On the next Q+ Hangout

The next Q+ hangout is all set to run on 22nd April, 14:00 UTC+1. Surprisingly, the topic this time “On the Uncertainty of the Ordering of Nonlocal Wavefunction Collapse when Relativity is Considered”, which I had earlier read through and found to be highly interesting and no less entangled, no pun.

In the EPR experiment, if Alice makes a measurement on her particle then the state of Bob’s particle collapses to the result anti-correlated to Alice’s measurement. This process is said to be  happen instantaneously.

This ‘instantaneous’ gives rise to a paradox. For example, if in one reference frame Alice measures first then Bob’s state collapses. In a different inertial frame, an observer might say that Bob measured first leading to the collapse of Alice’s state. This leads to the identity paradox for who collapsed whose first!

This paper uses a type of clock device that functions on the laws of quantum-mechanics. This device in the experiment keeps the above paradox from occurring.

The bottom line being that in the experiment, Alice and Bob’s measurements cannot be made with infinite precision, rather they are constrained due to the energy-time uncertainty principle. Since energy and time are not relativistic invariant quantities, different observers in different reference frames must transform their uncertainty principles accordingly.

Concluding the paper rightfully claims the uncertainty principle in time always outruns the time difference induced by the change in reference frames. Neither Alice nor Bob will ever, with certainty, observe the two measurements swap temporal order. Furthermore, it can be said that  if a time measurement performed an entangled biphoton is simultaneous in one shared reference frame then it can be considered simultaneous to all measuring observers who do not share a reference frame.

On a personal note, it was only while going through the paper I thought about the time it takes for a EPR photon to collapse when measurement taken on its pair. People have already calculated it experimentally. This hangout already sounds like exciting, fingers crossed that I can attend it uninterrupted this time, have a couple of questions for the presenter.

Further Reading

On the Uncertainty of the Ordering of Nonlocal Wavefunction Collapse when Relativity is Considered arXiv:1310.4956 [quant-ph]

The Uncertainty Relation Between Energy and Time in Non-relativistic Quantum Mechanics DOI: 10.1007/978-3-642-74626-0_8

Experimental test of relativistic quantum state collapse with moving reference frames DOI: 10.1088/0305-4470/34/35/334


Intensive course: Quantum computing, logic and cognition

I have just submitted application for registration for Sixth International Summer School in Cognitive Sciences and Semantics. To be more specific, for the intensive course: Quantum computing, logic and cognition.

This school takes place at University of Latvia in Riga from 27 July to 29 July. And tuition fee is 100 Euro which will cover meals and coffee breaks.

For more information: http://www.lu.lv/isscss/

CFP: Seminar on the Philosophical Foundations of Quantum Gravity

26-28 September 2013 – University of Illinois at Chicago

Invited Speaker : Jeremy Butterfield (Cambridge), Bianca Dittrich (Perimeter Institute), Nick Huggett (UIC), Christian Wüthrich (UCSD), + others to be announced.

Dear colleague (apologies for mass mailing),

Chris Wüthrich and I are organizing a seminar on the foundations of quantum gravity, which will take place at the University of Illinois at Chicago from 26 to 28 September 2013.

The idea of this meeting is to bring together physicists and philosophers of physics interested in the foundations of quantum gravity (primarily canonical approaches and string theory), and to offer various formats such as keynote addresses, seminar-style talks, and sessions with contributed papers and works in progress.

Because the field is new, we are making efforts to make the meeting accessible to graduate students and recent PhDs with research agendas in quantum gravity (we hope to have some travel bursaries to help them attend, even if they do not present). In addition, we are especially keen to attract participation from women and minorities (whether or not junior).

We seek your help (a) to make sure that such people see the call for papers, and (b) to encourage them to submit work or attend.

To that end, please distribute this message to anyone that you think may be interested — hopefully with appropriate words of encouragement! If you have students or colleagues that you think we should know about, please give us their names, so that we can encourage them too. (Naturally you are also encouraged if the topic falls within your areas of research).

With gratitude,

Nick Huggett (UIC)
Christian Wüthrich (UCSD)

Quantum Gravity Seminar
9/26-28/13 – University of Illinois at Chicago

Email: beyondspacetimeseminar@gmail.com

Website: beyondspacetime.blog.com

The above quoted directly from quantum-foundations mailing list. For more information on it visit the blog.

