{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:00:05Z","timestamp":1760230805469,"version":"build-2065373602"},"reference-count":45,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T00:00:00Z","timestamp":1660521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>This paper introduces the Symmetric Extensible Quantum Secret Sharing protocol, a novel quantum protocol for secret sharing. At its heart, it is an entanglement-based protocol that relies on the use of maximally entangled GHZ tuples, evenly distributed among the players, endowing the spymaster with the ability to securely share a secret message with the agents. Its security stems from the fact that it is highly improbable for a malicious eavesdropper or a rogue double agent to disrupt its successful execution. It is characterized by symmetry, since all agents are treated indiscriminately, utilizing identical quantum circuits. Furthermore, it can be seamlessly extended to an arbitrary number of agents. Finally, after the completion of the quantum part of the protocol, the spymaster will have to publicly transmit some information, in order to allow the agents to unlock the secret message. This part of the protocol can be considered as an additional advantage, due to the fact that it gives the spymaster the privilege of deciding if, or when, it is the right time for the agents to unlock the secret message, after the completion of the quantum part of the protocol.<\/jats:p>","DOI":"10.3390\/sym14081692","type":"journal-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T23:44:03Z","timestamp":1660607043000},"page":"1692","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Symmetric Extensible Protocol for Quantum Secret Sharing"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1570-6722","authenticated-orcid":false,"given":"Michael","family":"Ampatzis","sequence":"first","affiliation":[{"name":"Department of Informatics, Ionian University, 7 Tsirigoti Square, 49100 Corfu, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3741-1271","authenticated-orcid":false,"given":"Theodore","family":"Andronikos","sequence":"additional","affiliation":[{"name":"Department of Informatics, Ionian University, 7 Tsirigoti Square, 49100 Corfu, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2022,8,15]]},"reference":[{"key":"ref_1","unstructured":"Chow, J., Dial, O., and Gambetta, J. (2022, April 03). IBM Quantum Breaks the 100-Qubit Processor Barrier. Available online: https:\/\/research.ibm.com\/blog\/127-qubit-quantum-processor-eagle."},{"key":"ref_2","unstructured":"Shor, P. (1994, January 20\u201322). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA."},{"key":"ref_3","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 9\u201312). Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume":"67","author":"Ekert","year":"1991","journal-title":"Phys. Rev. Lett."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","article-title":"Quantum secret sharing","volume":"59","author":"Hillery","year":"1999","journal-title":"Phys. Rev. A"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","article-title":"How to share a quantum secret","volume":"83","author":"Cleve","year":"1999","journal-title":"Phys. Rev. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","article-title":"Quantum entanglement for secret sharing and secret splitting","volume":"59","author":"Karlsson","year":"1999","journal-title":"Phys. Rev. A"},{"key":"ref_8","unstructured":"Smith, A.D. (2000). Quantum secret sharing for general access structures. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"042311","DOI":"10.1103\/PhysRevA.61.042311","article-title":"Theory of quantum secret sharing","volume":"61","author":"Gottesman","year":"2000","journal-title":"Phys. Rev. A"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"012308","DOI":"10.1103\/PhysRevA.62.012308","article-title":"Teleportation and secret sharing with pure entangled states","volume":"62","author":"Bandyopadhyay","year":"2000","journal-title":"Phys. Rev. A"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","article-title":"Efficient multiparty quantum-secret-sharing schemes","volume":"69","author":"Xiao","year":"2004","journal-title":"Phys. Rev. A"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"6659","DOI":"10.1109\/TIT.2012.2205895","article-title":"Reducing the quantum communication cost of quantum secret sharing","volume":"58","author":"Fortescue","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSTQE.2020.2975600","article-title":"Hierarchical quantum secret sharing based on special high-dimensional entangled state","volume":"26","author":"Qin","year":"2020","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3164","DOI":"10.1109\/TIT.2021.3139839","article-title":"Theory of communication efficient quantum secret sharing","volume":"68","author":"Senthoor","year":"2022","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"042301","DOI":"10.1103\/PhysRevA.63.042301","article-title":"Experimental demonstration of quantum secret sharing","volume":"63","author":"Tittel","year":"2001","journal-title":"Phys. Rev. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"062307","DOI":"10.1103\/PhysRevA.78.062307","article-title":"Experimental quantum secret sharing using telecommunication fiber","volume":"78","author":"Bogdanski","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_17","first-page":"1","article-title":"Experimental demonstration of graph-state quantum secret sharing","volume":"5","author":"Bell","year":"2014","journal-title":"Nat. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"090501","DOI":"10.1103\/PhysRevLett.114.090501","article-title":"Long-distance measurement-device-independent multiparty quantum communication","volume":"114","author":"Fu","year":"2015","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"022301","DOI":"10.1103\/PhysRevA.101.022301","article-title":"Passive continuous-variable quantum secret sharing using a thermal source","volume":"101","author":"Wu","year":"2020","journal-title":"Phys. Rev. A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"022339","DOI":"10.1103\/PhysRevA.100.022339","article-title":"Quantum secret sharing using weak coherent states","volume":"100","author":"Grice","year":"2019","journal-title":"Phys. Rev. A"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"32244","DOI":"10.1364\/OE.440365","article-title":"Secure quantum secret sharing without signal disturbance monitoring","volume":"29","author":"Gu","year":"2021","journal-title":"Opt. Express"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"030302","DOI":"10.1103\/PhysRevA.92.030302","article-title":"Secret sharing with a single d-level quantum system","volume":"92","author":"Tavakoli","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2000012","DOI":"10.1002\/lpor.202000012","article-title":"Experimental Demonstration of 11Dimensional 10-Party Quantum Secret Sharing","volume":"14","author":"Pinnell","year":"2020","journal-title":"Laser Photonics Rev."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Grover, L. (1996, January 22\u201324). A fast quantum mechanical algorithm for database search. Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, PA, USA.","DOI":"10.1145\/237814.237866"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"022306","DOI":"10.1103\/PhysRevA.68.022306","article-title":"Quantum secret-sharing protocol based on Grover\u2019s algorithm","volume":"68","author":"Hsu","year":"2003","journal-title":"Phys. Rev. A"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3639","DOI":"10.1016\/j.optcom.2011.03.039","article-title":"Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstration","volume":"284","author":"Hao","year":"2011","journal-title":"Opt. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"012031","DOI":"10.1088\/1742-6596\/2209\/1\/012031","article-title":"The Improved Quantum Secret Sharing Protocol Based on Grover Algorithm","volume":"2209","author":"Yu","year":"2022","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"e1798","DOI":"10.4236\/oalib.1101798","article-title":"The Deutsch-Jozsa Algorithm Can Be Used for Quantum Key Distribution","volume":"2","author":"Nagata","year":"2015","journal-title":"OALib"},{"key":"ref_29","first-page":"28","article-title":"Quantum Communication Based on Simon\u2019s Algorithm","volume":"5","author":"Nagata","year":"2017","journal-title":"Int. J. Emerg. Eng. Res. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2086","DOI":"10.1007\/s10773-017-3352-4","article-title":"Quantum Cryptography, Quantum Communication, and Quantum Computer in a Noisy Environment","volume":"56","author":"Nagata","year":"2017","journal-title":"Int. J. Theor. Phys."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10773-018-3910-4","article-title":"Quantum Key Distribution Protocol Based on Modified Generalization of Deutsch-Jozsa Algorithm in d-level Quantum System","volume":"58","author":"Nguyen","year":"2019","journal-title":"Int. J. Theor. Phys."},{"key":"ref_32","unstructured":"IBM (2022, July 27). IBM Quantum Roadmap. Available online: https:\/\/research.ibm.com\/blog\/ibm-quantum-roadmap-2025."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1039111.1039117","article-title":"Quantum networks: From quantum cryptography to quantum architecture","volume":"34","author":"Curcic","year":"2004","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ampatzis, M., and Andronikos, T. (2021). QKD Based on Symmetric Entangled Bernstein-Vazirani. Entropy, 23.","DOI":"10.3390\/e23070870"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1052","DOI":"10.1103\/PhysRevLett.82.1052","article-title":"Quantum strategies","volume":"82","author":"Meyer","year":"1999","journal-title":"Phys. Rev. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"3077","DOI":"10.1103\/PhysRevLett.83.3077","article-title":"Quantum games and quantum strategies","volume":"83","author":"Eisert","year":"1999","journal-title":"Phys. Rev. Lett."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Andronikos, T., Sirokofskich, A., Kastampolidou, K., Varvouzou, M., Giannakis, K., and Singh, A. (2018). Finite Automata Capturing Winning Sequences for All Possible Variants of the PQ Penny Flip Game. Mathematics, 6.","DOI":"10.3390\/math6020020"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Andronikos, T., and Sirokofskich, A. (2021). The Connection between the PQ Penny Flip Game and the Dihedral Groups. Mathematics, 9.","DOI":"10.3390\/math9101115"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/s11128-022-03604-8","article-title":"Conditions that enable a player to surely win in sequential quantum games","volume":"21","author":"Andronikos","year":"2022","journal-title":"Quantum Inf. Process."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Giannakis, K., Theocharopoulou, G., Papalitsas, C., Fanarioti, S., and Andronikos, T. (2019). Quantum Conditional Strategies and Automata for Prisoners\u2019 Dilemmata under the EWL Scheme. Appl. Sci., 9.","DOI":"10.20944\/preprints201905.0366.v1"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"586","DOI":"10.3390\/computation3040586","article-title":"Dominant Strategies of Quantum Games on Quantum Periodic Automata","volume":"3","author":"Giannakis","year":"2015","journal-title":"Computation"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Andronikos, T., and Stefanidakis, M. (2022). A Two-Party Quantum Parliament. Algorithms, 15.","DOI":"10.3390\/a15020062"},{"key":"ref_43","unstructured":"IBM (2022, April 03). IBM Quantum Composer. Available online: https:\/\/quantum-computing.ibm.com\/composer."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1109\/JSTQE.2003.820918","article-title":"Long-distance quantum communication with entangled photons using satellites","volume":"9","author":"Aspelmeyer","year":"2003","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"key":"ref_45","unstructured":"Qiskit (2022, April 03). Qiskit Open-Source Quantum Development. Available online: https:\/\/qiskit.org."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/8\/1692\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:08:51Z","timestamp":1760141331000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/8\/1692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,15]]},"references-count":45,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["sym14081692"],"URL":"https:\/\/doi.org\/10.3390\/sym14081692","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2022,8,15]]}}}