Error Tolerant Quantum Steganography Applicable to Collectively Dephasing Noise Channels

A technology of phase noise and quantum steganography, which is applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as noise interference, and achieve the effect of invisibility and security assurance

Active Publication Date: 2017-02-15
浙江海宁经编产业园区开发有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0044] The purpose of the present invention is to design a kind of error-tolerant QS method applicable to the collective dephasing noise channel, and solve the noise interference problem that the practical application of the QS method faces

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Error Tolerant Quantum Steganography Applicable to Collectively Dephasing Noise Channels
  • Error Tolerant Quantum Steganography Applicable to Collectively Dephasing Noise Channels
  • Error Tolerant Quantum Steganography Applicable to Collectively Dephasing Noise Channels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0106] 1. Application examples of quantum steganography

[0107] Here, a concrete example under collectively dephased noise channel is given to further explain the concealment and decoding modes of information and secret messages. Suppose the two-bit secret message sent by Alice to Bob is 01. According to Table 2, Alice generates the information bit sequence...00 01 ...01 00 ...10 11 ...11 10 ...to help hide two-bit secret messages (information in groups of four bits, where each two bits represent a logical unitary operation). Suppose 00 01 、01 00 、10 11 and 11 10 The group numbers are 2, 4, 6 and 9 respectively. Without loss of generality, take the second group of the information sequence as an example. At S3, Alice makes m=5 to satisfy the consistency of Table 2. Thus, A' 4 B' 4 and A' 5 B' 5 will be respectively with Moreover, the two-bit secret message 01 passes through A' 5 B' 5 and A' 6 B' 6 Entanglement exchange between to teleport. It should be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an error tolerance quantum steganography sub-protocol applicable to collective dephasing noise channels. Logic Bell states are utilized to overcome collective dephasing noise. A quantum covert channel constructed in normal quantum communication and utilized for distributing secret messgaes is established by means of exchange of the two logic Bell states. The Bell state measurement rather than quadri-quantum bit united measurement is utilized for decoding. The error tolerance quantum steganography sub-protocol applicable to the collective dephasing noise channels has the advantages that the channel capacity of the protocol reaches to 4 bits for every turn of covert communication, and invisibility and safety are guaranteed.

Description

technical field [0001] The invention relates to the field of quantum security communication. The invention designs an error-tolerant quantum steganography method suitable for collective dephasing noise channels, and solves the noise interference problem faced by the practical application of the quantum steganography method. Background technique [0002] Quantum secure communication utilizes the properties of quantum mechanics to realize the unconditional security of secret message transmission, which has become one of the most important branches of quantum information processing. It can be divided into several well-known categories: quantum key distribution (Quantumkey distribution, QKD) [1-3], quantum secure direct communication (Quantum secure directcommunication, QSDC) [4-7], quantum secret sharing (Quantum secret sharing, QSS) [8-9] and so on. In recent years, a novel quantum-secure communication called quantum steganography (Quantum steganography, QS) [10-17] has been...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 叶天语
Owner 浙江海宁经编产业园区开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products