đŸ€ meet & greet

Poster Session 2

other
Thu, 13 Aug , 11:00 - 13:00
      PDF instructions for poster presenters

      Floorplan for this session

      This poster session takes place on Thu, 13 Aug, 11:00 - 13:00 over at our virtual Meet & Greet Room . The floor numbers are indicated at the posters below.

      Posters presented in this session

      • Twin-field quantum digital signatures
        Chun-Hui Zhang (Nanjing University of Posts and Telecommunications); Yu-Teng Fan (Nanjing University of Posts and Telecommunications); Chun-Mei Zhang (Nanjing University of Posts and Telecommunications); Guang-Can Guo (Nanjing University of Posts and Telecommunications); Qin Wang (Nanjing University of Posts and Telecommunications)
        [abstract]
      • Secure random number generation from parity symmetric radiations
        Toyohiro Tsurumaru (Mitsubishi Electric Corporation); Toshihiko Sasaki (The University of Tokyo); Izumi Tsutsui (High Energy Accelerator Research Organization (KEK))
        [abstract]
        Poster presented by: Toyohiro Tsurumaru on Floor 1
      • Semi-Quantum Money
        Roy Radian (Ben Gurion University of the Negev); Or Sattath (Ben Gurion University of the Negev)
        [abstract]
        Poster presented by: Roy Radian on Floor 1
      • Security of quantum key distribution with detection-efficiency mismatch in the multiphoton case
        Anton Trushechkin (Steklov Mathematical Institute of Russian Academy of Sciences)
        [abstract]
        Poster presented by: Anton Trushechkin on Floor 1
      • Quantum Period Finding is Compression Robust
        Alex May (Ruhr university Bochum); Lars Schlieper (Ruhr university Bochum)
        [abstract]
        Poster presented by: Lars Schlieper on Floor 1
      • Full quantum one-way function for quantum cryptography
        Tao Shang (Beihang University); Yao Tang (Beihang University); Ranyiliu Chen (Beihang University); Jianwei Liu (Beihang University)
        [abstract]
        Poster presented by: Tao Shang, Yao Tang on Floor 1
      • IND-secure quantum symmetric encryption based on point obfuscation
        Ranyiliu Chen (Beihang University); Tao Shang (Beihang University); Jianwei Liu (Beihang University)
        [abstract]
      • The Improvement of Security for Continuous-Variable Quantum Key Distribution with Imperfect Phase Modulation
        Zhengwen Cao (School of Information Science and Technology, Northwest University Xi’an, 710127, China); Chenhao Zhang (School of Information Science and Technology, Northwest University Xi’an, 710127, China); Geng Chai (School of Information Science and Technology, Northwest University Xi’an, 710127, China); Chen He (School of Information Science and Technology, Northwest University Xi’an, 710127, China)
        [abstract]
        Poster presented by: Zhengwen Cao on Floor 1
      • Quantum key distribution overcoming extreme noise:simultaneous subspace coding using high-dimensional entanglement
        Mirdit Doda (Institute for Quantum Optics and Quantum Information - IQOQI Vienna; Institute of Physics, Slovak Academy of Sciences, Bratislava, Slovakia); Marcus Huber (nstitute for Quantum Optics and Quantum Information - IQOQI Vienna,Austrian Academy of Sciences, Boltzmanngasse 3, 1090 Vienna, Austria); GlĂĄucia Murta (Institut f ̈ur Theoretische Physik III, Heinrich-Heine-Universit ̈at D ̈usseldorf,Universit ̈atsstraße 1, D-40225 D ̈usseldorf, Germany); Matej Pivoluska (Institute of Physics, Slovak Academy of Sciences, 845 11 Bratislava, Slovakia; Institute of Computer Science, Masaryk University, 602 00 Brno, Czech Republic); Martin Plesch (Institute of Physics, Slovak Academy of Sciences, 845 11 Bratislava, Slovakia; Institute of Computer Science, Masaryk University, 602 00 Brno, Czech Republic); Chrysoula Vlachou (Center for Quantum Information and Communication - QuIC,Universit ́e libre de Bruxelles, Brussels, Belgium)
        [abstract]
        Poster presented by: Chrysoula Vlachou on Floor 2
      • Capacity of Quantum Private Information Retrieval with Colluding Servers
        Seunghoan Song (Nagoya University); Masahito Hayashi (Southern University of Science and Technology)
        [abstract]
        Poster presented by: Seunghoan Song on Floor 2
      • Using QKD in MACsec for Secure Ethernet Networks
        Joo Yeon Cho (ADVA Optical Networking SE); Andrew Sergeev (ADVA Optical Networking SE)
        [abstract]
        Poster presented by: Joo Yeon Cho on Floor 2
      • Almost Public Quantum Coins
        Amit Behera (Ben-Gurion University of the Negev); Or Sattath (Ben-Gurion University of the Negev)
        [abstract]
        Poster presented by: Amit Behera on Floor 2
      • Provably secure symmetric private information retrieval with quantum cryptography
        Wen Yu Kon (National University of Singapore); Charles Ci Wen Lim (National University of Singapore)
        [abstract]
        Poster presented by: Wen Yu Kon on Floor 2
      • Tools for the Performance Optimization of Single-Photon Quantum Key Distribution
        Timm Kupko (Technische UniversitÀt Berlin); Martin v. Helversen (Technische UniversitÀt Berlin); Lucas Rickert (Technische UniversitÀt Berlin); André Strittmatter (Otto-von-Guericke UniversitÀt Magdeburg); Manuel Gschrey (Technische UniversitÀt Berlin); Sven Rodt (Technische UniversitÀt Berlin); Stephan Reitzenstein (Technische UniversitÀt Berlin); Tobias Heindel (Technische UniversitÀt Berlin)
        [abstract]
        Poster presented by: Timm Kupko on Floor 2
      • Protecting QKD sources against light-injection attacks
        Daria Ruzhitskaya (Russian Quantum Center); Anastasiya Ponosova (Russian Quantum Center); Friederike Johlinger (University of Bristol); Poompong Chaiwongkhot (University of Waterloo); Vladimir Egorov (ITMO University); Djeylan Aktas (University of Bristol); John Rarity (University of Bristol); Chris Erven (University of Bristol); Vadim Makarov (Russian Quantum Center); Anqi Huang (National University of Defense Technology)
        [abstract]
        Poster presented by: Anqi Huang on Floor 2
      • Independent security analysis of a commercial quantum random number generator Quantis from ID Quantique
        Mikhail Petrov (); Igor Radchenko (); Damian Steiger (); Renato Renner (); Matthias Troyer (); Vadim Makarov ()
        [abstract]
        Poster presented by: Mikhail Petrov on Floor 2
      • Composable Security for Multipartite Entanglement Verification
        Raja Yehia (LIP6, Sorbonne Université); Eleni Diamanti (LIP6, CNRS, Sorbonne Université); Iordanis Kerenidis (IRIF, CNRS, Université de Paris)
        [abstract]
        Poster presented by: Raja Yehia on Floor 3
      • Characterising the photon-number distribution of quantum channels with double-decoy method and its application to quantum cryptography
        Emilien Lavie (NUS/ECE Singapore); Ignatius William Primaatmaja (NUS/CQT Singapore); Charles Ci Wen Lim (NUS/ECE Singapore)
        [abstract]
        Poster presented by: Emilien Lavie on Floor 3
      • Shannon-Limit Approached Information Reconciliation for Quantum Communication
        Bang-Ying Tang (College of Computer Science and Technology, National University of Defense Technology); Bo Liu (College of Advanced Interdisciplinary Studies, National University of Defense Technology); Wan-Rong Yu (College of Computer Science and Technology, National University of Defense Technology); Chun-Qing Wu (College of Computer Science and Technology, National University of Defense Technology)
