{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:ROS6GYO74OI4LNYS5PBWXSY7PD","short_pith_number":"pith:ROS6GYO7","canonical_record":{"source":{"id":"1303.0707","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2013-03-04T14:26:17Z","cross_cats_sorted":["cs.CR","math.IT"],"title_canon_sha256":"9028b625bec5fdbefa71da3cf6a74ca7463f60e60dc10069ad354919cf47554c","abstract_canon_sha256":"3014acac8e671c41f269b20c2614821c5c29b09fc1f26953c387b6cf08c303f1"},"schema_version":"1.0"},"canonical_sha256":"8ba5e361dfe391c5b712ebc36bcb1f78e9a03322282adfe931c6737b5d0893be","source":{"kind":"arxiv","id":"1303.0707","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1303.0707","created_at":"2026-05-18T01:03:24Z"},{"alias_kind":"arxiv_version","alias_value":"1303.0707v2","created_at":"2026-05-18T01:03:24Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1303.0707","created_at":"2026-05-18T01:03:24Z"},{"alias_kind":"pith_short_12","alias_value":"ROS6GYO74OI4","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_16","alias_value":"ROS6GYO74OI4LNYS","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_8","alias_value":"ROS6GYO7","created_at":"2026-05-18T12:27:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:ROS6GYO74OI4LNYS5PBWXSY7PD","target":"record","payload":{"canonical_record":{"source":{"id":"1303.0707","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2013-03-04T14:26:17Z","cross_cats_sorted":["cs.CR","math.IT"],"title_canon_sha256":"9028b625bec5fdbefa71da3cf6a74ca7463f60e60dc10069ad354919cf47554c","abstract_canon_sha256":"3014acac8e671c41f269b20c2614821c5c29b09fc1f26953c387b6cf08c303f1"},"schema_version":"1.0"},"canonical_sha256":"8ba5e361dfe391c5b712ebc36bcb1f78e9a03322282adfe931c6737b5d0893be","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:03:24.565610Z","signature_b64":"HUJYf1K3wByUnNcSqvSUjvXtLpJU0Kb0E7PLmFNs8vPbmSr3mTAf+lIT8ro1NsNcYqhS7j6y7YR15KZzDF2KDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8ba5e361dfe391c5b712ebc36bcb1f78e9a03322282adfe931c6737b5d0893be","last_reissued_at":"2026-05-18T01:03:24.564981Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:03:24.564981Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1303.0707","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:03:24Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1TfnmKo8sveYJeYSGrNlEZ42BbodPqis1nu4knmGon1lwBQhGsuHq2Uhbi5/B3Tep9Ey888aAgnc5pP/yAi4Dg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T12:38:14.649602Z"},"content_sha256":"0b16863db69266be367a11b04a05747f39da00dd8606a6fd1b7abd45c45e2dc9","schema_version":"1.0","event_id":"sha256:0b16863db69266be367a11b04a05747f39da00dd8606a6fd1b7abd45c45e2dc9"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:ROS6GYO74OI4LNYS5PBWXSY7PD","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","math.IT"],"primary_cat":"cs.IT","authors_text":"Augusto Ferrante, Chiara Masiero, Michele Pavon, Nicola Laurenti, Stefano Tomasin","submitted_at":"2013-03-04T14:26:17Z","abstract_excerpt":"For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modelled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We derive the attacking strategy that provides the tightest bound on the error region, given the statistics of the side information. This turns out to be a zero mean, circularly symmetric Gaussian density