pith. sign in

arxiv: 2604.13643 · v1 · submitted 2026-04-15 · 🪐 quant-ph

Quantum secret sharing in tripartite superconducting network

Pith reviewed 2026-05-10 12:52 UTC · model grok-4.3

classification 🪐 quant-ph
keywords quantum secret sharingsuperconducting circuitsmicrowave entanglementtwo-mode squeezed statesquantum networksno-cloning thresholdmultipartite protocols
0
0 comments X p. Extension

The pith

Superconducting microwave network implements quantum secret sharing where any two of three players reconstruct the secret with fidelity above the no-cloning limit.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

This paper reports an experimental demonstration of a quantum secret sharing protocol using a tripartite network of superconducting circuits. Entanglement is supplied by microwave two-mode squeezed states, allowing a secret quantum state to be distributed such that at least two collaborating players can recover it faithfully. Reconstructed fidelities exceed the asymptotic no-cloning threshold of 2/3, and a parameter window is identified that supports unconditionally secure operation even when one player is dishonest. The work also maps direct operational links between secret sharing and tasks such as quantum dense coding and correction of erasure errors.

Core claim

Using microwave two-mode squeezed states as an entanglement resource, we experimentally implement a QSS protocol with n = 3, where a subset of at least k = 2 players must collaborate to faithfully reconstruct the original secret state. We demonstrate reconstructed-state fidelities that surpass the asymptotic no-cloning threshold of F_nc = 2/3 and identify a parameter regime that allows for unconditionally secure communication in the presence of an omnipotent dishonest player.

What carries the argument

Microwave two-mode squeezed states used as the entanglement resource to encode and distribute the secret across the three-party superconducting network for the (3,2) threshold scheme.

If this is right

  • A parameter regime exists in which the protocol remains secure against an omnipotent dishonest player.
  • QSS shares operational structure with quantum dense coding, allowing direct translation of resources between the two tasks.
  • The same entanglement distribution supports elementary error correction against channel erasures.
  • The protocol architecture extends naturally toward blind quantum computing applications.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Integration with existing superconducting processors could support distributed quantum algorithms that require secure multi-party state sharing.
  • The demonstrated noise tolerance suggests the platform can be scaled to larger player sets while preserving the threshold advantage.
  • Combining this microwave QSS with optical links may enable hybrid quantum internet nodes that mix circuit and photonic modalities.

Load-bearing premise

The experimental hardware supplies sufficient entanglement and low enough noise to reach the reported fidelities, and the model of the dishonest player accurately represents possible attacks.

What would settle it

A reconstructed-state fidelity measurement at or below 2/3 under the same entanglement and noise conditions, or an explicit successful attack by a modeled dishonest player that prevents faithful reconstruction by the honest subset.

Figures

Figures reproduced from arXiv: 2604.13643 by A. Marx, C. Wilkinson, F. Fesquet, K. G. Fedorov, M. Handschuh, N. Korolkova, R. Gross, S. Gandorfer, W. K. Yam.

Figure 1
Figure 1. Figure 1: Schematic overview of the ((𝑘, 𝑛)) threshold QSS protocol implemented in this work. (a) Illustration of secret sharing among 𝑛 players, where a subset of 𝑘 players collaborate to securely reconstruct a secret input state |𝛼⟩. (b) Experimental scheme of the Dealer part of the QSS protocol, where the Dealer superimposes an unknown secret coherent state with one mode of a TMS entanglement resource and distrib… view at source ↗
Figure 2
Figure 2. Figure 2: (a) Negativity 𝑁 and purity 𝜇 of the resource TMS state as a function of squeezing level 𝑆. Reconstructed state fidelities for the collaborating players and the adversary as a function of TMS resource squeezing level 𝑆, using (a) the {1, 2} scheme and (b) the {2, 3} scheme with reconstruction JPA gain 𝐺 = 7 dB. Input coherent states have average displacement photon number |𝛼|2 = 1.3. Mutual information val… view at source ↗
Figure 3
Figure 3. Figure 3: Security of the QSS implementation against an attack on all modes. (a) Reconstructed state fidelities for the {2, 3} scheme at various input coherent state displacements |𝛼|2 and reconstruction JPA gains 𝐺. Solid lines represent theory model fits to the experimental QSS data. Error bars denote the standard error of the experimental data and are smaller than the symbol size when not shown. (b) Fidelity dist… view at source ↗
Figure 4
Figure 4. Figure 4: Dense coding as a reinterpretation of the {2, 3} reconstruction scheme in the QSS protocol. (a) Experimental scheme. The sender uses a hybrid ring to encode classical information from the input signal by locally displacing one part of the entangled TMS state. The encoded state is transmitted to the receiver, who uses the other part of the entangled TMS state to perform the decoding operation. By applying a… view at source ↗
Figure 5
Figure 5. Figure 5: QSS for quantum error correction of erasure errors. (a) Fidelity advantage 𝐹adv of using the QSS protocol for error correction as a function of input state displacement |𝛼|2 and erasure probability 𝜆. Solid orange line denotes the parameter regime where 𝐹adv = 0 %. The maximum advantage of 𝐹adv = 2.83 % is achieved at |𝛼|2 = 2.540 and 𝜆 = 0.466, as indicated by the red star. Fidelities as a function of (b)… view at source ↗
read the original abstract

