{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:LZQTO3ZULQMORZNA2BXVAVQ3AH","short_pith_number":"pith:LZQTO3ZU","canonical_record":{"source":{"id":"1312.3146","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T12:52:18Z","cross_cats_sorted":[],"title_canon_sha256":"d7e6dd6ec97768041ee3085878547652cc854ff6ef1185bdcd2483ceae70e5fd","abstract_canon_sha256":"d32d5c40daa749d2a38df9c70351aa6ae20d3aafa8bd29a00891ca5bc65163ad"},"schema_version":"1.0"},"canonical_sha256":"5e61376f345c18e8e5a0d06f50561b01c22881edfd9c32a63d8107e9c5c4734d","source":{"kind":"arxiv","id":"1312.3146","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1312.3146","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"arxiv_version","alias_value":"1312.3146v1","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1312.3146","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"pith_short_12","alias_value":"LZQTO3ZULQMO","created_at":"2026-05-18T12:27:51Z"},{"alias_kind":"pith_short_16","alias_value":"LZQTO3ZULQMORZNA","created_at":"2026-05-18T12:27:51Z"},{"alias_kind":"pith_short_8","alias_value":"LZQTO3ZU","created_at":"2026-05-18T12:27:51Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:LZQTO3ZULQMORZNA2BXVAVQ3AH","target":"record","payload":{"canonical_record":{"source":{"id":"1312.3146","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T12:52:18Z","cross_cats_sorted":[],"title_canon_sha256":"d7e6dd6ec97768041ee3085878547652cc854ff6ef1185bdcd2483ceae70e5fd","abstract_canon_sha256":"d32d5c40daa749d2a38df9c70351aa6ae20d3aafa8bd29a00891ca5bc65163ad"},"schema_version":"1.0"},"canonical_sha256":"5e61376f345c18e8e5a0d06f50561b01c22881edfd9c32a63d8107e9c5c4734d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:05:00.374229Z","signature_b64":"aQ+g9DwqiZAJonxdAPSBMCK4GOjk+ppDgiz9vcocd24grKvJlYSgmY+NWYQDZhSp8jnJqsezuH1cVi1TzKIHCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5e61376f345c18e8e5a0d06f50561b01c22881edfd9c32a63d8107e9c5c4734d","last_reissued_at":"2026-05-18T03:05:00.373846Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:05:00.373846Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1312.3146","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:05:00Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"mctNoS8JI5MtOzugOu5dVnjk0Y3hpqS4xTqpIcZrRXFiV24H+QGoDv754GdPw+18rruiAKRenUkfG7+PWObLAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T09:40:35.931545Z"},"content_sha256":"034d00ea0bcb6f23b8a559b1c3e2ec2e32d3a36a9c1ae11f29a96fa218c257c8","schema_version":"1.0","event_id":"sha256:034d00ea0bcb6f23b8a559b1c3e2ec2e32d3a36a9c1ae11f29a96fa218c257c8"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:LZQTO3ZULQMORZNA2BXVAVQ3AH","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Stefan Rass","submitted_at":"2013-12-11T12:52:18Z","abstract_excerpt":"Secure function evaluation (SFE) is the process of computing a function (or running an algorithm) on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsourcing of computations to cloud service providers, where data is to be manipulated and processed in full confidentiality. Today, one of the most intensively studied solutions to SFE is fully homomorphic e"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1312.3146","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:05:00Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Q1lqyUv+H3FhZKSGwxr4X+6GGPDkm3rP+8bMDmqAyA/3OxuXMqi1y71bWR8AI90vU2NEIZEjRfORtLMg2dXoAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T09:40:35.932265Z"},"content_sha256":"975c04434c623f9862b024db67b6d4b9fc5e62f2925ba46212b9adc96b51797a","schema_version":"1.0","event_id":"sha256:975c04434c623f9862b024db67b6d4b9fc5e62f2925ba46212b9adc96b51797a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/LZQTO3ZULQMORZNA2BXVAVQ3AH/bundle.json","state_url":"https://pith.science/pith/LZQTO3ZULQMORZNA2BXVAVQ3AH/