Trustworthy Quantum Information 2016

Workshop Mission

Quantum mechanics promises extraordinary capabilities for information processing. Quantum computing power exceeds the known boundaries of classical computers. Quantum cryptography offers unconditional security where classical solutions are impossible. Due to the rapid progress in both experimental research and industry development, we are in a historical moment witnessing this disruptive technology becoming the reality.

However, how can a user of a quantum information processing component be assured that it is carrying out the intended work? As classical beings, we cannot directly verify quantum states or quantum operations. How can we trust the integrity of quantum hardware?

To address this challenging question, an area of Trustworthy Quantum Information has emerged from several recent research thrusts. The central idea has its origin in the test of quantum theory: one can test if a device is super-classical by observing its classical input-output correlations. In fact, the quantum inner-workings of an unknown quantum device can sometimes be uniquely determined by its external classical behavior. Through methods that carefully mix such tests with the intended work, many information processing tasks can be carried out by quantum devices that the users do not need to trust. Thus, hardware implementations of those methods will never cause a protocol to fail. That is, they are “trustworthy.”

The objective of this Workshop is to facilitate the formation of a coherent research subject and its research community from the constituting topics, which have been pursued separately by different groups of researchers. The Workshop also aims to bridge the gap between theory and practice by engaging theorists and experimentalists in the same discussions. We also welcome participants from the classical information security community, as our approach may provide a new solution space for some of the greatest challenges in hardware security.

The topics of the Workshop include, but are not limited to

  • Delegated Quantum Computation
  • Device-Independent and Semi-Device-Independent Quantum Cryptography
  • Nonlocality, Contextuality, and Self-testing
  • Certified Random Number Generation