{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2014:LXN6PTDCDPZPEOK42YFGRW5EJG","short_pith_number":"pith:LXN6PTDC","schema_version":"1.0","canonical_sha256":"5ddbe7cc621bf2f2395cd60a68dba4498e5a2b99bd9a17961fb7dc0ca76a3a71","source":{"kind":"arxiv","id":"1411.1733","version":1},"attestation_state":"computed","paper":{"title":"Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Chien-Chung Shen, Marcos Portnoi","submitted_at":"2014-11-06T20:22:00Z","abstract_excerpt":"This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and security through it cryptography. We describe a holistic approach to evolving the firearm to a cyber-physical "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1411.1733","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2014-11-06T20:22:00Z","cross_cats_sorted":[],"title_canon_sha256":"b7a35c14a27daae3f1201cbf8b049be83674c60d037e148b11d1c8c3c24155a0","abstract_canon_sha256":"06157ac5949dadea233126ae5d908b2b4bf8e1019efa3ec8f1c912e45460e9ed"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:38:27.046220Z","signature_b64":"ooPeekDsgk9+cKT8n+Y4fsx3f7lQVxV9meD3tKZuSjTV9fEY1LlD+dBBrv3e5te0TXKnFYl4E6nLIxjoVMTcAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5ddbe7cc621bf2f2395cd60a68dba4498e5a2b99bd9a17961fb7dc0ca76a3a71","last_reissued_at":"2026-05-18T02:38:27.045711Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:38:27.045711Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Chien-Chung Shen, Marcos Portnoi","submitted_at":"2014-11-06T20:22:00Z","abstract_excerpt":"This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and security through it cryptography. We describe a holistic approach to evolving the firearm to a cyber-physical "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1411.1733","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1411.1733","created_at":"2026-05-18T02:38:27.045798+00:00"},{"alias_kind":"arxiv_version","alias_value":"1411.1733v1","created_at":"2026-05-18T02:38:27.045798+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1411.1733","created_at":"2026-05-18T02:38:27.045798+00:00"},{"alias_kind":"pith_short_12","alias_value":"LXN6PTDCDPZP","created_at":"2026-05-18T12:28:38.356838+00:00"},{"alias_kind":"pith_short_16","alias_value":"LXN6PTDCDPZPEOK4","created_at":"2026-05-18T12:28:38.356838+00:00"},{"alias_kind":"pith_short_8","alias_value":"LXN6PTDC","created_at":"2026-05-18T12:28:38.356838+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG","json":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG.json","graph_json":"https://pith.science/api/pith-number/LXN6PTDCDPZPEOK42YFGRW5EJG/graph.json","events_json":"https://pith.science/api/pith-number/LXN6PTDCDPZPEOK42YFGRW5EJG/events.json","paper":"https://pith.science/paper/LXN6PTDC"},"agent_actions":{"view_html":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG","download_json":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG.json","view_paper":"https://pith.science/paper/LXN6PTDC","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1411.1733&json=true","fetch_graph":"https://pith.science/api/pith-number/LXN6PTDCDPZPEOK42YFGRW5EJG/graph.json","fetch_events":"https://pith.science/api/pith-number/LXN6PTDCDPZPEOK42YFGRW5EJG/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG/action/timestamp_anchor","attest_storage":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG/action/storage_attestation","attest_author":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG/action/author_attestation","sign_citation":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG/action/citation_signature","submit_replication":"https://pith.science/pith/LXN6PTDCDPZPEOK42YFGRW5EJG/action/replication_record"}},"created_at":"2026-05-18T02:38:27.045798+00:00","updated_at":"2026-05-18T02:38:27.045798+00:00"}