{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:6K6Q5VJZPV27PR46BRV5B3PLWA","short_pith_number":"pith:6K6Q5VJZ","canonical_record":{"source":{"id":"1709.05383","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-15T20:09:05Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"c17d9f67b40a54ac6d13917abf70f4bba706f2587d2f2a724599985a879f50df","abstract_canon_sha256":"b134cf157a01bc5885ac2935e519e3a7ba5dda3835d56ed72c2760df12351ba5"},"schema_version":"1.0"},"canonical_sha256":"f2bd0ed5397d75f7c79e0c6bd0edebb023867db6ec1c821f12b2d06fed6c363b","source":{"kind":"arxiv","id":"1709.05383","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1709.05383","created_at":"2026-05-17T23:56:55Z"},{"alias_kind":"arxiv_version","alias_value":"1709.05383v3","created_at":"2026-05-17T23:56:55Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1709.05383","created_at":"2026-05-17T23:56:55Z"},{"alias_kind":"pith_short_12","alias_value":"6K6Q5VJZPV27","created_at":"2026-05-18T12:31:03Z"},{"alias_kind":"pith_short_16","alias_value":"6K6Q5VJZPV27PR46","created_at":"2026-05-18T12:31:03Z"},{"alias_kind":"pith_short_8","alias_value":"6K6Q5VJZ","created_at":"2026-05-18T12:31:03Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:6K6Q5VJZPV27PR46BRV5B3PLWA","target":"record","payload":{"canonical_record":{"source":{"id":"1709.05383","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-15T20:09:05Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"c17d9f67b40a54ac6d13917abf70f4bba706f2587d2f2a724599985a879f50df","abstract_canon_sha256":"b134cf157a01bc5885ac2935e519e3a7ba5dda3835d56ed72c2760df12351ba5"},"schema_version":"1.0"},"canonical_sha256":"f2bd0ed5397d75f7c79e0c6bd0edebb023867db6ec1c821f12b2d06fed6c363b","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:56:55.795717Z","signature_b64":"oo/VlRfnsWB0wVUQZKLBDs1ydVKkMhMIyCdhN+Nhuh0y1v7BV2QnKXXTaTiQuBXfg/l4DqOimOGUWrNUmTGXAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f2bd0ed5397d75f7c79e0c6bd0edebb023867db6ec1c821f12b2d06fed6c363b","last_reissued_at":"2026-05-17T23:56:55.795154Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:56:55.795154Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1709.05383","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:55Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0B2raGrBWp7pq4YKh83+9vu3AOhtUEUqJWXPcOPyMqGwQxj+CCPwaZwmQdOukPSHdB7D7/rMt/h2siVkvI+7Bg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T23:44:29.470527Z"},"content_sha256":"f2bd3f467beee6cb67af4b69c1feaa93f9fc4a91172e18d3ff59fc3c7c7363e8","schema_version":"1.0","event_id":"sha256:f2bd3f467beee6cb67af4b69c1feaa93f9fc4a91172e18d3ff59fc3c7c7363e8"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:6K6Q5VJZPV27PR46BRV5B3PLWA","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Secrecy Rate of Cooperative MIMO in Presence of a Location Constrained Eavesdropper","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Mario Kieburg, Zhong Zheng, Zygmunt Haas","submitted_at":"2017-09-15T20:09:05Z","abstract_excerpt":"We propose and study the cooperative MIMO architecture to enable and to improve the secrecy transmissions between clusters of mobile devices in the presence of an eavesdropper with certain location constraint. The cooperative MIMO system in this paper (referred to as Reconfigurable Distributed MIMO) is formed by temporarily activating clusters of nearby trusted mobile devices, with each cluster being centrally coordinated by its corresponding cluster head. We assume that the transmitters apply a practical eigen-direction precoding scheme to transmit the confidential signal and artificial noise"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1709.05383","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:55Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ql6IyQBZcOf+ON1W61kDFRZygikdAdAoRB8fxBTeW2tIc3+ekCzKK6y2hVlyyOH1l9Ts5cx+bOjsmm1IPnY/Dg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T23:44:29.471210Z"},"content_sha256":"fa7caa91644228595b62267d7d0e6b69a0940509a4e6f476ca0ba6257b3cb3ec","schema_version":"1.0","event_id":"sha256:fa7caa91644228595b62267d7d0e6b69a0940509a4e6f476ca0ba6257b3cb3ec"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/6K6Q5VJZPV27PR46BRV5B3PLWA/bundle.json","state_url":"https://pith.science/pith/6K6Q5VJZPV27PR46BRV5B3PLWA/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/6K6Q5VJZPV27PR46BRV5B3PLWA/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T23:44:29Z","links":{"resolver":"https://pith.science/pith/6K6Q5VJZPV27PR46BRV5B3PLWA","bundle":"https://pith.science/pith/6K6Q5VJZPV27PR46BRV5B3PLWA/bundle.json","state":"https://pith.science/pith/6K6Q5VJZPV27PR46BRV5B3PLWA/state.json","well_known_bundle":"https://pith.science/.well-known/pith/6K6Q5VJZPV27PR46BRV5B3PLWA/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:6K6Q5VJZPV27PR46BRV5B3PLWA","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"b134cf157a01bc5885ac2935e519e3a7ba5dda3835d56ed72c2760df12351ba5","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-15T20:09:05Z","title_canon_sha256":"c17d9f67b40a54ac6d13917abf70f4bba706f2587d2f2a724599985a879f50df"},"schema_version":"1.0","source":{"id":"1709.05383","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1709.05383","created_at":"2026-05-17T23:56:55Z"},{"alias_kind":"arxiv_version","alias_value":"1709.05383v3","created_at":"2026-05-17T23:56:55Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1709.05383","created_at":"2026-05-17T23:56:55Z"},{"alias_kind":"pith_short_12","alias_value":"6K6Q5VJZPV27","created_at":"2026-05-18T12:31:03Z"},{"alias_kind":"pith_short_16","alias_value":"6K6Q5VJZPV27PR46","created_at":"2026-05-18T12:31:03Z"},{"alias_kind":"pith_short_8","alias_value":"6K6Q5VJZ","created_at":"2026-05-18T12:31:03Z"}],"graph_snapshots":[{"event_id":"sha256:fa7caa91644228595b62267d7d0e6b69a0940509a4e6f476ca0ba6257b3cb3ec","target":"graph","created_at":"2026-05-17T23:56:55Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We propose and study the cooperative MIMO architecture to enable and to improve the secrecy transmissions between clusters of mobile devices in the presence of an eavesdropper with certain location constraint. The cooperative MIMO system in this paper (referred to as Reconfigurable Distributed MIMO) is formed by temporarily activating clusters of nearby trusted mobile devices, with each cluster being centrally coordinated by its corresponding cluster head. We assume that the transmitters apply a practical eigen-direction precoding scheme to transmit the confidential signal and artificial noise","authors_text":"Mario Kieburg, Zhong Zheng, Zygmunt Haas","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-15T20:09:05Z","title":"Secrecy Rate of Cooperative MIMO in Presence of a Location Constrained Eavesdropper"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1709.05383","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:f2bd3f467beee6cb67af4b69c1feaa93f9fc4a91172e18d3ff59fc3c7c7363e8","target":"record","created_at":"2026-05-17T23:56:55Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"b134cf157a01bc5885ac2935e519e3a7ba5dda3835d56ed72c2760df12351ba5","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-09-15T20:09:05Z","title_canon_sha256":"c17d9f67b40a54ac6d13917abf70f4bba706f2587d2f2a724599985a879f50df"},"schema_version":"1.0","source":{"id":"1709.05383","kind":"arxiv","version":3}},"canonical_sha256":"f2bd0ed5397d75f7c79e0c6bd0edebb023867db6ec1c821f12b2d06fed6c363b","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"f2bd0ed5397d75f7c79e0c6bd0edebb023867db6ec1c821f12b2d06fed6c363b","first_computed_at":"2026-05-17T23:56:55.795154Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:56:55.795154Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"oo/VlRfnsWB0wVUQZKLBDs1ydVKkMhMIyCdhN+Nhuh0y1v7BV2QnKXXTaTiQuBXfg/l4DqOimOGUWrNUmTGXAg==","signature_status":"signed_v1","signed_at":"2026-05-17T23:56:55.795717Z","signed_message":"canonical_sha256_bytes"},"source_id":"1709.05383","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:f2bd3f467beee6cb67af4b69c1feaa93f9fc4a91172e18d3ff59fc3c7c7363e8","sha256:fa7caa91644228595b62267d7d0e6b69a0940509a4e6f476ca0ba6257b3cb3ec"],"state_sha256":"6e1ab59a6a9ed4970a5219dba45d559727e0b6da1210f48d5778377f4a78e446"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"zTMK94wNVcEHyipeNOez03ms4oEaSu0NRKofjsjYHM3mIQX0hB7e8PrewQasGtfx261BA47E3t5p246EOZW8CQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T23:44:29.474731Z","bundle_sha256":"e71684fc2737c76a0cce046e368ebbebf045402a8231a7d2420c337f411224db"}}