Online Voting using Point to MultiPoint Quantum Key Distribution
Pith reviewed 2026-05-19 12:16 UTC · model grok-4.3
The pith
Point-to-multipoint quantum key distribution via multiplexing in passive optical networks removes the need for separate physical links per voter and verifier.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The authors state that point-to-multipoint quantum key distribution implemented via time division multiplexing and wavelength division multiplexing in passive optical networks overcomes the impracticality of establishing point-to-point connections for each voter and verifier pair, thereby improving both the deployment and the security of online voting systems.
What carries the argument
Point-to-multipoint quantum key distribution via time division multiplexing and wavelength division multiplexing in passive optical networks, which distributes keys over shared fiber infrastructure instead of dedicated links.
If this is right
- Online voting could use existing passive optical network fiber already deployed for broadband instead of installing separate links for each participant.
- Quantum security properties would apply to many voters and verifiers sharing the same network channels through multiplexing.
- Deployment complexity and cost would drop because no per-user point-to-point physical connections are required.
- Key distribution would become practical for large numbers of simultaneous users while preserving the no-cloning and eavesdropping-detection features of quantum key distribution.
Where Pith is reading between the lines
- The scheme could be tested first on existing urban fiber-to-the-home networks to measure actual key rates and error rates under realistic voter loads.
- It raises the question of how standard voting protocols would authenticate and reconcile keys when they arrive over a shared multipoint channel rather than private links.
- Similar multiplexing methods might extend quantum security to other large-scale multiparty tasks such as secure surveys or distributed consensus.
Load-bearing premise
That point-to-multipoint QKD via TDM and WDM in PON can keep quantum security guarantees and usable performance without creating new vulnerabilities or needing individual physical connections per user.
What would settle it
A laboratory demonstration that TDM or WDM in a passive optical network either leaks side-channel information detectable by an eavesdropper or produces key rates too low for timely vote verification would disprove the proposal.
read the original abstract
The use of quantm mechanisms in the service of voting security suffers from the problem that in order to generate keys for voters and verifiers a point to point connection has to be physically established for each pair, rendering this impractical. We thus propose using Point-to-Multipoint quantum key distribution (QKD) via time division multiplexing (TDM) and wavelength division multiplexing (WDM) in passive optical networks (PON) to improve both the deployment and security of online voting systems.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript identifies the impracticality of establishing dedicated point-to-point QKD links for each voter-verifier pair in online voting and proposes the use of point-to-multipoint QKD implemented via time-division multiplexing (TDM) and wavelength-division multiplexing (WDM) over passive optical networks (PON) to improve both deployment scalability and security.
Significance. If a concrete protocol were shown to preserve information-theoretic security while achieving usable key rates on shared PON infrastructure, the approach could meaningfully lower the barrier to deploying QKD in multi-user settings such as voting systems. The abstract correctly flags a real deployment obstacle but supplies no supporting analysis, derivations, or evidence.
major comments (1)
- [Abstract] Abstract: the central claim that P2MP QKD via TDM/WDM in PON 'improve[s] both the deployment and security' is unsupported; the text contains no protocol description, security reduction, analysis of shared-trunk attacks (e.g., fiber tapping or wavelength crosstalk), or performance estimates, leaving the assertion that quantum guarantees are retained without new vulnerabilities unverified.
minor comments (1)
- [Abstract] Typographical error: 'quantm mechanisms' should read 'quantum mechanisms'.
Simulated Author's Rebuttal
We thank the referee for their review and for identifying the need for more supporting detail in our proposal. We address the major comment below and outline planned revisions.
read point-by-point responses
-
Referee: [Abstract] Abstract: the central claim that P2MP QKD via TDM/WDM in PON 'improve[s] both the deployment and security' is unsupported; the text contains no protocol description, security reduction, analysis of shared-trunk attacks (e.g., fiber tapping or wavelength crosstalk), or performance estimates, leaving the assertion that quantum guarantees are retained without new vulnerabilities unverified.
Authors: We agree that the current abstract is high-level and does not contain explicit derivations, numerical estimates, or a full security reduction. The manuscript is framed as a conceptual proposal that identifies the scalability barrier of dedicated P2P links for voting and points to established P2MP QKD techniques over PON (using TDM/WDM) as a remedy. Deployment improvement follows directly from infrastructure sharing; security retention rests on the fact that key generation occurs over individual quantum channels in multiplexed slots, inheriting information-theoretic security from standard QKD when crosstalk and tapping are controlled by existing optical isolation methods. We will revise the manuscript to add a concise protocol sketch, references to prior security analyses of TDM/WDM PON QKD, and a short discussion of shared-trunk attack vectors. revision: yes
Circularity Check
No derivation chain or self-referential elements; proposal is purely conceptual
full rationale
The paper consists solely of a high-level proposal identifying the impracticality of point-to-point QKD for voting and suggesting P2MP QKD via TDM/WDM in PON to address deployment and security. No equations, derivations, parameter fittings, predictions, or self-citations appear in the abstract or available text. The suggestion does not reduce any result to its inputs by construction, nor does it invoke uniqueness theorems or ansatzes from prior work. This is a standard non-circular conceptual paper with no load-bearing mathematical steps to analyze.
Axiom & Free-Parameter Ledger
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We thus propose using Point-to-Multipoint quantum key distribution (QKD) via time division multiplexing (TDM) and wavelength division multiplexing (WDM) in passive optical networks (PON)
-
IndisputableMonolith/Foundation/AbsoluteFloorClosure.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
The main challenge to integrate QKD into PON is the spontaneous Raman scattering noise
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.