Quantum steganography with noisy quantum channels

被引:50
作者
Shaw, Bilal A. [1 ,2 ]
Brun, Todd A. [1 ,2 ,3 ,4 ]
机构
[1] Univ So Calif, Dept Comp Sci, Los Angeles, CA 90089 USA
[2] Univ So Calif, Ctr Quantum Informat Sci & Technol, Los Angeles, CA 90089 USA
[3] Univ So Calif, Dept Elect Engn, Los Angeles, CA 90089 USA
[4] Univ So Calif, Dept Phys & Astron, Los Angeles, CA 90089 USA
关键词
Quantum entanglement - Quantum noise - Errors - Communication channels (information theory) - Quantum optics;
D O I
10.1103/PhysRevA.83.022310
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Steganography is the technique of hiding secret information by embedding it in a seemingly "innocent" message. We present protocols for hiding quantum information by disguising it as noise in a codeword of a quantum error-correcting code. The sender (Alice) swaps quantum information into the codeword and applies a random choice of unitary operation, drawing on a secret random key she shares with the receiver (Bob). Using the key, Bob can retrieve the information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We consider two types of protocols: one in which the hidden quantum information is stored locally in the codeword, and another in which it is embedded in the space of error syndromes. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for specific protocols and examples of error channels. We consider both the case where there is no actual noise in the channel (so that all errors in the codeword result from the deliberate actions of Alice), and the case where the channel is noisy and not controlled by Alice and Bob.
引用
收藏
页数:8
相关论文
共 8 条
[1]  
[Anonymous], QUANTUM COMPUTATION
[2]  
Curty M., 2004, 2 BIEL WORKSH QUANT
[3]   Hiding messages in quantum data [J].
Gea-Banacloche, J .
JOURNAL OF MATHEMATICAL PHYSICS, 2002, 43 (09) :4531-4536
[4]  
Herodotus, 1996, HISTORIES
[5]  
Martin K, 2007, LECT NOTES COMPUT SC, V4567, P32
[6]  
Nielsen M. A., 2000, QUANTUM COMPUTATION
[7]  
Simmons Gustavus J., 1984, Advances in Cryptology, P51, DOI DOI 10.1007/978-1-4684-4730-95
[8]  
Trithemius J., 1606, STEGANOGRAPHIA, VFirst