Next Article in Journal
Harmonic Aggregation Entropy: A Highly Discriminative Harmonic Feature Estimator for Time Series
Previous Article in Journal
Pre-Warning for the Remaining Time to Alarm Based on Variation Rates and Mixture Entropies
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Asymmetric Protocols for Mode Pairing Quantum Key Distribution with Finite-Key Analysis

1
China Telecom Research Institute, Beijing 102209, China
2
School of Physical Science and Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
3
State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Authors to whom correspondence should be addressed.
Entropy 2025, 27(7), 737; https://doi.org/10.3390/e27070737
Submission received: 30 April 2025 / Revised: 30 June 2025 / Accepted: 8 July 2025 / Published: 9 July 2025
(This article belongs to the Section Quantum Information)

Abstract

The mode pairing quantum key distribution (MP-QKD) protocol has attracted considerable attention for its capability to ensure high secure key rates over long distances without requiring global phase locking. However, ensuring symmetric channels for the MP-QKD protocol is challenging in practical quantum communication networks. Previous studies on the asymmetric MP-QKD protocol have relied on ideal decoy state assumptions and infinite-key analysis, which are unattainable for real-world deployment. In this paper, we conduct a security analysis of the asymmetric MP-QKD protocol with the finite-key analysis, where we discard the previously impractical assumptions made in the decoy state method. Combined with statistical fluctuation analysis, we globally optimized the 10 independent parameters in the asymmetric MP-QKD protocol by employing our modified particle swarm optimization. Through further analysis, the simulation results demonstrate that our work achieves improved secure key rates and transmission distances compared to the strategy with additional attenuation. We further investigate the relationship between the intensities and probabilities of signal, decoy, and vacuum states with transmission distance, facilitating their more efficient deployment in future quantum networks.

1. Introduction

Classical encryption methods rely on computational complexity, which exposes them to the risk of being compromised by future advances in computability. In contrast, quantum key distribution (QKD) guarantees the absolute security of information transmission by leveraging the fundamental principles of quantum mechanics [1,2,3]. Since the inception of the first QKD protocol, namely the BB84 protocol [4], it has ignited a surge of research interest in the field of QKD. In QKD systems, single photons serve as the carriers of quantum keys, which cannot be amplified and are easily scattered or absorbed by the transmission channel. For the transmittance channel η , the secure key rate (SKR) cannot exceed the PLOB (Pirandola, Laurenza, Ottaviani, and Banchi) bound R log 2 1 η  [5], which represents the exact SKR limit for point-to-point QKD systems without quantum repeaters.
Twin-field (TF) QKD [6] utilizes single-photon interference for key generation, surpassing the PLOB bound, while also retaining immunity to detector-side attacks. Nevertheless, in order to maintain the coherence between distant quantum states, TF-QKD requires the deployment of global phase locking technology [7,8], leading to increased complexity and additional resource consumption within QKD systems. Fortunately, the recently proposed mode pairing (MP) QKD protocol [9,10] eliminates the requirement for global phase locking while also surpassing the repeaterless bound. Given its exceptional performance in laboratory [11,12] and field environments [13,14], the MP-QKD protocol has established itself as a robust candidate for the future deployment of quantum communication networks.
In scenarios involving geographical disparities (e.g., in star-shaped quantum communication networks [15]), or when the communicating parties (Alice and Bob) are situated in moving free spaces (e.g., drones, ships, satellites, etc.), challenges are posed in achieving symmetric communication with the central node, Charlie. Introducing additional losses to compensate for channel asymmetry is a solution, but it results in suboptimal SKR [16]. Previous analyses of the asymmetric MP-QKD protocol [17,18] required ideal decoy state assumptions and infinite-key, which are overly idealized and impractical. Thus, it is crucial to account for the finite-key size effects in the asymmetric MP-QKD protocol while considering practical decoy state deployment.
In this paper, we evaluate the performance of the MP-QKD protocol with asymmetric channels. Through employing the practical decoy state method and the universally composable framework, we analyzed the security of the asymmetric MP-QKD protocol with finite-key size. By employing our modified particle swarm optimization (PSO) algorithm, we globally optimized the 10 independent parameters of the decoy state MP-QKD protocol. Our modified PSO algorithm is more suitable for asymmetric MP-QKD, as it does not rely on the specific form or gradient information of the SKR function, demonstrating robust global search capabilities. Numerical simulation results show that when the distance difference between Alice–Charlie and Bob–Charlie is 50 km and 100 km, the SKRs with the asymmetric intensity strategy show a significant improvement compared to those obtained using the extra attenuation method, though they remain lower than that of the symmetric channel. We further present the relationship curves between signal and decoy state intensities (probabilities) and channel loss, and provide an analysis to explain the observed differences. Finally, we examine the effect of the maximum pairing interval on the performance of the asymmetric MP-QKD protocol.

2. Finite-Key Analysis for MP-QKD with Asymmetric Channels

Since the key size in practical implementations is not infinite, it is crucial to develop a framework that addresses the finite-key size effect. In previous studies on asymmetric MP-QKD [17,18], the key size was often assumed to be infinite, leading to overly idealized parameter estimation. In the following analysis, we extend the consideration from the infinite-key regime to the realistic finite-key scenario. At the end of the asymmetric MP-QKD protocol, Alice and Bob each share a key string, denoted as S and S , respectively. According to the universally composable framework [19], if these key strings satisfy both ϵ cor -correct and ϵ sec -secret, they are considered secure keys. ϵ cor -correct refers to Pr S S ϵ cor . And ϵ sec -secret requires satisfaction of the condition
1 2 ρ A E U A ρ E 1 ϵ sec ,
where · 1 denotes the trace norm, ρ A E is the density operator of the system of Alice and Eve, U A is the uniform mixture of all possible values of the bit string S , and ρ E is density operator of Eve’s system. In this way, the protocol with finite-key can be regarded as ϵ -secure, where ϵ = ϵ cor + ϵ sec . In addition, we fix the security bound to ϵ = 10 10 .
In the following finite-key analysis of the asymmetric MP-QKD protocol, we assume the distances from Alice and Bob to Charlie are denoted as L A and L B , where L A L B and Δ L = L B L A . In the i-th round, Alice prepares the coherent state e i θ a i k a i , where intensity k a i is randomly selected from μ a , ν a , o a with probabilities p μ a , p ν a , p o a . And modulated phase θ a i is randomly chosen from 0 , 2 π Δ , 4 π Δ , . . . , 2 π Δ 1 Δ , where Δ is typically set to 16. In parallel, Bob randomly selects k b i and θ b i to prepare the coherent state e i θ b i k b i with probabilities p μ b , p ν b , p o b . It is important to note that in asymmetric channels, except for the case where o a = o b = 0 , the intensity and probability settings of Alice and Bob are unequal. Therefore, full parameter optimization is required to achieve the maximum SKR. After interference measurement, Charlie announces the measurement outcomes D L , D R 0 , 1 (0 represents “no click”, while 1 represents “click”). D L D R = 1 is considered as an effective detection. After N rounds, Alice and Bob pair each click with its immediate next neighbor within a maximum pairing interval l to form a successful pairing.
According to the intensities of the paired i-th and j-th rounds ( j i + l ), Alice (Bob) labels the “basis” as illustrated in Table 1.
Subsequently, Alice and Bob announce the basis, and the sum of the intensity pairs k a , k b = k a i + k a j , k b i + k b j for each pairing. Subsequently, they perform the pair assignment based on Table 2. Notably, the 0-pair data are retained specifically for decoy-state parameter estimation.
For each Z-pair on location i, j, Alice (Bob) extracts a bit 0 when k a i k a j = o a ( k b j k b i = o b ), and a bit 1 when k a j k a i = o a ( k b i k b j = o b ). For each X-pair on location i, j, Alice (Bob) extracts a bit from the relative phase θ a b i θ a b j θ a b i θ a b j π π mod 2 and announces the alignment angle θ a b = θ a b i θ a b j mod π . Alice and Bob only retain the results with θ a θ b Δ or θ a θ b π Δ . In particular, when θ a θ b π Δ , Bob flips the bit. Thus, Alice (Bob) can then obtain the sifted key strings Z ( Z ) and X ( X ), derived, respectively, from the Z-pair and the X-pair. According to the decoy state method, Z ( Z ) is employed for generating secure keys, while X ( X ) is used to estimate the phase-error rate.
In finite-key scenarios, sifted keys may contain some errors. Here, error correction and privacy amplification are required to ensure both ϵ cor -correct and ϵ sec -secret of the keys. Alice sends λ EC bits to Bob for performing key reconciliation, through which Bob computes an estimate Z ^ of Z . Alice computes a hash of Z of length log 2 2 ϵ cor with a random universal 2 hash function [20], which she sends to Bob together with the hash. If hash( Z ^ ) = hash( Z ), this guarantees the ϵ cor -correct of the keys; otherwise, the protocol aborts.
To ensure the security of final secure keys, Alice and Bob employ the privacy amplification based on the Quantum Leftover Hash Lemma [21,22], which offers a clear operational interpretation of smooth min-entropy. According to a random universal 2 hash function is used to extract an ϵ sec -secret key of length L from Z , where
ϵ sec = 2 ϵ + 1 2 2 L H min ϵ Z | E .
Here, E summarizes all information Eve learned about Z during the protocol. Based on a chain rule inequality [23], the smooth min-entropy H min ϵ Z | E can be represented as
H min ϵ Z | E H min ϵ Z | E λ E C log 2 2 ϵ cor ,
where E is the information before error correction, λ EC = f M μ , μ h E μ , μ , f is the error correction efficiency, M μ , μ represents the number of pairs μ , μ for Z-basis, and E μ , μ denotes the corresponding bit error rate. Furthermore, the strings Z can be partitioned into two subsets: Z 11 , which contains bits where both Alice and Bob each send a single photon, and Z rest , which comprises all remaining bits. Considering the smooth entropies from the uncertainty relation [22,24], we find that
H min ϵ Z | E H min ϵ ¯ Z 11 | Z rest E + H min ϵ Z rest | E 2 log 2 2 ϵ ^ ,
where ϵ = 2 ϵ ¯ + ϵ + ϵ ^ and H min ϵ Z rest | E 0 . It is evident that the single-photon components prepared in the Z- and X-bases are mutually unbiased. We denote X 11 (and X 11 ) as the bit string that Alice (and Bob) would have obtained had they performed measurements in the X basis instead of the Z basis. The quantity H min ϵ ¯ Z 11 | Z rest E can be reformulated using the entropic uncertainty relation:
H min ϵ ¯ Z 11 | Z rest E M 11 Z H max ϵ ¯ X 11 | X 11 M 11 Z 1 h e 11 Z , ph ,
where M 11 Z denotes a lower bound on the length of Z 11 , h e 11 Z , ph represents the number of bits required for Bob to use the bit string X 11 to reconstruct X 11 , e 11 Z , ph is the phase-error rate associated with the single-photon pair events in the Z-basis, h x = x log 2 x 1 x log 2 1 x .
We can set ϵ = 0 without compromising security. The total secrecy parameter is given by ϵ sec = 2 ϵ ^ + 4 ϵ ¯ + ϵ PA , where ϵ ¯ = ϵ 1 + ϵ e , with ϵ 1 and ϵ e representing the failure probabilities in estimating M 11 Z and e 11 Z , ph , respectively. The term ϵ PA denotes the failure probability associated with privacy amplification. By combining Equations (2)–(5), the final secure key length is
L M 11 Z 1 h e 11 Z , ph λ EC log 2 2 ϵ cor 2 log 2 1 2 ϵ ^ ϵ PA .
As long as the final key length satisfies Equation (6), the asymmetric MP-QKD protocol is ϵ -secure. The finite-key security analysis based on the entropy uncertainty relation method only requires consideration of the statistical fluctuations in observed quantities, without the need to account for additional information leakage. Here, the Chernoff bound [25] is employed to calculate the statistical fluctuations. Given an observed quantity χ , the upper χ ¯ and lower χ ̲ bounds of the expected value are given by,
χ ¯ = χ + β + 2 β χ + β 2 , χ ̲ = max χ β 2 2 β χ + β 2 4 , 0 ,
where β = ln 1 ϵ CB , and ϵ CB is the failure probability of the Chernoff bound.

3. Simulation and Discussion

Since the number of single-photon pair events M 11 Z in the Z-basis and the phase-error rate associated with the single-photon pair events e 11 Z , ph in the Z-basis cannot be directly observed, through the decoy state method [12,26,27,28,29], we can discover the yield of Z-pair single photon pulse pairs
y 11 Z = F L F U a 1 ν a a 1 μ a b 1 ν b b 2 μ b b 1 μ b b 2 ν b ,
where
F L = a 1 μ a b 2 μ b N ν a , ν b Z n ̲ ν a , ν b Z + a 1 ν a b 2 ν b a 0 μ a N o a , μ b Z n ̲ o a , μ b Z + a 1 ν a b 2 ν b b 0 μ b N μ a , o b Z n ̲ μ a , o b Z + a 1 μ a b 2 μ b a 0 ν a b 0 ν b a 1 ν a b 2 ν b a 0 μ a b 0 μ b N o a , o b Z n ̲ o a , o b Z , F U = a 1 ν a b 2 ν b N μ a , μ b Z n ¯ μ a , μ b Z + a 1 μ a b 2 μ b a 0 ν a N o a , ν b Z n ¯ o a , ν b Z + a 1 μ a b 2 μ b b 0 ν b N ν a , o b Z n ¯ ν a , o b Z .
Here, a m k a = k a m e k a m ! , b m k b = k b m e k b m ! , n ¯ k a , k b Z and n ̲ k a , k b Z are the number of the effective detection for the intensity pairs k a , k b after the statistical fluctuations in the Z-pairs, N k a , k b Z is the expected number of pairs with k a , k b . For simplicity, here we only use the Z-basis pairs with intensities μ a , μ b for key generation. Thus, M 11 Z = N μ a , μ b Z μ a μ b e μ a μ b y 11 Z .
The single-photon bit error rate of X-pair can be expressed as
e 11 X , bit = T U T L a 1 2 ν a b 1 2 ν b y 11 Z ,
where
T U = 1 N 2 ν a , 2 ν b X t ¯ 2 ν a , 2 ν b X + a 0 2 ν a b 0 2 ν b N 2 o a , 2 o b X t ¯ 2 o a , 2 o b X , T L = a 0 2 ν a N 0 a , 2 ν b X t ̲ 0 a , 2 ν b X + b 0 2 ν b N 2 ν a , o b X t ̲ 2 ν a , o b X ,
and t ¯ k a , k b X and t ̲ k a , k b X are the error effective detection for the k a , k b after the statistical fluctuations in the X-pairs. Through a random-sampling theory without replacement [30,31,32], e 11 Z , ph can be written as
e 11 Z , ph e 11 X , bit + Γ ξ e e , e 11 X , bit , M 11 X , M 11 Z ,
where
Γ a , b , c , d = c + d 1 b b c d ln c + d 2 π c d 1 b b a 2 .
ξ e e is the failure probability of random sampling without replacement. M 11 X represent the number of single-photon pair events in the X-basis. After calculating M 11 Z and e 11 Z , ph , the secure key length for the asymmetric MP-QKD protocol under finite key analysis can be obtained by applying Equation (6). The SKR is defined as R = L / N , where N is the number of total pluses.
It should be clearly stated that although some studies have analyzed asymmetric MP-QKD, there remain certain limitations. For instance, Ref. [10] focuses solely on the advantage of asymmetric MP-QKD over TF-QKD, without examining the impact of channel asymmetry on the intensities and probabilities of decoy states. Additionally, Refs. [17,18] assumes that the decoy-state parameter estimation either meets idealized conditions or is performed with perfect accuracy, which is not representative of practical scenarios. For the gaps in their work, we have performed a thorough analysis addressing the effects of asymmetric channels on decoy-state parameters under practical conditions.
Here, we can consider the SKR as a function of the source parameters
R g = R μ a , ν a , o a , p μ a , p ν a , p o a , μ b , ν b , o b , p μ b , p ν b , p o b .
Given the uncertainty of the convex form of function R, we employ the modified PSO algorithm (detailed in Appendix A) for global optimization of the 10 parameters rather than the local search algorithm (LSA) [33,34,35]. The LSA is highly sensitive to the selection of the initial point, as a randomly chosen initial point can often result in an invalid or infeasible outcome. The modified PSO algorithm can optimize non-smooth and non-convex functions to search for the optimal g that maximizes R. It is especially effective for asymmetric MP-QKD because it does not depend on the specific form or gradient information of the SKR function, and it does not require an initial starting point, showing robust global search abilities. In comparison with the original PSO algorithm [36], the modified version demonstrates an improved balance between global exploration and local exploitation, strengthened particle coordination, and enhanced optimization efficiency and convergence speed. We note that Ref. [10] employs a genetic algorithm for parameter optimization, whereas our use of a modified PSO algorithm offers a simpler implementation with faster convergence and lower computational complexity, making it more suitable for practical deployment scenarios.
In the simulation, we employed an asymmetric intensity strategy to address the asymmetric channel: by deploying the PSO algorithm to optimize g for compensating the channel asymmetry and achieving the optimal SKR. The simulation formulas for the observed values in asymmetric MP-QKD are provided in Appendix B. Furthermore, we also compare this approach with the strategy of adding extra attenuation. It is important to note that in the simulation, we consider Alice’s and Bob’s source configurations as independent, satisfying
0 = o a b < ν a b < μ a b < 1 , p o a b + p ν a b + p μ a b = 1 , 0 p μ a b , p o a b , p ν a b 1
without imposing constraints such as η a μ a η b μ b (or η a v a η b v b ), where η a and η b are the channel transmittance of Alice and Bob. The formula η a μ a η b μ b (or η a v a η b v b ) is a rule of thumb on the ratio of intensities between Alice’s and Bob’s light [37]. Equation (15) imposes three constraints: the first line ensures that the intensity of the signal state is greater than that of the decoy state, which in turn is greater than that of the vacuum state; the second line enforces that the sum of the probabilities for the three states equals 1; and the third line guarantees that the individual probabilities for the signal, decoy, and vacuum states are all strictly between 0 and 1. The parameters employed for the numerical simulations are detailed in Table 3. Additionally, we set ϵ cor = ϵ ^ = ϵ PA = ξ e e = ϵ e / 12 = ϵ 1 / 7 = 3.28 × 10 23 , where ϵ e = 11 ϵ CB + ξ e e , ϵ 1 = 7 ϵ CB .
We plot the optimized SKR for the asymmetric scenario in Figure 1 and the detailed optimization results at a distance of 200 km in Table 4. From Figure 1, it is evident that the SKR of the asymmetric intensities strategy consistently outperforms that of the adding extra attenuation, for both Δ L = 50 and Δ L = 100 . However, regardless of the strategy employed, the SKR does not achieve a level comparable to that of the symmetric channel case. The SKR for Δ L = 100 experiences a significant decrease compared to Δ L = 50 , indicating that an increase in channel asymmetry leads to a reduction in the SKR. As evident from Table 4, the asymmetric intensities strategy exhibits a substantial increase of approximately an order of magnitude compared to the adding extra attenuation strategy when L a + L b = 200 km. All data in Table 4 are optimized using the modified PSO algorithm. Furthermore, from points A, B, and D, it can be observed that Alice and Bob adjusted their intensities (probabilities) to compensate for the channel asymmetry. As Δ L increases, to achieve the optimal Hong–Ou–Mandel (HOM) interference effect, μ a and ν a continuously decrease, while μ b and ν b increase.
In the asymmetric intensity strategy for MP-QKD, a primary concern is the optimal selection of weak coherent pulse intensities by Alice and Bob. While η a μ a η b μ b (or η a v a η b v b ) may seem natural, we do not impose this constraint in the modified PSO algorithm. Figure 2 depicts the variation of η a μ a η b μ b and η a ν a η b ν b for Δ L = 100 km. It is evident that the magnitude of η a ν a η b ν b remains predominantly near 1, although some deviations occur as the distance increases. The decoy state ν a ( ν b ) are primarily employed for estimating the phase error rate. The relationship η a v a η b v b helps maintain a balance in the photon intensities reaching Charlie, ensuring good HOM visibility and low error rates. However, this relationship is derived under the assumptions of the infinite-key size, an infinite number of decoy states, and the neglect of dark counts. Therefore, discarding the ideal assumption mentioned above, slight deviations in η a ν a and η b ν b are reasonable for the scenario depicted in Figure 2. Additionally, from Figure 2, it can be observed that the value of η a μ a η b μ b is significantly distant from 1, largely deviating from the condition η a μ a η b μ b . The reason for this phenomenon is that the signal state is primarily used for key generation, where the intensity μ a ( μ b ) not only impacts the quantum bit error rate but also influences the probability of sending single photons and error correction. The optimal selection of signal states μ a ( μ b ) is a balance among quantum bit error rate, the probability of single-photon transmission, and error correction.
Figure 3 illustrates the variations in the probabilities of the signal, decoy, and vacuum states with asymmetric intensity strategy as the distance increases, when Δ L = 100 km. It can be observed that as the distance increases, the probability of the signal states remains relatively stable in most cases, while the probability of the decoy states notably increases. As the distance increases and losses grow, an inevitable increase in the probability of the decoy states is necessary to achieve better HOM interference effects and lower error rates. We also notice a relatively high proportion of vacuum states, attributable to their contribution in the pairing of the Z-basis, estimation of single-photon counts, and calculation of phase error rates. It is important to emphasize that for each optimization point in Figure 2 and Figure 3, the intensities and probabilities of the signal, decoy, and vacuum states strictly adhere to the constraints specified in Equation (15), while the counts and count rates are required to satisfy the physical validity conditions outlined in Equation (A1).
Figure 4 demonstrates the influence of different maximum pairing intervals l on the SKR with asymmetric intensity strategy. With the increase in l, the SKR in the asymmetric scenario shows a significant improvement but remains below that of the symmetric case, unable to surpass the PLOB bound. Additionally, as shown in Figure 5, at long distances, the infinite-key scenario slightly surpasses the PLOB bound, representing the theoretical performance limit of MP-QKD in this regime. In contrast, under the finite-key condition, increasing the total number of pulses N makes it challenging to surpass the PLOB bound due to statistical fluctuations and finite-size constraints.

4. Conclusions

In this paper, we demonstrate the performance of the asymmetric MP-QKD protocol with finite-key analysis. By combining universal composability security analysis and practical decoy state methods, our work aligns more closely with real-world experimental conditions. In the PSO process for asymmetric MP-QKD, deploying an asymmetric intensity strategy results in a noticeable improvement in the SKR compared to adding extra attenuation and is more practical for real-world deployment. However, the SKR still remains lower than in the symmetric case. Simulation results indicate that the decoy state ν a ( ν b ) is more susceptible to HOM interference, closely aligning with η a v a η b v b . However, the signal state μ a ( μ b ), influenced by multiple factors, significantly deviates from this assumption. Increasing the maximum pairing interval l can enhance the SKR in asymmetric MP-QKD, but it still falls significantly short compared to the symmetric case and remains unable to surpass the PLOB bound. Our research advances MP-QKD towards more practical network configurations and provides theoretical support for future MP-QKD quantum communication networks.

Author Contributions

Conceptualization, Z.L. and T.D.; methodology, Y.X.; validation, Y.L., H.M. and J.T.; formal analysis, W.K.; investigation, Y.X.; writing—original draft preparation, Z.L.; writing—review and editing, T.D. and W.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Innovation Program for Quantum Science and Technology (2021ZD0301300), the State Key Laboratory of Information Photonics and Optical Communications (No. IPOC2024ZT10).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Dataset available on request from the authors.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. The Modified PSO Algorithm for Maximizing R ( g )

Algorithm 1: The modified PSO Algorithm for Maximizing R ( g ) with 10-Dimensional Variables
Entropy 27 00737 i001
The PSO algorithm is a globally efficient and easily implementable optimization algorithm that reduces reliance on initial points through collaborative swarm behavior. It exhibits rapid convergence and is suitable for addressing a variety of complex multi-variable optimization problems. Considering the characteristics of the asymmetric MP-QKD protocol, we have modified the PSO algorithm as described in Algorithm 1. Lines 1–11 initialize the position, velocity, individual best, and global best of the particle swarm. It is reasonable and intuitive to expect that the particles, after initialization, should satisfy Equation (15). An often overlooked detail is that the intermediate parameters must also adhere to their physical significance, as shown below
0 < n k a , k b Z , n k a , k b X , t k a , k b Z , t k a , k b X 0 < y 11 Z , M μ , μ N < 1 , 0 < e 11 Z , ph , E μ , μ < 0.5 .
Equation (A1), which guarantees that all counts are positive, all count rates fall between 0 and 1, and all error rates are greater than 0 but less than 0.5, aligns with the requirements for practical deployment. Compared to the original PSO algorithm [36], the modified version updates the inertia weight w, individual learning factor c 1 , and social learning factor c 2 throughout the optimization process (Line 11). These updates improve the balance between global and local search, enhance particle coordination, and increase both efficiency and convergence speed. Lines 13–17 divide the particles into two groups: one group updates its position and velocity randomly, while the other follows the particle swarm optimization process. This effectively prevents the algorithm from getting trapped in local optima and enhances its global search capability. Lines 19–24 involve updating the individual best positions P best , i , and the global best position G best . When the termination condition is met, the returned G best and R ( G best ) represent the optimal decoy state settings and SKR. The modified PSO algorithm, independent of the specific form or gradient information of the SKR function R, demonstrates strong robustness. Its distinct advantage lies in its ability to handle complex, nonlinear problems, especially in high-dimensional spaces.

Appendix B. Simulation Formulas for Asymmetric MP-QKD

The average response probability during each round p can be formulated as
p = k a i k b i p k a i p k b i q k a i k b i ,
where q k a i k b i = 2 y I 0 x y , y = 1 p d e k a i η a + k b i η b 2 and x = η a k a i η b k b i . The expected pair number generated during each round can be expressed as
r p = 1 p 1 1 p l + 1 p .
For the Z-pair, where k a , k b μ a , μ b , μ a , ν b , μ a , o b , ν a , μ b , o a , μ b , ν a , ν b , ν a , o b , o a , ν b , o a , o b , the count of effective detections can be expressed as
n k a , k b Z = N r p p 2 k a , k b p k a i p k a j p k b i p k b j q k a i k b i q k a j k b j .
For k a , k b μ a , o b , o a , μ b , ν a , o b , o a , ν b , o a , o b in the Z-pair, the number of error-effective detections is denoted by t k a , k b , 0 Z = n k a , k b Z 2 , while for k a , k b μ a , μ b , μ a , ν b , ν a , μ b , ν a , ν b , it is denoted by
t k a , k b , 0 Z = N r p p 2 k a , k b , k a i = k b i = 0 p k a i p k b i p k a j p k b j q k a i k b i q k a j k b j + N r p p 2 k a , k b , k a j = k b j = 0 p k a i p k b i p k a j p k b j q k a i k b i q k a j k b j .
For the X-pair, where k a , k b 2 μ a , o b , o a , 2 μ b , 2 ν a , o b , o a , 2 ν b , the count of effective detections can be expressed as
n k a , k b X = N r p p 2 k a , k b p k a i p k a j p k b i p k b j q k a i k b i q k a j k b j .
The number of the error effective detections in this part can be represented as t k a , k b , 0 X = n k a , k b X 2 .
For k a , k b 2 μ a , 2 μ b , 2 μ a , 2 ν b , 2 ν a , 2 μ b , 2 ν a , 2 ν b in the X-pair, the count of effective detections can be expressed as
n k a , k b X N r p p 2 2 Δ π p k a i p k a j p k b i p k b j 4 y 4 8 y 3 I 0 x + 2 y 2 I 0 x 2 2 cos Δ + I 0 x 2 + 2 cos Δ ,
where I 0 · is the modified Bessel function of the first kind. The error-effective detections corresponding to this section can be expressed as
t k a , k b , 0 X N r p p 2 2 Δ π p k a i p k a j p k b i p k b j 2 y 4 4 y 3 I 0 x + 2 y 2 I 0 x 2 2 cos Δ .
Considering the misalignment error, the error-effective detections of the Z-pair and X-pair can be rewritten as
t k a , k b Z = 1 e d Z t k a , k b , 0 Z + e d Z n k a , k b Z t k a , k b , 0 Z , t k a , k b X = 1 e d X t k a , k b , 0 X + e d X n k a , k b X t k a , k b , 0 X ,
where e d Z and e d X is the misalignment-error of the Z-pair and X-pair, respectively.

References

  1. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661. [Google Scholar]
  2. Lo, H.K.; Chau, H.F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 1999, 283, 2050–2056. [Google Scholar] [PubMed]
  3. Shor, P.W.; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441. [Google Scholar] [PubMed]
  4. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 10–12 December 1984; p. 175. [Google Scholar]
  5. Pirandola, S.; Laurenza, R.; Ottaviani, C.; Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun. 2017, 8, 15043. [Google Scholar]
  6. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar]
  7. Pittaluga, M.; Minder, M.; Lucamarini, M.; Sanzaro, M.; Woodward, R.I.; Li, M.J.; Yuan, Z.; Shields, A.J. 600-km repeater-like quantum communications with dual-band stabilization. Nat. Photonics 2021, 15, 530–535. [Google Scholar]
  8. Liu, Y.; Zhang, W.J.; Jiang, C.; Chen, J.P.; Zhang, C.; Pan, W.X.; Ma, D.; Dong, H.; Xiong, J.M.; Zhang, C.J.; et al. Experimental twin-field quantum key distribution over 1000 km fiber distance. Phys. Rev. Lett. 2023, 130, 210801. [Google Scholar]
  9. Zeng, P.; Zhou, H.; Wu, W.; Ma, X. Mode-pairing quantum key distribution. Nat. Commun. 2022, 13, 3903. [Google Scholar]
  10. Xie, Y.M.; Lu, Y.S.; Weng, C.X.; Cao, X.Y.; Jia, Z.Y.; Bao, Y.; Wang, Y.; Fu, Y.; Yin, H.L.; Chen, Z.B. Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. PRX Quantum 2022, 3, 020315. [Google Scholar]
  11. Zhu, H.T.; Huang, Y.; Liu, H.; Zeng, P.; Zou, M.; Dai, Y.; Tang, S.; Li, H.; You, L.; Wang, Z.; et al. Experimental mode-pairing measurement-device-independent quantum key distribution without global phase locking. Phys. Rev. Lett. 2023, 130, 030801. [Google Scholar]
  12. Zhou, L.; Lin, J.; Xie, Y.M.; Lu, Y.S.; Jing, Y.; Yin, H.L.; Yuan, Z. Experimental quantum communication overcomes the rate-loss limit without global phase tracking. Phys. Rev. Lett. 2023, 130, 250801. [Google Scholar] [PubMed]
  13. Zhu, H.T.; Huang, Y.; Pan, W.X.; Zhou, C.W.; Tang, J.; He, H.; Cheng, M.; Jin, X.; Zou, M.; Tang, S.; et al. Field test of mode-pairing quantum key distribution. Optica 2024, 11, 883–888. [Google Scholar]
  14. Li, Z.; Dou, T.; Cheng, M.; Liu, Y.; Tang, J. Field experimental mode-pairing quantum key distribution with intensity fluctuations. Opt. Lett. 2024, 49, 6609–6612. [Google Scholar]
  15. Tang, Y.L.; Yin, H.L.; Zhao, Q.; Liu, H.; Sun, X.X.; Huang, M.Q.; Zhang, W.J.; Chen, S.J.; Zhang, L.; You, L.X.; et al. Measurement-device-independent quantum key distribution over untrustful metropolitan network. Phys. Rev. X 2016, 6, 011024. [Google Scholar]
  16. Rubenok, A.; Slater, J.A.; Chan, P.; Lucio-Martinez, I.; Tittel, W. Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks. Phys. Rev. Lett. 2013, 111, 130501. [Google Scholar]
  17. Lu, Z.; Wang, G.; Li, C.; Cao, Z. Asymmetric mode-pairing quantum key distribution. Phys. Rev. A 2024, 109, 012401. [Google Scholar]
  18. Wang, H.T.; Zhou, C.; Lu, Y.F.; Hao, C.P.; Zhao, Y.M.; Zhou, Y.Y.; Li, H.W.; Bao, W.S. Asymmetric mode-pairing quantum key distribution with advantage distillation. Chin. Phys. B 2025, 34, 040305. [Google Scholar]
  19. Müller-Quade, J.; Renner, R. Composability in quantum cryptography. New J. Phys. 2009, 11, 085006. [Google Scholar]
  20. Carter, J.L.; Wegman, M.N. Universal classes of hash functions. In Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, Boulder, CO, USA, 4–6 May 1977; pp. 106–112. [Google Scholar]
  21. Tomamichel, M.; Renner, R. Uncertainty relation for smooth entropies. Phys. Rev. Lett. 2011, 106, 110506. [Google Scholar]
  22. Tomamichel, M.; Lim, C.C.W.; Gisin, N.; Renner, R. Tight finite-key analysis for quantum cryptography. Nat. Commun. 2012, 3, 634. [Google Scholar]
  23. Renner, R. Security of quantum key distribution. Int. J. Quantum Inf. 2008, 6, 1–127. [Google Scholar]
  24. Curty, M.; Xu, F.; Cui, W.; Lim, C.C.W.; Tamaki, K.; Lo, H.K. Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 2014, 5, 3732. [Google Scholar]
  25. Yin, H.L.; Zhou, M.G.; Gu, J.; Xie, Y.M.; Lu, Y.S.; Chen, Z.B. Tight security bounds for decoy-state quantum key distribution. Sci. Rep. 2020, 10, 14312. [Google Scholar]
  26. Wang, X.B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 2005, 94, 230503. [Google Scholar] [PubMed]
  27. Lo, H.K.; Ma, X.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 230504. [Google Scholar]
  28. Xu, F.; Curty, M.; Qi, B.; Lo, H.K. Practical aspects of measurement-device-independent quantum key distribution. New J. Phys. 2013, 15, 113007. [Google Scholar]
  29. Wang, Z.H.; Wang, R.; Yin, Z.Q.; Wang, S.; Lu, F.Y.; Chen, W.; He, D.Y.; Guo, G.C.; Han, Z.F. Tight finite-key analysis for mode-pairing quantum key distribution. Commun. Phys. 2023, 6, 265. [Google Scholar]
  30. Fung, C.H.F.; Ma, X.; Chau, H. Practical issues in quantum-key-distribution postprocessing. Phys. Rev. A—At. Mol. Opt. Phys. 2010, 81, 012318. [Google Scholar]
  31. Lim, C.C.W.; Curty, M.; Walenta, N.; Xu, F.; Zbinden, H. Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 2014, 89, 022307. [Google Scholar]
  32. Chau, H. Decoy-state quantum key distribution with more than three types of photon intensity pulses. Phys. Rev. A 2018, 97, 040301. [Google Scholar]
  33. Wang, W.; Xu, F.; Lo, H.K. Asymmetric protocols for scalable high-rate measurement-device-independent quantum key distribution networks. Phys. Rev. X 2019, 9, 041012. [Google Scholar]
  34. Wang, W.; Lo, H.K. Simple method for asymmetric twin-field quantum key distribution. New J. Phys. 2020, 22, 013020. [Google Scholar]
  35. Xu, F.; Xu, H.; Lo, H.K. Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052333. [Google Scholar]
  36. Kennedy, J. Particle Swarm Optimization. In Encyclopedia of Machine Learning; Sammut, C., Webb, G.I., Eds.; Springer: Boston, MA, USA, 2010; pp. 760–766. [Google Scholar] [CrossRef]
  37. Xu, F.; Qi, B.; Lo, H.K. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 2010, 12, 113026. [Google Scholar]
Figure 1. The optimized SKR versus the total distance ( L A + L B ) between Alice and Bob. The maximum pairing interval is fixed to 2000. The SKR is calculated for two cases, i.e., (a) a 50 km length difference between Alice and Bob, and (b) a 100 km length difference between Alice and Bob. Label ’Sym’ represents the symmetric case. Label ’This work’ refers to the asymmetric intensity method in this paper. Label ’Add att’ refers to the processing method, with added extra attenuation directly. The details of points A, B, C, D, and E are given in Table 4.
Figure 1. The optimized SKR versus the total distance ( L A + L B ) between Alice and Bob. The maximum pairing interval is fixed to 2000. The SKR is calculated for two cases, i.e., (a) a 50 km length difference between Alice and Bob, and (b) a 100 km length difference between Alice and Bob. Label ’Sym’ represents the symmetric case. Label ’This work’ refers to the asymmetric intensity method in this paper. Label ’Add att’ refers to the processing method, with added extra attenuation directly. The details of points A, B, C, D, and E are given in Table 4.
Entropy 27 00737 g001
Figure 2. The optimized ratios η a μ a η b μ b and η a ν a η b ν b are plotted versus the total distance ( L A + L B ) between Alice and Bob, where Δ L = 100 km and the maximum pairing interval l = 2000 .
Figure 2. The optimized ratios η a μ a η b μ b and η a ν a η b ν b are plotted versus the total distance ( L A + L B ) between Alice and Bob, where Δ L = 100 km and the maximum pairing interval l = 2000 .
Entropy 27 00737 g002
Figure 3. The optimized probabilities of the signal, decoy, and vacuum states with an asymmetric intensity strategy are plotted versus the total distance ( L A + L B ) between Alice and Bob, where Δ L = 100 km and the maximum pairing interval l = 2000 .
Figure 3. The optimized probabilities of the signal, decoy, and vacuum states with an asymmetric intensity strategy are plotted versus the total distance ( L A + L B ) between Alice and Bob, where Δ L = 100 km and the maximum pairing interval l = 2000 .
Entropy 27 00737 g003
Figure 4. Optimized SKR with asymmetric intensity strategy versus the total distance ( L A + L B ) between Alice and Bob, at different maximal pairing intervals l.
Figure 4. Optimized SKR with asymmetric intensity strategy versus the total distance ( L A + L B ) between Alice and Bob, at different maximal pairing intervals l.
Entropy 27 00737 g004
Figure 5. Optimized SKR with asymmetric intensity strategy versus the total distance ( L A + L B ) with different numbers of total pulses N, where l = 2000 and Δ L = 100 km.
Figure 5. Optimized SKR with asymmetric intensity strategy versus the total distance ( L A + L B ) with different numbers of total pulses N, where l = 2000 and Δ L = 100 km.
Entropy 27 00737 g005
Table 1. Basis assignment depending on intensities.
Table 1. Basis assignment depending on intensities.
k a ( b ) j   μ a ( b )   ν a ( b )   o a ( b )
k a ( b ) i
μ a ( b ) X-basis‘discard’Z-basis
ν a ( b ) ‘discard’X-basisZ-basis
o a ( b ) Z-basisZ-basis‘0’-basis
Table 2. The pair assignment.
Table 2. The pair assignment.
Alice Z-Basis X-Basis ‘0’-Basis
Bob
Z-basisZ-pair‘discard’Z-pair
X-basis‘discard’X-pairX-pair
‘0’-basisZ-pairX-pair‘0’-pair
Table 3. Parameters used in numerical simulation. p d and η d represent the dark counting rate per pulse and detection efficiency of SPD, respectively. α is the transmission fiber loss. f is the error correction efficiency. e d X and e d Z are the misalignment-error of the X-pair and Z-pair, respectively. N is the number of total pulses.
Table 3. Parameters used in numerical simulation. p d and η d represent the dark counting rate per pulse and detection efficiency of SPD, respectively. α is the transmission fiber loss. f is the error correction efficiency. e d X and e d Z are the misalignment-error of the X-pair and Z-pair, respectively. N is the number of total pulses.
p d η d α f e d X e d Z N
10 8 75 % 0.2 dB/km1.10.1 10 6 10 13
Table 4. Examples of optimal parameters in Figure 1. The numerical values in the table presented here are rounded to three significant figures.
Table 4. Examples of optimal parameters in Figure 1. The numerical values in the table presented here are rounded to three significant figures.
Point L A + L B Δ L Strategy μ a ν a μ b ν b p μ a p ν a p o a p μ b p ν b p o b R (Bit/Pulse)
A200 km0 kmSym0.4240.02130.4240.02130.2540.1800.5660.2540.1800.566 2.95 × 10 5
B200 km50 kmThis work0.2160.004490.6210.03760.1700.2290.6010.3050.1920.503 1.84 × 10 5
C200 km50 kmAdd att0.4920.02580.4920.02580.2710.2200.5090.2710.2200.509 5.71 × 10 6
D200 km100 kmThis work0.1070.0006240.7180.05490.09020.3090.60080.3270.2300.443 5.89 × 10 6
E200 km100 kmAdd att0.5600.03210.5600.03210.2780.2810.4410.2780.2810.441 6.37 × 10 7
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, Z.; Dou, T.; Xie, Y.; Kong, W.; Liu, Y.; Ma, H.; Tang, J. Asymmetric Protocols for Mode Pairing Quantum Key Distribution with Finite-Key Analysis. Entropy 2025, 27, 737. https://doi.org/10.3390/e27070737

AMA Style

Li Z, Dou T, Xie Y, Kong W, Liu Y, Ma H, Tang J. Asymmetric Protocols for Mode Pairing Quantum Key Distribution with Finite-Key Analysis. Entropy. 2025; 27(7):737. https://doi.org/10.3390/e27070737

Chicago/Turabian Style

Li, Zhenhua, Tianqi Dou, Yuheng Xie, Weiwen Kong, Yang Liu, Haiqiang Ma, and Jianjun Tang. 2025. "Asymmetric Protocols for Mode Pairing Quantum Key Distribution with Finite-Key Analysis" Entropy 27, no. 7: 737. https://doi.org/10.3390/e27070737

APA Style

Li, Z., Dou, T., Xie, Y., Kong, W., Liu, Y., Ma, H., & Tang, J. (2025). Asymmetric Protocols for Mode Pairing Quantum Key Distribution with Finite-Key Analysis. Entropy, 27(7), 737. https://doi.org/10.3390/e27070737

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop