Next Article in Journal
Mathematical Modelling and Optimization Methods in Geomechanically Informed Blast Design: A Systematic Literature Review
Previous Article in Journal
Design of Balanced Wide Gap No-Hit Zone Sequences with Optimal Auto-Correlation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme

1
School of Automation, Central South University, Changsha 410083, China
2
Provincial Key Laboratory of Informational Service for Rural Area of Southwestern Hunan, College of Information Science and Engineering, Shaoyang University, Shaoyang 422000, China
3
School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(15), 2455; https://doi.org/10.3390/math13152455
Submission received: 30 June 2025 / Revised: 27 July 2025 / Accepted: 28 July 2025 / Published: 30 July 2025

Abstract

Quantum secret sharing (QSS) faces inherent limitations in scaling to multi-user networks due to excess noise introduced by highly asymmetric beam splitters (HABSs) in chain-structured topologies. To overcome this challenge, we propose an optical frequency comb-based continuous-variable QSS (OFC CV-QSS) scheme that establishes parallel frequency channels between users and the dealer via OFC-generated multi-wavelength carriers. By replacing the chain-structured links with dedicated frequency channels and integrating the Chinese remainder theorem (CRT) with a decentralized architecture, our design eliminates excess noise from all users using HABS while providing mathematical- and physical-layer security. Simulation results demonstrate that the scheme achieves a more than 50% improvement in maximum transmission distance compared to chain-based QSS, with significantly slower performance degradation as users scale to 20. Numerical simulations confirm the feasibility of this theoretical framework for multi-user quantum networks, offering dual-layer confidentiality without compromising key rates.

1. Introduction

Quantum secret sharing (QSS) [1,2,3,4,5,6,7,8], as a multi-party secure quantum communication protocol, achieves dual-layer (quantum and physical) confidentiality by partitioning secrets among participants so that only authorized user groups can reconstruct the full information. In such a system, a designated dealer receives quantum states from multiple users through quantum channels and then distributes secrets and keys to ensure that no subset below the threshold can access the complete key information. Since the initial QSS proposal [1], numerous schemes have emerged [2,3,4]. In 2005, Christian Schmid et al. [5] introduced a single-qubit QSS with chain-structured transmission. Subsequently, Warren P. Grice and Bing Qi [6] developed continuous-variable QSS (CV-QSS) using similar architectures, followed by user-side and structural refinements [7,8]. Nevertheless, these works remain constrained by chain topologies, inevitably introducing excess noise through highly asymmetric couplers in multi-user quantum channels.
Meanwhile, optical frequency combs (OFCs) have gained attention as efficient WDM sources [9]. An OFC spectrum comprises equally spaced narrowband lines, f n = f 0 + n · f r where f 0 is the carrier-envelope offset frequency, f r is the repetition rate, and n is the mode index. Their advantages in spectral efficiency [10], receiver design [11,12,13,14], and signal processing [15,16,17] for WDM have motivated Lars Lundberg et al. [18] to implement OFC-based WDM transmission. Yijun Wang et al. [19] further leveraged OFCs for parallel transmission and coherent reception to boost CV-QKD key rates. While microresonator-based OFCs enable chip-scale integration [20,21], their phase noise (>100 rad/Hz1/2 [22]) and line-spacing instability limit multi-user synchronization. We employ standard fiber-based OFCs due to their superior phase coherence (<10 rad/Hz1/2 [19]) and precise frequency control, which are critical for parallel quantum channels requiring sub-Hz stability. Despite QSS’s greater need for parallel multi-user quantum channels, no theoretical or experimental OFC-based QSS studies exist. While recent experimental advances have demonstrated chip-based generation of photonic graph states for measurement-driven quantum processing [23], hyperentanglement-enhanced high-capacity quantum secure direct communication [24], and robust coherent-state QSS implementations tolerant of channel imperfections [25], these approaches fundamentally constrain scalability in multi-user secret sharing. Chip-integrated architectures lack wavelength-agile parallelism for dynamic user access; hyperentanglement systems incur prohibitive hardware complexity beyond a few-user scenarios; and existing CV-QSS experiments remain bound to chain-structured topologies that suffer from cumulative noise. Although microresonator soliton microcombs offer chip-scale advantages [26], this work employs fiber-based OFCs due to compatibility constraints with existing CV-QSS implementations and laboratory capabilities.
This work proposes an OFC-based CV-QSS scheme. Building on decentralized QSS architectures, we establish dedicated frequency channels between the dealer and individual users via OFCs, eliminating excess noise from chain couplers and removing idealistic assumptions (e.g., equidistant users). Consequently, we resolve the severe degradation of key rates and transmission distance that occurs with user scaling. Simultaneously, the Chinese remainder theorem (CRT) and decentralized structures ensure mathematical and architectural security, providing non-quantum layer protection.
This paper is organized as follows. In Section 2, we detail the mathematical foundations of the OFC-based CV-QSS scheme and describe the process of generating multi-frequency quantum states via OFCS for quantum transmission of our proposed OFC-based CV-QSS scheme. Additionally, we present the protocol design and implementation workflow. In Section 3, we firstly establish the classical (non-quantum) security through mathematical formalism and architectural analysis, then analyze the system security in terms of quantum aspects. Through numerical simulations, we evaluate the system performance, confirming the feasibility and superiority of the proposed scheme. The performance of the scheme is analyzed and verified via numerical simulations in Section 4. And we present our conclusions in Section 5.

2. Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme

2.1. Preliminaries of the Chinese Remainder Theorem

The Chinese remainder theorem states: Let m 1 , m 2 , , m k be k pairwise relatively prime positive integers. Then, for any integers c 1 , c 2 , , c k , there exists an integer x such that
x c 1 ( mod m 1 ) x c 2 ( mod m 2 ) x c k ( mod m k )
all of which hold. Moreover, in the sense of modulo m 1 m 2 m k , the solution of the above system of congruence equations is unique and can be expressed as
x x 0 ( mod m 1 m 2 m k )
Here, x 0 can be determined as follows: Let M i = 1 m i ( j = 1 k m j ) , 1 i k , and assume that M i 1 is the multiplicative inverse of M i modulo m i . Then we can take
x 0 = j = 1 k M j M j 1 c j
The proof of this theorem is straightforward. The integer x that satisfies the system of congruence equations can also be obtained in the following way: Let x 1 = c 1 , then x 1 satisfies the first equation. Consider the numbers x 1 + m 1 , x 1 + 2 m 1 , , x 1 + m 2 m 1 . Since ( m 1 , m 2 ) = 1 , they form a complete residue system modulo m 2 . Therefore, there is an x 2 among them such that x 2 c 2 ( mod m 2 ) , and this x 2 satisfies the first two equations simultaneously. Then consider x 2 + m 2 m 1 , x 2 + 2 m 2 m 1 , , x 2 + m 3 m 2 m 1 and so on. By successive iteration, the integer x k that satisfies all the equations can be found.
If we do not know all the remainders of the congruence equations, taking the number of users as three as an example, given moduli n 1 = 3 and n 2 = 5 (pairwise coprime) with known remainders x 2 ( mod 3 ) and x 3 ( mod 5 ) , the equations can be merged into x 8 ( mod 15 ) . However, if the remainder constraint for the third modulus n 3 = 7 is missing, the solution is not unique; substituting x = 15 m + 8 and iterating m from 0 to 6 yields seven candidate solutions modulo 105 (i.e., x = 8 ,   23 ,   38 ,   53 ,   68 ,   83 ,   98 ). All candidates satisfy the known equations, but the absence of the mod 7 constraint prevents the unique determination of x.

2.2. Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme

This work presents a CV-QSS architecture that integrates phase-randomized optical frequency combs with displacement-driven quantum state modulation, enabling high-dimensional secure communication. The system leverages a multi-wavelength quantum source generated by the dealer, characterized by a central frequency f 0 s and repetition rate f r s . The quantum field optical comb is mathematically expressed as follows:
s ^ ( t ) = n = n min n max X n A + i P n A exp j φ ( t ) + 2 π f 0 s + n f r s t ,
where X n A and P n A denote quadrature components following zero-mean Gaussian distributions with variance σ 2 (in shot-noise units), and φ ( t ) represents phase noise from laser fluctuations. Critically, each sub-comb branch is modulated with Rayleigh-distributed amplitudes V n R a ( σ ) and uniformly randomized phases Φ n [ 0 , 2 π ] , which collectively act as displacement operators D ( α n ) to coherently modulate the two-mode squeezed vacuum (TMSV) states transmitted by U s e r j , where D ( α k ) = exp ( α k a ^ α k * a ^ ) with α k = V k e j Φ k encodes classical randomness into TMSV states.
The dealer demultiplexes the optical comb into N = n max n min + 1 parallel sub-channels. For central sub-channels ( k = n min + 1 , , n max 1 ), the displacement parameter α k = V k e j Φ k is generated through Rayleigh-amplitude and random-phase modulation. This displacement operation directly impresses classical randomness onto the quantum noise of U s e r j ’s TMSV states, achieving quadrature-dependent encoding while preserving their inherent squeezing correlations. The exponential decay of the Rayleigh distribution inherently suppresses large-amplitude modulation events, confining excess noise near the shot-noise limit. Edge sub-channels ( r = n min , n max ) encode fixed quadratures X r A , P r A to facilitate phase drift compensation during detection.
At the receiver, U s e r j employs a local optical frequency comb ( f 0 L = f 0 s , f r L = f r s ) to demultiplex the incoming signal into N frequency bins. Pilot tones are isolated for phase noise estimation via a phase-locked loop (PLL), while data-carrying sub-channels undergo adaptive homodyne detection. The pre-applied displacement modulation D ( α k ) reshapes the quadrature noise of the TMSV states, enabling direct measurement of their variances through X / P -basis homodyne detectors. Real-time phase modulation aligns measurement bases with the dealer’s encoding parameters, ensuring that the bases match for sifting.
Post-processing involves four key steps, as follows: (1) Basis sifting, where U s e r j announces measurement bases and the dealer retains data from matched sub-channels; (2) parameter estimation, leveraging public disclosure of partial keys to evaluate channel transmittance T k and excess noise ϵ k , with Rayleigh statistics enabling precise noise-floor calibration; (3) multi-mode reconciliation using rate-adaptive LDPC codes optimized by displacement correlation matrices; and (4) privacy amplification via universal hashing, where security proofs exploit the phase-space symmetry induced by displacement operations.
By unifying classical phase randomization with quantum displacement operations as in Figure 1, this architecture establishes a resource-efficient framework for large-scale quantum-secured networks. Figure 1 and Figure 2 depict the operational workflow of the proposed OFC CV-QSS scheme: (a) The dealer first determines the number of optical frequency comb (OFC) carrier pairs based on the user count. (b) Point-to-point quantum communication channels are established individually between the dealer and each user through dedicated OFC carriers. This process follows CV-QSS fairness protocols. (c) After all quantum links are established, the minimum key rate among the point-to-point connections defines the system key rate lower bound R = min { R 1 , R 2 , , R n } . The final shared secret key is then derived through classical post-processing of quantum-measurement outcomes. The dealer’s optical comb not only serves as a multi-wavelength carrier but also physically enhances security through displacement-driven modulation of U s e r j ’s TMSV states, ensuring compatibility with existing fiber-optic infrastructure and enabling high-rate, long-distance CV-QKD deployment.
Then, we present a secure CV-QSS scheme based on optical frequency combs, enabling the dealer to distribute a classical secret S to n participants via the CRT. The protocol consists of three phases [4].

2.2.1. Initialization

The dealer selects n primes m U 1 = 2 , m U 2 = 3 , …, m U n (e.g., the first n primes), which are inherently coprime (i.e., gcd ( m U i , m U j ) = 1 for all 1 i j n ). The secret S { 0 , 1 , , M } L , a checksum sequence R { 0 , 1 , , M } L 1 , and a unique pointer P * { 0 , 1 , , M } L 2 are generated, where M = k = 1 n m U k 1 . The dealer put P * behind S and embeds them into R to form a sequence X as Figure 3, ensuring the uniqueness of P * (i.e., if a substring T j = P * , all other T k P * ). Shadows X U i = X mod m U i are computed for each participant U i , and the parameters { m U 1 , , m U n } , L, L 1 , L 2 , P * , verification data V, and hash function H ( ) are published.

2.2.2. Distribution

The dealer distributes X U i to each user U i via optical frequency comb-based quantum channels: 1. State Preparation: Each U i prepares L + L 1 + L 2 two-mode squeezed vacuum states, with quadratures derived from vacuum states x ^ 1 ( 0 ) , p ^ 1 ( 0 ) and x ^ 2 ( 0 ) , p ^ 2 ( 0 ) N ( 0 , 1 ) with squeezing parameter r, satisfying:
lim r + x 1 = x 2 , lim r + p 1 = p 2 .
2. Eavesdropping Detection: Users send the squeezed state a 2 and coherent states c to the dealer for error rate analysis. If anomalies are detected (e.g., excess error rate), communication is restarted. 3. Message Modulation: The dealer modulates received states with α j N ( X U i , σ 2 ) and returns the modulated state a 4 for decryption. 4. Joint Measurement: Users perform two-mode Bell measurements (using balanced beam splitters and homodyne detectors) on local state a 1 and received state a 6 to decrypt X U i .

2.2.3. Reconstruction

To securely recover S, all n users collaborate as shown in Figure 3: 1. Encryption & Exchange: Each U i generates a random sequence U i { 0 , , M } L + L 1 + L 2 , encrypts their shadow as ( X j U i + U i , j ) mod ( M + 1 ) , and exchanges encrypted messages. 2. Iterative Verification: Starting from j = 0 , users increment j, broadcast the j-th round keys U 1 , j , U 2 , j , , U n , j , and decrypt X j U i = ( M e j U i U i , j ) mod ( M + 1 ) . Using CRT, they recover X j , compute V j = H ( X j + j ( L + M ) ) , and abort if V j V j . 3. Secret Extraction: When j = L + L 2 , users check if the substring T j = X j L 2 + 1 , , X j matches P * . If matched, the secret S = X j L L 2 + 1 , , X j L 2 is extracted; otherwise, the loop continues.

3. Security Analysis

In this section, we first conduct a security analysis of the proposed OFCQSS scheme. Additionally, since the quantum key distribution protocol serves as a security technique in this paper, we evaluate the performance of the scheme based on the security analysis of quantum key distribution. This evaluation primarily focuses on the performance metrics of the scheme, such as the secure key rate and noise.

3.1. Mathematical and Structural Security Analysis

3.1.1. Mathematical Security Proof Based on the Chinese Remainder Theorem

In the application of the Chinese remainder theorem, the secret S is decomposed into multiple remainders (shares), with each user holding only the remainder under a specific modulus. For example, in a two-user scheme, the secret S is decomposed into X U 1 X mod m U 1 and X U 2 X mod m U 2 , where the moduli m U 1 and m U 2 are coprime. Only by possessing both X U 1 and X U 2 can the original message X be recovered through CRT, and the secret S be extracted accordingly.
The security guarantee mechanism of CRT is as follows [4]:
(1)
Mathematical irreversibility: Knowing a single remainder (e.g., X U 1 or X U 2 ) cannot uniquely determine the original value X. For instance, if m U 1 = 2 and X U 1 = 0 , X could be 0, 2, 4, etc.; if m U 2 = 3 and X U 2 = 0 , X could be 0, 3, 6, etc. Thus, the information entropy of a single remainder is much lower than that of the complete secret, making it impossible to effectively recover the secret through exhaustive enumeration or reverse calculation.
(2)
Information entropy separation: As analyzed in the paper, the information entropy of each share (e.g., X U 1 or X U 2 ) is 1 bit and log 2 3 bits, respectively, while the entropy of the complete message X is log 2 6 bits. The information contained in a single share is insufficient to cover the entropy of the complete secret, preventing participants from inferring the global secret through local information
(3)
Time complexity: If an attacker attempts to guess other participants’ shares through a single remainder, they need to enumerate all possible combinations. Since the product of the moduli grows exponentially with the number of participants, the complexity of exhaustive search is too high to be feasible.
The CRT—through its mathematical irreversibility and information entropy separation mechanism—ensures that the secret must be jointly recovered from multiple remainders. A single remainder provides only partial information and cannot be used to reverse-engineer the complete content. This characteristic completes the mathematical security proof of the system and eliminates the possibility that an attacker could guess other users’ information from partial shares.

3.1.2. Structural Security Proof Based on Decentralization

Fairness structure: The fairness mechanism of our proposed protocol, as illustrated in Figure 3, ensures that all participants either successfully reconstruct the secret simultaneously or fail together by progressively verifying messages in each recovery round, utilizing a hidden determination pointer to mark the end of the secret, and incorporating a sufficiently long random check sequence. Specifically, if cheating occurs before the secret’s position or after the pointer is fully revealed, it will either be detected immediately or render both parties unable to confirm the secret; if cheating occurs after the secret’s position but before the pointer is fully revealed, both parties still have a high probability of recovering the secret; the only scenario where a cheater could exclusively obtain the secret (cheating at the secret’s exact position) has an extremely low probability (inversely proportional to the check sequence length), and when the check sequence is sufficiently long, this unfairness becomes negligible [4].
Decentralized structure: Our system architecture employs a decentralized structure [7], where the traditional QSS scheme’s receiving parties (dealer and user) are granted equal status—each node can function either as a user for key distribution or as a dealer serving as the system receiver. This decentralized architecture eliminates the security risks and vulnerabilities inherent in centralized systems, while providing more flexible path selection options. The approach establishes a theoretical foundation for constructing and implementing multi-user network configurations.

3.2. Quantum Security

3.2.1. Quantum Security Analysis

As for the no-attack situation in Figure 2, we consider a three-user CV-QSS protocol where an honest dealer is selected among the participants, while users U 1 and U 2 prepare squeezed vacuum states ( a 1 , a 2 ) . Mode a 2 is transmitted to the dealer through a noisy quantum channel, resulting in mode a 3 characterized by the following [4]:
x 3 = η 1 x 2 + 1 η 1 x N 1 , p 3 = η 1 p 2 + 1 η 1 p N 1 ,
where η 1 denotes channel transmissivity, and x N 1 , p N 1 N ( 0 , Σ 1 2 ) denotes model additive Gaussian noise. The dealer then performs displacement modulation on a 3 using the message X A / B , generating mode a 4 :
x 4 = x 3 + X k A , p 4 = p 3 + P k A ,
With X k A , P k A N ( X ( A / B ) , σ 2 ) [19], the modulated state is sent back to U 1 , undergoing channel noise to become a 5 :
x 5 = η 2 x 4 + 1 η 2 x N 2 , p 5 = η 2 p 4 + 1 η 2 p N 2 ,
where x N 2 , p N 2 N ( 0 , Σ 2 2 ) and η 2 is the reverse channel parameter. To compensate for channel loss, a 5 is amplified with gain g = 1 / ( η 1 η 2 ) :
x 6 = g x 5 .
A Bell measurement on a 1 and a 6 produces the following outcomes:
x 7 = 1 2 ( x 6 + x 1 ) , p 7 = 1 2 ( p 6 + p 1 ) , x 8 = 1 2 ( x 6 x 1 ) , p 8 = 1 2 ( p 6 p 1 ) .
For a squeezing parameter r > 0 , the x 8 quadrature follows a Gaussian distribution:
x 8 = X k A 2 η 1 + 1 η 1 x N 1 2 η 1 + 1 η 2 x N 2 2 η 1 η 2 e r x ^ 2 0 .
The corresponding signal and noise variances are as follows:
V s = σ 2 2 η 1 ,
N s = 1 η 1 2 η 1 Σ 1 2 + 1 η 2 2 η 1 η 2 Σ 2 2 e 2 r ,
Yielding the signal-to-noise ratio γ = V s / N s , the mutual information is then:
I ( S , R ) = 1 2 log 2 ( 1 + γ ) .
Therefore, we can ensure that communication is reliable under certain conditions [4]. Similarly, we can also ensure that communication is reliable under internal attacks because the channel transmission efficiency η is large enough [4,6,7]. This relies on the fact that each sub-channel between individual users and the dealer is generated through the frequency entanglement properties of an optical frequency comb. These sub-channels remain spectrally independent while maintaining phase locking via a common pump laser source. Consequently, multiplexed QSS signals can be simultaneously transmitted through a single optical fiber, thereby enhancing the system’s multi-user scalability.

3.2.2. Numerical Simulation

The parameters in our experiment are as follows: The attenuation coefficient of a standard fiber link is δ = 0.2 dB/km; the detection efficiency and electronic noise of the imperfect heterodyne detector are μ = 0.6 and v e l = 0.05; the reconciliation efficiency is β = 0.98; and the system excess noise is ξ 0 = 0.001. The nonlinear coefficient is γ = 1.3 W 1 km 1 ; the dispersion parameter is D = 16 × 10 6 s / ( m · km ) = 16 ps / ( nm · km ) ; the system repetition rate is f rep = 5 × 10 7 Hz, and the crosstalk coefficient is ξ = 10 R e / 10 , where the extinction ratio is R e = 40 dB.
For the system’s maximum transmission distance and key rate [7], we first consider the point-to-point QKD key rate R i and transmission distance between each user U i and the designated dealer. The system key rate is given by R = min { R 1 , R 2 , , R d 1 , R d + 1 , , R n } , which reaches its minimum at the maximum transmission distance [6,7]. The asymptotic secret key rate lower bound for the QSS scheme is given by [27,28]:
R = β I UD χ DE ,
where β is the reconciliation efficiency, I UD is the mutual information between the user and dealer, and χ DE is the Holevo bound between Eve and the dealer.
However, because our system multiplexes multi-channel QSS signals in a single fiber via optical frequency comb technology, we must account for noise induced by frequency differences rather than noise from users U j coupled through highly asymmetric beam splitters (HABSs). On the one hand, when multiplexing multiple quantum signals through a single optical fiber, the generation of optical frequency combs (OFCs) in practical systems is fundamentally constrained by a finite extinction ratio R e [19], while inter-channel guard bands are intentionally incorporated during system design [18,29]. Consequently, we must account for inter-channel crosstalk noise ( ε cro ). On the other hand, since chromatic dispersion causes unavoidable phase deviations [18,19], it is necessary to consider the nonlinear noise ( ε non ) [30,31]. Therefore, the total excess noise can be expressed as follows:
ε total = ε cro + ε non + ε 0
where
ε cro = 2 ( N 1 ) · ξ · V a , ε non γ 2 P avg 2 L eff 2 e α L D λ 2 c Δ f 2
where
  • N is the total number of channels;
  • L eff is the effective length;
  • Δ f is the channel spacing.
Then, the channel-added noise can be expressed as follows:
χ line = 1 T 1 + ε t o t a l
and the noise between the dealer and user is given by the following:
χ het = 2 μ + 2 ν el μ ,
Then, the overall noise can be expressed as follows:
χ tot = χ line + χ het T .
The Shannon mutual information between the user and dealer is as follows:
I UD = log 2 V + χ tot 1 + χ tot ,
where V = 1 + V U , and V U is the modulation variance at the user.
Assuming the loss and noise in Bob’s detector are trusted (inaccessible to eavesdroppers), the Holevo bound between Eve and the dealer is as follows:
χ DE = j = 1 2 G λ j 1 2 j = 3 5 G λ j 1 2 ,
where G ( x ) = ( x + 1 ) log 2 ( x + 1 ) x log 2 x , and λ j are the symplectic eigenvalues derived from the covariance matrix:
λ 1 , 2 2 = 1 2 A ± A 2 4 B ,
where
A = V 2 1 2 T + 2 T + T 2 V + χ line 2
B = T 2 V χ line + 1 2 ,
and
λ 3 , 4 2 = 1 2 C ± C 2 4 D ,
where
C = 1 T 2 V + χ tot 2 A ( χ het ) 2 + B + 1 + 2 χ het V B + T V + χ line + 2 T ( V 2 1 ) ,
D = V + B χ het T V + χ tot 2 ,
λ 5 = 1
Subsequently, we use the maximum likelihood estimation (MLE) mentioned in Appendix A to determine the channel parameters, thereby achieving a more precise estimation of the upper bound for the asymptotic key rate.

4. Performance Analysis and Discussion

In Figure 4, we compare the key rate and distance relationships between the traditional chain-structured DQSS scheme and the OFC-based CV-QSS scheme under different user scenarios. As shown in the results, under identical parameter conditions, the OFC-based CV-QSS scheme achieves a 50% improvement in maximum transmission distance compared with the traditional chain-structured DQSS scheme. Moreover, this performance gap widens as the number of users increases.
In other words, similar to other chain-structured CV-QSS schemes [6,7], the maximum transmission distance of chain-structured DQSS schemes decreases significantly with increasing user count. By contrast, the OFC-based QSS scheme exhibits a substantially smaller reduction in maximum transmission distance as the number of users grows.
This outcome aligns with our theoretical expectations. In traditional chain-structured QSS schemes, the channel-added noise is given by the following:
χ line = 1 T 1 + j = 1 n ξ j ,
where each ξ j increases with transmission distance, resulting in n-fold amplification. Conversely, in our proposed OFC-based CV-QSS scheme, an increase in distance or in the number of users causes only a single change in the variables ε cro and ε non in
χ line = 1 T 1 + ε t o t a l = line = 1 T 1 + ε cro + ε non + ε 0
At the system level, an inverse correlation constraint exists among key rate, transmission distance, and user capacity; enhancing any one of these parameters inevitably compromises the other two. This aligns with fundamental physical limits and constitutes an intrinsic characteristic of QSS schemes.

5. Conclusions

In this paper, we proposed an optical frequency comb-based continuous-variable quantum secret sharing (OFC CV-QSS) scheme that overcomes multi-user scalability limitations by replacing chain topologies with highly asymmetric beam splitters (HABSs) with OFC-generated parallel quantum channels. This eliminates the need to aggregate cumulative noise from sequential user couplings in system key rate calculations. Beyond inherent quantum-layer security, our solution establishes dual protection—the Chinese remainder theorem (CRT) ensures mathematical security for classical shadows through information-theoretic irreversibility, while decentralized architectures enforce structural security via distributed control and collaborative reconstruction. Numerical simulations confirm that the scheme achieves a substantially extended maximum transmission distance compared with chain-QSS, with significantly slower performance degradation as users scale, while maintaining full compatibility with existing fiber infrastructure. Future work will focus on experimental validation and OFC spectral optimization.

Author Contributions

Conceptualization, R.P., Y.W. and Y.G.; methodology, R.P. and Y.M.; software, R.P. and H.Z.; validation, R.P. and H.Z.; writing—original draft preparation, R.P.; writing—review and editing, R.P. and Y.G.; supervision, Y.W. and Y.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of Hunan Province (No. 2023JJ50269) and Scientific research project of Hunan Provincial Department of Education (No. 22C0446).

Data Availability Statement

All data generated or analyzed during this study are included in this published article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
QSSQuantum secret sharing
CV-QSSContinuous-Variable Quantum Secret Sharing
OFCOptical Frequency Comb
CRTChinese Remainder Theorem
WDMWavelength Division Multiplexing
TMSVTwo-Mode Squeezed Vacuum
PLLPhase-Locked Loop
CV-QKDContinuous-Variable Quantum Key Distribution
LDPCLow-Density Parity-Check
HABSHighly Asymmetric Beam Splitters
DQSSDecentralized Quantum Secret Sharing
MLEMaximum Likelihood Estimation
ECError Correction
AEPAsymptotic Equipartition Property
SNRSignal-to-Noise Ratio

Appendix A

The maximum likelihood estimators are employed to characterize channel parameters, thereby enabling tighter bounds on the achievable key rate. Based on finite-size regime assumptions and composable security analysis [28,32,33], the secret key rate is proven to satisfy the inequality:
R M , r ( 1 r ) p [ R ϵ PE 1 ( 1 r ) M Δ AEP p ϵ s 2 / 3 , N + log 2 p 1 ϵ s 2 / 3 + 2 log 2 2 ϵ h ( 1 r ) M ] ,
  • M: Total signal states transmitted by Alice.
  • m: Number of signal states (from a block M) for which Alice discloses the encoding k, with r = m M .
  • p: Error correction (EC) success probability.
  • R ϵ PE : Finite-size key rate.
  • ϵ tot = ϵ cor + ϵ s + ϵ h + p ϵ PE : Total security error.
  • Δ AEP : Asymptotic equipartition property term, defined as follows:
    Δ AEP ϵ s , | L | : = 4 log 2 2 | L | + 1 log 2 / ϵ s 2 ,
    where | L | denotes the cardinality of the dealer’s outcome, which equals N in our scheme.

References

  1. Hillery, M.; Bužek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829. [Google Scholar] [CrossRef]
  2. Karlsson, A.; Koashi, M.; Imoto, N. Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 1999, 59, 162–168. [Google Scholar] [CrossRef]
  3. Zhang, Z.j.; Man, Z.x. Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 2005, 72, 022303. [Google Scholar] [CrossRef]
  4. Kang, Y.; Guo, Y.; Zhong, H.; Chen, G.; Jing, X. Continuous Variable Quantum Secret Sharing with Fairness. Appl. Sci. 2019, 10, 189. [Google Scholar] [CrossRef]
  5. Schmid, C.; Trojek, P.; Bourennane, M.; Kurtsiefer, C.; Zukowski, M.; Weinfurter, H. Experimental Single Qubit Quantum Secret Sharing. Phys. Rev. Lett. 2005, 95, 230505. [Google Scholar] [CrossRef] [PubMed]
  6. Grice, W.P.; Qi, B. Quantum secret sharing using weak coherent states. Phys. Rev. A 2019, 100, 022339. [Google Scholar] [CrossRef]
  7. Peng, R.; Guo, Y.; Wang, Y.; Liao, Q. Decentralized continuous-variable quantum secret sharing. Quantum Inf. Process. 2023, 22, 368. [Google Scholar] [CrossRef]
  8. Liao, Q.; Liu, X.; Ou, B.; Fu, X. Continuous-Variable Quantum Secret Sharing Based on Multi-Ring Discrete Modulation. IEEE Trans. Commun. 2023, 71, 6051–6060. [Google Scholar] [CrossRef]
  9. Veselka, J.; Korotky, S. A multiwavelength source having precise channel spacing for WDM systems. IEEE Photonics Technol. Lett. 1998, 10, 958–960. [Google Scholar] [CrossRef]
  10. Millar, D.S.; Maher, R.; Lavery, D.; Koike-Akino, T.; Pajovic, M.; Alvarado, A.; Paskov, M.; Kojima, K.; Parsons, K.; Thomsen, B.C.; et al. Design of a 1 Tb/s Superchannel Coherent Receiver. J. Light. Technol. 2016, 34, 1453–1463. [Google Scholar] [CrossRef]
  11. Lorences-Riesgo, A.; Eriksson, T.A.; Fülöp, A.; Andrekson, P.A.; Karlsson, M. Frequency-Comb Regeneration for Self-Homodyne Superchannels. J. Light. Technol. 2016, 34, 1800–1806. [Google Scholar] [CrossRef]
  12. Lorences-Riesgo, A.; Mazur, M.; Eriksson, T.A.; Andrekson, P.A.; Karlsson, M. Self-homodyne 24 × 32-QAM superchannel receiver enabled by all-optical comb regeneration using brillouin amplification. Opt. Express 2016, 24, 29714–29723. [Google Scholar] [CrossRef] [PubMed]
  13. Mazur, M.; Lorences-Riesgo, A.; Schröder, J.; Andrekson, P.A.; Karlsson, M. High Spectral Efficiency PM-128QAM Comb-Based Superchannel Transmission Enabled by a Single Shared Optical Pilot Tone. J. Light. Technol. 2018, 36, 1318–1325. [Google Scholar] [CrossRef]
  14. Mazur, M.; Schröder, J.; Lorences-Riesgo, A.; Yoshida, T.; Andrekson, P.A. 11.5 bits/s/Hz PM-256QAM Comb-Based Superchannel Transmission by Combining Optical and Digital Pilots. 2018. Available online: https://api.semanticscholar.org/CorpusID:49190505 (accessed on 29 June 2025).
  15. Lundberg, L.; Mazur, M.; Lorences-Riesgo, A.; Karlsson, M.; Andrekson, P.A. Joint Carrier Recovery for DSP Complexity Reduction in Frequency Comb-Based Superchannel Transceivers. In Proceedings of the 2017 European Conference on Optical Communication (ECOC), Gothenburg, Sweden, 17–21 September 2017. [Google Scholar]
  16. Liu, C.; Pan, J.; Detwiler, T.; Stark, A.; Hsueh, Y.T.; Chang, G.K.; Ralph, S.E. Joint digital signal processing for superchannel coherent optical communication systems. Opt. Express 2013, 21, 8342–8356. [Google Scholar] [CrossRef]
  17. Souto, D.V.; Olsson, B.E.; Larsson, C.; Mello, D.A.A. Joint-Polarization and Joint-Subchannel Carrier Phase Estimation for 16-QAM Optical Systems. J. Light. Technol. 2012, 30, 3185–3191. [Google Scholar] [CrossRef]
  18. Lundberg, L.; Karlsson, M.; Lorences-Riesgo, A.; Mazur, M.; Torres-Company, V.; Schröder, J.; Andrekson, P.A. Frequency Comb-Based WDM Transmission Systems Enabling Joint Signal Processing. Appl. Sci. 2018, 8, 718. [Google Scholar] [CrossRef]
  19. Wang, Y.; Mao, Y.; Huang, W.; Huang, D.; Guo, Y. Optical frequency comb-based multichannel parallel continuous-variable quantum key distribution. Opt. Express 2019, 27, 25314–25329. [Google Scholar] [CrossRef]
  20. Kippenberg, T.J.; Holzwarth, R.; Diddams, S.A. Microresonator-Based Optical Frequency Combs. Science 2011, 332, 555–559. [Google Scholar] [CrossRef] [PubMed]
  21. Rueda, A.; Sedlmeir, F.; Kumari, M.; Leuchs, G.; Schwefel, H.G.L. Resonant electro-optic frequency comb. Nature 2019, 569, E11. [Google Scholar] [CrossRef]
  22. Spencer, D.T.; Drake, T.; Briles, T.C.; Stone, J.; Sinclair, L.C.; Fredrick, C.; Li, Q.; Westly, D.; Ilic, B.R.; Bluestone, A.; et al. An optical-frequency synthesizer using integrated photonics. Nature 2018, 557, 81–85. [Google Scholar] [CrossRef]
  23. Huang, J.; Chen, X.; Li, X.; Wang, J. Chip-based photonic graph states. AAPPS Bull. 2023, 33, 14. [Google Scholar] [CrossRef]
  24. Zeng, H.; Du, M.M.; Zhong, W.; Zhou, L.; Sheng, Y.B. High-capacity device-independent quantum secure direct communication based on hyper-encoding. Fundam. Res. 2024, 4, 851–857. [Google Scholar] [CrossRef]
  25. Shen, A.; Cao, X.Y.; Wang, Y.; Fu, Y.; Gu, J.; Liu, W.B.; Weng, C.X.; Yin, H.L.; Chen, Z.B. Experimental quantum secret sharing based on phase encoding of coherent states. Sci. China-Phys. Mech. Astron. 2023, 66, 260311. [Google Scholar] [CrossRef]
  26. Corcoran, B.; Mitchell, A.; Morandotti, R.; Oxenlowe, L.K.; Moss, D.J. Optical microcombs for ultrahigh-bandwidth communications. Nat. Photonics 2025, 19, 451–462. [Google Scholar] [CrossRef]
  27. Grosshans, F.; Grangier, P. Continuous Variable Quantum Cryptography Using Coherent States. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [PubMed]
  28. Fossier, S.; Diamanti, E.; Debuisschert, T.; Tualle-Brouri, R.; Grangier, P. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B At. Mol. Opt. Phys. 2009, 42, 114014. [Google Scholar] [CrossRef]
  29. Liu, X.; Chandrasekhar, S.; Winzer, P.J. Digital Signal Processing Techniques Enabling Multi-Tbs Superchannel Transmission: An overview of recent advances in DSP-enabled superchannels. IEEE Signal Process. Mag. 2014, 31, 16–24. [Google Scholar] [CrossRef]
  30. Temprana, E.; Myslivets, E.; Kuo, B.P.; Liu, L.; Ataie, V.; Alic, N.; Radic, S. Overcoming Kerr-induced capacity limit in optical fiber transmission. Science 2015, 348, 1445–1448. [Google Scholar] [CrossRef] [PubMed]
  31. Agrawal, G.P. Fiber-Optic Communication Systems, 4th ed.; John Wiley Sons: Hoboken, NJ, USA, 2010; ISBN 978-0-470-50511-3. Available online: https://www.wiley.com/en-us/Fiber+Optic+Communication+Systems%2C+4th+Edition-p-9780470505113 (accessed on 29 June 2025).
  32. Papanastasiou, P.; Pirandola, S. Continuous-variable quantum cryptography with discrete alphabets: Composable security under collective Gaussian attacks. Phys. Rev. Res. 2021, 3, 013047. [Google Scholar] [CrossRef]
  33. Ghorai, S.; Grangier, P.; Diamanti, E.; Leverrier, A. Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation. Phys. Rev. X 2019, 9, 021059. [Google Scholar] [CrossRef]
Figure 1. Proposed optical frequency comb–based continuous–variable quantum secret sharing scheme.
Figure 1. Proposed optical frequency comb–based continuous–variable quantum secret sharing scheme.
Mathematics 13 02455 g001
Figure 2. The quantum communication between a random user and the dealer. The a i represent squeezed vacuum states at different transmission stage.
Figure 2. The quantum communication between a random user and the dealer. The a i represent squeezed vacuum states at different transmission stage.
Mathematics 13 02455 g002
Figure 3. How to determine Message X through the ciphertext S, checking sequence R, and determine pointer P * .
Figure 3. How to determine Message X through the ciphertext S, checking sequence R, and determine pointer P * .
Mathematics 13 02455 g003
Figure 4. (a) Secretkey rate versus transmission distance for the proposed OFC-based quantum secret sharing scheme (solid line) and the decentralized quantum secret sharing scheme (dotted line). (b) Secret key rate under finite-size composable security analysis versus transmission distance for the proposed OFC-based quantum secret sharing scheme (solid line) and the decentralized quantum secret sharing scheme (dotted line). The blue, orange, yellow, and purple lines correspond to user quantities of n = 3 ,   10 ,   15 , and 20, respectively. The black dotted line denotes the Piradola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Figure 4. (a) Secretkey rate versus transmission distance for the proposed OFC-based quantum secret sharing scheme (solid line) and the decentralized quantum secret sharing scheme (dotted line). (b) Secret key rate under finite-size composable security analysis versus transmission distance for the proposed OFC-based quantum secret sharing scheme (solid line) and the decentralized quantum secret sharing scheme (dotted line). The blue, orange, yellow, and purple lines correspond to user quantities of n = 3 ,   10 ,   15 , and 20, respectively. The black dotted line denotes the Piradola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Mathematics 13 02455 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Peng, R.; Wang, Y.; Zhang, H.; Mao, Y.; Guo, Y. Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme. Mathematics 2025, 13, 2455. https://doi.org/10.3390/math13152455

AMA Style

Peng R, Wang Y, Zhang H, Mao Y, Guo Y. Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme. Mathematics. 2025; 13(15):2455. https://doi.org/10.3390/math13152455

Chicago/Turabian Style

Peng, Runsheng, Yijun Wang, Hang Zhang, Yun Mao, and Ying Guo. 2025. "Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme" Mathematics 13, no. 15: 2455. https://doi.org/10.3390/math13152455

APA Style

Peng, R., Wang, Y., Zhang, H., Mao, Y., & Guo, Y. (2025). Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme. Mathematics, 13(15), 2455. https://doi.org/10.3390/math13152455

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop