{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:NQTPI3X7UNLK4VC5XYO4EEWQIM","short_pith_number":"pith:NQTPI3X7","canonical_record":{"source":{"id":"1612.08465","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-12-27T00:35:09Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"05d3066bcb747029af86ebec48e59b2996df25fd89e56dbfb43a4e29f490a529","abstract_canon_sha256":"bc9a7d5ed664321566e6d495f65f4bab4db1ad5a698157e8c602e7097011443e"},"schema_version":"1.0"},"canonical_sha256":"6c26f46effa356ae545dbe1dc212d0433a77c23258ab4ebe8927dff070bbe0f6","source":{"kind":"arxiv","id":"1612.08465","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1612.08465","created_at":"2026-05-18T00:53:52Z"},{"alias_kind":"arxiv_version","alias_value":"1612.08465v1","created_at":"2026-05-18T00:53:52Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1612.08465","created_at":"2026-05-18T00:53:52Z"},{"alias_kind":"pith_short_12","alias_value":"NQTPI3X7UNLK","created_at":"2026-05-18T12:30:36Z"},{"alias_kind":"pith_short_16","alias_value":"NQTPI3X7UNLK4VC5","created_at":"2026-05-18T12:30:36Z"},{"alias_kind":"pith_short_8","alias_value":"NQTPI3X7","created_at":"2026-05-18T12:30:36Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:NQTPI3X7UNLK4VC5XYO4EEWQIM","target":"record","payload":{"canonical_record":{"source":{"id":"1612.08465","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-12-27T00:35:09Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"05d3066bcb747029af86ebec48e59b2996df25fd89e56dbfb43a4e29f490a529","abstract_canon_sha256":"bc9a7d5ed664321566e6d495f65f4bab4db1ad5a698157e8c602e7097011443e"},"schema_version":"1.0"},"canonical_sha256":"6c26f46effa356ae545dbe1dc212d0433a77c23258ab4ebe8927dff070bbe0f6","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:53:52.938650Z","signature_b64":"PZNNfftBKTo2EZEo7VbNebz9c1yeaftv1lS0Q5xpoOIMWopITjxp9BvyMstfqeMk2YchbBsKvNO9lBNtql5ZBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"6c26f46effa356ae545dbe1dc212d0433a77c23258ab4ebe8927dff070bbe0f6","last_reissued_at":"2026-05-18T00:53:52.937974Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:53:52.937974Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1612.08465","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:53:52Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"47pAQbnsnEyioNm2pu8DSIpEkbcJU+u0u7Fk59FLu0dR9B5SqHQEsenb9BvhDmyFw9ujbnnIXbD0RCtYON8EAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T10:26:56.462282Z"},"content_sha256":"0af60a748e967b677e3965929d941f7ce419f485aa5051e275b3acf55a437882","schema_version":"1.0","event_id":"sha256:0af60a748e967b677e3965929d941f7ce419f485aa5051e275b3acf55a437882"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:NQTPI3X7UNLK4VC5XYO4EEWQIM","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Christos Masouros, Kai-Kit Wong, Muhammad R. A. Khandaker","submitted_at":"2016-12-27T00:35:09Z","abstract_excerpt":"Conventionally, interference and noise are treated as catastrophic elements in wireless communications. However, it has been shown recently that exploiting known interference constructively can even contribute to signal detection ability at the receiving end. This paper exploits this concept to design artificial noise (AN) beamformers constructive to the intended receiver (IR) yet keeping AN disruptive to possible eavesdroppers (Eves). The scenario considered here is a multiple-input single-output (MISO) wiretap channel with multiple eavesdroppers. Both perfect and imperfect channel informatio"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1612.08465","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:53:52Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"vB1jxcx3QZvNrfGWu4KyDLGn6ItYwRW2kwNpiyLE/FbanTMFbzKyMDs5envUrRNl0YFN3gDzg6lbCdmpY15yCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T10:26:56.462768Z"},"content_sha256":"2fb7ce30df99a8bc2e22db12a47adf11334640a8b7817412494906a851decf79","schema_version":"1.0","event_id":"sha256:2fb7ce30df99a8bc2e22db12a47adf11334640a8b7817412494906a851decf79"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/NQTPI3X7UNLK4VC5XYO4EEWQIM/bundle.json","state_url":"https://pith.science/pith/NQTPI3X7UNLK4VC5XYO4EEWQIM/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/NQTPI3X7UNLK4VC5XYO4EEWQIM/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T10:26:56Z","links":{"resolver":"https://pith.science/pith/NQTPI3X7UNLK4VC5XYO4EEWQIM","bundle":"https://pith.science/pith/NQTPI3X7UNLK4VC5XYO4EEWQIM/bundle.json","state":"https://pith.science/pith/NQTPI3X7UNLK4VC5XYO4EEWQIM/state.json","well_known_bundle":"https://pith.science/.well-known/pith/NQTPI3X7UNLK4VC5XYO4EEWQIM/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:NQTPI3X7UNLK4VC5XYO4EEWQIM","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"bc9a7d5ed664321566e6d495f65f4bab4db1ad5a698157e8c602e7097011443e","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-12-27T00:35:09Z","title_canon_sha256":"05d3066bcb747029af86ebec48e59b2996df25fd89e56dbfb43a4e29f490a529"},"schema_version":"1.0","source":{"id":"1612.08465","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1612.08465","created_at":"2026-05-18T00:53:52Z"},{"alias_kind":"arxiv_version","alias_value":"1612.08465v1","created_at":"2026-05-18T00:53:52Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1612.08465","created_at":"2026-05-18T00:53:52Z"},{"alias_kind":"pith_short_12","alias_value":"NQTPI3X7UNLK","created_at":"2026-05-18T12:30:36Z"},{"alias_kind":"pith_short_16","alias_value":"NQTPI3X7UNLK4VC5","created_at":"2026-05-18T12:30:36Z"},{"alias_kind":"pith_short_8","alias_value":"NQTPI3X7","created_at":"2026-05-18T12:30:36Z"}],"graph_snapshots":[{"event_id":"sha256:2fb7ce30df99a8bc2e22db12a47adf11334640a8b7817412494906a851decf79","target":"graph","created_at":"2026-05-18T00:53:52Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Conventionally, interference and noise are treated as catastrophic elements in wireless communications. However, it has been shown recently that exploiting known interference constructively can even contribute to signal detection ability at the receiving end. This paper exploits this concept to design artificial noise (AN) beamformers constructive to the intended receiver (IR) yet keeping AN disruptive to possible eavesdroppers (Eves). The scenario considered here is a multiple-input single-output (MISO) wiretap channel with multiple eavesdroppers. Both perfect and imperfect channel informatio","authors_text":"Christos Masouros, Kai-Kit Wong, Muhammad R. A. Khandaker","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-12-27T00:35:09Z","title":"Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1612.08465","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0af60a748e967b677e3965929d941f7ce419f485aa5051e275b3acf55a437882","target":"record","created_at":"2026-05-18T00:53:52Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"bc9a7d5ed664321566e6d495f65f4bab4db1ad5a698157e8c602e7097011443e","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-12-27T00:35:09Z","title_canon_sha256":"05d3066bcb747029af86ebec48e59b2996df25fd89e56dbfb43a4e29f490a529"},"schema_version":"1.0","source":{"id":"1612.08465","kind":"arxiv","version":1}},"canonical_sha256":"6c26f46effa356ae545dbe1dc212d0433a77c23258ab4ebe8927dff070bbe0f6","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"6c26f46effa356ae545dbe1dc212d0433a77c23258ab4ebe8927dff070bbe0f6","first_computed_at":"2026-05-18T00:53:52.937974Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:53:52.937974Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"PZNNfftBKTo2EZEo7VbNebz9c1yeaftv1lS0Q5xpoOIMWopITjxp9BvyMstfqeMk2YchbBsKvNO9lBNtql5ZBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:53:52.938650Z","signed_message":"canonical_sha256_bytes"},"source_id":"1612.08465","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:0af60a748e967b677e3965929d941f7ce419f485aa5051e275b3acf55a437882","sha256:2fb7ce30df99a8bc2e22db12a47adf11334640a8b7817412494906a851decf79"],"state_sha256":"c7ab47f6c328c634d6d516f874f28533cca23e1c6a0d10031f4c3fa1b22dc931"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"19D9GCm+BbCHOR1EC+rtYgpuKM48QBiJHwnITvev6QXpGujTlOoh/1KYVPl4uqtFcY+4LOOTNIu+Kqk/A+m+Bg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T10:26:56.465873Z","bundle_sha256":"0c529a0b4c473a08e7313ada76810893632cf0246c943812d94a44d1ddf1eb6a"}}