𝑚¯𝑛p_{\varphi}(m,\bar{n}), such that

  1. (a)

    𝖲21(α)Y is an accepting computation of MφX¯ on x¯φ(X¯,x¯)provessubscriptsuperscript𝖲12𝛼Y is an accepting computation of MφX¯ on x¯𝜑¯𝑋¯𝑥\mathsf{S}^{1}_{2}(\alpha)\vdash\textit{``$Y$ is an accepting computation of~{}$M_{\varphi}^{\bar{X}}$ on $\bar{x}$''}\to\varphi(\bar{X},\bar{x}),

  2. (b)

    𝖲21(α)Y is a rejecting computation of MφX¯ on x¯¬φ(X¯,x¯)provessubscriptsuperscript𝖲12𝛼Y is a rejecting computation of MφX¯ on x¯𝜑¯𝑋¯𝑥\mathsf{S}^{1}_{2}(\alpha)\vdash\textit{``$Y$ is a rejecting computation of~{}$M_{\varphi}^{\bar{X}}$ on $\bar{x}$''}\to\neg\varphi(\bar{X},\bar{x}),

  3. (c)

    𝖲21(α)Cφ(X¯,x¯,) is a halting computation of MφX¯ on x¯provessubscriptsuperscript𝖲12𝛼Cφ(X¯,x¯,) is a halting computation of MφX¯ on x¯\mathsf{S}^{1}_{2}(\alpha)\vdash\textit{``$\mathit{C}_{\varphi}(\bar{X},\bar{x},\cdot)$ is a halting computation of~{}$M_{\varphi}^{\bar{X}}$ on $\bar{x}$''},

  4. (d)

    𝖲21(α)rφ(x¯)pφ(𝑏𝑡φ(x¯),|x¯|)provessubscriptsuperscript𝖲12𝛼subscript𝑟𝜑¯𝑥subscript𝑝𝜑subscript𝑏𝑡𝜑¯𝑥¯𝑥\mathsf{S}^{1}_{2}(\alpha)\vdash\ r_{\varphi}(\bar{x})\leqslant p_{\varphi}(\mathit{bt}_{\varphi}(\bar{x}),|\bar{x}|) ,

  5. (e)

    rφ(x¯),sφ(x¯)subscript𝑟𝜑¯𝑥subscript𝑠𝜑¯𝑥r_{\varphi}(\bar{x}),s_{\varphi}(\bar{x}) witness MφX¯subscriptsuperscript𝑀¯𝑋𝜑M^{\bar{X}}_{\varphi} as explicit 𝖤𝖷𝖯𝖤𝖷𝖯\mathsf{EXP}- and 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machines, respectively.

In addition, if φ=φ(X¯,x¯)𝜑𝜑¯𝑋¯𝑥\varphi=\varphi(\bar{X},\bar{x}) is a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula, then there are a term tφ(x¯)subscript𝑡𝜑¯𝑥t_{\varphi}(\bar{x}) and a quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula Cφ(X¯,x¯,w,u)subscript𝐶𝜑¯𝑋¯𝑥𝑤𝑢\mathit{C}_{\varphi}(\bar{X},\bar{x},w,u) such that

  1. 6.

    𝖳21(α)wtφ(x¯)Cφ(X¯,x¯,w,) is a halting computation of MφX¯ on x¯provessubscriptsuperscript𝖳12𝛼𝑤subscript𝑡𝜑¯𝑥Cφ(X¯,x¯,w,) is a halting computation of MφX¯ on x¯\mathsf{T}^{1}_{2}(\alpha)\vdash\ \exists w{\leqslant}t_{\varphi}(\bar{x})\ \textit{``$\mathit{C}_{\varphi}(\bar{X},\bar{x},w,\cdot)$ is a halting computation of~{}$M_{\varphi}^{\bar{X}}$ on $\bar{x}$''},

  2. 7.

    𝖲21(α)φ(X¯,x¯)provessubscriptsuperscript𝖲12𝛼𝜑¯𝑋¯𝑥absent\mathsf{S}^{1}_{2}(\alpha)\vdash\ \varphi(\bar{X},\bar{x})\to Cφ(X¯,x¯,tφ(x¯),)subscript𝐶𝜑¯𝑋¯𝑥subscript𝑡𝜑¯𝑥\mathit{C}_{\varphi}(\bar{X},\bar{x},t_{\varphi}(\bar{x}),\cdot) is an accepting computation of MφX¯superscriptsubscript𝑀𝜑¯𝑋M_{\varphi}^{\bar{X}} on x¯¯𝑥\bar{x}.

Proof.

Call a Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-formula φ=φ(X¯,x¯)𝜑𝜑¯𝑋¯𝑥\varphi=\varphi(\bar{X},\bar{x}) good if it satisfies (a)–(e). Observe that all Σ0b(α)subscriptsuperscriptΣ𝑏0𝛼\Sigma^{b}_{0}(\alpha)-formulas are good: they are 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)-provably equivalent to formulas of the form fX¯(x¯)=1superscript𝑓¯𝑋¯𝑥1f^{\bar{X}}(\bar{x}){=}1 for some 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function fX¯(x¯)superscript𝑓¯𝑋¯𝑥f^{\bar{X}}(\bar{x}), and we can choose a machine according to Lemma 19. Recall that an explicit 𝖯𝖯\mathsf{P}-machine is also an explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine and explicit 𝖤𝖷𝖯𝖤𝖷𝖯\mathsf{EXP}-machine (in this case, all three witnessed by the same term).

We leave it to the reader to check that the good formulas are closed under Boolean combinations. We are then left to show that if

φ(X¯,x¯)=yt(x¯)ψ(X¯,x¯,y)𝜑¯𝑋¯𝑥𝑦𝑡¯𝑥𝜓¯𝑋¯𝑥𝑦\varphi(\bar{X},\bar{x})\ =\ \exists y{\leqslant}t(\bar{x})\ \psi(\bar{X},\bar{x},y) (10)

for a term t(x¯)𝑡¯𝑥t(\bar{x}) and a good formula ψ=ψ(X¯,x¯,y)𝜓𝜓¯𝑋¯𝑥𝑦\psi=\psi(\bar{X},\bar{x},y), then φ𝜑\varphi is good. To lighten the notation, in the following we drop any reference to the set-parameters X¯¯𝑋\bar{X} in the formulas, and to the oracles X¯¯𝑋\bar{X} in machines, since they remain fixed throughout the proof.

The machine Mφsubscript𝑀𝜑M_{\varphi} runs a loop searching for a y𝑦y in {0,,t(x¯)}0𝑡¯𝑥\{0,\ldots,t(\bar{x})\} that satisfies ψ𝜓\psi. On input x¯¯𝑥\bar{x}, it writes y:=0assign𝑦0y:=0 on a work tape and then loops: it checks whether yt(x¯)𝑦𝑡¯𝑥y\leqslant t(\bar{x}) and, if so, it updates y:=y+1assign𝑦𝑦1y:=y+1 and runs Mψsubscript𝑀𝜓M_{\psi} on (x¯,y)¯𝑥𝑦(\bar{x},y); otherwise it halts. It accepts or rejects according to a flag bit b𝑏b stored in its state space: b𝑏b is initially set to 00, and it is set to 1 when and if an Mψsubscript𝑀𝜓M_{\psi}-run accepts.

To prove (a)–(e) we want a quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula D(Y,x¯,y,u)𝐷𝑌¯𝑥𝑦𝑢D(Y,\bar{x},y,u) that extracts the Mψsubscript𝑀𝜓M_{\psi}-computation simulated in the y𝑦y-loop. More precisely, we want 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) to prove that, if Y𝑌Y is a halting computation of Mφsubscript𝑀𝜑M_{\varphi} on x¯¯𝑥\bar{x}, then D(Y,x¯,y,)𝐷𝑌¯𝑥𝑦D(Y,\bar{x},y,\cdot) is a halting computation of Mψsubscript𝑀𝜓M_{\psi} on (x¯,y)¯𝑥𝑦(\bar{x},y). For this, we design the details of Mφsubscript𝑀𝜑M_{\varphi} in a way so that the j𝑗j-th step of the computation of Mψsubscript𝑀𝜓M_{\psi} on (x¯,y)¯𝑥𝑦(\bar{x},y) is simulated by Mφsubscript𝑀𝜑M_{\varphi} at a time easily computed from x¯,y,j¯𝑥𝑦𝑗\bar{x},y,j.

Description of Mφsubscript𝑀𝜑M_{\varphi}. Set r(x¯):=rψ(x¯,t(x¯))assign𝑟¯𝑥subscript𝑟𝜓¯𝑥𝑡¯𝑥r(\bar{x}):=r_{\psi}(\bar{x},t(\bar{x})) where rψ(x¯,y)subscript𝑟𝜓¯𝑥𝑦r_{\psi}(\bar{x},y) is the term claimed to exist for ψ𝜓\psi. Note that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that rψ(x¯,y)r(x¯)subscript𝑟𝜓¯𝑥𝑦𝑟¯𝑥r_{\psi}(\bar{x},y)\leqslant r(\bar{x}) for yt(x¯)𝑦𝑡¯𝑥y\leqslant t(\bar{x}). Additionally to properties (a)–(e) for ψ𝜓\psi, we assume inductively that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that the halting configuration of Mψsubscript𝑀𝜓M_{\psi} on (x¯,y)¯𝑥𝑦(\bar{x},y) equals the initial configuration except for the state, that is, Mψsubscript𝑀𝜓M_{\psi} cleans all worktapes and moves all heads back to cell 111 before it halts.

Our machine initially computes t=t(x¯)𝑡𝑡¯𝑥t=t(\bar{x}) and r=r(x¯)𝑟𝑟¯𝑥r=r(\bar{x}) and two binary clocks initially set to 0|t|superscript0𝑡0^{|t|} and 0|r|superscript0𝑟0^{|r|}. The terms are evaluated using explicit 𝖯𝖯\mathsf{P}-machines according to Lemma 19. The initial settings of the clocks are simply computed by scanning the binary representations of t𝑡t and r𝑟r that were computed at the start. This initial computation of terms, and initialization of clocks, takes time exactly ini(x¯)ini¯𝑥\textit{ini}(\bar{x}) for some 𝖯𝖵𝖯𝖵\mathsf{PV}-function ini(x¯)ini¯𝑥\textit{ini}(\bar{x}). Further, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves ini(x¯)|ti(x¯)|ini¯𝑥subscript𝑡i¯𝑥\textit{ini}(\bar{x})\leqslant|t_{\textit{i}}(\bar{x})| for a suitable term ti(x¯)subscript𝑡i¯𝑥t_{\textit{i}}(\bar{x}).

The y𝑦y-loop is implemented as follows. First update y𝑦y, the value of the first clock. To do this, sweep over the first clock, and then back, in exactly (2|t|+2)2𝑡2(2|t|+2) steps, doing the following: copy y𝑦y without leading 00’s to some tape, so this tape holds the length-|y|𝑦|y| binary representation of y𝑦y (as expected by Mψsubscript𝑀𝜓M_{\psi}); increase the clock by 111 if y<t𝑦𝑡y<t, and reset it to 0|t|superscript0𝑡0^{|t|} if y=t𝑦𝑡y=t; in the latter case store a bit signaling this; this signal bit halts the computation (in the next y𝑦y-loop) instead of doing the y𝑦y-update. After this y𝑦y-update, simulate r𝑟r steps of Mψsubscript𝑀𝜓M_{\psi} on (x¯,y)¯𝑥𝑦(\bar{x},y) by an inner loop: in 2|r|+22𝑟22|r|+2 steps sweep twice over the second clock. If its value was smaller that r𝑟r, then increase it by 111 and simulate the next step of Mψsubscript𝑀𝜓M_{\psi}’s computation; this can mean repeating the halting computation. If its value was not smaller than r𝑟r, then set the clock back to 0|r|superscript0𝑟0^{|r|}. Thus, exactly 2|r|+32𝑟32|r|+3 steps are spent for one step of Mψsubscript𝑀𝜓M_{\psi} and one y𝑦y-loop takes exactly t(x¯):=(r(x¯)+1)(2|r(x¯)|+3)assignsubscript𝑡¯𝑥𝑟¯𝑥12𝑟¯𝑥3t_{\ell}(\bar{x}):=(r(\bar{x})+1)\cdot(2|r(\bar{x})|+3) steps.

If the signal bit halts the computation, then our machine first cleans all tapes and moves heads back to cell 111, before halting. We omit a description of this final polynomial time computation. It can be implemented to take exactly 𝑓𝑖𝑛(x¯)𝑓𝑖𝑛¯𝑥\mathit{fin}(\bar{x}) steps for a 𝖯𝖵𝖯𝖵\mathsf{PV}-function 𝑓𝑖𝑛(x¯)𝑓𝑖𝑛¯𝑥\mathit{fin}(\bar{x}), and 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} proves 𝑓𝑖𝑛(x¯)|tf(x¯)|𝑓𝑖𝑛¯𝑥subscript𝑡f¯𝑥\mathit{fin}(\bar{x})\leqslant|t_{\textit{f}}(\bar{x})| for a suitable term tf(x¯)subscript𝑡f¯𝑥t_{\textit{f}}(\bar{x}).

Thus Mφsubscript𝑀𝜑M_{\varphi} runs in time exactly ini(x¯)+(t(x¯)+1)t(x¯)+fin(x¯)ini¯𝑥𝑡¯𝑥1subscript𝑡¯𝑥fin¯𝑥\textit{ini}(\bar{x})+(t(\bar{x})+1)\cdot t_{\ell}(\bar{x})+\textit{fin}(\bar{x}). It simulates r𝑟r steps of Mψsubscript𝑀𝜓M_{\psi} on (x¯,y)¯𝑥𝑦(\bar{x},y) at times

t(x¯,y,j):=𝑖𝑛𝑖(x¯)+yt(x¯)+(j+1)(2|r(x¯)|+3)assign𝑡¯𝑥𝑦𝑗𝑖𝑛𝑖¯𝑥𝑦subscript𝑡¯𝑥𝑗12𝑟¯𝑥3t(\bar{x},y,j):=\mathit{ini}(\bar{x})+y\cdot t_{\ell}(\bar{x})+(j+1)\cdot(2|r(\bar{x})|+3) (11)

for j<r(x¯)𝑗𝑟¯𝑥j<r(\bar{x}).

Explicitness: proof of (d)–(e). Let sψ(x¯,y)subscript𝑠𝜓¯𝑥𝑦s_{\psi}(\bar{x},y) be the term that witnesses Mψsubscript𝑀𝜓M_{\psi} as an explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine. Let Y𝑌Y be a halting computation of Mφsubscript𝑀𝜑M_{\varphi} on x¯¯𝑥\bar{x}. There is a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function that from x¯¯𝑥\bar{x} computes (a number coding) the initial computation of terms and clocks, and 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves its halting configuration is as described. Clearly, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that the first ini(x¯)ini¯𝑥\textit{ini}(\bar{x}) steps of Y𝑌Y coincide with this computation. In particular, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that the clocks computed in Y𝑌Y have the desired length. Similarly, there is a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function that from x¯,y,j¯𝑥𝑦𝑗\bar{x},y,j computes (a number coding) the space-|sψ(x¯,y)|subscript𝑠𝜓¯𝑥𝑦|s_{\psi}(\bar{x},y)| configuration of Mψsubscript𝑀𝜓M_{\psi} at time t(x¯,y,j)𝑡¯𝑥𝑦𝑗t(\bar{x},y,j) in Y𝑌Y.

We prove, by quantifier-free induction, that the computation Y𝑌Y simulates the steps of Mψsubscript𝑀𝜓M_{\psi} at times t(y,j):=t(x¯,y,j)assign𝑡𝑦𝑗𝑡¯𝑥𝑦𝑗t(y,j):=t(\bar{x},y,j) for yt𝑦𝑡y\leqslant t and j<r𝑗𝑟j<r. Assume this holds for time t(y,j)𝑡𝑦𝑗t(y,j). We verify it for time t(y,j+1)𝑡𝑦𝑗1t(y,j+1) or time t(y+1,0)𝑡𝑦10t(y+1,0) depending on whether j<r𝑗𝑟j<r or j=r𝑗𝑟j=r. Assume the former; the latter case is similar. Compute the time-(2|r|+3)2𝑟3(2|r|+3) computation (that sweeps twice over the clock and simulates one more step of Mψsubscript𝑀𝜓M_{\psi}) starting at the configuration at time t(y,j)𝑡𝑦𝑗t(y,j); then Y𝑌Y must coincide with this computation between time t(y,j)𝑡𝑦𝑗t(y,j) and time t(y,j+1)𝑡𝑦𝑗1t(y,j+1). Hence, Y𝑌Y simulates a step of Mψsubscript𝑀𝜓M_{\psi} at time t(y,j+1)𝑡𝑦𝑗1t(y,j+1). Similarly, quantifier-free induction proves that the Mψsubscript𝑀𝜓M_{\psi}-configurations at the times t(y,j)𝑡𝑦𝑗t(y,j) in Y𝑌Y are successors of each others. This yields a quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula D(Y,x¯,y,u)𝐷𝑌¯𝑥𝑦𝑢D(Y,\bar{x},y,u) as desired.

From the configuration at time ini(x¯)+(t+1)t(x¯)ini¯𝑥𝑡1subscript𝑡¯𝑥\textit{ini}(\bar{x})+(t+1)\cdot t_{\ell}(\bar{x}) one can compute the final fin(x¯)fin¯𝑥\textit{fin}(\bar{x}) steps of the clean-up computation before Mφsubscript𝑀𝜑M_{\varphi} halts, and the last fin(x¯)fin¯𝑥\textit{fin}(\bar{x}) steps of Y𝑌Y must coincide with that. Hence, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that the configuration of Y𝑌Y at time ini(x¯)+(t+1)t+fin(x¯)ini¯𝑥𝑡1subscript𝑡fin¯𝑥\textit{ini}(\bar{x})+(t+1)\cdot t_{\ell}+\textit{fin}(\bar{x}) is halting. Recalling that ini(x¯)|ti(x¯)|ini¯𝑥subscript𝑡i¯𝑥\textit{ini}(\bar{x})\leqslant|t_{\textit{i}}(\bar{x})| and fin(x¯)|tf(x¯)|fin¯𝑥subscript𝑡f¯𝑥\textit{fin}(\bar{x})\leqslant|t_{\textit{f}}(\bar{x})|, this implies that the term

rφ(x¯)subscript𝑟𝜑¯𝑥\displaystyle r_{\varphi}(\bar{x}) :=assign\displaystyle:= |ti(x¯)|+(t(x¯)+1)t(x¯)+|tf(x¯)|subscript𝑡i¯𝑥𝑡¯𝑥1subscript𝑡¯𝑥subscript𝑡f¯𝑥\displaystyle|t_{\textit{i}}(\bar{x})|+(t(\bar{x})+1)\cdot t_{\ell}(\bar{x})+|t_{\textit{f}}(\bar{x})|

witnesses Mφsubscript𝑀𝜑M_{\varphi} as an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine. Choose a term sφ(x¯)subscript𝑠𝜑¯𝑥s_{\varphi}(\bar{x}) such that 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}-provably sφ(x¯)rφ(x¯)subscript𝑠𝜑¯𝑥subscript𝑟𝜑¯𝑥s_{\varphi}(\bar{x})\geqslant r_{\varphi}(\bar{x}) and

|sφ(x¯)||ti(x¯)|+(|t(x¯)|+1)+(|r(x¯)|+1)+|sψ(x¯,t(x¯))|+|tf(x¯)|.subscript𝑠𝜑¯𝑥subscript𝑡i¯𝑥𝑡¯𝑥1𝑟¯𝑥1subscript𝑠𝜓¯𝑥𝑡¯𝑥subscript𝑡f¯𝑥|s_{\varphi}(\bar{x})|\geqslant|t_{\textit{i}}(\bar{x})|+(|t(\bar{x})|+1)+(|r(\bar{x})|+1)+|s_{\psi}(\bar{x},t(\bar{x}))|+|t_{\textit{f}}(\bar{x})|.

Then sφ(x¯)subscript𝑠𝜑¯𝑥s_{\varphi}(\bar{x}) witnesses Mφsubscript𝑀𝜑M_{\varphi} as an explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine. This shows (e).

