{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:LFOLJ44GWWSSG6U3VKYIWVMMIX","short_pith_number":"pith:LFOLJ44G","canonical_record":{"source":{"id":"1803.04407","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-03-10T02:43:09Z","cross_cats_sorted":[],"title_canon_sha256":"fdf76663be35d6f861ebc659629fa5d70ba9389bce8368571fa8d00ba6127101","abstract_canon_sha256":"bde213b3df5582574e2db81eda53745a6c3dadf8e50d768eaabcc339aabfbd71"},"schema_version":"1.0"},"canonical_sha256":"595cb4f386b5a5237a9baab08b558c45da83f9e601c2c5e5129845d83eb745a5","source":{"kind":"arxiv","id":"1803.04407","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.04407","created_at":"2026-05-18T00:21:19Z"},{"alias_kind":"arxiv_version","alias_value":"1803.04407v1","created_at":"2026-05-18T00:21:19Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.04407","created_at":"2026-05-18T00:21:19Z"},{"alias_kind":"pith_short_12","alias_value":"LFOLJ44GWWSS","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"LFOLJ44GWWSSG6U3","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"LFOLJ44G","created_at":"2026-05-18T12:32:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:LFOLJ44GWWSSG6U3VKYIWVMMIX","target":"record","payload":{"canonical_record":{"source":{"id":"1803.04407","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-03-10T02:43:09Z","cross_cats_sorted":[],"title_canon_sha256":"fdf76663be35d6f861ebc659629fa5d70ba9389bce8368571fa8d00ba6127101","abstract_canon_sha256":"bde213b3df5582574e2db81eda53745a6c3dadf8e50d768eaabcc339aabfbd71"},"schema_version":"1.0"},"canonical_sha256":"595cb4f386b5a5237a9baab08b558c45da83f9e601c2c5e5129845d83eb745a5","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:21:19.113024Z","signature_b64":"GFoSMFgK99222oYb7i/VTPz7LxugUBmXITFJJol+MHCzF3baUC48RbydL0/DQJOARhUUwzFJn/XHtsvKjSeVBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"595cb4f386b5a5237a9baab08b558c45da83f9e601c2c5e5129845d83eb745a5","last_reissued_at":"2026-05-18T00:21:19.112389Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:21:19.112389Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1803.04407","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:21:19Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2cj6lL7ncsGA0P/YAPpDxYF/jijsjHyz/O2JLEzD2HY/ttxxs6eX3anWtqODSUpTUUL9RNzL91LGFNgvp7fkDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T05:31:43.277953Z"},"content_sha256":"b91dcac6d0103fa9482625ab5b7d1ccca6e3b9938858c2228ecf3c0055136d82","schema_version":"1.0","event_id":"sha256:b91dcac6d0103fa9482625ab5b7d1ccca6e3b9938858c2228ecf3c0055136d82"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:LFOLJ44GWWSSG6U3VKYIWVMMIX","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Quantum man-in-the-middle attack on the calibration process of quantum key distribution","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Hong Wang, Ming Gao, Xiang-Dong Meng, Yang-Yang Fei, Zhi Ma","submitted_at":"2018-03-10T02:43:09Z","abstract_excerpt":"Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. Inspire"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.04407","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:21:19Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XBVYQob1/oWYvuO76Il1MZHZsolqQj6xyeg331FKW273POfAxv/GTv6/ZYjHcF0LuZaPyRniscycUby7v5MpCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T05:31:43.278622Z"},"content_sha256":"1968b27fc93f7b74d9669b493b1925c04c35b1d2d2eafb9dc599575c431f2727","schema_version":"1.0","event_id":"sha256:1968b27fc93f7b74d9669b493b1925c04c35b1d2d2eafb9dc599575c431f2727"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/LFOLJ44GWWSSG6U3VKYIWVMMIX/bundle.json","state_url":"https://pith.science/pith/LFOLJ44GWWSSG6U3VKYIWVMMIX/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/LFOLJ44GWWSSG6U3VKYIWVMMIX/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T05:31:43Z","links":{"resolver":"https://pith.science/pith/LFOLJ44GWWSSG6U3VKYIWVMMIX","bundle":"https://pith.science/pith/LFOLJ44GWWSSG6U3VKYIWVMMIX/bundle.json","state":"https://pith.science/pith/LFOLJ44GWWSSG6U3VKYIWVMMIX/state.json","well_known_bundle":"https://pith.science/.well-known/pith/LFOLJ44GWWSSG6U3VKYIWVMMIX/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:LFOLJ44GWWSSG6U3VKYIWVMMIX","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"bde213b3df5582574e2db81eda53745a6c3dadf8e50d768eaabcc339aabfbd71","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-03-10T02:43:09Z","title_canon_sha256":"fdf76663be35d6f861ebc659629fa5d70ba9389bce8368571fa8d00ba6127101"},"schema_version":"1.0","source":{"id":"1803.04407","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.04407","created_at":"2026-05-18T00:21:19Z"},{"alias_kind":"arxiv_version","alias_value":"1803.04407v1","created_at":"2026-05-18T00:21:19Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.04407","created_at":"2026-05-18T00:21:19Z"},{"alias_kind":"pith_short_12","alias_value":"LFOLJ44GWWSS","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"LFOLJ44GWWSSG6U3","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"LFOLJ44G","created_at":"2026-05-18T12:32:37Z"}],"graph_snapshots":[{"event_id":"sha256:1968b27fc93f7b74d9669b493b1925c04c35b1d2d2eafb9dc599575c431f2727","target":"graph","created_at":"2026-05-18T00:21:19Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. Inspire","authors_text":"Hong Wang, Ming Gao, Xiang-Dong Meng, Yang-Yang Fei, Zhi Ma","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-03-10T02:43:09Z","title":"Quantum man-in-the-middle attack on the calibration process of quantum key distribution"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.04407","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:b91dcac6d0103fa9482625ab5b7d1ccca6e3b9938858c2228ecf3c0055136d82","target":"record","created_at":"2026-05-18T00:21:19Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"bde213b3df5582574e2db81eda53745a6c3dadf8e50d768eaabcc339aabfbd71","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-03-10T02:43:09Z","title_canon_sha256":"fdf76663be35d6f861ebc659629fa5d70ba9389bce8368571fa8d00ba6127101"},"schema_version":"1.0","source":{"id":"1803.04407","kind":"arxiv","version":1}},"canonical_sha256":"595cb4f386b5a5237a9baab08b558c45da83f9e601c2c5e5129845d83eb745a5","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"595cb4f386b5a5237a9baab08b558c45da83f9e601c2c5e5129845d83eb745a5","first_computed_at":"2026-05-18T00:21:19.112389Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:21:19.112389Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"GFoSMFgK99222oYb7i/VTPz7LxugUBmXITFJJol+MHCzF3baUC48RbydL0/DQJOARhUUwzFJn/XHtsvKjSeVBQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:21:19.113024Z","signed_message":"canonical_sha256_bytes"},"source_id":"1803.04407","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:b91dcac6d0103fa9482625ab5b7d1ccca6e3b9938858c2228ecf3c0055136d82","sha256:1968b27fc93f7b74d9669b493b1925c04c35b1d2d2eafb9dc599575c431f2727"],"state_sha256":"adb06ba9baf39514db4f939d0e145b6e4e92914ae0ea984e6615c95067f015f6"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"LJKGYhDHwmsgHpO/8x9jNDtJAZu07mc5k/nwp2Wf9CiBHKPmYY44Bb6z6+Q5YXS/ZqGbC1sPMie+3Sv8HOBfAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T05:31:43.282744Z","bundle_sha256":"639313a4cbd02cb32f082c1b53de1f283b21a254cebeb92a6eeeff9e2524d71a"}}