Tuesday, 26 Aug 202508 30 Welcome Remark 08 40 Tutorial Talk: Security proofs for decoy-state BB84 and their performance Chair: Thomas HahnDevashish Tupkary09 55 Invited Talk: Quantum secure microwave communication Chair: Thomas HahnKirill Fedorov10 40 Coffee Break 11 10 Invited Talk: Optical Quantum Network using Drones Chair: Yu-Huai LiZhenda Xie11 55 Contributed Talk 2a Chair: Yu-Huai LiFrequency-bin entanglement-based quantum key distributionGiulia Guarda; Noemi Tagliavacche; Massimo Borghi; Domenico Ribezzo; Marco Liscidini; Davide Bacco; Matteo Galli; Daniele BajoniChip-integrated quantum signature network over 200 km (original 1b/3)Yongqiang Du; Bing-Hong Li; Xin Hua; Xiao-Yu Cao; Zhengeng Zhao; Feng Xie; Zhenrong Zhang; Hua-Lei Yin; Xi Xiao; Kejin Wei12 35 Lunch 14 00 Contributed Talk 2b Chair: Zhenda XieImplementation of carrier-grade quantum communication networks over 10000 km: from Shanghai-Beijing Backbone to China quantum communication networkHao-Ze Chen; Ming-Han Li; Yu-Zhou Wang; Zhen-Geng Zhao; Cheng Ye; Fei-Long Li; Zhu Chen; Sheng-Long Han; Bao Tang; Ya-Jun Miao; Wei QiOrthogonality Broadcasting and Quantum Position VerificationIan George; Rene Allerstorfer; Philip Verduyn Lunel; Eric ChitambarDynamic rerouting of quantum key distribution links during live operationJan Krause; Stephanie Renneke; Jonas Hilt; Oliver Peters; Peter Hanne; Andy Schreier; Ronald Freund; Nino WalentaExperimental Quantum Channel PurificationYueyang Fei; Zhenhuan Liu; Rui Zhang; Yu-Ao Chen15 20 Coffee Break 15 50 Tutorial Talk: Twin-field quantum key distribution experiments Chair: Christian MajenzYang Liu17 05 Group photo & Poster (Even Number) Posters can mounted in C Hall (next to the conference venue D Hall) after 5 p.m. on Sunday, August 24th.All posters are recommended to remain on display throughout the conference until its end.On Tuesday, August 26th, even-numbered posters are required to have their poster presentation.On Wednesday, August 27th, odd-numbered posters are required to have their poster presentation.18 25 Banquet 19 30 After dinner talk: Two quantum tales Chair: Qiang ZhangGilles Brassard
Wednesday, 27 Aug 202508 40 Invited Talk: Field trial of TF-QKD using independent optical frequency combs Chair: Giuseppe ValloneLai Zhou09 25 Contributed Talk 3a (original 2c) Chair: Giuseppe ValloneAnonymous Quantum Money, (Upgradeable) Quantum Coins, and Quantum VotingAlper Cakan; Vipul Goyal; Takashi YamakawaMaximal device-independent randomness in every dimension (original 1c/1)Máté Farkas; Jurij Volčič; Sigurd Anker Laursen Storgaard; Ranyiliu Chen; Laura MančinskaImpossibility of Hyperefficient Shadow Tomography: Unbounded Multiple-Copy Secure Copy-ProtectionAlper Cakan; Vipul GoyalNQSN Singapore: A fully interoperable quantum-safe network testbed with versatile reference applicationsHao Qin; Jing Yan Haw; M. Wee; R. Frappier; C. Liang; X. Duan; Y. Cai; S. Sarda; K.W. Qiu; R. Murthy; T. Rimprongern; B. Sikdar; N. Ng; C. Kurtsiefer; M. Kasper; A. Ling10 45 Coffee Break 11 10 Invited Talk: Long-range quantum correlations and DIQKD in routed Bell scenarios Chair: Gláucia MurtaJef Pauwels11 55 Contributed Talk 3b (original 3a) Chair: Gláucia MurtaSimpler and Tighter Device-Independent Security ProofsThomas Hahn; Amir Arqand; Ernest Tan; Peter BrownComputational quantum unpredictability entropy and quantum leakage resilience (original 1c/3)Noam Avidan; Rotem Arnon12 35 Lunch 14 00 Tutorial Talk: Advances in Quantum Random Number Generation Chair: Davide RuscaGiuseppe Vallone15 15 Coffee Break 15 45 Invited Talk: Microsatellite-based quantum key distribution and beyond Chair: Feihu XuYang Li16 30 Invited Talk: Surpassing the loss-noise robustness trade-off in QKD Chair: Feihu XuHannah Seabrook17 15 Contributed Talk 3c (original 1a) Chair: Feihu XuExperimental mode-pairing quantum key distribution surpassing the repeaterless boundLikang Zhang; Wei Li; Jiawei Pan; Yichen Lu; Wenwen Li; Zheng-Ping Li; Yizhi Huang; Xiongfeng Ma; Feihu Xu; Jianwei PanChip-Based 16 GBaud Continuous-Variable Quantum Key Distribution (original 1b/2)Adnan Hajomer; Ivan Derkach; Ulrik L. Andersen; Axl Bomhals; C´edric Bruynsteen; Aboobackkar Sidhique; Xin Yin; Tobias Gehring†17 55 Poster (Odd Number) Posters can mounted in C Hall (next to the conference venue D Hall) after 5 p.m. on Sunday, August 24th.All posters are recommended to remain on display throughout the conference until its end.On Wednesday, August 27th, odd-numbered posters are required to have their poster presentation.On Tuesday, August 26th, even-numbered posters are required to have their poster presentation.19 00 Dinner
Thursday, 28 Aug 202508 40 Tutorial Talk: Quantum position verification: where are we now? Chair: Ian GeorgeFlorian Speelman09 55 Invited Talk: Anonymous communication in quantum networks Chair: Ian GeorgeGláucia Murta10 40 Coffee Break 11 10 Invited Talk: A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire Chair: Kirill FedorovBarak Nehoran11 55 Contributed Talk 4a Chair: Kirill FedorovExperimental Private Quantum SensingNicolas Laurent-Puig; Laura dos Santos Martins; Luis Bugalho; Santiago Scheiner; Majid Hassani; Sean Moore; Damian Markham; Eleni DiamantiRenyi security framework against coherent attacks applied to decoy-state QKD (original 1c/4)Lars Kamin; John Burniston; Ernest Y.-Z. Tan12 35 Lunch 14 00 Industry Panel Chair: Charles LimHaeseong LeeCharles LimGillian MakamaraHao QinQiang Zhang14 45 Contributed Talk 4b Chair: Devashish TupkaryPublic-Key Quantum Fire From Classical OraclesAlper Cakan; Vipul Goyal; Omri ShmueliSelf-testing tilted strategies for maximal loophole-free nonlocality (original 1c/2)Nicolas Gigena; Ekta Panwar; Giovanni Scala; Mateus Araújo; Máté Farkas; Anubhav Chaturvedi15 25 Coffee Break 15 50 Contributed Talk 4c (original 4b) Chair: Christian MajenzImplementation security of quantum key distribution transmittersFeng-Yu Lu; Jia-Xuan Li; Ze-Hao Wang; Shuang Wang; Zhen-Qiang Yin; De-Yong He; Wei-Chen; Zheng-Fu Han; Guang-Can GuoPlug-and-play attack on a quantum key distribution system as black boxAnqi Huang; Qingquan Peng; Xialong Yuan; Junxuan Liu; Yichen Liu; Zihao Chen; Vadim~MakarovQuantum Lifting for Invertible Permutations and Ideal CiphersAlexandru Cojocaru; Minki Hhan; Qipeng Liu; Takashi Yamakawa; Aaram Yun16 50 Awards and Business Meeting 18 20 Dinner 19 30 Public Lecture: Dream or Reality? Quantum Information Processing the Past, Present and Beyond Chair: Marco LucamariniJian-Wei Pan
Friday, 29 Aug 202508 40 Contributed Talk 5a Chair: Máté FarkasSuccinct Perfect Zero-knowledge for MIP*Xingjian Zhang; Honghao FuFormulations and Constructions of Remote State Preparation with Verifiability, with ApplicationsJiayu ZhangA Framework for the Security Analysis of Practical High-Dimensional QKD Setups (Remote)Florian Kanitschar; Marcus HuberMarginal-constrained entropy accumulation theorem (Remote)Amir Arqand; Ernest Y.-Z. TanHigh-Rate Asynchronous Measurement-Device-Independent Quantum Communication without Optical Reference Light (original 1b/1)Shanfeng Shao; Jinping Lin; Chengfang Ge; Mariella Minder; Yuan-Mei Xie; Ao Shen; Zhengyu Yan; Hua-Lei Yin; Lai Zhou; Zhiliang YuanReference-frame-independent quantum key distribution based on machine-learning-enhanced qubit-based synchronization (original 1b/4)Ye Chen; Zhiyu; Xiaodong; Ziran; Shihai10 40 Coffee Break 11 00 Contributed Talk 5b Chair: Yang LiuAll-day free-space quantum key distribution with continuous variablesTianxiang Zhan; Peng HuangA Quantum Approach For Reducing Communications in Classical Secure Computations with Long OutputsJiayu ZhangNISQ Security and Complexity via Simple Classical ReasoningAlexandru Cojocaru; Juan Garay; Qipeng Liu; Fang SongInformation Theoretic One-Time Programs from Geometrically Local QNC0 AdversariesLev StamblerA robust and composable device-independent protocol for oblivious transfer using (fully) untrusted quantum devices in the bounded storage modelRishabh Batra; Sayantan Chakraborty; Rahul Jain; Upendra Kapshikar12 40 Closing Remark 12 50 Lunch