Multi-party Quantum Covert Communication with Entanglement Private-Keys

Σχετικά έγγραφα
Fused Bis-Benzothiadiazoles as Electron Acceptors

No. 7 Modular Machine Tool & Automatic Manufacturing Technique. Jul TH166 TG659 A

Quick algorithm f or computing core attribute

Study on the Strengthen Method of Masonry Structure by Steel Truss for Collapse Prevention

GPGPU. Grover. On Large Scale Simulation of Grover s Algorithm by Using GPGPU

Π Ο Λ Ι Τ Ι Κ Α Κ Α Ι Σ Τ Ρ Α Τ Ι Ω Τ Ι Κ Α Γ Ε Γ Ο Ν Ο Τ Α

ER-Tree (Extended R*-Tree)

Computational study of the structure, UV-vis absorption spectra and conductivity of biphenylene-based polymers and their boron nitride analogues

D-Glucosamine-derived copper catalyst for Ullmann-type C- N coupling reaction: theoretical and experimental study

Dong Liu State Key Laboratory of Particle Detection and Electronics University of Science and Technology of China

Block Ciphers Modes. Ramki Thurimella

Nov Journal of Zhengzhou University Engineering Science Vol. 36 No FCM. A doi /j. issn

Analysis of energy consumption of telecommunications network and application of energy-saving techniques

3: A convolution-pooling layer in PS-CNN 1: Partially Shared Deep Neural Network 2.2 Partially Shared Convolutional Neural Network 2: A hidden layer o

2 ~ 8 Hz Hz. Blondet 1 Trombetti 2-4 Symans 5. = - M p. M p. s 2 x p. s 2 x t x t. + C p. sx p. + K p. x p. C p. s 2. x tp x t.

PACS: Pj, Gg

Re-Pair n. Re-Pair. Re-Pair. Re-Pair. Re-Pair. (Re-Merge) Re-Merge. Sekine [4, 5, 8] (highly repetitive text) [2] Re-Pair. Blocked-Repair-VF [7]

: Monte Carlo EM 313, Louis (1982) EM, EM Newton-Raphson, /. EM, 2 Monte Carlo EM Newton-Raphson, Monte Carlo EM, Monte Carlo EM, /. 3, Monte Carlo EM

Maxima SCORM. Algebraic Manipulations and Visualizing Graphs in SCORM contents by Maxima and Mashup Approach. Jia Yunpeng, 1 Takayuki Nagai, 2, 1

CorV CVAC. CorV TU317. 1

An Automatic Modulation Classifier using a Frequency Discriminator for Intelligent Software Defined Radio

Vol. 38 No Journal of Jiangxi Normal University Natural Science Nov. 2014

Estimation for ARMA Processes with Stable Noise. Matt Calder & Richard A. Davis Colorado State University

Figure A.2: MPC and MPCP Age Profiles (estimating ρ, ρ = 2, φ = 0.03)..

Elements of Information Theory

EM Baum-Welch. Step by Step the Baum-Welch Algorithm and its Application 2. HMM Baum-Welch. Baum-Welch. Baum-Welch Baum-Welch.

Discovery of multi-target receptor tyrosine kinase inhibitors as novel anti-angiogenesis agents

Comparison of carbon-sulfur and carbon-amine bond in therapeutic drug: -S-aromatic heterocyclic podophyllum derivatives display antitumor activity

Research on Economics and Management

College of Life Science, Dalian Nationalities University, Dalian , PR China.

Electronic Supplementary Information (ESI)

Supporting Information

Supporting Information. A Combined Crossed Molecular Beams and ab Initio Investigation on the Formation of Vinylsulfidoboron (C 2 H

, Litrrow. Maxwell. Helmholtz Fredholm, . 40 Maystre [4 ], Goray [5 ], Kleemann [6 ] PACC: 4210, 4110H

Bundle Adjustment for 3-D Reconstruction: Implementation and Evaluation

Research of Han Character Internal Codes Recognition Algorithm in the Multi2lingual Environment

Abstract Storage Devices

Supporting Information. Generation Response. Physics & Chemistry of CAS, 40-1 South Beijing Road, Urumqi , China. China , USA

Anomaly Detection with Neighborhood Preservation Principle

Prey-Taxis Holling-Tanner

Lecture 2: Dirac notation and a review of linear algebra Read Sakurai chapter 1, Baym chatper 3

Engineering Tunable Single and Dual Optical. Emission from Ru(II)-Polypyridyl Complexes. Through Excited State Design

1 (forward modeling) 2 (data-driven modeling) e- Quest EnergyPlus DeST 1.1. {X t } ARMA. S.Sp. Pappas [4]

Homomorphism in Intuitionistic Fuzzy Automata

Bayesian statistics. DS GA 1002 Probability and Statistics for Data Science.

Resilient static output feedback robust H control for controlled positive systems

Congruence Classes of Invertible Matrices of Order 3 over F 2

Zigbee. Zigbee. Zigbee Zigbee ZigBee. ZigBee. ZigBee

Butadiene as a Ligand in Open Sandwich Compounds

Access Control Encryption Enforcing Information Flow with Cryptography

Supporting Information

VBA Microsoft Excel. J. Comput. Chem. Jpn., Vol. 5, No. 1, pp (2006)

Retrieval of Seismic Data Recorded on Open-reel-type Magnetic Tapes (MT) by Using Existing Devices

LP N to BD* C-C = BD C-C to BD* O-H = LP* C to LP* B =5.

Free Radical Initiated Coupling Reaction of Alcohols and. Alkynes: not C-O but C-C Bond Formation. Context. General information 2. Typical procedure 2

Ασφάλεια Πληροφοριακών και Επικοινωνιακών Συστημάτων

Motion analysis and simulation of a stratospheric airship

Α Ρ Ι Θ Μ Ο Σ : 6.913

Buried Markov Model Pairwise

J. of Math. (PRC) Banach, , X = N(T ) R(T + ), Y = R(T ) N(T + ). Vol. 37 ( 2017 ) No. 5

Κβαντικη Θεωρια και Υπολογιστες

Connected Threat Defense

Wavelet based matrix compression for boundary integral equations on complex geometries

46 2. Coula Coula Coula [7], Coula. Coula C(u, v) = φ [ ] {φ(u) + φ(v)}, u, v [, ]. (2.) φ( ) (generator), : [, ], ; φ() = ;, φ ( ). φ [ ] ( ) φ( ) []

VSC STEADY2STATE MOD EL AND ITS NONL INEAR CONTROL OF VSC2HVDC SYSTEM VSC (1. , ; 2. , )

Math 6 SL Probability Distributions Practice Test Mark Scheme

c Key words: cultivation of blood, two-sets blood culture, detection rate of germ Vol. 18 No

ES440/ES911: CFD. Chapter 5. Solution of Linear Equation Systems

Analysis on construction application of lager diameter pile foundation engineering in Guangdong coastal areas

Correction of chromatic aberration for human eyes with diffractive-refractive hybrid elements

Study of In-vehicle Sound Field Creation by Simultaneous Equation Method

Research on model of early2warning of enterprise crisis based on entropy

Technical Research Report, Earthquake Research Institute, the University of Tokyo, No. +-, pp. 0 +3,,**1. No ,**1

The challenges of non-stable predicates

Quantum dot sensitized solar cells with efficiency over 12% based on tetraethyl orthosilicate additive in polysulfide electrolyte

TAMIL NADU PUBLIC SERVICE COMMISSION REVISED SCHEMES

Approximation of distance between locations on earth given by latitude and longitude

Stress Relaxation Test and Constitutive Equation of Saturated Soft Soil

Vol. 31,No JOURNAL OF CHINA UNIVERSITY OF SCIENCE AND TECHNOLOGY Feb

6.1. Dirac Equation. Hamiltonian. Dirac Eq.


Phys460.nb Solution for the t-dependent Schrodinger s equation How did we find the solution? (not required)

JOURNAL OF APPLIED SCIENCES Electronics and Information Engineering. Cyclic MUSIC DOA TN (2012)

Cite as: Pol Antras, course materials for International Economics I, Spring MIT OpenCourseWare ( Massachusetts

Ordinal Arithmetic: Addition, Multiplication, Exponentiation and Limit

A strategy for the identification of combinatorial bioactive compounds. contributing to the holistic effect of herbal medicines

Μελέτη Πρωτοκόλλων Κρυπτογραφίας

MIDI [8] MIDI. [9] Hsu [1], [2] [10] Salamon [11] [5] Song [6] Sony, Minato, Tokyo , Japan a) b)

CMOS Technology for Computer Architects

Supplementary Information for

2. Α ν ά λ υ σ η Π ε ρ ι ο χ ή ς. 3. Α π α ι τ ή σ ε ι ς Ε ρ γ ο δ ό τ η. 4. Τ υ π ο λ ο γ ί α κ τ ι ρ ί ω ν. 5. Π ρ ό τ α σ η. 6.

FENXI HUAXUE Chinese Journal of Analytical Chemistry. Savitzky-Golay. n = SG SG. Savitzky-Golay mmol /L 5700.

HIV HIV HIV HIV AIDS 3 :.1 /-,**1 +332

Vol. 30 No Journal of Jilin University Information Science Edition Sept. 2012

Computing the Gradient

6.003: Signals and Systems. Modulation

Διπλωματική Εργασία του φοιτητή του Τμήματος Ηλεκτρολόγων Μηχανικών και Τεχνολογίας Υπολογιστών της Πολυτεχνικής Σχολής του Πανεπιστημίου Πατρών

Εφαρμογή Υπολογιστικών Τεχνικών στην Γεωργία

Study of urban housing development projects: The general planning of Alexandria City

ΤΕΧΝΟΛΟΓΙΚΟ ΕΚΠΑΙΔΕΥΤΙΚΟ ΙΔΡΥΜΑ ΚΡΗΤΗΣ. Σχολή Τεχνολογικών Εφαρμογών Τμήμα Εφαρμοσμένης Πληροφορικής & Πολυμέσων

Transcript:

30 0 JOURNL OF PPLIED SIENES Electronics and Information Engineering Vol. 30 No. Jan. 0 DOI: 0.3969/j.issn.055-897.0.0.009. 0094. 0003.... TN98.7 055-897(0)0-005-07 Multi-party Quantum overt ommunication with Entanglement Private-Keys O Dong SONG Yao-liang. School of Electronic Engineering and Optoelectronic Technology Nanjing University of Science and Technology Nanjing 0094 hina. ollege of communication and Information Engineering Nanjing University of Posts and Telecommunication Nanjing 0003 hina bstract: novel scheme of quantum multi-party covert communication is proposed. Using a pseudo-random sequence the random subset is selected from a set of Greenberger-Horne-Zeilinger (GHZ) shared private-key for encryption. Quantum information is rotated and hidden by disguising it as noise in a quantum error-correcting code. subset of detection is constructed and based on the complement of shared private-keys. ased on the detection scheme of typical error the private-key can be recycled. ompared to other protocols which require more private keys the proposed scheme can significantly reduce key consumption. The ability of eavesdrop detection is optimized. The optimized scheme is robust to the Trojan horse attacking. Keywords: information security covert communication quantum cryptography entanglement private-key [. [-3.... [ 0-08-0 0-0- (No.4074090 No.60745) (No.008088004) E-mail: caodongcn@gmail.com E-mail: ylsong@mail.njust.edu.cn

53. [4 3.. [3. [5 84. [5-6 84 [5. lice ob ob. 4 bits bits... EPR. H H ϕ = χ γ () χ H γ H. ρ = χ χ ρ = χ χ () Schmidt. ρ = k p k ρ (k) ρ (k) p k = (3). ϕ ρ = Tr ( ϕ ϕ ) = Î ρ = Tr ( ϕ ϕ ) = Î (4) EPR 4 Ψ ± ( 0 ± 0) Φ ± ( 0 0 ± ) k (5) EPR [7. EPR Φ ( 0 0 ) (6) lice ob EPR Φ Φ. η plain = α 0 β (7) ϕ cipher ( =U m ( k η plain ) = U m Φ ηplain ) = [ 0 η plain X η η plain [ 0 (α 0 β ) (β 0 α ) (8) X η.

54 30 η plain = U m ( k ϕ cipher ) ( = U m Φ ϕcipher ) = [ 0 (α 0 β ) X ϕ (β 0 α ) [ 0 (α 0 β ) (α 0 β ) (9) i η i plain ϕ i cipher [ Z k η 0 (i) (i) 0(i) η i plain ) (i) X η Zη l. 0(i) (i) η i plain ( k (i) k(i) k(i) k=0 ( l (i) l(i) l(i) l=0 ) () X ϕ.. EPR Figure Encryption and decryption process of EPR-key-based quantum symmetric cipher GHZ GHZ. GHZ control- NOT (NOT) controlled-z. GHZ [8 Ψ = ( 000 ). n n K n i Ψ (ij) = ( 0 (ij) 0(ij) 0(ij) (ij) (ij) (ij) ) (0) j= i lice ob hris. n GHZ Figure Encryption and decryption process of GHZ-key-based quantum symmetric cipher 3 GHZ [9. [0-. 3. [3. ε HSW Holevo-Schumacher-Westmoreland χ(ε) [ ( = max {p jρ j} S ε ( j p j ρ j )) j p j S(ε(ρ j )) () ε. ρ j {p j ρ j } χ (ε).

55.. N NS(ρ) S (ρ) = tr (ρlbρ) ρ von Neumann. NS(ρ). ξ ξ ξ NS(ρ) s i i = NS(ρ). 3. lice ψ H ψ J k c ψ H ψ J. lice ob hris ψ s ψ s NS (ρ) ψ s = NS(ρ) γ= α γ γ ψ s = NS(ρ) κ= β κ κ (3) lice NS (ρ) Ψ GHZ K 0 NS (ρ). K 0 = ( ) k k k (NS(ρ)) =( Ψ Ψ Ψ Ψ Ψ i Ψ i Ψ (NS(ρ)) Ψ (NS(ρ)) ) (4) K 0 3 K 0 K 0 K 0 K 0 GHZ K 0 ; K 0 K 0 GHZ K 0 3. lice K 0 K 0 K 0 ob hris. NS (ρ) (m ) P P 0. ob hris GHZ. ob hris P P GHZ K 0 K 0 P h K 0 h : k h = H Ψ h ( 0 h h 0 h h h h ) (5) P K 0 ob GHZ K P j K 0 j k j = H Ψ j ( 0 j 0j j j j j ) (6) P K 0 hris GHZ K. h j. (6) H H Hadamard ± = ( 0 ± ) /. 3 lice NS (ρ) GHZ ψ s. NS (ρ) ψ s γ γ h [ (h)z = U γ U (h)x γ k h γ k h = ( 0 h 0 h 0 h 0 h h [ ( 0 h 0 h 0 h 0 h h ( h h h h h 0 h ) 0 h ) γ h ( h h h h h [( 0 h 0 h 0 h 0 h h ( h h h h h ) Zγ γ h ) 0 h ) Xγ γ ) Xγ Z γ γ h i = (NS (ρ)). U (h)x γ U (h)z γ (7) lice h γ NOT controlled-z γ. ψ s κ κ j = U (j)z κ [U (j)x κ k j κ k j ( 0 j 0j 0j 0j 0j j ) [( 0 j 0j 0j 0j 0j j ) κ ( j j j j j j ) Z κ κ ( j j j j j j ) [( 0 j 0j 0j 0j 0j j ) X κ κ ( j j j j j j ) X κz κ κ (8)

56 30 U (j)x κ U (j)z κ lice j κ NOT controlled-z κ. lice 0 (N kc NS(ρ)) γ κ N k c γ 0 (N kc NS(ρ)) κ 0 (N kc NS(ρ)). 4 P P lice P I h ( NS(ρ) ) s h ξ h lice U h γ 0 (N kc NS(ρ)) U h ( γ 0 (N kc NS(ρ))) = s h ψ H U EH. ode = ns p h ξ h Ψ H Ψ H ξ h. lice h=0 I j ( NS(ρ) ) s j ξ j U j κ 0 (N kc NS(ρ)) U j ( κ 0 (N kc NS(ρ)) ) = s j ψ J U EJ. ode = ns p j ξ j Ψ J Ψ J ξ j. j=0 5 lice ode ode ob hris.. 6 ob hris ode ode U EH U EJ U h U j GHZ. N k c NS (ρ) GHZ. Eve ob hris lice. 3.3 GHZ. GHZ.. 4. ob hris P P K 0 K 0 Hadamard / /.. lice ob GHZ lice hris. lice ob P 0 K 0 K 0 D D. Z X ZX 3 (I ). D NOT D controlled-z D NOT controlled-z Φ Φ [4. lice ob LO ± = ( 0 ± ) / Φ ( 00 ) [ ( 00 ) = [ ( 0 ) ( 0 ) ( 0 ) ( 0 ) ( ) (9) Φ = ( 00 ) = [ ( 00 ) = [ ( 0 ) ( 0 ) ( 0 ) ( 0 ) ( ) (0) GHZ lice ob 3 ( hris ) lice ob.

57 Φ ( ) Φ ( ) Φ source Φ ± target ( Φ Φ ) XOR(XOR) [5 Φ source Φ source Φ target Φ target Φ source Φ target Φsource Φtarget Φ Φ 0 0 S. S t t. lice ob / t t. 4 lice ob lice hris.. lice ob lice ob. diamond [06 N = N N = N N p N ( N i=0 i ) p i ( p) N i N N p Eve p i Eve( p Eve ) N i () p p Eve N N N. [ P Eve N N ε e Nε ().... [7 EPR GHZ lice ob lice hris. lice ob lice hris. ob Hadamard. ( Eve) lice ob T ( lice lice hris ) lice ob h γ (T ) = ( 0 h 0 h (L) 0 h 0 h h [( 0 h 0 h (L) 0 h 0 h h ( h h (R) h h h (U) h ) Zγ γ ( h h (R) h [( 0 h 0 h 0 h h ( h h h h h (U) 0 h ) (U) 0 h ) γ h (U) h ) (L) 0 h (U) 0 h ) Xγ γ (R) h (U) h ) Xγ Z γ γ (3) (L) (R) (U) (L) (R) (U) lice. ob Hadamard NS (ρ) m 0. /.

58 30 5.... : [ Julio G. Hiding messages in quantum data [J. Journal of Mathematical Physics 00 43(9): 453-4536. [ Qu Zhiguo hen Xiubo Luo Mingxing Niu Xinxin Yang Yixian. Quantum steganography with large payload based on entanglement swapping of X-type entangled states [J. Optics ommunications 0 84: 075-08. [3 Natori S. Why quantum steganography can be stronger than classical steganography [J. Quantum omputation and Information 006(0): 35-40. [4 urty M Santos D J. Protocols for quantum steganography [// The nd ielefeld Workshop on Quantum Information and omplexity. ielefeld Germany 004. [5 Martin K. Steganographic communication with quantum information [//Information Hiding Lecture Notes in omputer Science 007 4567: 3-49. [6 Liao Xin Wen Qiaoyan Sun Ying Zhang Jie. Multi-party covert communication with steganography and quantum secret sharing [J. The Journal of Systems and Software 00 83: 80-804. [7 Zeng Guihua. Quantum private communication [M. [S.l.: Springer Press 00. [8 Hwang T Hang Li M. Multiparty quantum secret sharing based on GHZ states [J. Physica Scripta 0 84(4): 045004. [9. ID LDP [J. 0 33(): 8-. Zhao Shengmei Zhu Xiuli Xiao Yu. novel construction of quantum LDP codes based on balanced incomplete block designs [J. Journal of Electronics & Information Technology 0 33(): 8-. (in hinese) [0 Shaw run T. Quantum steganography with noisy quantum channels [J. Physical Review 0 83: 030. [ Shaw run T. Quantum steganography [E/OL. [0-8-6. http://arxiv.org/abs/006.- 934 00. [ Shaw run T. Hiding Quantum information in the perfect code [E/OL. [0-8-6. http://arxiv.org/abs/007.0793 00 [3 Nielsen M huang I L. Quantum computation and quantum information [M. [S.l.: ambridge University Press 000. [4 Leung D W. Quantum Vernam cipher [J. Quantum Information and omputation 00 (3): 0-3. [5 ennett H Divncenzo D P Smolin J Wootters W K. Mixed state entanglement and quantum error correction [E/OL. [0-8-6. arxiv: quant-ph/960404v 996. [6 enenti G Strini G. omputing the distance between quantum channels: usefulness of the Fano representation [J. Journal of Physics : tomic Molecular and Optical Physics 00 43(): 5508. ( : )