{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:HSKVRMXRQ4CPDXJXVJXZEMEWNG","short_pith_number":"pith:HSKVRMXR","canonical_record":{"source":{"id":"1610.01907","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-10-06T15:16:40Z","cross_cats_sorted":[],"title_canon_sha256":"ca9d2ae42bf771191334f061a0cd9f15a07718b6e9c429207c2bc0eae5023b11","abstract_canon_sha256":"f9a712bf19d6fd71e77466bf0df5ef076eede73e418975eabffc5f724ca12116"},"schema_version":"1.0"},"canonical_sha256":"3c9558b2f18704f1dd37aa6f923096699d9f9af2b4d7a97e69e686c7481f7193","source":{"kind":"arxiv","id":"1610.01907","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1610.01907","created_at":"2026-05-18T00:30:22Z"},{"alias_kind":"arxiv_version","alias_value":"1610.01907v2","created_at":"2026-05-18T00:30:22Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.01907","created_at":"2026-05-18T00:30:22Z"},{"alias_kind":"pith_short_12","alias_value":"HSKVRMXRQ4CP","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_16","alias_value":"HSKVRMXRQ4CPDXJX","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_8","alias_value":"HSKVRMXR","created_at":"2026-05-18T12:30:22Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:HSKVRMXRQ4CPDXJXVJXZEMEWNG","target":"record","payload":{"canonical_record":{"source":{"id":"1610.01907","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-10-06T15:16:40Z","cross_cats_sorted":[],"title_canon_sha256":"ca9d2ae42bf771191334f061a0cd9f15a07718b6e9c429207c2bc0eae5023b11","abstract_canon_sha256":"f9a712bf19d6fd71e77466bf0df5ef076eede73e418975eabffc5f724ca12116"},"schema_version":"1.0"},"canonical_sha256":"3c9558b2f18704f1dd37aa6f923096699d9f9af2b4d7a97e69e686c7481f7193","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:30:22.518502Z","signature_b64":"1JoHpw1oeLYiFN3oRjmhYGshHnD7PeVlA4x0Vt+But6qyE89KuAvqrXQM+gy+GkANWXyg+4SlBirBDLBUDtsDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"3c9558b2f18704f1dd37aa6f923096699d9f9af2b4d7a97e69e686c7481f7193","last_reissued_at":"2026-05-18T00:30:22.517810Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:30:22.517810Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1610.01907","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:30:22Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"emzWYFl5km1//atuPgtgghR5TlUQfdeF614gECporki9HIHM350SWHofW1ZU9BoxmkIjfZiGdezZQTTRMJ24AQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T11:35:01.375674Z"},"content_sha256":"ec84235de855bf729e884f3c7a3a760bc441490173fcd12c472baea8b655b927","schema_version":"1.0","event_id":"sha256:ec84235de855bf729e884f3c7a3a760bc441490173fcd12c472baea8b655b927"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:HSKVRMXRQ4CPDXJXVJXZEMEWNG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Entanglement generation secure against general attacks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Alexander Pirker, Hans J. Briegel, Vedran Dunjko, Wolfgang D\\\"ur","submitted_at":"2016-10-06T15:16:40Z","abstract_excerpt":"We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the ea"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.01907","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:30:22Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"SM3UUp5oZKN8PQBp9JqmS4aurDMaKVoBF/dBFyOX8tIp7VB6/U9tFJo29sYhfPrwcdqxEF8kXALRdKaQmNwMCQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T11:35:01.376336Z"},"content_sha256":"ece2480b1b19e1ef0f69b828f643007438854189c2490a5ae77a6a2503273300","schema_version":"1.0","event_id":"sha256:ece2480b1b19e1ef0f69b828f643007438854189c2490a5ae77a6a2503273300"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/bundle.json","state_url":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T11:35:01Z","links":{"resolver":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG","bundle":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/bundle.json","state":"https://pith.science/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/HSKVRMXRQ4CPDXJXVJXZEMEWNG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:HSKVRMXRQ4CPDXJXVJXZEMEWNG","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f9a712bf19d6fd71e77466bf0df5ef076eede73e418975eabffc5f724ca12116","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-10-06T15:16:40Z","title_canon_sha256":"ca9d2ae42bf771191334f061a0cd9f15a07718b6e9c429207c2bc0eae5023b11"},"schema_version":"1.0","source":{"id":"1610.01907","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1610.01907","created_at":"2026-05-18T00:30:22Z"},{"alias_kind":"arxiv_version","alias_value":"1610.01907v2","created_at":"2026-05-18T00:30:22Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1610.01907","created_at":"2026-05-18T00:30:22Z"},{"alias_kind":"pith_short_12","alias_value":"HSKVRMXRQ4CP","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_16","alias_value":"HSKVRMXRQ4CPDXJX","created_at":"2026-05-18T12:30:22Z"},{"alias_kind":"pith_short_8","alias_value":"HSKVRMXR","created_at":"2026-05-18T12:30:22Z"}],"graph_snapshots":[{"event_id":"sha256:ece2480b1b19e1ef0f69b828f643007438854189c2490a5ae77a6a2503273300","target":"graph","created_at":"2026-05-18T00:30:22Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the ea","authors_text":"Alexander Pirker, Hans J. Briegel, Vedran Dunjko, Wolfgang D\\\"ur","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-10-06T15:16:40Z","title":"Entanglement generation secure against general attacks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1610.01907","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ec84235de855bf729e884f3c7a3a760bc441490173fcd12c472baea8b655b927","target":"record","created_at":"2026-05-18T00:30:22Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f9a712bf19d6fd71e77466bf0df5ef076eede73e418975eabffc5f724ca12116","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-10-06T15:16:40Z","title_canon_sha256":"ca9d2ae42bf771191334f061a0cd9f15a07718b6e9c429207c2bc0eae5023b11"},"schema_version":"1.0","source":{"id":"1610.01907","kind":"arxiv","version":2}},"canonical_sha256":"3c9558b2f18704f1dd37aa6f923096699d9f9af2b4d7a97e69e686c7481f7193","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"3c9558b2f18704f1dd37aa6f923096699d9f9af2b4d7a97e69e686c7481f7193","first_computed_at":"2026-05-18T00:30:22.517810Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:30:22.517810Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"1JoHpw1oeLYiFN3oRjmhYGshHnD7PeVlA4x0Vt+But6qyE89KuAvqrXQM+gy+GkANWXyg+4SlBirBDLBUDtsDw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:30:22.518502Z","signed_message":"canonical_sha256_bytes"},"source_id":"1610.01907","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ec84235de855bf729e884f3c7a3a760bc441490173fcd12c472baea8b655b927","sha256:ece2480b1b19e1ef0f69b828f643007438854189c2490a5ae77a6a2503273300"],"state_sha256":"50a776a41a21dfc1f5e3a180a2d9a671405a97127be7f933a913ad330707aeb8"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XLeXs57XwT3n6acoJizLNsg2pdu05x/1NKblXeBtV5mN0l6MiHYLkqPRNmLDFJ9NdjBkxd9hmtVENd3ix5noDg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T11:35:01.379335Z","bundle_sha256":"a0dd87e49f128b33a6d370589b620965e2a25e3a7c99927805c07a6275a547ff"}}