Quantum Secret Sharing

Functionality DescriptionEdit

Quantum Secret Sharing (QSS) allows to transfer a quantum state (or a classical message encoded as quantum state), referred to as the secret, from Alice to Bob but only with the consent of a third-party, Charlie. A QSS protocol is generalizable to an arbitrary number of parties consisting of one sender, one recipient, and all other parties being endorsers. In case of only two parties, sender and receiver, QSS is equivalent to Quantum Teleportation. Despite the no-cloning theorem not allowing the quantum secret to be in possession of more than one party at the same time, there exist QSS protocols that mimic classical secret sharing (see Further Information).

Tags: Building Blocks, Multi Party, Quantum Enhanced Classical Functionality

Use CasesEdit

ProtocolsEdit

  1. Quantum Secret Sharing using GHZ States(4)
  2. Verifiable Quantum Secret Sharing (VQSS)

PropertiesEdit

  • Confidentiality: QSS with one dishonest party not following the protocol must guarantee that no information about the quantum secret at all is revealed to any party.
  • Security: Every protocol must ensure that no information about the secret is leaked to an external eavesdropper.

Further InformationEdit

QSS is inspired by classical secret sharing (CSS), but has one fundamental difference due to the no-cloning theorem. In CSS, Alice shares a secret among   parties and any team of Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle t} parties or more, with  , has full access to the secret, whereas   collaborating parties or less have no information about the secret at all. Such  -threshold schemes are not straightforward to implement for QSS, since the no-cloning theorem forbids that quantum states are copied, resulting in only one party, the receiver, obtaining the quantum secret from Alice, who looses hers during the process. However,   schemes can be built through sequentially running several QSS rounds.(5)

ReferencesEdit

  1. Mayers (2001)
  2. Joy et al (2018)
  3. Gottesman (1999)
  4. Hillery et al (1998)
  5. Lu et al (2018)
contributed by Peter Limacher