1 Introduction

In 1984, Bennett and Brassard proposed the first protocol for quantum key distribution (QKD), which is now known as BB84 protocol [1]. This pioneering work drew a considerable amount of attention from the scientific community, as it was shown to be unconditionally secure. A desired feature for all key distribution schemes is to provide the unconditional security to the distributed key, but it is known to be unachievable in the domain of classical cryptography. This interesting fact that unconditional security of the distributed key can be obtained by using quantum resources led to extensive studies on the protocols of secure quantum communication (see Ref. [2] for further details). Initial studies were limited to QKD [1, 36]. These initial studies on QKD brought out a number of facts which were further established later. Here, in the context of the present work, we wish to specially stress on a specific aspect. In 1991, Ekert proposed a protocol for QKD using entangled state which can be reduced to BB84 protocol (which uses single photon (qubit) states) under certain conditions [4]. Later, Bennett introduced a single-photon-based scheme for QKD which requires only 2 states, now known as the B92 protocol [3]. Soon BBM protocol [5] was introduced, and it was found that BBM protocol may be viewed as an entangled-state-based analogue of the single-photon-based B92 protocol. Thus, these studies indicated that the security achieved by a single-photon-based scheme can also be achieved by a corresponding entangled-state-based scheme. As we have already mentioned, initial studies on quantum cryptography were limited to QKD [1, 36]. Later on, several other aspects of secure quantum communication were investigated. For example, protocols were proposed for quantum secret sharing [7], quantum key agreement (QKA) [810], quantum dialogue (QD) [1115], quantum secure direct communication (QSDC) [16, 17], and deterministic secure quantum communication (DSQC) [1825]. For the purpose of the present study, all these schemes of secure quantum communication can be broadly divided in two classes: Class A: single-qubit-based schemes which do not use entangled states to implement the protocol, like BB84 protocol [1], B92 protocol [3], LM05 protocol [17], and Class B: entangled-state-based protocols, which use one or more entangled states to implement the protocol. Ekert protocol [4], BBM protocol [5], ping-pong (PP) protocol [16] are some of the protocols belonging to Class B. In fact, there exists a one-to-one map between the protocols of Class A and Class B. In principle, any task that can be implemented using single-qubit states can also be implemented using an entangled-state-based scheme. Of course, device-independent schemes can be realized only using the protocols of Class B. However, we do not wish to stress on that feature (device independence) here. Excluding ideas of device independence, it can be shown that the security provided by a scheme of Class A and the corresponding scheme of Class B is equivalent in the ideal situation, where noise is not present. To illustrate this point in Table 1, we have listed protocols of Class A and Class B for various tasks related to secure quantum communication. As we have already mentioned in an ideal situation, these schemes (i.e., any two schemes shown in the same row of Table 1) are equivalent as far as the ability to perform the cryptographic task in a secure manner is concerned. However, to the best of our knowledge this equivalence is not investigated in the realistic situation (i.e., in the presence of noise). Keeping this fact in mind, this paper aims to perform a comparative study of the protocols for secure quantum communication under various noise models. Specifically, we wish to compare single-qubit-based protocols (protocols of Class A) with entangled-state-based protocols (protocol of Class B) under various noise models. Here, it may be noted that although such comparative study has not yet been performed for protocols of Class A and Class B mentioned above, a similar comparative study has been performed on conjugate-coding-based protocols of secure quantum communication and orthogonal-state-based protocols of secure quantum communication, which are equivalent in the ideal situation ([26] and references therein), but not in noisy environment ([27] and references therein). Further, there are various equivalent but different decoy-qubit-based strategies (such as the BB84 subroutine, GV subroutine) for eavesdropping checking that are used in standard protocols of secure quantum communication. These subroutines are also known to be equivalent in a noise free environment, but a recent study has established that they are not equivalent in a noisy environment [27]. This recent observation has further motivated us to perform the present investigation and to systematically investigate the effect of different type of noises on various type of schemes of secure quantum communication.

Table 1 Single-qubit-based and entangled-state-based protocols for various tasks related to secure quantum communication

There are several noise models [28, 29]. Here, we will restrict ourselves to the study of the effects of amplitude damping (AD) channel, phase-damping (PD) channel [30, 31], collective noise and Pauli noise. Finally, we will also discuss squeezed generalized amplitude damping (SGAD) channel [3133] and note that results for the generalized amplitude damping (GAD) channel as well as that for the AD channel can be obtained from the results computed for the SGAD channel. The motivation to study these noise models is that the AD noise model deals with an interaction of the quantum system with a zero temperature (vacuum) bath. An energy dissipation is involved in this noise model, while not in PD. These two noise models can bring about the phenomena of entanglement decay and entanglement sudden-death [34]. Here, as we wish to analyze the equivalence between a single-qubit-based scheme with an entanglement-based one, these two noise models become relevant. Collective noise is a coherent effect on all the qubits, viz., all the polarization encoded photons traveling through an optical fiber undergo the same birefringence [35]. The Pauli noise channels include various physically relevant cases, such as bit flip, phase flip, and depolarizing channels [31, 3638]. SGAD channels are a generalization of the AD family of channels, which includes the GAD and involves the dissipative interaction with a nonzero temperature bath with non-vanishing squeezing [32]. The squeezing, being a quantum resource, provides an edge over GAD channels, which study a dissipative interaction with a finite temperature bath without squeezing [3941]. Hence, the choice of SGAD channel enables investigations into both nonzero and vanishing regimes of squeezing. The wide applicability of all these noise models sets our motivation to systematically study various schemes for secure quantum communication under noisy environment and to analyze their equivalence.

The remaining part of the paper is organized as follows. In Sect. 2, we briefly discuss the noise models we are going to apply on the schemes mentioned in Table 1. The next section is dedicated to the method adopted to study the effect of noise models described in Sect. 2. In Sect. 4, we briefly describe the protocols listed in Table 1 and report the effect of various type of noises on these protocols with a clear aim to compare single-qubit-based scheme for a specific cryptographic task with the corresponding entangled-state-based scheme. Finally, we conclude in Sect. 5.

2 Different noise models

The most important and widely studied noise models are the AD, PD, collective and Pauli noise models. Apart from these, generalizations of AD considering a dissipative interaction with a thermal and squeezed thermal bath have been studied as GAD and SGAD, respectively. Here, we describe only the SGAD channels as the effect of the GAD channel can be obtained as its limiting case for zero bath squeezing. Further, as the AD noise is a limiting case of GAD, it provides a consistency check of the obtained results under SGAD noise. Similarly, one can view PD noise as a special case of Pauli noise (for a detail discussion, see [31]), and thus the results obtained under PD noise can also be used to check the consistency of the results obtained under Pauli noise. In what follows, we will study the effect of all these noise models on the protocols of secure quantum communication that are listed in Table 1. The noise models we have opted to study in the present paper are briefly described below.

2.1 AD noise model

The AD noise simulates the dissipative interaction of a quantum system with a vacuum bath. A perception about the importance of this noise model can be obtained easily if we consider the large number of theoretical and experimental works on this noise model reported in the recent past ([27, 34, 40, 4245] and references therein). The Kraus operators of an AD channel are given by [28, 29, 32]

$$\begin{aligned} E_{0}=\left[ \begin{array}{cc} 1 &{} 0\\ 0 &{} \sqrt{1-\eta } \end{array}\right] ,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,E_{1}=\left[ \begin{array}{cc} 0 &{} \sqrt{\eta }\\ 0 &{} 0 \end{array}\right] , \end{aligned}$$
(1)

where \(\eta \) (\(0\le \eta \le 1\)) is the probability of error or decoherence rate.

2.2 PD noise model

Similarly, Kraus operators for phase-damping noise model are [28, 29, 31]

$$\begin{aligned} E_{0}=\sqrt{1-\eta }\left[ \begin{array}{cc} 1 &{} 0\\ 0 &{} 1 \end{array}\right] ,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,E_{1}=\sqrt{\eta }\left[ \begin{array}{cc} 1 &{} 0\\ 0 &{} 0 \end{array}\right] ,\,\,\,\,\,\,\,\,\,\,\,\,\,\,\,E_{2}=\sqrt{\eta }\left[ \begin{array}{cc} 0 &{} 0\\ 0 &{} 1 \end{array}\right] , \end{aligned}$$
(2)

where \(\eta \) (\(0\le \eta \le 1\)) is the decoherence rate. This is another widely studied noise model. For instance, PD noise is discussed in Refs. ([27, 31, 33, 34, 4348] and references therein). This noise model is also experimentally simulated in Refs. [4345]. Here, it would be apt to note that this particular noise model can be viewed as a special type of Pauli channel described in Sect. 2.4. However, PD noise deserves special attention because of the fact that it corresponds to quantum non-demolition interactions with the environment. Further, a large number of recent theoretical and experimental works indicate that it deserves special attention. Keeping these facts in mind, in what follows, we would investigate the effect of PD noise independently and would subsequently use the obtained results for consistency check of the results obtained under Pauli noise.

2.3 Collective noises

A coherent effect of environment on all the travel qubits passing through a channel [49] can be studied using collective rotation (CR) and dephasing (CD) noise models. It is known that the singlet states are resistant to an arbitrary collective noise [49]. Recently, the effect of collective noise on various schemes of quantum communication has been studied [15, 27, 35, 5052]. Interestingly, these studies provided protocols for quantum communication, which use logical qubits to avoid the effect of collective noise (cf. [15, 51, 52]). However, in the present paper, we have not used logical qubits. Specifically, in what follows, we have studied the effect of collective noise on physical qubits. Before we proceed further let us briefly introduce CR and CD noise models.

2.3.1 CR noise model

CR noise transforms \(\left| 0\right\rangle \rightarrow \cos \theta \left| 0\right\rangle +\sin \theta \left| 1\right\rangle \) and \(\left| 1\right\rangle \rightarrow -\sin \theta \left| 0\right\rangle +\cos \theta \left| 1\right\rangle \). Here, \(\theta \) is the noise parameter [27, 5052]. Mathematically, a rotation operator acts on the quantum state of travel qubits corresponding to this transformation.

2.3.2 CD noise model

CD noise leaves \(\left| 0\right\rangle \) unchanged, while transforms \(\left| 1\right\rangle \) as \(\left| 1\right\rangle \rightarrow \exp \left( i\phi \right) \left| 1\right\rangle \), where \(\phi \) is the noise parameter [27, 5052]. This is equivalent to a phase gate.

2.4 Pauli noise

The set of all Pauli channels is a tetrahedron. The phase flip and phase-damping channels correspond to a proper subset of the Pauli channels. Depolarizing channels forms a 1-simplex embedded within the convex polytope representing the Pauli channels [31]. Pauli noise [31] is studied using operators \(E_{i}=\sqrt{p_{i}}\sigma _{i},\) where \(\sigma _{0}=\mathbb {I}\), \(\sigma _{1}=X\), \(\sigma _{2}=iY\), and \(\sigma _{3}=Z\). Here, \(p_{i}\) corresponds to the probability with which a particular Pauli operation is applied [3638]. Corresponding expression for the depolarizing channel can be obtained with \(p_{i}=\frac{p^{\prime }}{3}\) for \(i\in \left\{ 1,2,3\right\} \) and \(p_{0}=1-p^{\prime }\). Specifically, it would mean that with a certain probability the state remains unchanged while with the remaining probability, it becomes completely mixed. Further, information regarding bit flip, phase flip and bit-phase flip channels can be obtained with \(p_{0}=1-p^{\prime }\) and \(p_{i}=p^{\prime }\) for \(i=1,3\) and 2, respectively. This kind of noise channel is studied for noise estimation [36], channel characterization [37] and error correction [38].

2.5 SGAD noise model

SGAD channel is a generalization of the AD and GAD channels and is characterized by the following Kraus operators [31, 32]

$$\begin{aligned}&\begin{array}{lcl} E_{0} &{} = &{} \sqrt{Q}\left[ \begin{array}{cc} 1 &{} 0\\ 0 &{} \sqrt{1-\lambda \left( t\right) } \end{array}\right] ,\end{array}\nonumber \\&\begin{array}{lcl} E_{1} &{} = &{} \sqrt{Q}\left[ \begin{array}{cc} 0 &{} \sqrt{\lambda \left( t\right) }\\ 0 &{} 0 \end{array}\right] ,\end{array}\nonumber \\&\begin{array}{lcl} E_{2} &{} = &{} \sqrt{1-Q}\left[ \begin{array}{cc} \sqrt{1-\nu \left( t\right) } &{} 0\\ 0 &{} \sqrt{1-\mu \left( t\right) } \end{array}\right] ,\end{array}\nonumber \\&\begin{array}{lcl} E_{3} &{} = &{} \sqrt{1-Q}\left[ \begin{array}{cc} 0 &{} \sqrt{\mu \left( t\right) }e^{-i\Phi \left( t\right) }\\ \sqrt{\nu \left( t\right) } &{} 0 \end{array}\right] ,\end{array} \end{aligned}$$
(3)

where \(\lambda \left( t\right) =\frac{1}{p}\left\{ 1-\left( 1-p\right) \left[ \mu \left( t\right) +\nu \left( t\right) \right] -\exp \left( -\gamma _{0}\left( 2N+1\right) t\right) \right\} ,\) \(\mu \left( t\right) =\frac{2N+1}{2N\left( 1-p\right) }\frac{\sinh ^{2}\left( \gamma _{0}at/2\right) }{\sinh ^{2}\left( \gamma _{0}\left( 2N+1\right) t/2\right) }\exp \left( -\frac{\gamma _{0}}{2}\left( 2N+1\right) t\right) ,\) and \(\nu \left( t\right) =\frac{N}{\left( 1-p\right) \left( 2N+1\right) }\{ 1-\exp \left( -\gamma _{0}\left( 2N+1\right) t\right) \} \). Here, \(\gamma _{0}\) is the spontaneous emission rate, \(a=\sinh \left( 2r\right) \left( 2N_{th}+1\right) ,\) and \(N=N_{th}\left\{ \cosh ^{2}\left( r\right) +\sinh ^{2}\left( r\right) \right\} +\sinh ^{2}\left( r\right) ,\) where \(N_{th}=1/\left\{ \exp \left( \hbar \omega /k_{B}T\right) -1\right\} \) and \(\Phi \left( t\right) \) is equal to the bath squeezing angle. The analytic expression for the parameter Q is quite involved and can be obtained from Ref. [32]. The beauty of SGAD channel is that for zero bath squeezing (\(\Phi \)), it reduces to GAD channel, which can further be reduced to zero temperature bath (AD channel), where Q becomes 1. Hereafter, we will avoid the time t in the argument of all the expressions under SGAD noise for simplicity of notations. Quasiprobability distributions and tomogram of the single- and two-qubit spin states under the SGAD channels have been studied recently in [40, 41]. The influence of SGAD noise on a quantum cryptographic switch was analyzed in [39].

3 Strategy for studying the effect of various noise models on the protocols of secure quantum communication

The effect of noise can be studied by using a distance-based measure, fidelity, between the final quantum state expected in the absence of noise and the final state obtained when one of the noise models discussed above is considered. To be precise, the strategy adopted in Ref. [27, 46, 48] will be used here. Before we discuss various protocols of secure quantum communication and the effect of noise on them, we will briefly summarize the strategy adopted for the task.

Consider an initial pure state \(\rho =|\psi \rangle \langle \psi |\) which is to be evolved under a noisy environment. The evolution of the state after applying the Kraus operators characterizing a particular noise is \(\rho _{k}=\underset{i}{\Sigma }E_{i}\rho E_{i}^{\dagger }\), where \(E_{i}\)s are the Kraus operators for the chosen noise model under consideration. Specifically, the Kraus operators of AD, PD, SGAD and Pauli channels are given in Sect. 2.

Further, in case of the coherent effect of noise on all the qubits, i.e., collective noise, the transformed state is obtained as \(\rho _{k}=U\rho U^{\dagger }\), where U is the unitary operation due to corresponding noise. The unitary operations for both collective noises are given in the previous section.

Finally, fidelity, defined as

$$\begin{aligned} F=\langle \psi |\rho _{k}|\psi \rangle , \end{aligned}$$

between the final state after the effect of noise \(\rho _{k}\) and pure initial state \(|\psi \rangle \) is used as a measure of the effect of noise. It would be worth mentioning here that the fidelity expression used here has been used in Refs. ([27, 53, 54] and references therein). However, conventionally, an equivalent, but a slightly different definition of fidelity is used, and fidelity for two quantum states \(\rho \) and \(\sigma \) is defined as \(F(\sigma ,\rho )=Tr\sqrt{\sigma ^{\frac{1}{2}}\rho \sigma ^{\frac{1}{2}}}\).

In the current study, we have assumed that one of the noise models is studied at a time. Further, we have also considered that only the travel qubits are affected by the environment, while the qubits not traveling through the channel, i.e., home qubits, remain unaffected.

4 Various aspects (protocols) of secure quantum communication and effect of noise on them

We briefly review two protocols for each type of secure quantum communication task (namely QKD, QKA, QSDC and QD) and study the effect of the above-described noise models on them. For this, we chose one protocol from Class A and another one from Class B. Specifically, for a cryptographic task listed in the second column of Table 1, a protocol from Class A (B) is mentioned in the third (fourth) column. Here, we aim to compare the protocol mentioned in the third column of Table 1 with the protocol mentioned in the fourth column of the same row under different type of noise models. The purpose is to investigate their equivalence when subjected to different noise models discussed in Sect. 2. Specifically, the strategy mentioned in the previous section is used here to perform the comparison by comparing fidelity. We obtain expressions of fidelity for the quantum states to be recovered at the end of each protocol. Further, we would like to mention that all the fidelity expressions reported here are obtained as an average fidelity for all possible choices of initial states and encoding on them. For example, if we consider Ba An protocol of QD where a predecided entangled state is used as initial state, then there will be 16 possible cases as Alice and Bob each can encode messages using 4 different operations. Similarly, for a single-qubit-based QD scheme there are 16 possible cases with 4 initial states and 2 possible encodings by each party. This is why for each type of QD average fidelity is obtained by computing fidelity for all cases and then averaging. A similar approach is adopted in the rest of the paper to obtain average fidelity for various protocols.

4.1 QKD protocols and effect of noise on them

Here, we compare a single-qubit-based scheme for QKD with a QKD scheme which requires an entangled state. Specifically, we opt for B92 protocol [3] as an example of single-qubit-based QKD scheme and BBM protocol [5] as its entangled state counterpart.

