Quantum anonymous veto: a set of new protocols

We propose a set of protocols for quantum anonymous veto (QAV) broadly categorized under the probabilistic, iterative, and deterministic schemes. The schemes are based upon different types of quantum resources. Specifically, they may be viewed as single photon-based, bipartite and multipartite entangled states-based, orthogonal state-based and conjugate coding-based. The set of the proposed schemes is analyzed for all the requirements of a valid QAV scheme (e.g., privacy, verifiability, robustness, binding, eligibility and correctness). The proposed schemes are observed to be more efficient in comparison to the existing QAV schemes and robust up to the moderate decoherence rate. In addition, a trade-off between correctness and robustness of the probabilistic QAV schemes is observed. Further, the multipartite dense coding based deterministic QAV scheme is most efficient scheme among the set of schemes proposed here. A bipartite entanglement based iterative scheme employing dense coding is yet another efficient and practical scheme. The intrinsic connections between dining cryptographer-net with anonymous veto-net is also explored in the process of designing new protocols.


I. INTRODUCTION
Everyday humans have to deal with conflicting issues which demand making some choices and in modern societies, voting is an integral part of those decision making processes.In simple words, everyone having a stake exercises the possible choice of option and finally a decision is arrived at.In most of the cases, the outcome of the voting is based on the majority voting outcome.But sometimes there may be situations where a split outcome is not desireable as the consequences may be too high.So, it is required that any decision that is taken is arrived at by a consensus only.For instance, a verdict for the capital punishment cannot be adjudged only on the majority view of the judges as no judicial system is perfect, and the life of the accused cannot be revived in view of evidences to acquit him posthumously.In such a case, capital punishment is overturned even if one of the judge dissents.Similarly, in big corporations, shareholders may like to exercise their votes before making some crucial decisions.Some of the stakeholders may collude to influence the decision to sabotage the stakes of their rivals.Such a situation naturally desires a process in which the decision is made by consensus.The most glaring example is the United Nations security council resolutions, in which a proposal is rejected at once if one or more of the P5 countries exercise(s) its veto power.Therefore, veto empowers a voter in the voting process to reject a proposal unilaterally.In other words, a proposal is rejected even if one of the voters does not approve the proposal, and thus a decision can only be made unanimously.Usually in the veto scheme, the group of voters is limited and no one would like to reveal their identity after exercising the veto as it may have some repercussions.Therefore, the useful information is only a single bit, i.e., whether the decision is made by consensus or not decision has been reached (which means someone vetoed the proposal in the latter case).
With the advent of quantum enabled technologies, certain tasks are achievable, which were not possible otherwise with the use of classical resources only; e.g., the current classical and post-quantum cryptographic systems exploit the mathematical complexity associated with the process of solving certain problems assumed to be hard on classical computers [1].However, many such cryptographic systems are vulnerable to a scalable quantum computer, which can implement quantum algorithms to solve these respective problems efficiently [1,2].In contrast, with the advent of quantum cryptographic schemes, such as BB84 [3] and E91 [4] quantum key distribution (QKD) protocols, quantum mechanics equipped us with the feasibility of unconditional secure communication.Here, unconditional security corresponds to the fact that it's based on the laws of physics governed by quantum mechanics and is not conditioned on the computational power available to an adversary.This motivated a host of new protocols for secure quantum communication and/or quantum computation.Specifically, secure quantum computation comprises the features of both computation and communication as it enables us to compute a multi-variable function, with each input provided by different individuals, in such a way that the inputs are not disclosed.Quantum solutions for the tasks, such as secure multi party computation [5,6], private comparison [7,8], auctions [9][10][11], provide examples of situations where quantum advantage is obtained in the field of secure computation.This also inspired the use of quantum resources in the field of voting as it requires features such as anonymity, verifiability and security from tampering.In 2006, the first set of quantum voting protocols was proposed using quantum entangled states [12,13].Since then a large number of new protocols for anonymous voting have been designed, but an unconditionally secure and practical quantum voting protocol has remained elusive till this date [14][15][16][17][18].More recently, there has been a heightened interest in the quantum anonymous voting protocols with a flurry of papers [19][20][21][22][23][24][25][26][27][28][29][30][31][32].These voting schemes can be classified in different categories on the basis of required quantum resources, nature of ballots, number of candidates, conditions to be satisfied, and so on.
One such interesting voting scheme is an anonymous veto (AV) protocol, which has not been studied much.Specifically, Rahman and Kar introduced the idea of quantum solution for AV using GHZ states to implement privacy while casting a veto [33].The idea was to explore the interconnections between the dinning cryptographers (DC) net problem and AV net problem [34].The idea of DC nets was introduced in 1988 to illustrate a scheme in which parties can send messages with cryptographically secure non-traceability [35].Specifically, DC nets are based on establishing the secret keys (between every pair of the parties) as one of the primitives.Since then DC nets have been used as one of the possible ways to implement anonymous broadcasting of the messages.In 2021, analogous to [33], a new quantum AV (QAV) protocol based on n-party GHZ states was proposed with a proof of principle experiment on quantum computer placed on cloud by the IBM Corporation for four voters [32].However, the scheme in [32] is neither practical nor efficient, which motivated us to propose some QAV protocols based on different quantum states.Specifically, we propose here the protocols for QAV scheme using single photon, Bell state, GHZ and cluster state, which can be implemented between voters equipped with different kinds of quantum resources.In the present work, we have also been able to show the intrinsic connections between the AV nets and DC nets.In view of some recent works, we expect the applications of our QAV protocols for the implementation of sealed bid auctions [36].
The rest of the paper is structured as follows.In section II, we introduce the basic ideas and nomenclature used in the present work.Subsequently, we begin with reviewing the existing schemes of QAV with their limitations in section III followed by our new set of QAV schemes in section IV.We present the security and efficiency analysis of the proposed schemes in sections V.And finally, we summarize the results in section VI.

II. BASIC NOTATIONS AND DEFINITIONS
Definition 1.An AV protocol of n voters returns V n = 0 if all the voters support the proposal and V n = 1 otherwise.In other words, an n input function V n ∈ {0, 1} is computed as where the i th input W i ∈ {0, 1} is supplied by the i th voter, and the logical OR operation ∨ i performed over all the i inputs returns 0 only when all the inputs are 0. Thus, V n = 0 or 1 provides whether k = 0 or k = 0 number of voters veto the proposal among all the n voters, respectively.
Verifiability: All the participants can verify the result V n .
Robustness: If the adversary is passive, then the result bit V n = i ∀i ∈ {0, 1} is generated.It means that the system obtains the result if adversary is passive, i.e. under the effect of the noise in the systems.

B. Authentication using quantum digital signatures
The first and foremost thing in any voting scheme is to provide a mechanism to establish that only genuine and eligible voters are allowed to take part in the voting process.It can also be referred to as pre-voting stage.Various classical authentication schemes are available for the verification of the authenticity of a voter, but the security of such schemes is usually based on computational complexity only.Here, we will be using a quantum digital signature scheme based on BB84 states as proposed in [38] to verify the authenticity of the eligible voters.Suppose, there is a trusted central authority (CA) who will verify the credentials of the voters.After verification, the voter is registered and asked to generate his digital signature.The voter then sends a sufficiently long sequence of BB84 states (|0 , |1 , |+ , |− ) to CA. CA receives the states and measures them randomly in the computational basis (|0 , |1 ) or Hadamard basis (|+ , |− ).After the measurement, CA eliminates one of the BB84 states that the voter must have never sent.For instance, if CA's measurement outcome is |0 then it infers the voter has not sent |1 .The measurement outcomes of CA thus form an eliminated signature of the voter.During the voting stage for the purpose of authentication, each voter will reveal to CA the choice of BB84 states (digital signature) that they have sent in the pre-voting stage.CA will then verify the digital signature with the eliminated signature of the voter and if the number of mismatches is lesser than a particular threshold then the authentication of the voter is validated.After authentication, the voter is allowed to take part in the voting process for casting the vote.

C. Decoy state based eavesdropping checking techniques
In quantum cryptography, security is achieved by obtaining an upper bound on the information accessible to Eve by checking the error rates in the transmission of qubits.This is based on the fact that any eavesdropping attempt leaves detectable traces at the receiver's end.Therefore, some verification qubits, known as decoy qubits [39], are inserted randomly in the string of qubits before transmission to be used for parameter estimation.In other words, for the secure transmission of t qubits through a channel accessible to Eve an additional δt decoy qubits are inserted.The factor of δ > 0 is decided to achieve the desired level of security.For example, it is shown that the probability of obtaining more than (∆ + )t errors in the transmitted qubits (such that ∆ > 0, > 0)for ∆δt errors on the decoy qubits is asymptotically less than exp[−O( 2 t)] for δ = 1 [40].
Decoy state based eavesdropping checking techniques may be broadly categorized on the basis of nature of verification qubits as follows ( [39] and references therein).
1. BB84 subroutine: The set of BB84 states is inserted by the sender in the travel qubits randomly and the receiver measures them after the sender informs him the position and the basis chosen to prepare the state.All the errors in the measurement outcome (including due to transmission noise) when compared with the state prepared are attributed to the eavesdropping attempt.The name suggests that security comes from Eve's inability to measure a quantum state in mutually unbiased bases without leaving detectable traces.
2. GV subroutine: Multiple copies of one of the entangled states (say a Bell state) are used as decoy states while the position of the entangled particles is kept secret while transmission.This geographical separation of entangled qubits restricts Eve from measuring the state in the publicly known basis.An eavesdropping attempts leads to entanglement swapping and detectable traces as errors in the receiver's port.
It would be worth mentioning here that in semiquantum cryptography a two-way communication of the decoy qubits is involved as a classical user reflects all the decoy qubits as he is restricted to measure in the computational basis only.
Thus, in what follows, a secure transmission of qubits is performed using decoy state based eavesdropping checking technique.

III. EXISTING PROTOCOLS AND THEIR LIMITATIONS
We briefly review two quantum anonymous veto protocols, and mention some of their limitations.Specifically, we summarize a quantum anonymous veto protocol proposed by Rahman and Kar (RK) referred to as RKQAV protocol [33], which motivated Wang et al.'s scheme [32] referred to as WQAV protocol.
A. Iterative QAV protocol: RKQAV protocol Rahman and Kar [33] proposed RKQAV protocol using the properties of multiple copies of n-qubit GHZ states [41] shared among n voters V i ∀ i ∈ {0, 1, . . ., n − 1}.Without loss of generality, we assume that 0 ≤ k ≤ n voters veto the proposal.The steps involved in the protocol based on generalization of dining cryptographers protocol can be briefly mentioned as follows: RKQAV 1: l (l ≥ 2) ordered copies of n-qubit GHZ states are shared among the n voters in such a manner that each voter receives one qubit of each of the GHZ states1 .
They check the shared correlations by verifying GHZ-type paradox.
RKQAV 2: All the voters select one of the shared l copies of the GHZ state randomly for encoding (say m th copy).k voters perform a unitary operation σ z on his qubit of the m th GHZ state while the rest of the n − k voters do nothing.
RKQAV 3: If the final state of the m th GHZ state remains unchanged, i.e., they obtain |χ m on GHZ measurement, it corresponds to either k = 0 or k is non-zero even number.However, in case of odd k, the final joint state will be orthogonal to the initial state, i.e., This allows the voters to distinguish whether an odd number of voters have vetoed the proposal (for |χ ⊥ m ) or an inconclusive outcome (for |χ m ) is obtained.For the final joint state |χ m no conclusion can be made as the state can be obtained in following cases: (a) all are in 'favour' of the proposal or (b) an even number of voters have vetoed the proposal.In case of conclusive outcome |χ ⊥ m they have accomplished the desired task, while for an inconclusive outcome |χ m they proceed with the protocol.To distinguish between the two cases of an inconclusive outcome (a) k = 0 and (b) k non-zero even number, they repeat the next step for a few iterations.
RKQAV 4: In the t th (for t ≥ 1) iteration2 , k voters apply a unitary operation σ z (t) = 1 0 0 exp (iπ2 −t ) to convey they are against the proposal, while n − k do nothing, on their respective qubits of the randomly chosen GHZ state among the remaining l − t copies.
In each iteration, if their measurement outcome results |χ then 2 −t k is even (including zero), while the final state |χ ⊥ corresponds an odd value of 2 −t k.They truncate this iteration until either the measurement outcome is |χ ⊥ or they get |χ for k = 0 conclusively.
RKQAV 5: Since, the total number of voters is finite and after every round we eliminate half of the possibilities, so after a finite number of steps one can detect whether there is any unanimity 'in favor' of the decision or at least one voter has vetoed the proposal.
RKQAV protocol provided an initial idea to implement AV using quantum states, but this protocol was not mature (due to a large number of loopholes) to be implemented with real systems.Specifically, in the original proposal of RK, it was not mentioned who is responsible for the generation and distribution of the GHZ states.Nothing was stated about how and who will have the responsibility to distinguish between the GHZ states |χ and |χ ⊥ .Further, no elaborate security analysis of the protocol with respect to an ideal quantum voting protocol was reported.Additionally, the implementation of the protocol requires a maximum of ∼ (1 + log 2 n) number of iterations to yield a conclusive outcome V n , so we refer to this scheme as iterative QAV protocol.

B. Probabilistic QAV protocol: WQAV protocol
Wang et al. [32] further improved the RKQAV protocol and presented a new and mature mechanism (WQAV).Similar to RKQAV, this protocol utilizes the GHZ state, while allows measurement by voters in the computational ({|0 , |1 }) and diagonal ({|+ , |− }) basis in addition of single qubit unitary operations, i.e. σ z and Hadamard gate.In this case, the quantum voting network consists of n voters V i ∀ i ∈ {0, 1, . . ., n − 1} which is controlled by a semi-honest central authority (CA).
The steps involved in the protocol can be briefly described as follows: WQAV 1: CA authenticates every voter and shares a binary key B i = {b ij } j=0,1,...,l−1 of l-bits using any QKD protocol, such as BB84 protocol [3], with the i th voter V i .
WQAV 2: CA distributes l ordered copies of n-qubit GHZ states (2) in a secure manner such that each voter receives a qubit of entangled states.
WQAV 3: Only if each voter finds the error rate in the eavesdropping check below the threshold error, they proceed with the protocol and each voter V i possesses l ordered particles given by S i = {s i j } j=0,1,...,l−1 .WQAV 4: Each voter encodes their voting information.Specifically, k voters perform a local phase flip gate σ z to every particle s i j with probability 1/2, while the rest of the n − k voters do nothing.WQAV 5: Voter V i applies a Hadamard operation on his set of particles S i before measuring them in the computational basis.This will result in the generation of l ordered intermediate data sequence WQAV 6: Every voter V i then transmits his data sequence T i to CA via the use of the shared secret key B i with CA.Specifically, the data sequence received by CA from each voter is WQAV 8: If CA gets at least one R j = 0, then at least one voter has vetoed the proposal.In other words, V n = 0 ⇔ R j = 0 ∀j.The probability for CA to successfully detect a veto is given by 1 − 2 −l .This is due to the fact that if k = 0 then the number of outcomes "1" in the sequence {t 0,j , t 1,j , . . ., t n−1,j } for every j = 0, 1, . . ., l − 1 is even.However, if at least one voter has vetoed the protocol, then the probability of successfully getting "1" for each R j is 1/2.
WQAV protocol has elaborately discussed the mechanism for secure distribution of shared GHZ states and have discussed the security analysis.Further, it has been proved that this protocol satisfies the essential requirements of any secure voting protocol.The disadvantage of WQAV is that it requires a large amount of quantum resources.For example, the CA has to generate l bit keys with all the voters using QKD/quantum key agreement (QKA) protocol which will require additional resources.Further, the n party GHZ state is difficult to generate and maintain, and here l copies of such a state are required.Only ideal cases have been considered while a practical protocol should be robust against noise.Specifically, due to the effect of noise the correlations in GHZ states will reduce, which may lead to false veto or vice versa.The scheme, although achieving the task in a single iteration, remains a probabilistic QAV protocol unless l is large.Further, there is no discussion on the possibilities of improving the efficiency or robustness of the protocol.

IV. NEW PROTOCOLS FOR QUANTUM VETO
The field for development of unconditionally secure AV protocol using quantum resources is still at a nascent stage.In the following, we propose a few protocols in order to implement AV scheme using the optimal utilization of quantum resources and perform their security analysis.Specifically, we divide the proposed schemes in three broad categories: (i) probabilistic QAV, (ii) iterative QAV, and (iii) deterministic QAV protocols.

A. Probabilistic QAV protocols
We assume that we have a quantum voting network with a semi-honest central authority CA (unless stated otherwise) and n voters V i s.Without loss of generality, we may assume that 0 ≤ k ≤ n voters veto the proposal.

QAV-1: Quantum key distribution/key agreement based QAV protocol
A probabilistic QAV protocol, which uses the complete graph structure (Fig. 1 (a)) can be proposed using any of the existing protocols for QKD or QKA.Specifically, the dashed lines in Fig. 1 (a) in the tree structure represent classical communication, while the smooth lines correspond to the quantum transmission.The steps involved in this protocol (QAV-1) are as follows: Step 1.1 CA verifies the validity of every voter V i by using the method of quantum digital signature described in Section II.
Step 1.2 Voter V i generates a l bit symmetric key , and l = 0, 1, . . ., l − 1 with voter V j =i using a QKD or QKA protocol.
Step 1.3 Voter V i computes his sequence V i l = n−1 j=0,j =i v ij l mod 2 for every bit value of l .All n − k voters in favour of the proposal announce V i l , while k voters either broadcast V i l or apply a not gate to V i l before broadcasting with an equal probability.
Step 1.5 Thus, V n = 0 ⇔ S l = 0 ∀l .If at least one of the voter has used his veto power, then CA will get at least one of the S l = 0 and the success probability of detecting a veto is given by 1 − 2 −l .
An important point to be mentioned here is that the role of CA in this protocol is only for the authentication of the eligible voters.Thus, this protocol can be implemented without CA if the voters have the ability to authenticate each other.The protocol described above has a similar structure to that of the DC net as this also requires to establish symmetric keys between all the pairs of voters before the voters can start casting their votes.Further, in principle, all the voters can use different types of quantum resources to share the keys among them, such as using single photon based [3,42], orthogonal state based [43], entangled state based [4,44], counterfactual [45], semi-quantum [46], continuous variable [47] QKD and/or QKA [48,49], which will give the corresponding flavor to the proposed QAV scheme.Thus, this protocol is general in nature and actually represent a family of protocols which can be reduced to a specific protocol by choice of specific scheme(s) of QKD/QKA.The above fact is established by providing three protocols (cf.QAV-2-QAV-4), which can be viewed as specific protocols reduced from a more general protocol described here.In principle, each pair of voters can choose different QKD/QKA scheme independently, which will result in a hybrid QAV scheme.

QAV-2: Bell state based probabilistic QAV protocol
This protocol too involves the arrangement of voters in a tree structure as shown in Fig. 1 (a) and shows that the same task performed by WQAV protocol can be accomplished using solely bipartite entanglement, which is much easier to be produced and maintained.Specifically, the dashed lines in Fig. 1 (a) in the tree structure represent quantum communication, while the smooth lines correspond to the shared entanglement.The steps involved in this protocol (QAV-2) are as follows: Step 2.1 Same as Step 1.1 of QAV-1.
Step 2.2 CA securely distributes l Bell states |φ = 1 √ 2 (|00 + |11 ) for each pair of the voters in a secure manner, i.e., voter V i shares l copies of |φ states with each of the n − 1 other voters.
Step 2.5 Similar to WQAV 5, Voter V i measures all the qubits in the computational basis after performing a Hadamard operation and obtains l binary sequences of n − 1 bits given by {v ij l } j =i ∀ i, j = 0, 1, . . ., n − 1 with v ij l ∈ {0, 1}.
Step 2.6 Similar to WQAV 6, Voter V i computes his sequence V i l = n−1 j=0,j =i v ij l mod 2 for every bit value of l .Subsequently, Voter V i broadcasts his data sequence V i l .
Step 2.7 Similar to WQAV 7, CA (in principle, all the voters) calculates the {R l } with R l = n−1 i=0 V i l mod 2. Thus, V n = 0 ⇔ R l = 0 ∀l and if CA gets at least one R l = 0, then k > 0. Similar to WQAV and QAV-1, the probability for CA to successfully detect a veto is given by 1 − 2 −l .The protocol described above has a very close resemblance with the DC-net problem with regards to its advantages and disadvantages.The main disadvantage of this protocol is that we need to a minimum of l × n C 2 copies of Bell states which would consume a considerable amount of quantum resources.However, it does address the practical challenges in preparation of multipartite entangled state and robustness of WQAV protocol.

QAV-3 and QAV-4: Alternative protocols of QAV for voters with limited resources
QAV-1 can be easily modified to be implemented by the parties with unique quantum resources/abilities.For example, using an orthogonal state based QKA scheme [48] between each pair of voters completely orthogonal state based QAV protocol is proposed here.The feasibility of GV protocol [43] established that the unconditional security of quantum cryptography can be achieved using solely orthogonal states.This is achieved by making the basis of preparation of the state inaccessible to the eavesdropper by using temporal or geographical splitting of different quantum pieces.We briefly describe the modification in Step 1.2 of QAV-1 to design an orthogonal state based protocol (QAV-3), while the rest of the steps remain unchanged.
Step 3.2.1 V i generates l 2 Bell states |φ to be shared with voter V j =i and forms two ordered sequences of all the first qubits H ij = {h ij l } j =i and second qubits T ij = {t ij l } j =i with l = 0, 1, . . ., l 2 − 1.Similarly, all the set of voters i, j = 0, 1, . . ., n − 1 prepare the home and travel sequences H ij and T ij , respectively.All the voters V i prepare a random l-bit sequence K ij = {k ij l } j =i , where k ij l ∈ {0, 1}, to share the rest of the voters V j =i .
Step 3.2.2V i concatenates some Bell states to T ij and applies a permutation operator to the enlarged travel sequence T ij 1 before sending them to V j .V i reveals the correct order of sequence only after he receives an authenticated acknowledgment of the receipt of qubits from V j .
Step 3.2.3If the error rate in the eavesdropping checking is below the pre-determined threshold value, V j applies the unitary operation I, σ x , iσ y , and σ z to the sequence T ij in order to encode 00, 01, 10, and 11 from K ji , respectively.
Step 3.2.4V j sends the encoded sequence of travel qubits T ij to V i after concatenating some Bell states and applying a permutation operator.The correct order of travel qubits to perform eavesdropping checking and obtaining T ij is revealed by V i only after he receives an authenticated acknowledgment from V i .
Step 3.2.5 V i announces his random sequence K ij if they obtain error below the threshold value.V j reveals the permutation operation only after he gets to know K ij .Subsequently, he performs a Bell measurement on the pair of home and travel qubits from H ij and T ij and obtains the random sequence K ji sent by V j .The symmetric key between V i and V j is obtained as Another modification of QAV-1 allows semiquantum users, i.e., voters with limited quantum resources, to perform QAV.Specifically, a semiquantum or classical voter is defined as the one who can (1) measure the quantum state in the computational basis only, (2) prepare the quantum state in the computational basis only, and (3) do nothing and/or reflect a quantum state which is sent to him by a quantum user.The steps involved in semiquantum AV protocol (QAV-4) with classical voters inspired from semi-QKD protocol [50] can be described as follows: Step 4.2.1 CA generates l Bell states |φ to be shared with voters V i and V j =i .He forms two ordered sequences of all the first qubits F ij = {f ij l } j =i and second qubits S ij = {s ij l } j =i with l = 0, 1, . . ., l − 1.Finally, he sends sequences F ij and S ij to voters V i and V j , respectively.
Step 4.2.2V i prepares a random string R ij = {r ij l } j =i , where r ij l ∈ {0, 1}.He measures the qubits f ij l if r ij l = 0 and keeps it unchanged otherwise.He also notes the measurement outcomes in a string T ij = {t ij l } j =i ∀r ij l = 0 and prepares fresh qubits |t ij l , where t ij l ∈ {0, 1}.He reinserts |t ij l ∀r ij l = 0 in the remaining qubits of F ij and sends F ij to CA. Independently, V j adopts the same procedure to obtain S ij and then sends it to CA.
Step 4.2.3CA performs the Bell measurement on the respective pairs in sequences F ij and S ij and records C ij = {c ij l } j =i , where c ij l = 0 if the measurement outcome is |φ and c ij l = 1 otherwise.Finally, he announces C ij .Step 4.2.4V i and V j announce their random strings R ij and R ji , respectively.They obtain the error rate in cases r ij l = 1 = r ji l as CA would have announced c ij l = 0 ideally.If the error is below the threshold value, they obtain Kij and Kji (approximately of size l/4) as the subset of T ij and T ji for the cases when r ij l = 1 = r ji l , c ij l = 0.
Step 4.2.5 Ideally, Kij = Kji = K ij , otherwise V i and V j may perform post-processing of the key to obtain symmetric key.

B. Iterative QAV protocols
In such class of protocols, we will be using Bell states and their quantum correlations.We assume that we have a quantum voting network with a semi-honest central authority CA and n voters V i .

QAV-5: Bell state based iterative probabilistic QAV protocol
In fact, QAV-2 proposed earlier can be implemented in an iterative manner to give us a probabilistic outcome of the AV.Thus, the arrangement of voters has the same graph structure as in QAV-2.The steps involved in this protocol are as follows: Step 5.1-Step 5.7 CA performs QAV-2 with all the voters for l = 1.Thus, V n = 1 ⇔ R = 1 and leads to an inconclusive result otherwise.
All the parties repeat the protocol an arbitrary number of time l until they either get R = 1 or conclude with probability 1 − 2 −l that V n = 0. Though the scheme remains probabilistic as is QAV-2, but it requires n C 2 × l copies of Bell states which will be less than that in QAV-2 if R = 1 is obtained in l < l, where l is a constant number of Bell states used in QAV-2.

QAV-6: Bell state based iterative QAV protocol
Let us now present another protocol which where the arrangement of voters is in circular order as shown in Fig. 1  (b).Here, in each iteration the CA will generate one Bell state, keep one particle with himself while the other particle travels through each of the voters and finally comes back to CA.The main advantage of this scheme is that the voting process requires less than 1 + log 2 n copies of Bell states.The steps involved in the protocol (QAV-6) are as follows: Step 6.1 Same as Step 1.1 of QAV-1.
Step 6.2 CA generates a Bell state |φ .CA sends the second qubit of |φ to V 0 as travel qubits in a secure manner.
He keeps the first qubit as home qubits with himself.
Step 6.3After ensuring that there is no eavesdropping attempt, V 0 applies σ z operation to the travel qubit to veto the proposal and does nothing in case he supports the proposal.
Step 6.4 V 0 sends the encoded travel qubit to V 1 in a secure manner, who encodes his message in the same way as V 0 .
Voter V i ∀ 0 ≤ i ≤ n receives the travel qubits from V i−1 and sends it to V i+1 after applying σ z operation to veto the proposal.
Step 6.5 V n receives the travel qubits from V n−1 in a secure manner and encodes his vote.Finally, he sends the travel qubits to CA in a secure manner.
Step 6. 7 In case of an inconclusive outcome, CA repeats Steps 6.2-6.6 with the k voters applying unitary on the travel qubit to veto the proposal in the tth iteration.
In each iteration, if CA gets φ |φ = 0 in the measurement outcome he announces V n = 1, while φ |φ = 1 leads to an inconclusive outcome as 2 −t k is even (including zero).
Step 6.7 CA repeats Step 6.7 until he gets V n = 1 or gets V n = 0 conclusively.It should take at most 1 + log 2 n number of iterations to yield a conclusive outcome for n voters.

C. QAV-7: Deterministic QAV protocol
Finally, we propose a QAV protocol that can succeed with unit probability in a single iteration.This circular scheme (cf.Fig. 1 (b)) is based on mulitiparty densecoding [51].Here, every Voter V i is assigned a subgroup g i = {I, O i } of a group of operations G 2 m to encode his information, where V i applies O i to veto the proposal while does nothing otherwise.The group G 2 m = {I, σ x , iσ y , σ z } ⊗ log 2 m with at least 2 m elements is obtained from the modified Pauli group (an Abelian group under multiplication obtained by neglecting the global phase of the states post-operation).The 2 m elements of the group G 2 m generate quantum states mutually orthogonal to each other enabling it useful for multiparty densecoding (see [51] for detail).The subgroups assigned for encoding are pairwise disjoint A few examples of the operations {g i } i=0,1,...,n−1 for different values of n are given in Table I.In principle, the assignment of subgroups to voters for encoding can be performed randomly as distribution of secret index in [15], which forbids some participants with the help of CA to identify the voters vetoing the proposal.Thus, each voter knows only the subgroup assigned to him.
The steps involved in this protocol (QAV-7) are as follows: Table I: We present some examples of the quantum states and corresponding quantum operations required for QAV-7.

