Preprint
Article

This version is not peer-reviewed.

Fixed Points for Explosive Endofunctors in Accessible Categories

Submitted:

24 June 2025

Posted:

25 June 2025

You are already at the latest version

Abstract
We investigate recursive fixed points for endofunctors with controlled growth on accessible 2 categories. For a specific class of “explosive” endofunctors satisfying precise growth and 3 regularity conditions, we prove that recursive fixed points—objects X satisfying X ∼= 4 Fn(X)—cannot exist for n < 3 but do exist for n = 3. Furthermore, we show that all fixed points at depths n ≥ 3 are isomorphic to depth-3 fixed points. This establishes 3 as a critical threshold for the existence of self-referential constructions in category theory. We explore applications to set theory, type theory, domain theory, and topos theory, provide algorithms for constructing fixed points, and discuss connections to classical impossibility results in logic and foundations. Historical context and computational complexity considerations are also examined.
Keywords: 
;  ;  ;  ;  ;  ;  ;  

1. Introduction

1.1. Background and Motivation

The study of fixed points for endofunctors has a rich history in category theory, with applications ranging from domain theory [1] to type theory [2]. Classical impossibility results in logic and set theory—such as Russell’s paradox [3], Cantor’s theorem [4], and Gödel’s incompleteness theorems [5]—can be viewed through the lens of failed attempts to construct certain types of fixed points.
This paper contributes to the theory of categorical fixed points by identifying a precise threshold phenomenon. We show that for a well-defined class of endofunctors on accessible categories, recursive fixed points of the form X F n ( X ) exhibit a sharp transition: they are impossible for n = 1 , 2 but become possible for n 3 , with all such fixed points essentially equivalent to the n = 3 case.

1.2. Historical Context

The search for fixed points in mathematics has deep historical roots. Cantor’s diagonal argument (1891) showed that no set can be put in bijection with its power set, effectively proving the non-existence of depth-1 fixed points for the power set functor. Russell’s paradox (1903) emerged from attempting to construct a set of all sets that do not contain themselves, another failed depth-1 fixed point.
In the 1960s, Lawvere [6] provided a categorical framework for understanding diagonal arguments, showing how Cantor’s theorem could be generalized to cartesian closed categories. Scott [1] developed domain theory partly to provide fixed points for recursive type equations, though his solutions required careful construction using metric spaces or order theory.
The theory of accessible categories, developed by Makkai and Paré [7] and refined by Adámek and Rosický [8], provided the categorical framework we use. However, the specific threshold phenomenon we identify—the universality of depth 3—appears to be new.

1.3. Related Work

The existence of fixed points for endofunctors has been extensively studied. Lambek [9] established conditions for initial algebras in complete categories. Adámek and Rosický [8] developed the theory of accessible categories, providing the framework we build upon. Lawvere [6] explored connections between fixed points and diagonal arguments, anticipating some of our impossibility results.
Recent work by Shulman [10] on set theory for category theory provides tools for handling size issues in categorical constructions. Our approach to rank functions extends ideas from Makkai and Paré [7] on presentability ranks.
In domain theory, Smyth and Plotkin [11] studied solutions to recursive domain equations, though their focus was on existence rather than threshold phenomena. The connection to large cardinals has been explored by Rathjen [12] in proof-theoretic contexts.
What distinguishes our contribution is the identification of a universal threshold at depth 3, which to our knowledge has not been previously observed in this generality. While specific instances of this phenomenon may have been noticed in particular categories, we provide a unified treatment showing it arises from fundamental categorical principles.

1.4. Main Results

Our central theorem requires precise definitions that we develop in Section 2. Informally:
Theorem 1.1
(Main Theorem - Informal). Let F be an endofunctor on an accessible category satisfying specific growth and regularity conditions that generalize the cardinality constraints underlying classical diagonal arguments. Then:
  • No object X can satisfy X F ( X ) or X F 2 ( X ) .
  • There exists an object Ω satisfying Ω F 3 ( Ω ) .
  • For any n 3 and any X with X F n ( X ) , we have X F 3 ( X ) .
The precise conditions on F (Definition 3.1) capture endofunctors that exhibit “explosive growth” analogous to the power set functor, while being sufficiently well-behaved to permit categorical constructions.

1.5. Contributions

This paper makes several contributions. First, we identify 3 as the minimal recursive depth for self-referential fixed points across a broad class of categories. Second, we provide a categorical framework that explains diverse impossibility results as instances of insufficient recursive depth. Third, we develop explicit transfinite constructions for depth-3 fixed points. Fourth, we analyze the computational complexity of finding and verifying fixed points. Finally, we demonstrate applications across multiple areas of mathematics.

1.6. Structure of the Paper

Section 2 establishes the categorical framework. Section 3 proves impossibility at depths 1 and 2. Section 4 constructs depth-3 fixed points. Section 5 proves the collapse theorem. Section 6 provides detailed examples. Section 7 analyzes computational aspects. Section 8 explores connections to other areas. Section 9 discusses implications. Section 10 presents open problems.

