{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:YI7YOR66PQFTVUZI6ZU74AGQ7P","short_pith_number":"pith:YI7YOR66","canonical_record":{"source":{"id":"1812.05638","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-13T19:16:15Z","cross_cats_sorted":[],"title_canon_sha256":"58c24bde54323882c4b8f502c97078a3ee90d8b97026aca53ad22b273621fc93","abstract_canon_sha256":"077e74dfdaefaf364397707cba632168ecdbf8bd65a00ccd34cb89106a0ff29c"},"schema_version":"1.0"},"canonical_sha256":"c23f8747de7c0b3ad328f669fe00d0fbeb5aac8c5360d485162d4ffe84f5d6b9","source":{"kind":"arxiv","id":"1812.05638","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1812.05638","created_at":"2026-05-17T23:56:12Z"},{"alias_kind":"arxiv_version","alias_value":"1812.05638v2","created_at":"2026-05-17T23:56:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1812.05638","created_at":"2026-05-17T23:56:12Z"},{"alias_kind":"pith_short_12","alias_value":"YI7YOR66PQFT","created_at":"2026-05-18T12:33:04Z"},{"alias_kind":"pith_short_16","alias_value":"YI7YOR66PQFTVUZI","created_at":"2026-05-18T12:33:04Z"},{"alias_kind":"pith_short_8","alias_value":"YI7YOR66","created_at":"2026-05-18T12:33:04Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:YI7YOR66PQFTVUZI6ZU74AGQ7P","target":"record","payload":{"canonical_record":{"source":{"id":"1812.05638","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-13T19:16:15Z","cross_cats_sorted":[],"title_canon_sha256":"58c24bde54323882c4b8f502c97078a3ee90d8b97026aca53ad22b273621fc93","abstract_canon_sha256":"077e74dfdaefaf364397707cba632168ecdbf8bd65a00ccd34cb89106a0ff29c"},"schema_version":"1.0"},"canonical_sha256":"c23f8747de7c0b3ad328f669fe00d0fbeb5aac8c5360d485162d4ffe84f5d6b9","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:56:12.438058Z","signature_b64":"xORkVoucPhOX/F1/VTTzISPuduBsvMAYPN7IPooJpe172XJlaDO1rVGcGV+MEfc/nNJl/Tc/ra5hMvzyXG8eAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c23f8747de7c0b3ad328f669fe00d0fbeb5aac8c5360d485162d4ffe84f5d6b9","last_reissued_at":"2026-05-17T23:56:12.437490Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:56:12.437490Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1812.05638","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"oUL0BuxjVorClF28/vmjZkxMQxiXd5uTzI8oAJq9A4jX4H+UcYu21wj+5p/y0I26J0i+iTAC8xiAPzgtfZTHDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T14:52:35.679390Z"},"content_sha256":"f1031e5caab322da2a6430c66c9378e7d6ebd1ba532005ad350fa0762a3aaa62","schema_version":"1.0","event_id":"sha256:f1031e5caab322da2a6430c66c9378e7d6ebd1ba532005ad350fa0762a3aaa62"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:YI7YOR66PQFTVUZI6ZU74AGQ7P","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"On Privacy Notions in Anonymous Communication","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Christiane Kuhn, Eduard Jorswieck, Martin Beck, Stefan Schiffner, Thorsten Strufe","submitted_at":"2018-12-13T19:16:15Z","abstract_excerpt":"Many anonymous communication networks (ACNs) with different privacy goals have been developed. However, there are no accepted formal definitions of privacy and ACNs often define their goals and adversary models ad hoc. However, for the understanding and comparison of different flavors of privacy, a common foundation is needed. In this paper, we introduce an analysis framework for ACNs that captures the notions and assumptions known from different analysis frameworks. Therefore, we formalize privacy goals as notions and identify their building blocks. For any pair of notions we prove whether on"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.05638","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5ZTNMrhHsLRIcQnSwJ/6EiFa0TWUv0EuYui/LZpNv8jXgI+W52k9n6I4x63Yf4+fRHFIyhD/RENFaxef6DOVCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T14:52:35.680046Z"},"content_sha256":"d1a7de66160e9fe158f42c6fd05518a5c0ae87b7f51c53bb8d98640eb082fc3a","schema_version":"1.0","event_id":"sha256:d1a7de66160e9fe158f42c6fd05518a5c0ae87b7f51c53bb8d98640eb082fc3a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/YI7YOR66PQFTVUZI6ZU74AGQ7P/bundle.json","state_url":"https://pith.science/pith/YI7YOR66PQFTVUZI6ZU74AGQ7P/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