1 Introduction

The security of classical channel communication depends on complex mathematical calculations, but the difficulty of these calculations decreases as technology improves, so messages become easier to avoid eavesdropping on. Unlike classical channel communication, the security of quantum communication does not depend on complex mathematical calculations, but on the basic knowledge and properties of quantum mechanics. At present, the research directions of quantum communication include quantum teleportation [1,2,3,4,5,6], quantum secure communication [7,9,10,11], quantum dense coding [1214] and quantum secret sharing (QIS) [15,17,18,19,20,21,22,23,24] and so on.

Quantum entanglement is a very magical phenomenon. With its help, quantum information splitting (QIS) protocol has been developed very well since it was proposed by Hillary et al. [15] in 1999. In the QIS protocol, the sender divides the secret into two or more parts and sends it to different agents for storage. No agent can recover the secret alone, and it must cooperate with other agents to recover the secret. Zheng [16] in their scheme uses the w state as a quantum channel to split a quantum information into two or more, and is robust against decoherence. Zhang [17] proposed two schemes for QIS using tripartite entanglement and demonstrated their security under certain eavesdropping. Yang [18] proposed a (t, n) threshold multi-party QIS protocol, the protocol idea is derived from standard teleportation. The above QIS protocols focus on sharing secrets equally, but this is often not the case in practice. For example, the key of a confidential document is distributed to different people, whose identity levels are often different. For trustworthy people, it needs less help to restore the secret, while for untrustworthy people, it needs more help. Gottesman [20] pointed out that a more extensive QIS protocol is needed, and the power of recovering secrets among different agents is unbalanced, but he did not give a specific implementation method. In 2010, Wang et al. [21] first proposed a layered quantum information splitting (HQIS) scheme to deal with the situation of classification according to the agent's own need for secret recovery. In HQIS, the sender can decide which agents have high and low authority based on the position and credit score of the recipient (agent). This hierarchy of rights is realized through the distribution method of entangled channel particles. Before the communication begins, each agent is informed of his level of authority. If an agent decides to restore the target state after the secret delivery, the other agents will assist him accordingly. According to the quantum non-cloning theorem [25], only the specified receiver can restore the target state, because the recovery operation depends on the measurements of other agents, and these messages are only delivered to the specified receiver. After that, wang proposed a variety of HQIS protocols, including the implementation of HQIS using cluster state [22]. Using six-photon cluster states, he divided agents into two levels, with more than one high-level and more than one low-level. Xu et al. [23] proposed a deterministic HQIS scheme that realizes arbitrary double qubit states through cluster states, and extended the scheme to multiple parties by means of the symmetry of cluster states. In 2022, Tang et al. [24] proposed a general HQIS protocol. Although this protocol extended the unknown state qubit to multiple, it still studied the two-level agent HQIS protocol. According to previous studies, agents are almost divided into two levels, high agent and low agent. Faced with the actual situation, the two levels of agents often have limitations, and the number of different levels is often limited.

In this paper, we use the product states of two 4-particle cluster states and two 3-particle GHZ state as quantum channels to realize hierarchical quantum information splitting of two-particle unknown states. In this scheme, one secret sender and several secret receivers are designed. The authority level of the secret receiver is divided into three levels, and different authority levels of the receivers have different ability to recover the secret. First, the sender makes two Bell measurements of the double quantum unknown state and the assigned two particles, and sends the measurements to the receiver over the classical channel. Due to the different authority levels of different agents, the operations are also different, part of the CNOT gate operation, part of the single bit measurement or Hadamard gate operation. After the Secret Restorer measures its own particles, with the help of some or all agents, the Restorer makes corresponding unitary transformations to the particles in its possession to recover the original quantum information. Not only that, considering the actual situation, the agent of high-level corresponds to the super administrator, often only one, the agent of mid-level and the number of low-level agents is often more. Finally, we extend the protocol partially, which can realize the theoretically infinite expansion of the number of low-level agents.

The rest of this article is organized as follows: Sect. 2 introduces some quantum knowledge used in this article. Section 3 gives our HQIS protocol. Section 4 is our extension of Sect. 3 HQIS protocol. Section 5 is about the analysis of the protocol in this paper. Finally, we conclude in Sect. 6.

2 Quantum techniques

In a two-dimensional Hilbert space, there are three possible states for a quantum state:\(\left| {0} \right\rangle\), \(\left| {1} \right\rangle\), and the superposition of these two states \(\alpha \left| {0} \right\rangle { + }\beta \left| {1} \right\rangle\). But what state this quantum state is in can only be known by measurement. There exists such a set of orthogonal bases \(\left| { + } \right\rangle { = }{\raise0.7ex\hbox{${1}$} \!\mathord{\left/ {\vphantom {{1} {\sqrt {2} }}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\sqrt {2} }$}}\left( {\left| {0} \right\rangle { + }\left| {1} \right\rangle } \right)\) and \(\left| - \right\rangle { = }{\raise0.7ex\hbox{${1}$} \!\mathord{\left/ {\vphantom {{1} {\sqrt {2} }}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\sqrt {2} }$}}\left( {\left| {0} \right\rangle - \left| {1} \right\rangle } \right)\). In the case of a single photon measurement there is a probability of \(\left| {{\raise0.7ex\hbox{${1}$} \!\mathord{\left/ {\vphantom {{1} {\sqrt {2} }}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\sqrt {2} }$}}} \right|^{{2}}\) getting \(\left| {0} \right\rangle\), there is a probability of \(\left| {{\raise0.7ex\hbox{${1}$} \!\mathord{\left/ {\vphantom {{1} {\sqrt {2} }}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\sqrt {2} }$}}} \right|^{{2}}\) getting \(\left| {1} \right\rangle\).

A quantum system consists of two parts: subsystem A and subsystem B. The state of subsystem A is represented by the quantum state \(\left| {\psi_{A} } \right\rangle\), and the state of subsystem B is represented by the quantum state \(\left| {\psi_{B} } \right\rangle\). At this time, the state of the whole system is represented by \(\left| {\psi_{A} } \right\rangle \otimes \left| {\psi_{B} } \right\rangle\).

