{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:F72MW7SQPSSTQEJJFWLXK6ZDEC","short_pith_number":"pith:F72MW7SQ","canonical_record":{"source":{"id":"1008.2147","kind":"arxiv","version":6},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-12T15:51:55Z","cross_cats_sorted":["cs.CR","cs.IT","math.IT"],"title_canon_sha256":"6b6cae567e98ee3fcfa69c4e9bebaa071609aefe1d84fe9324a99e1f16f61fd8","abstract_canon_sha256":"4d1a7203823be1c9b4dc17ee99add1fb79ed348f9b85594112cf6cbb571d8e88"},"schema_version":"1.0"},"canonical_sha256":"2ff4cb7e507ca53811292d97757b23208b613fa939b28e2595eae7b9b18fa53a","source":{"kind":"arxiv","id":"1008.2147","version":6},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.2147","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"arxiv_version","alias_value":"1008.2147v6","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.2147","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"pith_short_12","alias_value":"F72MW7SQPSST","created_at":"2026-05-18T12:26:06Z"},{"alias_kind":"pith_short_16","alias_value":"F72MW7SQPSSTQEJJ","created_at":"2026-05-18T12:26:06Z"},{"alias_kind":"pith_short_8","alias_value":"F72MW7SQ","created_at":"2026-05-18T12:26:06Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:F72MW7SQPSSTQEJJFWLXK6ZDEC","target":"record","payload":{"canonical_record":{"source":{"id":"1008.2147","kind":"arxiv","version":6},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-12T15:51:55Z","cross_cats_sorted":["cs.CR","cs.IT","math.IT"],"title_canon_sha256":"6b6cae567e98ee3fcfa69c4e9bebaa071609aefe1d84fe9324a99e1f16f61fd8","abstract_canon_sha256":"4d1a7203823be1c9b4dc17ee99add1fb79ed348f9b85594112cf6cbb571d8e88"},"schema_version":"1.0"},"canonical_sha256":"2ff4cb7e507ca53811292d97757b23208b613fa939b28e2595eae7b9b18fa53a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:23:47.904682Z","signature_b64":"RnDIOWE3eyJ6POIs11V/QgNg3rRXawQ52IoLOqxyerHHM1g47bn8Pezu9CK0/YM84Z4TvPy9CzDQOIcojR6MDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"2ff4cb7e507ca53811292d97757b23208b613fa939b28e2595eae7b9b18fa53a","last_reissued_at":"2026-05-18T03:23:47.904195Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:23:47.904195Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1008.2147","source_version":6,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:23:47Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"OB87jLtlN7eqhkfwKwabaQK3czeRkUYV5xjqrqci/I94nbstB152QGNHesjJ086iYOodEIF7Bu3611aCANdGDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T15:16:48.843594Z"},"content_sha256":"777dcfdb911db4d2a30007c5d28d6cbc372edf3f3a7d911e8fc7a0df7d1a43d4","schema_version":"1.0","event_id":"sha256:777dcfdb911db4d2a30007c5d28d6cbc372edf3f3a7d911e8fc7a0df7d1a43d4"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:F72MW7SQPSSTQEJJFWLXK6ZDEC","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.IT","math.IT"],"primary_cat":"quant-ph","authors_text":"Adrian Kent (Centre for Quantum Information, Astronomy, DAMTP, Foundations, Perimeter Institute), School of Physics, Timothy P. Spiller (Quantum Information Science, University of Cambridge, University of Leeds), William J. Munro (NTT Basic Research Laboratories)","submitted_at":"2010-08-12T15:51:55Z","abstract_excerpt":"We define the task of {\\it quantum tagging}, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is unbounded. We define simple security models for this task and briefly discuss alternatives.\n  We illustrate the pitfalls of naive quantum cryptographic reasoning in this context by describing several protocols which at first sight appear unconditionally secure but which, as we show, can in f"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.2147","kind":"arxiv","version":6},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:23:47Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"YzemDg7Fqi4IRGZIgRCMDeVc/TH8Wc3J52IsNAJLlVg3L57xJjGjGlnFqoXvOXy8W9W3QS6ecVft3daGCJyzDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T15:16:48.843952Z"},"content_sha256":"9d9b3eb7298667464b27f7481bd291b0444159199e77858af0db8b613391aa6c","schema_version":"1.0","event_id":"sha256:9d9b3eb7298667464b27f7481bd291b0444159199e77858af0db8b613391aa6c"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/F72MW7SQPSSTQEJJFWLXK6ZDEC/bundle.json","state_url":"https://pith.science/pith/F72MW7SQPSSTQEJJFWLXK6ZDEC/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/F72MW7SQPSSTQEJJFWLXK6ZDEC/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T15:16:48Z","links":{"resolver":"https://pith.science/pith/F72MW7SQPSSTQEJJFWLXK6ZDEC","bundle":"https://pith.science/pith/F72MW7SQPSSTQEJJFWLXK6ZDEC/bundle.json","state":"https://pith.science/pith/F72MW7SQPSSTQEJJFWLXK6ZDEC/state.json","well_known_bundle":"https://pith.science/.well-known/pith/F72MW7SQPSSTQEJJFWLXK6ZDEC/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:F72MW7SQPSSTQEJJFWLXK6ZDEC","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"4d1a7203823be1c9b4dc17ee99add1fb79ed348f9b85594112cf6cbb571d8e88","cross_cats_sorted":["cs.CR","cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-12T15:51:55Z","title_canon_sha256":"6b6cae567e98ee3fcfa69c4e9bebaa071609aefe1d84fe9324a99e1f16f61fd8"},"schema_version":"1.0","source":{"id":"1008.2147","kind":"arxiv","version":6}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.2147","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"arxiv_version","alias_value":"1008.2147v6","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.2147","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"pith_short_12","alias_value":"F72MW7SQPSST","created_at":"2026-05-18T12:26:06Z"},{"alias_kind":"pith_short_16","alias_value":"F72MW7SQPSSTQEJJ","created_at":"2026-05-18T12:26:06Z"},{"alias_kind":"pith_short_8","alias_value":"F72MW7SQ","created_at":"2026-05-18T12:26:06Z"}],"graph_snapshots":[{"event_id":"sha256:9d9b3eb7298667464b27f7481bd291b0444159199e77858af0db8b613391aa6c","target":"graph","created_at":"2026-05-18T03:23:47Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We define the task of {\\it quantum tagging}, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is unbounded. We define simple security models for this task and briefly discuss alternatives.\n  We illustrate the pitfalls of naive quantum cryptographic reasoning in this context by describing several protocols which at first sight appear unconditionally secure but which, as we show, can in f","authors_text":"Adrian Kent (Centre for Quantum Information, Astronomy, DAMTP, Foundations, Perimeter Institute), School of Physics, Timothy P. Spiller (Quantum Information Science, University of Cambridge, University of Leeds), William J. Munro (NTT Basic Research Laboratories)","cross_cats":["cs.CR","cs.IT","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-12T15:51:55Z","title":"Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.2147","kind":"arxiv","version":6},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:777dcfdb911db4d2a30007c5d28d6cbc372edf3f3a7d911e8fc7a0df7d1a43d4","target":"record","created_at":"2026-05-18T03:23:47Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"4d1a7203823be1c9b4dc17ee99add1fb79ed348f9b85594112cf6cbb571d8e88","cross_cats_sorted":["cs.CR","cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-12T15:51:55Z","title_canon_sha256":"6b6cae567e98ee3fcfa69c4e9bebaa071609aefe1d84fe9324a99e1f16f61fd8"},"schema_version":"1.0","source":{"id":"1008.2147","kind":"arxiv","version":6}},"canonical_sha256":"2ff4cb7e507ca53811292d97757b23208b613fa939b28e2595eae7b9b18fa53a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"2ff4cb7e507ca53811292d97757b23208b613fa939b28e2595eae7b9b18fa53a","first_computed_at":"2026-05-18T03:23:47.904195Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:23:47.904195Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"RnDIOWE3eyJ6POIs11V/QgNg3rRXawQ52IoLOqxyerHHM1g47bn8Pezu9CK0/YM84Z4TvPy9CzDQOIcojR6MDw==","signature_status":"signed_v1","signed_at":"2026-05-18T03:23:47.904682Z","signed_message":"canonical_sha256_bytes"},"source_id":"1008.2147","source_kind":"arxiv","source_version":6}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:777dcfdb911db4d2a30007c5d28d6cbc372edf3f3a7d911e8fc7a0df7d1a43d4","sha256:9d9b3eb7298667464b27f7481bd291b0444159199e77858af0db8b613391aa6c"],"state_sha256":"4aa9ee28c85fd50a23040295bb5f9c13ed35c53aeb58a6fee2c8bfb54baaee4f"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"6ZqQVkRq41WohOvPAJX6you6HqDPRCJvW7pemD5R/jJkYZz9jjza1AXu9KdQFR+53/qj9y6uNRW/qfN9BHFaCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T15:16:48.846003Z","bundle_sha256":"357b1a914f9221999061155eb8e13591ddb046ffbe4c5d09aea8b0c930e2f03d"}}