High-dimensional quantum key distribution rates for multiple measurement bases
Pith reviewed 2026-05-23 05:28 UTC · model grok-4.3
The pith
For small numbers of rounds in high-dimensional QKD, three mutually unbiased bases yield higher key rates than d+1 bases.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
In a high-dimensional BBM92-like QKD protocol, an analytic expression for the asymptotic key rate is derived when d+1 MUBs are used. For the finite-key case, optimization against collective and coherent attacks reveals that for sufficiently small number of rounds, the highest key rate is achieved by using three MUBs rather than d+1, for generic d.
What carries the argument
Finite-key rate optimization against collective and coherent attacks, parameterized by the number of mutually unbiased bases employed.
If this is right
- An analytic expression exists for the asymptotic key rate when the protocol uses the maximum d+1 MUBs.
- Varying the number of MUBs changes the achieved key rate in both the asymptotic and finite-key regimes.
- Below a threshold on the number of rounds, three MUBs give the maximum finite key rate for any prime-power dimension d.
- The optimization result applies uniformly across all admissible numbers of MUBs and generic system dimensions.
Where Pith is reading between the lines
- Hardware that generates only a few MUBs may suffice for short sessions, lowering implementation cost without sacrificing rate.
- The crossover point where three MUBs cease to be optimal could be used to set session-length thresholds in deployed systems.
- Similar finite-size effects might appear when the same optimization is applied to other high-dimensional protocols or attack models.
Load-bearing premise
The finite-key optimization against collective and coherent attacks correctly identifies the reported optimum for generic d and all MUB counts.
What would settle it
An independent recalculation of the finite-key rates that shows d+1 MUBs always produce strictly higher rates than three MUBs for every round count would falsify the central claim.
Figures
read the original abstract
We investigate the advantages of high-dimensional encoding for a quantum key distribution protocol. In particular, we address a BBM92-like protocol where the dimension of the systems can be larger than two and more than two mutually unbiased bases (MUBs) can be employed. Indeed, it is known that, for a system whose dimension $d$ is a prime or the power of a prime, up to $d+1$ MUBs can be found. We derive an analytic expression for the asymptotic key rate when $d+1$ MUBs are exploited and show the effects of using different numbers of MUBs on the performance of the protocol. Then, we move to the non-asymptotic case and optimize the finite key rate against collective and coherent attacks for generic dimension of the systems and all possible numbers of MUBs. In the finite-key scenario, we find that, if the number of rounds is small enough, the highest key rate is obtained by exploiting three MUBs, instead of $d+1$ as one may expect.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript analyzes a high-dimensional BBM92-like QKD protocol that employs up to d+1 mutually unbiased bases (MUBs) for prime-power dimensions d. It derives a closed-form asymptotic key rate expression when all d+1 MUBs are used, examines the effect of using fewer bases, and performs a numerical optimization of the finite-key rate against collective and coherent attacks for arbitrary d and all admissible numbers of MUBs. The central finite-key result is that, for sufficiently small total round counts, the optimal rate is achieved with three MUBs rather than d+1.
Significance. If the finite-key optimization is reproducible, the work supplies concrete, dimension-dependent guidance on the number of measurement bases that maximizes the extractable key in the short-block-length regime, which is directly relevant to near-term high-dimensional QKD implementations. The analytic asymptotic formula is a clear strength that can be checked independently.
major comments (2)
- [finite-key optimization] Finite-key optimization section: the numerical maximization of the key rate against coherent attacks for generic d and varying MUB counts is presented only as a result; the explicit objective function, the precise finite-key correction terms (smoothing or concentration bounds), the SDP constraints that encode the MUB overlap structure, and the solver tolerances are not stated. Without these, the reported crossover to three MUBs for small N cannot be independently verified and is therefore load-bearing for the headline claim.
- [asymptotic analysis] Asymptotic rate derivation: while an analytic expression is stated for the d+1-MUB case, the manuscript does not show how the expression reduces when the number of MUBs is lowered to three; the dependence on the number of bases therefore remains implicit and prevents direct comparison with the finite-key optimum.
minor comments (2)
- Notation for the number of MUBs should be introduced once and used consistently (e.g., m versus k).
- Figure captions should explicitly state the dimension d and the total number of rounds N used in each panel.
Simulated Author's Rebuttal
We thank the referee for their thorough review and constructive feedback on our manuscript. We appreciate the recognition of the significance of our finite-key results for high-dimensional QKD. Below, we provide point-by-point responses to the major comments.
read point-by-point responses
-
Referee: [finite-key optimization] Finite-key optimization section: the numerical maximization of the key rate against coherent attacks for generic d and varying MUB counts is presented only as a result; the explicit objective function, the precise finite-key correction terms (smoothing or concentration bounds), the SDP constraints that encode the MUB overlap structure, and the solver tolerances are not stated. Without these, the reported crossover to three MUBs for small N cannot be independently verified and is therefore load-bearing for the headline claim.
Authors: We agree that providing these details is crucial for reproducibility of the numerical results. In the revised manuscript, we will include the explicit form of the objective function, specify the finite-key correction terms with the exact smoothing and concentration bounds employed, detail the SDP constraints reflecting the MUB overlap structure, and report the numerical solver tolerances. These additions will enable independent verification of the reported crossover to three MUBs for small total round counts. revision: yes
-
Referee: [asymptotic analysis] Asymptotic rate derivation: while an analytic expression is stated for the d+1-MUB case, the manuscript does not show how the expression reduces when the number of MUBs is lowered to three; the dependence on the number of bases therefore remains implicit and prevents direct comparison with the finite-key optimum.
Authors: The analytic expression is presented for the d+1 MUB case because this configuration yields the highest asymptotic rate. The effects of using fewer MUBs are demonstrated through numerical evaluation in the manuscript. However, to make the dependence explicit and facilitate direct comparison, we will add in the revision a derivation showing the reduction of the expression for the three-MUB case by appropriately modifying the entropy terms corresponding to the reduced number of bases. revision: yes
Circularity Check
No circularity: analytic derivation and numerical optimization are independent of their outputs
full rationale
The abstract states an analytic expression is derived for the asymptotic key rate with d+1 MUBs and that finite-key rates are optimized numerically against collective/coherent attacks for generic d and varying MUB counts. No equation is presented that defines a rate or optimum in terms of itself, renames a fitted parameter as a prediction, or reduces the central claim to a self-citation chain. The reported preference for three MUBs at small round counts is framed as the output of an external optimization procedure rather than a definitional identity. Standard QKD formulas and known MUB existence results supply the inputs; the optimization step is treated as a computational result, not a tautology. This satisfies the default expectation of a self-contained derivation.
Axiom & Free-Parameter Ledger
axioms (2)
- standard math Existence of d+1 mutually unbiased bases when d is prime or prime power
- domain assumption Validity of BBM92-like protocol extension to dimension d and multiple MUBs
Forward citations
Cited by 2 Pith papers
-
Security of deterministic key distribution with higher-dimensional systems
Higher-dimensional two-way QKD protocols using mutually unbiased bases and Heisenberg-Weyl operators yield secret keys for stronger individual attacks and improved robustness to collective eavesdropping via entropic u...
-
Quantum Uncertainty and Entropy
A review of quantum uncertainty relations that covers foundational and practical applications of both variance- and entropy-based uncertainties.
Reference graph
Works this paper leans on
-
[1]
Last, we consider the case of coher- ent attacks and exploit the results obtained in Ref
in the case m = 2 and from the asymptotic equipartition property [32] for m ≥ 2. Last, we consider the case of coher- ent attacks and exploit the results obtained in Ref. [42] from the postselection technique [33]. The steps of the protocol are the standard ones of an entanglement-based BB84-like scheme, namely BBM92 like [2], i.e. distribution, measureme...
-
[2]
By inserting the uncertainty relation and 6 the bound on the max-entropy into Eq. (21), we get r(ϵ, ϵEC, ϵPA, n, k) ≤ C − h(Qtol + µϵ) − (Qtol + µϵ) · log2(d − 1) − 1 n leakEC + log2 2 ϵEC + 2 log2 1 2ϵPA . (25) The total rate is then given by n N r with n = N − k and can be optimized over k, ϵ, ϵEC and ϵPA: ˆr(ϵtot, N) = max k,ϵ,ϵEC,ϵPA ˆr(ϵtot, N, k), (...
-
[3]
C. H. Bennett and G. Brassard, Proceedings of IEEE Interna- tional Conference on Computers, Systems and Signal Process- ing 175, 8 (1984)
work page 1984
-
[4]
C. H. Bennett, G. Brassard, and N. D. Mermin, Phys. Rev. Lett. 68, 557 (1992)
work page 1992
-
[5]
S. Walborn, D. Lemelle, M. Almeida, and P. Ribeiro, Phys. Rev. Lett. 96, 090501 (2006)
work page 2006
- [6]
-
[7]
I. Ali-Khan, C. Broadbent, J. Howell, and M. G. Raymer, Phys. Rev. Lett. 98, 060503 (2007)
work page 2007
-
[8]
N. T. Islam, C. Ci Wen Lim, C. Cahall, J. Kim, and D. J. Gau- thier, Sci. Adv. 3, e1701491 (2017)
work page 2017
-
[9]
B. E. Nussbaum, U. Purakayastha, J. Floyd, J. Szuniewicz, F. So´snicki, M. Karpi´nski’, and P. G. Kwiat, Proc. SPIE 12633, Photonics for Quantum 2023 12633, 1263302 (2023)
work page 2023
- [10]
-
[11]
M. Mirhosseini, O. S. Maga ˜na-Loaiza, M. N. O’Sullivan, B. Rodenburg, M. Malik, M. P. J. Lavery, M. J. Padgett, D. J. Gauthier, and R. W. Boyd, New J. Phys. 17, 033033 (2015)
work page 2015
- [12]
-
[13]
G. Ca ˜nas, N. Vera, J. Cari˜ne, P. Gonz´alez, J. Cardenas, P. W. R. Connolly, A. Przysiezna, E. S. G ´omez, M. Figueroa, G. Val- lone, P. Villoresi, T. F. da Silva, G. B. Xavier, and G. Lima, Phys. Rev. A 96, 022317 (2017)
work page 2017
- [14]
-
[15]
N. J. Cerf, M. Bourennane, A. Karlsson, and N. Gisin, Phys.Rev.Lett. 88, 127902 (2002)
work page 2002
- [16]
-
[17]
W. K. Wootters and B. D. Fields, Ann. Phys. 191, 363 (1988)
work page 1988
-
[18]
T. Durt, B.-G. Englert, I. Bengtsson, and ˙Zyczkowski, Int. J. Quantum Inf. 8, 535 (2010)
work page 2010
- [19]
-
[20]
H. Bechmann-Pasquinucci and N. Gisin, Phys. Rev. A 59, 4238 (1999)
work page 1999
-
[21]
K. Br ´adler, M. Mirhosseini, R. Fickler, A. Broadbent, and R. Boyd, New Journal of Physics 18, 073030 (2016)
work page 2016
- [22]
-
[23]
M. Doda, M. Huber, G. Murta, M. Pivoluska, M. Plesch, and C. Vlachou, Phys. Rev. Appl. 15, 034003 (2021)
work page 2021
- [24]
-
[25]
H. Hu, J. Im, J. Lin, N. L ¨utkenhaus, and H. Wolkowicz, Quan- tum 6, 792 (2022)
work page 2022
-
[26]
M. Ara ´ujo, M. Huber, M. Navascu ´es, M. Pivoluska, and 11 A. Tavakoli, Quantum7, 1019 (2023)
work page 2023
-
[27]
F. Kanitschar and M. Huber, arXiv:2406.08544 [quant-ph] (2024), https://doi.org/10.48550/arXiv.2406.08544
- [28]
-
[29]
R. Renner and S. Wolf, Roy, B. (eds) Advances in Cryptology - ASIACRYPT 2005. ASIACRYPT 2005. Lecture Notes in Com- puter Science 3788, 199 (2005)
work page 2005
-
[30]
M. Tomamichel, R. Colbeck, and R. Renner, IEEE Trans. Inf. Theory 54, 4674 (2010)
work page 2010
- [31]
-
[32]
M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, Nature communications 3, 634 (2012)
work page 2012
-
[33]
Grasselli, Quantum Cryptography: from Key Distribution to Conference Key Agreement , Ph.D
F. Grasselli, Quantum Cryptography: from Key Distribution to Conference Key Agreement , Ph.D. thesis, Universit ¨at D ¨ussel- dorf (2020)
work page 2020
-
[34]
Renner, International Journal of Quantum Information 6, 1 (2008)
R. Renner, International Journal of Quantum Information 6, 1 (2008)
work page 2008
-
[35]
M. Christandl, R. K ¨onig, and R. Renner, Physical Review Let- ters 102, 020504 (2009)
work page 2009
-
[36]
F. Wang, M. Erhard, A. Babazadeh, M. Malik, M. Krenn, and A. Zeilinger, Optica 4, 1462 (2017)
work page 2017
- [37]
-
[38]
I. Devetak and A. Winter, Proceedings of the Royal Society A: Mathematical, Physical and engineering sciences 461, 207 (2005)
work page 2005
- [39]
- [40]
-
[41]
V . Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Du ˇsek, N. L¨utkenhaus, and M. Peev, Rev. Mod. Phys.81, 1301 (2009)
work page 2009
- [42]
- [43]
-
[44]
L. Sheridan, T. Phuc Le, and V . Scarani, New Journal of Physics 12, 123019 (2010)
work page 2010
-
[45]
A. Mink and A. Nakassis, arXiv:1205.4977 [cs.CR] (2012)
work page internal anchor Pith review Pith/arXiv arXiv 2012
- [46]
-
[47]
Tomamichel, Quantum Information Processing with Finite Resources (Springer, 2016)
M. Tomamichel, Quantum Information Processing with Finite Resources (Springer, 2016)
work page 2016
-
[48]
R. J. Serfling, Ann. Statist. 2, 39 (1974)
work page 1974
-
[49]
R. Wang, Z.-Q. Yin, H. Liu, S. Wang, W. Chen, C.-G. Guo, and Z. F. Han, Phys. Rev. Res.3, 023019 (2021)
work page 2021
-
[50]
M. Tomamichel, R. Colbeck, and R. Renner, IEEE Transac- tions on Information Theory 55, 5840 (2009)
work page 2009
-
[51]
M. Tomamichel, M. Berta, and J. M. Renes, Nature Communi- cations 7, 11419 (2016)
work page 2016
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.