Next Article in Journal
Anomaly Detection in Imbalanced Network Traffic Using a ResCAE-BiGRU Framework
Previous Article in Journal
A Steel Defect Detection Model Enhanced by Pinwheel-Shaped Convolution and Pyramid Sparse Transformer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Symmetric Folding: An Efficient Method for Accelerating Witness-Based Random Search

1
Guangzhou University of Software, Guangzhou 510900, China
2
Foshan University, Foshan 528000, China
Symmetry 2025, 17(12), 2086; https://doi.org/10.3390/sym17122086
Submission received: 31 October 2025 / Revised: 27 November 2025 / Accepted: 29 November 2025 / Published: 4 December 2025
(This article belongs to the Section Computer)

Abstract

The performance of witness-based random search algorithms is highly influenced by the distribution density of witnesses. To optimize this distribution, we propose a novel method based on the symmetric folding of the objective dataset. Our approach involves establishing mathematical models for symmetrically folding points and regions in two-dimensional space and deriving a set of rigorously proven properties for folding operations on matrix-formed datasets, complete with computational formulations. Theoretical analysis and numerical experiments demonstrate that the proposed symmetric folding technique can nearly double the probability of successfully identifying a target element via random sampling. The efficacy of the method is validated by a case study on identifying a nontrivial divisor of an odd composite integer, demonstrating that the symmetric folding of the structured dataset can significantly improve the efficiency of randomized search procedures.
PACS:
89.20.Ff; 02.90.+p; 87.55.kd; 07.05.Kf; 89.70.Eg; 45.10.-b; 05.40.Fb
MSC:
68P15; 68Q10; 68Q99; 68T20

1. Introduction

Witness-based random search algorithms gained prominence in the early 1970s owning to their groundbreaking success in addressing problems in number theory, such as primality testing and compositeness certification. Since then, their applications have expanded significantly, spanning diverse domains including decision-making [1,2], data structures [3], network design [4], data mining [5], coding theory [6], data-flow analysis [7], IoT systems [8], cryptography [9], software verification [10], and quantum entanglement research [11].
The efficiency of a witness-based random search algorithm is largely determined by the abundance of witnesses distributed throughout the search space, as established in both classical books (e.g., [12,13,14]) and more recent literature (e.g., [15,16]). Notably, Hromkovič J. emphasized in his seminal work [17] that the concept of witness abundance is a significant gem in the design of randomized algorithms due to its deep connection with nontrivial discoveries in computer science and mathematics.
Given that witnesses are typically dispersed across a large search space that cannot be exhaustively explored [18], enhancing their distribution density constitutes a promising research direction. In light of this consideration, this paper proposes an innovative method to turn sparsely distributed witnesses closer. This method is inspired by the physical act of folding a paper sheet, as illustrated in Figure 1, which demonstrates a paper sheet Π is folded to Π by symmetrically folding. Suppose that several points, referred to as witnesses and marked with blue and red dots, are randomly distributed and affixed to one surface of the paper. When the paper sheet is folded along its axis of symmetry, aligning the two halves precisely, these witnesses are brought into closer proximity. Figure 1 simultaneously shows that folding can not only enhance the local density of the witnesses, but also reduce the gaps between non-witnesses. This is undoubtedly a benefit of witness-based random searches, as gaps can be traversed more quickly and there are more opportunities to encounter a witness.
Inspired by this phenomenon, we introduced the concept of symmetric folding and conducted a preliminary investigation in [19]. However, as an initial exploration, that paper neither provided a comprehensive analysis of the properties of symmetric folding nor established a method for its calculation. This paper hence aims to present a systematic extension and formalization of the study, providing a complete method for symmetrically folding datasets to enhance the efficiency of random search. Through rigorous mathematical reasoning, we derive a set of fundamental properties of symmetric folding, formulate the laws governing the folding process, and prove that symmetric folding can significantly enhance the probability of locating a witness. Furthermore, we apply the principle of symmetric folding to datasets employed in [20,21], showing that search efficiency is considerably improved as a result.
This paper is organized as follows: Section 1 provides an overview of the research context. Section 2 establishes formal definitions and notational conventions. Section 3 synthesizes our main theoretical results, including two theorems, five corollaries, and their corresponding proofs. Section 4 presents application instances. Section 5 concludes the paper by discussing the implications of the findings and suggesting potential directions for future research.

2. Terminologies, Notations, and Definitions

This section presents the necessary symbols, notations, and definitions for subsequent mathematical reasoning.

2.1. Terminologies and Notations

The terms axis symmetry and point symmetry are consistently employed in this work, as defined in standard elementary geometry textbooks such as [22,23,24]. Symbol R n means n-dimensional real space. Symbol A B means A can derive B, and A B means A and B can derive each other. Symbol x [ a , b ] means x in interval [a, b]. Symbols x and x are, respectively, the floor and ceiling functions of real x such that x     1   <   x     x     x   <   x   +   1 , the details of which can be referred to in [25]. Particularly, the following identity (1), which is derived from (3.11) of [25], will be used in the subsequent reasoning.
x m = x m
Unless otherwise stated, the term "point" refers to a geometric point, which can be described with coordinates within a coordinate system. Abstract datasets are occasionally represented using specific geometric entities to provide concise descriptions. For example, a strip represents a one-dimensional set with uniformly distributed points, while a sheet denotes a two-dimensional set characterized by uniform distribution. Particularly, a segment is a part of a strip. A segment s starting at x and ending at y is denoted by an expression s = s e g [ x , y ] .
For an odd composite integer N with divisors p and q satisfying 2   <   p     q , any integer smaller than N and sharing a nontrivial common divisor with N is said to be a witness of N’s divisors, or simply a witness of N. Obviously, a divisor of N, p or q, can be obtained by computing the greatest common divisor (GCD) between N and any one of its witnesses.
It is important to note that all sets analyzed in this paper are finite, countable, and planar unless explicitly specified otherwise.

