CINXE.COM

Secret key rate bounds for quantum key distribution with faulty active phase randomization | EPJ Quantum Technology | Full Text

<!DOCTYPE html> <html lang="en" class="no-js"> <head> <meta charset="UTF-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="applicable-device" content="pc,mobile"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Secret key rate bounds for quantum key distribution with faulty active phase randomization | EPJ Quantum Technology | Full Text</title> <meta name="citation_abstract" content="Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources, and provides the same secret key rate scaling as ideal single-photon sources. It requires, however, that the phase of each emitted pulse is uniformly random. This might be difficult to guarantee in practice, due to inevitable device imperfections and/or the use of an external phase modulator for phase randomization in an active setup, which limits the possible selected phases to a finite set. Here, we investigate the security of decoy-state QKD when the phase is actively randomized by faulty devices, and show that this technique is quite robust to deviations from the ideal uniformly random scenario. For this, we combine a novel parameter estimation technique based on semi-definite programming, with the use of basis mismatched events, to tightly estimate the parameters that determine the achievable secret key rate. In doing so, we demonstrate that our analysis can significantly outperform previous results that address more restricted scenarios."/> <meta name="journal_id" content="40507"/> <meta name="dc.title" content="Secret key rate bounds for quantum key distribution with faulty active phase randomization"/> <meta name="dc.source" content="EPJ Quantum Technology 2023 10:1"/> <meta name="dc.format" content="text/html"/> <meta name="dc.publisher" content="SpringerOpen"/> <meta name="dc.date" content="2023-12-15"/> <meta name="dc.type" content="OriginalPaper"/> <meta name="dc.language" content="En"/> <meta name="dc.copyright" content="2023 The Author(s)"/> <meta name="dc.rights" content="2023 The Author(s)"/> <meta name="dc.rightsAgent" content="reprints@biomedcentral.com"/> <meta name="dc.description" content="Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources, and provides the same secret key rate scaling as ideal single-photon sources. It requires, however, that the phase of each emitted pulse is uniformly random. This might be difficult to guarantee in practice, due to inevitable device imperfections and/or the use of an external phase modulator for phase randomization in an active setup, which limits the possible selected phases to a finite set. Here, we investigate the security of decoy-state QKD when the phase is actively randomized by faulty devices, and show that this technique is quite robust to deviations from the ideal uniformly random scenario. For this, we combine a novel parameter estimation technique based on semi-definite programming, with the use of basis mismatched events, to tightly estimate the parameters that determine the achievable secret key rate. In doing so, we demonstrate that our analysis can significantly outperform previous results that address more restricted scenarios."/> <meta name="prism.issn" content="2196-0763"/> <meta name="prism.publicationName" content="EPJ Quantum Technology"/> <meta name="prism.publicationDate" content="2023-12-15"/> <meta name="prism.volume" content="10"/> <meta name="prism.number" content="1"/> <meta name="prism.section" content="OriginalPaper"/> <meta name="prism.startingPage" content="1"/> <meta name="prism.endingPage" content="26"/> <meta name="prism.copyright" content="2023 The Author(s)"/> <meta name="prism.rightsAgent" content="reprints@biomedcentral.com"/> <meta name="prism.url" content="https://epjquantumtechnology.springeropen.com/articles/10.1140/epjqt/s40507-023-00210-0"/> <meta name="prism.doi" content="doi:10.1140/epjqt/s40507-023-00210-0"/> <meta name="citation_pdf_url" content="https://epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-023-00210-0"/> <meta name="citation_fulltext_html_url" content="https://epjquantumtechnology.springeropen.com/articles/10.1140/epjqt/s40507-023-00210-0"/> <meta name="citation_journal_title" content="EPJ Quantum Technology"/> <meta name="citation_journal_abbrev" content="EPJ Quantum Technol."/> <meta name="citation_publisher" content="SpringerOpen"/> <meta name="citation_issn" content="2196-0763"/> <meta name="citation_title" content="Secret key rate bounds for quantum key distribution with faulty active phase randomization"/> <meta name="citation_volume" content="10"/> <meta name="citation_issue" content="1"/> <meta name="citation_publication_date" content="2023/12"/> <meta name="citation_online_date" content="2023/12/15"/> <meta name="citation_firstpage" content="1"/> <meta name="citation_lastpage" content="26"/> <meta name="citation_article_type" content="Research"/> <meta name="citation_fulltext_world_readable" content=""/> <meta name="citation_language" content="en"/> <meta name="dc.identifier" content="doi:10.1140/epjqt/s40507-023-00210-0"/> <meta name="DOI" content="10.1140/epjqt/s40507-023-00210-0"/> <meta name="size" content="970478"/> <meta name="citation_doi" content="10.1140/epjqt/s40507-023-00210-0"/> <meta name="citation_springer_api_url" content="http://api.springer.com/xmldata/jats?q=doi:10.1140/epjqt/s40507-023-00210-0&amp;api_key="/> <meta name="description" content="Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources, and provides the same secret key rate scaling as ideal single-photon sources. It requires, however, that the phase of each emitted pulse is uniformly random. This might be difficult to guarantee in practice, due to inevitable device imperfections and/or the use of an external phase modulator for phase randomization in an active setup, which limits the possible selected phases to a finite set. Here, we investigate the security of decoy-state QKD when the phase is actively randomized by faulty devices, and show that this technique is quite robust to deviations from the ideal uniformly random scenario. For this, we combine a novel parameter estimation technique based on semi-definite programming, with the use of basis mismatched events, to tightly estimate the parameters that determine the achievable secret key rate. In doing so, we demonstrate that our analysis can significantly outperform previous results that address more restricted scenarios."/> <meta name="dc.creator" content="Sixto, Xoel"/> <meta name="dc.creator" content="Curr&#225;s-Lorenzo, Guillermo"/> <meta name="dc.creator" content="Tamaki, Kiyoshi"/> <meta name="dc.creator" content="Curty, Marcos"/> <meta name="dc.subject" content="Quantum Physics"/> <meta name="dc.subject" content="Quantum Information Technology, Spintronics"/> <meta name="dc.subject" content="Nanotechnology and Microengineering"/> <meta name="citation_reference" content="citation_journal_title=Rev Mod Phys; citation_title=Secure quantum key distribution with realistic devices; citation_author=F Xu, X Ma, Q Zhang, HK Lo, JW Pan; citation_volume=92; citation_publication_date=2020; citation_doi=10.1103/RevModPhys.92.025002; citation_id=CR1"/> <meta name="citation_reference" content="citation_journal_title=Adv Opt Photonics; citation_title=Advances in quantum cryptography; citation_author=S Pirandola, UL Andersen, L Banchi, M Berta, D Bunandar, R Colbeck; citation_volume=12; citation_issue=4; citation_publication_date=2020; citation_pages=1012; citation_doi=10.1364/aop.361502; citation_id=CR2"/> <meta name="citation_reference" content="citation_journal_title=Nat Photonics; citation_title=Secure quantum key distribution; citation_author=HK Lo, M Curty, K Tamaki; citation_volume=8; citation_issue=8; citation_publication_date=2014; citation_pages=595-604; citation_doi=10.1038/nphoton.2014.149; citation_id=CR3"/> <meta name="citation_reference" content="citation_journal_title=Nature; citation_title=A single quantum cannot be cloned; citation_author=WK Wootters, WH Zurek; citation_volume=299; citation_publication_date=1982; citation_pages=802-803; citation_doi=10.1038/299802a0; citation_id=CR4"/> <meta name="citation_reference" content="citation_journal_title=Trans Am Inst Electr Eng; citation_title=Cipher printing telegraph systems for secret wire and radio telegraphic communications; citation_author=GS Vernam; citation_volume=XLV; citation_publication_date=1926; citation_pages=295-301; citation_doi=10.1109/T-AIEE.1926.5061224; citation_id=CR5"/> <meta name="citation_reference" content="citation_journal_title=Opt Express; citation_title=Field test of quantum key distribution in the Tokyo QKD network; citation_author=M Sasaki, M Fujiwara, H Ishizuka, W Klaus, K Wakui, M Takeoka; citation_volume=19; citation_issue=11; citation_publication_date=2011; citation_doi=10.1364/oe.19.010387; citation_id=CR6"/> <meta name="citation_reference" content="citation_journal_title=New J Phys; citation_title=Long-term performance of the SwissQuantum quantum key distribution network in a field environment; citation_author=D Stucki, M Legr&#233;, F Buntschu, B Clausen, N Felber, N Gisin; citation_volume=13; citation_issue=12; citation_publication_date=2011; citation_doi=10.1088/1367-2630/13/12/123001; citation_id=CR7"/> <meta name="citation_reference" content="citation_journal_title=npj Quantum Inf; citation_title=Cambridge quantum network; citation_author=JF Dynes, A Wonfor, WWS Tam, AW Sharpe, R Takahashi, M Lucamarini; citation_volume=5; citation_issue=1; citation_publication_date=2019; citation_doi=10.1038/s41534-019-0221-4; citation_id=CR8"/> <meta name="citation_reference" content="citation_journal_title=Nature; citation_title=An integrated space-to-ground quantum communication network over 4,600 kilometres; citation_author=YA Chen, Q Zhang, TY Chen, WQ Cai, SK Liao, J Zhang; citation_volume=589; citation_publication_date=2021; citation_pages=214-219; citation_doi=10.1038/s41586-020-03093-8; citation_id=CR9"/> <meta name="citation_reference" content="citation_title=Quantum cryptography: public key distribution and coin tossing; citation_inbook_title=Proceedings of IEEE international conference on computers, systems, and signal processing; citation_publication_date=1984; citation_pages=175-179; citation_id=CR10; citation_author=CH Bennett; citation_author=G Brassard"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev A; citation_title=Quantum cryptography with coherent states; citation_author=B Huttner, N Imoto, N Gisin, T Mor; citation_volume=51; citation_publication_date=1995; citation_pages=1863-1869; citation_doi=10.1103/PhysRevA.51.1863; citation_id=CR11"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Limitations on practical quantum cryptography; citation_author=G Brassard, N L&#252;tkenhaus, T Mor, BC Sanders; citation_volume=85; citation_publication_date=2000; citation_doi=10.1103/PhysRevLett.85.1330; citation_id=CR12"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Quantum key distribution with high loss: toward global secure communication; citation_author=WY Hwang; citation_volume=91; citation_issue=5; citation_publication_date=2003; citation_doi=10.1103/physrevlett.91.057901; citation_id=CR13"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Beating the photon-number-splitting attack in practical quantum cryptography; citation_author=XB Wang; citation_volume=94; citation_issue=23; citation_publication_date=2005; citation_doi=10.1103/physrevlett.94.230503; citation_id=CR14"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=State quantum key distribution; citation_author=HK Lo, X Ma, CK Decoy; citation_volume=94; citation_issue=23; citation_publication_date=2005; citation_doi=10.1103/physrevlett.94.230504; citation_id=CR15"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev A; citation_title=Security bounds for practical decoy-state quantum key distribution; citation_author=CCW Lim, M Curty, N Walenta, F Xu, ZH Concise; citation_volume=89; citation_publication_date=2014; citation_doi=10.1103/physreva.89.022307; citation_id=CR16"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Experimental quantum key distribution with decoy states; citation_author=Y Zhao, B Qi, X Ma, HK Lo, L Qian; citation_volume=96; citation_publication_date=2006; citation_doi=10.1103/PhysRevLett.96.070502; citation_id=CR17"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Long-distance decoy-state quantum key distribution in optical fiber; citation_author=D Rosenberg, JW Harrington, PR Rice, PA Hiskett, CG Peterson, RJ Hughes; citation_volume=98; citation_publication_date=2007; citation_doi=10.1103/physrevlett.98.010503; citation_id=CR18"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Experimental demonstration of free-space decoy-state quantum key distribution over 144 km; citation_author=T Schmitt-Manderbach, H Weier, M F&#252;rst, R Ursin, F Tiefenbacher, T Scheidl; citation_volume=98; citation_publication_date=2007; citation_doi=10.1103/PhysRevLett.98.010504; citation_id=CR19"/> <meta name="citation_reference" content="citation_journal_title=Opt Express; citation_title=Decoy-state quantum key distribution with polarized photons over 200 km; citation_author=Y Liu, TY Chen, J Wang, WQ Cai, X Wan, LK Chen; citation_volume=18; citation_publication_date=2010; citation_pages=8587-8594; citation_doi=10.1364/OE.18.008587; citation_id=CR20"/> <meta name="citation_reference" content="citation_journal_title=Optica; citation_title=Long-distance quantum key distribution secure against coherent attacks; citation_author=B Fr&#246;hlich, M Lucamarini, JF Dynes, LC Comandar, WWS Tam, A Plews; citation_volume=4; citation_issue=1; citation_publication_date=2017; citation_pages=163-167; citation_doi=10.1364/OPTICA.4.000163; citation_id=CR21"/> <meta name="citation_reference" content="citation_journal_title=J&#160;Lightwave Technol; citation_title=10-Mb/s quantum key distribution; citation_author=Z Yuan, A Murakami, M Kujiraoka, M Lucamarini, Y Tanizawa, H Sato; citation_volume=36; citation_publication_date=2018; citation_pages=3427-3433; citation_doi=10.1109/jlt.2018.2843136; citation_id=CR22"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Secure quantum key distribution over 421 km of optical fiber; citation_author=A Boaron, G Boso, D Rusca, C Vulliez, C Autebert, M Caloz; citation_volume=121; citation_publication_date=2018; citation_doi=10.1103/PhysRevLett.121.190502; citation_id=CR23"/> <meta name="citation_reference" content="citation_journal_title=Nature; citation_title=Satellite-to-ground quantum key distribution; citation_author=SK Liao, WQ Cai, WY Liu, L Zhang, Y Li, JG Ren; citation_volume=549; citation_issue=7670; citation_publication_date=2017; citation_pages=43-47; citation_doi=10.1038/nature23655; citation_id=CR24"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Satellite-relayed intercontinental quantum network; citation_author=SK Liao, WQ Cai, J Handsteiner, B Liu, J Yin, L Zhang; citation_volume=120; citation_publication_date=2018; citation_doi=10.1103/PhysRevLett.120.030501; citation_id=CR25"/> <meta name="citation_reference" content="citation_journal_title=Nat Commun; citation_title=Chip-based quantum key distribution; citation_author=P Sibson, C Erven, M Godfrey, S Miki, T Yamashita, M Fujiwara; citation_volume=8; citation_publication_date=2017; citation_doi=10.1038/ncomms13984; citation_id=CR26"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev X; citation_title=Metropolitan quantum key distribution with silicon photonics; citation_author=D Bunandar, A Lentine, C Lee, H Cai, CM Long, N Boynton; citation_volume=8; citation_publication_date=2018; citation_doi=10.1103/PhysRevX.8.021009; citation_id=CR27"/> <meta name="citation_reference" content="citation_journal_title=npj Quantum Inf; citation_title=A modulator-free quantum key distribution transmitter chip; citation_author=TK Para&#239;so, I De Marco, T Roger, DG Marangon, JF Dynes, M Lucamarini; citation_volume=5; citation_publication_date=2019; citation_doi=10.1038/s41534-019-0158-7; citation_id=CR28"/> <meta name="citation_reference" content="citation_journal_title=Optica; citation_title=Real-time operation of a multi-rate, multi-protocol quantum key distribution transmitter; citation_author=ID Marco, RI Woodward, GL Roberts, TK Para&#239;so, T Roger, M Sanzaro; citation_volume=8; citation_issue=6; citation_publication_date=2021; citation_pages=911-915; citation_doi=10.1364/OPTICA.423517; citation_id=CR29"/> <meta name="citation_reference" content=" ID Quantique SA. https://www.idquantique.com/ . "/> <meta name="citation_reference" content=" Toshiba Europe Limited. https://www.global.toshiba/ww/products-solutions/security-ict/qkd.html . "/> <meta name="citation_reference" content=" QuantumCTek Co., Ltd. http://www.quantum-info.com/English/ . "/> <meta name="citation_reference" content=" ThinkQuantum S.R.L. https://www.thinkquantum.com . "/> <meta name="citation_reference" content=" Quantum Telecommunications Italy S.R.L. https://www.qticompany.com . "/> <meta name="citation_reference" content="citation_journal_title=Appl Phys Lett; citation_title=Unconditionally secure one-way quantum key distribution using decoy pulses; citation_author=ZL Yuan, AW Sharpe, AJ Shields; citation_volume=90; citation_publication_date=2007; citation_doi=10.1063/1.2430685; citation_id=CR35"/> <meta name="citation_reference" content="citation_journal_title=Opt Express; citation_title=Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate; citation_author=AR Dixon, ZL Yuan, JF Dynes, AW Sharpe, AJ Shields; citation_volume=16; citation_publication_date=2008; citation_doi=10.1364/OE.16.018790; citation_id=CR36"/> <meta name="citation_reference" content="citation_journal_title=Opt Express; citation_title=Efficient decoy-state quantum key distribution with quantified security; citation_author=M Lucamarini, KA Patel, JF Dynes, B Fr&#246;hlich, AW Sharpe, AR Dixon; citation_volume=21; citation_publication_date=2013; citation_pages=21; citation_doi=10.1364/oe.21.024550; citation_id=CR37"/> <meta name="citation_reference" content="citation_journal_title=Quantum Sci Technol; citation_title=A cost-effective measurement-device-independent quantum key distribution system for quantum networks; citation_author=R Valivarthi, Q Zhou, C John, F Marsili, VB Verma, MD Shaw; citation_volume=2; citation_publication_date=2017; citation_doi=10.1088/2058-9565/aa8790; citation_id=CR38"/> <meta name="citation_reference" content="citation_journal_title=Appl Phys Lett; citation_title=Experimental quantum key distribution with active phase randomization; citation_author=Y Zhao, B Qi, HK Lo; citation_volume=90; citation_issue=4; citation_publication_date=2007; citation_doi=10.1063/1.2432296; citation_id=CR39"/> <meta name="citation_reference" content="citation_journal_title=Appl Phys Lett; citation_title=Experimental demonstration of an active phase randomization and monitor module for quantum key distribution; citation_author=SH Sun, LM Liang; citation_volume=101; citation_publication_date=2012; citation_doi=10.1063/1.4746402; citation_id=CR40"/> <meta name="citation_reference" content=" Curr&#225;s-Lorenzo G, Tamaki K, Curty M. Security of decoy-state quantum key distribution with imperfect phase randomization. Preprint. 2022. arXiv:2210.08183 . "/> <meta name="citation_reference" content="citation_journal_title=New J Phys; citation_title=Discrete-phase-randomized coherent state source and its application in quantum key distribution; citation_author=Z Cao, Z Zhang, HK Lo, X Ma; citation_volume=17; citation_issue=5; citation_publication_date=2015; citation_doi=10.1088/1367-2630/17/5/053014; citation_id=CR42"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Appl; citation_title=Quantum key distribution with fully discrete phase randomization; citation_author=G Curr&#225;s-Lorenzo, L Wooltorton, RM Twin-Field; citation_volume=15; citation_publication_date=2021; citation_doi=10.1103/PhysRevApplied.15.014016; citation_id=CR43"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev A; citation_title=Loss-tolerant quantum cryptography with imperfect sources; citation_author=K Tamaki, M Curty, G Kato, HK Lo, K Azuma; citation_volume=90; citation_publication_date=2014; citation_doi=10.1103/PhysRevA.90.052314; citation_id=CR44"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography; citation_author=R Renner, JI Cirac; citation_volume=102; citation_publication_date=2009; citation_doi=10.1103/PhysRevLett.102.110504; citation_id=CR45"/> <meta name="citation_reference" content="citation_journal_title=Nat Phys; citation_title=Symmetry of large physical systems implies independence of subsystems; citation_author=R Renner; citation_volume=3; citation_issue=9; citation_publication_date=2007; citation_pages=645-649; citation_doi=10.1038/nphys684; citation_id=CR46"/> <meta name="citation_reference" content="citation_journal_title=Quantum Inf Comput; citation_title=Getting something out of nothing; citation_author=HK Lo; citation_volume=5; citation_publication_date=2005; citation_pages=413-418; citation_doi=10.26421/QIC5.45-10; citation_id=CR47"/> <meta name="citation_reference" content="citation_journal_title=Quantum Inf Comput; citation_title=Security of quantum key distribution with imperfect devices; citation_author=D Gottesman, HK Lo, N L&#252;tkenhaus, J Preskill; citation_volume=4; citation_publication_date=2004; citation_pages=325-360; citation_doi=10.26421/QIC4.5-1; citation_id=CR48"/> <meta name="citation_reference" content="citation_journal_title=New J Phys; citation_title=Simple security proof of quantum key distribution based on complementarity; citation_author=M Koashi; citation_volume=8; citation_publication_date=2009; citation_doi=10.1088/1367-2630/11/4/045018; citation_id=CR49"/> <meta name="citation_reference" content=" Shlok N. Decoy-state quantum key distribution with arbitrary phase mixtures and phase correlations. "/> <meta name="citation_reference" content="citation_journal_title=PRX Quantum; citation_title=Dimension reduction in quantum key distribution for continuous- and discrete-variable protocols; citation_author=T Upadhyaya, T Himbeeck, J Lin, N L&#252;tkenhaus; citation_volume=2; citation_publication_date=2021; citation_doi=10.1103/PRXQuantum.2.020325; citation_id=CR51"/> <meta name="citation_reference" content="citation_journal_title=Phys Rev Lett; citation_title=Measurement-device-independent quantum key distribution over a 404 km optical fiber; citation_author=HL Yin, TY Chen, ZW Yu, H Liu, LX You, YH Zhou; citation_volume=117; citation_publication_date=2016; citation_doi=10.1103/PhysRevLett.117.190501; citation_id=CR52"/> <meta name="citation_reference" content="citation_journal_title=Quantum Inf Comput; citation_title=Security of quantum key distribution using weak coherent states with nonrandom phases; citation_author=HK Lo, J Preskill; citation_volume=8; citation_publication_date=2007; citation_pages=431-458; citation_doi=10.26421/QIC7.5-6-2; citation_id=CR53"/> <meta name="citation_reference" content="citation_journal_title=Sci Adv; citation_title=Quantum key distribution with correlated sources; citation_author=M Pereira, G Kate, A Mizutani, M Curty, K Tamaki; citation_volume=6; citation_publication_date=2020; citation_doi=10.1126/sciadv.aaz4487; citation_id=CR54"/> <meta name="citation_reference" content="citation_journal_title=IEEE Trans Inf Theory; citation_title=Coding theorem and strong converse for quantum channels; citation_author=A Winter; citation_volume=45; citation_issue=7; citation_publication_date=1999; citation_pages=2481-2485; citation_doi=10.1109/18.796385; citation_id=CR55"/> <meta name="citation_reference" content="citation_journal_title=NY J Math; citation_title=Contractive channels on operator algebras; citation_author=D Farenick, RM Bures; citation_volume=23; citation_publication_date=2017; citation_pages=1369-1393; citation_id=CR56"/> <meta name="citation_author" content="Sixto, Xoel"/> <meta name="citation_author_institution" content="Vigo Quantum Communication Center, University of Vigo, Vigo, Spain"/> <meta name="citation_author_institution" content="Escuela de Ingenier&#237;a de Telecomunicaci&#243;n, Department of Signal Theory and Communications, University of Vigo, Vigo, Spain"/> <meta name="citation_author_institution" content="atlanTTic Research Center, University of Vigo, Vigo, Spain"/> <meta name="citation_author" content="Curr&#225;s-Lorenzo, Guillermo"/> <meta name="citation_author_institution" content="Vigo Quantum Communication Center, University of Vigo, Vigo, Spain"/> <meta name="citation_author_institution" content="Escuela de Ingenier&#237;a de Telecomunicaci&#243;n, Department of Signal Theory and Communications, University of Vigo, Vigo, Spain"/> <meta name="citation_author_institution" content="atlanTTic Research Center, University of Vigo, Vigo, Spain"/> <meta name="citation_author_institution" content="Faculty of Engineering, University of Toyama, Toyama, Japan"/> <meta name="citation_author" content="Tamaki, Kiyoshi"/> <meta name="citation_author_institution" content="Faculty of Engineering, University of Toyama, Toyama, Japan"/> <meta name="citation_author" content="Curty, Marcos"/> <meta name="citation_author_institution" content="Vigo Quantum Communication Center, University of Vigo, Vigo, Spain"/> <meta name="citation_author_institution" content="Escuela de Ingenier&#237;a de Telecomunicaci&#243;n, Department of Signal Theory and Communications, University of Vigo, Vigo, Spain"/> <meta name="citation_author_institution" content="atlanTTic Research Center, University of Vigo, Vigo, Spain"/> <meta name="format-detection" content="telephone=no"> <link rel="apple-touch-icon" sizes="180x180" href=/static/img/favicons/darwin/apple-touch-icon.png> <link rel="icon" type="image/png" sizes="192x192" href=/static/img/favicons/darwin/android-chrome-192x192.png> <link rel="icon" type="image/png" sizes="32x32" href=/static/img/favicons/darwin/favicon-32x32.png> <link rel="icon" type="image/png" sizes="16x16" href=/static/img/favicons/darwin/favicon-16x16.png> <link rel="shortcut icon" data-test="shortcut-icon" href=/static/img/favicons/darwin/favicon.ico> <meta name="theme-color" content="#e6e6e6"> <script>(function(H){H.className=H.className.replace(/\bno-js\b/,'js')})(document.documentElement)</script> <link rel="stylesheet" media="screen" href=/static/app-springeropen/css/core-article-f3872e738d.css> <link rel="stylesheet" media="screen" href=/static/app-springeropen/css/core-b516af10bc.css> <link rel="stylesheet" media="print" href=/static/app-springeropen/css/print-b8af42253b.css> <!-- This template is only used by BMC for now --> <style>@media only print, only all and (prefers-color-scheme: no-preference), only all and (prefers-color-scheme: light), only all and (prefers-color-scheme: dark) { button{line-height:inherit}html,label{font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif}html{-webkit-font-smoothing:subpixel-antialiased;box-sizing:border-box;color:#333;font-size:100%;height:100%;line-height:1.61803;overflow-y:scroll}*{box-sizing:inherit}body{background:#fcfcfc;margin:0;max-width:100%;min-height:100%}button,div,form,input,p{margin:0;padding:0}body{padding:0}a{color:#004b83;text-decoration:underline;text-decoration-skip-ink:auto}a>img{vertical-align:middle}h1{font-size:2.25rem}h2{font-size:1.75rem}h1,h2,h3{font-family:Georgia,Palatino,serif;font-style:normal;font-weight:400;line-height:1.4}h3{font-size:1.5rem}h1,h2,h3{margin:0}h2+*{margin-block-start:1rem}h1+*{margin-block-start:3rem}[style*="display: none"]:first-child+*{margin-block-start:0}.c-navbar{background:#e6e6e6;border-bottom:1px solid #d9d9d9;border-top:1px solid #d9d9d9;font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;line-height:1.61803;padding:16px 0}.c-navbar--with-submit-button{padding-bottom:24px}@media only screen and (min-width:540px){.c-navbar--with-submit-button{padding-bottom:16px}}.c-navbar__container{display:flex;flex-wrap:wrap;justify-content:space-between;margin:0 auto;max-width:1280px;padding:0 16px}.c-navbar__content{display:flex;flex:0 1 auto}.c-navbar__nav{align-items:center;display:flex;flex-wrap:wrap;gap:16px 16px;list-style:none;margin:0;padding:0}.c-navbar__item{flex:0 0 auto}.c-navbar__link{background:0 0;border:0;color:currentcolor;display:block;text-decoration:none;text-transform:capitalize}.c-navbar__link--is-shown{text-decoration:underline}.c-ad{text-align:center}@media only screen and (min-width:320px){.c-ad{padding:8px}}.c-ad--728x90{background-color:#ccc;display:none}.c-ad--728x90 .c-ad__inner{min-height:calc(1.5em + 94px)}.c-ad--728x90 iframe{height:90px;max-width:970px}@media only screen and (min-width:768px){.js .c-ad--728x90{display:none}.js .u-show-following-ad+.c-ad--728x90{display:block}}.c-ad iframe{border:0;overflow:auto;vertical-align:top}.c-ad__label{color:#333;font-weight:400;line-height:1.5;margin-bottom:4px}.c-ad__label,.c-skip-link{font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;font-size:.875rem}.c-skip-link{background:#f7fbfe;bottom:auto;color:#004b83;padding:8px;position:absolute;text-align:center;transform:translateY(-100%);z-index:9999}@media (prefers-reduced-motion:reduce){.c-skip-link{transition:top .3s ease-in-out 0s}}@media print{.c-skip-link{display:none}}.c-skip-link:link{color:#004b83}.c-dropdown__button:after{border-color:transparent transparent transparent #fff;border-style:solid;border-width:4px 0 4px 14px;content:"";display:block;height:0;margin-left:3px;width:0}.c-dropdown{display:inline-block;position:relative}.c-dropdown__button{background-color:transparent;border:0;display:inline-block;padding:0;white-space:nowrap}.c-dropdown__button:after{border-color:currentcolor transparent transparent;border-width:5px 4px 0 5px;display:inline-block;margin-left:8px;vertical-align:middle}.c-dropdown__menu{background-color:#fff;border:1px solid #d9d9d9;border-radius:3px;box-shadow:0 2px 6px rgba(0,0,0,.1);font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;font-size:1.125rem;line-height:1.4;list-style:none;margin:0;padding:8px 0;position:absolute;top:100%;transform:translateY(8px);width:180px;z-index:100}.c-dropdown__menu:after,.c-dropdown__menu:before{border-style:solid;bottom:100%;content:"";display:block;height:0;left:16px;position:absolute;width:0}.c-dropdown__menu:before{border-color:transparent transparent #d9d9d9;border-width:0 9px 9px;transform:translateX(-1px)}.c-dropdown__menu:after{border-color:transparent transparent #fff;border-width:0 8px 8px}.c-dropdown__menu--right{left:auto;right:0}.c-dropdown__menu--right:after,.c-dropdown__menu--right:before{left:auto;right:16px}.c-dropdown__menu--right:before{transform:translateX(1px)}.c-dropdown__link{background-color:transparent;color:#004b83;display:block;padding:4px 16px}.c-header{background-color:#fff;border-bottom:4px solid #00285a;font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;font-size:1.125rem;padding:16px 0}.c-header__container,.c-header__menu{align-items:center;display:flex;flex-wrap:wrap}@supports (gap:2em){.c-header__container,.c-header__menu{gap:2em 2em}}.c-header__menu{list-style:none;margin:0;padding:0}.c-header__item{color:inherit}@supports not (gap:2em){.c-header__item{margin-left:24px}}.c-header__container{justify-content:space-between;margin:0 auto;max-width:1280px;padding:0 16px}@supports not (gap:2em){.c-header__brand{margin-right:32px}}.c-header__brand a{display:block;text-decoration:none}.c-header__link{color:inherit}.c-form-field{margin-bottom:1em}.c-form-field__label{color:#666;display:block;font-size:.875rem;margin-bottom:.4em}.c-form-field__input{border:1px solid #b3b3b3;border-radius:3px;box-shadow:inset 0 1px 3px 0 rgba(0,0,0,.21);font-size:.875rem;line-height:1.28571;padding:.75em 1em;vertical-align:middle;width:100%}.c-journal-header__title>a{color:inherit}.c-popup-search{background-color:#f2f2f2;box-shadow:0 3px 3px -3px rgba(0,0,0,.21);padding:16px 0;position:relative;z-index:10}@media only screen and (min-width:1024px){.js .c-popup-search{position:absolute;top:100%;width:100%}.c-popup-search__container{margin:auto;max-width:70%}}.ctx-search .c-form-field{margin-bottom:0}.ctx-search .c-form-field__input{border-bottom-right-radius:0;border-top-right-radius:0;margin-right:0}.c-journal-header{background-color:#f2f2f2;padding-top:16px}.c-journal-header__title{font-size:1.3125rem;margin:0 0 16px}.c-journal-header__grid{column-gap:1.25rem;display:grid;grid-template-areas:"main" "side";grid-template-columns:1fr;width:100%}@media only screen and (min-width:768px){.c-journal-header__grid{column-gap:1.25rem;grid-template-areas:"main side";grid-template-columns:1fr 160px}}@media only screen and (min-width:1024px){.c-journal-header__grid{column-gap:3.125rem;grid-template-areas:"main side";grid-template-columns:1fr 190px}}@media only screen and (min-width:768px){.c-journal-header__grid-main{margin:0!important;width:auto!important}}.c-journal-header__grid-main{grid-area:main/main/main/main}.c-navbar{font-size:.875rem}.u-button{align-items:center;background-color:#f2f2f2;background-image:linear-gradient(#fff,#f2f2f2);border:1px solid #ccc;border-radius:2px;cursor:pointer;display:inline-flex;font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;font-size:1rem;justify-content:center;line-height:1.3;margin:0;padding:8px;position:relative;text-decoration:none;transition:all .25s ease 0s,color .25s ease 0s,border-color .25s ease 0s;width:auto}.u-button svg,.u-button--primary svg,.u-button--tertiary svg{fill:currentcolor}.u-button{color:#004b83}.u-button--primary,.u-button--tertiary{background-color:#33629d;background-image:linear-gradient(#4d76a9,#33629d);border:1px solid rgba(0,59,132,.5);color:#fff}.u-button--tertiary{font-weight:400}.u-button--full-width{display:flex;width:100%}.u-clearfix:after,.u-clearfix:before{content:"";display:table}.u-clearfix:after{clear:both}.u-color-open-access{color:#b74616}.u-container{margin:0 auto;max-width:1280px;padding:0 16px}.u-display-flex{display:flex;width:100%}.u-align-items-center{align-items:center}.u-justify-content-space-between{justify-content:space-between}.u-flex-static{flex:0 0 auto}.u-display-none{display:none}.js .u-js-hide{display:none;visibility:hidden}@media print{.u-hide-print{display:none}}.u-icon{fill:currentcolor;display:inline-block;height:1em;transform:translate(0);vertical-align:text-top;width:1em}.u-list-reset{list-style:none;margin:0;padding:0}.u-position-relative{position:relative}.u-mt-32{margin-top:32px}.u-mr-24{margin-right:24px}.u-mr-48{margin-right:48px}.u-mb-32{margin-bottom:32px}.u-ml-8{margin-left:8px}.u-button-reset{background-color:transparent;border:0;padding:0}.u-text-sm{font-size:1rem}.u-h3,.u-h4{font-style:normal;line-height:1.4}.u-h3{font-family:Georgia,Palatino,serif;font-size:1.5rem;font-weight:400}.u-h4{font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;font-size:1.25rem;font-weight:700}.u-vh-full{min-height:100vh}.u-hide{display:none;visibility:hidden}.u-hide:first-child+*{margin-block-start:0}@media only screen and (min-width:1024px){.u-hide-at-lg{display:none;visibility:hidden}}@media only screen and (max-width:1023px){.u-hide-at-lt-lg{display:none;visibility:hidden}.u-hide-at-lt-lg:first-child+*{margin-block-start:0}}.u-visually-hidden{clip:rect(0,0,0,0);border:0;height:1px;margin:-100%;overflow:hidden;padding:0;position:absolute!important;width:1px}.u-button--tertiary{font-size:.875rem;padding:8px 16px}@media only screen and (max-width:539px){.u-button--alt-colour-on-mobile{background-color:#f2f2f2;background-image:linear-gradient(#fff,#f2f2f2);border:1px solid #ccc;color:#004b83}}body{font-size:1.125rem}.c-header__navigation{display:flex;gap:.5rem .5rem} }</style> <style>@media only print, only all and (prefers-color-scheme: no-preference), only all and (prefers-color-scheme: light), only all and (prefers-color-scheme: dark) { button{line-height:inherit}html,label{font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif}html{-webkit-font-smoothing:subpixel-antialiased;box-sizing:border-box;color:#333;font-size:100%;height:100%;line-height:1.61803;overflow-y:scroll}*{box-sizing:inherit}body{background:#fcfcfc;margin:0;max-width:100%;min-height:100%}button,div,form,input,p{margin:0;padding:0}body{padding:0}a{color:#004b83;overflow-wrap:break-word;text-decoration:underline;text-decoration-skip-ink:auto;word-break:break-word}a>img{vertical-align:middle}h1{font-size:2.25rem}h2{font-size:1.75rem}h1,h2,h3{font-family:Georgia,Palatino,serif;font-style:normal;font-weight:400;line-height:1.4}h3{font-size:1.5rem}h1,h2,h3{margin:0}h2+*{margin-block-start:1rem}h1+*{margin-block-start:3rem}[style*="display: none"]:first-child+*{margin-block-start:0}p{overflow-wrap:break-word;word-break:break-word}.c-article-associated-content__container .c-article-associated-content__collection-label,.u-h3{font-weight:700}.u-h3{font-size:1.5rem}.c-reading-companion__figure-title,.u-h4{font-size:1.25rem;font-weight:700}body{font-size:1.125rem}.c-article-header{font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;margin-bottom:40px}.c-article-identifiers{color:#6f6f6f;display:flex;flex-wrap:wrap;font-size:1rem;line-height:1.3;list-style:none;margin:0 0 8px;padding:0}.c-article-identifiers__item{border-right:1px solid #6f6f6f;list-style:none;margin-right:8px;padding-right:8px}.c-article-identifiers__item:last-child{border-right:0;margin-right:0;padding-right:0}.c-article-title{font-size:1.5rem;line-height:1.25;margin-bottom:16px}@media only screen and (min-width:768px){.c-article-title{font-size:1.875rem;line-height:1.2}}.c-article-author-list{display:inline;font-size:1rem;list-style:none;margin:0 8px 0 0;padding:0;width:100%}.c-article-author-list__item{display:inline;padding-right:0}.c-article-author-list svg{margin-left:4px}.c-article-author-list__show-more{display:none;margin-right:4px}.c-article-author-list__button,.js .c-article-author-list__item--hide,.js .c-article-author-list__show-more{display:none}.js .c-article-author-list--long .c-article-author-list__show-more,.js .c-article-author-list--long+.c-article-author-list__button{display:inline}@media only screen and (max-width:539px){.js .c-article-author-list__item--hide-small-screen{display:none}.js .c-article-author-list--short .c-article-author-list__show-more,.js .c-article-author-list--short+.c-article-author-list__button{display:inline}}#uptodate-client,.js .c-article-author-list--expanded .c-article-author-list__show-more{display:none!important}.js .c-article-author-list--expanded .c-article-author-list__item--hide-small-screen{display:inline!important}.c-article-author-list__button,.c-button-author-list{background:#ebf1f5;border:4px solid #ebf1f5;border-radius:20px;color:#666;font-size:.875rem;line-height:1.4;padding:2px 11px 2px 8px;text-decoration:none}.c-article-author-list__button svg,.c-button-author-list svg{margin:1px 4px 0 0}.c-article-author-list__button:hover,.c-button-author-list:hover{background:#173962;border-color:transparent;color:#fff}.c-article-info-details{font-size:1rem;margin-bottom:8px;margin-top:16px}.c-article-info-details__cite-as{border-left:1px solid #6f6f6f;margin-left:8px;padding-left:8px}.c-article-metrics-bar{display:flex;flex-wrap:wrap;font-size:1rem;line-height:1.3}.c-article-metrics-bar__wrapper{margin:0 0 16px}.c-article-metrics-bar__item{align-items:baseline;border-right:1px solid #6f6f6f;margin-right:8px}.c-article-metrics-bar__item:last-child{border-right:0}.c-article-metrics-bar__count{font-weight:700;margin:0}.c-article-metrics-bar__label{color:#626262;font-style:normal;font-weight:400;margin:0 10px 0 5px}.c-article-metrics-bar__details{margin:0}.c-article-main-column{font-family:Georgia,Palatino,serif;margin-right:8.6%;width:60.2%}@media only screen and (max-width:1023px){.c-article-main-column{margin-right:0;width:100%}}.c-article-extras{float:left;font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;width:31.2%}@media only screen and (max-width:1023px){.c-article-extras{display:none}}.c-article-associated-content__container .c-article-associated-content__title,.c-article-section__title{border-bottom:2px solid #d5d5d5;font-size:1.25rem;margin:0;padding-bottom:8px}@media only screen and (min-width:768px){.c-article-associated-content__container .c-article-associated-content__title,.c-article-section__title{font-size:1.5rem;line-height:1.24}}.c-article-associated-content__container .c-article-associated-content__title{margin-bottom:8px}.c-article-section{clear:both}.c-article-section__content{margin-bottom:40px;margin-top:0;padding-top:8px}@media only screen and (max-width:1023px){.c-article-section__content{padding-left:0}}.c-article__sub-heading{color:#222;font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;font-size:1.125rem;font-style:normal;font-weight:400;line-height:1.3;margin:24px 0 8px}@media only screen and (min-width:768px){.c-article__sub-heading{font-size:1.5rem;line-height:1.24}}.c-article__sub-heading:first-child{margin-top:0}.c-article-authors-search{margin-bottom:24px;margin-top:0}.c-article-authors-search__item,.c-article-authors-search__title{font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif}.c-article-authors-search__title{color:#626262;font-size:1.05rem;font-weight:700;margin:0;padding:0}.c-article-authors-search__item{font-size:1rem}.c-article-authors-search__text{margin:0}.c-article-share-box__no-sharelink-info{font-size:.813rem;font-weight:700;margin-bottom:24px;padding-top:4px}.c-article-share-box__only-read-input{border:1px solid #d5d5d5;box-sizing:content-box;display:inline-block;font-size:.875rem;font-weight:700;height:24px;margin-bottom:8px;padding:8px 10px}.c-article-share-box__button--link-like{background-color:transparent;border:0;color:#069;cursor:pointer;font-size:.875rem;margin-bottom:8px;margin-left:10px}.c-article-associated-content__container .c-article-associated-content__collection-label{font-size:.875rem;line-height:1.4}.c-article-associated-content__container .c-article-associated-content__collection-title{line-height:1.3}.c-context-bar{box-shadow:0 0 10px 0 rgba(51,51,51,.2);position:relative;width:100%}.c-context-bar__title{display:none}.c-reading-companion{clear:both;min-height:389px}.c-reading-companion__sticky{max-width:389px}.c-reading-companion__scroll-pane{margin:0;min-height:200px;overflow:hidden auto}.c-reading-companion__tabs{display:flex;flex-flow:row nowrap;font-size:1rem;list-style:none;margin:0 0 8px;padding:0}.c-reading-companion__tabs>li{flex-grow:1}.c-reading-companion__tab{background-color:#eee;border:1px solid #d5d5d5;border-image:initial;border-left-width:0;color:#069;font-size:1rem;padding:8px 8px 8px 15px;text-align:left;width:100%}.c-reading-companion__tabs li:first-child .c-reading-companion__tab{border-left-width:1px}.c-reading-companion__tab--active{background-color:#fcfcfc;border-bottom:1px solid #fcfcfc;color:#222;font-weight:700}.c-reading-companion__sections-list{list-style:none;padding:0}.c-reading-companion__figures-list,.c-reading-companion__references-list{list-style:none;min-height:389px;padding:0}.c-reading-companion__references-list--numeric{list-style:decimal inside}.c-reading-companion__sections-list{margin:0 0 8px;min-height:50px}.c-reading-companion__section-item{font-size:1rem;padding:0}.c-reading-companion__section-item a{display:block;line-height:1.5;overflow:hidden;padding:8px 0 8px 16px;text-overflow:ellipsis;white-space:nowrap}.c-reading-companion__figure-item{border-top:1px solid #d5d5d5;font-size:1rem;padding:16px 8px 16px 0}.c-reading-companion__figure-item:first-child{border-top:none;padding-top:8px}.c-reading-companion__reference-item{border-top:1px solid #d5d5d5;font-size:1rem;padding:8px 8px 8px 16px}.c-reading-companion__reference-item:first-child{border-top:none}.c-reading-companion__reference-item a{word-break:break-word}.c-reading-companion__reference-citation{display:inline}.c-reading-companion__reference-links{font-size:.813rem;font-weight:700;list-style:none;margin:8px 0 0;padding:0;text-align:right}.c-reading-companion__reference-links>a{display:inline-block;padding-left:8px}.c-reading-companion__reference-links>a:first-child{display:inline-block;padding-left:0}.c-reading-companion__figure-title{display:block;margin:0 0 8px}.c-reading-companion__figure-links{display:flex;justify-content:space-between;margin:8px 0 0}.c-reading-companion__figure-links>a{align-items:center;display:flex}.c-reading-companion__figure-full-link svg{height:.8em;margin-left:2px}.c-reading-companion__panel{border-top:none;display:none;margin-top:0;padding-top:0}.c-reading-companion__panel--active{display:block}.c-pdf-download__link .u-icon{padding-top:2px}.c-pdf-download{display:flex;margin-bottom:16px;max-height:48px}@media only screen and (min-width:540px){.c-pdf-download{max-height:none}}@media only screen and (min-width:1024px){.c-pdf-download{max-height:48px}}.c-pdf-download__link{display:flex;flex:1 1 0%;padding:13px 24px!important}.c-pdf-download__text{padding-right:4px}@media only screen and (max-width:539px){.c-pdf-download__text{text-transform:capitalize}}@media only screen and (min-width:540px){.c-pdf-download__text{padding-right:8px}}.c-pdf-container{display:flex;justify-content:flex-end}@media only screen and (max-width:539px){.c-pdf-container .c-pdf-download{display:flex;flex-basis:100%}}.u-display-none{display:none}.js .u-js-hide,.u-hide{display:none;visibility:hidden}.u-hide:first-child+*{margin-block-start:0}.u-visually-hidden{clip:rect(0,0,0,0);border:0;height:1px;margin:-100%;overflow:hidden;padding:0;position:absolute!important;width:1px}@media print{.u-hide-print{display:none}}@media only screen and (min-width:1024px){.u-hide-at-lg{display:none;visibility:hidden}}.u-icon{fill:currentcolor;display:inline-block;height:1em;transform:translate(0);vertical-align:text-top;width:1em}.u-list-reset{list-style:none;margin:0;padding:0}.hide{display:none;visibility:hidden}.c-journal-header__title>a{color:inherit}.c-article-associated-content__container .c-article-associated-content__collection.collection~.c-article-associated-content__collection.collection .c-article-associated-content__collection-label,.c-article-associated-content__container .c-article-associated-content__collection.section~.c-article-associated-content__collection.section .c-article-associated-content__collection-label,.c-article-associated-content__container .c-article-associated-content__title{display:none}.c-article-associated-content__container a{text-decoration:underline}.c-article-associated-content__container .c-article-associated-content__collection.collection .c-article-associated-content__collection-label,.c-article-associated-content__container .c-article-associated-content__collection.section .c-article-associated-content__collection-label{display:block}.c-article-associated-content__container .c-article-associated-content__collection.collection,.c-article-associated-content__container .c-article-associated-content__collection.section{margin-bottom:5px}.c-article-associated-content__container .c-article-associated-content__collection.section~.c-article-associated-content__collection.collection{margin-top:28px}.c-article-associated-content__container .c-article-associated-content__collection:first-child{margin-top:0}.c-article-associated-content__container .c-article-associated-content__collection-label{color:#1b3051;margin-bottom:8px}.c-article-associated-content__container .c-article-associated-content__collection-title{font-size:1.0625rem;font-weight:400} }</style> <link rel="stylesheet" data-test="critical-css-handler" data-inline-css-source="critical-css" href="/static/app-springeropen/css/enhanced-b9a79d5aab.css" media="print" onload="this.media='only print, only all and (prefers-color-scheme: no-preference), only all and (prefers-color-scheme: light), only all and (prefers-color-scheme: dark)';this.onload=null"> <link rel="stylesheet" data-test="critical-css-handler" data-inline-css-source="critical-css" href="/static/app-springeropen/css/enhanced-article-6a72e2d688.css" media="print" onload="this.media='only print, only all and (prefers-color-scheme: no-preference), only all and (prefers-color-scheme: light), only all and (prefers-color-scheme: dark)';this.onload=null"> <script type="text/javascript"> config = { env: 'live', site: 'epjquantumtechnology.springeropen.com', siteWithPath: 'epjquantumtechnology.springeropen.com' + window.location.pathname, twitterHashtag: '', cmsPrefix: 'https://studio-cms.springernature.com/studio/', doi: '10.1140/epjqt/s40507-023-00210-0', figshareScriptUrl: 'https://widgets.figshare.com/static/figshare.js', hasFigshareInvoked: false, publisherBrand: 'SpringerOpen', mustardcut: false }; </script> <script type="text/javascript" data-test="dataLayer"> window.dataLayer = [{"content":{"article":{"doi":"10.1140/epjqt/s40507-023-00210-0","articleType":"Research","peerReviewType":"Closed","supplement":null,"keywords":"Quantum key distribution;Decoy state;Phase randomization;Source imperfections"},"contentInfo":{"imprint":"SpringerOpen","title":"Secret key rate bounds for quantum key distribution with faulty active phase randomization","publishedAt":1702598400000,"publishedAtDate":"2023-12-15","author":["Xoel Sixto","Guillermo Currás-Lorenzo","Kiyoshi Tamaki","Marcos Curty"],"collection":[{"collectionID":"AC_4c6c9fedd8eaa601969e9e19fd2cf4e6","collectionName":"Secure Quantum Communication"}]},"attributes":{"deliveryPlatform":"oscar","template":"classic","cms":null,"copyright":{"creativeCommonsType":"CC BY","openAccess":true},"environment":"live"},"journal":{"siteKey":"epjquantumtechnology.springeropen.com","volume":"10","issue":"1","title":"EPJ Quantum Technology","type":null,"journalID":40507,"section":[]},"category":{"pmc":{"primarySubject":"Physics"},"contentType":"Research","publishingSegment":"PHYS9","snt":["Quantum Physics","Spintronics","Microsystems and MEMS"]}},"session":{"authentication":{"authenticationID":[]}},"version":"1.0.0","page":{"category":{"pageType":"article"},"attributes":{"featureFlags":[],"environment":"live","darwin":false}},"japan":false,"event":"dataLayerCreated","collection":null,"publisherBrand":"SpringerOpen"}]; </script> <script> window.dataLayer = window.dataLayer || []; window.dataLayer.push({ ga4MeasurementId: 'G-PJCTJWPV25', ga360TrackingId: 'UA-54492316-9', twitterId: 'o47a2', baiduId: '29dee5557e2c7961c284a143a770fac0', ga4ServerUrl: 'https://collect.biomedcentral.com', imprint: 'springeropen' }); </script> <script> (function(w, d) { w.config = w.config || {}; w.config.mustardcut = false; if (w.matchMedia && w.matchMedia('only print, only all and (prefers-color-scheme: no-preference), only all and (prefers-color-scheme: light), only all and (prefers-color-scheme: dark)').matches) { w.config.mustardcut = true; d.classList.add('js'); d.classList.remove('grade-c'); d.classList.remove('no-js'); } })(window, document.documentElement); </script> <script> (function () { if ( typeof window.CustomEvent === "function" ) return false; function CustomEvent ( event, params ) { params = params || { bubbles: false, cancelable: false, detail: null }; var evt = document.createEvent( 'CustomEvent' ); evt.initCustomEvent( event, params.bubbles, params.cancelable, params.detail ); return evt; } CustomEvent.prototype = window.Event.prototype; window.CustomEvent = CustomEvent; })(); </script> <script class="js-entry"> if (window.config.mustardcut) { (function(w, d) { window.Component = {}; window.suppressShareButton = true; window.onArticlePage = true; var currentScript = d.currentScript || d.head.querySelector('script.js-entry'); function catchNoModuleSupport() { var scriptEl = d.createElement('script'); return (!('noModule' in scriptEl) && 'onbeforeload' in scriptEl) } var headScripts = [ {'src': '/static/js/polyfill-es5-bundle-572d4fec60.js', 'async': false} ]; var bodyScripts = [ {'src': '/static/js/app-es5-bundle-d0ac94c97e.js', 'async': false, 'module': false}, {'src': '/static/js/app-es6-bundle-5ee1a6879c.js', 'async': false, 'module': true} , {'src': '/static/js/global-article-es5-bundle-ae3b685a1c.js', 'async': false, 'module': false}, {'src': '/static/js/global-article-es6-bundle-f72e3cd2ca.js', 'async': false, 'module': true} ]; function createScript(script) { var scriptEl = d.createElement('script'); scriptEl.src = script.src; scriptEl.async = script.async; if (script.module === true) { scriptEl.type = "module"; if (catchNoModuleSupport()) { scriptEl.src = ''; } } else if (script.module === false) { scriptEl.setAttribute('nomodule', true) } if (script.charset) { scriptEl.setAttribute('charset', script.charset); } return scriptEl; } for (var i = 0; i < headScripts.length; ++i) { var scriptEl = createScript(headScripts[i]); currentScript.parentNode.insertBefore(scriptEl, currentScript.nextSibling); } d.addEventListener('DOMContentLoaded', function() { for (var i = 0; i < bodyScripts.length; ++i) { var scriptEl = createScript(bodyScripts[i]); d.body.appendChild(scriptEl); } }); // Webfont repeat view var config = w.config; if (config && config.publisherBrand && sessionStorage.fontsLoaded === 'true') { d.documentElement.className += ' webfonts-loaded'; } })(window, document); } </script> <script data-src="https://cdn.optimizely.com/js/27195530232.js" data-cc-script="C03"></script> <script data-test="gtm-head"> window.initGTM = function() { if (window.config.mustardcut) { (function (w, d, s, l, i) { w[l] = w[l] || []; w[l].push({'gtm.start': new Date().getTime(), event: 'gtm.js'}); var f = d.getElementsByTagName(s)[0], j = d.createElement(s), dl = l != 'dataLayer' ? '&l=' + l : ''; j.async = true; j.src = 'https://www.googletagmanager.com/gtm.js?id=' + i + dl; f.parentNode.insertBefore(j, f); })(window, document, 'script', 'dataLayer', 'GTM-MRVXSHQ'); } } </script> <meta name="360-site-verification" content="6ebcece7bd3d627674314d9ecc077510" /> <script> (function (w, d, t) { function cc() { var h = w.location.hostname; var e = d.createElement(t), s = d.getElementsByTagName(t)[0]; if (h.indexOf('springer.com') > -1 && h.indexOf('biomedcentral.com') === -1 && h.indexOf('springeropen.com') === -1) { if (h.indexOf('link-qa.springer.com') > -1 || h.indexOf('test-www.springer.com') > -1) { e.src = 'https://cmp.springer.com/production_live/en/consent-bundle-17-52.js'; e.setAttribute('onload', "initGTM(window,document,'script','dataLayer','GTM-MRVXSHQ')"); } else { e.src = 'https://cmp.springer.com/production_live/en/consent-bundle-17-52.js'; e.setAttribute('onload', "initGTM(window,document,'script','dataLayer','GTM-MRVXSHQ')"); } } else if (h.indexOf('biomedcentral.com') > -1) { if (h.indexOf('biomedcentral.com.qa') > -1) { e.src = 'https://cmp.biomedcentral.com/production_live/en/consent-bundle-15-36.js'; e.setAttribute('onload', "initGTM(window,document,'script','dataLayer','GTM-MRVXSHQ')"); } else { e.src = 'https://cmp.biomedcentral.com/production_live/en/consent-bundle-15-36.js'; e.setAttribute('onload', "initGTM(window,document,'script','dataLayer','GTM-MRVXSHQ')"); } } else if (h.indexOf('springeropen.com') > -1) { if (h.indexOf('springeropen.com.qa') > -1) { e.src = 'https://cmp.springernature.com/production_live/en/consent-bundle-16-34.js'; e.setAttribute('onload', "initGTM(window,document,'script','dataLayer','GTM-MRVXSHQ')"); } else { e.src = 'https://cmp.springernature.com/production_live/en/consent-bundle-16-34.js'; e.setAttribute('onload', "initGTM(window,document,'script','dataLayer','GTM-MRVXSHQ')"); } } else if (h.indexOf('springernature.com') > -1) { if (h.indexOf('beta-qa.springernature.com') > -1) { e.src = 'https://cmp.springernature.com/production_live/en/consent-bundle-49-43.js'; e.setAttribute('onload', "initGTM(window,document,'script','dataLayer','GTM-NK22KLS')"); } else { e.src = 'https://cmp.springernature.com/production_live/en/consent-bundle-49-43.js'; e.setAttribute('onload', "initGTM(window,document,'script','dataLayer','GTM-NK22KLS')"); } } else { e.src = '/static/js/cookie-consent-es5-bundle-cb57c2c98a.js'; e.setAttribute('data-consent', h); } s.insertAdjacentElement('afterend', e); } cc(); })(window, document, 'script'); </script> <link rel="canonical" href="https://epjquantumtechnology.springeropen.com/articles/10.1140/epjqt/s40507-023-00210-0"/> <meta property="og:url" content="https://epjquantumtechnology.springeropen.com/articles/10.1140/epjqt/s40507-023-00210-0"/> <meta property="og:type" content="article"/> <meta property="og:site_name" content="SpringerOpen"/> <meta property="og:title" content="Secret key rate bounds for quantum key distribution with faulty active phase randomization - EPJ Quantum Technology"/> <meta property="og:description" content="Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources, and provides the same secret key rate scaling as ideal single-photon sources. It requires, however, that the phase of each emitted pulse is uniformly random. This might be difficult to guarantee in practice, due to inevitable device imperfections and/or the use of an external phase modulator for phase randomization in an active setup, which limits the possible selected phases to a finite set. Here, we investigate the security of decoy-state QKD when the phase is actively randomized by faulty devices, and show that this technique is quite robust to deviations from the ideal uniformly random scenario. For this, we combine a novel parameter estimation technique based on semi-definite programming, with the use of basis mismatched events, to tightly estimate the parameters that determine the achievable secret key rate. In doing so, we demonstrate that our analysis can significantly outperform previous results that address more restricted scenarios."