{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2025:IFOTZHR4Y6SRCFBEVTTQSFL23U","short_pith_number":"pith:IFOTZHR4","canonical_record":{"source":{"id":"2504.07356","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2025-04-10T00:52:13Z","cross_cats_sorted":[],"title_canon_sha256":"3912f616b1e2674248ca5e74026638937f3c35f6d7732364eff58723a1555594","abstract_canon_sha256":"2fd76bdc34afc79ccc4f860a806a2a0228a3a6e53b5c6fab209bc54863b631b2"},"schema_version":"1.0"},"canonical_sha256":"415d3c9e3cc7a5111424ace709157add386c2f3f972c004ebf3868582d20319a","source":{"kind":"arxiv","id":"2504.07356","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2504.07356","created_at":"2026-05-17T23:39:05Z"},{"alias_kind":"arxiv_version","alias_value":"2504.07356v2","created_at":"2026-05-17T23:39:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2504.07356","created_at":"2026-05-17T23:39:05Z"},{"alias_kind":"pith_short_12","alias_value":"IFOTZHR4Y6SR","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"IFOTZHR4Y6SRCFBE","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"IFOTZHR4","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2025:IFOTZHR4Y6SRCFBEVTTQSFL23U","target":"record","payload":{"canonical_record":{"source":{"id":"2504.07356","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2025-04-10T00:52:13Z","cross_cats_sorted":[],"title_canon_sha256":"3912f616b1e2674248ca5e74026638937f3c35f6d7732364eff58723a1555594","abstract_canon_sha256":"2fd76bdc34afc79ccc4f860a806a2a0228a3a6e53b5c6fab209bc54863b631b2"},"schema_version":"1.0"},"canonical_sha256":"415d3c9e3cc7a5111424ace709157add386c2f3f972c004ebf3868582d20319a","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:05.007839Z","signature_b64":"bD/1THg/iea6TzPpbl20UeFRIp+/ZUlfTIYJHeUyx3eUJ8vBjXzdV4NZN1U9P90eaLdi5Ot02QbZrIlr3puOBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"415d3c9e3cc7a5111424ace709157add386c2f3f972c004ebf3868582d20319a","last_reissued_at":"2026-05-17T23:39:05.007261Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:05.007261Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2504.07356","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"bpEKvD4iHzwBaIt04mNHuhykW4kBOX0axtDPkgnv8zRgDapTon5oZEuew+CcQyGKh6KCYT7fJ+m6doNn7mMLDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T19:46:17.294696Z"},"content_sha256":"bdc917daee9b696213826b3ebd463f1cda6341fd97f8ce0ac34be24c7d44d170","schema_version":"1.0","event_id":"sha256:bdc917daee9b696213826b3ebd463f1cda6341fd97f8ce0ac34be24c7d44d170"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2025:IFOTZHR4Y6SRCFBEVTTQSFL23U","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Asymptotically tight security analysis of quantum key distribution based on universal source compression","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Masato Koashi, Shinichiro Yamano, Takaya Matsuura, Toshihiko Sasaki, Yui Kuramochi","submitted_at":"2025-04-10T00:52:13Z","abstract_excerpt":"Practical quantum key distribution (QKD) protocols require a finite-size security proof. The phase error correction (PEC) approach is one of the general strategies for security analyses that has successfully proved finite-size security for many protocols. However, the conventional PEC approach cannot achieve the asymptotically optimal key rate in general, as long as the failure probability of PEC is estimated through the phase error rate. In this work, we propose a new PEC-type strategy that can provably achieve the asymptotically optimal key rate. The key piece for this is a virtual protocol "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2504.07356","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:05Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"jga7hpJQRXnL+F4uR3qWgt2uOIjj9euPk85QXxJDo4tiQhElvpmYXE4Gdqb6vD/1v/4pLyl/BH7owneDa9yZBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T19:46:17.295054Z"},"content_sha256":"4db888fb8a28894c007180b6ae02fb8b403de711f1a6e04a7d051caf2244f1ef","schema_version":"1.0","event_id":"sha256:4db888fb8a28894c007180b6ae02fb8b403de711f1a6e04a7d051caf2244f1ef"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/IFOTZHR4Y6SRCFBEVTTQSFL23U/bundle.json","state_url":"https://pith.science/pith/IFOTZHR4Y6SRCFBEVTTQSFL23U/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/IFOTZHR4Y6SRCFBEVTTQSFL23U/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T19:46:17Z","links":{"resolver":"https://pith.science/pith/IFOTZHR4Y6SRCFBEVTTQSFL23U","bundle":"https://pith.science/pith/IFOTZHR4Y6SRCFBEVTTQSFL23U/bundle.json","state":"https://pith.science/pith/IFOTZHR4Y6SRCFBEVTTQSFL23U/state.json","well_known_bundle":"https://pith.science/.well-known/pith/IFOTZHR4Y6SRCFBEVTTQSFL23U/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2025:IFOTZHR4Y6SRCFBEVTTQSFL23U","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"2fd76bdc34afc79ccc4f860a806a2a0228a3a6e53b5c6fab209bc54863b631b2","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2025-04-10T00:52:13Z","title_canon_sha256":"3912f616b1e2674248ca5e74026638937f3c35f6d7732364eff58723a1555594"},"schema_version":"1.0","source":{"id":"2504.07356","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2504.07356","created_at":"2026-05-17T23:39:05Z"},{"alias_kind":"arxiv_version","alias_value":"2504.07356v2","created_at":"2026-05-17T23:39:05Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2504.07356","created_at":"2026-05-17T23:39:05Z"},{"alias_kind":"pith_short_12","alias_value":"IFOTZHR4Y6SR","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"IFOTZHR4Y6SRCFBE","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"IFOTZHR4","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:4db888fb8a28894c007180b6ae02fb8b403de711f1a6e04a7d051caf2244f1ef","target":"graph","created_at":"2026-05-17T23:39:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Practical quantum key distribution (QKD) protocols require a finite-size security proof. The phase error correction (PEC) approach is one of the general strategies for security analyses that has successfully proved finite-size security for many protocols. However, the conventional PEC approach cannot achieve the asymptotically optimal key rate in general, as long as the failure probability of PEC is estimated through the phase error rate. In this work, we propose a new PEC-type strategy that can provably achieve the asymptotically optimal key rate. The key piece for this is a virtual protocol ","authors_text":"Masato Koashi, Shinichiro Yamano, Takaya Matsuura, Toshihiko Sasaki, Yui Kuramochi","cross_cats":[],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2025-04-10T00:52:13Z","title":"Asymptotically tight security analysis of quantum key distribution based on universal source compression"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2504.07356","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:bdc917daee9b696213826b3ebd463f1cda6341fd97f8ce0ac34be24c7d44d170","target":"record","created_at":"2026-05-17T23:39:05Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"2fd76bdc34afc79ccc4f860a806a2a0228a3a6e53b5c6fab209bc54863b631b2","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2025-04-10T00:52:13Z","title_canon_sha256":"3912f616b1e2674248ca5e74026638937f3c35f6d7732364eff58723a1555594"},"schema_version":"1.0","source":{"id":"2504.07356","kind":"arxiv","version":2}},"canonical_sha256":"415d3c9e3cc7a5111424ace709157add386c2f3f972c004ebf3868582d20319a","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"415d3c9e3cc7a5111424ace709157add386c2f3f972c004ebf3868582d20319a","first_computed_at":"2026-05-17T23:39:05.007261Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:39:05.007261Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"bD/1THg/iea6TzPpbl20UeFRIp+/ZUlfTIYJHeUyx3eUJ8vBjXzdV4NZN1U9P90eaLdi5Ot02QbZrIlr3puOBA==","signature_status":"signed_v1","signed_at":"2026-05-17T23:39:05.007839Z","signed_message":"canonical_sha256_bytes"},"source_id":"2504.07356","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:bdc917daee9b696213826b3ebd463f1cda6341fd97f8ce0ac34be24c7d44d170","sha256:4db888fb8a28894c007180b6ae02fb8b403de711f1a6e04a7d051caf2244f1ef"],"state_sha256":"be4dfab0ae7ea98a5ab5a191e5f03f620ca02f8b7af70c2abebb5cf4205a6f8b"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"uSp8vEZARdYhDVtiun0IxfpjzNoGvn0MM1SsTquTpllUPTMY53EzdOs9fWHcyZQwlXd/4FexCy404nSMQ8UFCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T19:46:17.297243Z","bundle_sha256":"c496d1bffc2cfcdff9ec5fd1e500b92ddd43a7386f562543c6622f620ce75e2f"}}