{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2014:I2HOAC4GHWM4KOOYMGDNVFVTNA","short_pith_number":"pith:I2HOAC4G","schema_version":"1.0","canonical_sha256":"468ee00b863d99c539d86186da96b368128a1810476f5b5942915007d855a03c","source":{"kind":"arxiv","id":"1409.2061","version":1},"attestation_state":"computed","paper":{"title":"Quantum Key Distribution without sending a Quantum Signal","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"N. Walk, T.C. Ralph","submitted_at":"2014-09-06T21:47:32Z","abstract_excerpt":"Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. Whilst this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is consider"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1409.2061","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2014-09-06T21:47:32Z","cross_cats_sorted":[],"title_canon_sha256":"d3df0502bea5199b8b2a23321318c399ee3754cb4c24fa38a6824d77cec41aac","abstract_canon_sha256":"71a9aeadedc661f109072158b37d5a76506a29da738cd2d8c850ffc6ba80c3c9"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:43:18.001605Z","signature_b64":"sP7UBbL1xm0GcRGcCP0P85iE3UvIKdwdw4OuhZnPxrIPzgRXgqEgQse5mhumvRqnj4MaCmgIvbioFsVOFpRHDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"468ee00b863d99c539d86186da96b368128a1810476f5b5942915007d855a03c","last_reissued_at":"2026-05-18T02:43:18.001149Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:43:18.001149Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Quantum Key Distribution without sending a Quantum Signal","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"N. Walk, T.C. Ralph","submitted_at":"2014-09-06T21:47:32Z","abstract_excerpt":"Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. Whilst this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is consider"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1409.2061","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1409.2061","created_at":"2026-05-18T02:43:18.001218+00:00"},{"alias_kind":"arxiv_version","alias_value":"1409.2061v1","created_at":"2026-05-18T02:43:18.001218+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1409.2061","created_at":"2026-05-18T02:43:18.001218+00:00"},{"alias_kind":"pith_short_12","alias_value":"I2HOAC4GHWM4","created_at":"2026-05-18T12:28:33.132498+00:00"},{"alias_kind":"pith_short_16","alias_value":"I2HOAC4GHWM4KOOY","created_at":"2026-05-18T12:28:33.132498+00:00"},{"alias_kind":"pith_short_8","alias_value":"I2HOAC4G","created_at":"2026-05-18T12:28:33.132498+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA","json":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA.json","graph_json":"https://pith.science/api/pith-number/I2HOAC4GHWM4KOOYMGDNVFVTNA/graph.json","events_json":"https://pith.science/api/pith-number/I2HOAC4GHWM4KOOYMGDNVFVTNA/events.json","paper":"https://pith.science/paper/I2HOAC4G"},"agent_actions":{"view_html":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA","download_json":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA.json","view_paper":"https://pith.science/paper/I2HOAC4G","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1409.2061&json=true","fetch_graph":"https://pith.science/api/pith-number/I2HOAC4GHWM4KOOYMGDNVFVTNA/graph.json","fetch_events":"https://pith.science/api/pith-number/I2HOAC4GHWM4KOOYMGDNVFVTNA/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA/action/timestamp_anchor","attest_storage":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA/action/storage_attestation","attest_author":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA/action/author_attestation","sign_citation":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA/action/citation_signature","submit_replication":"https://pith.science/pith/I2HOAC4GHWM4KOOYMGDNVFVTNA/action/replication_record"}},"created_at":"2026-05-18T02:43:18.001218+00:00","updated_at":"2026-05-18T02:43:18.001218+00:00"}