Next Article in Journal
A Systematic Approach to Exergy Efficiency of Steady-Flow Systems
Previous Article in Journal
Information–Entropy Analysis of Stellar Evolutionary Stages with Application to FS CMa Objects
Previous Article in Special Issue
Lightweight Quantum Authentication and Key Agreement Scheme in the Smart Grid Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits

1
School of Communication and Electronic Engineering, Jishou University, Jishou 416000, China
2
School of Computer Science and Artificial Intelligence, Huaihua University, Huaihua 418099, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(11), 1107; https://doi.org/10.3390/e27111107 (registering DOI)
Submission received: 17 September 2025 / Revised: 22 October 2025 / Accepted: 23 October 2025 / Published: 26 October 2025
(This article belongs to the Special Issue Quantum Information Security)

Abstract

This paper presents a semi-quantum secret sharing (SQSS) protocol based on three-particle W states, designed for efficient and secure secret sharing in quantum-resource-constrained scenarios. In the protocol, a fully quantum-capable sender encodes binary secrets using W, while receivers with limited quantum capabilities reconstruct the secret through collaborative Z basis measurements and classical communication, ensuring no single participant can obtain the complete information independently. The protocol employs a four-state decoy photon technique ({|0,|1,|+,|}) and position randomization, combined with photon number splitting (PNS) and wavelength filtering (WF) technologies, to resist intercept–resend, entanglement–measurement, and double controlled-NOT(CNOT) attacks. Theoretical analysis shows that the detection probability of intercept–resend attacks increases exponentially with the number of decoy photons (approaching 1). For entanglement–measurement attacks, any illegal operation by an attacker introduces detectable quantum state disturbances. Double CNOT attacks are rendered ineffective by the untraceability of particle positions and mixed-basis strategies. Leveraging the robust entanglement of W states, the protocol proves that the mutual information between secret bits and single-participant measurement results is strictly zero, ensuring lossless reconstruction only through authorized collaboration.
Keywords: semi-quantum secret sharing; three-particle W states; decoy photon; double controlled-NOT attacks semi-quantum secret sharing; three-particle W states; decoy photon; double controlled-NOT attacks

Share and Cite

MDPI and ACS Style

Xing, K.; Lu, R.; Liu, S.; Lan, L. An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits. Entropy 2025, 27, 1107. https://doi.org/10.3390/e27111107

AMA Style

Xing K, Lu R, Liu S, Lan L. An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits. Entropy. 2025; 27(11):1107. https://doi.org/10.3390/e27111107

Chicago/Turabian Style

Xing, Kai, Rongbo Lu, Sihai Liu, and Lu Lan. 2025. "An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits" Entropy 27, no. 11: 1107. https://doi.org/10.3390/e27111107

APA Style

Xing, K., Lu, R., Liu, S., & Lan, L. (2025). An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits. Entropy, 27(11), 1107. https://doi.org/10.3390/e27111107

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop