{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T00:49:52Z","timestamp":1775782192668,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:00:00Z","timestamp":1619222400000},"content-version":"vor","delay-in-days":23,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Quantum key distribution (QKD) protocols allow for information theoretically secure distribution of (classical) cryptographic key material. However, due to practical limitations the performance of QKD implementations is somewhat restricted. For this reason, it is crucial to find optimal protocol parameters, while guaranteeing information theoretic security. The performance of a QKD implementation is determined by the tightness of the underlying security analysis. In particular, the security analyses determines the<jats:italic>key-rate<\/jats:italic>, i.e., the amount of cryptographic key material that can be distributed per time unit. Nowadays, the security analyses of various QKD protocols are well understood. It is known that optimal protocol parameters, such as the number of decoy states and their intensities, can be found by solving a nonlinear optimization problem. The complexity of this optimization problem is typically handled by making a number of heuristic assumptions. For instance, the number of decoy states is restricted to only one or two, with one of the decoy intensities set to a fixed value, and vacuum states are ignored as they are assumed to contribute only marginally to the secure key-rate. These assumptions simplify the optimization problem and reduce the size of search space significantly. However, they also cause the security analysis to be non-tight, and thereby result in sub-optimal performance. In this work, we follow a more rigorous approach using both linear and nonlinear programs describing the optimization problem. Our approach, focusing on the decoy-state BB84 protocol, allows heuristic assumptions to be omitted, and therefore results in a tighter security analysis with better protocol parameters. We show an improved performance for the decoy-state BB84 QKD protocol, demonstrating that the heuristic assumptions typically made are too restrictive. Moreover, our improved optimization frameworks shows that the complexity of the performance optimization problem can also be handled without making heuristic assumptions, even with limited computational resources available.<\/jats:p>","DOI":"10.1007\/s11128-021-03078-0","type":"journal-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T06:16:22Z","timestamp":1619331382000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Optimizing the decoy-state BB84 QKD protocol parameters"],"prefix":"10.1007","volume":"20","author":[{"given":"Thomas","family":"Attema","sequence":"first","affiliation":[]},{"given":"Joost W.","family":"Bosman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2159-8251","authenticated-orcid":false,"given":"Niels M. P.","family":"Neumann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,24]]},"reference":[{"key":"3078_CR1","doi-asserted-by":"crossref","unstructured":"Bennett, C.H., Brassard, G.: An update on quantum cryptography. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology, Proceedings of CRYPTO \u201984, Santa Barbara, California, USA, August 19\u201322, 1984, Proceedings, vol. 196 of Lecture Notes in Computer Science, pp. 475\u2013480. Springer (1984)","DOI":"10.1007\/3-540-39568-7_39"},{"key":"3078_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Reviews of Modern Physics 74, 145\u2013195 (2002)","journal-title":"Reviews of Modern Physics"},{"key":"3078_CR3","doi-asserted-by":"crossref","unstructured":"Mayers, D.: Quantum key distribution and string oblivious transfer in noisy channels. In: Koblitz, N. (ed.) Advances in Cryptology\u2014CRYPTO \u201996, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18\u201322, 1996, Proceedings, vol.\u00a01109 of Lecture Notes in Computer Science, pp. 343\u2013357. Springer, Berlin (1996)","DOI":"10.1007\/3-540-68697-5_26"},{"key":"3078_CR4","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10\u201312, 2005, Proceedings, vol.\u00a03378 of Lecture Notes in Computer Science, pp.\u00a0386\u2013406. Springer (2005)","DOI":"10.1007\/978-3-540-30576-7_21"},{"key":"3078_CR5","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, 14\u201317 October 2001, Las Vegas, Nevada, USA, pp.\u00a0136\u2013145. IEEE Computer Society (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"3078_CR6","doi-asserted-by":"publisher","first-page":"025002","DOI":"10.1103\/RevModPhys.92.025002","volume":"92","author":"F Xu","year":"2020","unstructured":"Xu, F., Ma, X., Zhang, Q., Lo, H.-K., Pan, J.-W.: Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020)","journal-title":"Rev. Mod. Phys."},{"key":"3078_CR7","doi-asserted-by":"crossref","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Security aspects of practical quantum cryptography. In: Preneel, B. (ed.) Advances in Cryptology\u2014EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14\u201318, 2000, Proceeding, vol.\u00a01807 of Lecture Notes in Computer Science, pp.\u00a0289\u2013299. Springer (2000)","DOI":"10.1007\/3-540-45539-6_20"},{"key":"3078_CR8","doi-asserted-by":"publisher","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)","journal-title":"Phys. Rev. A"},{"key":"3078_CR9","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W-Y Hwang","year":"2003","unstructured":"Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"3078_CR10","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"3078_CR11","doi-asserted-by":"publisher","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"3078_CR12","doi-asserted-by":"publisher","first-page":"110506","DOI":"10.1103\/PhysRevLett.106.110506","volume":"106","author":"M Tomamichel","year":"2011","unstructured":"Tomamichel, M., Renner, R.: Uncertainty relation for smooth entropies. Phys. Rev. Lett. 106, 110506 (2011)","journal-title":"Phys. Rev. Lett."