“…The best-known quantum cryptographic service is quantum key distribution (QKD), in which quantum characteristics are used to assess the probability of the presence of an eavesdropper as a stream of shared, random bits is created 1 . These random, shared, believed-to-be-secret [29,69,91] bits can be used in key cryptographic protocols [2,30,60]. However, this is not the only cryptographic service that is possible; secret sharing [20,41,48,55], secure election protocols [78], and byzantine agreement protocols [9,77] are all known.…”