Quantum steganography with large payload based on entanglement swapping of χ-type entangled states

Abstract In this paper, we firstly propose a new simple method to calculate entanglement swapping of χ-type entangled states, and then present a novel quantum steganography protocol with large payload. The new protocol adopts entanglement swapping to build up the hidden channel within quantum secure direct communication with χ-type entangled states for securely transmitting secret messages. Comparing with the previous quantum steganographies, the capacity of the hidden channel is much higher, which is increased to eight bits. Meanwhile, due to the quantum uncertainty theorem and the no-cloning theorem its imperceptibility is proved to be great in the analysis, and its security is also analyzed in detail, which is proved that intercept-resend attack, measurement-resend attack, ancilla attack, man-in-the-middle attack or even Dos(Denial of Service) attack couldn't threaten it. As a result, the protocol can be applied in various fields of quantum communication.

[1]  S. Stepney,et al.  Searching for highly entangled multi-qubit states , 2005 .

[2]  Qiaoyan Wen,et al.  Quantum secure direct communication with χ -type entangled states , 2008 .

[3]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[4]  R F Werner,et al.  Hiding classical data in multipartite quantum states. , 2002, Physical review letters.

[5]  Y. Yeo,et al.  Teleportation and dense coding with genuine multipartite entanglement. , 2005, Physical review letters.

[6]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[7]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[8]  Patrick Hayden,et al.  Multiparty data hiding of quantum information , 2005 .

[9]  A. Winter,et al.  Distinguishability of Quantum States Under Restricted Families of Measurements with an Application to Quantum Data Hiding , 2008, 0810.2327.

[10]  Debbie W. Leung,et al.  Quantum data hiding , 2002, IEEE Trans. Inf. Theory.

[11]  Guang-Can Guo,et al.  Quantum data hiding with spontaneous parameter down-conversion , 2003 .

[12]  D. Leung,et al.  Hiding bits in bell states. , 2000, Physical Review Letters.

[13]  Adan Cabello Quantum key distribution without alternative measurements , 2000 .

[14]  D. Gottesman Theory of quantum secret sharing , 1999, quant-ph/9910067.

[15]  Mann,et al.  Measurement of the Bell operator and quantum teleportation. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[16]  V. Karimipour,et al.  Entanglement swapping of generalized cat states and secret sharing , 2001, quant-ph/0112050.

[17]  Debasis Sarkar,et al.  Local indistinguishability and possibility of hiding cbits in activable bound entangled states , 2007, 0711.0475.

[18]  G. Mogos,et al.  Stego Quantum Algorithm , 2008, International Symposium on Computer Science and its Applications.

[19]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[20]  Xinxin Niu,et al.  Novel quantum steganography with large payload , 2010 .