{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:51:19Z","timestamp":1760784679995,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T00:00:00Z","timestamp":1557532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6140226"],"award-info":[{"award-number":["6140226"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11128-019-2305-7","type":"journal-article","created":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T14:58:10Z","timestamp":1557586690000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Quantum key agreement with Bell states and Cluster states under collective noise channels"],"prefix":"10.1007","volume":"18","author":[{"given":"Sha-Sha","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dong-Huan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Guang-Bao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yong-Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiang-Qian","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,11]]},"reference":[{"key":"2305_CR1","unstructured":"Bennett, C.H., Brassard, G.: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, India, pp. 175\u2013179 (1984)"},{"key":"2305_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"2305_CR3","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"2305_CR4","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X.F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2305_CR5","doi-asserted-by":"publisher","first-page":"127902","DOI":"10.1103\/PhysRevLett.88.127902","volume":"88","author":"NJ Cerf","year":"2002","unstructured":"Cerf, N.J., Bourennane, M., Karlsson, A., Gisin, N.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88, 127902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2305_CR6","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"2305_CR7","doi-asserted-by":"publisher","first-page":"2971","DOI":"10.1007\/s11128-016-1309-9","volume":"15","author":"CH Chang","year":"2016","unstructured":"Chang, C.H., Yang, C.W., Hzu, G.R., Hwang, T., Kao, S.H.: Quantum dialogue protocols over collective noise using entanglement of GHZ state. Quantum Inf. Process. 15, 2971\u20132991 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR8","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1007\/s11128-013-0582-0","volume":"12","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Tsai, C.W., Hwang, T.: Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels. Quantum Inf. Process. 12, 3043\u20133055 (2013)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR9","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1007\/s11128-013-0554-4","volume":"12","author":"KJ Zhang","year":"2013","unstructured":"Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12, 2655\u20132669 (2013)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR10","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1007\/s10773-015-2715-y","volume":"55","author":"HJ Cao","year":"2016","unstructured":"Cao, H.J., Zhang, J.F., Liu, J., Li, Z.Y.: A new quantum proxy multi-signature scheme using maximally entangled seven-qubit states. Int. J. Theor. Phys. 55, 774\u2013780 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"2305_CR11","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1007\/s11128-015-0995-z","volume":"14","author":"GB Xu","year":"2015","unstructured":"Xu, G.B., Zhang, K.J.: A novel quantum group signature scheme without using entangled states. Quantum Inf. Process. 14, 2577\u20132587 (2015)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR12","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1007\/s10773-015-2745-5","volume":"55","author":"L Fan","year":"2016","unstructured":"Fan, L., Zhang, K.J., Qin, S.J., Guo, F.Z.: A novel quantum blind signature scheme with four-particle GHZ states. Int. J. Theor. Phys. 55, 1028\u20131035 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"2305_CR13","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40, 1149 (2004)","journal-title":"Electron. Lett."},{"key":"2305_CR14","unstructured":"Tsai, C., Hwang, T.: On quantum key agreement protocol. Technical Report, C-S-I-E, NCKU, Taiwan (2009)"},{"key":"2305_CR15","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1016\/j.optcom.2009.11.007","volume":"283","author":"SK Chong","year":"2010","unstructured":"Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283, 1192\u20131195 (2010)","journal-title":"Opt. Commun."},{"issue":"03","key":"2305_CR16","doi-asserted-by":"publisher","first-page":"1750018","DOI":"10.1142\/S0219749917500186","volume":"15","author":"YF He","year":"2017","unstructured":"He, Y.F., Ma, W.P.: Two-party quantum key agreement with five-particle entangled states. Int. J. Quantum Inf. 15(03), 1750018 (2017)","journal-title":"Int. J. Quantum Inf."},{"key":"2305_CR17","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11128-012-0443-2","volume":"12","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Zhong, H.: Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 12, 921\u2013932 (2013)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR18","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s11128-012-0492-6","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797\u20131805 (2013)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR19","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1007\/s11128-014-0816-9","volume":"13","author":"GB Xu","year":"2014","unstructured":"Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587\u20132594 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR20","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s11128-018-1951-5","volume":"17","author":"DH Jiang","year":"2018","unstructured":"Jiang, D.H., Xu, G.B.: Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states. Quantum Inf. Process. 17, 180 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"2305_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPHOT.2018.2797535","volume":"10","author":"B Cai","year":"2018","unstructured":"Cai, B., Guo, G., Lin, S., Zuo, H., Yu, C.: Multipartite quantum key agreement over collective noise channels. IEEE Photonics J. 10(1), 1\u201311 (2018)","journal-title":"IEEE Photonics J."},{"key":"2305_CR22","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s11128-013-0680-z","volume":"13","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Quantum key agreement with EPR pairs and single particle measurements. Quantum Inf. Process. 13, 649\u2013663 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR23","doi-asserted-by":"publisher","first-page":"5023","DOI":"10.1007\/s11128-016-1436-3","volume":"15","author":"YF He","year":"2016","unstructured":"He, Y.F., Ma, W.P.: Two-party quantum key agreement against collective noise. Quantum Inf. Process. 15, 5023\u20135035 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"2305_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10773-016-3028-5","volume":"55","author":"CH Chang","year":"2016","unstructured":"Chang, C.H., Yang, C.W., Hwang, T.: Trojan horse attack free fault-tolerant quantum key distribution protocols using GHz states. Int. J. Theor. Phys. 55(9), 1\u201312 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"2305_CR25","doi-asserted-by":"publisher","first-page":"087901","DOI":"10.1103\/PhysRevLett.91.087901","volume":"91","author":"ZD Walton","year":"2003","unstructured":"Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., Saleh, B.E.A., Teich, M.C.: Decoherence free subspaces in quantum key distribution. Phys. Rev. Lett. 91, 087901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"2305_CR26","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1007\/s10773-014-2087-8","volume":"53","author":"W Huang","year":"2014","unstructured":"Huang, W., Su, Q., Wu, X., Li, Y.B., Sun, Y.: Quantum key agreement against collective decoherence. Int. J. Theor. Phys. 53, 2891\u20132901 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"2305_CR27","doi-asserted-by":"publisher","first-page":"1750015","DOI":"10.1142\/S0217984917500154","volume":"B31","author":"YF He","year":"2017","unstructured":"He, Y.F., Ma, W.P.: Two robust quantum key agreement protocols based on logical GHz states. Mod. Phys. Lett. B31(3), 1750015 (2017)","journal-title":"Mod. Phys. Lett."},{"key":"2305_CR28","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s11128-018-1910-1","volume":"17","author":"H Gao","year":"2018","unstructured":"Gao, H., Chen, X.G., Qian, S.R.: Two-party quantum key agreement protocols under collective noise channel. Quantum Inf. Process. 17, 140 (2018)","journal-title":"Quantum Inf. Process."},{"key":"2305_CR29","doi-asserted-by":"publisher","first-page":"022321","DOI":"10.1103\/PhysRevA.78.022321","volume":"78","author":"XH Li","year":"2008","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78, 022321 (2008)","journal-title":"Phys. Rev. A"},{"key":"2305_CR30","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1016\/j.physleta.2012.12.024","volume":"377","author":"V Shukla","year":"2013","unstructured":"Shukla, V., Kothari, C., Banerjee, A., Pathak, A.: On the group-theoretic structure of a class of quantum dialogue protocols. Phys. Lett. A 377, 518\u2013527 (2013)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"2305_CR31","first-page":"361","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 361\u2013364 (2006)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2305_CR32","first-page":"440","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 440\u2013450 (2005)","journal-title":"Phys. Rev. A"},{"key":"2305_CR33","doi-asserted-by":"publisher","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)","journal-title":"Phys. Rev. A"},{"key":"2305_CR34","doi-asserted-by":"publisher","first-page":"5633","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5633\u20135638 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"2305_CR35","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s13324-015-0116-2","volume":"6","author":"QL Zhao","year":"2016","unstructured":"Zhao, Q.L., Li, X.Y.: A bargmann system and the involutive solutions associated with a new 4-order lattice hierarchy. Anal. Math. Phys. 6(3), 237\u2013254 (2016)","journal-title":"Anal. Math. Phys."},{"issue":"2","key":"2305_CR36","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/s00233-015-9714-4","volume":"92","author":"YH Wang","year":"2016","unstructured":"Wang, Y.H.: Beyond regular semigroups. Semigroup Forum 92(2), 414\u2013448 (2016)","journal-title":"Semigroup Forum"},{"issue":"2","key":"2305_CR37","first-page":"479","volume":"6","author":"TQ Zhang","year":"2016","unstructured":"Zhang, T.Q., Meng, X.Z., Zhang, T.H.: Global analysis for a delayed siv model with direct and environmental transmissions. J. Appl. Anal. Comput. 6(2), 479\u2013491 (2016)","journal-title":"J. Appl. Anal. Comput."},{"issue":"3","key":"2305_CR38","first-page":"865","volume":"6","author":"XZ Meng","year":"2016","unstructured":"Meng, X.Z., Wang, L., Zhang, T.H.: Global dynamics analysis of a nonlinear impulsive stochastic chemostat system in a polluted environment. J. Appl. Anal. Comput. 6(3), 865\u2013875 (2016)","journal-title":"J. Appl. Anal. Comput."},{"key":"2305_CR39","first-page":"848623","volume":"2015","author":"WC Zhao","year":"2015","unstructured":"Zhao, W.C., Li, J., Meng, X.Z.: Dynamical analysis of SIR epidemic model with nonlinear pulse vaccination and lifelong immunity. Discrete Dyn. Nat. Soc. 2015, 848623 (2015)","journal-title":"Discrete Dyn. Nat. Soc."},{"key":"2305_CR40","first-page":"438","volume":"256","author":"YJ Cui","year":"2015","unstructured":"Cui, Y.J., Zou, Y.M.: An existence and uniqueness theorem for a second order nonlinear system with coupled integral boundary value conditions. Appl. Math. Comput. 256, 438\u2013444 (2015)","journal-title":"Appl. Math. Comput."},{"key":"2305_CR41","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1007\/s10773-018-03995-4","volume":"58","author":"DH Jiang","year":"2019","unstructured":"Jiang, D.H., Xu, Y.L., Xu, G.B.: Arbitrary Quantum Signature Based on Local Indistinguishability of Orthogonal Product States. Int. J. Theor. Phys. 58, 1036\u20131045 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"2305_CR42","doi-asserted-by":"publisher","first-page":"447","DOI":"10.4208\/eajam.130917.150218","volume":"8","author":"DH Jiang","year":"2018","unstructured":"Jiang, D.H., Wang, X.J., Xu, G.B., Lin, J.Q.: A Denoising-Decomposition Model Combining TV Minimisation and Fractional Derivatives. East Asia J. Appl. Math. 8, 447\u2013462 (2018)","journal-title":"East Asia J. Appl. Math."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2305-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2305-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2305-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,9]],"date-time":"2020-05-09T23:23:47Z","timestamp":1589066627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2305-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,11]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["2305"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2305-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2019,5,11]]},"assertion":[{"value":"4 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"190"}}