Abstract
Fairness is an important standard needed to be considered in a secure quantum key agreement (QKA) protocol. However, it found that most of the quantum key agreement protocols in the travelling model are not fair, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. Thus, how to construct a fair and secure key agreement protocol has obtained much attention. In this paper, a new fair multiparty QKA protocol that can resist the collusive attack is proposed. More specifically, we show that in a client-server scenario, it is possible for the clients to share a key and reveal nothing about what key has been agreed upon to the server. The server prepares quantum states for clients to encode messages to avoid the participants’ collusive attack. This construction improves on previous work, which requires either preparing multiple quantum resources by clients or two-way quantum communication. It is proven that the protocol does not reveal to any eavesdropper, including the server, what key has been agreed upon, and the dishonest participants can be prevented from collaborating to predetermine the final key.
Subject terms: Quantum physics, Quantum information
Introduction
It has been proven that Shor’s algorithm can factor a large number and calculate the discrete logarithms in polynomial time by using a quantum computer. With the development of research on quantum computers, small-scale quantum computers have already been created by large companies and organisations around the world. If large-scale quantum computers become available in the not-too-distant future, current public-key cryptosystems like RSA or elliptic curves will become insecure. To solve this problem, it is necessary to select new techniques that are not vulnerable to quantum computers and to design, analyse, and implement new cryptographic schemes based on these techniques.
Quantum cryptography is a study of carrying out cryptographic tasks using the properties of quantum mechanics. Quantum key distribution (QKD), as a famous instance of quantum cryptographic tasks, enjoys information-theoretical security to exchange the key. QKD can detect outside attacks aiming at learning about the secret key by measuring the quantum system. However, the uncertainty principle shows that measuring a quantum system will unavoidable disturb it, which provides a method of detecting the presence of eavesdropping. A quantum cryptographic protocol is secure if no information about the secret key is leaked; otherwise, it will be aborted. So far various subfields of quantum cryptography have emerged to offer different functions, such as quantum secure direct communication1–9, quantum private comparison10–14, quantum signature15,16, and quantum oblivious transfer17.
In the past years, quantum key agreement (QKA) protocols have received much attention in the quantum cryptography world. Compared with quantum key distribution where one sends a generated key to the other one, quantum key agreement allows multiple parties to collaborate to equally produce a shared key. The security of QKA requires that no partial corrupted parties can determine the shared key and no information about the shared key can be obtained by any eavesdropper. There were only two parties involved in quantum key agreement protocols when they were studied at the beginning18–24. Later, they are generalized to the scenario where multiple parties are considered25–36.
Unfortunately, Liu et al. showed that part of the parties in a multiparty QKA protocol can predetermine the final agreed key before the end of the protocol37. In other words, most of the existing QKA protocols cannot resist collusive attack. One reason that the collusive attack can succeed in multiparty QKA protocols is that the malicious participants can share the the initial prepared quantum states with each other. When two parties in the particular position, they can calculate the bitwise exclusive OR result of all the other’s secret key. With the result, they are able to predetermine the final agreed key. Thus, how to design a key agreement protocol which can be secure against collusive attack has obtained much attention38–40. On the other hand, a number of protocols have emerged where a user with limited quantum capabilities, delegates tasks to a server, who has the completely quantum power, which is known as delegated quantum computation17. Based on the idea of delegated quantum computation, we propose a multiparty QKA protocol in the client-server model.
Preliminaries
Let us review the existing travelling-type multi-party quantum key agreement (MQKA) protocol and the collusive attacks. Suppose that N participants P0, …, PN−1 have secret bit-string keys K0, …, KN−1, respectively.
Short review of the travelling-type MQKA protocol
We will review the travelling-type MQKA protocol here, which has been discussed in ref. 37.
In the preparation stage, Pi (i = 0, …, N − 1) generates many entangled states, each of which is then divided into two parts. One of them called “the home qubit sequence” (denoted as Ri) will be kept, and the other one called “the travel qubit sequence” (denoted as Si) will be sent out. Pi then generates decoy particles that are later inserted into Si. The inserted Si is denoted as . P0, …, PN−1 stand in a circle such that Pi’s neighborhoods are Pi−1modN and Pi+1modN (P0, …, PN−1). All the are sent to Pi+1modN. When all the have been received by Pi+1modN, they detect attacks and encode Ki+1modN into Si (by removing decoy particles from Si)′). Afterward, decoy particle will be inserted into the encoded sequence and the new sequence will be sent to next participant. This process is similar to what Pi does in the previous step. Each participant repeats this process. After all participants finish the above process, Si forms a complete circle. Si is then measured by Pi who obtains K0 ⊕ K1 ⊕ … ⊕ Ki−1 ⊕ Ki+1 ⊕… ⊕ KN−1. Finally, all participants can get the shared key.
Liu’s collusive attacks against CT-MQKA protocol
Liu’s collusive attacks37 consist of two stages. The first stage is the key-stealing stage and the the second stage is the key-flipping stage. In the first stage, the corrupted participants do their best to collaborate to computer the bitwise XOR outcome of the others’ secret keys by exploiting various quantum resources. In the second stage, they then change the encoded keys in accordance with the above outcome to determine a fake shared key.
It has been shown in ref. 37 that any two parties Pi and Pj (i > j) can control the shared key if the following conditions hold:
| 1 |
| 2 |
Once Eq. (1) or Eq. (2) holds, the following attack can be launched by Pi and Pj. For easy described the attack, suppose N is an even number.
The key-stealing stage:
When the protocol starts, Pi and Pj share the knowledge of Ri, Si, Ki and Rj, Sj, Kj and the expected fake key K′.
In the (i − j)-th period when Pj starts the protocol, upon receiving Sj, Pi is able to attain the bitwise XOR result of Kj+1, Kj+2, …, Ki−1 according to the measurement outcomes of Rj and Sj. Analogously, Pj could obtain the XOR result of Ki+1, Ki+2, …, Kj−1 in the (N − i + j)-th period when Pi starts the protocol.
Pi and Pj exchange the above bitwise XOR results. Then, they can compute the legal shared key K in the i − j period in advance.
-
2.
The key-flipping stage:
Suppose K′ is the fake key that collusive participants want to share. In the i − j period, Pi and Pj encode instead of Ki, and instead of Kj respectively. One can verify that any participant will obtain the fake final shared key K′.
Results
The proposed fair multiparty QKA protocol
In the above attack, any two malicious parties Pi and Pj in particular positions can exchange the information about their initial prepared quantum states. Then they can collaborate with other to compute the the final shared key K before the last period. They can finally predetermine the fake key based on these information. Most MQKA protocols are therefore insecure against collusive attacks. To achieve the fairness property, two conditions should be removed. The first one is that the information about the initial prepared states cannot be shared among collusive parties. Without these information, any two malicious parties can obtain nothing about other parties’ keys. Thus, they cannot compute the final shared key K in advance. There is no way for them to generate a fake final shared key. In order to launch Liu’s attack37, all quantum states generated by the honest parties should pass the malicious parties at least once. The situations in Sun’s protocols33,38, are a little different. The travelling model is divided into parts. Since the malicious parties are limited to only part of information about the other parties’ keys before the last period, which makes them fail to computer the bitwise XOR outcomes of all the other’s secret keys any more. In such way, Sun’s protocols are secure against t-party collusive attacks. Here, t < N.
The first method will be employed to devise a fair MQKA protocol in this work. To make the collusive parties share nothing about the initial prepared states among them, these parties are restricted to generating initial states. The stage of initial states is delegated to a server. The server plays a role of generating the initial states, forwarding them to parties and announcing the generated initial states in the last period via authenticated classical channels. We assume that the server is semi-honest. In other words, the server will honestly follow the protocol and cannot collude with any other party but she may try to learn about extra information about the parties’ secret keys, other than what the process of the protocol naturally implies. The parties are then only required to make measurements and do unitary operations. We also assume that the classical channels in our protocol are authenticated and the quantum channels are lossless and noiseless.
Suppose participants P1, …, PN−1 have secret m-bit keys K0, …, KN−1, respectively, they intend to generated a shared key K such that K = K0 ⊕ … ⊕ Ki ⊕ … ⊕ KN−1. The participants stand in a circle in the following way: Pi has Pi−1 and Pi+1 as his left and right neighbors, respectively, where Pi±N = Pi for 0 < = i < N.
Generally, our protocol will reveal nothing about the shared key to any eavesdropper, including the server. And it is also secure against the collusive attacks.
The detailed steps of our protocol can be described in the following:
Preparation stage: The server prepares N sequences , which are called the message sequences. Sequence consists of m ordered single photons. Each single photon is randomly selected from . To check for eavesdropping, the server prepares another N sequences which is called the decoy sequence, and the decoy sequence ) consists of m ordered single photons. The single photon is randomly in one of the states . Here, , which are called decoy states. For all , the server randomly inserts Ci into Si to get a new sequence which is called the travelling sequence, and sends to Pi.
Detection stage: After confirming that all the N parties, , have received the message sequences sent from the server, the server publishes the positions and corresponding bases of the decoy sequence in the travelling sequence. Based on these information, for , Pi can measure Ci in the correct bases. Then, he/she stores the measurement results and randomly publishes half of the measurement outcomes. Correspondingly, the server publishes the information of the initial states of the other half of Ci. By comparing the measurement results of the decoy sequence with their corresponding initial states, the server and Pi can calculate the error rate. If the error rate is lower than the predetermined threshold value, the protocol will be proceeded; otherwise, the protocol will be aborted and restarted from Step 1.
After the detection stage, Pi obtains the secure travelling sequence Si. Here, . Each party , performs the following steps:
Encoding stage: Pi encodes Ki onto Si by the following encoding rule: when the classical bit of the ki is 1, the unitary operation is performed onto Si. Otherwise, the identity unitary operation is made. The role of unitary operator U is to flip the quantum states, in other words, . Then Pi rearranges the m decoy states generated by server in Step 1, and randomly inserts them into the encoded sequence to get a new one which is denoted as . After the above encoding stage, Pi forwards to Pi+1.
Eavesdropping check stage: The eavesdropping check stage is similar to the server and Pi did in Step 2. In other words, when Pi+1 has received the sequence from Pi, Pi tells Pi+1 the decoy states’ positions and the corresponding bases in the sequence . According to these information, Pi+1 measures the decoy sequence in the corresponding correct bases, stores them and randomly announces half of the measurement result. Then, Pi publishes the initial states of the other half decoy sequence. According to the announced information, i.e., the measurement results of the decoy sequence and the initial decoy sequence, they can calculate the error rate. If the error rate is lower than the predetermined threshold value, the protocol will be proceeded; otherwise, the protocol will be aborted and restarted from Step 1.
Encoding stage: After the detection phase, Pi+1 obtains the message sequence Si. He then encodes Ki+1 onto Si by the encoding rule in Step (1). Then Pi+1 rearranges the m decoy states, and randomly inserts the decoy states into the encoded sequence to get a new one which is denoted as . After the above encoding stage, Pi+1 forwards to Pi+2.
Then, the N − 1 participants, repeatedly execute the eavesdropping check stage and encoding state in the same way as in Steps (2) and (3).
When Pi−1 receives from Pi−2, Pi−1 and Pi−2 check for eavesdropping with the decoy states method. If the transmission is secure, Pi−1 discards the decoy states and obtains the secure message sequence Si, and he announces this fact to server.
-
4.
Once all the Pi−1 obtains the secure message sequence Si, the server announces the positions and corresponding bases of the Si to Pi−1. For each participant Pi−1, he then measures each of the message sequence Si in the corresponding bases to obtain an m-bit string . Then Pi−1 can deduce the final shared key . Here, .
Note that the above protocol is considered in the semi-honest model, if there are malicious parties, the shared key K may be not identical. In order to prevent them from fooling the honest one, the N participants can randomly select parts of the K to detect eavesdropping. If there is no malicious party, the rest of the K will be the final shared key. The following section will discuss the security analysis of the presented protocol.
Security analysis of the proposed protocol
First, we prove that the proposed protocol is secure against external eavesdropping. Then, we show that it is immune to attacks from internal eavesdropping.
Security against external eavesdropping
To detect outside eavesdropping, the decoy-state method is used in the presented protocol. The decoy-state method uses several non-orthogonal single states, , which are randomly inserted in the message sequence. Because of quantum indistinguishability, Eve cannot distinguish between the message sequence and the decoy states. The Eve may apply the same operation on all the quantum states. Usually, the operation Eve makes is denoted as UE which causes the message sequence to interact coherently with an auxiliary quantum system , which can be denoted as follows:
| 3 |
| 4 |
where and . In the following part, we will prove that any malicious behavior by Eve will inevitably modify the photon statistic and expose her.
Since the decoy states involved in our protocol are , , and , if Eve introduces no error in the eavesdropping check by participants, the general operation UE must satisfy the following conditions:
| 5 |
| 6 |
| 7 |
| 8 |
From the above Eqs. (5–8), we can get
| 9 |
| 10 |
| 11 |
| 12 |
Here 0 denotes a column zero vector. Further, we can get a = d = 1, b = c = 0 and . Therefore,
| 13 |
| 14 |
| 15 |
| 16 |
i.e., Eve introduces no error in the eavesdropping only when her ancillary state and the target photon are product states. So outside eavesdroppers cannot obtain the shared key without being detected. In addition, each transmission of the qubit sequences is not a closed ring, i.e., the transmission is not a two-way quantum channel any more. Thus, the Trojan horse and invisible photon attacks can be naturally resisted.
Security against internal eavesdropping
As known to all, the dishonest parties in a protocol have more power than those from external eavesdroppers to attack the protocol. The dishonest parties can lie in the eavesdropping check stage or substitute the message sequence with their desired message sequence in order to predetermine the final shared key. Thus, all the proposed QKA protocols need to be secure against internal dishonest parites’ attack.
Liu’s collusive attack can be divided into two stages37: the key stealing stage and the key flipping stage. The key stealing stage or the key flipping stage must be destroyed in order to design a secure QKA protocol. In this paper, the proposed protocol which is secure in the stealing stage is analyzed as follows:
We first consider the worst case that there are N − 1 dishonest parties and only one honest party, . In order to predetermine the final shared key, the N − 1 dishonest parties need to obtain private key Kt before quantum sequence St+1 is sent to Pt. If the dishonest parties have already obtained Kt, they can launch the following attack: When TP sends the message sequence St+1 to Pt+1. Then, the N − 1 dishonest participant just forward the message sequence St+1 to the next one using the decoy method. If Pt−1 receives St+1 from Pt−2, after the eavesdropping check stage, Pt−1 encodes Kt ⊕ K′ onto St+1, and sends the new sequence to Pt in the secure way. When the server announces the positions and corresponding bases of the St+1 to Pt in step 4, it is easy to verify that the final key Pt obtained is the fake key Kt ⊕ Kt ⊕ K′ = K′.
Fortunately, we will show that it is impossible to obtain private key Kt before quantum sequence St+1 is sent to Pt in our protocol. Since the initial quantum states are prepared by server and the server honestly executes the protocol and does not cooperate with any participant. He will not leak any information about the initial prepared quantum states to any participant before the step 4. In order to obtain Kt, the only way for the dishonest parties is to measure the message sequence just like the external Eve does. However, security against external eavesdropping has been proven in the above subsection. Thus, this kind of internal attack can be prevented.
Secondly, some dishonest parties may just intend to fool some parties, making the legitimate parties accept the fake key K′ as the final shared key K. For example, when TP sends the message sequence St+1 to Pt+1, the dishonest Pt+1 can encode Kt+1 ⊕ Kf in the encoding stage in order to fool the honest party Pt. Here, , the key Kf is used to fool Pt. When the server announces the positions and corresponding bases of the St+1 to Pt in step 4, it is easy to verify that the final shared key of Pt is the fake key Kf ⊕ K. In order to detect the malicious behavior of the dishonest parties, the N parties can randomly choose part of the final shared key K to detect the error when they have already obtained K. If the error rate is higher than predetermined value, the protocol is abort. Otherwise, the rest bit of K is used for the final key.The details can be found in ref.41.
Thirdly, the server may also try to learn extra information about participants’ secret key from the protocol execution. Notice that the presented protocol is a one-way quantum channel, the server prepares the initial quantum states and sends them to the participant, but these quantum states will not be sent back to server. Thus, if the server tries to learn extra information about participants’ secret key, he/she may need to measure the quantum channel, just like the external attackers do. Because of the decoy states method, this attack can be detected in the presented protocol. Thus, the server cannot get any information about the parties’ secret key. If the server uses Trojan horse or invisible photon attacks, the method in ref.42 can be used to resist these attacks.
Efficiency
In this section, we compare the qubit efficiency of different MQKA protocols. The qubit efficiency is defined as 41. Here, c represents the length of the final shared key, q denotes the number of the qubits required for encoding and eavesdropping process and b refers to the number of bits needed for decoding process.
In our N-party QKA protocol, in order to share a m-bit secret key, m single photons are used, and m decoy qubits are required in every transmission and N rounds of transmission are involved. Totally, N(m + m) qubits should be required. The server announces mN bits to the parties to decode the shared key. The qubit efficiency is therefore . However, in order to be secure against collusive attacks, the proposed protocol needs the server’s help. Meanwhile, the initial qubits preparation is delegated to the server, while participants just make measurement and do unitary operations on them, which makes our protocol more practical. Table 1 shows the efficiency comparison of our protocol and several existing secure MQKA protocols. As we can see in Fig. 1, if there are more than four parties involved in MQKA protocols, our protocol efficiency becomes much better than that of other protocols.
Table 1.
Efficiency comparison. For easier comparison, let the key length is m, the number of participants is N, the detection rate κ = 1, the dishonest participants t = N − 1.
| QKA protocol | η | participants prepare message states | TP | Collusive Attacks |
|---|---|---|---|---|
| LGHW protocol | mN (N − 1) | No | Secure | |
| HSX protocol | mN | No | Secure | |
| WSH protocol | mN (N − 1) | No | Secure | |
| Ours | 0 | Yes | Secure |
Figure 1.

Efficiency comparison of the different protocols, where κ = 1 and N = 2, 3, …, 10.
Conclusion
In conclusion, we proposed a multiparty quantum key agreement protocol which can resist Liu’s collusion attack which is presented in the ref.37. To prevent the Liu’s attack, the participants are restricted to preparing the initial quantum states in the proposed protocol. The stage of initial quantum states preparation is delegated to a server. It is proven that the protocol does not reveal the final shared key to any eavesdropper, including the server. And the participants involved in the protocol no longer need to prepare quantum states for message encoding, which makes the protocol more practical. And the main contribution of the paper is that we proposed a new model for quantum key agreement in client-server model, which protects the honest participants’ fairness.
Acknowledgements
This work is funded by the National Natural Science Foundation of China (Nos 61602316, 61902132, 11647140, 61902081), the Science and Technology Innovation Projects of Shenzhen (No. JCYJ20170818140234295), the Natural Science Foundation of Guangdong Province, China (Nos 2018A030310147, 2018A030313974, 2015A030313630),and the Science and Technology Planning Project of Guangdong (No. 2018A050506087). Cai Zhang is sponsored by the State Scholarship Fund of the China Scholarship Council.
Author contributions
Study conception, design, and writing of the manuscript: Z.S. and C.Z. Analysis and discussion: R.C. and C.W. All authors reviewed the manuscript.
Competing interests
The authors declare no competing interests.
Footnotes
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Long G-L, Liu X-S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A. 2002;65:032302. doi: 10.1103/PhysRevA.65.032302. [DOI] [Google Scholar]
- 2.Deng F-G, Long GL, Liu X-S. Two-step quantum direct communication protocol using the einstein-podolsky-rosen pair block. Phys. Rev. A. 2003;68:042317. doi: 10.1103/PhysRevA.68.042317. [DOI] [Google Scholar]
- 3.Deng F-G, Long GL. Secure direct communication with a quantum one-time pad. Phys. Rev. A. 2004;69:052319. doi: 10.1103/PhysRevA.69.052319. [DOI] [Google Scholar]
- 4.Zhang W, et al. Quantum secure direct communication with quantum memory. Phys. review letters. 2017;118:220501. doi: 10.1103/PhysRevLett.118.220501. [DOI] [PubMed] [Google Scholar]
- 5.Zhu F, Zhang W, Sheng Y, Huang Y. Experimental long-distance quantum secure direct communication. Sci. Bull. 2017;62:1519–1524. doi: 10.1016/j.scib.2017.10.023. [DOI] [PubMed] [Google Scholar]
- 6.Chen S-S, Zhou L, Zhong W, Sheng Y-B. Three-step three-party quantum secure direct communication. Science China Physics, Mech. & Astron. 2018;61:90312. doi: 10.1007/s11433-018-9224-5. [DOI] [Google Scholar]
- 7.Wu F, et al. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states. Sci. China Physics, Mech. & Astron. 2017;60:120313. doi: 10.1007/s11433-017-9100-9. [DOI] [Google Scholar]
- 8.Sun ZW, Du RG, Long DY. Quantum secure direct communication with quantum identification. Int. J. Quantum Inf. 2012;10:1250008. doi: 10.1142/S0219749911008386. [DOI] [Google Scholar]
- 9.Sun ZW, Du RG, Long DY. Quantum secure direct communication with two photon four-qubit cluster states. Int. J. Theor. Phys. 2012;51:1946–1952. doi: 10.1007/s10773-011-1072-8. [DOI] [Google Scholar]
- 10.Liu WJ, Liu C, Liu ZH, Liu JF, Geng HT. Same initial states attack in yang et al.’s quantum private comparison protocol and the improvement. Int. J. Theor. Phys. 2014;53:271–276. doi: 10.1007/s10773-013-1807-9. [DOI] [Google Scholar]
- 11.Liu WJ, et al. Improvement on “an efficient protocol for the quantum private comparison of equality with w state”. Int. J. Quantum Inf. 2014;12:1450001. doi: 10.1142/S0219749914500014. [DOI] [Google Scholar]
- 12.Wen Jie L, Chao L. Han Wu, C., Zhi Qiang, L. & Zhi Hao, L. Cryptanalysis and improvement of quantum private comparison protocol based on bell entangled states. Commun. Theor. Phys. 2014;62:210. doi: 10.1088/0253-6102/62/2/07. [DOI] [Google Scholar]
- 13.Sun ZW, Long DY. Quantum private comparison protocol based on cluster states. Int. J. Theor. Phys. 2013;52:212–218. doi: 10.1007/s10773-012-1321-5. [DOI] [Google Scholar]
- 14.Sun ZW, Yu JP, Wang P, Xu LL, Wu CH. Quantum private comparison with a malicious third party. Quantum Inf. Process. 2015;14:2125–2133. doi: 10.1007/s11128-015-0956-6. [DOI] [Google Scholar]
- 15.Li Q, Chan WH, Long DY. Arbitrated quantum signature scheme using bell states. Phys. Rev. A. 2009;79:054307. doi: 10.1103/PhysRevA.79.054307. [DOI] [Google Scholar]
- 16.Zou X, Qiu D. Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A. 2010;82:042325. doi: 10.1103/PhysRevA.82.042325. [DOI] [Google Scholar]
- 17.Sun Z, Yu J, Wang P, Xu L. Symmetrically private information retrieval based on blind quantum computing. Phys. Rev. A. 2015;91:052303. doi: 10.1103/PhysRevA.91.052303. [DOI] [Google Scholar]
- 18.Zhou N, Zeng G, Xiong J. Quantum key agreement protocol. Electron. Lett. 2004;40:1149–1150. doi: 10.1049/el:20045183. [DOI] [Google Scholar]
- 19.Tsai, C. & Hwang, C. W. On quantum key agreement protocol. Tech. Report, C-S-I-E, NCKU, Taiwan, ROC (2009).
- 20.Chong SK, Tsai CW, Hwang T. Improvement on “quantum key agreement protocol with maximally entangled states”. Int. J. Theor. Phys. 2011;50:1793–1802. doi: 10.1007/s10773-011-0691-4. [DOI] [Google Scholar]
- 21.Chong SK, Hwang T. Quantum key agreement protocol based on bb84. Opt. Commun. 2010;283:1192–1195. doi: 10.1016/j.optcom.2009.11.007. [DOI] [Google Scholar]
- 22.Huang W, Wen QY, Liu B, Gao F, Sun Y. Quantum key agreement with epr pairs and single-particle measurements. Quantum Inf. Process. 2014;13:649–663. doi: 10.1007/s11128-013-0680-z. [DOI] [Google Scholar]
- 23.Shen DS, Ma WP, Wang L-L. Two-party quantum key agreement with four-qubit cluster states. Quantum Inf. Process. 2014;13:2313–2324. doi: 10.1007/s11128-014-0785-z. [DOI] [Google Scholar]
- 24.He YF, Ma WP. Quantum key agreement protocols with four-qubit cluster states. Quantum Inf. Process. 2015;14:3483–3498. doi: 10.1007/s11128-015-1060-7. [DOI] [Google Scholar]
- 25.Shi RH, Zhong H. Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 2013;12:921–932. doi: 10.1007/s11128-012-0443-2. [DOI] [Google Scholar]
- 26.Liu B, Gao F, Huang W, Wen QY. Multiparty quantum key agreement with single particles. Quantum Inf. Process. 2013;12:1797–1805. doi: 10.1007/s11128-012-0492-6. [DOI] [Google Scholar]
- 27.Sun Z, Zhang C, Wang B, Li Q, Long D. Improvements on “multiparty quantum key agreement with single particles”. Quantum Inf. Process. 2013;12:3411–3420. doi: 10.1007/s11128-013-0608-7. [DOI] [Google Scholar]
- 28.Yin XR, Ma W-P, Liu WY. Three-party quantum key agreement with two-photon entanglement. Int. J. Theor. Phys. 2013;52:3915–3921. doi: 10.1007/s10773-013-1702-4. [DOI] [Google Scholar]
- 29.Yin XR, Ma WP, Shen DS, Wang LL. Three-party quantum key agreement with bell states. Acta Phys. Sinica. 2013;62:170304. [Google Scholar]
- 30.Shukla C, Alam N, Pathak A. Protocols of quantum key agreement solely using bell states and bell measurement. Quantum Inf. Process. 2014;13:2391–2405. doi: 10.1007/s11128-014-0784-0. [DOI] [Google Scholar]
- 31.Zhu ZC, Hu AQ, Fu AM. Improving the security of protocols of quantum key agreement solely using bell states and bell measurement. Quantum Inf. Process. 2015;14:4245–4254. doi: 10.1007/s11128-015-1110-1. [DOI] [Google Scholar]
- 32.Sun Z, Yu J, Wang P. Efficient multi-party quantum key agreement by cluster states. Quantum Inf. Process. 2016;15:373–384. doi: 10.1007/s11128-015-1155-1. [DOI] [Google Scholar]
- 33.Sun Z, et al. Multi-party quantum key agreement by an entangled six-qubit state. Int. J. Theor. Phys. 2016;55:1920–1929. doi: 10.1007/s10773-015-2831-8. [DOI] [Google Scholar]
- 34.Huang W, Wen QY, Liu B, Su Q, Gao F. Cryptanalysis of a multi-party quantum key agreement protocol with single particles. Quantum Inf. Process. 2014;13:1651–1657. doi: 10.1007/s11128-014-0758-2. [DOI] [Google Scholar]
- 35.Cao H, Ma W. Multiparty quantum key agreement based on quantum search algorithm. Sci. reports. 2017;7:45046. doi: 10.1038/srep45046. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 36.Liu WJ, Chen ZY, Ji S, Wang HB, Zhang J. Multi-party semi-quantum key agreement with delegating quantum computation. Int. J. Theor. Phys. 2017;56:3164–3174. doi: 10.1007/s10773-017-3484-6. [DOI] [Google Scholar]
- 37.Liu B, Xiao D, Jia HY, Liu RZ. Collusive attacks to “circle-type” multi-party quantum key agreement protocols. Quantum Inf. Process. 2016;15:2113–2124. doi: 10.1007/s11128-016-1264-5. [DOI] [Google Scholar]
- 38.Wang P, Sun Z, Sun X. Multi-party quantum key agreement protocol secure against collusion attacks. Quantum Inf. Process. 2017;16:170. doi: 10.1007/s11128-017-1621-z. [DOI] [Google Scholar]
- 39.Huang W, et al. Improved multiparty quantum key agreement in travelling mode. Science China Physics, Mech. & Astron. 2016;59:120311. doi: 10.1007/s11433-016-0322-3. [DOI] [Google Scholar]
- 40.Huang W, et al. Efficient multiparty quantum key agreement with collective detection. Sci. reports. 2017;7:15264. doi: 10.1038/s41598-017-15227-6. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 41.Sun Z, Wu C, Zheng S, Zhang C. Efficient multiparty quantum key agreement with a single d -level quantum system secure against collusive attack. IEEE Access. 2019;7:102377–102385. doi: 10.1109/ACCESS.2019.2931612. [DOI] [Google Scholar]
- 42.Li XH, Deng F, Zhou HY. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A. 2006;74:054302. doi: 10.1103/PhysRevA.74.054302. [DOI] [Google Scholar]