For (d), recall t(x¯)=(r(x¯)+1)(2|r(x¯)|+3)subscript𝑡¯𝑥𝑟¯𝑥12𝑟¯𝑥3t_{\ell}(\bar{x})=(r(\bar{x})+1)\cdot(2|r(\bar{x})|+3) and hence rφ(x¯)p(r(x¯),t(x¯),|x¯|)subscript𝑟𝜑¯𝑥𝑝𝑟¯𝑥𝑡¯𝑥¯𝑥r_{\varphi}(\bar{x})\leqslant p(r(\bar{x}),t(\bar{x}),|\bar{x}|) for a suitable polynomial p𝑝p, provably in 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}. Recalling that r(x¯)=rψ(x¯,t(x¯))𝑟¯𝑥subscript𝑟𝜓¯𝑥𝑡¯𝑥r(\bar{x})=r_{\psi}(\bar{x},t(\bar{x})), and that by (d) for ψ𝜓\psi we have rψ(x¯,y)pψ(𝑏𝑡ψ(x¯,y),|x¯|,|y|)subscript𝑟𝜓¯𝑥𝑦subscript𝑝𝜓subscript𝑏𝑡𝜓¯𝑥𝑦¯𝑥𝑦r_{\psi}(\bar{x},y)\leqslant p_{\psi}(\mathit{bt}_{\psi}(\bar{x},y),|\bar{x}|,|y|) provably in 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}, from 𝑏𝑡φ(x¯)=𝑏𝑡ψ(x¯,t(x¯))+t(x¯)subscript𝑏𝑡𝜑¯𝑥subscript𝑏𝑡𝜓¯𝑥𝑡¯𝑥𝑡¯𝑥\mathit{bt}_{\varphi}(\bar{x})=\mathit{bt}_{\psi}(\bar{x},t(\bar{x}))+t(\bar{x}) we get, also provably in 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}, that rφ(x¯)pφ(𝑏𝑡φ(x¯),|x¯|)subscript𝑟𝜑¯𝑥subscript𝑝𝜑subscript𝑏𝑡𝜑¯𝑥¯𝑥r_{\varphi}(\bar{x})\leqslant p_{\varphi}(\mathit{bt}_{\varphi}(\bar{x}),|\bar{x}|) for a suitable polynomial pφsubscript𝑝𝜑p_{\varphi}.

Correctness: proof of (a)–(c). For (a) argue in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) and suppose Y𝑌Y is an accepting computation of Mφsubscript𝑀𝜑M_{\varphi} on x¯¯𝑥\bar{x}. Being accepting means that the final state has flag b=1𝑏1b=1, while the starting state has flag b=0𝑏0b=0. By binary search we find a time when b𝑏b flips from 00 to 111. This time determines y0tsubscript𝑦0𝑡y_{0}\leqslant t such that the y0subscript𝑦0y_{0} loop accepts. Then Z:=D(Y,x¯,y0,)assign𝑍𝐷𝑌¯𝑥subscript𝑦0Z:=D(Y,\bar{x},y_{0},\cdot) is an accepting computation of Mψsubscript𝑀𝜓M_{\psi} on (x¯,y0)¯𝑥subscript𝑦0(\bar{x},y_{0}). Note that Z𝑍Z exists by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. Then (a) for ψ𝜓\psi implies ψ(x¯,y0)𝜓¯𝑥subscript𝑦0\psi(\bar{x},y_{0}) and thus φ(x¯)𝜑¯𝑥\varphi(\bar{x}).

For (b), argue in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) and suppose Y𝑌Y is a rejecting computation of Mφsubscript𝑀𝜑M_{\varphi} on x¯¯𝑥\bar{x}, so the flag is 00 in the final configuration. Let yt𝑦𝑡y\leqslant t. Then D(Y,x¯,y,)𝐷𝑌¯𝑥𝑦D(Y,\bar{x},y,\cdot) is a rejecting computation of Mψsubscript𝑀𝜓M_{\psi} on (x¯,y)¯𝑥𝑦(\bar{x},y): otherwise the y𝑦y loop sets the flag to 111 and then binary search finds a time where the flag flips from 111 to 00 in Y𝑌Y which contradicts the working of Mφsubscript𝑀𝜑M_{\varphi}. Then (b) for ψ𝜓\psi implies ¬ψ(x¯,y)𝜓¯𝑥𝑦\neg\psi(\bar{x},y). As y𝑦y was arbitrary, we get ¬φ(x¯)𝜑¯𝑥\neg\varphi(\bar{x}).

For (c), it is easy to construct from Cψsubscript𝐶𝜓\mathit{C}_{\psi} a formula Cψ,0subscript𝐶𝜓0\mathit{C}_{\psi,0} such that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that the set Cψ,0(x¯,y,)subscript𝐶𝜓0¯𝑥𝑦\mathit{C}_{\psi,0}(\bar{x},y,\cdot) is the computation of the y𝑦y-loop of Mφsubscript𝑀𝜑M_{\varphi} on x¯¯𝑥\bar{x} with flag 00 stored in the state space. There is an analogous formula Cψ,1subscript𝐶𝜓1\mathit{C}_{\psi,1} for flag 111. These formulas just stretch the computation described by Cψsubscript𝐶𝜓\mathit{C}_{\psi} and interleave it with the trivial updates of the clocks. The desired formula Cφ(x¯,u)subscript𝐶𝜑¯𝑥𝑢\mathit{C}_{\varphi}(\bar{x},u) ‘glues together’ these computations, plus the initial ini(x¯)ini¯𝑥\textit{ini}(\bar{x}) steps of initialization, and the final fin(x¯)fin¯𝑥\textit{fin}(\bar{x}) steps of clean-up. We sketch the definition of Cφ(x¯,u)subscript𝐶𝜑¯𝑥𝑢\mathit{C}_{\varphi}(\bar{x},u): from u𝑢u we can compute y𝑦y such that the truth value of Cφ(x¯,u)subscript𝐶𝜑¯𝑥𝑢\mathit{C}_{\varphi}(\bar{x},u) is one of the bits in the code of the computation of the y𝑦y-loop of Mφsubscript𝑀𝜑M_{\varphi} on x¯¯𝑥\bar{x}, or one of the bits in the code of the initial or final computation. Then Cφ(x¯,u)subscript𝐶𝜑¯𝑥𝑢\mathit{C}_{\varphi}(\bar{x},u) states

(z<yψ(x¯,z)Cψ,1(x¯,y,u))(¬z<yψ(x¯,z)Cψ,0(x¯,y,u)).𝑧𝑦𝜓¯𝑥𝑧subscript𝐶𝜓1¯𝑥𝑦𝑢𝑧𝑦𝜓¯𝑥𝑧subscript𝐶𝜓0¯𝑥𝑦𝑢missing-subexpressionmissing-subexpression\begin{array}[]{lcl}(\exists z{<}y\ \psi(\bar{x},z)\wedge\mathit{C}_{\psi,1}(\bar{x},y,u))\vee(\neg\exists z{<}y\ \psi(\bar{x},z)\wedge\mathit{C}_{\psi,0}(\bar{x},y,u)).\end{array} (12)

Proof of (f)–(g). Assume φ𝜑\varphi is a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula. We modify the given construction as follows. Up to 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha)-provable equivalence we have

φ(X¯,x¯)=yt(x¯)gX¯(x¯,y)=1𝜑¯𝑋¯𝑥for-all𝑦𝑡¯𝑥superscript𝑔¯𝑋¯𝑥𝑦1\varphi(\bar{X},\bar{x})=\forall y{\leqslant}t(\bar{x})\ g^{\bar{X}}(\bar{x},y){=}1

where t(x¯)𝑡¯𝑥t(\bar{x}) is a term and gX¯(x¯,y)superscript𝑔¯𝑋¯𝑥𝑦g^{\bar{X}}(\bar{x},y) is a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function. As before, we drop any reference to the set-parameters X¯¯𝑋\bar{X}, and to the oracles X¯¯𝑋\bar{X}, since they will stay fixed throughout the proof. We define Mφsubscript𝑀𝜑M_{\varphi} similarly as before with the role of Mψsubscript𝑀𝜓M_{\psi} played by a 𝖯𝖯\mathsf{P}-machine checking g(x¯,y)=1𝑔¯𝑥𝑦1g(\bar{x},y){=}1 according to Lemma 19. The only difference is in the flag bit: it is initially set to 111, and it is set to 00 when and if a y𝑦y-loop rejects (meaning ¬g(x¯,y)=1𝑔¯𝑥𝑦1\neg g(\bar{x},y){=}1).

In this case we can choose r𝑟r small, i.e., equal to |r|superscript𝑟|r^{\prime}| for some term r=r(x¯)superscript𝑟superscript𝑟¯𝑥r^{\prime}=r^{\prime}(\bar{x}), so there is a 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-function h(x¯,y)¯𝑥𝑦h(\bar{x},y) that computes (a number that codes) the computation of the y𝑦y-loop of Mφsubscript𝑀𝜑M_{\varphi}. Then Cφ(x¯,w,u)subscript𝐶𝜑¯𝑥𝑤𝑢\mathit{C}_{\varphi}(\bar{x},w,u) ‘glues together’ these computations plus suitable initial and final computations. The only problem is to determine the flag b𝑏b stored in the states of Mφsubscript𝑀𝜑M_{\varphi}. For this we need to know the minimal wt𝑤𝑡w\leqslant t such that ¬g(x¯,w)=1𝑔¯𝑥𝑤1\neg g(\bar{x},w){=}1 holds, or take w=t+1𝑤𝑡1w=t+1 if φ(x¯)𝜑¯𝑥\varphi(\bar{x}) holds. Such w𝑤w exists provably in 𝖳21(α)subscriptsuperscript𝖳12𝛼\mathsf{T}^{1}_{2}(\alpha). This shows (f) for tφ(x¯):=t(x¯)+1assignsubscript𝑡𝜑¯𝑥𝑡¯𝑥1t_{\varphi}(\bar{x}):=t(\bar{x})+1. For (g), assuming φ(x¯)𝜑¯𝑥\varphi(\bar{x}) we can take w=t+1𝑤𝑡1w=t+1 directly since in this case the flag bit is always 1 provably in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha). ∎

Remark 21.

The proof shows that the quantifier complexity of Cφsubscript𝐶𝜑\mathit{C}_{\varphi} is close to that of φ𝜑\varphi. If φΣ0b(α)𝜑subscriptsuperscriptΣ𝑏0𝛼\varphi\in\Sigma^{b}_{0}(\alpha), then Cφsubscript𝐶𝜑\mathit{C}_{\varphi} is a quantifier free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula. If φΣib(α)𝜑subscriptsuperscriptΣ𝑏𝑖𝛼\varphi\in\Sigma^{b}_{i}(\alpha) for i>0𝑖0i>0, then Cφsubscript𝐶𝜑\mathit{C}_{\varphi} is a Boolean combination of Σib(α)subscriptsuperscriptΣ𝑏𝑖𝛼\Sigma^{b}_{i}(\alpha)-formulas. Note that if the outer quantifier in (10) is sharply bounded, i.e., t(x¯)=|t(x¯)|𝑡¯𝑥superscript𝑡¯𝑥t(\bar{x})=|t^{\prime}(\bar{x})| for some term t(x¯)superscript𝑡¯𝑥t^{\prime}(\bar{x}), then the y𝑦y-bounded quantifiers in (12) are sharply bounded too.

3.3 Optimality remarks

This subsection offers some remarks stating that Lemma 20.6 cannot be improved in certain respects. This material is not needed in the following.

Remark 22.

For our definition of MφX¯subscriptsuperscript𝑀¯𝑋𝜑M^{\bar{X}}_{\varphi}, one cannot replace 𝖳21(α)subscriptsuperscript𝖳12𝛼\mathsf{T}^{1}_{2}(\alpha) by 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) in Lemma 20.6 unless 𝖲21=𝖳21subscriptsuperscript𝖲12subscriptsuperscript𝖳12\mathsf{S}^{1}_{2}=\mathsf{T}^{1}_{2}.

Proof.

Let φ(x)=yxψ(y,x)𝜑𝑥𝑦𝑥𝜓𝑦𝑥\varphi(x)=\exists y{\leqslant}x\ \psi(y,x) for ψ𝜓\psi a quantifier-free 𝖯𝖵𝖯𝖵\mathsf{PV}-formula, and assume (6) holds for 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) instead of 𝖳21(α)subscriptsuperscript𝖳12𝛼\mathsf{T}^{1}_{2}(\alpha). We show 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that, if there is yx𝑦𝑥y\leqslant x such that ψ(y,x)𝜓𝑦𝑥\psi(y,x), then there is a minimal such y𝑦y. Argue in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) and suppose φ(x)𝜑𝑥\varphi(x). By Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension and (6) there is a halting computation Y𝑌Y of Mφsubscript𝑀𝜑M_{\varphi} on x𝑥x. By (b) it cannot be rejecting, so is accepting. Our proof of (a) gives ψ(y0,x)𝜓subscript𝑦0𝑥\psi(y_{0},x) for y0xsubscript𝑦0𝑥y_{0}\leqslant x such that the flag b𝑏b flips from 0 to 1 in loop y0subscript𝑦0y_{0}. We claim y0subscript𝑦0y_{0} is minimal. This is clear if y0=0subscript𝑦00y_{0}=0. Otherwise we had b=0𝑏0b=0 after the loop on y01subscript𝑦01y_{0}-1 (in Y𝑌Y). For contradiction, assume there is y1<y0subscript𝑦1subscript𝑦0y_{1}<y_{0} with ψ(y1,x)𝜓subscript𝑦1𝑥\psi(y_{1},x). Then the loop on y1subscript𝑦1y_{1} would set b=1𝑏1b=1. By quantifier-free induction we find a time between y1subscript𝑦1y_{1} and y01subscript𝑦01y_{0}-1 where b𝑏b flips from 1 to 0. This contradicts the working of Mφsubscript𝑀𝜑M_{\varphi}. ∎

Fix any machines Mφsubscript𝑀𝜑M_{\varphi} satisfying the lemma. Call a formula true if its universal closure is true in the standard model.

Remark 23.

In Lemma 20.6 the auxiliary w𝑤\exists w cannot be omitted. There is a Σ1b(α)subscriptsuperscriptΣ𝑏1𝛼\Sigma^{b}_{1}(\alpha)-formula φ(X,x)𝜑𝑋𝑥\varphi(X,x) such that for all quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas C(X,x,u)𝐶𝑋𝑥𝑢C(X,x,u) the following is not true:

C(X,x,) is a halting computation of MφX on x.C(X,x,) is a halting computation of MφX on x\textit{``$C(X,x,\cdot)$ is a halting computation of~{}$M_{\varphi}^{X}$ on $x$''}.
Proof.

Otherwise every Σ1b(α)subscriptsuperscriptΣ𝑏1𝛼\Sigma^{b}_{1}(\alpha)-formula φ(X,x)𝜑𝑋𝑥\varphi(X,x) is equivalent to a quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula D(X,x)𝐷𝑋𝑥D(X,x). Let A𝐴A\subseteq\mathbb{N} be such that 𝖭𝖯A𝖯Anot-subset-of-or-equalssuperscript𝖭𝖯𝐴superscript𝖯𝐴\mathsf{NP}^{A}\not\subseteq\mathsf{P}^{A} and choose Q𝑄Q in 𝖭𝖯A𝖯Asuperscript𝖭𝖯𝐴superscript𝖯𝐴\mathsf{NP}^{A}\setminus\penalty 10000\mathsf{P}^{A}. Choose a Σ1b(α)subscriptsuperscriptΣ𝑏1𝛼\Sigma^{b}_{1}(\alpha)-formula φ(X,x)𝜑𝑋𝑥\varphi(X,x) defining Q𝑄Q in (,A)𝐴(\mathbb{N},A), the model where X𝑋X is interpreted by A𝐴A. Note D(X,x)𝐷𝑋𝑥D(X,x) defines in (,A)𝐴(\mathbb{N},A) a problem in 𝖯Asuperscript𝖯𝐴\mathsf{P}^{A}. Then (φ(X,x)D(X,x))𝜑𝑋𝑥𝐷𝑋𝑥(\varphi(X,x)\leftrightarrow\penalty 10000D(X,x)) fails in (,A)𝐴(\mathbb{N},A) for some x𝑥x, and hence also in (,A)superscript𝐴(\mathbb{N},A^{\prime}) for some bounded AAsuperscript𝐴𝐴A^{\prime}\subseteq A (Remark 12). Thus, this equivalence is not true. ∎

Remark 24.

Lemma 20.6 does not extend to much more complex formulas. There is a Π2b(α)subscriptsuperscriptΠ𝑏2𝛼\Pi^{b}_{2}(\alpha)-formula φ(X,x)𝜑𝑋𝑥\varphi(X,x) such that for all terms t𝑡t and all quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas C𝐶C the following is not true:

wt(x)C(X,x,w,) is a halting computation of MφX on x.𝑤𝑡𝑥C(X,x,w,) is a halting computation of MφX on x\exists w{\leqslant}t(x)\textit{``$C(X,x,w,\cdot)$ is a halting computation of~{}$M_{\varphi}^{X}$ on $x$''}.
Proof.

Note this is a Σ2b(α)subscriptsuperscriptΣ𝑏2𝛼\Sigma^{b}_{2}(\alpha)-formula, so for every A𝐴A\subseteq\mathbb{N} defines in (,A)𝐴(\mathbb{N},A) a problem in (Σ2𝖯)AsuperscriptsubscriptsuperscriptΣ𝖯2𝐴(\Sigma^{\mathsf{P}}_{2})^{A}. Choose A𝐴A such that (Π2𝖯)A(Σ2𝖯)AsuperscriptsubscriptsuperscriptΠ𝖯2𝐴superscriptsubscriptsuperscriptΣ𝖯2𝐴(\Pi^{\mathsf{P}}_{2})^{A}\neq(\Sigma^{\mathsf{P}}_{2})^{A} and argue similarly as before. ∎

3.4 Non-deterministic model-checkers

We shall also need model-checkers for Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formulas. As a first step we prove a technical lemma showing how to convert an explicit oracle 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine MYsuperscript𝑀𝑌M^{Y} into an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine N𝑁N that first guesses the oracle Y𝑌Y on a guess tape, and then simulates MYsuperscript𝑀𝑌M^{Y}. As usual, we need to show that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) is able to prove that this construction does what is claimed.

Lemma 25.

For every explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine MY,X¯superscript𝑀𝑌¯𝑋M^{Y,\bar{X}} that, as explicit 𝖤𝖷𝖯𝖤𝖷𝖯\mathsf{EXP}-machine, is witnessed by term rM(x¯)subscript𝑟𝑀¯𝑥r_{M}(\bar{x}), there are an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine NX¯superscript𝑁¯𝑋N^{\bar{X}}, a term rN(x¯)subscript𝑟𝑁¯𝑥r_{N}(\bar{x}), a polynomial pN(m,n¯)subscript𝑝𝑁𝑚¯𝑛p_{N}(m,\bar{n}), and quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas F,G,H𝐹𝐺𝐻F,G,H such that

  1. (a)

    𝖲21(α)Z is an accepting computation of MY,X¯ on x¯F(Z,Y,X¯,x¯,) is an accepting computation of NX¯ on x¯.subscriptsuperscript𝖲12𝛼provesZ is an accepting computation of MY,X¯ on x¯absentmissing-subexpressionmissing-subexpressionF(Z,Y,X¯,x¯,) is an accepting computation of NX¯ on x¯\begin{array}[t]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\textit{``$Z$ is an accepting computation of~{}$M^{Y,\bar{X}}$ on $\bar{x}$''}\to\\ &&\textit{``$F(Z,Y,\bar{X},\bar{x},\cdot)$ is an accepting computation of~{}$N^{\bar{X}}$ on $\bar{x}$''}.\end{array}

  2. (b)

    𝖲21(α)Z is an accepting computation of NX¯ on x¯G(Z,X¯,x¯,) is an accepting computation of MH(Z,X¯,x¯,),X¯ on x¯subscriptsuperscript𝖲12𝛼provesZ is an accepting computation of NX¯ on x¯absentmissing-subexpressionmissing-subexpressionG(Z,X¯,x¯,) is an accepting computation of MH(Z,X¯,x¯,),X¯ on x¯\begin{array}[t]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\textit{``$Z$ is an accepting computation of~{}$N^{\bar{X}}$ on $\bar{x}$''}\to\\ &&\textit{``$G(Z,\bar{X},\bar{x},\cdot)$ is an accepting computation of~{}$M^{H(Z,\bar{X},\bar{x},\cdot),\bar{X}}$ on $\bar{x}$''}\end{array}

  3. (c)

    𝖲21(α)rN(x¯)pN(rM(x¯),|x¯|)provessubscriptsuperscript𝖲12𝛼subscript𝑟𝑁¯𝑥subscript𝑝𝑁subscript𝑟𝑀¯𝑥¯𝑥\mathsf{S}^{1}_{2}(\alpha)\vdash\ r_{N}(\bar{x})\leqslant p_{N}(r_{M}(\bar{x}),|\bar{x}|),

  4. (d)

    The term rN(x¯)subscript𝑟𝑁¯𝑥r_{N}(\bar{x}) witnesses NX¯superscript𝑁¯𝑋N^{\bar{X}} as explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine.

