Counterfactual communication without a trace in the transmission channel
Abstract
We report an experimental realization of a modified counterfactual communication protocol that eliminates the dominant environmental trace left by photons passing through the transmission channel. Compared to Wheeler’s criterion for inferring past particle paths, as used in prior protocols, our trace criterion provide stronger support for the claim of the counterfactuality of the communication. We verify the lack of trace left by transmitted photons via tagging the propagation arms of an interferometric device by distinct frequency-shifts and finding that the collected photons have no frequency shift which corresponds to the transmission channel. As a proof of principle, we counterfactually transfer a quick response code image with sufficient fidelity to be scanned with a cell phone.
According to classical physics, information must be transferred from one site to another by a local carrier along a continuous path. The carrier might be a messenger, an electric pulse in a wire, or the photons of a cellular phone communication channel. Transfer of information without particles being detectable in the transmission channel would defy common sense. Nevertheless, quantum counterfactual communication 1, 2 claims to do exactly this, so unsurprisingly, it has been a controversial topic. Proponents have gone so far as to claim even quantum information, such as a quantum state, may be transferred counterfactually 3, 4, 5.
These counterfactual communication protocols crucially rely upon interaction-free detection (IFD), which was originally introduced in a paper 6 co-authored by Vaidman, who is also an author of the present paper. However, Vaidman has repeatedly noted that IFD can only verify the existence of an object at a location, not its absence. This corresponds to a one-valued counterfactual transfer which is enough for counterfactual key distribution 7, 8, but does not allow general counterfactual computation 1, communication of classical data 2, or quantum state transfer 3, 4. For these proposals and their experimental implementation 9, Vaidman showed 10, 11, 12 that when the absence of an object in a particular place is established, the particle leaves a trace en route similar to the trace of a single localized particle.

It is simple to show why it impossible to devise a protocol that unambiguously distinguishes between blocking and not blocking one particular location without leaving a first-order trace in that location. Alice sends a photon that can be detected in detector or . Placing an object in the location must make detection in impossible. By our rules, the object can only absorb and not reflect, so this change tells us that there is a path through from Alice’s source to the detector . Therefore, there have to be a path from the source to and also a path from to . In such a situation, the two-state vector formalism (TSVF) 13, which adds to the description of the photon a quantum state evolving backward in time from the postselection at the detector, provides a simple way to find the location of the weak traces left by the photon. The overlap of the forward and backward evolving states of the photon at leads to the trace in of the first order in the interaction parameter 14, 15, similar to the trace of a photon localized at . This makes it unreasonable to claim that the photon was not there, i.e. that this was a counterfactual communication.
The experiment in this paper addresses this critical weakness of earlier protocols. We implement a protocol design based on the modification of these protocols found recently by Aharonov and Vaidman (AV) 16 that eliminates the trace of the first order also in the case of absence of the object, therefore permitting communication that is counterfactual according to our more stringent weak trace criterion.
The key ingredient of the AV modification of counterfactual protocols is that Bob communicates his bit to Alice by blocking or not blocking two locations and together, instead of one location , see Fig. 1. Alice gets a click in detector when and are not blocked, but it must be impossible when locations and are blocked. Therefore, there must be paths from the source to the detector through and that cause destructive interference of the waves from all the paths together. There are three such paths: through and , through but not , and through but not . These additional paths provide a finite contribution of the amplitude of the photon wave in the detector . However, the waves in these three paths interfere destructively in both and . There is no overlap of the forward and backward evolving wave functions at and , and consequently, no first order trace is created. Note that blocking only one of the locations or , does not lead to a possibility of detection at , so the argument of non-counterfactuality of the non-modified protocols does not hold here.
In our experiment, we do not only perform the counterfactual communication protocol with AV modification, but we also verify that both logical bit values are communicated without leaving a significant trace in the connecting path of the transmission channel. By applying small and distinct frequency shifts to each photon at different locations and filtering by frequency during collection 17, 18, we show where those photons interacted significantly to leave a trace and where they did not. We verify that any trace left by information-carrying photons in the transmission channel is small enough to not be visible above the noise floor, unlike the much larger traces left by single photons during calibration.
Our experimental results are a proof of principle. The transferred bits have high enough fidelity to send a QR code image that can be scanned by a cell phone, but the current design has a small success probability for the sent photons to be detected. Since the stray photons may be intercepted, this simple design is not yet secure; however, the application of our modification to counterfactual protocols based on the quantum Zeno effect 9 could dramatically increase the success probability, potentially enabling secure communication.
To explain the basic mechanism for achieving counterfactual communication, we first consider the setup 16 shown in Fig. 1. It has a nested pair of Mach-Zehnder interferometers (MZIs) that will be conceptually folded onto each other to obtain the compact Michelson-Morely interferometer (MMI) shown in Fig. 2, which our experiment implements with heralded single photons and active stabilization as shown in Fig. 3.
The left path in Fig. 1 is one arm of an (outer) MZI, so each photon emitted by the source at the top left bounces off three mirrors before reaching the final beamsplitter at the bottom, with detector placed at the right output port. We then split the right arm of this outer MZI into two consecutive (inner) MZIs, with detector placed at the right output port of the second inner MZI. As shown in Fig. 1(a), we tune each inner MZI to destructively interfere at the double-sided mirror that connects them, allowing all photons in the right arm to escape before they can trigger detector . Thus, each photon must either escape or cause the detector to click. However, if we block the right arms of the inner MZIs with shutters, as shown in Fig. 1(b), the remaining unblocked path will either trigger detector or complete the outer MZI, which we tune to destructively interfere at its right output and thus prevent the detector from clicking.
The unfolded design in Fig. 1 also illustrates both forward- (red) and backward-evolving (green) wave function paths, such that their overlap predicts which traces may be seen in the experiment. In regions where the two overlap (gray), a weakly interacting probe will record a trace consistent with those observed for definite particle paths. However, the same probe will not register an appreciable trace where there is no overlap. Notably, this simple picture predicts that no trace will be observed in the right arms of the inner MZIs, even though they form the transmission channel for information about the block.


For simplicity of implementation, we conceptually fold the design in Fig. 1 over a horizontal line on the double-sided mirror to identify both inner MZI and obtain Fig. 2. This fold converts the outer MZI into an MMI so that each photon passes through the same inner MZI twice. The benefit of this compact variation is that only one shutter is needed to change the bit configuration, since each photon may reach that shutter from two different directions. The penalty is that the transmissivity of the beamsplitters must also be slightly adjusted when the shutter is inserted to preserve the visibility of the destructive interference. For simplicity, we use 50/50 beamsplitters and balance the intensities with a tunable attenuator placed in the lower arm ().
To interrogate each photon about where it has been without spoiling the sensitive interference, we arrange for the photon to acquire small and distinct frequency-shifts when traversing different arms of the interferometer. We then spectrally filter those photons before detection to obtain frequency-dependent intensities that reveal their past interaction history. Following Zhou et al.17 we use free-space frequency electro-optic modulators (EOM) to induce frequency-shifted sidebands to mark the paths.
We provide additional technical detail about our implementation of Fig. 2 in the caption of Fig. 3 and the Methods section.
Since inserting a beam block changes which detector can click, this interferometric device enables the following one-way communication protocol. Let Alice only have access to the detectors and , and Bob only have access to the right arms of the inner MZIs. Bob can communicate to Alice remotely using the interferometer if they agree beforehand on a common timing reference to label successive time bins. To account for the high probability of photon loss and the device imperfections, Alice and Bob pre-arrange time bin durations that will contain many redundant photon attempts per bin. For each agreed-upon time bin, Bob then sets the configuration for either bit 0 or bit 1 by removing or inserting his shutter, respectively. When photons are successfully detected by one of her detectors, Alice records both which detector clicked and the time bin of the click. The redundant attempts per bin permit Alice to successfully detect at least one trial for each bin, and thus receive Bob’s binary message. In principle, the communication fidelity can be made arbitrarily high for a given photon source by increasing the bin duration and thus the encoding redundancy.
It is instructive to analyze this situation by examining the forward- and backward-evolving wave functions shown in Fig. 1. For a successfully transmitted 0, i.e. clicks in Fig. 1(a), there is no overlap of the forward (red solid line) and backward (green solid line) wave functions in either the transmission channel or at Bob’s site. Similarly, for a successful 1, i.e. clicks in Fig. 1(b), there is still no overlap of the forward and backward wave functions in the transmission channel. Thus, we expect no measurable trace to be seen by weakly coupled probes placed in the transmission channel, at least to first-order in the small interaction strength 19.

Results
Communication demonstration. To test the reliability of the communication protocol we performed runs with time bins of 1000 seconds each for bit values of 1 and 0. We found error rates of 2.3% for 1 and 10% for 0 for the individually transmitted bits. As expected, these rates are low enough that redundant time-bin encoding could be used to eliminate logical bit transmission errors.
As a proof of principle, we then demonstrated the counterfactual transmission of a quick response (QR) code representing the Chinese name of our lab, shown in Fig. 4. We used no redundant encoding for this demonstration, to better show the message degradation from the bare transmission error rates, and instead repeated trials until the first successful detection per bit. The QR code is a bitmap of binary pixels, so we used a linear raster scan to convert it to a string of 21025 logical bits, according to the rules: black 1 and white 0. Bob then used the setup in Fig. 3 to transmit the logic bits one by one to Alice by controlling the presence or absence of the block . Alice obtained the bit sequence according to the clicks of her two detectors and (in coincidence with detection of the idle photons) and translated it back into the corresponding QR image shown in Fig. 4, thus verifying that she successfully received information that was sent by Bob. You are welcome to scan the transmitted QR code using your own cellphone to reveal the name of our lab.

Counterfactuality verification. We then explicitly verified that this bit transmission was indeed counterfactual according to the trace criterion, as claimed. We labeled the possible photon paths with distinct frequency shifts, then selected narrow frequency bands at the detector to resolve the spectral profiles of the collected photons. We first prepared heralded single photons with linewidths as narrow as 300 MHz using frequency filters as shown in Fig. 3 (for more detail, see Methods). We then identified possible photon locations by inserting EOMs with distinct frequency shifts in all arms of the interferometer, creating small-amplitude () sidebands, see Figs. 2(a) and 2(b).
Given this extra frequency information, we performed three important checks on the collected photons. First, we showed that the EOMs did correctly label the paths the photons had taken. We tuned the inner MZI to produce constructive interference towards the mirror of the MMI (not destructive as in Fig. 2(a)). We also tuned the outer MMI to produce constructive interference towards . As seen in Fig. 5(a), we observed the expected sideband peaks corresponding to all five EOMs at . Second, we analyzed the case of transmitting bit 1, when Bob blocks the channel of the MZI. There should be no peak at the frequency modulated by EOM-A.
The photons reaching should not pass through EOM-C, pass once through EOM-E and twice through EOM-B and EOM-F. These expectations correspond correctly to the peaks observed in Fig. 5(b). Finally, we analyze the case of sending bit 0 by removing the block in arm of the MZI. The photons entering the MZI (tuned to destructive interference towards EOM-F) leave the MMI. The photons reaching should pass only through EOM-C, which is confirmed in Fig. 5(c).
Discussion
The trace identifying where a pre- and postselected particle has gone is a subtle issue. It cannot be completely understood using Wheeler’s criterion 20, in which the particle’s past is determined by the trajectory of a localized wave packet (LWP). Wheeler infers the past trajectory from the forward evolving quantum wave, which can be a superposition of several LWPs, by identifying the LWP that starts at the source and ends at the detector. In most cases, Wheeler’s criterion correctly tells us where a weak trace is present, but there are cases when it fails 14. The trace appears in the overlap of the forward and backward evolving wave functions. Note that the controversy about this approach is still not resolved. There were numerous criticisms of this approach 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 5. We, however, believe that all of them were properly answered 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49.
We should mention that there are also publications in which other meanings of ‘counterfactual’ are adopted 50. In the context of quantum computation 51, in 52 the computation was considered to be counterfactual when the photon that makes the computation was not absorbed during the process. In 53 the counterfactuality of communication corresponded to the lack of the particle in some part of the transmission channel, even if the empty parts were different for transmitting different logical bits. In 54, 55 the communication protocol considered counterfactual if the particles moved in the opposite direction to the information transfer. Note that the title of 55: ‘Trace-free counterfactual communication with a nanophotonic processor’ is somewhat misleading, since calculations show that the trace left in the transmission channel in this setup is larger than the trace in other experiments named counterfactual and it was not measured in this experiment. ‘Trace-free’ in 55 just meant high fidelity communication channel in which photons left very small trace which was not compared with the trace of a single localized photon.
The counterfactuality of the protocols we consider was also analyzed in the framework of consistent histories approach 25, 56, 57, 58. In particular, it was shown that there is a family of consistent histories for which the protocol with AV modification is not counterfactual 56, 58 since one of the histories is a trajectory passing through the transmission channel. We do not see motivation for consistent histories approach, and view this argument as just one more reason against it. How helpful is it to consider this hypothetical trajectory of consistent histories when standard quantum mechanics calculations, or, a quicker TSVF consideration, show that in the laboratory there is no trace along this trajectory? Anyway, consistent histories analysis is beyond the scope of our paper.
The weakness of our demonstration is that it is counterfactual only for detected photons and there were many other photons passing through the transmission channel: the photons of the stabilization procedure, the photons that went into the interferometer without coincidence detection of an idle photon, and most importantly the photons of the main protocol that were lost in the attenuator or that escaped the unmonitored port of the interferometer. In some cases (e.g. for quantum key distribution 7) there is a justification for disregarding the lost photons. In the current protocol, however, the photons which did not reach Alice’s detectors still can be used (by Eve) for getting information about the transmitted message, so they cannot be disregarded. In the modification of the full counterfactual communication protocol 2, 9, we would also lose some photons (although their number can be made arbitrarily small). The lost photons leave a strong trace, but provide information only about a small fraction of transmitted bits.
The main achievement of our work is showing that the photons of successful events in a properly working counterfactual communication device, that is, properly tuned MMI with inserted MZI, Fig. 2(a) and (b), do not leave traces in the communication channel. If we are ‘lucky’ and the first sent photon is detected by Alice in our experiment, then there will be no first order trace in the channel, while in all previous setups at least one of the logical bits cannot be transmitted without leaving such trace. We verified that the AV ‘patch’ 16 indeed removes the traces in the communication channel. Thus, adding this patch to other counterfactual communication protocols 2, 1, including the direct transfer of quantum states 3, 4, will make them truly counterfactual according to the trace definition of the presence of particles 14. This criterion is much stronger than Wheeler’s classical criterion for counterfactuality 20,‘the particle was not in the transmission channel because if it was there, it could not be detected by Alice’s detector’, which is not justified when quantum particles are considered. The modification we demonstrate here does not require new technology, so truly counterfactual communication, although challenging, is feasible with current technology.
In fact, there have already been some proposals for the implementation of the AV modification that we demonstrated here, notably, including the ultimate task of communication of quantum states 5. Moreover, counterfactual communication task that fulfills the weak trace criterion of conterfactuality has been claimed to already have been implemented in an alternative scheme using photon polarization 56. Although we agree that the photons in this experiment detected by Alice in her two detectors left no trace in the transmission channel, we disagree that this protocol can be called counterfactual communication of both bit values. Detection by detector indeed tells us in a counterfactual way that the bit is 1. However, detection of detector tells us only that the bit was not tested.
Methods
Technical improvements. Our implementation, sketched in Fig. 3, makes a few additional modifications to the conceptual design in order to increase interference visibility and thus bit transmission fidelity. Instead of polarization-insensitive beam-splitters we used polarized light and HWPs combined with PBSs. We also used an additional laser, as well as photodetectors and piezoceramic translation stages to stabilize the phases of the MZI and the MMI, reaching final measured visibilities of 98% and 97%, respectively.
Measurement of the trace.
When a photon with a frequency wave packet that is well-localised around passes through a particular EOM (with modulation frequency ), its wave packet is changed to be the superposition of the original wave packet and wave packets with frequency-shifted sidebands, . The small amplitude characterises the modulation strength of the EOM. Spectral analysis of the detected photons then tells us where they have been. We equip a temperature-sensitive etalon with FSR 8 GHz and linewidth of 100 MHz before detector so only the photons with the resonant frequency of etalon can be collected and we can obtain the spectral by changing the resonant frequency via temperature regulation. Photons that are detected in a sideband must have passed through the arm with the EOM with modulation frequency . From the presence or absence of particular sidebands we can thus infer where all photons went in a particular run.
Heralded single photons with narrow linewidth. To measure the trace of photons, a narrow-band source is necessary. We use two etalons to filter heralded single photons generated in spontaneous parametric down conversion process. Each etalon can select a series of peaks with corresponding line width and frequency interval (free spectral range) in the spectrum. When two etalons are used at the same time, only the overlapped peaks remain. We choose etalon-1 with free spectral rang (FSR) of 105 GHz and line width of 1.4 GHz, and etalon-2 with FSR 22 GHz and line width 315 MHz to pick out only one peak at central frquency ensuring a heralded single photon source with linwidth of 300 MHz.
Data availability
The datasets generated and analyzed during the current study are available from the corresponding author if you ask nicely.
Acknowledgements
This work was supported by the Innovation Program for Quantum Science and Technology (No. 2021ZD0301200), the National Natural Science Foundation of China (Nos. 12022401, 62075207, 11821404, 11804330, 12204142, 12204468), the Fundamental Research Funds for the Central Universities (No. WK2470000026, WK2470000030), the CAS Youth Innovation Promotion Association (No. 2020447), Anhui Initiative in Quantum Information Technologies (Grant No. AHY020100), the Anhui Provincial Natural Science Foundation (No. 2208085QA13), the Key Program of the Education Department of Anhui Province (No. KJ2021A0917) and the U.S.-Israel Binational Science Foundation (Grant No. 735/18). JD was partially supported by National Science Foundation (NSF) (Grant No. 1915015) and Army Research Office (ARO) (Grant No. W911NF-18-1-0178).
Author contributions
W.-W. P. and X. L. contributed equally to this work. W.-W. P., X. L., L.V. and X.-Y. X. designed the experiment. W.-W. P. and X. L. performed the experiment assisted by Z.-D. C., J. W., Z.-D. L. and Z.-Q. Z.. L.V. provided theoretical support. C.-F. L. and G.-C. G. supervised the project. W.-W. P., X.-Y. X., Q.-Q. W. and L.V. wrote the paper. G. C. and J. D. helped to improve the paper. All authors discussed the results and read the paper.
Competing interests
The Authors declare no Competing Financial or Non-Financial Interests.
References
- [1] Hosten, O., Rakher, M. T., Barreiro, J. T., Peters, N. A. & Kwiat, P. G. Counterfactual quantum computation through quantum interrogation. Nature 439, 949 (2006). URL https://www.nature.com/articles/nature04523.
- [2] Salih, H., Li, Z.-H., Al-Amri, M. & Zubairy, M. S. Protocol for direct counterfactual quantum communication. Phys. Rev. Lett. 110, 170502 (2013). URL https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.110.170502.
- [3] Salih, H. Protocol for counterfactually transporting an unknown qubit. Front. Phys. 3, 94 (2016). URL https://www.frontiersin.org/articles/10.3389/fphy.2015.00094/full.
- [4] Li, Z.-H., Al-Amri, M. & Zubairy, M. S. Direct counterfactual transmission of a quantum state. Phys. Rev. A 92, 052315 (2015). URL https://link.aps.org/doi/10.1103/PhysRevA.92.052315.
- [5] Salih, H. From counterportation to local wormholes. Quantum Sci. Tech. 8, 025016 (2023). URL https://dx.doi.org/10.1088/2058-9565/ac8ecd.
- [6] Elitzur, A. C. & Vaidman, L. Quantum mechanical interaction-free measurements. Found. Phys. 23, 987–997 (1993). URL https://link.springer.com/article/10.1007/BF00736012.
- [7] Noh, T.-G. Counterfactual quantum cryptography. Phys. Rev. Lett. 103, 230501 (2009). URL https://link.aps.org/doi/10.1103/PhysRevLett.103.230501.
- [8] Liu, Y. et al. Experimental demonstration of counterfactual quantum communication. Phys. Rev. Lett. 109, 030501 (2012). URL https://link.aps.org/doi/10.1103/PhysRevLett.109.030501.
- [9] Cao, Y. et al. Direct counterfactual communication via quantum zeno effect. Proc. Natl. Acad. Sci. 114, 4920–4924 (2017). URL https://link.pnas.org/doi/10.1073/pnas.1614560114.
- [10] Vaidman, L. Impossibility of the counterfactual computation for all possible outcomes. Phys. Rev. Lett. 98, 160403 (2007). URL https://link.aps.org/doi/10.1103/PhysRevLett.98.160403.
- [11] Vaidman, L. Comment on “Protocol for direct counterfactual quantum communication”. Phys. Rev. Lett. 112, 208901 (2014). URL https://link.aps.org/doi/10.1103/PhysRevLett.112.208901.
- [12] Vaidman, L. Counterfactuality of ‘counterfactual’ communication. J. Phys. A 48, 465303 (2015). URL https://iopscience.iop.org/article/10.1088/1751-8113/48/46/465303/meta.
- [13] Aharonov, Y. & Vaidman, L. The two-state vector formalism: an updated review. In Time in quantum mechanics, 399–447 (Springer, 2008). URL https://link.springer.com/chapter/10.1007/978-3-540-73473-4_13.
- [14] Vaidman, L. Past of a quantum particle. Phys. Rev. A 87, 052104 (2013). URL https://link.aps.org/doi/10.1103/PhysRevA.87.052104.
- [15] Dziewior, J. et al. Universality of local weak interactions and its application for interferometric alignment. Proc. Natl. Acad. Sci. 116, 2881–2890 (2019). URL https://link.pnas.org/doi/10.1073/pnas.1812970116.
- [16] Aharonov, Y. & Vaidman, L. Modification of counterfactual communication protocols that eliminates weak particle traces. Phys. Rev. A 99, 010103 (2019). URL https://link.aps.org/doi/10.1103/PhysRevA.99.010103.
- [17] Zhou, Z.-Q. et al. Experimental observation of anomalous trajectories of single photons. Phys. Rev. A 95, 042121 (2017). URL https://link.aps.org/doi/10.1103/PhysRevA.95.042121.
- [18] Danan, A., Farfurnik, D., Bar-Ad, S. & Vaidman, L. Asking photons where they have been. Phys. Rev. Lett. 111, 240402 (2013). URL https://link.aps.org/doi/10.1103/PhysRevLett.111.240402.
- [19] Reznik, G., Bagchi, S., Dressel, J. & Vaidman, L. Footprints of quantum pigeons. Phys. Rev. Research 2, 023004 (2020). URL https://link.aps.org/doi/10.1103/PhysRevResearch.2.023004.
- [20] Wheeler, J. A. The “past” and the “delayed-choice” double-slit experiment. In Mathematical foundations of quantum theory, 9–48 (Elsevier, 1978). URL https://www.sciencedirect.com/science/article/abs/pii/B9780124732506500066.
- [21] Geppert-Kleinrath, H. et al. Multifold paths of neutrons in the three-beam interferometer detected by a tiny energy kick. Phys. Rev. A 97, 052111 (2018). URL https://link.aps.org/doi/10.1103/PhysRevA.97.052111.
- [22] Li, Z.-H., Al-Amri, M. & Zubairy, M. S. Comment on “Past of a quantum particle”. Phys. Rev. A 88, 046102 (2013). URL https://link.aps.org/doi/10.1103/PhysRevA.88.046102.
- [23] Bartkiewicz, K. et al. One-state vector formalism for the evolution of a quantum state through nested mach-zehnder interferometers. Phys. Rev. A 91, 012103 (2015). URL https://link.aps.org/doi/10.1103/PhysRevA.91.012103.
- [24] Potoček, V. & Ferenczi, G. Which-way information in a nested mach-zehnder interferometer. Phys. Rev. A 92, 023829 (2015). URL https://link.aps.org/doi/10.1103/PhysRevA.92.023829.
- [25] Griffiths, R. B. Particle path through a nested mach-zehnder interferometer. Phys. Rev. A 94, 032115 (2016). URL https://link.aps.org/doi/10.1103/PhysRevA.94.032115.
- [26] Hashmi, F. A., Li, F., Zhu, S.-Y. & Zubairy, M. S. Two-state vector formalism and quantum interference. J. Phys. A: Math. Theor. 49, 345302 (2016). URL https://dx.doi.org/10.1088/1751-8113/49/34/345302.
- [27] Hashmi, F. A., Li, F., Zhu, S.-Y. & Zubairy, M. S. Reply to the comment on “Two-state vector formalism and quantum interference”. J. Phys. A: Math. Theor. 51, 068001 (2018). URL https://dx.doi.org/10.1088/1751-8121/aa8d23.
- [28] Alonso, M. A. & Jordan, A. N. Can a dove prism change the past of a single photon? Quantum Stud.: Math. Found. 2, 255–261 (2015). URL https://doi.org/10.1007/s40509-015-0044-8.
- [29] Salih, H. Commentary: “Asking photons where they have been” - without telling them what to say. Front. Phys. 3, 47 (2015). URL https://www.frontiersin.org/articles/10.3389/fphy.2015.00047.
- [30] Li, F., Hashmi, F. A., Zhang, J.-X. & Zhu, S.-Y. An ideal experiment to determine the ‘past of a particle’ in the nested mach-zehnder interferometer. Chin. Phys. Lett. 32, 050303 (2015). URL https://dx.doi.org/10.1088/0256-307X/32/5/050303.
- [31] Nikolaev, G. N. Paradox of photons disconnected trajectories being located by means of “weak measurements” in the nested mach–zehnder interferometer. JETP Letters 105, 152–157 (2017). URL https://doi.org/10.1134/S0021364017030110.
- [32] Sokolovski, D. Asking photons where they have been in plain language. Phys. Lett. A 381, 227–232 (2017). URL https://www.sciencedirect.com/science/article/pii/S0375960116316590.
- [33] Englert, B.-G., Horia, K., Dai, J., Len, Y. L. & Ng, H. K. Past of a quantum particle revisited. Phys. Rev. A 96, 022126 (2017). URL https://link.aps.org/doi/10.1103/PhysRevA.96.022126.
- [34] Bhati, R. S. & Arvind. Do weak values capture the complete truth about the past of a quantum particle? Phys. Lett. A 429, 127955 (2022). URL http://dx.doi.org/10.1016/j.physleta.2022.127955.
- [35] Vaidman, L. Reply to “Comment on ‘past of a quantum particle’ ”. Phys. Rev. A 88, 046103 (2013). URL https://link.aps.org/doi/10.1103/PhysRevA.88.046103.
- [36] Vaidman, L. Tracing the past of a quantum particle. Phys. Rev. A 89, 024102 (2014). URL https://link.aps.org/doi/10.1103/PhysRevA.89.024102.
- [37] Vaidman, L. Comment on “One-state vector formalism for the evolution of a quantum state through nested mach-zehnder interferometers”. Phys. Rev. A 93, 036103 (2016). URL https://link.aps.org/doi/10.1103/PhysRevA.93.036103.
- [38] Vaidman, L. Comment on “Which-way information in a nested mach-zehnder interferometer”. Phys. Rev. A 93, 017801 (2016). URL https://link.aps.org/doi/10.1103/PhysRevA.93.017801.
- [39] Vaidman, L. Comment on “Particle path through a nested mach-zehnder interferometer”. Phys. Rev. A 95, 066101 (2017). URL https://link.aps.org/doi/10.1103/PhysRevA.95.066101.
- [40] Vaidman, L. Comment on “Two-state vector formalism and quantum interference”. J. Phys. A: Math. Theor. 51, 068002 (2018). URL https://dx.doi.org/10.1088/1751-8121/aa8d24.
- [41] Vaidman, L. & Tsutsui, I. When photons are lying about where they have been. Entropy 20, 538 (2018). URL https://www.mdpi.com/1099-4300/20/7/538.
- [42] Vaidman, L., Danan, A., Farfurnik, D. & Bar-Ad, S. Response: Commentary: “Asking photons where they have been” - without telling them what to say. Front. Phys. 3, 47 (2015). URL https://www.frontiersin.org/articles/10.3389/fphy.2015.00048.
- [43] Ben-Israel, A. et al. An improved experiment to determine the ‘past of a particle’ in the nested mach–zehnder interferometer. Chin. Phys. Lett. 34, 020301 (2017). URL https://dx.doi.org/10.1088/0256-307X/34/2/020301.
- [44] Vaidman, L. Comment on “Paradox of photons disconnected trajectories being located by means of ‘weak measurements’ in the nested mach–zehnder interferometer” (jetp letters 105, 152 (2017)). JETP Letters 105, 473–474 (2017). URL https://doi.org/10.1134/S0021364017070037.
- [45] Vaidman, L. A comment on “Asking photons where they have been in plain language” (2017). Preprint at https://arxiv.org/abs/1703.03615v1.
- [46] Peleg, U. & Vaidman, L. Comment on “Past of a quantum particle revisited”. Phys. Rev. A 99, 026103 (2019). URL https://link.aps.org/doi/10.1103/PhysRevA.99.026103.
- [47] Wander, A., Cohen, E. & Vaidman, L. Three approaches for analyzing the counterfactuality of counterfactual protocols. Phys. Rev. A 104, 012610 (2021). URL https://link.aps.org/doi/10.1103/PhysRevA.104.012610.
- [48] Vaidman, L. Neutrons and photons inside a nested mach-zehnder interferometer. Phys. Rev. A 101, 052119 (2020). URL https://link.aps.org/doi/10.1103/PhysRevA.101.052119.
- [49] Reznik, G. et al. Photons are lying about where they have been, again. Phys. Lett. A 470, 128782 (2023). URL https://doi.org/10.1016/j.physleta.2023.128782.
- [50] Vaidman, L. Analysis of counterfactuality of counterfactual communication protocols. Phys. Rev. A 99, 052127 (2019). URL https://link.aps.org/doi/10.1103/PhysRevA.99.052127.
- [51] Mitchison, G. & Jozsa, R. Counterfactual computation. Proc. R. Soc. London, Ser. A 457, 1175–1193 (2001). URL https://royalsocietypublishing.org/doi/10.1098/rspa.2000.0714.
- [52] Kong, F. et al. Experimental realization of high-efficiency counterfactual computation. Phys. Rev. Lett. 115, 080501 (2015). URL https://link.aps.org/doi/10.1103/PhysRevLett.115.080501.
- [53] Gisin, N. Optical communication without photons. Phys. Rev. A 88, 030301 (2013). URL https://link.aps.org/doi/10.1103/PhysRevA.88.030301.
- [54] Arvidsson-Shukur, D., Gottfries, A. & Barnes, C. Evaluation of counterfactuality in counterfactual communication protocols. Phys. Rev. A 96, 062316 (2017). URL https://link.aps.org/doi/10.1103/PhysRevA.96.062316.
- [55] Calafell, I. A. et al. Trace-free counterfactual communication with a nanophotonic processor. npj Quantum Inf. 5, 61 (2019). URL https://doi.org/10.1038/s41534-019-0179-2.
- [56] Salih, H., McCutcheon, W., Hance, J. R. & Rarity, J. The laws of physics do not prohibit counterfactual communication. npj Quantum Inf. 8, 60 (2022). URL https://doi.org/10.1038/s41534-022-00564-w.
- [57] Salih, H. Comment on “Particle path through a nested mach-zehnder interferometer”. Phys. Rev. A 97, 026101 (2018). URL https://link.aps.org/doi/10.1103/PhysRevA.97.026101.
- [58] Hance, J. R., Ladyman, J. & Rarity, J. How quantum is quantum counterfactual communication? Found. Phys. 51, 12 (2021). URL https://link.springer.com/article/10.1007/s10701-021-00412-5.