Font Size: a A A

Design And Analysis Of Continuous-variable Quantum Steganography Protocol Based On Quantum Identity Authentication

Posted on:2021-02-13Degree:MasterType:Thesis
Country:ChinaCandidate:L M JiangFull Text:PDF
GTID:2370330647452754Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The main purpose of quantum steganography is to realize the hidden transmission of information by using the physical characteristics of quantum state and according to the characteristics of other quantum secure communication protocols.The existing quantum steganography use discrete variable quantum carrier,that is difficult to prepare and detect costly.Moreover,it limits the increase of capacity.Therefore,the quantum steganography protocol of continuous variables has important practical significance.In addition,the quantum identity authentication protocol is a very special quantum public channel,which is very suitable for the covert channel construction of quantum steganography.The main contents in this paper are as follows:(1)A three-party quantum identity authentication protocol was proposed first as the research basis.This protocol engaged continuous-variable Greenberger-Horne-Zeilinger(GHZ)state to extend quantum channels.The security of the authentication key in the quantum channel was ensured by using the decoy-state and random operation,and then the authentication key was transmitted with the continuous-variable quantum telecommuting technology.Finally,an eavesdropping parameter was defined to effectively verify the user's identity,and also the automatically updating of authentication key was realized.(2)Based on the quantum identity authentication protocol,a new quantum steganographic protocol was proposed.In this protocol,a hidden quantum channel was built by taking good advantage of the entangled properties of continuous-variable GHZ state.Then the information coding rule was introduced to extend the capacity of the secret information which would be modulated into the quantum state for transmission.In the final performance analysis,it was described that the new protocol not only was characterized by its good imperceptibility and easy implementation in physics,but also showing the reliable security and high information transmission rate under the attack of interception-retransmission and spectroscopic attack.
Keywords/Search Tags:Quantum steganography, Quantum identity authentication, Continuous-variable GHZ state, Quantum telecommuting, Performance analysis
PDF Full Text Request
Related items