Figure 3From: Security and application of semi-quantum key distribution protocol for users with different quantum capabilitiesSchematic diagram of TP’s attack. Here, TP is adversarial and she may launch U on the qubits from Alice and Bob to obtain helpful informationBack to article page