{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T11:54:26Z","timestamp":1761738866780,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172182"],"award-info":[{"award-number":["62172182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2025JJ70445"],"award-info":[{"award-number":["2025JJ70445"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012269","name":"Science and Technology Innovative Research Team in Higher Educational Institutions of Hunan Province","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012269","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>This paper presents a semi-quantum secret sharing (SQSS) protocol based on three-particle W states, designed for efficient and secure secret sharing in quantum-resource-constrained scenarios. In the protocol, a fully quantum-capable sender encodes binary secrets using W, while receivers with limited quantum capabilities reconstruct the secret through collaborative Z basis measurements and classical communication, ensuring no single participant can obtain the complete information independently. The protocol employs a four-state decoy photon technique ({|0\u27e9,|1\u27e9,|+\u27e9,|\u2212\u27e9}) and position randomization, combined with photon number splitting (PNS) and wavelength filtering (WF) technologies, to resist intercept\u2013resend, entanglement\u2013measurement, and double controlled-NOT(CNOT) attacks. Theoretical analysis shows that the detection probability of intercept\u2013resend attacks increases exponentially with the number of decoy photons (approaching 1). For entanglement\u2013measurement attacks, any illegal operation by an attacker introduces detectable quantum state disturbances. Double CNOT attacks are rendered ineffective by the untraceability of particle positions and mixed-basis strategies. Leveraging the robust entanglement of W states, the protocol proves that the mutual information between secret bits and single-participant measurement results is strictly zero, ensuring lossless reconstruction only through authorized collaboration.<\/jats:p>","DOI":"10.3390\/e27111107","type":"journal-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:51:42Z","timestamp":1761526302000},"page":"1107","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits"],"prefix":"10.3390","volume":"27","author":[{"given":"Kai","family":"Xing","sequence":"first","affiliation":[{"name":"School of Communication and Electronic Engineering, Jishou University, Jishou 416000, China"}]},{"given":"Rongbo","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Artificial Intelligence, Huaihua University, Huaihua 418099, China"}]},{"given":"Sihai","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Communication and Electronic Engineering, Jishou University, Jishou 416000, China"}]},{"given":"Lu","family":"Lan","sequence":"additional","affiliation":[{"name":"School of Communication and Electronic Engineering, Jishou University, Jishou 416000, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,10,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","article-title":"Quantum secret sharing","volume":"59","author":"Hillery","year":"1999","journal-title":"Phys. Rev. A"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/S0375-9601(03)00074-4","article-title":"Quantum secret sharing without entanglement","volume":"310","author":"Guo","year":"2003","journal-title":"Phys. Lett. A"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","article-title":"Efficient multiparty quantum-secret-sharing schemes","volume":"69","author":"Xiao","year":"2004","journal-title":"Phys. Rev. A"},{"key":"ref_5","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., and Zhu, F. (2005, January 6\u20139). Quantum sharing of classical secret based on local operations. Proceedings of the 5th International Conference on Information Communications & Signal Processing, Bangkok, Thailand."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"150502","DOI":"10.1103\/PhysRevLett.121.150502","article-title":"Quantum secret sharing among four players using multipartite bound entanglement of an optical field","volume":"121","author":"Zhou","year":"2018","journal-title":"Phys. Rev. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"062311","DOI":"10.1103\/PhysRevA.99.062311","article-title":"Quantum secret sharing with polarization-entangled photon pairs","volume":"99","author":"Williams","year":"2019","journal-title":"Phys. Rev. A"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"033036","DOI":"10.1103\/PhysRevResearch.6.033036","article-title":"Efficient and secure quantum secret sharing for eight users","volume":"6","author":"Qin","year":"2024","journal-title":"Phys. Rev. Res."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"150801","DOI":"10.1103\/7wrk-p6gl","article-title":"Experimental Efficient Source-Independent Quantum Secret Sharing against Coherent Attacks","volume":"135","author":"Xiao","year":"2025","journal-title":"Phys. Rev. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Boyer, M., Kenigsberg, D., and Mor, T. (2007, January 2\u20136). Quantum key distribution with classical Bob. Proceedings of the 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM\u201907), French Caribbean, France.","DOI":"10.1109\/ICQNM.2007.18"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1350005","DOI":"10.1142\/S0219749913500056","article-title":"Quantum key distribution with limited classical Bob","volume":"11","author":"Sun","year":"2013","journal-title":"Int. J. Quantum Inf."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","article-title":"Authenticated semi-quantum key distribution protocol using Bell states","volume":"13","author":"Yu","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Krawec, W.O. (2015, January 14\u201319). Security proof of a semi-quantum key distribution protocol. Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China.","DOI":"10.1109\/ISIT.2015.7282542"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s11128-018-1904-z","article-title":"Security of a single-state semi-quantum key distribution protocol","volume":"17","author":"Zhang","year":"2018","journal-title":"Quantum Inf. Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","article-title":"Semiquantum secret sharing using entangled states","volume":"82","author":"Li","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/s10773-012-1314-4","article-title":"Intercept-resend attacks on semi-quantum secret sharing and the improvements","volume":"52","author":"Lin","year":"2013","journal-title":"Int. J. Theor. Phys."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"045304","DOI":"10.1088\/1751-8113\/46\/4\/045304","article-title":"Quantum secret sharing with classical Bobs","volume":"46","author":"Li","year":"2013","journal-title":"J. Phys. A Math. Theor."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3819","DOI":"10.1007\/s10773-015-2622-2","article-title":"A novel semi-quantum secret sharing scheme of specific bits","volume":"54","author":"Xie","year":"2015","journal-title":"Int. J. Theor. Phys."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4027","DOI":"10.1007\/s10773-016-3031-x","article-title":"Eavesdropping on semi-quantum secret sharing scheme of specific bits","volume":"55","author":"Yin","year":"2016","journal-title":"Int. J. Theor. Phys."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1750150","DOI":"10.1142\/S0217984917501500","article-title":"A novel semi-quantum secret sharing scheme based on Bell states","volume":"31","author":"Yin","year":"2017","journal-title":"Mod. Phys. Lett. B"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1950213","DOI":"10.1142\/S0217732319502134","article-title":"Semi-quantum secret sharing protocol using W-state","volume":"34","author":"Tsai","year":"2019","journal-title":"Mod. Phys. Lett. A"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11128-021-03157-2","article-title":"An efficient semi-quantum secret sharing protocol of specific bits","volume":"20","author":"Tian","year":"2021","journal-title":"Quantum Inf. Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s11128-023-04255-z","article-title":"Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement","volume":"23","author":"He","year":"2024","journal-title":"Quantum Inf. Process."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s11128-021-03327-2","article-title":"Cluster-state-based quantum secret sharing for users with different abilities","volume":"20","author":"Li","year":"2021","journal-title":"Quantum Inf. Process."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1140\/epjp\/s13360-022-03521-w","article-title":"Semiquantum secret sharing by using \u03c7-type states","volume":"137","author":"Chen","year":"2022","journal-title":"Eur. Phys. J. Plus"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"025202","DOI":"10.1088\/1612-202X\/ad1aab","article-title":"Circular semi-quantum secret sharing based on hybrid single particle and GHZ-type states","volume":"21","author":"Hou","year":"2024","journal-title":"Laser Phys. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"125201","DOI":"10.1088\/1612-202X\/ad821c","article-title":"Semi-quantum secret sharing protocol with specific bits based on third party","volume":"21","author":"Ma","year":"2024","journal-title":"Laser Phys. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"062314","DOI":"10.1103\/PhysRevA.62.062314","article-title":"Three qubits can be entangled in two inequivalent ways","volume":"62","author":"Vidal","year":"2000","journal-title":"Phys. Rev. A"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","article-title":"Improving the security of multiparty quantum secret sharing against Trojan horse attack","volume":"72","author":"Deng","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","article-title":"Eavesdropping on the two-way quantum communication protocols with invisible photons","volume":"351","author":"Cai","year":"2006","journal-title":"Phys. Lett. A"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","article-title":"Improving the security of secure direct communication based on the secret transmitting order of particles","volume":"74","author":"Li","year":"2006","journal-title":"Phys. Rev. A"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2300437","DOI":"10.1002\/qute.202300437","article-title":"Photon number splitting attack\u2013proposal and analysis of an experimental scheme","volume":"7","author":"Ashkenazy","year":"2024","journal-title":"Adv. Quantum Technol."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","article-title":"Quantum privacy amplification and the security of quantum cryptography over noisy channels","volume":"77","author":"Deutsch","year":"1996","journal-title":"Phys. Rev. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","article-title":"Generalized privacy amplification","volume":"41","author":"Bennett","year":"2002","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1103\/PhysRevA.57.2383","article-title":"Security of quantum cryptography against individual attacks","volume":"57","author":"Slutsky","year":"1998","journal-title":"Phys. Rev. A"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/s11128-018-1953-3","article-title":"Double C-NOT attack and counterattack on \u2018Three-step semi-quantum secure direct communication protocol\u2019","volume":"17","author":"Gu","year":"2018","journal-title":"Quantum Inf. Process."},{"key":"ref_37","first-page":"1950004","article-title":"Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack","volume":"19","author":"Yang","year":"2020","journal-title":"Quantum Inf. Process."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-021-03047-7","article-title":"Cryptanalysis and improvement in semi-quantum private comparison based on bell states","volume":"20","author":"Tsai","year":"2021","journal-title":"Quantum Inf. Process."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s11128-020-02690-w","article-title":"Cryptanalysis of limited resource semi-quantum secret sharing","volume":"19","author":"Tsai","year":"2020","journal-title":"Quantum Inf. Process."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Gu, J., and Hwang, T. (2022). Double C-NOT attack on a single-state semi-quantum key distribution protocol and its improvement. Electronics, 11.","DOI":"10.3390\/electronics11162522"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","article-title":"Quantum cryptography","volume":"74","author":"Gisin","year":"2002","journal-title":"Rev. Mod. Phys."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","article-title":"Quantum key distribution in the Holevo limit","volume":"85","author":"Cabello","year":"2000","journal-title":"Phys. Rev. Lett."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/11\/1107\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T05:27:58Z","timestamp":1761715678000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/11\/1107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"references-count":42,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["e27111107"],"URL":"https:\/\/doi.org\/10.3390\/e27111107","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2025,10,26]]}}}