Quantum secret sharing (QSS) is a cryptographic protocol that realizes secure distribution and reconstruction of secret information among multiple participants by leveraging fundamental principles of quantum mechanics. Most existing protocols rely on entangled states (such as Bell and GHZ states), but in practical applications, entangled state preparation is constrained by short quantum coherence time, low state fidelity, etc., making it difficult to implement entangled resource-dependent QSS protocols. This paper proposes a novel practical and verifiable multi-party QSS protocol based on orthogonal product states, which are easier to prepare than entangled states. In the protocol preparation stage, the secret distributor first converts pre-shared classical secret information into corresponding orthogonal product states according to encoding rules, and pre-shares a communication key with participants via quantum key distribution (QKD) to hide initial quantum sequence information through subsequent particle transformation operations. After preparing orthogonal product states, the distributor reorganizes particles by position—extracting particles at the same position from each state to form new sequences, scrambling their order—then applies Hadamard transformations with the pre-shared key, inserts decoy particles, and sends sequences to participants. Upon receipt, participants conduct eavesdropping detection, use the same key for inverse transformations, retain one particle from each sequence, and pass remaining particles sequentially until the last participant receives a complete set, triggering state verification with the distributor as arbiter. If verified, particles are returned to the first participant for a return stage with similar procedures. Only after both transmission and return stage verifications pass will the distributor reveal initial particle positions, allowing participants to collaboratively reconstruct the secret.In the protocol, the secret distributor acts as an arbitrator to verify with participants at periodic nodes (the end of the transmission stage and the end of the return stage) to determine whether the particle state information is error-free during transmission. If the verification fails at either stage, the protocol will be terminated immediately. Meanwhile, considering the possible change in the number of participants during the execution of the protocol, a dynamic scheme for personnel changes is designed to ensure the flexibility of the protocol. Through the analysis of possible internal and external attacks, it is proven that our protocol can safely resist the existing common attack methods. Using Qiskit simulation experiments, we have successfully modeled the core quantum procedures of the protocol. The experimental results provide significant computational validation for the theoretical feasibility of the protocol.