Skip to main content

Showing 1–50 of 143 results for author: Renner, R

.
  1. arXiv:2406.12973  [pdf, other

    quant-ph math-ph

    Tomography of clock signals using the simplest possible reference

    Authors: Nuriya Nurgalieva, Ralph Silva, Renato Renner

    Abstract: We show that finite physical clocks always have well-behaved signals, namely that every waiting-time distribution generated by a physical process on a system of finite size is guaranteed to be bounded by a decay envelope. Following this consideration, we show that one can reconstruct the distribution using only operationally available information, namely, that of the ordering of the ticks of one c… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 7 pages + 10 pages appendix, 1 figure

  2. arXiv:2405.08939  [pdf, other

    quant-ph

    Exploring the Local Landscape in the Triangle Network

    Authors: Elisa Bäumer, Victor Gitton, Tamás Kriváchy, Nicolas Gisin, Renato Renner

    Abstract: Characterizing the set of distributions that can be realized in the triangle network is a notoriously difficult problem. In this work, we investigate inner approximations of the set of local (classical) distributions of the triangle network. A quantum distribution that appears to be nonlocal is the Elegant Joint Measurement (EJM) [Entropy. 2019; 21(3):325], which motivates us to study distribution… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: 8 + 19 pages, 19 figures

  3. arXiv:2405.05141  [pdf, other

    cs.NE cs.LG

    Learning-to-learn enables rapid learning with phase-change memory-based in-memory computing

    Authors: Thomas Ortner, Horst Petschenig, Athanasios Vasilopoulos, Roland Renner, Špela Brglez, Thomas Limbacher, Enrique Piñero, Alejandro Linares Barranco, Angeliki Pantazi, Robert Legenstein

    Abstract: There is a growing demand for low-power, autonomously learning artificial intelligence (AI) systems that can be applied at the edge and rapidly adapt to the specific situation at deployment site. However, current AI models struggle in such scenarios, often requiring extensive fine-tuning, computational resources, and data. In contrast, humans can effortlessly adjust to new tasks by transferring kn… ▽ More

    Submitted 22 April, 2024; originally announced May 2024.

    Comments: 16 pages and 3 appendix pages; Preprint currently under review

  4. arXiv:2308.05792  [pdf, ps, other

    quant-ph math-ph

    Commuting operations factorise

    Authors: Renato Renner, Ramona Wolf

    Abstract: Consider two agents, Alice and Bob, each of whom takes a quantum input, operates on a shared quantum system $K$, and produces a quantum output. Alice and Bob's operations may commute, in the sense that the joint input-output behaviour is independent of the order in which they access $K$. Here we ask whether this commutation property implies that $K$ can be split into two factors on which Alice and… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: 24 pages, 6 figures

  5. arXiv:2307.15116  [pdf, other

    quant-ph cs.CR

    The debate over QKD: A rebuttal to the NSA's objections

    Authors: Renato Renner, Ramona Wolf

    Abstract: A recent publication by the NSA assessing the usability of quantum cryptography has generated significant attention, concluding that this technology is not recommended for use. Here, we reply to this criticism and argue that some of the points raised are unjustified, whereas others are problematic now but can be expected to be resolved in the foreseeable future.

    Submitted 27 July, 2023; originally announced July 2023.

  6. Energy requirement for implementing unitary gates on energy-unbounded systems

    Authors: Yuxiang Yang, Renato Renner, Giulio Chiribella

    Abstract: The processing of quantum information always has a cost in terms of physical resources such as energy or time. Determining the resource requirements is not only an indispensable step in the design of practical devices - the resources need to be actually provided - but may also yield fundamental constraints on the class of processes that are physically possible. Here we study how much energy is req… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

    Comments: 16 pages + appendix; published version

    Journal ref: Journal of Physics A: Mathematical and Theoretical 55, 494003 (2022)

  7. arXiv:2209.06236  [pdf, other

    quant-ph

    Thought experiments in a quantum computer

    Authors: Nuriya Nurgalieva, Simon Mathis, Lídia del Rio, Renato Renner

    Abstract: We introduce a software package that allows users to design and run simulations of thought experiments in quantum theory. In particular, it covers cases where several reasoning agents are modelled as quantum systems, such as Wigner's friend experiment. Users can customize the protocol of the experiment, the inner workings of agents (including a quantum circuit that models their reasoning process),… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

    Comments: 18 + 10 pages

  8. arXiv:2206.04078  [pdf, other

    quant-ph cs.CR

    Quantum Advantage in Cryptography

    Authors: Renato Renner, Ramona Wolf

    Abstract: Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle? At first sight, it looks as if it just lifts the competition between cryp… ▽ More

    Submitted 11 January, 2023; v1 submitted 8 June, 2022; originally announced June 2022.

