{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:XFNIIU6TSKLJVMHYZQF67CSU4E","short_pith_number":"pith:XFNIIU6T","canonical_record":{"source":{"id":"1506.03953","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-06-12T09:31:04Z","cross_cats_sorted":[],"title_canon_sha256":"fe5b69a1c0edd3fa8bae39fca83850d98d2ccddc5ad89d78a853c03574a18ccf","abstract_canon_sha256":"42167408eca1c111b8751bb300fd0a93cd326fead67ec7946952a1006ce85a83"},"schema_version":"1.0"},"canonical_sha256":"b95a8453d392969ab0f8cc0bef8a54e12708551833d37ab191a56c4b1d47cef2","source":{"kind":"arxiv","id":"1506.03953","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1506.03953","created_at":"2026-05-18T01:19:20Z"},{"alias_kind":"arxiv_version","alias_value":"1506.03953v3","created_at":"2026-05-18T01:19:20Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1506.03953","created_at":"2026-05-18T01:19:20Z"},{"alias_kind":"pith_short_12","alias_value":"XFNIIU6TSKLJ","created_at":"2026-05-18T12:29:50Z"},{"alias_kind":"pith_short_16","alias_value":"XFNIIU6TSKLJVMHY","created_at":"2026-05-18T12:29:50Z"},{"alias_kind":"pith_short_8","alias_value":"XFNIIU6T","created_at":"2026-05-18T12:29:50Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:XFNIIU6TSKLJVMHYZQF67CSU4E","target":"record","payload":{"canonical_record":{"source":{"id":"1506.03953","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-06-12T09:31:04Z","cross_cats_sorted":[],"title_canon_sha256":"fe5b69a1c0edd3fa8bae39fca83850d98d2ccddc5ad89d78a853c03574a18ccf","abstract_canon_sha256":"42167408eca1c111b8751bb300fd0a93cd326fead67ec7946952a1006ce85a83"},"schema_version":"1.0"},"canonical_sha256":"b95a8453d392969ab0f8cc0bef8a54e12708551833d37ab191a56c4b1d47cef2","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:19:20.537483Z","signature_b64":"kNfUMurvzEGdy2AWOQtFAzjTiJAvL3pPerBb54PUlBrErkNeEpju1hnvGhSJ03wrrD+mCICaFQOv0NaPNURIDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b95a8453d392969ab0f8cc0bef8a54e12708551833d37ab191a56c4b1d47cef2","last_reissued_at":"2026-05-18T01:19:20.537037Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:19:20.537037Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1506.03953","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:19:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5f5mKwwDrL/okxrFZu43r6hbFACMumrl7hbaw5+V9Ns9yOflYZ46nNcu0XRcrUqdMaW7vrGUHyYNL4voHiz8Bg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T15:04:33.396974Z"},"content_sha256":"0b78d4c18905e03204b631fdec33b77b2a6d72670ea8ad5bde453893165ebbf5","schema_version":"1.0","event_id":"sha256:0b78d4c18905e03204b631fdec33b77b2a6d72670ea8ad5bde453893165ebbf5"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:XFNIIU6TSKLJVMHYZQF67CSU4E","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Randomness in post-selected events","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"quant-ph","authors_text":"Gonzalo de la Torre, Jean-Daniel Bancal, Le Phuc Thinh, Stefano Pironio, Valerio Scarani","submitted_at":"2015-06-12T09:31:04Z","abstract_excerpt":"Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little randomness. This raises the question as to whether randomness can be extracted only from the smaller post-selected subset corresponding to proper detection events, instead of from the entire set of data. This could in principle be feasible without opening an analogue of the detection loophole as long as the min-entropy of the post-selected data is evalu"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1506.03953","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T01:19:20Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"XuTzYleE2ybkh+LfeQ80NyygTyqgWKekDVtNEKHRPQYqYv60KF9WSGjVhgcqB6i5QYds4YCF3Qu9wcISYc3KDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T15:04:33.397468Z"},"content_sha256":"df40e6683fcad77ea3f1fd1e18ccb3add84c822266100902380286a534f9c4d3","schema_version":"1.0","event_id":"sha256:df40e6683fcad77ea3f1fd1e18ccb3add84c822266100902380286a534f9c4d3"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/XFNIIU6TSKLJVMHYZQF67CSU4E/bundle.json","state_url":"https