High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels

Hong Lai*, Josef Pieprzyk, Ming Xing Luo, Cheng Zhan, Lei Pan, Mehmet A. Orgun

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)
4 Downloads (Pure)


The main weakness of entanglement is its sensitiveness to the photon loss. In this paper, we exploit the different transmission losses of the free-space and optical fiber quantum channels, to develop a novel approach for (2,3) threshold quantum secret sharing (QSS) of classical information. To be exact, the Dealer Alice allocates W-state to three participants Bob, Charlie and David in terms of the asymmetric losses of their quantum channels, preventing any one participant from recovering the secret alone, but allowing any two of them to recover the secret. In such a way, Alice can flexibly choose the suitable degree of freedom to allocate the quantum shares with respect to the loss characteristics of different quantum channels. Our proposed scheme improves the information capacity from three bits to (log 2m+ 2) bits, where m denotes the dimension of orbital angular momentum, and improves the security and flexibility of quantum communication, confirming QSS as a realistic technology for safeguarding secret shares in transmission. This work opens a convenient and favorable way to perform QSS.

Original languageEnglish
Article number157
Pages (from-to)1-13
Number of pages13
JournalQuantum Information Processing
Issue number5
Publication statusPublished - May 2020

Bibliographical note

Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.


  • (2, 3) threshold quantum secret sharing
  • Asymmetric quantum lossy channel
  • Orbital angular momentum


Dive into the research topics of 'High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels'. Together they form a unique fingerprint.

Cite this