We present four combinatorial proofs based on the bijection principle and the inclusion-exclusion principle to Morgado's formula on the number of non-congruent regular integers modulo $n$, given by the sequence A055653 in OEIS, where an integer $m$ is regular modulo $n$ if the congruence $m^2 x \equiv m \pmod{n}$ has a solution for $x$ in $\mathbb{Z}$. To emphasize the significance of the subject, we relate this sequence and Morgado's formula to a recent multi-prime multi-power generalization of the RSA cryptosystem.
On the Number of Regular Integers Modulo n and Its Significance to Cryptography
- Paper ID: 2304.02471
- Title: On the Number of Regular Integers Modulo n and Its Significance to Cryptography
- Authors: Klaus Dohmen, Mandy Lange-Geisler (Hochschule Mittweida, Germany)
- Classification: math.CO (Combinatorics), math.GR (Group Theory), math.NT (Number Theory)
- Publication Date: October 9, 2025 (arXiv version)
- Paper Link: https://arxiv.org/abs/2304.02471v6
This paper provides four combinatorial proofs of Morgado's formula for the number of regular integers modulo n based on bijective principles and the inclusion-exclusion principle. The formula corresponds to sequence A055653 in OEIS, where an integer m is called regular modulo n if and only if the congruence equation m2x≡m(modn) has a solution in the integer ring Z. To emphasize the significance of this research, the authors connect this sequence and Morgado's formula to a recently proposed multi-prime multi-power generalization of the RSA cryptosystem.
This research addresses the fundamental problem of computing the number of regular integers modulo n and exploring its significance in cryptographic applications.
- Theoretical Significance: The concept of regular integers was first introduced by Morgado in 1972 and represents an important combinatorial object in number theory. Its counting formula involves unit divisors and Euler's totient function, which are fundamental concepts in number theory.
- Practical Applications: In the authors' proposed generalization of the RSA cryptosystem, regular integers constitute the message space for correct decryption, so their count directly relates to the correctness probability of the cryptographic system.
Previous proofs of Morgado's formula primarily relied on the multiplicative property of the ϱ(n) function, lacking intuitive combinatorial explanations. This paper provides deeper understanding through purely combinatorial methods.
The authors' research motivation stems from practical needs encountered in their multi-prime multi-power RSA generalization, requiring estimation of the correct decryption probability for arbitrary messages.
- Four Combinatorial Proofs: Based on bijective principles and the inclusion-exclusion principle, four different combinatorial proofs of Morgado's formula are provided from different perspectives.
- Explicit Encoding Scheme: The fourth proof provides an explicit encoding of regular integers, which may be valuable for further research on sequence A055653.
- Cryptographic Applications: Connects the theory of regular integers with RSA cryptosystem generalizations, revealing the practical significance of this number-theoretic concept.
- Theoretical Insights: The combinatorial methods naturally lead to the multiplicative property of the ϱ(n) function.
Input: Positive integer nOutput: Number of regular integers modulo n, denoted ϱ(n)Constraint: Integer m is regular modulo n if and only if there exists x∈Z such that m2x≡m(modn)
Definition: An integer m is called regular modulo n if the congruence equation m2x≡m(modn) has an integer solution.
Morgado's Formula (Theorem 1):
ϱ(n)=∑d∥nφ(d)
where d∥n denotes that d is a unitary divisor of n (i.e., d∣n and gcd(d,n/d)=1).
Key Property (Proposition 2): For any n∈N and m∈Z, the following conditions are equivalent:
- (a) m is regular modulo n
- (b) gcd(m2,n)=gcd(m,n)
- (c) gcd(m,n)∥n
By defining an equivalence relation m1∼m2⇔gcd(m1,n)=gcd(m2,n) on Znreg, a bijection is established between equivalence classes and Zn/d∗.
Construct the mapping fn:Znreg→{(d,d′)∣d∥n,d′∈Zd∗}:
fn(m):=(gcd(m,n)n,mmodgcd(m,n)n)
The inverse mapping is:
fn−1(d,d′)=dn(((n/dmodd)−1d′)modd)
Each m∈Znreg is mapped to a reduced fraction m/n, proving that the denominators of these reduced fractions are precisely all unitary divisors of n.
Let P(n) denote the set of prime factors of n. For each prime p∈P(n), define:
Ap={m∈Zn∣0<mp<np}
where mp denotes the exponent of p in the prime factorization of m. Then apply the inclusion-exclusion principle.
- Combinatorial Perspective: Unlike previous multiplicative-based proofs, this paper provides intuitive combinatorial explanations.
- Bijection Construction: The second proof provides explicit encoding and decoding algorithms for regular integers.
- Multi-Angle Analysis: Four proofs reveal the essential structure of regular integers from different perspectives.
- Cryptographic Connection: First connects the theory of regular integers with modern cryptographic applications.
The paper verifies theoretical results through concrete examples:
Example: Case of n=20
- Unitary divisors: 1,4,5,20
- φ(1)=1,φ(4)=2,φ(5)=4,φ(20)=8
- Predicted value: ϱ(20)=1+2+4+8=15
- Actual regular integers: {0,1,3,4,5,7,8,9,11,12,13,15,16,17,19}
- Verification: ∣Z20reg∣=15 ✓
The paper provides detailed correspondence relationships for the f20 mapping, verifying the correctness of the bijection.
All four proofs successfully establish the correctness of Morgado's formula, with each method providing unique combinatorial insights.
In the multi-prime multi-power RSA generalization:
- Correct decryption probability: nϱ(n)=n1∑d∥nφ(d)
- Lower bound estimate: For n=p1e1⋯prer (where pi are k-bit primes), we have nϱ(n)≥1−2k−1r
- Practical significance: When k=1024, almost all messages can be correctly decrypted
- Morgado (1972): First defined the concept of regular integers and provided a counting formula
- Alkam & Osba (2008): Further investigated properties of regular integers
- Apostol & Petrescu (2013): Studied extremal properties of related functions
- Tóth (2008): Provided asymptotic results and analysis of related functions
Compared to existing work, this paper provides purely combinatorial proof methods for the first time and establishes important connections with cryptography.
- Morgado's formula admits rich combinatorial interpretations, with each proof revealing different structural aspects
- Regular integers play a key role in RSA cryptosystem generalizations
- For practical parameter choices, the correct decryption probability approaches 1
- Cryptographic applications are limited to specific RSA generalizations
- Asymptotic analysis requires further investigation
- Computational complexity analysis is insufficient
- Develop more precise probability bounds
- Investigate asymptotic properties of sequence A055653
- Explore other cryptographic applications
- Theoretical Innovation: Four combinatorial proofs are each distinctive, enriching understanding of regular integers
- Rigorous Methodology: Proofs are rigorous with clear logic
- Applied Value: Connection with cryptography enhances practical significance of theoretical research
- Clear Exposition: Well-structured paper with abundant examples
- Limited Applications: Cryptographic applications are restricted to the authors' own RSA generalization
- Computational Analysis: Lacks in-depth analysis of algorithmic complexity
- Experimental Verification: Only small-scale numerical verification; lacks large-scale computational experiments
- Academic Value: Provides new research perspectives for number-theoretic combinatorics
- Practical Potential: Has potential applications in cryptography
- Reproducibility: Complete theoretical proofs; results are easily verifiable
- Theoretical research in number theory and combinatorics
- Cryptographic scenarios involving modular arithmetic
- Applications requiring computation of special integer set sizes
The paper cites 8 relevant references, covering the main development history of regular integer theory and related mathematical foundations, providing readers with complete background knowledge.
Overall Assessment: This is a high-quality mathematical paper that deepens understanding of a classical number-theoretic problem through multiple combinatorial methods and successfully establishes connections with modern cryptography. The paper's theoretical contributions are solid, its application prospects are broad, and it represents valuable work in the field of number-theoretic combinatorics.