Table 2 Clicks of three detectors when Alice performs an intercept attack.

From: Semi-Counterfactual Quantum Bit Commitment Protocol

 Intercept n0\({\boldsymbol{n}}{\boldsymbol{-}}{{\boldsymbol{n}}}_{{\bf{0}}}{\boldsymbol{,}}{{\boldsymbol{a}}}_{{\boldsymbol{j}}}^{{\boldsymbol{(}}{\boldsymbol{i}}{\boldsymbol{)}}}{\boldsymbol{=}}{{\boldsymbol{b}}}_{{\boldsymbol{j}}}^{{\boldsymbol{(}}{\boldsymbol{i}}{\boldsymbol{)}}}\)\({\boldsymbol{n}}{\boldsymbol{-}}{{\boldsymbol{n}}}_{{\bf{0}}}{\boldsymbol{,}}{{\boldsymbol{a}}}_{{\boldsymbol{j}}}^{{\boldsymbol{(}}{\boldsymbol{i}}{\boldsymbol{)}}}{\boldsymbol{\ne }}{{\boldsymbol{b}}}_{{\boldsymbol{j}}}^{{\boldsymbol{(}}{\boldsymbol{i}}{\boldsymbol{)}}}\)
\(N({\beta }_{0j}^{(i)}\mathrm{=1)}\)r2n0r2(n − n0)/2(n − n0)/2
\(N({\beta }_{1j}^{(i)}\mathrm{=1)}\)rtn0rt(n − n0)/20
\(N({\alpha }_{j}^{(i)}\mathrm{=1)}\)tn0t(n − n0)/20