2.2. Definitions

Definition 1
(Symmetric folding of points).  Assume that X and Y are two movable points. If X is moved to the position where Y locates, or conversely, Y is moved to the position where X locates, the two points are said to be superimposed (or overlaid) and denoted by the symbol X Y . The operation of moving X to Y is said to be a superimposition of X on (onto) Y, denoted by X Y , which means that Y is the reference or base. Hence, Y X means folding Y on (onto) X. The symmetric folding of two points refers to the superimposition that moves one of the two points to the other with their bisector as the symmetric axis. If ignoring the base, the symmetric folding of X onto Y is denoted by X Y . Under the meaning of the symmetric folding, X and Y are called symmetric counterparts or mirror images of each other.
By Definition 1, the number of points involved in the symmetric folding must generally exceed one. Although a single point could be symmetric to itself theoretically, this scenario lacks physical and practical significance. Hence, we assume that more than one point is involved in the symmetric folding unless specific theoretical requirements dictate otherwise. Since points are always within a planar region, we have the following Definition 2.
Definition 2
(Symmetric folding of planar regions).  Let Π and Π be two finite planar regions that have the same shape; the operation that superimposes Π onto Π to make the two completely coincide is called a superimposition of Π to (onto) Π , denoted by Π Π , meaning Π is the base. If Π is the symmetric counterpart of Π across a mirror axis m, the symmetric folding of Π to (onto) Π particularly refers to the superimposition that folds each point of Π to (onto) its symmetric counterpart in Π with respect to m. In this case, Π is referred to as the base. If ignoring the base, the symmetric folding of Π to Π is denoted by Π Π and simply said to fold Π to Π along m.
There are a variety of planar regions. However, our interest in this paper is in the symmetric folding of strips and rectangular sheets, as described in Definitions 3 and 4.
Definition 3
(Symmetric folding of strips).  Let P = { p 1 , p 2 , , p n } and Q = { q 1 , q 2 , , q n } be two strips, where n is a positive integer; the symmetric folding of P to (onto) Q, denoted by P Q , meaning Q is the base, is given by
P Q   =   { p i q n + 1 i | 1     i     n } .
If ignoring the base, the symmetric folding of P to Q is simply denoted by P Q , where P and Q are called symmetric counterparts, or mirror images of each other.
Definition 4
(Symmetric folding of a rectangular sheet). Given a rectangular sheet S with horizontal mirror axis h and vertical mirror axis v, the symmetric horizontal folding of S, denoted by h-fold, folds S along the h-axis; the symmetric vertical folding of S, denoted by v-fold, folds S along the v-axis. Folding S first with an h-fold and then the folded result with a v-fold is denoted by v h -fold; folding S first with a v-fold and then the folded result with an h-fold is denoted by h v -fold. The v h -fold and h v -fold are called mixed folds or hybrid folds.
In addition to the coordinates that describe the position (location), a point may also be associated with certain external properties. For instance, it can be marked red or assigned a numerical label. This leads to the following Definition 5.
Definition 5
(Imprint of a point).  An imprint of a point, or simply an imprint, refers to an external property, e.g., a mark or an identifier, associated with the point. A point P ( x , y ) with an imprint i is referred to as an imprinted point, denoted by P ( x , y , i ) . The imprint of a point can be superimposed by the rule P ( x , y , i 1 ) P ( x , y , i 2 ) = P ( x , y , i 1 i 2 ) . A strip consisting of imprinted points is an imprinted strip, and a sheet consisting of imprinted points is an imprinted sheet.
Remark 1.
According to Definition 5, an imprinted point may possess more than one imprint. This can be analogized to a colored ball labeled with a number. The concept of the imprint coming into being, a point can either be geometric or imprinted. Regarding the purpose of this paper, the term ’point’ by default refers to the imprint point hereafter. Based on Corollary 2 in [19], when a source point is folded onto a target point, it ceases to exist geometrically while transferring its imprints to the target point. This phenomenon gives rise to the concept of "folding by imprints," formally stated in Definition 6.
Definition 6
(Folding by imprints).  Folding by imprints refers to the folding of an imprinted strip or sheet, emphasizing the transformation of points’ imprints rather than their coordinates.
Remark 2.
Symmetric folding of two strips, imprints of a point, and folding by imprints can be depicted with Figure 2. In the figure, two different imprints, the blue squares and red circular dots on a trip, are superimposed after performing a symmetric folding on the strip.
Imprints can act as witnesses in identifying certain characteristics of points. This derives the following Definition 7.
Definition 7
(Witness by imprint).  If an imprint of a point can be utilized to characterize that point, that imprint is referred to as a witness to the point. In such a case, the point itself is termed a witness point.
The concept of witness by imprint permits the association of a geometric point with a specific value. For instance, we can establish a rule for generating an imprint, say an integer, for each lattice in a planar region, and then determine whether a randomly chosen lattice is associated with a multiple of a prime number. By this means, the problem of identifying a divisor of a composite integer is converted into randomly searching certain lattices in the region, as Section 4 deals with.