who"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1303.0707","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:03:24Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xmDnXZI3e40bq9wFxcD8KJGUjAzOOxxM4w8DoYW8PuoG2nnFTM2TETpBSp2c46PNH74FJ2pkI+AROPpA3StkAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T12:38:14.650214Z"},"content_sha256":"1c1e850d6bac9829ce588d327c7901e6e06ec8c6f7535d5d61806b204804705a","schema_version":"1.0","event_id":"sha256:1c1e850d6bac9829ce588d327c7901e6e06ec8c6f7535d5d61806b204804705a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/bundle.json","state_url":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T12:38:14Z","links":{"resolver":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD","bundle":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/bundle.json","state":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:ROS6GYO74OI4LNYS5PBWXSY7PD","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"3014acac8e671c41f269b20c2614821c5c29b09fc1f26953c387b6cf08c303f1","cross_cats_sorted":["cs.CR","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2013-03-04T14:26:17Z","title_canon_sha256":"9028b625bec5fdbefa71da3cf6a74ca7463f60e60dc10069ad354919cf47554c"},"schema_version":"1.0","source":{"id":"1303.0707","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1303.0707","created_at":"2026-05-18T01:03:24Z"},{"alias_kind":"arxiv_version","alias_value":"1303.0707v2","created_at":"2026-05-18T01:03:24Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1303.0707","created_at":"2026-05-18T01:03:24Z"},{"alias_kind":"pith_short_12","alias_value":"ROS6GYO74OI4","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_16","alias_value":"ROS6GYO74OI4LNYS","created_at":"2026-05-18T12:27:59Z"},{"alias_kind":"pith_short_8","alias_value":"ROS6GYO7","created_at":"2026-05-18T12:27:59Z"}],"graph_snapshots":[{"event_id":"sha256:1c1e850d6bac9829ce588d327c7901e6e06ec8c6f7535d5d61806b204804705a","target":"graph","created_at":"2026-05-18T01:03:24Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modelled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We derive the attacking strategy that provides the tightest bound on the error region, given the statistics of the side information. This turns out to be a zero mean, circularly symmetric Gaussian density who","authors_text":"Augusto Ferrante, Chiara Masiero, Michele Pavon, Nicola Laurenti, Stefano Tomasin","cross_cats":["cs.CR","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2013-03-04T14:26:17Z","title":"On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1303.0707","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0b16863db69266be367a11b04a05747f39da00dd8606a6fd1b7abd45c45e2dc9","target":"record","created_at":"2026-05-18T01:03:24Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"3014acac8e671c41f269b20c2614821c5c29b09fc1f26953c387b6cf08c303f1","cross_cats_sorted":["cs.CR","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2013-03-04T14:26:17Z","title_canon_sha256":"9028b625bec5fdbefa71da3cf6a74ca7463f60e60dc10069ad354919cf47554c"},"schema_version":"1.0","source":{"id":"1303.0707","kind":"arxiv","version":2}},"canonical_sha256":"8ba5e361dfe391c5b712ebc36bcb1f78e9a03322282adfe931c6737b5d0893be","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8ba5e361dfe391c5b712ebc36bcb1f78e9a03322282adfe931c6737b5d0893be","first_computed_at":"2026-05-18T01:03:24.564981Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:03:24.564981Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"HUJYf1K3wByUnNcSqvSUjvXtLpJU0Kb0E7PLmFNs8vPbmSr3mTAf+lIT8ro1NsNcYqhS7j6y7YR15KZzDF2KDw==","signature_status":"signed_v1","signed_at":"2026-05-18T01:03:24.565610Z","signed_message":"canonical_sha256_bytes"},"source_id":"1303.0707","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:0b16863db69266be367a11b04a05747f39da00dd8606a6fd1b7abd45c45e2dc9","sha256:1c1e850d6bac9829ce588d327c7901e6e06ec8c6f7535d5d61806b204804705a"],"state_sha256":"7d7141adf22d3e539873104c07adde63fdaaecca934ce6fa7e6d5560924b64d8"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nZlKccvn6fODAwGhup+8R5g4BDLF7odfoHn+bymC027fS/3AG1uLNj0pdszdA0VBHgidBv8Cx2wyka/Ywx1aAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T12:38:14.653801Z","bundle_sha256":"d0e29b42c809f7c5df84653ee950d1f7ac4fcda7ca66ddd3b7aea75cb48f4902"}}