Keywords

1 Introduction

On the Non-Wellfounded Proof-Theory of Fixed-Point Logics. In the context of logics with induction and coinduction (such as logics with inductive definitions à la Martin Löf [6, 9, 10, 25], or variants of the \(\mu \)-calculus [11, 22, 23]), the need for a (co)inductive invariant (in the form of the Park’s rule for induction) is replaced by the ability to pursue the proof infinitely, admitting non-wellfounded branches, when considering non-wellfounded and circular proofs (also called cyclic, or regular proofs, since the proof tree is a regular tree, with finitely many distinct subtrees). In such frameworks, sequent proofs may be finitely branching but non-wellfounded derivation trees and infinite branches shall satisfy some validity condition. (Otherwise one could derive any judgement, see Fig. 1(a).) Various validity conditions have been considered in the literature [3].

The non-wellfounded and circular proof-theory of fixed-points attracted a growing attention first motivated by proof-search [1, 7, 8, 16,17,18, 28] and more recently by a Curry-Howard perspective, studying the dynamics of the cut-elimination in those logics [4, 20, 29] where formulas correspond to (co)inductive types. Notice also that when interested in the computational content of proofs, we will not focus solely on the regular fragment as we expect, for instance, that we can write a regular program that computes a non-ultimately periodic stream.

Fig. 1.
figure 1

(a) Example of an invalid circular pre-proof (b) Schema of the multicut rule

Cut-Elimination and \(\textsf{LL}\) . When studying the structure of proofs and their cut-elimination properties, \(\textsf{LL}\), Girard’s Linear Logic [21], is a logic of choice: the careful treatment of structural rules gives access to a lot of information and a fine-grained control over cut-reduction. The constrained use of structural rules indeed renders the cut-elimination theorem more informative than in \(\textsf{LJ}\) and of course \(\textsf{LK}\). Interestingly it provided a positive feedback on the understanding of \(\textsf{LJ}\) and \(\textsf{LK}\): by decorating intuitionistic and classical proofs with enough exponential modalities (\(\mathop {!}, \mathop {?}\)), they can become \(\textsf{LL}\) proofs and one can therefore refine the original cut-elimination relations [12, 21]. This approach impacted the understanding of evaluation strategies of programming languages such as call-by-name and call-by-value notably. Another way to view this is by noting that, in \(\textsf{LK}\), the additive and multiplicative presentations of conjunction (resp. disjunction) can be shown to be interderivable thanks to structural rules. This fails in \(\textsf{LL}\) and it is the reason why \(\textsf{LL}\) has well-established additive – – (resp. multiplicative ) fragments. It is the role of the exponential fragment to relate the additive and multiplicative worlds, by mean of the fundamental equivalence: (and its dual, ). The exponential modalities are precisely introduced where structural rules are needed to restore the equivalence between the additive and multiplicative conjunctions; in categorical models of \(\textsf{LL}\)  [26], this principle is referred to as Seely isomorphisms.

Cut-Elimination for Non-Wellfounded Proofs. Proving cut-elimination results for non-wellfounded proofs in the presence of least and greatest fixed-points requires to use reasoning techniques coping with the non-inductive structure of the considered formulas (fixed-points formulas regenerate) and proof objects (which are non-wellfounded). For instance, Santocanale and Fortier [20] proved cut-elimination for the regular fragment of non-wellfounded proofs of purely additive linear logic with fixed points, \(\mathsf {\mu ALL^\infty }\), while Baelde et al. [4] proved cut-elimination for non-wellfounded proofs with additive and multiplicative connectives, \(\mathsf {\mu MALL^\infty }\). In both cases, the proof relies on a generalization of the cut-rule, the multicut rule (which abstracts a portion of a proof tree constituted only of cut inferences see Fig. 1(b)) and on a reasoning by contradiction to prove that one can eliminate cuts at the limit of an infinite cut reduction sequence, while preserving the validity condition. Baelde et al. [3, 4] use a so-called “locative” approach by modelling sequents as sets of formulas paired with addresses which determines uniquely the formula occurrence in a sequent and makes explicit the ancestor relation used to trace the progress along branches. Moreover, the cut-elimination proof proceeds by a rather complex semantical, roundabout, argument relying on a soundness theorem.

In a slightly different direction, Das and Pous [15] proved a cut-elimination result for Kleene algebras and their variants. This can be viewed as a non-commutative version of intuitionistic MALL with a particular form of inductive construction, Kleene’s star. Kuperberg et al [24] and more specifically Pinault’s PhD thesis [27] as well as Das [13] examine non-wellfounded versions of System T based on [15], exploring the computational content of non-wellfounded proofs.

Neither Santocanale and Fortier’s [20, 29], nor Baelde et al. [3, 4] works captured full linear logic: the exponentials are missing and the proofs cannot deal with them in a simple way. Indeed, the proof for \(\mathsf {\mu ALL}\) strongly relies on the assumption the sequents are pairs of formulas (\(A \vdash B\)) while in \(\mathsf {\mu MALL}\), the locative approach taken by Baelde et al. is not well-suited to work with structural rules: the extension of the proof would be possible though highly technical. In contrast, our motto in the present work is to work with traditional sequents as lists of formulas and to exploit the (co)inductive nature of \(\textsf{LL}\) exponentials.

On the (Co)Inductive Nature of Exponential Modalities in Linear Logic. The original works by Baelde and Miller on fixed-points in linear logic [2, 5] focus on \(\mathsf {\mu MALL}\) only and present an encoding of the exponential modalities of \(\textsf{LL}\) using least and greatest fixed points. Indeed, the \(\mathop {?}\) and \(\mathop {!}\) modalities have an infinitary character which is well-known from the early days of linear logic (see Section V.5 of Girard’s seminal paper [21]) and which is in fact respectively inductive for \(\mathop {?}\) and coinductive for \(\mathop {!}\); let us discuss it briefly here.

One can decide to contract a \(\mathop {?}\)-statement any finite number of times before it is ultimately weakened or derelicted. It is therefore natural to represent \(\mathop {?}A\) with formula : A allows for dereliction, \(\bot \) for weakening and will regenerate, by unfolding, two copies of \({\mathop {?}}^\bullet A\), making the contraction derivable. The \(\oplus \) and \(\mu \) connectives respectively provide the ability to choose either of those three inferences and to repeat finitely this process.

On the other hand, a \(\mathop {!}\)-formula is a formula which, during cut-elimination, shall maintain a proper interaction with any number of contractions, weakenings or derelictions: a proof concluded with a promotion shall be able to react to any number of duplications or erasure before the promotion actually interact with a dereliction to open the exponential box: from that follows the coinductive character of \(\mathop {!}A\) modelled as .

As discussed above and formally established by Baelde and Miller [5], the exponential rules can be derived in the finitary sequent calculus \(\mathsf {\mu MALL}\): to any \(\textsf{LL}\) provable sequent can be associated a provable \(\mathsf {\mu MALL}\) sequent via the above translations of the exponentials. However, until now one can hardly say more about this embedding for two deep reasons: (i) the fundamental Seely isomorphisms which relate the additive and multiplicative versions of conjunction (resp. disjunction) are still derivable through this encoding but they are no more isomorphisms and (ii) on the provability level as well, the encoding is not faithful: the \(\mathsf {\mu MALL}\) provability of the translation of an \(\textsf{LL}\) sequent s does not entail the \(\textsf{LL}\) provability of s itself (counter-example due to Das [14]). A contribution of the present paper is to put to work Baelde and Miller’s encoding, showing that, in the case of non-wellfounded proofs, its structure is faithful enough to extract information of the cut-reduction behaviour of the logic.

Contributions and Organization of the Paper. The main result of this paper is a cut-elimination theorem for \(\mathsf {\mu LL^\infty }\), the non-wellfounded sequent calculus for linear logic extended with least and greatest fixed points. Our proof proceeds by encoding \(\textsf{LL}\) exponentials in \(\mathsf {\mu MALL^\infty }\) and studying \(\mathsf {\mu LL^\infty }\) cut-reduction sequences through their simulation in \(\mathsf {\mu MALL^\infty }\) which may be a transfinite sequence. In Sect. 2, we introduce our logics, \(\mathsf {\mu MALL^\infty }\), \(\mathsf {\mu LL^\infty }\), \(\mathsf {\mu LK^\infty }\) and \(\mathsf {\mu LJ^\infty }\), altogether with their non-wellfounded proofs and validity conditions. We adapt \(\mathsf {\mu MALL^\infty }\) cut-elimination theorem [4] to our setting where sequents are lists and prove a compression lemma for \(\mathsf {\mu MALL^\infty }\) transfinite cut-reduction sequences. Section 3 constitutes the core of our paper: we define \(\mathsf {\mu LL^\infty }\) cut-reduction rules, study the encoding of exponentials in \(\mathsf {\mu MALL^\infty }\) and show that \(\mathsf {\mu LL^\infty }\) cut-reduction steps can be simulated in \(\mathsf {\mu MALL^\infty }\), before proving \(\mathsf {\mu LL^\infty }\) cut-elimination theorem. We prove in Sect. 4, as corollaries, cut-elimination for \(\mathsf {\mu LK^\infty }\) and \(\mathsf {\mu LJ^\infty }\), the non-wellfounded sequent-calculi for classical and intuitionistic logic. While our result for \(\mathsf {\mu LL^\infty }\) shows that any fair cut-reduction sequence produces a cut-free valid proof, our two other cut-elimination results are truly (infinitary) weak-normalization results. We finally conclude in Sect. 5 with perspectives. A major advantage of our approach is that \(\mathsf {\mu MALL^\infty }\) cut-elimination proof and, to some extent, the validity conditions, are regarded as black boxes, simplifying the presentation of the proof and making it reusable wrt. other validity conditions or \(\mathsf {\mu MALL^\infty }\) proof techniques. An additional by-product of our approach, to the theory of linear logic, is to illustrate the fact that Seely isomorphisms are not needed to reach a cut-free proof.

A companion technical report containing additional details on the definitions as well as full proofs is available online [30].

2 Non-Wellfounded Proofs: \(\mathsf {\mu MALL^\infty }\), \(\mathsf {\mu LL^\infty }\), \(\mathsf {\mu LK^\infty }\), \(\mathsf {\mu LJ^\infty }\)

2.1 \(\mu \)-Signatures and Formulas

Definition 1

(\(\mu \) -signature). A \(\mu \) -signature is a set \(\mathcal C\) of pairs (cp) of a connective symbol c and a tuple p of elements of \(\{\mathsf {+}, \mathsf {-}\}\). The arity of c, \(\textsf{ar}(c)\), is the length of p, while the elements of p indicate the mono/antitonicity of the connective in the given component. The empty tuple will be denoted as ()Footnote 1.

Example 2

(\(\mu \) -signature associated with \(\mathsf {\mu MALL}, \mathsf {\mu LL}, \mathsf {\mu LK}, \mathsf {\mu LJ} \)). The \(\mu \)-signatures associated with \(\mathsf {\mu MALL}, \mathsf {\mu LL}, \mathsf {\mu LK}, \mathsf {\mu LJ} \) are:

  • \(\mathsf {\mu MALL}\) signature: ;

  • one-sided \(\mathsf {\mu LL}\) signature: \(\mathcal{C}_{\mathsf {\mu LL} _1} = \mathcal{C}_{\mathsf {\mu MALL}}\cup \{!,?\}\times \{(\mathsf {+})\}\) ;

  • two-sided \(\mathsf {\mu LL}\) signature: \(\mathcal{C}_{\mathsf {\mu LL} _2} = \mathcal{C}_{\mathsf {\mu LL} _1} \cup \{(\multimap ,(\mathsf {-},\mathsf {+})), ({\cdot }^\perp ,(\mathsf {-})) \}\) ;

  • \(\mathsf {\mu LK}\) signature: \(\mathcal{C}_{\mathsf {\mu LK}} = \{\wedge , \vee \}\times \{(\mathsf {+},\mathsf {+})\}\cup \{(\Rightarrow ,(\mathsf {-},\mathsf {+})) \} \cup \{\top ,\textsf{F}\}\times \{()\}\);

  • \(\mathsf {\mu LJ}\) signature: \(\mathcal{C}_{\mathsf {\mu LJ}} = \mathcal{C}_{\mathsf {\mu LK}}\).

Definition 3

(Pre-formulas). Given a \(\mu \)-signature \( \mathcal C\), a countable set \(\mathcal {V}\) of fixed-point variables and a set of atomic formulas \({\mathcal A}\), the set of pre-formulas over \(\mathcal S\) is defined as the least set \(\mathcal {F_S}\) such that: \((\alpha )\) \({\mathcal A}\cup \mathcal V\subseteq \mathcal {F_S}\); \((\beta )\) for every c of arity n in \(\mathcal C\) and \(F_1, \dots , F_n\in \mathcal {F_S}\), \(c(F_1, \dots , F_n)\in \mathcal {F_S}\); \((\gamma )\) for every \(X \in \mathcal V\) and pre-formula \(F\in \mathcal {F_S}\), \(\mu X. F \in \mathcal {F_S}\) and \(\nu X. F \in \mathcal {F_S}\).

Definition 4

(Positive and negative occurrences of a variable). Given a \(\mu \)-signature \(\mathcal C\) and a fixed-point variable \(X\in \mathcal V\), one defines by induction on pre-formulas the fact, for X, to occur positively (resp. negatively) in a pre-formula : \((\alpha )\) X occurs positively in X; \((\beta )\) X occurs positively (resp. negatively) in \({c} (F_1, \dots , F_n)\), for \((c,p)\in \mathcal C\), if there is some \(1\le i \le n\) such that X occurs positively (resp. negatively) in \(F_i\) and \(p_i=+\) or there is some \(1\le i \le n\) such that X occurs negatively (resp. positively) in \(F_i\) and \(p_i = -\); \((\gamma )\) X occurs positively (resp. negatively) in \(\sigma Y. F\), for \(\sigma \in \{\mu ,\nu \}\), if \(Y\ne X\) and X occurs positively (resp. negatively) in F.

Definition 5

(\(\mu \) -formula). A \(\mu \)-formula F over a signature \(\mathcal S\) is a pre-formula containing no free fixed-point variable and such that for any sub-pre-formula of F of the form \(\sigma X. G\), all occurrences of X in G are positive.

Definition 6

One-sided \(\mathsf {\mu LL}\) formulas are those formulas defined over the signature \(\mathcal C_{\mathsf {\mu LL} _1}\) together with a set of atomic formulas \(\{a, a^\perp \mid a\in \mathcal A\}\) for a countable set \(\mathcal A\). Negation \((\_)^\bot \) is the involution on pre-formulas defined by:

\((a^{\bot })^\bot = a;\ \bot ^\bot = 1;\ \top ^\bot = 0;\) \((\mathop {?}F)^\bot = \mathop {!}F^\bot ;\) \(X^\bot = X;\ (\nu X. F)^\bot = \mu X. F^\bot .\)

Definition 7

(\(\mu \) -Fischer-Ladner subformulas). Given a \(\mu \)-signature \(\mathcal C\) and a \(\mu \)-formula F, FL(F) is the least set of formulas such that:

  • \(F\in FL(F)\);

  • \(c(F_1, \dots , F_n)\in FL(F)\Rightarrow F_1,\dots ,F_n\in FL(F)\) for \(c\in \mathcal C\);

  • \(\sigma X.B\in FL(F)\Rightarrow B[\sigma X.B/X]\in FL(F)\) for \(\sigma \in \{\mu ,\nu \}\).

Example 8

Let us consider . FL(F) is the set .

The finiteness of FL(F) makes it an adequate notion of subformula:

Proposition 9

For any \(\mu \)-signature \(\mathcal S\) and \(\mu \)-formula F, FL(F) is finite.

2.2 \(\mathsf {\mu MALL^\infty }\), \(\mathsf {\mu LL^\infty }\), \(\mathsf {\mu LK^\infty }\) & \(\mathsf {\mu LJ^\infty }\) Inference Rules

Now, we define the inference rules associated with the above \(\mu \)-signatures.

Definition 10

(Sequents and inferences). A sequent \(s=\varGamma \vdash \varDelta \) over a \(\mu \)-signature \(\mathcal S\) is a pair of finite lists \(\varGamma , \varDelta \) of \(\mathcal S\)-formulas: \(\varGamma \) is the antecedent and \(\varDelta \) the succedent. An inference rule r, usually presented by a schema, is the data of a conclusion sequent, premise sequents, together with an ancestor relation relating formulas of the conclusion with formulas of the premises. A rule has a subset of distinguished principal formulas of the conclusion.

Convention 1

In the following, the ancestor relation will be depicted as colored lines joining related formulas. The principal formulas of an inference are the formulas which are explicitly spelled out in the conclusion sequent of an inference, not described via a context meta-variable. A formula occurrence of an inference is said to be active if it is principal or related to a principal formula by the ancestor relation. We will freely use the derived rules obtained by pre- and post-composition with the exchange rule, adapting the ancestry relation accordingly. Finally, for one-sided sequent calculi with an involutive negation \(\cdot ^\perp \), we may write \(\varGamma \vdash \varDelta \) for sequents \(\vdash \varGamma ^\perp , \varDelta \) to clarify the computational behaviour of our examples (keeping the rule names unchanged).

Fig. 2.
figure 2

(a) \(\mathsf {\mu MALL^\infty }\) Inferences (b)\(\mathsf {\mu LL^\infty }\) Exponential Inferences

Definition 11

( \(\mathsf {\mu MALL^\infty }\), \(\mathsf {\mu LL^\infty }\), \(\mathsf {\mu LK^\infty }\), \(\mathsf {\mu LJ^\infty }\) ). \(\mathsf {\mu MALL^\infty }\) inferences are given in Fig. 2. Those for one-sided \(\mathsf {\mu LL^\infty }\) in Fig. 2(a) and 2(b). Those for \(\mathsf {\mu LK^\infty }\) in Fig. 3. Those for \(\mathsf {\mu LJ^\infty }\) by considering only inference from Fig. 3 where the succedent of both premises and conclusion sequents are singletons.

In the above sequent calculi, every inference but the cut satisfies the subformula property wrt. FL-subformulae. The 2-sided \(\mathsf {\mu LL^\infty }\) sequent calculus, over \(\mathcal C_{\mathsf {\mu LL} _2}\), is defined as usual and not recalled here for space constraints.

Fig. 3.
figure 3

\(\mathsf {\mu LK^\infty }\) Two-sided Inferences

2.3 Pre-proofs and Validity Conditions

Definition 12

(Pre-proofs). The set \(\textsf{P}_{\mathcal S,\mathcal I}\) of \(\mathcal I\) -pre-proofs associated to some of the above \(\mu \)-signatures \(\mathcal S\) and sets of inferences \(\mathcal I\) is the set of finite or infinite trees whose nodes are correctly labelled with inferences and sequents.

Pre-proofs are equipped with a metric structure as follows: we define a distance \(\textsf{d}: \textsf{P}_{\mathcal S,\mathcal I}\times \textsf{P}_{\mathcal S,\mathcal I} \rightarrow \mathbb {R}\) as: \(\textsf{d}(\pi ,\pi ') = 0\) if \(\pi =\pi '\) and \(\textsf{d}(\pi ,\pi ') = 2^{-k}\) where k is the length of the shortest position where \(\pi \) and \({\pi '}\) differ otherwise.

Example 13

Consider \(\mathsf {\mu LJ}\) formulas \(N=\mu X. \top \vee X\) and \(S=\nu X. N\wedge X\). They represent nats and streams of nats. The \(\mathsf {\mu LJ^\infty }\) derivations of Fig. 4 respectively represent natural numbers, successor function, \(n{:}{:}n+1{:}{:}n+2{:}{:}\dots \), the double functions and the function that builds a stream enumerating the natural numbers from its input: the cut-elimination process considered below will ensure that cutting \(\pi _{\textsf{k}}\) with \(\pi _{\textsf{enum}}\) will infinitarily reduce to \(\pi _{\textsf{from}}^{\mathsf k}\). Figure 5 shows other examples of \(\mathsf {\mu LL^\infty }\) pre-proofs, discussed with the validity condition.

