Contributed Talks 1b

Mon, 2 Sep , 14:40 - 16:00
    • Mutual information chain rules for security proofs robust against device imperfections
      Amir Arqand (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Tony Metger (Institute for Theoretical Physics, ETH Zurich); and Ernest Y.-Z. Tan (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo)
      [abstract]
    • Tighter concentration inequalities for quantum adversarial setups exploiting permutation symmetry
      Takaya Matsuura (RMIT University); Shinichiro Yamano (The University of Tokyo); Yui Kuramochi (Kyushu University); Toshihiko Sasaki (The University of Tokyo); Masato Koashi (The University of Tokyo)
      [abstract]
    • Security Proof for Variable-Length Quantum Key Distribution
      Devashish Tupkary (Institute for Quantum Computing); Ernest Y.-Z. Tan (Institute for Quantum Computing); Norbert Lütkenhaus (Institute for Quantum Computing)
      [abstract]
      merged with
      Variable-length QKD security proof for imperfect detectors through phase-error estimation
      Devashish Tupkary (Institute for Quantum Computing); Shlok Nahar (Institute for Quantum Computing); Pulkit Sinha (Institute for Quantum Computing); Norbert Lutkenhaus (Institute for Quantum Computing)
      [abstract]
    • Security of hybrid BB84 with heterodyne detection
      Jasminder Sidhu (University of Strathclyde); Rocco Maggi (Politecnico di Bari); Saverio Pascazio (Universita di Bari); Cosmo Lupo (Politecnico di Bari)
      [abstract]