#### Filter Results:

- Full text PDF available (15)

#### Publication Year

1989

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Marco Tomamichel, Roger Colbeck, Renato Renner
- IEEE Transactions on Information Theory
- 2010

In classical and quantum information theory, operational quantities such as the amount of randomness that can be extracted from a given source or the amount of space needed to store given data are normally characterized by one of two entropy measures, called smooth min-entropy and smooth max-entropy, respectively. While both entropies are equal to the von… (More)

- Marco Tomamichel, Roger Colbeck, Renato Renner
- IEEE Transactions on Information Theory
- 2009

The classical asymptotic equipartition property is the statement that, in the limit of a large number of identical repetitions of a random experiment, the output sequence is virtually certain to come from the typical set, each member of which is almost equally likely. In this paper, a fully quantum generalization of this property is shown, where both the… (More)

- Ligong Wang, Renato Renner, Roger Colbeck
- 2009 IEEE International Symposium on Information…
- 2009

New channel coding converse and achievability bounds are derived for a single use of an arbitrary channel. Both bounds are expressed using a quantity called the “smooth 0-divergence”, which is a generalization of Rényi's divergence of order 0. The bounds are also studied in the limit of large block-lengths. In particular, they combine… (More)

- Roger Colbeck, Renato Renner
- Physical review letters
- 2008

It was shown by Bell that no local hidden variable model is compatible with quantum mechanics. If, instead, one permits the hidden variables to be entirely nonlocal, then any quantum mechanical predictions can be recovered. In this Letter, we consider general hidden variable models which can have both local and nonlocal parts. We show the existence of… (More)

- Roger Colbeck, Renato Renner
- Nature communications
- 2011

According to quantum theory, measurements generate random outcomes, in stark contrast with classical mechanics. This raises the question of whether there could exist an extension of the theory that removes this indeterminism, as suspected by Einstein, Podolsky and Rosen. Although this has been shown to be impossible, existing results do not imply that the… (More)

- Roger Colbeck
- 2011

- Jonathan Barrett, Roger Colbeck, Adrian Kent
- Physical review letters
- 2013

Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest,… (More)

- Jonathan Barrett, Roger Colbeck, Adrian Kent
- ArXiv
- 2012

Outline • Motivation for device-independence • Brief History • Recent developments • Main result • Remaining problems and open questions Theoretical Start with 'clean', well-defined assumptions and try to prove security based on these. Two sides of cryptography Practical Try to build devices that satisfy the theoretical assumptions as closely as possible.… (More)

- Terence E Stuart, Joshua A Slater, Roger Colbeck, Renato Renner, Wolfgang Tittel
- Physical review letters
- 2012

The question of whether the probabilistic nature of quantum mechanical predictions can be alleviated by supplementing the wave function with additional information has received a lot of attention during the past century. A few specific models have been suggested and subsequently falsified. Here we give a more general answer to this question: We provide… (More)

- Patrick J Coles, Roger Colbeck, Li Yu, Michael Zwolak
- Physical review letters
- 2012

Uncertainty relations provide constraints on how well the outcomes of incompatible measurements can be predicted, and as well as being fundamental to our understanding of quantum theory, they have practical applications such as for cryptography and witnessing entanglement. Here we shed new light on the entropic form of these relations, showing that they… (More)