Abstract
We introduce a scheme for steganographic communication based on a channel hidden within the quantum key distribution protocol of Bennett and Brassard. An outside observer cannot establish evidence that this communication is taking place for the simple reason that no correlations between public data and hidden information exist. Assuming an attacker guesses hidden communication is underway, we obtain a precise quantitative bound on the amount of hidden information they can acquire, and find that it is very small, less than 10− 7 bits per channel use in typical experimental settings. We also calculate the capacity of the steganographic channel, including an analysis based on data available from experimental realizations of quantum protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Computer Society Press, Los Alamitos (1984)
Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.: Limitations on practical quantum cryptography. Physical Review Letters 86(6) (2000)
Calsamiglia, J., Barnett, S., Lütkenhaus, N., Suominen, K.: Removal of a single photon by adaptive absorption. Physical Review A 64 (2000)
Gea-Banacloche, J.: Hiding messages in quantum data. Journal of Mathematical Physics 43(9), 4531–4536 (2002)
Hughes, R.J., et al.: Practical free-space quantum cryptography. In: Williams, C.P. (ed.) QCQC 1998. LNCS, vol. 1509, pp. 200–213. Springer, Heidelberg (1999)
Kok, P., Lee, H., Dowling, J.: Single-photon quantum-nondemolition detectors constructed with linear optics and projective measurements. Physical Review A 66, 063814 (2002)
Majani, E.E., Rumsey, H.: Two results on binary-input discrete memoryless channels. In: Proceedings of the IEEE International Symposium on Information Theory, pp. 104–104. IEEE Computer Society Press, Los Alamitos (1991)
Nielsen, M., Chuang, I.: Quantum computation and quantum information. Cambridge University Press, Cambridge (2000)
Nordholt, J.E., Hughes, R.J.: A new face for cryptography. Los Alamos Science 27, 68–86 (2002)
Martin, K., Moskowitz, I.S.: Noisy timing channels with binary inputs and outputs. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol. 2137, Springer, Heidelberg (2001)
Shannon, C.E.: A mathematical theory of communication. Bell Systems Technical Journal 27, 379–423, 623–656 (1948)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Martin, K. (2007). Steganographic Communication with Quantum Information. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds) Information Hiding. IH 2007. Lecture Notes in Computer Science, vol 4567. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77370-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-77370-2_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77369-6
Online ISBN: 978-3-540-77370-2
eBook Packages: Computer ScienceComputer Science (R0)