[1] Zhou N R, Zeng G H, Xiong J. Quantum key agreement protocol[J]. Electronics Letters, 40, 1149-1150(2004).
[2] Min S Q. Design and analysis on multi-party quantum key agreement protocols[D]. Nanchang: Nanchang University(2019).
[3] Shen D S, Ma W P, Yin X R et al. Improvement of a two-party quantum key agreement protocol[J]. Journal of Xidian University (Natural Science), 42, 86-90, 186(2015).
[4] Jiang D H, Xu G B. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states[J]. Quantum Information Processing, 17, 180(2018).
[5] Yang Y G, Li B R, Li D et al. New quantum key agreement protocols based on Bell states[J]. Quantum Information Processing, 18, 322(2019).
[6] Walton Z D, Abouraddy A F, Sergienko A V et al. Decoherence-free subspaces in quantum key distribution[J]. Physical Review Letters, 91, 087901(2003).
[9] He Y F, Ma W P. Two-party quantum key agreement against collective noise[J]. Quantum Information Processing, 15, 5023-5035(2016).
[10] Gao H, Chen X G, Qian S R. Two-party quantum key agreement protocols under collective noise channel[J]. Quantum Information Processing, 17, 140(2018).
[11] Cai B B, Guo G D, Lin S et al. Multipartite quantum key agreement over collective noise channels[J]. IEEE Photonics Journal, 10, 1-11(2018).
[12] Yang Y G, Gao S, Li D et al. Two-party quantum key agreement over a collective noisy channel[J]. Quantum Information Processing, 18, 74(2019).
[13] Wang S S, Jiang D H, Xu G B et al. Quantum key agreement with Bell states and Cluster states under collective noise channels[J]. Quantum Information Processing, 18, 190(2019).
[15] Kwiat P G. Experimental verification of decoherence-free subspaces[J]. Science, 290, 498-501(2000).
[17] Deng F G, Long G L, Wang Y et al. Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement[J]. Chinese Physics Letters, 21, 2097-2100(2004).
[19] Cai Q Y. Eavesdropping on the two-way quantum communication protocols with invisible photons[J]. Physics Letters A, 351, 23-25(2006).
[20] Deng F G, Li X H, Zhou H Y et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack[J]. Physical Review A, 72, 044302(2005).
[21] Cabello A. Quantum key distribution in the Holevo limit[J]. Physical Review Letters, 85, 5635-5638(2000).