<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Modeling of Provability in Algebraic Logic</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Andrea Formisano</string-name>
          <email>andrea.formisano@uniud.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Isacco Gavazzi</string-name>
          <email>isaccogavazzi@me.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eugenio G. Omodeo</string-name>
          <email>eomodeo@units.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DMIF, Dept. of Mathematics</institution>
          ,
          <addr-line>Computer Science and Physics</addr-line>
          ,
          <institution>University of Udine</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>DMIG, Dept. of Mathematics</institution>
          ,
          <addr-line>Informatics and Geosciences</addr-line>
          ,
          <institution>University of Trieste</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>It has long been established that the set Th of theorems in an axiomatic formal theory is recursively enumerable (r.e.). Building upon the Davis-Putnam-Robinson-Matiyasevich theorem, which states that every r.e. set is Diophantine, this paper explores the complexity of representing Th through a Diophantine equation  = 0. We contend that a good trade-of between two primary measures of the complexity of the representation, which are the number of unknowns and the degree of the polynomial , should aim at the transparency of the representation. Our work builds on a previous construction, notably that of M. Carl and B.Z. Moroz, who have provided a Diophantine representation of the sentences provable in the Gödel-Bernays class theory (NBG) within first-order predicate calculus. In contrast, our Diophantine representation of version of Schröder's algebra of relations, specifically the Givant. Additionally, we replace NBG's traditional axioms with an alternative axiomatization by H. Friedmann. These changes reduce the complexity of the Diophantine representation of NBG's provability, while maintaining equivalence to more classical formalizations. While we provide only preliminary insights into this novel equational axiomatization, we report on initial experiments with these axioms using the Vampire theorem prover.</p>
      </abstract>
      <kwd-group>
        <kwd>Diophantine sets</kwd>
        <kwd>Algebraic logic</kwd>
        <kwd>Class theory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        For a long time (see, e.g., [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]), it has been known that the set Th of all theorems of an axiomatic formal
theory is recursively enumerable (r.e. for short). In light of the Davis-Putnam-Robinson-Matiyasevich
theorem [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ], which claims that every r.e. set is Diophantine, it follows that under any efective
can be determined such that the following biimplication holds for each sentence  :
encoding  of sentences by natural numbers, a polynomial (, 1, . . . ,  ) with integer coeficients

∈ Th ↔ (∃ 1, . . . ,  ∈ N)(︀ ( ( ); 1, . . . ,  ) = 0 )︀ .
( )
†
      </p>
      <p>
        How complex is such a set of theorems? Two complexity measures associated with a Diophantine
representation (†), as well as trade-ofs between the two, are discussed in [4, p. 153 f.]:
Rank of Th: The minimum possible value of  , the number of unknowns  in a representation (†).
Order of Th: The minimum possible degree of  with respect to the unknowns  in (†).
Taken alone, the order can always be kept below 5—at the price, however, of a significant increase in
the rank (see [4, pp. 3–4]). Taken alone, the rank can always be kept below 11—though at the cost of an
order exceeding 1044 (see [5, p. 552]); ways of balancing the two measures emerge, in fact, from the
study [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] on universal Diophantine equations.
      </p>
      <p>A criterion for best associating a polynomial  with a theory Th is that the construction of  should
be transparent, in the sense that it closely mirrors the process of deriving a theorem  from the axioms
of Th in a specific formal system. This criterion may appear somewhat elusive, but it is well illustrated
 https://users.dimi.uniud.it/~andrea.formisano/ (A. Formisano); https://sites.units.it/eomodeo/index.html/ (E. G. Omodeo)</p>
      <p>CEUR</p>
      <p>
        ceur-ws.org
by the manner in which Merlin Carl and Boris Z. Moroz [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] treated the Gödel-Bernays class theory (here
referred to as NBG, after the initials of von Neumann, Bernays, and Gödel) as formalized in first-order
predicate calculus (see [7, Chapter 4]).
      </p>
      <p>
        This paper presents an emulation, by the authors, of the work of Carl and Moroz. However, instead
of using first-order logic, the formalism underlying the axiomatization of NBG adopts a modernized
version of Ernst Schröder’s algebra of (dyadic) relations, specifically the equational logic ℒ× , extensively
discussed by Alfred Tarski and Steven Givant in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Furthermore, the axioms of the theory have been
replaced by an alternative axiomatization, proposed by Harvey Friedmann in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. These changes have
streamlined the complexity of the Diophantine representation of NBG’s provability, even though the
new formalization remains equivalent to more classical ones.
      </p>
      <p>While only a glimpse of the novel axiomatization of NBG based on ℒ× is ofered, the article reports
on the initial stages of experimentation with these axioms, assisted by the theorem prover Vampire (cf.
https://vprover.github.io/).</p>
    </sec>
    <sec id="sec-2">
      <title>2. Polynomial of a Theory Specified in a Formal System</title>
      <p>We begin by stating our goal in general terms. Our goal is to encode a formalized theory using
Diophantine equations. The theory is based on a symbolic language and consists of the following
components:
1. A finite number of logical axiom schemata.
2. A finite number of derivation rules, each applying to at most two premises.</p>
      <sec id="sec-2-1">
        <title>3. A finite set of proper axiom schemata.</title>
        <p>Together with the language, the first two components define the underlying logical calculus, while the
third specifies the theory itself.</p>
        <p>Let F be the set of all statements of the formal language, and let Th ⊆ F be the set of provable
theorems of the theory. We assume the availability of an efective bijection  : F → N that assigns a
unique natural number to each statement.</p>
        <p>By the Davis-Putnam-Robinson-Matiyasevich theorem, every recursively enumerable set is
Diophantine. Since Th is recursively enumerable, there exists a Diophantine polynomial  := (; 1, . . . ,  )
such that the equation  = 0 has solutions in the set N of natural numbers if and only if the parameter
 belongs to  [Th]. Our objective is to explicitly construct such a polynomial .</p>
        <p>Although general techniques exist for this purpose, our construction will provide deeper insight into
the number-theoretic devices underlying the Diophantine representation of Th.</p>
        <p>We proceed with the following subtasks:1
• Constructing a Diophantine polynomial  ∈ Z[; ⃗1], where ⃗1 = (1, . . . , 1 ), that admits
solutions in N1 if and only if  is the number corresponding to one of the logical axioms.
• Constructing a Diophantine polynomial  ∈ Z[, , ; ⃗2], where ⃗2 = (1, . . . , 2 ), that
admits solutions in N2 if and only if  − 1() is obtainable from  − 1() and  − 1() by means
of one of the derivation rules.
• Constructing a Diophantine polynomial  ∈ Z[; ⃗3], where ⃗3 = (1, . . . , 3 ), that admits
solutions in N3 if and only if  is the number corresponding to one of the adopted proper axioms.
We will ensure that these three polynomials take only nonnegative integer values. This does not restrict
generality, as the property or relation over N represented by a Diophantine parametric polynomial
remains unchanged when the polynomial is squared. To smooth the presentation, we also impose that
1For clarity, when representing a polynomial, we sometimes separate variables using ‘;’ to distinguish those that act as
parameters from those that are viewed (even if only implicitly) as existentially bounded variables.
1 = 2 = 3 , and denote this common value as : in fact, we can multiply any Diophantine polynomial
not involving a variable  by the monomial  + 1, without afecting the relation it represents.</p>
        <p>A proof is a nonempty list of statements each of which is either an axiom or is derived, thanks to a
derivation rule, from statements which precede it in the list. We can hence say:
 ∈ Th
⇐⇒</p>
        <p>(∃  ∈ N) (∃ 0, 1, . . . ,  ∈ F) such that
•  =  and
• for each ℎ ⩽ , one of the the following holds:
– ℎ is a logical axiom, i.e., there exists ⃗ ∈ N such that ︀(  (ℎ), ⃗︀) = 0;
– there exist ,  &lt; ℎ and ⃗ ∈ N such that ℎ is derivable in a single step from  and  , i.e.,
︀(  (ℎ),  (),  ( ), ⃗︀) = 0;
– ℎ is a proper axiom, i.e., there exists ⃗ ∈ N such that ︀(  (ℎ), ⃗︀) = 0.</p>
      </sec>
      <sec id="sec-2-2">
        <title>We can summarize this via the following</title>
        <p>Proposition 1. Define the demonstrative polynomial of the theory as:
(, , ; ⃗) := (; ⃗) · (; ⃗) · (, , ; ⃗) .</p>
      </sec>
      <sec id="sec-2-3">
        <title>Let Th be the set of all theorems of our theory. Then</title>
        <p>[Th] =
{︁ ∈ N ⃒⃒ (∃ , 0, 1, . . . ,  ∈ N) (∀ ℎ ⩽ ) (∃ , , ′, ′ ∈ N) (∃ ⃗ ∈ N) (︁ 0 =
(ℎ, ,  , ⃗) + (ℎ +  + ) · (︀ ( + ′ + 1 − ℎ)2 + ( + ′ + 1 − ℎ)2)︀ + ( − )2 )︁}︁ .</p>
        <p>Each of the three polynomials composing  represents an alternative condition: (, ⃗) = 0
implies that  encodes a logical axiom; (, ⃗) = 0 implies that  encodes a proper axiom; and
(, , , ⃗) = 0 implies that () is directly obtainable from () and () via a derivation rule.
Since we are interested in the locus of zeros, multiplying these polynomials together imposes that at
least one of the conditions must hold. Similarly, we often sum squares of polynomials to enforce that
multiple conditions are jointly satisfied. For example, ( + ′ + 1 − ℎ)2 + ( + ′ + 1 − ℎ)2 vanishes
only when  &lt; ℎ and  &lt; ℎ; ℎ +  +  vanishes only if ℎ = 0, in which case we want  =  = 0; and
( − )2 vanishes precisely when the final statement  coincides with the theorem  we are checking
for.</p>
        <p>Remark 1. Note that when ℎ =  =  = 0, then ℎ =  =  . In this case, 0 is typically an axiom, since
in most formal systems no derivation rule allows deriving a statement from itself. In the calculus ℒ×
to be discussed later, this situation may arise but poses no problem: it leads to having 0 of the form
 = , which is a valid scheme.
⊣</p>
        <p>
          We can encode a finite-length list of natural numbers using two numbers, ℓ and , via the Chinese
Remainder Theorem (see, e.g., [4, pp. 200–201]), as embedded in a technique due to [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. This is
formalized in the following lemma, which is well introduced in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]:
Lemma 1. Let (0, 1, . . . , ) be a tuple whose components ℎ belong to N. Then there exist ℓ,  ∈ N
such that, for each ℎ, the component ℎ can be retrieved via the rule:
i.e.,
ℎ ≡ ℓ
        </p>
        <p>mod 1 +  · (ℎ + 1) and ℎ &lt; 1 +  · (ℎ + 1) ,
(∃  ∈ N)[ (ℓ − ℎ) = (1 +  · (ℎ + 1)) ·  &amp; ℎ ⩽  · (ℎ + 1) ] .</p>
        <p>Accordingly, we can rewrite the specification of  [Th] as follows:
 [Th] = {︁ ⃒⃒ ∃ , ℓ,  ∀ ℎ ⩽  ∃ , , ′, ′∃1, 2, 3 ∃ ⃗ ∈ N ∃ 1, 2, 3, 4, 1, . . . , 4
︁( 0 = (︀ (1 + 1 − (ℎ + 1))2 + (ℓ − 1 − 1((ℎ + 1) + 1))2 + (2 + 2 − ( + 1))2+
(ℓ − 2 − 2(( + 1) + 1))2 + (3 + 3 − ( + 1))2 + (ℓ − 3 − 3(( + 1) + 1))2+
( + 4 − ( + 1))2 + (ℓ −  − 4(( + 1) + 1))2+
(1, 2, 3, ⃗) + (ℎ +  + )(( + ′ + 1 − ℎ)2 + ( + ′ + 1 − ℎ)2))︀ ︁)}︁ .</p>
        <p>
          This can be considered a valid expression in any theory formulated in a formal language with an
arbitrary set of axioms and derivation rules involving at most two premises. To translate such an
expression into a purely Diophantine one, we can use various techniques of eliminating the bounded
universal quantifier. Here we follow the one from [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. We will call the polynomial obtained after this
elimination the polynomial Th of the theory.
        </p>
        <p>The number of variables used for the elimination is ( + 1)( + 1) +  + 1, where
•  =  + 15 is the number of existentially quantified variables after the bounded universal
quantification (recall  = max(1, 2, 3)),
•  is the number of variables present in the polynomial that expresses factorial,
•  is the number of variables present in the polynomial that expresses the product ∏︀
=1(1 + ).</p>
        <p>The resulting polynomial has the maximum degree among the degree of Th and the degrees of the
polynomials needed to perform the translation of factorial and the product ∏︀
=1(1 + ). All this is
immediately deducible by looking at [12, pp. 153–154].</p>
        <p>We do not make these constants explicit because they can always be improved through more refined
Diophantine formulations. Here we follow the theorems in [12, pp. 144–149], from which  = 55 and
 = 115.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Case Study: The Polynomial of NBG, a Class Theory</title>
      <p>The goal of this article is to find a polynomial that represents the class theory NBG. To do so, we will
express the theory in algebraic (relational) form.</p>
      <p>
        Our work follows the line of preceding work on the same theory, as formulated in first-order predicate
calculus by [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Operation
Polynomial</p>
      <p>Polynomial 
Polynomial</p>
      <p>Polynomial</p>
      <p>Value</p>
      <p>Value 
Polynomial Th</p>
      <p>
        [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]-V
14, 953
2
9
14, 976
      </p>
      <p>
        Table 1 presents a brief summary of the diferences in expressive economy between our approach and
that of [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In that table, we denote by V the number of variables, by D the degree, and by A the other
key quantities ,  mentioned at the end of Sec. 2. The number of variables indicated is the number of
existential quantifiers that occur after the bounded universal quantifier. As for our work, the previous
considerations apply to the numerical relationships among the various components. For the work of
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], this holds only partially due to some technical details.
