No-go theorem for heralded exact one-way key distillation

Summarize this article with:
AbstractThe heralded exact one-way distillable secret key is equal to the largest expected rate at which perfect secret key bits can be probabilistically distilled from a bipartite state by means of local operations and one-way classical communication. Here we define the set of super two-extendible states and prove that an arbitrary state in this set cannot be used for heralded exact one-way secret-key distillation. This broad class of states includes both erased states and all full-rank states. Comparing the heralded exact one-way distillable secret key with the more commonly studied approximate one-way distillable secret key, our results demonstrate an extreme gap between them for many states of interest, with the approximate one-way distillable secret key being much larger. Our findings naturally extend to heralded exact one-way entanglement distillation, with similar conclusions.Popular summaryQuantum key distribution is one of the most promising applications of quantum technologies in information processing systems. In particular, if two distant parties each hold one share of an Einstein-Podolsky-Rosen pair, they can obtain a pair of perfectly correlated bits that are perfectly secure from any eavesdropping. This unique feature of quantum entanglement has motivated efforts to understand the limits of “key distillation” in more practical settings, for example, when the bipartite state shared between the two parties is affected by noise. Remarkably, Horodecki et. al. showed that despite entanglement being necessary for key distillation, one can extract keys from bound entangled states, demonstrating that entanglement theory is insufficient to quantify the amount of key that can be distilled from a bipartite state. We study heralded exact one-way key distillation. In this task, Alice and Bob share a bipartite state and wish to distill a perfectly secure key by performing local measurements on their respective systems. Additionally, Alice can publicly announce some classical data after performing her measurement to help Bob pick an ideal measurement for his system. We find that nearly all mixed states are useless for this task despite the relaxation to the probabilistic setting. This includes common models for noisy states in quantum networks, such as erased states and all full-rank states, many of which can be used to extract a secret key with an arbitrarily small but non-zero error. Our findings show that for most states of practical interest, ideal secret keys cannot be distilled even probabilistically when restricting to local measurements assisted by one-way public communication.► BibTeX data@article{Singh2026nogotheoremheralded, doi = {10.22331/q-2026-03-10-2020}, url = {https://doi.org/10.22331/q-2026-03-10-2020}, title = {No-go theorem for heralded exact one-way key distillation}, author = {Singh, Vishal and Wilde, Mark M.}, journal = {{Quantum}}, issn = {2521-327X}, publisher = {{Verein zur F{\"{o}}rderung des Open Access Publizierens in den Quantenwissenschaften}}, volume = {10}, pages = {2020}, month = mar, year = {2026} }► References [1] Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, and Jian-Wei Pan. ``Secure quantum key distribution with realistic devices''. Reviews of Modern Physics 92, 025002 (2020). https://doi.org/10.1103/RevModPhys.92.025002 [2] Christopher Portmann and Renato Renner. ``Security in quantum cryptography''. Reviews of Modern Physics 94, 025008 (2022). https://doi.org/10.1103/RevModPhys.94.025008 [3] Víctor Zapatero, Tim van Leent, Rotem Arnon-Friedman, Wen-Zhao Liu, Qiang Zhang, Harald Weinfurter, and Marcos Curty. ``Advances in device-independent quantum key distribution''. npj Quantum Information 9, 10 (2023). https://doi.org/10.1038/s41534-023-00684-x [4] Charles H. Bennett and Gilles Brassard. ``Quantum cryptography: Public key distribution and coin tossing''. In Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing. Page 175. India (1984). [5] Charles H. Bennett and Gilles Brassard. ``Quantum cryptography: Public key distribution and coin tossing''.
Theoretical Computer Science 560, 7–11 (2014). https://doi.org/10.1016/j.tcs.2014.05.025 [6] Artur K. Ekert. ``Quantum cryptography based on Bell's theorem''.
Physical Review Letters 67, 661–663 (1991). https://doi.org/10.1103/PhysRevLett.67.661 [7] Jonathan Katz and Yehuda Lindell. ``Introduction to modern cryptography: Principles and protocols''. Chapman and Hall/CRC. (2007). https://doi.org/10.1201/9781420010756 [8] Marcos Curty, Maciej Lewenstein, and Norbert Lütkenhaus. ``Entanglement as a precondition for secure quantum key distribution''.
Physical Review Letters 92, 217903 (2004). https://doi.org/10.1103/PhysRevLett.92.217903 [9] Karol Horodecki, Michał Horodecki, Paweł Horodecki, and Jonathan Oppenheim. ``Secure key from bound entanglement''.
Physical Review Letters 94, 160502 (2005). arXiv:quant-ph/0309110. https://doi.org/10.1103/PhysRevLett.94.160502 arXiv:quant-ph/0309110 [10] Karol Horodecki, Michał Horodecki, Paweł Horodecki, and Jonathan Oppenheim. ``General paradigm for distilling classical key from quantum states''. IEEE Transactions on Information Theory 55, 1898–1929 (2009). arXiv:quant-ph/0506189. https://doi.org/10.1109/TIT.2008.2009798 arXiv:quant-ph/0506189 [11] Michał Horodecki, Paweł Horodecki, and Ryszard Horodecki. ``Mixed-state entanglement and distillation: Is there a ``bound'' entanglement in nature?''.
Physical Review Letters 80, 5239–5242 (1998). arXiv:quant-ph/9801069. https://doi.org/10.1103/PhysRevLett.80.5239 arXiv:quant-ph/9801069 [12] Igor Devetak and Andreas Winter. ``Distillation of secret key and entanglement from quantum states''. Proceedings of the Royal Society A 461, 207–235 (2005). arXiv:quant-ph/0306078. https://doi.org/10.1098/rspa.2004.1372 arXiv:quant-ph/0306078 [13] Matthias Christandl. ``The structure of bipartite quantum states—insights from group theory and cryptography'' (2006). arXiv:quant-ph/0604183. arXiv:quant-ph/0604183 [14] Matthias Christandl, Artur Ekert, Michał Horodecki, Paweł Horodecki, Jonathan Oppenheim, and Renato Renner. ``Unifying classical and quantum key distillation''. In Salil P. Vadhan, editor, Theory of Cryptography. Pages 456–478. Berlin, Heidelberg (2007).
Springer Berlin Heidelberg. arXiv:quant-ph/0608199. arXiv:quant-ph/0608199 [15] Karol Horodecki, Michał Horodecki, Paweł Horodecki, Debbie Leung, and Jonathan Oppenheim. ``Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity''. IEEE Transactions on Information Theory 54, 2604–2620 (2008). arXiv:quant-ph/0608195. https://doi.org/10.1109/TIT.2008.921870 arXiv:quant-ph/0608195 [16] Matthias Christandl, Norbert Schuch, and Andreas Winter. ``Entanglement of the antisymmetric state''. Communications in Mathematical Physics 311, 397–422 (2012). arXiv:0910.4151. https://doi.org/10.1007/s00220-012-1446-7 arXiv:0910.4151 [17] Mark M. Wilde, Marco Tomamichel, and Mario Berta. ``Converse bounds for private communication over quantum channels''. IEEE Transactions on Information Theory 63, 1792–1817 (2017). arXiv:1602.08898. https://doi.org/10.1109/TIT.2017.2648825 arXiv:1602.08898 [18] Haoyu Qi, Kunal Sharma, and Mark M Wilde. ``Entanglement-assisted private communication over quantum broadcast channels''. Journal of Physics A: Mathematical and Theoretical 51, 374001 (2018). arXiv:1803.03976. https://doi.org/10.1088/1751-8121/aad5f3 arXiv:1803.03976 [19] N. Cai, A. Winter, and R. W. Yeung. ``Quantum privacy and quantum wiretap channels''. Problems of Information Transmission 40, 318–336 (2004). https://doi.org/10.1007/s11122-005-0002-x [20] I. Devetak. ``The private classical capacity and quantum capacity of a quantum channel''. IEEE Transactions on Information Theory 51, 44–55 (2005). arXiv:quant-ph/0304127. https://doi.org/10.1109/TIT.2004.839515 arXiv:quant-ph/0304127 [21] Bartosz Regula. ``Probabilistic transformations of quantum resources''.
Physical Review Letters 128, 110505 (2022). arXiv:2109.04481. https://doi.org/10.1103/PhysRevLett.128.110505 arXiv:2109.04481 [22] Bartosz Regula. ``Tight constraints on probabilistic convertibility of quantum states''. Quantum 6, 817 (2022). arXiv:2112.11321. https://doi.org/10.22331/q-2022-09-22-817 arXiv:2112.11321 [23] Eneet Kaur, Siddhartha Das, Mark M. Wilde, and Andreas Winter. ``Extendibility limits the performance of quantum processors''.
Physical Review Letters 123, 070502 (2019). arXiv:2108.03137. https://doi.org/10.1103/PhysRevLett.123.070502 arXiv:2108.03137 [24] Eneet Kaur, Siddhartha Das, Mark M. Wilde, and Andreas Winter. ``Resource theory of unextendibility and nonasymptotic quantum capacity''. Physical Review A 104, 022401 (2021). arXiv:1803.10710. https://doi.org/10.1103/PhysRevA.104.022401 arXiv:1803.10710 [25] Kun Wang, Xin Wang, and Mark M Wilde. ``Quantifying the unextendibility of entanglement''. New Journal of Physics 26, 033013 (2024). arXiv:1911.07433. https://doi.org/10.1088/1367-2630/ad264e arXiv:1911.07433 [26] Nilanjana Datta. ``Min- and max-relative entropies and a new entanglement monotone''. IEEE Transactions on Information Theory 55, 2816–2826 (2009). arXiv:0803.2770. https://doi.org/10.1109/TIT.2009.2018325 arXiv:0803.2770 [27] Reinhard F. Werner. ``An application of Bell's inequalities to a quantum state extension problem''. Letters in Mathematical Physics 17, 359–363 (1989). https://doi.org/10.1007/BF00399761 [28] A. C. Doherty, Pablo A. Parrilo, and Federico M. Spedalieri. ``Distinguishing separable and entangled states''.
Physical Review Letters 88, 187904 (2002). arXiv:quant-ph/0112007. https://doi.org/10.1103/PhysRevLett.88.187904 arXiv:quant-ph/0112007 [29] Andrew C. Doherty, Pablo A. Parrilo, and Federico M. Spedalieri. ``Complete family of separability criteria''. Physical Review A 69, 022308 (2004). arXiv:quant-ph/0308032. https://doi.org/10.1103/PhysRevA.69.022308 arXiv:quant-ph/0308032 [30] Felix Leditzky, Nilanjana Datta, and Graeme Smith. ``Useful states and entanglement distillation''. IEEE Transactions on Information Theory 64, 4689–4708 (2018). arXiv:1701.03081. https://doi.org/10.1109/TIT.2017.2776907 arXiv:1701.03081 [31] Sumeet Khatri and Mark M. Wilde. ``Principles of quantum communication theory: A modern approach'' (2024). arXiv:2011.04672v2. arXiv:2011.04672v2 [32] Adrian Kent. ``Entangled mixed states and local purification''.
Physical Review Letters 81, 2839–2841 (1998). https://doi.org/10.1103/PhysRevLett.81.2839 [33] Kun Fang and Zi-Wen Liu. ``No-go theorems for quantum resource purification''.
Physical Review Letters 125, 060405 (2020). arXiv:1909.02540. https://doi.org/10.1103/PhysRevLett.125.060405 arXiv:1909.02540 [34] Michał Horodecki and Paweł Horodecki. ``Reduction criterion of separability and limits for a class of distillation protocols''. Physical Review A 59, 4206–4216 (1999). arXiv:quant-ph/9708015. https://doi.org/10.1103/PhysRevA.59.4206 arXiv:quant-ph/9708015 [35] Reinhard F. Werner. ``Quantum states with Einstein-Podolsky-Rosen correlations admitting a hidden-variable model''. Physical Review A 40, 4277–4281 (1989). https://doi.org/10.1103/PhysRevA.40.4277 [36] Jens Eisert and Mark M. Wilde. ``A smallest computable entanglement monotone''. In 2022 IEEE International Symposium on Information Theory (ISIT). Pages 2439–2444. (2022). arXiv:2201.00835. https://doi.org/10.1109/ISIT50566.2022.9834375 arXiv:2201.00835 [37] Yury Polyanskiy and Sergio Verdú. ``Arimoto channel coding converse and Rényi divergence''. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing. Pages 1327–1333. IEEE (2010). https://doi.org/10.1109/ALLERTON.2010.5707067 [38] T. Ogawa and H. Nagaoka. ``A new proof of the channel coding theorem via hypothesis testing in quantum information theory''. In Proceedings IEEE International Symposium on Information Theory. Page 73. (2002). arXiv:quant-ph/0208139. https://doi.org/10.1109/ISIT.2002.1023345 arXiv:quant-ph/0208139 [39] Benjamin Schumacher and M. A. Nielsen. ``Quantum data processing and error correction''. Physical Review A 54, 2629–2635 (1996). arXiv:quant-ph/9604022. https://doi.org/10.1103/PhysRevA.54.2629 arXiv:quant-ph/9604022 [40] Johann von Neumann. ``Thermodynamik quantenmechanischer gesamtheiten''. Nachrichten von der Gesellschaft der Wissenschaften zu Göttingen, Mathematisch-Physikalische Klasse 1927, 273–291 (1927). url: http://eudml.org/doc/59231. http://eudml.org/doc/59231Cited byCould not fetch Crossref cited-by data during last attempt 2026-03-10 14:17:47: Could not fetch cited-by data for 10.22331/q-2026-03-10-2020 from Crossref. This is normal if the DOI was registered recently. Could not fetch ADS cited-by data during last attempt 2026-03-10 14:17:47: No response from ADS or unable to decode the received json data when getting the list of citing works.This Paper is published in Quantum under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. Copyright remains with the original copyright holders such as the authors or their institutions. AbstractThe heralded exact one-way distillable secret key is equal to the largest expected rate at which perfect secret key bits can be probabilistically distilled from a bipartite state by means of local operations and one-way classical communication. Here we define the set of super two-extendible states and prove that an arbitrary state in this set cannot be used for heralded exact one-way secret-key distillation. This broad class of states includes both erased states and all full-rank states. Comparing the heralded exact one-way distillable secret key with the more commonly studied approximate one-way distillable secret key, our results demonstrate an extreme gap between them for many states of interest, with the approximate one-way distillable secret key being much larger. Our findings naturally extend to heralded exact one-way entanglement distillation, with similar conclusions.Popular summaryQuantum key distribution is one of the most promising applications of quantum technologies in information processing systems. In particular, if two distant parties each hold one share of an Einstein-Podolsky-Rosen pair, they can obtain a pair of perfectly correlated bits that are perfectly secure from any eavesdropping. This unique feature of quantum entanglement has motivated efforts to understand the limits of “key distillation” in more practical settings, for example, when the bipartite state shared between the two parties is affected by noise. Remarkably, Horodecki et. al. showed that despite entanglement being necessary for key distillation, one can extract keys from bound entangled states, demonstrating that entanglement theory is insufficient to quantify the amount of key that can be distilled from a bipartite state. We study heralded exact one-way key distillation. In this task, Alice and Bob share a bipartite state and wish to distill a perfectly secure key by performing local measurements on their respective systems. Additionally, Alice can publicly announce some classical data after performing her measurement to help Bob pick an ideal measurement for his system. We find that nearly all mixed states are useless for this task despite the relaxation to the probabilistic setting. This includes common models for noisy states in quantum networks, such as erased states and all full-rank states, many of which can be used to extract a secret key with an arbitrarily small but non-zero error. Our findings show that for most states of practical interest, ideal secret keys cannot be distilled even probabilistically when restricting to local measurements assisted by one-way public communication.► BibTeX data@article{Singh2026nogotheoremheralded, doi = {10.22331/q-2026-03-10-2020}, url = {https://doi.org/10.22331/q-2026-03-10-2020}, title = {No-go theorem for heralded exact one-way key distillation}, author = {Singh, Vishal and Wilde, Mark M.}, journal = {{Quantum}}, issn = {2521-327X}, publisher = {{Verein zur F{\"{o}}rderung des Open Access Publizierens in den Quantenwissenschaften}}, volume = {10}, pages = {2020}, month = mar, year = {2026} }► References [1] Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, and Jian-Wei Pan. ``Secure quantum key distribution with realistic devices''. Reviews of Modern Physics 92, 025002 (2020). https://doi.org/10.1103/RevModPhys.92.025002 [2] Christopher Portmann and Renato Renner. ``Security in quantum cryptography''. Reviews of Modern Physics 94, 025008 (2022). https://doi.org/10.1103/RevModPhys.94.025008 [3] Víctor Zapatero, Tim van Leent, Rotem Arnon-Friedman, Wen-Zhao Liu, Qiang Zhang, Harald Weinfurter, and Marcos Curty. ``Advances in device-independent quantum key distribution''. npj Quantum Information 9, 10 (2023). https://doi.org/10.1038/s41534-023-00684-x [4] Charles H. Bennett and Gilles Brassard. ``Quantum cryptography: Public key distribution and coin tossing''. In Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing. Page 175. India (1984). [5] Charles H. Bennett and Gilles Brassard. ``Quantum cryptography: Public key distribution and coin tossing''.
Theoretical Computer Science 560, 7–11 (2014). https://doi.org/10.1016/j.tcs.2014.05.025 [6] Artur K. Ekert. ``Quantum cryptography based on Bell's theorem''.
Physical Review Letters 67, 661–663 (1991). https://doi.org/10.1103/PhysRevLett.67.661 [7] Jonathan Katz and Yehuda Lindell. ``Introduction to modern cryptography: Principles and protocols''. Chapman and Hall/CRC. (2007). https://doi.org/10.1201/9781420010756 [8] Marcos Curty, Maciej Lewenstein, and Norbert Lütkenhaus. ``Entanglement as a precondition for secure quantum key distribution''.
Physical Review Letters 92, 217903 (2004). https://doi.org/10.1103/PhysRevLett.92.217903 [9] Karol Horodecki, Michał Horodecki, Paweł Horodecki, and Jonathan Oppenheim. ``Secure key from bound entanglement''.
Physical Review Letters 94, 160502 (2005). arXiv:quant-ph/0309110. https://doi.org/10.1103/PhysRevLett.94.160502 arXiv:quant-ph/0309110 [10] Karol Horodecki, Michał Horodecki, Paweł Horodecki, and Jonathan Oppenheim. ``General paradigm for distilling classical key from quantum states''. IEEE Transactions on Information Theory 55, 1898–1929 (2009). arXiv:quant-ph/0506189. https://doi.org/10.1109/TIT.2008.2009798 arXiv:quant-ph/0506189 [11] Michał Horodecki, Paweł Horodecki, and Ryszard Horodecki. ``Mixed-state entanglement and distillation: Is there a ``bound'' entanglement in nature?''.
Physical Review Letters 80, 5239–5242 (1998). arXiv:quant-ph/9801069. https://doi.org/10.1103/PhysRevLett.80.5239 arXiv:quant-ph/9801069 [12] Igor Devetak and Andreas Winter. ``Distillation of secret key and entanglement from quantum states''. Proceedings of the Royal Society A 461, 207–235 (2005). arXiv:quant-ph/0306078. https://doi.org/10.1098/rspa.2004.1372 arXiv:quant-ph/0306078 [13] Matthias Christandl. ``The structure of bipartite quantum states—insights from group theory and cryptography'' (2006). arXiv:quant-ph/0604183. arXiv:quant-ph/0604183 [14] Matthias Christandl, Artur Ekert, Michał Horodecki, Paweł Horodecki, Jonathan Oppenheim, and Renato Renner. ``Unifying classical and quantum key distillation''. In Salil P. Vadhan, editor, Theory of Cryptography. Pages 456–478. Berlin, Heidelberg (2007).
Springer Berlin Heidelberg. arXiv:quant-ph/0608199. arXiv:quant-ph/0608199 [15] Karol Horodecki, Michał Horodecki, Paweł Horodecki, Debbie Leung, and Jonathan Oppenheim. ``Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity''. IEEE Transactions on Information Theory 54, 2604–2620 (2008). arXiv:quant-ph/0608195. https://doi.org/10.1109/TIT.2008.921870 arXiv:quant-ph/0608195 [16] Matthias Christandl, Norbert Schuch, and Andreas Winter. ``Entanglement of the antisymmetric state''. Communications in Mathematical Physics 311, 397–422 (2012). arXiv:0910.4151. https://doi.org/10.1007/s00220-012-1446-7 arXiv:0910.4151 [17] Mark M. Wilde, Marco Tomamichel, and Mario Berta. ``Converse bounds for private communication over quantum channels''. IEEE Transactions on Information Theory 63, 1792–1817 (2017). arXiv:1602.08898. https://doi.org/10.1109/TIT.2017.2648825 arXiv:1602.08898 [18] Haoyu Qi, Kunal Sharma, and Mark M Wilde. ``Entanglement-assisted private communication over quantum broadcast channels''. Journal of Physics A: Mathematical and Theoretical 51, 374001 (2018). arXiv:1803.03976. https://doi.org/10.1088/1751-8121/aad5f3 arXiv:1803.03976 [19] N. Cai, A. Winter, and R. W. Yeung. ``Quantum privacy and quantum wiretap channels''. Problems of Information Transmission 40, 318–336 (2004). https://doi.org/10.1007/s11122-005-0002-x [20] I. Devetak. ``The private classical capacity and quantum capacity of a quantum channel''. IEEE Transactions on Information Theory 51, 44–55 (2005). arXiv:quant-ph/0304127. https://doi.org/10.1109/TIT.2004.839515 arXiv:quant-ph/0304127 [21] Bartosz Regula. ``Probabilistic transformations of quantum resources''.
Physical Review Letters 128, 110505 (2022). arXiv:2109.04481. https://doi.org/10.1103/PhysRevLett.128.110505 arXiv:2109.04481 [22] Bartosz Regula. ``Tight constraints on probabilistic convertibility of quantum states''. Quantum 6, 817 (2022). arXiv:2112.11321. https://doi.org/10.22331/q-2022-09-22-817 arXiv:2112.11321 [23] Eneet Kaur, Siddhartha Das, Mark M. Wilde, and Andreas Winter. ``Extendibility limits the performance of quantum processors''.
Physical Review Letters 123, 070502 (2019). arXiv:2108.03137. https://doi.org/10.1103/PhysRevLett.123.070502 arXiv:2108.03137 [24] Eneet Kaur, Siddhartha Das, Mark M. Wilde, and Andreas Winter. ``Resource theory of unextendibility and nonasymptotic quantum capacity''. Physical Review A 104, 022401 (2021). arXiv:1803.10710. https://doi.org/10.1103/PhysRevA.104.022401 arXiv:1803.10710 [25] Kun Wang, Xin Wang, and Mark M Wilde. ``Quantifying the unextendibility of entanglement''. New Journal of Physics 26, 033013 (2024). arXiv:1911.07433. https://doi.org/10.1088/1367-2630/ad264e arXiv:1911.07433 [26] Nilanjana Datta. ``Min- and max-relative entropies and a new entanglement monotone''. IEEE Transactions on Information Theory 55, 2816–2826 (2009). arXiv:0803.2770. https://doi.org/10.1109/TIT.2009.2018325 arXiv:0803.2770 [27] Reinhard F. Werner. ``An application of Bell's inequalities to a quantum state extension problem''. Letters in Mathematical Physics 17, 359–363 (1989). https://doi.org/10.1007/BF00399761 [28] A. C. Doherty, Pablo A. Parrilo, and Federico M. Spedalieri. ``Distinguishing separable and entangled states''.
Physical Review Letters 88, 187904 (2002). arXiv:quant-ph/0112007. https://doi.org/10.1103/PhysRevLett.88.187904 arXiv:quant-ph/0112007 [29] Andrew C. Doherty, Pablo A. Parrilo, and Federico M. Spedalieri. ``Complete family of separability criteria''. Physical Review A 69, 022308 (2004). arXiv:quant-ph/0308032. https://doi.org/10.1103/PhysRevA.69.022308 arXiv:quant-ph/0308032 [30] Felix Leditzky, Nilanjana Datta, and Graeme Smith. ``Useful states and entanglement distillation''. IEEE Transactions on Information Theory 64, 4689–4708 (2018). arXiv:1701.03081. https://doi.org/10.1109/TIT.2017.2776907 arXiv:1701.03081 [31] Sumeet Khatri and Mark M. Wilde. ``Principles of quantum communication theory: A modern approach'' (2024). arXiv:2011.04672v2. arXiv:2011.04672v2 [32] Adrian Kent. ``Entangled mixed states and local purification''.
Physical Review Letters 81, 2839–2841 (1998). https://doi.org/10.1103/PhysRevLett.81.2839 [33] Kun Fang and Zi-Wen Liu. ``No-go theorems for quantum resource purification''.
Physical Review Letters 125, 060405 (2020). arXiv:1909.02540. https://doi.org/10.1103/PhysRevLett.125.060405 arXiv:1909.02540 [34] Michał Horodecki and Paweł Horodecki. ``Reduction criterion of separability and limits for a class of distillation protocols''. Physical Review A 59, 4206–4216 (1999). arXiv:quant-ph/9708015. https://doi.org/10.1103/PhysRevA.59.4206 arXiv:quant-ph/9708015 [35] Reinhard F. Werner. ``Quantum states with Einstein-Podolsky-Rosen correlations admitting a hidden-variable model''. Physical Review A 40, 4277–4281 (1989). https://doi.org/10.1103/PhysRevA.40.4277 [36] Jens Eisert and Mark M. Wilde. ``A smallest computable entanglement monotone''. In 2022 IEEE International Symposium on Information Theory (ISIT). Pages 2439–2444. (2022). arXiv:2201.00835. https://doi.org/10.1109/ISIT50566.2022.9834375 arXiv:2201.00835 [37] Yury Polyanskiy and Sergio Verdú. ``Arimoto channel coding converse and Rényi divergence''. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing. Pages 1327–1333. IEEE (2010). https://doi.org/10.1109/ALLERTON.2010.5707067 [38] T. Ogawa and H. Nagaoka. ``A new proof of the channel coding theorem via hypothesis testing in quantum information theory''. In Proceedings IEEE International Symposium on Information Theory. Page 73. (2002). arXiv:quant-ph/0208139. https://doi.org/10.1109/ISIT.2002.1023345 arXiv:quant-ph/0208139 [39] Benjamin Schumacher and M. A. Nielsen. ``Quantum data processing and error correction''. Physical Review A 54, 2629–2635 (1996). arXiv:quant-ph/9604022. https://doi.org/10.1103/PhysRevA.54.2629 arXiv:quant-ph/9604022 [40] Johann von Neumann. ``Thermodynamik quantenmechanischer gesamtheiten''. Nachrichten von der Gesellschaft der Wissenschaften zu Göttingen, Mathematisch-Physikalische Klasse 1927, 273–291 (1927). url: http://eudml.org/doc/59231. http://eudml.org/doc/59231Cited byCould not fetch Crossref cited-by data during last attempt 2026-03-10 14:17:47: Could not fetch cited-by data for 10.22331/q-2026-03-10-2020 from Crossref. This is normal if the DOI was registered recently. Could not fetch ADS cited-by data during last attempt 2026-03-10 14:17:47: No response from ADS or unable to decode the received json data when getting the list of citing works.This Paper is published in Quantum under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. Copyright remains with the original copyright holders such as the authors or their institutions.