The GHZ state is a common three-particle entangled state, and the specific form is \(\left| {GHZ} \right\rangle_{123} = {\raise0.7ex\hbox{$1$} \!\mathord{\left/ {\vphantom {1 {\sqrt 2 }}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\sqrt 2 }$}}\left( {\left| {000} \right\rangle + \left| {111} \right\rangle } \right)_{123}\). At present, the GHZ state has been successfully extended to the case of particle number n, that is, the entangled state of n particles is \(\left| {GHZ} \right\rangle_{12...n} = {\raise0.7ex\hbox{$1$} \!\mathord{\left/ {\vphantom {1 {\sqrt 2 }}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\sqrt 2 }$}}\left( {\left| {00...0} \right\rangle + \left| {11...1} \right\rangle } \right)_{12...n}\).

Quantum logic gate plays a very important role in quantum secure communication. It can be classified according to the number of quantum bits processed. The following are the single-qubit logic gate and two-qubit logic gate we use.

2.1 Quantum logic gate

  1. 1.

    Gate I, gate I acting on the qubit will not cause any change in the qubit.

  2. 2.

    Gate X, gate X will reverse the qubit, \(\left| 0 \right\rangle \to \left| 1 \right\rangle\) and \(\left| 1 \right\rangle \to \left| 0 \right\rangle\).

  3. 3.

    Gate Z, gate Z scoped qubit causes the qubit to undergo a phase reversal, where 0 remains unchanged and \(\left| 1 \right\rangle \to - \left| 1 \right\rangle\).

  4. 4.

    Gate Y, iY is usually applied to the corresponding qubit, resulting in phase reversals and bit reversals, \(\left| 0 \right\rangle \to - \left| 1 \right\rangle\) and \(\left| 1 \right\rangle \to \left| 0 \right\rangle\)

  5. 5.

    Hadamard Gate, H gate for short. The H gate converts \(\left| 0 \right\rangle\) to \(\left| + \right\rangle\), \(\left| 1 \right\rangle\) to \(\left| - \right\rangle\), and vice versa, \(\left| + \right\rangle\) to \(\left| 0 \right\rangle\) and \(\left| - \right\rangle\) to \(\left| 1 \right\rangle\).

  6. 6.

    Quantum controlled not gate, or CNOT gate. The CNOT gate operates on two qubits, one as a control qubit that does not change, and the other as a target particle that changes according to the state of the control particle. If the control particle is \(\left| 0 \right\rangle\), the target particle does not change; if the control particle is \(\left| 1 \right\rangle\), the target particle performs bit reversal.

3 Three-level of HQIS protocol

Before introducing this Agreement, take a look at Fig. 1, which shows the architecture of this Agreement. After obtaining the double quantum unknown state, the secret sender makes the Bell measurement with some entangled resources, and then distributes the remaining entangled resources to the secret agent. Next, the HQIS protocol is designed by double four-particle bit cluster state and double three-particle GHZ state. Here, we extend the low-level agents so that three low-level agents can be replaced by n low-level agents, as detailed in Sect. 4.

Fig. 1
figure 1

The solid lines represent quantum channels where the sender sends secret information to different levels of agents. The dotted lines between High-level, Mid-level, and Low-level represent the classical channels, and also represent the help the secret restorer needs to recover the secret

Note that the sender is Alice, and the permission levels are Bob, Charlie, and David in descending order. The numeric subscript of the agent name indicates that there are multiple agents at the layer, and the number is used to distinguish agents at the same layer.

Suppose Alice has a two-qubit state,

$$ \left| \varphi \right\rangle_{xy} = \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right)_{xy} $$
(1)

Here, \(\left| \alpha \right|^{2} + \left| \beta \right|^{2} + \left| \gamma \right|^{2} + \left| \delta \right|^{2} = 1\) As the sender, Alice sends a secret state \(\left| \varphi \right\rangle_{xy}\) to the six receivers. The quantum channel between them is composed of 4-qubit cluster states and 3-qubit GHZ state.

$$ \begin{gathered} \left| {C_{1} } \right\rangle_{1234} = \frac{1}{2}\left( {\left| {0000} \right\rangle + \left| {0011} \right\rangle + \left| {1100} \right\rangle - \left| {1111} \right\rangle } \right)_{1234} \\ = \frac{1}{2}\left( {\left| 0 \right\rangle \left| {\varphi^{0} } \right\rangle + \left| 1 \right\rangle \left| {\varphi^{1} } \right\rangle } \right)_{1234} \\ \left| {C_{2} } \right\rangle_{abcd} = \frac{1}{2}\left( {\left| {0000} \right\rangle + \left| {0011} \right\rangle + \left| {1100} \right\rangle - \left| {1111} \right\rangle } \right)_{abcd} \\ = \frac{1}{2}\left( {\left| 0 \right\rangle \left| {\varphi^{0} } \right\rangle + \left| 1 \right\rangle \left| {\varphi^{1} } \right\rangle } \right)_{abcd} \\ \end{gathered} $$
(2)
$$ \begin{gathered} \left| {G_{1} } \right\rangle_{567} = \frac{1}{\sqrt 2 }\left( {\left| {000} \right\rangle + \left| {111} \right\rangle } \right)_{567} \hfill \\ \left| {G_{2} } \right\rangle_{efg} = \frac{1}{\sqrt 2 }\left( {\left| {000} \right\rangle + \left| {111} \right\rangle } \right)_{efg} \hfill \\ \end{gathered} $$
(3)

Here

$$ \begin{gathered} \left| {\varphi^{0} } \right\rangle = \left| {000} \right\rangle + \left| {011} \right\rangle \hfill \\ \left| {\varphi^{1} } \right\rangle = \left| {100} \right\rangle - \left| {111} \right\rangle \hfill \\ \end{gathered} $$
(4)

Among them, particles x, y, 1 and a belong to Alice, particles 2 and b belong to Bob, particles 3 and c, 4 and d belong to Charlie1 and Charlie2 respectively, particles 5 and e belong to David1, particles 6 and f belong to David2, and particles 7 and g belong to David3.

