Quantum steganography using catalytic and entanglement-assisted quantum codes
- URL: http://arxiv.org/abs/2505.15869v1
- Date: Wed, 21 May 2025 12:58:57 GMT
- Title: Quantum steganography using catalytic and entanglement-assisted quantum codes
- Authors: Sanjoy Dutta, Nihar Ranjan Dash, Subhashish Banerjee, R. Srikanth,
- Abstract summary: Steganography is the technique for transmitting a secret message by employing subterfuge to conceal it in innocent-looking data.<n>We develop three steganographic protocols: first, a scheme based on catalytic quantum codes to minimize initial pre-shared resources; second, a scheme incorporating prior entanglement into QECCs in the form of possibly degenerate entanglement-assisted QECCs; third, a scheme that uses the phase bit of a pre-shared ebit, combined with QECCs.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Steganography is the technique for transmitting a secret message by employing subterfuge to conceal it in innocent-looking data, rather than by overt security measures as in cryptography. Typically, non-degenerate quantum error-correcting codes (QECCs) are used as the cover medium, with the stego message disguised as noise. As in cryptography, a large number of bits or ebits are pre-shared, in this case mainly in order to ensure the innocence effect. In this work we develop three steganographic protocols: first, a scheme based on catalytic quantum codes to minimize initial pre-shared resources; second, a scheme incorporating prior entanglement into QECCs in the form of possibly degenerate entanglement-assisted QECCs; third, a scheme that uses the phase bit of a pre-shared ebit, combined with QECCs.
Related papers
- Hybrid Quantum Cryptosystems: Integration of Entanglement-Assisted Decryption and Physical Phase Obfuscation [0.0]
This study introduces a hybrid cryptographic framework for quantum communication.<n>It integrates entanglement-assisted decryption with phase-based physical obfuscation.<n>It is suitable for large-scale secure quantum networks.
arXiv Detail & Related papers (2025-07-07T20:32:53Z) - Post-Quantum Cryptography: An Analysis of Code-Based and Lattice-Based Cryptosystems [55.49917140500002]
Quantum computers will be able to break modern cryptographic systems using Shor's Algorithm.<n>We first examine the McEliece cryptosystem, a code-based scheme believed to be secure against quantum attacks.<n>We then explore NTRU, a lattice-based system grounded in the difficulty of solving the Shortest Vector Problem.
arXiv Detail & Related papers (2025-05-06T03:42:38Z) - Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security [0.0]
We present a novel cryptographic system that integrates Quantum Key Distribution (QKD) with classical encryption techniques.
Our approach leverages the E91 QKD protocol to generate a shared secret key between communicating parties.
This key is then hashed using the Secure Hash Algorithm (SHA) to provide a fixedlength, high-entropy key.
arXiv Detail & Related papers (2024-08-13T15:20:29Z) - Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem [5.497441137435869]
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem.
The derived class of NTRU-GKP codes has the additional property that decoding for a displacement noise model is equivalent to decrypting the NTRU cryptosystem.
This construction highlights how the GKP code bridges aspects of classical error correction, quantum error correction as well as post-quantum cryptography.
arXiv Detail & Related papers (2023-03-04T14:39:20Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Deep Quantum Error Correction [73.54643419792453]
Quantum error correction codes (QECC) are a key component for realizing the potential of quantum computing.
In this work, we efficiently train novel emphend-to-end deep quantum error decoders.
The proposed method demonstrates the power of neural decoders for QECC by achieving state-of-the-art accuracy.
arXiv Detail & Related papers (2023-01-27T08:16:26Z) - Gaussian conversion protocol for heralded generation of qunaught states [66.81715281131143]
bosonic codes map qubit-type quantum information onto the larger bosonic Hilbert space.
We convert between two instances of these codes GKP qunaught states and four-foldsymmetric binomial states corresponding to a zero-logical encoded qubit.
We obtain GKP qunaught states with a fidelity of over 98% and a probability of approximately 3.14%.
arXiv Detail & Related papers (2023-01-24T14:17:07Z) - Quantum Encryption in Phase Space for Coherent Optical Communications [0.0]
Quantum Encryption in Phase Space (QEPS) is a physical layer encryption method to secure data over the optical fiber.
We study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data.
arXiv Detail & Related papers (2023-01-15T15:08:53Z) - Transversal Injection: A method for direct encoding of ancilla states
for non-Clifford gates using stabiliser codes [55.90903601048249]
We introduce a protocol to potentially reduce this overhead for non-Clifford gates.
Preliminary results hint at high quality fidelities at larger distances.
arXiv Detail & Related papers (2022-11-18T06:03:10Z) - Equivalence of three classical algorithms with quantum side information:
Privacy amplification, error correction, and data compression [6.09170287691728]
Privacy amplification (PA) is an indispensable component in classical and quantum cryptography.
Error correction (EC) and data compression (DC) algorithms are also indispensable in classical and quantum information theory.
We show that they all become equivalent in the one-shot scenario.
arXiv Detail & Related papers (2020-09-18T13:09:06Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.