{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:40:33Z","timestamp":1753602033177,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T00:00:00Z","timestamp":1580688000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T00:00:00Z","timestamp":1580688000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"crossref","award":["4182006","4162005"],"award-info":[{"award-number":["4182006","4162005"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572053","61472048","61671087","U1636106","61602019","61502016"],"award-info":[{"award-number":["61572053","61472048","61671087","U1636106","61602019","61502016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11128-020-2593-y","type":"journal-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T22:02:48Z","timestamp":1580767368000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Two-party quantum key agreement against collective noisy channel"],"prefix":"10.1007","volume":"19","author":[{"given":"Yi-Hua","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Mao-Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yu-Guang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,3]]},"reference":[{"key":"2593_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. New York: IEEE (1984)"},{"key":"2593_CR2","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"18","key":"2593_CR3","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1149 (2004)","journal-title":"Electron. Lett."},{"key":"2593_CR4","unstructured":"Hsueh, C.C., Chen, C.Y. In: Proceedings of the 14th Information Security Conference (ISC 2004), pp. 236\u2013242. National Taiwan University of Science and Technology, Taipei (2004)"},{"key":"2593_CR5","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"2593_CR6","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"key":"2593_CR7","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2593_CR8","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2593_CR9","doi-asserted-by":"publisher","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A: Math. Theor. 42(5), 055305 (2009)","journal-title":"J. Phys. A: Math. Theor."},{"issue":"6","key":"2593_CR10","doi-asserted-by":"publisher","first-page":"065002","DOI":"10.1088\/0031-8949\/80\/06\/065002","volume":"80","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)","journal-title":"Phys. Scr."},{"issue":"7","key":"2593_CR11","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"XB Chen","year":"2010","unstructured":"Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single particle measurement. Opt. Commun. 283(7), 1561\u20131565 (2010)","journal-title":"Opt. Commun."},{"issue":"6","key":"2593_CR12","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1007\/s11128-012-0514-4","volume":"12","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T.: Quantum dialogue protocols immune to collective noise. Quantum Inf. Process. 12(6), 2131 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"2593_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-016-1481-y","volume":"16","author":"Y-G Yang","year":"2017","unstructured":"Yang, Y.-G., Liu, Z.-C., Li, J., Chen, X.-B., Zuo, H.-J., Zhou, Y.-H., Shi, W.-M.: Theoretically extensible quantum digital signature with starlike cluster states. Quantum Inf. Process. 16(1), 1\u201315 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"2593_CR14","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1007\/s11128-016-1293-0","volume":"15","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Lei, H., Liu, Z.-C., Zhou, Y.-H., Shi, W.-M.: Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15(6), 2487\u20132497 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2593_CR15","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s11128-011-0258-6","volume":"11","author":"T-Y Wang","year":"2012","unstructured":"Wang, T.-Y., Wei, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11, 455\u2013463 (2012)","journal-title":"Quantum Inf. Process."},{"key":"2593_CR16","doi-asserted-by":"publisher","first-page":"9231","DOI":"10.1038\/srep09231","volume":"5","author":"T-Y Wang","year":"2015","unstructured":"Wang, T.-Y., Cai, X.Q., Ren, Y.L., Zhang, R.L.: Security of quantum digital signature. Sci. Rep. 5, 9231 (2015)","journal-title":"Sci. Rep."},{"key":"2593_CR17","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"2593_CR18","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1016\/j.optcom.2009.11.007","volume":"283","author":"SK Chong","year":"2010","unstructured":"Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283(6), 1192\u20131195 (2010)","journal-title":"Opt. Commun."},{"key":"2593_CR19","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1007\/s11128-014-0784-0","volume":"13","author":"C Shukla","year":"2014","unstructured":"Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391\u20132405 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2593_CR20","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s10773-011-0691-4","volume":"50","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Tsai, C.W., Hwang, T.: Improvement on quantum key agreement protocol with maximally entangled states. Int. J. Theor. Phys. 50, 1793\u20131802 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"2593_CR21","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11128-012-0443-2","volume":"12","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Zhong, H.: Multi-party quantum key agreement with Bell states and Bell measurements. Quantum Inf. Process. 12, 921\u2013932 (2013)","journal-title":"Quantum Inf. Process."},{"key":"2593_CR22","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1007\/s11128-014-0816-9","volume":"13","author":"GB Xu","year":"2014","unstructured":"Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587\u20132594 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"03","key":"2593_CR23","doi-asserted-by":"publisher","first-page":"1750018","DOI":"10.1142\/S0219749917500186","volume":"15","author":"YF He","year":"2017","unstructured":"He, Y.F., Ma, W.P.: Two-party quantum key agreement with five-particle entangled states. Int. J. Quantum Inf. 15(03), 1750018 (2017)","journal-title":"Int. J. Quantum Inf."},{"issue":"10","key":"2593_CR24","doi-asserted-by":"publisher","first-page":"1750102","DOI":"10.1142\/S0217984917501020","volume":"31","author":"B Cai","year":"2017","unstructured":"Cai, B., Guo, G., Lin, S.: Multi-party quantum key agreement with teleportation. Mod. Phys. Lett. B 31(10), 1750102 (2017)","journal-title":"Mod. Phys. Lett. B"},{"key":"2593_CR25","doi-asserted-by":"publisher","first-page":"45046","DOI":"10.1038\/srep45046","volume":"7","author":"H Cao","year":"2017","unstructured":"Cao, H., Ma, W.: Multiparty quantum key agreement based on quantum search algorithm. Sci. Rep. 7, 45046 (2017)","journal-title":"Sci. Rep."},{"key":"2593_CR26","doi-asserted-by":"publisher","first-page":"3411","DOI":"10.1007\/s11128-013-0608-7","volume":"12","author":"ZW Sun","year":"2013","unstructured":"Sun, Z.W., Zhang, C., Wang, B.H., Li, Q., Long, D.Y.: Improvements on \u201cmultiparty quantum key agreement with single particles\u201d. Quantum Inf. Process. 12, 3411\u20133420 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"5491","key":"2593_CR27","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1126\/science.290.5491.498","volume":"290","author":"PG Kwiat","year":"2000","unstructured":"Kwiat, P.G., Berglund, A.J., Altepeter, J.B., White, A.G.: Experimental verification of decoherence-free subspaces. Science (New York, N.Y.) 290(5491), 498\u2013501 (2000)","journal-title":"Science (New York, N.Y.)"},{"key":"2593_CR28","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s11128-013-0680-z","volume":"13","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Quantum key agreement with EPR pairs and single particle measurements. Quantum Inf. Process. 13, 649\u2013663 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2593_CR29","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1007\/s10773-014-2087-8","volume":"53","author":"W Huang","year":"2014","unstructured":"Huang, W., Su, Q., Wu, X., Li, Y.B., Sun, Y.: Quantum key agreement against collective decoherence. Int. J. Theor. Phys. 53, 2891 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"2593_CR30","doi-asserted-by":"publisher","first-page":"5023","DOI":"10.1007\/s11128-016-1436-3","volume":"15","author":"YF He","year":"2016","unstructured":"He, Y.F., Ma, W.P.: Two-party quantum key agreement against collective noise. Quantum Inf. Process. 15, 5023\u20135035 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2593_CR31","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s11128-018-1910-1","volume":"17","author":"H Gao","year":"2018","unstructured":"Gao, H., Chen, X.G., Qian, S.R.: Two-party quantum key agreement protocols under collective noise channel. Quantum Inf. Process. 17, 140 (2018)","journal-title":"Quantum Inf. Process."},{"key":"2593_CR32","doi-asserted-by":"publisher","first-page":"087901","DOI":"10.1103\/PhysRevLett.91.087901","volume":"91","author":"ZD Walton","year":"2003","unstructured":"Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., et al.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91, 087901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"2593_CR33","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., et al.: A simple participant attack on the Bradler\u2013Dusek protocol. Quantum Inf. Comput. 7(4), 329\u2013334 (2007)","journal-title":"Quantum Inf. Comput."},{"key":"2593_CR34","doi-asserted-by":"publisher","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on \u201cExperimental demonstration of a quantum protocol for byzantine agreement and liar detection\u201d. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"2593_CR35","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.physleta.2006.04.030","volume":"357","author":"S Qin","year":"2006","unstructured":"Qin, S., Gao, F., Wen, Q., Zhu, F.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101\u2013103 (2006)","journal-title":"Phys. Lett. A"},{"key":"2593_CR36","doi-asserted-by":"publisher","first-page":"2097","DOI":"10.1088\/0256-307X\/21\/11\/007","volume":"21","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L., Wang, Y., Xiao, L.: Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement. Chin. Phys. Lett. 21, 2097 (2004)","journal-title":"Chin. Phys. Lett."},{"key":"2593_CR37","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"2593_CR38","doi-asserted-by":"publisher","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)","journal-title":"Phys. Rev. A"},{"key":"2593_CR39","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635\u20135638 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"2593_CR40","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s11128-019-2187-8","volume":"18","author":"YG Yang","year":"2019","unstructured":"Yang, Y.G., Gao, S., Li, D., et al.: Two-party quantum key agreement over a collective noisy channel. Quantum Inf. Process. 18, 74 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"2593_CR41","first-page":"762","volume":"72","author":"Wang Xiangbin","year":"2005","unstructured":"Xiangbin, Wang: Fault tolerant quantum key distribution protocol with collective random unitary noise. Phys. Rev. A 72(5), 762\u2013776 (2005)","journal-title":"Phys. Rev. A"},{"issue":"4\u20136","key":"2593_CR42","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.optcom.2005.06.002","volume":"254","author":"N Zhou","year":"2005","unstructured":"Zhou, N., Zeng, G., Zeng, W., et al.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254(4\u20136), 380\u2013388 (2005)","journal-title":"Opt. Commun."},{"issue":"6","key":"2593_CR43","doi-asserted-by":"crossref","first-page":"060302","DOI":"10.7498\/aps.63.060302","volume":"63","author":"Wu Gui-Tong","year":"2014","unstructured":"Gui-Tong, Wu, Nan-Run, Zhou, Li-Hua, Gong, et al.: Quantum dialogue protocols with identification over collection noisy channel without information leakage. Acta Phys. Sin. 63(6), 060302 (2014)","journal-title":"Acta Phys. Sin."},{"issue":"7","key":"2593_CR44","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/s11128-018-1953-3","volume":"17","author":"G Jun","year":"2018","unstructured":"Jun, G., Po-Hua, L., Tzonelih, H.: Double C-NOT attack and counterattack on \u2018Three-step semi-quantum secure direct communication protocol\u2019. Quantum Inf. Process. 17(7), 182 (2018)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-2593-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-020-2593-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-2593-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T06:01:48Z","timestamp":1665727308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-020-2593-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,3]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["2593"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-2593-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2020,2,3]]},"assertion":[{"value":"13 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"100"}}