{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2012:257VYH76IXDKS7TNJ7UE6QIA3W","short_pith_number":"pith:257VYH76","canonical_record":{"source":{"id":"1205.2187","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-05-10T08:14:08Z","cross_cats_sorted":["cs.LO"],"title_canon_sha256":"51b4e940e9766a1a3bab05f8f549eb959801d8a87dcf3b03b3dca76eaf1ebbd3","abstract_canon_sha256":"9efaef2f8552e07e7dea825b998c495294f6b62d7096df4593273793b8f30d2c"},"schema_version":"1.0"},"canonical_sha256":"d77f5c1ffe45c6a97e6d4fe84f4100dda908906e2a9e93a06ef42de8c6e34536","source":{"kind":"arxiv","id":"1205.2187","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1205.2187","created_at":"2026-05-18T03:07:12Z"},{"alias_kind":"arxiv_version","alias_value":"1205.2187v2","created_at":"2026-05-18T03:07:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1205.2187","created_at":"2026-05-18T03:07:12Z"},{"alias_kind":"pith_short_12","alias_value":"257VYH76IXDK","created_at":"2026-05-18T12:26:50Z"},{"alias_kind":"pith_short_16","alias_value":"257VYH76IXDKS7TN","created_at":"2026-05-18T12:26:50Z"},{"alias_kind":"pith_short_8","alias_value":"257VYH76","created_at":"2026-05-18T12:26:50Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2012:257VYH76IXDKS7TNJ7UE6QIA3W","target":"record","payload":{"canonical_record":{"source":{"id":"1205.2187","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-05-10T08:14:08Z","cross_cats_sorted":["cs.LO"],"title_canon_sha256":"51b4e940e9766a1a3bab05f8f549eb959801d8a87dcf3b03b3dca76eaf1ebbd3","abstract_canon_sha256":"9efaef2f8552e07e7dea825b998c495294f6b62d7096df4593273793b8f30d2c"},"schema_version":"1.0"},"canonical_sha256":"d77f5c1ffe45c6a97e6d4fe84f4100dda908906e2a9e93a06ef42de8c6e34536","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:07:12.372595Z","signature_b64":"VcWLZVKUllHUnsHixN5/MrKzOAloF+wP3MYs0D7fun8Pcz+3jiMgaA49LlJm9v5tVmB0EsEMILzv+p6tKP19AA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"d77f5c1ffe45c6a97e6d4fe84f4100dda908906e2a9e93a06ef42de8c6e34536","last_reissued_at":"2026-05-18T03:07:12.372001Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:07:12.372001Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1205.2187","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:07:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wtnXFt9BKI6jIPmPCADpiTEFkfNlLmcaiJtn9Q5ZnMi7NQ6pE8jrt9VVG0ls1Mlv1DmhCivIulNSwCP1jz1kAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T15:03:42.305224Z"},"content_sha256":"6787bcb4e8cea5d146a3bc355f48be1b714736296bc264d69b29b167d387a96e","schema_version":"1.0","event_id":"sha256:6787bcb4e8cea5d146a3bc355f48be1b714736296bc264d69b29b167d387a96e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2012:257VYH76IXDKS7TNJ7UE6QIA3W","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Model checking quantum Markov chains","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LO"],"primary_cat":"quant-ph","authors_text":"Mingsheng Ying, Nengkun Yu, Yuan Feng","submitted_at":"2012-05-10T08:14:08Z","abstract_excerpt":"Although the security of quantum cryptography is provable based on the principles of quantum mechanics, it can be compromised by the flaws in the design of quantum protocols and the noise in their physical implementations. So, it is indispensable to develop techniques of verifying and debugging quantum cryptographic systems. Model-checking has proved to be effective in the verification of classical cryptographic protocols, but an essential difficulty arises when it is applied to quantum systems: the state space of a quantum system is always a continuum even when its dimension is finite. To ove"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1205.2187","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:07:12Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XG7h8ExmkEW/YDyUuzZxvNrlbKAkPGNa2wU7gduXkt/rnUxaI4GG96NFt7HkQtTg+QWIwuFKKR6oPlmPcOjLDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T15:03:42.305920Z"},"content_sha256":"da241a2694617f38038bf9b7e2e086e52ee6954ce851f94dd930f72b0045eacc","schema_version":"1.0","event_id":"sha256:da241a2694617f38038bf9b7e2e086e52ee6954ce851f94dd930f72b0045eacc"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/257VYH76IXDKS7TNJ7UE6QIA3W/bundle.json","state_url":"https://pith.science/pith/257VYH76IXDKS7TNJ7UE6QIA3W/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/257VYH76IXDKS7TNJ7UE6QIA3W/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T15:03:42Z","links":{"resolver":"https://pith.science/pith/257VYH76IXDKS7TNJ7UE6QIA3W","bundle":"https://pith.science/pith/257VYH76IXDKS7TNJ7UE6QIA3W/bundle.json","state":"https://pith.science/pith/257VYH76IXDKS7TNJ7UE6QIA3W/state.json","well_known_bundle":"https://pith.science/.well-known/pith/257VYH76IXDKS7TNJ7UE6QIA3W/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2012:257VYH76IXDKS7TNJ7UE6QIA3W","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9efaef2f8552e07e7dea825b998c495294f6b62d7096df4593273793b8f30d2c","cross_cats_sorted":["cs.LO"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-05-10T08:14:08Z","title_canon_sha256":"51b4e940e9766a1a3bab05f8f549eb959801d8a87dcf3b03b3dca76eaf1ebbd3"},"schema_version":"1.0","source":{"id":"1205.2187","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1205.2187","created_at":"2026-05-18T03:07:12Z"},{"alias_kind":"arxiv_version","alias_value":"1205.2187v2","created_at":"2026-05-18T03:07:12Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1205.2187","created_at":"2026-05-18T03:07:12Z"},{"alias_kind":"pith_short_12","alias_value":"257VYH76IXDK","created_at":"2026-05-18T12:26:50Z"},{"alias_kind":"pith_short_16","alias_value":"257VYH76IXDKS7TN","created_at":"2026-05-18T12:26:50Z"},{"alias_kind":"pith_short_8","alias_value":"257VYH76","created_at":"2026-05-18T12:26:50Z"}],"graph_snapshots":[{"event_id":"sha256:da241a2694617f38038bf9b7e2e086e52ee6954ce851f94dd930f72b0045eacc","target":"graph","created_at":"2026-05-18T03:07:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Although the security of quantum cryptography is provable based on the principles of quantum mechanics, it can be compromised by the flaws in the design of quantum protocols and the noise in their physical implementations. So, it is indispensable to develop techniques of verifying and debugging quantum cryptographic systems. Model-checking has proved to be effective in the verification of classical cryptographic protocols, but an essential difficulty arises when it is applied to quantum systems: the state space of a quantum system is always a continuum even when its dimension is finite. To ove","authors_text":"Mingsheng Ying, Nengkun Yu, Yuan Feng","cross_cats":["cs.LO"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-05-10T08:14:08Z","title":"Model checking quantum Markov chains"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1205.2187","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:6787bcb4e8cea5d146a3bc355f48be1b714736296bc264d69b29b167d387a96e","target":"record","created_at":"2026-05-18T03:07:12Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9efaef2f8552e07e7dea825b998c495294f6b62d7096df4593273793b8f30d2c","cross_cats_sorted":["cs.LO"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-05-10T08:14:08Z","title_canon_sha256":"51b4e940e9766a1a3bab05f8f549eb959801d8a87dcf3b03b3dca76eaf1ebbd3"},"schema_version":"1.0","source":{"id":"1205.2187","kind":"arxiv","version":2}},"canonical_sha256":"d77f5c1ffe45c6a97e6d4fe84f4100dda908906e2a9e93a06ef42de8c6e34536","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"d77f5c1ffe45c6a97e6d4fe84f4100dda908906e2a9e93a06ef42de8c6e34536","first_computed_at":"2026-05-18T03:07:12.372001Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:07:12.372001Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"VcWLZVKUllHUnsHixN5/MrKzOAloF+wP3MYs0D7fun8Pcz+3jiMgaA49LlJm9v5tVmB0EsEMILzv+p6tKP19AA==","signature_status":"signed_v1","signed_at":"2026-05-18T03:07:12.372595Z","signed_message":"canonical_sha256_bytes"},"source_id":"1205.2187","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:6787bcb4e8cea5d146a3bc355f48be1b714736296bc264d69b29b167d387a96e","sha256:da241a2694617f38038bf9b7e2e086e52ee6954ce851f94dd930f72b0045eacc"],"state_sha256":"59f8d3347fdec883c43fc13178711f9258cfc27d4d39356c2a4ea06e1368719a"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"oUNrLboWOcEXPNq51Sf5U9LXlMzuXdVz510MlGQxjVpgzOvHQ5wrtD2veALABcyqTiPYy80oAqbs2OoJbb1CDA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T15:03:42.309140Z","bundle_sha256":"616145cf5f65b401a1f91334d9c95fd73eb754073b0e9f103feff417400a8239"}}