{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:28:56Z","timestamp":1726000136694},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030030254"},{"type":"electronic","value":"9783030030261"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03026-1_10","type":"book-chapter","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T15:45:45Z","timestamp":1542642345000},"page":"141-155","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-party Quantum Key Agreement Against Collective Noise"],"prefix":"10.1007","author":[{"given":"Xiang-Qian","family":"Liang","sequence":"first","affiliation":[]},{"given":"Sha-Sha","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong-Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guang-Bao","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,20]]},"reference":[{"key":"10_CR1","unstructured":"Bennett, C.H., Brassard, G.: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, India, pp. 175\u2013179 (1984)"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X.F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"127902","DOI":"10.1103\/PhysRevLett.88.127902","volume":"88","author":"NJ Cerf","year":"2002","unstructured":"Cerf, N.J., Bourennane, M., Karlsson, A., Gisin, N.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88, 127902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"1250008","DOI":"10.1142\/S0219749911008386","volume":"10","author":"ZW Sun","year":"2012","unstructured":"Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with quantum identification. Int. J. Quantum Inf. 10, 1250008 (2012)","journal-title":"Int. J. Quantum Inf."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"1946","DOI":"10.1007\/s10773-011-1072-8","volume":"51","author":"ZW Sun","year":"2012","unstructured":"Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with two-photon four-qubit cluster state. Int. J. Theor. Phys. 51, 1946\u20131952 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1007\/s11128-013-0554-4","volume":"12","author":"KJ Zhang","year":"2013","unstructured":"Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf Process. 12, 2655\u20132669 (2013)","journal-title":"Quantum Inf Process."},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1007\/s10773-015-2715-y","volume":"55","author":"HJ Cao","year":"2016","unstructured":"Cao, H.J., Zhang, J.F., Liu, J., Li, Z.Y.: A new quantum proxy multi-signature scheme using maximally entangled seven-qubit states. Int. J. Theor. Phys. 55, 774\u2013780 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1007\/s11128-012-0509-1","volume":"12","author":"XF Zou","year":"2013","unstructured":"Zou, X.F., Qiu, D.W.: Attack and improvements of fair quantum blind signature schemes. Quantum Inf. Process. 12, 2071\u20132085 (2013)","journal-title":"Quantum Inf. Process."},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1007\/s10773-015-2745-5","volume":"55","author":"L Fan","year":"2016","unstructured":"Fan, L., Zhang, K.J., Qin, S.J., Guo, F.Z.: A novel quantum blind signature scheme with four-particle GHZ states. Int. J. Theor. Phys. 55, 1028\u20131035 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40, 1149 (2004)","journal-title":"Electron. Lett."},{"key":"10_CR15","unstructured":"Tsai, C., Hwang, T.: On quantum key agreement protocol. Technical report. C-S-I-E, NCKU, Taiwan (2009)"},{"key":"10_CR16","unstructured":"Hsueh, C.C., Chen, C.Y.: Quantum key agreement protocol with maximally entangled states. In: 14th Information Security Conference (ISC 2004), pp. 236\u2013242. National Taiwan University of Science and Technology, Taipei (2004)"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1016\/j.optcom.2009.11.007","volume":"283","author":"SK Chong","year":"2010","unstructured":"Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283, 1192\u20131195 (2010)","journal-title":"Opt. Commun."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s10773-011-0691-4","volume":"50","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Tsai, C.W., Hwang, T.: Improvement on quantum key agreement protocol with maximally entangled states. Int. J. Theor. Phys. 50, 1793\u20131802 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11128-012-0443-2","volume":"12","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Zhong, H.: Multi-party quantum key agreement with Bell states and Bell measurements. Quantum Inf. Process. 12, 921\u2013932 (2013)","journal-title":"Quantum Inf. Process."},{"key":"10_CR20","first-page":"3","volume":"15","author":"YF He","year":"2017","unstructured":"He, Y.F., Ma, W.P.: Two-party quantum key agreement with five-particle entangled states. Int. J. Quantum Inf. 15, 3 (2017)","journal-title":"Int. J. Quantum Inf."},{"key":"10_CR21","first-page":"3","volume":"31","author":"YF He","year":"2017","unstructured":"He, Y.F., Ma, W.P.: Two robust quantum key agreement protocols based on logical GHZ states. Mod. Phys. Lett. 31, 3 (2017)","journal-title":"Mod. Phys. Lett."},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"3411","DOI":"10.1007\/s11128-013-0608-7","volume":"12","author":"Z Sun","year":"2013","unstructured":"Sun, Z., Wang, B., Li, Q., Long, D.: Improvements on multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 3411 (2013)","journal-title":"Quantum Inf. Process."},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s11128-013-0680-z","volume":"13","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Quantum key agreement with EPR pairs and single particle measurements. Quantum Inf. Process. 13, 649\u2013663 (2014)","journal-title":"Quantum Inf. Process."},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1007\/s11128-014-0784-0","volume":"13","author":"S Chitra","year":"2014","unstructured":"Chitra, S., Nasir, A., Anirban, P.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391\u20132405 (2014)","journal-title":"Quantum Inf. Process."},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1007\/s11128-014-0816-9","volume":"13","author":"GB Xu","year":"2014","unstructured":"Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587\u20132594 (2014)","journal-title":"Quantum Inf. Process."},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s11128-012-0492-6","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797\u20131805 (2013)","journal-title":"Quantum Inf. Process."},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"3915","DOI":"10.1007\/s10773-013-1702-4","volume":"52","author":"XR Yin","year":"2013","unstructured":"Yin, X.R., Ma, W.P., Liu, W.Y.: Three-party quantum key agreement with two-photon entanglement. Int. J. Theor. Phys. 52, 3915\u20133921 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-015-1155-1","volume":"15","author":"ZW Sun","year":"2016","unstructured":"Sun, Z.W., Yu, J.P., Wang, P.: Efficient multi-party quantum key agreement by cluster states. Quantum Inf. Process. 15, 373\u2013384 (2016)","journal-title":"Quantum Inf. Process."},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"2493","DOI":"10.1103\/PhysRevA.52.R2493","volume":"52","author":"PW Shor","year":"1995","unstructured":"Shor, P.W.: Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 52, 2493\u20132496 (1995)","journal-title":"Phys. Rev. A"},{"key":"10_CR30","first-page":"331","volume":"343","author":"D Kalamidas","year":"2005","unstructured":"Kalamidas, D.: Single photo quantum error rejection and correction with linear optics. Phys. Rev. A 343, 331\u2013335 (2005)","journal-title":"Phys. Rev. A"},{"key":"10_CR31","doi-asserted-by":"publisher","first-page":"144101","DOI":"10.1063\/1.2794433","volume":"91","author":"XH Li","year":"2007","unstructured":"Li, X.H., Feng, F.G., Zhou, H.Y.: Faithful qubit transmission against collective noise without ancillary qubits. Appl. Phys. Lett. 91, 144101 (2007)","journal-title":"Appl. Phys. Lett."},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.physleta.2005.12.001","volume":"352","author":"DB Brito de","year":"2006","unstructured":"de Brito, D.B., Ramos, R.V.: Passive quantum error correction with linear optics. Phys. Lett. A 352, 206 (2006)","journal-title":"Phys. Lett. A"},{"key":"10_CR33","doi-asserted-by":"publisher","first-page":"087901","DOI":"10.1103\/PhysRevLett.91.087901","volume":"91","author":"ZD Walton","year":"2003","unstructured":"Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., Saleh, B.E.A., Teich, M.C.: Decoherence free subspaces in quantum key distribution. Phys. Rev. Lett. 91, 087901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"257901","DOI":"10.1103\/PhysRevLett.89.257901","volume":"89","author":"C Simon","year":"2002","unstructured":"Simon, C., Pan, J.M.: Polarization entanglement purification using spatial entanglement. Phys. Rev. Lett. 89, 257901 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1007\/s10773-014-2087-8","volume":"53","author":"W Huang","year":"2014","unstructured":"Huang, W., Su, Q., Wu, X., Li, Y.B., Sun, Y.: Quantum key agreement against collective decoherence. Int. J. Theor. Phys. 53, 2891\u20132901 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"10_CR36","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1016\/j.physleta.2012.12.024","volume":"377","author":"C Shukla","year":"2013","unstructured":"Shukla, C., Kothari, V., Banerjee, A., Pathak, A.: On the group-theoretic structure of a class of quantum dialogue protocols. Phys. Lett. A 377, 518\u2013527 (2013)","journal-title":"Phys. Lett. A"},{"key":"10_CR37","doi-asserted-by":"publisher","first-page":"022321","DOI":"10.1103\/PhysRevA.78.022321","volume":"78","author":"XH Li","year":"2008","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78, 022321 (2008)","journal-title":"Phys. Rev. A"},{"issue":"26","key":"10_CR38","doi-asserted-by":"publisher","first-page":"4287","DOI":"10.1103\/PhysRevLett.71.4287","volume":"71","author":"M Zukowski","year":"1993","unstructured":"Zukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: Event-ready-detectors: Bell experiment via entanglement swapping. Phys. Rev. Lett. 71(26), 4287\u20134290 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"18","key":"10_CR39","doi-asserted-by":"publisher","first-page":"3891","DOI":"10.1103\/PhysRevLett.80.3891","volume":"80","author":"JW Pan","year":"1998","unstructured":"Pan, J.W., Bouwmeester, D., Weinfurter, H., Zeilinger, A.: Experimental entanglement swapping: entangling photons that never interacted. Phys. Rev. Lett. 80(18), 3891\u20133894 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR40","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"10_CR41","doi-asserted-by":"publisher","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)","journal-title":"Phys. Rev. A"},{"key":"10_CR42","doi-asserted-by":"publisher","first-page":"5633","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5633\u20135638 (2000)","journal-title":"Phys. Rev. Lett."}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03026-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T15:48:45Z","timestamp":1542642525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03026-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030030254","9783030030261"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03026-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sci-cs.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2-3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}