Device-independent quantum secret sharing using Mermin-type contextuality

We present a new quantum secret sharing protocol based on recent advances in Mermin-type contextuality scenarios, which is provably secure against postquantum nonsignaling attackers. It is a fundamental assumption of secret sharing protocols that not all players are trusted parties, and that some may collude amongst themselves and with eavesdroppers to break confidentiality. To this extent, quantum secret sharing introduces a new layer of security, enabling eavesdropping detection via entangled states and noncommuting observables. A more thorough security analysis, however, becomes crucial if the protocol relies on untrusted devices for its implementation: for example, it cannot be excluded that some players may collude with the device supplier. In this paper, we put recent developments in Mermin-type contextuality to work in a new quantum secret sharing protocol. The maximal contextuality (aka maximal non-locality, or zero local fraction) demonstrated by the measurement scenarios results in strong device-independent security against nonsignaling attackers -- be they classical, quantum or postquantum -- which can be operationally established by means of minimal statistical analysis.

[1]  Kohei Kishida,et al.  Contextuality, Cohomology and Paradox , 2015, CSL.

[2]  Peter Selinger,et al.  Dagger Compact Closed Categories and Completely Positive Maps: (Extended Abstract) , 2007, QPL.

[3]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[4]  Stefano Gogioso Operational Mermin non-locality and All-vs-Nothing arguments , 2015, ArXiv.

[5]  Samson Abramsky,et al.  A categorical semantics of quantum protocols , 2004, Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science, 2004..

[6]  Bob Coecke,et al.  New Structures for Physics , 2011 .

[7]  Physical Review , 1965, Nature.

[8]  Giuseppe Vallone,et al.  Fully nonlocal quantum correlations , 2011, 1105.3598.

[9]  P. Selinger A Survey of Graphical Languages for Monoidal Categories , 2009, 0908.3347.

[10]  Aleks Kissinger,et al.  Pictures of processes : automated graph rewriting for monoidal categories and applications to quantum computing , 2012, ArXiv.

[11]  Dov M. Gabbay,et al.  Handbook of Quantum logic and Quantum Structures , 2007 .

[12]  Vladimir Zamdzhiev,et al.  An Abstract Approach towards Quantum Secret Sharing , 2012 .

[13]  B. Coecke,et al.  Categories for the practising physicist , 2009, 0905.3010.

[14]  Adrian Kent,et al.  No signaling and quantum key distribution. , 2004, Physical review letters.

[15]  Karol Horodecki,et al.  Contextuality offers device-independent security , 2010, 1006.0468.

[16]  Aleks Kissinger,et al.  Strong Complementarity and Non-locality in Categorical Quantum Mechanics , 2012, 2012 27th Annual IEEE Symposium on Logic in Computer Science.

[17]  October I Physical Review Letters , 2022 .

[18]  Physics Letters , 1962, Nature.

[19]  Samson Abramsky,et al.  The sheaf-theoretic structure of non-locality and contextuality , 2011, 1102.0264.

[20]  Stefano Gogioso,et al.  Mermin Non-Locality in Abstract Process Theories , 2015 .

[21]  Avshalom C. Elitzur,et al.  Quantum nonlocality for each pair in an ensemble , 1992 .

[22]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[23]  A. Joyal,et al.  The geometry of tensor calculus, I , 1991 .

[24]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[25]  Samson Abramsky,et al.  Categorical quantum mechanics , 2008, 0808.1023.

[26]  N. Mermin Quantum mysteries revisited , 1990 .

[27]  Yuri Gurevich,et al.  Logic in Computer Science , 1993, Current Trends in Theoretical Computer Science.

[28]  Luke Ong,et al.  Computer Science Logic , 1990, Lecture Notes in Computer Science.

[29]  Simon Perdrix,et al.  Environment and Classical Channels in Categorical Quantum Mechanics , 2010, CSL.

[30]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.

[31]  T. Kerler On braided tensor categories , 1994, hep-th/9402018.