Abstract
We give the detailed processes for sharing a four-qubit pure entangled state as quantum channel in amplitude damping (AD) network channel via entanglement compensation.We propose a secure (2,2)-type quantum teleportation (QT) scheme based on this AD network channel, which allows 2-dimensional quantum information shared by 2 senders to be teleported to 2 receivers in such a way that after performing two Bell-state measurements by two senders, the original target state can be probabilistically reconstructed through introducing an auxiliary qubit and executing appropriate local unitary operations provided that all the receivers collaborate. We then extend it to the transmission of a 2-dimensional quantum secret state shared by n senders to m receivers (i.e., (n,m)-type QT of shared 2-dimensional quantum secret) from the perspectives of projective measurement, positive-operator-valued measurement (POVM) and generalized Bell-state measurement. Furthermore, we generalize the above (n,m)-type QT to the case of transmitting a shared d-dimensional quantum secret state. Our approach enables efficient and distributed quantum information relay, eliminating the need for a fully trusted central or intermediary node. The results show that our schemes achieve unit fidelity, though the success probabilities are less than 1. More interestingly, the QT protocol for high-dimensional quantum states exhibits a higher success probability than low-dimensional states under equivalent AD conditions.
Citation: Aisan Y, Maihemuti N, Peng J, Wang Z, Tang J (2025) Quantum teleportation of shared quantum secret in amplitude-damping channel. PLoS One 20(11): e0334902. https://doi.org/10.1371/journal.pone.0334902
Editor: Alemayehu Getahun Kumela, Universite Cote d’Azur, FRANCE
Received: June 29, 2025; Accepted: October 3, 2025; Published: November 10, 2025
Copyright: © 2025 Aisan et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper and its Supporting information files.
Funding: This work was supported by the following grants: the Flexible Introduction Research Initiation Fund of Kashi University (Grant Nos. 022024077 and 022024075), the School-level Research Project of Kashi University (Grant Nos. (2023) 1835 and (2024) 2923), the Natural Science Foundation of Xinjiang Uygur Autonomous Region (Grant No. 2024D01A10), and the Scientific Research Project of the Fundamental Research Funds for Higher Education Institutions in Xinjiang Uygur Autonomous Region (Grant No. XJEDU2025P076).
Competing interests: The authors have declared that no competing interests exist.
1 Introduction
Since the proposal of QT in 1993 [1], it has been one of the most celebrated and extensively studied protocols for exploiting quantum entanglement [2]. This technique provides a way for two distant users to take advantage of the nonlocal correlations of an initially shared Einstein-Podolsky-Rosen state to teleport an arbitrary unknown single-qubit state from one site to another. QT is a unique phenomenon in quantum mechanics, without a counterpart in classical physics, and plays an important role in quantum information processing including secure quantum communication and quantum computing. Ever since Bennett et al. [1] first discovered that the information of an unknown qubit can be split into fragments and then recovered using classical information and quantum correlations, scholars have shown great interest in QT. On the other hand, some experiments soon demonstrated the QT of unknown single-qubit state with entangled photonic, atomic and ionic qubits [3–14]. Moreover, many theoretical protocols for transmitting an unknown quantum state through various quantum channels have been proposed [15–26]. Specifically, in a d-dimensional quantum system, if one has a resource of maximally entangled qudits and a measurement apparatus capable of distinguishing the d2 elements of the d-dimensional Bell basis, then an arbitrary multi-qudit state can be transmitted between two distant locations even without previous knowledge of it [16,18].
The QT protocol [1] enables precise transfer of quantum states between two locations, and its extension to multiple network nodes or end-users becomes critical for building scalable quantum communication infrastructures. Controlled teleportation, initially proposed in theoretical frameworks [27–30], has been experimentally validated [31–33], enabling directional distribution of quantum states from a single source to multiple receivers. This operational framework for multipartite quantum secret sharing (QSS) with enhanced security constraints [34–36] builds upon the foundational theories of Cleve et al. [37] and Gottesman [38]. In 1999, Cleve et al. [37] investigated the concept of quantum secret sharing, proposing threshold schemes and proving that (k,n) quantum secret sharing requires n<2k, providing a systematic construction method for such protocols. Later, Gottesman [38] introduced a variety of results on the theory of quantum secret sharing, establishing key principles for QSS, including the requirement for share sizes to match the secret’s dimension and the constraints imposed by the quantum no-cloning theorem.As QSS protocols advanced, these theoretical foundations were further extended. For example, Yuan et al. [39] proposed a three-party QSS scheme that allows for the deterministic recovery of arbitrary two-qutrit states through collaborative unitary operations, which was later generalized to multi-party systems. These developments align with Gottesman’s theoretical framework [38] regarding the dimensional requirements of shares and the design of access structures. Wei et al. [40] advanced the multi-party QSS of -qudit states through single-qudit operations and measurements, while Wang et al. [41] extended this approach to multi-qudit states via dimensional scalability, the protocol is capable of distributing arbitrary multi-qubit states via collaborative control, and later generalized it through dimensional extensions to handle arbitrary unknown multi-qudit states within the same verification framework.Building on these architectures, a hierarchical quantum computing paradigm with centralized governance has been experimentally demonstrated [42], featuring orchestrated control across distributed quantum processors. In parallel, specialized quantum communication protocols [43,44] have been developed to underpin systematic construction of scalable quantum network infrastructures with adaptive resource allocation capabilities. However, none of the above QT schemes allows us to perform quantum teleportation between multiple senders and