/> <meta property="og:image" content="https://static-content.springer.com/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig1_HTML.jpg"/> <script type="application/ld+json">{"mainEntity":{"headline":"Secret key rate bounds for quantum key distribution with faulty active phase randomization","description":"Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources, and provides the same secret key rate scaling as ideal single-photon sources. It requires, however, that the phase of each emitted pulse is uniformly random. This might be difficult to guarantee in practice, due to inevitable device imperfections and/or the use of an external phase modulator for phase randomization in an active setup, which limits the possible selected phases to a finite set. Here, we investigate the security of decoy-state QKD when the phase is actively randomized by faulty devices, and show that this technique is quite robust to deviations from the ideal uniformly random scenario. For this, we combine a novel parameter estimation technique based on semi-definite programming, with the use of basis mismatched events, to tightly estimate the parameters that determine the achievable secret key rate. In doing so, we demonstrate that our analysis can significantly outperform previous results that address more restricted scenarios.","datePublished":"2023-12-15T00:00:00Z","dateModified":"2023-12-15T00:00:00Z","pageStart":"1","pageEnd":"26","license":"http://creativecommons.org/licenses/by/4.0/","sameAs":"https://doi.org/10.1140/epjqt/s40507-023-00210-0","keywords":["Quantum key distribution","Decoy state","Phase randomization","Source imperfections","Quantum Physics","Quantum Information Technology","Spintronics","Nanotechnology and Microengineering"],"image":["https://media.springernature.com/lw1200/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig1_HTML.jpg","https://media.springernature.com/lw1200/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig2_HTML.jpg","https://media.springernature.com/lw1200/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig3_HTML.jpg","https://media.springernature.com/lw1200/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig4_HTML.jpg"],"isPartOf":{"name":"EPJ Quantum Technology","issn":["2196-0763","2662-4400"],"volumeNumber":"10","@type":["Periodical","PublicationVolume"]},"publisher":{"name":"Springer Berlin Heidelberg","logo":{"url":"https://www.springernature.com/app-sn/public/images/logo-springernature.png","@type":"ImageObject"},"@type":"Organization"},"author":[{"name":"Xoel Sixto","affiliation":[{"name":"University of Vigo","address":{"name":"Vigo Quantum Communication Center, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"},{"name":"University of Vigo","address":{"name":"Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"},{"name":"University of Vigo","address":{"name":"atlanTTic Research Center, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"}],"email":"xsixto@vqcc.uvigo.es","@type":"Person"},{"name":"Guillermo Currás-Lorenzo","affiliation":[{"name":"University of Vigo","address":{"name":"Vigo Quantum Communication Center, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"},{"name":"University of Vigo","address":{"name":"Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"},{"name":"University of Vigo","address":{"name":"atlanTTic Research Center, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"},{"name":"University of Toyama","address":{"name":"Faculty of Engineering, University of Toyama, Toyama, Japan","@type":"PostalAddress"},"@type":"Organization"}],"@type":"Person"},{"name":"Kiyoshi Tamaki","affiliation":[{"name":"University of Toyama","address":{"name":"Faculty of Engineering, University of Toyama, Toyama, Japan","@type":"PostalAddress"},"@type":"Organization"}],"@type":"Person"},{"name":"Marcos Curty","affiliation":[{"name":"University of Vigo","address":{"name":"Vigo Quantum Communication Center, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"},{"name":"University of Vigo","address":{"name":"Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"},{"name":"University of Vigo","address":{"name":"atlanTTic Research Center, University of Vigo, Vigo, Spain","@type":"PostalAddress"},"@type":"Organization"}],"@type":"Person"}],"isAccessibleForFree":true,"@type":"ScholarlyArticle"},"@context":"https://schema.org","@type":"WebPage"}</script> </head> <body class="journal journal-fulltext" > <div class="ctm"></div> <!-- Google Tag Manager (noscript) --> <noscript> <iframe src="https://www.googletagmanager.com/ns.html?id=GTM-MRVXSHQ" height="0" width="0" style="display:none;visibility:hidden"></iframe> </noscript> <!-- End Google Tag Manager (noscript) --> <div class="u-visually-hidden" aria-hidden="true"> <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><defs><path id="a" d="M0 .74h56.72v55.24H0z"/></defs><symbol id="icon-access" viewBox="0 0 18 18"><path d="m14 8c.5522847 0 1 .44771525 1 1v7h2.5c.2761424 0 .5.2238576.5.5v1.5h-18v-1.5c0-.2761424.22385763-.5.5-.5h2.5v-7c0-.55228475.44771525-1 1-1s1 .44771525 1 1v6.9996556h8v-6.9996556c0-.55228475.4477153-1 1-1zm-8 0 2 1v5l-2 1zm6 0v7l-2-1v-5zm-2.42653766-7.59857636 7.03554716 4.92488299c.4162533.29137735.5174853.86502537.226108 1.28127873-.1721584.24594054-.4534847.39241464-.7536934.39241464h-14.16284822c-.50810197 0-.92-.41189803-.92-.92 0-.30020869.1464741-.58153499.39241464-.75369337l7.03554714-4.92488299c.34432015-.2410241.80260453-.2410241 1.14692468 0zm-.57346234 2.03988748-3.65526982 2.55868888h7.31053962z" fill-rule="evenodd"/></symbol><symbol id="icon-account" viewBox="0 0 18 18"><path d="m10.2379028 16.9048051c1.3083556-.2032362 2.5118471-.7235183 3.5294683-1.4798399-.8731327-2.5141501-2.0638925-3.935978-3.7673711-4.3188248v-1.27684611c1.1651924-.41183641 2-1.52307546 2-2.82929429 0-1.65685425-1.3431458-3-3-3-1.65685425 0-3 1.34314575-3 3 0 1.30621883.83480763 2.41745788 2 2.82929429v1.27684611c-1.70347856.3828468-2.89423845 1.8046747-3.76737114 4.3188248 1.01762123.7563216 2.22111275 1.2766037 3.52946833 1.4798399.40563808.0629726.81921174.0951949 1.23790281.0951949s.83226473-.0322223 1.2379028-.0951949zm4.3421782-2.1721994c1.4927655-1.4532925 2.419919-3.484675 2.419919-5.7326057 0-4.418278-3.581722-8-8-8s-8 3.581722-8 8c0 2.2479307.92715352 4.2793132 2.41991895 5.7326057.75688473-2.0164459 1.83949951-3.6071894 3.48926591-4.3218837-1.14534283-.70360829-1.90918486-1.96796271-1.90918486-3.410722 0-2.209139 1.790861-4 4-4s4 1.790861 4 4c0 1.44275929-.763842 2.70711371-1.9091849 3.410722 1.6497664.7146943 2.7323812 2.3054378 3.4892659 4.3218837zm-5.580081 3.2673943c-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9 4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9z" fill-rule="evenodd"/></symbol><symbol id="icon-alert" viewBox="0 0 18 18"><path d="m4 10h2.5c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-3.08578644l-1.12132034 1.1213203c-.18753638.1875364-.29289322.4418903-.29289322.7071068v.1715729h14v-.1715729c0-.2652165-.1053568-.5195704-.2928932-.7071068l-1.7071068-1.7071067v-3.4142136c0-2.76142375-2.2385763-5-5-5-2.76142375 0-5 2.23857625-5 5zm3 4c0 1.1045695.8954305 2 2 2s2-.8954305 2-2zm-5 0c-.55228475 0-1-.4477153-1-1v-.1715729c0-.530433.21071368-1.0391408.58578644-1.4142135l1.41421356-1.4142136v-3c0-3.3137085 2.6862915-6 6-6s6 2.6862915 6 6v3l1.4142136 1.4142136c.3750727.3750727.5857864.8837805.5857864 1.4142135v.1715729c0 .5522847-.4477153 1-1 1h-4c0 1.6568542-1.3431458 3-3 3-1.65685425 0-3-1.3431458-3-3z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-broad" viewBox="0 0 16 16"><path d="m6.10307866 2.97190702v7.69043288l2.44965196-2.44676915c.38776071-.38730439 1.0088052-.39493524 1.38498697-.01919617.38609051.38563612.38643641 1.01053024-.00013864 1.39665039l-4.12239817 4.11754683c-.38616704.3857126-1.01187344.3861062-1.39846576-.0000311l-4.12258206-4.11773056c-.38618426-.38572979-.39254614-1.00476697-.01636437-1.38050605.38609047-.38563611 1.01018509-.38751562 1.4012233.00306241l2.44985644 2.4469734v-8.67638639c0-.54139983.43698413-.98042709.98493125-.98159081l7.89910522-.0043627c.5451687 0 .9871152.44142642.9871152.98595351s-.4419465.98595351-.9871152.98595351z" fill-rule="evenodd" transform="matrix(-1 0 0 -1 14 15)"/></symbol><symbol id="icon-arrow-down" viewBox="0 0 16 16"><path d="m3.28337502 11.5302405 4.03074001 4.176208c.37758093.3912076.98937525.3916069 1.367372-.0000316l4.03091977-4.1763942c.3775978-.3912252.3838182-1.0190815.0160006-1.4001736-.3775061-.39113013-.9877245-.39303641-1.3700683.003106l-2.39538585 2.4818345v-11.6147896l-.00649339-.11662112c-.055753-.49733869-.46370161-.88337888-.95867408-.88337888-.49497246 0-.90292107.38604019-.95867408.88337888l-.00649338.11662112v11.6147896l-2.39518594-2.4816273c-.37913917-.39282218-.98637524-.40056175-1.35419292-.0194697-.37750607.3911302-.37784433 1.0249269.00013556 1.4165479z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-left" viewBox="0 0 16 16"><path d="m4.46975946 3.28337502-4.17620792 4.03074001c-.39120768.37758093-.39160691.98937525.0000316 1.367372l4.1763942 4.03091977c.39122514.3775978 1.01908149.3838182 1.40017357.0160006.39113012-.3775061.3930364-.9877245-.00310603-1.3700683l-2.48183446-2.39538585h11.61478958l.1166211-.00649339c.4973387-.055753.8833789-.46370161.8833789-.95867408 0-.49497246-.3860402-.90292107-.8833789-.95867408l-.1166211-.00649338h-11.61478958l2.4816273-2.39518594c.39282216-.37913917.40056173-.98637524.01946965-1.35419292-.39113012-.37750607-1.02492687-.37784433-1.41654791.00013556z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-right" viewBox="0 0 16 16"><path d="m11.5302405 12.716625 4.176208-4.03074003c.3912076-.37758093.3916069-.98937525-.0000316-1.367372l-4.1763942-4.03091981c-.3912252-.37759778-1.0190815-.38381821-1.4001736-.01600053-.39113013.37750607-.39303641.98772445.003106 1.37006824l2.4818345 2.39538588h-11.6147896l-.11662112.00649339c-.49733869.055753-.88337888.46370161-.88337888.95867408 0 .49497246.38604019.90292107.88337888.95867408l.11662112.00649338h11.6147896l-2.4816273 2.39518592c-.39282218.3791392-.40056175.9863753-.0194697 1.3541929.3911302.3775061 1.0249269.3778444 1.4165479-.0001355z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-sub" viewBox="0 0 16 16"><path d="m7.89692134 4.97190702v7.69043288l-2.44965196-2.4467692c-.38776071-.38730434-1.0088052-.39493519-1.38498697-.0191961-.38609047.3856361-.38643643 1.0105302.00013864 1.3966504l4.12239817 4.1175468c.38616704.3857126 1.01187344.3861062 1.39846576-.0000311l4.12258202-4.1177306c.3861843-.3857298.3925462-1.0047669.0163644-1.380506-.3860905-.38563612-1.0101851-.38751563-1.4012233.0030624l-2.44985643 2.4469734v-8.67638639c0-.54139983-.43698413-.98042709-.98493125-.98159081l-7.89910525-.0043627c-.54516866 0-.98711517.44142642-.98711517.98595351s.44194651.98595351.98711517.98595351z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-up" viewBox="0 0 16 16"><path d="m12.716625 4.46975946-4.03074003-4.17620792c-.37758093-.39120768-.98937525-.39160691-1.367372.0000316l-4.03091981 4.1763942c-.37759778.39122514-.38381821 1.01908149-.01600053 1.40017357.37750607.39113012.98772445.3930364 1.37006824-.00310603l2.39538588-2.48183446v11.61478958l.00649339.1166211c.055753.4973387.46370161.8833789.95867408.8833789.49497246 0 .90292107-.3860402.95867408-.8833789l.00649338-.1166211v-11.61478958l2.39518592 2.4816273c.3791392.39282216.9863753.40056173 1.3541929.01946965.3775061-.39113012.3778444-1.02492687-.0001355-1.41654791z" fill-rule="evenodd"/></symbol><symbol id="icon-article" viewBox="0 0 18 18"><path d="m13 15v-12.9906311c0-.0073595-.0019884-.0093689.0014977-.0093689l-11.00158888.00087166v13.00506804c0 .5482678.44615281.9940603.99415146.9940603h10.27350412c-.1701701-.2941734-.2675644-.6357129-.2675644-1zm-12 .0059397v-13.00506804c0-.5562408.44704472-1.00087166.99850233-1.00087166h11.00299537c.5510129 0 .9985023.45190985.9985023 1.0093689v2.9906311h3v9.9914698c0 1.1065798-.8927712 2.0085302-1.9940603 2.0085302h-12.01187942c-1.09954652 0-1.99406028-.8927712-1.99406028-1.9940603zm13-9.0059397v9c0 .5522847.4477153 1 1 1s1-.4477153 1-1v-9zm-10-2h7v4h-7zm1 1v2h5v-2zm-1 4h7v1h-7zm0 2h7v1h-7zm0 2h7v1h-7z" fill-rule="evenodd"/></symbol><symbol id="icon-audio" viewBox="0 0 18 18"><path d="m13.0957477 13.5588459c-.195279.1937043-.5119137.193729-.7072234.0000551-.1953098-.193674-.1953346-.5077061-.0000556-.7014104 1.0251004-1.0168342 1.6108711-2.3905226 1.6108711-3.85745208 0-1.46604976-.5850634-2.83898246-1.6090736-3.85566829-.1951894-.19379323-.1950192-.50782531.0003802-.70141028.1953993-.19358497.512034-.19341614.7072234.00037709 1.2094886 1.20083761 1.901635 2.8250555 1.901635 4.55670148 0 1.73268608-.6929822 3.35779608-1.9037571 4.55880738zm2.1233994 2.1025159c-.195234.193749-.5118687.1938462-.7072235.0002171-.1953548-.1936292-.1954528-.5076613-.0002189-.7014104 1.5832215-1.5711805 2.4881302-3.6939808 2.4881302-5.96012998 0-2.26581266-.9046382-4.3883241-2.487443-5.95944795-.1952117-.19377107-.1950777-.50780316.0002993-.70141031s.5120117-.19347426.7072234.00029682c1.7683321 1.75528196 2.7800854 4.12911258 2.7800854 6.66056144 0 2.53182498-1.0120556 4.90597838-2.7808529 6.66132328zm-14.21898205-3.6854911c-.5523759 0-1.00016505-.4441085-1.00016505-.991944v-3.96777631c0-.54783558.44778915-.99194407 1.00016505-.99194407h2.0003301l5.41965617-3.8393633c.44948677-.31842296 1.07413994-.21516983 1.39520191.23062232.12116339.16823446.18629727.36981184.18629727.57655577v12.01603479c0 .5478356-.44778914.9919441-1.00016505.9919441-.20845738 0-.41170538-.0645985-.58133413-.184766l-5.41965617-3.8393633zm0-.991944h2.32084805l5.68047235 4.0241292v-12.01603479l-5.68047235 4.02412928h-2.32084805z" fill-rule="evenodd"/></symbol><symbol id="icon-block" viewBox="0 0 24 24"><path d="m0 0h24v24h-24z" fill-rule="evenodd"/></symbol><symbol id="icon-book" viewBox="0 0 18 18"><path d="m4 13v-11h1v11h11v-11h-13c-.55228475 0-1 .44771525-1 1v10.2675644c.29417337-.1701701.63571286-.2675644 1-.2675644zm12 1h-13c-.55228475 0-1 .4477153-1 1s.44771525 1 1 1h13zm0 3h-13c-1.1045695 0-2-.8954305-2-2v-12c0-1.1045695.8954305-2 2-2h13c.5522847 0 1 .44771525 1 1v14c0 .5522847-.4477153 1-1 1zm-8.5-13h6c.2761424 0 .5.22385763.5.5s-.2238576.5-.5.5h-6c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm1 2h4c.2761424 0 .5.22385763.5.5s-.2238576.5-.5.5h-4c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5z" fill-rule="evenodd"/></symbol><symbol id="icon-broad" viewBox="0 0 24 24"><path d="m9.18274226 7.81v7.7999954l2.48162734-2.4816273c.3928221-.3928221 1.0219731-.4005617 1.4030652-.0194696.3911301.3911301.3914806 1.0249268-.0001404 1.4165479l-4.17620796 4.1762079c-.39120769.3912077-1.02508144.3916069-1.41671995-.0000316l-4.1763942-4.1763942c-.39122514-.3912251-.39767006-1.0190815-.01657798-1.4001736.39113012-.3911301 1.02337106-.3930364 1.41951349.0031061l2.48183446 2.4818344v-8.7999954c0-.54911294.4426881-.99439484.99778758-.99557515l8.00221246-.00442485c.5522847 0 1 .44771525 1 1s-.4477153 1-1 1z" fill-rule="evenodd" transform="matrix(-1 0 0 -1 20.182742 24.805206)"/></symbol><symbol id="icon-calendar" viewBox="0 0 18 18"><path d="m12.5 0c.2761424 0 .5.21505737.5.49047852v.50952148h2c1.1072288 0 2 .89451376 2 2v12c0 1.1072288-.8945138 2-2 2h-12c-1.1072288 0-2-.8945138-2-2v-12c0-1.1072288.89451376-2 2-2h1v1h-1c-.55393837 0-1 .44579254-1 1v3h14v-3c0-.55393837-.4457925-1-1-1h-2v1.50952148c0 .27088381-.2319336.49047852-.5.49047852-.2761424 0-.5-.21505737-.5-.49047852v-3.01904296c0-.27088381.2319336-.49047852.5-.49047852zm3.5 7h-14v8c0 .5539384.44579254 1 1 1h12c.5539384 0 1-.4457925 1-1zm-11 6v1h-1v-1zm3 0v1h-1v-1zm3 0v1h-1v-1zm-6-2v1h-1v-1zm3 0v1h-1v-1zm6 0v1h-1v-1zm-3 0v1h-1v-1zm-3-2v1h-1v-1zm6 0v1h-1v-1zm-3 0v1h-1v-1zm-5.5-9c.27614237 0 .5.21505737.5.49047852v.50952148h5v1h-5v1.50952148c0 .27088381-.23193359.49047852-.5.49047852-.27614237 0-.5-.21505737-.5-.49047852v-3.01904296c0-.27088381.23193359-.49047852.5-.49047852z" fill-rule="evenodd"/></symbol><symbol id="icon-cart" viewBox="0 0 18 18"><path d="m5 14c1.1045695 0 2 .8954305 2 2s-.8954305 2-2 2-2-.8954305-2-2 .8954305-2 2-2zm10 0c1.1045695 0 2 .8954305 2 2s-.8954305 2-2 2-2-.8954305-2-2 .8954305-2 2-2zm-10 1c-.55228475 0-1 .4477153-1 1s.44771525 1 1 1 1-.4477153 1-1-.44771525-1-1-1zm10 0c-.5522847 0-1 .4477153-1 1s.4477153 1 1 1 1-.4477153 1-1-.4477153-1-1-1zm-12.82032249-15c.47691417 0 .88746157.33678127.98070211.80449199l.23823144 1.19501025 13.36277974.00045554c.5522847.00001882.9999659.44774934.9999659 1.00004222 0 .07084994-.0075361.14150708-.022474.2107727l-1.2908094 5.98534344c-.1007861.46742419-.5432548.80388386-1.0571651.80388386h-10.24805106c-.59173366 0-1.07142857.4477153-1.07142857 1 0 .5128358.41361449.9355072.94647737.9932723l.1249512.0067277h10.35933776c.2749512 0 .4979349.2228539.4979349.4978051 0 .2749417-.2227336.4978951-.4976753.4980063l-10.35959736.0041886c-1.18346732 0-2.14285714-.8954305-2.14285714-2 0-.6625717.34520317-1.24989198.87690425-1.61383592l-1.63768102-8.19004794c-.01312273-.06561364-.01950005-.131011-.0196107-.19547395l-1.71961253-.00064219c-.27614237 0-.5-.22385762-.5-.5 0-.27614237.22385763-.5.5-.5zm14.53193359 2.99950224h-13.11300004l1.20580469 6.02530174c.11024034-.0163252.22327998-.02480398.33844139-.02480398h10.27064786z"/></symbol><symbol id="icon-chevron-less" viewBox="0 0 10 10"><path d="m5.58578644 4-3.29289322-3.29289322c-.39052429-.39052429-.39052429-1.02368927 0-1.41421356s1.02368927-.39052429 1.41421356 0l4 4c.39052429.39052429.39052429 1.02368927 0 1.41421356l-4 4c-.39052429.39052429-1.02368927.39052429-1.41421356 0s-.39052429-1.02368927 0-1.41421356z" fill-rule="evenodd" transform="matrix(0 -1 -1 0 9 9)"/></symbol><symbol id="icon-chevron-more" viewBox="0 0 10 10"><path d="m5.58578644 6-3.29289322-3.29289322c-.39052429-.39052429-.39052429-1.02368927 0-1.41421356s1.02368927-.39052429 1.41421356 0l4 4c.39052429.39052429.39052429 1.02368927 0 1.41421356l-4 4.00000002c-.39052429.3905243-1.02368927.3905243-1.41421356 0s-.39052429-1.02368929 0-1.41421358z" fill-rule="evenodd" transform="matrix(0 1 -1 0 11 1)"/></symbol><symbol id="icon-chevron-right" viewBox="0 0 10 10"><path d="m5.96738168 4.70639573 2.39518594-2.41447274c.37913917-.38219212.98637524-.38972225 1.35419292-.01894278.37750606.38054586.37784436.99719163-.00013556 1.37821513l-4.03074001 4.06319683c-.37758093.38062133-.98937525.38100976-1.367372-.00003075l-4.03091981-4.06337806c-.37759778-.38063832-.38381821-.99150444-.01600053-1.3622839.37750607-.38054587.98772445-.38240057 1.37006824.00302197l2.39538588 2.4146743.96295325.98624457z" fill-rule="evenodd" transform="matrix(0 -1 1 0 0 10)"/></symbol><symbol id="icon-circle-fill" viewBox="0 0 16 16"><path d="m8 14c-3.3137085 0-6-2.6862915-6-6s2.6862915-6 6-6 6 2.6862915 6 6-2.6862915 6-6 6z" fill-rule="evenodd"/></symbol><symbol id="icon-circle" viewBox="0 0 16 16"><path d="m8 12c2.209139 0 4-1.790861 4-4s-1.790861-4-4-4-4 1.790861-4 4 1.790861 4 4 4zm0 2c-3.3137085 0-6-2.6862915-6-6s2.6862915-6 6-6 6 2.6862915 6 6-2.6862915 6-6 6z" fill-rule="evenodd"/></symbol><symbol id="icon-citation" viewBox="0 0 18 18"><path d="m8.63593473 5.99995183c2.20913897 0 3.99999997 1.79084375 3.99999997 3.99996146 0 1.40730761-.7267788 2.64486871-1.8254829 3.35783281 1.6240224.6764218 2.8754442 2.0093871 3.4610603 3.6412466l-1.0763845.000006c-.5310008-1.2078237-1.5108121-2.1940153-2.7691712-2.7181346l-.79002167-.329052v-1.023992l.63016577-.4089232c.8482885-.5504661 1.3698342-1.4895187 1.3698342-2.51898361 0-1.65683828-1.3431457-2.99996146-2.99999997-2.99996146-1.65685425 0-3 1.34312318-3 2.99996146 0 1.02946491.52154569 1.96851751 1.36983419 2.51898361l.63016581.4089232v1.023992l-.79002171.329052c-1.25835905.5241193-2.23817037 1.5103109-2.76917113 2.7181346l-1.07638453-.000006c.58561612-1.6318595 1.8370379-2.9648248 3.46106024-3.6412466-1.09870405-.7129641-1.82548287-1.9505252-1.82548287-3.35783281 0-2.20911771 1.790861-3.99996146 4-3.99996146zm7.36897597-4.99995183c1.1018574 0 1.9950893.89353404 1.9950893 2.00274083v5.994422c0 1.10608317-.8926228 2.00274087-1.9950893 2.00274087l-3.0049107-.0009037v-1l3.0049107.00091329c.5490631 0 .9950893-.44783123.9950893-1.00275046v-5.994422c0-.55646537-.4450595-1.00275046-.9950893-1.00275046h-14.00982141c-.54906309 0-.99508929.44783123-.99508929 1.00275046v5.9971821c0 .66666024.33333333.99999036 1 .99999036l2-.00091329v1l-2 .0009037c-1 0-2-.99999041-2-1.99998077v-5.9971821c0-1.10608322.8926228-2.00274083 1.99508929-2.00274083zm-8.5049107 2.9999711c.27614237 0 .5.22385547.5.5 0 .2761349-.22385763.5-.5.5h-4c-.27614237 0-.5-.2238651-.5-.5 0-.27614453.22385763-.5.5-.5zm3 0c.2761424 0 .5.22385547.5.5 0 .2761349-.2238576.5-.5.5h-1c-.27614237 0-.5-.2238651-.5-.5 0-.27614453.22385763-.5.5-.5zm4 0c.2761424 0 .5.22385547.5.5 0 .2761349-.2238576.5-.5.5h-2c-.2761424 0-.5-.2238651-.5-.5 0-.27614453.2238576-.5.5-.5z" fill-rule="evenodd"/></symbol><symbol id="icon-close" viewBox="0 0 16 16"><path d="m2.29679575 12.2772478c-.39658757.3965876-.39438847 1.0328109-.00062148 1.4265779.39651227.3965123 1.03246768.3934888 1.42657791-.0006214l4.27724782-4.27724787 4.2772478 4.27724787c.3965876.3965875 1.0328109.3943884 1.4265779.0006214.3965123-.3965122.3934888-1.0324677-.0006214-1.4265779l-4.27724787-4.2772478 4.27724787-4.27724782c.3965875-.39658757.3943884-1.03281091.0006214-1.42657791-.3965122-.39651226-1.0324677-.39348875-1.4265779.00062148l-4.2772478 4.27724782-4.27724782-4.27724782c-.39658757-.39658757-1.03281091-.39438847-1.42657791-.00062148-.39651226.39651227-.39348875 1.03246768.00062148 1.42657791l4.27724782 4.27724782z" fill-rule="evenodd"/></symbol><symbol id="icon-collections" viewBox="0 0 18 18"><path d="m15 4c1.1045695 0 2 .8954305 2 2v9c0 1.1045695-.8954305 2-2 2h-8c-1.1045695 0-2-.8954305-2-2h1c0 .5128358.38604019.9355072.88337887.9932723l.11662113.0067277h8c.5128358 0 .9355072-.3860402.9932723-.8833789l.0067277-.1166211v-9c0-.51283584-.3860402-.93550716-.8833789-.99327227l-.1166211-.00672773h-1v-1zm-4-3c1.1045695 0 2 .8954305 2 2v9c0 1.1045695-.8954305 2-2 2h-8c-1.1045695 0-2-.8954305-2-2v-9c0-1.1045695.8954305-2 2-2zm0 1h-8c-.51283584 0-.93550716.38604019-.99327227.88337887l-.00672773.11662113v9c0 .5128358.38604019.9355072.88337887.9932723l.11662113.0067277h8c.5128358 0 .9355072-.3860402.9932723-.8833789l.0067277-.1166211v-9c0-.51283584-.3860402-.93550716-.8833789-.99327227zm-1.5 7c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-5c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm0-2c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-5c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm0-2c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-5c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5z" fill-rule="evenodd"/></symbol><symbol id="icon-compare" viewBox="0 0 18 18"><path d="m12 3c3.3137085 0 6 2.6862915 6 6s-2.6862915 6-6 6c-1.0928452 0-2.11744941-.2921742-2.99996061-.8026704-.88181407.5102749-1.90678042.8026704-3.00003939.8026704-3.3137085 0-6-2.6862915-6-6s2.6862915-6 6-6c1.09325897 0 2.11822532.29239547 3.00096303.80325037.88158756-.51107621 1.90619177-.80325037 2.99903697-.80325037zm-6 1c-2.76142375 0-5 2.23857625-5 5 0 2.7614237 2.23857625 5 5 5 .74397391 0 1.44999672-.162488 2.08451611-.4539116-1.27652344-1.1000812-2.08451611-2.7287264-2.08451611-4.5460884s.80799267-3.44600721 2.08434391-4.5463015c-.63434719-.29121054-1.34037-.4536985-2.08434391-.4536985zm6 0c-.7439739 0-1.4499967.16248796-2.08451611.45391156 1.27652341 1.10008123 2.08451611 2.72872644 2.08451611 4.54608844s-.8079927 3.4460072-2.08434391 4.5463015c.63434721.2912105 1.34037001.4536985 2.08434391.4536985 2.7614237 0 5-2.2385763 5-5 0-2.76142375-2.2385763-5-5-5zm-1.4162763 7.0005324h-3.16744736c.15614659.3572676.35283837.6927622.58425872 1.0006671h1.99892988c.23142036-.3079049.42811216-.6433995.58425876-1.0006671zm.4162763-2.0005324h-4c0 .34288501.0345146.67770871.10025909 1.0011864h3.79948181c.0657445-.32347769.1002591-.65830139.1002591-1.0011864zm-.4158423-1.99953894h-3.16831543c-.13859957.31730812-.24521946.651783-.31578599.99935097h3.79988742c-.0705665-.34756797-.1771864-.68204285-.315786-.99935097zm-1.58295822-1.999926-.08316107.06199199c-.34550042.27081213-.65446126.58611297-.91825862.93727862h2.00044041c-.28418626-.37830727-.6207872-.71499149-.99902072-.99927061z" fill-rule="evenodd"/></symbol><symbol id="icon-download-file" viewBox="0 0 18 18"><path d="m10.0046024 0c.5497429 0 1.3179837.32258606 1.707238.71184039l4.5763192 4.57631922c.3931386.39313859.7118404 1.16760135.7118404 1.71431368v8.98899651c0 1.1092806-.8945138 2.0085302-1.9940603 2.0085302h-12.01187942c-1.10128908 0-1.99406028-.8926228-1.99406028-1.9950893v-14.00982141c0-1.10185739.88743329-1.99508929 1.99961498-1.99508929zm0 1h-7.00498742c-.55709576 0-.99961498.44271433-.99961498.99508929v14.00982141c0 .5500396.44491393.9950893.99406028.9950893h12.01187942c.5463747 0 .9940603-.4506622.9940603-1.0085302v-8.98899651c0-.28393444-.2150684-.80332809-.4189472-1.0072069l-4.5763192-4.57631922c-.2038461-.20384606-.718603-.41894717-1.0001312-.41894717zm-1.5046024 4c.27614237 0 .5.21637201.5.49209595v6.14827645l1.7462789-1.77990922c.1933927-.1971171.5125222-.19455839.7001689-.0069117.1932998.19329992.1910058.50899492-.0027774.70277812l-2.59089271 2.5908927c-.19483374.1948337-.51177825.1937771-.70556873-.0000133l-2.59099079-2.5909908c-.19484111-.1948411-.19043735-.5151448-.00279066-.70279146.19329987-.19329987.50465175-.19237083.70018565.00692852l1.74638684 1.78001764v-6.14827695c0-.27177709.23193359-.49209595.5-.49209595z" fill-rule="evenodd"/></symbol><symbol id="icon-download" viewBox="0 0 16 16"><path d="m12.9975267 12.999368c.5467123 0 1.0024733.4478567 1.0024733 1.000316 0 .5563109-.4488226 1.000316-1.0024733 1.000316h-9.99505341c-.54671233 0-1.00247329-.4478567-1.00247329-1.000316 0-.5563109.44882258-1.000316 1.00247329-1.000316zm-4.9975267-11.999368c.55228475 0 1 .44497754 1 .99589209v6.80214418l2.4816273-2.48241149c.3928222-.39294628 1.0219732-.4006883 1.4030652-.01947579.3911302.39125371.3914806 1.02525073-.0001404 1.41699553l-4.17620792 4.17752758c-.39120769.3913313-1.02508144.3917306-1.41671995-.0000316l-4.17639421-4.17771394c-.39122513-.39134876-.39767006-1.01940351-.01657797-1.40061601.39113012-.39125372 1.02337105-.3931606 1.41951349.00310701l2.48183446 2.48261871v-6.80214418c0-.55001601.44386482-.99589209 1-.99589209z" fill-rule="evenodd"/></symbol><symbol id="icon-editors" viewBox="0 0 18 18"><path d="m8.72592184 2.54588137c-.48811714-.34391207-1.08343326-.54588137-1.72592184-.54588137-1.65685425 0-3 1.34314575-3 3 0 1.02947485.5215457 1.96853646 1.3698342 2.51900785l.6301658.40892721v1.02400182l-.79002171.32905522c-1.93395773.8055207-3.20997829 2.7024791-3.20997829 4.8180274v.9009805h-1v-.9009805c0-2.5479714 1.54557359-4.79153984 3.82548288-5.7411543-1.09870406-.71297106-1.82548288-1.95054399-1.82548288-3.3578652 0-2.209139 1.790861-4 4-4 1.09079823 0 2.07961816.43662103 2.80122451 1.1446278-.37707584.09278571-.7373238.22835063-1.07530267.40125357zm-2.72592184 14.45411863h-1v-.9009805c0-2.5479714 1.54557359-4.7915398 3.82548288-5.7411543-1.09870406-.71297106-1.82548288-1.95054399-1.82548288-3.3578652 0-2.209139 1.790861-4 4-4s4 1.790861 4 4c0 1.40732121-.7267788 2.64489414-1.8254829 3.3578652 2.2799093.9496145 3.8254829 3.1931829 3.8254829 5.7411543v.9009805h-1v-.9009805c0-2.1155483-1.2760206-4.0125067-3.2099783-4.8180274l-.7900217-.3290552v-1.02400184l.6301658-.40892721c.8482885-.55047139 1.3698342-1.489533 1.3698342-2.51900785 0-1.65685425-1.3431458-3-3-3-1.65685425 0-3 1.34314575-3 3 0 1.02947485.5215457 1.96853646 1.3698342 2.51900785l.6301658.40892721v1.02400184l-.79002171.3290552c-1.93395773.8055207-3.20997829 2.7024791-3.20997829 4.8180274z" fill-rule="evenodd"/></symbol><symbol id="icon-email" viewBox="0 0 18 18"><path d="m16.0049107 2c1.1018574 0 1.9950893.89706013 1.9950893 2.00585866v9.98828264c0 1.1078052-.8926228 2.0058587-1.9950893 2.0058587h-14.00982141c-1.10185739 0-1.99508929-.8970601-1.99508929-2.0058587v-9.98828264c0-1.10780515.8926228-2.00585866 1.99508929-2.00585866zm0 1h-14.00982141c-.54871518 0-.99508929.44887827-.99508929 1.00585866v9.98828264c0 .5572961.44630695 1.0058587.99508929 1.0058587h14.00982141c.5487152 0 .9950893-.4488783.9950893-1.0058587v-9.98828264c0-.55729607-.446307-1.00585866-.9950893-1.00585866zm-.0049107 2.55749512v1.44250488l-7 4-7-4v-1.44250488l7 4z" fill-rule="evenodd"/></symbol><symbol id="icon-error" viewBox="0 0 18 18"><path d="m9 0c4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9zm2.8630343 4.71100931-2.8630343 2.86303426-2.86303426-2.86303426c-.39658757-.39658757-1.03281091-.39438847-1.4265779-.00062147-.39651227.39651226-.39348876 1.03246767.00062147 1.4265779l2.86303426 2.86303426-2.86303426 2.8630343c-.39658757.3965875-.39438847 1.0328109-.00062147 1.4265779.39651226.3965122 1.03246767.3934887 1.4265779-.0006215l2.86303426-2.8630343 2.8630343 2.8630343c.3965875.3965876 1.0328109.3943885 1.4265779.0006215.3965122-.3965123.3934887-1.0324677-.0006215-1.4265779l-2.8630343-2.8630343 2.8630343-2.86303426c.3965876-.39658757.3943885-1.03281091.0006215-1.4265779-.3965123-.39651227-1.0324677-.39348876-1.4265779.00062147z" fill-rule="evenodd"/></symbol><symbol id="icon-ethics" viewBox="0 0 18 18"><path d="m6.76384967 1.41421356.83301651-.8330165c.77492941-.77492941 2.03133823-.77492941 2.80626762 0l.8330165.8330165c.3750728.37507276.8837806.58578644 1.4142136.58578644h1.3496361c1.1045695 0 2 .8954305 2 2v1.34963611c0 .53043298.2107137 1.03914081.5857864 1.41421356l.8330165.83301651c.7749295.77492941.7749295 2.03133823 0 2.80626762l-.8330165.8330165c-.3750727.3750728-.5857864.8837806-.5857864 1.4142136v1.3496361c0 1.1045695-.8954305 2-2 2h-1.3496361c-.530433 0-1.0391408.2107137-1.4142136.5857864l-.8330165.8330165c-.77492939.7749295-2.03133821.7749295-2.80626762 0l-.83301651-.8330165c-.37507275-.3750727-.88378058-.5857864-1.41421356-.5857864h-1.34963611c-1.1045695 0-2-.8954305-2-2v-1.3496361c0-.530433-.21071368-1.0391408-.58578644-1.4142136l-.8330165-.8330165c-.77492941-.77492939-.77492941-2.03133821 0-2.80626762l.8330165-.83301651c.37507276-.37507275.58578644-.88378058.58578644-1.41421356v-1.34963611c0-1.1045695.8954305-2 2-2h1.34963611c.53043298 0 1.03914081-.21071368 1.41421356-.58578644zm-1.41421356 1.58578644h-1.34963611c-.55228475 0-1 .44771525-1 1v1.34963611c0 .79564947-.31607052 1.55871121-.87867966 2.12132034l-.8330165.83301651c-.38440512.38440512-.38440512 1.00764896 0 1.39205408l.8330165.83301646c.56260914.5626092.87867966 1.3256709.87867966 2.1213204v1.3496361c0 .5522847.44771525 1 1 1h1.34963611c.79564947 0 1.55871121.3160705 2.12132034.8786797l.83301651.8330165c.38440512.3844051 1.00764896.3844051 1.39205408 0l.83301646-.8330165c.5626092-.5626092 1.3256709-.8786797 2.1213204-.8786797h1.3496361c.5522847 0 1-.4477153 1-1v-1.3496361c0-.7956495.3160705-1.5587112.8786797-2.1213204l.8330165-.83301646c.3844051-.38440512.3844051-1.00764896 0-1.39205408l-.8330165-.83301651c-.5626092-.56260913-.8786797-1.32567087-.8786797-2.12132034v-1.34963611c0-.55228475-.4477153-1-1-1h-1.3496361c-.7956495 0-1.5587112-.31607052-2.1213204-.87867966l-.83301646-.8330165c-.38440512-.38440512-1.00764896-.38440512-1.39205408 0l-.83301651.8330165c-.56260913.56260914-1.32567087.87867966-2.12132034.87867966zm3.58698944 11.4960218c-.02081224.002155-.04199226.0030286-.06345763.002542-.98766446-.0223875-1.93408568-.3063547-2.75885125-.8155622-.23496767-.1450683-.30784554-.4531483-.16277726-.688116.14506827-.2349677.45314827-.3078455.68811595-.1627773.67447084.4164161 1.44758575.6483839 2.25617384.6667123.01759529.0003988.03495764.0017019.05204365.0038639.01713363-.0017748.03452416-.0026845.05212715-.0026845 2.4852814 0 4.5-2.0147186 4.5-4.5 0-1.04888973-.3593547-2.04134635-1.0074477-2.83787157-.1742817-.21419731-.1419238-.5291218.0722736-.70340353.2141973-.17428173.5291218-.14192375.7034035.07227357.7919032.97327203 1.2317706 2.18808682 1.2317706 3.46900153 0 3.0375661-2.4624339 5.5-5.5 5.5-.02146768 0-.04261937-.0013529-.06337445-.0039782zm1.57975095-10.78419583c.2654788.07599731.419084.35281842.3430867.61829728-.0759973.26547885-.3528185.419084-.6182973.3430867-.37560116-.10752146-.76586237-.16587951-1.15568824-.17249193-2.5587807-.00064534-4.58547766 2.00216524-4.58547766 4.49928198 0 .62691557.12797645 1.23496.37274865 1.7964426.11035133.2531347-.0053975.5477984-.25853224.6581497-.25313473.1103514-.54779841-.0053975-.65814974-.2585322-.29947131-.6869568-.45606667-1.43097603-.45606667-2.1960601 0-3.05211432 2.47714695-5.50006595 5.59399617-5.49921198.48576182.00815502.96289603.0795037 1.42238033.21103795zm-1.9766658 6.41091303 2.69835-2.94655317c.1788432-.21040373.4943901-.23598862.7047939-.05714545.2104037.17884318.2359886.49439014.0571454.70479387l-3.01637681 3.34277395c-.18039088.1999106-.48669547.2210637-.69285412.0478478l-1.93095347-1.62240047c-.21213845-.17678204-.24080048-.49206439-.06401844-.70420284.17678204-.21213844.49206439-.24080048.70420284-.06401844z" fill-rule="evenodd"/></symbol><symbol id="icon-expand"><path d="M7.498 11.918a.997.997 0 0 0-.003-1.411.995.995 0 0 0-1.412-.003l-4.102 4.102v-3.51A1 1 0 0 0 .98 10.09.992.992 0 0 0 0 11.092V17c0 .554.448 1.002 1.002 1.002h5.907c.554 0 1.002-.45 1.002-1.003 0-.539-.45-.978-1.006-.978h-3.51zm3.005-5.835a.997.997 0 0 0 .003 1.412.995.995 0 0 0 1.411.003l4.103-4.103v3.51a1 1 0 0 0 1.001 1.006A.992.992 0 0 0 18 6.91V1.002A1 1 0 0 0 17 0h-5.907a1.003 1.003 0 0 0-1.002 1.003c0 .539.45.978 1.006.978h3.51z" fill-rule="evenodd"/></symbol><symbol id="icon-explore" viewBox="0 0 18 18"><path d="m9 17c4.418278 0 8-3.581722 8-8s-3.581722-8-8-8-8 3.581722-8 8 3.581722 8 8 8zm0 1c-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9 4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9zm0-2.5c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5c2.969509 0 5.400504-2.3575119 5.497023-5.31714844.0090007-.27599565.2400359-.49243782.5160315-.48343711.2759957.0090007.4924378.2400359.4834371.51603155-.114093 3.4985237-2.9869632 6.284554-6.4964916 6.284554zm-.29090657-12.99359748c.27587424-.01216621.50937715.20161139.52154336.47748563.01216621.27587423-.20161139.50937715-.47748563.52154336-2.93195733.12930094-5.25315116 2.54886451-5.25315116 5.49456849 0 .27614237-.22385763.5-.5.5s-.5-.22385763-.5-.5c0-3.48142406 2.74307146-6.34074398 6.20909343-6.49359748zm1.13784138 8.04763908-1.2004882-1.20048821c-.19526215-.19526215-.19526215-.51184463 0-.70710678s.51184463-.19526215.70710678 0l1.20048821 1.2004882 1.6006509-4.00162734-4.50670359 1.80268144-1.80268144 4.50670359zm4.10281269-6.50378907-2.6692597 6.67314927c-.1016411.2541026-.3029834.4554449-.557086.557086l-6.67314927 2.6692597 2.66925969-6.67314926c.10164107-.25410266.30298336-.45544495.55708602-.55708602z" fill-rule="evenodd"/></symbol><symbol id="icon-filter" viewBox="0 0 16 16"><path d="m14.9738641 0c.5667192 0 1.0261359.4477136 1.0261359 1 0 .24221858-.0902161.47620768-.2538899.65849851l-5.6938314 6.34147206v5.49997973c0 .3147562-.1520673.6111434-.4104543.7999971l-2.05227171 1.4999945c-.45337535.3313696-1.09655869.2418269-1.4365902-.1999993-.13321514-.1730955-.20522717-.3836284-.20522717-.5999978v-6.99997423l-5.69383133-6.34147206c-.3731872-.41563511-.32996891-1.0473954.09653074-1.41107611.18705584-.15950448.42716133-.2474224.67571519-.2474224zm-5.9218641 8.5h-2.105v6.491l.01238459.0070843.02053271.0015705.01955278-.0070558 2.0532976-1.4990996zm-8.02585008-7.5-.01564945.00240169 5.83249953 6.49759831h2.313l5.836-6.499z"/></symbol><symbol id="icon-home" viewBox="0 0 18 18"><path d="m9 5-6 6v5h4v-4h4v4h4v-5zm7 6.5857864v4.4142136c0 .5522847-.4477153 1-1 1h-5v-4h-2v4h-5c-.55228475 0-1-.4477153-1-1v-4.4142136c-.25592232 0-.51184464-.097631-.70710678-.2928932l-.58578644-.5857864c-.39052429-.3905243-.39052429-1.02368929 0-1.41421358l8.29289322-8.29289322 8.2928932 8.29289322c.3905243.39052429.3905243 1.02368928 0 1.41421358l-.5857864.5857864c-.1952622.1952622-.4511845.2928932-.7071068.2928932zm-7-9.17157284-7.58578644 7.58578644.58578644.5857864 7-6.99999996 7 6.99999996.5857864-.5857864z" fill-rule="evenodd"/></symbol><symbol id="icon-image" viewBox="0 0 18 18"><path d="m10.0046024 0c.5497429 0 1.3179837.32258606 1.707238.71184039l4.5763192 4.57631922c.3931386.39313859.7118404 1.16760135.7118404 1.71431368v8.98899651c0 1.1092806-.8945138 2.0085302-1.9940603 2.0085302h-12.01187942c-1.10128908 0-1.99406028-.8926228-1.99406028-1.9950893v-14.00982141c0-1.10185739.88743329-1.99508929 1.99961498-1.99508929zm-3.49645283 10.1752453-3.89407257 6.7495552c.11705545.048464.24538859.0751995.37998328.0751995h10.60290092l-2.4329715-4.2154691-1.57494129 2.7288098zm8.49779013 6.8247547c.5463747 0 .9940603-.4506622.9940603-1.0085302v-8.98899651c0-.28393444-.2150684-.80332809-.4189472-1.0072069l-4.5763192-4.57631922c-.2038461-.20384606-.718603-.41894717-1.0001312-.41894717h-7.00498742c-.55709576 0-.99961498.44271433-.99961498.99508929v13.98991071l4.50814957-7.81026689 3.08089884 5.33809539 1.57494129-2.7288097 3.5875735 6.2159812zm-3.0059397-11c1.1045695 0 2 .8954305 2 2s-.8954305 2-2 2-2-.8954305-2-2 .8954305-2 2-2zm0 1c-.5522847 0-1 .44771525-1 1s.4477153 1 1 1 1-.44771525 1-1-.4477153-1-1-1z" fill-rule="evenodd"/></symbol><symbol id="icon-info" viewBox="0 0 18 18"><path d="m9 0c4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9zm0 7h-1.5l-.11662113.00672773c-.49733868.05776511-.88337887.48043643-.88337887.99327227 0 .47338693.32893365.86994729.77070917.97358929l.1126697.01968298.11662113.00672773h.5v3h-.5l-.11662113.0067277c-.42082504.0488782-.76196299.3590206-.85696816.7639815l-.01968298.1126697-.00672773.1166211.00672773.1166211c.04887817.4208251.35902055.761963.76398144.8569682l.1126697.019683.11662113.0067277h3l.1166211-.0067277c.4973387-.0577651.8833789-.4804365.8833789-.9932723 0-.4733869-.3289337-.8699473-.7707092-.9735893l-.1126697-.019683-.1166211-.0067277h-.5v-4l-.00672773-.11662113c-.04887817-.42082504-.35902055-.76196299-.76398144-.85696816l-.1126697-.01968298zm0-3.25c-.69035594 0-1.25.55964406-1.25 1.25s.55964406 1.25 1.25 1.25 1.25-.55964406 1.25-1.25-.55964406-1.25-1.25-1.25z" fill-rule="evenodd"/></symbol><symbol id="icon-institution" viewBox="0 0 18 18"><path d="m7 16.9998189v-2.0003623h4v2.0003623h2v-3.0005434h-8v3.0005434zm-3-10.00181122h-1.52632364c-.27614237 0-.5-.22389817-.5-.50009056 0-.13995446.05863589-.27350497.16166338-.36820841l1.23156713-1.13206327h-2.36690687v12.00217346h3v-2.0003623h-3v-1.0001811h3v-1.0001811h1v-4.00072448h-1zm10 0v2.00036224h-1v4.00072448h1v1.0001811h3v1.0001811h-3v2.0003623h3v-12.00217346h-2.3695309l1.2315671 1.13206327c.2033191.186892.2166633.50325042.0298051.70660631-.0946863.10304615-.2282126.16169266-.3681417.16169266zm3-3.00054336c.5522847 0 1 .44779634 1 1.00018112v13.00235456h-18v-13.00235456c0-.55238478.44771525-1.00018112 1-1.00018112h3.45499992l4.20535144-3.86558216c.19129876-.17584288.48537447-.17584288.67667324 0l4.2053514 3.86558216zm-4 3.00054336h-8v1.00018112h8zm-2 6.00108672h1v-4.00072448h-1zm-1 0v-4.00072448h-2v4.00072448zm-3 0v-4.00072448h-1v4.00072448zm8-4.00072448c.5522847 0 1 .44779634 1 1.00018112v2.00036226h-2v-2.00036226c0-.55238478.4477153-1.00018112 1-1.00018112zm-12 0c.55228475 0 1 .44779634 1 1.00018112v2.00036226h-2v-2.00036226c0-.55238478.44771525-1.00018112 1-1.00018112zm5.99868798-7.81907007-5.24205601 4.81852671h10.48411203zm.00131202 3.81834559c-.55228475 0-1-.44779634-1-1.00018112s.44771525-1.00018112 1-1.00018112 1 .44779634 1 1.00018112-.44771525 1.00018112-1 1.00018112zm-1 11.00199236v1.0001811h2v-1.0001811z" fill-rule="evenodd"/></symbol><symbol id="icon-location" viewBox="0 0 18 18"><path d="m9.39521328 16.2688008c.79596342-.7770119 1.59208152-1.6299956 2.33285652-2.5295081 1.4020032-1.7024324 2.4323601-3.3624519 2.9354918-4.871847.2228715-.66861448.3364384-1.29323246.3364384-1.8674457 0-3.3137085-2.6862915-6-6-6-3.36356866 0-6 2.60156856-6 6 0 .57421324.11356691 1.19883122.3364384 1.8674457.50313169 1.5093951 1.53348863 3.1694146 2.93549184 4.871847.74077492.8995125 1.53689309 1.7524962 2.33285648 2.5295081.13694479.1336842.26895677.2602648.39521328.3793207.12625651-.1190559.25826849-.2456365.39521328-.3793207zm-.39521328 1.7311992s-7-6-7-11c0-4 3.13400675-7 7-7 3.8659932 0 7 3.13400675 7 7 0 5-7 11-7 11zm0-8c-1.65685425 0-3-1.34314575-3-3s1.34314575-3 3-3c1.6568542 0 3 1.34314575 3 3s-1.3431458 3-3 3zm0-1c1.1045695 0 2-.8954305 2-2s-.8954305-2-2-2-2 .8954305-2 2 .8954305 2 2 2z" fill-rule="evenodd"/></symbol><symbol id="icon-minus" viewBox="0 0 16 16"><path d="m2.00087166 7h11.99825664c.5527662 0 1.0008717.44386482 1.0008717 1 0 .55228475-.4446309 1-1.0008717 1h-11.99825664c-.55276616 0-1.00087166-.44386482-1.00087166-1 0-.55228475.44463086-1 1.00087166-1z" fill-rule="evenodd"/></symbol><symbol id="icon-newsletter" viewBox="0 0 18 18"><path d="m9 11.8482489 2-1.1428571v-1.7053918h-4v1.7053918zm-3-1.7142857v-2.1339632h6v2.1339632l3-1.71428574v-6.41967746h-12v6.41967746zm10-5.3839632 1.5299989.95624934c.2923814.18273835.4700011.50320827.4700011.8479983v8.44575236c0 1.1045695-.8954305 2-2 2h-14c-1.1045695 0-2-.8954305-2-2v-8.44575236c0-.34479003.1776197-.66525995.47000106-.8479983l1.52999894-.95624934v-2.75c0-.55228475.44771525-1 1-1h12c.5522847 0 1 .44771525 1 1zm0 1.17924764v3.07075236l-7 4-7-4v-3.07075236l-1 .625v8.44575236c0 .5522847.44771525 1 1 1h14c.5522847 0 1-.4477153 1-1v-8.44575236zm-10-1.92924764h6v1h-6zm-1 2h8v1h-8z" fill-rule="evenodd"/></symbol><symbol id="icon-orcid" viewBox="0 0 18 18"><path d="m9 1c4.418278 0 8 3.581722 8 8s-3.581722 8-8 8-8-3.581722-8-8 3.581722-8 8-8zm-2.90107518 5.2732337h-1.41865256v7.1712107h1.41865256zm4.55867178.02508949h-2.99247027v7.14612121h2.91062487c.7673039 0 1.4476365-.1483432 2.0410182-.445034s1.0511995-.7152915 1.3734671-1.2558144c.3222677-.540523.4833991-1.1603247.4833991-1.85942385 0-.68545815-.1602789-1.30270225-.4808414-1.85175082-.3205625-.54904856-.7707074-.97532211-1.3504481-1.27883343-.5797408-.30351132-1.2413173-.45526471-1.9847495-.45526471zm-.1892674 1.07933542c.7877654 0 1.4143875.22336734 1.8798852.67010873.4654977.44674138.698243 1.05546001.698243 1.82617415 0 .74343221-.2310402 1.34447791-.6931277 1.80315511-.4620874.4586773-1.0750688.6880124-1.8389625.6880124h-1.46810075v-4.98745039zm-5.08652545-3.71099194c-.21825533 0-.410525.08444276-.57681478.25333081-.16628977.16888806-.24943341.36245684-.24943341.58071218 0 .22345188.08314364.41961891.24943341.58850696.16628978.16888806.35855945.25333082.57681478.25333082.233845 0 .43390938-.08314364.60019916-.24943342.16628978-.16628977.24943342-.36375592.24943342-.59240436 0-.233845-.08314364-.43131115-.24943342-.59240437s-.36635416-.24163862-.60019916-.24163862z" fill-rule="evenodd"/></symbol><symbol id="icon-plus" viewBox="0 0 16 16"><path d="m2.00087166 7h4.99912834v-4.99912834c0-.55276616.44386482-1.00087166 1-1.00087166.55228475 0 1 .44463086 1 1.00087166v4.99912834h4.9991283c.5527662 0 1.0008717.44386482 1.0008717 1 0 .55228475-.4446309 1-1.0008717 1h-4.9991283v4.9991283c0 .5527662-.44386482 1.0008717-1 1.0008717-.55228475 0-1-.4446309-1-1.0008717v-4.9991283h-4.99912834c-.55276616 0-1.00087166-.44386482-1.00087166-1 0-.55228475.44463086-1 1.00087166-1z" fill-rule="evenodd"/></symbol><symbol id="icon-print" viewBox="0 0 18 18"><path d="m16.0049107 5h-14.00982141c-.54941618 0-.99508929.4467783-.99508929.99961498v6.00077002c0 .5570958.44271433.999615.99508929.999615h1.00491071v-3h12v3h1.0049107c.5494162 0 .9950893-.4467783.9950893-.999615v-6.00077002c0-.55709576-.4427143-.99961498-.9950893-.99961498zm-2.0049107-1v-2.00208688c0-.54777062-.4519464-.99791312-1.0085302-.99791312h-7.9829396c-.55661731 0-1.0085302.44910695-1.0085302.99791312v2.00208688zm1 10v2.0018986c0 1.103521-.9019504 1.9981014-2.0085302 1.9981014h-7.9829396c-1.1092806 0-2.0085302-.8867064-2.0085302-1.9981014v-2.0018986h-1.00491071c-1.10185739 0-1.99508929-.8874333-1.99508929-1.999615v-6.00077002c0-1.10435686.8926228-1.99961498 1.99508929-1.99961498h1.00491071v-2.00208688c0-1.10341695.90195036-1.99791312 2.0085302-1.99791312h7.9829396c1.1092806 0 2.0085302.89826062 2.0085302 1.99791312v2.00208688h1.0049107c1.1018574 0 1.9950893.88743329 1.9950893 1.99961498v6.00077002c0 1.1043569-.8926228 1.999615-1.9950893 1.999615zm-1-3h-10v5.0018986c0 .5546075.44702548.9981014 1.0085302.9981014h7.9829396c.5565964 0 1.0085302-.4491701 1.0085302-.9981014zm-9 1h8v1h-8zm0 2h5v1h-5zm9-5c-.5522847 0-1-.44771525-1-1s.4477153-1 1-1 1 .44771525 1 1-.4477153 1-1 1z" fill-rule="evenodd"/></symbol><symbol id="icon-search" viewBox="0 0 22 22"><path d="M21.697 20.261a1.028 1.028 0 01.01 1.448 1.034 1.034 0 01-1.448-.01l-4.267-4.267A9.812 9.811 0 010 9.812a9.812 9.811 0 1117.43 6.182zM9.812 18.222A8.41 8.41 0 109.81 1.403a8.41 8.41 0 000 16.82z" fill-rule="evenodd"/></symbol><symbol id="icon-social-facebook" viewBox="0 0 24 24"><path d="m6.00368507 20c-1.10660471 0-2.00368507-.8945138-2.00368507-1.9940603v-12.01187942c0-1.10128908.89451376-1.99406028 1.99406028-1.99406028h12.01187942c1.1012891 0 1.9940603.89451376 1.9940603 1.99406028v12.01187942c0 1.1012891-.88679 1.9940603-2.0032184 1.9940603h-2.9570132v-6.1960818h2.0797387l.3114113-2.414723h-2.39115v-1.54164807c0-.69911803.1941355-1.1755439 1.1966615-1.1755439l1.2786739-.00055875v-2.15974763l-.2339477-.02492088c-.3441234-.03134957-.9500153-.07025255-1.6293054-.07025255-1.8435726 0-3.1057323 1.12531866-3.1057323 3.19187953v1.78079225h-2.0850778v2.414723h2.0850778v6.1960818z" fill-rule="evenodd"/></symbol><symbol id="icon-social-twitter" viewBox="0 0 24 24"><path d="m18.8767135 6.87445248c.7638174-.46908424 1.351611-1.21167363 1.6250764-2.09636345-.7135248.43394112-1.50406.74870123-2.3464594.91677702-.6695189-.73342162-1.6297913-1.19486605-2.6922204-1.19486605-2.0399895 0-3.6933555 1.69603749-3.6933555 3.78628909 0 .29642457.0314329.58673729.0942985.8617704-3.06469922-.15890802-5.78835241-1.66547825-7.60988389-3.9574208-.3174714.56076194-.49978171 1.21167363-.49978171 1.90536824 0 1.31404706.65223085 2.47224203 1.64236444 3.15218497-.60350999-.0198635-1.17401554-.1925232-1.67222562-.47366811v.04583885c0 1.83355406 1.27302891 3.36609966 2.96411421 3.71294696-.31118484.0886217-.63651445.1329326-.97441718.1329326-.2357461 0-.47149219-.0229194-.69466516-.0672303.47149219 1.5065703 1.83253297 2.6036468 3.44975116 2.632678-1.2651707 1.0160946-2.85724264 1.6196394-4.5891906 1.6196394-.29861172 0-.59093688-.0152796-.88011875-.0504227 1.63450624 1.0726291 3.57548241 1.6990934 5.66104951 1.6990934 6.79263079 0 10.50641749-5.7711113 10.50641749-10.7751859l-.0094298-.48894775c.7229547-.53478659 1.3516109-1.20250585 1.8419628-1.96190282-.6632323.30100846-1.3751855.50422736-2.1217148.59590507z" fill-rule="evenodd"/></symbol><symbol id="icon-social-youtube" viewBox="0 0 24 24"><path d="m10.1415 14.3973208-.0005625-5.19318431 4.863375 2.60554491zm9.963-7.92753362c-.6845625-.73643756-1.4518125-.73990314-1.803375-.7826454-2.518875-.18714178-6.2971875-.18714178-6.2971875-.18714178-.007875 0-3.7861875 0-6.3050625.18714178-.352125.04274226-1.1188125.04620784-1.8039375.7826454-.5394375.56084773-.7149375 1.8344515-.7149375 1.8344515s-.18 1.49597903-.18 2.99138042v1.4024082c0 1.495979.18 2.9913804.18 2.9913804s.1755 1.2736038.7149375 1.8344515c.685125.7364376 1.5845625.7133337 1.9850625.7901542 1.44.1420891 6.12.1859866 6.12.1859866s3.78225-.005776 6.301125-.1929178c.3515625-.0433198 1.1188125-.0467854 1.803375-.783223.5394375-.5608477.7155-1.8344515.7155-1.8344515s.18-1.4954014.18-2.9913804v-1.4024082c0-1.49540139-.18-2.99138042-.18-2.99138042s-.1760625-1.27360377-.7155-1.8344515z" fill-rule="evenodd"/></symbol><symbol id="icon-subject-medicine" viewBox="0 0 18 18"><path d="m12.5 8h-6.5c-1.65685425 0-3 1.34314575-3 3v1c0 1.6568542 1.34314575 3 3 3h1v-2h-.5c-.82842712 0-1.5-.6715729-1.5-1.5s.67157288-1.5 1.5-1.5h1.5 2 1 2c1.6568542 0 3-1.34314575 3-3v-1c0-1.65685425-1.3431458-3-3-3h-2v2h1.5c.8284271 0 1.5.67157288 1.5 1.5s-.6715729 1.5-1.5 1.5zm-5.5-1v-1h-3.5c-1.38071187 0-2.5-1.11928813-2.5-2.5s1.11928813-2.5 2.5-2.5h1.02786405c.46573528 0 .92507448.10843528 1.34164078.31671843l1.13382424.56691212c.06026365-1.05041141.93116291-1.88363055 1.99667093-1.88363055 1.1045695 0 2 .8954305 2 2h2c2.209139 0 4 1.790861 4 4v1c0 2.209139-1.790861 4-4 4h-2v1h2c1.1045695 0 2 .8954305 2 2s-.8954305 2-2 2h-2c0 1.1045695-.8954305 2-2 2s-2-.8954305-2-2h-1c-2.209139 0-4-1.790861-4-4v-1c0-2.209139 1.790861-4 4-4zm0-2v-2.05652691c-.14564246-.03538148-.28733393-.08714006-.42229124-.15461871l-1.15541752-.57770876c-.27771087-.13885544-.583937-.21114562-.89442719-.21114562h-1.02786405c-.82842712 0-1.5.67157288-1.5 1.5s.67157288 1.5 1.5 1.5zm4 1v1h1.5c.2761424 0 .5-.22385763.5-.5s-.2238576-.5-.5-.5zm-1 1v-5c0-.55228475-.44771525-1-1-1s-1 .44771525-1 1v5zm-2 4v5c0 .5522847.44771525 1 1 1s1-.4477153 1-1v-5zm3 2v2h2c.5522847 0 1-.4477153 1-1s-.4477153-1-1-1zm-4-1v-1h-.5c-.27614237 0-.5.2238576-.5.5s.22385763.5.5.5zm-3.5-9h1c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-1c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5z" fill-rule="evenodd"/></symbol><symbol id="icon-success" viewBox="0 0 18 18"><path d="m9 0c4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9zm3.4860198 4.98163161-4.71802968 5.50657859-2.62834168-2.02300024c-.42862421-.36730544-1.06564993-.30775346-1.42283677.13301307-.35718685.44076653-.29927542 1.0958383.12934879 1.46314377l3.40735508 2.7323063c.42215801.3385221 1.03700951.2798252 1.38749189-.1324571l5.38450527-6.33394549c.3613513-.43716226.3096573-1.09278382-.115462-1.46437175-.4251192-.37158792-1.0626796-.31842941-1.4240309.11873285z" fill-rule="evenodd"/></symbol><symbol id="icon-table" viewBox="0 0 18 18"><path d="m16.0049107 2c1.1018574 0 1.9950893.89706013 1.9950893 2.00585866v9.98828264c0 1.1078052-.8926228 2.0058587-1.9950893 2.0058587l-4.0059107-.001.001.001h-1l-.001-.001h-5l.001.001h-1l-.001-.001-3.00391071.001c-1.10185739 0-1.99508929-.8970601-1.99508929-2.0058587v-9.98828264c0-1.10780515.8926228-2.00585866 1.99508929-2.00585866zm-11.0059107 5h-3.999v6.9941413c0 .5572961.44630695 1.0058587.99508929 1.0058587h3.00391071zm6 0h-5v8h5zm5.0059107-4h-4.0059107v3h5.001v1h-5.001v7.999l4.0059107.001c.5487152 0 .9950893-.4488783.9950893-1.0058587v-9.98828264c0-.55729607-.446307-1.00585866-.9950893-1.00585866zm-12.5049107 9c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-1c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5zm12 0c.2761424 0 .5.2238576.5.5s-.2238576.5-.5.5h-2c-.2761424 0-.5-.2238576-.5-.5s.2238576-.5.5-.5zm-6 0c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-2c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5zm-6-2c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-1c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5zm12 0c.2761424 0 .5.2238576.5.5s-.2238576.5-.5.5h-2c-.2761424 0-.5-.2238576-.5-.5s.2238576-.5.5-.5zm-6 0c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-2c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5zm-6-2c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-1c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm12 0c.2761424 0 .5.22385763.5.5s-.2238576.5-.5.5h-2c-.2761424 0-.5-.22385763-.5-.5s.2238576-.5.5-.5zm-6 0c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-2c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm1.499-5h-5v3h5zm-6 0h-3.00391071c-.54871518 0-.99508929.44887827-.99508929 1.00585866v1.99414134h3.999z" fill-rule="evenodd"/></symbol><symbol id="icon-tick-circle" viewBox="0 0 24 24"><path d="m12 2c5.5228475 0 10 4.4771525 10 10s-4.4771525 10-10 10-10-4.4771525-10-10 4.4771525-10 10-10zm0 1c-4.97056275 0-9 4.02943725-9 9 0 4.9705627 4.02943725 9 9 9 4.9705627 0 9-4.0294373 9-9 0-4.97056275-4.0294373-9-9-9zm4.2199868 5.36606669c.3613514-.43716226.9989118-.49032077 1.424031-.11873285s.4768133 1.02720949.115462 1.46437175l-6.093335 6.94397871c-.3622945.4128716-.9897871.4562317-1.4054264.0971157l-3.89719065-3.3672071c-.42862421-.3673054-.48653564-1.0223772-.1293488-1.4631437s.99421256-.5003185 1.42283677-.1330131l3.11097438 2.6987741z" fill-rule="evenodd"/></symbol><symbol id="icon-tick" viewBox="0 0 16 16"><path d="m6.76799012 9.21106946-3.1109744-2.58349728c-.42862421-.35161617-1.06564993-.29460792-1.42283677.12733148s-.29927541 1.04903009.1293488 1.40064626l3.91576307 3.23873978c.41034319.3393961 1.01467563.2976897 1.37450571-.0948578l6.10568327-6.660841c.3613513-.41848908.3096572-1.04610608-.115462-1.4018218-.4251192-.35571573-1.0626796-.30482786-1.424031.11366122z" fill-rule="evenodd"/></symbol><symbol id="icon-update" viewBox="0 0 18 18"><path d="m1 13v1c0 .5522847.44771525 1 1 1h14c.5522847 0 1-.4477153 1-1v-1h-1v-10h-14v10zm16-1h1v2c0 1.1045695-.8954305 2-2 2h-14c-1.1045695 0-2-.8954305-2-2v-2h1v-9c0-.55228475.44771525-1 1-1h14c.5522847 0 1 .44771525 1 1zm-1 0v1h-4.5857864l-1 1h-2.82842716l-1-1h-4.58578644v-1h5l1 1h2l1-1zm-13-8h12v7h-12zm1 1v5h10v-5zm1 1h4v1h-4zm0 2h4v1h-4z" fill-rule="evenodd"/></symbol><symbol id="icon-upload" viewBox="0 0 18 18"><path d="m10.0046024 0c.5497429 0 1.3179837.32258606 1.707238.71184039l4.5763192 4.57631922c.3931386.39313859.7118404 1.16760135.7118404 1.71431368v8.98899651c0 1.1092806-.8945138 2.0085302-1.9940603 2.0085302h-12.01187942c-1.10128908 0-1.99406028-.8926228-1.99406028-1.9950893v-14.00982141c0-1.10185739.88743329-1.99508929 1.99961498-1.99508929zm0 1h-7.00498742c-.55709576 0-.99961498.44271433-.99961498.99508929v14.00982141c0 .5500396.44491393.9950893.99406028.9950893h12.01187942c.5463747 0 .9940603-.4506622.9940603-1.0085302v-8.98899651c0-.28393444-.2150684-.80332809-.4189472-1.0072069l-4.5763192-4.57631922c-.2038461-.20384606-.718603-.41894717-1.0001312-.41894717zm-1.85576936 4.14572769c.19483374-.19483375.51177826-.19377714.70556874.00001334l2.59099082 2.59099079c.1948411.19484112.1904373.51514474.0027906.70279143-.1932998.19329987-.5046517.19237083-.7001856-.00692852l-1.74638687-1.7800176v6.14827687c0 .2717771-.23193359.492096-.5.492096-.27614237 0-.5-.216372-.5-.492096v-6.14827641l-1.74627892 1.77990922c-.1933927.1971171-.51252214.19455839-.70016883.0069117-.19329987-.19329988-.19100584-.50899493.00277731-.70277808z" fill-rule="evenodd"/></symbol><symbol id="icon-video" viewBox="0 0 18 18"><path d="m16.0049107 2c1.1018574 0 1.9950893.89706013 1.9950893 2.00585866v9.98828264c0 1.1078052-.8926228 2.0058587-1.9950893 2.0058587h-14.00982141c-1.10185739 0-1.99508929-.8970601-1.99508929-2.0058587v-9.98828264c0-1.10780515.8926228-2.00585866 1.99508929-2.00585866zm0 1h-14.00982141c-.54871518 0-.99508929.44887827-.99508929 1.00585866v9.98828264c0 .5572961.44630695 1.0058587.99508929 1.0058587h14.00982141c.5487152 0 .9950893-.4488783.9950893-1.0058587v-9.98828264c0-.55729607-.446307-1.00585866-.9950893-1.00585866zm-8.30912922 2.24944486 4.60460462 2.73982242c.9365543.55726659.9290753 1.46522435 0 2.01804082l-4.60460462 2.7398224c-.93655425.5572666-1.69578148.1645632-1.69578148-.8937585v-5.71016863c0-1.05087579.76670616-1.446575 1.69578148-.89375851zm-.67492769.96085624v5.5750128c0 .2995102-.10753745.2442517.16578928.0847713l4.58452283-2.67497259c.3050619-.17799716.3051624-.21655446 0-.39461026l-4.58452283-2.67497264c-.26630747-.15538481-.16578928-.20699944-.16578928.08477139z" fill-rule="evenodd"/></symbol><symbol id="icon-warning" viewBox="0 0 18 18"><path d="m9 11.75c.69035594 0 1.25.5596441 1.25 1.25s-.55964406 1.25-1.25 1.25-1.25-.5596441-1.25-1.25.55964406-1.25 1.25-1.25zm.41320045-7.75c.55228475 0 1.00000005.44771525 1.00000005 1l-.0034543.08304548-.3333333 4c-.043191.51829212-.47645714.91695452-.99654578.91695452h-.15973424c-.52008864 0-.95335475-.3986624-.99654576-.91695452l-.33333333-4c-.04586475-.55037702.36312325-1.03372649.91350028-1.07959124l.04148683-.00259031zm-.41320045 14c-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9 4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-left-bullet" viewBox="0 0 8 16"><path d="M3 8l5 5v3L0 8l8-8v3L3 8z"/></symbol><symbol id="icon-chevron-down" viewBox="0 0 16 16"><path d="m5.58578644 3-3.29289322-3.29289322c-.39052429-.39052429-.39052429-1.02368927 0-1.41421356s1.02368927-.39052429 1.41421356 0l4 4c.39052429.39052429.39052429 1.02368927 0 1.41421356l-4 4c-.39052429.39052429-1.02368927.39052429-1.41421356 0s-.39052429-1.02368927 0-1.41421356z" fill-rule="evenodd" transform="matrix(0 1 -1 0 11 3)"/></symbol><symbol id="icon-download-rounded"><path d="M0 13c0-.556.449-1 1.002-1h9.996a.999.999 0 110 2H1.002A1.006 1.006 0 010 13zM7 1v6.8l2.482-2.482c.392-.392 1.022-.4 1.403-.02a1.001 1.001 0 010 1.417l-4.177 4.177a1.001 1.001 0 01-1.416 0L1.115 6.715a.991.991 0 01-.016-1.4 1 1 0 011.42.003L5 7.8V1c0-.55.444-.996 1-.996.552 0 1 .445 1 .996z"/></symbol><symbol id="icon-ext-link" viewBox="0 0 16 16"><path d="M12.9 16H3.1C1.4 16 0 14.6 0 12.9V3.2C0 1.4 1.4 0 3.1 0h3.7v1H3.1C2 1 1 2 1 3.2v9.7C1 14 2 15 3.1 15h9.7c1.2 0 2.1-1 2.1-2.1V8.7h1v4.2c.1 1.7-1.3 3.1-3 3.1z"/><path d="M12.8 2.5l.7.7-9 8.9-.7-.7 9-8.9z"/><path d="M9.7 0L16 6.2V0z"/></symbol><symbol id="icon-remove" viewBox="-296 388 18 18"><path d="M-291.7 396.1h9v2h-9z"/><path d="M-287 405.5c-4.7 0-8.5-3.8-8.5-8.5s3.8-8.5 8.5-8.5 8.5 3.8 8.5 8.5-3.8 8.5-8.5 8.5zm0-16c-4.1 0-7.5 3.4-7.5 7.5s3.4 7.5 7.5 7.5 7.5-3.4 7.5-7.5-3.4-7.5-7.5-7.5z"/></symbol><symbol id="icon-rss" viewBox="0 0 18 18"><path d="m.97480857 6.01583891.11675372.00378391c5.75903295.51984988 10.34261021 5.10537458 10.85988231 10.86480098.0494035.5500707-.3564674 1.0360406-.906538 1.0854441-.5500707.0494036-1.0360406-.3564673-1.08544412-.906538-.43079083-4.7965248-4.25151132-8.61886853-9.04770289-9.05180573-.55004837-.04965115-.95570047-.53580366-.90604933-1.08585203.04610464-.5107592.46858035-.89701345.96909831-.90983323zm1.52519143 6.95474179c1.38071187 0 2.5 1.1192881 2.5 2.5s-1.11928813 2.5-2.5 2.5-2.5-1.1192881-2.5-2.5 1.11928813-2.5 2.5-2.5zm-1.43253846-12.96884168c9.09581416.53242539 16.37540296 7.8163886 16.90205336 16.91294558.0319214.5513615-.389168 1.0242056-.9405294 1.056127-.5513615.0319214-1.0242057-.389168-1.0561271-.9405294-.4679958-8.08344784-6.93949306-14.55883389-15.02226722-15.03196077-.55134101-.03227286-.97212889-.50538538-.93985602-1.05672639.03227286-.551341.50538538-.97212888 1.05672638-.93985602z" fill-rule="evenodd"/></symbol><symbol id="icon-springer-arrow-left"><path d="M15 7a1 1 0 000-2H3.385l2.482-2.482a.994.994 0 00.02-1.403 1.001 1.001 0 00-1.417 0L.294 5.292a1.001 1.001 0 000 1.416l4.176 4.177a.991.991 0 001.4.016 1 1 0 00-.003-1.42L3.385 7H15z"/></symbol><symbol id="icon-springer-arrow-right"><path d="M1 7a1 1 0 010-2h11.615l-2.482-2.482a.994.994 0 01-.02-1.403 1.001 1.001 0 011.417 0l4.176 4.177a1.001 1.001 0 010 1.416l-4.176 4.177a.991.991 0 01-1.4.016 1 1 0 01.003-1.42L12.615 7H1z"/></symbol><symbol id="icon-springer-collections" viewBox="3 3 32 32"><path fill-rule="evenodd" d="M25.583333,30.1249997 L25.583333,7.1207574 C25.583333,7.10772495 25.579812,7.10416665 25.5859851,7.10416665 L6.10400517,7.10571021 L6.10400517,30.1355179 C6.10400517,31.1064087 6.89406744,31.8958329 7.86448169,31.8958329 L26.057145,31.8958329 C25.7558021,31.374901 25.583333,30.7700915 25.583333,30.1249997 Z M4.33333333,30.1355179 L4.33333333,7.10571021 C4.33333333,6.12070047 5.12497502,5.33333333 6.10151452,5.33333333 L25.5859851,5.33333333 C26.5617372,5.33333333 27.3541664,6.13359035 27.3541664,7.1207574 L27.3541664,12.4166666 L32.6666663,12.4166666 L32.6666663,30.1098941 C32.6666663,32.0694626 31.0857174,33.6666663 29.1355179,33.6666663 L7.86448169,33.6666663 C5.91736809,33.6666663 4.33333333,32.0857174 4.33333333,30.1355179 Z M27.3541664,14.1874999 L27.3541664,30.1249997 C27.3541664,31.1030039 28.1469954,31.8958329 29.1249997,31.8958329 C30.1030039,31.8958329 30.8958329,31.1030039 30.8958329,30.1249997 L30.8958329,14.1874999 L27.3541664,14.1874999 Z M9.64583326,10.6458333 L22.0416665,10.6458333 L22.0416665,17.7291665 L9.64583326,17.7291665 L9.64583326,10.6458333 Z M11.4166666,12.4166666 L11.4166666,15.9583331 L20.2708331,15.9583331 L20.2708331,12.4166666 L11.4166666,12.4166666 Z M9.64583326,19.4999998 L22.0416665,19.4999998 L22.0416665,21.2708331 L9.64583326,21.2708331 L9.64583326,19.4999998 Z M9.64583326,23.0416665 L22.0416665,23.0416665 L22.0416665,24.8124997 L9.64583326,24.8124997 L9.64583326,23.0416665 Z M9.64583326,26.583333 L22.0416665,26.583333 L22.0416665,28.3541664 L9.64583326,28.3541664 L9.64583326,26.583333 Z"/></symbol><symbol id="icon-springer-download" viewBox="-301 390 9 14"><path d="M-301 395.6l4.5 5.1 4.5-5.1h-3V390h-3v5.6h-3zm0 6.5h9v1.9h-9z"/></symbol><symbol id="icon-springer-info" viewBox="0 0 24 24"><!--Generator: Sketch 63.1 (92452) - https://sketch.com--><g id="V&amp;I" stroke="none" stroke-width="1" fill-rule="evenodd"><g id="info" fill-rule="nonzero"><path d="M12,0 C18.627417,0 24,5.372583 24,12 C24,18.627417 18.627417,24 12,24 C5.372583,24 0,18.627417 0,12 C0,5.372583 5.372583,0 12,0 Z M12.5540543,9.1 L11.5540543,9.1 C11.0017696,9.1 10.5540543,9.54771525 10.5540543,10.1 L10.5540543,10.1 L10.5540543,18.1 C10.5540543,18.6522847 11.0017696,19.1 11.5540543,19.1 L11.5540543,19.1 L12.5540543,19.1 C13.1063391,19.1 13.5540543,18.6522847 13.5540543,18.1 L13.5540543,18.1 L13.5540543,10.1 C13.5540543,9.54771525 13.1063391,9.1 12.5540543,9.1 L12.5540543,9.1 Z M12,5 C11.5356863,5 11.1529412,5.14640523 10.8517647,5.43921569 C10.5505882,5.73202614 10.4,6.11546841 10.4,6.58954248 C10.4,7.06361656 10.5505882,7.45054466 10.8517647,7.7503268 C11.1529412,8.05010893 11.5356863,8.2 12,8.2 C12.4768627,8.2 12.8627451,8.05010893 13.1576471,7.7503268 C13.452549,7.45054466 13.6,7.06361656 13.6,6.58954248 C13.6,6.11546841 13.452549,5.73202614 13.1576471,5.43921569 C12.8627451,5.14640523 12.4768627,5 12,5 Z" id="Combined-Shape"/></g></g></symbol><symbol id="icon-springer-tick-circle" viewBox="0 0 24 24"><g id="Page-1" stroke="none" stroke-width="1" fill-rule="evenodd"><g id="springer-tick-circle" fill-rule="nonzero"><path d="M12,24 C5.372583,24 0,18.627417 0,12 C0,5.372583 5.372583,0 12,0 C18.627417,0 24,5.372583 24,12 C24,18.627417 18.627417,24 12,24 Z M7.657,10.79 C7.45285634,10.6137568 7.18569967,10.5283283 6.91717333,10.5534259 C6.648647,10.5785236 6.40194824,10.7119794 6.234,10.923 C5.87705269,11.3666969 5.93445559,12.0131419 6.364,12.387 L10.261,15.754 C10.6765468,16.112859 11.3037113,16.0695601 11.666,15.657 L17.759,8.713 C18.120307,8.27302248 18.0695334,7.62621189 17.644,7.248 C17.4414817,7.06995024 17.1751516,6.9821166 16.9064461,7.00476032 C16.6377406,7.02740404 16.3898655,7.15856958 16.22,7.368 L10.768,13.489 L7.657,10.79 Z" id="path-1"/></g></g></symbol><symbol id="icon-updates" viewBox="0 0 18 18"><g fill-rule="nonzero"><path d="M16.98 3.484h-.48c-2.52-.058-5.04 1.161-7.44 2.903-2.46-1.8-4.74-2.903-8.04-2.903-.3 0-.54.29-.54.58v9.813c0 .29.24.523.54.581 2.76.348 4.86 1.045 7.62 2.903.24.116.54.116.72 0 2.76-1.858 4.86-2.555 7.62-2.903.3-.058.54-.29.54-.58V4.064c0-.29-.24-.523-.54-.581zm-15.3 1.22c2.34 0 4.86 1.509 6.72 2.786v8.478c-2.34-1.394-4.38-2.09-6.72-2.439V4.703zm14.58 8.767c-2.34.348-4.38 1.045-6.72 2.439V7.374C12 5.632 14.1 4.645 16.26 4.645v8.826z"/><path d="M9 .058c-1.56 0-2.76 1.22-2.76 2.671C6.24 4.181 7.5 5.4 9 5.4c1.5 0 2.76-1.22 2.76-2.671 0-1.452-1.2-2.67-2.76-2.67zm0 4.413c-.96 0-1.8-.755-1.8-1.742C7.2 1.8 7.98.987 9 .987s1.8.755 1.8 1.742c0 .93-.84 1.742-1.8 1.742z"/></g></symbol><symbol id="icon-checklist-banner" viewBox="0 0 56.69 56.69"><path style="fill:none" d="M0 0h56.69v56.69H0z"/><clipPath id="b"><use xlink:href="#a" style="overflow:visible"/></clipPath><path d="M21.14 34.46c0-6.77 5.48-12.26 12.24-12.26s12.24 5.49 12.24 12.26-5.48 12.26-12.24 12.26c-6.76-.01-12.24-5.49-12.24-12.26zm19.33 10.66 10.23 9.22s1.21 1.09 2.3-.12l2.09-2.32s1.09-1.21-.12-2.3l-10.23-9.22m-19.29-5.92c0-4.38 3.55-7.94 7.93-7.94s7.93 3.55 7.93 7.94c0 4.38-3.55 7.94-7.93 7.94-4.38-.01-7.93-3.56-7.93-7.94zm17.58 12.99 4.14-4.81" style="clip-path:url(#b);fill:none;stroke:#01324b;stroke-width:2;stroke-linecap:round"/><path d="M8.26 9.75H28.6M8.26 15.98H28.6m-20.34 6.2h12.5m14.42-5.2V4.86s0-2.93-2.93-2.93H4.13s-2.93 0-2.93 2.93v37.57s0 2.93 2.93 2.93h15.01M8.26 9.75H28.6M8.26 15.98H28.6m-20.34 6.2h12.5" style="clip-path:url(#b);fill:none;stroke:#01324b;stroke-width:2;stroke-linecap:round;stroke-linejoin:round"/></symbol><symbol id="icon-submit-closed" viewBox="0 0 18 18"><path d="m15 0c1.1045695 0 2 .8954305 2 2v4.5c0 .27614237-.2238576.5-.5.5s-.5-.22385763-.5-.5v-4.5c0-.51283584-.3860402-.93550716-.8833789-.99327227l-.1166211-.00672773h-9v3c0 1.1045695-.8954305 2-2 2h-3v10c0 .5128358.38604019.9355072.88337887.9932723l.11662113.0067277h4.5c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-4.5c-1.1045695 0-2-.8954305-2-2v-10.17157288c0-.53043297.21071368-1.0391408.58578644-1.41421356l3.82842712-3.82842712c.37507276-.37507276.88378059-.58578644 1.41421356-.58578644zm-2.5 7c3.0375661 0 5.5 2.46243388 5.5 5.5 0 3.0375661-2.4624339 5.5-5.5 5.5-3.03756612 0-5.5-2.4624339-5.5-5.5 0-3.03756612 2.46243388-5.5 5.5-5.5zm0 1c-2.4852814 0-4.5 2.0147186-4.5 4.5s2.0147186 4.5 4.5 4.5 4.5-2.0147186 4.5-4.5-2.0147186-4.5-4.5-4.5zm2.3087379 2.1912621c.2550161.2550162.2550161.668479 0 .9234952l-1.3859024 1.3845831 1.3859024 1.3859023c.2550161.2550162.2550161.668479 0 .9234952-.2550162.2550161-.668479.2550161-.9234952 0l-1.3859023-1.3859024-1.3845831 1.3859024c-.2550162.2550161-.668479.2550161-.9234952 0-.25501614-.2550162-.25501614-.668479 0-.9234952l1.3845831-1.3859023-1.3845831-1.3845831c-.25501614-.2550162-.25501614-.668479 0-.9234952.2550162-.25501614.668479-.25501614.9234952 0l1.3845831 1.3845831 1.3859023-1.3845831c.2550162-.25501614.668479-.25501614.9234952 0zm-9.8087379-8.7782621-3.587 3.587h2.587c.55228475 0 1-.44771525 1-1z"/></symbol><symbol id="icon-submit-open" viewBox="0 0 18 18"><path d="m15 0c1.1045695 0 2 .8954305 2 2v5.5c0 .27614237-.2238576.5-.5.5s-.5-.22385763-.5-.5v-5.5c0-.51283584-.3860402-.93550716-.8833789-.99327227l-.1166211-.00672773h-9v3c0 1.1045695-.8954305 2-2 2h-3v10c0 .5128358.38604019.9355072.88337887.9932723l.11662113.0067277h7.5c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-7.5c-1.1045695 0-2-.8954305-2-2v-10.17157288c0-.53043297.21071368-1.0391408.58578644-1.41421356l3.82842712-3.82842712c.37507276-.37507276.88378059-.58578644 1.41421356-.58578644zm-.5442863 8.18867991 3.3545404 3.35454039c.2508994.2508994.2538696.6596433.0035959.909917-.2429543.2429542-.6561449.2462671-.9065387-.0089489l-2.2609825-2.3045251.0010427 7.2231989c0 .3569916-.2898381.6371378-.6473715.6371378-.3470771 0-.6473715-.2852563-.6473715-.6371378l-.0010428-7.2231995-2.2611222 2.3046654c-.2531661.2580415-.6562868.2592444-.9065605.0089707-.24295423-.2429542-.24865597-.6576651.0036132-.9099343l3.3546673-3.35466731c.2509089-.25090888.6612706-.25227691.9135302-.00001728zm-.9557137-3.18867991c.2761424 0 .5.22385763.5.5s-.2238576.5-.5.5h-6c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm-8.5-3.587-3.587 3.587h2.587c.55228475 0 1-.44771525 1-1zm8.5 1.587c.2761424 0 .5.22385763.5.5s-.2238576.5-.5.5h-6c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5z"/></symbol><symbol id="icon-submit-upcoming" viewBox="0 0 18 18"><path d="m15 0c1.1045695 0 2 .8954305 2 2v4.5c0 .27614237-.2238576.5-.5.5s-.5-.22385763-.5-.5v-4.5c0-.51283584-.3860402-.93550716-.8833789-.99327227l-.1166211-.00672773h-9v3c0 1.1045695-.8954305 2-2 2h-3v10c0 .5128358.38604019.9355072.88337887.9932723l.11662113.0067277h4.5c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-4.5c-1.1045695 0-2-.8954305-2-2v-10.17157288c0-.53043297.21071368-1.0391408.58578644-1.41421356l3.82842712-3.82842712c.37507276-.37507276.88378059-.58578644 1.41421356-.58578644zm-2.5 7c3.0375661 0 5.5 2.46243388 5.5 5.5 0 3.0375661-2.4624339 5.5-5.5 5.5-3.03756612 0-5.5-2.4624339-5.5-5.5 0-1.6607442.73606908-3.14957021 1.89976608-4.15803695l-1.51549374.02214397c-.27613212.00263356-.49998143-.22483432-.49998143-.49020681 0-.24299316.17766103-.44509007.40961587-.48700057l.08928713-.00797472h2.66407569c.2449213 0 .4486219.17766776.490865.40963137l.008038.08929051v2.6642143c0 .275547-.2296028.4989219-.4949753.4989219-.24299317 0-.44342617-.1744719-.4830969-.4093269l-.00710993-.0906783.01983146-1.46576707c-.96740882.82538117-1.58082193 2.05345007-1.58082193 3.42478927 0 2.4852814 2.0147186 4.5 4.5 4.5s4.5-2.0147186 4.5-4.5-2.0147186-4.5-4.5-4.5c-.7684937 0-.7684937-1 0-1zm0 2.85c.3263501 0 .5965265.2405082.6429523.5539478l.0070477.0960522v1.731l.8096194.8093806c.2284567.2284567.2513024.5846637.068537.8386705l-.068537.0805683c-.2284567.2284567-.5846637.2513024-.8386705.068537l-.0805683-.068537-.9707107-.9707107c-.1125218-.1125218-.1855975-.257116-.2103268-.412296l-.0093431-.1180341v-1.9585786c0-.3589851.2910149-.65.65-.65zm-7.5-8.437-3.587 3.587h2.587c.55228475 0 1-.44771525 1-1z"/></symbol><symbol id="icon-facebook-bordered" viewBox="463.812 263.868 32 32"><path d="M479.812,263.868c-8.837,0-16,7.163-16,16s7.163,16,16,16s16-7.163,16-16S488.649,263.868,479.812,263.868z M479.812,293.868c-7.732,0-14-6.269-14-14s6.268-14,14-14s14,6.269,14,14S487.545,293.868,479.812,293.868z"/><path d="M483.025,280.48l0.32-2.477h-2.453v-1.582c0-0.715,0.199-1.207,1.227-1.207h1.311v-2.213 c-0.227-0.029-1.003-0.098-1.907-0.098c-1.894,0-3.186,1.154-3.186,3.271v1.826h-2.142v2.477h2.142v6.354h2.557v-6.354 L483.025,280.48L483.025,280.48z"/></symbol><symbol id="icon-twitter-bordered" viewBox="463.812 263.868 32 32"><g><path d="M486.416,276.191c-0.483,0.215-1.007,0.357-1.554,0.429c0.558-0.338,0.991-0.868,1.19-1.502 c-0.521,0.308-1.104,0.536-1.72,0.657c-0.494-0.526-1.2-0.854-1.979-0.854c-1.496,0-2.711,1.213-2.711,2.71 c0,0.212,0.023,0.419,0.069,0.616c-2.252-0.111-4.25-1.19-5.586-2.831c-0.231,0.398-0.365,0.866-0.365,1.361 c0,0.94,0.479,1.772,1.204,2.257c-0.441-0.015-0.861-0.138-1.227-0.339v0.031c0,1.314,0.937,2.41,2.174,2.656 c-0.227,0.062-0.47,0.098-0.718,0.098c-0.171,0-0.343-0.018-0.511-0.049c0.35,1.074,1.347,1.859,2.531,1.883 c-0.928,0.726-2.095,1.16-3.366,1.16c-0.22,0-0.433-0.014-0.644-0.037c1.2,0.768,2.621,1.215,4.155,1.215 c4.983,0,7.71-4.129,7.71-7.711c0-0.115-0.004-0.232-0.006-0.351C485.592,277.212,486.054,276.734,486.416,276.191z"/></g><path d="M479.812,263.868c-8.837,0-16,7.163-16,16s7.163,16,16,16s16-7.163,16-16S488.649,263.868,479.812,263.868z M479.812,293.868c-7.732,0-14-6.269-14-14s6.268-14,14-14s14,6.269,14,14S487.545,293.868,479.812,293.868z"/></symbol><symbol id="icon-weibo-bordered" viewBox="463.812 263.868 32 32"><path d="M479.812,263.868c-8.838,0-16,7.163-16,16s7.162,16,16,16c8.837,0,16-7.163,16-16S488.649,263.868,479.812,263.868z M479.812,293.868c-7.732,0-14-6.269-14-14s6.268-14,14-14c7.731,0,14,6.269,14,14S487.545,293.868,479.812,293.868z"/><g><path d="M478.552,285.348c-2.616,0.261-4.876-0.926-5.044-2.649c-0.167-1.722,1.814-3.33,4.433-3.588 c2.609-0.263,4.871,0.926,5.041,2.647C483.147,283.479,481.164,285.089,478.552,285.348 M483.782,279.63 c-0.226-0.065-0.374-0.109-0.259-0.403c0.25-0.639,0.276-1.188,0.005-1.581c-0.515-0.734-1.915-0.693-3.521-0.021 c0,0-0.508,0.224-0.378-0.181c0.247-0.798,0.209-1.468-0.178-1.852c-0.87-0.878-3.194,0.032-5.183,2.027 c-1.489,1.494-2.357,3.082-2.357,4.453c0,2.619,3.354,4.213,6.631,4.213c4.297,0,7.154-2.504,7.154-4.493 C485.697,280.594,484.689,279.911,483.782,279.63"/><path d="M486.637,274.833c-1.039-1.154-2.57-1.592-3.982-1.291l0,0c-0.325,0.068-0.532,0.391-0.465,0.72 c0.068,0.328,0.391,0.537,0.72,0.466c1.005-0.215,2.092,0.104,2.827,0.92c0.736,0.818,0.938,1.939,0.625,2.918l0,0 c-0.102,0.318,0.068,0.661,0.39,0.762c0.32,0.104,0.658-0.069,0.763-0.391v-0.001C487.953,277.558,487.674,275.985,486.637,274.833 "/><path d="M485.041,276.276c-0.504-0.562-1.25-0.774-1.938-0.63c-0.279,0.06-0.461,0.339-0.396,0.621 c0.062,0.281,0.335,0.461,0.617,0.398l0,0c0.336-0.071,0.702,0.03,0.947,0.307s0.312,0.649,0.207,0.979l0,0 c-0.089,0.271,0.062,0.565,0.336,0.654c0.274,0.09,0.564-0.062,0.657-0.336C485.686,277.604,485.549,276.837,485.041,276.276"/><path d="M478.694,282.227c-0.09,0.156-0.293,0.233-0.451,0.166c-0.151-0.062-0.204-0.235-0.115-0.389 c0.093-0.155,0.284-0.229,0.44-0.168C478.725,281.892,478.782,282.071,478.694,282.227 M477.862,283.301 c-0.253,0.405-0.795,0.58-1.202,0.396c-0.403-0.186-0.521-0.655-0.27-1.051c0.248-0.39,0.771-0.566,1.176-0.393 C477.979,282.423,478.109,282.889,477.862,283.301 M478.812,280.437c-1.244-0.326-2.65,0.294-3.19,1.396 c-0.553,1.119-0.021,2.369,1.236,2.775c1.303,0.42,2.84-0.225,3.374-1.436C480.758,281.989,480.1,280.77,478.812,280.437"/></g></symbol></svg> </div> <div class="u-vh-full"> <a class="c-skip-link" href="#main-content">Skip to main content</a> <div class="u-hide u-show-following-ad"></div> <aside class="adsbox c-ad c-ad--728x90" data-component-mpu> <div class="c-ad__inner"> <p class="c-ad__label">Advertisement</p> <div id="div-gpt-ad-LB1" data-ad-type="LB1" data-test="LB1-ad" data-pa11y-ignore data-gpt data-gpt-unitpath="/270604982/springer_open/epjquantumtechnology/articles" data-gpt-sizes="728x90,970x90" data-gpt-targeting="pos=LB1;doi=10.1140/epjqt/s40507-023-00210-0;type=article;kwrd=Quantum key distribution,Decoy state,Phase randomization,Source imperfections;pmc=P19080,P31070,T18000;sponsored=SQC;" > <noscript> <a href="//pubads.g.doubleclick.net/gampad/jump?iu=/270604982/springer_open/epjquantumtechnology/articles&amp;sz=728x90,970x90&amp;pos=LB1&amp;doi=10.1140/epjqt/s40507-023-00210-0&amp;type=article&amp;kwrd=Quantum key distribution,Decoy state,Phase randomization,Source imperfections&amp;pmc=P19080,P31070,T18000&amp;sponsored=SQC&amp;"> <img data-test="gpt-advert-fallback-img" src="//pubads.g.doubleclick.net/gampad/ad?iu=/270604982/springer_open/epjquantumtechnology/articles&amp;sz=728x90,970x90&amp;pos=LB1&amp;doi=10.1140/epjqt/s40507-023-00210-0&amp;type=article&amp;kwrd=Quantum key distribution,Decoy state,Phase randomization,Source imperfections&amp;pmc=P19080,P31070,T18000&amp;sponsored=SQC&amp;" alt="Advertisement" width="728" height="90"> </a> </noscript> </div> </div> </aside> <div id="membership-message-loader-desktop" class="placeholder" data-placeholder="/placeholder/v1/membership/message"></div> <div id="top" class="u-position-relative"> <header class="c-header" data-test="publisher-header"> <div class="c-header__container"> <div class="c-header__brand u-mr-48" itemscope itemtype="http://schema.org/Organization" data-test="navbar-logo-header"> <a href="https://www.springeropen.com" itemprop="url"> <img alt="SpringerOpen" itemprop="logo" width="160" height="30" role="img" src=/static/images/springeropen/logo-springer-open-d04c3ea16c.svg> </a> </div> <div class="c-header__navigation"> <button type="button" class="c-header__link u-button-reset u-mr-24" data-expander data-expander-target="#publisher-header-search" data-expander-autofocus="firstTabbable" data-test="header-search-button" aria-controls="publisher-header-search" aria-expanded="false"> <span class="u-display-flex u-align-items-center"> <span>Search</span> <svg class="u-icon u-flex-static u-ml-8" aria-hidden="true" focusable="false"> <use xlink:href="#icon-search"></use> </svg> </span> </button> <nav> <ul class="c-header__menu" data-enhanced-menu data-test="publisher-navigation"> <li class="c-header__item u-hide-at-lt-lg"> <a class="c-header__link" href="//www.springeropen.com/get-published"> Get published </a> </li> <li class="c-header__item u-hide-at-lt-lg"> <a class="c-header__link" href="//www.springeropen.com/journals"> Explore Journals </a> </li> <li class="c-header__item u-hide-at-lt-lg"> <a class="c-header__link" href="https://www.springer.com/gp/open-access/books"> Books </a> </li> <li class="c-header__item u-hide-at-lt-lg"> <a class="c-header__link" href="//www.springeropen.com/about"> About </a> </li> <li class="c-header__item"> <a data-enhanced-account class="c-header__link" href="https://www.springeropen.com/account" data-test="login-link"> My account </a> </li> </ul> </nav> </div> </div> </header> <div class="c-popup-search u-js-hide" id="publisher-header-search"> <div class="u-container"> <div class="c-popup-search__container"> <div class="ctx-search"> <form role="search" class="c-form-field js-skip-validation" method="GET" action="//www.springeropen.com/search" data-track="search" data-track-context="pop out website-wide search in bmc website header" data-track-category="Search and Results" data-track-action="Submit search" data-dynamic-track-label data-track-label="" data-test="global-search"> <label for="publisherSearch" class="c-form-field__label">Search all SpringerOpen articles</label> <div class="u-display-flex"> <input id="publisherSearch" class="c-form-field__input" data-search-input autocomplete="off" role="textbox" data-test="search-input" name="query" type="text" value=""/> <div> <button class="u-button u-button--primary" type="submit" data-test="search-submit-button"> <span class="u-visually-hidden">Search</span> <svg class="u-icon u-flex-static" width="16" height="16" aria-hidden="true" focusable="false"> <use xlink:href="#icon-search"></use> </svg> </button> </div> </div> <input type="hidden" name="searchType" value="publisherSearch"/> </form> </div> </div> </div> </div> </div> <header class="c-journal-header ctx-journal-header"> <div class="u-container"> <div class="c-journal-header__grid"> <div class="c-journal-header__grid-main"> <div class="h2 c-journal-header__title" id="journalTitle"> <a href="/">EPJ Quantum Technology</a> </div> </div> </div> </div> <div class="c-navbar c-navbar--with-submit-button"> <div class="c-navbar__container"> <div class="c-navbar__content"> <nav class="c-navbar__nav"> <ul class="c-navbar__nav c-navbar__nav--journal" role="menu" data-test="site-navigation"> <li class="c-navbar__item" role="menuitem"> <a class="c-navbar__link" data-track="click" data-track-category="About" data-track-action="Clicked journal navigation link" href='/about'>About</a> </li> <li class="c-navbar__item" role="menuitem"> <a class="c-navbar__link c-navbar__link--is-shown" data-track="click" data-track-category="Articles" data-track-action="Clicked journal navigation link" href='/articles'>Articles</a> </li> <li class="c-navbar__item" role="menuitem"> <a class="c-navbar__link" data-track="click" data-track-category="Submission Guidelines" data-track-action="Clicked journal navigation link" href='/submission-guidelines'>Submission Guidelines</a> </li> <li class="c-navbar__item" role="menuitem" data-test="journal-header-submit-button"> <div class=""> <a class="u-button u-button--tertiary u-button--alt-colour-on-mobile" href="https://submission.nature.com/new-submission/40507/3" data-track="click_submit_manuscript" data-track-action="manuscript submission" data-track-category="article" data-track-label="button in journal nav" data-track-context="journal header on article page" data-track-external data-test="submit-manuscript-button">Submit manuscript<svg class="u-ml-8" width="15" height="16" aria-hidden="true" focusable="false"><use xlink:href="#icon-submit-open"></use></svg></a> </div> </li> </ul> </nav> </div> </div> </div> </header> <div class="u-container u-mt-32 u-mb-32 u-clearfix" id="main-content" data-component="article-container"> <main class="c-article-main-column u-float-left js-main-column" data-track-component="article body"> <div class="c-context-bar u-hide" data-test="context-bar" data-context-bar aria-hidden="true"> <div class="c-context-bar__container u-container" data-track-context="sticky banner"> <div class="c-context-bar__title"> Secret key rate bounds for quantum key distribution with faulty active phase randomization </div> <div class="c-pdf-container"> <div class="c-pdf-download u-clear-both"> <a href="//epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-023-00210-0.pdf" class="u-button u-button--full-width u-button--primary u-justify-content-space-between c-pdf-download__link" data-article-pdf="true" data-readcube-pdf-url="true" data-test="pdf-link" data-draft-ignore="true" data-track="content_download" data-track-type="article pdf download" data-track-action="download pdf" data-track-label="link" data-track-external download> <span class="c-pdf-download__text">Download PDF</span> <svg aria-hidden="true" focusable="false" width="16" height="16" class="u-icon"><use xlink:href="#icon-download"/></svg> </a> </div> </div> </div> </div> <div class="c-pdf-button__container u-hide-at-lg js-context-bar-sticky-point-mobile"> <div class="c-pdf-container" data-track-context="article body"> <div class="c-pdf-download u-clear-both"> <a href="//epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-023-00210-0.pdf" class="u-button u-button--full-width u-button--primary u-justify-content-space-between c-pdf-download__link" data-article-pdf="true" data-readcube-pdf-url="true" data-test="pdf-link" data-draft-ignore="true" data-track="content_download" data-track-type="article pdf download" data-track-action="download pdf" data-track-label="link" data-track-external download> <span class="c-pdf-download__text">Download PDF</span> <svg aria-hidden="true" focusable="false" width="16" height="16" class="u-icon"><use xlink:href="#icon-download"/></svg> </a> </div> </div> </div> <article lang="en"> <div class="c-article-header"> <ul class="c-article-identifiers" data-test="article-identifier"> <li class="c-article-identifiers__item" data-test="article-category">Research</li> <li class="c-article-identifiers__item"> <a href="https://www.springernature.com/gp/open-research/about/the-fundamentals-of-open-access-and-open-research" data-track="click" data-track-action="open access" data-track-label="link" class="u-color-open-access" data-test="open-access">Open access</a> </li> <li class="c-article-identifiers__item">Published: <time datetime="2023-12-15">15 December 2023</time></li> </ul> <h1 class="c-article-title" data-test="article-title" data-article-title="">Secret key rate bounds for quantum key distribution with faulty active phase randomization</h1> <ul class="c-article-author-list c-article-author-list--short" data-test="authors-list" data-component-authors-activator="authors-list"><li class="c-article-author-list__item"><a data-test="author-name" data-track="click" data-track-action="open author" data-track-label="link" href="#auth-Xoel-Sixto-Aff1-Aff2-Aff3" data-author-popup="auth-Xoel-Sixto-Aff1-Aff2-Aff3" data-author-search="Sixto, Xoel" data-corresp-id="c1">Xoel Sixto<svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-mail-medium"></use></svg></a><sup class="u-js-hide"><a href="#Aff1">1</a>,<a href="#Aff2">2</a>,<a href="#Aff3">3</a></sup>, </li><li class="c-article-author-list__item"><a data-test="author-name" data-track="click" data-track-action="open author" data-track-label="link" href="#auth-Guillermo-Curr_s_Lorenzo-Aff1-Aff2-Aff3-Aff4" data-author-popup="auth-Guillermo-Curr_s_Lorenzo-Aff1-Aff2-Aff3-Aff4" data-author-search="Currás-Lorenzo, Guillermo">Guillermo Currás-Lorenzo</a><sup class="u-js-hide"><a href="#Aff1">1</a>,<a href="#Aff2">2</a>,<a href="#Aff3">3</a>,<a href="#Aff4">4</a></sup>, </li><li class="c-article-author-list__item c-article-author-list__item--hide-small-screen"><a data-test="author-name" data-track="click" data-track-action="open author" data-track-label="link" href="#auth-Kiyoshi-Tamaki-Aff4" data-author-popup="auth-Kiyoshi-Tamaki-Aff4" data-author-search="Tamaki, Kiyoshi">Kiyoshi Tamaki</a><sup class="u-js-hide"><a href="#Aff4">4</a></sup> &amp; </li><li class="c-article-author-list__show-more" aria-label="Show all 4 authors for this article" title="Show all 4 authors for this article">…</li><li class="c-article-author-list__item"><a data-test="author-name" data-track="click" data-track-action="open author" data-track-label="link" href="#auth-Marcos-Curty-Aff1-Aff2-Aff3" data-author-popup="auth-Marcos-Curty-Aff1-Aff2-Aff3" data-author-search="Curty, Marcos">Marcos Curty</a><sup class="u-js-hide"><a href="#Aff1">1</a>,<a href="#Aff2">2</a>,<a href="#Aff3">3</a></sup> </li></ul><button aria-expanded="false" class="c-article-author-list__button"><svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-chevron-down-medium"></use></svg><span>Show authors</span></button> <p class="c-article-info-details" data-container-section="info"> <a data-test="journal-link" href="/" data-track="click" data-track-action="journal homepage" data-track-category="article body" data-track-label="link"><i data-test="journal-title">EPJ Quantum Technology</i></a> <b data-test="journal-volume"><span class="u-visually-hidden">volume</span> 10</b>, Article number: <span data-test="article-number">53</span> (<span data-test="article-publication-year">2023</span>) <a href="#citeas" class="c-article-info-details__cite-as u-hide-print" data-track="click" data-track-action="cite this article" data-track-label="link">Cite this article</a> </p> <div class="c-article-metrics-bar__wrapper u-clear-both"> <ul class="c-article-metrics-bar u-list-reset"> <li class=" c-article-metrics-bar__item" data-test="access-count"> <p class="c-article-metrics-bar__count">1117 <span class="c-article-metrics-bar__label">Accesses</span></p> </li> <li class="c-article-metrics-bar__item" data-test="citation-count"> <p class="c-article-metrics-bar__count">3 <span class="c-article-metrics-bar__label">Citations</span></p> </li> <li class="c-article-metrics-bar__item" data-test="altmetric-score"> <p class="c-article-metrics-bar__count">1 <span class="c-article-metrics-bar__label">Altmetric</span></p> </li> <li class="c-article-metrics-bar__item"> <p class="c-article-metrics-bar__details"><a href="/articles/10.1140/epjqt/s40507-023-00210-0/metrics" data-track="click" data-track-action="view metrics" data-track-label="link" rel="nofollow">Metrics <span class="u-visually-hidden">details</span></a></p> </li> </ul> </div> </div> <section aria-labelledby="Abs1" data-title="Abstract" lang="en"><div class="c-article-section" id="Abs1-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="Abs1">Abstract</h2><div class="c-article-section__content" id="Abs1-content"><p>Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources, and provides the same secret key rate scaling as ideal single-photon sources. It requires, however, that the phase of each emitted pulse is uniformly random. This might be difficult to guarantee in practice, due to inevitable device imperfections and/or the use of an external phase modulator for phase randomization in an active setup, which limits the possible selected phases to a finite set. Here, we investigate the security of decoy-state QKD when the phase is actively randomized by faulty devices, and show that this technique is quite robust to deviations from the ideal uniformly random scenario. For this, we combine a novel parameter estimation technique based on semi-definite programming, with the use of basis mismatched events, to tightly estimate the parameters that determine the achievable secret key rate. In doing so, we demonstrate that our analysis can significantly outperform previous results that address more restricted scenarios.</p></div></div></section> <section data-title="Introduction"><div class="c-article-section" id="Sec1-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="Sec1"><span class="c-article-section__title-number">1 </span>Introduction</h2><div class="c-article-section__content" id="Sec1-content"><p>Quantum key distribution (QKD) is a method for securely establishing symmetric cryptographic keys between two distant parties (so-called Alice and Bob) [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 1" title=" Xu F, Ma X, Zhang Q, Lo HK, Pan JW. Secure quantum key distribution with realistic devices. Rev Mod Phys. 2020;92:025002. https://doi.org/10.1103/RevModPhys.92.025002 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR1" id="ref-link-section-d131444011e475">1</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 3" title=" Lo HK, Curty M, Tamaki K. Secure quantum key distribution. Nat Photonics. 2014;8(8):595–604. https://doi.org/10.1038/nphoton.2014.149 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR3" id="ref-link-section-d131444011e478">3</a>]. Its security is based on principles of quantum mechanics, such as the no-cloning theorem [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 4" title=" Wootters WK, Zurek WH. A single quantum cannot be cloned. Nature. 1982;299:802–3. https://doi.org/10.1038/299802a0 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR4" id="ref-link-section-d131444011e481">4</a>], which guarantee that any attempt by an eavesdropper (Eve) to learn information about the distributed key inevitably introduces detectable errors. Importantly, when combined with the one-time-pad encryption scheme [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 5" title=" Vernam GS. Cipher printing telegraph systems for secret wire and radio telegraphic communications. Trans Am Inst Electr Eng. 1926;XLV:295–301. https://doi.org/10.1109/T-AIEE.1926.5061224 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR5" id="ref-link-section-d131444011e484">5</a>], QKD provides information-theoretically secure communications.</p><p>The field of QKD has made much progress in recent years, both theoretically and experimentally, leading to the first deployments of metropolitan and intercity QKD networks [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 6" title=" Sasaki M, Fujiwara M, Ishizuka H, Klaus W, Wakui K, Takeoka M et al.. Field test of quantum key distribution in the Tokyo QKD network. Opt Express. 2011;19(11):10387. https://doi.org/10.1364/oe.19.010387 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR6" id="ref-link-section-d131444011e490">6</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 9" title=" Chen YA, Zhang Q, Chen TY, Cai WQ, Liao SK, Zhang J et al.. An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature. 2021;589:214–9. https://doi.org/10.1038/s41586-020-03093-8 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR9" id="ref-link-section-d131444011e493">9</a>]. Despite these remarkable achievements, there are still certain challenges that need to be overcome for the widespread adoption of this technology. One of these challenges is to close the existing security gap between theory and practice. This is so because QKD security proofs, typically consider assumptions that the actual experimental implementations do not satisfy. Such discrepancies could create security loopholes or so-called side channels, which might be exploited by Eve to compromise the security of the generated key without being detected.</p><p>Indeed, practical QKD transmitters usually emit phase-randomized weak coherent pulses (PR-WCPs) generated by laser sources. These pulses might contain more than one photon prepared in the same quantum state. In this scenario, Eve is no longer limited by the no-cloning theorem, because multi-photon signals provide her with perfect copies of the signal photon. As a result, it can be shown that the secret key rate of the BB84 protocol [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 10" title=" Bennett CH, Brassard G. Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE international conference on computers, systems, and signal processing. 1984. p.&nbsp;175–9. " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR10" id="ref-link-section-d131444011e499">10</a>] with PR-WCPs scales quadratically with the system’s transmittance due to the photon-number-splitting (PNS) attack [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 11" title=" Huttner B, Imoto N, Gisin N, Mor T. Quantum cryptography with coherent states. Phys Rev A. 1995;51:1863–9. https://doi.org/10.1103/PhysRevA.51.1863 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR11" id="ref-link-section-d131444011e502">11</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 12" title=" Brassard G, Lütkenhaus N, Mor T, Sanders BC. Limitations on practical quantum cryptography. Phys Rev Lett. 2000;85:1330. https://doi.org/10.1103/PhysRevLett.85.1330 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR12" id="ref-link-section-d131444011e505">12</a>]. This attack provides Eve with full information about the part of the key generated with the multi-photon pulses, without introducing any error.</p><p>To overcome this limitation, the most efficient solution today is undoubtedly the decoy-state method [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 13" title=" Hwang WY. Quantum key distribution with high loss: toward global secure communication. Phys Rev Lett. 2003;91(5):057901. https://doi.org/10.1103/physrevlett.91.057901 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR13" id="ref-link-section-d131444011e511">13</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 15" title=" Lo HK, Ma X, Decoy CK. State quantum key distribution. Phys Rev Lett. 2005;94(23):230504. https://doi.org/10.1103/physrevlett.94.230504 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR15" id="ref-link-section-d131444011e514">15</a>], in which Alice varies at random the intensity of the PR-WCPs that she sends to Bob. This allows them to better estimate the behavior of the quantum channel. Indeed, using the observed measurement statistics associated to different intensity settings, Alice and Bob can tightly estimate the yield and phase error rate of the single-photon pulses, from which the secret key is actually distilled. As a result, the decoy-state method delivers a secret key rate that scales linearly with the channel transmittance [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 13" title=" Hwang WY. Quantum key distribution with high loss: toward global secure communication. Phys Rev Lett. 2003;91(5):057901. https://doi.org/10.1103/physrevlett.91.057901 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR13" id="ref-link-section-d131444011e517">13</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 16" title=" Lim CCW, Curty M, Walenta N, Xu F, Concise ZH. Security bounds for practical decoy-state quantum key distribution. Phys Rev A. 2014;89:022307. https://doi.org/10.1103/physreva.89.022307 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR16" id="ref-link-section-d131444011e520">16</a>], matching the scaling achievable with ideal single-photon sources. This technique has been extensively demonstrated in multiple recent experiments [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 17" title=" Zhao Y, Qi B, Ma X, Lo HK, Qian L. Experimental quantum key distribution with decoy states. Phys Rev Lett. 2006;96:70502. https://doi.org/10.1103/PhysRevLett.96.070502 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR17" id="ref-link-section-d131444011e523">17</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 23" title=" Boaron A, Boso G, Rusca D, Vulliez C, Autebert C, Caloz M et al.. Secure quantum key distribution over 421 km of optical fiber. Phys Rev Lett. 2018;121:190502. https://doi.org/10.1103/PhysRevLett.121.190502 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR23" id="ref-link-section-d131444011e527">23</a>], including satellite links [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 24" title=" Liao SK, Cai WQ, Liu WY, Zhang L, Li Y, Ren JG et al.. Satellite-to-ground quantum key distribution. Nature. 2017;549(7670):43–7. https://doi.org/10.1038/nature23655 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR24" id="ref-link-section-d131444011e530">24</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 25" title=" Liao SK, Cai WQ, Handsteiner J, Liu B, Yin J, Zhang L et al.. Satellite-relayed intercontinental quantum network. Phys Rev Lett. 2018;120:030501. https://doi.org/10.1103/PhysRevLett.120.030501 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR25" id="ref-link-section-d131444011e533">25</a>] and the use of photonic integrated circuits [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 26" title=" Sibson P, Erven C, Godfrey M, Miki S, Yamashita T, Fujiwara M et al.. Chip-based quantum key distribution. Nat Commun. 2017;8:13984. https://doi.org/10.1038/ncomms13984 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR26" id="ref-link-section-d131444011e536">26</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 29" title=" Marco ID, Woodward RI, Roberts GL, Paraïso TK, Roger T, Sanzaro M et al.. Real-time operation of a multi-rate, multi-protocol quantum key distribution transmitter. Optica. 2021;8(6):911–5. https://doi.org/10.1364/OPTICA.423517 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR29" id="ref-link-section-d131444011e539">29</a>]. Also, decoy-state QKD setups are currently offered commercially by several companies [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 30" title=" ID Quantique SA. https://www.idquantique.com/ . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR30" id="ref-link-section-d131444011e542">30</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 34" title=" Quantum Telecommunications Italy S.R.L. https://www.qticompany.com . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR34" id="ref-link-section-d131444011e546">34</a>], which highlights its importance.</p><p>Importantly, standard decoy-state security proofs assume perfect phase randomization, <i>i.e.</i>, that the phase, <i>θ</i>, of each generated WCP is uniformly random in <span class="mathjax-tex">\([0,2\pi )\)</span>. That is, its probability density function (PDF), <span class="mathjax-tex">\(g(\theta )\)</span>, should satisfy <span class="mathjax-tex">\(g(\theta )=1/2\pi \)</span>. However, none of the two main methods used today to generate PR-WCPs, namely passive and active, fulfill this condition exactly. In the passive scheme a technique known as gain-switching is used to effectively turn the laser on and off between pulses. However, in these configurations [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 20" title=" Liu Y, Chen TY, Wang J, Cai WQ, Wan X, Chen LK et al.. Decoy-state quantum key distribution with polarized photons over 200 km. Opt Express. 2010;18:8587–94. https://doi.org/10.1364/OE.18.008587 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR20" id="ref-link-section-d131444011e658">20</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 22" title=" Yuan Z, Murakami A, Kujiraoka M, Lucamarini M, Tanizawa Y, Sato H et al.. 10-Mb/s quantum key distribution. J&nbsp;Lightwave Technol. 2018;36:3427–33. https://doi.org/10.1109/jlt.2018.2843136 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR22" id="ref-link-section-d131444011e661">22</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 23" title=" Boaron A, Boso G, Rusca D, Vulliez C, Autebert C, Caloz M et al.. Secure quantum key distribution over 421 km of optical fiber. Phys Rev Lett. 2018;121:190502. https://doi.org/10.1103/PhysRevLett.121.190502 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR23" id="ref-link-section-d131444011e664">23</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 35" title=" Yuan ZL, Sharpe AW, Shields AJ. Unconditionally secure one-way quantum key distribution using decoy pulses. Appl Phys Lett. 2007;90:011118. https://doi.org/10.1063/1.2430685 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR35" id="ref-link-section-d131444011e667">35</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 38" title=" Valivarthi R, Zhou Q, John C, Marsili F, Verma VB, Shaw MD et al.. A cost-effective measurement-device-independent quantum key distribution system for quantum networks. Quantum Sci Technol. 2017. 2:04LT01. https://doi.org/10.1088/2058-9565/aa8790 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR38" id="ref-link-section-d131444011e670">38</a>], device imperfections can prevent the phases <i>θ</i> from being uniformly distributed. In the active scheme [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 26" title=" Sibson P, Erven C, Godfrey M, Miki S, Yamashita T, Fujiwara M et al.. Chip-based quantum key distribution. Nat Commun. 2017;8:13984. https://doi.org/10.1038/ncomms13984 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR26" id="ref-link-section-d131444011e677">26</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 27" title=" Bunandar D, Lentine A, Lee C, Cai H, Long CM, Boynton N et al.. Metropolitan quantum key distribution with silicon photonics. Phys Rev X. 2018;8:021009. https://doi.org/10.1103/PhysRevX.8.021009 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR27" id="ref-link-section-d131444011e680">27</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 39" title=" Zhao Y, Qi B, Lo HK. Experimental quantum key distribution with active phase randomization. Appl Phys Lett. 2007;90(4):044106. https://doi.org/10.1063/1.2432296 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR39" id="ref-link-section-d131444011e683">39</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 40" title=" Sun SH, Liang LM. Experimental demonstration of an active phase randomization and monitor module for quantum key distribution. Appl Phys Lett. 2012;101:071107. https://doi.org/10.1063/1.4746402 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR40" id="ref-link-section-d131444011e686">40</a>], an external phase modulator is used to imprint one of <i>N</i> possible random values to the phase of each pulse, such that only a discrete number of phases is selected. Both scenarios violate a crucial assumption of the decoy-state technique.</p><p>The security of QKD with imperfect passive phase randomization has, under certain assumptions, been recently demonstrated in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 41" title=" Currás-Lorenzo G, Tamaki K, Curty M. Security of decoy-state quantum key distribution with imperfect phase randomization. Preprint. 2022. arXiv:2210.08183 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR41" id="ref-link-section-d131444011e695">41</a>]. This analysis however, is not applicable to the numerous existing active setups that rely on an external phase modulator for phase randomization .<sup><a href="#Fn1"><span class="u-visually-hidden">Footnote </span>1</a></sup> The security of the latter approach has been analyzed in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e850">42</a>] (see also [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 43" title=" Currás-Lorenzo G, Wooltorton L, Twin-Field RM. Quantum key distribution with fully discrete phase randomization. Phys Rev Appl. 2021;15:014016. https://doi.org/10.1103/PhysRevApplied.15.014016 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR43" id="ref-link-section-d131444011e853">43</a>]), but these works restrict themselves to the case in which the discrete random phases are evenly distributed in <span class="mathjax-tex">\([0,2\pi )\)</span>, <i>i.e.</i>, they assume that <span class="mathjax-tex">\(g(\theta )\)</span> satisfies </p><div id="Equ1" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ g(\theta ) = \frac{1}{N} \sum _{k=0}^{N-1} \delta (\theta -\theta _{k}), $$</span></div><div class="c-article-equation__number"> (1) </div></div><p> where <span class="mathjax-tex">\(\delta (x)\)</span> represents the Dirac delta function, and <span class="mathjax-tex">\(\theta _{k}=2 \pi k/N\)</span>, with <i>N</i> being the total number of selected phases. Under this assumption, [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e1071">42</a>] shows that it is possible to approximate the secret key rate achievable in the ideal situation where <span class="mathjax-tex">\(g(\theta )=1/2\pi \)</span>, with around <span class="mathjax-tex">\(N=10\)</span> random phases. While this result is remarkable, in practice, inevitable imperfections of the phase modulator and electronic noise might prevent the phases <i>θ</i> from being <i>exactly</i> evenly distributed, thus invalidating the application of the results presented in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e1143">42</a>] to a real setup.</p><p>The main contributions of this paper are as follows. First, we introduce an analysis that can be applied in the more realistic and practical scenario in which <span class="mathjax-tex">\(g(\theta )\)</span> is an arbitrary PDF, due to imperfections in the active phase randomization process, and we provide asymptotic secret key rates for this general situation, thus filling an important gap in the literature.</p><p>Second, we show that this analysis can be applied in the scenario in which the PDF <span class="mathjax-tex">\(g(\theta )\)</span> is not fully characterized. This feature significantly simplifies the applicability of our results to a practical setup, where an accurate characterization of the PDF describing the phase might be challenging.</p><p>Third, we make a noteworthy finding regarding the utilization of basis mismatched events which are typically discarded in QKD security analyses, including that in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e1205">42</a>]. The use of basis mismatched events is already known to provide a key-rate advantage in the presence of bit-and-basis encoding flaws [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 44" title=" Tamaki K, Curty M, Kato G, Lo HK, Azuma K. Loss-tolerant quantum cryptography with imperfect sources. Phys Rev A. 2014;90:052314. https://doi.org/10.1103/PhysRevA.90.052314 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR44" id="ref-link-section-d131444011e1208">44</a>] but here, we show that they can also be advantageous in the presence of imperfections due to a faulty phase randomization process. We believe that this additional result is highly nontrivial as intuitively the decoy state method has no relation with the state preparation flaw in encoding the bit information.</p><p>Fourth, when considering the ideal discrete-phase-randomization case described by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ1">1</a>), our analysis delivers considerably higher secret key rates than those provided by the seminal work in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e1217">42</a>], or to put it in other words, it requires to spend fewer random bits for phase selection to achieve an equivalent performance.</p><p>As a side remark, we note that our results are also useful for other quantum communication schemes that go beyond QKD and employ laser sources, as they often rely on decoy-states with active phase randomization.</p><p>Finally, it is worth mentioning that, although, for simplicity, in our derivations we consider collective attacks, our analysis can be lifted to general attacks by applying the extension of the quantum de Finetti theorem [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 45" title=" Renner R, Cirac JI. de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys Rev Lett. 2009;102:110504. https://doi.org/10.1103/PhysRevLett.102.110504 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR45" id="ref-link-section-d131444011e1227">45</a>] to infinitely-dimensional systems [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 46" title=" Renner R. Symmetry of large physical systems implies independence of subsystems. Nat Phys. 2007;3(9):645–9. https://doi.org/10.1038/nphys684 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR46" id="ref-link-section-d131444011e1230">46</a>]. Because of this, the asymptotic key rates that we derive in this paper are also valid against general attacks.</p><p>The paper is organized as follows. In Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec3">2.1</a>, we describe the quantum states emitted by Alice when <i>θ</i> follows an arbitrary PDF, <span class="mathjax-tex">\(g(\theta )\)</span>. Then, in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec4">2.2</a> we introduce the decoy-state protocol considered, together with its asymptotic secret key rate formula. Next, in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec5">2.3</a>, we present the parameter estimation technique based on SDP, as well as on the use of basis mismatched events, to calculate the different parameters required to evaluate the secret key rate. Then, in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec10">3</a> we simulate the achievable secret key rate for various functions <span class="mathjax-tex">\(g(\theta )\)</span> of practical interest, both for the cases in which this function is fully (or only partially) characterized. Section&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec15">4</a> concludes the paper with a summary. The paper includes as well some Appendixes with additional calculations.</p></div></div></section><section data-title="Methods"><div class="c-article-section" id="Sec2-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="Sec2"><span class="c-article-section__title-number">2 </span>Methods</h2><div class="c-article-section__content" id="Sec2-content"><h3 class="c-article__sub-heading" id="Sec3"><span class="c-article-section__title-number">2.1 </span>Phase randomization with an arbitrary <span class="mathjax-tex">\(g(\theta )\)</span> </h3><p>In this section, we describe the quantum states emitted by Alice when each of them has a phase <i>θ</i> that follows an arbitrary PDF, <span class="mathjax-tex">\(g(\theta )\)</span>.</p><p>In particular, a WCP of intensity <i>μ</i> and phase <i>θ</i> can be written in terms of the Fock basis as </p><div id="Equ2" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl|\sqrt{\mu}e^{i \theta}\bigr\rangle =e^{-\frac{\mu}{2}} \sum _{n=0}^{ \infty}\frac{ (\sqrt{\mu}e^{i \theta} )^{n}}{\sqrt{n !}}|n \rangle , $$</span></div><div class="c-article-equation__number"> (2) </div></div><p> where <span class="mathjax-tex">\(|n\rangle \)</span> represents a Fock state with <i>n</i> photons.</p><p>If Alice selects the phase <i>θ</i> of each generated signal independently and at random according to <span class="mathjax-tex">\(g(\theta )\)</span>, its state is simply given by </p><div id="Equ3" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \rho ^{\mu}_{[g(\theta )]}= \int _{0}^{2 \pi} g(\theta ){\hat{P}}\bigl(\bigl| \sqrt{ \mu} e^{i \theta}\bigr\rangle \bigr)\,d\theta , $$</span></div><div class="c-article-equation__number"> (3) </div></div><p> with <span class="mathjax-tex">\({\hat{P}}(|\phi \rangle )=|\phi \rangle \langle \phi |\)</span>.</p><p>Any quantum state can always be diagonalised in a certain orthonormal basis. For the states given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ3">3</a>), we shall denote the elements of such basis by <span class="mathjax-tex">\(|\psi _{n, \mu , g(\theta )}\rangle \)</span>, since, in general, they might depend on both the intensity <i>μ</i> and the function <span class="mathjax-tex">\(g(\theta )\)</span>. Here, the subscript <i>n</i> simply identifies the different elements of the basis, which are not necessarily the Fock states. This means, in particular, that we can rewrite the states given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ3">3</a>) as follows </p><div id="Equ4" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \rho ^{\mu}_{[g(\theta )]}=\sum _{n=0}^{\infty} p_{n| \mu , g(\theta )}{ \hat{P}}\bigl(|\psi _{n, \mu , g(\theta )}\rangle \bigr), $$</span></div><div class="c-article-equation__number"> (4) </div></div><p> where the coefficients <span class="mathjax-tex">\(p_{n| \mu , g(\theta )}\geq{}0\)</span> satisfy <span class="mathjax-tex">\(\sum_{n=0}^{\infty} p_{n| \mu , g(\theta )}=1\)</span>. That is, these coefficients can be interpreted as the probability with which, in a certain time instance, Alice emits the state <span class="mathjax-tex">\(|\psi _{n, \mu , g(\theta )}\rangle \)</span>, given that she chose the intensity <i>μ</i> and <i>θ</i> follows the PDF <span class="mathjax-tex">\(g(\theta )\)</span>.</p><p>For instance, in the ideal scenario where <span class="mathjax-tex">\(g(\theta )\)</span> is uniformly random in <span class="mathjax-tex">\([0,2\pi )\)</span>, the emitted signals are a Poisson mixture of Fock states given by </p><div id="Equ5" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \rho ^{\mu}_{[\frac{1}{2\pi}]}= \frac{1}{2\pi} \int _{0}^{2 \pi}{ \hat{P}}\bigl(\bigl|\sqrt{\mu} e^{i \theta}\bigr\rangle \bigr)\,d\theta=e^{-\mu}\sum_{n=0}^{\infty } \frac{\mu ^{n}}{n !} {\hat{P}}\bigl(|n \rangle \bigr), $$</span></div><div class="c-article-equation__number"> (5) </div></div><p><i>i.e.</i> <span class="mathjax-tex">\(p_{n| \mu , 1/2\pi}=e^{-\mu}\mu ^{n}/(n!)\)</span> and <span class="mathjax-tex">\(|\psi _{n, \mu , 1/2\pi}\rangle =|n\rangle \)</span>.</p><h3 class="c-article__sub-heading" id="Sec4"><span class="c-article-section__title-number">2.2 </span>Protocol description and key generation rate</h3><p>For concreteness, we shall assume that Alice and Bob implement a decoy-state BB84 scheme with three different intensity settings <span class="mathjax-tex">\(\{s, \nu , \omega \}\)</span> in each basis, with <span class="mathjax-tex">\(s&gt;\nu &gt;\omega \geq{}0\)</span>. Moreover, we consider that they generate secret key only from those events in which both of them select the <i>Z</i> basis and Alice chooses the signal intensity setting <i>s</i>. This is the most typical configuration of the decoy-state BB84 protocol. We remark, however, that the analysis below could be straightforwardly adapted to other protocol configurations, or to other combinations of intensity settings.</p><p>In each round of the protocol, Alice probabilistically chooses a bit value <span class="mathjax-tex">\(b\in \{0,1\}\)</span> with probability <span class="mathjax-tex">\(p_{b}=1/2\)</span>, a basis <span class="mathjax-tex">\(\alpha \in \{Z,X\}\)</span> with probability <span class="mathjax-tex">\(p_{\alpha}\)</span>, an intensity value <span class="mathjax-tex">\(\mu \in \{s, \nu , \omega \}\)</span> with probability <span class="mathjax-tex">\(p_{\mu}\)</span>, and a random phase <i>θ</i> according to the PDF given by <span class="mathjax-tex">\(g(\theta )\)</span>. Then, she generates a WCP of intensity <i>μ</i> and phase <i>θ</i>, <span class="mathjax-tex">\(|\sqrt{\mu}e^{i \theta}\rangle \)</span>, and applies an operation that encodes her bit and basis choices <i>b</i> and <i>α</i> into the pulse. From Eve’s perspective, these states are described by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ4">4</a>) due to her ignorance about the selected phase <i>θ</i>. On the receiving side, Bob measures each arriving signal using a basis <span class="mathjax-tex">\(\alpha \in \{Z,X\}\)</span>, which he selects with probability <span class="mathjax-tex">\(p_{\alpha}\)</span>. We shall assume the basis independent detection efficiency condition throughout the paper. That is, the probability that Bob obtains a conclusive measurement outcome does not depend on his basis choice.</p><p>Once the quantum communication phase of the protocol ends, Alice and Bob broadcast (via an authenticated classical channel) both the intensity and basis settings selected for each detected signal. The results related to those detected signals in which both of them used the <i>Z</i> basis with intensity setting <i>s</i> constitute the sifted key. For the detected rounds in which Bob chose the <i>X</i> basis, Alice reveals her bit values <i>b</i> and Bob announces his corresponding measurement outcomes. This data is used for parameter estimation, <i>i.e.</i>, to determine the relevant quantities needed to evaluate the secret key rate formula. Finally, Alice and Bob apply error correction and privacy amplification to the sifted key to obtain a final secret key, following the standard post-processing procedure in QKD [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 1" title=" Xu F, Ma X, Zhang Q, Lo HK, Pan JW. Secure quantum key distribution with realistic devices. Rev Mod Phys. 2020;92:025002. https://doi.org/10.1103/RevModPhys.92.025002 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR1" id="ref-link-section-d131444011e3021">1</a>–<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 3" title=" Lo HK, Curty M, Tamaki K. Secure quantum key distribution. Nat Photonics. 2014;8(8):595–604. https://doi.org/10.1038/nphoton.2014.149 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR3" id="ref-link-section-d131444011e3024">3</a>]. For a more detailed description of the protocol steps of a decoy-state BB84 scheme, we refer the reader to <i>e.g.</i> [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 16" title=" Lim CCW, Curty M, Walenta N, Xu F, Concise ZH. Security bounds for practical decoy-state quantum key distribution. Phys Rev A. 2014;89:022307. https://doi.org/10.1103/physreva.89.022307 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR16" id="ref-link-section-d131444011e3030">16</a>].</p><p>In the ideal scenario where <span class="mathjax-tex">\(g(\theta )=1/2\pi \)</span>, Alice’s state preparation process is equivalent to emitting Fock states <span class="mathjax-tex">\(|n\rangle \)</span> with a Poisson distribution of mean equal to the intensity setting <i>μ</i> selected, as shown by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ5">5</a>). In this situation, both the single-photon and vacuum pulses with the intensity setting <i>s</i> contribute to secret bits [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 47" title=" Lo HK. Getting something out of nothing. Quantum Inf Comput. 2005;5:413–8. https://doi.org/10.26421/QIC5.45-10 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR47" id="ref-link-section-d131444011e3109">47</a>]. The multi-photon signals are insecure due to the PNS attack. Similarly, when <i>θ</i> follows an arbitrary PDF, <span class="mathjax-tex">\(g(\theta )\)</span>, and Alice chooses the intensity setting <i>μ</i>, from Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ4">4</a>) we have that her state preparation process is equivalent to generating pure states <span class="mathjax-tex">\(|\psi _{n, \mu , g(\theta )}\rangle \)</span> with probability <span class="mathjax-tex">\(p_{n| \mu , g(\theta )}\)</span>. The closer the function <span class="mathjax-tex">\(g(\theta )\)</span> is to a uniform distribution, the closer the signals (probabilities) <span class="mathjax-tex">\(|\psi _{n, \mu , g(\theta )}\rangle \)</span> (<span class="mathjax-tex">\(p_{n| \mu , g(\theta )}\)</span>) are to the Fock states <span class="mathjax-tex">\(|n\rangle \)</span> (probabilities <span class="mathjax-tex">\(e^{-\mu}\mu ^{n}/n!\)</span>). In this scenario, Alice and Bob can in principle distill secret bits from any <span class="mathjax-tex">\(|\psi _{n, \mu , g(\theta )}\rangle \)</span> with <span class="mathjax-tex">\(\mu =s\)</span>, though the main contribution would mainly arise from those with indexes <span class="mathjax-tex">\(n=0,1\)</span>, which are the ones closer to vacuum and single-photon pulses. These are the contributions that we consider below. Indeed, for the examples studied in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec10">3</a>, we have tested numerically that the improvement in key rate that can be obtained when considering <span class="mathjax-tex">\(n&gt;1\)</span> is negligible.</p><p>This means that, in this imperfect state preparation scenario, the asymptotic secret key rate formula for the decoy-state BB84 protocol considered can be written as [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 15" title=" Lo HK, Ma X, Decoy CK. State quantum key distribution. Phys Rev Lett. 2005;94(23):230504. https://doi.org/10.1103/physrevlett.94.230504 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR15" id="ref-link-section-d131444011e3549">15</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 47" title=" Lo HK. Getting something out of nothing. Quantum Inf Comput. 2005;5:413–8. https://doi.org/10.26421/QIC5.45-10 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR47" id="ref-link-section-d131444011e3552">47</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 48" title=" Gottesman D, Lo HK, Lütkenhaus N, Preskill J. Security of quantum key distribution with imperfect devices. Quantum Inf Comput. 2004;4:325–60. https://doi.org/10.26421/QIC4.5-1 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR48" id="ref-link-section-d131444011e3555">48</a>] </p><div id="Equ6" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} R \geq &amp; p_{Z}^{2}p_{s} \Biggl\{ \sum_{n=0}^{\infty} p_{n| s, g(\theta )}Y_{n, s, g(\theta )}^{Z} \bigl[1-h (e_{n, s, g(\theta )} ) \bigr] -f Q_{s, g(\theta )}^{Z} h \bigl(E_{s, g(\theta )}^{Z} \bigr) \Biggr\} \\ \geq &amp; p_{Z}^{2}p_{s} \Biggl\{ \sum _{n=0}^{1} p_{n| s, g(\theta )}^{ \text{L}}Y_{n, s, g(\theta )}^{Z, \text{L}} \bigl[1-h \bigl(e_{n, s, g( \theta )}^{\mathrm{U}} \bigr) \bigr] -f Q_{s, g(\theta )}^{Z} h \bigl(E_{s, g(\theta )}^{Z} \bigr) \Biggr\} , \end{aligned}$$ </span></div><div class="c-article-equation__number"> (6) </div></div><p> where <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z}\)</span> denotes the yield associated to the state <span class="mathjax-tex">\(|\psi _{n, s, g(\theta )}\rangle \)</span> encoded (and measured) in the <i>Z</i> basis, <i>i.e.</i>, the probability that Bob observes a detection click in his measurement apparatus conditioned on Alice and Bob selecting the <i>Z</i> basis and Alice preparing the state <span class="mathjax-tex">\(|\psi _{n, s, g(\theta )}\rangle \)</span>; the parameter <span class="mathjax-tex">\(e_{n, s, g(\theta )}\)</span> represents the phase error rate of these latter signals; <span class="mathjax-tex">\(h(x)=-x\log _{2}{(x)}-(1-x)\log _{2}{(1-x)}\)</span> is the binary Shannon entropy function; the quantity <i>f</i> is the efficiency of the error correction protocol; <span class="mathjax-tex">\(Q_{s, g(\theta )}^{Z}\)</span> is the overall gain of the signals emitted conditioned on Alice selecting the intensity <i>s</i> and Alice and Bob choosing the <i>Z</i> basis, <i>i.e.</i>, the probability that Bob observes a detection click conditioned on Alice sending him such signals; and <span class="mathjax-tex">\(E_{s, g(\theta )}^{Z}\)</span> is the overall quantum bit error rate (QBER) associated to these latter signals. Moreover, in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ6">6</a>), the superscript L (U) refers to a (an) lower (upper) bound.</p><p>The quantities <span class="mathjax-tex">\(Q_{s, g(\theta )}^{Z}\)</span> and <span class="mathjax-tex">\(E_{s, g(\theta )}^{Z}\)</span> are directly observed in the experiment. In principle, the probabilities <span class="mathjax-tex">\(p_{n| s, g(\theta )}\)</span> could also be known, and depend on the state preparation process. However, in practice it might be difficult to find their value analytically. Instead, in the next section we present a simple method to obtain a lower bound, <span class="mathjax-tex">\(p_{n| s, g(\theta )}^{\mathrm{L}}\)</span>, on these quantities. There, we also explain how to estimate the parameters <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z, \mathrm{L}}\)</span> and <span class="mathjax-tex">\(e_{n, s, g(\theta )}^{\mathrm{U}}\)</span>, with <span class="mathjax-tex">\(n=0,1\)</span>, which are needed to evaluate Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ6">6</a>).</p><h3 class="c-article__sub-heading" id="Sec5"><span class="c-article-section__title-number">2.3 </span>Parameter estimation</h3><p>The parameter estimation procedure presented here is an adaptation of the one very recently introduced in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 41" title=" Currás-Lorenzo G, Tamaki K, Curty M. Security of decoy-state quantum key distribution with imperfect phase randomization. Preprint. 2022. arXiv:2210.08183 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR41" id="ref-link-section-d131444011e4741">41</a>] in the context of phase correlations in a passive randomization setup. For simplicity, below we introduce the main results and refer the reader to Appendixes <a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec16">A</a> and <a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec17">B</a> for the detailed derivations.</p><h4 class="c-article__sub-heading c-article__sub-heading--small" id="Sec6"><span class="c-article-section__title-number">2.3.1 </span>Lower bound on the yields <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z}\)</span> </h4><p>In Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec16">A</a> it is shown that a lower bound on the yields <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z}\)</span> can be obtained by solving the following SDP:<sup><a href="#Fn2"><span class="u-visually-hidden">Footnote </span>2</a></sup></p><div id="Equ7" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} \min_{J_{Z}} &amp;\ \operatorname{Tr} \bigl[{\hat{P}}\bigl(|\psi _{n, s, g( \theta )}\rangle \bigr)J_{Z} \bigr] \\ \text{subject to} &amp;\ \operatorname{Tr} \bigl[\rho ^{\mu}_{[g(\theta )]} J_{Z} \bigr]=Q_{\mu , g(\theta )}^{Z}, \quad \forall \mu \in \{s, \nu , \omega \} \\ &amp;\ 0\leq J_{Z} \leq \mathbb{I}. \end{aligned} $$</span></div><div class="c-article-equation__number"> (7) </div></div><p> The states <span class="mathjax-tex">\(|\psi _{n, s, g(\theta )}\rangle \)</span> and <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> are known in principle but inaccessible and depend on the intensity setting selected by Alice and on the function <span class="mathjax-tex">\(g(\theta )\)</span>. Also, as already mentioned, the gains <span class="mathjax-tex">\(Q_{\mu , g(\theta )}^{Z}\)</span> are directly observed experimentally in a realization of the protocol. That is, the only unknown in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>) is the positive semi-definite operator <span class="mathjax-tex">\(J_{Z}\)</span> over which the minimization takes place. Let <span class="mathjax-tex">\(J_{Z}^{*}\)</span> denote the solution to the SDP given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>). Then, we find that </p><div id="Equ8" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ Y_{n, s, g(\theta )}^{Z}\geq \operatorname{Tr} \bigl[{\hat{P}}\bigl(|\psi _{n, s, g(\theta )}\rangle \bigr)J_{Z}^{*} \bigr]:= Y_{n, s, g(\theta )}^{Z, { \mathrm{L}}}. $$</span></div><div class="c-article-equation__number"> (8) </div></div><h4 class="c-article__sub-heading c-article__sub-heading--small" id="Sec7"><span class="c-article-section__title-number">2.3.2 </span>Upper bound on the phase-error rates <span class="mathjax-tex">\(e_{n, s, g(\theta )}\)</span> </h4><p>The phase-error rates, <span class="mathjax-tex">\(e_{n, s, g(\theta )}\)</span>, are defined by means of a virtual protocol [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 49" title=" Koashi M. Simple security proof of quantum key distribution based on complementarity. New J Phys. 2009;8:045018. https://doi.org/10.1088/1367-2630/11/4/045018 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR49" id="ref-link-section-d131444011e5659">49</a>]. For this, we shall consider the standard assumption in which the efficiency of Bob’s measurement is independent of his basis choice. Then, for those rounds in which both Alice and Bob select the <i>Z</i> basis and Alice generates the <i>n</i>-th eigenstate <span class="mathjax-tex">\(|\psi _{n, s, g(\theta )}\rangle \)</span>, we can equivalently describe her state preparation process as follows. First, she prepares the following bipartite entangled state </p><div id="Equ9" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl|\Psi ^{Z}_{n, s, g(\theta )}\bigr\rangle = \frac{1}{\sqrt{2}} \bigl(|0_{Z} \rangle _{A} \hat{V}_{0_{Z}}+|1_{Z}\rangle _{A} \hat{V}_{1_{Z}}\bigr)|\psi _{n, s, g(\theta )}\rangle , $$</span></div><div class="c-article-equation__number"> (9) </div></div><p> where <span class="mathjax-tex">\(\hat{V}_{b_{\alpha}}\)</span>, with <span class="mathjax-tex">\(b=0,1\)</span> and <span class="mathjax-tex">\(\alpha \in \{Z,X\}\)</span>, denotes the encoding operation corresponding to the <i>α</i> basis and the bit value <i>b</i>. Although our analysis is valid for any <span class="mathjax-tex">\(\{\hat{V}_{b_{\alpha}}\}\)</span>, for simplicity, in our simulations, we assume that these operators, are ideal BB84 encoding operators, given by <span class="mathjax-tex">\(\hat{V}_{0_{Z}}|n\rangle =|n\rangle |0\rangle , \hat{V}_{1_{Z}}|n \rangle =|0\rangle |n\rangle \)</span>, </p><div id="Equ10" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{gathered} \hat{V}_{0_{X}}|n\rangle =\sum _{k} \frac{1}{\sqrt{2^{n}}} \sqrt{ \begin{pmatrix} n \\ k \end{pmatrix}}|k \rangle |n-k\rangle , \\ \hat{V}_{1_{X}}|n\rangle =\sum_{k}(-1)^{k} \frac{1}{\sqrt{2^{n}}} \sqrt{\begin{pmatrix} n \\ k \end{pmatrix}}|k\rangle |n-k\rangle . \end{gathered} $$</span></div><div class="c-article-equation__number"> (10) </div></div><p> We note that these operators are independent of the physical degree of freedom used for the encoding. For example, in a time-bin encoding setup, the first ket would represent the early time bin, and the second ket would represent the late time bin; while in a polarization-encoding setup, the first ket would represent the horizontally-polarized mode, and the second ket would represent the vertically-polarized mode.</p><p>Next, she measures her ancilla system <i>A</i> in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ9">9</a>) in the orthonormal basis <span class="mathjax-tex">\(\{|0_{Z}\rangle , |1_{Z}\rangle \}\)</span> to learn the bit value encoded, and sends the other system to Bob, who measures it in the <i>Z</i> basis.</p><p>In this situation, the phase-error rate <span class="mathjax-tex">\(e_{n, s, g(\theta )}\)</span> corresponds to the bit error rate that Alice and Bob would observe if Alice (Bob) instead performed an <i>X</i> basis measurement on the ancilla system <i>A</i> (arriving signal). If Alice performs a <i>X</i> basis measurement on her system <i>A</i>, this is equivalent to emitting the states </p><div id="Equ11" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl|\lambda ^{\mathrm{virtual}}_{ \Delta , n, s, g(\theta )}\bigr\rangle \propto \bigl|\bar{\lambda}^{\mathrm{virtual}}_{ \Delta , n, s, g(\theta )} \bigr\rangle ={ }_{A} \bigl\langle \Delta _{X} |\Psi ^{Z}_{n, s, g(\theta )} \bigr\rangle =\frac{1}{2} \bigl[\hat{V}_{0_{Z}}+(-1)^{\Delta } \hat{V}_{1_{Z}} \bigr]|\psi _{n, s, g(\theta )}\rangle , $$</span></div><div class="c-article-equation__number"> (11) </div></div><p> with probability <span class="mathjax-tex">\(p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )}=\||\bar{\lambda}^{ \mathrm{virtual}}_{\Delta , n, s, g(\theta )}\rangle \|^{2}\)</span>, where <span class="mathjax-tex">\(\Delta \in \{0,1\}\)</span> and <span class="mathjax-tex">\(|\Delta _{X}\rangle = [|0_{Z}\rangle +(-1)^{\Delta}|1_{Z} \rangle ] / \sqrt{2}\)</span>. Let <span class="mathjax-tex">\(Y_{\Delta , n, s, g(\theta )}^{ (\Delta \oplus 1)_{X}, \mathrm{virtual}}\)</span> denote the probability that Bob obtains the measurement outcome <span class="mathjax-tex">\((\Delta \oplus 1)_{X}\)</span> when he performs an <i>X</i> basis measurement on the arriving signal conditioned on Alice emitting the state <span class="mathjax-tex">\(|\lambda ^{\mathrm{virtual}}_{ \Delta , n, s, g(\theta )}\rangle \)</span>. That is, this event corresponds to a phase error. Then, the phase error rate <span class="mathjax-tex">\(e_{n, s, g(\theta )}\)</span> can be written as </p><div id="Equ12" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ e_{n, s, g(\theta )}=\frac{1}{Y_{n, s, g(\theta )}^{Z}}\sum _{\Delta =0}^{1} p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )}Y_{\Delta , n, s, g( \theta )}^{ (\Delta \oplus 1)_{X}, \mathrm{virtual}}. $$</span></div><div class="c-article-equation__number"> (12) </div></div><p>In Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec16">A</a>, it is shown that an upper bound on the quantity <span class="mathjax-tex">\(p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )}Y_{\Delta , n, s, g( \theta )}^{ (\Delta \oplus 1)_{X}, \mathrm{virtual}}\)</span> can be obtained by solving the following SDP: </p><div id="Equ13" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} \max_{L_{(\Delta \oplus 1)_{X}}} &amp;\ \operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl| \bar{\lambda}^{\text{virtual}}_{\Delta , n, s, g(\theta )} \bigr\rangle \bigr) L_{( \Delta \oplus 1)_{X}} \bigr] \\ \text{subject to } &amp;\ \operatorname{Tr} \bigl[\hat{V}_{b_{\alpha}} \rho ^{\mu}_{[g(\theta )]} \hat{V}_{b_{\alpha}}^{\dagger} L_{(\Delta \oplus 1)_{X}} \bigr]=Q_{\mu , g(\theta ), b_{\alpha}}^{(\Delta \oplus 1)_{X}}, \\ &amp;\ \forall \mu \in \{s, \nu , \omega \}, \forall b\in \{0,1\}, \forall \alpha \in \{Z,X\} \\ &amp;\ 0 \leq L_{(\Delta \oplus 1)_{X}} \leq \mathbb{I}, \end{aligned} $$</span></div><div class="c-article-equation__number"> (13) </div></div><p> where <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> is given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ4">4</a>), and <span class="mathjax-tex">\(Q_{\mu , g(\theta ), b_{\alpha}}^{(\Delta \oplus 1)_{X}}\)</span> denotes the probability that Bob observes the result <span class="mathjax-tex">\((\Delta \oplus 1)_{X}\)</span> with his <i>X</i> basis measurement given that Alice chose the intensity setting <i>μ</i>, the basis <i>α</i>, the bit value <i>b</i>, and the phases <i>θ</i> follow the PDF <span class="mathjax-tex">\(g(\theta )\)</span>. We note that Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>) includes constraints provided by basis mismatched events [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 44" title=" Tamaki K, Curty M, Kato G, Lo HK, Azuma K. Loss-tolerant quantum cryptography with imperfect sources. Phys Rev A. 2014;90:052314. https://doi.org/10.1103/PhysRevA.90.052314 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR44" id="ref-link-section-d131444011e8256">44</a>] in which Alice prepares the signals in the <i>Z</i> basis and Bob measures them in the <i>X</i> basis, which may result in a tighter estimation. This is because, in general, <span class="mathjax-tex">\(|\lambda _{\Delta , n, s, g(\theta )}^{\text{virtual}}\rangle \neq \hat{V}_{\Delta _{X}}|\psi _{n, s, g(\theta )}\rangle \)</span>, and <span class="mathjax-tex">\({\hat{P}}(|\lambda ^{\text{virtual}}_{\Delta , n,s, g(\theta )})\)</span> may be better approximated by an operator-form linear combination of both <i>Z</i>-encoded and <i>X</i>-encoded states, rather than just the latter.</p><p>Importantly, the states <span class="mathjax-tex">\(|\bar{\lambda}^{\text{virtual}}_{\Delta , n, s, g(\theta )}\rangle \)</span> and <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span>, as well as the operators <span class="mathjax-tex">\(\hat{V}_{b_{\alpha}}\)</span>, are known and depend on Alice’s state preparation process. The gains <span class="mathjax-tex">\(Q_{\mu , g(\theta ), b_{\alpha}}^{(\Delta \oplus 1)_{X}}\)</span> are directly observed in a realization of the protocol. That is, the only unknown in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>) is the positive semi-definite operator <i>L</i> over which the maximization takes place.</p><p>Let <span class="mathjax-tex">\(L_{(\Delta \oplus 1)_{X}}^{*}\)</span> denote the solution to the SDP given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>). Then, we have that </p><div id="Equ14" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )}Y_{\Delta , n, s, g( \theta )}^{ (\Delta \oplus 1)_{X}, \mathrm{virtual}}\leq \operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl|\bar{\lambda}^{\text{virtual}}_{ \Delta , n, s, g(\theta )} \bigr\rangle \bigr) L_{(\Delta \oplus 1)_{X}}^{*} \bigr]. $$</span></div><div class="c-article-equation__number"> (14) </div></div><p> That is, </p><div id="Equ15" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ e_{n, s, g(\theta )}\leq \frac{1}{Y_{n, s, g(\theta )}^{Z, {\mathrm{L}}}}\sum _{\Delta =0}^{1} \operatorname{Tr} \bigl[{\hat{P}} \bigl(\bigl|\bar{\lambda}^{\text{virtual}}_{ \Delta , n, s, g(\theta )}\bigr\rangle \bigr) L_{(\Delta \oplus 1)_{X}}^{*} \bigr]:=e_{n, s, g(\theta )}^{\mathrm{U}}. $$</span></div><div class="c-article-equation__number"> (15) </div></div><h4 class="c-article__sub-heading c-article__sub-heading--small" id="Sec8"><span class="c-article-section__title-number">2.3.3 </span>Solving Eqs.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>) numerically</h4><p>Solving numerically the SDPs presented above is difficult for two main reasons. Firstly, they are infinitely dimensional, because the states <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> are infinite-dimensional. Secondly, this also renders the calculation of the eigendecomposition of <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ4">4</a>) a difficult task. To overcome these two limitations, we follow a technique recently introduced in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 50" title=" Shlok N. Decoy-state quantum key distribution with arbitrary phase mixtures and phase correlations. " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR50" id="ref-link-section-d131444011e9287">50</a>] (see also [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 51" title=" Upadhyaya T, Himbeeck T, Lin J, Lütkenhaus N. Dimension reduction in quantum key distribution for continuous- and discrete-variable protocols. PRX Quantum. 2021;2:020325. https://doi.org/10.1103/PRXQuantum.2.020325 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR51" id="ref-link-section-d131444011e9290">51</a>]), which consists in projecting the states <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> onto a finite-dimensional subspace that contains up to <i>M</i> photons. We shall denote the projected states as </p><div id="Equ16" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \rho ^{\mu}_{[g(\theta )], M}= \frac{\Pi _{M} \rho ^{\mu}_{[g(\theta )]} \Pi _{M}}{\operatorname{Tr} [\Pi _{M} \rho ^{\mu}_{[g(\theta )]} \Pi _{M} ]}, $$</span></div><div class="c-article-equation__number"> (16) </div></div><p> where <span class="mathjax-tex">\(\Pi _{M}=\sum_{n=0}^{M}|{n}\rangle \langle{n}|\)</span> denotes the projector onto the <i>M</i>-photon subspace, being <span class="mathjax-tex">\(|{n}\rangle \)</span> a Fock state. In doing so, now the eigendecomposition of <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )], M}\)</span> can be easily obtained numerically. For later convenience, we will denote the eigendecomposition of the numerator of the right hand side of Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ16">16</a>) as </p><div id="Equ17" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \Pi _{M}\rho ^{\mu}_{[g(\theta )]}\Pi _{M}=\sum_{n=0}^{M} q_{n| \mu , g(\theta )}{\hat{P}}\bigl(|\varphi _{n, \mu , g(\theta )}\rangle \bigr). $$</span></div><div class="c-article-equation__number"> (17) </div></div><p>Importantly, this technique also allows to transform the infinite-dimensional SDPs given by Eqs.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>) onto finite-dimensional SDPs that can be solved numerically. The resulting SDPs and their derivation are provided in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec17">B</a>.</p><h4 class="c-article__sub-heading c-article__sub-heading--small" id="Sec9"><span class="c-article-section__title-number">2.3.4 </span>Lower bound on the probabilities <span class="mathjax-tex">\(p_{n| s, g(\theta )}\)</span> </h4><p>As explained in the previous subsection, because the states <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> are infinite-dimensional, it might be difficult to calculate their eigendecomposition, and thus the probabilities <span class="mathjax-tex">\(p_{n| s, g(\theta )}\)</span>. Instead, here we provide a lower bound on these probabilities based on the eigendecomposition given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ17">17</a>). In particular, in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec17">B</a> it is shown that </p><div id="Equ18" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ p_{n| s, g(\theta )}\geq q_{n| s, g(\theta )}-\epsilon _{s}:=p_{n| s, g( \theta )}^{\text{L}} $$</span></div><div class="c-article-equation__number"> (18) </div></div><p> with <span class="mathjax-tex">\(\epsilon _{s}=2 \sqrt{1-\operatorname{Tr} [\Pi _{M} \rho ^{s}_{[g( \theta )]} \Pi _{M} ]}\)</span>.</p></div></div></section><section data-title="Results"><div class="c-article-section" id="Sec10-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="Sec10"><span class="c-article-section__title-number">3 </span>Results</h2><div class="c-article-section__content" id="Sec10-content"><p>In this section, we now evaluate the secret key rate obtainable for various examples of functions <span class="mathjax-tex">\(g(\theta )\)</span>. For illustration purposes, we consider three main scenarios, depending on whether or not the function <span class="mathjax-tex">\(g(\theta )\)</span> is fully characterized. Also, for the simulations, we consider a simple channel model whose transmission efficiency is given by <span class="mathjax-tex">\(10^{-\frac{\gamma}{10}}\)</span>, where <i>γ</i> (measured in dB) represents the overall system loss, <i>i.e.</i>, it also includes the effect of the finite detection efficiency of Bob’s detectors. Moreover, for simplicity, we disregard any misalignment effect, and assume that the only source of errors are the dark counts of Bob’s detectors, whose probability is set to <span class="mathjax-tex">\(p_{d}=10^{-8}\)</span> [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 23" title=" Boaron A, Boso G, Rusca D, Vulliez C, Autebert C, Caloz M et al.. Secure quantum key distribution over 421 km of optical fiber. Phys Rev Lett. 2018;121:190502. https://doi.org/10.1103/PhysRevLett.121.190502 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR23" id="ref-link-section-d131444011e10300">23</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 52" title=" Yin HL, Chen TY, Yu ZW, Liu H, You LX, Zhou YH et al.. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys Rev Lett. 2016;117:190501. https://doi.org/10.1103/PhysRevLett.117.190501 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR52" id="ref-link-section-d131444011e10303">52</a>]. In addition, as already mentioned, we consider that the BB84 encoding operators are ideal even though the analysis presented here is applicable if this condition is not met, and we take an error correction efficiency <span class="mathjax-tex">\(f=1.16\)</span>.</p><p>To obtain the bounds <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z, \mathrm{L}}\)</span> and <span class="mathjax-tex">\(e_{n, s, g(\theta )}^{\mathrm{U}}\)</span> we use the finite-dimensional versions of the SDPs above, which are presented in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec17">B</a>. Note that, the resulting secret key rate is an increasing function of <i>M</i>. However, the time required to numerically solve such SDPs grows rapidly with this parameter. For this reason, we have set a sufficiently large <i>M</i> so that an increase in this parameter would result in a negligible improvement of the secret key rate as tested numerically. The effect that the parameter <i>M</i> has in the secret key rate, is studied in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec21">D</a>.</p><h3 class="c-article__sub-heading" id="Sec11"><span class="c-article-section__title-number">3.1 </span>Fully-characterized <span class="mathjax-tex">\(g(\theta )\)</span> </h3><p>Here, we consider the scenario in which the function <span class="mathjax-tex">\(g(\theta )\)</span> is completely characterized, and we evaluate two specific examples of practical interest. The first example corresponds to the scenario given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ1">1</a>), which has been considered in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e10506">42</a>], while the second example can be interpreted as a noisy version of the first one.</p><h4 class="c-article__sub-heading c-article__sub-heading--small" id="Sec12"><span class="c-article-section__title-number">3.1.1 </span>Ideal discrete phase randomization</h4><p>The results are shown in Fig.&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig1">1</a> for different values of the total number of random phases <i>N</i> selected by Alice. In particular, the solid lines in the figure have been obtained using the parameter estimation procedure presented in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec5">2.3</a> based on SDP and the use of basis mismatched events. If we discard these latter events, the obtainable key rate decreases, as illustrated by the dashed-dot lines. Finally, the dotted lines correspond to the analysis in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e10525">42</a>]. For completeness, this latter approach is summarized in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec22">E</a>. In the first two cases, for simplicity, we set the intensity settings to the possibly sub-optimal values <span class="mathjax-tex">\(\omega =0\)</span>, <span class="mathjax-tex">\(\nu =s/5\)</span> and we optimize <i>s</i> as a function of the overall system loss <i>γ</i>, while in the later case we set <span class="mathjax-tex">\(\omega =0\)</span> and optimize both <i>ν</i> and <i>s</i> as a function of <i>γ</i> (which provides the optimal solution for this approach). Importantly, despite this fact, Fig.&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig1">1</a> shows that the use of SDP and basis mismatched events significantly improve the secret key rate when compared to the results in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e10625">42</a>]. Furthermore, we find that the improvement of using basis mismatched events is more advantageous when <i>N</i> is small. Indeed, when <span class="mathjax-tex">\(N\geq 5\)</span>, this enhancement in performance is almost negligible. This is expected as basis mismatched events do not improve the estimation in the case of ideal continuous phase randomization, <i>i.e.</i>, in the limit <span class="mathjax-tex">\(N\rightarrow \infty \)</span>. On the other hand, when <i>N</i> is small, the eigenstates <span class="mathjax-tex">\(|\psi _{n, s, g(\theta )}\rangle \)</span> for <span class="mathjax-tex">\(n=0,1\)</span> deviate more from a perfect Fock state, meaning that the virtual states <span class="mathjax-tex">\(|\lambda ^{\mathrm{virtual}}_{ \Delta , n, s, g(\theta )}\rangle \)</span> deviate more from the <i>X</i>-encoded states <span class="mathjax-tex">\(\hat{V}_{\Delta _{X}}|\psi _{n, s, g(\theta )}\rangle \)</span> and thus basis mismatched events provide a tighter estimation. </p><div class="c-article-section__figure js-c-reading-companion-figures-item" data-test="figure" data-container-section="figure" id="figure-1" data-title="Figure&nbsp;1"><figure><figcaption><b id="Fig1" class="c-article-section__figure-caption" data-test="figure-caption-text">Figure&nbsp;1</b></figcaption><div class="c-article-section__figure-content"><div class="c-article-section__figure-item"><a class="c-article-section__figure-link" data-test="img-link" data-track="click" data-track-label="image" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/1" rel="nofollow"><picture><source type="image/webp" srcset="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig1_HTML.jpg?as=webp"><img aria-describedby="Fig1" src="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig1_HTML.jpg" alt="figure 1" loading="lazy" width="685" height="481"></picture></a></div><div class="c-article-section__figure-description" data-test="bottom-caption" id="figure-1-desc"><p>Secret key rate in logarithmic scale versus the overall system loss for the ideal discrete phase-randomization scenario given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ1">1</a>), as a function of the total number of random phases <i>N</i> selected by Alice. The solid lines correspond to the parameter estimation procedure based on SDP and basis mismatched events considered in this work, while the dashed-dotted lines represent the same procedure overlooking basis mismatched events. Finally, the dotted lines correspond to the analysis in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e10904">42</a>] using linear programming</p></div></div><div class="u-text-right u-hide-print"><a class="c-article__pill-button" data-test="article-link" data-track="click" data-track-label="button" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/1" data-track-dest="link:Figure1 Full size image" aria-label="Full size image figure 1" rel="nofollow"><span>Full size image</span><svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-chevron-right-small"></use></svg></a></div></figure></div><p>Note that, as shown in Fig.&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig2">2</a>, when <span class="mathjax-tex">\(N\geq 6\)</span>, the improvement in the secret key rate that can be obtained by further increasing the value of <i>N</i> decelerates. Hence, it seems that a value of around <span class="mathjax-tex">\(N=8\)</span> might be a good practical compromise, as this configuration requires only three random bits per pulse to select the random phase. As in the previous figure, here we set the intensities to <span class="mathjax-tex">\(\{s, s/5, 0\}\)</span> and optimize <i>s</i> as a function of the overall system loss to simplify the numerics. This is done for both the ideal PR-WCP scenario and for the different values of <i>N</i> to ensure a fear comparison between both scenarios. </p><div class="c-article-section__figure js-c-reading-companion-figures-item" data-test="figure" data-container-section="figure" id="figure-2" data-title="Figure&nbsp;2"><figure><figcaption><b id="Fig2" class="c-article-section__figure-caption" data-test="figure-caption-text">Figure&nbsp;2</b></figcaption><div class="c-article-section__figure-content"><div class="c-article-section__figure-item"><a class="c-article-section__figure-link" data-test="img-link" data-track="click" data-track-label="image" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/2" rel="nofollow"><picture><source type="image/webp" srcset="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig2_HTML.jpg?as=webp"><img aria-describedby="Fig2" src="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig2_HTML.jpg" alt="figure 2" loading="lazy" width="685" height="482"></picture></a></div><div class="c-article-section__figure-description" data-test="bottom-caption" id="figure-2-desc"><p>Secret key rate in logarithmic scale versus the overall system loss for the ideal discrete phase-randomization scenario given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ1">1</a>), as a function of the total number of random phases <i>N</i> selected by Alice, when Alice and Bob employ the parameter estimation procedure based on SDP and basis mismatched events considered in this work. Remarkably, as shown in the figure, only eight random phases are enough to deliver a secret key rate already quite close to the ideal scenario of perfect PR-WCPs, where the phase of each pulse is uniformly random in <span class="mathjax-tex">\([0,2\pi )\)</span></p></div></div><div class="u-text-right u-hide-print"><a class="c-article__pill-button" data-test="article-link" data-track="click" data-track-label="button" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/2" data-track-dest="link:Figure2 Full size image" aria-label="Full size image figure 2" rel="nofollow"><span>Full size image</span><svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-chevron-right-small"></use></svg></a></div></figure></div><h4 class="c-article__sub-heading c-article__sub-heading--small" id="Sec13"><span class="c-article-section__title-number">3.1.2 </span>Noisy discrete phase randomization</h4><p>Here we consider the situation in which the actual phase encoded by Alice in each emitted pulse follows a certain PDF around the selected discrete value <span class="mathjax-tex">\(\theta _{k}=2 \pi k/N\)</span>. This might happen due to device imperfections of the phase modulator or the electronics that control it. For concreteness and illustration purposes, we shall assume that this PDF is a truncated Gaussian distribution, though we remark that our analysis can be applied to any given distribution. A truncated Gaussian distribution has the form </p><div id="Equ19" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ f (\theta ; \theta _{k}, \sigma _{k}, \lambda _{k}, \Lambda _{k} )= \frac{\phi (\theta ; \theta _{k}, \sigma _{k}^{2} )}{\Phi (\Lambda _{k}; \theta _{k}, \sigma _{k}^{2} )-\Phi (\lambda _{k}; \theta _{k}, \sigma _{k}^{2} )}, $$</span></div><div class="c-article-equation__number"> (19) </div></div><p> when the phase <i>θ</i> is in the interval <span class="mathjax-tex">\(\lambda _{k}&lt;\theta &lt;\Lambda _{k}\)</span>, and zero otherwise. The functions <span class="mathjax-tex">\(\phi (x; \gamma , \sigma ^{2} )\)</span> and <span class="mathjax-tex">\(\Phi (x; \gamma , \sigma ^{2} )\)</span> in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ19">19</a>) are, respectively, given by </p><div id="Equ20" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} &amp;\phi (x; y, z )=\frac{1}{\sqrt{2 \pi z}} e^{- \frac{(x-y)^{2}}{2 z}}, \\ &amp;\Phi (x; y, z )= \int _{-\infty}^{x} \frac{1}{\sqrt{2 \pi z}} e^{-\frac{(t-y)^{2}}{2 z}} \,dt . \end{aligned} $$</span></div><div class="c-article-equation__number"> (20) </div></div><p> That is, in this scenario the function <span class="mathjax-tex">\(g(\theta )\)</span> has the following form </p><div id="Equ21" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ g(\theta )= \frac{1}{N}\sum _{k=0}^{N-1} f (\theta ; \theta _{k}, \sigma _{k}, \lambda _{k}, \Lambda _{k} ) $$</span></div><div class="c-article-equation__number"> (21) </div></div><p> for certain parameters <span class="mathjax-tex">\(\theta _{k}\)</span>, <span class="mathjax-tex">\(\sigma _{k}\)</span>, <span class="mathjax-tex">\(\lambda _{k}\)</span> and <span class="mathjax-tex">\(\Lambda _{k}\)</span>.</p><p>In the limit when the standard deviations <span class="mathjax-tex">\(\sigma _{k} \to 0\)</span> <span class="stix">∀</span><i>k</i>, Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ21">21</a>) converges to the PDF given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ1">1</a>), because in that regime each truncated Gaussian distribution approaches the Dirac delta function. On the other hand, when <span class="mathjax-tex">\(\sigma _{k} \to \infty \)</span>, and given that the concatenation of the truncation intervals defined by <span class="mathjax-tex">\(\lambda _{k}\)</span> and <span class="mathjax-tex">\(\Lambda _{k}\)</span> allow the phase to take any value within the range of <span class="mathjax-tex">\([0,2\pi )\)</span> but do not overlap each other, Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ21">21</a>) converges to the PDF of a uniform distribution in <span class="mathjax-tex">\([0,2\pi )\)</span>. Importantly, this means that the achievable secret key rate will increase with higher values of <span class="mathjax-tex">\(\sigma _{k}\)</span>, or, to put it in other words, when the uncertainty about the phase actually imprinted by Alice on each of her prepared signals increases, given that <span class="mathjax-tex">\(g(\theta )\)</span> is completely characterized.</p><p>The simulation results are shown in Fig.&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig3">3</a>, which presents a comparison between the achievable secret key rate for two different values of the standard deviations <span class="mathjax-tex">\(\sigma _{k}\)</span>, which, for simplicity, are assumed to be equal for all <i>k</i>. As expected, the larger the value of <span class="mathjax-tex">\(\sigma _{k}\)</span> is, the higher the resulting secret key rate, regardless of the number <i>N</i> of random phases selected by Alice, though the improvement is more relevant when <i>N</i> is small. For simplicity and due to the lack of experimental data, Fig.&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig3">3</a> assumes that <span class="mathjax-tex">\(\lambda _{k}=\theta _{k}-3\sigma _{k}\)</span> and <span class="mathjax-tex">\(\Lambda _{k}=\theta _{k}+3\sigma _{k}\)</span>. Moreover, like in the previous example, we set <span class="mathjax-tex">\(\omega =0\)</span>, <span class="mathjax-tex">\(\nu =s/5\)</span> and we optimize <i>s</i> as a function of the overall system loss. </p><div class="c-article-section__figure js-c-reading-companion-figures-item" data-test="figure" data-container-section="figure" id="figure-3" data-title="Figure&nbsp;3"><figure><figcaption><b id="Fig3" class="c-article-section__figure-caption" data-test="figure-caption-text">Figure&nbsp;3</b></figcaption><div class="c-article-section__figure-content"><div class="c-article-section__figure-item"><a class="c-article-section__figure-link" data-test="img-link" data-track="click" data-track-label="image" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/3" rel="nofollow"><picture><source type="image/webp" srcset="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig3_HTML.jpg?as=webp"><img aria-describedby="Fig3" src="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig3_HTML.jpg" alt="figure 3" loading="lazy" width="685" height="479"></picture></a></div><div class="c-article-section__figure-description" data-test="bottom-caption" id="figure-3-desc"><p>Secret key rate in logarithmic scale versus the overall system loss when <span class="mathjax-tex">\(g(\theta )\)</span> follows the PDF given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ21">21</a>), as a function of the total number of random phases <i>N</i> selected by Alice, and for two different values of the standard deviations <span class="mathjax-tex">\(\sigma _{k}\)</span>, which are assumed to be equal for all <i>k</i></p></div></div><div class="u-text-right u-hide-print"><a class="c-article__pill-button" data-test="article-link" data-track="click" data-track-label="button" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/3" data-track-dest="link:Figure3 Full size image" aria-label="Full size image figure 3" rel="nofollow"><span>Full size image</span><svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-chevron-right-small"></use></svg></a></div></figure></div><h3 class="c-article__sub-heading" id="Sec14"><span class="c-article-section__title-number">3.2 </span>Partially-characterized <span class="mathjax-tex">\(g(\theta )\)</span> </h3><p>Here, we now consider the scenario in which only partial information about the function <span class="mathjax-tex">\(g(\theta )\)</span> is known. In particular, and for illustration purposes, we shall assume that the actual phase encoded by Alice in each emitted pulse could be any phase within a certain interval around the selected discrete value <span class="mathjax-tex">\(\theta _{k}=2 \pi k/N\)</span>, but its precise PDF <span class="mathjax-tex">\(g(\theta )\)</span> is unknown. Precisely, let <span class="mathjax-tex">\(\delta _{\text{max}}\)</span> denote the maximum possible deviation between the actual selected phase <span class="mathjax-tex">\(\theta _{k}\)</span> and the actual imprinted phase, which we shall denote by <span class="mathjax-tex">\(\hat{\theta}_{k}\)</span>. That is, we assume that the actual imprinted phase lies in the interval <span class="mathjax-tex">\(\hat{\theta}_{k}\in [\theta _{k}-\delta _{\text{max}},\theta _{k}+ \delta _{\text{max}}]\)</span>, and we conservatively take the combination of values <span class="mathjax-tex">\(\hat{\theta}_{k}\)</span> for all <i>k</i> that minimizes the secret key rate following the analysis presented in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec20">C</a>.</p><p>The results are illustrated in Fig.&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig4">4</a>, as a function of the total number of phases <i>N</i> selected by Alice and the value of the maximum deviation <span class="mathjax-tex">\(\delta _{\text{max}}\)</span>. Like in the previous examples, for simplicity, we fix <span class="mathjax-tex">\(\omega =0\)</span>, <span class="mathjax-tex">\(\nu =s/5\)</span> and we optimize <i>s</i> as a function of the overall system loss. As expected, the larger the value of <span class="mathjax-tex">\(\delta _{\text{max}}\)</span> is, the lower the resulting secret key rate. </p><div class="c-article-section__figure js-c-reading-companion-figures-item" data-test="figure" data-container-section="figure" id="figure-4" data-title="Figure&nbsp;4"><figure><figcaption><b id="Fig4" class="c-article-section__figure-caption" data-test="figure-caption-text">Figure&nbsp;4</b></figcaption><div class="c-article-section__figure-content"><div class="c-article-section__figure-item"><a class="c-article-section__figure-link" data-test="img-link" data-track="click" data-track-label="image" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/4" rel="nofollow"><picture><source type="image/webp" srcset="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig4_HTML.jpg?as=webp"><img aria-describedby="Fig4" src="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig4_HTML.jpg" alt="figure 4" loading="lazy" width="685" height="480"></picture></a></div><div class="c-article-section__figure-description" data-test="bottom-caption" id="figure-4-desc"><p>Secret key rate in logarithmic scale versus the overall system loss when the phases lie in the intervals <span class="mathjax-tex">\(\theta _{k}\pm \delta _{\text{max}}\)</span> and the function <span class="mathjax-tex">\(g(\theta )\)</span> is unknown, as a function of the total number of random phases <i>N</i> selected by Alice and the value of <span class="mathjax-tex">\(\delta _{\text{max}}\)</span></p></div></div><div class="u-text-right u-hide-print"><a class="c-article__pill-button" data-test="article-link" data-track="click" data-track-label="button" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/4" data-track-dest="link:Figure4 Full size image" aria-label="Full size image figure 4" rel="nofollow"><span>Full size image</span><svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-chevron-right-small"></use></svg></a></div></figure></div><p>Also, from Fig.&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig4">4</a> we see that for higher values of <span class="mathjax-tex">\(\delta _{\text{max}}\)</span>, the secret key rate becomes less sensitive to the parameter <i>N</i>. Indeed, when <span class="mathjax-tex">\(\delta _{\text{max}}=10^{-1}\)</span>, the achievable secret key rate for the cases <span class="mathjax-tex">\(N=3, 4, 5\)</span> essentially overlap each other, which is the left-most curve. This seems to be due to the fact that a significant increase in <span class="mathjax-tex">\(\delta _{\text{max}}\)</span> allows in principle for some phases to lie close to each other, or even become identical if this parameter is large enough. Under this situation, the increase of <i>N</i> does not help to improve the performance, as the effective randomness remains almost the same.</p></div></div></section><section data-title="Conclusion"><div class="c-article-section" id="Sec15-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="Sec15"><span class="c-article-section__title-number">4 </span>Conclusion</h2><div class="c-article-section__content" id="Sec15-content"><p>In this paper we have considered the security of decoy-state quantum key distribution (QKD) when the phase of each generated signal is not uniformly random, as requested by the theory, but follows an arbitrary, continuous or discrete, probability density function (PDF). This might happen due to the presence of device imperfections in the phase-randomization process, and/or due to the use of an external phase modulator to imprint the random phases on the generated pulses, which limits the possible selected phases to a finite set.</p><p>Our analysis combines a novel parameter estimation technique, based on semi-definite programming, with the use of basis mismatched events, to tightly estimate the relevant parameters that are needed to evaluate the achievable secret key rate. In doing so, we have shown that decoy-state QKD is rather robust to faulty phase-randomization, particularly when the PDF that governs the random phases is well-characterized. Moreover, our results significantly outperform those of previous works while being also more general, in the sense that they can handle more realistic and practical scenarios.</p><p>This work might be relevant as well to other quantum communication protocols beyond QKD that use laser sources and decoy states.</p></div></div></section> <section data-title="Data availability"><div class="c-article-section" id="data-availability-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="data-availability">Data availability</h2><div class="c-article-section__content" id="data-availability-content"> <p>Not applicable.</p> </div></div></section><section data-title="Code availability"><div class="c-article-section" id="code-availability-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="code-availability">Code availability</h2><div class="c-article-section__content" id="code-availability-content"> <p>The code is available upon request from the authors.</p> </div></div></section><section data-title="Notes"><div class="c-article-section" id="notes-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="notes">Notes</h2><div class="c-article-section__content" id="notes-content"><ol class="c-article-footnote c-article-footnote--listed"><li class="c-article-footnote--listed__item" id="Fn1" data-counter="1."><div class="c-article-footnote--listed__content"><p>This is because the analysis in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 41" title=" Currás-Lorenzo G, Tamaki K, Curty M. Security of decoy-state quantum key distribution with imperfect phase randomization. Preprint. 2022. arXiv:2210.08183 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR41" id="ref-link-section-d131444011e702">41</a>] requires that there is a known non-zero parameter <i>q</i> such that <span class="mathjax-tex">\(g(\theta ) \geq q\)</span> for all <span class="mathjax-tex">\(\theta \in [0,2\pi )\)</span>. In the case of active phase randomization, only a discrete number of phases is selected, and therefore there might be many values <span class="mathjax-tex">\(\theta \in [0,2\pi )\)</span> such that <span class="mathjax-tex">\(g(\theta ) =0\)</span>.</p></div></li><li class="c-article-footnote--listed__item" id="Fn2" data-counter="2."><div class="c-article-footnote--listed__content"><p>From this point on, if we have two operators, say <i>A</i> and <i>B</i> by <span class="mathjax-tex">\(A\leq B\)</span> we mean that <span class="mathjax-tex">\(B-A\geq 0\)</span>, <i>i.e.</i> that <span class="mathjax-tex">\(B-A\)</span> is a positive semi-definite operator.</p></div></li></ol></div></div></section><section data-title="Abbreviations"><div class="c-article-section" id="abbreviations-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="abbreviations">Abbreviations</h2><div class="c-article-section__content" id="abbreviations-content"><dl class="c-abbreviation_list"><dt class="c-abbreviation_list__term u-text-bold u-float-left u-pr-16" style="min-width:50px;"><dfn>QKD:</dfn></dt><dd class="c-abbreviation_list__description u-mb-24"> <p>quantum key distribution</p> </dd><dt class="c-abbreviation_list__term u-text-bold u-float-left u-pr-16" style="min-width:50px;"><dfn>GLLP:</dfn></dt><dd class="c-abbreviation_list__description u-mb-24"> <p>Gottesman, Lo, Lütkenhaus and Preskill</p> </dd><dt class="c-abbreviation_list__term u-text-bold u-float-left u-pr-16" style="min-width:50px;"><dfn>SDP:</dfn></dt><dd class="c-abbreviation_list__description u-mb-24"> <p>Semidefinite programming</p> </dd><dt class="c-abbreviation_list__term u-text-bold u-float-left u-pr-16" style="min-width:50px;"><dfn>LP:</dfn></dt><dd class="c-abbreviation_list__description u-mb-24"> <p>linear programming</p> </dd><dt class="c-abbreviation_list__term u-text-bold u-float-left u-pr-16" style="min-width:50px;"><dfn>PR-WCP:</dfn></dt><dd class="c-abbreviation_list__description u-mb-24"> <p>phase-randomized weak coherent pulse</p> </dd><dt class="c-abbreviation_list__term u-text-bold u-float-left u-pr-16" style="min-width:50px;"><dfn>PDF:</dfn></dt><dd class="c-abbreviation_list__description u-mb-24"> <p>probability density function</p> </dd></dl></div></div></section><div id="MagazineFulltextArticleBodySuffix"><section aria-labelledby="Bib1" data-title="References"><div class="c-article-section" id="Bib1-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="Bib1">References</h2><div class="c-article-section__content" id="Bib1-content"><div data-container-section="references"><ol class="c-article-references" data-track-component="outbound reference" data-track-context="references section"><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="1."><p class="c-article-references__text" id="ref-CR1"> Xu F, Ma X, Zhang Q, Lo HK, Pan JW. Secure quantum key distribution with realistic devices. Rev Mod Phys. 2020;92:025002. <a href="https://doi.org/10.1103/RevModPhys.92.025002" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/RevModPhys.92.025002">https://doi.org/10.1103/RevModPhys.92.025002</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/RevModPhys.92.025002" data-track-item_id="10.1103/RevModPhys.92.025002" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FRevModPhys.92.025002" aria-label="Article reference 1" data-doi="10.1103/RevModPhys.92.025002">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2020RvMP...92b5002X" aria-label="ADS reference 1">ADS</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="mathscinet reference" data-track-action="mathscinet reference" href="http://www.ams.org/mathscinet-getitem?mr=4122934" aria-label="MathSciNet reference 1">MathSciNet</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 1" href="http://scholar.google.com/scholar_lookup?&amp;title=Secure%20quantum%20key%20distribution%20with%20realistic%20devices&amp;journal=Rev%20Mod%20Phys&amp;doi=10.1103%2FRevModPhys.92.025002&amp;volume=92&amp;publication_year=2020&amp;author=Xu%2CF&amp;author=Ma%2CX&amp;author=Zhang%2CQ&amp;author=Lo%2CHK&amp;author=Pan%2CJW"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="2."><p class="c-article-references__text" id="ref-CR2"> Pirandola S, Andersen UL, Banchi L, Berta M, Bunandar D, Colbeck R et al.. Advances in quantum cryptography. Adv Opt Photonics. 2020;12(4):1012. <a href="https://doi.org/10.1364/aop.361502" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1364/aop.361502">https://doi.org/10.1364/aop.361502</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1364/aop.361502" data-track-item_id="10.1364/aop.361502" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1364%2Faop.361502" aria-label="Article reference 2" data-doi="10.1364/aop.361502">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2020AdOP...12.1012P" aria-label="ADS reference 2">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 2" href="http://scholar.google.com/scholar_lookup?&amp;title=Advances%20in%20quantum%20cryptography&amp;journal=Adv%20Opt%20Photonics&amp;doi=10.1364%2Faop.361502&amp;volume=12&amp;issue=4&amp;publication_year=2020&amp;author=Pirandola%2CS&amp;author=Andersen%2CUL&amp;author=Banchi%2CL&amp;author=Berta%2CM&amp;author=Bunandar%2CD&amp;author=Colbeck%2CR"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="3."><p class="c-article-references__text" id="ref-CR3"> Lo HK, Curty M, Tamaki K. Secure quantum key distribution. Nat Photonics. 2014;8(8):595–604. <a href="https://doi.org/10.1038/nphoton.2014.149" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1038/nphoton.2014.149">https://doi.org/10.1038/nphoton.2014.149</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1038/nphoton.2014.149" data-track-item_id="10.1038/nphoton.2014.149" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1038%2Fnphoton.2014.149" aria-label="Article reference 3" data-doi="10.1038/nphoton.2014.149">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2014NaPho...8..595L" aria-label="ADS reference 3">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 3" href="http://scholar.google.com/scholar_lookup?&amp;title=Secure%20quantum%20key%20distribution&amp;journal=Nat%20Photonics&amp;doi=10.1038%2Fnphoton.2014.149&amp;volume=8&amp;issue=8&amp;pages=595-604&amp;publication_year=2014&amp;author=Lo%2CHK&amp;author=Curty%2CM&amp;author=Tamaki%2CK"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="4."><p class="c-article-references__text" id="ref-CR4"> Wootters WK, Zurek WH. A single quantum cannot be cloned. Nature. 1982;299:802–3. <a href="https://doi.org/10.1038/299802a0" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1038/299802a0">https://doi.org/10.1038/299802a0</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1038/299802a0" data-track-item_id="10.1038/299802a0" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1038%2F299802a0" aria-label="Article reference 4" data-doi="10.1038/299802a0">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=1982Natur.299..802W" aria-label="ADS reference 4">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 4" href="http://scholar.google.com/scholar_lookup?&amp;title=A%20single%20quantum%20cannot%20be%20cloned&amp;journal=Nature&amp;doi=10.1038%2F299802a0&amp;volume=299&amp;pages=802-803&amp;publication_year=1982&amp;author=Wootters%2CWK&amp;author=Zurek%2CWH"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="5."><p class="c-article-references__text" id="ref-CR5"> Vernam GS. Cipher printing telegraph systems for secret wire and radio telegraphic communications. Trans Am Inst Electr Eng. 1926;XLV:295–301. <a href="https://doi.org/10.1109/T-AIEE.1926.5061224" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1109/T-AIEE.1926.5061224">https://doi.org/10.1109/T-AIEE.1926.5061224</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1109/T-AIEE.1926.5061224" data-track-item_id="10.1109/T-AIEE.1926.5061224" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1109%2FT-AIEE.1926.5061224" aria-label="Article reference 5" data-doi="10.1109/T-AIEE.1926.5061224">Article</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 5" href="http://scholar.google.com/scholar_lookup?&amp;title=Cipher%20printing%20telegraph%20systems%20for%20secret%20wire%20and%20radio%20telegraphic%20communications&amp;journal=Trans%20Am%20Inst%20Electr%20Eng&amp;doi=10.1109%2FT-AIEE.1926.5061224&amp;volume=XLV&amp;pages=295-301&amp;publication_year=1926&amp;author=Vernam%2CGS"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="6."><p class="c-article-references__text" id="ref-CR6"> Sasaki M, Fujiwara M, Ishizuka H, Klaus W, Wakui K, Takeoka M et al.. Field test of quantum key distribution in the Tokyo QKD network. Opt Express. 2011;19(11):10387. <a href="https://doi.org/10.1364/oe.19.010387" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1364/oe.19.010387">https://doi.org/10.1364/oe.19.010387</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1364/oe.19.010387" data-track-item_id="10.1364/oe.19.010387" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1364%2Foe.19.010387" aria-label="Article reference 6" data-doi="10.1364/oe.19.010387">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2011OExpr..1910387S" aria-label="ADS reference 6">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 6" href="http://scholar.google.com/scholar_lookup?&amp;title=Field%20test%20of%20quantum%20key%20distribution%20in%20the%20Tokyo%20QKD%20network&amp;journal=Opt%20Express&amp;doi=10.1364%2Foe.19.010387&amp;volume=19&amp;issue=11&amp;publication_year=2011&amp;author=Sasaki%2CM&amp;author=Fujiwara%2CM&amp;author=Ishizuka%2CH&amp;author=Klaus%2CW&amp;author=Wakui%2CK&amp;author=Takeoka%2CM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="7."><p class="c-article-references__text" id="ref-CR7"> Stucki D, Legré M, Buntschu F, Clausen B, Felber N, Gisin N et al.. Long-term performance of the SwissQuantum quantum key distribution network in a field environment. New J Phys. 2011;13(12):123001. <a href="https://doi.org/10.1088/1367-2630/13/12/123001" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1088/1367-2630/13/12/123001">https://doi.org/10.1088/1367-2630/13/12/123001</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1088/1367-2630/13/12/123001" data-track-item_id="10.1088/1367-2630/13/12/123001" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1088%2F1367-2630%2F13%2F12%2F123001" aria-label="Article reference 7" data-doi="10.1088/1367-2630/13/12/123001">Article</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 7" href="http://scholar.google.com/scholar_lookup?&amp;title=Long-term%20performance%20of%20the%20SwissQuantum%20quantum%20key%20distribution%20network%20in%20a%20field%20environment&amp;journal=New%20J%20Phys&amp;doi=10.1088%2F1367-2630%2F13%2F12%2F123001&amp;volume=13&amp;issue=12&amp;publication_year=2011&amp;author=Stucki%2CD&amp;author=Legr%C3%A9%2CM&amp;author=Buntschu%2CF&amp;author=Clausen%2CB&amp;author=Felber%2CN&amp;author=Gisin%2CN"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="8."><p class="c-article-references__text" id="ref-CR8"> Dynes JF, Wonfor A, Tam WWS, Sharpe AW, Takahashi R, Lucamarini M et al.. Cambridge quantum network. npj Quantum Inf. 2019;5(1):101. <a href="https://doi.org/10.1038/s41534-019-0221-4" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1038/s41534-019-0221-4">https://doi.org/10.1038/s41534-019-0221-4</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1038/s41534-019-0221-4" data-track-item_id="10.1038/s41534-019-0221-4" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1038%2Fs41534-019-0221-4" aria-label="Article reference 8" data-doi="10.1038/s41534-019-0221-4">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2019npjQI...5..101D" aria-label="ADS reference 8">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 8" href="http://scholar.google.com/scholar_lookup?&amp;title=Cambridge%20quantum%20network&amp;journal=npj%20Quantum%20Inf&amp;doi=10.1038%2Fs41534-019-0221-4&amp;volume=5&amp;issue=1&amp;publication_year=2019&amp;author=Dynes%2CJF&amp;author=Wonfor%2CA&amp;author=Tam%2CWWS&amp;author=Sharpe%2CAW&amp;author=Takahashi%2CR&amp;author=Lucamarini%2CM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="9."><p class="c-article-references__text" id="ref-CR9"> Chen YA, Zhang Q, Chen TY, Cai WQ, Liao SK, Zhang J et al.. An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature. 2021;589:214–9. <a href="https://doi.org/10.1038/s41586-020-03093-8" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1038/s41586-020-03093-8">https://doi.org/10.1038/s41586-020-03093-8</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1038/s41586-020-03093-8" data-track-item_id="10.1038/s41586-020-03093-8" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1038%2Fs41586-020-03093-8" aria-label="Article reference 9" data-doi="10.1038/s41586-020-03093-8">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2021Natur.589..214C" aria-label="ADS reference 9">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 9" href="http://scholar.google.com/scholar_lookup?&amp;title=An%20integrated%20space-to-ground%20quantum%20communication%20network%20over%204%2C600%20kilometres&amp;journal=Nature&amp;doi=10.1038%2Fs41586-020-03093-8&amp;volume=589&amp;pages=214-219&amp;publication_year=2021&amp;author=Chen%2CYA&amp;author=Zhang%2CQ&amp;author=Chen%2CTY&amp;author=Cai%2CWQ&amp;author=Liao%2CSK&amp;author=Zhang%2CJ"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="10."><p class="c-article-references__text" id="ref-CR10"> Bennett CH, Brassard G. Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE international conference on computers, systems, and signal processing. 1984. p.&nbsp;175–9. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 10" href="http://scholar.google.com/scholar_lookup?&amp;title=Quantum%20cryptography%3A%20public%20key%20distribution%20and%20coin%20tossing&amp;pages=175-179&amp;publication_year=1984&amp;author=Bennett%2CCH&amp;author=Brassard%2CG"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="11."><p class="c-article-references__text" id="ref-CR11"> Huttner B, Imoto N, Gisin N, Mor T. Quantum cryptography with coherent states. Phys Rev A. 1995;51:1863–9. <a href="https://doi.org/10.1103/PhysRevA.51.1863" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevA.51.1863">https://doi.org/10.1103/PhysRevA.51.1863</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevA.51.1863" data-track-item_id="10.1103/PhysRevA.51.1863" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevA.51.1863" aria-label="Article reference 11" data-doi="10.1103/PhysRevA.51.1863">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=1995PhRvA..51.1863H" aria-label="ADS reference 11">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 11" href="http://scholar.google.com/scholar_lookup?&amp;title=Quantum%20cryptography%20with%20coherent%20states&amp;journal=Phys%20Rev%20A&amp;doi=10.1103%2FPhysRevA.51.1863&amp;volume=51&amp;pages=1863-1869&amp;publication_year=1995&amp;author=Huttner%2CB&amp;author=Imoto%2CN&amp;author=Gisin%2CN&amp;author=Mor%2CT"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="12."><p class="c-article-references__text" id="ref-CR12"> Brassard G, Lütkenhaus N, Mor T, Sanders BC. Limitations on practical quantum cryptography. Phys Rev Lett. 2000;85:1330. <a href="https://doi.org/10.1103/PhysRevLett.85.1330" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevLett.85.1330">https://doi.org/10.1103/PhysRevLett.85.1330</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevLett.85.1330" data-track-item_id="10.1103/PhysRevLett.85.1330" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevLett.85.1330" aria-label="Article reference 12" data-doi="10.1103/PhysRevLett.85.1330">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2000PhRvL..85.1330B" aria-label="ADS reference 12">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 12" href="http://scholar.google.com/scholar_lookup?&amp;title=Limitations%20on%20practical%20quantum%20cryptography&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2FPhysRevLett.85.1330&amp;volume=85&amp;publication_year=2000&amp;author=Brassard%2CG&amp;author=L%C3%BCtkenhaus%2CN&amp;author=Mor%2CT&amp;author=Sanders%2CBC"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="13."><p class="c-article-references__text" id="ref-CR13"> Hwang WY. Quantum key distribution with high loss: toward global secure communication. Phys Rev Lett. 2003;91(5):057901. <a href="https://doi.org/10.1103/physrevlett.91.057901" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/physrevlett.91.057901">https://doi.org/10.1103/physrevlett.91.057901</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/physrevlett.91.057901" data-track-item_id="10.1103/physrevlett.91.057901" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2Fphysrevlett.91.057901" aria-label="Article reference 13" data-doi="10.1103/physrevlett.91.057901">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2003PhRvL..91e7901H" aria-label="ADS reference 13">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 13" href="http://scholar.google.com/scholar_lookup?&amp;title=Quantum%20key%20distribution%20with%20high%20loss%3A%20toward%20global%20secure%20communication&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2Fphysrevlett.91.057901&amp;volume=91&amp;issue=5&amp;publication_year=2003&amp;author=Hwang%2CWY"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="14."><p class="c-article-references__text" id="ref-CR14"> Wang XB. Beating the photon-number-splitting attack in practical quantum cryptography. Phys Rev Lett. 2005;94(23):230503. <a href="https://doi.org/10.1103/physrevlett.94.230503" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/physrevlett.94.230503">https://doi.org/10.1103/physrevlett.94.230503</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/physrevlett.94.230503" data-track-item_id="10.1103/physrevlett.94.230503" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2Fphysrevlett.94.230503" aria-label="Article reference 14" data-doi="10.1103/physrevlett.94.230503">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2005PhRvL..94w0503W" aria-label="ADS reference 14">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 14" href="http://scholar.google.com/scholar_lookup?&amp;title=Beating%20the%20photon-number-splitting%20attack%20in%20practical%20quantum%20cryptography&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2Fphysrevlett.94.230503&amp;volume=94&amp;issue=23&amp;publication_year=2005&amp;author=Wang%2CXB"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="15."><p class="c-article-references__text" id="ref-CR15"> Lo HK, Ma X, Decoy CK. State quantum key distribution. Phys Rev Lett. 2005;94(23):230504. <a href="https://doi.org/10.1103/physrevlett.94.230504" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/physrevlett.94.230504">https://doi.org/10.1103/physrevlett.94.230504</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/physrevlett.94.230504" data-track-item_id="10.1103/physrevlett.94.230504" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2Fphysrevlett.94.230504" aria-label="Article reference 15" data-doi="10.1103/physrevlett.94.230504">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2005PhRvL..94w0504L" aria-label="ADS reference 15">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 15" href="http://scholar.google.com/scholar_lookup?&amp;title=State%20quantum%20key%20distribution&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2Fphysrevlett.94.230504&amp;volume=94&amp;issue=23&amp;publication_year=2005&amp;author=Lo%2CHK&amp;author=Ma%2CX&amp;author=Decoy%2CCK"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="16."><p class="c-article-references__text" id="ref-CR16"> Lim CCW, Curty M, Walenta N, Xu F, Concise ZH. Security bounds for practical decoy-state quantum key distribution. Phys Rev A. 2014;89:022307. <a href="https://doi.org/10.1103/physreva.89.022307" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/physreva.89.022307">https://doi.org/10.1103/physreva.89.022307</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/physreva.89.022307" data-track-item_id="10.1103/physreva.89.022307" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2Fphysreva.89.022307" aria-label="Article reference 16" data-doi="10.1103/physreva.89.022307">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2014PhRvA..89b2307L" aria-label="ADS reference 16">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 16" href="http://scholar.google.com/scholar_lookup?&amp;title=Security%20bounds%20for%20practical%20decoy-state%20quantum%20key%20distribution&amp;journal=Phys%20Rev%20A&amp;doi=10.1103%2Fphysreva.89.022307&amp;volume=89&amp;publication_year=2014&amp;author=Lim%2CCCW&amp;author=Curty%2CM&amp;author=Walenta%2CN&amp;author=Xu%2CF&amp;author=Concise%2CZH"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="17."><p class="c-article-references__text" id="ref-CR17"> Zhao Y, Qi B, Ma X, Lo HK, Qian L. Experimental quantum key distribution with decoy states. Phys Rev Lett. 2006;96:70502. <a href="https://doi.org/10.1103/PhysRevLett.96.070502" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevLett.96.070502">https://doi.org/10.1103/PhysRevLett.96.070502</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevLett.96.070502" data-track-item_id="10.1103/PhysRevLett.96.070502" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevLett.96.070502" aria-label="Article reference 17" data-doi="10.1103/PhysRevLett.96.070502">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2006PhRvL..96g0502Z" aria-label="ADS reference 17">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 17" href="http://scholar.google.com/scholar_lookup?&amp;title=Experimental%20quantum%20key%20distribution%20with%20decoy%20states&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2FPhysRevLett.96.070502&amp;volume=96&amp;publication_year=2006&amp;author=Zhao%2CY&amp;author=Qi%2CB&amp;author=Ma%2CX&amp;author=Lo%2CHK&amp;author=Qian%2CL"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="18."><p class="c-article-references__text" id="ref-CR18"> Rosenberg D, Harrington JW, Rice PR, Hiskett PA, Peterson CG, Hughes RJ et al.. Long-distance decoy-state quantum key distribution in optical fiber. Phys Rev Lett. 2007;98:10503. <a href="https://doi.org/10.1103/physrevlett.98.010503" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/physrevlett.98.010503">https://doi.org/10.1103/physrevlett.98.010503</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/physrevlett.98.010503" data-track-item_id="10.1103/physrevlett.98.010503" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2Fphysrevlett.98.010503" aria-label="Article reference 18" data-doi="10.1103/physrevlett.98.010503">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2007PhRvL..98a0503R" aria-label="ADS reference 18">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 18" href="http://scholar.google.com/scholar_lookup?&amp;title=Long-distance%20decoy-state%20quantum%20key%20distribution%20in%20optical%20fiber&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2Fphysrevlett.98.010503&amp;volume=98&amp;publication_year=2007&amp;author=Rosenberg%2CD&amp;author=Harrington%2CJW&amp;author=Rice%2CPR&amp;author=Hiskett%2CPA&amp;author=Peterson%2CCG&amp;author=Hughes%2CRJ"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="19."><p class="c-article-references__text" id="ref-CR19"> Schmitt-Manderbach T, Weier H, Fürst M, Ursin R, Tiefenbacher F, Scheidl T et al.. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys Rev Lett. 2007;98:10504. <a href="https://doi.org/10.1103/PhysRevLett.98.010504" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevLett.98.010504">https://doi.org/10.1103/PhysRevLett.98.010504</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevLett.98.010504" data-track-item_id="10.1103/PhysRevLett.98.010504" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevLett.98.010504" aria-label="Article reference 19" data-doi="10.1103/PhysRevLett.98.010504">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2007PhRvL..98a0504S" aria-label="ADS reference 19">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 19" href="http://scholar.google.com/scholar_lookup?&amp;title=Experimental%20demonstration%20of%20free-space%20decoy-state%20quantum%20key%20distribution%20over%20144%20km&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2FPhysRevLett.98.010504&amp;volume=98&amp;publication_year=2007&amp;author=Schmitt-Manderbach%2CT&amp;author=Weier%2CH&amp;author=F%C3%BCrst%2CM&amp;author=Ursin%2CR&amp;author=Tiefenbacher%2CF&amp;author=Scheidl%2CT"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="20."><p class="c-article-references__text" id="ref-CR20"> Liu Y, Chen TY, Wang J, Cai WQ, Wan X, Chen LK et al.. Decoy-state quantum key distribution with polarized photons over 200 km. Opt Express. 2010;18:8587–94. <a href="https://doi.org/10.1364/OE.18.008587" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1364/OE.18.008587">https://doi.org/10.1364/OE.18.008587</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1364/OE.18.008587" data-track-item_id="10.1364/OE.18.008587" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1364%2FOE.18.008587" aria-label="Article reference 20" data-doi="10.1364/OE.18.008587">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2010OExpr..18.8587L" aria-label="ADS reference 20">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 20" href="http://scholar.google.com/scholar_lookup?&amp;title=Decoy-state%20quantum%20key%20distribution%20with%20polarized%20photons%20over%20200%20km&amp;journal=Opt%20Express&amp;doi=10.1364%2FOE.18.008587&amp;volume=18&amp;pages=8587-8594&amp;publication_year=2010&amp;author=Liu%2CY&amp;author=Chen%2CTY&amp;author=Wang%2CJ&amp;author=Cai%2CWQ&amp;author=Wan%2CX&amp;author=Chen%2CLK"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="21."><p class="c-article-references__text" id="ref-CR21"> Fröhlich B, Lucamarini M, Dynes JF, Comandar LC, Tam WWS, Plews A et al.. Long-distance quantum key distribution secure against coherent attacks. Optica. 2017;4(1):163–7. <a href="https://doi.org/10.1364/OPTICA.4.000163" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1364/OPTICA.4.000163">https://doi.org/10.1364/OPTICA.4.000163</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1364/OPTICA.4.000163" data-track-item_id="10.1364/OPTICA.4.000163" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1364%2FOPTICA.4.000163" aria-label="Article reference 21" data-doi="10.1364/OPTICA.4.000163">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2017Optic...4..163F" aria-label="ADS reference 21">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 21" href="http://scholar.google.com/scholar_lookup?&amp;title=Long-distance%20quantum%20key%20distribution%20secure%20against%20coherent%20attacks&amp;journal=Optica&amp;doi=10.1364%2FOPTICA.4.000163&amp;volume=4&amp;issue=1&amp;pages=163-167&amp;publication_year=2017&amp;author=Fr%C3%B6hlich%2CB&amp;author=Lucamarini%2CM&amp;author=Dynes%2CJF&amp;author=Comandar%2CLC&amp;author=Tam%2CWWS&amp;author=Plews%2CA"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="22."><p class="c-article-references__text" id="ref-CR22"> Yuan Z, Murakami A, Kujiraoka M, Lucamarini M, Tanizawa Y, Sato H et al.. 10-Mb/s quantum key distribution. J&nbsp;Lightwave Technol. 2018;36:3427–33. <a href="https://doi.org/10.1109/jlt.2018.2843136" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1109/jlt.2018.2843136">https://doi.org/10.1109/jlt.2018.2843136</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1109/jlt.2018.2843136" data-track-item_id="10.1109/jlt.2018.2843136" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1109%2Fjlt.2018.2843136" aria-label="Article reference 22" data-doi="10.1109/jlt.2018.2843136">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2018JLwT...36.3427Y" aria-label="ADS reference 22">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 22" href="http://scholar.google.com/scholar_lookup?&amp;title=10-Mb%2Fs%20quantum%20key%20distribution&amp;journal=J%C2%A0Lightwave%20Technol&amp;doi=10.1109%2Fjlt.2018.2843136&amp;volume=36&amp;pages=3427-3433&amp;publication_year=2018&amp;author=Yuan%2CZ&amp;author=Murakami%2CA&amp;author=Kujiraoka%2CM&amp;author=Lucamarini%2CM&amp;author=Tanizawa%2CY&amp;author=Sato%2CH"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="23."><p class="c-article-references__text" id="ref-CR23"> Boaron A, Boso G, Rusca D, Vulliez C, Autebert C, Caloz M et al.. Secure quantum key distribution over 421 km of optical fiber. Phys Rev Lett. 2018;121:190502. <a href="https://doi.org/10.1103/PhysRevLett.121.190502" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevLett.121.190502">https://doi.org/10.1103/PhysRevLett.121.190502</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevLett.121.190502" data-track-item_id="10.1103/PhysRevLett.121.190502" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevLett.121.190502" aria-label="Article reference 23" data-doi="10.1103/PhysRevLett.121.190502">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2018PhRvL.121s0502B" aria-label="ADS reference 23">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 23" href="http://scholar.google.com/scholar_lookup?&amp;title=Secure%20quantum%20key%20distribution%20over%20421%20km%20of%20optical%20fiber&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2FPhysRevLett.121.190502&amp;volume=121&amp;publication_year=2018&amp;author=Boaron%2CA&amp;author=Boso%2CG&amp;author=Rusca%2CD&amp;author=Vulliez%2CC&amp;author=Autebert%2CC&amp;author=Caloz%2CM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="24."><p class="c-article-references__text" id="ref-CR24"> Liao SK, Cai WQ, Liu WY, Zhang L, Li Y, Ren JG et al.. Satellite-to-ground quantum key distribution. Nature. 2017;549(7670):43–7. <a href="https://doi.org/10.1038/nature23655" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1038/nature23655">https://doi.org/10.1038/nature23655</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1038/nature23655" data-track-item_id="10.1038/nature23655" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1038%2Fnature23655" aria-label="Article reference 24" data-doi="10.1038/nature23655">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2017Natur.549...43L" aria-label="ADS reference 24">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 24" href="http://scholar.google.com/scholar_lookup?&amp;title=Satellite-to-ground%20quantum%20key%20distribution&amp;journal=Nature&amp;doi=10.1038%2Fnature23655&amp;volume=549&amp;issue=7670&amp;pages=43-47&amp;publication_year=2017&amp;author=Liao%2CSK&amp;author=Cai%2CWQ&amp;author=Liu%2CWY&amp;author=Zhang%2CL&amp;author=Li%2CY&amp;author=Ren%2CJG"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="25."><p class="c-article-references__text" id="ref-CR25"> Liao SK, Cai WQ, Handsteiner J, Liu B, Yin J, Zhang L et al.. Satellite-relayed intercontinental quantum network. Phys Rev Lett. 2018;120:030501. <a href="https://doi.org/10.1103/PhysRevLett.120.030501" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevLett.120.030501">https://doi.org/10.1103/PhysRevLett.120.030501</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevLett.120.030501" data-track-item_id="10.1103/PhysRevLett.120.030501" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevLett.120.030501" aria-label="Article reference 25" data-doi="10.1103/PhysRevLett.120.030501">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2018PhRvL.120c0501L" aria-label="ADS reference 25">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 25" href="http://scholar.google.com/scholar_lookup?&amp;title=Satellite-relayed%20intercontinental%20quantum%20network&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2FPhysRevLett.120.030501&amp;volume=120&amp;publication_year=2018&amp;author=Liao%2CSK&amp;author=Cai%2CWQ&amp;author=Handsteiner%2CJ&amp;author=Liu%2CB&amp;author=Yin%2CJ&amp;author=Zhang%2CL"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="26."><p class="c-article-references__text" id="ref-CR26"> Sibson P, Erven C, Godfrey M, Miki S, Yamashita T, Fujiwara M et al.. Chip-based quantum key distribution. Nat Commun. 2017;8:13984. <a href="https://doi.org/10.1038/ncomms13984" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1038/ncomms13984">https://doi.org/10.1038/ncomms13984</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1038/ncomms13984" data-track-item_id="10.1038/ncomms13984" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1038%2Fncomms13984" aria-label="Article reference 26" data-doi="10.1038/ncomms13984">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2017NatCo...813984S" aria-label="ADS reference 26">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 26" href="http://scholar.google.com/scholar_lookup?&amp;title=Chip-based%20quantum%20key%20distribution&amp;journal=Nat%20Commun&amp;doi=10.1038%2Fncomms13984&amp;volume=8&amp;publication_year=2017&amp;author=Sibson%2CP&amp;author=Erven%2CC&amp;author=Godfrey%2CM&amp;author=Miki%2CS&amp;author=Yamashita%2CT&amp;author=Fujiwara%2CM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="27."><p class="c-article-references__text" id="ref-CR27"> Bunandar D, Lentine A, Lee C, Cai H, Long CM, Boynton N et al.. Metropolitan quantum key distribution with silicon photonics. Phys Rev X. 2018;8:021009. <a href="https://doi.org/10.1103/PhysRevX.8.021009" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevX.8.021009">https://doi.org/10.1103/PhysRevX.8.021009</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevX.8.021009" data-track-item_id="10.1103/PhysRevX.8.021009" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevX.8.021009" aria-label="Article reference 27" data-doi="10.1103/PhysRevX.8.021009">Article</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 27" href="http://scholar.google.com/scholar_lookup?&amp;title=Metropolitan%20quantum%20key%20distribution%20with%20silicon%20photonics&amp;journal=Phys%20Rev%20X&amp;doi=10.1103%2FPhysRevX.8.021009&amp;volume=8&amp;publication_year=2018&amp;author=Bunandar%2CD&amp;author=Lentine%2CA&amp;author=Lee%2CC&amp;author=Cai%2CH&amp;author=Long%2CCM&amp;author=Boynton%2CN"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="28."><p class="c-article-references__text" id="ref-CR28"> Paraïso TK, De Marco I, Roger T, Marangon DG, Dynes JF, Lucamarini M et al.. A modulator-free quantum key distribution transmitter chip. npj Quantum Inf. 2019;5:42. <a href="https://doi.org/10.1038/s41534-019-0158-7" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1038/s41534-019-0158-7">https://doi.org/10.1038/s41534-019-0158-7</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1038/s41534-019-0158-7" data-track-item_id="10.1038/s41534-019-0158-7" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1038%2Fs41534-019-0158-7" aria-label="Article reference 28" data-doi="10.1038/s41534-019-0158-7">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2019npjQI...5...42P" aria-label="ADS reference 28">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 28" href="http://scholar.google.com/scholar_lookup?&amp;title=A%20modulator-free%20quantum%20key%20distribution%20transmitter%20chip&amp;journal=npj%20Quantum%20Inf&amp;doi=10.1038%2Fs41534-019-0158-7&amp;volume=5&amp;publication_year=2019&amp;author=Para%C3%AFso%2CTK&amp;author=De%20Marco%2CI&amp;author=Roger%2CT&amp;author=Marangon%2CDG&amp;author=Dynes%2CJF&amp;author=Lucamarini%2CM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="29."><p class="c-article-references__text" id="ref-CR29"> Marco ID, Woodward RI, Roberts GL, Paraïso TK, Roger T, Sanzaro M et al.. Real-time operation of a multi-rate, multi-protocol quantum key distribution transmitter. Optica. 2021;8(6):911–5. <a href="https://doi.org/10.1364/OPTICA.423517" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1364/OPTICA.423517">https://doi.org/10.1364/OPTICA.423517</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1364/OPTICA.423517" data-track-item_id="10.1364/OPTICA.423517" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1364%2FOPTICA.423517" aria-label="Article reference 29" data-doi="10.1364/OPTICA.423517">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2021Optic...8..911D" aria-label="ADS reference 29">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 29" href="http://scholar.google.com/scholar_lookup?&amp;title=Real-time%20operation%20of%20a%20multi-rate%2C%20multi-protocol%20quantum%20key%20distribution%20transmitter&amp;journal=Optica&amp;doi=10.1364%2FOPTICA.423517&amp;volume=8&amp;issue=6&amp;pages=911-915&amp;publication_year=2021&amp;author=Marco%2CID&amp;author=Woodward%2CRI&amp;author=Roberts%2CGL&amp;author=Para%C3%AFso%2CTK&amp;author=Roger%2CT&amp;author=Sanzaro%2CM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="30."><p class="c-article-references__text" id="ref-CR30"> ID Quantique SA. <a href="https://www.idquantique.com/" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="https://www.idquantique.com/">https://www.idquantique.com/</a>. </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="31."><p class="c-article-references__text" id="ref-CR31"> Toshiba Europe Limited. <a href="https://www.global.toshiba/ww/products-solutions/security-ict/qkd.html" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="https://www.global.toshiba/ww/products-solutions/security-ict/qkd.html">https://www.global.toshiba/ww/products-solutions/security-ict/qkd.html</a>. </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="32."><p class="c-article-references__text" id="ref-CR32"> QuantumCTek Co., Ltd. <a href="http://www.quantum-info.com/English/" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="http://www.quantum-info.com/English/">http://www.quantum-info.com/English/</a>. </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="33."><p class="c-article-references__text" id="ref-CR33"> ThinkQuantum S.R.L. <a href="https://www.thinkquantum.com" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="https://www.thinkquantum.com">https://www.thinkquantum.com</a>. </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="34."><p class="c-article-references__text" id="ref-CR34"> Quantum Telecommunications Italy S.R.L. <a href="https://www.qticompany.com" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="https://www.qticompany.com">https://www.qticompany.com</a>. </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="35."><p class="c-article-references__text" id="ref-CR35"> Yuan ZL, Sharpe AW, Shields AJ. Unconditionally secure one-way quantum key distribution using decoy pulses. Appl Phys Lett. 2007;90:011118. <a href="https://doi.org/10.1063/1.2430685" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1063/1.2430685">https://doi.org/10.1063/1.2430685</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1063/1.2430685" data-track-item_id="10.1063/1.2430685" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1063%2F1.2430685" aria-label="Article reference 35" data-doi="10.1063/1.2430685">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2007ApPhL..90a1118Y" aria-label="ADS reference 35">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 35" href="http://scholar.google.com/scholar_lookup?&amp;title=Unconditionally%20secure%20one-way%20quantum%20key%20distribution%20using%20decoy%20pulses&amp;journal=Appl%20Phys%20Lett&amp;doi=10.1063%2F1.2430685&amp;volume=90&amp;publication_year=2007&amp;author=Yuan%2CZL&amp;author=Sharpe%2CAW&amp;author=Shields%2CAJ"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="36."><p class="c-article-references__text" id="ref-CR36"> Dixon AR, Yuan ZL, Dynes JF, Sharpe AW, Shields AJ. Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. Opt Express. 2008;16:18790. <a href="https://doi.org/10.1364/OE.16.018790" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1364/OE.16.018790">https://doi.org/10.1364/OE.16.018790</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1364/OE.16.018790" data-track-item_id="10.1364/OE.16.018790" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1364%2FOE.16.018790" aria-label="Article reference 36" data-doi="10.1364/OE.16.018790">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2008OExpr..1618790D" aria-label="ADS reference 36">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 36" href="http://scholar.google.com/scholar_lookup?&amp;title=Gigahertz%20decoy%20quantum%20key%20distribution%20with%201%20Mbit%2Fs%20secure%20key%20rate&amp;journal=Opt%20Express&amp;doi=10.1364%2FOE.16.018790&amp;volume=16&amp;publication_year=2008&amp;author=Dixon%2CAR&amp;author=Yuan%2CZL&amp;author=Dynes%2CJF&amp;author=Sharpe%2CAW&amp;author=Shields%2CAJ"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="37."><p class="c-article-references__text" id="ref-CR37"> Lucamarini M, Patel KA, Dynes JF, Fröhlich B, Sharpe AW, Dixon AR et al.. Efficient decoy-state quantum key distribution with quantified security. Opt Express. 2013;21:21. <a href="https://doi.org/10.1364/oe.21.024550" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1364/oe.21.024550">https://doi.org/10.1364/oe.21.024550</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1364/oe.21.024550" data-track-item_id="10.1364/oe.21.024550" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1364%2Foe.21.024550" aria-label="Article reference 37" data-doi="10.1364/oe.21.024550">Article</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 37" href="http://scholar.google.com/scholar_lookup?&amp;title=Efficient%20decoy-state%20quantum%20key%20distribution%20with%20quantified%20security&amp;journal=Opt%20Express&amp;doi=10.1364%2Foe.21.024550&amp;volume=21&amp;publication_year=2013&amp;author=Lucamarini%2CM&amp;author=Patel%2CKA&amp;author=Dynes%2CJF&amp;author=Fr%C3%B6hlich%2CB&amp;author=Sharpe%2CAW&amp;author=Dixon%2CAR"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="38."><p class="c-article-references__text" id="ref-CR38"> Valivarthi R, Zhou Q, John C, Marsili F, Verma VB, Shaw MD et al.. A cost-effective measurement-device-independent quantum key distribution system for quantum networks. Quantum Sci Technol. 2017. 2:04LT01. <a href="https://doi.org/10.1088/2058-9565/aa8790" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1088/2058-9565/aa8790">https://doi.org/10.1088/2058-9565/aa8790</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1088/2058-9565/aa8790" data-track-item_id="10.1088/2058-9565/aa8790" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1088%2F2058-9565%2Faa8790" aria-label="Article reference 38" data-doi="10.1088/2058-9565/aa8790">Article</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 38" href="http://scholar.google.com/scholar_lookup?&amp;title=A%20cost-effective%20measurement-device-independent%20quantum%20key%20distribution%20system%20for%20quantum%20networks&amp;journal=Quantum%20Sci%20Technol&amp;doi=10.1088%2F2058-9565%2Faa8790&amp;volume=2&amp;publication_year=2017&amp;author=Valivarthi%2CR&amp;author=Zhou%2CQ&amp;author=John%2CC&amp;author=Marsili%2CF&amp;author=Verma%2CVB&amp;author=Shaw%2CMD"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="39."><p class="c-article-references__text" id="ref-CR39"> Zhao Y, Qi B, Lo HK. Experimental quantum key distribution with active phase randomization. Appl Phys Lett. 2007;90(4):044106. <a href="https://doi.org/10.1063/1.2432296" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1063/1.2432296">https://doi.org/10.1063/1.2432296</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1063/1.2432296" data-track-item_id="10.1063/1.2432296" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1063%2F1.2432296" aria-label="Article reference 39" data-doi="10.1063/1.2432296">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2007ApPhL..90d4106Z" aria-label="ADS reference 39">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 39" href="http://scholar.google.com/scholar_lookup?&amp;title=Experimental%20quantum%20key%20distribution%20with%20active%20phase%20randomization&amp;journal=Appl%20Phys%20Lett&amp;doi=10.1063%2F1.2432296&amp;volume=90&amp;issue=4&amp;publication_year=2007&amp;author=Zhao%2CY&amp;author=Qi%2CB&amp;author=Lo%2CHK"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="40."><p class="c-article-references__text" id="ref-CR40"> Sun SH, Liang LM. Experimental demonstration of an active phase randomization and monitor module for quantum key distribution. Appl Phys Lett. 2012;101:071107. <a href="https://doi.org/10.1063/1.4746402" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1063/1.4746402">https://doi.org/10.1063/1.4746402</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1063/1.4746402" data-track-item_id="10.1063/1.4746402" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1063%2F1.4746402" aria-label="Article reference 40" data-doi="10.1063/1.4746402">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2012ApPhL.101g1107S" aria-label="ADS reference 40">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 40" href="http://scholar.google.com/scholar_lookup?&amp;title=Experimental%20demonstration%20of%20an%20active%20phase%20randomization%20and%20monitor%20module%20for%20quantum%20key%20distribution&amp;journal=Appl%20Phys%20Lett&amp;doi=10.1063%2F1.4746402&amp;volume=101&amp;publication_year=2012&amp;author=Sun%2CSH&amp;author=Liang%2CLM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="41."><p class="c-article-references__text" id="ref-CR41"> Currás-Lorenzo G, Tamaki K, Curty M. Security of decoy-state quantum key distribution with imperfect phase randomization. Preprint. 2022. <a href="http://arxiv.org/abs/arXiv:2210.08183" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="http://arxiv.org/abs/arXiv:2210.08183">arXiv:2210.08183</a>. </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="42."><p class="c-article-references__text" id="ref-CR42"> Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. <a href="https://doi.org/10.1088/1367-2630/17/5/053014" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1088/1367-2630/17/5/053014">https://doi.org/10.1088/1367-2630/17/5/053014</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1088/1367-2630/17/5/053014" data-track-item_id="10.1088/1367-2630/17/5/053014" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1088%2F1367-2630%2F17%2F5%2F053014" aria-label="Article reference 42" data-doi="10.1088/1367-2630/17/5/053014">Article</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 42" href="http://scholar.google.com/scholar_lookup?&amp;title=Discrete-phase-randomized%20coherent%20state%20source%20and%20its%20application%20in%20quantum%20key%20distribution&amp;journal=New%20J%20Phys&amp;doi=10.1088%2F1367-2630%2F17%2F5%2F053014&amp;volume=17&amp;issue=5&amp;publication_year=2015&amp;author=Cao%2CZ&amp;author=Zhang%2CZ&amp;author=Lo%2CHK&amp;author=Ma%2CX"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="43."><p class="c-article-references__text" id="ref-CR43"> Currás-Lorenzo G, Wooltorton L, Twin-Field RM. Quantum key distribution with fully discrete phase randomization. Phys Rev Appl. 2021;15:014016. <a href="https://doi.org/10.1103/PhysRevApplied.15.014016" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevApplied.15.014016">https://doi.org/10.1103/PhysRevApplied.15.014016</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevApplied.15.014016" data-track-item_id="10.1103/PhysRevApplied.15.014016" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevApplied.15.014016" aria-label="Article reference 43" data-doi="10.1103/PhysRevApplied.15.014016">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2021PhRvP..15a4016C" aria-label="ADS reference 43">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 43" href="http://scholar.google.com/scholar_lookup?&amp;title=Quantum%20key%20distribution%20with%20fully%20discrete%20phase%20randomization&amp;journal=Phys%20Rev%20Appl&amp;doi=10.1103%2FPhysRevApplied.15.014016&amp;volume=15&amp;publication_year=2021&amp;author=Curr%C3%A1s-Lorenzo%2CG&amp;author=Wooltorton%2CL&amp;author=Twin-Field%2CRM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="44."><p class="c-article-references__text" id="ref-CR44"> Tamaki K, Curty M, Kato G, Lo HK, Azuma K. Loss-tolerant quantum cryptography with imperfect sources. Phys Rev A. 2014;90:052314. <a href="https://doi.org/10.1103/PhysRevA.90.052314" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevA.90.052314">https://doi.org/10.1103/PhysRevA.90.052314</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevA.90.052314" data-track-item_id="10.1103/PhysRevA.90.052314" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevA.90.052314" aria-label="Article reference 44" data-doi="10.1103/PhysRevA.90.052314">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2014PhRvA..90e2314T" aria-label="ADS reference 44">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 44" href="http://scholar.google.com/scholar_lookup?&amp;title=Loss-tolerant%20quantum%20cryptography%20with%20imperfect%20sources&amp;journal=Phys%20Rev%20A&amp;doi=10.1103%2FPhysRevA.90.052314&amp;volume=90&amp;publication_year=2014&amp;author=Tamaki%2CK&amp;author=Curty%2CM&amp;author=Kato%2CG&amp;author=Lo%2CHK&amp;author=Azuma%2CK"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="45."><p class="c-article-references__text" id="ref-CR45"> Renner R, Cirac JI. de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys Rev Lett. 2009;102:110504. <a href="https://doi.org/10.1103/PhysRevLett.102.110504" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevLett.102.110504">https://doi.org/10.1103/PhysRevLett.102.110504</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevLett.102.110504" data-track-item_id="10.1103/PhysRevLett.102.110504" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevLett.102.110504" aria-label="Article reference 45" data-doi="10.1103/PhysRevLett.102.110504">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2009PhRvL.102k0504R" aria-label="ADS reference 45">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 45" href="http://scholar.google.com/scholar_lookup?&amp;title=de%20Finetti%20representation%20theorem%20for%20infinite-dimensional%20quantum%20systems%20and%20applications%20to%20quantum%20cryptography&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2FPhysRevLett.102.110504&amp;volume=102&amp;publication_year=2009&amp;author=Renner%2CR&amp;author=Cirac%2CJI"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="46."><p class="c-article-references__text" id="ref-CR46"> Renner R. Symmetry of large physical systems implies independence of subsystems. Nat Phys. 2007;3(9):645–9. <a href="https://doi.org/10.1038/nphys684" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1038/nphys684">https://doi.org/10.1038/nphys684</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1038/nphys684" data-track-item_id="10.1038/nphys684" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1038%2Fnphys684" aria-label="Article reference 46" data-doi="10.1038/nphys684">Article</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 46" href="http://scholar.google.com/scholar_lookup?&amp;title=Symmetry%20of%20large%20physical%20systems%20implies%20independence%20of%20subsystems&amp;journal=Nat%20Phys&amp;doi=10.1038%2Fnphys684&amp;volume=3&amp;issue=9&amp;pages=645-649&amp;publication_year=2007&amp;author=Renner%2CR"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="47."><p class="c-article-references__text" id="ref-CR47"> Lo HK. Getting something out of nothing. Quantum Inf Comput. 