Skip to main content

Table 2 Showing the probability of a bit-flip error occurring between Alice and Bob depending both on the bases chosen by each of the three parties, and whether or not Eve blindly modifies the authentication tag

From: A quantum key distribution protocol for rapid denial of service detection

Alice’s BasisEve’s BasisForwarding ChoiceBob’s BasisProb (error)
XX\(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\)X0
XX\(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\)Z0.5
XZ\(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\)X0.5
XZ\(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\)Z0.5
ZX\(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\)Z0.5
ZX\(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\)Z0.5
ZZ\(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\)Z0
ZZ\(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\)Z0
\