Quantum Cryptography in Algorithmica

In this talk, I will introduce a new security property of a cryptographic hash function that is useful for quantum cryptography. This property (1) suffices to construct pseudorandom quantum states, (2) holds for a random oracle, and thus plausibly holds for existing hash functions like SHA3, and (3) is independent of the P vs. NP question in the black box setting. This offers further evidence that one-way functions are not necessary for computationally-secure quantum cryptography. Our proof builds on recent work of Aaronson, Ingram, and Kretschmer (2022).

Everything you always wanted to know about papers (the human side of physics)

Physics is a human activity. Doing hard science involves not only having ideas and taking data, but also convincing your peers by communicating your results in a clear fashion. In this talk, I will offer a bit of the editorial perspective from PRL on how scientific knowledge is established in papers. Our main topic will be the way papers are conceived, treated by editors, assessed by peers, and finally published.

Publicly Verifiable Quantum Money from Random Lattices

Publicly verifiable quantum money is a protocol for the preparation of quantum states that can be efficiently verified by any party for authenticity but is computationally infeasible to counterfeit. We develop a cryptographic scheme for publicly verifiable quantum money based on Gaussian superpositions over random lattices.

Uncertainty Relations from Graph Theory

Quantum measurements are inherently probabilistic. Further defying our classical intuition, quantum theory often forbids us to precisely determine the outcomes of simultaneous measurements. This phenomenon is captured and quantified through uncertainty relations. Although studied since the inception of quantum theory, this problem of determining the possible expectation values of a collection of quantum measurements remains, in general, unsolved.

Strong converse bounds for compression of mixed states

The optimal rates for compression of mixed states was found by Koashi and Imoto in 2001 for the blind case and by Horodecki and independently by Hayashi for the visible case respectively in 2000 and 2006. However, it was not known so far whether the strong converse property holds for these compression problems. In this work, we show that the strong converse holds for the blind compression scheme. For the visible scheme, the strong converse holds up to the continuity of the regularized Renyi entanglement of purification.

General guarantees for non-uniform randomized benchmarking and applications to analog simulators

Randomized benchmarking protocols have become the prominent tool for assessing the quality of gates on digital quantum computing platforms.  In `classical' variants of randomized benchmarking multi-qubit gates are drawn uniformly from a finite group.  The functioning of such schemes be rigorous guaranteed under realistic assumptions.  In contrast, experimentally attractive and practically more scalable randomized benchmarking schemes often directly perform random circuits or use other non-uniform probability measures.