AIT seminar today at 14:30
by Charles Alexandre Bédard
Hello everyone,
The first session of the AIT seminar is today at 14:30, in the D1.14.
Marilena Palomba will present:
*Information distance*, Charles H. Bennett, Peter Gács, Ming Li, Paul MB
Vitányi, and Wojciech H. Zurek (IEEE Transactions on information theory,
44(4):1407--1423, 1998)
Pasquale Polverino will present:
*Compression-based data mining of sequential data*, Eamonn Keogh, Stefano
Lonardi, Chotirat Ann Ratanamahatana, Li Wei, Sang-Hee Lee, and John
Handley (Data Mining and Knowledge Discovery, 14:99--129, 2007)
The seminar will be live-streamed via Jitsi,
https://meet.jit.si/cqi-demon-M6QW9V7YY.
(Seminar webpage : https://cqi.inf.usi.ch/ait23.php)
Best,
Charles
1 year, 6 months
A conversation with Bennett and Deutsch
by Charles Alexandre Bédard
Dear colleagues,
Tomorrow, I will be animating a conversation between Charles Bennett and
David Deutsch on the nature of computation, incompleteness and mathematics.
The event will occur at USI in the D1.14 or online via the Zoom link below.
Please do not diffuse the link publicly.
Kindly,
Charles
-----------------------------------------
Charles Bédard invites you to a planned Zoom meeting.
Subject: A conversation with Bennett and Deutsch
Time: 1 juin 2023 02:30 PM Zurich
Participate in the Zoom meeting:
https://us06web.zoom.us/j/87459763823?pwd=VExaQlVqcGw2bkQ2RVdBUXBpQ21Sdz09
Meeting ID: 874 5976 3823
Password: 734690
-----------------------------------------
1 year, 6 months
CQI seminar 24.5.2023 - Sam Kuypers
by William Schober
Hi everyone,
Next Wednesday, 24 May, at 14:30 in D5.01 we're happy to have Sam Kuypers from our group give a talk at the CQI seminar. Sam will talk about the history of scientific models of magnetism, and why decoherence plays an important role in their modern understanding. Title and abstract below.
As always you can join us online at https://meet.jit.si/cqi-demon-M6QW9V7YY.
Looking forward to seeing you there,
Will
Speaker: Sam Kuypers
Title: On Magnets and the Multiverse
Abstract: Imagine a world where refrigerator magnets, compasses, and magnetic storage devices don't exist. Surprisingly, this is precisely the universe implied by classical physics: as Bohr and van-Leeuwen demonstrated, a classical system's magnetisation invariably vanishes to zero in thermodynamic equilibrium.
Hence, quantum models, such as the Heisenberg spin-chain model, were invented to explain the phenomenon of magnetism. In this talk, I shall explore those models' history and intricacies. And I shall clarify why those quantum models require decoherence to explain the structure of magnetic materials.
1 year, 6 months
AIT seminars advertisement
by Charles Alexandre Bédard
Carissimi,
I want to advertise the seminar on algorithmic information theory that
starts this Thursday, 14:30, D1:14. The seminar continues on the following
dates: May 30th, June 1st, June 6th and June 7th.
On June 1st, I will be animating a conversation between Charles Bennett and
David Deutsch on the nature of computation, incompleteness and mathematics.
More information on the seminar is available at
https://cqi.inf.usi.ch/ait23.php.
Kindly,
Charles Bédard
1 year, 6 months
CQI seminar 10.5.2023 - Giacomo Borin
by William Schober
Ciao a tutti,
This Wednesday, 10 May, at 14:30 in D5.01 we are happy to welcome Giacomo Borin from the Università di Trento to the CQI seminar as a guest speaker. Giacomo will talk about his work on nonabelian-group cryptography, title and abstract below.
As always you can join us online at https://meet.jit.si/cqi-demon-M6QW9V7YY.
Looking forward to seeing you there,
Will
Speaker: Giacomo Borin
Title: From Sigma-Protocols to Threshold Signatures and Secure Federated Learning
Abstract: The first part of the talk will be about the design of signatures via the use of non-abelian cryptographic group actions, in particular the ones coming from coding theory assumptions.
This family of schemes came to interest during the new NIST call for standardisation of signature designs, thanks to the trust of the community on their (quantum) resistance and the very malleable underlying structure. The core idea is to consider a zero knowledge proof for the knowledge of a secret group element $g$ such that $x’ = g \star x$ with $x,x’$ public, then render it to a signature (non-interactive protocol) via the classical Fiat-Shamir transform. Several schemes have been proposed with different instantiations of these assumptions: for example, LESS and MEDS use code equivalence (on different metrics).
The mathematical structure of the group action can be exploited to optimize the schemes and to define a threshold version of the signature for any group action, moreover for the ones induced by linear code equivalence it is possible to exploit Abelian subgroups of the general linear group to achieve better parameters.
The second part of the talk will be about the possible uses of the RLWE problem to achieve a secure post quantum federated learning (a machine learning technique that allows a set of users to train a shared model via local evaluated updated). To this end, we can use verifiable multi key homomorphic encryption to encrypt and aggregate the updates, that can then be validated via the use of zero knowledge proof for the range of the parameters.
1 year, 7 months
CQI seminar 3.5.2023 - Giacomo Carrara
by William Schober
Ciao a tutti,
Tomorrow, 3 May, at 14:30 in D5.01 we are happy to welcome Giacomo Carrara from Heinrich-Heine-Universität Düsseldorf to the CQI seminar as a guest speaker. Giacomo will talk about his work on twin-field quantum key distribution, title and abstract below.
As always you can join us online at https://meet.jit.si/cqi-demon-M6QW9V7YY.
Looking forward to seeing you there,
Will
Speaker: Giacomo Carrara
Title: Overcoming fundamental bounds on quantum conference key agreement
Abstract: Twin-Field Quantum Key Distribution (TF-QKD) enables two distant parties to establish a shared secret key, by interfering weak coherent pulses (WCPs) in an intermediate measuring station. This allows TF-QKD to reach greater distances than traditional QKD schemes and makes it the only scheme capable of beating the repeaterless bound on the bipartite private capacity. Here, we generalize TF-QKD to the multipartite scenario. Specifically, we propose a practical conference key agreement (CKA) protocol that only uses WCPs and linear optics and prove its security with a multiparty decoy-state method. Our protocol allows an arbitrary number of parties to establish a secret conference key by single-photon interference, enabling it to overcome recent bounds on the rate at which conference keys can be established in quantum networks without a repeater.
1 year, 7 months