    Comments: 31 pages, 9 figures, 1 table. To appear in the AIAA journal

    Journal ref: AIAA Journal 61(5), 1895-1910 (2023)

  9. arXiv:2203.11245  [pdf, other

    quant-ph

    Embedding cyclic causal structures in acyclic space-times: no-go results for indefinite causality

    Authors: V. Vilasini, Renato Renner

    Abstract: Causality can be defined in terms of space-time or based on information-theoretic structures, which correspond to very different notions of causation. Yet, in physical experiments, these notions play together in a compatible manner. The process matrix framework is useful for modelling indefinite causal structures (ICS) in an information-theoretic sense, but there remain important open questions re… ▽ More

    Submitted 27 December, 2023; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 46+39 pages, 17 figures. An extra result (Theorem 5.8) included in v2 but not in v1 was found to be partly incorrect. This theorem has been removed in v3 and does not impact the main results/conclusions. Compared to v1, this version (v3) also includes significant improvements to the framework in terms of clarity and generality, as well as an additional result about the link to causal boxes

  10. The nonequilibrium cost of accurate information processing

    Authors: Giulio Chiribella, Fei Meng, Renato Renner, Man-Hong Yung

    Abstract: Accurate information processing is crucial both in technology and in nature. To achieve it, any information processing system needs an initial supply of resources away from thermal equilibrium. Here we establish a fundamental limit on the accuracy achievable with a given amount of nonequilibrium resources. The limit applies to arbitrary information processing tasks and arbitrary information proces… ▽ More

    Submitted 21 September, 2022; v1 submitted 17 March, 2022; originally announced March 2022.

    Comments: 10 + 28 pages, 3 figures, new results added

  11. Security of quantum key distribution from generalised entropy accumulation

    Authors: Tony Metger, Renato Renner

    Abstract: The goal of quantum key distribution (QKD) is to establish a secure key between two parties connected by an insecure quantum channel. To use a QKD protocol in practice, one has to prove that a finite size key is secure against general attacks: no matter the adversary's attack, they cannot gain useful information about the key. A much simpler task is to prove security against collective attacks, wh… ▽ More

    Submitted 17 November, 2023; v1 submitted 9 March, 2022; originally announced March 2022.

    Comments: 30 pages

    Journal ref: Nat Commun 14, 5272 (2023)

  12. Generalised entropy accumulation

    Authors: Tony Metger, Omar Fawzi, David Sutter, Renato Renner

    Abstract: Consider a sequential process in which each step outputs a system $A_i$ and updates a side information register $E$. We prove that if this process satisfies a natural "non-signalling" condition between past outputs and future side information, the min-entropy of the outputs $A_1, \dots, A_n$ conditioned on the side information $E$ at the end of the process can be bounded from below by a sum of von… ▽ More

    Submitted 28 October, 2022; v1 submitted 9 March, 2022; originally announced March 2022.

    Comments: 42 pages; v2 expands introduction but does not change any results; in FOCS 2022

    Journal ref: 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), Denver, CO, USA, 2022, pp. 844-850

  13. arXiv:2110.14653  [pdf, other

    hep-th gr-qc quant-ph

    The black hole information puzzle and the quantum de Finetti theorem

    Authors: Renato Renner, **zhao Wang

    Abstract: The black hole information puzzle arises from a discrepancy between conclusions drawn from general relativity and quantum theory about the nature of the radiation emitted by a black hole. According to Hawking's original argument, the radiation is thermal and its entropy thus increases monotonically as the black hole evaporates. Conversely, due to the reversibility of time evolution according to qu… ▽ More

    Submitted 22 December, 2021; v1 submitted 27 October, 2021; originally announced October 2021.

