Skip to main content

Showing 1–41 of 41 results for author: Renner, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.05141  [pdf, other

    cs.NE cs.LG

    Learning-to-learn enables rapid learning with phase-change memory-based in-memory computing

    Authors: Thomas Ortner, Horst Petschenig, Athanasios Vasilopoulos, Roland Renner, Špela Brglez, Thomas Limbacher, Enrique Piñero, Alejandro Linares Barranco, Angeliki Pantazi, Robert Legenstein

    Abstract: There is a growing demand for low-power, autonomously learning artificial intelligence (AI) systems that can be applied at the edge and rapidly adapt to the specific situation at deployment site. However, current AI models struggle in such scenarios, often requiring extensive fine-tuning, computational resources, and data. In contrast, humans can effortlessly adjust to new tasks by transferring kn… ▽ More

    Submitted 22 April, 2024; originally announced May 2024.

    Comments: 16 pages and 3 appendix pages; Preprint currently under review

  2. arXiv:2307.15116  [pdf, other

    quant-ph cs.CR

    The debate over QKD: A rebuttal to the NSA's objections

    Authors: Renato Renner, Ramona Wolf

    Abstract: A recent publication by the NSA assessing the usability of quantum cryptography has generated significant attention, concluding that this technology is not recommended for use. Here, we reply to this criticism and argue that some of the points raised are unjustified, whereas others are problematic now but can be expected to be resolved in the foreseeable future.

    Submitted 27 July, 2023; originally announced July 2023.

  3. arXiv:2206.04078  [pdf, other

    quant-ph cs.CR

    Quantum Advantage in Cryptography

    Authors: Renato Renner, Ramona Wolf

    Abstract: Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle? At first sight, it looks as if it just lifts the competition between cryp… ▽ More

    Submitted 11 January, 2023; v1 submitted 8 June, 2022; originally announced June 2022.

    Comments: 31 pages, 9 figures, 1 table. To appear in the AIAA journal

    Journal ref: AIAA Journal 61(5), 1895-1910 (2023)

  4. Generalised entropy accumulation

    Authors: Tony Metger, Omar Fawzi, David Sutter, Renato Renner

    Abstract: Consider a sequential process in which each step outputs a system $A_i$ and updates a side information register $E$. We prove that if this process satisfies a natural "non-signalling" condition between past outputs and future side information, the min-entropy of the outputs $A_1, \dots, A_n$ conditioned on the side information $E$ at the end of the process can be bounded from below by a sum of von… ▽ More

    Submitted 28 October, 2022; v1 submitted 9 March, 2022; originally announced March 2022.

    Comments: 42 pages; v2 expands introduction but does not change any results; in FOCS 2022

    Journal ref: 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), Denver, CO, USA, 2022, pp. 844-850

  5. Experimental quantum key distribution certified by Bell's theorem

    Authors: D. P. Nadlinger, P. Drmota, B. C. Nichol, G. Araneda, D. Main, R. Srinivas, D. M. Lucas, C. J. Ballance, K. Ivanov, E. Y-Z. Tan, P. Sekatski, R. L. Urbanke, R. Renner, N. Sangouard, J-D. Bancal

    Abstract: Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorisation to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols like the one proposed by Bennett and Brassard provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. H… ▽ More

    Submitted 5 September, 2023; v1 submitted 29 September, 2021; originally announced September 2021.

    Comments: 5+1 pages in main text and methods with 4 figures and 1 table; 42 pages of supplementary material (replaced with revision accepted for publication in Nature; original title: "Device-Independent Quantum Key Distribution")

    Journal ref: Nature 607, 682-686 (2022)

  6. arXiv:2102.00021  [pdf, other

    quant-ph cs.CR cs.IT

    Security in Quantum Cryptography

    Authors: Christopher Portmann, Renato Renner

    Abstract: Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic requirement here is that the transmitted messages remain inaccessible to anyone other than the designated recipients, even if the communication channel… ▽ More

    Submitted 30 August, 2021; v1 submitted 29 January, 2021; originally announced February 2021.

