“…Then, some syndrome bits of these syndromes are used to initialize the punctured bits of the frames in L 2 , and the others are transmitted together with the syndromes of L 2 to Bob. Let T represent the set of punctured bits in L 2 that are initialized by the syndrome bits from L 1 (e.g., T = {x 3,1 , x 3,u , x 3,v , x 3,v+1 } in Figure 2), the efficiency of our protocol can be calculated according to Equation (6) as…”