Number of voters Quantum state
Operation Oi of voters Vi used for vetoing Step 7.1 Same as Step 1.1 of QAV-1.
Step 7.3 CA prepares string of l qubits (l < m) of |ψ 0 to send to V 0 as travel qubits in a secure manner.He keeps the string of the rest of the m − l qubits as home qubits with himself.
Step 7.4 After ensuring that there is no eavesdropping attempt, Voter V 0 encodes his vote.Specifically, Voter V 0 applies operation O 0 on all the travel qubits to veto while does nothing to support the proposal.The operation of V 0 transforms the initial state |ψ in to |ψ 0 .
Step 7.5 Voter V 0 sends the l travel qubits of |ψ 0 to V 1 in a secure manner, who encodes his message using g 1 to transform the state to |ψ 1 .
Step 7.6 Voter V i ∀ 1 ≤ i ≤ n − 1 receives the travel qubits of |ψ i−1 from V i−1 and sends the travel qubits of |ψ i to V i+1 after encoding his message using g i .
Step 7.7 Voter V n receives the travel qubits of |ψ n−1 from V n−1 in a secure manner.He encodes his message using g n to obtain |ψ n .Finally, he sends the travel qubits to CA in a secure manner.
Step CA's announcement C n = 1 corresponds to the situation k = {0, n}, i.e., at least one of the voters has vetoed the proposal.On the other hand, CA's announcement C n = 0 corresponds to unanimity in the decision (all have either vetoed or not vetoed), i.e., k = {0, n}.Only the voters know their individual voting preferences, thus they can deduce whether the proposal is vetoed or not, i.e., V n = 0 or 1, respectively.

V. SECURITY AND EFFICIENCY ANALYSIS OF THE PROPOSED SCHEME
A QAV scheme is expected to satisfy a few criteria of security listed in Section II.Further, we may note that a QAV protocol is -secure if it is -indistinguishable from a perfectly secure (hypothetical) ideal QAV scheme following those listed conditions [52,53].In the following, we will explicitly show the security of our proposed schemes with regards to requirements for AV along these lines (which is summarized in Table II).

A. Eligibility
In all the protocols, we are using the scheme of quantum digital signatures for authentication of the voters irrespective of whether CA performs the authentication or the voters authenticate each other among themselves.In this way, only the eligible voters will be allowed to vote and thus the eligibility condition is satisfied for all the proposed protocols.

B. Privacy
An eavesdropper attempts to access the information a voter is transmitting to CA.Her endeavor would result in a message encoded (by voter V j ) joint state shared among CA and Eve (before a measurement performed by Eve and/or CA) which can be described as Table II: Comparison of the security of the proposed protocols with the existing schemes.The asterisk in the column for the correctness corresponds to probabilistic nature of the scheme.

Protocol Eligibility Privacy Binding Verifiability Correctness Robustness
where p 0 is the probability that V j supports the proposal.Eve will further discriminate ρ E j to identify the secret value of j.However, the legitimate parties, i.e., voters and CA, would desire to adopt quantum cryptography tools, such as decoy state technique, to obtain the joint state in ideal situation as which ensures that Eve has no information about the choice of the voter.Thus, -privacy of a QAV scheme can be defined in the information theoretic description of security [52,53] as min Here, we provide privacy of the voters for the proposed QAV schemes against some of the well-known individual attacks by an adversary as well as the collusion attacks by the legitimate parties.
To begin with, we consider the intercept and resend attack by a non-participant Eve.In the intercept and resend attack, Eve intercepts the travel particles from one legitimate user to another.Subsequently, Eve prepares a random state (known to him) and sends it to the party who was intended to receive the intercepted particles.For example, in QAV-2, Eve may perform this attack by intercepting the l copies of Bell state to be shared between all the pairs of voters by CA.She will be able to get the information about the shared symmetric keys used by the voter to cast their votes by sending the symmetric separable single qubit strings to both the voters.This will eventually give her access to all the secret information that voters were sharing.To prevent this attack, we can employ decoy qubit based eavesdropping checking (cf.Section II), e.g., using the BB84 states (|0 , |1 , |+ , |− ).Suppose l Bell states are to be securely distributed between a pair of voters by CA who inserts 2l decoy states randomly before sending.The pair of voters measure the 2l decoy qubits to obtain the error rate and attribute all these errors to the eavesdropping attempts.Since Eve is ignorant about the position of the decoy states as well as the choice of randomly used basis for preparation of the decoy states so the voters will detect the presence of Eve by comparison of the measurement outcomes with that of the prepared state.This allows the voters to obtain the bounds on the information accessible to Eve on the remaining l-bits key they obtain eventually.The probability to detect the presence of Eve is given by 1 − 1 4 l/2 .Similarly, in QAV-1, the decoy state based eavesdropping checking technique is effective to circumvent the intercept and resend attack as it is an integral part of the QKA/QKD protocols used in the generation of symmetric keys between the voters.Along the same lines, all the proposed protocols are free from the intercept and resend attack by using the decoy qubit based eavesdropping checking while transmission of the qubits between two parties.
Another type of attack strategy is entangle and measure attack.In such type of attacks, Eve entangles her ancilla qubit with the travel qubit and measures her ancilla afterwards to get the information transmitted.Specifically, Eve prepares an ancilla qubit in a superposition state as |q E = α|0 E + β|1 E and then entangles it with the travel qubit using the CNOT gate with control on the ancilla and target on the travel qubit.It can be observed that the use of decoy qubits prepared in the BB84 states (|0 , |1 , |+ , |− ) will result in the successful detection of Eve with success probability |β| 2 if Eve attacks the decoy states |0 and |1 while the state remains separable for the rest of the decoy states (|+ , |− ).Thus, the average probability of detecting Eve can be obtained as |β| 2 2 assuming that all decoy states are prepared with an equal probability.Notice that if Eve prepares ancilla with β → 0 then the detection probability of Eve will be vanishingly small as in that case Eve neither disturbs the decoy qubit nor gains any information.
Another significant attack is the man in the middle attack where Eve impersonates as a legitimate party.This attack can be prevented by the use of a secure authentication scheme [54][55][56] before sending of the actual sequence of particles.Further, we are using the quantum digital signatures which would protect us from this attack.
Further, in a participant attack, a user or a group of users will either try to get some information about the voting pattern of the voters or try to influence the result of the voting without being detected.In QAV-1, QAV-3 and QAV-4, every voter V i generates a l-bit symmetric key with the rest of the voters using a QKA/QKD protocol, which is followed by an application of some logical operations of those keys before broadcasting the result.Thus, it is not possible for any voter to get the information about the voting pattern/preference of the other voters from the announced information.Similarly, it is applicable to the rest of the protocols, i.e., QAV-2, QAV-5, QAV-6 and QAV-7.However, in the collusion attack, k < n voters out of the total n voters collude to acquire the inaccessible information about the voting preferences of the rest of the n − k voters and then try to change the outcome.In all of proposed protocols, we can see that it is not possible to violate the secrecy of the vote as well as the outcome of the voting process.For instance, QAV-7 is prone to the collusion attack by an arbitrary voter and CA as they know the choices by all voters in the end if the operations applied by the voters are public knowledge.Specifically, CA has the information of the final result after measurement and (all) the voter(s) have encoding operations, and thus together they have all the pieces required to get all the voting preferences, i.e., to identify the parties vetoing the proposal.Here, this possibility is circumvented as the disjoint subgroups are assigned to every voter for voting in a random manner with neither CA nor the voters aware of the encoding operations used by the rest of the voters.
We have shown here that the privacy of the votes can be accomplished against some of the popular outsider's and insider's attacks, but a more rigorous security proof against collective and coherent attacks will be performed in our future works.

C. Binding
In all the protocols proposed here, an outsider (or a participant other than the voter) cannot change the vote encoded by any voter, and the same is already established in the context of privacy against denial of service and disturbance attacks.Further, in the probabilistic and deterministic protocols (i.e., QAV-1-QAV-4 and QAV-7), even the voter cannot alter the vote as they only get one chance to encode it, but in the iterative protocols, a dishonest voter may change his vote in every iteration, e.g, in QAV-4-QAV-5.However, the voter's change of the vote in the successive iterations neither allows him access to the partial tally of the votes nor compromises the privacy of the other voters.Thus, a voter cannot take advantage of changing the vote in every iteration to get a favourable final outcome of his choice.

D. Correctness
The correctness of an -correct QAV scheme requires that the result bit is generated wrong with probability Pr[W i = 0 ∀i −→ V n = 1] ≤ .The success probability of probabilistic protocols is given by 1  2 l where l represents the number of bits used by each voter.So, probabilistic QAV protocols are -correct with ≥ 1 − 1 2 l .In comparison to the probabilistic protocols, the iterative and deterministic QAV protocols can be implemented with a relatively small value .

E. Verifiability
The AV scheme is -verifiable if every voter can confirm his vote with a probability of failing verifiability Pr[W i = j −→ V n = j⊕1] ≤ .Notice that a voter (say V i ) can verify his veto ideally with unit probability, while any other voter may independently have supported the proposal which reduces the verifiability of the scheme as the voters supporting the proposal with input W i = 0 would not be able to verify the outcome.Thus, as long as the scheme is c -correct it will lead to -verifiability ( > c ).In our case, a party who vetoed the proposal can verify the outcome with unit probability in case of iterative (QAV-6) and deterministic (QAV-7) schemes.However, in case of probabilistic schemes, he will be able to verify the result as long as the correctness is ensured.Further, in case when the parties support the proposal, it does not appear possible to ensure verifiability without disclosing individual choices.

F. Robustness
Decoherence is the major challenge in the implementation of quantum communication.In the absence of an adversary, an interaction of the qubits with the ambient environment is expected to reduce the correctness by leading to a wrong outcome.Any realistic physical implementation of the proposed protocols will always be noisy due to the presence of the surrounding environment.Further, the protocol will be practically useful only if it gives the correct result even in the presence of a limited amount of noise.Here, we will be comparing the feasibility of the proposed protocols under the presence of noise by considering that the noise affects the qubits only when they travel from one party to the other.Further, we assume that the qubits that do not travel are hardly affected by the noise.In quantum information theory, the effect of noise on the quantum state ρ i evolving to ρ f is described as an operator-sum representation in terms of Kraus operators as [40,57] where E i s are the Kraus operators with i E † i E i = I.To discuss the robustness of the proposed schemes, we study the effect of two of the most important noise channels, namely amplitude damping and phase damping, on the proposed protocols.The Kraus operators for amplitude damping are and those for phase damping are These operators can be substituted in Eq. ( 7) to give us the final state with η j as the damping parameter.Suppose an n qubit initial pure state ρ i = |Φ Φ| is used for the implementation of a protocol, with m (n − m) home (travel) qubits denoted by h (t), then the final state before measurement can be written as where E k ij are the Kraus opertors of amplitude or phase damping with k ∈ {AD, PD}.The effect of the noise can be quantified by a distance based measure, known as the square of fidelity (henceforth referred to as fidelity), given by where |Φ f represents the final state that the initial pure state |Φ should have been after performing all the encoding operations by every party in a decoherence free environment.In our case, we consider that all the encoding operations are equi-probable and hence calculate the average fidelity for each of the proposed QAV protocols.Before we proceed further, notice that the average fidelity quantifies the robustness of the scheme as the low fidelity corresponds to the wrong outcome.The QAV-1 protocol is dependent upon the choice of QKA/QKD protocol used for the initial key generation.Without loss of generality, we consider BB84 protocol in this case for the analysis.It involves the sending of BB84 states from one voter to the other voters for creating a l-bit keys between every pair of voters.The average fidelity for generation of l-bit keys for every pair of voters under amplitude damping noise is computed to be 1 l while under phase damping noise it is found to be 1 4 l 1 − η p + 3 l .Thus, the fidelity depends on the noise parameter values as well as the number of key bits required for working of the protocol as can be seen from Fig. 2 (a).Specifically, the protocol is robust for the small values of noise parameters (η p or η a ), and a higher value of noise reduces the fidelity significantly and thus rendering the protocol practically ineffective.Since QAV-1 is a probabilistic AV protocol and for l = 10 we get a conclusive outcome with probability 99.9%, which can be further improved by increasing the number of key bits l.However, with an increase in the key size the robustness decreases and thus a trade-off between correctness and robustness of the probabilistic QAV schemes is observed.Further, we can observe that the amplitude damping noise has a greater impact on the average fidelity in comparison to that for the phase damping noise due to the presence of fast decaying term −η a in the former case.Similarly, in QAV-2 protocol based on the Bell states shared among two voters, the average fidelity for generation of l-bit keys among every pair of voters under amplitude damping noise is 1 + 1 2 (η a − 2)η a l while under phase damping noise is (1 − ηp 2 ) l .Interestingly, as QAV-5 protocol is similar to QAV-2 (with differences in the encoding and measurement stages), the average fidelity is the same as that for QAV-2.Along the same lines, the average fidelity for QAV-3 (orthogonal state based protocol) under amplitude  8) key bits size.In (c), the smooth (blue) and red (dashed) lines (the cyan (dot-dashed) and magenta (dotted) lines) correspond to j as QAV-6 (QAV-7) with 4 voters.
damping noise is found to be (1 − ηa 2 ) l while under phase damping noise it is computed as (1 − ηp 2 ) l/2 for only even values of l.Further, average fidelity for QAV-4 (semi-quantum protocol) is obtained to be the same as QAV-2 as the communication complexity is same in both the schemes.Among these schemes, QAV-2 (and QAV-4 and QAV-5, too) is the least robust against noise (cf.Fig. 2 (b)).
We further obtain the average fidelity of the transmitted states in QAV-6 and QAV-7 implemented by the four voters with the help of CA as respectively.In QAV-6, one of the qubits of the Bell states is transmitted five times through the noisy environment.Therefore, the effect of amplitude damping is more severe than that of phase damping.In QAV-7 protocol, a deterministic scheme among the four voters with two travel qubits has twice more travel qubits than that in QAV-6.The expressions for average fidelity are along the expected lines with amplitude damping having more adverse effect.Fig. 2 (c) shows a comparison of average fidelity for QAV-6 and QAV-7 for the case of four voters.We can see that the robustness of the protocol is dependent upon the noise parameters.In the case of practical implementation, all the protocols may be observed robust up to moderate decoherence rates and the robustness decrease as the noise parameters increase.

G. Efficiency of the protocols
The performance of a quantum communication scheme can be quantified in terms of qubit efficiency, given by [58] where c is the number of classical bits transmitted, q is the minimum number of qubits required, while b is the additional classical bits of information required for secure transmission.It is to be noted here that we do not consider the classical bits exchanged during eavesdropping checking while computing η.Further, the number of qubits required can be written as q = Q+δt, where Q represents the total Q qubits used in the protocol, while t represents the number of travel qubits in the corresponding protocol.The factor of δ = 0 is decided to achieve the desired level of security of t travel qubits by using δt decoy qubits.In QAV protocols, c = 1 as we require only one bit of information V n after the completion of the protocol.Let us now compare the efficiency of the existing QAV protocols along with that of our proposed QAV protocols.
resources.In this study, we have proposed a number of quantum anonymous veto protocols based on various degrees of available quantum resources.In the present work, we have classified the protocols based on the probabilistic, iterative and deterministic approaches in order to accomplish the task and arrive at the desired outcome.We have further explored the intrinsic connections between DC-net and AV-nets.We have performed a security and efficiency analysis of the proposed protocols and established the proposed schemes are secure against some of the widely studied attacks.We have also performed a comparative analysis of the performance of the existing QAV schemes.In addition, we have examined the robustness of the proposed protocols under realistic physical systems, i.e., the effect of noise on the implementation.The analysis shows that the proposed schemes are robust in the presence of weak noise.Our comparison of the performance of the proposed schemes establishes that the deterministic QAV scheme (QAV-7) is an optimal protocol to accomplish the desired task.A bipartite entanglement QAV scheme (QAV-6) is also observed to be more efficient and robust than all the existing iterative and probabilistic QAV schemes.However, QAV6 does not satisfy the requirement of binding.Further, all the protocol proposed here can be experimentally implemented using the currently available technology.However, a particular laboratory or a company may have its own restrictions.For example, a laboratory may have capacity to produce the single qubit states only.Thus, in short, the set of protocols proposed here and the comparison tables reported here leads to an opportunity to different organizations having varied expertise and capability to implement QAV based on the available resources and the exact requirement(s).
The recent application of AV schemes to perform sealed bid auction [36] by performing AV for each bit of the placed bids starting from the most significant bit to the least significant bit will hopefully encourage the utilization of the proposed schemes for other socioeconomic tasks of relevance.We hope that the set of proposed QAV schemes will motivate experimentalists to realize the protocols and find them useful in performing veto and auction in the real life situations.

Figure 1 :
Figure 1: Schematic arrangement of voters in a quantum voting network with n voters in a (a) complete graph and (b) circular structures.A detailed description is given in the text.

7 . 8
CA measures |ψ n in the same basis he has prepared the initial state |ψ in .If ψ in |ψ n = 0, CA announces C n = 1 while he announces C n = 0 for the measurement outcome ψ in |ψ n = 1.