    Comments: 63 pages, 34 figures. In submission to RMP. Partly based on arXiv:1409.3525. v2: new references and minor edits

  7. arXiv:2001.00593  [pdf, other

    quant-ph cs.AI cs.LG

    Operationally meaningful representations of physical systems in neural networks

    Authors: Hendrik Poulsen Nautrup, Tony Metger, Raban Iten, Sofiene Jerbi, Lea M. Trenkwalder, Henrik Wilming, Hans J. Briegel, Renato Renner

    Abstract: To make progress in science, we often build abstract representations of physical systems that meaningfully encode information about the systems. The representations learnt by most current machine learning techniques reflect statistical structure present in the training data; however, these methods do not allow us to specify explicit and operationally meaningful requirements on the representation.… ▽ More

    Submitted 2 January, 2020; originally announced January 2020.

    Comments: 24 pages, 13 figures

    Journal ref: Mach. Learn.: Sci. Technol. 3, 045025, 2022

  8. A chain rule for the quantum relative entropy

    Authors: Kun Fang, Omar Fawzi, Renato Renner, David Sutter

    Abstract: The chain rule for the classical relative entropy ensures that the relative entropy between probability distributions on multipartite systems can be decomposed into a sum of relative entropies of suitably chosen conditional distributions on the individual systems. Here, we prove a similar chain rule inequality for the quantum relative entropy in terms of channel relative entropies. The new chain r… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: 12 pages

    Journal ref: Phys. Rev. Lett. 124, 100501 (2020)

  9. arXiv:1905.03270  [pdf, ps, other

    math-ph cs.IT math.DS quant-ph

    Bounds on Lyapunov exponents via entropy accumulation

    Authors: David Sutter, Omar Fawzi, Renato Renner

    Abstract: Lyapunov exponents describe the asymptotic behavior of the singular values of large products of random matrices. A direct computation of these exponents is however often infeasible. By establishing a link between Lyapunov exponents and an information theoretic tool called entropy accumulation theorem we derive an upper and a lower bound for the maximal and minimal Lyapunov exponent, respectively.… ▽ More

    Submitted 22 September, 2020; v1 submitted 8 May, 2019; originally announced May 2019.

    Comments: v4: 24 pages, published version

    Journal ref: IEEE Transactions on Information Theory, vol. 67, no 1, pages 10-24, 2021

  10. arXiv:1807.10300  [pdf, other

    quant-ph cs.LG physics.data-an

    Discovering physical concepts with neural networks

    Authors: Raban Iten, Tony Metger, Henrik Wilming, Lidia del Rio, Renato Renner

    Abstract: Despite the success of neural networks at solving concrete physics problems, their use as a general-purpose tool for scientific discovery is still in its infancy. Here, we approach this problem by modelling a neural network architecture after the human physical reasoning process, which has similarities to representation learning. This allows us to make progress towards the long-term goal of machin… ▽ More

    Submitted 23 January, 2020; v1 submitted 26 July, 2018; originally announced July 2018.

    Comments: 4 pages main text + 11 pages appendix, changes since v2: improved references and presentation

    Journal ref: Phys. Rev. Lett. 124, 010508 (2020)

  11. arXiv:1802.07795  [pdf, ps, other

    quant-ph cs.CC cs.IT

    Communication Complexity of One-Shot Remote State Preparation

    Authors: Shima Bab Hadiashar, Ashwin Nayak, Renato Renner

    Abstract: Quantum teleportation uses prior shared entanglement and classical communication to send an unknown quantum state from one party to another. Remote state preparation (RSP) is a similar distributed task in which the sender knows the entire classical description of the state to be sent. (This may also be viewed as the task of non-oblivious compression of a single sample from an ensemble of quantum s… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: 36 pages

  12. Toward an Algebraic Theory of Systems

    Authors: Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Björn Tackmann

    Abstract: We propose the concept of a system algebra with a parallel composition operation and an interface connection operation, and formalize composition-order invariance, which postulates that the order of composing and connecting systems is irrelevant, a generalized form of associativity. Composition-order invariance explicitly captures a common property that is implicit in any context where one can dra… ▽ More

    Submitted 22 September, 2018; v1 submitted 13 September, 2016; originally announced September 2016.

