This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Lawvere-Tierney topologies for computability theorists

Takayuki Kihara
Abstract.

In this article, we introduce certain kinds of computable reduction games with imperfect information. One can view such a game as an extension of the notion of Turing reduction, and generalized Weihrauch reduction as well. Based on the work by Lee and van Oosten, we utilize these games for providing a concrete description of the lattice of the Lawvere-Tierney topologies on the effective topos (equivalently, the subtoposes of the effective topos preordered by geometric inclusion). As an application, for instance, we show that there exists no minimal Lawvere-Tierney topology which is strictly above the identity topology on the effective topos.

1. Introduction

1.1. Summary

Our goal in this article is to accomplish a detailed analysis of the entire structure of “intermediate worlds” between “the world of computable mathematics” and “the world of set-theoretic mathematics.” In [20], Hyland discovered the effective topos 𝐄𝐟𝐟{\bf Eff}, and proposed it as the world of computable mathematics. In topos theory, there is a notion called a Lawvere-Tierney topology (also known as a local operator or a geometric modality), and any topology jj on a topos \mathcal{E} yields a new subtopos j\mathcal{E}_{j}\hookrightarrow\mathcal{E}. The least topology is the identity topology 𝙸𝚍{\tt Id} that does not cause any change to the base topos. The largest topology is the indiscrete topology that contracts all truth-values to a single value, and the resulting degenerated topos may be thought of as the world of inconsistent mathematics. The next largest topology is the double negation ¬¬\neg\neg. In the effective topos, the new topos 𝐄𝐟𝐟¬¬{\bf Eff}_{\neg\neg} created from ¬¬\neg\neg is exactly the world of set-theoretic mathematics; that is, 𝐄𝐟𝐟¬¬𝐒𝐞𝐭{\bf Eff}_{\neg\neg}\simeq{\bf Set}. What this suggests is that analyzing the intermediate topologies between 𝙸𝚍{\tt Id} and ¬¬\neg\neg on the effective topos may correspond to exploring the intermediate worlds between computable mathematics and set-theoretic mathematics.

Under this perspective, a topology on the effective topos is a kind of data that indicate how much non-computability to add to the world. In other words, a topology plays the same role as an oracle. Indeed, Hyland [20] noticed that each Turing degree 𝐝\mathbf{d} has a corresponding topology j𝐝j_{\mathbf{d}} on the effective topos, which yields the world of 𝐝\mathbf{d}-relatively computable mathematics. However, this does not mean that we have exhausted all the topologies, and of course, there may be other topologies besides them. For instance, instead of a subset of \mathbb{N} or a total function on \mathbb{N}, one can use a partial function as an oracle. Not only that, but even a partial multi-valued function can be used as an oracle, and has a corresponding topology on the effective topos as we observe in this article. As another example, Pitts [33] found an intermediate topology that is not bounded by any Turing degree topology. This topology has properties that are far from any of the other topologies mentioned above. Remarkably, Lee-van Oosten [24] gave a concrete presentation of all topologies on the effective topos.

The first step of our work in this article is to capture the presentation of Lee-van Oosten [24] within the framework of generalized Weihrauch reducibility [19]. However, generalized Weihrauch reducibility (which involves a perfect information game) itself is insufficient to deal with all topologies, so we introduce an imperfect information game that incorporates some sort of nonuniform computation with advices. Coincidentally, it turns out that our notion is heavily related to another notion called extended Weihrauch reducibility, which is introduced in Bauer [2]. By viewing topologies in this way, it is possible, for example, to position the study of the structure of Lawvere-Tierney topologies as an extension of the Weihrauch-style analogue [6] of reverse mathematics (note, however, that this is by no means an extension of the standard reverse mathematics [38, 11] at all; reverse mathematics has more to do with the internal logic, and more finitary aspects). By bringing the arguments on topologies into pure computability theory in this way, we solve some problems proposed in [23, 24].

While the notion of Lawvere-Tierney topology is originally studied in an abstract context, we develop our theory in the most intuitive and elementary way possible. We believe that it is important for the development of a theory to present it in a way that reduces prior knowledge of the theory as much as possible. For this purpose, we maintain appropriate notations and keep the discussion moving forward with concrete ideas. In Section 2, we introduce certain kinds of computable reduction games with imperfect information. By using these games, we also define a notion of computability-theoretic reduction for certain extended functions. In Section 3, we see that this reducibility notion characterizes the notion of Lawvere-Tierney topology on the effective topos, based on the idea in Lee-van Oosten [24]. In Section 4, by using the characterization, we solve some problems on topologies proposed in [23, 24]. For instance, we see that there is no world of non-computable mathematics which is closest to computable mathematics. In Section 5, we discuss a few other topologies, which has not been studied in the past. One corresponds to the world of computable mathematics with error probability ε\varepsilon, and the other to computable mathematics with error density ε\varepsilon.

1.2. Notations

In this article, we assume that the reader is familiar with elementary facts about computability theory. For the basics of computability theory, we refer the reader to [10, 30, 35, 39]. We use the following notations on strings: Let <\mathbb{N}^{<\mathbb{N}} be the set of all finite strings. For finite strings σ,τ<\sigma,\tau\in\mathbb{N}^{<\mathbb{N}}, we write στ\sigma\preceq\tau if σ\sigma is an initial segment of τ\tau, and write στ\sigma\prec\tau if σ\sigma is a proper initial segment of τ\tau. We also use the same notation even if τ\tau is an infinite string, i.e., τ\tau\in\mathbb{N}^{\mathbb{N}}. For σ<\sigma\in\mathbb{N}^{<\mathbb{N}}\cup\mathbb{N}^{\mathbb{N}} and \ell\in\mathbb{N}, define σ\sigma\upharpoonright\ell as the initial segment of σ\sigma of length \ell. For finite strings σ,τ<\sigma,\tau\in\mathbb{N}^{<\mathbb{N}}, let στ\sigma{}^{\smallfrown}\tau be the concatenation of σ\sigma and τ\tau. If τ\tau is a string of length 11, i.e., τ\tau is of the form n\langle n\rangle for some nn\in\mathbb{N}, then σn\sigma{}^{\smallfrown}\langle n\rangle is abbreviated to σn\sigma{}^{\smallfrown}n. Similarly, nτ\langle n\rangle{}^{\smallfrown}\tau is abbreviated as nτn{}^{\smallfrown}\tau.

A tree is a set T<T\subseteq\mathbb{N}^{<\mathbb{N}} which is downward closed under \preceq. An element of a tree TT is often called a node. The \preceq-least node (i.e., the empty string) of TT is called the root, and a \preceq-maximal node of TT is called a leaf. We always assume that \mathbb{N}^{\mathbb{N}} is equipped with the standard Baire topology, that is, the countable product of the discrete topology on \mathbb{N}. For σ<\sigma\in\mathbb{N}^{<\mathbb{N}}, let [σ][\sigma] be the clopen set generated by σ\sigma, i.e., [σ]={x:σx}[\sigma]=\{x\in\mathbb{N}^{\mathbb{N}}:\sigma\prec x\}. For ee\in\mathbb{N}, let φe\varphi_{e} be the eeth partial computable function on \mathbb{N}, and φeα\varphi_{e}^{\alpha} be the eeth partial computable function relative to an oracle α\alpha. For a partial function φ\varphi, we write φ(n)\varphi(n)\downarrow if φ(n)\varphi(n) is defined, and φ(n)\varphi(n)\uparrow if φ(n)\varphi(n) is undefined.

As usual, for nn\in\mathbb{N}, we often use nn to denote {0,1,,n1}\{0,1,\dots,n-1\}. We denote a partial function from XX to YY as f:XYf\colon\!\!\!\subseteq X\to Y. We use the symbol 𝒫(Y)\mathcal{P}(Y) to denote the power set of a set YY. In this article, a partial function f:X𝒫(Y)f\colon\!\!\!\subseteq X\to\mathcal{P}(Y) is often called a partial multi-valued function (abbreviated as a multifunction), and written as f:XYf\colon\!\!\!\subseteq X\rightrightarrows Y. In computable mathematics, we often view a \forall\exists-formula SS as a partial multifunction. Informally speaking, a (possibly false) statement SxX[Q(x)yP(x,y)]S\equiv\forall x\in X\;[Q(x)\rightarrow\exists yP(x,y)] is transformed into a partial multifunction fS:XYf_{S}\colon\!\!\!\subseteq X\rightrightarrows Y such that dom(fS)={xX:Q(x)}{{\rm dom}}(f_{S})=\{x\in X:Q(x)\} and fS(x)={yY:P(x,y)}f_{S}(x)=\{y\in Y:P(x,y)\}. Here, we consider formulas as partial multifunctions rather than relations in order to distinguish a hardest instance fS(x)=f_{S}(x)=\emptyset (corresponding to a false sentence) and an easiest instance xXdom(fS)x\in X\setminus{{\rm dom}}(f_{S}) (corresponding to a vacuous truth). In this sense, a relation does not correspond to a partial multifunction, but to a total multifunction which may take empty value.

2. Generalized Turing reducibility

2.1. Perfect information game

The notion of relative computation (or Turing reducibility) has been first introduced by Turing in 1939. From that time to the present, its structure has been investigated to an extremely deep level. As a result, a vast amount of research results are known (see e.g. [12, 18, 39] for the tip of the iceberg). Traditionally, Turing reducibility is usually considered for sets AA\subseteq\mathbb{N} or total functions f:f\colon\mathbb{N}\to\mathbb{N}. However, a slight extension of this, the notion of Turing reducibility for partial functions f:f\colon\!\!\!\subseteq\mathbb{N}\to\mathbb{N}, has also been considered, and the induced structure is known to be isomorphic to the enumeration degrees; see [10, Section 11.3]. The concept of relative computability can be extended to even larger classes of functions. As one such class, we first deal with partial multi-valued functions (abbreviated as multifunctions) on \mathbb{N}. In recent years, the notion of partial multifunction has received a great deal of attention in computability theory and related fields; see e.g. [6].

Relative Computation Model: Let us introduce the notion of computation relative to a partial multifunction on \mathbb{N}. Our computation model is the same as that of an ordinary programming language, except that a program 𝙿{\tt P} can contain a special instruction of the form 𝚋:=[?](𝚊){\tt b:=\verb|[?]|(a)}. The computation model accepts a number nn and a partial multifunction ff as inputs. The instruction 𝚋:=[?](𝚊){\tt b:=\verb|[?]|(a)} assigns one of the values of f(𝚊)f({\tt a}) to the variable 𝚋{\tt b}. So far, it is exactly the same as an oracle Turing machine. However, if f(𝚊)f({\tt a}) is undefined, the computation will never terminate. Moreover, if ff is multi-valued, i.e., if there are more than one possible values for the output of f(𝚊)f({\tt a}), this generally produces a nondeterministic computation.

We write 𝙿f{\tt P}^{f} for the partial multifunction defined by the above relative computation. To be precise, for an input nn, if the program 𝙿{\tt P} terminates along any path of nondeterministic computation, we declare that nn is contained in the domain of 𝙿f{\tt P}^{f}, i.e., 𝙿f(n){\tt P}^{f}(n)\downarrow. Furthermore, if the program 𝙿{\tt P} along some path of nondeterministic computation returns mm, then we declare m𝙿f(n)m\in{\tt P}^{f}(n).

Definition 2.1.

We say that gg is Turing reducible to ff (written gTfg\leq_{T}f) if there exists a program 𝙿{\tt P} such that 𝙿f{\tt P}^{f} refines gg. Here, for partial multifunctions gg and hh, we say that hh refines gg if, for any nn, ndom(g)n\in{\rm dom}(g) implies ndom(h)n\in{\rm dom}(h) and h(n)g(n)h(n)\subseteq g(n).

This notion coincides with ordinary Turing reducibility when restricted to total single-valued functions. One may think that this programming definition is too vague, so we give a mathematically rigorous description of this. Formally, the process of Turing reduction for partial multifunctions can also be described as a perfect information two-player game. However, since the players’ abilities are asymmetric, we will describe it as a game between Merlin and Arthur.

Definition 2.2 (Perfect information game).

For partial multifunctions f,g:f,g\colon\!\!\!\subseteq\mathbb{N}\rightrightarrows\mathbb{N}, let us consider the following perfect information two-player game 𝔊(f,g)\mathfrak{G}(f,g):

𝙼𝚎𝚛𝚕𝚒𝚗:x0x1x2𝙰𝚛𝚝𝚑𝚞𝚛:y0y1y2\begin{array}[]{rccccccc}{\tt Merlin}\colon&x_{0}&&x_{1}&&x_{2}&&\dots\\ {\tt Arthur}\colon&&y_{0}&&y_{1}&&y_{2}&\dots\end{array}

Game rules: Each player chooses a natural number at each round. Here, Merlin and Arthur need to obey the following rules.

  • First, Merlin chooses x0dom(f)x_{0}\in{{\rm dom}}(f).

  • At the nnth round, Arthur reacts with yn=j,uny_{n}=\langle j,u_{n}\rangle.

    • The choice j=0j=0 indicates that Arthur makes a new query unu_{n} to gg. In this case, we require undom(g)u_{n}\in{{\rm dom}}(g).

    • The choice j=1j=1 indicates that Arthur declares termination of the game with unu_{n}.

  • At the (n+1)(n+1)th round, Merlin responds to the query made by Arthur at the previous stage. This means that xn+1g(un)x_{n+1}\in g(u_{n}).

Then, Arthur wins the game 𝔊(f,g)\mathfrak{G}(f,g) if either Merlin violates the rule before Arthur violates the rule or Arthur obeys the rule and declares termination with unf(x0)u_{n}\in f(x_{0}).

Strategies: Hereafter, we require that Arthur’s moves are chosen in a computable manner. In other words, Arthur’s strategy is a code τ\tau of a partial computable function hτ:<h_{\tau}\colon\!\!\!\subseteq\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}. On the other hand, Merlin’s strategy is any partial function σ:<\sigma\colon\!\!\!\subseteq\mathbb{N}^{<\mathbb{N}}\to\mathbb{N} (which is not necessarily computable). Arthur’s strategy τ\tau is winning if, as long as Arthur follows the strategy τ\tau, Arthur wins the game, no matter what Merlin’s strategy σ\sigma is.

Observation 2.3.

Let ff and gg be partial multifunctions. Then, ff is Turing reducible to gg if and only if Arthur has a computable winning strategy for 𝔊(f,g)\mathfrak{G}(f,g).

Remark.

A similar notion for partial multifunctions on \mathbb{N}^{\mathbb{N}} has been extensively studied, e.g. in [19, 29, 16, 42, 21, 15], and is known as generalized Weihrauch reducibility. Indeed, Turing reducibility in the above sense is exactly the restriction of generalized Weihrauch reducibility to functions on \mathbb{N}.

Arthur’s winning strategy τ\tau is a one-query strategy if, for any play following τ\tau, either Merlin violates the rule or Arthur’s second move y1y_{1} is of the form 1,u\langle 1,u\rangle, i.e., 𝙰𝚛𝚝𝚑𝚞𝚛{\tt Arthur} declares termination at the second round.

Definition 2.4.

Let ff and gg be partial multifunctions. We say that ff is one-query Turing reducible to gg (written fLT1gf\leq^{1}_{LT}g) if there exists Arthur’s one-query winning strategy τ\tau for 𝔊(f,g)\mathfrak{G}(f,g).

Equivalently, ff is a one-query Turing reducible to gg if and only if there exist computable functions HH and KK such that for any nn and mm,

mg(H(n))K(n,m)f(n).m\in g(H(n))\implies K(n,m)\in f(n).

Such an HH is called an inner reduction, and KK is called an outer reduction.

Remark.

A similar notion for partial multifunctions on \mathbb{N}^{\mathbb{N}} has been extensively studied under the name Weihrauch reducibility; see e.g. Brattka-Gherardi-Pauly [6]. Indeed, one-query Turing reducibility is exactly the restriction of Weihrauch reducibility to functions on \mathbb{N}. This reducibility is also called many-one reducibility in [31].

Remark.

As is well known, it is very difficult to find a natural computably enumerable (c.e.) set whose Turing degree lies strictly between computable ones and the halting problem; see e.g. [27]. As one way to solve this problem of the lack of natural intermediate c.e. degrees, Simpson [37] proposed to study the Muchnik degrees of Π10\Pi^{0}_{1} subsets of Cantor space. Here, however, we present an alternative solution, which is to consider the Turing degrees of multifunctions on \mathbb{N}. Observe that the Turing degree of a c.e. set AA\subseteq\mathbb{N} is determined by its enumeration time function ηA\eta_{A}, where ηA(n)\eta_{A}(n) is the stage when nn is enumerated into AA if such a stage exists; otherwise ηA(n)=0\eta_{A}(n)=0. One can easily see that the graph of ηA\eta_{A} is always co-c.e., i.e., Π10\Pi^{0}_{1}. In this light, one can consider that the counterpart of the Turing degrees of c.e. sets in the multi-valued context is the Turing degrees of multifunctions with Π10\Pi^{0}_{1} graphs. In Example 2.5, we give a natural intermediate Π10\Pi^{0}_{1} degree between computable problems and the halting problem.

To point out the relevance of the Π10\Pi^{0}_{1} multifunctions on \mathbb{N} to the Π10\Pi^{0}_{1} subsets of \mathbb{N}^{\mathbb{N}}, note that if f:f\colon\mathbb{N}\rightrightarrows\mathbb{N} is a Π10\Pi^{0}_{1} multifunction, then the product nf(n)\prod_{n\in\mathbb{N}}f(n) forms a Π10\Pi^{0}_{1} subset of \mathbb{N}^{\mathbb{N}}. However, be careful about that Turing reducibility for multifunctions is entirely different from Muchnik reducibility for their product sets.

Example 2.5 (Intermediate Turing degree).

The following is the \mathbb{N}-version of a well-studied principle, called the lesser limited principle of omniscience.

dom(𝙻𝙻𝙿𝙾)\displaystyle{\rm dom}({\tt LLPO}) ={e:|{j<2:φe(j)}|1},\displaystyle=\{e\in\mathbb{N}:|\{j<2:\varphi_{e}(j)\downarrow\}|\leq 1\},
𝙻𝙻𝙿𝙾(e)\displaystyle{\tt LLPO}(e) ={0,1}{j<2:φe(j)}.\displaystyle=\{0,1\}\setminus\{j<2:\varphi_{e}(j)\downarrow\}.

There are a huge number of mathematical principles which are equivalent to 𝙻𝙻𝙿𝙾{\tt LLPO}; see Diener [11] and also Brattka-Gherardi-Pauly [6]. The principle 𝙻𝙻𝙿𝙾{\tt LLPO} may also be called de Morgan’s law for Σ10\Sigma^{0}_{1} formulas. In the realizability context, this is closely related to Lifschitz realizability [25, 40]. It is not hard to see that the Turing degree of 𝙻𝙻𝙿𝙾{\tt LLPO} strictly lies between the computable problems and the halting problem. This also follows from our results in later sections (see Propositions 4.2 and 4.4).

Note that 𝙻𝙻𝙿𝙾{\tt LLPO} is one-query Turing equivalent to a multifunction with a Π10\Pi^{0}_{1} graph. Given ee\in\mathbb{N}, define ψe\psi_{e} as follows:

ψe(0)\displaystyle\psi_{e}(0)\downarrow (s)[φe(0)[s](t<s)φe(1)[t]],\displaystyle\iff(\exists s\in\mathbb{N})\;[\varphi_{e}(0)[s]\downarrow\;\land\;(\forall t<s)\;\varphi_{e}(1)[t]\uparrow],
ψe(1)\displaystyle\psi_{e}(1)\downarrow (s)[φe(1)[s]φe(0)[s]],\displaystyle\iff(\exists s\in\mathbb{N})\;[\varphi_{e}(1)[s]\downarrow\;\land\;\varphi_{e}(0)[s]\uparrow],

where φe(j)[s]\varphi_{e}(j)[s] is the stage ss approximation of φe(j)\varphi_{e}(j). Note that it is not possible for both ψe(0)\psi_{e}(0) and ψe(1)\psi_{e}(1) to terminate; that is, we always have |{j<2:ψe(j)}|1|\{j<2:\psi_{e}(j)\downarrow\}|\leq 1. Then we define 𝙻(e)={0,1}{j<2:ψe(j)}{\tt L}(e)=\{0,1\}\setminus\{j<2:\psi_{e}(j)\downarrow\}. Obviously, the graph of the multifunction 𝙻:{\tt L}\colon\mathbb{N}\rightrightarrows\mathbb{N} is Π10\Pi^{0}_{1}, and 𝙻LT1𝙻𝙻𝙿𝙾{\tt L}\equiv^{1}_{LT}{\tt LLPO}.

2.2. Imperfect information game

There are various forms of computation, one of which is the notion of probabilistic computation. As a simple example, let us consider the situation where a program 𝙿{\tt P} is given an oracle α\alpha at random, and for an input nn, the oracle computation 𝙿α(n){\tt P}^{\alpha}(n) halts with probability at least 1ε1-\varepsilon. In other words, this is the situation where

μ(A)1ε(αA)𝙿α(n),\mu(A)\geq 1-\varepsilon\;\land\;(\forall\alpha\in A)\;{\tt P}^{\alpha}(n)\downarrow,

for some set A2A\subseteq 2^{\mathbb{N}}. Here, μ\mu is the uniform probability measure on 22^{\mathbb{N}} (i.e., the probability measure by infinite fair coin flips). This probabilistic computation yields a multifunction such that the value 𝙿α(n){\tt P}^{\alpha}(n) for each αA\alpha\in A is a possible output. This computation has two parameters, nn and AA. Of course, nn is an input given by us, while AA is a witness that the computation halts except for probability at most ε\varepsilon. It is only guaranteed that such an AA exists mathematically, but the computer does not know what exactly AA is.

Let us write 𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛ε𝙿{\tt ProbError}_{\varepsilon}{\tt P} for the procedure of giving an oracle randomly to the program 𝙿{\tt P} and having it perform a computation with error probability at most ε\varepsilon. If one wants to make explicit a parameter AA which witnesses that the computation succeeds with error probability at most ε\varepsilon for an input nn, we use the following notation:

𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛ε𝙿(nA){\tt ProbError}_{\varepsilon}{\tt P}(n\mid A)

A pair (nA)(n\mid A) of parameters is properly accepted only if AA witness that 𝙿α(n){\tt P}^{\alpha}(n) halts except for probability at most ε\varepsilon:

𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛ε𝙿(nA)A2μ(A)1ε(αA)𝙿α(n).{\tt ProbError}_{\varepsilon}{\tt P}(n\mid A)\downarrow\iff A\subseteq 2^{\mathbb{N}}\;\land\;\mu(A)\geq 1-\varepsilon\;\land\;(\forall\alpha\in A)\;{\tt P}^{\alpha}(n)\downarrow.

Then, the value 𝙿α(n){\tt P}^{\alpha}(n) for each αA\alpha\in A is a possible output:

y𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛ε𝙿(nA)αA[𝙿α(n)=y].y\in{\tt ProbError}_{\varepsilon}{\tt P}(n\mid A)\iff\exists\alpha\in A\;[{\tt P}^{\alpha}(n)=y].

Although the roles of nn and AA are entirely different, if we just treat them formally, the above process can be regarded as a partial multifunction

𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛ε𝙿:×𝒫(2).{\tt ProbError}_{\varepsilon}{\tt P}\colon\!\!\!\subseteq\mathbb{N}\times\mathcal{P}(2^{\mathbb{N}})\rightrightarrows\mathbb{N}.

In this sense, both nn and AA can be thought of as inputs for the above multifunction, but nn is an input that is disclosed during the computation, while AA is an unknown input that cannot be accessed during the computation. Hence, we call nn a public input, and AA a secret input.

Definition 2.6.

A partial multifunction g:×Λg\colon\!\!\!\subseteq\mathbb{N}\times\Lambda\rightrightarrows\mathbb{N}, where Λ\Lambda is a set, is called a bilayer function in this article (any suggestions for a better name for this notion would be welcome). In this context, a pair (n,c)×Λ(n,c)\in\mathbb{N}\times\Lambda is always written as (nc)(n\mid c). For (nc)dom(g)(n\mid c)\in{\rm dom}(g), we call nn a public input and cc a secret input. Then, the public domain dompub(g){\rm dom}_{\rm pub}(g) of gg is defined as the set of all nn\in\mathbb{N} such that (nc)dom(g)(n\mid c)\in{\rm dom}(g) for some cΛc\in\Lambda.

Example 2.7.

Any partial multifunction g:g\colon\!\!\!\subseteq\mathbb{N}\rightrightarrows\mathbb{N} can be identified with the following bilayer function g^:×{}\hat{g}\colon\!\!\!\subseteq\mathbb{N}\times\{\ast\}\rightrightarrows\mathbb{N}:

g^(n)=g(n).\hat{g}(n\mid\ast)=g(n).
Remark.

If one wants to avoid dealing with an arbitrary set Λ\Lambda, one can just consider G(n)={g(nc):cΛ and (nc)dom(g)}G(n)=\{g(n\mid c):c\in\Lambda\mbox{ and }(n\mid c)\in{\rm dom}(g)\}, which yields G:𝒫𝒫()G\colon\!\!\!\subseteq\mathbb{N}\to\mathcal{P}\mathcal{P}(\mathbb{N}). Conversely, if a partial function of the form G:𝒫𝒫()G\colon\!\!\!\subseteq\mathbb{N}\to\mathcal{P}\mathcal{P}(\mathbb{N}) is given, one can always assume that the elements of G(n)G(n) are indexed as G(n)={pcn:cΛn}G(n)=\{p^{n}_{c}:c\in\Lambda_{n}\}. Then, we consider g(nc)g(n\mid c) to mean pcnp^{n}_{c}, which yields a partial multifunction g:×Λg\colon\!\!\!\subseteq\mathbb{N}\times\Lambda\rightrightarrows\mathbb{N}.

Indeed, previous studies, such as Lee-van Oosten [24], rather deal only with 𝒫𝒫()\mathcal{P}\mathcal{P}(\mathbb{N})-valued functions. In the terms of Bauer [2], a 𝒫𝒫()\mathcal{P}\mathcal{P}(\mathbb{N})-valued function is called an extended Weihrauch degree, and a partial multifunction as seen as an extended Weihrauch degree is called a modest extended Weihrauch degree. However, from the point of view of advised computation, there are advantages to the way of looking at it as in Definition 2.6.

Let us consider relative computation with a bilayer function oracle. In our computation model, a secret input for an oracle acts like an advice string in computational complexity theory. For the role of advice in computability theory, we refer the reader to Brattka-Pauly [7] and Ziegler [43]. One-query computation with advice in the context of \mathbb{N}^{\mathbb{N}}-computation has also been discussed there.

Example 2.8.

In the context of \mathbb{N}^{\mathbb{N}}-computation, the bilayer function 𝙰𝚍𝚟𝚒𝚌𝚎:{}×{\tt Advice}_{\mathbb{N}}\colon\{\ast\}\times\mathbb{N}\to\mathbb{N} defined by 𝙰𝚍𝚟𝚒𝚌𝚎(n)=n{\tt Advice}_{\mathbb{N}}(\ast\mid n)=n can be used to deal with nonuniform computability [7, 43]. However, in the context of \mathbb{N}-computation, 𝙰𝚍𝚟𝚒𝚌𝚎{\tt Advice}_{\mathbb{N}} is too strong and produce the ¬¬\neg\neg-topology on the effective topos [24]. Several variants of random advice in the context of \mathbb{N}^{\mathbb{N}}-computation have also been studied in [7, 5].

Relative Computation Model: Our computation model deals not only with one-query relative computation, but also with many-query relative computation. During a computation with a bilayer function oracle ff, when the program makes a query nn to ff, the advisor chooses a parameter cc. However, the information of cc chosen by the advisor is not given to the machine, but only the information of one of the possible values of f(nc)f(n\mid c) is given. If this process computes a partial multifunction gg when the advisor secretly makes the best choice, then we declare that gg is Turing reducible to ff in the bilayered context, and write gLTfg\leq_{LT}f.

Again, one may think that this programming definition is too vague, so we give a mathematically rigorous description of this. Formally, this procedure can be understood by describing it as an imperfect information game between three players, Merlin, Arthur, and Nimue. The player Merlin makes a public input x0x_{0} and a secret input c0c_{0} on his first move. Here, among the moves of Merlin, only the secret input c0c_{0} is invisible to Arthur. All of Nimue’s moves are visible to Merlin, but not to Arthur, a mere human being. The players Merlin and Nimue, who are not mere humans, can see all the previous moves at each round.

Definition 2.9 (Imperfect information game).

For bilayer functions ff and gg, let us consider the following imperfect information three-player game 𝔊(f,g)\mathfrak{G}(f,g):

𝙼𝚎𝚛𝚕𝚒𝚗:(x0c0)x1x2𝙰𝚛𝚝𝚑𝚞𝚛:y0y1y2𝙽𝚒𝚖𝚞𝚎:z0z1z2\begin{array}[]{rcccccccccc}{\tt Merlin}\colon&(x_{0}\mid c_{0})&&&x_{1}&&&x_{2}&&&\dots\\ {\tt Arthur}\colon&&y_{0}&&&y_{1}&&&y_{2}&&\dots\\ {\tt Nimue}\colon&&&z_{0}&&&z_{1}&&&z_{2}&\dots\end{array}

Game rules: Here, the players need to obey the following rules.

  • First, Merlin chooses a pair (x0c0)dom(f)(x_{0}\mid c_{0})\in{\rm dom}(f).

  • At the nnth round, Arthur reacts with yn=j,uny_{n}=\langle j,u_{n}\rangle.

    • The choice j=0j=0 indicates that Arthur makes a new query unu_{n} to gg. In this case, we require undompub(g)u_{n}\in{{\rm dom}}_{\rm pub}(g).

    • The choice j=1j=1 indicates that Arthur declares termination of the game with unu_{n}.

  • At the nnth round, Nimue makes an advice parameter znz_{n} such that (unzn)dom(g)(u_{n}\mid z_{n})\in{\rm dom}(g).

  • At the (n+1)(n+1)th round, Merlin responds to the query made by Arthur and Nimue at the previous stage. This means that xn+1g(unzn)x_{n+1}\in g(u_{n}\mid z_{n}).

Then, Arthur and Nimue win the game 𝔊(f,g)\mathfrak{G}(f,g) if either Merlin violates the rule before Arthur or Nimue violates the rule, or both Arthur and Nimue obey the rule and Arthur declares termination with unf(x0c0)u_{n}\in f(x_{0}\mid c_{0}).

Strategies: As noted above, Arthur can only read the moves x0,x1,x2,x_{0},x_{1},x_{2},\dots, and the other players can see all the moves. Moreover, we require that Arthur’s moves are chosen in a computable manner. In other words, Arthur’s strategy is a code τ\tau of a partial computable function hτ:<h_{\tau}\colon\!\!\!\subseteq\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}, which reads Merlin’s moves x0,,xnx_{0},\dots,x_{n} and then returns yny_{n}. On the other hand, Merlin and Nimue’s strategies are any partial functions (which are not necessarily computable).

A pair (τη)(\tau\mid\eta) of Arthur’s computable strategy τ\tau and Nimue’s strategy η\eta is called an Arthur-Nimue strategy. An Arthur-Nimue strategy (τη)(\tau\mid\eta) is winning if, as long as Arthur and Nimue follow the strategy (τη)(\tau\mid\eta), Arthur and Nimue win the game, no matter what Merlin’s strategy σ\sigma is.

We now introduce a generalization of Turing reducibility for bilayer functions.

Definition 2.10.

Let ff and gg be bilayer functions. We say that ff is bilayered Turing reducible (or LT-reducible) to gg (written fLTgf\leq_{LT}g) if there exists a winning Arthur-Nimue strategy for 𝔊(f,g)\mathfrak{G}(f,g).

Obviously, bilayered Turing reducibility for partial multifunctions (which can be viewed as bilayer functions as in Example 2.7) is the same as Turing reducibility.

Remark.

The notion of an Arthur-Nimue strategy is strongly related to the notion of a dedicated sight in Lee-van Oosten [24, Definition 4.3]. The statement that SS is a (z,θ,p)(z,\theta,p)-dedicated sight roughly corresponds to that (zS)(z\mid S) is a winning Arthur-Nimue strategy witnessing p˙LTθ\dot{p}\leq_{LT}\theta, where p˙()=p\dot{p}(\ast\mid\ast)=p for pp\subseteq\mathbb{N}.

Before examining bilayered Turing reducibility, we again consider one-query reductions. A winning Arthur-Nimue strategy (τη)(\tau\mid\eta) is a one-query strategy if, for any play following (τη)(\tau\mid\eta), either Merlin violates the rule or Arthur’s second move y1y_{1} is of the form 1,u\langle 1,u\rangle, i.e., 𝙰𝚛𝚝𝚑𝚞𝚛{\tt Arthur} declares termination at the second round.

Definition 2.11.

Let ff and gg be bilayer functions. We say that ff is one-query bilayered Turing reducible to gg (written fLT1gf\leq^{1}_{LT}g) if there exists a one-query winning Arthur-Nimue strategy (τη)(\tau\mid\eta) for 𝔊(f,g)\mathfrak{G}(f,g).

Equivalently, ff is a one-query bilayered Turing reducible to gg if and only if there exist computable functions HH and KK and a function LL such that for any (nc)(n\mid c) and mm,

mg(H(n)L(n,c))K(n,m)f(nc).m\in g(H(n)\mid L(n,c))\implies K(n,m)\in f(n\mid c).

Such an HH is called an inner reduction, and KK is called an outer reduction. We also call LL a secret inner reduction.

Remark.

One-query bilayered Turing reducibility for bilayer functions (extended Weihrauch degrees) is simply called Weihrauch reducibility in Bauer [2]. The algebraic structure of the one-query bilayered Turing degrees (the extended Weihrauch degrees) has been studied there.

Proposition 2.12.

LT1\leq^{1}_{LT} is a preorder.

Proof.

Reflexivity is trivial. For transitivity, let H0,K0,L0\langle H_{0},K_{0},L_{0}\rangle witness fLT1gf\leq^{1}_{LT}g and H1,K1,L1\langle H_{1},K_{1},L_{1}\rangle witness gLT1hg\leq^{1}_{LT}h. Then mh(H1H0(n)L1(H0(n),η0(n,c)))m\in h(H_{1}\circ H_{0}(n)\mid L_{1}(H_{0}(n),\eta_{0}(n,c))) implies K1(H0(n),m)g(H0(n)L0(n,c))K_{1}(H_{0}(n),m)\in g(H_{0}(n)\mid L_{0}(n,c)), which implies K0(n,K1(H0(n),m))f(nc)K_{0}(n,K_{1}(H_{0}(n),m))\in f(n\mid c). Hence, H1H0H_{1}\circ H_{0} is an inner reduction, (n,m)K0(n,K1(H0(n),m))(n,m)\mapsto K_{0}(n,K_{1}(H_{0}(n),m)) is an outer reduction, and (n,c)L1(H0(n),L0(n,c))(n,c)\mapsto L_{1}(H_{0}(n),L_{0}(n,c)) is a secret inner reduction witnessing fLT1hf\leq^{1}_{LT}h. ∎

Proposition 2.13.

LT\leq_{LT} is a preorder.

Proof.

Reflexivity is trivial. For transitivity, we only need to combine the argument in Proposition 2.12 and the proof of transitivity of generalized Weihrauch reducibility [19, Proposition 4.4]. We assume that fLTgf\leq_{LT}g and gLThg\leq_{LT}h. To avoid confusion, we name 𝙰𝚛𝚝𝚑𝚞𝚛0{\tt Arthur}_{0}, 𝙼𝚎𝚛𝚕𝚒𝚗0{\tt Merlin}_{0}, and 𝙽𝚒𝚖𝚞𝚎0{\tt Nimue}_{0} for the players in the game 𝔊(f,g)\mathfrak{G}(f,g), and 𝙰𝚛𝚝𝚑𝚞𝚛1{\tt Arthur}_{1}, 𝙼𝚎𝚛𝚕𝚒𝚗1{\tt Merlin}_{1}, and 𝙽𝚒𝚖𝚞𝚎1{\tt Nimue}_{1} for the players in the game 𝔊(g,h)\mathfrak{G}(g,h). Let (τiηi)(\tau_{i}\mid\eta_{i}) be a winning 𝙰𝚛𝚝𝚑𝚞𝚛i{\tt Arthur}_{i}-𝙽𝚒𝚖𝚞𝚎i{\tt Nimue}_{i} strategy for the corresponding game for each i<2i<2. In the following, we assume that 𝙰𝚛𝚝𝚑𝚞𝚛i{\tt Arthur}_{i} and 𝙽𝚒𝚖𝚞𝚎i{\tt Nimue}_{i} always follow their winning strategies. We construct a winning Arthur-Nimue strategy for 𝔊(f,h)\mathfrak{G}(f,h).

Let (xc)(x\mid c) be Merlin’s first move in the game 𝔊(f,h)\mathfrak{G}(f,h). Then, consider (xc)(x\mid c) as 𝙼𝚎𝚛𝚕𝚒𝚗0{\tt Merlin}_{0}’s first move in the game 𝔊(f,g)\mathfrak{G}(f,g) as well, and simulate a play following the 𝙰𝚛𝚝𝚑𝚞𝚛0{\tt Arthur}_{0}-𝙽𝚒𝚖𝚞𝚎0{\tt Nimue}_{0} strategy (τ0η0)(\tau_{0}\mid\eta_{0}). Along such a play, if 𝙰𝚛𝚝𝚑𝚞𝚛0{\tt Arthur}_{0} declares termination with some uu at some round, then 𝙰𝚛𝚝𝚑𝚞𝚛{\tt Arthur} also declares termination with the same value uu. If 𝙰𝚛𝚝𝚑𝚞𝚛0{\tt Arthur}_{0} and 𝙽𝚒𝚖𝚞𝚎0{\tt Nimue}_{0} make a query (uz)(u\mid z) to gg at some round, then think of (uz)(u\mid z) as 𝙼𝚎𝚛𝚕𝚒𝚗1{\tt Merlin}_{1}’s first move in the game 𝔊(g,h)\mathfrak{G}(g,h), and simulate a play following the 𝙰𝚛𝚝𝚑𝚞𝚛1{\tt Arthur}_{1}-𝙽𝚒𝚖𝚞𝚎1{\tt Nimue}_{1} strategy (τ1η1)(\tau_{1}\mid\eta_{1}). During this subplay, Arthur and Nimue simply copy the moves made by 𝙰𝚛𝚝𝚑𝚞𝚛1{\tt Arthur}_{1} and 𝙽𝚒𝚖𝚞𝚎1{\tt Nimue}_{1}, respectively, and play them as their own moves. Here, Merlin copies 𝙼𝚎𝚛𝚕𝚒𝚗1{\tt Merlin}_{1}’s moves, except for the first move, and uses them directly in his own moves. Since 𝙰𝚛𝚝𝚑𝚞𝚛1{\tt Arthur}_{1} and 𝙽𝚒𝚖𝚞𝚎1{\tt Nimue}_{1} follow their winning strategies, 𝙰𝚛𝚝𝚑𝚞𝚛1{\tt Arthur}_{1} declares termination with some vv at some round, and moreover vg(uz)v\in g(u\mid z). Hence, one can think of such vv as 𝙼𝚎𝚛𝚕𝚒𝚗0{\tt Merlin}_{0}’s response to the previous move (uz)(u\mid z) by 𝙰𝚛𝚝𝚑𝚞𝚛0{\tt Arthur}_{0} and 𝙽𝚒𝚖𝚞𝚎0{\tt Nimue}_{0}. This allows the game 𝔊(f,g)\mathfrak{G}(f,g) to move on to the next round (and this can be simulated by Arthur and Nimue, since they know the value of vv). Repeating this process, since 𝙰𝚛𝚝𝚑𝚞𝚛0{\tt Arthur}_{0} and 𝙽𝚒𝚖𝚞𝚎0{\tt Nimue}_{0} follow their winning strategies, 𝙰𝚛𝚝𝚑𝚞𝚛0{\tt Arthur}_{0} declares termination with some ww at some round, and moreover wf(xc)w\in f(x\mid c). Therefore, 𝙰𝚛𝚝𝚑𝚞𝚛0{\tt Arthur}_{0} also declares termination with some wf(xc)w\in f(x\mid c) at some round. Hence, the Arthur-Nimue strategy described above is winning for 𝔊(f,h)\mathfrak{G}(f,h), which concludes fLThf\leq_{LT}h. ∎

Note that the rule of the game 𝔊(f,g)\mathfrak{G}(f,g) does not mention ff except for Player I’s first move. Hence, if we skip Player I’s first move, we can judge if a given play follows the rule without specifying ff. Such a restricted game is denoted by 𝔊(g)\mathfrak{G}(g). Arthur and Nimue win the game 𝔊(g)\mathfrak{G}(g) if either Merlin violates the rule before Arthur or Nimue violates the rule, or both Arthur and Nimue obey the rule and Arthur declares termination.

Definition 2.14.

Given a bilayer function hh, let us define the new bilayer function hh^{\Game} as follows: An input for hh^{\Game} is an Arthur-Nimue strategy (τη)(\tau\mid\eta), where Arthur’s strategy τ\tau is a public input, and Nimue’s strategy η\eta is a secret input.

  • h(τη)h^{\Game}(\tau\mid\eta) is defined only if, along any play following the strategy (τη)(\tau\mid\eta), Arthur and Nimue win the game 𝔊(h)\mathfrak{G}(h) whatever Merlin’s strategy is.

  • uh(τη)u\in h^{\Game}(\tau\mid\eta) if and only if there is a play in 𝔊(h)\mathfrak{G}(h) that follows the strategy (τη)(\tau\mid\eta) such that Arthur declares termination with uu at some round, where all players obey the rule.

The first condition says that (τη)h(\tau\mid\eta)\in h^{\Game} if and only if (τη)(\tau\mid\eta) is a winning Arthur-Nimue strategy for 𝔊(h)\mathfrak{G}(h) in a certain sense, and in particular, Arthur declares termination at some round unless Merlin violates the rule. Alternatively, hh^{\Game} can be thought of as a universal machine for hh-relative computation.

Proposition 2.15.

For bilayer functions gg and hh, gLThg\leq_{LT}h if and only if gLT1hg\leq^{1}_{LT}h^{\Game}.

Proof.

()(\Rightarrow) Let (τη)(\tau\mid\eta) be a winning Arthur-Nimue strategy witnessing gLThg\leq_{LT}h. Given an input (nc)(n\mid c) for gg, define τn(σ)=τ(nσ)\tau_{n}(\sigma)=\tau(n{}^{\smallfrown}\sigma) and ηn,c(σ)=η(n,cσ)\eta_{n,c}(\sigma)=\eta(\langle n,c\rangle{}^{\smallfrown}\sigma). Any uh(τnηn,c)u\in h^{\Game}(\tau_{n}\mid\eta_{n,c}) corresponds to a play in 𝔊(g,h)\mathfrak{G}(g,h) following the strategy (τη)(\tau\mid\eta), where Merlin’s first move is (nc)(n\mid c), and 𝙰𝚛𝚝𝚑𝚞𝚛{\tt Arthur} declares termination with uu. Since (τη)(\tau\mid\eta) is winning in 𝔊(g,h)\mathfrak{G}(g,h), we must have ug(nc)u\in g(n\mid c). Thus, nτnn\mapsto\tau_{n} is an inner reduction, (n,c)ηn,c(n,c)\mapsto\eta_{n,c} is a secret inner reduction, and (n,u)u(n,u)\mapsto u is an outer reduction witnessing gLT1hg\leq^{1}_{LT}h^{\Game}.

()(\Leftarrow) Let H,K,L\langle H,K,L\rangle witness gLT1hg\leq^{1}_{LT}h^{\Game}. As HH is an inner reduction, note that H(n)H(n) is (a code of) Arthur’s strategy, and think of H(n)(σ)H(n)(\sigma) as Arthur’s move after reading Merlin’s moves σ\sigma. Then, define τ(nσ)=H(n)(σ)\tau(n{}^{\smallfrown}\sigma)=H(n)(\sigma) if H(n)(σ)H(n)(\sigma) does not declare termination, i.e., H(n)(σ)H(n)(\sigma) is of the form 0,u\langle 0,u\rangle. If H(n)(σ)H(n)(\sigma) declares termination with uu, then define τ(nσ)=1,K(n,u)\tau(n{}^{\smallfrown}\sigma)=\langle 1,K(n,u)\rangle; that is, τ(nσ)\tau(n{}^{\smallfrown}\sigma) declares termination with K(n,u)K(n,u). Clearly, τ\tau is computable. We also define η(n,cσ)=L(n,c)(σ)\eta(\langle n,c\rangle{}^{\smallfrown}\sigma)=L(n,c)(\sigma).

Assume that Arthur and Nimue follow the strategy (τη)(\tau\mid\eta) in the game 𝔊(g,h)\mathfrak{G}(g,h). If Merlin’s first move is (nc)(n\mid c), then, by the definitions of τ\tau and η\eta, Arthur and Nimue follow the strategy (H(n)L(n,c))(H(n)\mid L(n,c)) in the subgame 𝔊(h)\mathfrak{G}(h) until Arthur declares termination. Since (H(n)L(n,c))dom(h)(H(n)\mid L(n,c))\in{\rm dom}(h^{\Game}), either Merlin violates the rule before Arthur or Nimue violates the rule, or all players obey the rule and Arthur declares termination. Assume that Merlin follows a strategy obeying the rule. Then, in the subgame 𝔊(h)\mathfrak{G}(h), Arthur declares termination with uu at some round, i.e., uh(H(n)L(n,c))u\in h^{\Game}(H(n)\mid L(n,c)). Hence, by the definition of τ\tau, in the game 𝔊(g,h)\mathfrak{G}(g,h), Arthur declares termination with K(n,u)K(n,u). As H,K,L\langle H,K,L\rangle are reductions witnessing gLT1hg\leq^{1}_{LT}h^{\Game}, uh(H(n)L(n,c))u\in h^{\Game}(H(n)\mid L(n,c)) implies K(n,u)g(nc)K(n,u)\in g(n\mid c). This verifies that (τη)(\tau\mid\eta) is a winning Arthur-Nimue strategy witnessing gLThg\leq_{LT}h. ∎

Proposition 2.16.

hLT1hh^{\Game\Game}\equiv^{1}_{LT}h^{\Game}.

Proof.

Obviously, hLT1hh^{\Game}\leq^{1}_{LT}h^{\Game\Game}. For the other direction, by the reflexivity of LT1\leq^{1}_{LT}, we have hLT1hh^{\Game\Game}\leq^{1}_{LT}h^{\Game\Game}, which implies that hThh^{\Game\Game}\leq_{T}h^{\Game} by Proposition 2.15. Similarly, we also have hLThh^{\Game}\leq_{LT}h. Since LT\leq_{LT} is transitive by Proposition 2.13, we have hLThh^{\Game\Game}\leq_{LT}h. Hence, we get hLT1hh^{\Game\Game}\leq^{1}_{LT}h^{\Game} by Proposition 2.15. ∎

Remark.

In the context of \mathbb{N}^{\mathbb{N}}-computability, the closure operator -^{\Game} restricted to partial multifunctions is essentially the same as the diamond operator in [29, 42].

Remark.

Several variants of Weihrauch reducibility can be explained by using bilayer functions in the context of \mathbb{N}^{\mathbb{N}}-computation. For instance, ff is computable reducible to gg in the sense of [14, 19] if and only if ff is one-query bilayered Turing reducible to (g𝙰𝚍𝚟𝚒𝚌𝚎)(g\mid{\tt Advice}_{\mathbb{N}}) (see Definition 4.5) if we properly extend the above notions to the context of \mathbb{N}^{\mathbb{N}}-computability. The notion of omniscient computable/Weihrauch reducibility [26, 15, 13] can also be explained in the bilayer context.

The bilayered Turing degrees of concrete bilayer functions are examined in Sections 4 and 5.

3. Lawvere-Tierney topology

3.1. Realizability

For sets p,q𝒫()p,q\subseteq\mathcal{P}(\mathbb{N}) we define pqp\leq q if there exists a partial computable function φ:\varphi\colon\!\!\!\subseteq\mathbb{N}\to\mathbb{N} such that npn\in p implies φ(n)q\varphi(n)\in q. Then (𝒫(),)(\mathcal{P}(\mathbb{N}),\leq) forms a Heyting algebra, where the Heyting operations are given as follows:

pq\displaystyle p\land q ={m,n:mpnq},\displaystyle=\{\langle m,n\rangle:m\in p\;\land\;n\in q\},
pq\displaystyle p\lor q ={0,n:np}{1,n:nq},\displaystyle=\{\langle 0,n\rangle:n\in p\}\cup\{\langle 1,n\rangle:n\in q\},
pq\displaystyle p\rightarrow q ={e:(n)[npφe(n)q]}.\displaystyle=\{e:(\forall n\in\mathbb{N})\;[n\in p\;\to\;\varphi_{e}(n)\in q]\}.

Now we put Ω=𝒫()\Omega=\mathcal{P}(\mathbb{N}), and consider Ω\Omega as the set of truth values in the world of computable mathematics. Indeed, the morphism tracked by true:1Ωtrue\colon 1\to\Omega, where true()=true(\ast)=\mathbb{N}, is a subobject classifier in the effective topos. For more information on the effective topos, see [20, 23, 40].

Let AA be a propositional formula, where all propositional variables belong to Ω\Omega. Then AA can be thought of as an element of Ω\Omega by using Heyting operations on Ω\Omega. We say that ee realizes AA if ee belongs to AA under the above interpretation. We also say that ee realizes pA(p)\forall p\;A(p) if eA(p)e\in A(p) for any pΩp\in\Omega. Then, AA is realizable if some ee\in\mathbb{N} realizes AA.

3.2. Lawvere-Tierney topologies

In this section, we reveal the hidden relationship between bilayered Turing degrees and Lawvere-Tierney topologies (Definition 3.2) on the effective topos. As mentioned in Section 1.1, we regard an Lawvere-Tierney topology on the effective topos as a kind of data that indicate how much non-computability to add to the world, and thus, a topology plays the same role as an oracle. In this regard, Hyland [20] found an embedding of the Turing degrees (of total single-valued functions on \mathbb{N}) into the lattice of Lawvere-Tierney topologies on the effective topos. Hyland’s embedding can be extended to partial functions or even partial multifunctions on \mathbb{N}. By extending this further, we show that there exists an isomorphism between the bilayered Turing degrees and the lattice of Lawvere-Tierney topologies on the effective topos (Corollary 3.5). This guarantees that, in the strict sense, any topology on the effective topos can be identified with a (bilayer) oracle. Note that most of the results in Section 3.2 have almost been proven by Lee and van Oosten [24], although their language is completely different from ours, and in particular they do not give any computational interpretation of their notions.

A function β:ΩΩ\beta\colon\Omega\to\Omega is said to be computably monotone if the following is realizable:

p,q[(pq)(β(p)β(q))].\forall p,q\;[(p\to q)\to(\beta(p)\to\beta(q))].

In other words, there exists ee such that for any p,qΩp,q\in\Omega if aa realizes pqp\to q then φe(a)\varphi_{e}(a) realizes β(p)β(q)\beta(p)\to\beta(q). We define a preorder on computably monotone functions on Ω\Omega as follows:

αreaβp[α(p)β(p)]” is realizable,\alpha\leq_{\rm rea}\beta\iff\mbox{``$\forall p\;[\alpha(p)\to\beta(p)]$'' is realizable},

that is, there exists ee such that, for any pΩp\in\Omega, ee realizes α(p)β(p)\alpha(p)\to\beta(p). For a preorder, its quotient by the induced equivalence relation is called the poset reflection.

Theorem 3.1.

The poset reflections of the following preorders are isomorphic:

  • The one-query bilayered Turing preorder LT1\leq^{1}_{LT} on bilayer functions.

  • The preorder rea\leq_{\rm rea} on computably monotone functions on Ω\Omega.

Proof.

Given a bilayer function gg, we define a function g:ΩΩg^{\to}\colon\Omega\to\Omega as follows:

n,eg(p)e realizes g(nc)p for some c.\langle n,e\rangle\in g^{\to}(p)\iff\mbox{$e$ realizes $g(n\mid c)\to p$ for some $c$.}

Roughly speaking, g(p)g^{\to}(p) is a problem that asks us to solve a problem pp with the help of gg. Of the solutions nn and ee to g(p)g^{\to}(p), we sometimes call nn an inner reduction and ee an outer reduction. Indeed, if we put p˙()=p\dot{p}(\ast\mid\ast)=p, then n,eg(p)\langle n,e\rangle\in g^{\to}(p) if and only if n,e\langle n,e\rangle witnesses p˙LT1g\dot{p}\leq^{1}_{LT}g. Note that, if θ\theta is a bilayer function, θ\theta^{\to} is essentially the same as GθG_{\theta} under the notation in Lee-van Oosten [24, page 873]. One can easily see that gg^{\to} is computably monotone (see also [24]). We first show the following:

gLT1hgreah.g\leq^{1}_{LT}h\iff g^{\to}\leq_{\rm rea}h^{\to}.

For the forward direction, assume that H,K,L\langle H,K,L\rangle witnesses gLT1hg\leq^{1}_{LT}h, and n,e\langle n,e\rangle witnesses p˙LT1g\dot{p}\leq^{1}_{LT}g with some cc. Then, the composition H(n)H(n) of inner reductions and the composition φeK\varphi_{e}\circ K of outer reductions witness p˙LT1h\dot{p}\leq^{1}_{LT}h with L(n,c)L(n,c). This is because for any solution yh(H(n)L(n,c))y\in h(H(n)\mid L(n,c)) we have K(n,y)g(nc)K(n,y)\in g(n\mid c) as H,K,L\langle H,K,L\rangle is a reduction triple, and for any zg(nc)z\in g(n\mid c) we have φe(z)p˙()=p\varphi_{e}(z)\in\dot{p}(\ast\mid\ast)=p; hence φeK(n,y)p\varphi_{e}\circ K(n,y)\in p. Put n=H(n)n^{\prime}=H(n) and let ene^{\prime}_{n} be an index of the computable function yφeK(n,y)y\mapsto\varphi_{e}\circ K(n,y). Then we have n,enh(p)\langle n^{\prime},e^{\prime}_{n}\rangle\in h^{\to}(p). Clearly n,en,en\langle n,e\rangle\mapsto\langle n^{\prime},e^{\prime}_{n}\rangle is computable and independent of pp. Hence we get greahg^{\to}\leq_{\rm rea}h^{\to}.

For the backward direction, let ee be a realizer for g(p)h(p)g^{\to}(p)\to h^{\to}(p) for any pΩp\in\Omega. Given (nc)(n\mid c), let us consider p=g(nc)p=g(n\mid c). It is obvious that n,id\langle n,{\rm id}\rangle witnesses p˙LT1g\dot{p}\leq^{1}_{LT}g. Thus, φe(n,id)=mn,dn\varphi_{e}(n,{\rm id})=\langle m_{n},d_{n}\rangle witnesses p˙LT1h\dot{p}\leq^{1}_{LT}h. In other words, yh(mnc)y\in h(m_{n}\mid c^{\prime}) implies φdn(y)p˙()=g(nc)\varphi_{d_{n}}(y)\in\dot{p}(\ast\mid\ast)=g(n\mid c) for some cc^{\prime}. One can find an index dd such that φd(n,x)=φdn(x)\varphi_{d}(n,x)=\varphi_{d_{n}}(x). Then, nmnn\mapsto m_{n} is an inner reduction, ccc\mapsto c^{\prime} is a secret inner reduction, and φd\varphi_{d} is an outer reduction for gLT1hg\leq^{1}_{LT}h.

Now, given a computably monotone function β:ΩΩ\beta\colon\Omega\to\Omega, define a bilayer function β\beta^{\leftarrow} as follows:

dom(β)={(nc):nβ(c)},β(nc)=c.{\rm dom}(\beta^{\leftarrow})=\{(n\mid c):n\in\beta(c)\},\qquad\beta^{\leftarrow}(n\mid c)=c.

Note that ββ\beta\mapsto\beta^{\leftarrow} is essentially the same as the transformation fθf\mapsto\theta in the proof of Lee-van Oosten [24, Theorem 2.4]. Therefore, as in the proof of [24, Theorem 2.4] (that shows fF(f)Gθf\equiv F(f)\equiv G_{\theta} under their terminology), one can see that (β)reaβ(\beta^{\leftarrow})^{\rightarrow}\equiv_{\rm rea}\beta. This concludes the proof. ∎

Remark.

Recall that, in [2], one-query bilayered Turing reducibility is called extended Weihrauch reducibility. Together with the result in Bauer [2] that extended Weihrauch degrees and instance degrees (over a relative partial combinatory algebra) are equivalent preorders, one can deduce that the orders in Theorem 3.1 are also isomorphic to instance degrees over Kleene’s first algebra.

By the proof of Theorem 3.1, note that we also have (g)LT1g(g^{\to})^{\leftarrow}\equiv^{1}_{LT}g and

greahgLT1h.g\leq_{\rm rea}h\iff g^{\leftarrow}\leq^{1}_{LT}h^{\leftarrow}.

We next consider the notion of Lawvere-Tierney topology (also known as local operator or geometric modality), which is, in general, defined as a certain operator on the truth-value object in a given topos. In the effective topos, it is essentially the same as the following notion (see also [23, 24]):

Definition 3.2.

A function j:ΩΩj\colon\Omega\to\Omega is a Lawvere-Tierney topology if all of the following are realizable

  1. (1)

    p[pj(p)]\forall p\;[p\to j(p)].

  2. (2)

    p[j(pq)j(p)j(q)]\forall p\;[j(p\land q)\leftrightarrow j(p)\land j(q)].

  3. (3)

    p[j(j(p))j(p)]\forall p\;[j(j(p))\to j(p)]

Recall from the proof of Theorem 3.1 that g(p)g^{\to}(p) is the set of reduction pairs for p˙LT1g\dot{p}\leq^{1}_{LT}g (where a secret reduction is not included). Therefore, by Proposition 2.15, g(p)g^{\Game\to}(p) is essentially the set of Arthur’s winning strategies for p˙LTg\dot{p}\leq_{LT}g. We next see that the function g:ΩΩg^{\Game\to}\colon\Omega\to\Omega is always a Lawvere-Tierney topology.

Observation 3.3.

Let hh be a bilayer function. Then, h:ΩΩh^{\Game\to}\colon\Omega\to\Omega is a Lawvere-Tierney topology.

Proof.

(1) If one can solve a problem pp without any help, it is clear that one can also solve the problem pp with the help of hh^{\Game}. (2) For the backward direction, if one can solve problems pp and qq with the help of hh^{\Game}, then by running these strategies in parallel, one can also solve the problem pqp\land q with the help of hh^{\Game}. The forward direction is obvious.

(3) By definition, τ,ehh(p)\langle\tau,e\rangle\in h^{\Game\to}h^{\Game\to}(p) if and only if ee realizes h(τη)h(p)h^{\Game}(\tau\mid\eta)\to h^{\Game\to}(p) for some η\eta. Thus, if uh(τη)u\in h^{\Game}(\tau\mid\eta) and φe(u)=τ(u),e(u)\varphi_{e}(u)=\langle\tau^{\prime}(u),e^{\prime}(u)\rangle then e(u)e^{\prime}(u) realizes h(τ(u)η(u))ph^{\Game}(\tau^{\prime}(u)\mid\eta^{\prime}(u))\to p for some η(u)\eta^{\prime}(u). As in the proof of Proposition 2.13, we combine two games, but this time in series. On the first game 𝔊(h)\mathfrak{G}(h), Arthur and Nimue follow their strategies (τη)(\tau\mid\eta) with one exception: Even if the strategy τ\tau declares termination uu, then Arthur do not declare termination, but move on to the next game which is also 𝔊(h)\mathfrak{G}(h). Then Arthur and Nimue next follow their strategies (τ(u)η(u))(\tau^{\prime}(u)\mid\eta^{\prime}(u)) with one exception: If the strategy τ\tau declares termination vv, then Arthur declares termination with φe(u)(v)\varphi_{e^{\prime}(u)}(v). Note that if Merlin obeys the rule, then we always have φe(u)(v)p\varphi_{e^{\prime}(u)}(v)\in p. This can be viewed as a single game which is also 𝔊(h)\mathfrak{G}(h), and we write (τ′′η′′)(\tau^{\prime\prime}\mid\eta^{\prime\prime}) for the Arthur-Nimue strategy described above. It is easy to check that (τ′′η′′)dom(h)(\tau^{\prime\prime}\mid\eta^{\prime\prime})\in{\rm dom}(h^{\Game}), and if wh(τ′′η′′)w\in h^{\Game}(\tau^{\prime\prime}\mid\eta^{\prime\prime}) then wpw\in p. Therefore, the identity map realizes h(τ′′η′′)ph^{\Game}(\tau^{\prime\prime}\mid\eta^{\prime\prime})\to p. Hence, τ′′,idh(p)\langle\tau^{\prime\prime},{\rm id}\rangle\in h^{\Game\to}(p). Clearly, ττ′′\tau\mapsto\tau^{\prime\prime} is computable, and thus an index of the computable function τ,eτ′′,id\langle\tau,e\rangle\mapsto\langle\tau^{\prime\prime},{\rm id}\rangle realizes hh(p)h(p)h^{\Game\to}h^{\Game\to}(p)\to h^{\Game\to}(p) for all pp. ∎

For any monotone function β:ΩΩ\beta\colon\Omega\to\Omega, consider L(β)=βL(\beta)=\beta^{\leftarrow\Game\to}. By the above observation, L(β)L(\beta) is always a topology.

Theorem 3.4 (see also [24, Proposition 1.2]).

Let β:ΩΩ\beta\colon\Omega\to\Omega be a computably monotone function. Then, L(β)L(\beta) is the rea\leq_{\rm rea}-least topology such that L(β)reaβL(\beta)\geq_{\rm rea}\beta.

Proof.

First, since βLT1β\beta^{\leftarrow}\leq^{1}_{LT}\beta^{\leftarrow\Game}, we have βreaβreaβ=L(β)\beta\equiv_{\rm rea}\beta^{\leftarrow\to}\leq_{\rm rea}\beta^{\leftarrow\Game\to}=L(\beta) by Theorem 3.1; that is, βreaL(β)\beta\leq_{\rm rea}L(\beta) always holds. Thus, it remains to show that βreaj\beta\leq_{\rm rea}j implies L(β)reajL(\beta)\leq_{\rm rea}j for any topology jj. To prove this, as in [24, Proposition 1.2], consider the following:

L(β)(p):=q[[(pq)(β(q)q)]q].L^{\prime}(\beta)(p):=\forall q\ [[(p\to q)\land(\beta(q)\to q)]\to q].

As shown in [24, Proposition 1.2], βreaj\beta\leq_{\rm rea}j implies L(β)reajL^{\prime}(\beta)\leq_{\rm rea}j. Hence, it remains to show L(β)reaL(β)L(\beta)\leq_{\rm rea}L^{\prime}(\beta). Here, recall that a realizer for L(β)(p)=β(p)L(\beta)(p)=\beta^{\leftarrow\Game\rightarrow}(p) is a pair 𝚍,𝚎\langle{\tt d},{\tt e}\rangle of an inner reduction 𝚍{\tt d} and an outer reduction 𝚎{\tt e} for p˙LT1β\dot{p}\leq^{1}_{LT}\beta^{\leftarrow\Game}, i.e., 𝚎{\tt e} realizes β(𝚍c)p\beta^{\leftarrow\Game}({\tt d}\mid c)\to p for some cc. In this case, we must have (𝚍c)dom(β)({\tt d}\mid c)\in{\rm dom}(\beta^{\leftarrow\Game}), which means that (𝚍c)({\tt d}\mid c) is a winning Arthur-Nimue strategy for the game 𝔊(β)\mathfrak{G}(\beta^{\leftarrow}).

To compute a realizer of L(β)(p)L^{\prime}(\beta)(p), assume that we are given a realizer 𝚊{\tt a} of pqp\to q and a realizer 𝚋{\tt b} of β(q)q\beta(q)\to q in the premise of L(β)(p)L^{\prime}(\beta)(p), which are independent of qq. On some play of the game 𝔊(β)\mathfrak{G}(\beta^{\leftarrow}), if (nz)(n\mid z) is Arthur and Nimue’s queries to β\beta^{\leftarrow} in their moves (without declaring termination) at some round, then we have (nz)dom(β)(n\mid z)\in{\rm dom}(\beta^{\leftarrow}), which means that nβ(z)n\in\beta(z) and β(nz)=z\beta^{\leftarrow}(n\mid z)=z. Since 𝚋{\tt b} realizes β(z)z\beta(z)\to z, we have 𝚋nβ(nz){\tt b}\cdot n\in\beta^{\leftarrow}(n\mid z). Hence, 𝚋{\tt b} yields Merlin’s strategy which obeys the rule. Therefore, one can simulate one of the plays of the game 𝔊(β)\mathfrak{G}(\beta^{\leftarrow}) from the information in d, c, and b. Since (𝚍c)({\tt d}\mid c) is a winning Arthur-Nimue strategy, and Merlin’s strategy b obeys the rule, Arthur declares termination at some round along this play. In particular, one can compute Arthur’s final move in this play, which yields some mβ(𝚍c)m\in\beta^{\leftarrow\Game}({\tt d}\mid c). By applying e to this result, we can get a realizer for pp. Furthermore, by applying a to this result, we get a realizer for qq. This procedure yields a realizer for L(β)(p)L(β)(p)L(\beta)(p)\to L^{\prime}(\beta)(p) independent of pp, and thus, L(β)L(β)L(\beta)\to L^{\prime}(\beta) is realizable. ∎

As in [24], we define

αLβαreaL(β).\alpha\leq_{\rm L}\beta\iff\alpha\leq_{\rm rea}L(\beta).

In summary, for bilayer functions ff and gg, we obtain

fLTgfLT1gfreag=L(g)fLg.f\leq_{LT}g\iff f\leq^{1}_{LT}g^{\Game}\iff f^{\to}\leq_{\rm rea}g^{\Game\to}=L(g^{\to})\iff f^{\to}\leq_{\rm L}g^{\to}.

Here, the first equivalence follows from Proposition 2.15, and the second one follows from Theorem 3.1. As any computably monotone function is rea\equiv_{\rm rea}-equivalent to a function of the form ff^{\to}, this concludes the following:

Corollary 3.5.

The poset reflections of the following preorders are isomorphic:

  • The bilayered Turing preorder LT\leq_{LT} on bilayer functions.

  • The preorder L\leq_{\rm L} on computably monotone functions on Ω\Omega.

  • The preorder rea\leq_{\rm rea} on Lawvere-Tierney topologies.

In summary, for any bilayer function gg, the map gg^{\Game\rightarrow} which, given a problem pp, returns a problem asking us to giving an Arthur’s winning strategy for p˙LTg\dot{p}\leq_{LT}g is always a Lawvere-Tierney topology, and conversely, every Lawvere-Tierney topology on the effective topos can be described in this way.

4. On the structures of Lawvere-Tierney topologies

4.1. Turing degrees of choices from co-mm-tons

If the domain (for public inputs) of a bilayer function gg is a singleton (i.e., an input is always of the form (c)(\ast\mid c)), then we call gg a basic bilayer function. In this section, we deal with the basic bilayer function 𝙴𝚛𝚛𝚘𝚛m/k{\tt Error}_{m/k} for m<km<k\in\mathbb{N} defined by

dom(𝙴𝚛𝚛𝚘𝚛m/k)\displaystyle{\rm dom}({\tt Error}_{m/k}) ={(A):A{0,,k1}|A|=m},\displaystyle=\{(\ast\mid A):A\subseteq\{0,\dots,k-1\}\;\land\;|A|=m\},
𝙴𝚛𝚛𝚘𝚛m/k(A)\displaystyle{\tt Error}_{m/k}(\ast\mid A) ={0,,k1}A\displaystyle=\{0,\dots,k-1\}\setminus A

This is a problem such that mm of the kk choices are wrong. In particular, one-query 𝙴𝚛𝚛𝚘𝚛m/k{\tt Error}_{m/k}-relative computation is the one in which kk computations are run in parallel, mm of which may be wrong. Note that the basic bilayer function 𝙴𝚛𝚛𝚘𝚛m/k{\tt Error}_{m/k} is denoted as 𝒪mk\mathcal{O}^{k}_{m} in [24]. Lee-van Oosten [24] proposed to study the structure of ({𝙴𝚛𝚛𝚘𝚛m/k}m<k,rea,L)(\{{\tt Error}_{m/k}^{\to}\}_{m<k},\leq_{\rm rea},\leq_{\rm L}). By Theorem 3.1 and Corollary 3.5, this is the same as the examining the structure of ({𝙴𝚛𝚛𝚘𝚛m/k}m<k,LT1,LT)(\{{\tt Error}_{m/k}\}_{m<k},\leq^{1}_{LT},\leq_{LT}).

Of course, the basic bilayer function 𝙴𝚛𝚛𝚘𝚛m/k{\tt Error}_{m/k} is closely related to the well-known notion, the lessor limited principle of omniscience (recall Example 2.5). Here, we consider its generalization:

dom(𝙻𝙻𝙿𝙾m/k)\displaystyle{\rm dom}({\tt LLPO}_{m/k}) ={e:|{j<k:φe(j)}|m},\displaystyle=\{e\in\mathbb{N}:|\{j<k:\varphi_{e}(j)\downarrow\}|\leq m\},
𝙻𝙻𝙿𝙾m/k(e)\displaystyle{\tt LLPO}_{m/k}(e) ={0,,k1}{j<k:φe(j)}.\displaystyle=\{0,\dots,k-1\}\setminus\{j<k:\varphi_{e}(j)\downarrow\}.

Clearly, 𝙻𝙻𝙿𝙾{\tt LLPO} is equivalent to 𝙻𝙻𝙿𝙾1/2{\tt LLPO}_{1/2}. The principle 𝙻𝙻𝙿𝙾1/{\tt LLPO}_{1/\ell} is first introduced in Richman [34], and extensively studied in constructive mathematics and related areas. For the computability-theoretic study, see Brattka-Gherardi-Pauly [6]. Note that one can deduce several results on the structure of ({𝙻𝙻𝙿𝙾m/k}m<k,LT1)(\{{\tt LLPO}_{m/k}\}_{m<k},\leq^{1}_{LT}) from the work by Cenzer-Hinman [8].

One may relativize 𝙻𝙻𝙿𝙾m/k{\tt LLPO}_{m/k} by replacing φe\varphi_{e} with φeα\varphi_{e}^{\alpha} for a given oracle α2\alpha\in 2^{\mathbb{N}}, and then the resulting function is denoted by 𝙻𝙻𝙿𝙾m/kα{\tt LLPO}^{\alpha}_{m/k}. Recall from Example 2.7 that a partial multifunction can be thought of as a bilayer function. The following is obvious:

Observation 4.1.

For any oracle α\alpha, 𝙻𝙻𝙿𝙾m/kαLT1𝙴𝚛𝚛𝚘𝚛m/k{\tt LLPO}^{\alpha}_{m/k}\leq^{1}_{LT}{\tt Error}_{m/k}.

If α=\alpha=\emptyset, we can do a little better.

Proposition 4.2.

𝙻𝙻𝙿𝙾m/kLT1𝙴𝚛𝚛𝚘𝚛m/k+1{\tt LLPO}_{m/k}\leq^{1}_{LT}{\tt Error}_{m/k+1}.

Proof.

We define a secret inner reduction LL as follows: For any edom(𝙻𝙻𝙿𝙾m/k)e\in{\rm dom}({\tt LLPO}_{m/k}),

L(e)={{j<k:φe(j)} if |{j<k:φe(j)}|=m{j<k:φe(j)}{k} if |{j<k:φe(j)}|<mL(e)=\begin{cases}\{j<k\colon\varphi_{e}(j)\downarrow\}&\mbox{ if }|\{j<k\colon\varphi_{e}(j)\downarrow\}|=m\\ \{j<k\colon\varphi_{e}(j)\downarrow\}\cup\{k\}&\mbox{ if }|\{j<k\colon\varphi_{e}(j)\downarrow\}|<m\end{cases}

One can easily check that (L(e))(\ast\mid L(e)) belongs to the domain of 𝙴𝚛𝚛𝚘𝚛m/k+1{\tt Error}_{m/k+1}. For an outer reduction KK, define K(e,j)=jK(e,j)=j for any j<kj<k. To compute K(e,k)K(e,k), wait for finding mm many j<kj<k such that φe(j)\varphi_{e}(j)\downarrow. If it is found at some stage, then K(e,k)K(e,k) is defined as the least <k\ell<k such that jj\not=\ell for any such j<kj<k, so K(e,k)=K(e,k)\downarrow=\ell implies φe(j)\varphi_{e}(j)\uparrow. Otherwise, the computation never terminates, i.e., K(e,k)K(e,k)\uparrow.

We claim that L,K\langle L,K\rangle witnesses 𝙻𝙻𝙿𝙾m/kLT1𝙴𝚛𝚛𝚘𝚛m/k+1{\tt LLPO}_{m/k}\leq^{1}_{LT}{\tt Error}_{m/k+1}. Assume a𝙴𝚛𝚛𝚘𝚛m/k+1(L(e))a\in{\tt Error}_{m/k+1}(\ast\mid L(e)). If a<ka<k then we have K(e,a)=a{j<k:φe(j)}K(e,a)=a\not\in\{j<k\colon\varphi_{e}(j)\downarrow\}; hence K(e,a)𝙻𝙻𝙿𝙾m/kK(e,a)\in{\tt LLPO}_{m/k}. If a=ka=k then by our definition of L(e)L(e), we must have |{j<k:φe(j)}|=m|\{j<k\colon\varphi_{e}(j)\downarrow\}|=m. The computation for K(e,a)K(e,a) eventually recognizes this fact at some stage, and this implies that K(e,a){j<k:φe(j)}K(e,a)\not\in\{j<k\colon\varphi_{e}(j)\downarrow\}; hence K(e,a)𝙻𝙻𝙿𝙾m/kK(e,a)\in{\tt LLPO}_{m/k}. ∎

In particular, we get 𝙻𝙻𝙿𝙾LT1𝙴𝚛𝚛𝚘𝚛1/3{\tt LLPO}\leq^{1}_{LT}{\tt Error}_{1/3}. One can easily see that the above proof indeed shows that 𝙻𝙻𝙿𝙾m/kLT1𝙻𝙻𝙿𝙾m/k+1{\tt LLPO}_{m/k}\leq^{1}_{LT}{\tt LLPO}^{\emptyset^{\prime}}_{m/k+1}. However, it cannot be improved any further. To prove this, we need a little preparation. We say that a tree T<T\subseteq\mathbb{N}^{<\mathbb{N}} is nn-fat if any node σT\sigma\in T which is not a leaf has at least nn many immediate successors. We use the following easy combinatorial fact, which is a slight modification of Cenzer-Hinman [8, Proposition 2.9] (see also Lemma 5.7 below).

Fact 4.3.

For ,m\ell,m\in\mathbb{N}, let TT be an (m+1)(m\cdot\ell+1)-fat finite tree, and LTL_{T} be the set of all leaves of TT. Assume that every leaf of TηT_{\eta} has the same length. Then, for any function f:LTf\colon L_{T}\to\ell there exists an (m+1)(m+1)-fat tree STS\subseteq T such that ff is constant on the leaves of SS.

Proposition 4.4.

𝙻𝙻𝙿𝙾1/LT𝙴𝚛𝚛𝚘𝚛1/+2{\tt LLPO}_{1/\ell}\not\leq_{LT}{\tt Error}_{1/\ell+2}.

Proof.

The proof is by a typical recursion trick; see [21]. Suppose for the sake of contradiction that there exists a winning Arthur-Nimue strategy (τη)(\tau\mid\eta) witnessing 𝙻𝙻𝙿𝙾1/LT𝙴𝚛𝚛𝚘𝚛1/+2{\tt LLPO}_{1/\ell}\leq_{LT}{\tt Error}_{1/\ell+2}. Except for the first move ee, Merlin’s move is always a number j<+2j<\ell+2, which yields the tree (+2)<(\ell+2)^{<\mathbb{N}} of all possible moves by Merlin. Fix ee, and then Arthur’s strategy τ\tau yields a partial computable function Φτ:(+2)<\Phi_{\tau}\colon\!\!\!\subseteq(\ell+2)^{<\mathbb{N}}\to\mathbb{N}, where Φτ(σ)=u\Phi_{\tau}(\sigma)\downarrow=u if and only if, after reading Merlin’s moves σ\sigma, Arthur’s strategy τ\tau declares termination with uu. Moreover, as Nimue makes a secret input A(+2)A\subseteq(\ell+2) for 𝙴𝚛𝚛𝚘𝚛1/+2{\tt Error}_{1/\ell+2} at each round, Nimue’s strategy η\eta restricts Merlin’s possible moves to an (+1)(\ell+1)-fat finite subtree TηT_{\eta} of (+2)<(\ell+2)^{<\mathbb{N}}, where after Arthur declares termination, Nimue makes no further moves; hence if σTη\sigma\in T_{\eta} and Φτ(σ)\Phi_{\tau}(\sigma)\downarrow then σ\sigma has to be a leaf of TηT_{\eta}. On the other hand, if Arthur does not declare termination, then Nimue makes the next move, so Φτ\Phi_{\tau} restricted to the leaves LηL_{\eta} of TηT_{\eta} yields a total function from LηL_{\eta} to \ell. One can assume that every leaf of TηT_{\eta} has the same length: Otherwise, let tt be the length of a longest node of TηT_{\eta}, and for each leaf ρ\rho of TηT_{\eta} of length s<ts<t, place a full (+1)(\ell+1)-branching tree of height tst-s on the leaf ρ\rho. Then, for a leaf ρ\rho of the resulting tree TηT^{\ast}_{\eta}, define Φτ(ρ)\Phi^{\ast}_{\tau}(\rho) as the value Φτ(ρ)\Phi_{\tau}(\rho^{\ast}) for the unique initial segment ρ\rho^{\ast} of ρ\rho such that ρLη\rho^{\ast}\in L_{\eta}. Then replace TηT_{\eta} with TηT_{\eta}^{\ast} if necessary.

Since Φτ\Phi_{\tau} is \ell-valued, and TηT_{\eta} is (+1)(\ell+1)-fat, by Fact 4.3, there exists a 22-fat subtree SS of TηT_{\eta} of the same height such that Φτ\Phi_{\tau} is constant on the leaves of SS. Recall that Φτ\Phi_{\tau} depends on ee, so there exists a computable function dd such that Φτ=φd(e)\Phi_{\tau}=\varphi_{d(e)}. Now, we construct an algorithm r(e)r(e) as follows: By brute-force, Merlin searches for a 22-fat finite subtree SS of (+2)<(\ell+2)^{<\mathbb{N}} such that φd(e)\varphi_{d(e)} is total and constant on the leaves of SS. Let j<j<\ell be the unique value of φd(e)\varphi_{d(e)} on the leaves of SS. Then, we declare that φr(e)(j)\varphi_{r(e)}(j) halts, and φr(e)(k)\varphi_{r(e)}(k) never halts for kjk\not=j.

Since Nimue’s move reduces the number of possible moves for Merlin by at most one at each round, and SS is 22-fat, SS contains Merlin’s correct moves in a play following (τη)(\tau\mid\eta) as a path ρS\rho\in S. Since (τη)(\tau\mid\eta) is winning, φd(e)(ρ)=Φτ(ρ)=j𝙻𝙻𝙿𝙾1/(e)\varphi_{d(e)}(\rho)=\Phi_{\tau}(\rho)=j\in{\tt LLPO}_{1/\ell}(e) since ee is Merlin’s first move. This means that φe(j)\varphi_{e}(j)\uparrow. However, by the Kleene recursion theorem (see e.g. [10, Theorem 4.1.1] or [30, Theorem II.2.10]), there exists ee such that φe=φr(e)\varphi_{e}=\varphi_{r(e)}, and by our definition, we have φr(e)\varphi_{r(e)}\downarrow. This is a contradiction. ∎

This also shows that 𝙻𝙻𝙿𝙾1/LT𝙴𝚛𝚛𝚘𝚛1/+1{\tt LLPO}^{\emptyset^{\prime}}_{1/\ell}\not\leq_{LT}{\tt Error}_{1/\ell+1}.

Definition 4.5.

For a partial multifunction ff and a basic bilayer function gg, we define a bilayer function (fg)(f\mid g) as follows:

(fg)(nc)=f(n)×g(c).(f\mid g)(n\mid c)=f(n)\times g(\ast\mid c).

A similar argument as above also shows the following:

Proposition 4.6.

𝙴𝚛𝚛𝚘𝚛1/LT(f𝙴𝚛𝚛𝚘𝚛1/+1){\tt Error}_{1/\ell}\not\leq_{LT}(f\mid{\tt Error}_{1/\ell+1}) for any partial multifunction ff.

Proof.

Note that any partial multifunction ff is one-query Turing reducible to a single-valued function. This is because any choice function for ff refines ff. Thus, without loss of generality, one can assume that ff is a single-valued function.

Suppose for the sake of contradiction that there exists there exists a winning Arthur-Nimue strategy (τη)(\tau\mid\eta). Except for the first move cc, the second coordinate of Merlin’s move is always a number j<+1j<\ell+1, which yields the tree (+1)<(\ell+1)^{<\mathbb{N}} of all possible moves. Given Arthur’s moves, the first coordinates of the corresponding moves by Merlin are computable in ff. Therefore, Arthur’s strategy τ\tau and the corresponding responses by Merlin yield a partial ff-computable function Φτf:(+1)<\Phi^{f}_{\tau}\colon\!\!\!\subseteq(\ell+1)^{<\mathbb{N}}\to\mathbb{N}, where Φτf(σ)=u\Phi^{f}_{\tau}(\sigma)\downarrow=u if and only if, after reading Merlin’s moves whose second coordinates are σ\sigma, Arthur’s strategy τ\tau declares termination with uu. Moreover, Nimue’s strategy η\eta restricts second coordinates of Merlin’s possible moves to an finite subtree TηT_{\eta} of (+1)<(\ell+1)^{<\mathbb{N}}. As in the proof of Proposition 4.4, one can assume that every leaf of TηT_{\eta} has the same length tt. Then, Φτf\Phi_{\tau}^{f} restricted to Tη(+1)tT_{\eta}\cap(\ell+1)^{t} yields a total function from Tη(+1)tT_{\eta}\cap(\ell+1)^{t} to \ell. By considering min{Φτf(σ),1}\min\{\Phi^{f}_{\tau}(\sigma),\ell-1\}, one can assume that Φτf\Phi^{f}_{\tau} is a partial \ell-valued function even if we consider an input σTη(+1)t\sigma\not\in T_{\eta}\cap(\ell+1)^{t}. By Fact 4.3 applied to any totalization of Φτf\Phi^{f}_{\tau}, one can see that there exists a 22-fat subtree SS of (+1)t(\ell+1)^{t} of the same height such that Φτf\Phi^{f}_{\tau} takes at most one value (or undefined) on the leaves of SS (where Φτf\Phi_{\tau}^{f} can be partial).

Let j<j<\ell be the only possible value of Φτf\Phi_{\tau}^{f} on the leaves of SS. Note that this value only depends on Arthur’s strategy τ\tau; hence it is independent of Merlin’s first move cc. Since Nimue’s move reduces the number of possible moves for Merlin by at most one at each round, and SS is 22-fat, SS contains the second coordinates of Merlin’s correct moves in a play following (τη)(\tau\mid\eta) as a path ρS\rho\in S. Since (τη)(\tau\mid\eta) is winning, Φτf(ρ)\Phi_{\tau}^{f}(\rho) is defined, and jj is the only possible value. Hence j𝙴𝚛𝚛𝚘𝚛1/(c)j\in{\tt Error}_{1/\ell}(c) since cc is Merlin’s first move. However, this value jj is independent of cc, which is a contradiction. ∎

One can apply combinatorial techniques developed in [8] to prove the following:

Theorem 4.7.

𝙴𝚛𝚛𝚘𝚛m/kLT𝙴𝚛𝚛𝚘𝚛1/{\tt Error}_{m/k}\equiv_{LT}{\tt Error}_{1/\ell}, where =km\ell=\lceil\frac{k}{m}\rceil.

This solves all problems asked in Lee-van Oosten [24, Open problems in pages 876–877].

Proof of Theorem 4.7.

As in Cenzer-Hinman [8, Proposition 2.4], one can easily see that km\lceil\frac{k}{m}\rceil\leq\ell implies 𝙴𝚛𝚛𝚘𝚛1/LT1𝙴𝚛𝚛𝚘𝚛m/k{\tt Error}_{1/\ell}\leq^{1}_{LT}{\tt Error}_{m/k}. Now, let us think of 𝙴𝚛𝚛𝚘𝚛m/k{\tt Error}_{m/k} as a problem of choosing a surviving block, where there are kk blocks and one may secretly destroy at most mm of them. As a variant of this problem, consider 𝙴𝚛𝚛𝚘𝚛m/k;n{\tt Error}_{m/k;n}, where there are kk blocks as above, but nn of them are hard blocks. One can secretly hit blocks mm times, and while a normal block will break in one hit, a hard block will only break if we hit it all mm times. The information about which blocks are hard is given as a public input aii<n\langle a_{i}\rangle_{i<n}, and the information on which blocks to hit is given as a secret input cjj<m\langle c_{j}\rangle_{j<m}, where ai,cj<ka_{i},c_{j}<k for any i<ni<n and j<mj<m. Formally,

a𝙴𝚛𝚛𝚘𝚛m/k;n(aii<ncjj<m){a{cj}j<m if a{ai}i<n,{a}={cj}j<m if a{ai}i<n.a\not\in{\tt Error}_{m/k;n}(\langle a_{i}\rangle_{i<n}\mid\langle c_{j}\rangle_{j<m})\iff\begin{cases}a\in\{c_{j}\}_{j<m}&\mbox{ if }a\not\in\{a_{i}\}_{i<n},\\ \{a\}=\{c_{j}\}_{j<m}&\mbox{ if }a\in\{a_{i}\}_{i<n}.\end{cases}

This notion is an analogue of a sequence of type (m,n)(m,n) in [8, Theorem 2.6]. Now assume that there are kk blocks, of which nn are hard blocks. Consider an operation of consolidating mm of the normal blocks into a single hard block. Then we now have km+1k-m+1 blocks, since we have consolidated mm blocks into one. The number of normal blocks remaining is =knm\ell=k-n-m, and the number of hard blocks is n+1n+1. One can secretly hit a block mm times, but assuming that a hard block will always break if one hits it all the times does not change the difficulty of the problem, so one can assume that the number of times we hit it is m=min{,m}m^{\ast}=\min\{\ell,m\}. This consolidating operation transforms an instance of 𝙴𝚛𝚛𝚘𝚛m/k;n{\tt Error}_{m/k;n} into an instance of 𝙴𝚛𝚛𝚘𝚛m/km+1;n+1{\tt Error}_{m^{\ast}/k-m+1;n+1}.

The join fgf\sqcup g of bilayer functions ff and gg is defined as follows:

{(fg)(0,nc)=f(nc),(fg)(1,nc)=g(nc).\begin{cases}(f\sqcup g)(\langle 0,n\rangle\mid c)=f(n\mid c),\\ (f\sqcup g)(\langle 1,n\rangle\mid c)=g(n\mid c).\end{cases}

The next claim corresponds to the formula (6) in Cenzer-Hinman [8, Theorem 2.6].

Claim.

𝙴𝚛𝚛𝚘𝚛m/k;nLT𝙴𝚛𝚛𝚘𝚛m/km+1;n+1𝙴𝚛𝚛𝚘𝚛m1/k;n{\tt Error}_{m/k;n}\leq_{LT}{\tt Error}_{m^{\ast}/k-m+1;n+1}\sqcup{\tt Error}_{m-1/k;n}.

Proof.

Assume that an input (aii<ncjj<m)(\langle a_{i}\rangle_{i<n}\mid\langle c_{j}\rangle_{j<m}) for 𝙴𝚛𝚛𝚘𝚛m/k;n{\tt Error}_{m/k;n} is given. There are only a finite number of patterns of consolidating mm normal blocks, and the location information of the nn hard blocks is given as a public input. Therefore, by brute-force, Arthur can try all patterns of consolidating mm normal blocks. If the number of patterns is ss, at the first ss rounds, Arthur and Nimue make queries to 𝙴𝚛𝚛𝚘𝚛m/km+1;n+1{\tt Error}_{m^{\ast}/k-m+1;n+1}. For such a round, Arthur chooses mm normal blocks bii<m\langle b_{i}\rangle_{i<m}, i.e., {bi}i<m{ai}i<n=\{b_{i}\}_{i<m}\cap\{a_{i}\}_{i<n}=\emptyset, and consolidate them into a single hard block bb. Then Nimue hits the new blocks according to the original secret input cjj<m\langle c_{j}\rangle_{j<m}; that is, if cj{bi}i<mc_{j}\not\in\{b_{i}\}_{i<m} then cj=cjc_{j}^{\prime}=c_{j}, and if cj{bi}i<mc_{j}\in\{b_{i}\}_{i<m} then cj=bc_{j}^{\prime}=b. Then, Nimue’s next move is given by cjj<m\langle c_{j}^{\prime}\rangle_{j<m}.

If Merlin’s response uu is not bb at some round, then uu is a solution to the original problem, so Arthur declares termination with uu. If Merlin’s response uu is the new consolidated hard block bb at each round, then the original secret input cjj<m\langle c_{j}\rangle_{j<m} does not hit mm normal blocks. This is because if cjj<m\langle c_{j}\rangle_{j<m} hits mm normal blocks then 𝙰𝚛𝚝𝚑𝚞𝚛{\tt Arthur} consolidates these mm blocks into a single hard block bb at some round, and so Nimue hits the new hard block mm times. This means that Nimue breaks bb, so bb is not acceptable as Merlin’s response. Hence, the original secret input cjj<m\langle c_{j}\rangle_{j<m} hits at most m1m-1 normal blocks, so (aii<ncjj<m)(\langle a_{i}\rangle_{i<n}\mid\langle c_{j}\rangle_{j<m}) can also be thought of as an input of 𝙴𝚛𝚛𝚘𝚛m1/k;n{\tt Error}_{m-1/k;n}. Thus, at round s+1s+1, Arthur use aii<n\langle a_{i}\rangle_{i<n} and Nimue use cjj<m\langle c_{j}\rangle_{j<m} as a query to 𝙴𝚛𝚛𝚘𝚛m1/k;n{\tt Error}_{m-1/k;n}, and then Merlin’s response uu must be a solution to (aii<ncjj<m)(\langle a_{i}\rangle_{i<n}\mid\langle c_{j}\rangle_{j<m}). Then, Arthur declares termination with uu. This is a winning Arthur-Nimue strategy witnessing 𝙴𝚛𝚛𝚘𝚛m/k;nLT𝙴𝚛𝚛𝚘𝚛m/km+1;n+1𝙴𝚛𝚛𝚘𝚛m1/k;n{\tt Error}_{m/k;n}\leq_{LT}{\tt Error}_{m^{\ast}/k-m+1;n+1}\sqcup{\tt Error}_{m-1/k;n}. ∎

The next claim corresponds to the formula (11) in Cenzer-Hinman [8, Theorem 2.6].

Claim.

If q=knm+nq=\lceil\frac{k-n}{m}\rceil+n then 𝙴𝚛𝚛𝚘𝚛m/k;nLT𝙴𝚛𝚛𝚘𝚛1/q{\tt Error}_{m/k;n}\leq_{LT}{\tt Error}_{1/q}.

Proof.

If m=1m=1 then q=kq=k and there is no difference between normal blocks and hard blocks; hence 𝙴𝚛𝚛𝚘𝚛1/k;nLT𝙴𝚛𝚛𝚘𝚛1/k{\tt Error}_{1/k;n}\leq_{LT}{\tt Error}_{1/k}. We prove the claim by induction on mm and kk. By the induction hypothesis, if we put q0=(km+1)(n+1)m+n+1q_{0}=\lceil\frac{(k-m+1)-(n+1)}{m^{\ast}}\rceil+n+1 and q1=knm1+nq_{1}=\lceil\frac{k-n}{m-1}\rceil+n, then

𝙴𝚛𝚛𝚘𝚛m/km+1;n+1LT𝙴𝚛𝚛𝚘𝚛1/q0\displaystyle{\tt Error}_{m^{\ast}/k-m+1;n+1}\leq_{LT}{\tt Error}_{1/q_{0}}
𝙴𝚛𝚛𝚘𝚛m1/k;nLT𝙴𝚛𝚛𝚘𝚛1/q1\displaystyle{\tt Error}_{m-1/k;n}\leq_{LT}{\tt Error}_{1/q_{1}}

We clearly have q1qq_{1}\geq q, and moreover

q0=(km+1)(n+1)m+n+1(kmn)m+n+1=(kn)m+n=q.q_{0}=\left\lceil\frac{(k-m+1)-(n+1)}{m^{\ast}}\right\rceil+n+1\geq\left\lceil\frac{(k-m-n)}{m}\right\rceil+n+1=\left\lceil\frac{(k-n)}{m}\right\rceil+n=q.

Thus, q0,q1qq_{0},q_{1}\geq q and this implies that 𝙴𝚛𝚛𝚘𝚛1/q0,𝙴𝚛𝚛𝚘𝚛1/q1LT1𝙴𝚛𝚛𝚘𝚛1/q{\tt Error}_{1/q_{0}},{\tt Error}_{1/q_{1}}\leq^{1}_{LT}{\tt Error}_{1/q}. Hence, by the previous claim,

𝙴𝚛𝚛𝚘𝚛m/k;nLT𝙴𝚛𝚛𝚘𝚛m/km+1;n+1𝙴𝚛𝚛𝚘𝚛m1/k;nLT𝙴𝚛𝚛𝚘𝚛1/q0𝙴𝚛𝚛𝚘𝚛1/q1LT𝙴𝚛𝚛𝚘𝚛1/q𝙴𝚛𝚛𝚘𝚛1/qLT𝙴𝚛𝚛𝚘𝚛1/q.{\tt Error}_{m/k;n}\leq_{LT}{\tt Error}_{m^{\ast}/k-m+1;n+1}\sqcup{\tt Error}_{m-1/k;n}\\ \leq_{LT}{\tt Error}_{1/q_{0}}\sqcup{\tt Error}_{1/q_{1}}\leq_{LT}{\tt Error}_{1/q}\sqcup{\tt Error}_{1/q}\equiv_{LT}{\tt Error}_{1/q}.

