The two parties may detect such an eavesdropper by the disturbance of the states. Subsequently the two parties share a random secure key from which they may encode their data using a one-time pad ...
来自MSN11 个月
How long before quantum computers can benefit society? That's Google's US$5 million questionThe most notable are the BB84 protocol, developed in 1984, and Shor's algorithm, developed in 1994, both of which use entanglement to outperform classical algorithms on particular tasks.
一些您可能无法访问的结果已被隐去。
显示无法访问的结果