Abstract
Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.
Subject terms: Quantum information, Computer science
Introduction
The concept of the key agreement was first presented by Diffie–Hellman in 19761. It describes how two remote users can fairly generate a secured shared key based on their private inputs. In 1982, Ingemarsson et al.2 extended the two-party key agreement protocol to a multiparty or group key agreement protocol. After that, several multiparty key agreement schemes have been published3. However, future quantum computers with sufficient power could threaten the security of many of the current public-key cryptosystems whose security mainly relies on unproven mathematical assumptions4,5. For that reason, quantum applications in cryptography have attracted the attention of a lot of scientists and researchers to suggest and develop information-theoretically unconditional secure cryptosystems. One of the most common quantum cryptographic applications is quantum key distribution (QKD)6, in which remote participants can establish a shared random key securely even in the presence of an attacker with unlimited classical or quantum computing power. Subsequently, several quantum cryptographic applications have been introduced to solve various classical security issues7–16.
Recently, quantum key agreement (QKA) has attracted the attention of a lot of researchers17. QKA ensures fairness between the involved participants to generate a shared secure key based on their private inputs. Using the quantum teleportation protocol, Zhou et al.17, in 2004, presented the first two-party QKA scheme. In 2013, the two-party QKA was extended to multiparty QKA protocols18. Subsequently, several multiparty QKA protocols have been presented19–22. In general, as noted in18, there are three types of MQKA protocols; (1) the first type is the tree-type in which every party sends their secret data through independent quantum channels to all other parties23; (2) the second type is the complete-graph-type in which every participant sends a sequence of qubits to each of the others parties to encode her or his secret information, (3) while in the third type that is the circle-type (sometimes called travelling-mode)8,24, every party generates a random sequence of qubits and sends this sequence to another party who applies an encoding process producing a new evolved sequence of qubits and sends the new sequence to the next party; this process continues over all parties until the evolved sequence reaches the party who generates the first sequence. Compared to the other QKA types, the circle-type is more efficient and more easily achieves the property of fairness. For that reason, the QKA circle-type has been intensively investigated.
In 2016, Liu et al.18 pointed out that all existing circle-type multiparty quantum key agreement (CT-MQKA) protocols are vulnerable to collusive attack, and asked a challenging question about the possibility of designing a secure CT-MQKA protocol. In response to this question, several CT-MQKA protocols have been proposed to avoid collusive attacks. However, in this work, we show that many of the existing CT-MQKA protocols are also not secure against a collusive attack. We study, as an example, the security of Sun et al.’s19 MQKA protocol (named SCWZ protocol hereafter) to show the vulnerability of the existing CT-MQKA protocols to collusive attacks. Furthermore, we design a general secure model for CT-MQKA protocols and propose the necessary steps for this model.
The insecurity of existing CT-MQKA protocols
In this section, we show that many of the recently published works in CT-MQKA are not secure against collusive attacks19–21,25,26. In general, there are two main collusive attack strategies, which could be applied to the CT-MQKA protocols:
The first collusive attack strategy
The first collusive attack strategy has been pointed out in18,19. Any two dishonest participants and (where ; and is the number of participants) in particular positions in the circle-type protocols can control the final key if their particular positions meet the following two conditions:
| 1 |
| 2 |
The second collusive attack strategy
The second collusive attack strategy can be described as follows. In the CT-MQKA schemes, any two dishonest participants and can steal the private inputs of an honest participant () without being detected, if their positions meet one of the two following conditions:
| 3 |
| 4 |
Note, in our previous work8, we mentioned that two malicious users may try to deduce the private information of an honest one. However, in this work, we formulate and describe the general situation in which two dishonest participants can steal the private information of the honest ones as indicated in Eqs. (3) and (4).
Review of SCWZ’s protocol
In SCWZ’s protocol19, there are participants and each participant () has an key (). The participants want to generate a shared secret key fairly, where . The steps of the SCWZ’s protocol can be described as follows.
