Academia.eduAcademia.edu

A Dynamic Logic of Observation and Access

2009

one may argue that (logical) inference is the central topic of any logic. What we have in mind here is reasoning about agents that make inferences.

A Dynamic Logic of Observation and Access First Draft! Tomohiro Hoshi∗ Eric Pacuit† May 14, 2009 1 Introduction and Motivation Reasoning about rational agents interacting over time is a central topic in many areas of philosophy, computer science and economics. An important challenge for the logician is to account for the many dynamic processes that govern the agents’ interaction over time. Inference, observation and communication are all examples of such processes that are the focus of current logics of informational update and belief revision (see, for example, van Benthem, 1996; van Ditmarsch et al., 2007; Parikh and Ramanujam, 2003)1 . A recurring issue in any formal model that represents agents’ informational attitudes over time is how to account for the fact that the agents are limited in their access to the available inference steps, possible observations and available messages. This may be because the agents are not logically omniscient and so do not have unlimited reasoning ability. But it can also be because the agents are following a predefined protocol that explicitly limits statements available for observation and/or communication. Within the broad literature on epistemic logic, there are a variety of alternative accounts that making precise a notion of an agent’s “limited access”. An early approach of Fagin and ∗ Department of Philosophy, Stanford University, [email protected] Department of Philosophy, Stanford University, [email protected] 1 Of course, one may argue that (logical) inference is the central topic of any logic. What we have in mind here is reasoning about agents that make inferences. † 1 Halpern (1988)2 extends standard epistemic logic with an awareness operator Aϕ intended to mean “the agent is aware of the sentence ϕ”. Recent work building on Artemov’s Logic of Proofs (Artemov, 2001) labels epistemic modal operators with proof terms that explicitly keep track of the agent’s justification, or evidence, for (the truth of) a formula (see, for example, Fitting, 2005; Artemov and Nogina, 2005). Other logics focus on explicitly modeling inferential steps that individual agents can make while interacting with other agents and the environment (see, for example, Eberle, 1974; Ågotnes and Alechina, 2007; van Benthem, 2008; Velazquez-Quesada, 2009). Finally, van Benthem et al. (2008) develop logics to reason about situations where the facts that agents can observe are limited by a predefined protocol (cf. Parikh and Ramanujam, 2003). Section 4 contains a detailed comparison between the logical framework we develop in this article with the logical frameworks referenced above, so we will not go into any details here. This main technical contribution of this paper builds on recent work formally relating the two main logical accounts of the dynamics of information in social interactive situations (van Benthem et al., 2008). The first is epistemic temporal logic (ETL, Fagin et al., 1995; Parikh and Ramanujam, 2003) which uses linear or branching time models with added epistemic structure induced by the agents’ different capabilities for observing events. These models provide a “grand stage” where histories (i.e., sequences of events) of some social situations are constrained by a protocol. Here a protocol is intended to represent the rules or conventions that govern many of our social interactions. Imposing such rules restricts the legitimate sequences of possible events (eg., messages or observations). The other framework is dynamic epistemic logic (DEL, Gerbrandy, 1999; Baltag et al., 1998; van Ditmarsch et al., 2007) that describes social interactions in terms of epistemic event models (which may occur inside modalities of the language). Similar to the way Kripke structures3 are used to capture the information the agents’ have about a fixed social situation, an event 2 See also (Halpern and Rego, 2005; Halpern, 2001) for a recent discussion and references to relevant literature on the notion of awareness in game theory. 3 We assume the reader is familiar with standard epistemic logic and the various dynamic versions mentioned above. There are a number of textbooks and survey papers that have thorough introductions to these topics. For example, see (Fagin et al., 1995; van Ditmarsch et al., 2007; ?; ?). 2 model describes the agents’ information about which actual events are currently taking place. The temporal evolution of the situation is then computed from some initial epistemic model through a process of successive “product updates”. The logic that we develop in this paper merges these two perspectives on rational interaction (cf. van Benthem et al., 2008, Section 5). The first example of such a logic that merges ideas from ETL and DEL can be found in Section 4 of (van Benthem et al., 2008). This logic reexamines public announcement logic (PAL, ??) in situations where the availability of formulas for observation is constrained by a predefined protocol. More formally, a PAL protocol is a tree of (epistemic) formulas. ETL models are then generated from an initial epistemic model by performing a public announcement of formulas permitted by some fixed PAL protocol4 . In this new setting the PAL formula hAi⊤ not only express that the current model is updated by the public announcement of A but also that A is permitted according to the predefined PAL protocol. Taking into account this new interpretation of the PAL language, van Benthem et al. (2008) give a sound and complete axiomatization of the class of all ETL models generated by some epistemic model and PAL protocol5 . However, this is only one specific example of how to merge the ETL and DEL frameworks as suggested by the following questions: 1. A public announcement is one specific type of event model, can we axiomatize classes of ETL models generated by other types of event models? 2. Which formal languages are best suited to describe these DEL generated ETL models? Our primary goal in this paper is to push the style of analysis from (van Benthem et al., 2008) forward by investigating answers to the above questions. We will also relate the logical framework from Sections ?? & 3.1 to the different logics of knowledge and “access” mentioned above. 4 Actually the most general situation is where there are different PAL protocols at each state. This more general setting is not important for the discussion here and the reader can consult (van Benthem et al., 2008) for details. 5 Note that the usual method for proving completeness via reduction axioms will not work here. In particular, since A being true does not necessarily imply that A can be announced the PAL validity A ↔ hAi⊤ is not valid (of course, hAi⊤ → A is valid since we are working with PAL protocols.) 3 2 Our Framework This section describes the specific logical system that we will investigate in this paper. We assume that at each moment different pieces of information are made publicly available. However, as opposed to public announcements where all agents have access to the information that is made available, we assume that different agents have access to different pieces of information. Thus we are interested in ETL models generated by protocols consisting of the following type of event model: A P A G e P f Where A is the (finite) set of agents, P is a formula (in the language defined below) and P is the “negation” of P (i.e., P = Q if P = ¬Q and P = ¬P otherwise). This event model represents situations where (the truth of) P is made available but only the agents A − G have access to this information. Of course, the event itself is public so which agents actually have access to which pieces of information is commonly known (i.e., the agents in G know that the agents in A − G know whether P is true). We will discuss this and other underlying assumptions in Section 4. This section focuses on the formal details of our framework. The Language The language includes standard epistemic and dynamic modalities plus operators intended to describe each agents’ protocol (i.e., which formulas the agent has access to). Fix a finite set A of agents and a (countable) set of atomic propositions At. The language LDLOA is defined inductively: ϕ ::= ⊤ | p | ¬ϕ | ϕ ∧ ϕ | Ki ϕ | hϕiϕ | Ai ϕ 4 b i and [ϕ], and other boolean operators are where p ∈ At and i ∈ A. The dual operators, K defined as usual. The epistemic fragment of LDLOA without the ‘hϕi’ and ‘Ai ’ operators is denoted LEL . The intended meaning of the modal operators is summarized below: • Ki ϕ is intended to mean “according to i’s current information ϕ is true” (following the standard convention we may also say “agent i knows that ϕ”). • hϕiψ is intended to mean “after ϕ is made publicly available, ψ is true” (we may also say “after ϕ is announced ψ is true”, but this should not be confused with the public announcement of ϕ from (??)) • Ai ϕ is “agent i has access to ϕ” (alternatively we may say “agent i can observe ϕ” or “agent i has the ability to observe ϕ”). The Semantics As noted above, we are interested in ETL models generated by protocols of a specific type of event models: public announcements of ϕ with only some of the agents having access to content of the announcement. A protocol describes for each agent which formulas that agent can observe. Note that “being able to observe ϕ” is an event type which we take to mean that in situations where ϕ is true, the agent observes that ϕ and when ϕ is false the agents observes that ¬ϕ. This explains the closure condition placed in the definition of protocols: Let ϕ be ϕ if ϕ is of the form ¬ψ; ¬ϕ otherwise. Definition 2.1 (Protocols) A protocol is a fuction p : A × N → ℘(LDLOA ) such that, for every n ∈ N, i ∈ A, and ϕ ∈ LDLOA , ϕ ∈ p(i, n) iff ϕ ∈ p(i, n). We denote the set of protocols by P tcl. For brevity, we write pni for p(i, n) where p ∈ P tcl, i ∈ A, and n ∈ N. ⊳ So a protocol describes for each agent and each moment which formulas that agent can access. The closure condition states that agents have access to a formula iff they have access to its “negation”. Of course, this is only one of many different properties that may be assumed about the protocol. For example, it may be natural to assume that if an agent has access to both ϕ and ψ then the agent must also have access to ϕ ∧ ψ. Using the access 5 modality Ai such properties will be expressible in our language. This will be discussed in more detail below. The formal definition of our models can be given using the machinery developed in (van Benthem et al., 2008, Section 3). However, in the present setting many of these definitions can be simplified. Definition 2.2 (Models) An epistemic model is a triple (W, ∼, V ) where W is a nonempty set, ∼: A → ℘(W × W ), and V : At → ℘(W ). By convention, when (w, v) ∈∼ (i), we write w ∼i v. An epistemic model with a protocol is a quadruple (W, ∼, V, p), where (W, ∼, V ) is an epistemic model and p is a protocol. Given an epistemic model M = (W, ∼, V ) and a protocol p, we denote by (M, p) the model (W, ∼, V, p). ⊳ We are restricting attention to one type of dynamic epistemic action: “making ϕ publicly available where only some of the agents have access to (the observation of) ϕ”. Here “having access to ϕ” means that the agent can incorporate the observation of ϕ into the agent’s current information. Intuitively, if an agent incorporates the observation of ϕ, the should consider possible only states where ϕ is true. But in order to do this, the agent must have access to ϕ (this also explains the closure condition placed on protocols in Definition 2.1). More formally, we define what it means to “make ϕ publicly available”: Definition 2.3 (Making ϕ publicly available) Let P = (W, ∼, V, p) be an epistemic model with a protocol. Incorporating the observation of ψ into P is the model P ⊗ ψ = (W ′ , ∼′ , V ′ , p′ ) where W′ ∼′i V′ := W   ∼i 6 p(i, 0) if ψ ∈ :=  {(w, v) ∈∼i | P, w |= ψ iff P, v |= ψ} if ψ ∈ p(i, 0) := V p′ (i, n) := p(i, n + 1) where P, w |= ψ means “ψ is true at state w in P” defined below. 6 ⊳ Definition 2.4 (Truth) Let P = (W, ∼, V, p) be an epistemic model with a protocol. The truth of a formula ϕ in LDLOA is defined inductively as follows: P, w |= p iff w ∈ V (p) (with p ∈ P ) P, w |= ¬ϕ iff P, w 6|= ϕ P, w |= ϕ ∧ ψ iff P, w |= ϕ and P, w |= ψ P, w |= Ki ϕ iff ∀v ∈ W : if w ∼i v then P, v |= ϕ P, w |= hψiϕ iff P, w |= Ai ϕ iff ϕ ∈ p0i (i) P, w |= ψ and (ii) P ⊗ ψ, w |= ϕ ⊳ ◮ Maybe add an example? 3 Main Results The main technical result is a sound and complete axiomatization of the class of all epistemic models with protocols (cf. Definition 2.2) in the language LDLOA . There are two main categories of axiom schemes. The first are essentially reduction axioms describing the effect epistemic event on an epistemic model: R1 hθip ↔ θ ∧ p where p ∈ At R2 hθi¬ϕ ↔ θ ∧ ¬hθiϕ R3 hθi(ϕ ∧ ψ) ↔ hθiϕ ∧ hθiψ R4 hθiKi ϕ ↔ θ ∧ (Ai θ → Ki [θ]ϕ) ∧ (¬Ai θ → Ki ([θ]ϕ ∧ [θ]ϕ)) Note that hθi⊤ ↔ θ is a consequence of R1. This means that any true formula can always be made publicly available. Of course, it may be that none of the agents actually have access to this information (i.e., θ is no on any of the agents protocol). Thus, unlike the framework from (van Benthem et al., 2008, Seciton 4), hθi⊤ does not mean that θ is permitted according to 7 the protocol. The only other axiom schema requiring some discussion is R4. Following the usual reduction axiom methodology, the right-hand side describes what agents know after θ is made publicly available in terms of the agent’s current information. The second type of axiom schemes highlight the assumptions we make about the protocols: P-neg A i ϕ ↔ Ai ϕ Ptcl Aj ϕ → Ki Aj ϕ Uni hαiAi ϕ → [β]Ai ϕ The first axiom scheme encodes the closure condition on protocols that agents have access to ϕ iff they have access to ϕ. The last two axiom schemes highlight the assumption that the protocols are not only common knowledge, but also are uniform. The last assumption means that what formulas the agent can access does not depend on the earlier observations the agent has made. Putting everything together, we have: Definition 3.1 (Axiomatization) The logic DLOA is the smallest set containing all instances of the following axiom schemes6 Axiom Schema K Ki (ϕ → ψ) → (Ki ϕ → Ki ψ) R1 hθip ↔ θ ∧ p where p ∈ At R2 hθi¬ϕ ↔ θ ∧ ¬hθiϕ R3 hθi(ϕ ∧ ψ) ↔ hθiϕ ∧ hθiψ R4 hθiKi ϕ ↔ θ ∧ (Ai θ → Ki [θ]ϕ) ∧ (¬Ai θ → Ki ([θ]ϕ ∧ [θ]ϕ)) P-neg Ptcl A i ϕ ↔ Ai ϕ Aj ϕ → Ki Aj ϕ 6 For concreteness, we only include the axiom schema Ki (ϕ → ψ) → (Ki ϕ → Ki ψ), but other axiomatizations will work as well such as S5. 8 Uni hαiAi ϕ → [β]Ai ϕ and is closed under necessitation for Ki and [θ]. We write ⊢DLOA ϕ if ϕ ∈ DLOA. ⊳ Our goal in this section is to prove the following result Theorem 3.2 DLOA is sound and strongly complete with respect to the class of epistemic models with protocols. The proof is a variant of the proof found in (van Benthem et al., 2008, Section 4) which itself is a variant of the standard Henkin construction. We construct the canonical model from the set of DLOA maximal consistent sets (mcs). The key observation is that each mcs contains a description of a protocol. ◮ The details here are still a bit sketchy, but this is the right idea Let σ be a (possibly empty) finite sequence of LDLOA -formulas. We denote the length of σ by len(σ). Also we denote by σn and σ(n) the n-th element of σ and the initial segment of σ of the length n respectively. When n is greater than the length of σ, they denote the empty sequence λ. Also we write hσi and [σ] for hσ1 i . . . hσlen(σ) i and [σ0 ] . . . [σlen(σ)−1 ] respectively. Definition 3.3 (Γ-Protocol) Given a maximally consistent set Γ, we define a Γ-protocol pΓ so that pΓ (i, n) =   {ϕ | Ai ϕ ∈ Γ} if n = 0  {ϕ | ∃σ1 . . . σn : hσ1 i . . . hσn iAi ϕ ∈ Γ} if n ≥ 1 ⊳ Definition 3.4 (Base Canonical Model) Let Γ be a maximally consistent set. We define the Γ-generated canonical model P− = (WΓ , ∼Γ , VΓ , pΓ ) by: • WΓ = {∆ | p∆ = pΓ } • For all ∆, ∆ ∈ WΓ , (∆, ∆′ ) ∈∼Γ (i) iff {ϕ | Ki ϕ ∈ ∆} ⊆ ∆′ 9 • VΓ (p) = {∆ | p ∈ ∆} When there is no confusion, we will omit the subscript Γ. ⊳ Given a maximlally consistent set ∆ and a LDLOA -formula ϕ, we denote by ∆ϕ the set {θ | hϕiθ ∈ ∆}. It is straightforward to show the following. Lemma 3.5 For every maximally consistent set ∆ and a LDLOA -formula ϕ, ∆ϕ is a maximally consistent set. Proof. The claim follows easily from R2. qed Given a finite sequence σ of LDLOA -formulas, we denote (. . . (∆σ1 )σ2 ) . . . ) and (. . . (PΓ ⊗ σ1 ) ⊗ σ2 ) . . . ) ⊗ σn ) by by ∆σ and PΓ ⊗ σ respectively. Definition 3.6 (Canonical Model after σ) Given a (possibly empty) sequence σ of LDLOA formulas and the canonical model P, we define P σ = (W σ , ∼σ , V σ , pσ ) inductively as follows: • Pλ = P • W σ(n) = {∆σn | ∆ in P σ(n−1) } ∪ {∆σ n | ∆ in P σ(n−1) } σ • For all ∆χ, ∆′ χ′ ∈ W σ(n) , ∆χ ∼i (n) ∆′ χ′ iff σ 1. ∆ ∼i (n−1) ∆′ and χ, χ′ 6∈ pσ(n−1) (i, 0) or 2. χ = χ′ and χ, χ′ ∈ pσ(n−1) (i, 0) • V σ(n) (p) = V σ(n−1) (p) • pσ(n) (i, n) := pσ(n−1) (i, n + 1) ⊳ Lemma 3.7 (Truth Lemma) Let P be the canonical model. Let σ be a finite sequence of LO-formula. For every ϕ ∈ LLO and ∆ in PΓ , hσiϕ ∈ ∆ iff 10 P σ , ∆σ |= ϕ. Proof. The proof is by induction on the complexity of ϕ. The base case is clear by Definition 3.4 and 3.6. The boolean cases are straightforward. ◮ The argument for the knowledge modality case can be carried out by using the axiom R3 in a way similar to the completeness proof of TPAL in (van Benthem et al., 2008) Here we only do the cases for hχi and Ai . Suppose ϕ is of the form hχiψ. The right-to-left direction is clear by Definition 3.4 and 3.6. Thus assume hσihχiψ ∈ ∆. Then we have P σχ , ∆σχ |= ψ by IH. By Definition ??, clearly P σχ and P σ ⊗ χ is isomorphic (map ∆σχ in P σχ to ∆σ in P σ ⊗ χ). Therefore we have P σ ⊗ χ, ∆σ |= ψ. Also hσihχiψ ∈ ∆ implies hσihχi⊤ ∈ ∆ by standard modal reasoning. From this, it follows by A1 that hσiχ ∈ ∆. This gives us P σ , ∆σ |= χ. Therefore, P σ , ∆σ |= hχiψ, as desired. Suppose ϕ is of the form Ai ψ. First assume that ϕ ∈ ∆Θ. By definition, we have hθn−1 i . . . hθ0 iAi ψ ∈ ∆. Since pΓ = p∆ by construction, ψ ∈ pΓ (i, n). Thus PΓ , ∆ |= Ai ψ. For the other direction, assume that PΓ , ∆ |= Ai ψ. By construction, this implies that ′ ψ ∈ pΓ (i, n) and thus that there is some sequence Θ′ = θ0′ . . . θn−1 such that hΘ′ iAi ψ ∈ ∆. Repeated applications of Uni yield hΘiψ ∈ ∆. qed The standard argument shows, using the above Truth Lemma, that every DLOA-consistent set of formulas is satisfiable. This proves Theorem 3.2. Other results: • Completeness with additional closure properties on the protocol. This is easy if the property can be expressed using Ai . • General method for finding a sound and complete axiomatization for various types of (fixed) DEL protocols 4 Comparisons Public Announcement Logic The following schemas are valid in PAL but not in DLOA: 11 1. hαihβiϕ → hhαiβiϕ 2. [p]Ki p where p ∈ At 3. hθiKi ϕ ↔ hθi⊤ ∧ Ki (hθi⊤ → hθiϕ) 1. For instance, take ϕ := Ai p. Let P = (W, ∼, V, p). P, w |= hαihβiϕ requires that α ∈ p(i, 1) and β ∈ p(i, 2), but this does not guarantee that hαiβ ∈ p(i, 1). 2. Take a model where ¬Ki p and p 6∈ p(i, 0). 3. Let θ = ϕ := p. Take a model where p is true but p 6∈ p(i, 0). Then LHS is false but RHS is true. However there is an embedding from the language of PAL to LDLOA that preserves validity: Let sub(ϕ) be the set of subformulas of ϕ. Proposition 4.1 For every formula ϕ of PAL, ϕ is valid in PAL iff ^ ^ Ai ϕ is valid in DLOA i∈A ψ∈sub(ϕ) Proof. Straightforward induction. qed TDEL ◮ We still need to specify what exactly TDEL is, especially because we allow occurrences of DEL operators inside DEL operators. Although it can be worked out, this may need a lot of space to give all the details. However, below gives the main idea. Let p be a protocol and ϕ a formula in LDLOA . Define An (ϕ, p) be the set {i ∈ A | ϕ ∈ p(i, n)}. Define an event model E(ϕ, p, n) = (E, →, pre) by 1. E = {1, 2} 12 2. → (i) =   {(1, 1), (1, 2), (2, 1), (2, 2)} if ϕ ∈ p(i, n)  {(1, 1), (2, 2)} if ϕ 6∈ p(i, n). 3. pre(1) = ϕ, pre(2) = ¬ϕ Definition 4.2 (Translation from Models in LO to Models in TDEL) Given an LOmodel P = (W, ∼, V, p), we define a TDEL-model t(P) by Forest(MP , pP ) where MP = (W, ∼, V ) and pP is a state-dependent protocol on M such that, for all w ∈ W , pP (w) consists of sequences of the form σ = σ0 . . . σn where σk is of the form (E(ϕ, p, k), e) with e in E(ϕ, p, k) for all k (0 ≤ k ≤ n). ⊳ Definition 4.3 (Translation from LO to TDEL) Given a model P = (W, ∼, V, p) in LO, the translation function t : N × LLO → LT DEL is defined inductively as follows: tk (⊤) = ⊤ tk (p) = p (p ∈ At) tk (ϕ ∧ ψ) = tk (ϕ) ∧ tk (ψ) tk (¬ϕ) = ¬tk (ϕ) tk (K̂ϕ) = K̂tk (ϕ) tk (hϕiψ) = hE(ϕ, p, k)itk+1 (ψ) tk (Ai ϕ) = hE(tk (ϕ), p, k), 1i⊤ ∨ hE(tk (ϕ), p, k), 2i⊤ ⊳ Proposition 4.4 Truth-Preserving Translation Given a formula ϕ ∈ LLO , P, w |= ϕ iff t(P), w |= to (ϕ). Proof. Straightforward induction. qed ◮ Still need to add discussion of Awareness Logics and Justification Logics 5 Conclusion and Discussion ◮ Discussion of future work: different notions of group knowledge. 13 References Ågotnes, T. and N. Alechina (2007). The dynamics of syntactic knowledge. Journal of Logic and Computation 17 (1), 83–116. Artemov, S. (2001). Explicit provability and constructive semantics. Bulletin for Symbolic Logic 7 (1), 1–36. Artemov, S. and E. Nogina (2005). Introducing justification into epistemic logic. Journal of Logic and Computation 15 (6), 1059–1073. Baltag, A., L. Moss, and S. Solecki (1998). The logic of common knowledge, public announcements and private suspicions. In I. Gilboa (Ed.), Proceedings of the 7th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 98), pp. 43 – 56. Eberle, R. (1974). A logic of believing, knowing and inferring. Synthese 26, 356 – 382. Fagin, R. and J. Halpern (1988). Belief, awareness and limited reasoning. Artificial Intelligence 34, 39 – 76. Fagin, R., J. Halpern, Y. Moses, and M. Vardi (1995). Reasoning about Knowledge. Boston: The MIT Press. Fitting, M. (2005). The loigc of proofs, semantically. Annals of Pure and Applied Logic 132, 1 – 25. Gerbrandy, J. (1999). Bisimulations on Planet Kripke. Ph. D. thesis, Institute for Logic, Language and Computation (DS-1999-01). Halpern, J. (2001). Alternative semantics for unawareness. Games and Economic Behavior 37, 321 – 339. Halpern, J. and L. Rego (2005). Interactive unawareness revisited. In Proceedings of Theoretical Aspects of Rationality and Knowledge (TARK’05). Parikh, R. and R. Ramanujam (2003). A knowledge based semantics of messages. Journal of Logic, Language and Information 12, 453 – 467. van Benthem, J. (1996). Exploring Logical Dynamics. CSLI Publications. van Benthem, J. (2008). Merging observation and access in dynamic logic. manuscript. van Benthem, J., J. Gerbrandy, T. Hoshi, and E. Pacuit (2008). Merging frameworks of interaction. Journal of Philosophical Logic, Forthcoming. van Ditmarsch, H., W. van der Hoek, and B. Kooi (2007). Dynamic Epistemic Logic. Synthese Library. Springer. Velazquez-Quesada, F. R. (2009). Inference and update. Synthese (Knowledge, Rationality & Action), forthcoming. 14