    Comments: 39+6 pages, 6 figures. v2: Largely rewritten to improve presentation; statement of the de Finetti theorem reformulated with a quantitative error corrected; technical proofs provided in the appendices; Section 4 expanded with the name "Missing Reference" changed to "Elusive Reference"

  14. Experimental quantum key distribution certified by Bell's theorem

    Authors: D. P. Nadlinger, P. Drmota, B. C. Nichol, G. Araneda, D. Main, R. Srinivas, D. M. Lucas, C. J. Ballance, K. Ivanov, E. Y-Z. Tan, P. Sekatski, R. L. Urbanke, R. Renner, N. Sangouard, J-D. Bancal

    Abstract: Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorisation to provide security against eavesdrop** attacks. Remarkably, quantum key distribution protocols like the one proposed by Bennett and Brassard provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. H… ▽ More

    Submitted 5 September, 2023; v1 submitted 29 September, 2021; originally announced September 2021.

    Comments: 5+1 pages in main text and methods with 4 figures and 1 table; 42 pages of supplementary material (replaced with revision accepted for publication in Nature; original title: "Device-Independent Quantum Key Distribution")

    Journal ref: Nature 607, 682-686 (2022)

  15. Testing quantum theory with thought experiments

    Authors: Nuriya Nurgalieva, Renato Renner

    Abstract: Quantum mechanics is one of our most successful physical theories; its predictions agree with experimental observations to an extremely high accuracy. However, the bare formalism of quantum theory does not provide straightforward answers to seemingly simple questions: for example, how should one model systems that include agents who are themselves using quantum theory? These foundational questions… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    Comments: 30 pages

    Journal ref: Contemporary Physics, vol. 61, no. 3, July 2020, pp. 193-216

  16. arXiv:2102.00021  [pdf, other

    quant-ph cs.CR cs.IT

    Security in Quantum Cryptography

    Authors: Christopher Portmann, Renato Renner

    Abstract: Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic requirement here is that the transmitted messages remain inaccessible to anyone other than the designated recipients, even if the communication channel… ▽ More

    Submitted 30 August, 2021; v1 submitted 29 January, 2021; originally announced February 2021.

    Comments: 63 pages, 34 figures. In submission to RMP. Partly based on arXiv:1409.3525. v2: new references and minor edits

  17. Improved DIQKD protocols with finite-size analysis

    Authors: Ernest Y. -Z. Tan, Pavel Sekatski, Jean-Daniel Bancal, René Schwonnek, Renato Renner, Nicolas Sangouard, Charles C. -W. Lim

    Abstract: The security of finite-length keys is essential for the implementation of device-independent quantum key distribution (DIQKD). Presently, there are several finite-size DIQKD security proofs, but they are mostly focused on standard DIQKD protocols and do not directly apply to the recent improved DIQKD protocols based on noisy preprocessing, random key measurements, and modified CHSH inequalities. H… ▽ More

    Submitted 23 July, 2023; v1 submitted 15 December, 2020; originally announced December 2020.

    Comments: Corrected error in Chernoff bound formula

    Journal ref: Quantum 6, 880 (2022)

  18. arXiv:2010.11961  [pdf, other

    quant-ph

    Are quantum cryptographic security claims vacuous?

    Authors: Joseph M. Renes, Renato Renner

    Abstract: A central claim in quantum cryptography is that secrecy can be proved rigorously, based on the assumption that the relevant information-processing systems obey the laws of quantum physics. This claim has recently been challenged by Bernstein (arXiv:1803.04520). He argues that the laws of physics may also entail an unavoidable leakage of any classical information encoded in physical carriers. The s… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

    Comments: 7 pages

  19. Device-independent quantum key distribution from generalized CHSH inequalities

    Authors: P. Sekatski, J. -D. Bancal, X. Valcarce, E. Y. -Z. Tan, R. Renner, N. Sangouard

    Abstract: Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, which effectively takes into account the individual… ▽ More

    Submitted 16 April, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: 9+12 pages, 3 figures. See also related work from E. Woodhead et al. arXiv:2007.16146

    Journal ref: Quantum 5, 444 (2021)

  20. Optimal universal programming of unitary gates

    Authors: Yuxiang Yang, Renato Renner, Giulio Chiribella

    Abstract: A universal quantum processor is a device that takes as input a (quantum) program, containing an encoding of an arbitrary unitary gate, and a (quantum) data register, on which the encoded gate is applied. While no perfect universal quantum processor can exist, approximate processors have been proposed in the past two decades. A fundamental open question is how the size of the smallest quantum prog… ▽ More

    Submitted 4 February, 2021; v1 submitted 20 July, 2020; originally announced July 2020.

    Comments: 4 pages, 2 figures + Appendix; the upper bound's scaling with respect to d is improved compared to the published version (the main result remains unchanged)

    Journal ref: Phys. Rev. Lett. 125, 210501 (2020)

  21. Noisy pre-processing facilitating a photonic realisation of device-independent quantum key distribution

    Authors: M. Ho, P. Sekatski, E. Y. -Z. Tan, R. Renner, J. -D. Bancal, N. Sangouard

    Abstract: Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i.e., the probability that the signals sent over the… ▽ More

    Submitted 26 May, 2020; originally announced May 2020.

    Comments: 5+16 pages, 4 figures

    Journal ref: Phys. Rev. Lett. 124, 230502 (2020)

  22. arXiv:2004.07857  [pdf, other

    quant-ph

    Ultimate limit on time signal generation

    Authors: Yuxiang Yang, Renato Renner

    Abstract: The generation of time signals is a fundamental task in science. Here we study the relation between the quality of a time signal and the physics of the system that generates it. According to quantum theory, any time signal can be decomposed into individual quanta that lead to single detection events. Our main result is a bound on how sharply peaked in time these events can be, which depends on the… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: 17 pages, 5 figures + Appendix; comments are very welcome

  23. Independent quality assessment of a commercial quantum random number generator

    Authors: Mikhail Petrov, Igor Radchenko, Damian Steiger, Renato Renner, Matthias Troyer, Vadim Makarov

    Abstract: We reverse-engineer, test and analyse hardware and firmware of the commercial quantum-optical random number generator Quantis from ID Quantique. We show that > 99% of its output data originates in physically random processes: random timing of photon absorption in a semiconductor material, and random growth of avalanche owing to impact ionisation. Under a strong assumption that these processes corr… ▽ More

    Submitted 13 July, 2022; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: Title changed. Various minor corrections, including: comments and clarifications about the source of entropy, clarification of the assumptions made, technical correction of bibliographic references. 9 pages, 11 figures, 1 table

    Journal ref: EPJ Quantum Technol. 9, 17 (2022)

  24. arXiv:2002.08968  [pdf, ps, other

    math-ph cond-mat.stat-mech quant-ph

    Tangible phenomenological thermodynamics

    Authors: Philipp Kammerlander, Renato Renner

    Abstract: In this paper, the foundations of classical phenomenological thermodynamics are being thoroughly revisited. A new rigorous basis for thermodynamics is laid out in the main text and presented in full detail in the appendix. All relevant concepts, such as work, heat, internal energy, heat reservoirs, reversibility, absolute temperature and entropy, are introduced on an abstract level and connected t… ▽ More

    Submitted 20 February, 2020; originally announced February 2020.

    Comments: 67 pages with figures, tables and examples, plus 29 pages appendix

  25. arXiv:2001.00593  [pdf, other

    quant-ph cs.AI cs.LG

    Operationally meaningful representations of physical systems in neural networks

    Authors: Hendrik Poulsen Nautrup, Tony Metger, Raban Iten, Sofiene Jerbi, Lea M. Trenkwalder, Henrik Wilming, Hans J. Briegel, Renato Renner

    Abstract: To make progress in science, we often build abstract representations of physical systems that meaningfully encode information about the systems. The representations learnt by most current machine learning techniques reflect statistical structure present in the training data; however, these methods do not allow us to specify explicit and operationally meaningful requirements on the representation.… ▽ More

    Submitted 2 January, 2020; originally announced January 2020.

    Comments: 24 pages, 13 figures

    Journal ref: Mach. Learn.: Sci. Technol. 3, 045025, 2022

  26. A chain rule for the quantum relative entropy

    Authors: Kun Fang, Omar Fawzi, Renato Renner, David Sutter

    Abstract: The chain rule for the classical relative entropy ensures that the relative entropy between probability distributions on multipartite systems can be decomposed into a sum of relative entropies of suitably chosen conditional distributions on the individual systems. Here, we prove a similar chain rule inequality for the quantum relative entropy in terms of channel relative entropies. The new chain r… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: 12 pages

    Journal ref: Phys. Rev. Lett. 124, 100501 (2020)

  27. Fundamental energy requirement of reversible quantum operations

    Authors: Giulio Chiribella, Yuxiang Yang, Renato Renner

    Abstract: Landauer's principle asserts that any computation has an unavoidable energy cost that grows proportionally to its degree of logical irreversibility. But even a logically reversible operation, when run on a physical processor that operates on different energy levels, requires energy. Here we quantify this energy requirement, providing upper and lower bounds that coincide up to a constant factor. We… ▽ More

    Submitted 28 May, 2021; v1 submitted 28 August, 2019; originally announced August 2019.

