Skip to main content
. 2017 Mar 27;7:449. doi: 10.1038/s41598-017-00531-y

Figure 5.

Figure 5

Schematics of hacking scheme. Eve consists of copies of Alice (Alice’) and Bob (Bob’), which share bit and basis settings and a blinding laser. C: optical coupler.