Tutorial Speaker

Alex Bredariol Grilo

Alex Bredariol Grilo, LIP6 (CNRS/Sorbonne Université)

Title: Information theory tools in quantum cryptography
In this tutorial, I will present some tools/techniques in (quantum) information theory that allows us to prove the security of quantum protocols of different flavours, such as quantum key distribution, secret sharing, zero knowledge, among others.

No prior knowledge in information theory is required, but we expect familiarity with basic notions in quantum computing (quantum states, density matrices, measurements, ...)

Invited Speakers

James Bartusek

James Bartusek, UC Berkeley

Title: How to Provably Delete Information
In an era of unprecedented access to personal and sensitive data, questions related to data deletion are becoming increasingly relevant. Can we request that encrypted data stored on the cloud be provably deleted? What if the server would like to compute functions or train models on this data before deletion? Can multiple parties compute a joint function on their private data, and later request that their input be deleted? Can software be provably deleted?

If data is encoded classically, obtaining these guarantees against malicious adversaries is impossible due to the ease of copying classical information. However, the uncertainty principle of quantum mechanics provides hope that these “certified deletion” tasks are physically realizable if the data is encoded in quantum states.

In this talk, I will present a novel proof technique that gives rise to simple and natural quantum-cryptographic protocols for achieving each of these tasks. These protocols will guarantee that after deletion, any information previously held by the adversary has been statistically removed from their view and cannot be recovered even given the client’s secret key and unbounded computational resources.

Based on joint work with Sanjam Garg, Dakshita Khurana, and Bhaskar Roberts.

Jiahui Liu

Jiahui Liu, UT Austin

Title: Quantum Copy Protection and Unclonable Cryptography
In 1963, Wiesner first leveraged the unclonability of quantum information for cryptographic goals, putting forward the pioneering idea of quantum money:  banknotes that are encoded as quantum states and cannot be forged simply due to quantum mechanics.

In this talk, I will show applications of computationally unclonable quantum states, by bringing techniques from classical cryptography into the picture.

One of these applications is quantum copy protection. First proposed by Aaronson in 2009, copy protection is a procedure to encode classical functional information into a quantum state so that this state can be used to evaluate a classical functionality but cannot be copied into two. I will then present a brief survey on the recent progress in quantum copy protection.