Important – programme changes
There have been some small changes to the printed programme: the talks of Denis Rosset and Dominique Unruh have been swapped, and for the final talk of the workshop Nicolas Treps will be replacing Fabio Sciarrino. The information available here on the website is up to date.
The 2017 workshop will take place on 19-21 June at Université Pierre et Marie Curie, as a satellite workshop of the Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC) 2017.
Topics include but are not limited to to the following.
- Delegated quantum computation
- Device-independent and semi-device-independent quantum cryptography
- Nonlocality, contextuality, and self-testing
- Certified random number generation
TyQI workshop series
Quantum mechanics promises extraordinary capabilities for information processing. Quantum computing power exceeds the known boundaries of classical computers. Quantum cryptography offers unconditional security where classical solutions are impossible. Due to the rapid progress in both experimental research and industry development, we are in a historical moment witnessing this disruptive technology becoming the reality.
However, how can a user of a quantum information processing component be assured that it is carrying out the intended work? As classical beings, we cannot directly verify quantum states or quantum operations. How can we trust the integrity of quantum hardware?
To address this challenging question, an area of Trustworthy Quantum Information has emerged from several recent research thrusts. A central idea is that one can test if a device is super-classical by observing its classical input-output correlations. In fact, the quantum inner-workings of an unknown quantum device can sometimes be uniquely determined by its external classical behavior. Through methods that carefully mix such tests with the intended work, many information processing tasks can be carried out by quantum devices that the users do not need to trust. Thus, hardware implementations of those methods will never cause a protocol to fail. That is, they are trustworthy.
The objective of this workshop series is to facilitate the formation of a coherent research subject and research community from the constituent topics, which have been pursued separately by different groups of researchers. The series aims to bridge the gap between theory and practice by engaging theorists and experimentalists in the same discussions. We also welcome participants from the classical information security community, as our approach may provide a new solution space for some of the greatest challenges in hardware security.
Links to previous editions can be found in the archive. The 2018 workshop will be coordinated by Joe Fitzsimons and will take place in Singapore.