Quantum Steganography via Coherent and Fock State Encoding in an Optical
Medium
- URL: http://arxiv.org/abs/2303.02307v3
- Date: Sat, 10 Feb 2024 03:13:50 GMT
- Title: Quantum Steganography via Coherent and Fock State Encoding in an Optical
Medium
- Authors: Bruno Avritzer and Todd Brun
- Abstract summary: Steganography is an alternative to cryptography, where information is protected by secrecy.
We develop schemes for steganographic communication using Fock and coherent states in optical channels based on disguising the communications as thermal noise.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Steganography is an alternative to cryptography, where information is
protected by secrecy -- being disguised as innocent communication or noise --
rather than being scrambled. In this work we develop schemes for steganographic
communication using Fock and coherent states in optical channels based on
disguising the communications as thermal noise. We derive bounds on their
efficiency in the case of an all-powerful eavesdropper, and provide explicit
methods of encoding and error correction for the noiseless channel case.
Related papers
- Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.
PLD combines PLS with deception technologies to actively counteract wiretapping attempts.
We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - High Fidelity Artificial Quantum Thermal State Generation using Encoded Coherent States [0.0]
Quantum steganography is a powerful method for information security where communications are disguised as naturally occurring noise in a channel.
We encoded the phase and amplitude of weak coherent laser states such that a third party monitoring the communications channel would see an amalgamation of states indistinguishable from thermal noise light.
arXiv Detail & Related papers (2024-05-06T21:56:55Z) - Secure Deep-JSCC Against Multiple Eavesdroppers [13.422085141752468]
We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers.
We implement deep neural networks (DNNs) to realize a data-driven secure communication scheme.
Our experiments show that employing the proposed secure neural encoding can decrease the adversarial accuracy by 28%.
arXiv Detail & Related papers (2023-08-05T14:40:35Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Protecting Classical-Quantum Signals in Free Space Optical Channels [0.0]
This work presents an error correction protocol capable of protecting a signal passing through such channels by encoding it with an ancillary entangled bipartite state.
We show how, relative to non-encoded direct transmission, the protocol can improve the fidelity of transmitted coherent states over a wide range of losses and erasure probabilities.
We briefly discuss the application of our protocol to the transmission of more complex input states, such as multi-mode entangled states.
arXiv Detail & Related papers (2023-03-12T23:18:18Z) - Perfectly Secure Steganography Using Minimum Entropy Coupling [60.154855689780796]
We show that a steganography procedure is perfectly secure under Cachin 1998's information-theoretic model of steganography.
We also show that, among perfectly secure procedures, a procedure maximizes information throughput if and only if it is induced by a minimum entropy coupling.
arXiv Detail & Related papers (2022-10-24T17:40:07Z) - Fault-tolerant Coding for Entanglement-Assisted Communication [46.0607942851373]
This paper studies the study of fault-tolerant channel coding for quantum channels.
We use techniques from fault-tolerant quantum computing to establish coding theorems for sending classical and quantum information in this scenario.
We extend these methods to the case of entanglement-assisted communication, in particular proving that the fault-tolerant capacity approaches the usual capacity when the gate error approaches zero.
arXiv Detail & Related papers (2022-10-06T14:09:16Z) - Denoising Diffusion Error Correction Codes [92.10654749898927]
Recently, neural decoders have demonstrated their advantage over classical decoding techniques.
Recent state-of-the-art neural decoders suffer from high complexity and lack the important iterative scheme characteristic of many legacy decoders.
We propose to employ denoising diffusion models for the soft decoding of linear codes at arbitrary block lengths.
arXiv Detail & Related papers (2022-09-16T11:00:50Z) - Semantic Security with Infinite Dimensional Quantum Eavesdropping
Channel [19.275181096881454]
We propose a new proof method for direct coding theorems for wiretap channels.
The method yields errors that decay exponentially with increasing block lengths.
It provides a guarantee of a quantum version of semantic security.
arXiv Detail & Related papers (2022-05-16T13:25:56Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.