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/LZQTO3ZULQMORZNA2BXVAVQ3AH/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T09:40:35Z","links":{"resolver":"https://pith.science/pith/LZQTO3ZULQMORZNA2BXVAVQ3AH","bundle":"https://pith.science/pith/LZQTO3ZULQMORZNA2BXVAVQ3AH/bundle.json","state":"https://pith.science/pith/LZQTO3ZULQMORZNA2BXVAVQ3AH/state.json","well_known_bundle":"https://pith.science/.well-known/pith/LZQTO3ZULQMORZNA2BXVAVQ3AH/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:LZQTO3ZULQMORZNA2BXVAVQ3AH","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"d32d5c40daa749d2a38df9c70351aa6ae20d3aafa8bd29a00891ca5bc65163ad","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T12:52:18Z","title_canon_sha256":"d7e6dd6ec97768041ee3085878547652cc854ff6ef1185bdcd2483ceae70e5fd"},"schema_version":"1.0","source":{"id":"1312.3146","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1312.3146","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"arxiv_version","alias_value":"1312.3146v1","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1312.3146","created_at":"2026-05-18T03:05:00Z"},{"alias_kind":"pith_short_12","alias_value":"LZQTO3ZULQMO","created_at":"2026-05-18T12:27:51Z"},{"alias_kind":"pith_short_16","alias_value":"LZQTO3ZULQMORZNA","created_at":"2026-05-18T12:27:51Z"},{"alias_kind":"pith_short_8","alias_value":"LZQTO3ZU","created_at":"2026-05-18T12:27:51Z"}],"graph_snapshots":[{"event_id":"sha256:975c04434c623f9862b024db67b6d4b9fc5e62f2925ba46212b9adc96b51797a","target":"graph","created_at":"2026-05-18T03:05:00Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Secure function evaluation (SFE) is the process of computing a function (or running an algorithm) on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsourcing of computations to cloud service providers, where data is to be manipulated and processed in full confidentiality. Today, one of the most intensively studied solutions to SFE is fully homomorphic e","authors_text":"Stefan Rass","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T12:52:18Z","title":"Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1312.3146","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:034d00ea0bcb6f23b8a559b1c3e2ec2e32d3a36a9c1ae11f29a96fa218c257c8","target":"record","created_at":"2026-05-18T03:05:00Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"d32d5c40daa749d2a38df9c70351aa6ae20d3aafa8bd29a00891ca5bc65163ad","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-12-11T12:52:18Z","title_canon_sha256":"d7e6dd6ec97768041ee3085878547652cc854ff6ef1185bdcd2483ceae70e5fd"},"schema_version":"1.0","source":{"id":"1312.3146","kind":"arxiv","version":1}},"canonical_sha256":"5e61376f345c18e8e5a0d06f50561b01c22881edfd9c32a63d8107e9c5c4734d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"5e61376f345c18e8e5a0d06f50561b01c22881edfd9c32a63d8107e9c5c4734d","first_computed_at":"2026-05-18T03:05:00.373846Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:05:00.373846Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"aQ+g9DwqiZAJonxdAPSBMCK4GOjk+ppDgiz9vcocd24grKvJlYSgmY+NWYQDZhSp8jnJqsezuH1cVi1TzKIHCQ==","signature_status":"signed_v1","signed_at":"2026-05-18T03:05:00.374229Z","signed_message":"canonical_sha256_bytes"},"source_id":"1312.3146","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:034d00ea0bcb6f23b8a559b1c3e2ec2e32d3a36a9c1ae11f29a96fa218c257c8","sha256:975c04434c623f9862b024db67b6d4b9fc5e62f2925ba46212b9adc96b51797a"],"state_sha256":"446f247ed1233199c92fda94c905ac6d14733b7e81402d9fe7e335cc0e699dc2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"cSp916G5MwdAXWw0Oy8tEVGeojMo6xZaWbpTc9WePD6Jq6rXawJD2wqj1i3kw9FXzucGaByfpMXmTfm7LyLjBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T09:40:35.935943Z","bundle_sha256":"51ae042d3cab678ad33c9f9bd7e9ea541a093a9eef07a125cb918293b406a909"}}