Quantum steganography protocol based on quantum electrodynamics (QED)

A quantum steganography, protocol technology, applied in key distribution, can solve complex problems

Inactive Publication Date: 2012-11-28
唐山安生纸制品制造有限公司
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the capacity of the hidden channel in [5] is increased to 4 bits, Bell-based measurements are required when extracting secret messages, which is relatively complicated compared to local individual measurements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum steganography protocol based on quantum electrodynamics (QED)
  • Quantum steganography protocol based on quantum electrodynamics (QED)
  • Quantum steganography protocol based on quantum electrodynamics (QED)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0065] 1. Application example of quantum steganography protocol

[0066] Suppose the 2-bit secret message Alice wants to send to Bob is 00. Alice produces a message sequence...11 11 ...00 00 ...10 01 ...01 10 ...to Bob (the information is divided by 2 bits, because each U j represent 2 bits of information). Suppose the group numbers of 11, 00, 10, and 01 are 6, 10, 15, and 19, respectively. In S3, Alice can make m equal to 6, 10, 15, and 19 respectively to satisfy the consistency shown in Table 1. If m=6, A' 6 B' 6 C' 6 will be |S + >, D' 6 E' 6 will be |ψ + >. Correspondingly, the secret message 00 passes through A' in chamber QED 6 B' 6 C' 6 and D' 7 E' 7 Between entanglement exchange and Hadamard operations for teleportation. If m=10, 15, 19, using the same method, the secret message 00 can also be sent to Bob. Since it is used as an auxiliary Bell state to help hide secret information, D′ 7 E' 7 Cannot transmit information like other normal Bell stat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The quantum steganography aims to realize covert communication of classified information through a quantum hidden channel. The quantum steganography has important applications in multiple aspects, such as covert communication and quantum identity authentication. The invention provides a quantum steganography protocol based on quantum electrodynamics (QED). The quantum steganography protocol is not influenced by cavity leakage and thermal cavity field. The classified information is secretly transmitted through the entanglement exchange between a GHZ state and a Bell state and Hadamard operation in the cavity QED. When the quantum steganography decodes the 2-bit classified information, only local independent measurement is required to be performed; and moreover, the capacity of the hidden channel can be improved to 4 bits.

Description

technical field [0001] The invention relates to the field of information security communication. The present invention designs a quantum steganography protocol based on cavity QED (quantum electrodynamics), secret messages are secretly transmitted through entanglement exchange and Hadamard operation between a GHZ state and a Bell state in the cavity QED. Background technique [0002] Quantum steganography is the promotion of classical steganography in the quantum field, and it is a new research branch of quantum communication. The goal of quantum steganography is to realize the covert communication of secret messages through quantum hidden channels. Quantum steganography has important applications in many aspects, such as secret communication, quantum identity authentication, etc., and has recently attracted the attention of many scholars. In 2007, Martin [1] proposed a new quantum steganography protocol based on the BB84 quantum key distribution (quantum key distribution,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 叶天语蒋丽珍
Owner 唐山安生纸制品制造有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products