{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T04:51:12Z","timestamp":1776919872758,"version":"3.51.2"},"reference-count":37,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Innovation Program for Quantum Science and Technology","award":["2021ZD0301300"],"award-info":[{"award-number":["2021ZD0301300"]}]},{"name":"Innovation Program for Quantum Science and Technology","award":["IPOC2024ZT10"],"award-info":[{"award-number":["IPOC2024ZT10"]}]},{"name":"State Key Laboratory of Information Photonics and Optical Communications","award":["2021ZD0301300"],"award-info":[{"award-number":["2021ZD0301300"]}]},{"name":"State Key Laboratory of Information Photonics and Optical Communications","award":["IPOC2024ZT10"],"award-info":[{"award-number":["IPOC2024ZT10"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The mode pairing quantum key distribution (MP-QKD) protocol has attracted considerable attention for its capability to ensure high secure key rates over long distances without requiring global phase locking. However, ensuring symmetric channels for the MP-QKD protocol is challenging in practical quantum communication networks. Previous studies on the asymmetric MP-QKD protocol have relied on ideal decoy state assumptions and infinite-key analysis, which are unattainable for real-world deployment. In this paper, we conduct a security analysis of the asymmetric MP-QKD protocol with the finite-key analysis, where we discard the previously impractical assumptions made in the decoy state method. Combined with statistical fluctuation analysis, we globally optimized the 10 independent parameters in the asymmetric MP-QKD protocol by employing our modified particle swarm optimization. Through further analysis, the simulation results demonstrate that our work achieves improved secure key rates and transmission distances compared to the strategy with additional attenuation. We further investigate the relationship between the intensities and probabilities of signal, decoy, and vacuum states with transmission distance, facilitating their more efficient deployment in future quantum networks.<\/jats:p>","DOI":"10.3390\/e27070737","type":"journal-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T13:44:19Z","timestamp":1752241459000},"page":"737","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Asymmetric Protocols for Mode Pairing Quantum Key Distribution with Finite-Key Analysis"],"prefix":"10.3390","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1493-6486","authenticated-orcid":false,"given":"Zhenhua","family":"Li","sequence":"first","affiliation":[{"name":"China Telecom Research Institute, Beijing 102209, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tianqi","family":"Dou","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Beijing 102209, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuheng","family":"Xie","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Beijing 102209, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weiwen","family":"Kong","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Beijing 102209, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Beijing 102209, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haiqiang","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Physical Science and Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianjun","family":"Tang","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Beijing 102209, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume":"67","author":"Ekert","year":"1991","journal-title":"Phys. Rev. Lett."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","article-title":"Unconditional security of quantum key distribution over arbitrarily long distances","volume":"283","author":"Lo","year":"1999","journal-title":"Science"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the BB84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_4","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 10\u201312). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"15043","DOI":"10.1038\/ncomms15043","article-title":"Fundamental limits of repeaterless quantum communications","volume":"8","author":"Pirandola","year":"2017","journal-title":"Nat. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate\u2013distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1038\/s41566-021-00811-0","article-title":"600-km repeater-like quantum communications with dual-band stabilization","volume":"15","author":"Pittaluga","year":"2021","journal-title":"Nat. Photonics"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"210801","DOI":"10.1103\/PhysRevLett.130.210801","article-title":"Experimental twin-field quantum key distribution over 1000 km fiber distance","volume":"130","author":"Liu","year":"2023","journal-title":"Phys. Rev. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3903","DOI":"10.1038\/s41467-022-31534-7","article-title":"Mode-pairing quantum key distribution","volume":"13","author":"Zeng","year":"2022","journal-title":"Nat. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"020315","DOI":"10.1103\/PRXQuantum.3.020315","article-title":"Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference","volume":"3","author":"Xie","year":"2022","journal-title":"PRX Quantum"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"030801","DOI":"10.1103\/PhysRevLett.130.030801","article-title":"Experimental mode-pairing measurement-device-independent quantum key distribution without global phase locking","volume":"130","author":"Zhu","year":"2023","journal-title":"Phys. Rev. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"250801","DOI":"10.1103\/PhysRevLett.130.250801","article-title":"Experimental quantum communication overcomes the rate-loss limit without global phase tracking","volume":"130","author":"Zhou","year":"2023","journal-title":"Phys. Rev. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1364\/OPTICA.520697","article-title":"Field test of mode-pairing quantum key distribution","volume":"11","author":"Zhu","year":"2024","journal-title":"Optica"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"6609","DOI":"10.1364\/OL.538457","article-title":"Field experimental mode-pairing quantum key distribution with intensity fluctuations","volume":"49","author":"Li","year":"2024","journal-title":"Opt. Lett."},{"key":"ref_15","first-page":"011024","article-title":"Measurement-device-independent quantum key distribution over untrustful metropolitan network","volume":"6","author":"Tang","year":"2016","journal-title":"Phys. Rev. X"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"130501","DOI":"10.1103\/PhysRevLett.111.130501","article-title":"Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks","volume":"111","author":"Rubenok","year":"2013","journal-title":"Phys. Rev. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"012401","DOI":"10.1103\/PhysRevA.109.012401","article-title":"Asymmetric mode-pairing quantum key distribution","volume":"109","author":"Lu","year":"2024","journal-title":"Phys. Rev. A"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"040305","DOI":"10.1088\/1674-1056\/adbb5c","article-title":"Asymmetric mode-pairing quantum key distribution with advantage distillation","volume":"34","author":"Wang","year":"2025","journal-title":"Chin. Phys. B"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"085006","DOI":"10.1088\/1367-2630\/11\/8\/085006","article-title":"Composability in quantum cryptography","volume":"11","author":"Renner","year":"2009","journal-title":"New J. Phys."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Carter, J.L., and Wegman, M.N. (1977, January 4\u20136). Universal classes of hash functions. Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, Boulder, CO, USA.","DOI":"10.1145\/800105.803400"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"110506","DOI":"10.1103\/PhysRevLett.106.110506","article-title":"Uncertainty relation for smooth entropies","volume":"106","author":"Tomamichel","year":"2011","journal-title":"Phys. Rev. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1038\/ncomms1631","article-title":"Tight finite-key analysis for quantum cryptography","volume":"3","author":"Tomamichel","year":"2012","journal-title":"Nat. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S0219749908003256","article-title":"Security of quantum key distribution","volume":"6","author":"Renner","year":"2008","journal-title":"Int. J. Quantum Inf."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3732","DOI":"10.1038\/ncomms4732","article-title":"Finite-key analysis for measurement-device-independent quantum key distribution","volume":"5","author":"Curty","year":"2014","journal-title":"Nat. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Yin, H.L., Zhou, M.G., Gu, J., Xie, Y.M., Lu, Y.S., and Chen, Z.B. (2020). Tight security bounds for decoy-state quantum key distribution. Sci. Rep., 10.","DOI":"10.1038\/s41598-020-71107-6"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","article-title":"Beating the photon-number-splitting attack in practical quantum cryptography","volume":"94","author":"Wang","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","article-title":"Decoy state quantum key distribution","volume":"94","author":"Lo","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"113007","DOI":"10.1088\/1367-2630\/15\/11\/113007","article-title":"Practical aspects of measurement-device-independent quantum key distribution","volume":"15","author":"Xu","year":"2013","journal-title":"New J. Phys."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1038\/s42005-023-01382-y","article-title":"Tight finite-key analysis for mode-pairing quantum key distribution","volume":"6","author":"Wang","year":"2023","journal-title":"Commun. Phys."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"012318","DOI":"10.1103\/PhysRevA.81.012318","article-title":"Practical issues in quantum-key-distribution postprocessing","volume":"81","author":"Fung","year":"2010","journal-title":"Phys. Rev. A\u2014At. Mol. Opt. Phys."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","article-title":"Concise security bounds for practical decoy-state quantum key distribution","volume":"89","author":"Lim","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"040301","DOI":"10.1103\/PhysRevA.97.040301","article-title":"Decoy-state quantum key distribution with more than three types of photon intensity pulses","volume":"97","author":"Chau","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_33","first-page":"041012","article-title":"Asymmetric protocols for scalable high-rate measurement-device-independent quantum key distribution networks","volume":"9","author":"Wang","year":"2019","journal-title":"Phys. Rev. X"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"013020","DOI":"10.1088\/1367-2630\/ab623a","article-title":"Simple method for asymmetric twin-field quantum key distribution","volume":"22","author":"Wang","year":"2020","journal-title":"New J. Phys."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"052333","DOI":"10.1103\/PhysRevA.89.052333","article-title":"Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution","volume":"89","author":"Xu","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sammut, C., and Webb, G.I. (2010). Particle Swarm Optimization. Encyclopedia of Machine Learning, Springer.","DOI":"10.1007\/978-0-387-30164-8"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"113026","DOI":"10.1088\/1367-2630\/12\/11\/113026","article-title":"Experimental demonstration of phase-remapping attack in a practical quantum key distribution system","volume":"12","author":"Xu","year":"2010","journal-title":"New J. Phys."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/7\/737\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:07:12Z","timestamp":1760033232000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/7\/737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,9]]},"references-count":37,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["e27070737"],"URL":"https:\/\/doi.org\/10.3390\/e27070737","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,9]]}}}