Hostname: page-component-cd9895bd7-dk4vv Total loading time: 0 Render date: 2024-12-25T06:59:43.579Z Has data issue: false hasContentIssue false

INTERNAL AUTOMORPHISMS AND ANTIMORPHISMS OF MODELS OF NF

Published online by Cambridge University Press:  29 October 2024

NATHAN BOWLER
Affiliation:
FACHBEREICH MATHEMATIK UNIVERSITÄT HAMBURG BUNDESSTRAßE 55 20146 HAMBURG GERMANY E-mail: nathan.bowler@uni-hamburg.de
THOMAS FORSTER*
Affiliation:
SCHOOL OF MATHEMATICS AND STATISTICS VICTORIA UNIVERSITY OF WELLINGTON WELLINGTON 6012 NEW ZEALAND
Rights & Permissions [Opens in a new window]

Abstract

It is shown that every model of NF admits a permutation model containing an internal automorphism.

Type
Article
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NCCreative Common License - ND
This is an Open Access article, distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives licence (https://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is unaltered and is properly cited. The written permission of Cambridge University Press must be obtained for commercial re-use or in order to create a derivative work.
Copyright
© The Author(s), 2024. Published by Cambridge University Press on behalf of The Association for Symbolic Logic

The dual ${\phi }^{\circlearrowleft }$ of a formula $\phi $ is the formula obtained from $\phi $ by replacing all occurrences of ‘ $\in $ ’ in $\phi $ by ‘ $\not \in $ ’. The axiom scheme $\phi \longleftrightarrow \phi ^{\circlearrowleft }$ is the Duality Scheme. It has been known for some time that $\phi \longleftrightarrow \phi ^{\circlearrowleft }$ is a theorem of NF whenever $\phi $ is a closed stratifiable formula (the $\circlearrowleft $ operation does not affect stratification). Permutation models can be found in which $\phi \longleftrightarrow \phi ^{\circlearrowleft }$ fails for some unstratifiable $\phi $ , but it remains an open question whether or not there are models in which $\phi \longleftrightarrow \phi ^{\circlearrowleft }$ holds for all $\phi $ . (The place to look for the details is the chapter on permutation models in [Reference Forster1], which also contains all the background that a reader might need for what follows below.) The natural conjecture is that there should be such models. An antimorphism is a permutation $\tau $ of V satisfying $(\forall x, y)(x \in y \longleftrightarrow \tau (x) \not \in \tau (y))$ . Clearly if there is an antimorphism then duality follows (tho’ one does not expect a converse, since the existence of antimorphisms of order two contradicts AC $_2$ ).

We do not prove the conjecture here, but we do prove a special case.

We say a formula $\phi $ is stratifiable-mod-2 if its variables can be assigned to two types yin and yang in such a way that:

(i) all occurrences of any one variable receive the same type, and

(ii) in subformulæ like ‘ $x = y$ ’ the two variables receive the same type, and

(iii) in subformulæ like ‘ $x \in y$ ’ the two variables receive different types.

In Corollary 3 we establish that every model of NF has a permutation model satisfying the scheme $\phi \longleftrightarrow \phi ^{\circlearrowleft }$ for $\phi $ that are stratifiable-mod- $2$ . As a side-effect of our analysis we obtain a proof that every model of NF (and not just “every model of NF + AC $_2$ ” which was hitherto the best known) has a permutation model containing an $\in $ -automorphism that is both nontrivial and internal (a set of the model). This is Corollary 2.

We record for clarity that all proofs are conducted in NF (not ZF) and indeed NF simpliciter, with no add-ons. Readers more at home with ZF might need to remind themselves that in this context $0$ and $\emptyset $ are not the same! $\emptyset $ is always the empty set, but $0$ is the natural number zero.

We will need to consider the sequence of permutations: , c, $jc\cdot c$ , $j^2c\cdot jc\cdot c$ …, where c is the complementation permutation, and the operator j is defined so that $j(\pi )$ is the function $x \mapsto \pi "x$ . We write these permutations ‘ $c_i$ ’, thus: $c_1 := c$ ; $c_{i+1} := j(c_i) \cdot c$ .

Definition 1. For permutations $\sigma $ and $\tau $ of sets X and Y, an embedding of permutations from $\sigma $ to $\tau $ is an injective function $\pi \colon X \to Y$ such that $\pi \cdot \sigma = \tau \cdot \pi $ .

Although Definition 1 is quite general we will need it in this paper only for involutions, and we will speak of involution-embeddings or embeddings of involutions. (A permutation $\pi $ is an involution iff .)

We will need the following analogue of Cantor–Bernstein for embeddings-of-involutions.

Lemma 1. Let $\sigma $ and $\tau $ be involutions of X and Y such that there are embeddings $\pi $ of $\sigma $ into $\tau $ and $\rho $ of $\tau $ into $\sigma $ .

Then $\sigma $ and $\tau $ are conjugate.

Proof. Most proofs of the Cantor–Bernstein theorem extend to proofs of this fact. For the sake of brevity, we will use a proof based on the Knaster–Tarski theorem that any order-preserving function on a complete lattice has a fixed point. Applying this to the lattice of sets which are closed under the action of $\sigma $ and the order-preserving function $S \mapsto X \setminus \rho "(Y \setminus \pi "S))$ we obtain a fixed point P. Then the map defined by $\pi $ on P and $\rho ^{-1}$ on $X \setminus P$ is an isomorphism from $\sigma $ to $\tau $ .

We observe without proof that if $\pi $ is an embedding of permutations from $\sigma $ to $\tau $ then $j(\pi )$ is an embedding of permutations from $j(\sigma )$ to $j(\tau )$ . That is to say, conjugacy is a congruence relation for j, so we can think of j as acting on the congruence classes. (We will need this in the proof of the second part of Lemma 2.)

Definition 2. An involution is universal if every involution embeds into it.

Lemma 2. For all i, $j^i(c)$ is universal.

Proof. First we prove that $j(c)$ is universal.

We are going to need a bijection from V to $\{x{\kern-1pt}: {\kern-1pt}\emptyset \not \in x\}$ . First we define $f{\kern-1pt}:{\kern-1pt} V {\kern-1pt}\to{\kern-1pt} V$ by

$$\begin{align*}x \mapsto \begin{cases} x+1, & \text{if }x \in {\mathrm{I\negthinspace N}}\setminus \{0\},\\ 1, & \text{if }x =0, \\ x, & \text{otherwise. }\\ \end{cases}\end{align*}$$

Then $x \mapsto f"x$ , aka $j(f)$ , is a bijection from V to $\{x: \emptyset \not \in x\}$ . We call it ‘ $\theta $ ’ for short.

For any involution $\sigma $ of any set X we define an embedding of involutions $\pi $ from $\sigma $ to $j(c)$ by

$$\begin{align*}x\, \mapsto\, j(\theta)(x)\, \cup\, j(c \cdot \theta)(\sigma(x)).\end{align*}$$

The function $\pi $ is injective, with left inverse

$$\begin{align*}y \mapsto j(\theta^{-1})(\{z \in y : \emptyset \not \in z\}).\end{align*}$$

To see that $\pi $ is a map of involutions from $\sigma $ to $j(c)$ we calculate as follows:

$$ \begin{align*} (j(c) \cdot \pi)(x) &= j(c)[j(\theta)(x)\, \cup\, j(c \cdot \theta)(\sigma(x))] \\ &=^{(1)} j(c \cdot \theta)(x)\, \cup\, j(c \cdot c \cdot \theta)(\sigma(x)) \\ &=^{(2)} j(\theta)(\sigma(x))\, \cup\, j(c \cdot \theta)(\sigma(\sigma(x))) \\ &= (\pi \cdot \sigma)(x). \end{align*} $$

(1) Distribute $j(c)$ over $\cup $ ;

(2) and reverse the order of the summands.

For the main result we argue as follows.

Clearly any involution into which a universal involution can be embedded is also universal, and any involution conjugate to a universal involution is again universal.

Since $j(c)$ is universal, there is an embedding of c into $j(c)$ . This lifts to embeddings of $j^i(c)$ into $j^{i+1}(c)$ , and composing these embeddings we get embeddings of $j(c)$ into $j^i(c)$ for any $i \geq 1$ . Thus $j^i(c)$ is universal for any $i \geq 1$ .

The following corollary of Lemma 1 is key.

Corollary 1. Any two universal involutions are conjugate.

Corollary 2. Every model of NF has a permutation model with an internal $\in $ -automorphism.

Proof. It follows from Corollary 1 that $j(c)$ and $j^2(c)$ are conjugate, making $j(c)$ an example of a permutation which is conjugate to j of itself. It was shown in [Reference Forster1] that any model containing such a permutation $\pi $ has a permutation model wherein $\pi $ has become an (internal) $\in $ -automorphism.

In [Reference Forster1] it is shown that there must be such a $\pi $ , but that was on the assumption of AC $_2$ , and of course we have here scrupulously eschewed AC $_2$ .

It is a consequence of Corollary 2 that there can be no definable wellfounded extensional relation on the universe, since if there were we could prove by induction on it that the only $\in $ -automorphism is the identity. In [Reference Forster and Holmes2] we will draw the inference that NF is not synonymous with ZF or anything like it.

For the main result which follows later (Corollary 3) we will need involutions $\sigma $ and $\tau $ such that there is a permutation $\pi $ conjugating $\sigma $ to $j(\tau ) \cdot c$ and $\tau $ to $j(\sigma )\cdot c$ . The next lemma exhibits such a pair of involutions, taking $\sigma $ to be $c_1$ and $\tau $ to be $c_2$ .

Lemma 3. There is an involution that conjugates c with $c_3$ and commutes with $c_2$ .

Proof. We begin by choosing a fixed point a of $c_2$ and setting $b=c_1(a)$ . (a could be $\{x:\emptyset \not \in x\}$ , but we don’t need the extra detail: all we need is $a = c_2(a)$ .) Since a is a fixed point of $c_2$ we also have $b = c_1(c_2(a)) = j(c)(a)$ . For any $s \subseteq \{a, b\}$ we define $X_s$ to be $\{x : x \cap \{a, b\} = s\}$ . The $X_s$ partition V into four pieces. $X_{\emptyset }$ is closed under both $j(c)$ and $j^2(c)$ ; let $\sigma _{\emptyset }$ be the restriction of $j(c)$ to $X_{\emptyset }$ and $\tau _{\emptyset }$ the restriction of $j^2(c)$ .

Then there are embeddings of $j(c)$ into $\sigma _{\emptyset }$ and $j^2(c)$ into $\tau _{\emptyset }$ , so by the results of the last section both $\sigma _{\emptyset }$ and $\tau _{\emptyset }$ are universal.

We had better justify this last paragraph.

Lemma 4. Let $\sigma $ be any involution of V which doesn’t send any natural number to a natural number, and let a and b be distinct sets swapped by $\sigma $ . Let $X_{\emptyset }$ be the set of sets containing neither a nor b. Then there is an embedding of $j(\sigma )$ into its restriction to $X_{\emptyset }$ .

Proof. Let n be a natural number such that, if either of a or b is a natural number, then it is less than n. We define $\pi \colon V \to V$ by

$$\begin{align*}x \mapsto \begin{cases} n, & \text{if }x = a,\\\sigma(n), & \text{if }x = b, \\ x + 1, & \text{if } x \text{ is a natural number } \geq n,\\ \sigma(\sigma(x) + 1), & \text{if } \sigma(x) \text{ is a natural number } \geq n,\\ x, & \text{otherwise.} \\\end{cases}\end{align*}$$

It is clear by construction that $\sigma \cdot \pi = \pi \cdot \sigma $ , and that neither a nor b is in the image of $\pi $ . But then also $j(\sigma ) \cdot j(\pi ) = j(\pi ) \cdot j(\sigma )$ and the image of $j(\pi )$ is included in $X_{\emptyset }$ , as required.

Let $\pi _{\emptyset }$ be an isomorphism from $\sigma _{\emptyset }$ to $\tau _{\emptyset }$ . Since $j(c) = c_1 \cdot c_2$ and $j^2(c) = c_3 \cdot c_2$ we have the equation $\pi _\emptyset \cdot c_1 \cdot c_2 = c_3 \cdot c_2 \cdot \pi _\emptyset $ , which we record for future use.

We now define $\pi \colon V \to V$ by

$$\begin{align*}x \mapsto \begin{cases} \pi_{\emptyset}(x), & \text{if }x \cap \{a, b\} = \emptyset,\\x, & \text{if }x \cap \{a, b\} = \{b\}, \\ c_3(c_1(x)), & \text{if } x \cap \{a, b\} = \{a\}, \\ c_3(\pi_{\emptyset}(c_1(x))), & \text{if } x \cap \{a, b\} = \{a, b\}.\\\end{cases}\end{align*}$$

The $X_s$ form a partition of V, and $\pi $ is a union of bijections from $X_s$ to $X_s$ for each $s \subseteq \{a, b\}$ , so $\pi $ is a permutation of V. It remains to verify that for any x we have both $\pi (c_1(x)) = c_3(\pi (x))$ and $\pi (c_2(x)) = c_2(\pi (x))$ . For each equation there are four cases, depending on $x \cap \{a, b\}$ .

We now check these cases for the first equation.

$\bullet $ If $x \cap \{a, b\} = \emptyset $ , then $c_1(x) \cap \{a, b\} = \{a, b\}$ and so

$$\begin{align*}\pi(c_1(x)) = c_3(\pi_{\emptyset}(c_1(c_1(x)))) = c_3(\pi_{\emptyset}(x)) = c_3(\pi(x)) \,.\end{align*}$$

$\bullet $ If $x \cap \{a,b\} = \{b\}$ then $c_1(x) \cap \{a, b\} = \{a\}$ and so

$$\begin{align*}\pi(c_1(x)) = c_3(c_1(c_1(x))) = c_3(x) = c_3(\pi(x))\,.\end{align*}$$

$\bullet $ If $x \cap \{a, b\} = \{a\}$ then $c_1(x) \cap \{a, b\} = \{b\}$ and so

$$\begin{align*}\pi(c_1(x)) = c_1(x) = c_3(c_3(c_1(x))) = c_3(\pi(x))\,.\end{align*}$$

$\bullet $ If $x \cap \{a, b\} = \{a, b\}$ then $c_1(x) \cap \{a, b\} = \emptyset $ and so

$$\begin{align*}\pi(c_1(x)) = \pi_{\emptyset}(c_1(x)) = c_3(c_3(\pi_{\emptyset}(c_1(x)))) = c_3(\pi(x))\,.\end{align*}$$

The four cases for the other equation are similar.

$\bullet $ If $x \cap \{a,b\} = \emptyset $ then $c_2(x) \cap \{a, b\} = \{a, b\}$ and so

$$\begin{align*}\pi(c_2(x)) = c_3(\pi_{\emptyset}(c_1(c_2(x)))) = c_3(c_3(c_2(\pi_{\emptyset}(x)))) = c_2(\pi_{\emptyset}(x)) = c_2(\pi(x))\,.\end{align*}$$

$\bullet $ If $x \cap \{a,b\} = \{b\}$ then $c_2(x) \cap \{a, b\} = \{b\}$ and so

$$\begin{align*}\pi(c_2(x)) = c_2(x) = c_2(\pi(x))\,.\end{align*}$$

$\bullet $ If $x \cap \{a,b\} = \{a\}$ then $c_2(x) \cap \{a, b\} = \{a\}$ and so

$$\begin{align*}\pi(c_2(x)) = c_3(c_1(c_2(x)))) = c_2(c_3(c_1(x))) = c_2(\pi(x))\,.\end{align*}$$

$\bullet $ If $x \cap \{a,b\} = \{a, b\}$ then $c_2(x) \cap \{a, b\} = \emptyset $ and so

$$\begin{align*}\pi(c_2(x)) = \pi_{\emptyset}(c_2(x)) = \pi_{\emptyset}(c_2(c_1(c_1(x)))) = c_2(c_3(\pi_{\emptyset}(c_1(x)))) = c_2(\pi(x))\,.\end{align*}$$

Corollary 3. $\bullet $ Every model of NF has a permutation model that contains two (internal)

permutations $\sigma $ and $\tau $ satisfying

$(\forall x y)(x \in y \longleftrightarrow \sigma (x) \not \in \tau (y))$ and

$(\forall x y)(x \in y \longleftrightarrow \tau (x) \not \in \sigma (y))$ .

$\bullet $ Any such model satisfies duality for formulæ that are stratifiable-mod- $2$ .

Proof. We use the permutation $\pi $ from Lemma 3, and exploit the two permutations $\sigma $ and $\tau $ that we find in the permutation model $V^\pi $ .

If a formula $\phi $ is stratifiable-mod-2 then its variables can be assigned to two types yin and yang in such a way that in subformulæ like ‘ $x = y$ ’ the two variables receive the same type and in subformulæ like ‘ $x \in y$ ’ the two variables receive different types. Let us associate $\sigma $ to variables given type yin in the assignment and associate $\tau $ to variables given type yang in the assignment. ‘ $x \in y$ ’ is equivalent to ‘ $\sigma (x) \not \in \tau (y)$ ’ and if x is of type yin we make this replacement. ‘ $x \in y$ ’ is also equivalent to ‘ $\tau (x) \not \in \sigma (y)$ ’ and if x is of type yang we make this replacement. We deal with equations analogously. In the rewritten version of $\phi $ we find that every variable ‘x’ of type yin now appears only as ‘ $\sigma (x)$ ’ and that every variable ‘y’ of type yang now appears only as ‘ $\tau (y)$ ’. So we can reletter ‘ $\sigma (x)$ ’ as ‘x’, and ‘ $\tau (y)$ ’ as ‘y’ and the result is $\phi ^{\circlearrowleft }$ .

We do not believe that Corollary 3 is best possible.

References

REFERENCES

Forster, T., Set Theory with a Universal Set , Oxford Logic Guides, 20, Oxford University Press, Oxford, 1992.Google Scholar
Forster, T. and Holmes, R., Synonymy questions concerning the Quine systems , Journal of Symbolic Logic , to appear.Google Scholar