},{"key":"3078_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/ncomms1631","volume":"3","author":"M Tomamichel","year":"2012","unstructured":"Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 1\u20136 (2012)","journal-title":"Nat. Commun."},{"key":"3078_CR14","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","volume":"89","author":"CCW Lim","year":"2014","unstructured":"Lim, C.C.W., Curty, M., Walenta, N., Xu, F., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)","journal-title":"Phys. Rev. A"},{"key":"3078_CR15","doi-asserted-by":"publisher","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","volume":"72","author":"X Ma","year":"2005","unstructured":"Ma, X., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005)","journal-title":"Phys. Rev. A"},{"key":"3078_CR16","series-title":"MOS-SIAM Series on Optimization","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719857","volume-title":"Trust Region Methods","author":"AR Conn","year":"2000","unstructured":"Conn, A.R., Gould, N.I.M., Toint, P.L.: Trust Region Methods. MOS-SIAM Series on Optimization, SIAM, Philadelphia (2000)"},{"key":"3078_CR17","doi-asserted-by":"publisher","first-page":"24550","DOI":"10.1364\/OE.21.024550","volume":"21","author":"M Lucamarini","year":"2013","unstructured":"Lucamarini, M., Patel, K.A., Dynes, J.F., Fr\u00f6hlich, B., Sharpe, A.W., Dixon, A.R., Yuan, Z.L., Penty, R.V., Shields, A.J.: Efficient decoy-state quantum key distribution with quantified security. Opt. Express 21, 24550\u201324565 (2013)","journal-title":"Opt. Express"},{"key":"3078_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/ncomms4732","volume":"5","author":"M Curty","year":"2014","unstructured":"Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.-K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5, 1\u20137 (2014)","journal-title":"Nat. Commun."},{"issue":"2","key":"3078_CR19","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L Carter","year":"1979","unstructured":"Carter, L., Wegman, M.N.: Universal classes of hash functions. J. Comput. Syst. Sci. 18(2), 143\u2013154 (1979)","journal-title":"J. Comput. Syst. Sci."},{"key":"3078_CR20","unstructured":"Renner, R.: Security of quantum key distribution. In: Wagner, D. (ed.) Ausgezeichnete Informatikdissertationen, vol.\u00a0D-6 of LNI, pp.\u00a0125\u2013134. GI (2005)"},{"issue":"8","key":"3078_CR21","doi-asserted-by":"publisher","first-page":"5524","DOI":"10.1109\/TIT.2011.2158473","volume":"57","author":"M Tomamichel","year":"2011","unstructured":"Tomamichel, M., Schaffner, C., Smith, A.D., Renner, R.: Leftover hashing against quantum side information. IEEE Trans. Inf. Theory 57(8), 5524\u20135535 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"3078_CR22","doi-asserted-by":"publisher","first-page":"2603","DOI":"10.1109\/TIT.2013.2238656","volume":"59","author":"A Vitanov","year":"2013","unstructured":"Vitanov, A., Dupuis, F., Tomamichel, M., Renner, R.: Chain rules for smooth min- and max-entropies. IEEE Trans. Inf. Theory 59(5), 2603\u20132612 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"3078_CR23","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1214\/aos\/1176342611","volume":"2","author":"RJ Serfling","year":"1974","unstructured":"Serfling, R.J.: Probability inequalities for the sum in sampling without replacement. Ann. Stat. 2, 39\u201348 (1974)","journal-title":"Ann. Stat."},{"issue":"301","key":"3078_CR24","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/01621459.1963.10500830","volume":"58","author":"W Hoeffding","year":"1963","unstructured":"Hoeffding, W.: Probability inequalities for sums of bounded random variables. J. Am. Stat. Assoc. 58(301), 13\u201330 (1963)","journal-title":"J. Am. Stat. Assoc."},{"key":"3078_CR25","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1214\/aoms\/1177729330","volume":"23","author":"H Chernoff","year":"1952","unstructured":"Chernoff, H.: A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23, 493\u2013507 (1952)","journal-title":"Ann. Math. Stat."},{"key":"3078_CR26","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1049\/el:19930424","volume":"29","author":"PD Townsend","year":"1993","unstructured":"Townsend, P.D., Rarity, J.G., Tapster, P.R.: Single photon interference in 10 km long optical fibre interferometer. Electron. Lett. 29, 634\u2013635 (1993)","journal-title":"Electron. Lett."},{"key":"3078_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/412958","volume":"2013","author":"M Short","year":"2013","unstructured":"Short, M.: Improved inequalities for the Poisson and binomial distribution and upper tail quantile functions. ISRN Probab. Stat. 2013, 1\u20136 (2013)","journal-title":"ISRN Probab. Stat."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03078-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03078-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03078-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,25]],"date-time":"2022-12-25T10:50:26Z","timestamp":1671965426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03078-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["3078"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03078-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"24 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"154"}}