Probabilistic Applicative Bisimulation and Call-by-Value Lam

Size: px
Start display at page:

Download "Probabilistic Applicative Bisimulation and Call-by-Value Lam"

Transcription

1 Probabilistic Applicative and Call-by-Value Lambda Calculi Joint work with Ugo Dal Lago ENS Lyon February 9, 2014 Probabilistic Applicative and Call-by-Value Lam

2 Introduction Fundamental question: when can two programs be considered equivalent? Probabilistic Applicative and Call-by-Value Lam

3 Introduction Fundamental question: when can two programs be considered equivalent? Context equivalence [Morris1968] : Two terms M and N are context equivalent if their observable behavior is the same in any context. Probabilistic Applicative and Call-by-Value Lam

4 Introduction Fundamental question: when can two programs be considered equivalent? Context equivalence [Morris1968] : Two terms M and N are context equivalent if their observable behavior is the same in any context. Proving that two programs are not equivalent is relatively easy: just find a context that separates them. Proving that two program are indeed equivalent, on the other hand, can be quite complicated. Other equivalence notion : Bisimilarity Probabilistic Applicative and Call-by-Value Lam

5 Our result For a probabilistic λ-calculus (Λ ) : Context Equivalence = Bisimilarity Probabilistic Applicative and Call-by-Value Lam

6 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam

7 Syntax and Operational Semantics Motivating Example : Perfect Security 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam

8 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Probabilistic Applicative and Call-by-Value Lam

9 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Values: V ::= λx.m; Probabilistic Applicative and Call-by-Value Lam

10 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Values: V ::= λx.m; Approximation (Big-Step) Semantics: M D, where D : Values [0, 1] sub-probability distribution. Approximation from below : only finite distributions M V {V 1 } M D N E M N 1 2 D E M K N F {P[V /x] E P,V } λx.p S(K ), V S(F) ( ) MN F (V ) λx.p S(K ) K (λx.p)e P,V V S(F) Probabilistic Applicative and Call-by-Value Lam

11 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Values: V ::= λx.m; Approximation (Big-Step) Semantics: M D, where D : Values [0, 1] sub-probability distribution. Approximation from below : only finite distributions M V {V 1 } M D N E M N 1 2 D E M K N F {P[V /x] E P,V } λx.p S(K ), V S(F) ( ) MN F (V ) λx.p S(K ) K (λx.p)e P,V V S(F) Semantics: M = sup M D D; Probabilistic Applicative and Call-by-Value Lam

12 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Values: V ::= λx.m; Approximation (Big-Step) Semantics: M D, where D : Values [0, 1] sub-probability distribution. Approximation from below : only finite distributions M V {V 1 } M D N E M N 1 2 D E M K N F {P[V /x] E P,V } λx.p S(K ), V S(F) ( ) MN F (V ) λx.p S(K ) K (λx.p)e P,V V S(F) Semantics: M = sup M D D; Variations: Small-Step Semantics, Call-by-name Evaluation. Probabilistic Applicative and Call-by-Value Lam

13 Syntax and Operational Semantics Motivating Example : Perfect Security Why Probabilistic Computation? Probabilistic Applicative and Call-by-Value Lam

14 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Probabilistic Applicative and Call-by-Value Lam

15 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. Probabilistic Applicative and Call-by-Value Lam

16 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; Probabilistic Applicative and Call-by-Value Lam

17 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; b {0, 1}; k GEN; Probabilistic Applicative and Call-by-Value Lam

18 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; b {0, 1}; k GEN; c ENC(m b, k); Probabilistic Applicative and Call-by-Value Lam

19 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; b {0, 1}; k GEN; c ENC(m b, k); b A 2 (c); Probabilistic Applicative and Call-by-Value Lam

20 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; b {0, 1}; k GEN; c ENC(m b, k); b A 2 (c); return b = b. Probabilistic Applicative and Call-by-Value Lam

21 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security For every adversary A, Pr(PrivK Π A = true) = 1 2 Probabilistic Applicative and Call-by-Value Lam

22 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security One-Time-Pad GEN = true false : bool; ENC = λx.λy.if x then (NOT y) else y : bool bool bool; DEC = ENC. Probabilistic Applicative and Call-by-Value Lam

23 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security One-Time-Pad GEN = true false : bool; ENC = λx.λy.if x then (NOT y) else y : bool bool bool; DEC = ENC. The Experiment as a Pair of Terms EXP FST = λx.λy.enc x GEN : bool bool bool; EXP SND = λx.λy.enc y GEN : bool bool bool. Probabilistic Applicative and Call-by-Value Lam

24 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security One-Time-Pad GEN = true false : bool; ENC = λx.λy.if x then (NOT y) else y : bool bool bool; DEC = ENC. The Experiment as a Pair of Terms EXP FST = λx.λy.enc x GEN : bool bool bool; EXP SND = λx.λy.enc y GEN : bool bool bool. A.Pr(PrivK OTP A = true) = 1 2 EXP FST EXP SND Probabilistic Applicative and Call-by-Value Lam

25 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam

26 Bisimilarity (deterministic case) Probabilistic in the abstact A Labelled Markov Chain for Λ Example Let (S, Act, ) be a LTS (Labelled Transition System). A Simulation is a relation R on S such that : If p R q, and p a s, there exists t such that q a t and s R t. p R q a s Bisimilarity : p and q are bisimilar if : p R q, and R is a bisimulation. Probabilistic Applicative and Call-by-Value Lam

27 Bisimilarity (deterministic case) Probabilistic in the abstact A Labelled Markov Chain for Λ Example Let (S, Act, ) be a LTS (Labelled Transition System). A Simulation is a relation R on S such that : If p R q, and p a s, there exists t such that q a t and s R t. p R q a s R a t Bisimilarity : p and q are bisimilar if : p R q, and R is a bisimulation. Probabilistic Applicative and Call-by-Value Lam

28 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Probabilistic Applicative and Call-by-Value Lam

29 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Values Probabilistic Applicative and Call-by-Value Lam

30 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Values M N L. Probabilistic Applicative and Call-by-Value Lam

31 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Values M V N W L Z.. Probabilistic Applicative and Call-by-Value Lam

32 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Values M Probabilistic Applicative and Call-by-Value Lam

33 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms M eval Values V Probabilistic Applicative and Call-by-Value Lam

34 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms M eval Values V λx.n Probabilistic Applicative and Call-by-Value Lam

35 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms M N{L/x} eval L Values V λx.n Probabilistic Applicative and Call-by-Value Lam

