Quantum Secret Sharing Rates
Pith reviewed 2026-05-16 19:01 UTC · model grok-4.3
The pith
The capacity of quantum secret sharing is characterized in regularized form and computed exactly for dephasing noise.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper establishes a regularized characterization for the capacity of quantum secret sharing by modeling it through compound quantum channels. It further determines the exact capacity value for the case where the quantum channel is subject to dephasing noise.
What carries the argument
Compound quantum channel model for rate analysis of quantum secret sharing
If this is right
- The QSS capacity admits a regularized formula based on the compound channel model.
- Exact capacity is known for dephasing noise, allowing optimal protocol rates.
- Authorized sets of participants can recover the secret at rates up to this capacity.
- Unauthorized participants obtain zero information about the secret.
Where Pith is reading between the lines
- Future work could extend the model to other noise types like amplitude damping.
- This characterization may inform the design of quantum networks for secure multi-party tasks.
- Experimental verification with photonic systems could test the predicted dephasing capacity.
Load-bearing premise
Quantum secret sharing can be modeled using compound quantum channels following the classical secret sharing approach.
What would settle it
An experiment achieving a higher rate than the capacity formula for dephasing noise would falsify the result.
Figures
read the original abstract
This paper studies the capacity limits for quantum secret sharing (QSS). The goal of a QSS scheme is to distribute a quantum secret among multiple participants, such that only authorized parties can recover it through collaboration, while no information can be obtained without such collaboration. We introduce an information-theoretic model for the rate analysis of QSS and its relation to compound quantum channels, following a similar approach as of Zou et al. (2015) on classical secret sharing. We establish a regularized characterization for the QSS capacity, and determine the capacity for QSS with dephasing noise.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces an information-theoretic model for quantum secret sharing (QSS) by relating it to compound quantum channels, following the classical construction of Zou et al. (2015). It establishes a regularized characterization of the QSS capacity and computes the capacity explicitly for the dephasing-noise case.
Significance. If the central claims hold, the work supplies the first regularized capacity formula for QSS and a concrete single-letter expression under dephasing noise. This extends classical secret-sharing capacity results to the quantum setting and supplies a theoretical benchmark for multi-party quantum cryptographic protocols. The modeling step is a direct quantum analogue of the cited classical approach and, once granted, yields standard regularization arguments plus an explicit dephasing result.
major comments (2)
- [Section 3] The modeling step that maps the QSS problem to a compound quantum channel (Section 3) is load-bearing for both the regularized characterization and the dephasing result; the manuscript should supply an explicit argument showing that the authorized-set recovery condition and the unauthorized-set secrecy condition translate precisely into the compound-channel capacity definition, including the appropriate quantum mutual-information quantities.
- [Theorem on dephasing capacity] The dephasing-noise capacity result (Theorem 2 or equivalent) is stated as a single-letter expression, but the achievability and converse arguments appear to rely on standard quantum channel coding techniques without a self-contained verification that the dephasing channel’s symmetry reduces the regularization; a short explicit calculation of the relevant quantum mutual information would strengthen the claim.
minor comments (2)
- [Section 3] Notation for the compound channel states and the sets of authorized/unauthorized participants should be introduced once and used consistently; currently the mapping is described in prose and could be clarified with a small diagram or table.
- [References] The reference list should include the full citation for Zou et al. (2015) and any standard quantum channel coding results invoked in the proofs.
Simulated Author's Rebuttal
We thank the referee for the careful reading and constructive comments on our manuscript. We address each major comment below and will revise the paper accordingly to strengthen the presentation.
read point-by-point responses
-
Referee: [Section 3] The modeling step that maps the QSS problem to a compound quantum channel (Section 3) is load-bearing for both the regularized characterization and the dephasing result; the manuscript should supply an explicit argument showing that the authorized-set recovery condition and the unauthorized-set secrecy condition translate precisely into the compound-channel capacity definition, including the appropriate quantum mutual-information quantities.
Authors: We agree that an explicit translation strengthens the foundation. In the revised manuscript we will add a dedicated paragraph in Section 3 that derives the correspondence step by step: the authorized-set recovery condition is shown to be equivalent to reliable decoding over the compound channel with positive quantum mutual information rate I(A:B) (where A is the secret and B the authorized subsystems), while the unauthorized-set secrecy condition maps directly to the requirement that the quantum mutual information from the secret to any unauthorized collection vanishes, matching the secrecy constraint in the compound-channel capacity definition. This uses the standard definitions of quantum mutual information and follows the classical analogy of Zou et al. (2015) with the quantum adjustments made explicit. revision: yes
-
Referee: [Theorem on dephasing capacity] The dephasing-noise capacity result (Theorem 2 or equivalent) is stated as a single-letter expression, but the achievability and converse arguments appear to rely on standard quantum channel coding techniques without a self-contained verification that the dephasing channel’s symmetry reduces the regularization; a short explicit calculation of the relevant quantum mutual information would strengthen the claim.
Authors: We thank the referee for this suggestion. The dephasing channel is covariant under the Pauli Z group, which permits the regularization to collapse via the standard symmetry argument for such channels. In the revised version we will insert a short, self-contained calculation immediately after the statement of the dephasing theorem: we explicitly evaluate the quantum mutual information I(A:B) for the dephasing channel and show that it equals the single-letter expression, confirming that higher-order regularizations do not increase the rate. This verifies the reduction without relying solely on general theorems. revision: yes
Circularity Check
No significant circularity
full rationale
The derivation adapts the classical compound-channel model of Zou et al. (2015) to quantum secret sharing, then applies standard regularization arguments to obtain the capacity characterization. The dephasing-noise case is reduced to an explicit single-letter expression using the new quantum model. No step equates a prediction to a fitted input by construction, no uniqueness theorem is imported from the authors' prior work, and the central claims rest on the introduced quantum channel model rather than self-referential definitions or load-bearing self-citations.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Quantum secret sharing can be analyzed using compound quantum channels analogous to classical secret sharing
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We establish a regularized characterization for the QSS capacity... Ic(A)≡max |ϕ⟩A′A min ℓ∈A I(A′⟩Bℓ)
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
M. Bloch and J. Barros,Physical-layer security: from information theory to security engineering. Cambridge Univ. Press, Cambridge, U.K., 2011
work page 2011
-
[2]
Implementa- tion security in quantum key distribution,
V . Zapatero, Á. Navarrete, and M. Curty, “Implementa- tion security in quantum key distribution,”Adv. Quantum Technol., vol. 8, no. 2, p. 2300380, 2025
work page 2025
-
[3]
Quantum key distribution with state replacement,
M. Graifer, Y . Kochman, and O. Shayevitz, “Quantum key distribution with state replacement,” in2023 59th Annu. Allerton Conf. Commun. Control Comput. (Aller- ton). IEEE, 2023, pp. 1–8
work page 2023
-
[4]
Entanglement-assisted authenticated BB84 protocol,
P. J. Farré, V . Galetsky, S. Ghosh, J. Nötzel, and C. Deppe, “Entanglement-assisted authenticated BB84 protocol,”Physica Scripta, vol. 100, no. 10, p. 105113, 2025
work page 2025
-
[5]
A. D. Wyner, “The wire-tap channel,”Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975
work page 1975
-
[6]
Quantum privacy and quantum wiretap channels,
N. Cai, A. Winter, and R. W. Yeung, “Quantum privacy and quantum wiretap channels,”Problems Inf. Trans- miss., vol. 40, no. 4, pp. 318–336, 2004
work page 2004
-
[7]
The private classical capacity and quantum capacity of a quantum channel,
I. Devetak, “The private classical capacity and quantum capacity of a quantum channel,”IEEE Trans. Inf. Theor., vol. 51, no. 1, pp. 44–55, 2005
work page 2005
-
[8]
Non-additivity in classical-quantum wiretap channels,
A. Tikku, M. Berta, and J. M. Renes, “Non-additivity in classical-quantum wiretap channels,”IEEE J. Sel. Areas Inf. Theor., vol. 1, no. 2, pp. 526–535, 2020
work page 2020
-
[9]
Semantic security for quantum wiretap channels,
H. Boche, M. Cai, C. Deppe, R. Ferrara, and M. Wiese, “Semantic security for quantum wiretap channels,”J. Math. Phys., vol. 63, no. 9, 2022
work page 2022
-
[10]
Key assistance, key agreement, and layered secrecy for bosonic broadcast channels,
U. Pereg, R. Ferrara, and M. R. Bloch, “Key assistance, key agreement, and layered secrecy for bosonic broadcast channels,” in2021 IEEE Inf. Theor. Workshop (ITW). IEEE, 2021, pp. 1–6
work page 2021
-
[11]
Covert and secret key expansion over quantum channels under collective attacks,
M. Tahmasbi and M. R. Bloch, “Covert and secret key expansion over quantum channels under collective attacks,”IEEE Trans. Inf. Theor., vol. 66, no. 11, pp. 7113–7131, 2020
work page 2020
-
[12]
Quantum security for the tactile internet,
S. Hassanpour, R. Bassoli, J. Nötzel, F. H. Fitzek, H. Boche, and T. Strufe, “Quantum security for the tactile internet,”Secur. Privacy for 6G Massive IoT, pp. 193– 228, 2025
work page 2025
-
[13]
Secure communication with unreliable entanglement assistance,
M. Lederman and U. Pereg, “Secure communication with unreliable entanglement assistance,” in2024 IEEE Int. Symp. Inf. Theor. (ISIT). IEEE, 2024, pp. 1017–1022
work page 2024
-
[14]
A. Shamir, “How to share a secret,”Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979
work page 1979
-
[15]
S. Wiesner, “Conjugate coding,”ACM Sigact News, vol. 15, no. 1, pp. 78–88, 1983
work page 1983
-
[16]
Quantum copy-protection and quantum money,
S. Aaronson, “Quantum copy-protection and quantum money,” in2009 24th Annu. IEEE Conf. Comput. Com- plexity. IEEE, 2009, pp. 229–242
work page 2009
-
[17]
Quantum secret sharing for general access structures
A. D. Smith, “Quantum secret sharing for general access structures,”arXiv preprint quant-ph/0001087, 2000
work page internal anchor Pith review Pith/arXiv arXiv 2000
-
[18]
Theory of quantum secret sharing,
D. Gottesman, “Theory of quantum secret sharing,”Phys. Rev. A, vol. 61, no. 4, p. 042311, 2000
work page 2000
-
[19]
Multiparty quan- tum secret sharing,
Z.-j. Zhang, Y . Li, and Z.-x. Man, “Multiparty quan- tum secret sharing,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 71, no. 4, p. 044301, 2005
work page 2005
-
[20]
Graph states for quan- tum secret sharing,
D. Markham and B. C. Sanders, “Graph states for quan- tum secret sharing,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 78, no. 4, p. 042309, 2008
work page 2008
-
[21]
M. Hillery, V . Bužek, and A. Berthiaume, “Quantum secret sharing,”Phys. Rev. A, vol. 59, no. 3, p. 1829, 1999
work page 1999
-
[22]
Quantum secret sharing without entanglement,
G.-P. Guo and G.-C. Guo, “Quantum secret sharing without entanglement,”Phys. Lett. A, vol. 310, no. 4, pp. 247–251, 2003
work page 2003
-
[23]
Effi- cient multiparty quantum-secret-sharing schemes,
L. Xiao, G. Lu Long, F.-G. Deng, and J.-W. Pan, “Effi- cient multiparty quantum-secret-sharing schemes,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 69, no. 5, p. 052307, 2004
work page 2004
-
[24]
Semiquantum secret sharing using entangled states,
Q. Li, W. H. Chan, and D.-Y . Long, “Semiquantum secret sharing using entangled states,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 82, no. 2, p. 022303, 2010
work page 2010
-
[25]
Quantum secret sharing based on quantum error-correcting codes,
C.-Z. Zu-Rong, Wei-Tao, “Quantum secret sharing based on quantum error-correcting codes,”Chin. Phys. B, vol. 20, no. 5, p. 050309, 2011
work page 2011
-
[26]
Quantum secret sharing with classical bobs,
L. Li, D. Qiu, and P. Mateus, “Quantum secret sharing with classical bobs,”J. Phys. A: Math. Theor., vol. 46, no. 4, p. 045304, 2013
work page 2013
-
[27]
How to share a quantum secret,
R. Cleve, D. Gottesman, and H.-K. Lo, “How to share a quantum secret,”Phys. Rev. Lett., vol. 83, no. 3, p. 648, 1999
work page 1999
-
[28]
An information theoretic approach to secret sharing,
S. Zou, Y . Liang, L. Lai, and S. Shamai, “An information theoretic approach to secret sharing,”IEEE Trans. Inf. Theor., vol. 61, no. 6, pp. 3121–3136, 2015
work page 2015
-
[29]
Y . Liang, G. Kramer, and H. V . Poor, “Compound wiretap channels,”EURASIP J. Wireless Commun. Netw., vol. 2009, no. 1, p. 142374, 2009
work page 2009
-
[30]
Quantum capac- ity of a class of compound channels,
I. Bjelakovi ´c, H. Boche, and J. Nötzel, “Quantum capac- ity of a class of compound channels,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 78, no. 4, p. 042331, 2008
work page 2008
-
[31]
G. Smith, “Private classical capacity with a symmetric side channel and its application to quantum cryptogra- phy,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 78, no. 2, p. 022306, 2008
work page 2008
-
[32]
M. M. Wilde,Quantum information theory. Cambridge university press, 2013
work page 2013
-
[33]
Commitment capacity of classical-quantum channels,
M. Hayashi and N. A. Warsi, “Commitment capacity of classical-quantum channels,” in2022 IEEE Int. Symp. Inf. Theor. (ISIT). IEEE, 2022, pp. 1058–1063
work page 2022
-
[34]
Quantum oblivious transfer for quantum messages,
Y .-G. Yang, S. Qiu, Y . Chang, G.-B. Xu, D.-H. Jiang, and D. Li, “Quantum oblivious transfer for quantum messages,”Phys. Rev. A, vol. 112, no. 4, p. 042617, 2025
work page 2025
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.