{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T17:06:22Z","timestamp":1763831182930,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["EMR\/2016\/004019"],"award-info":[{"award-number":["EMR\/2016\/004019"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001409","name":"Department of Science and Technology, Ministry of Science and Technology","doi-asserted-by":"publisher","award":["DST\/ICPS\/QuST\/Theme-1\/2019\/6","DST\/ICPS\/QuST\/Theme-1\/2019\/14"],"award-info":[{"award-number":["DST\/ICPS\/QuST\/Theme-1\/2019\/6","DST\/ICPS\/QuST\/Theme-1\/2019\/14"]}],"id":[{"id":"10.13039\/501100001409","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11128-020-02874-4","type":"journal-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T08:04:12Z","timestamp":1601539452000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Ping-pong quantum key distribution with trusted noise: non-Markovian advantage"],"prefix":"10.1007","volume":"19","author":[{"given":"Shrikant","family":"Utagi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7581-2546","authenticated-orcid":false,"given":"R.","family":"Srikanth","sequence":"additional","affiliation":[]},{"given":"Subhashish","family":"Banerjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,1]]},"reference":[{"issue":"1","key":"2874_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12743\/quanta.v6i1.57","volume":"6","author":"A Shenoy-Hejamadi","year":"2017","unstructured":"Shenoy-Hejamadi, A., Pathak, A., Radhakrishna, S.: Quantum cryptography: key distribution and beyond. Quanta 6(1), 1\u201347 (2017)","journal-title":"Quanta"},{"key":"2874_CR2","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems & Signal Processing, Bangalore, India, 10\u201312 December 1984, pp. 175\u2013179"},{"issue":"18","key":"2874_CR3","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"2874_CR4","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"15","key":"2874_CR5","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik, A.: Eavesdropping on the ping-pong quantum communication protocol. Phys. Rev. Lett. 90(15), 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"2874_CR6","doi-asserted-by":"publisher","first-page":"054301","DOI":"10.1103\/PhysRevA.69.054301","volume":"69","author":"Q-Y Cai","year":"2004","unstructured":"Cai, Q.-Y., Li, B.-W.: Improving the capacity of the bostr\u00f6m-felbinger protocol. Phys. Rev. A 69(5), 054301 (2004)","journal-title":"Phys. Rev. A"},{"key":"2874_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"Q-Y Cai","year":"2006","unstructured":"Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23 (2006)","journal-title":"Phys. Lett. A"},{"issue":"1","key":"2874_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.physleta.2004.10.025","volume":"333","author":"Z Zhang","year":"2004","unstructured":"Zhang, Z., Man, Z., Li, Y.: Improving w\u00f3jcik\u2019s eavesdropping attack on the ping-pong protocol. Phys. Lett. A 333(1), 46\u201350 (2004)","journal-title":"Phys. Lett. A"},{"issue":"22","key":"2874_CR9","doi-asserted-by":"publisher","first-page":"3953","DOI":"10.1016\/j.physleta.2008.03.048","volume":"372","author":"K Bostr\u00f6m","year":"2008","unstructured":"Bostr\u00f6m, K., Felbinger, T.: On the security of the ping-pong protocol. Phys. Lett. A 372(22), 3953\u20133956 (2008)","journal-title":"Phys. Lett. A"},{"issue":"2","key":"2874_CR10","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s11128-010-0188-8","volume":"10","author":"EV Vasiliu","year":"2011","unstructured":"Vasiliu, E.V.: Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits. Quantum Inf. Process. 10(2), 189\u2013202 (2011)","journal-title":"Quantum Inf. Process."},{"key":"2874_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-011-0307-1","volume":"11","author":"P Zawadzki","year":"2012","unstructured":"Zawadzki, P.: Security of ping-pong protocol based on pairs of completely entangled qudits. Quantum Inf. Process. 11, 1\u201312 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"2874_CR12","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s11128-012-0363-1","volume":"12","author":"P Zawadzki","year":"2012","unstructured":"Zawadzki, P.: Improving security of the ping-pong protocol. Quantum Inf. Process. 12(1), 149\u2013155 (2012)","journal-title":"Quantum Inf. Process."},{"key":"2874_CR13","first-page":"117","volume":"21","author":"J Li","year":"2012","unstructured":"Li, J., Song, D.J., Guo, X.J., JING, B.: An improved security detection strategy based on w state in \u201cping-pong\u201d protocol. Chin. J. Electron. 21, 117\u2013120 (2012)","journal-title":"Chin. J. Electron."},{"key":"2874_CR14","doi-asserted-by":"publisher","first-page":"4936","DOI":"10.1038\/srep04936","volume":"4","author":"Y-G Han","year":"2014","unstructured":"Han, Y.-G., Yin, Z.-Q., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Security of modified ping-pong protocol in noisy and lossy channel. Sci. Rep. 4, 4936 (2014)","journal-title":"Sci. Rep."},{"key":"2874_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-3182-4","volume-title":"Open Quantum Systems","author":"S Banerjee","year":"2018","unstructured":"Banerjee, S.: Open Quantum Systems. Springer, Berlin (2018)"},{"key":"2874_CR16","doi-asserted-by":"publisher","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)","journal-title":"Phys. Rev. A"},{"issue":"01","key":"2874_CR17","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1142\/S0219749909004554","volume":"07","author":"Z Shadman","year":"2009","unstructured":"Shadman, Z., Kampermann, H., Meyer, T., Bru\u00df, D.: Optimal eavesdropping on noisy states in quantum key distribution. Int. J. Quantum Inf. 07(01), 297\u2013306 (2009)","journal-title":"Int. J. Quantum Inf."},{"key":"2874_CR18","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.87.042312","volume":"87","author":"M Mertz","year":"2013","unstructured":"Mertz, M., Kampermann, H., Shadman, Z., Bru\u00df, D.: Quantum key distribution with finite resources: taking advantage of quantum noise. Phys. Rev. A 87, 042312 (2013)","journal-title":"Phys. Rev. A"},{"key":"2874_CR19","doi-asserted-by":"crossref","unstructured":"Usenko, Vladyslav C., Filip, Radim: Trusted noise in continuous-variable quantum key distribution: a threat and a defense. Entropy 18(1), (2016)","DOI":"10.3390\/e18010020"},{"key":"2874_CR20","doi-asserted-by":"publisher","first-page":"130501","DOI":"10.1103\/PhysRevLett.102.130501","volume":"102","author":"R Garc\u00eda-Patr\u00f3n","year":"2009","unstructured":"Garc\u00eda-Patr\u00f3n, R., Cerf, N.J.: Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 102, 130501 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"2874_CR21","doi-asserted-by":"publisher","first-page":"094001","DOI":"10.1088\/0034-4885\/77\/9\/094001","volume":"77","author":"A Rivas","year":"2014","unstructured":"Rivas, A., Huelga, S.F., Plenio, M.B.: Quantum non-Markovianity: characterization, quantification and detection. Rep. Prog. Phys. 77(9), 094001 (2014)","journal-title":"Rep. Prog. Phys."},{"issue":"03","key":"2874_CR22","doi-asserted-by":"publisher","first-page":"1850014","DOI":"10.1142\/S1230161218500142","volume":"25","author":"N Pradeep Kumar","year":"2018","unstructured":"Pradeep Kumar, N., Banerjee, S., Srikanth, R., Jagadish, V., Petruccione, F.: Non-Markovian evolution: a quantum walk perspective. Open Syst. Inf. Dyn. 25(03), 1850014 (2018)","journal-title":"Open Syst. Inf. Dyn."},{"key":"2874_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2018.07.001","volume":"759","author":"L Li","year":"2018","unstructured":"Li, L., Hall, M.J.W., Wiseman, H.M.: Concepts of quantum non-Markovianity: a hierarchy. Phys. Rep. 759, 1\u201351 (2018)","journal-title":"Phys. Rep."},{"key":"2874_CR24","unstructured":"Shrikant, U, Srikanth, R., Banerjee, Subhashish: On a concept of quantum non-Markovianity weaker than cp-indivisibility. arXiv:1911.04162"},{"key":"2874_CR25","doi-asserted-by":"publisher","first-page":"040405","DOI":"10.1103\/PhysRevLett.120.040405","volume":"120","author":"FA Pollock","year":"2018","unstructured":"Pollock, F.A., Rodr\u00edguez-Rosario, C., Frauenheim, T., Paternostro, M., Modi, K.: Operational Markov condition for quantum processes. Phys. Rev. Lett. 120, 040405 (2018)","journal-title":"Phys. Rev. Lett."},{"issue":"88","key":"2874_CR26","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s11128-018-1974-y","volume":"17","author":"V Sharma","year":"2018","unstructured":"Sharma, V., Shrikant, U., Srikanth, R.: Decoherence can help quantum cryptographic security. Quantum Inf. Process. 17(88), 207 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"2874_CR27","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11128-017-1567-1","volume":"16","author":"K Thapliyal","year":"2017","unstructured":"Thapliyal, K., Pathak, A., Banerjee, S.: Quantum cryptography over non-Markovian channels. Quantum Inf. Process. 