{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:08:45Z","timestamp":1759939725433,"version":"3.37.3"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11128-021-03317-4","type":"journal-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T09:02:43Z","timestamp":1636362163000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Semi-device-independent quantum key agreement protocol"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4040-2448","authenticated-orcid":false,"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yue-Chao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,8]]},"reference":[{"unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175\u2013179. Bangalore (1984)","key":"3317_CR1"},{"issue":"6","key":"3317_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"3317_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 68(5), 557\u2013559 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3317_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","volume":"60","author":"M Du\u0161ek","year":"1999","unstructured":"Du\u0161ek, M., Haderka, O., Hendrych, M., et al.: Quantum identification system. Phys. Rev. A. 60(1), 149\u2013156 (1999)","journal-title":"Phys. Rev. A."},{"issue":"2","key":"3317_CR5","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"3317_CR6","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., et al.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"issue":"13","key":"3317_CR7","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H-K Lo","year":"2012","unstructured":"Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"doi-asserted-by":"crossref","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., et al.: Practical quantum oblivious transfer. In: Annual International Cryptology Conference. pp. 351\u2013366. Springer, Berlin Heidelberg (1991)","key":"3317_CR8","DOI":"10.1007\/3-540-46766-1_29"},{"issue":"12","key":"3317_CR9","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1080\/09500349414552291","volume":"41","author":"C Cr\u00e9peau","year":"1994","unstructured":"Cr\u00e9peau, C.: Quantum oblivious transfer. J. Mod. Opt. 41(12), 2445\u20132454 (1994)","journal-title":"J. Mod. Opt."},{"key":"3317_CR10","first-page":"47","volume":"3352","author":"C Cr\u00e9peau","year":"2005","unstructured":"Cr\u00e9peau, C., Morozov, K., Wolf, S.: Efficient unconditional oblivious transfer from almost any noisy channel. LNCS 3352, 47\u201359 (2005)","journal-title":"LNCS"},{"issue":"1","key":"3317_CR11","doi-asserted-by":"publisher","first-page":"012331","DOI":"10.1103\/PhysRevA.73.012331","volume":"73","author":"GP He","year":"2006","unstructured":"He, G.P., Wang, Z.D.: Oblivious transfer using quantum entanglement. Phys. Rev. A. 73(1), 012331 (2006)","journal-title":"Phys. Rev. A."},{"issue":"18","key":"3317_CR12","doi-asserted-by":"publisher","first-page":"5409","DOI":"10.1016\/j.ijleo.2014.06.023","volume":"125","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Xu, P., Tian, J., et al.: Quantum oblivious transfer with an untrusted third party. Optik 125(18), 5409\u20135413 (2014)","journal-title":"Optik"},{"issue":"4","key":"3317_CR13","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1007\/s10773-016-3270-x","volume":"56","author":"Y-G Yang","year":"2017","unstructured":"Yang, Y.-G., Yang, R., Cao, W.-F., et al.: Flexible quantum oblivious transfer. Int. J. Theor. Phys. 56(4), 1286\u20131297 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"3317_CR14","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"3317_CR15","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3317_CR16","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0375-9601(03)00074-4","volume":"310","author":"G-P Guo","year":"2003","unstructured":"Guo, G.-P., Guo, G.-C.: Quantum secret sharing without entanglement. Phys. Lett. A 310(4), 247\u2013251 (2003)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"3317_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11128-019-2319-1","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Gao, S., Li, D., et al.: Three-party quantum secret sharing against collective noise. Quantum Inf. Process. 18(5), 215 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"18","key":"3317_CR18","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"3317_CR19","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"3317_CR20","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"1\u20133","key":"3317_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green\u2013Horne\u2013Zeilinger state. Opt. Commun. 253(1\u20133), 15\u201320 (2005)","journal-title":"Opt. Commun."},{"issue":"36","key":"3317_CR22","doi-asserted-by":"publisher","first-page":"4571","DOI":"10.1007\/s11434-013-6091-9","volume":"58","author":"Y Chang","year":"2013","unstructured":"Chang, Y., Xu, C.X., Zhang, S.B., et al.: Quantum secure direct communication and authentication protocol with single photons. Chin. Sci. Bull. 58(36), 4571\u20134576 (2013)","journal-title":"Chin. Sci. Bull."},{"key":"3317_CR23","doi-asserted-by":"publisher","first-page":"220501","DOI":"10.1103\/PhysRevLett.118.220501","volume":"118","author":"W Zhang","year":"2017","unstructured":"Zhang, W., Ding, D.S., Sheng, Y.-B., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"3317_CR24","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.1007\/s10773-019-04165-w","volume":"58","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Gao, S., Zhou, Y.