Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers
Next Article in Special Issue
Dictionary Learning Based Scheme for Adversarial Defense in Continuous-Variable Quantum Key Distribution
Previous Article in Journal
Microstructure, Phase Evolution, and Chemical Behavior of CrCuFeNiTiAlx High Entropy Alloys Processed by Mechanical Alloying
Previous Article in Special Issue
On the Security of Offloading Post-Processing for Quantum Key Distribution
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization

1
CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China
2
CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
3
Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, China
4
State Key Laboratory of Cryptology, Beijing 100878, China
5
Department of Physics, University of Hong Kong, Pokfulam, Hong Kong
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(2), 258; https://doi.org/10.3390/e25020258
Submission received: 20 December 2022 / Revised: 20 January 2023 / Accepted: 24 January 2023 / Published: 31 January 2023
(This article belongs to the Special Issue Advanced Technology in Quantum Cryptography)

Abstract

:
Quantum key distribution (QKD) allows two remote parties to share information-theoretic secret keys. Many QKD protocols assume the phase of encoding state can be continuous randomized from 0 to 2 π , which, however, may be questionable in the experiment. This is particularly the case in the recently proposed twin-field (TF) QKD, which has received a lot of attention since it can increase the key rate significantly and even beat some theoretical rate-loss limits. As an intuitive solution, one may introduce discrete-phase randomization instead of continuous randomization. However, a security proof for a QKD protocol with discrete-phase randomization in the finite-key region is still missing. Here, we develop a technique based on conjugate measurement and quantum state distinguishment to analyze the security in this case. Our results show that TF-QKD with a reasonable number of discrete random phases, e.g., 8 phases from { 0 , π / 4 , π / 2 , , 7 π / 4 } , can achieve satisfactory performance. On the other hand, we find the finite-size effects become more notable than before, which implies that more pulses should be emit in this case. More importantly, as a the first proof for TF-QKD with discrete-phase randomization in the finite-key region, our method is also applicable in other QKD protocols.

1. Introduction

Quantum key distribution (QKD) [1,2],one of the most successful and mature applications in quantum information science, allows for two legitimate parties (Alice and Bob) to share information-theoretic secret keys. In theory, its security has been proved [3,4,5], while experiments towards a higher key rate [6] and longer achievable distance [7,8,9,10] have been demonstrated. Still, some large scale QKD networks are emerging [11,12,13,14]. However, owing to the inherent photon-loss in the channel, it meets a vital bottleneck that limits the communication distance and key generation rate. Specifically, some fundamental rate-loss limits [15,16] impose a restriction on any point-to-point QKD without repeaters. More precisely, the key rate R is bounded by the channel transmission probability η with the linear PLOB bound R = log 2 ( 1 η ) [16]. Delightfully, M.Lucamarini et al. made a breakthrough by proposing twin-field (TF) QKD in 2018. The essential idea of TF-QKD is in code mode extracting the key bit from a single-photon click event of the measurement station located in the middle of channel, which happens with a probability proportional to η ; thus, surpassing the linear PLOB bound becomes possible, and a so-called phase-error rate may be estimated in decoy mode [17,18,19] to monitor security. Driven by this, several TF-type QKD protocols [20,21,22,23,24,25,26] were proposed later to complete security proofs and improve performance. Based on these protocols, experimentalists also made great efforts to realize TF-QKD [27,28,29,30,31,32,33,34,35].
Since TF-QKD inherits measurement-device-independent (MDI)-QKD’s [36] merit that is immune to all side-channel attacks to measurement devices and all measurement-device imperfections [37,38], one does not need to take the detection loopholes into account within the TF-type QKD system. In spite of this, the security issues of the state preparation in TF-QKD must be carefully considered. In practice, the laser source of TF-QKD is usually a continuous source emitting coherent states with a fixed phase. Meanwhile, continuous phase-randomization from 0 to π is required in the TF-QKD. More specifically, this continuous phase-randomization is assumed in both the code and test modes in Refs. [21,23,26], or at least in the test mode in Refs. [22,24,39]. To fulfill this requirement, Alice and Bob must randomize the global phase continuously and uniformly. Unluckily, two ways to achieve phase randomization introduce different problems in the experiment. Passive randomization will lead to phase correlations between adjacent pulses [40,41], while active randomization can only randomize the phase over discrete set of values.
To bridge this gap between theory and experiment, two works that analyzed the security of fully discrete-phase randomization TF-QKD protocol have been proposed [42,43,44] in these days. However, a security proof in the finite-key region is still missing. Hence, one natural question is that whether TF-QKD with fully discrete-phase randomization can work well non-asymptotically. This work affirms that it can.
In this paper, we analyze the security of TF-QKD protocol with fully discrete randomization in a finite-key region. Interestingly, our analysis leads to comparable performance with the continuous one. Since taking the discrete phase into account, our results make the TF-QKD more practical and can be applied to the future TF-QKD experiment. More importantly, some techniques proposed here, e.g., Lemma A1 (introduced later), can be utilized to analyze the security of other QKD protocols with discrete-phase randomization.
This work is organized as follows. In Section 2, we give a description of the TF-QKD protocol with fully discrete-phase randomization, and the sketch of the security proof is given in Section 3. Note that the proof is detailed in Appendix A. In Section 4, by the numerical simulation, we show this protocol can still beat the linear PLOB bound [16] and has satisfactory performance. Finally, a conclusion is given in Section 5.

2. Protocol Description

Indeed, the protocol analyzed here has been depicted in Ref. [43]. For ease of understanding, we illustrate the protocol as follows.
Step 1: Alice (Bob) chooses a label from { μ , 0 , ν } with probabilities P μ , P O , P ν , according to the label she (he) chooses, she (he) takes one of the following actions:
μ : she (he) randomly picks an integer l A c ( l B c ) from { 0 , 1 , , M 1 } with equal probability 1 M where M is an even integer. This means that the phase 2 π is divided into M parts. Then, she (he) randomly chooses a key bit k a ( k b ) where k a ( k b ) 0 , 1 . Finally, she (he) sends a pulse with a coherent state | e i ( l A c M 2 π + π k a ) μ ( | e i ( l B c M 2 π + π k b ) μ ).
0 : she (he) sends the vacumm state.
ν : she (he) randomly picks an integer l A c and l B c from { 0 , 1 , , M 1 } with equal probability 1 M where M is an even integer. This means that the phase 2 π is divided into M parts. Then, she (he) sends a pulse with a coherent state | e i l A c M 2 π μ ( | e i l B c M 2 π μ ).
The first case is called code mode, while the other cases are decoy mode.
Step 2: Alice and Bob repeat Step 1 in total of N t o t times.
Step 3: After receiving N t o t pairs of pulses from Alice and Bob, interfering each pair at a beamsplitter and measuring the two outputs with his single photon detectors (SPDs), an honest Eve announces whether or not each measurement is successful. Here, ’successful’ means only one SPD (left SPD or right SPD) clicks in the corresponding measurement, and if so, Eve reports the specific SPD clicked.
Step 4: For those rounds Eve announcing successful click, Alice and Bob announce the intensities they chose as well as the values of l A c and l B c . Then, Alice and Bob only retain those successful rounds in which the intensities of the coherent state they sent are same while the in-phase ( l A c = l B c ) or anti-phase ( | l A c l B c | = M / 2 ) condition is also met. Let n 2 β + ( n 2 β ) be the number of the retained rounds when both Alice and Bob chose the same intensity β of the coherent state and the in-phase (anti-phase) is also met. Note that we assume l A c = l B c = 0 always holds in the case of β = 0 . Alice and Bob generate their sifted keys from n 2 μ = n 2 μ + + n 2 μ retained rounds in code mode, thus the length of sifted key bits n b i t = n 2 μ . Note that if it is an in-phase (anti-phase) round with right (left) SPD clicking, Bob may flip his corresponding sifted key bit.
Step 5: With all of the quantities n 2 β = n 2 β + + n 2 β , Alice and Bob use linear programming to obtain an upper bound on the number of phase errors(defined later) n p h U with a failure probability no more than ε ; then, they can calculate the upper bound e p h U = n p h U / n b i t .
Step 6: Step 6 consists of error correction and privacy amplification.
Step 6a: Alice sends H E C bits of syndrome information of her sifted key bits to Bob through an authenticated public channel. Then, Bob uses it to correct errors in his sifted keys. Alice and Bob calculate a hash of their error-corrected keys with a random universal hash function and check whether they are equal. If equal, they continue to the next step; otherwise, they abort the protocol.
Step 6b: Alice and Bob apply the privacy amplification to obtain their final secret keys. If the length of their secret key satisfies l = n b i t ( 1 h ( e p h U ) ) H E C log 2 2 ϵ c o r log 2 1 4 ϵ P A 2 where h ( · ) denotes the binary Shannon entropy, this protocol must be ϵ c o r -correct and ϵ s e c -secret with ϵ s e c = ε + ϵ P A . Here, ϵ c o r ( ϵ s e c ) represents the protocol is correct (secret) with a failure probability no more than ϵ c o r ( ϵ s e c ) . Hence, the total security parameter is ϵ t o l -secure where ϵ t o l = ϵ c o r + ϵ s e c . It is elaborated thoroughly in the widely-used universally composable security framework [45,46].

3. Security Proof

In this section, we present the security proof of this protocol. The main task of the security proof is to bound the information Eve holds. To accomplish this task, one can calculate a so-called phase-error rate. Firstly, we construct an equivalent virtual protocol, in which Alice and Bob prepare some entangled states between local states and traveling states, but traveling states must have the same density matrices as actual protocol in the channel. The sifted key bits can be seen as the outputs of measurement with Z-basis on local states made by Alice and Bob; then, the so-called phase-error rate is defined as the error rate for the outputs of measurement with the X-basis made by them. According to the complementarity argument [47], the phase-error rate can be used to bound Eve’s information on the sifted keys. In the following, we give the virtual protocol and show how to bound the phase-error rate.

3.1. Equivalent Virtual Protocol

In our virtual protocol, Alice generates secret keys from the code mode in which she prepares the state
| ψ μ , A c A a = l = 0 M 1 1 M | l A c ( 1 2 ( | 0 A | e i 2 π M l μ a + | 1 A | e i 2 π M l μ a ) ) ,
where A c and A are the local quantum systems in Alice’s side, and a is the traveling quantum state Alice sent to Eve. Similarly, Bob prepares | ψ μ , B c B b defined analogously to | ψ μ , A c A a . Obviously, Alice (Bob) measures A ( B ) with Z-basis to obtain sifted key, i.e., | 0 A for bit 0 and | 1 A for bit 1. In order to obtain the phase-error rate, they measure A , B in X-basis { | + , | } after Eve’s attack. As for the test mode, we assume Alice prepares the following states
| ψ 0 , A c A a = | 0 A c | 0 A | 0 a , | ψ ν , A c A a = l = 0 M 1 1 M | l A c | 0 A | e i 2 π M l ν a .
here, the local states of A c are encoded in photon-number states, and Alice can measure A c ’s photon-number to learn the phase of sent states.
Finally, we can describe the process of state preparation above with a single state, namely,
| ψ A s A c A a = p μ | 0 A s | ψ μ , A c A a + p O | 1 A s | ψ 0 , A c A a + p ν | 2 A s | ψ ν , A c A a
where Alice’s additional local ancilla A s is in the photon number states. Similarly, Bob can prepare | ψ B s B c B b defined analogously to | ψ A s A c A a . Though Alice (Bob) may measure A s ( B s ), A c ( B c ) , and A(B) after or before Eve announcing her measurement results, Alice (Bob) must announce the measurement results after Eve’s announcement then post-select the successful rounds. The following is a detailed illustration of our equivalent virtual protocol.
Step 1:
Alice and Bob prepare a gigantic quantum state | Φ = | ϕ N t o t = ( | ψ A s A c A a | ψ B s B c B b ) N t o t and send all subsystems a and b to Eve through an insecure quantum channel.
Step 2:
After performing an arbitrary quantum operation on all subsystems a and b from Alice and Bob, Eve announces whether it has a successful click (only one of her SPDs clicks) or not for each round. For a successful round, Eve continues to announce whether the left SPD clicks or the right SPD clicks. We use M ( M ¯ ) to denote the set of successful (unsuccessful) rounds.
Step 3:
For those rounds in which Eve announces success, Alice and Bob jointly measure the subsystem A c ( B c ) and A s ( B s ) in the photon-number basis to learn whether the intensities of the coherent state they send are same or not and whether it is in-phase or anti-phase. Then, they only retain those rounds where in-phase or anti-phase is met, and they choose the same intensities. Let M s denote the set of those retained rounds, while M f denotes those rounds that are in M but not in M s .
Step 4:
For these rounds in M s , Alice (Bob) measures the subsystem A c A s ( B c B s ) in Fock basis to learn the phase and intensity of the coherent states she (he) sent. If the result of A s ( B s ) is in state | 0 A s ( | 0 B s ), she (he) measures subsystems A(B) in the Z basis to decide her (his) sifted key, respectively; otherwise, she (he) measures subsystem A(B) in the Z basis but does not incorporate these measurement outcomes in her (his) sifted key.
Step 5 to Step 6:
Let n 2 β be the number of rounds in M s satisfying that both Alice and Bob chose the intensity β . With parameters n 2 β , perform the same operations as Step 5 to Step 6, respectively, in the actual protocol given in Section 2.

3.2. Estimation of Phase-Error Rate

The essential of security proof is to estimate the upper-bound of the phase-error rate e p h of the sifted keys, i.e., how many same or different outcomes Alice and Bob have if they measure A and B with X-basis hypothetically in the rounds where sifted keys are generated. Specifically, in our protocol, we define the number of the same outcomes they have as n p h , i.e., the number of phase-error events. Provided that e p h = n p h / n 2 μ is bounded, one can generate the final secret key with an appropriate ϵ t o l value as given in Step6.b of the actual protocol.
A detailed proof for how to estimate n p h is present in Appendix A. Here, a sketch of this proof is given.
Though analyzing the equivalent protocol, it is proven that if Alice and Bob both chose intensity β , and in-phase or anti-phase is also met, they actually prepare a mixture τ 2 β , which consists of component τ j | 2 β , j = 0 , 1 , . . . , M 1 . Moreover, each phase-error event is a click by some particular components of that mixture τ 2 β , i.e., τ j | 2 β , j = 0 , 2 , . . . , M 2 . These results imply that
n 2 μ = j = 0 M n j | 2 μ , n 2 ν = j = 0 M n j | 2 ν , n p h = j = 0 , j N 0 M 2 n j | 2 μ ,
where n j | 2 β denotes the number of rounds in M s , in which Alice and Bob both chose intensity β , but τ 2 β is actually τ j | 2 β . Meanwhile, N 0 is the set of even numbers. Now, the hypothetical value n p h is related to some experimentally observed values. However, just with these equations it is difficult to bound n p h tightly since n j | 2 β cannot be known directly.
On the other hand, both τ j | 2 μ and τ j | 2 ν are very close to Fock-state | j j | . Accordingly, it is intuitive to consider if there are constraints on the gap between n j | 2 μ and n j | 2 ν . Then, we developed Lemma A1 (see Appendix A for details) to bound the gap between the yields of two distinct quantum states in a non-asymptotic situation. Applying this lemma, we obtained a series of constraints on n j | 2 μ and n j | 2 ν . Finally, combined with Equation (4), an analytical upper bound of n p h (given in the end of the Appendix A) was calculated to find the upper bound of phase-error rate e p h U = n p h U / n 2 μ .

4. Numerical Simulation

In this section, we simulate the final secret key rate with the parameters listed in Table 1.
It is reasonable to simulate the experimentally observed values n 2 μ , n 2 ν and n 0 with their mean values. Let Q c o r r | 2 β be the probability of only one click from left (right) SPD when both Alice and Bob prepare coherent states with intensity β and a phase difference of 0 ( π ), and Q e r r | 2 β be the probability of only one click from left (right) SPD when both Alice and Bob prepare coherent states with intensity β and phase difference of π (0). Then, we have
Q c o r r | 2 β = ( 1 ( 1 p d ) e 2 η ( 1 e m ) β ) e 2 η e m β ( 1 p d ) , Q e r r | 2 β = ( 1 ( 1 p d ) e 2 η e m β ) e 2 η ( 1 e m ) β ( 1 p d ) ,
where η = 10 0.2 L 20 and L is the channel distance between Alice and Bob. Accordingly, in the simulation, we assume n 2 β = N t o t P β 2 2 ( Q c o r r | 2 β + Q e r r | 2 β ) / M for β = μ , ν . Note that n 0 = N t o t P O 2 ( Q c o r r | 0 + Q e r r | 0 ) , n b i t = n 2 μ and e b i t = Q e r r | 2 μ / ( Q c o r r | 2 μ + Q e r r | 2 μ ) . With these values, setting M = 8 and the failure probability of estimating phase error ε = ( 6 M + 12 ) ε a = 4 × 10 20 , one can obtain the upper-bound of phase-error rate e p h U by the linear programming given by (A41) in Appendix A. Moreover, the amount of H E C is H E C = N b i t f h ( e b i t ) , ϵ c o r = 1 × 10 10 , and ϵ P A = 1.6566 × 10 10 , which leads to a secret key of length l = n b i t ( 1 h ( e p h U ) ) H E C log 2 2 ϵ c o r log 2 1 4 ϵ P A 2 with ϵ s e c = ϵ P A + ε and the total security parameter ϵ t o l = ϵ c o r + ϵ s e c = 4.6566 × 10 10 .
Finally, we numerically optimize the intensities and corresponding probabilities to maximize l in the cases of the total number of pulses is N t o t = 1 × 10 17 , 1 × 10 14 , 1 × 10 13 , 1 × 10 12 . Note that because this numerical problem is very time-comsuming, these intensities and probabilities are not optimized at each distance. Additionally, we use some typical parameters instead. The simulate results ( l / N t o t v.s. L) are illustrated below.
As Figure 1 shows, we obtain considerable secret key rates when the total number of pulses is 10 12 , 10 13 , 10 14 or 10 17 . Through numerical simulations, it is confirmed that TF-QKD with discrete-phase randomization has satisfactory performance. On the other hand, it is verified that finite-size effects become more notable here compared with the original protocol with continuous phase randomization; it seems that one has to prepare 10 17 pulses to surpass the PLOB linear bound. This is because the statistical fluctuations in Lemma A1 are proportional to the square root of the total number of emitting pulse N t o t , which leads to alarge phase-error rate e p h when n b i t is not sufficiently large.

