THE FAMOUS, THE BIT AND THE QUANTUM
CQT Annual Symposium 2011
Date:Wednesday, 7 December 2011
Venue:NUS Kent Ridge, University Hall Auditorium, Level 2, Lee Kong Chian Wing
Location of the Auditorium can be found at:
Programme:3pm: Controlling and Exploring Quantum Gases at the Single Atom Level
By: Immanuel BLOCH, Max-Planck-Institut für Quantenoptik
Abstract: Over the past years, ultracold quantum gases in optical lattices have offered remarkable opportunities to investigate static and dynamic properties of strongly correlated bosonic or fermionic quantum many-body systems. In this talk I will show how it has recently not only become possible to image such quantum gases with single atom sensitivity and single site resolution, but also how it is now possible to coherently control single atoms on individual lattice sites, how one can measure hidden order parameters and how one can follow the propagation of entangled quasiparticles in a many-body setting. In addition I will present recent results on the generation of strong effective magnetic fields for ultracold atoms in optical lattices, which has opened a new avenue for realizing fractional quantum Hall like states with atomic gases.
4.15pm: Coffee/Tea Break
4.30pm: Position-based cryptography
By: Harry BUHRMAN, Centrum Wiskunde & Informatica (CWI) & University of Amsterdam
Abstract: Position-based cryptography uses the geographic position of a party as its sole credential. Normally digital keys or biometric features are used. A central building block in position-based cryptography is that of position-verification. The goal is to prove to a set of verifier that one is at a certain geographical location. Protocols typically assume that messages can not travel faster than the speed of light. By responding to a verier in a timely manner one can guarantee that one is within a certain distance of that verifier. Quite recently it was shown that position-verification protocols only based on this relativistic principle can be broken by two attackers who simulate being at a the claimed position while physically residing elsewhere in space. Because of the no-cloning property of quantum information (qubits) it was believed that with the use of quantum messages one could devise protocols that were resistant to such collaborative attacks. Several schemes were proposed that later turned out to be insecure. Finally it was shown that also in the quantum case no unconditionally secure scheme is possible. We will review the field of position-based quantum cryptography and highlight some of the research currently going on in order to develop, using reasonable assumptions on the capabilities of the attackers, protocols that are secure in practice.
5.45pm: Coffee/Tea Break
6pm: Probabilities versus Amplitudes
By: John BAEZ, University of California, Riverside & Centre for Quantum Technologies, NUS
Abstract: Some ideas from quantum theory are just beginning to percolate back to classical probability theory. For example, there is a widely used and successful theory of "chemical reaction networks", which describes the interactions of molecules in a stochastic rather than quantum way. If we look at it from the perspective of quantum theory, this turns out to involve creation and annihilation operators, coherent states and other well-known ideas - but with a few big differences. The stochastic analogue of quantum field theory is also used in population biology, and here the connection is well-known. But what does it mean to treat wolves as fermions or bosons?
Register @ http://www.quantumlah.org/symposium