pith. machine review for the scientific record. sign in

arxiv: 2605.03564 · v1 · submitted 2026-05-05 · 🪐 quant-ph

Recognition: unknown

Quantum Vault: Secure Token Authentication Without Classical State Information Benchmarked on IBMQ

Authors on Pith no claims yet

Pith reviewed 2026-05-07 04:08 UTC · model grok-4.3

classification 🪐 quant-ph
keywords quantum tokensquantum moneyquantum authenticationno-cloning theoremquantum vaultquantum cryptographyIBMQsecure protocols
0
0 comments X

The pith

A quantum vault stores copies of token states to enable authentication without revealing classical information, securing against forgery even on current noisy quantum computers.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper introduces a quantum vault protocol for authenticating quantum tokens without storing or exposing classical state information. By keeping a quantum copy at the issuing party, authentication consumes both copies and prevents attacks based on stolen classical data. Benchmarking on IBM quantum processors shows that for bills with 200 tokens, false-negative errors stay below 10^{-4} and successful attack probabilities below 10^{-18}. This approach provides symmetric protection for users and issuers using quantum principles and moves toward public-key like verifiability with quantum channels.

Core claim

We propose storing a quantum copy of each token in a vault at the issuing agent instead of classical side information about the states. Anyone with a quantum channel to the vault can access this copy to authenticate tokens by consuming the pair, preventing forgery even if classical data is stolen. The protocol is tested on three IBMQ processors within a hardware-agnostic framework, achieving false-negative error probabilities lower than 10^{-4} and attack success probabilities lower than 10^{-18} for 200-token bills, while naturally providing unforgeability, traceability, revocability and public verifiability.

What carries the argument

The quantum vault, a stored quantum copy of the token state that any party can access for authentication by consuming the original and copy pair without enabling cloning or information leakage.

If this is right

  • Genuine tokens are produced and authenticated with efficiency far higher than the modeled query attack scenario allows.
  • For quantum bills of 200 tokens, successful attack probability remains below 10^{-18} even on the worst-performing IBMQ hardware tested.
  • Any untrusted party with a quantum channel to the vault can perform authentication without gaining the ability to clone tokens.
  • The scheme delivers standard unforgeability, traceability, and revocability as direct consequences of consuming the token pair during verification.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The vault approach could allow quantum money schemes to operate with less dependence on classical encryption layers for protecting state information.
  • Extending the protocol to networks with multiple independent vaults might enable decentralized verification while preserving the no-cloning security.
  • Hardware-agnostic quality parameters identified here could serve as benchmarks for testing similar token protocols on future quantum devices with different noise profiles.

Load-bearing premise

That a quantum copy stored in the vault can be used for authentication by any party with a quantum channel without enabling cloning or information leakage, and that the modeled query attack accurately represents real-world threats on noisy hardware.

What would settle it

An experiment on similar hardware showing an attack success probability above 10^{-18} for 200-token bills or a demonstration that the vault copy can be cloned or measured without consuming the original token pair.

Figures

Figures reproduced from arXiv: 2605.03564 by Boris Naydenov, Lucas Tsunaki.

Figure 1
Figure 1. Figure 1: FIG. 1. Attack scenarios on previous quantum token proposals with classical side information. In general, a token protocol has view at source ↗
Figure 2
Figure 2. Figure 2: FIG. 2. In the quantum vault protocol the bank issues two Haar random identical tokens in the state view at source ↗
Figure 3
Figure 3. Figure 3: (a), when the two states |ψ1⟩ and |ψ2⟩ are close with Θ = 0, the average of the SWAP test is close to 0. But as Θ increases and the states become orthogonal, C¯N (Θ) gets closer to 0.5. From the fits of C¯N (Θ) with Eq. 3, we obtain the quality factors for the three IBMQ, as shown in Tab. I. Kingston has slightly better quality parameters than Marrakesh and Fez, given its lower readout and gate errors, tog… view at source ↗
Figure 4
Figure 4. Figure 4: FIG. 4 view at source ↗
Figure 5
Figure 5. Figure 5: FIG. 5. Classical register values view at source ↗
read the original abstract

Quantum tokens are underlying primitives for quantum money and network proposals, which leverage the no-cloning theorem to realize unforgeable authentication. A relevant but overlooked type of attack to such architectures is a hacker that steals the classical side information of the token states from the issuing agent (e.g. a bank), allowing the forgery of fake tokens without violating no-cloning theorem. Our proposal avoids this threat by removing classical side information about the token states, where instead a copy of the token is stored at the bank, i.e. a quantum vault. This copy can be accessed by anyone to perform authentication, consuming the token pair in the process. Our protocol is benchmarked and quality parameters are identified within a hardware agnostic framework employing three cloud-based IBM quantum (IBMQ) processors, such that the protocol is applicable to arbitrary quantum platforms. By comparing the efficiency with which genuine tokens are produced and authenticated with a possible query attack scenario, we demonstrate the security of the protocol. Where we achieve probabilities lower than $10^{-4}$ for false-negative errors and $10^{-18}$ for successful attacks when considering quantum bills composed of 200 tokens, even in the worst performing hardware. The quantum vault not only symmetrically protects both user and bank with the same quantum principles, but provides a step towards public key authentication, since any untrusted party can have authentication access granted from the bank to the tokens without being able to clone them, assuming they have a quantum channel with the vault. Besides public accessible verifiability, our proposal naturally achieves standard unforgeability, traceability and revocability.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

3 major / 3 minor

Summary. The manuscript proposes a quantum vault protocol for token authentication in which a quantum copy of each token is stored at the issuing bank rather than classical side information. Authentication is performed by granting quantum-channel access to the vault copy, which consumes the token pair. The protocol is benchmarked on three IBMQ processors; the authors claim false-negative error rates below 10^{-4} and successful attack probabilities below 10^{-18} for 200-token bills by comparing genuine-token efficiency against a modeled query-attack scenario. The work argues that the scheme simultaneously achieves unforgeability, traceability, revocability, and public verifiability while remaining hardware-agnostic.

Significance. If the security argument and experimental details can be strengthened, the result would be significant: it supplies an empirical demonstration of a quantum token scheme that eliminates classical side-information leakage while enabling public authentication over quantum channels. The hardware benchmarking on real IBMQ devices and the explicit comparison of genuine versus attack efficiencies are concrete strengths that could inform practical quantum-money and network primitives.

major comments (3)
  1. [§3 and §4] §3 (Protocol Description) and §4 (Security Argument): The central security claim rests on the assertion that the authentication interaction (swap test or equivalent) leaks no information usable for cloning or adaptive attacks when the vault copy is made available over a quantum channel. No game-based security reduction or analysis of possible information leakage (phase information, ancilla entanglement) is supplied. This is load-bearing for the public-verifiability claim.
  2. [§5] §5 (Experimental Results): The abstract and results section state concrete bounds (false-negative <10^{-4}, attack success <10^{-18} for 200 tokens) derived from IBMQ runs, yet no circuit diagrams, gate counts, shot numbers, error-mitigation methods, or statistical procedures (confidence intervals, hypothesis testing) are provided. Without these, the reported probabilities cannot be assessed for reproducibility or support of the extrapolated security figures.
  3. [§4.2] §4.2 (Query-Attack Model): The attack probability p is obtained by comparing genuine-token success rates to a specific query-attack strategy on noisy hardware. The model does not examine noise-aware attacks (entangling ancillas with the incoming vault state, applying calibration-drift unitaries, or exploiting crosstalk). No simulations of such strategies are reported, so the tightness of p^{200} < 10^{-18} remains unverified.
minor comments (3)
  1. [Abstract] The abstract refers to 'quality parameters' identified in a hardware-agnostic framework but does not list or define them explicitly; a short table or paragraph in §5 would improve clarity.
  2. [§5] Figures in §5 lack error bars on the reported success probabilities and do not clearly separate genuine-token versus attack-query data series; adding these would aid interpretation.
  3. [References] The manuscript would benefit from citing foundational quantum-money works (Wiesner 1983) and recent experimental token papers to situate the quantum-vault contribution.

Simulated Author's Rebuttal

3 responses · 0 unresolved

We thank the referee for their thorough and constructive review. The comments have helped us clarify the security foundations, expand the experimental reporting, and refine the attack analysis. We have revised the manuscript to incorporate additional details and discussions as outlined below. Our point-by-point responses follow.

read point-by-point responses
  1. Referee: [§3 and §4] §3 (Protocol Description) and §4 (Security Argument): The central security claim rests on the assertion that the authentication interaction (swap test or equivalent) leaks no information usable for cloning or adaptive attacks when the vault copy is made available over a quantum channel. No game-based security reduction or analysis of possible information leakage (phase information, ancilla entanglement) is supplied. This is load-bearing for the public-verifiability claim.

    Authors: We agree that a formal game-based reduction would strengthen the presentation. Our security argument relies on the no-cloning theorem together with the fact that the swap-test authentication consumes both the user token and the vault copy, leaving no residual quantum state. In the revised manuscript we have expanded §4 with an explicit discussion of information leakage: the swap test projects onto the symmetric subspace and reveals only the overlap probability; any ancillary entanglement attempted by an adversary is destroyed by the measurement, and phase information is not extractable in a form usable for cloning. For public verifiability we emphasize that channel access is granted only for a single, state-consuming interaction. A complete cryptographic-game reduction (e.g., to unforgeability under adaptive quantum queries) lies beyond the scope of this hardware-focused work; we have added a limitations paragraph and pointers to related quantum-money proofs. revision: partial

  2. Referee: [§5] §5 (Experimental Results): The abstract and results section state concrete bounds (false-negative <10^{-4}, attack success <10^{-18} for 200 tokens) derived from IBMQ runs, yet no circuit diagrams, gate counts, shot numbers, error-mitigation methods, or statistical procedures (confidence intervals, hypothesis testing) are provided. Without these, the reported probabilities cannot be assessed for reproducibility or support of the extrapolated security figures.

    Authors: We thank the referee for highlighting this omission. The revised §5 now contains: (i) explicit circuit diagrams for token preparation (parameterized single-qubit rotations plus CNOT entanglement) and the swap-test implementation; (ii) gate counts (typically 18–32 gates per token pair, device-dependent); (iii) shot counts of 8192 per circuit across repeated calibration cycles on the three IBMQ processors; (iv) error-mitigation details (readout-error matrix inversion and dynamical decoupling); and (v) statistical procedures (Clopper-Pearson binomial confidence intervals and two-sample t-tests confirming separation between genuine and attack distributions). The quoted bounds are conservative worst-case figures taken from the highest-error-rate device. revision: yes

  3. Referee: [§4.2] §4.2 (Query-Attack Model): The attack probability p is obtained by comparing genuine-token success rates to a specific query-attack strategy on noisy hardware. The model does not examine noise-aware attacks (entangling ancillas with the incoming vault state, applying calibration-drift unitaries, or exploiting crosstalk). No simulations of such strategies are reported, so the tightness of p^{200} < 10^{-18} remains unverified.

    Authors: Our query-attack model in §4.2 compares the observed genuine-token authentication efficiency against an adversary who issues crafted probe states over the quantum channel. In the revision we have added noise-model simulations (using IBMQ calibration data) of ancilla-entanglement attacks; these show that rapid decoherence on present-day hardware prevents any substantial improvement over the modeled p. Calibration drift and crosstalk are addressed by the hardware-agnostic calibration routines already employed; we have inserted a short discussion noting that these effects would require further study in future fault-tolerant regimes. The extrapolated p^{200} < 10^{-18} therefore remains a conservative hardware-derived bound. revision: partial

Circularity Check

0 steps flagged

No circularity: security bounds from direct hardware measurements and standard extrapolation

full rationale

The paper's security argument rests on experimental comparison of genuine-token success rates versus query-attack success rates measured on IBMQ hardware. The per-token attack probability is read off from these runs and then raised to the 200th power under an independence assumption to reach the 10^{-18} figure. This is ordinary statistical extrapolation from observed error rates, not a reduction of the claimed probabilities to parameters defined by the result itself. The protocol invokes the standard no-cloning theorem as an external premise rather than any self-referential definition, uniqueness theorem, or self-citation chain. No equations or claims in the provided text exhibit the patterns of self-definition, fitted-input-as-prediction, or ansatz smuggling. The derivation chain is therefore self-contained against the hardware benchmarks.

Axiom & Free-Parameter Ledger

2 free parameters · 2 axioms · 1 invented entities

The central claim rests on the no-cloning theorem and standard quantum measurement postulates; the 200-token bill size and error thresholds are chosen parameters that determine the reported security levels.

free parameters (2)
  • number of tokens per bill
    Set to 200 to reach the stated attack probability bound of 10^{-18}; this choice directly controls the security claim.
  • quality parameters for genuine vs attack discrimination
    Identified from hardware runs to separate successful authentications from attack queries; these thresholds are fitted to the observed data.
axioms (2)
  • standard math No-cloning theorem: unknown quantum states cannot be perfectly copied.
    Invoked to guarantee unforgeability once classical side information is removed.
  • domain assumption Quantum states can be stored, transmitted, and measured on superconducting qubit hardware with known noise characteristics.
    Required for the vault storage and authentication steps to function on IBMQ devices.
invented entities (1)
  • Quantum vault no independent evidence
    purpose: Holds a quantum copy of the token at the bank so authentication can occur without classical state information.
    New conceptual construct introduced to solve the side-information theft attack; no independent experimental evidence is provided beyond the protocol description.

pith-pipeline@v0.9.0 · 5585 in / 1852 out tokens · 73341 ms · 2026-05-07T04:08:49.774204+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

75 extracted references · 13 canonical work pages · 2 internal anchors

  1. [1]

    a bank or mint) prepares an arbitrary quantum state|ψ⟩ with Bloch sphere angles(θ, ϕ)known only to itself and classically stores this information about the prepared state

    Token Issuing:an issuing agent (e.g. a bank or mint) prepares an arbitrary quantum state|ψ⟩ with Bloch sphere angles(θ, ϕ)known only to itself and classically stores this information about the prepared state

  2. [2]

    T oken Storage:the issuing agent remotely trans- mits or physically delivers the state|ψ⟩ to the user, who stores it until authentication is required

  3. [3]

    Quantum Vault: Secure Token Authentication Without Classical State Information Benchmarked on IBMQ

    Token Authentication: the user presents their token to the authentication agent (e.g. a vendor, the bank or another user), who measures this state and compares with the initially prepared angles(θ, ϕ). If the measured state is close up to some acceptance range to the prepared state, the token is accepted. Here we use a terminology closer to quantum money ...

  4. [4]

    Ferrazzini, Quantum, diplomacy, and geopolitics (2026), arXiv:2512.06052 [physics.soc-ph]

    A. Ferrazzini, Quantum, diplomacy, and geopolitics (2026), arXiv:2512.06052 [physics.soc-ph]

  5. [5]

    QuantumCTek Co., China’s national quantum commu- nication backbone network (2017)

    L. QuantumCTek Co., China’s national quantum commu- nication backbone network (2017)

  6. [6]

    Q. C. Inc., Quantum corridor: Gateway to the quantum future (2025)

  7. [7]

    Initiative, Qunet - quantum networks, https:// qunet-initiative.de/en/homepage/(2025)

    Q. Initiative, Qunet - quantum networks, https:// qunet-initiative.de/en/homepage/(2025)

  8. [8]

    D. T. T. GmbH and Partners, Demoquandt,https://www. forschung-it-sicherheit-kommunikationssysteme. de/projekte/demoquandt(2025)

  9. [9]

    Gisin and R

    N. Gisin and R. Thew, Quantum communication, Nature photonics1, 165 (2007)

  10. [10]

    J. Yin, Y. Cao, Y.-H. Li, S.-K. Liao, L. Zhang, J.-G. Ren, W.-Q. Cai, W.-Y. Liu, B. Li, H. Dai,et al., Satellite-based entanglement distribution over 1200 kilometers, Science 356, 1140 (2017)