3. Theoretical Results

The theoretical results include two theorems and five corollaries, which are stated and proved below.
Theorem 1.
Given n points on a strip, where n   >   0 is an integer, then for an arbitrary integer 1     i     n 2 , the symmetric folding of the strip superimposes the i t h point onto the ( n   +   1     i ) t h point or vice versa, resulting in a total of n 2 distinct overlaid points on the folded strip.
Proof. 
When n is even, let n   =   2 k with k being an integer; it follows n 2   =   k . Denote the n points by a set
S   =   { e 1 , , e k ,   k     o n e s e k + 1 , , e 2 k k     o n e s } .
By Definition 3, e i is symmetric to e n + 1 i ; hence, the symmetric folding results in e i e n + 1 i , where 1     i     k , saying that the theorem holds in the case of n being an even number.
If n is odd, letting n   =   2 k   +   1 with k being an integer follows n 2 = k + 1 and
S   =   { e 1 , ,   k     o n e s e k + 1 , e 2 k + 1 k     o n e s } .
This time, e k + 1 is symmetric to itself and each element e i is symmetric to e n + 1 i with respect to e k + 1 , where 1     i     k . Namely, the symmetric folding also results in e i e n + 1 i for 1     i     k   +   1 , showing that the theorem holds when n is an odd number. Consequently, the theorem holds in all cases.   □
Corollary 1.
Given n points on a strip, where n   >   0   is an integer, let S 0 be the set of these n points, namely,
S 0   =   {   P 0 1 , P 0 2 , , P 0 n 1 , P 0 n   } ,
Assume S 1 is the set of the symmetric folding of S 0 ; then,
S 1   =   { P 0 i P 0 n + 1 i | 1     i     n 2 } .
Proof. 
This corollary is the alternative statement of Theorem 1.   □
Remark 3.
Let
S l   =   {   P 0 1 , P 0 2 , P 0 3 , , P 0 n 2   }
and
S r   =   {   P 0 n 2 , P 0 n 2 + 1 , , P 0 n 1 , P 0 n   } ;
then, (6) says each element P 1 i     S 1 is associated with one element P 0 i     S l and one element P 0 n + 1 i     S r . Keeping such symmetric folding by partitioning S l and S r into their respective symmetric counterparts, each partitioned subset contributes one of its elements to an element in the last folded result. Specifically, every element in the last folded result is associated with a partitioned subset exactly once.
Corollary 2.
Given 2 m points on a strip with m     1 being an integer, let S 0 be the set of these 2 m points, namely,
S 0 = {   e 0 1 , , e 0 2 m 1 , e 0 2 m 1 + 1 , , e 0 2 m   } .
Denote S k to be the set after performing k times of symmetric folding on S 0 and e k j to be the j t h element of S k , where 1     k     m ; then,
S k   =   {   e k 1 , , e k 2 m 1 , e k 2 m 1 + 1 , e k 2 m k   } ,
where
e k j   =   e k 1 j e k 1 2 m ( k 1 ) + 1 j   =   s = 0 2 k 1 1 e 0 2 m ( k 1 ) s + j s = 1 2 k 1 e 0 2 m ( k 1 ) s + 1 j ,
and 1     j     2 m k .
Proof. 
By Corollary 1, the symmetric folding of S 0 yields
S 1 = { e 1 1 , e 1 2 , e 1 3 , , e 1 2 m 1   } ,
where e 1 j   =   e 0 j e 0 2 m + 1 j and the index j satisfies 1     j     2 m 1 .
Likewise, the symmetric folding of S 1 yields
S 2 = { e 2 1 , e 2 2 , e 2 3 , , e 2 2 m 2   } ,
where e 2 s   =   e 1 s e 1 2 m 1 + 1 s and the index s satisfies 1     s     2 m 2 .
Since e 1 s   =   e 0 s e 0 2 m + 1 s and e 1 2 m 1 + 1 s   =   e 0 2 m 1 + 1 s e 0 2 m 1 + s , it follows
e 2 s   =   e 1 s e 1 2 m 1 + 1 s   =   e 0 s e 0 2 m 1 + 1 s e 0 2 m 1 + s e 0 2 m + 1 s .
In general, let S k = { e k 1 , e k 2 , e k 3 , , e k 2 m k } ; then, the symmetric folding of S k is given by
S k + 1 = { e k + 1 1 , e k + 1 2 , e k + 1 3 , , e k + 1 2 m k 1   } ,
where e k + 1 t   =   e k t e k 2 m k + 1 t and the index t satisfies 1     t     2 m k 1 .
With detail calculations it follows
e k + 1 t   =   e k t e k 2 m k + 1 t   =   j = 0 2 k 1 e 0 2 m k j + t j = 1 2 k e 0 2 m k j + 1 t .
Comparing (14) with (9) shows that the corollary holds.   □
Remark 4.
It is seen from (14) that e k + 1 t is superimposed from 2 k + 1 points of S 0 . Obviously k + 1 = m   a n d   t = 1 e m 1 = e m 1 1 e m 1 2 , saying all the 2 m points in S 0 are superimposed onto the first point after performing m times of symmetric folding. By Corollary 1, m times of symmetric folding also fold all the 2 m points onto the last point.
Corollary 3.
Given n points on a strip with n being a positive integer, it takes at least log 2 n and at most log 2 n + 1 times of symmetric folding to fold all these n points onto the first one or the last one.
Proof. 
If it happens to have an m 0 such that n = 2 m , then Corollary 2 ensures that Corollary 3 holds because m = log 2 n = log 2 n < log 2 n + 1 . Otherwise, there must exist a k such that 2 k 1 < n < 2 k . That is 1 2 < n 2 k < 1 leading to k 1 < log 2 n < k log 2 n < k log 2 n + 1 . By Theorem 1 and identity (1), k times of the symmetric folding yields n 2 k points. Since 1 2 < n 2 k < 1 n 2 k = 1 , the corollary holds.  □
Corollary 4.
Given 2 m n distinct points in a strip, where m and n are finite positive integers, then all these 2 m n points are folded to the first or the last n points after performing m times of symmetric folding one after another.
Proof. 
Let S 0 be the 2 m n points; kept in their original orders, subgroup them into 2 m clusters, say s 0 1 , s 0 2 , , and s 0 2 m ; then, each cluster contains n elements of S 0 . Namely, S 0 can be rewritten by
S 0 = { s 0 1 , s 0 2 , , s 0 2 m } .
Regard each cluster as a point in R n space; then, by Corollary 2, all the clusters are superimposed onto s 0 1 or s 0 2 m after performing m times of symmetric folding. This immediately validates Corollary 4.   □
Remark 5.
Referring to (7) and (8), let S k = { s k 1 , s k 2 , , s k 2 m k } be the set obtained by k times of symmetric folding of S 0 given by (15); then, it follows
s k j = s k 1 j s k 1 2 m ( k 1 ) + 1 j = t = 0 2 k 1 1 s 0 2 m ( k 1 ) t + j t = 1 2 k 1 s 0 2 m ( k 1 ) t + 1 j ,
where 1 k m and 1 j 2 m k .
Corollary 5.
Given a rectangular sheet containing 2 m rows and 2 n columns, where m and n are finite positive integers, assume S 00 is the set of points on the sheet, namely,
S 00 = { e 0 , 0 1 , 1 , e 0 , 0 1 , 2 , e 0 , 0 1 , 3 , , e 0 , 0 1 , 2 n , e 0 , 0 2 , 1 , e 0 , 0 2 , 2 , e 0 , 0 2 , 3 , , e 0 , 0 2 , 2 n , , e 0 , 0 2 m , 1 , e 0 , 0 2 m , 2 , e 0 , 0 2 m , 3 , , e 0 , 0 2 m , 2 n } ,
Or
S 0 , 0 = { e 0 , 0 i , j | 1 i 2 m , 1 j 2 n } .
Then, the following conclusions (C1),(C2), and (C3) are true.
(C1) For a positive integer k satisfying 1 k m , let S k be the set after performing k times of h-fold on S 00 and e k , i , j be its element at the i t h row and j t h column; then,
e k , i , j = e k 1 , i , j e k 1 , 2 m ( k 1 ) + 1 i , j = t = 0 2 k 1 1 e 0 , 0 2 m ( k 1 ) t + i , j t = 1 2 k 1 e 0 , 0 2 m ( k 1 ) t + 1 i , j ,
where 1 i 2 m k and 1 j 2 n .
(C2) For a positive integer l satisfying 1 l n , let S l be the set after performing l times of v-fold on S 00 and e , l i , j be its element at the i t h row and j t h column; then,
e , l i , j = e , l 1 i , j e , l 1 i , 2 n ( l 1 ) + 1 j = t = 0 2 l 1 1 e 0 , 0 i , 2 n ( l 1 ) t + j t = 1 2 l 1 e 0 , 0 i , 2 n ( l 1 ) t + 1 j ,
where 1 i 2 m and 1 j 2 n l .
(C3) For positive integers k and l satisfying 1 k m and 1 l n , let S k l be the set after performing a symmetric mixed fold on S 00 by k times of h-fold and l times of v-fold; denote e k , l i , j to be the element at the i t h row and j t h column of S k l ; then,
e k , l i , j = t = 0 2 k 1 1 e 0 , 0 2 m ( k 1 ) t + i , j t = 1 2 k 1 e 0 , 0 2 m ( k 1 ) t + 1 i , j t = 0 2 l 1 1 e 0 , 0 i , 2 n ( l 1 ) t + j t = 1 2 l 1 e 0 , 0 i , 2 n ( l 1 ) t + 1 j ,
where 1 i 2 m k , and 1 j 2 m l .
Proof. 
Regarding each row as a point in R 2 n , (C1) is true by referring to Corollary 2. Likewise, (C2) is true by regarding each column as a point in R 2 m . With the recursive principle, (C3) is obtained.  □
Remark 6.
By (18), all the rows of S 00 are superimposed onto the first row after performing m times of h-fold; by(19), all the columns of S 00 are superimposed onto the first column after performing n times of v-fold; by (20), all the elements of S 00 are superimposed onto e 0 , 0 1 , 1 or e 0 , 0 2 m , 2 n after performing symmetric mixed folds of S 00 by k h-folds and l v-folds.
Theorem 2.
The symmetric folding nearly doubles the probability of randomly selecting a witness point in a strip or sheet.
Proof. 
Consider the case of symmetrically folding a strip S 0 to S 1 . Partition S 0 into two symmetric halves, say S l and S r ; then, S 1 = S l S r . Suppose  Sl contains  wl witness points, Sr contains  wr witness points, and  S0 totally contains  n points. Let p1 denote the probability of randomly selecting a witness point in S1, and  p0 represent the probability of randomly selecting a witness point across S0. Then, in the case  n is even, say n = 2m, it leads to  p 0 = w l + w r 2 m . According to Definitions 1, 3, 5, and Corollary 2 in [20], the number of points on S1 is reduced to half that on S0 while the total number of witness points remains unchanged. Hence, p 1 = w l + w r m = 2 p 0 .
If n is odd, say n = 2m + 1, the intermediate point, say M, is on the perpendicular bisector. Assume M is not a witness and it belongs to either of S l and S r ; then, p 1 = w l + w r m + 1 and p 0 = w l + w r 2 m + 1 . Because w l + w r m + 1 / w l + w r 2 m + 1 = 2 m + 1 m + 1 2 , the theorem holds for this case. Likewise, if M is a witness, then p 0 = w l + w r + 1 2 m + 1 and p 1 = w l + w r + 1 m + 1 , leading to the same result as the case that M is not a witness.
The case of symmetrically folding a sheet can be proven similarly, showing that the theorem holds.   □

4. Applications for Folding and Searching Rectangular Datasets

Based on the theoretical findings, this section demonstrates the folding of two distinct sheets, denoted as Π and Π C , which were employed in [20] and [21], respectively. These sheets are specifically designed to identify a divisor of an odd composite integer N through the application of the Monte Carlo algorithm. Both sheets exhibit a structural characteristic wherein witnesses are locally accumulated within a large, sparse lattice space, resulting in significant gaps between non-witnesses. Such a configuration can lead to high search efficiency in certain cases but significantly reduced performance in others. For instance, when N comprises 23 decimal digits, the maximum computational time reaches 30,481.30 s, whereas the minimum is recorded at 3054.51 s, as illustrated in the tables in Section 4. This variability stems from the fact that the search process may frequently require extensive time traversing the large gaps between non-witnesses. Since folding has the potential to increase the witness distribution density and simultaneously reduce the gaps between non-witnesses, its application to these sheets is expected to improve search effectiveness. Motivated by this consideration, we investigate the strategies and methodologies for implementing the folding.

4.1. Folding and Searching Dataset Π

This subsection elaborates on the folding characteristics of Π , outlines a folding strategy, and proposes a method to implement the folding process.

4.1.1. Structure and Folding Characteristics of Π

For an odd composite integer N and a parameter g, the dataset Π is a lattice set described by
X [ 1 , N p u ] Y [ 1 , g ( p u p b 2 ) + 2 ] ,
where p b = ( N + 3 ) / 2 , p u = N 1 N , and the lattice point ( X , Y ) is associated with an imprint given by
ω X , Y = p u 1 Y 2 g .
Π is geometrically a rectangular sheet containing n r o w = N p u = N + 1 rows and n c o l = g ( p u p b 2 ) + 2 = g ( ( N 1 ) / 2 N 4 ) + 2 columns, a total of n r o w × n c o l elements. Expressed with imprints and by (22), each row of Π is identical to the others. For example, taking N = 35 and g = 2 yields Π as shown in Figure 3.
Using a solid circle • to denote a witness and an empty circle ∘ to denote a non-witness, we have the distribution pattern of witnesses and non-witnesses illustrated in Figure 4, which comes from Figure 3.
Obviously, such a distribution pattern will leave a significant ‘trap’ for a random search, as the search may frequently fall into the big areas occupied by non-witnesses.
Performing one, two, and three times of v-folds on Π results in Figure 5, among which Figure 5a has 6 rows and 9 columns, Figure 5b has 6 rows and 5 columns, and Figure 5c has 6 rows and 3 columns. It can be observed that the lattice position of the folded sheet wraps 2, 4, and 8 elements from Π with respect to the 1 v-fold, 2 v-folds, and 3 v-folds. Particularly, seen in Figure 5c, each point is associated with at least two witnesses, greatly increasing the probability of finding a witness.
Referring to (10) in [20], the probability P of randomly selecting a witness in Π is estimated by
P 2 N 1 > 2 N .
Assume 2 2 ( k 1 ) < N 2 2 k ; then, by Theorem 2, k 1 times of v-fold of Π can lead to a significantly big probability to select a witness randomly.

4.1.2. A Strategy for Folding and Searching Π

For a big N, both n r o w and n c o l are large numbers. As observed from (22), rows of Π are identical, implying that Π is essentially a large sheet consisting of n r o w duplicated long strips aligned up together. Hence, applying v-folding to an individual strip is computationally more efficient than folding the entire large sheet. Meanwhile, the large value of n r o w suggests that the number of points in the folded strip will remain substantially high. Therefore, partitioning the long strip into a sequence of smaller segments and utilizing parallel computing techniques to process these segments can improve the computational efficiency. Consequently, performing v-fold on an individual long strip, in conjunction with the parallel technique, constitutes the general strategy for folding and searching Π .

4.1.3. An Approach for Folding and Searching Π

There are various styles of folding a long strip. For example, a two-folded folding (symmetric folding) folds it by two halves, a three-folded folding folds it by three parts of equal length, and a multiple-folded folding folds it by more than three parts of equal length, as shown in Figure 6, where the arrows indicate the folding directions and the dashed lines mean the original configurations of the folded parts.
Herein, we introduce a method that folds a long strip into a specified number of smaller segments and performs synchronized searches on these folded segments. Assume a strip S persists n points; express n in the form 2 M W + R , namely,
n = 2 M W + R ,
where M, W, and R are integers such that M 1 and 0 R < W .
Then S can be partitioned 2 M + 1 segments. Among these segments, the shortest one contains R points, and the remaining 2 M ones collectively consist of 2 M W points. Obviously, each segment can be searched independently by either a parallel or a sequential technique. However, due to the characteristic of witnesses’ local accumulation within a global sparsity, some segments might contain no witnesses. Under such circumstances, folding these segments with v-folding is a reasonable measure to reduce the occurrence of the vanity in the segments. Because the shortest segment contains the fewest points, it can be searched first. If the search does not find an expected result, according to Corollary 4 and Remark 6, for any integer k satisfying 1 k M , the 2 M segments can be folded onto 2 M k segments, each containing exactly W points available for further searching.
Let S 0 = { s 0 1 , s 0 2 , , s 0 2 M } be the strip of the 2 M segments; assume S k = { s k 1 , s k 2 , , s k 2 M k } is the strip obtained after k times of the v-folds of S 0 ; then, it follows by (16)
s k i = t = 0 2 k 1 1 s 0 2 M ( k 1 ) t + i t = 1 2 k 1 s 0 2 M ( k 1 ) t + 1 i = t = 0 2 k 1 1 ( s 0 2 M ( k 1 ) t + i s 0 2 M ( k 1 ) ( t + 1 ) + 1 i ) ,
where 1 k M and 1 i 2 M k .
Assume Y 0 is the starting Y-coordinate of S 0 ; then, for an integer j satisfying 1 j 2 M , the j t h segment of S 0 is given by
s 0 j = s e g [ Y 0 + ( j 1 ) W , Y 0 1 + j W ] .
Accordingly, s 0 2 M ( k 1 ) t + i and s 0 2 M ( k 1 ) ( t + 1 ) + 1 i in (25) are, respectively, expressed by
s 0 2 M ( k 1 ) t + i = s e g [ s Y 1 , e Y 1 ]
and
s 0 2 M ( k 1 ) ( t + 1 ) + 1 i = s e g [ s Y 2 , e Y 2 ] ,
where s Y 1 , e Y 1 , s Y 2 , and e Y 2 are calculated by
s Y 1 = Y 0 + ( 2 M ( k 1 ) t + i 1 ) W e Y 1 = s Y 1 1 + W s Y 2 = Y 0 + ( 2 M ( k 1 ) ( t + 1 ) i ) W e Y 2 = s Y 2 1 + W .
The three expressions, (25), (27), and (28), exhibit that each segment s k i S k is superimposed by 2 k segments, where 1 k M , 0 t 2 k 1 1 . Notably, s 0 2 M ( k 1 ) t + i S 0 and s 0 2 M ( k 1 ) ( t + 1 ) + 1 i S 0 superimpose each other according to the rule defined in Definition 3.

4.2. Folding and Searching Dataset Π C

This subsection outlines the folding characteristic of Π C , proposes a method for folding and searching it.

4.2.1. Structure and Folding Characteristics of Π C

For an odd composite integer N and a parameter g, the dataset Π C defined in [21] is mathematically described by
X [ 1 , N p u ] Y [ g ( N p u ) , g ( p u p b 1 ) + 1 ] ,
where p b = N , p u = N 1 N , and the imprint of the lattice point ( X , Y ) is given by
ω X , Y = p u + X Y 1 g 1 .
Π C contains n r o w = N p u rows and n c o l = g ( 2 p u p b N 1 ) + 2 = g ( N 3 N 3 ) + 2 columns, a total of ( N p u ) ( g ( 2 p u p b N 1 ) + 2 ) elements. Figure 7 shows the imprints of Π C generated by N = 21 and g = 2 .
Seen in [21], Π C itself is symmetric with respect to its center and the witnesses in it distribute in a right-down pattern (in the direction parallel to the line y = g x ), also accumulating locally within global sparsity. Figure 8 depicts the witnesses and non-witnesses in Figure 7.
With such a distribution, both v-folds and h-folds are needed to obtain a denser distribution of the witnesses. Take the case of Figure 8 as an example; after an h-fold, it is turned into Figure 9.
Performing 2 times of v-folds turns Figure 9 into Figure 10a and Figure 10b, respectively. It is seen that the last fold leads to quite a high probability of randomly selecting a point of witness.
The probability of randomly selecting a witness in Π C has been estimated in [21] by
P Π C w i t n e s s 2 N + 1 ,
which is approximately for a large N
P Π C w i t n e s s 2 N .
Hence, for a given N satisfying 2 2 ( k 1 ) < N 2 2 k , applying k 1 iterations of h-folds or v-folds, or s + t iterations of h v -folds, where positive integers s and t satisfy the condition s + t = k 1 , can significantly increase the probability of randomly selecting a witness.

4.2.2. A Strategy for Folding and Searching Π C

It has been shown in [19] that one h v -fold of Π C generates the same resulting sheet as one v h -fold, with witnesses distributed in an approximately random manner across the resultant sheet. Meanwhile, the study [26] has proven that the first and last rows contain an identical number of witnesses, and that number is the maximum count across all rows. Based on these findings, a two-step folding and searching strategy is drawn as follows:
(1)
Conduct an h-fold of the last row onto the first row to obtain a folded strip S.
(2)
Fold and search S with the same approach as folding and searching a strip of Π .

