Table 1 Example of the two-user QKD scheme.
From: Efficient multiuser quantum cryptography network based on entanglement
A result | 0 0 | 0 0 | 0 | 0 0 | 0 1 1 | 1 1 | 1 | 1 1 | 1 |
B basis | + + | + + | × | × × | × + + | + + | × | × × | × |
B bit value | 0 0 | 1 1 | 0 | 0 1 | 1 0 0 | 1 1 | 0 | 0 1 | 1 |
C basis | + × | + × | + | × + | × + × | + × | + | × + | × |
C bit value | 0 0/1 | 1 0/1 | 0/1 | 0 0/1 | 1 1 0/1 | 0 0/1 | 0/1 | 1 0/1 | 0 |
Compatible? | y n | y n | n | y n | y y n | y n | n | y n | y |
Sited key | 0 | 1 | 0 | 1 0 | 1 | 0 | 1 |