    Journal ref: Theoretical Computer Science, vol. 747, pp. 1-25, Nov. 2018

  13. arXiv:1607.01797  [pdf, ps, other

    quant-ph cs.CR

    Simple and tight device-independent security proofs

    Authors: Rotem Arnon, Renato Renner, Thomas Vidick

    Abstract: Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions on the quantum devices used in a protocol, making it particularly applicable in a quantum-wary environment. While the existence of device-independent protocols for tasks such as randomness expansion an… ▽ More

    Submitted 26 March, 2019; v1 submitted 6 July, 2016; originally announced July 2016.

    Comments: Published version

    Journal ref: SIAM Journal on Computing 48.1 (2019): 181-225

  14. Entropy accumulation

    Authors: Frederic Dupuis, Omar Fawzi, Renato Renner

    Abstract: We ask the question whether entropy accumulates, in the sense that the operationally relevant total uncertainty about an $n$-partite system $A = (A_1, \ldots A_n)$ corresponds to the sum of the entropies of its parts $A_i$. The Asymptotic Equipartition Property implies that this is indeed the case to first order in $n$, under the assumption that the parts $A_i$ are identical and independent of eac… ▽ More

    Submitted 24 September, 2020; v1 submitted 6 July, 2016; originally announced July 2016.

    Comments: 44 pages; expandable to 48 pages

    Journal ref: Communications in Mathematical Physics volume 379, pages 867-913 (2020)

  15. Causal Boxes: Quantum Information-Processing Systems Closed under Composition

    Authors: Christopher Portmann, Christian Matt, Ueli Maurer, Renato Renner, Björn Tackmann

    Abstract: Complex information-processing systems, for example quantum circuits, cryptographic protocols, or multi-player games, are naturally described as networks composed of more basic information-processing systems. A modular analysis of such systems requires a mathematical model of systems that is closed under composition, i.e., a network of these objects is again an object of the same type. We propose… ▽ More

    Submitted 21 March, 2017; v1 submitted 7 December, 2015; originally announced December 2015.

    Comments: 44+24 pages, 16 figures. v3: minor edits based on referee comments, matches published version up to layout. v2: definition of causality weakened, new references

    Journal ref: IEEE Transactions on Information Theory, 63(5):3277-3305, May 2017

  16. arXiv:1509.07127  [pdf, ps, other

    quant-ph cs.IT math-ph

    Universal recovery maps and approximate sufficiency of quantum relative entropy

    Authors: Marius Junge, Renato Renner, David Sutter, Mark M. Wilde, Andreas Winter

    Abstract: The data processing inequality states that the quantum relative entropy between two states $ρ$ and $σ$ can never increase by applying the same quantum channel $\mathcal{N}$ to both states. This inequality can be strengthened with a remainder term in the form of a distance between $ρ$ and the closest recovered state $(\mathcal{R} \circ \mathcal{N})(ρ)$, where $\mathcal{R}$ is a recovery map with th… ▽ More

    Submitted 7 August, 2018; v1 submitted 23 September, 2015; originally announced September 2015.

    Comments: v3: 24 pages, 1 figure, final version published in Annales Henri Poincaré

    Journal ref: Annales Henri Poincare, vol. 19, no. 10, pages 2955--2978, October 2018

  17. arXiv:1504.07251  [pdf, ps, other

    quant-ph cs.IT math-ph

    Universal recovery map for approximate Markov chains

    Authors: David Sutter, Omar Fawzi, Renato Renner

    Abstract: A central question in quantum information theory is to determine how well lost information can be reconstructed. Crucially, the corresponding recovery operation should perform well without knowing the information to be reconstructed. In this work, we show that the quantum conditional mutual information measures the performance of such recovery operations. More precisely, we prove that the conditio… ▽ More

    Submitted 23 September, 2015; v1 submitted 27 April, 2015; originally announced April 2015.