    Comments: 6 pages + appendix, 3 figures; close to published version

    Journal ref: Phys. Rev. X 11, 021014 (2021)

  28. arXiv:1905.09707  [pdf, other

    quant-ph

    Accuracy enhancing protocols for quantum clocks

    Authors: Yuxiang Yang, Lennart Baumgärtner, Ralph Silva, Renato Renner

    Abstract: The accuracy of the time information generated by clocks can be enhanced by allowing them to communicate with each other. Here we consider a basic scenario where a quantum clock receives a low-accuracy time signal as input and ask whether it can generate an output of higher accuracy. We propose protocols that use a quantum clock with a $d$-dimensional state space to achieve an accuracy enhancement… ▽ More

    Submitted 3 December, 2019; v1 submitted 23 May, 2019; originally announced May 2019.

    Comments: 8 pages + appendix; an application added + presentation streamlined

  29. arXiv:1905.03270  [pdf, ps, other

    math-ph cs.IT math.DS quant-ph

    Bounds on Lyapunov exponents via entropy accumulation

    Authors: David Sutter, Omar Fawzi, Renato Renner

    Abstract: Lyapunov exponents describe the asymptotic behavior of the singular values of large products of random matrices. A direct computation of these exponents is however often infeasible. By establishing a link between Lyapunov exponents and an information theoretic tool called entropy accumulation theorem we derive an upper and a lower bound for the maximal and minimal Lyapunov exponent, respectively.… ▽ More

    Submitted 22 September, 2020; v1 submitted 8 May, 2019; originally announced May 2019.

    Comments: v4: 24 pages, published version

    Journal ref: IEEE Transactions on Information Theory, vol. 67, no 1, pages 10-24, 2021

  30. Advantage distillation for device-independent quantum key distribution

    Authors: Ernest Y. -Z. Tan, Charles C. -W. Lim, Renato Renner

    Abstract: We derive a sufficient condition for advantage distillation to be secure against collective attacks in device-independent quantum key distribution (DIQKD), focusing on the repetition-code protocol. In addition, we describe a semidefinite programming method to check whether this condition holds for any probability distribution obtained in a DIQKD protocol. Applying our method to various probability… ▽ More

    Submitted 17 May, 2020; v1 submitted 25 March, 2019; originally announced March 2019.

    Comments: [v2] Corrected threshold detection efficiency for one-way error correction, reorganised material. [v3] Updated funding information

    Journal ref: Phys. Rev. Lett. 124, 020502 (2020)

  31. Confidence Polytopes in Quantum State Tomography

    Authors: **zhao Wang, Volkher B. Scholz, Renato Renner

    Abstract: Quantum State Tomography is the task of inferring the state of a quantum system from measurement data. A reliable tomography scheme should not only report an estimate for that state, but also well-justified error bars. These may be specified in terms of confidence regions, i.e., subsets of the state space which contain the system's state with high probability. Here, building upon a quantum general… ▽ More

    Submitted 29 August, 2018; originally announced August 2018.

    Comments: 5+5 pages, 3+3 figures

    Journal ref: Phys. Rev. Lett. 122, 190401 (2019)

  32. arXiv:1807.10300  [pdf, other

    quant-ph cs.LG physics.data-an

    Discovering physical concepts with neural networks

    Authors: Raban Iten, Tony Metger, Henrik Wilming, Lidia del Rio, Renato Renner

    Abstract: Despite the success of neural networks at solving concrete physics problems, their use as a general-purpose tool for scientific discovery is still in its infancy. Here, we approach this problem by modelling a neural network architecture after the human physical reasoning process, which has similarities to representation learning. This allows us to make progress towards the long-term goal of machin… ▽ More

    Submitted 23 January, 2020; v1 submitted 26 July, 2018; originally announced July 2018.

    Comments: 4 pages main text + 11 pages appendix, changes since v2: improved references and presentation

    Journal ref: Phys. Rev. Lett. 124, 010508 (2020)

  33. Smooth entropy in axiomatic thermodynamics

    Authors: Mirjam Weilenmann, Lea Krämer Gabriel, Philippe Faist, Renato Renner

    Abstract: Thermodynamics can be formulated in either of two approaches, the phenomenological approach, which refers to the macroscopic properties of systems, and the statistical approach, which describes systems in terms of their microscopic constituents. We establish a connection between these two approaches by means of a new axiomatic framework that can take errors and imprecisions into account. This link… ▽ More

    Submitted 19 July, 2018; originally announced July 2018.

    Comments: 18 pages, 1 figure; book chapter in "Thermodynamics in the Quantum Regime - Recent Progress and Outlook", eds. F. Binder, L. A. Correa, C. Gogolin, J. Anders and G. Adesso; the chapter relies on results reported in MW's PhD thesis, arXiv:1807.06345

  34. arXiv:1806.08812  [pdf, other

    quant-ph math-ph

    Performance of stochastic clocks in the Alternate Ticks Game

    Authors: Sandra Stupar, Christian Klumpp, Renato Renner, Nicolas Gisin

    Abstract: In standard quantum theory, time is not an observable. It enters as a parameter in the Schrödinger equation, but there is no measurement operator associated to it. Nevertheless, one may take an operational viewpoint and regard time as the information one can read from clocks. The Alternate Ticks Game, introduced in arXiv:1506.01373, is a completely operational means to quantify the accuracy of tim… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: 7 + 4 pages, 1 figure

  35. Quantum clocks are more precise than classical ones

    Authors: Mischa P. Woods, Ralph Silva, Gilles Pütz, Sandra Stupar, Renato Renner

    Abstract: A clock is, from an information-theoretic perspective, a system that emits information about time. One may therefore ask whether the theory of information imposes any constraints on the maximum precision of clocks. Here we show a quantum-over-classical advantage for clocks or, more precisely, the task of generating information about what time it is. The argument is based on information-theoretic c… ▽ More

    Submitted 24 February, 2022; v1 submitted 1 June, 2018; originally announced June 2018.

    Comments: 17 + 60 pages. V3: updated in line with published version

    Journal ref: PRX Quantum, vol 3, issue 1, Feb 2022

  36. arXiv:1804.09726  [pdf, ps, other

    math-ph cond-mat.stat-mech quant-ph

    The zeroth law of thermodynamics is redundant

    Authors: Philipp Kammerlander, Renato Renner

    Abstract: We reconsider the basic building blocks of classical phenomenological thermodynamics. While doing so we show that the zeroth law is a redundant postulate for the theory by deriving it from the first and the second laws. This is in stark contrast to the prevalent conception that the three laws, the zeroth, first and second, are all necessary and independent axioms.

    Submitted 25 April, 2018; originally announced April 2018.

    Comments: 11 pages, 5 figures

  37. arXiv:1802.07795  [pdf, ps, other

    quant-ph cs.CC cs.IT

    Communication Complexity of One-Shot Remote State Preparation

    Authors: Shima Bab Hadiashar, Ashwin Nayak, Renato Renner

    Abstract: Quantum teleportation uses prior shared entanglement and classical communication to send an unknown quantum state from one party to another. Remote state preparation (RSP) is a similar distributed task in which the sender knows the entire classical description of the state to be sent. (This may also be viewed as the task of non-oblivious compression of a single sample from an ensemble of quantum s… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: 36 pages

  38. Imperfect Thermalizations Allow for Optimal Thermodynamic Processes

    Authors: Elisa Bäumer, Martí Perarnau-Llobet, Philipp Kammerlander, Henrik Wilming, Renato Renner

    Abstract: Optimal (reversible) processes in thermodynamics can be modelled as step-by-step processes, where the system is successively thermalized with respect to different Hamiltonians by an external thermal bath. However, in practice interactions between system and thermal bath will take finite time, and precise control of their interaction is usually out of reach. Motivated by this observation, we consid… ▽ More

    Submitted 20 June, 2019; v1 submitted 19 December, 2017; originally announced December 2017.

    Comments: 12 pages + appendix; extended results; accepted in Quantum

    Journal ref: Quantum 3, 153 (2019)

  39. arXiv:1710.05033  [pdf, other

    quant-ph math-ph math.PR

    A non-probabilistic substitute for the Born rule

    Authors: Daniela Frauchiger, Renato Renner

    Abstract: The Born rule assigns a probability to any possible outcome of a quantum measurement, but leaves open the question how these probabilities are to be interpreted and, in particular, how they relate to the outcome observed in an actual experiment. We propose to avoid this question by replacing the Born rule with two non-probabilistic postulates: (i) the projector associated to the observed outcome m… ▽ More

    Submitted 13 October, 2017; originally announced October 2017.

