{"id":4532,"date":"2019-07-25T10:33:48","date_gmt":"2019-07-25T01:33:48","guid":{"rendered":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/?post_type=tribe_events&p=4532"},"modified":"2020-03-13T15:00:00","modified_gmt":"2020-03-13T06:00:00","slug":"2019a009","status":"publish","type":"tribe_events","link":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/event\/2019a009\/","title":{"rendered":"International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC 2019)"},"content":{"rendered":"

International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC 2019)<\/strong><\/span><\/p>\n

\u25a0\u65e5\u6642\uff1a2019\u5e749\u670825\u65e5\uff08\u6c34\uff09\uff5e 27\u65e5\uff08\u91d1\uff09
\n\u25a0\u4f1a\u5834\uff1a
\n\u4e5d\u5dde\u5927\u5b66\u30de\u30b9\u30fb\u30d5\u30a9\u30a2\u30fb\u30a4\u30f3\u30c0\u30b9\u30c8\u30ea\u7814\u7a76\u6240
\nIMI\u30aa\u30fc\u30c7\u30a3\u30c8\u30ea\u30a2\u30e0 \uff08\u30a6\u30a7\u30b9\u30c8\u4e00\u53f7\u9928 D-413\uff09<\/p>\n

\u25a0\u30d7\u30ed\u30b0\u30e9\u30e0\uff1ahttps:\/\/www.mqc2019.org\/mqc2019\/program<\/a><\/span><\/p>\n

September 25<\/strong><\/em><\/span>
\n11:30-13:00 Registration
\n13:00-13:15 Opening
\n13:15-14:15 Keynote Address 1
\nSustainable Cryptography<\/strong>
\nJohannes Buchmann (Technical University of Darmstadt)
\n14:20-15:50 Session 1
\nQuantum Random Numbers generated by a Cloud Superconducting Quantum Computer<\/strong>
\nYutaka Shikano (Keio University)
\nQuantum Factoring Algorithm: Resource Estimation and Survey of Experiments<\/strong>
\nNoboru Kunihiro (University of Tsukuba)
\n15:50-16:20 Coffee Break
\n16:20-17:50 Session 2
\nA Review of Secret Key Distribution Based on Bounded Observability<\/strong>
\nJun Muramatsu (NTT Communication Science Laboratories)
\nTowards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory<\/strong>
\nKoji Nuida (The University of Tokyo)
\nSeptember 26<\/strong> <\/em><\/span>
\n9:00-9:45 Registration
\n9:45-10:45 Keynote Address 2
\nWhat kind of insight provide analytical solutions of quantum models?<\/strong>
\nDaniel Braak (Max Planck Institute)
\n10:50-12:20 Session 3
\nNumber theoretic study in quantum interactions.<\/strong>
\nMasato Wakayama (Kyushu University)
\nFrom the Bloch sphere to phase space representations with the Gottesman-Kitaev-Preskill encoding<\/strong>
\nLaura Garc\u00eda \u00c1lvarez (Chalmers University of Technology), Alessandro Ferraro (Queen’s University Belfast), Giulia Ferrini (Chalmers University of Technology)
\n12:20-13:50 Lunch
\n13:50-15:20 Session 4
\nMatroid Parity<\/strong>
\nSatoru Iwata (The University of Tokyo)
\nVerified numerical computations and related applications<\/strong>
\nShin’ichi Oishi (Waseda University) 15:20-15:50 Coffee Break
\n15:50-17:20 Session 5
\nA Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge<\/strong>
\nMasaya Yasuda (Kyushu University)
\nRecent developments in multivariate public key cryptosystems<\/strong>
\nYasufumi Hashimoto (University of the Ryukyus)
\n18:30- Banquet Ishikura-shuzou Hakata-hyakunengura (\u77f3\u8535\u9152\u9020 \u535a\u591a\u767e\u5e74\u8535) Free shuttle bus from symposium venue.
\nSeptember 27<\/strong><\/em><\/span>
\n9:00-9:45 Registration
\n9:45-10:45 Keynote Address 3
\nEmerging ultrastrong coupling between light and matter observed in circuit quantum electrodynamics<\/strong>
\nKouichi Semba (NICT)
\n10:50-12:20 Session 6
\nSecuring Data by Noise-Disturbance in the Light of Quantum Sensing Device<\/strong>
\nMasao Hirokawa (Hiroshima University)
\nQuantum optics with giant atoms — the first five years<\/strong>
\nAnton Frisk Kockum (Chalmers University of Technology)
\n12:20-13:50 Lunch
\n13:50-15:20 Session 7
\nExtended divisibility relations for constraint polynomials of the asymmetric quantum Rabi model<\/strong>
\nCid Reyes-Bustos (Tokyo Institute of Technology)
\nGeneralized group-subgroup pair graphs<\/strong>
\nKazufumi Kimoto (University of the Ryukyus)
\n15:20-15:50 Coffee Break
\n15:50-17:20 Session 8
\nRamanujan graphs for post-quantum cryptography<\/strong>
\nHyungrok Jo (University of Tsukuba), Shingo Sugiyama (Nihon University), Yoshinori Yamasaki (Ehime University)
\nPost-Quantum Constant-Round Group Key Exchange from Static Assumptions<\/strong>
\nKatsuyuki Takashima (Mitsubishi Electric Corporation)
\n17:20-17:30 Closing<\/div>\n

