Figure 1From: Security and application of semi-quantum key distribution protocol for users with different quantum capabilitiesA schematic of Eve’s attack. Eve will launch \(U_{E}\) and \(U_{F}\) on the qubits from TP and Alice, respectively, to obtain some helpful informationBack to article page