Analysis of a High-Dimensional Extended B92 Protocol
Abstract
Quantum key distribution (QKD) allows two parties to establish a shared secret key that is secure against all-powerful adversaries. One such protocol named B92 is quite appealing due to its simplicity but is highly sensitive to channel noise. In this work, we investigate a high-dimensional variant of an extended version of the B92 protocol and show that it can distill a key over high noise channels. The protocol we consider requires that Alice send only three high-dimensional states and Bob only perform partial measurements. We perform an information-theoretic security analysis of our protocol and compare its key rate to that of a high-dimensional BB84 protocol over depolarization and amplitude damping channels.
1 Introduction
The need for perfect security necessitated the development of cryptographic systems where there are no computational constraints on the capabilities of the adversary. Quantum key distribution (QKD) is one such system that is extensively studied and is increasingly maturing to the point of real-world adoption. In QKD, using quantum mechanical properties of communication resources, two parties Alice (A) and Bob (B), following a specified set of steps, generate a shared secret that is secure from an all-powerful adversary Eve (E).
Since the first QKD protocol by Bennett and Brassard in (BB84) [1], there have been numerous advances in both theoretical and practical aspects [2, 3, 4]. However, because generating, maintaining, and manipulating quantum resources are exceptionally hard with current technologies, people have strived to create conceptually simpler protocols that also require less quantum resources. For instance, BB84 itself uses four quantum states and two measurement bases. In 1992, Bennett proposed an even simpler QKD protocol called B92, that uses only two non-orthogonal states and measurement bases [5].
The unconditional security of this protocol has been investigated by several authors [6, 7] with continually improving results (for instance, in [7], a noise tolerance of is reported). However, B92 is very noise sensitive compared to other protocols like BB84 as was already noted in the original paper [5]. Lucamarini et al. [8], proposed an extended version of B92 (Ext-B92) which added two additional non-informative states to better bound Eve’s information gain. Depending on the user-defined choice for key encoding states, the noise tolerance of that protocol can approach in the asymptotic scenario [8], similar to BB84, and at least in the finite key scenario [9].
These protocols mentioned above use qubits (dimension two systems) as the communication resource between Alice and Bob. However, higher dimensional quantum systems (see [10] for a brief survey) have been shown to have several advantages and interesting properties over qubit-based protocols. Some protocols have been shown to withstand a high channel noise level as the dimension of the system increases [11, 12, 13, 14]. Others exhibit interesting theoretical properties such as the so-called “Round Robin” protocol which can bound Eve’s information based only on the dimension of the system and not necessarily through observing channel noise [15]. In addition to several theoretical results that prove the unconditional security of HD-QKD protocols, the actual technology to implement high-dimensional systems is also becoming more mature with recent high-dimensional protocols proving to be feasible to implement [16, 17, 18, 19, 20]. Thus, it is worth studying protocols that are highly susceptible to noise, like B92 based variants (in our case the extended B92), to see if HD-systems give an advantage.
In this work, we propose a high-dimensional variant of the Ext-B92 protocol of [8]. Keeping in mind that certain high-dimensional states are difficult to create or distinguish, we make sure in our protocol to limit the required state preparations and measurement operations required. In particular, Alice need only be able to send three high dimensional states while Bob need only be able to perform a computational basis measurement (distinguishing any computational state ) or be able to perform a partial basis measurement in an alternative basis - this partial measurement need only distinguish a particular superposition state defined in the protocol and need not be capable of distinguishing all possible states. As far as we are aware, this is a novel high-dimensional QKD protocol.
Despite these limitations on Alice and Bob’s capabilities, we show that these higher dimensional states do help improve noise tolerance in this protocol as the dimension of the system increases which agrees with recent research on high-dimensional BB84. We perform an information-theoretic security analysis and show that it can maintain a positive key rate while withstanding noise levels of for qubits (dimension ) to for dimension in a depolarizing channel. Thus, we show that higher dimensions can aid in depolarization noise tolerance for a B92 style encoding scheme with (partial) extended test cases in the form of a third basis state being transmitted for testing the channel. Moreover, we consider an amplitude damping channel and show that choosing the distinguished superposition state carefully in a high-dimensional QKD protocol is of significant importance as different choices lead to different noise tolerances.
