Figure 2From: Security and application of semi-quantum key distribution protocol for users with different quantum capabilitiesA diagram of the key rate between quantum and classical usersBack to article page