CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◌ Quantum Computing Mar 20, 2026

Relationships between E91 and the purified BB84 QKD protocols

Quantum Computing SE Archived Mar 20, 2026 ✓ Full text saved

Peter Shor and John Preskill made a simple proof a the BB84 security by purifying the protocol, which then comes to share an entangled state, prepared by a third party, between Alice and Bob. This looks quite similar to the entangled based protocol E91. Is it correct to say that BB84's purification is equivalent to the E91 ?

Full text archived locally
✦ AI Summary · Claude Sonnet


    Relationships between E91 and the purified BB84 QKD protocols Ask Question Asked today Modified today Viewed 7 times 0 Peter Shor and John Preskill made a simple proof a the BB84 security by purifying the protocol, which then comes to share an entangled state, prepared by a third party, between Alice and Bob. This looks quite similar to the entangled based protocol E91. Is it correct to say that BB84's purification is equivalent to the E91 ? qkd Share Improve this question Follow asked 3 hours ago deb2014 5492 2 silver badges 8 8 bronze badges Add a comment Know someone who can answer? Share a link to this question via email, Twitter, or Facebook. Your Answer Sign up or log in Sign up using Google Sign up using Email and Password Post as a guest Name Email Required, but never shown Post Your Answer By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions qkd See similar questions with these tags. The Overflow Blog AI is becoming a second brain at the expense of your first one After all the hype, was 2025 really the year of AI agents? Featured on Meta Logo updates to Stack Overflow's visual identity Related 12 What authentication protocol to use for BB84 and other QKD protocols? 1 Can we do error correction for entangled particles? 3 Doubt in Simple proof of Security of the BB84 QKD 5 What is the difference between CV QKD and DV QKD? 2 Why does entanglement of 3 qubits break this? 3 Why is applying a Hadamard transform useful in the entanglement-based version of BB84 0 Misunderstanding of QKD BB84 protocol 2 Choosing E91/BB84 basis states and angles 2 Doubt in understanding the use of Uhlmann's Theorem in BB84 security proof 1 Entanglement-based attack on E91 protocol Hot Network Questions Does Exempli Gratia Fecit make sense? Novel about the conflict between science/technology and the arts/humanities Why does Loge's motive appear at the end of Act 2 of Götterdämmerung? Is there a mapping from a free group to a surface group that preserves trace equivalence? Cessna C172s - What kind of flap does a C172s have? more hot questions Question feed By continuing to use this website, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. By exiting this window, default cookies will be accepted. To reject cookies, select an option from below. Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Targeting Cookies Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Performance Cookies Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Functional Cookies Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookie List Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Necessary cookies only Confirm My Choices
    💬 Team Notes
    Article Info
    Source
    Quantum Computing SE
    Category
    ◌ Quantum Computing
    Published
    Mar 20, 2026
    Archived
    Mar 20, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