Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state

Multi-key generation

F. A.A. El-Orany, M. R.B. Wahiddin, M. A. Mat-Nor, Norziana Jamil, I. Bahari

Research output: Contribution to journalArticle

6 Citations (Scopus)

Abstract

In this paper, we develop, a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generalized to N users to provide N keys. The protocol has two levels for checking the eavesdroppers. Moreover, we discuss the security of the protocol against different attacks.

Original languageEnglish
Pages (from-to)1210-1214
Number of pages5
JournalLaser Physics
Volume20
Issue number5
DOIs
Publication statusPublished - 01 May 2010

Fingerprint

Quantum cryptography
Communication
attack
communication

All Science Journal Classification (ASJC) codes

  • Atomic and Molecular Physics, and Optics
  • Instrumentation
  • Condensed Matter Physics
  • Industrial and Manufacturing Engineering

Cite this

El-Orany, F. A.A. ; Wahiddin, M. R.B. ; Mat-Nor, M. A. ; Jamil, Norziana ; Bahari, I. / Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state : Multi-key generation. In: Laser Physics. 2010 ; Vol. 20, No. 5. pp. 1210-1214.
@article{bf0a1307465a419687e2a5a5c0fe1f45,
title = "Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generation",
abstract = "In this paper, we develop, a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generalized to N users to provide N keys. The protocol has two levels for checking the eavesdroppers. Moreover, we discuss the security of the protocol against different attacks.",
author = "El-Orany, {F. A.A.} and Wahiddin, {M. R.B.} and Mat-Nor, {M. A.} and Norziana Jamil and I. Bahari",
year = "2010",
month = "5",
day = "1",
doi = "10.1134/S1054660X10090124",
language = "English",
volume = "20",
pages = "1210--1214",
journal = "Laser Physics",
issn = "1054-660X",
publisher = "Maik Nauka-Interperiodica Publishing",
number = "5",

}

Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state : Multi-key generation. / El-Orany, F. A.A.; Wahiddin, M. R.B.; Mat-Nor, M. A.; Jamil, Norziana; Bahari, I.

In: Laser Physics, Vol. 20, No. 5, 01.05.2010, p. 1210-1214.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state

T2 - Multi-key generation

AU - El-Orany, F. A.A.

AU - Wahiddin, M. R.B.

AU - Mat-Nor, M. A.

AU - Jamil, Norziana

AU - Bahari, I.

PY - 2010/5/1

Y1 - 2010/5/1

N2 - In this paper, we develop, a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generalized to N users to provide N keys. The protocol has two levels for checking the eavesdroppers. Moreover, we discuss the security of the protocol against different attacks.

AB - In this paper, we develop, a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generalized to N users to provide N keys. The protocol has two levels for checking the eavesdroppers. Moreover, we discuss the security of the protocol against different attacks.

UR - http://www.scopus.com/inward/record.url?scp=79955911352&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79955911352&partnerID=8YFLogxK

U2 - 10.1134/S1054660X10090124

DO - 10.1134/S1054660X10090124

M3 - Article

VL - 20

SP - 1210

EP - 1214

JO - Laser Physics

JF - Laser Physics

SN - 1054-660X

IS - 5

ER -