Theory Day in Taiwan (2025)

Date: 22 December, 2025
Location: R106, Institute of Information Science, Academia Sinica, Taipei


Online Webex


The Theory Day in Taiwan is an experimental one-day event that aims to stimulate interaction and discussion for TCS researchers in Taiwan and nearby countries. We plan to host 3-4 hour-long talks in general TCS area with long breaks for interaction. The meeting is free and open to everyone; in particular, students are encouraged to attend. We also create mailing lists for disseminating theory-related events in Taiwan. Please subscribe NOW for more information about Theory Day and Theory Event in Taiwan!!

Speakers:
Hsin-Yuan Huang (Caltech and Google Quantum AI), Yanlin Chen (UMD and QuICS), Wei-Kai Lin (University of Virginia), Yao-Ting Lin (UCSB), Tsun Ming (Ben) Cheung (IIS, Sinica), Jun-Ting (Tim) Hsieh (MIT), Taiga Hiroka (Foxconn Research), Chi-Fang (Anthony) Chen (Simons, UC berkeley), Miryam Huang (USC), Yao Ching Hsieh (University of Washington), Er-Cheng Tang (University of Washington)

Subscribe to the Mailing List !

Subscribe


We create two mailing lists:
Theory Event Announcement for announcement of theory events.
Theory Talk Announcement for announcement of talks in TCS.

Theory Day Information

Date: 22 December, 2025
Location: R106, Institute of Information Science, Academia Sinica, Taipei

Schedule

See below for the program agenda.

Time Event / Speaker
22 December Location: R106, IIS
09:00 - 09:50 Chi-Fang (Anthony) Chen and Yanlin Chen
09:50 - 10:20 Coffee Break
10:20 - 11:10 Hsin-Yuan Huang and Yao-Ting Lin
11:10 - 11:40 Coffee Break
11:40 - 12:05 Taiga Hiroka
12:05 - 14:00 Lunch
14:00 - 14:50 Wei-Kai Lin and Miryam Huang
14:50 - 15:20 Coffee Break
15:20 - 16:10 Jun-Ting (Tim) Hsieh and Yao Ching Hsieh
16:10 - 16:40 Coffee Break
16:40 - 17:05 Tsun Ming (Ben) Cheung and Er-Cheng Tang

Talk Information

Abstracts and Speaker Details

How to construct quantum Markov chains

Speaker: Chi-Fang (Anthony) Chen (Simons, UC Berkeley)

Classical Markov chains and Monte Carlo methods have driven major advances in statistical physics, probability, and modern computation. [cite_start]In this talk, I will present a general construction of quantum Markov chains that provides both a rigorous quantum algorithmic framework for sampling Gibbs states and a physically consistent dynamical model of thermalization in many-body quantum systems. [cite: 26]


QuantumBoost: A lazy, yet fast, quantum algorithm for learning with weak hypotheses

Speaker: Yanlin Chen (UMD and QuICS)

The technique of combining multiple votes to enhance the quality of a decision is the core of boosting algorithms in machine learning. In particular, boosting provably increases decision quality by combining multiple weak learners-hypotheses that are only slightly better than random guessing-into a single strong learner that classifies data well. There exist various versions of boosting algorithms, which we improve upon through the introduction of QuantumBoost. Inspired by classical work by Barak, Hardt and Kale, our QuantumBoost algorithm achieves the best known runtime over other boosting methods through two innovations. First, it uses a quantum algorithm to compute approximate Bregman projections faster. Second, it combines this with a lazy projection strategy, a technique from convex optimization where projections are performed infrequently rather than every iteration. [cite_start]To our knowledge, QuantumBoost is the first algorithm, classical or quantum, to successfully adopt a lazy projection strategy in the context of boosting. [cite: 4, 5, 6, 7, 8, 9]


Strong random unitaries and fast scrambling

Speaker: Hsin-Yuan Huang (Caltech and Google Quantum AI)

Understanding how fast physical systems can resemble Haar-random unitaries is a fundamental question in physics. Many experiments of interest in quantum gravity and many-body physics, including the butterfly effect in quantum information scrambling and the Hayden-Preskill thought experiment, involve queries to a random unitary U alongside its inverse U^†, conjugate U^*, and transpose U^T. However, conventional notions of approximate unitary designs and pseudorandom unitaries (PRUs) fail to capture these experiments. In this work, we introduce and construct strong unitary designs and strong PRUs that remain robust under all such queries. Our constructions achieve the optimal circuit depth of O(log n) for systems of n qubits. We further show that strong unitary designs can form in circuit depth O(log^2 n) in circuits composed of independent two-qubit Haar-random gates, and that strong PRUs can form in circuit depth poly(log n) in circuits with no ancilla qubits. [cite_start]Our results provide an operational proof of the fast scrambling conjecture from black hole physics: every observable feature of the fastest scrambling quantum systems reproduces Haar-random behavior at logarithmic times. [cite: 1, 2, 3]


On the Limitations of Pseudorandom Unitaries

Speaker: Yao-Ting Lin (UCSB)

Pseudorandom unitaries (PRUs), one of the key quantum pseudorandom notions, are efficiently computable unitaries that are computationally indistinguishable from Haar random unitaries. While there is evidence to believe that PRUs are weaker than one-way functions, so far its relationship with other quantum cryptographic primitives (that are plausibly weaker than one-way functions) has not been fully established. In this work, we focus on quantum cryptographic primitives with classical communication, referred to as QCCC primitives. Our main result shows that QCCC bit commitments and QCCC key agreement, cannot be constructed from pseudorandom unitaries in a black-box manner. Our core technical contribution is to show (in a variety of settings) the difficulty of distinguishing identical versus independent Haar unitaries by separable channels. Our result strictly improves upon prior works which studied similar problems in the context of learning theory [Anshu, Landau, Liu, STOC 2022] and cryptography [Ananth, Gulati, Lin, TCC 2024]. [cite_start]*Based on joint work with Prabhanjan Ananth and Aditya Gulati, to appear in TCC 2025. [cite: 20, 21, 22, 23, 24, 25]


Lower Bounds on Inner-Product Functional Encryption from All-or-Nothing Encryption Primitives

Speaker: Wei-Kai Lin (University of Virginia)

Functional encryptions (FE) provide fine-grained access control over encrypted data. The class of functions supported by an FE scheme can vary widely, from all circuits to much simpler functions, such as inner products. Particularly, FE for all circuits is extremely powerful and can be existentially equivalent to indistinguishability obfuscation. In contrast, FE for inner products (IPFE) can be based on standard assumptions, such as DDH or LWE. Do FEs fundamentally differ from other fancy encryption schemes, such as IBE, ABE, or FHE? In this talk, we separate FEs from the other fancy encryptions. That is, there is no IPFE constructed using ABE and FHE in the “almost” black-box way. Since inner product is a weak class of functions, this makes the impossibility stronger. The separation holds for (IP)FEs that are secure against an unbounded number of colluded functional keys. We additionally separate IPFEs from attribute-hiding predicate encryptions. [cite_start]This is a joint work with Jinye He and Shiyu Li. [cite: 10, 11, 12, 13, 14, 15, 16, 17, 18, 19]


Fully Homomorphic Encryption with Efficient Public Verification

Speaker: Miryam Huang (USC)


Explicit Lossless Vertex Expanders

Speaker: Jun-Ting (Tim) Hsieh (MIT)


Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption

Speaker: Yao Ching Hsieh (University of Washington)

Indistinguishability obfuscation (iO) stands out as a powerful cryptographic primitive but remains notoriously difficult to realize under simple-to-state, post-quantum assumptions. Recent works have proposed lattice-inspired iO constructions backed by new “LWE-with-hints” assumptions, which posit that certain distributions of LWE samples retain security despite auxiliary information. However, subsequent cryptanalysis has revealed structural vulnerabilities in these assumptions. In this talk, I will talk about our recent attempt on overcoming key vulnerabilities in prior LWE-with-hint formulations. We introduce a new assumption, the Circular Security with Random Opening (CRO) assumption, featuring two critical properties: (1) the hint distribution is marginally uniform, and (2) natural uses of the hint do not give any noise leakage. These properties rule out important classes of attack strategies, including those that have broken earlier assumptions. [cite_start]Therefore, our new lattice-based assumption for iO provides a qualitatively different target for cryptanalysis compared to existing assumptions. [cite: 27, 28, 29, 30, 31, 32]


A Lower Bound on the Trace Norm of Boolean Matrices and Its Applications

Speaker: Tsun Ming (Ben) Cheung (Institute of Information Science, Academia Sinica)


Fiat-Shamir Transformation of Special-Sound Interactive Proofs

Speaker: Er-Cheng Tang (University of Washington)


On cryptography and distribution verification, with application to quantum advantage.

Speaker: Taiga Hiroka (Foxconn Research)


About

The Theory Day in Taiwan is an experimental one-day event that aims to stimulate interaction and discussion for TCS researchers in Taiwan and nearby countries. We plan to host 3-4 hour-long talks in general TCS area with long breaks for interaction. The meeting is free and open to everyone; in particular, students are encouraged to attend.
Please contact theoryday.tw@gmail.com if you have any question.

Organizers
Ho-Lin Chen (NTU), Kai-Min Chung (Academia Sinica), and Chung-Shou Liao (NTHU)