4.2.3. An Approach Folding and Searching Π C

Because n c o l is a vast number for a big N, the h-fold of the last row onto the first row requires pre-partitioning the rows into smaller segments, similar to partitioning the long strip of Π . This can be achieved by still referring to Formula (24).
Consider each of the first and last rows is partitioned into 2 M + 1 segments, among which the shortest one contains R points and the other 2 M ones contain collectively 2 M W points, where M 1 and 0 R < W . If the shortest segment is searched without an expected result, let S 1 = { s 1 1 , s 1 2 , , s 1 2 M } , S L = { s L 1 , s L 2 , , s L 2 M } be the two strips formed by the consecutive segments from the first and last rows, respectively, and S 0 = { s 0 1 , s 0 2 , , s 0 2 M } be the strip folded by the h-fold of S L onto S 1 ; then,
s 0 j = s L j s 1 j = s L j s 1 j ,
where the superscript j ranges from 1 to 2 M .
Denote S k = { s k 1 , s k 2 , , s k 2 M k } to be the strip from S 0 being symmetrically folded by k times; it follows
s k i = t = 0 2 k 1 1 ( s 0 2 M ( k 1 ) t + i s 0 2 M ( k 1 ) ( t + 1 ) + 1 i ) = t = 0 2 k 1 1 ( s L 2 M ( k 1 ) t + i s L 2 M ( k 1 ) ( t + 1 ) + 1 i s 1 2 M ( k 1 ) t + i s 1 2 M ( k 1 ) ( t + 1 ) + 1 i ) ,
where the superscript k satisfies 1 k M and i ranges from 1 to 2 M k .
Formula (34) indicates that s k i is superimposed by 2 k + 1 segments, half from S 1 and half from S L . Still use Y 0 to be the starting Y-coordinate of S 0 ; referring to (26) and (27) follows
s 1 2 M ( k 1 ) t + i = s e g [ s Y 1 , 1 , e Y 1 , 1 ] ,
s L 2 M ( k 1 ) t + i = s e g [ s Y L , 1 , e Y L , 1 ] ,
s 1 2 M ( k 1 ) ( t + 1 ) + 1 i = s e g [ s Y 1 , 2 , e Y 1 , 2 ] ,
and
s L 2 M ( k 1 ) ( t + 1 ) + 1 i = s e g [ s Y L , 2 , e Y L , 2 ] ,
where the superscript t ranges from 0 to 2 k 1 1 and
s Y 1 , 1 = Y 0 + ( 2 M ( k 1 ) t + i 1 ) W e Y 1 , 1 = s Y 1 , 1 1 + W s Y L , 1 = Y 0 + ( 2 M ( k 1 ) t + i 1 ) W e Y L , 1 = s Y L , 1 1 + W s Y 1 , 2 = Y 0 + ( 2 M ( k 1 ) ( t + 1 ) i ) W e Y 1 , 2 = s Y 1 , 2 1 + W s Y L , 2 = Y 0 + ( 2 M ( k 1 ) ( t + 1 ) i ) W e Y L , 2 = s Y L , 2 1 + W .
The Formulas (35)–(38) show that the search on s k i is converted into the searches on the corresponding segments of S 1 and S L .

4.3. Superimposing Π on Π C and Searching It

Restrict X and Y by
X [ 1 , N p u ] Y [ g ( N p u ) , g ( p u p b 2 ) + 2 ] .
Then, Π and Π C contain the same number of rows and columns for a given p b , and thus the two can be superimposed on each other. Denote the superimposed result with the symbol Ξ , namely, Ξ = Π Π C ; then, the witnesses in Ξ are more than in either Π or Π C . Figure 11 exhibits the witnesses and non-witnesses within Ξ that are produced by taking N = 35 , g = 2 and p b = N . This time, utilizing on Ξ the SPRSA searching method introduced in [20] generally brings a higher efficiency than on Π C .

4.4. Numerical Experiments

Numerical experiments were conducted using computers equipped with an Intel(R) Core(TM) i5-10500 CPU @ 3.10 GHz, 16 GB of RAM, and the Windows 10 operating system, implemented in Python 3. The experimental data were sourced from [20,21], originally presented in [27]. The results are summarized in Table 1, Table 2, Table 3, Table 4 and Table 5. In these tables, the column labeled “Integer N” denotes the semi-prime integers to be factored; the “Digits” column indicates the number of decimal digits in N; “Time 1” represents the computational time reported in [20]; “Time 2” corresponds to the time reported in [21]; “Time 3” is the time after folding Π ; “Time 4” is the time after folding Π C ; and “Time 5” refers to the time after superimposing Π onto Π C . All the times are measured in seconds, and the Monte Carlo search method was employed throughout, consistent with the approach used in [20,21]. The results demonstrate that folding and superimposing operations yield improved computational efficiency, thereby supporting the theoretical analysis.

4.5. More Application Scenarios

The method of symmetric folding can be applied to more scenarios than just identifying a divisor of a composite integer, which is an essential topic in cryptography. Since the folding operations are actually performed on the indices of the elements in a matrix-formed dataset, as expressed in the formulations (5)–(20), the method can be generally applied to any countable, structured dataset. Here are some examples.
  • Blind search issue. A blind search searches for objectives within a restricted area without previously assigning information about them. A concrete example of such a search is fault diagnosis in industry, such as detecting the fault spot within a material through data analysis, identifying the faulty component in a large-scale integrated circuit, and so on. Those detections are always performed with an embedded diagnosis system. By structuring the source data, folding can improve the computational efficiency of the system.
  • Database issue. A database is a structured repository for storing and frequently accessing large volumes of data. Each database can be conceptualized as a sheet composed of rows and columns. According to Remarks 4 and 6, applying k iterations of symmetric folding results in a single cell in the folded sheet corresponding to 2 k distinct cells in the original database. As a result, querying a single cell in the folded sheet provides simultaneous access to 2 k cells in the original database, thereby significantly improving search efficiency.
  • Engineering optimization issue. Engineering optimization constantly searches for a solution in a large computational domain. Partitioning the domain first and then folding the partitioned result, as we do with Π and Π C , can lead to multiple subdomains being synchronically searched, thus enhancing computational efficiency.

5. Conclusions and Future Work

Based on the physical principle that symmetric folding can bring points on a paper sheet closer together, we have developed mathematical models for symmetrically folding a dataset represented in matrix form and have formulated the corresponding computational procedures. Since this folding process both increases the density of witnesses and reduces the gaps between non-witnesses, a witness-based randomized approach can either efficiently identify a witness or rapidly traverse a non-witness, thereby improving overall search efficiency. The mathematical analysis, grounded in an abstract countable dataset, ensures that our theoretical results and computational formulations can be applied to any arbitrary finite countable dataset. Although our practical examples demonstrate the method by identifying a divisor of an odd composite integer, our framework remains general.
Nevertheless, certain aspects remain for future investigation, such as the development of random search algorithms on two-dimensional regions formed through multiple hybrid folding operations and how such techniques further enhance random search efficiency. Furthermore, researches on multi-dimensional folding, finding a optimal folding sequence, and folding an irregular dataset also challenge our future work. We hope that more young researchers will engage in this area to produce even deeper and more valuable results.

Funding

This research was supported by Natural Science Foundation of Guangdong Province (2024A1515010021) and Guangzhou University of Software (KY202501).

Data Availability Statement

The source codes of the numerical experiments are accessed at the Python forum thread: https://python-forum.io/thread-45621-post-188242.html#pid188242 (accessed on 30 October 2025).

