{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T21:42:53Z","timestamp":1778881373148,"version":"3.51.4"},"reference-count":50,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":348,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Quantum Engineering"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Quantum key distribution (QKD) protocols fall into two main categories: entanglement\u2010based and non\u2010entanglement\u2010based. Although entanglement\u2010based QKD offers strong security, it theoretically generates fewer keys with the same number of logical qubits. In contrast, the non\u2010entanglement\u2010based method produces more keys but with reduced security. To address these concerns, in this article, we present a novel hybrid QKD protocol that combines both approaches to optimize security and key generation. We introduce a dynamic system that integrates a three\u2010particle entangled Greenberger\u2013Horne\u2013Zeilinger (GHZ)\u2010state method with the two\u2010particle BB84 QKD protocol, using a quantum superposition state to probabilistically switch between them. The GHZ state component leverages strong three\u2010particle entanglement correlations for enhanced security, while the BB84 component offers simplicity and potentially a higher number of key generation. This protocol was implemented and simulated using IBM\u2019s Qiskit and IBM Quantum Platform; our approach demonstrates 63.48% higher number of key generation compared to the E91 protocol, although 37. 33% lower than the standalone BB84 protocol while maintaining robust security and being less prone to quantum bit error rate (QBER). The results and security discussion show that this combined method effectively balances the trade\u2010offs inherent in QKD systems, offering a flexible framework adaptable to varying channel conditions and security requirements.<\/jats:p>","DOI":"10.1155\/que2\/6079632","type":"journal-article","created":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T02:51:07Z","timestamp":1765853467000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Combining Entanglement\u2010 and Non\u2010entanglement\u2010Based Quantum Key Distribution Protocol With GHZ State"],"prefix":"10.1155","volume":"2025","author":[{"given":"Arman","family":"Sykot","sequence":"first","affiliation":[]},{"given":"Mohammad Hasibur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Rifat Tasnim","family":"Anannya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3737-0315","authenticated-orcid":false,"given":"M. R. C.","family":"Mahdy","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,12,15]]},"reference":[{"key":"e_1_2_13_1_2","doi-asserted-by":"publisher","DOI":"10.22331\/q-2017-07-14-14"},{"key":"e_1_2_13_2_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.67.661"},{"key":"e_1_2_13_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"e_1_2_13_4_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.68.3121"},{"key":"e_1_2_13_5_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.85.441"},{"key":"e_1_2_13_6_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.91.057901"},{"key":"e_1_2_13_7_2","unstructured":"SykotA. RahmanM. H. Tasnim AnannyaR. UpomaK. S. H. andMahdyM. R. C. Combining Entangled and Non-Entangled Based Quantum Key Distribution Protocol With Ghz State 2024 https:\/\/arxiv.org\/html\/2411.06586v1."},{"key":"e_1_2_13_8_2","doi-asserted-by":"crossref","unstructured":"AliI. N.andSyambasN. R. Quantum Key Distribution (Qkd) Protocols: a Survey 2018 4th International Conference on Wireless and Telematics (ICWT) 2018 1\u20135.","DOI":"10.1109\/ICWT.2018.8527822"},{"key":"e_1_2_13_9_2","unstructured":"Qiskit Community Qiskit: An Open-Source Framework for Quantum Computing 2017."},{"key":"e_1_2_13_10_2","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.81.1301"},{"key":"e_1_2_13_11_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrev.47.777"},{"key":"e_1_2_13_12_2","unstructured":"BennettC. H. BrassardG.et al. Proceedings of the IEEE International Conference on Computers Systems and Signal Processing 1984."},{"key":"e_1_2_13_13_2","doi-asserted-by":"publisher","DOI":"10.1119\/1.2343464"},{"key":"e_1_2_13_14_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.81.4264"},{"key":"e_1_2_13_15_2","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.81.865"},{"key":"e_1_2_13_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.11.007"},{"key":"e_1_2_13_17_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.92.057901"},{"key":"e_1_2_13_18_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.81.3018"},{"key":"e_1_2_13_19_2","volume-title":"Mathematische Grundlagen Der Quantenmechanik","author":"Von Neumann J.","year":"2013"},{"key":"e_1_2_13_20_2","doi-asserted-by":"publisher","DOI":"10.12693\/aphyspola.93.187"},{"key":"e_1_2_13_21_2","doi-asserted-by":"publisher","DOI":"10.1088\/0031-8949\/81\/04\/045006"},{"key":"e_1_2_13_22_2","article-title":"Physics Long Island City","volume":"1","author":"Bell J. S.","year":"1964","journal-title":"NY"},{"key":"e_1_2_13_23_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-05885-0"},{"key":"e_1_2_13_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-024-05627-6"},{"key":"e_1_2_13_25_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.68.557"},{"key":"e_1_2_13_26_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511608216"},{"key":"e_1_2_13_27_2","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.65.803"},{"key":"e_1_2_13_28_2","doi-asserted-by":"publisher","DOI":"10.1002\/que2.45"},{"key":"e_1_2_13_29_2","doi-asserted-by":"publisher","DOI":"10.1002\/qute.202300097"},{"key":"e_1_2_13_30_2","doi-asserted-by":"publisher","DOI":"10.1088\/1612-202x\/ad3a54"},{"key":"e_1_2_13_31_2","doi-asserted-by":"publisher","DOI":"10.1002\/qute.202400530"},{"key":"e_1_2_13_32_2","doi-asserted-by":"publisher","DOI":"10.1088\/1612-202x\/ad3f96"},{"key":"e_1_2_13_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-018-3786-3"},{"key":"e_1_2_13_34_2","volume-title":"Quantum Computing Explained","author":"McMahon D.","year":"2008"},{"key":"e_1_2_13_35_2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-94-017-0849-4_10","volume-title":"Bell\u2019s Theorem, Quantum Theory and Conceptions of the Universe","author":"Greenberger D. M.","year":"1989"},{"key":"e_1_2_13_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-014-0816-9"},{"key":"e_1_2_13_37_2","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.50"},{"key":"e_1_2_13_38_2","doi-asserted-by":"publisher","DOI":"10.1364\/oe.26.024260"},{"key":"e_1_2_13_39_2","article-title":"Comparison and Analysis of bb84 and e91 Quantum Cryptography Protocols Security Strengths","volume":"4","author":"Caceres Alvarez L.","year":"2016","journal-title":"International Journal of Modern Communication Technologies and Research"},{"key":"e_1_2_13_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-022-03739-8"},{"key":"e_1_2_13_41_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.94.040501"},{"key":"e_1_2_13_42_2","doi-asserted-by":"publisher","DOI":"10.1119\/1.16243"},{"key":"e_1_2_13_43_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-021-00397-z"},{"key":"e_1_2_13_44_2","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"e_1_2_13_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/maes.2020.3015571"},{"key":"e_1_2_13_46_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976667"},{"key":"e_1_2_13_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109877"},{"key":"e_1_2_13_48_2","article-title":"Information Reconciliation for Quantum Key Distribution","author":"Elkouss D.","year":"2010","journal-title":"Arxiv Preprint arXiv:1007.1616"},{"key":"e_1_2_13_49_2","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/4\/1\/344"},{"key":"e_1_2_13_50_2","unstructured":"MohamedE. AziziM. andAziziA. Quantum Key Distribution Protocols: A Survey 2010."}],"container-title":["Quantum Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/que2\/6079632","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/que2\/6079632","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/que2\/6079632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T04:20:05Z","timestamp":1773030005000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/que2\/6079632"}},"subtitle":[],"editor":[{"given":"Liuguo","family":"Yin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/que2\/6079632"],"URL":"https:\/\/doi.org\/10.1155\/que2\/6079632","archive":["Portico"],"relation":{},"ISSN":["2577-0470","2577-0470"],"issn-type":[{"value":"2577-0470","type":"print"},{"value":"2577-0470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-05-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6079632"}}