Research Article
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Table 4
An 8-bit sample for two-stage QKD protocol.
| Sequence of bits | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | |
| 1 | Ingress node bit | 1 | 0 | 1 | 0 | 1 | 1 | 0 | 0 | STAGE I | Ingress node polarization | 135° | H | 135° | H | 135° | 135° | H | H | 2 | Egress node detector basis | 45° | 45° | V | V | 45° | 45° | 45° | V | Egress node bit | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 1 | 3 | Egress node measurement | N | N | Y | N | N | N | Y | N | Shared secret key in the 1st stage | — | — | 1 | — | | — | 0 | — |
| 4 | Egress node source basis | R | R | — | D | R | R | — | D | | Egress node bit | 1 | 0 | — | 0 | 0 | 1 | — | 1 | | Egress node polarization | V | H | — | 45° | H | V | — | 135° | | 5 | Ingress node detector basis | R | D | — | D | R | R | — | D | | 6 | Ingress node measurement | V | 45° | — | 45° | H | V | — | 135° | | Ingress node bit | 1 | 0 | — | 0 | 0 | 1 | — | 1 | |
| 7 | Ingress node reports basis | R | D | — | D | R | R | — | D | STAGE II | 8 | Egress node response | Y | N | — | Y | Y | Y | — | Y | 9 | Shared secret key in the 1st stage | 1 | — | — | 0 | 0 | 1 | — | 1 | 10 | The final shared secret key | 1 | — | 1 | 0 | 0 | 1 | 0 | 1 |
|
|