# BCV3 Decryption Guide ## Overview The BCV3 dataset includes encrypted question-answer pairs to protect intellectual property while allowing community review. This guide explains how to decrypt them. ## Encryption Details - **Algorithm**: AES-256-GCM (Galois/Counter Mode) - **Key Derivation**: SHA-256 hash of the passphrase - **IV Format**: 16-byte random initialization vector (base64-encoded) - **Authentication**: 16-byte GCM tag for integrity verification ## Key Use the following passphrase to derive the AES-256-GCM key: ``` A_Visual_Vertical_Verifiable_Benchmark_for_Multimodal_Browsing_Agents ``` ## Data Format The dataset uses **one canonical format: `train.jsonl`** (optimized and deduplicated): ```json { "id": "...", "category": "...", "sub_category": "...", "image": "...", "image_paths": "[...JSON string...]", "encrypted_question": "{...JSON string...}", "encrypted_answer": "{...JSON string...}", "metadata": "{...JSON string (includes trajectory)...}", "sub_goals": "[...JSON string...]" } ``` **Key optimizations:** - ✓ **No redundant trajectory**: trajectory is inside `metadata`, not duplicated at top level - ✓ **JSON strings**: All fields are serialized as JSON for HuggingFace Dataset Viewer compatibility - ✓ **Space savings**: 28.1% reduction from original (2.0 MB → 1.44 MB) **Legacy format:** The original `bcv3_encrypted.jsonl` (with redundant top-level trajectory) is archived in `/archive/` for reference only. ## Requirements ```bash pip install cryptography ``` ## Usage ### 1. Decrypt the whole dataset to a single JSON file ```bash python scripts/decryption_script.py \ --input data/train.jsonl \ --key "A_Visual_Vertical_Verifiable_Benchmark_for_Multimodal_Browsing_Agents" \ --output decrypted_bcv3.json ``` **Options:** - `--keep-encrypted`: Keep encrypted fields in output (default: remove them) **Example output:** ```json [ { "id": "001_Culture_Art_L3_p2_t2_m0_r2_w0_c0_g5", "question": "The content in Figure 1 is a classic of a certain religion...", "answer": "2", "metadata": {...}, ... } ] ``` ### 2. Batch decrypt to per-sample JSON files ```bash # Create a key file echo "A_Visual_Vertical_Verifiable_Benchmark_for_Multimodal_Browsing_Agents" > key.txt # Run batch decryption python scripts/decrypt_batch.py \ --input data/train.jsonl \ --key-file key.txt \ --output-dir decrypted_samples/ ``` **Options:** - `--keep-encrypted`: Keep encrypted fields in output (default: remove them) **Output structure:** ``` decrypted_samples/ ├── 001_Culture_Art_L3_p2_t2_m0_r2_w0_c0_g5.json ├── 002_Culture_Art_...json └── ... ``` ### 3. Using archived legacy format (optional) If you need to work with the archived original format: ```bash # Scripts support legacy bcv3_encrypted.jsonl (archived in /archive/) python scripts/decryption_script.py \ --input ../archive/bcv3_encrypted.jsonl \ --key "A_Visual_Vertical_Verifiable_Benchmark_for_Multimodal_Browsing_Agents" \ --output decrypted_legacy.json ``` The scripts automatically detect and handle both formats. ## Python API ```python from encryption_utils import derive_key, decrypt_text key_str = "A_Visual_Vertical_Verifiable_Benchmark_for_Multimodal_Browsing_Agents" key = derive_key(key_str) # Decrypt a single encrypted field (dict with iv/ciphertext/tag) encrypted_dict = { "iv": "...", "ciphertext": "...", "tag": "..." } plaintext = decrypt_text(encrypted_dict, key) ``` ## Verification Test decryption with a small sample: ```bash head -1 data/train.jsonl | python3 << 'EOF' import sys import json sys.path.insert(0, 'scripts') from encryption_utils import derive_key, decrypt_text key = derive_key("A_Visual_Vertical_Verifiable_Benchmark_for_Multimodal_Browsing_Agents") obj = json.loads(sys.stdin.read()) enc_q = json.loads(obj['encrypted_question']) enc_a = json.loads(obj['encrypted_answer']) print("Question:", decrypt_text(enc_q, key)[:80]) print("Answer:", decrypt_text(enc_a, key)) EOF ``` ## Troubleshooting ### "Decryption failed" or integrity error - Verify you're using the exact passphrase (case-sensitive) - Ensure the encrypted data has valid iv/ciphertext/tag fields ### "Unrecognized format" warning - The script will skip records that don't have encrypted fields - Check that your input file is in the expected format ### File not found - Ensure paths are relative to the script directory or use absolute paths - For batch mode, the key file must exist and be readable ## Questions? For issues or questions about decryption, please refer to the main README or file an issue on the repository.