We make several contributions in this work. First, we describe and analyze a high-dimensional version of the Ext-B92 protocol originally introduced for qubits [8]. We perform an information theoretic security analysis against collective attacks (a powerful class of attacks against QKD protocols) to derive its key-rate in the asymptotic scenario for arbitrary dimensions and channel parameters. Our methods here may have a broader impact in other QKD protocol security analyses, especially for high-dimensional systems with only partial basis measurements or state preparations as with our protocol here. Finally, we evaluate our resulting key rate and compare it with a high-dimensional version of the BB84 protocol, showing how the choice of states to send can greatly affect the key-rate depending on the channel.
2 Notation
For a quantum system we will use to denote its density operator. Its von Neumann entropy will be denoted by and is defined by . Given a bipartite quantum state shared by two systems and , we will denote the conditional von Neumann entropy of given access to , by . We will often forgo writing the subscript when the context is clear. This conditional entropy is defined as . The Shannon entropy of will be denoted by and the conditional Shannon entropy of two systems and , will be denoted by . The binary entropy function will also be represented by where for . All logarithms presented in this work are base . For an arbitrary quantum state , we use to denote its projector . Finally, given a vector and a numerical value such as we sometimes write to mean .
Later, to compute the lower bound of the conditional von Neumann entropy of a classical-quantum state , we make use of the following theorem:
Theorem 1.
(From [21]): Let be a finite dimensional Hilbert space. Consider the following density operator.
where is a normalization term, , and each (these are not necessarily normalized, nor orthogonal, states; also it might be that for some and ). Let . Then:
where:
and:
3 The Protocol
The protocol we propose here is a high-dimensional variant of the Ext-B92 protocol originally described in [8]. In that protocol, two non-orthogonal states, similar to B92, are used for key encoding while two additional states are used for quantum tomography (these four states together come from two distinct bases). In the higher dimensional case we analyze here, we will use two non-orthogonal states for key encoding; for error testing, we adopt a simplification from [9] (done there for the qubit case) and not require users to be able to control two complete bases. More specifically, in our high-dimensional extended B92, Alice sends and to encode classical key bits of and respectively, where are fixed and chosen from the -dimensional computational basis states . We ask that Alice send only as the additional uninformative state. Thus, Alice need only be able to prepare and send three distinct quantum states. On Bob’s part, we require his ability to measure in two POVMs. These are (the complete computational basis) and where of course, the identity operator is understood to be -dimensional. Hence, Bob would be able to detect any computational basis state but would only need to detect . Our protocol, which we call here HD-Ext-B92, in detail appears in Protocol 1.
Public Parameters: The dimension of a signal state and the choice of distinct are arbitrary, but are fixed at the start of the protocol and known to all parties (including the adversary).
Quantum Communication Stage: The quantum communication stage of the protocol will repeat the following until a sufficiently large raw-key has been distilled:
-
1.
Alice chooses randomly whether this round will be a “key-round”, where a raw key bit will attempt to be established, or a “test” round, which will be used for error testing later. If this is a key-round, she will choose a random key bit and if this is , she will prepare and send the state ; otherwise, she sends the state . If this is a test round, she will prepare , , or choosing uniformly at random.
-
2.
Bob measures in either the basis or using POVM . In a key-round, if he uses and observes any outcome other than , then he sets his bit to be 1. Otherwise, if he uses POVM and observes , then he sets his bit to be 0. All other results are considered inconclusive.
-
3.
Alice informs Bob over the authenticated channel whether this was a test round or a key-round. If this is a key-round, Bob also tells Alice if his result was inconclusive (in which case both parties discard the iteration). On test-rounds, both parties disclose their choices and measurement outcomes to determine the error rate in the channel. In particular, they will observe those statistics enumerated in Table 1. Note that we will not discard mismatched basis events; i.e., events where Alice and Bob use different bases. Indeed, such events can greatly improve key generation rates [22, 23, 24, 25, 26] and so we use this technique here.
Classical Communication Stage: Alice and Bob will next run an error correction protocol and a privacy amplification protocol resulting in a secret key of size bits (possibly if it is determined that Eve has too much information, to be discussed later in this paper, and so parties abort the protocol).
Parameter | Description of Probability Value |
---|---|
Bob observes conditioned on Alice sending and Bob choosing the basis | |
Bob observes conditioned on Alice sending and Bob choosing the basis | |
Bob observes conditioned on Alice sending and Bob choosing the basis | |
Bob observes conditioned on Alice sending and Bob choosing POVM | |
Bob observes conditioned on Alice sending and Bob choosing POVM | |
Bob observes conditioned on Alice sending and Bob choosing POVM |
4 Security Analysis
In the quantum communication stage of our protocol, Alice and Bob use the quantum channel to establish a raw-key. Because Eve has total control over this channel, she may attack the traveling signals arbitrarily while only respecting the laws of physics. In this paper, we consider collective attacks whereby Eve attacks each round of the protocol independently and identically, but may delay her measurements until the end of the protocol. These are a powerful class of attack which often imply security of general coherent attacks [27, 28], though we leave a complete proof of whether this applies to our protocol as future work.
The goal of our analysis is to obtain a lower bound on the conditional von Neumann entropy , which represents how much entropy is left in Alice’s register , given Eve’s (quantum) memory . Then, we will find how much this quantity differs from the conditional Shannon entropy , which represents how much entropy is left in Alice’s register given Bob’s memory . These two terms will ultimately let us calculate our quantity of interest from this protocol, which is, the key rate (namely, the number of secret key bits, denoted over the size of the produced raw key denoted ). To compute the key rate we use the Devetak Winter key-rate [29, 30], which states the key rate in the asymptotic setting is:
(1) |
where the infimum is over all collective attacks performed by Eve that fall within the range of observed noise statistics (in our case, those statistics shown in Table 1). Note that the above entropy functions are computed over a single key-round. However is not straightforward to calculate, unlike , because it involves Eve’s quantum memory on which we only have partial information. Nevertheless, we can obtain a lower bound on which will be the main goal of our security analysis.
We begin by modeling the state of the joint quantum system held between Alice, Bob, and Eve at the end of one key-round of the protocol. That is, to compute Equation 1, we need the von Neumann entropy of the resulting density operator conditioned on a key bit being distilled and so we must model the joint quantum state, conditioning on the event that Alice and Bob establish a key bit.
At the beginning of the protocol, Alice decides on her classical bit and sends her qudit accordingly to Bob. If she wants to send classical bit , she sends a and if she wants to send , she sends a . So when she sends the qudits, her own classical register, denoted by and the transit register, denoted by (used to model the traveling qudit), is in the following state:
Eve attacks this traveling qudit with a unitary attack operator , which acts on Hilbert space . Here, models Eve’s memory space. Assuming her own memory is in an arbitrary but normalized state that resides in , we can describe ’s action on a basis state as:
where is the dimension of each qudit and each is an arbitrary state in Eve’s ancilla. Because is unitary, we note that the following must hold: Additionally, by linearity of we have:
(2) |
where, . So the result of Eve’s attack on is the following:
where, recall, is the projection operator. Henceforth, we will forgo writing the subscript for a register when the context is clear. Now, after the qudit arrives at Bob’s lab, he measures the transit register in either POVM or with equal probability. Let’s consider the case when he uses and gets the outcome (we are conditioning on a successful key-round for this analysis). This is the case when Bob sets his key-bit to , because in a noiseless scenario, this outcome could only be obtained when Alice would have sent an . Let’s define the measurement operator in this case as . Then the un-normalized post-measurement state, conditioned on him observing (again, we are only interested, for the moment, in a successful key distillation round) is:
(3) |
where in the last equality, we have defined and . Now that Bob has his basis measurement result at his hand, we can trace out the transit register and add Bob’s register to hold his measurement result. Then the resulting state is:
Similarly, if he uses POVM and gets outcome , he can be certain in a noiseless scenario that Alice has sent a . With the measurement operator , in this case we get the following un-normalized post-measurement state:
Following a similar procedure as before, we trace out the transit register and add Bob’s register holding his measurement result. The resulting density operator is:
Then the total (still non-normalized) density operator that represents a key-bit generation round, is the following:
(4) |
Keeping in mind that, our ultimate goal is to bound Eve’s entropy about Alice’s register, i.e. , in the case where Alice and Bob shares a key-bit, we trace out Bob’s register too, keeping only the registers of Alice and Eve. Thus, we calculate the final required density operator as:
(5) |
where the normalization term can be calculated as:
(6) |
and:
Thus, to find a lower bound on (thus giving us a lower bound on the protocol’s key-rate), we must determine bounds for the inner-products appearing in the above expressions. Of course, these inner products are functions of Eve’s quantum ancilla. We show how to determine suitable bounds on these systems based only on parameters that are directly observable in our protocol during test rounds (see Table 1).
4.1 Parameter Estimation
To calculate the conditional entropy of , we need to estimate all the inner products appearing in equation (6). This can be done by connecting these inner products with observable noise statistics that arise from test rounds of Alice and Bob’s quantum communication. Let us see the statistics that can be observed directly in a test round. For example, in a round where Alice sends an or a , Eve attacks with , and Bob measures in ; the probability that Bob gets a particular outcome in can be used to estimate partial basis channel noise. In the following, by and , we denote the probability that, given that Alice prepares or and Bob measures the transit register in basis then the outcome is for a particular . (See also Table 1.)
(8) | ||||
(9) |
thus giving us as needed in the entropy equation. Now, we trace the evolution of the quantum system when Alice prepares and Bob measures in POVM . For example, we can not observe the inner product directly. But we consider the probability that Alice sends an , Eve attacks with , and Bob measures in to find a , denoted as :
(10) |
where, we have used equation (8) for and an elementary property of complex inner products. Notice that, even though we could not observe , equation (10) will imply:
(11) |
Using this estimation of , we can now estimate the inner product , which appears in the normalizer in equation (6). This is:
(12) |
Now let’s focus on calculating . Remembering that (See equation (2)), we can easily derive the following:
(13) |
where we have used equation (8) and (9) for . Now if we look closely at equation , we see that is actually directly observable. Because it is the probability that Alice sends a , Eve attacks with , and conditioned on the case that Bob measures in , gets an outcome . We denote it by and see that:
(14) |
and consequently, . So, from equations (13) and (14) we infer the following:
(15) |
Notice that equation (13) and consequently (15), holds for all . So we immediately get for normalizer . Now let’s calculate the last inner product in which is . First let’s discover the constituent inner products for . Then we will connect each of those to Alice and Bob’s observables.
(16) |
Now, let us take advantage of another directly observable quantity. Which is the probability that Bob would measure a in the basis if Alice indeed sent a . We denote it as and see that:
(17) |
Equation (17) implies that:
(18) |
Along with the fact that and from equation (14), we can say from equation (16) and (18) that:
This concludes the estimation of inner products appearing in the normalizer of in (6). We need to estimate the real parts of three more classes of inner products to calculate each of the -terms appearing in Theorem 1. These are . In the following we connect these inner products to observable statistics. Let’s focus on the first one:
(19) |
where we have used the definition of in the first equality and have used equation (8) and (15) to insert the value of . Now let’s focus on the second inner product :
(20) |
The value of and is found in and (15) respectively. Furthermore, is simply because of equation (8). Noticeably, the term is not observable. We will deal with this a bit later. Now we move on to the last of the necessary inner products for the theorem, .
(21) |
where the unknown terms can be found in equations (11) and (15) respectively. In equation (21), we are again faced with a term for which we do not have a direct observation. Now we deal with this term and the other unobservable term from equation (20), which is . Although it is not hard to see, we need to take several steps to find an equation that relates these two inner products. Consider which we may expand as:
(22) |
First let’s deal with the unobservable term . It is easy to see that, the probability of Alice sending a , Eve attacking with and Bob measures in to find a , denoted by is:
(23) |
From equation (23), it is clear that:
(24) |
The value of one of the other three unobservable terms appearing in equation (22), i.e., can be found in equation (11). However, are unobservable at this point. With the help of equations (11) and (24), we can rewrite equation (22) as:
(25) |
We further notice from equation ,
(26) |
Then, we equate the previous two equations (25), (26) to ultimately find:
(27) |
Let’s define the right-hand side of equation (27) to be , the value of which may be computed by Alice and Bob based only on observed statistics of the quantum channel. Now we have all the pieces necessary to compute the conditional entropy according to Theorem 1. We minimize given by Equation 7 over the two unobservable values. Note that we minimize over these unobservable quantities as we must assume that Eve choose the attack strategy that gives her the most information. However, her attack must be constrained by the above analysis. These unobservable inner-products are further constrained by Cauchy-Schwarz in that and similarly for the other inner product. The sum of these two values is further constrained by Equation 27 (the value ). With the bound on calculated, we can focus on the Shannon entropy of Alice’s register given Bob’s register, i.e. . To see it clearly, let us remember the density operator in equation (4), where Bob’s register was still in place. From that , we can see that the probability of Alice and Bob sharing different pairs of classical bits and is the following:
From , it is trivial to compute . From all of this, we may easily compute a lower-bound on the min-entropy and also directly compute thus giving us a lower-bound on the key-rate of this protocol.
4.2 Evaluation
Note that the above security analysis and bound of and , would hold for an arbitrary quantum channel; one need only observe those values listed in Table 1 in order to minimize as described in the previous section. As examples, and to compare with other protocols, we will evaluate our protocol in two different channels, commonly used in QKD protocol evaluation. These are the depolarizing channel and the amplitude damping channel. First, let’s consider the depolarization channel. Given a density operator acting on a Hilbert space of dimension , the depolarization channel with parameter , denoted here as acts as follows:
(28) |
To calculate the key rate of our protocol, we calculate the required observable statistics assuming the adversary uses this channel (in particular, the statistics indexed in Table 1). These are easily found to be:
This is sufficient to evaluate the key-rate of our protocol as shown in Figure 1. Note that, as with other high-dimensional QKD protocols, as the dimension of the system increases, the tolerance to depolarization noise also increases. In our numerical evaluations, the noise tolerance approaches as the dimension increases thus showing that, as with other high-dimensional QKD protocols, the extended-B92 style scheme can also benefit from higher dimensional systems, at least against this particular channel type.
We also compare with the HD-BB84 protocol [31] which we now state for completeness. Similar to the qubit case, the qudit based HD-BB84 uses two bases, namely, the computational basis and another basis denoted by where . We assume the two bases are mutually unbiased. Alice sends basis states from these two bases and Bob measures in or . If both parties chose the basis, the result is used for their raw key; otherwise, if both parties choose the basis, they use this to measure the noise in the quantum channel. The unconditional security of this protocol has been proven [32, 33]. An entropic uncertainty relation presented in [34] can be used to easily derive the following asymptotic key rate for HD-BB84 assuming a depolarization channel with a noise parameter . The final equation reads:
The result of this comparison is presented in Figure 2. As expected, BB84 outperforms our protocol. However, this is not surprising as BB84 at the qubit level also outperforms the B92 and Extended B92 protocol. Furthermore, our high-dimensional protocol is not even utilizing two complete bases as HD-BB84 does; instead, we are using a weak version where Alice need only send three states and Bob need only perform partial measurements in the second basis. Note also that we did not choose an optimal basis choice and, indeed, alternative encoding selections for the state may lead to higher key rates for our HD-Ext-B92 protocol as demonstrated at least for the qubit case [8, 21].


Another channel of interest is the amplitude damping channel which can be described its Kraus operators:
(29) |
and:
(30) |
key rate | |
---|---|
.85 | |
.85 | |
.29 | |
.29 |
As before, we can compute those observable parameters in Table 1 under this channel and then use our analysis in the previous section to derive a lower-bound on the key-rate of our protocol. We can see that the key rate of our protocol can vary significantly with the choice of basis states, in particular the distinguished and as shown in Table 2. Since these are set by the users, they may choose basis states based on the channel properties to maximize the key rate.
5 Closing Remarks
In this work, we have presented the usage of high-dimensional quantum systems as communication resources between Alice and Bob in the extended B92 protocol, originally introduced in [8] for qubits. When extending that protocol to higher dimensions we took care to attempt to minimize the quantum resources used by parties. In particular, our protocol only requires Alice to send three different states while Bob need only perform partial measurements.
We performed an information theoretic security analysis against collective attacks and evaluated under two different channels, the depolarization channel and the amplitude damping channel. We showed that, as with other high-dimensional protocols, under a depolarization channel the noise tolerance tends to increase with the dimension of the system. For the HD-Ext-B92 protocol, this tolerance eventually converges to 15.5% (as observed by our numerical computations). Under an amplitude damping channel, we showed how the choice of basis states used can greatly affect the key rate of the overall protocol.
Perhaps the biggest open question at the moment is to determine the effects of alternative superposition states on the protocol. We only considered a state of the form . One obvious candidate to consider would be the effect of having Alice send an equal superposition state. Unfortunately, the security analysis of such a protocol proved to be highly difficult, especially when using the technique of mismatched measurements (as we used here). The analysis might be simplified by having Alice send complete basis states instead of only a small subset of basis states in which case alternative proof methods may be applied. We leave this interesting question as future work. We also only performed an asymptotic key rate analysis - performing a finite key analysis, taking into account also, perhaps, less ideal measurement devices, would also be interesting to consider.
References
- [1] Charles H Bennett and Gilles Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175. New York, 1984.
- [2] Stefano Pirandola, Ulrik L Andersen, Leonardo Banchi, Mario Berta, Darius Bunandar, Roger Colbeck, Dirk Englund, Tobias Gehring, Cosmo Lupo, Carlo Ottaviani, et al. Advances in quantum cryptography. Advances in Optics and Photonics, 12(4):1012–1236, 2020.
- [3] Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J. Cerf, Miloslav Dušek, Norbert Lütkenhaus, and Momtchil Peev. The security of practical quantum key distribution. Rev. Mod. Phys., 81:1301–1350, Sep 2009.
- [4] Akshata Shenoy-Hejamadi, Anirban Pathak, and Srikanth Radhakrishna. Quantum cryptography: Key distribution and beyond. Quanta, 6(1):1–47, 2017.
- [5] Charles H Bennett. Quantum cryptography using any two nonorthogonal states. Physical review letters, 68(21):3121, 1992.
- [6] Kiyoshi Tamaki, Masato Koashi, and Nobuyuki Imoto. Unconditionally secure key distribution based on two nonorthogonal states. Physical review letters, 90(16):167904, 2003.
- [7] Ryutaroh Matsumoto. Improved asymptotic key rate of the b92 protocol. In 2013 IEEE International Symposium on Information Theory, pages 351–353. IEEE, 2013.
- [8] Marco Lucamarini, Giovanni Di Giuseppe, and Kiyoshi Tamaki. Robust unconditionally secure quantum key distribution with two nonorthogonal and uninformative states. Physical Review A, 80(3):032327, 2009.
- [9] Omar Amer and Walter O Krawec. Finite key analysis of the extended b92 protocol. In 2020 IEEE International Symposium on Information Theory (ISIT), pages 1944–1948. IEEE, 2020.
- [10] Daniele Cozzolino, Beatrice Da Lio, Davide Bacco, and Leif Katsuo Oxenløwe. High-dimensional quantum communication: Benefits, progress, and future challenges. Advanced Quantum Technologies, 2(12):1900038, 2019.
- [11] Helle Bechmann-Pasquinucci and Wolfgang Tittel. Quantum cryptography using larger alphabets. Physical Review A, 61(6):062308, 2000.
- [12] Hoi Fung Chau. Unconditionally secure key distribution in higher dimensions by depolarization. IEEE Transactions on Information Theory, 51(4):1451–1468, 2005.
- [13] Lana Sheridan and Valerio Scarani. Security proof for quantum key distribution using qudit systems. Physical Review A, 82(3):030301, 2010.
- [14] Chrysoula Vlachou, Walter Krawec, Paulo Mateus, Nikola Paunković, and André Souto. Quantum key distribution with quantum walks. Quantum Information Processing, 17(11):1–37, 2018.
- [15] Toshihiko Sasaki, Yoshihisa Yamamoto, and Masato Koashi. Practical quantum key distribution protocol without monitoring signal disturbance. Nature, 509(7501):475–478, 2014.
- [16] Fumin Wang, Pei Zeng, Jiapeng Zhao, Boris Braverman, Yiyu Zhou, Mohammad Mirhosseini, Xiaoli Wang, Hong Gao, Fuli Li, Robert W Boyd, et al. High-dimensional quantum key distribution based on mutually partially unbiased bases. Physical Review A, 101(3):032340, 2020.
- [17] Nurul T Islam, Charles Ci Wen Lim, Clinton Cahall, Jungsang Kim, and Daniel J Gauthier. Provably secure and high-rate quantum key distribution with time-bin qudits. Science advances, 3(11):e1701491, 2017.
- [18] Jacob Mower, Zheshen Zhang, Pierre Desjardins, Catherine Lee, Jeffrey H Shapiro, and Dirk Englund. High-dimensional quantum key distribution using dispersive optics. Physical Review A, 87(6):062322, 2013.
- [19] Beatrice Da Lio, Daniele Cozzolino, Nicola Biagi, Yunhong Ding, Karsten Rottwitt, Alessandro Zavatta, Davide Bacco, and Leif K Oxenløwe. Path-encoded high-dimensional quantum communication over a 2 km multicore fiber. arXiv preprint arXiv:2103.05992, 2021.
- [20] Catherine Lee, Darius Bunandar, Zheshen Zhang, Gregory R Steinbrecher, P Ben Dixon, Franco NC Wong, Jeffrey H Shapiro, Scott A Hamilton, and Dirk Englund. Large-alphabet encoding for higher-rate quantum key distribution. Optics express, 27(13):17539–17549, 2019.
- [21] Walter O. Krawec. Quantum key distribution with mismatched measurements over arbitrary channels. Quantum Information and Computation, 17(3 and 4):209–241, 2017.
- [22] Stephen M Barnett, Bruno Huttner, and Simon JD Phoenix. Eavesdropping strategies and rejected-data protocols in quantum cryptography. Journal of Modern Optics, 40(12):2501–2513, 1993.
- [23] Shun Watanabe, Ryutaroh Matsumoto, and Tomohiko Uyematsu. Tomography increases key rates of quantum-key-distribution protocols. Physical Review A, 78(4):042316, 2008.
- [24] Ryutaroh Matsumoto and Shun Watanabe. Key rate available from mismatched measurements in the bb84 protocol and the uncertainty principle. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 91(10):2870–2873, 2008.
- [25] Walter O Krawec. Asymptotic analysis of a three state quantum cryptographic protocol. In 2016 IEEE International Symposium on Information Theory (ISIT), pages 2489–2493. IEEE, 2016.
- [26] Kiyoshi Tamaki, Marcos Curty, Go Kato, Hoi-Kwong Lo, and Koji Azuma. Loss-tolerant quantum cryptography with imperfect sources. Physical Review A, 90(5):052314, 2014.
- [27] Robert König and Renato Renner. A de finetti representation for finite symmetric quantum states. Journal of Mathematical physics, 46(12):122108, 2005.
- [28] Matthias Christandl, Robert König, and Renato Renner. Postselection technique for quantum channels with applications to quantum cryptography. Physical review letters, 102(2):020504, 2009.
- [29] Igor Devetak and Andreas Winter. Distillation of secret key and entanglement from quantum states. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Science, 461(2053):207–235, 2005.
- [30] Renato Renner, Nicolas Gisin, and Barbara Kraus. Information-theoretic security proof for quantum-key-distribution protocols. Physical Review A, 72(1):012332, 2005.
- [31] Nicolas J Cerf, Mohamed Bourennane, Anders Karlsson, and Nicolas Gisin. Security of quantum key distribution using d-level systems. Physical review letters, 88(12):127902, 2002.
- [32] Peter W. Shor and John Preskill. Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett., 85:441–444, Jul 2000.
- [33] Masato Koashi. Simple security proof of quantum key distribution based on complementarity. New Journal of Physics, 11(4):045018, 2009.
- [34] Mario Berta, Matthias Christandl, Roger Colbeck, Joseph M Renes, and Renato Renner. The uncertainty principle in the presence of quantum memory. Nature Physics, 6(9):659–662, 2010.