Research Article Open Access

Carving Secret Messages out of Public Information

Naya Nagy1, Marius Nagy1 and Selim G. Akl1
  • 1 Queen’s University, Canada

Abstract

This study shows that secret information can be shared or passed from a sender to a receiver even if not encoded in a secret message. In the protocol designed in this study, no parts of the original secret information ever travel via communication channels between the source and the destination, no encoding/decoding key is ever used. The two communicating partners, Alice and Bob, are endowed with coherent qubits that can be read and set and keep their quantum values over time. Additionally, there exists a central authority that is capable of identifying Alice and Bob to share with each half of entangled qubit pairs. The central authority also performs entanglement swapping. Our protocol relies on the assumption that public information can be protected, an assumption present in all cryptographic protocols. Also any classical communication channel need not be authenticated. As each piece of secret information has a distinct public encoding, the protocol is equivalent to a one-time pad protocol.

Journal of Computer Science
Volume 11 No. 1, 2015, 64-70

DOI: https://doi.org/10.3844/jcssp.2015.64.70

Submitted On: 20 October 2014 Published On: 25 February 2015

How to Cite: Nagy, N., Nagy, M. & Akl, S. G. (2015). Carving Secret Messages out of Public Information. Journal of Computer Science, 11(1), 64-70. https://doi.org/10.3844/jcssp.2015.64.70

  • 3,301 Views
  • 1,735 Downloads
  • 4 Citations

Download

Keywords

  • Quantum Key Distribution
  • Quantum Cryptography
  • Intruder Detection
  • Security