{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2014:4VOUEYBJ5HNHKPSAKGTJXUADNO","short_pith_number":"pith:4VOUEYBJ","canonical_record":{"source":{"id":"1409.1023","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-09-03T10:24:44Z","cross_cats_sorted":[],"title_canon_sha256":"be76d93126bfbd181bffb1797461f5265df93b692bced0a3ae76d668d22e4e21","abstract_canon_sha256":"04ae0799c7b965dbc7a51e44755b8154188cb77014244390b14642af19a03514"},"schema_version":"1.0"},"canonical_sha256":"e55d426029e9da753e4051a69bd0036bb9adf9c3b5d0c7cc7cd6d9947a8e366e","source":{"kind":"arxiv","id":"1409.1023","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1409.1023","created_at":"2026-05-18T02:43:10Z"},{"alias_kind":"arxiv_version","alias_value":"1409.1023v2","created_at":"2026-05-18T02:43:10Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1409.1023","created_at":"2026-05-18T02:43:10Z"},{"alias_kind":"pith_short_12","alias_value":"4VOUEYBJ5HNH","created_at":"2026-05-18T12:28:14Z"},{"alias_kind":"pith_short_16","alias_value":"4VOUEYBJ5HNHKPSA","created_at":"2026-05-18T12:28:14Z"},{"alias_kind":"pith_short_8","alias_value":"4VOUEYBJ","created_at":"2026-05-18T12:28:14Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2014:4VOUEYBJ5HNHKPSAKGTJXUADNO","target":"record","payload":{"canonical_record":{"source":{"id":"1409.1023","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-09-03T10:24:44Z","cross_cats_sorted":[],"title_canon_sha256":"be76d93126bfbd181bffb1797461f5265df93b692bced0a3ae76d668d22e4e21","abstract_canon_sha256":"04ae0799c7b965dbc7a51e44755b8154188cb77014244390b14642af19a03514"},"schema_version":"1.0"},"canonical_sha256":"e55d426029e9da753e4051a69bd0036bb9adf9c3b5d0c7cc7cd6d9947a8e366e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:43:10.431617Z","signature_b64":"7xvTaB2a/fB0oNKus+7S3WPl6vM//zfwcguqw3h50xwQhhxHwoDwjdWRBYspDLje4eAiTOeqR46HmExPCQyfDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e55d426029e9da753e4051a69bd0036bb9adf9c3b5d0c7cc7cd6d9947a8e366e","last_reissued_at":"2026-05-18T02:43:10.431151Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:43:10.431151Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1409.1023","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:43:10Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"c+KXZ+Gx5Yp3V6HWsu+za6bxdGkdCm3mywpsJbXkmFthemuTUhDqPvnuA36DmrNJa7yWlUHCOYZYApolVvGtDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T00:37:34.270598Z"},"content_sha256":"f6b9089aef9cbd71225b7d74d25587672d48d72c938eddb93bfc12f6ae27e0bf","schema_version":"1.0","event_id":"sha256:f6b9089aef9cbd71225b7d74d25587672d48d72c938eddb93bfc12f6ae27e0bf"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2014:4VOUEYBJ5HNHKPSAKGTJXUADNO","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Citizen Electronic Identities using TPM 2.0","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Jan-Erik Ekberg, N. Asokan, Thomas Nyman","submitted_at":"2014-09-03T10:24:44Z","abstract_excerpt":"Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensitive data have"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1409.1023","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:43:10Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3+aY4wcBmQ0BHH6OxiJHGmUxTvdLTdSfNXqruVFuhHwzMrI540S9x3CZd1A1u91QkHQMIMP/2PcP9v1pfZsIDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T00:37:34.271235Z"},"content_sha256":"850b8c25bfe2bcdabfd8965f779cbea07cc59e3349e3a35837820e32f2f0473b","schema_version":"1.0","event_id":"sha256:850b8c25bfe2bcdabfd8965f779cbea07cc59e3349e3a35837820e32f2f0473b"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/4VOUEYBJ5HNHKPSAKGTJXUADNO/bundle.json","state_url":"https://pith.science/pith/4VOUEYBJ5HNHKPSAKGTJXUADNO/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/4VOUEYBJ5HNHKPSAKGTJXUADNO/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T00:37:34Z","links":{"resolver":"https://pith.science/pith/4VOUEYBJ5HNHKPSAKGTJXUADNO","bundle":"https://pith.science/pith/4VOUEYBJ5HNHKPSAKGTJXUADNO/bundle.json","state":"https://pith.science/pith/4VOUEYBJ5HNHKPSAKGTJXUADNO/state.json","well_known_bundle":"https://pith.science/.well-known/pith/4VOUEYBJ5HNHKPSAKGTJXUADNO/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2014:4VOUEYBJ5HNHKPSAKGTJXUADNO","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"04ae0799c7b965dbc7a51e44755b8154188cb77014244390b14642af19a03514","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-09-03T10:24:44Z","title_canon_sha256":"be76d93126bfbd181bffb1797461f5265df93b692bced0a3ae76d668d22e4e21"},"schema_version":"1.0","source":{"id":"1409.1023","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1409.1023","created_at":"2026-05-18T02:43:10Z"},{"alias_kind":"arxiv_version","alias_value":"1409.1023v2","created_at":"2026-05-18T02:43:10Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1409.1023","created_at":"2026-05-18T02:43:10Z"},{"alias_kind":"pith_short_12","alias_value":"4VOUEYBJ5HNH","created_at":"2026-05-18T12:28:14Z"},{"alias_kind":"pith_short_16","alias_value":"4VOUEYBJ5HNHKPSA","created_at":"2026-05-18T12:28:14Z"},{"alias_kind":"pith_short_8","alias_value":"4VOUEYBJ","created_at":"2026-05-18T12:28:14Z"}],"graph_snapshots":[{"event_id":"sha256:850b8c25bfe2bcdabfd8965f779cbea07cc59e3349e3a35837820e32f2f0473b","target":"graph","created_at":"2026-05-18T02:43:10Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensitive data have","authors_text":"Jan-Erik Ekberg, N. Asokan, Thomas Nyman","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-09-03T10:24:44Z","title":"Citizen Electronic Identities using TPM 2.0"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1409.1023","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:f6b9089aef9cbd71225b7d74d25587672d48d72c938eddb93bfc12f6ae27e0bf","target":"record","created_at":"2026-05-18T02:43:10Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"04ae0799c7b965dbc7a51e44755b8154188cb77014244390b14642af19a03514","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-09-03T10:24:44Z","title_canon_sha256":"be76d93126bfbd181bffb1797461f5265df93b692bced0a3ae76d668d22e4e21"},"schema_version":"1.0","source":{"id":"1409.1023","kind":"arxiv","version":2}},"canonical_sha256":"e55d426029e9da753e4051a69bd0036bb9adf9c3b5d0c7cc7cd6d9947a8e366e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"e55d426029e9da753e4051a69bd0036bb9adf9c3b5d0c7cc7cd6d9947a8e366e","first_computed_at":"2026-05-18T02:43:10.431151Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:43:10.431151Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"7xvTaB2a/fB0oNKus+7S3WPl6vM//zfwcguqw3h50xwQhhxHwoDwjdWRBYspDLje4eAiTOeqR46HmExPCQyfDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T02:43:10.431617Z","signed_message":"canonical_sha256_bytes"},"source_id":"1409.1023","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:f6b9089aef9cbd71225b7d74d25587672d48d72c938eddb93bfc12f6ae27e0bf","sha256:850b8c25bfe2bcdabfd8965f779cbea07cc59e3349e3a35837820e32f2f0473b"],"state_sha256":"24e3a06d94cac59e585d76b8bbac1ba7b06d649f065540d7fc827b19be8ec495"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ECGVTrFqJoXzrh56MqZvf7A+9ndAu6XjY1OC1V4sozLEsbT6oZFfxCsR+YewlHPs95cvKk3p7mH7WJ2VMrxsCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T00:37:34.275396Z","bundle_sha256":"bf0409ed2a16c08ef05c4963dec33af2196fa7fe90a429cfbefc98cff9db0cc8"}}