4.1.1 B92 protocol

A modified version of BB84 with less resources was proposed by Bennett in 1992 [3]. Hence, the protocol is referred to as B92 protocol. The B92 scheme can be summarized in the following steps:

  • B92 1 Alice sends a random string of \(|0\rangle \) and \(|+\rangle \) to Bob, where \(|\pm \rangle =\frac{|0\rangle \pm |1\rangle }{\sqrt{2}}\), and it is assumed that \(|0\rangle \) and \(|+\rangle \) correspond to bit values 0 and 1, respectively.

    We can easily observe the modification from BB84 as, in BB84 a random string of \(\left\{ |0\rangle ,|1\rangle ,|+\rangle ,|-\rangle \right\} \) was prepared.

  • B92 2 Bob measures the received qubits in either computational \(\left\{ |0\rangle ,|1\rangle \right\} \) or diagonal \(\left\{ |+\rangle ,|-\rangle \right\} \) basis randomly.

    Here, Bob does not announce his choice of basis, which is in contrast to BB84.

  • B92 3 From his measurement outcome, Bob keeps only the qubits with measurement outcome \(|1\rangle \) or \(|-\rangle \) and announces the same. Subsequently, Alice also discards the rest of the qubits. The reason behind discarding the measurement outcomes can be understood by noting that a contribution to measurement outputs \(|0\rangle \) or \(|+\rangle \) can be from both the initial states \(|0\rangle \) and \(|+\rangle \), due to which the measurement outcomes \(|0\rangle \) or \(|+\rangle \) can lead to a non-conclusive result. Therefore, only \(|1\rangle \) or \(|-\rangle \) outcomes are considered which correspond to Alice’s bit values 1 and 0. Hence, these qubits can be used to generate a random symmetric key.

  • B92 4 Bob announces the measurement outcomes of a part of the generated string with the positions of the qubits for verification of eavesdropping. For the corresponding qubits, Alice checks the measurement outcome with the initial state as \(|0\rangle _{A}\rightarrow |-\rangle _{B}\) and \(|+\rangle _{A}\rightarrow |1\rangle _{B}\). For the errors above a tolerable limit, the protocol is discarded. Otherwise, a secure and symmetric key can be generated between the two users.

The protocol described above can be studied under various noise models. When the qubit prepared by Alice travels to Bob under the effect of AD noise, the obtained fidelity is

$$\begin{aligned} F_{AD1}^{QKD}=\frac{1}{4}\left( \sqrt{1-\eta }+3\right) . \end{aligned}$$
(4)

Here, and in the remaining part of the paper, required expressions of fidelity are provided using a notation of the form \(F_{ji}^{x}\), where \(j:j\in \{\mathrm{AD,\,PD\,,CR\,,CD\,,SGAD\,,P}\}\) is the type of noise model; i is 1 and 2 for single-qubit-based and entanglement-based schemes, respectively; and x denotes the type of secure quantum communication, i.e., \(x\in \{\mathrm{QKD,\,QKA,\,QSDC,\,QD}\}\). Now, considering that travel qubits have propagated via a PD channel, we obtain

$$\begin{aligned} F_{PD1}^{QKD}=\frac{1}{4}\left( -\eta +4\right) . \end{aligned}$$
(5)

In the collective noisy environment, the obtained fidelity expressions are

$$\begin{aligned} F_{CD1}^{QKD}=\frac{1}{4}(\cos (\phi )+3), \end{aligned}$$
(6)

and

$$\begin{aligned} F_{CR1}^{QKD}=\cos ^{2}({\theta }), \end{aligned}$$
(7)

for CD and CR noise channels, respectively. The analytic expressions of fidelity under the effect of Pauli and SGAD channels are

$$\begin{aligned} F_{P1}^{QKD}=\frac{1}{2}(2p_{1}+p_{2}+p_{4}) \end{aligned}$$
(8)

and

$$\begin{aligned} F_{SGAD1}^{QKD}= & {} \frac{1}{4}\left( \sqrt{1-\mu }\sqrt{1-\nu }-2\nu + Q\left( \sqrt{1-\lambda }-\sqrt{1-\mu }\sqrt{1-\nu }+2\nu \right) \right. \nonumber \\&\left. -\sqrt{\mu }\sqrt{\nu }(Q-1)\cos (\Phi )+3\right) , \end{aligned}$$
(9)

respectively.

4.1.2 BBM protocol

The BBM protocol [5] is a variant of the Ekert protocol [4], with reduced resources. Specifically, Ekert protocol uses three mutually unbiased bases (MUBs) to calculate the correlation function for detecting eavesdropping when the entanglement source was kept in between the two authenticated users Alice and Bob [4]. In contrast, in BBM protocol, the source of entangled photon is given to Alice and the requirement of three MUBs are reduced to two [5]. The protocol can be summarized as follows.

  • BBM 1 Alice prepares a string of the singlet state \(|\phi ^{-}\rangle =\frac{|01\rangle -|10\rangle }{\sqrt{2}}\) and sends the second qubit to Bob keeping the first qubit with herself.

  • BBM 2 Both Alice and Bob measure their qubits of shared quantum state in either computational \(\left\{ |0\rangle ,|1\rangle \right\} \) or diagonal \(\left\{ |+\rangle ,|-\rangle \right\} \) basis randomly. Both the users announce their choices of measurement basis, but not the measurement outcomes.

  • BBM 3 Both users decide to discard the measurement outcomes where their choices of measurement basis were different, as in all the remaining cases their measurement outcomes are supposed to be correlated.

  • BBM 4 Finally, both the users choose around half of the string of the undiscarded instances and announce corresponding measurement outcomes. If the error in the measurement outcomes is below certain tolerable limit, both Alice and Bob can obtain a symmetric key using the outcomes of the measurements performed on the remaining qubits which are not used for eavesdropping check. In other words, a lack of correlation in the measurement outcomes is a signature of the presence of an adversary.

The entanglement-based protocol of QKD considered here, i.e., BBM scheme, under the AD, PD, CD and CR noises leads to the following fidelities expressions

$$\begin{aligned} F_{AD2}^{QKD}= & {} \frac{1}{4}\left( -\eta +2\sqrt{1-\eta }+2\right) , \end{aligned}$$
(10)
$$\begin{aligned} F_{PD2}^{QKD}= & {} \frac{1}{2}\left( -\eta +2\right) , \end{aligned}$$
(11)
$$\begin{aligned} F_{CD2}^{QKD}= & {} \cos ^{2}\left( \frac{\phi }{2}\right) , \end{aligned}$$
(12)

and

$$\begin{aligned} F_{CR2}^{QKD}=\cos ^{2}(\theta ), \end{aligned}$$
(13)

respectively. In case of Pauli channels, the fidelity only depends on the probability with which the state remains unchanged

$$\begin{aligned} F_{P2}^{QKD}=p_{1}. \end{aligned}$$
(14)

Hence, a linear plot is expected. When the qubits travel under the dissipative SGAD channel, the compact form of fidelity is

$$\begin{aligned} F_{SGAD2}^{QKD}= & {} \frac{1}{4}\left( 2\sqrt{1-\mu }\sqrt{1-\nu }-\mu -\nu \right. \nonumber \\&\left. +Q\left( -\lambda +2\sqrt{1-\lambda }-2\sqrt{1-\mu }\sqrt{1-\nu }+\mu +\nu \right) +2\right) . \end{aligned}$$
(15)

We may now perform a comparative analysis of the fidelity expressions obtained for QKD protocols selected from the two classes. Interestingly, fidelity obtained for both the QKD schemes considered here is the same, when the travel qubits are subjected to CR noise, as can be seen in Fig. 1a. In the presence of another type of collective noise (namely CD noise), which is dephasing in nature, B92 protocol is found to perform better (cf. Fig. 1b). Here, it is worth noting that the singlet state is decoherence free in an arbitrary collective noise when both the qubits of the singlet state travel through the noisy channel. However, when one of the qubits travels through the channel having collective noise, it gets affected by the noise, and as a consequence, the singlet state also gets affected. This is what we have observed here. We have shown only the decay in fidelity considering both the collective noises. We have restricted ourselves to this part only, because there exists an inversion symmetry along certain points on the absicca (i.e., \(\theta =\frac{\pi }{2}\) and \(\phi =\pi \), respectively); as a consequence, the remaining plots are a re-trace of the ones depicted. However, in the plots of collective noise, applied to the protocols to follow, we have explicitly depicted the region in the domain \(\theta \in \left[ 0,\pi \right] \) and \(\phi \in \left[ 0,2\pi \right] \) for CR and CD noises, respectively. This is so because in those cases, the behavior is more involved and it is instructive to see the parameter dependence in the entire domain.

Fig. 1
figure 1

QKD in CR and CD noises is shown in a and b, respectively. For CR noise, both B92 and BBM protocols have the same fidelity (cf. a). The smooth (blue) and dashed (red) lines in b correspond to B92 and BBM protocols, respectively. In c, the smooth (blue) line corresponds to the fidelity variation with probability of bit-phase flip error for B92 protocol. This same curve also illustrates the dependence of fidelity on probability in all four possible cases discussed in the text for BBM protocol. The dashed (red) and dotted dashed (cyan) lines show fidelity variation in B92 scheme with bit-phase flip error and depolarizing channel, respectively. The smooth (blue) and dashed (red) lines also demonstrate fidelity variation when B92 and BBM protocols are subjected to phase-damping noise. d demonstrates the effect of AD (in smooth (blue) and dashed (red) lines); GAD (in dotted dashed (cyan) and dotted (magenta) lines) with temperature \(T=1\); and SGAD (in large dashed (orange) and large dotted dashed (purple) lines) with \(T=1\) and squeezing parameters \(r=1\) and \(\Phi =\frac{\pi }{8}\) for B92 and BBM protocols, respectively (Color figure online)

Expressions of fidelity under Pauli noise reveal that for BBM protocol equally affected states will be obtained for bit flip, phase flip, bit-phase flip errors with certain probability. For the depolarizing channel, the fidelity expression shows a similar nature. The same expression is obtained for B92 protocol with bit-phase flip error. Further, bit flip and phase flip errors with equal probabilities affect the state in a similar manner as the expressions become equal in both the cases. The values are always higher than all others for the same amount of error, as shown in Fig. 1c. The obtained fidelity in depolarizing channels can be seen to be intermediate between the last two. As mentioned in Sect. 2, the effect of phase damping noise can be extracted from the phase flip error. Specifically, a linear decay in fidelity under the phase-damping noise for both B92 and BBM protocols can be deduced from the variation of fidelity due to phase flip error (cf. Fig. 1c), and it can be observed that B92 protocol always performs better than BBM protocol.

From the expressions of fidelity under SGAD noise, the corresponding fidelities under AD and GAD channels can be obtained as limiting cases. When the travel qubits are subjected to AD noise (see smooth (blue) and dashed (red) lines in Fig. 1d), we observe that B92 protocol performs better than BBM protocol at every instant of time. This fact observed here in the presence of AD and PD noises is consistent with some of our recent observations that single qubits perform better while traveling through AD and PD channels [27]. In Fig. 1d, we can also see the advantage obtained due to squeezing. Specifically, for nonzero squeezing we can obtain higher fidelity than that with a GAD noisy environment, for a longer time period. Further, it can also be observed that a state is more affected while traveling through a finite temperature bath than in a vacuum bath (AD).

4.2 QKA protocols and effect of noise on them

In realistic scenarios, it may be preferable that a single party does not control the whole key. In such scenarios, QKD can be circumvented by a key agreement protocol, where all the parties can equally contribute in the final key. To be precise, QKA schemes are studied under two notions: weaker and stronger. In the weaker notion of QKA protocols, the final key is generated after negotiation between both the parties. If we follow this notion, then many of the QKD schemes can be viewed as QKA schemes, such as BB84, B92 and BBM discussed in the previous subsection. However, in the strong notion all the parties contribute equally to the final shared key. Many QKA schemes have been proposed in the past ([810] and references therein).

4.2.1 Single-qubit-based QKA protocol

A single-qubit-based quantum key agreement protocol given by Chong et al., in 2010 [10] can be described in the following steps:

  • QKA1-1 Alice randomly prepares an n bit raw key \(K_{A}\) and a random string of 0 and 1.

  • QKA1-2 Alice prepares n qubits in such a way that for every 0 (1) in the key she prepares either \(|0\rangle \) or \(|+\rangle \) (\(|1\rangle \) or \(|-\rangle \)) depending upon the corresponding bit value in the random string 0 or 1, respectively. Finally, she sends all the qubits to Bob.

  • QKA1-3 Bob also prepares an n bit raw key \(K_{B}\). Now, to encode this key he applies I (iY) on the received qubits for 0 (1).

  • QKA1-4 Bob selects a random sequence from the qubits as verification string and announces the positions of the corresponding qubits. He also announces his raw key.

  • QKA1-5 Alice can extract a final key as \(K=K_{A}\oplus K_{B}\) from her and Bob’s keys. Subsequently, she broadcasts the obtained values corresponding to the qubits Bob had chosen as verification string along with the information of basis chosen for each qubit in QKA1-2.

  • QKA1-6 Using the information of the basis chosen Bob can also extract the final key K. If the obtained values for Alice and Bob have errors below a tolerable limit, they share an unconditionally secure quantum key.

If the single-qubit-based QKA scheme described above is implemented using a quantum channel having AD noise, then we obtain

$$\begin{aligned} F_{AD1}^{QKA}=\frac{1}{4}\left( -\eta +\sqrt{1-\eta }+3\right) , \end{aligned}$$
(16)

whereas under PD noise we have

$$\begin{aligned} F_{PD1}^{QKA}=\frac{1}{4}\left( \eta ^{2}-2\eta +4\right) . \end{aligned}$$
(17)

On the effect of CD noise the fidelity becomes

$$\begin{aligned} F_{CD1}^{QKA}=\frac{1}{4}(\cos ({\phi }_{1})+3), \end{aligned}$$
(18)

while under the influence of CR noise it is

$$\begin{aligned} F_{CR1}^{QKA}=\cos ^{2}({\theta }_{1}). \end{aligned}$$
(19)

In case the travel particles go through a Pauli channel the obtained fidelity is

$$\begin{aligned} F_{P1}^{QKA}=\frac{1}{2}(2p_{1}+p_{2}+p_{4}). \end{aligned}$$
(20)

For an interaction with a squeezed thermal bath, the fidelity depends on various parameters as

$$\begin{aligned} F_{SGAD1}^{QKA}= & {} \frac{1}{4}\left( \sqrt{1-\mu }\sqrt{1-\nu }-\mu -\nu +Q\left( -\lambda +\sqrt{1-\lambda }-\sqrt{1-\mu }\sqrt{1-\nu }\right. \right. \nonumber \\&\left. +\mu +\nu \Big )-\sqrt{\mu }\sqrt{\nu }(Q-1) \cos (\Phi )+3\right) . \end{aligned}$$
(21)

4.2.2 Entangled-state-based QKA protocol

There are various protocols of quantum key agreement that exploit entanglement. Here, we wish to summarize a protocol proposed by Shukla et al. in 2014 [9].

  • QKA2-1 Alice prepares \(|\psi ^{+}\rangle ^{\otimes n}\), where \(|\psi ^{+}\rangle \equiv \frac{1}{\sqrt{2}}(|00\rangle +|11\rangle )\). She also prepares a raw key \(K_{A}\) of n bits. She prepares a string of all the first particles to be sent to Bob keeping all the second qubits with herself.

  • QKA2-2 Alice prepares \(\frac{n}{2}\) Bell states \(|\psi ^{+}\rangle ^{\otimes \frac{n}{2}}\) as decoy qubits and concatenates them with the string of the first particles of the Bell states and sends the 2n qubits to Bob after applying a permutation operator \(\Pi _{2n}\).

  • QKA2-3 After an authentic acknowledgment of the receipt of all the qubits, Alice announces the positions of the decoy qubits, i.e., information of \(\Pi _{n}\). Using this information, Bob performs a Bell state measurement on partner pairs and calculates error rate. It would be relevant to mention that the decoy-qubit-based security achieved here with GV subroutine can be equivalently done by BB84 subroutine where single-qubit decoy qubits are used. They decide to proceed if error rates are below a certain value.

  • QKA2-4 Bob also prepares a raw key \(K_{B}\). Further, on the remaining qubits Bob encodes his raw key by applying I or X operations for 0 and 1, respectively. Subsequently, he prepares \(\frac{n}{2}\) Bell states as decoy qubits and permutes the string of 2n qubits by permutation operator \(\Pi ^{\prime }_{2n}\) after concatenating the decoy and encoded qubits. Finally, he sends them to Alice.

  • QKA2-5 Bob informs the coordinates of the decoy qubits using, which Alice computes the error rate. From this, they choose whether to proceed or not.

  • QKA2-6 Alice announces her key publicly from which Bob can generate the final key \(K=K_{A}\oplus K_{B}\).

  • QKA2-7 Bob announces the permutation operator to rearrange the particles in the encoded string with Alice. Using this, Alice performs a Bell state measurement on the partner pairs of home and travel qubits. The measurement outcome would reveal Bob’s key to Alice.

  • QKA2-8 Alice can also obtain the final shared, unconditionally secure, quantum key K.