multiple receivers. Especially, they lack the ability to directly transmit shared or split quantum information among multiple parties to other agents without concentrating the information in the location of single or subparties, which has led to the requirement of fully trusted central or intermediate nodes in the design of quantum communication networks [45,46]. Recently, Lee et al. [47] presented and experimentally demonstrated a secure QT between multiple senders and receivers, i.e., it can transmit quantum information shared by an arbitrary number of senders to another arbitrary number of receivers, where neither any single nor subparties of senders and receivers can fully access the secret quantum information. This scheme allows us to relay quantum information over a network in an efficient and distributed manner without requiring fully trusted central or intermediate nodes. Subsequently, Li et al. [48] replaced the quantum network channel in Ref [47] with a partially entangled GHZ state to achieve the quantum teleportation of shared quantum secret. In 2024, Peng et al. [49] generalized the results of Lee et al. [47] to the case of teleporting a shared high-dimensional quantum secret. However, most QT schemes focus solely on ideal, noise-free quantum channels, neglecting the impact of channel noise on their performance in real quantum communication.In fact, any open quantum system is inevitably affected by environmental noise during its interaction with the environment, leading to decoherence [50].This implies that whether quantum resources are distributed in a maximally entangled state or a purely entangled state, channel noise inevitably converts the pure state into a mixed entangled state and can even cause entanglement sudden death [51]. Environmental noise leads to various types of decoherence, with AD being a typical mechanism. AD not only represents decoherence due to the dissipative process from the interaction between the quantum system and its environment, but also captures many crucial noise features within the quantum system [52,53]. So far, many scholars have also conducted in-depth research on the QT protocol through AD channel [54–56]. The research shows that distributing quantum resources in an AD noisy channel can reduce the fidelity of the teleported quantum state in the QT scheme. To improve fidelity in non-ideal environments, researchers have employed quantum weak measurement techniques to enhance the fidelity of the teleported state in AD channels [57–59].However, after quantum weak measurement and its inverse measurement, the fidelity of the transmitted state in the AD channel is still unable to reach 1. More importantly, as the attenuation rate of the decoherent channel and weak measurement strength increase in the AD channel, the success probability of the corresponding QT scheme rapidly decreases to zero. Very recently, Hu et al. [60] presented two multiparty schemes in AD channel with unit fidelity that, respectively share an arbitrary unknown single-qubit state and single-qutrit state. That is, they considered the exact sharing of single-particle states in two-level and three-level quantum systems based on AD channels.
In this paper, we integrate the core ideas of Refs. [47] and [60], but this is not a simple superposition of the two; rather, it is a systematic scheme constructed through in-depth integration and targeted innovation. Specifically, we innovatively combine the many-to-many interaction framework of the former with the noise robustness technology of the latter, expanding the research scenario to the new direction of “QT of shared quantum secrets in AD channel". We propose a conclusive (2,2)-type QT scheme to realize the transmission of shared 2-dimensional quantum secret states between two senders and two receivers. The scheme consists of two key stages: in the first stage, stable sharing of a 2-dimensional four-qubit pure entangled state between senders and receivers is established in the amplitude-damping channel via optimized entanglement compensation technology; in the second stage, after the senders complete two Bell-state measurements, the receivers accurately reconstruct the original target state by introducing an ancillary qubit and executing local unitary operations adapted to multi-party collaboration. Building on this, we generalize the above scheme to the (n,m)-type quantum teleportation scenario, which supports the transmission of 2-dimensional quantum information shared by n senders to m receivers. Innovatively, we achieve this extension through three measurement methods—projective measurement, positive operator-valued measurement, and generalized Bell-state measurement—breaking through the limitation of single measurement mode in existing schemes. Finally, we further extend the (n,m)-type teleportation of 2-dimensional shared quantum information to the scenario of d-dimensional shared quantum information. Research shows that both the teleportation of shared 2-dimensional and d-dimensional quantum secrets can reach the target receivers with unit fidelity, with the corresponding trade-off that the success probabilities of both schemes are less than 1.
The organization of this article is as follows: Sect 2 proposes a conclusive and secure (2,2)-type QT scheme between two senders and two receivers in an AD channel. Its generalized version, which describes the transmission of 2-dimensional quantum information shared by n senders to m receivers in an AD channel, is presented in Sect 3. Sect 4 extends the discussion in Sect 3, generalizing the transmission of 2-dimensional shared quantum information to the case of d-dimensional shared quantum information. Finally, Sect 5 provides the discussion and conclusion.
2 (2,2)-Type QT of shared 2-dimensional quantum secret in AD channel
Quantum noise is an unavoidable phenomenon in quantum teleportation. Particles that make up the entangled channel suffer from quantum noise during the distribution among multiple participants. Hence, the quantum state that forms the channel changes from pure state to mixed state and it affects the fidelity of the output state in quantum teleportation schemes seriously. An important class of noise related to losses in quantum systems is known as AD noise, which has been used to model various phenomena including idle errors in quantum computing, energy dissipation, spontaneous photon emission, and attenuation, among others in two level systems. For a single qubit in a 2-dimensional quantum system, the Kraus operators for AD noise are defined as:
where represents the amplitude damping strength.
In this section, we will explain in detail the (2,2)-type QT scheme that supposes a quantum secret in with logical basis
and
, which is shared by separated 2 parties in quantum network through a splitting protocol [27–30]. We utilize a pure Greenberger-Horne-Zeilinger (GHZ) state to encode both the network qubits and the logical qubits. For a 2-qubit system, the specific form of this GHZ state is
. Alice and Bob, the two senders,attempt to transmit the secret to Charlie and David,the two receivers connected within the network, using an AD channel. None of the participants are fully trusted in this scenario, ensuring that neither the senders nor the receivers can access the secret individually throughout the entire process.The secret state designated for teleportation is represented by
, where α and β are probability amplitudes satisfying
,and s1 and s2 are qubits held by Alice and Bob respectively. Upon transmission, the receivers obtain the shared secret state
, with r1 and r2 assigned to Charlie and David respectively.
To complete the QT task, we need to go through the following stages.
Stage 1 Preparation of quantum channel.
(a1) Alice generates a Bell state . Afterwards, she sends the qubit A1 to Bob through an amplitude damping channel.
(a2) After Bob receives the qubit A1, he first introduces an ancillary qubit B in the initial state , and then sends qubit pair (A1,B) into a CNOT gate, where qubits A1 and B serve as the control and target particle, respectively. The quantum operator corresponding to the CNOT gate is defined as:
where subscripts 1 and 2, respectively represent the control qubit and target qubit. After that, Bob delivers qubit A1 to Charlie via the amplitude damped channel.
(a3) After Charlie receives the qubit A1, he also introduces an auxiliary qubit C in the initial state and performs a CNOT gate on qubit pair (A1,C), where qubit A1 acts as the control particle and qubits C as target particle. Then, he transmits qubit A1 to David through the amplitude damped channel.
(a4) When David receives the qubit A1, he introduces an auxiliary qubit D in the initial state and performs a CNOT gate on qubit pair (A1,D), where qubit A1 acts as the control particle and qubit D as target particle. Then, he transmits qubit A1 to Alice through the amplitude damped channel.
(a5) After receiving qubit A1, Alice initially performs the CNOT operation on the qubit pair (A,A1), where qubit A acts as the control particle and qubit A1 as the target particle. She then conducts a single-qubit projective measurement on her qubit A1 in the Z-basis . If Alice’s measurement outcome is
, the scheme proceeds to Step 1 in Stage 2. Otherwise, the scheme terminates and restarts from scratch until Alice obtains a successful measurement outcome
.
From the above (a5), if Alice gains the measurement results successfully,the collective state of the qubits (A,A1,B,C,D) collapses into a purely entangled state:
and the detailed proof of Eq (3) can be found in S1 Appendix. That is, Alice, Bob and Charlie have successfully shared the four-qudit quantum state .
Stage 2 (2,2)-type QT of shared 2-dimensional information.
The initial composite system consists of the shared secret and the shared pure entangled state.The composite state is expressed as:
with
Step 1 in Stage 2 The measurements of senders.
By adjusting the order of the four qubits in Eq (4) from to
, we obtain the following (with subscripts omitted for brevity):
where the Bell states are defined as
The senders Alice and Bob carry out the Bell-state measurements on the qubit pairs (s1,A) and (s2,B), respectively. After conducting two Bell-state measurements, Alice and Bob transmit the measurement outcomes to the receivers Charlie and David through classical communication channels. The measurement outcome for Alice or Bob is denoted as , which corresponds to sj. The classical bit pairs
are mapped to the Bell states
.
Step 2 in Stage 2 The receivers’ reconstructions of the target state.
(c1) If the measurement result is or
from Alice and Bob, each of Charlie and David performs the local Pauli operation
, where
, and the collapsed state of Charlie and David will be changed into
To accurately reconstruct the initial state with unity fidelity, it is necessary to introduce an auxiliary qubit in the state . This auxiliary qubit will play a crucial role in ensuring the fidelity of the state reconstruction.Owing to the symmetry of the qubits in state
, the auxiliary qubit can be held by any one of the receivers, Charlie and David. Without loss of generality, we can assume that David holds the auxiliary qubit and subsequently performs a collective unitary transformation. This transformation will be applied to the combined system in order to reconstruct the initial state.
under the basis . It transforms the product state
to
David then performs a single-qubit projective measurement on the auxiliary qubit in the Z-basis . If the result is
, teleportation succeeds with fidelity 1. However, if the result is
, teleportation fails and no information about the target state is obtained. The optimal success probability is given by
, where “optimal" refers to the inclusion of the auxiliary qubit.
(c2) If the senders’ measurement result is or
, one of the receivers, either Charlie or David, applies the local Pauli operation
, where
, and the other receiver applies the Pauli operation
. This process will cause the collapsed state owned by the receivers to become the desired state:
Similarly, an auxiliary qubit D in the initial state is introduced at the location of the receiver David, and the corresponding collective unitary transformation under the basis
is
which will transform the product state to
Next, David performs a single-qubit measurement in the computational basis on the auxiliary qubit. The target state can only be reconstructed if the result is , with a probability of
. By considering both contributions, the optimal probability of successful teleportation is
.
Interestingly, when (i.e., amplitude damping noise vanishes),
becomes a maximally entangled four-qubit GHZ state, and
, meaning David does not need to do anything on the corresponding operations.Thus, the above scheme reduces to the standard protocol for quantum teleportation of shared quantum secret Ref [47]. In this sense, our scheme is a generalization of that in Ref [47].
3 (n,m)-Type QT of shared 2-dimensional quantum secret in AD channel
In the previous section, we describe in detail the (2,2)-type quantum teleportation of shared 2-dimensional quantum secret in amplitude damped channel. Now let’s generalize this (2,2)-type scheme to that of (n,m)-type, where n and m are any natural numbers greater than 2. Suppose a quantum secret in was previously shared among n separated parties,denoted as
, in the quantum network via a splitting protocol.The senders, a group
of n parties, attempt to teleport the quantum secret to the receivers, another group
of m parties, connected through the network. Of course, the secret state obtained at the receivers’ hands can be reconstructed as
. None of the participants is fully trusted, so no individual or subgroup of senders or receivers is allowed to access the quantum secret during the entire process.
Using a similar quantum channel preparation method as in Stage 1 of Sect 2, the senders and receivers can share an -qubit pure entangled state, written as
where are auxiliary qubits held by the senders to construct the quantum channel. Thus, by using the Bell states as shown in Eq (7), the initial composite system
can be written as
where
To complete this quantum teleportation task, we need to adjust the order of 2n qubits from to
, resulting in the following state (subscripts omitted for brevity):
where represents the sum of all possible permutations. For example,
Each sender sj performs a standard Bell-state measurement on their two qubits sj and , then informs the receivers of the result through classical channels. After performing n Bell-state measurements, the state of the qubits
will collapse into one of the following states:
Define the measurement result of the sender sj as , with the classical bits
corresponding to the Bell states
. When the measurement result is
or
, each receiver rj applies the local Pauli operator
(
) on their qubit rj, and the collapsed state becomes
If the measurement result is or
, one of the receivers applies the local Pauli operator
(
), while the other receivers apply the operator
. This will result in the collapsed state becoming
3.1 (n,m)-Type QT based on projective measurement
Apparently, the states and
have not yet been reconstructed by the receivers as the intended target states. To achieve the restoration of the initial state with perfect fidelity, it is necessary to introduce an auxiliary qubit initialized in the state
. First, consider the situation where the measurement outcome is either
or
. Given the symmetry of the state
, any receiver can possess the ancillary qubit. Without loss of generality, we can assume that the final receiver rm holds the ancillary qubit and subsequently performs a unitary transformation.
under the basis . This transformation converts the product state
to
The receiver rm then performs a single-qubit projective measurement on the auxiliary qubit in the Z-basis . If the result is
, the teleportation is successfully completed with unity fidelity. However, if the result is
, the teleportation fails, and no information about the target state is obtained. The probability of success is
.
When the measurement result is or
, the receiver rm similarly applies the corresponding collective unitary transformation.
under the basis . This transformation will change the product state
to
Next, the receiver rm performs a single-qubit projective measurement on the auxiliary qubit in the basis . Only if the result is
, the target state can be reconstructed with probability
. Adding both contributions together, the optimal probability of successful teleportation is obtained as
.
It is worth mentioning that when ,
is a maximally entangled channel, and the success probability is 1, which means that this scheme is a generalization of that in Ref [47].
3.2 (n,m)-Type QT based on positive operator-valued measurement
Let us only consider Eq (20), as the discussion on Eq (21) yields the same result. After introducing an auxiliary qubit with the original state
by the last receiver rm, he or she implements a controlled-NOT (CNOT) gate on qubits rm and A, where rm works as the control qubit and A as the target qubit. It will transform the product state
to
where
To determine and
, the receiver rm must perform a POVM on the auxiliary qubit A. The POVM should be structured as follows:
in this case,I denotes the identity operator,and
and the μ related to parameter γ should ensure that O3 is a semi positive operator. To determine μ, we need to rewrite and O3 in matrix form
To make O3 a positive operator, the parameter μ should satisfy the condition
After performing the POVM, the receiver rm is able to obtain Oj () with the following probability
where . According to
of the POVM, the receiver rm can infer the state
or
of the auxiliary qubit A. However, based on the value
, the receiver rm can obtain O3, but cannot infer the state of the auxiliary qubit A. Once receiver rm determines the state
(or
) it means he or she knows the state
(or
), and then he or she applies the operation I (or
) to qubit rm. In this way, the state of qubits
becomes
with the probability
and unit fidelity.
For Eq (21), we can obtain the same conclusion, so the total success probability in POVM stage is , therefore, the success probability of our scheme is
. Apparently, the maximum success probability of our scheme is
if
. Interestingly, when
, the maximum success probability is 1, and
is
-qubit GHZ state, which means that our scheme here is standard quantum teleportation of shared secret.
3.3 (n,m)-Type QT based on a single generalized Bell-state measurement
In the previous subsections, attaining unit fidelity in teleporting the initially shared state necessitated the use of an auxiliary qubit, followed by a transformation involving two qubits. However, we show here that the receivers can reconstruct the target state without the need for an auxiliary qubit, albeit with a non-unit probability. This is achieved by substituting Bell-state measurements with a single generalized Bell-state measurement. To initiate this process, we construct the generalized Bell-state basis as follows:
Using this generalized Bell-state basis, we rewrite the initial system as follows
where ,
,
and
are defined in Eq (17). In this scenario, the sender s1 performs a generalized Bell-state measurement on the qubit pair
. Actually, any sender within the group can perform the generalized Bell-state measurement due to the symmetry of the initial state
and the network channel
, yielding identical results. Without loss of generality, we assume the first sender is tasked with this operation, while the other senders proceed with the standard Bell-state measurements. It is clear that the result remains unchanged regardless of the order in which the joint measurements are carried out.
If the measurement result is , the state available to the receivers will be
. Similarly, if the outcome corresponds to
, the resulting state at the receivers’ side will be
.
In both cases, the receivers can reconstruct the target state by implementing the appropriate local Pauli operations. As a result, the probability of successful state recovery is given by , where p1 denotes the success probability in the absence of an auxiliary qubit.
If the measurement outcome is , the state at the receivers’ hands will be be
, and when the outcome is
, the state will be
. In both of these scenarios, the receivers have the capability to recover the target state by applying the appropriate local Pauli operators. Consequently, the successful probability is
, where p1 means the successful probability without introducing an auxiliary qubit.
If the measurement outcome is or
, the unnormalized state will be
or
, respectively. Similar to Scheme 1 in Sect 3.1, the receivers can obtain the target state by introducing an auxiliary qubit to assist state evolution, and the corresponding general evolution is found by replacing
with
in Eqs (22) and (24) respectively. Consequently, the success probability is
, where p2 represents the success probability with the introduction of an auxiliary qubit. Therefore, the total successful probability is
.
4 (n,m)-Type QT of shared d-dimensional quantum secret in AD channel
In Sect 3, we discuss in detail the (2,2)-type quantum teleportation of shared 2-dimensional quantum secret in an AD channel. As its generalization, in this section, we consider the teleportation of shared d-dimensional quantum secret in an AD channel. Suppose that the senders have already shared a d-dimensional quantum secret
where (
) are complex numbers with
. The objective is to securely teleport the confidential
to a network of interconnected receivers
. No complete trust is vested in any of the individuals involved, guaranteeing that confidential information remains inaccessible to any unauthorized individuals or group of senders or receivers at every stage of the process.The senders or receivers are considered to begin in a d-dimensional amplitude damping noisy environment, where the corresponding Kraus operators are given by [52]
and with
.
Using a similar quantum channel preparation method as in Stage 1 of Sect 2, with the GHZ state , the generalized CNOT transformation
and the inverse generalized CNOT transformation
[60], the senders and receivers will share the following
-qudit pure state:
We suggest a new implementation scheme for the teleportation of the shared secret state through mutual collaboration as follows. Firstly, the initial composite system can be written as
with
where .
By rearranging the order of the 2n qudits from to
, and we obtain the following (with subscripts omitted for simplicity).
with
where , and the d-dimensional Bell states
form a mutually orthogonal basis in a two-qudit d-dimensional system.
Secondly, the senders execute measurements on their individual qudit pairs to obtain d-dimensional Bell-state information, telling the results to the receivers. The combined measurement results from all transmitters produce a collective measurement outcome. In general, when a collective measurement yields the outcome , it results in the disintegration of the state of the remaining qudits:
After receiving the measurement outcomes from the senders, each of the first m–1 receivers performs the following unitary transformation
on their respective qubits, and the final receivers executes the unitary transformation
on his/her qudit. Then the state will change into
To achieve a unified fidelity in restoring the initial state, we need to introduce an auxiliary qubit A with the initial state . Because the m qudits in the state
are symmetric, the result of any receiver holding this auxiliary qubit is the same. Without loss of generality, it is possible to assume that the final receiver rm possesses the auxiliary qubit A and subsequently performs a collective matrix unitary transformation
under the basis , where the block matrix
includes the submatrix
and I denotes the identity matrix. After applying the unitary transformation
, the product state
transforms into
Finally, the receiver rm performs a single-qubit projective measurement on the auxiliary qubit A in the Z-basis . If the outcome is
, the receivers obtain the target state
, which signifies a successful teleportation with fidelity 1.The success probability for this scenario is
, where the probability of obtaining the measurement result
is
, and the probability of measuring
is
. Conversely,if the outcome is
, the teleportation is failed.
According to the above discussion, we can see from Eq (38) that for any , the successful probability is
. Therefore, the total probability of our scheme is
.
Remark. When r = 0, the state , and the success probability is
, which means that our scheme is the standard scheme [49].
5 Discussion and conclusion
Accessible information—Any subparties cannot fully access the quantum secret during the teleportation procedures.In fact, taking Sect 3.1 as an example,suppose for simplicity that m = 1, and a single sender sk tries to reconstruct the secret at their location using the results announced by the other senders.Once all the other senders except sk execute a Bell-state measurement, the remaining state is either or
. By tracing out the receiver’s party, the reduced state at his or her party is either
or
unless the entire channel is under their control.Therefore, only the amplitude information is accessible to sk. The same applies to any subparties of senders and receivers.
It is evident that multiple distinct approaches exist for constructing generalized Bell-state basis. For example, the vectors
also form a set of mutually orthogonal generalized Bell-state bases.
It is important to note that, except for the (n–1) standard Bell-state measurements utilized in Sect 3.3, all other schemes involve n standard Bell-state measurements, which are unnecessary. In fact, a single Bell-state measurement or generalized Bell-state measurement suffices to implement each scheme. Rewrite Eq (17) as (without normalization)
implying that carrying out one Bell-state measurement along with 2(n–1) X-basis measurements is equivalent to performing n Bell-state measurements (or one generalized Bell-state measurement and (n–1) Bell-state measurements). In this context, the X-basis measurement is a single-qubit projective measurement in the basis . Since performing two single-qubit measurements is much more experimentally feasible than a two-qubit joint measurement, it appears that we should opt for the latter, where only one Bell-state (or generalized Bell-state) measurement is performed. However, only two Bell states,
and
, can be unambiguously identified, meaning the success probability of a single Bell-state measurement is restricted to 1/2 [61,62]. Therefore, in Eq (17), while performing n Bell-state measurements, failure occurs only when the measurement result is
or
. As a result, the success probability increases to 1–2−n, which shows that increasing n enhances the probability of successfully distinguishing the logical Bell states.
From the above schemes, the success probabilities of the schemes in Sects 2, 3, and 4 are
respectively, where n + m>4 and d>2. Through algebraic computation, we find
This means that the more participants there are, the lower the success probability of the corresponding scheme; furthermore, the success probability of high-dimensional system scheme is greater than that of low-dimensional system scheme.
Finally, let us briefly discuss the security of our schemes. The security of quantum communication depends entirely on whether the entanglement used as a quantum channel, has been securely shared by the legitimate participants in advance. In other words, we need to assess the security of the entanglement resources during their distribution. By leveraging well-established and comprehensive verification strategies [63,64] used in other similar quantum tasks, malicious attacks from external sources or deceit from internal parties can be straightforwardly detected. For simplicity, we will not elaborate further here. Thus, the security of our schemes is fully guaranteed.
In summary, building on the foundations of Refs [47] and [60], we have introduced several new conclusive quantum teleportation schemes in the amplitude damping channel, enabling the teleportation of shared 2-dimensional and high-dimensional quantum secrets from an arbitrary number of senders to an arbitrary number of receivers. It is worth emphasizing that our work is not a trivial combination of existing achievements but an innovative extension tailored to the needs of practical quantum networks, with distinct core contributions that differ significantly from previous literature: specifically, our core research object is pre-shared quantum secrets, addressing the new scenario of “secondary relay transmission of shared resources" in distributed networks rather than first-time distribution or preparation of known states; in terms of interaction mode, we have broken through the limitation of “single sender to multiple receivers" in existing studies, realizing many-to-many communication (n senders to m receivers) and ensuring no subset of senders or receivers can access the secret independently, which is fundamentally different from centralized transmission modes. The proposed schemes consist of two stages: preparing pure entangled states in the amplitude damping channel and transferring shared quantum secrets between multiple parties in the network. Research findings demonstrate that, unlike all previous methods, the fidelity of each of our schemes can consistently reach 1 regardless of the strength of amplitude damping noise. Additionally, the success probabilities of the proposed schemes depend on the dimension of the quantum system, the strength of amplitude damping, and the number of participants. Specifically, the fewer the participants or the higher the dimension of the quantum system, the higher the success probability of the corresponding scheme. This unique advantage of high-dimensional scenarios (where the teleportation success probability of d-dimensional shared secrets is higher than that of low-dimensional ones under the same noise conditions) provides references for the design of high-dimensional quantum networks.These innovations collectively constitute the unique value of our work in both theoretical and practical aspects, offering a conceptual expansion of multiparty quantum communication in AD noisy environments and laying the foundation for the realization of distributed quantum communications and computations in diverse quantum networks.
References
- 1. Bennett C, Brassard G, Crépeau C, Jozsa R, Peres A, Wootters W. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys Rev Lett. 1993;70(13):1895–9. pmid:10053414
- 2. Pirandola S, Eisert J, Weedbrook C, Furusawa A, Braunstein SL. Advances in quantum teleportation. Nature Photon. 2015;9(10):641–52.
- 3. Bouwmeester D, Pan J-W, Mattle K, Eibl M, Weinfurter H, Zeilinger A. Experimental quantum teleportation. Nature. 1997;390(6660):575–9.
- 4. Furusawa A, Sorensen J, Braunstein S, Fuchs C, Kimble H, Polzik E. Unconditional quantum teleportation. Science. 1998;282(5389):706–9. pmid:9784123
- 5. Boschi D, Branca S, De Martini F, Hardy L, Popescu S. Experimental realization of teleporting an unknown pure quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys Rev Lett. 1998;80(6):1121–5.
- 6. Kim YH, Kulik SP, Shih Y. Quantum teleportation of a polarization state with a complete bell state measurement. Phys Rev Lett. 2001;86(7):1370–3. pmid:11178086
- 7. Barrett MD, Chiaverini J, Schaetz T, Britton J, Itano WM, Jost JD, et al. Deterministic quantum teleportation of atomic qubits. Nature. 2004;429(6993):737–9. pmid:15201904
- 8. Riebe M, Häffner H, Roos CF, Hänsel W, Benhelm J, Lancaster GPT, et al. Deterministic quantum teleportation with atoms. Nature. 2004;429(6993):734–7. pmid:15201903
- 9. Chen Y-A, Chen S, Yuan Z-S, Zhao B, Chuu C-S, Schmiedmayer J, et al. Memory-built-in quantum teleportation with photonic and atomic qubits. Nature Phys. 2008;4(2):103–7.
- 10. Marcikic I, de Riedmatten H, Tittel W, Zbinden H, Gisin N. Long-distance teleportation of qubits at telecommunication wavelengths. Nature. 2003;421(6922):509–13. pmid:12556886
- 11. Ursin R, Jennewein T, Aspelmeyer M, Kaltenbaek R, Lindenthal M, Walther P, et al. Communications: quantum teleportation across the Danube. Nature. 2004;430(7002):849. pmid:15318210
- 12. Sherson JF, Krauter H, Olsson RK, Julsgaard B, Hammerer K, Cirac I, et al. Quantum teleportation between light and matter. Nature. 2006;443(7111):557–60. pmid:17024089
- 13. Olmschenk S, Matsukevich DN, Maunz P, Hayes D, Duan L-M, Monroe C. Quantum teleportation between distant matter qubits. Science. 2009;323(5913):486–9. pmid:19164744
- 14. Jin X-M, Ren J-G, Yang B, Yi Z-H, Zhou F, Xu X-F, et al. Experimental free-space quantum teleportation. Nature Photon. 2010;4(6):376–81.
- 15. Karlsson A, Bourennane M. Quantum teleportation using three-particle entanglement. Phys Rev A. 1998;58(6):4394–400.
- 16. Zhou P, Li X-H, Deng F-G, Zhou H-Y. Multiparty-controlled teleportation of an arbitrarym-qudit state with a pure entangled quantum channel. J Phys A: Math Theor. 2007;40(43):13121–30.
- 17. Muralidharan S, Panigrahi PK. Perfect teleportation, quantum-state sharing, and superdense coding through a genuinely entangled five-qubit state. Physical Review A—Atomic, Molecular, and Optical Physics. 2008, 77(3):032321.
- 18. Long L, Li H, Zhou P, Fan C, Yin C. Multiparty-controlled teleportation of an arbitrary GHZ-class state by using a d-dimensional (N+2)-particle nonmaximally entangled state as the quantum channel. Sci China Phys Mech Astron. 2011;54(3):484–90.
- 19. Peng J-Y, Mo Z-W. Quantum sharing an unknown multi-particle state via POVM. Int J Theor Phys. 2012;52(2):620–33.
- 20. Wang X-L, Cai X-D, Su Z-E, Chen M-C, Wu D, Li L, et al. Quantum teleportation of multiple degrees of freedom of a single photon. Nature. 2015;518(7540):516–9. pmid:25719668
- 21. Peng J-Y, Bai M-Q, Mo Z-W. Hierarchical and probabilistic quantum state sharing via a non-maximally entangled |χ> state. Chinese Phys B. 2014;23(1):010304.
- 22. Nie Y, Sang M, Li S. Tripartite controlled teleportation via a seven-qubit entangled state. Int J Theor Phys. 2017;56(9):2792–6.
- 23. Hu X, Zhang C, Zhang C, Liu B, Huang Y, Han Y, et al. Experimental certification for nonclassical teleportation. Quantum Engineering. 2019;1(2).
- 24. Peng J, Bai M, Mo Z. Deterministic multi-hop controlled teleportation of arbitrary single-qubit state. Int J Theor Phys. 2017;56(10):3348–58.
- 25. Wang M-R, Ren P, Xiang Z. Synchronous multicast-based quantum teleportation scheme via a six-qubit entangled state. Mod Phys Lett B. 2022;36(30n31).
- 26. Ma Y. Convenient quantum controlled teleportation of two-qubit pure state with seven-qubit entangled state. Laser Phys Lett. 2023;20(9):095204.
- 27. Karlsson A, Bourennane M. Quantum teleportation using three-particle entanglement. Phys Rev A. 1998;58(6):4394–400.
- 28. Hillery M, Bužek V, Berthiaume A. Quantum secret sharing. Phys Rev A. 1999;59(3):1829–34.
- 29. MA L. Two-qubit quantum state sharing protocol based on bell state. Int J Theor Phys. 2020;59(6):1844–53.
- 30. Qin H, Tso R, Dai Y. Multi-dimensional quantum state sharing based on quantum Fourier transform. Quantum Inf Process. 2018;17(3).
- 31. Zhao Z, Chen Y-A, Zhang A-N, Yang T, Briegel HJ, Pan J-W. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature. 2004;430(6995):54–8. pmid:15229594
- 32. Lee J, Kim M. Entanglement teleportation via werner states. Phys Rev Lett. 2000;84(18):4236–9. pmid:10990654
- 33. Luo Y-H, Zhong H-S, Erhard M, Wang X-L, Peng L-C, Krenn M, et al. Quantum teleportation in high dimensions. Phys Rev Lett. 2019;123(7):070505. pmid:31491117
- 34. Deng FG, Li HX, Li CY, et al. Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs. Physical Review A. 2005, 73(4):044301.
- 35. Man Z-X, Xia Y-J, An NB. Quantum state sharing of an arbitrary multiqubit state using nonmaximally entangled GHZ states. Eur Phys J D. 2007;42(2):333–40.
- 36. Qin H, Tso R, Dai Y. Multi-dimensional quantum state sharing based on quantum Fourier transform. Quantum Inf Process. 2018;17(3).
- 37. Cleve R, Gottesman D, Lo H-K. How to share a quantum secret. Phys Rev Lett. 1999;83(3):648–51.
- 38. Gottesman D. Theory of quantum secret sharing. Physical Review A. 2000;61(4):042311.
- 39. Hao Y, Yi-Min L, Lian-Fang H, Zhan-Jun Z. Tripartite arbitrary two-qutrit quantum state sharing. Commun Theor Phys. 2008;49(5):1191–4.
- 40. Wei Y, Jiang M. Multi-qudit state sharing via various high-dimensional Bell channels. Quantum Inf Process. 2014;14(3):1091–102.
- 41. Wang M-M, Chen X-B, Chen J-G, Yang Y-X. Quantum state sharing of arbitrary known multi-qubit and multi-qudit states. Int J Quantum Inform. 2014;12(03):1450014.
- 42. Gong NF, Wang TJ, Ghose S. Control power of a high-dimensional controlled nonlocal quantum computation. Physical Review A. 2021;103:052601.
- 43. Li YH, He LM, Zhou P. Quantum state sharing and teleportation in a noiseless quantum channel. International Journal of Theoretical Physics. 2021;60(3):1635–48.
- 44. Wang C, Zeng Z, Li X-H. Controlled remote state preparation via partially entangled quantum channel. Quantum Inf Process. 2015;14(3):1077–89.
- 45. Sun Q-C, Mao Y-L, Chen S-J, Zhang W, Jiang Y-F, Zhang Y-B, et al. Quantum teleportation with independent sources and prior entanglement distribution over a network. Nature Photon. 2016;10(10):671–5.
- 46. Pant M, Krovi H, Towsley D, Tassiulas L, Jiang L, Basu P, et al. Routing entanglement in the quantum internet. NPJ Quantum Inf. 2019;5(1).
- 47. Lee SM, Lee S-W, Jeong H, Park HS. Quantum teleportation of shared quantum secret. Phys Rev Lett. 2020;124(6):060501. pmid:32109109
- 48. Li H, Li J, Chen X. Probabilistic quantum teleportation of shared quantum secret. Chinese Phys B. 2022;31(9):090303.
- 49. Peng J, Maihemuti N, Aisan Y, Yang Z. Quantum teleportation of shared high-dimensional quantum secret. Phys Scr. 2024;99(8):085125.
- 50.
Cong S, Kang S. Control theory and methods of quantum. Press of University of Science and Technology of China. 2020.
- 51. Yu T, Eberly JH. Finite-time disentanglement via spontaneous emission. Phys Rev Lett. 2004;93(14):140404. pmid:15524773
- 52. Fonseca A. High-dimensional quantum teleportation under noisy environments. Physical Review A. 2019;100(6):062311.
- 53.
Nielsen MA, Chuang IL. Quantum computation and quantum information. Cambridge University Press; 2000.
- 54. Zhou Q-Y, Zhao F, Wang D, Ye L. Improving steering and entanglement by local filtering operation under noisy channels. J Phys Soc Jpn. 2022;91(11).
- 55. Yang G, Lian B-W, Nie M, Jin J. Bidirectional multi-qubit quantum teleportation in noisy channel aided with weak measurement. Chinese Phys B. 2017;26(4):040305.
- 56. Zhou R-G, Zhang Y-N, Xu R, Qian C, Hou I. Asymmetric bidirectional controlled teleportation by using nine-qubit entangled state in noisy environment. IEEE Access. 2019;7:75247–64.
- 57. Yang G, Lian B-W, Nie M, Jin J. Bidirectional multi-qubit quantum teleportation in noisy channel aided with weak measurement. Chinese Phys B. 2017;26(4):040305.
- 58. Singh D, Kumar S. Enhancing the fidelity of controlled cyclic teleportation via quantum weak measurement techniques to combat the decoherence due to amplitude damping. Int J Quantum Inform. 2024;22(04).
- 59. Pramanik T, Majumdar AS. Improving the fidelity of teleportation through noisy channels using weak measurement. Physics Letters A. 2013;377(44):3209–15.
- 60. Hu WW, Zhou R-G, Luo GF. Conclusive multiparty quantum state sharing in amplitude-damping channel. Quantum Inf Process. 2021;21(1).
- 61. Lütkenhaus N, Calsamiglia J, Suominen K-A. Bell measurements for teleportation. Phys Rev A. 1999;59(5):3295–300.
- 62. Calsamiglia J, Lütkenhaus N. Maximum efficiency of a linear-optical Bell-state analyzer. Appl Phys B. 2001;72(1):67–71.
- 63. Deng FG, Li XH, Zhou HY. Improving the security of multiparty quantum secret sharing against Trojan horse attack. Physical Review A. 2005;72:044302.
- 64. Zhang ZJ, Yang J, Man ZX, Li Y. Multiparty secret sharing of quantum information using and identifying Bell states. Eur Phys J D. 2005;33(1):133–6.