Quantum data hiding

被引:308
|
作者
DiVincenzo, DP [1 ]
Leung, DW [1 ]
Terhal, BM [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
quantum entanglement; quantum information theory; secret sharing;
D O I
10.1109/18.985948
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We expand on our work on Quantum Data Hiding [1]-hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme. We provide an explicit bound showing that multiple bits can be hidden bitwise with our scheme. We give a preparation of the hiding states as an efficient quantum computation that uses at most one ebit of entanglement. A candidate data-hiding scheme that does not use entanglement is presented. We show how our scheme for quantum data hiding can be used in a conditionally secure quantum bit commitment scheme.
引用
收藏
页码:580 / 598
页数:19
相关论文
共 50 条
  • [31] Reversible data hiding
    Celik, MU
    Sharma, G
    Tekalp, AM
    Saber, E
    2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2002, : 157 - 160
  • [32] Hiding biometric data
    Jain, AK
    Uludag, U
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2003, 25 (11) : 1494 - 1498
  • [33] Hiding data in DNA
    Shimanovsky, B
    Feng, J
    Potkonjak, M
    INFORMATION HIDING, 2003, 2578 : 373 - 386
  • [34] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [35] Data Hiding in Documents
    Lim, Se-Hyeon
    Shin, Sang-Ho
    Kumar, Rajeev
    Jung, Ki-Hyun
    2019 34TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2019), 2019, : 310 - 313
  • [36] Hiding data in halftone image using modified data hiding error diffusion
    Fu, MS
    Au, OC
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2000, PTS 1-3, 2000, 4067 : 1671 - 1680
  • [37] Data security using data hiding
    Moon, S. K.
    Kawitkar, R. S.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 247 - +
  • [38] A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding
    Wu, Xiaotian
    Yang, Ching-Nung
    Cai, Hong-Wu
    Liu, Yanxiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [39] Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
    Esen, Ersin
    Alatan, A. Aydin
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (08) : 1130 - 1138
  • [40] Hiding Data in Halftone Image Using Modified Data Hiding Error Diffusion.
    Mary, A. Stephy Anisha
    Doni, A. Ronald
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (03): : 777 - 784