{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:THCG2M6PRF5HLMNWMN55Z64KA2","short_pith_number":"pith:THCG2M6P","schema_version":"1.0","canonical_sha256":"99c46d33cf897a75b1b6637bdcfb8a06810190a239ed686d6a4d17626c697244","source":{"kind":"arxiv","id":"1701.07347","version":2},"attestation_state":"computed","paper":{"title":"Wiretap channel capacity: Secrecy criteria, strong converse, and phase change","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Eric Graves, Tan F. Wong","submitted_at":"2017-01-25T14:58:26Z","abstract_excerpt":"This paper employs equal-image-size source partitioning techniques to derive the capacities of the general discrete memoryless wiretap channel (DM-WTC) under four different secrecy criteria. These criteria respectively specify requirements on the expected values and tail probabilities of the differences, in absolute value and in exponent, between the joint probability of the secret message and the eavesdropper's observation and the corresponding probability if they were independent. Some of these criteria reduce back to the standard leakage and variation distance constraints that have been pre"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1701.07347","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-01-25T14:58:26Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"d3971a1c1653e2d98ed16faf52beccd7e8bd428602597dedbafb58d823ee420f","abstract_canon_sha256":"88c678655a0d4b4df60358fbb2c2860b3f3ff9d46e1479e77cfc441c9649116e"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:23:17.095224Z","signature_b64":"MfvT4b+h8DU4l1zFmTD0CHaGs6eI8pXCcER1DjGJR9524EaEqaGC95ai+RYmpmCwERPaQT/npWDx8ree/KltAQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"99c46d33cf897a75b1b6637bdcfb8a06810190a239ed686d6a4d17626c697244","last_reissued_at":"2026-05-18T00:23:17.094514Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:23:17.094514Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Wiretap channel capacity: Secrecy criteria, strong converse, and phase change","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Eric Graves, Tan F. Wong","submitted_at":"2017-01-25T14:58:26Z","abstract_excerpt":"This paper employs equal-image-size source partitioning techniques to derive the capacities of the general discrete memoryless wiretap channel (DM-WTC) under four different secrecy criteria. These criteria respectively specify requirements on the expected values and tail probabilities of the differences, in absolute value and in exponent, between the joint probability of the secret message and the eavesdropper's observation and the corresponding probability if they were independent. Some of these criteria reduce back to the standard leakage and variation distance constraints that have been pre"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1701.07347","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1701.07347","created_at":"2026-05-18T00:23:17.094636+00:00"},{"alias_kind":"arxiv_version","alias_value":"1701.07347v2","created_at":"2026-05-18T00:23:17.094636+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1701.07347","created_at":"2026-05-18T00:23:17.094636+00:00"},{"alias_kind":"pith_short_12","alias_value":"THCG2M6PRF5H","created_at":"2026-05-18T12:31:46.661854+00:00"},{"alias_kind":"pith_short_16","alias_value":"THCG2M6PRF5HLMNW","created_at":"2026-05-18T12:31:46.661854+00:00"},{"alias_kind":"pith_short_8","alias_value":"THCG2M6P","created_at":"2026-05-18T12:31:46.661854+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2","json":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2.json","graph_json":"https://pith.science/api/pith-number/THCG2M6PRF5HLMNWMN55Z64KA2/graph.json","events_json":"https://pith.science/api/pith-number/THCG2M6PRF5HLMNWMN55Z64KA2/events.json","paper":"https://pith.science/paper/THCG2M6P"},"agent_actions":{"view_html":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2","download_json":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2.json","view_paper":"https://pith.science/paper/THCG2M6P","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1701.07347&json=true","fetch_graph":"https://pith.science/api/pith-number/THCG2M6PRF5HLMNWMN55Z64KA2/graph.json","fetch_events":"https://pith.science/api/pith-number/THCG2M6PRF5HLMNWMN55Z64KA2/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2/action/timestamp_anchor","attest_storage":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2/action/storage_attestation","attest_author":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2/action/author_attestation","sign_citation":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2/action/citation_signature","submit_replication":"https://pith.science/pith/THCG2M6PRF5HLMNWMN55Z64KA2/action/replication_record"}},"created_at":"2026-05-18T00:23:17.094636+00:00","updated_at":"2026-05-18T00:23:17.094636+00:00"}