The fidelity expression for the entanglement-based QKA scheme when subjected to AD and PD noise is

$$\begin{aligned} F_{AD2}^{QKA}=\frac{1}{4}(\eta -2)^{2} \end{aligned}$$
(22)

and

$$\begin{aligned} F_{PD2}^{QKA}=\frac{1}{2}\left( \eta ^{2}-2\eta +2\right) , \end{aligned}$$
(23)

respectively. The quantum state evolves under the collective noise such that the obtained fidelity with the expected pure state is

$$\begin{aligned} F_{CD2}^{QKA}=\frac{1}{2}\left\{ \cos ({\phi }_{1})\cos ({\phi }_{2})+1\right\} , \end{aligned}$$
(24)

and

$$\begin{aligned} F_{CR2}^{QKA}=\frac{1}{2}\left\{ \cos ^{2}({\theta }_{1}-{\theta }_{2})+\cos ^{2}({\theta }_{1}+ {\theta }_{2})\right\} , \end{aligned}$$
(25)

for CD and CR noise, respectively. Here, it may be noted that the two noise parameters \(\phi _{i}\) and \(\theta _{i}\) correspond to each round of the travel qubit. The Pauli channels have a symmetric expression for fidelity, given by

$$\begin{aligned} F_{P2}^{QKA}=p_{1}^{2}+p_{2}^{2}+p_{3}^{2}+p_{4}^{2}. \end{aligned}$$
(26)

The closed form analytic expression of fidelity, under the SGAD channel, for the above-described QKA scheme [9] is

$$\begin{aligned} F_{SGAD2}^{QKA}= & {} \frac{1}{4}\left\{ Q^{2}\left( \lambda ^{2}-2\lambda (\mu +\nu +1)-2\left( 2\sqrt{1-\lambda }\sqrt{1-\mu }\sqrt{1-\nu }+\mu +\nu -2\right) \right. \right. \nonumber \\&\left. +\mu ^{2}+5\mu \nu +\nu ^{2}\right) + \mu ^{2}+\mu (5\nu -4)+(\nu -2)^{2}+\mu \nu (Q-1)^{2}\cos (2\Phi )\nonumber \\&+ \left. 2Q\left( \lambda (\mu +\nu -1)+2\sqrt{1-\lambda }\sqrt{1-\mu }\sqrt{1-\nu }-\mu ^{2}\right. \right. \nonumber \\&\left. \left. +\mu (3-5\nu )-(\nu -3)\nu -2\right) \right\} . \end{aligned}$$
(27)

QKA schemes involve two-way quantum communication. This distinguishes it from the QKD protocols described in the previous section, where only sender to receiver communication was involved. Here and in what follows, we explicitly depict the behavior of fidelity of various schemes under AD and PD noise channels, which as noise channels are subsets of the SGAD and Pauli channels, respectively. However, as mentioned above, there exists a large literature, both theoretical and experimental, discussing the impact of the AD and PD noises on various aspects of cryptography. We thus feel justified in discussing the effect of AD and PD noises separately and use the obtained results for consistency check of the results obtained under SGAD and Pauli noise channels. In both single-qubit-based and entangled-state-based QKA schemes, fidelity falls gradually with an increase in decoherence rate \(\eta \) when subjected to AD and PD noisy environments of identical strength (cf. Fig. 2a, b). Similar to the QKD scheme, single-qubit-based schemes perform better than the entangled-state-based ones in both these noisy channels. Further, this similarity between the single-qubit-based QKD and QKA schemes for collective noises is depicted in the corresponding curves shown in Fig. 1 a, b and Fig. 2c, d. However, the entangled-state-based QKA scheme is seen to benefit under collective noise as fidelity for the entangled-state-based QKA scheme is more than that of single-qubit-based protocol, under the assumption of the same noise strength in both rounds of the travel qubit. This fact can be attributed to different choices of Bell state in entanglement-based QKD and QKA protocols.

Further, as discussed in the previous section, the collective noise parameter remains the same for all the qubits traveling through a channel at a particular time, but can have a different value at any other time. The effect of two different values of noise parameters, of the collective noises, on the fidelity of the obtained state can be studied by showing either 3-dimensional variation or contour plots. Fig. 3a, b, c, d) shows both these kinds of plots for QKA scheme subjected to CR (CD) noise. Hereafter, we will stick to the contour plots to illustrate the effect of two parameters. Interestingly, it can be observed that it is possible to obtain states with unit or null fidelity for some values of noise parameters.

For the single-qubit-based scheme, the analytic expressions for fidelities are the same for all three types of Pauli channels (i.e., for bit flip, phase flip and bit-phase flip channels). The expressions of fidelity for bit flip and phase flip channels are also the same for the entangled-state-based protocol, but for bit-phase flip error, we obtain a different expression for fidelity, and it is observed that the obtained value of fidelity is smaller compared to the corresponding values for bit flip and phase flip errors. Fig. 2e shows variations of fidelity in all these error channels, where an increase in fidelity for entanglement-based QKA schemes can be attributed to the presence of quadratic terms in the fidelity expression. The variation of fidelity in Fig. 2f considering a dissipative interaction via SGAD channel for both kinds of QKA schemes reemphasizes the facts established by their QKD counterparts (cf. Fig. 1d). Specifically, with increase in temperature, dissipation increases, causing decay in the fidelity of the recovered state. Also, squeezing turns out to be a useful resource here, as observed from the increased fidelity of the SGAD plots compared to their GAD (without squeezing) counterparts after a certain evolution period.

Fig. 2
figure 2

ad illustrates the fidelity obtained for QKA protocols when subjected to AD, PD, CR and CD noises, respectively. The smooth (blue) and dashed (red) lines correspond to single-qubit-based and entangled-state-based QKA protocols, respectively. For CR and CD noises, it is assumed that the noise parameter is same for both the directions of travel of the qubit (i.e., Alice to Bob and Bob to Alice). In e, the effect of bit flip error on single-qubit-based QKA and entangled-state-based QKA protocols are shown using smooth (blue) and dashed (red) lines, respectively. In the same plot, dotted dashed (cyan) and large dotted dashed (purple) lines correspond to the effect of depolarizing channel on Shi et al.’s and Shukla et al.’s QKA schemes, respectively; and the dotted (magenta) line illustrates the effect of bit-phase flip error on the single-qubit-based QKA scheme. f corresponds to the effect of AD in smooth (blue) and dashed (red) lines; GAD in dotted dashed (cyan) and dotted (magenta) lines with \(T=1\); and SGAD in large dashed (orange) and large dotted dashed (purple) lines with \(T=1\) and squeezing parameters \(r=1\) and \(\Phi =\frac{\pi }{8}\) for single-qubit-based and entangled-state-based QKA protocols, respectively (Color figure online)

Fig. 3
figure 3

Contour and 3D variation of fidelity of entangled-state-based QKA protocol is shown in CR and CD noises. Specifically, in a and c the contour plots under the effect of CR and CD noise are shown. Corresponding 3D plots can be seen in b and d, respectively. The same plots are obtained for PP protocol as well. A detailed discussion follows in Subsect. 4.3

4.3 QSDC protocols and effect of noise on them

Quantum secure communication not necessarily involves a key generation or key agreement. There are direct communication protocols avoiding key generation, and such protocols are referred to as the protocols for secure direct quantum communication. These protocols can be broadly categorized as QSDC and DSQC protocols depending upon the requirement of additional classical communication for decoding of the information. QSDC protocols do not require any additional classical communication other than that involved in eavesdropping checking, while DSQC protocols do. Here, we wish to discuss two QSDC protocols and compare them in the presence of noise.

4.3.1 LM05 protocol

A QSDC protocol without using entanglement was proposed by Lucamarini and Mancini in 2005 which is now known as LM05 protocol [17]. The protocol can be briefly described in the following steps:

  • LM 1 Bob (receiver) prepares a random string of \(|0\rangle ,|1\rangle ,|+\rangle ,|-\rangle \) and sends it to Alice.

  • LM 2 Alice chooses randomly half of the received qubits as a verification string (to be used as decoy qubits) and performs eavesdropping checking on these qubits. Specifically, Alice measures all the qubits in the verification string in MUBs \(\left\{ 0,1\right\} \) or \(\left\{ +,-\right\} \) randomly. Then, she announces the choice of basis with the position of qubits. Based on this, Bob announces the qubits where he has chosen the same basis to prepare the initial state. Depending on this, the measurement outcomes of Alice are expected to be the same with the state prepared by Bob in the absence of any attempt of eavesdropping. For errors below a tolerable limit, they proceed to the next step, else they start afresh.

  • LM 3 To encode her message on half of the remaining qubits Alice applies operator I (iY) for sending 0 (1). Subsequently, she returns the encoded qubits to Bob. Here, it would be nice to mention that using such a scheme, for both choices of encoding, a particular initial state will transform into orthogonal states. Consequently, at Bobs end, a message can be easily decoded by measuring the state in the basis it was prepared.

  • LM 4 Alice announces the coordinates of the qubits she had not encoded on (as she wished to use them as decoy qubits for Alice to Bob communication). Bob measures corresponding qubits in the basis he had prepared them initially to check the presence of Eve for Alice to Bob travel of the encoded particles. The same task can also be achieved by Alice encoding on all the remaining qubits after eavesdropping in LM2, while she prepares additional string of equal number of qubits in \(|0\rangle ,|1\rangle ,|+\rangle ,|-\rangle \) randomly for eavesdropping checking in this step.

  • LM 5 Only if Bob is convinced of the absence of Eve, he decodes the message sent by Alice by measuring the qubits in the same basis he had prepared them in LM1; otherwise, they abort the protocol.

The effect of the AD noise on the single-qubit-based QSDC protocol (LM05 protocol) opted here, LM05, can be deduced from the fidelity expression

$$\begin{aligned} F_{AD1}^{QSDC}=\frac{1}{4}\left( \eta ^{2}-3\eta +4\right) . \end{aligned}$$
(28)

The corresponding expression under the effect of PD noise is

$$\begin{aligned} F_{PD1}^{QSDC}=\frac{1}{4}\left( \eta ^{2}-2\eta +4\right) . \end{aligned}$$
(29)

Similar to the entanglement-based QKA scheme, two rounds of quantum communication is involved here, due to which the expressions of fidelity under CD noise

$$\begin{aligned} F_{CD1}^{QSDC}=\frac{1}{4}(\cos ({\phi }_{1})\cos ({\phi }_{2})+3), \end{aligned}$$
(30)

and that for CR noise

$$\begin{aligned} F_{CR1}^{QSDC}=\cos ^{2}({\theta }_{1}+{\theta }_{2}), \end{aligned}$$
(31)

involve two noise parameters (\(\phi _{1},\,\phi _{2}\) or \(\theta _{1},\,\theta _{2}\)) each. As usual, the fidelity expression for Pauli channels with four parameters is

$$\begin{aligned} F_{P1}^{QSDC}=p_{1}^{2}+p_{2}^{2}+p_{3}^{2}+p_{4}^{2}+(p_{1}+p_{3})(p_{2}+p_{4}). \end{aligned}$$
(32)

The presence of quadratic terms is signature of two rounds of quantum communication. When the travel qubits undergo a dissipative interaction characterized by the SGAD channel, the fidelity is obtained as

$$\begin{aligned} F_{SGAD1}^{QSDC}= & {} \frac{1}{8}\Big \{ 2\Big ((\nu -3)\nu +Q^{2}\Big (-2\lambda \nu +(\lambda -1)\lambda +\nu ^{2}-\nu +2\Big )\nonumber \\&+\,2(\nu -1)Q(\lambda -\nu +1)+4\Big )- 4\sqrt{1-\lambda }\sqrt{1-\mu }\sqrt{1-\nu }Q^{2}\nonumber \\&+\,\mu (Q-1)(-7\nu +Q(-4\lambda +7\nu -2)+ 4\sqrt{\mu }\sqrt{\nu }(Q-1)\cos (\Phi )\nonumber \\&\times \,\Big (-\sqrt{1-\mu }\sqrt{1-\nu }-\sqrt{1-\lambda }Q+\sqrt{1-\mu }\sqrt{1-\nu }Q\Big )\nonumber \\&+\, \nu (Q-1)\cos (2\Phi )\,{+}\,6)\,{+}\,4\sqrt{1\,{-}\,\lambda }\sqrt{1\,{-}\,\mu }\sqrt{1\,{-}\,\nu }Q\,{+}\,2\mu ^{2}(Q\,{-}\,1)^{2}\Big \}.\nonumber \\ \end{aligned}$$
(33)

4.3.2 Ping-pong protocol

An entangled-state-based QSDC protocol was proposed by \(\mathrm{Bostr\ddot{o}m}\) and Felbinger in 2002 [16]. Precisely, LM05 protocol is a single-qubit-based counterpart of PP protocol. The PP protocol works as follows:

  • PP 1 Bob prepares \(|\psi ^{+}\rangle ^{\otimes n}\), where \(|\psi ^{+}\rangle \equiv \frac{1}{\sqrt{2}}(|00\rangle +|11\rangle )\). Then he sends all the first particles to Alice keeping all the second qubits with himself.

  • PP 2 Alice forms a verification string by randomly choosing a set of \(\frac{n}{2}\) qubits to perform BB84 subroutine as was done in LM2. Specifically, Alice measures the qubits randomly in \(\left\{ 0,1\right\} \) or \(\left\{ +,-\right\} \) basis and announces the choice of basis. Bob also measures his qubits in the same basis. In the absence of Eve, their measurement outcomes are expected to be correlated. In the absence of such a correlation, they discard the protocol and return to PP1; otherwise, they proceed.

  • PP 3 Out of half of the remaining qubits, Alice randomly makes two sets of equal number of qubits. One set for encoding her message and another set for eavesdropping check for Alice to Bob communication. To encode 1, Alice applies X gate before sending the qubit to Bob, and for sending 0, she returns the qubit unchanged.

  • PP 4 Alice informs the coordinates of verification string, and Bob performs BB84 subroutine to compute the error rate.

  • PP 5 For low error rates, Bob performs Bell state measurement on the partner pairs to decode the message sent by Alice.

The analytical expressions of fidelity in the case of the PP protocol exactly match those for entanglement-based QKA scheme [9]. Specifically, if Alice sends random bits instead of her message in the PP protocol, it will reduce to a QKD protocol. Now, suppose that Alice shares her key in a secure manner using this modified PP scheme and Bob announces his key with a prior agreement to obtain the final key by performing an Ex-OR operation between their individual keys. Then, the QKA scheme [9] can be viewed as a modified PP scheme with the same amount of quantum communication involved. Hence, the effect of noise is expected to be the same in PP and Shukla et al.’s QKA scheme. Therefore, we avoid repetition of the expressions and carry on with the discussion regarding the comparison between LM05 and PP protocols under noisy environments.

Fig. 4
figure 4

QSDC under AD, PD, CR and CD noises are depicted in a, b, c and d, respectively. The smooth (blue) and dashed (red) lines correspond to LM05 and PP protocols, respectively. For CR and CD noises, it is assumed that the noise parameter is same for both the directions of travel of the qubit (i.e., Alice to Bob and Bob to Alice). In e, the fidelity under the depolarizing channel for LM05 and PP protocols are shown in dotted (magenta) and dotted dashed (cyan) lines, respectively. In all the remaining cases of PP and bit-phase flip for LM05, the red line illustrates the fall and revival in fidelity. Lastly, the blue line corresponds to the fidelity in bit flip and phase flip errors in LM05 scheme. f illustrates the effect of AD (i.e., an interaction with a zero temperature and squeezing bath) in smooth (blue) and dashed (red) lines; GAD (i.e., an interaction with a nonzero temperature and zero squeezing bath) in dotted dashed (cyan) and dotted (magenta) lines with \(T=1\); and SGAD (finite temperature and squeezing bath) in large dashed (orange) and large dotted dashed (purple) lines with \(T=1\) and squeezing parameters \(r=1\) and \(\Phi =\frac{\pi }{8}\) for LM05 and PP protocols, respectively (Color figure online)

Fig. 5
figure 5

Contour plots of fidelity of LM05 protocol when subjected to CR and CD noises in a and b, respectively

Both the QSDC protocols when subjected to noise are affected to different extent. Precisely, as observed in the protocols discussed so far, the single-qubit-based schemes have been found to be more efficient as compared to entangled-state-based schemes in AD and PD noisy channels. This is also observed here in Fig. 4a and b. Under the assumption of the same noise parameter for CD and CR noise for Alice to Bob and Bob to Alice travel of the qubits, PP protocol is affected by the CR and CD noise in a manner similar to the entangled-state-based QKA protocol. In fact, in the entangled-state-based QKA scheme one of the parties sends the raw key by PP-type QSDC, while the other party announces it. Therefore, the effect of noise is the same as in PP protocol. The single-qubit-based scheme has different nature in Fig. 4c and d as compared to the corresponding QKD and QKA protocols. This can be attributed to the two-way quantum communication associated in this scheme, unlike the last two cases where it was unidirectional. Further, in the presence of CD noise, the benefit of bidirectional communication can be easily observed as the observed fidelity is more than the previous cases. The single qubits (in LM05) perform better when subjected to CD noise, but suffer more under the influence of CR noise. In Fig. 5, we have not shown the contour plots for the fidelity for PP protocol under collective noise as the expressions are exactly the same as that illustrated through Fig. 3 for Shukla et al’s QKA scheme. The contour plots also show that very low fidelity is also possible for some particular values of noise parameters during the two directions of transmission. Further, under the effect of CD noise, a similar nature of the fidelity variation under LM05 and PP protocols can be observed in Fig. 5. However, a closer look reveals that under CD noise fidelity obtained for LM05 protocol is more than that obtained for PP protocol, indicating that for CD noise, single-qubit-based LM05 protocol performs better than the corresponding entangled-state-based PP protocol.

The expressions of fidelity under Pauli noise reveal that the fidelity for PP protocol in bit, phase and bit-phase flip is the same as the fidelity for bit-phase flip errors for equal probability of error in LM05 protocol. In this case, the fidelity resurrects to 1 for maximum probability of error. Quite a similar nature is observed for fidelity under bit flip and phase flip errors in LM05 scheme though it remains less than that of the corresponding values in the PP protocol. Similarly, under the influence of the depolarizing channel the fidelity fails to revive but remains always more for LM05 protocol.

The advantage of squeezing, a purely quantum resource, can be observed in Fig. 4f, where in the presence of squeezing after an appreciable amount of time, fidelity higher than the corresponding case of zero squeezing can be observed. Specifically, higher fidelity under SGAD channel relative to AD channel shows that coherence can be sustained using squeezing that would have been lost due to the presence of nonzero temperature.

4.4 Quantum dialogue protocols and effect of noise on them

One of the most efficient secure quantum communication schemes is the quantum dialogue (QD). In this scheme, both the legitimate parties encode their information on the same qubits and at the end of the protocol each party can deduce the others message. The first QD scheme was proposed by Ba An using Bell states in 2004 [11]. Recently, Yang and Hwang proposed a QD scheme immune to the collective noise using logical qubits [15]. Here, we consider two QD protocols for analyzing their performance when subjected to noisy environments.

4.4.1 Single-qubit-based QD protocol

A modified QD protocol using only single-qubit states and MUBs was proposed by Shi et al. in 2010 [14]. Shi et al. protocol can be described in the following steps:

  • QD 1 Bob prepares a sequence of 2n single qubits randomly in \(\left\{ |0\rangle ,|1\rangle \right\} \) or \(\left\{ |+\rangle ,|-\rangle \right\} \) basis. He intentionally prepares two copies of n qubits, i.e., two adjacent photons are in the same quantum state. For example, Bob prepares a string of single qubits as \(\left\{ \left( |0\rangle ,|0\rangle \right) ,\left( |+\rangle ,|+\rangle \right) ,\left( |-\rangle ,|-\rangle \right) ,\left( |1\rangle ,|1\rangle \right) \right\} \), and out of each pair, one qubit will be used for encoding, while the other one will be used to send the initial state information. He also prepares some additional decoy qubits to be used for eavesdropping check in each round of communication. Finally, he sends all the 2n qubits after inserting decoy qubits randomly in them to Alice.

  • QD 2 Bob and Alice perform security checking for the received qubits. Specifically, Bob will announce positions of the decoy qubits he chooses for this round of communication and Alice announces her choice of measuring basis and corresponding outcome. Using that, Bob determines the error rate and decides whether to proceed or call off the protocol.

  • QD 3 With the help of Bob, Alice can separate three sequences: the first one of decoy qubits, and two sequences of one copy of initial states each. Out of these three sequences, she encodes her message on the second sequence using I (iY) operation for sending bit value 0 (1). Subsequently, she encodes a checking message on the decoy qubits using the same scheme and concatenates these two encoded sequences. Finally, she sends this concatenated sequence after randomizing to Bob while keeping the last sequence with herself.

  • QD 4 After receiving authenticated receipt of all the qubits from Bob, Alice will announce the positions of the decoy qubits and being aware of the preparation basis he decodes the message and announces it publicly. With this checking message, Alice decides whether to go to the next step or start afresh.

  • QD 5 If they decide to proceed, Bob also encodes on the received qubits after rearranging them using the same encoding scheme as Alice. Subsequently, he performs measurement on all these qubits in the basis in which they were prepared and announces the measurement outcomes. From the measurement outcomes, Bob gains the knowledge of Alice’s encoding as he knows his encoding apart from the initial and final state. Further, the measurement outcomes also reveal the choice of the basis used for preparation of the states. Using this information, Alice measures the third sequence, she had kept with herself in QD 3, in a suitable basis and learns the initial state of Bob. From the information of the initial and final states, Alice can extract the message of Bob by using her knowledge of her encoding.

The fidelity expression of single-qubit-based QD scheme under AD channel contains cubic terms

$$\begin{aligned} F_{AD1}^{QD}=\frac{1}{8}\left( -2\eta ^{3}+5\eta ^{2}-\left( \sqrt{1-\eta }+7\right) \eta +2\left( \sqrt{1-\eta }+3\right) \right) , \end{aligned}$$
(34)

which signify bidirectional quantum communication apart from a QSDC to inform Bob about the initial state. This fact can also be observed in PD noise

$$\begin{aligned} F_{PD1}^{QD}=\frac{1}{8}\left( -\eta ^{3}+4\eta ^{2}-6\eta +8\right) . \end{aligned}$$
(35)

For the two rounds of communication under collective noisy channels, characterized by two noise parameters, the fidelity for CD is

$$\begin{aligned} F_{CD1}^{QD}=\frac{1}{8}\left( \cos ^{2}({\phi }_{1})\cos ({\phi }_{2}) +\cos ({\phi }_{1}) (\cos ({\phi }_{2})+1)+5\right) , \end{aligned}$$
(36)

and for CR noise is

$$\begin{aligned} F_{CR1}^{QD}=\cos ^{2}({\theta }_{1})\cos ^{2}({\theta }_{1}+{\theta }_{2}). \end{aligned}$$
(37)

Similarly, all the qubits traveling through a Pauli channel give rise to the fidelity as a function of various parameters, as

$$\begin{aligned} F_{P1}^{QD}= & {} \frac{1}{2}\left\{ 2p_{1}^{3}+3p_{1}^{2}(p_{2}+p_{4})+2p_{1}\left( 2p_{2}^{2}+p_{2}p_{3}+p_{3}^{2}+p_{3}p_{4}+2p_{4}^{2}\right) \right. \nonumber \\&\left. +p_{2}^{3}+p_{2}^{2}p_{4}+p_{2}\left( p_{3}^{2}+4p_{3}p_{4}+p_{4}^{2}\right) +p_{4}\left( p_{3}^{2}+p_{4}^{2}\right) \right\} . \end{aligned}$$
(38)

Finally, the obtained fidelity for this QD scheme under the action of the SGAD channel is

$$\begin{aligned} F_{SGAD1}^{QD}= & {} \frac{1}{16}\Big \{ Q^{3}\Big (-4\lambda ^{3}+4(3\mu +\nu )\lambda ^{2}-2\Big (6\mu ^{2}+4\nu \mu +2\nu ^{2}+\sqrt{1-\lambda }\nonumber \\&-\,3\sqrt{1-\mu }\sqrt{1-\nu }\Big )\lambda - 6\sqrt{1-\lambda }\mu +9\sqrt{1-\lambda }\mu \nu -6\sqrt{1-\lambda }\nu \nonumber \\&-\,5\sqrt{1-\mu }\mu \sqrt{1-\nu }\nu + 2\sqrt{1-\mu }\sqrt{1-\nu }\nu + 4(\mu +\nu )\Big (\mu ^{2}\nonumber \\&+\,\nu ^{2}\Big )+8\sqrt{1-\lambda }+ 2\sqrt{1-\mu }\mu \sqrt{1-\nu }-8\sqrt{1-\mu }\sqrt{1-\nu }\Big )\nonumber \\&-\, Q^{2}\Big (12\mu ^{3}+2(6\nu -5)\mu ^{2}+3\Big (\nu \Big (4\nu +6\sqrt{1-\lambda }\nonumber \\&-\, 5\sqrt{1-\mu }\sqrt{1-\nu }-5\Big )+ 2\sqrt{1-\mu }\sqrt{1-\nu }\Big )\mu \nonumber \\&+\, 2\Big (-6\sqrt{1-\lambda }\mu +\mu +\nu +2\sqrt{1-\lambda }\Big (\sqrt{1-\mu }\sqrt{1-\nu }- 3\nu \Big )\nonumber \\&+\, 6\sqrt{1\,{-}\,\lambda }\,{-}\,6\sqrt{1\,{-}\,\mu }\sqrt{1\,{-}\,\nu }\,{-}\,2\Big )+ 2\nu \Big (\nu (6\nu \,{-}\,5)+3\sqrt{1\,{-}\,\mu }\sqrt{1\,{-}\,\nu }\Big )\nonumber \\&+\, 2\lambda \Big (6\nu -2\Big (2\nu ^{2}+ 4\mu \nu +\mu (6\mu -5)\Big )+ 3\sqrt{1-\mu }\sqrt{1-\nu }+1\Big )\nonumber \\&+\, 2\lambda ^{2}(6\mu +2\nu -5)\Big )+\Big (3\Big (\nu \Big (4\nu +3\sqrt{1-\lambda }- 5\sqrt{1-\mu }\sqrt{1-\nu }-10\Big ) \nonumber \\&+\, 2\sqrt{1-\mu }\sqrt{1-\nu }\Big )\mu + 12\mu ^{3}+2\Big (\Big (8-3\sqrt{1-\lambda }\Big )\mu +8\nu \nonumber \\&+\, \sqrt{1-\lambda }\Big (2\sqrt{1-\mu }\sqrt{1-\nu }-3\nu \Big )+4\sqrt{1-\lambda }-4\sqrt{1-\mu }\sqrt{1-\nu }-2\Big )\nonumber \\&+\, 4(3\nu -5)\mu ^{2}-4\lambda \Big (3\mu ^{2}+(2\nu -5)\mu +(\nu -3)\nu +3\Big )\nonumber \\&+\, 2\nu \Big (2\nu (3\nu -5)+3\sqrt{1-\mu }\sqrt{1-\nu }\Big )\Big )\Big \}. \end{aligned}$$
(39)

4.4.2 Ba An protocol of QD

In the originally proposed Ba An’s QD scheme, both parties can communicate simultaneously using Bell states [1113]. The protocol can be summarized in the following steps:

  • QD:BA 1 Bob prepares \(|\psi ^{+}\rangle ^{\otimes n}:\,|\psi ^{+}\rangle =\frac{|00\rangle +|11\rangle }{\sqrt{2}}\). He encodes his message on the first qubit (travel qubit) and keeps the second qubit with himself as home qubit. To encode his message, he uses dense coding, i.e., he applies unitary operations \(I,\,X,\,iY\) and Z to encode \(00,\,01,\,10\) and 11, respectively.

  • QD:BA 2 Bob sends all the first qubits to Alice and confirms their receipt.

  • QD:BA 3 Alice also encodes on the travel qubit using the same rule as was used by Bob and sends them back to Bob. Bob performs a Bell measurement on the partner particles (Bell measurement is done on a qubit from the sequence of home qubits and another qubit from the sequence of travel qubits, which was initially entangled with the chosen home qubit).

  • QD:BA 4 After Alice’s disclosure Bob comes to know whether it was message mode (MM) or control mode (CM).Footnote 1 Bob announces his measurement outcome in the MM using which both Alice and Bob can learn each others message, while in CM Alice announces her encoding which Bob uses for eavesdropping checking.

In the original Ba An’s QD scheme, when subjected to AD and PD noise, the fidelity can be seen to be

$$\begin{aligned} F_{AD2}^{QD}=\frac{1}{4}(\eta -2)^{2}, \end{aligned}$$
(40)

and

$$\begin{aligned} F_{PD2}^{QD}=\frac{1}{2}\left( \eta ^{2}-2\eta +2\right) , \end{aligned}$$
(41)

respectively. The presence of quadratic terms is a signature of bidirectional quantum communication involved. Under the coherent effect of CD noise on the travel qubits, we obtain

$$\begin{aligned} F_{CD2}^{QD}=\frac{1}{2}\left\{ \cos ({\phi }_{1})\cos ({\phi }_{2})+1\right\} , \end{aligned}$$
(42)

and for CR noise the fidelity is found to be

$$\begin{aligned} F_{CR2}^{QD}=\frac{1}{2}\left\{ \cos ^{2}({\theta }_{1}-{\theta }_{2})+\cos ^{2}({\theta }_{1}+ {\theta }_{2})\right\} . \end{aligned}$$
(43)

When the travel qubit is transmitted through a Pauli channel, the fidelity is the same as that obtained in case of PP protocol. The analytic expression of fidelity for Ba An protocol of QD, when subjected to SGAD noise, is

$$\begin{aligned} F_{SGAD2}^{QD}= & {} \frac{1}{4}\left\{ Q^{2}\left( \lambda ^{2}\,{-}\,2\lambda (\mu \,{+}\,\nu \,{+}\,1)\,{-}\,2\left( 2\sqrt{1\,{-}\,\lambda }\sqrt{1\,{-}\,\mu }\sqrt{1\,{-}\,\nu }\,{+}\,\mu \,{+}\,\nu \,{-}\,2\right) \right. \right. \nonumber \\&\qquad \left. +\,\mu ^{2}+5\mu \nu +\nu ^{2}\right) + \mu ^{2}+\mu (5\nu -4)+(\nu -2)^{2}\nonumber \\&+\,\mu \nu (Q\,{-}\,1)^{2}\cos (2\Phi )\,{+}\, \left. 2Q\left( \lambda (\mu \,{+}\,\nu \,{-}\,1)\,{+}\,2\sqrt{1\,{-}\,\lambda }\sqrt{1\,{-}\,\mu }\sqrt{1\,{-}\,\nu }\right. \right. \nonumber \\&\left. \left. -\mu ^{2}+\mu (3-5\nu )-(\nu -3)\nu -2\right) \right\} . \end{aligned}$$
(44)
Fig. 6
figure 6

QD protocols are analyzed under AD, PD, CR and CD noises in ad, respectively. The smooth (blue) and dashed (red) lines correspond to the single-qubit-based and Ba An’s QD protocols, respectively. For CR and CD noises, it is assumed that the noise parameter is same for both the directions of travel of the qubit (i.e., Alice to Bob and Bob to Alice). In e, bit-phase flip is shown together for the single-qubit-based QD and Ba An protocol of QD in smooth (blue) and dotted (magenta) lines, respectively. For Ba An protocol of QD bit-phase flip errors matches exactly with the previous case. However, for single-qubit-based scheme, it is shown in dashed (red) line. Under the depolarizing channel, the fidelity variation for the single-qubit-based scheme and Ba An protocol of QD is demonstrated by dotted dashed (cyan) and large dotted dashed (purple) lines, respectively. f corresponds to the effect of AD (i.e., an interaction with a zero temperature and squeezing bath) in smooth (blue) and dashed (red) lines; GAD (i.e., an interaction with a nonzero temperature and zero squeezing bath) in dotted dashed (cyan) and dotted (magenta) lines with \(T=1\); and SGAD (finite temperature and squeezing bath) in large dashed (orange) and large dotted dashed (purple) lines with \(T=1\) and squeezing parameters \(r=1\) and \(\Phi =\frac{\pi }{8}\) for the single-qubit-based and Ba An’s QD protocols, respectively (Color figure online)

Fig. 7
figure 7

Contour plots illustrating the variation of fidelity of the single-qubit-based Shi et al. protocol and entangled-state-based Ba An protocol of QD in CR and CD noises, respectively

When both the protocols of QD are subjected to AD noise, the fidelity obtained for the entangled-state-based protocol is comparable of that of the single-qubit-based one. This is in contrast to the earlier observations reported in the present work, where single-qubit-based schemes were found to be preferable in cases of AD and PD noise models. Though, in the large decoherence limits the single-qubit-based QD turns out to be a suitable candidate (cf. Fig. 6a). It is worth commenting here that the decay in the fidelity of single-qubit-based QD scheme when compared with the corresponding QSDC protocol (as they are of the same order in entanglement-based schemes) can be attributed to an extra single qubit traveling through the noisy channel in step QD 1. However, under the effect of PD channels, the observation established from the previous three secure quantum communication schemes (namely, QKD, QKA and QSDC protocols) remains valid (cf. Fig. 6b); in other words, it is observed that the single-qubit-based schemes perform better in PD channels. When Ba An protocol of QD is subjected to collective noise, the same nature of fidelity variation as was observed in PP protocol is observed if the same noise parameters are used in to and fro travel of the qubits. However, in the single-qubit-based QD scheme a different nature from LM05 protocol is observed. Interestingly, a close look at Fig. 4c, d and Fig. 6c, d reveals that compared to LM05 protocol, an extra dip is observed at \(\theta =\frac{\pi }{2}\) (where for LM05 fidelity was obtained to be unity). This dip was observed in single-qubit-based QKA scheme, too (cf. Fig. 2c). This point further establishes the fact that the fidelity of single-qubit-based QD schemes decays, when subjected to AD noise. The contour plots shown in Fig. 7 also demonstrate that the single-qubit-based QD scheme has a different nature of fidelity variation compared to that in LM05 protcol, while in entangled-state-based protocol it remains similar to that observed in PP.

The expression of fidelity under Pauli noise shows that for Ba An protocol of QD it is the same as in PP protocol. However, the presence of cubic terms in the expressions of fidelity for single-qubit-based QD is a signature of the nature observed in Fig. 6e, i.e., the descent for very low and high error probabilities. For the bit/phase flip error, the single-qubit-based scheme remains the preferred choice, but for very high probability of errors it should be avoided. A similar nature is also observed under the influence of a depolarizing channel. For bit-phase flip error, fidelity indicates better performance of entanglement-based scheme as compared to their single-particle counterparts.

Under a dissipative interaction with a nonzero temperature bath, a behavior similar to that observed under an AD channel is seen. However, due to the nonzero squeezing, single-qubit-based QD scheme turns out to be a better candidate. Fig. 6f further reiterates the facts observed in Fig. 6a–d, i.e., the obtained nature in the case of Ba An protocol of QD is the same as in PP protocol; and in single-qubit-based scheme, it can be explained as a compound effect of single-qubit-based QKA and QSDC protocols.

5 Conclusion

The comparative study of single-qubit-based and entangled-state-based schemes of secure quantum communication performed in the present work has lead to a number of interesting conclusions. Firstly, the equivalence observed in the ideal noiseless scenario is lost in more practical scenarios where noise is present. Next, it is observed that it is not possible to say unambiguously that in a noisy environment entangled-state-based protocols perform better than the single-qubit-based protocols or vice versa. In fact, it depends on the nature of the noise present in the channel. Specifically, single-qubit-based schemes are generally found to be the suitable choice in the presence of AD and/or PD noises, while entanglement-based protocols turn out to be preferable in the presence of collective noise. As SGAD and GAD channels are generalizations of the AD channel, conclusions similar to that for the AD channel are also applicable to them. However, with an increase in temperature, fidelity is seen to decay. Squeezing is seen to play the role of a beneficial quantum resource, in a host of scenarios, in practical quantum communication. Also, it is observed that the effect of noise depends upon the number of rounds (how many times a travel qubit travels through the noisy channel) of quantum communication involved. For instance, QKD protocols are least affected by noise, while QD protocols are most affected as in QKD protocols a travel qubit travels only once through the noisy channel, whereas in Ba An protocol of QD, it travels twice through the noisy channel. Further, the single-qubit-based QD scheme involves three rounds of communication as it requires Alice to Bob and Bob to Alice transmission of qubits and an additional Alice to Bob travel of equal number of qubits. As a consequence, single-qubit-based QD scheme is found to be the most affected among the four different single-qubit-based schemes for secure quantum communication discussed in this paper.

We conclude by noting that the comparison between two different types of resources (single qubits and entangled qubits), used for different quantum cryptographic tasks, does not show any specific advantage of entanglement-based schemes unless we consider device independence. This is an interesting observation, as we know that entanglement can offer an advantage in some quantum communication tasks. For example, teleportation and dense coding cannot be performed without entanglement. Thus, the use of entanglement is justified in the implementation of protocols of dense coding and teleportation. However, for the quantum cryptographic tasks described here, one may circumvent the use of entanglement, which is a physically more expensive quantum resource compared to single qubits. Specifically, if the communication is done via a well characterized quantum channel, where it is known that the noise acts independently on each qubit, then entanglement-based protocols are not required for the implementation of any cryptographic task considered here. In other words, in such situations, we can work with a less expensive quantum resource (single qubit). This summarizes the practical relevance of the present work. Further, keeping this relevance in mind, we expect that the present observation will help experimentalists to select appropriate protocols and resources based on the characteristics of the quantum channel (nature of noise present in the quantum channel) used.