{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2010:UP7TUEOCJJOUEYVGAMPBADJRIC","short_pith_number":"pith:UP7TUEOC","schema_version":"1.0","canonical_sha256":"a3ff3a11c24a5d4262a6031e100d3140aa421fd317f6f4e060ee38415c862195","source":{"kind":"arxiv","id":"1011.4474","version":3},"attestation_state":"computed","paper":{"title":"Private Randomness Expansion With Untrusted Devices","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Adrian Kent, Roger Colbeck","submitted_at":"2010-11-19T17:04:37Z","abstract_excerpt":"Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beam-splitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here we seek to go beyond this limit"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1011.4474","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2010-11-19T17:04:37Z","cross_cats_sorted":[],"title_canon_sha256":"cb8a0a57c71fb4aabdd92c249a2e1def90e1ca5acbbed5c6e3f5e283c4c1b94f","abstract_canon_sha256":"053729b51f40dc134c4ade73f605423ed9cc1825fdf3f9ebb4fc0d6ce3b3b21a"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:27:37.854623Z","signature_b64":"o+tsxwZw/FilIi/28RcFm3uKcN/jjBPJbWhhPQQFX99PYa9M943mWg/pTV8MMacB+pg7h9/RYmKNip3zWb5RDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a3ff3a11c24a5d4262a6031e100d3140aa421fd317f6f4e060ee38415c862195","last_reissued_at":"2026-05-18T04:27:37.854144Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:27:37.854144Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Private Randomness Expansion With Untrusted Devices","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Adrian Kent, Roger Colbeck","submitted_at":"2010-11-19T17:04:37Z","abstract_excerpt":"Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beam-splitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here we seek to go beyond this limit"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1011.4474","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1011.4474","created_at":"2026-05-18T04:27:37.854209+00:00"},{"alias_kind":"arxiv_version","alias_value":"1011.4474v3","created_at":"2026-05-18T04:27:37.854209+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1011.4474","created_at":"2026-05-18T04:27:37.854209+00:00"},{"alias_kind":"pith_short_12","alias_value":"UP7TUEOCJJOU","created_at":"2026-05-18T12:26:15.391820+00:00"},{"alias_kind":"pith_short_16","alias_value":"UP7TUEOCJJOUEYVG","created_at":"2026-05-18T12:26:15.391820+00:00"},{"alias_kind":"pith_short_8","alias_value":"UP7TUEOC","created_at":"2026-05-18T12:26:15.391820+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC","json":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC.json","graph_json":"https://pith.science/api/pith-number/UP7TUEOCJJOUEYVGAMPBADJRIC/graph.json","events_json":"https://pith.science/api/pith-number/UP7TUEOCJJOUEYVGAMPBADJRIC/events.json","paper":"https://pith.science/paper/UP7TUEOC"},"agent_actions":{"view_html":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC","download_json":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC.json","view_paper":"https://pith.science/paper/UP7TUEOC","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1011.4474&json=true","fetch_graph":"https://pith.science/api/pith-number/UP7TUEOCJJOUEYVGAMPBADJRIC/graph.json","fetch_events":"https://pith.science/api/pith-number/UP7TUEOCJJOUEYVGAMPBADJRIC/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC/action/timestamp_anchor","attest_storage":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC/action/storage_attestation","attest_author":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC/action/author_attestation","sign_citation":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC/action/citation_signature","submit_replication":"https://pith.science/pith/UP7TUEOCJJOUEYVGAMPBADJRIC/action/replication_record"}},"created_at":"2026-05-18T04:27:37.854209+00:00","updated_at":"2026-05-18T04:27:37.854209+00:00"}