Second International Workshop on Lightweight Cryptography for Security & Privacy

via Mailing list


Important Dates

Submission deadline: January  25th, 2013 at 23:59 UTC

Acceptance notification: March 8th, 2013

Workshop presentations: May 6-7, 2013

Background, aim and scope

The main goal of this workshop is to promote and initiate novel research on the security & privacy issues for applications that can be termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. As such applications are becoming ubiquitous, definitely providing an immense value to the society, they are also affecting a greater portion of the public & leading to a plethora of economical & security and privacy related concerns. The goal of this workshop is to create a platform where these concerns can be addressed and proposed solutions are discussed and evaluated. The solutions should be economically applicable in constrained environments such as wireless embedded systems. Due to the nature of the problem, good scalability properties are also expected requirements of the proposed systems. Providing implementation results & demonstrating the applicability of the proposed solutions are among the
essentials. Metrics to evaluate different aspects of lightweight security solutions and combined metrics for overall evaluations thereof for a given application scenario are useful for implementers and engineers. Compactness and efficiency are the properties which are commonly sought.


Topics of interest include, but are not limited to:

– Design, analysis and implementation of lightweight cryptographic
protocols & applications
– Cryptographic hardware development for constrained domains
– Design, analysis and implementation of security & privacy solutions
for wireless embedded systems
– Design, analysis and implementation of lightweight  privacy-preserving
protocols & systems
– Design and analysis of fast and compact cryptographic algorithms
– Wireless network security for low-resource devices
– Low-power crypto architectures
– Scalable protocols and architectures for security and privacy
– Formal methods for analysis of lightweight cryptographic protocols
– Security and privacy issues in RFID and NFC
– Embedded systems security
– PUF based crypto protocols
– Security of ubiquitous and pervasive computing
– Side channel analysis and countermeasures on lightweight devices
– Efficient and scalable cryptographic protocols for the Next Generation
Secure Cloud

Instructions for Authors

The submission must be anonymous with no author names, affiliations or obvious references. Only original unpublished work should be included in the manuscript. The length of the manuscripts must be at most 12 pages excluding references and appendices. The text should be in a single-column format, at least 11-point fonts, and have reasonable margins. The length of the final version will be at most 20 pages including references and appendices, and compliant with Springer’s LNCS template. Each paper conforming to these specifications will be reviewed by at least three reviewers.

Submission website: http://www.easychair.org/conferences/?conf=lightsec13.


A limited number of stipends are available to students having an accepted paper that they will present. Requests for stipends should be addressed to the general chair.

Invited Speakers

Jacques Stern, ENS, France

(Other invited speakers will be announced later)

Program Committee

Onur Aciicmez, Samsung, USA
Jean-Philippe Aumasson, NAGRA, Switzerland
Paulo Barreto, University of Sao Paulo, Brazil
Lejla Batina, Radboud University Nijmegen, The Netherlands
Guido Bertoni, STMicroelectronics, Italy
Mike Burmester, Florida State University, USA
Roberto Di Pietro, Universita di Roma Tre, Italy
Orr Dunkelman, University of Haifa, Israel
Kris Gaj, George Mason University, USA
Helena Handschuh, Intrinsic-ID, USA
Julio Hernandez-Castro, Portsmouth University, UK
Marc Joye, Technicolor, France
Pascal Junod, HEIG-VD, Switzerland
Mehmet Sabir Kiraz, TUBITAK BILGEM UEKAE, Turkey
Cetin Kaya Koc, UCSB, USA
Xuejia Lai, Shanghai Jiao Tong University, Japan
Albert Levi, Sabanci University, Turkey
Thomas Pedersen, TUBITAK BILGEM UEKAE, Turkey
Josef Pieprzyk, Macquarie University, Australia
David Pointcheval, CNRS/ENS/INRIA, France
Axel Poschmann, Nanyang Technological University, Singapore
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Arash Reyhani-Masoleh, University of Western Ontario, Canada
Vincent Rijmen, Katholieke Universiteit Leuven, Belgium
Matt Robshaw, Orange Labs, France
Francisco Rodriguez-Henriquez, CINVESTAV-IPN, Mexico
Erkay Savas, Sabanci University, Turkey
Mike Scott, CertiVox labs, Ireland
Ali Aydin Selcuk, Bilkent University, Turkey
Francois-Xavier Standaert, Universite catholique de Louvain, Belgium
Serge Vaudenay, EPFL, Switzerland
Amr Youssef, Concordia University, Canada

