{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T15:16:38Z","timestamp":1723475798708},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation","doi-asserted-by":"crossref","award":["62101197"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010031","name":"Postdoctoral Research Foundation of China","doi-asserted-by":"publisher","award":["2021M691148"],"id":[{"id":"10.13039\/501100010031","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Key Research and Development Plan of Hubei Province of China","award":["2021BAA038"]},{"name":"the project of Science, Technology and Innovation Commission of Shenzhen Municipality of China","award":["JCYJ20210324120002006","JSGG20210802153009028"]},{"name":"the 2021 Industrial Technology Basic Public Service Platform Project of the Ministry of Industry and Information Technology of PRC","award":["2021-0171-1-1"]},{"name":"the excellent youthful project Scientific research of Hunan Provincial Department of Education","award":["20B491"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-024-04350-9","type":"journal-article","created":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T10:02:07Z","timestamp":1713175327000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient single-state multi-party quantum key agreement"],"prefix":"10.1007","volume":"23","author":[{"given":"Hao","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4489-2488","authenticated-orcid":false,"given":"Songfeng","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Mu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bingyan","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Xianjing","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,15]]},"reference":[{"key":"4350_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffifie","year":"1976","unstructured":"Diffifie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4350_CR2","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M Steiner","year":"2000","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11, 769\u2013780 (2000)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"4350_CR3","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1049\/ip-cdt:20000531","volume":"147","author":"J Pieprzyk","year":"2000","unstructured":"Pieprzyk, J., Li, C.H.: Multiparty key agreement protocols. IEE Proc. Comput. Digital Tech. 147, 229\u2013236 (2000)","journal-title":"IEE Proc. Comput. Digital Tech."},{"issue":"4","key":"4350_CR4","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/49.839937","volume":"18","author":"G Ateniese","year":"2000","unstructured":"Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE J. Sel. Areas Commun. 18(4), 628\u2013639 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"4350_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175\u2013179. IEEE, New York (1984)"},{"key":"4350_CR6","doi-asserted-by":"publisher","first-page":"90312","DOI":"10.1007\/s11433-018-9224-5","volume":"61","author":"SS Chen","year":"2018","unstructured":"Chen, S.S., Zhou, L., Zhong, W., Sheng, Y.B.: Three-step three-party quantum secure direct communication. Sci. China Phys. Mech. Astron. 61, 90312 (2018)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"4350_CR7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.118.220501","volume":"118","author":"W Zhang","year":"2017","unstructured":"Zhang, W., Ding, D.S., Sheng, Y.B., Zhou, L., Shi, B.S., Guo, G.C.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"4350_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"4350_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-020-1603-7","volume":"63","author":"ZK Gao","year":"2020","unstructured":"Gao, Z.K., Li, T., Li, Z.H.: Deterministic measurement-device-independent quantum secret sharing. Sci. China Phys. Mech. Astron. 63, 120311 (2020)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"7","key":"4350_CR10","doi-asserted-by":"publisher","first-page":"70301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"4350_CR11","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11128-020-02732-3","volume":"19","author":"H Yang","year":"2020","unstructured":"Yang, H., Xiao, M.: Multi-user quantum private query. Quantum Inf. Process. 19, 253 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"12","key":"4350_CR12","doi-asserted-by":"publisher","first-page":"3160","DOI":"10.1016\/j.optcom.2011.02.017","volume":"284","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with w state. Opt. Commun. 284(12), 3160\u20133163 (2011)","journal-title":"Opt. Commun."},{"issue":"7","key":"4350_CR13","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s11128-019-2251-4","volume":"18","author":"PH Lin","year":"2019","unstructured":"Lin, P.H., Hwang, T., Tsai, C.W.: Efficient semi-quantum private comparison using single photons. Quantum Inf. Process. 18(7), 207 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"18","key":"4350_CR14","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1149 (2004)","journal-title":"Electron. Lett."},{"key":"4350_CR15","unstructured":"Tsai, C., Hwang, T.: On quantum key agreement protocol. Technical Report, C-S-I-E, NCKU, Taiwan, ROC (2009)"},{"key":"4350_CR16","unstructured":"Hsueh, C.C., Chen, C.Y.: Quantum key agreement protocol with maximally entangled states. In: Proceedings of the 14th Information Security Conference (ISC 2004), pp. 236\u2013242. National Taiwan University of Science and Technology, Taipei, Taiwan, 10\u201311 Jun (2004)"},{"key":"4350_CR17","unstructured":"Tsai, C.W., Chong, S.K., Hwang, T.: Comment on quantum key agreement protocol with maximally entangled states. In: Proceedings of the 20th Cryptology and Information Security Conference (CISC 2010), pp. 210\u2013213. National Chiao Tung University, Hsinchu, Taiwan, 27\u201328 May (2010)"},{"key":"4350_CR18","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s10773-011-0691-4","volume":"50","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Tsai, C.W., Hwang, T.: Improvement on \u201cquantum key agreement protocol with maximally entangled states\u2019\u2019. Int. J. Theor. Phys. 50, 1793\u20131802 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"4350_CR19","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11128-012-0443-2","volume":"12","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Zhong, H.: Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 12, 921\u2013932 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"4350_CR20","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s11128-012-0492-6","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12(4), 1797\u20131805 (2013)","journal-title":"Quantum Inf. Process."},{"key":"4350_CR21","doi-asserted-by":"publisher","first-page":"2113","DOI":"10.1007\/s11128-016-1264-5","volume":"15","author":"B Liu","year":"2016","unstructured":"Liu, B., Xiao, D., Jia, H.Y., et al.: Collusive attacks to \u201ccircle-type\u2019\u2019 multi-party quantum key agreement protocols. Quantum Inf. Process. 15, 2113\u20132124 (2016)","journal-title":"Quantum Inf. Process."},{"key":"4350_CR22","doi-asserted-by":"publisher","first-page":"17177","DOI":"10.1038\/s41598-019-53524-4","volume":"9","author":"Z Sun","year":"2019","unstructured":"Sun, Z., Cheng, R., Wu, C., et al.: New fair multiparty quantum key agreement secure against collusive attacks. Sci. Rep. 9, 17177 (2019)","journal-title":"Sci. Rep."},{"key":"4350_CR23","doi-asserted-by":"publisher","first-page":"102377","DOI":"10.1109\/ACCESS.2019.2931612","volume":"7","author":"ZW Sun","year":"2019","unstructured":"Sun, Z.W., Wu, C.H., Zheng, S.G., et al.: Efficient multiparty quantum key agreement with a single d-level quantum system secure against collusive attack. IEEE Access 7, 102377\u2013102385 (2019)","journal-title":"IEEE Access"},{"key":"4350_CR24","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-015-1155-1","volume":"15","author":"ZY Sun","year":"2016","unstructured":"Sun, Z.Y., Yu, J.P., Wang, P.: Efficient multi-party quantum key agreement by cluster states. Quantum Inf. Process. 15, 373\u2013384 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"4350_CR25","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1007\/s11128-014-0784-0","volume":"13","author":"C Shukla","year":"2014","unstructured":"Shukla, C., Alam, N., Pathak, A.: Protocols of quantum key agreement solely using Bell states and Bell measurement. Quantum Inf. Process. 13(11), 2391\u20132405 (2014)","journal-title":"Quantum Inf. Process."},{"key":"4350_CR26","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s11128-019-2346-y","volume":"18","author":"HN Liu","year":"2019","unstructured":"Liu, H.N., Liang, X.Q., Jiang, D.H., et al.: Multi-party quantum key agreement with four-qubit cluster states. Quantum Inf. Process. 18, 242 (2019)","journal-title":"Quantum Inf. Process."},{"key":"4350_CR27","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.104.042421","volume":"104","author":"S Lin","year":"2021","unstructured":"Lin, S., Zhang, X., Guo, G.D., et al.: Multiparty quantum key agreement. Phys. Rev. A 104, 042421 (2021)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"4350_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPHOT.2018.2797535","volume":"10","author":"B Cai","year":"2018","unstructured":"Cai, B., Guo, G., Lin, S., Zuo, H., Yu, C.: Multipartite quantum key agreement over collective noise channels. IEEE Photonics J. 10(1), 1\u201311 (2018)","journal-title":"IEEE Photonics J."},{"key":"4350_CR29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. Phys. Rev. Lett. 99, 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"4350_CR30","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11128-017-1736-2","volume":"16","author":"C Shukla","year":"2017","unstructured":"Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16, 295 (2017)","journal-title":"Quantum Inf. Process."},{"key":"4350_CR31","doi-asserted-by":"publisher","first-page":"3164","DOI":"10.1007\/s10773-017-3484-6","volume":"56","author":"WJ Liu","year":"2017","unstructured":"Liu, W.J., Chen, Z.Y., Ji, S., Wang, H.B., Zhang, J.: Multi-party semi-quantum key agreement with delegating quantum computation. Int. J. Theor. Phys. 56, 3164\u20133174 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"4350_CR32","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s10773-019-04288-0","volume":"59","author":"NR Zhou","year":"2020","unstructured":"Zhou, N.R., Zhu, K.N., Wang, Y.Q.: Three-party semi-quantum key agreement protocol. Int. J. Theor. Phys. 59, 663\u2013676 (2020)","journal-title":"Int. J. Theor. Phys."},{"key":"4350_CR33","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/s11128-022-03615-5","volume":"21","author":"TJ Xu","year":"2022","unstructured":"Xu, T.J., Chen, Y., Geng, M.J., et al.: Single-state multi-party semiquantum key agreement protocol based on multi-particle GHZ entangled states. Quantum Inf. Process. 21, 266 (2022)","journal-title":"Quantum Inf. Process."},{"key":"4350_CR34","doi-asserted-by":"publisher","first-page":"13251","DOI":"10.1038\/ncomms13251","volume":"7","author":"W McCutcheon","year":"2016","unstructured":"McCutcheon, W., Pappa, A., Bell, B., et al.: Experimental verification of multipartite entanglement in quantum networks. Nat Commun. 7, 13251 (2016)","journal-title":"Nat Commun."},{"issue":"1\u20132","key":"4350_CR35","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"key":"4350_CR36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)","journal-title":"Phys. Rev. A"},{"key":"4350_CR37","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"4350_CR38","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11128-022-03767-4","volume":"22","author":"A Dutta","year":"2022","unstructured":"Dutta, A., Pathak, A.: Controlled secure direct quantum communication inspired scheme for quantum identity authentication. Quantum Inf. Process. 22(1), 13 (2022)","journal-title":"Quantum Inf. Process."},{"key":"4350_CR39","unstructured":"Dutta, A., Pathak, A.: Collective attack free controlled quantum key agreement without quantum memory. arXiv:2308.05470 (2023)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04350-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-024-04350-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04350-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T18:19:16Z","timestamp":1714501156000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-024-04350-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":39,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["4350"],"URL":"http:\/\/dx.doi.org\/10.1007\/s11128-024-04350-9","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,15]]},"assertion":[{"value":"27 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"150"}}