Submitted:
02 February 2026
Posted:
03 February 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
- 1)
- Start with any random positive integer n1 as the first element of the NS sequence
- 2)
- The next element in sequence n2 is an increment of 1, provided that n2 cannot be derived by adding, subtracting, or multiplying previous two or more elements of the sequence.
- 3)
- Single Use: In any mathematical operation, each previous element can be used only once. The use of the same element for two operations is prohibited

2. Related Works
3. The Hybrid NS Algorithm
3.1. Core NS(+,-,×) Rule
- Seed: pick .
- Single-use expressions over prior terms: Given the multiset , define as the set of all positive integers that can be obtained by a read-once binary expression tree over the leaves using the internal operations ; each term is used at most once overall in the tree; intermediate negatives are allowed, but only positive results are kept in .
- Greedy step:
3.2. Hybridization
- Phase 1 (exact, hard): via NS(+,-,×) (single-use).
- Phase 2 (moderately hard): via NS(+,-) only, or NS(+) with extra spacing rules, or NS(+,-,×) restricted to bounded subset sizes (e.g., trees with leaves).
- Phase 3 (lightweight/fast): via NS(+) or a deterministic spaced growth rule that never contradicts constraints established by earlier phases.
- Monotone growth: .
- Backward compatibility: New phases must not introduce a value that was derivable using the strict Phase-1 rule from terms .
- Greedy min under current phase rule: Within a phase, we still choose the least admissible next value under that phase’s admissibility predicate.

4. NS Sequence Properties
- ❖
- The main concern is non-collision: later phases must not invalidate Phase-1 exclusions or re-introduce values derivable from the hard prefix.
- ❖
- We formalize and prove a prefix-lock property that guarantees non-collision across phases.
- ❖
- Theorem (Prefix-Lock Non-Collision)
5. Distributed Model Implementation

6. Comparisons of the Growth of Different Sequences











7. Complexity of NS Sequence
| Element | Estimated Subsets | Est. Time (32-Core) | Complexity Class |
|---|---|---|---|
| 10th | Seconds | Exponential | |
| 15th | Hours | Factorial-Exponential | |
| 20th | Years / Infeasible | Super Exponential |
8. Cryptographic Use & Security
8.1. Problem Statements 1: (Hardness Assumptions)

8.2. Security Notions for Sequence-Based Primitives
- PRG-like construction (heuristic) from prefix
- Key-agreement sketch using shared seed negotiation
8.2.1. PRG-Like Construction from Prefix Phase-1
8.2.2. Key Agreement (Seed-Negotiation + Hybrid Growth)
- Negotiation: Parties jointly sample a secret seed using a coin-flipping or PAKE subprotocol (e.g., SPAKE2/OPAQUE). Local computation: Both compute the Phase-1 prefix of length and the prefix-lock set . They do not transmit these.
- Public transcript: Parties exchange only phase parameters and a random salt .
- Key derivation: Each output
8.3. Hardness Assumptions ADDP and ANAPP1
8.3.1. Instance Distribution for ADDP (Derivability Decision Problem)
- Seed selection
- 2.
- Prefix generation
- 3.
- Target selection
8.3.2. Structural Basis for Average-Case Hardness
Explosion of Search Space
8.3.3. ANAPP1: Hardness of Next-Admissible Prediction
8.3.4. Why Quantum Speedups Do Not Collapse the Assumption
- Grover-style quadratic speedups apply only to unstructured search.
- ADDP instances are highly structured but non-regular; evaluating membership is itself super-polynomial.
- There is no known quantum analogue of dynamic programming over read-once arithmetic trees with subtraction.
8.3.5. Empirical Hardness Evidence
Enumeration Failure
- ▪ Exact computation of a10 requires 48–60 CPU hours, even with aggressive pruning.
- ▪ The estimated cost for a20 exceeds years, even under optimistic parallelization. This aligns with the theoretical super-exponential bound and supports ADDP for moderate.
Distributed Search Does Not Break Structure
- ▪ Parallelism reduces wall-clock time but not asymptotic complexity.
- ▪ Each worker still faces the same combinatorial explosion.
- ▪ No polynomial-time shortcut emerges from task splitting.
Solver-Based Perspective (Negative Evidence)
8.3.6. Some Use Cases
One-Way Puzzle and Proof of Work (PoW) Primitives
Key Derivation from a Secret Combinatorial Core (PRG-Like Use)
- ADDP hardness (Derivability Decision Problem).
- Super exponential blow up of read once (+,−,×) derivations (Catalan × permutations).
- Easy verification once a derivation is known.
9. Acknowledgement and Limitations
- The scalability of NS(+,-,x) is limited using current computers without hybridization.
- Explicitly state that all cryptographic claims are assumption-based and exploratory
- The distributed computation requires synchronization, and a cloud platform or cluster is required.
- The sequences depend heavily on seed choices.
- We have used LLM for AI-assisted copy editing and improving diagrams or figures.
- We do not claim a reduction to any standard hardness assumption (e.g., LWE). Our contribution is the identification of a structured combinatorial task with no known efficient classical or quantum solution.
10. Conclusions
References
- Sloane N.J.A. The online encyclopedia of integer sequences. OEIS A005349 (2018).
- Green B., Ruzsa I.Z. Sum-free sets in abelian groups. Israel J. Math. 147, 157–188 (2005).
- Salem R., Spencer D.C. On sets of integers which contain no three terms in arithmetical progression. Proc. Natl. Acad. Sci. USA 28, 561–563 (1942).
- Sloane N.J.A. Euclid–Mullin sequence. OEIS A000945.
- Shmerkin P. Salem sets with no arithmetic progressions. Int. Math. Res. Not. 2017, 1929–1941 (2017).
- Buyya R., Vecchiola C., Selvi S.T. Mastering Cloud Computing: Foundations and Applications Programming.Newnes, Oxford (2013).
- Holloway J.L. Algorithms for computing Fibonacci numbers quickly. (Technical Report) (1988). (No journal exists; Springer allows tech reports.).
- Diaconis P., Freedman D. An elementary proof of Stirling’s formula.Amer. Math. Monthly 93, 123–125 (1986).
- Ross T. A Perfect Number Generalization and Some Euclid–Euler Type Results. arXiv preprint arXiv:2512.04417 (2025).
- Nicolas J.-L., Robin G. Highly Composite Numbers by Srinivasa Ramanujan. Ramanujan J. 1, 119–153 (1997).
- Starr S. About the Hardy–Ramanujan partition function asymptotics. arXiv preprint arXiv:2408.08269 (2024).
- Jansen S., Kolesnikov L. Logarithms of Catalan generating functions: A combinatorial approach. arXiv preprint arXiv:2302.09661 (2023).
- Heath-Brown D.R. The square sieve and consecutive square-free numbers. Math. Ann. 266, 251–259 (1984).
- Brown T.C., Shiue J.-S.P. On the history of van der Waerden’s theorem on arithmetic progressions. Tamkang J. Math. 32, 335–342 (2001).
- Aggarwal, D., Ming, L. J., & Veliche, A. (2024). Worst-Case to Average-Case Hardness of LWE: An Alternative Perspective. Cryptology ePrint Archive.
- Bennett, H. (2022, April). Solving Random Low-Density Subset Sum Using Babai’s Algorithm.
- Joux, A., & Węgrzycki, K. (2024). Improving Lagarias-Odlyzko Algorithm For Average-Case Subset Sum: Modular Arithmetic Approach. arXiv preprint arXiv:2408.16108.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
