pith. machine review for the scientific record. sign in

arxiv: 2511.10584 · v3 · submitted 2025-11-13 · 🪐 quant-ph

Recognition: unknown

Finite-size quantum key distribution rates from R\'enyi entropies using conic optimization

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords enyioptimizationbeenconicdistributionentropiesentropyfinite-size
0
0 comments X
read the original abstract

Finite-size general security proofs for quantum key distribution based on R\'enyi entropies have recently been introduced. These approaches are more flexible and provide tighter bounds on the secret key rate than traditional formulations based on the von Neumann entropy. However, deploying them requires minimizing the conditional R\'enyi entropy, a difficult optimization problem that has hitherto been tackled using ad-hoc techniques based on the Frank-Wolfe algorithm, which are unstable and can only handle particular cases. In this work, we introduce a method based on non-symmetric conic optimization for solving this problem. Our technique is fast, reliable, and completely general. We illustrate its performance on several protocols, whose results represent an improvement over the state of the art.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Rigorous Security Proofs for Practical Quantum Key Distribution

    quant-ph 2026-04 unverdicted novelty 7.0

    Rigorous security proofs for variable-length QKD, phase-error bounding with imperfect detectors, marginal-constrained entropy accumulation, and authentication reductions place practical QKD on firmer mathematical ground.

  2. Numerical security analysis for practical quantum key distribution

    quant-ph 2026-05 unverdicted novelty 6.0

    A numerical framework proves finite-key security for practical decoy-state QKD systems with transmitter and receiver imperfections including non-IID signals.