
Citation: Zhiguo Qu, Leiming Jiang, Le Sun, Mingming Wang, Xiaojun Wang. Continuous variable quantum steganography protocol based on quantum identity[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4182-4195. doi: 10.3934/mbe.2019208
[1] | Zhiguo Qu, Shengyao Wu, Le Sun, Mingming Wang, Xiaojun Wang . Effects of quantum noises on χ state-based quantum steganography protocol. Mathematical Biosciences and Engineering, 2019, 16(5): 4999-5021. doi: 10.3934/mbe.2019252 |
[2] | Dingwei Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li . High capacity reversible data hiding in MP3 based on Huffman table transformation. Mathematical Biosciences and Engineering, 2019, 16(4): 3183-3194. doi: 10.3934/mbe.2019158 |
[3] | Guodong Ye, Huishan Wu, Kaixin Jiao, Duan Mei . Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Mathematical Biosciences and Engineering, 2021, 18(5): 5427-5448. doi: 10.3934/mbe.2021275 |
[4] | Yongju Tong, YuLing Liu, Jie Wang, Guojiang Xin . Text steganography on RNN-Generated lyrics. Mathematical Biosciences and Engineering, 2019, 16(5): 5451-5463. doi: 10.3934/mbe.2019271 |
[5] | Yanfeng Shi, Shuo Qiu, Jiqiang Liu, Tinghuai Ma . Novel efficient lattice-based IBE schemes with CPK for fog computing. Mathematical Biosciences and Engineering, 2020, 17(6): 8105-8122. doi: 10.3934/mbe.2020411 |
[6] | Xin Wang, Bo Yang . An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack. Mathematical Biosciences and Engineering, 2019, 16(6): 7734-7750. doi: 10.3934/mbe.2019388 |
[7] | Liyun Liu, Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Guorui Feng . Steganography in beautified images. Mathematical Biosciences and Engineering, 2019, 16(4): 2322-2333. doi: 10.3934/mbe.2019116 |
[8] | Xianyi Chen, Anqi Qiu, Xingming Sun, Shuai Wang, Guo Wei . A high-capacity coverless image steganography method based on double-level index and block matching. Mathematical Biosciences and Engineering, 2019, 16(5): 4708-4722. doi: 10.3934/mbe.2019236 |
[9] | P. Balamanikandan, S. Jeya Bharathi . A mathematical modelling to detect sickle cell anemia using Quantum graph theory and Aquila optimization classifier. Mathematical Biosciences and Engineering, 2022, 19(10): 10060-10077. doi: 10.3934/mbe.2022470 |
[10] | Melanie A. Jensen, Qingzhou Feng, William O. Hancock, Scott A. McKinley . A change point analysis protocol for comparing intracellular transport by different molecular motor combinations. Mathematical Biosciences and Engineering, 2021, 18(6): 8962-8996. doi: 10.3934/mbe.2021442 |
Compared with classical information hiding, quantum information hiding has unparalleled advantages based on the non-cloning theorem, uncertainty principle, quantum non-locality, such as good security and high information transmission efficiency. Since Bennett and Brassard proposed the first quantum cryptography communication protocol in 1984 [1], many quantum cryptographic communication protocols such as quantum key distribution (QKD) [2,3,4], quantum identity authentication (QIA) [5], quantum secrets sharing (QSS) [6,7,8] and quantum security direct communications (QSDC) [9,10] have emerged. In recent years, the theoretical research and application of quantum communication has been developed in a variety of ways, including quantum computation [11], quantum remote state preparation [12,13,14], quantum network coding [15,16], quantum auction [17] and quantum machine learning [18,19].
Among them, quantum steganography, as a research branch of quantum information hiding, aims at covertly transmitting secret information in public quantum channel. Usually, it can be mainly divided into two categories. The first one is to use quantum communication characteristics to perform covert communication through single-particle or multi-particle as quantum carriers [20,21,22]. In 2018, Zhu et al. proposed a novel quantum steganography protocol based on Brown entangled states, which proved its good security resisting on quantum noise [23]. The second is to embed secret information into various multimedia carriers for covert communication [24,25]. In 2018, Qu et al. proposed a novel quantum image steganography algorithm based on exploiting modification direction [26].
