{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2013:P6IQNH6TMUFAC2Q4FTECSMPLPZ","short_pith_number":"pith:P6IQNH6T","schema_version":"1.0","canonical_sha256":"7f91069fd3650a016a1c2cc82931eb7e4ff0f47870dfb78b4b1a0925b9b72292","source":{"kind":"arxiv","id":"1307.4046","version":2},"attestation_state":"computed","paper":{"title":"PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Joerg Ott, Marcin Nagy, N. Asokan","submitted_at":"2013-07-15T18:34:34Z","abstract_excerpt":"We present the design and implementation of the PeerShare, a system that can be used by applications to securely distribute sensitive data to social contacts of a user. PeerShare incorporates a generic framework that allows different applications to distribute data with different security requirements. By using interfaces available from existing popular social networks. PeerShare is designed to be easy to use for both end users as well as developers of applications. PeerShare can be used to distribute shared keys, public keys and any other data that need to be distributed with authenticity and"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1307.4046","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2013-07-15T18:34:34Z","cross_cats_sorted":[],"title_canon_sha256":"6d9f953d0bdc29512972cd582eb1ca2d16cdd87bec9c96a8c8ff546fee7a1d38","abstract_canon_sha256":"6f86c782b8c75576582454bdb2cfbe7d5479a27633efefd8c2ac3d24fbb21cad"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:18:18.039081Z","signature_b64":"IkDIMAw/6Aufc2A448x5pRKpQTT7Gsh1Kob/eAE0IwP/PSh41ePkaL/6tf7vLUGIilNKeQEJAmTVkcoResOkDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"7f91069fd3650a016a1c2cc82931eb7e4ff0f47870dfb78b4b1a0925b9b72292","last_reissued_at":"2026-05-18T03:18:18.038223Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:18:18.038223Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Joerg Ott, Marcin Nagy, N. Asokan","submitted_at":"2013-07-15T18:34:34Z","abstract_excerpt":"We present the design and implementation of the PeerShare, a system that can be used by applications to securely distribute sensitive data to social contacts of a user. PeerShare incorporates a generic framework that allows different applications to distribute data with different security requirements. By using interfaces available from existing popular social networks. PeerShare is designed to be easy to use for both end users as well as developers of applications. PeerShare can be used to distribute shared keys, public keys and any other data that need to be distributed with authenticity and"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1307.4046","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1307.4046","created_at":"2026-05-18T03:18:18.038372+00:00"},{"alias_kind":"arxiv_version","alias_value":"1307.4046v2","created_at":"2026-05-18T03:18:18.038372+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1307.4046","created_at":"2026-05-18T03:18:18.038372+00:00"},{"alias_kind":"pith_short_12","alias_value":"P6IQNH6TMUFA","created_at":"2026-05-18T12:27:54.935989+00:00"},{"alias_kind":"pith_short_16","alias_value":"P6IQNH6TMUFAC2Q4","created_at":"2026-05-18T12:27:54.935989+00:00"},{"alias_kind":"pith_short_8","alias_value":"P6IQNH6T","created_at":"2026-05-18T12:27:54.935989+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ","json":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ.json","graph_json":"https://pith.science/api/pith-number/P6IQNH6TMUFAC2Q4FTECSMPLPZ/graph.json","events_json":"https://pith.science/api/pith-number/P6IQNH6TMUFAC2Q4FTECSMPLPZ/events.json","paper":"https://pith.science/paper/P6IQNH6T"},"agent_actions":{"view_html":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ","download_json":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ.json","view_paper":"https://pith.science/paper/P6IQNH6T","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1307.4046&json=true","fetch_graph":"https://pith.science/api/pith-number/P6IQNH6TMUFAC2Q4FTECSMPLPZ/graph.json","fetch_events":"https://pith.science/api/pith-number/P6IQNH6TMUFAC2Q4FTECSMPLPZ/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ/action/timestamp_anchor","attest_storage":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ/action/storage_attestation","attest_author":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ/action/author_attestation","sign_citation":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ/action/citation_signature","submit_replication":"https://pith.science/pith/P6IQNH6TMUFAC2Q4FTECSMPLPZ/action/replication_record"}},"created_at":"2026-05-18T03:18:18.038372+00:00","updated_at":"2026-05-18T03:18:18.038372+00:00"}