{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:XEMITRIK37JHQYP2E56IV33YNG","short_pith_number":"pith:XEMITRIK","canonical_record":{"source":{"id":"1810.06337","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-10-15T13:13:24Z","cross_cats_sorted":["cs.IT","math.IT"],"title_canon_sha256":"e80461c53e1b1112289d4d0a48edd2fc358b43d947bb183ba839505834c3c7fd","abstract_canon_sha256":"934f5b20901cffe7017bfe7ba0531b2e6a01097bf402fe9633fb1c2933b420d9"},"schema_version":"1.0"},"canonical_sha256":"b91889c50adfd27861fa277c8aef78699df2f3a5064a8e5a84e5e23a46bab910","source":{"kind":"arxiv","id":"1810.06337","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1810.06337","created_at":"2026-05-17T23:56:45Z"},{"alias_kind":"arxiv_version","alias_value":"1810.06337v3","created_at":"2026-05-17T23:56:45Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.06337","created_at":"2026-05-17T23:56:45Z"},{"alias_kind":"pith_short_12","alias_value":"XEMITRIK37JH","created_at":"2026-05-18T12:33:01Z"},{"alias_kind":"pith_short_16","alias_value":"XEMITRIK37JHQYP2","created_at":"2026-05-18T12:33:01Z"},{"alias_kind":"pith_short_8","alias_value":"XEMITRIK","created_at":"2026-05-18T12:33:01Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:XEMITRIK37JHQYP2E56IV33YNG","target":"record","payload":{"canonical_record":{"source":{"id":"1810.06337","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-10-15T13:13:24Z","cross_cats_sorted":["cs.IT","math.IT"],"title_canon_sha256":"e80461c53e1b1112289d4d0a48edd2fc358b43d947bb183ba839505834c3c7fd","abstract_canon_sha256":"934f5b20901cffe7017bfe7ba0531b2e6a01097bf402fe9633fb1c2933b420d9"},"schema_version":"1.0"},"canonical_sha256":"b91889c50adfd27861fa277c8aef78699df2f3a5064a8e5a84e5e23a46bab910","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:56:45.300985Z","signature_b64":"eLmsXjjoimc3SlS/ssVzyL8CnPL/E9//CuyzVV0wtoKaXknlMaQBVUOMjNvxgLWxsPcJLlbe2nZBgORx+QRnCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b91889c50adfd27861fa277c8aef78699df2f3a5064a8e5a84e5e23a46bab910","last_reissued_at":"2026-05-17T23:56:45.300645Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:56:45.300645Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1810.06337","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:45Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1a8LjYZOtXLiurnacK1sw84fkYqh69SIQhiG51T+WTSiqI5lFqjDDmUOVpv3R70GPAmkO8ZZrVwFZh4Al2tDCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T18:27:49.706134Z"},"content_sha256":"16d45830f864832678a6c09ae10c66f342ffbe958d6df7992361e5ece22fbb35","schema_version":"1.0","event_id":"sha256:16d45830f864832678a6c09ae10c66f342ffbe958d6df7992361e5ece22fbb35"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:XEMITRIK37JHQYP2E56IV33YNG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Keyless Semi-Quantum Point-to-point Communication Protocol with Low Resource Requirements","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.IT","math.IT"],"primary_cat":"quant-ph","authors_text":"Amiya Nayak, Haoye Lu, Michel Barbeau","submitted_at":"2018-10-15T13:13:24Z","abstract_excerpt":"Full quantum capability devices can provide secure communications, but they are challenging to make portable given the current technology. Besides, classical portable devices are unable to construct communication channels resistant to quantum computers. Hence, communication security on portable devices cannot be guaranteed. Semi-Quantum Communication (SQC) attempts to break the quandary by lowering the receiver's required quantum capability so that secure communications can be implemented on a portable device. However, all SQC protocols have low qubit efficiency and complex hardware implementa"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.06337","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:56:45Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"ooYadQBdHLNyJ4XzA3bd9ZuwDLjHHKJeNc9Lsy+azxpBoVtq1r76CkkE58ykbwEeL9hcmw1FbVk6jAr4/KiADA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T18:27:49.706555Z"},"content_sha256":"ccf5fbc7eb406b1e3d8ce7016f98b7d48196c85ee499f483e9904c34f0d9bff3","schema_version":"1.0","event_id":"sha256:ccf5fbc7eb406b1e3d8ce7016f98b7d48196c85ee499f483e9904c34f0d9bff3"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/XEMITRIK37JHQYP2E56IV33YNG/bundle.json","state_url":"https://pith.science/pith/XEMITRIK37JHQYP2E56IV33YNG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/XEMITRIK37JHQYP2E56IV33YNG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T18:27:49Z","links":{"resolver":"https://pith.science/pith/XEMITRIK37JHQYP2E56IV33YNG","bundle":"https://pith.science/pith/XEMITRIK37JHQYP2E56IV33YNG/bundle.json","state":"https://pith.science/pith/XEMITRIK37JHQYP2E56IV33YNG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/XEMITRIK37JHQYP2E56IV33YNG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:XEMITRIK37JHQYP2E56IV33YNG","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"934f5b20901cffe7017bfe7ba0531b2e6a01097bf402fe9633fb1c2933b420d9","cross_cats_sorted":["cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-10-15T13:13:24Z","title_canon_sha256":"e80461c53e1b1112289d4d0a48edd2fc358b43d947bb183ba839505834c3c7fd"},"schema_version":"1.0","source":{"id":"1810.06337","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1810.06337","created_at":"2026-05-17T23:56:45Z"},{"alias_kind":"arxiv_version","alias_value":"1810.06337v3","created_at":"2026-05-17T23:56:45Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.06337","created_at":"2026-05-17T23:56:45Z"},{"alias_kind":"pith_short_12","alias_value":"XEMITRIK37JH","created_at":"2026-05-18T12:33:01Z"},{"alias_kind":"pith_short_16","alias_value":"XEMITRIK37JHQYP2","created_at":"2026-05-18T12:33:01Z"},{"alias_kind":"pith_short_8","alias_value":"XEMITRIK","created_at":"2026-05-18T12:33:01Z"}],"graph_snapshots":[{"event_id":"sha256:ccf5fbc7eb406b1e3d8ce7016f98b7d48196c85ee499f483e9904c34f0d9bff3","target":"graph","created_at":"2026-05-17T23:56:45Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Full quantum capability devices can provide secure communications, but they are challenging to make portable given the current technology. Besides, classical portable devices are unable to construct communication channels resistant to quantum computers. Hence, communication security on portable devices cannot be guaranteed. Semi-Quantum Communication (SQC) attempts to break the quandary by lowering the receiver's required quantum capability so that secure communications can be implemented on a portable device. However, all SQC protocols have low qubit efficiency and complex hardware implementa","authors_text":"Amiya Nayak, Haoye Lu, Michel Barbeau","cross_cats":["cs.IT","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-10-15T13:13:24Z","title":"Keyless Semi-Quantum Point-to-point Communication Protocol with Low Resource Requirements"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.06337","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:16d45830f864832678a6c09ae10c66f342ffbe958d6df7992361e5ece22fbb35","target":"record","created_at":"2026-05-17T23:56:45Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"934f5b20901cffe7017bfe7ba0531b2e6a01097bf402fe9633fb1c2933b420d9","cross_cats_sorted":["cs.IT","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2018-10-15T13:13:24Z","title_canon_sha256":"e80461c53e1b1112289d4d0a48edd2fc358b43d947bb183ba839505834c3c7fd"},"schema_version":"1.0","source":{"id":"1810.06337","kind":"arxiv","version":3}},"canonical_sha256":"b91889c50adfd27861fa277c8aef78699df2f3a5064a8e5a84e5e23a46bab910","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b91889c50adfd27861fa277c8aef78699df2f3a5064a8e5a84e5e23a46bab910","first_computed_at":"2026-05-17T23:56:45.300645Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:56:45.300645Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"eLmsXjjoimc3SlS/ssVzyL8CnPL/E9//CuyzVV0wtoKaXknlMaQBVUOMjNvxgLWxsPcJLlbe2nZBgORx+QRnCg==","signature_status":"signed_v1","signed_at":"2026-05-17T23:56:45.300985Z","signed_message":"canonical_sha256_bytes"},"source_id":"1810.06337","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:16d45830f864832678a6c09ae10c66f342ffbe958d6df7992361e5ece22fbb35","sha256:ccf5fbc7eb406b1e3d8ce7016f98b7d48196c85ee499f483e9904c34f0d9bff3"],"state_sha256":"70fbb7ddbad0b1b4527b96d836db0e23744e1c2ba44982323cc4e1bf8748a93c"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"kJPHw8Ifo98l4/YAp+j9jDU9Qx6vaRnQc4WSWDV6Bk7bA09HibnvrXwWToOS9LTibl4t0/XzfKaslbWYfJKJAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T18:27:49.709238Z","bundle_sha256":"83f25f704949b8f7bc3bddee3d4497b71edd409d30e629064d8c278e32297e0c"}}