{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2025:IBSRH7N6F4O4W44OROPCZHRMKB","short_pith_number":"pith:IBSRH7N6","canonical_record":{"source":{"id":"2510.16868","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2025-10-19T14:58:20Z","cross_cats_sorted":["physics.optics"],"title_canon_sha256":"a37f7b20f1cc5947edc28bafa097ae401e11d42e5bc448a5aa4dcf1753ec5272","abstract_canon_sha256":"38e35112ec527d683ad709f982d5bce04304912a03ba3ff0d0012bb689f45177"},"schema_version":"1.0"},"canonical_sha256":"406513fdbe2f1dcb738e8b9e2c9e2c50694e6e12e923b0530897ff05574fbf0b","source":{"kind":"arxiv","id":"2510.16868","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2510.16868","created_at":"2026-05-17T23:39:01Z"},{"alias_kind":"arxiv_version","alias_value":"2510.16868v1","created_at":"2026-05-17T23:39:01Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2510.16868","created_at":"2026-05-17T23:39:01Z"},{"alias_kind":"pith_short_12","alias_value":"IBSRH7N6F4O4","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"IBSRH7N6F4O4W44O","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"IBSRH7N6","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2025:IBSRH7N6F4O4W44OROPCZHRMKB","target":"record","payload":{"canonical_record":{"source":{"id":"2510.16868","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2025-10-19T14:58:20Z","cross_cats_sorted":["physics.optics"],"title_canon_sha256":"a37f7b20f1cc5947edc28bafa097ae401e11d42e5bc448a5aa4dcf1753ec5272","abstract_canon_sha256":"38e35112ec527d683ad709f982d5bce04304912a03ba3ff0d0012bb689f45177"},"schema_version":"1.0"},"canonical_sha256":"406513fdbe2f1dcb738e8b9e2c9e2c50694e6e12e923b0530897ff05574fbf0b","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:01.024526Z","signature_b64":"d66MMnfUvUx5H3l6Nu/UDBabYHfHybEGECa2tszUZ/92WHQuxyo9r9Y6rKE31JXmNDHj8VM9lYw+bR29qiV/Dg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"406513fdbe2f1dcb738e8b9e2c9e2c50694e6e12e923b0530897ff05574fbf0b","last_reissued_at":"2026-05-17T23:39:01.023958Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:01.023958Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2510.16868","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:01Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"hGao7Jcgo+X224yuRRnweVweMUmQtJOMBfRL2P9YzKDww0IHTWQSTAPjBsw9HKBOmZH90cG6HFCKAXs4rpXiBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T04:59:24.887447Z"},"content_sha256":"1f16e7ea450ff5927909df78367a08fea3c4f636d499cd96cad9e126cc789b95","schema_version":"1.0","event_id":"sha256:1f16e7ea450ff5927909df78367a08fea3c4f636d499cd96cad9e126cc789b95"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2025:IBSRH7N6F4O4W44OROPCZHRMKB","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Countermeasures for Trojan-Horse Attacks on self-compensating all-fiber polarization modulator","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["physics.optics"],"primary_cat":"quant-ph","authors_text":"Alberto De Toni, Aynur Cemre Aka, Costantino Agnesi, Davide Giacomo Marangon, Giuseppe Vallone, Paolo Villoresi","submitted_at":"2025-10-19T14:58:20Z","abstract_excerpt":"Quantum Key Distribution (QKD) leverages the principles of quantum mechanics to exchange a secret key between two parties. Unlike classical cryptographic systems, the security of QKD is not reliant on computational assumptions but is instead rooted in the fundamental laws of physics. In a QKD protocol, any attempt by an eavesdropper to intercept the key is detectable: this provides an unprecedented level of security, making QKD an attractive solution for secure communication in an era increasingly threatened by the advent of quantum computers and their potential to break classical cryptographi"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2510.16868","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:01Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"350dzvXz1bmDPHyHYWTRah08sNRwzPP/UFOpRFADLi/53SuiaRYS6n6sj/zcP7AjyJKXdMXsgerG/CDRordGDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T04:59:24.887792Z"},"content_sha256":"c0197bfb717c218e2ce1e8bcedf4a1cd2895683885a85f02aa27d3309dea278e","schema_version":"1.0","event_id":"sha256:c0197bfb717c218e2ce1e8bcedf4a1cd2895683885a85f02aa27d3309dea278e"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/IBSRH7N6F4O4W44OROPCZHRMKB/bundle.json","state_url":"https://pith.science/pith/IBSRH7N6F4O4W44OROPCZHRMKB/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/IBSRH7N6F4O4W44OROPCZHRMKB/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T04:59:24Z","links":{"resolver":"https://pith.science/pith/IBSRH7N6F4O4W44OROPCZHRMKB","bundle":"https://pith.science/pith/IBSRH7N6F4O4W44OROPCZHRMKB/bundle.json","state":"https://pith.science/pith/IBSRH7N6F4O4W44OROPCZHRMKB/state.json","well_known_bundle":"https://pith.science/.well-known/pith/IBSRH7N6F4O4W44OROPCZHRMKB/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2025:IBSRH7N6F4O4W44OROPCZHRMKB","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"38e35112ec527d683ad709f982d5bce04304912a03ba3ff0d0012bb689f45177","cross_cats_sorted":["physics.optics"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2025-10-19T14:58:20Z","title_canon_sha256":"a37f7b20f1cc5947edc28bafa097ae401e11d42e5bc448a5aa4dcf1753ec5272"},"schema_version":"1.0","source":{"id":"2510.16868","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2510.16868","created_at":"2026-05-17T23:39:01Z"},{"alias_kind":"arxiv_version","alias_value":"2510.16868v1","created_at":"2026-05-17T23:39:01Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2510.16868","created_at":"2026-05-17T23:39:01Z"},{"alias_kind":"pith_short_12","alias_value":"IBSRH7N6F4O4","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"IBSRH7N6F4O4W44O","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"IBSRH7N6","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:c0197bfb717c218e2ce1e8bcedf4a1cd2895683885a85f02aa27d3309dea278e","target":"graph","created_at":"2026-05-17T23:39:01Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Quantum Key Distribution (QKD) leverages the principles of quantum mechanics to exchange a secret key between two parties. Unlike classical cryptographic systems, the security of QKD is not reliant on computational assumptions but is instead rooted in the fundamental laws of physics. In a QKD protocol, any attempt by an eavesdropper to intercept the key is detectable: this provides an unprecedented level of security, making QKD an attractive solution for secure communication in an era increasingly threatened by the advent of quantum computers and their potential to break classical cryptographi","authors_text":"Alberto De Toni, Aynur Cemre Aka, Costantino Agnesi, Davide Giacomo Marangon, Giuseppe Vallone, Paolo Villoresi","cross_cats":["physics.optics"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2025-10-19T14:58:20Z","title":"Countermeasures for Trojan-Horse Attacks on self-compensating all-fiber polarization modulator"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2510.16868","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:1f16e7ea450ff5927909df78367a08fea3c4f636d499cd96cad9e126cc789b95","target":"record","created_at":"2026-05-17T23:39:01Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"38e35112ec527d683ad709f982d5bce04304912a03ba3ff0d0012bb689f45177","cross_cats_sorted":["physics.optics"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2025-10-19T14:58:20Z","title_canon_sha256":"a37f7b20f1cc5947edc28bafa097ae401e11d42e5bc448a5aa4dcf1753ec5272"},"schema_version":"1.0","source":{"id":"2510.16868","kind":"arxiv","version":1}},"canonical_sha256":"406513fdbe2f1dcb738e8b9e2c9e2c50694e6e12e923b0530897ff05574fbf0b","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"406513fdbe2f1dcb738e8b9e2c9e2c50694e6e12e923b0530897ff05574fbf0b","first_computed_at":"2026-05-17T23:39:01.023958Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:39:01.023958Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"d66MMnfUvUx5H3l6Nu/UDBabYHfHybEGECa2tszUZ/92WHQuxyo9r9Y6rKE31JXmNDHj8VM9lYw+bR29qiV/Dg==","signature_status":"signed_v1","signed_at":"2026-05-17T23:39:01.024526Z","signed_message":"canonical_sha256_bytes"},"source_id":"2510.16868","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:1f16e7ea450ff5927909df78367a08fea3c4f636d499cd96cad9e126cc789b95","sha256:c0197bfb717c218e2ce1e8bcedf4a1cd2895683885a85f02aa27d3309dea278e"],"state_sha256":"798af1926ef810293a5f368b17e4e507a7a105380ddad2152c864aa94ea82f06"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2iVxXFa3ycaJi+3fEH8X1xrRPqvNNnhL1AGapCeIlCiyQu/zRzA6lmp0V9iEql1u8ECfzL1mSiyCQSHjcNI6Aw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T04:59:24.889740Z","bundle_sha256":"c8f38835e36185d9f557ece95d1ae103af5ea4c293027207ec70734a990af83d"}}