The back-edge arrow to a lower sequent is notation to describe a fixed-point definition of the proof object: the subproof rooted in the source is equal to the proof rooted in the target. Trivially there is a unique solution.

In the following, we assume given a \(\mu \)-signature \(\mathcal S\) and a sequent calculus \(\textsf{S}\) for this signature and we shall define the valid \(\textsf{S}\)-proofs as a subset of \(\textsf{S}\)-pre-proofs, by introduction a thread-based validity condition.

Definition 14

(Thread and validity). Given a pre-proof \(\pi \) and an infinite branch \(\beta =(s_i)_{i\in \omega }\) in \(\pi \), a thread for \(\beta \) is an infinite sequence \(\theta \) of formula occurrences such that \(\forall i\in \omega \), \(\theta _i\) is a formula occurrence of \(s_i\) and \(\theta _i\) and \(\theta _{i+1}\) are ancestor of each other. \(\theta \) is said to support \(\beta \).

A formula F is recurring in a thread \(\theta \) of \(\beta \) if there are infinitely many i such that \(\theta _i\) is an occurrence of F.

A thread \(\theta \) is valid if it contains infinitely often the principal formula (occurrence) of a \(\nu \) or \(\mu \) rule and if the set of recurring formulas of \(\theta \) has a least element (for the usual subformula ordering) which is (i) a \(\nu \) formula when the least element occurs in the succedents or (ii) a \(\mu \) formula if it occurs in the antecedents. A pre-proof is valid if all its infinite branches have a suffix supported by a valid thread.

Example 15

((Non-)valid pre-proofs). Consider the pre-proof in Fig. 5(a), with and \(G = \mu Y. F\). The rightmost branch is supported by the green thread for which the least recurring formula is F, a \(\nu \)-formula. All other branches are valid: this pre-proof is valid. Consider now the same pre-proof but with and . G is now a subformula of F and G, a \(\mu \)-formula, and becomes the least recurring formula of all threads along the right-most infinite branch. This branch is invalid: the pre-proof is not a proof. Examples of \(\mathsf {\mu LL^\infty }\) invalid pre-proofs are given in Fig. 1(a),5(b–c). In Fig. 4, \(\pi _{\textsf{double}}\) has a left thread on N while \(\pi _\textsf{from}^{\textsf{n}}, \pi _{\textsf{enum}}\) have right threads on S: they are valid.

Fig. 4.
figure 4

Examples of \(\mathsf {\mu LJ^\infty }\) pre-proofs

2.4 Non-Locative \(\mathsf {\mu MALL^\infty }\) Cut-Elimination Theorem

The validity condition defines a subset of pre-proofs, ensuring good properties for those non-wellfounded derivations that satisfy the validity condition. In this paper, we will mainly be interested in cut-elimination theorem, which was proved for \(\mathsf {\mu MALL^\infty }\)  [4] and that we review in this subsection. In [4], a somehow stronger result than cut-elimination is proved: infinitary strong normalization with respect to the class of fair reduction sequences.

The only new result developed in this subsection is the lifting of the occurrence-based cut-elimination result of [4] to our setting system, for which we first introduce the multicut inference and review the main multicut-reduction steps for \(\mathsf {\mu MALL^\infty }\) before defining fair reductions. The cut-elimination results of [4, 20] do not rewrite cuts, per se, but subtrees of cuts in the form of an abstraction called multicut which is a variable arity inference defined as follows:

Definition 16

The multicut inference is given by the data of (i) a conclusion sequent s, (ii) a non-empty list of premises \((s_1, \dots , s_n), n\ge 1\), (iii) an ancestor relation \(\iota \) which is an injective map from the conclusion formulas to the premise formulas and relates identical formulas and additionally (iv) a cut-connectedness relation which is a total, symmetric, binary relation among the formula occurrences of the premises which are not ancestor of a conclusion formula, which relates dual formulasFootnote 2 and which satisfies a connectedness and acyclicity condition (see [3, 4]). The multicut inference has no principal formula.

We write this multicut rule as:

figure q
Fig. 5.
figure 5

Examples of valid and invalid pre-proofs

In the following, we only consider \(\mathsf {\mu MALL^\infty }\) pre-proofs with specific multicuts:

Definition 17

( \(\mu \textsf{MALL}_\textsf{m}^\infty \) ). \(\mu \textsf{MALL}_\textsf{m}^\infty \) (pre)proofs are those (pre)proofs built from \(\mathsf {\mu MALL^\infty }\) inferences and the multicut, such that (i) any branch contains at most one multicut and (ii) any occurrence of a cut is above a multicut inference.

In the following, we shall always assume, even without mentioning it, that we consider proofs in \(\mu \textsf{MALL}_\textsf{m}^\infty \) (as well as \(\mu \textsf{LL}_\textsf{m}^\infty \), \(\mu \textsf{LJ}_\textsf{m}^\infty \), \(\mu \textsf{LK}_\textsf{m}^\infty \)). We need the following definition (from [4]), identifying the premises of an mcut which are cut-connected to a given formula occurrence:

Definition 18

(Restriction of a mcut-context). Consider an occurrence of a mcut

figure r

and assume \(s_i\) to be \(\vdash F_1, \dots , F_k\). We define \(\mathcal {C}_{F_j}, 1 \le j \le k\), to be the least set of sequent occurrences contained in \(\{s_1,\dots , s_n\}\) such that:

(i) If \(\exists k, l\) such that , then \(s_k\in \mathcal {C}_{F_j}\);

(ii) for any \(k,k'\ne i\), if \(s_k\in \mathcal {C}_{F_j}\) and \(\exists l, l'\) such that , then \(s_{k'}\in \mathcal {C}_{F_j}\).

We define \(\mathcal {C}_\emptyset = \emptyset \) and \(\mathcal {C}_{F, \varGamma } = \mathcal {C}_F \cup \mathcal {C}_\varGamma \).

When relating \(\mathsf {\mu LL^\infty }\) and \(\mathsf {\mu MALL^\infty }\) mcut-sequences below, we shall consider not only finite sequence nor \(\omega \)-indexed sequences but also transfinite sequences. Those are sequences of triples of a proof, a redex and the position of the redex in the proof tree. A position p has a depth \(\textsf{dpth}(p)\) which is its length.

Definition 19

(mcut-reduction rules, transfinite sequences). \(\mathsf {\mu MALL^\infty }\) mcut-reduction sequences are directly adapted from [3, 4]. Given an ordinal \(\lambda \), a transfinite reduction sequence of length \(\lambda \), or \({\boldsymbol{{\lambda \textsf{TRS}}}}\), is a \(\lambda \)-indexed sequence \((\pi _i, r_i, p_i)_{i\in \lambda }\) such that \(\pi _i \longrightarrow _{r_i}^{p_i} \pi _{i+1}\), for any i such that \(i+1\in \lambda \), where the reduction occurs at position \(p_i\) reducing mcut-redex \(r_i\).

Definition 20

(Weak and strong convergence). A (transfinite) mcut reduction sequence \((\pi _i, r_i, p_i)_{i\in \alpha }\) is weakly converging if for any limit ordinal \(\beta \in \alpha \), \(lim (\pi _i)_{i\in \beta } = \pi _\beta \). \((\pi _i, r_i, p_i)_{i\in \alpha }\) is strongly converging if it is weakly converging and moreover for any limit ordinal \(\beta \in \alpha \), \(lim (\textsf{dpth}(p_i))_{i\in \beta } = +\infty \).

Remark 21

The cut-reduction rules preserve the property that every branch of a proof has at most one multicut inference: \(\mu \textsf{MALL}_\textsf{m}^\infty \) is closed by cut-reduction.

A \(\mu \textsf{MALL}_\textsf{m}^\infty \) pre-proof \(\pi \) may contain multiple cut-redexes: \(\pi \longrightarrow _{r_1}^{p_1} \pi _1\) and \(\pi \longrightarrow _{r_2}^{p_2} \pi _2\). As usual, a notion of residual associates to \((r_1,p_1)\), a set of redexes of \(\pi _2\), \((r_1,p_1)/(r_2,p_2)\) which is generalized to reduction sequences: \((r_1,p_1)/\sigma \).

Definition 22

(Fair reduction sequences). A reduction sequence \((\pi _i, r_i, p_i)_{i\in \omega }\) is fair if for all \(i\in \omega \) and rp such that \(\pi _i \longrightarrow _{r}^{p} \pi '\) there is some \(j \ge i\) such that \(\pi _j\) does not contain a residual of (rp) anymore.

Theorem 23

Every fair mcut-reduction sequence of \(\mathsf {\mu MALL^\infty }\) valid proofs of \(\vdash \varGamma \) (strongly) converges to a cut-free valid proof of \(\vdash \varGamma \).

2.5 Compressing Transfinite \(\mathsf {\mu MALL^\infty }\) Cut-Reduction Sequences

In the previous paragraph, we introduced not only \(\omega \)-indexed sequences, but transfinite \(\mathsf {\mu MALL^\infty }\) cut-reduction sequences as we shall need reduction beyond \(\omega \) when simulating \(\mathsf {\mu LL^\infty }\) cut-elimination in \(\mathsf {\mu MALL^\infty }\). We shall now prove that a class of transfinite \(\mathsf {\mu MALL^\infty }\) mcut-reduction sequences can be compressed to \(\omega \textsf{TRS}\). This result can be viewed as adapting to our setting the compression lemma from infinitary rewriting [31], even though we require more on the structure of the compressed sequences as it will be useful to establish \(\mathsf {\mu LL^\infty }\) cut-elimination.

Definition 24

(Depth-increasing). A \(\mathsf {\mu MALL^\infty }\) cut reduction sequence \(\sigma =(\pi _i, r_i, p_i)_{i\in \omega }\) is depth-increasing if \((\textsf{dpth}(p_i))_{i\in \omega }\) is (weakly) increasing.

Definition 25

(Reordering). An mcut reduction sequence \(\sigma =(\pi _i, r_i, p_i)_{i\in \alpha }\) is a reordering of \(\sigma '=(\pi '_i, r'_i, p'_i)_{i\in \beta }\) if there is a bijection o between \(\alpha \) and \(\beta \) such that for any \(i\in \alpha \), \((r'_{o(i)},p'_{o(i)}) = (r_i,p_i)\).

Proposition 26

(Compression lemma). Let \(\sigma =(\pi _i, r_i, p_i)_{i\in \alpha }\) be a strongly converging \(\mathsf {\mu MALL^\infty }\) transfinite cut-reduction sequence. There exists a \(\mathsf {\mu MALL^\infty }\) cut-reduction sequence \(\textsf{Comp}(\sigma )= (\pi '_i, r'_i, p'_i)_{i\in \beta }\) which is a reordering of \(\sigma \), depth-increasing, strongly converging with the same limit as \(\sigma \) and such that \(\beta = \alpha \) if \(\alpha \) is finite and \(\beta = \omega \) otherwise.

3 Cut-Elimination Theorem for \(\mathsf {\mu LL^\infty }\)

The aim of this section is to prove the following theorem:

Theorem 27

For any valid \(\mathsf {\mu LL^\infty }\) proof \(\pi \), fair \(\mathsf {\mu LL^\infty }\) mcut-sequences from \(\pi \) converge to cut-free \(\mathsf {\mu LL^\infty }\) proofs.

The idea of the proof and outline of the present section are as follows:

  1. 1.

    We shall first define the cut-reduction rules for \(\mathsf {\mu LL^\infty }\) by extending \(\mathsf {\mu MALL^\infty }\) multicut-reduction with rules for reducing exponential cuts.

  2. 2.

    We then encode exponentials with fixed-points and translate \(\mathsf {\mu LL^\infty }\) sequents (resp. pre-proofs) into \(\mathsf {\mu MALL^\infty }\), preserving validity both ways.

  3. 3.

    We will then simulate \(\mathsf {\mu LL^\infty }\) reductions in \(\mathsf {\mu MALL^\infty }\): a single \(\mathsf {\mu LL^\infty }\) step may require an infinite, or even transfinite, \(\mathsf {\mu MALL^\infty }\) mcut-reduction sequence.

  4. 4.

    Finally, we will study the simulation of fair \(\mathsf {\mu LL^\infty }\) cut-reduction sequences. Even though the simulation of \(\mathsf {\mu LL^\infty }\) sequences builds transfinite sequences, we shall see that one can associate a(n almost) fair \(\mathsf {\mu MALL^\infty }\) mcut-reduction sequence to any fair \(\mathsf {\mu LL^\infty }\) mcut-reduction sequence, and conclude.

    The next four subsections will closely follow the above pathway.

3.1 Cut-Elimination Rules for \(\mathsf {\mu LL^\infty }\)

\(\mathsf {\mu LL^\infty }\) mcut-reduction is defined by extending \(\mathsf {\mu MALL^\infty }\) multicut-reduction with the steps given in Fig. 6. The reduction rules for the exponentials assume a condition on the premisses of the multi-cut rule: all the proofs (hereditarily) cut-connected to some distinguished formula must have promotions as last inferences.

Fig. 6.
figure 6

\(\mathsf {\mu LL^\infty }\) mcut-reduction rules

Definition 28

(\({ (\mathsf {!p})} \) -ready contexts). A subset of the subproofs of a multicut is said to be \({ (\mathsf {!p})} \)-ready if all its elements are concluded with an \({ (\mathsf {!p})} \) rule. \(\mathcal C^{\mathop {!}}\) will denote a \({ (\mathsf {!p})} \)-ready context and \(\mathcal C^{\mathop {!}}_\varGamma \) a context restriction which is \({ (\mathsf {!p})} \)-ready.

Remark 29

The condition for triggering the exponential key reductions \({ (\mathsf {?w})} /{ (\mathsf {!p})} \) and \({ (\mathsf {?c})} /{ (\mathsf {!p})} \) as well as the \({ (\mathsf {!p})} \)-commutation rule is expressed in terms of \({ (\mathsf {!p})} \)-readiness: for every ?-formula ?G in the context of a promotion which shall either commute or cut-reduce with a ?-rule, we require that \(\mathcal {C}_{?G}\) is \({ (\mathsf {!p})} \)-ready.

3.2 Embedding \(\mathsf {\mu LL^\infty }\) in \(\mathsf {\mu MALL^\infty }\)

To extend the cut-elimination result from \(\mathsf {\mu MALL^\infty }\) to \(\mathsf {\mu LL^\infty }\), we encode the exponential connectives using fixed points as follows, following Baelde [2]:

Definition 30

This straightforwardly induces an embedding of \(\mathsf {\mu LL^\infty }\) into \(\mathsf {\mu MALL^\infty }\):

Definition 31

(Embedding of \(\mathsf {\mu LL^\infty }\) sequents into \(\mathsf {\mu MALL^\infty }\) ). 

figure v

Definition 32

( \(\mathsf {\mu MALL^\infty }\) derivability of the exponentials). \(\mathsf {\mu LL^\infty }\) exponential rules can be encoded in \(\mathsf {\mu MALL^\infty }\) as shown in Fig. 7. We denote the derivable rules by \(?\textsf{d}^\bullet , ?\textsf{c}^\bullet \), \(?\textsf{w}^\bullet \) and \(!\textsf{p}^\bullet \) respectively. (\(!\textsf{p}^\bullet \) uses a circular proof.)

Proposition 33

(Preservation of validity).\(\pi \) is a valid \(\mathsf {\mu LL^\infty }\) proof of \(\vdash \varGamma \) iff \(\pi ^\bullet \) is a valid \(\mathsf {\mu MALL^\infty }\) proof of \(\vdash \varGamma ^\bullet \).

Proof

(Proof sketch). We simply relate the infinite branches in both pre-proofs. Assuming that \(\pi \) is valid, consider the special case of an infinite branch \(\beta \) of \({\pi }^\bullet \) that, when entering the encoding of a promotion, follows the left-most premise of the rule. To such an infinite branch it is easy to associate an infinite branch b of \(\pi \). b is valid and supported by a thread t with least formula \(\nu X. F\). \((\nu X. F)^\bullet \) is the least recurring formula in the thread \(\theta \) associated with t in \(\beta \): \(\beta \) is valid.

3.3 Simulation of \(\mathsf {\mu LL^\infty }\) Cut-Elimination Steps

Now we have to show that \(\mathsf {\mu LL^\infty }\) cut-elimination steps can be simulated by the previous encoding. E.g., the commutation rule for dereliction is simulated by a \((\mu )/{ (\textsf{Cut})} \) commutation followed by a \({ (\mathsf {\oplus })} /{ (\textsf{Cut})} \) commutation as follows:

figure x
Fig. 7.
figure 7

\(\mathsf {\mu MALL^\infty }\) encoding of the exponential inferences

The challenge is to show that the simulation of reductions also holds (i) for the reductions involving (!p) as well as (ii) for reductions occurring above a promotion rule (aka. in a box) since the encoding of [!p] uses an infinite, circular derivation. In the promotion commutation case for instance, we have:

figure y

Proposition 34

Each \(\mathsf {\mu LL^\infty }\) mcut-reduction r can be simulated in \(\mathsf {\mu MALL^\infty }\) by a (possibly infinite) sequence of mcut-reductions, denoted \(r^\bullet \).

Remark 35

Conversely, one can wonder whether a possible reduction in \({\pi }^\bullet \) necessarily comes from the simulation of a reduction step in \(\pi \). It is almost the case except when the reduction in \({\pi }^\bullet \) comes from exponential cuts requiring a \({ (\mathsf {!p})} \)-ready context (ie. \({ (\mathsf {!p})} \) commutation as well as \({ (\mathsf {?w})} /{ (\mathsf {!p})} \) and \({ (\mathsf {?c})} /{ (\mathsf {!p})} \) key cases, see above): in those cases indeed, if the context is “partially ready” – meaning that some, but not all, the required premises are promoted – a prefix of the sequence simulating the reduction step can indeed be performed, before being stuck. As consequence – and we shall exploit it in the next section when proving \(\mathsf {\mu LL^\infty }\) cut-elimination – the simulation of a fair reduction sequence is not necessarily fair, but only as long as the above cases are involved:

Proposition 36

There exists a fair reduction \(\rho \) from some \(\mathsf {\mu LL^\infty }\) (pre-)proof \(\pi \) such that \({\rho }^\bullet \) is an \(\omega \)-indexed unfair \(\mathsf {\mu MALL^\infty }\) cut-reduction sequence.

3.4 Proof of \(\mathsf {\mu LL^\infty }\) Cut-Elimination Theorem

\(\mathsf {\mu LL^\infty }\) cut-elimination theorem follows from the following two lemmas:

Lemma 37

Let \(\pi \) be a \(\mathsf {\mu LL^\infty }\)-proof of \(\vdash \varGamma \) and \(\sigma = (\pi _i, r_i, p_i)_{i\in \omega }\) a fair \(\mathsf {\mu LL^\infty }\) cut-reduction sequence from \(\pi \). \(\sigma \) converges to a cut-free \(\mathsf {\mu LL^\infty }\)-pre-proof of \(\vdash \varGamma \).

Lemma 38

Let \(\pi \) be a \(\mathsf {\mu LL^\infty }\) pre-proof of \(\vdash \varGamma \) and let us consider a cut-reduction sequence \(\sigma = (\pi _i,r_i,p_i)_{i\in \omega }\) in \(\mathsf {\mu LL^\infty }\) from \(\pi \) that converges to a cut-free \(\mathsf {\mu LL^\infty }\) pre-proof \(\pi '\). \(\sigma ^\bullet \) is a strongly converging (possibly transfinite) sequence.

Proof

(Sketch for Thm. 27). Let \(\pi \) be a \(\mathsf {\mu LL^\infty }\)-proof of \(\vdash \varGamma \) and \(\sigma = (\pi _i,r_i,p_i)_{i\in \omega }\) be a fair \(\mathsf {\mu LL^\infty }\) mcut-reduction sequence from \(\pi \). Consider the associated (transfinite) \(\mathsf {\mu MALL^\infty }\) mcut-reduction sequence \(\sigma ^\bullet \) from \(\pi ^\bullet \) obtained by simulation. By Lemma 37, \(\sigma \) converges (strongly) to a cut-free \(\mathsf {\mu LL^\infty }\) pre-proof \(\pi '\).

Let us prove that \(\pi '\) is valid. By Lemma 38, \({\sigma }^\bullet \) is a transfinite mcut-reduction sequence from \({\pi }^\bullet \) strongly converging to \({\pi '}^\bullet \). By Prop. 26, \({\sigma }^\bullet \) can be compressed into \(\rho = (\pi '_i,r'_i,p'_i)_{i\in \omega }\) an \(\omega \)-indexed depth-increasing \(\mathsf {\mu MALL^\infty }\) mcut-reduction sequence which converges to \({\pi '}^\bullet \) and contains the same reductions as \({\sigma }^\bullet \). By Proposition 36, \(\rho \) may not be fair: this prevents us from concluding directly by Proposition 33 but we can still conclude. Let us consider \(\rho _f\) a fair reduction sequence obtained from \(\rho \) by reducing those redexes which cause the lack of fairness of \(\rho \) and let us consider the limit of \(\rho _f\), \(\pi _f\). To any infinite branch \(\beta \) of \({\pi '}^\bullet \), one can associate a branch \(\beta _f\) of \(\pi _f\): it coincides with \(\beta \) except when the next inference of \(\beta _f\) is on a \({(\mathop {!}F)}^\bullet \) (in a sequent, say, \(\vdash {(\mathop {!}F)}^\bullet , {\mathop {?}}^\bullet {\varDelta }^\bullet \) which is not principal along \(\beta \)). In that case, we expand \(\beta _f\) by following the unique premise of the \({ (\mathsf {\nu })} \) rule, the second premise of the first rule and the first premise of the second rule, reaching \(\vdash 1, {\mathop {?}}^\bullet {\varDelta }^\bullet \), in which case we know that the 1 is not principal (and never will be) and we follow back \(\beta \). \(\beta _f\) has exactly the same threads as \(\beta \): finite threads may only be extended finitely on occurrences of \({(\mathop {!}F)}^\bullet \). Since \(\rho _f\) is fair, \(\beta _f\) is valid and so is \(\beta \).

We can then conclude that \({\pi '}^\bullet \) is cut-free and valid and, using preservation of validity (Proposition 33), that \(\pi '\) is a valid cut-free \(\mathsf {\mu LL^\infty }\)-proof.   \(\square \)

Infinitary cut-elimination for \(\mathsf {\mu LL^\infty }\) two-sided sequent calculus is an easy corollary of Theorem 27. Indeed, fair cut-reduction sequences in two-sided \(\mathsf {\mu LL^\infty }\) are mapped to fair reduction sequences in one-sided \(\mathsf {\mu LL^\infty }\) from which follows:

Corollary 39

Fair 2-sided \(\mathsf {\mu LL^\infty }\) valid mcut-reduction sequences eliminate cuts.

4 Cut-Elimination Theorem for \(\mathsf {\mu LK^\infty } \) and \(\mathsf {\mu LJ^\infty } \)

Cut-elimination theorems for both \(\mathsf {\mu LK^\infty } \) and \(\mathsf {\mu LJ^\infty } \) can be established as corollaries of Theorem 27. For lack of space, we directly go to our results and postpone to future work a detailed study of the generalizations to non-wellfounded sequent calculi of the linear embeddings of \(\textsf{LK}\) and \(\textsf{LJ}\) into \(\textsf{LL}\) developed since Girard seminal paper. We shall comment on those translations in the conclusion.

4.1 \(\mathsf {\mu LK^\infty }\) Cut-Elimination: Skeletons and Decorations

To any \(\mathsf {\mu LL^\infty }\) formulas and \(\mathsf {\mu LL^\infty }\) proofs, one can associate their skeletons, that is corresponding \(\mathsf {\mu LK^\infty }\) formulas and proofs, after erasing of the linear information:

Definition 40

(Skeleton).\(\textsf{Sk}(A)\) is defined by induction on \(A\in \mathsf {\mu LL^\infty } \):

figure ab

with \(\sigma \in \{\mu ,\nu \}\).

Given a 2-sided \(\mathsf {\mu LL^\infty }\) pre-proof \(\pi \) of \(\varGamma \vdash \varDelta \) with last rule r and premises \((\pi _i)_{1\le i\le n}\), \(\textsf{Sk}(\pi )\) is the \(\mathsf {\mu LK^\infty }\) pre-proof of \(\textsf{Sk}(\varGamma )\vdash \textsf{Sk}(\varDelta )\) defined corecursively, by case on r: (i) if \(r\in \{{ (\mathsf {!p})} ,{ (\mathsf {?d})} \}\), \(\textsf{Sk}(\pi )= \textsf{Sk}(\pi _1)\); (ii) otherwise, apply the \(\mathsf {\mu LK^\infty }\) rule corresponding to r with premises \((\textsf{Sk}(\pi _i))_{1\le i\le n}\).

Proposition 41

\(\textsf{Sk}(\cdot )\) transports valid \(\mathsf {\mu LL^\infty }\)-proofs to valid \(\mathsf {\mu LK^\infty }\) proofs.

\(\mathsf {\mu LK^\infty }\) cut-elimination follows from the existence of \(\mathsf {\mu LK^\infty }\) linear decorations.

Proposition 42

For any \(\mathsf {\mu LK^\infty }\) sequent s and any \(\mathsf {\mu LK^\infty }\) proof \(\pi \) of s, there is a linear decoration of \(\pi \), that is a \(\mathsf {\mu LL^\infty }\) proof \(\pi ^d\) such that \(\textsf{Sk}(\pi ^d) = \pi \).

Definition 43

( \(\mathsf {\mu LK^\infty }\) cut-reduction). \(\mathsf {\mu LK^\infty }\) mcut-reduction relation is defined as follows:       \( \longrightarrow _\mathsf {\mu LK^\infty } = \{(\textsf{Sk}(\pi ),\textsf{Sk}(\pi ')) \mid \pi \longrightarrow _{mcut} \pi ' ~ \& ~ \pi \ne \pi '\}\).

Theorem 44

\(\mathsf {\mu LK^\infty }\) enjoys cut-elimination.

4.2 \(\mathsf {\mu LJ^\infty }\) Cut-Elimination

The linear decoration for \(\mathsf {\mu LJ^\infty }\) is simply Girard’s call-by-value translation [21] extended to fixed-points on formulas and proofs as follows:

\(\begin{array}{lll} [X]^j = \mathop {!}X;&\qquad \qquad [\mu X. F]^j = \mathop {!}\mu X. [F]^j;&\qquad \qquad [\nu X. F]^j = \mathop {!}\nu X. [F]^j. \end{array}\)

figure ac

The translation is consistent with \(\mathsf {\mu LJ^\infty }\)- and \(\mathsf {\mu LL^\infty }\)-positivity conditions.

Definition 45

( \(\mathsf {\mu ILL^\infty }\) ). \(\mathsf {\mu ILL}\) formulas are defined inductively as:

A \(\mathsf {\mu ILL}\) sequent is a sequent of \(\mathsf {\mu ILL}\) formulas with exactly one formula in the succedent. A \(\mathsf {\mu ILL^\infty }\) proof is a \(\mathsf {\mu LL^\infty }\) proof containing only \(\mathsf {\mu ILL}\) sequents.

The translation preserves validity, following from \([X]^j = \mathop {!}X\), by induction.

Lemma 46

The following hold:

  • For any \(\mathsf {\mu LJ}\) formulas AB, \(\sigma \in \{\mu ,\nu \}\), \([A[\sigma X. B/X]]^j = [A]^j [\sigma X. [B]^j / X].\)

  • For any \(\mathsf {\mu LJ}\) formula A, \([A]^j\) is a \(\mathsf {\mu ILL}\) formula.

  • If \(\pi \) is a \(\mathsf {\mu LJ^\infty }\) proof of \(\varGamma \vdash F\), then \([\pi ]^j\) is a \(\mathsf {\mu ILL^\infty }\) proof of \([\varGamma ]^j\vdash [F]^j\).

On \(\mathsf {\mu ILL^\infty }\) proofs, the skeletons of the previous section can be reused: \(\textsf{Sk}(\cdot )\) transports valid \(\mathsf {\mu ILL^\infty }\) proof to valid \(\mathsf {\mu LJ^\infty }\) proofs. Moreover \(\mathsf {\mu ILL^\infty }\) proofs are closed by \(\mathsf {\mu LL^\infty }\) cut-reductions from which we deduce, as for \(\mathsf {\mu LK^\infty }\), that:

Theorem 47

\(\mathsf {\mu LJ^\infty }\) enjoys cut-elimination.

5 Conclusion

In the present paper, we established several cut-elimination results for non-wellfounded proof systems for logics with least and greatest fixed-points expanding on previous works [4, 20]: (i) for \(\mathsf {\mu MALL^\infty }\) with sequents as lists in contrast sequents as sets of locative occurrences [4], (ii) for the 1-sided and 2-sided sequent calculi of \(\mathsf {\mu LL^\infty }\), (iii) for \(\mathsf {\mu LK^\infty }\) and (iv) for \(\mathsf {\mu LJ^\infty }\). We also established additional results from a compression lemma for \(\mathsf {\mu MALL^\infty }\) strongly converging cut-reduction sequences to linear embeddings of \(\mathsf {\mu LK^\infty }\) and \(\mathsf {\mu LJ^\infty }\) into \(\mathsf {\mu LL^\infty }\).

On the Meaning and Expressiveness of Tree-Exponential Modalities. The proof of our main result proceeds by encoding \(\textsf{LL}\) exponentials in \(\mathsf {\mu MALL^\infty }\) following an encoding first considered by Baelde and Miller, and studying \(\mathsf {\mu LL^\infty }\) cut-reduction sequences through their simulation in \(\mathsf {\mu MALL^\infty }\), which was first conjectured in Doumane’s thesis [18]. We think that the present paper does not only demonstrate the usefulness of the encoding but that it also suggests new questions. Indeed, this encoding has interesting features:

  • this “rigid” tree-like exponential does not exhibit the Seely isomorphism but, even though those isomorphisms are common in axiomatizations of categorical models of linear logic, it is not necessary to have them as isomorphisms to build a denotational model of linear logic (that is, which quotients proofs up to cut-equivalence): the present work is actually an example of this fact. (They are crucial, though, to encode the \(\lambda \)-calculus in linear logic, as additional equations are needed, which are realized by Seely isos.)

  • These exponentials allow for a realization of a somehow non-uniform promotion: indeed, while a proof of \(\vdash {\mathop {!}}^\bullet F, {\mathop {?}}^\bullet \varGamma \) has to provide a proof of \(\vdash F, {\mathop {?}}^\bullet \varGamma \), the circular definition of the promotion is not the only possible definition: one can consider as well promotions that would provide a distinct value each time a box is opened (e.g. a proof of \(\vdash {\mathop {!}}^\bullet \mu X. 1\oplus X\) may provide distinct integers depending on how structural rules managed the resource). See [30] for a detailed discussion.

This tree-like exponential is being investigated with Ehrhard and Jafarrahmani.

Benefiting from Advances in Infinitary Rewriting. Our cut-elimination proof by encoding \(\mathsf {\mu LL^\infty }\) into \(\mathsf {\mu MALL^\infty }\) relies on a simulation of reductions sequences which makes use of transfinite reductions sequences and compression results. Those techniques are inspired and adapted from the literature on infinitary rewriting. We plan to make clearer the connection between non-wellfounded proof theory and infinitary rewriting in the future, even though in the present state it was not possible to readily apply results from infinitary rewriting such as the compression lemma which we has to reprove in our setting [31]. Moreover, we did not make use of coinductive formulations of infinitary rewriting [19]. That is another direction for future work: currently, we do not know how to use those formulations of infinitary rewriting because the sequences we consider by simulation are not given as (strongly) converging sequences. We plan to reconsider this and benefit from the coinductive approach to infinite reduction sequences.

On Linear Translations for Fixed-Point Logics and Non-Wellfounded Proofs. We obtained a cut-elimination theorem for \(\mathsf {\mu LK^\infty }\) and \(\mathsf {\mu LJ^\infty }\) thanks to linear translations which deserve some comments. While the linear translation used for \(\mathsf {\mu LJ^\infty }\) is standard (it is a call-by-value translation dating back to Girard’s seminal paper), the treatment of classical logic was more complex. Indeed, usual linear translation for classical logic introduce, at places, cuts. Due to the sensitivity of the straight-thread validity condition with respect to the presence of cuts in cycles, we could not use those translations. However, we plan to investigate whether a more standard translation can be used in the specific case of bouncing validity [3].

A Treatment of Cut-Elimination Which Is Agnostic to Validity Conditions. Last but not least, a major advantage of our approach is that \(\mathsf {\mu MALL^\infty }\) cut-elimination proof and, to some extent, the validity conditions, are regarded as black boxes, simplifying the presentation of the proof and making it reusable wrt. other validity condition or \(\mathsf {\mu MALL^\infty }\) proof techniques. The proof seems to be reusable easily with bouncing validity for instance (even though setting up an adequate definition of bouncing validity for \(\mathsf {\mu LL^\infty }\) is quite tricky). A fragment which seems promising and that we wish to investigate in the near future, is \(\mathsf {\mu MELL^\infty }\) equipped with bouncing validity [3].