      </p>
      <p>Let deg() denote the degree of a generic polynomial . Observe that deg() ⩽ deg( ·  ·
). Here, the inequality hints that sometimes, as we will do in the following section, it is possible to
combine these three polynomials in a less expensive way than by direct multiplication. This inequality
suggests that, as we will demonstrate in the following section, it is sometimes possible to combine these
three polynomials more eficiently than by direct multiplication.</p>
      <p>We can now proceed to show how to encode logical axioms, proper axioms, and derivation rules.</p>
      <sec id="sec-3-1">
        <title>3.1. Encoding of the equalities of ℒ× , a historical relational language</title>
        <p>
          We briefly recall the syntax of the relational language, which we denote by ℒ× . For further details, the
reader may consult the standard reference [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>The alphabet is as follows:
Definition 3.1.</p>
        <p>The alphabet of ℒ× consists of:
• Two identity symbols, one for relations, one for predicates {, =}
• Two binary operators, union and composition {∪, ∘}
• Two unary operators, reflection and complement {⌣, ¯}
• The membership symbol {  }
• Parentheses {(, )}
Semantically,  is interpreted as a non-empty two-argument relation.</p>
        <p>We define, inductively, the formation rules of predicates:
Definition 3.2.</p>
        <p>The set  of predicates is formed as follows:
• ,  are predicates,
• If ,  are predicates, then  ∪ ,  ∘ , ⌣, ¯ are predicates.</p>
        <p>However, the ultimate objects of our relational calculus are not predicates but equalities.
Definition 3.3. Let ,  ∈ . An equality is an expression of the form  = . We denote by  the
set of such equalities.</p>
        <p>Hence, for the language ℒ× , formulas F are equalities  .</p>
        <p>Since our work concerns exclusively syntactic aspects of the language (in particular, the notion of
derivation), there is no need to define the semantic of ℒ× .</p>
        <p>The logical axioms are reported in section 3.2 and the notion of proof in Section 3.4. The formulation
of the proper axioms requires constructs that go beyond the scope of this article and will be presented
in a diferent work.</p>
        <p>
          We can proceed to number the formulas of the language. We take this idea from Julia Robinson [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>First, we give the definition of Cantor’s bijection in Diophantine form:
Definition 3.4.</p>
        <sec id="sec-3-1-1">
          <title>We denote by c the Cantor pairing function:</title>
          <p>c(, ) =  :=</p>
          <p>2 = ( + )( +  + 1) + 2</p>
          <p>The definition of  proceeds in two steps, the first being inductive:
Definition 3.5.</p>
          <p>Define inductively a numbering  ′ of the formulas 0, 1, . . . :
• 0 =  , i.e.  ′(  ) = 0,
• 1 =  ,
• 4(+1) =  ∪  with  = c(, ),
• 4(+1)+1 =  ∘  with  = c(, ),
• 4+2 = ¯,
• 4+3 = ⌣.</p>
          <p>The map  :  → N is defined as</p>
          <p>( =  ) = c(, ).</p>
          <p>We emphasize that among the many possible bijections between  and N, we have chosen one that
allows us to immediately reconstruct the structure of the formula it represents from a given number.
3.2. Diophantine representation of axiomatic relational laws
We present, without delay, the logical axioms:
1.  ∪  =  ∪</p>
          <p>2.  ∪ ( ∪ ) = ( ∪ ) ∪ 
3.  ∪  ∪ ¯ ∪  =  4.  ∘ ( ∘ ) = ( ∘ ) ∘ 
5. ( ∪ ) ∘  = ( ∘ ) ∪ ( ∘ ) 6.  ∘  = 
7.  ⌣⌣ =  8. ( ∪ )⌣ = ⌣ ∪  ⌣
9. ( ∘ )⌣ = ⌣ ∘  ⌣
10. ( ⌣ ∘  ∘ ) ∪  =</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>These axioms are actually laws, that is, axiom schemata. We begin constructing the polynomials that represent the logical axioms of our theory. We define the auxiliary variables:</title>
          <p>(, , , 1, . . . , 5, 1, . . . , 9) = 2( − 1)2+
(21 − 2c(, ))2 + (22 − 2c(, ))2+
(23 − 2c(, ))2 + (24 − 2c(4(1 + 1) + , ))2+
(25 − 2c(, 4(3 + 1) + ))2 + +(21 − 2c(4 + 2, ))2+
(22 − 2c(4(1 + 1), ))2 + (23 − 2c(, ))2+
(24 − 2c(4(3 + 1) + 1, 4(3 + 1) + 1))2 + (25 − 2c(, 1))2+
(26 − 2c(4 + 3, 4(4(1 + 1) + 1) + 2))2 + (27 − c(4(6 + 1) + 1, 4 + 2))2+
(28 − 2c(16(2 + 1) + 2, 16(1 + 1) + 2))2 + (29 − 2c(4 + 3, 4 + 3))2
and we use these variables in the following polynomials:
 1* = 2 − 2c(4(1 + 1), 4(2 + 1))
 2*,4 = 2 − 2c(4(4 + 1) + , 4(5 + 1) + )
 3* = 2 − 2c(48 + 2, )
 5* = 2 − 2c(4(2 + 1) + 1, 4(4 + 1))
 6* = 2 − 2c(4(5 + 1) + 1, )
 7* = 2 − 2c(4(4 + 3) + 3, )
 8*,9 = 2 − 2c(4(4(1 + 1) + ) + 3, 4(9 + 1) + )
 1*0 = 2 − 2c(4(7 + 1), 4 + 2)
Call × * the product of these, and define × =  + × * 2. We have deg(× * ) = 2 · 8 = 16, deg(× ) =
(2 · 8) · 2 = 32.</p>
          <p>We can now state the following:
Proposition 2. Let (, ⃗1) = × , with ⃗1 = (, , , 1, . . . , 5, 1, . . . , 9, ). Then, if  ∈  is in
one of the logical-axioms schemata, there exists ⃗1 ∈ N18 such that ( ( ), ⃗1) = 0.</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>Proof. Obvious by construction.</title>
          <p>
            Let us elaborate on the first axiom as an example. 1 is the pairing of ,  via c, 2 the pairing of
,  via c. The operation 4(1 + 1) is precisely that given in the definition of  ′ for ∪. Therefore, the
operation c(4(1 + 1), 4(2 + 1)) is exactly the operation performed in the definition of  to represent
the equality of two unions with identical operands in reversed order.
3.3. Diophantine representation of NBG’s proper axioms
We must now perform the same operation for the polynomials of the proper axioms of our class theory.
We have chosen to use the axioms as formulated in [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ]. The choice of this axiomatization depends on
the fact that it is simpler to formulate in the relational language than that of [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ].
          </p>
          <p>Since there are no axiom schemata, the multi-image of each axiom via  will be a single number.</p>
          <p>Hence, we may refrain from explicitly writing out the individual axioms and thus the polynomial:
Lemma 2. Let  : N × Z → Z be a polynomial, and  ∈ . Then</p>
          <p>[ ] = { ∈ N | ∃ ∈ Z s.t.  (, ) =  −  = 0}
with  ∈ N. Furthermore, if we let  = ∏︀ ∈AXp  , then</p>
          <p>[] = { ∈ N | ∃ ∈ Z s.t. (, ) = 0}.</p>
          <p>Note that in this lemma, the presence of the variable  is purely accessory.</p>
          <p>According to our formulation of the proper axioms, || = 15. Again, we have chosen to remain
faithful to a more transparent idea of proof rather than forcing the degree or the number of variables to
be as low as possible. Using appropriate operations, we could indeed have created a single ‘macroaxiom’
to obtain a polynomial  of degree 1 instead of one of degree 30.</p>
          <p>
            Compared to the axiomatization proposed by [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ], ours omits one axiom that we discovered
unnecessary (the union of two classes) and adds one. It is well-known (see [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ]) that the relational calculus is
equivalent to first-order predicate calculus with only three variables. This is an extremely important
limitation of its expressiveness. It is also known, however, that there is a condition under which this
limitation is overcome, providing a calculus with the same expressive power. This condition is the
existence of a pair of conjugate quasi-projections, i.e. two functions 0, 1 for which 0⌣1 = 1. For
some specific 0, 1, this property is our additional axiom. Having clarified this fundamental point,
we can proceed by setting  =  ∪  and thus combining the obtained results:
Proposition 3. Let
then
 (, ⃗1) =  + ︁( × * ·
          </p>
          <p>∏︁  )︁ 2
 ∈AXp
 [AX] = { ∈ N | ∃⃗1 ∈ N18 s.t. AX(, ⃗1) = 0}
and we have deg( ) = (16 + 15) · 2 = 62.</p>
        </sec>
        <sec id="sec-3-1-4">
          <title>Proof. Obvious by construction.</title>
          <p>The polynomial  encodes the fact that a demonstration step   is a logical or a proper axiom.
In this section, we codify, in Diophantine form, the notion of derivability in the relational calculus,
recalled here:
Definition 3.6. A family Θ of equalities is called a theory if it possesses the following closure properties:
0. The logical axioms belong to Θ.
1. When two equalities  =  and  =  belong to Θ, then  =  also belongs to Θ.
2. When , ,  are predicates and  =  belongs to Θ, the equalities  ∪  =  ∪ ,  ∘  =
 ∘ , ¯ = ¯, and ⌣ = ⌣ also belong to Θ.</p>
        </sec>
        <sec id="sec-3-1-5">
          <title>The equalities that form a theory are called its theorems. Here, we are interested in points 1 and 2. We must encode the fact that one equality is derived from another (or from two others) by means of these rules.</title>
          <p>Lemma 3. Let  =  and  =  be equalities in  .</p>
          <p>Given ℎ1 ∈ Z[, ′, ′′, , , ], then the equality  =  is derived from  =  and  =  by
inference rule 1 if and only if
with</p>
          <p>Let</p>
          <p>∃, ,  | ℎ1( ( = ),  ( = ),  ( = ), , , ) = 0
ℎ1(, ′, ′′, , , ) = (2′ − 2c(, ))2 + (2′′ − 2c(, ))2 + (2 − c(, ))2.</p>
          <p>ℎ ∈ Z[, ′, , , , , ],  = 2, . . . , 5 and ℎ ∈ Z[, ′, , ],  = 6, 7,
then for each of the four inference schemata of point 2, the following holds:</p>
          <p>An equality  with code  =  ( ) is derived by the th schema from  =  if and only if
∃, , , ,  | ℎ(,  ( = ), , , , , ) = 0,  = 2, 3</p>
          <p>or ℎ(,  ( = ), , ) = 0,  = 4, 5
with ℎ defined as follows:
 ∪  =  ∪  ℎ2(, ′, , , , , ) = (2′ − 2c(, ))2+
 ∘  =  ∘ 
ℎ3(, ′, , , , , ) = (2′ − 2c(, ))2+
(2 − 2c(, ))2 + (2 − 2c(, ))2 + (2 − 2c(4 + 4, 4 + 4))2
⌣ = ⌣
 = 
(2 − 2c(, ))2 + (2 − 2c(, ))2 + (2 − 2c(4 + 5, 4 + 5))2
ℎ4(, ′, , ) = (2′ − 2c(, ))2 + (2 − 2c(4 + 3, 4 + 3))2
ℎ5(, ′, , ) = (2′ − 2c(, ))2 + (2 − 2c(4 + 2, 4 + 2))2
Proof. Immediate by the bijectivity of  ,  ′.</p>
          <p>Proposition 4. Let</p>
          <p>Taking care to keep variables and degree under control, we can summarize:</p>
          <p>(, ′, ′′, ⃗3) =
(2′ − 2c(, ))2 + (2 − 2c(, ))2 + (2 − 2c(, ))2 + (2 − )2+
(( − ′′)2 + ( − )2) (2 − 2c(4 + 4 + , 4 + 4 + ))2·</p>
          <p>· (2 − 2c(4 + 2 + , 4 + 2 + ))2
with ⃗3 = (, , , , , ). An equality  with code  =  ( ) is derived from the equality  = 
(and  = ) by the derivation rules if and only if</p>
          <p>∃⃗3 ∈ N6 | (,  ( = ),  ( = ), ⃗3) = 0
and also deg() = 2 + 2 · 2 · 2 = 10.</p>
          <p>Since  and  are positive, we simply multiply them to obtain , which then has degree
10 + 62 = 72.</p>
          <p>Because we are multiplying, with an appropriate renaming of variables, we can reuse those of the
polynomial that has more of them (in our case  ) in the definition of the other. Hence, we have a
total of 18 variables in .</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Vampire-assisted Reasoning</title>
      <p>The availability of an equational reformulation of an axiomatic set theory within Tarski-Givant relational
calculus ofers an interesting approach to the mechanization of reasoning in Set Theory. The approach
consists of two steps. The first step requires building a prover for the equational calculus on top of
an existing first-order theorem prover. Subsequently, this equational prover will be used to automate
equational set-reasoning in the axiomatic theory.</p>
      <p>
        The feasibility of this path has been explored in [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ], where the authors propose an equational
re-engineering of Zermelo-Skolem-Fraenkel axiomatic system ZF and show how the first-order theorem
prover Otter can serve as an inference engine for ZF.
      </p>
      <p>In this section, we outline a similar approach for the case of NBG based on the state-of-the-art
theorem prover Vampire.</p>
      <sec id="sec-4-1">
        <title>4.1. Reasoning in the ℒ× calculus</title>
        <p>The key to enable a first-order theorem prover to perform deductions in ℒ× is to consider relational
equalities (e.g., the logical axioms of Section 3.2) as universally closed first-order sentences, where the
predicates (namely, , , ) play the role of first-order variables.</p>
        <p>We implemented this idea by developing a hierarchy of layers on top of a core group of first-order
sentences reflecting the logical axioms of ℒ× .</p>
        <p>Each level extends the syntax of calculus by introducing new constructs derived from the constructs
of the levels below. Then, Vampire is used to prove, starting from definitions and laws proved at lower
levels, a set of laws that characterize the new constructs. For example, at the bottom level Vampire
easily proved a rich collection of lemmas on the primitive operators, namely, union (∪), composition
(∘ ), complementation (¯), and inversion (⌣). At the next level we introduced the relational constants Ø,
1l and the constructs of intersection ( ∩  :=  ∪ ), diference (  ∖  :=  ∪  ), and Peircean
sum ( †  :=  ∘ ). Vampire quickly proved several laws involving these new constructs.</p>
        <p>We recall below only some examples of the constructs introduced, and laws demonstrated, in the
subsequent levels of the hierarchy.</p>
        <p>Inclusion. A possible definition for the notion of inclusion of relations is:</p>
        <p>⊆  :=  ∪  = 1l.</p>
        <p>
          Among the laws proved in this layer we mention, monotonicity and transitivity of inclusion, the
so-called cycle laws and Dedekind law [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>Functionality. The main derived constructs in this layer are a selector of the functional part of a
relation:</p>
        <p>fncPart ( ) :=  ∖ ( ∘  )
and a shorthand for functionality condition:</p>
        <sec id="sec-4-1-1">
          <title>Among the laws proved in this level there are:</title>
          <p>Fnc( ) :=  ⌣ ∘  ⊆ .</p>
          <p>Totality. This layer introduces and a shorthand for totality of relations:
fncPart ( )⌣ ∘ fncPart ( ) ⊆ ,
Fnc( ) ∧ Fnc() → Fnc( ∘ ) ,
Fnc( ) →  ∘ ( ∩ ) = (( ∘ ) ∩ ( ∘ )).</p>
          <p>Total( ) :=  ∘ 1l = 1l.</p>
          <p>Among the related laws Vampire easily proved the implications:</p>
          <p>Total( ) ∧ Total() → Total( ∘ ) ,
Total( ∘ ) → Total( ) ,</p>
          <p>Total( ) ,
 ∩  ⌣ = Ø → Total(︀  )︀ .</p>
          <p>By developing the entire hierarchy of levels, Vampire managed to prove several hundreds laws, in
most cases taking fractions of a second and never going beyond a few minutes for the most dificult
proofs.
4.2. Benchmarks for assisted reasoning in the equational formalization of NBG
At the top of the hierarchy described earlier, after specifying the (equational rendering of the) proper
axioms of the theory of interest, one can exploit Vampire to obtain proofs of theory-specific theorems.</p>
          <p>As mentioned in the previous section, the proof framework we are developing has achieved good
results in proving several theorems of relational calculus.</p>
          <p>
            Extending the framework to support automated theorem-proving in NBG involves the addition of
layers that introduce set-theoretic notions and include equational re-formulations of the proper axioms
of NBG. While the relational translation of the axiomatic system proposed by Harvey Friedmann in [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ]
has been largely completed, its application to the proof of non-trivial theorems remains a work in
progress.
          </p>
          <p>The system was preliminarily tested by obtaining some apparently simple proofs. For example,
Vampire quickly obtained a proof of the equivalence of diferent formulations of the Extensionality axiom,
or that from the Infinity axiom the existence of a set immediately follows (namely, that 1l ∘  ∘ 1l = 1l
holds).</p>
          <p>As future work, we intend to validate the approach based on the equational formulation of NBG and
powered by the theorem prover Vampire by tackling some harder problems of increasing dificulty. The
goals that will be the first object of this activity include automated proofs of the following claims:
• An empty class exists (our formulation of NBG does not explicitly include the emptyset axiom)
• For any given set  there exists a class whose sole element is 
• Any class that is a singleton is a set
• Any class that has exactly two elements is a set
• There exists a universal class</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <sec id="sec-5-1">
        <title>The author(s) have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S. C.</given-names>
            <surname>Kleene</surname>
          </string-name>
          , Introduction to Metamathematics, North-Holland,
          <year>1952</year>
          . 550 pp.,
          <source>reprinted Ishi Press</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Putnam</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Robinson,</surname>
          </string-name>
          <article-title>The decision problem for exponential Diophantine equations</article-title>
          , Ann. of Math., Second Series 74 (
          <year>1961</year>
          )
          <fpage>425</fpage>
          -
          <lpage>436</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J. V.</given-names>
            <surname>Matijasevič</surname>
          </string-name>
          , Enumerable sets are Diophantine,
          <source>Soviet Mathematics. Doklady</source>
          <volume>11</volume>
          (
          <year>1970</year>
          )
          <fpage>354</fpage>
          -
          <lpage>358</lpage>
          . (Translated from [
          <volume>17</volume>
          ]).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Matiyasevich</surname>
          </string-name>
          ,
          <article-title>Hilbert's tenth problem</article-title>
          , The MIT Press, Cambridge (MA) and London,
          <year>1993</year>
          . Translated from [
          <volume>18</volume>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Jones</surname>
          </string-name>
          , Universal Diophantine equation,
          <source>The Journal of Symbolic Logic</source>
          <volume>47</volume>
          (
          <year>1982</year>
          )
          <fpage>549</fpage>
          -
          <lpage>571</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Carl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. Z.</given-names>
            <surname>Moroz</surname>
          </string-name>
          ,
          <article-title>On a diophantine representation of the predicate of provability</article-title>
          ,
          <source>Journal of Mathematical Sciences</source>
          <volume>199</volume>
          (
          <year>2014</year>
          )
          <fpage>36</fpage>
          -
          <lpage>52</lpage>
          . URL: https://api.semanticscholar.org/CorpusID:34618563.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E.</given-names>
            <surname>Mendelson</surname>
          </string-name>
          , Introduction to Mathematical Logic, 4th ed.,
          <source>Chapman &amp; Hall</source>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tarski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Givant</surname>
          </string-name>
          ,
          <article-title>A formalization of Set Theory without variables</article-title>
          , volume
          <volume>41</volume>
          of Colloquium Publications,
          <source>American Mathematical Society</source>
          ,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Friedman</surname>
          </string-name>
          ,
          <article-title>Simplified axioms for class theory</article-title>
          ,
          <year>2020</year>
          . https://bpb-us-w2.wpmucdn.com/u.osu. edu/dist/1/1952/files/2020/09/NBGAxioms091520.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>K.</given-names>
            <surname>Gödel</surname>
          </string-name>
          ,
          <article-title>Über formal unentscheidbare Sätze der Principia Mathematica und verwandter Systeme I, Monatsh</article-title>
          .
