Next Article in Journal
Super Resolution for Noisy Images Using Convolutional Neural Networks
Next Article in Special Issue
Reciprocal Formulae among Pell and Lucas Polynomials
Previous Article in Journal
A Simple Affine-Invariant Spline Interpolation over Triangular Meshes
Previous Article in Special Issue
On Two Problems Related to Divisibility Properties of z(n)
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Rings of Multisets and Integer Multinumbers

Faculty of Mathematics and Computer Science, Vasyl Stefanyk Precarpathian National University, 57 Shevchenka Str., 76018 Ivano-Frankivsk, Ukraine
*
Author to whom correspondence should be addressed.
Submission received: 27 December 2021 / Revised: 21 February 2022 / Accepted: 25 February 2022 / Published: 28 February 2022
(This article belongs to the Special Issue New Insights in Algebra, Discrete Mathematics and Number Theory II)

Abstract

:
In the paper, we consider a ring structure on the Cartesian product of two sets of integer multisets. In this way, we introduce a ring of integer multinumbers as a quotient of the Cartesian product with respect to a natural equivalence. We examine the properties of this ring and construct some isomorphisms to subrings of polynomials and Dirichlet series with integer coefficients. In addition, we introduce finite rings of multinumbers “modulo ( p , q ) ” and propose an algorithm for construction of invertible elements in these rings that may be applicable in Public-key Cryptography. An analog of the Little Fermat Theorem for integer multinumbers is proved.

1. Introduction

Permutation-invariant objects naturally appear when we work with a large amount of information that does not depend on the order. Such a situation is typical, for example, in Quantum Statistical Physics, Data Science, Neural-Network Theory (see e.g., [1,2] and references cited therein). A multiset, defined as an unordered collection of elements that may be repeated, is a good tool for modeling such objects. Semiring algebraic structures on multisets and their applications for neural networks were considered in [3] (see also [4] for a more general context).
A set of finite multisets can be represented as the quotient set of the linear space Λ of all finite sequences with respect to the following equivalence: two vectors in Λ are equivalent if they are equal to each other up to a permutation of coordinates. Thus, we can consider a finite multiset of nonzero elements x = { x 1 , , x n } as a class of the equivalence containing the vector ( x 1 , , x n , 0 , ) Λ . It is possible to introduce some algebraic operations on the set of multisets. We denote by x z the union of two multisets x and z , and by x z their product—that is, a multiset consisting of all products x i z j of elements x and z . The set of finite multisets is a commutative semiring with respect to these operations [5,6]. The semiring structure is not rich enough. However, since we have a commutative semigroup with the cancellation law with respect to “•”, we can apply the Grothendieck construction to embed it to a commutative group and extend the multiplication “⋄” by the distributivity. Such a ring of multisets M 0 was constructed in [6] using symmetric and supersymmetric polynomials on a Banach space (see also [7]). More details about algebras of symmetric polynomials on Banach spaces can be found in [8,9,10,11,12,13,14]. The combinatorial approach to symmetric polynomials can be found in [15]. Discrete dynamic systems based on M 0 were considered in [16]. Systematic theory of multisets can be found in [17].
In this paper, we consider the subring Z of M 0 comprising multisets with positive integer elements. The subring Z contains an isomorphic copy of the ring of integers and so can be considered as a generalization of integer numbers. We call Z the ring of multinumbers. We study properties of Z and some finite rings of multinumbers “modulo ( p , q ) ”, and propose some applications of the finite rings to Cryptography.
In Section 2, we provide some definitions and preliminary results. In Section 3, we establish basic properties of the ring Z , construct isomorphisms of Z to a ring of polynomials of infinitely many variables with entire coefficients, and deduce from here some properties of Z . Further, we show that Z is isomorphic to a ring of Dirichlet series with entire coefficients. In Section 4, we introduce finite rings of multinumbers Z ( p , q ) , which are generalizations of Z p . The main result of this section is Theorem 4, where we found some conditions under which an element in Z ( p , q ) is invertible. Moreover, an analogue of the Little Fermat Theorem for multinumbers is proved. In Section 5, we propose an algorithm of encryption and decryption involving integer multinumbers.
For more details about applications of Number Theory to Cryptography, we refer the reader to [18,19,20].

