{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2015:SCUDL67SQWGYFMY7KPUEILL5WR","short_pith_number":"pith:SCUDL67S","schema_version":"1.0","canonical_sha256":"90a835fbf2858d82b31f53e8442d7db44b5d61650567a5786c0c1b4143d44af0","source":{"kind":"arxiv","id":"1511.06519","version":1},"attestation_state":"computed","paper":{"title":"Quantum Key Distribution in the Non-Asymptotic Regime","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Ramona Wolf","submitted_at":"2015-11-20T08:19:51Z","abstract_excerpt":"This is a Bachelor's thesis on quantum key distribution in the non-asymptotic regime submitted to the Leibniz Universit\\\"at Hannover, Germany. It deals with the question how to generate a key to encrypt messages between two honest parties that an eavesdropper does not gain any information about. The purpose of this thesis is to give an overview over the current state of the prepare and measure quantum key distribution protocol and its security proof with a specific focus on the non-asymptotic case. Therefore, we present the different steps of the protocol and retrace them with the help of the "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1511.06519","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-11-20T08:19:51Z","cross_cats_sorted":[],"title_canon_sha256":"47a7a15e46c5b0b495d2ac1a53c032cf6451bcb2098e0b55330f04dbce7cd68e","abstract_canon_sha256":"cad83e81a4837ad8f12437f0779e0e945740bea7bd09c5631b0faf96917a85f5"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:26:24.374850Z","signature_b64":"miRUHOYGfSENlVWxIaEfKZFUV1qfVRH7puoFXKPPVq/4vMg9eTkmsRjhgcMvJkVtYrKQAYrp0/Nl/+97Ig48Ag==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"90a835fbf2858d82b31f53e8442d7db44b5d61650567a5786c0c1b4143d44af0","last_reissued_at":"2026-05-18T01:26:24.374254Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:26:24.374254Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Quantum Key Distribution in the Non-Asymptotic Regime","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Ramona Wolf","submitted_at":"2015-11-20T08:19:51Z","abstract_excerpt":"This is a Bachelor's thesis on quantum key distribution in the non-asymptotic regime submitted to the Leibniz Universit\\\"at Hannover, Germany. It deals with the question how to generate a key to encrypt messages between two honest parties that an eavesdropper does not gain any information about. The purpose of this thesis is to give an overview over the current state of the prepare and measure quantum key distribution protocol and its security proof with a specific focus on the non-asymptotic case. Therefore, we present the different steps of the protocol and retrace them with the help of the "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1511.06519","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1511.06519","created_at":"2026-05-18T01:26:24.374345+00:00"},{"alias_kind":"arxiv_version","alias_value":"1511.06519v1","created_at":"2026-05-18T01:26:24.374345+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1511.06519","created_at":"2026-05-18T01:26:24.374345+00:00"},{"alias_kind":"pith_short_12","alias_value":"SCUDL67SQWGY","created_at":"2026-05-18T12:29:39.896362+00:00"},{"alias_kind":"pith_short_16","alias_value":"SCUDL67SQWGYFMY7","created_at":"2026-05-18T12:29:39.896362+00:00"},{"alias_kind":"pith_short_8","alias_value":"SCUDL67S","created_at":"2026-05-18T12:29:39.896362+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR","json":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR.json","graph_json":"https://pith.science/api/pith-number/SCUDL67SQWGYFMY7KPUEILL5WR/graph.json","events_json":"https://pith.science/api/pith-number/SCUDL67SQWGYFMY7KPUEILL5WR/events.json","paper":"https://pith.science/paper/SCUDL67S"},"agent_actions":{"view_html":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR","download_json":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR.json","view_paper":"https://pith.science/paper/SCUDL67S","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1511.06519&json=true","fetch_graph":"https://pith.science/api/pith-number/SCUDL67SQWGYFMY7KPUEILL5WR/graph.json","fetch_events":"https://pith.science/api/pith-number/SCUDL67SQWGYFMY7KPUEILL5WR/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR/action/timestamp_anchor","attest_storage":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR/action/storage_attestation","attest_author":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR/action/author_attestation","sign_citation":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR/action/citation_signature","submit_replication":"https://pith.science/pith/SCUDL67SQWGYFMY7KPUEILL5WR/action/replication_record"}},"created_at":"2026-05-18T01:26:24.374345+00:00","updated_at":"2026-05-18T01:26:24.374345+00:00"}