{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2025:ZR6W7NJEUJL6CHT2LPUNET56S2","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"0d40b1be8a0592e73e42d3f416b7799968cb050a5d4df263c3204722c96636e5","cross_cats_sorted":["cs.CR","math.IT"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2025-10-15T15:19:59Z","title_canon_sha256":"3aa4cd5990a0917304dc055761b3f0baba4faf66cd5c430ded2575cf8fdbd46d"},"schema_version":"1.0","source":{"id":"2510.13661","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2510.13661","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"arxiv_version","alias_value":"2510.13661v2","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2510.13661","created_at":"2026-05-18T02:44:33Z"},{"alias_kind":"pith_short_12","alias_value":"ZR6W7NJEUJL6","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"ZR6W7NJEUJL6CHT2","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"ZR6W7NJE","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:d353215fad03702252fc523a4df5b51b98c9cfd03cb0828e3958fbbb9f155bf6","target":"graph","created_at":"2026-05-18T02:44:33Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This paper introduces a methodology based on Euclidean information theory to investigate local properties of secure communication over discrete memoryless wiretap channels. We formulate a constrained optimization problem that maximizes a legitimate user's information rate while imposing explicit upper bounds on both the information leakage to an eavesdropper and the informational cost of encoding the secret message. By leveraging local geometric approximations, this inherently non-convex problem is transformed into a tractable quadratic programming structure. It is demonstrated that the optima","authors_text":"Emmanouil M.Athanasakos, Hariprasad Manjunath, Nicholas Kalouptsidis","cross_cats":["cs.CR","math.IT"],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2025-10-15T15:19:59Z","title":"Local Information-Theoretic Security via Euclidean Geometry"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2510.13661","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:db19adb8dab54c1f0719f68892a75e6f86c06013d99c71bfef0803fe4f8d0235","target":"record","created_at":"2026-05-18T02:44:33Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"0d40b1be8a0592e73e42d3f416b7799968cb050a5d4df263c3204722c96636e5","cross_cats_sorted":["cs.CR","math.IT"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.IT","submitted_at":"2025-10-15T15:19:59Z","title_canon_sha256":"3aa4cd5990a0917304dc055761b3f0baba4faf66cd5c430ded2575cf8fdbd46d"},"schema_version":"1.0","source":{"id":"2510.13661","kind":"arxiv","version":2}},"canonical_sha256":"cc7d6fb524a257e11e7a5be8d24fbe96a58b17722a8ab55f8c00c59b3d3f4544","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"cc7d6fb524a257e11e7a5be8d24fbe96a58b17722a8ab55f8c00c59b3d3f4544","first_computed_at":"2026-05-18T02:44:33.070228Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:44:33.070228Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"n5MJZsNxoBZBDaDLcCGucrdP+tQW7IP49VgY4ce2rEwnHb/RKl9J/1wwTTbhKTFFRN+JVKPUmDr0z8wQ7p5SBg==","signature_status":"signed_v1","signed_at":"2026-05-18T02:44:33.070704Z","signed_message":"canonical_sha256_bytes"},"source_id":"2510.13661","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:db19adb8dab54c1f0719f68892a75e6f86c06013d99c71bfef0803fe4f8d0235","sha256:d353215fad03702252fc523a4df5b51b98c9cfd03cb0828e3958fbbb9f155bf6"],"state_sha256":"393850bc07635ac6ca7f5b1fecf5560c87d9e806446c945a00828ffa31abcee0"}