5. Conclusions

In real setups of TF-QKD, continuous randomization is usually realized by actively adding a random signal to a phase modulator. On the other hand, random numbers are generated discretely in most schemes. Therefore, TF-QKD with discrete-phase randomization is more practical. It is necessary to analyze the security of TF-QKD with discrete-phase randomization. Based on conjugate measurement, the security proof of a QKD protocol is to estimate the phase-error rate. Then in case of discrete-phase randomization, a critical step is knowing how to bound the gap between yields of two distinct but very close quantum states in a non-asymptotic situation. To achieve this goal, Lemma A1 is developed to find the upper bound of this gap. With the help of Lemma 1, linear programming is proposed to calculate the phase-error rate, and the key length is then straightforward. Through numerical simulations, it is confirmed that TF-QKD with discrete-phase randomization has satisfactory performance. On the other hand, we also find that more pulses should be prepared to alleviate the finite-size effects than previous protocol.
Moreover, it is worth noting that Lemma A1 is quite useful in a variety of scenarios, not just in the security proof of TF-QKD. For instance, if one considers the BB84 with discrete-phase randomization [48], the Lemma A1 can be utilized to bound the yield of single photon state, so then it is not difficult to give a relevant security proof. To summarize, we give the first security proof for TF-QKD with finite discrete-phase randomization in non-asymptotic scenarios. Although the proof is tailored for TF-QKD, the framework of this proof, i.e. Lemma A1, can be adapted in other protocols.

Author Contributions

Methodology, R.-Q.W.; Software, R.-Q.W. and X.-H.J.; Validation, R.-Q.W., Z.-Q.Y. and X.-H.J.; Formal analysis, R.-Q.W. and R.W.; Resources, S.W., W.C., Z.-F.H. and G.-C.G.; Data curation, X.-H.J.; Writing—original draft, R.-Q.W.; Writing—review and editing, Z.-Q.Y.; Visualization, R.-Q.W.; Project administration, Z.-Q.Y.; Funding acquisition, Z.-Q.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China (Grant No. 2020YFA0309802),the National Natural Science Foundation of China (Grant Nos. 62171424, 61961136004).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We thank Rong-Wang for constructive discussion.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Formula for the Number of Phase-Error Events

In this section, we show how to obtain the relation between the hypothetical phase-error events and some experimental observations.
The main result obtained here is that each key bit is a successful click from a mixed state of τ j | 2 μ , j = 0 , 1 , . . . , M 1 prepared by Alice and Bob. More importantly, the number of phase-error events among these key bits corresponds to τ j | 2 μ , j = 0 , 2 , . . . , M 2 . Therefore, if we denote the length of the raw key by n b i t = n 2 μ and the number of successful clicks of τ j | 2 μ by n j | 2 μ , n b i t = n 2 μ = j = 0 M 1 n j | 2 μ , the number of phase-error events n p h = j = 0 , j N 0 M 2 n j | 2 μ must hold, where N 0 is the set of even integers. Next, a proof is present to show how to obtain this result.
Following the symbols in [49], let us consider the evolution of the gigantic quantum state | Φ = | ϕ N t o t = ( | ψ A s A c A a | ψ B s B c B b ) N t o t sent to Eve. After Step 2, where Eve performs her measurement on the subsystem a b , the initial quantum state is transformed to M ^ e v e | Φ , where M ^ e v e denotes the measurement operator of Eve. After measurement, Eve announces whether the measurement outcome is successful or not for each round. Hence, we reorder the quantum state as | Φ = | ϕ M | ϕ M ¯ , where M ( M ¯ ) denotes the successful (unsuccessful) rounds. Then, in Step 3 of the virtual protocol, using measurement operators { O ^ s = ( | 00 A s B s 00 | + | 11 A s B s 11 | + | 22 A s B s 22 | ) l = 0 M 1 ( | l , l A c B c l , l | + | l , ( l + M / 2 ) m o d M A c B c l , ( l + M / 2 ) m o d M | ) , O ^ d = I ^ O ^ s } , Alice and Bob measure the subsystem A s A c and B s B c for those rounds that are announced successful in Step 2 and retain the trials in which A s A c and B s B c are collapsed into O ^ s as the final successful rounds. Hence, we reorder | Φ = | ϕ M s | ϕ M f | ϕ M ¯ where M s ( M f ) denotes the successful(unsuccessful) rounds finally. Before they measure the subsystem A B to generate their sifted key in Step 3, the unnormalized quantum state is given by
O ^ s M s O ^ d M f I ^ M ¯ M ^ e v e | Φ = M ^ e v e O ^ s M s O ^ d M f I ^ M ¯ | Φ = M ^ e v e ( O ^ s | ϕ ) M s ( O ^ f | ϕ ) M f ( | ϕ ) M ¯
Next, in Step 4, Alice and Bob measure the subsystem A s , B s A c , B c and A , B for all rounds in M s , one by one. We use α { 1 , , M s } to denote the different rounds in M s and ξ α to denote the measurement outcome of the α -th subsystem. What is more, M ^ α is used to denote the associated operator. Hence, the unnormalized state before the measurement of the α -th rounds in M s is
| Φ α = M ^ e v e ( l = 1 α 1 M ^ l | ϕ ) ( O ^ s | ϕ ) ( O ^ s | ϕ ) M s α ( O ^ f | ϕ ) M f ( | ϕ ) M ¯ .
because we are only interested in the reduced state of the α -th round in M s , we trace out the other rounds which we denote by α ¯ and obtain
σ ^ α = T r α ¯ | Φ α | Φ α | = α ¯ α ¯ | Φ α Φ α | α ¯ = α ¯ M ^ α ¯ O ^ s | ϕ ϕ | O ^ s M ^ α ¯
where
M ^ α ¯ = α ¯ | M ^ e v e | ( l = 1 α 1 M ^ l ( O ^ s | ϕ ) ( O ^ s | ϕ ) M s α ( O ^ f | ϕ ) M f ( | ϕ ) M ¯ .
and the quantum states { | α ¯ } represent the basis for the subsystems A s , B s , A c , B c , A , B , a , b of all rounds in the protocol except the α -th round in M s .
Next, to derive the number of phase error, we expand the quantum state O ^ s | ϕ as
O ^ s | ϕ = p μ | 00 A s B s | ϕ μ + p O | 11 A s B s | ϕ 0 + p ν | 22 A s B s | ϕ ν
where
| ϕ μ = l = 0 M 1 1 M [ ( | l l A c B c 1 2 ( | 0 A | e i 2 π M l μ a + | 1 A | e i 2 π M l μ a ) ( | 0 B | e i 2 π M l μ b + | 1 B | e i 2 π M l μ b ) ) + ( | l , ( l + M 2 ) m o d M A c B c 1 2 ( | 0 A | e i 2 π M l μ a + | 1 A | e i 2 π M l μ a ) ( | 0 B | e i 2 π M l μ b + | 1 B | e i 2 π M l μ b ) ) ) ] ,
| ϕ 0 = | 00 A c B c | 00 A B | 00 a b
and
| ϕ ν = l = 0 M 1 1 M [ ( | l l A c B c ( | 00 A B | e i 2 π M l ν a | e i 2 π M l ν b ) + ( | l , ( l + M 2 ) m o d M A c B c | 00 A B ( | e i 2 π M l ν a | e i 2 π M l ν b ) ) ] .
To summarize, each key bit can be viewed as an event in which Eve announces a successful click conditioned by Alice and prepares | ϕ μ and measures A B with Z-basis. Since the measurement on A B made by Alice and Bob can be delayed after Eve’s announcement of a successful click, the phase error can be estimated by Alice and Bob measuring A B with X-basis rather than Z-basis. To obtain the phase error of this part, we rewrite | ϕ μ under X-bases of A B as
| ϕ μ = l = 0 M 1 1 M ( | l l A c B c | ψ μ , A a B b l + | l , ( l + M 2 ) m o d M A c B c | ψ μ , A a B b l )
where
| ψ μ , A a B b l = 1 2 ( | 00 A B | e i θ l μ a | e i θ l μ b + | 01 A B | e i θ l μ a | e i θ l μ b ) + 1 2 ( | 10 A B | e i θ l μ a | e i θ l μ b + | 11 A B | e i θ l μ a | e i θ l μ b ) = 1 4 | + + A B ( | e i θ l μ a | e i θ l μ b + | e i θ l μ a | e i θ l μ b + | e i θ l μ a | e i θ l μ b + | e i θ l μ a | e i θ l μ b ) + 1 4 | A B ( | e i θ l μ a | e i θ l μ b | e i θ l μ a | e i θ l μ b | e i θ l μ a | e i θ l μ b + | e i θ l μ a | e i θ l μ b ) + 1 4 | + A B ( ) + 1 4 | + A B ( ) ) ,
| ψ μ , A a B b l = 1 2 ( | 00 A B | e i θ l μ a | e i θ l μ b + | 01 A B | e i θ l μ a | e i θ l μ b + 1 2 | 10 A B | e i θ l μ a | e i θ l μ b + | 11 A B | e i θ l μ a | e i θ l μ b ) = 1 4 | + + A B ( | e i θ l μ a | e i θ l μ b + | e i θ l μ a | e i θ l μ b + | e i θ l μ a | e i θ l μ b + | e i θ l μ a | e i θ l μ b ) + 1 4 | A B ( | e i θ l μ a | e i θ l μ b | e i θ l μ a | e i θ l μ b | e i θ l μ a | e i θ l μ b + | e i θ l μ a | e i θ l μ b ) + 1 4 | + A B ( ) + 1 4 | + A B ( ) ) ,
and θ l = l M 2 π . For the purpose of clarification, we define some quantum states below:
| e i θ 2 μ a b = j = 0 e i j θ P j | 2 μ | j a b
and
| e i θ 2 μ a b , e v e n = | e i θ μ a | e i θ μ b + | e i θ μ a | e i θ μ b 2 = j N 0 e i j θ P j | 2 μ | j a b ,
where | j a b = i = 0 j j ! 2 j i ! ( j i ) ! | i a | j i b and N 0 is the set of even numbers. Indeed, | j is a quantum state satisfying that the total photon-number of a and b is j. Moreover, another similar quantum state is defined below:
| e i θ 2 μ a b = j = 0 e i j θ P j | 2 μ | j a b
and
| e i θ 2 μ a b = | e i θ μ a | e i θ μ b + | e i θ μ a | e i θ μ b 2 = j N 0 e i j θ P j | 2 μ | j a b
where | j a b , e v e n = i = 0 j ( 1 ) i j ! 2 j i ! ( j i ) ! | i a | j i b . With these definitions, we can write the quantum states | ψ μ , A a B b l and | ψ μ , A a B b l in a more simplified way, namely
| ψ μ , A a B b l = 1 2 ( | + + A B ( | e i θ l 2 μ a b , e v e n + | e i θ l 2 μ a b , e v e n ) + | A B ( | e i θ l 2 μ a b , e v e n | e i θ l 2 μ a b , e v e n ) + | + A B ( ) + | + A B ( ) )
and
| ψ μ , A a B b l = 1 2 ( | + + A B ( | e i θ l 2 μ a b , e v e n + | e i θ l 2 μ a b , e v e n ) | A B ( | e i θ l 2 μ a b , e v e n | e i θ l 2 μ a b , e v e n ) + | + A B ( ) + | + A B ( ) )
obviously, the measurement outcome of | + + A B and | A B can be defined as phase-error event. Recall the whole density matrix | ϕ μ ϕ | given in Equation (A8); we can obtain the a b part corresponding to the phase-error event,
ρ ^ μ , p h = + + | A B t r A c B c ( | ϕ μ ϕ | ) | + + A B + | A B t r A c B c ( | ϕ μ ϕ | ) | A B = l = 0 M 1 l l | A c B c ( + + | A B + | A B ) | ϕ μ ϕ | ( | + + A B + | A B ) | l l A c B c + l , ( l + M / 2 ) m o d M | A c B c ( + + | A B + | A B ) | ϕ μ ϕ | ( | + + A B + | A B ) | l , ( l + M / 2 ) m o d M A c B c = l = 0 M 1 1 M 2 ( | e i θ l 2 μ a b e i θ l 2 μ | + | e i θ l 2 μ a b e i θ l 2 μ | )
according to Equations (2.5)–(2.7) of Ref [48], ρ ^ μ , p h can be rewritten as
ρ ^ μ , p h = 2 M j = 0 , j N 0 M 2 P ˜ j | 2 μ ( 1 2 | j ˜ 2 μ a b j ˜ 2 μ | + 1 2 | j ˜ 2 μ a b j ˜ 2 μ | ) = 2 M j = 0 , j N 0 M 2 P ˜ j | 2 μ τ j | 2 μ ,
where P ˜ j | 2 μ = n = 0 P j + M n | 2 μ , P j | 2 μ is the the probability of finding j photons in a Poisson source with mean photon-number 2 μ , | j ˜ 2 μ = n = 0 P j + M n | 2 μ P ˜ j | 2 μ | j + M n a b and | j ˜ 2 μ = n = 0 P j + M n | 2 μ P ˜ j | 2 μ | j + M n a b , and τ j | 2 μ = 1 2 | j ˜ 2 μ a b j ˜ 2 μ | + 1 2 | j ˜ 2 μ a b j ˜ 2 μ | .
For ease of understanding, we can easily interpret the formula of ρ ^ μ , p h . It is easy to see that ρ ^ μ , p h is a mixture of τ j | 2 μ , which consists of photon-number state | j + M n a b , n = 0 , 1 , 2 , . . . , and the probability of finding j + M n photons is proportional to P j + M n | 2 μ . Let τ e v e n | 2 μ be the normalized ρ ^ μ , p h ; then, a phase-error event for a key bit is equivalent to a successful click announced by Eve on the condition that a mixture τ e v e n | 2 μ = j = 0 , j N 0 M 2 P ˜ j | 2 μ τ j | 2 μ / P e v e n | 2 μ prepared by Alice and Bob, and the probability of preparing such a mixture is obviously P μ 2 P e v e n | 2 μ 2 / M .
To find a way to estimate the number of phase errors, we can give the density matrices Alice and Bob prepared in code mode and decoy mode. If we trace out A B A c B c of the quantum state | ϕ μ ϕ | , i.e., regardless of whether the measurement outcome on A B is phase error or not, we have
ρ ^ μ = T r A B A c B c ( | ϕ μ ϕ | ) = 2 M j = 0 M 1 P ˜ j | 2 μ ( 1 2 | j ˜ 2 μ j ˜ 2 μ | + 1 2 | j ˜ 2 μ j ˜ 2 μ | ) = 2 M j = 0 M 1 P ˜ j | 2 μ τ j | 2 μ .
we define τ 2 μ = j = 0 M 1 P ˜ j | 2 μ τ j | 2 μ as the normalized ρ ^ μ . The generation of a key bit is equivalent to a successful click announced by Eve conditioned on the premise that a mixture τ 2 μ = j = 0 M 1 P ˜ j | 2 μ τ j | 2 μ is prepared by Alice and Bob, and the probability of preparing such a mixture is obviously P μ 2 2 / M .
Now we are approaching a main result of above derivations. In the N t o t rounds, Alice and Bob prepare τ 2 μ with the probability P μ 2 2 / M ; the number of its successful rounds is denoted by n 2 μ . Of course, the key bits are generated in these rounds, thus n 2 μ = n b i t . Since τ 2 μ is a mixture of τ j | 2 μ , j = 0 , 1 . . . , , M 1 , the n 2 μ successful clicks are the sum of clicks by τ j | 2 μ , j = 0 , 1 , . . . , M 1 . Then, n 2 μ = j = 0 M 1 n j | 2 μ holds evidently, in which n j | 2 μ is the number of successful clicks by τ j | 2 μ . Recall that the phase errors for these events are from clicks by τ e v e n | 2 μ ; one can assert that the number of phase-error events n p h = j = 0 , j N 0 M 2 n j | 2 μ must hold. This is a main result we have so far.

Appendix A.2. The Upper Bound of the Number of Phase-Error Events

We have proved that n p h = j = 0 , j N 0 M 2 n j | 2 μ with the constraint n 2 μ = j = 0 M 1 n j | 2 μ . Obviously, this is not sufficient for estimating n p h tightly. Here, we resort to decoy states to obtain more constraints to bound n p h .
Similarly with the analysis of clicks by ρ ^ μ = T r A B A c B c ( | ϕ μ ϕ | ) , a successful click from decoy mode with intensity ν means that Alice and Bob prepare
ρ ^ ν = T r A B A c B c ( | ϕ ν ϕ | ) = 2 M j = 0 M 1 P ˜ j | 2 ν ( 1 2 | j ˜ 2 ν j ˜ 2 ν | + 1 2 | j ˜ 2 ν j ˜ 2 ν | ) = 2 M j = 0 M 1 P ˜ j | 2 ν τ j | 2 ν .
accordingly, we also have n 2 ν = j = 0 M 1 n j | 2 ν . Here, n 2 ν and n j | 2 ν are defined analogously to n 2 μ and n j | 2 μ , respectively. Intuitively, n j | 2 μ and n j | 2 μ are the numbers of successful clicks for τ j | 2 μ and τ j | 2 ν respectively. Typically, μ < ν < < 1 is satisfied; then both τ j | 2 μ and τ j | 2 ν are very close to the photon-number state | j a b . This implies that the gap between n j | 2 μ and n j | 2 ν can be bounded, and then we may estimate n p h = j = 0 , j N 0 M 2 n j | 2 μ . Indeed, with the result in appendix B of ref [48], the gap between n j | 2 μ and n j | 2 ν in the asymptotic case can be obtained. Here, we develop Lemma A1 to bound this gap in finite-key situations.
Lemma A1.
If Alice prepares N t o t pairs of particles A and B with the quantum state ( i P i | i A | ϕ i B ) N t o t where i | j = δ i j , | ϕ i | ϕ j | = F i j and she sends the B part in each pair to Eve. For every round, Eve announces if the measurement is successful or unsuccessful, which is denoted by M = 1 or M = 0 , respectively. Then, Alice measures the subsystem A with projectors { | i i | , i = 0 , 1 , 2 , . . . } to which quantum state she sent for the pairs that Eve announced M = 1 . Let n i denote the number of yields for the quantum state | i . If P i > P j , we have that the constraints between n i and n j , say,
| P j P i n i n j | N 1 1 F i j 2 + 2 δ ( N 1 , 1 + 1 F i j 2 2 , ε 0 2 ) 2 δ ( N 2 n i n j , 1 2 , ε 0 ) + δ ( n i , P j P i , ε 2 )
holds with a failure probability 2 ε 0 + 2 ε 1 + 2 ε 2 , where
δ ( x , y , z ) = 3 x y ln ( 1 z ) N 1 = 2 P j N t o t + δ ( N t o t , 2 P j , ε 1 ) N 2 = 2 P j N t o t δ ( N t o t , 2 P j , ε 1 )
Proof. 
Since we are only interested in the statistics of n i and n j , it is not restrictive to rewrite the quantum state ( i P i | i A | ϕ i B ) N t o t as
( i P i | i A | ϕ i B ) N t o t = { P i P j | i A | ϕ i B + 2 P j 1 2 ( | i A | ϕ i B + | j A | ϕ j B ) + } N t o t .
Here, we virtually define P i | i A = P i P j | i A + P j | i A and i | i A = 0 , which do not change the density matrix of B; thus, have no impact on Eve’s operation and statistics of n i and n j . Let n i ( n i ) denote the number of detection for the quantum state | i A ( | i A ) when Eve announces a successful measurement. Apparently, we know that n i = n i + n i .
Let us focus on the state { 2 P j 1 2 ( | i A | ϕ i B + | j A | ϕ j B ) } N t o t , by which the relation between n i and n j can be analyzed. The essential idea is reinterpreting the detection of B to a game of Eve guessing which states | ϕ i B or | ϕ j B Alice prepared for all of the N t o t trials. Specifically, we consider a virtual experiment illustrated below.
Alice prepares the quantum state { 2 P j 1 2 ( | i A | ϕ i B + | j A | ϕ j B ) } N t o t ; then, she sends the B part to Eve. Eve measures each B she received. If she obtains a successful measurement, she will announce M = 1 . Otherwise, she will announce M = 0 . Up to now, there is no difference from the previous protocol. A critical step is that for any trial that Eve announces M = 0 , Alice flips corresponding M with probability 1 2 . Finally, Alice measures all partials A locally. It is obvious that if Alice prepares two quantum states | ϕ i and | ϕ j at random, the maximal probability of Eve guessing correctly which state is prepared is 1 + 1 F i j 2 2 where F i j = | ϕ i | ϕ j | . With the flip operation, we can apply this maximal probability to our analysis below. In this case, we reinterpret that M = 1 ( M = 0 ) means that Eve guessed the quantum state Alice prepared is | ϕ i ( | ϕ j ), which justifies the lossless assumption. Note that this does not compromise security because as an adversary, Eve can guess in this way. In other words, we can now treat this virtual experiment as a game where Eve tries to guess whether Alice is preparing | ϕ i or | ϕ j . For each of all the trials in such a game, it is well known that Eve’s maximal probability of guessing correctly is 1 + 1 F i j 2 2 . Now, we are ready to find the relation between n i and n j by calculating how many trials in which Eve’s guessing is correct. First, n i means that announcing M = 1 at first and Alice also preparing | ϕ i B , which of course leads to guessing correctly. Then, let N i ( N j ) denote Alice preparing the state | ϕ i ( | ϕ j ), which implies that N i + N j N t o t 2 P j . As a result, there are ( N i + N j n i n j ) trials in which Eve announces M = 0 at first and then a random flipping operation on M follows; for every such trial, the probability of guessing correctly is obviously 1 / 2 . Further considering the potential statistical fluctuations made by the random flipping, with a failure probability of ε 1 , the number of Eve guessing correctly in the N i + N j trials is no larger than
n i + 1 2 ( N i n i ) + 1 2 ( N j n j ) + δ 1 ¯ ,
where δ 1 ¯ = δ ( N i + N j n i n j , 1 2 , ε 1 ) is the upper bound of the statistical fluctuation made by the random flipping of the ( N i + N j n i n j ) trials. We let ε 1 be the probability of the amount of successful detection of quantum state | i reach n i . Hence the probability that we get the quantity denoted by Equarion (A24) is ε 1 2 . On the other hand, in the N i + N j trials of guessing | ϕ i and | ϕ j prepared by Alice at random, the probability of Eve guessing correctly is no larger than 1 + 1 F i j 2 2 [50], because the fidelity of | ϕ i and | ϕ j is F i j , Hence, one can assert that when ε 1 2 ε 0 2 , In this case, we let ε 1 = ε 0 . Hence, one can assert that with a failure probability ε 0 ,
n i n j 2 + N i + N j 2 + δ 1 ¯ ( N i + N j ) 1 + 1 F i j 2 2 + δ 2 ¯
holds, where δ 2 ¯ = δ ( N i + N j , 1 + 1 F i j 2 2 , ε 0 2 ) is the upper bound of the statistical fluctuation when Eve’s guessing probability for each trial achieves the upper-bound 1 + 1 F i j 2 2 . Note that because in such a guessing game, conditioned on other trials, the probability of guessing correctly for any fixed trial cannot be larger than 1 + 1 F i j 2 2 , this lemma is applied to any attack. Furthermore, the probability of guessing correctly reaches its maximum, which equals a constant; then, the assumpution of iid holds and the Bernoulli distribution is applied to this case. However, since it is hard to calculate the statistical fluctuation, we use the Chernoff bound δ 2 to approximate it [51].
According to Equation (A25), we can obtain an upper bound of n i n j with a failure probability ε 0 , say
n i n j ( N i + N j ) 1 F i j 2 + 2 δ ( N i + N j , 1 + 1 F i j 2 2 , ε 0 2 ) 2 δ ( N i + N j n i n j , 1 2 , ε 0 ) .
similarly, if we redefine the guessing correctly as M = 1 corresponding to | ϕ j and M = 0 corresponding to | ϕ i , we have that
n j n i ( N i + N j ) 1 F i j 2 + 2 δ ( N i + N j , 1 + 1 F i j 2 2 , ε 0 2 ) 2 δ ( N i + N j n i n j , 1 2 , ε 0 ) .
combining Equation (A26) and Equation (A27), we are clear that
| n i n j | ( N i + N j ) 1 F i j 2 + 2 δ ( N i + N j , 1 + 1 F i j 2 2 , ε 0 2 ) 2 δ ( N i + N j n i n j , 1 2 , ε 0 )
holds with a failure probability 2 ε 0 .
For simplicity’s sake, we enlarge the R.H.S of Equation (A28). Concretely, we replace 2 δ ( N i + N j n i n j , 1 2 , ε 0 2 ) by 2 δ ( N i + N j n i n j , 1 2 , ε 0 2 ) in Equation (A28), say
| n i n j | ( N i + N j ) 1 F i j 2 + 2 δ ( N i + N j , 1 + 1 F i j 2 2 , ε 0 2 ) 2 δ ( N i + N j n i n j , 1 2 , ε 0 ) .
note that these bounds of statistical fluctuations can be derived by the Chernoff bound [52].
Similarly, because of the probability that Alice sends the quantum state 1 2 ( | i A | ϕ i B + | j A | ϕ j B ) is 2 P j , using the well-known Chernoff bound [52], we know that
2 N t o t P j δ ( N t o t , 2 P j , ε 1 ) N i + N j 2 N t o t P j + δ ( N t o t , 2 P j , ε 1 )
Combing Equation (A29) and Equation (A30), we know that
| n i n j | N 1 1 F i j 2 + 2 δ ( N 1 , 1 + 1 F i j 2 2 , ε 0 2 ) 2 δ ( N 2 n i n j , 1 2 , ε 0 )
holds with a failure probability 2 ε 0 + 2 ε 1 , where N 1 = 2 N t o t P j + δ ( N t o t , 2 P j , ε 1 ) and N 2 = 2 N t o t P j δ ( N t o t , 2 P j , ε 1 )
Finally, to derive the relation between n i and n j , we have to consider the relations between n i and n i . It is easy to know that n i = P j P i n i on average since there is no way for Eve to distinguish | i and | i . Hence, using the Chernoff bound [52] again, we know that
P j P i n i δ ( n i , P j P i , ε 2 ) n i P j P i n i + δ ( n i , P j P i , ε 2 )
combining Equation (A31) and Equation (A32), we can obtain the inequality Equation (A21).
In conclusion, we complete the proof. □
With Lemma A1, we can derive the constrains between n i | 2 μ and n j | 2 ν . Since Alice and Bob send the quantum state τ j | 2 μ ( τ j | 2 ν ) with the probability 2 P μ 2 M P ˜ j | 2 μ ( 2 P ν 2 M P ˜ j | 2 ν ) and the fidelity between them is F μ ν j = n = 0 P j + M n | 2 μ P j + M n | 2 ν P ˜ j | 2 μ P ˜ j | 2 ν . By Lemma A1, we can obtain the relation between n j | 2 μ and n j | 2 ν which reads
| C j | 2 μ n j | 2 μ C j | 2 ν n j | 2 ν | μ ν j .
We let P 1 = 2 P μ 2 M P ˜ j | 2 μ and P 2 = 2 P ν 2 M P ˜ j | 2 ν . If P 1 > P 2 , we have C j | 2 μ = P 2 P 1 , C j | 2 ν = 1 and
μ ν j = N 1 1 ( F μ ν j ) 2 + 2 δ ( N 1 , 1 + 1 ( F μ ν j ) 2 2 , ε 0 2 ) 2 δ ( N 2 n j | 2 μ n j | 2 ν , 1 2 , ε 0 ) + δ ( n j | 2 μ , P 2 P 1 , ε 2 )
where N 1 = 2 N t o t P 2 + δ ( N t o t , 2 P 2 , ε 1 ) and N 2 = 2 N t o t P 2 δ ( N t o t , 2 P 2 , ε 1 )
If P 1 < P 2 , we have that C j | 2 ν = P 1 P 2 , C j | 2 μ = 1 and
μ ν j = N 1 1 ( F μ ν j ) 2 + 2 δ ( N 1 , 1 + 1 ( F μ ν j ) 2 2 , ε 0 2 ) 2 δ ( N 2 n j | 2 μ n j | 2 ν , 1 2 , ε 0 ) + δ ( n j | 2 ν , P 1 P 2 , ε 2 )
where N 1 = 2 N t o t P 1 + δ ( N t o t , 2 P 1 , ε 1 ) and N 2 = 2 N t o t P 1 δ ( N t o t , 2 P 1 , ε 1 )
One can know that the constraints Equations (A34) and (A35) are nonlinear because of the n j | 2 μ in δ ( n j | 2 μ , P 2 P 1 , ε 2 ) or n j | 2 ν in δ ( n j | 2 ν , P 1 P 2 , ε 2 ) . To keep the linearity of these constraints for ease of numerical calculations, we replace n j | 2 μ with n 2 μ and replace n j | 2 ν with n 2 ν in μ ν j . That is to say, without compromising the security, we replace Equation (A34) by
μ ν j = N 1 1 ( F μ ν j ) 2 + 2 δ ( N 1 , 1 + 1 ( F μ ν j ) 2 2 , ε 0 2 ) 2 δ ( N 2 n 2 μ n 2 ν , 1 2 , ε 0 ) + δ ( n 2 μ , P 2 P 1 , ε 2 )
and replace Equation (A35) by
μ ν j = N 1 1 ( F μ ν j ) 2 + 2 δ ( N 1 , 1 + 1 ( F μ ν j ) 2 2 , ε 0 2 ) 2 δ ( N 2 n 2 μ n 2 ν , 1 2 , ε 0 ) + δ ( n 2 ν , P 1 P 2 , ε 2 )
moreover, recalling Alice and Bob may both choose intensity 0 and obtain the corresponding number of successful clicks n 0 , we have two additional constraints between n 0 and n 0 | 2 μ , n 0 | 2 ν which reads
| C 0 , μ n 0 C 2 μ 0 n 0 | 2 μ | 0 μ 0 | C 0 , ν n 0 C 2 ν 0 n 0 | 2 ν | 0 ν 0
since the probability of both Alice and Bob sending the quantum state | 0 0 | is P O 2 and the fidelity between | 0 0 | and 1 2 | 0 ˜ 2 μ 0 ˜ 2 μ | + 1 2 | 0 ˜ 2 μ 0 ˜ 2 μ | ( 1 2 | 0 ˜ 2 ν 0 ˜ 2 ν | + 1 2 | 0 ˜ 2 ν 0 ˜ 2 ν | ) is F μ 0 0 = P 0 | 2 μ P ˜ 0 | 2 μ ( F ν 0 0 = P 0 | 2 ν P ˜ 0 | 2 ν ), we can obtain the coefficients of these two constraints according to Lemma A1. For simplicity’s sake’s sake, we let P 1 = P O 2 and P 2 = 2 P μ 2 P ˜ 0 | 2 μ M ; then, if P 1 > P 2 , we have C 0 , μ = P 2 P 1 , C 2 μ 0 = 1 and
0 μ 0 = N 1 1 ( F μ 0 0 ) 2 + 2 δ ( N 1 , 1 + 1 ( F μ 0 0 ) 2 2 , ε 0 2 ) 2 δ ( N 2 n 2 μ n 0 , 1 2 , ε 0 ) + δ ( n 0 , P 2 P 1 , ε 2 )
where N 1 = 2 N t o t P 2 + δ ( N t o t , 2 P 2 , ε 1 ) and N 2 = 2 N t o t P 2 δ ( N t o t , 2 P 2 , ε 1 ) ; otherwise, we have C 0 , μ = 1 , C 2 μ 0 = P 1 P 2 and C 0 , μ = P 2 P 1 , C 2 μ 0 = 1 and
0 μ 0 = N 1 1 ( F μ 0 0 ) 2 + 2 δ ( N 1 , 1 + 1 ( F μ 0 0 ) 2 2 , ε 0 2 ) 2 δ ( N 2 n 2 μ n 0 , 1 2 , ε 0 ) + δ ( n 2 μ , P 1 P 2 , ε 2 )
where N 1 = 2 N t o t P 1 + δ ( N t o t , 2 P 1 , ε 1 ) and N 2 = 2 N t o t P 1 δ ( N t o t , 2 P 1 , ε 1 ) .
Similarly, we let P 1 = P O 2 and P 2 = 2 P ν 2 P ˜ 0 | 2 ν M ; then, if P 1 > P 2 , we have C 0 , ν = P 2 P 1 , C 2 ν 0 = 1 and
0 ν 0 = N 1 1 ( F ν 0 0 ) 2 + 2 δ ( N 1 , 1 + 1 ( F ν 0 0 ) 2 2 , ε 0 2 ) 2 δ ( N 2 n 2 ν n 0 , 1 2 , ε 0 ) + δ ( n 0 , P 2 P 1 , ε 2 )
where N 1 = 2 N t o t P 2 + δ ( N t o t , 2 P 2 , ε 1 ) and N 2 = 2 N t o t P 2 δ ( N t o t , 2 P 2 , ε 1 ) ; otherwise, we have C 0 , ν = 1 , C 2 ν 0 = P 1 P 2 and C 0 , ν = P 2 P 1 , C 2 ν 0 = 1 and
0 ν 0 = N 1 1 ( F ν 0 0 ) 2 + 2 δ ( N 1 , 1 + 1 ( F ν 0 0 ) 2 2 , ε 0 2 ) 2 δ ( N 2 n 2 ν n 0 , 1 2 , ε 0 ) + δ ( n 2 ν , P 1 P 2 , ε 2 )
where N 1 = 2 N t o t P 1 + δ ( N t o t , 2 P 1 , ε 1 ) and N 2 = 2 N t o t P 1 δ ( N t o t , 2 P 1 , ε 1 ) .
Now the gaps between n j | 2 μ v.s. n j | 2 ν , n 0 | 2 μ v.s. n 0 , and n 0 | 2 ν v.s. n 0 have been given. To bound n p h , we can now resort to linear programming below:
max n p h = j = 0 , j N 0 M 2 n j | 2 μ s . t . j = 0 M 1 n j | 2 μ = n 2 μ j = 0 M 1 n j | 2 ν = n 2 ν | C 0 , μ n 0 C 2 μ 0 n 0 | 2 μ | 0 μ 0 | C 0 , ν n 0 C 2 ν 0 n 0 | 2 ν | 0 ν 0 | C j | 2 μ n j | 2 μ C j | 2 ν n j | 2 ν | μ ν j .
For ease of calculation, in all these constraints we let ε 0 = ε 1 = ε 2 = ε a ; then, the total failure probability that we obtain the bound μ ν j is 6 ε a . Meanwhile, the failure probability that we obtain the last two bounds on is 2 ε a . Hence, the total failure probability of all these constraints is 6 ( M + 2 ) ε a . To conclude, with the help of the linear programming in Equation (A41), one can calculate the upper-bound of n p h .
For simplicity’s sake, we give the analytical solution of this linear programming below. We divide n p h into two parts, say
n p h = n 0 | 2 μ + j = 2 , 4 , 6 n j | 2 μ .
according to the inequality | C 0 , μ n 0 C 2 μ 0 n 0 | 2 μ | 0 μ 0 , we can obtain that the bounds of n 0 | 2 μ are
n 0 | 2 μ ¯ = C 0 , μ n 0 + 0 μ 0 C 2 μ 0 ,
n 0 | 2 μ ̲ = C 0 , μ n 0 0 μ 0 C 2 μ 0 .
similarly, with the inequality | C 0 , ν n 0 C 2 ν 0 n 0 | 2 ν | 0 ν 0 , we have the bounds of n 0 | 2 ν , i.e.,
n 0 | 2 ν ¯ = C 0 , ν n 0 + 0 ν 0 C 2 ν 0 ,
n 0 | 2 ν ̲ = C 0 , ν n 0 0 ν 0 C 2 ν 0 .
besides the bound n 0 | 2 μ ¯ , we need to calculate the upper bound of j = 2 , 4 , 6 n j | 2 μ which we derive below. If we set μ > ν and P μ > P ν , according to Equation A33, we have
C j | 2 μ = P ν 2 P ˜ j | 2 ν P μ 2 P ˜ j | 2 μ , C j | 2 ν = 1 ,
for j 1 . Hence, n j | 2 ν P ν 2 P ˜ j | 2 ν P μ 2 P ˜ j | 2 μ n j | 2 μ + μ ν j where j 1 hold. Then, combing with the equality n 2 ν = j = 0 M n j | 2 ν , we have
j = 1 , 3 , 5 , 7 P ν 2 P ˜ j | 2 ν P μ 2 P ˜ j | 2 μ n j | 2 μ + j = 2 , 4 , 6 P ν 2 P ˜ j | 2 ν P μ 2 P ˜ j | 2 μ n j | 2 μ n 2 ν j = 1 7 μ ν j n 0 | 2 ν ¯ .
It is easy to prove that
P ν 2 P ˜ j | 2 ν P μ 2 P ˜ j | 2 μ P ν 2 P ˜ j + 1 | 2 ν P μ 2 P ˜ j + 1 | 2 μ
for j 1 holds in the case of μ > ν and P μ > P ν . Consequently, we can know that
P ν 2 P ˜ 1 | 2 ν P μ 2 P ˜ 1 | 2 μ ( j = 1 , 3 , 5 , 7 n j | 2 μ ) + P ν 2 P ˜ 2 | 2 ν P μ 2 P ˜ 2 | 2 μ ( j = 2 , 4 , 6 n j | 2 μ ) n 2 ν j = 1 7 μ ν j n 0 | 2 ν ¯ .
Finally, combing with the equality j = 0 M 1 n j | 2 μ = n 2 μ , Equations (A43) and (A45), we obtain the upper bound given by
j = 2 , 4 , 6 n j | 2 μ P ν 2 P ˜ 1 | 2 ν P μ 2 P ˜ 1 | 2 μ n 2 μ n 2 ν + j = 1 7 μ ν j + C 0 , ν n 0 + 0 ν 0 C 2 ν 0 C 0 , μ n 0 0 μ 0 C 2 μ 0 P ν 2 P ˜ 1 | 2 ν P μ 2 P ˜ 1 | 2 μ P ν 2 P ˜ 1 | 2 ν P μ 2 P ˜ 1 | 2 μ P ν 2 P ˜ 2 | 2 ν P μ 2 P ˜ 2 | 2 μ .
Finally, we have the upper bound of n p h , say
n p h U = P ν 2 P ˜ 1 | 2 ν P μ 2 P ˜ 1 | 2 μ n 2 μ n 2 ν + j = 1 7 μ ν j + C 0 , ν n 0 + 0 ν 0 C 2 ν 0 C 0 , μ n 0 0 μ 0 C 2 μ 0 P ν 2 P ˜ 1 | 2 ν P μ 2 P ˜ 1 | 2 μ P ν 2 P ˜ 1 | 2 ν P μ 2 P ˜ 1 | 2 μ P ν 2 P ˜ 2 | 2 ν P μ 2 P ˜ 2 | 2 μ + C 0 , μ n 0 + 0 μ 0 C 2 μ 0 .

References

  1. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 9–12 December 1984. [Google Scholar]
  3. Mayers, D. Unconditional Security in Quantum Cryptography. J. ACM 2001, 48, 351–406. [Google Scholar] [CrossRef] [Green Version]
  4. Lo, H.K.; Chau, H.F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 1999, 283, 2050–2056. [Google Scholar] [CrossRef] [Green Version]
  5. Shor, P.W.; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Dixon, A.; Dynes, J.; Lucamarini, M.; Fröhlich, B.; Sharpe, A.; Plews, A.; Tam, S.; Yuan, Z.; Tanizawa, Y.; Sato, H.; et al. High speed prototype quantum key distribution system and long term field trial. Opt. Express 2015, 23, 7583–7592. [Google Scholar] [CrossRef]
  7. Yin, H.L.; Chen, T.Y.; Yu, Z.W.; Liu, H.; You, L.X.; Zhou, Y.H.; Chen, S.J.; Mao, Y.; Huang, M.Q.; Zhang, W.J.; et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 2016, 117, 190501. [Google Scholar] [CrossRef] [Green Version]
  8. Zhou, Y.H.; Yu, Z.W.; Wang, X.B. Making the decoy-state measurement-device-independent quantum key distribution practically useful. Phys. Rev. A 2016, 93, 042324. [Google Scholar] [CrossRef] [Green Version]
  9. Liao, S.K.; Cai, W.Q.; Liu, W.Y.; Zhang, L.; Li, Y.; Ren, J.G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.P.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef] [Green Version]
  10. Boaron, A.; Boso, G.; Rusca, D.; Vulliez, C.; Autebert, C.; Caloz, M.; Perrenoud, M.; Gras, G.; Bussières, F.; Li, M.J.; et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 2018, 121, 190502. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  11. Poppe, A.; Peev, M.; Maurhart, O. Outline of the SECOQC quantum-key-distribution network in Vienna. Int. J. Quantum Inf. 2008, 6, 209–218. [Google Scholar] [CrossRef]
  12. Sasaki, M.; Fujiwara, M.; Ishizuka, H.; Klaus, W.; Wakui, K.; Takeoka, M.; Miki, S.; Yamashita, T.; Wang, Z.; Tanaka, A.; et al. Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express 2011, 19, 10387–10409. [Google Scholar] [CrossRef] [PubMed]
  13. Wang, S.; Chen, W.; Yin, Z.Q.; Li, H.W.; He, D.Y.; Li, Y.H.; Zhou, Z.; Song, X.T.; Li, F.Y.; Wang, D.; et al. Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express 2014, 22, 21739–21756. [Google Scholar] [CrossRef] [Green Version]
  14. Chen, Y.A.; Zhang, Q.; Chen, T.Y.; Cai, W.Q.; Liao, S.K.; Zhang, J.; Chen, K.; Yin, J.; Ren, J.G.; Chen, Z.; et al. An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature 2021, 589, 214–219. [Google Scholar] [CrossRef] [PubMed]
  15. Takeoka, M.; Guha, S.; Wilde, M.M. Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 2014, 5, 1–7. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Pirandola, S.; Laurenza, R.; Ottaviani, C.; Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun. 2017, 8, 1–15. [Google Scholar] [CrossRef] [Green Version]
  17. Hwang, W.Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett. 2003, 91, 057901. [Google Scholar] [CrossRef] [Green Version]
  18. Lo, H.K.; Ma, X.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 230504. [Google Scholar] [CrossRef] [Green Version]
  19. Wang, X.B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 2005, 94, 230503. [Google Scholar] [CrossRef] [Green Version]
  20. Tamaki, K.; Lo, H.K.; Wang, W.; Lucamarini, M. Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound. arXiv 2018, arXiv:1805.05511. [Google Scholar]
  21. Ma, X.; Zeng, P.; Zhou, H. Phase-matching quantum key distribution. Phys. Rev. X 2018, 8, 031043. [Google Scholar] [CrossRef] [Green Version]
  22. Curty, M.; Azuma, K.; Lo, H.K. Simple security proof of twin-field type quantum key distribution protocol. NPJ Quantum Inf. 2019, 5, 1–6. [Google Scholar] [CrossRef]
  23. Wang, X.B.; Yu, Z.W.; Hu, X.L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef] [Green Version]
  24. Lin, J.; Lütkenhaus, N. Simple security analysis of phase-matching measurement-device-independent quantum key distribution. Phys. Rev. A 2018, 98, 042332. [Google Scholar] [CrossRef] [Green Version]
  25. Yin, H.L.; Fu, Y. Measurement-device-independent twin-field quantum key distribution. Sci. Rep. 2019, 9, 1–13. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. Wang, R.; Yin, Z.Q.; Lu, F.Y.; Wang, S.; Chen, W.; Zhang, C.M.; Huang, W.; Xu, B.J.; Guo, G.C.; Han, Z.F. Optimized protocol for twin-field quantum key distribution. Commun. Phys. 2020, 3, 1–7. [Google Scholar] [CrossRef]
  27. Minder, M.; Pittaluga, M.; Roberts, G.; Lucamarini, M.; Dynes, J.; Yuan, Z.; Shields, A. Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photonics 2019, 13, 334–338. [Google Scholar] [CrossRef] [Green Version]
  28. Pittaluga, M.; Minder, M.; Lucamarini, M.; Sanzaro, M.; Woodward, R.I.; Li, M.J.; Yuan, Z.; Shields, A.J. 600-km repeater-like quantum communications with dual-band stabilization. Nat. Photonics 2021, 15, 530–535. [Google Scholar] [CrossRef]
  29. Chen, J.P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.J.; Han, Z.Y.; Ma, S.Z.; Hu, X.L.; Li, Y.H.; Liu, H.; et al. Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas. Nat. Photonics 2021, 5, 570–575. [Google Scholar] [CrossRef]
  30. Wang, S.; He, D.Y.; Yin, Z.Q.; Lu, F.Y.; Cui, C.H.; Chen, W.; Zhou, Z.; Guo, G.C.; Han, Z.F. Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system. Phys. Rev. X 2019, 9, 021046. [Google Scholar] [CrossRef] [Green Version]
  31. Zhong, X.; Hu, J.; Curty, M.; Qian, L.; Lo, H.K. Proof-of-principle experimental demonstration of twin-field type quantum key distribution. Phys. Rev. Lett. 2019, 123, 100506. [Google Scholar] [CrossRef] [Green Version]
  32. Fang, X.T.; Zeng, P.; Liu, H.; Zou, M.; Wu, W.; Tang, Y.L.; Sheng, Y.J.; Xiang, Y.; Zhang, W.; Li, H.; et al. Implementation of quantum key distribution surpassing the linear rate-transmittance bound. Nat. Photonics 2020, 14, 422–425. [Google Scholar] [CrossRef]
  33. Liu, Y.; Yu, Z.W.; Zhang, W.; Guan, J.Y.; Chen, J.P.; Zhang, C.; Hu, X.L.; Li, H.; Jiang, C.; Lin, J.; et al. Experimental twin-field quantum key distribution through sending or not sending. Phys. Rev. Lett. 2019, 123, 100505. [Google Scholar] [CrossRef] [Green Version]
  34. Chen, J.P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.; Hu, X.L.; Guan, J.Y.; Yu, Z.W.; Xu, H.; Lin, J.; et al. Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km. Phys. Rev. Lett. 2020, 124, 070501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  35. Yin, Z.Q.; Lu, F.Y.; Teng, J.; Wang, S.; Chen, W.; Guo, G.C.; Han, Z.F. Twin-field protocols: Towards intercity quantum key distribution without quantum repeaters. Fundam. Res. 2021, 1, 93–95. [Google Scholar] [CrossRef]
  36. Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [Green Version]
  37. Kwek, L.C.; Cao, L.; Luo, W.; Wang, Y.; Sun, S.; Wang, X.; Liu, A.Q. Chip-based quantum key distribution. AAPPS Bull. 2021, 31, 1–8. [Google Scholar] [CrossRef]
  38. Fan-Yuan, G.J.; Wang, S.; Yin, Z.Q.; Chen, W.; He, D.Y.; Guo, G.C.; Han, Z.F. Afterpulse analysis for passive decoy quantum key distribution. Quantum Eng. 2020, 2, e56. [Google Scholar] [CrossRef]
  39. Cui, C.; Yin, Z.Q.; Wang, R.; Chen, W.; Wang, S.; Guo, G.C.; Han, Z.F. Twin-field quantum key distribution without phase postselection. Phys. Rev. Appl. 2019, 11, 034053. [Google Scholar] [CrossRef] [Green Version]
  40. Xu, F.; Qi, B.; Ma, X.; Xu, H.; Zheng, H.; Lo, H.K. Ultrafast quantum random number generation based on quantum phase fluctuations. Opt. Express 2012, 20, 12366–12377. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  41. Abellán, C.; Amaya, W.; Jofre, M.; Curty, M.; Acín, A.; Capmany, J.; Pruneri, V.; Mitchell, M. Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode. Opt. Express 2014, 22, 1645–1654. [Google Scholar] [CrossRef]
  42. Zhang, C.M.; Xu, Y.W.; Wang, R.; Wang, Q. Twin-Field Quantum Key Distribution with Discrete-Phase-Randomized Sources. Phys. Rev. Appl. 2020, 14, 064070. [Google Scholar] [CrossRef]
  43. Curras Lorenzo, G.; Wooltorton, L.; Razavi, M. Twin-field quantum key distribution with fully discrete phase randomization. Phys. Rev. Appl. 2020, 15, 014016. [Google Scholar] [CrossRef]
  44. Jiang, C.; Yu, Z.W.; Hu, X.L.; Wang, X.B. Sending-or-not-sending twin-field quantum key distribution with discrete-phase-randomized weak coherent states. Phys. Rev. Res. 2020, 2, 043304. [Google Scholar] [CrossRef]
  45. Ben-Or, M.; Horodecki, M.; Leung, D.W.; Mayers, D.; Oppenheim, J. The universal composable security of quantum key distribution. In Proceedings of the Theory of Cryptography Conference, Cambridge, MA, USA, 10–12 February 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 386–406. [Google Scholar]
  46. Müller-Quade, J.; Renner, R. Composability in quantum cryptography. New J. Phys. 2009, 11, 085006. [Google Scholar] [CrossRef] [Green Version]
  47. Koashi, M. Simple security proof of quantum key distribution based on complementarity. New J. Phys. 2009, 11, 045018. [Google Scholar] [CrossRef]
  48. Cao, Z.; Zhang, Z.; Lo, H.K.; Ma, X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J. Phys. 2015, 17, 053014. [Google Scholar] [CrossRef]
  49. Currás-Lorenzo, G.; Navarrete, Á.; Azuma, K.; Kato, G.; Curty, M.; Razavi, M. Tight finite-key security for twin-field quantum key distribution. NPJ Quantum Inf. 2021, 7, 1–9. [Google Scholar] [CrossRef]
  50. Ivanovic, I.D. How to differentiate between non-orthogonal states. Phys. Lett. A 1987, 123, 257–259. [Google Scholar] [CrossRef]
  51. Maeda, K.; Sasaki, T.; Koashi, M. Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit. Nat. Commun. 2019, 10, 1–8. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  52. Zhang, Z.; Zhao, Q.; Razavi, M.; Ma, X. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems. Phys. Rev. A 2017, 95, 012333. [Google Scholar] [CrossRef]
Figure 1. Secret key rate ( l / N t o t ) of fully discrete TF-QKD [43]. In this figure, the key rate corresponding to the total number of pulses N t o t is 1 × 10 12 , 1 × 10 13 , 1 × 10 14 , 1 × 10 17 , plotted above. Note that we set M = 8 in the simulation.
Figure 1. Secret key rate ( l / N t o t ) of fully discrete TF-QKD [43]. In this figure, the key rate corresponding to the total number of pulses N t o t is 1 × 10 12 , 1 × 10 13 , 1 × 10 14 , 1 × 10 17 , plotted above. Note that we set M = 8 in the simulation.
Entropy 25 00258 g001
Table 1. List of parameters uesd in the numerical simulations. Here, e m is loss-independent misalignment error rate due to optical imperfect interference, p d is dark counting probability for each SPD, ξ is fiber loss constant, η d denotes detection efficiency of each SPD, f is error-correction inefficiency, and ϵ t o l denotes the total security coefficient.
Table 1. List of parameters uesd in the numerical simulations. Here, e m is loss-independent misalignment error rate due to optical imperfect interference, p d is dark counting probability for each SPD, ξ is fiber loss constant, η d denotes detection efficiency of each SPD, f is error-correction inefficiency, and ϵ t o l denotes the total security coefficient.
e m p d ξ (dB/km) η d f ϵ tol
0.03 1 × 10 8 0.20.31.1 4.6566 × 10 10
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, R.-Q.; Yin, Z.-Q.; Jin, X.-H.; Wang, R.; Wang, S.; Chen, W.; Guo, G.-C.; Han, Z.-F. Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization. Entropy 2023, 25, 258. https://doi.org/10.3390/e25020258

AMA Style

Wang R-Q, Yin Z-Q, Jin X-H, Wang R, Wang S, Chen W, Guo G-C, Han Z-F. Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization. Entropy. 2023; 25(2):258. https://doi.org/10.3390/e25020258

Chicago/Turabian Style

Wang, Rui-Qiang, Zhen-Qiang Yin, Xiao-Hang Jin, Rong Wang, Shuang Wang, Wei Chen, Guang-Can Guo, and Zheng-Fu Han. 2023. "Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization" Entropy 25, no. 2: 258. https://doi.org/10.3390/e25020258

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop