{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:QBB3QF2P3E3VZ5GKK35R7PBF4Z","short_pith_number":"pith:QBB3QF2P","canonical_record":{"source":{"id":"1709.08505","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MA","submitted_at":"2017-09-25T14:17:50Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"b0a078dee831ae91cf286cffd6f3ec76531362edc2ae81fb8bad9feee50b91a9","abstract_canon_sha256":"960bc35bb9f4c0ed9eb32777710a8438acaa501c2643209da2a7859e4145e5e9"},"schema_version":"1.0"},"canonical_sha256":"8043b8174fd9375cf4ca56fb1fbc25e665cb256d0079711deeff56068c6e40ab","source":{"kind":"arxiv","id":"1709.08505","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1709.08505","created_at":"2026-05-18T00:34:25Z"},{"alias_kind":"arxiv_version","alias_value":"1709.08505v1","created_at":"2026-05-18T00:34:25Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1709.08505","created_at":"2026-05-18T00:34:25Z"},{"alias_kind":"pith_short_12","alias_value":"QBB3QF2P3E3V","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_16","alias_value":"QBB3QF2P3E3VZ5GK","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_8","alias_value":"QBB3QF2P","created_at":"2026-05-18T12:31:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:QBB3QF2P3E3VZ5GKK35R7PBF4Z","target":"record","payload":{"canonical_record":{"source":{"id":"1709.08505","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MA","submitted_at":"2017-09-25T14:17:50Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"b0a078dee831ae91cf286cffd6f3ec76531362edc2ae81fb8bad9feee50b91a9","abstract_canon_sha256":"960bc35bb9f4c0ed9eb32777710a8438acaa501c2643209da2a7859e4145e5e9"},"schema_version":"1.0"},"canonical_sha256":"8043b8174fd9375cf4ca56fb1fbc25e665cb256d0079711deeff56068c6e40ab","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:34:25.445987Z","signature_b64":"ObpATBe4Pht7o67Xz1Jnac2YRtABDw8DUOU2f/M+z0Ck1WoZqWS+bRaO02hMk0Md9HPzk3fAKi3aknmEPm7aBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8043b8174fd9375cf4ca56fb1fbc25e665cb256d0079711deeff56068c6e40ab","last_reissued_at":"2026-05-18T00:34:25.445545Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:34:25.445545Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1709.08505","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:34:25Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pWgG6QluIA9E96GE60Hp40SEZhpKex7Z8vuIusUcZiZr67yPoYiBDWFkx8SRIVFgVsVmFjDb0cL/IcsJdZUSCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T23:06:53.816457Z"},"content_sha256":"c11b82c8bedd504a02d1e081f4e4ccad41e5e0bea3aebfae5079191cbf66c472","schema_version":"1.0","event_id":"sha256:c11b82c8bedd504a02d1e081f4e4ccad41e5e0bea3aebfae5079191cbf66c472"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:QBB3QF2P3E3VZ5GKK35R7PBF4Z","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.MA","authors_text":"Arif Sarwat, Imtiaz Parvez, Maryamossadat Aghili","submitted_at":"2017-09-25T14:17:50Z","abstract_excerpt":"In the smart grid, smart meters, and numerous control and monitoring applications employ bidirectional wireless communication, where security is a critical issue. In key management based encryption method for the smart grid, the Trusted Third Party (TTP), and links between the smart meter and the third party are assumed to be fully trusted and reliable. However, in wired/wireless medium, a man-in-middle may want to interfere, monitor and control the network, thus exposing its vulnerability. Acknowledging this, in this paper, we propose a novel two level encryption method based on two partially"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1709.08505","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:34:25Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"es7O1WIu4FodWaQw/919s/rnvmaci4o/eixcrpRn0uoBON47B8lodQPnI/cO5KSeBjk/zdbTJhdK7SbiCIhNDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T23:06:53.817205Z"},"content_sha256":"4621273bf5f76bc0aa76d5da66b595c7e89335acf145bae141bfb88d3450b5a4","schema_version":"1.0","event_id":"sha256:4621273bf5f76bc0aa76d5da66b595c7e89335acf145bae141bfb88d3450b5a4"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/QBB3QF2P3E3VZ5GKK35R7PBF4Z/bundle.json","state_url":"https://pith.science/pith/QBB3QF2P3E3VZ5GKK35R7PBF4Z