          <source>Math. und Physik</source>
          <volume>38</volume>
          (
          <year>1931</year>
          )
          <fpage>173</fpage>
          -
          <lpage>198</lpage>
          . “
          <article-title>On formally undecidable propositions of Principia Mathematica and related systems I” in Solomon Feferman</article-title>
          , ed.,
          <year>1986</year>
          .
          <article-title>Kurt Gödel Collected works</article-title>
          , Vol. I. Oxford University Press:
          <fpage>144</fpage>
          -
          <lpage>195</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <article-title>Hilbert's tenth problem is unsolvable</article-title>
          ,
          <source>Amer. Math. Monthly</source>
          <volume>80</volume>
          (
          <year>1973</year>
          )
          <fpage>233</fpage>
          -
          <lpage>269</lpage>
          .
          <article-title>Reprinted with corrections in the Dover edition of Computability</article-title>
          and Unsolvability [
          <volume>19</volume>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>235</lpage>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Murty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Fodden</surname>
          </string-name>
          ,
          <article-title>Hilbert's tenth problem</article-title>
          .
          <source>An</source>
          Introduction to Logic,
          <source>Number Theory, and Computability</source>
          , volume
          <volume>88</volume>
          of Student mathematical library,
          <source>American Mathematical Society</source>
          , Providence, RI,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Robinson</surname>
          </string-name>
          ,
          <article-title>Diophantine decision problems</article-title>
          , in: W. J. LeVeque (Ed.),
          <source>Studies in Number Theory</source>
          , volume
          <volume>6</volume>
          of Studies in Mathematics, Mathematical Association of America,
          <year>1969</year>
          , pp.
          <fpage>76</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Formisano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Omodeo</surname>
          </string-name>
          ,
          <article-title>An equational re-engineering of set theories</article-title>
          , in: R. Caferra, G. Salzer (Eds.),
          <source>Automated Deduction in Classical and Non-Classical Logics, Selected Papers</source>
          , volume
          <volume>1761</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>1998</year>
          , pp.
          <fpage>175</fpage>
          -
          <lpage>190</lpage>
          . URL: https://doi.org/10.1007/ 3-540-46508-1_
          <fpage>12</fpage>
          . doi:
          <volume>10</volume>
          .1007/3-540-46508-1_
          <fpage>12</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Formisano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Omodeo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Temperini</surname>
          </string-name>
          ,
          <article-title>Layered map reasoning: An experimental approach put to trial on sets</article-title>
          , in: A.
          <string-name>
            <surname>Dovier</surname>
            ,
            <given-names>M. C.</given-names>
          </string-name>
          <string-name>
            <surname>Meo</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Omicini (Eds.),
          <source>Declarative Programming - Selected Papers from AGP</source>
          <year>2000</year>
          , volume
          <volume>48</volume>
          <source>of ENTCS</source>
          , Elsevier,
          <year>2001</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>28</lpage>
          . doi:
          <volume>10</volume>
          .1016/ S1571-
          <volume>0661</volume>
          (
          <issue>04</issue>
          )
          <fpage>00147</fpage>
          -
          <lpage>1</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          , T. Ströhlein, Relations and Graphs,
          <source>Discrete Mathematics for Computer Scientists, EATCS-Monographs on Theoretical Computer Science</source>
          , Springer-Verlag,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Matiyasevich</surname>
          </string-name>
          , Diofantovost' perechislimykh mnozhestv,
          <source>Doklady Akademii Nauk SSSR</source>
          <volume>191</volume>
          (
          <year>1970</year>
          )
          <fpage>279</fpage>
          -
          <lpage>282</lpage>
          .
          <article-title>(Russian. Available in English translation as [3]; translation reprinted</article-title>
          <source>in [20</source>
          , pp.
          <fpage>269</fpage>
          -
          <lpage>273</lpage>
          ]).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Matiyasevich</surname>
          </string-name>
          , Desyataya Problema Gilberta, Fizmatlit, Moscow,
          <year>1993</year>
          . Several translation available, as indicated at URL: http://logic.pdmi.ras.ru/~yumat/H10Pbook/.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Davis</surname>
          </string-name>
          , Computability and Unsolvability,
          <string-name>
            <surname>McGraw-Hill</surname>
          </string-name>
          , New York,
          <year>1958</year>
          .
          <article-title>Reprinted with an additional appendix</article-title>
          ,
          <year>Dover 1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>G. E.</given-names>
            <surname>Sacks</surname>
          </string-name>
          (Ed.),
          <source>Mathematical Logic in the 20th Century</source>
          , Singapore University Press, Singapore; World Scientific Publishing Co., Inc.,
          <string-name>
            <surname>River</surname>
            <given-names>Edge</given-names>
          </string-name>
          , NJ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>