Skip to main content
. 2016 Jun 30;6:28767. doi: 10.1038/srep28767

Table 4. The example of intercept and resend attack(b).

  Group 3 Group 4
Number of classical bits 1 2 3 4 1 2 3 4
Alice’s random bit 0 0 1 0 0 0 1 0
Alice sending Bell states Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Eve random measuring basis Bell(13) Bell(24) Bell(13) Bell(24) Bell(13) Bell(24) Bell(13) Bell(24)
Eve selects right or wrong location wrong wrong
Bell states Eve measures and sends Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Bob random measuring basis Bell(12) Bell(12) Bell(34) Bell(34) Bell(12) Bell(12) Bel(34) Bel(34)
Bell states Bob measures Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Public discussion of location right right
Public discussion of states right/wrong right
Share secret key 0 0 1 0
Errors in key × × × ×