://pith.science/pith/XFNIIU6TSKLJVMHYZQF67CSU4E/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/XFNIIU6TSKLJVMHYZQF67CSU4E/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T15:04:33Z","links":{"resolver":"https://pith.science/pith/XFNIIU6TSKLJVMHYZQF67CSU4E","bundle":"https://pith.science/pith/XFNIIU6TSKLJVMHYZQF67CSU4E/bundle.json","state":"https://pith.science/pith/XFNIIU6TSKLJVMHYZQF67CSU4E/state.json","well_known_bundle":"https://pith.science/.well-known/pith/XFNIIU6TSKLJVMHYZQF67CSU4E/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:XFNIIU6TSKLJVMHYZQF67CSU4E","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"42167408eca1c111b8751bb300fd0a93cd326fead67ec7946952a1006ce85a83","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-06-12T09:31:04Z","title_canon_sha256":"fe5b69a1c0edd3fa8bae39fca83850d98d2ccddc5ad89d78a853c03574a18ccf"},"schema_version":"1.0","source":{"id":"1506.03953","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1506.03953","created_at":"2026-05-18T01:19:20Z"},{"alias_kind":"arxiv_version","alias_value":"1506.03953v3","created_at":"2026-05-18T01:19:20Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1506.03953","created_at":"2026-05-18T01:19:20Z"},{"alias_kind":"pith_short_12","alias_value":"XFNIIU6TSKLJ","created_at":"2026-05-18T12:29:50Z"},{"alias_kind":"pith_short_16","alias_value":"XFNIIU6TSKLJVMHY","created_at":"2026-05-18T12:29:50Z"},{"alias_kind":"pith_short_8","alias_value":"XFNIIU6T","created_at":"2026-05-18T12:29:50Z"}],"graph_snapshots":[{"event_id":"sha256:df40e6683fcad77ea3f1fd1e18ccb3add84c822266100902380286a534f9c4d3","target":"graph","created_at":"2026-05-18T01:19:20Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little randomness. This raises the question as to whether randomness can be extracted only from the smaller post-selected subset corresponding to proper detection events, instead of from the entire set of data. This could in principle be feasible without opening an analogue of the detection loophole as long as the min-entropy of the post-selected data is evalu","authors_text":"Gonzalo de la Torre, Jean-Daniel Bancal, Le Phuc Thinh, Stefano Pironio, Valerio Scarani","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-06-12T09:31:04Z","title":"Randomness in post-selected events"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1506.03953","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:0b78d4c18905e03204b631fdec33b77b2a6d72670ea8ad5bde453893165ebbf5","target":"record","created_at":"2026-05-18T01:19:20Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"42167408eca1c111b8751bb300fd0a93cd326fead67ec7946952a1006ce85a83","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"quant-ph","submitted_at":"2015-06-12T09:31:04Z","title_canon_sha256":"fe5b69a1c0edd3fa8bae39fca83850d98d2ccddc5ad89d78a853c03574a18ccf"},"schema_version":"1.0","source":{"id":"1506.03953","kind":"arxiv","version":3}},"canonical_sha256":"b95a8453d392969ab0f8cc0bef8a54e12708551833d37ab191a56c4b1d47cef2","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b95a8453d392969ab0f8cc0bef8a54e12708551833d37ab191a56c4b1d47cef2","first_computed_at":"2026-05-18T01:19:20.537037Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:19:20.537037Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"kNfUMurvzEGdy2AWOQtFAzjTiJAvL3pPerBb54PUlBrErkNeEpju1hnvGhSJ03wrrD+mCICaFQOv0NaPNURIDw==","signature_status":"signed_v1","signed_at":"2026-05-18T01:19:20.537483Z","signed_message":"canonical_sha256_bytes"},"source_id":"1506.03953","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:0b78d4c18905e03204b631fdec33b77b2a6d72670ea8ad5bde453893165ebbf5","sha256:df40e6683fcad77ea3f1fd1e18ccb3add84c822266100902380286a534f9c4d3"],"state_sha256":"0da0cc819e7aa4aeda948e69a3178da2e08cd972291def8ff3905dbf7baaeb41"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"5aSTTWSoxjoDDwBnkJABFLuj1NyFxzeYf/h1NFwamVQ1TbVo/4b2LUi6/0yHYKqG1CajLDt4MEE7v0Wvlb8KAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T15:04:33.400131Z","bundle_sha256":"887026e12f28f0dce6ca4782e5ec8fbabe7892ad9758296148084e46322b979d"}}