
An Improved Correction Term for Dimension Reduction in Quantum Key Distribution
Twesh Upadhyaya,1, ∗Thomas van Himbeeck,1, 2 and Norbert L¨utkenhaus1
1Institute for Quantum Computing and Department of Physics and Astronomy
University of Waterloo, Waterloo, Ontario, Canada N2L 3G1
2Department of Electrical & Computer Engineering,
University of Toronto, Toronto, Ontario, Canada M5S 3G4
(Dated: October 27, 2022)
The dimension reduction method [1] enables security proofs of quantum key distribution (QKD)
protocols that are originally formulated in infinite dimensions via reduction to a tractable finite-
dimensional optimization. The reduction of dimensions is associated with a correction term in
the secret key rate calculation. The previously derived correction term is loose when the protocol
measurements are nearly block-diagonal with respect to the projection onto the reduced finite-
dimensional subspace. Here, we provide a tighter correction term. It interpolates between the
two extreme cases where all measurement operators are block-diagonal, and where at least one
has maximally large off-diagonal blocks. This new correction term can reduce the computational
overhead of applying the dimension reduction method by reducing the required dimension of the
chosen subspace.
I. INTRODUCTION
Quantum key distribution (QKD) is a promising quan-
tum technology, enabling two parties to communicate se-
curely, even if an eavesdropper has unlimited computa-
tional power [2–4].
A security analysis of a QKD protocol derives the rate
at which a secret key can be generated at the specified
security level. Recently, numerical tools have been intro-
duced to perform these key rate calculations, by reliably
solving an optimization over the joint state of Alice and
Bob [5, 6]. These tools are useful for practical QKD secu-
rity proofs as they enable modelling of imperfect devices,
encapsulate extended side channel models, and take ad-
vantage of specific details of the observed data to get an
increased key generation rate.
As most QKD protocols are implemented optically,
the underlying Hilbert space is infinite-dimensional. The
relevant optimization is then over infinite-dimensional
states, so the aforementioned numerical tools cannot be
applied directly. For discrete-variable (DV) protocols,
techniques such as squashing maps or the more gen-
eral flag-state squasher can be used to map the prob-
lem to an effective finite-dimensional optimization [7, 8].
These tools, however, are not straightforwardly applica-
ble to continuous-variable (CV) protocols. This is be-
cause they rely on all the protocol’s measurement op-
erators commuting with a projector on an underlying
low-dimensional subspace, a subspace which essentially
captures the protocol’s behaviour.
Recently, we have extended the numerical framework
to encompass both CV and DV protocols in infinite-
dimensional Hilbert spaces via the dimension reduction
method [1]. This method provides a tight lower bound
on the infinite-dimensional key rate optimization by op-
∗twesh.upadhyaya@uwaterloo.ca
timizing a specified finite-dimensional problem, and sub-
tracting a correction term that bounds the difference be-
tween the original infinite-dimensional problem and the
finite-dimensional one. The correction term bounds how
much the key rate can increase under projection. In our
previous work, we found an analytic form for the correc-
tion term that was applicable to any QKD protocol, but
loose in certain cases. We also found that the correc-
tion term is zero when all the POVMs commute with the
same projector. We conjectured that a tighter correction
term exists which interpolates between these two cases;
becoming smaller when the measurements are closer to
block-diagonal. In this work, we find such a correction
term. Practically, this is relevant for improving the per-
formance of the dimension reduction method, and en-
abling its applications to more computationally demand-
ing scenarios. It may also be of independent interest to
better understand how the key rate changes under pro-
jection.
II. BACKGROUND
In this section we briefly review the formulation of the
asymptotic key rate as a convex minimization and the
dimension reduction method; focusing in particular on
the correction term. For a more detailed discussion, we
refer the reader to Ref. [1].
A. Key Rate Optimization and Dimension
Reduction Method
In each key generation round of a QKD protocol, Alice
and Bob establish a quantum state ρAB ; and Eve holds
its purification in her register E. Alice and Bob measure
their respective subsystems and perform classical data
processing, which may involve public announcements, to
generate a raw key, which is the key before error correc-
arXiv:2210.14296v1 [quant-ph] 25 Oct 2022