\u25a0\u7814\u7a76\u4f1a\u30a6\u30a7\u30d6\u30da\u30fc\u30b8\uff1a
\n
https:\/\/www.mqc2019.org<\/a><\/p>\n

\u25a0\u53c2\u52a0\u7533\u8fbc\uff1a\uff08\u7533\u3057\u8fbc\u307f\u306f\u7d42\u4e86\u3057\u307e\u3057\u305f\uff09
\nhttps:\/\/www.mqc2019.org\/mqc2019\/registration<\/p>\n

\u25a0\u7814\u7a76\u4f1a\u306b\u3064\u3044\u3066\uff1a
\nMQC 2019 deals with all technical aspects of mathematical cryptography secure in the era of quantum computers. The topics include: (1) Mathematics and quantum theory for the next-generation cryptography such as: number theory, algebraic geometry, lattice theory, representation theory, multivariate polynomial theory, quantum computation, mathematical physics, and probability theory; (2) Cryptosystems that have the potential to be safe against quantum computers such as: hash-based signature schemes, lattice-based cryptosystems, code-based cryptosystems, and multivariate cryptosystems.<\/p>\n

\u25a0\u4e3b\u50ac\uff1aCREST\u6697\u53f7\u6570\u7406\u30d7\u30ed\u30b8\u30a7\u30af\u30c8
\n
https:\/\/cryptomath-crest.jp\/english\/<\/a><\/p>\n

\u25a0\u5171\u50ac\uff1aJST, \u4e5d\u5dde\u5927\u5b66<\/p>\n

\u25a0\u63a1\u629e\u756a\u53f7\uff1a2019A009<\/p>\n","protected":false},"excerpt":{"rendered":"

International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC 2019) \u25a0\u65e5\u6642\uff1a2019\u5e749\u670825\u65e5\uff08\u6c34\uff09\uff5e 27\u65e5\uff08\u91d1\uff09 […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_tribe_events_status":"","_tribe_events_status_reason":""},"tags":[],"tribe_events_cat":[39,34],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/tribe_events\/4532"}],"collection":[{"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/comments?post=4532"}],"version-history":[{"count":8,"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/tribe_events\/4532\/revisions"}],"predecessor-version":[{"id":5738,"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/tribe_events\/4532\/revisions\/5738"}],"wp:attachment":[{"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/media?parent=4532"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/tags?post=4532"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/aimap.imi.kyushu-u.ac.jp\/wp\/wp-json\/wp\/v2\/tribe_events_cat?post=4532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}