36 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Simulation eval λx.l R M N L{R/x} P{R/x} eval λx.p R Probabilistic Applicative and Call-by-Value Lam

37 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Simulation eval λx.l R M R N L{R/x} P{R/x} eval λx.p R Probabilistic Applicative and Call-by-Value Lam

38 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Simulation eval λx.l R M R N L{R/x} R P{R/x} eval λx.p R Probabilistic Applicative and Call-by-Value Lam

39 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Simulation eval λx.l R M R N L{R/x} R P{R/x} eval λx.p R Similarity: union of all simulations, denoted ; Bisimilarity: union of all bisimulations, denoted. Theorem M N iff M N. Probabilistic Applicative and Call-by-Value Lam

40 Probabilistic in the Abstract [LS1992] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Labelled Markov Chain (LMC): a triple M = (S, L, P), where S is a countable set of states; L is a set of labels; P is a transition probability matrix, i.e., a function P : S L S R such that for every state s and for every label l, P(S, l, t) = t S P(s, l, t) 1; Probabilistic Applicative and Call-by-Value Lam

41 Bisimilarity (probabilistic case) Probabilistic in the abstact A Labelled Markov Chain for Λ Example Let (S, L, P) be a LMC (Labelled Markov Chain). p q a a s 1 s 2 s 3 s 4 s 5 E 1 E 2 : R such that R equivalence relation on S. (p, q) R for every equivalence class E, a L, P(q, a, s) P(p, a, s) = s E s E. Probabilistic Applicative and Call-by-Value Lam

42 Probabilistic in the abstact A Labelled Markov Chain for Λ Example A Labelled Markov Chain for Λ Terms Values M Probabilistic Applicative and Call-by-Value Lam

43 Probabilistic in the abstact A Labelled Markov Chain for Λ Example A Labelled Markov Chain for Λ Terms Values M eval, M (V ) eval, M (W ) V eval, M (Z) W Z. Probabilistic Applicative and Call-by-Value Lam

44 Probabilistic in the abstact A Labelled Markov Chain for Λ Example A Labelled Markov Chain for Λ Terms Values λx.n Probabilistic Applicative and Call-by-Value Lam

45 Probabilistic in the abstact A Labelled Markov Chain for Λ Example A Labelled Markov Chain for Λ Terms Values N{W /x} W, 1 λx.n Probabilistic Applicative and Call-by-Value Lam

46 Back to Our Example Probabilistic in the abstact A Labelled Markov Chain for Λ Example EXP FST = λx.λy.enc x GEN : bool bool bool; EXP SND = λx.λy.enc y GEN : bool bool bool. Probabilistic Applicative and Call-by-Value Lam

47 Back to Our Example Probabilistic in the abstact A Labelled Markov Chain for Λ Example EXP FST EXP SND true false true false λy.enc true GEN λy.enc false GEN λy.enc y GEN eval eval eval λy.enc true GEN λy.enc false GEN λy.enc y GEN false true ENC true GEN eval false true false ENC false GEN true eval 1 2 true false Probabilistic Applicative and Call-by-Value Lam

48 Back to Our Example Probabilistic in the abstact A Labelled Markov Chain for Λ Example R σ = X σ ID σ ; X bool = {(ENC true GEN), (ENC false GEN)}; X bool bool = {(λy.enc y GEN), (λy.enc true GEN), (λy.enc false GEN)}; X bool bool bool = {EXP FST, EXP SND }; Probabilistic Applicative and Call-by-Value Lam

49 Full Abstraction 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam

50 Full Abstraction Contexts: C ::= [ ] λx.c CM MC M C C M. Context Equivalence: M N iff for every context C it holds that C[M] = C[N]. Theorem is included in. Lemma is a congruence. M N = C[M] C[N] Howe s technique. Probabilistic Applicative and Call-by-Value Lam

51 Full Abstraction? Full Abstraction is a sound methodology for program equivalence. Is it also complete? CBN : No [DLSA2014] Counterexample: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). Probabilistic Applicative and Call-by-Value Lam

52 Full Abstraction? Full Abstraction is a sound methodology for program equivalence. Is it also complete? CBN : No [DLSA2014] Counterexample: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). Of course, I Ω and as a consequence λy.ω λy.i λy.(ω I ) = M N. Probabilistic Applicative and Call-by-Value Lam

53 Full Abstraction? Full Abstraction is a sound methodology for program equivalence. Is it also complete? CBN : No [DLSA2014] Counterexample: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). Of course, I Ω and as a consequence λy.ω λy.i λy.(ω I ) = M N. On the other hand, M N. We need a CIU-Theorem for that. Probabilistic Applicative and Call-by-Value Lam

54 Full Abstraction? Full Abstraction is a sound methodology for program equivalence. Is it also complete? CBN : No [DLSA2014] Counterexample: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). Of course, I Ω and as a consequence λy.ω λy.i λy.(ω I ) = M N. On the other hand, M N. We need a CIU-Theorem for that. CBV The counterexample above cannot be easily adapted. Contexts seem to be more powerful. Probabilistic Applicative and Call-by-Value Lam

55 Full Abstraction in CBV Full Abstraction Tests: t ::= ω a t t, t. Semantics of Tests P M (x, ω) = 1; P M (x, a t) = s S P(x, a, s) P M (s, t) P M (x, t, s ) = P M (x, t) P M (x, s). Theorem (vbmmw2004) x y iff for every test t it holds that P M (x, t) = P M (y, t). Probabilistic Applicative and Call-by-Value Lam

56 Full Abstraction in CBV Full Abstraction Tests: t ::= ω a t t, t. Semantics of Tests P M (x, ω) = 1; P M (x, a t) = s S P(x, a, s) P M (s, t) P M (x, t, s ) = P M (x, t) P M (x, s). Theorem (vbmmw2004) x y iff for every test t it holds that P M (x, t) = P M (y, t). But the question now is: are contexts powerful enough to implement every possible test? Probabilistic Applicative and Call-by-Value Lam

57 Full Abstraction in CBV Full Abstraction Contexts do not have the necessary discriminating power in CBN. Conjecture: only tests in the form t 1,..., t n where each t i is a trace can be captured. In CBV evaluation, terms can be copied after being evaluated! Probabilistic Applicative and Call-by-Value Lam

58 Full Abstraction in CBV Full Abstraction Contexts do not have the necessary discriminating power in CBN. Conjecture: only tests in the form t 1,..., t n where each t i is a trace can be captured. In CBV evaluation, terms can be copied after being evaluated! Lemma. For every test t there is a context C t which is equivalent to t in CBV. Probabilistic Applicative and Call-by-Value Lam

59 Full Abstraction in CBV Full Abstraction Contexts do not have the necessary discriminating power in CBN. Conjecture: only tests in the form t 1,..., t n where each t i is a trace can be captured. In CBV evaluation, terms can be copied after being evaluated! Lemma. For every test t there is a context C t which is equivalent to t in CBV. Theorem. In CBV, and coincide. Probabilistic Applicative and Call-by-Value Lam

60 How About Simulation (in CBV)? Full Abstraction Similarity can itself be characterized by a notion of testing, but for a stronger notion of test. General boolean tests are allowed, including disjunctive tests. Probabilistic Applicative and Call-by-Value Lam

61 How About Simulation (in CBV)? Full Abstraction Similarity can itself be characterized by a notion of testing, but for a stronger notion of test. General boolean tests are allowed, including disjunctive tests. The grammar of test needs to be enriched: t ::= ω a t t, t t t.... Probabilistic Applicative and Call-by-Value Lam

62 How About Simulation (in CBV)? Full Abstraction Similarity can itself be characterized by a notion of testing, but for a stronger notion of test. General boolean tests are allowed, including disjunctive tests. The grammar of test needs to be enriched: t ::= ω a t t, t t t.... Let us look at the counterexample for CBN: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). The two terms are incomparable by. But how about context equivalence? Probabilistic Applicative and Call-by-Value Lam

63 How About Simulation (in CBV)? Full Abstraction Similarity can itself be characterized by a notion of testing, but for a stronger notion of test. General boolean tests are allowed, including disjunctive tests. The grammar of test needs to be enriched: t ::= ω a t t, t t t.... Let us look at the counterexample for CBN: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). The two terms are incomparable by. But how about context equivalence? Lemma. M N. Proof. Purely operational. Probabilistic Applicative and Call-by-Value Lam

64 Our Neighborhood Full Abstraction Λ, where we observe convergence CBN CBV [Abramsky1990,Howe1993] Λ with nondeterministic semantics, where we observe convergence, in its may or must flavors. CBN CBV [Ong1993,Lassen1998] Probabilistic Applicative and Call-by-Value Lam

65 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam

66 Summing up: CBN CBV Further work: What if we add sequencing to CBN? What if we add parallel or to CBN? How about approximate notions of bisimulation? How about λ-calculi for probabilistic polynomial time? Probabilistic Applicative and Call-by-Value Lam

67 Questions? Probabilistic Applicative and Call-by-Value Lam

68 Probabilistic Applicative and Call-by-Value Lam

69 Howe s Technique R R H Probabilistic Applicative and Call-by-Value Lam

70 Howe s Technique R R H Probabilistic Applicative and Call-by-Value Lam

71 Howe s Technique R H is a Congruence whenever R is an equivalence R R H Probabilistic Applicative and Call-by-Value Lam

72 Howe s Technique H is a Congruence H Probabilistic Applicative and Call-by-Value Lam

73 Howe s Technique H is a Congruence H? Probabilistic Applicative and Call-by-Value Lam

74 Howe s Technique x x R M x x R H M x {x} M R H L x λx.l R N x / x x λx.m R H N x M R H P x N R H T x (PT ) R L x MN R H L x M R H P x N R H T x (P T ) R L x M N R H L Probabilistic Applicative and Call-by-Value Lam

75 The Key Lemma Proving that H is indeed a precongruence is a convenient way to proceed. Statement: If M H N, then for every X Λ (x) it holds that M (λx.x ) N (λx.( H (X ))). Proof. We prove that D(λx.X ) N (λx.( H (X ))) for every D such that M D. By induction on the structure of any derivation of M D (which is finite). Everything goes through smoothly, except... the application case. We need to prove that probability assignments can always be disentangled. This is the case, though. Probabilistic Applicative and Call-by-Value Lam

76 So we have : H = H = = is a precongruence = is a congruence =. Theorem Probabilistic Applicative and Call-by-Value Lam

Bisimulation and coinduction in higher-order languages

Bisimulation and coinduction in higher-order languages Bisimulation and coinduction in higher-order languages Davide Sangiorgi Focus Team, University of Bologna/INRIA ICE, Florence, June 2013 Bisimulation Behavioural equality One of the most important contributions

More information

A probabilistic lambda calculus - Some preliminary investigations

A probabilistic lambda calculus - Some preliminary investigations A probabilistic lambda calculus - Some preliminary investigations Ugo Dal Lago, Margherita Zorzi Università di Bologna, Università di Verona June, 9-11, 2010, Torino Introduction: Λ P We present some results

More information

A Lambda Calculus Foundation for Universal Probabilistic Programming

A Lambda Calculus Foundation for Universal Probabilistic Programming A Lambda Calculus Foundation for Universal Probabilistic Programming Johannes Borgström (Uppsala University) Ugo Dal Lago (University of Bologna, INRIA) Andrew D. Gordon (Microsoft Research, University

More information

On Coinductive Equivalences for Higher-Order Probabilistic Functional Programs

On Coinductive Equivalences for Higher-Order Probabilistic Functional Programs On Coinductive Equivalences for Higher-Order Probabilistic Functional Programs Ugo Dal Lago, Davide Sangiorgi, Michele Alberti To cite this version: Ugo Dal Lago, Davide Sangiorgi, Michele Alberti. On

More information

On Coinduction and Quantum Lambda Calculi

On Coinduction and Quantum Lambda Calculi On Coinduction and Quantum Lambda Calculi Yuxin Deng East China Normal University (Joint work with Yuan Feng and Ugo Dal Lago) To appear at CONCUR 15 1 Outline Motivation A quantum λ-calculus Coinductive

More information

3.2 Equivalence, Evaluation and Reduction Strategies

3.2 Equivalence, Evaluation and Reduction Strategies 3.2 Equivalence, Evaluation and Reduction Strategies The λ-calculus can be seen as an equational theory. More precisely, we have rules i.e., α and reductions, for proving that two terms are intensionally

More information

Origin in Mathematical Logic

Origin in Mathematical Logic Lambda Calculus Origin in Mathematical Logic Foundation of mathematics was very much an issue in the early decades of 20th century. Cantor, Frege, Russel s Paradox, Principia Mathematica, NBG/ZF Origin

More information

Call-by-value non-determinism in a linear logic type discipline

Call-by-value non-determinism in a linear logic type discipline Call-by-value non-determinism in a linear logic type discipline Alejandro Díaz-Caro? Giulio Manzonetto Université Paris-Ouest & INRIA LIPN, Université Paris 13 Michele Pagani LIPN, Université Paris 13

More information

arxiv: v1 [cs.lo] 22 Jun 2015

arxiv: v1 [cs.lo] 22 Jun 2015 pplicative Bisimulation and Quantum λ-calculi (Long Version) Ugo Dal Lago lessandro Rioli arxiv:1506.06661v1 [cs.lo] 22 Jun 2015 February 24, 2018 bstract pplicative bisimulation is a coinductive technique

More information

Congruence of Bisimulation in a Non-Deterministic Call-By-Need Lambda Calculus

Congruence of Bisimulation in a Non-Deterministic Call-By-Need Lambda Calculus Congruence of Bisimulation in a Non-Deterministic Call-By-Need Lambda Calculus Matthias Mann Johann Wolfgang Goethe-Universität, Frankfurt, Germany Congruence of Bisimulation p. 1/21 Lambda Calculi and

More information

Lecture 13: Private Key Encryption

Lecture 13: Private Key Encryption COM S 687 Introduction to Cryptography October 05, 2006 Instructor: Rafael Pass Lecture 13: Private Key Encryption Scribe: Ashwin Machanavajjhala Till this point in the course we have learnt how to define

More information

Introduction to Cryptology. Lecture 3

Introduction to Cryptology. Lecture 3 Introduction to Cryptology Lecture 3 Announcements No Friday Office Hours. Instead will hold Office Hours on Monday, 2/6 from 3-4pm. HW1 due on Tuesday, 2/7 For problem 1, can assume key is of length at

More information

Environmental Bisimulations for Probabilistic Higher-Order Languages

Environmental Bisimulations for Probabilistic Higher-Order Languages Environmental Bisimulations for Probabilistic Higher-Order Languages Davide Sangiorgi, Valeria Vignudelli To cite this version: Davide Sangiorgi, Valeria Vignudelli. Environmental Bisimulations for Probabilistic

More information

CTR mode of operation

CTR mode of operation CSA E0 235: Cryptography 13 March, 2015 Dr Arpita Patra CTR mode of operation Divya and Sabareesh 1 Overview In this lecture, we formally prove that the counter mode of operation is secure against chosen-plaintext

More information

CS 4110 Programming Languages & Logics. Lecture 16 Programming in the λ-calculus

CS 4110 Programming Languages & Logics. Lecture 16 Programming in the λ-calculus CS 4110 Programming Languages & Logics Lecture 16 Programming in the λ-calculus 30 September 2016 Review: Church Booleans 2 We can encode TRUE, FALSE, and IF, as: TRUE λx. λy. x FALSE λx. λy. y IF λb.

More information

1. Propositional Calculus

1. Propositional Calculus 1. Propositional Calculus Some notes for Math 601, Fall 2010 based on Elliott Mendelson, Introduction to Mathematical Logic, Fifth edition, 2010, Chapman & Hall. 2. Syntax ( grammar ). 1.1, p. 1. Given:

More information

Lecture 2: Perfect Secrecy and its Limitations

Lecture 2: Perfect Secrecy and its Limitations CS 4501-6501 Topics in Cryptography 26 Jan 2018 Lecture 2: Perfect Secrecy and its Limitations Lecturer: Mohammad Mahmoody Scribe: Mohammad Mahmoody 1 Introduction Last time, we informally defined encryption

More information

Typing λ-terms. Types. Typed λ-terms. Base Types. The Typing Relation. Advanced Formal Methods. Lecture 3: Simply Typed Lambda calculus

Typing λ-terms. Types. Typed λ-terms. Base Types. The Typing Relation. Advanced Formal Methods. Lecture 3: Simply Typed Lambda calculus Course 2D1453, 200607 Advanced Formal Methods Lecture 3: Simply Typed Lambda calculus Mads Dam KTH/CSC Some material from B. Pierce: TAPL + some from G. Klein, NICTA Typing λterms The uptyped λcalculus

More information

Applicative May- and Should-Simulation in the Call-by-Value Lambda Calculus with AMB

Applicative May- and Should-Simulation in the Call-by-Value Lambda Calculus with AMB Applicative May- and Should-Simulation in the Call-by-Value Lambda Calculus with AMB Manfred Schmidt-Schauß and David Sabel Goethe University, Frankfurt, Germany {schauss,sabel}@ki.informatik.uni-frankfurt.de

More information

Computational security & Private key encryption

Computational security & Private key encryption Computational security & Private key encryption Emma Arfelt Stud. BSc. Software Development Frederik Madsen Stud. MSc. Software Development March 2017 Recap Perfect Secrecy Perfect indistinguishability

More information

CBV and CBN. Eduardo Bonelli. TP para LP 2012C1 1/55

CBV and CBN. Eduardo Bonelli. TP para LP 2012C1 1/55 CBV and CBN Eduardo Bonelli TP para LP 2012C1 1/55 Reduction Strategies Call-By-Value Call-by-Name Relating CBN and CBV λ-calculus Continuation Passing Style Bibliography 2/55 Reduction Strategies Reduction

More information

A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice

A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice Luis Pino*, Filippo Bonchi** and Frank Valencia* (Presented by: Jorge A. Pe rez) *E quipe Come te, LIX, Laboratoire

More information

Dynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007

Dynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007 Dynamic Noninterference Analysis Using Context Sensitive Static Analyses Gurvan Le Guernic July 14, 2007 1 Abstract This report proposes a dynamic noninterference analysis for sequential programs. This

More information

The Lambda-Calculus Reduction System

The Lambda-Calculus Reduction System 2 The Lambda-Calculus Reduction System 2.1 Reduction Systems In this section we present basic notions on reduction systems. For a more detailed study see [Klop, 1992, Dershowitz and Jouannaud, 1990]. Definition

More information

An introduction to process calculi: Calculus of Communicating Systems (CCS)

An introduction to process calculi: Calculus of Communicating Systems (CCS) An introduction to process calculi: Calculus of Communicating Systems (CCS) Lecture 2 of Modelli Matematici dei Processi Concorrenti Paweł Sobociński University of Southampton, UK Intro to process calculi:

More information

Computational Soundness of a Call by Name Calculus of Recursively-scoped Records. UMM Working Papers Series, Volume 2, Num. 3.

Computational Soundness of a Call by Name Calculus of Recursively-scoped Records. UMM Working Papers Series, Volume 2, Num. 3. Computational Soundness of a Call by Name Calculus of Recursively-scoped Records. UMM Working Papers Series, Volume 2, Num. 3. Elena Machkasova Contents 1 Introduction and Related Work 1 1.1 Introduction..............................

More information

Lazy Strong Normalization

Lazy Strong Normalization Lazy Strong Normalization Luca Paolini 1,2 Dipartimento di Informatica Università di Torino (ITALIA) Elaine Pimentel 1,2 Departamento de Matemática Universidade Federal de Minas Gerais (BRASIL) Dipartimento

More information

Graph lambda theories

Graph lambda theories Under consideration for publication in Math. Struct. in Comp. Science Graph lambda theories A N T O N I O B U C C I A R E L L I 1 and A N T O N I N O S A L I B R A 2 1 Equipe PPS (case 7014), Université

More information

Type Systems. Lecture 2 Oct. 27th, 2004 Sebastian Maneth.

Type Systems. Lecture 2 Oct. 27th, 2004 Sebastian Maneth. Type Systems Lecture 2 Oct. 27th, 2004 Sebastian Maneth http://lampwww.epfl.ch/teaching/typesystems/2004 Today 1. What is the Lambda Calculus? 2. Its Syntax and Semantics 3. Church Booleans and Church

More information

Review. Principles of Programming Languages. Equality. The Diamond Property. The Church-Rosser Theorem. Corollaries. CSE 230: Winter 2007

Review. Principles of Programming Languages. Equality. The Diamond Property. The Church-Rosser Theorem. Corollaries. CSE 230: Winter 2007 CSE 230: Winter 2007 Principles of Programming Languages Lecture 12: The λ-calculus Ranjit Jhala UC San Diego Review The lambda calculus is a calculus of functions: e := x λx. e e 1 e 2 Several evaluation

More information

Alonzo Church ( ) Lambda Calculus. λ-calculus : syntax. Grammar for terms : Inductive denition for λ-terms

Alonzo Church ( ) Lambda Calculus. λ-calculus : syntax. Grammar for terms : Inductive denition for λ-terms Alonzo Church (1903-1995) Lambda Calculus 2 λ-calculus : syntax Grammar for terms : t, u ::= x (variable) t u (application) λx.t (abstraction) Notation : Application is left-associative so that t 1 t 2...

More information

On the Complexity of the Reflected Logic of Proofs

On the Complexity of the Reflected Logic of Proofs On the Complexity of the Reflected Logic of Proofs Nikolai V. Krupski Department of Math. Logic and the Theory of Algorithms, Faculty of Mechanics and Mathematics, Moscow State University, Moscow 119899,

More information

1 Introduction. 2 Recap The Typed λ-calculus λ. 3 Simple Data Structures

1 Introduction. 2 Recap The Typed λ-calculus λ. 3 Simple Data Structures CS 6110 S18 Lecture 21 Products, Sums, and Other Datatypes 1 Introduction In this lecture, we add constructs to the typed λ-calculus that allow working with more complicated data structures, such as pairs,

More information

Equations, contractions, and unique solutions

Equations, contractions, and unique solutions Equations, contractions, and unique solutions Davide Sangiorgi To cite this version: Davide Sangiorgi. Equations, contractions, and unique solutions. POPL 2015 - Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT

More information

Advanced Lambda Calculus Lecture 5

Advanced Lambda Calculus Lecture 5 Advanced Lambda Calculus Lecture 5 The fathers Alonzo Church (1903-1995) as mathematics student at Princeton University (1922 or 1924) Haskell B. Curry (1900-1982) as BA in mathematics at Harvard (1920)

More information

Origin in Mathematical Logic

Origin in Mathematical Logic Lambda Calculus Origin in Mathematical Logic Foundation of mathematics was very much an issue in the early decades of 20th century. Cantor, Frege, Russel s Paradox, Principia Mathematica, NBG/ZF The Combinatory

More information

MAKING THE UNOBSERVABLE, UNOBSERVABLE.

MAKING THE UNOBSERVABLE, UNOBSERVABLE. MAKING THE UNOBSERVABLE, UNOBSERVABLE. 3 PAPERS FROM THE LAST 365 DAYS AVAILABLE TO READ NOW ON YOUR COMPUTER PAWEL SOBOCINSKI AND JULIAN RATHKE GO TO www.ecs.soton.ac.uk/~ps/publications.php Plan of the

More information

Mechanizing a Decision Procedure for Coproduct Equality in Twelf

Mechanizing a Decision Procedure for Coproduct Equality in Twelf Mechanizing a Decision Procedure for Coproduct Equality in Twelf Arbob Ahmad (applying to PhD programs this fall!) Dan Licata Robert Harper Carnegie Mellon University Dan Licata WMM 2007...1 Equality Equality

More information

Call-by-Value Non-determinism in a Linear Logic Type Discipline

Call-by-Value Non-determinism in a Linear Logic Type Discipline Call-by-Value Non-determinism in a Linear Logic Type Discipline Alejandro Díaz-Caro 1,, Giulio Manzonetto 1,2, and Michele Pagani 1,2 1 Université Paris 13, Sorbonne Paris Cité, LIPN, F-93430, Villetaneuse,

More information

A fully abstract semantics for a nondeterministic functional language with monadic types

A fully abstract semantics for a nondeterministic functional language with monadic types A fully abstract semantics for a nondeterministic functional language with monadic types Alan Jeffrey 1 School of Cognitive and Computing Sciences University of Sussex, Brighton BN1 9QH, UK alanje@cogs.susx.ac.uk

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously on COS 433 Takeaway: Crypto is Hard Designing crypto is hard, even experts get it wrong Just because I don t know

More information

A product of γ-sets which is not Menger.

A product of γ-sets which is not Menger. A product of γ-sets which is not Menger. A. Miller Dec 2009 Theorem. Assume CH. Then there exists γ-sets A 0, A 1 2 ω such that A 0 A 1 is not Menger. We use perfect sets determined by Silver forcing (see

More information

III. Pseudorandom functions & encryption

III. Pseudorandom functions & encryption III. Pseudorandom functions & encryption Eavesdropping attacks not satisfactory security model - no security for multiple encryptions - does not cover practical attacks new and stronger security notion:

More information

Pr[C = c M = m] = Pr[C = c] Pr[M = m] Pr[M = m C = c] = Pr[M = m]

Pr[C = c M = m] = Pr[C = c] Pr[M = m] Pr[M = m C = c] = Pr[M = m] Midterm Review Sheet The definition of a private-key encryption scheme. It s a tuple Π = ((K n,m n,c n ) n=1,gen,enc,dec) where - for each n N, K n,m n,c n are sets of bitstrings; [for a given value of

More information

Operationally-Based Theories of Program Equivalence

Operationally-Based Theories of Program Equivalence Operationally-Based Theories of Program Equivalence Andrew Pitts Contents 1 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : 241 2 Contextual Equivalence : : : : : : : : : : : : : :

More information

1 Sequences of events and their limits

1 Sequences of events and their limits O.H. Probability II (MATH 2647 M15 1 Sequences of events and their limits 1.1 Monotone sequences of events Sequences of events arise naturally when a probabilistic experiment is repeated many times. For

More information

Neighborhood Semantics for Modal Logic Lecture 5

Neighborhood Semantics for Modal Logic Lecture 5 Neighborhood Semantics for Modal Logic Lecture 5 Eric Pacuit ILLC, Universiteit van Amsterdam staff.science.uva.nl/ epacuit August 17, 2007 Eric Pacuit: Neighborhood Semantics, Lecture 5 1 Plan for the

More information

Reasoning About Bounds In Weighted Transition Systems

Reasoning About Bounds In Weighted Transition Systems Reasoning About Bounds In Weighted Transition Systems QuantLA 2017 September 18, 2017 Mikkel Hansen, Kim Guldstrand Larsen, Radu Mardare, Mathias Ruggaard Pedersen and Bingtian Xue {mhan, kgl, mardare,

More information

Decidability Results for Probabilistic Hybrid Automata

Decidability Results for Probabilistic Hybrid Automata Decidability Results for Probabilistic Hybrid Automata Prof. Dr. Erika Ábrahám Informatik 2 - Theory of Hybrid Systems RWTH Aachen SS09 - Probabilistic hybrid automata 1 / 17 Literatur Jeremy Sproston:

More information

arxiv:math/ v1 [math.lo] 5 Mar 2007

arxiv:math/ v1 [math.lo] 5 Mar 2007 Topological Semantics and Decidability Dmitry Sustretov arxiv:math/0703106v1 [math.lo] 5 Mar 2007 March 6, 2008 Abstract It is well-known that the basic modal logic of all topological spaces is S4. However,

More information

Dipartimento di Informatica Università degli Studi di Verona

Dipartimento di Informatica Università degli Studi di Verona Dipartimento di Informatica Università degli Studi di Verona Rapporto di ricerca Research report 40/2006 On the observational theory of the CPS-calculus Massimo Merro Corrado Biasi Dipartimento di Informatica

More information

Operational Semantics

Operational Semantics Operational Semantics Semantics and applications to verification Xavier Rival École Normale Supérieure Xavier Rival Operational Semantics 1 / 50 Program of this first lecture Operational semantics Mathematical

More information

3.2 Reduction 29. Truth. The constructor just forms the unit element,. Since there is no destructor, there is no reduction rule.

3.2 Reduction 29. Truth. The constructor just forms the unit element,. Since there is no destructor, there is no reduction rule. 32 Reduction 29 32 Reduction In the preceding section, we have introduced the assignment of proof terms to natural deductions If proofs are programs then we need to explain how proofs are to be executed,

More information

Simulation in the Call-by-Need Lambda-Calculus with Letrec, Case, Constructors, and Seq

Simulation in the Call-by-Need Lambda-Calculus with Letrec, Case, Constructors, and Seq Simulation in the Call-by-Need Lambda-Calculus with Letrec, Case, Constructors, and Seq Manfred Schmidt-Schauss 1 and David Sabel 1 and Elena Machkasova 2 1 Dept. Informatik und Mathematik, Inst. Informatik,

More information

Formal Methods Lecture 6. (B. Pierce's slides for the book Types and Programming Languages )

Formal Methods Lecture 6. (B. Pierce's slides for the book Types and Programming Languages ) Formal Methods Lecture 6 (B. Pierce's slides for the book Types and Programming Languages ) Programming in the Lambda-Calculus, Continued Testing booleans Recall: tru = λt. λf. t fls = λt. λf. f We showed

More information

Programming Languages

Programming Languages CSE 230: Winter 2010 Principles of Programming Languages Lecture 10: Programming in λ-calculusc l l Ranjit Jhala UC San Diego Review The lambda calculus is a calculus of functions: e := x λx. e e 1 e 2

More information

Formal Methods Lecture 6. (B. Pierce's slides for the book Types and Programming Languages )

Formal Methods Lecture 6. (B. Pierce's slides for the book Types and Programming Languages ) Formal Methods Lecture 6 (B. Pierce's slides for the book Types and Programming Languages ) This Saturday, 10 November 2018, room 335 (FSEGA), we will recover the following activities: 1 Formal Methods

More information

Introduction to λ-calculus

Introduction to λ-calculus p.1/65 Introduction to λ-calculus Ken-etsu FUJITA fujita@cs.gunma-u.ac.jp http://www.comp.cs.gunma-u.ac.jp/ fujita/ Department of Computer Science Gunma University :Church 32, 36, 40; Curry 34 1. Universal

More information

Type Systems. Today. 1. What is the Lambda Calculus. 1. What is the Lambda Calculus. Lecture 2 Oct. 27th, 2004 Sebastian Maneth

Type Systems. Today. 1. What is the Lambda Calculus. 1. What is the Lambda Calculus. Lecture 2 Oct. 27th, 2004 Sebastian Maneth Today 1. What is the Lambda Calculus? Type Systems 2. Its Syntax and Semantics 3. Church Booleans and Church Numerals 4. Lazy vs. Eager Evaluation (call-by-name vs. call-by-value) Lecture 2 Oct. 27th,

More information

1. Propositional Calculus

1. Propositional Calculus 1. Propositional Calculus Some notes for Math 601, Fall 2010 based on Elliott Mendelson, Introduction to Mathematical Logic, Fifth edition, 2010, Chapman & Hall. 2. Syntax ( grammar ). 1.1, p. 1. Given:

More information

Domain theory and denotational semantics of functional programming

Domain theory and denotational semantics of functional programming Domain theory and denotational semantics of functional programming Martín Escardó School of Computer Science, Birmingham University MGS 2007, Nottingham, version of April 20, 2007 17:26 What is denotational

More information

Program Analysis Probably Counts

Program Analysis Probably Counts Probably Counts 1 c.hankin@imperial.ac.uk joint work with Alessandra Di Pierro 2 and Herbert Wiklicky 1 1 Department of Computing, 2 Dipartimento di Informatica, Università di Verona Computer Journal Lecture,

More information

Extending Abramsky s Lazy Lambda Calculus: (Non)-Conservativity of Embeddings

Extending Abramsky s Lazy Lambda Calculus: (Non)-Conservativity of Embeddings Extending Abramsky s Lazy Lambda Calculus: (Non)-Conservativity of Embeddings Manfred Schmidt-Schauß 1, Elena Machkasova 2, and David Sabel 1 1 Goethe-Universität, Frankfurt, Germany schauss,sabel@ki.informatik.uni-frankfurt.de

More information

On simulations and bisimulations of general flow systems

On simulations and bisimulations of general flow systems On simulations and bisimulations of general flow systems Jen Davoren Department of Electrical & Electronic Engineering The University of Melbourne, AUSTRALIA and Paulo Tabuada Department of Electrical

More information

Přednáška 12. Důkazové kalkuly Kalkul Hilbertova typu. 11/29/2006 Hilbertův kalkul 1

Přednáška 12. Důkazové kalkuly Kalkul Hilbertova typu. 11/29/2006 Hilbertův kalkul 1 Přednáška 12 Důkazové kalkuly Kalkul Hilbertova typu 11/29/2006 Hilbertův kalkul 1 Formal systems, Proof calculi A proof calculus (of a theory) is given by: A. a language B. a set of axioms C. a set of

More information

Completeness for coalgebraic µ-calculus: part 2. Fatemeh Seifan (Joint work with Sebastian Enqvist and Yde Venema)

Completeness for coalgebraic µ-calculus: part 2. Fatemeh Seifan (Joint work with Sebastian Enqvist and Yde Venema) Completeness for coalgebraic µ-calculus: part 2 Fatemeh Seifan (Joint work with Sebastian Enqvist and Yde Venema) Overview Overview Completeness of Kozen s axiomatisation of the propositional µ-calculus

More information

Duality in Probabilistic Automata

Duality in Probabilistic Automata Duality in Probabilistic Automata Chris Hundt Prakash Panangaden Joelle Pineau Doina Precup Gavin Seal McGill University MFPS May 2006 Genoa p.1/40 Overview We have discovered an - apparently - new kind

More information

Subtyping and Intersection Types Revisited

Subtyping and Intersection Types Revisited Subtyping and Intersection Types Revisited Frank Pfenning Carnegie Mellon University International Conference on Functional Programming (ICFP 07) Freiburg, Germany, October 1-3, 2007 Joint work with Rowan

More information

State-Dependent Representation Independence (Technical Appendix)

State-Dependent Representation Independence (Technical Appendix) State-Dependent Representation Independence (Technical Appendix) Amal Ahmed Derek Dreyer Andreas Rossberg TTI-C MPI-SWS MPI-SWS amal@tti-c.org dreyer@mpi-sws.mpg.de rossberg@mpi-sws.mpg.de Contents August

More information

A should be R-closed: R(A) A. We would like this to hold because we would like every element that the rules say should be in A to actually be in A.

A should be R-closed: R(A) A. We would like this to hold because we would like every element that the rules say should be in A to actually be in A. CS 6110 S18 Lecture 7 Inductive Definitions and Least Fixed Points 1 Set Operators Last time we considered a set of rule instances of the form X 1 X 2... X n, (1) X where X and the X i are members of some

More information

Truth-Functional Logic

Truth-Functional Logic Truth-Functional Logic Syntax Every atomic sentence (A, B, C, ) is a sentence and are sentences With ϕ a sentence, the negation ϕ is a sentence With ϕ and ψ sentences, the conjunction ϕ ψ is a sentence

More information

PSL Model Checking and Run-time Verification via Testers

PSL Model Checking and Run-time Verification via Testers PSL Model Checking and Run-time Verification via Testers Formal Methods 2006 Aleksandr Zaks and Amir Pnueli New York University Introduction Motivation (Why PSL?) A new property specification language,

More information

Towards Correctness of Program Transformations Through Unification and Critical Pair Computation

Towards Correctness of Program Transformations Through Unification and Critical Pair Computation Towards Correctness of Program Transformations Through Unification and Critical Pair Computation Conrad Rau and Manfred Schmidt-Schauß Institut für Informatik Johann Wolfgang Goethe-Universität Postfach

More information

Simulation in the Call-by-Need Lambda-Calculus with letrec

Simulation in the Call-by-Need Lambda-Calculus with letrec Simulation in the Call-by-Need Lambda-Calculus with letrec Manfred Schmidt-Schauss 1 and David Sabel 1 and Elena Machkasova 2 1 Dept. Informatik und Mathematik, Inst. Informatik, J.W. Goethe-University,

More information

Typed Arithmetic Expressions

Typed Arithmetic Expressions Typed Arithmetic Expressions CS 550 Programming Languages Jeremy Johnson TAPL Chapters 3 and 5 1 Types and Safety Evaluation rules provide operational semantics for programming languages. The rules provide

More information

Type Systems. Lecture 9: Classical Logic. Neel Krishnaswami University of Cambridge

Type Systems. Lecture 9: Classical Logic. Neel Krishnaswami University of Cambridge Type Systems Lecture 9: Classical Logic Neel Krishnaswami University of Cambridge Where We Are We have seen the Curry Howard correspondence: Intuitionistic propositional logic Simply-typed lambda calculus

More information

Model Checking for Modal Intuitionistic Dependence Logic

Model Checking for Modal Intuitionistic Dependence Logic 1/71 Model Checking for Modal Intuitionistic Dependence Logic Fan Yang Department of Mathematics and Statistics University of Helsinki Logical Approaches to Barriers in Complexity II Cambridge, 26-30 March,

More information

How to Prove Similarity a Precongruence in Non-Deterministic Call-by-Need Lambda Calculi

How to Prove Similarity a Precongruence in Non-Deterministic Call-by-Need Lambda Calculi How to Prove Similarity a Precongruence in Non-Deterministic Call-by-Need Lambda Calculi Matthias Mann and Manfred Schmidt-Schauß Institut für Informatik Johann Wolfgang Goethe-Universität Postfach 11

More information

Relating Reasoning Methodologies in Linear Logic and Process Algebra

Relating Reasoning Methodologies in Linear Logic and Process Algebra Relating Reasoning Methodologies in Linear Logic and Process Algebra Yuxin Deng Robert J. Simmons Iliano Cervesato December 2011 CMU-CS-11-145 CMU-CS-QTR-111 School of Computer Science Carnegie Mellon

More information

Safety Analysis versus Type Inference

Safety Analysis versus Type Inference Information and Computation, 118(1):128 141, 1995. Safety Analysis versus Type Inference Jens Palsberg palsberg@daimi.aau.dk Michael I. Schwartzbach mis@daimi.aau.dk Computer Science Department, Aarhus

More information

Categories, Proofs and Programs

Categories, Proofs and Programs Categories, Proofs and Programs Samson Abramsky and Nikos Tzevelekos Lecture 4: Curry-Howard Correspondence and Cartesian Closed Categories In A Nutshell Logic Computation 555555555555555555 5 Categories

More information

Call-By-Push-Value: Decomposing Call-By-Value And Call-By-Name

Call-By-Push-Value: Decomposing Call-By-Value And Call-By-Name Noname manuscript No. (will be inserted by the editor) Call-By-Push-Value: Decomposing Call-By-Value And Call-By-Name Paul Blain Levy Received: date / Accepted: date Abstract We present the call-by-push-value

More information

Block ciphers And modes of operation. Table of contents

Block ciphers And modes of operation. Table of contents Block ciphers And modes of operation Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction Pseudorandom permutations Block Ciphers Modes of Operation

More information

Lambda-Calculus (I) 2nd Asian-Pacific Summer School on Formal Methods Tsinghua University, August 23, 2010

Lambda-Calculus (I) 2nd Asian-Pacific Summer School on Formal Methods Tsinghua University, August 23, 2010 Lambda-Calculus (I) jean-jacques.levy@inria.fr 2nd Asian-Pacific Summer School on Formal Methods Tsinghua University, August 23, 2010 Plan computation models lambda-notation bound variables conversion

More information

Small families. (at INRIA with Gérard and in the historical λ-calculus) Jean-Jacques Lévy

Small families. (at INRIA with Gérard and in the historical λ-calculus) Jean-Jacques Lévy Small families (at INRIA with Gérard and in the historical λ-calculus) Jean-Jacques Lévy INRIA Rocquencourt and Microsoft Research-INRIA Joint Centre June 22, 2007 caml years coq sixty years is 31,557,600

More information

Normal Form Simulation for McCarthy s Amb

Normal Form Simulation for McCarthy s Amb Electronic Notes in Theoretical Computer Science 155 (2006) 445 465 www.elsevier.com/locate/entcs Normal Form Simulation for McCarthy s Amb Soren B. Lassen 1 Google, Inc. Mountain View, CA Abstract This

More information

Evaluation Driven Proof-Search in Natural Deduction Calculi for Intuitionistic Propositional Logic

Evaluation Driven Proof-Search in Natural Deduction Calculi for Intuitionistic Propositional Logic Evaluation Driven Proof-Search in Natural Deduction Calculi for Intuitionistic Propositional Logic Mauro Ferrari 1, Camillo Fiorentini 2 1 DiSTA, Univ. degli Studi dell Insubria, Varese, Italy 2 DI, Univ.

More information

A Propositional Dynamic Logic for Instantial Neighborhood Semantics

A Propositional Dynamic Logic for Instantial Neighborhood Semantics A Propositional Dynamic Logic for Instantial Neighborhood Semantics Johan van Benthem, Nick Bezhanishvili, Sebastian Enqvist Abstract We propose a new perspective on logics of computation by combining

More information

ESE601: Hybrid Systems. Introduction to verification

ESE601: Hybrid Systems. Introduction to verification ESE601: Hybrid Systems Introduction to verification Spring 2006 Suggested reading material Papers (R14) - (R16) on the website. The book Model checking by Clarke, Grumberg and Peled. What is verification?

More information

Perfectly-Secret Encryption

Perfectly-Secret Encryption Perfectly-Secret Encryption CSE 5351: Introduction to Cryptography Reading assignment: Read Chapter 2 You may sip proofs, but are encouraged to read some of them. 1 Outline Definition of encryption schemes

More information

Decidability: Church-Turing Thesis

Decidability: Church-Turing Thesis Decidability: Church-Turing Thesis While there are a countably infinite number of languages that are described by TMs over some alphabet Σ, there are an uncountably infinite number that are not Are there

More information

On-the-Fly Exact Computation of Bisimilarity Distances

On-the-Fly Exact Computation of Bisimilarity Distances On-the-Fly Exact Computation of Bisimilarity Distances Giorgio Bacci, Giovanni Bacci, Kim G. Larsen, Radu Mardare Dept. of Computer Science, Aalborg University Quantitative Models: Expressiveness, Analysis,

More information

Propositional Dynamic Logic

Propositional Dynamic Logic Propositional Dynamic Logic Contents 1 Introduction 1 2 Syntax and Semantics 2 2.1 Syntax................................. 2 2.2 Semantics............................... 2 3 Hilbert-style axiom system

More information

Lambda Calculus, Linear Logic and Symbolic Computation

Lambda Calculus, Linear Logic and Symbolic Computation Lambda Calculus, Linear Logic and Symbolic Computation Habilitation à diriger des recherches Giulio Manzonetto giulio.manzonetto@lipn.univ-paris13.fr LIPN Université Paris Nord IRIF Université Paris Diderot

More information

Characterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus

Characterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus Characterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus Patric Baillot 1, Eria De Benedetti 1,2, and Simona Ronchi Della Rocca 2 1 CNRS, ENS de Lyon, INRIA, UCBL, Université

More information

Programming Languages and Types

Programming Languages and Types Programming Languages and Types Klaus Ostermann based on slides by Benjamin C. Pierce Where we re going Type Systems... Type systems are one of the most fascinating and powerful aspects of programming

More information

Introduction to Kleene Algebras

Introduction to Kleene Algebras Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)

More information

Expressing Security Properties Using Selective Interleaving Functions

Expressing Security Properties Using Selective Interleaving Functions Expressing Security Properties Using Selective Interleaving Functions Joseph Halpern and Sabina Petride August 8, 2008 Abstract McLean s notion of Selective Interleaving Functions (SIFs) is perhaps the

More information

Logical Characterizations of Simulation and Bisimulation for Fuzzy Transition Systems

Logical Characterizations of Simulation and Bisimulation for Fuzzy Transition Systems Logical Characterizations of Simulation and Bisimulation for Fuzzy Transition Systems Hengyang Wu 1 Yuxin Deng 2 1 Information Engineer College, Hangzhou Dianzi University Hangzhou 310018, P.R. China 2

More information

Approximation Metrics for Discrete and Continuous Systems

Approximation Metrics for Discrete and Continuous Systems University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science May 2007 Approximation Metrics for Discrete Continuous Systems Antoine Girard University

More information