pith. sign in

arxiv: 2512.22049 · v2 · submitted 2025-12-26 · 🪐 quant-ph · cs.IT· math.IT

Quantum Secret Sharing Rates

Pith reviewed 2026-05-16 19:01 UTC · model grok-4.3

classification 🪐 quant-ph cs.ITmath.IT
keywords quantum secret sharingQSS capacitycompound quantum channelsdephasing noisequantum informationsecret sharing ratesinformation theoretic model
0
0 comments X

The pith

The capacity of quantum secret sharing is characterized in regularized form and computed exactly for dephasing noise.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper aims to find the highest rate at which a quantum secret can be distributed to multiple participants such that only authorized groups can reconstruct it. By linking the problem to compound quantum channels, the authors derive a regularized expression that characterizes this capacity in general. They then calculate the precise capacity when the channel adds dephasing noise. This matters for setting the ultimate limits on quantum cryptographic schemes in real-world noisy conditions. It provides a benchmark for evaluating the performance of any proposed quantum secret sharing protocol.

Core claim

The paper establishes a regularized characterization for the capacity of quantum secret sharing by modeling it through compound quantum channels. It further determines the exact capacity value for the case where the quantum channel is subject to dephasing noise.

What carries the argument

Compound quantum channel model for rate analysis of quantum secret sharing

If this is right

  • The QSS capacity admits a regularized formula based on the compound channel model.
  • Exact capacity is known for dephasing noise, allowing optimal protocol rates.
  • Authorized sets of participants can recover the secret at rates up to this capacity.
  • Unauthorized participants obtain zero information about the secret.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Future work could extend the model to other noise types like amplitude damping.
  • This characterization may inform the design of quantum networks for secure multi-party tasks.
  • Experimental verification with photonic systems could test the predicted dephasing capacity.

Load-bearing premise

Quantum secret sharing can be modeled using compound quantum channels following the classical secret sharing approach.

What would settle it

An experiment achieving a higher rate than the capacity formula for dephasing noise would falsify the result.

Figures

Figures reproduced from arXiv: 2512.22049 by Gabrielle Lalou, Husein Natur, Uzi Pereg.

Figure 1
Figure 1. Figure 1: Equivalent compound quantum channel for a [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
read the original abstract

This paper studies the capacity limits for quantum secret sharing (QSS). The goal of a QSS scheme is to distribute a quantum secret among multiple participants, such that only authorized parties can recover it through collaboration, while no information can be obtained without such collaboration. We introduce an information-theoretic model for the rate analysis of QSS and its relation to compound quantum channels, following a similar approach as of Zou et al. (2015) on classical secret sharing. We establish a regularized characterization for the QSS capacity, and determine the capacity for QSS with dephasing noise.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper introduces an information-theoretic model for quantum secret sharing (QSS) by relating it to compound quantum channels, following the classical construction of Zou et al. (2015). It establishes a regularized characterization of the QSS capacity and computes the capacity explicitly for the dephasing-noise case.

Significance. If the central claims hold, the work supplies the first regularized capacity formula for QSS and a concrete single-letter expression under dephasing noise. This extends classical secret-sharing capacity results to the quantum setting and supplies a theoretical benchmark for multi-party quantum cryptographic protocols. The modeling step is a direct quantum analogue of the cited classical approach and, once granted, yields standard regularization arguments plus an explicit dephasing result.

major comments (2)
  1. [Section 3] The modeling step that maps the QSS problem to a compound quantum channel (Section 3) is load-bearing for both the regularized characterization and the dephasing result; the manuscript should supply an explicit argument showing that the authorized-set recovery condition and the unauthorized-set secrecy condition translate precisely into the compound-channel capacity definition, including the appropriate quantum mutual-information quantities.
  2. [Theorem on dephasing capacity] The dephasing-noise capacity result (Theorem 2 or equivalent) is stated as a single-letter expression, but the achievability and converse arguments appear to rely on standard quantum channel coding techniques without a self-contained verification that the dephasing channel’s symmetry reduces the regularization; a short explicit calculation of the relevant quantum mutual information would strengthen the claim.
minor comments (2)
  1. [Section 3] Notation for the compound channel states and the sets of authorized/unauthorized participants should be introduced once and used consistently; currently the mapping is described in prose and could be clarified with a small diagram or table.
  2. [References] The reference list should include the full citation for Zou et al. (2015) and any standard quantum channel coding results invoked in the proofs.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the careful reading and constructive comments on our manuscript. We address each major comment below and will revise the paper accordingly to strengthen the presentation.

read point-by-point responses
  1. Referee: [Section 3] The modeling step that maps the QSS problem to a compound quantum channel (Section 3) is load-bearing for both the regularized characterization and the dephasing result; the manuscript should supply an explicit argument showing that the authorized-set recovery condition and the unauthorized-set secrecy condition translate precisely into the compound-channel capacity definition, including the appropriate quantum mutual-information quantities.

    Authors: We agree that an explicit translation strengthens the foundation. In the revised manuscript we will add a dedicated paragraph in Section 3 that derives the correspondence step by step: the authorized-set recovery condition is shown to be equivalent to reliable decoding over the compound channel with positive quantum mutual information rate I(A:B) (where A is the secret and B the authorized subsystems), while the unauthorized-set secrecy condition maps directly to the requirement that the quantum mutual information from the secret to any unauthorized collection vanishes, matching the secrecy constraint in the compound-channel capacity definition. This uses the standard definitions of quantum mutual information and follows the classical analogy of Zou et al. (2015) with the quantum adjustments made explicit. revision: yes

  2. Referee: [Theorem on dephasing capacity] The dephasing-noise capacity result (Theorem 2 or equivalent) is stated as a single-letter expression, but the achievability and converse arguments appear to rely on standard quantum channel coding techniques without a self-contained verification that the dephasing channel’s symmetry reduces the regularization; a short explicit calculation of the relevant quantum mutual information would strengthen the claim.

    Authors: We thank the referee for this suggestion. The dephasing channel is covariant under the Pauli Z group, which permits the regularization to collapse via the standard symmetry argument for such channels. In the revised version we will insert a short, self-contained calculation immediately after the statement of the dephasing theorem: we explicitly evaluate the quantum mutual information I(A:B) for the dephasing channel and show that it equals the single-letter expression, confirming that higher-order regularizations do not increase the rate. This verifies the reduction without relying solely on general theorems. revision: yes

Circularity Check

0 steps flagged

No significant circularity

full rationale

The derivation adapts the classical compound-channel model of Zou et al. (2015) to quantum secret sharing, then applies standard regularization arguments to obtain the capacity characterization. The dephasing-noise case is reduced to an explicit single-letter expression using the new quantum model. No step equates a prediction to a fitted input by construction, no uniqueness theorem is imported from the authors' prior work, and the central claims rest on the introduced quantum channel model rather than self-referential definitions or load-bearing self-citations.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The model relies on standard quantum channel assumptions and the extension from classical secret sharing; no free parameters or invented entities are indicated in the abstract.

axioms (1)
  • domain assumption Quantum secret sharing can be analyzed using compound quantum channels analogous to classical secret sharing
    Explicitly follows the approach of Zou et al. (2015) adapted to quantum.

pith-pipeline@v0.9.0 · 5385 in / 999 out tokens · 49872 ms · 2026-05-16T19:01:02.585468+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

34 extracted references · 34 canonical work pages · 1 internal anchor

  1. [1]

    Bloch and J

    M. Bloch and J. Barros,Physical-layer security: from information theory to security engineering. Cambridge Univ. Press, Cambridge, U.K., 2011

  2. [2]

    Implementa- tion security in quantum key distribution,

    V . Zapatero, Á. Navarrete, and M. Curty, “Implementa- tion security in quantum key distribution,”Adv. Quantum Technol., vol. 8, no. 2, p. 2300380, 2025