16(5), 115 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2874_CR28","doi-asserted-by":"publisher","DOI":"10.1142\/6738","volume-title":"Quantum Dissipative Systems","author":"U Weiss","year":"2008","unstructured":"Weiss, U.: Quantum Dissipative Systems. World Scientific, Singapore (2008)"},{"key":"2874_CR29","doi-asserted-by":"publisher","first-page":"015001","DOI":"10.1103\/RevModPhys.89.015001","volume":"89","author":"I de Vega","year":"2017","unstructured":"de Vega, I., Alonso, D.: Dynamics of non-Markovian open quantum systems. Rev. Mod. Phys. 89, 015001 (2017)","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"2874_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1515\/qmetro-2018-0003","volume":"5","author":"MAC Rossi","year":"2018","unstructured":"Rossi, M.A.C., Cattaneo, M., Paris, M.G.A., Maniscalco, S.: Non-Markovianity is not a resource for quantum spatial search on a star graph subject to generalized percolation. Quantum Measurements Quantum Metrol. 5(1), 40\u201349 (2018)","journal-title":"Quantum Measurements Quantum Metrol."},{"key":"2874_CR31","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018\u20133021 (1998)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"2874_CR32","first-page":"383","volume":"10","author":"D Bru\u00df","year":"2000","unstructured":"Bru\u00df, D., L\u00fctkenhaus, N.: Quantum key distribution: from principles to practicalities. Appl. Algebra Eng. Commun. Comput. 10(4), 383\u2013399 (2000)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"issue":"1","key":"2874_CR33","doi-asserted-by":"publisher","first-page":"012318","DOI":"10.1103\/PhysRevA.77.012318","volume":"77","author":"R Srikanth","year":"2008","unstructured":"Srikanth, R., Banerjee, S.: Squeezed generalized amplitude damping channel. Phys. Rev. A 77(1), 012318 (2008)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2874_CR34","doi-asserted-by":"publisher","first-page":"021002","DOI":"10.1103\/RevModPhys.88.021002","volume":"88","author":"H-P Breuer","year":"2016","unstructured":"Breuer, H.-P., Laine, E.-M., Piilo, J., Vacchini, B.: Colloquium: non-Markovian dynamics in open quantum systems. Rev. Modern Phys. 88(2), 021002 (2016)","journal-title":"Rev. Modern Phys."},{"issue":"10","key":"2874_CR35","doi-asserted-by":"publisher","first-page":"2478","DOI":"10.1364\/OL.44.002478","volume":"44","author":"MHM Passos","year":"2019","unstructured":"Passos, M.H.M., Concha Obando, P., Balthazar, W.F., Paula, F.M., Huguenin, J.A.O., Sarandy, M.S.: Non-Markovianity through quantum coherence in an all-optical setup. Opt. Lett. 44(10), 2478\u20132481 (2019)","journal-title":"Opt. Lett."},{"key":"2874_CR36","doi-asserted-by":"publisher","first-page":"022322","DOI":"10.1103\/PhysRevA.78.022322","volume":"78","author":"A Salles","year":"2008","unstructured":"Salles, A., de Melo, F., Almeida, M.P., Hor-Meyll, M., Walborn, S.P., Souto\u00a0Ribeiro, P.H., Davidovich, L.: Experimental investigation of the dynamics of entanglement: sudden death, complementarity, and continuous monitoring of the environment. Phys. Rev. A 78, 022322 (2008)","journal-title":"Phys. Rev. A"},{"issue":"21","key":"2874_CR37","doi-asserted-by":"publisher","first-page":"210402","DOI":"10.1103\/PhysRevLett.112.210402","volume":"112","author":"FF Fanchini","year":"2014","unstructured":"Fanchini, F.F., Karpat, G., \u00c7akmak, B., Castelano, L.K., Aguilar, G.H., Jim\u00e9nez Far\u00edas, O., Walborn, S.P., Souto Ribeiro, P.H., De Oliveira, M.C.: Non-Markovianity through accessible information Non-Markovianity through accessible information. Phys. Rev. Lett. 112(21), 210402 (2014)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"2874_CR38","doi-asserted-by":"publisher","first-page":"013822","DOI":"10.1103\/PhysRevA.101.013822","volume":"101","author":"Y Yugra","year":"2020","unstructured":"Yugra, Y., De Zela, F., Cuevas, \u00c1.: Coherence-based measurement of non-Markovian dynamics in an open quantum system. Phys. Rev. A 101(1), 013822 (2020)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02874-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02874-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02874-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T02:05:05Z","timestamp":1633053905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02874-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":38,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["2874"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02874-4","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2020,10]]},"assertion":[{"value":"20 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"366"}}