        [abstract]
        Poster presented by: Bang-Ying Tang on Floor 3
      • A simplified receiver for 32 channel wavelength-division multiplexing QKD
        Jonas Hanke (Fraunhofer Institute for Telecommunications, Heinrich-Hertz-Institute); Jasper Rödiger (Fraunhofer Institute for Telecommunications, Heinrich-Hertz-Institute); Nino Walenta (Fraunhofer Institute for Telecommunications, Heinrich-Hertz-Institute); Nicolas Perlot (Fraunhofer Institute for Telecommunications, Heinrich-Hertz-Institute); Ronald Freund (Fraunhofer Institute for Telecommunications, Heinrich-Hertz-Institute)
        [abstract]
        Poster presented by: Jonas Hanke on Floor 3
      • Trojan Horse Attack on Chip-Scale Quantum Key Distribution
        Friederike Jöhlinger (University of Bristol); Henry Semenko (University of Bristol); Djeylan Aktas (University of Bristol); Philip Sibson (KETS Quantum Security); Chris Erven (University of Bristol); John Rarity (University of Bristol)
        [abstract]
        Poster presented by: Friederike Jöhlinger on Floor 3
      • Unambiguous elimination of pairs of quantum states for quantum communication
        Ittoop Vergheese Puthoor (Institute of Photonics and Quantum Sciences, Heriot-Watt University, UK); Jonathan Crickmore (Institute of Photonics and Quantum Sciences, Heriot-Watt University, UK); Joseph Ho (Institute of Photonics and Quantum Sciences, Heriot-Watt University, UK); Berke Ricketti (Institute of Photonics and Quantum Sciences, Heriot-Watt University, UK); Sarah Croke (School of Physics and Astronomy, University of Glasgow, UK); Mark Hillery (Department of Physics and Astronomy, Hunter College of the City University of New York, USA); Alessandro Fedrizzi (Institute of Photonics and Quantum Sciences, Heriot-Watt University, UK); Erika Andersson (Institute of Photonics and Quantum Sciences, Heriot-Watt University, UK)
        [abstract]
        Poster presented by: Ittoop Vergheese Puthoor on Floor 3
      • Client-Server Identification Protocols with Quantum PUF
        Mina Doosti (School of Informatics, University of Edinburgh); Niraj Kumar (School of Informatics, University of Edinburgh); Mahshid Delavar (School of Informatics, University of Edinburgh); Elham Kashefi (School of Informatics, University of Edinburgh)
        [abstract]
        Poster presented by: Mina Doosti, Mahshid Delavar, Niraj Kumar on Floor 3
      • On Key Generation Schemes with QKD for Applications
        Mikhail Borodin (JSC InfoTeCS, Moscow, Russia); Alexey Urivskiy (JSC InfoTeCS, Moscow, Russia); Andrey Zhilyaev (JSC InfoTeCS, Moscow, Russia)
        [abstract]
        Poster presented by: Andrey Zhilyaev on Floor 3
      • Semi-Device-Independent Random Number Generation with Flexible Assumptions
        Matej Pivoluska (Institute of Computer Science, Masaryk University, Brno and Institute of Physics, Slovak Academy of Sciences, Bratislava); Martin Plesch (Institute of Computer Science, Masaryk University, Brno and Institute of Physics, Slovak Academy of Sciences, Bratislava); MĂĄtĂ© Farkas (Institute of Theoretical Physics and Astrophysics, National Quantum Information Centre, Faculty of Mathematics, Physics and Informatics, and International Centre for Theory of Quantum Technologies University of Gdansk); NatĂĄlia RuĆŸičkovĂĄ (Institute of Science and Technology, Klosterneuburg); Clara Flegel (Institute of Photonics and Quantum Sciences, Heriot-Watt University, Edinburgh); Natalia Herrera Valencia (Institute of Photonics and Quantum Sciences, Heriot-Watt University, Edinburgh); Will McCutcheon (Institute of Photonics and Quantum Sciences, Heriot-Watt University, Edinburgh); Mehul Malik (Institute of Photonics and Quantum Sciences, Heriot-Watt University, Edinburgh); Edgar A. Aguilar (Institute of Quantum Optics and Quantum Information, Austrian Academy of Sciences, Vienna)
        [abstract]
        Poster presented by: Matej Pivoluska on Floor 4
      • Covert Continuous-Variable Quantum Key Distribution
        Raphaël Aymeric (Télécom Paris); David Fainsin (Télécom Paris); Romain Alléaume (Télécom Paris)
        [abstract]
        Poster presented by: Raphaël AYMERIC on Floor 4
      • Non-restrictive state reduction and analytical bounds in a multipartite device-independent scenario
        Federico Grasselli (Heinrich-Heine-UniversitĂ€t DĂŒsseldorf); GlĂĄucia Murta (Heinrich-Heine-UniversitĂ€t DĂŒsseldorf); Hermann Kampermann (Heinrich-Heine-UniversitĂ€t DĂŒsseldorf); Dagmar Bruss (Heinrich-Heine-UniversitĂ€t DĂŒsseldorf)
        [abstract]
        Poster presented by: GlĂĄucia Murta on Floor 4
      • Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses
        Luka Music (Département Informatique et Réseaux, CNRS, Sorbonne Université); Céline Chevalier (Université Panthéon-Assas Paris 2); Elham Kashefi (Département Informatique et Réseaux, CNRS, Sorbonne Université; School of Informatics, University of Edinburgh)
        [abstract]
        Poster presented by: Luka Music on Floor 4
      • The Bitcoin Backbone Protocol Against Quantum Adversaries
        Alexandru Cojocaru (University of Edinburgh); Juan Garay (Texas A&M University); Aggelos Kiayias (University of Edinburgh and IOHK); Fang Song (Texas A&M University); Petros Wallden (University of Edinburgh)
        [abstract]
        Poster presented by: Alexandru Cojocaru on Floor 4
      • Limitations on device independent secure key via squashed non-locality
        Marek Winczewski (Institute of Theoretical Physics and Astrophysics and National Quantum Information Centre in GdaƄsk, University of GdaƄsk, 80-952 GdaƄsk, Poland International Centre for Theory of Quantum Technologies, University of GdaƄsk, 80-952 GdaƄsk, Poland); Tamoghna Das (International Centre for Theory of Quantum Technologies, University of GdaƄsk, 80-952 GdaƄsk); Karol Horodecki (International Centre for Theory of Quantum Technologies, University of GdaƄsk, 80-952 GdaƄsk, Poland and Institute of Informatics and National Quantum Information Centre in GdaƄsk, Faculty of Mathematics, Physics and Informatics, University of GdaƄsk, 80-952 GdaƄsk, Poland)
        [abstract]
        [no PDF yet]
      • Ultrafast and practical Bell-based quantum randomness generation with classical optical homodyne detection
        Chao Wang (Department of Electrical Computer Engineering, National University of Singapore, Singapore); Yukun Wang (Department of Electrical Computer Engineering, National University of Singapore, Singapore); Koon Tong Goh (Department of Electrical Computer Engineering, National University of Singapore, Singapore); Gong Zhang (Department of Electrical Computer Engineering, National University of Singapore, Singapore); Jing Yan Haw (Department of Electrical Computer Engineering, National University of Singapore, Singapore); Charles C.-W. Lim (Department of Electrical Computer Engineering, National University of Singapore, Singapore; Centre for Quantum Technologies, National University of Singapore, Singapore)
        [abstract]
        [no PDF yet]
      • Classical proofs of quantum knowledge
        Thomas Vidick (California Institute of Technology); Tina Zhang (California Institute of Technology)
        [abstract]
        Poster presented by: Tina Zhang on Floor 5
      • Robust and high-efficiency frame synchronization scheme for continuous-variable quantum key distribution with simple process
        Rui Chen (Shanghai Jiaotong University); Peng Huang (Shanghai Jiaotong University); Dengwen Li (Shanghai Jiaotong University); Guihua Zeng (Shanghai Jiaotong University)
        [abstract]
        [no PDF yet]
      • Phase compensation for free-space continuous-variable quantum key distribution
        Shiyu Wang (State Key Laboratory of Advanced Optical Communication Systems and Networks, Center of Quantum Sensing and Information Processing, Shanghai Jiao Tong University, Shanghai 200240, China); Peng Huang (State Key Laboratory of Advanced Optical Communication Systems and Networks, Center of Quantum Sensing and Information Processing, Shanghai Jiao Tong University, Shanghai 200240, China); Miaomiao Liu (State Key Laboratory of Advanced Optical Communication Systems and Networks, Center of Quantum Sensing and Information Processing, Shanghai Jiao Tong University, Shanghai 200240, China); Tao Wang (State Key Laboratory of Advanced Optical Communication Systems and Networks, Center of Quantum Sensing and Information Processing, Shanghai Jiao Tong University, Shanghai 200240, China); Ping Wang (State Key Laboratory of Advanced Optical Communication Systems and Networks, Center of Quantum Sensing and Information Processing, Shanghai Jiao Tong University, Shanghai 200240, China); Guihua Zeng (State Key Laboratory of Advanced Optical Communication Systems and Networks, Center of Quantum Sensing and Information Processing, Shanghai Jiao Tong University, Shanghai 200240, China)
        [abstract]
        Poster presented by: Shiyu Wang on Floor 5
      • Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
        WEILONG WANG (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou , China); XIANGDONG MENG (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou , China); YANGYANG FEI (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou , China); YUANHAO LI (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou , China); ZHI MA (State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou , China)
        [abstract]
        Poster presented by: WEILONG WANG on Floor 5
      • Demonstration of Real-time Transmission of Large-scale Genome Sequence Data Using Quantum Cryptography
        Akira Murakami (Corporate Research & Development Center, Toshiba Corporation); Mamiko Kujiraoka (Corporate Research & Development Center, Toshiba Corporation); Ririka Takahashi (Corporate Research & Development Center, Toshiba Corporation); Alexander R. Dixon (Corporate Research & Development Center, Toshiba Corporation); Yoshimichi Tanizawa (Corporate Research & Development Center, Toshiba Corporation); Hideaki Sato (Corporate Research & Development Center, Toshiba Corporation); Zhiliang Yuan (Cambridge Research Laboratory, Toshiba Europe Limited); Winci Tam (Cambridge Research Laboratory, Toshiba Europe Limited); Andrew Sharpe (Cambridge Research Laboratory, Toshiba Europe Limited); James Dynes (Cambridge Research Laboratory, Toshiba Europe Limited); Marco Lucamarini (Cambridge Research Laboratory, Toshiba Europe Limited); Andrew Shields (Cambridge Research Laboratory, Toshiba Europe Limited); Muneaki Shimada (Tohoku University Hospital, Tohoku University); Inaho Danjoh (Tohoku Medical Megabank Organization, Tohoku University); Fumiki Katsuoka (Tohoku Medical Megabank Organization, Tohoku University; Advanced Research Center for Innovations in Next-Generation Medicine, Tohoku University); Yasunobu Okamura (Tohoku Medical Megabank Organization, Tohoku University; Advanced Research Center for Innovations in Next-Generation Medicine, Tohoku University); Fuji Nagami (Tohoku Medical Megabank Organization, Tohoku University; Advanced Research Center for Innovations in Next-Generation Medicine, Tohoku University)
        [abstract]
      • 1550-nm free-space reference frame independent quantum key distribution system
        Kyongchun Lim (ETRI); Byung-Seok Choi (ETRI); Ju Hee Baek (ETRI); Minchul Kim (ETRI); Joong-Seon Choe (ETRI); Kap-Joong Kim (ETRI); Young-Ho Ko (ETRI); Chun Ju Youn (ETRI)
        [abstract]
        Poster presented by: Kyongchun Lim on Floor 5
      • Effect of atmospheric turbulence in CV-QKD with passive Eve
        Emma Medlock (Department of Physics, University of York); Rupesh Kumar (Department of Physics, University of York); Tim Spiller (Department of Physics, University of York)
        [abstract]
        [no PDF yet]
        Poster presented by: Emma Medlock on Floor 5
      • Simple integration of quantum and beam tracking channels for free-space quantum key distribution
        Minchul Kim (ETRI); Kyongchun Lim (ETRI); Byung-Seok Choi (ETRI); Joong-Seon Choe (ETRI); Kap-Joong Kim (ETRI); Young-Ho Ko (ETRI); Ju Hee Baek (ETRI); Chun Ju Youn (ETRI)
        [abstract]
        Poster presented by: Minchul Kim on Floor 6
      • Increasing loss-budget of a free-space CVQKD system
        Igor Konieczniak (University of York); Rupesh Kumar (University of York); Gerald Bonner (Fraunhofer Centre for Applied Photonics); Tim Spiller (University of York)
        [abstract]
        Poster presented by: Igor Konieczniak on Floor 6
      • Standardization and Certification of QKD-Devices and QKD-Networks
        Oliver Maurhart (AIT); Thomas LĂ€nger (AIT); Andreas Poppe (AIT); Christoph Pacher (AIT); Martin Stierle (AIT); Helmut Leopold (AIT)
        [abstract]
      • Simple Method for Asymmetric Twin-Field Quantum Key Distribution
        Wenyuan Wang (Centre for Quantum Information and Quantum Control (CQIQC), Dept. of Electrical & Computer Engineering and Dept. of Physics, University of Toronto, Toronto, Ontario, M5S 3G4, Canada; Current address: Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1); Hoi-Kwong Lo (Centre for Quantum Information and Quantum Control (CQIQC), Dept. of Electrical & Computer Engineering and Dept. of Physics, University of Toronto, Toronto, Ontario, M5S 3G4, Canada)
        [abstract]
        Poster presented by: Wenyuan Wang on Floor 6
      • A high efficiency reconciliation method for free-space continuous-variable QKD based on rate compatible codes
        Chao Zhou (Beijing University of Posts and Telecommunications (BUPT)); Xiangyu Wang (Beijing University of Posts and Telecommunications (BUPT)); Yichen Zhang (Beijing University of Posts and Telecommunications (BUPT)); Zhiguo Zhang (Beijing University of Posts and Telecommunications (BUPT)); Song Yu (Beijing University of Posts and Telecommunications (BUPT)); Hong Guo (Peking University)
        [abstract]
        Poster presented by: Chao Zhou on Floor 6
      • An upstream access network based on continuous-variable quantum key distribution
        Yundi Huang (Beijing University of Posts and Telecommunications); Yichen Zhang (Beijing University of Posts and Telecommunications); Tao Shen (Beijing University of Posts and Telecommunications); Ge Huang (Beijing University of Posts and Telecommunications); Song Yu (Beijing University of Posts and Telecommunications); Hong Guo (Peking University)
        [abstract]
        Poster presented by: Yundi Huang on Floor 6
      • Dual-polarization continuous-variable quantum key distribution with discrete modulation
        Binjie Chu (Beijing University of Posts and Telecommunications); Yichen Zhang (Beijing University of Posts and Telecommunications); Yifan Xu (Beijing University of Posts and Telecommunications); Song Yu (Beijing University of Posts and Telecommunications); Hong Guo (Peking University)
        [abstract]
        Poster presented by: Binjie Chu on Floor 6