Abstract
In the paper, we consider a ring structure on the Cartesian product of two sets of integer multisets. In this way, we introduce a ring of integer multinumbers as a quotient of the Cartesian product with respect to a natural equivalence. We examine the properties of this ring and construct some isomorphisms to subrings of polynomials and Dirichlet series with integer coefficients. In addition, we introduce finite rings of multinumbers “modulo ” and propose an algorithm for construction of invertible elements in these rings that may be applicable in Public-key Cryptography. An analog of the Little Fermat Theorem for integer multinumbers is proved.
Keywords:
set of multisets; multinumbers; supersymmetric polynomials; finite rings; applications in Cryptography MSC:
11C08; 46G25; 94A60
1. Introduction
Permutation-invariant objects naturally appear when we work with a large amount of information that does not depend on the order. Such a situation is typical, for example, in Quantum Statistical Physics, Data Science, Neural-Network Theory (see e.g., [1,2] and references cited therein). A multiset, defined as an unordered collection of elements that may be repeated, is a good tool for modeling such objects. Semiring algebraic structures on multisets and their applications for neural networks were considered in [3] (see also [4] for a more general context).
A set of finite multisets can be represented as the quotient set of the linear space of all finite sequences with respect to the following equivalence: two vectors in are equivalent if they are equal to each other up to a permutation of coordinates. Thus, we can consider a finite multiset of nonzero elements as a class of the equivalence containing the vector It is possible to introduce some algebraic operations on the set of multisets. We denote by the union of two multisets x and and by their product—that is, a multiset consisting of all products of elements x and The set of finite multisets is a commutative semiring with respect to these operations [5,6]. The semiring structure is not rich enough. However, since we have a commutative semigroup with the cancellation law with respect to “•”, we can apply the Grothendieck construction to embed it to a commutative group and extend the multiplication “⋄” by the distributivity. Such a ring of multisets was constructed in [6] using symmetric and supersymmetric polynomials on a Banach space (see also [7]). More details about algebras of symmetric polynomials on Banach spaces can be found in [8,9,10,11,12,13,14]. The combinatorial approach to symmetric polynomials can be found in [15]. Discrete dynamic systems based on were considered in [16]. Systematic theory of multisets can be found in [17].
In this paper, we consider the subring of comprising multisets with positive integer elements. The subring contains an isomorphic copy of the ring of integers and so can be considered as a generalization of integer numbers. We call the ring of multinumbers. We study properties of and some finite rings of multinumbers “modulo ”, and propose some applications of the finite rings to Cryptography.
In Section 2, we provide some definitions and preliminary results. In Section 3, we establish basic properties of the ring construct isomorphisms of to a ring of polynomials of infinitely many variables with entire coefficients, and deduce from here some properties of Further, we show that is isomorphic to a ring of Dirichlet series with entire coefficients. In Section 4, we introduce finite rings of multinumbers , which are generalizations of The main result of this section is Theorem 4, where we found some conditions under which an element in is invertible. Moreover, an analogue of the Little Fermat Theorem for multinumbers is proved. In Section 5, we propose an algorithm of encryption and decryption involving integer multinumbers.
For more details about applications of Number Theory to Cryptography, we refer the reader to [18,19,20].
2. Definitions and Preliminaries
Let be the notation for one of the following sets: the set of complex numbers , the set of integers , or the set of natural numbers Further, we use for the set of nonnegative integers. We denote by the set of infinite-dimensional vectors —that is, vectors with finitely many nonzero coordinates in and by the set all vectors (infinity sequences) Let us consider the Cartesian product
For given permutations on the set of natural numbers and
we denote
We introduce the following relation of equivalence on Let and in . We say that if and only if there are and in and permutations and on such that
The quotient set with respect to the equivalence, and its completion in the metric of the absolute convergence were considered in [6]. It is easy to see that the class containing is invariant with respect to the minimal semigroup of mappings from to itself containing operators of permutation of the bases of separately on each and affine operators
for every Let us denote by the set
Consider the following mappings on (so-called supersymmetric polynomials):
Here, for the case we assume that In other words, where is the cardinality of a given set A and
It is easy to check that if then for every because
Next, we will show that the inverse statement is also true.
