{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:NBHBOGFOWTAXN5VMDKA7MU66ZJ","short_pith_number":"pith:NBHBOGFO","canonical_record":{"source":{"id":"2602.05057","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2026-02-04T21:16:33Z","cross_cats_sorted":[],"title_canon_sha256":"6d89817ba4e086ce32977bc719e467a83c50ecfb14da6db8fb3841b69b1dae58","abstract_canon_sha256":"5c2dfecd25c95ff40905d5f8d4cbe0382d5cf7a0446a7ed59a48b84410af88f0"},"schema_version":"1.0"},"canonical_sha256":"684e1718aeb4c176f6ac1a81f653deca4d2ad75a2f73d588af1070c0a52c32cb","source":{"kind":"arxiv","id":"2602.05057","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2602.05057","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"arxiv_version","alias_value":"2602.05057v1","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2602.05057","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"pith_short_12","alias_value":"NBHBOGFOWTAX","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"pith_short_16","alias_value":"NBHBOGFOWTAXN5VM","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"pith_short_8","alias_value":"NBHBOGFO","created_at":"2026-05-22T01:03:56Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:NBHBOGFOWTAXN5VMDKA7MU66ZJ","target":"record","payload":{"canonical_record":{"source":{"id":"2602.05057","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2026-02-04T21:16:33Z","cross_cats_sorted":[],"title_canon_sha256":"6d89817ba4e086ce32977bc719e467a83c50ecfb14da6db8fb3841b69b1dae58","abstract_canon_sha256":"5c2dfecd25c95ff40905d5f8d4cbe0382d5cf7a0446a7ed59a48b84410af88f0"},"schema_version":"1.0"},"canonical_sha256":"684e1718aeb4c176f6ac1a81f653deca4d2ad75a2f73d588af1070c0a52c32cb","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-22T01:03:56.510718Z","signature_b64":"5+HH32VVU0zG2V0V+AMpkvGRJvqbhgdJJC34+Mwry4fdDLCTxnmXmyk9Vn5610Gd2ceGA4xJIeFFtUyK/nJ9Dg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"684e1718aeb4c176f6ac1a81f653deca4d2ad75a2f73d588af1070c0a52c32cb","last_reissued_at":"2026-05-22T01:03:56.510009Z","signature_status":"signed_v1","first_computed_at":"2026-05-22T01:03:56.510009Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2602.05057","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-22T01:03:56Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"7aJmGyisHDxF9tAjJkFHENXrTpD8jHQkv9Ru2kQgj2cWDMlTSVIyEvZtnFnmdmpcrTzxa+1SoeSNiD4JM4UnAw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T19:32:23.890567Z"},"content_sha256":"0ee9c6a3973227a1adba9eccfbb287fec85a85a29e36285a84a0c0984ecee195","schema_version":"1.0","event_id":"sha256:0ee9c6a3973227a1adba9eccfbb287fec85a85a29e36285a84a0c0984ecee195"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:NBHBOGFOWTAXN5VMDKA7MU66ZJ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Elizabeth Agudelo, Esteban Vasquez, Gl\\'aucia Murta, Matej Pivoluska, Max Riegler, Patrick Andriolo","submitted_at":"2026-02-04T21:16:33Z","abstract_excerpt":"In contrast to classical cryptography, where the security of encoded messages typically relies on the inability of standard algorithms to overcome computational complexity assumptions, Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption, provided that the QKD protocol is underpinned by a security proof. In the last decades, security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols. However, most proofs are based on idealized models "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2602.05057","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2602.05057/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-22T01:03:56Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ldqZr9+DLFNbzgz3LoejNLfy/EDTrz4ljx99mg3BvD3mBNl9EBttlXenop2Eg8AIJCVlxkiOLBb/p0K5dvgNDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T19:32:23.891226Z"},"content_sha256":"3447630afbe60d09c346998f5fb2c1391db2f0494267470b58a251d068084613","schema_version":"1.0","event_id":"sha256:3447630afbe60d09c346998f5fb2c1391db2f0494267470b58a251d068084613"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/NBHBOGFOWTAXN5VMDKA7MU66ZJ/bundle.json","state_url":"https://pith.science/pith/NBHBOGFOWTAXN5VMDKA7MU66ZJ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/NBHBOGFOWTAXN5VMDKA7MU66ZJ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T19:32:23Z","links":{"resolver":"https://pith.science/pith/NBHBOGFOWTAXN5VMDKA7MU66ZJ","bundle":"https://pith.science/pith/NBHBOGFOWTAXN5VMDKA7MU66ZJ/bundle.json","state":"https://pith.science/pith/NBHBOGFOWTAXN5VMDKA7MU66ZJ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/NBHBOGFOWTAXN5VMDKA7MU66ZJ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:NBHBOGFOWTAXN5VMDKA7MU66ZJ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"5c2dfecd25c95ff40905d5f8d4cbe0382d5cf7a0446a7ed59a48b84410af88f0","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2026-02-04T21:16:33Z","title_canon_sha256":"6d89817ba4e086ce32977bc719e467a83c50ecfb14da6db8fb3841b69b1dae58"},"schema_version":"1.0","source":{"id":"2602.05057","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2602.05057","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"arxiv_version","alias_value":"2602.05057v1","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2602.05057","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"pith_short_12","alias_value":"NBHBOGFOWTAX","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"pith_short_16","alias_value":"NBHBOGFOWTAXN5VM","created_at":"2026-05-22T01:03:56Z"},{"alias_kind":"pith_short_8","alias_value":"NBHBOGFO","created_at":"2026-05-22T01:03:56Z"}],"graph_snapshots":[{"event_id":"sha256:3447630afbe60d09c346998f5fb2c1391db2f0494267470b58a251d068084613","target":"graph","created_at":"2026-05-22T01:03:56Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2602.05057/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"In contrast to classical cryptography, where the security of encoded messages typically relies on the inability of standard algorithms to overcome computational complexity assumptions, Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption, provided that the QKD protocol is underpinned by a security proof. In the last decades, security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols. However, most proofs are based on idealized models ","authors_text":"Elizabeth Agudelo, Esteban Vasquez, Gl\\'aucia Murta, Matej Pivoluska, Max Riegler, Patrick Andriolo","cross_cats":[],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2026-02-04T21:16:33Z","title":"Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2602.05057","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0ee9c6a3973227a1adba9eccfbb287fec85a85a29e36285a84a0c0984ecee195","target":"record","created_at":"2026-05-22T01:03:56Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"5c2dfecd25c95ff40905d5f8d4cbe0382d5cf7a0446a7ed59a48b84410af88f0","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"quant-ph","submitted_at":"2026-02-04T21:16:33Z","title_canon_sha256":"6d89817ba4e086ce32977bc719e467a83c50ecfb14da6db8fb3841b69b1dae58"},"schema_version":"1.0","source":{"id":"2602.05057","kind":"arxiv","version":1}},"canonical_sha256":"684e1718aeb4c176f6ac1a81f653deca4d2ad75a2f73d588af1070c0a52c32cb","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"684e1718aeb4c176f6ac1a81f653deca4d2ad75a2f73d588af1070c0a52c32cb","first_computed_at":"2026-05-22T01:03:56.510009Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-22T01:03:56.510009Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"5+HH32VVU0zG2V0V+AMpkvGRJvqbhgdJJC34+Mwry4fdDLCTxnmXmyk9Vn5610Gd2ceGA4xJIeFFtUyK/nJ9Dg==","signature_status":"signed_v1","signed_at":"2026-05-22T01:03:56.510718Z","signed_message":"canonical_sha256_bytes"},"source_id":"2602.05057","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:0ee9c6a3973227a1adba9eccfbb287fec85a85a29e36285a84a0c0984ecee195","sha256:3447630afbe60d09c346998f5fb2c1391db2f0494267470b58a251d068084613"],"state_sha256":"6969366b31a423587631a800ea7d6f247dffdc4161d3d7f8432041d929897080"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"aDk5t3heTXewYPlHhuoPZqv2myBU3EGhPRoZC7mf0W8wUjN5vpgLvTHnP4HkT6l7tsohFxJnKCdK6XPHTHkdDA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T19:32:23.895033Z","bundle_sha256":"a19d6ecb7cc2c6f27423f7036a88407a9d1a6d86767d1b97bb2dfdfaf241ac4f"}}