{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:MJFLTRNDZEA2YMG6WZJBUBFRED","short_pith_number":"pith:MJFLTRND","canonical_record":{"source":{"id":"1604.07048","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-04-24T16:27:28Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"4aa85f40c6d9a74c2fffa79e5a74b947941055eff88adef0de131260473257f8","abstract_canon_sha256":"088a19797f2b372c63e7eaa68bfc004669edb671c12d0897c068e664a3ab1683"},"schema_version":"1.0"},"canonical_sha256":"624ab9c5a3c901ac30deb6521a04b120db481e1350281541b0ebe5ff5bc914d7","source":{"kind":"arxiv","id":"1604.07048","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1604.07048","created_at":"2026-05-18T01:16:23Z"},{"alias_kind":"arxiv_version","alias_value":"1604.07048v1","created_at":"2026-05-18T01:16:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1604.07048","created_at":"2026-05-18T01:16:23Z"},{"alias_kind":"pith_short_12","alias_value":"MJFLTRNDZEA2","created_at":"2026-05-18T12:30:32Z"},{"alias_kind":"pith_short_16","alias_value":"MJFLTRNDZEA2YMG6","created_at":"2026-05-18T12:30:32Z"},{"alias_kind":"pith_short_8","alias_value":"MJFLTRND","created_at":"2026-05-18T12:30:32Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:MJFLTRNDZEA2YMG6WZJBUBFRED","target":"record","payload":{"canonical_record":{"source":{"id":"1604.07048","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-04-24T16:27:28Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"4aa85f40c6d9a74c2fffa79e5a74b947941055eff88adef0de131260473257f8","abstract_canon_sha256":"088a19797f2b372c63e7eaa68bfc004669edb671c12d0897c068e664a3ab1683"},"schema_version":"1.0"},"canonical_sha256":"624ab9c5a3c901ac30deb6521a04b120db481e1350281541b0ebe5ff5bc914d7","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:16:23.193701Z","signature_b64":"ILEuxW1FWmCEGdKhy7hhVDPZTVpEF76I5qMKdpf2Q4rKLJr01xEox9lTeKSAqHyhx11mi/Z92f6aULJoxQ5ODQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"624ab9c5a3c901ac30deb6521a04b120db481e1350281541b0ebe5ff5bc914d7","last_reissued_at":"2026-05-18T01:16:23.192959Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:16:23.192959Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1604.07048","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:16:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"DY4rR2aaQyuBWrCAfOTLDaMVjfzpFZYH7XmPlG3CgcpRxDEWKW8Pn20y43nBKpTzKuKMFK4p1usBkuyM1MHkAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T12:10:45.391797Z"},"content_sha256":"1a15f370d2b75dd0f998239fc24744e9c45102440d6a319eca66d0f994be0ac1","schema_version":"1.0","event_id":"sha256:1a15f370d2b75dd0f998239fc24744e9c45102440d6a319eca66d0f994be0ac1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:MJFLTRNDZEA2YMG6WZJBUBFRED","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Nested Lattice Codes for Vector Perturbation Systems","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Amaro Barreal, Camilla Hollanti, David A. Karpuk, Oliver W. Gnilke","submitted_at":"2016-04-24T16:27:28Z","abstract_excerpt":"Vector perturbation is an encoding method for broadcast channels in which the transmitter solves a shortest vector problem in a lattice to create a perturbation vector, which is then added to the data before transmission. In this work, we introduce nested lattice codes into vector perturbation systems, resulting in a strategy which we deem matrix perturbation. We propose design criteria for the nested lattice codes, and show empirically that lattices satisfying these design criteria can improve the performance of vector perturbation systems. The resulting design criteria are the same as those "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1604.07048","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:16:23Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"g9UfmWF2F7NSxDsOKWOYNpoT868x8RNGDj7U759jxGGswujOv83Gasi56Hr5HFESJ7sui/GTLFHntnp9zdCEBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T12:10:45.392356Z"},"content_sha256":"268871dc2e2660fca70966d2f327f937f716e93085bd76a827c77916016da972","schema_version":"1.0","event_id":"sha256:268871dc2e2660fca70966d2f327f937f716e93085bd76a827c77916016da972"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/MJFLTRNDZEA2YMG6WZJBUBFRED/bundle.json","state_url":"https://pith.science/pith/MJFLTRNDZEA2YMG6WZJBUBFRED/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/MJFLTRNDZEA2YMG6WZJBUBFRED/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T12:10:45Z","links":{"resolver":"https://pith.science/pith/MJFLTRNDZEA2YMG6WZJBUBFRED","bundle":"https://pith.science/pith/MJFLTRNDZEA2YMG6WZJBUBFRED/bundle.json","state":"https://pith.science/pith/MJFLTRNDZEA2YMG6WZJBUBFRED/state.json","well_known_bundle":"https://pith.science/.well-known/pith/MJFLTRNDZEA2YMG6WZJBUBFRED/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:MJFLTRNDZEA2YMG6WZJBUBFRED","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"088a19797f2b372c63e7eaa68bfc004669edb671c12d0897c068e664a3ab1683","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-04-24T16:27:28Z","title_canon_sha256":"4aa85f40c6d9a74c2fffa79e5a74b947941055eff88adef0de131260473257f8"},"schema_version":"1.0","source":{"id":"1604.07048","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1604.07048","created_at":"2026-05-18T01:16:23Z"},{"alias_kind":"arxiv_version","alias_value":"1604.07048v1","created_at":"2026-05-18T01:16:23Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1604.07048","created_at":"2026-05-18T01:16:23Z"},{"alias_kind":"pith_short_12","alias_value":"MJFLTRNDZEA2","created_at":"2026-05-18T12:30:32Z"},{"alias_kind":"pith_short_16","alias_value":"MJFLTRNDZEA2YMG6","created_at":"2026-05-18T12:30:32Z"},{"alias_kind":"pith_short_8","alias_value":"MJFLTRND","created_at":"2026-05-18T12:30:32Z"}],"graph_snapshots":[{"event_id":"sha256:268871dc2e2660fca70966d2f327f937f716e93085bd76a827c77916016da972","target":"graph","created_at":"2026-05-18T01:16:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Vector perturbation is an encoding method for broadcast channels in which the transmitter solves a shortest vector problem in a lattice to create a perturbation vector, which is then added to the data before transmission. In this work, we introduce nested lattice codes into vector perturbation systems, resulting in a strategy which we deem matrix perturbation. We propose design criteria for the nested lattice codes, and show empirically that lattices satisfying these design criteria can improve the performance of vector perturbation systems. The resulting design criteria are the same as those ","authors_text":"Amaro Barreal, Camilla Hollanti, David A. Karpuk, Oliver W. Gnilke","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-04-24T16:27:28Z","title":"Nested Lattice Codes for Vector Perturbation Systems"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1604.07048","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:1a15f370d2b75dd0f998239fc24744e9c45102440d6a319eca66d0f994be0ac1","target":"record","created_at":"2026-05-18T01:16:23Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"088a19797f2b372c63e7eaa68bfc004669edb671c12d0897c068e664a3ab1683","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-04-24T16:27:28Z","title_canon_sha256":"4aa85f40c6d9a74c2fffa79e5a74b947941055eff88adef0de131260473257f8"},"schema_version":"1.0","source":{"id":"1604.07048","kind":"arxiv","version":1}},"canonical_sha256":"624ab9c5a3c901ac30deb6521a04b120db481e1350281541b0ebe5ff5bc914d7","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"624ab9c5a3c901ac30deb6521a04b120db481e1350281541b0ebe5ff5bc914d7","first_computed_at":"2026-05-18T01:16:23.192959Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:16:23.192959Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ILEuxW1FWmCEGdKhy7hhVDPZTVpEF76I5qMKdpf2Q4rKLJr01xEox9lTeKSAqHyhx11mi/Z92f6aULJoxQ5ODQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:16:23.193701Z","signed_message":"canonical_sha256_bytes"},"source_id":"1604.07048","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:1a15f370d2b75dd0f998239fc24744e9c45102440d6a319eca66d0f994be0ac1","sha256:268871dc2e2660fca70966d2f327f937f716e93085bd76a827c77916016da972"],"state_sha256":"50d88b86a073a0803a28951eecf16db1aeb278c83b99d184579551f8f52cdd87"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"85Y0YDLCjFpUKkyupEEhqNePugz6AW2HZmiMkyAWUtdxPZI3ssy7Yg1UuCAup7aiA1YiIm6gfcjJeXAiJauTAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T12:10:45.395269Z","bundle_sha256":"294f7dea00b2af971bed8d9831e3e3976e9d263ea83954b002be6cbaa0cd6b8d"}}