    Comments: 10 pages + references

  40. Fundamental work cost of quantum processes

    Authors: Philippe Faist, Renato Renner

    Abstract: Information-theoretic approaches provide a promising avenue for extending the laws of thermodynamics to the nanoscale. Here, we provide a general fundamental lower limit, valid for systems with an arbitrary Hamiltonian and in contact with any thermodynamic bath, on the work cost for the implementation of any logical process. This limit is given by a new information measure---the coherent relative… ▽ More

    Submitted 6 May, 2018; v1 submitted 1 September, 2017; originally announced September 2017.

    Comments: Journal version, 13+24 pages. The present results have been reported to a large extent in PhF's Ph.D. thesis (arXiv:1607.03104)

    Journal ref: Phys. Rev. X 8, 021011 (2018)

  41. Necessary criterion for approximate recoverability

    Authors: David Sutter, Renato Renner

    Abstract: A tripartite state $ρ_{ABC}$ forms a Markov chain if there exists a recovery map $\mathcal{R}_{B \to BC}$ acting only on the $B$-part that perfectly reconstructs $ρ_{ABC}$ from $ρ_{AB}$. To achieve an approximate reconstruction, it suffices that the conditional mutual information $I(A:C|B)_ρ$ is small, as shown recently. Here we ask what conditions are necessary for approximate state reconstructio… ▽ More

    Submitted 13 August, 2018; v1 submitted 18 May, 2017; originally announced May 2017.

    Comments: v2: 18 pages, final version published in Annales Henri Poincaré

    Journal ref: Annales Henri Poincare, vol. 19, no. 10, pages 3007-3029, October 2018

  42. Space QUEST mission proposal: Experimentally testing decoherence due to gravity

    Authors: Siddarth Koduru Joshi, Jacques Pienaar, Timothy C. Ralph, Luigi Cacciapuoti, Will McCutcheon, John Rarity, Dirk Giggenbach, ** Gyu Lim, Vadim Makarov, Ivette Fuentes, Thomas Scheidl, Erik Beckert, Mohamed Bourennane, David Edward Bruschi, Adan Cabello, Jose Capmany, Alberto Carrasco-Casado, Eleni Diamanti, Miloslav Duusek, Dominique Elser, Angelo Gulinatti, Robert H. Hadfield, Thomas Jennewein, Rainer Kaltenbaek, Michael A. Krainak , et al. (20 additional authors not shown)

    Abstract: Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph,… ▽ More

    Submitted 9 January, 2018; v1 submitted 23 March, 2017; originally announced March 2017.

    Comments: 18 pages, 13 figures, included radiation damage to detectors in appendix

    Journal ref: New J. Phys. 20, 063016 (2018)

  43. Toward an Algebraic Theory of Systems

    Authors: Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Björn Tackmann

    Abstract: We propose the concept of a system algebra with a parallel composition operation and an interface connection operation, and formalize composition-order invariance, which postulates that the order of composing and connecting systems is irrelevant, a generalized form of associativity. Composition-order invariance explicitly captures a common property that is implicit in any context where one can dra… ▽ More

    Submitted 22 September, 2018; v1 submitted 13 September, 2016; originally announced September 2016.

    Journal ref: Theoretical Computer Science, vol. 747, pp. 1-25, Nov. 2018

  44. arXiv:1607.01797  [pdf, ps, other

    quant-ph cs.CR

    Simple and tight device-independent security proofs

    Authors: Rotem Arnon-Friedman, Renato Renner, Thomas Vidick

    Abstract: Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions on the quantum devices used in a protocol, making it particularly applicable in a quantum-wary environment. While the existence of device-independent protocols for tasks such as randomness expansion an… ▽ More

    Submitted 26 March, 2019; v1 submitted 6 July, 2016; originally announced July 2016.

    Comments: Published version

    Journal ref: SIAM Journal on Computing 48.1 (2019): 181-225

  45. Entropy accumulation

    Authors: Frederic Dupuis, Omar Fawzi, Renato Renner

    Abstract: We ask the question whether entropy accumulates, in the sense that the operationally relevant total uncertainty about an $n$-partite system $A = (A_1, \ldots A_n)$ corresponds to the sum of the entropies of its parts $A_i$. The Asymptotic Equipartition Property implies that this is indeed the case to first order in $n$, under the assumption that the parts $A_i$ are identical and independent of eac… ▽ More

    Submitted 24 September, 2020; v1 submitted 6 July, 2016; originally announced July 2016.

    Comments: 44 pages; expandable to 48 pages

    Journal ref: Communications in Mathematical Physics volume 379, pages 867-913 (2020)

  46. Catalytic Decoupling of Quantum Information

    Authors: Christian Majenz, Mario Berta, Frédéric Dupuis, Renato Renner, Matthias Christandl

    Abstract: The decoupling technique is a fundamental tool in quantum information theory with applications ranging from quantum thermodynamics to quantum many body physics to the study of black hole radiation. In this work we introduce the notion of catalytic decoupling, that is, decoupling in the presence of an uncorrelated ancilla system. This removes a restriction on the standard notion of decoupling, whic… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

    Comments: 6+16 pages, 1 figure

    Journal ref: Phys. Rev. Lett. 118, 080503 (2017)

  47. Quantum theory cannot consistently describe the use of itself

    Authors: Daniela Frauchiger, Renato Renner

    Abstract: Quantum theory provides an extremely accurate description of fundamental processes in physics. It thus seems likely that the theory is applicable beyond the, mostly microscopic, domain in which it has been tested experimentally. Here we propose a Gedankenexperiment to investigate the question whether quantum theory can, in principle, have universal validity. The idea is that, if the answer was yes… ▽ More

    Submitted 5 October, 2018; v1 submitted 25 April, 2016; originally announced April 2016.

    Comments: 11 + 8 pages, 4 figures; substantially rewritten, including change of title; close to published version

    Journal ref: Nature Communications 9, 3711 (2018)

  48. Causal Boxes: Quantum Information-Processing Systems Closed under Composition

    Authors: Christopher Portmann, Christian Matt, Ueli Maurer, Renato Renner, Björn Tackmann

    Abstract: Complex information-processing systems, for example quantum circuits, cryptographic protocols, or multi-player games, are naturally described as networks composed of more basic information-processing systems. A modular analysis of such systems requires a mathematical model of systems that is closed under composition, i.e., a network of these objects is again an object of the same type. We propose… ▽ More

    Submitted 21 March, 2017; v1 submitted 7 December, 2015; originally announced December 2015.

    Comments: 44+24 pages, 16 figures. v3: minor edits based on referee comments, matches published version up to layout. v2: definition of causality weakened, new references

    Journal ref: IEEE Transactions on Information Theory, 63(5):3277-3305, May 2017

  49. arXiv:1511.08818  [pdf, other

    quant-ph cond-mat.stat-mech math-ph

    Resource theories of knowledge

    Authors: Lidia del Rio, Lea Kraemer, Renato Renner

    Abstract: How far can we take the resource theoretic approach to explore physics? Resource theories like LOCC, reference frames and quantum thermodynamics have proven a powerful tool to study how agents who are subject to certain constraints can act on physical systems. This approach has advanced our understanding of fundamental physical principles, such as the second law of thermodynamics, and provided ope… ▽ More

    Submitted 27 November, 2015; originally announced November 2015.

    Comments: 28 pages featuring figures, examples, map and neatly boxed theorems, plus appendix

  50. arXiv:1509.07127  [pdf, ps, other

    quant-ph cs.IT math-ph

    Universal recovery maps and approximate sufficiency of quantum relative entropy

    Authors: Marius Junge, Renato Renner, David Sutter, Mark M. Wilde, Andreas Winter

    Abstract: The data processing inequality states that the quantum relative entropy between two states $ρ$ and $σ$ can never increase by applying the same quantum channel $\mathcal{N}$ to both states. This inequality can be strengthened with a remainder term in the form of a distance between $ρ$ and the closest recovered state $(\mathcal{R} \circ \mathcal{N})(ρ)$, where $\mathcal{R}$ is a recovery map with th… ▽ More

    Submitted 7 August, 2018; v1 submitted 23 September, 2015; originally announced September 2015.

    Comments: v3: 24 pages, 1 figure, final version published in Annales Henri Poincaré

    Journal ref: Annales Henri Poincare, vol. 19, no. 10, pages 2955--2978, October 2018