https://doi.org/10.1140/epjqt/s40507-025-00404-8
Research
Multiparty-to-multiparty mediated quantum secret sharing protocol in a restricted quantum environment
1
Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, No. 129, Sec. 3, Sanmin Rd., North Dist., 40401, Taichung, Taiwan, ROC
2
Department of Computer Science and Engineering, National Chung Hsing University, No. 145, Xingda Rd., South District, 40227, Taichung, Taiwan
3
Master Program for Digital Health Innovation, College of Humanities and Sciences, China Medical University, No. 100, Sec. 1, Jingmao Rd., Beitun Dist., 406040, Taichung, Taiwan
Received:
10
January
2025
Accepted:
30
July
2025
Published online:
11
August
2025
This study proposes the first multiparty-to-multiparty mediated quantum secret sharing (M2M-MQSS) protocol within a restricted quantum environment. Unlike existing fully quantum secret sharing (QSS) protocols, this protocol allows protocol participants with limited quantum capabilities—including (1) measuring a single qubit in the Z-basis and (2) performing a single-qubit unitary operation, Hadamard operation—to participate, significantly reducing implementation costs. By employing one-way qubit transmission, the proposed MMQSS protocol not only simplifies the quantum communication process but also effectively defends against quantum Trojan horse attacks. The correctness and security analyses demonstrate that the proposed M2M-MQSS protocol is robust against various well-known attack strategies. Simulation experiments confirm the feasibility of the protocol for various numbers of participants. It maintains high levels of efficiency and security even as the number of participants increases. Moreover, compared with existing protocols, the proposed M2M-MQSS protocol lowers the barrier to practical quantum communication deployment by reducing the quantum resources required for protocol participants.
Key words: Quantum secret sharing protocol / Semi-quantum / Graph state / Quantum Trojan horse attacks
© The Author(s) 2025
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.