Feasibility of Primality in Bounded Arithmetic

This paper establishes the correctness of the AKS primality test within the bounded arithmetic theory T2countT^{count}_2 (equivalently VTC20VTC^0_2) by proving its validity in S21+iWPHPS^1_2 + iWPHP under two algebraic axioms and demonstrating that these axioms, along with new formalizations of key number-theoretic and algebraic results, are provable in VTC20VTC^0_2.

Original authors: Raheleh Jalali, Ondřej Ježil

Published 2026-04-08✓ Author reviewed
📖 8 min read🧠 Deep dive

This is an AI-generated explanation of the paper below. It is not written by the authors. For technical accuracy, refer to the original paper. Read full disclaimer

The Big Picture: The "Feasible" Proof

Imagine you have a massive library of mathematical truths. Some truths are easy to prove; others are so complex that proving them would take longer than the age of the universe, even with the fastest supercomputer.

In 2002, mathematicians discovered the AKS algorithm, a magical recipe that can tell you if a number is "Prime" (like 7 or 13) or "Composite" (like 8 or 15) very quickly. It's like having a super-fast metal detector that never makes a mistake.

But here is the puzzle: Just because we have a fast machine that works, does that mean we have a fast proof that the machine works?

This paper asks: Can we prove the AKS algorithm is correct using only "feasible" logic? In the world of math, "feasible" usually means a proof that doesn't require infinite resources or impossible calculations. The authors, Raheleh Jalali and Ondřej Ježil, say Yes. They managed to fit the entire proof of the AKS algorithm into a very strict, "lean" logical system called VTC02VTC_0^2.

Think of it like this: They took a giant, complex architectural blueprint (the AKS proof) and showed that it can be built using only simple, pre-fabricated bricks (basic arithmetic rules) without needing any heavy cranes or infinite supplies.


The Characters in Our Story

To understand how they did it, let's meet the cast of characters:

  1. The AKS Algorithm (The Detective): A detective that checks if a number is prime. It's fast and reliable.
  2. The Target System (VTC02VTC_0^2): This is the detective's office where the final proof lives. It is a very small, strict office. The detective here is very smart but has very limited tools. They can't use complex machinery; they can only use basic addition, multiplication, and simple counting. While this system is considered "weak" compared to the full power of standard mathematics, it is actually stronger than other systems often used for similar proofs (like T2T_2) when it comes to the specific types of statements needed here. It is the ultimate goal: proving the algorithm works within these tight constraints.
  3. The "Magic Axioms" (GFLT and RUB): These are the special tools the authors had to invent to help the detective in the small office solve the case.

The Challenge: Why is this hard?

Proving the AKS algorithm is tricky because it relies on some deep algebraic tricks involving polynomials (equations with XX's) and roots (solutions to those equations).

Imagine the AKS algorithm is trying to prove a number is prime by checking if a giant, complex equation behaves a certain way.

  • The Problem: In the "Lean" office, the detective is only allowed to look at small, simple equations. The AKS proof requires looking at huge, messy equations that the detective isn't allowed to see directly.
  • The Analogy: It's like trying to prove a bridge is safe by looking at the microscopic structure of the steel, but your eyesight is so weak you can only see the paint on the surface. You need a way to infer the strength of the steel without seeing it.

The Solution: Two New Tools

To make the proof work in the small office, the authors introduced two "Magic Axioms" (rules they added to the detective's rulebook).

1. The "Generalized Fermat's Little Theorem" (GFLT)

  • What it is: A famous math rule (Fermat's Little Theorem) says that if you have a prime number, certain math patterns repeat in a very specific way. The AKS algorithm relies on a more complex version of this pattern.
  • The Analogy: Imagine a clock. If you know the time is 12:00, you know that in 12 hours, it will be 12:00 again. This is a simple pattern. The AKS algorithm needs to know that if you have a "prime clock," a much more complex dance of numbers will always land back on the starting point.
  • The Fix: The authors added a rule to the small office that says, "We accept that this complex dance works, even if we can't prove every single step of the dance right now." This allows the detective to skip the heavy lifting and assume the pattern holds.

