Next Article in Journal
A Systematic Approach to Exergy Efficiency of Steady-Flow Systems
Previous Article in Journal
Information–Entropy Analysis of Stellar Evolutionary Stages with Application to FS CMa Objects
Previous Article in Special Issue
Lightweight Quantum Authentication and Key Agreement Scheme in the Smart Grid Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits

1
School of Communication and Electronic Engineering, Jishou University, Jishou 416000, China
2
School of Computer Science and Artificial Intelligence, Huaihua University, Huaihua 418099, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(11), 1107; https://doi.org/10.3390/e27111107
Submission received: 17 September 2025 / Revised: 22 October 2025 / Accepted: 23 October 2025 / Published: 26 October 2025
(This article belongs to the Special Issue Quantum Information Security)

Abstract

This paper presents a semi-quantum secret sharing (SQSS) protocol based on three-particle W states, designed for efficient and secure secret sharing in quantum-resource-constrained scenarios. In the protocol, a fully quantum-capable sender encodes binary secrets using W, while receivers with limited quantum capabilities reconstruct the secret through collaborative Z basis measurements and classical communication, ensuring no single participant can obtain the complete information independently. The protocol employs a four-state decoy photon technique ( { | 0 , | 1 , | + , | } ) and position randomization, combined with photon number splitting (PNS) and wavelength filtering (WF) technologies, to resist intercept–resend, entanglement–measurement, and double controlled-NOT(CNOT) attacks. Theoretical analysis shows that the detection probability of intercept–resend attacks increases exponentially with the number of decoy photons (approaching 1). For entanglement–measurement attacks, any illegal operation by an attacker introduces detectable quantum state disturbances. Double CNOT attacks are rendered ineffective by the untraceability of particle positions and mixed-basis strategies. Leveraging the robust entanglement of W states, the protocol proves that the mutual information between secret bits and single-participant measurement results is strictly zero, ensuring lossless reconstruction only through authorized collaboration.

1. Introduction

In the current digital landscape, safeguarding personal privacy, corporate data assets, and national security infrastructures has become paramount. The rapid advancement of information technology has exposed traditional cryptographic schemes to escalating challenges, particularly with the emergence of quantum computing, which poses a fundamental threat to classical encryption algorithms. To counter these threats, researchers have turned to novel cryptographic paradigms. Among these, secret sharing [1] has emerged as a cornerstone of distributed cryptography, offering robust solutions for secure multi-party collaboration and privacy preservation. By partitioning secret information among multiple participants, this technique ensures that only authorized subsets of participants can reconstruct the original secret. However, the growing capabilities of quantum computers have undermined the security of classical secret sharing protocols. To address this issue, Hillery et al. [2] introduced the first quantum secret sharing (QSS) protocol in 1999, employing Greenberger–Horne–Zeilinger (GHZ) states. This pioneering work has greatly accelerated the development of subsequent theoretical work in this field [3,4,5].
Meanwhile, experimental efforts have progressively translated these theoretical constructs into practical implementations. In 2018, Zhou et al. [6] leveraged the multipartite bound entanglement of optical fields to share quantum secrets among four participants, providing a convenient and advantageous pathway for practical QSS applications. The following year, Williams et al. [7] experimentally realized QSS using polarization-entangled photon pairs, demonstrating the essential correlations for three-party secret sharing while highlighting the protocol’s straightforward extensibility to additional parties. More recently, in 2024, Qin et al. [8] proposed an efficient, secure, and flexible QSS scheme involving eight users, facilitated by a continuous-variable eight-partite bound entangled state. Building on these advances, Xiao et al. [9] in 2025 presented an experimental demonstration where their protocol’s remarkable scalability advantages were particularly evident within a fully connected quantum network, enabling real-time and efficient QSS among multiple users.
However, existing QSS protocols mandate that all participants possess full quantum capabilities—including quantum state generation, manipulation, and measurement—requirements that remain prohibitively expensive and challenging to scale with current technology. To reconcile cryptographic security with practical quantum resource constraints, Boyer et al. [10] pioneered semi-quantum key distribution (SQKD) in 2007. This framework establishes a fundamental distinction between participant capabilities: while one party maintains full quantum capabilities, other participants (termed “classical” or “semi-quantum”) are restricted to specific, minimal quantum operations. The rationale for restricting semi-quantum participants to SIFT (measure and resend in the Z basis) and CTRL (reflect) operations is twofold: theoretically, it explores the minimal quantum resources required for secure protocols; practically, it models realistic deployment scenarios where participants may have access to basic quantum measurement devices but lack sophisticated quantum preparation capabilities. Crucially, these restricted operations are physically realizable with current technology: SIFT can be implemented with a single-photon detector and a classical pulse source, while CTRL can be trivially achieved using passive optical components like mirrors or optical switches. This paradigm has catalyzed subsequent SQKD protocol developments [11,12], with rigorous unconditional security proofs established in subsequent works [13,14]. Here, “unconditional security” signifies that the protocol’s security is guaranteed by the laws of quantum mechanics, not by computational assumptions, making it resilient even against attackers with unlimited computational power. This robust security stems from the fact that any eavesdropping attempt inevitably disturbs the transmitted quantum states, a disturbance that is detected through classical post-processing (e.g., eavesdropping detection and privacy amplification). Crucially, the introduction of semi-quantum participants enhances practicality without compromising this information-theoretic security foundation.
In 2010, Li et al. [15] pioneered the first semi-quantum secret sharing (SQSS) protocol utilizing GHZ states, thereby relaxing quantum capability requirements. Subsequent analysis by Lin et al. [16] identified security flaws in [15] and proposed countermeasures. To reduce implementation complexity, Li et al. [17] developed an SQSS protocol using single-particle product states. Xie et al. [18] introduced a three-particle entangled state SQSS protocol for sharing a specific secret message. Yin et al. [19] demonstrated vulnerabilities in [18] against adversarial participants and proposed an GHZ-enhanced variant. Yin et al. [20] advanced SQSS efficiency via Bell-state implementations. Tsai et al. [21] designed the first W-state SQSS protocol, sacrificing efficiency for stronger entanglement. Tian et al. [22] formulated a flexible Bell-state SQSS scheme, later shown by He et al. [23] to be vulnerable to double controlled-NOT (CNOT) attacks. Li et al. [24] constructed a cluster-state SQSS protocol with quantum entanglement swapping technology, though it faced resource-intensive challenges. Chen et al. [25] proposed a χ -state SQSS framework. Recent advances include Hou et al. [26]’s hybrid GHZ-based circular SQSS and Ma et al. [27]’s third-party-assisted protocol for participants with limited quantum capabilities.
This paper proposes an efficient and secure SQSS protocol based on W states, representing a significant extension of the semi-quantum paradigm to multi-party scenarios. Unlike existing SQSS protocols that predominantly focus on two-party scenarios or require complex quantum resources, our protocol leverages the robust entanglement properties of W states while maintaining minimal quantum requirements for two of the three participants. Specifically, only Alice requires full quantum capabilities for state preparation, while Bob and Charlie operate as semi-quantum participants restricted to SIFT and CTRL operations. This configuration substantially reduces the practical implementation barriers compared to fully quantum protocols. For security verification, we employ decoy photon integration, rigorously demonstrating resilience against conventional attack vectors including double CNOT attacks. Benchmarked against existing SQSS schemes, our protocol demonstrates both enhanced operational efficiency and practical viability while maintaining strong security guarantees.
The paper proceeds as follows. Section 2 presents the foundational theoretical frameworks essential to the proposed scheme. Section 3 details the design and operational steps of our SQSS protocol. Section 4 provides a rigorous security analysis, evaluating the protocol’s resilience against potential attacks. Section 5 explores the protocol’s efficiency through quantitative metrics and conducts a comparative analysis with existing schemes. Finally, Section 6 concludes by synthesizing the findings and discussing future research directions.

2. Preliminary Theory

2.1. Quantum Gates

Quantum logic gates constitute the foundational operational units in quantum computation, enabling state manipulation and evolution. This section delineates four critical quantum gates: the Y-axis rotation gate ( R y ), Pauli-X (X) gate, CNOT gate, and controlled-Z (CZ) gate.
The R y gate performs a unitary transformation on a single qubit by rotating its Bloch sphere representation about the Y-axis by angle θ . Its matrix representation is
R y ( θ ) = cos θ 2 sin θ 2 sin θ 2 cos θ 2 .
The X gate inverts the computational basis states | 0 and | 1 , defined by
X = 0 1 1 0 .
The CNOT gate operates on two qubits, where the state of the target qubit undergoes an X transformation conditioned on the control qubit being | 1 . Its matrix form is
CNOT = 1 0 0 0 0 1 0 0 0 0 0 1 0 0 1 0 .
The CZ gate introduces a conditional phase shift, applying a Z gate to the target qubit only when the control qubit is | 1 . Its matrix representation is
CZ = 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 .
To construct the W state, a specialized two-qubit gate (F gate) is designed by combining rotations and the CZ gate. This gate enables controlled probability distribution and entanglement between qubits, critical for generating the equal-amplitude superposition of single-excitation states in W states. It can be expressed as
F i , j ( θ ) = I i R y ( j ) ( θ ) C Z i , j I i R y ( j ) ( θ )
I denotes the unit matrix (which does not change the qubit state it acts on); ⊗ represents the tensor product; and i , j { 0 , 1 , 2 , } are the labels of the two distinct qubits targeted by the F gate.
The selection of angle θ is the core for achieving equal probability distribution in the F gate, and its analytical expression is
θ = arccos 1 n k + 1
Here, n represents the length of the particle, and k indicates the number of times the F gate is used.
These quantum gates form the building blocks for constructing the W states utilized in our protocol (see Section 2.2). Specifically, the CNOT and CZ gates are critical for entangling particles during W state preparation, while the X gate enables state transformations between | W 0 and | W 1 for secret encoding (see Equations (7) and (8)). Their combined operations ensure the robust entanglement and specific bit encoding necessary for secure SQSS, as detailed in Section 3.

2.2. W State

The proposed protocol employs the three-particle W state [28] as the specific quantum resource for information encoding. We define | W 1 as the three-particle W state, given by
| W 1 = 1 3 | 001 + | 010 + | 100
Figure 1 illustrates the quantum circuit for W-state preparation, constructed through systematic gate operations on three initialized qubits ( q 0 0 , q 0 1 , q 0 2 ) in the state | 0 | 0 | 0 . First, apply an X gate to q 0 2 . Second, apply the F gate to the qubit pairs ( q 0 2 , q 0 1 ) and ( q 0 1 , q 0 0 ). Then, apply the CNOT gate to the qubit pairs ( q 0 1 , q 0 2 ) and ( q 0 0 , q 0 1 ), respectively. Finally, the W state is obtained at the output of the circuit.
To verify the correctness of the quantum circuit, we conducted 1024 simulations using IBM Qiskit (Version: 2.1.2) on PyCharm. The test results are shown in Figure 2. The three measurement outcomes of the W state, labeled as | 001 , | 010 , | 100 , exhibit approximately equal probabilities, demonstrating that the circuit can effectively prepare the W state.
An alternative W-state variant serves as auxiliary quantum resource. The state | W 0 is obtained by applying an X gate to the third qubit of | W 1 as follows:
| W 0 = I I X | W 1 = 1 3 | 000 + | 011 + | 101

2.3. Semi-Quantum Model

This semi-quantum communication model [10] is illustrated in Figure 3. Within this architecture, Alice maintains full quantum operational capacity for executing arbitrary quantum transformations, while Bob operates under quantum constraints limited to primitive operations.

3. Protocol

In the proposed protocol, three participants are included: Alice is equipped with full quantum capabilities, enabling the execution of complex quantum operations, while Bob and Charlie have restricted quantum capabilities and can only perform simple quantum operations. Specifically, in this study, Bob and Charlie acquire secret information by measuring the entangled states prepared by Alice. Each party can only access partial information, and the complete secret can only be reconstructed through collaboration between them; neither party can independently obtain the secret.
Moreover, the proposed scheme is not limited to ideal quantum channels. Owing to the incorporation of decoy photon sequences, photon number splitting (PNS) and wavelength filtering (WF) techniques, as well as classical error correction and privacy amplification mechanisms, the protocol remains feasible and secure even under imperfect communication channels affected by noise, decoherence, or photon loss. The intrinsic correlation of the three-particle W states ensures that the correctness and security of the reconstructed secret are maintained as long as the channel fidelity exceeds a reasonable threshold. The steps of the proposed SQSS protocol are detailed in Figure 4, with the specific procedures elaborated as follows.

3.1. Sharing Phase

Step 1. Alice generates the secret message sequences m = { m 1 , m 2 , , m n } { 0 , 1 } n and prepares the corresponding W states, where | W 0 is generated for 0 and | W 1 is generated for 1, resulting in a sequence W = { | W 1 , | W 2 , , | W n } { | W 0 | W 1 } n . She then divides W into three sequences W a = { | W 1 a , | W 2 a , , | W n a } , W b = { | W 1 b , | W 2 b , , | W n b } , and W c = { | W 1 c , | W 2 c , , | W n c } , where W a , W b , and W c are constructed from the first, second, and third particles of each W state in sequence W, respectively.
Step 2. Alice prepares two decoy photon sequences of length l, where each decoy photon is randomly selected from the four single-photon states { | 0 , | 1 , | + , | } . She then randomly inserts the decoy photon sequences into the W b and W c sequences, generating new sequences W b and W c . The positions and states of the decoy photons are recorded for later verification of channel security.
Step 3. To defend against Trojan horse attacks [29,30,31,32], Alice’s setup is equipped with a PNS and WF. Alice sends W b and W c to Bob and Charlie, respectively. After Bob and Charlie receive their respective sequences, they announce the completion of the reception.
Step 4. Alice announces the positions of the decoy photons to Bob and Charlie. Bob and Charlie identify their respective decoy particles, perform a random permutation, and record the new positions. They then apply either the CTRL or SIFT operation to these particles. After completing the operations, they send the particles back to Alice through the reverse channel.
Step 5. Upon receiving the decoy particles, Bob and Charlie inform Alice of the new positions of their respective permuted sequences and the operations (CTRL or SIFT) they performed. Alice subsequently conducts measurements on these decoy particles using basis sets corresponding to the declared operations, then cross-verifies the obtained results against her initially prepared states, as specified in Table 1. If the error rate exceeds a preestablished threshold, the protocol is terminated immediately. Conversely, if the error rate remains within acceptable limits, the quantum channel is deemed safe, and the protocol proceeds to the subsequent phase.

3.2. Reconstruction Phase

Step 6. After passing the eavesdropping check, Alice performs a Z basis measurement on her sequence W a , records the measurement results as M a , and publicly announces them. When Bob and Charlie collaborate to recover Alice’s secret, they perform Z basis measurements on their respective particle sequences W b and W c . Using error correction codes and privacy amplification techniques [33,34], they record their measurement results as M b and M c .
Step 7. To verify the validity of the shared secret, Bob and Charlie select a subset of test bits from M b and M c , combine them with M a , and perform XOR operations on these bits. They then check if the resulting values match the corresponding bits of m. If they match, they proceed to recover the secret sequence by computing m = M a M b M c , as illustrated in Table 2.

3.3. An Example

Here, we provide an example to illustrate our scheme. Suppose Alice’s secret information is m = { 0 , 1 , 1 , 0 , 0 , 0 } . Based on m, she prepares the sequence W = { W 0 , W 1 , W 1 , W 0 , W 0 , W 0 } and divides it into three sequences W a , W b and W c . Alice then prepares two decoy sequences of length 4 and randomly inserts them into W b = { W 0 b , W 1 b , W 1 b , W 0 b , W 0 b , W 0 b , } and W c = { W 0 c , W 1 c , W 1 c , W 0 c , W 0 c , W 0 c } , generating new sequences W b = { W 0 b , W 1 b , | + , W 1 b , | 0 , | 1 , W 0 b , W 0 b , W 0 b , | } and W c = { W 0 c , | , W 1 c , W 1 c , | 0 , W 0 c , | 1 , W 0 c , W 0 c , | + } , while recording the positions of the decoy photon. Alice sends these two sequences to Bob and Charlie, respectively. After passing the eavesdropping check, Alice measures her sequence and publicly announces M a = { 0 , 1 , 0 , 0 , 0 , 1 } . When Bob and Charlie want to recover Alice’s secret, they perform Z basis measurements on their respective particle sequences, obtaining measurement results M b = { 0 , 0 , 0 , 1 , 1 , 1 } and M c = { 0 , 0 , 1 , 1 , 1 , 0 } . Thus, the secret information m is uniquely retrieved through the collaborative computation m = M a M b M c , leveraging the pre-defined XOR reconstruction rule among the three participants’ measurement results.

4. Security Analysis

This section evaluates the protocol’s security against two types of attackers: external adversaries and internal attackers. Given internal attackers’ privileged access to protocol information, we focus on internal attacks. Consider a scenario where a dishonest participant Bob operates as an internal attacker with full quantum capabilities. Below, we describe the security analysis of the proposed protocol against such attacks.

4.1. Intercept–Resend Attack

In this type of attack, the internal attacker Bob intercepts the qubit sequence W c transmitted from Alice to Charlie. He performs basis measurements to extract secret information, then resends measured states to Charlie. Such interventions inevitably perturb decoy photon states, enabling detection through two observable scenarios Table 3.
Consider the scenario where Alice prepares the initial state of the decoy photon as | 0 (or | 1 ). Bob has a probability of 50% of choosing to measure in the same basis as the decoy state. In such a case, regardless of the operation Charlie selects, the eavesdropping attempt by Bob will remain undetected. On the other hand, Bob also has a probability of 50% of choosing a measurement basis different from that of the decoy state. In this situation, regardless of whether Charlie opts for the CTRL or SIFT operation, there is a probability of 50% of introducing a disturbance to the state. Consequently, the probability p 0 of being detected is calculated as follows: p 0 = 1 2 × 1 2 = 1 4 .
Now, assume that Alice prepares the initial state of the decoy photon as | + (or | ). Bob has a 50% probability of choosing to measure in the same basis as the decoy state. In this instance, regardless of the operation Charlie performs, the eavesdropping attack will not be detected. Additionally, Bob has a 50% probability of choosing to measure in a basis different from the decoy state. If Charlie chooses the CTRL operation, there is a probability of 50% of causing a disturbance; if Charlie chooses the SIFT operation, the eavesdropping attack will not be detected. Therefore, the probability p 1 of being detected is calculated as follows: p 1 = 1 2 × 1 2 × 1 2 = 1 8 .
It should be noted that the length of the decoy particle sequence is l. Assuming that the decoy particles in the Z basis and those in the X basis each account for half of the total decoy particles, based on the analysis, we can infer that the probability p of detecting Bob’s attack is
p = 1 ( 1 p 0 ) l 2 ( 1 p 1 ) l 2 = 1 ( 3 4 ) l 2 ( 7 8 ) l 2 = 1 ( l )
This demonstrates that the protocol’s interception detection probability approaches certainty as the number of decoy photons l increases.

4.2. Entangle–Measure Attack

Suppose Bob, a malicious participant, attempts to illicitly extract secret information through entanglement–measurement attacks [10,22,23,26,27] on the quantum channels between Alice and Charlie. Specifically, he prepares ancillary particles, entangles them with the transmitted states, and extracts information via measurements on these auxiliary systems.
In the security analysis, Bob’s potential eavesdropping on the forward and reverse channels is mathematically formulated as unitary transformations U F and U R , corresponding to the forward and reverse directions, respectively. Given the protocol’s exclusive reliance on decoy photons for eavesdropping detection, the analysis focuses on how entanglement–measurement attacks impact the states of these decoy photons. This attack mechanism is illustrated in Figure 5.
When the decoy particles are transmitted to Charlie, Bob performs the U F operation on the decoy particles C and the detection particles F, and the system evolves as follows:
U F | 0 C | F n = | 0 | F 00 + | 1 | F 01
U F | 1 C | F n = | 0 | F 10 + | 1 | F 11
U F | + C | F n = | 0 | F 00 + | 1 | F 01 + | 0 | F 10 + | 1 | F 11
U F | C | F n = | 0 | F 00 + | 1 | F 01 | 0 | F 10 | 1 | F 11
Here, | F i j denotes the state of Bob’s auxiliary particles. Upon Charlie’s reception of the qubits transmitted by Alice, he may apply either the SIFT or CTRL operation to the particles at hand. Should Charlie select the SIFT operation, the system will undergo a transformation to
U R | a | F a b = | a | R a b , a , b { 0 , 1 }
The critical requirement for the attack operation U R is that it must leave the state of system C unchanged. When Charlie chooses the CTRL operation, the composite system evolves as
U R | 0 | F n = | 0 | R 00 + | 1 | R 01
U R | 1 | F n = | 0 | R 10 + | 1 | R 11
U R | + | F n = 1 2 [ | + ( | R 00 + | R 01 + | R 10 + | R 11 ) + | ( | R 00 | R 01 + | R 10 | R 11 ) ]
U R | | F n = 1 2 [ | + ( | R 00 + | R 01 | R 10 | R 11 ) + | ( | R 00 | R 01 | R 10 + | R 11 ) ]
If Bob wants to succeed in the eavesdropping detection, then Equations (15)–(18) should be satisfied:
| R 01 = | R 10 = | R 00 | R 01 + | R 10 | R 11 = | R 00 + | R 01 | R 10 | R 11 = 0
According to Equation (19), it can be deduced that
| R 00 = | R 11 = | τ
By substituting Equation (20) into Equations (15)–(18), they can be written as
U R | 0 | F n = | 0 | τ
U R | 1 | F n = | 1 | τ
U R | + | F n = | + | τ
U R | | F n = | | τ
Equations (21)–(24) results demonstrate that Bob’s auxiliary particles must always reside in the state | τ to avoid detection, implying that the final state of his detection system is entirely independent of Charlie’s measurement outcomes. Therefore, the protocol maintains resilience against entanglement–measure attacks by ensuring that any such malicious operations leave no detectable trace on the decoy photon states.
However, the aforementioned analysis only considers the ideal scenario where Bob attempts to avoid detection completely. In practice, Bob may employ more general individual attack strategies, accepting a certain error rate to gain partial information. To quantitatively analyze such attacks, we adopt the framework established by Slutsky et al. [35], which defines a rigorous relationship between the error rate and the maximum information obtainable by an eavesdropper.
In Slutsky’s model, the eavesdropper performs independent operations on each qubit, entangling it with a probe system through a unitary evolution U. Due to protocol symmetry, the most general attack can be parameterized using four parameters ( λ , μ , θ , ϕ ) . These parameters define the coefficients of the probe system states (see Equation (4) in Ref. [35]) and fully determine both the attack’s impact on quantum states and the induced error rate.
Although these parameters are essential for optimizing attack strategies, Slutsky et al. have demonstrated through optimization methods that for any given error rate E, there exists a definite upper bound I m a x R ( E ) on the maximum Renyi information obtainable about the final key. Therefore, in our security proof, we can directly utilize the established relationship I m a x R ( E ) without explicitly handling these parameters.
In our protocol, the decoy photons are prepared in four non-orthogonal states { | 0 , | 1 , | + , | } . Thus, Slutsky’s analysis is directly applicable. Let E f and E b represent the error rates of the forward and backward channels, respectively. Alice and Charlie can independently estimate these error rates by comparing the decoy photons transmitted in both directions.
According to their findings, for a given error rate E, the upper bound on the maximum Renyi information I R max ( E ) satisfies
I m a x R ( E ) = log 2 ( 1 + c o s 2 2 ξ ) , s i n 2 ξ = Q m i n ( E )
where Q m i n ( E ) denotes the minimum state overlap achieved through parameter optimization. For the bidirectional channel, Bob’s information gain from forward and backward attacks is cumulative in the worst case. Thus, the total information upper bound becomes
I t o t a l R ( E ) I m a x R ( E f ) + I m a x R ( E b )
During privacy amplification, Alice and Charlie determine the compression ratio based on the observed total error rate E total = E f + E b and the corresponding information bound I t o t a l R . Specifically, they compress the raw key to approximately 1 I t o t a l R times its original length. This ensures that even under optimal individual attacks on both channels, Bob’s information about the final key remains exponentially suppressed.
Consequently, our protocol provides unconditional security against all individual attacks—not only resisting idealized entanglement–measurement attacks with zero errors but also leveraging actual error rates and privacy amplification to maintain security under practical conditions.

4.3. Double CNOT Attack

First proposed by Boyer et al. [10], the double CNOT attack represents a sophisticated eavesdropping approach designed to exploit vulnerabilities in semi-quantum communication frameworks. By deploying cascaded CNOT operations, malicious actors can disrupt quantum signal transmission, aiming to extract information surreptitiously. As a core two-qubit operation in quantum computing, the CNOT gate modifies the target qubit state conditionally based on the control qubit, which attackers may leverage to entangle their auxiliary qubits with protocol-critical quantum states for unauthorized information extraction. Security assessments of related protocols [23,36,37,38,39,40] emphasize that rigorous analysis of such attack vectors is essential to guaranteeing protocol-level security.
In our protocol, Bob still acts as the attacker. To obtain the information sent by Alice to Charlie, Bob attempts to use the CNOT attack. First, Bob needs to generate an initial single photon state | 0 b and perform the CNOT operation, where Charlie’s qubit serves as the control bit and the qubit prepared by Bob serves as the target bit. We use decoy photons to detect eavesdropping behavior. At this stage, the quantum system undergoes unitary evolution into the composite state:
C N O T ( | 0 c | 0 b ) = | 00 c 1 b 1
C N O T ( | 1 c | 0 b ) = | 11 c 1 b 1
C N O T ( | + c | 0 b ) = 1 2 ( | 00 + | 11 ) c 1 b 1
C N O T ( | c | 0 b ) = 1 2 ( | 00 | 11 ) c 1 b 1
Here, the subscript c represents the particle sent from Alice to Charlie. After performing the first CNOT gate operation on the pair { c , b } , the result is { c 1 , b 1 } . Bob then sends c 1 to Charlie. Charlie applies either a CTRL or SIFT operation to his received particle, transforming c 1 into c 2 . After completing all operations, Charlie permutes the order of all particles. Consequently, Bob loses the ability to determine the exact positions of the returned particles. This means Bob cannot identify which specific particle requires a CNOT gate operation for each returned particle from Charlie. The detailed scenarios are presented in Table 4.
To facilitate understanding, as shown in Table 4, Alice prepares an initial decoy particle in the state | + c . To obtain information, Bob needs to perform a CNOT attack on this particle using the ancillary particle | 0 b . At this point, the system will transform into 1 2 ( | 00 + | 11 ) c 1 b 1 . When Charlie selects the CTRL operation and sends the particle back to Alice through the reverse channel, if Bob does not execute the CNOT operation, there is a probability of 1 2 that Alice will obtain the state | when measuring c 2 in the X basis. The probability of detection, when the length of such a sequence is L, is given by the following formula: if this situation occurs L times, then the probability of being detected is p = 1 1 2 L ( L ) . Therefore, Bob must execute the CNOT operation to avoid detection. Since he does not know which particle to perform the CNOT operation on, he has to apply the operation to all the decoy particles. In this case, the state of the target particle b 2 remains | 0 all the time, which means that Bob cannot obtain the secret message through the double CNOT attack.

4.4. Trojan Horse Attack

Trojan horse attacks typically involve a malicious participant Bob injecting Trojan horse photons into the quantum channel, aiming to analyze the characteristics of reflected or modulated quantum states to determine whether participant Charlie has performed measurement or reflection operations. Specifically, attackers exploit optical imperfections in quantum devices, such as residual polarization crosstalk, phase drifts, or reflection loss variations, combined with high-precision detection schemes to identify deterministic state changes (e.g., polarization rotations or temporal delays) caused by measurements or stochastic noise patterns retained during reflections. However, Charlie can deploy PNS and WF techniques [29,31,41] to detect such eavesdropping attempts prior to executing measurements or reflections, thereby mitigating the attack risk.

5. Efficiency and Comparison

According to references [42], the information-theoretic efficiency of the protocol is defined as η = b s q t + b t , where b s denotes the total number of shared classical bits, q t represents the quantity of qubits consumed qubits, and b t is the number of classical bits. In this protocol, the length of the secret shared between Alice and the participants is n. The lengths of the shared sequences W a , W b , and W c used for transmitting the secret part are all n. Since eavesdropping detection is required, decoy particles of length l need to be inserted into both sequences B and C. Therefore, we calculate that b s = n , q t = 3 n + 2 l , b t = 0 , and the qubit efficiency is η = n 3 n + 2 l .
Our protocol outperforms analogous schemes in quantum resource efficiency and attack resilience, as systematically validated in Table 5. Unlike Ref. [24], it eliminates entanglement swapping to avoid technical complexity and resource overhead, while supporting specific bit sharing (similar to Refs [18,22]) and uniquely resisting double CNOT attacks. Compared to the W state protocol [21], our design reduces quantum resource consumption via two key optimizations: 1. direct secret-bit encoding into W states to eliminate redundant entanglement generation; 2. strategic decoy photon insertion in only two of three particle streams, minimizing overhead while maintaining eavesdropping detection (Section 4.1). This efficiency edge also distinguishes it from Ref [26]’s architecture, avoiding the heavy quantum bit burden in its sharing process. Such optimizations make our protocol ideal for resource-constrained scenarios where qubit usage must be minimized for practical deployment.

6. Conclusions

This paper proposes an efficient and secure SQSS scheme based on W-state sharing of specific bits. The scheme enables classical participants to measure in the Z basis and collaborate to share secret messages, with no single party able to obtain the secret message alone. We use decoy photons for eavesdropping detection. Security analysis of the protocol demonstrates its strong resistance to eavesdropping, entanglement measurement, double CNOT attacks, and Trojan horse attacks. Subsequently, we compare this protocol with previous ones, highlighting the unique features and advantages of the proposed method.
A key consideration for any secret sharing protocol is its scalability. The proposed three-party protocol can be conceptually extended to accommodate n participants through two primary approaches. The most straightforward method is to utilize an n partite W state, defined as W n . In this scheme, the secret is encoded into the choice of the W n state, and each of the n participants holds one particle. The reconstruction rule generalizes such that the XOR of all n measurement outcomes reveals the secret bit. While this maintains the protocol’s elegant structure, its practical implementation becomes challenging due to the difficulty in generating and distributing large-scale, high-fidelity n-particle entangled states. A more practical and robust approach, suitable for near-term implementation, is to structure the protocol hierarchically. A single secret can be shared recursively: for example, Alice first shares the secret with Bob and an intermediate party using the existing three-party protocol. This intermediate party then acts as a new “dealer” to share its share with two other parties, and so on. This tree-like structure builds upon the proven three-party building block, easing the technological requirements at the cost of increased communication rounds and requiring trust in the intermediate parties.
Future research directions include further exploration of these N-party scenarios for flexible scalability with dynamic participant groups, constructing a (T, N)-threshold structured SQSS protocol to enable secret reconstruction by any T participants, and adapting the protocol to real-world applications to ensure effective collaboration among participants with limited quantum capabilities, providing a clear pathway for its practical deployment.

Author Contributions

K.X. and R.L. contributed to conceptualization and methodology development. K.X., along with S.L., conducted formal analysis. K.X. was also responsible for software development, investigation, resource provision, and writing. R.L. secured funding and oversaw project administration. L.L. participated in investigation, resource provision, and validation. S.L. assisted in formal analysis and validation. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (Grant 338 288 No. 62172182), the Hunan Provincial Natural Science Foundation of China under Grant Nos. 2025JJ70445, and the Aid Program for Science and Technology Innovative Research Team in Higher Educational Institutions of Hunan Province.

Data Availability Statement

The data presented in this study are available in the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  2. Hillery, M.; Bužek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829. [Google Scholar] [CrossRef]
  3. Guo, G.P.; Guo, G.C. Quantum secret sharing without entanglement. Phys. Lett. A 2003, 310, 247–251. [Google Scholar] [CrossRef]
  4. Xiao, L.; Lu Long, G.; Deng, F.G.; Pan, J.W. Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 2004, 69, 052307. [Google Scholar] [CrossRef]
  5. Gao, F.; Guo, F.Z.; Wen, Q.Y.; Zhu, F. Quantum sharing of classical secret based on local operations. In Proceedings of the 5th International Conference on Information Communications & Signal Processing, Bangkok, Thailand, 6–9 December 2005; pp. 986–988. [Google Scholar]
  6. Zhou, Y.; Yu, J.; Yan, Z.; Jia, X.; Zhang, J.; Xie, C.; Peng, K. Quantum secret sharing among four players using multipartite bound entanglement of an optical field. Phys. Rev. Lett. 2018, 121, 150502. [Google Scholar] [CrossRef]
  7. Williams, B.P.; Lukens, J.M.; Peters, N.A.; Qi, B.; Grice, W.P. Quantum secret sharing with polarization-entangled photon pairs. Phys. Rev. A 2019, 99, 062311. [Google Scholar] [CrossRef]
  8. Qin, Y.; Cheng, J.; Ma, J.; Zhao, D.; Yan, Z.; Jia, X.; Xie, C.; Peng, K. Efficient and secure quantum secret sharing for eight users. Phys. Rev. Res. 2024, 6, 033036. [Google Scholar] [CrossRef]
  9. Xiao, Y.R.; Yin, H.L.; Hua, W.J.; Cao, X.Y.; Chen, Z.B. Experimental Efficient Source-Independent Quantum Secret Sharing against Coherent Attacks. Phys. Rev. Lett. 2025, 135, 150801. [Google Scholar] [CrossRef] [PubMed]
  10. Boyer, M.; Kenigsberg, D.; Mor, T. Quantum key distribution with classical Bob. In Proceedings of the 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM’07), French Caribbean, France, 2–6 January 2007; p. 10. [Google Scholar]
  11. Sun, Z.W.; Du, R.G.; Long, D.Y. Quantum key distribution with limited classical Bob. Int. J. Quantum Inf. 2013, 11, 1350005. [Google Scholar] [CrossRef]
  12. Yu, K.F.; Yang, C.W.; Liao, C.H.; Hwang, T. Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 2014, 13, 1457–1465. [Google Scholar] [CrossRef]
  13. Krawec, W.O. Security proof of a semi-quantum key distribution protocol. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 686–690. [Google Scholar]
  14. Zhang, W.; Qiu, D.; Mateus, P. Security of a single-state semi-quantum key distribution protocol. Quantum Inf. Process. 2018, 17, 135. [Google Scholar] [CrossRef]
  15. Li, Q.; Chan, W.H.; Long, D.Y. Semiquantum secret sharing using entangled states. Phys. Rev. A 2010, 82, 022303. [Google Scholar] [CrossRef]
  16. Lin, J.; Yang, C.W.; Tsai, C.W.; Hwang, T. Intercept-resend attacks on semi-quantum secret sharing and the improvements. Int. J. Theor. Phys. 2013, 52, 156–162. [Google Scholar] [CrossRef]
  17. Li, L.; Qiu, D.; Mateus, P. Quantum secret sharing with classical Bobs. J. Phys. A Math. Theor. 2013, 46, 045304. [Google Scholar] [CrossRef]
  18. Xie, C.; Li, L.; Qiu, D. A novel semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 2015, 54, 3819–3824. [Google Scholar] [CrossRef]
  19. Yin, A.; Fu, F. Eavesdropping on semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 2016, 55, 4027–4035. [Google Scholar] [CrossRef]
  20. Yin, A.; Wang, Z.; Fu, F. A novel semi-quantum secret sharing scheme based on Bell states. Mod. Phys. Lett. B 2017, 31, 1750150. [Google Scholar] [CrossRef]
  21. Tsai, C.W.; Yang, C.W.; Lee, N.Y. Semi-quantum secret sharing protocol using W-state. Mod. Phys. Lett. A 2019, 34, 1950213. [Google Scholar] [CrossRef]
  22. Tian, Y.; Li, J.; Chen, X.B.; Ye, C.Q.; Li, H.J. An efficient semi-quantum secret sharing protocol of specific bits. Quantum Inf. Process. 2021, 20, 217. [Google Scholar] [CrossRef]
  23. He, F.; Xin, X.; Li, C.; Li, F. Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement. Quantum Inf. Process. 2024, 23, 51. [Google Scholar] [CrossRef]
  24. Li, C.; Ye, C.; Tian, Y.; Chen, X.B.; Li, J. Cluster-state-based quantum secret sharing for users with different abilities. Quantum Inf. Process. 2021, 20, 385. [Google Scholar] [CrossRef]
  25. Chen, Y.; Ye, T.-Y. Semiquantum secret sharing by using χ-type states. Eur. Phys. J. Plus 2022, 137, 1331. [Google Scholar] [CrossRef]
  26. Hou, Y.Y.; Xu, T.; Li, J.; Ye, C.Q.; Wang, Z.; Liu, X.Y. Circular semi-quantum secret sharing based on hybrid single particle and GHZ-type states. Laser Phys. Lett. 2024, 21, 025202. [Google Scholar] [CrossRef]
  27. Ma, Z.; Li, J.; Wang, X.; Liu, F. Semi-quantum secret sharing protocol with specific bits based on third party. Laser Phys. Lett. 2024, 21, 125201. [Google Scholar] [CrossRef]
  28. Dür, W.; Vidal, G.; Cirac, J.I. Three qubits can be entangled in two inequivalent ways. Phys. Rev. A 2000, 62, 062314. [Google Scholar] [CrossRef]
  29. Deng, F.G.; Li, X.H.; Zhou, H.Y.; Zhang, Z.J. Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 2005, 72, 044302. [Google Scholar] [CrossRef]
  30. Cai, Q.Y. Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 2006, 351, 23–25. [Google Scholar] [CrossRef]
  31. Li, X.H.; Deng, F.G.; Zhou, H.Y. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 2006, 74, 054302. [Google Scholar] [CrossRef]
  32. Ashkenazy, A.; Idan, Y.; Korn, D.; Fixler, D.; Dayan, B.; Cohen, E. Photon number splitting attack–proposal and analysis of an experimental scheme. Adv. Quantum Technol. 2024, 7, 2300437. [Google Scholar] [CrossRef]
  33. Deutsch, D.; Ekert, A.; Jozsa, R.; Macchiavello, C.; Popescu, S.; Sanpera, A. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 1996, 77, 2818. [Google Scholar] [CrossRef]
  34. Bennett, C.H.; Brassard, G.; Crépeau, C.; Maurer, U.M. Generalized privacy amplification. IEEE Trans. Inf. Theory 2002, 41, 1915–1923. [Google Scholar] [CrossRef]
  35. Slutsky, B.A.; Rao, R.; Sun, P.C.; Fainman, Y. Security of quantum cryptography against individual attacks. Phys. Rev. A 1998, 57, 2383. [Google Scholar] [CrossRef]
  36. Gu, J.; Lin, P.; Hwang, T. Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol’. Quantum Inf. Process. 2018, 17, 182. [Google Scholar] [CrossRef]
  37. Yang, C.W. Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack. Quantum Inf. Process. 2020, 19, 1950004. [Google Scholar] [CrossRef]
  38. Tsai, C.W.; Lin, J.; Yang, C.-W. Cryptanalysis and improvement in semi-quantum private comparison based on bell states. Quantum Inf. Process. 2021, 20, 1–14. [Google Scholar] [CrossRef]
  39. Tsai, C.W.; Chang, Y.C.; Lai, Y.H.; Yang, C.W. Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process. 2020, 19, 285. [Google Scholar] [CrossRef]
  40. Gu, J.; Hwang, T. Double C-NOT attack on a single-state semi-quantum key distribution protocol and its improvement. Electronics 2022, 11, 2522. [Google Scholar] [CrossRef]
  41. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145. [Google Scholar] [CrossRef]
  42. Cabello, A. Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 2000, 85, 5635. [Google Scholar] [CrossRef]
Figure 1. Circuit for preparation the W state.
Figure 1. Circuit for preparation the W state.
Entropy 27 01107 g001
Figure 2. Probability distribution of W-state measurement results from a 1024-Sample IBM Qiskit Simulation.
Figure 2. Probability distribution of W-state measurement results from a 1024-Sample IBM Qiskit Simulation.
Entropy 27 01107 g002
Figure 3. Semi-quantum communication protocol schematic. Alice creates a single-photon quantum state and transmits it to Bob over the forward channel. In this process, SIFT corresponds to the measure-and-resend mode: Bob measures the qubit in the Z basis, reconstructs the quantum state according to the measurement outcome, and then sends it back to Alice via the backward channel. CTRL, on the other hand, is the reflection mode: Bob takes no action and directly reflects the qubit to Alice through the backward channel. Upon receiving the qubit from the backward channel, Alice randomly chooses a measurement basis to perform the measurement.
Figure 3. Semi-quantum communication protocol schematic. Alice creates a single-photon quantum state and transmits it to Bob over the forward channel. In this process, SIFT corresponds to the measure-and-resend mode: Bob measures the qubit in the Z basis, reconstructs the quantum state according to the measurement outcome, and then sends it back to Alice via the backward channel. CTRL, on the other hand, is the reflection mode: Bob takes no action and directly reflects the qubit to Alice through the backward channel. Upon receiving the qubit from the backward channel, Alice randomly chooses a measurement basis to perform the measurement.
Entropy 27 01107 g003
Figure 4. The process of the proposed SQSS protocol.
Figure 4. The process of the proposed SQSS protocol.
Entropy 27 01107 g004
Figure 5. Bob’s entangle–measure attack.
Figure 5. Bob’s entangle–measure attack.
Entropy 27 01107 g005
Table 1. Eavesdropping detection of decoy particles.
Table 1. Eavesdropping detection of decoy particles.
Initial StateOperationAlice’s Measure Result
| 0 CTRL | 0
SIFT | 0
| 1 CTRL | 1
SIFT | 1
| + CTRL | +
SIFT | 0 / | 1
| CTRL |
SIFT | 0 / | 1
| + = 1 2 ( | 0 + | 1 ) and | = 1 2 ( | 0 | 1 ) .
Table 2. Restores specific bit rules.
Table 2. Restores specific bit rules.
m i W i M a i M b i M c i
0 W 0 000
011
110
1 W 1 001
010
100
Table 3. Restores specific bit rules.
Table 3. Restores specific bit rules.
Initial StateBob’s Measurement BasisCharlie’s OperationAlice’s Detection Probability
| 0 ZSIFT0
CTRL0
XSIFT50%
CTRL50%
| + ZSIFT0
CTRL50%
XSIFT0
CTRL0
Table 4. Bob’s double CNOT attack.
Table 4. Bob’s double CNOT attack.
CNOTOperationCNOT
c , b c 1 , b 1 c 2 , b 1 c 3 , b 2
| 0 | 0 | 00 SIFT | 00 | 0 | 0
CTRL | 00 | 0 | 0
| 1 | 0 | 11 SIFT | 11 | 1 | 0
CTRL | 11 | 1 | 0
| + | 0 1 2 ( | 00 + | 11 ) SIFT | 00 / | 11 | 0 | 0 / | 10
CTRL 1 2 ( | 00 + | 11 ) | + | 0
| | 0 1 2 ( | 00 | 11 ) SIFT | 00 / | 11 | 0 | 0 / | 10
CTRL 1 2 ( | 00 | 11 ) | | 0
Table 5. Performance comparison of other SQSS protocols.
Table 5. Performance comparison of other SQSS protocols.
ProtocolRef. [18]Ref. [21]Ref. [22]Ref. [24]Ref. [25]Ref. [26]Our
Quantum resourceBell stateW stateBell statecluster state χ -type stateGHZ-type stateW state
Qubit efficiency n 8 n n 24 n n 2 n + 2 l n 6 n n 40 n n 5 n n 3 n + 2 l
Sharing secretSpecificUnspecificSpecificUnspecificUnspecificUnspecificSpecific
Resist the CNOT attackNoNoNoNoNoNoYes
Resist the trojan horse attackNoYesYesYesYesYesYes
Entanglement swappingNoNoNoYesNoNoNo
Transport structureDistributedDistributedDistributedDistributedDistributedCircularDistributed
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xing, K.; Lu, R.; Liu, S.; Lan, L. An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits. Entropy 2025, 27, 1107. https://doi.org/10.3390/e27111107

AMA Style

Xing K, Lu R, Liu S, Lan L. An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits. Entropy. 2025; 27(11):1107. https://doi.org/10.3390/e27111107

Chicago/Turabian Style

Xing, Kai, Rongbo Lu, Sihai Liu, and Lu Lan. 2025. "An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits" Entropy 27, no. 11: 1107. https://doi.org/10.3390/e27111107

APA Style

Xing, K., Lu, R., Liu, S., & Lan, L. (2025). An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits. Entropy, 27(11), 1107. https://doi.org/10.3390/e27111107

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop