pith. sign in

arxiv: 2509.15951 · v2 · submitted 2025-09-19 · 🪐 quant-ph

Single-Round Deterministic Quantum Anonymous Veto Using Bell States

Pith reviewed 2026-05-18 15:35 UTC · model grok-4.3

classification 🪐 quant-ph
keywords Quantum Anonymous VetoBell StatesQuantum CryptographyAnonymous VotingEntanglementQuantum Decision MakingPhotonic Implementation
0
0 comments X

The pith

Quantum anonymous veto can be done deterministically in one round using only Bell states.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper introduces a quantum anonymous veto protocol that uses bipartite Bell states to allow participants to detect a veto without revealing who cast it. This is achieved in a single round of communication and without relying on multi-particle entanglement. The method reduces the experimental complexity compared to previous approaches, making it more feasible for real-world quantum systems. If successful, it would enable more scalable secure decision-making processes in distributed quantum networks.

Core claim

The central discovery is a deterministic protocol for quantum anonymous veto that employs Bell states for conclusive detection of veto presence in a single round, while ensuring voter anonymity, correctness, and verifiability through local operations and measurements on the entangled pairs.

What carries the argument

The protocol mechanism where each voter encodes their choice by applying a phase or operation to one half of a shared Bell state, allowing the group to determine if any veto was cast via joint measurement outcomes without identifying individuals.

Load-bearing premise

The protocol relies on the perfect distribution and manipulation of Bell states without any quantum channel imperfections or dishonest participants.

What would settle it

Demonstrating that the veto detection is not conclusive or that anonymity is compromised when Bell states are distributed over a lossy channel would disprove the protocol's claimed advantages.

read the original abstract

Quantum Anonymous Veto (QAV) protocols enable secure and anonymous decision-making by allowing participants to detect the presence of a veto without revealing individual choices. While existing QAV schemes offer strong theoretical guarantees, they face significant limitations in practical implementation due to resource requirements, scalability issues, and the need for multipartite entanglement. In this work, we propose a novel deterministic QAV protocol that leverages only bipartite entanglement in the form of Bell states and achieves conclusive veto detection in a single round. Our approach eliminates the need for multi-qubit entangled states and iterative rounds, thereby significantly reducing experimental overhead and enhancing scalability. The protocol preserves critical properties such as voter anonymity, correctness, and verifiability, making it well-suited for implementation on near-term quantum devices. Furthermore, we outline a practical photonic realization based on polarization-path encoding and discrete-time quantum walks, demonstrating its feasibility within current quantum optical platforms. This work contributes a resource-efficient and experimentally viable alternative to existing QAV schemes, advancing the prospects of secure quantum decision-making in distributed systems.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The manuscript proposes a deterministic quantum anonymous veto protocol that uses only bipartite Bell states to achieve conclusive veto detection in a single round. It claims this eliminates the need for multipartite entanglement or iterative rounds while preserving voter anonymity, correctness, and verifiability, and outlines a photonic realization based on polarization-path encoding and discrete-time quantum walks.

Significance. If the security and determinism claims can be rigorously established, the protocol would offer a resource-efficient alternative to prior QAV schemes, lowering experimental overhead and improving scalability for near-term quantum devices. The focus on standard Bell states and a concrete photonic outline aligns with current experimental capabilities.

major comments (2)
  1. [§3] §3 (Protocol Description): The single-round conclusive detection and determinism are presented as following directly from perfect Bell-state correlations, but no error model, loss tolerance, or analysis of imperfect entanglement is provided. This assumption is load-bearing for the headline claim of suitability for near-term devices, as even small decoherence would collapse the veto signal or leak identity.
  2. [§4] §4 (Security Analysis): The assertions that the protocol preserves anonymity, correctness, and verifiability lack any formal proof, reduction to Bell-state properties, or analysis against dishonest participants or eavesdroppers. The text describes the operations but does not derive these properties, undermining the central security guarantees.
minor comments (2)
  1. [§5] The photonic realization section references discrete-time quantum walks but does not specify the exact mapping from Bell-state measurements to the walk operators or how they ensure single-round conclusiveness.
  2. [Introduction] Several prior QAV protocols using Bell states are cited but not compared quantitatively on resource count or round complexity.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for their constructive and detailed review of our manuscript. We address each major comment below and indicate the specific revisions we will implement to strengthen the protocol's robustness analysis and security arguments.

read point-by-point responses
  1. Referee: [§3] §3 (Protocol Description): The single-round conclusive detection and determinism are presented as following directly from perfect Bell-state correlations, but no error model, loss tolerance, or analysis of imperfect entanglement is provided. This assumption is load-bearing for the headline claim of suitability for near-term devices, as even small decoherence would collapse the veto signal or leak identity.

    Authors: We agree that the absence of an explicit error model and analysis of imperfect entanglement represents a limitation in supporting the claim of suitability for near-term devices. In the revised manuscript we will add a dedicated subsection to §3 that introduces a simple depolarizing noise model and photon-loss channel. We will derive the conditions under which the veto signal remains conclusive and quantify the degradation of anonymity when Bell-state fidelity falls below unity, thereby providing a concrete threshold for experimental viability. revision: yes

  2. Referee: [§4] §4 (Security Analysis): The assertions that the protocol preserves anonymity, correctness, and verifiability lack any formal proof, reduction to Bell-state properties, or analysis against dishonest participants or eavesdroppers. The text describes the operations but does not derive these properties, undermining the central security guarantees.

    Authors: The referee correctly identifies that the current text presents the security properties descriptively rather than through formal derivations. In the revised version we will expand §4 with explicit proofs: anonymity will be shown by proving that the reduced density operator seen by any proper subset of participants is independent of individual vote choices, using the symmetry of the shared Bell pairs; correctness and verifiability will be derived directly from the perfect anti-correlation of Bell measurements in the chosen basis. We will also add a subsection analyzing eavesdropping and dishonest-participant attacks, reducing security to the violation of the CHSH inequality and the no-cloning theorem under the honest-majority assumption. revision: yes

Circularity Check

0 steps flagged

Protocol presented as direct construction from standard Bell-state operations

full rationale

The paper proposes a QAV protocol using only bipartite Bell states and discrete-time quantum walks for single-round conclusive detection. No equations, derivations, or claims in the provided text reduce by construction to fitted parameters, self-referential definitions, or load-bearing self-citations. The central properties (anonymity, correctness, verifiability) are asserted to follow directly from the described operations on ideal Bell pairs, rendering the derivation self-contained against external quantum information principles rather than internally forced.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The central claim rests on standard quantum information assumptions about ideal Bell states and honest participants; no free parameters or new entities are introduced in the abstract.

axioms (1)
  • domain assumption Standard assumptions of quantum mechanics including perfect preparation and manipulation of Bell states without decoherence or loss.
    The single-round conclusive detection and security properties depend on these ideal conditions as is conventional in quantum protocol proposals.

pith-pipeline@v0.9.0 · 5717 in / 1263 out tokens · 52242 ms · 2026-05-18T15:35:17.858357+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

42 extracted references · 42 canonical work pages

  1. [1]

    Nielsen and Isaac L

    Michael A. Nielsen and Isaac L. Chuang.Quantum Computation and Quantum Informa- tion: 10th Anniversary Edition. Cambridge University Press, 2010

  2. [2]

    Quantum cryptography: Public key distribution and coin tossing

    Charles H. Bennett and Gilles Brassard. “Quantum cryptography: Public key distribution and coin tossing”. In:Theoretical Computer Science560 (2014). Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84, pp. 7–11

  3. [3]

    Quantum cryptography based on Bell’s theorem

    Artur K. Ekert. “Quantum cryptography based on Bell’s theorem”. In:Phys. Rev. Lett. 67 (6 Aug. 1991), pp. 661–663

  4. [4]

    Secure quan- tum key distribution with realistic devices

    Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, and Jian-Wei Pan. “Secure quan- tum key distribution with realistic devices”. In:Rev. Mod. Phys.92 (2 May 2020), p. 025002

  5. [5]

    The security of practical quantum key distribution

    Valerio Scarani et al. “The security of practical quantum key distribution”. In:Rev. Mod. Phys.81 (2009), p. 1301

  6. [6]

    Secure quan- tum key distribution with realistic devices

    Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, and Jian-Wei Pan. “Secure quan- tum key distribution with realistic devices”. In:Rev. Mod. Phys.92.2 (2020), p. 025002

  7. [7]

    Towards quantum- based privacy and voting

    Mark Hillery, M´ ario Ziman, Vladim´ ır Buˇ zek, and Maria Bielikov´ a. “Towards quantum- based privacy and voting”. In:Physics Letters A349.1-4 (2006), pp. 75–81

  8. [8]

    Quantum protocols for anonymous voting and surveying

    John A Vaccaro, Justin Spring, and Anthony Chefles. “Quantum protocols for anonymous voting and surveying”. In:Physical Review A75.1 (2007), p. 012333

  9. [9]

    Protocols for quantum binary vot- ing

    Kishore Thapliyal, RD Sharma, and Anirban Pathak. “Protocols for quantum binary vot- ing”. In:International Journal of Quantum Information15.01 (2017), p. 1750007

  10. [10]

    Self-tallying quantum anonymous voting

    Qian Wang, Chun Yu, Fei Gao, Hong Qi, and Qiao-Yan Wen. “Self-tallying quantum anonymous voting”. In:Physical Review A94.2 (2016), p. 022333

