Please use this identifier to cite or link to this item:
                
       http://dspace2020.uniten.edu.my:8080/handle/123456789/6655Full metadata record
| DC Field | Value | Language | 
|---|---|---|
| dc.contributor.author | El-Orany, F.A.A. | |
| dc.contributor.author | Wahiddin, M.R.B. | |
| dc.contributor.author | Mat-Nor, M.-A. | |
| dc.contributor.author | Jamil, N. | |
| dc.contributor.author | Bahari, I. | |
| dc.date.accessioned | 2017-12-08T10:01:36Z | - | 
| dc.date.available | 2017-12-08T10:01:36Z | - | 
| dc.date.issued | 2010 | |
| dc.identifier.uri | http://dspace.uniten.edu.my/jspui/handle/123456789/6655 | - | 
| dc.description.abstract | In this paper, we develop, a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generalized to N users to provide N keys. The protocol has two levels for checking the eavesdroppers. Moreover, we discuss the security of the protocol against different attacks. © Pleiades Publishing, Ltd., 2010. | |
| dc.title | Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generation | |
| item.grantfulltext | none | - | 
| item.fulltext | No Fulltext | - | 
| Appears in Collections: | CCI Scholarly Publication | |
Google ScholarTM
		
		
   		    Check
	Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.