{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2010:LELL6Q2L5HAOW4GDMYNZY5PIYE","short_pith_number":"pith:LELL6Q2L","canonical_record":{"source":{"id":"1008.5380","kind":"arxiv","version":6},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-31T18:12:02Z","cross_cats_sorted":["cs.CR","cs.IT","math.IT"],"title_canon_sha256":"8bddbea64f63205764c56cae28aa85357e1eb62a6bebe91fb793d5df58c2d20e","abstract_canon_sha256":"e7f44938847bff286496b854b996a375b3ac9c8910660a9d03ae9d54f5ebb91d"},"schema_version":"1.0"},"canonical_sha256":"5916bf434be9c0eb70c3661b9c75e8c12ab71cd7a8b8293e8a4c248e2be996f7","source":{"kind":"arxiv","id":"1008.5380","version":6},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.5380","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"arxiv_version","alias_value":"1008.5380v6","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.5380","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"pith_short_12","alias_value":"LELL6Q2L5HAO","created_at":"2026-05-18T12:26:10Z"},{"alias_kind":"pith_short_16","alias_value":"LELL6Q2L5HAOW4GD","created_at":"2026-05-18T12:26:10Z"},{"alias_kind":"pith_short_8","alias_value":"LELL6Q2L","created_at":"2026-05-18T12:26:10Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2010:LELL6Q2L5HAOW4GDMYNZY5PIYE","target":"record","payload":{"canonical_record":{"source":{"id":"1008.5380","kind":"arxiv","version":6},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-31T18:12:02Z","cross_cats_sorted":["cs.CR","cs.IT","math.IT"],"title_canon_sha256":"8bddbea64f63205764c56cae28aa85357e1eb62a6bebe91fb793d5df58c2d20e","abstract_canon_sha256":"e7f44938847bff286496b854b996a375b3ac9c8910660a9d03ae9d54f5ebb91d"},"schema_version":"1.0"},"canonical_sha256":"5916bf434be9c0eb70c3661b9c75e8c12ab71cd7a8b8293e8a4c248e2be996f7","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:23:47.752715Z","signature_b64":"Kz1XQMURq4qmyLVTn818iCR/SGzf79kVSeo+tdGPjkrFZrhCYqMNhRHPwiS4xtW0ViMM5mTkbvNEGHcg6WNnBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5916bf434be9c0eb70c3661b9c75e8c12ab71cd7a8b8293e8a4c248e2be996f7","last_reissued_at":"2026-05-18T03:23:47.752206Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:23:47.752206Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1008.5380","source_version":6,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:23:47Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"4W2crZ9Gk4hjm5p3aR0uPAQarD23JdEIuSakf+roEinxC0qiY3Dlr95cs6zJnqOdbXh4OpO1l/S9G075IDj/Bg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T21:08:21.285264Z"},"content_sha256":"db25ca6ea6411b1d5846dd925fd87da6650cc5d626d0d1b6bc54d277e471d806","schema_version":"1.0","event_id":"sha256:db25ca6ea6411b1d5846dd925fd87da6650cc5d626d0d1b6bc54d277e471d806"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2010:LELL6Q2L5HAOW4GDMYNZY5PIYE","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Quantum Tagging for Tags Containing Secret Classical Data","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.IT","math.IT"],"primary_cat":"quant-ph","authors_text":"Adrian Kent (Centre for Quantum Information, DAMTP, Foundations, Perimeter Institute), University of Cambridge","submitted_at":"2010-08-31T18:12:02Z","abstract_excerpt":"Various authors have considered schemes for {\\it quantum tagging}, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. This task raises some interesting new questions about cryptographic security assumptions, as relatively subtle details in the security model can dramatically affect the security attainable. We consider here the case in which the tag is cryptograph"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.5380","kind":"arxiv","version":6},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:23:47Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Cc7lp3//TudrY7LOehcZlFPGA8ShiyBK4VwdgAJHI1gNEGheadOlwphgIrvaqWToK7/YUxPZ692gW89K6oW+AQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T21:08:21.285915Z"},"content_sha256":"4a5e5732804a0313bba6ea9486bf19b943dfbc8aeed928f161dee21c26d51f9b","schema_version":"1.0","event_id":"sha256:4a5e5732804a0313bba6ea9486bf19b943dfbc8aeed928f161dee21c26d51f9b"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/LELL6Q2L5HAOW4GDMYNZY5PIYE/bundle.json","state_url":"https://pith