亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        A Novel Quantum Stegonagraphy Based on Brown States

        2018-08-15 10:38:24ZhiguoQuTianchengZhuJinweiWangandXiaojunWang
        Computers Materials&Continua 2018年7期

        Zhiguo Qu , Tiancheng Zhu, Jinwei Wang and Xiaojun Wang

        Abstract: In this paper, a novel quantum steganography protocol based on Brown entangled states is proposed. The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states. Comparing with the previous quantum steganography algorithms, the new protocol focuses on its anti-noise capability for the phase-flip noise, which proved its good security resisting on quantum noise. Furthermore, the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility.If the number of Brown states transmitted in carrier protocol is many enough, the imperceptibility of the secret channel can be further enhanced. In aspect of capacity, the new protocol can further expand its capacity by combining with other quantum steganography protocols. Due to that the proposed protocol does not require the participation of the classic channel when it implements the transmission of secret information, any additional information leakage will not be caused for the new algorithm with good security. The detailed theoretical analysis proves that the new protocol can own good performance on imperceptibility, capacity and security.

        Keywords: Quantum steganography, quantum secure direct communication, entanglement,anti-noise robustness.

        1 Introduction

        With the development of network technology [Qu, Keeney, Robitzsch et al. (2016)],information security [Liu, Wang, Yuan et al. (2016)] becomes more and more important,especially to information hiding. Quantum steganography as a quantum version of steganography, is one of quantum information security techniques by transmitting classical or quantum information through public quantum channels. At present, quantum key distribution (QKD), quantum key agreement (QKA) [Liu, Xu, Yang et al. (2018)],quantum secure direct communication (QSDC) and quantum secret sharing (QSS) are four regular quantum information security techniques. Comparing with other quantum quantum information security techniques, quantum secure direct communication mainly protects transmitted information by preventing from various eavesdropping attacks. By comparison, quantum steganography builds up the hidden channel for covert communication based on various open quantum secure communication channels, which can achieve high level security for secret information transmitted. Quantum steganography has three important parameters, imperceptibility, capacity and security. In detail, imperceptibility means that the hidden channel cannot be detected or is hardly detected to prevent supervisors or attackers from eavesdropping or attacking it. Capacity denotes maximum quantity of secret messages transmitted per round of covert communication. And security refers to that the protocol can prevent most of the possible quantum attacks or eavesdropping on secret information, even if the hidden channel has been exposed. Among them, imperceptibility is one of the most important performance parameters for quantum steganography.

        In general, quantum steganography can be divided into two categories. One is called as Quantum Multi-secret Sharing (QMS) [Chattopadhyay and Sarkar (2007); DiVincenzo(2002); Eggeling and Werner (2002); Gottesman (2000); Guo and Guo (2003); Hayden,Leung and Smith (2005); Hillery, Buzek and Berthiaume (1999); Terhal, Divincenzo and Leung (2001)] which can be generalized to hide the classical information bits in multipartite quantum states for sharing secret information. Participants in this type of steganography can extract embedded secret information through local operations and classic channel. And the other category is called as Quantum Data Hiding (QDH) [Martin(2007); Matthews, Wehner and Winter (2009)] which builds up the hidden channel within the public quantum channel to transmit secret information. Comparing with QMS,QDH is more close to the classical steganography and can more effectively transmit classical secret information. In recent years, quantum steganography has been extensively investigated and achieved a series of achievements. In early stage, many quantum steganography achievements are immature, such as Natori [Natori (2006); Qu, Chen,Zhong et al. (2010); Qu, Chen, Zhong et al. (2011)] by using super-dense coding and[Geabanacloche (2002)] by using quantum error-correcting codes. Although these protocols can transmit secret information securely between parties indeed, these achievements did not clearly describe how to embed secret information into the carrier. In 2007, Martin [Martin (2007)] presented a novel quantum steganography protocol. It was believed as the first quantum steganography protocol to establish one hidden channel within public quantum channel with concrete quantum embedding method. In 2009,Banacloche [Banacloche (2009)] adopted Quantum Error Correcting Code (QECC) to hide secret messages as errors in arbitrary quantum data files. The protocol was mainly based on the BB84 protocol. It analyzed imperceptibility and security in detail, and accurately calculated the capacity of its hidden channel. In 2010, Qu et al. [Qu, Chen,Zhong et al. (2010)] proposed a novel quantum steganographic protocol with large payload. The protocol using entanglement swapping of Bell states for steganography is based on the improved ping-pong protocol. In 2011, Qu et al. [Qu, Chen, Zhong et al.(2011)] using the entanglement of the-state with the similar method was proposed with larger capacity and security. In 2015, quantum steganography using prior entanglement was proposed in Mihara [Mihara (2015)]. This protocol embeds the secret information into the carrier information through CNOT operation by using entanglement between the particles. However, due to that its carrier in this protocol is unavailable for both parties and its hidden channel was not built on any public quantum channels, it was with obvious drawback of lacking of imperceptibility considerations.