Using ideas from [6,9,10] introduced algebraic operations of “addition” and “multiplication” on Let and be classes that contain z and , respectively. Then, we set
For every there is an inverse element defined by Thus, is a commutative group with zero Clearly, the operations “+” and taking of inverse do not depend on representatives.
In [6] (Theorem 1) it was observed that if and only if for every Since we have the following proposition.
Proposition 1.
if and only if for every
For given x and in denotes the resulting sequence of ordering the set with one single index in some fixed order. So, we can define
To check that the multiplication does not depend on representatives, we observe that
(see for the proof [6] (Proposition 5)). Thus, if and then , and so, by Proposition 1,
Note that elements of the form may be considered as finite multisets—that is, unordered collections of numbers with possible repetitions. Let Then, is a commutative semiring. Since its additive semigroup is cancellative—that is, implies for all —it follows that it can be isomorphically embedded into some commutative group (so-called the Grothendieck group) using a simple Grothendieck idea, which is the starting point of K-theory (see e.g., [21]). From this point of view, is the Grothendieck group, associated with
Often, we will use notations instead of
Theorem 1.
(See Theorem 4 and Example 1 in [6]). is a commutative ring with zero and unity Functions
are ring homomorphisms.
Example 1.
Let and Then,
We call elements in by complex multinumbers, in by integer multinumbers, and in by natural multinumbers. Note that and is a semiring of
3. Basic Properties of Multinumbers
Proposition 2.
is a subring of and functions restricted to are ring homomorphisms from to
Proof.
Clearly, if and are in then and So, is a subring. Further, if and □
We will use notations for a typical element in and for a typical element in Let We denote by if and if where In particular, where is the unity in Note that
Proposition 3.
The map is an injective homomorphism from into
Proof.
It is easy to check that and Further, if □
Thus, we have that contains an isomorphic copy of —that is, we can consider as a generalization of
Let be the ring of formal polynomials over on the set of all sequences of complex numbers—that is, every is of the form
for some and the right side series contains a finite number of nonzero terms.
Note that has divisors of zero; for example, We will show that for , it is not so.
Theorem 2.
There is a ring isomorphism
Proof.
Let be the sequence of prime numbers. Let and We set Note that Let us define by
where If then
for some ; so, Thus, the definition of does not depend on the representative.
Clearly, if then and so is injective. It it easy to check that is additive and multiplicative. The preimage of is equal to and —that is, is subjective. So, is an isomorphism. □
Since is an integral domain, we have the following corollary.
Corollary 1.
The ring is an integral domain and every element in has a unique representation by the product of irreducible elements.
Example 2.
Let us factor the element into a product of irreducible elements in By Theorem 2,
Thus,
Since polynomials and are irreducible in elements and are irreducible in
Corollary 2.
For every permutation σ on the set of prime numbers , there exists a ring isomorphism such that
Proof.
For every permutation the mapping is a ring isomorphism of to itself, since
and is a linear isomorphism of the linear space Indeed, if and then
By the same reason, □
Corollary 3.
For every fixed (), there is a ring homomorphism (resp. ) defined by
Conversely, any ring homomorphism from to (from to ) can be defined by (1) for some (resp. ).
Proof.
It is clear that is a homomorphism and the range of is in if Let be a homomorphism. Let us define t by
Then, for every If is a homomorphism from to then for every n; so, □
Corollary 4.
Let us suppose that and polynomials have no common zeros in Then, there are and a positive integer j such that
Proof.
Let N be a maximal natural number such that polynomials depend on So, have no common zeros in By the Hilbert Nullstellensatz, there are polynomials on such that
Since all polynomials polynomials are in [22] (Ch. VII, Theorem 14)—that is, all coefficients of are rational numbers. Let j be the common denominator of all coefficients of all Then, we can write
where Setting we have the required identity. □
Example 3.
Let and Then, and have no common zeros. Clearly, Hence,
Note that elements of the form are not invertible even in the ring of multisets [6] (Proposition 10).
Let us denote
for some fixed and We say that the equation
is a Diophantine equation for undetermined multinumbers
Example 4.
Let us solve the following equation
By Theorem 2,
and so,
Hence,
The following proposition is obvious.
Proposition 4.