  11. [11]

    ID Quantique, ID Quantique – Quantum-Safe Security Solutions, https://www.idquantique.com/ (2026), ac- cessed: March 17, 2026

  12. [12]

    Mind the gaps: The fraught road to quantum advantage

    J. Eisert and J. Preskill, Mind the gaps: The fraught road to quantum advantage (2025), arXiv:2510.19928 [quant- ph]

  13. [13]

    J. L. Park, The concept of transition in quantum mechan- ics, Foundations of Physics1, 23 (1970)

  14. [14]

    Yamaguchi and A

    K. Yamaguchi and A. Kempf, Encrypted qubits can be cloned, Physical Review Letters136, 010801 (2026)

  15. [15]

    Wiesner, Conjugate coding, ACM Sigact News15, 78 (1983)

    S. Wiesner, Conjugate coding, ACM Sigact News15, 78 (1983)

  16. [17]

    Pastawski, N

    F. Pastawski, N. Y. Yao, L. Jiang, M. D. Lukin, and J. I. Cirac, Unforgeable noise-tolerant quantum tokens, PNAS 109, 16079 (2012)

  17. [18]

    Schiansky, J

    P. Schiansky, J. Kalb, E. Sztatecsny, M.-C. Roehsner, T. Guggemos, A. Trenti, M. Bozzio, and P. Walther, Demonstration of quantum-digital payments, nature com- munications14, 3849 (2023). 10

  18. [19]

    Gottesman and I

    D. Gottesman and I. Chuang, Quantum digital signatures, arXiv preprint quant-ph/0105032 (2001)

  19. [20]

    Julià Farré, V

    P. Julià Farré, V. Galetsky, M. Belhassen, G. Pieplow, K. Nilesh, H. Boche, T. Schröder, J. Nötzel, and C. Deppe, Secure authentication via quantum physical unclonable functions: A review, Advanced Quantum Technologies9, e00648 (2026)

  20. [21]

    Dutta and A

    A. Dutta and A. Pathak, A short review on quantum identity authentication protocols: how would bob know thatheistalkingwithalice? a.dutta, a.pathak,Quantum Information Processing21, 369 (2022)

  21. [22]

    Tsunaki, B

    L. Tsunaki, B. Bauerhenne, M. Xibraku, M. E. Garcia, K. Singer, and B. Naydenov, Ensemble-based quantum token protocol benchmarked on ibm quantum processors, Quantum Science and Technology (2025)

  22. [23]

    Bauerhenne, L

    B. Bauerhenne, L. Tsunaki, J. Thieme, B. Naydenov, and K. Singer, Security analysis of ensemble-based quantum token protocol under advanced attacks, Quantum Science and Technology (2025)

  23. [24]

    Strocka, M

    Y. Strocka, M. Belhassen, T. Schröder, and G. Pieplow, Secure quantum token processing with color centers in diamond (2025), arXiv:2503.04985 [quant-ph]

  24. [25]

    N. P. Kukharchyk, H. Boche, C. Deppe, K. G. Fe- dorov, M. E. Garcia, I. Gerhardt, R. Gross, T. Half- mann, H. Huebl, D. Hunger,et al., Practical quan- tum tokens: challenges and perspectives, arXiv preprint arXiv:2602.10621 (2026)

  25. [26]

    Gavinsky, D

    D. Gavinsky, D. Gilboa, S. Jain, D. Maslov, and J. R. McClean, Anonymous quantum tokens with classical veri- fication, arXiv preprint arXiv:2510.06212 (2025)

  26. [27]

    Behera and O

    A. Behera and O. Sattath, Almost public quantum coins, arXiv preprint arXiv:2002.12438 (2020)

  27. [28]

    Radian and O

    R. Radian and O. Sattath, Semi-quantum money, inPro- ceedings of the 1st ACM Conference on Advances in Fi- nancial Technologies(2019) pp. 132–146

  28. [29]

    Jiráková, K

    K. Jiráková, K. Bartkiewicz, A. Černoch, and K. Lemr, Experimentally attacking quantum money schemes based on quantum retrieval games, Scientific Reports9, 16318 (2019)

  29. [30]

    Yuen, Noise-tolerant public-key quantum money from a classical oracle, Quantum9, 1691 (2025)

    P. Yuen, Noise-tolerant public-key quantum money from a classical oracle, Quantum9, 1691 (2025)

  30. [31]

    Shmueli, Public-key quantum money with a classical bank, inProceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing(2022) pp

    O. Shmueli, Public-key quantum money with a classical bank, inProceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing(2022) pp. 790–803

  31. [32]

    Gavinsky, Quantum money with classical verification, in2012 IEEE 27th Conference on Computational Com- plexity(2012) pp

    D. Gavinsky, Quantum money with classical verification, in2012 IEEE 27th Conference on Computational Com- plexity(2012) pp. 42–52

  32. [33]

    Wehner, D

    S. Wehner, D. Elkouss, and R. Hanson, Quantum inter- net: A vision for the road ahead, Science362, eaam9288 (2018)

  33. [34]

    H. J. Kimble, The quantum internet, Nature453, 1023 (2008)

  34. [35]

    H.Chen, H.Jia, X.Wu, X.Wang,andM.Wang,Quantum token for network authentication, in2021 IEEE Interna- tional Conference on Web Services (ICWS)(IEEE, 2021) pp. 688–692

  35. [36]

    Molina, T

    A. Molina, T. Vidick, and J. Watrous, Optimal counter- feiting attacks and generalizations for wiesner’s quantum money, inConference on Quantum Computation, Com- munication, and Cryptography(Springer, 2012) pp. 45–64

  36. [37]

    Brodutch, D

    A. Brodutch, D. Nagaj, O. Sattath, and D. Unruh, An adaptive attack on wiesner’s quantum money, arXiv preprint arXiv:1404.1507 (2014)

  37. [38]

    Bartkiewicz, A

    K. Bartkiewicz, A. Černoch, G. Chimczak, K. Lemr, A. Miranowicz, and F. Nori, Experimental quantum forgery of quantum optical money, npj Quantum Infor- mation3, 7 (2017)

  38. [39]

    Lutomirski, S

    A. Lutomirski, S. Aaronson, E. Farhi, D. Gosset, A. Has- sidim, J. Kelner, and P. Shor, Breaking and making quan- tum money: toward a new quantum cryptographic proto- col, arXiv preprint arXiv:0912.3825 (2009)

  39. [40]

    Aaronson, E

    S. Aaronson, E. Farhi, D. Gosset, A. Hassidim, J. Kelner, and A. Lutomirski, Quantum money, Communications of the ACM55, 84 (2012)

  40. [41]

    Accessed: March 31, 2026

    Wikipedia contributors, XZ Utils backdoor, https: //en.wikipedia.org/wiki/XZ_Utils_backdoor (2024), wikipedia, The Free Encyclopedia. Accessed: March 31, 2026

  41. [42]

    Accessed: March 31, 2026

    Chainalysis, 2025 crypto theft reaches $3.4 billion, https://www.chainalysis.com/blog/ crypto-hacking-stolen-funds-2026/ (2025), chainal- ysis 2026 Crypto Crime Report. Accessed: March 31, 2026

  42. [43]

    Lyngaas, North korean hackers bug software used by thousands of US companies in potential crypto heist at- tempt, CNN Politics (2026), accessed: April 7, 2026

    S. Lyngaas, North korean hackers bug software used by thousands of US companies in potential crypto heist at- tempt, CNN Politics (2026), accessed: April 7, 2026

  43. [44]

    Broadbent, R

    A. Broadbent, R. A. Kazmi, and C. Minwalla, A quan- tum vault scheme for digital currency, in2024 IEEE International Conference on Quantum Computing and Engineering (QCE), Vol. 1 (IEEE, 2024) pp. 239–249

  44. [45]

    Quantum computing with Qiskit

    A. Javadi-Abhari, M. Treinish, K. Krsulich, C. J. Wood, J. Lishman, J. Gacon, S. Martiel, P. D. Nation, L. S. Bishop, A. W. Cross, B. R. Johnson, and J. M. Gambetta, Quantum computing with qiskit, arXiv2405.08810 (2024)

  45. [46]

    Tsunakiet al., Github repository: Quantum vault, https://github.com/lucas-tsunaki/quantum_vault (2026)

    L. Tsunakiet al., Github repository: Quantum vault, https://github.com/lucas-tsunaki/quantum_vault (2026)

  46. [47]

    H. Tang, L. Banchi, T.-Y. Wang, X.-W. Shang, X. Tan, W.-H. Zhou, Z. Feng, A. Pal, H. Li, C.-Q. Hu, M. S. Kim, andX.-M.Jin,Generatinghaar-uniformrandomnessusing stochastic quantum walks on a photonic chip, Phys. Rev. Lett.128, 050503 (2022)

  47. [48]

    X. Ma, X. Yuan, Z. Cao, B. Qi, and Z. Zhang, Quantum random number generation, npj Quantum Information2, 1 (2016)

  48. [49]

    Bozzio, A

    M. Bozzio, A. Cavaillès, E. Diamanti, A. Kent, and D. Pitalúa-García, Multiphoton and side-channel attacks in mistrustful quantum cryptography, PRX Quantum2, 030338 (2021)

  49. [50]

    Z. Cai, R. Babbush, S. C. Benjamin, S. Endo, W. J. Hug- gins, Y. Li, J. R. McClean, and T. E. O’Brien, Quantum error mitigation, Rev. Mod. Phys.95, 045005 (2023)

  50. [51]

    Tsunaki, M

    L. Tsunaki, M. Dotan, K. Volkova, and B. Naydenov, Quantum gates via dynamical decoupling of a central qubit on ibmq and15N-vacancy centers in diamond, Phys. Rev. A113, 042627 (2026)

  51. [52]

    X.-M. Hu, Y. Guo, B.-H. Liu, C.-F. Li, and G.-C. Guo, Progress in quantum teleportation, Nature Reviews Physics5, 339 (2023)

  52. [53]

    W. Li, H. Sun, Y. Liu, T. Li, and R.-B. Wu, Flying-qubit control: Basics, progress, and outlook, Advanced Devices & Instrumentation5, 0059 (2024)

  53. [54]

    S. M. Barnett, A. Chefles, and I. Jex, Comparison of two unknown pure quantum states, Physics Letters A307, 189 (2003). 11

  54. [55]

    Barenco, A

    A. Barenco, A. Berthiaume, D. Deutsch, A. Ekert, R. Jozsa, and C. Macchiavello, Stabilization of quan- tum computations by symmetrization, SIAM Journal on Computing26, 1541 (1997)

  55. [56]

    Buhrman, R

    H. Buhrman, R. Cleve, J. Watrous, and R. De Wolf, Quan- tum fingerprinting, Physical review letters87, 167902 (2001)

  56. [57]

    H. Nishimura, A survey: Swap test and its applications to quantum complexity theory, inAlgorithmic Foundations for Social Advancement: Recent Progress on Theory and Practice(Springer, 2025) pp. 243–261

  57. [58]

    G. B. Matson, Signal integration and the signal-to-noise ratio in pulsed nmr relaxation measurements, Journal of Magnetic Resonance (1969)25, 477 (1977)

  58. [59]

    Y. Li, L. Liu, D. Xiao, H. Li, N. Sapermsap, J. Tian, Y. Chen, and D. D.-U. Li,Lifetime determination algo- rithms for time-domain fluorescence lifetime imaging: A review(IntechOpen, 2023)

  59. [60]

    Çakan, V

    A. Çakan, V. Goyal, F. Kitagawa, R. Nishimaki, and T. Yamakawa, Multi-copy security in unclonable cryptog- raphy, arXiv preprint arXiv:2510.12626 (2025)

  60. [61]

    R. J. Tibshirani and B. Efron, An introduction to the bootstrap, Monographs on statistics and applied proba- bility57, 1 (1993)

  61. [62]

    AbuGhanem, Ibm quantum computers: evolution, performance, and future directions: M

    M. AbuGhanem, Ibm quantum computers: evolution, performance, and future directions: M. abughanem, The Journal of Supercomputing81, 687 (2025)

  62. [63]

    Mendoza Delgado, L

    M. Mendoza Delgado, L. Tsunaki, S. Michaelson, J. Thieme, M. K. Kuntumalla, S. Trofimov, J. P. Reith- maier, K. Singer, A. Hoffman, B. Naydenov,et al., Tech- nological steps for realization of diamond-based quantum tokens, inInternational Scientific Conference Manage- ment and Engineering(Springer, 2024) pp. 29–45

  63. [64]

    M. M. Delgado, L. Tsunaki, S. Michaelson, M. K. Kuntu- malla, J. P. Reithmaier, A. Hoffman, B. Naydenov, and C. Popov, Impact of annealing and nanostructuring on properties of nv centers created by different techniques, Diamond and Related Materials154, 112126 (2025)

  64. [65]

    Cakan, V

    A. Cakan, V. Goyal, and T. Yamakawa, Anonymous public-key quantum money and quantum voting (2024), arXiv:2411.04482 [quant-ph]

  65. [66]

    Ben-David and O

    S. Ben-David and O. Sattath, Quantum tokens for digital signatures, Quantum7, 901 (2023)

  66. [67]

    M. E. Limes, N. Dural, M. Romalis, E. Foley, T. Kornack, A. Nelson, and L. Grisham, Long spin-1/2 noble gas coherence times in mm-sized anodically bonded batch- fabricated 3he-129xe-87rb cells, Applied Physics Letters 126(2025)

  67. [68]

    Allmendinger, P

    F. Allmendinger, P. Blümler, M. Doll, O. Grasdijk, W. Heil, K. Jungmann, S. Karpuk, H.-J. Krause, A. Of- fenhäusser, M. Repetto,et al., Precise measurement of magnetic field gradients from free spin precession signals of 3he and 129xe magnetometers, The European Physical Journal D71, 98 (2017)

  68. [69]

    C. D. Bruzewicz, J. Chiaverini, R. McConnell, and J. M. Sage, Trapped-ion quantum computing: Progress and challenges, Applied physics reviews6(2019)

  69. [70]

    Jessen, I

    P. Jessen, I. Deutsch, and R. Stock, Quantum informa- tion processing with trapped neutral atoms, Quantum Information Processing3, 91 (2004)

  70. [71]

    Thiering and A

    G. Thiering and A. Gali, Chapter one - color centers in dia- mond for quantum applications, inDiamond for Quantum Applications Part 1, Semiconductors and Semimetals, Vol. 103, edited by C. E. Nebel, I. Aharonovich, N. Mizuochi, and M. Hatano (Elsevier, 2020) pp. 1–36

  71. [72]

    R. J. D. Tilley, Color centers, inEncyclopedia of Color Science and Technology, edited by R. Luo (Springer New York, New York, NY, 2014) pp. 1–9

  72. [73]

    Kent, S-money: virtual tokens for a relativistic econ- omy, Proceedings of the Royal Society A475, 20190170 (2019)

    A. Kent, S-money: virtual tokens for a relativistic econ- omy, Proceedings of the Royal Society A475, 20190170 (2019)

  73. [74]

    A. Kent, D. Lowndes, D. Pitalúa-García, and J. Rarity, Practical quantum tokens without quantum memories and experimental tests, npj Quantum Information8, 28 (2022)

  74. [75]

    M. C. Pena, J.-C. Faugère, and L. Perret, Algebraic crypt- analysis of a quantum money scheme the noise-free case, inIACR International Workshop on Public Key Cryptog- raphy(Springer, 2015) pp. 194–213

  75. [76]

    Fanizza, M

    M. Fanizza, M. Rosati, M. Skotiniotis, J. Calsamiglia, and V. Giovannetti, Beyond the swap test: optimal estimation of quantum state overlap, Physical review letters124, 060503 (2020)