{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:O3HA6ZB6MJMUSDL7ZNOLJG6W5F","short_pith_number":"pith:O3HA6ZB6","canonical_record":{"source":{"id":"1307.3197","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2013-07-11T17:49:59Z","cross_cats_sorted":[],"title_canon_sha256":"979dd669b66efc64bdd9230255bbe50651c53cd9c131ddfb5d928fd98bbb231d","abstract_canon_sha256":"308d4c71c514782cc99360e2543a2f9a95b2550e5a76768039103550e7bac563"},"schema_version":"1.0"},"canonical_sha256":"76ce0f643e6259490d7fcb5cb49bd6e969d5b2780f63c0d7ef4e5d3f71ede884","source":{"kind":"arxiv","id":"1307.3197","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1307.3197","created_at":"2026-05-18T03:18:40Z"},{"alias_kind":"arxiv_version","alias_value":"1307.3197v1","created_at":"2026-05-18T03:18:40Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1307.3197","created_at":"2026-05-18T03:18:40Z"},{"alias_kind":"pith_short_12","alias_value":"O3HA6ZB6MJMU","created_at":"2026-05-18T12:27:54Z"},{"alias_kind":"pith_short_16","alias_value":"O3HA6ZB6MJMUSDL7","created_at":"2026-05-18T12:27:54Z"},{"alias_kind":"pith_short_8","alias_value":"O3HA6ZB6","created_at":"2026-05-18T12:27:54Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:O3HA6ZB6MJMUSDL7ZNOLJG6W5F","target":"record","payload":{"canonical_record":{"source":{"id":"1307.3197","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2013-07-11T17:49:59Z","cross_cats_sorted":[],"title_canon_sha256":"979dd669b66efc64bdd9230255bbe50651c53cd9c131ddfb5d928fd98bbb231d","abstract_canon_sha256":"308d4c71c514782cc99360e2543a2f9a95b2550e5a76768039103550e7bac563"},"schema_version":"1.0"},"canonical_sha256":"76ce0f643e6259490d7fcb5cb49bd6e969d5b2780f63c0d7ef4e5d3f71ede884","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:18:40.890117Z","signature_b64":"PgnzPScLn8BFtlcvsBbu7cOkMz07FgwGcWcNfSU3IYySF6bC/T9Ror47nvHdLQx2ivddKg29FeQ419/Ho06UBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"76ce0f643e6259490d7fcb5cb49bd6e969d5b2780f63c0d7ef4e5d3f71ede884","last_reissued_at":"2026-05-18T03:18:40.889436Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:18:40.889436Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1307.3197","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:18:40Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Mt/wTLg2eZRFhoej2KSnKvp5tB2tr2jj6DP4J6V2ai5n5tA9wOSsX5b10EwGmpNkxX1EY8ppC/3DW2w8fzUVAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T09:43:49.448478Z"},"content_sha256":"47ce2e377c3aa936360f16686cfb2dbebaaef821f924f9d5f4add8f40244427a","schema_version":"1.0","event_id":"sha256:47ce2e377c3aa936360f16686cfb2dbebaaef821f924f9d5f4add8f40244427a"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:O3HA6ZB6MJMUSDL7ZNOLJG6W5F","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Heterogeneous teleportation with laser and quantum light sources","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"A. J. Bennett, A. J. Shields, D. A. Ritchie, I. Farrer, J. Nilsson, J. Skiba-Szymanska, R. M. Stevenson","submitted_at":"2013-07-11T17:49:59Z","abstract_excerpt":"Quantum information technology is set to transform critical network security using quantum cryptography, and complex scientific and engineering simulations with quantum computing. Quantum computer nodes may be based on a variety of systems, such as linear optics, ions, or solid state architectures such as NV-centers in diamond, semiconductor quantum dots or spins in silicon. Interfacing any of these platforms with photonic qubits in secure quantum networks will require quantum teleportation protocols to transfer the information, and matter-light teleportation has for some of these systems been"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1307.3197","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:18:40Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3OG7ovZSraNCtyEzTyabNskrYTskNcstfGMSk5atflr7S70HYG1qHFITQqAVKcebnldHI4TE090nea1Ed9+5DA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T09:43:49.448826Z"},"content_sha256":"a6fd348e7a9551d39d5c370c9cbbae2f23d641d7b4687990067fc232d5260a88","schema_version":"1.0","event_id":"sha256:a6fd348e7a9551d39d5c370c9cbbae2f23d641d7b4687990067fc232d5260a88"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/O3HA6ZB6MJMUSDL7ZNOLJG6W5F/bundle.json","state_url":"https://pith.science/pith/O3HA6ZB6MJMUSDL7ZNOLJG6W5F/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/O3HA6ZB6MJMUSDL7ZNOLJG6W5F/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T09:43:49Z","links":{"resolver":"https://pith.science/pith/O3HA6ZB6MJMUSDL7ZNOLJG6W5F","bundle":"https://pith.science/pith/O3HA6ZB6MJMUSDL7ZNOLJG6W5F/bundle.json","state":"https://pith.science/pith/O3HA6ZB6MJMUSDL7ZNOLJG6W5F/state.json","well_known_bundle":"https://pith.science/.well-known/pith/O3HA6ZB6MJMUSDL7ZNOLJG6W5F/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:O3HA6ZB6MJMUSDL7ZNOLJG6W5F","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"308d4c71c514782cc99360e2543a2f9a95b2550e5a76768039103550e7bac563","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2013-07-11T17:49:59Z","title_canon_sha256":"979dd669b66efc64bdd9230255bbe50651c53cd9c131ddfb5d928fd98bbb231d"},"schema_version":"1.0","source":{"id":"1307.3197","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1307.3197","created_at":"2026-05-18T03:18:40Z"},{"alias_kind":"arxiv_version","alias_value":"1307.3197v1","created_at":"2026-05-18T03:18:40Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1307.3197","created_at":"2026-05-18T03:18:40Z"},{"alias_kind":"pith_short_12","alias_value":"O3HA6ZB6MJMU","created_at":"2026-05-18T12:27:54Z"},{"alias_kind":"pith_short_16","alias_value":"O3HA6ZB6MJMUSDL7","created_at":"2026-05-18T12:27:54Z"},{"alias_kind":"pith_short_8","alias_value":"O3HA6ZB6","created_at":"2026-05-18T12:27:54Z"}],"graph_snapshots":[{"event_id":"sha256:a6fd348e7a9551d39d5c370c9cbbae2f23d641d7b4687990067fc232d5260a88","target":"graph","created_at":"2026-05-18T03:18:40Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Quantum information technology is set to transform critical network security using quantum cryptography, and complex scientific and engineering simulations with quantum computing. Quantum computer nodes may be based on a variety of systems, such as linear optics, ions, or solid state architectures such as NV-centers in diamond, semiconductor quantum dots or spins in silicon. Interfacing any of these platforms with photonic qubits in secure quantum networks will require quantum teleportation protocols to transfer the information, and matter-light teleportation has for some of these systems been","authors_text":"A. J. Bennett, A. J. Shields, D. A. Ritchie, I. Farrer, J. Nilsson, J. Skiba-Szymanska, R. M. Stevenson","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2013-07-11T17:49:59Z","title":"Heterogeneous teleportation with laser and quantum light sources"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1307.3197","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:47ce2e377c3aa936360f16686cfb2dbebaaef821f924f9d5f4add8f40244427a","target":"record","created_at":"2026-05-18T03:18:40Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"308d4c71c514782cc99360e2543a2f9a95b2550e5a76768039103550e7bac563","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2013-07-11T17:49:59Z","title_canon_sha256":"979dd669b66efc64bdd9230255bbe50651c53cd9c131ddfb5d928fd98bbb231d"},"schema_version":"1.0","source":{"id":"1307.3197","kind":"arxiv","version":1}},"canonical_sha256":"76ce0f643e6259490d7fcb5cb49bd6e969d5b2780f63c0d7ef4e5d3f71ede884","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"76ce0f643e6259490d7fcb5cb49bd6e969d5b2780f63c0d7ef4e5d3f71ede884","first_computed_at":"2026-05-18T03:18:40.889436Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:18:40.889436Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"PgnzPScLn8BFtlcvsBbu7cOkMz07FgwGcWcNfSU3IYySF6bC/T9Ror47nvHdLQx2ivddKg29FeQ419/Ho06UBg==","signature_status":"signed_v1","signed_at":"2026-05-18T03:18:40.890117Z","signed_message":"canonical_sha256_bytes"},"source_id":"1307.3197","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:47ce2e377c3aa936360f16686cfb2dbebaaef821f924f9d5f4add8f40244427a","sha256:a6fd348e7a9551d39d5c370c9cbbae2f23d641d7b4687990067fc232d5260a88"],"state_sha256":"3ee52b907b92b4d0db90a7df127a719b65b7e59f7be9ecb6a61bf34379389ad9"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wg02tza1curC0WeTGJC87kHW6h530dKMb/JdNgA/lBKZhifPs9RH3iWyJxwErSN6WC+BlsQgkKWa9whsD7NLCg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T09:43:49.451096Z","bundle_sha256":"813cd915f2bc6b772d62bee28c4ebfba643b47b01464b3354aefaa6f63ebcf36"}}