1 Entanglement virtualization after the first quantum key teleportation Mario Mastriani Quantum Communications Lab, Qubit Reset LLC, 2875 NE 191, suite 801, Aventura, FL 33180, USA. ORCID Id: 0000-0002-5627-3935 mmastri@qubitreset.com AbstractIn this draft, we present a new technique of quantum key distribution, where the first time the initial key is teleported, and after that, the entanglement is held in a fictitious way. In the transmitter, the new key is built with the previous key and the plaintext and with the new key and the plaintext we obtain the ciphertext. On the receiver side, with the previous key and the ciphertext we obtain the new key and with it and the ciphertext we obtain the plaintext. In other words, it is as if we emulate successive teleportations of the new keys that do not exist. KeywordsQuantum Entanglement; Quantum Key Distribution; Quantum Teleportation. 1 Introduction In the literature, there is a great amount of papers about Quantum Key Distribution (QKD); those which do not use quantum entanglement [1-10] and others which use it [11-18]. In our humble opinion, they all make an excessive exposure of the keys by using a pair of channels (classic and quantum) complementary to the channel that transports the ciphertext. See Fig.1. The idea behind this paper is the presentation of an enhanced QKD technique that minimizes such exposure. Fig. 1 Typical QKD architecture. 2 Enhanced QKD 2.1 How does it work? 1. An interlaced pair of the Einstein-Podolsky-Rosen (EPR) type is generated 2. Both EPRs are distributed between Alice and Bob 3. Teleportation [19-21] of the initial key is done k0 4. From Alice’s side and thanks the Boolean functions FA and GA we obtain the first ciphertext [ ] ( 29 1 1 1 0 A PT ,k F PT ,k = and [ ] ( 29 1 1 1 1 A CT ,k G PT ,k = (1) where PT is the plaintext and CT the ciphertext. In a generic way, [ ] ( 29 1 i i A i i PT ,k F PT ,k - = and [ ] ( 29 i i A i i CT ,k G PT ,k = (2)