Scientific Program

The PDF version can be download from here.

Monday

TypeAuthorsTitle
Monday Morning
TutorialNorbert LütkenhausQKD implementation security
InvitedRonald HansonQuantum repeaters and quantum networks
ContributedGayane Vardoyan, Saikat Guha, Philippe Nain and Don Towsley.On the capacity region of bipartite and tripartite entanglement switching and key distribution
ContributedDaniel Llewellyn, Caterina Vigliar, Benjamin Slater, Beatrice Da Lio, Stefano Paesani, Jorge Barreto, Dondu Sahin, Massimo Borghi, John G. Rarity, Leif K. Oxenløwe, Karsten Rottwitt, Jianwei Wang, Yunhong Ding, Mark G. Thompson and Davide Bacco.High-dimensional chip-to-chip entanglement distribution through multicore fibre
Monday Afternoon
InvitedJi-Gang RenQKD based on satellite-ground entanglement distribution
ContributedMarco Avesani, Luca Calderaro, Matteo Schiavon, Costantino Agnesi, Alberto Santamato, Andrea Stanco, Mujtaba Zahidy, Alessia Scriminich, Giulio Foletto, Giampiero Contestabile, Marco Chiesa, Alessandro Nottola, Davide Rotta, Stefano Tirelli, Massimo Artiglia, Alberto Montanaro, Marco Romagnoli, Vito Sorianello, Daniele Dequal, Giuseppe Bianco, Claudia Facchinetti, Alberto Tuozzi, Francesco Vedovato, Giuseppe Vallone and Paolo Villoresi.QCoSOne: A chip-based prototype for daylight free-space QKD at telecom wavelength for future satellite optical payloads
ContributedHenry Semenenko, Philip Sibson, Andy Hart, Mark Thompson and Chris Erven.Chip-based measurement-device-independent quantum key distribution
ContributedTobias Eriksson, Takuya Hirano, Benjamin Puttnam, Georg Rademacher, Ruben Luís, Mikio Fujiwara, Ryo Namiki, Yoshinari Awaji, Masahiro Takeoka, Naoya Wada and Masahide Sasaki. Continuous variable quantum key distribution multiplexed with high throughput coherent channels
Break
ContributedIgnatius William Primaatmaja, Emilien Lavie, Koon Tong Goh, Chao Wang and Charles Ci Wen Lim.Almost-tight and versatile security analysis of measurement-device-independent quantum key distribution
ContributedNiraj Kumar, Iordanis Kerenidis and Eleni Diamanti.Experimental demonstration of quantum advantage for one-way communication complexity with application in construction of robust quantum money
ContributedMarie-Christine Roehsner, Joshua Kettlewell, Tiago Batalhao, Joseph Fitzsimons and Philip Walther.Quantum advantage for probabilistic one-time programs

Tuesday

TypeAuthorsTitle
Tuesday Morning
TutorialRotem Arnon-FriedmanTutorial on DI-QKD and DI-QRNG, discussing security proofs and practical challenges
InvitedEneet KaurFundamental limits on key rates in DI-QKD
ContributedRené Schwonnek, Ernest Y.-Z. Tan, Ramona Wolf, Koon Tong Goh and Charles C.-W. Lim.A numerical method for computing reliable secret key rates for device-independent quantum key distribution
ContributedAlex Bredariol Grilo.A simple protocol for verifiable delegation of quantum computation in one round
ContributedRotem Arnon-Friedman and Jean-Daniel Bancal. Device-independent certification of one-shot distillable entanglement

Wednesday

TypeAuthorsTitle
Wednesday Morning
TutorialFang SongTutorial on quantum zero knowledge
InvitedZvika BrakerskiQuantum fully homomorphic encryption
ContributedThomas Vidick and Tina Zhang.Classical zero-knowledge arguments for quantum computations
ContributedAlex Bredariol Grilo, William Slofstra and Henry Yuen.Perfect zero knowledge for quantum multiprover interactive proofs
Wednesday Afternoon
InvitedStefanie BarzImplementation vulnerabilities in general quantum cryptography
ContributedKento Maeda, Toshihiko Sasaki and Masato Koashi.Operator dominance method: a simple monitoring scheme of a TF-type QKD in finite-size regime
ContributedYang Liu, Zong-Wen Yu, Weijun Zhang, Jian-Yu Guan, Jiu-Peng Chen, Chi Zhang, Xiao-Long Hu, Hao Li, Teng-Yun Chen, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang and Jian-Wei Pan.Experimental Twin-field quantum key distribution through sending-or-not-sending
ContributedMariella Minder, Mirko Pittaluga, George L. Roberts, Marco Lucamarini, James F. Dynes, Zhiliang Yuan and Andrew J. Shields.Experimental twin field quantum key distribution beyond the repeaterless secret key capacity bound
ContributedXiaoqing Zhong, Jianyong Hu, Marcos Curty, Li Qian and Hoi-Kwong Lo. Proof-of-principle experimental demonstration of twin-field type quantum key distribution
Break
ContributedAnne Broadbent and Sébastien Lord.Uncloneable quantum encryption via oracles
ContributedMyrto Arapinis, Mahshid Delavar, Mina Doosti and Elham Kashefi. Security analysis of quantum physical unclonable functions
ContributedNorbert Lütkenhaus, Ashutosh Marwah and Dave Touchette. Erasable bit commitment from temporary quantum trust

Thursday

TypeAuthorsTitle
Thursday Morning
TutorialManfred LochterPractical Quantum Security: A user perspective
InvitedMark L. ZhandryQuantum techniques in post-quantum crypto
ContributedYanbao Zhang, Honghao Fu, Krister Shalm, Joshua Bienfang, Martin Stevens, Michael Mazurek, Sae Woo Nam, Carlos Abellan, Waldimar Amaya, Morgan Mitchell, Carl Miller, Alan Mink and Emanuel Knill.Efficient randomness certification by quantum probability estimation
ContributedDavide Rusca, Thomas van Himbeeck, Anthony Martin, Jonatan Bohr Brask, Hamid Tebyanian, Stefano Pironio, Nicolas Brunner and Hugo Zbinden.
**merged with**
Thomas Van Himbeeck and Stefano Pironio.
Fast and practical implementation of self-testing QRNG based on an energy bound
**merged with**
Correlations and randomness generation based on an energy constraint
Thursday Afternoon
InvitedZhiliang Yuan10~Mb/s quantum key distribution
Industry session (separate schedule)
Thursday Evening
Business Meeting
Prize Ceremony
Rump Session
(cold food and drinks are available before the session)

Friday

TypeAuthorsTitle
Friday Morning
InvitedGorjan AlagicSigning/encrypting quantum states
ContributedJelle Don, Serge Fehr, Christian Majenz and Christian Schaffner.Security of the Fiat-Shamir transformation in the quantum random-oracle model
ContributedFabio Banfi, Ueli Maurer, Christopher Portmann and Jiamin Zhu. Composable and finite computational security of quantum message transmission
ContributedJan Czajkowski, Christian Majenz, Christian Schaffner and Sebastian Zur.Quantum lazy sampling and game-playing proofs for quantum indifferentiability
ContributedAlexandru Gheorghiu and Thomas Vidick. Computationally-secure and composable remote state preparation
ContributedChristian Majenz, Christian Schaffner and Jeroen van Wier. Non-malleability for quantum public-key encryption