.science/pith/LELL6Q2L5HAOW4GDMYNZY5PIYE/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/LELL6Q2L5HAOW4GDMYNZY5PIYE/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T21:08:21Z","links":{"resolver":"https://pith.science/pith/LELL6Q2L5HAOW4GDMYNZY5PIYE","bundle":"https://pith.science/pith/LELL6Q2L5HAOW4GDMYNZY5PIYE/bundle.json","state":"https://pith.science/pith/LELL6Q2L5HAOW4GDMYNZY5PIYE/state.json","well_known_bundle":"https://pith.science/.well-known/pith/LELL6Q2L5HAOW4GDMYNZY5PIYE/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2010:LELL6Q2L5HAOW4GDMYNZY5PIYE","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"e7f44938847bff286496b854b996a375b3ac9c8910660a9d03ae9d54f5ebb91d","cross_cats_sorted":["cs.CR","cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-31T18:12:02Z","title_canon_sha256":"8bddbea64f63205764c56cae28aa85357e1eb62a6bebe91fb793d5df58c2d20e"},"schema_version":"1.0","source":{"id":"1008.5380","kind":"arxiv","version":6}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1008.5380","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"arxiv_version","alias_value":"1008.5380v6","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1008.5380","created_at":"2026-05-18T03:23:47Z"},{"alias_kind":"pith_short_12","alias_value":"LELL6Q2L5HAO","created_at":"2026-05-18T12:26:10Z"},{"alias_kind":"pith_short_16","alias_value":"LELL6Q2L5HAOW4GD","created_at":"2026-05-18T12:26:10Z"},{"alias_kind":"pith_short_8","alias_value":"LELL6Q2L","created_at":"2026-05-18T12:26:10Z"}],"graph_snapshots":[{"event_id":"sha256:4a5e5732804a0313bba6ea9486bf19b943dfbc8aeed928f161dee21c26d51f9b","target":"graph","created_at":"2026-05-18T03:23:47Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Various authors have considered schemes for {\\it quantum tagging}, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. This task raises some interesting new questions about cryptographic security assumptions, as relatively subtle details in the security model can dramatically affect the security attainable. We consider here the case in which the tag is cryptograph","authors_text":"Adrian Kent (Centre for Quantum Information, DAMTP, Foundations, Perimeter Institute), University of Cambridge","cross_cats":["cs.CR","cs.IT","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-31T18:12:02Z","title":"Quantum Tagging for Tags Containing Secret Classical Data"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1008.5380","kind":"arxiv","version":6},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:db25ca6ea6411b1d5846dd925fd87da6650cc5d626d0d1b6bc54d277e471d806","target":"record","created_at":"2026-05-18T03:23:47Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"e7f44938847bff286496b854b996a375b3ac9c8910660a9d03ae9d54f5ebb91d","cross_cats_sorted":["cs.CR","cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-08-31T18:12:02Z","title_canon_sha256":"8bddbea64f63205764c56cae28aa85357e1eb62a6bebe91fb793d5df58c2d20e"},"schema_version":"1.0","source":{"id":"1008.5380","kind":"arxiv","version":6}},"canonical_sha256":"5916bf434be9c0eb70c3661b9c75e8c12ab71cd7a8b8293e8a4c248e2be996f7","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"5916bf434be9c0eb70c3661b9c75e8c12ab71cd7a8b8293e8a4c248e2be996f7","first_computed_at":"2026-05-18T03:23:47.752206Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:23:47.752206Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Kz1XQMURq4qmyLVTn818iCR/SGzf79kVSeo+tdGPjkrFZrhCYqMNhRHPwiS4xtW0ViMM5mTkbvNEGHcg6WNnBg==","signature_status":"signed_v1","signed_at":"2026-05-18T03:23:47.752715Z","signed_message":"canonical_sha256_bytes"},"source_id":"1008.5380","source_kind":"arxiv","source_version":6}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:db25ca6ea6411b1d5846dd925fd87da6650cc5d626d0d1b6bc54d277e471d806","sha256:4a5e5732804a0313bba6ea9486bf19b943dfbc8aeed928f161dee21c26d51f9b"],"state_sha256":"7b7f045363abe9c9bc0d7dd5cb0788704bbcb04dfc0c242e57f8d4d68f3f4a1b"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0liiIDSlmfhjUzgH8Mrks0v/NLsuzdIICqKKPPkyfJ28053wuhOH1oFZH9rUYmkyDjd3iaOO2r8+el4xsRlyBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T21:08:21.289423Z","bundle_sha256":"b20ed01aca68cce61d537c2e5a7d5f2c5daf349010c6eee0afcfb612198fbb40"}}