Figure 1
From: Quantum secure metrology for network sensing-based applications

Implementation of the QSM protocol. Alice prepares the probe state and sends it to Bob through a quantum channel. After verification, Bob performs the sequential encoding process and returns it to Alice who performs the secure parameter estimation.