2. Accessible Categories and Rank Theory

2.1. Accessible Categories

We briefly recall the theory of accessible categories. For comprehensive treatments, see [7,8].
Definition 2.1.
A category C is λ-accessible for a regular cardinal λ if C has λ-filtered colimits and there exists a set A of λ-presentable objects such that every object of C is a λ-filtered colimit of objects from A . An object X is λ-presentable if Hom ( X , ) : C Set preserves λ-filtered colimits.
Theorem 2.2
(Representation Theorem [7]). A category is accessible if and only if it is equivalent to the category of models of a small sketch in Set .
Example 2.3
(Standard Accessible Categories). The following are accessible categories. Set is ω-accessible with finite sets as ω-presentable objects. Grp is ω-accessible with finitely presented groups as ω-presentable objects. For any small category I, the presheaf category Set I op is ω-accessible. Any Grothendieck topos is accessible. The category of models of any first-order theory is accessible.

2.2. Rank Functions

To formalize “size” in a categorical setting, we introduce rank functions.
Definition 2.4
(Rank Function). A rank function on an accessible category C is a function ρ : Ob ( C ) Ord satisfying isomorphism invariance ( X Y ρ ( X ) = ρ ( Y ) ), presentability correlation (for each regular cardinal λ, X : ρ ( X ) < λ contains a set of λ-presentable generators), monomorphism monotonicity (if f : X Y is a monomorphism, then ρ ( X ) ρ ( Y ) ), filtered colimit continuity ( ρ ( colim i I X i ) = sup i I ρ ( X i ) for λ-filtered diagrams where C is λ-accessible), and minimality (if ρ satisfies the first four properties, then ρ ( X ) ρ ( X ) for all X).
Theorem 2.5
(Existence and Uniqueness). Every accessible category admits a unique minimal rank function. For a λ-accessible category, this rank can be computed as:
ρ ( X ) = min μ : X is μ + - presentable
where μ ranges over regular cardinals λ .
Proposition 2.6
(Rank Properties). Let ρ be the minimal rank function on an accessible category C . If C has an initial object 0, then ρ ( 0 ) = 0 . If C has binary coproducts, then ρ ( X ⨿ Y ) = max ( ρ ( X ) , ρ ( Y ) ) for infinite ranks. If F : C D preserves λ-presentable objects, then ρ D ( F ( X ) ) ρ C ( X ) .

2.3. Growth Classification

Definition 2.7
(Growth Classes). Let F : C C be an endofunctor on an accessible category with rank function ρ. We say F has sub-exponential growth if there exists κ such that ρ ( F ( X ) ) < 2 ρ ( X ) for all ρ ( X ) > κ . We say F has exponential growth if ρ ( F ( X ) ) 2 ρ ( X ) for all infinite ρ ( X ) . We say F has super-exponential growth if ρ ( F ( X ) ) ρ ( X ) for all infinite ρ ( X ) , where α denotes the α-th beth number.
Lemma 2.8
(Growth Composition). If F has exponential growth, then F 2 has growth ρ ( F 2 ( X ) ) 2 2 ρ ( X ) , F 3 has growth ρ ( F 3 ( X ) ) 2 2 2 ρ ( X ) , and more generally, F n has growth ρ ( F n ( X ) ) exp ( n ) ( ρ ( X ) ) where exp ( n ) is n-fold iteration of α 2 α .
Conjecture 2.9
(Sub-exponential Growth Threshold). For endofunctors with polynomial growth ρ ( F ( X ) ) = ρ ( X ) k where k > 1 , the minimal depth for fixed points is log k ( ω ) . More generally, for growth rate ρ ( F ( X ) ) = f ( ρ ( X ) ) , the threshold depth is the minimal n such that f ( n ) ( ω ) ω · f ( n 1 ) ( ω ) .

2.4. Cardinal Arithmetic Prerequisites

We collect key facts about cardinal arithmetic needed for our proofs.
Lemma 2.10
(Cardinal Exponentiation Properties). For infinite cardinals κ, we have κ < 2 κ (Cantor), κ < 2 2 κ , κ < 2 2 2 κ , and cf ( 2 κ ) > κ (König).
Lemma 2.11
(Absorption Properties). For infinite cardinals κ, we have κ + 2 κ = 2 κ , κ + 2 2 κ = 2 2 κ , and κ + 2 2 2 κ = 2 2 2 κ if and only if κ < 2 2 2 κ .
Lemma 2.12
(Fixed Point Cardinals). Under appropriate large cardinal axioms, there exist cardinals θ 1 minimal such that θ 1 = 2 θ 1 (strongly inaccessible), θ 2 minimal such that θ 2 = 2 2 θ 2 (requires stronger axioms), and θ 3 minimal such that θ 3 = 2 2 2 θ 3 (requires even stronger axioms). Moreover, θ 1 < θ 2 < θ 3 and each has cofinality equal to itself.

3. Explosive Endofunctors and Impossibility Results

3.1. Explosive Endofunctors

We now define the class of endofunctors for which our results apply.
Definition 3.1
(Explosive Endofunctor). An endofunctor F : C C on a λ-accessible category C is explosive if it satisfies the following conditions. First, it preserves μ-filtered colimits for some regular μ λ (filtered colimit preservation). Second, ρ ( F ( X ) ) 2 ρ ( X ) for all X with ρ ( X ) ω (exponential growth). Third, F preserves monomorphisms (monomorphism preservation). Fourth, there exists A C with ρ ( F ( A ) ) > ρ ( A ) (non-triviality). Fifth, the function α ρ ( F ( X ) ) is the same for all X with ρ ( X ) = α ω (growth uniformity).
Remark 3.2
(Intuition for Explosive). The term “explosive” captures the idea that these functors exhibit rapid, uncontrolled growth similar to the power set functor. The conditions ensure growth is at least exponential, the functor is well-behaved categorically, non-trivial examples exist, and growth depends only on size, not structure.
Proposition 3.3
(Examples of Explosive Functors). The following are explosive endofunctors: the power set functor P : Set Set , the contravariant power set X 2 X op : Set Set , for any infinite group G the functor X X G : Set G Set G , in a topos the functor X Ω X where Ω is the subobject classifier, and the double dual functor on infinite-dimensional vector spaces.

3.2. No Fixed Points at Depth 1

Theorem 3.4
(Impossibility at Depth 1). Let F be an explosive endofunctor on an accessible category. Then there is no object X with X F ( X ) .
Proof. 
Suppose φ : X F ( X ) is an isomorphism.
Case 1: ρ ( X ) ω . Then:
ρ ( X ) = ρ ( F ( X ) ) 2 ρ ( X ) > ρ ( X )
using Cantor’s theorem. Contradiction.
Case 2: ρ ( X ) < ω . We proceed by strong induction on n = ρ ( X ) .
Base case: If ρ ( X ) = 0 , then X is initial. Since F preserves colimits of empty diagrams (by filtered colimit preservation), F ( X ) is initial. This contradicts non-triviality.
Inductive step: Assume the result for all Y with ρ ( Y ) < n , and let ρ ( X ) = n < ω . Since X is ω -presentable and non-initial, there exists a proper subobject j : Y X with ρ ( Y ) < n . By monomorphism preservation, F ( j ) : F ( Y ) F ( X ) is monic.
The isomorphism φ : X F ( X ) induces a bijection between subobjects:
Sub ( X ) Sub ( F ( X ) )
Consider the subobject j : Y X . Under the bijection, this corresponds to some subobject k : Z F ( X ) . Since φ is an isomorphism, we have a commutative diagram:
Y j X φ Y φ Z k F ( X )
where φ Y is an isomorphism. By functoriality, Z = F ( Y ) for some subobject Y of X. Thus Y F ( Y ) , contradicting the inductive hypothesis.    □

3.3. Lawvere’s Fixed Point Theorem

We can view Theorem 3.4 through the lens of Lawvere’s fixed point theorem.
Theorem 3.5
(Lawvere’s Fixed Point Theorem - Categorical Version). Let C be a cartesian closed category with Y X denoting the exponential. If there exists a monomorphism f : X × X Y , then there is no surjection g : Y Y X .
Corollary 3.6
(Application to Power Sets). In Set , taking Y = P ( X ) and f the characteristic function embedding, Lawvere’s theorem implies no surjection P ( X ) P ( X ) X exists. This is equivalent to saying X P ( X ) .

3.4. No Fixed Points at Depth 2

Theorem 3.7
(Impossibility at Depth 2). Let F be an explosive endofunctor. Then there is no object X with X F 2 ( X ) .
Proof. 
The endofunctor G = F 2 satisfies:
ρ ( G ( X ) ) = ρ ( F 2 ( X ) ) 2 2 ρ ( X )
For any ordinal α , we have α < 2 2 α (applying Cantor’s theorem twice). Thus G is also explosive, and Theorem 3.4 applies.    □

3.5. Why Depth 2 Fails: A Detailed Analysis

To understand why depth 2 fails while depth 3 succeeds, we analyze the structure more carefully.
Proposition 3.8
(Structure of Potential Depth-2 Fixed Points). If X F 2 ( X ) were to exist for an explosive F, then ρ ( X ) would need to satisfy ρ ( X ) = 2 2 ρ ( X ) , any decomposition X = A ⨿ B would require ρ ( F 2 ( A ) ) + ρ ( F 2 ( B ) ) = ρ ( X ) , and the “seed” A cannot be absorbed: ρ ( A ) + ρ ( F 2 ( X ) ) > ρ ( F 2 ( X ) ) always.
Proof. (1) follows from the isomorphism and growth conditions. For (3), we have:
ρ ( A ) + ρ ( F 2 ( X ) ) = ρ ( A ) + 2 2 ρ ( X )
Since ρ ( X ) = 2 2 ρ ( X ) would be required, and ρ ( A ) > 0 for non-trivial A, the sum exceeds 2 2 ρ ( X ) .    □

3.6. Diagonal Arguments in Categories

To better understand why depths 1 and 2 fail, we show how classical diagonal arguments lift to our setting.
Lemma 3.9
(Categorical Cantor). Let F be explosive and suppose X F ( X ) with X having at least two distinct global elements. Then we can construct a “diagonal” morphism that yields a contradiction.
Proof. 
Following Lawvere [6], the isomorphism X F ( X ) provides an evaluation morphism:
ev : X × X F ( 1 )
Define the diagonal morphism δ : X F ( 1 ) by δ ( x ) = ev ( x , x ) . Using the internal logic of the category, we can construct a morphism γ : X F ( 1 ) such that for all x:
ev ( γ ( x ) , x ) δ ( x )
But then γ cannot equal any morphism in the image of the isomorphism X F ( X ) , yielding a contradiction.    □

4. Construction of Depth-3 Fixed Points

4.1. The Main Construction

We now prove that depth-3 fixed points exist for explosive endofunctors.
Theorem 4.1
(Existence at Depth 3). Let F be an explosive endofunctor on a λ-accessible category C . Then there exists an object Ω with Ω F 3 ( Ω ) .
The construction uses transfinite iteration with careful bookkeeping to ensure convergence.
Construction 1. Fix a non-initial object A with ρ ( A ) minimal among non-initial objects (exists by non-triviality). Define the auxiliary functor:
G ( Y ) = A ⨿ F 3 ( Y )
We construct a transfinite sequence ( G α ( ) ) α Ord by setting G 0 ( ) = (initial object), G α + 1 ( ) = G ( G α ( ) ) = A ⨿ F 3 ( G α ( ) ) , and G λ ( ) = colim α < λ G α ( ) for limit λ .
The connecting morphisms ι α , β : G α ( ) G β ( ) for α < β are defined as follows: ι α , α + 1 is the coproduct inclusion into A ⨿ F 3 ( G α ( ) ) , ι α , λ is the canonical morphism into the colimit, and ι α , β = ι γ , β ι α , γ for α < γ < β .
Lemma 4.2
(Properties of the Construction). The construction satisfies: Each ι α , β is a monomorphism. The rank satisfies ρ ( G α ( ) ) = 0 if α = 0 and ρ ( G α ( ) ) = max ( ρ ( A ) , sup β < α 2 2 2 ρ ( G β ( ) ) ) if α > 0 . The sequence is strictly increasing in rank for α < μ where μ is the stabilization point. We have G μ ( ) = A ⨿ F 3 ( G μ ( ) ) .
Proof. (1) By transfinite induction using monomorphism preservation.
(2) By transfinite induction. For α = 0 the claim is clear. For α = β + 1 , we have G β + 1 ( ) = A ⨿ F 3 ( G β ( ) ) , so
ρ ( G β + 1 ( ) ) = max ( ρ ( A ) , ρ ( F 3 ( G β ( ) ) ) ) = max ( ρ ( A ) , 2 2 2 ρ ( G β ( ) ) )
For limit α , use continuity of rank.
(3) Follows from (2) and Lemma 2.13.
(4) By construction and the fact that G preserves the colimit at μ .    □
Lemma 4.3
(Stabilization). The sequence stabilizes at some regular cardinal μ, meaning G μ ( ) G μ + 1 ( ) .
Proof. 
By filtered colimit preservation and accessibility, the functor G preserves μ -filtered colimits for some regular μ . The ranks ρ ( G α ( ) ) form an increasing sequence of ordinals, which must stabilize below some cardinal by replacement. Taking μ sufficiently large ensures G μ ( ) = colim α < μ G α ( ) is preserved by G.    □
Set Ω = G μ ( ) . We have:
Ω = colim α < μ G α ( ) = colim α < μ ( A ⨿ F 3 ( G α ( ) ) ) = A ⨿ colim α < μ F 3 ( G α ( ) ) = A ⨿ F 3 ( colim α < μ G α ( ) ) = A ⨿ F 3 ( Ω )

4.2. Proving Ω F 3 ( Ω )

Lemma 4.4
(Rank Calculation). We have ρ ( Ω ) = ρ ( F 3 ( Ω ) ) = θ where θ is the least ordinal satisfying θ = 2 2 2 θ .
Proof. 
From Ω = A ⨿ F 3 ( Ω ) and ρ ( A ) < ρ ( Ω ) , we get:
ρ ( Ω ) = max ( ρ ( A ) , ρ ( F 3 ( Ω ) ) ) = ρ ( F 3 ( Ω ) ) 2 2 2 ρ ( Ω )
By Lemma 2.14(3), since ρ ( Ω ) < 2 2 2 ρ ( Ω ) , we have:
ρ ( A ⨿ F 3 ( Ω ) ) = ρ ( A ) + ρ ( F 3 ( Ω ) ) = ρ ( F 3 ( Ω ) )
Thus ρ ( Ω ) satisfies the fixed point equation ρ ( Ω ) = 2 2 2 ρ ( Ω ) .    □
Proof of Theorem 4.1.
We construct an isomorphism φ : Ω F 3 ( Ω ) .
Since Ω = A ⨿ F 3 ( Ω ) , we have morphisms i : F 3 ( Ω ) Ω (coproduct inclusion) and π : Ω F 3 ( Ω ) defined using the universal property of the colimit.
For π , we use that Ω = colim α < μ G α ( ) and define it via the cocone:
G α ( ) π α F 3 ( G α ( ) ) F 3 ( ι α , μ ) F 3 ( Ω )
where π α is the projection from G α ( ) = A ⨿ F 3 ( G α 1 ( ) ) when α is a successor.
We verify π i = id F 3 ( Ω ) and i π = id Ω . For the first equation, elements of F 3 ( Ω ) in the colimit come from some F 3 ( G α ( ) ) , and the composition follows the cocone definition. For the second equation, we use that Ω is the initial algebra for G (Theorem 4.5 below), which forces this equation.
Therefore Ω F 3 ( Ω ) .    □

4.3. Uniqueness Properties

Theorem 4.5
(Initial Algebra Characterization). The object Ω is the initial G-algebra, where G-algebras are pairs ( X , ξ ) with ξ : A ⨿ F 3 ( X ) X .
Proof. 
By construction, Ω = colim α < μ G α ( ) satisfies the universal property of the initial G-algebra. See [8].    □
Corollary 4.6
(Uniqueness up to Isomorphism). Any two objects satisfying X F 3 ( X ) with minimal rank are isomorphic.

4.4. Alternative Construction via Fixed Point Operators

We present an alternative construction using fixed point operators.
Construction 2 (Fixed Point Operator Construction). Define the operator Φ : Ord Ord by:
Φ ( α ) = sup ρ ( A ) , 2 2 2 α
The least fixed point of Φ is θ = 2 2 2 θ . We can construct Ω directly as:
Ω = colim α < θ H α ( A )
where H ( Y ) = Y ⨿ F 3 ( A ) and the colimit is taken over all α with ρ ( H α ( A ) ) < θ .

5. The Collapse to Depth 3

5.1. All Higher Depths Reduce to Depth 3

We now prove that depth 3 is optimal.
Theorem 5.1
(Collapse Theorem). Let F be explosive. For all n 3 :
Fix n ( F ) = Fix 3 ( F )
where Fix n ( F ) = X C : X F n ( X ) .
The proof requires careful analysis of how fixed points at different depths relate.
Lemma 5.2
(Divisibility by 3). If X F n ( X ) for n 3 , then 3 divides n.
Proof. 
Write n = 3 q + r where 0 r < 3 . From X F n ( X ) = F 3 q + r ( X ) , we get:
X F r ( F 3 q ( X ) )
Let Y = F 3 q ( X ) . If r = 1 , then X F ( Y ) , contradicting Theorem 3.4. If r = 2 , then X F 2 ( Y ) , contradicting Theorem 3.7. Thus r = 0 .    □
Lemma 5.3
(Powers of 3 Collapse). If X F 3 q ( X ) for q 1 , then X F 3 ( X ) .
Proof. 
We proceed by induction on q.
Base case ( q = 1 ): Trivial.
Inductive step: Assume the result for q. Suppose X F 3 ( q + 1 ) ( X ) = F 3 q + 3 ( X ) .
From X F 3 q ( F 3 ( X ) ) , the inductive hypothesis applied to Y = F 3 ( X ) gives Y F 3 ( Y ) , i.e., F 3 ( X ) F 3 ( F 3 ( X ) ) = F 6 ( X ) .
Now we analyze ranks. From X F 3 q + 3 ( X ) , we have ρ ( X ) = exp ( 3 q + 3 ) ( ρ ( X ) ) . From F 3 ( X ) F 6 ( X ) , we have ρ ( F 3 ( X ) ) = ρ ( F 6 ( X ) ) = exp ( 6 ) ( ρ ( X ) ) .
Since exp ( 3 ) ( ρ ( X ) ) = exp ( 6 ) ( ρ ( X ) ) and ρ ( X ) = exp ( 3 q + 3 ) ( ρ ( X ) ) , we must have ρ ( X ) = θ where θ = 2 2 2 θ .
Both X and the Ω from Theorem 4.1 have rank θ and satisfy the same universal property as initial algebras for appropriate functors. Therefore X Ω F 3 ( Ω ) F 3 ( X ) .    □
Proof of Theorem 5.1.
Immediate from Lemmas 5.3 and 5.4.    □

5.2. Structure of Fixed Points

Theorem 5.4
(Fixed Point Structure). Let F be explosive. Then every X Fix 3 ( F ) has rank θ where θ = 2 2 2 θ . The collection Fix 3 ( F ) forms a category with morphisms preserving the fixed point structure. There is a minimal element (up to isomorphism) given by the Ω from Theorem 4.1. If C has enough structure, Fix 3 ( F ) may form a complete lattice.

5.3. Non-minimality of Fixed Points

While Ω is minimal, there may be other fixed points.
Proposition 5.5
(Multiple Fixed Points). In Set with the power set functor, there are 2 2 0 non-isomorphic sets X with X P 3 ( X ) , all of the same cardinality.
Conjecture 5.6
(Uniqueness Dichotomy). For explosive endofunctors on accessible categories, either Fix 3 ( F ) contains a unique object up to isomorphism, or it contains a proper class of non-isomorphic objects. The dichotomy depends on whether the category admits canonical choices in transfinite constructions.

6. Examples and Applications

We examine detailed applications of our results.

6.1. Set Theory: Power Sets

Example 6.1
(Classical Power Set). In Set , the power set functor P ( X ) = 2 X is explosive. Our construction yields the following.
Let A = be a singleton. The transfinite construction gives G 0 ( ) = , then G 1 ( ) = ⨿ P 3 ( ) = ⨿ 0 , 1 , then G 2 ( ) = ⨿ P 3 ( 0 , 1 ) = ⨿ 2 2 2 2 , and so on.
The construction stabilizes at Ω with | Ω | = θ where θ = 2 2 2 θ .
Properties of Ω include: Ω contains a canonical copy of every smaller set, the isomorphism Ω P 3 ( Ω ) is non-constructive, and different choices in the construction yield non-isomorphic sets.
Theorem 6.2
(Consistency Strength). The existence of a set Ω with Ω P 3 ( Ω ) is equiconsistent with the existence of a strongly inaccessible cardinal.

6.2. Topos Theory

Example 6.3
(Subobject Classifier in Topoi). In a topos E with subobject classifier Ω, consider F ( X ) = Ω X .
For the topos Set , we have Ω = 0 , 1 and F ( X ) = 2 X is the power set functor.
For the topos Set G of G-sets (where G is a group), Ω is the set of subgroups of G with the conjugation action, and Ω X represents G-equivariant predicates on X.
Our theorem yields: No object classifies its own subobjects ( X Ω X ), no object classifies predicates on predicates ( X Ω Ω X ), and there exists Θ with Θ Ω Ω Ω Θ .
This provides a topos-theoretic resolution to semantic paradoxes.

6.3. Domain Theory

Example 6.4
(Recursive Domain Equations). Consider solving recursive domain equations in the category of Scott domains.
For the functor F ( D ) = [ D D ] (lifted continuous function space), attempted depth-1 solution D [ D D ] fails by our theorem. Intuitively, the function space is “too large” to be isomorphic to the domain itself.
Attempted depth-2 solution D [ [ D D ] [ D D ] ] also fails. The double function space grows too rapidly.
Successful depth-3 solution D [ [ [ D D ] [ D D ] ] [ [ D D ] [ D D ] ] ] succeeds. The solution D can be constructed as:
D = colim n < ω D n
where D 0 = and D n + 1 = [ [ [ D n D n ] [ D n D n ] ] [ [ D n D n ] [ D n D n ] ] ] .
This domain D has rich structure and can model sophisticated recursive computations.

6.4. Type Theory

Example 6.5
(Universe Hierarchies in Type Theory). In Martin-Löf Type Theory with a hierarchy of universes U 0 : U 1 : U 2 : , consider the “next universe” functor.
Our results explain why U i : U i leads to Girard’s paradox, U i + 1 : U i is consistent but U i : U i + 1 is not, and we can have U ω : U ω + 3 where U ω = n < ω U n .
This suggests a “depth-3 closure” principle for universe hierarchies:
U α : U α + 3 for limit ordinals α

6.5. Category Theory

Example 6.6
(Presheaf Categories). Let M be the category associated to an infinite monoid M. Consider Psh ( M ) = Set M op with the functor F ( P ) = P M where M is viewed as a presheaf via the Yoneda embedding.
The explosive nature of F comes from:
| F ( P ) ( ) | = | P ( ) | | M |
Our construction yields a presheaf Ω with:
Ω ( ( ( Ω M ) M ) M )
Concretely, Ω ( ) is a set of cardinality θ = 2 2 2 θ , and the M-action on Ω ( ) encodes a rich equivariant structure.
Applications include representation theory (Ω is a universal M-set for certain constructions), categorical logic (Ω models self-referential predicates in the internal logic), and topos theory (similar constructions work for any Grothendieck topos).

7. Computational Aspects

7.1. Computational Complexity

While our existence results are non-constructive, we can analyze the computational aspects.
Definition 7.1
(Computable Explosive Functor). An explosive endofunctor F : C C is computable if objects and morphisms in C have finite descriptions, there is an algorithm computing F ( X ) from a description of X, and the rank function ρ is computable.
Theorem 7.2
(Computational Hardness). For computable explosive functors, deciding whether X F ( X ) is Π 1 0 -complete, deciding whether X F 3 ( X ) is Σ 1 1 -complete, and no computable function can output a description of Ω satisfying Ω F 3 ( Ω ) .
Proof sketch.
The first claim reduces to the halting problem via diagonalization. The second requires quantifying over all possible isomorphisms. The third follows because the rank θ = 2 2 2 θ is not computably enumerable.    □

7.2. Approximate Fixed Points

Since exact fixed points are non-computable, we consider approximations.
Definition 7.3
(Approximate Fixed Point). X is an ε-approximate depth-3 fixed point if there exist morphisms:
f : X F 3 ( X ) , g : F 3 ( X ) X
such that | g f id X | < ε and | f g id F 3 ( X ) | < ε in some suitable metric.
For iterative approximation, initialize with X 0 = A . At each step, compute X n + 1 = A ⨿ F 3 ( X n ) . Continue until d ( X n , X n + 1 ) < ε for the chosen metric. The output X n is an ε -approximate fixed point.
Theorem 7.4
(Convergence of Approximation). Under suitable metric conditions, the iterative approximation converges to an ε-approximate fixed point in O ( log ( 1 / ε ) ) iterations.

7.3. Fixed Points in Constructive Mathematics

Proposition 7.5
(Constructive Considerations). In constructive mathematics (without excluded middle or choice), the impossibility results (Theorems 3.4, 3.7) remain valid, the existence of depth-3 fixed points requires additional axioms, and the collapse theorem needs modification.
Proof sketch.
The impossibility proofs use only constructive reasoning. The existence proof requires transfinite induction (requires some choice), the existence of the stabilization ordinal μ (non-constructive), and the explicit isomorphism Ω F 3 ( Ω ) (requires excluded middle).    □
Conjecture 7.6
(Constructive Threshold Shift). In constructive mathematics with only bounded forms of choice, the minimal depth for fixed points of explosive endofunctors increases from 3 to 4. More precisely, in CZF (Constructive Zermelo-Fraenkel set theory), depth-3 fixed points exist only for functors with additional continuity properties, while depth-4 fixed points exist for all explosive functors.

8. Connections to Other Areas

8.1. Large Cardinals

Our results connect intimately with large cardinal theory.
Theorem 8.1
(Large Cardinal Characterization). In Set , the following are equivalent: There exists a set Ω with Ω P 3 ( Ω ) . There exists a cardinal θ with θ = 2 2 2 θ . There exists a weakly inaccessible cardinal.
Proof. (1) ⇒ (2): Take θ = | Ω | .
(2) ⇒ (3): Such a θ is weakly inaccessible: it’s uncountable, a limit cardinal (since θ > 2 2 κ for all κ < θ ), and closed under exponentiation.
(3) ⇒ (1): If κ is weakly inaccessible, then the least θ κ with θ = 2 2 2 θ exists, and our construction yields the required Ω .    □
Remark 8.2
(Consistency Strength Hierarchy). The depth-3 phenomenon creates a hierarchy. Depth 1 is provably impossible in ZFC. Depth 2 is provably impossible in ZFC. Depth 3 requires inaccessible cardinal. Depth 3 n requires n-inaccessible cardinal.

8.2. Proof Theory

Theorem 8.3
(Proof-Theoretic Analysis). The proof-theoretic ordinal of the theory “ZFC + depth-3 fixed points exist” is the first fixed point of the function α Ω α where Ω α is the α-th uncountable ordinal.

8.3. Homotopy Theory

In homotopy theory, our results have analogues for spaces and spectra.
Conjecture 8.4
(Homotopical Depth-3). In the ∞-category of spectra, for suitable “explosive” endofunctors F, the minimal n such that there exists X with X F n ( X ) is also 3.
Example 8.5
(Suspension Spectrum Functor). Consider the suspension spectrum functor Σ : Spaces Spectra composed with suitable “explosive” operations. The depth-3 phenomenon may manifest in the existence of certain self-maps of spectra.

8.4. Model Theory

Theorem 8.6
(Model-Theoretic Interpretation). In the category of models of a first-order theory T: If T has a definable explosive functor, then T cannot have a model M with M F ( M ) . If T is sufficiently strong, it can have models M with M F 3 ( M ) . The minimal theories allowing depth-3 fixed points correspond to fragments of set theory.
Conjecture 8.7
(Model-Theoretic Complexity). The minimal first-order theory T admitting models with depth-3 fixed points has exactly the same consistency strength as KP (Kripke-Platek set theory) plus the existence of an inaccessible cardinal. Moreover, the complexity of the formula defining the isomorphism M F 3 ( M ) is exactly Σ 3 in the Lévy hierarchy.

8.5. Computer Science Applications

Example 8.8
(Recursive Types in Programming Languages). In programming language theory, illegal depth-1 constructions like type T = T -> T would create a type isomorphic to its own function space. Illegal depth-2 constructions like type T = (T -> T) -> (T -> T) are still impossible by our theorem. Legal depth-3 constructions like type T = ((T -> T) -> (T -> T)) -> ((T -> T) -> (T -> T)) can be implemented using recursive type constructors.
Our theorem explains why certain type systems require explicit recursion operators: direct self-reference is impossible, but depth-3 self-reference is achievable.

9. Discussion and Implications

9.1. The Significance of 3

Why does 3 emerge as the critical depth? Several perspectives emerge. From cardinal arithmetic, at depth 3 we first achieve κ + 2 2 2 κ = 2 2 2 κ . This “absorption” property is crucial for the construction. From logical complexity, three levels of quantification suffice to express most mathematical statements. The depth-3 threshold may reflect this logical completeness. From categorical structure, three iterations allow enough “room” for the initial algebra construction to stabilize.

9.2. Philosophical Implications

The results suggest several philosophical implications. True self-reference requires exactly three levels of indirection. Classical paradoxes arise from attempting insufficient depth. The existence of depth-3 fixed points suggests mathematics has intrinsic recursive structure. The depth-3 threshold provides a new perspective on the limits of formal systems.
Conjecture 9.1
(Universal Depth-3 Principle). The depth-3 phenomenon extends beyond mathematics to any formal system capable of encoding self-reference. Specifically, in any sufficiently expressive formal system with a notion of “size” or “complexity,” self-referential constructions become possible at exactly depth 3 of iteration.

9.3. Connections to Classical Results

Our framework unifies several classical theorems. Cantor’s Theorem is the non-existence of depth-1 fixed points for P . Russell’s Paradox is a failed depth-1 construction. Burali-Forti Paradox shows no depth-1 fixed point for Ord exists. Gödel Incompleteness demonstrates no depth-1 truth predicate exists. Tarski Undefinability shows no depth-1 satisfaction relation exists.

9.4. Future Directions

This work opens several research directions. Can “explosive” be replaced by weaker growth conditions? Do enriched, higher, or derived categories exhibit similar thresholds? Can we develop practical algorithms for approximate fixed points? What other areas of mathematics exhibit depth-3 phenomena?

10. Open Problems

We conclude with a collection of open problems.

10.1. Characterization Problems

Problem 1. Characterize precisely which endofunctors exhibit the depth-3 phenomenon. Is exponential growth necessary, or merely sufficient?
Problem 2. For functors with polynomial growth ρ ( F ( X ) ) = ρ ( X ) k , what is the minimal depth for fixed points? Does it depend on k?
Problem 3. Are there functors with growth strictly between polynomial and exponential? What are their fixed point depths?

10.2. Categorical Generalizations

Problem 4. In V -enriched categories, does the depth-3 phenomenon persist? How does it depend on V ?
Problem 5. For ( , n ) -categories, is there an analogous threshold? Does it remain 3 or change with n?
Problem 6. In monoidal categories, how do tensor products interact with the depth-3 phenomenon?

10.3. Connections to Logic and Set Theory

Problem 7. Is there a complexity-theoretic characterization of the depth-3 threshold? Does it appear in descriptive complexity?
Problem 8. Can forcing techniques be used to separate different depths? Is the depth-3 threshold absolute?
Problem 9. In alternative set theories (NF, positive set theory), does the threshold change?

10.4. Constructive and Computational Aspects

Problem 10. Develop a fully constructive version of the depth-3 theorem. What axioms are minimal?
Problem 11. For which categories can the construction of Ω be made effective? What are the computational bounds?
Problem 12. Design efficient algorithms for approximate depth-3 fixed points in concrete categories.

10.5. Applications and Connections

Problem 13. Do depth-3 phenomena appear in mathematical physics? Consider categories of quantum systems or spacetimes.
Problem 14. In algebraic categories (groups, rings, modules), which functors exhibit the depth-3 phenomenon?
Problem 15. For endofunctors on topological spaces, is there a topological characterization of the depth-3 threshold?

11. Conclusions

We have established a universal threshold phenomenon for recursive fixed points of explosive endofunctors on accessible categories. The impossibility of fixed points at depths 1 and 2, combined with their existence at depth 3 and the collapse of all higher depths, reveals 3 as a fundamental constant in the theory of mathematical self-reference.
This work contributes to our understanding of self-referential constructions in mathematics, showing that classical impossibility results reflect insufficient recursive depth rather than absolute barriers. The emergence of 3 as a universal threshold across diverse mathematical structures—from set theory to type theory, from domain theory to topos theory—suggests deep underlying principles governing self-reference.
The depth-3 phenomenon provides both theoretical insights and practical guidance. Theoretically, it offers a new lens through which to view classical paradoxes and impossibility results. Practically, it informs the design of type systems, the construction of semantic domains, and the understanding of large cardinals.
Future work should explore the boundaries of this phenomenon, its constructive content, and connections to other areas of mathematics and logic. The depth-3 threshold stands as a signpost in the landscape of mathematical self-reference, marking the precise point where the impossible becomes possible.

Acknowledgements

We would like to thank all those who came before.

References

  1. Scott, D.S. Data types as lattices. SIAM J. Comput. 1976, 5, 522–587. [Google Scholar] [CrossRef]
  2. Voevodsky, V. A very short note on the homotopy λ-calculus. Unpublished note, 2006.
  3. Russell, B. The Principles of Mathematics; Cambridge University Press: Cambridge, UK, 1903. [Google Scholar]
  4. Cantor, G. Über eine elementare Frage der Mannigfaltigkeitslehre. Jahresber. Deutsch. Math.-Ver. 1891, 1, 75–78. [Google Scholar]
  5. Gödel, K. Über formal unentscheidbare Sätze der Principia Mathematica und verwandter Systeme. Monatsh. Math. 1931, 38, 173–198. [Google Scholar] [CrossRef]
  6. Lawvere, F.W. Diagonal arguments and cartesian closed categories. In Category Theory, Homology Theory and their Applications II; Springer: Berlin, Germany, 1969; pp. 134–145. [Google Scholar]
  7. Makkai, M.; Paré, R. Accessible Categories: The Foundations of Categorical Model Theory; Contemporary Mathematics; American Mathematical Society: Providence, RI, USA, 1989. [Google Scholar]
  8. Adámek, J.; Rosický, J. Locally Presentable and Accessible Categories; London Mathematical Society Lecture Note Series; Cambridge University Press: Cambridge, UK, 1994. [Google Scholar]
  9. Lambek, J. A fixpoint theorem for complete categories. Math. Z. 1968, 103, 151–161. [Google Scholar] [CrossRef]
  10. Shulman, M. Set theory for category theory. arXiv:0810.1279, 2008.
  11. Smyth, M.B.; Plotkin, G.D. The category-theoretic solution of recursive domain equations. SIAM J. Comput. 1982, 11, 761–783. [Google Scholar] [CrossRef]
  12. Rathjen, M. The art of ordinal analysis. In Proceedings of the International Congress of Mathematicians; 2006.
  13. Aczel, P. Non-well-founded Sets; CSLI Lecture Notes; Stanford University: Stanford, CA, USA, 1988. [Google Scholar]
  14. Jech, T. Set Theory: The Third Millennium Edition; Springer Monographs in Mathematics; Springer: Berlin, Germany, 2003. [Google Scholar]
  15. Johnstone, P.T. Sketches of an Elephant: A Topos Theory Compendium; Oxford Logic Guides; Oxford University Press: Oxford, UK, 2002. [Google Scholar]
  16. Joyal, A. The theory of quasi-categories and its applications. Lectures at CRM Barcelona, 2008.
  17. Kanamori, A. The Higher Infinite; Springer Monographs in Mathematics; Springer: Berlin, Germany, 2008. [Google Scholar]
  18. Leinster, T. Higher Operads, Higher Categories; London Mathematical Society Lecture Note Series; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  19. Lurie, J. Higher Topos Theory; Annals of Mathematics Studies; Princeton University Press: Princeton, NJ, USA, 2009. [Google Scholar]
  20. Mac Lane, S. Categories for the Working Mathematician; Graduate Texts in Mathematics; Springer: Berlin, Germany, 1998. [Google Scholar]
  21. Tarski, A. Der Wahrheitsbegriff in den formalisierten Sprachen. Studia Philosophica 1936, 1, 261–405. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated