
Citation: Nikolai Pushkarev. A CAP for Healthy LivingMainstreaming Health into the EU Common Agricultural PolicyEuropean Public Health Alliance (EPHA), 2015[J]. AIMS Public Health, 2015, 2(4): 844-887. doi: 10.3934/publichealth.2015.4.844
[1] | Zhiguo Qu, Shengyao Wu, Le Sun, Mingming Wang, Xiaojun Wang . Effects of quantum noises on χ state-based quantum steganography protocol. Mathematical Biosciences and Engineering, 2019, 16(5): 4999-5021. doi: 10.3934/mbe.2019252 |
[2] | Dingwei Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li . High capacity reversible data hiding in MP3 based on Huffman table transformation. Mathematical Biosciences and Engineering, 2019, 16(4): 3183-3194. doi: 10.3934/mbe.2019158 |
[3] | Guodong Ye, Huishan Wu, Kaixin Jiao, Duan Mei . Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Mathematical Biosciences and Engineering, 2021, 18(5): 5427-5448. doi: 10.3934/mbe.2021275 |
[4] | Yongju Tong, YuLing Liu, Jie Wang, Guojiang Xin . Text steganography on RNN-Generated lyrics. Mathematical Biosciences and Engineering, 2019, 16(5): 5451-5463. doi: 10.3934/mbe.2019271 |
[5] | Yanfeng Shi, Shuo Qiu, Jiqiang Liu, Tinghuai Ma . Novel efficient lattice-based IBE schemes with CPK for fog computing. Mathematical Biosciences and Engineering, 2020, 17(6): 8105-8122. doi: 10.3934/mbe.2020411 |
[6] | Xin Wang, Bo Yang . An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack. Mathematical Biosciences and Engineering, 2019, 16(6): 7734-7750. doi: 10.3934/mbe.2019388 |
[7] | Liyun Liu, Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Guorui Feng . Steganography in beautified images. Mathematical Biosciences and Engineering, 2019, 16(4): 2322-2333. doi: 10.3934/mbe.2019116 |
[8] | Xianyi Chen, Anqi Qiu, Xingming Sun, Shuai Wang, Guo Wei . A high-capacity coverless image steganography method based on double-level index and block matching. Mathematical Biosciences and Engineering, 2019, 16(5): 4708-4722. doi: 10.3934/mbe.2019236 |
[9] | P. Balamanikandan, S. Jeya Bharathi . A mathematical modelling to detect sickle cell anemia using Quantum graph theory and Aquila optimization classifier. Mathematical Biosciences and Engineering, 2022, 19(10): 10060-10077. doi: 10.3934/mbe.2022470 |
[10] | Melanie A. Jensen, Qingzhou Feng, William O. Hancock, Scott A. McKinley . A change point analysis protocol for comparing intracellular transport by different molecular motor combinations. Mathematical Biosciences and Engineering, 2021, 18(6): 8962-8996. doi: 10.3934/mbe.2021442 |
Compared with classical information hiding, quantum information hiding has unparalleled advantages based on the non-cloning theorem, uncertainty principle, quantum non-locality, such as good security and high information transmission efficiency. Since Bennett and Brassard proposed the first quantum cryptography communication protocol in 1984 [1], many quantum cryptographic communication protocols such as quantum key distribution (QKD) [2,3,4], quantum identity authentication (QIA) [5], quantum secrets sharing (QSS) [6,7,8] and quantum security direct communications (QSDC) [9,10] have emerged. In recent years, the theoretical research and application of quantum communication has been developed in a variety of ways, including quantum computation [11], quantum remote state preparation [12,13,14], quantum network coding [15,16], quantum auction [17] and quantum machine learning [18,19].
Among them, quantum steganography, as a research branch of quantum information hiding, aims at covertly transmitting secret information in public quantum channel. Usually, it can be mainly divided into two categories. The first one is to use quantum communication characteristics to perform covert communication through single-particle or multi-particle as quantum carriers [20,21,22]. In 2018, Zhu et al. proposed a novel quantum steganography protocol based on Brown entangled states, which proved its good security resisting on quantum noise [23]. The second is to embed secret information into various multimedia carriers for covert communication [24,25]. In 2018, Qu et al. proposed a novel quantum image steganography algorithm based on exploiting modification direction [26].
So far, most of the previous quantum steganography protocols are mainly based on discrete variables. Recently, the continuous variable quantum communication technique is beginning to emerge [27]. It uses a classical light source as a signal source, and can encode information on a continuously changing observable physical quantity with low cost due to easy implementation. The encoded information is a symbol, which can be restored to binary bits only after some specific data processing. Therefore, the capacity of this technique can be large and the key generation rate is also high, which has quickly attracted widespread attention. As an example, the continuous-variable quantum key distribution (CVQKD) has absolute advantages over the discrete-variable quantum key distribution (DVQKD). The detection of DVQKD is based on single photons. The single photon signal is not only difficult to manufacture, but also difficult to be detected and costly. The CVQKD is using homodyne/heterodyne decoding to obtain quadrature encoding, which greatly improves the technical efficiency. In addition, non-Gaussian operations have many applications in improving the quantum entanglement and teleportation. In 2003, Olivares et al. proposed the Inconclusive photon subtraction (IPS) to improve teleportation [28]. In 2015, Wu et al. applied local coherent superposition of photon subtraction and addition to each mode of even entangled coherent state to introduce a new entangled quantum state [29]. In 2018, the CVQKD with non-Gaussian quantum catalysis was proposed [30].
In this paper, a continuous variable quantum steganography protocol is proposed based on the continuous variable GHZ entangled state [31] and the continuous variable quamtum identity authentication protocol [32]. The protocol can realize the transmission of deterministic secret information in public quantum channel of identity authentication. It can convert segmented secret information into the whole secret information by adopting the specific encoding rule, randomly selecting quantum channel and replacing time slot. Through effectively verifying the identity of users, in the new protocol, the secret information can be implicitly transmitted to the recipient Bob, while the eavesdropper Eve disables to detect the existence of covert communication. Compared with the previous quantum steganography protocols, by introducing continuous variables into quantum steganography and making full use its characteristics of continuous variable, the proposed protocol can obtain the advantages of good imperceptibility, security and easy implementation for good applicability.
The paper is organized as follows. Section 2 introduces some basic knowledge about optics, the preparation of continuous variable GHZ states, and the principle of continuous variable quantum telecommuting required for the identity authentication process. Section 3 describes the concrete steps of the new continuous variable quantum steganography protocol in detail. Section 4 mainly analyzes the new protocol's imperceptibility, security and efficiency of information transmission, even in quantum noise environment. The conclusions are given in Section 5.
We first review some of the knowledge of quantum optics. By using the creation operator $ {a^\dagger }$ and the annihilation operator $ a $, the two regular components including the amplitude x and the phase p of a beam can be expressed as
$ x=12(a†+a) $
|
(2.1) |
$ p=i2(a†−a) $
|
(2.2) |
where $ {a^\dagger } $ and $ a $ satisfy boson reciprocity $ \left[{a, a} \right] = \left[{{a^\dagger }, {a^\dagger }} \right]{\rm{ = 0}} $, $ \left[{a, {a^\dagger }} \right] = 1 $. Therefore $ \left[{x, p} \right] = \frac{i}{2} $, two typical components x and p satisfy the Heisenberg uncertainty principle: $ \Delta x \cdot \Delta p \ge \frac{1}{4} $.
A squeezed beam can be defined as
$ |α,r⟩=x+ip=erx(0)+ie−rp(0) $
|
(2.3) |
where $ r $ is the compression factor. If $ r < 0 $, it indicates that the beam amplitude is compressed; if $ r > 0 $, it indicates that the beam phase is compressed. $ x\left(0 \right) $ and $ p\left(0 \right) $ indicate the amplitude and the phase of the vacuum state respectively, and $ \; x\left(0 \right), p\left(0 \right) \sim N\left({0, \frac{1}{4}} \right) $.
In the proposed protocol, the legal communication parties share the encoding rule in advance. They can encode the discrete information into different intervals(Turbo codes [33] or LDPC code [34]).
The continuous variable GHZ state is very important for quantum information processing and quantum communication in the new protocol. As shown in Figure 1, the continuous variable GHZ state is produced by making two squeezed vacuum states $ {a_{in1}} $ and $ {a_{in2}} $ pass through a beam splitter $ B{S_1} $ (transmission coefficient is 0.5) to generate $ {a_{out1}} $ and $ a_{in3}^ * $ firstly. And then, it makes $ a_{in3}^ * $ and another squeezed vacuum state $ {a_{in3}} $ pass through a beam splitter $ B{S_2} $ (transmission coefficient is 1) to generate $ {a_{out2}} $ and $ {a_{out3}} $. Obviously, $ {a_{out1}} $, $ {a_{out2}} $ and $ {a_{out3}} $ is a set of the continuous variable GHZ entangled state that be defined as
$ xout1=1√3er1xin1(0)+√23e−r2xin2(0) $
|
(2.4) |
$ pout1=1√3e−r1pin1(0)+√23er2pin2(0) $
|
(2.5) |
$ xout2=1√3er1xin1(0)−1√6e−r2xin2(0)+1√2e−r3xin3(0) $
|
(2.6) |
$ pout2=1√3e−r1pin1(0)−1√6er2pin2(0)+1√2er3pin3(0) $
|
(2.7) |
$ xout3=1√3er1xin1(0)−1√6e−r2xin2(0)−1√2e−r3xin3(0) $
|
(2.8) |
$ pout3=1√3e−r1pin1(0)−1√6er2pin2(0)−1√2er3pin3(0) $
|
(2.9) |
Let suppose that $ {r_1} = {r_2} = {r_3} = r $, it can calculate the correlation of amplitude and phase between $ {a_{out1}} $, $ {a_{out2}} $ and $ {a_{out3}} $
$ ⟨[Δ(xout1−xout2)]2⟩=(12−√34)e−2r $
|
(2.10) |
$ ⟨[Δ(xout1−xout3)]2⟩=(12+√34)e−2r $
|
(2.11) |
$ ⟨[Δ(pout1+pout2+pout3)]2⟩=34e−2r $
|
(2.12) |
If the compression parameter $ r \to + \infty $, the correlation between the output optical modes $ {a_{out1}} $, $ {a_{out2}} $ and $ {a_{out3}} $ will become stronger and stronger
$ limr→+∞(xout1−xout2)=limr→+∞(xout1−xout3)=0 $
|
(2.13) |
$ limr→+∞(pout1+pout2+pout3)=0 $
|
(2.14) |
It is obvious that the amplitude between any two of the continuous variable GHZ state output modes is positively correlated, and the phase between them also has the entanglement characteristic.
The principle of continuous variable quantum telecommuting can be described as shown in Figure 2. Alice prepares a coherent state $ {a_A} = \left| {{x_A} + i{p_A}} \right\rangle $ to be transmitted. Simultaneously, Alice and Bob share two entangled optical modes $ {a_{out1}} $ and $ {a_{out2}} $. After everything is ready, Alice sends the coherent state and $ {a_{out1}} $ through a 50/50 beam splitter for Bell state measurement to obtain $ {x_o} $ and $ {p_o} $
$ xo=1√2(xA−xout1) $
|
(2.15) |
$ po=1√2(pA+pout1) $
|
(2.16) |
After Alice announces the measurement results through the classic channel, Bob takes the corresponding unitary operation $ D\left({\beta {\rm{ = }}\sqrt {\rm{2}} \left({{x_o} + i{p_o}} \right)} \right) $ on $ {a_{out2}} $ to obtain
$ xB=xout2+√2xo=xA−(xout1−xout2) $
|
(2.17) |
$ pB=pout2+√2po=pA+(pout1+pout2) $
|
(2.18) |
According to Eqs. (2.13) and (2.14), if the compressing parameter $ r \to + \infty $, we can obtain $ {x_B} = {x_A} $, $ {p_B} = {p_A} - {p_{out3}} $. It means that Alice and Bob obtain a highly correlated sequence on the amplitude component. Therefore, in the proposed protocol, we only modulate the effective information on the amplitude component and the uncorrelated random information $ n $ on the phase component.
We propose a novel continuous variable quantum steganography protocol based on quantum identity authentication protocol and continuous variable GHZ state. It can effectively transmit deterministic secret information in the public quantum channel. When Bob attempts to communicate with Alice, they need to share an initial identity key $ {K_1} $ and a series of time slot keys $ \; T $ which are binary sequences known only to Alice and Bob in advance. Here, $ D\left(\alpha \right) $, $ D\left({{\alpha _1}} \right) $ and $ D\left({{\alpha _1}^\prime } \right) $ are the displacement operation; $ D\left(o \right) $ is the unitary operation, and $ H $ is the fidelity parameter. The yellow area represents the normal information transmission mode. The red area represents the secret information transmission mode.
The details of the protocol are shown in Figure 3. We assume that the quantum channel is lossless, the proposed protocol is as follows.
Alice prepares the continuous variable GHZ entangled states $ {a_{out1}} $, $ {a_{out2}} $ and $ {a_{out3}} $. Alice keeps $ {a_{out1}} $ by herself, then transmits $ {a_{out2}} $ and $ {a_{out3}} $ to Bob through two quantum channels R1 and R2 respectively. Alice randomly selects a quantum channel for normal information transmission mode (identity authentication). The other is the channel of the secret information transmission mode (steganographic information).
The normal information transmission mode:
(A1) Alice chooses $ {a_{out2}} $ (R1 channel) or $ {a_{out3}} $ (R2 channel) to send to Bob. For convenience, we assume that the channel selected by the normal information transmission mode is the R1 channel.
(A2) After Alice confirms that Bob has received $ {a_{out2}} $, she converts $ {K_1} $ to decimal sequence $ {k_1} $. And then, Alice selects two decimal numbers $ {k_2} $ and $ v $, satisfying the normal distribution $ N\left({0, {\sigma ^2}} \right) $. Alice prepares a vacuum state $ \left| 0 \right\rangle $ with displacement operation $ D\left({{\alpha _1}{\rm{ = }}\left({{k_1} + {k_2}} \right) + in} \right) $. The coherent state optical mode $ {a_1} $ which is used to update the identity key, is obtained. Simultaneously, Alice also prepares a vacuum state with displacement operation $ D\left({{\alpha _1}^\prime = ({k_1} + v) + in} \right) $. The coherent state optical mode $ {a_1}^\prime $, which is used as a decoy state for identity authentication, is obtained. After that, Alice randomly selects $ {a_1} $ or $ {a_1}^\prime $ to make Bell state measurement with $ {a_{out1}} $ on each time slot and obtains, $ {x_o} = \frac{1}{{\sqrt 2 }}\left({{x_1} - {x_{out1}}} \right) $ and $ {p_o} = \frac{1}{{\sqrt 2 }}\left({{p_1} + {p_{out1}}} \right) $, or $ {x_o} = \frac{1}{{\sqrt 2 }}\left({{x_1}^\prime - {x_{out1}}} \right) $ and $ {p_o} = \frac{1}{{\sqrt 2 }}\left({{p_1}^\prime + {p_{out1}}} \right) $. Then, Alice announces $ {x_o} $ and $ {p_o} $ to Bob through the public classic channel.
(A3) According to the received $ {x_o} $ and $ {p_o} $, Bob performs the unitary operation $ D\left({o = \sqrt 2 \left({{x_o} + i{p_o}} \right)} \right) $ on the received $ {a_{out2}} $, and then selects the amplitude component to measure and get the sequence $ \delta $. Alice publishes the time slots $ t $ which used $ {a_1}^\prime $, and Bob measures the amplitude components on these time slots to obtain a sequence $ {\delta _1}^\prime $. The value of sequence $ \delta $ minus sequence $ {\delta _1}^\prime $ is defined as $ {\delta _1} $.
(A4) Bob converts $ {K_1} $ to a decimal sequence $ {k_1}^\prime $, then calculates $ v' = {\delta _{\rm{1}}}^\prime - {k_1}^\prime $. After Bob announces $ v' $, Alice calculates a fidelity parameter $ H = {\left\langle {{{\left[{v'- \varphi v} \right]}^2}} \right\rangle _{\min }} $. In the lossless channel, we get $ \varphi {\rm{ = }}1 $. If the calculation $ H $ is equal to 0, it means $ {k_1} = {k_1}^\prime $. The user identity is verified to be legal. Bob then updates the identity key sequence $ {\delta _1} - {k_1}^\prime $ to obtain $ {k_2} $. If $ H $ is greater than 0, it means that the eavesdropper Eve exists or the user is illegal. As a result, the communication will be abandoned.
The secret information transmission mode:
(B1) Alice divides her steganographic information into p-blocks for block transmission. Let assume that the steganographic information of the q-th block $ \left({q \le p} \right) $ is 010. According to the previously shared encoding rule, steganographic information 010 corresponds to the interval $ \left({ - 2, - 1} \right] $. After that, Alice takes the first time slot $ {T_a} $ from the binary time slot key $ T $ and converts it to a decimal number $ {t_a} $. And then, she chooses the random variable $ m \in \left({ - 2, - 1} \right] $, and does the translation operation $ D\left({\alpha = \; m + in} \right) $ on $ {a_{out3}} $ in the time slot $ {t_a} $ to get $ {a_{out3}}^\prime $, where $ m $ is the secret information that needs to be transmitted. Alice sends $ {a_{out3}}^\prime $ to Bob via quantum channel R2.
(B2) Bob also obtains $ {t_a} $ based on the shared time slot key, and measures the amplitude component of the received beam mode $ {a_{out3}}^\prime $ in the time slot $ {t_a} $ to obtain the sequence $ {\xi _1} $. After that, Bob then selects the time slot $ {t_u}\left({u \ne a} \right) $ to measure the amplitude component for obtaining the sequence $ {\xi _2} $. Bob calculates $ {\xi _1}{\rm{ - }}{\xi _2} $ to obtain the secret information $ m $.
(B3) According to the previously shared encoding rule, the information of the q-th block is obtained by Bob. The identity keys of both parties are also updated, and the transmission of the secret information of this block is completed. In the next round, Alice randomly selects one quantum channel for normal information transmission mode, and another quantum channel for secret information transmission mode. Then Alice repeats the above steps until all the steganographic information are transmitted.
As shown in Figure 3, when Alice wants to transmit private information to Bob, she randomly selects a quantum channel for identity authentication by using the modulated vacuum states and the continuous variable quantum telecommuting. At the same time, after the encoded secret information is modulated in the shared time slot, the transmission of the secret information is also carried out in another quantum channel. Under the cover of determining whether the Bob's identity is legal, it is difficult for an eavesdropper to discover that another channel is transmitting information. Even if the eavesdropper knows the existence of the secret information, it is impossible to obtain useful information without knowing the modulated time slot and the encoding rule.
In the field of experiment, the protocol is also feasible. The secure transmission using entangled squeezed states has been exemplified [35]. The experimental demonstration of the continuous variable quantum telecommuting has also been proposed [36]. Our protocol is mainly based on these two techniques. Therefore, this protocol is capable of having good performance in experiments.
The security of the scheme is mainly based on the entanglement properties of the GHZ state, the specific encoding rule, the shared time slot key and the block transmission. Among them, quantum entanglement guarantees the correlation of quantum transmission. The encoding rule ensures that the information in the quantum channel is not completely equal to the identity key information. The shared time slot key decides the writing and reading of the secret information.
The normal message transmission mode is to avoid Eve's active attack through identity authentication. In order to conduct an active attack, Eve needs to be authenticated. The most effective method is to obtain an updated authentication key and implement an active attack in the next authentication flow. In order to obtain the updated authentication key, Eve's good optional method is to intercept all the quantum signals sent by Alice and measure their components. Combined with the information sent by the classic channel, Eve can recover the updated authentication key and prepare a quantum state to send to Bob during an authentication process. However, due to the quantum uncertainty principle, Eve will inevitably introduce excessive noise, which will be detected by the legal user through the calculation of the fidelity parameter. As shown in Figure 3, there are two quantum channels and two classical channels in the proposed protocol. We have always assumed that the information transmitted in the classical channel is public, and the security of the normal information transmission mode has been proved above [32]. Therefore, we focus on the security of the secret information transmission mode.
It's noteworthy that this protocol may suffer from physical attacks, such as the wavelength attack. This kind of attack makes full of use of the potential imperfections in the protocol's implementation to enable the eavesdropper to control the light intensity transmission of the receiver's splitter. The attack method is to intercept the beam and measure the signal using the local oscillator by heterodyne measurement to obtain the quadrature values, and then switch the wavelength of the input light. It can make the eavesdropper completely control the receiver's beam splitter without being discovered. In this case, the new protocol is also capable of resisting the attack by randomly adding or not adding a wavelength filter before the monitoring detector and observing the difference value [37].
Because only two quantum channels (R1 and R2) are used to transmit quantum information and the information is modulated on the amplitude and phase of the beam, the attacker Eve can take an attack by using a spectroscope to intercept the signal for measurement and attempting to obtain the key. As shown in Figure 4, Let assume that the spectroscopic coefficient used by Eve is $ \gamma \left({0 \le \gamma \le 1} \right) $. The two beams $ {a_{A1}} $ and $ {a_{A2}} $ sent by Alice pass through the beam splitter and become
$ aB1=√γaA1+√1−γaN1 $
|
(4.1) |
$ aB2=√γaA2+√1−γaN2 $
|
(4.2) |
Eve can obtain $ {a_{E1}} $ and $ {a_{E2}} $
$ aE1=√γaN1−√1−γaA1 $
|
(4.3) |
$ aE2=√γaN2−√1−γaA2 $
|
(4.4) |
According to the difference of the spectroscopic coefficients, the safety analysis can be carried out in three cases:
1. If $ \gamma = 0 $, Eve intercepts all signals. In this case, Eve may combine $ {a_{E1}} $ and $ {a_{E2}} $ with the Bell state measurement to obtain
$ xu=1√2(xE1−xE2)=1√2(xA1−xA2) $
|
(4.5) |
$ pu=1√2(pE1+pE2)=1√2(pA1+pA2) $
|
(4.6) |
Due to the correlation between the amplitudes of $ {a_{A1}} $ and $ {a_{A2}} $, Eve measures the amplitude component, as $ {x_u} \to 0 $. Even if the time slot containing the secret information has been stolen, Eve disables to get any information. The phase of $ {a_{A1}} $ and $ {a_{A2}} $ does not modulate the secret information, and only the uncorrelated random information $ n $ exists. Therefore, Eve will only think that it is the ordinary noise in the quantum channel, so that the transmission of the secret information can be undetected.
Eve may also measure $ {a_{A1}} $ and $ {a_{A2}} $ separately. According to the principle of key modulation, let assume that Eve measures the amplitude of $ {a_{A1}} $ and the phase of $ {a_{A2}} $ respectively. Because the correlation of amplitude, Eve can recover $ {a_{A2}} $ after measurement. However, due to the quantum uncertainty principle, Eve cannot recover the phase of $ {a_{A1}} $ and this operation will reduce the phase entanglement of the GHZ state. It will inevitably be detected by performing eavesdropping detection from legitimate parties.
It can be seen that Eve's eavesdropping will be detected by legitimate parties, and this protocol can safely transmit secret information when $ \gamma = 0 $.
2. If $ \gamma {\rm{ = 1}} $, Eve does not take any action, obviously cannot get any information.
3. When $ 0 \le \gamma \le 1 $, Eve only intercepts part of the signal, and another part of the signal is still transmitted to the receiver.
In this case, due to the entanglement properties of the GHZ state, Eve cannot obtain effective information with the Bell state measurement, so Eve can only operate on $ {a_{E1}} $ and $ {a_{E2}} $ separately. Because the secret information is modulated on one of the quantum channels, let choose $ {a_{E1}} $ to analyze it as an example. Let Assume that the quantum channel transmission efficiency is $ \lambda $, the signal received by Bob will be
$ aB1=√λaA1+√1−λaN1 $
|
(4.7) |
Eve needs to amplify $ {a_{E1}} $ to avoid being detected and sends it to Bob with $ {a_{B1}} $. The effective signal received by Bob is
$ a=gaE1+aB1 $
|
(4.8) |
Here, $ g $ is the gain compensation. According to Eqs. (4.1), (4.3) and (4.8), in order to receive the signal $ \sqrt \lambda {a_{A1}} $ for Bob, it needs to be satisfied with
$ √λaA1=−g√1−γaA1+√γaA1 $
|
(4.9) |
Eve obtain $ g = \frac{{\sqrt \gamma - \sqrt \lambda }}{{\sqrt {1 - \gamma } }} $. Due to the information is modulated on the amplitude component, the noise signal received by Bob will be
$ aN=1−√λγ√1−γxN1 $
|
(4.10) |
If $ \gamma \ne \lambda $ and $ {a_N} \ne \sqrt {1 - \lambda } {x_{N1}} $, the signal-to-noise ratio received by Bob will change. The legitimate parties will find Eve in the eavesdropping detection. If $ \gamma {\rm{ = }}\lambda $, $ g{\rm{ = }}0 $, it does not require the gain compensation. Eve will be undetected by the legitimate parties.
Therefore, if $ 0 \le \gamma \le 1 $, Eve can adopt the best attack method is intercepting by a beam splitter with the same spectroscopic coefficient and channel transmission efficiency. The signal received by Eve will be
$ aE1=√λaN1−√1−λaA1 $
|
(4.11) |
The signal received by Bob is
$ aB1=√λaA1+√1−λaN1 $
|
(4.12) |
According to Eq. (2.6), the amplitude components of Eve and Bob are obtained as follows
$ xE1=√λxN1−√1−λ[1√3erxin1(0)−1√6e−rxin2(0)+1√2e−rxin3(0)] $
|
(4.13) |
$ xB1=√λ[1√3erxin1(0)−1√6e−rxin2(0)+1√2e−rxin3(0)]+√1−λxN1 $
|
(4.14) |
Here, $ {x_{N1}} \sim N\left({0, {V_{N1}}} \right) $. If we measure the amplitude of $ {a_{B1}} $, only $ \sqrt {\frac{\lambda }{3}} {e^r}{x_1}\left(0 \right) $ will be the effective signal, while the rest are noise. The signal-to-noise ratio of Bob can be calculated as
$ MB1NB1=λe2r2λe−2r+12(1−λ)VN1 $
|
(4.15) |
The amount of information between Alice and Bob is
$ I(A,B)=12log2(1+MB1NB1) $
|
(4.16) |
Similarly, the signal-to-noise ratio of Eve is
$ ME1NE1=(1−λ)e2r2(1−λ)e−2r+12λVN1 $
|
(4.17) |
The amount of information between Alice and Eve is
$ I(A,E)=12log2(1+ME1NE1) $
|
(4.18) |
Therefore, according to the Shannon information theory, the quantum channel transmission rate is
$ ΔI=I(A,B)−I(A,E)=12log2(λ(e2r+2e−2r)+12(1−λ)VN12λe−2r+12(1−λ)VN1⋅2(1−λ)e−2r+12λ(1−λ)(e2r+2e−2r)+12λVN1) $
|
(4.19) |
If $ {V_{N1}}{\rm{ = }}\frac{1}{4} $, the secret information transmission rate obtained by Eq. (4.19) is as shown in Figure 5. The secret information transmission rate $ \Delta I $ is proportional to the quantum channel transmission efficiency $ \lambda $. If the channel transmission efficiency $ \lambda < 0.5 $, the information transmission rate $ \Delta I < 0 $, the amount of information acquired by Eve is greater than the amount of information obtained by Bob, so that the channel is unsafe. If the channel transmission efficiency $ \lambda > 0.5 $, the information transmission rate $ \Delta I > 0 $, the secret information transmission can be carried out safely. The security of the proposed protocol is also dependent on the entanglement properties of the continuous variable GHZ state. If the compression parameter $ r = 0 $, the information transmission rate will reach 0. It is almost impossible to transmit information. If the compression parameter $ r $ increases, the information transmission rate also increases. Compared with discrete variable communication, it can also greatly reduce the quantum states that need to be prepared and shorten the time required for information transmission. For example, the discrete variables communication can only transmit 1 bit of classical information per qubit. If a deterministic key of 1000 bits is needed, at least 1000 qubits are required. In the proposed protocol, if $ r = 3 $ and the channel transmission efficiency is equal to 0.9, the information transmission rate will be 4 qubits/s. At this point, only 250 qubits is required to complete the same work. So it's obviously that the efficiency of information transmission can be greatly improved.
This paper proposes a novel continuous variable quantum steganography protocol based on quantum identity authentication. For covert communication, the protocol implements the transmission of secret information in public channel of quantum identity authentication. Compared with the existing quantum steganography results, by taking full advantage of entanglement properties of continuous variable GHZ state, this protocol not only has the advantages of good imperceptibility and easy implementation in physics, but also good security and information transmission efficiency, even under eavesdropping attacks especially to the spectroscopic noise attack. In addition, the capacity of secret information is potential to be enlarged by introducing better information coding method.
This work was supported by the National Natural Science Foundation of China (No. 61373131, 61601358, 61501247, 61672290, 61303039, 61232016), the Six Talent Peaks Project of Jiangsu Province (Grant No. 2015-XXRJ-013), Natural Science Foundation of Jiangsu Province (Grant No. BK20171458), the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (China under Grant No.16KJB520030), Sichuan Youth Science and Technique Foundation (No.2017JQ0048), NUIST Research Foundation for Talented Scholars (2015r014), PAPD and CICAEET funds.
The authors declare no conflict of interest.
[1] | Phil Hogan EU Commissioner for Agriculture (2015) Interview at the Forum for the Future of Agriculture by Views.eu, [online]. While using this quote EPHA however disagrees that the CAP should not be about farmers. |
[2] | Tim Lang (2004) European agricultural policy: Is health the missing link? In: London School of Economics and Political Science, Eurohealth issue: Integrating Public Health with European food and agricultural policy. online. Of course the policy also aimed to provide economic security for the farming population, which is visible in the CAP's mission statement. |
[3] | Also, in the past nutrient recommendation for protein intake, especially animal protein, was around twice as high as it is today, see for instance: J. Périssé (1981) Joint FAO/WHO/UNU Expert Consultation on Energy and Protein Requirements [online]. |
[4] | WHO Europe (2015) European Health Report 2015. [online] |
[5] | Art 168 Treaty on the Functioning of the European Union (TFEU). [online] |
[6] | WHO Europe (2012) Action plan for implementation of the European strategy for the Prevention and Control of Noncommunicable Diseases 2012-2016, p. 5. [online] |
[7] | Outcome of the “Global Burden of Disease” study (2013), a collaboration between seven leading international scientific institutes to systematically quantify the main causes of health loss. Institute for Health Metrics and Evaluation. University of Washington (2013) The global burden of disease. Generating evidence, guiding policy. European Union and European Free Trade Association Regional Edition. [online] |
[8] | The Disability Adjusted Life Year (DALY) is a measure of overall disease burden expressed as the number of years lost due to ill-health, disability or early death. The measure combines mortality and disease into one indicator. |
[9] | European Commission. Infographic: Tobacco in the EU. [online] |
[10] | FAO (2012) Sustainable diets and biodiversity. Directions and solutions for policy research and action. Proceedings of International Scientific Symposium. [online] |
[11] | Tim Lang et al. (2012) Ecological public health: the 21st century's big idea? The BMJ. [online] |
[12] | Lancet Commission on planetary health (2015) Safeguarding human health in the Anthropocene epoch. The Lancet. [online] |
[13] | Nick Watts et al. (2015) Health and climate change: policy responses to protect public health. The Lancet. [online] |
[14] | National Nutrition Council of Finland (2014) Finnish Nutrition Recommendations 2014. [online] |
[15] | Global Meat News (2015) Latest US dietary advice to avoid limiting meat. [online] |
[16] | European Commission (2013) Overview of CAP Reform 2014-2020. [online] |
[17] | OECD (2015) Focus on Health Spending. Health Statistics 2015. [online] |
[18] | OECD iLibrary, Health at a Glance: Europe 2012. [online] |
[19] | Vytenis Andriukaitis (16 July 2015) Speech outlining priorities for health until 2019 at European Policy Centre, [online] |
[20] | Sophie Hawkesworth et al. (2010) Feeding the world healthily: the challenge of measuring the effects of agriculture on health. Philosophical Transactions B of The Royal Society. [online] |
[21] | Schäfer Elinder (2003) Public health aspects of the EU Common Agricultural Policy. Developments and recommendations for change in four sectors: Fruit and vegetables, dairy, wine and tobacco. National Institute of Public Health, Sweden |
[22] | Christopher Birt et al. (2007) A CAP on Health? The impact of the EU Common Agricultural Policy on public health. Faculty of Public Health. [online] |
[23] | Boyd Swinburn et al. (2011) The global obesity pandemic: shaped by global drivers and local environments. The Lancet. [online] |
[24] | Stefanie Vandevijvere et al. (2015) Increased food energy supply as a major driver of the obesity epidemic: a global perspective. Bulletin of the World Health Organisation. [online] |
[25] | Boyd Swinburn et al. (2009) Increased food energy supply is more than sufficient to explain the US epidemic of obesity. Am J Clin Nutr. [online] |
[26] | P. Scarborough et al. (2011) Increased energy intake entirely accounts for increase in body weight in women but not in men in the UK between 1968 and 2000. Br J Nutr. [online] |
[27] | T. Rawe et al. (2015) Cultivating equality: delivering just and sustainable food systems in a changing climate. CGIAR. [online] |
[28] | Josef Schmidhuber (2007) The EU Diet - Evolution, Evaluation and Impacts of the CAP. FAO. [online] |
[29] | Ralf Peters (2006) Roadblock to reform: the persistence of agricultural export subsidies. UNCTAD. [online] |
[30] | Eurostat. Cross-country comparison of final consumption expenditures on food and housing in 2011. [online] |
[31] | Franco Sassi (2010) Obesity and the Economics of Prevention - Fit not fat. OECD. [online] |
[32] | D. Lakdawalla et al. (2002) The Growth of Obesity and Technological Change: A theoretical and Empirical Examination. National Bureau for Economic Research. Working Paper W8946. [online] |
[33] | Alan Matthews (2015) Forum for the Future of Agriculture 2015 - Remarks on EU agricultural trade policy. CAPreform.eu. [online] |
[34] | Corinna Hawkes et al. (2012) Linking agricultureal policies with obesity and noncommunicable diseases: A new perspective for a globalising world. Food Policy. [online] |
[35] | A similar case was made by: The Netherlands Scientific Council for Government Policy (2014) Towards a food policy. English synopsis. [online] |
[36] | WHO Europe (2000) The First Action Plan for Food and Nutrition Policy (2000-2005). [online] |
[37] | EPHA (2010) Response to the “The Future of the Common Agricultural Policy” consultation. online. European Public Health & Agriculture Consortium (2011) Response to the “Reform of the CAP towards 2020 - impact assessment”. [online] |
[38] | Olivier de Schutter (2014) Report of the Special Rapporteur on the right to food, Final report: The transformative potential of the right to food. UN. [online] |
[39] | Regulation (EU) No 1307/2013 establishing rules for direct payments to farmers under support schemes within the framework of the common agricultural policy. [online] |
[40] | Regulation (EU) No 1308/2013 establishing a common organisation of the markets in agricultural products. [online] |
[41] | Regulation (EU) No 1305/2013 on support for rural development. [online] |
[42] | Treaty on the European Union. online. Treaty on the Functioning of the European Union. [online] |
[43] | Karen Lock et al. (2003) Health impact assessment of agriculture and food policies: lessons learnt from the Republic of Slovenia. Bulletin of the World Health Organisation. [online] |
[44] | Vytenis Andriukaitis. EU Commissioner for Health (2015) Letter to the EU Ministers of Health. [online] |
[45] | Scotch Whisky Association, the European Spirits Association and the Comité Européen des Entreprises Vins. |
[46] | Scottish Court of Session (2013) Opinion by Lord Doherty. online. Judiciary of Scotland (2013) Petition for Judicial Review by Scotch Whisky Association & Others, [online] |
[47] | Politico (2015) Health chief blasts alcohol lobbyists. [online] |
[48] | Case C-333/14: Reference for a preliminary ruling from Court of Session, Scotland (United Kingdom) made on 8 July 2014 — The Scotch Whisky Association and others against The Lord Advocate, The Advocate General for Scotland. [online] |
[49] | Opinion of Advocate General Yves Bot (2015) In the case: The Scotch Whisky Association and others against The Lord Advocate, The Advocate General for Scotland. [online] |
[50] | WHO (2014) Global Status Report on Alcohol and Health 2014. [online] |
[51] | OECD (2015) Tackling harmful alcohol use. online. OECD (2015) Policy Brief. Tackling harmful alcohol use, [online] |
[52] | Giulia Meloni et al. (2012) The Political Economy of European Wine Regulation. Centre for Institutions and Economic Performance. Catholic University of Leuven. [online] |
[53] | European Commission (2006) Towards a sustainable European wine sector. [online] |
[54] | European Court of Auditors (2014) Is the EU investment and promotion support to the wine sector well managed and are its results on the competitiveness of EU wines demonstrated?. [online] |
[55] | European Court of Auditors (2012) The reform of the common organisation of the market in wine: progress to date. [online] |
[56] | Article 63 CMO Regulation. Member States may also choose to authorise less, but it may not be 0% or lower. |
[57] | European Court of Auditors (2014) Is the EU investment and promotion support to the wine sector well managed and are its results on the competitiveness of EU wines demonstrated? [online] |
[58] | Article 39 CMO Regulation |
[59] | Articles 45 to 52 of the CMO Regulation |
[60] | Article 44 CMO Regulation referring to Annex VI |
[61] | European Commission (2013) Wine CMO: First submission of financial table of the national support programme. [online]. Submissions were made under the previous CMO for wine, reviewed national envelopes are forthcoming. |
[62] | Article 45 CMO Regulation |
[63] | European Court of Auditors (2014) Is the EU investment and promotion support to the wine sector well managed and are its results on the competitiveness of EU wines demonstrated? [online] |
[64] | Articles 50 and 51 CMO Regulation |
[65] | European Court of Auditors (2014) Is the EU investment and promotion support to the wine sector well managed and are its results on the competitiveness of EU wines demonstrated? [online] |
[66] | Articles 48 and 49 CMO Regulation |
[67] | Articles 47 CMO Regulation |
[68] | Articles 52 CMO Regulation |
[69] | For more on the effects of the previous distillation support regimes: Schäfer Elinder (2003) Public health aspects of the EU Common Agricultural Policy. Developments and recommendations for change in four sectors: Fruit and vegetables, dairy, wine and tobacco. National Institute of Public Health, Sweden. |
[70] | European Commission (2002) Ex-post evaluation of the CMO for wine, Chapter 5. Distillation. [online] |
[71] | Article 46 CMO Regulation |
[72] | European Court of Auditors (2012) The reform of the common organisation of the market in wine: progress to date. [online] |
[73] | Giulia Meloni et al. (2015) L'Histoire se repete. Why the liberalization of the EU vineyard planting rights regime may require another French Revolution. Centre for Institutions and Economic Performance. Catholic University of Leuven. [online] |
[74] | European Court of Auditors (2012) The reform of the common organisation of the market in wine: progress to date. [online] |
[75] | Giulia Meloni et al. (2015) L'Histoire se repete. Why the liberalization of the EU vineyard planting rights regime may require another French Revolution. Centre for Institutions and Economic Performance. Catholic University of Leuven. [online] |
[76] | Nick Sheron, University of Southampton, unpublished graph. Values are measured in Purchasing Power Standard (PPS) based on data provided by DG AGRI, Eurostat and the WHO HFA database and analysed in SPSS(48, 78). |
[77] | The Brewers of Europe (2014) Beer Statistics 2014 edition. [online]WHO (2014) Global Status Report on Alcohol and Health 2014. [online] |
[78] | European Commission. DG Agriculture and Rural Development. Hops. [online] |
[79] | Deloitte, LEI Wageningen, Arcadia International (2009) Evaluation of the CAP measures relating to hops. [online] |
[80] | Article 52 Direct Payments Regulation |
[81] | European Commission. Infographic: Tobacco in the EU. online. In the past tobacco was also quite widely used in medicinal applications. See: Anne Charlton (2004) Medicinal uses of tobacco in history, Journal of the Royal Society of Medicine, [online]. |
[82] | Anna Gilmore et al. (2004) Tobacco-control policy in the European Union in: Eric Feldman et al. (ed) (2004) Unfiltered: Conflicts Over Tobacco Policy and Public Health. Harvard University Press. |
[83] | European Court of Auditors (1987) Special Report No 3/87. The common organisation of the market in raw tobacco accompanied by the Commission's replies. [online] |
[84] | Luk Joossens et al. (1996) Are tobacco subsidies a misuse of public funds? BMJ. [online] |
[85] | Anna Gilmore et al. (2004) Tobacco-control policy in the European Union in: Eric Feldman et al. (ed) (2004) Unfiltered: Conflicts Over Tobacco Policy and Public Health. Harvard University Press. |
[86] | Joy Townsend (1991) Tobacco and the European common agricultural policy. BMJ Clinical Research. [online] |
[87] | COGEA (2009) Evaluation of the CAP measures relating to the raw tobacco sector Synopsis. [online] |
[88] | Article 52 Direct Payments Regulation |
[89] | Under Article 68 of Council Regulation (EC) No 73/2009. The scheme runs until 2014. See: European Commission Answer to a written MEP question by Brian Hayes (E-005093-15). [online] |
[90] | See discussion below under the section: “Towards forward-looking direct payments”. |
[91] | As the principle of decoupled payments applies, it may no longer be possible to identify a tobacco farmer according to the documentation submitted to payment authorities. A separate question should therefore be included on whether the applicant cultivates tobacco. In case of fraud all granted support should be returned accompanied by an administrative penalty. |
[92] | WHO (2015) WHO calls on countries to reduce sugars intake among adults and children. [online] |
[93] | WHO (2015) Guideline: Sugars intake for adults and children. [online] |
[94] | For instance cardiovascular disease: Q. Yang et.al. (2014) Added sugar intake and cardiovascular disease mortality among US adults. JAMA Intern Med. [online] |
[95] | UCLA Newsroom (2012) This is your brain on sugar: UCLA study shows high-fructose diet sabotages learning, memory. [online] |
[96] | Arthur Westover et.al. (2002) A cross-national relationship between sugar consumption and major depression? Depression and Anxiety. [online] |
[97] | Emory Health Sciences (2014) High-fructose diet in adolescence may exacerbate depressive-like behaviour. Science Daily. [online] |
[98] | European Commission (1978), Commission Communication Future development of the Common Agricultural Policy. [online] |
[99] | Emilie Aguirre et al. (2015) Liberalising agricultural policy for sugar in Europe risks damaging public health. [online] |
[100] | ""Allison Burell et al. (2014) EU sugar policy: A sweet transition after 2015? Joint Research Centre. online. Restructuring of the sugar sector in 2006 also lead to a strong centralisation of sugar production and processing with many factory closings in countries like Poland and Italy. Much of the sugar processing is now concentrated, which drops a shadow over regional and rural development objectives. |
[101] | Article 124 and further and Article 232 CMO Regulation |
[102] | European Commission (2014) Prospects for EU agricultural markets and income 2014-2024. [online] |
[103] | Allison Burell et al. (2014) EU sugar policy: A sweet transition after 2015? Joint Research Centre. [online] |
[104] | Alan Mathews (2014) EU beet sugar prices to fall by 22-23% when quotas eliminated. CAPreform.eu. [online] |
[105] | C. Bonnet et al. (2011) Does the EU sugar policy reform increase added sugar consumption? An empirical evidence on the soft drink market. Health Economics. [online] |
[106] | Roya Kelishadi, et al. (2014) Association of fructose consumption and components of metabolic syndrome in human studies: A systematic review and meta-analysis, Nutrition. [online] |
[107] | Victoria Schoen et al. (2015) Should the UK be concerned about sugar? Food Research Collaboration. [online] |
[108] | Kawther Hashem et al. (2015) Does sugar pass the environmental and social test? Food Research Collaboration [online] |
[109] | Allison Burell et al. (2014) EU sugar policy: A sweet transition after 2015? Joint Research Centre. [online] |
[110] | Article 52 Direct payments Regulation |
[111] | European Commission (2014) The CAP towards 2020, Implementation of the new system of direct payments. MS notifications. [online] |
[112] | WHO (2015) Healthy Diet. Fact sheet No 394. [online] |
[113] | Henk Westhoek et al. (2011) The protein puzzle, the consumption and production of meat, dairy and fish in the European Union. Netherlands Environmental Assessment Agency. [online] |
[114] | European Commission (2012) Consultation paper: options for resource efficiency indicators. [online] |
[115] | International Agency for Research on Cancer (2015) Press release. IARC Monographs evaluate consumption of red meat and processed meat. online. Red meat includes beef, pork, lamb and mutton, goat |
[116] | World Cancer Research Fund. Red and processed meat and cancer prevention. online. Referring to meats which are preserved through smoking, curing, salting or through addition of preservatives, including ham, salami, bacon, sausages, hot dogs etc. |
[117] | World Cancer Research Fund, American Institute of Cancer Research (2007) Second Expert Report: Food, Nutrition, Physical activity and the Prevention of Cancer: a Global Perspective. [online] |
[118] | Henk Westhoek et.al. (2014) Food choices, health and environment: Effects of cutting Europe's meat and dairy intake. Global Environmental Change. [online] |
[119] | Mark Sutton et al. (ed) (2011) The European Nitrogen Assessment. Sources, effects and policy perspectives. [online] |
[120] | European Commission (2004) The meat sector in the European Union. [online] |
[121] | See for instance: World Resource Institute. Data series: Meat consumption per capita. [online] |
[122] | European Commission (1980) Agriculture and the problem of surpluses. p. 18-19. [online] |
[123] | Article 52 Direct payments Regulation |
[124] | Article 53 Direct payments Regulation |
[125] | 15% from all net ceilings added up. See Annex III Direct payments Regulation. |
[126] | European Commission. EU Draft Budget for 2016. online. Budget lines starting from code 05. |
[127] | Alan Mathews (2015) Two steps forward, one step back: coupled payments in the CAP. CAPreform.eu. [online] |
[128] | European Commission (2014) The CAP towards 2020. Implementation of the new system of direct payments. MS notifications. [online]. Promoting protein crop production in Europe can however be considered positive as a way to replace soy import from South America. |
[129] | European Court of Auditors (2012) Suckler cow and ewe and goat direct aids under partial implementation of SPS arrangements. online. Both these schemes expired in 2014 together with Regulation (EC) No 73/2009 on direct support schemes for farmers under the common agricultural policy. |
[130] | Article 52(8) Direct payment Regulation |
[131] | Article 26 CMO Regulation and further |
[132] | European Parliament Procedure File 2014/0014 COD. Aid scheme for the supply of fruit and vegetables, bananas and milk in the educational establishments. online. See also: Text adopted in EP Plenary on 27 May. [online] |
[133] | Eurostat (2011) Food: From farm to fork statistics. [online] |
[134] | FAO. Milk and Dairy products in human nutrition - questions and answers. [online] |
[135] | FAO. Food-based dietary guidelines, Food guidelines by country. online. . For criticism on reduced fat milk see for instance: David Ludwig et al. (2011) Three daily servings of reduced-fat milk - an evidence based recommendation? JAMA Pediatrics. [online] |
[136] | Articles 11 and 16 CMO Regulation |
[137] | Article 17 CMO Regulation |
[138] | European Commission (2015) Private storage in the pig meat sector. [online] |
[139] | European Commission Press release (2015) Safety net measures for dairy, fruit and vegetables to be extended. [online] |
[140] | Article 196 CMO Regulation |
[141] | Article 219 CMO Regulation. See also: Alan Mathews (2013) The end of export subsidies? CAPreform.eu. [online] |
[142] | Article 220 CMO Regulation |
[143] | European Parliament Resolution of 7 July 2015 on prospects for the EU dairy sector - review of the implementation of the Dairy Package online. See also: European Parliament News (2015) End of milk quotas: “Opportunities to build a more confident and robust dairy sector”. [online] |
[144] | Euractiv (2014) Moscow pork embargo causes havoc in Brussels. [online] |
[145] | AHDB Dairy (2015) EU Farmgate milk prices. [online] |
[146] | Copa-Cogeca Press release (2015) Copa and Cogeca warn at EU Milk Market Observatory meeting market deteriorated rapidly in past 4 weeks and EU action crucial. online. See also: Euractiv (2015) France promises emergency aid to farmers, online. & Euractiv (2015), Farmers look to EU food aid to boost meat market. [online] |
[147] | See for instance: VILT.be (2015) Landbouworganisaties komen met gemeeschappelijke eisen. online. A coalition of Belgian farmers' organizations demands what farmers really want i.e. fair prices. |
[148] | Aileen Robertson et al. (ed) (2004) Food and health in Europe: a new basis for action. WHO Europe. [online] |
[149] | M. Crawford et al. (1970) Comparative studies on fatty acid composition of wild and domestic meats. International Journal of Biochemistry. [online] |
[150] | Compassion in World Farming (2012) Nutritional benefits of higher welfare animal products. [online] |
[151] | B. H. Schwendel et al. (2014) Organic and conventionally produced milk - An evaluation of factors influencing milk quality. Journal of Dairy Science. [online] |
[152] | Liesbet Smit et al. (2010) Conjugated linoleic acid in adipose tissue and risk of myocardial infarction. The American Journal of Clinical Nutrition. [online] |
[153] | Compassion in World Farming, World Society for the Protection of Animals (2013) Zoonotic diseases, human health and farm animal welfare. [online] |
[154] | WHO (2015) Healthy Diet. Fact sheet No 394. [online] |
[155] | EUFIC (2012) Fruit and vegetables consumption in Europe - do Europeans get enough? [online] |
[156] | European Association for the Fresh Fruit and Vegetables Sector (2015) Freshfel Consumption Monitor. [online] |
[157] | AFC Management Consulting (2012) Evaluation of the European School Fruit Scheme - Final report. For the European Commission. [online] |
[158] | WHO (2009) Global Health Risks Summary Tables. [online] |
[159] | Article 23 CMO Regulation and further |
[160] | European Parliament Procedure File 2014/0014 COD. Aid scheme for the supply of fruit and vegetables, bananas and milk in the educational establishments. online. See also: Text adopted in EP Plenary on 27 May. [online] |
[161] | See for instance: Joint Open letter: Save the EU School Fruit Scheme: ‘Better Regulation' cannot go against the wellbeing of European children (2015). [online] |
[162] | European Court of Auditors (2011) Are the School milk and School fruit schemes effective? [online] |
[163] | AFC Management Consulting (2012) Evaluation of the European School Fruit Scheme - Final report. For the European Commission. [online] |
[164] | Processed fruits and vegetables are allowed but without added sugar, added fat, added salt, added sweeteners and/or artificial flavour enhancers (artificial food additive codes E620-E650) |
[165] | European Parliament Policy Study (2011) The EU Fruit and vegetables sector: overview and post-2013 CAP perspective. [online] |
[166] | Article 32 CMO Regulation and further |
[167] | European Commission. EU Draft Budget for 2016. online. Budget lines starting with code 05. |
[168] | European Parliament Policy Study (2015) Towards new rules for the EU's fruit and vegetables sector. [online] |
[169] | Schäfer Elinder (2003) Public health aspects of the EU Common Agricultural Policy. Developments and recommendations for change in four sectors: Fruit and vegetables, dairy, wine and tobacco. National Institute of Public Health, Sweden |
[170] | Lennert Veerman et al. (2005) The European Common Agricultural Policy on fruits and vegetables: exploring potential health gain from reform. European Journal of Public Health. [online] |
[171] | European Commission. Fruit and vegetables: crisis prevention and management. [online] |
[172] | Steve Wiggins et al. (2015) The rising cost of a healthy diet - changing relative prices of food in high income and emerging economies. Overseas Development Institute, UK. [online] |
[173] | European Parliament resolution of 7 July 2015 on the fruit and vegetables sector since the 2007 reform. [online] |
[174] | Luciano Trentini (2015) Les fruits et légumes européens dans le monde. Fruit and Horticultural European Regions Assembly. [online] |
[175] | Luciano Trentini (2015) Fruit and Horticultural European Regions Assembly. [online] |
[176] | Jos Bijman (2015) Towards new rules for the EU's fruit and vegetables sector. European Parliament policy study. [online] |
[177] | European Heart Network (2008) Response to “Towards a possible European school fruit scheme - Consultation document for impact assessment”. [online] |
[178] | Karen Lock et al. (2005) Fruit and vegetable policy in the European Union: Its effects on the burden of cardiovascular disease. London School of Hygiene and Tropical Medicine, European Heart Network. [online] |
[179] | European Parliament resolution of 7 July 2015 on the fruit and vegetables sector since the 2007 reform. [online] |
[180] | An Ruopeng (2015) Nationwide Expansion of a Financial Incentive Program on Fruit and Vegetable Purchases among Supplemental Nutrition Assistance Program Participants: A Cost-effectiveness Analysis. Social Science & Medicine. [online] |
[181] | F. Ford et al. (2009) Effect of the introduction of ‘Healthy start' on dietary behaviour during and after pregnancy: early results from the ‘before and after'. [online] |
[182] | European Commission (2014) First Commission interim report on the implementation of Pilot Projects and Preparatory Actions 2014. [online] |
[183] | Anne-Marie Mayer (1997) Historical changes in the mineral content of fruits and vegetables. British Food Journal. [online] |
[184] | Aileen Robertson et al. (ed) (2004) Food and health in Europe: a new basis for action. WHO Europe. [online] |
[185] | See: Directive 2009/128/EC establishing a framework for Community action to achieve the sustainable use of pesticides. [online] |
[186] | European Commission (2015) Annex Promotion on the internal market and in third countries. online. See also: European Commission Press release (2015) The Commission approves new promotion programmes for agricultural products. [online] |
[187] | European Commission (2014) Formal adoption of new EU promotion rules for agricultural products. [online] |
[188] | European Commission (2015) The new promotion policy. Synoptic presentation. [online] |
[189] | Regulation (EU) No 1144/2014 on information provision and promotion measures. [online] |
[190] | Graph: European Commission (2013) Overview of CAP Reform 2014-2020. online. First pillar funding amount is in current prices. |
[191] | European Commission DG AGRI (2011) The Future of CAP Direct Payments. [online] |
[192] | Article 25 and further Direct Payments Regulation |
[193] | European Parliament Policy Study (2015) Implementation of the First Pillar of the CAP 2014-2020 in the EU Member States. [online] |
[194] | European Commission DG AGRI (2013) CAP reform - an explanation of the main elements. [online] |
[195] | Article 36 Direct Payments Regulation |
[196] | Article 21 Direct Payments Regulation |
[197] | See for instance: Alan Mathews (2009) How decoupled is the single farm payment? CAPreform.eu. [online] |
[198] | The Economist (2005) Europe's farm follies. [online] |
[199] | European Parliament Policy Study (2015) Extent of Land Grabbing in the EU. [online] |
[200] | Article 41 and further Direct payments Regulation |
[201] | Article 61 and further Direct payments Regulation |
[202] | Article 11 Direct payments Regulation |
[203] | European Commission DG AGRI (2013) Structure and dynamics of EU farms: changes, trends and policy relevance. [online] |
[204] | European Commission (2010) Does population decline lead to economic decline in EU rural regions? [online] |
[205] | The Economist (2015) Rural France. Village croissant. [online] |
[206] | WHO Europe (2012) Addressing the social determinants of health: the urban dimension and the role of local government [online] |
[207] | John Bryden et al. (2004) Rural development and food policy in Europe. In: London School of Economics and Political Science. Eurohealth issue: Integrating Public Health with European food and agricultural policy. [online] |
[208] | European Parliament Policy Study (2015) Towards new rules for the EU's fruit and vegetables sector. [online] |
[209] | Article 5 Direct payments Regulation referring to Regulation (EU) online. which contains the list of cross-compliance measures in Annex II |
[210] | European Council of the European Union. Simplification of the EU's Common Agricultural Policy (CAP). [online] |
[211] | Article 43 and further Direct payments Regulation |
[212] | Directive 2009/128/EC establishing a framework for Community action to achieve the sustainable use of pesticides |
[213] | Recital 2 Rural development Regulation |
[214] | European Commission (2013) Overview of CAP Reform 2014-2020. [online]. In current prices. Rural development measures, unlike direct payments or market measures, are co-financed by Member States. |
[215] | Article 13 and further Rural development Regulation |
[216] | Joris Aertsen et.al. (2013) Valuing the carbon sequestration potential for European agriculture. Land Use Policy. [online] |
[217] | FAO (2013) Advancing agroforestry on the policy agenda. [online] |
[218] | European Commission (2014) Investment support under Rural Development Policy. online. Implementation of the First Pillar of the CAP 2014-2020 in the EU Member States |
[219] | European Court of Auditors (2014) Special report no 23/2014: Errors in rural development spending: what are the causes, and how are they being addressed? [online] |
[220] | Article 14 Direct payments Regulation. See also: Wageningen University, IEEP (2009) Study on the impact of modulation. [online] |
[221] | European Parliament Policy Study (2015) Implementation of the First Pillar of the CAP 2014-2020 in the EU Member States. [online] |
[222] | FAO (2012) Sustainable diets and biodiversity. Directions and solutions for policy research and action. Proceedings of International Scientific Symposium. [online] |
[223] | European Commission (2011) Evaluation of effects of direct support on farmers' incomes. [online] |
[224] | Eurostat. Cross-country comparison of final consumption expenditures on food and housing in 2011. online. In UK and Luxembour the average is below 10%, while in Latvia and Estonia it is near 20% of total expenditure. |
[225] | OECD (2012) Income inequality in the European Union. [online] |
[226] | UCL Institute of Health Equity (2014) Review of social determinants and the health divide in the WHO European Region: final report. WHO Europe. [online] |
[227] | Eurostat data in: Euractiv (2014) One out of four EU citizens at risk of poverty. [online] |
[228] | Aileen Robertson et al. (2007) Obesity and socio-economic groups in Europe: Evidence review and implications for action. Report for European Commission. [online] |
[229] | A. Drewnowski (2009) Obesity, diets and social inequality, Nutrition Reviews, online. See also: WHO (2012) Environmental Health Inequalities in Europe. [online] |
[230] | Belinda Loring et al. (2014) Obesity and inequities Guidance for addressing inequities in overweight and obesity. [online] |
[231] | European Commission (2005) The contribution of health to the economy in the European Union. [online] |
[232] | Lancet Commission on planetary health (2015) Safeguarding human health in the Anthropocene epoch. The Lancet. [online] |
1. | Zhiguo Qu, Yiming Huang, Min Zheng, A novel coherence-based quantum steganalysis protocol, 2020, 19, 1570-0755, 10.1007/s11128-020-02868-2 |