pith. sign in

arxiv: 2501.05890 · v2 · submitted 2025-01-10 · 🪐 quant-ph

High-dimensional quantum key distribution rates for multiple measurement bases

Pith reviewed 2026-05-23 05:28 UTC · model grok-4.3

classification 🪐 quant-ph
keywords high-dimensional QKDmutually unbiased basesfinite-key analysissecret key rateBBM92 protocolquantum cryptographyasymptotic key rate
0
0 comments X

The pith

For small numbers of rounds in high-dimensional QKD, three mutually unbiased bases yield higher key rates than d+1 bases.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper examines a BBM92-like quantum key distribution protocol using systems of dimension d greater than 2 and varying numbers of mutually unbiased bases. It derives an analytic formula for the asymptotic secret key rate when all d+1 possible bases are used. The analysis then shifts to finite-key scenarios, where the key rate is optimized against different types of attacks for any number of bases. A key result is that when the total number of protocol rounds is limited, employing only three bases can produce a higher key rate than using the full set of d+1 bases. This finding matters because practical QKD implementations often operate with finite data, so the choice of bases affects achievable security and throughput.

Core claim

In a high-dimensional BBM92-like QKD protocol, an analytic expression for the asymptotic key rate is derived when d+1 MUBs are used. For the finite-key case, optimization against collective and coherent attacks reveals that for sufficiently small number of rounds, the highest key rate is achieved by using three MUBs rather than d+1, for generic d.

What carries the argument

Finite-key rate optimization against collective and coherent attacks, parameterized by the number of mutually unbiased bases employed.

If this is right

  • An analytic expression exists for the asymptotic key rate when the protocol uses the maximum d+1 MUBs.
  • Varying the number of MUBs changes the achieved key rate in both the asymptotic and finite-key regimes.
  • Below a threshold on the number of rounds, three MUBs give the maximum finite key rate for any prime-power dimension d.
  • The optimization result applies uniformly across all admissible numbers of MUBs and generic system dimensions.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Hardware that generates only a few MUBs may suffice for short sessions, lowering implementation cost without sacrificing rate.
  • The crossover point where three MUBs cease to be optimal could be used to set session-length thresholds in deployed systems.
  • Similar finite-size effects might appear when the same optimization is applied to other high-dimensional protocols or attack models.

Load-bearing premise

The finite-key optimization against collective and coherent attacks correctly identifies the reported optimum for generic d and all MUB counts.

What would settle it

An independent recalculation of the finite-key rates that shows d+1 MUBs always produce strictly higher rates than three MUBs for every round count would falsify the central claim.

Figures

Figures reproduced from arXiv: 2501.05890 by Chiara Macchiavello, Dagmar Bru{\ss}, Giovanni Chesi, Hermann Kampermann, Nikolai Wyderka.

Figure 1
Figure 1. Figure 1: Asymptotic key rates for five-dimensional systems and all [PITH_FULL_IMAGE:figures/full_fig_p004_1.png] view at source ↗
Figure 4
Figure 4. Figure 4: , where we plot, in the symmetric case, the maximum tolerable error rate Qmax, namely the error rate at which the key rate becomes zero, as a function of the dimension d of the system. There, we plot the same quantity also for the case m = d + 1, which shows again the enhancement that one gets by exploiting more than two MUBs, as displayed in Figs. 1 and 2 for the particular cases d = 5 and d = 47. Finally… view at source ↗
Figure 5
Figure 5. Figure 5: Asymptotic key rates for d-dimensional systems and two MUBs as a function of the two error rates QX and QZ . The analyti￾cal expression is given in Eq. (18). [19, 32, 41, 42], as for the collective attacks. This approxima￾tion can be achieved by using the so-called postselection tech￾nique [33]. Alternatively, one can exploit suitable entropic uncertainty relations (EURs), but their generalization to more … view at source ↗
Figure 6
Figure 6. Figure 6: Top: Finite key rates secure against collective (solid lines, Eq. (27)) and coherent (dot-dashed lines, Eq. (30)) attacks for [PITH_FULL_IMAGE:figures/full_fig_p007_6.png] view at source ↗
read the original abstract