2005;5:413–8. <a href="https://doi.org/10.26421/QIC5.45-10" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.26421/QIC5.45-10">https://doi.org/10.26421/QIC5.45-10</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.26421/QIC5.45-10" data-track-item_id="10.26421/QIC5.45-10" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.26421%2FQIC5.45-10" aria-label="Article reference 47" data-doi="10.26421/QIC5.45-10">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="mathscinet reference" data-track-action="mathscinet reference" href="http://www.ams.org/mathscinet-getitem?mr=2168570" aria-label="MathSciNet reference 47">MathSciNet</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 47" href="http://scholar.google.com/scholar_lookup?&amp;title=Getting%20something%20out%20of%20nothing&amp;journal=Quantum%20Inf%20Comput&amp;doi=10.26421%2FQIC5.45-10&amp;volume=5&amp;pages=413-418&amp;publication_year=2005&amp;author=Lo%2CHK"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="48."><p class="c-article-references__text" id="ref-CR48"> Gottesman D, Lo HK, Lütkenhaus N, Preskill J. Security of quantum key distribution with imperfect devices. Quantum Inf Comput. 2004;4:325–60. <a href="https://doi.org/10.26421/QIC4.5-1" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.26421/QIC4.5-1">https://doi.org/10.26421/QIC4.5-1</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.26421/QIC4.5-1" data-track-item_id="10.26421/QIC4.5-1" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.26421%2FQIC4.5-1" aria-label="Article reference 48" data-doi="10.26421/QIC4.5-1">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="mathscinet reference" data-track-action="mathscinet reference" href="http://www.ams.org/mathscinet-getitem?mr=2094538" aria-label="MathSciNet reference 48">MathSciNet</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 48" href="http://scholar.google.com/scholar_lookup?&amp;title=Security%20of%20quantum%20key%20distribution%20with%20imperfect%20devices&amp;journal=Quantum%20Inf%20Comput&amp;doi=10.26421%2FQIC4.5-1&amp;volume=4&amp;pages=325-360&amp;publication_year=2004&amp;author=Gottesman%2CD&amp;author=Lo%2CHK&amp;author=L%C3%BCtkenhaus%2CN&amp;author=Preskill%2CJ"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="49."><p class="c-article-references__text" id="ref-CR49"> Koashi M. Simple security proof of quantum key distribution based on complementarity. New J Phys. 2009;8:045018. <a href="https://doi.org/10.1088/1367-2630/11/4/045018" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1088/1367-2630/11/4/045018">https://doi.org/10.1088/1367-2630/11/4/045018</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1088/1367-2630/11/4/045018" data-track-item_id="10.1088/1367-2630/11/4/045018" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1088%2F1367-2630%2F11%2F4%2F045018" aria-label="Article reference 49" data-doi="10.1088/1367-2630/11/4/045018">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="mathscinet reference" data-track-action="mathscinet reference" href="http://www.ams.org/mathscinet-getitem?mr=2501282" aria-label="MathSciNet reference 49">MathSciNet</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 49" href="http://scholar.google.com/scholar_lookup?&amp;title=Simple%20security%20proof%20of%20quantum%20key%20distribution%20based%20on%20complementarity&amp;journal=New%20J%20Phys&amp;doi=10.1088%2F1367-2630%2F11%2F4%2F045018&amp;volume=8&amp;publication_year=2009&amp;author=Koashi%2CM"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="50."><p class="c-article-references__text" id="ref-CR50"> Shlok N. Decoy-state quantum key distribution with arbitrary phase mixtures and phase correlations. </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="51."><p class="c-article-references__text" id="ref-CR51"> Upadhyaya T, Himbeeck T, Lin J, Lütkenhaus N. Dimension reduction in quantum key distribution for continuous- and discrete-variable protocols. PRX Quantum. 2021;2:020325. <a href="https://doi.org/10.1103/PRXQuantum.2.020325" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PRXQuantum.2.020325">https://doi.org/10.1103/PRXQuantum.2.020325</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PRXQuantum.2.020325" data-track-item_id="10.1103/PRXQuantum.2.020325" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPRXQuantum.2.020325" aria-label="Article reference 51" data-doi="10.1103/PRXQuantum.2.020325">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2021PRXQ....2b0325U" aria-label="ADS reference 51">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 51" href="http://scholar.google.com/scholar_lookup?&amp;title=Dimension%20reduction%20in%20quantum%20key%20distribution%20for%20continuous-%20and%20discrete-variable%20protocols&amp;journal=PRX%20Quantum&amp;doi=10.1103%2FPRXQuantum.2.020325&amp;volume=2&amp;publication_year=2021&amp;author=Upadhyaya%2CT&amp;author=Himbeeck%2CT&amp;author=Lin%2CJ&amp;author=L%C3%BCtkenhaus%2CN"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="52."><p class="c-article-references__text" id="ref-CR52"> Yin HL, Chen TY, Yu ZW, Liu H, You LX, Zhou YH et al.. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys Rev Lett. 2016;117:190501. <a href="https://doi.org/10.1103/PhysRevLett.117.190501" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1103/PhysRevLett.117.190501">https://doi.org/10.1103/PhysRevLett.117.190501</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1103/PhysRevLett.117.190501" data-track-item_id="10.1103/PhysRevLett.117.190501" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1103%2FPhysRevLett.117.190501" aria-label="Article reference 52" data-doi="10.1103/PhysRevLett.117.190501">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2016PhRvL.117s0501Y" aria-label="ADS reference 52">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 52" href="http://scholar.google.com/scholar_lookup?&amp;title=Measurement-device-independent%20quantum%20key%20distribution%20over%20a%20404%20km%20optical%20fiber&amp;journal=Phys%20Rev%20Lett&amp;doi=10.1103%2FPhysRevLett.117.190501&amp;volume=117&amp;publication_year=2016&amp;author=Yin%2CHL&amp;author=Chen%2CTY&amp;author=Yu%2CZW&amp;author=Liu%2CH&amp;author=You%2CLX&amp;author=Zhou%2CYH"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="53."><p class="c-article-references__text" id="ref-CR53"> Lo HK, Preskill J. Security of quantum key distribution using weak coherent states with nonrandom phases. Quantum Inf Comput. 2007;8:431–58. <a href="https://doi.org/10.26421/QIC7.5-6-2" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.26421/QIC7.5-6-2">https://doi.org/10.26421/QIC7.5-6-2</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.26421/QIC7.5-6-2" data-track-item_id="10.26421/QIC7.5-6-2" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.26421%2FQIC7.5-6-2" aria-label="Article reference 53" data-doi="10.26421/QIC7.5-6-2">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="mathscinet reference" data-track-action="mathscinet reference" href="http://www.ams.org/mathscinet-getitem?mr=2347214" aria-label="MathSciNet reference 53">MathSciNet</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 53" href="http://scholar.google.com/scholar_lookup?&amp;title=Security%20of%20quantum%20key%20distribution%20using%20weak%20coherent%20states%20with%20nonrandom%20phases&amp;journal=Quantum%20Inf%20Comput&amp;doi=10.26421%2FQIC7.5-6-2&amp;volume=8&amp;pages=431-458&amp;publication_year=2007&amp;author=Lo%2CHK&amp;author=Preskill%2CJ"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="54."><p class="c-article-references__text" id="ref-CR54"> Pereira M, Kate G, Mizutani A, Curty M, Tamaki K. Quantum key distribution with correlated sources. Sci Adv. 2020;6:eaaz4487. <a href="https://doi.org/10.1126/sciadv.aaz4487" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1126/sciadv.aaz4487">https://doi.org/10.1126/sciadv.aaz4487</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1126/sciadv.aaz4487" data-track-item_id="10.1126/sciadv.aaz4487" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1126%2Fsciadv.aaz4487" aria-label="Article reference 54" data-doi="10.1126/sciadv.aaz4487">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="ads reference" data-track-action="ads reference" href="http://adsabs.harvard.edu/cgi-bin/nph-data_query?link_type=ABSTRACT&amp;bibcode=2020SciA....6.4487P" aria-label="ADS reference 54">ADS</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 54" href="http://scholar.google.com/scholar_lookup?&amp;title=Quantum%20key%20distribution%20with%20correlated%20sources&amp;journal=Sci%20Adv&amp;doi=10.1126%2Fsciadv.aaz4487&amp;volume=6&amp;publication_year=2020&amp;author=Pereira%2CM&amp;author=Kate%2CG&amp;author=Mizutani%2CA&amp;author=Curty%2CM&amp;author=Tamaki%2CK"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="55."><p class="c-article-references__text" id="ref-CR55"> Winter A. Coding theorem and strong converse for quantum channels. IEEE Trans Inf Theory. 1999;45(7):2481–5. <a href="https://doi.org/10.1109/18.796385" data-track="click_references" data-track-action="external reference" data-track-value="external reference" data-track-label="10.1109/18.796385">https://doi.org/10.1109/18.796385</a>. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="10.1109/18.796385" data-track-item_id="10.1109/18.796385" data-track-value="article reference" data-track-action="article reference" href="https://doi.org/10.1109%2F18.796385" aria-label="Article reference 55" data-doi="10.1109/18.796385">Article</a>&nbsp; <a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="mathscinet reference" data-track-action="mathscinet reference" href="http://www.ams.org/mathscinet-getitem?mr=1725132" aria-label="MathSciNet reference 55">MathSciNet</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 55" href="http://scholar.google.com/scholar_lookup?&amp;title=Coding%20theorem%20and%20strong%20converse%20for%20quantum%20channels&amp;journal=IEEE%20Trans%20Inf%20Theory&amp;doi=10.1109%2F18.796385&amp;volume=45&amp;issue=7&amp;pages=2481-2485&amp;publication_year=1999&amp;author=Winter%2CA"> Google Scholar</a>&nbsp; </p></li><li class="c-article-references__item js-c-reading-companion-references-item" data-counter="56."><p class="c-article-references__text" id="ref-CR56"> Farenick D, Bures RM. Contractive channels on operator algebras. NY J Math. 2017;23:1369–93. </p><p class="c-article-references__links u-hide-print"><a data-track="click_references" rel="nofollow noopener" data-track-label="link" data-track-item_id="link" data-track-value="mathscinet reference" data-track-action="mathscinet reference" href="http://www.ams.org/mathscinet-getitem?mr=3723514" aria-label="MathSciNet reference 56">MathSciNet</a>&nbsp; <a data-track="click_references" data-track-action="google scholar reference" data-track-value="google scholar reference" data-track-label="link" data-track-item_id="link" rel="nofollow noopener" aria-label="Google Scholar reference 56" href="http://scholar.google.com/scholar_lookup?&amp;title=Contractive%20channels%20on%20operator%20algebras&amp;journal=NY%20J%20Math&amp;volume=23&amp;pages=1369-1393&amp;publication_year=2017&amp;author=Farenick%2CD&amp;author=Bures%2CRM"> Google Scholar</a>&nbsp; </p></li></ol><p class="c-article-references__download u-hide-print"><a data-track="click" data-track-action="download citation references" data-track-label="link" rel="nofollow" href="https://citation-needed.springer.com/v2/references/10.1140/epjqt/s40507-023-00210-0?format=refman&amp;flavour=references">Download references<svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-download-medium"></use></svg></a></p></div></div></div></section></div><section data-title="Funding"><div class="c-article-section" id="Fun-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="Fun">Funding</h2><div class="c-article-section__content" id="Fun-content"><p>This work was supported by Cisco Systems Inc., the Galician Regional Government (consolidation of Research Units: AtlantTIC), the Spanish Ministry of Economy and Competitiveness (MINECO), the Fondo Europeo de Desarrollo Regional (FEDER) through the grant No. PID2020-118178RB-C21, MICIN with funding from the European Union NextGenerationEU (PRTR-C17.I1) and the Galician Regional Government with own funding through the “Planes Complementarios de I + D + I con las Comunidades Autónomas” in Quantum Communication, the European Union’s Horizon Europe Framework Programme under the Marie Skłodowska-Curie Grant No. 101072637 (Project QSI) and the project “Quantum Security Networks Partnership” (QSNP, grant agreement No 101114043). X.S. acknowledges support from an FPI predoctoral scholarship granted by the Spanish Ministry of Science and Innovation. G.C.-L. acknowledges support from JSPS Postdoctoral Fellowships for Research in Japan. K.T. acknowledges support from JSPS KAKENHI Grant Number JP18H05237.</p></div></div></section><section aria-labelledby="author-information" data-title="Author information"><div class="c-article-section" id="author-information-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="author-information">Author information</h2><div class="c-article-section__content" id="author-information-content"><h3 class="c-article__sub-heading" id="affiliations">Authors and Affiliations</h3><ol class="c-article-author-affiliation__list"><li id="Aff1"><p class="c-article-author-affiliation__address">Vigo Quantum Communication Center, University of Vigo, Vigo, E-36310, Spain</p><p class="c-article-author-affiliation__authors-list">Xoel Sixto,&nbsp;Guillermo Currás-Lorenzo&nbsp;&amp;&nbsp;Marcos Curty</p></li><li id="Aff2"><p class="c-article-author-affiliation__address">Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo, E-36310, Spain</p><p class="c-article-author-affiliation__authors-list">Xoel Sixto,&nbsp;Guillermo Currás-Lorenzo&nbsp;&amp;&nbsp;Marcos Curty</p></li><li id="Aff3"><p class="c-article-author-affiliation__address">atlanTTic Research Center, University of Vigo, Vigo, E-36310, Spain</p><p class="c-article-author-affiliation__authors-list">Xoel Sixto,&nbsp;Guillermo Currás-Lorenzo&nbsp;&amp;&nbsp;Marcos Curty</p></li><li id="Aff4"><p class="c-article-author-affiliation__address">Faculty of Engineering, University of Toyama, Gofuku 3190, Toyama, 930-8555, Japan</p><p class="c-article-author-affiliation__authors-list">Guillermo Currás-Lorenzo&nbsp;&amp;&nbsp;Kiyoshi Tamaki</p></li></ol><div class="u-js-hide u-hide-print" data-test="author-info"><span class="c-article__sub-heading">Authors</span><ol class="c-article-authors-search u-list-reset"><li id="auth-Xoel-Sixto-Aff1-Aff2-Aff3"><span class="c-article-authors-search__title u-h3 js-search-name">Xoel Sixto</span><div class="c-article-authors-search__list"><div class="c-article-authors-search__item c-article-authors-search__list-item--left"><a href="https://www.biomedcentral.com/search?query=author%23Xoel%20Sixto" class="c-article-button" data-track="click" data-track-action="author link - publication" data-track-label="link" rel="nofollow">View author publications</a></div><div class="c-article-authors-search__item c-article-authors-search__list-item--right"><p class="search-in-title-js c-article-authors-search__text">You can also search for this author in <span class="c-article-identifiers"><a class="c-article-identifiers__item" href="http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=search&amp;term=Xoel%20Sixto" data-track="click" data-track-action="author link - pubmed" data-track-label="link" rel="nofollow">PubMed</a><span class="u-hide">&nbsp;</span><a class="c-article-identifiers__item" href="http://scholar.google.co.uk/scholar?as_q=&amp;num=10&amp;btnG=Search+Scholar&amp;as_epq=&amp;as_oq=&amp;as_eq=&amp;as_occt=any&amp;as_sauthors=%22Xoel%20Sixto%22&amp;as_publication=&amp;as_ylo=&amp;as_yhi=&amp;as_allsubj=all&amp;hl=en" data-track="click" data-track-action="author link - scholar" data-track-label="link" rel="nofollow">Google Scholar</a></span></p></div></div></li><li id="auth-Guillermo-Curr_s_Lorenzo-Aff1-Aff2-Aff3-Aff4"><span class="c-article-authors-search__title u-h3 js-search-name">Guillermo Currás-Lorenzo</span><div class="c-article-authors-search__list"><div class="c-article-authors-search__item c-article-authors-search__list-item--left"><a href="https://www.biomedcentral.com/search?query=author%23Guillermo%20Curr%C3%A1s-Lorenzo" class="c-article-button" data-track="click" data-track-action="author link - publication" data-track-label="link" rel="nofollow">View author publications</a></div><div class="c-article-authors-search__item c-article-authors-search__list-item--right"><p class="search-in-title-js c-article-authors-search__text">You can also search for this author in <span class="c-article-identifiers"><a class="c-article-identifiers__item" href="http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=search&amp;term=Guillermo%20Curr%C3%A1s-Lorenzo" data-track="click" data-track-action="author link - pubmed" data-track-label="link" rel="nofollow">PubMed</a><span class="u-hide">&nbsp;</span><a class="c-article-identifiers__item" href="http://scholar.google.co.uk/scholar?as_q=&amp;num=10&amp;btnG=Search+Scholar&amp;as_epq=&amp;as_oq=&amp;as_eq=&amp;as_occt=any&amp;as_sauthors=%22Guillermo%20Curr%C3%A1s-Lorenzo%22&amp;as_publication=&amp;as_ylo=&amp;as_yhi=&amp;as_allsubj=all&amp;hl=en" data-track="click" data-track-action="author link - scholar" data-track-label="link" rel="nofollow">Google Scholar</a></span></p></div></div></li><li id="auth-Kiyoshi-Tamaki-Aff4"><span class="c-article-authors-search__title u-h3 js-search-name">Kiyoshi Tamaki</span><div class="c-article-authors-search__list"><div class="c-article-authors-search__item c-article-authors-search__list-item--left"><a href="https://www.biomedcentral.com/search?query=author%23Kiyoshi%20Tamaki" class="c-article-button" data-track="click" data-track-action="author link - publication" data-track-label="link" rel="nofollow">View author publications</a></div><div class="c-article-authors-search__item c-article-authors-search__list-item--right"><p class="search-in-title-js c-article-authors-search__text">You can also search for this author in <span class="c-article-identifiers"><a class="c-article-identifiers__item" href="http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=search&amp;term=Kiyoshi%20Tamaki" data-track="click" data-track-action="author link - pubmed" data-track-label="link" rel="nofollow">PubMed</a><span class="u-hide">&nbsp;</span><a class="c-article-identifiers__item" href="http://scholar.google.co.uk/scholar?as_q=&amp;num=10&amp;btnG=Search+Scholar&amp;as_epq=&amp;as_oq=&amp;as_eq=&amp;as_occt=any&amp;as_sauthors=%22Kiyoshi%20Tamaki%22&amp;as_publication=&amp;as_ylo=&amp;as_yhi=&amp;as_allsubj=all&amp;hl=en" data-track="click" data-track-action="author link - scholar" data-track-label="link" rel="nofollow">Google Scholar</a></span></p></div></div></li><li id="auth-Marcos-Curty-Aff1-Aff2-Aff3"><span class="c-article-authors-search__title u-h3 js-search-name">Marcos Curty</span><div class="c-article-authors-search__list"><div class="c-article-authors-search__item c-article-authors-search__list-item--left"><a href="https://www.biomedcentral.com/search?query=author%23Marcos%20Curty" class="c-article-button" data-track="click" data-track-action="author link - publication" data-track-label="link" rel="nofollow">View author publications</a></div><div class="c-article-authors-search__item c-article-authors-search__list-item--right"><p class="search-in-title-js c-article-authors-search__text">You can also search for this author in <span class="c-article-identifiers"><a class="c-article-identifiers__item" href="http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=search&amp;term=Marcos%20Curty" data-track="click" data-track-action="author link - pubmed" data-track-label="link" rel="nofollow">PubMed</a><span class="u-hide">&nbsp;</span><a class="c-article-identifiers__item" href="http://scholar.google.co.uk/scholar?as_q=&amp;num=10&amp;btnG=Search+Scholar&amp;as_epq=&amp;as_oq=&amp;as_eq=&amp;as_occt=any&amp;as_sauthors=%22Marcos%20Curty%22&amp;as_publication=&amp;as_ylo=&amp;as_yhi=&amp;as_allsubj=all&amp;hl=en" data-track="click" data-track-action="author link - scholar" data-track-label="link" rel="nofollow">Google Scholar</a></span></p></div></div></li></ol></div><h3 class="c-article__sub-heading" id="contributions">Contributions</h3><p>M.C. identified the need for the research project, and all authors conceived the fundamental idea behind the parameter estimation technique. X.S. performed the calculations and the numerical simulations with inputs from G.C.-L. X.S. wrote the manuscript, and all authors contributed towards improving it and checking the validity of the results.</p><h3 class="c-article__sub-heading" id="corresponding-author">Corresponding author</h3><p id="corresponding-author-list">Correspondence to <a id="corresp-c1" href="mailto:xsixto@vqcc.uvigo.es">Xoel Sixto</a>.</p></div></div></section><section data-title="Ethics declarations"><div class="c-article-section" id="ethics-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="ethics">Ethics declarations</h2><div class="c-article-section__content" id="ethics-content"> <h3 class="c-article__sub-heading" id="FPar1">Ethics approval and consent to participate</h3> <p>Not applicable.</p> <h3 class="c-article__sub-heading" id="FPar2">Consent for publication</h3> <p>All authors consent to the publication of this manuscript.</p> <h3 class="c-article__sub-heading" id="FPar3">Competing interests</h3> <p>The authors declare no competing interests.</p> </div></div></section><section data-title="Additional information"><div class="c-article-section" id="additional-information-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="additional-information">Additional information</h2><div class="c-article-section__content" id="additional-information-content"><h3 class="c-article__sub-heading">Publisher’s Note</h3><p>Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.</p></div></div></section><section aria-labelledby="appendices"><div class="c-article-section" id="appendices-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="appendices">Appendices</h2><div class="c-article-section__content" id="appendices-content"><h3 class="c-article__sub-heading" id="App1">Appendix A: Derivation of the SDPs given by Eqs.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>)</h3><p>In this Appendix, we follow a similar approach to the one in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 41" title=" Currás-Lorenzo G, Tamaki K, Curty M. Security of decoy-state quantum key distribution with imperfect phase randomization. Preprint. 2022. arXiv:2210.08183 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR41" id="ref-link-section-d131444011e13225">41</a>] to derive the infinite-dimensional SDPs presented in Eqs.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>) of the main text, under the assumption of collective attacks. We recall that these infinite-dimensional SDP’s cannot be solved numerically and a further dimension-reduction step is needed (see Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec17">B</a>).</p><p>Let Ω denote a quantum channel (or the action of Eve) that acts independently on each optical pulse emitted by Alice. Also, let us assume that in a certain round, Bob measures the incoming signal with a positive operator valued measure (POVM) that contains the element Π. In this scenario, the probability that Bob obtains the outcome associated with the element Π given that Alice sends him a quantum state <i>σ</i> can be expressed as </p><div id="Equ22" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \operatorname{Tr}\bigl[\Omega (\sigma ) \Pi \bigr]= \operatorname{Tr} \biggl( \sum_{k} A_{k} \sigma A_{k}^{\dagger} \Pi \biggr)= \operatorname{Tr} \biggl(\sigma \sum_{k} A_{k}^{\dagger} \Pi A_{k} \biggr) =\operatorname{Tr}(\sigma H), $$</span></div><div class="c-article-equation__number"> (A.1) </div></div><p> where <span class="mathjax-tex">\(\Omega (\sigma )\)</span> represents the action of Ω on <i>σ</i>, <span class="mathjax-tex">\(\{A_{k} \}\)</span> denotes the set of Kraus operators corresponding to the operator-sum representation of the channel Ω, and </p><div id="Equ23" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ 0 \leq H=\sum_{k} A_{k}^{\dagger} \Pi A_{k} \leq \sum_{k} A_{k}^{ \dagger} A_{k}=\mathbb{I}. $$</span></div><div class="c-article-equation__number"> (A.2) </div></div><p>Bob measures the incoming signals in either the <i>Z</i> or the <i>X</i> basis. Let us denote the POVM elements corresponding to each of these two measurements by <span class="mathjax-tex">\(\{\Pi _{0_{Z}}, \Pi _{1_{Z}}, \Pi _{f} \}\)</span> and <span class="mathjax-tex">\(\{\Pi _{0_{X}}, \Pi _{1_{X}}, \Pi _{f} \}\)</span>, respectively. That is, <span class="mathjax-tex">\(\Pi _{b_{\alpha}}\)</span> represents the POVM element associated to the outcome <i>b</i> in the basis <i>α</i>, with <span class="mathjax-tex">\(\alpha \in \{Z,X\}\)</span>, and <span class="mathjax-tex">\(\Pi _{f}\)</span> represents the POVM element associated to an inconclusive outcome. Note that here we are implicitly considering the basis-independent detection efficiency assumption, which means that the POVM element <span class="mathjax-tex">\(\Pi _{f}\)</span> is equal for both basis. Let <span class="mathjax-tex">\(\Pi _{d}=\mathbb{I}-\Pi _{f}=\Pi _{0_{Z}}+\Pi _{1_{Z}}=\Pi _{0_{X}}+ \Pi _{1_{X}}\)</span> denote the operator associated to a conclusive outcome at Bob’s side. Then, after substituting in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ22">A.1</a>) the state <i>σ</i> with Alice’s emitted state when she chooses the <i>Z</i> basis, </p><div id="Equ24" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \rho ^{\mu , Z}_{[g(\theta )]}=\frac{1}{2} \hat{V}_{0_{Z}} \rho ^{\mu}_{[g( \theta )]} \hat{V}_{0_{Z}}^{\dagger}+\frac{1}{2} \hat{V}_{1_{Z}} \rho ^{\mu}_{[g(\theta )]} \hat{V}_{1_{Z}}^{\dagger}, $$</span></div><div class="c-article-equation__number"> (A.3) </div></div><p> and the operator Π with <span class="mathjax-tex">\(\Pi _{d}\)</span>, we obtain </p><div id="Equ25" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ Q_{\mu , g(\theta )}^{Z}=\operatorname{Tr}\bigl[\Omega \bigl(\rho ^{\mu , Z}_{[g( \theta )]}\bigr) \Pi _{d}\bigr]= \operatorname{Tr}\bigl[\rho ^{\mu , Z}_{[g(\theta )]} H\bigr]= \operatorname{Tr}\bigl[\rho ^{\mu}_{[g(\theta )]} J_{Z}\bigr], $$</span></div><div class="c-article-equation__number"> (A.4) </div></div><p> with <span class="mathjax-tex">\(H=\sum_{k} A_{k}^{\dagger} \Pi _{d} A_{k}\)</span>, and the operator <span class="mathjax-tex">\(J_{Z}\)</span> satisfying </p><div id="Equ26" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ 0 \leq J_{Z}=\frac{1}{2} \bigl(\hat{V}_{0_{Z}}^{\dagger} H \hat{V}_{0_{Z}}+ \hat{V}_{1_{Z}}^{\dagger} H \hat{V}_{1_{Z}} \bigr) \leq \mathbb{I} . $$</span></div><div class="c-article-equation__number"> (A.5) </div></div><p>Finally, by taking into account that the yield associated to the states <span class="mathjax-tex">\(|\psi _{n, s, g(\theta )}\rangle \)</span> encoded in the Z basis is given by </p><div id="Equ27" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ Y_{n, s, g(\theta )}^{Z}=\operatorname{Tr}\bigl\{ \Omega \bigl[{ \hat{P}}\bigl(\bigl|\psi ^{Z}_{n, s, g(\theta )}\bigr\rangle \bigr)\bigr]\Pi _{d}\bigr\} =\operatorname{Tr}\bigl[{\hat{P}}(|\psi _{n, s, g(\theta )}\rangle ) J_{Z}\bigr], $$</span></div><div class="c-article-equation__number"> (A.6) </div></div><p> with </p><div id="Equ28" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ {\hat{P}}\bigl(\bigl|\psi ^{Z}_{n, s, g(\theta )}\bigr\rangle \bigr)= \frac{1}{2} \hat{V}_{0_{Z}} {\hat{P}}\bigl(|\psi _{n, s, g(\theta )} \rangle \bigr) \hat{V}_{0_{Z}}^{\dagger} +\frac{1}{2} \hat{V}_{1_{Z}} {\hat{P}}\bigl(|\psi _{n, s, g(\theta )} \rangle \bigr) \hat{V}_{1_{Z}}^{\dagger}, $$</span></div><div class="c-article-equation__number"> (A.7) </div></div><p> we obtain the SDP presented in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>).</p><p>Regarding the SDP given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>) to estimate the phase error rate, we note that the numerator of Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ12">12</a>), can be expressed as </p><div id="Equ29" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} &amp;p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )}Y_{\Delta , n, s, g( \theta )}^{ (\Delta \oplus 1)_{X}, \mathrm{virtual}} \\ &amp;\quad =p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )} \operatorname{Tr} \bigl\{ \Omega \bigl[{ \hat{P}}\bigl(\bigl|\lambda ^{\mathrm{virtual}}_{ \Delta , n, s, g(\theta )}\bigr\rangle \bigr)\bigr] \Pi _{(\Delta \oplus 1)_{X}} \bigr\} \\ &amp;\quad =\operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl|\bar{\lambda}^{\mathrm{virtual}}_{ \Delta , n, s, g(\theta )} \bigr\rangle \bigr) L_{(\Delta \oplus 1)_{X}} \bigr], \end{aligned}$$ </span></div><div class="c-article-equation__number"> (A.8) </div></div><p> where <span class="mathjax-tex">\(0 \leq L_{(\Delta \oplus 1)_{X}}=\sum_{k} A_{k}^{\dagger} \Pi _{( \Delta \oplus 1)_{X}} A_{k} \leq \mathbb{I}\)</span> according to Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ22">A.1</a>), and <span class="mathjax-tex">\(|\bar{\lambda}^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )} \rangle =\sqrt{p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )}}| \lambda ^{\mathrm{virtual}}_{ \Delta , n, s, g(\theta )}\rangle \)</span>.</p><p>By using again Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ22">A.1</a>), we have that the gains <span class="mathjax-tex">\(Q_{\mu , g(\theta ), b_{\alpha}}^{(\Delta \oplus 1)_{X}}\)</span> can be expressed as </p><div id="Equ30" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ Q_{\mu , g(\theta ), b_{\alpha}}^{(\Delta \oplus 1)_{X}}= \operatorname{Tr} \bigl[ \hat{V}_{b_{\alpha}} \rho _{[g(\theta )]}^{ \mu} \hat{V}_{b_{\alpha}}^{\dagger} L_{(\Delta \oplus 1)_{X}} \bigr]. $$</span></div><div class="c-article-equation__number"> (A.9) </div></div><p>Putting it all together, we find that the SDP presented in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>) of the main text, provides an upper bound on <span class="mathjax-tex">\(p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )}Y_{\Delta , n, s, g( \theta )}^{(\Delta \oplus 1)_{X},\mathrm{virtual}}\)</span>.</p><h3 class="c-article__sub-heading" id="App1">Appendix B: Finite-dimensional SDPs when <span class="mathjax-tex">\(g(\theta )\)</span> is fully characterized</h3><h3 class="c-article__sub-heading" id="Sec18"><span class="c-article-section__title-number">2.1 </span>B.1 Lower bound on the yields <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z}\)</span> </h3><p>In this Appendix, we show how to obtain a finite-dimensional relaxation of the SDP given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>) to find a lower bound on the yields <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z}\)</span>. For this, we follow again the approach presented in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 41" title=" Currás-Lorenzo G, Tamaki K, Curty M. Security of decoy-state quantum key distribution with imperfect phase randomization. Preprint. 2022. arXiv:2210.08183 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR41" id="ref-link-section-d131444011e16280">41</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 50" title=" Shlok N. Decoy-state quantum key distribution with arbitrary phase mixtures and phase correlations. " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR50" id="ref-link-section-d131444011e16283">50</a>]. The key idea is rather simple: instead of considering the infinite-dimensional state <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ4">4</a>), we employ a projection <span class="mathjax-tex">\(\rho _{[g(\theta )], M}^{\mu}\)</span> of this state onto a finite-dimensional subspace with up to <i>M</i> photons (see Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ16">16</a>)), and then we relax the original constraints of the SDP accordingly.</p><p>We begin by briefly introducing some helpful results for this purpose. The first one is a direct consequence of the Cauchy-Schwarz inequality in Hilbert spaces [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 53" title=" Lo HK, Preskill J. Security of quantum key distribution using weak coherent states with nonrandom phases. Quantum Inf Comput. 2007;8:431–58. https://doi.org/10.26421/QIC7.5-6-2 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR53" id="ref-link-section-d131444011e16387">53</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 54" title=" Pereira M, Kate G, Mizutani A, Curty M, Tamaki K. Quantum key distribution with correlated sources. Sci Adv. 2020;6:eaaz4487. https://doi.org/10.1126/sciadv.aaz4487 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR54" id="ref-link-section-d131444011e16390">54</a>], which allows to relate the quantities <span class="mathjax-tex">\(\operatorname{Tr}[\sigma H]\)</span> and <span class="mathjax-tex">\(\operatorname{Tr}[\rho H]\)</span>, with <span class="mathjax-tex">\(0 \leq H \leq \mathbb{I}\)</span>, as a function of the fidelity between the states <i>σ</i> and <i>ρ</i>, </p><div id="Equ31" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ F(\rho ,\sigma )=\operatorname{Tr} [\sqrt{\sqrt{\sigma} \rho \sqrt{\sigma}} ]^{2}. $$</span></div><div class="c-article-equation__number"> (B.1) </div></div><p> In particular, it states that </p><div id="Equ32" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ G_{-} \bigl( \operatorname{Tr} [\rho H ], F (\sigma , \rho ) \bigr) \leq \operatorname{Tr}[ \sigma H] \leq G_{+} \bigl(\operatorname{Tr} [\rho H ], F ( \sigma , \rho ) \bigr), $$</span></div><div class="c-article-equation__number"> (B.2) </div></div><p> with the functions <span class="mathjax-tex">\(G_{\pm}(y, z)\)</span> being defined as </p><div id="Equ33" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ G_{-}(y, z)= \textstyle\begin{cases} g_{-}(y, z) &amp; \text{if } y&gt;1-z, \\ 0 &amp; \text{otherwise},\end{cases} $$</span></div><div class="c-article-equation__number"> (B.3) </div></div><p> and </p><div id="Equ34" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ G_{+}(y, z)= \textstyle\begin{cases} g_{+}(y, z) &amp; \text{if } y&lt; z, \\ 1 &amp; \text{otherwise},\end{cases} $$</span></div><div class="c-article-equation__number"> (B.4) </div></div><p> with <span class="mathjax-tex">\(g_{\pm}(y, z)=y+(1-z)(1-2 y) \pm 2 \sqrt{z(1-z) y(1-y)}\)</span>.</p><p>The remaining results we use, <i>i.e.</i> Eqs.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ35">B.5</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ36">B.6</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ37">B.7</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ38">B.8</a>) below, have been derived in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 41" title=" Currás-Lorenzo G, Tamaki K, Curty M. Security of decoy-state quantum key distribution with imperfect phase randomization. Preprint. 2022. arXiv:2210.08183 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR41" id="ref-link-section-d131444011e17078">41</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 50" title=" Shlok N. Decoy-state quantum key distribution with arbitrary phase mixtures and phase correlations. " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR50" id="ref-link-section-d131444011e17081">50</a>, <a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 55" title=" Winter A. Coding theorem and strong converse for quantum channels. IEEE Trans Inf Theory. 1999;45(7):2481–5. https://doi.org/10.1109/18.796385 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR55" id="ref-link-section-d131444011e17084">55</a>]. In particular, we have that </p><div id="Equ35" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} F \bigl(\rho _{[g(\theta )]}^{\mu}, \rho _{[g(\theta )], M}^{\mu} \bigr)&amp;=\operatorname{Tr} \bigl[\Pi _{M} \rho _{[g(\theta )]}^{\mu } \Pi _{M} \bigr] \\ &amp;=\sum_{n=0}^{M} q_{n|\mu ,g(\theta )}:=F^{ \text{proj}}_{\mu ,g(\theta )}, \end{aligned} $$</span></div><div class="c-article-equation__number"> (B.5) </div></div><p> where the coefficients <span class="mathjax-tex">\(q_{n|s,g(\theta )}\)</span> are given in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ17">17</a>). Also, we have that the quantities <span class="mathjax-tex">\(\vert p_{n \mid \mu , g(\theta )}-q_{n \mid \mu ,g(\theta )} \vert \)</span> can be upper bounded as </p><div id="Equ36" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} \vert p_{n \mid \mu , g(\theta )}-q_{n \mid \mu ,g(\theta )} \vert \leq &amp; 2 \sqrt{1-\operatorname{Tr} \bigl[\Pi _{M} \rho _{[g(\theta )]}^{ \mu }\Pi _{M} \bigr]} \\ =&amp;2 \sqrt{1-F^{\text{proj}}_{\mu ,g(\theta )}}=: \epsilon _{\mu}. \end{aligned}$$ </span></div><div class="c-article-equation__number"> (B.6) </div></div><p> Finally, the fidelity <span class="mathjax-tex">\(F ({\hat{P}}(|\varphi _{n,\mu ,g(\theta )}\rangle ),{\hat{P}}(| \psi _{n,\mu ,g(\theta )}\rangle ) )=|\langle \varphi _{n,\mu ,g( \theta )}|\psi _{n,\mu ,g(\theta )}\rangle |^{2}\)</span> satisfies </p><div id="Equ37" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ F \bigl({\hat{P}}\bigl(|\varphi _{n,\mu ,g(\theta )}\rangle \bigr),{\hat{P}}\bigl(| \psi _{n,\mu ,g(\theta )}\rangle \bigr) \bigr) \geq 1- \biggl( \frac{\epsilon _{\mu}}{\delta _{n,\mu}} \biggr)^{2}:=F_{n,\mu ,g(\theta )}^{\text{vec}}, $$</span></div><div class="c-article-equation__number"> (B.7) </div></div><p> with </p><div id="Equ38" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned}&amp; \delta _{0,\mu}=q_{0\mid \mu , g(\theta )}-q_{1\mid \mu , g(\theta )}- \epsilon _{\mu} \\&amp; \begin{aligned}[b] \delta _{n,\mu}&amp;=\min \{q_{n-1 \mid \mu , g(\theta )}-q_{n \mid \mu , g(\theta )}- \epsilon _{\mu}, q_{n \mid \mu , g(\theta )}-q_{n+1 \mid \mu , g(\theta )}-\epsilon _{\mu} \}. \end{aligned} \end{aligned}$$ </span></div><div class="c-article-equation__number"> (B.8) </div></div><p>Then, from Eqs.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ8">8</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ32">B.2</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ37">B.7</a>) we have that </p><div id="Equ39" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ Y_{n, s, g(\theta )}^{Z, {\mathrm{L}}}=\operatorname{Tr} \bigl[{\hat{P}}(| \psi _{n, s, g(\theta )}\rangle )J_{Z}^{*} \bigr] \geq G_{-} \bigl(\operatorname{Tr} \bigl[{\hat{P}}(|\varphi _{n, s, g( \theta )}\rangle )J_{Z}^{*} \bigr], F_{n,s,g(\theta )}^{\text{vec}} \bigr), $$</span></div><div class="c-article-equation__number"> (B.9) </div></div><p> where <span class="mathjax-tex">\(J_{Z}^{*}\)</span> is the solution to the SDP presented in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>), and we have used the fact that <span class="mathjax-tex">\(G_{-}\)</span> is increasing with respect to its second argument. Since <span class="mathjax-tex">\(G_{-}(y,z)\)</span> is decreasing with respect to its first argument, one can lower bound Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ39">B.9</a>) by finding a lower bound on its first argument.</p><p>From Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ32">B.2</a>), we have that </p><div id="Equ40" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ G_{-} \bigl(Q_{\mu , g(\theta )}^{Z}, F^{\text{proj}}_{\mu ,g(\theta )} \bigr) \leq \operatorname{Tr} \bigl[\rho _{[g(\theta )],M}^{\mu} J_{Z} \bigr] \leq G_{+} \bigl(Q_{\mu , g(\theta )}^{Z}, F^{\text{proj}}_{\mu ,g( \theta )} \bigr), $$</span></div><div class="c-article-equation__number"> (B.10) </div></div><p> with the operator <span class="mathjax-tex">\(J_{Z}\)</span> defined in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>). Here, since the states <span class="mathjax-tex">\(\rho _{[g(\theta )],M}^{\mu}\)</span> are finite dimensional, the calculation of <span class="mathjax-tex">\(\operatorname{Tr} [\rho _{[g(\theta )],M}^{\mu} J_{Z} ]\)</span> can be restricted to operators <span class="mathjax-tex">\(J_{Z}\)</span> that act on their finite subspace. Putting it all together, we find that a lower bound on <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z}\)</span> can be obtained by solving the following finite-dimensional SDP program </p><div id="Equ41" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} \min_{J_{Z}} &amp;\ \operatorname{Tr} \bigl[ {\hat{P}}(|\varphi _{n, s, g( \theta )}\rangle ) J_{Z} \bigr] \\ \text{subject to } &amp;\ G_{-} \bigl(Q_{\mu , g(\theta )}^{Z}, F^{ \text{proj}}_{\mu ,g(\theta )} \bigr) \leq \operatorname{Tr} \bigl[ \rho _{[g(\theta )],M}^{\mu} J_{Z} \bigr] \\ &amp;\hphantom{\ G_{-} \bigl(Q_{\mu , g(\theta )}^{Z}, F^{ \text{proj}}_{\mu ,g(\theta )} \bigr)}\leq G_{+} \bigl(Q_{\mu , g(\theta )}^{Z}, F^{\text{proj}}_{\mu ,g( \theta )} \bigr), \quad \forall \mu \in \{s, \nu , \omega \} \\ &amp;\ 0 \leq J_{Z} \leq \mathbb{I}. \end{aligned} $$</span></div><div class="c-article-equation__number"> (B.11) </div></div><p> That is, we have that </p><div id="Equ42" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \operatorname{Tr} \bigl[{\hat{P}}\bigl(|\varphi _{n, s, g(\theta )} \rangle \bigr)J_{Z}^{*} \bigr]\geq \operatorname{Tr} \bigl[{ \hat{P}}\bigl(|\varphi _{n, s, g( \theta )}\rangle \bigr)J_{Z}^{**} \bigr], $$</span></div><div class="c-article-equation__number"> (B.12) </div></div><p> with <span class="mathjax-tex">\(J_{Z}^{**}\)</span> being the solution to the SDP in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ41">B.11</a>), and <span class="mathjax-tex">\(J_{Z}^{*}\)</span> the solution to Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>). This holds because the constrains in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ41">B.11</a>) are looser than those in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ7">7</a>).</p><p>Finally, by combining Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ39">B.9</a>) with Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ42">B.12</a>) we have that </p><div id="Equ43" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ Y_{n, s, g(\theta )}^{Z, {\mathrm{L}}}\geq G_{-} \bigl(\operatorname{Tr} \bigl[{\hat{P}}\bigl(|\varphi _{n, s, g(\theta )}\rangle \bigr)J_{Z}^{**} \bigr], F_{n,s,g(\theta )}^{\text{vec}} \bigr):={\tilde{Y}}_{n, s, g(\theta )}^{Z, {\mathrm{L}}}. $$</span></div><div class="c-article-equation__number"> (B.13) </div></div><p> The lower bound <span class="mathjax-tex">\({\tilde{Y}}_{n, s, g(\theta )}^{Z, {\mathrm{L}}}\)</span> is the one we use in our simulations in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec11">3.1</a>.</p><h3 class="c-article__sub-heading" id="Sec19"><span class="c-article-section__title-number">2.2 </span>B.2 Upper bound on the phase-error rates <span class="mathjax-tex">\(e_{n, s, g(\theta )}\)</span> </h3><p>In this Appendix, we show how to estimate an upper bound on <span class="mathjax-tex">\(e_{n, s, g(\theta )}\)</span> by using a finite-dimensional SDP. To do so, let us also define the operator </p><div id="Equ44" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ M_{\mathrm{ph}}:=|0_{X}\rangle \langle 0_{X}| \otimes L_{1_{X}}^{*}+| 1_{X} \rangle \langle 1_{X}| \otimes L_{0_{X}}^{*}, $$</span></div><div class="c-article-equation__number"> (B.14) </div></div><p> where <span class="mathjax-tex">\(L_{(\Delta \oplus 1)_{X}}^{*}\)</span> denotes the solution to the SDP given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>), so that </p><div id="Equ45" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} &amp;\sum_{\Delta =0}^{1}p^{\mathrm{virtual}}_{\Delta , n, s, g(\theta )}Y_{ \Delta , n, s, g(\theta )}^{ (\Delta \oplus 1)_{X}, \mathrm{virtual}} \\ &amp;\quad \leq \sum_{\Delta =0}^{1}\operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl| \bar{\lambda}^{\text{virtual}}_{\Delta , n, s, g(\theta )}\bigr\rangle \bigr) L_{(\Delta \oplus 1)_{X}}^{*} \bigr]=\operatorname{Tr} \bigl[{ \hat{P}}\bigl(\bigl|\Psi ^{Z}_{n, s, g(\theta )}\bigr\rangle \bigr) M_{\text{ph}} \bigr]. \end{aligned}$$ </span></div><div class="c-article-equation__number"> (B.15) </div></div><p>Now, let us define the finite-dimensional state </p><div id="Equ46" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl|\Psi ^{Z, M}_{n, s, g(\theta )}\bigr\rangle = \frac{1}{\sqrt{2}} \bigl(|0_{Z} \rangle _{A} \hat{V}_{0_{Z}}+|1_{Z}\rangle _{A} \hat{V}_{1_{Z}} \bigr)|\varphi _{n, s, g(\theta )}\rangle , $$</span></div><div class="c-article-equation__number"> (B.16) </div></div><p> and the unnormalized states <span class="mathjax-tex">\(|\bar{\lambda}^{\mathrm{virtual},M}_{ \Delta , n, s, g(\theta )} \rangle \)</span> as </p><div id="Equ47" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl|\bar{\lambda}^{\mathrm{virtual},M}_{ \Delta , n, s, g(\theta )} \bigr\rangle ={ }_{A}\bigl\langle \Delta _{X} |\Psi ^{Z, M}_{n, s, g(\theta )} \bigr\rangle =\frac{1}{2} \bigl[\hat{V}_{0_{Z}}+(-1)^{\Delta } \hat{V}_{1_{Z}} \bigr]|\varphi _{n, s, g(\theta )}\rangle . $$</span></div><div class="c-article-equation__number"> (B.17) </div></div><p>Then, we have that </p><div id="Equ48" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl\vert \bigl\langle \Psi ^{Z, M}_{n, s, g(\theta )}|\Psi ^{Z}_{n, s, g( \theta )}\bigr\rangle \bigr\vert ^{2}= \bigl\vert \langle \varphi _{n,s,g( \theta )}|\psi _{n,s,g(\theta )}\rangle \bigr\vert ^{2}\geq F^{\mathrm{vec}}_{n,s,g(\theta )}, $$</span></div><div class="c-article-equation__number"> (B.18) </div></div><p> where we have used Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ37">B.7</a>) and the fact that <span class="mathjax-tex">\(\hat{V}_{0 Z}^{\dagger} \hat{V}_{0 Z}=\hat{V}_{1 Z}^{\dagger} \hat{V}_{1 Z} = \mathbb{I}\)</span>. Now, by applying the Cauchy-Schwarz constraint given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ32">B.2</a>), and taking into account the fact that <span class="mathjax-tex">\(G_{+}(y,z)\)</span> is a decreasing function with respect to its second argument, we find that </p><div id="Equ49" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} &amp;\operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl|\Psi ^{Z}_{n, s, g(\theta )} \bigr\rangle \bigr) M_{\text{ph}} \bigr] \leq G_{+} \bigl(\operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl|\Psi ^{Z, M}_{n, s, g( \theta )}\bigr\rangle \bigr) M_{\text{ph}} \bigr], F^{\text{vec}}_{n,s,g( \theta )} \bigr). \end{aligned} $$</span></div><div class="c-article-equation__number"> (B.19) </div></div><p>Importantly, since <span class="mathjax-tex">\(G_{+}(y,z)\)</span> is an increasing function with respect to its first argument, one can upper bound the previous equation by finding an upper bound on its first argument. Moreover, since the states <span class="mathjax-tex">\(|\Psi ^{Z, M}_{n, s, g(\theta )}\rangle \)</span> are finite dimensional, one can restrict the optimization search to operators <i>L</i> that act on the corresponding finite subspace. In particular, we have that </p><div id="Equ50" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} &amp;\operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl|\Psi ^{Z, M}_{n, s, g(\theta )} \bigr\rangle \bigr) M_{\text{ph}} \bigr] \\ &amp;\quad = \sum_{\Delta =0}^{1} \operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl|\bar{\lambda}^{\text{virtual}, M}_{ \Delta , n, s, g(\theta )}\bigr\rangle \bigr) L_{(\Delta \oplus 1)_{X}}^{*} \bigr]\leq{} \sum _{\Delta =0}^{1} \operatorname{Tr} \bigl[{\hat{P}} \bigl(\bigl|\bar{\lambda}^{\text{virtual}, M}_{ \Delta , n, s, g(\theta )}\bigr\rangle \bigr) L_{(\Delta \oplus 1)_{X}}^{**} \bigr], \end{aligned} $$</span></div><div class="c-article-equation__number"> (B.20) </div></div><p> where <span class="mathjax-tex">\(L_{(\Delta \oplus 1)_{X}}^{**}\)</span> is the solution to the finite-dimensional SDP presented below.</p><p>Likewise, the constraints in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ13">13</a>) can be relaxed by using essentially the same techniques discussed in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec18">B.1</a>. In doing so, we find that an upper bound on <span class="mathjax-tex">\(\operatorname{Tr} [{\hat{P}}(|\bar{ \lambda}^{\text{virtual}, M}_{ \Delta , n, s, g(\theta )}\rangle ) L_{(\Delta \oplus 1)_{X}} ]\)</span> can be found by solving the following SDP </p><div id="Equ51" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} \max_{L_{(\Delta \oplus 1)_{X}}} &amp;\ \operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl| \bar{ \lambda}^{\text{virtual}, M}_{\Delta , n, s, g(\theta )} \bigr\rangle \bigr) L_{(\Delta \oplus 1)_{X}} \bigr] \\ \text{subject to } &amp;\ G_{-} \bigl(Q_{\mu ,g(\theta ), b_{\alpha}}^{( \Delta \oplus 1)_{X}}, F^{\text{proj}}_{\mu ,g(\theta )} \bigr) \leq \operatorname{Tr} \bigl[ \hat{V}_{b_{\alpha}} \rho _{[g(\theta )], \text{M}}^{\mu} \hat{V}_{b_{\alpha}}^{\dagger} L_{(\Delta \oplus 1)_{X}} \bigr] \\ &amp;\hphantom{\ G_{-} \bigl(Q_{\mu ,g(\theta ), b_{\alpha}}^{( \Delta \oplus 1)_{X}}, F^{\text{proj}}_{\mu ,g(\theta )} \bigr)}\leq G_{+} \bigl(Q_{\mu ,g(\theta ), b_{\alpha}}^{(\Delta \oplus 1)_{X}}, F^{\text{proj}}_{\mu ,g(\theta )} \bigr), \\ &amp;\ \forall \mu \in \{s, \nu , \omega \}, \forall b\in \{0,1\}, \forall \alpha \in \{Z,X\} \\ &amp;\ 0 \leq L_{(\Delta \oplus 1)_{X}} \leq \mathbb{I} , \end{aligned} $$</span></div><div class="c-article-equation__number"> (B.21) </div></div><p> where <span class="mathjax-tex">\(F^{\text{proj}}_{\mu ,g(\theta )}\)</span> is given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ35">B.5</a>).</p><p>Let <span class="mathjax-tex">\(L_{(\Delta \oplus 1)_{X},}^{**}\)</span> denote the operator that maximizes the SDP given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ51">B.21</a>), then </p><div id="Equa" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ e_{n, s, g(\theta )}\leq \frac{1}{{\tilde{Y}}_{n, s, g(\theta )}^{Z, {\mathrm{L}}}}G_{+} \Biggl(\sum _{ \Delta =0}^{1}\operatorname{Tr} \bigl[{\hat{P}}\bigl(\bigl|\bar{\lambda}^{ \text{virtual}, M}_{\Delta , n, s, g(\theta )}\bigr\rangle \bigr) L_{(\Delta \oplus 1)_{X}}^{**} \bigr], F^{\text{vec}}_{n,s,g(\theta )} \Biggr) :={\tilde{e}}_{n, s, g(\theta )}^{\mathrm{U}}. $$</span></div></div><p>This is the upper bound that we use in our simulations in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec11">3.1</a>.</p><h3 class="c-article__sub-heading" id="App1">Appendix C: Finite-dimensional SDPs when <span class="mathjax-tex">\(g(\theta )\)</span> is partially characterized</h3><p>Here, we consider the scenario studied in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec14">3.2</a>, <i>i.e.</i>, when the actual imprinted phases lies in certain intervals <span class="mathjax-tex">\(\hat{\theta}_{k}\in [\theta _{k}-\delta _{\text{max}},\theta _{k}+ \delta _{\text{max}}]\)</span>, with <span class="mathjax-tex">\(\theta _{k}=2 \pi k/N\)</span>, and the exact form of <span class="mathjax-tex">\(g(\theta )\)</span> is unknown.</p><p>A direct solution to this case could be found as follows. First, one defines a dense grid with <i>p</i> discrete values within each interval, and then one follows essentially the approach in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec12">3.1.1</a> for each possible combination of these discrete phases from the different intervals. The secret key rate would then correspond to the worst case scenario, <i>i.e.</i>, the one that minimizes it among all possible combinations. The main drawback of this approach is, however, that the number of SDPs that needs to be solved grows very rapidly, as <span class="mathjax-tex">\(\propto p^{N}\)</span>.</p><p>Instead, here we introduce a much simpler approach based on a modified version of the SDPs presented in Eqs.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ41">B.11</a>)–(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ51">B.21</a>). In particular, let <span class="mathjax-tex">\(f(\theta )\)</span> denote the PDF associated to the ideal discrete phase randomization scenario given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ1">1</a>), and let <span class="mathjax-tex">\(\rho ^{\mu}_{[f(\theta )], M}\)</span> be the finite-dimensional state obtained by projecting <span class="mathjax-tex">\(\rho ^{\mu}_{[f(\theta )]}\)</span> onto the subspace that contains up to <i>M</i> photons. Also, let <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> denote the state actually emitted by Alice in the scenario described above, <i>i.e.</i>, when <span class="mathjax-tex">\(g(\theta )\)</span> is partially characterized. Then, we can bound the fidelity between <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span> and <span class="mathjax-tex">\(\rho ^{\mu}_{[f(\theta )], M}\)</span> by means of the Bures distance, which is defined as [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 56" title=" Farenick D, Bures RM. Contractive channels on operator algebras. NY J Math. 2017;23:1369–93. " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR56" id="ref-link-section-d131444011e24211">56</a>] </p><div id="Equ52" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ d_{B}(\rho ,\sigma )^{2} = 2\bigl[1- \sqrt{F(\rho ,\sigma )}\bigr], $$</span></div><div class="c-article-equation__number"> (C.1) </div></div><p> for any state <i>ρ</i> and <i>σ</i>. This distance satisfies the triangle inequality [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 56" title=" Farenick D, Bures RM. Contractive channels on operator algebras. NY J Math. 2017;23:1369–93. " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR56" id="ref-link-section-d131444011e24308">56</a>], which means that </p><div id="Equ53" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} \sqrt{F\bigl(\rho ^{\mu}_{[g(\theta )]}, \rho ^{\mu}_{[f(\theta )], M}\bigr)} =&amp;1 - \frac{1}{2} d_{B}\bigl(\rho ^{\mu}_{[g(\theta )]}, \rho ^{\mu}_{[f( \theta )], M}\bigr)^{2} \\ \geq &amp; 1 - \frac{1}{2} \bigl[d_{B} \bigl(\rho ^{\mu}_{[f(\theta )]}, \rho ^{ \mu}_{[f(\theta )], M} \bigr) \\ &amp;{}+d_{B}\bigl(\rho ^{\mu}_{[g(\theta )]}, \rho ^{\mu}_{[f(\theta )]}\bigr) \bigr]^{2}. \end{aligned}$$ </span></div><div class="c-article-equation__number"> (C.2) </div></div><p>We now compute the fidelities that correspond to the Bures distances <span class="mathjax-tex">\(d_{B} (\rho ^{\mu}_{[f(\theta )]}, \rho ^{\mu}_{[f(\theta )], M})\)</span> and <span class="mathjax-tex">\(d_{B}(\rho ^{\mu}_{[g(\theta )]}, \rho ^{\mu}_{[f(\theta )]})\)</span> so that, via Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ52">C.1</a>), we can obtain the necessary fidelity bound with Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ53">C.2</a>).</p><p>In particular, from Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ35">B.5</a>), we have that <span class="mathjax-tex">\(F(\rho ^{\mu}_{[f(\theta )]}, \rho ^{\mu}_{[f(\theta )], M})=F^{ \text{proj}}_{\mu ,f(\theta )}\)</span>. The fidelity <span class="mathjax-tex">\(F(\rho ^{\mu}_{g(\theta )}, \rho ^{\mu}_{[f(\theta )]})\)</span>, on the other hand, can be computed by considering the following purifications of the states <span class="mathjax-tex">\(\rho ^{\mu}_{[f(\theta )]}\)</span> and <span class="mathjax-tex">\(\rho ^{\mu}_{[g(\theta )]}\)</span>, respectively, </p><div id="Equ54" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} &amp; \bigl|\psi _{[f(\theta )]}^{\mu ,N} \bigr\rangle =\frac{1}{\sqrt{N}} \sum_{k=0}^{N-1}|k \rangle \bigl\vert \sqrt{\mu} e^{2 \pi k i / N} \bigr\rangle , \\ &amp; \bigl|\psi _{[g(\theta )]}^{\mu ,N}\bigr\rangle =\frac{1}{\sqrt{N}} \sum _{k=0}^{N-1} e^{i \phi _{k}}|k\rangle \bigl\vert \sqrt{\mu} e^{i (2 \pi k / N+ \delta _{k} ) } \bigr\rangle . \end{aligned} $$</span></div><div class="c-article-equation__number"> (C.3) </div></div><p> We find, therefore, that </p><div id="Equ55" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} F\bigl(\rho ^{\mu}_{[g(\theta )]}, \rho _{[f(\theta )]}^{\mu} \bigr) \geq&amp; \bigl| \bigl\langle \psi _{[f(\theta )]}^{\mu ,N}|\psi _{[g(\theta )]}^{\mu ,N} \bigr\rangle \bigr|^{2} \\ =&amp; \Biggl|\sum_{k=0}^{N-1} \frac{1}{N}\bigl\langle \sqrt{\mu} e^{2 \pi k i / N}| \sqrt{\mu} e^{i(2 \pi k / N+\delta _{k})}\bigr\rangle \Biggl|^{2} \\ \geq&amp; \Biggl|\sum_{k=0}^{N-1} \frac{1}{N}\bigl\langle \sqrt{\mu} e^{2 \pi k i / N} |\sqrt{\mu} e^{i(2 \pi k / N+\delta _{\text{max}})}\bigr\rangle \Biggl|^{2} \\ =&amp; \bigl|\bigl\langle \sqrt{\mu}| \sqrt{\mu}e^{i\delta _{\text{max}}}\bigr\rangle \bigr|^{2}, \end{aligned}$$ </span></div><div class="c-article-equation__number"> (C.4) </div></div><p> where in the first inequality we have used the fact that the states on the right hand side are a purification of those on the left hand side; in the first equality we have taken into account that the phases <span class="mathjax-tex">\(\phi _{k}\)</span> in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ54">C.3</a>) can be chosen so that they cancel the phase of the inner product, and in the second inequality we have used the fact that <span class="mathjax-tex">\(|\delta _{k}|\leq \delta _{\text{max}}\)</span> <span class="stix">∀</span><i>k</i>.</p><p>Since the function <span class="mathjax-tex">\(g(\theta )\)</span> is unknown, we do not have access to the exact form of the eigenvectors <span class="mathjax-tex">\(|{\varphi _{n,s,[g(\theta )]}}\rangle \)</span> of <span class="mathjax-tex">\(\rho _{[g(\theta )],M}^{s}\)</span> which are needed to solve the relevant finite-dimensional SDP, but we can lower bound the value of <span class="mathjax-tex">\(\operatorname{Tr}[{\hat{P}}(|{\varphi _{n,s,[g(\theta )]}}\rangle )J_{Z}]\)</span>, with <span class="mathjax-tex">\(0 \leq J_{Z} \leq \mathbb{I}\)</span>, by employing the Cauchy-Schwartz constraint presented in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ32">B.2</a>). Precisely, we have that </p><div id="Equ56" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} \operatorname{Tr} \bigl[{\hat{P}}\bigl(|{\varphi _{n,s,[g(\theta )]}}\rangle \bigr)J_{Z} \bigr] \geq G_{-} \bigl(\operatorname{Tr} \bigl[{\hat{P}}\bigl(|{\varphi _{n,s,[f(\theta )]}}\rangle \bigr)J_{Z} \bigr], F\bigl(|{\varphi _{n,s,[g(\theta )]}}\rangle , |{\varphi _{n,s,[f(\theta )]}}\rangle \bigr) \bigr), \end{aligned}$$ </span></div><div class="c-article-equation__number"> (C.5) </div></div><p> where <span class="mathjax-tex">\(|{\varphi _{n,s,[f(\theta )]}}\rangle \)</span> are the eigenvectors of <span class="mathjax-tex">\(\rho _{[f(\theta )],M}^{s}\)</span>, and the value of <span class="mathjax-tex">\(F(|{\varphi _{n,s,[g(\theta )]}}\rangle , |{\varphi _{n,s,[f(\theta )]}}\rangle )\)</span> is calcuated numerically as explained below.</p><p>With these considerations, we can now find a lower bound on the yields <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z}\)</span>. For this, we first solve the following optimization problem to find the operator <span class="mathjax-tex">\(J^{**}_{\text{z}}\)</span> that minimizes its objective function </p><div id="Equ57" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} \min_{J_{Z}} &amp;\ \operatorname{Tr} \bigl[{\hat{P}}\bigl( |{\varphi _{n,s,[f(\theta )]}}\rangle \bigr)J_{Z} \bigr] \\ \text{subject to} &amp;\ G_{-} \bigl(Q_{\mu , g(\theta )}^{Z}, F\bigl(\rho ^{ \mu}_{[g(\theta )]}, \rho ^{\mu}_{[f(\theta )], M} \bigr) \bigr) \\ &amp;\ \quad \leq \operatorname{Tr} \bigl[\rho _{[f(\theta )],M}^{\mu}J_{Z} \bigr]\leq G_{+} \bigl(Q_{\mu , g(\theta )}^{Z}, F\bigl(\rho ^{\mu}_{[g(\theta )]}, \rho ^{\mu}_{[f(\theta )], M}\bigr) \bigr), \\ &amp;\ 0 \leq J_{Z} \leq \mathbb{I}. \end{aligned} $$</span></div><div class="c-article-equation__number"> (C.6) </div></div><p>Following Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ56">C.5</a>), we now define </p><div id="Equ58" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \hat{Y}_{n, s, g(\theta )}^{Z, {\mathrm{L}}}:= G_{-} \bigl(\operatorname{Tr} \bigl[{\hat{P}}\bigl(|{\varphi _{n,s,[f(\theta )]}}\rangle \bigr)J^{**}_{Z} \bigr], F\bigl(|{\varphi _{n,s,[g(\theta )]}}\rangle , |{\varphi _{n,s,[f(\theta )]}}\rangle \bigr) \bigr). $$</span></div><div class="c-article-equation__number"> (C.7) </div></div><p> Finally, by using the arguments introduced in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec18">B.1</a>, we obtain that a lower bound on <span class="mathjax-tex">\(Y_{n, s, g(\theta )}^{Z}\)</span> is given by </p><div id="Equ59" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ Y_{n, s, g(\theta )}^{Z} \geq G_{-} \bigl(\hat{Y}_{n, s, g(\theta )}^{Z, {\mathrm{L}}}, F^{\text{vec}}_{n,s,g(\theta )} \bigr):=\tilde{Y}_{n, s, g( \theta )}^{Z, {\mathrm{L}}}. $$</span></div><div class="c-article-equation__number"> (C.8) </div></div><p>Note that, since we do not know which values of <span class="mathjax-tex">\(\hat{\theta}_{k}\)</span> result in the set of states <span class="mathjax-tex">\(|{\varphi _{n,s,[g(\theta )]}}\rangle \)</span> that minimizes the key rate, we find the worst case scenario numerically. To do so, we implement a Montecarlo simulation by considering a dense grid of values in <span class="mathjax-tex">\(\theta _{k}\pm \delta _{\text{max}}\)</span> for every <i>k</i> and we find the combination of <span class="mathjax-tex">\(\hat{\theta}_{k}\)</span> that minimizes Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ59">C.8</a>) (which includes the fidelity in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ58">C.7</a>)). This allow us to find the desired lower bound with arbitrary precision. Also, note that the number of SDPs that need to be solved grows very rapidly in the case of the direct solution mentioned at the beginning of this section. With this approach, this problem has been circumvented by reducing it to a simple calculation of the fidelities, which makes it computationally much faster, despite possibly providing looser bounds.</p><p>Regarding the estimation of an upper bound on the phase error rate, we follow the same procedure described in Appendix&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec19">B.2</a>. In doing so, we first solve the following finite-dimensional SDP, </p><div id="Equ60" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} \max_{L_{(\Delta \oplus 1)_{X}}} &amp;\ \operatorname{Tr} \bigl[\hat{P}\bigl( \bigl|\bar{\lambda}_{\Delta , n,s,[f(\theta )]}^{\text{virtual},M}\bigr\rangle \bigr)L_{( \Delta \oplus 1)_{X}} \bigr] \\ \text{subject to } &amp;\ G_{-} \bigl(Q_{\mu , b_{\alpha}}^{(\Delta \oplus 1)_{X}}, F\bigl(\rho ^{\mu}_{[g(\theta )]}, \rho ^{\mu}_{[f(\theta )], M} \bigr) \bigr) \\ &amp;\ \quad \leq \operatorname{Tr} \bigl[\hat{V}_{b_{\alpha}} \rho _{[f( \theta )], M}^{\mu} \hat{V}_{b_{\alpha}}^{\dagger} L_{(\Delta \oplus 1)_{X}} \bigr] \leq G_{+} \bigl(Q_{\mu , b_{\alpha}}^{(\Delta \oplus 1)_{X}}, F\bigl(\rho ^{ \mu}_{[g(\theta )]}, \rho ^{\mu}_{[f(\theta )], M} \bigr) \bigr), \\ &amp;\ 0 \leq L_{(\Delta \oplus 1)_{X}} \leq \mathbb{I}, \end{aligned} $$</span></div><div class="c-article-equation__number"> (C.9) </div></div><p> where <span class="mathjax-tex">\(Q_{\mu , b_{\alpha}}^{(\Delta \oplus 1)_{X}}\)</span> represents the observed rate at which Bob obtains the result <span class="mathjax-tex">\((\Delta \oplus 1)_{X}\)</span> conditioned on Alice choosing the intensity setting <i>μ</i>, the basis <i>α</i>, the bit value <i>b</i> and Bob choosing the <i>X</i> basis. Now, similarly to Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ58">C.7</a>), we define </p><div id="Equ61" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \hat{e}^{\mathrm{U}}_{n, s, g(\theta )}:=\sum_{\Delta =0}^{1}G_{+} \bigl( \operatorname{Tr} \bigl[\hat{P}\bigl( \bigl|\bar{\lambda}_{\Delta , n,s,[f(\theta )]} ^{\text{virtual},M}\bigl\rangle \bigr)L^{**}_{( \Delta \oplus 1)_{X}} \bigr], F\bigl( \bigl|\bar{ \lambda}_{\Delta , n,s,[f(\theta )]}^{\text{virtual},M}\bigr\rangle , \bigl|\bar{\lambda}_{\Delta ,n,s,[g(\theta )]}^{\text{virtual},M}\bigr\rangle \bigr) \bigr), $$</span></div><div class="c-article-equation__number"> (C.10) </div></div><p> where <span class="mathjax-tex">\(L^{**}_{(\Delta \oplus 1)_{X}}\)</span> is the solution to Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ60">C.9</a>). This way, we obtain that the phase error rate <span class="mathjax-tex">\(e_{n, s, g(\theta )}\)</span> is upper bounded by </p><div id="Equ62" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ e_{n, s, g(\theta )}\leq \frac{G_{+} (\hat{e}_{n, s, g(\theta )}^{\mathrm{U}}, F^{\text{vec}}_{n,s,g(\theta )} )}{\tilde{Y}_{n, s, g(\theta )}^{Z, {\mathrm{L}}}} :={\tilde{e}}_{n, s, g(\theta )}^{\mathrm{U}}, $$</span></div><div class="c-article-equation__number"> (C.11) </div></div><p> where again, we use the combination of <span class="mathjax-tex">\(\hat{\theta}_{k}\)</span> that maximizes Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ62">C.11</a>) to obtain the relevant upper bound.</p><p>The bounds <span class="mathjax-tex">\(\tilde{Y}_{n, s, g(\theta )}^{Z, L}\)</span> and <span class="mathjax-tex">\({\tilde{e}}_{n, s, g(\theta )}^{\mathrm{U}}\)</span> are used in the simulations presented in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec14">3.2</a>.</p><p>As shown in Fig.&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig4">4</a>, higher values of <span class="mathjax-tex">\(\delta _{\text{max}}\)</span> result in an almost negligible impact of the parameter <i>N</i> on the secret key rate, as explained in the main text.</p><h3 class="c-article__sub-heading" id="App1">Appendix D: Influence of the parameter M in the secret key rate</h3><p>As stated in the main text, the secret key rate is an increasing function of the size of the finite dimensional SDP, denoted by <i>M</i>. However, the computational time for solving these SDPs significantly increases with higher values of <i>M</i>. In this Appendix we briefly explore how the size of the SDP impacts the secret key rate. Figure&nbsp;<a data-track="click" data-track-label="link" data-track-action="figure anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Fig5">5</a> displays the secret key rate for a case involving 8 random phases, showcasing changes as <i>M</i> varies. It is evident from the figure that selecting a small <span class="mathjax-tex">\(M&lt;8\)</span> results in a considerable drop in performance. Nevertheless, when <span class="mathjax-tex">\(M&gt;8\)</span> the key rate appears to saturate and the improvement that we can get by enlarging <i>M</i> is negligible. Hence, in the figures presented in the main text, for each <i>N</i>, we choose an <i>M</i> such that, further increases offer only marginal improvements in the secret key rate. This leads us to select different <i>M</i> values depending on <i>N</i>, as less random phases require smaller SDPs to fulfill the condition above. </p><div class="c-article-section__figure js-c-reading-companion-figures-item" data-test="figure" data-container-section="figure" id="figure-5" data-title="Figure&nbsp;5"><figure><figcaption><b id="Fig5" class="c-article-section__figure-caption" data-test="figure-caption-text">Figure&nbsp;5</b></figcaption><div class="c-article-section__figure-content"><div class="c-article-section__figure-item"><a class="c-article-section__figure-link" data-test="img-link" data-track="click" data-track-label="image" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/5" rel="nofollow"><picture><source type="image/webp" srcset="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig5_HTML.jpg?as=webp"><img aria-describedby="Fig5" src="//media.springernature.com/lw685/springer-static/image/art%3A10.1140%2Fepjqt%2Fs40507-023-00210-0/MediaObjects/40507_2023_210_Fig5_HTML.jpg" alt="figure 5" loading="lazy" width="685" height="482"></picture></a></div><div class="c-article-section__figure-description" data-test="bottom-caption" id="figure-5-desc"><p>Secret key rate as a function of the size of the SDP, represented by the parameter <i>M</i> when the number of random phases is fixed to <span class="mathjax-tex">\(N=8\)</span>. As one can see, selecting a small <i>M</i> causes a significant drop in performance. Increasing M requires exponentially more time to solve the SDPs</p></div></div><div class="u-text-right u-hide-print"><a class="c-article__pill-button" data-test="article-link" data-track="click" data-track-label="button" data-track-action="view figure" href="/articles/10.1140/epjqt/s40507-023-00210-0/figures/5" data-track-dest="link:Figure5 Full size image" aria-label="Full size image figure 5" rel="nofollow"><span>Full size image</span><svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-chevron-right-small"></use></svg></a></div></figure></div><h3 class="c-article__sub-heading" id="App1">Appendix E: Parameter estimation procedure based on linear programming</h3><p>For completeness, in this Appendix we summarize the parameter estimation technique presented in [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e29760">42</a>], using linear programming, to evaluate the case of perfect discrete phase randomization for the protocol described in Sect.&nbsp;<a data-track="click" data-track-label="link" data-track-action="section anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Sec4">2.2</a>.</p><p>In particular, given that the PDF follows Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ1">1</a>), which we will denote as <span class="mathjax-tex">\(f(\theta )\)</span> as in the previous Appendix and <span class="mathjax-tex">\(N \geq 1\)</span>, a purification of Alice’s emitted states can be expressed as </p><div id="Equ63" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl|\psi ^{\mu ,N}_{[f(\theta )]} \bigr\rangle =\sum_{k=0}^{N-1}|k\rangle _{A}\bigl| \sqrt{\mu} e^{2 k \pi i / N}\bigr\rangle =\sum_{j=0}^{N-1}|j\rangle _{A} \bigl\vert \beta ^{\mu}_{j} \bigr\rangle , $$</span></div><div class="c-article-equation__number"> (E.1) </div></div><p> where the second equality corresponds to the Schmidt decomposition. Note that in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ63">E.1</a>) we consider unnormalized states, which we will do throughout this Appendix for convenience. The states <span class="mathjax-tex">\(|{j}\rangle _{A}\)</span> can be interpreted as a quantum coin with <i>N</i> random outputs, while the states <span class="mathjax-tex">\(|\beta ^{\mu}_{j}\rangle \)</span> are given by </p><div id="Equ64" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl|\beta ^{\mu}_{j}\bigr\rangle =\sum _{k=0}^{N-1} e^{-2 k j \pi i / N}\bigl|e^{2 k \pi i / N} \sqrt{\mu}\bigr\rangle . $$</span></div><div class="c-article-equation__number"> (E.2) </div></div><p> By using Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ2">2</a>), these latter states can be rewritten as </p><div id="Equ65" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \bigl\vert \beta ^{\mu}_{j} \bigr\rangle =\sum _{l=0}^{\infty} \frac{(\sqrt{\mu})^{l N+j}}{\sqrt{(l N+j) !}}|l N+j\rangle . $$</span></div><div class="c-article-equation__number"> (E.3) </div></div><p> Indeed, it is easy to show that when <i>N</i> is large, <span class="mathjax-tex">\(|\beta ^{\mu}_{j}\rangle \)</span> approaches a Fock state with <i>j</i> photons.</p><p>If Alice measures her ancilla system <i>A</i> from the state <span class="mathjax-tex">\(|\psi ^{\mu ,N}_{[f(\theta )]}\rangle \)</span> in the basis <span class="mathjax-tex">\(\{|{j}\rangle _{A}\}\)</span>, she obtains the result <i>j</i> with probability <span class="mathjax-tex">\(P^{\mu}_{j}\)</span> given by </p><div id="Equ66" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} P^{\mu}_{j} =&amp; \frac{ \langle \beta ^{\mu}_{j} \mid \beta ^{\mu}_{j} \rangle}{\sum_{j=0}^{N-1} \langle \beta ^{\mu}_{j} \mid \beta ^{\mu}_{j} \rangle} \end{aligned}$$ </span></div><div class="c-article-equation__number"> (E.4) </div></div><div id="Equ67" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} =&amp;\sum_{l=0}^{\infty} \frac{\mu ^{l N+j} e^{-\mu}}{(l N+j) !}. \end{aligned}$$ </span></div><div class="c-article-equation__number"> (E.5) </div></div><p>Ref. [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 42" title=" Cao Z, Zhang Z, Lo HK, Ma X. Discrete-phase-randomized coherent state source and its application in quantum key distribution. New J Phys. 2015;17(5):053014. https://doi.org/10.1088/1367-2630/17/5/053014 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR42" id="ref-link-section-d131444011e30701">42</a>] employs the Gottesman, Lo, Lütkenhaus and Preskill (GLLP) security analysis [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 48" title=" Gottesman D, Lo HK, Lütkenhaus N, Preskill J. Security of quantum key distribution with imperfect devices. Quantum Inf Comput. 2004;4:325–60. https://doi.org/10.26421/QIC4.5-1 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR48" id="ref-link-section-d131444011e30704">48</a>], which needs to determine the basis dependence <span class="mathjax-tex">\(\Delta ^{\mu}_{j}\)</span> of the source, which is closely related to the fidelity <span class="mathjax-tex">\(F^{\mu}_{j}\)</span> between the states in the <i>X</i> and <i>Z</i> basis. Precisely, let us define </p><div id="Equ68" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \Delta ^{\mu}_{j}=\frac{1-F^{\mu}_{j}}{2 Y^{Z}_{j,\mu , f(\theta )}}, $$</span></div><div class="c-article-equation__number"> (E.6) </div></div><p> where <span class="mathjax-tex">\(Y^{Z}_{j,\mu , f(\theta )}\)</span> refers to the yield that corresponds to the states <span class="mathjax-tex">\(|\beta ^{\mu}_{j}\rangle \)</span> encoded in the Z basis, and the fidelity <span class="mathjax-tex">\(F^{\mu}_{j}\)</span> can be bounded by </p><div id="Equ69" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} &amp;F^{\mu}_{j}\geq \biggl\vert \frac{\sum_{l=0}^{\infty} \frac{\mu ^{l N+j}}{(l N+j) !} 2^{-\frac{l N+j}{2}} (\cos \frac{l N+j}{4} \pi +\sin \frac{l N+j}{4} \pi )}{\sum_{l=0}^{\infty} \frac{\mu ^{l N+j}}{(l N+j) !}} \biggr\vert . \end{aligned} $$</span></div><div class="c-article-equation__number"> (E.7) </div></div><p>Moreover, since <span class="mathjax-tex">\(\vert \beta _{j}^{\mu} \rangle \neq \vert \beta _{j}^{\gamma} \rangle \)</span> when <span class="mathjax-tex">\(\mu \neq \gamma \)</span>, one can relate the yields and bit error rates associated to different intensity settings as follows [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 48" title=" Gottesman D, Lo HK, Lütkenhaus N, Preskill J. Security of quantum key distribution with imperfect devices. Quantum Inf Comput. 2004;4:325–60. https://doi.org/10.26421/QIC4.5-1 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR48" id="ref-link-section-d131444011e31268">48</a>] </p><div id="Equ70" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ \begin{aligned} &amp; \vert Y_{j,\mu , f(\theta )}-Y_{j,\gamma , f(\theta )} \vert \leq \sqrt{1-F_{\mu \gamma}^{2}}, \\ &amp; \bigl\vert e^{b}_{j,\mu , f(\theta )} Y_{j,\mu , f(\theta )}-e^{b}_{j, \gamma , f(\theta )} Y_{j,\gamma , f(\theta )} \bigr\vert \leq \sqrt{1-F_{ \mu \gamma}^{2}}, \end{aligned} $$</span></div><div class="c-article-equation__number"> (E.8) </div></div><p> where <span class="mathjax-tex">\(e^{b}_{j,\mu , f(\theta )}\)</span> denotes the bit error rate corresponding to the states <span class="mathjax-tex">\(|\beta _{j}^{\mu}\rangle \)</span>, <i>i.e.</i>, the probability that Alice and Bob obtain different results when they use the same basis and Alice emits the state <span class="mathjax-tex">\(|\beta _{j}^{\mu}\rangle \)</span>. The parameter <span class="mathjax-tex">\(F_{\mu \gamma}\)</span>, on the other hand, is given by </p><div id="Equ71" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ F_{\mu \gamma} := \frac{\sum_{l=0}^{\infty} \frac{(\mu \gamma )^{l N / 2}}{(l N) !}}{\sqrt{\sum_{l=0}^{\infty} \frac{\mu ^{l N}}{(l N) !} \sum_{l=0}^{\infty} \frac{\gamma ^{l N}}{(l N) !}}}. $$</span></div><div class="c-article-equation__number"> (E.9) </div></div><p>The phase error rate <span class="mathjax-tex">\(e_{j,\mu ,g(\theta )}\)</span> in the <i>Z</i> basis can be upper bounded by means of the bit error rate <span class="mathjax-tex">\(e_{j,\mu , g(\theta )}^{b}\)</span> in the <i>X</i> basis and the basis dependence parameter <span class="mathjax-tex">\(\Delta ^{\mu}_{j}\)</span> as [<a data-track="click" data-track-action="reference anchor" data-track-label="link" data-test="citation-ref" aria-label="Reference 53" title=" Lo HK, Preskill J. Security of quantum key distribution using weak coherent states with nonrandom phases. Quantum Inf Comput. 2007;8:431–58. https://doi.org/10.26421/QIC7.5-6-2 . " href="/articles/10.1140/epjqt/s40507-023-00210-0#ref-CR53" id="ref-link-section-d131444011e32012">53</a>] </p><div id="Equ72" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned} e_{j,\mu ,f(\theta )} \leq&amp; e_{j,\mu , f(\theta )}^{b, X}+4 \Delta ^{ \mu}_{j} \bigl(1-\Delta ^{\mu}_{j} \bigr) \bigl(1-2 e^{b, X}_{j,\mu , f(\theta )} \bigr) \\ &amp;{}+4 \bigl(1-2 \Delta ^{\mu}_{j} \bigr) \sqrt{\Delta ^{\mu}_{j} \bigl(1- \Delta ^{\mu}_{j} \bigr) e^{b, X}_{j,\mu , f(\theta )} \bigl(1-e^{b, X}_{j, \mu , f(\theta )} \bigr)}, \end{aligned}$$ </span></div><div class="c-article-equation__number"> (E.10) </div></div><p> where we have included the superscript <i>X</i> in the bit error rate to emphasize that it refers to that in the <i>X</i> basis.</p><p>Putting it all together, we have that a lower bound on the yields <span class="mathjax-tex">\(Y^{Z}_{j,s, f(\theta )}\)</span> encoded in the Z basis can be estimated with the following linear program </p><div id="Equ73" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned}&amp; \begin{aligned} \mathrm{min} &amp;\ Y^{Z}_{j,s, f(\theta )} \\ \text{subject to} &amp;\ \bigl\vert Y^{Z}_{j,\mu , f(\theta )}-Y^{Z}_{j,\gamma , f(\theta )} \bigr\vert \leq \sqrt{1-F_{\mu \gamma}^{2}}, \\ &amp;\ \forall \mu , \gamma \in \{s, \nu , \omega \}, \mu \neq \gamma , \\ &amp;\ Q_{\mu , f(\theta )}^{Z}=\sum_{j=0}^{N-1} P_{j}^{\mu }Y^{Z}_{j, \mu , f(\theta )},\quad \forall \mu \in \{s, \nu , \omega \}. \end{aligned} \end{aligned}$$ </span></div><div class="c-article-equation__number"> (E.11) </div></div><p>Similarly, an upper bound on the bit error rate <span class="mathjax-tex">\(e_{j,\mu , g(\theta )}^{b, X}\)</span> can be calculated with the following linear program </p><div id="Equ74" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex"> $$\begin{aligned}&amp; \begin{aligned} \mathrm{max} &amp;\ \xi ^{X}_{j,s, f(\theta )} \\ \text{subject to} &amp;\ \bigl\vert \xi ^{X}_{j,\mu , f(\theta )}- \xi ^{X}_{j,\gamma , f(\theta )} \bigr\vert \leq \sqrt{1-F_{\mu \gamma}^{2}}, \\ &amp;\ \forall \mu , \gamma \in \{s, \nu , \omega \}, \mu \neq \gamma , \\ &amp;\ E^{X}_{\mu , f(\theta )} Q^{X}_{\mu , f(\theta )}=\sum _{j=0}^{N-1} P_{j}^{\mu } \xi ^{X}_{j,\mu , f(\theta )},\quad \forall \mu \in \{s, \nu , \omega \}, \end{aligned} \end{aligned}$$ </span></div><div class="c-article-equation__number"> (E.12) </div></div><p> where <span class="mathjax-tex">\(\xi ^{X}_{j,s, f(\theta )}=e^{b, X}_{j,s, f(\theta )} Y^{X}_{j,s, f( \theta )}\)</span>. In particular, let <span class="mathjax-tex">\(\xi ^{X*}_{j,s, f(\theta )}\)</span> denote the solution to the linear program above, then we have that </p><div id="Equ75" class="c-article-equation"><div class="c-article-equation__content"><span class="mathjax-tex">$$ e^{b, X}_{j,s, f(\theta )}\leq \frac{\xi ^{X*}_{j,s, f(\theta )}}{Y^{X, {\mathrm{L}}}_{j,s, f(\theta )}}:=e^{b, X, {\mathrm{U}}}_{j,s, f(\theta )}, $$</span></div><div class="c-article-equation__number"> (E.13) </div></div><p> where <span class="mathjax-tex">\(Y^{X, {\mathrm{L}}}_{j,s, f(\theta )}\)</span> represents a lower bound on the yield <span class="mathjax-tex">\(Y^{X}_{j,s, f(\theta )}\)</span> in the <i>X</i> basis. This quantity can be calculated with the linear program given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ73">E.11</a>) by simply replacing the superscript <i>Z</i> with <i>X</i>.</p><p>Finally, one can calculate the phase error rate <span class="mathjax-tex">\(e_{j,\mu ,f(\theta )}\)</span> in the <i>Z</i> basis by means of Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ72">E.10</a>), after replacing <span class="mathjax-tex">\(e_{j,\mu , f(\theta )}^{b, X}\)</span> with its upper bound and <span class="mathjax-tex">\(\Delta ^{\mu}_{j}\)</span> with the upper bound obtained after replacing a lower bound for the yield in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ68">E.6</a>). Importantly, with this approach there is no need to make a projection onto a finite dimensional subspace. This means that when evaluating the secret key rate formula given by Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ6">6</a>), the probabilities <span class="mathjax-tex">\(p^{L}_{n\mid s, f(\theta )}\)</span> are directly given by <span class="mathjax-tex">\(P^{\mu}_{j}\)</span> as defined in Eq.&nbsp;(<a data-track="click" data-track-label="link" data-track-action="equation anchor" href="/articles/10.1140/epjqt/s40507-023-00210-0#Equ66">E.4</a>).</p></div></div></section><section data-title="Rights and permissions"><div class="c-article-section" id="rightslink-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="rightslink">Rights and permissions</h2><div class="c-article-section__content" id="rightslink-content"> <p><b>Open Access</b> This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">http://creativecommons.org/licenses/by/4.0/</a>.</p> <p class="c-article-rights"><a data-track="click" data-track-action="view rights and permissions" data-track-label="link" href="https://s100.copyright.com/AppDispatchServlet?title=Secret%20key%20rate%20bounds%20for%20quantum%20key%20distribution%20with%20faulty%20active%20phase%20randomization&amp;author=Xoel%20Sixto%20et%20al&amp;contentID=10.1140%2Fepjqt%2Fs40507-023-00210-0&amp;copyright=The%20Author%28s%29&amp;publication=2662-4400&amp;publicationDate=2023-12-15&amp;publisherName=SpringerNature&amp;orderBeanReset=true&amp;oa=CC%20BY">Reprints and permissions</a></p></div></div></section><section aria-labelledby="article-info" data-title="About this article"><div class="c-article-section" id="article-info-section"><h2 class="c-article-section__title js-section-title js-c-reading-companion-sections-item" id="article-info">About this article</h2><div class="c-article-section__content" id="article-info-content"><div class="c-bibliographic-information"><div class="u-hide-print c-bibliographic-information__column c-bibliographic-information__column--border"><a data-crossmark="10.1140/epjqt/s40507-023-00210-0" target="_blank" rel="noopener" href="https://crossmark.crossref.org/dialog/?doi=10.1140/epjqt/s40507-023-00210-0" data-track="click" data-track-action="Click Crossmark" data-track-label="link" data-test="crossmark"><img loading="lazy" width="57" height="81" alt="Check for updates. Verify currency and authenticity via CrossMark" src="data:image/svg+xml;base64,<svg height="81" width="57" xmlns="http://www.w3.org/2000/svg"><g fill="none" fill-rule="evenodd"><path d="m17.35 35.45 21.3-14.2v-17.03h-21.3" fill="#989898"/><path d="m38.65 35.45-21.3-14.2v-17.03h21.3" fill="#747474"/><path d="m28 .5c-12.98 0-23.5 10.52-23.5 23.5s10.52 23.5 23.5 23.5 23.5-10.52 23.5-23.5c0-6.23-2.48-12.21-6.88-16.62-4.41-4.4-10.39-6.88-16.62-6.88zm0 41.25c-9.8 0-17.75-7.95-17.75-17.75s7.95-17.75 17.75-17.75 17.75 7.95 17.75 17.75c0 4.71-1.87 9.22-5.2 12.55s-7.84 5.2-12.55 5.2z" fill="#535353"/><path d="m41 36c-5.81 6.23-15.23 7.45-22.43 2.9-7.21-4.55-10.16-13.57-7.03-21.5l-4.92-3.11c-4.95 10.7-1.19 23.42 8.78 29.71 9.97 6.3 23.07 4.22 30.6-4.86z" fill="#9c9c9c"/><path d="m.2 58.45c0-.75.11-1.42.33-2.01s.52-1.09.91-1.5c.38-.41.83-.73 1.34-.94.51-.22 1.06-.32 1.65-.32.56 0 1.06.11 1.51.35.44.23.81.5 1.1.81l-.91 1.01c-.24-.24-.49-.42-.75-.56-.27-.13-.58-.2-.93-.2-.39 0-.73.08-1.05.23-.31.16-.58.37-.81.66-.23.28-.41.63-.53 1.04-.13.41-.19.88-.19 1.39 0 1.04.23 1.86.68 2.46.45.59 1.06.88 1.84.88.41 0 .77-.07 1.07-.23s.59-.39.85-.68l.91 1c-.38.43-.8.76-1.28.99-.47.22-1 .34-1.58.34-.59 0-1.13-.1-1.64-.31-.5-.2-.94-.51-1.31-.91-.38-.4-.67-.9-.88-1.48-.22-.59-.33-1.26-.33-2.02zm8.4-5.33h1.61v2.54l-.05 1.33c.29-.27.61-.51.96-.72s.76-.31 1.24-.31c.73 0 1.27.23 1.61.71.33.47.5 1.14.5 2.02v4.31h-1.61v-4.1c0-.57-.08-.97-.25-1.21-.17-.23-.45-.35-.83-.35-.3 0-.56.08-.79.22-.23.15-.49.36-.78.64v4.8h-1.61zm7.37 6.45c0-.56.09-1.06.26-1.51.18-.45.42-.83.71-1.14.29-.3.63-.54 1.01-.71.39-.17.78-.25 1.18-.25.47 0 .88.08 1.23.24.36.16.65.38.89.67s.42.63.54 1.03c.12.41.18.84.18 1.32 0 .32-.02.57-.07.76h-4.36c.07.62.29 1.1.65 1.44.36.33.82.5 1.38.5.29 0 .57-.04.83-.13s.51-.21.76-.37l.55 1.01c-.33.21-.69.39-1.09.53-.41.14-.83.21-1.26.21-.48 0-.92-.08-1.34-.25-.41-.16-.76-.4-1.07-.7-.31-.31-.55-.69-.72-1.13-.18-.44-.26-.95-.26-1.52zm4.6-.62c0-.55-.11-.98-.34-1.28-.23-.31-.58-.47-1.06-.47-.41 0-.77.15-1.07.45-.31.29-.5.73-.58 1.3zm2.5.62c0-.57.09-1.08.28-1.53.18-.44.43-.82.75-1.13s.69-.54 1.1-.71c.42-.16.85-.24 1.31-.24.45 0 .84.08 1.17.23s.61.34.85.57l-.77 1.02c-.19-.16-.38-.28-.56-.37-.19-.09-.39-.14-.61-.14-.56 0-1.01.21-1.35.63-.35.41-.52.97-.52 1.67 0 .69.17 1.24.51 1.66.34.41.78.62 1.32.62.28 0 .54-.06.78-.17.24-.12.45-.26.64-.42l.67 1.03c-.33.29-.69.51-1.08.65-.39.15-.78.23-1.18.23-.46 0-.9-.08-1.31-.24-.4-.16-.75-.39-1.05-.7s-.53-.69-.7-1.13c-.17-.45-.25-.96-.25-1.53zm6.91-6.45h1.58v6.17h.05l2.54-3.16h1.77l-2.35 2.8 2.59 4.07h-1.75l-1.77-2.98-1.08 1.23v1.75h-1.58zm13.69 1.27c-.25-.11-.5-.17-.75-.17-.58 0-.87.39-.87 1.16v.75h1.34v1.27h-1.34v5.6h-1.61v-5.6h-.92v-1.2l.92-.07v-.72c0-.35.04-.68.13-.98.08-.31.21-.57.4-.79s.42-.39.71-.51c.28-.12.63-.18 1.04-.18.24 0 .48.02.69.07.22.05.41.1.57.17zm.48 5.18c0-.57.09-1.08.27-1.53.17-.44.41-.82.72-1.13.3-.31.65-.54 1.04-.71.39-.16.8-.24 1.23-.24s.84.08 1.24.24c.4.17.74.4 1.04.71s.54.69.72 1.13c.19.45.28.96.28 1.53s-.09 1.08-.28 1.53c-.18.44-.42.82-.72 1.13s-.64.54-1.04.7-.81.24-1.24.24-.84-.08-1.23-.24-.74-.39-1.04-.7c-.31-.31-.55-.69-.72-1.13-.18-.45-.27-.96-.27-1.53zm1.65 0c0 .69.14 1.24.43 1.66.28.41.68.62 1.18.62.51 0 .9-.21 1.19-.62.29-.42.44-.97.44-1.66 0-.7-.15-1.26-.44-1.67-.29-.42-.68-.63-1.19-.63-.5 0-.9.21-1.18.63-.29.41-.43.97-.43 1.67zm6.48-3.44h1.33l.12 1.21h.05c.24-.44.54-.79.88-1.02.35-.24.7-.36 1.07-.36.32 0 .59.05.78.14l-.28 1.4-.33-.09c-.11-.01-.23-.02-.38-.02-.27 0-.56.1-.86.31s-.55.58-.77 1.1v4.2h-1.61zm-47.87 15h1.61v4.1c0 .57.08.97.25 1.2.17.24.44.35.81.35.3 0 .57-.07.8-.22.22-.15.47-.39.73-.73v-4.7h1.61v6.87h-1.32l-.12-1.01h-.04c-.3.36-.63.64-.98.86-.35.21-.76.32-1.24.32-.73 0-1.27-.24-1.61-.71-.33-.47-.5-1.14-.5-2.02zm9.46 7.43v2.16h-1.61v-9.59h1.33l.12.72h.05c.29-.24.61-.45.97-.63.35-.17.72-.26 1.1-.26.43 0 .81.08 1.15.24.33.17.61.4.84.71.24.31.41.68.53 1.11.13.42.19.91.19 1.44 0 .59-.09 1.11-.25 1.57-.16.47-.38.85-.65 1.16-.27.32-.58.56-.94.73-.35.16-.72.25-1.1.25-.3 0-.6-.07-.9-.2s-.59-.31-.87-.56zm0-2.3c.26.22.5.37.73.45.24.09.46.13.66.13.46 0 .84-.2 1.15-.6.31-.39.46-.98.46-1.77 0-.69-.12-1.22-.35-1.61-.23-.38-.61-.57-1.13-.57-.49 0-.99.26-1.52.77zm5.87-1.69c0-.56.08-1.06.25-1.51.16-.45.37-.83.65-1.14.27-.3.58-.54.93-.71s.71-.25 1.08-.25c.39 0 .73.07 1 .2.27.14.54.32.81.55l-.06-1.1v-2.49h1.61v9.88h-1.33l-.11-.74h-.06c-.25.25-.54.46-.88.64-.33.18-.69.27-1.06.27-.87 0-1.56-.32-2.07-.95s-.76-1.51-.76-2.65zm1.67-.01c0 .74.13 1.31.4 1.7.26.38.65.58 1.15.58.51 0 .99-.26 1.44-.77v-3.21c-.24-.21-.48-.36-.7-.45-.23-.08-.46-.12-.7-.12-.45 0-.82.19-1.13.59-.31.39-.46.95-.46 1.68zm6.35 1.59c0-.73.32-1.3.97-1.71.64-.4 1.67-.68 3.08-.84 0-.17-.02-.34-.07-.51-.05-.16-.12-.3-.22-.43s-.22-.22-.38-.3c-.15-.06-.34-.1-.58-.1-.34 0-.68.07-1 .2s-.63.29-.93.47l-.59-1.08c.39-.24.81-.45 1.28-.63.47-.17.99-.26 1.54-.26.86 0 1.51.25 1.93.76s.63 1.25.63 2.21v4.07h-1.32l-.12-.76h-.05c-.3.27-.63.48-.98.66s-.73.27-1.14.27c-.61 0-1.1-.19-1.48-.56-.38-.36-.57-.85-.57-1.46zm1.57-.12c0 .3.09.53.27.67.19.14.42.21.71.21.28 0 .54-.07.77-.2s.48-.31.73-.56v-1.54c-.47.06-.86.13-1.18.23-.31.09-.57.19-.76.31s-.33.25-.41.4c-.09.15-.13.31-.13.48zm6.29-3.63h-.98v-1.2l1.06-.07.2-1.88h1.34v1.88h1.75v1.27h-1.75v3.28c0 .8.32 1.2.97 1.2.12 0 .24-.01.37-.04.12-.03.24-.07.34-.11l.28 1.19c-.19.06-.4.12-.64.17-.23.05-.49.08-.76.08-.4 0-.74-.06-1.02-.18-.27-.13-.49-.3-.67-.52-.17-.21-.3-.48-.37-.78-.08-.3-.12-.64-.12-1.01zm4.36 2.17c0-.56.09-1.06.27-1.51s.41-.83.71-1.14c.29-.3.63-.54 1.01-.71.39-.17.78-.25 1.18-.25.47 0 .88.08 1.23.24.36.16.65.38.89.67s.42.63.54 1.03c.12.41.18.84.18 1.32 0 .32-.02.57-.07.76h-4.37c.08.62.29 1.1.65 1.44.36.33.82.5 1.38.5.3 0 .58-.04.84-.13.25-.09.51-.21.76-.37l.54 1.01c-.32.21-.69.39-1.09.53s-.82.21-1.26.21c-.47 0-.92-.08-1.33-.25-.41-.16-.77-.4-1.08-.7-.3-.31-.54-.69-.72-1.13-.17-.44-.26-.95-.26-1.52zm4.61-.62c0-.55-.11-.98-.34-1.28-.23-.31-.58-.47-1.06-.47-.41 0-.77.15-1.08.45-.31.29-.5.73-.57 1.3zm3.01 2.23c.31.24.61.43.92.57.3.13.63.2.98.2.38 0 .65-.08.83-.23s.27-.35.27-.6c0-.14-.05-.26-.13-.37-.08-.1-.2-.2-.34-.28-.14-.09-.29-.16-.47-.23l-.53-.22c-.23-.09-.46-.18-.69-.3-.23-.11-.44-.24-.62-.4s-.33-.35-.45-.55c-.12-.21-.18-.46-.18-.75 0-.61.23-1.1.68-1.49.44-.38 1.06-.57 1.83-.57.48 0 .91.08 1.29.25s.71.36.99.57l-.74.98c-.24-.17-.49-.32-.73-.42-.25-.11-.51-.16-.78-.16-.35 0-.6.07-.76.21-.17.15-.25.33-.25.54 0 .14.04.26.12.36s.18.18.31.26c.14.07.29.14.46.21l.54.19c.23.09.47.18.7.29s.44.24.64.4c.19.16.34.35.46.58.11.23.17.5.17.82 0 .3-.06.58-.17.83-.12.26-.29.48-.51.68-.23.19-.51.34-.84.45-.34.11-.72.17-1.15.17-.48 0-.95-.09-1.41-.27-.46-.19-.86-.41-1.2-.68z" fill="#535353"/></g></svg>"></a></div><div class="c-bibliographic-information__column"><h3 class="c-article__sub-heading" id="citeas">Cite this article</h3><p class="c-bibliographic-information__citation">Sixto, X., Currás-Lorenzo, G., Tamaki, K. <i>et al.</i> Secret key rate bounds for quantum key distribution with faulty active phase randomization. <i>EPJ Quantum Technol.</i> <b>10</b>, 53 (2023). https://doi.org/10.1140/epjqt/s40507-023-00210-0</p><p class="c-bibliographic-information__download-citation u-hide-print"><a data-test="citation-link" data-track="click" data-track-action="download article citation" data-track-label="link" data-track-external="" rel="nofollow" href="https://citation-needed.springer.com/v2/references/10.1140/epjqt/s40507-023-00210-0?format=refman&amp;flavour=citation">Download citation<svg width="16" height="16" focusable="false" role="img" aria-hidden="true" class="u-icon"><use xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#icon-eds-i-download-medium"></use></svg></a></p><ul class="c-bibliographic-information__list" data-test="publication-history"><li class="c-bibliographic-information__list-item"><p>Received<span class="u-hide">: </span><span class="c-bibliographic-information__value"><time datetime="2023-09-26">26 September 2023</time></span></p></li><li class="c-bibliographic-information__list-item"><p>Accepted<span class="u-hide">: </span><span class="c-bibliographic-information__value"><time datetime="2023-12-05">05 December 2023</time></span></p></li><li class="c-bibliographic-information__list-item"><p>Published<span class="u-hide">: </span><span class="c-bibliographic-information__value"><time datetime="2023-12-15">15 December 2023</time></span></p></li><li class="c-bibliographic-information__list-item c-bibliographic-information__list-item--full-width"><p><abbr title="Digital Object Identifier">DOI</abbr><span class="u-hide">: </span><span class="c-bibliographic-information__value">https://doi.org/10.1140/epjqt/s40507-023-00210-0</span></p></li></ul><div data-component="share-box"><div class="c-article-share-box u-display-none" hidden><h3 class="c-article__sub-heading">Share this article</h3><p class="c-article-share-box__description">Anyone you share the following link with will be able to read this content:</p><button class="js-get-share-url c-article-share-box__button" type="button" id="get-share-url" data-track="click" data-track-label="button" data-track-external="" data-track-action="get shareable link">Get shareable link</button><div class="js-no-share-url-container u-display-none" hidden><p class="js-c-article-share-box__no-sharelink-info c-article-share-box__no-sharelink-info">Sorry, a shareable link is not currently available for this article.</p></div><div class="js-share-url-container u-display-none" hidden><p class="js-share-url c-article-share-box__only-read-input" id="share-url" data-track="click" data-track-label="button" data-track-action="select share url"></p><button class="js-copy-share-url c-article-share-box__button--link-like" type="button" id="copy-share-url" data-track="click" data-track-label="button" data-track-action="copy share url" data-track-external="">Copy to clipboard</button></div><p class="js-c-article-share-box__additional-info c-article-share-box__additional-info"> Provided by the Springer Nature SharedIt content-sharing initiative </p></div></div><h3 class="c-article__sub-heading">Keywords</h3><ul class="c-article-subject-list"><li class="c-article-subject-list__subject"><span><a href="/search?query=Quantum%20key%20distribution&amp;facet-discipline=&quot;Physics&quot;" data-track="click" data-track-action="view keyword" data-track-label="link">Quantum key distribution</a></span></li><li class="c-article-subject-list__subject"><span><a href="/search?query=Decoy%20state&amp;facet-discipline=&quot;Physics&quot;" data-track="click" data-track-action="view keyword" data-track-label="link">Decoy state</a></span></li><li class="c-article-subject-list__subject"><span><a href="/search?query=Phase%20randomization&amp;facet-discipline=&quot;Physics&quot;" data-track="click" data-track-action="view keyword" data-track-label="link">Phase randomization</a></span></li><li class="c-article-subject-list__subject"><span><a href="/search?query=Source%20imperfections&amp;facet-discipline=&quot;Physics&quot;" data-track="click" data-track-action="view keyword" data-track-label="link">Source imperfections</a></span></li></ul><div data-component="article-info-list"></div></div></div></div></div></section> </article> </main> <div class="c-article-extras u-text-sm u-hide-print" data-container-type="reading-companion" data-track-component="reading companion"> <aside> <div data-test="download-article-link-wrapper" class="js-context-bar-sticky-point-desktop" data-track-context="reading companion"> <div class="c-pdf-download u-clear-both"> <a href="//epjquantumtechnology.springeropen.com/counter/pdf/10.1140/epjqt/s40507-023-00210-0.pdf" class="u-button u-button--full-width u-button--primary u-justify-content-space-between c-pdf-download__link" data-article-pdf="true" data-readcube-pdf-url="true" data-test="pdf-link" data-draft-ignore="true" data-track="content_download" data-track-type="article pdf download" data-track-action="download pdf" data-track-label="link" data-track-external download> <span class="c-pdf-download__text">Download PDF</span> <svg aria-hidden="true" focusable="false" width="16" height="16" class="u-icon"><use xlink:href="#icon-download"/></svg> </a> </div> </div> <div class="c-article-associated-content__container"> <section> <h2 class="c-article-associated-content__title u-mb-24">Associated content</h2> <div class="c-article-associated-content__collection collection u-mb-24"> <section> <p class="c-article-associated-content__collection-label u-sans-serif u-text-bold u-mb-8">Collection</p> <h3 class="c-article-associated-content__collection-title u-h3 u-mb-8"> <a href="https://www.springeropen.com/collections/sqc" class="u-link-inherit" data-track="click" data-track-action="view collection" data-track-category="associated content" data-track-label="collection" data-test="collection-link">Secure Quantum Communication</a> </h3> </section> </div> </section> </div> <script> window.dataLayer = window.dataLayer || []; window.dataLayer[0] = window.dataLayer[0] || {}; window.dataLayer[0].content = window.dataLayer[0].content || {}; window.dataLayer[0].content.associatedContentTypes = "collection"; window.dataLayer[0].content.collections = "SQC"; </script> <div class="c-reading-companion"> <div class="c-reading-companion__sticky" data-component="reading-companion-sticky" data-test="reading-companion-sticky"> <div class="c-reading-companion__panel c-reading-companion__sections c-reading-companion__panel--active" id="tabpanel-sections"> <div class="js-ad u-lazy-ad-wrapper u-mt-16 u-hide" data-component-mpu> <aside class="adsbox c-ad c-ad--300x250 u-mt-16" data-component-mpu> <div class="c-ad__inner"> <p class="c-ad__label">Advertisement</p> <div id="div-gpt-ad-MPU1" data-ad-type="MPU1" data-test="MPU1-ad" data-pa11y-ignore data-gpt data-gpt-unitpath="/270604982/springer_open/epjquantumtechnology/articles" data-gpt-sizes="300x250" data-gpt-targeting="pos=MPU1;doi=10.1140/epjqt/s40507-023-00210-0;type=article;kwrd=Quantum key distribution,Decoy state,Phase randomization,Source imperfections;pmc=P19080,P31070,T18000;sponsored=SQC;" > <noscript> <a href="//pubads.g.doubleclick.net/gampad/jump?iu=/270604982/springer_open/epjquantumtechnology/articles&amp;sz=300x250&amp;pos=MPU1&amp;doi=10.1140/epjqt/s40507-023-00210-0&amp;type=article&amp;kwrd=Quantum key distribution,Decoy state,Phase randomization,Source imperfections&amp;pmc=P19080,P31070,T18000&amp;sponsored=SQC&amp;"> <img data-test="gpt-advert-fallback-img" src="//pubads.g.doubleclick.net/gampad/ad?iu=/270604982/springer_open/epjquantumtechnology/articles&amp;sz=300x250&amp;pos=MPU1&amp;doi=10.1140/epjqt/s40507-023-00210-0&amp;type=article&amp;kwrd=Quantum key distribution,Decoy state,Phase randomization,Source imperfections&amp;pmc=P19080,P31070,T18000&amp;sponsored=SQC&amp;" alt="Advertisement" width="300" height="250"> </a> </noscript> </div> </div> </aside> </div> </div> <div class="c-reading-companion__panel c-reading-companion__figures c-reading-companion__panel--full-width" id="tabpanel-figures"></div> <div class="c-reading-companion__panel c-reading-companion__references c-reading-companion__panel--full-width" id="tabpanel-references"></div> </div> </div> </aside> </div> </div> <img rel="nofollow" class='tracker' style='display:none' src='/track/article/10.1140/epjqt/s40507-023-00210-0' alt=""/> <footer> <div class="c-publisher-footer u-color-inherit" data-test="publisher-footer"> <div class="u-container"> <div class="u-display-flex u-flex-wrap u-justify-content-space-between" data-test="publisher-footer-menu"> <div class="u-display-flex"> <ul class="c-list-group c-list-group--sm u-mr-24 u-mb-16"> <li class="c-list-group__item"> <a class="u-gray-link" href="https://support.biomedcentral.com/support/home">Support and Contact</a> </li> <li class="c-list-group__item"> <a class="u-gray-link" href="//www.springeropen.com/about/jobs">Jobs</a> </li> <li class="c-list-group__item"> <a class="u-gray-link" href="https://authorservices.springernature.com/language-editing/">Language editing for authors</a> </li> <li class="c-list-group__item"> <a class="u-gray-link" href="https://authorservices.springernature.com/scientific-editing/">Scientific editing for authors</a> </li> <li class="c-list-group__item"> <a class="u-gray-link" href="https://biomedcentral.typeform.com/to/VLXboo">Leave feedback</a> </li> </ul> <ul class="c-list-group c-list-group--sm u-mr-24 u-mb-16"> <li class="c-list-group__item"> <a class="u-gray-link" href="//www.springeropen.com/terms-and-conditions">Terms and conditions</a> </li> <li class="c-list-group__item"> <a class="u-gray-link" href="//www.springeropen.com/privacy-statement">Privacy statement</a> </li> <li class="c-list-group__item"> <a class="u-gray-link" href="//www.springeropen.com/accessibility">Accessibility</a> </li> <li class="c-list-group__item"> <a class="u-gray-link" href="//www.springeropen.com/cookies">Cookies</a> </li> </ul> </div> <div class="u-mb-24"> <h3 id="social-menu" class="u-text-sm u-reset-margin u-text-normal">Follow SpringerOpen</h3> <ul class="u-display-flex u-list-reset" data-test="footer-social-links"> <li class="u-mt-8 u-mr-8"> <a href="https://twitter.com/springeropen" data-track="click" data-track-category="Social" data-track-action="Clicked SpringerOpen Twitter" class="u-gray-link"> <span class="u-visually-hidden">SpringerOpen Twitter page</span> <svg class="u-icon u-text-lg" width="24" height="24" aria-hidden="true" focusable="false"> <use xlink:href="#icon-twitter-bordered"></use> </svg> </a> </li> <li class="u-mt-8 u-mr-8"> <a href="https://www.facebook.com/SpringerOpn" data-track="click" data-track-category="Social" data-track-action="Clicked SpringerOpen Facebook" class="u-gray-link"> <span class="u-visually-hidden">SpringerOpen Facebook page</span> <svg class="u-icon u-text-lg" width="24" height="24" aria-hidden="true" focusable="false"> <use xlink:href="#icon-facebook-bordered"></use> </svg> </a> </li> </ul> </div> </div> <p class="u-reset-margin"> By using this website, you agree to our <a class="u-gray-link" href="//www.springeropen.com/terms-and-conditions">Terms and Conditions</a>, <a class="u-gray-link" href="https://www.springernature.com/ccpa">Your US state privacy rights</a>, <a class="u-gray-link" href="//www.springeropen.com/privacy-statement">Privacy statement</a> and <a class="u-gray-link" href="//www.springeropen.com/cookies" data-test="cookie-link">Cookies</a> policy. <a class="u-gray-link" data-cc-action="preferences" href="javascript:void(0);">Your privacy choices/Manage cookies</a> we use in the preference centre. </p> </div> </div> <div class="c-corporate-footer"> <div class="u-container"> <img src=/static/images/logo-springernature-acb40b85fb.svg class="c-corporate-footer__logo" alt="Springer Nature" itemprop="logo" role="img"> <p class="c-corporate-footer__legal" data-test="copyright"> &#169; 2024 BioMed Central Ltd unless otherwise stated. Part of <a class="c-corporate-footer__link" href="https://www.springernature.com" itemscope itemtype="http://schema.org/Organization" itemid="#parentOrganization">Springer Nature</a>. </p> </div> </div> </footer> </div> <div class="u-visually-hidden" aria-hidden="true"> <?xml version="1.0" encoding="UTF-8"?><!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"><defs><path id="a" d="M0 .74h56.72v55.24H0z"/></defs><symbol id="icon-access" viewBox="0 0 18 18"><path d="m14 8c.5522847 0 1 .44771525 1 1v7h2.5c.2761424 0 .5.2238576.5.5v1.5h-18v-1.5c0-.2761424.22385763-.5.5-.5h2.5v-7c0-.55228475.44771525-1 1-1s1 .44771525 1 1v6.9996556h8v-6.9996556c0-.55228475.4477153-1 1-1zm-8 0 2 1v5l-2 1zm6 0v7l-2-1v-5zm-2.42653766-7.59857636 7.03554716 4.92488299c.4162533.29137735.5174853.86502537.226108 1.28127873-.1721584.24594054-.4534847.39241464-.7536934.39241464h-14.16284822c-.50810197 0-.92-.41189803-.92-.92 0-.30020869.1464741-.58153499.39241464-.75369337l7.03554714-4.92488299c.34432015-.2410241.80260453-.2410241 1.14692468 0zm-.57346234 2.03988748-3.65526982 2.55868888h7.31053962z" fill-rule="evenodd"/></symbol><symbol id="icon-account" viewBox="0 0 18 18"><path d="m10.2379028 16.9048051c1.3083556-.2032362 2.5118471-.7235183 3.5294683-1.4798399-.8731327-2.5141501-2.0638925-3.935978-3.7673711-4.3188248v-1.27684611c1.1651924-.41183641 2-1.52307546 2-2.82929429 0-1.65685425-1.3431458-3-3-3-1.65685425 0-3 1.34314575-3 3 0 1.30621883.83480763 2.41745788 2 2.82929429v1.27684611c-1.70347856.3828468-2.89423845 1.8046747-3.76737114 4.3188248 1.01762123.7563216 2.22111275 1.2766037 3.52946833 1.4798399.40563808.0629726.81921174.0951949 1.23790281.0951949s.83226473-.0322223 1.2379028-.0951949zm4.3421782-2.1721994c1.4927655-1.4532925 2.419919-3.484675 2.419919-5.7326057 0-4.418278-3.581722-8-8-8s-8 3.581722-8 8c0 2.2479307.92715352 4.2793132 2.41991895 5.7326057.75688473-2.0164459 1.83949951-3.6071894 3.48926591-4.3218837-1.14534283-.70360829-1.90918486-1.96796271-1.90918486-3.410722 0-2.209139 1.790861-4 4-4s4 1.790861 4 4c0 1.44275929-.763842 2.70711371-1.9091849 3.410722 1.6497664.7146943 2.7323812 2.3054378 3.4892659 4.3218837zm-5.580081 3.2673943c-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9 4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9z" fill-rule="evenodd"/></symbol><symbol id="icon-alert" viewBox="0 0 18 18"><path d="m4 10h2.5c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-3.08578644l-1.12132034 1.1213203c-.18753638.1875364-.29289322.4418903-.29289322.7071068v.1715729h14v-.1715729c0-.2652165-.1053568-.5195704-.2928932-.7071068l-1.7071068-1.7071067v-3.4142136c0-2.76142375-2.2385763-5-5-5-2.76142375 0-5 2.23857625-5 5zm3 4c0 1.1045695.8954305 2 2 2s2-.8954305 2-2zm-5 0c-.55228475 0-1-.4477153-1-1v-.1715729c0-.530433.21071368-1.0391408.58578644-1.4142135l1.41421356-1.4142136v-3c0-3.3137085 2.6862915-6 6-6s6 2.6862915 6 6v3l1.4142136 1.4142136c.3750727.3750727.5857864.8837805.5857864 1.4142135v.1715729c0 .5522847-.4477153 1-1 1h-4c0 1.6568542-1.3431458 3-3 3-1.65685425 0-3-1.3431458-3-3z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-broad" viewBox="0 0 16 16"><path d="m6.10307866 2.97190702v7.69043288l2.44965196-2.44676915c.38776071-.38730439 1.0088052-.39493524 1.38498697-.01919617.38609051.38563612.38643641 1.01053024-.00013864 1.39665039l-4.12239817 4.11754683c-.38616704.3857126-1.01187344.3861062-1.39846576-.0000311l-4.12258206-4.11773056c-.38618426-.38572979-.39254614-1.00476697-.01636437-1.38050605.38609047-.38563611 1.01018509-.38751562 1.4012233.00306241l2.44985644 2.4469734v-8.67638639c0-.54139983.43698413-.98042709.98493125-.98159081l7.89910522-.0043627c.5451687 0 .9871152.44142642.9871152.98595351s-.4419465.98595351-.9871152.98595351z" fill-rule="evenodd" transform="matrix(-1 0 0 -1 14 15)"/></symbol><symbol id="icon-arrow-down" viewBox="0 0 16 16"><path d="m3.28337502 11.5302405 4.03074001 4.176208c.37758093.3912076.98937525.3916069 1.367372-.0000316l4.03091977-4.1763942c.3775978-.3912252.3838182-1.0190815.0160006-1.4001736-.3775061-.39113013-.9877245-.39303641-1.3700683.003106l-2.39538585 2.4818345v-11.6147896l-.00649339-.11662112c-.055753-.49733869-.46370161-.88337888-.95867408-.88337888-.49497246 0-.90292107.38604019-.95867408.88337888l-.00649338.11662112v11.6147896l-2.39518594-2.4816273c-.37913917-.39282218-.98637524-.40056175-1.35419292-.0194697-.37750607.3911302-.37784433 1.0249269.00013556 1.4165479z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-left" viewBox="0 0 16 16"><path d="m4.46975946 3.28337502-4.17620792 4.03074001c-.39120768.37758093-.39160691.98937525.0000316 1.367372l4.1763942 4.03091977c.39122514.3775978 1.01908149.3838182 1.40017357.0160006.39113012-.3775061.3930364-.9877245-.00310603-1.3700683l-2.48183446-2.39538585h11.61478958l.1166211-.00649339c.4973387-.055753.8833789-.46370161.8833789-.95867408 0-.49497246-.3860402-.90292107-.8833789-.95867408l-.1166211-.00649338h-11.61478958l2.4816273-2.39518594c.39282216-.37913917.40056173-.98637524.01946965-1.35419292-.39113012-.37750607-1.02492687-.37784433-1.41654791.00013556z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-right" viewBox="0 0 16 16"><path d="m11.5302405 12.716625 4.176208-4.03074003c.3912076-.37758093.3916069-.98937525-.0000316-1.367372l-4.1763942-4.03091981c-.3912252-.37759778-1.0190815-.38381821-1.4001736-.01600053-.39113013.37750607-.39303641.98772445.003106 1.37006824l2.4818345 2.39538588h-11.6147896l-.11662112.00649339c-.49733869.055753-.88337888.46370161-.88337888.95867408 0 .49497246.38604019.90292107.88337888.95867408l.11662112.00649338h11.6147896l-2.4816273 2.39518592c-.39282218.3791392-.40056175.9863753-.0194697 1.3541929.3911302.3775061 1.0249269.3778444 1.4165479-.0001355z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-sub" viewBox="0 0 16 16"><path d="m7.89692134 4.97190702v7.69043288l-2.44965196-2.4467692c-.38776071-.38730434-1.0088052-.39493519-1.38498697-.0191961-.38609047.3856361-.38643643 1.0105302.00013864 1.3966504l4.12239817 4.1175468c.38616704.3857126 1.01187344.3861062 1.39846576-.0000311l4.12258202-4.1177306c.3861843-.3857298.3925462-1.0047669.0163644-1.380506-.3860905-.38563612-1.0101851-.38751563-1.4012233.0030624l-2.44985643 2.4469734v-8.67638639c0-.54139983-.43698413-.98042709-.98493125-.98159081l-7.89910525-.0043627c-.54516866 0-.98711517.44142642-.98711517.98595351s.44194651.98595351.98711517.98595351z" fill-rule="evenodd"/></symbol><symbol id="icon-arrow-up" viewBox="0 0 16 16"><path d="m12.716625 4.46975946-4.03074003-4.17620792c-.37758093-.39120768-.98937525-.39160691-1.367372.0000316l-4.03091981 4.1763942c-.37759778.39122514-.38381821 1.01908149-.01600053 1.40017357.37750607.39113012.98772445.3930364 1.37006824-.00310603l2.39538588-2.48183446v11.61478958l.00649339.1166211c.055753.4973387.46370161.8833789.95867408.8833789.49497246 0 .90292107-.3860402.95867408-.8833789l.00649338-.1166211v-11.61478958l2.39518592 2.4816273c.3791392.39282216.9863753.40056173 1.3541929.01946965.3775061-.39113012.3778444-1.02492687-.0001355-1.41654791z" fill-rule="evenodd"/></symbol><symbol id="icon-article" viewBox="0 0 18 18"><path d="m13 15v-12.9906311c0-.0073595-.0019884-.0093689.0014977-.0093689l-11.00158888.00087166v13.00506804c0 .5482678.44615281.9940603.99415146.9940603h10.27350412c-.1701701-.2941734-.2675644-.6357129-.2675644-1zm-12 .0059397v-13.00506804c0-.5562408.44704472-1.00087166.99850233-1.00087166h11.00299537c.5510129 0 .9985023.45190985.9985023 1.0093689v2.9906311h3v9.9914698c0 1.1065798-.8927712 2.0085302-1.9940603 2.0085302h-12.01187942c-1.09954652 0-1.99406028-.8927712-1.99406028-1.9940603zm13-9.0059397v9c0 .5522847.4477153 1 1 1s1-.4477153 1-1v-9zm-10-2h7v4h-7zm1 1v2h5v-2zm-1 4h7v1h-7zm0 2h7v1h-7zm0 2h7v1h-7z" fill-rule="evenodd"/></symbol><symbol id="icon-audio" viewBox="0 0 18 18"><path d="m13.0957477 13.5588459c-.195279.1937043-.5119137.193729-.7072234.0000551-.1953098-.193674-.1953346-.5077061-.0000556-.7014104 1.0251004-1.0168342 1.6108711-2.3905226 1.6108711-3.85745208 0-1.46604976-.5850634-2.83898246-1.6090736-3.85566829-.1951894-.19379323-.1950192-.50782531.0003802-.70141028.1953993-.19358497.512034-.19341614.7072234.00037709 1.2094886 1.20083761 1.901635 2.8250555 1.901635 4.55670148 0 1.73268608-.6929822 3.35779608-1.9037571 4.55880738zm2.1233994 2.1025159c-.195234.193749-.5118687.1938462-.7072235.0002171-.1953548-.1936292-.1954528-.5076613-.0002189-.7014104 1.5832215-1.5711805 2.4881302-3.6939808 2.4881302-5.96012998 0-2.26581266-.9046382-4.3883241-2.487443-5.95944795-.1952117-.19377107-.1950777-.50780316.0002993-.70141031s.5120117-.19347426.7072234.00029682c1.7683321 1.75528196 2.7800854 4.12911258 2.7800854 6.66056144 0 2.53182498-1.0120556 4.90597838-2.7808529 6.66132328zm-14.21898205-3.6854911c-.5523759 0-1.00016505-.4441085-1.00016505-.991944v-3.96777631c0-.54783558.44778915-.99194407 1.00016505-.99194407h2.0003301l5.41965617-3.8393633c.44948677-.31842296 1.07413994-.21516983 1.39520191.23062232.12116339.16823446.18629727.36981184.18629727.57655577v12.01603479c0 .5478356-.44778914.9919441-1.00016505.9919441-.20845738 0-.41170538-.0645985-.58133413-.184766l-5.41965617-3.8393633zm0-.991944h2.32084805l5.68047235 4.0241292v-12.01603479l-5.68047235 4.02412928h-2.32084805z" fill-rule="evenodd"/></symbol><symbol id="icon-block" viewBox="0 0 24 24"><path d="m0 0h24v24h-24z" fill-rule="evenodd"/></symbol><symbol id="icon-book" viewBox="0 0 18 18"><path d="m4 13v-11h1v11h11v-11h-13c-.55228475 0-1 .44771525-1 1v10.2675644c.29417337-.1701701.63571286-.2675644 1-.2675644zm12 1h-13c-.55228475 0-1 .4477153-1 1s.44771525 1 1 1h13zm0 3h-13c-1.1045695 0-2-.8954305-2-2v-12c0-1.1045695.8954305-2 2-2h13c.5522847 0 1 .44771525 1 1v14c0 .5522847-.4477153 1-1 1zm-8.5-13h6c.2761424 0 .5.22385763.5.5s-.2238576.5-.5.5h-6c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm1 2h4c.2761424 0 .5.22385763.5.5s-.2238576.5-.5.5h-4c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5z" fill-rule="evenodd"/></symbol><symbol id="icon-broad" viewBox="0 0 24 24"><path d="m9.18274226 7.81v7.7999954l2.48162734-2.4816273c.3928221-.3928221 1.0219731-.4005617 1.4030652-.0194696.3911301.3911301.3914806 1.0249268-.0001404 1.4165479l-4.17620796 4.1762079c-.39120769.3912077-1.02508144.3916069-1.41671995-.0000316l-4.1763942-4.1763942c-.39122514-.3912251-.39767006-1.0190815-.01657798-1.4001736.39113012-.3911301 1.02337106-.3930364 1.41951349.0031061l2.48183446 2.4818344v-8.7999954c0-.54911294.4426881-.99439484.99778758-.99557515l8.00221246-.00442485c.5522847 0 1 .44771525 1 1s-.4477153 1-1 1z" fill-rule="evenodd" transform="matrix(-1 0 0 -1 20.182742 24.805206)"/></symbol><symbol id="icon-calendar" viewBox="0 0 18 18"><path d="m12.5 0c.2761424 0 .5.21505737.5.49047852v.50952148h2c1.1072288 0 2 .89451376 2 2v12c0 1.1072288-.8945138 2-2 2h-12c-1.1072288 0-2-.8945138-2-2v-12c0-1.1072288.89451376-2 2-2h1v1h-1c-.55393837 0-1 .44579254-1 1v3h14v-3c0-.55393837-.4457925-1-1-1h-2v1.50952148c0 .27088381-.2319336.49047852-.5.49047852-.2761424 0-.5-.21505737-.5-.49047852v-3.01904296c0-.27088381.2319336-.49047852.5-.49047852zm3.5 7h-14v8c0 .5539384.44579254 1 1 1h12c.5539384 0 1-.4457925 1-1zm-11 6v1h-1v-1zm3 0v1h-1v-1zm3 0v1h-1v-1zm-6-2v1h-1v-1zm3 0v1h-1v-1zm6 0v1h-1v-1zm-3 0v1h-1v-1zm-3-2v1h-1v-1zm6 0v1h-1v-1zm-3 0v1h-1v-1zm-5.5-9c.27614237 0 .5.21505737.5.49047852v.50952148h5v1h-5v1.50952148c0 .27088381-.23193359.49047852-.5.49047852-.27614237 0-.5-.21505737-.5-.49047852v-3.01904296c0-.27088381.23193359-.49047852.5-.49047852z" fill-rule="evenodd"/></symbol><symbol id="icon-cart" viewBox="0 0 18 18"><path d="m5 14c1.1045695 0 2 .8954305 2 2s-.8954305 2-2 2-2-.8954305-2-2 .8954305-2 2-2zm10 0c1.1045695 0 2 .8954305 2 2s-.8954305 2-2 2-2-.8954305-2-2 .8954305-2 2-2zm-10 1c-.55228475 0-1 .4477153-1 1s.44771525 1 1 1 1-.4477153 1-1-.44771525-1-1-1zm10 0c-.5522847 0-1 .4477153-1 1s.4477153 1 1 1 1-.4477153 1-1-.4477153-1-1-1zm-12.82032249-15c.47691417 0 .88746157.33678127.98070211.80449199l.23823144 1.19501025 13.36277974.00045554c.5522847.00001882.9999659.44774934.9999659 1.00004222 0 .07084994-.0075361.14150708-.022474.2107727l-1.2908094 5.98534344c-.1007861.46742419-.5432548.80388386-1.0571651.80388386h-10.24805106c-.59173366 0-1.07142857.4477153-1.07142857 1 0 .5128358.41361449.9355072.94647737.9932723l.1249512.0067277h10.35933776c.2749512 0 .4979349.2228539.4979349.4978051 0 .2749417-.2227336.4978951-.4976753.4980063l-10.35959736.0041886c-1.18346732 0-2.14285714-.8954305-2.14285714-2 0-.6625717.34520317-1.24989198.87690425-1.61383592l-1.63768102-8.19004794c-.01312273-.06561364-.01950005-.131011-.0196107-.19547395l-1.71961253-.00064219c-.27614237 0-.5-.22385762-.5-.5 0-.27614237.22385763-.5.5-.5zm14.53193359 2.99950224h-13.11300004l1.20580469 6.02530174c.11024034-.0163252.22327998-.02480398.33844139-.02480398h10.27064786z"/></symbol><symbol id="icon-chevron-less" viewBox="0 0 10 10"><path d="m5.58578644 4-3.29289322-3.29289322c-.39052429-.39052429-.39052429-1.02368927 0-1.41421356s1.02368927-.39052429 1.41421356 0l4 4c.39052429.39052429.39052429 1.02368927 0 1.41421356l-4 4c-.39052429.39052429-1.02368927.39052429-1.41421356 0s-.39052429-1.02368927 0-1.41421356z" fill-rule="evenodd" transform="matrix(0 -1 -1 0 9 9)"/></symbol><symbol id="icon-chevron-more" viewBox="0 0 10 10"><path d="m5.58578644 6-3.29289322-3.29289322c-.39052429-.39052429-.39052429-1.02368927 0-1.41421356s1.02368927-.39052429 1.41421356 0l4 4c.39052429.39052429.39052429 1.02368927 0 1.41421356l-4 4.00000002c-.39052429.3905243-1.02368927.3905243-1.41421356 0s-.39052429-1.02368929 0-1.41421358z" fill-rule="evenodd" transform="matrix(0 1 -1 0 11 1)"/></symbol><symbol id="icon-chevron-right" viewBox="0 0 10 10"><path d="m5.96738168 4.70639573 2.39518594-2.41447274c.37913917-.38219212.98637524-.38972225 1.35419292-.01894278.37750606.38054586.37784436.99719163-.00013556 1.37821513l-4.03074001 4.06319683c-.37758093.38062133-.98937525.38100976-1.367372-.00003075l-4.03091981-4.06337806c-.37759778-.38063832-.38381821-.99150444-.01600053-1.3622839.37750607-.38054587.98772445-.38240057 1.37006824.00302197l2.39538588 2.4146743.96295325.98624457z" fill-rule="evenodd" transform="matrix(0 -1 1 0 0 10)"/></symbol><symbol id="icon-circle-fill" viewBox="0 0 16 16"><path d="m8 14c-3.3137085 0-6-2.6862915-6-6s2.6862915-6 6-6 6 2.6862915 6 6-2.6862915 6-6 6z" fill-rule="evenodd"/></symbol><symbol id="icon-circle" viewBox="0 0 16 16"><path d="m8 12c2.209139 0 4-1.790861 4-4s-1.790861-4-4-4-4 1.790861-4 4 1.790861 4 4 4zm0 2c-3.3137085 0-6-2.6862915-6-6s2.6862915-6 6-6 6 2.6862915 6 6-2.6862915 6-6 6z" fill-rule="evenodd"/></symbol><symbol id="icon-citation" viewBox="0 0 18 18"><path d="m8.63593473 5.99995183c2.20913897 0 3.99999997 1.79084375 3.99999997 3.99996146 0 1.40730761-.7267788 2.64486871-1.8254829 3.35783281 1.6240224.6764218 2.8754442 2.0093871 3.4610603 3.6412466l-1.0763845.000006c-.5310008-1.2078237-1.5108121-2.1940153-2.7691712-2.7181346l-.79002167-.329052v-1.023992l.63016577-.4089232c.8482885-.5504661 1.3698342-1.4895187 1.3698342-2.51898361 0-1.65683828-1.3431457-2.99996146-2.99999997-2.99996146-1.65685425 0-3 1.34312318-3 2.99996146 0 1.02946491.52154569 1.96851751 1.36983419 2.51898361l.63016581.4089232v1.023992l-.79002171.329052c-1.25835905.5241193-2.23817037 1.5103109-2.76917113 2.7181346l-1.07638453-.000006c.58561612-1.6318595 1.8370379-2.9648248 3.46106024-3.6412466-1.09870405-.7129641-1.82548287-1.9505252-1.82548287-3.35783281 0-2.20911771 1.790861-3.99996146 4-3.99996146zm7.36897597-4.99995183c1.1018574 0 1.9950893.89353404 1.9950893 2.00274083v5.994422c0 1.10608317-.8926228 2.00274087-1.9950893 2.00274087l-3.0049107-.0009037v-1l3.0049107.00091329c.5490631 0 .9950893-.44783123.9950893-1.00275046v-5.994422c0-.55646537-.4450595-1.00275046-.9950893-1.00275046h-14.00982141c-.54906309 0-.99508929.44783123-.99508929 1.00275046v5.9971821c0 .66666024.33333333.99999036 1 .99999036l2-.00091329v1l-2 .0009037c-1 0-2-.99999041-2-1.99998077v-5.9971821c0-1.10608322.8926228-2.00274083 1.99508929-2.00274083zm-8.5049107 2.9999711c.27614237 0 .5.22385547.5.5 0 .2761349-.22385763.5-.5.5h-4c-.27614237 0-.5-.2238651-.5-.5 0-.27614453.22385763-.5.5-.5zm3 0c.2761424 0 .5.22385547.5.5 0 .2761349-.2238576.5-.5.5h-1c-.27614237 0-.5-.2238651-.5-.5 0-.27614453.22385763-.5.5-.5zm4 0c.2761424 0 .5.22385547.5.5 0 .2761349-.2238576.5-.5.5h-2c-.2761424 0-.5-.2238651-.5-.5 0-.27614453.2238576-.5.5-.5z" fill-rule="evenodd"/></symbol><symbol id="icon-close" viewBox="0 0 16 16"><path d="m2.29679575 12.2772478c-.39658757.3965876-.39438847 1.0328109-.00062148 1.4265779.39651227.3965123 1.03246768.3934888 1.42657791-.0006214l4.27724782-4.27724787 4.2772478 4.27724787c.3965876.3965875 1.0328109.3943884 1.4265779.0006214.3965123-.3965122.3934888-1.0324677-.0006214-1.4265779l-4.27724787-4.2772478 4.27724787-4.27724782c.3965875-.39658757.3943884-1.03281091.0006214-1.42657791-.3965122-.39651226-1.0324677-.39348875-1.4265779.00062148l-4.2772478 4.27724782-4.27724782-4.27724782c-.39658757-.39658757-1.03281091-.39438847-1.42657791-.00062148-.39651226.39651227-.39348875 1.03246768.00062148 1.42657791l4.27724782 4.27724782z" fill-rule="evenodd"/></symbol><symbol id="icon-collections" viewBox="0 0 18 18"><path d="m15 4c1.1045695 0 2 .8954305 2 2v9c0 1.1045695-.8954305 2-2 2h-8c-1.1045695 0-2-.8954305-2-2h1c0 .5128358.38604019.9355072.88337887.9932723l.11662113.0067277h8c.5128358 0 .9355072-.3860402.9932723-.8833789l.0067277-.1166211v-9c0-.51283584-.3860402-.93550716-.8833789-.99327227l-.1166211-.00672773h-1v-1zm-4-3c1.1045695 0 2 .8954305 2 2v9c0 1.1045695-.8954305 2-2 2h-8c-1.1045695 0-2-.8954305-2-2v-9c0-1.1045695.8954305-2 2-2zm0 1h-8c-.51283584 0-.93550716.38604019-.99327227.88337887l-.00672773.11662113v9c0 .5128358.38604019.9355072.88337887.9932723l.11662113.0067277h8c.5128358 0 .9355072-.3860402.9932723-.8833789l.0067277-.1166211v-9c0-.51283584-.3860402-.93550716-.8833789-.99327227zm-1.5 7c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-5c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm0-2c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-5c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm0-2c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-5c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5z" fill-rule="evenodd"/></symbol><symbol id="icon-compare" viewBox="0 0 18 18"><path d="m12 3c3.3137085 0 6 2.6862915 6 6s-2.6862915 6-6 6c-1.0928452 0-2.11744941-.2921742-2.99996061-.8026704-.88181407.5102749-1.90678042.8026704-3.00003939.8026704-3.3137085 0-6-2.6862915-6-6s2.6862915-6 6-6c1.09325897 0 2.11822532.29239547 3.00096303.80325037.88158756-.51107621 1.90619177-.80325037 2.99903697-.80325037zm-6 1c-2.76142375 0-5 2.23857625-5 5 0 2.7614237 2.23857625 5 5 5 .74397391 0 1.44999672-.162488 2.08451611-.4539116-1.27652344-1.1000812-2.08451611-2.7287264-2.08451611-4.5460884s.80799267-3.44600721 2.08434391-4.5463015c-.63434719-.29121054-1.34037-.4536985-2.08434391-.4536985zm6 0c-.7439739 0-1.4499967.16248796-2.08451611.45391156 1.27652341 1.10008123 2.08451611 2.72872644 2.08451611 4.54608844s-.8079927 3.4460072-2.08434391 4.5463015c.63434721.2912105 1.34037001.4536985 2.08434391.4536985 2.7614237 0 5-2.2385763 5-5 0-2.76142375-2.2385763-5-5-5zm-1.4162763 7.0005324h-3.16744736c.15614659.3572676.35283837.6927622.58425872 1.0006671h1.99892988c.23142036-.3079049.42811216-.6433995.58425876-1.0006671zm.4162763-2.0005324h-4c0 .34288501.0345146.67770871.10025909 1.0011864h3.79948181c.0657445-.32347769.1002591-.65830139.1002591-1.0011864zm-.4158423-1.99953894h-3.16831543c-.13859957.31730812-.24521946.651783-.31578599.99935097h3.79988742c-.0705665-.34756797-.1771864-.68204285-.315786-.99935097zm-1.58295822-1.999926-.08316107.06199199c-.34550042.27081213-.65446126.58611297-.91825862.93727862h2.00044041c-.28418626-.37830727-.6207872-.71499149-.99902072-.99927061z" fill-rule="evenodd"/></symbol><symbol id="icon-download-file" viewBox="0 0 18 18"><path d="m10.0046024 0c.5497429 0 1.3179837.32258606 1.707238.71184039l4.5763192 4.57631922c.3931386.39313859.7118404 1.16760135.7118404 1.71431368v8.98899651c0 1.1092806-.8945138 2.0085302-1.9940603 2.0085302h-12.01187942c-1.10128908 0-1.99406028-.8926228-1.99406028-1.9950893v-14.00982141c0-1.10185739.88743329-1.99508929 1.99961498-1.99508929zm0 1h-7.00498742c-.55709576 0-.99961498.44271433-.99961498.99508929v14.00982141c0 .5500396.44491393.9950893.99406028.9950893h12.01187942c.5463747 0 .9940603-.4506622.9940603-1.0085302v-8.98899651c0-.28393444-.2150684-.80332809-.4189472-1.0072069l-4.5763192-4.57631922c-.2038461-.20384606-.718603-.41894717-1.0001312-.41894717zm-1.5046024 4c.27614237 0 .5.21637201.5.49209595v6.14827645l1.7462789-1.77990922c.1933927-.1971171.5125222-.19455839.7001689-.0069117.1932998.19329992.1910058.50899492-.0027774.70277812l-2.59089271 2.5908927c-.19483374.1948337-.51177825.1937771-.70556873-.0000133l-2.59099079-2.5909908c-.19484111-.1948411-.19043735-.5151448-.00279066-.70279146.19329987-.19329987.50465175-.19237083.70018565.00692852l1.74638684 1.78001764v-6.14827695c0-.27177709.23193359-.49209595.5-.49209595z" fill-rule="evenodd"/></symbol><symbol id="icon-download" viewBox="0 0 16 16"><path d="m12.9975267 12.999368c.5467123 0 1.0024733.4478567 1.0024733 1.000316 0 .5563109-.4488226 1.000316-1.0024733 1.000316h-9.99505341c-.54671233 0-1.00247329-.4478567-1.00247329-1.000316 0-.5563109.44882258-1.000316 1.00247329-1.000316zm-4.9975267-11.999368c.55228475 0 1 .44497754 1 .99589209v6.80214418l2.4816273-2.48241149c.3928222-.39294628 1.0219732-.4006883 1.4030652-.01947579.3911302.39125371.3914806 1.02525073-.0001404 1.41699553l-4.17620792 4.17752758c-.39120769.3913313-1.02508144.3917306-1.41671995-.0000316l-4.17639421-4.17771394c-.39122513-.39134876-.39767006-1.01940351-.01657797-1.40061601.39113012-.39125372 1.02337105-.3931606 1.41951349.00310701l2.48183446 2.48261871v-6.80214418c0-.55001601.44386482-.99589209 1-.99589209z" fill-rule="evenodd"/></symbol><symbol id="icon-editors" viewBox="0 0 18 18"><path d="m8.72592184 2.54588137c-.48811714-.34391207-1.08343326-.54588137-1.72592184-.54588137-1.65685425 0-3 1.34314575-3 3 0 1.02947485.5215457 1.96853646 1.3698342 2.51900785l.6301658.40892721v1.02400182l-.79002171.32905522c-1.93395773.8055207-3.20997829 2.7024791-3.20997829 4.8180274v.9009805h-1v-.9009805c0-2.5479714 1.54557359-4.79153984 3.82548288-5.7411543-1.09870406-.71297106-1.82548288-1.95054399-1.82548288-3.3578652 0-2.209139 1.790861-4 4-4 1.09079823 0 2.07961816.43662103 2.80122451 1.1446278-.37707584.09278571-.7373238.22835063-1.07530267.40125357zm-2.72592184 14.45411863h-1v-.9009805c0-2.5479714 1.54557359-4.7915398 3.82548288-5.7411543-1.09870406-.71297106-1.82548288-1.95054399-1.82548288-3.3578652 0-2.209139 1.790861-4 4-4s4 1.790861 4 4c0 1.40732121-.7267788 2.64489414-1.8254829 3.3578652 2.2799093.9496145 3.8254829 3.1931829 3.8254829 5.7411543v.9009805h-1v-.9009805c0-2.1155483-1.2760206-4.0125067-3.2099783-4.8180274l-.7900217-.3290552v-1.02400184l.6301658-.40892721c.8482885-.55047139 1.3698342-1.489533 1.3698342-2.51900785 0-1.65685425-1.3431458-3-3-3-1.65685425 0-3 1.34314575-3 3 0 1.02947485.5215457 1.96853646 1.3698342 2.51900785l.6301658.40892721v1.02400184l-.79002171.3290552c-1.93395773.8055207-3.20997829 2.7024791-3.20997829 4.8180274z" fill-rule="evenodd"/></symbol><symbol id="icon-email" viewBox="0 0 18 18"><path d="m16.0049107 2c1.1018574 0 1.9950893.89706013 1.9950893 2.00585866v9.98828264c0 1.1078052-.8926228 2.0058587-1.9950893 2.0058587h-14.00982141c-1.10185739 0-1.99508929-.8970601-1.99508929-2.0058587v-9.98828264c0-1.10780515.8926228-2.00585866 1.99508929-2.00585866zm0 1h-14.00982141c-.54871518 0-.99508929.44887827-.99508929 1.00585866v9.98828264c0 .5572961.44630695 1.0058587.99508929 1.0058587h14.00982141c.5487152 0 .9950893-.4488783.9950893-1.0058587v-9.98828264c0-.55729607-.446307-1.00585866-.9950893-1.00585866zm-.0049107 2.55749512v1.44250488l-7 4-7-4v-1.44250488l7 4z" fill-rule="evenodd"/></symbol><symbol id="icon-error" viewBox="0 0 18 18"><path d="m9 0c4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9zm2.8630343 4.71100931-2.8630343 2.86303426-2.86303426-2.86303426c-.39658757-.39658757-1.03281091-.39438847-1.4265779-.00062147-.39651227.39651226-.39348876 1.03246767.00062147 1.4265779l2.86303426 2.86303426-2.86303426 2.8630343c-.39658757.3965875-.39438847 1.0328109-.00062147 1.4265779.39651226.3965122 1.03246767.3934887 1.4265779-.0006215l2.86303426-2.8630343 2.8630343 2.8630343c.3965875.3965876 1.0328109.3943885 1.4265779.0006215.3965122-.3965123.3934887-1.0324677-.0006215-1.4265779l-2.8630343-2.8630343 2.8630343-2.86303426c.3965876-.39658757.3943885-1.03281091.0006215-1.4265779-.3965123-.39651227-1.0324677-.39348876-1.4265779.00062147z" fill-rule="evenodd"/></symbol><symbol id="icon-ethics" viewBox="0 0 18 18"><path d="m6.76384967 1.41421356.83301651-.8330165c.77492941-.77492941 2.03133823-.77492941 2.80626762 0l.8330165.8330165c.3750728.37507276.8837806.58578644 1.4142136.58578644h1.3496361c1.1045695 0 2 .8954305 2 2v1.34963611c0 .53043298.2107137 1.03914081.5857864 1.41421356l.8330165.83301651c.7749295.77492941.7749295 2.03133823 0 2.80626762l-.8330165.8330165c-.3750727.3750728-.5857864.8837806-.5857864 1.4142136v1.3496361c0 1.1045695-.8954305 2-2 2h-1.3496361c-.530433 0-1.0391408.2107137-1.4142136.5857864l-.8330165.8330165c-.77492939.7749295-2.03133821.7749295-2.80626762 0l-.83301651-.8330165c-.37507275-.3750727-.88378058-.5857864-1.41421356-.5857864h-1.34963611c-1.1045695 0-2-.8954305-2-2v-1.3496361c0-.530433-.21071368-1.0391408-.58578644-1.4142136l-.8330165-.8330165c-.77492941-.77492939-.77492941-2.03133821 0-2.80626762l.8330165-.83301651c.37507276-.37507275.58578644-.88378058.58578644-1.41421356v-1.34963611c0-1.1045695.8954305-2 2-2h1.34963611c.53043298 0 1.03914081-.21071368 1.41421356-.58578644zm-1.41421356 1.58578644h-1.34963611c-.55228475 0-1 .44771525-1 1v1.34963611c0 .79564947-.31607052 1.55871121-.87867966 2.12132034l-.8330165.83301651c-.38440512.38440512-.38440512 1.00764896 0 1.39205408l.8330165.83301646c.56260914.5626092.87867966 1.3256709.87867966 2.1213204v1.3496361c0 .5522847.44771525 1 1 1h1.34963611c.79564947 0 1.55871121.3160705 2.12132034.8786797l.83301651.8330165c.38440512.3844051 1.00764896.3844051 1.39205408 0l.83301646-.8330165c.5626092-.5626092 1.3256709-.8786797 2.1213204-.8786797h1.3496361c.5522847 0 1-.4477153 1-1v-1.3496361c0-.7956495.3160705-1.5587112.8786797-2.1213204l.8330165-.83301646c.3844051-.38440512.3844051-1.00764896 0-1.39205408l-.8330165-.83301651c-.5626092-.56260913-.8786797-1.32567087-.8786797-2.12132034v-1.34963611c0-.55228475-.4477153-1-1-1h-1.3496361c-.7956495 0-1.5587112-.31607052-2.1213204-.87867966l-.83301646-.8330165c-.38440512-.38440512-1.00764896-.38440512-1.39205408 0l-.83301651.8330165c-.56260913.56260914-1.32567087.87867966-2.12132034.87867966zm3.58698944 11.4960218c-.02081224.002155-.04199226.0030286-.06345763.002542-.98766446-.0223875-1.93408568-.3063547-2.75885125-.8155622-.23496767-.1450683-.30784554-.4531483-.16277726-.688116.14506827-.2349677.45314827-.3078455.68811595-.1627773.67447084.4164161 1.44758575.6483839 2.25617384.6667123.01759529.0003988.03495764.0017019.05204365.0038639.01713363-.0017748.03452416-.0026845.05212715-.0026845 2.4852814 0 4.5-2.0147186 4.5-4.5 0-1.04888973-.3593547-2.04134635-1.0074477-2.83787157-.1742817-.21419731-.1419238-.5291218.0722736-.70340353.2141973-.17428173.5291218-.14192375.7034035.07227357.7919032.97327203 1.2317706 2.18808682 1.2317706 3.46900153 0 3.0375661-2.4624339 5.5-5.5 5.5-.02146768 0-.04261937-.0013529-.06337445-.0039782zm1.57975095-10.78419583c.2654788.07599731.419084.35281842.3430867.61829728-.0759973.26547885-.3528185.419084-.6182973.3430867-.37560116-.10752146-.76586237-.16587951-1.15568824-.17249193-2.5587807-.00064534-4.58547766 2.00216524-4.58547766 4.49928198 0 .62691557.12797645 1.23496.37274865 1.7964426.11035133.2531347-.0053975.5477984-.25853224.6581497-.25313473.1103514-.54779841-.0053975-.65814974-.2585322-.29947131-.6869568-.45606667-1.43097603-.45606667-2.1960601 0-3.05211432 2.47714695-5.50006595 5.59399617-5.49921198.48576182.00815502.96289603.0795037 1.42238033.21103795zm-1.9766658 6.41091303 2.69835-2.94655317c.1788432-.21040373.4943901-.23598862.7047939-.05714545.2104037.17884318.2359886.49439014.0571454.70479387l-3.01637681 3.34277395c-.18039088.1999106-.48669547.2210637-.69285412.0478478l-1.93095347-1.62240047c-.21213845-.17678204-.24080048-.49206439-.06401844-.70420284.17678204-.21213844.49206439-.24080048.70420284-.06401844z" fill-rule="evenodd"/></symbol><symbol id="icon-expand"><path d="M7.498 11.918a.997.997 0 0 0-.003-1.411.995.995 0 0 0-1.412-.003l-4.102 4.102v-3.51A1 1 0 0 0 .98 10.09.992.992 0 0 0 0 11.092V17c0 .554.448 1.002 1.002 1.002h5.907c.554 0 1.002-.45 1.002-1.003 0-.539-.45-.978-1.006-.978h-3.51zm3.005-5.835a.997.997 0 0 0 .003 1.412.995.995 0 0 0 1.411.003l4.103-4.103v3.51a1 1 0 0 0 1.001 1.006A.992.992 0 0 0 18 6.91V1.002A1 1 0 0 0 17 0h-5.907a1.003 1.003 0 0 0-1.002 1.003c0 .539.45.978 1.006.978h3.51z" fill-rule="evenodd"/></symbol><symbol id="icon-explore" viewBox="0 0 18 18"><path d="m9 17c4.418278 0 8-3.581722 8-8s-3.581722-8-8-8-8 3.581722-8 8 3.581722 8 8 8zm0 1c-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9 4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9zm0-2.5c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5c2.969509 0 5.400504-2.3575119 5.497023-5.31714844.0090007-.27599565.2400359-.49243782.5160315-.48343711.2759957.0090007.4924378.2400359.4834371.51603155-.114093 3.4985237-2.9869632 6.284554-6.4964916 6.284554zm-.29090657-12.99359748c.27587424-.01216621.50937715.20161139.52154336.47748563.01216621.27587423-.20161139.50937715-.47748563.52154336-2.93195733.12930094-5.25315116 2.54886451-5.25315116 5.49456849 0 .27614237-.22385763.5-.5.5s-.5-.22385763-.5-.5c0-3.48142406 2.74307146-6.34074398 6.20909343-6.49359748zm1.13784138 8.04763908-1.2004882-1.20048821c-.19526215-.19526215-.19526215-.51184463 0-.70710678s.51184463-.19526215.70710678 0l1.20048821 1.2004882 1.6006509-4.00162734-4.50670359 1.80268144-1.80268144 4.50670359zm4.10281269-6.50378907-2.6692597 6.67314927c-.1016411.2541026-.3029834.4554449-.557086.557086l-6.67314927 2.6692597 2.66925969-6.67314926c.10164107-.25410266.30298336-.45544495.55708602-.55708602z" fill-rule="evenodd"/></symbol><symbol id="icon-filter" viewBox="0 0 16 16"><path d="m14.9738641 0c.5667192 0 1.0261359.4477136 1.0261359 1 0 .24221858-.0902161.47620768-.2538899.65849851l-5.6938314 6.34147206v5.49997973c0 .3147562-.1520673.6111434-.4104543.7999971l-2.05227171 1.4999945c-.45337535.3313696-1.09655869.2418269-1.4365902-.1999993-.13321514-.1730955-.20522717-.3836284-.20522717-.5999978v-6.99997423l-5.69383133-6.34147206c-.3731872-.41563511-.32996891-1.0473954.09653074-1.41107611.18705584-.15950448.42716133-.2474224.67571519-.2474224zm-5.9218641 8.5h-2.105v6.491l.01238459.0070843.02053271.0015705.01955278-.0070558 2.0532976-1.4990996zm-8.02585008-7.5-.01564945.00240169 5.83249953 6.49759831h2.313l5.836-6.499z"/></symbol><symbol id="icon-home" viewBox="0 0 18 18"><path d="m9 5-6 6v5h4v-4h4v4h4v-5zm7 6.5857864v4.4142136c0 .5522847-.4477153 1-1 1h-5v-4h-2v4h-5c-.55228475 0-1-.4477153-1-1v-4.4142136c-.25592232 0-.51184464-.097631-.70710678-.2928932l-.58578644-.5857864c-.39052429-.3905243-.39052429-1.02368929 0-1.41421358l8.29289322-8.29289322 8.2928932 8.29289322c.3905243.39052429.3905243 1.02368928 0 1.41421358l-.5857864.5857864c-.1952622.1952622-.4511845.2928932-.7071068.2928932zm-7-9.17157284-7.58578644 7.58578644.58578644.5857864 7-6.99999996 7 6.99999996.5857864-.5857864z" fill-rule="evenodd"/></symbol><symbol id="icon-image" viewBox="0 0 18 18"><path d="m10.0046024 0c.5497429 0 1.3179837.32258606 1.707238.71184039l4.5763192 4.57631922c.3931386.39313859.7118404 1.16760135.7118404 1.71431368v8.98899651c0 1.1092806-.8945138 2.0085302-1.9940603 2.0085302h-12.01187942c-1.10128908 0-1.99406028-.8926228-1.99406028-1.9950893v-14.00982141c0-1.10185739.88743329-1.99508929 1.99961498-1.99508929zm-3.49645283 10.1752453-3.89407257 6.7495552c.11705545.048464.24538859.0751995.37998328.0751995h10.60290092l-2.4329715-4.2154691-1.57494129 2.7288098zm8.49779013 6.8247547c.5463747 0 .9940603-.4506622.9940603-1.0085302v-8.98899651c0-.28393444-.2150684-.80332809-.4189472-1.0072069l-4.5763192-4.57631922c-.2038461-.20384606-.718603-.41894717-1.0001312-.41894717h-7.00498742c-.55709576 0-.99961498.44271433-.99961498.99508929v13.98991071l4.50814957-7.81026689 3.08089884 5.33809539 1.57494129-2.7288097 3.5875735 6.2159812zm-3.0059397-11c1.1045695 0 2 .8954305 2 2s-.8954305 2-2 2-2-.8954305-2-2 .8954305-2 2-2zm0 1c-.5522847 0-1 .44771525-1 1s.4477153 1 1 1 1-.44771525 1-1-.4477153-1-1-1z" fill-rule="evenodd"/></symbol><symbol id="icon-info" viewBox="0 0 18 18"><path d="m9 0c4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9zm0 7h-1.5l-.11662113.00672773c-.49733868.05776511-.88337887.48043643-.88337887.99327227 0 .47338693.32893365.86994729.77070917.97358929l.1126697.01968298.11662113.00672773h.5v3h-.5l-.11662113.0067277c-.42082504.0488782-.76196299.3590206-.85696816.7639815l-.01968298.1126697-.00672773.1166211.00672773.1166211c.04887817.4208251.35902055.761963.76398144.8569682l.1126697.019683.11662113.0067277h3l.1166211-.0067277c.4973387-.0577651.8833789-.4804365.8833789-.9932723 0-.4733869-.3289337-.8699473-.7707092-.9735893l-.1126697-.019683-.1166211-.0067277h-.5v-4l-.00672773-.11662113c-.04887817-.42082504-.35902055-.76196299-.76398144-.85696816l-.1126697-.01968298zm0-3.25c-.69035594 0-1.25.55964406-1.25 1.25s.55964406 1.25 1.25 1.25 1.25-.55964406 1.25-1.25-.55964406-1.25-1.25-1.25z" fill-rule="evenodd"/></symbol><symbol id="icon-institution" viewBox="0 0 18 18"><path d="m7 16.9998189v-2.0003623h4v2.0003623h2v-3.0005434h-8v3.0005434zm-3-10.00181122h-1.52632364c-.27614237 0-.5-.22389817-.5-.50009056 0-.13995446.05863589-.27350497.16166338-.36820841l1.23156713-1.13206327h-2.36690687v12.00217346h3v-2.0003623h-3v-1.0001811h3v-1.0001811h1v-4.00072448h-1zm10 0v2.00036224h-1v4.00072448h1v1.0001811h3v1.0001811h-3v2.0003623h3v-12.00217346h-2.3695309l1.2315671 1.13206327c.2033191.186892.2166633.50325042.0298051.70660631-.0946863.10304615-.2282126.16169266-.3681417.16169266zm3-3.00054336c.5522847 0 1 .44779634 1 1.00018112v13.00235456h-18v-13.00235456c0-.55238478.44771525-1.00018112 1-1.00018112h3.45499992l4.20535144-3.86558216c.19129876-.17584288.48537447-.17584288.67667324 0l4.2053514 3.86558216zm-4 3.00054336h-8v1.00018112h8zm-2 6.00108672h1v-4.00072448h-1zm-1 0v-4.00072448h-2v4.00072448zm-3 0v-4.00072448h-1v4.00072448zm8-4.00072448c.5522847 0 1 .44779634 1 1.00018112v2.00036226h-2v-2.00036226c0-.55238478.4477153-1.00018112 1-1.00018112zm-12 0c.55228475 0 1 .44779634 1 1.00018112v2.00036226h-2v-2.00036226c0-.55238478.44771525-1.00018112 1-1.00018112zm5.99868798-7.81907007-5.24205601 4.81852671h10.48411203zm.00131202 3.81834559c-.55228475 0-1-.44779634-1-1.00018112s.44771525-1.00018112 1-1.00018112 1 .44779634 1 1.00018112-.44771525 1.00018112-1 1.00018112zm-1 11.00199236v1.0001811h2v-1.0001811z" fill-rule="evenodd"/></symbol><symbol id="icon-location" viewBox="0 0 18 18"><path d="m9.39521328 16.2688008c.79596342-.7770119 1.59208152-1.6299956 2.33285652-2.5295081 1.4020032-1.7024324 2.4323601-3.3624519 2.9354918-4.871847.2228715-.66861448.3364384-1.29323246.3364384-1.8674457 0-3.3137085-2.6862915-6-6-6-3.36356866 0-6 2.60156856-6 6 0 .57421324.11356691 1.19883122.3364384 1.8674457.50313169 1.5093951 1.53348863 3.1694146 2.93549184 4.871847.74077492.8995125 1.53689309 1.7524962 2.33285648 2.5295081.13694479.1336842.26895677.2602648.39521328.3793207.12625651-.1190559.25826849-.2456365.39521328-.3793207zm-.39521328 1.7311992s-7-6-7-11c0-4 3.13400675-7 7-7 3.8659932 0 7 3.13400675 7 7 0 5-7 11-7 11zm0-8c-1.65685425 0-3-1.34314575-3-3s1.34314575-3 3-3c1.6568542 0 3 1.34314575 3 3s-1.3431458 3-3 3zm0-1c1.1045695 0 2-.8954305 2-2s-.8954305-2-2-2-2 .8954305-2 2 .8954305 2 2 2z" fill-rule="evenodd"/></symbol><symbol id="icon-minus" viewBox="0 0 16 16"><path d="m2.00087166 7h11.99825664c.5527662 0 1.0008717.44386482 1.0008717 1 0 .55228475-.4446309 1-1.0008717 1h-11.99825664c-.55276616 0-1.00087166-.44386482-1.00087166-1 0-.55228475.44463086-1 1.00087166-1z" fill-rule="evenodd"/></symbol><symbol id="icon-newsletter" viewBox="0 0 18 18"><path d="m9 11.8482489 2-1.1428571v-1.7053918h-4v1.7053918zm-3-1.7142857v-2.1339632h6v2.1339632l3-1.71428574v-6.41967746h-12v6.41967746zm10-5.3839632 1.5299989.95624934c.2923814.18273835.4700011.50320827.4700011.8479983v8.44575236c0 1.1045695-.8954305 2-2 2h-14c-1.1045695 0-2-.8954305-2-2v-8.44575236c0-.34479003.1776197-.66525995.47000106-.8479983l1.52999894-.95624934v-2.75c0-.55228475.44771525-1 1-1h12c.5522847 0 1 .44771525 1 1zm0 1.17924764v3.07075236l-7 4-7-4v-3.07075236l-1 .625v8.44575236c0 .5522847.44771525 1 1 1h14c.5522847 0 1-.4477153 1-1v-8.44575236zm-10-1.92924764h6v1h-6zm-1 2h8v1h-8z" fill-rule="evenodd"/></symbol><symbol id="icon-orcid" viewBox="0 0 18 18"><path d="m9 1c4.418278 0 8 3.581722 8 8s-3.581722 8-8 8-8-3.581722-8-8 3.581722-8 8-8zm-2.90107518 5.2732337h-1.41865256v7.1712107h1.41865256zm4.55867178.02508949h-2.99247027v7.14612121h2.91062487c.7673039 0 1.4476365-.1483432 2.0410182-.445034s1.0511995-.7152915 1.3734671-1.2558144c.3222677-.540523.4833991-1.1603247.4833991-1.85942385 0-.68545815-.1602789-1.30270225-.4808414-1.85175082-.3205625-.54904856-.7707074-.97532211-1.3504481-1.27883343-.5797408-.30351132-1.2413173-.45526471-1.9847495-.45526471zm-.1892674 1.07933542c.7877654 0 1.4143875.22336734 1.8798852.67010873.4654977.44674138.698243 1.05546001.698243 1.82617415 0 .74343221-.2310402 1.34447791-.6931277 1.80315511-.4620874.4586773-1.0750688.6880124-1.8389625.6880124h-1.46810075v-4.98745039zm-5.08652545-3.71099194c-.21825533 0-.410525.08444276-.57681478.25333081-.16628977.16888806-.24943341.36245684-.24943341.58071218 0 .22345188.08314364.41961891.24943341.58850696.16628978.16888806.35855945.25333082.57681478.25333082.233845 0 .43390938-.08314364.60019916-.24943342.16628978-.16628977.24943342-.36375592.24943342-.59240436 0-.233845-.08314364-.43131115-.24943342-.59240437s-.36635416-.24163862-.60019916-.24163862z" fill-rule="evenodd"/></symbol><symbol id="icon-plus" viewBox="0 0 16 16"><path d="m2.00087166 7h4.99912834v-4.99912834c0-.55276616.44386482-1.00087166 1-1.00087166.55228475 0 1 .44463086 1 1.00087166v4.99912834h4.9991283c.5527662 0 1.0008717.44386482 1.0008717 1 0 .55228475-.4446309 1-1.0008717 1h-4.9991283v4.9991283c0 .5527662-.44386482 1.0008717-1 1.0008717-.55228475 0-1-.4446309-1-1.0008717v-4.9991283h-4.99912834c-.55276616 0-1.00087166-.44386482-1.00087166-1 0-.55228475.44463086-1 1.00087166-1z" fill-rule="evenodd"/></symbol><symbol id="icon-print" viewBox="0 0 18 18"><path d="m16.0049107 5h-14.00982141c-.54941618 0-.99508929.4467783-.99508929.99961498v6.00077002c0 .5570958.44271433.999615.99508929.999615h1.00491071v-3h12v3h1.0049107c.5494162 0 .9950893-.4467783.9950893-.999615v-6.00077002c0-.55709576-.4427143-.99961498-.9950893-.99961498zm-2.0049107-1v-2.00208688c0-.54777062-.4519464-.99791312-1.0085302-.99791312h-7.9829396c-.55661731 0-1.0085302.44910695-1.0085302.99791312v2.00208688zm1 10v2.0018986c0 1.103521-.9019504 1.9981014-2.0085302 1.9981014h-7.9829396c-1.1092806 0-2.0085302-.8867064-2.0085302-1.9981014v-2.0018986h-1.00491071c-1.10185739 0-1.99508929-.8874333-1.99508929-1.999615v-6.00077002c0-1.10435686.8926228-1.99961498 1.99508929-1.99961498h1.00491071v-2.00208688c0-1.10341695.90195036-1.99791312 2.0085302-1.99791312h7.9829396c1.1092806 0 2.0085302.89826062 2.0085302 1.99791312v2.00208688h1.0049107c1.1018574 0 1.9950893.88743329 1.9950893 1.99961498v6.00077002c0 1.1043569-.8926228 1.999615-1.9950893 1.999615zm-1-3h-10v5.0018986c0 .5546075.44702548.9981014 1.0085302.9981014h7.9829396c.5565964 0 1.0085302-.4491701 1.0085302-.9981014zm-9 1h8v1h-8zm0 2h5v1h-5zm9-5c-.5522847 0-1-.44771525-1-1s.4477153-1 1-1 1 .44771525 1 1-.4477153 1-1 1z" fill-rule="evenodd"/></symbol><symbol id="icon-search" viewBox="0 0 22 22"><path d="M21.697 20.261a1.028 1.028 0 01.01 1.448 1.034 1.034 0 01-1.448-.01l-4.267-4.267A9.812 9.811 0 010 9.812a9.812 9.811 0 1117.43 6.182zM9.812 18.222A8.41 8.41 0 109.81 1.403a8.41 8.41 0 000 16.82z" fill-rule="evenodd"/></symbol><symbol id="icon-social-facebook" viewBox="0 0 24 24"><path d="m6.00368507 20c-1.10660471 0-2.00368507-.8945138-2.00368507-1.9940603v-12.01187942c0-1.10128908.89451376-1.99406028 1.99406028-1.99406028h12.01187942c1.1012891 0 1.9940603.89451376 1.9940603 1.99406028v12.01187942c0 1.1012891-.88679 1.9940603-2.0032184 1.9940603h-2.9570132v-6.1960818h2.0797387l.3114113-2.414723h-2.39115v-1.54164807c0-.69911803.1941355-1.1755439 1.1966615-1.1755439l1.2786739-.00055875v-2.15974763l-.2339477-.02492088c-.3441234-.03134957-.9500153-.07025255-1.6293054-.07025255-1.8435726 0-3.1057323 1.12531866-3.1057323 3.19187953v1.78079225h-2.0850778v2.414723h2.0850778v6.1960818z" fill-rule="evenodd"/></symbol><symbol id="icon-social-twitter" viewBox="0 0 24 24"><path d="m18.8767135 6.87445248c.7638174-.46908424 1.351611-1.21167363 1.6250764-2.09636345-.7135248.43394112-1.50406.74870123-2.3464594.91677702-.6695189-.73342162-1.6297913-1.19486605-2.6922204-1.19486605-2.0399895 0-3.6933555 1.69603749-3.6933555 3.78628909 0 .29642457.0314329.58673729.0942985.8617704-3.06469922-.15890802-5.78835241-1.66547825-7.60988389-3.9574208-.3174714.56076194-.49978171 1.21167363-.49978171 1.90536824 0 1.31404706.65223085 2.47224203 1.64236444 3.15218497-.60350999-.0198635-1.17401554-.1925232-1.67222562-.47366811v.04583885c0 1.83355406 1.27302891 3.36609966 2.96411421 3.71294696-.31118484.0886217-.63651445.1329326-.97441718.1329326-.2357461 0-.47149219-.0229194-.69466516-.0672303.47149219 1.5065703 1.83253297 2.6036468 3.44975116 2.632678-1.2651707 1.0160946-2.85724264 1.6196394-4.5891906 1.6196394-.29861172 0-.59093688-.0152796-.88011875-.0504227 1.63450624 1.0726291 3.57548241 1.6990934 5.66104951 1.6990934 6.79263079 0 10.50641749-5.7711113 10.50641749-10.7751859l-.0094298-.48894775c.7229547-.53478659 1.3516109-1.20250585 1.8419628-1.96190282-.6632323.30100846-1.3751855.50422736-2.1217148.59590507z" fill-rule="evenodd"/></symbol><symbol id="icon-social-youtube" viewBox="0 0 24 24"><path d="m10.1415 14.3973208-.0005625-5.19318431 4.863375 2.60554491zm9.963-7.92753362c-.6845625-.73643756-1.4518125-.73990314-1.803375-.7826454-2.518875-.18714178-6.2971875-.18714178-6.2971875-.18714178-.007875 0-3.7861875 0-6.3050625.18714178-.352125.04274226-1.1188125.04620784-1.8039375.7826454-.5394375.56084773-.7149375 1.8344515-.7149375 1.8344515s-.18 1.49597903-.18 2.99138042v1.4024082c0 1.495979.18 2.9913804.18 2.9913804s.1755 1.2736038.7149375 1.8344515c.685125.7364376 1.5845625.7133337 1.9850625.7901542 1.44.1420891 6.12.1859866 6.12.1859866s3.78225-.005776 6.301125-.1929178c.3515625-.0433198 1.1188125-.0467854 1.803375-.783223.5394375-.5608477.7155-1.8344515.7155-1.8344515s.18-1.4954014.18-2.9913804v-1.4024082c0-1.49540139-.18-2.99138042-.18-2.99138042s-.1760625-1.27360377-.7155-1.8344515z" fill-rule="evenodd"/></symbol><symbol id="icon-subject-medicine" viewBox="0 0 18 18"><path d="m12.5 8h-6.5c-1.65685425 0-3 1.34314575-3 3v1c0 1.6568542 1.34314575 3 3 3h1v-2h-.5c-.82842712 0-1.5-.6715729-1.5-1.5s.67157288-1.5 1.5-1.5h1.5 2 1 2c1.6568542 0 3-1.34314575 3-3v-1c0-1.65685425-1.3431458-3-3-3h-2v2h1.5c.8284271 0 1.5.67157288 1.5 1.5s-.6715729 1.5-1.5 1.5zm-5.5-1v-1h-3.5c-1.38071187 0-2.5-1.11928813-2.5-2.5s1.11928813-2.5 2.5-2.5h1.02786405c.46573528 0 .92507448.10843528 1.34164078.31671843l1.13382424.56691212c.06026365-1.05041141.93116291-1.88363055 1.99667093-1.88363055 1.1045695 0 2 .8954305 2 2h2c2.209139 0 4 1.790861 4 4v1c0 2.209139-1.790861 4-4 4h-2v1h2c1.1045695 0 2 .8954305 2 2s-.8954305 2-2 2h-2c0 1.1045695-.8954305 2-2 2s-2-.8954305-2-2h-1c-2.209139 0-4-1.790861-4-4v-1c0-2.209139 1.790861-4 4-4zm0-2v-2.05652691c-.14564246-.03538148-.28733393-.08714006-.42229124-.15461871l-1.15541752-.57770876c-.27771087-.13885544-.583937-.21114562-.89442719-.21114562h-1.02786405c-.82842712 0-1.5.67157288-1.5 1.5s.67157288 1.5 1.5 1.5zm4 1v1h1.5c.2761424 0 .5-.22385763.5-.5s-.2238576-.5-.5-.5zm-1 1v-5c0-.55228475-.44771525-1-1-1s-1 .44771525-1 1v5zm-2 4v5c0 .5522847.44771525 1 1 1s1-.4477153 1-1v-5zm3 2v2h2c.5522847 0 1-.4477153 1-1s-.4477153-1-1-1zm-4-1v-1h-.5c-.27614237 0-.5.2238576-.5.5s.22385763.5.5.5zm-3.5-9h1c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-1c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5z" fill-rule="evenodd"/></symbol><symbol id="icon-success" viewBox="0 0 18 18"><path d="m9 0c4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9zm3.4860198 4.98163161-4.71802968 5.50657859-2.62834168-2.02300024c-.42862421-.36730544-1.06564993-.30775346-1.42283677.13301307-.35718685.44076653-.29927542 1.0958383.12934879 1.46314377l3.40735508 2.7323063c.42215801.3385221 1.03700951.2798252 1.38749189-.1324571l5.38450527-6.33394549c.3613513-.43716226.3096573-1.09278382-.115462-1.46437175-.4251192-.37158792-1.0626796-.31842941-1.4240309.11873285z" fill-rule="evenodd"/></symbol><symbol id="icon-table" viewBox="0 0 18 18"><path d="m16.0049107 2c1.1018574 0 1.9950893.89706013 1.9950893 2.00585866v9.98828264c0 1.1078052-.8926228 2.0058587-1.9950893 2.0058587l-4.0059107-.001.001.001h-1l-.001-.001h-5l.001.001h-1l-.001-.001-3.00391071.001c-1.10185739 0-1.99508929-.8970601-1.99508929-2.0058587v-9.98828264c0-1.10780515.8926228-2.00585866 1.99508929-2.00585866zm-11.0059107 5h-3.999v6.9941413c0 .5572961.44630695 1.0058587.99508929 1.0058587h3.00391071zm6 0h-5v8h5zm5.0059107-4h-4.0059107v3h5.001v1h-5.001v7.999l4.0059107.001c.5487152 0 .9950893-.4488783.9950893-1.0058587v-9.98828264c0-.55729607-.446307-1.00585866-.9950893-1.00585866zm-12.5049107 9c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-1c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5zm12 0c.2761424 0 .5.2238576.5.5s-.2238576.5-.5.5h-2c-.2761424 0-.5-.2238576-.5-.5s.2238576-.5.5-.5zm-6 0c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-2c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5zm-6-2c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-1c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5zm12 0c.2761424 0 .5.2238576.5.5s-.2238576.5-.5.5h-2c-.2761424 0-.5-.2238576-.5-.5s.2238576-.5.5-.5zm-6 0c.27614237 0 .5.2238576.5.5s-.22385763.5-.5.5h-2c-.27614237 0-.5-.2238576-.5-.5s.22385763-.5.5-.5zm-6-2c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-1c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm12 0c.2761424 0 .5.22385763.5.5s-.2238576.5-.5.5h-2c-.2761424 0-.5-.22385763-.5-.5s.2238576-.5.5-.5zm-6 0c.27614237 0 .5.22385763.5.5s-.22385763.5-.5.5h-2c-.27614237 0-.5-.22385763-.5-.5s.22385763-.5.5-.5zm1.499-5h-5v3h5zm-6 0h-3.00391071c-.54871518 0-.99508929.44887827-.99508929 1.00585866v1.99414134h3.999z" fill-rule="evenodd"/></symbol><symbol id="icon-tick-circle" viewBox="0 0 24 24"><path d="m12 2c5.5228475 0 10 4.4771525 10 10s-4.4771525 10-10 10-10-4.4771525-10-10 4.4771525-10 10-10zm0 1c-4.97056275 0-9 4.02943725-9 9 0 4.9705627 4.02943725 9 9 9 4.9705627 0 9-4.0294373 9-9 0-4.97056275-4.0294373-9-9-9zm4.2199868 5.36606669c.3613514-.43716226.9989118-.49032077 1.424031-.11873285s.4768133 1.02720949.115462 1.46437175l-6.093335 6.94397871c-.3622945.4128716-.9897871.4562317-1.4054264.0971157l-3.89719065-3.3672071c-.42862421-.3673054-.48653564-1.0223772-.1293488-1.4631437s.99421256-.5003185 1.42283677-.1330131l3.11097438 2.6987741z" fill-rule="evenodd"/></symbol><symbol id="icon-tick" viewBox="0 0 16 16"><path d="m6.76799012 9.21106946-3.1109744-2.58349728c-.42862421-.35161617-1.06564993-.29460792-1.42283677.12733148s-.29927541 1.04903009.1293488 1.40064626l3.91576307 3.23873978c.41034319.3393961 1.01467563.2976897 1.37450571-.0948578l6.10568327-6.660841c.3613513-.41848908.3096572-1.04610608-.115462-1.4018218-.4251192-.35571573-1.0626796-.30482786-1.424031.11366122z" fill-rule="evenodd"/></symbol><symbol id="icon-update" viewBox="0 0 18 18"><path d="m1 13v1c0 .5522847.44771525 1 1 1h14c.5522847 0 1-.4477153 1-1v-1h-1v-10h-14v10zm16-1h1v2c0 1.1045695-.8954305 2-2 2h-14c-1.1045695 0-2-.8954305-2-2v-2h1v-9c0-.55228475.44771525-1 1-1h14c.5522847 0 1 .44771525 1 1zm-1 0v1h-4.5857864l-1 1h-2.82842716l-1-1h-4.58578644v-1h5l1 1h2l1-1zm-13-8h12v7h-12zm1 1v5h10v-5zm1 1h4v1h-4zm0 2h4v1h-4z" fill-rule="evenodd"/></symbol><symbol id="icon-upload" viewBox="0 0 18 18"><path d="m10.0046024 0c.5497429 0 1.3179837.32258606 1.707238.71184039l4.5763192 4.57631922c.3931386.39313859.7118404 1.16760135.7118404 1.71431368v8.98899651c0 1.1092806-.8945138 2.0085302-1.9940603 2.0085302h-12.01187942c-1.10128908 0-1.99406028-.8926228-1.99406028-1.9950893v-14.00982141c0-1.10185739.88743329-1.99508929 1.99961498-1.99508929zm0 1h-7.00498742c-.55709576 0-.99961498.44271433-.99961498.99508929v14.00982141c0 .5500396.44491393.9950893.99406028.9950893h12.01187942c.5463747 0 .9940603-.4506622.9940603-1.0085302v-8.98899651c0-.28393444-.2150684-.80332809-.4189472-1.0072069l-4.5763192-4.57631922c-.2038461-.20384606-.718603-.41894717-1.0001312-.41894717zm-1.85576936 4.14572769c.19483374-.19483375.51177826-.19377714.70556874.00001334l2.59099082 2.59099079c.1948411.19484112.1904373.51514474.0027906.70279143-.1932998.19329987-.5046517.19237083-.7001856-.00692852l-1.74638687-1.7800176v6.14827687c0 .2717771-.23193359.492096-.5.492096-.27614237 0-.5-.216372-.5-.492096v-6.14827641l-1.74627892 1.77990922c-.1933927.1971171-.51252214.19455839-.70016883.0069117-.19329987-.19329988-.19100584-.50899493.00277731-.70277808z" fill-rule="evenodd"/></symbol><symbol id="icon-video" viewBox="0 0 18 18"><path d="m16.0049107 2c1.1018574 0 1.9950893.89706013 1.9950893 2.00585866v9.98828264c0 1.1078052-.8926228 2.0058587-1.9950893 2.0058587h-14.00982141c-1.10185739 0-1.99508929-.8970601-1.99508929-2.0058587v-9.98828264c0-1.10780515.8926228-2.00585866 1.99508929-2.00585866zm0 1h-14.00982141c-.54871518 0-.99508929.44887827-.99508929 1.00585866v9.98828264c0 .5572961.44630695 1.0058587.99508929 1.0058587h14.00982141c.5487152 0 .9950893-.4488783.9950893-1.0058587v-9.98828264c0-.55729607-.446307-1.00585866-.9950893-1.00585866zm-8.30912922 2.24944486 4.60460462 2.73982242c.9365543.55726659.9290753 1.46522435 0 2.01804082l-4.60460462 2.7398224c-.93655425.5572666-1.69578148.1645632-1.69578148-.8937585v-5.71016863c0-1.05087579.76670616-1.446575 1.69578148-.89375851zm-.67492769.96085624v5.5750128c0 .2995102-.10753745.2442517.16578928.0847713l4.58452283-2.67497259c.3050619-.17799716.3051624-.21655446 0-.39461026l-4.58452283-2.67497264c-.26630747-.15538481-.16578928-.20699944-.16578928.08477139z" fill-rule="evenodd"/></symbol><symbol id="icon-warning" viewBox="0 0 18 18"><path d="m9 11.75c.69035594 0 1.25.5596441 1.25 1.25s-.55964406 1.25-1.25 1.25-1.25-.5596441-1.25-1.25.55964406-1.25 1.25-1.25zm.41320045-7.75c.55228475 0 1.00000005.44771525 1.00000005 1l-.0034543.08304548-.3333333 4c-.043191.51829212-.47645714.91695452-.99654578.91695452h-.15973424c-.52008864 0-.95335475-.3986624-.99654576-.91695452l-.33333333-4c-.04586475-.55037702.36312325-1.03372649.91350028-1.07959124l.04148683-.00259031zm-.41320045 14c-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9 4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9z" fill-rule="evenodd"/></symbol><symbol id="icon-checklist-banner" viewBox="0 0 56.69 56.69"><path style="fill:none" d="M0 0h56.69v56.69H0z"/><clipPath id="b"><use xlink:href="#a" style="overflow:visible"/></clipPath><path d="M21.14 34.46c0-6.77 5.48-12.26 12.24-12.26s12.24 5.49 12.24 12.26-5.48 12.26-12.24 12.26c-6.76-.01-12.24-5.49-12.24-12.26zm19.33 10.66 10.23 9.22s1.21 1.09 2.3-.12l2.09-2.32s1.09-1.21-.12-2.3l-10.23-9.22m-19.29-5.92c0-4.38 3.55-7.94 7.93-7.94s7.93 3.55 7.93 7.94c0 4.38-3.55 7.94-7.93 7.94-4.38-.01-7.93-3.56-7.93-7.94zm17.58 12.99 4.14-4.81" style="clip-path:url(#b);fill:none;stroke:#01324b;stroke-width:2;stroke-linecap:round"/><path d="M8.26 9.75H28.6M8.26 15.98H28.6m-20.34 6.2h12.5m14.42-5.2V4.86s0-2.93-2.93-2.93H4.13s-2.93 0-2.93 2.93v37.57s0 2.93 2.93 2.93h15.01M8.26 9.75H28.6M8.26 15.98H28.6m-20.34 6.2h12.5" style="clip-path:url(#b);fill:none;stroke:#01324b;stroke-width:2;stroke-linecap:round;stroke-linejoin:round"/></symbol><symbol id="icon-chevron-down" viewBox="0 0 16 16"><path d="m5.58578644 3-3.29289322-3.29289322c-.39052429-.39052429-.39052429-1.02368927 0-1.41421356s1.02368927-.39052429 1.41421356 0l4 4c.39052429.39052429.39052429 1.02368927 0 1.41421356l-4 4c-.39052429.39052429-1.02368927.39052429-1.41421356 0s-.39052429-1.02368927 0-1.41421356z" fill-rule="evenodd" transform="matrix(0 1 -1 0 11 1)"/></symbol><symbol id="icon-eds-i-arrow-right-medium" viewBox="0 0 24 24"><path d="m12.728 3.293 7.98 7.99a.996.996 0 0 1 .281.561l.011.157c0 .32-.15.605-.384.788l-7.908 7.918a1 1 0 0 1-1.416-1.414L17.576 13H4a1 1 0 0 1 0-2h13.598l-6.285-6.293a1 1 0 0 1-.082-1.32l.083-.095a1 1 0 0 1 1.414.001Z"/></symbol><symbol id="icon-eds-i-chevron-down-medium" viewBox="0 0 16 16"><path d="m2.00087166 7h4.99912834v-4.99912834c0-.55276616.44386482-1.00087166 1-1.00087166.55228475 0 1 .44463086 1 1.00087166v4.99912834h4.9991283c.5527662 0 1.0008717.44386482 1.0008717 1 0 .55228475-.4446309 1-1.0008717 1h-4.9991283v4.9991283c0 .5527662-.44386482 1.0008717-1 1.0008717-.55228475 0-1-.4446309-1-1.0008717v-4.9991283h-4.99912834c-.55276616 0-1.00087166-.44386482-1.00087166-1 0-.55228475.44463086-1 1.00087166-1z" fill-rule="evenodd"/></symbol><symbol id="icon-eds-i-chevron-down-small" viewBox="0 0 16 16"><path d="M13.692 5.278a1 1 0 0 1 .03 1.414L9.103 11.51a1.491 1.491 0 0 1-2.188.019L2.278 6.692a1 1 0 0 1 1.444-1.384L8 9.771l4.278-4.463a1 1 0 0 1 1.318-.111l.096.081Z"/></symbol><symbol id="icon-eds-i-chevron-right-medium" viewBox="0 0 10 10"><path d="m5.96738168 4.70639573 2.39518594-2.41447274c.37913917-.38219212.98637524-.38972225 1.35419292-.01894278.37750606.38054586.37784436.99719163-.00013556 1.37821513l-4.03074001 4.06319683c-.37758093.38062133-.98937525.38100976-1.367372-.00003075l-4.03091981-4.06337806c-.37759778-.38063832-.38381821-.99150444-.01600053-1.3622839.37750607-.38054587.98772445-.38240057 1.37006824.00302197l2.39538588 2.4146743.96295325.98624457z" fill-rule="evenodd" transform="matrix(0 -1 1 0 0 10)"/></symbol><symbol id="icon-eds-i-chevron-right-small" viewBox="0 0 10 10"><path d="m5.96738168 4.70639573 2.39518594-2.41447274c.37913917-.38219212.98637524-.38972225 1.35419292-.01894278.37750606.38054586.37784436.99719163-.00013556 1.37821513l-4.03074001 4.06319683c-.37758093.38062133-.98937525.38100976-1.367372-.00003075l-4.03091981-4.06337806c-.37759778-.38063832-.38381821-.99150444-.01600053-1.3622839.37750607-.38054587.98772445-.38240057 1.37006824.00302197l2.39538588 2.4146743.96295325.98624457z" fill-rule="evenodd" transform="matrix(0 -1 1 0 0 10)"/></symbol><symbol id="icon-eds-i-chevron-up-medium" viewBox="0 0 16 16"><path d="m2.00087166 7h11.99825664c.5527662 0 1.0008717.44386482 1.0008717 1 0 .55228475-.4446309 1-1.0008717 1h-11.99825664c-.55276616 0-1.00087166-.44386482-1.00087166-1 0-.55228475.44463086-1 1.00087166-1z" fill-rule="evenodd"/></symbol><symbol id="icon-eds-i-close-medium" viewBox="0 0 16 16"><path d="m2.29679575 12.2772478c-.39658757.3965876-.39438847 1.0328109-.00062148 1.4265779.39651227.3965123 1.03246768.3934888 1.42657791-.0006214l4.27724782-4.27724787 4.2772478 4.27724787c.3965876.3965875 1.0328109.3943884 1.4265779.0006214.3965123-.3965122.3934888-1.0324677-.0006214-1.4265779l-4.27724787-4.2772478 4.27724787-4.27724782c.3965875-.39658757.3943884-1.03281091.0006214-1.42657791-.3965122-.39651226-1.0324677-.39348875-1.4265779.00062148l-4.2772478 4.27724782-4.27724782-4.27724782c-.39658757-.39658757-1.03281091-.39438847-1.42657791-.00062148-.39651226.39651227-.39348875 1.03246768.00062148 1.42657791l4.27724782 4.27724782z" fill-rule="evenodd"/></symbol><symbol id="icon-eds-i-download-medium" viewBox="0 0 16 16"><path d="m12.9975267 12.999368c.5467123 0 1.0024733.4478567 1.0024733 1.000316 0 .5563109-.4488226 1.000316-1.0024733 1.000316h-9.99505341c-.54671233 0-1.00247329-.4478567-1.00247329-1.000316 0-.5563109.44882258-1.000316 1.00247329-1.000316zm-4.9975267-11.999368c.55228475 0 1 .44497754 1 .99589209v6.80214418l2.4816273-2.48241149c.3928222-.39294628 1.0219732-.4006883 1.4030652-.01947579.3911302.39125371.3914806 1.02525073-.0001404 1.41699553l-4.17620792 4.17752758c-.39120769.3913313-1.02508144.3917306-1.41671995-.0000316l-4.17639421-4.17771394c-.39122513-.39134876-.39767006-1.01940351-.01657797-1.40061601.39113012-.39125372 1.02337105-.3931606 1.41951349.00310701l2.48183446 2.48261871v-6.80214418c0-.55001601.44386482-.99589209 1-.99589209z" fill-rule="evenodd"/></symbol><symbol id="icon-eds-i-info-filled-medium" viewBox="0 0 18 18"><path d="m9 0c4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9zm0 7h-1.5l-.11662113.00672773c-.49733868.05776511-.88337887.48043643-.88337887.99327227 0 .47338693.32893365.86994729.77070917.97358929l.1126697.01968298.11662113.00672773h.5v3h-.5l-.11662113.0067277c-.42082504.0488782-.76196299.3590206-.85696816.7639815l-.01968298.1126697-.00672773.1166211.00672773.1166211c.04887817.4208251.35902055.761963.76398144.8569682l.1126697.019683.11662113.0067277h3l.1166211-.0067277c.4973387-.0577651.8833789-.4804365.8833789-.9932723 0-.4733869-.3289337-.8699473-.7707092-.9735893l-.1126697-.019683-.1166211-.0067277h-.5v-4l-.00672773-.11662113c-.04887817-.42082504-.35902055-.76196299-.76398144-.85696816l-.1126697-.01968298zm0-3.25c-.69035594 0-1.25.55964406-1.25 1.25s.55964406 1.25 1.25 1.25 1.25-.55964406 1.25-1.25-.55964406-1.25-1.25-1.25z" fill-rule="evenodd"/></symbol><symbol id="icon-eds-i-mail-medium" viewBox="0 0 24 24"><path d="m19.462 0c1.413 0 2.538 1.184 2.538 2.619v12.762c0 1.435-1.125 2.619-2.538 2.619h-16.924c-1.413 0-2.538-1.184-2.538-2.619v-12.762c0-1.435 1.125-2.619 2.538-2.619zm.538 5.158-7.378 6.258a2.549 2.549 0 0 1 -3.253-.008l-7.369-6.248v10.222c0 .353.253.619.538.619h16.924c.285 0 .538-.266.538-.619zm-.538-3.158h-16.924c-.264 0-.5.228-.534.542l8.65 7.334c.2.165.492.165.684.007l8.656-7.342-.001-.025c-.044-.3-.274-.516-.531-.516z"/></symbol><symbol id="icon-eds-i-menu-medium" viewBox="0 0 24 24"><path d="M21 4a1 1 0 0 1 0 2H3a1 1 0 1 1 0-2h18Zm-4 7a1 1 0 0 1 0 2H3a1 1 0 0 1 0-2h14Zm4 7a1 1 0 0 1 0 2H3a1 1 0 0 1 0-2h18Z"/></symbol><symbol id="icon-eds-i-search-medium" viewBox="0 0 24 24"><path d="M11 1c5.523 0 10 4.477 10 10 0 2.4-.846 4.604-2.256 6.328l3.963 3.965a1 1 0 0 1-1.414 1.414l-3.965-3.963A9.959 9.959 0 0 1 11 21C5.477 21 1 16.523 1 11S5.477 1 11 1Zm0 2a8 8 0 1 0 0 16 8 8 0 0 0 0-16Z"/></symbol><symbol id="icon-eds-i-user-single-medium" viewBox="0 0 24 24"><path d="M12 1a5 5 0 1 1 0 10 5 5 0 0 1 0-10Zm0 2a3 3 0 1 0 0 6 3 3 0 0 0 0-6Zm-.406 9.008a8.965 8.965 0 0 1 6.596 2.494A9.161 9.161 0 0 1 21 21.025V22a1 1 0 0 1-1 1H4a1 1 0 0 1-1-1v-.985c.05-4.825 3.815-8.777 8.594-9.007Zm.39 1.992-.299.006c-3.63.175-6.518 3.127-6.678 6.775L5 21h13.998l-.009-.268a7.157 7.157 0 0 0-1.97-4.573l-.214-.213A6.967 6.967 0 0 0 11.984 14Z"/></symbol><symbol id="icon-eds-i-warning-filled-medium" viewBox="0 0 18 18"><path d="m9 11.75c.69035594 0 1.25.5596441 1.25 1.25s-.55964406 1.25-1.25 1.25-1.25-.5596441-1.25-1.25.55964406-1.25 1.25-1.25zm.41320045-7.75c.55228475 0 1.00000005.44771525 1.00000005 1l-.0034543.08304548-.3333333 4c-.043191.51829212-.47645714.91695452-.99654578.91695452h-.15973424c-.52008864 0-.95335475-.3986624-.99654576-.91695452l-.33333333-4c-.04586475-.55037702.36312325-1.03372649.91350028-1.07959124l.04148683-.00259031zm-.41320045 14c-4.97056275 0-9-4.0294373-9-9 0-4.97056275 4.02943725-9 9-9 4.9705627 0 9 4.02943725 9 9 0 4.9705627-4.0294373 9-9 9z" fill-rule="evenodd"/></symbol><symbol id="icon-expand-image" viewBox="0 0 18 18"><path d="m7.49754099 11.9178212c.38955542-.3895554.38761957-1.0207846-.00290473-1.4113089-.39324695-.3932469-1.02238878-.3918247-1.41130883-.0029047l-4.10273549 4.1027355.00055454-3.5103985c.00008852-.5603185-.44832171-1.006032-1.00155062-1.0059446-.53903074.0000852-.97857527.4487442-.97866268 1.0021075l-.00093318 5.9072465c-.00008751.553948.44841131 1.001882 1.00174994 1.0017946l5.906983-.0009331c.5539233-.0000875 1.00197907-.4486389 1.00206646-1.0018679.00008515-.5390307-.45026621-.9784332-1.00588841-.9783454l-3.51010549.0005545zm3.00571741-5.83449376c-.3895554.38955541-.3876196 1.02078454.0029047 1.41130883.393247.39324696 1.0223888.39182478 1.4113089.00290473l4.1027355-4.10273549-.0005546 3.5103985c-.0000885.56031852.4483217 1.006032 1.0015506 1.00594461.5390308-.00008516.9785753-.44874418.9786627-1.00210749l.0009332-5.9072465c.0000875-.553948-.4484113-1.00188204-1.0017499-1.00179463l-5.906983.00093313c-.5539233.00008751-1.0019791.44863892-1.0020665 1.00186784-.0000852.53903074.4502662.97843325 1.0058884.97834547l3.5101055-.00055449z" fill-rule="evenodd"/></symbol><symbol id="icon-github" viewBox="0 0 100 100"><path fill-rule="evenodd" clip-rule="evenodd" d="M48.854 0C21.839 0 0 22 0 49.217c0 21.756 13.993 40.172 33.405 46.69 2.427.49 3.316-1.059 3.316-2.362 0-1.141-.08-5.052-.08-9.127-13.59 2.934-16.42-5.867-16.42-5.867-2.184-5.704-5.42-7.17-5.42-7.17-4.448-3.015.324-3.015.324-3.015 4.934.326 7.523 5.052 7.523 5.052 4.367 7.496 11.404 5.378 14.235 4.074.404-3.178 1.699-5.378 3.074-6.6-10.839-1.141-22.243-5.378-22.243-24.283 0-5.378 1.94-9.778 5.014-13.2-.485-1.222-2.184-6.275.486-13.038 0 0 4.125-1.304 13.426 5.052a46.97 46.97 0 0 1 12.214-1.63c4.125 0 8.33.571 12.213 1.63 9.302-6.356 13.427-5.052 13.427-5.052 2.67 6.763.97 11.816.485 13.038 3.155 3.422 5.015 7.822 5.015 13.2 0 18.905-11.404 23.06-22.324 24.283 1.78 1.548 3.316 4.481 3.316 9.126 0 6.6-.08 11.897-.08 13.526 0 1.304.89 2.853 3.316 2.364 19.412-6.52 33.405-24.935 33.405-46.691C97.707 22 75.788 0 48.854 0z"/></symbol><symbol id="icon-springer-arrow-left"><path d="M15 7a1 1 0 000-2H3.385l2.482-2.482a.994.994 0 00.02-1.403 1.001 1.001 0 00-1.417 0L.294 5.292a1.001 1.001 0 000 1.416l4.176 4.177a.991.991 0 001.4.016 1 1 0 00-.003-1.42L3.385 7H15z"/></symbol><symbol id="icon-springer-arrow-right"><path d="M1 7a1 1 0 010-2h11.615l-2.482-2.482a.994.994 0 01-.02-1.403 1.001 1.001 0 011.417 0l4.176 4.177a1.001 1.001 0 010 1.416l-4.176 4.177a.991.991 0 01-1.4.016 1 1 0 01.003-1.42L12.615 7H1z"/></symbol><symbol id="icon-submit-open" viewBox="0 0 16 17"><path d="M12 0c1.10457 0 2 .895431 2 2v5c0 .276142-.223858.5-.5.5S13 7.276142 13 7V2c0-.512836-.38604-.935507-.883379-.993272L12 1H6v3c0 1.10457-.89543 2-2 2H1v8c0 .512836.38604.935507.883379.993272L2 15h6.5c.276142 0 .5.223858.5.5s-.223858.5-.5.5H2c-1.104569 0-2-.89543-2-2V5.828427c0-.530433.210714-1.039141.585786-1.414213L4.414214.585786C4.789286.210714 5.297994 0 5.828427 0H12Zm3.41 11.14c.250899.250899.250274.659726 0 .91-.242954.242954-.649606.245216-.9-.01l-1.863671-1.900337.001043 5.869492c0 .356992-.289839.637138-.647372.637138-.347077 0-.647371-.285256-.647371-.637138l-.001043-5.869492L9.5 12.04c-.253166.258042-.649726.260274-.9.01-.242954-.242954-.252269-.657731 0-.91l2.942184-2.951303c.250908-.250909.66127-.252277.91353-.000017L15.41 11.14ZM5 1.413 1.413 5H4c.552285 0 1-.447715 1-1V1.413ZM11 3c.276142 0 .5.223858.5.5s-.223858.5-.5.5H7.5c-.276142 0-.5-.223858-.5-.5s.223858-.5.5-.5H11Zm0 2c.276142 0 .5.223858.5.5s-.223858.5-.5.5H7.5c-.276142 0-.5-.223858-.5-.5s.223858-.5.5-.5H11Z" fill-rule="nonzero"/></symbol></svg> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10