  11. [11]

    Quantum anonymous voting for continuous variables

    Lei Jiang, Guangqiang He, Dabin Nie, Jun Xiong, and Guihua Zeng. “Quantum anonymous voting for continuous variables”. In:Physical Review A85.4 (2012), p. 042309

  12. [12]

    Toward protocols for quantum-ensured privacy and secure voting

    Marco Bonanome, Vladim´ ır Buˇ zek, Mark Hillery, and M´ ario Ziman. “Toward protocols for quantum-ensured privacy and secure voting”. In:Physical Review A84.2 (2011), p. 022331

  13. [13]

    A simple quantum voting scheme with multi-qubit entangle- ment

    Peng Xue and Xiao Zhang. “A simple quantum voting scheme with multi-qubit entangle- ment”. In:Scientific Reports7.1 (2017), pp. 1–4

  14. [14]

    A simple voting protocol on quantum blockchain

    Xiang Sun, Qian Wang, Piotr Kulicki, and Marcin Sopek. “A simple voting protocol on quantum blockchain”. In:International Journal of Theoretical Physics58.1 (2019), pp. 275–281

  15. [15]

    Quantum voting scheme based on locally indistinguishable orthogonal product states

    Dao-Hua Jiang, Jian Wang, Xiao-Qiang Liang, Guo-Bin Xu, and Hong-Fei Qi. “Quantum voting scheme based on locally indistinguishable orthogonal product states”. In:Interna- tional Journal of Theoretical Physics59.2 (2020), pp. 436–444

  16. [16]

    Quantum anony- mous voting protocol based on single-particle

    Ji-Shan Liu, Yu-Chen Li, Qian-Le Wang, Min Hu, and Zhi-Chao Zhang. “Quantum anony- mous voting protocol based on single-particle”. In:Physica Scripta96.8 (2021), p. 085101

  17. [17]

    Quantum voting scheme with Greenberger- Horne-Zeilinger states

    Jian Wang, Guo-Bin Xu, and Dao-Hua Jiang. “Quantum voting scheme with Greenberger- Horne-Zeilinger states”. In:International Journal of Theoretical Physics59.8 (2020), pp. 2599– 2605

  18. [18]

    Quantum Bell states-based anony- mous voting with anonymity trace

    Qian Wang, Ji Liu, Yu Li, Chun Yu, and Shuai Pan. “Quantum Bell states-based anony- mous voting with anonymity trace”. In:Quantum Information Processing20.4 (2021), pp. 1–21. 13

  19. [19]

    A secure quan- tum voting scheme based on orthogonal product states

    Guo Du, Bao-Ming Zhou, Chang-Guo Ma, Shuai Zhang, and Jian-Yu Li. “A secure quan- tum voting scheme based on orthogonal product states”. In:International Journal of The- oretical Physics60.4 (2021), pp. 1374–1383

  20. [20]

    Anonymous quantum voting protocol based on Chinese remainder theorem

    Rui Shi, Jun Qin, Bo Liu, and Min Zhang. “Anonymous quantum voting protocol based on Chinese remainder theorem”. In:The European Physical Journal D75.1 (2021), pp. 1–7

  21. [21]

    Quantum state sharing of an arbitrary m-particle state using Einstein–Podolsky–Rosen pairs and application in quantum voting

    C Sekga and M Mafu. “Quantum state sharing of an arbitrary m-particle state using Einstein–Podolsky–Rosen pairs and application in quantum voting”. In:Modern Physics Letters A36.21 (2021), p. 2150151

  22. [22]

    A novel quantum voting scheme based on BB84-state

    Bao-Xian Liu, Dao-Hua Jiang, Xiao-Qiang Liang, and Yu-Hang Zhang. “A novel quantum voting scheme based on BB84-state”. In:International Journal of Theoretical Physics60.4 (2021), pp. 1339–1349

  23. [23]

    Novel quantum voting protocol with eight-qubit cluster entangled state

    Yan-Ping Li, Feng-Xia Zhou, Tian-Yu Wang, and Li-Fang Lu. “Novel quantum voting protocol with eight-qubit cluster entangled state”. In:International Journal of Theoretical Physics59.9 (2020), pp. 2671–2680

  24. [24]

    A quantum voting protocol using single-particle states

    Yan-Ru Li, Dao-Hua Jiang, Yu-Hang Zhang, and Xiao-Qiang Liang. “A quantum voting protocol using single-particle states”. In:Quantum Information Processing20.3 (2021), pp. 1–17

  25. [25]

    A secure quantum voting scheme based on quantum group blind signature

    Xin Zhang, Jian-Zhong Zhang, and Shu-Chao Xie. “A secure quantum voting scheme based on quantum group blind signature”. In:International Journal of Theoretical Physics59.3 (2020), pp. 719–729

  26. [26]

    Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer

    Debajyoti Joy, Mohammad Sabir, Biswajit Kumar Behera, and Prasanta K Panigrahi. “Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer”. In:Quantum Information Processing19.1 (2020), pp. 1–20

  27. [27]

    GHZ correlation provides secure Anonymous Veto Protocol

    Ramij Rahaman and Guruprasad Kar. “GHZ correlation provides secure Anonymous Veto Protocol”. In:arXiv: Quantum Physics(2015)

  28. [28]

    Quantum- based anonymity and secure veto

    Qingle Wang, Yuancheng Li, Chaohang Yu, Runhua Shi, and Zhichao Zhang. “Quantum- based anonymity and secure veto”. In:Quantum Information Processing20.3 (Mar. 2021), p. 85

  29. [29]

    Quantum anonymous veto: a set of new protocols

    Sandeep Mishra, Kishore Thapliyal, Abhishek Parakh, and Anirban Pathak. “Quantum anonymous veto: a set of new protocols”. In:EPJ Quantum Technology9.1 (May 2022), p. 14

  30. [30]

    Deter- ministic Quantum Search for Arbitrary Initial Success Probabilities

    Harishankar Mishra, Asvija Balasubramanyam, and Gudapati Naresh Raghava. “Deter- ministic Quantum Search for Arbitrary Initial Success Probabilities”. In:arXiv preprint arXiv:2505.15512(2025)

  31. [31]

    Quantum digital signatures with quantum-key-distribution components

    Petros Wallden, Vedran Dunjko, Adrian Kent, and Erika Andersson. “Quantum digital signatures with quantum-key-distribution components”. In:Phys. Rev. A91 (4 Apr. 2015), p. 042304

  32. [32]

    Which verification qubits perform best for secure communication in noisy channel?

    Rishi Dutt Sharma, Kishore Thapliyal, Anirban Pathak, Alok Kumar Pan, and Asok De. “Which verification qubits perform best for secure communication in noisy channel?” In: Quantum Information Processing15.4 (Apr. 2016), pp. 1703–1718

  33. [33]

    Quantum Key Distribution in the Holevo Limit

    Ad´ an Cabello. “Quantum Key Distribution in the Holevo Limit”. In:Phys. Rev. Lett.85 (26 Dec. 2000), pp. 5635–5638

  34. [34]

    Quantum random walks

    Y. Aharonov, L. Davidovich, and N. Zagury. “Quantum random walks”. In:Phys. Rev. A 48 (2 Aug. 1993), pp. 1687–1690

  35. [35]

    Quantum computation and decision trees

    Edward Farhi and Sam Gutmann. “Quantum computation and decision trees”. In:Phys. Rev. A58 (2 Aug. 1998), pp. 915–928. 14

  36. [36]

    Quantum speed-up of Markov chain based algorithms

    M. Szegedy. “Quantum speed-up of Markov chain based algorithms”. In:45th Annual IEEE Symposium on Foundations of Computer Science. 2004, pp. 32–41

  37. [37]

    Quantum random walks do not need a coin toss

    Apoorva Patel, K. S. Raghunathan, and Pranaw Rungta. “Quantum random walks do not need a coin toss”. In:Phys. Rev. A71 (3 Mar. 2005), p. 032347

  38. [38]

    Quantum random walks: An introductory overview

    J Kempe. “Quantum random walks: An introductory overview”. In:Contemporary Physics 44.4 (2003), pp. 307–327

  39. [39]

    Quantum walks: a comprehensive review

    Salvador El´ ıas Venegas-Andraca. “Quantum walks: a comprehensive review”. In:Quantum Information Processing(2012)

  40. [40]

    Universal quantum computing using single-particle discrete-time quantum walk

    Shivani Singh, Prateek Chawla, Anupam Sarkar, and C. M. Chandrashekar. “Universal quantum computing using single-particle discrete-time quantum walk”. In:Scientific Re- ports11 (June 2021)

  41. [41]

    Deutsch- Jozsa and Bernstein-Vazirani algorithm using single-particle discrete-time quantum walk

    Ravi Sangwan, Vikas Ramaswamy, Henry Sukumar, and Gudapati Naresh Raghava. “Deutsch- Jozsa and Bernstein-Vazirani algorithm using single-particle discrete-time quantum walk”. In:arXiv preprint arXiv:2508.14659(2025)

  42. [42]

    Muhammed Shafi, S

    Kanad Sengupta, K. Muhammed Shafi, S. P. Dinesh, Soumya Asokan, and C. M. Chan- drashekar.Experimental realization of universal quantum gates and six-qubit state using photonic quantum walk. 2024. 15