  3. [3]

    Quantum key distribution with state replacement,

    M. Graifer, Y . Kochman, and O. Shayevitz, “Quantum key distribution with state replacement,” in2023 59th Annu. Allerton Conf. Commun. Control Comput. (Aller- ton). IEEE, 2023, pp. 1–8

  4. [4]

    Entanglement-assisted authenticated BB84 protocol,

    P. J. Farré, V . Galetsky, S. Ghosh, J. Nötzel, and C. Deppe, “Entanglement-assisted authenticated BB84 protocol,”Physica Scripta, vol. 100, no. 10, p. 105113, 2025

  5. [5]

    The wire-tap channel,

    A. D. Wyner, “The wire-tap channel,”Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975

  6. [6]

    Quantum privacy and quantum wiretap channels,

    N. Cai, A. Winter, and R. W. Yeung, “Quantum privacy and quantum wiretap channels,”Problems Inf. Trans- miss., vol. 40, no. 4, pp. 318–336, 2004

  7. [7]

    The private classical capacity and quantum capacity of a quantum channel,

    I. Devetak, “The private classical capacity and quantum capacity of a quantum channel,”IEEE Trans. Inf. Theor., vol. 51, no. 1, pp. 44–55, 2005

  8. [8]

    Non-additivity in classical-quantum wiretap channels,

    A. Tikku, M. Berta, and J. M. Renes, “Non-additivity in classical-quantum wiretap channels,”IEEE J. Sel. Areas Inf. Theor., vol. 1, no. 2, pp. 526–535, 2020

  9. [9]

    Semantic security for quantum wiretap channels,

    H. Boche, M. Cai, C. Deppe, R. Ferrara, and M. Wiese, “Semantic security for quantum wiretap channels,”J. Math. Phys., vol. 63, no. 9, 2022

  10. [10]

    Key assistance, key agreement, and layered secrecy for bosonic broadcast channels,

    U. Pereg, R. Ferrara, and M. R. Bloch, “Key assistance, key agreement, and layered secrecy for bosonic broadcast channels,” in2021 IEEE Inf. Theor. Workshop (ITW). IEEE, 2021, pp. 1–6

  11. [11]

    Covert and secret key expansion over quantum channels under collective attacks,

    M. Tahmasbi and M. R. Bloch, “Covert and secret key expansion over quantum channels under collective attacks,”IEEE Trans. Inf. Theor., vol. 66, no. 11, pp. 7113–7131, 2020

  12. [12]

    Quantum security for the tactile internet,

    S. Hassanpour, R. Bassoli, J. Nötzel, F. H. Fitzek, H. Boche, and T. Strufe, “Quantum security for the tactile internet,”Secur. Privacy for 6G Massive IoT, pp. 193– 228, 2025

  13. [13]

    Secure communication with unreliable entanglement assistance,

    M. Lederman and U. Pereg, “Secure communication with unreliable entanglement assistance,” in2024 IEEE Int. Symp. Inf. Theor. (ISIT). IEEE, 2024, pp. 1017–1022

  14. [14]

    How to share a secret,

    A. Shamir, “How to share a secret,”Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979

  15. [15]

    Conjugate coding,

    S. Wiesner, “Conjugate coding,”ACM Sigact News, vol. 15, no. 1, pp. 78–88, 1983

  16. [16]

    Quantum copy-protection and quantum money,

    S. Aaronson, “Quantum copy-protection and quantum money,” in2009 24th Annu. IEEE Conf. Comput. Com- plexity. IEEE, 2009, pp. 229–242

  17. [17]

    Quantum secret sharing for general access structures

    A. D. Smith, “Quantum secret sharing for general access structures,”arXiv preprint quant-ph/0001087, 2000

  18. [18]

    Theory of quantum secret sharing,

    D. Gottesman, “Theory of quantum secret sharing,”Phys. Rev. A, vol. 61, no. 4, p. 042311, 2000

  19. [19]

    Multiparty quan- tum secret sharing,

    Z.-j. Zhang, Y . Li, and Z.-x. Man, “Multiparty quan- tum secret sharing,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 71, no. 4, p. 044301, 2005

  20. [20]

    Graph states for quan- tum secret sharing,

    D. Markham and B. C. Sanders, “Graph states for quan- tum secret sharing,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 78, no. 4, p. 042309, 2008

  21. [21]

    Quantum secret sharing,

    M. Hillery, V . Bužek, and A. Berthiaume, “Quantum secret sharing,”Phys. Rev. A, vol. 59, no. 3, p. 1829, 1999

  22. [22]

    Quantum secret sharing without entanglement,

    G.-P. Guo and G.-C. Guo, “Quantum secret sharing without entanglement,”Phys. Lett. A, vol. 310, no. 4, pp. 247–251, 2003

  23. [23]

    Effi- cient multiparty quantum-secret-sharing schemes,

    L. Xiao, G. Lu Long, F.-G. Deng, and J.-W. Pan, “Effi- cient multiparty quantum-secret-sharing schemes,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 69, no. 5, p. 052307, 2004

  24. [24]

    Semiquantum secret sharing using entangled states,

    Q. Li, W. H. Chan, and D.-Y . Long, “Semiquantum secret sharing using entangled states,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 82, no. 2, p. 022303, 2010

  25. [25]

    Quantum secret sharing based on quantum error-correcting codes,

    C.-Z. Zu-Rong, Wei-Tao, “Quantum secret sharing based on quantum error-correcting codes,”Chin. Phys. B, vol. 20, no. 5, p. 050309, 2011

  26. [26]

    Quantum secret sharing with classical bobs,

    L. Li, D. Qiu, and P. Mateus, “Quantum secret sharing with classical bobs,”J. Phys. A: Math. Theor., vol. 46, no. 4, p. 045304, 2013

  27. [27]

    How to share a quantum secret,

    R. Cleve, D. Gottesman, and H.-K. Lo, “How to share a quantum secret,”Phys. Rev. Lett., vol. 83, no. 3, p. 648, 1999

  28. [28]

    An information theoretic approach to secret sharing,

    S. Zou, Y . Liang, L. Lai, and S. Shamai, “An information theoretic approach to secret sharing,”IEEE Trans. Inf. Theor., vol. 61, no. 6, pp. 3121–3136, 2015

  29. [29]

    Compound wiretap channels,

    Y . Liang, G. Kramer, and H. V . Poor, “Compound wiretap channels,”EURASIP J. Wireless Commun. Netw., vol. 2009, no. 1, p. 142374, 2009

  30. [30]

    Quantum capac- ity of a class of compound channels,

    I. Bjelakovi ´c, H. Boche, and J. Nötzel, “Quantum capac- ity of a class of compound channels,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 78, no. 4, p. 042331, 2008

  31. [31]

    Private classical capacity with a symmetric side channel and its application to quantum cryptogra- phy,

    G. Smith, “Private classical capacity with a symmetric side channel and its application to quantum cryptogra- phy,”Phys. Rev. A—At. Mol. Opt. Phys., vol. 78, no. 2, p. 022306, 2008

  32. [32]

    M. M. Wilde,Quantum information theory. Cambridge university press, 2013

  33. [33]

    Commitment capacity of classical-quantum channels,

    M. Hayashi and N. A. Warsi, “Commitment capacity of classical-quantum channels,” in2022 IEEE Int. Symp. Inf. Theor. (ISIT). IEEE, 2022, pp. 1058–1063

  34. [34]

    Quantum oblivious transfer for quantum messages,

    Y .-G. Yang, S. Qiu, Y . Chang, G.-B. Xu, D.-H. Jiang, and D. Li, “Quantum oblivious transfer for quantum messages,”Phys. Rev. A, vol. 112, no. 4, p. 042617, 2025