/YI7YOR66PQFTVUZI6ZU74AGQ7P/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T14:52:35Z","links":{"resolver":"https://pith.science/pith/YI7YOR66PQFTVUZI6ZU74AGQ7P","bundle":"https://pith.science/pith/YI7YOR66PQFTVUZI6ZU74AGQ7P/bundle.json","state":"https://pith.science/pith/YI7YOR66PQFTVUZI6ZU74AGQ7P/state.json","well_known_bundle":"https://pith.science/.well-known/pith/YI7YOR66PQFTVUZI6ZU74AGQ7P/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:YI7YOR66PQFTVUZI6ZU74AGQ7P","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"077e74dfdaefaf364397707cba632168ecdbf8bd65a00ccd34cb89106a0ff29c","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-13T19:16:15Z","title_canon_sha256":"58c24bde54323882c4b8f502c97078a3ee90d8b97026aca53ad22b273621fc93"},"schema_version":"1.0","source":{"id":"1812.05638","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1812.05638","created_at":"2026-05-17T23:56:12Z"},{"alias_kind":"arxiv_version","alias_value":"1812.05638v2","created_at":"2026-05-17T23:56:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1812.05638","created_at":"2026-05-17T23:56:12Z"},{"alias_kind":"pith_short_12","alias_value":"YI7YOR66PQFT","created_at":"2026-05-18T12:33:04Z"},{"alias_kind":"pith_short_16","alias_value":"YI7YOR66PQFTVUZI","created_at":"2026-05-18T12:33:04Z"},{"alias_kind":"pith_short_8","alias_value":"YI7YOR66","created_at":"2026-05-18T12:33:04Z"}],"graph_snapshots":[{"event_id":"sha256:d1a7de66160e9fe158f42c6fd05518a5c0ae87b7f51c53bb8d98640eb082fc3a","target":"graph","created_at":"2026-05-17T23:56:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Many anonymous communication networks (ACNs) with different privacy goals have been developed. However, there are no accepted formal definitions of privacy and ACNs often define their goals and adversary models ad hoc. However, for the understanding and comparison of different flavors of privacy, a common foundation is needed. In this paper, we introduce an analysis framework for ACNs that captures the notions and assumptions known from different analysis frameworks. Therefore, we formalize privacy goals as notions and identify their building blocks. For any pair of notions we prove whether on","authors_text":"Christiane Kuhn, Eduard Jorswieck, Martin Beck, Stefan Schiffner, Thorsten Strufe","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-13T19:16:15Z","title":"On Privacy Notions in Anonymous Communication"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.05638","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:f1031e5caab322da2a6430c66c9378e7d6ebd1ba532005ad350fa0762a3aaa62","target":"record","created_at":"2026-05-17T23:56:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"077e74dfdaefaf364397707cba632168ecdbf8bd65a00ccd34cb89106a0ff29c","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-12-13T19:16:15Z","title_canon_sha256":"58c24bde54323882c4b8f502c97078a3ee90d8b97026aca53ad22b273621fc93"},"schema_version":"1.0","source":{"id":"1812.05638","kind":"arxiv","version":2}},"canonical_sha256":"c23f8747de7c0b3ad328f669fe00d0fbeb5aac8c5360d485162d4ffe84f5d6b9","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c23f8747de7c0b3ad328f669fe00d0fbeb5aac8c5360d485162d4ffe84f5d6b9","first_computed_at":"2026-05-17T23:56:12.437490Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:56:12.437490Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"xORkVoucPhOX/F1/VTTzISPuduBsvMAYPN7IPooJpe172XJlaDO1rVGcGV+MEfc/nNJl/Tc/ra5hMvzyXG8eAg==","signature_status":"signed_v1","signed_at":"2026-05-17T23:56:12.438058Z","signed_message":"canonical_sha256_bytes"},"source_id":"1812.05638","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:f1031e5caab322da2a6430c66c9378e7d6ebd1ba532005ad350fa0762a3aaa62","sha256:d1a7de66160e9fe158f42c6fd05518a5c0ae87b7f51c53bb8d98640eb082fc3a"],"state_sha256":"17d844a6d4cbf93684a0095bfb84e0aa7bea392600f18f1c59e9a1e144baece2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"GBe8vX8gZ4B3i4KSMzFeUKVSr7GA8MGXCaQbQraRZ2m/h0f52h2CY7lVUJ6XUv15BuKU7gK/boXphrosD47bCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T14:52:35.683704Z","bundle_sha256":"34ae66f8a02d69083c53163dc2dce4ec566c291b1cdecf89a2f08febc2ca45fa"}}