Abstract
We provide a survey of results using Weihrauch problems to find analogs between set theory and computability theory. In our treatment, we emphasize the role of morphisms in explaining these coincidences. We end with a discussion of the use of forcing to prove the nonexistence of morphisms.
Introduction
In light of the independence of the continuum hypothesis, set theorists searched for more nuanced ways of measuring the size of the continuum. Perhaps, for example, the number of real numbers (singletons) is large, but it doesn’t take many null sets (or meagre sets) to cover the real line? Perhaps there are many functions from ω to ω, but if we’re only interested in growth rates, we can dominate all functions with only a few? Thus are defined cardinal characteristics of the continuum, such as the dominating number
A. Miller (unpublished) and Fremlin [16] have noticed that many cardinal characteristics, including the two mentioned above, can be defined in terms of the smallest size of a set of “solutions” to “instances” of a problem, namely a binary relation. Let
Further, ZFC proofs of inequalities usually arise from morphisms between the associated problems. For the example above, we write
At a similar time, Weihrauch and his school [6,17,47] independently developed similar concepts in their study of computable analysis. Again thinking of binary relations as “problems” with instances and solutions, in the light of computability theory, a computable morphism from a problem A to another problem B can be considered a reduction: B has at least as much information as A, because any method of solving B can effectively give us a method of solving A. Given an instance a of A, we effectively translate to an instance
Rupprecht [39] observed similarities between several arguments in computability, especially algorithmic randomness, and set theory. A good example is Terwijn and Zambella’s [43] proof of the equivalence of computable traceability and lowness for Schnorr tests, and Bartoszynski’s [44] characterisation of
Unfortunately, Rupprechet’s main body of work was confined to his thesis, and remains otherwise unpublished. Aware of only some of his results, Brendle, Brooke-Taylor, Ng and Nies [8] extended his work and for the first time in print, exhibited how to get both cardinal characteristics and highness classes from the same binary relations (Weihrauch problems). Kihara [24] continued their work, including the morphism machinery, while Kjos-Hanssen et al. [28] answered some of the questions left open in [8].
In this paper we survey the subject and provide a unified and simplified treatment. Many arguments in the literature are opaque, and so we show how to frame them using this template. In many cases a single, simpler argument gives two, and with the aid of duality usually four, results, in set theory and computability. We also provide a way of utilising sequential composition, which has so far eluded computability theorists. This allows us to give the same unified treatment to results of Stephan and Yu [42] about lowness for weak 1-genericity and Greenberg and J. Miller [19], related to [3] about lowness for Kurtz randomness, where, for a change, the argument found in computability gives cleaner morphisms. Nonetheless, we emphasise that most results in this paper are, essentially, not original.
Consistency results in set theory and non-implication results in computability are usually obtained by related forcing notions, and so we end the paper with a brief discussion of forcing. We examine a few basic examples to show how they fit in this framework. Finally we suggest a general research programme that arises naturally from the template that we discuss in this paper.
Basics
Weihrauch problems and effective morphisms
A Weihrauch problem is a triple
Blass and Rupprecht use “challenges” and “responses”, or “answers”, for instances and solutions. Coskey et al. and Kihara call Weihrauch problems “Vojtáš triples”. Blass calls them “relations”; Rupprecht calls them “debates”. We adopt terminology used in reverse mathematics, which is more widespread.
The sets
Both
A (total) function
That is, uniformly in n we get a
Fix an effective list
An effective morphism φ from a problem A to a problem B is a pair for all
We write

A morphism.
The idea is that we are reducing A to B; given an A-instance a, we effectively translate it to a B-instance
Rupprecht uses completely non-uniform maps that only require
If
Let A be a problem. A complete solution set for A is a set
Blass and Rupprecht use the notation
For a problem A we let
A complete solution set for
Suppose that
Let
(a): Let Z be a complete solution set for B; let
(b): Let
For a problem B we define its dual
Hence
If
Suppose that φ is an effective morphism from A to B. Define a morphism ψ by letting
For a problem A, the non-lowness class associated with A is
So
We used “highness” for
If
The dual of
The problem
Our notation
Let
We define a morphism ψ. On the instance side, map an infinite set
As a result, we see that
Since we allow the collections
A representation of a set X is a partial function from
If π is a representation of X then
Below we will define problems whose instances or solutions are elements of represented spaces. In all cases this is shorthand for the induced problems on the names: if π is a representation of X, for example, then we will define a problem
The first example is the collection of
We let
Since every effectively closed set is the set of paths through a computable tree, and this is uniform and relativises, we see that a
Two problems are typically associated with ideals of small sets, in this case the meagre ones:
The terminology originates from [8].
