The two parties may detect such an eavesdropper by the disturbance of the states. Subsequently the two parties share a random secure key from which they may encode their data using a one-time pad ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果一些您可能无法访问的结果已被隐去。
显示无法访问的结果