{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:PLOR2KVEKST7WBO55UH5U244FW","short_pith_number":"pith:PLOR2KVE","canonical_record":{"source":{"id":"1507.08930","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-07-31T16:19:37Z","cross_cats_sorted":[],"title_canon_sha256":"e3dda2d44c65d6b469adb78f7efad5bdcaf079616cba82fe1d911bf914b6cfca","abstract_canon_sha256":"3698e4b2868d533703246d58da5333fa8b5452544d646c30ad11e718639992f6"},"schema_version":"1.0"},"canonical_sha256":"7add1d2aa454a7fb05dded0fda6b9c2d9f2c4235b8cd64502bafc7f4c272bc9b","source":{"kind":"arxiv","id":"1507.08930","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1507.08930","created_at":"2026-05-18T01:26:42Z"},{"alias_kind":"arxiv_version","alias_value":"1507.08930v1","created_at":"2026-05-18T01:26:42Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1507.08930","created_at":"2026-05-18T01:26:42Z"},{"alias_kind":"pith_short_12","alias_value":"PLOR2KVEKST7","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_16","alias_value":"PLOR2KVEKST7WBO5","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_8","alias_value":"PLOR2KVE","created_at":"2026-05-18T12:29:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:PLOR2KVEKST7WBO55UH5U244FW","target":"record","payload":{"canonical_record":{"source":{"id":"1507.08930","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-07-31T16:19:37Z","cross_cats_sorted":[],"title_canon_sha256":"e3dda2d44c65d6b469adb78f7efad5bdcaf079616cba82fe1d911bf914b6cfca","abstract_canon_sha256":"3698e4b2868d533703246d58da5333fa8b5452544d646c30ad11e718639992f6"},"schema_version":"1.0"},"canonical_sha256":"7add1d2aa454a7fb05dded0fda6b9c2d9f2c4235b8cd64502bafc7f4c272bc9b","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:26:42.141310Z","signature_b64":"1rx2zsniJQdBsIxh6PzIGCXKhX/39jgEhDIzhhPyYqO7HQx+HL371aM8d42vkQGzpNNlDaJQWFGztfi3rw0rDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"7add1d2aa454a7fb05dded0fda6b9c2d9f2c4235b8cd64502bafc7f4c272bc9b","last_reissued_at":"2026-05-18T01:26:42.140647Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:26:42.140647Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1507.08930","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:26:42Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"D2JfHT5HyEI0MHUJbNSL5ZglgRCwyN1+ZAC23yOQBoMBCzgKN6HXoSqLXJ/IwPbR0WLWZDC/HqAKxdTpaxP1Cg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T05:22:38.753008Z"},"content_sha256":"2b308214ade81b4d6ae71d3b463137c622db2184f540897d12e3854930b8f7c1","schema_version":"1.0","event_id":"sha256:2b308214ade81b4d6ae71d3b463137c622db2184f540897d12e3854930b8f7c1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:PLOR2KVEKST7WBO55UH5U244FW","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Practical security analysis of two-way quantum key distribution protocols based on non-orthogonal states","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"C. Ivan Henao, Roberto M. Serra","submitted_at":"2015-07-31T16:19:37Z","abstract_excerpt":"Within the broad research scenario of quantum secure communication, Two-Way Quantum Key Distribution (TWQKD) is a relatively new proposal for sharing secret keys that is not fully explored yet. We analyse the security of TWQKD schemes that use qubits prepared in non-orthogonal states to transmit the key. Investigating protocols that employ an arbitrary number of bases for the channel preparation, we show, in particular, that the security of the LM05 protocol can not be improved by the use of more than two preparation bases. We also provide a new proof of unconditional security for a determinis"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1507.08930","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:26:42Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"j7cckziHMNpDAAEfnwcHIJs6kEB7XUqdUA5HIArYaXIZxkYOZcIh6aqLKSPHW+15QPxxN+QYpZoEddr/ojBmBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T05:22:38.753596Z"},"content_sha256":"00b76858c0d26e2b5754c100ae43aebed26019a5f917ead4ddc26658033ec94f","schema_version":"1.0","event_id":"sha256:00b76858c0d26e2b5754c100ae43aebed26019a5f917ead4ddc26658033ec94f"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/PLOR2KVEKST7WBO55UH5U244FW/bundle.json","state_url":"https://pith.science/pith/PLOR2KVEKST7WBO55UH5U244FW/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/PLOR2KVEKST7WBO55UH5U244FW/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T05:22:38Z","links":{"resolver":"https://pith.science/pith/PLOR2KVEKST7WBO55UH5U244FW","bundle":"https://pith.science/pith/PLOR2KVEKST7WBO55UH5U244FW/bundle.json","state":"https://pith.science/pith/PLOR2KVEKST7WBO55UH5U244FW/state.json","well_known_bundle":"https://pith.science/.well-known/pith/PLOR2KVEKST7WBO55UH5U244FW/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:PLOR2KVEKST7WBO55UH5U244FW","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"3698e4b2868d533703246d58da5333fa8b5452544d646c30ad11e718639992f6","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-07-31T16:19:37Z","title_canon_sha256":"e3dda2d44c65d6b469adb78f7efad5bdcaf079616cba82fe1d911bf914b6cfca"},"schema_version":"1.0","source":{"id":"1507.08930","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1507.08930","created_at":"2026-05-18T01:26:42Z"},{"alias_kind":"arxiv_version","alias_value":"1507.08930v1","created_at":"2026-05-18T01:26:42Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1507.08930","created_at":"2026-05-18T01:26:42Z"},{"alias_kind":"pith_short_12","alias_value":"PLOR2KVEKST7","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_16","alias_value":"PLOR2KVEKST7WBO5","created_at":"2026-05-18T12:29:37Z"},{"alias_kind":"pith_short_8","alias_value":"PLOR2KVE","created_at":"2026-05-18T12:29:37Z"}],"graph_snapshots":[{"event_id":"sha256:00b76858c0d26e2b5754c100ae43aebed26019a5f917ead4ddc26658033ec94f","target":"graph","created_at":"2026-05-18T01:26:42Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Within the broad research scenario of quantum secure communication, Two-Way Quantum Key Distribution (TWQKD) is a relatively new proposal for sharing secret keys that is not fully explored yet. We analyse the security of TWQKD schemes that use qubits prepared in non-orthogonal states to transmit the key. Investigating protocols that employ an arbitrary number of bases for the channel preparation, we show, in particular, that the security of the LM05 protocol can not be improved by the use of more than two preparation bases. We also provide a new proof of unconditional security for a determinis","authors_text":"C. Ivan Henao, Roberto M. Serra","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-07-31T16:19:37Z","title":"Practical security analysis of two-way quantum key distribution protocols based on non-orthogonal states"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1507.08930","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:2b308214ade81b4d6ae71d3b463137c622db2184f540897d12e3854930b8f7c1","target":"record","created_at":"2026-05-18T01:26:42Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"3698e4b2868d533703246d58da5333fa8b5452544d646c30ad11e718639992f6","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-07-31T16:19:37Z","title_canon_sha256":"e3dda2d44c65d6b469adb78f7efad5bdcaf079616cba82fe1d911bf914b6cfca"},"schema_version":"1.0","source":{"id":"1507.08930","kind":"arxiv","version":1}},"canonical_sha256":"7add1d2aa454a7fb05dded0fda6b9c2d9f2c4235b8cd64502bafc7f4c272bc9b","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"7add1d2aa454a7fb05dded0fda6b9c2d9f2c4235b8cd64502bafc7f4c272bc9b","first_computed_at":"2026-05-18T01:26:42.140647Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:26:42.140647Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"1rx2zsniJQdBsIxh6PzIGCXKhX/39jgEhDIzhhPyYqO7HQx+HL371aM8d42vkQGzpNNlDaJQWFGztfi3rw0rDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T01:26:42.141310Z","signed_message":"canonical_sha256_bytes"},"source_id":"1507.08930","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:2b308214ade81b4d6ae71d3b463137c622db2184f540897d12e3854930b8f7c1","sha256:00b76858c0d26e2b5754c100ae43aebed26019a5f917ead4ddc26658033ec94f"],"state_sha256":"35839da204f0ef36b657974ad6647db7d08efe55f55edda068e1438543c6ea75"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8vacfumgdec5s3yfsnpFLq8dIMvhGmg34YuF14f3lzCtvqyeJZxsjVxXZy+ZqafXBm1rk3i0KUcGv6xF4XR8BA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T05:22:38.755424Z","bundle_sha256":"ec0aa80657ba1d26ef0df279bd5a6a913c1884710bf666ea026e808c92753c76"}}