This verifies the claim. ∎

In particular, if we put n=0n=0, then we have 𝙴𝚛𝚛𝚘𝚛m/kLT𝙴𝚛𝚛𝚘𝚛1/{\tt Error}_{m/k}\leq_{LT}{\tt Error}_{1/\ell} as =km\ell=\lceil\frac{k}{m}\rceil. This concludes the proof of Theorem 4.7. ∎

4.2. Non-existence of a minimal topology

We next consider the basic bilayer function 𝙴𝚛𝚛𝚘𝚛m/{\tt Error}_{m/\mathbb{N}} for mm\in\mathbb{N} defined by

dom(𝙴𝚛𝚛𝚘𝚛m/)\displaystyle{\rm dom}({\tt Error}_{m/\mathbb{N}}) ={(A):A|A|=m},\displaystyle=\{(\ast\mid A):A\subseteq\mathbb{N}\;\land\;|A|=m\},
𝙴𝚛𝚛𝚘𝚛m/(A)\displaystyle{\tt Error}_{m/\mathbb{N}}(\ast\mid A) =A\displaystyle=\mathbb{N}\setminus A

In Lee-van Oosten [24, Propositions 5.1 and 5.2], it is shown that 𝙴𝚛𝚛𝚘𝚛m/<LT1𝙴𝚛𝚛𝚘𝚛m+1/{\tt Error}_{m/\mathbb{N}}<^{1}_{LT}{\tt Error}_{m+1/\mathbb{N}}, but 𝙴𝚛𝚛𝚘𝚛1/LT𝙴𝚛𝚛𝚘𝚛m/{\tt Error}_{1/\mathbb{N}}\equiv_{LT}{\tt Error}_{m/\mathbb{N}}. Interestingly, as shown in [24, Proposition 5.5], 𝙴𝚛𝚛𝚘𝚛1/{\tt Error}_{1/\mathbb{N}} is the LT\leq_{LT}-least basic bilayer function which is strictly LT\geq_{LT}-above 𝙸𝚍{\tt Id}. However, we include bilayer functions, 𝙴𝚛𝚛𝚘𝚛1/{\tt Error}_{1/\mathbb{N}} is not the LT\leq_{LT}-least one. For instance, the basic bilayer function 𝙴𝚛𝚛𝚘𝚛1/{\tt Error}_{1/\mathbb{N}} is closely related to the notion called all-or-counique choice [6]:

dom(𝙰𝙲𝙲)=,𝙰𝙲𝙲(e)={{φe(e)} if φe(e) if φe(e){\rm dom}({\tt ACC})=\mathbb{N},\qquad{\tt ACC}(e)=\begin{cases}\mathbb{N}\setminus\{\varphi_{e}(e)\}&\mbox{ if $\varphi_{e}(e)\downarrow$}\\ \mathbb{N}&\mbox{ if $\varphi_{e}(e)\uparrow$}\end{cases}

One may relativize 𝙰𝙲𝙲{\tt ACC} by replacing φe\varphi_{e} with φeα\varphi_{e}^{\alpha} for a given oracle α2\alpha\in 2^{\mathbb{N}}, and then the resulting function is denoted by 𝙰𝙲𝙲α{\tt ACC}^{\alpha}. Again, we think of a partial multifunction as a bilayer function as in Example 2.7. The following is obvious:

Observation 4.8.

𝙸𝚍<LT𝙰𝙲𝙲α<LT𝙴𝚛𝚛𝚘𝚛1/{\tt Id}<_{LT}{\tt ACC}^{\alpha}<_{LT}{\tt Error}_{1/\mathbb{N}} for any oracle α\alpha.

Lee [23, Open Problem 3.5.18] asked if there is the least topology strictly above 𝙸𝚍{\tt Id}. By Corollary 3.5, it is the same as asking if there is the LT\leq_{LT}-least bilayer function which is strictly LT\geq_{LT}-above 𝙸𝚍{\tt Id}. If such a function exists, then it must be a non-basic bilayer function. To solve this problem, given a partial function g:g\colon\!\!\!\subseteq\mathbb{N}\to\mathbb{N}, we consider the following multifunction 𝙰𝚟𝚘𝚒𝚍g:{\tt Avoid}_{g}\colon\mathbb{N}\rightrightarrows\mathbb{N}:

𝙰𝚟𝚘𝚒𝚍g(n)={{g(n)} if ndom(g) otherwise.{\tt Avoid}_{g}(n)=\begin{cases}\mathbb{N}\setminus\{g(n)\}&\mbox{ if $n\in{\rm dom}(g)$}\\ \mathbb{N}&\mbox{ otherwise.}\end{cases}

We first show that there exists no T\leq_{T}-least partial multifunction which is strictly T\geq_{T}-above 𝙸𝚍{\tt Id}.

Lemma 4.9.

Let 𝙿:{\tt P}\colon\!\!\!\subseteq\mathbb{N}\rightrightarrows\mathbb{N} be a partial multifunction such that 𝙿>T𝙸𝚍{\tt P}>_{T}{\tt Id}. Then, there exists a total function g:g\colon\mathbb{N}\to\mathbb{N} such that

𝙸𝚍<T𝙰𝚟𝚘𝚒𝚍g and 𝙿T𝙰𝚟𝚘𝚒𝚍g.{\tt Id}<_{T}{\tt Avoid}_{g}\quad\mbox{ and }\quad{\tt P}\not\leq_{T}{\tt Avoid}_{g}.
Proof.

Let α𝙿\alpha_{\tt P}\in\mathbb{N}^{\mathbb{N}} be an oracle coding the full information of 𝙿{\tt P}. For instance,

α𝙿(n,m)={0 if ndom(𝙿)m𝙿(n)1 if ndom(𝙿)m𝙿(n)2 if ndom(𝙿)\alpha_{\tt P}(\langle n,m\rangle)=\begin{cases}0&\mbox{ if }n\in{\rm dom}({\tt P})\;\land\;m\not\in{\tt P}(n)\\ 1&\mbox{ if }n\in{\rm dom}({\tt P})\;\land\;m\in{\tt P}(n)\\ 2&\mbox{ if }n\not\in{\rm dom}({\tt P})\\ \end{cases}

Let g:2g\colon\mathbb{N}\to 2 be an α𝙿\alpha_{\tt P}-generic real (that is, gg is contained in any dense α𝙿\alpha_{\tt P}-computable open set in Cantor space 22^{\mathbb{N}}, and such a gg exists by the Baire category theorem). By genericity, for any computable function ff, there are infinitely many nn such that f(n)=g(n)f(n)=g(n); hence 𝙸𝚍<T𝙰𝚟𝚘𝚒𝚍g{\tt Id}<_{T}{\tt Avoid}_{g}. Suppose for the sake of contradiction that Arthur has a winning strategy Ψ\Psi for 𝙿T𝙰𝚟𝚘𝚒𝚍g{\tt P}\leq_{T}{\tt Avoid}_{g}. Then we show the following claim:

Claim.

For any ss\in\mathbb{N}, there exist nn\in\mathbb{N} and σ<\sigma\in\mathbb{N}^{<\mathbb{N}} such that

minσ>sΨ(n,σ)=1,y𝙿(n)y𝙿(n),\min\sigma>s\;\land\;\Psi(n,\sigma)\downarrow=\langle 1,y\rangle\;\land\;{\tt P}(n)\downarrow\;\land\;y\not\in{\tt P}(n),

where recall that by Ψ(n,σ)=1,y\Psi(n,\sigma)=\langle 1,y\rangle we mean that, after reading Merlin’s moves (n,σ)(n,\sigma), Arthur declares termination with yy.

Proof.

Otherwise, there is a number ss refuting the claim. Let Ψ1(n,σ)\Psi_{1}(n,\sigma) denote the second coordinate of Ψ(n,σ)\Psi(n,\sigma). Let us consider a sequence a0,a1,a_{0},a_{1},\dots such that a+1𝙰𝚟𝚘𝚒𝚍g(Ψ1(n,a0,a1,,a))a_{\ell+1}\in{\tt Avoid}_{g}(\Psi_{1}(n,a_{0},a_{1},\dots,a_{\ell})) for any \ell, i.e., ai\langle a_{i}\rangle is Merlin’s moves obeying the rule. It is clear that there always exists such an a>sa_{\ell}>s since 𝙰𝚟𝚘𝚒𝚍g{\tt Avoid}_{g} only reduces the number of possible values by one. Since Ψ\Psi is winning, after reading a finite initial segment of the sequence ai\langle a_{i}\rangle, Arthur declares termination; that is, Ψ(n,a0,a1,,a)=1,y\Psi(n,a_{0},a_{1},\dots,a_{\ell})=\langle 1,y\rangle for some \ell and yy.

In particular, there exists σ\sigma with minσ>s\min\sigma>s such that Ψ(n,σ)=1,y\Psi(n,\sigma)\downarrow=\langle 1,y\rangle for some yy. Given nn, without knowing the information about gg, one can effectively find such a σ\sigma by brute-force. Then define f(n)f(n) as Ψ1(n,σ)\Psi_{1}(n,\sigma). Clearly, ff is a computable function. However, since the claim is supposed to fail, we have either 𝙿(n){\tt P}(n)\uparrow or f(n)=y𝙿(n)f(n)=y\in{\tt P}(n). Hence, the computable function ff refines 𝙿{\tt P}, which means 𝙿T𝙸𝚍{\tt P}\leq_{T}{\tt Id}. However this contradicts our assumption on 𝙿{\tt P}. ∎

Given ss, one can find an nn and a σ\sigma in the above claim in an α𝙿\alpha_{\tt P}-computable manner since α𝙿\alpha_{\tt P} contains the full information of 𝙿{\tt P}. For a given tt, put s(t)=max{g(n):n<t}s(t)=\max\{g(n):n<t\}, and for this s=s(t)s=s(t), we write ntn_{t} and σt=(ait)i<\sigma_{t}=(a^{t}_{i})_{i<\ell} for nn and σ\sigma in the claim. By the above claim, after reading Merlin’s play (nt,σt)(n_{t},\sigma_{t}), Arthur’s strategy Ψ\Psi declares termination, but fails to compute a solution of 𝙿{\tt P}. However, since Ψ\Psi is a winning strategy for 𝙿T𝙰𝚟𝚘𝚒𝚍g{\tt P}\leq_{T}{\tt Avoid}_{g}, Merlin must have violated the rule at some round. In other words, there exists j<j<\ell such that aj+1t𝙰𝚟𝚘𝚒𝚍g(Ψ1(n,a0t,a1t,,ajt))a_{j+1}^{t}\not\in{\tt Avoid}_{g}(\Psi_{1}(n,a_{0}^{t},a_{1}^{t},\dots,a_{j}^{t})). Put mjt=Ψ1(n,a0t,a1t,,ajt)m_{j}^{t}=\Psi_{1}(n,a_{0}^{t},a_{1}^{t},\dots,a_{j}^{t}), and we now have aj+1t=g(mjt)a_{j+1}^{t}=g(m_{j}^{t}) for some j<j<\ell. Note that, since ajt>sa_{j}^{t}>s for any jj, if mjt<tm_{j}^{t}<t then g(mjt)aj+1tg(m_{j}^{t})\not=a_{j+1}^{t} by our choice of s=s(t)s=s(t). Now consider the finite set EtE_{t} defined by

Et={mjt,aj+1t:j<mjtt}.E_{t}=\{\langle m_{j}^{t},a_{j+1}^{t}\rangle:j<\ell\;\land\;m_{j}^{t}\geq t\}.

Given tt, one can find the canonical code of EtE_{t} is an α𝙿\alpha_{\tt P}-computable manner. Note that there exists m,aEt\langle m,a\rangle\in E_{t} such that g(m)=ag(m)=a. However, note that

D={τ2<:(t)(m,aEt)τ(m)a}D=\{\tau\in 2^{<\mathbb{N}}:(\exists t\in\mathbb{N})(\forall\langle m,a\rangle\in E_{t})\;\tau(m)\not=a\}

yields a dense α𝙿\alpha_{\tt P}-computable open set in Cantor space 22^{\mathbb{N}}. This is because, given a binary string τ\tau, choose t>|τ|t>|\tau|, and extend τ\tau to τ\tau^{\ast} so that τ(m)a\tau^{\ast}(m)\not=a for any m,aEt\langle m,a\rangle\in E_{t}. This is doable since m,aEt\langle m,a\rangle\in E_{t} obviously implies mtm\geq t. In this way, any τ\tau extends to τD\tau^{\ast}\in D and thus DD is dense. Since gg is α𝙿\alpha_{\tt P}-generic, we have gDg\in D; that is, there exists tt such that g(m)ag(m)\not=a for any m,aEt\langle m,a\rangle\in E_{t}. However, by the property of EtE_{t}, for any tt, we must have a pair mjt,aj+1tEt\langle m^{t}_{j},a^{t}_{j+1}\rangle\in E_{t} such that g(mjt)=aj+1tg(m_{j}^{t})=a_{j+1}^{t}, a contradiction. ∎

Theorem 4.10.

There exists no LT\leq_{LT}-minimal bilayer function which is strictly LT\geq_{LT}-above 𝙸𝚍{\tt Id}; that is, for any bilayer function 𝙿>LT𝙸𝚍{\tt P}>_{LT}{\tt Id} there exists a bilayer function 𝚀{\tt Q} such that 𝙸𝚍<LT𝚀<LT𝙿{\tt Id}<_{LT}{\tt Q}<_{LT}{\tt P}. Hence, there exists no minimal Lawvere-Tierney topology which is strictly above 𝙸𝚍{\tt Id}.

Proof.

Let 𝙿{\tt P} be a bilayer function such that 𝙿>LT𝙸𝚍{\tt P}>_{LT}{\tt Id}. Put 𝙿n(c)=𝙿(nc){\tt P}_{n}(\ast\mid c)={\tt P}(n\mid c), and then 𝙿n{\tt P}_{n} is a basic bilayer function. If 𝙿nLTid{\tt P}_{n}\not\leq_{LT}{\rm id}, then by minimality of 𝙴𝚛𝚛𝚘𝚛1/{\tt Error}_{1/\mathbb{N}} ([24, Proposition 5.5]), we have 𝙴𝚛𝚛𝚘𝚛1/LT𝙿nLT𝙿{\tt Error}_{1/\mathbb{N}}\leq_{LT}{\tt P}_{n}\leq_{LT}{\tt P}. By Observation 4.8, 𝙿{\tt P} cannot be minimal. Thus, one can assume that 𝙿nLT𝙸𝚍{\tt P}_{n}\leq_{LT}{\tt Id} for any ndom(𝙿)n\in{\rm dom}({\tt P}). This implies that, since 𝙿n{\tt P}_{n} is a basic bilayer function, if ndom(𝙿)n\in{\rm dom}({\tt P}), then 𝙿~(n):=c𝙿n(c)\tilde{\tt P}(n):=\bigcap_{c}{\tt P}_{n}(\ast\mid c) is nonempty. This is because, at some round in the reduction game for 𝙿nLT𝙸𝚍{\tt P}_{n}\leq_{LT}{\tt Id}, Arthur’s winning strategy declares termination with some u𝙿n(c)u\in{\tt P}_{n}(\ast\mid c), which is independent of cc, as cc is invisible to Arthur. Then, since 𝙿~\tilde{\tt P} is a partial multifunction, by Lemma 4.9, there exists a total function gg such that 𝙸𝚍<T𝙰𝚟𝚘𝚒𝚍g{\tt Id}<_{T}{\tt Avoid}_{g} and 𝙿~T𝙰𝚟𝚘𝚒𝚍g\tilde{\tt P}\not\leq_{T}{\tt Avoid}_{g}.

We claim that 𝙿LT𝙰𝚟𝚘𝚒𝚍g{\tt P}\not\leq_{LT}{\tt Avoid}_{g} also holds. Otherwise, there exists Arthur’s winning strategy τ\tau witnessing 𝙿LT𝙰𝚟𝚘𝚒𝚍g{\tt P}\leq_{LT}{\tt Avoid}_{g}, where note that, since 𝙰𝚟𝚘𝚒𝚍g{\tt Avoid}_{g} is a partial multifunction, Nimue does not intervene in the game. Let (nc)(n\mid c) be Merlin’s first move. Since τ\tau is winning, Arthur declares termination with some u𝙿(nc)u\in{\tt P}(n\mid c). However, since cc is invisible to Arthur, the last value uu only depends on nn. This implies that u𝙿~(n)=c𝙿(nc)u\in\tilde{\tt P}(n)=\bigcap_{c}{\tt P}(n\mid c). Namely, the strategy τ\tau also witnesses 𝙿~T𝙰𝚟𝚘𝚒𝚍g\tilde{\tt P}\leq_{T}{\tt Avoid}_{g}. However, this contradicts our choice of gg.

Moreover, since the Lawvere-Tierney topologies form a lattice, the Turing degrees of bilayer functions also form a lattice by Corollary 3.5. For an explicit description of the infimum operation, we define the meet 𝙰𝙱{\tt A}\sqcap{\tt B} of bilayer functions 𝙰{\tt A} and 𝙱{\tt B} as follows:

(𝙰𝙱)(m,nc,d)=({0}×𝙰(mc))({1}×𝙱(nd)).({\tt A}\sqcap{\tt B})(m,n\mid c,d)=\big{(}\{0\}\times{\tt A}(m\mid c)\big{)}\cup\big{(}\{1\}\times{\tt B}(n\mid d)\big{)}.

Note that this is a bilayer analogue of the meet in the Weihrauch lattice [6]. We claim that the meet 𝚀:=𝙿𝙰𝚟𝚘𝚒𝚍g{\tt Q}:={\tt P}\sqcap{\tt Avoid}_{g} of 𝙿{\tt P} and 𝙰𝚟𝚘𝚒𝚍g{\tt Avoid}_{g} strictly lies between 𝙸𝚍{\tt Id} and 𝙿{\tt P}. As 𝙿LT𝙰𝚟𝚘𝚒𝚍g{\tt P}\not\leq_{LT}{\tt Avoid}_{g}, we have 𝚀<LT𝙿{\tt Q}<_{LT}{\tt P}. If 𝙸𝚍LT𝚀{\tt Id}\not<_{LT}{\tt Q}, then 𝚀LT𝙸𝚍{\tt Q}\leq_{LT}{\tt Id}, so 𝚀{\tt Q} is computable. This means that there exists a computable function pp such that p(n,m)𝚀(n,mc,)p(n,m)\in{\tt Q}(n,m\mid c,\ast) for n,m,cn,m,c. First consider the case that for any ndom(𝙿)n\in{\rm dom}({\tt P}) there exists mm\in\mathbb{N} such that p(n,m)p(n,m) is of the form 0,k\langle 0,k\rangle. For such an mm, since 𝙰𝚟𝚘𝚒𝚍g{\tt Avoid}_{g} is total, we also have n,mdom(𝚀)\langle n,m\rangle\in{\rm dom}({\tt Q}), and thus p(n,m)𝚀(n,mc,)p(n,m)\in{\tt Q}(n,m\mid c,\ast), so k𝙿(nc)k\in{\tt P}(n\mid c) for any cc. In this case, given ndom(𝙿)n\in{\rm dom}({\tt P}), by brute-force, we effectively search for mm\in\mathbb{N} such that the first coordinate of p(n,m)p(n,m) is 0, then return its second coordinate, which must be a solution to 𝙿(nc){\tt P}(n\mid c) as seen above. Hence, this procedure witnesses that 𝙿{\tt P} is computable, which contradicts the assumption 𝙿>LT𝙸𝚍{\tt P}>_{LT}{\tt Id}. Thus, there must exist ndom(𝙿)n\in{\rm dom}({\tt P}) such that p(n,m)p(n,m) is of the form 1,k\langle 1,k\rangle, for any mm\in\mathbb{N}. As in the above argument, we have p(n,m)𝚀(n,mc,)p(n,m)\in{\tt Q}(n,m\mid c,\ast), so k𝙰𝚟𝚘𝚒𝚍g(m)k\in{\tt Avoid}_{g}(m). Then, the algorithm which, given mm\in\mathbb{N}, returns the second coordinate of p(n,m)p(n,m) witnesses that 𝙰𝚟𝚘𝚒𝚍g{\tt Avoid}_{g} is computable. However, this contradicts the property 𝙰𝚟𝚘𝚒𝚍g>LT𝙸𝚍{\tt Avoid}_{g}>_{LT}{\tt Id}. Consequently, 𝙸𝚍<LT𝚀<LT𝙿{\tt Id}<_{LT}{\tt Q}<_{LT}{\tt P}. This verifies the first assertion. Then, the second assertion follows from Corollary 3.5. ∎

This solves Lee’s problem [23, Open Problem 3.5.18].

5. Other topologies

5.1. Probabilistic computation

As in Section 2.2, we consider bilayer functions expressing certain kinds of probabilistic computation. However, unlike Section 2.2, for the sake of brevity in discussion, we require that a parameter AA be compact. By inner regularity, every μ\mu-measurable set in 22^{\mathbb{N}} is approximated from the inside by a compact set, so adding this assumption does not make much difference. Here, recall that μ\mu is the uniform probability measure on 22^{\mathbb{N}}. Then we consider the following bilayer function:

𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛ε(e,nA)={φeα(n):αA}.\displaystyle{\tt ProbError}_{\varepsilon}(\langle e,n\rangle\mid A)=\{\varphi_{e}^{\alpha}(n):\alpha\in A\}.

One would say that the subtopos obtained from the Lawvere-Tierney topology corresponding to 𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛ε{\tt ProbError}_{\varepsilon} is the “world of probabilistically computable mathematics with error probability ε\varepsilon.” Surprisingly, we show that 𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛{\tt ProbError} induces exactly the same topology as Lee-van Oosten’s function 𝙴𝚛𝚛𝚘𝚛{\tt Error}.

Proposition 5.1.

For any p,qp,q\in\mathbb{N} with pqp\leq q, 𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛p/qLT𝙴𝚛𝚛𝚘𝚛p/q{\tt ProbError}_{p/q}\equiv_{LT}{\tt Error}_{p/q}.

Proof.

Obviously, we have 𝙴𝚛𝚛𝚘𝚛p/qLT𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛p/q{\tt Error}_{p/q}\leq_{LT}{\tt ProbError}_{p/q}. We show the other direction. Let (e,nA)(\langle e,n\rangle\mid A) be an input for 𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛p/q{\tt ProbError}_{p/q} and assume that 𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛p/q(e,nA){\tt ProbError}_{p/q}(\langle e,n\rangle\mid A)\downarrow. This means that φeα(n)\varphi^{\alpha}_{e}(n)\downarrow for any αA\alpha\in A. Since AA is compact, there exists tt such that the stage tt approximation φe,tαt(n)\varphi^{\alpha\upharpoonright t}_{e,t}(n) halts for any αA\alpha\in A. Note that e,nt\langle e,n\rangle\mapsto t is not necessarily computable, and thus Arthur does not have access to this information, but Nimue does have access to it.

The public input e,n\langle e,n\rangle can be thought of as a partial function αφeα(n)\alpha\mapsto\varphi_{e}^{\alpha}(n). This induces the push-forward measure on \mathbb{N} defined by ν(j)=μ({α2:φeα(n)=j})\nu(j)=\mu(\{\alpha\in 2^{\mathbb{N}}:\varphi_{e}^{\alpha}(n)\downarrow=j\}). We consider its finitary approximation; that is, put Ejs={α2:φe,sαs(n)=j}E_{j}^{s}=\{\alpha\in 2^{\mathbb{N}}:\varphi_{e,s}^{\alpha\upharpoonright s}(n)\downarrow=j\}, and define νs(j)=μ(Ejs)\nu_{s}(j)=\mu(E_{j}^{s}). For each stage ss, the value νs(j)\nu_{s}(j) is rational, and moreover νs(j)>0\nu_{s}(j)>0 happens for at most finitely many jj\in\mathbb{N}. Let jii<(s)\langle j_{i}\rangle_{i<\ell(s)} be a list of all such jj’s. Clearly, sνs(ji)i<(s)s\mapsto\langle\nu_{s}(j_{i})\rangle_{i<\ell(s)} is computable. Since we have only finitely many rationals νs(ji)i<(s)\langle\nu_{s}(j_{i})\rangle_{i<\ell(s)}, we can assume that all values have the same denominator and are of the form νs(ji)=as,i/qrs\nu_{s}(j_{i})=a_{s,i}/qr_{s}. Note that we clearly have i<(s)as,iqrs\sum_{i<\ell(s)}a_{s,i}\leq qr_{s}. Fix a pairwise disjoint sequence (Jis)i<(s)(J^{s}_{i})_{i<\ell(s)} such that JisqrsJ^{s}_{i}\subseteq qr_{s} and |Jis|=as,i|J^{s}_{i}|=a_{s,i}.

Since 𝙴𝚛𝚛𝚘𝚛prs/qrsLT𝙴𝚛𝚛𝚘𝚛p/q{\tt Error}_{pr_{s}/qr_{s}}\leq_{LT}{\tt Error}_{p/q} by Theorem 4.7, there is Arthur’s winning strategy τs\tau_{s} witnessing this fact. As srss\mapsto r_{s} is computable, one can easily see that the proof of Theorem 4.7 ensures that sτss\mapsto\tau_{s} is also computable. Hence, instead of taking Nimue’s moves as secret inputs to 𝙴𝚛𝚛𝚘𝚛p/q{\tt Error}_{p/q}, we can take them directly as secret inputs to 𝙴𝚛𝚛𝚘𝚛prs/qrs{\tt Error}_{pr_{s}/qr_{s}} through the above reduction implicitly. Here, note that such a conversion takes multiple rounds through Arthur and Nimue’s moves, but we do not count this number of rounds, and without mentioning it, all conversions are assumed to be done automatically.

Thus, at the (s+1)(s+1)-st round, after seeing Nimue’s previous move, we assume that Merlin plays a move jj less than qrsqr_{s}. Then Arthur reacts to this. If Merlin’s move jj is contained in JisJ^{s}_{i} for some i<(s)i<\ell(s), then Arthur declares termination with jij_{i}. Otherwise, Arthur declares that the game proceeds to the next round, and urges Nimue to make the next move. Now we describe Nimue’s move BsB_{s} at the ss-th round. Nimue reads the secret input AA and then define BsB_{s} as follows: For any mJism\in J_{i}^{s}, we define

mBsAEjis=.m\in B_{s}\iff A\cap E^{s}_{j_{i}}=\emptyset.

For mqrsi<(s)Jism\in qr_{s}\setminus\bigcup_{i<\ell(s)}J_{i}^{s}, we define

mBsAEs=,m\in B_{s}\iff A\cap E^{s}_{\uparrow}=\emptyset,

where Es={α2:φe,sαs(n)}E^{s}_{\uparrow}=\{\alpha\in 2^{\mathbb{N}}:\varphi_{e,s}^{\alpha\upharpoonright s}(n)\uparrow\}. One can see that if tst\geq s then qrsi<(s)Jisqr_{s}\setminus\bigcup_{i<\ell(s)}J_{i}^{s} is included in BsB_{s}, where tt is a number mentioned in the first paragraph of this proof. Note that, in order to enumerate as,ia_{s,i} many elements in JisJ_{i}^{s} into BsB_{s}, the measure of AA needs to be removed by νs(ji)=as,i/qrs\nu_{s}(j_{i})=a_{s,i}/qr_{s}. Similarly, in order to enumerate qrsi<sai,sqr_{s}-\sum_{i<\ell_{s}}a_{i,s} elements in qrsi<(s)Jisqr_{s}\setminus\bigcup_{i<\ell(s)}J_{i}^{s} into BsB_{s}, the measure of AA needs to be removed by

μ(Es)=1i<(s)μ(Ejis)=qrsi<sai,sqrs.\mu(E^{s}_{\uparrow})=1-\sum_{i<\ell(s)}\mu(E_{j_{i}}^{s})=\frac{qr_{s}-\sum_{i<\ell_{s}}a_{i,s}}{qr_{s}}.

Since the measure of AA is greater than or equal to 1p/q1-p/q, the measure removed from AA should be at most prs/qrspr_{s}/qr_{s}. Therefore, only at most prspr_{s} many elements can be enumerated into BsB_{s}, so (Bs)(\ast\mid B_{s}) belongs to the domain of 𝙴𝚛𝚛𝚘𝚛prs/qrs{\tt Error}_{pr_{s}/qr_{s}}. Hence, Nimue’s move BsB_{s} obeys the rule.

We claim that Arthur and Nimue win this game along the play described above. Note that Arthur declares termination by the (t+1)(t+1)-th round. This is because the complement of i<(s)Jis\bigcup_{i<\ell(s)}J_{i}^{s} is included in BsB_{s}, and thus Merlin must play a move from i<(s)Jis\bigcup_{i<\ell(s)}J_{i}^{s} at the (t+1)(t+1)-th round. In response to this move, Arthur’s strategy described above declares termination. We now assume that Arthur declares termination with jisj_{i}^{s} at the (s+1)(s+1)-st round. In order for this to happen, Merlin’s previous move must belong to JisJ_{i}^{s}. In such a case, Nimue’s previous move BsB_{s} must satisfy JisBsJ_{i}^{s}\not\subseteq B_{s}. This means that AEjisA\cap E_{j_{i}}^{s}\not=\emptyset. In particular, there exists αA\alpha\in A such that φeα(n)=ji\varphi_{e}^{\alpha}(n)=j_{i}. Hence, ji𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛p/q(e,nA)j_{i}\in{\tt ProbError}_{p/q}(\langle e,n\rangle\mid A). ∎

One can also consider a counterpart of 𝙿𝚛𝚘𝚋𝙴𝚛𝚛𝚘𝚛ε{\tt ProbError}_{\varepsilon} in the context of partial multifunctions, which is known as weak weak König’s lemma [5]. Let PeP_{e} be the ee-th Π10\Pi^{0}_{1} subset of 22^{\mathbb{N}} (or the set of all infinite paths though the ee-th primitive recursive subtree of 2<2^{<\mathbb{N}}).

𝚆𝚆𝙺𝙻ε(e,n,i)μ(Pi)1ε(αPi)φeα(n).\displaystyle{\tt WWKL}_{\varepsilon}(\langle e,n,i\rangle)\downarrow\iff\mu(P_{i})\geq 1-\varepsilon\;\land\;(\forall\alpha\in P_{i})\;\varphi_{e}^{\alpha}(n)\downarrow.
𝚆𝚆𝙺𝙻ε(e,n,i)={φeα(n):αPi}.\displaystyle{\tt WWKL}_{\varepsilon}(\langle e,n,i\rangle)=\{\varphi_{e}^{\alpha}(n):\alpha\in P_{i}\}.

As in Proposition 5.1, one can show that 𝚆𝚆𝙺𝙻p/qLT𝙻𝙻𝙿𝙾p/q{\tt WWKL}_{p/q}\equiv_{LT}{\tt LLPO}_{p/q}. However, of course, weak weak König’s lemma is known to be much stronger than the lessor limited principle of omniscience. Indeed, if we consider analogues of 𝚆𝚆𝙺𝙻{\tt WWKL} and 𝙻𝙻𝙿𝙾{\tt LLPO} in the Kleene-Vesley algebra (i.e., in the context of \mathbb{N}^{\mathbb{N}}-computation), then one can easily see that 𝚆𝚆𝙺𝙻{\tt WWKL} is strictly above 𝙻𝙻𝙿𝙾{\tt LLPO} with respect to Turing reducibility for \mathbb{N}^{\mathbb{N}}-computability (i.e., generalized Weihrauch reducibility). Therefore, Proposition 5.1 is a phenomenon specific to the effective topos. If we consider another (relative) realizability topos, such as the Kleene-Vesley topos, the situation would be completely different.

Refer to caption
Figure 1. Lower parts on Lawvere-Tierney topologies on the effective topos

Figure 1 summarizes some of basic implications about the rea\leq_{\rm rea}-ordering on the Lawvere-Tierney topologies on the effective topos, where ABA\to B means BLTAB\leq_{LT}A (or BreaAB^{\Game\to}\leq_{\rm rea}A^{\Game\to}). By our results, there are no more implications in Figure 1.

5.2. Cofinite choice

The basic bilayer functions we have dealt with so far was of no help at all for computing a single-valued function when treated as an oracle. However, indeed, there is a known basic bilayer function which is rather powerful when considered as an oracle. Pitts [33, Example 5.8] introduced the following basic bilayer function 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt Cofinite}:

dom(𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎)={}×,𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎(n)={m:mn}.{\rm dom}({\tt Cofinite})=\{\ast\}\times\mathbb{N},\qquad{\tt Cofinite}(\ast\mid n)=\{m\in\mathbb{N}:m\geq n\}.

Note that one-query 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt Cofinite}-relative computation is the one in which countably many computations are run in parallel, a finite number of which may be wrong. Pitts [33] observed that the above function yields a Lawvere-Tierney topology 𝒥\mathcal{J} on the effective topos such that id<rea𝒥<rea¬¬{\rm id}<_{\rm rea}\mathcal{J}<_{\rm rea}\neg\neg. Here, note that 𝒥=𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎\mathcal{J}={\tt Cofinite}^{\Game\to} in our terminology. Interestingly, van Oosten [41, Theorem 2.2] showed that, for a total function f:f\colon\mathbb{N}\to\mathbb{N}, the topology 𝒥\mathcal{J} forces ff to be decidable if and only if ff is hyperarithmetic. In other words, for a total function f:f\colon\mathbb{N}\to\mathbb{N}, fLT𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎f\leq_{LT}{\tt Cofinite} if and only if ff is hyperarithmetic. For the basics of hyperarithmetic sets, we refer the reader to Sacks [36] and Chong-Yu [9]. It is also known that 𝙴𝚛𝚛𝚘𝚛1/LT𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt Error}_{1/\ell}\not\leq_{LT}{\tt Cofinite} for any \ell\in\mathbb{N} (see [24, Proposition 5.11]).

Pitts’ function 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt Cofinite} also has a partial multi-valued counterpart, which has been studied as cofinite choice [4, 1] or bound [17] in the context of \mathbb{N}^{\mathbb{N}}-computation. We introduce cofinite choice relative to an oracle α2\alpha\in 2^{\mathbb{N}} as follows:

𝙲𝚌𝚘𝚏α(e)|{n:φeα(n)}| is finite,\displaystyle{\tt C}^{\alpha}_{\tt cof}(e)\downarrow\iff|\{n\in\mathbb{N}:\varphi^{\alpha}_{e}(n)\downarrow\}|\mbox{ is finite},
𝙲𝚌𝚘𝚏α(e)={n:φeα(n)}.\displaystyle{\tt C}^{\alpha}_{\tt cof}(e)=\{n\in\mathbb{N}:\varphi^{\alpha}_{e}(n)\uparrow\}.

It is obvious that 𝙲𝚌𝚘𝚏αLT𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt C}^{\alpha}_{\tt cof}\leq_{LT}{\tt Cofinite} for any oracle α2\alpha\in 2^{\mathbb{N}}. Moreover, we also have 𝙲𝚌𝚘𝚏αTα{\tt C}^{\alpha}_{\tt cof}\leq_{T}\alpha^{\prime}, where α\alpha^{\prime} is the Turing jump of α\alpha. To estimate the strength of cofinite choice, we consider the following equivalent definition of the hyperarithmetical hierarchy based on the effective Baire hierarchy.

Definition 5.2 (Effective Baire hierarchy).

For each computable ordinal ξ\xi, we define a set BξB_{\xi} of total functions on \mathbb{N} as follows: First, B0B_{0} is the set of all total computable functions on \mathbb{N}, and a B0B_{0}-code of fB0f\in B_{0} is a program code computing ff. For ξ>0\xi>0, BξB_{\xi} is the set of functions f:f\colon\mathbb{N}\to\mathbb{N} such that f=limsfsf=\lim_{s\to\infty}f_{s} for some sequence (fn)n(f_{n})_{n\in\mathbb{N}}, where there exists an algorithm Φf\Phi_{f} which, given nn\in\mathbb{N}, returns a BζB_{\zeta}-code of fnBζf_{n}\in B_{\zeta} for some ζ<ξ\zeta<\xi. A BξB_{\xi}-code of fBξf\in B_{\xi} is a pair of a code of ξ\xi and a code of such Φf\Phi_{f}.

By the Shoenfield limit lemma (see e.g. [39, Lemma III.3.3] or [30, Proposition IV.1.19]), BnB_{n} corresponds to (n)\emptyset^{(n)}-computability for nn\in\mathbb{N}, and BξB_{\xi} corresponds to (ξ+1)\emptyset^{(\xi+1)}-computability for an infinite ordinal ξ\xi, where (ξ)\emptyset^{(\xi)} is the ξ\xi-th Turing jump of a computable function. Obviously, Definition 5.2 of fBξf\in B_{\xi} produces a computable well-founded tree TfT_{f} whose leaves are labeled by computable functions. Here, such a TfT_{f} is full-splitting, that is, if σTf\sigma\in T_{f} is not a leaf, then σnTf\sigma{}^{\smallfrown}n\in T_{f} for any nn\in\mathbb{N}.

Conversely, let T<T\subseteq\mathbb{N}^{<\mathbb{N}} be a computable full-splitting well-founded tree. We inductively define rankT(σ){\rm rank}_{T}(\sigma), the rank of σ\sigma, as follows: The rank of a leaf of TT is 0, and if σT\sigma\in T is not a leaf, then the rank of σ\sigma is sup{rankT(σn)+1:n}\sup\{{\rm rank}_{T}(\sigma{}^{\smallfrown}n)+1:n\in\mathbb{N}\}. Then, rank(T){\rm rank}(T), the rank of TT, is defined as the rank of its root.

Let LTL_{T} be the set of leaves of TT. A computable assignment is a computable function h:LT×h\colon L_{T}\times\mathbb{N}\to\mathbb{N}. We inductively label each node σ\sigma of TT with a function hσ:h_{\sigma}\colon\mathbb{N}\to\mathbb{N} or an undefined symbol \uparrow as follows: If ρ\rho is a leaf of TT, then put hρ(n)=f(ρ,n)h_{\rho}(n)=f(\rho,n). If σs\sigma{}^{\smallfrown}s is labeled by \uparrow for some ss\in\mathbb{N}, then hσh_{\sigma} is also labeled by \uparrow. If limshσs(n)\lim_{s\to\infty}h_{\sigma{}^{\smallfrown}s}(n) exists for all nn\in\mathbb{N}, then σ\sigma is labeled by the pointwise limit hσ=limshσsh_{\sigma}=\lim_{s\to\infty}h_{\sigma{}^{\smallfrown}s}. Otherwise, σ\sigma is labeled by \uparrow. Then define hTh_{T} as the label of the root of TT if it is defined. Observe that if hσh_{\sigma} is defined, then hσBrankT(σ)h_{\sigma}\in B_{{\rm rank}_{T}(\sigma)}. Indeed, one can compute a BrankT(σ)B_{{\rm rank}_{T}(\sigma)}-code of hσh_{\sigma}.

Definition 5.3.

We call a pair (T,h)(T,h) of a computable full-splitting well-founded tree TT and a computable assignment hh a blueprint.

One can easily see that fBξf\in B_{\xi} if and only if there exists a blueprint (T,h)(T,h) such that f=hTf=h_{T} and rank(T)=ξ{\rm rank}(T)=\xi. We are now ready to prove the following:

Proposition 5.4.

For any computable ordinal ξ\xi, we have 𝙲𝖼𝗈𝖿(ξ)T(ξ+1){\tt C}_{\sf cof}^{\emptyset^{(\xi)}}\equiv_{T}\emptyset^{(\xi+1)}.

Proof.

It suffices to show that (ξ+1)T𝙲𝖼𝗈𝖿(ξ)\emptyset^{(\xi+1)}\leq_{T}{\tt C}_{\sf cof}^{\emptyset^{(\xi)}}. As mentioned above, (ξ+1)\emptyset^{(\xi+1)} corresponds to B1+ξB_{1+\xi}. Therefore, it suffices to show that fT𝙲𝖼𝗈𝖿(ξ)f\leq_{T}{\tt C}_{\sf cof}^{\emptyset^{(\xi)}} for any fB1+ξf\in B_{1+\xi}. Let (T,h)(T,h) be a blueprint defining ff as above. Since hT=fh_{T}=f is defined, hσh_{\sigma} is also defined for any σT\sigma\in T by definition.

We describe Arthur’s strategy for fT𝙲𝖼𝗈𝖿(ξ)f\leq_{T}{\tt C}_{\sf cof}^{\emptyset^{(\xi)}}. Assume that Merlin’s first move is nn, and the second and subsequent moves are σ=x1,x2,,x\sigma=\langle x_{1},x_{2},\dots,x_{\ell}\rangle. If σ\sigma is a leaf of TT, then Arthur declares termination with hσ(n)h_{\sigma}(n). Here, Arthur can use the information of hσh_{\sigma} since hσh_{\sigma} is computable. Assume that σ\sigma is not a leaf of TT. Since the rank of TT is 1+ξ1+\xi, the rank of σ\sigma is at most 1+ξ1+\xi and thus the rank of any immediate successor σs\sigma{}^{\smallfrown}s of σ\sigma is less than 1+ξ1+\xi. By the property of a blueprint, given ss\in\mathbb{N}, one can compute a BζB_{\zeta}-code of hσsBζh_{\sigma{}^{\smallfrown}s}\in B_{\zeta} for some ζ<1+ξ\zeta<1+\xi. In particular, (s,n)hσs(n)(s,n)\mapsto h_{\sigma{}^{\smallfrown}s}(n) is (ξ)\emptyset^{(\xi)}-computable.

Then consider the following program ee: Given an input ss, the computation searches for t>st>s such that hσt(n)hσs(n)h_{\sigma{}^{\smallfrown}t}(n)\not=h_{\sigma{}^{\smallfrown}s}(n). If such a tt is found, the computation φe(ξ)(s)\varphi_{e}^{\emptyset^{(\xi)}}(s) halts. Otherwise, φe(ξ)(s)\varphi_{e}^{\emptyset^{(\xi)}}(s) never halts. Since hσh_{\sigma} is defined, limshσs(n)\lim_{s\to\infty}h_{\sigma{}^{\smallfrown}s}(n) exists; that is, there exists ss such that hσt(n)=hσs(n)h_{\sigma{}^{\smallfrown}t}(n)=h_{\sigma{}^{\smallfrown}s}(n) for any t>st>s. Hence, there are at most finitely many ss such that φe(ξ)(s)\varphi_{e}^{\emptyset^{(\xi)}}(s) halts. This means that edom(𝙲𝚌𝚘𝚏(ξ))e\in{\rm dom}({\tt C}_{\tt cof}^{\emptyset^{(\xi)}}). Then, Arthur declares that the game is to continue, and uses ee as the next query, that is, 0,e\langle 0,e\rangle is Arthur’s next move.

We claim that this is Arthur’s winning strategy. To see this, if Merlin’s second and subsequent moves are σ=x1,x2,,x\sigma=\langle x_{1},x_{2},\dots,x_{\ell}\rangle, then we inductively show that hT(n)=hσ(n)h_{T}(n)=h_{\sigma}(n). We inductively assume that hT(n)=hσ(n)h_{T}(n)=h_{\sigma}(n). As the next move, if Arthur declares that the game is to continue, and uses ee as the next query, Merlin responds to this with some t+1𝙲𝚌𝚘𝚏(ξ)(e)t_{\ell+1}\in{\tt C}_{\tt cof}^{\emptyset^{(\xi)}}(e). This means that hσt+1(n)=limshσs(n)=hσ(n)h_{\sigma{}^{\smallfrown}t_{\ell+1}}(n)=\lim_{s\to\infty}h_{\sigma{}^{\smallfrown}s}(n)=h_{\sigma}(n). Hence, by the induction hypothesis, we have hσt+1(n)=hT(n)h_{\sigma{}^{\smallfrown}t_{\ell+1}}(n)=h_{T}(n).

If the history of Merlin’s moves ρ=x1,x2,,xk\rho=\langle x_{1},x_{2},\dots,x_{k}\rangle reaches a leaf of TT, then Arthur declares termination with hρ(n)h_{\rho}(n), and by the above property, we obtain hρ(n)=hT(n)=f(n)h_{\rho}(n)=h_{T}(n)=f(n). Hence, the procedure described above is shown to be Arthur’s winning strategy. Consequently, we get fT𝙲𝚌𝚘𝚏(ξ)f\leq_{T}{\tt C}_{\tt cof}^{\emptyset^{(\xi)}}. ∎

As 𝙲𝚌𝚘𝚏αLT𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt C}_{\tt cof}^{\alpha}\leq_{LT}{\tt Cofinite} for any oracle α2\alpha\in 2^{\mathbb{N}}, this explains the reason why 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt Cofinite} is so powerful as an oracle. Interestingly, by the result in van Oosten [41, Theorem 2.2] mentioned above, one can observe that even if relativized by a tremendously powerful oracle α\alpha, 𝙲𝚌𝚘𝚏α{\tt C}_{\tt cof}^{\alpha} never be able to compute a non-hyperarithmetic function; that is, for any non-hyperarithmetic ff, we have fT𝙲𝚌𝚘𝚏αf\not\leq_{T}{\tt C}_{\tt cof}^{\alpha} no matter what an oracle α\alpha is. Roughly speaking, this is because a computational process beyond hyperarithmetic is not a finite approximation process, but an approximation process along an ordinal, which prevents us from using “time trick”; see e.g. [3].

5.3. Asymptotic density

As a candidate for another basic bilayer function, one that uses asymptotic density may come to mind. For a set AA\subseteq\mathbb{N}, the lower asymptotic density of AA is defined by

d¯(A)=lim infn|An|n.\underline{d}(A)=\liminf_{n\to\infty}\frac{|A\cap n|}{n}.

Then, for any real ε[0,1]\varepsilon\in[0,1], we define the basic bilayer function 𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt DenError}_{\varepsilon} as follows:

dom(𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε)={(A):A and d¯(A)1ε}\displaystyle{\rm dom}({\tt DenError}_{\varepsilon})=\{(\ast\mid A):A\subseteq\mathbb{N}\mbox{ and }\underline{d}(A)\geq 1-\varepsilon\}
𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε(A)=A.\displaystyle{\tt DenError}_{\varepsilon}(\ast\mid A)=A.

Obviously, we have 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎LT1𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt Cofinite}\leq^{1}_{LT}{\tt DenError}_{\varepsilon} for any real ε[0,1]\varepsilon\in[0,1] since the asymptotic density of a cofinite set is 11. The major difference between 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt Cofinite} and 𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt DenError}_{\varepsilon} is the following property.

Observation 5.5.

𝙴𝚛𝚛𝚘𝚛1/LT1𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛1/{\tt Error}_{1/\ell}\leq^{1}_{LT}{\tt DenError}_{1/\ell} for any \ell\in\mathbb{N}.

Proof.

We define an outer reduction KK as follows: For nn\in\mathbb{N} and m<m<\ell, put K(n+m)=mK(n\ell+m)=m. Then, for an input ({j})(\ast\mid\{j\}) for 𝙴𝚛𝚛𝚘𝚛1/{\tt Error}_{1/\ell}, a secret inner reduction LL is defined by L({j})={n+m:n and jm<}L(\{j\})=\{n\ell+m:n\in\mathbb{N}\mbox{ and }j\not=m<\ell\}. Note that the asymptotic density of L({j})L(\{j\}) is 11/1-1/\ell. Clearly, y𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛1/(L({j}))=L({j})y\in{\tt DenError}_{1/\ell}(L(\{j\}))=L(\{j\}) implies K(y)jK(y)\not=j; hence K(y)𝙴𝚛𝚛𝚘𝚛1/({j})K(y)\in{\tt Error}_{1/\ell}(\ast\mid\{j\}). ∎

We say that a partial multifunction 𝙿:{\tt P}\colon\!\!\!\subseteq\mathbb{N}\rightrightarrows\mathbb{N} is hyperarithmetic if there exists a partial Π11\Pi^{1}_{1} function f:f\colon\!\!\!\subseteq\mathbb{N}\to\mathbb{N} such that f(n)𝙿(n)f(n)\in{\tt P}(n) for any ndom(𝙿)n\in{\rm dom}({\tt P}).

Proposition 5.6.

Let 𝙿{\tt P} be a partial multifunction whose codomain is \ell\in\mathbb{N} with >0\ell>0. For any ε<1/(+1)\varepsilon<1/(\ell+1), if 𝙿LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt P}\leq_{LT}{\tt DenError}_{\varepsilon}, then 𝙿{\tt P} is hyperarithmetic.

To prove this, we need to show an auxiliary lemma. For a tree T<T\subseteq\mathbb{N}^{<\mathbb{N}}, let succT(t){\rm succ}_{T}(t) be the set of all immediate successors of tt in TT. For a function b:<b\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}, a tree TT is bb-fat if, for any tTt\in T which is not a leaf, tt has at least b(t)b(t) immediate successors, i.e., |succT(t)|b(t)|{\rm succ}_{T}(t)|\geq b(t). For a function b:<b\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N} and \ell\in\mathbb{N}, consider the function b:σb(σ)\ell\cdot b\colon\sigma\mapsto\ell\cdot b(\sigma). The following is an analogue of Cenzer-Hinman [8, Proposition 2.9].

Lemma 5.7.

Let b:<b\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N} be a function, TT be an (b)(\ell\cdot b)-fat finite tree, and LTL_{T} be the set of all leaves of TT. Then, for any function f:LTf\colon L_{T}\to\ell there exists a bb-fat tree STS\subseteq T such that ff is constant on the leaves of SS.

Proof.

Since TT is finite, one can assume that any σLT\sigma\in L_{T} has the same length. We prove the assertion by induction on the height kk of TT. Let f:LTf\colon L_{T}\to\ell be given. If k=1k=1, then TT has b(ε)\ell\cdot b(\varepsilon) leaves, where ε\varepsilon is the empty strings. As ff is \ell-valued, there are at least b(ε)b(\varepsilon) leaves on which ff is constant.

Next, assume that k>1k>1. Then, for any tTt\in T of length k1k-1, define g(t)g(t) as the least j<j<\ell such that |{nsuccT(t):f(tn)=j})|b(t)|\{n\in{\rm succ}_{T}(t):f(t{}^{\smallfrown}n)=j\})|\geq b(t). Since TT is (b)(\ell\cdot b)-fat, we have |{n:f(tn)<}}|b(t)|\{n:f(t{}^{\smallfrown}n)<\ell\}\}|\geq\ell\cdot b(t), so such a jj exists. Note that gg is a function from Tk1T\cap\mathbb{N}^{k-1} to \ell. By the induction hypotheis, there exists a bb-fat tree ST<kS^{-}\subseteq T\cap\mathbb{N}^{<k} such that gg is constant on the leaves of SS^{-}. Let j<j<\ell be the unique value of gg on the leaves LSL_{S}^{-} of SS^{-}. Note that LSTL_{S}^{-}\subseteq T. Then, define

S=S{tn:tLSnsuccT(t)f(tn)=j}S=S^{-}\cup\{t{}^{\smallfrown}n:t\in L_{S}^{-}\;\land\;n\in{\rm succ}_{T}(t)\;\land\;f(t{}^{\smallfrown}n)=j\}

By definition, clearly ff is constant on the leaves of SS. Moreover, for any tLSt\in L_{S}^{-}, by our definition of gg and SS^{-}, we have

|succS(t)|=|{nsuccT(t):f(tn)=j}|b(t).|{\rm succ}_{S}(t)|=|\{n\in{\rm succ}_{T}(t):f(t{}^{\smallfrown}n)=j\}|\geq b(t).

Therefore, SS is bb-fat. This concludes the proof. ∎

Proof of Proposition 5.6.

Let (τη)(\tau\mid\eta) be a winning Arthur-Nimue strategy witnessing 𝙿LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt P}\leq_{LT}{\tt DenError}_{\varepsilon}. Except for the first move nn, Merlin’s move is always a number jj\in\mathbb{N}, which yields the tree <\mathbb{N}^{<\mathbb{N}} of all possible moves by Merlin. Fix nn, and then Arthur’s strategy τ\tau yields a partial computable function Φτn:<\Phi^{n}_{\tau}\colon\!\!\!\subseteq\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}, where Φτn(σ)=u\Phi^{n}_{\tau}(\sigma)\downarrow=u if and only if, after reading Merlin’s moves σ\sigma, Arthur’s strategy τ\tau declares termination with uu. Nimue’s strategy η\eta restricts Merlin’s possible moves to a well-founded subtree TηnT^{n}_{\eta} of <\mathbb{N}^{<\mathbb{N}} such that, for each σTηn\sigma\in T^{n}_{\eta}, if σ\sigma is a leaf then Φτn(σ)\Phi^{n}_{\tau}(\sigma) is defined, and the lower asymptotic density of the set Aηn(σ):=succTηn(σ)A^{n}_{\eta}(\sigma):={\rm succ}_{T^{n}_{\eta}}(\sigma) is at least 1ε1-\varepsilon since Nimue obeys the rule as long as Merlin obeys the rule, and this value is greater than 11/(+1)1-1/(\ell+1) since ε<1/(+1)\varepsilon<1/(\ell+1). By the definition of lower asymptotic density, there exists b(σ)b(\sigma) such that, for any mb(σ)m\geq b(\sigma), we have |Aηn(σ)m|/m>11/(+1)|A^{n}_{\eta}(\sigma)\cap m|/m>1-1/(\ell+1). In particular, we have

|Aηn(σ)(+1)b(σ)|>(+1)b(σ)(11+1)=b(σ).|A^{n}_{\eta}(\sigma)\cap(\ell+1)\cdot b(\sigma)|>(\ell+1)\cdot b(\sigma)\cdot\left(1-\frac{1}{\ell+1}\right)=\ell\cdot b(\sigma).

Fix such b:<b\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}, where if σ\sigma is either a leaf of TηnT^{n}_{\eta} or σTηn\sigma\not\in T^{n}_{\eta}, then b(σ)b(\sigma) is arbitrary. Then, consider the tree TbT^{b} of ((+1)b)((\ell+1)\cdot b)-bounded strings:

Tb={t<:(s<|t|)t(s)<(+1)b(ts)}.T^{b}=\{t\in\mathbb{N}^{<\mathbb{N}}:(\forall s<|t|)\;t(s)<(\ell+1)\cdot b(t\upharpoonright s)\}.

Since TbT^{b} is finite branching and TηnT^{n}_{\eta} is well-founded, Tηn,b:=TbTηnT^{n,b}_{\eta}:=T^{b}\cap T^{n}_{\eta} is finite by König’s lemma. Moreover, Φτn\Phi_{\tau}^{n} is total on the leaves of Tηn,bT^{n,b}_{\eta}. Note that if σ\sigma is not a leaf of Tηn,bT^{n,b}_{\eta} then succTηn,b(σ)=Aηn(σ)(+1)b(σ){\rm succ}_{T^{n,b}_{\eta}}(\sigma)=A^{n}_{\eta}(\sigma)\cap(\ell+1)\cdot b(\sigma). Hence, Tηn,bT_{\eta}^{n,b} is (b)(\ell\cdot b)-fat. Since Φτn\Phi_{\tau}^{n} is \ell-valued, by Lemma 5.7, there exists a bb-fat subtree SS of Tηn,bT^{n,b}_{\eta} of the same height such that Φτn\Phi^{n}_{\tau} is constant on the leaves of SS. Hereafter, we write bb as bnb_{n} since such a bb satisfying the above density condition is depend on Merlin’s first move nn.

For a function g:<g\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}, our algorithm Ψg(n)\Psi^{g}(n) searches for a gg-fat finite tree STgS\subseteq T^{g} such that Φτn\Phi^{n}_{\tau} is constant on the leaves of SS, and returns the unique value jj of Φτn\Phi_{\tau}^{n} on the leaves of SS if such an SS exists. Note that if g(σ)g(\sigma) is a correct witness for the above density condition for Aηn(σ)A^{n}_{\eta}(\sigma), then such an SS always exists. Now, we define QQ as follows

Q(n,j)(f:<)(gf)[Ψg(n)=j],Q(n,j)\iff(\forall f\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N})(\exists g\geq f)\;[\Psi^{g}(n)\downarrow=j],

where by fgf\leq g we mean that f(σ)g(σ)f(\sigma)\leq g(\sigma) for any σ<\sigma\in\mathbb{N}^{<\mathbb{N}}. Note that Ψg(n)\Psi^{g}(n) is defined only if Ψg(n)\Psi^{g}(n) succeeds in finding SS, which means that the algorithm Ψ\Psi only reads gg up to the height of SS. Thus, the above predicate QQ is Π11\Pi^{1}_{1}.

We claim that Q(n,j)Q(n,j) implies j𝙿(n)j\in{\tt P}(n). To see this, put f(σ)=bn(σ)f(\sigma)=b_{n}(\sigma). If gfg\geq f then we have |Aηn(σ)(+1)g(σ)|>g(σ)|A^{n}_{\eta}(\sigma)\cap(\ell+1)\cdot g(\sigma)|>\ell\cdot g(\sigma) by our choice of bnb_{n}. If Ψg(n)=j\Psi^{g}(n)\downarrow=j then the algorithm Ψ\Psi succeeds in finding a gg-fat finite tree STgS\subseteq T^{g} such that Φτn(ρ)=j\Phi^{n}_{\tau}(\rho)=j for any leaf ρ\rho of SS. Note that succS(σ)(+1)g(σ){\rm succ}_{S}(\sigma)\subseteq(\ell+1)\cdot g(\sigma) by the definition of TgT^{g}, and |succS(σ)|g(σ)|{\rm succ}_{S}(\sigma)|\geq g(\sigma) since SS is gg-fat. This implies that succS(σ)Aηn(σ){\rm succ}_{S}(\sigma)\cap A_{\eta}^{n}(\sigma) is nonempty. Hence, STηnS\cap T_{\eta}^{n} has a common leaf ρ\rho. Since (τη)(\tau\mid\eta) is winning, and ρ\rho is a leaf of TηnT_{\eta}^{n}, we must have Φτn(ρ)𝙿(n)\Phi_{\tau}^{n}(\rho)\in{\tt P}(n). By our choice of SS, Φτn\Phi_{\tau}^{n} is constant on the leaves of SS, and thus Ψg(n)\Psi^{g}(n) must be equal to Φτn(ρ)\Phi_{\tau}^{n}(\rho). This concludes Ψg(n)=j𝙿(n)\Psi^{g}(n)=j\in{\tt P}(n).

We next claim that for any nn there exists j<j<\ell such that Q(n,j)Q(n,j). Otherwise, for any j<j<\ell there exists fjf_{j} such that either Ψg(n)\Psi^{g}(n) is undefined or Ψg(n)j\Psi^{g}(n)\not=j for any gfjg\geq f_{j}. Then, put h(σ)=max{bn(σ),fj(σ):j<}h(\sigma)=\max\{b_{n}(\sigma),f_{j}(\sigma):j<\ell\}. As h(σ)bn(σ)h(\sigma)\geq b_{n}(\sigma), clearly, h(σ)h(\sigma) is a correct witness for the above density condition for Aηn(σ)A^{n}_{\eta}(\sigma). Then, by the argument using Lemma 5.7 described above, the algorithm Ψ\Psi succeeds in finding SS, so that Ψh(n)=j\Psi^{h}(n)\downarrow=j for some j<j<\ell. However, as hfjh\geq f_{j}, this contradicts our assumption on fjf_{j}. Therefore, QQ determines a total relation. Since QQ is Π11\Pi^{1}_{1}, by Δ11\Delta^{1}_{1}-selection (see Moschovakis [28, 4B.5] or Sacks [36, Theorem II.2.3]), there exists a hyperarithmetic function p:p\colon\mathbb{N}\to\mathbb{N} such that Q(n,p(n))Q(n,p(n)) holds. By the first claim, this implies that p(n)𝙿(n)p(n)\in{\tt P}(n). ∎

In particular, 𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt DenError}_{\varepsilon} and 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt Cofinite} have partly the same properties in the following sense.

Corollary 5.8.

Assume ε<1/2\varepsilon<1/2. Then, for a function f:f\colon\mathbb{N}\to\mathbb{N}, fLT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛εf\leq_{LT}{\tt DenError}_{\varepsilon} if and only if ff is hyperarithmetic.

Proposition 5.6 also shows that 𝙻𝙻𝙿𝙾1/αLT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛1/(+2){\tt LLPO}_{1/\ell}^{\alpha}\not\leq_{LT}{\tt DenError}_{1/(\ell+2)} for a sufficiently powerful oracle α\alpha. By Observation 4.1, this implies that 𝙴𝚛𝚛𝚘𝚛1/LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛1/(+2){\tt Error}_{1/\ell}\not\leq_{LT}{\tt DenError}_{1/(\ell+2)}. Now it is natural to ask whether 𝙴𝚛𝚛𝚘𝚛1/LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛1/(+1){\tt Error}_{1/\ell}\leq_{LT}{\tt DenError}_{1/(\ell+1)} or not. One can answer this question by introducing the concept of hyperarithmetical reducibility for bilayer functions. First consider the one-query version.

Definition 5.9.

Let ff and gg be bilayer functions. We say that ff is a one-query hyperarithmetically LT-reducible to gg (written fhLT1gf\leq_{hLT}^{1}g) if there exist partial Π11\Pi^{1}_{1} functions HH and KK and a partial function LL such that for any (nc)(n\mid c) and mm,

mg(H(n)L(n,c))K(n,m)f(nc).m\in g(H(n)\mid L(n,c))\implies K(n,m)\in f(n\mid c).

Let ψe:\psi_{e}\colon\!\!\!\subseteq\mathbb{N}\to\mathbb{N} be the eeth patrial Π11\Pi^{1}_{1} function (given by the canonical enumeration of all Π11\Pi^{1}_{1} sets). Then, consider the following partial multifunction:

dom(Π11-𝙻𝙻𝙿𝙾m/k)\displaystyle{\rm dom}(\Pi^{1}_{1}\mbox{-}{\tt LLPO}_{m/k}) ={e:|{j<k:ψe(j)}|m},\displaystyle=\{e\in\mathbb{N}:|\{j<k:\psi_{e}(j)\downarrow\}|\leq m\},
Π11-𝙻𝙻𝙿𝙾m/k(e)\displaystyle\Pi^{1}_{1}\mbox{-}{\tt LLPO}_{m/k}(e) ={0,,k1}{j<k:ψe(j)}.\displaystyle=\{0,\dots,k-1\}\setminus\{j<k:\psi_{e}(j)\downarrow\}.

It is well-known that Π11\Pi^{1}_{1} is higher analogue of computable enumerability, i.e., a set is Π11\Pi^{1}_{1} if and only if there exists a hyperarithmetical enumeration procedure along a computable ordinal; see e.g. [36, 28]. The following is a hyperarithmetical analogue of Proposition 4.2:

Proposition 5.10.

Π11\Pi^{1}_{1}-𝙻𝙻𝙿𝙾m/khLT1𝙴𝚛𝚛𝚘𝚛m/k+1{\tt LLPO}_{m/k}\leq_{hLT}^{1}{\tt Error}_{m/k+1}.

Proof.

We define a secret inner reduction LL as follows: For any edom(Π11-𝙻𝙻𝙿𝙾m/k)e\in{\rm dom}(\Pi^{1}_{1}\mbox{-}{\tt LLPO}_{m/k}),

L(e)={{j<k:ψe(j)} if |{j<k:ψe(j)}|=m{j<k:ψe(j)}{k} if |{j<k:ψe(j)}|<mL(e)=\begin{cases}\{j<k\colon\psi_{e}(j)\downarrow\}&\mbox{ if }|\{j<k\colon\psi_{e}(j)\downarrow\}|=m\\ \{j<k\colon\psi_{e}(j)\downarrow\}\cup\{k\}&\mbox{ if }|\{j<k\colon\psi_{e}(j)\downarrow\}|<m\end{cases}

One can easily check that (L(e))(\ast\mid L(e)) belongs to the domain of 𝙴𝚛𝚛𝚘𝚛m/k+1{\tt Error}_{m/k+1}. For an outer reduction KK, define K(e,j)=jK(e,j)=j for any j<kj<k. To compute K(e,k)K(e,k) along computable ordinal steps, wait for finding mm many j<kj<k such that ψe(j)\psi_{e}(j)\downarrow. If it is found at some ordinal stage, then K(e,k)K(e,k) is defined as the least <k\ell<k such that j\ell\not=j for any such j<kj<k. Otherwise, the computation never terminates, i.e., K(e,k)K(e,k)\uparrow. One can easily see that KK is Π11\Pi^{1}_{1}.

For readers who are not familiar with ordinal computability, we describe the details. Let 𝒪\mathcal{O}\subseteq\mathbb{N} be Kleene’s system of ordinal notations; see e.g. [36, 9]. As Kleene’s 𝒪\mathcal{O} is Π11\Pi^{1}_{1}-complete, and the graph GeG_{e} of ψe\psi_{e} is Π11\Pi^{1}_{1}, there exists a many-one reduction pp witnessing Gem𝒪G_{e}\leq_{m}\mathcal{O}, where m\leq_{m} denotes many-one reducibility. Then, for a𝒪a\in\mathcal{O}, one can consider the stage aa approximation ψe[a]\psi_{e}[a] of ψa\psi_{a}; that is, ψe(n)[a]=m\psi_{e}(n)[a]\downarrow=m if and only if p(n,m)<𝒪ap(n,m)<_{\mathcal{O}}a. Note that <𝒪<_{\mathcal{O}} is c.e. (see e.g. Sacks [36, Theorem I.3.5]); hence ψe[a]\psi_{e}[a]\downarrow is also a c.e. property. Then define GKG_{K} as follows:

(e,k,)GK(a𝒪)[\displaystyle(e,k,\ell)\in G_{K}\iff(\exists a\in\mathcal{O})\big{[} (mj<k)ψe(j)[a]\displaystyle(\exists^{\geq m}j<k)\;\psi_{e}(j)[a]\downarrow
(j<k)[ψe(j)[a]j<k]]\displaystyle\land\;(\forall j<k)\;[\psi_{e}(j)[a]\downarrow\;\rightarrow\;j\not=\ell<k]\big{]}

One can easily see that GKG_{K} is Π11\Pi^{1}_{1} since 𝒪\mathcal{O} is Π11\Pi^{1}_{1}. Hence, by Π11\Pi^{1}_{1}-uniformization (see Sacks [36, Theorem II.2.3] or Moschovakis [28, 4B.4]), there exists a partial Π11\Pi^{1}_{1} function K:2K\colon\!\!\!\subseteq\mathbb{N}^{2}\to\mathbb{N} such that GK(e,k,K(e,k))G_{K}(e,k,K(e,k)) holds whenever (e,k,)GK(e,k,\ell)\in G_{K} for some \ell. As in the proof of Proposition 4.2, one can see that L,K\langle L,K\rangle witnesses Π11-𝙻𝙻𝙿𝙾m/khLT1𝙴𝚛𝚛𝚘𝚛m/k+1\Pi^{1}_{1}\mbox{-}{\tt LLPO}_{m/k}\leq_{hLT}^{1}{\tt Error}_{m/k+1}. ∎

Now we introduce the notion of hyperarithmetical reducibility for bilayer functions. Arthur’s hyperarithmetic strategy is a code τ\tau for a partial Π11\Pi^{1}_{1} function hτ:<h_{\tau}\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}.

Definition 5.11.

Let ff and gg be bilayer functions. We say that ff is hyperarithmetically LT-reducible to gg (written fhLTgf\leq_{hLT}g) if there exists a hyperarithmetical winning Arthur-Nimue strategy for 𝔊(f,g)\mathfrak{G}(f,g).

The following is an analogue of Proposition 5.6:

Proposition 5.12.

Let 𝙿{\tt P} be a partial multifunction whose codomain is \ell\in\mathbb{N} with >0\ell>0. For any ε<1/(+1)\varepsilon<1/(\ell+1), if 𝙿hLT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt P}\leq_{hLT}{\tt DenError}_{\varepsilon}, then 𝙿{\tt P} is hyperarithmetic.

Proof.

The argument is the same as Proposition 5.6. Only the complexity of QQ needs to be considered. If we consider a hyperarithmetical strategy, Φτn\Phi_{\tau}^{n} is no longer a computable function, but a Π11\Pi^{1}_{1} function. For this reason, Ψ\Psi is also Π11\Pi^{1}_{1}. To see this, note that Ψg(n)\Psi^{g}(n) is defined to be jj if and only if there exists a gg-fat finite tree STgS\subseteq T^{g} such that Φτn\Phi_{\tau}^{n} is defined and constant on the leaves of SS and its unique value is jj. This condition is Π11\Pi^{1}_{1} since SS is finite and Φτn\Phi_{\tau}^{n} is Π11\Pi^{1}_{1}. Moreover, as mentioned in the proof of Proposition 5.6, if Ψg(n)\Psi^{g}(n) is defined then the algorithm Ψ\Psi only reads gg up to the height of SS. Thus, Q(n,j)Q(n,j) holds if and only if for any ff, there exists a finite string σ\sigma such that σ\sigma majorizes ff up to |σ||\sigma| and Ψσ(n)=j\Psi^{\sigma}(n)\downarrow=j. This condition is Π11\Pi^{1}_{1}. The rest follows the same argument as in Proposition 5.6. ∎

Corollary 5.13.

For any 2\ell\geq 2, 𝙴𝚛𝚛𝚘𝚛1/LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt Error}_{1/\ell}\leq_{LT}{\tt DenError}_{\varepsilon} if and only if 1/ε1/\ell\leq\varepsilon.

Proof.

The backward direction follows from Observation 5.5. For the forward direction, assume that 1/>ε1/\ell>\varepsilon. It is clear that Π11-𝙻𝙻𝙿𝙾1/(1)\Pi^{1}_{1}\mbox{-}{\tt LLPO}_{1/(\ell-1)} is not hyperarithmetic. In particular, by Proposition 5.12, we have Π11-𝙻𝙻𝙿𝙾1/(1)hLT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε\Pi^{1}_{1}\mbox{-}{\tt LLPO}_{1/(\ell-1)}\not\leq_{hLT}{\tt DenError}_{\varepsilon} since ε<1/\varepsilon<1/\ell. However, by Proposition 5.10, we have Π11-𝙻𝙻𝙿𝙾1/(1)hLT𝙴𝚛𝚛𝚘𝚛1/\Pi^{1}_{1}\mbox{-}{\tt LLPO}_{1/(\ell-1)}\leq_{hLT}{\tt Error}_{1/\ell}. Hence, 𝙴𝚛𝚛𝚘𝚛1/hLT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε{\tt Error}_{1/\ell}\not\leq_{hLT}{\tt DenError}_{\varepsilon}. ∎

Note that the above proof also shows that Π11-𝙻𝙻𝙿𝙾1/hLT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛ε\Pi^{1}_{1}\mbox{-}{\tt LLPO}_{1/\ell}\leq_{hLT}{\tt DenError}_{\varepsilon} if and only if 1/(+1)ε1/(\ell+1)\leq\varepsilon.

The above results say nothing about 𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛0{\tt DenError}_{0}. Note that since the asymptotic density of a cofinite set is 11, we have 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎LT1𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛0{\tt Cofinite}\leq^{1}_{LT}{\tt DenError}_{0}. We show that computability with density error 0 is strictly stronger than computability with finitely many error in the following sense:

Theorem 5.14.

𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎<LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛0{\tt Cofinite}<_{LT}{\tt DenError}_{0}.

Proof.

Suppose not. Then, there exists a winning Arthur-Nimue strategy (τη)(\tau\mid\eta) witnessing 𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛0LT𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎{\tt DenError}_{0}\leq_{LT}{\tt Cofinite}. Except for the first move (A)(\ast\mid A), Merlin’s move is always a number jj\in\mathbb{N}, which yields the tree <\mathbb{N}^{<\mathbb{N}} of all possible moves by Merlin. Here AA is a secret input, which is invisible to Arthur. Hence, Arthur’s strategy τ\tau yields a partial computable function Φτ:<\Phi_{\tau}\colon\!\!\!\subseteq\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}, where Φτ(σ)=u\Phi_{\tau}(\sigma)\downarrow=u if and only if, after reading Merlin’s moves σ\sigma, Arthur’s strategy τ\tau declares termination with uu. For h:<h\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N}, consider the tree <[h]={σ<:(n<|σ|)h(σn)σ(n)}\mathbb{N}^{<\mathbb{N}}[\geq h]=\{\sigma\in\mathbb{N}^{<\mathbb{N}}:(\forall n<|\sigma|)\;h(\sigma\upharpoonright n)\leq\sigma(n)\}. Nimue’s strategy η\eta restricts Merlin’s possible moves to the tree <[ηA]\mathbb{N}^{<\mathbb{N}}[\geq\eta_{A}], where ηA(σ)=η(Aσ)\eta_{A}(\sigma)=\eta(A{}^{\smallfrown}\sigma), and moreover, as τ\tau is winning, the computation Φτ\Phi_{\tau} determines covers the tree <[ηA]\mathbb{N}^{<\mathbb{N}}[\geq\eta_{A}]; that is, for any infinite path xx through <[ηA]\mathbb{N}^{<\mathbb{N}}[\geq\eta_{A}] there exists an initial segment ξ\xi of xx such that Φτ(ξ)\Phi_{\tau}(\xi) is defined.

This ensures the existence of a function h:<h\colon\mathbb{N}^{<\mathbb{N}}\to\mathbb{N} such that the computation Φτ\Phi_{\tau} covers the tree <[h]\mathbb{N}^{<\mathbb{N}}[\geq h]. Consider the set BB of all minimal strings ξ<[h]\xi\in\mathbb{N}^{<\mathbb{N}}[\geq h] such that Φτ(ξ)\Phi_{\tau}(\xi) is defined. Note that any infinite path xx through <[h]\mathbb{N}^{<\mathbb{N}}[\geq h] has an initial segment in BB. Then, BB yields a well-founded subtree T={ζ<:(ξB)ζξ}T=\{\zeta\in\mathbb{N}^{<\mathbb{N}}:(\exists\xi\in B)\;\zeta\preceq\xi\} of <[h]\mathbb{N}^{<\mathbb{N}}[\geq h] so that BB is the set of all leaves of TT. One can see that if σT\sigma\in T is not a leaf then the set succT(σ){\rm succ}_{T}(\sigma) of its immediate successors is cofinite. This is because, for any nh(σ)n\geq h(\sigma), any infinite path extends σn<[h]\sigma{}^{\smallfrown}n\in\mathbb{N}^{<\mathbb{N}}[\geq h] has an initial segment ρB\rho\in B. Then ρ\rho is a leaf of TT, and since σT\sigma\in T is not a leaf, ρ\rho must extend σn\sigma{}^{\smallfrown}n. Hence we have σnT\sigma{}^{\smallfrown}n\in T since a tree is \preceq-downward closed.

We label each node of this well-founded tree as follows: First, a leaf ρT\rho\in T is labeled by the value of Φτ(ρ)\Phi_{\tau}(\rho). If σT\sigma\in T is not a leaf, then turn to its immediate successors. If σ\sigma has infinitely many immediate successors which have the same label cc, then σ\sigma is also labeled by cc. If there is no such label cc, then σ\sigma is labeled by \infty.

Now, suppose that the label of the root of TT is cc\not=\infty. Then, Merlin plays {c}\mathbb{N}\setminus\{c\} as his first move, which has clearly asymptotic density 11. In the following, we assume that Arthur and Nimue follows their winning strategies τ\tau and η\eta, respectively. If Nimue reacts to the above move with z0z_{0}, search for x1z0x_{1}\geq z_{0} such that x1T\langle x_{1}\rangle\in T and the label of x1\langle x_{1}\rangle is cc. Such an x1x_{1} exists, since for the former condition x1T\langle x_{1}\rangle\in T, recall that the set of immediate successors of a node in TT is cofinite, and for the latter condition, the label of the root is cc, so there are infinitely many immediate successors labeled by cc. Then Merlin plays x1x_{1} as his next move. Continuing this argument, Merlin can keep returning nodes of TT with the same label cc, and Merlin’s moves eventually reach a leaf of TT. Reaching a leaf means that Arthur declares termination of the game with some value Φτ(ρ)\Phi_{\tau}(\rho), but since the label of this leaf ρ\rho is cc, the value Φτ(ρ)\Phi_{\tau}(\rho) must be cc. Since c𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛0({c})c\not\in{\tt DenError}_{0}(\mathbb{N}\setminus\{c\}) and Merlin’s first move is {c}\mathbb{N}\setminus\{c\}, this means that Merlin wins the game, which contradicts our assumption that (τη)(\tau\mid\eta) is a winning Arthur-Nimue strategy.

Thus, the root of TT must be labeled by \infty. We say that a node σT\sigma^{\prime}\in T is a big sibling of a node σT\sigma\in T if σ\sigma and σ\sigma^{\prime} take the same value except for the last entry, and σ\sigma^{\prime} is larger than σ\sigma for the last entry; that is, σ(n)=σ(n)\sigma(n)=\sigma^{\prime}(n) for any n<|σ|1n<|\sigma|-1 and σ(|σ|1)<σ(|σ|1)\sigma(|\sigma|-1)<\sigma^{\prime}(|\sigma|-1). We also say that a node σT\sigma\in T is decisive if all proper initial segments of σ\sigma are labeled by \infty, but σ\sigma and all big siblings of σ\sigma are labeled by some values in \mathbb{N}. Note that the root of TT is not decisive as it is labeled by \infty, so any decisive node has a proper initial segment. Let (αs)s(\alpha_{s})_{s\in\mathbb{N}} be a list of all decisive nodes of TT. First put d0=1d_{0}=1. At stage ss, assume that dsd_{s} has already been defined. The immediate predecessor αs\alpha_{s}^{-} of αs\alpha_{s} is labeled by \infty since αs\alpha_{s} is decisive. The label \infty of αs\alpha_{s}^{-} means that, for any cc\in\mathbb{N}, there are only finitely many siblings of αs\alpha_{s} labeled by cc. Therefore, by the pigeonhole principle, αs\alpha_{s} has a big sibling labeled by some cs>dsc_{s}>d_{s}. As αs\alpha_{s} is decisive, csc_{s} must be a finite value. Then, put ds+1=2csd_{s+1}=2c_{s}.

Now Merlin plays {cs:s}\mathbb{N}\setminus\{c_{s}:s\in\mathbb{N}\} as his first move, which has asymptotic density 11 since cs+1>2csc_{s+1}>2c_{s} for any ss by our construction. At the round n+1n+1, assume that the history of Merlin’s previous moves is x1,,xnx_{1},\dots,x_{n}, and Nimue’s previous move is znz_{n}. First consider the case that the label of σn=x1,,xn\sigma_{n}=\langle x_{1},\dots,x_{n}\rangle is \infty. If σn\sigma_{n} has infinitely many immediate successors labeled by \infty, then as his next move Merlin plays xn+1znx_{n+1}\geq z_{n} so that σnxn+1T\sigma_{n}{}^{\smallfrown}x_{n+1}\in T is labeled by \infty. Otherwise, there are only finitely many immediate successors of σn\sigma_{n} labeled by \infty, and thus, there exists a decisive immediate successor of σn\sigma_{n} of the form σnz\sigma_{n}{}{}^{\smallfrown}z for some zznz\geq z_{n}. Then we must have αs=σnz\alpha_{s}=\sigma_{n}{}{}^{\smallfrown}z for some ss. As seen above, αs\alpha_{s} has a big sibling αs=σnz\alpha_{s}^{\prime}=\sigma_{n}{}{}^{\smallfrown}z^{\prime} labeled by csc_{s}. As his next move, Merlin plays the last entry xn+1:=zx_{n+1}:=z^{\prime} of αs\alpha_{s}^{\prime}. Note that the history αs=x1,,xn,xn+1\alpha_{s}^{\prime}=\langle x_{1},\dots,x_{n},x_{n+1}\rangle of moves is now labeled by csc_{s}. Next consider the case that the label of σn=x1,,xn\sigma_{n}=\langle x_{1},\dots,x_{n}\rangle has already become a finite value cc\in\mathbb{N}. In this case, σn\sigma_{n} has infinitely many immediate successors labeled by cc, and then as his next move Merlin can play xn+1znx_{n+1}\geq z_{n} so that σnxn+1T\sigma_{n}{}^{\smallfrown}x_{n+1}\in T is labeled by cc.

As this play follows a winning Arthur-Nimue strategy, Arthur declares termination at some round. Then, the history of Merlin’s moves eventually reaches a leaf of TT which is labeled by a finite value. Hence, the history of Merlin’s moves is labeled by a finite value at some round, and once the label becomes a finite value, our construction of Merlin’s strategy ensures that the value of the label does not change after that. Indeed, Merlin’s strategy described above stabilizes the labels of the histories of Merlin’s moves to csc_{s} for some ss. Therefore, the history of Merlin’s moves eventually reaches a leaf of TT which is labeled by csc_{s}, which turns out to be (the second coordinate of) Arthur’s last move since the leaf of TT is labeled by the value of Φτ\Phi_{\tau} on it. However, cs𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛0({cs:s})c_{s}\not\in{\tt DenError}_{0}(\mathbb{N}\setminus\{c_{s}:s\in\mathbb{N}\}) and Merlin’s first move is {cs:s}\mathbb{N}\setminus\{c_{s}:s\in\mathbb{N}\}. This means that Merlin wins the game, which contradicts our assumption that (τη)(\tau\mid\eta) is a winning Arthur-Nimue strategy. Consequently, there exists no winning Arthur-Nimue strategy; hence 𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎<LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛0{\tt Cofinite}<_{LT}{\tt DenError}_{0}. ∎

Hence, we get the strict hierarchy of computability with error density ε\varepsilon:

𝙲𝚘𝚏𝚒𝚗𝚒𝚝𝚎<LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛0<LT<LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛1/3<LT𝙳𝚎𝚗𝙴𝚛𝚛𝚘𝚛1/2LT¬¬.{\tt Cofinite}<_{LT}{\tt DenError}_{0}<_{LT}\dots<_{LT}{\tt DenError}_{1/3}<_{LT}{\tt DenError}_{1/2}\equiv_{LT}\neg\neg.
Refer to caption
Figure 2. Higher parts on Lawvere-Tierney topologies on the effective topos

Figure 2 summarizes some of basic implications about the rea\leq_{\rm rea}-ordering on the Lawvere-Tierney topologies (around hyperarithmetic Turing topologies) on the effective topos, where ABA\to B means BLTAB\leq_{LT}A (or BreaAB^{\Game\to}\leq_{\rm rea}A^{\Game\to}).

6. Future work

One may come up with other basic bilayer functions not mentioned in this article, but we do not know which ones are non-trivial and interesting. It is a vague question, but finding interesting basic bilayer functions is a big problem in itself.

Question 1.

Is there any other interesting basic bilayer function?

In Section 5.1, we have seen that the \mathbb{N}-version of weak weak König’s lemma, 𝚆𝚆𝙺𝙻{\tt WWKL}, is Turing equivalent to 𝙻𝙻𝙿𝙾{\tt LLPO}. Due to this kind of phenomenon, unlike \mathbb{N}^{\mathbb{N}}-computation, it is difficult to find a nontrivial partial multifunction in the context of \mathbb{N}-computation. There are partial multifunctions on \mathbb{N} not mentioned so far, such as all-or-unique choice 𝙰𝚘𝚄𝙲X{\tt AoUC}_{X} on XX (see e.g. [22]). However, the \mathbb{N}-version of 𝙰𝚘𝚄𝙲2{\tt AoUC}_{2^{\mathbb{N}}} turns out to be Turing equivalent to 𝙻𝙻𝙿𝙾{\tt LLPO} by the same argument as above, and 𝙰𝚘𝚄𝙲{\tt AoUC}_{\mathbb{N}} is Turing equivalent to the halting problem by considering enumeration time functions as in Section 2.1.

Question 2.

Is there any other natural partial multifunction on \mathbb{N} whose Turing degree strictly lie between the computable ones and the halting problem?

In this article, we have focused on topologies on the effective topos; however “the world of computable mathematics” for modern computability theorists seems to be the Kleene-Vesley topos rather than the effective topos. As indicated in Section 2.2, the structure of Lawvere-Tierney topologies on the Kleene-Vesley topos seems isomorphic to the bilayer version of generalized Weihrauch reducibility. This structure should also be explored in depth in the future.

As another topos, the realizability topos 𝐑𝐓(K2){\bf RT}(K_{2}) induced by Kleene’s second algebra corresponds to “the world of continuous mathematics,” and a Lawvere-Tierney topology on the topos is a kind of data that indicates how much discontinuity to add to the world. One can see that the structure of Lawvere-Tierney topologies on the topos 𝐑𝐓(K2){\bf RT}(K_{2}) is isomorphic to the bilayer version of generalized continuous Weihrauch reducibility.

In general, there are many other toposes that are related to computability theory and (effective) descriptive set theory. As mentioned in Kihara [21], any Σ\Sigma^{\ast}-pointclass (see [28]) yields a (relative) partial combinatory algebra, which induces a topos. If the pointclass 𝚷~ 11\raisebox{0.0pt}[0.0pt][0.0pt]{$\underset{\widetilde{}}{\mathbf{\Pi}}$}\mbox{\hskip 1.0pt}^{1}_{1} is used as a seed, a topos corresponding to “the world of Borel measurable mathematics” will be created, and if the pair (Π11,𝚷~ 11)(\Pi^{1}_{1},\raisebox{0.0pt}[0.0pt][0.0pt]{$\underset{\widetilde{}}{\mathbf{\Pi}}$}\mbox{\hskip 1.0pt}^{1}_{1}) is used, a topos corresponding to “the world of effective Borel measurable mathematics” will be created. These lead us to the study of “Lawvere-Tierney topologies for (effective) descriptive set theorists.” The topologies in this case are some sort of data that indicate how much non-Borel objects to add to the world.

It may also be reasonable to study these structures in the context of synthetic descriptive set theory [32]. We leave the exploration of these structures as a future task.

Acknowledgements.

The author would like to thank Satoshi Nakata for valuable discussions. Kihara’s research was partially supported by JSPS KAKENHI Grant 19K03602 and 21H03392, and the JSPS-RFBR Bilateral Joint Research Project JPJSBP120204809.

References

  • [1] Paul-Elliot Anglès d’Auriac and Takayuki Kihara. A comparison of various analytic choice principles. to appear in Journal of Symbolic Logic, arXiv:1907.02769, 2019.
  • [2] Andrej Bauer. Instance reducibility and Weihrauch degrees. arXiv:2106.01734, 2021.
  • [3] Laurent Bienvenu, Noam Greenberg, and Benoit Monin. Bad oracles in higher computability and randomness. Israel J. Math., 241(1):229–276, 2021.
  • [4] Vasco Brattka and Guido Gherardi. Effective choice and boundedness principles in computable analysis. Bull. Symbolic Logic, 17(1):73–117, 2011.
  • [5] Vasco Brattka, Guido Gherardi, and Rupert Hölzl. Probabilistic computability and choice. Inform. and Comput., 242:249–286, 2015.
  • [6] Vasco Brattka, Guido Gherardi, and Arno Pauly. Weihrauch complexity in computable analysis. arXiv: 1707.03202, 2017.
  • [7] Vasco Brattka and Arno Pauly. Computation with advice. In Xizhong Zheng and Ning Zhong, editors, Proceedings Seventh International Conference on Computability and Complexity in Analysis, Zhenjiang, China, 21-25th June 2010, volume 24 of Electronic Proceedings in Theoretical Computer Science, pages 41–55. Open Publishing Association, 2010.
  • [8] Douglas Cenzer and Peter G. Hinman. Degrees of difficulty of generalized r.e. separating classes. Arch. Math. Logic, 46(7-8):629–647, 2008.
  • [9] Chi Tat Chong and Liang Yu. Recursion theory, volume 8 of De Gruyter Series in Logic and its Applications. De Gruyter, Berlin, 2015. Computational aspects of definability, With an interview with Gerald E. Sacks.
  • [10] S. Barry Cooper. Computability Theory. Chapman & Hall/CRC, Boca Raton, FL, 2004.
  • [11] Hannes Diener. Constructive reverse mathematics, 2018. Habilitationsschrift, University of Siegen.
  • [12] Rodney G. Downey and Denis R. Hirschfeldt. Algorithmic Randomness and Complexity. Theory and Applications of Computability. Springer, New York, 2010.
  • [13] Damir Dzhafarov and Ludovic Patey. COH{\rm COH}, SRT22{\rm SRT}^{2}_{2}, and multiple functionals. arXiv: 1905.00321, 2019.
  • [14] Damir D. Dzhafarov. Strong reductions between combinatorial principles. J. Symb. Log., 81(4):1405–1431, 2016.
  • [15] Damir D. Dzhafarov, Denis R. Hirschfeldt, and Sarah C. Reitzes. Reduction games, provability, and compactness. arXiv:2008.00907, 2020.
  • [16] Jun Le Goh. Compositions of multivalued functions. Computability, 9(3-4):231–247, 2020.
  • [17] Jun Le Goh, Arno Pauly, and Manlio Valenti. Finding descending sequences through ill-founded linear orders. to appear in Journal of Symbolic Logic, arXiv:2010.03840, 2021.
  • [18] Edward R. Griffor, editor. Handbook of Computability Theory, volume 140 of Studies in Logic and the Foundations of Mathematics. North-Holland Publishing Co., Amsterdam, 1999.
  • [19] Denis R. Hirschfeldt and Carl G. Jockusch, Jr. On notions of computability-theoretic reduction between Π21\Pi_{2}^{1} principles. J. Math. Log., 16(1):1650002, 59, 2016.
  • [20] J. M. E. Hyland. The effective topos. In The L.E.J. Brouwer Centenary Symposium (Noordwijkerhout, 1981), volume 110 of Stud. Logic Foundations Math., pages 165–216. North-Holland, Amsterdam-New York, 1982.
  • [21] Takayuki Kihara. Degrees of incomputability, realizability and constructive reverse mathematics. arXiv:2002.10712, 2020.
  • [22] Takayuki Kihara and Arno Pauly. Dividing by zero—how bad is it, really? In 41st International Symposium on Mathematical Foundations of Computer Science, volume 58 of LIPIcs. Leibniz Int. Proc. Inform., pages Art. No. 58, 14. Schloss Dagstuhl. Leibniz-Zent. Inform., Wadern, 2016.
  • [23] Sori Lee. Subtoposes of the effective topos. arXiv:1112.5325, 2011.
  • [24] Sori Lee and Jaap van Oosten. Basic subtoposes of the effective topos. Ann. Pure Appl. Logic, 164(9):866–883, 2013.
  • [25] Vladimir Lifschitz. CT0{\rm CT}_{0} is stronger than CT0!{\rm CT}_{0}!. Proc. Amer. Math. Soc., 73(1):101–106, 1979.
  • [26] Benoit Monin and Ludovic Patey. Π10\Pi^{0}_{1}-encodability and omniscient reductions. Notre Dame J. Form. Log., 60(1):1–12, 2019.
  • [27] Antonio Montalbán. Martin’s conjecture: a classification of the naturally occurring Turing degrees. Notices Amer. Math. Soc., 66(8):1209–1215, 2019.
  • [28] Yiannis N. Moschovakis. Descriptive Set Theory, volume 155 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, second edition, 2009.
  • [29] Eike Neumann and Arno Pauly. A topological view on algebraic computation models. J. Complexity, 44:1–22, 2018.
  • [30] Piergiorgio Odifreddi. Classical Recursion Theory, volume 125 of Studies in Logic and the Foundations of Mathematics. North-Holland Publishing Co., Amsterdam, 1989. The theory of functions and sets of natural numbers, With a foreword by G. E. Sacks.
  • [31] Arno Pauly. Many-one reductions and the category of multivalued functions. Math. Structures Comput. Sci., 27(3):376–404, 2017.
  • [32] Arno Pauly and Matthew de Brecht. Descriptive set theory in the category of represented spaces. In 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS 2015), pages 438–449. IEEE Computer Soc., Los Alamitos, CA, 2015.
  • [33] Andrew M. Pitts. The Theory of Triposes. PhD thesis, The University of Cambridge, 1981.
  • [34] Fred Richman. Polynomials and linear transformations. Linear Algebra Appl., 131:131–137, 1990.
  • [35] Hartley Rogers, Jr. Theory of Recursive Functions and Effective Computability. MIT Press, Cambridge, MA, second edition, 1987.
  • [36] Gerald E. Sacks. Higher Recursion Theory, volume Volume 2 of Perspectives in Mathematical Logic. Springer-Verlag, Berlin, 1990.
  • [37] Stephen G. Simpson. An extension of the recursively enumerable Turing degrees. J. Lond. Math. Soc. (2), 75(2):287–297, 2007.
  • [38] Stephen G. Simpson. Subsystems of Second Order Arithmetic. Perspectives in Logic. Cambridge University Press, 2009.
  • [39] Robert I. Soare. Recursively Enumerable Sets and Degrees. Perspectives in Mathematical Logic. Springer-Verlag, Berlin, 1987. A study of computable functions and computably generated sets.
  • [40] Jaap van Oosten. Realizability: an introduction to its categorical side, volume 152 of Studies in Logic and the Foundations of Mathematics. Elsevier B. V., Amsterdam, 2008.
  • [41] Jaap van Oosten. Realizability with a local operator of A. M. Pitts. Theoret. Comput. Sci., 546:237–243, 2014.
  • [42] Linda Westrick. A note on the diamond operator. Computability, 10(2):107–110, 2021.
  • [43] Martin Ziegler. Real computation with least discrete advice: a complexity theory of nonuniform computability with applications to effective linear algebra. Ann. Pure Appl. Logic, 163(8):1108–1139, 2012.