{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:7OMMTN2ADRGBC4MYOOSAD43IUU","short_pith_number":"pith:7OMMTN2A","schema_version":"1.0","canonical_sha256":"fb98c9b7401c4c11719873a401f368a5202c7ee682c98fdc834dbe2e0b2cc351","source":{"kind":"arxiv","id":"1811.03741","version":1},"attestation_state":"computed","paper":{"title":"Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Jingwei Liu, Lihuan Zhang, Mohsen Guizani, Rong Sun, Xiaojiang Du","submitted_at":"2018-11-09T02:18:59Z","abstract_excerpt":"With the emerging of mobile communication technologies, we are entering the fifth generation mobile communication system (5G) era. Various application scenarios will arise in the 5G era to meet the different service requirements. Different 5G network slicings may deploy different public key cryptosystems. The security issues among the heterogeneous systems should be considered. In order to ensure the secure communications between 5G network slicings, in different public cryptosystems, we propose two heterogeneous signcryption schemes which can achieve mutual communications between the Public K"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1811.03741","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-11-09T02:18:59Z","cross_cats_sorted":[],"title_canon_sha256":"930db6dfaecca90519e9b5fbe24ed07c5fb01e9f7f2c2db44992948a099d3ace","abstract_canon_sha256":"72631bc9f64dfc76790895596dcab323b1257fc595ae861189950d16c3e56ffc"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:01:12.155386Z","signature_b64":"EklH9zo0EiiIaqdrNjnE1rK6QmHWAouo3Evjb6JdCx+hb5gHk1NSp/DWK4LbX7yUUnLAFg0YTUoKlZjUg66YCw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"fb98c9b7401c4c11719873a401f368a5202c7ee682c98fdc834dbe2e0b2cc351","last_reissued_at":"2026-05-18T00:01:12.154888Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:01:12.154888Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Jingwei Liu, Lihuan Zhang, Mohsen Guizani, Rong Sun, Xiaojiang Du","submitted_at":"2018-11-09T02:18:59Z","abstract_excerpt":"With the emerging of mobile communication technologies, we are entering the fifth generation mobile communication system (5G) era. Various application scenarios will arise in the 5G era to meet the different service requirements. Different 5G network slicings may deploy different public key cryptosystems. The security issues among the heterogeneous systems should be considered. In order to ensure the secure communications between 5G network slicings, in different public cryptosystems, we propose two heterogeneous signcryption schemes which can achieve mutual communications between the Public K"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1811.03741","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1811.03741","created_at":"2026-05-18T00:01:12.154958+00:00"},{"alias_kind":"arxiv_version","alias_value":"1811.03741v1","created_at":"2026-05-18T00:01:12.154958+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1811.03741","created_at":"2026-05-18T00:01:12.154958+00:00"},{"alias_kind":"pith_short_12","alias_value":"7OMMTN2ADRGB","created_at":"2026-05-18T12:32:11.075285+00:00"},{"alias_kind":"pith_short_16","alias_value":"7OMMTN2ADRGBC4MY","created_at":"2026-05-18T12:32:11.075285+00:00"},{"alias_kind":"pith_short_8","alias_value":"7OMMTN2A","created_at":"2026-05-18T12:32:11.075285+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU","json":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU.json","graph_json":"https://pith.science/api/pith-number/7OMMTN2ADRGBC4MYOOSAD43IUU/graph.json","events_json":"https://pith.science/api/pith-number/7OMMTN2ADRGBC4MYOOSAD43IUU/events.json","paper":"https://pith.science/paper/7OMMTN2A"},"agent_actions":{"view_html":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU","download_json":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU.json","view_paper":"https://pith.science/paper/7OMMTN2A","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1811.03741&json=true","fetch_graph":"https://pith.science/api/pith-number/7OMMTN2ADRGBC4MYOOSAD43IUU/graph.json","fetch_events":"https://pith.science/api/pith-number/7OMMTN2ADRGBC4MYOOSAD43IUU/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU/action/timestamp_anchor","attest_storage":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU/action/storage_attestation","attest_author":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU/action/author_attestation","sign_citation":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU/action/citation_signature","submit_replication":"https://pith.science/pith/7OMMTN2ADRGBC4MYOOSAD43IUU/action/replication_record"}},"created_at":"2026-05-18T00:01:12.154958+00:00","updated_at":"2026-05-18T00:01:12.154958+00:00"}