The dual of
The dual of
Map the instance f to itself. Map a
More precisely, let
As a result we see:
Every high degree is weakly meagre engulfing; every weakly 1-generic degree is hyperimmune.
Uniformly, given (a name of) a meagre set M, we can find a point
The morphism maps an instance M of
Note that for the map of solutions to be total, we cannot produce a partial sequence
The previous morphism exhibits the importance of allowing functions on names that do not induce maps on the named objects. Given two names
On the instance side, map a function f to the meagre set
On the solution side, we elaborate on the construction of a point outside a given meagre set
We then recursively define
We claim that if
Suppose not. Then there is an infinite set X such that for all
We can then build a function
Combining Propositions 3.3 and 3.6 we see that
We have looked at meagre subsets of Baire space, but we could equivalently examine either Cantor space or the real line. We show that the corresponding problems are all morphism-equivalent. For this subsection, for any one of the spaces
Let us first deal with Cantor space. Here
For any meagre set
For
To reduce
To reduce
We conclude that
For the real numbers, we need to choose representations. We use standard ones; The reduction
We use similar techniques to name null
As we are dealing with relatively computable names, rather than relatively c.e. names, we do not require that
A name for a null
We note that an alternative naming system would be omitting the sequence of measures
For any oracle x, the x-computable null sets are the x-Schnorr null sets. The associated cardinals and highness classes are:
The two basic morphisms that apply to most σ-ideals apply to null sets as well:
The same as for meagre, noting that given a name Also, it is easy, given By forgetting the sequence
We start by observing a relatively simple connection between category and measure. We use:
There are an effectively null (Schnorr null) set and an effectively meagre set which form a partition of
This can be done in many ways. For example, use a pairing function to identify ω with
Dualising we get By Lemma 3.11, we fix a computable null set N and a computable meagre set M which partition
The material in this section was discovered by Bartoszynski [44], by Raisonnier and Stern [38], and then independently by Terwijn and Zambella [43].
A trace is a function
Terminology by Schnorr [41].
Traces are used extensively in algorithmic randomness and computability. See, for example, [15,21,34].
For any two order functions h and
We therefore simply write
Let h,
On the instance side, map
On the solution side, we map a
Our next goal is the following combinatorial characterisation of the cofinality of the null ideal.
Define an order function h so that for large enough n,
On the instance side: given a null set
On the solution side, given an h-trace T, we may assume that for all
For all n,
We define an array of clopen sets
We also fix a computable map
On the instance side, the map is relatively simple: we map
On the solution side, we work a bit. Given a name
We then let, for every clopen set D such that
Our task now is to show that T is computable, given W and
For the former, we observe that the collection of clopen subsets of W is computable from W and
For the latter, suppose that D is clopen and
Finally, we need to show that if
We seek some clopen D such that
A quicker way to state this last argument is the following: the space
Let h be an order function.
(Rupprecht [39,40]).
An oracle is (strongly) null engulfing if and only if it is high.
(Terwijn and Zambella [43]).
An oracle is low for Schnorr tests if and only if it is computably traceable.
Kjos-Hanssen, Nies and Stephan [26] showed that lowness for Schnorr randomness is also equivalent to being computably traceable. The framework discussed here does not appear to give tools for proving this equivalence. This is in contrast with lowness for genericity or Kurtz randomness, which we will discuss below.
Reducing category to measure
We prove:
We take a slightly roundabout way because below we will use the concepts that we introduce now. For a problem
It would be tempting to think that
However, if
Suppose that ψ is a morphism from A to B, that the sets
For all order functions h and
The maps in the morphism from
We therefore write
For every problem A,
Let
We reduce
Let
To prove Proposition 3.22 we need the following. Call a collection
There are uniformly computable dense families of clopen sets
For every pair
We let
Suppose that
Let
On the instance side, we map a dense open set U to the function f defined as follows:
On the solution side, let T be an id-bounded trace. We may assume that for all n,
The maps given in the proof above are computable on their arithmetic domains, and so by Lemma 3.19,
By Theorem 3.14 and Lemma 3.21, and the morphism
Every computably traceable degree is low for meagre sets.
By Corollary 3.16; Theorem 3.18 implies that every degree which is low for Schnorr tests is also low for meagre sets. □
For highness classes, the implication
The following diagram (Fig. 2) displays all the morphisms for the problems associated with measure and category, as well as the domination problems. The analogous diagram for cardinal characteristics was named (by Fremlin) after Cichoń.

The Cichoń diagram for Weihrauch problems.
Sequential composition
A (total) function
A name for such a function is an element of Baire space coding:
The sets
The functions
Note that the collection of names is quite complicated (d-
Let
Every constant function is in
For problems A and B we define the problem
Blass [5] defines
The collection of instances of
We now verify that sequential operation induces a well-defined operation on the morphism equivalence classes of Weihrauch problems.
To reduce A to
To reduce B to
If
Let ψ be a morphism from A to

Reducing
This goes as expected. Abusing notation, we write
When describing a map
If
(a): Let Z be a complete solution set for A and W be a complete solution set for B. Then
(b): Again by Lemma 4.2,
We know that
For the following lemma, we generalise notation: for
The point is that for all
For a Weihrauch problem A and
⇢ is transitive, and
If
If
if
is an equivalence relation.
The first step is to replace
Now we show
On the solution side, we map
We already know that
A degree is not low for meagre sets if and only if it is either hyperimmune or weakly meagre engulfing.
Examining the morphisms, we also get that if a degree
Kjos-Hanssen, Merkle and Stephan [25] showed:
We consider other known morphisms and equivalences.
We prove the equivalent
If
Note how the morphism from
We prove that
We work in Cantor space. On the instance side, we are given a meagre set A with name
Given a function
Let
On the solution side, we are given a pair
Of course, in the absence of A, we do not know which partial strings witness the meagreness of A.
If indeed A is mapped to
Propositions 4.12 and 4.14 give:
A degree is weakly meagre engulfing if and only if it is high or DNR. A degree is not low for meagre sets if and only if it is hyperimmune or DNR.
(a) follows from
(b) follows from (a) and Corollary 4.10(b). □
As for
Corollary 4.15(b) is very close to a result of Stephan and Yu’s [42]. Rather than lowness for meagre sets, they consider the related notion of lowness for closed nowhere dense sets. That is,
We note that we cannot get a morphism equivalence between
In one direction we do get a morphism:
Recall the problems
Next, we show that
We now obtain:
Proposition 4.16 shows that
What about lowness for weak genericity? Here we can use a technique utilised by Greenberg and Monin [20]. We dualise and define the Weihrauch problem:
By construction, for every string
Suppose that Γ is a countable collection of closed, nowhere dense sets, which is closed under the shift operator: for all σ and
The cloure property of Γ means that for every
We can therefore build a point in
We now get the full result of Stephan and Yu, which is also another proof of Proposition 4.17.
By Proposition 4.16,
The implications
There is a high degree which is not high relative to a weakly 1-generic below it, e.g. a minimal high degree. □
We show that
These fine distinctions do not help if we change the question to the existence of a definable (say, Borel) morphism. We shall get back to this question in Section 8.
We can modify the definition of the highness class (and thus the non-lowness class) associated with a Weihrauch problem. The most obvious one is changing the reducibility from Turing to weaker ones. If
Morphisms give implications for these variants of highness and non-lowness classes.
Suppose that
If
As a result, if
The most commonly used in this area is hyperarithmetic reducibility, equivalent to relatively
An oracle is low for
(Greenberg, Monin [20]).
An oracle x is low for
We also obtain results that we believe have not been stated yet, for example:
There is a meagre set in
In Section 8 below we discuss another family of weak reducibilities
In the other direction, we can ask what happens when we strengthen, rather than weaken, Turing reducibility. This has been investigated, for example, by Miyabe [23]. We make the following definition.
Let
Let A be a Weihrauch problem. We let
Sometimes this notion trivialises, for example
To use reducibilities in this context, we need to maintain totality.
Suppose that
We observe that all the morphisms we have considered so far except for one (Remark 3.8) are uniform on their instances. We thus get:
An oracle x is low for uniform Schnorr tests if and only if for some (all) order function(s) h, every
Unfortunately, the usefulness of this approach is limited, because it is not the case that
It would be interesting to find an extension of our methods that would allow us to characterise classes such as
Addition, multiplication, and the Γ question
In this section we introduce another weakening of morphism reducibility (Definition 6.9) that still implies cardinal inequality and containment of highness classes (Lemma 6.10). This weakening is based on the dual operations of sum and product of Weihrauch problems, which have been used in both set theory and computable analysis.
We then use the new reducibility to present results from [33] in the language of morphisms (Theorem 6.15). This result is closely related to Monin’s resolution [31] of the Γ question which was stated in [1].
Addition and multiplication
Let A and B be Weihrauch problems.
The problem The problem
To reduce A to
The following requires only running through the definitions:
As a result:
It is also clear that the sum and product induce well-defined and nice operations on morphism classes, namely:
If
Suppose that
(a): By Lemma 6.2,
(b): By Lemma 6.5,
Note how the proofs of Lemma 6.7 are a simplification of the proofs of Proposition 4.5(a) and Proposition 4.6. Indeed we could deduce Lemma 6.7 from these propositions, using the reduction
(a): By Lemma 6.2,
(b): By Lemma 6.5,
Using duality (Lemma 6.4), we get the analogous results for the non-lowness classes:
These characterisations of cardinals and classes related to sums and products invite a weakening of morphism reduction. A positive Boolean combination of a problem A is a problem obtained from copies of A by repeatedly using addition and multiplication, for example
Let R be the set of pairs
The analysis so far yields the following:
Suppose that
Part (c) uses the fact that the dual of a positive Boolean combination of A is a positive Boolean combination of
Bounded IOE problems were investigated in set theory by Kamo and Osuga [36] (this followed work on other cardinals indexed by growth rates of functions, for example [18,22]). The associated highness classes in computability were introduced by Brendle and Nies [9].
For a function
If
Map an instance to itself; map a solution f to
For functions
Map a problem
As a result, for every h,
For a computable real number
Let
Let
For all computable
Recall that for finite binary strings
The dual of
Thus,
Hirschfeldt et al. [12] showed that for positive
For all computable
It follows, of course, that for all computable
For
If
Theorem 6.15 gives a quick proof of Monin’s result:
Let
This is a-historical: In [32], Monin and Nies first showed that
The main map
For a function
For a function
For the following lemma, and below, for
Let
Suppose that
Suppose that
Let
Suppose that
For (b), as distance is invariant under finite changes, we may assume that for all n,
This of course will work for all
It remains, therefore, to show that
As discussed above, this direction was proved in [32]; the morphism
Infinitely often closeness
Toward the other direction, we introduce along the way a few intermediate problems. Again
Let
We verify the dual: To reduce
Bounded traces
Onwards to tracing. We look at bounded traces. Again fix ℓ; the functions to be traced are still elements of
The list decoding theorem says: for all
We now fix
For all
Fix
So now on the instance side we can take the identity function. Given a solution
For all non-decreasing ℓ and L,
Similar to the proof of Lemma 6.12. If
Next we see that
For all
This is an elaboration on the proof of Lemma 6.13, this time adding multiplicative constants. The proof of Lemma 6.13, this time using Lemma 6.20, shows that for all computable
The last step is:
For all ℓ and L,
We prove that Let By Lemma 6.22,
The σ-ideal
Our goal in this section is:
.
As a result we get:
Together with Corollary 4.15, we obtain: A degree is low for
As with the analogus problem
Let
The proof is identical. We then define the problem
The construction is identical to that proving Lemma 4.18, except that having determined that
The rest is identical: if Γ is a countable collection of closed, null sets, closed under the shift operator, and
The following are equivalent for
x is low for Kurtz tests.
x is low for Kurtz randomness.
x is hyperimmune-free and not DNR.
We also obtain the analogous result in the
An oracle is low for
(Kjos-Hanssen, Nies, Stephan, Yu [27]).
Revising the problem
Our goal, as stated, is Theorem 7.1. It turns out, though, that the bulk of our analysis concerns the following Weihrauch problem:
The identity map in both directions shows that
.
As a result, we obtain:
Let
Before we prove Proposition 7.8, we show how it implies the main theorem. We use the following two reductions.
On the instance side, given On the solution side, we are given a sequence To show that this works, suppose that The proof actually shows that
This resembles the proof of Proposition 4.9, with a dose of compactness. On the instance side, map a On the solution side, we map a pair In one direction, we first observe that In the other direction, if
We work toward a proof of Proposition 7.8.
On the instance side, we are given a On the solution side, we are given a sequence
The following argument resembles the proof of [30, Thm.2.2]; the argument of the corresponding cardinal inequality in [2] (Lemma 2.6.13) is non-constructive. As above, given Toward defining our map on solutions, let, for Also of course we use the fact that
We are given a null set
For each
To show that this works, we need to show that if
The rough idea is that if h is majorised by f beyond
The following claim is the combinatorial heart of this proof.
Fix
The claim gives the proposition. To see this, suppose that
It thus remains to prove the claim.
By definition of
Fix
We use the “Svelte tree” machinery from [19]. Let for all Every leaf of T extends a sequence in
Let
In fact, we can get
The map on instances is as follows. We map
On the solution side, we map a pair
Suppose that
By Proposition 7.13,
The drawback of the proof given above of
(With Harrison-Trainor).
To reduce
We reduce
On the solution side, we map a function g, which we assume is strictly increasing, to the “step function”
To show
The proof can be modifed to produce a strictly increasing
On our way, we define a strong variant of covering by a null set. For a set
By Lemma 7.17, we reduce
Recall the notation
Recall that the granularity of
For a null set
On the solution side, we are given a null set
To show that this works, suppose that
We then observe that as
In Lemma 7.17, by increasing values, we could require the range of g, and hence of
Applying this to the proof of the previous proposition, we see that
Another way to say this is that the instances are pairs
We need one last Weihrauch problem:
To reduce
In the other direction, naively, it would seem that we could only reduce
There is a computable function
The point is that
Fix a computable decreasing sequence
Suppose that
We first verify that for each σ,
Now we are given a partial choice function c as in the statement of the lemma. Suppose that for all
We define recursively a sequence of strings
Finally, the following proposition finishes the proof of
We show that Given a non-decreasing function g, we assume that Thus, on the solution side, we map Keeping with g and On the solution side, we map To see that this works, suppose that indeed
The most common way to prove the consistency of a strict inequality
There are several reasons for using represented spaces (Definition 3.1). Here we see another one: the interpretation of a name may change between different models of set theory. Take for example the collection of names
The relationship between computability and set theory here is imprecise. In many cases, the notion of forcing
Cohen forcing is unusual in that it is the unique countable notion of forcing; all conditions are computable. A Cohen real does not make the collection of reals in the ground model meagre. And indeed, the argument is effective.
(Rupprecht [39]).
A sufficiently Cohen generic real is not weakly meagre engulfing.
So a Cohen generic gives an oracle in
Suppose that p is a condition that forces that
The argument above is identical to the argument showing that the ground model reals in a Cohen extension are not meagre. In that argument we need to first prove a continuous reading of names, which tells us that every real in the extension is the image of the generic by a continuous function with code in the ground model. On the other hand, unlike the computability proof, in set theory we don’t need to worry about how effective is the search for
Proving that an
Figure 4 gives the dividing line for Cohen forcing in the Cichoń diagram.

Cohen forcing and the Cichoń diagram. Cohen forcing adds a real in
In the Cohen extension, the ground model reals are null. This is an immediate corollary of the morphism
The next simplest notion of forcing is perhaps random real forcing, one version of which is forcing with closed sets of positive measure. The conditions with computable names are the

Random forcing and the Cichoń diagram; the forcing adds solutions (and increases cardinals) for problems above the dividing line.
Before we proceed, we make a side remark on two step iterations.
Let A and B be absolute Weihrauch problems, and let
Let
So from the morphism
Zapletal [48] showed that the iteration was necessary: he found a notion of forcing that adds an
Sometimes, however, computability does not reveal the full picture. The most familiar example is the morphism
Denote this notion of forcing by
On the other hand, Miller forcing has the Laver tracing property, and so does not add a Cohen generic. Namely, for every order function h, for every function
Next, consider the next level. Let
We see that the reason that this argument does not work computably is that even if T is computable, the construction of the thinned tree is not computable: it requires answers to the requests “give us a value that occurs infinitely often.” This can be done with the Turing jump of T. This shows that if we force with all arithmetic conditions, we will obtain a function escaping all arithmetic functions, which computes no arithmetically generic real. Indeed, even with the help of any arithmetic oracle, no such generic can be computed. Recall from Section 5 that we defined
If I is a jump ideal then
We remark that in [24], Kihara showed that Miller forcing has a sufficiently effective continuous reading of names, so that this inequality holds for relative hyperarithmetic reducibility as well. In contrast with Proposition 8.6, the argument that
For which Turing ideals I is it the case that
The same kind of question can be asked about the two other “collapses” in the computable Cichoń diagram:
