Research Article
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Table 3
An 8-bit sample of BB84 protocol.
| Sequence of bits | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
| 1 | Ingress node bit | 1 | 0 | 1 | 0 | 1 | 1 | 0 | 0 | Ingress node source basis | D | R | R | R | D | R | D | D | Ingress node polarization | 135° | H | V | H | 135° | V | 45° | 45° | 2 | Egress node detector basis | D | R | D | R | R | R | R | D | 3 | Egress node measurement | 135° | H | 45° | H | H | V | V | 45° | Egress node bit | 1 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 4 | Egress node report basis | D | R | D | R | R | R | R | D | 5 | Ingress node response | Y | Y | N | Y | N | Y | N | Y | 6 | Shared secret key | 1 | 0 | — | 0 | — | 1 | — | 0 |
|
|