{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2016:HSKVRMXRQ4CPDXJXVJXZEMEWNG","short_pith_number":"pith:HSKVRMXR","schema_version":"1.0","canonical_sha256":"3c9558b2f18704f1dd37aa6f923096699d9f9af2b4d7a97e69e686c7481f7193","source":{"kind":"arxiv","id":"1610.01907","version":2},"attestation_state":"computed","paper":{"title":"Entanglement generation secure against general attacks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Alexander Pirker, Hans J. Briegel, Vedran Dunjko, Wolfgang D\\\"ur","submitted_at":"2016-10-06T15:16:40Z","abstract_excerpt":"We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the ea"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1610.01907","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-10-06T15:16:40Z","cross_cats_sorted":[],"title_canon_sha256":"ca9d2ae42bf771191334f061a0cd9f15a07718b6e9c429207c2bc0eae5023b11","abstract_canon_sha256":"f9a712bf19d6fd71e77466bf0df5ef076eede73e418975eabffc5f724ca12116"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:30:22.518502Z","signature_b64":"1JoHpw1oeLYiFN3oRjmhYGshHnD7PeVlA4x0Vt+But6qyE89KuAvqrXQM+gy+GkANWXyg+4SlBirBDLBUDtsDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3c9558b2f18704f1dd37aa6f923096699d9f9af2b4d7a97e69e686c7481f7193","last_reissued_at":"2026-05-18T00:30:22.517810Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:30:22.517810Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Entanglement generation secure against general attacks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Alexander Pirker, Hans J. Briegel, Vedran Dunjko, Wolfgang D\\\"ur","submitted_at":"2016-10-06T15:16:40Z","abstract_excerpt":"We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the ea"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.01907","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1610.01907","created_at":"2026-05-18T00:30:22.517955+00:00"},{"alias_kind":"arxiv_version","alias_value":"1610.01907v2","created_at":"2026-05-18T00:30:22.517955+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.01907","created_at":"2026-05-18T00:30:22.517955+00:00"},{"alias_kind":"pith_short_12","alias_value":"HSKVRMXRQ4CP","created_at":"2026-05-18T12:30:22.444734+00:00"},{"alias_kind":"pith_short_16","alias_value":"HSKVRMXRQ4CPDXJX","created_at":"2026-05-18T12:30:22.444734+00:00"},{"alias_kind":"pith_short_8","alias_value":"HSKVRMXR","created_at":"2026-05-18T12:30:22.444734+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG","json":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG.json","graph_json":"https://pith.science/api/pith-number/HSKVRMXRQ4CPDXJXVJXZEMEWNG/graph.json","events_json":"https://pith.science/api/pith-number/HSKVRMXRQ4CPDXJXVJXZEMEWNG/events.json","paper":"https://pith.science/paper/HSKVRMXR"},"agent_actions":{"view_html":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG","download_json":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG.json","view_paper":"https://pith.science/paper/HSKVRMXR","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1610.01907&json=true","fetch_graph":"https://pith.science/api/pith-number/HSKVRMXRQ4CPDXJXVJXZEMEWNG/graph.json","fetch_events":"https://pith.science/api/pith-number/HSKVRMXRQ4CPDXJXVJXZEMEWNG/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/action/timestamp_anchor","attest_storage":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/action/storage_attestation","attest_author":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/action/author_attestation","sign_citation":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/action/citation_signature","submit_replication":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/action/replication_record"}},"created_at":"2026-05-18T00:30:22.517955+00:00","updated_at":"2026-05-18T00:30:22.517955+00:00"}