{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:41:27Z","timestamp":1771234887494,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373171"],"award-info":[{"award-number":["61373171"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013314","name":"111 project","doi-asserted-by":"crossref","award":["B08038"],"award-info":[{"award-number":["B08038"]}],"id":[{"id":"10.13039\/501100013314","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11128-017-1576-0","type":"journal-article","created":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T23:11:18Z","timestamp":1491347478000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom"],"prefix":"10.1007","volume":"16","author":[{"given":"Lili","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wenping","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"1576_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1576_CR2","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D.T., Wong, C.K.: A conference key distribution system. IEEE Trans. Inf. Theory 28, 714\u2013719 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1576_CR3","doi-asserted-by":"crossref","unstructured":"Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: Advances in CryptologyEUROCRYPT 1994. Lecture Notes in Computer Science, vol. 950, pp. 275\u2013286 (1994)","DOI":"10.1007\/BFb0053443"},{"key":"1576_CR4","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11, 769\u2013780 (2000)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"1576_CR5","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"1576_CR6","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on Foundations of Computer Science, Los Alamitos, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"1576_CR7","doi-asserted-by":"publisher","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"key":"1576_CR8","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40, 1149 (2004)","journal-title":"Electron. Lett."},{"key":"1576_CR9","unstructured":"Hsueh, C.C., Chen, C.Y.: Quantum key agreement protocol with maximally entangled states. In: Proceedings of the 14th Information Security Conference (ISC 2004), pp. 236\u2013242, National Taiwan University of Science and Technology, Taipei (2004)"},{"key":"1576_CR10","unstructured":"Tsai, C., Hwang, T.: On Quantum Key Agreement Protocol. Technical Report, C-S-I-E, NCKU, Taiwan, ROC (2009)"},{"key":"1576_CR11","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s10773-011-0691-4","volume":"50","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Tsai, C.W., Hwang, T.: Improvement on quantum key agreement protocol with maximally entangled states. Int. J. Theor. Phys. 50, 1793\u20131802 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"1576_CR12","unstructured":"Tsai, C.W., Chong S.K., Hwang, T.: Comment on quantum key agreement protocol with maximally entangled states. In: Proceedings of the 20th Cryptology and Information Security Conference (CISC 2010), pp. 210\u2013213 (2010)"},{"key":"1576_CR13","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1016\/j.optcom.2009.11.007","volume":"283","author":"SK Chong","year":"2010","unstructured":"Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283, 1192\u20131195 (2010)","journal-title":"Opt. Commun."},{"key":"1576_CR14","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11128-012-0443-2","volume":"12","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Zhong, H.: Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 12, 921\u2013932 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1576_CR15","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s11128-012-0492-6","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797\u20131805 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1576_CR16","doi-asserted-by":"publisher","first-page":"3411","DOI":"10.1007\/s11128-013-0608-7","volume":"12","author":"ZW Sun","year":"2013","unstructured":"Sun, Z.W., Zhang, C., Wang, B.H., Li, Q., Long, D.Y.: Improvements on multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 3411\u20133420 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1576_CR17","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1007\/s11128-014-0758-2","volume":"13","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Su, Q., Gao, F.: Cryptanalysis of a multi-party quantum key agreement protocol with single particles. Quantum Inf. Process. 13, 1651\u20131657 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1576_CR18","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1007\/s11128-014-0784-0","volume":"13","author":"C Shukla","year":"2014","unstructured":"Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391\u20132405 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1576_CR19","doi-asserted-by":"publisher","first-page":"4245","DOI":"10.1007\/s11128-015-1110-1","volume":"14","author":"ZC Zhu","year":"2015","unstructured":"Zhu, Z.C., Hu, A.Q., Fu, A.M.: Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 14, 4245\u20134254 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1576_CR20","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1007\/s11128-014-0816-9","volume":"13","author":"GB Xu","year":"2014","unstructured":"Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587\u20132594 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1576_CR21","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-015-1155-1","volume":"15","author":"ZW Sun","year":"2016","unstructured":"Sun, Z.W., Yu, J., Wang, P.: Efficient multi-party quantum key agreement by cluster states. Quantum Inf. Process. 15, 373\u2013384 (2016)","journal-title":"Quantum Inf. Process."},{"key":"1576_CR22","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 290, pp. 175\u2013179, IEEE, Bangalore (1984)"},{"key":"1576_CR23","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1007\/s10773-012-1171-1","volume":"51","author":"D Liu","year":"2012","unstructured":"Liu, D., Chen, J.L., Jiang, W.: High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 51, 2923\u20132929 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1576_CR24","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1007\/s10773-012-1242-3","volume":"51","author":"B Gu","year":"2012","unstructured":"Gu, B., Xu, F., Ding, L., Zhang, Y.: High-capacity three-party quantum secret sharing with hyperentanglement. Int. J. Theor. Phys. 51, 3559\u20133566 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1576_CR25","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1088\/0256-307X\/22\/5\/006","volume":"22","author":"CY Li","year":"2005","unstructured":"Li, C.Y., Zhou, H.Y., Wang, Y., Deng, F.G.: Secure quantum key distribution network with Bell states and local unitary operations. Chin. Phys. Lett. 22, 1049 (2005)","journal-title":"Chin. Phys. Lett."},{"key":"1576_CR26","doi-asserted-by":"publisher","first-page":"2896","DOI":"10.1088\/0256-307X\/23\/11\/004","volume":"23","author":"CY Li","year":"2006","unstructured":"Li, C.Y., Li, X.H., Deng, F.G., Zhou, P., Liang, Y.J., Zhou, H.Y.: Efficient quantum cryptography network without entanglement and quantum memory. Chin. Phys. Lett. 23, 2896 (2006)","journal-title":"Chin. Phys. Lett."},{"key":"1576_CR27","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TIT.2002.807289","volume":"49","author":"D Gottesman","year":"2003","unstructured":"Gottesman, D., Lo, H.K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49, 457\u2013475 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1576_CR28","doi-asserted-by":"publisher","first-page":"049901","DOI":"10.1103\/PhysRevA.73.049901","volume":"73","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Physical Review A (2005) 72 (044302)]. Phys. Rev. A 73, 049901 (2006)","journal-title":"Phys. Rev. A"},{"key":"1576_CR29","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"key":"1576_CR30","doi-asserted-by":"publisher","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)","journal-title":"Phys. Rev. A"},{"key":"1576_CR31","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"1576_CR32","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1088\/1367-2630\/4\/1\/343","volume":"4","author":"RJ Hughes","year":"2002","unstructured":"Hughes, R.J., Nordholt, J.E., Derkacs, D., Peterson, C.G.: Practical free-space quantum key distribution over 10 km in daylight and at night. New. J. Phys. 4, 43 (2002)","journal-title":"New. J. Phys."},{"key":"1576_CR33","doi-asserted-by":"publisher","first-page":"187901","DOI":"10.1103\/PhysRevLett.89.187901","volume":"89","author":"A Beveratos","year":"2002","unstructured":"Beveratos, A., Brouri, R., Gacoin, T., Villing, A., Poizat, J.P., Grangier, P.: Single photon quantum cryptography. Phys. Rev. Lett. 89, 187901 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"1576_CR34","doi-asserted-by":"publisher","first-page":"3762","DOI":"10.1063\/1.1738173","volume":"84","author":"C Gobby","year":"2004","unstructured":"Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84, 3762\u20133764 (2004)","journal-title":"Appl. Phys. Lett."},{"key":"1576_CR35","doi-asserted-by":"publisher","unstructured":"Lin J., Hwang T.: New circular quantum secret sharing for remote agents. Quantum Inf. Process. 12, 685\u2013697 (2013)","DOI":"10.1007\/s11128-012-0413-8"},{"key":"1576_CR36","doi-asserted-by":"publisher","unstructured":"Chen, K.H., Chang, Z.H., Zeng, G.J., et al.: Multiparty quantum key agreement with GHZ state. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), IEEE, pp. 1589\u20131594 (2015)","DOI":"10.1109\/SMC.2015.281"},{"key":"1576_CR37","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-015-1155-1","volume":"15","author":"ZW Sun","year":"2016","unstructured":"Sun, Z.W., Yu, J.P., Wang, P.: Efficient multi-party quantum key agreement by cluster states. Quantum Inf. Process. 15, 373\u2013384 (2016)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1576-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-017-1576-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1576-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T19:31:56Z","timestamp":1589743916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-017-1576-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["1576"],"URL":"https:\/\/doi.org\/10.1007\/s11128-017-1576-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,4]]},"article-number":"130"}}