Skip to main content

Table 2 Showing the probability of a bit-flip error occurring between Alice and Bob depending both on the bases chosen by each of the three parties, and whether or not Eve blindly modifies the authentication tag

From: A quantum key distribution protocol for rapid denial of service detection

Alice’s Basis

Eve’s Basis

Forwarding Choice

Bob’s Basis

Prob (error)

X

X

\(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\)

X

0

X

X

\(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\)

Z

0.5

X

Z

\(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\)

X

0.5

X

Z

\(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\)

Z

0.5

Z

X

\(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\)

Z

0.5

Z

X

\(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\)

Z

0.5

Z

Z

\(\tau_{i}^{\text{E}}=\tau_{i}^{\text{A}}\)

Z

0

Z

Z

\(\tau_{i}^{\text{E}}\neq\tau_{i}^{\text{A}}\)

Z

0