{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:12:52Z","timestamp":1758845572828},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2014,7,5]],"date-time":"2014-07-05T00:00:00Z","timestamp":1404518400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11128-014-0785-z","type":"journal-article","created":{"date-parts":[[2014,7,4]],"date-time":"2014-07-04T11:51:33Z","timestamp":1404474693000},"page":"2313-2324","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":75,"title":["Two-party quantum key agreement with four-qubit cluster states"],"prefix":"10.1007","volume":"13","author":[{"given":"Dong-Su","family":"Shen","sequence":"first","affiliation":[]},{"given":"Wen-Ping","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Li-li","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,5]]},"reference":[{"key":"785_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal, pp. 175\u2013179. Bangalore (1984)"},{"key":"785_CR2","doi-asserted-by":"crossref","unstructured":"Brandt, H.E.: Unambiguous state discrimination in quantum key distribution. Quantum Inf. Process. 4, 387\u2013398 (2005)","DOI":"10.1007\/s11128-005-0003-0"},{"key":"785_CR3","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.physleta.2006.02.027","volume":"355","author":"F Gao","year":"2006","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: On the information-splitting essence of two types of quantum key distribution protocols. Phys. Lett. A 355, 172\u2013175 (2006)","journal-title":"Phys. Lett. A"},{"key":"785_CR4","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s11128-005-3194-5","volume":"4","author":"DJ Jackson","year":"2005","unstructured":"Jackson, D.J., Hockney, G.M.: Securing QKD links in the full Hilbert space. Quantum Inf. Process. 4, 387\u2013398 (2005)","journal-title":"Quantum Inf. Process."},{"key":"785_CR5","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1109\/JQE.2011.2167743","volume":"47","author":"B Liu","year":"2011","unstructured":"Liu, B., Gao, F., Wen, Q.Y.: Single-photon multiparty quantum cryptographic protocols with collective detection. IEEE J. Quantum Electron. 47, 1383\u20131390 (2011)","journal-title":"IEEE J. Quantum Electron."},{"key":"785_CR6","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s11128-010-0213-y","volume":"10","author":"A Allati El","year":"2011","unstructured":"El Allati, A., El Baz, M., Hassouni, Y.: Quantum key distribution via tripartite coherent states. Quantum Inf. Process. 10, 589\u2013602 (2011)","journal-title":"Quantum Inf. Process."},{"key":"785_CR7","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buz\u011bk, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"785_CR8","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: Howto share a quantum secret. Phys. Rev. Lett. 83, 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"785_CR9","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y.: A simple participant attack on the Bradler\u2013Dusek protocol. Quantum Inf. Comput. 7, 329\u2013334 (2007)","journal-title":"Quantum Inf. Comput."},{"key":"785_CR10","doi-asserted-by":"crossref","first-page":"062324","DOI":"10.1103\/PhysRevA.76.062324","volume":"76","author":"SJ Qin","year":"2007","unstructured":"Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the Hillery\u2013Buzek\u2013Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)","journal-title":"Phys. Rev. A"},{"key":"785_CR11","doi-asserted-by":"crossref","first-page":"3479","DOI":"10.1016\/j.optcom.2011.03.017","volume":"284","author":"Y Yang","year":"2011","unstructured":"Yang, Y., Wang, Y., Chai, H., Teng, Y., Zhang, H.: Member expansion in quantum (t, n) threshold secret sharing schemes. Opt. Commun. 284, 3479\u20133482 (2011)","journal-title":"Opt. Commun."},{"key":"785_CR12","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11128-011-0239-9","volume":"11","author":"RH Shi","year":"2012","unstructured":"Shi, R.H., Zhong, H.: Multiparty quantum secret sharing with the pure entangled two-photon states. Quantum Inf. Process. 11, 161\u2013169 (2012)","journal-title":"Quantum Inf. Process."},{"key":"785_CR13","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"785_CR14","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F Deng","year":"2003","unstructured":"Deng, F., Long, G., Liu, X.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"785_CR15","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1007\/s10773-012-1276-6","volume":"52","author":"DS Shen","year":"2013","unstructured":"Shen, D.S., Ma, W.P., Yin, X.R., Li, X.P.: Quantum dialogue with authentication based on Bell states. Int. J. Theor. Phys. 52(6), 1825\u20131835 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"785_CR16","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"F Gao","year":"2010","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger\u2013Horne\u2013Zeilinger state. Opt. Commun. 283, 192 (2010)","journal-title":"Opt. Commun."},{"issue":"9","key":"785_CR17","first-page":"3903","volume":"12","author":"XR Yin","year":"2013","unstructured":"Yin, X.R., Ma, W.P., Liu, W.Y., Shen, D.S.: Efficient bidirectional quantum secure communication with two-photon entanglement. Quantum Inf. Process. 12(9), 3903\u20133102 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"18","key":"785_CR18","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1149\u20131150 (2004)","journal-title":"Electron. Lett."},{"key":"785_CR19","unstructured":"Hsueh, C.C., Chen, C.Y.: Quantum key agreement protocol with maximally entangled states. In: Proceedings of the 14th Information Security Conference (ISC 2004), pp. 236\u2013242. National Taiwan University of Science and Technology, Taipei 10\u201311 June (2004)"},{"key":"785_CR20","unstructured":"Tsai, C.W., Hwang, T.: On \u201cquantum key agreement protocol\u201d. Technical Report, C-S-I-E, NCKU, Taiwan. R.O.C (2009)"},{"key":"785_CR21","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1007\/s10773-011-0691-4","volume":"50","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Tsai, C.W., Hwang, T.: Improvement on \u201cquantum key agreement protocol with maximally entangled states\u201d. Int. J. Theor. Phys. 50, 1793\u20131802 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"785_CR22","unstructured":"Tsai, C.W., Chong, S.K., Hwang, T.: Comment on quantum key agreement protocol with maximally entangled states. In: Proceedings of the 20th Cryptology and Information Security Conference (CISC 2010), pp. 210\u2013213. National Chiao Tung University, Hsinchu, 27\u201328 May (2010)"},{"issue":"6","key":"785_CR23","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1016\/j.optcom.2009.11.007","volume":"283","author":"SK Chong","year":"2010","unstructured":"Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283(6), 1192\u20131195 (2010)","journal-title":"Opt. Commun."},{"key":"785_CR24","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1007\/s11128-012-0443-2","volume":"12","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Zhong, H.: Multi-party quantum key agreement with Bell states and Bell measurements. Quantum Inf. Process. 12, 921\u2013932 (2013)","journal-title":"Quantum Inf. Process."},{"key":"785_CR25","doi-asserted-by":"crossref","first-page":"1797","DOI":"10.1007\/s11128-012-0492-6","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Wei, H., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797\u20131805 (2013)","journal-title":"Quantum Inf. Process."},{"key":"785_CR26","doi-asserted-by":"crossref","first-page":"3411","DOI":"10.1007\/s11128-013-0608-7","volume":"12","author":"ZW Sun","year":"2013","unstructured":"Sun, Z.W., Zhang, C., Wang, B., Li, Q., Long, D.Y.: Improvements on \u201cMultiparty quantum key agreement with single particles\u201d. Quantum Inf. Process. 12, 3411\u20133420 (2013)","journal-title":"Quantum Inf. Process."},{"key":"785_CR27","doi-asserted-by":"crossref","first-page":"3915","DOI":"10.1007\/s10773-013-1702-4","volume":"52","author":"XR Yin","year":"2013","unstructured":"Yin, X.R., Ma, W.P., Liu, W.Y.: Three-party quantum key agreement with two-photon entanglement. Int. J. Theor. Phys. 52, 3915\u20133921 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"785_CR28","doi-asserted-by":"crossref","unstructured":"Huang, W., Xia, Q.S., Li, Y.B., Sun, Y.: Quantum key agreement against collective decoherence. Int. J. Theor. Phys. (2014). doi: 10.1007\/s10773-014-2087-8","DOI":"10.1007\/s10773-014-2087-8"},{"key":"785_CR29","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1007\/s11128-014-0758-2","volume":"13","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Su, Q., Gao, F.: Cryptanalysis of a multi-party quantum key agreement protocol with single particles. Quantum Inf. Process. 13, 1651\u20131657 (2014)","journal-title":"Quantum Inf. Process."},{"key":"785_CR30","doi-asserted-by":"crossref","unstructured":"Renes, J.M., Renner, R., Sutter, D.: Efficient one-way secret-key agreement and private channel coding via polarization. ASIACRYPT 2013 Part I, LNCS 8269, pp. 194\u2013213 (2013)","DOI":"10.1007\/978-3-642-42033-7_11"},{"key":"785_CR31","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1007\/s11128-013-0680-z","volume":"13","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Quantum key agreement with EPR pairs and single-particle measurements. Quantum Inf. Process. 13, 649\u2013663 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"785_CR32","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1103\/PhysRevLett.86.910","volume":"86","author":"HJ Briegel","year":"2001","unstructured":"Briegel, H.J., Raussendorf, R.: Persistent entanglement in arrays of interacting particles. Phys. Rev. Lett. 86(5), 910 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"785_CR33","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.physleta.2012.12.024","volume":"377","author":"C Shukla","year":"2013","unstructured":"Shukla, C., Kothari, V., Banerjee, A., Pathak, A.: On the group-theoretic structure of a class of quantum dialogue protocols. Phys. Lett. A 377, 518\u2013527 (2013)","journal-title":"Phys. Lett. A"},{"key":"785_CR34","doi-asserted-by":"crossref","unstructured":"Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: \u201cQuantum exam\u201d Phys. Lett. A 350, 174 (2006). Phys. Lett. A 360, 748\u2013750 (2007)","DOI":"10.1016\/j.physleta.2006.08.016"},{"key":"785_CR35","doi-asserted-by":"crossref","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on \u201cExperimental demonstration of a quantum protocol for byzantine agreement and liar detection\u201d. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"785_CR36","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1088\/1674-1056\/18\/4\/007","volume":"18","author":"TT Song","year":"2009","unstructured":"Song, T.T., Zhang, J., Gao, F., Wen, Q.Y., Zhu, F.C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B. 18, 1333 (2009)","journal-title":"Chin. Phys. B."},{"key":"785_CR37","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1140\/epjd\/e2009-00306-3","volume":"56","author":"FZ Guo","year":"2010","unstructured":"Guo, F.Z., Qin, S.J., Gao, F., et al.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D. 56, 445 (2010)","journal-title":"Eur. Phys. J. D."},{"issue":"1","key":"785_CR38","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Modern Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Modern Phys."},{"key":"785_CR39","doi-asserted-by":"crossref","first-page":"2441","DOI":"10.1007\/s11128-013-0543-7","volume":"12","author":"S Jahanshahi","year":"2013","unstructured":"Jahanshahi, S., Bahrampour, A., Zandi, M.H.: Three-particle deterministic secure and high bit-rate direct quantum communication protocol. Quantum Inf. Process. 12, 2441\u20132451 (2013)","journal-title":"Quantum Inf. Process."},{"key":"785_CR40","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1049\/iet-ifs:20060124","volume":"1","author":"T Hwang","year":"2007","unstructured":"Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with potential 100% qubit efficiency. IET Proc. Inf. Secur. 1, 43\u201345 (2007)","journal-title":"IET Proc. Inf. Secur."},{"issue":"6","key":"785_CR41","doi-asserted-by":"crossref","first-page":"1602","DOI":"10.1109\/JSTQE.2009.2019617","volume":"15","author":"HC Shih","year":"2009","unstructured":"Shih, H.C., Lee, K.C., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quantum Electron. 15(6), 1602\u20131609 (2009)","journal-title":"IEEE J. Sel. Top. Quantum Electron."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0785-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0785-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0785-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T08:28:49Z","timestamp":1565598529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0785-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,5]]},"references-count":41,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["785"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0785-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,5]]}}}