{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:PQAPILULSSNDVFRM55BFIRTD2R","short_pith_number":"pith:PQAPILUL","canonical_record":{"source":{"id":"1504.07193","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-04-27T18:11:54Z","cross_cats_sorted":[],"title_canon_sha256":"8e5d5b1006f27f555ac8a29a83ab376de22ff5113bfd3b475f9776d429ebfd9b","abstract_canon_sha256":"04b5a5856f738ed98bf2674b86dc85e6b3d6279bc7520bbe763f5d3ebc879e71"},"schema_version":"1.0"},"canonical_sha256":"7c00f42e8b949a3a962cef42544663d47a48a624fa38c9e401e678100f91e18a","source":{"kind":"arxiv","id":"1504.07193","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1504.07193","created_at":"2026-05-18T02:17:43Z"},{"alias_kind":"arxiv_version","alias_value":"1504.07193v1","created_at":"2026-05-18T02:17:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1504.07193","created_at":"2026-05-18T02:17:43Z"},{"alias_kind":"pith_short_12","alias_value":"PQAPILULSSND","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_16","alias_value":"PQAPILULSSNDVFRM","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_8","alias_value":"PQAPILUL","created_at":"2026-05-18T12:29:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:PQAPILULSSNDVFRM55BFIRTD2R","target":"record","payload":{"canonical_record":{"source":{"id":"1504.07193","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-04-27T18:11:54Z","cross_cats_sorted":[],"title_canon_sha256":"8e5d5b1006f27f555ac8a29a83ab376de22ff5113bfd3b475f9776d429ebfd9b","abstract_canon_sha256":"04b5a5856f738ed98bf2674b86dc85e6b3d6279bc7520bbe763f5d3ebc879e71"},"schema_version":"1.0"},"canonical_sha256":"7c00f42e8b949a3a962cef42544663d47a48a624fa38c9e401e678100f91e18a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:17:43.529459Z","signature_b64":"Cu87WhIkngOKAFfDpWZAwnhxhVbx/vAIgc5bjSASSfOUQ3971Clv4LezBpqjgIronPzoTf7XmRhaGWj7Hg/ABA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"7c00f42e8b949a3a962cef42544663d47a48a624fa38c9e401e678100f91e18a","last_reissued_at":"2026-05-18T02:17:43.529037Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:17:43.529037Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1504.07193","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:17:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"eLzFrvC3QsAfy32zjCCRRx2ap6kdf0ebbN++haZUeuORgsyV8vMg4YTgS2flYEJ37sbnYo75N7UObmDxmpW7Cw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T21:47:36.145947Z"},"content_sha256":"b840f6ee771010b89927819f21624448c4a2741f204665bc877a5dd317026307","schema_version":"1.0","event_id":"sha256:b840f6ee771010b89927819f21624448c4a2741f204665bc877a5dd317026307"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:PQAPILULSSNDVFRM55BFIRTD2R","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Secure Zones: An Attribute-Based Encryption advisory system for safe firearms","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Chien-Chung Shen, Marcos Portnoi","submitted_at":"2015-04-27T18:11:54Z","abstract_excerpt":"This work presents an application of the highly expressive Attribute-Based Encryption to implement Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the user and the firearm are received by embedded hardware in the firearms, which then advises the user about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and user attributes, and providing privacy and security through it cryptography. We describe a holistic approach to evolving the firearm to a cyber-physical system to aid in augmenting safety. We "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1504.07193","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:17:43Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XVTW/emnNA2BzfF7+P/DDIsBS0gpRsG2XXrrbpOJ6lJ+WWaasvayR6skXryESJI8S9sd/4RqV6Hki43hBqJHAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T21:47:36.146726Z"},"content_sha256":"63458a634e092f9869e15503f8d9285e0320ec3905d428379f833ea5de368297","schema_version":"1.0","event_id":"sha256:63458a634e092f9869e15503f8d9285e0320ec3905d428379f833ea5de368297"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/PQAPILULSSNDVFRM55BFIRTD2R/bundle.json","state_url":"https://pith.science/pith/PQAPILULSSNDVFRM55BFIRTD2R/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/PQAPILULSSNDVFRM55BFIRTD2R/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T21:47:36Z","links":{"resolver":"https://pith.science/pith/PQAPILULSSNDVFRM55BFIRTD2R","bundle":"https://pith.science/pith/PQAPILULSSNDVFRM55BFIRTD2R/bundle.json","state":"https://pith.science/pith/PQAPILULSSNDVFRM55BFIRTD2R/state.json","well_known_bundle":"https://pith.science/.well-known/pith/PQAPILULSSNDVFRM55BFIRTD2R/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:PQAPILULSSNDVFRM55BFIRTD2R","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"04b5a5856f738ed98bf2674b86dc85e6b3d6279bc7520bbe763f5d3ebc879e71","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-04-27T18:11:54Z","title_canon_sha256":"8e5d5b1006f27f555ac8a29a83ab376de22ff5113bfd3b475f9776d429ebfd9b"},"schema_version":"1.0","source":{"id":"1504.07193","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1504.07193","created_at":"2026-05-18T02:17:43Z"},{"alias_kind":"arxiv_version","alias_value":"1504.07193v1","created_at":"2026-05-18T02:17:43Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1504.07193","created_at":"2026-05-18T02:17:43Z"},{"alias_kind":"pith_short_12","alias_value":"PQAPILULSSND","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_16","alias_value":"PQAPILULSSNDVFRM","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_8","alias_value":"PQAPILUL","created_at":"2026-05-18T12:29:37Z"}],"graph_snapshots":[{"event_id":"sha256:63458a634e092f9869e15503f8d9285e0320ec3905d428379f833ea5de368297","target":"graph","created_at":"2026-05-18T02:17:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This work presents an application of the highly expressive Attribute-Based Encryption to implement Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the user and the firearm are received by embedded hardware in the firearms, which then advises the user about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and user attributes, and providing privacy and security through it cryptography. We describe a holistic approach to evolving the firearm to a cyber-physical system to aid in augmenting safety. We ","authors_text":"Chien-Chung Shen, Marcos Portnoi","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-04-27T18:11:54Z","title":"Secure Zones: An Attribute-Based Encryption advisory system for safe firearms"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1504.07193","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:b840f6ee771010b89927819f21624448c4a2741f204665bc877a5dd317026307","target":"record","created_at":"2026-05-18T02:17:43Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"04b5a5856f738ed98bf2674b86dc85e6b3d6279bc7520bbe763f5d3ebc879e71","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-04-27T18:11:54Z","title_canon_sha256":"8e5d5b1006f27f555ac8a29a83ab376de22ff5113bfd3b475f9776d429ebfd9b"},"schema_version":"1.0","source":{"id":"1504.07193","kind":"arxiv","version":1}},"canonical_sha256":"7c00f42e8b949a3a962cef42544663d47a48a624fa38c9e401e678100f91e18a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"7c00f42e8b949a3a962cef42544663d47a48a624fa38c9e401e678100f91e18a","first_computed_at":"2026-05-18T02:17:43.529037Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:17:43.529037Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Cu87WhIkngOKAFfDpWZAwnhxhVbx/vAIgc5bjSASSfOUQ3971Clv4LezBpqjgIronPzoTf7XmRhaGWj7Hg/ABA==","signature_status":"signed_v1","signed_at":"2026-05-18T02:17:43.529459Z","signed_message":"canonical_sha256_bytes"},"source_id":"1504.07193","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:b840f6ee771010b89927819f21624448c4a2741f204665bc877a5dd317026307","sha256:63458a634e092f9869e15503f8d9285e0320ec3905d428379f833ea5de368297"],"state_sha256":"d53dde0950a45cd1c15f82dd9b70c1b606cab6a43df0bbbf51d1349f9542f025"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Pt4hVeIAmaICT5wp4k1MfLEvBDw8ngALZxxLtcEAmw3CipNU/IhOG4qpKp5rIrTU4NRdqwjmhXT3ohxCnfyyCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T21:47:36.151379Z","bundle_sha256":"53d90d414bcc5005ebbf42a6c48ed40b7f49cadc1df00637a80b7cb1d0a34a11"}}