Skip to main content

Logic of Fusion

— Dedicated to Andre Scedrov —

  • Chapter
  • First Online:
Logic, Language, and Security

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12300))

Abstract

We pursue an extension of the Curry-Howard isomorphism of propositions and types by a correspondence of cut elimination and program fusion. In particular, we explore the repercussions of this extension in generic and transformational programming. It provides a logical interpretation of build fusion, or deforestation, in terms of the inductive and the coinductive datatypes. Viewed categorically, this interpretation leads to the novel structure of paranatural transformations. This is a modified version of functorial polymorphism, that played a prominent role in the work of Andre Scedrov.

D. Pavlovic—Supported by NSF and AFOSR.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anlauff, M., Pavlovic, D., Waldinger, R., Westfold, S.: Proving authentication properties in the protocol derivation assistant. In: Degano, P., Küsters, R., Vigano, L. (eds.) Proceedings of FCS-ARSPA 2006. ACM (2006)

    Google Scholar 

  2. Bainbridge, E.S., Freyd, P.J., Scott, P.J., Scedrov, A.: Functorial polymorphism. Theor. Comput. Sci. 70(1), 35–64 (1990). orrigendum in 71(3), 431

    Article  MathSciNet  Google Scholar 

  3. Bird, R., Meertens, L.: Nested datatypes. In: Jeuring, J. (ed.) MPC 1998. LNCS, vol. 1422, pp. 52–67. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054285

    Chapter  Google Scholar 

  4. Carboni, A., Freyd, P.J., Scedrov, A.: A categorical approach to realizability and polymorphic types. In: Main, M., Melton, A., Mislove, M., Schmidt, D. (eds.) MFPS 1987. LNCS, vol. 298, pp. 23–42. Springer, Heidelberg (1988). https://doi.org/10.1007/3-540-19020-1_2

    Chapter  Google Scholar 

  5. Chadha, R., Kanovich, M.I., Scedrov, A.: Inductive methods and contract-signing protocols. In: Reiter, M.K., Samarati, P. (eds.) CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, 6–8 November 2001, pp. 176–185. ACM (2001)

    Google Scholar 

  6. Freyd, P.: Algebraically complete categories. In: Carboni, A., Pedicchio, M.C., Rosolini, G. (eds.) Category Theory. LNM, vol. 1488, pp. 95–104. Springer, Heidelberg (1991). https://doi.org/10.1007/BFb0084215

    Chapter  Google Scholar 

  7. Freyd, P.J.: Structural polymorphism. Theor. Comput. Sci. 115(1), 107–129 (1993)

    Article  MathSciNet  Google Scholar 

  8. Freyd, P.J., Girard, J.-Y., Scedrov, A., Scott, P.J.: Semantic parametricity in polymorphic lambda calculus. In: Proceedings Third Annual Symposium on Logic in Computer Science, pp. 274–279. IEEE Computer Society Press, July 1988

    Google Scholar 

  9. Gill, A., Launchbury, J., Peyton-Jones, S.: A short cut to deforestation. In: Proceedings of FPCA 1993. ACM (1993)

    Google Scholar 

  10. Girard, J.Y., Lafont, Y., Taylor, P.: Proofs and Types. Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, Cambridge (1989)

    MATH  Google Scholar 

  11. Krstić, S., Launchbury, J., Pavlović, D.: Categories of processes enriched in final coalgebras. In: Honsell, F., Miculan, M. (eds.) FoSSaCS 2001. LNCS, vol. 2030, pp. 303–317. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45315-6_20

    Chapter  MATH  Google Scholar 

  12. Lincoln, P., Mitchell, J., Mitchell, M., Scedrovy, A.: Probabilistic polynomial-time equivalence and security analysis. In: Wing, J.M., Woodcock, J., Davies, J. (eds.) FM 1999. LNCS, vol. 1708, pp. 776–793. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48119-2_43

    Chapter  Google Scholar 

  13. Pavlovic, D.: Maps II: chasing diagrams in categorical proof theory. J. IGPL 4(2), 1–36 (1996)

    Article  MathSciNet  Google Scholar 

  14. Scedrov, A.: A guide to polymorphic types. In: Odifreddi, P. (ed.) Logic and Computer Science. LNM, vol. 1429, pp. 111–150. Springer, Heidelberg (1990). https://doi.org/10.1007/BFb0093926

    Chapter  Google Scholar 

  15. Scedrov, A., Canetti, R., Guttman, J.D., Wagner, D.A., Waidner, M.: Relating cryptography and cryptographic protocols. In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), Cape Breton, Nova Scotia, Canada, 11–13 June 2001, pp. 111–114. IEEE Computer Society (2001)

    Google Scholar 

  16. Seldin, J.P., Hindley, J.R., Curry, T.H.B. (eds.): Essays on Combinatory Logic. Lambda Calculus and Formalism. Academic Press, London (1980)

    MATH  Google Scholar 

  17. Strachey, C.: Fundamental concepts in programming languages, lecture notes for the international summer school in computer programming. Copenhagen, August 1967

    Google Scholar 

  18. Wadler., P.: Theorems for free! In: Proceedings of FPCA 1989. ACM (1989)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dusko Pavlovic .

Editor information

Editors and Affiliations

Appendix: Proof of Proposition 3

Appendix: Proof of Proposition 3

Towards isomorphism (12), we define the maps

and show that they are inverse to each other.

Given \(f: A \longrightarrow M_F\), the X-th component of \(f'\) will be

where \(k : (FX\Rightarrow X) \longrightarrow (M_F\Rightarrow X)\) maps the algebra structures \(x:FX\rightarrow X\) to the catamorphisms . Formally, k is obtained by transposing the catamorphism for the F-algebra \(\kappa \) on \((FX\Rightarrow X)\Rightarrow X\), obtained by transposing the composite

where arrow (i) is derived from the diagonal on \(FX\Rightarrow X\), (ii) from the strength, while (iii) and (iv) are just evaluations.

Towards the definition of \(\mathtt{build}\), for a paranatural \(\varphi \ :\ A\times (FX\Rightarrow X) \longrightarrow X\) take

Composing the above two definitions, one gets the commutative square

figure s

Since \(k\cdot \ulcorner \mu \urcorner = \ulcorner \mathrm{id}_M \urcorner \), the path around the square reduces to f, and yields \(\mathtt{build}(f') = f\).

The converse \(\mathtt{build}(\varphi )' = \varphi \) is the point-free version of lemma 1. It amounts to proving that the paranaturality of \(\varphi \) implies (indeed, it is equivalent) to the commutativity of

figure t

where \(\widetilde{\varphi }X\) is the transpose of \(\varphi X\). Showing this is an exercise in cartesian closed structure. On the other hand, the path around the square is easily seen to be \(\mathtt{build}(\varphi )'_X\).

To establish isomorphism (13), we internalize 15 similarly like we did 14 above. The natural correspondences

are defined

and

for \(g:N_F\longrightarrow B\) and \(\psi : X\times (X\Rightarrow FX) \longrightarrow B\). The arrow \(\ell : (X\Rightarrow FX) \longrightarrow (X\Rightarrow FX)\) maps the coalgebra structures \(x:X\rightarrow FX\) to the anamorphisms \([\negmedspace (x )\negmedspace ]:X \rightarrow N_F\). \(\Box \)

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pavlovic, D. (2020). Logic of Fusion. In: Nigam, V., et al. Logic, Language, and Security. Lecture Notes in Computer Science(), vol 12300. Springer, Cham. https://doi.org/10.1007/978-3-030-62077-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62077-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62076-9

  • Online ISBN: 978-3-030-62077-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics