1 Introduction

Quantum key distribution (QKD) protocols are known to offer information theoretic security of information, unlike their classical counterparts which can only offer computational security. Over the time, a number of QKD protocols have been proposed (cf. the review [1]), since their foundation was laid over three decades ago by Bennett and Brassard [2]. While QKD protocols typically involve the probabilistic generation of a secret key, [3] proposed a deterministic version thereof using entanglement in a two-way protocol (called the “ping-pong protocol,” described below), but it turns out that the idea can also be realized without entanglement [4]. Certain attacks or modifications to the ping-pong protocol were proposed in [5,6,7,8], which were analyzed in [9]. Subsequently, further modifications or attacks on the ping-pong protocol were studied by other authors [10,11,12,13,14].

Noise is especially detrimental to quantum information processing, given the fragility of quantum resources [15]. Yet, recently, there have been a few reports pointing out that the addition of classical or quantum noise by information sender Alice or receiver Bob can be advantageous to QKD [16,17,18]. Here, we shall refer to such user added noise as “trusted.” Note that this terminology differs from that used by [19], who in the context of continuous variable QKD protocols [20] refer to noise that is security breaking as “untrusted” and noise that is merely key rate reducing as “trusted.”

Quantum non-Markovianity of noise is the quantum analogue of classical memory effects and manifests itself through the backflow of quantum information or increase in the distinguishability of two states subjected to a noisy channel [21,22,23], though we may reasonably posit weaker manifestations of quantum non-Markovianity (cf. [24, 25]). Thus, it is intuitive to expect that quantum non-Markovianity can be helpful to information processing [26, 27], especially at low temperatures [28, 29] . However, this is by no means automatic (cf. e.g., [30]).

In an earlier work, it was shown [26] that non-unital noise helps cryptographic security for QKD based on the ping-pong communication protocol for a specific attack, essentially because the noise turns out to be more detrimental for Eve than Alice and Bob. In this paper, we show that non-Markovianity can further boost the advantage given by the non-unitality of quantum channels under certain circumstances. As before, unital channels provide no advantage. We consider two different scenarios in which amplitude damping noise is deliberately applied by a legitimate party (Bob, specifically) before a Bell measurement, and study the increase in secure key rate. In both cases, we find that if the quantum noise is non-Markovian, then the secure key rate increases significantly in comparison with Markovian noise in certain time ranges.

There do not seem many works that have explored this practically useful aspect. Notably, Ref. [18] shows that deliberately adding depolarizing noise increases secure key rate for BB84 [2] and for entanglement-based six-state protocols [31, 32]. This was somewhat inspired from the work [17] where for the six-state protocol, white noise added by the sender to the message qubit either prior to sending the qubit or prior to measurement on the qubit gives rise to an increased secure key rate in the sense we consider in this paper.

This paper is arranged as follows. In Sect. 2, we introduce the protocol, which is the “ping-pong” communication protocol adapted for QKD. In Sect. 3, we discuss the phenomenologically motivated model of amplitude damping noise and describe how it can be added during the protocol. We consider in Sect. 3.1 the first scenario involving a single-qubit noise and in Sect. 3.2 the second scenario involving two-qubit incoherent noise. In Sect. 4, we show that the noisy joint statistics cannot be simulated by locally adding classical randomness to the noiseless joint quantum statistics of the protocol. Then, we conclude in Sect. 6.

2 The basic protocol and the optimal individual attack

The ping-pong protocol, adapted as a scheme for QKD, runs as follows: Bob prepares the Bell state \({|{\psi ^{+}}\rangle } = \frac{1}{\sqrt{2}}({|{01}\rangle } + {|{10}\rangle })\), in particular pair of photons entangled in the polarization degree of freedom, out of which he sends one photon (travel photon) to Alice through a quantum channel, ideally assumed to be noiseless and lossless. Alice then encodes the travel qubit by applying either I or \(\sigma _z\) with probability \(\frac{1}{2}\), and sends it back to Bob. Once the travel qubit returns to Bob, he is left with either of the two Bell states \({|{\psi ^{\pm }}\rangle } = \frac{1}{\sqrt{2}}({|{01}\rangle }\pm {|{10}\rangle })\), corresponding to the bit 0 or 1 encoded by Alice, which he distinguishes through a Bell measurement.

In the original ping-pong quantum direct communication protocol, the security requires alternating between the above message mode and a control mode, wherein Alice measures the travel qubit for error checking, and does not return it. Here, for the requirement of QKD, we drop the control mode and consider only the message mode. As a security check, both parties compute the quantum bit error rate (QBER) by sampling a fraction of the qubits transmitted. On them, Alice announces her encoded bit and Bob announces the Bell state he detected. The fraction of cases where their records differ is an estimate of QBER and a potential indicator of eavesdropper Eve’s presence. If QBER is found to be less than a threshold value, they proceed ahead with key distillation, or else they abort the protocol.

Fig. 1
figure 1

General scheme of the ping-pong protocol [3]: Bob prepares an entangled qubit pair in polarization degrees of freedom, and transmits the travel qubit to Alice and retains the home qubit. All channel noise is conservatively assumed to be due to Eve’s attack. In addition, Bob adds noise to the qubit(s) prior to his measurements. The same layout is used when the protocol is adapted for QKD, except that the control mode is dropped (cf. text) (Color online)

The interesting aspect of the ping-pong protocol is that in the ideal case, Eve only finds the onward and return photons to be in the maximally mixed state. Wojcik [5] proposed a strategy by attacking the onward and return legs. In this attack, Eve includes two ancillary particles: the first (labeled x) prepared in a vacuum state, denoted \({|{2}\rangle }\), and the other (labeled y) in the state denoted \({|{y}\rangle } = {|{0}\rangle }\). Then the composite initial state is \({|{\Psi }\rangle }^\mathrm{initial}_\mathrm{htxy} = {|{\psi ^+}\rangle }{|{2}\rangle }_x {|{0}\rangle }_y\), where h and t are labels for “home” and “travel” qubit states, respectively. In the onward leg, Eve attacks the travel qubit by applying the operation given by:

$$\begin{aligned} Q_{txy}: \left. \begin{array}{c} {|{020}\rangle } \\ {|{021}\rangle } \\ {|{120}\rangle } \\ {|{121}\rangle } \end{array} \right\} \longrightarrow \left\{ \begin{array}{c} {|{002}\rangle }+{|{201}\rangle } \\ {|{002}\rangle }-{|{201}\rangle } \\ {|{210}\rangle }+{|{112}\rangle } \\ {|{210}\rangle }-{|{112}\rangle } \end{array} \right. \end{aligned}$$
(1)

with CPBS denoting the “controlled polarization beam splitter” operation. On the return leg (after Alice’s encoding action), Eve applies the operation \(Q_{txy}^{-1}\) on the travel qubit and forwards it to Bob.

After the end of the quantum round, Bob receives the final states \( {|{\Psi }\rangle }_\mathrm{fin} = \frac{1}{\sqrt{2}} ({|{012j}\rangle }+{|{1020}\rangle }), \) with \(j \in \{0,1\}\), corresponding to Alice’s operation \({\hat{O}}_j \in \{I, Z\}\). The joint probabilities of Alice, Eve and Bob, \(P_\mathrm{AEB}\), are found to be

$$\begin{aligned} P_{000}=\frac{1}{2}; \quad P_{1jk}=\frac{1}{8}, \end{aligned}$$
(2)

for \(j, k \in \{0,1\}\).

The secure (or secret) key rate for this individual attack on each travel by Eve is lower bounded by \(k_{\min } = I(A:B) - \chi (A:E)\), where I(A : B) is the mutual information between the trusted parties Alice and Bob, and \(\chi (A:E)\) is the Holevo information between trusted party Alice and malicious Eve. In practice, the key rate may be as high as determined \(k_{\max } = I(A:B) - I(A:E)\). For the noiseless case of (2) , it turns out that \(I(A:B) = I(A:E) = \chi (A:E) \approx 0.31\) implying that the key rate vanishes and that Eve’s attack strategy is indeed optimal for this protocol.

3 Noise advantage

In general, it is known that noise can degrade the quantum information processing tasks, in particular QKD. In Ref.  [26], we pointed out the surprising fact of advantage that noise can bestow on QKD. Here, we extend that analysis, by including the role of memory in the quantum dynamics. Because the noise brings an advantage, we can visualize the scenario wherein Bob (or Alice) deliberately adds such beneficial noise to the particles.

We consider two scenarios, wherein Bob, before making Bell measurements on the entangled pair of particles, but after receiving the travel qubit, introduces noise into the system. In the first case, he subjects the travel qubit alone to an optical setup that simulates AD. In the second case, he subjects both the photons to noisy devices in the above manner. In both scenarios, Eve is still assumed to act according to the attack described in Sect. 2. Note that we may also assume that the noise occurs naturally because of Bob’s noisy devices, and he merely takes advantage of it.

For the noisy dynamics introduced by Bob, we consider a non-Markovian amplitude damping (NMAD) channel, modeled by damped Jaynes–Cummings model with operator-sum representation given by the Kraus operators [33]

$$\begin{aligned} E_{0}^{A}=\left[ \begin{array}{cc} 1 &{} 0\\ 0 &{} \sqrt{1-\lambda (t)} \end{array}\right] ;\,\, E_{1}^{A}=\left[ \begin{array}{cc} 0 &{} \sqrt{\lambda (t)}\\ 0 &{} 0 \end{array}\right] , \end{aligned}$$
(3)

where

$$\begin{aligned} \lambda (t) =1- e^{- g t} \left( \frac{g }{l} \sinh \left[ \frac{l t}{2}\right] + \cosh \left[ \frac{l t}{2}\right] \right) ^2, \end{aligned}$$
(4)

with \( l = \sqrt{g^2 - 2 \gamma g} \). Here, g is the spectral band width of the noise and \(\gamma \) is the system–environment coupling strength. One readily sees that the system exhibits Markovian and non-Markovian evolution when \(2 \gamma \ll g\) and \( 2 \gamma \gg g\), respectively [34].

The above noise may be simulated in an all-optical setup [35,36,37] by associating the qubit with polarization degrees and the reservoir to the path degrees. With a suitable mapping of the parameters of JC model to the parameters of the optical setup, one may obtain Markovian and non-Markovian effects experimentally. Interestingly, similar to [35], the authors of [38] propose an optical simulation of Markovian and non-Markovian AD. However, we consider the former approach for our case in this paper.

3.1 Case 1: Only travel qubit subjected to NMAD

When the photon returns back to Bob, the state of the system hty for either encoding “j” can be shown to have support of dimensionality 4, spanned by the states \({|{000}\rangle }, {|{010}\rangle }, {|{100}\rangle }\) and \({|{011}\rangle }\), with the state of the x particle being \({|{2}\rangle }\), as in the noiseless attack case.

After receiving the returned noisy travel qubit, Bob further subjects it to the damping noise, described by Eq. (3). Accordingly, the final states with Bob for Alice’s encodings \(j=0\) and \(j=1\) are:

$$\begin{aligned} \rho ^{j=0}&:= \frac{1}{2} \left( \begin{array}{cccc} \lambda &{} 0 &{} 0 &{} 0 \\ 0 &{} 1-\lambda &{} \sqrt{1-\lambda } &{} 0 \\ 0 &{} \sqrt{1-\lambda } &{} 1 &{} 0 \\ 0 &{} 0 &{} 0 &{} 0 \\ \end{array} \right) ;~~ \rho ^{j=1}&:= \frac{1}{2} \left( \begin{array}{cccc} \lambda &{} 0 &{} 0 &{} 0 \\ 0 &{} 0 &{} 0 &{} 0 \\ 0 &{} 0 &{} 1 &{} \sqrt{1-\lambda } \\ 0 &{} 0 &{} \sqrt{1-\lambda } &{} 1-\lambda \\ \end{array} \right) . \end{aligned}$$
(5)

From Eq. (5), we obtain the following joint probabilities \(P_{AEB}\):

$$\begin{aligned}&P_{000} = \frac{(\sqrt{1-\lambda }+1)^2}{8} ;\quad P_{001} = \frac{(\sqrt{1-\lambda }-1)^2}{8}, \nonumber \\&P_{002} = P_{003}=P_{102} =P_{103} = \frac{ \lambda }{8}; \quad P_{100} = P_{101} =\frac{1}{8}, \nonumber \\&P_{110} = P_{111} = \frac{(1-\lambda )}{8}, \end{aligned}$$
(6)

with all other joint probability terms vanishing. Note that in the presence of amplitude damping noise, Bob will also obtain outcomes \(|\phi ^\pm \rangle = \frac{1}{\sqrt{2}}({|{00}\rangle } \pm {|{11}\rangle })\) in his Bell state measurement, which corresponds to the outcome symbols 2 and 3 in Eq. (6).

The probabilities Eq. (6) imply the mutual information between Alice and Bob is

$$\begin{aligned} I(A:B) =&- \frac{1}{8}\left( -2\lambda +\left( \lambda -2 \left( \sqrt{1-\lambda }+1\right) \right) \log \left( \frac{-\lambda +2 \sqrt{1-\lambda }+2}{-\lambda +\sqrt{1-\lambda }+2}\right) \right. \nonumber \\ {}&\left. +(\lambda -2) \log \left( \frac{\lambda -2}{\lambda -\sqrt{1-\lambda }-2}\right) +(\lambda -2) \log \left( \frac{\lambda -2}{\lambda +\sqrt{1-\lambda }-2}\right) \right. \nonumber \\ {}&\left. +\lambda \log \left( \frac{\lambda +2 \sqrt{1-\lambda }-2}{\lambda +\sqrt{1-\lambda }-2}\right) +2 \left( \sqrt{1-\lambda }-1\right) \log \left( \frac{\lambda +2 \sqrt{1-\lambda }-2}{\lambda +\sqrt{1-\lambda }-2}\right) \right) , \end{aligned}$$
(7)

while that between Alice and Eve:

$$\begin{aligned} I(A:E)&= \frac{2 \log \left( \frac{2}{\lambda +3}\right) +(\lambda +1) \log \left( \frac{\lambda +1}{\lambda +3}\right) +\log (16)}{\log (16)}. \end{aligned}$$
(8)

A plot of the key rate \(\kappa \equiv I_{AB} - I_{AE}\) w.r.t (dimensionless) time is given in Fig. 2.

Fig. 2
figure 2

Plot of secure key rate as a function of the dimensionless time gt, for the Case 1, where the travel qubit alone is subject to NMAD. Here, \(\gamma \) is the coupling strength and \(g :=1\) in all the cases. In the considered time range, non-Markovian noise provides improvement in the key rate as seen for the cases of \(\gamma = 4\) (dashed, orange curve) and \(\gamma = 15\) (dot dashed, green curve), as opposed to the Markovian case with \(\gamma = 0.1\) (bold, blue curve) (Color online)

3.2 Case 2: Both the qubits are subject to NMAD

After receiving the returned noisy travel qubit, Bob subjects both qubits individually to NMAD, described by Eq. (3). Accordingly, the final states with Bob for the Alice’s encodings \(j=0\) and \(j=1\) are:

$$\begin{aligned} \rho ^{(j=0)}_{hty}&= \frac{1}{2} \left( \begin{array}{cccc} 2 \lambda &{} 0 &{} 0 &{} 0 \\ 0 &{} 1-\lambda &{} 1-\lambda &{} 0 \\ 0 &{} 1-\lambda &{} 1-\lambda &{} 0 \\ 0 &{} 0 &{} 0 &{} 0 \\ \end{array} \right) \,; \quad \rho ^{(j=1)}_{hty}&= \frac{1}{2} \left( \begin{array}{cccc} 0 &{} 0 &{} 0 &{} 0 \\ 0 &{} 1-\lambda &{} 1-\lambda &{} 0 \\ 0 &{} 1-\lambda &{} 1-\lambda &{} 0 \\ 0 &{} 0 &{} 0 &{} 2 \lambda \\ \end{array} \right) . \end{aligned}$$
(9)

From Eq. (9), we obtain the following joint probabilities \(P_{AEB}\), as follows:

$$\begin{aligned} P_{000}&= \frac{1-\lambda }{2}, \nonumber \\ P_{002}&= P_{003}=P_{102} =P_{103} = \frac{ \lambda }{4}, \nonumber \\ P_{100}&= P_{101} =\frac{1- \lambda }{8}, \nonumber \\ P_{110}&= P_{111} = \frac{1-\lambda }{8}, \end{aligned}$$
(10)

with all other joint probability terms vanishing.

From the above probabilities \(P_{AEB}\), one derives the mutual information between Alice and Bob and that between Alice and Eve, to be

$$\begin{aligned} I(A:B)&= \frac{3 }{4}(1-\lambda ) \log \left( \frac{4}{3}\right) = 0.31(1-\lambda ), \nonumber \\ I(A:E)&= 1+ \frac{1}{2} \log \left( \frac{2}{\lambda +3}\right) +\frac{1}{4} (\lambda +1) \log \left( \frac{\lambda +1}{\lambda +3}\right) . \end{aligned}$$
(11)

The key rate \(\kappa \equiv I_{AB} - I_{AE}\) is shown in Fig. (3).

Fig. 3
figure 3

Plot of secure key rate with respect to the dimensionless time gt, for the Case 2, where the both travel and home qubits are subject to NMAD noise. Here, \(\gamma \) is the coupling strength and \(g :=1\) in all the cases. In the considered time range, non-Markovian noise provides improvement in the key rate as seen for the cases of \(\gamma = 4\) (dashed, orange curve) and \(\gamma = 15\) (dot dashed, green curve), as opposed to the Markovian case with \(\gamma = 0.1\) (bold, blue curve) (Color online)

For both the above cases, from Eqs. (5) and (9), one can calculate the Holevo bound for Alice–Bob by tracing out Eve’s systems xy. It is found that mutual information between Alice and Bob I(A : B) is always lesser than the Alice–Bob Holevo bound suggesting that Bob’s measurement strategy is sub-optimal. However, the Holevo bound between Eve’s states for Alice’s encoding \(j\in \{0,1\}\) equals I(A : E), with or without added noise, suggests that Eve’s attack strategy in indeed optimal.

4 On the classical simulation of the quantum advantage

In Ref. [16], it was shown that adding classical noise to measurement data by a trusted party can improve information security. In contrast, here we show that this is not possible for the cases of quantum advantage reported in Sects. 3.1 and 3.2. That is adding classical noise locally on the part of Bob or even Alice cannot reproduce the benefit of adding the quantum noise. This non-simulability of the quantum advantage may be attributed to the fact that in the regime where the quantum noise is beneficial, it leaves the Bell pair entangled, and thus, the resulting joint probability statistics cannot be captured by local classical noise.

Consider that Alice and Bob try to locally (i.e., with no communication whatsoever) reproduce \(P^{AEB}_{002}, P^{AEB}_{012}\) and \(P^\mathrm{AEB}_{112}\) of joint probabilities (10) from the noiseless data (2). Let \(a_{jk}\) define the probability with which Alice uses a pseudorandom number generator (PRNG) to make a transition from a bit value of A in the noiseless data (2) to a bit value of \(A'\) in the noisy data (10), where \(A'\) is the bit value locally reproduced by Alice. Similarly, we define the probability \(b_{jk}\) for Bob’s local transitions using a PRNG to produce a bit value of \(B'\). Consider the case of reproducing the following joint probabilities from Eqs. (2) and (10):

$$\begin{aligned} P^{A'EB'}_{0'12'}&= P^{AEB}_{110}a_{10}b_{02} + P^{AEB}_{111}a_{10}b_{12} = 0 \nonumber \\&= \frac{a_{10}}{8}(b_{02}+b_{12}) = 0 , \end{aligned}$$
(12)
$$\begin{aligned} P^{A'EB'}_{1'12'}&= P^{AEB}_{110}a_{11}.b_{02} + P^{AEB}_{111}a_{11}b_{12} = 0 \nonumber \\&=\frac{a_{11}}{8}(b_{02}+b_{12}) = 0, \end{aligned}$$
(13)

and

$$\begin{aligned} P^{A'EB'}_{0'02'}&= P^{AEB}_{000}a_{00}b_{02} + P^{AEB}_{100}a_{10}b_{02}+ P^{AEB}_{101}a_{10}b_{12} \nonumber \\&= \frac{a_{00}b_{02}}{2} +\frac{a_{10}}{8}(b_{02}+b_{12}) = \frac{\lambda }{4}. \end{aligned}$$
(14)

From Eq. (12), it is implied that either \(a_{10} = 0\) or \(b_{02}+b_{12} =0\) or both are zero. Note that since \(\sum _k a_{jk} = 1\), \(a_{11} = 1\). This implies that if \(a_{10} = 0\) then, from Eq. (13), necessarily \(b_{02}+b_{12} =0\).

Now, from Eqs. (12) and (14),

$$\begin{aligned} a_{00}.b_{02} = \frac{\lambda }{2} \end{aligned}$$
(15)

which implies that \(a_{00} \ne 0\) and \(b_{02} \ne 0\). Hence, we arrive at a contradiction that \(b_{02}+b_{12} \ne 0\).

Now consider that \(a_{10} \ne 0\) and \(a_{11} \ne 0\). Then from Eqs. (12) and (13), necessarily \(b_{02}+b_{12} =0\). Again from Eqs. (14) and (15), observe that \(b_{02} > 0\). Hence, we arrive at a contradiction again. It follows that Alice and Bob cannot unilaterally simulate the quantum advantage due to the NMAD channel by adding uncorrelated local classical noise to their measurement data.

5 Effect of temperature

A generalized amplitude damping (GAD) channel models the effect of temperature of the bath along with damping on the qubit state. As in our previous work [26], here we find that unital noise favors Eve in this scenario. We show below that an increase in temperature leads to an increase in the unitality of the channel, and correspondingly to a greater disadvantage for Alice and Bob. One way to understand this effect is as follows. A qubit channel \({\mathcal {E}}\) is unital if \({\mathcal {E}}[I] = I\), where \(I =\left( \begin{array}{cc} 1 &{} 0 \\ 0 &{} 1 \\ \end{array} \right) \). Now, one may compute

$$\begin{aligned} \rho _\mathrm{id} = {\mathcal {E}}^{{\small \mathrm{GAD}}}[I] = \left( \begin{array}{ll} 1 -2 p \lambda +\lambda &{} \quad 0 \\ 0 &{} \quad (2 p-1) \lambda +1 \\ \end{array} \right) , \end{aligned}$$
(16)

where \(p \in \{0,\frac{1}{2}\}\). The action of a GAD channel \( {\mathcal {E}}^{{\small \mathrm{GAD}}}\) on a qubit is given by the quantum operation representation \({\mathcal {E}}[\rho ] = \sum _k A_k \rho A_k^\dagger \), where the \(A_k\) are the Kraus operator, which for GAD take the form

$$\begin{aligned} A_1&= \sqrt{1-p} \left( \begin{array}{cc} 1 &{} 0 \\ 0 &{} \sqrt{1-\lambda } \\ \end{array} \right) ; \quad&A_2 = \sqrt{1-p} \left( \begin{array}{cc} 0 &{} \sqrt{\lambda } \\ 0 &{} 0 \\ \end{array} \right) ; \nonumber \\ A_3&= \sqrt{p} \left( \begin{array}{cc} 0 &{} 0 \\ \sqrt{\lambda } &{} 0 \\ \end{array} \right) ; \quad&A_4 =\sqrt{p} \left( \begin{array}{cc} \sqrt{1-\lambda } &{} 0 \\ 0 &{} 1 \\ \end{array} \right) , \end{aligned}$$
(17)

where the noise mixing \(p \in \{0,\frac{1}{2}\}\) and the damping parameter \(\lambda \in \{0,1\}\).

Note that the trace distance (TD) between \(\rho _\mathrm{id}\) and I evaluates to \((2p-1)\lambda \), so that as \(p \rightarrow \frac{1}{2}\), the TD \(\rightarrow 0\), i.e., \(\rho _\mathrm{id} \rightarrow I\). Therefore, increasing temperature enhances the unital part of the noise.

6 Discussions and conclusions

We consider a QKD based on the ping-pong communication protocol, with a non-unital non-Markovian noise deliberately added by the legitimate party before measurement and prior to key distillation. The noise used is the non-Markovian amplitude damping (NMAD). We show that adding this noise improves the security, when Eve uses an optimal individual attack. Conservatively, all the channel noise is attributed to Eve’s attack. Within a noise parameter range, non-Markovianity is shown to boost the key rate. We considered two cases. In one, Bob adds noise only to the travel qubit, while in the other, noise it is added to both the travel and home qubits. The former is shown to lead to a higher key rate than the latter in the considered range of time. This provides a cautionary indication that the benefits of non-Markovianity of the noise are conditional and depend on the full context considered. We also studied a non-Markovian generalized amplitude damping (GAD) noise in this context, but in this case we found that temperature tends to diminish the quantum advantage.

In the matter of local classical non-simulability of the quantum advantage of the considered non-Markovian noise, it is important to stress that the model of classical noise considered in Sect. 4 is Markovian, in that at each round the random bit assignment depends only on the measurement outcomes of the current round, and does not require memory of the data from previous rounds. This is a non-trivial assumption, but one that is natural in the current scenario, where the Bell pair used in each round is uncorrelated with any other pair, and furthermore, we restrict Eve to attacks on individual qubits. This ensures that the measurement probabilities in each round are independent. Therefore, one expects that classical memory across rounds is not advantageous for the simulation. It is an interesting question whether non-Markovian classical noise can perform better than Markovian classical noise, if one or both of the above assumptions are relaxed. That is, the protocol may involve Bob’s travel qubits being entangled across the rounds and/or Eve launching a joint or collective attack on multiple travel qubits.

Here, it may be pointed out that the quantum noise models given by Eqs. (3) and (4) are considered non-Markovian despite being applied to individual rounds of the protocol. The reason is that the memory in this context is with respect to an external environment, rather than preceding rounds of the protocol. In particular, quantum non-Markovianity arises when the dynamics of the system–environment correlation makes the system’s intermediate map (or, propagator) to deviate from complete positivity. [21].