{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2016:UY77SYL3F6VC4NX6V53DJ6NKZY","short_pith_number":"pith:UY77SYL3","canonical_record":{"source":{"id":"1602.02914","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-02-09T09:40:43Z","cross_cats_sorted":[],"title_canon_sha256":"5bd012b3ecb997135b18416de5dec97d06a7f68386cf7c69ad0ea60407ed8ef5","abstract_canon_sha256":"56955d97127b532b702d8b41191686713d939d49ef81d7e97f6d6d67eea01f11"},"schema_version":"1.0"},"canonical_sha256":"a63ff9617b2faa2e36feaf7634f9aace35059946af9ddab915d173df6469d4e8","source":{"kind":"arxiv","id":"1602.02914","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1602.02914","created_at":"2026-05-18T01:16:14Z"},{"alias_kind":"arxiv_version","alias_value":"1602.02914v1","created_at":"2026-05-18T01:16:14Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1602.02914","created_at":"2026-05-18T01:16:14Z"},{"alias_kind":"pith_short_12","alias_value":"UY77SYL3F6VC","created_at":"2026-05-18T12:30:46Z"},{"alias_kind":"pith_short_16","alias_value":"UY77SYL3F6VC4NX6","created_at":"2026-05-18T12:30:46Z"},{"alias_kind":"pith_short_8","alias_value":"UY77SYL3","created_at":"2026-05-18T12:30:46Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2016:UY77SYL3F6VC4NX6V53DJ6NKZY","target":"record","payload":{"canonical_record":{"source":{"id":"1602.02914","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-02-09T09:40:43Z","cross_cats_sorted":[],"title_canon_sha256":"5bd012b3ecb997135b18416de5dec97d06a7f68386cf7c69ad0ea60407ed8ef5","abstract_canon_sha256":"56955d97127b532b702d8b41191686713d939d49ef81d7e97f6d6d67eea01f11"},"schema_version":"1.0"},"canonical_sha256":"a63ff9617b2faa2e36feaf7634f9aace35059946af9ddab915d173df6469d4e8","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:16:14.231968Z","signature_b64":"ygBX9MOyvhW/nRBT7oOVfxY1q4Ow+9b6iaVdnWmUfr/vg9pAhuU6RBPYRoIEt+lrThhNF+5jc5IIYhgSlaAiDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a63ff9617b2faa2e36feaf7634f9aace35059946af9ddab915d173df6469d4e8","last_reissued_at":"2026-05-18T01:16:14.231536Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:16:14.231536Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1602.02914","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:16:14Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2nZBNw1SMI31Booan2hOORFz1vEV8wk8TkrzD5WkFfulPs7Sy23kd3M1zr4D07z7IVW5LgzRa+BBAPFCpLvmDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T14:20:29.150546Z"},"content_sha256":"9855ba92434aa6fc8705542e9870908756551cf147443b7a529035d5517fba3e","schema_version":"1.0","event_id":"sha256:9855ba92434aa6fc8705542e9870908756551cf147443b7a529035d5517fba3e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2016:UY77SYL3F6VC4NX6V53DJ6NKZY","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Security of quantum key distribution with non-I.I.D. light sources","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Akihiro Mizutani, Kiyoshi Tamaki, Nobuyuki Imoto, Rikizo Ikuta, Takashi Yamamoto, Yuichi Nagamatsu","submitted_at":"2016-02-09T09:40:43Z","abstract_excerpt":"Although quantum key distribution (QKD) is theoretically secure, there is a gap between the theory and practice. In fact, real-life QKD may not be secure because component devices in QKD systems may deviate from the theoretical models assumed in security proofs. To solve this problem, it is necessary to construct the security proof under realistic assumptions on the source and measurement unit. In this paper, we prove the security of a QKD protocol under practical assumptions on the source that accommodate fluctuation of the phase and intensity modulations. As long as our assumptions hold, it "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1602.02914","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:16:14Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"L44bn0qLoL/zLJfxbba8TU289eWgEH1ORCGvOth6+sYhgOSt9RvIBzDJrBy1XwHKqbiitcHr3pgbiCx6aigYCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T14:20:29.151139Z"},"content_sha256":"c28f7585df44e42f23d61bffd16a7c9144ef2785357aa3549720665e9f75175a","schema_version":"1.0","event_id":"sha256:c28f7585df44e42f23d61bffd16a7c9144ef2785357aa3549720665e9f75175a"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/UY77SYL3F6VC4NX6V53DJ6NKZY/bundle.json","state_url":"https://pith.science/pith/UY77SYL3F6VC4NX6V53DJ6NKZY/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/UY77SYL3F6VC4NX6V53DJ6NKZY/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T14:20:29Z","links":{"resolver":"https://pith.science/pith/UY77SYL3F6VC4NX6V53DJ6NKZY","bundle":"https://pith.science/pith/UY77SYL3F6VC4NX6V53DJ6NKZY/bundle.json","state":"https://pith.science/pith/UY77SYL3F6VC4NX6V53DJ6NKZY/state.json","well_known_bundle":"https://pith.science/.well-known/pith/UY77SYL3F6VC4NX6V53DJ6NKZY/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:UY77SYL3F6VC4NX6V53DJ6NKZY","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"56955d97127b532b702d8b41191686713d939d49ef81d7e97f6d6d67eea01f11","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-02-09T09:40:43Z","title_canon_sha256":"5bd012b3ecb997135b18416de5dec97d06a7f68386cf7c69ad0ea60407ed8ef5"},"schema_version":"1.0","source":{"id":"1602.02914","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1602.02914","created_at":"2026-05-18T01:16:14Z"},{"alias_kind":"arxiv_version","alias_value":"1602.02914v1","created_at":"2026-05-18T01:16:14Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1602.02914","created_at":"2026-05-18T01:16:14Z"},{"alias_kind":"pith_short_12","alias_value":"UY77SYL3F6VC","created_at":"2026-05-18T12:30:46Z"},{"alias_kind":"pith_short_16","alias_value":"UY77SYL3F6VC4NX6","created_at":"2026-05-18T12:30:46Z"},{"alias_kind":"pith_short_8","alias_value":"UY77SYL3","created_at":"2026-05-18T12:30:46Z"}],"graph_snapshots":[{"event_id":"sha256:c28f7585df44e42f23d61bffd16a7c9144ef2785357aa3549720665e9f75175a","target":"graph","created_at":"2026-05-18T01:16:14Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Although quantum key distribution (QKD) is theoretically secure, there is a gap between the theory and practice. In fact, real-life QKD may not be secure because component devices in QKD systems may deviate from the theoretical models assumed in security proofs. To solve this problem, it is necessary to construct the security proof under realistic assumptions on the source and measurement unit. In this paper, we prove the security of a QKD protocol under practical assumptions on the source that accommodate fluctuation of the phase and intensity modulations. As long as our assumptions hold, it ","authors_text":"Akihiro Mizutani, Kiyoshi Tamaki, Nobuyuki Imoto, Rikizo Ikuta, Takashi Yamamoto, Yuichi Nagamatsu","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-02-09T09:40:43Z","title":"Security of quantum key distribution with non-I.I.D. light sources"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1602.02914","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:9855ba92434aa6fc8705542e9870908756551cf147443b7a529035d5517fba3e","target":"record","created_at":"2026-05-18T01:16:14Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"56955d97127b532b702d8b41191686713d939d49ef81d7e97f6d6d67eea01f11","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2016-02-09T09:40:43Z","title_canon_sha256":"5bd012b3ecb997135b18416de5dec97d06a7f68386cf7c69ad0ea60407ed8ef5"},"schema_version":"1.0","source":{"id":"1602.02914","kind":"arxiv","version":1}},"canonical_sha256":"a63ff9617b2faa2e36feaf7634f9aace35059946af9ddab915d173df6469d4e8","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"a63ff9617b2faa2e36feaf7634f9aace35059946af9ddab915d173df6469d4e8","first_computed_at":"2026-05-18T01:16:14.231536Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:16:14.231536Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"ygBX9MOyvhW/nRBT7oOVfxY1q4Ow+9b6iaVdnWmUfr/vg9pAhuU6RBPYRoIEt+lrThhNF+5jc5IIYhgSlaAiDg==","signature_status":"signed_v1","signed_at":"2026-05-18T01:16:14.231968Z","signed_message":"canonical_sha256_bytes"},"source_id":"1602.02914","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:9855ba92434aa6fc8705542e9870908756551cf147443b7a529035d5517fba3e","sha256:c28f7585df44e42f23d61bffd16a7c9144ef2785357aa3549720665e9f75175a"],"state_sha256":"c8d31e8031c05f95c5a90567079706533796960a61558a00e22963cca34dc67d"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RaPLeEQX0Zpl2vprYL0O0BJsHP5j7HfZH067lZMvadiIpRjIKbyqf3a45S+ykzMJVMWFGNzqXSkowiB3ydnUBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T14:20:29.154049Z","bundle_sha256":"e8cd43bb463484c5a96166d743e106763393bd78e3a98e8aee1f58f1d6cca2fb"}}