Figure 4: The probabilities of Alice acquiring a conclusive raw key in the honest protocol and in the first middle-state attack for different θb.
From: Loss-tolerant measurement-device-independent quantum private queries

The curves represent
, pc and
from up to down.