The two parties may detect such an eavesdropper by the disturbance of the states. Subsequently the two parties share a random secure key from which they may encode their data using a one-time pad ...
当前正在显示可能无法访问的结果。
隐藏无法访问的结果当前正在显示可能无法访问的结果。
隐藏无法访问的结果