    Comments: v3: 31 pages, 1 figure, application to topological order of quantum systems added (Section 3). v2: 29 pages, relation to [Wilde, arXiv:1505.04661] clarified (Remark 2.5)

    Journal ref: Proceedings of the Royal Society A, vol. 472, no. 2186, 2016

  18. Approximate Degradable Quantum Channels

    Authors: David Sutter, Volkher B. Scholz, Andreas Winter, Renato Renner

    Abstract: Degradable quantum channels are an important class of completely positive trace-preserving maps. Among other properties, they offer a single-letter formula for the quantum and the private classical capacity and are characterized by the fact that a complementary channel can be obtained from the channel by applying a degrading channel. In this work we introduce the concept of approximate degradable… ▽ More

    Submitted 17 October, 2017; v1 submitted 2 December, 2014; originally announced December 2014.

    Comments: v3: minor changes, published version. v2: 21 pages, 2 figures, improved bounds on the capacity for approximate degradable channels based on [arXiv:1507.07775], an author added

    MSC Class: 81P45

    Journal ref: IEEE Transactions on Information Theory, vol. 63, no. 12, pages 7832 - 7844, 2017

  19. arXiv:1411.1582  [pdf, ps, other

    quant-ph cs.CC

    Non-signalling parallel repetition using de Finetti reductions

    Authors: Rotem Arnon, Renato Renner, Thomas Vidick

    Abstract: In the context of multiplayer games, the parallel repetition problem can be phrased as follows: given a game $G$ with optimal winning probability $1-α$ and its repeated version $G^n$ (in which $n$ games are played together, in parallel), can the players use strategies that are substantially better than ones in which each game is played independently? This question is relevant in physics for the st… ▽ More

    Submitted 6 November, 2014; originally announced November 2014.

  20. arXiv:1409.3525  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Cryptographic security of quantum key distribution

    Authors: Christopher Portmann, Renato Renner

    Abstract: This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition. We review the notion of security necessary for a protocol to be usable in a larger cryptographic context, i.e., for it to remain secure when composed with other secure protocols. We then derive the corresponding security criterion for QKD. We p… ▽ More

    Submitted 11 September, 2014; originally announced September 2014.

    Comments: 31+23 pages. 28 figures. Comments and questions welcome

  21. Efficient Approximation of Quantum Channel Capacities

    Authors: David Sutter, Tobias Sutter, Peyman Mohajerin Esfahani, Renato Renner

    Abstract: We propose an iterative method for approximating the capacity of classical-quantum channels with a discrete input alphabet and a finite dimensional output, possibly under additional constraints on the input distribution. Based on duality of convex programming, we derive explicit upper and lower bounds for the capacity. To provide an $\varepsilon$-close estimate to the capacity, the presented algor… ▽ More

    Submitted 30 July, 2014; originally announced July 2014.

    Comments: 36 pages, 1 figure

    Journal ref: IEEE Transactions on Information Theory vol. 62, no 1, pages 578-598, 2016

  22. arXiv:1404.7516  [pdf, ps, other

    quant-ph cs.CR

    Classical leakage resilience from fault-tolerant quantum computation

    Authors: Felipe G. Lacerda, Joseph M. Renes, Renato Renner

    Abstract: Physical implementations of cryptographic algorithms leak information, which makes them vulnerable to so-called side-channel attacks. The problem of secure computation in the presence of leakage is generally known as leakage resilience. In this work, we establish a connection between leakage resilience and fault-tolerant quantum computation. We first prove that for a general leakage model, there e… ▽ More

    Submitted 29 April, 2014; originally announced April 2014.

    Comments: 22 pages, 6 figures

  23. arXiv:1311.4547  [pdf, other

    quant-ph cs.CR

    True randomness from realistic quantum devices

    Authors: Daniela Frauchiger, Renato Renner, Matthias Troyer

    Abstract: Even if the output of a Random Number Generator (RNG) is perfectly uniformly distributed, it may be correlated to pre-existing information and therefore be predictable. Statistical tests are thus not sufficient to guarantee that an RNG is usable for applications, e.g., in cryptography or gambling, where unpredictability is important. To enable such applications a stronger notion of randomness, ter… ▽ More

    Submitted 18 November, 2013; originally announced November 2013.

    Comments: 12 pages + appendix; see ancillary files for extractor software

  24. Smooth Max-Information as One-Shot Generalization for Mutual Information

    Authors: Nikola Ciganović, Normand J. Beaudry, Renato Renner

    Abstract: We study formal properties of smooth max-information, a generalization of von Neumann mutual information derived from the max-relative entropy. Recent work suggests that it is a useful quantity in one-shot channel coding, quantum rate distortion theory and the physics of quantum many-body systems. Max-information can be defined in multiple ways. We demonstrate that different smoothed definitions… ▽ More

    Submitted 27 August, 2013; originally announced August 2013.

    Comments: 15 pages

    Journal ref: IEEE Trans. Inf. Theory 60(3), 1573-1581, 2014

  25. Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization

    Authors: David Sutter, Joseph M. Renes, Renato Renner

    Abstract: We introduce explicit schemes based on the polarization phenomenon for the tasks of one-way secret key agreement from common randomness and private channel coding. For the former task, we show how to use common randomness and insecure one-way communication to obtain a strongly secure key such that the key construction has a complexity essentially linear in the blocklength and the rate at which the… ▽ More

    Submitted 12 April, 2013; originally announced April 2013.

    Comments: 18.1 pages, 2 figures, 2 tables

    Journal ref: ASIACRYPT 2013, p. 194-213

  26. One-shot lossy quantum data compression

    Authors: Nilanjana Datta, Joseph M. Renes, Renato Renner, Mark M. Wilde

    Abstract: We provide a framework for one-shot quantum rate distortion coding, in which the goal is to determine the minimum number of qubits required to compress quantum information as a function of the probability that the distortion incurred upon decompression exceeds some specified level. We obtain a one-shot characterization of the minimum qubit compression size for an entanglement-assisted quantum rate… ▽ More

    Submitted 17 September, 2013; v1 submitted 8 April, 2013; originally announced April 2013.

    Comments: 36 pages

    Journal ref: IEEE Transactions on Information Theory vol. 59, no. 12, pages 8057-8076 (December 2013)

  27. arXiv:1301.3662  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Composable security of delegated quantum computation

    Authors: Vedran Dunjko, Joseph F. Fitzsimons, Christopher Portmann, Renato Renner

    Abstract: Delegating difficult computations to remote large computation facilities, with appropriate security guarantees, is a possible solution for the ever-growing needs of personal computing power. For delegated computation protocols to be usable in a larger context---or simply to securely run two protocols in parallel---the security definitions need to be composable. Here, we define composable security… ▽ More

    Submitted 13 September, 2014; v1 submitted 16 January, 2013; originally announced January 2013.

    Comments: 37+9 pages, 13 figures. v3: minor changes, new references. v2: extended the reduction between composable and local security to include entangled inputs, substantially rewritten the introduction to the Abstract Cryptography (AC) framework

    Journal ref: ASIACRYPT 2014, LNCS Volume 8874, 2014, pp 406-425

  28. arXiv:1209.2423  [pdf, ps, other

    quant-ph cs.CR

    Reply to recent scepticism about the foundations of quantum cryptography

    Authors: Renato Renner

    Abstract: In a series of recent papers, Hirota and Yuen claim to have identified a fundamental flaw in the theory underlying quantum cryptography, which would invalidate existing security proofs. In this short note, we sketch their argument and show that their conclusion is unjustified --- it originates from a confusion between necessary and sufficient criteria for secrecy.

