1 Introduction

Quantum entanglement [1] not only gives us insight into understanding the deepest nature of reality but also acts as a very useful resource in carrying out various information processing protocols like quantum teleportation [2, 3], quantum cryptography [4] and quantum secret sharing (QSS) [5], to name a few.

In a secret sharing protocol the sender/dealer of the secret message, who is unaware of the individual honesty of the receivers, shares the secret in such a way that none of the receivers get any information about the secret. QSS [5, 6] deals with the problem of sharing of both classical and quantum secrets. A typical protocol for quantum secret sharing, like many other tasks in quantum cryptography, uses entanglement as a cardinal resource, mostly pure entangled states. Karlsson et al. [7] studied QSS protocols using bipartite pure entangled states as resources. Many authors investigated the concept of QSS using tripartite pure entangled states and multi-partite states like graph states [814]. Li et al. [15] proposed semi-quantum secret sharing protocols taking maximally entangled GHZ state as resource.

In a realistic situation, the secret sharing of classical or quantum information involves transmission of qubits through noisy channels that entails mixed states. Recently in [16], it is shown that QSS is possible with bipartite two-qubit mixed states (formed due to noisy environment or otherwise). Subsequently in [17] authors propose a protocol for secret sharing of classical information with three-qubit mixed state. Quantum secret sharing has also been realized in experiments [1821].

In QSS, it is typically assumed that the system consists of solely the dealer and the receivers. However, in practical settings the dealer/receivers are part of a quantum network. One important question of how information can be transferred through a quantum network is addressed in [2226]. In this work we focus on two different situations in a given quantum network (qnet). In the first situation, we consider the problem of revoking the secret in QSS. For instance, if the dealer finds the receivers to be dishonest, she can stop them from accessing it. Moreover, she may choose to retrieve the secret completely. In our model we consider the receivers to be semi-honest—that is, the receivers, though dishonest to eavesdrop on their share and process it, diligently participate in the protocol. On the other hand, note that Byzantinely malicious receivers can easily destroy the secret, making revocation impossible. In the second situation we have extended the above idea to design routing mechanism for multi-hop transmission of secret qubits in the shared domain itself.

Although the above two situations appear to solve unrelated problems namely, revocable secret sharing and quantum routing, the following is an interesting symbiosis of the two to solve problems posed by resource constraints and asynchrony in the network. Consider a situation where quantum storage is constrained and therefore Alice needs to store her private data in some (probably untrustworthy) memory available in the network. This she can do using revocableQSS. Further, if she wants to send these data to Bob (for security reasons), she should be able to do it without reconstructing the quantum secret anywhere in the network. This she can achieve using the quantum routing in shared domain. Incidentally, our solution also takes care of scenarios where Bob too is in short supply of trusted quantum memory and uses network storage.

2 Sharing of a message

First of all, we consider a simple situation where we have three parties Alice, Bob and Charlie. They share a three-qubit maximally entangled GHZ state, i.e., \(| GHZ \rangle _{ABC}=\frac{1}{\sqrt{2}}(| 000 \rangle +| 111 \rangle )\). Here the first qubit is with Alice, second is with Bob and the third one is with Charlie. Here Alice is the dealer and she wishes to secret-share a qubit \(| S \rangle =\alpha | 0 \rangle +\beta | 1 \rangle \) (where \(|\alpha |^2+|\beta |^2=1\); \(\alpha ,\beta \) are amplitudes) with both the parties Bob and Charlie. In order to do so Alice has to do two-qubit measurements in Bell basis \(\{ |\phi _{\pm }\rangle ,|\psi _{\pm }\rangle \}\) jointly on her resource qubit and the message qubit she wants to share (see Appendix 1). In correspondence with various measurement outcomes obtained by Alice, Bob and Charlie’s qubits collapse into the states given in Table 1.

Table 1 Sharing of quantum information

At this point if Alice finds both Bob and Charlie to be dishonest, she can stop them from accessing the message. She does this by not communicating about her measurement results to any one of them. So there is no transfer of classical bits at this stage. At this point there lies the question of security from Bob and Charlie sides. If we have malicious (parties who are not going to follow the protocol and do whatever they wish to do) Bob and Charlie can destroy the message by doing local operations in their respective qubits and by communicating classically between them. However, they will never be successful in obtaining the message without Alice’s help.

3 Revocation of quantum information

If Bob and Charlie are semi-honest (i.e., they are faithful executors of the protocol but curious to learn Alice’s secret), we ask can Alice revoke her shared secret \(| S \rangle \)? The ability to revoke the shared secret is important for several reasons, some of which are (a) Alice decides to change her secret (for instance, \(| S \rangle \) might have been inadvertently shared), (b) Alice conjectures that the recipients are no longer trustworthy, (c) there is an update of data/secrets in the higher-level application using secret sharing as a subroutine, and (d) Alice has found a more economical alternative qnet to safeguard \(| S \rangle \).

To make the revocation possible Alice needs an additional resource (a Bell state) shared with Bob. Consider a very simple case when Alice and Bob are sharing the Bell state \(|Bell\rangle _{AB}=\frac{1}{\sqrt{2}}(|00\rangle +|11\rangle )\) in addition to the GHZ state shared by Alice, Bob and Charlie. Let us also assume the first case in the above Table 1, when Bob and Charlie share the entangled state \(\alpha |00\rangle +\beta |11\rangle \) as a result of Alice’s measurement. Now Alice asks Bob to do Bell measurement on his two qubits (one from the shared resource and one from shared secret) and Charlie to do measurement (on his qubit of shared secret) in Hadamard basis (see Appendix 2, see Fig. 1). In Table 2 we show how Alice can retrieve back her message by enlisting down the respective local operations corresponding to Bob’s and Charlie’s measurement outcomes. It can be observed that the Revocation needs Alice to share an additional resource (a Bell state) with at least one of Bob or Charlie. In case if Alice shares a Bell state with Charlie, Charlie will first do Bell measurement on his two qubits and then Bob will do measurement in Hadamard basis on his qubit. In either case Alice can retrieve her message by performing the respective local operations.

Fig. 1
figure 1

Figure on the left side indicates a three-qubit GHZ state (depicted by a triangle) shared among Alice (A), Bob (B) and Charlie (C) and a two-qubit Bell state shared between and Alice (A) and Bob (B). Alice is also having the secret (depicted by an isolated dot) with herself. The figure on the right describes the situation after Alice’s measurement, where both Bob and Charlie are sharing the secret between them (the dotted line)

Table 2 Retrieving quantum information

For example, suppose Alice shares additional resource with Bob and Bob gets \(|\psi ^-\rangle \) as outcome of Bell measurement and Charlie gets \(|+\rangle \) as outcome of her measurement in Hadamard basis. From Appendix 2, it is clear that Alice will have \(\alpha |1\rangle -\beta |0\rangle \) as result of these measurements.

Now, from Table 2, Alice needs to apply \(\sigma _x\sigma _z\) on her part, i.e., \(\sigma _x\sigma _z(\alpha |1\rangle -\beta |0\rangle ) = \alpha |0\rangle +\beta |1\rangle \) to complete the revocation.

4 Quantum routing in shared domain

If Alice has shared her secret qubit \(| S \rangle \) in some part of a (huge) qnet, we ask can she/anyone else retrieve \(| S \rangle \) at some other part of the network? A naive way out is to reconstruct \(| S \rangle \) and teleport it, possibly via successive entanglement swapping. However, this severely compromises the security of \(| S \rangle \). A superior approach is to retain \(| S \rangle \) in the shared domain, while the shares are being routed across the qnet. However, since the shares are themselves entangled and distributed across multiple parties, it is nontrivial to teleport them over the qnet. We address the problem in two parts. First, we show that it is possible for Alice to dynamically choose the receiver (of her secret), after the sharing phase. Second, we show that quantum information can be transmitted in the shared domain: that is, the information secret shared among a set of nodes is transferred to another set of nodes. Putting the two together, Alice can now move her shared secret close to the desired receiver in the qnet and also remotely control the reconstruction of the secret at the receiver.

Consider a situation where we have \((3+n)\) parties. Here Alice is the sender, both Charlie and Bob act as agents, the remaining n parties {\(R_1, R_2, R_3,\ldots ,R_n\)} are the potential receivers. Alice desires to send the message in form of a qubit to any one of them. Here the role of Bob and Charlie is changed as they are no longer receivers of information but they now act as agents for holding the information in the network. In broader sense they together act like a router and play a vital role in sending the information to the desired receiver.

Once again we start with Alice, Bob and Charlie sharing a three-qubit maximally entangled GHZ state, i.e., \(| GHZ \rangle _{ABC}=\frac{1}{\sqrt{2}}(| 000 \rangle \,+\,| 111 \rangle )\) and Charlie shares Bell’s states, i.e., \(| Bell \rangle _{CR_i}=\frac{1}{\sqrt{2}}(| 00 \rangle +| 11 \rangle )\) with each of the receivers (\(R_i\)). (In principle, receivers can share resource with any one of the agents Bob and Charlie. Without any loss of generality we assume the receivers share resources with Charlie only.) Suppose Alice wishes to send a qubit \(| S \rangle =\alpha | 0 \rangle +\beta | 1 \rangle \) to \(R_i\) through the parties Bob and Charlie. First Alice shares her secret with Bob and Charlie in the same way as it is shown in the (Table 1). At this point, Alice sends her measurement outcomes encoded in the form of two classical bits to \(R_i\). Once the two bits of classical information are obtained, the receiver can easily get back the Alice’s secret \(| S \rangle \), provided Bob and Charlie perform the actions as described next. We assume that the identity of the receiver is authentically known to Alice, Bob and Charlie, perhaps through a classically secure authentication/identification protocol.

The agents Bob and Charlie do the following. Bob measures his qubit (part of the GHZ state) in the Hadamard basis. Charlie measures two qubits (one from GHZ state and one from Bell state shared with \(R_i\)) in the Bell basis. After performing these measurements both the agents will send their outcomes through classical channels to the receiver \(R_i\). With these measurement outcomes the receiver can retrieve the message which Alice intended to send (see Appendix 3; see Fig. 2). Let us consider the case, when Alice and Bob share the entangled state \(\alpha |00\rangle +\beta |11\rangle \), obtained as a result of Alice’s measurement. Table 3 gives an elaborate view of the unitary operations the receiver \(R_i\) has to do upon getting various measurement outcomes from Bob and Charlie.

Table 3 Sending quantum information
Fig. 2
figure 2

Any one of the n receivers {\(R_1, R_2, R_3,\ldots ,R_n\)} which individually share Bell states with Charlie can reconstruct the secret

Finally, we address the problem of transferring secret qubits in the shared domain till it comes close to the desired receiver. If we have a source (S) and receivers \(R_1, R_2,\ldots , R_n\) and we want to send the information to the receiver \(R_i\) through a huge network with pair of agents \((A_1,B_1),(A_2,B_2),\ldots ,(A_n,B_n)\) at each blocks, every pair shares Bell state with consecutive pair say \(A_i\) with \(A_{i+1}\) and \(B_i\) with \(B_{i+1}\). The above setting is depicted in Fig. 3. Once the source shares the information with ith pair the information can be transferred to \((i+1)\)th pair by the process of entanglement swapping in the following way. \(A_i\) performs the Bell measurement on two qubits one from the shared secret and other from the Bell state shared with \(A_{i+1}\), and similarly \(B_i\) performs the Bell measurement on two qubits one from the shared secret and other from the Bell state shared with \(B_{i+1}\) (See Appendix 4). This sequence of measurements goes on till the closest pair gets the shared secret. The classical outcomes of each measurement are sent to Alice immediately after the measurement to keep track of the state of the shared secret. The receivers can stay in the network in between each pairs. The source is not going to send the classical information until the quantum information (shared secret) reaches the pair \((A_i,B_i)\) close to the desired receiver. Thus, in a qnet we can share, retrieve, hold and as well as transfer the quantum information.

Fig. 3
figure 3

A typical quantum mail sending network where S is the source, \((A_i, B_i)\) are the agents and \(R_i\) are the receivers. Initially, the information is shared between the pairs \((A_1, B_1)\) (the dotted line) and will be transferred to other pairs until the pair close to the desired receiver is reached. The information is moved along \((A_1, B_1), (B_1, A_2), (A_2, B_2), (B_2, A_3)\) and so on till \((A_n, B_n)\) as shown with gray dotted lines

5 Security analysis

In this work, we look at QSS as sharing of quantum information with semi-honest participants. By semi-honest, we mean (i) the participants are eager to know any information about the secret without violating the rules of the protocol, and (ii) the participants are not allowed to bring ancillary states and perform measurements along with the states involved in the protocol.

For the Revocation protocol, we do security analysis at different stages: (a) Once the secret is shared by protocol given in [4], what is the chance of Bob and/or Charlie getting the secret \(|\psi \rangle \)? (b) During reconstruction, what is the chance of Charlie getting the secret once Bob has done with his Bell measurement? (c) After the revocation protocol, can Bob and Charlie guess in together what is the secret shared?

Further for reconstruction of the secret at different receiver \(R_i\) (Fig. 2) we ask the question (d) if \(R_i\) is dishonest, what is the chance that \(R_i\) will have the information about the secret after Charlie’s measurement.

It is to be noted that the most important part of the protocol is to keep as secret, the classical information of Alice’s measurement outcome. In particular, if the classical information is known to other parties having shares, the secret is revealed. Now it remains interesting to see how much information rest of the parties can obtain about the shared quantum state without having access to the classical information. It is intuitive that the information about the shared quantum state is present in the reduced density matrix of the information seekers. We answer all the above questions by looking at the reduced density operator of the corresponding subsystem and we show that it has no dependence on the actual secret \(|\psi \rangle \).

To answer (a), consider the density operator of the system given in Appendix 1 as

$$\begin{aligned} \begin{aligned} \rho =\,\,&\frac{1}{4}\{|\phi ^+\rangle \langle \phi ^+|(\alpha |00\rangle +\beta |11\rangle )(\alpha ^*\langle 00| + \beta ^*\langle 11|)\\&+ |\phi ^-\rangle \langle \phi ^-|(\alpha |00\rangle -\beta |11\rangle )(\alpha ^*\langle 00|-\beta ^*\langle 11|)\\&+ |\psi ^+\rangle \langle \psi ^+|(\alpha |11\rangle +\beta |00\rangle )(\alpha ^*\langle 11+\beta ^*\langle 00|)\\&+ |\psi ^-\rangle \langle \psi ^-|(\alpha |11\rangle -\beta |00\rangle )(\alpha ^*\langle 11|-\beta ^*\langle 00|)\}. \end{aligned} \end{aligned}$$

Tracing out Alice’s two-qubit system, the reduced density operator of Bob and Charlie’s system is given by,

$$\begin{aligned} \begin{aligned} \rho ^{BC} =\,\,&\frac{1}{4}\{(\alpha |00\rangle +\beta |11\rangle )(\alpha ^*\langle 00| + \beta ^*\langle 11|)\\&+ (\alpha |00\rangle -\beta |11\rangle )(\alpha ^*\langle 00|-\beta ^*\langle 11|)\\&+ (\alpha |11\rangle +\beta |00\rangle )(\alpha ^*\langle 11|+\beta ^*\langle 00|)\\&+ (\alpha |11\rangle -\beta |00\rangle )(\alpha ^*\langle 11|-\beta ^*\langle 00|)\} \\ =\,\,&\frac{1}{2}\{|00\rangle \langle 00| + |11\rangle \langle 11|\}. \end{aligned} \end{aligned}$$

Clearly, we see that \(\rho ^{BC}\) is independent of the secret \(|\psi \rangle \). In other words, it is independent of the information parameter \(\alpha \).

To answer (b), we consider the entire initial system as \(\frac{1}{\sqrt{2}} (\alpha |0\rangle +\beta |1\rangle )(|000\rangle +|111\rangle )\). After Alice’s and Bob’s measurement the density operator of the entire system becomes

$$\begin{aligned} \begin{aligned} \rho _1 =\,\,&\frac{1}{8}\{|\phi ^+\rangle (|+\rangle (\alpha |0\rangle +\beta |1\rangle ) + |-\rangle (\alpha |0\rangle - \beta |1\rangle )) \\&+ |\phi ^-\rangle (|+\rangle (\alpha |0\rangle -\beta |1\rangle ) + |-\rangle (\alpha |0\rangle + \beta |1\rangle )) \\&+ |\psi ^+\rangle (|+\rangle (\alpha |1\rangle +\beta |0\rangle ) - |-\rangle (\alpha |1\rangle - \beta |0\rangle )) \\&+ |\psi ^-\rangle (|+\rangle (\alpha |1\rangle -\beta |0\rangle ) - |-\rangle (\alpha |1\rangle + \beta |0\rangle ))\}\\&\{\langle \phi ^+|(\langle +|(\alpha \langle 0|+\beta \langle 1|) + \langle -|(\alpha \langle 0| - \beta \langle 1|)) \\&+ \langle \phi ^-|(\langle +|(\alpha \langle 0|-\beta \langle 1|) + \langle -|(\alpha \langle 0| + \beta \langle 1|)) \\&+\langle \psi ^+|(\langle +|(\alpha \langle 1|+\beta \langle 0|) - \langle -|(\alpha \langle 1| - \beta \langle 0|)) \\&+ \langle \psi ^-|(\langle +|(\alpha \langle 1|-\beta \langle 0|) - \langle -|(\alpha \langle 1| + \beta \langle 0|))\}. \end{aligned} \end{aligned}$$

Tracing out Alice’s and Bob’s three-qubit system, the reduced density operator of Charlie’s system is given by,

$$\begin{aligned} \begin{aligned} \rho _1^{C}&= \frac{1}{8}\{4(|\alpha |^2 +|\beta |^2)|0\rangle \langle 0| + 4(|\alpha |^2 + |\beta |^2)|1\rangle \langle 1|\}\\&= \frac{1}{2}\{|0\rangle \langle 0| + |1\rangle \langle 1|\} = \frac{I}{2}. \end{aligned} \end{aligned}$$

To answer (c), let us suppose Bob shares an additional resource \(\frac{1}{\sqrt{2}}(|00\rangle +|11\rangle )\) with Alice. In this situation consider the entire initial system as \(\frac{1}{2} (\alpha |0\rangle +\beta |1\rangle )_{A_0}(|000\rangle +|111\rangle )_{A_1B_1C_1}(|00\rangle +|11\rangle )_{A_2B_2}\). After Alice’s, Bob’s and Charlie’s respective measurements of the revocation protocol the density operator of the entire system becomes \(\rho _2 = \frac{1}{32}|Q\rangle \langle Q|\) where,

$$\begin{aligned} \begin{aligned}&|Q\rangle _{A_0A_1A_2B_1B_2C_1}\\&=\{|\phi ^+\,\rangle |s^+\rangle [|\phi ^+\rangle |+\rangle +|\phi ^-\rangle |-\rangle ] + |\phi ^+\rangle |s^-\rangle [|\phi ^-\rangle |-\rangle +|\phi ^-\rangle |+\rangle ]\\&\quad +\, |\phi ^+\rangle |r^+\rangle [|\psi ^+\rangle |+\rangle -|\psi ^-\rangle |-\rangle ] + |\phi ^+\rangle |r^-\rangle [|\psi ^+\rangle |-\rangle -|\psi ^-\rangle |+\rangle ]\\&\quad +\, |\phi ^-\rangle |s^+\rangle [|\phi ^-\rangle |+\rangle -|\phi ^+\rangle |-\rangle ] + |\phi ^-\rangle |s^-\rangle [|\phi ^+\rangle |+\rangle +|\phi ^-\rangle |-\rangle ]\\&\quad +\, |\phi ^-\rangle |r^+\rangle [|\psi ^+\rangle |-\rangle -|\psi ^-\rangle |+\rangle ] + |\phi ^-\rangle |r^-\rangle [|\psi ^+\rangle |+\rangle -|\psi ^-\rangle |-\rangle ]\\&\quad + \,|\psi ^+\rangle |s^+\rangle [|\psi ^+\rangle |+\rangle +|\psi ^-\rangle |-\rangle ] - |\psi ^+\rangle |s^-\rangle [|\psi ^+\rangle |-\rangle +|\psi ^-\rangle |+\rangle ]\\&\quad + \,|\psi ^+\rangle |r^+\rangle [|\phi ^+\rangle |+\rangle +|\phi ^-\rangle |-\rangle ] - |\psi ^+\rangle |r^-\rangle [|\phi ^+\rangle |-\rangle +|\phi ^-\rangle |+\rangle ]\\&\quad -\, |\psi ^-\rangle |s^+\rangle [|\psi ^+\rangle |+\rangle +|\psi ^-\rangle |+\rangle ] + |\psi ^-\rangle |s^-\rangle [|\psi ^+\rangle |+\rangle +|\psi ^-\rangle |-\rangle ]\\&\quad - \,|\psi ^-\rangle |r^+\rangle [|\phi ^+\rangle |-\rangle +|\phi ^-\rangle |+\rangle ] + |\psi ^-\rangle |r^-\rangle [|\phi ^+\rangle |+\rangle +|\phi ^-\rangle |-\rangle ]\} \end{aligned} \end{aligned}$$

with,

$$\begin{aligned} |s^+\rangle&= \alpha |0\rangle +\beta |1\rangle ,\\ |s^-\rangle&= \alpha |0\rangle -\beta |1\rangle ,\\ |r^+\rangle&= \alpha |1\rangle +\beta |0\rangle ,\\ |r^-\rangle&= \alpha |1\rangle -\beta |0\rangle . \end{aligned}$$

Tracing out Alice’s system of three qubits corresponding to \(\{A_0A_1A_2\}\), it is clear to see that the reduced density operator of three-qubit system corresponding to \(\{B_1B_2C_1\}\) is independent of the information parameter \(\alpha \).

To answer (d), let us suppose \(R_i\) is the authorized receiver sending request to Charlie and sharing a Bell state \(\frac{1}{\sqrt{2}}\{|00\rangle +|11\rangle \}_{CR_i}\) with him. In this situation, we consider the entire initial system as \(\frac{1}{2} (\alpha |0\rangle +\beta |1\rangle )(|000\rangle +|111\rangle )(|00\rangle +|11\rangle )\). After Alice’s, Bob’s and Charlie’s respective measurements the density operator of the entire system becomes \(\rho _3 = \frac{1}{32}|R\rangle \langle R|\) where

$$\begin{aligned} |R\rangle= & {} \{|\phi ^+\rangle |+\rangle [|\phi ^+\rangle |s^+\rangle +|\phi ^-\rangle |s^-\rangle + |\psi ^+\rangle |r^+\rangle +|\psi ^-\rangle |r^-\rangle ] \\&+\,|\phi ^+\rangle |-\rangle [|\phi ^+\rangle |s^-\rangle +|\phi ^-\rangle |s^+\rangle + |\psi ^+\rangle |r^-\rangle +|\psi ^-\rangle |r^+\rangle ] \\&+\,|\phi ^-\rangle |+\rangle [|\phi ^+\rangle |s^-\rangle +|\phi ^-\rangle |s^+\rangle + |\psi ^+\rangle |r^-\rangle +|\psi ^-\rangle |r^+\rangle ] \\&+\,|\phi ^-\rangle |-\rangle [|\phi ^+\rangle |s^+\rangle +|\phi ^-\rangle |s^-\rangle + |\psi ^+\rangle |r^+\rangle +|\psi ^-\rangle |r^-\rangle ] \\&+\,|\psi ^+\rangle |+\rangle [|\phi ^+\rangle |r^+\rangle -|\phi ^-\rangle |r^-\rangle + |\psi ^+\rangle |s^+\rangle -|\psi ^-\rangle |s^-\rangle ] \\&-\,|\psi ^+\rangle |-\rangle [|\phi ^+\rangle |r^-\rangle -|\phi ^-\rangle |r^+\rangle + |\psi ^+\rangle |s^-\rangle -|\psi ^-\rangle |s^+\rangle ] \\&+\,|\psi ^-\rangle |+\rangle [|\phi ^+\rangle |r^-\rangle -|\phi ^-\rangle |r^+\rangle + |\psi ^+\rangle |s^-\rangle -|\psi ^-\rangle |s^+\rangle ] \\&-\,|\psi ^-\rangle |-\rangle [|\phi ^+\rangle |r^+\rangle -|\phi ^-\rangle |r^-\rangle + |\psi ^+\rangle |s^+\rangle -|\psi ^-\rangle |s^-\rangle ]\}, \end{aligned}$$

with,

$$\begin{aligned} |s^+\rangle&= \alpha |0\rangle +\beta |1\rangle ,\\ |s^-\rangle&= \alpha |0\rangle -\beta |1\rangle ,\\ |r^+\rangle&= \alpha |1\rangle +\beta |0\rangle ,\\ |r^-\rangle&= \alpha |1\rangle -\beta |0\rangle . \end{aligned}$$

Tracing out Alice, Bob and Charlie’s five-qubit system, the reduced density operator of \(R_i\)’s system is again,

$$\begin{aligned} \begin{aligned} \rho _3^{R_i}&= \frac{1}{32}\{16(|\alpha |^2 +|\beta |^2)|0\rangle \langle 0| + 16(|\alpha |^2 + |\beta |^2)|1\rangle \langle 1|\}\\&= \frac{1}{2}\{|0\rangle \langle 0| + |1\rangle \langle 1|\} = \frac{I}{2}. \end{aligned} \end{aligned}$$

So here we find that in each of these steps, the reduced density matrix of the information seeker is independent of the information parameter \(\alpha \). This clearly indicates that with semi-honest participants at every step our protocol is secure.

6 Concluding remarks and outlook

This paper addresses the problem of revocable quantum secret sharing. The ability to revoke a quantum shared secret has implications for quantum routing (also backtracking) in shared domain. An interesting consequence of the above is that critical/private information \(| S \rangle \) can be q-mailed across public qnets, first by secret sharing \(| S \rangle \) and then routing \(| S \rangle \) (in the shared domain) to the desired receiver. We have assumed the resources to be pure entangled states; however, working out with resources being mixed entangled states still remains an open question. Another direction can be of sharing multi-partite entangled qubits and routing them to the desired receiver. Yet another direction would be to use the techniques of [7] to thwart attacks beyond the semi-honest adversary [27]. Recently, cryptanalysis of other QSS protocols has been discussed in [28, 29].