Proof.

Set r=rM(x¯)𝑟subscript𝑟𝑀¯𝑥r=r_{M}(\bar{x}). By assumption, the triple of terms rM(x¯),rM(x¯),rM(x¯)subscript𝑟𝑀¯𝑥subscript𝑟𝑀¯𝑥subscript𝑟𝑀¯𝑥r_{M}(\bar{x}),r_{M}(\bar{x}),r_{M}(\bar{x}) witnesses that MY,X¯superscript𝑀𝑌¯𝑋M^{Y,\bar{X}} is explicit. In particular, every query zY𝑧𝑌z\in Y?” made by MY,X¯superscript𝑀𝑌¯𝑋M^{Y,\bar{X}} on x¯¯𝑥\bar{x} satisfies |z||r|𝑧𝑟|z|\leqslant|r| and hence z<2|r|𝑧superscript2𝑟z<2^{|r|}. The machine NX¯superscript𝑁¯𝑋N^{\bar{X}} on x¯¯𝑥\bar{x} guesses a binary string Y𝑌Y of length 2|r|superscript2𝑟2^{|r|} on a guess tape and then simulates MY,X¯superscript𝑀𝑌¯𝑋M^{Y,\bar{X}} on x¯¯𝑥\bar{x} as follows: an oracle query zY𝑧𝑌z\in Y?” of MY,X¯superscript𝑀𝑌¯𝑋M^{Y,\bar{X}} is answered reading cell z+1𝑧1z{+}1 on the guess tape. As in the proof of Lemma 20, to prove (a)–(d) we need to design the details of N𝑁N in a way so that the j𝑗j-th step of the computation of M𝑀M is simulated by N𝑁N at a time easily computed from x¯,j¯𝑥𝑗\bar{x},j. To reduce notation, in the following we drop any reference to the oracles X¯¯𝑋\bar{X} as they will remain fixed throughout the proof.

Description of N𝑁N. The machine N𝑁N on x¯¯𝑥\bar{x} first computes r𝑟r and two binary clocks initialized to 0|r|+1superscript0𝑟10^{|r|+1} and 0|r|superscript0𝑟0^{|r|}, respectively. To write Y𝑌Y of length 2|r|superscript2𝑟2^{|r|} on the guess tape the machine checks whether the first clock equals 2|r|superscript2𝑟2^{|r|} and, if not, increases it by one and moves one cell to the right on the guess tape. This is done in exactly 2|r|+52𝑟52|r|+5 steps. Once the clock equals 2|r|superscript2𝑟2^{|r|}, the machine moves back to cell 111 on the guess tape and non-deterministically writes 00 or 111 in each step, except in the step that finally rebounds on cell 00 to cell 111. The terms are computed with explicit 𝖯𝖯\mathsf{P}-machines according to Lemma 19. The initial computation of terms, and initialization of clocks, takes time exactly 𝑖𝑛𝑖(x¯)𝑖𝑛𝑖¯𝑥\mathit{ini}(\bar{x}) for some 𝖯𝖵𝖯𝖵\mathsf{PV}-function 𝑖𝑛𝑖(x¯)𝑖𝑛𝑖¯𝑥\mathit{ini}(\bar{x}). Therefore, the guess of Y𝑌Y takes exactly 𝑔𝑢𝑒𝑠𝑠(x¯):=𝑖𝑛𝑖(x¯)+2|r|(2|r|+5)+2|r|+1assign𝑔𝑢𝑒𝑠𝑠¯𝑥𝑖𝑛𝑖¯𝑥superscript2𝑟2𝑟5superscript2𝑟1\mathit{guess}(\bar{x}):=\mathit{ini}(\bar{x})+2^{|r|}\cdot(2|r|+5)+2^{|r|}+1 steps. Moreover, 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} proves 𝑔𝑢𝑒𝑠𝑠(x¯)tg(x¯)𝑔𝑢𝑒𝑠𝑠¯𝑥subscript𝑡g¯𝑥\mathit{guess}(\bar{x})\leqslant t_{\textit{g}}(\bar{x}), where

tg(x¯):=|ti(x¯)|+2|rM(x¯)|(2|rM(x¯)|+5)+2|rM(x¯)|+1,assignsubscript𝑡g¯𝑥subscript𝑡i¯𝑥superscript2subscript𝑟𝑀¯𝑥2subscript𝑟𝑀¯𝑥5superscript2subscript𝑟𝑀¯𝑥1t_{\textit{g}}(\bar{x}):=|t_{\textit{i}}(\bar{x})|+2^{|r_{M}(\bar{x})|}\cdot(2|r_{M}(\bar{x})|+5)+2^{|r_{M}(\bar{x})|}+1,

for a suitable term ti(x¯)subscript𝑡i¯𝑥t_{\textit{i}}(\bar{x}) such that 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} proves 𝑖𝑛𝑖(x¯)|ti(x¯)|𝑖𝑛𝑖¯𝑥subscript𝑡i¯𝑥\mathit{ini}(\bar{x})\leqslant|t_{\textit{i}}(\bar{x})|.

The machine simulates r𝑟r steps of MYsuperscript𝑀𝑌M^{Y} using the second clock. Comparing this clock with r𝑟r and updating it takes 2|r|+22𝑟22|r|+2 steps. If the value of the clock is less than r𝑟r, then a step of MYsuperscript𝑀𝑌M^{Y} is simulated by reading the (z+1)𝑧1(z{+}1)-cell of the guess tape where z𝑧z is the content of MYsuperscript𝑀𝑌M^{Y}’s oracle tape for Y𝑌Y. This is done as follows. The machine moves forward over the guess tape, and rewinds back to cell 111. With each step forward it increases the first clock by one and checks whether it equals z𝑧z or 2|r|superscript2𝑟2^{|r|}. If and when the clock equals z𝑧z, it stores the oracle bit read on the guess tape in its state space. Otherwise, i.e., z2|r|𝑧superscript2𝑟z{\geqslant}2^{|r|}, the machine stores oracle bit 00. When the clock equals 2|r|superscript2𝑟2^{|r|}, the scan of the guess tape ends, and the rewinding to cell 111 starts (in the next step). Doing this takes time exactly 2|r|(2|r|+4)+2|r|+1superscript2𝑟2𝑟4superscript2𝑟12^{|r|}\cdot(2|r|+4)+2^{|r|}+1 and the oracle bit is stored at time min{z,2|r|}(2|r|+4)𝑧superscript2𝑟2𝑟4\min\{z,2^{|r|}\}\cdot(2|r|+4). Thus, when the value of the second clock is less than r𝑟r, one step of MYsuperscript𝑀𝑌M^{Y} is simulated in exactly

ts(x¯):=(2|rM(x¯)|+2)+2|rM(x¯)|(2|rM(x¯)|+4)+2|rM(x¯)|+2assignsubscript𝑡s¯𝑥2subscript𝑟𝑀¯𝑥2superscript2subscript𝑟𝑀¯𝑥2subscript𝑟𝑀¯𝑥4superscript2subscript𝑟𝑀¯𝑥2t_{\textit{s}}(\bar{x}):=(2|r_{M}(\bar{x})|+2)+2^{|r_{M}(\bar{x})|}\cdot(2|r_{M}(\bar{x})|+4)+2^{|r_{M}(\bar{x})|}+2

steps. Otherwise, the simulation halts in an accepting or rejecting state according to MYsuperscript𝑀𝑌M^{Y}’s state. In total, the machine runs for exactly 𝑔𝑢𝑒𝑠𝑠(x¯)+rts(x¯)+(2|r|+2)𝑔𝑢𝑒𝑠𝑠¯𝑥𝑟subscript𝑡s¯𝑥2𝑟2\mathit{guess}(\bar{x})+r\cdot t_{\textit{s}}(\bar{x})+(2|r|+2) steps. The steps of MYsuperscript𝑀𝑌M^{Y} on x¯¯𝑥\bar{x} are simulated at times

t(x¯,j):=𝑔𝑢𝑒𝑠𝑠(x¯)+(j+1)ts(x¯)assign𝑡¯𝑥𝑗𝑔𝑢𝑒𝑠𝑠¯𝑥𝑗1subscript𝑡s¯𝑥t(\bar{x},j):=\mathit{guess}(\bar{x})+(j+1)\cdot t_{\textit{s}}(\bar{x})

for j<rM(x)𝑗subscript𝑟𝑀𝑥j<r_{M}(x). The runtime is bounded by the term

rN(x¯):=tg(x¯)+rM(x¯)ts(x¯)+(2|rM(x¯)|+2)assignsubscript𝑟𝑁¯𝑥subscript𝑡g¯𝑥subscript𝑟𝑀¯𝑥subscript𝑡s¯𝑥2subscript𝑟𝑀¯𝑥2r_{N}(\bar{x}):=t_{\textit{g}}(\bar{x})+r_{M}(\bar{x})\cdot t_{\textit{s}}(\bar{x})+(2|r_{M}(\bar{x})|+2)

Explicitness. We argue that this bound on the runtime of N𝑁N can be verified in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha), given a halting computation Z𝑍Z of N𝑁N on x¯¯𝑥\bar{x}. Note that, unlike the simulation in Lemma 20, a single step is simulated in possibly exponential time ts(x¯)subscript𝑡s¯𝑥t_{\textit{s}}(\bar{x}). However, this possibly exponential time computation is simply described: Since MYsuperscript𝑀𝑌M^{Y} is an explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine, its configurations can be coded by numbers. Now, given a number coding the configuration of MYsuperscript𝑀𝑌M^{Y} within Z𝑍Z at time t(j):=t(x¯,j)assign𝑡𝑗𝑡¯𝑥𝑗t(j):=t(\bar{x},j), say with Y𝑌Y-oracle query z𝑧z, and given a time i<ts(x¯)𝑖subscript𝑡s¯𝑥i<t_{\textit{s}}(\bar{x}), we can compute the configuration of the clocks and the state of the (to-be-)stored oracle-bit at time t(j)+i𝑡𝑗𝑖t(j)+i. Now, quantifier-free induction suffices to prove that the oracle bit is stored at the desired time and equals the content of the (z+1)𝑧1(z{+}1)-cell of the guess tape (or 0 if z2|r|𝑧superscript2𝑟z\geqslant 2^{|r|}). Quantifier-free induction proves that the configurations of MYsuperscript𝑀𝑌M^{Y} within Z𝑍Z at times t(j)𝑡𝑗t(j) for j<r𝑗𝑟j<r are successors of those preceding them. In particular, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves that the configuration at time rN(x¯)subscript𝑟𝑁¯𝑥r_{N}(\bar{x}) is halting. Space and query bounds can be similarly verified, so N𝑁N is explicit and witnessed by rN(x¯)subscript𝑟𝑁¯𝑥r_{N}(\bar{x}).

Proof of (a)–(d). For (a), the quantifier-free formula F𝐹F concatenates an initial polynomial-time computation of the terms and clocks, a guess of Y𝑌Y, and a simulation of Z𝑍Z. Each configuration of the guess of Y𝑌Y is computable in polynomial time. The simulation of Z𝑍Z stretches each step of MYsuperscript𝑀𝑌M^{Y} to a time ts(x¯)subscript𝑡s¯𝑥t_{\textit{s}}(\bar{x}) computation, each configuration of which is easily computed from Y𝑌Y and Z𝑍Z in polynomial time. Quantifier-free induction proves that a Y𝑌Y-query z𝑧z in Z𝑍Z is answered according to the bit in the (z+1)𝑧1(z{+}1)-cell on the guess tape.

For (b), the quantifier-free formula H𝐻H extracts the guess Y𝑌Y from Z𝑍Z and the quantifier-free formula G𝐺G extracts the simulated computation at the times t(x¯,j)𝑡¯𝑥𝑗t(\bar{x},j) for j<rM(x¯)𝑗subscript𝑟𝑀¯𝑥j<r_{M}(\bar{x}).

For (c) and (d), we already argued that the term rN(x¯)subscript𝑟𝑁¯𝑥r_{N}(\bar{x}) witnesses N𝑁N as an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine. The claim that rN(x¯)pN(rM(x¯),|x¯|)subscript𝑟𝑁¯𝑥subscript𝑝𝑁subscript𝑟𝑀¯𝑥¯𝑥r_{N}(\bar{x})\leqslant p_{N}(r_{M}(\bar{x}),|\bar{x}|) holds for a suitable polynomial pNsubscript𝑝𝑁p_{N} follows by inspection, and 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves it. ∎

Now we can state the lemma that proves that every Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula has a formally verified model-checker. In its statement, the bounding term 𝑏𝑡ψ(x¯)subscript𝑏𝑡𝜓¯𝑥\mathit{bt}_{\psi}(\bar{x}) of a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula ψ=ψ(X¯,x¯)𝜓𝜓¯𝑋¯𝑥\psi=\psi(\bar{X},\bar{x}) as in Equation (5) is defined to be the bounding term 𝑏𝑡φ(x¯)subscript𝑏𝑡𝜑¯𝑥\mathit{bt}_{\varphi}(\bar{x}) of its maximal Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0} subformula φ=φ(Y,X¯,x¯)𝜑𝜑𝑌¯𝑋¯𝑥\varphi=\varphi(Y,\bar{X},\bar{x}).

Lemma 26.

For every Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula ψ=ψ(X¯,x¯)𝜓𝜓¯𝑋¯𝑥\psi=\psi(\bar{X},\bar{x}), there exists an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine NψX¯subscriptsuperscript𝑁¯𝑋𝜓N^{\bar{X}}_{\psi}, a term rψ(x¯)subscript𝑟𝜓¯𝑥r_{\psi}(\bar{x}), and a polynomial pψ(m,n¯)subscript𝑝𝜓𝑚¯𝑛p_{\psi}(m,\bar{n}), such that

  1. (a)

    𝖵20ψ(X¯,x¯)2YY is an accepting computation of NψX¯ on x¯.provessubscriptsuperscript𝖵02𝜓¯𝑋¯𝑥subscript2𝑌Y is an accepting computation of NψX¯ on x¯\mathsf{V}^{0}_{2}\vdash\ \psi(\bar{X},\bar{x})\to\exists_{2}Y\textit{``$Y$ is an accepting computation of $N^{\bar{X}}_{\psi}$ on $\bar{x}$''}.

  2. (b)

    𝖲21(α)¬ψ(X¯,x¯)¬2YY is an accepting computation of NψX¯ on x¯.provessubscriptsuperscript𝖲12𝛼𝜓¯𝑋¯𝑥subscript2𝑌Y is an accepting computation of NψX¯ on x¯\mathsf{S}^{1}_{2}(\alpha)\vdash\ \neg\psi(\bar{X},\bar{x})\to\neg\exists_{2}Y\textit{``$Y$ is an accepting computation of $N^{\bar{X}}_{\psi}$ on $\bar{x}$''}.

  3. (c)

    𝖲21(α)rψ(x¯)pψ(𝑏𝑡ψ(x¯),|x¯|)provessubscriptsuperscript𝖲12𝛼subscript𝑟𝜓¯𝑥subscript𝑝𝜓subscript𝑏𝑡𝜓¯𝑥¯𝑥\mathsf{S}^{1}_{2}(\alpha)\vdash\ r_{\psi}(\bar{x})\leqslant p_{\psi}(\mathit{bt}_{\psi}(\bar{x}),|\bar{x}|),

  4. (d)

    the term rψ(x¯)subscript𝑟𝜓¯𝑥r_{\psi}(\bar{x}) witnesses NψX¯subscriptsuperscript𝑁¯𝑋𝜓N^{\bar{X}}_{\psi} as explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine.

Furthermore, if the maximal Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-subformula of ψ𝜓\psi is a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula, then

  1. 5.

    𝖲21(α)ψ(X¯,x¯)2YY is an accepting computation of NψX¯ on x¯.provessubscriptsuperscript𝖲12𝛼𝜓¯𝑋¯𝑥subscript2𝑌Y is an accepting computation of NψX¯ on x¯\mathsf{S}^{1}_{2}(\alpha)\vdash\psi(\bar{X},\bar{x})\leftrightarrow\exists_{2}Y\textit{``$Y$ is an accepting computation of $N^{\bar{X}}_{\psi}$ on $\bar{x}$''}.

Proof.

Let ψ(X¯,x¯)=2Yφ(Y,X¯,x¯)𝜓¯𝑋¯𝑥subscript2𝑌𝜑𝑌¯𝑋¯𝑥\psi(\bar{X},\bar{x})=\exists_{2}Y\ \varphi(Y,\bar{X},\bar{x}) where φ=φ(Y,X¯,x¯)𝜑𝜑𝑌¯𝑋¯𝑥\varphi=\varphi(Y,\bar{X},\bar{x}) is a Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-formula. Recall that the bounding term of ψ𝜓\psi is 𝑏𝑡ψ(x¯)=𝑏𝑡φ(x¯)subscript𝑏𝑡𝜓¯𝑥subscript𝑏𝑡𝜑¯𝑥\mathit{bt}_{\psi}(\bar{x})=\mathit{bt}_{\varphi}(\bar{x}). In what follows, to lighten the notation, we drop any reference to the set parameters X¯¯𝑋\bar{X} in formulas, and to the oracles X¯¯𝑋\bar{X} in machines, since they remain fixed throughout the proof.

Let MφYsubscriptsuperscript𝑀𝑌𝜑M^{Y}_{\varphi} be the explicit 𝖯𝖲𝖯𝖠𝖢𝖤𝖯𝖲𝖯𝖠𝖢𝖤\mathsf{PSPACE}-machine given by Lemma 20 applied to φ𝜑\varphi. Let rφsubscript𝑟𝜑r_{\varphi} and pφsubscript𝑝𝜑p_{\varphi} be the term and the polynomial also given by that lemma. By Lemma 20.e, the term rφsubscript𝑟𝜑r_{\varphi} witnesses MφYsubscriptsuperscript𝑀𝑌𝜑M^{Y}_{\varphi} as explicit 𝖤𝖷𝖯𝖤𝖷𝖯\mathsf{EXP}-machine. Therefore, Lemma 25 applies to MφYsubscriptsuperscript𝑀𝑌𝜑M^{Y}_{\varphi} and rφsubscript𝑟𝜑r_{\varphi} and we get an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine Nψsubscript𝑁𝜓N_{\psi}, a term rψsubscript𝑟𝜓r_{\psi}, and a polynomial pψsubscript𝑝𝜓p_{\psi}. We prove (a)–(e) using the quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas F,G,H𝐹𝐺𝐻F,G,H also given by Lemma 25, and the Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-formula Cφsubscript𝐶𝜑\mathit{C}_{\varphi} given by Lemma 20.