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Littman, M.L. The Witness Algorithm: Solving Partially Observable Markov Decision Processes; Technical report; Brown University: Providence, RI, USA, 1994. [Google Scholar]
  2. Poupart, P. Exploiting Structure to Efficiently Solve Large-Scale Partially Observable Decision Processes. Ph.D. Dissertation, The University of Toronto, Toronto, ON, Canada, 2005. [Google Scholar]
  3. Alon, N.; Naor, M. Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions. Algorithmica 1996, 16, 434–449. [Google Scholar] [CrossRef]
  4. Du, W.; Deng, J.; Han, Y.S.; Varshney, P.K. A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of the IEEE Global Telecommunications Conference, San Francisco, CA, USA, 1–5 December 2003. [Google Scholar] [CrossRef]
  5. Frederix, D. Starting in the Middle: Witness-Based Itemset Mining. Master’s Thesis, Kargolieke University, Leuven, Belgium, 2014. [Google Scholar]
  6. Chini, P.; Massoud, R.; Meyer, R.; Saivasan, P. Fast Witness Counting. arXiv 2018, arXiv:1807.05777. [Google Scholar] [CrossRef]
  7. Saan, S. Witness Generation for Data-Flow Analysis. Master’s Thesis, University of Tartu, Tartu, Estonia, 2020. [Google Scholar]
  8. Nguyen, L.D.; Leyva-Mayorga, I.; Popovski, P. Witness-based Approach for Scaling Distributed Ledgers to Massive IoT Scenarios. In Proceedings of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020. [Google Scholar] [CrossRef]
  9. Xie, X.; Chen, Y.C.; Wang, J.R.; Wu, Y. Witness-Based Searchable Encryption with Aggregative Trapdoor. In Security with Intelligent Computing and Big-Data Services (SICBS 2018); Springer: Cham, Switzerland, 2018. [Google Scholar] [CrossRef]
  10. Ayaziova, P.; Beyer, D.; Lingsch-Rosenfeld, M.; Spiessl, M.; Strejcek, J. Software Verification Witnesses 2.0. In Model Checking Software; Neele, T., Wijs, A., Eds.; Springer: Cham, Switzerland, 2025; pp. 184–203. [Google Scholar] [CrossRef]
  11. Wang, Y.; Zhang, T.; Huang, X.; Fei, S. Witness based nonlinear detection of quantum entanglement. arXiv 2025, arXiv:2502.02868. [Google Scholar] [CrossRef] [PubMed]
  12. Richard, M.K. An introduction to randomized algorithms. Discret. Appl. Math. 1991, 34, 165–201. [Google Scholar] [CrossRef]
  13. Motwani, R.; Raghavan, P. Randomized algorithms. ACM Comput. Surv. 1995, 28, 33–37. [Google Scholar] [CrossRef]
  14. Hromkovič, J. Algorithmic Adventures: From Knowledge to Magic; Springer: Berlin/Heidelberg, Germany, 2009; p. 210. [Google Scholar] [CrossRef]
  15. Ronald, T.K. The Art of Randomness: Randomized Algorithms in the Real World; No Starch Press: San Francisco, CA, USA, 2024; p. 638. [Google Scholar]
  16. Aspnes, J. Notes on Randomized Algorithms. arXiv 2024, arXiv:2003.01902. [Google Scholar] [CrossRef]
  17. Hromkovič, J. Design and Analysis of Randomized Algorithms; Springer: Berlin/Heidelberg, Germany, 2005; p. 183. [Google Scholar] [CrossRef]
  18. Sharma, K.; Garg, D. Randomized Algorithms: Methods and Techniques. Int. J. Comput. Appl. 2011, 28, 29–32. [Google Scholar] [CrossRef]
  19. Huang, Y.; Wang, X. A Property of Point Symmetry Under Symmetric Folding Transformation. Asian Res. J. Math. 2025, 21, 43–50. [Google Scholar] [CrossRef]
  20. Li, H.; Liu, Z.; Wang, X. A Dataset and A Dynamic Distributed Parallel Network for Identifying Divisors of Odd Composite Integers. J. Adv. Math. Comput. Sci. 2025, 40, 104–129. [Google Scholar] [CrossRef]
  21. Liu, Z.; Li, H.; Wang, X. A Novel Dataset and Algorithm for Identifying Divisors of an Odd Composite Integer Using Distributed Parallel Network. J. Adv. Math. Comput. Sci. 2025, 40, 105–120. [Google Scholar] [CrossRef]
  22. The Math Forum Drexel University and Jessica Wolk-Stanley. In Dr. Math Introduces Geometry; John Wiley & Sons: Hoboken, NJ, USA, 2004; p. 137.
  23. Umble, R.N.; Han, Z. Transformational Plane Geometry; CRC Press: Boca Raton, FL, USA, 2015; p. 133. [Google Scholar]
  24. MathBitsNotebook Symmetry in Geometry; Mathbitsnotebook: New York, NY, USA, 2025.
  25. Graham, R.L.; Knuth, E.E.; Patashnik, O. Concrete Mathematics: A Foundation for Computer Science, 2nd ed.; Addison-Wesley Publishing Company: Boston, MA, USA, 1994; pp. 67–101. [Google Scholar]
  26. Liu, Y.; Wang, X. A Boundary Property of Dataset ΠC. Int. J. Math. Trends Technol. 2025, 71, 28–32. [Google Scholar] [CrossRef]
  27. Mahadee, A.M.; Kamrujjaman, M. Cryptanalysis of RSA Cryptosystem: Prime Factorization using Genetic Algorithm. arXiv 2024, arXiv:2407.05944. [Google Scholar] [CrossRef]
Figure 1. Symmetrical folding brings witnesses into closer proximity.
Figure 1. Symmetrical folding brings witnesses into closer proximity.
Symmetry 17 02086 g001
Figure 2. Imprints and folding of them.
Figure 2. Imprints and folding of them.
Symmetry 17 02086 g002
Figure 3. Dataset Π generated by N = 35 and g = 2 .
Figure 3. Dataset Π generated by N = 35 and g = 2 .
Symmetry 17 02086 g003
Figure 4. Witness and non-witness in Π generated by N = 35 and g = 2 .
Figure 4. Witness and non-witness in Π generated by N = 35 and g = 2 .
Symmetry 17 02086 g004
Figure 5. v-folds of Π in Figure 4. (a) One v-fold of Π . (b) Two v-folds of Π . (c) Three v-folds of Π .
Figure 5. v-folds of Π in Figure 4. (a) One v-fold of Π . (b) Two v-folds of Π . (c) Three v-folds of Π .
Symmetry 17 02086 g005
Figure 6. Various folding styles. (a) Two-folded folding. (b) Three-folded folding. (c) Multiple-folded folding.
Figure 6. Various folding styles. (a) Two-folded folding. (b) Three-folded folding. (c) Multiple-folded folding.
Symmetry 17 02086 g006
Figure 7. Dataset Π C generated by N = 21 and g = 2 .
Figure 7. Dataset Π C generated by N = 21 and g = 2 .
Symmetry 17 02086 g007
