From: A quantum key distribution protocol for rapid denial of service detection
Alice’s Basis | Eve’s Basis | Forwarding Choice | Bob’s Basis | Prob (error) |
---|---|---|---|---|
X | X | \(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\) | X | 0 |
X | X | \(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\) | Z | 0.5 |
X | Z | \(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\) | X | 0.5 |
X | Z | \(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\) | Z | 0.5 |
Z | X | \(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\) | Z | 0.5 |
Z | X | \(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\) | Z | 0.5 |
Z | Z | \(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\) | Z | 0 |
Z | Z | \(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\) | Z | 0 |