If a Diophantine equation has a solution then is a solution of the following Diophantine equation in integers
for every homomorphism
From this proposition, in particular, it follows that if a Diophantine equation has no solution in then it has no solution in
Another representation of can be given by a ring of finite Dirichlet series. Let us recall that a formal series of the form
is a Dirichlet series. We denote by the subset of finite Dirichlet series with coefficients Clearly, is a ring with respect to usual addition and multiplication. The next proposition follows from direct calculations.
Proposition 5.
The following map is a ring isomorphism from to
Combining isomorphisms and , we can see that is a ring isomorphism from to
Such an isomorphism is well-known in a more general context and is called the Borh transform. It can be extended to a map
where and is an isomorphism from the algebra of bounded holomorphic functions on the unit ball of the Banach space of convergent to zero sequences to the Banach algebra of Dirichlet series such that
(see for details [23] (p. 85)). Thus, from Corollary 4, we have the following result.
Corollary 5.
Let us suppose that are such that polynomials have no common zeros in Then, there are and a positive integer j such that
Example 5.
Let and as in Example 3. Then,
4. Finite Rings of Multinumbers
Let be natural numbers. Let us consider the following relation of equivalence “modulo ” on defined by
where and In other words, entries and are in and the number of repetitions of any number or is in For example, for every , we have
if and
Let us denote by the set of classes of the equivalence. In sequel, we always assume that and Since every element in has a representative of the form
we will use the notation for the class containing Moreover, to simplify notation, we will write
Proposition 6.
has the following properties:
- (i)
- is a finite commutative ring with the unity The cardinality of is
- (ii)
- is isomorphic to
- (iii)
- The mappingis a ring homomorphism.
Proof.
(i). From the definition of , one can see that it is closed with respect to the algebraic operations. The properties of these operations (the associativity, the commutativity, the distributivity low) can be checked by the same way as in the case Every element in can be written as
where Thus, the number of such elements is equal to the number of all multi-subsets of the multiset
It is well-known in Combinatorics that such a number is equal to (e.g., see [24] for a more general case).
(ii). Every element in can be represented by
and the correspondence is the required isomorphism onto
(iii). It is well-known that the mapping is a ring homomorphism from to
Let
then
By the additivity and the multiplicativity of maps and using routine calculations, we have that and for all □
Next, we consider the following question: Under which conditions is an element invertible in?
It is easy to find divisors of zero in For example,
Theorem 3.
The ring is a field if and only if and p is a prime number. In this case, the field is isomorphic to
Proof.
The case is considered in Proposition 6. If then and We claim that, in this case, is not invertible. Indeed,
So, if then
This is a contradiction. □
Clearly, elements where k is coprime with are “trivial” examples of invertible elements in Indeed, if then Other “trivial” examples of invertible elements in are if m is coprime with Let us show that there are nontrivial invertible elements.
Example 6.
In , we have
That is, is invertible.
Theorem 4.
Let p be a prime number. Suppose that is invertible in and is such that in for some Then, is invertible in and
Proof.
Since p is prime, coefficients are divisible by p and so
Hence,
since in However, is invertible. Thus,
□
Corollary 6.
Let p be a prime number. Suppose that is invertible in and is such that for some Then, is invertible in and
The corollary is a partial case of Theorem 4 for For given p and k, we can find q satisfying the condition It is enough to set where for some and In particular, we have the following corollary.
Corollary 7.
Let , and p be a prime number. Suppose that is invertible in and is such that Then, is invertible in and can be computed by (2).
Corollary 8.
Let , and p be a prime number. Then,
- 1.
- The multinumber is invertible in and
- 2.
- If then is invertible in and
Proof.
Clearly, is such that in and both and are invertible. □
Since a product of invertible elements is invertible, we have the following corollary.
Corollary 9.
Let and p be a prime number. Then, multinumbers are invertible in
Let us recall that according to the Euler Theorem, if n is coprime with then
where is the Euler totient function counting integers between 0 and p, which are coprime with If p is a prime number, then and we have the Little Fermat Theorem The following theorem can be considered a generalization of the Little Fermat Theorem for multinumbers.
Theorem 5.
Let p be a prime number and Then,
- 1.
- 2.
- If is invertible, then in
Proof.
Since we can write
Since p is prime, is divisible by p for and so it is equal to zero in Moreover, by the Little Fermat Theorem, Thus,
If is invertible, then □
Note that is not necessarily invertible. For example, is not invertible in because but So, it is naturally to ask the following: Under which conditions is invertible in ? From Theorem 5, we have a criterium of invertibility of in
Corollary 10.
Let p be a prime number and Then, is invertible if and only if in
Proof.
Indeed, if then □
Example 7.
The multinumber is not invertible in because
but is invertible in because , and so,
The question about possible extension of the Euler Theorem looks more complicated.
Example 8.
Let Then and Thus, in this case while both pairs and are coprime numbers. On the other hand,
Conditions of Theorem 4 show that it is important to know nilpotent elements in Moreover, structures of nilpotent ideals in a given ring are important for studying of the ring (see e.g., [25,26]). Next, the corollary shows that there are no nilpotent elements in if p is prime.
Corollary 11.
Let p be a prime number. Then, has no nonzero nilpotent elements.
Proof.
Let for some Since by Theorem 5, without loss of generality, we can assume that Then,
Hence, □
Note that even if both p and q are primes, still may have nilpotent elements. For example, as we already observed, in
5. Possible Applications to Cryptography
The idea of open encryption in Cryptography is based on the fact that some operations are difficult for computing. For example, for an integer a, it is difficult to compute modulo p if a and p are big enough. In the case where a and p are multinumbers, the algorithm for finding the inverse could be more complicated because integer numbers are partial cases of integer multinumbers. Thus, we can consider the following protocol of encryption and decryption involving integer multinumbers.
- Let be a natural multinumber, coding a secret message by an open code.
- Randomly choose a prime number p and a number q such that and
- We consider three possible cases:
- both numbers p and q are secret;
- both numbers p and q are public;
- either p or q is secret.
- Generate two random keys: a public key and private key in using Theorem 4 and corollaries after the theorem.
- To encrypt, find and reduce each component of modulo q if q is public, and the number of repetitions of each component of modulo p if p is public.
- To decrypt, find and reduce it modulo —that is,
Let us explain some steps. We suppose that the secret message a in (1) is a vector with nonnegative integer coordinates. Let us construct the multinumber coding a by the following way:
For example, if then ; if then
Formally, belongs to and we will use the operator as in Proposition 6 to reduce it modulo Further, we need operations of partial reductions. Define
and
Here, is the homomorphism from to Clearly,
Let us consider step (2). Firstly, we randomly choose a big enough prime number p taking into account that To choose q, let us randomly select finite sequences of natural numbers ; ; and such that for every and Moreover, we randomly select a natural number and set Since p is prime, is invertible and, according to the Little Fermat Theorem, As q divides and by Theorem 4, is invertible. By the same reason, and so, is invertible. Thus, applying Theorem 4 s times, we will obtain that
is invertible. In each step, we have the inverses , and at step , we will obtain
Note that we can repeat this process for the same p and q but with different constants and to obtain another invertible element in The product of two invertible elements is invertible; so, the final key may be obtained as a product of several invertible multinumbers obtained by the algorithm above.
If both p and q are secret, then the encrypted code is of the form Using Theorem 2, we can represent it as a product of polynomials of many variables
Since is known, one can recover the secret information by dividing
using known division algorithms for multivariable polynomials. Thus, case 3a is not secure.
Suppose that both p and q are public. Then, the encrypted code is The operator is not invertible, so the previous method of attack is not effective. However, one can consider the sequence for j big enough. It is well-known in Ring Theory that there is such that
Then, for the step , we have the secret information So, case 3b is also not secure.
Before we turn to case 3c, let us consider what happens in the classical situation in If p is prime, then
is a one-way function that is injective for Thus, the encryption cannot be broken if p is secret. However, in this case, we have no public key and so the public-key cryptography system cannot be realized. If p is public, then the system may be attacked, as in case 3b.
In the well-known RSA algorithm [20] (p. 185), the encryption function is defined by
where b and are coprime and p is not a prime number. To obtain the inverse function, it is necessary to compute the Euler function , which is equivalent to factoring p into prime numbers. The proposed algorithm is not a precise analog of the RSA algorithm because we do not have a good multinumber version of the Euler Theorem. However, case 3c allows us to use one-way functions
having either p or q as a public key. As we can see in the following example, one must take care that is big enough in some sense.
Example 9.
Let a secret information be coded by the vector Then, the corresponding multinumber is We can take and It is easy to check that is invertible in and so we can choose it as a public key. The inverse element is the private key.
Case 1. Let us consider the case when p is secret and q is public. Then, actually, the private key is the pair For encoding, we have to make the multiplication and reduce each component of the multinumber modulo That is,
Thus, is the encoded message. To decode it, one must reduce the number of repetitions of each component modulo and to multiply the result by in So,
Case 2. Now, let q be secret and p be public. Then, having as above, we reduce the repetition of each component of modulo We have
To decode, we have multiply by in
Note that in Case 1, cannot be recovered from without information about p because has components that are greater than or equal to However, in Case 2 of this example, ; so, it is possible to find dividing by It happens because the number of repetitions of each component of is less than
In the general case, to guarantee that cannot be recovered from , we have to make sure that contains elements that are greater than or equal to q; to guarantee that cannot be recovered from , we have to make sure that contains elements that repeat p or more times. This can be achieved if we add to the secret code a piece of random code with empty information containing components greater than q and repeated more than p times.
6. Conclusions
In the paper, we introduce and study the ring of integer multinumbers and finite rings of multinumbers We can see that is isomorphic as a ring to known objects such as the ring of polynomials or the ring of Dirichlet series However, the representation in the form of multinumbers gives us a different point of view and suggests some new questions and directions of investigation. In particular, we can ask about solutions of Diophantine equations over multinumbers. In addition, using the concept of multinumbers, we introduced the multinumbers modulo Such kinds of objects may be applicable in Cryptography for the creation of new algorithms with open keys, and we proposed one of them. We did not examine in detail the complexities of encoding, decoding, and the resistance of the algorithm against other basic attacks—this may be a subject of further investigations. However, the comparison with RSA and Example 9 gives arguments that the proposed algorithm is applicable. This paper is an invitation to study multinumbers of different natures and their applications to Cryptography.
Finally, we note that the idea of multinumbers appeared from investigations of symmetric and supersymmetric analytic functions on Banach spaces. This is a good argument for the conceptual unity of different branches of Mathematics.
Author Contributions
Conceptualization and supervision the study A.Z.; investigation and original draft preparation of the manuscript Y.C. and T.V. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Research Foundation of Ukraine, 2020.02/0025, 0121U111037.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The authors thank the anonymous referees for their valuable constructive comments and suggestions, which improved the quality of this work in the present form.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Han, J.; Li, Y.; Lin, L.; Lu, J.; Zhang, J.; Zhang, L. Universal approximation of symmetric and anti-symmetric functions. arXiv 2019, arXiv:1912.01765. [Google Scholar]
- Zaheer, M.; Kottur, S.; Ravanbakhsh, S.; Poczos, B.; Salakhutdinov, R.R.; Smola, A.J. Deep sets. In Advances in Neural Information Processing Systems; Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R., Eds.; 2017; pp. 3391–3401. Available online: https://papers.nips.cc/paper/2017 (accessed on 26 December 2021).
- Dos Martires, P.Z. Neural Semirings. CEUR Workshop Proc. 2021, 2986, 94–103. Available online: http://ceur-ws.org/Vol-2986/paper7.pdf (accessed on 27 February 2022).
