Fig. 4: Conference key rate, with finite-key effects, as a function of the number of successful network usages (Ltot).

The performance for the NQKD protocol is shown by the solid line, while the 2QKD protocol is given by the dashed line. Both assume a fixed total security parameter, ϵtot = 10−8.