Answer:
Explained
Step-by-step explanation:
Alice need to know the secret key of carol to verify the carol's answer to Alice challenges.
Similarly it needs the secret key of Bob to verify bob's answer to Alice challenge (actually any of the three need others secret key for verify answer to challenge).
So, Bob could impersonate Carol to Alice as he should know the secret key of Carol to answer Carol's challenge. Hence it is no more secure than having all use the same secret key.
So, it is no more secure than having them all use the same secret key K.