        For most of the current achievements, it usually is assumed that secret information will be transmitted in the ideal noiseless channel. However, in the reality, the public quantum channel is unavoidably noisy, so that most of the current protocols become invalid. In order to resolve this terrible issue, this paper proposes a novel quantum steganography protocol based on QSDC by using Brown states. As with Mihara [Mihara (2015)], the new protocol also adopts prior entanglement to embed or extract secret information through CNOT operations, by making the hidden channel independent of the other carrier channels. As a result, the new protocol has a strong anti-noise robustness and can effectively protect the secret information from many typical quantum noises, especially to the phase-flip noise. With the anti-noise robustness, the new protocol can accurately transmit secret information in quantum noisy channel. Moreover, due to the hidden channel is randomly selected and built, the probability that the attacker detects the hidden channel can be arbitrarily reduced by increasing the transmission scale of the carrier.Therefore, the hidden channel of the new protocol can be considered as very difficult or even impossible to be detected for attackers or eavesdroppers. From the perspective of capacity, there is a great potential for expansion to the new protocol's capacity by combining it with other powerful quantum secure communication protocols. In addition,since the hidden channel of the new protocol will be built up within public quantum carrier protocols with great security, the new protocol's security can be better guaranteed as natural inheritance.

        The rest of this paper is organized as follows. In Section 2, we will introduce the operations and preparations of the new protocol as the preliminary knowledge. In Section 3, the specific steps of the new proposed protocol are presented in detail. The anti-noise robustness, imperceptibility, capacity and security of the new protocol will be analyzed in Section 4. The conclusions are given in Section 5.

        2 Preliminaries

        In this section, the related notations, quantum states and the main operations' definitions are given. And the fundamental methods of embedding and extracting secret information by CNOT operations are also presented in detail as follows.

        Firstly, the carrier information |c0>used in the protocol is the Brown state. And its specific form is shown in the Eq. (1), where the subscripts represent the different qubits.

        The Brown state |ψ5>can also be written in the following form.

        Here, |Gijk>is one of the three particle GHZ states, and its specific form is given as follow.

        Here, i, j, k={0,1} and ⊕means the modulo-2 addition operation. If the Pauli operations are performed on the qubits 1, 2 and 5 of the Brown state, as shown in the Eq. (2), the state will turn to be

        All of these states as shown in the Eq. (4) can construct a mutually orthogonal basiswhich satisfies the condition

        If one makes a measurement on the qubits 3 and 4 under the basisthe state will collapse and the other particles will end up in a corresponding three-qubit entangled state. The state |5ψ>can be rewritten as

        Let | c0>=| φ0>+ |φ1>, and |φb>means its last bit is b. For example, if |c0>=|ψ5>,then|11>)12534. It is worth to be noted here that if the particle 5 and the particle 4 are bitflipped and the particle 5 are phase-flipped at the same time, |φ0>and |φ1>can be converted to each other.

        Then, let describe how to prepare the initial state in detail. Firstly, it is assumed that Alice is the sender of secret information, while Bob is the receiver. And they share an entanglement state beforehand, that is given as follow.

        Here, the subscript indicates the holder of the particle. If Alice wants to send a bit of secret information |b>to Bob, Alice will prepare astate as the carrier information |c0>firstly, and then Alice obtains the following state. Here, in order to facilitate understanding, we number all the particles, while Alice holds the particles 0-5 and particle 7, and Alice holds the particle 6.

        Next, Alice applies the CNOT operation, while the particle 4 is the control qubit and the particle 7 is the target qubit. Then, the state will turn to be

        Here, let put Alice’s entangled qubit (the particle 7) as the first position to simplify the representation. After Alice applies the CNOT operation, the particle 7 becomes the control qubit and the particle 0 is the target qubit. Then, the state will turn to be

        Finally, Alice applies the CNOT operation, while the particle 0 is the control qubit and the particles 4, 5 and 7 are the target qubits. And then, she also applies the QCPG operation, while the particle 0 is the control qubit and the particles 5 is the target qubit,and the state becomes

        After removing the particles 0 and 7, the rest exactly is the initial state that will be used in this protocol, shown as the Eq. (13).

        Following the steps given above, Alice also can implement the embedding process of secret information. If Bob wants to extract secret information, he only needs to apply the CNOT operation again, while the particle 4 is the control qubit and the particle 6 is the target qubit. Then, the state will turn to be

        As shown in the Eq. (14), Bob can receive the secret information particle |b>and then extract secret information that Alice wants to send to him, by using projection measurement ofbasis on the particle.

        3 The proposed quantum steganography protocol

        The carrier protocol [Lin, Gao and Liu (2011)] used in the new protocol is a protocol of quantum secure direct communication [Cai (2003); Wó jcik (2003); Bennett and Wiesner(1992); Wang, Deng, Li et al. (2005)]. This protocol is required to transmit two quantum sequences for communicating secret information. So that, the hidden channel can be built up within the carrier protocol. In this case, the hidden channel’s security can be perfectly guaranteed by virtue of the carrier protocol’s great security.

        Now, let describe the proposed quantum steganography protocol in detail.

        Step (1) To guarantee the security of the secret message, Alice (the sender) and Bob (the receiver) firstly agree on a one-way hash function h :{0,1}k→{0,1}l. According to her secret information m, Alice constructs a sent message s, which consists of the secret information and an authentication message h( m), i.e. s = m +h( m).

        Step (2) Next, Alice prepares the initial state shown in the Eq. (12) by following the process in Section 2.

        Step (3) Then, Alice prepares n (n is large enough) |ψ5>. After that, Alice mixes the first five qubits of the initial state into all the quantum states that will be used in the carrier protocol and records the position m of these five qubits, which is denoted as|ψ5>m. As a follow, Alice divides all the states into five particle sequences. Every particle sequence is denoted asHere, Pirepresents the i-th particle of the Brown state, and the superscript represents the position of the corresponding Brown state in the particle sequence. At last, Alice sends the particle sequence C3and C4to Bob.

        Step (4) After Bob receives C3and C4, Alice randomly determines to enter the control mode or secret information transmission mode. If Alice determines to enter the control mode, she will select a part of particles from C1, C2andC5for reliable eavesdropping detection.

        Step (5) Control mode: Alice firstly selects a part of particles from C1, C2andC5, then she measures the particle 1, 2 and 5 under the basis AM1or AM2, and publishes her measurement basis and corresponding measurement results through the classical channel.After getting Alice’s results, Bob measures his corresponding particles 3 and 4 from C3and C4under the basis BM1or BM2and compares his results with that of Alice to detect eavesdropping. If Alice finds out that the eavesdropping exists, she will abort the communication. Otherwise, their communication will enter the secret information transmission mode or the normal information transmission mode.

        Figure 1: The secret information transmission process

        Step (6) Secret information transmission mode: Bob finds out the qubit(Alice sents m to Bob by implementing QKD or one-time pad through classical channel in advance),and then he applies the CNOT operation on the state, whileis the control qubit andis the target qubit, as shown in the Fig. 1. After that, the state is shown as the Eq.(13), wherebecomes |b>by removing the entanglement with the carrier state |c0>.Here, |b>is the carrier particle of secret information received by Alice. It is worth noting that, all these operations do not change the carrier state |c0>, and the carrier state|c0>has no difference with other Brown states after the secret message transmission.As a result, we still can use |c0>to transmit normal information.

        Step (7) Normal information transmission mode: According to the bit sequence s, Alice performs the corresponding unitary operations on C1, C2and C5. Supposing that the sent message s isAlice performs operationsandon the qubits 1, 2, and 5, respectively. The process in this mode is also shown as the Fig. 1. Then, Alice transmits these particles to Bob. After receiving these encoding particles, Bob measures the entangled pairs in the basis FMB and decodes the received message s '= m'+h( m)'. Only when h( m ')= h( m)', Bob can sure that he has received the whole secret message m=m'. Otherwise, he thinks that the secret message is tampered with during the transmission and discards the received message.

        4 The performance analysis

        4.1 Anti-noise robustness

        Unlike most of the previous quantum steganography protocols, the new protocol has a good security resisting on quantum noises. By virtue of this capability, the new protocol can still transmit secret information accurately in quantum noisy channel. The quantum channel in reality is always noisy, so the security resisting on quantum noise is very important for quantum steganography. It can effectively prevent the secret information from affected or destroyed by quantum noise. Due to its own characteristics of the new protocol, it can be immune to the phase-flip noise. In this case, even though in the quantum channels of these noises, the new protocol can still accurately transmit secret information.

        As described above, assuming that the secret information b=0, the initial state before transmission of the secret protocol is as follows.

        If there is no noise in the channel, the above state will keep intact. In this case, Bob can receive secret information by performing a simple CNOT operation. Otherwise, if there is the phase-flip noise in the channel, the state which Bob’s received will changed. If particle 3 and 4 are both affected by noise and phase flip occurs, the phase flip will be cancelled, the system will not change, and the secret information will not change, either.If the particle 3 or 4 is affected by quantum noise, the system state is given as follow.

        If the secret information is extracted in the changed state (as shown in the Eq. (16)), Bob can still receive the secret information b correctly after applying CNOT operation by adopting the same method. It can be seen that the new protocol is completely immune to phase-flip noises. In addition, both the amplitude-damping noise and the depolarized noise are superimposed with components of the bit-flip noise and the phase-flip noise. In other words, the amplitude-damping noise and the depolarized noise can be regarded as the combination of the bit-flip noise and the phase-flip noise in different proportional components, and the components of the phase-flip noise will be immune to the proposed protocol. Therefore, the new protocol also has good security resisting on the bit-flip,depolarization and amplitude-damping noises respectively.

        In summary, the new protocol can be completely immune to the phase-flip noise.Moreover, since the effect of various noises will cancel each other partially, the security of secret information can be further better than that of the theoretical analysis. From this point of view, the new protocol has good security resisting on quantum noise.

        4.2 Imperceptibility

        Quantum steganography protects the security of secret information mainly by hiding quantum channel of secret information transmission. As a result, it is easy to know that imperceptibility is the most significant performance parameter for quantum steganography.Fortunately, comparing to the classical steganography, the imperceptibility of quantum steganography has more innate advantages, due to the quantum uncertainty theorem and no-cloning theorem. If the attacker Eve tries to detect the hidden quantum channel between Alice and Bob, there are two optional approaches for him. One is to observe abnormity caused by covert communication, the other is to initiatively discover abnormity caused by covert communication by performing measurement on intercepted particles. Since embedding secret information will not change the state of the carrier information in the new protocol, so there is no chance to detect the hidden channel for Eve by adopting the first option. For the second option, Eve does have a certain probability of getting some useful information about secret information. However, because it is impossible to know the position value of m, or the right particles’ location, or even correct measurement basis in advance, Eve can only get random measurement outcomes on intercepted particles for him.From the theorem of quantum uncertainty, it is easy to know these measurement outcomes could not produce the so-called abnormity, which can be used to find out the hidden channel. In addition, according to the theorem of quantum non-cloning, if Eve carried out measurement on more transmitted particles, his actions will definitely disturb the normal quantum communication, and consequently will be detected by Alice and Bob, followed by the process to abort communication. As mentioned above, it is almost impossible for Eve to find the hidden channel by random measurement. In fact, the only available way that Eve can discover the hidden channel, is to obtain the correct position value m and perform the correct measurement on the right particles in the proper basis. So the critical step of detecting hidden channel for Eve is to obtain m.

        Then, let us further consider the possibility of obtaining m for Eve. According to the detailed steps of the new protocol, the value of m has nothing to do with the information sequence, and there is no need to satisfy any conditions, m is completely random for Alice to choose. Moreover, m can be sent to Bob by implementing QKD or one time one pad through in classical channel, which have been proved to be absolutely safety. In addition, according to Shannon's information theory, random probability distributions of the information will make m's uncertainty best, which means it is extremely difficult for Eve to obtain m. So that, the imperceptibility of our protocol can be further enhanced. In term of this conclusion, it is very reasonable to randomize the information m by presetting it as a random sequence or by adopting a pseudo-random sequence encryption method to generate it. As a result, the only way to obtain m for Eve is to randomly guess with the possibility of 1/n, since it is nearly impossible to obtain the information sent by Alice to Bob in advance.

        Moreover, unlike most of the QKD protocols and some QSDC protocols, there is no need of extra information’s transmission through a classical channel during information transmission for the new protocol. Therefore, the new protocol's imperceptibility can be better guaranteed.

        Based on the above analysis, it is proved that the new protocol has good imperceptibility.The attacker almost impossible to find the hidden channel.

        4.3 Capacity

        Capacity characterizes maximum quantity of secret information transmitted per round of covert communication. It means that the larger the capacity is, the more secret information can be transmitted. According to the new protocol, it is easy to know there is one bit secret information transmitted in per round of covert communication, which means the capacity of the new protocol is equal to one, as the same as most of the previous quantum steganography protocols. However, since the location of the hidden channel in the covert information is completely random and independent of the normal information transmission, the number of the hidden channel can be appropriately increased per round. As a result, the capacity of the new protocol can be increased correspondingly.

        Because the hidden channel is built up by applying CNOT operation and it is independent of the states used by the carrier protocol, this protocol has a strong scalability and can be combined with many other QSDC protocols. If it combined with a large-capacity steganography protocol, the capacity of the combined protocol will be larger than the large-capacity protocol. In addition, since the transmission of the secret information does not change the entanglement state of the carrier protocol, the entanglement exchange and super-dense coding can be used to extend the covert channel and transmit more secret information. The specific operation is similar to Qu et al. [Qu, Chen, Luo et al. (2011)].After the expansion, the capacity of the protocol will increase further.

        In short, the capacity of the new protocol is the same as most of the previous quantum steganography protocol, but it is available to expand its capacity without affecting the transmission of secret information by extending to more powerful quantum steganography or QSDC protocols using Brown state. It must be noted that there is always a reciprocal balance between capacity and imperceptibility. Therefore, the choice to expand an appropriate capacity requires a comprehensive consideration to imperceptibility.

        4.4 Security

        Security means that the protocol can effectively resist on most of eavesdropping attacks or various quantum noises’ effect, so that the secret information can be transmitted securely. Therefore, security is also a very important performance parameter to quantum steganography. In this section, the security resisting on quantum noises has been analyzed and proved in detail. As for the security resisting on eavesdropping attacks, due to the new protocol is based on the QSDC protocol [Lin, Gao and Liu (2011)], the hidden channel built up within it can be effectively proved by its good security, which had been analyzed in detail in Lin et al. [Lin, Gao and Liu (2011)].

        From the point of view of eavesdroppers, there is still no chance or nearly impossible to obtain secret information for them. It is because secret information is only embedded in the hidden channel, and there are only two particles as the travel particles during the covert communication. Even if eavesdroppers enable to intercept and obtains these travel particles, since only a part of particles of Brown state in their hand is not available to achieve the whole information of this Brown state, so they could not obtain secret information yet. Moreover, because the secret information mainly depends on the last two particles of the initial state, even if eavesdroppers measure the travel particles, they also could not interfere the transmission of secret information, so secret information still can be transmitted securely.

        Overall, the security of the new protocol is proved to be excellent.

        5 Conclusion

        In this paper, a novel anti-noise quantum steganography protocol based on Brown states is proposed. It embeds and extracts secret information by applying CNOT operation. The obvious advantage of the new protocol is its good security resisting on quantum noises comparing with the previous achievements. By virtue of the cover of carrier protocol, the new protocol has a good imperceptibility. In addition, the transmission scale of the carrier protocol can be arbitrarily increased, so that the imperceptibility of the new protocol can be further enhanced. As for security, due to the carrier protocol owns the high level security as the QSDC protocol, so the new protocol can effectively deal with various eavesdropping attacks, as the same as the carrier protocol. In aspect of capacity, the new protocol can further expand its capacity by combining with other powerful quantum secure communication protocols. Furthermore, the independence of the hidden channel in the new protocol makes it own good scalability and practicability, either.

        However, since a certain number of particles are needed during the preparation of the initial state, as well as some auxiliary particles during the processes of embedding and extracting secret information, so the consumption of the new protocol is a little bit higher.In order to make up for this defect, how to reduce the consumption without performance degradation for the protocol will be the next step of our research in the future.

        Acknowledgement:This work was supported by the National Natural Science Foundation of China (No. 61373131, 61303039, 61232016, 61501247), the Six Talent Peaks Project of Jiangsu Province (Grant No. 2015-XXRJ-013), Natural Science Foundation of Jiangsu Province (Grant No. BK20171458), the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (China under Grant No. 16KJB520030), Sichuan Youth Science and Technique Foundation (No. 2017JQ0048), NUIST Research Foundation for Talented Scholars (2015r014), PAPD and CICAEET funds.

        久久久国产不卡一区二区| 久久久久久欧美精品se一二三四| 丝袜美腿亚洲综合久久| 麻神在线观看免费观看| 免费看又色又爽又黄的国产软件| 久久无码av一区二区三区| 蜜臀av一区二区| 精品国产香蕉伊思人在线又爽又黄| 乱人伦视频69| 日韩免费高清视频网站| 久久久噜噜噜久久熟女| 亚洲av毛片在线网站| 久久精品国产精品青草| 亚洲av鲁丝一区二区三区| 日本最新一区二区三区免费看| 黄页免费人成网址大全| 十八禁视频在线观看免费无码无遮挡骂过| 亚洲av无码久久| 日本亚洲国产一区二区三区| 亚洲国产成人久久综合一区77| 狼人狠狠干首页综合网| 久久精品av在线观看| 国产精品免费观看调教网| 97色伦综合在线欧美视频| 丰满人妻熟妇乱又伦精品视| 人妻少妇看A偷人无码电影| 亚洲日本一区二区在线| 特黄aaaaaaaaa毛片免费视频 | 亚洲国产另类久久久精品小说 | 最新欧美一级视频| 亚洲中文字幕诱惑第一页| 高潮精品熟妇一区二区三区| 狠狠人妻久久久久久综合蜜桃 | 亚洲男人精品| 国产一区二区在三区在线观看| 性高朝久久久久久久3小时| 国产成人综合在线视频| 中国人妻沙发上喷白将av| 亚洲国产精品久久无人区| 性色做爰片在线观看ww| 毛片无遮挡高清免费久久|