Quantum Anonymous Secret Sharing with Permutation Invariant Codes

This paper proposes a quantum anonymous secret sharing protocol that achieves sender-anonymity by combining permutation-invariant quantum error-correcting codes with anonymous transmission algorithms, while also quantifying information leakage in ramp schemes using quantum conditional min-entropy to evaluate the security of intermediate shares.

Original authors: Varin Sikand, Andrew Nemec

Published 2026-05-01
📖 5 min read🧠 Deep dive

This is an AI-generated explanation of the paper below. It is not written or endorsed by the authors. For technical accuracy, refer to the original paper. Read full disclaimer

Imagine you have a top-secret recipe for the world's best cookie. You don't want just one person to hold the whole recipe, because if they lose it or get kidnapped, the recipe is gone forever. So, you decide to split the recipe into several pieces (shares) and give them to different friends. This is the basic idea of Secret Sharing: you need a specific number of friends to get back together to reconstruct the full recipe.

However, there's a problem with the old way of doing this: when your friends get together to put the pieces back together, everyone knows who showed up. If a bad guy is watching, they can see that "Alice" and "Bob" were the ones who recovered the secret. Maybe Alice is a whistleblower, or maybe Bob is trying to stay anonymous for a vote. They need a way to share the secret without anyone knowing who contributed the pieces.

This paper proposes a new, high-tech way to do this called Quantum Anonymous Secret Sharing. Here is how it works, broken down into simple concepts:

1. The Magic of "Permutation-Invariant" Codes

Think of the secret recipe not as a list of words, but as a special, tangled knot of string. In this new system, the way the knot is tied has a special property: it doesn't matter which piece of string you pull first.

In technical terms, the authors use "Permutation-Invariant" (PI) codes. Imagine you have a bag of 10 marbles, and the secret is hidden inside the total weight of the marbles, not in any specific marble. If you take out 3 marbles to check, it doesn't matter which 3 you took; as long as you have enough, you can figure out the secret. Because the system doesn't care about the order or identity of the pieces, the person decoding the secret (the "Decoder") can't tell which friends showed up. They just know, "Okay, I have enough pieces to solve the puzzle."

2. The "Ghost Messenger" Protocol

To make sure no one knows who is sending a piece of the secret, the authors use a set of "Ghost Messenger" tricks based on quantum physics (specifically, something called GHZ states, which are like a group of friends holding hands in a circle).

Imagine you are in a room with 10 people. You want to send a message to the person at the front of the room, but you don't want anyone to know it was you.

  • The Trick: Everyone in the room performs a synchronized dance move (a quantum operation) at the same time.
  • The Result: The message arrives at the front, but because everyone danced together, the "footprints" of the sender are erased. The Decoder receives the message, but it looks like it came from a cloud of possibilities rather than a single person. Even the other friends in the room can't tell who sent it.

3. Measuring the "Leak" with a New Ruler

The authors also wanted to know: "If a bad guy steals some of the pieces, how much of the secret do they actually learn?"

Old ways of measuring this were like taking an average of many different scenarios. But the authors argue that a bad guy only gets one chance to steal the secret. So, they introduced a new measuring stick called Conditional Min-Entropy.

Think of it like this:

  • Old Ruler: "On average, if you steal 3 pieces, you learn 20% of the recipe."
  • New Ruler (Min-Entropy): "If you are the smartest thief in the world and you steal 3 pieces, what is the best possible percentage of the recipe you can figure out?"

This new ruler is stricter. It tells you the worst-case scenario for security. The authors used this ruler to test different types of "knots" (codes) to see which ones leak the least information to thieves who don't have enough pieces to solve the whole puzzle.

4. The Hybrid Approach (The "Double Lock")

The paper also suggests a "Hybrid" method. Imagine the secret is a quantum cookie recipe, but you also add a classical "lock" (like a password) to it.

  • You scramble the quantum recipe using a random password.
  • You split the scrambled recipe and the password into shares.
  • Even if a thief gets some pieces of the recipe, without the password pieces, the recipe looks like random noise.
  • This makes the system even safer, effectively turning the quantum secret into a classical one that is harder to crack.

Summary of What They Achieved

  • Anonymity: They created a system where friends can recover a secret without anyone (not even the person decoding it) knowing who participated.
  • Robustness: Unlike some previous methods that required everyone to show up, this system works even if some friends are missing, as long as enough pieces are present.
  • Better Measurement: They provided a new, strict way to measure exactly how much information leaks out if a thief steals a few pieces.

In short, this paper builds a "ghostly" vault where you can retrieve a secret without anyone knowing who opened the door, and they gave us a better way to measure how secure that vault really is.

Drowning in papers in your field?

Get daily digests of the most novel papers matching your research keywords — with technical summaries, in your language.

Try Digest →