# Quantum Data Hiding

Quantum data hiding refers to multiparty distributed encoding schemes of data, either classical or quantum, into quantum states, where unauthorized subsets of the party cannot reconstruct the hidden state using only LOCC operations. These differ from quantum secret sharing (QSS) in this respect, being that in QSS unauthorized subsets can reconstruct the secrect using LOCCs. Like classical data hiding schemes, quantum data hiding relies on sharing of data between participants so as to limit limit information to unauthorized subsets of participants while allowing information to be revealed to authorized subsets. Security cannot in general be parameterized one-dimensionally, as with threshold schemes, but rather by the revealing and hiding strength over authorized and unauthorized sets respectively. A quantum hiding data hiding scheme is called **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \epsilon}**
secure if for any unauthorized set and analyzing operator **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle A}**
,

**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle Tr(\rho_i A) - Tr(\rho_j A) \leq \epsilon}**

for all **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle i,j}**
and **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \delta}**
revealing or correct if for any authorized set and at least one analyzing operator ,

for all .

## Two-Party Hiding

### Hiding in Bell States

Quantum data hiding schemes can be implemented utilizing quantum entanglement. In the case of two party entanglement, the Bell states:

can be used. One hiding scheme utilizing these states harness the permutation symmetry of these states<ref name="hidingbell">

It has been requested that this page be removed with restriction endonucleases.Other articles for deletion are listed here. |

</ref>. Define a permutation operator on two qubits as

This operator has +1 eigenvalue with all the Bell states except for , with which it has eigenvalue -1. The parity of a Bell state, therefore, hides one bit between two parties with with some degree of security because the permutation symmetry cannot be directly measured without allowing state exchange. A hider only need to distribute a triplet among the parties if she wants to hide "0" and the singlet for "1". This scheme lacks perfect security however, because the parties can use LOCCs to measure the state with some certainty.

#### Security of a Generalized Scheme

Suppose the "hider" wishes to to hide a classical bit in a two party quantum state. The hider can pick at random Bell states to distribute to Alice and Bob, except that the hider ensures that the number of singlets is odd or even for hiding the classical bit respectively. Alice and Bob need only open up a quantum channel between then and measure the parity of the state to reveal the hidden bit.

Because of the locality requirement of measurements, it can be shown that the parties are restricted to a set of quantum measurements satisfying a positive partial transpose (PPT) or separability. It can be shown that their measurements using only LOCCs is bounded by:

where is the probability of measuring given and . So as the value of the bit can be hidden with certainty.

It should be noted that given a certain amount of prior entanglement, the parties can determine information about the hidden bit. However, this information is on the order of the amount of information needed to establish quantum teleportation.

#### Construction in the Labratory

This scheme is realizable in the laboratory, Bell states being constructible via optical down-conversion. Photons can then be sent through optical fibers to Alice and Bob. To reveal the secret, Alice can send her photons to Bob via a quantum channel and Bob can measure the number of singlets. These measurements can be preformed in modern labs, as complete Bell measurements are unnecessary and technically unfeasible. <ref name="hidingbell"/>

### Hiding in Werner States

It can be shown that hiding schemes are realizable without quantum entanglement. The basis of this is shown by () where it can be shown that LOCC measurements cannot distinguish between three non-entangled non-orthogonal states as well as with quantum communication. In this case, Werner states can be used, which are mixtures of Bell states:

where

where is the partial transpose operator over Bob's qubits. Bipartite Werner states are quantum states with **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle U^{(d)} \otimes U^{(d)} }**
symmetry. In this scheme, **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \rho_0^{(d)}}**
is unentangled, while **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \rho_1^{(d)}}**
is entangled. These states have permutation symmetry over two n-bit so hiding and revealing can be obtained using that symmetry. The quantum resources needed to prepare these states are on the order of one ebit which is much less than the bell state scheme (**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle d^2}**
ebits).

### Hiding Multiple Bits

It is easy to see that these schemes extend to hiding multiple bits. The preparer only need to apply the scheme to each bit to be hidden and designate each bit to different block of Bell or Werner states. However, it cannot be guaranteed that information cannot be obtained from LOCC measurements across the bit partitions unless **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle n}**
scales appropriately<ref name="hidingbell"/>.

## Multi-Party Data Hiding

Multi-party schemes are useful in allowing hiding and revealing to more complicated partitions. For example, a president of a bank may want a hiding scheme between four managers such that three of them can reveal a bank code by two of them cannot. In this case, with participants A, B, C, and D the hiding partitions are ({A},{B},{C},{D}), ({A},{B},{C,D}), and ({A,B},{C,D}) and the revealing partitions are ({A,B,C},{D}) and its permutations and ({A,B,C,D}). In general, these schemes cannot be parameterized one-dimensionally as in a scheme which ({A,B},{C,D}) is authorized and ({A,B,C},{D}) is unauthorized.

### Cat States

Bells states generalize to multipartite d-bits (d dimensional qubits) as cat states, which are maximally entangled and possess similar symmetries. However, these are difficult to produce in the laboratory since the amount of entanglement needed goes like **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle d^n}**
for n parties.

### Multipartite Werner States

From the case with a bipartite system, Werner states can be generalized over a multipartite system. Also, the Werner states are easier to produce in the laboratory since the amount of entanglement needed goes like (need to find this). These have the same type of symmetries as the bipartite case, but over all multipartite permutations,

**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle V_\pi = \displaystyle\sum_{i j k l}{\pi |i j k l\rangle \langle i j k l |}. }**

where **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \pi}**
is a permutation over a subset. For insance,

**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle V_{123} = \displaystyle\sum_{i j k l}{|j k i l\rangle \langle i j k l |}. }**

It has been requested that this page be removed with restriction endonucleases.Other articles for deletion are listed here. |

</ref>,

**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \rho_i = (r_2, r_{2 2}, r_3, r_4) }**

where the coefficients are the expectation values:

**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle r_2 = tr \left(\rho_i V_{12} \right) }**
,
**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle r_{2 2} = tr \left(\rho_i V_{(12)(34)} \right) }**
,
**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle r_3 = tr \left(\rho_i V_{123} \right) }**
,
**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle r_4 = tr \left(\rho_i V_{1234} \right) }**
.

#### Security

Because of the requirement of positive partial transpose (PPT) or separability, it can be shown that for a partition **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \mathcal{P}}**
and a analyzing operator

**Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle A = \displaystyle\sum_{\pi} a_\pi V_\pi }**

the coefficients **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle a_\pi}**
for a permutation **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \pi}**
not adapted to **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \mathcal{P}}**
(i.e., takes elements of subsets of the partition into other subsets) are on the order **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \frac{1}{d}}**
or zero as the dimension is large<ref name="multihiding"/>. Therefore security can be obtained by hiding the bit in states **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \rho_1}**
and **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle \rho_0}**
such that **Failed to parse (MathML with SVG or PNG fallback (recommended for modern browsers and accessibility tools): Invalid response ("Math extension cannot connect to Restbase.") from server "https://api.formulasearchengine.com/v1/":): {\displaystyle Tr(\rho_1 A) = Tr(\rho_0 A)}**
for any A adapted to unauthorized sets so that . From this, the scheme is said to be hiding depending on the remaining factors.

#### Revealing Properties

In addition, in order to reveal to authorized sets, for those same hiding states it must be ensured that for at least one permutation adapted to all the authorized set. From the terms as discussed above, this scheme is revealing.

#### Tailoring States

These states are given in the Eggeling and Werner paper<ref name="multihiding"/> for the Werner states scheme above.

##### Hiding Against the Finest Partition

The finest partition is the one without any quantum communication between parties: ({A},{B},{C},{D}). A classical bit can be hidden in:

An authorized set can reconstruct the state by the analyzing operator:

##### Hiding Against Single Pairs

A classical bit can be hidden from a single pair partitions of the form ({A,B},{C},{D}) with:

##### Hiding Against Two Pairs

For partitions of the form: ({A,B},{C,D}), hiding can be done with states:

A three party partition can analyze the states perfectly with

##### Hiding Against Triplets

For partitions of the form: ({A,B,C},{D}), hiding can be done with states:

##### Perfect Hiding

Hiding against all partitions except the maximum one, ({A,B,C,D}) can be obtained with states:

Which can be analyzed perfectly with quantum communication between all parties.

## References

<references/>