For (a), argue in 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} and assume ψ(x¯)𝜓¯𝑥\psi(\bar{x}) holds. Choose Y𝑌Y such that φ(Y,x¯)𝜑𝑌¯𝑥\varphi(Y,\bar{x}) holds. By Lemma 20.c, the set Z:=Cφ(Y,x¯,)assign𝑍subscript𝐶𝜑𝑌¯𝑥Z:=\mathit{C}_{\varphi}(Y,\bar{x},\cdot) is a halting computation of MφYsubscriptsuperscript𝑀𝑌𝜑M^{Y}_{\varphi} on x¯¯𝑥\bar{x}. Note that Z𝑍Z exists by Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-comprehension, which defines the theory 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2}. By Lemma 20.b, the computation Z𝑍Z cannot be rejecting, so it is accepting. By Lemma 25.a, the set F:=F(Z,Y,x¯,)assign𝐹𝐹𝑍𝑌¯𝑥F:=F(Z,Y,\bar{x},\cdot) is an accepting computation of Nψsubscript𝑁𝜓N_{\psi} on x¯¯𝑥\bar{x}. Note that F𝐹F exists by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension.

For (b), argue in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) and assume Y𝑌Y is an accepting computation of Nψsubscript𝑁𝜓N_{\psi} on x¯¯𝑥\bar{x}. By Lemma 25.b we have that G(Y,x¯,)𝐺𝑌¯𝑥G(Y,\bar{x},\cdot) is an accepting computation of MφZsuperscriptsubscript𝑀𝜑𝑍M_{\varphi}^{Z} on x¯¯𝑥\bar{x}, for Z:=H(Y,x¯,)assign𝑍𝐻𝑌¯𝑥Z:=H(Y,\bar{x},\cdot). Note that Z𝑍Z exists by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. By Lemma 20.a we get that φ(Z,x¯,)𝜑𝑍¯𝑥\varphi(Z,\bar{x},\cdot) holds. Thus ψ(x¯)𝜓¯𝑥\psi(\bar{x}) follows.

For (c) and (d), refer to Lemma 25.c, the choices of rψsubscript𝑟𝜓r_{\psi} and pψsubscript𝑝𝜓p_{\psi}, and the fact that 𝑏𝑡ψ(x¯)=𝑏𝑡φ(x¯)subscript𝑏𝑡𝜓¯𝑥subscript𝑏𝑡𝜑¯𝑥\mathit{bt}_{\psi}(\bar{x})=\mathit{bt}_{\varphi}(\bar{x}). This also gives the claim that rψ(x¯)subscript𝑟𝜓¯𝑥r_{\psi}(\bar{x}) witnesses Nψsubscript𝑁𝜓N_{\psi} as explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine.

For (e), argue in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha). If ¬ψ(x¯)𝜓¯𝑥\neg\psi(\bar{x}) holds, use (b). If ψ(x¯)𝜓¯𝑥\psi(\bar{x}) holds, choose Y𝑌Y such that φ(Y,x¯)𝜑𝑌¯𝑥\varphi(Y,\bar{x}) holds. Then Lemma 20.7 and Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension imply that there exists an accepting computation Z𝑍Z of MφYsuperscriptsubscript𝑀𝜑𝑌M_{\varphi}^{Y} on x¯¯𝑥\bar{x}. Now argue as in (a). ∎

4 Consistency for 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}

In this section we define a suitable universal explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M0subscript𝑀0M_{0}. We verify the claim from the introduction that both theories {¬αM0cc1}conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀0𝑐1\{\neg\alpha^{c}_{M_{0}}\mid c\geqslant 1\} and {¬βM0cc1}conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐1\{\neg\beta^{c}_{M_{0}}\mid\penalty 10000c\geqslant 1\} formalize 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}. We finally prove that the consistency of both formalizations with the theory 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} follows from Theorem 2 and our work on formally-verified model-checkers.

4.1 A universal machine

A canonical 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-complete problem called Q0subscript𝑄0Q_{0} is:

Given N,x,t𝑁𝑥𝑡\langle N,x,t\rangle as input, where N𝑁N is a (number coding a) non-deterministic machine, and x𝑥x and t𝑡t are numbers written in binary, does N𝑁N accept x𝑥x in at most t𝑡t steps?

A non-deterministic exponential-time machine M0subscript𝑀0M_{0} for Q0subscript𝑄0Q_{0}, on input N,x,t𝑁𝑥𝑡\langle N,x,t\rangle, guesses and verifies a time-t𝑡t computation of N𝑁N on x𝑥x. We ask for an implementation of this so that a weak theory can verify its correctness. This is a quite direct consequence of Lemmas 20 and 26.

Lemma 27.

There exists an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M0subscript𝑀0M_{0} with one input-tape and without oracles, such that for every explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M with one input-tape and without oracles, say witnessed by the term tM(x)subscript𝑡𝑀𝑥t_{M}(x), there are quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas F(Z,x,u)𝐹𝑍𝑥𝑢F(Z,x,u) and G(Z,x,u)𝐺𝑍𝑥𝑢G(Z,x,u) such that

  1. (a)

    𝖲21(α)Z is an accepting computation of M on xF(Z,x,) is an accepting computation of M0 on M,x,tM(x),subscriptsuperscript𝖲12𝛼provesZ is an accepting computation of M on xabsentmissing-subexpressionmissing-subexpressionF(Z,x,) is an accepting computation of M0 on M,x,tM(x)\begin{array}[t]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\textit{``$Z$ is an accepting computation of $M$ on $x$''}\to\\ &&\;\;\textit{``$F(Z,x,\cdot)$ is an accepting computation of $M_{0}$ on $\langle M,x,t_{M}(x)\rangle$''},\end{array}

  2. (b)

    𝖲21(α)Z is an accepting computation of M0 on M,x,tM(x)G(Z,x,) is an accepting computation of M on x.subscriptsuperscript𝖲12𝛼provesZ is an accepting computation of M0 on M,x,tM(x)absentmissing-subexpressionmissing-subexpressionG(Z,x,) is an accepting computation of M on x\begin{array}[t]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\textit{``$Z$ is an accepting computation of $M_{0}$ on $\langle M,x,t_{M}(x)\rangle$''}\to\\ &&\;\;\textit{``$G(Z,x,\cdot)$ is an accepting computation of $M$ on $x$''}.\end{array}

In particular,

  1. 3.

    𝖲21(α)2ZZ is an accepting computation of M0 on M,x,tM(x)2ZZ is an accepting computation of M on x.subscriptsuperscript𝖲12𝛼provessubscript2𝑍Z is an accepting computation of M0 on M,x,tM(x)absentmissing-subexpressionmissing-subexpressionsubscript2𝑍Z is an accepting computation of M on x\begin{array}[t]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\exists_{2}Z\textit{``$Z$ is an accepting computation of $M_{0}$ on $\langle M,x,t_{M}(x)\rangle$''}\leftrightarrow\\ &&\;\;\exists_{2}Z\textit{``$Z$ is an accepting computation of $M$ on $x$''}.\end{array}

Proof.

Let π1,π2,π3subscript𝜋1subscript𝜋2subscript𝜋3\pi_{1},\pi_{2},\pi_{3} be 𝖯𝖵𝖯𝖵\mathsf{PV}-functions that extract x1,x2,x3subscript𝑥1subscript𝑥2subscript𝑥3x_{1},x_{2},x_{3} from z=x1,x2,x3𝑧subscript𝑥1subscript𝑥2subscript𝑥3z=\langle x_{1},x_{2},x_{3}\rangle. Define Π1bsubscriptsuperscriptΠ𝑏1\Pi^{b}_{1}-formulas as follows:

φ1(Z,z):=φ2(Z,π1(z),π2(z),π3(z)),assignsubscript𝜑1𝑍𝑧subscript𝜑2𝑍subscript𝜋1𝑧subscript𝜋2𝑧subscript𝜋3𝑧\displaystyle\varphi_{1}(Z,z)\ :=\ \varphi_{2}(Z,\pi_{1}(z),\pi_{2}(z),\pi_{3}(z)),
φ2(Z,N,x,t):=Z is an accepting time-t computation of N on x.assignsubscript𝜑2𝑍𝑁𝑥𝑡Z is an accepting time-t computation of N on x\displaystyle\varphi_{2}(Z,N,x,t)\ :=\ \textit{``$Z$ is an accepting time-$t$ computation of $N$ on $x$''}.

Let M1Zsuperscriptsubscript𝑀1𝑍M_{1}^{Z} be the machine given by Lemma 20 applied to φ1=φ1(Z,z)subscript𝜑1subscript𝜑1𝑍𝑧\varphi_{1}=\varphi_{1}(Z,z), and let r1(z)subscript𝑟1𝑧r_{1}(z) be the corresponding term. Since φ1subscript𝜑1\varphi_{1} is a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula, let t1(z)subscript𝑡1𝑧t_{1}(z) and C1(Z,z,w,u)subscript𝐶1𝑍𝑧𝑤𝑢C_{1}(Z,z,w,u) be the term and the quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula given by Lemma 20.7. We set M0subscript𝑀0M_{0} to the explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine given by Lemma 25 applied to M1Zsuperscriptsubscript𝑀1𝑍M_{1}^{Z} with term r1(z)subscript𝑟1𝑧r_{1}(z) witnessing it as explicit 𝖤𝖷𝖯𝖤𝖷𝖯\mathsf{EXP}-machine by Lemma 20.e. In the proof of (a)–(b) we use the quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas F1,G1,H1subscript𝐹1subscript𝐺1subscript𝐻1F_{1},G_{1},H_{1} given by Lemma 25 on M1Zsuperscriptsubscript𝑀1𝑍M_{1}^{Z}.

For (a) we set F(Z,x,u):=F1(C,Z,z,u)assign𝐹𝑍𝑥𝑢subscript𝐹1𝐶𝑍𝑧𝑢F(Z,x,u):=F_{1}(C,Z,z,u) where C𝐶C abbreviates C1(Z,z,t1(z),)subscript𝐶1𝑍𝑧subscript𝑡1𝑧C_{1}(Z,z,t_{1}(z),\cdot) and in both cases z𝑧z abbreviates M,x,tM(x)𝑀𝑥subscript𝑡𝑀𝑥\langle M,x,t_{M}(x)\rangle. Argue in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) and assume Z𝑍Z is an accepting computation of M𝑀M on x𝑥x. Since M𝑀M is explicit and tM(x)subscript𝑡𝑀𝑥t_{M}(x) is a term witnessing it, we have that Z𝑍Z is an accepting time-t𝑡t computation of M𝑀M on x𝑥x, for t:=tM(x)assign𝑡subscript𝑡𝑀𝑥t:=t_{M}(x). It follows that φ2(Z,M,x,tM(x))subscript𝜑2𝑍𝑀𝑥subscript𝑡𝑀𝑥\varphi_{2}(Z,M,x,t_{M}(x)) holds, and hence φ1(Z,z)subscript𝜑1𝑍𝑧\varphi_{1}(Z,z) holds. Since φ1subscript𝜑1\varphi_{1} is a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula, by Lemma 20.7 we have that the set C:=C1(Z,z,t1(z),)assign𝐶subscript𝐶1𝑍𝑧subscript𝑡1𝑧C:=C_{1}(Z,z,t_{1}(z),\cdot) is an accepting computation of M1Zsuperscriptsubscript𝑀1𝑍M_{1}^{Z} on z𝑧z. Such a C𝐶C exists by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension because C1subscript𝐶1C_{1} is a quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula. By Lemma 25.a we get that the set F:=F(Z,x,)=F1(C,Z,z,)assign𝐹𝐹𝑍𝑥subscript𝐹1𝐶𝑍𝑧F:=F(Z,x,\cdot)=F_{1}(C,Z,z,\cdot) is an accepting computation of M0subscript𝑀0M_{0} on z𝑧z; i.e., the right-hand side of the implication in (a) holds. Again, F𝐹F exists by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension.

For (b) we set G(Z,x,u):=G1(Z,z,u)assign𝐺𝑍𝑥𝑢subscript𝐺1𝑍𝑧𝑢G(Z,x,u):=G_{1}(Z,z,u) where, again, z𝑧z abbreviates M,x,tM(x)𝑀𝑥subscript𝑡𝑀𝑥\langle M,x,t_{M}(x)\rangle. Argue in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) and assume Z𝑍Z is an accepting computation of M0subscript𝑀0M_{0} on z𝑧z. Then, by Lemma 25.b we have that the set G:=G(Z,x,)=G1(Z,z,)assign𝐺𝐺𝑍𝑥subscript𝐺1𝑍𝑧G:=G(Z,x,\cdot)=G_{1}(Z,z,\cdot) is an accepting computation of M1Hsuperscriptsubscript𝑀1𝐻M_{1}^{H} on z𝑧z for H:=H1(Z,z,)assign𝐻subscript𝐻1𝑍𝑧H:=H_{1}(Z,z,\cdot). The two sets G𝐺G and H𝐻H exist by Δ1bsubscriptsuperscriptΔ𝑏1\Delta^{b}_{1}-comprehension. Now, Lemma 20.a implies that φ1(H,z)subscript𝜑1𝐻𝑧\varphi_{1}(H,z) holds; i.e., H𝐻H is an accepting time-t𝑡t computation of M𝑀M on x𝑥x, for t:=tM(x)assign𝑡subscript𝑡𝑀𝑥t:=t_{M}(x), and hence also an accepting computation of M𝑀M on x𝑥x. This shows that the right-hand side in the implication in (b) holds.

The final statement follows from (a) and (b) by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. ∎

4.2 Formalization

The introduction claimed that the theories {¬αM0cc1}conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀0𝑐1\{\neg\alpha^{c}_{M_{0}}\mid c\geqslant 1\} and {¬βM0cc1}conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐1\{\neg\beta^{c}_{M_{0}}\mid c\geqslant 1\} both formalize 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}. This is easy to check:

Proposition 28.

The following are equivalent.

  1. (a)

    𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}.

  2. (b)

    {¬αM0cc}conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀0𝑐\big{\{}\neg\alpha^{c}_{M_{0}}\mid c\in\mathbb{N}\big{\}} is true.

  3. (c)

    {¬αMcc}conditional-setsubscriptsuperscript𝛼𝑐𝑀𝑐\big{\{}\neg\alpha^{c}_{M}\mid c\in\mathbb{N}\big{\}} is true for some explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M.

  4. (d)

    {¬βM0cc}conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐\big{\{}\neg\beta^{c}_{M_{0}}\mid c\in\mathbb{N}\big{\}} is true.

  5. (e)

    {¬βMcc}conditional-setsubscriptsuperscript𝛽𝑐𝑀𝑐\big{\{}\neg\beta^{c}_{M}\mid c\in\mathbb{N}\big{\}} is true for some explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M.

Proof.

We show that (a)-(b)-(c) are equivalent, and that (a)-(d)-(e) are equivalent. To see that (a) implies (b), assume (b) fails; i.e., αM0csubscriptsuperscript𝛼𝑐subscript𝑀0\alpha^{c}_{M_{0}} is true for some c𝑐c\in\mathbb{N}. Then Q0𝖲𝖨𝖹𝖤[nc]subscript𝑄0𝖲𝖨𝖹𝖤delimited-[]superscript𝑛𝑐Q_{0}\in\mathsf{SIZE}[n^{c}]. As Q0subscript𝑄0Q_{0} is 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-complete, (a) fails. That (b) implies (c) is trivial since M0subscript𝑀0M_{0} is an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine. That (c) implies (a) is obvious since every explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine defines a language in 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}. To see that (a) implies (d) argue as in the proof that (a) implies (b) swapping β𝛽\beta for α𝛼\alpha. That (d) implies (e) is trivial since M0subscript𝑀0M_{0} is an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine. Finally, that (e) implies (a) follows from the Easy Witness Lemma 4. ∎

It is straightforward to see that the equivalences (b)-(c) and (d)-(e) in Proposition 28 have direct proofs (i.e., proofs that do not rely on the easy witness lemma). We use Lemma 27 to prove this on the formal level, for both formalizations.

Lemma 29.

For every c𝑐c\in\mathbb{N} and every 111-input explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M without oracles there is d𝑑d\in\mathbb{N} such that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves (αM0cαMd)subscriptsuperscript𝛼𝑐subscript𝑀0subscriptsuperscript𝛼𝑑𝑀(\alpha^{c}_{M_{0}}\to\alpha^{d}_{M}) and (βM0cβMd)subscriptsuperscript𝛽𝑐subscript𝑀0subscriptsuperscript𝛽𝑑𝑀(\beta^{c}_{M_{0}}\to\beta^{d}_{M}).

Proof.

We refer to the implication between α𝛼\alpha’s as the α𝛼\alpha-case, and to the implication between β𝛽\beta’s as the β𝛽\beta-case. Both have similar proofs, so we prove them at the same time. Let M𝑀M be witnessed by the term tM(x)subscript𝑡𝑀𝑥t_{M}(x). Let F(Z,x,u)𝐹𝑍𝑥𝑢F(Z,x,u) and G(Z,x,u)𝐺𝑍𝑥𝑢G(Z,x,u) be the formulas given by Lemma 27 on M𝑀M. Argue in 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) and assume αM0csubscriptsuperscript𝛼𝑐subscript𝑀0\alpha^{c}_{M_{0}} or βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}}, as appropriate. Let n𝐿𝑜𝑔>1𝑛subscript𝐿𝑜𝑔absent1n\in\mathit{Log}_{>1} be given. We aim to find a circuit C𝐶C in the α𝛼\alpha-case, and two circuits C,D𝐶𝐷C,D in the β𝛽\beta-case, witnessing αMesuperscriptsubscript𝛼𝑀𝑒\alpha_{M}^{e} or βMesuperscriptsubscript𝛽𝑀𝑒\beta_{M}^{e}, respectively, for the given n𝑛n, and for suitable e𝑒e\in\mathbb{N}. Choose d𝑑d\in\mathbb{N} such that |M,x,tM(x)|<nd𝑀𝑥subscript𝑡𝑀𝑥superscript𝑛𝑑|\langle M,x,t_{M}(x)\rangle|\ <\ n^{d} for all x<2n𝑥superscript2𝑛x<2^{n}. In the α𝛼\alpha-case, let C0subscript𝐶0C_{0} be a circuit with |C0|<mcsubscript𝐶0superscript𝑚𝑐|C_{0}|<m^{c} that witnesses αM0csuperscriptsubscript𝛼subscript𝑀0𝑐\alpha_{M_{0}}^{c} for m:=ndassign𝑚superscript𝑛𝑑m:=n^{d}. In the β𝛽\beta-case let C0,D0subscript𝐶0subscript𝐷0C_{0},D_{0} be circuits with |C0|,|D0|<mcsubscript𝐶0subscript𝐷0superscript𝑚𝑐|C_{0}|,|D_{0}|<m^{c} that witness βM0csuperscriptsubscript𝛽subscript𝑀0𝑐\beta_{M_{0}}^{c} for m:=ndassign𝑚superscript𝑛𝑑m:=n^{d}.

Choose C𝐶C such that C(x)=C0(M,x,tM(x))𝐶𝑥subscript𝐶0𝑀𝑥subscript𝑡𝑀𝑥C(x)=C_{0}(\langle M,x,t_{M}(x)\rangle) and e𝑒e\in\mathbb{N} such that C<2ne𝐶superscript2superscript𝑛𝑒C<2^{n^{e}}. This C𝐶C will be the witness-circuit in the α𝛼\alpha-case, and the first of the two witness-circuits in the β𝛽\beta-case. For the latter, we choose the second circuit D𝐷D as follows. Choose formulas F,G𝐹𝐺F,G according to Lemma 27. By Lemma 14 there is a circuit D𝐷D such that

D(x,u)G(D0(M,x,tM(x),),x,u)𝐷𝑥𝑢𝐺subscript𝐷0𝑀𝑥subscript𝑡𝑀𝑥𝑥𝑢D(x,u)\leftrightarrow G(D_{0}(\langle M,x,t_{M}(x)\rangle,\cdot),x,u)

for all x,u𝑥𝑢x,u with x<2n𝑥superscript2𝑛x<2^{n}. Then C,D<2ne𝐶𝐷superscript2superscript𝑛𝑒C,D<2^{n^{e}} for suitable e𝑒e\in\mathbb{N}. This is the e𝑒e\in\mathbb{N} we choose in the β𝛽\beta-case.

