What’s New

Year All

There is a holographic correspondence between (1) nD quantum systems with symmetry C and (2) nD boundaries of the n+1D topological order Z(C), where Z(C) is mathematically the Drinfeld center of C. Such mysterious topological holography has numerous applications and consequences, especially in the recent emerging field of generalized symmetry. By a rigorous construction and proof in 1+1D, we show that the Drinfeld center Z(C) naturally arise as the category of fixed-point local tensors with symmetry C, thus revealing the origin of topological holography. This talk is based on arXiv:2412.07198.
Quantum Key Distribution (QKD) offers information-theoretic security but relies critically on authenticated classical channels for post-processing steps (e.g., basis sifting and key reconciliation). Without authentication, these channels are vulnerable to man-in-the-middle attacks. Traditional methods require Alice and Bob to pre-share symmetric keys via physical meetings—a solution incompatible with multi-user QKD networks. We experimentally demonstrate a practical solution using post-quantum signature algorithms to authenticate QKD classical channels. This approach was validated under multiple QKD network topologies in laboratory environments and a real-world metropolitan QKD network operating continuously for 36 days. Our implementation provides quantum-resistant security while uniquely requiring only short-term security (e.g., ~1 second during authentication), contrasting with long-term security assumptions for post-quantum encryption. Additionally, we propose a quantum-teleportation-based protocol for message authentication that simultaneously ensures confidentiality—enabling secure key reconciliation in QKD.
After a brief introduction to quantum nonlocality, we propose a set of conditions on the joint probabilities as a test of genuine multipartite nonlocality, and it turns out that all entangled symmetric multipartite qubit states pass this test. In the following we generalize this test to a family of Hardy-type tests, which can detect different degrees of nonlocality ranging from standard to genuine multipartite nonlocality. At last, we explore network nonlocality sharing in an n-branch generalized star network scenario with m observers in each branch and k settings per observer.