While the whole system is written as

$$ \begin{gathered} \left| \Theta \right\rangle = \left| \varphi \right\rangle _{{xy}} \otimes \left| {C_{1} } \right\rangle _{{1234}} \otimes \left| {G_{1} } \right\rangle _{{567}} \otimes \left| {C_{2} } \right\rangle _{{abcd}} \otimes \left| {G_{2} } \right\rangle _{{efg}} \hfill \\ \quad \;\; = \frac{1}{8}\left( {\alpha \left| {0000} \right\rangle \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \alpha \left| {0001} \right\rangle \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \alpha \left| {0010} \right\rangle \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \alpha \left| {0011} \right\rangle \left| {\varphi ^{1} \varphi ^{1} } \right\rangle } \right. \hfill \\ \quad \;\; + \beta \left| {0100} \right\rangle \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \beta \left| {0101} \right\rangle \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \beta \left| {0110} \right\rangle \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \beta \left| {0111} \right\rangle \left| {\varphi ^{1} \varphi ^{1} } \right\rangle \hfill \\ \quad \;\; + \gamma \left| {1000} \right\rangle \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \gamma \left| {1001} \right\rangle \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \gamma \left| {1010} \right\rangle \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \gamma \left| {1011} \right\rangle \left| {\varphi ^{1} \varphi ^{1} } \right\rangle \hfill \\ \quad \;\; + \delta \left| {1100} \right\rangle \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \delta \left| {1101} \right\rangle \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \delta \left| {1110} \right\rangle \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \delta \left| {1111} \right\rangle \left| {\varphi ^{1} \varphi ^{1} } \right\rangle \hfill \\ \end{gathered} $$
(5)

Here \(\left| \Theta \right\rangle\) uses the fewest quantum resources of the three-layer HQIS protocol, namely \(\left| {C_{1} } \right\rangle\),\(\left| {C_{{2}} } \right\rangle\),\(\left| {G_{1} } \right\rangle\) and \(\left| {G_{{2}} } \right\rangle\). In Sect. 4, we will extend this protocol, and the quantum resources used by the extended protocol will be determined according to the number of low-level agents.

Alice performs two Bell measurements on her qubit (x, 1) and (y, a), respectively. The four Bell states are

$$ \begin{gathered} \left| {\Phi^{ \pm } } \right\rangle = \frac{1}{\sqrt 2 }\left( {\left| {00} \right\rangle \pm \left| {11} \right\rangle } \right) \hfill \\ \left| {\Psi^{ \pm } } \right\rangle = \frac{1}{\sqrt 2 }\left( {\left| {01} \right\rangle \pm \left| {10} \right\rangle } \right) \hfill \\ \end{gathered} $$
(6)

She sends the measurement to the agent over the classical channel. What we know is that Alice can get one of the 16 outcomes with equal probability, and the other qubits collapse into one of the 16 states \(\left| {\theta^{i} } \right\rangle_{234567bcdefg} \left( {i = 0,1,...,14,15} \right)\). Please refer to Table 1 for specific Alice measurements and collapse results of other agents.

Table 1 Alice's measurements and the collapse state of the system

Without losing generality, let us give an example of how this agreement works. Let's say Alice's measurement is \(\left| {\Phi^{ + } \Phi^{ + } } \right\rangle_{x1y5}\), the other six agents’ state will collapse into the state

$$ \begin{gathered} \left| {\theta ^{0} } \right\rangle _{{234bcd567efg}} = \frac{1}{4}\left( {\alpha \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \beta \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \gamma \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \delta \left| {\varphi ^{1} \varphi ^{1} } \right\rangle } \right)\left| {G_{1} G_{2} } \right\rangle \hfill \\ \quad \quad \quad \quad \quad \quad \;\; = \frac{1}{4}\left[ {\alpha \left( {\left| {000000000000} \right\rangle + \left| {000000000111} \right\rangle + \left| {000000111000} \right\rangle + \left| {000000111111} \right\rangle } \right.} \right. \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; + \left| {000011000000} \right\rangle + \left| {000011000111} \right\rangle + \left| {000011111000} \right\rangle + \left| {000011111111} \right\rangle \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; + \left| {011000000000} \right\rangle + \left| {011000000111} \right\rangle + \left| {011000111000} \right\rangle + \left| {011000111111} \right\rangle \hfill \\ \left. {\quad \quad \quad \quad \quad \quad \quad \;\; + \left| {011011000000} \right\rangle + \left| {011011000111} \right\rangle + \left| {011011111000} \right\rangle + \left| {011011111111} \right\rangle } \right) \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; + \beta \left( {\left| {000100000000} \right\rangle + \left| {000100000111} \right\rangle + \left| {000100111000} \right\rangle + \left| {000100111111} \right\rangle } \right. \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; - \left| {000111000000} \right\rangle - \left| {000111000111} \right\rangle - \left| {000111111000} \right\rangle - \left| {000111111111} \right\rangle \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; + \left| {011100000000} \right\rangle + \left| {011100000111} \right\rangle + \left| {011100111000} \right\rangle + \left| {011100111111} \right\rangle \hfill \\ \quad \quad \quad \quad \quad \quad \left. {\quad \;\; - \left| {011111000000} \right\rangle - \left| {011111000111} \right\rangle - \left| {011111111000} \right\rangle - \left| {011111111111} \right\rangle } \right) \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; + \gamma \left( {\left| {100000000000} \right\rangle + \left| {100000000111} \right\rangle + \left| {100000111000} \right\rangle + \left| {100000111111} \right\rangle } \right. \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; + \left| {100011000000} \right\rangle + \left| {100011000111} \right\rangle + \left| {100011111000} \right\rangle + \left| {100011111111} \right\rangle \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; - \left| {111000000000} \right\rangle - \left| {111000000111} \right\rangle - \left| {111000111000} \right\rangle - \left| {111000111111} \right\rangle \hfill \\ \left. {\quad \quad \quad \quad \quad \quad \quad \;\; - \left| {111011000000} \right\rangle - \left| {111011000111} \right\rangle - \left| {111011111000} \right\rangle - \left| {111011111111} \right\rangle } \right) \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; + \delta \left( {\left| {100100000000} \right\rangle + \left| {100100000111} \right\rangle + \left| {100100111000} \right\rangle + \left| {100100111111} \right\rangle } \right. \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; - \left| {100111000000} \right\rangle - \left| {100111000111} \right\rangle - \left| {100111111000} \right\rangle - \left| {100111111111} \right\rangle \hfill \\ \quad \quad \quad \quad \quad \quad \quad \;\; - \left| {111100000000} \right\rangle - \left| {111100000111} \right\rangle - \left| {111100111000} \right\rangle - \left| {111100111111} \right\rangle \hfill \\ \left. {\quad \quad \quad \quad \quad \quad \quad \;\; + \left| {111111000000} \right\rangle + \left| {111111000111} \right\rangle + \left| {111111111000} \right\rangle + \left| {111111111111} \right\rangle } \right)_{{234bcd567efg}} \\ \\ \end{gathered} $$
(7)

Case 1 Agent in high-level recovers the secret state.

See Fig. 2 for a diagram of the operational structure associated with recovering secrets by a high-level agent. Alice chooses Bob to recovery the secret state. First, Bob and David1 jointly take particles 5 and e as control particles, and particles 2 and b as target particles to execute CNOT gate, namely (5, 2) and (e, b) respectively. The system collapses into the following form:

$$ \begin{gathered} \left| {\theta ^{0} } \right\rangle = \frac{1}{4}\left( {\alpha \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \beta \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \gamma \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \delta \left| {\varphi ^{1} \varphi ^{1} } \right\rangle } \right)\left| {G_{1} G_{2} } \right\rangle \hfill \\ \quad \quad = \frac{1}{4}\left[ {\left| {0000000000} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right)} \right. \hfill \\ \quad \quad \quad + \left| {0000010101} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {0000101010} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {0000111111} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {0101000000} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {0101010101} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {0101101010} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {0101111111} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {1010000000} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {1010010101} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {1010101010} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {1010111111} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {1111000000} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {1111010101} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) \hfill \\ \quad \quad \quad + \left| {1111101010} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) \hfill \\ \left. {\quad \quad \quad + \left| {1111111111} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right)} \right]_{{3c4d5e6f7g2b}} \hfill \\ \end{gathered} $$
(8)
Fig. 2
figure 2

The black sphere is the unknown state double qubit, the red sphere is two four-qubit clusters, and the blue sphere is two three-particle GHZ state. BSM is a Bell measurement, SQM is a single bit measurement, CC is a classical channel, and U is a unitary operation. Particle 5 is the control particle, particle 2 is the target particle to form the CNOT gate, so is (e, b)

To help Bob reconstruct the original secret state, the other receivers take measurements of their own particles with appropriate measuring bases and publish their measurements. If Charlie1 and Charlie2 choose \(\left\{ {\left| 0 \right\rangle ,\left| 1 \right\rangle } \right\}\) to measure their particles, their measurements will always be the same. Similarly, David1, David2 and David3 also choose \(\left\{ {\left| 0 \right\rangle ,\left| 1 \right\rangle } \right\}\) to measure their own particles, and their results are the same. Therefore, it is only necessary to measure any of Charlie1 and Charlie2 and any of David1, David2 and David3 and send the result to Bob. Bob can reconstruct the unknown state through corresponding unitary operation, so as to recover the secret and complete the communication.

Without loss of generality, assuming that the measurement results of Alice, Charlie1 and David1 are \(\left| {\Phi^{ + } \Phi^{ + } } \right\rangle_{x1y5}\), \(\left| {01} \right\rangle_{3c}\) and \(\left| {01} \right\rangle_{5e}\) respectively, then the measurement results obtained by Bob are

$$ \left| \varphi \right\rangle_{2b} = \alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle $$
(9)

To recovery the original secret state \(\left| \varphi \right\rangle_{xy}\), Bob does unitary operation \(U = I \otimes \sigma_{X} \sigma_{Z}\) on his particle to get formula (1). When the measurement result of Alice is \(\left| {\Phi^{ + } \Phi^{ + } } \right\rangle_{x1y5}\), all the measurement results and unitary operations are shown in Table 2.

Table 2 Charlie1’s and David1’s measurements, unitary operation of Bob

Case 2 Agent in mid-level recovers the secret state.

See Fig. 3 for a diagram of the operational structure associated with recovering secrets by a mid-level agent. Here again, formula (7) is chosen as an example. Alice chooses Charlie1 to recovery the secret state. First, David1 and Charlie1 jointly take particles 5 and e as control particles, and particles 3 and c as target particles to execute CNOT gate, namely (5, 3) and (e, c) respectively. Then, Bob and Charlie1 jointly take particles 2 and b as control particles, and particles 3 and c as target particles to execute CNOT gate, namely (2, 3) and (b, c) respectively. Finally, Bob's particles 2 and b perform the Hadamard gate transformation. The system collapses into the following form:

$$ \begin{aligned} \left| {\theta ^{0} } \right\rangle &= \frac{1}{4}\left( {\alpha \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \beta \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \gamma \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \delta \left| {\varphi ^{1} \varphi ^{1} } \right\rangle } \right)\left| {G_{1} G_{2} } \right\rangle \hfill \\ &= \frac{1}{8}\left\{ {\left| {00000000} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) \hfill \\ \end{gathered} \right]} \right. \hfill \\ &\quad + \left| {00010101} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {00101010} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {00111111} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {01000000} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {01010101} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {01101010} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {01111111} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {10000000} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {10010101} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {10101010} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {10111111} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {11000000} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle - \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {11} \right\rangle - \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle - \delta \left| {00} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {11} \right\rangle + \beta \left| {10} \right\rangle + \gamma \left| {01} \right\rangle + \delta \left| {00} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {11010101} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle - \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {10} \right\rangle + \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle + \delta \left| {01} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\quad + \left| {11101010} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle - \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {01} \right\rangle - \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle - \delta \left| {10} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {01} \right\rangle + \beta \left| {00} \right\rangle + \gamma \left| {11} \right\rangle + \delta \left| {10} \right\rangle } \right) \hfill \\ \end{gathered} \right] \hfill \\ &\left. {\quad + \left| {11111111} \right\rangle \left[ \begin{gathered} \left| {00} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) + \left| {01} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle - \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) \hfill \\ + \left| {10} \right\rangle \left( {\alpha \left| {00} \right\rangle - \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle - \delta \left| {11} \right\rangle } \right) + \left| {11} \right\rangle \left( {\alpha \left| {00} \right\rangle + \beta \left| {01} \right\rangle + \gamma \left| {10} \right\rangle + \delta \left| {11} \right\rangle } \right) \hfill \\ \end{gathered} \right]} \right\}_{{4d5e6f7g2b3c}} \\ \\ \end{aligned} $$
(10)
Fig. 3
figure 3

The black sphere is the unknown state double qubit, the red sphere is two four-qubit clusters, and the blue sphere is two three-particle GHZ state. BSM is a Bell measurement, SQM is a single bit measurement, CC is a classical channel, H is a Hadamard gate, and U is a unitary operation. Particle 5 is the control particle, particle 3 is the target particle to form the CNOT gate, so is (2, 3), (e, c) and (b, c)

According to formula (11), if \(\left\{ {\left| 0 \right\rangle ,\left| 1 \right\rangle } \right\}\) is selected for measurement, the measurement results of David1, David2 and David3 are always the same. Therefore, we choose the measurement results of David1 as the representative to help Charlie1 carry out secret recovery. In addition, we also need to know the measurement results of Bob and Charlie2 to help Charlie1 perform unitary operation to recover the secret.

Without loss of generality, assuming that the measurement results of Alice, Bob, Charlie2 and David1 are \(\left| {\Phi^{ + } \Phi^{ + } } \right\rangle_{x1y5}\),\(\left| {01} \right\rangle_{2b}\),\(\left| {00} \right\rangle_{4d}\) and \(\left| {10} \right\rangle_{5e}\) respectively, then the measurement results obtained by Charlie1 are

$$ \left| \varphi \right\rangle_{3c} = \alpha \left| {10} \right\rangle - \beta \left| {11} \right\rangle + \gamma \left| {00} \right\rangle - \delta \left| {01} \right\rangle $$
(11)

To recovery the original secret state \(\left| \varphi \right\rangle_{xy}\), Bob does the unitary operation \(U = \sigma_{X} \otimes \sigma_{Z}\) on his particle to obtain formula (1). When the measurement result of Alice is \(\left| {\Phi^{ + } \Phi^{ + } } \right\rangle_{x1y5}\), all the measurement results and unitary operations are shown in Table 3.

Table 3 Bob’s, Charlie2’s and David1’s measurements, unitary operation of Charlie1

Case 3 Agent in low-level recovers the secret state.

Figure 4 is a diagram of the operational structure associated with recovering a secret by a low-level agent. Here, Formula (7) is still taken as an example. Alice chooses low-level agent David3 to recover the secret. Firstly, Bob, David2 and David3 jointly take particles 2 and b as control particles and particles 6 and f, 7 and g as target particles to execute CNOT gate, namely (2, 6), (2, 7) and (b, f), (b, g) respectively. Finally, Bob's particles 2 and b and David2's particles 6 and f undergo the Hadamard gate transformation. The system collapses into the following forms:

$$ \begin{aligned} \left| {\theta ^{0} } \right\rangle _{{234bcd567efg}} &= \frac{1}{4}\left( {\alpha \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \beta \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \gamma \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \delta \left| {\varphi ^{1} \varphi ^{1} } \right\rangle } \right)\left| {G_{1} G_{2} } \right\rangle \hfill \\ &= \frac{1}{4}\left\{ {\alpha \left| { + + } \right\rangle \left[ {\left| { + + } \right\rangle \left| {00} \right\rangle \left( {\left| {000000} \right\rangle + \left| {001100} \right\rangle + \left| {110000} \right\rangle + \left| {111100} \right\rangle } \right)} \right.} \right. \hfill \\ & \quad + \left| { + - } \right\rangle \left| {01} \right\rangle \left( {\left| {000001} \right\rangle + \left| {001101} \right\rangle + \left| {110001} \right\rangle + \left| {111101} \right\rangle } \right) \hfill \\ &\quad + \left| { - + } \right\rangle \left| {10} \right\rangle \left( {\left| {000010} \right\rangle + \left| {001110} \right\rangle + \left| {110010} \right\rangle + \left| {111110} \right\rangle } \right) \hfill \\ &\left. {\quad + \left| { - - } \right\rangle \left| {11} \right\rangle \left( {\left| {000011} \right\rangle + \left| {001111} \right\rangle + \left| {110011} \right\rangle + \left| {111111} \right\rangle } \right)} \right] \hfill \\ &\quad + \beta \left| { + - } \right\rangle \left[ {\left| { + - } \right\rangle \left| {00} \right\rangle \left( {\left| {000001} \right\rangle - \left| {001101} \right\rangle + \left| {110001} \right\rangle - \left| {111101} \right\rangle } \right)} \right. \hfill \\ &\quad + \left| { + + } \right\rangle \left| {01} \right\rangle \left( {\left| {000000} \right\rangle - \left| {001100} \right\rangle + \left| {110000} \right\rangle - \left| {111100} \right\rangle } \right) \hfill \\ &\quad + \left| { - - } \right\rangle \left| {10} \right\rangle \left( {\left| {000011} \right\rangle - \left| {001111} \right\rangle + \left| {110011} \right\rangle - \left| {111111} \right\rangle } \right) \hfill \\ &\left. {\quad + \left| { - + } \right\rangle \left| {11} \right\rangle \left( {\left| {000010} \right\rangle - \left| {001110} \right\rangle + \left| {110010} \right\rangle - \left| {111110} \right\rangle } \right)} \right] \hfill \\ &\quad + \gamma \left| { - + } \right\rangle \left[ {\left| { - + } \right\rangle \left| {00} \right\rangle \left( {\left| {000010} \right\rangle + \left| {001110} \right\rangle - \left| {110010} \right\rangle - \left| {111110} \right\rangle } \right)} \right. \hfill \\ &\quad + \left| { - - } \right\rangle \left| {01} \right\rangle \left( {\left| {000011} \right\rangle + \left| {001111} \right\rangle - \left| {110011} \right\rangle - \left| {111111} \right\rangle } \right) \hfill \\ &\quad + \left| { + + } \right\rangle \left| {10} \right\rangle \left( {\left| {000000} \right\rangle + \left| {001100} \right\rangle - \left| {110000} \right\rangle - \left| {111100} \right\rangle } \right) \hfill \\ &\left. {\quad + \left| { + - } \right\rangle \left| {11} \right\rangle \left( {\left| {000001} \right\rangle + \left| {001101} \right\rangle - \left| {110001} \right\rangle - \left| {111101} \right\rangle } \right)} \right] \hfill \\ &\quad + \delta \left| { - - } \right\rangle \left[ {\left| { - - } \right\rangle \left| {00} \right\rangle \left( {\left| {000011} \right\rangle - \left| {001111} \right\rangle - \left| {110011} \right\rangle + \left| {111111} \right\rangle } \right)} \right. \hfill \\ &\quad + \left| { - + } \right\rangle \left| {01} \right\rangle \left( {\left| {000010} \right\rangle - \left| {001110} \right\rangle - \left| {110010} \right\rangle + \left| {111110} \right\rangle } \right) \hfill \\ &\quad + \left| { + - } \right\rangle \left| {10} \right\rangle \left( {\left| {000001} \right\rangle - \left| {001101} \right\rangle - \left| {110001} \right\rangle + \left| {111101} \right\rangle } \right) \hfill \\ &\left. {\left. {\quad + \left| { + + } \right\rangle \left| {11} \right\rangle \left( {\left| {000000} \right\rangle - \left| {001100} \right\rangle - \left| {110000} \right\rangle + \left| {111100} \right\rangle } \right)} \right]} \right\}_{{2b6f5e34cd7g}} \\ \\ \end{aligned} $$
(12)
Fig. 4
figure 4

The black sphere is the unknown state double qubit, the red sphere is two four-qubit clusters, and the blue sphere is two three-particle GHZ state. BSM is a Bell measurement, SQM is a single bit measurement, CC is a classical channel, H is a Hadamard gate, and U is a unitary operation. Particle 2 is the control particle, particle 6 is the target particle to form the CNOT gate, so is (2, 7), (b, f) and (b, g)

David3's reconstruction of Alice's secret state requires other receivers to make single-particle measurements of their own particles respectively and send the measurement results to David3 through classical channels. As can be seen from formula (12), when \(\left\{ {\left| 0 \right\rangle ,\left| 1 \right\rangle } \right\}\) is selected as the measurement basis, the measurement results of Charlie1 and Charlie2 are always the same, so only one of them is needed to help, and Charlie1 is chosen here. That is to say, David3 needs the help of Bob, Charlie1, David1 and David2 to restore the secret state.

When the measurement result of Alice is \(\left| {\Phi^{ + } \Phi^{ + } } \right\rangle_{x1y5}\), all the measurement results and unitary operations are shown in Table 4.

Table 4 David1’s, Charlie1’s, Bob’s and David2’s measurements, unitary operation of David3. The measurements in parentheses correspond to the actions in parentheses

Higher-level agents need the least help to recover secrets, and lower-level agents need more help. Therefore, the measurement results and corresponding operations required by lower-level agents to recover secrets are more complex.

4 Scalable three-level of HQIS protocol

Generally speaking, agents of the same level often have multiple agent nodes, which requires better universality of the protocol. Here we propose a universal three-level agent scheme. It can be observed from formula (5) that we usually take out the first particle of the entangled state and do Bell measurement with the particle of the unknown state, and the remaining particles are distributed to agents of different levels respectively. Our general protocol can be written as follows:

$$ \begin{aligned} \left| \Theta \right\rangle &= \left| \varphi \right\rangle _{{xy}} \otimes \left| {\Omega _{1} } \right\rangle \otimes \left| {{\rm Z}_{1} } \right\rangle \otimes \left| {\Omega _{2} } \right\rangle \otimes \left| {{\rm Z}_{2} } \right\rangle \hfill \\ &= \frac{1}{8}\left( {\alpha \left| {0000} \right\rangle \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \alpha \left| {0001} \right\rangle \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \alpha \left| {0010} \right\rangle \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \alpha \left| {0011} \right\rangle \left| {\varphi ^{1} \varphi ^{1} } \right\rangle } \right. \hfill \\ &\quad + \beta \left| {0100} \right\rangle \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \beta \left| {0101} \right\rangle \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \beta \left| {0110} \right\rangle \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \beta \left| {0111} \right\rangle \left| {\varphi ^{1} \varphi ^{1} } \right\rangle \hfill \\ \quad & + \gamma \left| {1000} \right\rangle \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \gamma \left| {1001} \right\rangle \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \gamma \left| {1010} \right\rangle \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \gamma \left| {1011} \right\rangle \left| {\varphi ^{1} \varphi ^{1} } \right\rangle \hfill \\ &\left. {\quad \;\; + \delta \left| {1100} \right\rangle \left| {\varphi ^{0} \varphi ^{0} } \right\rangle + \delta \left| {1101} \right\rangle \left| {\varphi ^{0} \varphi ^{1} } \right\rangle + \delta \left| {1110} \right\rangle \left| {\varphi ^{1} \varphi ^{0} } \right\rangle + \delta \left| {1111} \right\rangle \left| {\varphi ^{1} \varphi ^{1} } \right\rangle } \right)\left| {{\rm Z}_{1} {\rm Z}_{2} } \right\rangle \hfill \\ \end{aligned} $$
(13)

Here, \(\left| \Omega \right\rangle\) is that we use a four-particle cluster state, in which the first particle is owned by Alice, and the rest particles are divided into high-level and mid-level proxies. \(\left| {\rm Z} \right\rangle\) is a multi-qubit GHZ state, which can realize the expansion of the number of low-grade agents.

$$ \left| {\rm Z} \right\rangle = \frac{1}{\sqrt 2 }\left( {\left| {0...0} \right\rangle + \left| {1...1} \right\rangle } \right)_{n} $$
(14)

In order to verify the universality of our protocol, formula (5) is substituted into formula (13). \(\left| \Omega \right\rangle\) and \(\left| {\rm Z} \right\rangle\) are product states, so only \(\left| {\rm Z} \right\rangle\) changes in the system state. We observe from Case 1 and Case 2 in Sect. 2 that the states of low-level agents are correlated, when the state of one is known, the state of the other agents is known. Therefore, when we want to verify the correctness of the universal protocol, we only need to verify the low-level proxy recovery secret.

Case 3’ Agent in low-level recovers the secret state.

Here we still assume that Alice's Bell measurement result is \(\left| {\Phi^{ + } \Phi^{ + } } \right\rangle_{x1y5}\), and the corresponding collapse result of the system can be written as:

$$ \left| \theta \right\rangle = \frac{1}{4}\left( {\alpha \left| {\varphi^{0} \varphi^{0} } \right\rangle + \beta \left| {\varphi^{0} \varphi^{1} } \right\rangle + \gamma \left| {\varphi^{1} \varphi^{0} } \right\rangle + \delta \left| {\varphi^{1} \varphi^{1} } \right\rangle } \right)\left| {{\rm Z}_{1} {\rm Z}_{2} } \right\rangle $$
(15)

After the expansion of formula (15), the particles of the low-level agents have correlations. Low-level agent recovery secret requires the help of a high-level agent, a mid-level agent, and all other low-level agents. We chose to use the CNOT gate and the corresponding Hadamard gate operation to break the correlation between low-level agents.

Here we take the N-particle GHZ state as an example,

$$ \begin{aligned} &= \frac{1}{4}\left\{ {\alpha \left| { + + } \right\rangle \left[ {\left| { + + } \right\rangle \left| {\underbrace {{ + + ... + + }}_{{n - 2}}} \right\rangle \left( {\left| {000000} \right\rangle + \left| {001100} \right\rangle + \left| {110000} \right\rangle + \left| {111100} \right\rangle } \right)} \right.} \right. \hfill \\ &\quad + \left| { + - } \right\rangle \left| {\underbrace {{ + - ... + - }}_{{n - 2}}} \right\rangle \left( {\left| {000001} \right\rangle + \left| {001101} \right\rangle + \left| {110001} \right\rangle + \left| {111101} \right\rangle } \right) \hfill \\ & \quad + \left| { - + } \right\rangle \left| {\underbrace {{ - + ... - + }}_{{n - 2}}} \right\rangle \left( {\left| {000010} \right\rangle + \left| {001110} \right\rangle + \left| {110010} \right\rangle + \left| {111110} \right\rangle } \right) \hfill \\ &\left. {\quad + \left| { - - } \right\rangle \left| {\underbrace {{ - - ... - - }}_{{n - 2}}} \right\rangle \left( {\left| {000011} \right\rangle + \left| {001111} \right\rangle + \left| {110011} \right\rangle + \left| {111111} \right\rangle } \right)} \right] \hfill \\ &\quad + \beta \left| { + - } \right\rangle \left[ {\left| { + - } \right\rangle \left| {\underbrace {{ + + ... + + }}_{{n - 2}}} \right\rangle \left( {\left| {000001} \right\rangle - \left| {001101} \right\rangle + \left| {110001} \right\rangle - \left| {111101} \right\rangle } \right)} \right. \hfill \\ &\quad + \left| { + + } \right\rangle \left| {\underbrace {{ + - ... + - }}_{{n - 2}}} \right\rangle \left( {\left| {000000} \right\rangle - \left| {001100} \right\rangle + \left| {110000} \right\rangle - \left| {111100} \right\rangle } \right) \hfill \\ &\quad + \left| { - - } \right\rangle \left| {\underbrace {{ - + ... - + }}_{{n - 2}}} \right\rangle \left( {\left| {000011} \right\rangle - \left| {001111} \right\rangle + \left| {110011} \right\rangle - \left| {111111} \right\rangle } \right) \hfill \\ &\left. {\quad + \left| { - + } \right\rangle \left| {\underbrace {{ - - ... - - }}_{{n - 2}}} \right\rangle \left( {\left| {000010} \right\rangle - \left| {001110} \right\rangle + \left| {110010} \right\rangle - \left| {111110} \right\rangle } \right)} \right] \hfill \\ &\quad + \gamma \left| { - + } \right\rangle \left[ {\left| { - + } \right\rangle \left| {\underbrace {{ + + ... + + }}_{{n - 2}}} \right\rangle \left( {\left| {000010} \right\rangle + \left| {001110} \right\rangle - \left| {110010} \right\rangle - \left| {111110} \right\rangle } \right)} \right. \hfill \\ &\quad + \left| { - - } \right\rangle \left| {\underbrace {{ + - ... + - }}_{{n - 2}}} \right\rangle \left( {\left| {000011} \right\rangle + \left| {001111} \right\rangle - \left| {110011} \right\rangle - \left| {111111} \right\rangle } \right) \hfill \\ &\quad + \left| { + + } \right\rangle \left| {\underbrace {{ - + ... - + }}_{{n - 2}}} \right\rangle \left( {\left| {000000} \right\rangle + \left| {001100} \right\rangle - \left| {110000} \right\rangle - \left| {111100} \right\rangle } \right) \hfill \\ &\left. {\quad + \left| { + - } \right\rangle \left| {\underbrace {{ - - ... - - }}_{{n - 2}}} \right\rangle \left( {\left| {000001} \right\rangle + \left| {001101} \right\rangle - \left| {110001} \right\rangle - \left| {111101} \right\rangle } \right)} \right] \hfill \\ &\quad + \delta \left| { - - } \right\rangle \left[ {\left| { - - } \right\rangle \left| {\underbrace {{ + + ... + + }}_{{n - 2}}} \right\rangle \left( {\left| {000011} \right\rangle - \left| {001111} \right\rangle - \left| {110011} \right\rangle + \left| {111111} \right\rangle } \right)} \right. \hfill \\ &\quad + \left| { - + } \right\rangle \left| {\underbrace {{ + - ... + - }}_{{n - 2}}} \right\rangle \left( {\left| {000010} \right\rangle - \left| {001110} \right\rangle - \left| {110010} \right\rangle + \left| {111110} \right\rangle } \right) \hfill \\ &\quad + \left| { + - } \right\rangle \left| {\underbrace {{ - + ... - + }}_{{n - 2}}} \right\rangle \left( {\left| {000001} \right\rangle - \left| {001101} \right\rangle - \left| {110001} \right\rangle + \left| {111101} \right\rangle } \right) \hfill \\ &\quad \left. {\left. { + \left| { + + } \right\rangle \left| {\underbrace {{ - - ... - - }}_{{n - 2}}} \right\rangle \left( {\left| {000000} \right\rangle - \left| {001100} \right\rangle - \left| {110000} \right\rangle + \left| {111100} \right\rangle } \right)} \right]} \right\}_{{2b6f(n - 2)34cd7g}} \hfill \\ \end{aligned}$$
(16)

In the double n particle GHZ state, two particles are responsible for recovering the secret, they and a pair of particles as the target particles to perform the CNOT gate, the rest of the low-level particles and a pair of particles are Hadamard gate transformation. We take {\(\left| 0 \right\rangle\),\(\left| 1 \right\rangle\)} as the measuring basis for single-bit measurement, but part of the base vector of the collapsed state after Hadamard gate transformation is {\(\left| + \right\rangle\), \(\left| - \right\rangle\)}, so we need to use \(\left| + \right\rangle = {\raise0.7ex\hbox{$1$} \!\mathord{\left/ {\vphantom {1 {\sqrt 2 }}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\sqrt 2 }$}}\left( {\left| 0 \right\rangle + \left| 1 \right\rangle } \right)\) and \(\left| - \right\rangle = {\raise0.7ex\hbox{$1$} \!\mathord{\left/ {\vphantom {1 {\sqrt 2 }}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\sqrt 2 }$}}\left( {\left| 0 \right\rangle - \left| 1 \right\rangle } \right)\) to convert the Z base to the X base, and then get the corresponding relationship between the measurement results of the agent helping to recover the secret and the operation needed to recover the secret.

5 Analysis

5.1 Outsider attack

The common attack mode in quantum communication is the attack from the external eavesdrop Eve. By preparing the quantum state \(\left| E \right\rangle\), Eve performs unitary operation on the \(\left| E \right\rangle\) particle and the particles sent in the quantum channel to generate entanglement between the particles. After that, Eve obtains information by measuring \(\left| E \right\rangle\) and then recovers the secret messages. Specific operations are as follows:

$$ \begin{gathered} U\left| 0 \right\rangle \left| E \right\rangle = \alpha \left| 0 \right\rangle \left| {e_{1} } \right\rangle + \beta \left| 1 \right\rangle \left| {e_{2} } \right\rangle \hfill \\ U\left| 1 \right\rangle \left| E \right\rangle = \gamma \left| 0 \right\rangle \left| {e_{3} } \right\rangle + \delta \left| 1 \right\rangle \left| {e_{4} } \right\rangle \hfill \\ \end{gathered} $$
(17)

Among them, \(\beta \left| {e_{2} } \right\rangle = \gamma \left| {e_{3} } \right\rangle = 0\). Eve can infer a single quantum of information, but we're transmitting two qubits. When Eve gets both quanta at the same time, he cannot get the arrangement of the two quanta, so his eavesdropping will fail.

Eve wants to steal the quantum information \(\left| \varphi \right\rangle_{xy}\) of an unknown state. Let's take case1 in Sect. 3 as an example to illustrate. The job of recovering unknown quantum state information is done by Bob, and Eve has no way of knowing who the agent is (Bob, Charlie, or David). Eve should first determine what level the three-tier agent that restores the secret belongs to, assuming that this process is known to the attacker. Second, Alice's different measurements result in Bob's different measurements. In addition, the different measurement results of Charlie1 and David1 will also cause Bob to perform different operations. Suppose these measurements were stolen by the attacker Eve. At the last unitary operation, Eve, the unknown quantum state \(\left| \varphi \right\rangle_{xy}\) is known, but Bob's measurements are not available. Because this process is done by Bob himself, and there is no need to transmit information. All of the above assumptions require Eve to steal in order to obtain the correct information, but this process has been shown in the previous paragraph is not feasible. When the agent to restore the secret is Charlie or David, the protocol is more secure because Eve has more information to steal.

5.2 Insider attack

A dishonest agent wants to recover the secret alone, so he may resort to a forgery pester attack. Forged entanglement attack refers to the agent of secret recovery. By intercepting the particles sent by the sender to other agents, and creating fake entangled particles to send to other agents, the attacker tests the particles needed for secret recovery, and then completes the recovery of double qubit information. In this agreement, Alice does not specify which is the secret restorer and which is the helper when she sends the particle to the agent. After Eve sends the fake particle to the corresponding agent, the agent assisting the secret recovery performs the corresponding Hadamard gate transform or CNOT gate operation, which is associated with the level of the secret recovery agent. When the high-level agent recovers the secret, Bob acts as the target particle of the CNOT operation; When the low-level agent recovers the secret, Bob is the controlling particle of the CNOT operation and performs the Hadamard transform; As a result, the unitary operations required vary. In addition, Eve has acquired two particles from an agent, but he does not know the order in which the two particles are arranged. All of this causes Eve to fail to recover the secrets properly, and other agents to discover that they have lost their connection to each other when performing CNOT gate and Hadamard operations. Table 5 shows the information stolen and the exposure that agents at different levels want to recover secrets individually.

Table 5 Internal attack security analysis

5.3 Efficiency

Previously, Cabello [26] proposed a formula for calculating the communication efficiency of the quantum key distribution protocol. Since there is no unified standard for calculating the efficiency of quantum information splitting communication protocol, Cabello's scheme is adopted here.

$$ \varepsilon = \frac{{q_{s} }}{{q_{t} + b_{t} }} $$
(18)

\(q_{s}\) represents the number of unknown state qubits to be shared in the protocol, \(q_{t}\) represents the number of qubits transmitted in the protocol, and \(b_{t}\) represents the number of classical bits transmitted in the protocol. Table 6 shows the efficiency of the protocol proposed in this paper.

Table 6 HQIS protocol efficiency

5.4 Comparison

Since 2010, when Wang [21] et al. first proposed HQIS protocol, many researchers have studied HQIS and used different entangled resources to achieve different quantum information resolution for quantum channels. This paper compares with other quantum information splitting protocols in terms of hierarchical structure, entangled resources, split quantum information, scalability and recovery operations. See Table 7 for details.

Table 7 HQIS protocol efficiency

As can be seen from Table 7, three-level of two-particle unknown state HQIS schemes are proposed for the first time. We expanded the number of low-level agents, which is to take into account that in real life, the number of high-level agents is often very limited, while the number of low-level agents tends to be very large and commonly used. For example, the key to the bank vault is secret information, the bank president is the senior agent, the vice president is the middle agent, and the manager is the junior agent. Look at Fig. 5.

Fig. 5
figure 5

High-level provides help from control particles, and Low-level performs CNOT gate or performs single bit measurement or Hadmard gate operation with the help of control particles. Three low-level agents can be replaced by n low-level agents

6 Conclusion

We propose an extensible three-level HQIS protocol with two quantum unknown states. First, we give a HQIS protocol for double quantum unknown states based on the product states of double four-particle cluster states and double three-particle GHZ states. The secret sender shares the double quantum unknown state with six agents. The sender needs to first make Bell measurements with the particles and the unknown state particles in her hand, and then send her measurement results to the receiver through the classical channel. When the sender decides that a high-level agent will recover the secret, the high-level agent needs the help of a mid-level agent and a low-level agent to recover the secret. When a mid-level agent restores the secret, he needs the help of a high-level agent, a mid-level agent, and a low-level agent to restore the secret. When the low-level agent recovers the secret, he needs the help of a high-level agent, a mid-level agent, and all remaining low-level agents. We then extended the protocol. In real scenarios, the number of agents of high-level and mid-level is often small, while the number of agents of low-level is often large. Therefore, we extend the three-particle GHZ state to the multi-particle GHZ state, and make the product state of the multi-particle GHZ state and the four-particle cluster state constitute the quantum channel to realize the extension of the protocol.

We compared our protocol with previous studies, and the tertiary HQIS protocol was not involved by previous researchers. In the future, we will continue to study the HQIS protocol that transmits more information, is more efficient and has more universality.