We claim that C𝐶C witnesses αMesubscriptsuperscript𝛼𝑒𝑀\alpha^{e}_{M} for the given n𝑛n in the α𝛼\alpha-case, and C,D𝐶𝐷C,D witness βMesubscriptsuperscript𝛽𝑒𝑀\beta^{e}_{M} for the given n𝑛n in the β𝛽\beta-case. Let x<2n𝑥superscript2𝑛x<2^{n} and choose z:=x,M,tM(x)assign𝑧𝑥𝑀subscript𝑡𝑀𝑥z:=\langle x,M,t_{M}(x)\rangle. Let Z𝑍Z be any set and let Y:=F(Z,x,)assign𝑌𝐹𝑍𝑥Y:=F(Z,x,\cdot), which exists by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. If C(x)=0𝐶𝑥0C(x)=0, then C0(z)=0subscript𝐶0𝑧0C_{0}(z)=0 and both αM0csubscriptsuperscript𝛼𝑐subscript𝑀0\alpha^{c}_{M_{0}} and βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} imply that Y𝑌Y is not an accepting computation of M0subscript𝑀0M_{0} on z𝑧z. By Lemma 27.a this means that Z𝑍Z is not an accepting computation of M𝑀M on x𝑥x. In both cases, this completes one half of the verification of the witnesses. If C(x)=1𝐶𝑥1C(x)=1, then C0(z)=1subscript𝐶0𝑧1C_{0}(z)=1 and αM0csubscriptsuperscript𝛼𝑐subscript𝑀0\alpha^{c}_{M_{0}} implies that there exists an accepting computation Y𝑌Y of M0subscript𝑀0M_{0} on z𝑧z, and βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} implies that Y:=D0(z,)assign𝑌subscript𝐷0𝑧Y:=D_{0}(z,\cdot) is such an accepting computation of M0subscript𝑀0M_{0} on z𝑧z. But then Lemma 27.b implies that Z:=G(Y,x,)assign𝑍𝐺𝑌𝑥Z:=G(Y,x,\cdot), which exists by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension, is an accepting computation of M𝑀M on x𝑥x. In both cases, this completes the other half of the verification of the witness: in the β𝛽\beta-case, because Z=D(x,)𝑍𝐷𝑥Z=D(x,\cdot). ∎

4.3 Consistency

For every explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M, which by default has one input-tape and no oracles, recall that αMc:=αψcassignsubscriptsuperscript𝛼𝑐𝑀subscriptsuperscript𝛼𝑐𝜓\alpha^{c}_{M}:=\alpha^{c}_{\psi} for ψ𝜓\psi as in Definition 3. For a theory 𝖳𝖳\mathsf{T} that extends 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha), consider the following A-statements for 𝖳𝖳\mathsf{T}:

A: 𝖳+{¬αMcc}𝖳conditional-setsubscriptsuperscript𝛼𝑐𝑀𝑐\mathsf{T}+\{\neg\alpha^{c}_{M}\mid c\in\mathbb{N}\} is consistent for some explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M,
A0: 𝖳+{¬αM0cc}𝖳conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀0𝑐\mathsf{T}+\{\neg\alpha^{c}_{M_{0}}\mid c\in\mathbb{N}\} is consistent.

Consider also the corresponding B-statements for 𝖳𝖳\mathsf{T}:

B: 𝖳+{¬βMcc}𝖳conditional-setsubscriptsuperscript𝛽𝑐𝑀𝑐\mathsf{T}+\{\neg\beta^{c}_{M}\mid c\in\mathbb{N}\} is consistent for some explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M,
B0: 𝖳+{¬βM0cc}𝖳conditional-setsubscriptsuperscript𝛽𝑐subscript𝑀0𝑐\mathsf{T}+\{\neg\beta^{c}_{M_{0}}\mid c\in\mathbb{N}\} is consistent.

Next, recall the statement of Theorem 2, which we now state for an arbitrary theory 𝖳𝖳\mathsf{T} that extends 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha). We refer to it as the C-statement, or the direct consistency statement for 𝖳𝖳\mathsf{T}:

C: 𝖳+{¬αψcc}𝖳conditional-setsubscriptsuperscript𝛼𝑐𝜓𝑐\mathsf{T}+\{\neg\alpha^{c}_{\psi}\mid c\in\mathbb{N}\} is consistent for some Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula ψ(x)𝜓𝑥\psi(x).

Let us explicitly point out that the formula ψ(x)𝜓𝑥\psi(x) of the C-statement has only one free variable of the number sort, and no free variables of the set sort.

Lemma 30.

For every c𝑐c\in\mathbb{N} and every explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M with one input-tape and without oracles, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves (βMcαMc)subscriptsuperscript𝛽𝑐𝑀subscriptsuperscript𝛼𝑐𝑀(\beta^{c}_{M}\to\alpha^{c}_{M}).

Proof.

The formula βMcsubscriptsuperscript𝛽𝑐𝑀\beta^{c}_{M} states that the (single) existential set-quantifier in αMcsubscriptsuperscript𝛼𝑐𝑀\alpha^{c}_{M} is witnessed by Dx()subscript𝐷𝑥D_{x}(\cdot), and this set exists by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. ∎

We view the following proposition as justification that our formalization is faithful. It takes record of which implications in Proposition 28 hold over weak theories.

Proposition 31.

Let 𝖳𝖳\mathsf{T} be a theory extending 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) and consider the A,B,C-statements for 𝖳𝖳\mathsf{T}. Then, the following hold: the A-statements are equivalent, the B-statements are equivalent, and both A-statements imply both B-statements as well as the C-statement.

Proof.

Lemma 30 and compactness show that each A-statement implies the corresponding B-statement. Further, Lemma 29 proves that the A-statements are equivalent, and that the B-statements are equivalent; for the back implications note that M0subscript𝑀0M_{0} is certainly an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine. Further, it is obvious from the definition of αMcsubscriptsuperscript𝛼𝑐𝑀\alpha^{c}_{M} that A implies C and hence both A-statements imply C. ∎

When 𝖳=𝖵20𝖳subscriptsuperscript𝖵02\mathsf{T}=\mathsf{V}^{0}_{2}, we argue below that the model-checker lemmas can be used to show that the implication A-to-C in Proposition 31 can be reversed. It will follow that all A,B,C-statements for 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} are equivalent. Composing with Theorem 2 we get the following corollary, which entails Theorem 7.

Theorem 32.

For 𝖳=𝖵20𝖳subscriptsuperscript𝖵02\mathsf{T}=\mathsf{V}^{0}_{2} all statements C, A, A0, B, B0 are true.

Proof.

Theorem 2 states that C is true for 𝖳=𝖵20𝖳subscriptsuperscript𝖵02\mathsf{T}=\mathsf{V}^{0}_{2}. Hence, by Proposition 31, it suffices to show that C implies A for 𝖳=𝖵20𝖳subscriptsuperscript𝖵02\mathsf{T}=\mathsf{V}^{0}_{2}. But this follows from Lemma 26.a and 26.b. Indeed, these state that every Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula ψ(x)𝜓𝑥\psi(x) is 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2}-provably equivalent to (3) for suitable M𝑀M. ∎

5 Consistency for barely superpolynomial time

In this section we fix r𝖯𝖵𝑟𝖯𝖵r\in\mathsf{PV} such that

  1. (r0)

    the function xr(x)maps-to𝑥𝑟𝑥x\mapsto r(x) is computable in time O(r(x))𝑂𝑟𝑥O(r(x));

  2. (r1)

    𝖲21(|x|=|y|r(x)=r(y))provessubscriptsuperscript𝖲12𝑥𝑦𝑟𝑥𝑟𝑦\mathsf{S}^{1}_{2}\vdash(|x|{=}|y|\to r(x){=}r(y));

  3. (r2)

    𝖲21(|x|<|y|r(x)<r(y))provessubscriptsuperscript𝖲12𝑥𝑦𝑟𝑥𝑟𝑦\mathsf{S}^{1}_{2}\vdash(|x|{<}|y|\to r(x){<}r(y));

  4. (r3)

    for every polynomial p𝑝p there is f𝖯𝖵𝑓𝖯𝖵f\in\mathsf{PV} such that 𝖲21p(r(x))r(f(x))provessubscriptsuperscript𝖲12𝑝𝑟𝑥𝑟𝑓𝑥\mathsf{S}^{1}_{2}\vdash p(r(x))\leqslant r(f(x));

  5. (r4)

    for every c𝑐c\in\mathbb{N} there is ncsubscript𝑛𝑐n_{c}\in\mathbb{N} such that x(|x|>ncr(x)>|x|c)modelsfor-all𝑥𝑥subscript𝑛𝑐𝑟𝑥superscript𝑥𝑐\mathbb{N}\models\forall x\ (|x|{>}n_{c}\to r(x){>}|x|^{c}).

We call a function r𝑟r satisfying (r4) length-superpolynomial. An explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine is an explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine M𝑀M that is witnessed by p(r(x))𝑝𝑟𝑥p(r(x)) for some polynomial p𝑝p.

Here, we deviate from our convention that explicit machines are witnessed by terms and allow 𝖯𝖵𝖯𝖵\mathsf{PV}-symbols. In the notation 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x))), the x𝑥x is there to emphasize that the runtime is measured as a function of the input x𝑥x and not its length. If we want to measure runtime as a function of the length of the input, then we use n𝑛n instead of x𝑥x. For example, 𝖭𝖯=𝖭𝖳𝖨𝖬𝖤(nO(1))𝖭𝖯𝖭𝖳𝖨𝖬𝖤superscript𝑛𝑂1\mathsf{NP}=\mathsf{NTIME}(n^{O(1)}) is given by the collection of explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machines with r(x)=|x|𝑟𝑥𝑥r(x)=|x|, and the classes 𝖭𝖤=𝖭𝖳𝖨𝖬𝖤(2O(n))𝖭𝖤𝖭𝖳𝖨𝖬𝖤superscript2𝑂𝑛\mathsf{NE}=\mathsf{NTIME}(2^{O(n)}) and 𝖭𝖳𝖨𝖬𝖤(nO(log(k)n))𝖭𝖳𝖨𝖬𝖤superscript𝑛𝑂superscript𝑘𝑛\mathsf{NTIME}(n^{O(\log^{(k)}n)}) are given by the collections of explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machines for r(x)=2|x|𝑟𝑥superscript2𝑥r(x)=2^{|x|} and r(x)=|x|log(k)|x|𝑟𝑥superscript𝑥superscript𝑘𝑥r(x)=|x|^{\log^{(k)}|x|}, respectively; the latter two satisfy (r0)-(r4), if k1𝑘1k\geqslant 1 in the second.

Remark 33.

(r3) is not implied by the other conditions.

Proof.

We shall define a function r(x)𝑟𝑥r(x) which consists of slow growing segments interspersed with fast growing segments. First, choose a fast growing function R𝖯𝖵𝑅𝖯𝖵R\in\mathsf{PV} so that R(x)𝑅𝑥R(x) depends only on |x|𝑥|x| and so that R(x)2R(x)+|x|ω(1)𝑅superscript𝑥2𝑅𝑥superscript𝑥𝜔1R(x)^{2}\geqslant R(x)+|x|^{\omega(1)}. For instance R(x)=2|x|𝑅𝑥superscript2𝑥R(x)=2^{|x|} works. Second, define ::\ell:\mathbb{N}\to\mathbb{N} be increasing with (c+1)>(c)c+1𝑐1superscript𝑐𝑐1\ell(c+1)>\ell(c)^{c}+1 and with R(x)2R(x)+|x|c𝑅superscript𝑥2𝑅𝑥superscript𝑥𝑐R(x)^{2}\geqslant R(x)+|x|^{c} for all x2(c)1𝑥superscript2𝑐1x\geqslant 2^{\ell(c)-1}. Let xc:=2(c)1assignsubscript𝑥𝑐superscript2𝑐1x_{c}:=2^{\ell(c)-1} and yc:=2(c)c1assignsubscript𝑦𝑐superscript2superscript𝑐𝑐1y_{c}:=2^{\ell(c)^{c}}-1 be the first and last numbers of length (c)𝑐\ell(c) and (c)csuperscript𝑐𝑐\ell(c)^{c}, respectively. Finally, let r(x):=R(xc)+|x||xc|assign𝑟𝑥𝑅subscript𝑥𝑐𝑥subscript𝑥𝑐r(x):=R(x_{c})+|x|-|x_{c}| for xcxycsubscript𝑥𝑐𝑥subscript𝑦𝑐x_{c}\leqslant x\leqslant y_{c}, and let r(x):=R(x)assign𝑟𝑥𝑅𝑥r(x):=R(x) for yc<x<xc+1subscript𝑦𝑐𝑥subscript𝑥𝑐1y_{c}<x<x_{c+1}. The slow growing segments of r(x)𝑟𝑥r(x) are where xcxycsubscript𝑥𝑐𝑥subscript𝑦𝑐x_{c}\leqslant x\leqslant y_{c}, and here r(x)𝑟𝑥r(x) is chosen to be as slow growing as possible while satisfying (r1) and (r2).

Clearly, \ell and R𝑅R can be chosen so that r(x)𝑟𝑥r(x) is in 𝖯𝖵𝖯𝖵\mathsf{PV} and properties (r0), (r1), (r2), and (r4) hold for r𝑟r. We claim (r3) fails for p(x)=x2𝑝𝑥superscript𝑥2p(x)=x^{2}.

Indeed, let f𝖯𝖵𝑓𝖯𝖵f\in\mathsf{PV} be given and choose c𝑐c such that |f(xc)|<|xc|c=|yc|𝑓subscript𝑥𝑐superscriptsubscript𝑥𝑐𝑐subscript𝑦𝑐|f(x_{c})|<|x_{c}|^{c}=|y_{c}|. Then

p(r(xc))=r(xc)2=R(xc)2R(xc)+|xc|c=R(xc)+|yc|>r(yc)>r(f(xc))𝑝𝑟subscript𝑥𝑐𝑟superscriptsubscript𝑥𝑐2𝑅superscriptsubscript𝑥𝑐2𝑅subscript𝑥𝑐superscriptsubscript𝑥𝑐𝑐𝑅subscript𝑥𝑐subscript𝑦𝑐𝑟subscript𝑦𝑐𝑟𝑓subscript𝑥𝑐p(r(x_{c}))=r(x_{c})^{2}=R(x_{c})^{2}\geqslant R(x_{c})+|x_{c}|^{c}=R(x_{c})+|y_{c}|>r(y_{c})>r(f(x_{c}))

where the last inequality follows from (r2). ∎

5.1 A more general universal machine

We start with the analogue of Lemma 27.

Lemma 34.

There is an explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine Mrsubscript𝑀𝑟M_{r} with one input-tape and without oracles such that for every explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine M𝑀M with one input-tape and without oracles there are fM(x)𝖯𝖵subscript𝑓𝑀𝑥𝖯𝖵f_{M}(x)\in\mathsf{PV} and quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formulas FMsubscript𝐹𝑀F_{M} and GMsubscript𝐺𝑀G_{M} such that

  1. (a)

    𝖲21(α)Z is an accepting computation of M on xFM(Z,x,) is an accepting computation of Mr on M,x,fM(x).subscriptsuperscript𝖲12𝛼provesZ is an accepting computation of M on xabsentmissing-subexpressionmissing-subexpressionFM(Z,x,) is an accepting computation of Mr on M,x,fM(x)\begin{array}[t]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\textit{``$Z$ is an accepting computation of $M$ on $x$''}\to\\ &&\textit{``$F_{M}(Z,x,\cdot)$ is an accepting computation of $M_{r}$ on $\langle M,x,f_{M}(x)\rangle$''}.\end{array}

  2. (b)

    𝖲21(α)Z is an accepting computation of Mr on M,x,fM(x)GM(Z,x,) is an accepting computation of M on x,subscriptsuperscript𝖲12𝛼provesZ is an accepting computation of Mr on M,x,fM(x)absentmissing-subexpressionmissing-subexpressionGM(Z,x,) is an accepting computation of M on x\begin{array}[t]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\textit{``$Z$ is an accepting computation of $M_{r}$ on $\langle M,x,f_{M}(x)\rangle$''}\to\\ &&\textit{``$G_{M}(Z,x,\cdot)$ is an accepting computation of $M$ on $x$''},\end{array}

In particular,

  1. 3.

    𝖲21(α)2ZZ is an accepting computation of Mr on M,x,fM(x)2ZZ is an accepting computation of M on xsubscriptsuperscript𝖲12𝛼provessubscript2𝑍Z is an accepting computation of Mr on M,x,fM(x)absentmissing-subexpressionmissing-subexpressionsubscript2𝑍Z is an accepting computation of M on x\begin{array}[t]{lcl}\mathsf{S}^{1}_{2}(\alpha)&\vdash&\exists_{2}Z\textit{``$Z$ is an accepting computation of $M_{r}$ on $\langle M,x,f_{M}(x)\rangle$''}\leftrightarrow\\ &&\exists_{2}Z\textit{``$Z$ is an accepting computation of $M$ on $x$''}\end{array}

Proof.

Choose according to Lemma 20 a machine MφZsubscriptsuperscript𝑀𝑍𝜑M^{Z}_{\varphi} and a term rφ(N,x,t)subscript𝑟𝜑𝑁𝑥𝑡r_{\varphi}(N,x,t) for

φ(Z,N,x,t):=Z is an accepting time-t computation of N on x.assign𝜑𝑍𝑁𝑥𝑡Z is an accepting time-t computation of N on x\displaystyle\varphi(Z,N,x,t)\ :=\textit{``$Z$ is an accepting time-$t$ computation of~{}$N$ on~{}$x$''}.

By the comment after Equation (7), there is a polynomial p1subscript𝑝1p_{1} so that 𝑏𝑡φ(N,x,t)p1(t,|N|,|x|)subscript𝑏𝑡𝜑𝑁𝑥𝑡subscript𝑝1𝑡𝑁𝑥\mathit{bt}_{\varphi}(N,x,t){\leqslant}p_{1}(t,|N|,|x|) provably in 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}. By Lemma 20.d, there is a polynomial p2subscript𝑝2p_{2} so that rφ(N,x,t)p2(t,|N|,|x|)subscript𝑟𝜑𝑁𝑥𝑡subscript𝑝2𝑡𝑁𝑥r_{\varphi}(N,x,t){\leqslant}p_{2}(t,|N|,|x|) provably in 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}. For MφZsubscriptsuperscript𝑀𝑍𝜑M^{Z}_{\varphi} choose a machine M1subscript𝑀1M_{1} and a term r1(N,x,t)subscript𝑟1𝑁𝑥𝑡r_{1}(N,x,t) according to Lemma 25. By Lemma 25.c, there is a polynomial p3subscript𝑝3p_{3} so that r1(N,x,t)p3(t,|N|,|x|)subscript𝑟1𝑁𝑥𝑡subscript𝑝3𝑡𝑁𝑥r_{1}(N,x,t)\leqslant p_{3}(t,|N|,|x|).

Define Mrsubscript𝑀𝑟M_{r} to compute on z𝑧z as follows. It first checks that z=N,x,t𝑧𝑁𝑥𝑡z=\langle N,x,t\rangle for certain N,x,t𝑁𝑥𝑡N,x,t and computes N,x,r(t)𝑁𝑥𝑟𝑡\langle N,x,r(t)\rangle; if the check fails, the machine stops. After this initial computation Mrsubscript𝑀𝑟M_{r} runs M1subscript𝑀1M_{1} on N,x,r(t)𝑁𝑥𝑟𝑡\langle N,x,r(t)\rangle. The initial computation can be implemented with explicit 𝖯𝖯\mathsf{P}-machines (Lemma 19), say with time bound p4(|z|)subscript𝑝4𝑧p_{4}(|z|) for a polynomial p4subscript𝑝4p_{4}. Then Mrsubscript𝑀𝑟M_{r} is an explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine. Indeed, it is witnessed by p4(|z|)+p3(r(z),|z|,|z|)p5(r(z))subscript𝑝4𝑧subscript𝑝3𝑟𝑧𝑧𝑧subscript𝑝5𝑟𝑧p_{4}(|z|)+p_{3}(r(z),|z|,|z|)\leqslant p_{5}(r(z)) for a polynomial p5subscript𝑝5p_{5}. Here we use that 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}-provably t,N,x𝑡𝑁𝑥t,N,x are bounded by z𝑧z, and r𝑟r is non-decreasing with r(x)|x|𝑟𝑥𝑥r(x)\geqslant|x| by (r1) and (r2).

Let M𝑀M be an explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine, say witnessed by pM(r(x))subscript𝑝𝑀𝑟𝑥p_{M}(r(x)) for a polynomial pMsubscript𝑝𝑀p_{M}. Choose fMsubscript𝑓𝑀f_{M} for pMsubscript𝑝𝑀p_{M} according to (r3).

For (a), argue in 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} and assume Z𝑍Z is an accepting computation of M𝑀M on x𝑥x. Then Z𝑍Z is time pM(r(x))subscript𝑝𝑀𝑟𝑥p_{M}(r(x)), so by (r3) we can repeat the halting configuration to get an accepting time r(fM(x))𝑟subscript𝑓𝑀𝑥r(f_{M}(x)) computation Z0subscript𝑍0Z_{0} of M𝑀M on x𝑥x, i.e., φ(Z0,M,x,r(fM(x)))𝜑subscript𝑍0𝑀𝑥𝑟subscript𝑓𝑀𝑥\varphi(Z_{0},M,x,r(f_{M}(x))) holds. By Lemma 20.7, the set Z1:=Cφ(Z0,M,x,r(fM(x)),tφ(M,x,r(fM(x))),)assignsubscript𝑍1subscript𝐶𝜑subscript𝑍0𝑀𝑥𝑟subscript𝑓𝑀𝑥subscript𝑡𝜑𝑀𝑥𝑟subscript𝑓𝑀𝑥Z_{1}:=C_{\varphi}(Z_{0},M,x,r(f_{M}(x)),t_{\varphi}(M,x,r(f_{M}(x))),\cdot) is an accepting computation of MφZ0subscriptsuperscript𝑀subscript𝑍0𝜑M^{Z_{0}}_{\varphi} on the triple M,x,r(fM(x))𝑀𝑥𝑟subscript𝑓𝑀𝑥M,x,r(f_{M}(x)). By Lemma 25.a, the set Z2:=F(Z1,Z0,M,x,r(fM(x)),)assignsubscript𝑍2𝐹subscript𝑍1subscript𝑍0𝑀𝑥𝑟subscript𝑓𝑀𝑥Z_{2}:=F(Z_{1},Z_{0},M,x,r(f_{M}(x)),\cdot) is an accepting computation of M1subscript𝑀1M_{1} on the triple M,x,r(fM(x))𝑀𝑥𝑟subscript𝑓𝑀𝑥M,x,r(f_{M}(x)). Compose Z2subscript𝑍2Z_{2} with an initial computation of Mrsubscript𝑀𝑟M_{r} on z:=M,x,fM(x)assign𝑧𝑀𝑥subscript𝑓𝑀𝑥z:=\langle M,x,f_{M}(x)\rangle to get an accepting computation Z3subscript𝑍3Z_{3} of Mrsubscript𝑀𝑟M_{r} on z𝑧z. It is clear that Z3=FM(Z,x,)subscript𝑍3subscript𝐹𝑀𝑍𝑥Z_{3}=F_{M}(Z,x,\cdot) for some quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula FMsubscript𝐹𝑀F_{M}.

For (b), argue in 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} and let Z𝑍Z be an accepting computation of Mrsubscript𝑀𝑟M_{r} on M,x,fM(x)𝑀𝑥subscript𝑓𝑀𝑥\langle M,x,f_{M}(x)\rangle. From Z𝑍Z extract an accepting computation Z0subscript𝑍0Z_{0} of M1subscript𝑀1M_{1} on the triple M,x,r(fM(x))𝑀𝑥𝑟subscript𝑓𝑀𝑥M,x,r(f_{M}(x)). By Lemma 25.b,  Z1:=G(Z0,M,x,r(fM(x)),)assignsubscript𝑍1𝐺subscript𝑍0𝑀𝑥𝑟subscript𝑓𝑀𝑥Z_{1}:=G(Z_{0},M,x,r(f_{M}(x)),\cdot) is an accepting computation of MφZ2subscriptsuperscript𝑀subscript𝑍2𝜑M^{Z_{2}}_{\varphi} on the triple M,x,r(fM(x))𝑀𝑥𝑟subscript𝑓𝑀𝑥M,x,r(f_{M}(x)) where Z2:=H(Z0,M,x,r(fM(x)),)assignsubscript𝑍2𝐻subscript𝑍0𝑀𝑥𝑟subscript𝑓𝑀𝑥Z_{2}:=H(Z_{0},M,x,r(f_{M}(x)),\cdot). Clearly, Z0subscript𝑍0Z_{0} can be described by a quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula, so Z1subscript𝑍1Z_{1} and Z2subscript𝑍2Z_{2} exist by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. Hence, by Lemma 20.a, φ(Z2,M,x,r(fM(x)))𝜑subscript𝑍2𝑀𝑥𝑟subscript𝑓𝑀𝑥\varphi(Z_{2},M,x,r(f_{M}(x))) holds, i.e., Z2subscript𝑍2Z_{2} is an accepting time-r(fM(x))𝑟subscript𝑓𝑀𝑥r(f_{M}(x)) computation of M𝑀M on x𝑥x. By (r3) we can shrink Z2subscript𝑍2Z_{2} to time pM(r(x))subscript𝑝𝑀𝑟𝑥p_{M}(r(x)) and get an accepting computation Z3subscript𝑍3Z_{3} of M𝑀M on x𝑥x. Clearly, Z3=GM(Z,x,)subscript𝑍3subscript𝐺𝑀𝑍𝑥Z_{3}=G_{M}(Z,x,\cdot) for some quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-formula GMsubscript𝐺𝑀G_{M}.

Finally, (c) follows from (a) and (b) by Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. ∎

5.2 Formalization

To faithfully formalize 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥𝖯𝗉𝗈𝗅𝗒\mathsf{NTIME}(\mathsf{poly}(r(x)))\not\subseteq\mathsf{P/poly} we intend to follow the path paved in Section 4. Some modification are, however, required. First, we need an analogue of the Easy Witness Lemma. This has been achieved by Murray and Williams [27]:

Lemma 35.

Let t(n)𝑡𝑛t(n) be a function that is increasing, time-constructible, and superpolynomial. If 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(t(n)))𝖯/𝗉𝗈𝗅𝗒𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑡𝑛𝖯𝗉𝗈𝗅𝗒\mathsf{NTIME}(\mathsf{poly}(t(n)))\subseteq\mathsf{P/poly}, then every 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(t(n)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑡𝑛\mathsf{NTIME}(\mathsf{poly}(t(n)))-machine M𝑀M has polynomial-size witness circuits.

That t(n)𝑡𝑛t(n) is superpolynomial means that for every c𝑐c\in\mathbb{N} there is ncsubscript𝑛𝑐n_{c}\in\mathbb{N} such that t(n)>nc𝑡𝑛superscript𝑛𝑐t(n)>n^{c} for all n>nc𝑛subscript𝑛𝑐n>n_{c}. That M𝑀M has witness circuits of size s(n)𝑠𝑛s(n), where s::𝑠s:\mathbb{N}\to\mathbb{N} is a function, means that for every  x{0,1}𝑥superscript01x\in\{0,1\}^{*} that is accepted by M𝑀M, there exists a circuit D𝐷D of size at most s(|x|)𝑠𝑥s(|x|) such that 𝑡𝑡(D)𝑡𝑡𝐷\mathit{tt}(D) encodes an accepting computation of M𝑀M on x𝑥x. Note that, in contrast to Lemma 4, the circuit D𝐷D can depend on x𝑥x. We do not know whether Lemma 35 holds true for oblivious witness circuits as in Lemma 4.

Lemma 35 follows from the central result of [27]:

Lemma 36 (Lemma 4.1 in [27]).

There are e,g𝑒𝑔e,g\in\mathbb{N} with e,g1𝑒𝑔1e,g\geqslant 1 such that for all increasing time-constructible functions s(n)𝑠𝑛s(n) and t(n)𝑡𝑛t(n), and for s2(n):=s(en)eassignsubscript𝑠2𝑛𝑠superscript𝑒𝑛𝑒s_{2}(n):=s(en)^{e}, if 𝖭𝖳𝖨𝖬𝖤(O(t(n)e))𝖲𝖨𝖹𝖤(s(n))𝖭𝖳𝖨𝖬𝖤𝑂𝑡superscript𝑛𝑒𝖲𝖨𝖹𝖤𝑠𝑛\mathsf{NTIME}(O(t(n)^{e}))\subseteq\mathsf{SIZE}(s(n)), then every 𝖭𝖳𝖨𝖬𝖤(t(n))𝖭𝖳𝖨𝖬𝖤𝑡𝑛\mathsf{NTIME}(t(n))-machine has witness circuits of size s2(s2(s2(n)))2gsubscript𝑠2superscriptsubscript𝑠2subscript𝑠2𝑛2𝑔s_{2}(s_{2}(s_{2}(n)))^{2g}, provided that s(n)<2n/e/n𝑠𝑛superscript2𝑛𝑒𝑛s(n)<2^{n/e}/n and t(n)s2(s2(s2(n)))d𝑡𝑛subscript𝑠2superscriptsubscript𝑠2subscript𝑠2𝑛𝑑t(n)\geqslant\penalty 10000s_{2}(s_{2}(s_{2}(n)))^{d} for a sufficiently large d𝑑d\in\mathbb{N}.

Proof of Lemma 35 from Lemma 36.

We start noting that there is a non-deterministic machine U𝑈U that decides the problem Q0subscript𝑄0Q_{0} defined in Section 4.1 in time O(|x|+|M|t2)𝑂𝑥𝑀superscript𝑡2O(|x|+|M|\cdot t^{2}) on input M,x,t𝑀𝑥𝑡\langle M,x,t\rangle: after reading the input, guess the non-deterministic choices of M𝑀M and deterministically in time cMt2subscript𝑐𝑀superscript𝑡2c_{M}\cdot t^{2} simulate the computation path of M𝑀M on input x𝑥x as determined by those choices, where cMsubscript𝑐𝑀c_{M} is a simulation overhead constant that depends only on M𝑀M and that we may assume is at most |M|𝑀|M|.

Assume 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(t(n)))𝖯/𝗉𝗈𝗅𝗒𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑡𝑛𝖯𝗉𝗈𝗅𝗒\mathsf{NTIME}(\mathsf{poly}(t(n)))\subseteq\mathsf{P/poly}. Fix c𝑐c\in\mathbb{N} with c1𝑐1c\geqslant 1 and an 𝖭𝖳𝖨𝖬𝖤(t(n)c)𝖭𝖳𝖨𝖬𝖤𝑡superscript𝑛𝑐\mathsf{NTIME}(t(n)^{c})-machine M𝑀M. We intend to apply Lemma 36 to M𝑀M for a suitably chosen s(n)𝑠𝑛s(n), with t(n)c𝑡superscript𝑛𝑐t(n)^{c} in the role of t(n)𝑡𝑛t(n). For that, we will need to show that 𝖭𝖳𝖨𝖬𝖤(O(t(n)ce))𝖲𝖨𝖹𝖤(s(n))𝖭𝖳𝖨𝖬𝖤𝑂𝑡superscript𝑛𝑐𝑒𝖲𝖨𝖹𝖤𝑠𝑛\mathsf{NTIME}(O(t(n)^{ce}))\subseteq\mathsf{SIZE}(s(n)) for the chosen s(n)𝑠𝑛s(n), where e1𝑒1e\geqslant 1 is the first of the two constants in Lemma 36.

The restriction of U𝑈U to inputs of the form M,x,t(|x|)ce+1𝑀𝑥𝑡superscript𝑥𝑐𝑒1\langle M,x,t(|x|)^{ce+1}\rangle runs in time O(|x|+|M|t(|x|)2ce+2)𝑂𝑥𝑀𝑡superscript𝑥2𝑐𝑒2O(|x|+\penalty 10000|M|\cdot t(|x|)^{2ce+2}). Therefore, the set of pairs M,x𝑀𝑥\langle M,x\rangle such that U𝑈U accepts on input M,x,t(|x|)ce+1𝑀𝑥𝑡superscript𝑥𝑐𝑒1\langle M,x,t(|x|)^{ce+1}\rangle is in 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(t(n)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑡𝑛\mathsf{NTIME}(\mathsf{poly}(t(n))), so by the assumption, it is decided by circuits of size p(|M,x|)𝑝𝑀𝑥p(|\langle M,x\rangle|) for a suitable polynomial p(n)𝑝𝑛p(n).

Now, choose s(n)𝑠𝑛s(n) as a polynomial such that for every non-deterministic Turing machine M𝑀M and every x𝑥x that is sufficiently long with respect to M𝑀M it holds that p(|M,x|)<s(|x|)𝑝𝑀𝑥𝑠𝑥p(|\langle M,x\rangle|)<s(|x|). We verify that 𝖭𝖳𝖨𝖬𝖤(O(t(n)ce))𝖲𝖨𝖹𝖤(s(n))𝖭𝖳𝖨𝖬𝖤𝑂𝑡superscript𝑛𝑐𝑒𝖲𝖨𝖹𝖤𝑠𝑛\mathsf{NTIME}(O(t(n)^{ce}))\subseteq\mathsf{SIZE}(s(n)): if B𝐵B is a set in 𝖭𝖳𝖨𝖬𝖤(O(t(n)ce))𝖭𝖳𝖨𝖬𝖤𝑂𝑡superscript𝑛𝑐𝑒\mathsf{NTIME}(O(t(n)^{ce})) and M𝑀M is a non-deterministic Turing machine that witnesses this, then, for sufficiently long x𝑥x, we have that x𝑥x is in B𝐵B if and only if U𝑈U accepts on M,x,t(|x|)ce+1𝑀𝑥𝑡superscript𝑥𝑐𝑒1\langle M,x,t(|x|)^{ce+1}\rangle. Hence, by the choice of s(n)𝑠𝑛s(n), the set B𝐵B is in 𝖲𝖨𝖹𝖤(s(n))𝖲𝖨𝖹𝖤𝑠𝑛\mathsf{SIZE}(s(n)).

The requirements of Lemma 36 that s(n)<2n/e/n𝑠𝑛superscript2𝑛𝑒𝑛s(n)<2^{n/e}/n and t(n)cs2(s2(s2(n)))d𝑡superscript𝑛𝑐subscript𝑠2superscriptsubscript𝑠2subscript𝑠2𝑛𝑑t(n)^{c}\geqslant s_{2}(s_{2}(s_{2}(n)))^{d} for a sufficiently large constant d𝑑d\in\mathbb{N} are obviously met because s(n)𝑠𝑛s(n) is polynomially bounded and t(n)𝑡𝑛t(n) is superpolynomial. Lemma 36 applied to s(n)𝑠𝑛s(n) and t(n)c𝑡superscript𝑛𝑐t(n)^{c} then gives that M𝑀M has witness circuits of size s2(s2(s2(n)))2gsubscript𝑠2superscriptsubscript𝑠2subscript𝑠2𝑛2𝑔s_{2}(s_{2}(s_{2}(n)))^{2g}, where g1𝑔1g\geqslant 1 is the second of the two constants in Lemma 36. Since s(n)𝑠𝑛s(n) is polynomially bounded, also this function is polynomially bounded. Thus, M𝑀M has polynomial-size witness circuits. ∎

Lemma 35 enables a Π11,bfor-allsubscriptsuperscriptΠ1𝑏1\forall\Pi^{1,b}_{1}-formalization of 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥𝖯𝗉𝗈𝗅𝗒\mathsf{NTIME}(\mathsf{poly}(r(x)))\not\subseteq\mathsf{P/poly}:

Definition 37.

For an explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine M𝑀M with one input-tape and without oracles define

γMc:=n𝐿𝑜𝑔>1C<2ncx<2nD<2nc2Y(C(x)=0¬Y is an accepting computation of M on x)(C(x)=1D() is an accepting computation of M on x).superscriptsubscript𝛾𝑀𝑐assignfor-all𝑛subscript𝐿𝑜𝑔absent1𝐶superscript2superscript𝑛𝑐for-all𝑥superscript2𝑛𝐷superscript2superscript𝑛𝑐subscriptfor-all2𝑌missing-subexpressionmissing-subexpressionlimit-from𝐶𝑥0Y is an accepting computation of M on xmissing-subexpressionmissing-subexpression𝐶𝑥1D() is an accepting computation of M on x\begin{array}[]{lcl}\gamma_{M}^{c}&:=&\forall n{\in}\mathit{Log}_{>1}\ \exists C{<}2^{n^{c}}\ \forall x{<}2^{n}\ \exists D{<}2^{n^{c}}\ \forall_{2}Y\\ &&\quad(C(x){=}0\ \to\ \neg\textit{``$Y$ is an accepting computation of $M$ on $x$''})\ \wedge\\ &&\quad(C(x){=}1\ \to\ \textit{``$D(\cdot)$ is an accepting computation of $M$ on $x$''}).\end{array}

Let Mrsubscript𝑀𝑟M_{r} be the explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x))))\mathsf{NTIME}(\mathsf{poly}(r(x))))-machine of Lemma 34. Define

𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖯/𝗉𝗈𝗅𝗒:={¬γMrcc}.assign𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖯/𝗉𝗈𝗅𝗒conditional-setsubscriptsuperscript𝛾𝑐subscript𝑀𝑟𝑐\textit{``$\mathsf{NTIME}(\mathsf{poly}(r(x)))\not\subseteq\mathsf{P/poly}$''}\ :=\ \big{\{}\neg\gamma^{c}_{M_{r}}\mid c\in\mathbb{N}\big{\}}.

The following is the analogue of Lemma 30 and is similarly proved.

Lemma 38.

For every c𝑐c\in\mathbb{N} and every explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine M𝑀M with one input-tape and without oracles, 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves (γMcαMc)subscriptsuperscript𝛾𝑐𝑀subscriptsuperscript𝛼𝑐𝑀(\gamma^{c}_{M}\to\alpha^{c}_{M}).

Lemma 39.

For every c𝑐c\in\mathbb{N} and every explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine M𝑀M with one input-tape and without oracles there is d𝑑d\in\mathbb{N} such that 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) proves (αMrcαMd)subscriptsuperscript𝛼𝑐subscript𝑀𝑟subscriptsuperscript𝛼𝑑𝑀(\alpha^{c}_{M_{r}}\to\alpha^{d}_{M}) and (γMrcγMd)subscriptsuperscript𝛾𝑐subscript𝑀𝑟subscriptsuperscript𝛾𝑑𝑀(\gamma^{c}_{M_{r}}\to\gamma^{d}_{M}).

Proof.

This is proved similarly as Lemma 29. We only treat the γ𝛾\gamma-case. Choose fM(x)𝖯𝖵subscript𝑓𝑀𝑥𝖯𝖵f_{M}(x)\in\mathsf{PV} according to Lemma 34. Argue in 𝖲21(α)+γMrcsubscriptsuperscript𝖲12𝛼subscriptsuperscript𝛾𝑐subscript𝑀𝑟\mathsf{S}^{1}_{2}(\alpha)+\gamma^{c}_{M_{r}}. Let n𝐿𝑜𝑔>1𝑛subscript𝐿𝑜𝑔absent1n\in\mathit{Log}_{>1} be given. Choose e𝑒e\in\mathbb{N} such that |M,x,fM(x)|<ne𝑀𝑥subscript𝑓𝑀𝑥superscript𝑛𝑒|\langle M,x,f_{M}(x)\rangle|<n^{e} for all x<2n𝑥superscript2𝑛x<2^{n}. Choose C0subscript𝐶0C_{0} witnessing γMrcsubscriptsuperscript𝛾𝑐subscript𝑀𝑟\gamma^{c}_{M_{r}} for m:=neassign𝑚superscript𝑛𝑒m:=n^{e}. Choose a circuit C𝐶C such that C(x)=C0(M,x,fM(x))𝐶𝑥subscript𝐶0𝑀𝑥subscript𝑓𝑀𝑥C(x)=C_{0}(\langle M,x,f_{M}(x)\rangle) for all x<2n𝑥superscript2𝑛x<2^{n}. We shall choose d𝑑d large enough such that C2nd𝐶superscript2superscript𝑛𝑑C\leqslant 2^{n^{d}} and choose C𝐶C to witness the first existential quantifier in γMdsubscriptsuperscript𝛾𝑑𝑀\gamma^{d}_{M} for n𝑛n. To verify this choice, let x<2n𝑥superscript2𝑛x<2^{n} be given.

If C(x)=0𝐶𝑥0C(x)=0, then there are no accepting computations of Mrsubscript𝑀𝑟M_{r} on M,x,fM(x)𝑀𝑥subscript𝑓𝑀𝑥\langle M,x,f_{M}(x)\rangle. By Lemma 34.a and Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension, there are no accepting computations of M𝑀M on x𝑥x. If C(x)=1𝐶𝑥1C(x)=1, then there is a circuit D0<2mcsubscript𝐷0superscript2superscript𝑚𝑐D_{0}<2^{m^{c}} such that D0()subscript𝐷0D_{0}(\cdot) is an accepting computation of Mrsubscript𝑀𝑟M_{r} on M,x,fM(x)𝑀𝑥subscript𝑓𝑀𝑥\langle M,x,f_{M}(x)\rangle. By Lemma 34.bGM(D0(),x,)subscript𝐺𝑀subscript𝐷0𝑥G_{M}(D_{0}(\cdot),x,\cdot) is an accepting computation of M𝑀M on x𝑥x. By Lemma 14 there is a circuit D𝐷D such that (D(u)GM(D0(),x,u))𝐷𝑢subscript𝐺𝑀subscript𝐷0𝑥𝑢\big{(}D(u)\leftrightarrow G_{M}(D_{0}(\cdot),x,u)\big{)} for all upM(r(x)),pM(r(x),|M|)𝑢subscript𝑝𝑀𝑟𝑥subscript𝑝𝑀𝑟𝑥𝑀u\leqslant\langle p_{M}(r(x)),p_{M}(r(x),|M|)\rangle where pMsubscript𝑝𝑀p_{M} is a polynomial such that pM(r(x))subscript𝑝𝑀𝑟𝑥p_{M}(r(x)) witnesses M𝑀M. Choose d𝑑d\in\mathbb{N} large enough such that D<2nd𝐷superscript2superscript𝑛𝑑D<2^{n^{d}}. ∎

Finally, we are in the position to verify that the formulas considered formalize the intended circuit lower bound.

Proposition 40.

The following are equivalent.

  1. (a)

    𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥𝖯𝗉𝗈𝗅𝗒\mathsf{NTIME}(\mathsf{poly}(r(x)))\not\subseteq\mathsf{P/poly}.

  2. (b)

    {¬αMrcc}conditional-setsubscriptsuperscript𝛼𝑐subscript𝑀𝑟𝑐\big{\{}\neg\alpha^{c}_{M_{r}}\mid c\in\mathbb{N}\big{\}} is true.

  3. (c)

    {¬αMcc}conditional-setsubscriptsuperscript𝛼𝑐𝑀𝑐\big{\{}\neg\alpha^{c}_{M}\mid c\in\mathbb{N}\big{\}} is true for some explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine M𝑀M.

  4. (d)

    {¬γMcc}conditional-setsubscriptsuperscript𝛾𝑐𝑀𝑐\big{\{}\neg\gamma^{c}_{M}\mid c\in\mathbb{N}\big{\}} is true for some explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine M𝑀M.

  5. (e)

    {¬γMrcc}conditional-setsubscriptsuperscript𝛾𝑐subscript𝑀𝑟𝑐\big{\{}\neg\gamma^{c}_{M_{r}}\mid c\in\mathbb{N}\big{\}} is true.

Proof.

To see that (a) implies (b), assume (b) fails, so αMrcsubscriptsuperscript𝛼𝑐subscript𝑀𝑟\alpha^{c}_{M_{r}} is true for some c𝑐c\in\mathbb{N}. Then the problem accepted by Mrsubscript𝑀𝑟M_{r} is in 𝖲𝖨𝖹𝖤[nc]𝖲𝖨𝖹𝖤delimited-[]superscript𝑛𝑐\mathsf{SIZE}[n^{c}]. By Lemma 34 this problem is 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-hard under polynomial time reductions. Since 𝖯/𝗉𝗈𝗅𝗒𝖯𝗉𝗈𝗅𝗒\mathsf{P/poly} is downward-closed under polynomial-time reductions, (a) fails. The claim that (b) implies (c) is trivial since Mrsubscript𝑀𝑟M_{r} is an explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine. That (c) implies (d) follows from Lemma 38. That (d) implies (e) follows from Lemma 39. That (e) implies (a) follows from Lemma 35: by (r1) there is a function t(n)𝑡𝑛t(n) such that t(|x|)=r(x)𝑡𝑥𝑟𝑥t(|x|)=r(x) for every x𝑥x; then 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))=𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(t(n)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑡𝑛\mathsf{NTIME}(\mathsf{poly}(r(x)))=\mathsf{NTIME}(\mathsf{poly}(t(n))) where the time-bound on the left is written as a function of the input x𝑥x and on the right as a function of its length n=|x|𝑛𝑥n=|x|; further, t(n)𝑡𝑛t(n) is time-constructible by (r0) and (r1), increasing by (r2) and superpolynomial by (r4). ∎

5.3 Consistency

For a theory 𝖳𝖳\mathsf{T} that extends 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha), the new A,B-statements are the following:

Ar: 𝖳+{¬αMc\mathsf{T}+\{\neg\alpha^{c}_{M} c}\mid c\in\mathbb{N}\} is consistent for some explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine M𝑀M,
Br: 𝖳+{¬γMc\mathsf{T}+\{\neg\gamma^{c}_{M} c}\mid c\in\mathbb{N}\} is consistent for some explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine M𝑀M,
A0r: 𝖳+{¬αMrc\mathsf{T}+\{\neg\alpha^{c}_{M_{r}} c}\mid c\in\mathbb{N}\} is consistent.
B0r: 𝖳+{¬γMrc\mathsf{T}+\{\neg\gamma^{c}_{M_{r}} c}\mid c\in\mathbb{N}\} is consistent.

To define the corresponding C-statement, we say that the bounding term of a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula ψ=ψ(x)𝜓𝜓𝑥\psi=\psi(x) is polynomial in r(x)𝑟𝑥r(x) if 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} proves 𝑏𝑡(ψ)p(r(x))𝑏𝑡𝜓𝑝𝑟𝑥\mathit{bt}(\psi)\leqslant p(r(x)) for some polynomial p(n)𝑝𝑛p(n). Then:

Cr: 𝖳+{¬αψc\mathsf{T}+\{\neg\alpha^{c}_{\psi} c}\mid c\in\mathbb{N}\} is consistent for some Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula ψ=ψ(x)𝜓𝜓𝑥\psi=\psi(x) whose
bounding term is polynomial in r(x)𝑟𝑥r(x).

Before we prove the analogue of Theorem 32 we state the proof complexity lower bound on which it is based. Recall the Pigeonhole Principle formula 𝑃𝐻𝑃(x)𝑃𝐻𝑃𝑥\mathit{PHP}(x) from the proof of Theorem 2. The first strong lower bounds on the provability of 𝑃𝐻𝑃(x)𝑃𝐻𝑃𝑥\mathit{PHP}(x) were due to Ajtai [1]; here we need the later quantitative improvements from [4]. This can be called the gem of proof complexity. We use it in the following form. Recall that a function is called length-superpolynomial when it satisfies (r4).

Theorem 41 (Gem Theorem).

For every length-superpolynomial 𝖯𝖵𝖯𝖵\mathsf{PV}-function s(x)𝑠𝑥s(x), the theory 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} does not prove 𝑃𝐻𝑃(s(x))𝑃𝐻𝑃𝑠𝑥\mathit{PHP}(s(x)).

Proof.

Consider the Paris-Wilkie propositional translations Fn:=𝑃𝐻𝑃(s(n))nassignsubscript𝐹𝑛subscriptdelimited-⟨⟩𝑃𝐻𝑃𝑠𝑛𝑛F_{n}:=\langle\mathit{PHP}(s(n))\rangle_{n} for n𝑛n\in\mathbb{N}; see [22, Definition 9.1.1] in the form used in [22, Corollary 9.1.4]. Assume for contradiction that 𝑃𝐻𝑃(s(x))𝑃𝐻𝑃𝑠𝑥\mathit{PHP}(s(x)) is provable in 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2}. Then, there exist constants c,d𝑐𝑑c,d\in\mathbb{N} such that for every sufficiently large n𝑛n\in\mathbb{N}, the propositional formulas Fnsubscript𝐹𝑛F_{n} have Frege proofs of depth d𝑑d and size 2|n|csuperscript2superscript𝑛𝑐2^{|n|^{c}}: apply [22, Corollary 9.1.4] with the function f(x)=x#x𝑓𝑥𝑥#𝑥f(x)=x\#x and note that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} is conservative over the theory considered there: from a model of that theory, get a model of 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} by just adding all bounded sets that are definable by bounded formulas.

Now, let n𝑛n\in\mathbb{N} be large enough to ensure this upper bound and at the same time such that s(n)>|n|6dc𝑠𝑛superscript𝑛superscript6𝑑𝑐s(n)>|n|^{6^{d}c}, which exists because s(x)𝑠𝑥s(x) is length-superpolynomial. Setting m:=s(n)assign𝑚𝑠𝑛m:=s(n), this means that the propositional formula 𝑃𝐻𝑃mm+1:=Fnassignsubscriptsuperscript𝑃𝐻𝑃𝑚1𝑚subscript𝐹𝑛\mathit{PHP}^{m+1}_{m}:=F_{n} has Frege proofs of depth d𝑑d and size bounded by an exponential in m1/6dsuperscript𝑚1superscript6𝑑m^{1/6^{d}}. It is well-known that if m𝑚m is sufficiently large, then this is false; see [22, Theorem 12.5.3]. ∎

Finally we can prove the analogue of Theorem 32, which entails Theorem 9.

Theorem 42.

For 𝖳=𝖵20𝖳subscriptsuperscript𝖵02\mathsf{T}=\mathsf{V}^{0}_{2}, all statements Cr, Ar, A0r, Br, B0r are true.

Proof.

The analogue of Proposition 31 for the Ar,Br,Cr-statements has the same proof using Lemmas 38, 39 in place of Lemmas 30, 29. Note that the claim that Ar implies Cr follows from the remark after Equation (9). As in the proof of Theorem 32, that Cr implies Ar for 𝖳=𝖵20𝖳subscriptsuperscript𝖵02\mathsf{T}=\mathsf{V}^{0}_{2} follows from Lemma 26.a and 26.b. We also need 26.c along with r(x)|x|𝑟𝑥𝑥r(x)\geqslant|x| by (r1) and (r2) to guarantee that the explicit 𝖭𝖤𝖷𝖯𝖭𝖤𝖷𝖯\mathsf{NEXP}-machine is an explicit 𝖭𝖳𝖨𝖬𝖤(𝗉𝗈𝗅𝗒(r(x)))𝖭𝖳𝖨𝖬𝖤𝗉𝗈𝗅𝗒𝑟𝑥\mathsf{NTIME}(\mathsf{poly}(r(x)))-machine.

We are left to show that Cr holds for 𝖳=𝖵20𝖳subscriptsuperscript𝖵02\mathsf{T}=\mathsf{V}^{0}_{2}. This is proved by tightening the choice of parameters in the argument that proved Theorem 2.

Consider the formula

yr(x)¬𝑃𝐻𝑃(y)𝑦𝑟𝑥𝑃𝐻𝑃𝑦y{\leqslant}r(x)\wedge\neg\mathit{PHP}(y) (13)

and write this as ψ=ψ(z)𝜓𝜓𝑧\psi=\psi(z), where z=x,y𝑧𝑥𝑦z=\langle x,y\rangle; i.e., x=π1(z)𝑥subscript𝜋1𝑧x=\pi_{1}(z) and y=π2(z)𝑦subscript𝜋2𝑧y=\pi_{2}(z) with π1subscript𝜋1\pi_{1} and π2subscript𝜋2\pi_{2} as 𝖯𝖵𝖯𝖵\mathsf{PV}-functions. The formula ψ(z)𝜓𝑧\psi(z) is logically equivalent to a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula whose bounding term is polynomial in r(z)𝑟𝑧r(z) by (r1) and (r2). We claim that 𝖵20+{¬αψcc}subscriptsuperscript𝖵02conditional-setsubscriptsuperscript𝛼𝑐𝜓𝑐\mathsf{V}^{0}_{2}+\{\neg\alpha^{c}_{\psi}\mid c\in\mathbb{N}\} is consistent, which will give Cr.

For the sake of contradiction, assume otherwise. By compactness, there exists c𝑐c\in\mathbb{N} such that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} proves αψcsubscriptsuperscript𝛼𝑐𝜓\alpha^{c}_{\psi}. As in the proof of Theorem 2, we show that this implies that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} proves 𝑃𝐻𝑃(r(x))𝑃𝐻𝑃𝑟𝑥\mathit{PHP}(r(x)), which contradicts the Gem Theorem by (r4).

Argue in 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} and set n:=max{|z|,2}assign𝑛𝑧2n:=\max\{|z|,2\}, where z=x,r(x)𝑧𝑥𝑟𝑥z=\langle x,r(x)\rangle. Then αψcsubscriptsuperscript𝛼𝑐𝜓\alpha^{c}_{\psi} on n𝑛n gives a circuit C𝐶C such that, for all uz𝑢𝑧u{\leqslant}z and vz𝑣𝑧v{\leqslant}z with u,vz𝑢𝑣𝑧\langle u,v\rangle{\leqslant}z, we have

¬C(u,v)(vr(u)𝑃𝐻𝑃(v)).𝐶𝑢𝑣𝑣𝑟𝑢𝑃𝐻𝑃𝑣\neg C(\langle u,v\rangle)\leftrightarrow(v{\leqslant}r(u)\to\mathit{PHP}(v)).

Noting that x,vz𝑥𝑣𝑧\langle x,v\rangle{\leqslant}z for all vr(x)𝑣𝑟𝑥v{\leqslant}r(x), fix u𝑢u to x𝑥x in the circuit C(u,v)𝐶𝑢𝑣C(\langle u,v\rangle) and get a circuit D(v)𝐷𝑣D(v) such that

vr(x)(¬D(v)𝑃𝐻𝑃(v)).\forall v{\leqslant}r(x)\ (\neg D(v)\leftrightarrow\mathit{PHP}(v)).

Recall that 𝖵20subscriptsuperscript𝖵02\mathsf{V}^{0}_{2} proves that 𝑃𝐻𝑃(x)𝑃𝐻𝑃𝑥\mathit{PHP}(x) is inductive. Hence, plugging ¬D(v)𝐷𝑣\neg D(v) for 𝑃𝐻𝑃(v)𝑃𝐻𝑃𝑣\mathit{PHP}(v) gives 𝑃𝐻𝑃(r(x))𝑃𝐻𝑃𝑟𝑥\mathit{PHP}(r(x)) by quantifier-free 𝖯𝖵(α)𝖯𝖵𝛼\mathsf{PV}(\alpha)-induction. ∎

6 Magnification

For this section, a 2Π1b(α)subscript2subscriptsuperscriptΠ𝑏1𝛼\exists_{2}\Pi^{b}_{1}(\alpha)-formula is a Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-formula as in (5) in which its maximal Σ01,bsubscriptsuperscriptΣ1𝑏0\Sigma^{1,b}_{0}-subformula φ(X¯,Y,x¯)𝜑¯𝑋𝑌¯𝑥\varphi(\bar{X},Y,\bar{x}) is a Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula.

Lemma 43.

For every c𝑐c\in\mathbb{N} and every 2Π1b(α)subscript2subscriptsuperscriptΠ𝑏1𝛼\exists_{2}\Pi^{b}_{1}(\alpha)-formula ψ(x¯,y)𝜓¯𝑥𝑦\psi(\bar{x},y) without free set variables, the theory 𝖲21(α)+βM0csubscriptsuperscript𝖲12𝛼subscriptsuperscript𝛽𝑐subscript𝑀0\mathsf{S}^{1}_{2}(\alpha)+\beta^{c}_{M_{0}} proves

Cyz(C(y)=1ψ(x¯,y)).\exists C\ \forall y{\leqslant}z\ \big{(}C(y){=}1\leftrightarrow\psi(\bar{x},y)\big{)}. (14)
Proof.

Argue in 𝖲21(α)+βM0csubscriptsuperscript𝖲12𝛼subscriptsuperscript𝛽𝑐subscript𝑀0\mathsf{S}^{1}_{2}(\alpha)+\beta^{c}_{M_{0}}. For simplicity assume x¯¯𝑥\bar{x} is empty. For ψ=ψ(y)𝜓𝜓𝑦\psi=\psi(y) choose M:=Nψassign𝑀subscript𝑁𝜓M:=N_{\psi} according to Lemma 26. Note that since ψ𝜓\psi does not have free set variables, M𝑀M is without oracles. By Lemma 26.5, the formula ψ(y)𝜓𝑦\psi(y) is equivalent to

2YY is an accepting computation of M on y.subscript2𝑌Y is an accepting computation of M on y\exists_{2}Y\textit{``$Y$ is an accepting computation of $M$ on $y$''}.

By Lemmas 30 and 29 we have αMdsubscriptsuperscript𝛼𝑑𝑀\alpha^{d}_{M} for some d𝑑d\in\mathbb{N}. Let z𝑧z be given and choose n𝐿𝑜𝑔>1𝑛subscript𝐿𝑜𝑔absent1n\in\mathit{Log}_{>1} with |z|n𝑧𝑛|z|\leqslant n. Let C𝐶C witness αMdsubscriptsuperscript𝛼𝑑𝑀\alpha^{d}_{M} for n𝑛n. This C𝐶C witnesses (14). ∎

It follows that over 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) the circuit upper bound statement βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} implies comprehension for 2Π1b(α)subscript2subscriptsuperscriptΠ𝑏1𝛼\exists_{2}\Pi^{b}_{1}(\alpha)-formulas without free set variables. For later reference, we note that allowing free set variables entails full Σ^11,bsubscriptsuperscript^Σ1𝑏1\hat{\Sigma}^{1,b}_{1}-comprehension:

Lemma 44.

𝖲21(α)+2Π1b(α)subscriptsuperscript𝖲12𝛼subscript2subscriptsuperscriptΠ𝑏1𝛼\mathsf{S}^{1}_{2}(\alpha)+\exists_{2}\Pi^{b}_{1}(\alpha)-comprehension proves 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2}.

Proof.

Let 𝖳𝖳\mathsf{T} denote 𝖲21(α)+2Π1b(α)subscriptsuperscript𝖲12𝛼subscript2subscriptsuperscriptΠ𝑏1𝛼\mathsf{S}^{1}_{2}(\alpha)+\exists_{2}\Pi^{b}_{1}(\alpha)-comprehension. Since 𝖲21(α)+Σ11,bsubscriptsuperscript𝖲12𝛼subscriptsuperscriptΣ1𝑏1\mathsf{S}^{1}_{2}(\alpha)+\Sigma^{1,b}_{1}-comprehension proves 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2}, it suffices to show that the set of formulas that are 𝖳𝖳\mathsf{T}-provably equivalent to an 2Π1b(α)subscript2subscriptsuperscriptΠ𝑏1𝛼\exists_{2}\Pi^{b}_{1}(\alpha)-formula is closed under \vee, \wedge, 2Ysubscript2𝑌\exists_{2}Y, yt(x¯)𝑦𝑡¯𝑥\exists y{\leqslant}t(\bar{x}) and yt(x¯)for-all𝑦𝑡¯𝑥\forall y{\leqslant}t(\bar{x}). We verify the latter: the formula

yu2Yφ(X¯,Y,x¯,u,y)for-all𝑦𝑢subscript2𝑌𝜑¯𝑋𝑌¯𝑥𝑢𝑦\forall y{\leqslant}u\ \exists_{2}Y\ \varphi(\bar{X},Y,\bar{x},u,y)

with φ(X¯,Y,x¯,u,y)𝜑¯𝑋𝑌¯𝑥𝑢𝑦\varphi(\bar{X},Y,\bar{x},u,y)Π1b(α)subscriptsuperscriptΠ𝑏1𝛼\Pi^{b}_{1}(\alpha)-formula is 𝖳𝖳\mathsf{T}-provably equivalent to

2Zyuφ(X¯,Z(y,),x¯,u,y),subscript2𝑍for-all𝑦𝑢𝜑¯𝑋𝑍𝑦¯𝑥𝑢𝑦\exists_{2}Z\ \forall y{\leqslant}u\ \varphi(\bar{X},Z(y,\cdot),\bar{x},u,y),

where Z(y,v)𝑍𝑦𝑣Z(y,v) abbreviates the atomic formula y,vZ𝑦𝑣𝑍\langle y,v\rangle\in Z. Indeed, assuming the former formula, the latter is proved by induction on u𝑢u. As the latter is an 2Π1b(α)subscript2subscriptsuperscriptΠ𝑏1𝛼\exists_{2}\Pi^{b}_{1}(\alpha)-formula, induction for it follows from comprehension. ∎

The following lemma makes precise the idea sketched in Section 1.3.

Lemma 45.

For every c𝑐c\in\mathbb{N} and every model (M,𝒳)𝑀𝒳(M,\mathcal{X}) of S21(α)+βM0csubscriptsuperscript𝑆12𝛼subscriptsuperscript𝛽𝑐subscript𝑀0S^{1}_{2}(\alpha)+\beta^{c}_{M_{0}}, there exists 𝒴𝒳𝒴𝒳\mathcal{Y}\subseteq\mathcal{X} such that (M,𝒴)𝑀𝒴(M,\mathcal{Y}) is a model of 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2}.

Proof.

By Δ1b(α)superscriptsubscriptΔ1𝑏𝛼\Delta_{1}^{b}(\alpha)-comprehension, for every CM𝐶𝑀C\in M that is a circuit in the sense of M𝑀M there is a set A𝒳𝐴𝒳A\in\mathcal{X} such that

(M,𝒳)y(C(y)=1yA).(M,\mathcal{X})\models\forall y\ (C(y){=}1\leftrightarrow y{\in}A).

By extensionality such a set A𝐴A is uniquely determined by C𝐶C and we write C^^𝐶\hat{C} for it. For these two claims we used the fact that C(y)=1y<2|C|𝐶𝑦1𝑦superscript2𝐶C(y){=}1\to y{<}2^{|C|} holds in every model of 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2}.

Let

𝒴:={C^𝒳CM is a circuit in the sense of M}.assign𝒴conditional-set^𝐶𝒳𝐶𝑀 is a circuit in the sense of 𝑀\mathcal{Y}:=\big{\{}\hat{C}\in\mathcal{X}\mid C\in M\textit{ is a circuit in the sense of }M\big{\}}.

Since 𝒴𝒳𝒴𝒳\mathcal{Y}\subseteq\mathcal{X}, the model (M,𝒴)𝑀𝒴(M,\mathcal{Y}) satisfies all Π11,bsubscriptsuperscriptΠ1𝑏1\Pi^{1,b}_{1}-sentences which are true in (M,𝒳)𝑀𝒳(M,\mathcal{X}), so in particular extensionality, set boundedness, Σ1b(α)subscriptsuperscriptΣ𝑏1𝛼\Sigma^{b}_{1}(\alpha)-induction, and βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}}.

The point of the model (M,𝒴)𝑀𝒴(M,\mathcal{Y}) is that it eliminates set parameters. More precisely, let φ(x¯)𝜑¯𝑥\varphi(\bar{x}) be a Σ1,bsubscriptsuperscriptΣ1𝑏\Sigma^{1,b}_{\infty}-formula with parameters from (M,𝒴)𝑀𝒴(M,\mathcal{Y}), and define φ(x¯)superscript𝜑¯𝑥\varphi^{*}(\bar{x}) as follows: replace every subformula of the form tC^𝑡^𝐶t{\in}\hat{C} where t𝑡t is a term (possibly with number parameters from M𝑀M) and C^^𝐶\hat{C} is a set parameter from 𝒴𝒴\mathcal{Y} by C(t)=1𝐶𝑡1C(t){=}1 (i.e., by 𝑒𝑣𝑎𝑙(C,t)=1𝑒𝑣𝑎𝑙𝐶𝑡1\mathit{eval}(C,t){=}1). Note every set parameter in φ(x¯)𝜑¯𝑥\varphi(\bar{x}) becomes a number parameter in φ(x¯)superscript𝜑¯𝑥\varphi^{*}(\bar{x}), and

(M,𝒴)x¯(φ(x¯)φ(x¯)).(M,\mathcal{Y})\models\forall\bar{x}\ (\varphi(\bar{x})\leftrightarrow\varphi^{*}(\bar{x})). (15)

Claim: (M,𝒴)𝖲21(α)models𝑀𝒴subscriptsuperscript𝖲12𝛼(M,\mathcal{Y})\models\mathsf{S}^{1}_{2}(\alpha).

Proof of the Claim. It suffices to show that (M,𝒴)𝑀𝒴(M,\mathcal{Y}) models Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-comprehension. So let φ(x)𝜑𝑥\varphi(x) be a Δ1b(α)subscriptsuperscriptΔ𝑏1𝛼\Delta^{b}_{1}(\alpha)-formula with parameters from (M,𝒴)𝑀𝒴(M,\mathcal{Y}) and aM𝑎𝑀a\in M. Then φ(x)superscript𝜑𝑥\varphi^{*}(x) is a number-sort formula, namely a Δ1bsubscriptsuperscriptΔ𝑏1\Delta^{b}_{1}-formula with (number) parameters from M𝑀M. Since M𝖲21models𝑀subscriptsuperscript𝖲12M\models\mathsf{S}^{1}_{2}, Buss’ witnessing theorem implies that φ(x)superscript𝜑𝑥\varphi^{*}(x) is equivalent in M𝑀M to a quantifier-free 𝖯𝖵𝖯𝖵\mathsf{PV}-formula with the same parameters. Lemma 14 applied to n:=max{|a|,2}assign𝑛𝑎2n:=\max\{|a|,2\} gives a circuit C𝐶C in the sense of M𝑀M such that

Mx<2n(C(x)=1φ(x)).M\models\forall x{<}2^{n}(C(x)=1\leftrightarrow\varphi^{*}(x)).

Then C^𝒴^𝐶𝒴\hat{C}\in\mathcal{Y} and (M,𝒴)𝑀𝒴(M,\mathcal{Y}) satisfies ya(yC^φ(y))\forall y{\leqslant}a(y\in\hat{C}\leftrightarrow\varphi(y)) by (15). does-not-prove\dashv

By the Claim and Lemma 44, it suffices to show that (M,𝒴)𝑀𝒴(M,\mathcal{Y}) has 2Π1b(α)subscript2subscriptsuperscriptΠ𝑏1𝛼\exists_{2}\Pi^{b}_{1}(\alpha)-comprehension. Let ψ(x)𝜓𝑥\psi(x) be a 2Π1b(α)subscript2subscriptsuperscriptΠ𝑏1𝛼\exists_{2}\Pi^{b}_{1}(\alpha)-formula with parameters from (M,𝒴)𝑀𝒴(M,\mathcal{Y}), and let aM𝑎𝑀a\in M. Then ψ(x)superscript𝜓𝑥\psi^{*}(x) is a 2Π1b(α)subscript2subscriptsuperscriptΠ𝑏1𝛼\exists_{2}\Pi^{b}_{1}(\alpha)-formula without set parameters. We already noted that (M,𝒴)βM0cmodels𝑀𝒴subscriptsuperscript𝛽𝑐subscript𝑀0(M,\mathcal{Y})\models\beta^{c}_{M_{0}}. Hence, by the Claim, Lemma 43 applies and gives CM𝐶𝑀C\in M such that

(M,𝒴)xa(C(x)=1ψ(x)).(M,\mathcal{Y})\models\forall x{\leqslant}a\,(C(x){=}1\leftrightarrow\psi^{*}(x)).

Then C^𝒴^𝐶𝒴\hat{C}\in\mathcal{Y} and (M,𝒴)𝑀𝒴(M,\mathcal{Y}) satisfies xa(xC^ψ(x))\forall x{\leqslant}a\,(x{\in}\hat{C}\leftrightarrow\psi(x)) by (15). ∎

As announced in Section 1.3 this lemma implies Theorems 10 and 11.

Proof of Theorem 10.

Assume that 𝖳𝖳\mathsf{T} is inconsistent with 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}. By compactness, 𝖳𝖳\mathsf{T} proves βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} for some c𝑐c\in\mathbb{N}. Let ψ𝜓\psi be a number sort consequence of 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2} and (M,𝒳)𝑀𝒳(M,\mathcal{X}) a model of 𝖳𝖳\mathsf{T}. We have to show that Mψmodels𝑀𝜓M\models\psi. But by Lemma 45 there exists 𝒴𝒳𝒴𝒳\mathcal{Y}\subseteq\mathcal{X} such that (M,𝒴)𝖵21models𝑀𝒴subscriptsuperscript𝖵12(M,\mathcal{Y})\models\mathsf{V}^{1}_{2}, so (M,𝒴)ψmodels𝑀𝒴𝜓(M,\mathcal{Y})\models\psi, and Mψmodels𝑀𝜓M\models\psi. ∎

Proof of Theorem 11.

Assume 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) does not prove 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}, say, it does not prove ¬βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\neg\beta^{c}_{M_{0}}. Then there is a model (M,𝒳)𝑀𝒳(M,\mathcal{X}) of 𝖲21(α)+βM0csubscriptsuperscript𝖲12𝛼subscriptsuperscript𝛽𝑐subscript𝑀0\mathsf{S}^{1}_{2}(\alpha)+\beta^{c}_{M_{0}}. By Lemma 45 there exists 𝒴𝒳𝒴𝒳\mathcal{Y}\subseteq\mathcal{X} such that (M,𝒴)𝖵21models𝑀𝒴subscriptsuperscript𝖵12(M,\mathcal{Y})\models\mathsf{V}^{1}_{2}. Since βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}} is a Π11,bsubscriptsuperscriptΠ1𝑏1\Pi^{1,b}_{1}-formula, we have (M,𝒴)βM0cmodels𝑀𝒴subscriptsuperscript𝛽𝑐subscript𝑀0(M,\mathcal{Y})\models\beta^{c}_{M_{0}}. Thus, 𝖵21subscriptsuperscript𝖵12\mathsf{V}^{1}_{2} does not prove 𝖭𝖤𝖷𝖯𝖯/𝗉𝗈𝗅𝗒not-subset-of-or-equals𝖭𝖤𝖷𝖯𝖯𝗉𝗈𝗅𝗒\mathsf{NEXP}\not\subseteq\mathsf{P/poly}. ∎

Remark 46.

The introduction mentioned that Theorem 11 might raise hopes to complete Razborov’s program by construcing a model of 𝖲21(α)subscriptsuperscript𝖲12𝛼\mathsf{S}^{1}_{2}(\alpha) satisfying some βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}}. There are good general methods to construct models even of certain extensions of 𝖳21(α)subscriptsuperscript𝖳12𝛼\mathsf{T}^{1}_{2}(\alpha) based on forcing (see [35] and [25] for an extension). However, these methods are tailored for Σ^11,b(α)superscriptsubscript^Σ11𝑏𝛼\hat{\Sigma}_{1}^{1,b}(\alpha)-statements, not Π11,bsuperscriptsubscriptΠ11𝑏\Pi_{1}^{1,b} like βM0csubscriptsuperscript𝛽𝑐subscript𝑀0\beta^{c}_{M_{0}}. By the method of feasible interpolation and assuming the existence of suitable pseudorandom generators, Razborov [33] proved that for every ΣbsubscriptsuperscriptΣ𝑏\Sigma^{b}_{\infty}-definable t(n)=nω(1)𝑡𝑛superscript𝑛𝜔1t(n)=n^{\omega(1)} and every ΣbsubscriptsuperscriptΣ𝑏\Sigma^{b}_{\infty}-formula φ(x)𝜑𝑥\varphi(x) there exists a model (M,𝒳)𝑀𝒳(M,\mathcal{X}) of 𝖲22(α)subscriptsuperscript𝖲22𝛼\mathsf{S}^{2}_{2}(\alpha) that for some nM𝑛𝑀n\in M contains a set C𝒳𝐶𝒳C\in\mathcal{X} coding a size-t(n)𝑡𝑛t(n) circuit that computes φ(x)𝜑𝑥\varphi(x); i.e., for every a<2n𝑎superscript2𝑛a<2^{n} there is Xa𝒳subscript𝑋𝑎𝒳X_{a}\in\mathcal{X} coding a computation of C𝐶C on a𝑎a of the truth value of φ(a)𝜑𝑎\varphi(a). Getting a circuit (and computations) coded by a number seems to require new ideas.

The best currently known unprovability result is due to Pich [29, Corollary 6.2] and is conditional: a theory formalizing 𝖭𝖢1superscript𝖭𝖢1\mathsf{NC}^{1}-reasoning does not prove almost everywhere superpolynomial lower bounds for SAT unless subexponential-size formulas can approximate polynomial-size circuits. Reaching 𝖲21subscriptsuperscript𝖲12\mathsf{S}^{1}_{2} seems to require new ideas.

References

  • [1] M. Ajtai, The complexity of the pigeonhole principle, in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, 1988, pp. 346–355.
  • [2] A. Atserias, S. Buss, and M. Müller, On the consistency of circuit lower bounds for non-deterministic time, in Proc. 55th ACM Symposium on the Theory of Computing (STOC), 2023, pp. 1257–1270.
  • [3] A. Atserias and M. Müller, Partially definable forcing and bounded arithmetic, Archive for Mathematical Logic, 54 (2015), pp. 1–33.
  • [4] P. Beame, R. Impagliazzo, J. Krajíček, T. Pitassi, P. Pudlák, and A. Woods, Exponential lower bounds for the pigeonhole principle, in Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992, pp. 200–220.
  • [5] A. Beckmann and S. R. Buss, Improved witnessing and local improvement principles for second-order bounded arithmetic, ACM Transactions on Computational Logic, 15 (2014). Article 2, 35 pages.
  • [6] S. R. Buss, Bounded Arithmetic, Bibliopolis, Naples, Italy, 1986. Revision of 1985 Princeton University Ph.D. thesis.
  • [7] S. R. Buss, L. A. Kołodziejczyk, and K. Zdanowski, Collapsing modular counting in bounded arithmetic and constant depth propositional proofs, Transactions of the AMS, 367 (2015), pp. 7517–7563.
  • [8] J. Bydžovský, J. Krajíček, and I. C. Oliveira, Consistency of circuit lower bounds with bounded theories, Logical Methods in Computer Science, 16 (2020), pp. 12:1–12:16.
  • [9] J. Bydžovský and M. Müller, Polynomial time ultrapowers and the consistency of circuit lower bounds, Archive for Mathematical Logic, 59 (2020), pp. 127–147.
  • [10] M. Carmosino, V. Kabanets, A. Kolokolova, and I. C. Oliveira, LEARN-uniform circuit lower bounds and provability in bounded arithmetic, in Proc. 62nd IEEE Symposium on Foundations of Computer Science (FOCS), 2021, pp. 770–780.
  • [11] L. Chen, S. Hirahara, I. C. Oliveira, J. Pich, N. Rajgopal, and R. Santhanam, Beyond natural proofs: Hardness magnification and locality, Journal of the ACM, 69 (2022), pp. 25:1–25:49.
  • [12] S. A. Cook and J. Krajív cek, Consequences of the provability of NPP/polyNPPpoly\mathrm{NP\subseteq\mathrm{P}{/}poly}, Journal of Symbolic Logic, 72 (2010), pp. 1353–1371.
  • [13] M. Furst, J. B. Saxe, and M. Sipser, Parity, circuits and the polynomial-time hierarchy, Math. Systems Theory, 17 (1984), pp. 13–27.
  • [14] R. Impagliazzo, V. Kabanets, and A. Wigderson, In search of an easy witness: Exponential time vs. probabilistic polynomial time, Journal of Computer and Systems Sciences, 65 (2002), pp. 672–694.
  • [15] E. Jeřábek, Dual weak pigeonhole principle, Boolean complexity, and derandomization, Annals of Pure and Applied Logic, 124 (2004), pp. 1–37.
  • [16]  , Weak Pigeonhole Principle, and Randomized Computation, PhD thesis, Charles University, Prague, 2005.
  • [17]  , Approximate counting in bounded arithmetic, Journal of Symbolic Logic, 72 (2007), pp. 959–993.
  • [18] R. Kannan, Circuit-size lower bounds and non-reducibility to sparse sets, Information and Control, 55 (1982), pp. 40–56.
  • [19] R. M. Karp and R. J. Lipton, Turing machines that take advice, L’Enseignement Mathematique, 28 (1982), pp. 191–209. Earlier version appeared in STOC’80.
  • [20] J. Krajíček, Exponentiation and second-order bounded arithmetic, Annals of Pure and Applied Logic, 48 (1990), pp. 261–276.
  • [21]  , No counter-example interpretation and interactive computation, in Logic From Computer Science: Proceedings of a Workshop held November 13-17, 1989, Mathematical Sciences Research Institute Publication #21, Springer-Verlag, 1992, pp. 287–293.
  • [22]  , Bounded Arithmetic, Propositional Calculus and Complexity Theory, Cambridge University Press, Heidelberg, 1995.
  • [23]  , Forcing with Random Variables and Proof Complexity, Cambridge University Press, 2011.
  • [24] J. Krajíček and I. C. Oliveira, Unprovability of circuit lower bounds in Cook’s theory PV, Logical Methods in Computer Science, 13 (2017).
  • [25] M. Müller, Typical forcings, NP search problems and an extension of a theorem of Riis, Annals of Pure and Applied Logic, 172 (2021), p. 102930.
  • [26] M. Müller and J. Pich, Feasibly constructive proofs of succinct weak circuit lower bounds, Annals of Pure and Applied Logic, 172 (2020), p. 102735.
  • [27] C. D. Murray and R. R. Williams, Circuit lower bounds for nondeterministic quasi-polytime from a new easy witness lemma, SIAM Journal on Computing, 49 (2020), pp. STOC18–300–STOC18–322.
  • [28] I. C. Oliveira and R. Santhanam, Hardness magnification for natural problems, in Proc. 59th IEEE Symposium on Foundations of Computer Science (FOCS), 2018, pp. 65–76.
  • [29] J. Pich, Circuit lower bounds in bounded arithmetic, Annals of Pure and Applied Logic, 166 (2015), pp. 29–45.
  • [30]  , Logical strength of complexity theory and a formalization of the PCP theorem in bounded arithmetic, Logical Methods in Computer Science, 11 (2015), pp. 1–38.
  • [31] J. Pich and R. Santhanam, Strong co-nondeterministic lower bounds for NP cannot be proved feasibly, in Proc. 53rd ACM Symposium on Theory of Computing (STOC), 2021, pp. 223–233.
  • [32] A. A. Razborov, Bounded arithmetic and lower bounds in Boolean complexity, in Feasible Mathematics II, P. Clote and J. Remmel, eds., Boston, 1995, Birkhäuser, pp. 344–386.
  • [33]  , Unprovability of lower bounds on the circuit size in certain fragments of bounded arithmetic, Izvestiya of the RAN, 59 (1995), pp. 201–224.
  • [34]  , Pseudorandom generators hard for k𝑘k-DNF resolution and polynomial calculus resolution, Annals of Mathematics, 181 (2015), pp. 415–472. Preprint online in 2003.
  • [35] S. Riis, Finitization in bounded arithmetic, Tech. Rep. RS-94-23, Basic Research in Computer Science, 1994. 34 pages.
  • [36] R. Santhanam and R. Williams, On uniformity and circuit lower bounds, Computational Complexity, 23 (2014), pp. 177–205.
  • [37] G. Takeuti, Bounded arithmetic and truth definition, Annals of Pure and Applied Logic, (1988), pp. 75–104.
  • [38] R. Williams, Improving exhaustive search implies superpolynomial lower bounds, SIAM Journal on Computing, 42 (2013), pp. 1218–1244.
  • [39]  , Natural proofs versus derandomization, SIAM Journal on Computing, 45 (2016), pp. 497–529.