Multi-party covert communication with steganography and quantum secret sharing

In this paper, we address the ''multi-party covert communication'', a stronger notion of security than standard secure multi-party communication. Multi-party covert communication guarantees that the process of it cannot be observed. We propose a scheme for steganographic communication based on a channel hidden within quantum secret sharing (QSS). According to our knowledge nobody has ever raised the scheme, providing us the motivation for this work. To an outside observer, participants will engage in a typical instance of QSS, just like the others. But when the session is over, covert multi-party communication has already been done. Further analysis shows that the amount of hidden information one can acquire is 0, even if either an outside observer guesses the covert communication is carrying on or a dishonest participant is eavesdropping.

[1]  Guang-Can Guo,et al.  Quantum secret sharing without entanglement , 2002 .

[2]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[3]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[4]  Dong Liu,et al.  Field experiment on a robust hierarchical metropolitan quantum cryptography network , 2009 .

[5]  J. Bricmont,et al.  Lower critical dimension for the random-field Ising model. , 1987, Physical review letters.

[6]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[7]  Tomás Pevný,et al.  Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.

[8]  Andrew D. Ker Derivation of Error Distribution in Least Squares Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[10]  Keye Martin,et al.  Steganographic Communication with Quantum Information , 2007, Information Hiding.

[11]  Keye Martin Secure Communication without Encryption? , 2007, IEEE Security & Privacy.

[12]  Hao Liang,et al.  Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution , 2010 .

[13]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[14]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[15]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[16]  G. S. Vernam Cipher printing telegraph systems: For secret wire and radio telegraphic communications , 2022, Journal of the A.I.E.E..

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[18]  Andrew D. Ker A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.

[19]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[20]  Qiao-Yan Wen,et al.  Threshold quantum secret sharing between multi-party and multi-party , 2008 .

[21]  He-Shan Song,et al.  Preparation of multi-atom specially entangled W-class state and splitting quantum information , 2009 .