So far, most of the previous quantum steganography protocols are mainly based on discrete variables. Recently, the continuous variable quantum communication technique is beginning to emerge [27]. It uses a classical light source as a signal source, and can encode information on a continuously changing observable physical quantity with low cost due to easy implementation. The encoded information is a symbol, which can be restored to binary bits only after some specific data processing. Therefore, the capacity of this technique can be large and the key generation rate is also high, which has quickly attracted widespread attention. As an example, the continuous-variable quantum key distribution (CVQKD) has absolute advantages over the discrete-variable quantum key distribution (DVQKD). The detection of DVQKD is based on single photons. The single photon signal is not only difficult to manufacture, but also difficult to be detected and costly. The CVQKD is using homodyne/heterodyne decoding to obtain quadrature encoding, which greatly improves the technical efficiency. In addition, non-Gaussian operations have many applications in improving the quantum entanglement and teleportation. In 2003, Olivares et al. proposed the Inconclusive photon subtraction (IPS) to improve teleportation [28]. In 2015, Wu et al. applied local coherent superposition of photon subtraction and addition to each mode of even entangled coherent state to introduce a new entangled quantum state [29]. In 2018, the CVQKD with non-Gaussian quantum catalysis was proposed [30].
In this paper, a continuous variable quantum steganography protocol is proposed based on the continuous variable GHZ entangled state [31] and the continuous variable quamtum identity authentication protocol [32]. The protocol can realize the transmission of deterministic secret information in public quantum channel of identity authentication. It can convert segmented secret information into the whole secret information by adopting the specific encoding rule, randomly selecting quantum channel and replacing time slot. Through effectively verifying the identity of users, in the new protocol, the secret information can be implicitly transmitted to the recipient Bob, while the eavesdropper Eve disables to detect the existence of covert communication. Compared with the previous quantum steganography protocols, by introducing continuous variables into quantum steganography and making full use its characteristics of continuous variable, the proposed protocol can obtain the advantages of good imperceptibility, security and easy implementation for good applicability.
The paper is organized as follows. Section 2 introduces some basic knowledge about optics, the preparation of continuous variable GHZ states, and the principle of continuous variable quantum telecommuting required for the identity authentication process. Section 3 describes the concrete steps of the new continuous variable quantum steganography protocol in detail. Section 4 mainly analyzes the new protocol's imperceptibility, security and efficiency of information transmission, even in quantum noise environment. The conclusions are given in Section 5.
We first review some of the knowledge of quantum optics. By using the creation operator a† and the annihilation operator a, the two regular components including the amplitude x and the phase p of a beam can be expressed as
x=12(a†+a) | (2.1) |
p=i2(a†−a) | (2.2) |
where a† and a satisfy boson reciprocity [a,a]=[a†,a†]=0, [a,a†]=1. Therefore [x,p]=i2, two typical components x and p satisfy the Heisenberg uncertainty principle: Δx⋅Δp≥14.
A squeezed beam can be defined as
|α,r⟩=x+ip=erx(0)+ie−rp(0) | (2.3) |
where r is the compression factor. If r<0, it indicates that the beam amplitude is compressed; if r>0, it indicates that the beam phase is compressed. x(0) and p(0) indicate the amplitude and the phase of the vacuum state respectively, and x(0),p(0)∼N(0,14).
In the proposed protocol, the legal communication parties share the encoding rule in advance. They can encode the discrete information into different intervals(Turbo codes [33] or LDPC code [34]).
The continuous variable GHZ state is very important for quantum information processing and quantum communication in the new protocol. As shown in Figure 1, the continuous variable GHZ state is produced by making two squeezed vacuum states ain1 and ain2 pass through a beam splitter BS1 (transmission coefficient is 0.5) to generate aout1 and a∗in3 firstly. And then, it makes a∗in3 and another squeezed vacuum state ain3 pass through a beam splitter BS2 (transmission coefficient is 1) to generate aout2 and aout3. Obviously, aout1, aout2 and aout3 is a set of the continuous variable GHZ entangled state that be defined as
xout1=1√3er1xin1(0)+√23e−r2xin2(0) | (2.4) |
pout1=1√3e−r1pin1(0)+√23er2pin2(0) | (2.5) |
xout2=1√3er1xin1(0)−1√6e−r2xin2(0)+1√2e−r3xin3(0) | (2.6) |
pout2=1√3e−r1pin1(0)−1√6er2pin2(0)+1√2er3pin3(0) | (2.7) |
xout3=1√3er1xin1(0)−1√6e−r2xin2(0)−1√2e−r3xin3(0) | (2.8) |
pout3=1√3e−r1pin1(0)−1√6er2pin2(0)−1√2er3pin3(0) | (2.9) |
Let suppose that r1=r2=r3=r, it can calculate the correlation of amplitude and phase between aout1, aout2 and aout3
⟨[Δ(xout1−xout2)]2⟩=(12−√34)e−2r | (2.10) |
⟨[Δ(xout1−xout3)]2⟩=(12+√34)e−2r | (2.11) |
⟨[Δ(pout1+pout2+pout3)]2⟩=34e−2r | (2.12) |
If the compression parameter r→+∞, the correlation between the output optical modes aout1, aout2 and aout3 will become stronger and stronger
limr→+∞(xout1−xout2)=limr→+∞(xout1−xout3)=0 | (2.13) |
limr→+∞(pout1+pout2+pout3)=0 | (2.14) |
It is obvious that the amplitude between any two of the continuous variable GHZ state output modes is positively correlated, and the phase between them also has the entanglement characteristic.
The principle of continuous variable quantum telecommuting can be described as shown in Figure 2. Alice prepares a coherent state aA=|xA+ipA⟩ to be transmitted. Simultaneously, Alice and Bob share two entangled optical modes aout1 and aout2. After everything is ready, Alice sends the coherent state and aout1 through a 50/50 beam splitter for Bell state measurement to obtain xo and po
xo=1√2(xA−xout1) | (2.15) |
po=1√2(pA+pout1) | (2.16) |
After Alice announces the measurement results through the classic channel, Bob takes the corresponding unitary operation D(β=√2(xo+ipo)) on aout2 to obtain
xB=xout2+√2xo=xA−(xout1−xout2) | (2.17) |
pB=pout2+√2po=pA+(pout1+pout2) | (2.18) |
According to Eqs. (2.13) and (2.14), if the compressing parameter r→+∞, we can obtain xB=xA, pB=pA−pout3. It means that Alice and Bob obtain a highly correlated sequence on the amplitude component. Therefore, in the proposed protocol, we only modulate the effective information on the amplitude component and the uncorrelated random information n on the phase component.
We propose a novel continuous variable quantum steganography protocol based on quantum identity authentication protocol and continuous variable GHZ state. It can effectively transmit deterministic secret information in the public quantum channel. When Bob attempts to communicate with Alice, they need to share an initial identity key K1 and a series of time slot keys T which are binary sequences known only to Alice and Bob in advance. Here, D(α), D(α1) and D(α1′) are the displacement operation; D(o) is the unitary operation, and H is the fidelity parameter. The yellow area represents the normal information transmission mode. The red area represents the secret information transmission mode.
The details of the protocol are shown in Figure 3. We assume that the quantum channel is lossless, the proposed protocol is as follows.
Alice prepares the continuous variable GHZ entangled states aout1, aout2 and aout3. Alice keeps aout1 by herself, then transmits aout2 and aout3 to Bob through two quantum channels R1 and R2 respectively. Alice randomly selects a quantum channel for normal information transmission mode (identity authentication). The other is the channel of the secret information transmission mode (steganographic information).
The normal information transmission mode:
(A1) Alice chooses aout2 (R1 channel) or aout3 (R2 channel) to send to Bob. For convenience, we assume that the channel selected by the normal information transmission mode is the R1 channel.
(A2) After Alice confirms that Bob has received aout2, she converts K1 to decimal sequence k1. And then, Alice selects two decimal numbers k2 and v, satisfying the normal distribution N(0,σ2). Alice prepares a vacuum state |0⟩ with displacement operation D(α1=(k1+k2)+in). The coherent state optical mode a1 which is used to update the identity key, is obtained. Simultaneously, Alice also prepares a vacuum state with displacement operation D(α1′=(k1+v)+in). The coherent state optical mode a1′, which is used as a decoy state for identity authentication, is obtained. After that, Alice randomly selects a1 or a1′ to make Bell state measurement with aout1 on each time slot and obtains, xo=1√2(x1−xout1) and po=1√2(p1+pout1), or xo=1√2(x1′−xout1) and po=1√2(p1′+pout1). Then, Alice announces xo and po to Bob through the public classic channel.
(A3) According to the received xo and po, Bob performs the unitary operation D(o=√2(xo+ipo)) on the received aout2, and then selects the amplitude component to measure and get the sequence δ. Alice publishes the time slots t which used a1′, and Bob measures the amplitude components on these time slots to obtain a sequence δ1′. The value of sequence δ minus sequence δ1′ is defined as δ1.
(A4) Bob converts K1 to a decimal sequence k1′, then calculates v′=δ1′−k1′. After Bob announces v′, Alice calculates a fidelity parameter H=⟨[v′−φv]2⟩min. In the lossless channel, we get φ=1. If the calculation H is equal to 0, it means k1=k1′. The user identity is verified to be legal. Bob then updates the identity key sequence δ1−k1′ to obtain k2. If H is greater than 0, it means that the eavesdropper Eve exists or the user is illegal. As a result, the communication will be abandoned.
The secret information transmission mode:
(B1) Alice divides her steganographic information into p-blocks for block transmission. Let assume that the steganographic information of the q-th block (q≤p) is 010. According to the previously shared encoding rule, steganographic information 010 corresponds to the interval (−2,−1]. After that, Alice takes the first time slot Ta from the binary time slot key T and converts it to a decimal number ta. And then, she chooses the random variable m∈(−2,−1], and does the translation operation D(α=m+in) on aout3 in the time slot ta to get aout3′, where m is the secret information that needs to be transmitted. Alice sends aout3′ to Bob via quantum channel R2.
(B2) Bob also obtains ta based on the shared time slot key, and measures the amplitude component of the received beam mode aout3′ in the time slot ta to obtain the sequence ξ1. After that, Bob then selects the time slot tu(u≠a) to measure the amplitude component for obtaining the sequence ξ2. Bob calculates ξ1−ξ2 to obtain the secret information m.
(B3) According to the previously shared encoding rule, the information of the q-th block is obtained by Bob. The identity keys of both parties are also updated, and the transmission of the secret information of this block is completed. In the next round, Alice randomly selects one quantum channel for normal information transmission mode, and another quantum channel for secret information transmission mode. Then Alice repeats the above steps until all the steganographic information are transmitted.
As shown in Figure 3, when Alice wants to transmit private information to Bob, she randomly selects a quantum channel for identity authentication by using the modulated vacuum states and the continuous variable quantum telecommuting. At the same time, after the encoded secret information is modulated in the shared time slot, the transmission of the secret information is also carried out in another quantum channel. Under the cover of determining whether the Bob's identity is legal, it is difficult for an eavesdropper to discover that another channel is transmitting information. Even if the eavesdropper knows the existence of the secret information, it is impossible to obtain useful information without knowing the modulated time slot and the encoding rule.
In the field of experiment, the protocol is also feasible. The secure transmission using entangled squeezed states has been exemplified [35]. The experimental demonstration of the continuous variable quantum telecommuting has also been proposed [36]. Our protocol is mainly based on these two techniques. Therefore, this protocol is capable of having good performance in experiments.
The security of the scheme is mainly based on the entanglement properties of the GHZ state, the specific encoding rule, the shared time slot key and the block transmission. Among them, quantum entanglement guarantees the correlation of quantum transmission. The encoding rule ensures that the information in the quantum channel is not completely equal to the identity key information. The shared time slot key decides the writing and reading of the secret information.
The normal message transmission mode is to avoid Eve's active attack through identity authentication. In order to conduct an active attack, Eve needs to be authenticated. The most effective method is to obtain an updated authentication key and implement an active attack in the next authentication flow. In order to obtain the updated authentication key, Eve's good optional method is to intercept all the quantum signals sent by Alice and measure their components. Combined with the information sent by the classic channel, Eve can recover the updated authentication key and prepare a quantum state to send to Bob during an authentication process. However, due to the quantum uncertainty principle, Eve will inevitably introduce excessive noise, which will be detected by the legal user through the calculation of the fidelity parameter. As shown in Figure 3, there are two quantum channels and two classical channels in the proposed protocol. We have always assumed that the information transmitted in the classical channel is public, and the security of the normal information transmission mode has been proved above [32]. Therefore, we focus on the security of the secret information transmission mode.
It's noteworthy that this protocol may suffer from physical attacks, such as the wavelength attack. This kind of attack makes full of use of the potential imperfections in the protocol's implementation to enable the eavesdropper to control the light intensity transmission of the receiver's splitter. The attack method is to intercept the beam and measure the signal using the local oscillator by heterodyne measurement to obtain the quadrature values, and then switch the wavelength of the input light. It can make the eavesdropper completely control the receiver's beam splitter without being discovered. In this case, the new protocol is also capable of resisting the attack by randomly adding or not adding a wavelength filter before the monitoring detector and observing the difference value [37].
Because only two quantum channels (R1 and R2) are used to transmit quantum information and the information is modulated on the amplitude and phase of the beam, the attacker Eve can take an attack by using a spectroscope to intercept the signal for measurement and attempting to obtain the key. As shown in Figure 4, Let assume that the spectroscopic coefficient used by Eve is γ(0≤γ≤1). The two beams aA1 and aA2 sent by Alice pass through the beam splitter and become
aB1=√γaA1+√1−γaN1 | (4.1) |
aB2=√γaA2+√1−γaN2 | (4.2) |
Eve can obtain aE1 and aE2
aE1=√γaN1−√1−γaA1 | (4.3) |
aE2=√γaN2−√1−γaA2 | (4.4) |
According to the difference of the spectroscopic coefficients, the safety analysis can be carried out in three cases:
1. If γ=0, Eve intercepts all signals. In this case, Eve may combine aE1 and aE2 with the Bell state measurement to obtain
xu=1√2(xE1−xE2)=1√2(xA1−xA2) | (4.5) |
pu=1√2(pE1+pE2)=1√2(pA1+pA2) | (4.6) |
Due to the correlation between the amplitudes of aA1 and aA2, Eve measures the amplitude component, as xu→0. Even if the time slot containing the secret information has been stolen, Eve disables to get any information. The phase of aA1 and aA2 does not modulate the secret information, and only the uncorrelated random information n exists. Therefore, Eve will only think that it is the ordinary noise in the quantum channel, so that the transmission of the secret information can be undetected.
Eve may also measure aA1 and aA2 separately. According to the principle of key modulation, let assume that Eve measures the amplitude of aA1 and the phase of aA2 respectively. Because the correlation of amplitude, Eve can recover aA2 after measurement. However, due to the quantum uncertainty principle, Eve cannot recover the phase of aA1 and this operation will reduce the phase entanglement of the GHZ state. It will inevitably be detected by performing eavesdropping detection from legitimate parties.
It can be seen that Eve's eavesdropping will be detected by legitimate parties, and this protocol can safely transmit secret information when γ=0.
2. If γ=1, Eve does not take any action, obviously cannot get any information.
3. When 0≤γ≤1, Eve only intercepts part of the signal, and another part of the signal is still transmitted to the receiver.
In this case, due to the entanglement properties of the GHZ state, Eve cannot obtain effective information with the Bell state measurement, so Eve can only operate on aE1 and aE2 separately. Because the secret information is modulated on one of the quantum channels, let choose aE1 to analyze it as an example. Let Assume that the quantum channel transmission efficiency is λ, the signal received by Bob will be
aB1=√λaA1+√1−λaN1 | (4.7) |
Eve needs to amplify aE1 to avoid being detected and sends it to Bob with aB1. The effective signal received by Bob is
a=gaE1+aB1 | (4.8) |
Here, g is the gain compensation. According to Eqs. (4.1), (4.3) and (4.8), in order to receive the signal √λaA1 for Bob, it needs to be satisfied with
√λaA1=−g√1−γaA1+√γaA1 | (4.9) |
Eve obtain g=√γ−√λ√1−γ. Due to the information is modulated on the amplitude component, the noise signal received by Bob will be
aN=1−√λγ√1−γxN1 | (4.10) |
If γ≠λ and aN≠√1−λxN1, the signal-to-noise ratio received by Bob will change. The legitimate parties will find Eve in the eavesdropping detection. If γ=λ, g=0, it does not require the gain compensation. Eve will be undetected by the legitimate parties.
Therefore, if 0≤γ≤1, Eve can adopt the best attack method is intercepting by a beam splitter with the same spectroscopic coefficient and channel transmission efficiency. The signal received by Eve will be
aE1=√λaN1−√1−λaA1 | (4.11) |
The signal received by Bob is
aB1=√λaA1+√1−λaN1 | (4.12) |
According to Eq. (2.6), the amplitude components of Eve and Bob are obtained as follows
xE1=√λxN1−√1−λ[1√3erxin1(0)−1√6e−rxin2(0)+1√2e−rxin3(0)] | (4.13) |
xB1=√λ[1√3erxin1(0)−1√6e−rxin2(0)+1√2e−rxin3(0)]+√1−λxN1 | (4.14) |
Here, xN1∼N(0,VN1). If we measure the amplitude of aB1, only √λ3erx1(0) will be the effective signal, while the rest are noise. The signal-to-noise ratio of Bob can be calculated as
MB1NB1=λe2r2λe−2r+12(1−λ)VN1 | (4.15) |
The amount of information between Alice and Bob is
I(A,B)=12log2(1+MB1NB1) | (4.16) |
Similarly, the signal-to-noise ratio of Eve is
ME1NE1=(1−λ)e2r2(1−λ)e−2r+12λVN1 | (4.17) |
The amount of information between Alice and Eve is
I(A,E)=12log2(1+ME1NE1) | (4.18) |
Therefore, according to the Shannon information theory, the quantum channel transmission rate is
ΔI=I(A,B)−I(A,E)=12log2(λ(e2r+2e−2r)+12(1−λ)VN12λe−2r+12(1−λ)VN1⋅2(1−λ)e−2r+12λ(1−λ)(e2r+2e−2r)+12λVN1) | (4.19) |
If VN1=14, the secret information transmission rate obtained by Eq. (4.19) is as shown in Figure 5. The secret information transmission rate ΔI is proportional to the quantum channel transmission efficiency λ. If the channel transmission efficiency λ<0.5, the information transmission rate ΔI<0, the amount of information acquired by Eve is greater than the amount of information obtained by Bob, so that the channel is unsafe. If the channel transmission efficiency λ>0.5, the information transmission rate ΔI>0, the secret information transmission can be carried out safely. The security of the proposed protocol is also dependent on the entanglement properties of the continuous variable GHZ state. If the compression parameter r=0, the information transmission rate will reach 0. It is almost impossible to transmit information. If the compression parameter r increases, the information transmission rate also increases. Compared with discrete variable communication, it can also greatly reduce the quantum states that need to be prepared and shorten the time required for information transmission. For example, the discrete variables communication can only transmit 1 bit of classical information per qubit. If a deterministic key of 1000 bits is needed, at least 1000 qubits are required. In the proposed protocol, if r=3 and the channel transmission efficiency is equal to 0.9, the information transmission rate will be 4 qubits/s. At this point, only 250 qubits is required to complete the same work. So it's obviously that the efficiency of information transmission can be greatly improved.
This paper proposes a novel continuous variable quantum steganography protocol based on quantum identity authentication. For covert communication, the protocol implements the transmission of secret information in public channel of quantum identity authentication. Compared with the existing quantum steganography results, by taking full advantage of entanglement properties of continuous variable GHZ state, this protocol not only has the advantages of good imperceptibility and easy implementation in physics, but also good security and information transmission efficiency, even under eavesdropping attacks especially to the spectroscopic noise attack. In addition, the capacity of secret information is potential to be enlarged by introducing better information coding method.
This work was supported by the National Natural Science Foundation of China (No. 61373131, 61601358, 61501247, 61672290, 61303039, 61232016), the Six Talent Peaks Project of Jiangsu Province (Grant No. 2015-XXRJ-013), Natural Science Foundation of Jiangsu Province (Grant No. BK20171458), the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (China under Grant No.16KJB520030), Sichuan Youth Science and Technique Foundation (No.2017JQ0048), NUIST Research Foundation for Talented Scholars (2015r014), PAPD and CICAEET funds.
The authors declare no conflict of interest.
[1] | C. H. Bennett and G. Brassard, Quantum cryptography: public-key distribution and coin tossing, Theor. Comput. Sci., 560 (2014), 7–11. |
[2] | E. Diamanti, H. K. Lo and B. Qi, Practical challenges in quantum key distribution, NPJ Quantum Inform., 2 (2017), 1–9. |
[3] | M. Tomamichel and A. Leverrier, A largely self-contained and complete security proof for quantum key distribution, Quantum, 1 (2017), 14–23. |
[4] | W. J. Liu, Y. Xu, C. N. Yang, et al., An efficient and secure arbitrary n-party quantum key agreement protocol using Bell states, Int. J. Theor. Phys., 57 (2018), 195–207. |
[5] | H. H. Chang, J. Heo and G. J. Jin, Quantum identity authentication with single photon, Quantum Inf. Process., 16 (2017), 236–246. |
[6] | A. Tavakoli, I. Herbauts and M. ˙ zukowski, Secret sharing with a single d-level quantum system, Phys. Rev. A, 92 (2015), 1–10. |
[7] | C. M. Bai, Z. H. Li and T. T. Xu, Quantum secret sharing using the d-dimensional GHZ state, Quantum Inf. Process., 16 (2017), 59–70. |
[8] | X. B. Chen, X. Tang, G. Xu, et al., Cryptanalysis of secret sharing with a single d-level quantum system, Quantum Inf. Process., 17 (2018), 225–235. |
[9] | W. Li, J. Chen and X. Wang, Quantum secure direct communication achieved by using multi- entanglement, Int. J. Theor. Phys., 54 (2015), 100–105. |
[10] | J. Y. Hu, B. Yu and M. Y. Jing, Experimental quantum secure direct communication with single photons, Light-SCI. Appl., 5 (2016), e16144. |
[11] | W. J. Liu, Z. Y. Chen, J. S. Liu, et al., Full-blind delegating private quantum computation, Comput. Mater. Con., 56 (2018), 211–223. |
[12] | Z. G. Qu, S. Y. Wu, M. M. Wang, et al., Effect of quantum noise on deterministic remote state preparation of an arbitrary two-particle state via various quantum entangled channels, Quantum Inf. Process., 16 (2017), 1–25. |
[13] | X. B. Chen, Y. R. Sun, G. Xu, et al., Controlled bidirectional remote preparation of three-qubit state, Quantum Inf. Process., 16 (2017), 244–254. |
[14] | M. M. Wang, C. Yang and R. Mousoli, Controlled cyclic remote state preparation of arbitrary qubit states, Comput. Mater. Con., 55 (2018), 321–329. |
[15] | G. Xu, X. B. Chen and J. Li, Network coding for quantum cooperative multicast, Quantum Inf. Process., 14 (2015), 4297–4307. |
[16] | Z. G. Qu, J. Keeney, S. Robitzsch, et al., Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks, China. Commun., 13 (2016), 108–116. |
[17] | W. J. Liu, H. B. Wang, G. L. Yuan, et al., Multiparty quantum sealed-bid auction using single photons as message carrier, Quantum Inf. Process., 15 (2016), 869–879. |
[18] | W. J. Liu, P. P. Gao, W. B. Yu, et al., Quantum Relief algorithm, Quantum Inf. Process., 17 (2018), 280–290. |
[19] | J. W. Wang, T. Li, X. Y. Luo, et al., Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain, IEEE T. Circ. Syst. Vid., (2018), online. DOI: 10.1109/TCSVT.2018.2867786. |
[20] | L. Liu, G. M. Tang and Y. F. Sun, Quantum steganography for multi-party covert communication, Int. J. Theor. Phys., 55 (2016), 1–11. |
[21] | T. Mihara, Multi-party quantum steganography, Int. J. Theor. Phys., 56 (2017), 1–8. |
[22] | Z. G. Qu, S. Y. Chen, S. Ji, et al., Anti-noise bidirectional quantum steganography qrotocol with large payload, Int. J. Theor. Phys., 57 (2018), 1–25. |
[23] | Z. G. Qu, T. C. Zhu and J. W. Wang, A novel quantum steganography based on Brown states, Comput. Mater. Con., 1 (2018), 47–59. |
[24] | S. Wang, J. Sang and X. Song, Least significant qubit (LSQb) information hiding algorithm for quantum image, Measurement, 73 (2015), 352–359. |
[25] | N. Jiang, N. Zhao and L. Wang, LSB based quantum image steganography algorithm, Int. J. Theor. Phys., 55 (2016), 1–17. |
[26] | Z. G. Qu, Z. W. Cheng, W. J. Liu, et al., A novel quantum image steganography algorithm based on exploiting modification direction, Multimed. Tools. Appl., (2018), online. DOI: 10.1007/s10773- 018-3716-4 |
[27] | F. Grosshans and P. Grangier, Continuous variable quantum cryptography using coherent states, Phys. Rev. Lett., 88 (2002), 057902. |
[28] | S. Olivares, M.G.A. Paris and R. Bonifacio, Teleportation improvement by inconclusive photon subtraction, Phys. Rev. A, 67 (2003), 032314. |
[29] | J. N. Wu, S. Y. Liu, L. Y. Hu, et al., Improving entanglement of even entangled coherent states by a coherent superposition of photon subtraction and addition, J. Opt. Soc. Am. B, 32 (2015), 2299. |
[30] | Y. Guo, W. Ye, H. Zhong, et al., Continuous-variable quantum key distribution with non-Gaussian quantum catalysis, Phys. Rev. A, 99 (2019), 032327. |
[31] | L. P. Van and S. L. Braunstein, Multipartite entanglement for continuous variables: a quantum teleportation network, Phys. Rev. Lett., 84 (2000), 3482–3485. |
[32] | H. Ma, P. Huang and W. Bao, Continuous-variable quantum identity authentication based on quantum teleportation, Quantum Inf. Process., 15 (2016), 2605–2620. |
[33] | C. Berrou and A. Glavieux, Near optimum error correcting coding and decoding: turbo-codes, IEEE T. Commun., 44 (1996), 1261–1271. |
[34] | R. G. Gallager, Low-density parity-check codes, IEEE Commun. Surv. Tut., 13 (2011), 3–26. |
[35] | T. C. Ralph, Continuous variable quantum cryptography, Phys. Rev. A, 61 (1999), 010303. |
[36] | W. P. Bowen, N. Treps, B. C. Buchler, et al., Experimental investigation of continuous-variable quantum teleportation, Phys. Rev. A, 67 (2003), 032302. |
[37] | J. Z. Huang, C. Weedbrook, Z. Q. Yin, et al., Quantum hacking on continuous-variable quantum key distribution system using a wavelength attack, Phys. Rev. A, 87 (2013), 062329. |
1. | Zhiguo Qu, Yiming Huang, Min Zheng, A novel coherence-based quantum steganalysis protocol, 2020, 19, 1570-0755, 10.1007/s11128-020-02868-2 |