Figure 8. Witness and non-witness in Π C of N = 21 and g = 2 .
Figure 8. Witness and non-witness in Π C of N = 21 and g = 2 .
Symmetry 17 02086 g008
Figure 9. Result of folding Figure 8 by an h-fold.
Figure 9. Result of folding Figure 8 by an h-fold.
Symmetry 17 02086 g009
Figure 10. v-folds of Figure 9. (a) One v-fold. (b) Two v-folds.
Figure 10. v-folds of Figure 9. (a) One v-fold. (b) Two v-folds.
Symmetry 17 02086 g010
Figure 11. Witnesses and non-witnesses in Ξ by N = 35 and g = 2 .
Figure 11. Witnesses and non-witnesses in Ξ by N = 35 and g = 2 .
Symmetry 17 02086 g011
Table 1. Comparison of Time Consumption in Group 1.
Table 1. Comparison of Time Consumption in Group 1.
Integer NDigitsTime 1Time 2Time 3Time 4Time 5
10,909,34383.542.660.380.300.23
29,835,45782.631.970.190.290.22
392,913,60793.592.690.260.170.13
5,325,280,633102.371.780..320.180.14
42,336,478,013112.381.790.450.260.20
272,903,119,607122.121.591.050.270.20
11,683,458,677,563145.153.860.390.300.23
51,790,308,404,911143.732.800.460.450.34
115,137,038,087,959153.652.740.580.600.45
8,335,465,900,089,539163.302.4815.661.641.23
10,380,088,039,872,6311713.049.788.572.231.67
253,422,413,591,685,0011831.6623.758.601.290.97
1,160,633,764,479,964,6331952.6039.459.721.451.09
31,625,125,947,164,338,31320192.09144.0710.251.911.43
454,367,322,351,811,534,93321329.11246.8322.554.124.09
4,500,000,514,520,012,390,279221875.851406.8945.9515.8313.87
26,785,956,134,870,280,125,2732310,118.367588.77168.7576.0567.04
Table 2. Comparison of Time Consumption in Group 2.
Table 2. Comparison of Time Consumption in Group 2.
Integer NDigitsTime 1Time 2Time 3Time 4Time 5
12,654,52983.022.270.290.350.26
369,717,13392.872.150.270.360.27
1,897,440,553102.571.930.240.350.26
52,739,663,177116.004.500.560.350.26
130,713,369,233122.141.610.250.360.27
6,748,770,789,473133.372.530.270.370.28
11,524,840,919,477142.581.940.370.370.28
430,485,039,573,419155.233.921.531.140.86
1,955,733,632,904,137166.434.824.844.683.51
30,217,484,037,846,601175.794.348.413.232.42
266,941,704,466,880,371184.873.658.963.252.44
2,166,633,888,615,295,1591931.8623.909.953.562.67
22,756,653,803,671,245,0412097.0672.8021.293.802.85
413,222,670,126,548,323,08121397.38298.0422.3111.758.81
1,503,913,043,740,073,215,12722861.5646.1333.9518.9514.22
23,208,481,761,499,119,809,917233054.512290.8892.2664.8948.67
Table 3. Comparison of Time Consumption in Group 3.
Table 3. Comparison of Time Consumption in Group 3.
Integer NDigitsTime 1Time 2Time 3Time 4Time 5
11,157,06782.211.660.290.350.29
383,910,35393.372.530.240.350.24
1,438,236,853102.541.910.340.340.34
59,495,473,109112.371.780.350.360.35
204,338,073,419121.751.310.670.660.67
4,075,254,216,277133.172.380.360.350.36
16,522,992,841,517142.331.750.390.400.39
415,613,171,542,577153.402.551.221.231.22
2,130,887,677,054,5591619.1214.345.071.051.07
31,043,832,317,143,097177.655.748.801.211.80
209,495,243,841,913,5431814.3810.797.991.251.99
4,082,205,679,196,499,709196.144.619.341.682.34
33,019,716,065,589,397,44720597.08447.8132.282.772.28
450,574,758,051,764,161,72921397.38298.0443.811.713.81
1,878,613,353,066,239,152,189222069.931552.4546.0319.7116.03
27,913,133,719,399,938,961,837237894.195920.6448.0612.6048.06
Table 4. Comparison of Time Consumption in Group 4.
Table 4. Comparison of Time Consumption in Group 4.
Integer NDigitsTime 1Time 2Time 3Time 4Time 5
13,414,96782.962.220.360.340.36
331,451,89392.762.070.350.350.35
1,933,146,287103.282.460.340.370.34
61,376,888,039114.503.380.350.350.35
221,449,201,327122.932.200.990.680.99
8,356,391,888,797134.003.000.370.370.37
10,503,658,570,897143.892.920.370.390.37
530,802,693,107,327153.662.753.031.531.03
1,571,847,149,341,363165.634.223.591.041.59
30,266,236,030,889,197177.305.489.191.091.19
227,020,160,422,765,0631828.6221.478.672.161.67
7,632,766,872,780,422,2131921.1615.877.6012.361.60
28,518,585,380,150,198,56120171.77128.8310.621.912.62
549,438,783,354,451,709,26121809.52607.1422.112.5512.11
1,885,102,352,659,402,618,003221827.621370.7279.393.7939.39
21,852,468,492,088,577,490,449235153.083864.8190.9158.1090.91
Table 5. Comparison of Time Consumption in Group 5.
Table 5. Comparison of Time Consumption in Group 5.
Integer NDigitsTime 1Time 2Time 3Time 4Time 5
11,427,67781.811.360.350.350.26
405,031,25991.341.010.340.320.24
1,354,177,351102.031.520.360.330.25
61,111,357,501112.141.610.330.330.25
190,838,622,707121.881.410.390.390.29
3,856,534,651,811132.982.240.460.350.26
15,286,768,369,531141.411.060.380.340.26
450,109,181,452,867156.945.211.200.210.16
1,317,487,523,002,697162.461.853.270.210.16
31,042,285,010,899,441174.013.0115.251.040.78
218,532,124,445,731,211183.532.658.631.531.15
8,202,929,148,558,584,68319111.6383.728.522.561.92
24,120,674,285,926,579,15920218.28163.7120.421.561.17
464,395,777,895,275,578,16921715.56536.6738.713.472.60
1,789,550,188,834,786,401,307226229.764672.3246.0329.630.2
29,891,632,748,859,892,878,8632330,481.3022,860.9870.1921.5318.15
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, X. Symmetric Folding: An Efficient Method for Accelerating Witness-Based Random Search. Symmetry 2025, 17, 2086. https://doi.org/10.3390/sym17122086

AMA Style

Wang X. Symmetric Folding: An Efficient Method for Accelerating Witness-Based Random Search. Symmetry. 2025; 17(12):2086. https://doi.org/10.3390/sym17122086

Chicago/Turabian Style

Wang, Xingbo. 2025. "Symmetric Folding: An Efficient Method for Accelerating Witness-Based Random Search" Symmetry 17, no. 12: 2086. https://doi.org/10.3390/sym17122086

APA Style

Wang, X. (2025). Symmetric Folding: An Efficient Method for Accelerating Witness-Based Random Search. Symmetry, 17(12), 2086. https://doi.org/10.3390/sym17122086

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop