pith. sign in

arxiv: 2505.21756 · v3 · submitted 2025-05-27 · 🪐 quant-ph · cs.CR· cs.ET

Online Voting using Point to MultiPoint Quantum Key Distribution

Pith reviewed 2026-05-19 12:16 UTC · model grok-4.3

classification 🪐 quant-ph cs.CRcs.ET
keywords quantum key distributionpoint-to-multipoint QKDonline votingpassive optical networkstime division multiplexingwavelength division multiplexingquantum securityvoting systems
0
0 comments X

The pith

Point-to-multipoint quantum key distribution via multiplexing in passive optical networks removes the need for separate physical links per voter and verifier.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

Standard quantum key distribution for voting requires a dedicated physical point-to-point connection for every voter-verifier pair, which scales poorly for real elections. The paper proposes adapting this to a point-to-multipoint architecture that uses time division multiplexing and wavelength division multiplexing inside passive optical networks. This shared infrastructure would let keys reach multiple participants over common channels while keeping quantum security intact. A sympathetic reader would see this as a route to making quantum-resistant online voting feasible without building new per-user fiber runs.

Core claim

The authors state that point-to-multipoint quantum key distribution implemented via time division multiplexing and wavelength division multiplexing in passive optical networks overcomes the impracticality of establishing point-to-point connections for each voter and verifier pair, thereby improving both the deployment and the security of online voting systems.

What carries the argument

Point-to-multipoint quantum key distribution via time division multiplexing and wavelength division multiplexing in passive optical networks, which distributes keys over shared fiber infrastructure instead of dedicated links.

If this is right

  • Online voting could use existing passive optical network fiber already deployed for broadband instead of installing separate links for each participant.
  • Quantum security properties would apply to many voters and verifiers sharing the same network channels through multiplexing.
  • Deployment complexity and cost would drop because no per-user point-to-point physical connections are required.
  • Key distribution would become practical for large numbers of simultaneous users while preserving the no-cloning and eavesdropping-detection features of quantum key distribution.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The scheme could be tested first on existing urban fiber-to-the-home networks to measure actual key rates and error rates under realistic voter loads.
  • It raises the question of how standard voting protocols would authenticate and reconcile keys when they arrive over a shared multipoint channel rather than private links.
  • Similar multiplexing methods might extend quantum security to other large-scale multiparty tasks such as secure surveys or distributed consensus.

Load-bearing premise

That point-to-multipoint QKD via TDM and WDM in PON can keep quantum security guarantees and usable performance without creating new vulnerabilities or needing individual physical connections per user.

What would settle it

A laboratory demonstration that TDM or WDM in a passive optical network either leaks side-channel information detectable by an eavesdropper or produces key rates too low for timely vote verification would disprove the proposal.

read the original abstract

The use of quantm mechanisms in the service of voting security suffers from the problem that in order to generate keys for voters and verifiers a point to point connection has to be physically established for each pair, rendering this impractical. We thus propose using Point-to-Multipoint quantum key distribution (QKD) via time division multiplexing (TDM) and wavelength division multiplexing (WDM) in passive optical networks (PON) to improve both the deployment and security of online voting systems.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

1 major / 1 minor

Summary. The manuscript identifies the impracticality of establishing dedicated point-to-point QKD links for each voter-verifier pair in online voting and proposes the use of point-to-multipoint QKD implemented via time-division multiplexing (TDM) and wavelength-division multiplexing (WDM) over passive optical networks (PON) to improve both deployment scalability and security.

Significance. If a concrete protocol were shown to preserve information-theoretic security while achieving usable key rates on shared PON infrastructure, the approach could meaningfully lower the barrier to deploying QKD in multi-user settings such as voting systems. The abstract correctly flags a real deployment obstacle but supplies no supporting analysis, derivations, or evidence.

major comments (1)
  1. [Abstract] Abstract: the central claim that P2MP QKD via TDM/WDM in PON 'improve[s] both the deployment and security' is unsupported; the text contains no protocol description, security reduction, analysis of shared-trunk attacks (e.g., fiber tapping or wavelength crosstalk), or performance estimates, leaving the assertion that quantum guarantees are retained without new vulnerabilities unverified.
minor comments (1)
  1. [Abstract] Typographical error: 'quantm mechanisms' should read 'quantum mechanisms'.

Simulated Author's Rebuttal

1 responses · 0 unresolved

We thank the referee for their review and for identifying the need for more supporting detail in our proposal. We address the major comment below and outline planned revisions.

read point-by-point responses
  1. Referee: [Abstract] Abstract: the central claim that P2MP QKD via TDM/WDM in PON 'improve[s] both the deployment and security' is unsupported; the text contains no protocol description, security reduction, analysis of shared-trunk attacks (e.g., fiber tapping or wavelength crosstalk), or performance estimates, leaving the assertion that quantum guarantees are retained without new vulnerabilities unverified.

    Authors: We agree that the current abstract is high-level and does not contain explicit derivations, numerical estimates, or a full security reduction. The manuscript is framed as a conceptual proposal that identifies the scalability barrier of dedicated P2P links for voting and points to established P2MP QKD techniques over PON (using TDM/WDM) as a remedy. Deployment improvement follows directly from infrastructure sharing; security retention rests on the fact that key generation occurs over individual quantum channels in multiplexed slots, inheriting information-theoretic security from standard QKD when crosstalk and tapping are controlled by existing optical isolation methods. We will revise the manuscript to add a concise protocol sketch, references to prior security analyses of TDM/WDM PON QKD, and a short discussion of shared-trunk attack vectors. revision: yes

Circularity Check

0 steps flagged

No derivation chain or self-referential elements; proposal is purely conceptual

full rationale

The paper consists solely of a high-level proposal identifying the impracticality of point-to-point QKD for voting and suggesting P2MP QKD via TDM/WDM in PON to address deployment and security. No equations, derivations, parameter fittings, predictions, or self-citations appear in the abstract or available text. The suggestion does not reduce any result to its inputs by construction, nor does it invoke uniqueness theorems or ansatzes from prior work. This is a standard non-circular conceptual paper with no load-bearing mathematical steps to analyze.

Axiom & Free-Parameter Ledger

0 free parameters · 0 axioms · 0 invented entities

Abstract-only review yields no explicit free parameters, axioms, or invented entities; the proposal rests on the unstated assumption that existing PON infrastructure and multiplexing methods can be directly repurposed for QKD without loss of security properties.

pith-pipeline@v0.9.0 · 5570 in / 1094 out tokens · 45571 ms · 2026-05-19T12:16:58.024211+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.