2. Definitions and Preliminaries

Let K be the notation for one of the following sets: the set of complex numbers C , the set of integers Z , or the set of natural numbers N . Further, we use Z + for the set of nonnegative integers. We denote by Λ K the set of infinite-dimensional vectors ( x 1 , x 2 , , x n , 0 , 0 , ) —that is, vectors with finitely many nonzero coordinates in K , and by K the set all vectors (infinity sequences) ( x 1 , x 2 , , x n , ) , x j K , j N . Let us consider the Cartesian product
Λ K × Λ K = { ( y | x ) = ( , 0 , y m , , y 1 | x 1 , , x n , 0 , ) : x , y Λ K } .
For given permutations σ , τ on the set of natural numbers N and
( , 0 , y m , , y 1 | x 1 , , x n , 0 , ) Λ K
we denote
τ ( , 0 , y m , , y 1 ) | σ ( x 1 , , x n , 0 , ) = ( , 0 , y τ ( m ) , , y τ ( 1 ) | x σ ( 1 ) , , x σ ( n ) , 0 , ) .
We introduce the following relation of equivalence on Λ K × Λ K . Let ( y | x ) = ( , 0 , y m , , y 1 | x 1 , , x n , 0 , ) and ( y | x ) = ( , 0 , y m , , y 1 | x 1 , , x n , 0 , ) in Λ K . We say that ( y | x ) ( y | x ) if and only if there are a = ( a 1 , , a k , 0 , ) and b = ( b 1 , , b j , 0 , ) in Λ K and permutations σ and τ on N such that
τ ( , 0 , y m , , y 1 , a 1 , , a k ) | σ ( a 1 , , a k , x 1 , , x n , 0 , )
= ( , 0 , y m , , y 1 , b 1 , , b j | b 1 , , b j , x 1 , , x n , 0 , ) .
The quotient set with respect to the equivalence, M 0 = Λ C × Λ C / , and its completion in the metric of the absolute convergence M were considered in [6]. It is easy to see that the class [ ( y | x ) ] containing ( y | x ) is invariant with respect to the minimal semigroup of mappings from Λ C × Λ C to itself containing operators of permutation of the bases of Λ C separately on each Λ C and affine operators
( , 0 , y m , , y 1 | x 1 , , x n , 0 , ) ( , 0 , y m , , y 1 , a 0 | a 0 , x 1 , , x n , 0 , )
for every a 0 K . Let us denote by Z the set Λ N × Λ N / .
Consider the following mappings on Λ C × Λ C (so-called supersymmetric polynomials):
T k ( y | x ) = i = 1 x i k j = 1 y j k , k Z + .
Here, for the case k = 0 , we assume that 0 0 = 0 . In other words, T 0 ( y | x ) = | supp x | | supp y | , where | A | is the cardinality of a given set A and supp x = { i N : x i 0 } .
It is easy to check that if ( y | x ) ( y | x ) , then T k ( y | x ) = T k ( y | x ) for every k Z + because
T k ( , 0 , y m , , y 1 , a 1 , , a j | a 1 , , a j , x 1 , , x n , 0 , )
= i = 1 n x n k + i = 1 j a i k i = 1 j a i k i = 1 m y i k = T k ( , 0 , y m , , y 1 | x 1 , , x n , 0 , ) .
Next, we will show that the inverse statement is also true.
Using ideas from [6,9,10] introduced algebraic operations of “addition” and “multiplication” on M 0 . Let z = ( y | x ) , z = ( y | x ) Λ C × Λ C , and [ z ] , [ z ] M 0 be classes that contain z and z , respectively. Then, we set
[ z ] + [ z ] = [ z z ] : = [ ( , y n , y n , , y 1 , y 1 | x 1 , x 1 , , x n , x n , ) ] .
For every [ z ] M 0 there is an inverse element [ z ] , defined by [ ( y | x ) ] = [ ( x | y ) ] . Thus, ( M 0 , + ) is a commutative group with zero 0 = [ ( 0 | 0 ) ] . Clearly, the operations “+” and taking of inverse do not depend on representatives.
In [6] (Theorem 1) it was observed that [ z ] = 0 if and only if T k ( z ) = 0 for every k Z + . Since T k ( z z ) = T k ( z ) + T k ( z ) , we have the following proposition.
Proposition 1.
z z if and only if T k ( z ) = T k ( z ) for every k Z + .
For given x and x in Λ C , x x denotes the resulting sequence of ordering the set { x i y j : i , j N } with one single index in some fixed order. So, we can define
[ z ] [ z ] = [ ( ( y x ) ( x y ) | ( y y ) ( x x ) ) ] .
To check that the multiplication does not depend on representatives, we observe that
T k ( z z ) = T k ( z ) T k ( z ) , k Z +
(see for the proof [6] (Proposition 5)). Thus, if u z and u z , then T k ( z z ) = T k ( u u ) , and so, by Proposition 1, z z u u .
Note that elements of the form [ ( 0 | x ) ] may be considered as finite multisets—that is, unordered collections of numbers with possible repetitions. Let M 0 + = { [ ( 0 | x ) ] : x Λ C } . Then, ( M 0 + , + , · ) is a commutative semiring. Since its additive semigroup ( M 0 + , + ) is cancellative—that is, z + u = z + v implies u = v for all u , v , z ( M 0 + ) —it follows that it can be isomorphically embedded into some commutative group (so-called the Grothendieck group) using a simple Grothendieck idea, which is the starting point of K-theory (see e.g., [21]). From this point of view, ( M 0 ) is the Grothendieck group, associated with ( M 0 + ) .
Often, we will use notations [ ( y m , , y 1 | x 1 , , x n ) ] instead of
[ ( , 0 , y m , , y 1 | x 1 , , x n , 0 , ) ] .
Theorem 1.
(See Theorem 4 and Example 1 in [6]). ( M 0 , + , · ) is a commutative ring with zero 0 = [ ( 0 | 0 ) ] and unity I = [ ( 0 | 1 ) ] . Functions τ k : M 0 C ,
τ k [ z ] = T k ( z ) , k Z +
are ring homomorphisms.
Example 1.
Let [ z ] = [ ( 2 | 1 ) ] , [ u ] = [ ( 1 , 2 | 3 ) ] , and [ v ] = [ ( 1 | 1 , 2 ) ] . Then,
[ u ] + [ v ] = [ ( 1 , 2 | 3 ) ] + [ ( 1 | 1 , 2 ) ] = [ ( 1 , 2 , 1 | 1 , 2 , 3 ) ] = [ ( 1 | 3 ) ] ;
[ z ] ( [ u ] + [ v ] ) = [ ( 2 | 1 ) ] [ ( 1 | 3 ) ] = [ ( 6 , 1 | 2 , 3 ) ] ;
[ z ] [ u ] + [ z ] [ v ] = [ ( 2 | 1 ) ] [ ( 1 , 2 | 3 ) ] + [ ( 2 | 1 ) ] [ ( 1 | 1 , 2 ) ]
= [ ( 6 , 1 , 2 | 2 , 3 , 4 ) ] + [ ( 1 , 2 , 4 | 2 , 1 , 2 ) ] = [ ( 6 , 1 | 2 , 3 ) ] = [ z ] ( [ u ] + [ v ] ) .
We call elements in M 0 by complex multinumbers, in Z by integer multinumbers, and in N : = { [ 0 | x ] : x Λ N } by natural multinumbers. Note that N = Λ N / and ( N , + , · ) is a semiring of ( Z , + , · ) .

3. Basic Properties of Multinumbers

Proposition 2.
Z is a subring of M 0 and functions τ k , k Z + , restricted to Z , are ring homomorphisms from Z to Z .
Proof. 
Clearly, if [ z ] and [ z ] are in Z , then [ z ] + [ z ] Z and [ z ] [ z ] Z . So, Z is a subring. Further, τ k [ z ] Z if [ z ] Z and k Z + .
We will use notations n = ( n 1 , n 2 , ) for a typical element in Λ N and v = [ ( m | n ) ] for a typical element in Z . Let j Z . We denote by j v = j [ ( m | n ) ] = v + + v j if j > 0 and j v = ( j ) ( v ) if j < 0 , where v = [ ( n | m ) ] . In particular, j I = [ ( 0 | 1 , , 1 j ) ] , where I = ( 0 | 1 ) is the unity in Z . Note that j v [ ( 0 | j ) ] v = [ ( , j m 2 , j m 1 | j n 1 , j n 2 , ) ] .
Proposition 3.
The map j j I is an injective homomorphism from Z into Z .
Proof. 
It is easy to check that ( i + j ) I = i I + j I and i j I = i I j I . Further, i I j I if i j .
Thus, we have that Z contains an isomorphic copy of Z —that is, we can consider Z as a generalization of Z .
Let Z [ C ] be the ring of formal polynomials over Z on the set C of all sequences of complex numbers—that is, every Q Z [ C ] is of the form
Q ( t ) = Q ( t 1 , t 2 , ) = n 1 , , n m c n 1 , , n m t n 1 k 1 t n m k m
for some m , k i Z + , c n 1 , , n m Z and the right side series contains a finite number of nonzero terms.
Note that M 0 has divisors of zero; for example, [ ( 1 | 1 ) ] [ ( 0 | 1 , 1 ) ] = 0 . We will show that for Z , it is not so.
Theorem 2.
There is a ring isomorphism ν : Z Z [ C ] .
Proof. 
Let { p n } n = 1 = { 2 , 3 , 5 , } be the sequence of prime numbers. Let a N and a = p 1 k 1 p n k n . We set ν 0 ( a ) = t 1 k 1 t n k n Z [ C ] . Note that ν 0 ( 1 ) = 1 . Let us define ν by
ν [ ( m | n ) ] ( t ) : = i ν 0 ( n i ) j ν 0 ( m j ) ,
where t = ( t 1 , t 2 , ) C . If ( m | n ) ( m | n ) , then
( m a | n a ) = ( m b | n b )
for some a , b Λ N ; so, ν [ ( m | n ) ] ( t ) = ν [ ( m | n ) ] ( t ) . Thus, the definition of ν does not depend on the representative.
Clearly, if [ ( m | n ) ] 0 , then ν [ ( m | n ) ] ( t ) 0 and so ν is injective. It it easy to check that ν is additive and multiplicative. The preimage of r t 1 k 1 t n k n is equal to r [ ( 0 | p 1 k 1 p n k n ] and ν 1 ( j ) = j I —that is, ν is subjective. So, ν is an isomorphism. □
Since Z [ C ] is an integral domain, we have the following corollary.
Corollary 1.
The ring Z is an integral domain and every element in Z has a unique representation by the product of irreducible elements.
Example 2.
Let us factor the element [ ( 16 | 1 ) ] into a product of irreducible elements in Z . By Theorem 2,
ν [ ( 16 | 1 ) ] ( t ) = 1 t 1 4 = ( 1 t 1 ) ( 1 + t 1 ) ( 1 + t 1 2 ) .
Thus,
[ ( 16 | 1 ) ] = [ ( 2 | 1 ) ] [ ( 0 | 1 , 2 ) ] [ ( 0 | 1 , 4 ) ] .
Since polynomials 1 t 1 , 1 + t 1 , and 1 + t 1 2 are irreducible in Z [ C ] , elements [ ( 2 | 1 ) ] , [ ( 0 | 1 , 2 ) ] , and [ ( 0 | 1 , 4 ) ] are irreducible in Z .
Corollary 2.
For every permutation σ on the set of prime numbers σ : ( p 1 , p 2 , ) ( p σ ( 1 ) , p σ ( 2 ) , ) , there exists a ring isomorphism Φ σ : Z Z such that
Φ σ ( [ ( 0 | p 1 k 1 p n k n , 0 , ) ] ) = [ ( 0 | p σ ( 1 ) k 1 p σ ( n ) k n , 0 , ) ] .
Proof. 
For every permutation σ , the mapping ν Φ σ ν 1 is a ring isomorphism of Z [ C ] to itself, since
ν Φ σ ν 1 ( Q ) ( t 1 , t 2 , ) = Q ( t σ ( 1 ) , t σ ( 2 ) , ) , Q Z [ C ] ,
and ( t 1 , t 2 , ) ( t σ ( 1 ) , t σ ( 2 ) , ) is a linear isomorphism of the linear space C . Indeed, if P ( t ) = ν ( u ) ( t ) and Q ( t ) = ν ( v ) ( t ) , then
Φ σ ( u v ) = ν Φ σ ν 1 ( P ( t ) Q ( t ) ) = P ( t σ ( 1 ) , t σ ( 2 ) , ) Q ( t σ ( 1 ) , t σ ( 2 ) , ) = Φ σ ( u ) Φ σ ( v ) .
By the same reason, Φ σ ( u + v ) = Φ σ ( u ) + Φ σ ( v ) .
Corollary 3.
For every fixed t C ( t Z ), there is a ring homomorphism ψ t : Z C (resp. ψ t : Z Z ) defined by
ψ t ( u ) = ν ( u ) ( t ) .
Conversely, any ring homomorphism from Z to C (from Z to Z ) can be defined by (1) for some t C (resp. t Z ).
Proof. 
It is clear that ψ t is a homomorphism and the range of ψ t is in Z if t Z . Let ψ : Z C be a homomorphism. Let us define t by
t = ( ψ ( ( 0 | p 1 ) ) , ψ ( ( 0 | p 2 ) ) , , ψ ( ( 0 | p n ) ) , ) C .
Then, ψ ( u ) = ν ( u ) ( t ) = ψ t ( u ) for every u Z . If ψ is a homomorphism from Z to Z , then ψ ( 0 | p n ) Z for every n; so, t Z .
Corollary 4.
Let us suppose that u 1 , , u n Z and polynomials ν ( u 1 ) ( t ) , , ν ( u n ) ( t ) , t C have no common zeros in C . Then, there are v 1 , , v n Z and a positive integer j such that
k = 1 n u k v k = j I .
Proof. 
Let N be a maximal natural number such that polynomials ν ( u 1 ) ( t ) , , ν ( u n ) ( t ) depend on t 1 , , t N . So, ν ( u 1 ) ( t ) , , ν ( u n ) ( t ) have no common zeros in C N . By the Hilbert Nullstellensatz, there are polynomials Q 1 ( t ) , , Q n ( t ) on C N such that
k = 1 n ν ( u k ) ( t ) Q k ( t ) = 1 t C N .
Since all polynomials ν ( u k ) Z [ t 1 , , t N ] Q [ t 1 , , t N ] , polynomials Q k are in Q [ t 1 , , t N ] [22] (Ch. VII, Theorem 14)—that is, all coefficients of Q k are rational numbers. Let j be the common denominator of all coefficients of all Q k , k = 1 , , n . Then, we can write
k = 1 n ν ( u k ) ( t ) P k ( t ) = j ,
where P k = j Q k Z [ t 1 , , t N ] . Setting v k = ν 1 ( P k ) , k = 1 , , N , we have the required identity. □
Example 3.
Let u = [ ( 0 | 1 , 1 , 2 ) ] and v = [ ( 0 | 1 , 2 , 2 ) ] . Then, ν ( u ) ( t ) = 2 + t 1 and ν ( v ) ( t ) = 1 + 2 t 1 have no common zeros. Clearly, 2 ν ( u ) ν ( v ) = 3 . Hence,
2 u v = 3 I , t h a t   i s , [ ( 0 | 1 , 1 ) ] [ ( 0 | 1 , 1 , 2 ) ] + [ ( 1 | 0 ) ] [ ( 0 | 1 , 2 , 2 ) ] = [ ( 0 | 1 , 1 , 1 ) ] .
Note that elements of the form j I , j > 1 , are not invertible even in the ring of multisets M [6] (Proposition 10).
Let us denote
D ( u 1 , , u n ) = a 1 u 1 k 1 + + a n u n k n ,
for some fixed a 1 , , a n Z and k 1 , , k n N . We say that the equation
D ( u 1 , , u n ) = 0
is a Diophantine equation for undetermined multinumbers u 1 , , u n .
Example 4.
Let us solve the following equation
[ ( 0 | 1 , 3 ) ] u = [ ( 1 , 3 | 2 , 6 ) ] .
By Theorem 2,
ν [ ( 0 | 1 , 3 ) ] ( t ) ν ( u ) ( t ) = ν [ ( 1 , 3 | 2 , 6 ) ] ( t )
and so,
( t 2 + 1 ) ν ( u ) ( t ) = t 1 + t 1 t 2 t 2 1 ,
ν ( u ) ( t ) = t 1 + t 1 t 2 t 2 1 t 2 + 1 = t 1 1 .
Hence, u = ν 1 ( t 1 1 ) = [ ( 1 | 2 ) ] .
The following proposition is obvious.
Proposition 4.
If a Diophantine equation D ( u 1 , , u n ) = 0 has a solution ( v 1 , , v n ) , then ( ϕ ( v 1 ) , , ϕ ( v n ) ) is a solution of the following Diophantine equation in integers
ϕ ( a 1 ) ϕ ( u 1 ) k 1 + + ϕ ( a n ) ϕ ( u n ) k n = 0
for every homomorphism ϕ : Z Z .
From this proposition, in particular, it follows that if a Diophantine equation has no solution in Z , then it has no solution in Z .
Another representation of Z can be given by a ring of finite Dirichlet series. Let us recall that a formal series of the form
d ( s ) = n = 1 a n n s , a n , s C ,
is a Dirichlet series. We denote by D 0 ( Z ) the subset of finite Dirichlet series with coefficients a n Z . Clearly, D 0 ( Z ) is a ring with respect to usual addition and multiplication. The next proposition follows from direct calculations.
Proposition 5.
The following map is a ring isomorphism from Z to D 0 ( Z )
Ψ : [ ( m | n ) ] i 1 n i s j 1 m j s .
Combining isomorphisms Ψ and ν , we can see that Ψ ν 1 is a ring isomorphism from Z [ C ] to D 0 ( Z ) ,
Ψ ν 1 : m t 1 k 1 t r k r m p 1 k 1 p r k r s .
Such an isomorphism is well-known in a more general context and is called the Borh transform. It can be extended to a map
n a n z 1 k 1 z r k r n a n n s ,
where n = p 1 k 1 p r k r , a n C , ( z 1 , z 2 , ) c 0 , and is an isomorphism from the algebra H ( B c 0 ) of bounded holomorphic functions on the unit ball of the Banach space c 0 of convergent to zero sequences to the Banach algebra H of Dirichlet series d ( s ) = n = 1 a n n s such that
d = sup Re ( s ) > 0 | d ( s ) | <
(see for details [23] (p. 85)). Thus, from Corollary 4, we have the following result.
Corollary 5.
Let us suppose that d 1 , , d n D 0 are such that polynomials ν Ψ 1 ( d 1 ) ( t ) , , ν Ψ 1 ( d n ) ( t ) have no common zeros in C . Then, there are b 1 , , b n D 0 and a positive integer j such that
k = 1 n b k ( s ) d k ( s ) = j .
Example 5.
Let u = [ ( 0 | 1 , 1 , 2 ) ] and v = [ ( 0 | 1 , 2 , 2 ) ] as in Example 3. Then,
2 Ψ ( u ) Ψ ( v ) = 2 2 + 1 2 s 1 + 2 2 s = 3 .

4. Finite Rings of Multinumbers

Let p , q be natural numbers. Let us consider the following relation of equivalence “modulo ( p , q ) ” on Z defined by
, m 2 { r } , m 1 { s } | n 1 { k } , n 2 { i } , 0 | m 1 { s } , m 2 { r } , , n 1 { k } , n 2 { i } , ,
where n { k } = n , , n k , and n j n j mod q , m j m j mod q , k k mod p , i i mod p , r r mod p , s s mod p . In other words, entries n j and m j are in Z q and the number of repetitions of any number n j or m j is in Z p . For example, for every 0 < n < q , we have
[ ( 0 | n , , n k ) ] [ ( 0 | n , , n i ) ] [ ( n , , n s ) | 0 ) ] ,
if k i mod p and k s mod p .
Let us denote by Z ( p , q ) the set of classes of the equivalence. In sequel, we always assume that p > 1 and q > 1 . Since every element in Z ( p , q ) has a representative of the form
[ ( 0 | n ) ] = [ ( 0 | n 1 , n 2 , ) ] ,
we will use the notation ( n 1 , n 2 , ) for the class containing [ ( 0 | n ) ] . Moreover, to simplify notation, we will write
( n 1 , , n 1 k , n 2 , n 2 i , ) = ( n 1 { k } , n 2 { i } , ) = k ( n 1 ) + i ( n 2 ) + .
Proposition 6.
Z ( p , q ) has the following properties:
 (i) 
Z ( p , q ) is a finite commutative ring with the unity I = ( 1 ) . The cardinality of Z ( p , q ) is | Z ( p , q ) | = p q 1
 (ii) 
Z ( p , 2 ) is isomorphic to Z p .
 (iii) 
The mapping
I ( p , q ) : Z Z ( p , q )
Z [ ( m | n ) ] [ ( m | n ) ] Z ( p , q )
is a ring homomorphism.
Proof. 
(i). From the definition of Z ( p , q ) , one can see that it is closed with respect to the algebraic operations. The properties of these operations (the associativity, the commutativity, the distributivity low) can be checked by the same way as in the case Z . Every element in Z ( p , q ) can be written as
1 { k 1 } , 2 { k 2 } , , ( q 1 ) { k q 1 } = k 1 ( 1 ) + k 2 ( 2 ) + + k q 1 ( q 1 ) , 0 k j < p ,
where m { 0 } = 0 . Thus, the number of such elements is equal to the number of all multi-subsets of the multiset
1 { p 1 } , 2 { p 1 } , , ( q 1 ) { p 1 } .
It is well-known in Combinatorics that such a number is equal to p q 1 (e.g., see [24] for a more general case).
(ii). Every element in Z ( p , 2 ) can be represented by
k I = ( 1 { k } ) = ( 1 , , 1 k , 0 , ) ,
0 k < p , and the correspondence k I k is the required isomorphism onto Z p .
(iii). It is well-known that the mapping I p : n ( n mod p ) is a ring homomorphism from Z to Z p .
Let
u = , m 2 { r } , m 1 { s } | n 1 { k } , n 2 { i } , Z ( p , q ) ,
then
I ( p , q ) ( u ) = , I p ( m 2 ) { I q ( r ) } , I p ( m 1 ) { I q ( s ) } | I p ( n 1 ) { I q ( k ) } , I p ( n 2 ) { I q ( i ) } , .
By the additivity and the multiplicativity of maps I p ( k ) and I q ( k ) , using routine calculations, we have that I ( p , q ) ( u v ) = I ( p , q ) ( u ) I ( p , q ) ( v ) and I ( p , q ) ( u + v ) = I ( p , q ) ( u ) + I ( p , q ) ( v ) for all u , v Z ( p , q ) .
Next, we consider the following question: Under which conditions is an element n Z ( p , q ) invertible in Z ( p , q ) ?
It is easy to find divisors of zero in Z ( p , q ) . For example,
( 1 , 2 ) ( 1 , 2 ) = ( 1 , 2 , 2 , 1 ) = 0 in Z ( 2 , 3 ) .
Theorem 3.
The ring Z ( p , q ) is a field if and only if q = 2 and p is a prime number. In this case, the field is isomorphic to Z p .
Proof. 
The case q = 2 is considered in Proposition 6. If q > 2 , then ( 1 , q 1 ) ( 1 , 1 ) and ( 1 , q 1 ) 0 . We claim that, in this case, ( 1 , q 1 ) is not invertible. Indeed,
( 1 , q 1 ) ( 1 , q 1 ) = ( 1 , 1 , q 1 , q 1 ) = ( 1 , q 1 ) ( 1 , 1 ) .
So, if n 0 = ( 1 , q 1 ) 1 , then
n 0 ( 1 , q 1 ) ( 1 , q 1 ) = n 0 ( 1 , q 1 ) ( 1 , 1 ) , that is , ( 1 , q 1 ) = ( 1 , 1 ) .
This is a contradiction. □
Clearly, elements ( k ) = [ ( 0 | k , 0 , , 0 ) ] , where k is coprime with q , are “trivial” examples of invertible elements in Z ( p , q ) . Indeed, if k r 1 mod q , then ( k ) ( r ) = ( 1 ) = I . Other “trivial” examples of invertible elements in Z ( p , q ) are m I = ( 1 { m } ) if m is coprime with p . Let us show that there are nontrivial invertible elements.
Example 6.
In Z ( 2 , 4 ) , we have
( 2 , 3 ) ( 2 , 3 ) = ( 4 , 6 , 6 , 9 ) = ( 9 ) = ( 1 ) .
That is, ( 2 , 3 ) is invertible.
Theorem 4.
Let p be a prime number. Suppose that m is invertible in Z ( p , q ) and k is such that k p = 0 in Z ( p , q ) for some q N . Then, m + k is invertible in Z ( p , q ) and
m + k 1 = m + k p 1 m 1 p .
Proof. 
m + k p = j = 0 p p j m j k p j .
Since p is prime, coefficients p j = p ! j ! ( p j ) ! , 0 < j < p are divisible by p and so
p j m j k p j = 0 in Z ( p , q ) , 0 < j < p .
Hence,
m + k p = m p + k p = m p
since k p = 0 in Z ( p , q ) . However, m is invertible. Thus,