    Submitted 11 September, 2012; originally announced September 2012.

    Comments: 1 page + references and footnotes

  29. Achieving the Capacity of any DMC using only Polar Codes

    Authors: David Sutter, Joseph M. Renes, Frédéric Dupuis, Renato Renner

    Abstract: We construct a channel coding scheme to achieve the capacity of any discrete memoryless channel based solely on the techniques of polar coding. In particular, we show how source polarization and randomness extraction via polarization can be employed to "shape" uniformly-distributed i.i.d. random variables into approximate i.i.d. random variables distributed ac- cording to the capacity-achieving di… ▽ More

    Submitted 27 August, 2012; v1 submitted 16 May, 2012; originally announced May 2012.

    Comments: 9 pages, 7 figures

  30. Efficient Quantum Polar Coding

    Authors: Joseph M. Renes, Frederic Dupuis, Renato Renner

    Abstract: Polar coding, introduced 2008 by Arikan, is the first (very) efficiently encodable and decodable coding scheme whose information transmission rate provably achieves the Shannon bound for classical discrete memoryless channels in the asymptotic limit of large block sizes. Here we study the use of polar codes for the transmission of quantum information. Focusing on the case of qubit Pauli channels a… ▽ More

    Submitted 24 March, 2012; v1 submitted 14 September, 2011; originally announced September 2011.

    Comments: v1: 15 pages, 4 figures. v2: 5+3 pages, 3 figures; argumentation simplified and improved

    Journal ref: Phys. Rev. Lett. 109, 050504 (2012)

  31. Noisy channel coding via privacy amplification and information reconciliation

    Authors: Joseph M. Renes, Renato Renner

    Abstract: We show that optimal protocols for noisy channel coding of public or private information over either classical or quantum channels can be directly constructed from two more primitive information-theoretic tools: privacy amplification and information reconciliation, also known as data compression with side information. We do this in the one-shot scenario of structureless resources, and formulate ou… ▽ More

    Submitted 24 March, 2012; v1 submitted 21 December, 2010; originally announced December 2010.

    Comments: 8 pages, 2 figures. v2: final version for publication

    Journal ref: IEEE Transactions on Information Theory 57, 7377 (2011)

  32. arXiv:1009.1833  [pdf, ps, other

    quant-ph cs.CR

    Device-Independent Quantum Key Distribution with Commuting Measurements

    Authors: Esther Hänggi, Renato Renner

    Abstract: We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.

    Submitted 18 November, 2010; v1 submitted 9 September, 2010; originally announced September 2010.

    Comments: 26 pages. See also the related work arXiv:1009.1567

  33. Composability in quantum cryptography

    Authors: Joern Mueller-Quade, Renato Renner

    Abstract: In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission). To illustrate the practical use of composability, we show how to g… ▽ More

    Submitted 11 June, 2010; originally announced June 2010.

    Comments: 18 pages, 2 figures

    Journal ref: New Journal of Physics, 11, 085006, 2009 (Focus on Quantum Cryptography: Theory and Practice)

  34. arXiv:0912.5514  [pdf, ps, other

    quant-ph cs.CC cs.CR

    Trevisan's extractor in the presence of quantum side information

    Authors: Anindya De, Christopher Portmann, Thomas Vidick, Renato Renner

    Abstract: Randomness extraction involves the processing of purely classical information and is therefore usually studied in the framework of classical probability theory. However, such a classical treatment is generally too restrictive for applications, where side information about the values taken by classical random variables may be represented by the state of a quantum system. This is particularly releva… ▽ More

    Submitted 18 June, 2012; v1 submitted 30 December, 2009; originally announced December 2009.

