We show how a quantum secret sharing protocol, similar to that of Hillery,
Buzek, and Berthiaume (Los Alamos e-print archive quant-ph/9806063), can be
implemented using two-particle quantum entanglement, as available experime
ntally today. We also discuss in some detail how both two- and three-partic
le protocols must be carefully designed in order to detect eavesdropping or
a dishonest participant. We also discuss the extension of a multiparticle
entanglement secret sharing and splitting scheme toward a protocol so that
m of n persons with m less than or equal to n can retrieve the secret. [S10
50-2947(99)09301-4].