-
arXiv:2406.13647 [pdf, ps, other]
Inner automorphisms as 2-cells
Abstract: Abstract inner automorphisms can be used to promote any category into a 2-category, and we study two-dimensional limits and colimits in the resulting 2-categories. Existing connected colimits and limits in the starting category become two-dimensional colimits and limits under fairly general conditions. Under the same conditions, colimits in the underlying category can be used to build many notable… ▽ More
Submitted 19 June, 2024; originally announced June 2024.
MSC Class: 18A30; 18G45; 18N10
Journal ref: Theory and Applications of Categories, Vol. 42, No. 2, 2024, pp. 19-40
-
arXiv:2402.00206 [pdf, ps, other]
Towards a Unified Theory of Time-Varying Data
Abstract: What is a time-varying graph, or a time-varying topological space and more generally what does it mean for a mathematical structure to vary over time? Here we introduce categories of narratives: powerful tools for studying temporal graphs and other time-varying data structures. Narratives are sheaves on posets of intervals of time which specify snapshots of a temporal object as well as relationshi… ▽ More
Submitted 27 February, 2024; v1 submitted 31 January, 2024; originally announced February 2024.
Comments: Acknowledgements and related work added
MSC Class: 68P05; 68R01; 18D70
-
Categorical composable cryptography: extended version
Abstract: We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting s… ▽ More
Submitted 15 December, 2023; v1 submitted 28 August, 2022; originally announced August 2022.
Comments: Extended version of arXiv:2105.05949 which appeared in FoSSaCS 2022
Journal ref: Logical Methods in Computer Science, Volume 19, Issue 4 (December 18, 2023) lmcs:9979
-
arXiv:2205.03683 [pdf, ps, other]
Inner autoequivalences in general and those of monoidal categories in particular
Abstract: We develop a general theory of (extended) inner autoequivalences of objects of any 2-category, generalizing the theory of isotropy groups to the 2-categorical setting. We show how dense subcategories let one compute isotropy in the presence of binary coproducts, unifying various known one-dimensional results and providing tractable computational tools in the two-dimensional setting. In particular,… ▽ More
Submitted 25 May, 2024; v1 submitted 7 May, 2022; originally announced May 2022.
MSC Class: 18G45; 18M05; 18N10
Journal ref: Journal of Pure and Applied Algebra, Volume 228, Issue 11, 2024, 107717
-
arXiv:2105.05949 [pdf, ps, other]
Categorical composable cryptography
Abstract: We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting s… ▽ More
Submitted 28 August, 2022; v1 submitted 12 May, 2021; originally announced May 2021.
Comments: Updated to match the proceedings version
Journal ref: Foundations of Software Science and Computation Structures (FoSSaCS) 2022
-
Closing Bell: Boxing black box simulations in the resource theory of contextuality
Abstract: This chapter contains an exposition of the sheaf-theoretic framework for contextuality emphasising resource-theoretic aspects, as well as some original results on this topic. In particular, we consider functions that transform empirical models on a scenario S to empirical models on another scenario T, and characterise those that are induced by classical procedures between S and T corresponding to… ▽ More
Submitted 24 January, 2024; v1 submitted 22 April, 2021; originally announced April 2021.
Comments: Corrected a mistake in Theorem 44 and other fixes stemming from it. This supersedes the published version and should be considered the version of reference
Journal ref: In: A. Palmigiano, M. Sadrzadeh (eds), Samson Abramsky on Logic and Structure in Computer Science and Beyond. Outstanding Contributions to Logic, vol 25. Springer, Cham (2023)
-
arXiv:1904.10805 [pdf, ps, other]
The Way of the Dagger
Abstract: A dagger category is a category equipped with a functorial way of reversing morphisms, i.e. a contravariant involutive identity-on-objects endofunctor. Dagger categories with additional structure have been studied under different names e.g. in categorical quantum mechanics and algebraic field theory. In this thesis we study the dagger in its own right and show how basic category theory adapts to d… ▽ More
Submitted 24 April, 2019; originally announced April 2019.
Comments: PhD Thesis, final version
-
arXiv:1804.01514 [pdf, ps, other]
Categories of Empirical Models
Abstract: A notion of morphism that is suitable for the sheaf-theoretic approach to contextuality is developed, resulting in a resource theory for contextuality. The key features involve using an underlying relation rather than a function between measurement scenarios, and allowing for stochastic map**s of outcomes to outcomes. This formalizes an intuitive idea of using one empirical model to simulate ano… ▽ More
Submitted 29 January, 2019; v1 submitted 4 April, 2018; originally announced April 2018.
Comments: In Proceedings QPL 2018, arXiv:1901.09476
Journal ref: EPTCS 287, 2019, pp. 239-252
-
arXiv:1803.06651 [pdf, ps, other]
Limits in dagger categories
Abstract: We develop a notion of limit for dagger categories, that we show is suitable in the following ways: it subsumes special cases known from the literature; dagger limits are unique up to unitary isomorphism; a wide class of dagger limits can be built from a small selection of them; dagger limits of a fixed shape can be phrased as dagger adjoints to a diagonal functor; dagger limits can be built from… ▽ More
Submitted 5 June, 2019; v1 submitted 18 March, 2018; originally announced March 2018.
MSC Class: 18A40; 18C15; 18C20; 18D10; 18D15; 18D35
Journal ref: Theory and Applications of Categories 34(18):468-513, 2019
-
arXiv:1801.06488 [pdf, ps, other]
Biproducts without pointedness
Abstract: We show how to define biproducts up to isomorphism in an arbitrary category without assuming any enrichment. The resulting notion coincides with the usual definitions whenever all binary biproducts exist or the category is suitably enriched, resulting in a modest yet strict generalization otherwise. We also characterize when a category has all binary biproducts in terms of an ambidextrous adjuncti… ▽ More
Submitted 28 March, 2020; v1 submitted 19 January, 2018; originally announced January 2018.
Comments: 6 pages
MSC Class: 18A05; 18A20; 18A30
Journal ref: Cahiers de topologie et géométrie différentielle catégoriques, Vol LXI (2020), Issue 3, 229-238
-
arXiv:1602.04324 [pdf, ps, other]
Monads on dagger categories
Abstract: The theory of monads on categories equipped with a dagger (a contravariant identity-on-objects involutive endofunctor) works best when everything respects the dagger: the monad and adjunctions should preserve the dagger, and the monad and its algebras should satisfy the so-called Frobenius law. Then any monad resolves as an adjunction, with extremal solutions given by the categories of Kleisli and… ▽ More
Submitted 1 November, 2017; v1 submitted 13 February, 2016; originally announced February 2016.
Comments: 28 pages
Journal ref: Theory and Applications of Categories, Vol. 31, 2016, No. 35, pp 1016-1043
-
arXiv:1505.04330 [pdf, ps, other]
Reversible monadic computing
Abstract: We extend categorical semantics of monadic programming to reversible computing, by considering monoidal closed dagger categories: the dagger gives reversibility, whereas closure gives higher-order expressivity. We demonstrate that Frobenius monads model the appropriate notion of coherence between the dagger and closure by reinforcing Cayley's theorem; by proving that effectful computations (Kleisl… ▽ More
Submitted 16 May, 2015; originally announced May 2015.
Comments: 19 pages
Journal ref: Proceedings MFPS, Electronic Notes in Theoretical Computer Science 319:217--237, 2015