Large payload quantum steganography based on cavity quantum
electrodynamics
- URL: http://arxiv.org/abs/2205.01678v2
- Date: Wed, 18 May 2022 10:58:14 GMT
- Title: Large payload quantum steganography based on cavity quantum
electrodynamics
- Authors: Tian-Yu Ye, Li-Zhen Jiang
- Abstract summary: The protocol builds up hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED.
The capacity, imperceptibility and security against eavesdropping are analyzed in the protocol.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: A large payload quantum steganography protocol based on cavity quantum
electrodynamics (QED) is presented in the paper, which effectively uses the
evolution law of atom in cavity QED. The protocol builds up hidden channel to
transmit secret messages using entanglement swapping between one GHZ state and
one Bell state in cavity QED together with the Hadamard operation. The quantum
steganography protocol is insensitive to cavity decay and thermal field. The
capacity, imperceptibility and security against eavesdropping are analyzed in
detail in the protocol. It turns out that the protocol not only has good
imperceptibility but also possesses good security against eavesdropping. In
addition, its capacity of hidden channel achieves five bits, larger than most
of those previous quantum steganography protocols.
Related papers
- Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Increasing Interference Detection in Quantum Cryptography using the Quantum Fourier Transform [0.0]
We present two quantum cryptographic protocols leveraging the quantum Fourier transform (QFT)
The foremost of these protocols is a novel QKD method that leverages this effectiveness of the QFT.
We additionally show how existing quantum encryption methods can be augmented with a QFT-based approach to improve eavesdropping detection.
arXiv Detail & Related papers (2024-04-18T21:04:03Z) - The Quantum Cryptography Approach: Unleashing the Potential of Quantum
Key Reconciliation Protocol for Secure Communication [7.318072482453136]
Quantum Key Distribution (QKD) has been recognized as the most important breakthrough in quantum cryptography.
This paper proposes a novel method that allows users to communicate while generating the secure keys and securing the transmission without any leakage of the data.
arXiv Detail & Related papers (2024-01-17T05:41:17Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Quantum process tomography of continuous-variable gates using coherent
states [49.299443295581064]
We demonstrate the use of coherent-state quantum process tomography (csQPT) for a bosonic-mode superconducting circuit.
We show results for this method by characterizing a logical quantum gate constructed using displacement and SNAP operations on an encoded qubit.
arXiv Detail & Related papers (2023-03-02T18:08:08Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Quantum oblivious transfer: a short review [0.06554326244334865]
We study the concept of oblivious transfer in the area of theoretical quantum cryptography.
We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.
arXiv Detail & Related papers (2022-06-06T15:19:26Z) - Secure quantum dialogue via cavity QED [0.0]
A secure quantum dialogue protocol via cavity QED is suggested by using the evolution law of atom in cavity QED.
The present protocol avoids the information leakage problem by using the entanglement swapping between any two Bell states via cavity QED.
arXiv Detail & Related papers (2022-05-05T03:10:22Z) - Quantum steganography with large payload based on dense coding and
entanglement swapping of GHZ states [0.0]
Super quantum channel is formed by building up the hidden channel within the original quantum secure direct communication scheme.
Based on the original QSDC, secrets messages are transmitted by integrating dense coding of GHZ states and entanglement swapping of GHZ states.
Its imperceptibility is good, since the information and secrets messages can be regarded to be random or pseudo-random.
arXiv Detail & Related papers (2022-05-03T00:15:28Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.