- Yarotsky, D. Universal Approximations of Invariant Maps by Neural Networks. Constr. Approx. 2021, 55, 407–474. [Google Scholar] [CrossRef]
- Chernega, I.V. A semiring in the spectrum of the algebra of symmetric analytic functions in the space ℓ1. J. Math. Sci. 2016, 212, 38–45. [Google Scholar] [CrossRef]
- Jawad, F.; Zagorodnyuk, A. Supersymmetric polynomials on the space of absolutely convergent series. Symmetry 2019, 11, 1111. [Google Scholar] [CrossRef]
- Chernega, I.; Fushtei, V.; Zagorodnyuk, A. Power Operations and Differentiations Associated With Supersymmetric Polynomials on a Banach Space. Carpathian Math. Publ. 2020, 12, 360–367. [Google Scholar] [CrossRef]
- Aron, R.; Galindo, P.; Pinasco, D.; Zalduendo, I. Group-symmetric holomorphic functions on a Banach space. Bull. Lond. Math. Soc. 2016, 48, 779–796. [Google Scholar] [CrossRef]
- Chernega, I.; Galindo, P.; Zagorodnyuk, A. A multiplicative convolution on the spectra of algebras of symmetric analytic functions. Rev. Mat. Complut. 2014, 27, 575–585. [Google Scholar] [CrossRef]
- Chernega, I.; Galindo, P.; Zagorodnyuk, A. Some algebras of symmetric analytic functions and their spectra. Proc. Edinb. Math. Soc. 2012, 55, 125–142. [Google Scholar] [CrossRef]
- González, M.; Gonzalo, R.; Jaramillo, J.A. Symmetric polynomials on rearrangement-invariant function spaces. J. Lond. Math. Soc. 1999, 59, 681–697. [Google Scholar] [CrossRef]
- Jawad, F. Note on separately symmetric polynomials on the Cartesian product of ℓp. Mat. Stud. 2018, 50, 204–210. [Google Scholar] [CrossRef]
- Kravtsiv, V.V. Analogues of the Newton formulas for the block-symmetric polynomials. Carpathian Math. Publ. 2020, 12, 17–22. [Google Scholar] [CrossRef]
- Kravtsiv, V.; Vasylyshyn, T.; Zagorodnyuk, A. On algebraic basis of the algebra of symmetric polynomials on ℓp(Cn). J. Funct. Spaces 2017. [Google Scholar] [CrossRef]
- Macdonald, I.G. Symmetric Functions and Orthogonal Polynomials; University Lecture Serie 12; AMS: Providence, RI, USA, 1997. [Google Scholar]
- Halushchak, I.; Novosad, Z.; Tsizhma, Y.; Zagorodnyuk, A. Logistic Map on the Ring of Multisets and Its Application in Economic Models. Math. Stat. 2020, 8, 424–429. [Google Scholar] [CrossRef]
- Singh, D.; Ibrahim, A.M.; Yohanna, T.; Singh, J.N. An overview of the applications of multisets. Novi Sad J. Math. 2007, 37, 73–92. [Google Scholar]
- Kaur, J.; Ramachandran, R. The Recent Trends in CyberSecurity: A Review. J. King Saud-Univ.-Comput. Inf. Sci. 2021. [Google Scholar] [CrossRef]
- Kraft, J.; Washington, L. An Introduction to Number Theory with Cryptography; Chapman and Hall/CRC: London, UK, 2018. [Google Scholar]
- Stinson, D.R.; Paterson, M.B. Cryptography. Theory and Practice, 4th ed.; Taylor & Francis Group: Boca Raton, FL, USA; London, UK; New York, NY, USA, 2008. [Google Scholar]
- Karoubi, M. K-theory, an elementary introduction. In Cohomology of Groups and Algebraic K-Theory; Advanced Lectures in Mathematics (ALM); International Press: Somerville, MA, USA, 2010; Volume 12, pp. 197–215. [Google Scholar]
- Zariski, O.; Samuel, P. Commutative Algebra. Volume II. With the Cooperation of I. S. Cohen; The University Series in Higher Mathematics; D. Van Nostrand Company: Princeton, NJ, USA, 1960. [Google Scholar]
- Defant, A.; Garcia, D.; Maestre, M.; Sevilla Peris, P. Dirichlet Series and Holomorphic Functions in High Dimensions; New Mathematical Monographs 34; Cambridge University Press: Cambridge, UK, 2019. [Google Scholar]
- Makhnei, O.; Pylypiv, V.; Zatorskii, R. m-submultisets and m-permutations of multisets elements. Carpathian Math. Publ. 2021, 13, 240–258. [Google Scholar] [CrossRef]
- Camillo, V.; Hong, C.Y.; Kim, N.K.; Lee, Y.; Nielsen, P.P. Nilpotent ideals in polynomial and power series rings. Proc. Am. Math. Soc. 2010, 138, 1607–1619. [Google Scholar] [CrossRef][Green Version]
- Steinberg, S.A. Rings of quotients of rings without nilpotent elements. Pac. J. Math. 1973, 49, 493–506. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).