Single-Round Deterministic Quantum Anonymous Veto Using Bell States
Pith reviewed 2026-05-18 15:35 UTC · model grok-4.3
The pith
Quantum anonymous veto can be done deterministically in one round using only Bell states.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The central discovery is a deterministic protocol for quantum anonymous veto that employs Bell states for conclusive detection of veto presence in a single round, while ensuring voter anonymity, correctness, and verifiability through local operations and measurements on the entangled pairs.
What carries the argument
The protocol mechanism where each voter encodes their choice by applying a phase or operation to one half of a shared Bell state, allowing the group to determine if any veto was cast via joint measurement outcomes without identifying individuals.
Load-bearing premise
The protocol relies on the perfect distribution and manipulation of Bell states without any quantum channel imperfections or dishonest participants.
What would settle it
Demonstrating that the veto detection is not conclusive or that anonymity is compromised when Bell states are distributed over a lossy channel would disprove the protocol's claimed advantages.
read the original abstract
Quantum Anonymous Veto (QAV) protocols enable secure and anonymous decision-making by allowing participants to detect the presence of a veto without revealing individual choices. While existing QAV schemes offer strong theoretical guarantees, they face significant limitations in practical implementation due to resource requirements, scalability issues, and the need for multipartite entanglement. In this work, we propose a novel deterministic QAV protocol that leverages only bipartite entanglement in the form of Bell states and achieves conclusive veto detection in a single round. Our approach eliminates the need for multi-qubit entangled states and iterative rounds, thereby significantly reducing experimental overhead and enhancing scalability. The protocol preserves critical properties such as voter anonymity, correctness, and verifiability, making it well-suited for implementation on near-term quantum devices. Furthermore, we outline a practical photonic realization based on polarization-path encoding and discrete-time quantum walks, demonstrating its feasibility within current quantum optical platforms. This work contributes a resource-efficient and experimentally viable alternative to existing QAV schemes, advancing the prospects of secure quantum decision-making in distributed systems.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes a deterministic quantum anonymous veto protocol that uses only bipartite Bell states to achieve conclusive veto detection in a single round. It claims this eliminates the need for multipartite entanglement or iterative rounds while preserving voter anonymity, correctness, and verifiability, and outlines a photonic realization based on polarization-path encoding and discrete-time quantum walks.
Significance. If the security and determinism claims can be rigorously established, the protocol would offer a resource-efficient alternative to prior QAV schemes, lowering experimental overhead and improving scalability for near-term quantum devices. The focus on standard Bell states and a concrete photonic outline aligns with current experimental capabilities.
major comments (2)
- [§3] §3 (Protocol Description): The single-round conclusive detection and determinism are presented as following directly from perfect Bell-state correlations, but no error model, loss tolerance, or analysis of imperfect entanglement is provided. This assumption is load-bearing for the headline claim of suitability for near-term devices, as even small decoherence would collapse the veto signal or leak identity.
- [§4] §4 (Security Analysis): The assertions that the protocol preserves anonymity, correctness, and verifiability lack any formal proof, reduction to Bell-state properties, or analysis against dishonest participants or eavesdroppers. The text describes the operations but does not derive these properties, undermining the central security guarantees.
minor comments (2)
- [§5] The photonic realization section references discrete-time quantum walks but does not specify the exact mapping from Bell-state measurements to the walk operators or how they ensure single-round conclusiveness.
- [Introduction] Several prior QAV protocols using Bell states are cited but not compared quantitatively on resource count or round complexity.
Simulated Author's Rebuttal
We thank the referee for their constructive and detailed review of our manuscript. We address each major comment below and indicate the specific revisions we will implement to strengthen the protocol's robustness analysis and security arguments.
read point-by-point responses
-
Referee: [§3] §3 (Protocol Description): The single-round conclusive detection and determinism are presented as following directly from perfect Bell-state correlations, but no error model, loss tolerance, or analysis of imperfect entanglement is provided. This assumption is load-bearing for the headline claim of suitability for near-term devices, as even small decoherence would collapse the veto signal or leak identity.
Authors: We agree that the absence of an explicit error model and analysis of imperfect entanglement represents a limitation in supporting the claim of suitability for near-term devices. In the revised manuscript we will add a dedicated subsection to §3 that introduces a simple depolarizing noise model and photon-loss channel. We will derive the conditions under which the veto signal remains conclusive and quantify the degradation of anonymity when Bell-state fidelity falls below unity, thereby providing a concrete threshold for experimental viability. revision: yes
-
Referee: [§4] §4 (Security Analysis): The assertions that the protocol preserves anonymity, correctness, and verifiability lack any formal proof, reduction to Bell-state properties, or analysis against dishonest participants or eavesdroppers. The text describes the operations but does not derive these properties, undermining the central security guarantees.
Authors: The referee correctly identifies that the current text presents the security properties descriptively rather than through formal derivations. In the revised version we will expand §4 with explicit proofs: anonymity will be shown by proving that the reduced density operator seen by any proper subset of participants is independent of individual vote choices, using the symmetry of the shared Bell pairs; correctness and verifiability will be derived directly from the perfect anti-correlation of Bell measurements in the chosen basis. We will also add a subsection analyzing eavesdropping and dishonest-participant attacks, reducing security to the violation of the CHSH inequality and the no-cloning theorem under the honest-majority assumption. revision: yes
Circularity Check
Protocol presented as direct construction from standard Bell-state operations
full rationale
The paper proposes a QAV protocol using only bipartite Bell states and discrete-time quantum walks for single-round conclusive detection. No equations, derivations, or claims in the provided text reduce by construction to fitted parameters, self-referential definitions, or load-bearing self-citations. The central properties (anonymity, correctness, verifiability) are asserted to follow directly from the described operations on ideal Bell pairs, rendering the derivation self-contained against external quantum information principles rather than internally forced.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Standard assumptions of quantum mechanics including perfect preparation and manipulation of Bell states without decoherence or loss.
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquationwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
Each voter applies P(a) = [[1,0],[0,exp(i π / 2^{a-1})]]; VA measures |Φ+⟩ or |Φ−⟩ to read bits of k
-
IndisputableMonolith/Foundation/AlexanderDualityalexander_duality_circle_linking unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
h = ⌈log₂ n⌉ + 1 Bell states; single-round conclusive detection
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Michael A. Nielsen and Isaac L. Chuang.Quantum Computation and Quantum Informa- tion: 10th Anniversary Edition. Cambridge University Press, 2010
work page 2010
-
[2]
Quantum cryptography: Public key distribution and coin tossing
Charles H. Bennett and Gilles Brassard. “Quantum cryptography: Public key distribution and coin tossing”. In:Theoretical Computer Science560 (2014). Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84, pp. 7–11
work page 2014
-
[3]
Quantum cryptography based on Bell’s theorem
Artur K. Ekert. “Quantum cryptography based on Bell’s theorem”. In:Phys. Rev. Lett. 67 (6 Aug. 1991), pp. 661–663
work page 1991
-
[4]
Secure quan- tum key distribution with realistic devices
Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, and Jian-Wei Pan. “Secure quan- tum key distribution with realistic devices”. In:Rev. Mod. Phys.92 (2 May 2020), p. 025002
work page 2020
-
[5]
The security of practical quantum key distribution
Valerio Scarani et al. “The security of practical quantum key distribution”. In:Rev. Mod. Phys.81 (2009), p. 1301
work page 2009
-
[6]
Secure quan- tum key distribution with realistic devices
Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, and Jian-Wei Pan. “Secure quan- tum key distribution with realistic devices”. In:Rev. Mod. Phys.92.2 (2020), p. 025002
work page 2020
-
[7]
Towards quantum- based privacy and voting
Mark Hillery, M´ ario Ziman, Vladim´ ır Buˇ zek, and Maria Bielikov´ a. “Towards quantum- based privacy and voting”. In:Physics Letters A349.1-4 (2006), pp. 75–81
work page 2006
-
[8]
Quantum protocols for anonymous voting and surveying
John A Vaccaro, Justin Spring, and Anthony Chefles. “Quantum protocols for anonymous voting and surveying”. In:Physical Review A75.1 (2007), p. 012333
work page 2007
-
[9]
Protocols for quantum binary vot- ing
Kishore Thapliyal, RD Sharma, and Anirban Pathak. “Protocols for quantum binary vot- ing”. In:International Journal of Quantum Information15.01 (2017), p. 1750007
work page 2017
-
[10]
Self-tallying quantum anonymous voting
Qian Wang, Chun Yu, Fei Gao, Hong Qi, and Qiao-Yan Wen. “Self-tallying quantum anonymous voting”. In:Physical Review A94.2 (2016), p. 022333
work page 2016
-
[11]
Quantum anonymous voting for continuous variables
Lei Jiang, Guangqiang He, Dabin Nie, Jun Xiong, and Guihua Zeng. “Quantum anonymous voting for continuous variables”. In:Physical Review A85.4 (2012), p. 042309
work page 2012
-
[12]
Toward protocols for quantum-ensured privacy and secure voting
Marco Bonanome, Vladim´ ır Buˇ zek, Mark Hillery, and M´ ario Ziman. “Toward protocols for quantum-ensured privacy and secure voting”. In:Physical Review A84.2 (2011), p. 022331
work page 2011
-
[13]
A simple quantum voting scheme with multi-qubit entangle- ment
Peng Xue and Xiao Zhang. “A simple quantum voting scheme with multi-qubit entangle- ment”. In:Scientific Reports7.1 (2017), pp. 1–4
work page 2017
-
[14]
A simple voting protocol on quantum blockchain
Xiang Sun, Qian Wang, Piotr Kulicki, and Marcin Sopek. “A simple voting protocol on quantum blockchain”. In:International Journal of Theoretical Physics58.1 (2019), pp. 275–281
work page 2019
-
[15]
Quantum voting scheme based on locally indistinguishable orthogonal product states
Dao-Hua Jiang, Jian Wang, Xiao-Qiang Liang, Guo-Bin Xu, and Hong-Fei Qi. “Quantum voting scheme based on locally indistinguishable orthogonal product states”. In:Interna- tional Journal of Theoretical Physics59.2 (2020), pp. 436–444
work page 2020
-
[16]
Quantum anony- mous voting protocol based on single-particle
Ji-Shan Liu, Yu-Chen Li, Qian-Le Wang, Min Hu, and Zhi-Chao Zhang. “Quantum anony- mous voting protocol based on single-particle”. In:Physica Scripta96.8 (2021), p. 085101
work page 2021
-
[17]
Quantum voting scheme with Greenberger- Horne-Zeilinger states
Jian Wang, Guo-Bin Xu, and Dao-Hua Jiang. “Quantum voting scheme with Greenberger- Horne-Zeilinger states”. In:International Journal of Theoretical Physics59.8 (2020), pp. 2599– 2605
work page 2020
-
[18]
Quantum Bell states-based anony- mous voting with anonymity trace
Qian Wang, Ji Liu, Yu Li, Chun Yu, and Shuai Pan. “Quantum Bell states-based anony- mous voting with anonymity trace”. In:Quantum Information Processing20.4 (2021), pp. 1–21. 13
work page 2021
-
[19]
A secure quan- tum voting scheme based on orthogonal product states
Guo Du, Bao-Ming Zhou, Chang-Guo Ma, Shuai Zhang, and Jian-Yu Li. “A secure quan- tum voting scheme based on orthogonal product states”. In:International Journal of The- oretical Physics60.4 (2021), pp. 1374–1383
work page 2021
-
[20]
Anonymous quantum voting protocol based on Chinese remainder theorem
Rui Shi, Jun Qin, Bo Liu, and Min Zhang. “Anonymous quantum voting protocol based on Chinese remainder theorem”. In:The European Physical Journal D75.1 (2021), pp. 1–7
work page 2021
-
[21]
C Sekga and M Mafu. “Quantum state sharing of an arbitrary m-particle state using Einstein–Podolsky–Rosen pairs and application in quantum voting”. In:Modern Physics Letters A36.21 (2021), p. 2150151
work page 2021
-
[22]
A novel quantum voting scheme based on BB84-state
Bao-Xian Liu, Dao-Hua Jiang, Xiao-Qiang Liang, and Yu-Hang Zhang. “A novel quantum voting scheme based on BB84-state”. In:International Journal of Theoretical Physics60.4 (2021), pp. 1339–1349
work page 2021
-
[23]
Novel quantum voting protocol with eight-qubit cluster entangled state
Yan-Ping Li, Feng-Xia Zhou, Tian-Yu Wang, and Li-Fang Lu. “Novel quantum voting protocol with eight-qubit cluster entangled state”. In:International Journal of Theoretical Physics59.9 (2020), pp. 2671–2680
work page 2020
-
[24]
A quantum voting protocol using single-particle states
Yan-Ru Li, Dao-Hua Jiang, Yu-Hang Zhang, and Xiao-Qiang Liang. “A quantum voting protocol using single-particle states”. In:Quantum Information Processing20.3 (2021), pp. 1–17
work page 2021
-
[25]
A secure quantum voting scheme based on quantum group blind signature
Xin Zhang, Jian-Zhong Zhang, and Shu-Chao Xie. “A secure quantum voting scheme based on quantum group blind signature”. In:International Journal of Theoretical Physics59.3 (2020), pp. 719–729
work page 2020
-
[26]
Debajyoti Joy, Mohammad Sabir, Biswajit Kumar Behera, and Prasanta K Panigrahi. “Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer”. In:Quantum Information Processing19.1 (2020), pp. 1–20
work page 2020
-
[27]
GHZ correlation provides secure Anonymous Veto Protocol
Ramij Rahaman and Guruprasad Kar. “GHZ correlation provides secure Anonymous Veto Protocol”. In:arXiv: Quantum Physics(2015)
work page 2015
-
[28]
Quantum- based anonymity and secure veto
Qingle Wang, Yuancheng Li, Chaohang Yu, Runhua Shi, and Zhichao Zhang. “Quantum- based anonymity and secure veto”. In:Quantum Information Processing20.3 (Mar. 2021), p. 85
work page 2021
-
[29]
Quantum anonymous veto: a set of new protocols
Sandeep Mishra, Kishore Thapliyal, Abhishek Parakh, and Anirban Pathak. “Quantum anonymous veto: a set of new protocols”. In:EPJ Quantum Technology9.1 (May 2022), p. 14
work page 2022
-
[30]
Deter- ministic Quantum Search for Arbitrary Initial Success Probabilities
Harishankar Mishra, Asvija Balasubramanyam, and Gudapati Naresh Raghava. “Deter- ministic Quantum Search for Arbitrary Initial Success Probabilities”. In:arXiv preprint arXiv:2505.15512(2025)
-
[31]
Quantum digital signatures with quantum-key-distribution components
Petros Wallden, Vedran Dunjko, Adrian Kent, and Erika Andersson. “Quantum digital signatures with quantum-key-distribution components”. In:Phys. Rev. A91 (4 Apr. 2015), p. 042304
work page 2015
-
[32]
Which verification qubits perform best for secure communication in noisy channel?
Rishi Dutt Sharma, Kishore Thapliyal, Anirban Pathak, Alok Kumar Pan, and Asok De. “Which verification qubits perform best for secure communication in noisy channel?” In: Quantum Information Processing15.4 (Apr. 2016), pp. 1703–1718
work page 2016
-
[33]
Quantum Key Distribution in the Holevo Limit
Ad´ an Cabello. “Quantum Key Distribution in the Holevo Limit”. In:Phys. Rev. Lett.85 (26 Dec. 2000), pp. 5635–5638
work page 2000
-
[34]
Y. Aharonov, L. Davidovich, and N. Zagury. “Quantum random walks”. In:Phys. Rev. A 48 (2 Aug. 1993), pp. 1687–1690
work page 1993
-
[35]
Quantum computation and decision trees
Edward Farhi and Sam Gutmann. “Quantum computation and decision trees”. In:Phys. Rev. A58 (2 Aug. 1998), pp. 915–928. 14
work page 1998
-
[36]
Quantum speed-up of Markov chain based algorithms
M. Szegedy. “Quantum speed-up of Markov chain based algorithms”. In:45th Annual IEEE Symposium on Foundations of Computer Science. 2004, pp. 32–41
work page 2004
-
[37]
Quantum random walks do not need a coin toss
Apoorva Patel, K. S. Raghunathan, and Pranaw Rungta. “Quantum random walks do not need a coin toss”. In:Phys. Rev. A71 (3 Mar. 2005), p. 032347
work page 2005
-
[38]
Quantum random walks: An introductory overview
J Kempe. “Quantum random walks: An introductory overview”. In:Contemporary Physics 44.4 (2003), pp. 307–327
work page 2003
-
[39]
Quantum walks: a comprehensive review
Salvador El´ ıas Venegas-Andraca. “Quantum walks: a comprehensive review”. In:Quantum Information Processing(2012)
work page 2012
-
[40]
Universal quantum computing using single-particle discrete-time quantum walk
Shivani Singh, Prateek Chawla, Anupam Sarkar, and C. M. Chandrashekar. “Universal quantum computing using single-particle discrete-time quantum walk”. In:Scientific Re- ports11 (June 2021)
work page 2021
-
[41]
Deutsch- Jozsa and Bernstein-Vazirani algorithm using single-particle discrete-time quantum walk
Ravi Sangwan, Vikas Ramaswamy, Henry Sukumar, and Gudapati Naresh Raghava. “Deutsch- Jozsa and Bernstein-Vazirani algorithm using single-particle discrete-time quantum walk”. In:arXiv preprint arXiv:2508.14659(2025)
-
[42]
Kanad Sengupta, K. Muhammed Shafi, S. P. Dinesh, Soumya Asokan, and C. M. Chan- drashekar.Experimental realization of universal quantum gates and six-qubit state using photonic quantum walk. 2024. 15
work page 2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.