{"id":"https://openalex.org/W3037468369","doi":"https://doi.org/10.1007/s11128-021-03078-0","title":"Optimizing the decoy-state BB84 QKD protocol parameters","display_name":"Optimizing the decoy-state BB84 QKD protocol parameters","publication_year":2021,"publication_date":"2021-04-01","ids":{"openalex":"https://openalex.org/W3037468369","doi":"https://doi.org/10.1007/s11128-021-03078-0","mag":"3037468369"},"language":"en","primary_location":{"id":"doi:10.1007/s11128-021-03078-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11128-021-03078-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11128-021-03078-0.pdf","source":{"id":"https://openalex.org/S92819544","display_name":"Quantum Information Processing","issn_l":"1570-0755","issn":["1570-0755","1573-1332"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Quantum Information Processing","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11128-021-03078-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003863612","display_name":"Thomas Attema","orcid":"https://orcid.org/0000-0002-8289-6853"},"institutions":[{"id":"https://openalex.org/I1341640284","display_name":"Centrum Wiskunde & Informatica","ror":"https://ror.org/00x7ekv49","country_code":"NL","type":"facility","lineage":["https://openalex.org/I1341640284","https://openalex.org/I2800991832"]},{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Thomas Attema","raw_affiliation_strings":["CWI, Amsterdam, The Netherlands","Mathematical Institute, Leiden University, Leiden, The Netherlands","TNO, Cyber Security and Robustness, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"CWI, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I1341640284"]},{"raw_affiliation_string":"Mathematical Institute, Leiden University, Leiden, The Netherlands","institution_ids":["https://openalex.org/I121797337"]},{"raw_affiliation_string":"TNO, Cyber Security and Robustness, The Hague, The Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035991190","display_name":"Joost Bosman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Joost W. Bosman","raw_affiliation_strings":["TNO, Cyber Security and Robustness, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"TNO, Cyber Security and Robustness, The Hague, The Netherlands","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007483219","display_name":"Niels M. P. Neumann","orcid":null},"institutions":[{"id":"https://openalex.org/I1341640284","display_name":"Centrum Wiskunde & Informatica","ror":"https://ror.org/00x7ekv49","country_code":"NL","type":"facility","lineage":["https://openalex.org/I1341640284","https://openalex.org/I2800991832"]},{"id":"https://openalex.org/I148297040","display_name":"Netherlands Organisation for Applied Scientific Research","ror":"https://ror.org/01bnjb948","country_code":"NL","type":"funder","lineage":["https://openalex.org/I148297040"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Niels M. P. Neumann","raw_affiliation_strings":["CWI, Amsterdam, The Netherlands","TNO, Cyber Security and Robustness, The Hague, The Netherlands","Netherlands Organisation for Applied Scientific Research"],"affiliations":[{"raw_affiliation_string":"CWI, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I1341640284"]},{"raw_affiliation_string":"TNO, Cyber Security and Robustness, The Hague, The Netherlands","institution_ids":[]},{"raw_affiliation_string":"Netherlands Organisation for Applied Scientific Research","institution_ids":["https://openalex.org/I148297040"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003863612"],"corresponding_institution_ids":["https://openalex.org/I121797337","https://openalex.org/I1341640284"],"apc_list":{"value":2040,"currency":"EUR","value_usd":2690},"apc_paid":{"value":2040,"currency":"EUR","value_usd":2690},"fwci":0.28,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60788082,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"20","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.9278059601783752},{"id":"https://openalex.org/keywords/bb84","display_name":"BB84","score":0.7910372614860535},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7111186981201172},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6074410080909729},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5324360728263855},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4637176990509033},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.46313172578811646},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46282821893692017},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.44023165106773376},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4093626141548157},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3519761860370636},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3458693325519562},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.318870484828949},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17806589603424072},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.12523481249809265},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08631241321563721}],"concepts":[{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.9278059601783752},{"id":"https://openalex.org/C78203541","wikidata":"https://www.wikidata.org/wiki/Q2566969","display_name":"BB84","level":5,"score":0.7910372614860535},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7111186981201172},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6074410080909729},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5324360728263855},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4637176990509033},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.46313172578811646},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46282821893692017},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.44023165106773376},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4093626141548157},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3519761860370636},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3458693325519562},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.318870484828949},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17806589603424072},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.12523481249809265},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08631241321563721},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1007/s11128-021-03078-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11128-021-03078-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11128-021-03078-0.pdf","source":{"id":"https://openalex.org/S92819544","display_name":"Quantum Information Processing","issn_l":"1570-0755","issn":["1570-0755","1573-1332"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Quantum Information Processing","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2006.15962","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2006.15962","pdf_url":"https://arxiv.org/pdf/2006.15962","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:cwi:oai:cwi.nl:30776","is_oa":true,"landing_page_url":"https://ir.cwi.nl/pub/30776","pdf_url":"https://ir.cwi.nl/pub/30776","source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Quantum Information Processing, 20(4)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:oai-pmh.tno.nl:52959","is_oa":true,"landing_page_url":"https://resolver.tno.nl/uuid:8ac34213-1155-43a3-8cb4-e1eeb78830be","pdf_url":"https://publications.tno.nl/publication/34638043/DioHvQ/attema-2021-optimizing.pdf","source":{"id":"https://openalex.org/S7407055233","display_name":"TNO Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Quantum Information Processing, 20","raw_type":"info:eu-repo/semantics/article"},{"id":"mag:3037468369","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/2006.15962.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2006.15962","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2006.15962","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.1007/s11128-021-03078-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11128-021-03078-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11128-021-03078-0.pdf","source":{"id":"https://openalex.org/S92819544","display_name":"Quantum Information Processing","issn_l":"1570-0755","issn":["1570-0755","1573-1332"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Quantum Information Processing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3037468369.pdf","grobid_xml":"https://content.openalex.org/works/W3037468369.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W147998453","https://openalex.org/W1499934958","https://openalex.org/W1508416470","https://openalex.org/W1716995571","https://openalex.org/W1787342803","https://openalex.org/W1971459440","https://openalex.org/W2014048641","https://openalex.org/W2042587503","https://openalex.org/W2047463679","https://openalex.org/W2052207834","https://openalex.org/W2055378591","https://openalex.org/W2055617162","https://openalex.org/W2056086109","https://openalex.org/W2065368731","https://openalex.org/W2071832559","https://openalex.org/W2100257068","https://openalex.org/W2103012681","https://openalex.org/W2131705908","https://openalex.org/W2136698279","https://openalex.org/W2150217546","https://openalex.org/W2157769965","https://openalex.org/W2170240091","https://openalex.org/W2180630352","https://openalex.org/W2951898221","https://openalex.org/W2968877684","https://openalex.org/W2995235436","https://openalex.org/W3004357554","https://openalex.org/W3038067977","https://openalex.org/W3098953081","https://openalex.org/W4233413206"],"related_works":["https://openalex.org/W3158062569","https://openalex.org/W3211617287","https://openalex.org/W2335894445","https://openalex.org/W3197619607","https://openalex.org/W2733405189","https://openalex.org/W1975028403","https://openalex.org/W1104989598","https://openalex.org/W3015478848","https://openalex.org/W2185285123","https://openalex.org/W3127564723","https://openalex.org/W170134463","https://openalex.org/W1866485830","https://openalex.org/W2012269622","https://openalex.org/W2465211917","https://openalex.org/W2621253999","https://openalex.org/W2557917977","https://openalex.org/W2186431930","https://openalex.org/W2795101245","https://openalex.org/W3127074366","https://openalex.org/W3032855804"],"abstract_inverted_index":{"Abstract":[0],"Quantum":[1],"key":[2,15,76],"distribution":[3,11],"(QKD)":[4],"protocols":[5,92],"allow":[6],"for":[7,260],"information":[8,43],"theoretically":[9],"secure":[10,178],"of":[12,24,48,57,74,89,107,124,135,142,154,190,285],"(classical)":[13],"cryptographic":[14,75],"material.":[16],"However,":[17,194],"due":[18],"to":[19,36,147,159,172,176,201,240],"practical":[20],"limitations":[21],"the":[22,55,58,64,68,72,86,105,140,155,177,183,188,198,226,233,261,268,283,286],"performance":[23,47,259,287],"QKD":[25,50,91,264],"implementations":[26],"is":[27,34,52,97,128,145],"somewhat":[28],"restricted.":[29],"For":[30,138],"this":[31,125,211],"reason,":[32],"it":[33],"crucial":[35],"find":[37],"optimal":[38,100],"protocol":[39,101,253],"parameters,":[40,102],"while":[41],"guaranteeing":[42],"theoretic":[44],"security.":[45],"The":[46,122],"a":[49,118,133,160,215,247],"implementation":[51],"determined":[53],"by":[54,116,131],"tightness":[56],"underlying":[59],"security":[60,65,87,199,249],"analysis.":[61],"In":[62,210],"particular,":[63],"analyses":[66,88],"determines":[67],"key-rate":[69],",":[70],"i.e.,":[71],"amount":[73],"material":[77],"that":[78,99,267,282],"can":[79,113,290],"be":[80,114,202,241,292],"distributed":[81],"per":[82],"time":[83],"unit.":[84],"Nowadays,":[85],"various":[90],"are":[93,166,170,273],"well":[94],"understood.":[95],"It":[96],"known":[98],"such":[103],"as":[104,168],"number":[106,134,141],"decoy":[108,143,156],"states":[109,144,165],"and":[110,163,186,204,222,243],"their":[111],"intensities,":[112],"found":[115],"solving":[117],"nonlinear":[119,223],"optimization":[120,126,184,227,279,288],"problem.":[121,228],"complexity":[123,284],"problem":[127,185,289],"typically":[129,271],"handled":[130,293],"making":[132,295],"heuristic":[136,238,269,296],"assumptions.":[137],"instance,":[139],"restricted":[146],"only":[148,174],"one":[149,153],"or":[150],"two,":[151],"with":[152,251,299],"intensities":[157],"set":[158],"fixed":[161],"value,":[162],"vacuum":[164],"ignored":[167],"they":[169,195],"assumed":[171],"contribute":[173],"marginally":[175],"key-rate.":[179],"These":[180],"assumptions":[181,239,270],"simplify":[182],"reduce":[187],"size":[189],"search":[191],"space":[192],"significantly.":[193],"also":[196,291],"cause":[197],"analysis":[200,250],"non-tight,":[203],"thereby":[205],"result":[206],"in":[207,246],"sub-optimal":[208],"performance.":[209],"work,":[212],"we":[213],"follow":[214],"more":[216],"rigorous":[217],"approach":[218],"using":[219],"both":[220],"linear":[221],"programs":[224],"describing":[225],"Our":[229],"approach,":[230],"focusing":[231],"on":[232],"decoy-state":[234,262],"BB84":[235,263],"protocol,":[236,265],"allows":[237],"omitted,":[242],"therefore":[244],"results":[245],"tighter":[248],"better":[252],"parameters.":[254],"We":[255],"show":[256],"an":[257],"improved":[258,278],"demonstrating":[266],"made":[272],"too":[274],"restrictive.":[275],"Moreover,":[276],"our":[277],"frameworks":[280],"shows":[281],"without":[294],"assumptions,":[297],"even":[298],"limited":[300],"computational":[301],"resources":[302],"available.":[303]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
