12 Jan 1999 | Richard Cleve1*, Daniel Gottesman2†, Hoi-Kwong Lo3‡
The paper explores the concept of quantum secret sharing, where a secret quantum state is divided into \( n \) shares such that any \( k \) of these shares can be used to reconstruct the secret, but no fewer than \( k-1 \) shares provide any information about the secret. The authors investigate the constraints on such schemes, which are primarily governed by the quantum "no-cloning theorem," leading to the requirement \( n < 2k \). They provide efficient constructions for various threshold schemes and compare them with quantum error-correcting codes, noting that quantum secret sharing schemes often use mixed states, unlike most quantum codes which encode pure states as pure states. The paper also discusses the practical applications of quantum secret sharing in scenarios such as secure key distribution, quantum entanglement distribution, and quantum storage and computation. Additionally, it presents a detailed example of a \( ((2,3)) \) threshold scheme using qutrits and proves several theorems and corollaries related to the existence and properties of quantum secret sharing schemes.The paper explores the concept of quantum secret sharing, where a secret quantum state is divided into \( n \) shares such that any \( k \) of these shares can be used to reconstruct the secret, but no fewer than \( k-1 \) shares provide any information about the secret. The authors investigate the constraints on such schemes, which are primarily governed by the quantum "no-cloning theorem," leading to the requirement \( n < 2k \). They provide efficient constructions for various threshold schemes and compare them with quantum error-correcting codes, noting that quantum secret sharing schemes often use mixed states, unlike most quantum codes which encode pure states as pure states. The paper also discusses the practical applications of quantum secret sharing in scenarios such as secure key distribution, quantum entanglement distribution, and quantum storage and computation. Additionally, it presents a detailed example of a \( ((2,3)) \) threshold scheme using qutrits and proves several theorems and corollaries related to the existence and properties of quantum secret sharing schemes.