{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2012:PEBCWVLZPU6IAL5YI3OL4HF3Z2","short_pith_number":"pith:PEBCWVLZ","canonical_record":{"source":{"id":"1207.4467","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-07-18T19:55:19Z","cross_cats_sorted":["cs.IT","math.IT"],"title_canon_sha256":"dd7b71a2e1557512afa75a3238f9b7e0603d5bc3ddef7282057f0a9553832c2a","abstract_canon_sha256":"03092f17fc9b2cb44d72861db6969199291d894c41ba18f6f2d2c0ab57da9126"},"schema_version":"1.0"},"canonical_sha256":"79022b55797d3c802fb846dcbe1cbbceb312873c73a85d933a83288635152cbd","source":{"kind":"arxiv","id":"1207.4467","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1207.4467","created_at":"2026-05-18T03:49:57Z"},{"alias_kind":"arxiv_version","alias_value":"1207.4467v1","created_at":"2026-05-18T03:49:57Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1207.4467","created_at":"2026-05-18T03:49:57Z"},{"alias_kind":"pith_short_12","alias_value":"PEBCWVLZPU6I","created_at":"2026-05-18T12:27:18Z"},{"alias_kind":"pith_short_16","alias_value":"PEBCWVLZPU6IAL5Y","created_at":"2026-05-18T12:27:18Z"},{"alias_kind":"pith_short_8","alias_value":"PEBCWVLZ","created_at":"2026-05-18T12:27:18Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2012:PEBCWVLZPU6IAL5YI3OL4HF3Z2","target":"record","payload":{"canonical_record":{"source":{"id":"1207.4467","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-07-18T19:55:19Z","cross_cats_sorted":["cs.IT","math.IT"],"title_canon_sha256":"dd7b71a2e1557512afa75a3238f9b7e0603d5bc3ddef7282057f0a9553832c2a","abstract_canon_sha256":"03092f17fc9b2cb44d72861db6969199291d894c41ba18f6f2d2c0ab57da9126"},"schema_version":"1.0"},"canonical_sha256":"79022b55797d3c802fb846dcbe1cbbceb312873c73a85d933a83288635152cbd","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:49:57.704180Z","signature_b64":"5jHigSVBlBOF7c3r2NuIeN7atKHooC9FrW28TEJY6c8G/QHPqbyaPWp5ezXUKcmy0DJOxLJxPwzwaySCxQlfCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"79022b55797d3c802fb846dcbe1cbbceb312873c73a85d933a83288635152cbd","last_reissued_at":"2026-05-18T03:49:57.703373Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:49:57.703373Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1207.4467","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:49:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"R+OxBUEGlw12KNpGYVxAMTv5Lp+VR2ZH2s8U51uu3QG5sw+pO0YJ68xgK7aUI0BhoBEm2xDR8i4fM5Co/YhZDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:55:55.874728Z"},"content_sha256":"770488c4ca0468f7130c18e66b2d8a0beaf2dbe4417f44c304f2ea0ca335a853","schema_version":"1.0","event_id":"sha256:770488c4ca0468f7130c18e66b2d8a0beaf2dbe4417f44c304f2ea0ca335a853"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2012:PEBCWVLZPU6IAL5YI3OL4HF3Z2","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Information Geometric Security Analysis of Differential Phase Shift Quantum Key Distribution Protocol","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.IT","math.IT"],"primary_cat":"quant-ph","authors_text":"Laszlo Gyongyosi, Sandor Imre","submitted_at":"2012-07-18T19:55:19Z","abstract_excerpt":"This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current network security applications, hence it's practical implementation is much easier with the current optical devices and optical networks. The proposed algorithm could be a very valuable tool to answer the st"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1207.4467","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:49:57Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"a/6FVduUbJHD3CuM/eHTB5MBZSY5rcmUsLMPu7mHbT1EJKyXqnUOJp0D9iCJRSSXKBKJM+m0lIpUn/yFXGcbDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T21:55:55.875389Z"},"content_sha256":"3d6143604e50855eea2546263749d2fb8c853204470ce4d24e93a18fe7a620f7","schema_version":"1.0","event_id":"sha256:3d6143604e50855eea2546263749d2fb8c853204470ce4d24e93a18fe7a620f7"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/PEBCWVLZPU6IAL5YI3OL4HF3Z2/bundle.json","state_url":"https://pith.science/pith/PEBCWVLZPU6IAL5YI3OL4HF3Z2/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/PEBCWVLZPU6IAL5YI3OL4HF3Z2/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T21:55:55Z","links":{"resolver":"https://pith.science/pith/PEBCWVLZPU6IAL5YI3OL4HF3Z2","bundle":"https://pith.science/pith/PEBCWVLZPU6IAL5YI3OL4HF3Z2/bundle.json","state":"https://pith.science/pith/PEBCWVLZPU6IAL5YI3OL4HF3Z2/state.json","well_known_bundle":"https://pith.science/.well-known/pith/PEBCWVLZPU6IAL5YI3OL4HF3Z2/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2012:PEBCWVLZPU6IAL5YI3OL4HF3Z2","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"03092f17fc9b2cb44d72861db6969199291d894c41ba18f6f2d2c0ab57da9126","cross_cats_sorted":["cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-07-18T19:55:19Z","title_canon_sha256":"dd7b71a2e1557512afa75a3238f9b7e0603d5bc3ddef7282057f0a9553832c2a"},"schema_version":"1.0","source":{"id":"1207.4467","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1207.4467","created_at":"2026-05-18T03:49:57Z"},{"alias_kind":"arxiv_version","alias_value":"1207.4467v1","created_at":"2026-05-18T03:49:57Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1207.4467","created_at":"2026-05-18T03:49:57Z"},{"alias_kind":"pith_short_12","alias_value":"PEBCWVLZPU6I","created_at":"2026-05-18T12:27:18Z"},{"alias_kind":"pith_short_16","alias_value":"PEBCWVLZPU6IAL5Y","created_at":"2026-05-18T12:27:18Z"},{"alias_kind":"pith_short_8","alias_value":"PEBCWVLZ","created_at":"2026-05-18T12:27:18Z"}],"graph_snapshots":[{"event_id":"sha256:3d6143604e50855eea2546263749d2fb8c853204470ce4d24e93a18fe7a620f7","target":"graph","created_at":"2026-05-18T03:49:57Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current network security applications, hence it's practical implementation is much easier with the current optical devices and optical networks. The proposed algorithm could be a very valuable tool to answer the st","authors_text":"Laszlo Gyongyosi, Sandor Imre","cross_cats":["cs.IT","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-07-18T19:55:19Z","title":"Information Geometric Security Analysis of Differential Phase Shift Quantum Key Distribution Protocol"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1207.4467","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:770488c4ca0468f7130c18e66b2d8a0beaf2dbe4417f44c304f2ea0ca335a853","target":"record","created_at":"2026-05-18T03:49:57Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"03092f17fc9b2cb44d72861db6969199291d894c41ba18f6f2d2c0ab57da9126","cross_cats_sorted":["cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2012-07-18T19:55:19Z","title_canon_sha256":"dd7b71a2e1557512afa75a3238f9b7e0603d5bc3ddef7282057f0a9553832c2a"},"schema_version":"1.0","source":{"id":"1207.4467","kind":"arxiv","version":1}},"canonical_sha256":"79022b55797d3c802fb846dcbe1cbbceb312873c73a85d933a83288635152cbd","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"79022b55797d3c802fb846dcbe1cbbceb312873c73a85d933a83288635152cbd","first_computed_at":"2026-05-18T03:49:57.703373Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:49:57.703373Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"5jHigSVBlBOF7c3r2NuIeN7atKHooC9FrW28TEJY6c8G/QHPqbyaPWp5ezXUKcmy0DJOxLJxPwzwaySCxQlfCg==","signature_status":"signed_v1","signed_at":"2026-05-18T03:49:57.704180Z","signed_message":"canonical_sha256_bytes"},"source_id":"1207.4467","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:770488c4ca0468f7130c18e66b2d8a0beaf2dbe4417f44c304f2ea0ca335a853","sha256:3d6143604e50855eea2546263749d2fb8c853204470ce4d24e93a18fe7a620f7"],"state_sha256":"afca51cf9e5f0573baa486b447c3987359d95214b528b3cf046afb76327b03c2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ArMamX0qDcXqgp7qnkrYQ7WWUOMsCZMOHewUmCcPc48Jk/BrVPpOaCPzwknqS08nqYhMl2Vm53d1y80YlwTmDQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T21:55:55.878853Z","bundle_sha256":"9cd9f98be7d3e9874e5bf9ef1ba3b41b7eaa541a96285d1c0aa2599729619611"}}