Monday, 25 Aug 202508 45 Welcome Remark 09 00 Tutorial Talk: Security proofs for decoy-state BB84 and their performance Devashish Tupkary10 15 Invited Talk: Microsatellite-based quantum key distribution and beyond Yang Li11 00 Coffee Break 11 30 Invited Talk: Surpassing the loss-noise robustness trade-off in QKD Hannah Seabrook12 15 Contributed Talk 1a Experimental mode-pairing quantum key distribution surpassing the repeaterless boundLikang Zhang; Wei Li; Jiawei Pan; Yichen Lu; Wenwen Li; Zheng-Ping Li; Yizhi Huang; Xiongfeng Ma; Feihu Xu; Jianwei Pan12 35 Lunch 14 00 Contributed Talk 1b High-Rate Asynchronous Measurement-Device-Independent Quantum Communication without Optical Reference LightShanfeng Shao; Jinping Lin; Chengfang Ge; Mariella Minder; Yuan-Mei Xie; Ao Shen; Zhengyu Yan; Hua-Lei Yin; Lai Zhou; Zhiliang YuanChip-Based 16 GBaud Continuous-Variable Quantum Key DistributionAdnan Hajomer; Ivan Derkach; Ulrik L. Andersen; Axl Bomhals; C´edric Bruynsteen; Aboobackkar Sidhique; Xin Yin; Tobias Gehring†Chip-integrated quantum signature network over 200 kmYongqiang Du; Bing-Hong Li; Xin Hua; Xiao-Yu Cao; Zhengeng Zhao; Feng Xie; Zhenrong Zhang; Hua-Lei Yin; Xi Xiao; Kejin WeiReference-frame-independent quantum key distribution based on machine-learning-enhanced qubit-based synchronizationYe Chen; Zhiyu; Xiaodong; Ziran; Shihai15 20 Coffee Break 15 50 Contributed Talk 1c A Framework for the Security Analysis of Practical High-Dimensional QKD SetupsFlorian Kanitschar; Marcus HuberMaximal device-independent randomness in every dimensionMáté Farkas; Jurij Volčič; Sigurd Anker Laursen Storgaard; Ranyiliu Chen; Laura MančinskaSelf-testing tilted strategies for maximal loophole-free nonlocalityNicolas Gigena; Ekta Panwar; Giovanni Scala; Mateus Araújo; Máté Farkas; Anubhav ChaturvediComputational quantum unpredictability entropy and quantum leakage resilienceNoam Avidan; Rotem ArnonRenyi security framework against coherent attacks applied to decoy-state QKDLars Kamin; John Burniston; Ernest Y.-Z. Tan17 30 Group photo & Poster 18 30 Welcome Reception
Tuesday, 26 Aug 202509 00 Tutorial Talk: Advances in Quantum Random Number Generation Giuseppe Vallone10 15 Invited Talk: Quantum secure microwave communication Kirill Fedorov11 00 Coffee Break 11 30 Invited Talk: Optical Quantum Network using Drones Zhenda Xie12 15 Contributed Talk 2a Frequency-bin entanglement-based quantum key distributionGiulia Guarda; Noemi Tagliavacche; Massimo Borghi; Domenico Ribezzo; Marco Liscidini; Davide Bacco; Matteo Galli; Daniele Bajoni12 35 Lunch 14 00 Contributed Talk 2b Implementation of carrier-grade quantum communication networks over 10000 km: from Shanghai-Beijing Backbone to China quantum communication networkHao-Ze Chen; Ming-Han Li; Yu-Zhou Wang; Zhen-Geng Zhao; Cheng Ye; Fei-Long Li; Zhu Chen; Sheng-Long Han; Bao Tang; Ya-Jun Miao; Wei QiNQSN Singapore: A fully interoperable quantum-safe network testbed with versatile reference applicationsHao Qin; Jing Yan Haw; M. Wee; R. Frappier; C. Liang; X. Duan; Y. Cai; S. Sarda; K.W. Qiu; R. Murthy; T. Rimprongern; B. Sikdar; N. Ng; C. Kurtsiefer; M. Kasper; A. LingDynamic rerouting of quantum key distribution links during live operationJan Krause; Stephanie Renneke; Jonas Hilt; Oliver Peters; Peter Hanne; Andy Schreier; Ronald Freund; Nino WalentaExperimental Quantum Channel PurificationYueyang Fei; Zhenhuan Liu; Rui Zhang; Yu-Ao Chen15 20 Coffee Break 15 50 Contributed Talk 2c Anonymous Quantum Money, (Upgradeable) Quantum Coins, and Quantum VotingAlper Cakan; Vipul Goyal; Takashi YamakawaPublic-Key Quantum Fire From Classical OraclesAlper Cakan; Vipul Goyal; Omri ShmueliOrthogonality Broadcasting and Quantum Position VerificationIan George; Rene Allerstorfer; Philip Verduyn Lunel; Eric ChitambarImpossibility of Hyperefficient Shadow Tomography: Unbounded Multiple-Copy Secure Copy-ProtectionAlper Cakan; Vipul Goyal17 10 Poster 18 30 Banquet After Dinner Talk: Gilles Brassard
Wednesday, 27 Aug 202509 00 Tutorial Talk: Twin-field quantum key distribution experiments Yang Liu10 15 Invited Talk: Field trial of TF-QKD using independent optical frequency combs Lai Zhou11 00 Coffee Break 11 30 Invited Talk: Long-range quantum correlations and DIQKD in routed Bell scenarios Jef Pauwels12 15 Contributed Talk 3a Simpler and Tighter Device-Independent Security ProofsThomas Hahn; Amir Arqand; Ernest Tan; Peter Brown12 35 Lunch 14 00 Tour and Excursion 18 00 Dinner
Thursday, 28 Aug 202509 00 Tutorial Talk: Quantum position verification: where are we now? Florian Speelman10 15 Invited Talk: Anonymous communication in quantum networks Murta Guimaraes, Gláucia11 00 Coffee Break 11 30 Invited Talk: A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire Barak Nehoran12 15 Contributed Talk 4a Experimental Private Quantum SensingNicolas Laurent-Puig; Laura dos Santos Martins; Luis Bugalho; Santiago Scheiner; Majid Hassani; Sean Moore; Damian Markham; Eleni Diamanti12 35 Lunch 14 00 Industry Panel Haeseong LeeCharles LimGillian MakamaraHao QinQiang Zhang15 20 Coffee Break 15 50 Contributed Talk 4b Implementation security of quantum key distribution transmittersFeng-Yu Lu; Jia-Xuan Li; Ze-Hao Wang; Shuang Wang; Zhen-Qiang Yin; De-Yong He; Wei-Chen; Zheng-Fu Han; Guang-Can GuoPlug-and-play attack on a quantum key distribution system as black boxAnqi Huang; Qingquan Peng; Xialong Yuan; Junxuan Liu; Yichen Liu; Zihao Chen; Vadim~MakarovSuccinct Perfect Zero-knowledge for MIP*Xingjian Zhang; Honghao FuQuantum Lifting for Invertible Permutations and Ideal CiphersAlexandru Cojocaru; Minki Hhan; Qipeng Liu; Takashi Yamakawa; Aaram Yun17 10 Awards and Business Meeting 18 00 Dinner 19 00 Public Lecture Public Lecture by Jian-Wei Pan (40 min.)
Friday, 29 Aug 202509 00 Contributed Talk 5a Formulations and Constructions of Remote State Preparation with Verifiability, with ApplicationsJiayu ZhangA robust and composable device-independent protocol for oblivious transfer using (fully) untrusted quantum devices in the bounded storage modelRishabh Batra; Sayantan Chakraborty; Rahul Jain; Upendra KapshikarAll-day free-space quantum key distribution with continuous variablesTianxiang Zhan; Peng HuangMarginal-constrained entropy accumulation theoremAmir Arqand; Ernest Y.-Z. Tan10 20 Coffee Break 10 50 Contributed Talk 5b A Quantum Approach For Reducing Communications in Classical Secure Computations with Long OutputsJiayu ZhangNISQ Security and Complexity via Simple Classical ReasoningAlexandru Cojocaru; Juan Garay; Qipeng Liu; Fang SongInformation Theoretic One-Time Programs from Geometrically Local QNC0 AdversariesLev Stambler12 10 Closing Remark 12 40 Lunch