Relationships between E91 and the purified BB84 QKD protocols
Quantum Computing SEArchived Mar 20, 2026✓ Full text saved
Peter Shor and John Preskill made a simple proof a the BB84 security by purifying the protocol, which then comes to share an entangled state, prepared by a third party, between Alice and Bob. This looks quite similar to the entangled based protocol E91. Is it correct to say that BB84's purification is equivalent to the E91 ?
Full text archived locally
✦ AI Summary· Claude Sonnet
Relationships between E91 and the purified BB84 QKD protocols
Ask Question
Asked today
Modified today
Viewed 7 times
0
Peter Shor and John Preskill made a simple proof a the BB84 security by purifying the protocol, which then comes to share an entangled state, prepared by a third party, between Alice and Bob.
This looks quite similar to the entangled based protocol E91. Is it correct to say that BB84's purification is equivalent to the E91 ?
qkd
Share
Improve this question
Follow
asked 3 hours ago
deb2014
5492
2 silver badges
8
8 bronze badges
Add a comment
Know someone who can answer? Share a link to this question via email, Twitter, or Facebook.
Your Answer
Sign up or log in
Sign up using Google
Sign up using Email and Password
Post as a guest
Name
Email
Required, but never shown
Post Your Answer
By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
qkd
See similar questions with these tags.
The Overflow Blog
AI is becoming a second brain at the expense of your first one
After all the hype, was 2025 really the year of AI agents?
Featured on Meta
Logo updates to Stack Overflow's visual identity
Related
12
What authentication protocol to use for BB84 and other QKD protocols?
1
Can we do error correction for entangled particles?
3
Doubt in Simple proof of Security of the BB84 QKD
5
What is the difference between CV QKD and DV QKD?
2
Why does entanglement of 3 qubits break this?
3
Why is applying a Hadamard transform useful in the entanglement-based version of BB84
0
Misunderstanding of QKD BB84 protocol
2
Choosing E91/BB84 basis states and angles
2
Doubt in understanding the use of Uhlmann's Theorem in BB84 security proof
1
Entanglement-based attack on E91 protocol
Hot Network Questions
Does Exempli Gratia Fecit make sense?
Novel about the conflict between science/technology and the arts/humanities
Why does Loge's motive appear at the end of Act 2 of Götterdämmerung?
Is there a mapping from a free group to a surface group that preserves trace equivalence?
Cessna C172s - What kind of flap does a C172s have?
more hot questions
Question feed
By continuing to use this website, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. By exiting this window, default cookies will be accepted. To reject cookies, select an option from below.
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Targeting Cookies
Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Performance Cookies
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Functional Cookies
Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookie List
Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label
Necessary cookies only Confirm My Choices