Skip to main content
Figure 1 | EPJ Quantum Technology

Figure 1

From: Decoy state semi-quantum key distribution

Figure 1

BKM-07 protocol model. (1) Alice generates random qubits in the Z or X bases. (2) For each qubit, Bob randomly chooses to measure Alice’s qubit in the Z basis (to SIFT it) or to reflect it back (CTRL). (3) Bob may also only prepare Z basis qubits. When Bob chooses the SIFT operation, Bob resends the qubit with the same result as his measurement. (4) Alice measures each qubit using the basis she sent it in. (5) Alice publishes qubits which are her Z-basis bits, and Bob publishes qubits which he choose to SIFT

Back to article page