{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2009:SA3UT35QEITHWEBWOUWLDUJFHJ","short_pith_number":"pith:SA3UT35Q","canonical_record":{"source":{"id":"0904.2722","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2009-04-17T15:31:46Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"40d7fc1a066b3d42043be350586a1aaf7d5634a0a5a755d058e90103f9dd9583","abstract_canon_sha256":"093691a583f09e14eed85b45ec4c4cfbeeb76cb8d361b5b7414eaa227478c896"},"schema_version":"1.0"},"canonical_sha256":"903749efb022267b1036752cb1d1253a506e14c3b91f37cb6511245063ea05db","source":{"kind":"arxiv","id":"0904.2722","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"0904.2722","created_at":"2026-05-18T00:58:20Z"},{"alias_kind":"arxiv_version","alias_value":"0904.2722v1","created_at":"2026-05-18T00:58:20Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.0904.2722","created_at":"2026-05-18T00:58:20Z"},{"alias_kind":"pith_short_12","alias_value":"SA3UT35QEITH","created_at":"2026-05-18T12:26:01Z"},{"alias_kind":"pith_short_16","alias_value":"SA3UT35QEITHWEBW","created_at":"2026-05-18T12:26:01Z"},{"alias_kind":"pith_short_8","alias_value":"SA3UT35Q","created_at":"2026-05-18T12:26:01Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2009:SA3UT35QEITHWEBWOUWLDUJFHJ","target":"record","payload":{"canonical_record":{"source":{"id":"0904.2722","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2009-04-17T15:31:46Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"40d7fc1a066b3d42043be350586a1aaf7d5634a0a5a755d058e90103f9dd9583","abstract_canon_sha256":"093691a583f09e14eed85b45ec4c4cfbeeb76cb8d361b5b7414eaa227478c896"},"schema_version":"1.0"},"canonical_sha256":"903749efb022267b1036752cb1d1253a506e14c3b91f37cb6511245063ea05db","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:58:20.242980Z","signature_b64":"xoNUia5ig0XbFpajAoC690HpUDZDHDB8mOddNx4RG7sjg9kQgYCB2ugh5FkXS+9nWQWqxkbfqExnCyVeBMqQDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"903749efb022267b1036752cb1d1253a506e14c3b91f37cb6511245063ea05db","last_reissued_at":"2026-05-18T00:58:20.242378Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:58:20.242378Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"0904.2722","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"KUCkM8mpUQtApYJ9TbG8S1e0fIVxLT1A2LsJ/U/nYRyIget4RtFQBR/a8sTJSJ1LuCRamjW5854OY5VVsxGtDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:35:36.783023Z"},"content_sha256":"535d4ba7b7688147ee199d0062d6eb0f99aaa5e02f86e99947905aba33a439b1","schema_version":"1.0","event_id":"sha256:535d4ba7b7688147ee199d0062d6eb0f99aaa5e02f86e99947905aba33a439b1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2009:SA3UT35QEITHWEBWOUWLDUJFHJ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.NI","authors_text":"Fang Zhao, Joao Barros, Keesook Han, Lu\\'isa Lima, MinJi Kim, Muriel Medard, Ralf Koetter, Ton Kalker","submitted_at":"2009-04-17T15:31:46Z","abstract_excerpt":"Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly recover a file. We show that even for a small probability of attack, the system fails with overwhelming probability. We then propose a novel signature scheme that allows packet-level Byzantine detection. This scheme allows one-hop containment of the "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"0904.2722","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Jzgv7mCZDuVRbF7R1Cx++YBkxk//7TbwXhcMdZxI5lDCtdyKHdHZYHMIoTZLw7jZ8cQWP+aMxwg/Hc5QNS/0Bw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:35:36.783412Z"},"content_sha256":"b2d7aa3b53e8e30ce86d6e6710b9797b47a463b41d5494ce0e5b7838443e4896","schema_version":"1.0","event_id":"sha256:b2d7aa3b53e8e30ce86d6e6710b9797b47a463b41d5494ce0e5b7838443e4896"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/SA3UT35QEITHWEBWOUWLDUJFHJ/bundle.json","state_url":"https://pith.science/pith/SA3UT35QEITHWEBWOUWLDUJFHJ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/SA3UT35QEITHWEBWOUWLDUJFHJ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T21:35:36Z","links":{"resolver":"https://pith.science/pith/SA3UT35QEITHWEBWOUWLDUJFHJ","bundle":"https://pith.science/pith/SA3UT35QEITHWEBWOUWLDUJFHJ/bundle.json","state":"https://pith.science/pith/SA3UT35QEITHWEBWOUWLDUJFHJ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/SA3UT35QEITHWEBWOUWLDUJFHJ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2009:SA3UT35QEITHWEBWOUWLDUJFHJ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"093691a583f09e14eed85b45ec4c4cfbeeb76cb8d361b5b7414eaa227478c896","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2009-04-17T15:31:46Z","title_canon_sha256":"40d7fc1a066b3d42043be350586a1aaf7d5634a0a5a755d058e90103f9dd9583"},"schema_version":"1.0","source":{"id":"0904.2722","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"0904.2722","created_at":"2026-05-18T00:58:20Z"},{"alias_kind":"arxiv_version","alias_value":"0904.2722v1","created_at":"2026-05-18T00:58:20Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.0904.2722","created_at":"2026-05-18T00:58:20Z"},{"alias_kind":"pith_short_12","alias_value":"SA3UT35QEITH","created_at":"2026-05-18T12:26:01Z"},{"alias_kind":"pith_short_16","alias_value":"SA3UT35QEITHWEBW","created_at":"2026-05-18T12:26:01Z"},{"alias_kind":"pith_short_8","alias_value":"SA3UT35Q","created_at":"2026-05-18T12:26:01Z"}],"graph_snapshots":[{"event_id":"sha256:b2d7aa3b53e8e30ce86d6e6710b9797b47a463b41d5494ce0e5b7838443e4896","target":"graph","created_at":"2026-05-18T00:58:20Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails to correctly recover a file. We show that even for a small probability of attack, the system fails with overwhelming probability. We then propose a novel signature scheme that allows packet-level Byzantine detection. This scheme allows one-hop containment of the ","authors_text":"Fang Zhao, Joao Barros, Keesook Han, Lu\\'isa Lima, MinJi Kim, Muriel Medard, Ralf Koetter, Ton Kalker","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2009-04-17T15:31:46Z","title":"On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"0904.2722","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:535d4ba7b7688147ee199d0062d6eb0f99aaa5e02f86e99947905aba33a439b1","target":"record","created_at":"2026-05-18T00:58:20Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"093691a583f09e14eed85b45ec4c4cfbeeb76cb8d361b5b7414eaa227478c896","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2009-04-17T15:31:46Z","title_canon_sha256":"40d7fc1a066b3d42043be350586a1aaf7d5634a0a5a755d058e90103f9dd9583"},"schema_version":"1.0","source":{"id":"0904.2722","kind":"arxiv","version":1}},"canonical_sha256":"903749efb022267b1036752cb1d1253a506e14c3b91f37cb6511245063ea05db","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"903749efb022267b1036752cb1d1253a506e14c3b91f37cb6511245063ea05db","first_computed_at":"2026-05-18T00:58:20.242378Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:58:20.242378Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"xoNUia5ig0XbFpajAoC690HpUDZDHDB8mOddNx4RG7sjg9kQgYCB2ugh5FkXS+9nWQWqxkbfqExnCyVeBMqQDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:58:20.242980Z","signed_message":"canonical_sha256_bytes"},"source_id":"0904.2722","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:535d4ba7b7688147ee199d0062d6eb0f99aaa5e02f86e99947905aba33a439b1","sha256:b2d7aa3b53e8e30ce86d6e6710b9797b47a463b41d5494ce0e5b7838443e4896"],"state_sha256":"e64eb370ff88f38338c6b3d40c9952cad7f5b1d464b7e7746a3f6286b9164bdb"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"+r4hN01jhoq4mKBskjfMqXaa62Mi2sCPOiNTv9d8LqCwNFsJVMtNIQOwzbuzjiQ4oalR3M70VtSYrqvUKopCAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T21:35:36.786124Z","bundle_sha256":"ac46c1e6ea1a3a8f44a8cff948e850599a03d8e7cb29c169320bbea152f85f5c"}}