-H., et al.: New secure quantum dialogue protocols over collective noisy channels. Int. J. Theor. Phys. 58(9), 2810\u20132822 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"3317_CR25","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"3317_CR26","doi-asserted-by":"publisher","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A. 79(5), 054307 (2009)","journal-title":"Phys. Rev. A."},{"issue":"2","key":"3317_CR27","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10773-011-0922-8","volume":"51","author":"XR Yin","year":"2012","unstructured":"Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with \u03c7-type entangled states. Int. J. Theor. Phys. 51(2), 455\u2013461 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"3317_CR28","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1007\/s11128-016-1293-0","volume":"15","author":"YG Yang","year":"2016","unstructured":"Yang, Y.G., Lei, H., Liu, Z.C., et al.: Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15(6), 2487\u20132497 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"3317_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-016-1458-x","volume":"16","author":"YG Yang","year":"2017","unstructured":"Yang, Y.G., Liu, Z.C., Li, J., et al.: Theoretically extensible quantum digital signature with star-like cluster states. Quantum Inf. Process. 16(1), 1\u201315 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"3317_CR30","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1007\/s10773-018-03995-4","volume":"58","author":"D-H Jiang","year":"2019","unstructured":"Jiang, D.-H., Xu, Y.-L., Xu, G.-B.: Arbitrary quantum signature based on local indistinguishability of orthogonal product states. Int. J. Theor. Phys. 58(3), 1036\u20131045 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"3317_CR31","doi-asserted-by":"publisher","first-page":"17411","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Exp. 20, 17411\u201317420 (2012)","journal-title":"Opt. Exp."},{"key":"3317_CR32","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s11128-013-0692-8","volume":"13","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Sun, S.-J., Xu, P., et al.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805\u2013813 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR33","doi-asserted-by":"publisher","first-page":"6600111","DOI":"10.1109\/JSTQE.2014.2358192","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F., Liu, B., Huang, W., et al.: Postprocessing of the oblivious key in quantum private query. IEEE. J. Sel. Top. Quant. 21, 6600111 (2015)","journal-title":"IEEE. J. Sel. Top. Quant."},{"key":"3317_CR34","doi-asserted-by":"publisher","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"CY Wei","year":"2016","unstructured":"Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)","journal-title":"Phys. Rev. A"},{"issue":"48","key":"3317_CR35","doi-asserted-by":"publisher","first-page":"4033","DOI":"10.1016\/j.physleta.2016.10.017","volume":"380","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Liu, Z.-C., Li, J., et al.: Quantum private query with perfect user privacy against a joint-measurement attack. Phys. Lett. A 380(48), 4033\u20134038 (2016)","journal-title":"Phys. Lett. A"},{"key":"3317_CR36","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1007\/s11128-016-1367-z","volume":"15","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Liu, Z.C., Chen, X.B., et al.: Novel classical post-processing for quantum key distribution-based quantum private query. Quantum Inf. Process. 15, 3833\u20133840 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"12","key":"3317_CR37","doi-asserted-by":"publisher","first-page":"120311","DOI":"10.1007\/s11433-017-9085-0","volume":"60","author":"Y-G Yang","year":"2017","unstructured":"Yang, Y.-G., Liu, Z.-C., Chen, X.-B., et al.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. Chin. Phys. Mech. Astron. 60(12), 120311 (2017)","journal-title":"Sci. Chin. Phys. Mech. Astron."},{"key":"3317_CR38","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.cose.2018.08.012","volume":"81","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Guo, X.-P., Xu, G., et al.: Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability. Comput. Secur. 81, 15\u201324 (2019)","journal-title":"Comput. Secur."},{"key":"3317_CR39","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"18","key":"3317_CR40","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1149 (2004)","journal-title":"Electron. Lett."},{"unstructured":"Tsai, C.W., and Hwang, T.: On quantum key agreement protocol, Technical Report, CS-I-E, NCKU, Taiwan, ROC, 2009","key":"3317_CR41"},{"key":"3317_CR42","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11128-012-0443-2","volume":"12","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Zhong, H.: Multi-party quantum key agreement with Bell states and Bell measurements. Quantum Inf. Process. 12, 921\u2013932 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR43","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1007\/s11128-014-0784-0","volume":"13","author":"C Shukla","year":"2014","unstructured":"Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13, 2391\u20132405 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR44","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s11128-013-0680-z","volume":"13","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.-Y., Liu, B., et al.: Quantum key agreement with EPR pairs and single-particle measurements. Quantum Inf. Process. 13, 649\u2013663 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR45","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10773-017-3553-x","volume":"57","author":"W-J Liu","year":"2018","unstructured":"Liu, W.-J., Xu, Y., Yang, C.-N., et al.: An efficient and secure arbitrary N-party quantum key agreement protocol using Bell states. Int. J. Theor. Phys. 57, 195\u2013207 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"10","key":"3317_CR46","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/s11128-019-2434-z","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Li, B.-R., Li, D., et al.: New quantum key agreement protocols based on Bell states. Quantum Inf. Process. 18(10), 322 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR47","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1016\/j.optcom.2009.11.007","volume":"283","author":"SK Chong","year":"2010","unstructured":"Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283, 1192\u20131195 (2010)","journal-title":"Opt. Commun."},{"key":"3317_CR48","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s11128-012-0492-6","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Huang, W., et al.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797\u20131805 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR49","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s10773-016-3246-x","volume":"56","author":"B-B Cai","year":"2017","unstructured":"Cai, B.-B., Guo, G.-D., Lin, S.: Multi-party quantum key agreement without entanglement. Int. J. Theor. Phys. 56, 1039\u20131051 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"3317_CR50","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1007\/s11128-014-0785-z","volume":"13","author":"D-S Shen","year":"2014","unstructured":"Shen, D.-S., Ma, W.-P., Wang, L.-L.: Two-party quantum key agreement with four-qubit cluster states. Quantum Inf. Process. 13, 2313\u20132324 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR51","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1007\/s11128-014-0816-9","volume":"13","author":"G-B Xu","year":"2014","unstructured":"Xu, G.-B., Wen, Q.-Y., Gao, F., et al.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587\u20132594 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR52","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-015-1155-1","volume":"15","author":"ZW Sun","year":"2016","unstructured":"Sun, Z.W., Yu, J.P., Wang, P.: Efficient multi-party quantum key agreement by cluster states. Quantum Inf. Process. 15, 373\u2013384 (2016)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR53","doi-asserted-by":"publisher","first-page":"3483","DOI":"10.1007\/s11128-015-1060-7","volume":"14","author":"Y-F He","year":"2015","unstructured":"He, Y.-F., Ma, W.-P.: Quantum key agreement protocols with four-qubit cluster states. Quantum Inf. Process. 14, 3483\u20133498 (2015)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR54","doi-asserted-by":"publisher","first-page":"1920","DOI":"10.1007\/s10773-015-2831-8","volume":"55","author":"ZW Sun","year":"2016","unstructured":"Sun, Z.W., Zhang, C., Wang, P., et al.: Multi-party quantum key agreement by an entangled six-qubit state. Int. J. Theor. Phys. 55, 1920\u20131929 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"3317_CR55","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s11128-018-1871-4","volume":"17","author":"T Cai","year":"2018","unstructured":"Cai, T., Jiang, M., Cao, G.: Multi-party quantum key agreement with five-qubit brown states. Quantum Inf. Process. 17, 103 (2018)","journal-title":"Quantum Inf. Process."},{"key":"3317_CR56","doi-asserted-by":"publisher","first-page":"3505","DOI":"10.1007\/s10773-018-3865-5","volume":"57","author":"N-R Zhou","year":"2018","unstructured":"Zhou, N.-R., Min, S.-Q., Chen, H.-Y., et al.: Three-party quantum key agreement protocol with seven-qubit entangled states. Int. J. Theor. Phys. 57, 3505\u20133513 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"3317_CR57","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11128-019-2200-2","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Li, B.-R., Kang, S.-Y., et al.: New quantum key agreement protocols based on cluster states. Quantum Inf. Process. 18(2), 77 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"3317_CR58","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s11128-019-2187-8","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Gao, S., Li, D., et al.: Two-party quantum key agreement over a collective noisy channel. Quantum Inf. Process. 18(3), 74 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"3317_CR59","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/s10773-018-3944-7","volume":"58","author":"X-Q Zhao","year":"2019","unstructured":"Zhao, X.-Q., Zhou, N.-R., Chen, H.-Y., et al.: Multiparty quantum key agreement protocol with entanglement swapping. Int. J. Theor. Phys. 58(2), 436\u2013450 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"3317_CR60","doi-asserted-by":"publisher","first-page":"120405","DOI":"10.1103\/PhysRevLett.97.120405","volume":"97","author":"A Acin","year":"2006","unstructured":"Acin, A., Gisin, N., Masanes, L.: From Bell\u2019s theorem to secure quantum key distribution. Phys. Rev. Lett. 97, 120405 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"3317_CR61","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s11128-021-03062-8","volume":"20","author":"GB Xu","year":"2021","unstructured":"Xu, G.B., Jiang, D.H.: Novel methods to construct nonlocal sets of orthogonal product states in an arbitrary bipartite high-dimensional system. Quantum Inf. process. 20, 128 (2021)","journal-title":"Quantum Inf. process."},{"key":"3317_CR62","doi-asserted-by":"publisher","first-page":"032211","DOI":"10.1103\/PhysRevA.102.032211","volume":"102","author":"D-H Jiang","year":"2020","unstructured":"Jiang, D.-H., Xu, G.-B.: Nonlocal sets of orthogonal product states in an arbitrary multipartite quantum system. Phys. Rev. A 102, 032211 (2020)","journal-title":"Phys. Rev. A"},{"key":"3317_CR63","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.105.230501","volume":"105","author":"R Gallego","year":"2010","unstructured":"Gallego, R., Brunner, N., Hadley, C., Acin, A.: Device-independent tests of classical and quantum dimension. Phys. Rev. Lett. 105, 230501 (2010)","journal-title":"Phys. Rev. Lett."},{"key":"3317_CR64","doi-asserted-by":"publisher","first-page":"010302(R)","DOI":"10.1103\/PhysRevA.84.010302","volume":"84","author":"M Pawlowski","year":"2011","unstructured":"Pawlowski, M., Brunner, N.: Semi-device-independent security of one-way quantum key distribution. Phys. Rev. A 84, 010302(R) (2011)","journal-title":"Phys. Rev. A"},{"key":"3317_CR65","doi-asserted-by":"publisher","first-page":"034301","DOI":"10.1103\/PhysRevA.84.034301","volume":"84","author":"H-W Li","year":"2011","unstructured":"Li, H.-W., Yin, Z.Q., Wu, Y.C., et al.: Semi-device-independent random-number expansion without entanglement. Phys. Rev. A 84, 034301 (2011)","journal-title":"Phys. Rev. A"},{"key":"3317_CR66","doi-asserted-by":"publisher","first-page":"150503","DOI":"10.1103\/PhysRevLett.125.150503","volume":"125","author":"A Tavakoli","year":"2020","unstructured":"Tavakoli, A.: Semi-device-independent certification of independent quantum state and measurement devices. Phys. Rev. Lett. 125, 150503 (2020)","journal-title":"Phys. Rev. Lett."},{"key":"3317_CR67","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/0375-9601(87)90222-2","volume":"123","author":"ID Ivanovic","year":"1987","unstructured":"Ivanovic, I.D.: How to differentiate between non-orthogonal states. Phys. Lett. A 123, 257 (1987)","journal-title":"Phys. Lett. A"},{"key":"3317_CR68","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/0375-9601(88)90840-7","volume":"126","author":"D Dieks","year":"1988","unstructured":"Dieks, D.: Overlap and distinguishability of quantum states. Phys. Lett. A 126, 303 (1988)","journal-title":"Phys. Lett. A"},{"key":"3317_CR69","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/0375-9601(88)91034-1","volume":"128","author":"A Peres","year":"1988","unstructured":"Peres, A.: How to differentiate between non-orthogonal states. Phys. Lett. A 128, 19 (1988)","journal-title":"Phys. Lett. A"},{"key":"3317_CR70","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/BF03187604","volume":"6","author":"P Delsarte","year":"1977","unstructured":"Delsarte, P., Goethals, J.M., Seidel, J.J.: Spherical codes and designs. Geom. Dedicata. 6, 363 (1977)","journal-title":"Geom. Dedicata."},{"key":"3317_CR71","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1023\/A:1021323312367","volume":"18","author":"JJ Benedetto","year":"2003","unstructured":"Benedetto, J.J., Fickus, M.: Finite normalized tight frames. Adv. Comput. Math. 18, 357 (2003)","journal-title":"Adv. Comput. Math."},{"key":"3317_CR72","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1063\/1.1737053","volume":"45","author":"JM Renes","year":"2004","unstructured":"Renes, J.M., Blume-Kohout, R., Scott, A.J., Caves, C.M.: Symmetric informationally complete quantum measurements. J. Math. Phys. 45, 2171 (2004)","journal-title":"J. Math. Phys."},{"key":"3317_CR73","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.062311","volume":"101","author":"Y-G Yang","year":"2020","unstructured":"Yang, Y.-G., Yang, Y.-L., Lv, X.-L., Zhou, Y.-H., Shi, W.-M.: Examining the correctness of anonymity for practical quantum networks. Phys. Rev. A 101, 062311 (2020)","journal-title":"Phys. Rev. A"},{"key":"3317_CR74","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.122.240501","volume":"122","author":"A Unnikrishnan","year":"2019","unstructured":"Unnikrishnan, A., MacFarlane, Ian J., Yi, R., Diamanti, E., Markham, D., Kerenidis, I.: Anonymity for practical quantum networks. Phys. Rev. Lett. 122, 240501 (2019)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03317-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03317-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03317-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T20:06:53Z","timestamp":1675886813000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03317-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":74,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["3317"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03317-4","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"21 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"376"}}