{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:W24JK5IVR4VE3VKKA63II5OX6H","short_pith_number":"pith:W24JK5IV","canonical_record":{"source":{"id":"1806.05589","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-06-14T14:45:26Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"9ede200a3216cea2a5bfd9fa6524346c33ebf6479bf0d2c30866224f18090a90","abstract_canon_sha256":"8859409c5c40111b18471ffbd733049eb307a7c108876bb55ec6b243bb8c768d"},"schema_version":"1.0"},"canonical_sha256":"b6b89575158f2a4dd54a07b68475d7f1e05db1752caecc25909d56883ec4a5bb","source":{"kind":"arxiv","id":"1806.05589","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1806.05589","created_at":"2026-05-18T00:13:14Z"},{"alias_kind":"arxiv_version","alias_value":"1806.05589v1","created_at":"2026-05-18T00:13:14Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1806.05589","created_at":"2026-05-18T00:13:14Z"},{"alias_kind":"pith_short_12","alias_value":"W24JK5IVR4VE","created_at":"2026-05-18T12:32:59Z"},{"alias_kind":"pith_short_16","alias_value":"W24JK5IVR4VE3VKK","created_at":"2026-05-18T12:32:59Z"},{"alias_kind":"pith_short_8","alias_value":"W24JK5IV","created_at":"2026-05-18T12:32:59Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:W24JK5IVR4VE3VKKA63II5OX6H","target":"record","payload":{"canonical_record":{"source":{"id":"1806.05589","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-06-14T14:45:26Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"9ede200a3216cea2a5bfd9fa6524346c33ebf6479bf0d2c30866224f18090a90","abstract_canon_sha256":"8859409c5c40111b18471ffbd733049eb307a7c108876bb55ec6b243bb8c768d"},"schema_version":"1.0"},"canonical_sha256":"b6b89575158f2a4dd54a07b68475d7f1e05db1752caecc25909d56883ec4a5bb","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:13:14.652848Z","signature_b64":"DiGtVh/uWwf/sgYWXbeZbMLMIxnDeI7nh16u/o4baPZC8LP6haGlRH6gQudmcTNc8yWdUk1mb7efJCU1P7iiDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b6b89575158f2a4dd54a07b68475d7f1e05db1752caecc25909d56883ec4a5bb","last_reissued_at":"2026-05-18T00:13:14.652121Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:13:14.652121Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1806.05589","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:13:14Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Hpk0xSbcHQkP92Ut3m5wnmjzmWiGYb2uwqt+wQ9hxa1MTmNRcZsSM6cenEpBOZ8+zOJqETYv+k6JIuUSrq3wBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:24:39.510714Z"},"content_sha256":"49acd67558b6a60a5165b97b6654bdab08ca916258d1c559056f362f1e43b712","schema_version":"1.0","event_id":"sha256:49acd67558b6a60a5165b97b6654bdab08ca916258d1c559056f362f1e43b712"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:W24JK5IVR4VE3VKKA63II5OX6H","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Inducing information stability and applications thereof to obtaining information theoretic necessary conditions directly from operational requirements","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Eric Graves, Tan F. Wong","submitted_at":"2018-06-14T14:45:26Z","abstract_excerpt":"This work constructs a discrete random variable that, when conditioned upon, ensures information stability of quasi-images. Using this construction, a new methodology is derived to obtain information theoretic necessary conditions directly from operational requirements. In particular, this methodology is used to derive new necessary conditions for keyed authentication over discrete memoryless channels and to establish the capacity region of the wiretap channel, subject to finite leakage and finite error, under two different secrecy metrics. These examples establish the usefulness of the propos"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1806.05589","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:13:14Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"fasq9qOMmnb6bQWxL7MUzSCZlGMqdjPZ2+VPX3GFgvLIDfiI4SkbB32YC+VxDgZdKpjdzbG5kQ/iEtYR4RNoCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T22:24:39.511064Z"},"content_sha256":"f6655d551456c800c6b9dc7791899a7b84ba84741a04229953e2db06ec0d6a52","schema_version":"1.0","event_id":"sha256:f6655d551456c800c6b9dc7791899a7b84ba84741a04229953e2db06ec0d6a52"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/W24JK5IVR4VE3VKKA63II5OX6H/bundle.json","state_url":"https://pith.science/pith/W24JK5IVR4VE3VKKA63II5OX6H/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/W24JK5IVR4VE3VKKA63II5OX6H/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T22:24:39Z","links":{"resolver":"https://pith.science/pith/W24JK5IVR4VE3VKKA63II5OX6H","bundle":"https://pith.science/pith/W24JK5IVR4VE3VKKA63II5OX6H/bundle.json","state":"https://pith.science/pith/W24JK5IVR4VE3VKKA63II5OX6H/state.json","well_known_bundle":"https://pith.science/.well-known/pith/W24JK5IVR4VE3VKKA63II5OX6H/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:W24JK5IVR4VE3VKKA63II5OX6H","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"8859409c5c40111b18471ffbd733049eb307a7c108876bb55ec6b243bb8c768d","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-06-14T14:45:26Z","title_canon_sha256":"9ede200a3216cea2a5bfd9fa6524346c33ebf6479bf0d2c30866224f18090a90"},"schema_version":"1.0","source":{"id":"1806.05589","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1806.05589","created_at":"2026-05-18T00:13:14Z"},{"alias_kind":"arxiv_version","alias_value":"1806.05589v1","created_at":"2026-05-18T00:13:14Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1806.05589","created_at":"2026-05-18T00:13:14Z"},{"alias_kind":"pith_short_12","alias_value":"W24JK5IVR4VE","created_at":"2026-05-18T12:32:59Z"},{"alias_kind":"pith_short_16","alias_value":"W24JK5IVR4VE3VKK","created_at":"2026-05-18T12:32:59Z"},{"alias_kind":"pith_short_8","alias_value":"W24JK5IV","created_at":"2026-05-18T12:32:59Z"}],"graph_snapshots":[{"event_id":"sha256:f6655d551456c800c6b9dc7791899a7b84ba84741a04229953e2db06ec0d6a52","target":"graph","created_at":"2026-05-18T00:13:14Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This work constructs a discrete random variable that, when conditioned upon, ensures information stability of quasi-images. Using this construction, a new methodology is derived to obtain information theoretic necessary conditions directly from operational requirements. In particular, this methodology is used to derive new necessary conditions for keyed authentication over discrete memoryless channels and to establish the capacity region of the wiretap channel, subject to finite leakage and finite error, under two different secrecy metrics. These examples establish the usefulness of the propos","authors_text":"Eric Graves, Tan F. Wong","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-06-14T14:45:26Z","title":"Inducing information stability and applications thereof to obtaining information theoretic necessary conditions directly from operational requirements"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1806.05589","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:49acd67558b6a60a5165b97b6654bdab08ca916258d1c559056f362f1e43b712","target":"record","created_at":"2026-05-18T00:13:14Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"8859409c5c40111b18471ffbd733049eb307a7c108876bb55ec6b243bb8c768d","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2018-06-14T14:45:26Z","title_canon_sha256":"9ede200a3216cea2a5bfd9fa6524346c33ebf6479bf0d2c30866224f18090a90"},"schema_version":"1.0","source":{"id":"1806.05589","kind":"arxiv","version":1}},"canonical_sha256":"b6b89575158f2a4dd54a07b68475d7f1e05db1752caecc25909d56883ec4a5bb","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b6b89575158f2a4dd54a07b68475d7f1e05db1752caecc25909d56883ec4a5bb","first_computed_at":"2026-05-18T00:13:14.652121Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:13:14.652121Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"DiGtVh/uWwf/sgYWXbeZbMLMIxnDeI7nh16u/o4baPZC8LP6haGlRH6gQudmcTNc8yWdUk1mb7efJCU1P7iiDw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:13:14.652848Z","signed_message":"canonical_sha256_bytes"},"source_id":"1806.05589","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:49acd67558b6a60a5165b97b6654bdab08ca916258d1c559056f362f1e43b712","sha256:f6655d551456c800c6b9dc7791899a7b84ba84741a04229953e2db06ec0d6a52"],"state_sha256":"3c8f8e50c01db4b55d45a86fd54e7171525323d42325b04764f8519e04c29127"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hTa7hhHi5ZrcbPKGeeMdCCkFHSpCzRQ/w13+0omn/rrxWplqNpiPQax0A9bLmciTu/ze/iRgk1xe2zAqCKwBBg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T22:24:39.513188Z","bundle_sha256":"c5981b0cee24d20f2a478515e45625c63678ab87fb16a0e5d14cfbf2bcb3f25b"}}