Magic Secret Sharing: Threshold Control of Quantum Computational Power via GHZ Entanglement
Pith reviewed 2026-05-20 18:00 UTC · model grok-4.3
The pith
Quantum states carrying non-Clifford magic for universal computation can be threshold-shared so only authorized coalitions recover the exact magic content.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Magic Secret Sharing distributes the magic content C(phi) = (|sin(phi)| + |cos(phi)| - 1)/2 of a phase gate so that any individual party holds only the maximally mixed state I/2 with C = 0. The authorised coalition recovers this value exactly, enabling a logical T gate through gate teleportation. Among diagonal parametric gates, only phase gates meet the column-sum security condition. The protocol lifts to a one-sided device-independent setting by steering inequalities that certify magic delivery without trusting the coalition's devices.
What carries the argument
Pre-shared GHZ entanglement plus a local phase gate P(phi) that enforces the column-sum condition, distributing magic content so individuals receive zero while the coalition receives the full C(phi) value.
If this is right
- Authorised coalitions can implement logical T gates via gate teleportation inside multi-server blind quantum computation.
- The protocol extends to one-sided device-independent verification of magic delivery through steering inequalities.
- Phase gates are the only diagonal parametric family that satisfy the exact security condition required for the threshold property.
- Experimental runs on a 156-qubit processor confirm zero magic for individuals and state fidelities of 0.959-0.986 for the authorised party.
Where Pith is reading between the lines
- Threshold control over magic could be combined with other quantum resources to create layered access policies for distributed quantum algorithms.
- The same GHZ-plus-phase construction might certify computational advantage in networks where parties must prove they possess non-Clifford power without revealing the full state.
- Testing whether the scheme tolerates realistic noise levels on larger coalitions would show how far the zero-magic guarantee for individuals survives hardware imperfections.
Load-bearing premise
Any single party is left with exactly the maximally mixed state whose magic content is zero.
What would settle it
Measurement on any individual party's reduced state yielding a Wigner distance C greater than the reconstruction tolerance, or the coalition failing to recover the predicted numerical value of C(phi) for a chosen phase angle.
Figures
read the original abstract
We introduce Magic Secret Sharing (MSS), a quantum cryptographic primitive in which the secret is the computational capability of a quantum state rather than its classical description. In the resource theory of magic, non-stabilizer states fuel universal quantum computation via non-Clifford gates; MSS distributes this resource with an (n-1,n) threshold structure using a pre-shared GHZ state and a single local phase gate P(phi) = diag(1, exp(i*phi)). Any individual party holds the maximally mixed state I/2, with Wigner distance C(I/2) = 0, so no local operation can yield non-Clifford computational advantage regardless of what operations are applied or what noise acts on the device. The authorised coalition reconstructs magic content C(phi) = (|sin(phi)| + |cos(phi)| - 1)/2 exactly, enabling a logical T gate via gate teleportation in multi-server blind quantum computation (BQC). Among diagonal parametric gates, phase gates are the unique class satisfying the security condition, characterised via an exact column-sum condition. The protocol is elevated to a one-sided device-independent (1SDI) setting via a steering inequality: the assemblage produced on the recipient's side certifies magic delivery without trusting the coalition's devices. We demonstrate the (2,3) instance on ibm_marrakesh (156-qubit IBM Heron): security (C(rho_Bob) = 0.000, below LP reconstruction tolerance) holds in all runs, and state fidelity reaches 0.959-0.986 for the authorised party, with faithfulness confirmed for all four test values of phi including near-exact recovery (C = 0.154 vs theory 0.153) for phi = pi/8.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript introduces Magic Secret Sharing (MSS), a quantum cryptographic primitive distributing computational magic (non-Clifford resource) via pre-shared GHZ states and a single local phase gate P(φ). It achieves an (n-1,n) threshold where any individual party receives the maximally mixed state I/2 with magic content C(I/2)=0, while the authorized coalition reconstructs exactly C(φ)=(|sin(φ)|+|cos(φ)|-1)/2. Phase gates are characterized as unique among diagonal parametric gates via an exact column-sum security condition. The protocol is lifted to a one-sided device-independent setting using a steering inequality, and the (2,3) instance is demonstrated experimentally on ibm_marrakesh with reported fidelities 0.959-0.986 and security (C=0.000) holding across runs.
Significance. If the central claims hold, the work meaningfully connects the resource theory of magic with threshold secret sharing and blind quantum computation, enabling distributed control of non-Clifford power. The experimental validation on superconducting hardware, the 1SDI certification, and the uniqueness characterization via column-sum condition are concrete strengths. The free parameter φ and the exact reconstruction for the authorized set add to the result's interest.
major comments (2)
- [Security derivation] § on security derivation (partial-trace step): the load-bearing claim that every single-party reduced state is exactly I/2 independent of φ must be shown explicitly. The partial trace over the GHZ state after one local P(φ) must be computed to confirm the resulting 2×2 matrix has vanishing off-diagonal elements and no residual φ dependence; any φ-dependent coherence would permit local magic extraction and collapse the (n-1,n) threshold.
- [Reconstruction claim] Reconstruction section: the assertion that the authorized coalition obtains exactly C(φ) requires the explicit sequence of operations or measurements performed by the coalition and the precise definition of how the Wigner distance is recovered from the reconstructed state.
minor comments (2)
- [Magic measure definition] Clarify the precise relation between the functional form C(φ) and the underlying Wigner-function definition of magic; the expression (|sin φ| + |cos φ| - 1)/2 should be derived from the resource-theoretic measure rather than introduced directly.
- [Experimental results] In the experimental section, specify the number of shots, any error-mitigation techniques, and how the reported C values (e.g., 0.154 vs. theory 0.153 for φ=π/8) are extracted from tomography or direct measurement.
Simulated Author's Rebuttal
We thank the referee for the careful and constructive review. The comments highlight important points for rigor, and we address each one below, indicating the revisions we will incorporate.
read point-by-point responses
-
Referee: [Security derivation] § on security derivation (partial-trace step): the load-bearing claim that every single-party reduced state is exactly I/2 independent of φ must be shown explicitly. The partial trace over the GHZ state after one local P(φ) must be computed to confirm the resulting 2×2 matrix has vanishing off-diagonal elements and no residual φ dependence; any φ-dependent coherence would permit local magic extraction and collapse the (n-1,n) threshold.
Authors: We agree that an explicit partial-trace calculation strengthens the security proof. In the revised manuscript we will add the following derivation in the security section. The initial GHZ state is |GHZ⟩ = (|0⟩⊗n + |1⟩⊗n)/√2. After applying P(φ) = diag(1, e^{iφ}) to the first qubit the state becomes (|0⟩|0⟩⊗(n−1) + e^{iφ}|1⟩|1⟩⊗(n−1))/√2. The reduced density operator for the first qubit is obtained by tracing out qubits 2 through n. The off-diagonal elements involve inner products ⟨0⊗(n−1)|1⊗(n−1)⟩ and ⟨1⊗(n−1)|0⊗(n−1)⟩, both of which vanish by orthogonality of the computational-basis states. Consequently the reduced state is exactly I/2 with no φ dependence, confirming that C(I/2) = 0 and that the (n−1,n) threshold is preserved. revision: yes
-
Referee: [Reconstruction claim] Reconstruction section: the assertion that the authorized coalition obtains exactly C(φ) requires the explicit sequence of operations or measurements performed by the coalition and the precise definition of how the Wigner distance is recovered from the reconstructed state.
Authors: We accept that the reconstruction procedure should be stated more explicitly. In the revised manuscript we will expand the reconstruction section to include the following steps: (i) the authorized parties perform a joint parity measurement on their GHZ shares (equivalent to a logical X measurement on the encoded qubit), (ii) they apply local phase corrections conditioned on the classical communication of the measurement outcome, thereby teleporting the action of P(φ) onto a target logical qubit, and (iii) the resulting logical state ρ is used to evaluate the magic monotone C(ρ) = (|sin φ| + |cos φ| − 1)/2 directly via its definition as the Wigner-distance measure introduced in the paper. This sequence recovers exactly the claimed magic content for the authorized set. revision: yes
Circularity Check
No significant circularity; derivation is self-contained via explicit construction and partial-trace verification.
full rationale
The protocol constructs the (n-1,n) threshold explicitly from a shared GHZ state plus one local phase gate P(phi). Security follows from the direct partial-trace calculation that each single-party reduced density matrix equals I/2 independently of phi, which is a standard linear-algebra fact rather than a redefinition. The authorized coalition's reconstruction of the state (and its magic content) is likewise obtained by applying the inverse operations to the joint system; the explicit functional form C(phi) = (|sin(phi)| + |cos(phi)| - 1)/2 is the evaluated result of the chosen magic monotone on that reconstructed state, not an input that is then re-predicted. The column-sum uniqueness condition is derived from the I/2 requirement and then checked against the family of diagonal gates, constituting an independent characterization rather than a self-referential loop. No fitted parameters, self-citations, or ansatzes are load-bearing for the central claims.
Axiom & Free-Parameter Ledger
free parameters (1)
- phi
axioms (1)
- domain assumption Phase gates are the unique class of diagonal parametric gates satisfying the security condition via an exact column-sum condition.
invented entities (1)
-
Magic Secret Sharing (MSS) primitive
no independent evidence
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
Any individual party holds the maximally mixed state I/2, with Wigner distance C(I/2)=0... authorised coalition reconstructs magic content C(φ)=(|sinφ|+|cosφ|-1)/2 exactly
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
- [1]
- [2]
- [3]
- [4]
- [5]
-
[6]
J. F. Fitzsimons, npj Quantum Inf.3, 23 (2017)
work page 2017
- [7]
-
[8]
W. K. Wootters, Ann. Phys.176, 1 (1987)
work page 1987
-
[9]
H. M. Wiseman, S. J. Jones, and A. C. Doherty, Phys. Rev. Lett.98, 140402 (2007)
work page 2007
- [10]
-
[11]
Dutta and Tushar,Non-Markovian revival of magic in quantum hardware, in preparation (2026)
S. Dutta and Tushar,Non-Markovian revival of magic in quantum hardware, in preparation (2026)
work page 2026
-
[12]
Dutta and Tushar, arXiv:2603.20792 [quant-ph] (2026)
S. Dutta and Tushar, arXiv:2603.20792 [quant-ph] (2026)
-
[13]
C. Wilkinson, M. Thornton, and N. Korolkova, Phys. Rev. A107, 062401 (2023)
work page 2023
- [14]
-
[15]
R. Raussendorf, D. E. Browne, N. Delfosse, C. Okay, and J. Bermejo-Vega, Phys. Rev. A95, 052334 (2017). 9
work page 2017
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.