Organizational Committee

– Program co-Chairs:   Gildas Avoine  Université catholique de Louvain, Belgium and  Orhun Kara   TUBITAK BILGEM UEKAE, Turkey

– General Chair:  Huseyin Demirci  TUBITAK BILGEM UEKAE, Turkey

Lectures and Talks

This weekend, I finally got around to listen to these talks that I had marked down. All of those that I have mentioned below are worth listening, even if there are old videos. All the videos are hosted at Perimeter Institute.

Large Extra Dimensions – ISSYP Keynote Session

Abstract: It is an open question why gravity is so much weaker than the other three interactions we know. One possible answer which has been suggested is that this mismatch is only apparently so, and a feature we observe on large distances. The strength of gravity on small distances could grow faster than an extrapolation of Newton’s law would imply, such that it becomes comparable to the other interactions at distances that will be testable in the soon future. The concrete scenario for this is that our world could have additional compactified extra dimensions. If that was the case, quantum gravitational effects could become observable at the Large Hadron Collider. The most prominent features in these models are the production of mini black holes, and graviton emission.


The Black Hole Wars

Speaker: Leonard Susskind
Abstract: The strange paradoxes and puzzles of the quantum behaviour of black holes and the things that fall into them led to a spirited battle of ideas between Stephen Hawking, Leonard Susskind and other scientists. Resolving the debate may change our entire understanding of space, time, matter and information – is the entire world, for example, a quantum hologram?

NOTE : This talk is most amusing talk where he narrates the story of Black hole wars which contains characters from Stephan Hawking to George Bush.

Speaker: Michael Nielsen
Abstract: How should we think about quantum computing? The usual answer to this question is based on ideas inspired by computer science, such as qubits, quantum gates, and quantum circuits. In this talk I will explain an alternate geometric approach to quantum computation. In the geometric approach, an optimal quantum computation corresponds to “free falling” along the minimal geodesics of a certain Riemannian manifold. This reformulation opens up the possibility of using tools from geometry to understand the strengths and weaknesses of quantum computation, and perhaps to understand what makes certain physical operations difficult (or easy) to synthesize.


Speaker: Michael Nielsen
Abstract: How can we best take advantage of the internet to improve how science is done? Much attention has been paid to open access and open data as enablers of online innovation. In this talk, I discuss the complementary issue of cultural openness in science, and argue that a relatively closed culture is inhibiting online innovation in science. I’ll discuss ways this culture may be changed, and what opportunities may result.


Speaker: Anne Broadbent
Abstract: I will present a new protocol that was developed entirely in the measurement-based model for quantum computation. Our protocol allows Alice to have Bob carry out a quantum computation for her such that Alice’s inputs, outputs and computation remain perfectly private, and where Alice does not require any quantum computational power or memory. Alice only needs to be able to prepare single qubits from a finite set and send them to Bob, who has the balance of the required quantum computational resources. Our protocol is interactive: after the initial preparation of quantum states, Alice and Bob use two-way classical communication which enables Alice to drive the computation, giving single-qubit measurement instructions to Bob, depending on previous measurement outcomes. Our protocol is efficient and is presented for the special case of a classical-input, and classical-output; modifications allow the general case of quantum inputs and outputs. We also discuss the use of authentication in order for Alice to detect an uncooperative Bob. Based on joint work with Joseph Fitzsimons and Elham Kashefi


Speaker: Stacey Jeffery
Abstract: By exploiting the properties of quantum mechanical systems, two parties can achieve cryptographically secure communication in a manner not possible in a purely classical world, through the process of quantum key distribution. In this talk, I will briefly introduce the field of cryptography and explain one of the most fundamental applications of quantum mechanics to cryptography.


Demystifying the Higgs Boson [Youtube]
Speaker : Leonard Susskind