{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:JFSRKH5RNGYW7NLFNNGHEUAZFG","short_pith_number":"pith:JFSRKH5R","canonical_record":{"source":{"id":"1801.04139","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-01-12T11:51:49Z","cross_cats_sorted":[],"title_canon_sha256":"fbcca1507cd3e2ccb111fd8227a9a2f292dee49f1e51cea22ae43614d0f538bf","abstract_canon_sha256":"2e58672894347f953014434dbf8f77c40ae2a8f9f7614cb44713ce3ded168533"},"schema_version":"1.0"},"canonical_sha256":"4965151fb169b16fb5656b4c72501929a0f9a2d151505ff73e04402ee08f600c","source":{"kind":"arxiv","id":"1801.04139","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1801.04139","created_at":"2026-05-17T23:56:34Z"},{"alias_kind":"arxiv_version","alias_value":"1801.04139v1","created_at":"2026-05-17T23:56:34Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.04139","created_at":"2026-05-17T23:56:34Z"},{"alias_kind":"pith_short_12","alias_value":"JFSRKH5RNGYW","created_at":"2026-05-18T12:32:31Z"},{"alias_kind":"pith_short_16","alias_value":"JFSRKH5RNGYW7NLF","created_at":"2026-05-18T12:32:31Z"},{"alias_kind":"pith_short_8","alias_value":"JFSRKH5R","created_at":"2026-05-18T12:32:31Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:JFSRKH5RNGYW7NLFNNGHEUAZFG","target":"record","payload":{"canonical_record":{"source":{"id":"1801.04139","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-01-12T11:51:49Z","cross_cats_sorted":[],"title_canon_sha256":"fbcca1507cd3e2ccb111fd8227a9a2f292dee49f1e51cea22ae43614d0f538bf","abstract_canon_sha256":"2e58672894347f953014434dbf8f77c40ae2a8f9f7614cb44713ce3ded168533"},"schema_version":"1.0"},"canonical_sha256":"4965151fb169b16fb5656b4c72501929a0f9a2d151505ff73e04402ee08f600c","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:56:34.225882Z","signature_b64":"QUkVtjpY0qzJlMLXN5D3zFCOa+3O2bVFKHipYtykTnuejhN2LfY0Y5RASc6i0F3bMNdabLoXdzSIP1DFRepUAw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"4965151fb169b16fb5656b4c72501929a0f9a2d151505ff73e04402ee08f600c","last_reissued_at":"2026-05-17T23:56:34.225138Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:56:34.225138Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1801.04139","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:34Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"PF3IGoB6Qut35IGpzUiQpsnnq4L8JSjFZJNZt6cj/t52cQQtl4ixsNokIpJ8e93E1I4IIPPV7uGDArY89C0XDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T15:40:32.905900Z"},"content_sha256":"48f1d80982cff6e0b7d5ba021f1c9c9852c5c168aa9a894b22bee2118dcf654a","schema_version":"1.0","event_id":"sha256:48f1d80982cff6e0b7d5ba021f1c9c9852c5c168aa9a894b22bee2118dcf654a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:JFSRKH5RNGYW7NLFNNGHEUAZFG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Secure heterodyne-based quantum random number generator at 17 Gbps","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Davide G. Marangon, Giuseppe Vallone, Marco Avesani, Paolo Villoresi","submitted_at":"2018-01-12T11:51:49Z","abstract_excerpt":"Random numbers are commonly used in many different fields, ranging from simulations in fundamental science to security applications. In some critical cases, as Bell's tests and cryptography, the random numbers are required to be both secure (i.e. known only by the legitimate user) and to be provided at an ultra-fast rate (i.e. larger than Gbit/s). However, practical generators are usually considered trusted, but their security can be compromised in case of imperfections or malicious external actions. In this work we introduce an efficient protocol which guarantees security and speed in the gen"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.04139","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:34Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/498fplkLuy4mmtCUBFMIChW5vIvqI8AVeqHQ5sM78wARHqED9LJhfztWXr4ZyjYrIEPj9HPBSobj+kp8sYQBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T15:40:32.906601Z"},"content_sha256":"4555248cc94359e2c726d51806e6e1d7fb37d0291eed54e3ba35d74e63ff4e5c","schema_version":"1.0","event_id":"sha256:4555248cc94359e2c726d51806e6e1d7fb37d0291eed54e3ba35d74e63ff4e5c"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/JFSRKH5RNGYW7NLFNNGHEUAZFG/bundle.json","state_url":"https://pith.science/pith/JFSRKH5RNGYW7NLFNNGHEUAZFG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/JFSRKH5RNGYW7NLFNNGHEUAZFG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T15:40:32Z","links":{"resolver":"https://pith.science/pith/JFSRKH5RNGYW7NLFNNGHEUAZFG","bundle":"https://pith.science/pith/JFSRKH5RNGYW7NLFNNGHEUAZFG/bundle.json","state":"https://pith.science/pith/JFSRKH5RNGYW7NLFNNGHEUAZFG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/JFSRKH5RNGYW7NLFNNGHEUAZFG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:JFSRKH5RNGYW7NLFNNGHEUAZFG","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"2e58672894347f953014434dbf8f77c40ae2a8f9f7614cb44713ce3ded168533","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-01-12T11:51:49Z","title_canon_sha256":"fbcca1507cd3e2ccb111fd8227a9a2f292dee49f1e51cea22ae43614d0f538bf"},"schema_version":"1.0","source":{"id":"1801.04139","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1801.04139","created_at":"2026-05-17T23:56:34Z"},{"alias_kind":"arxiv_version","alias_value":"1801.04139v1","created_at":"2026-05-17T23:56:34Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.04139","created_at":"2026-05-17T23:56:34Z"},{"alias_kind":"pith_short_12","alias_value":"JFSRKH5RNGYW","created_at":"2026-05-18T12:32:31Z"},{"alias_kind":"pith_short_16","alias_value":"JFSRKH5RNGYW7NLF","created_at":"2026-05-18T12:32:31Z"},{"alias_kind":"pith_short_8","alias_value":"JFSRKH5R","created_at":"2026-05-18T12:32:31Z"}],"graph_snapshots":[{"event_id":"sha256:4555248cc94359e2c726d51806e6e1d7fb37d0291eed54e3ba35d74e63ff4e5c","target":"graph","created_at":"2026-05-17T23:56:34Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Random numbers are commonly used in many different fields, ranging from simulations in fundamental science to security applications. In some critical cases, as Bell's tests and cryptography, the random numbers are required to be both secure (i.e. known only by the legitimate user) and to be provided at an ultra-fast rate (i.e. larger than Gbit/s). However, practical generators are usually considered trusted, but their security can be compromised in case of imperfections or malicious external actions. In this work we introduce an efficient protocol which guarantees security and speed in the gen","authors_text":"Davide G. Marangon, Giuseppe Vallone, Marco Avesani, Paolo Villoresi","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-01-12T11:51:49Z","title":"Secure heterodyne-based quantum random number generator at 17 Gbps"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.04139","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:48f1d80982cff6e0b7d5ba021f1c9c9852c5c168aa9a894b22bee2118dcf654a","target":"record","created_at":"2026-05-17T23:56:34Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"2e58672894347f953014434dbf8f77c40ae2a8f9f7614cb44713ce3ded168533","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-01-12T11:51:49Z","title_canon_sha256":"fbcca1507cd3e2ccb111fd8227a9a2f292dee49f1e51cea22ae43614d0f538bf"},"schema_version":"1.0","source":{"id":"1801.04139","kind":"arxiv","version":1}},"canonical_sha256":"4965151fb169b16fb5656b4c72501929a0f9a2d151505ff73e04402ee08f600c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"4965151fb169b16fb5656b4c72501929a0f9a2d151505ff73e04402ee08f600c","first_computed_at":"2026-05-17T23:56:34.225138Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:56:34.225138Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"QUkVtjpY0qzJlMLXN5D3zFCOa+3O2bVFKHipYtykTnuejhN2LfY0Y5RASc6i0F3bMNdabLoXdzSIP1DFRepUAw==","signature_status":"signed_v1","signed_at":"2026-05-17T23:56:34.225882Z","signed_message":"canonical_sha256_bytes"},"source_id":"1801.04139","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:48f1d80982cff6e0b7d5ba021f1c9c9852c5c168aa9a894b22bee2118dcf654a","sha256:4555248cc94359e2c726d51806e6e1d7fb37d0291eed54e3ba35d74e63ff4e5c"],"state_sha256":"495995adcca75028a7f02001927a3a3021e971a4023313ce02740644a35eedaa"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Worycp6cYGXujaniwujdqX2LrGZOdLkBAd2hd9dtmaC8WvjIxnUJFtcMiF/iKTn6bmwrQgRjkOs7/Jw7vmo0CQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T15:40:32.910434Z","bundle_sha256":"ee11eb5370ac4b6f9ad5d59dc3c2092f1cad76332fdea03ee1a0490d5ab973c7"}}