We investigate the advantages of high-dimensional encoding for a quantum key distribution protocol. In particular, we address a BBM92-like protocol where the dimension of the systems can be larger than two and more than two mutually unbiased bases (MUBs) can be employed. Indeed, it is known that, for a system whose dimension $d$ is a prime or the power of a prime, up to $d+1$ MUBs can be found. We derive an analytic expression for the asymptotic key rate when $d+1$ MUBs are exploited and show the effects of using different numbers of MUBs on the performance of the protocol. Then, we move to the non-asymptotic case and optimize the finite key rate against collective and coherent attacks for generic dimension of the systems and all possible numbers of MUBs. In the finite-key scenario, we find that, if the number of rounds is small enough, the highest key rate is obtained by exploiting three MUBs, instead of $d+1$ as one may expect.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The manuscript analyzes a high-dimensional BBM92-like QKD protocol that employs up to d+1 mutually unbiased bases (MUBs) for prime-power dimensions d. It derives a closed-form asymptotic key rate expression when all d+1 MUBs are used, examines the effect of using fewer bases, and performs a numerical optimization of the finite-key rate against collective and coherent attacks for arbitrary d and all admissible numbers of MUBs. The central finite-key result is that, for sufficiently small total round counts, the optimal rate is achieved with three MUBs rather than d+1.

Significance. If the finite-key optimization is reproducible, the work supplies concrete, dimension-dependent guidance on the number of measurement bases that maximizes the extractable key in the short-block-length regime, which is directly relevant to near-term high-dimensional QKD implementations. The analytic asymptotic formula is a clear strength that can be checked independently.

major comments (2)
  1. [finite-key optimization] Finite-key optimization section: the numerical maximization of the key rate against coherent attacks for generic d and varying MUB counts is presented only as a result; the explicit objective function, the precise finite-key correction terms (smoothing or concentration bounds), the SDP constraints that encode the MUB overlap structure, and the solver tolerances are not stated. Without these, the reported crossover to three MUBs for small N cannot be independently verified and is therefore load-bearing for the headline claim.
  2. [asymptotic analysis] Asymptotic rate derivation: while an analytic expression is stated for the d+1-MUB case, the manuscript does not show how the expression reduces when the number of MUBs is lowered to three; the dependence on the number of bases therefore remains implicit and prevents direct comparison with the finite-key optimum.
minor comments (2)
  1. Notation for the number of MUBs should be introduced once and used consistently (e.g., m versus k).
  2. Figure captions should explicitly state the dimension d and the total number of rounds N used in each panel.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for their thorough review and constructive feedback on our manuscript. We appreciate the recognition of the significance of our finite-key results for high-dimensional QKD. Below, we provide point-by-point responses to the major comments.

read point-by-point responses
  1. Referee: [finite-key optimization] Finite-key optimization section: the numerical maximization of the key rate against coherent attacks for generic d and varying MUB counts is presented only as a result; the explicit objective function, the precise finite-key correction terms (smoothing or concentration bounds), the SDP constraints that encode the MUB overlap structure, and the solver tolerances are not stated. Without these, the reported crossover to three MUBs for small N cannot be independently verified and is therefore load-bearing for the headline claim.

    Authors: We agree that providing these details is crucial for reproducibility of the numerical results. In the revised manuscript, we will include the explicit form of the objective function, specify the finite-key correction terms with the exact smoothing and concentration bounds employed, detail the SDP constraints reflecting the MUB overlap structure, and report the numerical solver tolerances. These additions will enable independent verification of the reported crossover to three MUBs for small total round counts. revision: yes

  2. Referee: [asymptotic analysis] Asymptotic rate derivation: while an analytic expression is stated for the d+1-MUB case, the manuscript does not show how the expression reduces when the number of MUBs is lowered to three; the dependence on the number of bases therefore remains implicit and prevents direct comparison with the finite-key optimum.

    Authors: The analytic expression is presented for the d+1 MUB case because this configuration yields the highest asymptotic rate. The effects of using fewer MUBs are demonstrated through numerical evaluation in the manuscript. However, to make the dependence explicit and facilitate direct comparison, we will add in the revision a derivation showing the reduction of the expression for the three-MUB case by appropriately modifying the entropy terms corresponding to the reduced number of bases. revision: yes

Circularity Check

0 steps flagged

No circularity: analytic derivation and numerical optimization are independent of their outputs

full rationale

The abstract states an analytic expression is derived for the asymptotic key rate with d+1 MUBs and that finite-key rates are optimized numerically against collective/coherent attacks for generic d and varying MUB counts. No equation is presented that defines a rate or optimum in terms of itself, renames a fitted parameter as a prediction, or reduces the central claim to a self-citation chain. The reported preference for three MUBs at small round counts is framed as the output of an external optimization procedure rather than a definitional identity. Standard QKD formulas and known MUB existence results supply the inputs; the optimization step is treated as a computational result, not a tautology. This satisfies the default expectation of a self-contained derivation.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 0 invented entities

Only the abstract is available, so the ledger is necessarily incomplete. The claims rest on standard QKD security definitions for collective and coherent attacks and on the existence of d+1 MUBs for prime-power dimensions; no free parameters or invented entities are visible in the abstract.

axioms (2)
  • standard math Existence of d+1 mutually unbiased bases when d is prime or prime power
    Invoked in the abstract to justify using up to d+1 MUBs.
  • domain assumption Validity of BBM92-like protocol extension to dimension d and multiple MUBs
    The protocol is described as BBM92-like without further justification in the abstract.

pith-pipeline@v0.9.0 · 5726 in / 1346 out tokens · 31127 ms · 2026-05-23T05:28:00.278054+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Security of deterministic key distribution with higher-dimensional systems

    quant-ph 2025-05 unverdicted novelty 5.0

    Higher-dimensional two-way QKD protocols using mutually unbiased bases and Heisenberg-Weyl operators yield secret keys for stronger individual attacks and improved robustness to collective eavesdropping via entropic u...

  2. Quantum Uncertainty and Entropy

    quant-ph 2026-04 unverdicted novelty 1.0

    A review of quantum uncertainty relations that covers foundational and practical applications of both variance- and entropy-based uncertainties.

Reference graph

Works this paper leans on

51 extracted references · 51 canonical work pages · cited by 2 Pith papers · 1 internal anchor

  1. [1]

    Last, we consider the case of coher- ent attacks and exploit the results obtained in Ref

    in the case m = 2 and from the asymptotic equipartition property [32] for m ≥ 2. Last, we consider the case of coher- ent attacks and exploit the results obtained in Ref. [42] from the postselection technique [33]. The steps of the protocol are the standard ones of an entanglement-based BB84-like scheme, namely BBM92 like [2], i.e. distribution, measureme...

  2. [2]

    (21), we get r(ϵ, ϵEC, ϵPA, n, k) ≤ C − h(Qtol + µϵ) − (Qtol + µϵ) · log2(d − 1) − 1 n leakEC + log2 2 ϵEC + 2 log2 1 2ϵPA

    By inserting the uncertainty relation and 6 the bound on the max-entropy into Eq. (21), we get r(ϵ, ϵEC, ϵPA, n, k) ≤ C − h(Qtol + µϵ) − (Qtol + µϵ) · log2(d − 1) − 1 n leakEC + log2 2 ϵEC + 2 log2 1 2ϵPA . (25) The total rate is then given by n N r with n = N − k and can be optimized over k, ϵ, ϵEC and ϵPA: ˆr(ϵtot, N) = max k,ϵ,ϵEC,ϵPA ˆr(ϵtot, N, k), (...

  3. [3]

    C. H. Bennett and G. Brassard, Proceedings of IEEE Interna- tional Conference on Computers, Systems and Signal Process- ing 175, 8 (1984)

  4. [4]

    C. H. Bennett, G. Brassard, and N. D. Mermin, Phys. Rev. Lett. 68, 557 (1992)

  5. [5]

    Walborn, D

    S. Walborn, D. Lemelle, M. Almeida, and P. Ribeiro, Phys. Rev. Lett. 96, 090501 (2006)

  6. [6]

    O. Lib, K. Sulimany, J. Lin, M. Ara ´ujo, M. Ben-Or, and Y . Bromberg, arXiv:2403.04210 (2024)

  7. [7]

    Ali-Khan, C

    I. Ali-Khan, C. Broadbent, J. Howell, and M. G. Raymer, Phys. Rev. Lett. 98, 060503 (2007)

  8. [8]

    N. T. Islam, C. Ci Wen Lim, C. Cahall, J. Kim, and D. J. Gau- thier, Sci. Adv. 3, e1701491 (2017)

  9. [9]

    B. E. Nussbaum, U. Purakayastha, J. Floyd, J. Szuniewicz, F. So´snicki, M. Karpi´nski’, and P. G. Kwiat, Proc. SPIE 12633, Photonics for Quantum 2023 12633, 1263302 (2023)

  10. [10]

    Brecht, D

    B. Brecht, D. V . Reddy, C. Silberhorn, and M. G. Raymer, Phys. Rev. X 5, 041017 (2015)

  11. [11]

    Mirhosseini, O

    M. Mirhosseini, O. S. Maga ˜na-Loaiza, M. N. O’Sullivan, B. Rodenburg, M. Malik, M. P. J. Lavery, M. J. Padgett, D. J. Gauthier, and R. W. Boyd, New J. Phys. 17, 033033 (2015)

  12. [12]

    Sekga, M

    C. Sekga, M. Mafu, and M. Senekane, Sci. Rep. 13, 1229 (2023)

  13. [13]

    Ca ˜nas, N

    G. Ca ˜nas, N. Vera, J. Cari˜ne, P. Gonz´alez, J. Cardenas, P. W. R. Connolly, A. Przysiezna, E. S. G ´omez, M. Figueroa, G. Val- lone, P. Villoresi, T. F. da Silva, G. B. Xavier, and G. Lima, Phys. Rev. A 96, 022317 (2017)

  14. [14]

    Zahidy, D

    M. Zahidy, D. Ribezzo, C. De Lazzari, I. Vagniluca, N. Bi- agi, R. M ¨uller, T. Occhipinti, O. L. K., M. Galili, T. Hayashi, D. Cassioli, A. Mecozzi, C. Antonelli, A. Zavatta, and D. Bacco, Nat. Commun. 15, 1651 (2024)

  15. [15]

    N. J. Cerf, M. Bourennane, A. Karlsson, and N. Gisin, Phys.Rev.Lett. 88, 127902 (2002)

  16. [16]

    Bruß and C

    D. Bruß and C. Macchiavello, Phys.Rev.Lett. 88, 127901 (2002)

  17. [17]

    W. K. Wootters and B. D. Fields, Ann. Phys. 191, 363 (1988)

  18. [18]

    Durt, B.-G

    T. Durt, B.-G. Englert, I. Bengtsson, and ˙Zyczkowski, Int. J. Quantum Inf. 8, 535 (2010)

  19. [19]

    Bruß, Phys.Rev.Lett

    D. Bruß, Phys.Rev.Lett. 81, 3018 (1998)

  20. [20]

    Bechmann-Pasquinucci and N

    H. Bechmann-Pasquinucci and N. Gisin, Phys. Rev. A 59, 4238 (1999)

  21. [21]

    Br ´adler, M

    K. Br ´adler, M. Mirhosseini, R. Fickler, A. Broadbent, and R. Boyd, New Journal of Physics 18, 073030 (2016)

  22. [22]

    Winick, N

    A. Winick, N. L ¨utkenhaus, and P. J. Coles, Quantum 2, 77 (2018)

  23. [23]

    M. Doda, M. Huber, G. Murta, M. Pivoluska, M. Plesch, and C. Vlachou, Phys. Rev. Appl. 15, 034003 (2021)

  24. [24]

    Brown, H

    P. Brown, H. Fawzi, and O. Fawzi, Nat. Commun. 12, 575 (2021)

  25. [25]

    H. Hu, J. Im, J. Lin, N. L ¨utkenhaus, and H. Wolkowicz, Quan- tum 6, 792 (2022)

  26. [26]

    Ara ´ujo, M

    M. Ara ´ujo, M. Huber, M. Navascu ´es, M. Pivoluska, and 11 A. Tavakoli, Quantum7, 1019 (2023)

  27. [27]

    Kanitschar and M

    F. Kanitschar and M. Huber, arXiv:2406.08544 [quant-ph] (2024), https://doi.org/10.48550/arXiv.2406.08544

  28. [28]

    Ikuta, S

    T. Ikuta, S. Akibue, Y . Yonezu, T. Honjo, H. Takesue, and K. Inoue, Phys. Rev. Research 4, L042007 (2022)

  29. [29]

    Renner and S

    R. Renner and S. Wolf, Roy, B. (eds) Advances in Cryptology - ASIACRYPT 2005. ASIACRYPT 2005. Lecture Notes in Com- puter Science 3788, 199 (2005)

  30. [30]

    Tomamichel, R

    M. Tomamichel, R. Colbeck, and R. Renner, IEEE Trans. Inf. Theory 54, 4674 (2010)

  31. [31]

    Tomamichel and R

    M. Tomamichel and R. Renner, PRL 106, 110506 (2011)

  32. [32]

    Tomamichel, C

    M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, Nature communications 3, 634 (2012)

  33. [33]

    Grasselli, Quantum Cryptography: from Key Distribution to Conference Key Agreement , Ph.D

    F. Grasselli, Quantum Cryptography: from Key Distribution to Conference Key Agreement , Ph.D. thesis, Universit ¨at D ¨ussel- dorf (2020)

  34. [34]

    Renner, International Journal of Quantum Information 6, 1 (2008)

    R. Renner, International Journal of Quantum Information 6, 1 (2008)

  35. [35]

    Christandl, R

    M. Christandl, R. K ¨onig, and R. Renner, Physical Review Let- ters 102, 020504 (2009)

  36. [36]

    F. Wang, M. Erhard, A. Babazadeh, M. Malik, M. Krenn, and A. Zeilinger, Optica 4, 1462 (2017)

  37. [37]

    Englert and Y

    B.-G. Englert and Y . Aharonov, Phys. Lett. A284, 1 (2001)

  38. [38]

    Devetak and A

    I. Devetak and A. Winter, Proceedings of the Royal Society A: Mathematical, Physical and engineering sciences 461, 207 (2005)

  39. [39]

    Biham and T

    E. Biham and T. Mor, Phys.Rev.Lett. 78, 2256 (1997)

  40. [40]

    Renner, N

    R. Renner, N. Gisin, and B. Kraus, PRA 72, 012332 (2005)

  41. [41]

    Scarani, H

    V . Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Du ˇsek, N. L¨utkenhaus, and M. Peev, Rev. Mod. Phys.81, 1301 (2009)

  42. [42]

    Sheridan and V

    L. Sheridan and V . Scarani, PRA82, 030301(R) (2010)

  43. [43]

    Renner, nature physics 3, 645 (2007)

    R. Renner, nature physics 3, 645 (2007)

  44. [44]

    Sheridan, T

    L. Sheridan, T. Phuc Le, and V . Scarani, New Journal of Physics 12, 123019 (2010)

  45. [45]

    LDPC for QKD Reconciliation

    A. Mink and A. Nakassis, arXiv:1205.4977 [cs.CR] (2012)

  46. [46]

    Tomamichel and A

    M. Tomamichel and A. Leverrier, Quantum 1, 14 (2017)

  47. [47]

    Tomamichel, Quantum Information Processing with Finite Resources (Springer, 2016)

    M. Tomamichel, Quantum Information Processing with Finite Resources (Springer, 2016)

  48. [48]

    R. J. Serfling, Ann. Statist. 2, 39 (1974)

  49. [49]

    Wang, Z.-Q

    R. Wang, Z.-Q. Yin, H. Liu, S. Wang, W. Chen, C.-G. Guo, and Z. F. Han, Phys. Rev. Res.3, 023019 (2021)

  50. [50]

    Tomamichel, R

    M. Tomamichel, R. Colbeck, and R. Renner, IEEE Transac- tions on Information Theory 55, 5840 (2009)

  51. [51]

    Tomamichel, M

    M. Tomamichel, M. Berta, and J. M. Renes, Nature Communi- cations 7, 11419 (2016)