Preparation phase. The server generates sequences of random single-photons. Each sequence () contains single-photons and each photon is selected randomly from the four states {}, where . The server also generates sequences of random single photons (called ), which are used as decoy photons to check the existence of eavesdroppers. Each single decoy photon is randomly selected from the states {}, where . The server then randomly inserts and distributes the single-photons of into getting a new sequence , and sends the new sequence () to .
Detection phase. Upon receiving , each participant sends an acknowledgment to the server. Then the server announces the positions of and their measurement bases. Each measures based on the corresponding measurement bases and stores the results. then randomly announces half of the measurement results of ; the server, in turn, announces the initial states of the second half of . Then both the server and collaborate to compute the error rate. They end the protocol if the error rate higher than a predefined value. Otherwise, they continue with the protocol.
- After gets the secure sequence , each participant performs the next sub-steps:
-
A.Encoding phase. encodes secret information () onto by applying the unitary operation when the classical bit of the secret is 1, and the unitary operation when the classical bit is 0. then reorders the decoy states that were prepared and inserted by the server in Step (1) and reinserts them in random positions into the encoded sequence obtaining a new sequence (), and sends to .
-
B.Eavesdropping check phase. Upon receiving , and check the security of the transmission by performing the same process indicated in step (2) between the server and .
-
C.Encoding phase. After checking the security of transmission, encodes secret information () onto following the same rules as in step (A). then reorders the decoy states and reinserts them in random positions into the encoded sequence obtaining a new sequence (), and sends to .
-
D.Similarly, the rest of the participants () perform the Eavesdropping check phase and the Encoding phase indicated in steps (B) and (C).
-
E.Upon receiving , and check the security of transmission. If the quantum channel between and is secure, discards the decoy photons to get , and informs the server of this fact.
-
A.
When all the receive , they send an acknowledgment to the server, and the server announces the measurement bases of to all the . After that, each uses the corresponding measurement bases to measure obtaining , where . Finally, can recover the final shared secret key .
The collusive attack against CT-MQKA protocols
In this section, we show that the SCWZ’s protocol, as an example of CT-MQKA protocols, is insecure against a collusive attack. Although the authors of SCWZ’s protocol have presented a security analysis to prove the security of their protocol against the first model of the collusive attack, their protocol is not secure against the second security model of collusive attack. That is to say, any two dishonest participants and in particular positions meeting the conditions in (3) and (4) can easily steal the private key of honest participants ().
Without loss of generality, assume we have three participants , , and and they have three private keys, e.g., , , and , respectively. And the three participants intend to share a secret key (), here . We also assume that and are two dishonest participants and they need to steal the private key of the honest one (); hence they can deduce the final key without being caught.
In SCWZ’s protocol, the server generates three random sequences, e.g., , , and each one consists of four single-photons. Also, the server generates three random sequences , , and each one consists of four decoy single-photon states. Then the server randomly inserts the decoy state (/) into (/) and sends it to (/). After checking the security of the transmission, each participant discards the decoys and encodes their private information based on the encoding rule mentioned in Step 3.A. Subsequently, each participant sends the sequence in a circle to the other participants to encode their private inputs until the sequence is returned to the participant.
For simplicity, we show here the circle of (Fig. 1a) which will be used by the participant to get the final key (). First, receives from the server to encode her or his information and get the final key. Second, encodes a private input, i.e., into getting the new sequence . Third, inserts some decoy photons into and sends it to the dishonest instead of sending it to . After checking the security of the transmission, discards the decoy states and gets . At the same time, the dishonest generates a counterfeit sequence, e.g., with decoy states and sends it to both and . only tells that the sequence is the counterfeit one. Since the honest participant () does not have and does not knows , she or he cannot know what the received new sequence looks like (i.e., ).
Figure 1.
An example of a three-party QKA protocol. Any two dishonest participants in particular positions can steal the private input of an honest participant.
Obviously, cannot distinguish between the genuine sequences and the counterfeit ones. So, encodes the private data, i.e., into getting and sends with decoy states to . After checking the security of the transmission, discards the decoy qubits and gets . then requests the corresponding measurement bases of from to get . Based on her or his private key, i.e., and the private key of , applies the corresponding unitary operations to the genuine sequence getting and sends it to . Then the participants announce to the server that the quantum channels are secure. Finally, the server announces the measurement bases of to thus enabling to get .
Similarly, if and ( and ) are the dishonest participants they can steal the private key of the honest participant () in the circle while sending (), as shown in Fig. 1b (Fig. 1c). By applying the same attack strategy, most of the existing CR-MQKA protocols19–21,25,26 are vulnerable to this collusive attack.
The proposed secure CT-MQKA protocol
In this section, we give a general secure model of CT-MQKA against the collusive attack described above. Whereas our protocol can be implemented with photons, we describe it in more general terms here. The idea of adopting a semi-honest client–server model (or a third party) has been adopted in many previous QKA protocols to ensure the security of communication19,22,27–29. Suppose we have participants who want to generate a shared secret key fairly, where with length . Every participant () selects a private random classical key (), where . Here, is the number of decoy states used for checking the security of a quantum channel, and .
The general steps of this secure CT-MQKA model can be described as follows:
Step (1) The server generates sequences (= 1, 2, …, n), with each sequence containing single qubits. The server records the position of every single qubit. Every qubit is selected randomly from the four quantum states .
Step (2) The server also generates additional sequences of random single qubits (called ), which are used as decoy states to check the existence of eavesdroppers. Every single decoy qubit is randomly selected from the four quantum states {}. The server inserts into producing a new sequence , and sends the new sequence () to .
Step (3) Upon receiving , every participant sends an acknowledgment to the server.
Step (4) In this step, the server announces the positions of and their measurement bases. Every measures based on the corresponding measurement bases and stores the results. Randomly, selects half of the qubits in and announces their measurement results to the server. The server, in turn, announces the initial states of the second half of . Both the server and collaborate to compute the error rate. They end the protocol if the error rate is higher than a predefined value. Otherwise, discards from getting and continues to Step (5).
Step (5) After each gets the secure sequence , they start to perform the next sub-steps.
Encoding phase. encodes the secret information () onto by applying the unitary operation when the classical bit is 0, and the unitary operation if the classical bit is 1 as indicated in Table 1.
Detecting the external attack phase. For detecting external eavesdroppers, generates a sequence of random single qubits () as in Steps (1) and (2), which are used as decoy qubits to check the existence of eavesdroppers in the quantum channel between and (note, the symbol in “i + 1” represents the additional mod . inserts into producing a new sequence , and sends the new sequence () to . As in Step (4), and share the information of and collaborate to compute the error rate. and end the protocol if the error rate is higher than a predefined value. Otherwise, discards from obtaining and continues to the next process.
- Detecting the internal attack phase. Upon confirming that the communication between and is secure against external attackers, the server randomly selects single-qubits as decoy qubits from , by announcing their positions, and asks to publicly announce the unitary operations that were applied to the qubits. Subsequently, the server announces the measurement bases of the qubits to . measures the qubits using the corresponding measurement bases. Based on the measurement results, the measurement bases, and the applied unitary operations, can judge whether the qubits are genuine or not. If not, ends the protocol. Otherwise, the participants do the following:
-
i)discards the qubits from that were selected by the server;
-
ii)The server also discards the corresponding qubits from ;
-
iii)Every discards the corresponding classical bits from their private keys .
-
i)
As in Step (5.a), encodes the secret information () onto and inserts some random decoy states () into producing . Afterwards, sends to .
Upon receiving , and collaborate to check the security of communication by performing Step (5.a–5.d).
encodes her or his information and sends the new sequences to the next participants. This process continues until receives the secure quantum message () from ; here, the symbol “−” in “i − 1” represents the subtraction mod .
Table 1.
The encoding rules.
| Unitary operations/quantum states | ||||
|---|---|---|---|---|
The unitary operation represents 0 and the unitary operation represents 1.
Step (6): When all s receive , they discard the decoy qubits getting . Hence, each participant loses classical bits from getting with length . After that, they send an acknowledgment to the server, and the server announces the measurement bases of to all the s. Finally, every uses the corresponding measurement bases to measure obtaining , where .
Illustration of the proposed protocol
For simplicity, suppose we have three participants , , and and they want to generate a shared secret key with length (e.g., ). , , and have three private keys , , and , respectively, with length , e.g., ; here is the number of decoy states for checking the security of all quantum channels in one complete circle, and for the circle it will be . Here, there are three complete circles for three participants, and the number of decoy qubits for checking the security of all quantum channels is . Also, we assume that, , , and .
The server generates a sequence of quantum states contains 12 random states (e.g., ) for the first circle and sends it to . checks the security of the transmission with the server as in Step (4). Based on her/his private data (), applies the unitary operations {} to getting . To secure the communication, inserts some decoy qubits into and sends to . Subsequently, performs Step (5.b) to detect the external attack.
As in Step (5.c), the server chooses random states (e.g., ) from and announce the position of (e.g., the position of last state in ) to and . The server asks to announce the unitary operation that was applied to , and asks to announce the measurement result of the corresponding states in (i.e., ), respectively. Based on the announced information (, , ), the server can judge whether has received genuine information or not.
Later, the server and discard the last sequence from and getting newly updated sequences ) and ), respectively. Also, all participants update their private keys by discarding the corresponding classical bits. The updated private keys of , , and become , , and , respectively. They also consume two quantum states (e.g., the last two states) for checking the quantum channel between ( and ) and ( and ).
The updated private keys after completing one circle are as follows: , , and . And the updated private keys after completing the three circles are as follows: , , and . Now, . Finally, each participant can get the final key . Note that for simplicity, we assumed that the server frequently chooses the last qubit for checking the security of communication; but the selected positions should be completely random.
Applying the proposed model to SCWZ’s protocol
Taking SCWZ’s protocol19 as an example, we show in this section how to address the vulnerability of CT-MQKA protocols to the collusive attack.
In SCWZ’s protocol19, there are participants and each participant () has an m-bit key (). All participants want to fairly generate a shared secret key (). Also, there is a server that generates sequences of random single-photons. Each sequence contains random single-photons. The server generates additional sequences of random single photons (), which are used as decoy photons to check the existence of eavesdroppers.
Based on our proposed model, SCWZ’s protocol should be modified as follows.
Each participant () should prepare the length of her/his private keys () to be .
The length of the quantum sequences generated by the server should also be .
As in Step (5.b), should generate a sequence of random single-qubits () to check the security of the quantum channel between the sender () and receiver ().
To detect the collusive attack, the server randomly selects single-qubits from the single-qubits and uses them as decoy qubits to check the security of quantum channels between every two participants, as proposed in Step (5.c).
All participants update their keys by discarding the classical bits corresponding to the single qubits that were used as decoy qubits.
The security analysis
This section presents detailed security analyses for both external eavesdropping and internal attacks.
External attack
In the proposed protocol, the decoy qubit technique is used to prevent external eavesdroppers from attacking the protocol. To achieve that, a sequence of single decoy qubits is randomly selected from the states {} and randomly inserted into the secret message. The eavesdropper (Eve) cannot distinguish between the decoy-states and secret message states. Eve may try to entangle a secret message state with an auxiliary quantum state () by applying a unitary operation () as follows:
| 5 |
| 6 |
| 7 |
| 8 |
In (5) and (6), and . Also, , , , and are four ancilla states decided by Eve. To pass the external eavesdropping detection phase, Eve sets , if the targeted quantum state is or , and , if the targeted quantum state is or . But these malicious procedures cannot help Eve to extract any useful information from the private inputs. For example, if Eve sets , she gets , which means that . So, Eve cannot reveal private inputs. Besides, the proposed CT-MQKA protocol is not open to the Trojan horse attack since all information is sent in a one-way manner30,31.
Internal attack
In the proposed model, internal attacks may be divided into three types of attacks: (1) Server’s attack; (2) Participant’s attack; (3) Collusive attack. Participant’s attack is similar to server’s attack in this work. Therefore, we only discuss here the server’s attack and collusive attack.
Server’s attack
In this work, we assume that the server is semi-honest. That is, it faithfully executes the operations delegated by participants and does not collude with other participants to steal sensitive information, but may try to get the information of secret keys. Participants employ the decoy photon method to secure the communications between every two participants. Hence, the server must adopt one of the external attack strategies if it wants to get sensitive information. However, we show in the “External attack” section that the proposed model is secure against external attacks. Accordingly, the malicious server may resort to guessing the required information or generate the final key as follows:
- Passing the security check. In Step (1), the server sends to as an initial quantum sequence for generating the final key. In Step (5), uses to encode her/his private data and inserts some decoy qubits for security check before sending them to . To successfully pass the security check, the server must correctly guess the measurement bases of the decoy qubits and guess the initial bases to correctly resend ’s qubits to without been caught. The probability of correctly guessing a measurement basis for each qubit is 50%, and the probability of correctly guessing an initial basis is also 50%. Therefore, the probability () of passing the eavesdropping check is as follows:
here, () is the probability of correctly guessing the th sequence of decoy qubits, and is the length of each decoy qubit sequence.9 - Guessing participants’ private keys. Since , the server needs to correctly guess all participants’ private keys to get . The probability () of correctly guessing the final key is as follows:
here, () is the probability of correctly guessing , and is the length of .10 -
Guessing the final key (). The server may try to directly guess the final key (). In that case, the probability () is as follows:
11 In Eqs. (9–11), if is large enough the probability of guessing the final key or required information is close to zero or negligible.
Collusive attack
A collusive attack is the most powerful internal attack in which two or more dishonest participants collude together to extract sensitive information or generate the final key alone without revealing their malicious behaviour. In this section, we show that the proposed model is immune to collusive attacks, such that any group of dishonest participants trying to perform a collusive attack (including the two attack strategies mentioned in the section The insecurity of existing CT-MQKA protocols) will be detected immediately.
Basically, dishonest participants rely on two important processes to successfully achieve the collusive attack; (1) sharing information about the carrier quantum states that will be used to encode the private data and generate the final key, (2) deceiving the honest participants to deduce their private data by sending forged data. In our protocol, a semi-honest server is used to prevent dishonest participants from sending forged data to the honest ones. The server generates with decoy qubits in Step (1) and sends it to in Step (2). In Step (5.b), sends her/his encoded sequence to . To prevent the collusive attack, in Step (5. c), the server participates in checking the security of transmission to make sure that does not send forged qubits to by randomly selecting some qubits and asking the participants to divulge the related information. Accordingly, the protocol guarantees that the honest participant has received genuine data, and the dishonest participants cannot obtain useful information to generate the final key alone or steal the private inputs of honest participants.
Moreover, if the dishonest participants try to adopt guessing strategies they will be detected with high probability as indicated in Eqs. (9–11). Thus, we can say that the proposed model is secure against internal attacks.
Conclusion
In this work, we showed that most of the existing circular-type multiparty quantum key agreement protocols are insecure against a specific type of collusive attack. We analyzed the security of a recently proposed circular-type multiparty quantum key agreement protocol to demonstrate the vulnerability of such protocols. Then, we proposed a general secure quantum key agreement model to avoid the different types of collusive attacks. We showed that the proposed protocol could generate the final key correctly and that the proposed protocol is secure against all known collusive attack strategies.
Acknowledgements
This research was funded by the Natural Sciences and Engineering Research Council of Canada and NXM Labs Inc. NXM’s autonomous security technology enables devices, including connected vehicles, to communicate securely with each other and their surroundings without human intervention while leveraging data at the edge to provide business intelligence and insights. NXM ensures data privacy and integrity by using a novel blockchain-based architecture which enables rapid and regulatory-compliant data monetization. Ryerson University is in the “Dish With One Spoon Territory”. The Dish With One Spoon is a treaty between the Anishinaabe, Mississaugas and Haudenosaunee that bound them to share the territory and protect the land. Subsequent Indigenous Nations and peoples, Europeans and all newcomers, have been invited into this treaty in the spirit of peace, friendship and respect. Wilfrid Laurier University is located on the traditional territory of the Neutral, Anishnawbe and Haudenosaunee peoples. We thank them for allowing us to conduct research on their land.
Author contributions
H.A. designed the scheme. H.A., A.M. and S.G. did security analysis and comparisons. All authors contributed to the writing and discussion of the paper.
Competing interests
The authors declare no competing interests.
Footnotes
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Diffie W, Hellman M. New directions in cryptography. IEEE Trans. Inf. Theory. 1976;22:644–654. doi: 10.1109/TIT.1976.1055638. [DOI] [Google Scholar]
- 2.Ingemarsson I, Tang D, Wong C. A conference key distribution system. IEEE Trans. Inf. Theory. 1982;28:714–720. doi: 10.1109/TIT.1982.1056542. [DOI] [Google Scholar]
- 3.Pieprzyk J, Li C-H. Multiparty key agreement protocols. IEE Proc. Comput. Digital Tech. 2000;147:229–236. doi: 10.1049/ip-cdt:20000531. [DOI] [Google Scholar]
- 4.Bernstein DJ, Lange T. Post-quantum cryptography. Nature. 2017;549:188–194. doi: 10.1038/nature23461. [DOI] [PubMed] [Google Scholar]
- 5.Alagic G, et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. US Department of Commerce; 2020. [Google Scholar]
- 6.Bennet, C. & Brassard, G. in Proc. of IEEE Int. Conf. on Comp., Syst. and Signal Proc., Bangalore, India, Dec. 10–12 (1984).
- 7.Abulkasim H, Farouk A, Hamad S, Mashatan A, Ghose S. Secure dynamic multiparty quantum private comparison. Sci. Rep. 2019;9:1–16. doi: 10.1038/s41598-019-53967-9. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 8.Abulkasim H, et al. Improving the security of quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom. Quant. Inf. Process. 2018;17:316. doi: 10.1007/s11128-018-2091-7. [DOI] [Google Scholar]
- 9.Wu W, Cai Q, Wu S, Zhang H. Cryptanalysis of He’s quantum private comparison protocol and a new protocol. Int. J. Quant. Inf. 2019;17:1950026. doi: 10.1142/S0219749919500266. [DOI] [Google Scholar]
- 10.Qi R, et al. Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 2019;8:1–8. doi: 10.1038/s41377-019-0132-3. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 11.Li L, Li Z. A verifiable multiparty quantum key agreement based on bivariate polynomial. Inf. Sci. 2020;521:343–349. doi: 10.1016/j.ins.2020.02.057. [DOI] [Google Scholar]
- 12.Abulkasim H, Alotaibi A. Improvement on ‘Multiparty Quantum Key Agreement with Four-Qubit Symmetric W State’. Int. J. Theor. Phys. 2019;58:4235–4240. doi: 10.1007/s10773-019-04293-3. [DOI] [Google Scholar]
- 13.Shi R-H, Zhang M. Privacy-preserving quantum sealed-bid auction based on grover’s search algorithm. Sci. Rep. 2019;9:1–10. doi: 10.1038/s41598-019-44030-8. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 14.Bao N, Halpern NY. Quantum voting and violation of Arrow's impossibility theorem. Phys. Rev. A. 2017;95:062306. doi: 10.1103/PhysRevA.95.062306. [DOI] [Google Scholar]
- 15.Chowdhury A, et al. Quantum signature of a squeezed mechanical oscillator. Phys. Rev. Lett. 2020;124:023601. doi: 10.1103/PhysRevLett.124.023601. [DOI] [PubMed] [Google Scholar]
- 16.Abulkasim H, et al. Improved dynamic multi-party quantum private comparison for next-generation mobile network. IEEE Access. 2019;7:17917–17926. doi: 10.1109/ACCESS.2019.2894101. [DOI] [Google Scholar]
- 17.Zhou N, Zeng G, Xiong J. Quantum key agreement protocol. Electron. Lett. 2004;40:1149–1150. doi: 10.1049/el:20045183. [DOI] [Google Scholar]
- 18.Liu B, Xiao D, Jia H-Y, Liu R-Z. Collusive attacks to “circle-type” multi-party quantum key agreement protocols. Quantum Inf. Process. 2016;15:2113–2124. doi: 10.1007/s11128-016-1264-5. [DOI] [Google Scholar]
- 19.Sun Z, Cheng R, Wu C, Zhang C. New fair multiparty quantum key agreement secure against collusive attacks. Sci. Rep. 2019;9:1–8. doi: 10.1038/s41598-019-53524-4. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 20.Sun Z, Wu C, Zheng S, Zhang C. Efficient multiparty quantum key agreement with a single d-level quantum system secure against collusive attack. IEEE Access. 2019;7:102377–102385. doi: 10.1109/ACCESS.2019.2931612. [DOI] [Google Scholar]
- 21.Liu H-N, Liang X-Q, Jiang D-H, Zhang Y-H, Xu G-B. Multi-party quantum key agreement protocol with bell states and single particles. Int. J. Theor. Phys. 2019;58:1659–1666. doi: 10.1007/s10773-019-04063-1. [DOI] [Google Scholar]
- 22.Liu W-J, Chen Z-Y, Ji S, Wang H-B, Zhang J. Multi-party semi-quantum key agreement with delegating quantum computation. Int. J. Theor. Phys. 2017;56:3164–3174. doi: 10.1007/s10773-017-3484-6. [DOI] [Google Scholar]
- 23.Shi R-H, Zhong H. Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 2013;12:921–932. doi: 10.1007/s11128-012-0443-2. [DOI] [Google Scholar]
- 24.Wang L, Ma W. Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom. Quantum Inf. Process. 2017;16:130. doi: 10.1007/s11128-017-1576-0. [DOI] [Google Scholar]
- 25.Liu H-N, Liang X-Q, Jiang D-H, Xu G-B, Zheng W-M. Multi-party quantum key agreement with four-qubit cluster states. Quantum Inf. Process. 2019;18:242. doi: 10.1007/s11128-019-2346-y. [DOI] [Google Scholar]
- 26.Huang W, et al. Efficient multiparty quantum key agreement with collective detection. Sci. Rep. 2017;7:1–9. doi: 10.1038/s41598-016-0028-x. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 27.Zhou Y-H, Zhang J, Shi W-M, Yang Y-G, Wang M-F. Continuous-variable multiparty quantum key agreement based on third party. Mod. Phys. Lett. B. 2020;34:2050083. doi: 10.1142/S0217984920500839. [DOI] [Google Scholar]
- 28.Cao H, Ma W. Multi-party traveling-mode quantum key agreement protocols immune to collusive attack. Quantum Inf. Process. 2018;17:219. doi: 10.1007/s11128-018-1993-8. [DOI] [Google Scholar]
- 29.Huang W-C, Yang Y-K, Jiang D, Gao C-H, Chen L-J. Designing secure quantum key agreement protocols against dishonest participants. Int. J. Theor. Phys. 2019;58:4093–4104. doi: 10.1007/s10773-019-04275-5. [DOI] [Google Scholar]
- 30.Li X-H, Deng F-G, Zhou H-Y. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A. 2006;74:054302. doi: 10.1103/PhysRevA.74.054302. [DOI] [Google Scholar]
- 31.Deng F-G, Li X-H, Zhou H-Y, Zhang Z-J. Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A. 2005;72:044302. doi: 10.1103/PhysRevA.72.044302. [DOI] [Google Scholar]