    Comments: 20+10 pages; v2: extract more min-entropy, use weakly random seed; v3: extended introduction, matches published version with sections somewhat reordered

    Journal ref: SIAM Journal on Computing, 41(4):915-940, 2012

  35. arXiv:0901.0834  [pdf, ps, other

    cs.IT

    Simple Channel Coding Bounds

    Authors: Ligong Wang, Roger Colbeck, Renato Renner

    Abstract: New channel coding converse and achievability bounds are derived for a single use of an arbitrary channel. Both bounds are expressed using a quantity called the "smooth 0-divergence", which is a generalization of Renyi's divergence of order 0. The bounds are also studied in the limit of large block-lengths. In particular, they combine to give a general capacity formula which is equivalent to the o… ▽ More

    Submitted 28 July, 2010; v1 submitted 7 January, 2009; originally announced January 2009.

    Comments: Presented at ISIT 2009

  36. arXiv:quant-ph/0701168  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Using quantum key distribution for cryptographic purposes: a survey

    Authors: Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew Shields, Harald Weinfurter, Anton Zeilinger

    Abstract: The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the… ▽ More

    Submitted 4 December, 2014; v1 submitted 23 January, 2007; originally announced January 2007.

    Comments: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81

    Journal ref: Theoretical Computer Science, 560 (2014), pp. 62-81

  37. arXiv:quant-ph/0612014  [pdf, ps, other

    quant-ph cs.CR

    A Tight High-Order Entropic Quantum Uncertainty Relation With Applications

    Authors: Ivan B. Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner

    Abstract: We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight and can be applied in various quantum-cryptographic settings. Protocols for quantum 1-out-of-2 Oblivious Transfer and quantum Bit Commitment are presented and the uncertainty relation is used to prove the security of these protocols in the bounded quantum-storage model according to new strong sec… ▽ More

    Submitted 19 August, 2007; v1 submitted 2 December, 2006; originally announced December 2006.

    Comments: 21 pages; editorial changes, additional application

    Journal ref: full version of CRYPTO 2007, LNCS 4622

  38. arXiv:cs/0608018  [pdf, ps, other

    cs.IT

    The single-serving channel capacity

    Authors: Renato Renner, Stefan Wolf, Juerg Wullschleger

    Abstract: In this paper we provide the answer to the following question: Given a noisy channel and epsilon>0, how many bits can be transmitted with an error of at most epsilon by a single use of the channel?

    Submitted 2 August, 2006; originally announced August 2006.

    Comments: 4 pages, latex

    Journal ref: Proceedings of the 2006 IEEE International Symposium on Information Theory (ISIT)

  39. arXiv:cs/0608007  [pdf, ps, other

    cs.IT

    On the randomness of independent experiments

    Authors: Thomas Holenstein, Renato Renner

    Abstract: Given a probability distribution P, what is the minimum amount of bits needed to store a value x sampled according to P, such that x can later be recovered (except with some small probability)? Or, what is the maximum amount of uniform randomness that can be extracted from x? Answering these and similar information-theoretic questions typically boils down to computing so-called smooth entropies.… ▽ More

    Submitted 1 August, 2006; originally announced August 2006.

    Comments: latex, 15 pages

  40. Full security of quantum key distribution from no-signaling constraints

    Authors: Ll. Masanes, R. Renner, M. Christandl, A. Winter, J. Barrett

    Abstract: We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle. The claim holds with respect to the state-of-the-art security definition used… ▽ More

    Submitted 24 September, 2014; v1 submitted 6 June, 2006; originally announced June 2006.

    Comments: 15 pages, 2 figure

    Journal ref: IEEE Transactions on Information Theory, Volume 60, Issue 8, pages 4973-4986, year 2014

  41. arXiv:cs/0509013  [pdf, ps, other

    cs.IT

    On the variational distance of independently repeated experiments

    Authors: Renato Renner

    Abstract: Let P and Q be two probability distributions which differ only for values with non-zero probability. We show that the variational distance between the n-fold product distributions P^n and Q^n cannot grow faster than the square root of n.

    Submitted 5 September, 2005; originally announced September 2005.

    Comments: 8 pages