/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/QBB3QF2P3E3VZ5GKK35R7PBF4Z/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T23:06:53Z","links":{"resolver":"https://pith.science/pith/QBB3QF2P3E3VZ5GKK35R7PBF4Z","bundle":"https://pith.science/pith/QBB3QF2P3E3VZ5GKK35R7PBF4Z/bundle.json","state":"https://pith.science/pith/QBB3QF2P3E3VZ5GKK35R7PBF4Z/state.json","well_known_bundle":"https://pith.science/.well-known/pith/QBB3QF2P3E3VZ5GKK35R7PBF4Z/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:QBB3QF2P3E3VZ5GKK35R7PBF4Z","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"960bc35bb9f4c0ed9eb32777710a8438acaa501c2643209da2a7859e4145e5e9","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MA","submitted_at":"2017-09-25T14:17:50Z","title_canon_sha256":"b0a078dee831ae91cf286cffd6f3ec76531362edc2ae81fb8bad9feee50b91a9"},"schema_version":"1.0","source":{"id":"1709.08505","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1709.08505","created_at":"2026-05-18T00:34:25Z"},{"alias_kind":"arxiv_version","alias_value":"1709.08505v1","created_at":"2026-05-18T00:34:25Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1709.08505","created_at":"2026-05-18T00:34:25Z"},{"alias_kind":"pith_short_12","alias_value":"QBB3QF2P3E3V","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_16","alias_value":"QBB3QF2P3E3VZ5GK","created_at":"2026-05-18T12:31:37Z"},{"alias_kind":"pith_short_8","alias_value":"QBB3QF2P","created_at":"2026-05-18T12:31:37Z"}],"graph_snapshots":[{"event_id":"sha256:4621273bf5f76bc0aa76d5da66b595c7e89335acf145bae141bfb88d3450b5a4","target":"graph","created_at":"2026-05-18T00:34:25Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In the smart grid, smart meters, and numerous control and monitoring applications employ bidirectional wireless communication, where security is a critical issue. In key management based encryption method for the smart grid, the Trusted Third Party (TTP), and links between the smart meter and the third party are assumed to be fully trusted and reliable. However, in wired/wireless medium, a man-in-middle may want to interfere, monitor and control the network, thus exposing its vulnerability. Acknowledging this, in this paper, we propose a novel two level encryption method based on two partially","authors_text":"Arif Sarwat, Imtiaz Parvez, Maryamossadat Aghili","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MA","submitted_at":"2017-09-25T14:17:50Z","title":"Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1709.08505","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:c11b82c8bedd504a02d1e081f4e4ccad41e5e0bea3aebfae5079191cbf66c472","target":"record","created_at":"2026-05-18T00:34:25Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"960bc35bb9f4c0ed9eb32777710a8438acaa501c2643209da2a7859e4145e5e9","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.MA","submitted_at":"2017-09-25T14:17:50Z","title_canon_sha256":"b0a078dee831ae91cf286cffd6f3ec76531362edc2ae81fb8bad9feee50b91a9"},"schema_version":"1.0","source":{"id":"1709.08505","kind":"arxiv","version":1}},"canonical_sha256":"8043b8174fd9375cf4ca56fb1fbc25e665cb256d0079711deeff56068c6e40ab","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8043b8174fd9375cf4ca56fb1fbc25e665cb256d0079711deeff56068c6e40ab","first_computed_at":"2026-05-18T00:34:25.445545Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:34:25.445545Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ObpATBe4Pht7o67Xz1Jnac2YRtABDw8DUOU2f/M+z0Ck1WoZqWS+bRaO02hMk0Md9HPzk3fAKi3aknmEPm7aBw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:34:25.445987Z","signed_message":"canonical_sha256_bytes"},"source_id":"1709.08505","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:c11b82c8bedd504a02d1e081f4e4ccad41e5e0bea3aebfae5079191cbf66c472","sha256:4621273bf5f76bc0aa76d5da66b595c7e89335acf145bae141bfb88d3450b5a4"],"state_sha256":"06b36451c2016c8cbe84707fa43942674f43a2e23ce24133f38faf4b30d93e43"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"VFR3bwNWAQ/odErJc8u+a5MbpISbKnQ+s1tIog4Cg7gMYCYW9Mn0rHGW73Jwrs/Ev2DYm1QtL0bQYfgYL8DBDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T23:06:53.820827Z","bundle_sha256":"f692f9f8bd76a4f822c782116b87192440f5e90c02854cc8fc2773e288f33b58"}}