2. The "Root Upper Bound" (RUB)

  • What it is: In algebra, a polynomial of degree NN can have at most NN solutions (roots). The AKS proof needs to count these solutions to prove the number is prime.
  • The Analogy: Imagine a garden with a fence. You know there are at most 5 flowers in the garden. The AKS proof needs to point to every single flower and say, "That's one, that's two..."
  • The Problem: In the small office, the detective can't easily count the flowers if the garden is huge and the flowers are hidden in a complex maze.
  • The Fix: The authors added a "Root Upper Bound" tool. This is like a magical map that instantly labels every flower in the garden with a number from 1 to 5. It doesn't tell you where the flowers are, but it guarantees that if you find a flower, you can give it a unique ID number, and you'll never run out of numbers. This allows the detective to count the "roots" of the equation without getting lost in the maze.

The Journey of the Proof

The authors didn't just throw these tools at the problem; they built a bridge step-by-step using a two-part strategy:

  1. Step 1: The Modular Step (S12S_1^2 + Axioms): First, they showed that if you have a basic logical system (S12S_1^2) and you simply assume the two Magic Axioms (GFLT and RUB) are true, you can prove the AKS algorithm works. This step isolates the core logic of the AKS proof, showing exactly what extra rules are needed to make it work.
  2. Step 2: The Consolidation Step (VTC02VTC_0^2): Then, they went to their target system, VTC02VTC_0^2. They proved that this system is actually strong enough to prove the Magic Axioms themselves are true.
    • They proved the "Generalized Fermat" rule using a clever counting trick (like counting how many times a number divides into a factorial).
    • They proved the "Root Upper Bound" rule by showing that you can algorithmically find and label the roots of these equations, just like sorting a deck of cards.

By connecting these dots, they showed that the "extra rules" needed for the proof are not just assumptions, but facts that the system VTC02VTC_0^2 can verify on its own.

The Grand Conclusion

By connecting these dots, the authors proved:
"The AKS algorithm is correct, and we can prove it using a very restricted, yet surprisingly powerful, logical system."

Why Does This Matter?

  1. Trust in Math: It confirms that the AKS algorithm isn't just a "black box" that works by luck. It is built on rock-solid, fundamental logic that doesn't require infinite power.
  2. Computer Science: It tells us that the complexity of proving primality is "feasible" in a very specific sense. It fits within the limits of what computers can reasonably handle, specifically within the Counting Hierarchy.
  3. The "Reverse Mathematics" Game: This is part of a game where mathematicians try to find the absolute minimum amount of logic needed to prove a theorem. The authors found a very low floor for this proof, showing that primality testing is a very "natural" and "simple" concept in the grand scheme of math.

In a Nutshell

The authors took a complex, high-tech proof (AKS) and showed that it can be dismantled and rebuilt using only simple, pre-fabricated bricks. They first identified the exact extra bricks needed (GFLT and RUB) to make the proof work in a basic system, and then showed that their target system (VTC02VTC_0^2) is strong enough to manufacture those bricks itself.

A Note on "Feasibility": It is important to be nuanced here. The system VTC02VTC_0^2 is indeed very "weak" compared to the full power of standard mathematics. However, it is not exactly the same as "polynomial-time" reasoning (the strictest definition of feasible). Its complexity corresponds to the Counting Hierarchy, which is actually stronger than simple polynomial-time reasoning. So, while the proof is incredibly efficient and "lean" by the standards of mathematical logic, it still operates in a realm slightly more powerful than the absolute minimum for computer efficiency.

It's like proving that a skyscraper can be built using only a hammer and a saw, provided you have a very clever blueprint—and that blueprint is slightly more advanced than a basic hammer-and-saw kit, but still far simpler than a full construction crane.

Drowning in papers in your field?

Get daily digests of the most novel papers matching your research keywords — with technical summaries, in your language.

Try Digest →