Superconducting microwave quantum networks is a rapidly developing field, enabling distributed quantum computing and holding a promise for hybrid architectures in quantum internet. Quantum secret sharing (QSS) is one of the key protocols for multipartite quantum networks and can provide an unconditionally secure way to share quantum states among $n$ players. Using microwave two-mode squeezed states as an entanglement resource, we experimentally implement a QSS protocol with $n = 3$, where a subset of at least $k = 2$ players must collaborate to faithfully reconstruct the original secret state. We demonstrate reconstructed-state fidelities that surpass the asymptotic no-cloning threshold of $F_\textrm{nc} = 2/3$ and identify a parameter regime that allows for unconditionally secure communication in the presence of an omnipotent dishonest player. Furthermore, we experimentally explore inherent connections between QSS and other important quantum information processing tasks, such as quantum dense coding and elementary quantum error correction of channel erasures. Finally, we discuss extensions of QSS and its relation to the concept of blind quantum computing.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

0 major / 3 minor

Summary. The paper experimentally realizes a (2,3) quantum secret sharing protocol in a tripartite superconducting microwave network. Microwave two-mode squeezed states serve as the entanglement resource; any two of the three players can reconstruct the secret state with fidelities exceeding the asymptotic no-cloning bound F_nc = 2/3. A parameter regime is identified that permits unconditional security against an omnipotent dishonest player, and connections are drawn to quantum dense coding and elementary quantum error correction of erasures.

Significance. If the reported fidelities and security bounds hold, the work constitutes a concrete experimental milestone for multipartite quantum communication in superconducting hardware. The explicit mapping between QSS, dense coding, and erasure correction, together with the identification of a secure operating regime, supplies practical guidance for scaling microwave quantum networks.

minor comments (3)
  1. [§3.2] §3.2 and Fig. 3: the caption and text should explicitly state the number of tomographic measurements per reconstructed state and the precise maximum-likelihood estimator used, as these details directly affect the quoted fidelity uncertainties.
  2. [§4.1] §4.1, Eq. (8): the bound on the dishonest player’s information is derived under a specific noise model; a short paragraph clarifying how the measured squeezing level and channel loss map onto the parameters of that model would strengthen the security claim.
  3. [Fig. 5] Fig. 5: the color scale for the reconstructed density matrices should be labeled with the numerical range and the basis ordering should be stated in the caption to allow direct comparison with the ideal target states.

Simulated Author's Rebuttal

0 responses · 0 unresolved

We thank the referee for their positive evaluation of our manuscript and for recommending minor revision. We are pleased that the experimental demonstration of the (2,3) quantum secret sharing protocol, the achieved fidelities above the no-cloning bound, and the identified secure parameter regime against dishonest players were viewed as a concrete milestone for multipartite quantum communication in superconducting hardware.

Circularity Check

0 steps flagged

No significant circularity: experimental demonstration

full rationale

The manuscript reports an experimental implementation of a (2,3) quantum secret sharing protocol using microwave two-mode squeezed states in a tripartite superconducting network. Central results are measured state fidelities exceeding the no-cloning bound F_nc=2/3, supported by tomography, reconstruction procedures, and noise characterization. Security bounds are derived from measured entanglement and noise levels rather than from any self-referential fit or ansatz. No derivation chain exists that reduces predictions or uniqueness claims to the paper's own inputs by construction; the work is self-contained against external benchmarks such as the asymptotic no-cloning threshold.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The work builds on standard quantum information theory and experimental techniques in circuit QED without introducing new entities or many free parameters in the abstract description.

axioms (1)
  • standard math Quantum no-cloning theorem implies a fidelity threshold of 2/3 for secure secret sharing
    Directly referenced as F_nc = 2/3 for the asymptotic case.

pith-pipeline@v0.9.0 · 5515 in / 1253 out tokens · 58304 ms · 2026-05-10T12:52:38.397797+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

47 extracted references · 47 canonical work pages · 1 internal anchor

  1. [1]

    = 𝜂 ( ̂ 𝑎𝛼 + ̂ 𝑎r1 − 𝛾 ̂ 𝑎† r2) (4) or ̂ 𝑎out = 𝜂 ( √ 2 ̂ 𝑎2 + 𝛾 ̂ 𝑎†

  2. [2]

    entanglement JPAs

    = 𝜂 ( ̂ 𝑎𝛼 − ̂ 𝑎r1 + 𝛾 ̂ 𝑎† r2) , (5) where 𝜂 = 1/ √2 − 𝛾2 represents an amplification of the output state and 𝛾 ∈ [0, √ 2)is selected to maximize re- construction fidelity. Since the resource state is entan- gled such that ( ̂ 𝑎r1 − 𝛾 ̂ 𝑎† r2) overlaps destructively, the previously large variance is minimized. The size of this overlap is determined by th...

  3. [3]

    Bravyi, O

    S. Bravyi, O. Dial, J. M. Gambetta, D. Gil, and Z. Nazario, The future of quantum computing with su- perconducting qubits, J. Appl. Phys. 132, 160902 (2022)

  4. [4]

    How to Build a Quantum Supercomputer: Scaling from Hundreds to Millions of Qubits

    M. Mohseni, A. Scherer, K. G. Johnson, O. Wertheim, M. Otten, N. A. Aadit, Y. Alexeev, K. M. Bresniker, K. Y. Camsari, B. Chapman, S. Chatterjee, G. A. Dag- new, A. Esposito, F. Fahim, M. Fiorentino, A. Gajjar, A. Khalid, X. Kong, B. Kulchytskyy, E. Kyoseva, R. Li, P. A. Lott, I. L. Markov, R. F. McDermott, G. Pe- dretti, P. Rao, E. Rieffel, A. Silva, J. ...

  5. [5]

    Casariego and et al, Propagating quantum mi- crowaves: towards applications in communication and sensing, Quantum Sci

    M. Casariego and et al, Propagating quantum mi- crowaves: towards applications in communication and sensing, Quantum Sci. Technol. 8, 023001 (2023)

  6. [6]

    Pirandola, Composable security for continuous vari- able quantum key distribution: Trust levels and practi- cal key rates in wired and wireless networks, Phys

    S. Pirandola, Composable security for continuous vari- able quantum key distribution: Trust levels and practi- cal key rates in wired and wireless networks, Phys. Rev. Res. 3, 043014 (2021)

  7. [7]

    Fesquet, F

    F. Fesquet, F. Kronowetter, M. Renger, Q. Chen, K. Honasoge, O. Gargiulo, Y. Nojiri, A. Marx, F. Deppe, R. Gross, and K. G. Fedorov, Perspectives of microwave quantum key distribution in the open air, Phys. Rev. A 108, 032607 (2023)

  8. [8]

    Richter, M

    S. Richter, M. Thornton, I. Khan, H. Scott, K. Jaksch, U. Vogl, B. Stiller, G. Leuchs, C. Marquardt, and N. Ko- rolkova, Agile and versatile quantum communication: Signatures and secrets, Phys. Rev. X 11, 011038 (2021)

  9. [9]

    Cleve, D

    R. Cleve, D. Gottesman, and H.-K. Lo, How to share a quantum secret, Phys. Rev. Lett. 83, 648 (1999)

  10. [10]

    Tyc and B

    T. Tyc and B. C. Sanders, How to share a continuous- variable quantum secret by optical interferometry, Phys. Rev. A 65, 042310 (2002)

  11. [11]

    A. M. Lance, T. Symul, W. P. Bowen, B. C. Sanders, and P. K. Lam, Tripartite quantum state sharing, Phys. Rev. Lett. 92, 177903 (2004)

  12. [12]

    Wilkinson, M

    C. Wilkinson, M. Thornton, and N. Korolkova, Quantum steering as a resource for secure tripartite quantum state sharing, Phys. Rev. A 107, 062401 (2023)

  13. [13]

    K. G. Fedorov, S. Pogorzalek, U. Las Heras, M. Sanz, P. Yard, P. Eder, M. Fischer, J. Goetz, E. Xie, K. Ino- mata, Y. Nakamura, R. Di Candia, E. Solano, A. Marx, F. Deppe, and R. Gross, Finite-time quantum entangle- ment in propagating squeezed microwaves, Sci. Rep. 8, 6416 (2018)

  14. [14]

    K. E. Honasoge, M. Handschuh, W. K. Yam, S. Gan- dorfer, D. Bazulin, N. Bruckmoser, L. Koch, A. Marx, R. Gross, and K. G. Fedorov, Fabrication of low-loss Josephson parametric devices, Phys. Rev. B 111, 214508 (2025)

  15. [15]

    K. G. Fedorov, M. Renger, S. Pogorzalek, R. D. Candia, Q. Chen, Y. Nojiri, K. Inomata, Y. Nakamura, M. Par- tanen, A. Marx, R. Gross, and F. Deppe, Experimental quantum teleportation of propagating microwaves, Sci. Adv. 7, eabk0891 (2021)

  16. [16]

    F. Butt, I. Pogorelov, R. Freund, A. Steiner, M. Meyer, T. Monz, and M. Müller, Demonstration of measurement- free universal fault-tolerant quantum computation, arXiv:2506.22600

  17. [17]

    A. M. Lance, T. Symul1, W. P. Bowen, B. C. Sanders, T. Tyc, T. C. Ralph, and P. K. Lam, Continuous- variable quantum-state sharing via quantum disentan- glement, Phys. Rev. A 71, 033814 (2005)

  18. [18]

    M. D. Reid and P. D. Drummond, Quantum correlations of phase in nondegenerate parametric oscillation, Phys. Rev. Lett. 60, 2731 (1988)

  19. [19]

    S. L. Braunstein and P. van Loock, Quantum informa- tion with continuous variables, Rev. Mod. Phys. 77, 513 (2005)

  20. [20]

    W. K. Yam, M. Renger, S. Gandorfer, R. Gross, and K. G. Fedorov, Practical quantum teleportation with finite-energy codebooks, arXiv:2512.23388

  21. [21]

    Scarani, S

    V. Scarani, S. Iblisdir, N. Gisin, and A. Acín, Quantum cloning, Rev. Mod. Phys. 77, 1225 (2005)

  22. [22]

    Weedbrook, S

    C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, Gaussian quantum information, Rev. Mod. Phys. 84, 621 (2012)

  23. [23]

    Scutaru, Fidelity for displaced squeezed thermal states and the oscillator semigroup, J

    H. Scutaru, Fidelity for displaced squeezed thermal states and the oscillator semigroup, J. Phys. A 31, 3659 (1998)

  24. [24]

    Grosshans and P

    F. Grosshans and P. Grangier, Quantum cloning and teleportation criteria for continuous quantum variables, Phys. Rev. A 64, 010301 (2001)

  25. [25]

    P. T. Cochrane, T. C. Ralph, and A. Dolińska, Optimal cloning for finite distributions of coherent states, Phys. Rev. A 69, 042313 (2004)

  26. [26]

    Zhong, E

    L. Zhong, E. P. Menzel, R. D. Candia, P. Eder, M. Ih- mig, A. Baust, M. Haeberlein, E. Hoffmann, K. Ino- mata, T. Yamamoto, Y. Nakamura, E. Solano, F. Deppe, A. Marx, and R. Gross, Squeezing with a flux-driven Josephson parametric amplifier, New J. Phys. 15, 125013 (2013)

  27. [27]

    Pogorzalek, K

    S. Pogorzalek, K. G. Fedorov, L. Zhong, J. Goetz, F. Wulschner, M. Fischer, P. Eder, E. Xie, K. Ino- mata, T. Yamamoto, Y. Nakamura, A. Marx, F. Deppe, and R. Gross, Hysteretic flux response and nondegener- ate gain of flux-driven Josephson parametric amplifiers, Phys. Rev. Appl. 8, 024012 (2017)

  28. [28]

    Kronowetter, F

    F. Kronowetter, F. Fesquet, M. Renger, K. Honasoge, Y. Nojiri, K. Inomata, Y. Nakamura, A. Marx, R. Gross, and K. Fedorov, Quantum microwave parametric inter- ferometer, Phys. Rev. Appl. 20, 024049 (2023)

  29. [29]

    E. P. Menzel, F. Deppe, M. Mariantoni, M. A. Araque Caballero, A. Baust, T. Niemczyk, E. Hoffmann, A. Marx, E. Solano, and R. Gross, Dual-path state recon- 12 struction scheme for propagating quantum microwaves and detector noise tomography, Phys. Rev. Lett. 105, 100401 (2010)

  30. [30]

    Mariantoni, E

    M. Mariantoni, E. P. Menzel, F. Deppe, M. A. Araque Caballero, A. Baust, T. Niemczyk, E. Hoffmann, E. Solano, A. Marx, and R. Gross, Planck spectroscopy and quantum noise of microwave beam splitters, Phys. Rev. Lett. 105, 133601 (2010)

  31. [31]

    Gandorfer, M

    S. Gandorfer, M. Renger, W. Yam, F. Fesquet, A. Marx, R. Gross, and K. Fedorov, Two-dimensional Planck spec- troscopy for microwave photon calibration, Phys. Rev. Appl. 23, 024064 (2025)

  32. [32]

    Peres, Separability criterion for density matrices, Phys

    A. Peres, Separability criterion for density matrices, Phys. Rev. Lett. 77, 1413 (1996)

  33. [33]

    Adesso and F

    G. Adesso and F. Illuminati, Gaussian measures of entan- glement versus negativities: Ordering of two-mode Gaus- sian states, Phys. Rev. A 72, 032334 (2005)

  34. [34]

    Boutin, D

    S. Boutin, D. M. Toyli, A. V. Venkatramani, A. W. Ed- dins, I. Siddiqi, and A. Blais, Effect of higher-order non- linearities on amplification and squeezing in Josephson parametric amplifiers, Phys. Rev. Appl. 8, 054030 (2017)

  35. [35]

    Renger, S

    M. Renger, S. Pogorzalek, Q. Chen, Y. Nojiri, K. Ino- mata, Y. Nakamura, M. Partanen, A. Marx, R. Gross, F. Deppe, and K. G. Fedorov, Beyond the standard quan- tum limit for parametric amplification of broadband sig- nals, npj Quantum Inf. 7, 160 (2021)

  36. [36]

    S. L. Braunstein and H. J. Kimble, Dense coding for con- tinuous variables, Phys. Rev. A 61, 042302 (2000)

  37. [37]

    Mizuno, K

    J. Mizuno, K. Wakui, A. Furusawa, and M. Sasaki, Ex- perimental demonstration of entanglement-assisted cod- ing using a two-mode squeezed vacuum state, Phys. Rev. A 71, 012304 (2005)

  38. [38]

    Niset, U

    J. Niset, U. L. Andersen, and N. J. Cerf, Experimentally feasible quantum erasure-correcting code for continuous variables, Phys. Rev. Lett. 101, 130503 (2008)

  39. [39]

    Lassen, M

    M. Lassen, M. Sabuncu, A. Huck, J. Niset, G. Leuchs, N. J. Cerf, and U. L. Andersen, Quantum optical co- herence can survive photon losses using a continuous- variable quantum erasure-correcting code, Nat. Photon- ics 4, 700 (2010)

  40. [40]

    Y. Lu, Z. Zhang, L.-K. Chen, Z.-D. Li, C. Liu, L. Li, N.- L. Liu, X. Ma, Y.-A. Chen, and J.-W. Pan, Secret sharing of a quantum state, Phys. Rev. Lett. 117, 030501 (2016)

  41. [41]

    S. Liu, Z. Lu, P. Wang, Y. Tian, X. Wang, and Y. Li, Ex- perimental demonstration of multiparty quantum secret sharing and conference key agreement, npj Quantum Inf. 9, 92 (2023)

  42. [42]

    J. Ho, J. W. Webb, R. M. J. Brooks, F. Grasselli, E. Gauger, and A. Fedrizzi, Quantum-private distributed sensing, arXiv:2410.00970

  43. [43]

    S. Barz, E. Kashefi, A. Broadbent, J. F. Fitzsimons, A. Zeilinger, and P. Walther, Demonstration of blind quantum computing, Science 335, 303 (2012)

  44. [44]

    J. F. Fitzsimons and E. Kashefi, Unconditionally ver- ifiable blind quantum computation, Phys. Rev. A 96, 012303 (2017)

  45. [45]

    Ouyang, S.-H

    Y. Ouyang, S.-H. Tan, L. Zhao, and J. F. Fitzsimons, Computing on quantum shared secrets, Phys. Rev. A 96, 052333 (2017)

  46. [46]

    B. A. Bell, D. Markham, D. A. Herrera-Marti, A. Mar- tin, W. J. Wadsworth, J. G. Rarity, and M. S. Tame, Experimental demonstration of graph-state quantum se- cret sharing, Nat. Commun. 5, 5480 (2014)

  47. [47]

    Alocco, A

    A. Alocco, A. Celotto, E. Palumbo, B. Galvano, P. Livreri, L. Fasolo, L. Callegaro, and E. Enrico, Pro- grammable microwave cluster states via Josephson meta- materials, arXiv:2507.22823