m + k m + k p 1 m 1 p = I .
Corollary 6.
Let p be a prime number. Suppose that m is invertible in Z ( p , q ) and k N is such that k p 0 mod q for some q N . Then, m + ( k ) is invertible in Z ( p , q ) and
m + ( k ) 1 = m + ( k ) p 1 m 1 p .
The corollary is a partial case of Theorem 4 for k = ( k ) . For given p and k, we can find q satisfying the condition k p 0 mod q . It is enough to set q = h 1 r 1 h 2 r 2 h i r i , where c h 1 h 2 h i = k < q for some c N and 0 < r j p , j = 1 , , i . In particular, we have the following corollary.
Corollary 7.
Let n N , n > 1 , and p be a prime number. Suppose that m is invertible in Z ( p , n p ) and k N is such that k p 0 mod n p . Then, m + ( k ) is invertible in Z ( p , n p ) and m + ( k ) 1 can be computed by (2).
Corollary 8.
Let n N , n > 1 , and p be a prime number. Then,
1. 
The multinumber u = ( n , n p 1 ) is invertible in Z ( p , n p ) and u p = ( ( 1 ) ) p .
2. 
If p 2 , then v = ( n , 1 ) is invertible in Z ( p , n p ) and v p = ( 1 ) .
Proof. 
Clearly, ( k ) = ( n ) is such that ( k ) p = 0 in Z ( p , n p ) and both m = ( 1 ) and m = ( n p 1 ) are invertible. □
Since a product of invertible elements is invertible, we have the following corollary.
Corollary 9.
Let n N and p be a prime number. Then, multinumbers ( n , n p 1 ) m ( n , 1 ) k , m , k < p are invertible in Z ( p , n p ) .
Let us recall that according to the Euler Theorem, if n is coprime with p , then
n φ ( p ) 1 mod p ,
where φ ( p ) is the Euler totient function counting integers between 0 and p, which are coprime with p N . If p is a prime number, then φ ( p ) = p 1 and we have the Little Fermat Theorem n p 1 1 mod p . The following theorem can be considered a generalization of the Little Fermat Theorem for multinumbers.
Theorem 5.
Let p be a prime number and 0 n = ( n 1 , n 2 , , n k ) Z ( p , p ) . Then,
1. 
n p = n .
2. 
If n is invertible, then n p 1 = ( 1 ) in Z ( p , p ) .
Proof. 
Since n = ( n 1 , n 2 , , n k ) = ( n 1 ) + ( n 2 ) + + ( n k ) , we can write
n p = ( n 1 ) + ( n 2 ) + + ( n k ) p = r 1 + + r k = p p ! r 1 ! r k ! ( n 1 ) r 1 ( n k ) r k
= ( n 1 p ) + ( n 2 p ) + + ( n k p ) + r 1 + + r k = p , r j p p ! r 1 ! r k ! ( n 1 ) r 1 ( n k ) r k .
Since p is prime, p ! r 1 ! r k ! ( n 1 ) r 1 ( n k ) r k is divisible by p for r j < p , j = 1 , , k and so it is equal to zero in Z ( p , p ) . Moreover, by the Little Fermat Theorem, n j p n j mod p . Thus,
n p = ( n 1 ) + ( n 2 ) + + ( n k ) = n .
If n is invertible, then n p 1 = n n 1 = ( 1 ) .
Note that ( n 1 , n 2 , , n k ) is not necessarily invertible. For example, ( 1 , 2 ) is not invertible in Z 3 , 3 because ( 1 , 1 , 2 ) ( 1 , 2 ) = 0 but ( 1 , 2 ) 3 = ( 1 , 2 ) . So, it is naturally to ask the following: Under which conditions is ( n 1 , n 2 , , n k ) invertible in Z ( p , p ) ? From Theorem 5, we have a criterium of invertibility of ( n 1 , n 2 , , n k ) in Z ( p , p ) .
Corollary 10.
Let p be a prime number and n = ( n 1 , n 2 , , n k ) Z ( p , p ) . Then, n is invertible if and only if n p 1 = ( 1 ) in Z ( p , p ) .
Proof. 
Indeed, if n p 1 = ( 1 ) , then n p 2 = n 1 .
Example 7.
The multinumber ( 1 , 2 ) is not invertible in Z ( 5 , 5 ) because
( 1 , 2 ) 4 = 1 { 2 } , 2 { 4 } , 3 { 4 } , 4 ( 1 ) ,
but ( 1 , 2 , 3 ) is invertible in Z ( 5 , 5 ) because ( 1 , 2 , 3 ) 4 = ( 1 ) , and so, ( 1 , 2 , 3 ) 1 = ( 1 , 2 , 3 ) 3 .
The question about possible extension of the Euler Theorem looks more complicated.
Example 8.
Let n = ( 1 , 5 ) Z ( 6 , 6 ) . Then n 2 = ( 1 { 2 } , 5 { 2 } ) and n 3 = ( 1 { 4 } , 5 { 4 } ) ( 1 , 5 ) . Thus, n φ ( 6 ) + 1 = n 3 n in this case while both pairs 1 , 6 and 5 , 6 are coprime numbers. On the other hand, ( 1 { 3 } , 5 { 2 } ) 3 = ( 1 { 3 } , 5 { 2 } ) , ( 1 { 2 } , 5 { 2 } ) 3 = ( 1 { 2 } , 5 { 2 } ) , ( 1 { 3 } , 5 { 3 } ) 3 = ( 1 { 3 } , 5 { 3 } ) , ( 1 { 4 } , 5 { 5 } ) 3 = ( 1 { 4 } , 5 { 5 } ) .
Conditions of Theorem 4 show that it is important to know nilpotent elements in Z ( p , q ) . Moreover, structures of nilpotent ideals in a given ring are important for studying of the ring (see e.g., [25,26]). Next, the corollary shows that there are no nilpotent elements in Z ( p , p ) if p is prime.
Corollary 11.
Let p be a prime number. Then, Z ( p , p ) has no nonzero nilpotent elements.
Proof. 
Let n k = 0 for some k . Since by Theorem 5, n p = n without loss of generality, we can assume that k p . Then,
n = n p = n k + p k = 0 n p k = 0 .
Hence, n = 0 .
Note that even if both p and q are primes, Z ( p , q ) still may have nilpotent elements. For example, as we already observed, ( 1 , 2 ) 2 = 0 in Z ( 2 , 3 ) .

5. Possible Applications to Cryptography

The idea of open encryption in Cryptography is based on the fact that some operations are difficult for computing. For example, for an integer a, it is difficult to compute a 1 modulo p if a and p are big enough. In the case where a and p are multinumbers, the algorithm for finding the inverse could be more complicated because integer numbers are partial cases of integer multinumbers. Thus, we can consider the following protocol of encryption and decryption involving integer multinumbers.
  • Let n = ( n 1 , n 2 , , n l ) be a natural multinumber, coding a secret message a = ( a 1 , a 2 , , a s ) by an open code.
  • Randomly choose a prime number p and a number q such that p > l and q > max j l n j .
  • We consider three possible cases:
    • both numbers p and q are secret;
    • both numbers p and q are public;
    • either p or q is secret.
  • Generate two random keys: a public key u and private key v = u 1 in Z ( p , q ) using Theorem 4 and corollaries after the theorem.
  • To encrypt, find w : = n u and reduce each component of w modulo q if q is public, and the number of repetitions of each component of w modulo p if p is public.
  • To decrypt, find w v and reduce it modulo ( p , q ) —that is, n = I ( p , q ) ( w v ) .
Let us explain some steps. We suppose that the secret message a in (1) is a vector with nonnegative integer coordinates. Let us construct the multinumber n = ( n 1 , n 2 , , n l ) coding a by the following way:
Z + s ( a 1 , a 2 , , a s ) ( 1 , , 1 a 1 , 2 , 2 a 2 , , s , , s a s ) N .
For example, if a = ( 1 , 0 , 0 , 1 , 1 ) , then n = ( 1 , 4 , 5 ) ; if a = ( 0 , 1 , 1 , 2 , 0 , 1 , 2 ) , then n = ( 2 , 3 , 4 , 4 , 6 , 7 , 7 ) .
Formally, n belongs to N Z and we will use the operator I ( p , q ) as in Proposition 6 to reduce it modulo ( p , q ) . Further, we need operations of partial reductions. Define
I ( p , · ) n 1 { i 1 } , n 2 { i 2 } , , n l { i l } = n 1 { I p ( i 1 ) } , n 2 { I p ( i 2 ) } , , n l { I p ( i l ) }
and
I ( · , q ) n 1 { i 1 } , n 2 { i 2 } , , n l { i l } = I q ( n 1 ) { i 1 } , I q ( n 2 ) { i 2 } , , I q ( n l ) { i l } .
Here, I p is the homomorphism from Z to Z p , I p ( n ) = n mod p . Clearly,
I ( p , q ) = I ( p , · ) I ( · , q ) .
Let us consider step (2). Firstly, we randomly choose a big enough prime number p taking into account that p > l . To choose q, let us randomly select finite sequences of natural numbers h 1 , h 2 , , h i ; r 1 , r 2 , , r i ; and c 1 , c 2 , , c s such that r j p , q : = h 1 r 1 h 2 r 2 h i r i > n j for every 1 j l , and k t : = c t h 1 h 2 h i < q , 1 t s . Moreover, we randomly select a natural number m < p and set m : = m I = ( 1 , , 1 ) . Since p is prime, m is invertible and, according to the Little Fermat Theorem, m 1 = m p 2 I . As q divides k 1 p , k 1 p 0 mod q , and by Theorem 4, m + ( k 1 ) is invertible. By the same reason, k 2 p 0 mod q , and so, m + ( k 1 ) + ( k 2 ) is invertible. Thus, applying Theorem 4 s times, we will obtain that
u = m + ( k 1 ) + ( k 2 ) + + ( k s )
is invertible. In each step, we have the inverses m + ( k 1 ) + ( k 2 ) + + ( k t ) 1 , and at step t = s , we will obtain v = u 1 .
Note that we can repeat this process for the same p and q but with different constants m , r i , and c j to obtain another invertible element in Z ( p , q ) . The product of two invertible elements is invertible; so, the final key may be obtained as a product of several invertible multinumbers obtained by the algorithm above.
If both p and q are secret, then the encrypted code is of the form w = n u N . Using Theorem 2, we can represent it as a product of polynomials of many variables
ν ( w ) ( t ) = ν ( n ) ( t ) ν ( u ) ( t ) .
Since ν ( u ) ( t ) is known, one can recover the secret information by dividing
ν ( n ) ( t ) = ν ( w ) ( t ) ν ( u ) ( t )
using known division algorithms for multivariable polynomials. Thus, case 3a is not secure.
Suppose that both p and q are public. Then, the encrypted code is I ( p , q ) w = I ( p , q ) n I ( p , q ) u Z ( p , q ) . The operator I ( p , q ) is not invertible, so the previous method of attack is not effective. However, one can consider the sequence I ( p , q ) n I ( p , q ) u j for j big enough. It is well-known in Ring Theory that there is j = N such that
I ( p , q ) n I ( p , q ) u N = I ( p , q ) n I ( p , q ) u .
Then, for the step j = N 1 , we have the secret information n = I ( p , q ) n . So, case 3b is also not secure.
Before we turn to case 3c, let us consider what happens in the classical situation in Z p . If p is prime, then
a a mod p = I p ( a )
is a one-way function that is injective for a < p . Thus, the encryption a a u mod p cannot be broken if p is secret. However, in this case, we have no public key and so the public-key cryptography system cannot be realized. If p is public, then the system may be attacked, as in case 3b.
In the well-known RSA algorithm [20] (p. 185), the encryption function is defined by
a a b mod p ,
where b and φ ( p ) are coprime and p is not a prime number. To obtain the inverse function, it is necessary to compute the Euler function φ ( p ) , which is equivalent to factoring p into prime numbers. The proposed algorithm is not a precise analog of the RSA algorithm because we do not have a good multinumber version of the Euler Theorem. However, case 3c allows us to use one-way functions
n I ( p , · ) ( n u ) o r n I ( · , q ) ( n u )
having either p or q as a public key. As we can see in the following example, one must take care that n u is big enough in some sense.
Example 9.
Let a secret information be coded by the vector a = ( 0 , 1 , 1 , 2 , 0 , 1 , 2 ) . Then, the corresponding multinumber n is ( 2 , 3 , 4 , 4 , 6 , 7 , 7 ) N . We can take p = 3 and q = 9 . It is easy to check that u = ( 1 , 3 ) is invertible in Z ( 3 , 9 ) and so we can choose it as a public key. The inverse element v = u 1 = ( 1 , 3 , 3 ) is the private key.
Case 1. Let us consider the case when p is secret and q is public. Then, actually, the private key is the pair v , p . For encoding, we have to make the multiplication w = n u N and reduce each component of the multinumber w modulo q = 9 . That is,
w = n u = ( 2 , 3 , 4 , 4 , 6 , 6 , 7 , 7 , 9 , 12 , 12 , 18 , 21 , 21 ) ;
I ( · , 9 ) ( w ) = ( 2 , 3 , 3 , 3 , 3 , 3 , 4 , 4 , 6 , 6 , 7 ) .
Thus, I ( · , 9 ) ( w ) is the encoded message. To decode it, one must reduce the number of repetitions of each component modulo p = 3 and to multiply the result by v = ( 1 , 3 , 3 ) in Z ( 3 , 9 ) . So,
I ( 3 , · ) ( 2 , 3 , 3 , 3 , 3 , 3 , 4 , 4 , 6 , 6 , 7 ) = ( 2 , 3 , 3 , 4 , 4 , 6 , 6 , 7 ) ;
( 2 , 3 , 3 , 4 , 4 , 6 , 6 , 7 ) ( 1 , 3 , 3 ) = ( 2 , 3 , 4 , 4 , 6 , 7 , 7 ) = n .
Case 2. Now, let q be secret and p be public. Then, having w as above, we reduce the repetition of each component of w modulo p . We have
I ( 3 , · ) ( w ) = ( 2 , 3 , 4 , 4 , 6 , 6 , 7 , 7 , 9 , 12 , 12 , 18 , 21 , 21 ) .
To decode, we have multiply w by v in Z ( 3 , 9 ) .
Note that in Case 1, w cannot be recovered from I ( · , 9 ) ( w ) without information about p because w has components that are greater than or equal to q . However, in Case 2 of this example, w = I ( 3 , · ) ( w ) ; so, it is possible to find n dividing w by u . It happens because the number of repetitions of each component of w is less than 3 .
In the general case, to guarantee that w cannot be recovered from I ( · , q ) ( w ) , we have to make sure that w contains elements that are greater than or equal to q; to guarantee that w cannot be recovered from I ( p , · ) ( w ) , we have to make sure that w contains elements that repeat p or more times. This can be achieved if we add to the secret code a piece of random code with empty information containing components greater than q and repeated more than p times.

6. Conclusions

In the paper, we introduce and study the ring of integer multinumbers Z and finite rings of multinumbers Z ( p , q ) . We can see that Z is isomorphic as a ring to known objects such as the ring of polynomials Z [ C ] or the ring of Dirichlet series D 0 ( Z ) . However, the representation in the form of multinumbers gives us a different point of view and suggests some new questions and directions of investigation. In particular, we can ask about solutions of Diophantine equations over multinumbers. In addition, using the concept of multinumbers, we introduced the multinumbers modulo ( p , q ) . Such kinds of objects may be applicable in Cryptography for the creation of new algorithms with open keys, and we proposed one of them. We did not examine in detail the complexities of encoding, decoding, and the resistance of the algorithm against other basic attacks—this may be a subject of further investigations. However, the comparison with RSA and Example 9 gives arguments that the proposed algorithm is applicable. This paper is an invitation to study multinumbers of different natures and their applications to Cryptography.
Finally, we note that the idea of multinumbers appeared from investigations of symmetric and supersymmetric analytic functions on Banach spaces. This is a good argument for the conceptual unity of different branches of Mathematics.

Author Contributions

Conceptualization and supervision the study A.Z.; investigation and original draft preparation of the manuscript Y.C. and T.V. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Research Foundation of Ukraine, 2020.02/0025, 0121U111037.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors thank the anonymous referees for their valuable constructive comments and suggestions, which improved the quality of this work in the present form.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Han, J.; Li, Y.; Lin, L.; Lu, J.; Zhang, J.; Zhang, L. Universal approximation of symmetric and anti-symmetric functions. arXiv 2019, arXiv:1912.01765. [Google Scholar]
  2. Zaheer, M.; Kottur, S.; Ravanbakhsh, S.; Poczos, B.; Salakhutdinov, R.R.; Smola, A.J. Deep sets. In Advances in Neural Information Processing Systems; Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R., Eds.; 2017; pp. 3391–3401. Available online: https://papers.nips.cc/paper/2017 (accessed on 26 December 2021).
  3. Dos Martires, P.Z. Neural Semirings. CEUR Workshop Proc. 2021, 2986, 94–103. Available online: http://ceur-ws.org/Vol-2986/paper7.pdf (accessed on 27 February 2022).
  4. Yarotsky, D. Universal Approximations of Invariant Maps by Neural Networks. Constr. Approx. 2021, 55, 407–474. [Google Scholar] [CrossRef]
  5. Chernega, I.V. A semiring in the spectrum of the algebra of symmetric analytic functions in the space 1. J. Math. Sci. 2016, 212, 38–45. [Google Scholar] [CrossRef]
  6. Jawad, F.; Zagorodnyuk, A. Supersymmetric polynomials on the space of absolutely convergent series. Symmetry 2019, 11, 1111. [Google Scholar] [CrossRef] [Green Version]
  7. Chernega, I.; Fushtei, V.; Zagorodnyuk, A. Power Operations and Differentiations Associated With Supersymmetric Polynomials on a Banach Space. Carpathian Math. Publ. 2020, 12, 360–367. [Google Scholar] [CrossRef]
  8. Aron, R.; Galindo, P.; Pinasco, D.; Zalduendo, I. Group-symmetric holomorphic functions on a Banach space. Bull. Lond. Math. Soc. 2016, 48, 779–796. [Google Scholar] [CrossRef]
  9. Chernega, I.; Galindo, P.; Zagorodnyuk, A. A multiplicative convolution on the spectra of algebras of symmetric analytic functions. Rev. Mat. Complut. 2014, 27, 575–585. [Google Scholar] [CrossRef]
  10. Chernega, I.; Galindo, P.; Zagorodnyuk, A. Some algebras of symmetric analytic functions and their spectra. Proc. Edinb. Math. Soc. 2012, 55, 125–142. [Google Scholar] [CrossRef] [Green Version]
  11. González, M.; Gonzalo, R.; Jaramillo, J.A. Symmetric polynomials on rearrangement-invariant function spaces. J. Lond. Math. Soc. 1999, 59, 681–697. [Google Scholar] [CrossRef]
  12. Jawad, F. Note on separately symmetric polynomials on the Cartesian product of p. Mat. Stud. 2018, 50, 204–210. [Google Scholar] [CrossRef]
  13. Kravtsiv, V.V. Analogues of the Newton formulas for the block-symmetric polynomials. Carpathian Math. Publ. 2020, 12, 17–22. [Google Scholar] [CrossRef]
  14. Kravtsiv, V.; Vasylyshyn, T.; Zagorodnyuk, A. On algebraic basis of the algebra of symmetric polynomials on p(Cn). J. Funct. Spaces 2017. [Google Scholar] [CrossRef] [Green Version]
  15. Macdonald, I.G. Symmetric Functions and Orthogonal Polynomials; University Lecture Serie 12; AMS: Providence, RI, USA, 1997. [Google Scholar]
  16. Halushchak, I.; Novosad, Z.; Tsizhma, Y.; Zagorodnyuk, A. Logistic Map on the Ring of Multisets and Its Application in Economic Models. Math. Stat. 2020, 8, 424–429. [Google Scholar] [CrossRef]
  17. Singh, D.; Ibrahim, A.M.; Yohanna, T.; Singh, J.N. An overview of the applications of multisets. Novi Sad J. Math. 2007, 37, 73–92. [Google Scholar]
  18. Kaur, J.; Ramachandran, R. The Recent Trends in CyberSecurity: A Review. J. King Saud-Univ.-Comput. Inf. Sci. 2021. [Google Scholar] [CrossRef]
  19. Kraft, J.; Washington, L. An Introduction to Number Theory with Cryptography; Chapman and Hall/CRC: London, UK, 2018. [Google Scholar]
  20. Stinson, D.R.; Paterson, M.B. Cryptography. Theory and Practice, 4th ed.; Taylor & Francis Group: Boca Raton, FL, USA; London, UK; New York, NY, USA, 2008. [Google Scholar]
  21. Karoubi, M. K-theory, an elementary introduction. In Cohomology of Groups and Algebraic K-Theory; Advanced Lectures in Mathematics (ALM); International Press: Somerville, MA, USA, 2010; Volume 12, pp. 197–215. [Google Scholar]
  22. Zariski, O.; Samuel, P. Commutative Algebra. Volume II. With the Cooperation of I. S. Cohen; The University Series in Higher Mathematics; D. Van Nostrand Company: Princeton, NJ, USA, 1960. [Google Scholar]
  23. Defant, A.; Garcia, D.; Maestre, M.; Sevilla Peris, P. Dirichlet Series and Holomorphic Functions in High Dimensions; New Mathematical Monographs 34; Cambridge University Press: Cambridge, UK, 2019. [Google Scholar]
  24. Makhnei, O.; Pylypiv, V.; Zatorskii, R. m-submultisets and m-permutations of multisets elements. Carpathian Math. Publ. 2021, 13, 240–258. [Google Scholar] [CrossRef]
  25. Camillo, V.; Hong, C.Y.; Kim, N.K.; Lee, Y.; Nielsen, P.P. Nilpotent ideals in polynomial and power series rings. Proc. Am. Math. Soc. 2010, 138, 1607–1619. [Google Scholar] [CrossRef] [Green Version]
  26. Steinberg, S.A. Rings of quotients of rings without nilpotent elements. Pac. J. Math. 1973, 49, 493–506. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chopyuk, Y.; Vasylyshyn, T.; Zagorodnyuk, A. Rings of Multisets and Integer Multinumbers. Mathematics 2022, 10, 778. https://0-doi-org.brum.beds.ac.uk/10.3390/math10050778

AMA Style

Chopyuk Y, Vasylyshyn T, Zagorodnyuk A. Rings of Multisets and Integer Multinumbers. Mathematics. 2022; 10(5):778. https://0-doi-org.brum.beds.ac.uk/10.3390/math10050778

Chicago/Turabian Style

Chopyuk, Yuriy, Taras Vasylyshyn, and Andriy Zagorodnyuk. 2022. "Rings of Multisets and Integer Multinumbers" Mathematics 10, no. 5: 778. https://0-doi-org.brum.beds.ac.uk/10.3390/math10050778

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop