<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>October</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>From Applicative Programming to Verification-based Knowledge: A Curry-Howard-Lambek Reading</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Cosimo Perini Brogi</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Scuola IMT Alti Studi Lucca</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>26</volume>
      <issue>2025</issue>
      <abstract>
        <p>We discuss a modular natural deduction framework for intuitionistic modal logics dealing with applicative functors and verificationist knowledge, extending a calculus for belief/applicative programming ( IEL− ) to one (IEL) for knowledge in mathematics and other contexts as well. Through the proofs-as-programs paradigm, we map these systems into modal type theories and prove strong normalisation via CPS translations, uniformly handling detours and permutations. Finally, we give a categorical interpretation of the modal operator as a monoidal functor, reflecting the rewrite structure of the calculi.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Verificationist epistemic logic</kwd>
        <kwd>Proofs-as-programs</kwd>
        <kwd>Intuitionistic modalities</kwd>
        <kwd>Normalisation theorems</kwd>
        <kwd>Categorical semantics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>entire records (Figure 1e), guaranteeing all validation functions execute regardless of individual failures.</p>
      <p>
        A key advantage of this approach is that it enables computational optimisations which are
unavailable in a purely monadic context. Because the arguments in an applicative computation are
independent of one another, validation functions can be executed concurrently without violating
referential transparency. Furthermore, under parallel evaluation, time complexity transforms from
sequential (1 + 2 + · · · + ) – where  ≤  validations execute before first failure – to parallel
(max(1, 2, . . . , )) – where all  validators execute concurrently.
type ('a, 'e) validation_result =
| Success of 'a
| Failure of 'e list
type validation_error =
| UsernameTooShort
| InvalidEmail
| AgeTooYoung
Intuitionistic epistemic states. On the purely modal front, verificationist epistemic logic has been
developed axiomatically and semantically by [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] based on the coreflection principle. The minimal
system known as IEL− provides a formal framework for Kripke and coreflection principles. A modular
extension, IEL, introduces a further axiom schema for intuitionistic factivity of knowledge: □  → ¬¬.
This subtle reinforcement reflects the verificationist stance that whatever is known through verification
cannot be false. The logics IEL− and IEL bridge Brouwer-Heyting-Kolmogorov’s proof-centric semantics
(BHK) [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ] with Kripke’s epistemic structures for intuitionistic reasoning [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], arguing that proof
construction provides suficient reason for belief. In the BHK interpretation, we have an implicit notion
of proof whose epistemic counterparts are modelled by Kripke structures, and the construction of a
proof for a specific proposition that we carried out as a cumulative mental process gives us suficient
reason for (at least) believing in that proposition. It is then possible to also cover traditional epistemic
states of belief and knowledge within such a framework, once we recognise the correct operational
clauses for corresponding modal operators: Proving  assures that  is true, proving □  is weaker,
for we may at least believe  even though we do not have a direct proof of  itself. Nevertheless,
knowledge of  via a verification forces us to reject any claims for ¬.
      </p>
      <p>
        The two-part scenario in Figure 2 would make these points more concrete. The story’s first part aligns
with a verificationist account of belief. The second part explains factivity of knowledge in intuitionistic
terms and qualifies it as a formal BHK-based version of knowledge as belief tracking the truth of the
matter under discussion proposed by [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. That reading suggests the application of this approach to
epistemic reasoning in broader contexts than mathematical practice, including empirical knowledge
and experimental practice in natural sciences [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ], evidence-based knowledge and classified/secret
information [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ], and zero-knowledge interactions [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ], which would reveal more and more
relevant as the technical integration of symbolic- and neural-based artificial intelligence progresses [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
Part I: Your favourite top-rated mathematician has Part II: Some time has passed since the
mathematiposted a proof sketch of a conjecture  in a very spe- cian’s post on conjecture . You are again surfing the
cialised mathematical field on her blog. Her informal Net looking for new results in the field  belongs, and
argument is convincing, and her expertise justifies your come across another post about that conjecture. This
trust in the conjecture. You are not an expert in that time, a famous top-rated computer scientist’s blog
anfield, but she is; you do not have direct access to a de- nounces that  has been refuted. And there’s more:
tailed proof of , but it is reasonable for you to believe Her refutation has been computerised, and the formal
that  does hold. proof is freely available on the Net. If you know the
programming language at the base of her computer
program to refute  – a proof assistant, or a highly
specialised theorem prover – you can read the proof
and see that ¬ holds, so that your original trust in 
is misplaced.
Our contribution. In this paper, we report on our modular approach to the design of natural
deduction systems for these logics – IEL− and IEL – with direct translations into modal type theories,
that is, functional calculi for deductions. This extends the proofs-as-programs paradigm, familiar
from intuitionistic logic and simple type theory, to the modalities involved in applicatives and epistemic
states. This correspondence naturally lifts to the categorical semantics: the belief/applicative modality
is interpreted as a monoidal functor with a monoidal point; the knowledge modality, as one that is
also dense. These structures preserve conjunctions and reflect the initial object ⊥, aligning categorical
interpretation with modal reasoning. Modularity in the design of deduction rules underpins our
central results. The original strong normalisation proof for the modal  -calculus of IEL− , first
given in [19], is here extended – modularly – to IEL, via the addition of a modal elimination rule.
Both proofs rely on a CPS-translation into simple type theory and instantiate the Friedman-Dragalin
-translation [20] in a modal setting. Further logical properties follow uniformly as corollaries of
normalisation. We also prove that the categorical structure supporting belief in [19] carries over to
our extended calculus IEL for knowledge, preserving the intended interpretation of deductions. We
thus refine the proof-theoretic and categorical analysis of intuitionistic epistemic modalities within
the Curry-Howard-Lambek correspondence to encompass knowledge and applicative functors in a
more unified manner.
Background on proofs-as-programs. We start by a short presentation of the natural deduction
paradigm and the calculus NJp for intuitionistic propositional logic – which is further discussed in
proof-theoretic literature, such as [21].
      </p>
      <p>Introduced first in [ 22], natural deduction systems for classical and intuitionistic logic, usually denoted
by NK and NJ, respectively, provide a formal model for deduction under hypotheses. The key feature
of these systems is the absence of logical axioms from the calculus. The entire deductive apparatus
relies only on inference rules that encode the atomic deductive steps involved in any logical argument
and reflect the operational meaning of the logical connectives of a given base language. Starting from
assumptions – any formula  is per se a proof whose premise and conclusion are  itself – intuitionistic
deductions are then developed according to the rules in Figure 3, defining the propositional fragment of
NJ, that we denote by NJp.</p>
      <p>By identifying the types of a simple type theory with the same grammar generating the propositional
formulas of NJp, we can then define a further correspondence between labelled deductions in NJp and
the type assignments for typed terms, via the mapping shown in Figure 4. Thus, we can manipulate
deductions in the proof system by performing computations in simple type theory.</p>
      <p>Definition 1. Let Ξ denote the reflexive and transitive closure of the relation &gt;Ξ defined as follows: 1
Detours: ∙ (. ) &gt;Ξ  [ := ]</p>
      <p>∙  (1, 2) &gt;Ξ  ∙ C(in, .1, .2) &gt;Ξ [ :=  ]
Permutations: ∙ C(C(, .1, .2), .1, .2) &gt;Ξ C(, .C(1, .1, .2), .C(2, .1, .2))
∙ C(, .1, .2) &gt;Ξ C(, .1, .2) ∙  C(, .1, .2) &gt;Ξ C(, . 1, . 2)
∙ ⊥  ( ) &gt;Ξ ⊥ ( ) ∙  ⊥ ( ) &gt;Ξ ⊥ ( )
∙ C(⊥ ( ), .1, .2) &gt;Ξ ⊥ ( ) ∙ ⊥  (⊥ ( )) &gt;Ξ ⊥ ( )
where [ :=  ] denotes the substitution of  for all free occurrences of  in .</p>
      <p>A Ξ-normal form is just a typed term that cannot be rewritten with respect to Ξ. For this system
of rewritings, it is possible to prove a confluence property and a strong normalisation theorem,2
whose correspondent for NJp is proven in [24, 25].</p>
      <p>
        Calculus design. We refer to [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] for the axiomatic calculi and relational semantics for IEL− and IEL
(IEL− and IEL, respectively). We thus assume a monomodal grammar is given for the propositional
fragment of intuitionistic logic extended by the □ -modality: ,  ::=  | ⊤ | ⊥ |  ∧  |  ∨  |
 →  | □ , where  ranges among a infinite denumerable set of atomic propositions, and negation
is defined as ¬ :=  → ⊥.
1Type annotations are omitted for the sake of readability.
2Refer to [23] for the proofs.
⊤⊥ ⊤⊥
      </p>
      <p>∨  ∨ℐ2 []</p>
      <p>[]


1
→−↦ in1. : ,
→−↦ in2. : ,
→−↦ (⊥ ) : 
→−↦* : ⊤
 ∨ℰ
2 →↦− C(, ( : .1), ( : .2)) where C bounds
all occurrences
of  in 1 and
all occurrences
caoonfrdrespo,innd1,t22o,
′, 1, 2,
resp.
Definition 2. Let IEL be the calculus extending NJp by the following rules:</p>
      <p>Notice that the rule □ ℐ difers from the one introduced by [ 26] by allowing the set Δ of additional
hypotheses in the subdeduction of . The □ ℰ -free fragment of IEL is denoted by IEL− and corresponds
to the natural deduction calculus for intuitionistic belief of [19].</p>
      <p>
        We write Γ ⇒L  when  is derivable in L for L ∈ {IEL− , IEL} assuming the set of hypotheses
Γ, and we write L ⊢  when ∅ ⇒L . Denoting provability in the axiomatic calculi of [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] by the
analogous Γ ⊢L , we have – by straightforward induction on the length of the formal proofs – that
Γ ⇒L  if Γ ⊢L .
      </p>
      <p>Normalisation. Building on common notations for the standard Curry-Howard correspondence
we recall in the opening of this section, we obtain modal  -calculi by decorating L-deductions
with proof names: we only need to extend the mapping of Figure 4 with type constructors for □ ℐ
(box[1, · · · , ].  with 1, · · · , ) and □ ℰ (unbox  with .).</p>
      <p>The rewriting system Ξ of Def. 1 (based on the conversions from [24]) is then extended by the
conversions in Figure 5, which we state in natural deduction fashion for the sake of readability.
⇝  □
· · ·
Γ
.
.</p>
      <p>.
□ ⃗
⇝  □
⇝  □
· · ·</p>
      <sec id="sec-1-1">
        <title>The main theoretical result can be stated as</title>
        <sec id="sec-1-1-1">
          <title>Theorem 1. The following hold:</title>
          <p>1. Deductions in IEL− strongly normalise w.r.t. the rewriting system Ξ +  □
2. Deductions in IEL strongly normalise w.r.t. the rewriting system Ξ +  □
+  □ .
+  □ +  □
+  □ .</p>
          <p>Proof. A simple CPS translation as in [19] cannot handle modal permutations: we need a variant ⟨−⟩
it, from our modal  -calculus to simple type theory, defined as follows:
of
⟨⊥⟩ := ⊥
⟨⊤⟩ := ⊤
⟨⟩ := 
To 1. ⟨ → ⟩ := ⟨⟩ → ⟨⟩
⟨ ∧ ⟩ := ⟨⟩ ∧ ⟨⟩
⟨ ∨ ⟩ := ⟨⟩ ∨ ⟨⟩
⟨□ ⟩ := ⟨⟩ ∨</p>
          <p>It is then straightforward to check that both  □ and  □ are preserved by this translation, and
recovered by permutation conversions of Ξ. Since deductions in NJp are strongly normalising w.r.t. Ξ –
as proven in e.g. [24] – we have the desired strong normalisation for IEL− -deductions.</p>
          <p>To 2. As for the previous point, by imposing ⟨□ ⟩ :=  ∨ ⊥ and ⟨unbox  with .⟩ :=
C(⟨ ⟩, .⟨⟩, .). This translation tweaks preserve  □ and  □ too, using applications of rewritings in
Ξ concerning ∨-detours and permutations.</p>
          <p>Combined with associated proofs of the subformula property of normal L-deductions, normalisation
has interesting corollaries for these logics, namely: consistency, decidability, disjunction property,
□ -primality, and modal disjunction property [19, 27].</p>
          <p>Categorical semantics. The correspondence between type theory and natural deduction is further
extended to category theory via the Curry-Howard-Lambek correspondence summarised by the partial
glossary of Figure 6.</p>
          <p>Logic
proposition</p>
          <p>proof
theorem
conjunction</p>
          <p>true
implication
disjunction
false</p>
          <p>Type Theory
type
term
inhabitant
product type</p>
          <p>unit type
function type
sum type
empty type</p>
          <p>Category Theory
object
arrow
element-arrow</p>
          <p>product
terminal object</p>
          <p>exponential
(weak) coproduct
(weak) initial object</p>
          <p>The defining properties of these categorical constructions correspond to rewritings of deductions
in NJp, as documented in [28, Ch. I.8]. Note, however, that the system of rewritings imposed by the
universal properties of the initial object and coproducts is a proper extension of Ξ from Def. 1. We thus
refer to the categorical counterparts of ⊥ and ∨ w.r.t. system Ξ as the weak initial object and weak
coproduct, respectively.</p>
          <p>For space reasons, we omit the standard definition of the notions for categories, functors, and natural
transformations – we refer the reader to classic textbooks such as [28] and [29] for more details – to
recall that any category having products and exponentials for any of its objects is called cartesian
closed (CCCat); moreover, if it has also (weak) coproducts, it is called bi-cartesian closed (bi-CCCat).</p>
          <p>For epistemic operators, we need to add to the basics of the categorical semantics for NJp the
following definitions.</p>
          <p>Definition 3.</p>
          <p>Given any CCCat C ,
• an endofunctor F : C → C is pointed if there exists a natural transformation  : C ⇒ F such
that F ∘   =   ∘  , where  is called the point of F.
• a monoidal endofunctor consists of a functor F : C → C together with
– a natural transformation , : F × F → F( × );
– a morphism 1 : 1 → F1,
when  ×  ∘ F, = G, ∘   ×   and  1 ∘ 1F = 1G ∘ id1.</p>
          <p>preserving the monoidal structure of C .3 These are called structure morphisms of F.
• given monoidal endofunctors F, G : C → C , a natural transformation  : F ⇒ G is monoidal
Definition 4. An IEL− -category is given by a bi-CCCat C together with a monoidal pointed endofunctor
K whose point  is monoidal. When K preserves the initial object 0 of C up-to-isomorphism, we say that K
is dense, and C is an IEL-category.</p>
          <p>It is not hard to see that  □ is needed to prove that the construction induced by the modal operator
preserves arrow composition. However, that construction cannot be a functor unless one considers the
Γ
.
.
following extensionality principle  □ for □ ℐ: . ⇝
□  []
□</p>
          <p>IEL− -deductions strongly normalise w.r.t. the rewriting system Ξ+ □ + □ + □ + □ : The translation
⟨−⟩ is capable of mimicking  □ in a simple type theory extended by a sum extensionality principle  ∨,
which in type-theoretic syntax can be defined as C(, .in1(), .in2()) &gt; ∨  .
Normalisation of L-deductions w.r.t. Ξ +  □ +  □ +  □ +  □ is then derived from the fact that 
∨reductions can be postponed in any sequence of Ξ +  ∨-rewritings, so that simple type theory is
normalising w.r.t. Ξ +  ∨ too [23, Ch. 4]. The adequacy of this categorical interpretation is now natural
to state and prove:
Γ
.
.</p>
          <p>.</p>
          <p>□ 
□ ℐ</p>
        </sec>
        <sec id="sec-1-1-2">
          <title>Theorem 2. The following hold:</title>
          <p>(i) Let C be an IEL− -category. Then there is a canonical interpretation J− K of IEL− in C such that
– a formula  is mapped to a C -object JK;
– a deduction  of 1, · · · ,  ⇒IEL−  is mapped to an arrow J K : J1K×· · ·× JK → JK;
– for any two deductions  and  which are equal modulo Ξ +  □ +  □ -rewritings, we have</p>
          <p>J K = JK.</p>
          <p>The analogous soundness result holds for any IEL-category, by considering the system of rewritings
Ξ +  □ +  □ +  □ extended by  □ .
(ii) If the interpretation of two L-deductions is equal in all L-categories, then the two deductions are
equal modulo Ξ +  □ +  □ +  □ +  □ .</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Acknowledgments</title>
      <p>I am grateful to the two anonymous reviewers for their constructive feedback and suggestions.</p>
      <p>This work was partially supported by: the project SERICS – Security and Rights in CyberSpace
PE0000014, financed within PNRR, M4C2 I.1.3, funded by the European Union - NextGenerationEU
(MUR Code: 2022CY2J5S, CUP: D67G22000340001); the International Research Network “Logic and
Interaction”; the EC-COST Action (CA20111) “EuroProofNet”.</p>
    </sec>
    <sec id="sec-3">
      <title>Declaration on Generative AI</title>
      <sec id="sec-3-1">
        <title>The author has not employed any Generative AI tools.</title>
        <p>3See [29, Sect. VII.1] for the corresponding commuting diagrams and the definition of monoidal category.
pp. 869–914. URL: https://proceedings.mlr.press/v274/dinu25a.html.
[19] C. Perini Brogi, Curry-Howard-Lambek Correspondence for Intuitionistic Belief, Studia Logica
109 (2021) 1441–1461. doi:10.1007/S11225-021-09952-3.
[20] D. Leivant, Syntactic translations and provably recursive functions, The Journal of Symbolic Logic
50 (1985) 682–688.
[21] D. van Dalen, Logic and Structure, 4th ed., Springer, 2008.
[22] G. Gentzen, Untersuchungen über das logische Schließen I, Mathematische zeitschrift 39 (1935)
176–210.
[23] M. H. Sørensen, P. Urzyczyn, Lectures on the Curry-Howard isomorphism, volume 149 of Studies
in Logic and the Foundations of Mathematics, Elsevier, 2006.
[24] D. Prawitz, Ideas and results in proof theory, in: Studies in Logic and the Foundations of</p>
        <p>Mathematics, volume 63, Elsevier, 1971, pp. 235–307.
[25] P. Mancosu, S. Galvan, R. Zach, An Introduction to Proof Theory: Normalization, Cut-Elimination,
and Consistency Proofs, Oxford University Press, 2021.
[26] V. de Paiva, E. Ritter, Basic constructive modality, Logic without Frontiers: Festschrift for Walter</p>
        <p>Alexandre Carnielli on the occasion of his 60th Birthday (2011) 411–428.
[27] C. Perini Brogi, Investigations of proof theory and automated reasoning for non-classical logics,</p>
        <p>Ph.D. thesis, University of Genoa, Italy, 2022.
[28] J. Lambek, P. J. Scott, Introduction to higher-order categorical logic, volume 7, Cambridge
University Press, 1988.
[29] S. Mac Lane, Categories for the working mathematician, volume 5, Springer Science &amp; Business</p>
        <p>Media, 2013.
[30] I. van der Giessen, Admissible rules for six intuitionistic modal logics, Ann. Pure Appl. Log. 174
(2023) 103233. doi:10.1016/J.APAL.2022.103233.
[31] S. Guerrini, A. Masini, M. Zorzi, Natural deduction calculi for classical and intuitionistic S5, J.</p>
        <p>Appl. Non Class. Logics 33 (2023) 165–205. doi:10.1080/11663081.2023.2233750.
[32] C. Hagemeier, D. Kirst, Constructive and mechanised meta-theory of IEL and similar modal logics,
J. Log. Comput. 32 (2022) 1585–1610. doi:10.1093/LOGCOM/EXAC068.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C.</given-names>
            <surname>McBride</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Paterson</surname>
          </string-name>
          ,
          <article-title>Applicative programming with efects</article-title>
          ,
          <source>Journal of functional programming 18</source>
          (
          <year>2008</year>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] HaskellWiki, Applicative functor - haskellwiki,
          <year>2022</year>
          . URL: https://wiki.haskell.org/index.php? title=Applicative_functor&amp;oldid=65058, [Online; accessed 24-June-2025].
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Jane</given-names>
            <surname>Street</surname>
          </string-name>
          <string-name>
            <surname>Developers</surname>
          </string-name>
          ,
          <article-title>Applicative (base</article-title>
          .Base.Applicative), https://ocaml.janestreet.com/ ocaml-core/
          <year>v0</year>
          .12/doc/base/Base/Applicative/index.html,
          <year>2025</year>
          . [Accessed 24-
          <fpage>06</fpage>
          -2025].
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F</given-names>
            <surname>#+ Developers</surname>
          </string-name>
          , Functors and Applicatives, https://fsprojects.github.io/FSharpPlus/ applicative-functors.html,
          <year>2025</year>
          . [Accessed 24-
          <fpage>06</fpage>
          -2025].
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Idris</given-names>
            <surname>Doc</surname>
          </string-name>
          <string-name>
            <surname>Developers</surname>
          </string-name>
          , IdrisDoc: Prelude.Applicative, https://www.idris-lang.org/docs/current/ prelude_doc/docs/Prelude.Applicative.html,
          <year>2025</year>
          . [Accessed 24-
          <fpage>06</fpage>
          -2025].
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Abel</surname>
          </string-name>
          ,
          <article-title>Equivalence of applicative functors and multifunctors</article-title>
          ,
          <source>arXiv preprint arXiv:2401.14286</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Artemov</surname>
          </string-name>
          , T. Protopopescu, Intuitionistic epistemic logic,
          <source>The Review of Symbolic Logic 9</source>
          .2 (
          <year>2016</year>
          )
          <fpage>266</fpage>
          -
          <lpage>298</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Troelstra</surname>
          </string-name>
          , Principles of Intuitionism, Springer,
          <year>1969</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>D. van Dalen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Troelstra</surname>
          </string-name>
          , Constructivism in Mathematics. An
          <string-name>
            <surname>Introduction</surname>
            <given-names>I</given-names>
          </string-name>
          , volume
          <volume>121</volume>
          <source>of Studies in Logic and the Foundations of Mathematics, Elsevier</source>
          ,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Kripke</surname>
          </string-name>
          ,
          <article-title>Semantical analysis of intuitionistic logic I, in: Studies in Logic and the Foundations of Mathematics</article-title>
          , volume
          <volume>40</volume>
          ,
          <string-name>
            <surname>Elsevier</surname>
          </string-name>
          ,
          <year>1965</year>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Nozick</surname>
          </string-name>
          , Philosophical explanations,
          <source>Ethics</source>
          <volume>94</volume>
          (
          <year>1981</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aldini</surname>
          </string-name>
          , G. Curzi,
          <string-name>
            <given-names>P.</given-names>
            <surname>Graziani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tagliaferri</surname>
          </string-name>
          ,
          <article-title>Trust evidence logic</article-title>
          , in: J.
          <string-name>
            <surname>Vejnarová</surname>
          </string-name>
          , N. Wilson (Eds.),
          <article-title>Symbolic and Quantitative Approaches to Reasoning with Uncertainty - 16th European Conference</article-title>
          ,
          <string-name>
            <surname>ECSQARU</surname>
          </string-name>
          <year>2021</year>
          , Prague, Czech Republic,
          <source>September 21-24</source>
          ,
          <year>2021</year>
          , Proceedings, volume
          <volume>12897</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2021</year>
          , pp.
          <fpage>575</fpage>
          -
          <lpage>589</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -86772-0\_
          <fpage>41</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aldini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Graziani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tagliaferri</surname>
          </string-name>
          ,
          <article-title>Reasoning about ignorance and beliefs</article-title>
          , in: L.
          <string-name>
            <surname>Cleophas</surname>
          </string-name>
          , M. Massink (Eds.),
          <source>Software Engineering and Formal Methods. SEFM 2020 Collocated Workshops - ASYDE</source>
          , CIFMA, and
          <string-name>
            <surname>CoSim-CPS</surname>
          </string-name>
          , Amsterdam, The Netherlands,
          <source>September 14-15</source>
          ,
          <year>2020</year>
          , Revised Selected Papers, volume
          <volume>12524</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2020</year>
          , pp.
          <fpage>214</fpage>
          -
          <lpage>230</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -67220-1\_
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aldini</surname>
          </string-name>
          , G. Curzi,
          <string-name>
            <given-names>P.</given-names>
            <surname>Graziani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tagliaferri</surname>
          </string-name>
          ,
          <article-title>A probabilistic modal logic for context-aware trust based on evidence</article-title>
          ,
          <source>Int. J. Approx. Reason</source>
          .
          <volume>169</volume>
          (
          <year>2024</year>
          )
          <article-title>109167</article-title>
          . doi:
          <volume>10</volume>
          .1016/J.IJAR.
          <year>2024</year>
          .
          <volume>109167</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aldini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fazio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Graziani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mascella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tagliaferri</surname>
          </string-name>
          ,
          <article-title>A logical perspective on intending to keep a true secret</article-title>
          ,
          <source>Journal of Logic and Computation</source>
          <volume>35</volume>
          (
          <year>2025</year>
          )
          <article-title>exaf028</article-title>
          . doi:
          <volume>10</volume>
          .1093/logcom/ exaf028.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Backes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bendun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mafei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Mohammadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Pecina</surname>
          </string-name>
          ,
          <article-title>Symbolic malleable zero-knowledge proofs</article-title>
          , in: C.
          <string-name>
            <surname>Fournet</surname>
            ,
            <given-names>M. W.</given-names>
          </string-name>
          <string-name>
            <surname>Hicks</surname>
          </string-name>
          , L. Viganò (Eds.),
          <source>IEEE 28th Computer Security Foundations Symposium, CSF</source>
          <year>2015</year>
          , Verona, Italy,
          <fpage>13</fpage>
          -
          <issue>17</issue>
          <year>July</year>
          ,
          <year>2015</year>
          , IEEE Computer Society,
          <year>2015</year>
          , pp.
          <fpage>412</fpage>
          -
          <lpage>426</lpage>
          . URL: https://doi.org/10.1109/CSF.
          <year>2015</year>
          .
          <volume>35</volume>
          . doi:
          <volume>10</volume>
          .1109/CSF.
          <year>2015</year>
          .
          <volume>35</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Costa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Perini Brogi</surname>
          </string-name>
          ,
          <article-title>Toward dynamic epistemic verification of zero-knowledge protocols</article-title>
          , in: G.
          <string-name>
            <surname>D'Angelo</surname>
            ,
            <given-names>F. L.</given-names>
          </string-name>
          <string-name>
            <surname>Luccio</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Palmieri</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the 8th Italian Conference on Cyber Security (ITASEC</source>
          <year>2024</year>
          ), Salerno, Italy, April 8-
          <issue>12</issue>
          ,
          <year>2024</year>
          , volume
          <volume>3731</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2024</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3731</volume>
          /paper25.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>M.-C. Dinu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Leoveanu-Condrei</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Holzleitner</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Zellinger</surname>
          </string-name>
          , S. Hochreiter,
          <article-title>SymbolicAI: A framework for logic-based approaches combining generative models and solvers</article-title>
          , in: V.
          <string-name>
            <surname>Lomonaco</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Melacci</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Tuytelaars</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Chandar</surname>
          </string-name>
          , R. Pascanu (Eds.),
          <source>Proceedings of The 3rd Conference on Lifelong Learning Agents</source>
          , volume
          <volume>274</volume>
          <source>of Proceedings of Machine Learning Research, PMLR</source>
          ,
          <year>2025</year>
          ,
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>