symposium on Theory of computing, pages 733–744. ACM, 1992. DOI:
10.1145/129712.129783.
[14] Samuel Fiorini, Serge Massar, Manas K Patra, and Hans Raj Tiwary. Gen-
eralized probabilistic theories and conic extensions of polytopes. Journal
of Physics A: Mathematical and Theoretical, 48(2):025302, 2014. DOI:
10.1088/1751-8113/48/2/025302.
[15] Dmitry Gavinsky. Quantum money with classical verification. In Compu-
tational Complexity (CCC), 2012 IEEE 27th Annual Conference on, pages
42–52. IEEE, 2012. DOI: 10.1063/1.4903116.
[16] Sevag Gharibian, Jamie Sikora, and Sarvagya Upadhyay. QMA variants
with polynomially many provers. Quantum Information & Computation,
13(1&2):0135–0157, 2013.
[17] Lucien Hardy. Quantum theory from five reasonable axioms. arXiv preprint
arXiv:0101012, 2001.
[18] Lucien Hardy. Reformulating and reconstructing quantum theory. arXiv
preprint arXiv:1104.2066, 2011.
[19] Anna Jenˇcov´a and Martin Pl´avala. Conditions on the existence of maximally
incompatible two-outcome measurements in general probabilistic theory.
Physical Review A, 96:022113, 2017. DOI: 10.1103/PhysRevA.96.022113.
[20] Aleks Kissinger, Matty Hoban, and Bob Coecke. Equivalence of relativistic
causal structure and process terminality. arXiv preprint arXiv:1708.04118,
2017.
[21] Ludovico Lami, Carlos Palazuelos, and Andreas Winter. Ultimate data hid-
ing in quantum mechanics and beyond. Communications in Mathematical
Physics, pages 1–48, 2017. DOI: 10.1007/s00220-018-3154-4.
[22] Monique Laurent and Teresa Piovesan. Conic approach to quantum
graph parameters using linear optimization over the completely posi-
tive semidefinite cone. Siam J. Optim., 25(4):2461–2493, 2015. DOI:
10.1137/14097865X.
[23] G. Ludwig. An Axiomatic Basis of Quantum Mechanics. 1. Derivation of
Hilbert Space. Springer-Verlag, 1985.
[24] G. W. Mackey. The mathematical foundations of quantum mechanics. W.
A. Benjamin, New York, 1963.
[25] Abel Molina, Thomas Vidick, and John Watrous. Optimal counterfeiting
attacks and generalizations for Wiesner’s quantum money. In Proceedings of
the 7th Conference on Theory of Quantum Computation, Communication,
and Cryptography, volume 7582 of Lecture Notes in Computer Science, pages
45–64, 2013. DOI: 10.1007/978-3-642-35656-8˙4.
[26] Ashwin Nayak, Jamie Sikora, and Levent Tun¸cel. A search for quantum
coin-flipping protocols using optimization techniques. Mathematical Pro-
gramming, 156(1-2):581–613, 2016. DOI: 10.1007/s10107-015-0909-y.
[27] C. Piron. Axiomatique quantique. Helvetia Physica Acta, 37:439–468, 1964.
[28] CH Randall and DJ Foulis. An approach to empirical logic. The American
Mathematical Monthly, 77(4):363–374, 1970. DOI: 10.2307/2316143.
[29] John H Selby. A process theoretic triptych. PhD thesis, Imperial College
London, 2017.
Accepted in Quantum 2018-09-21, click title to verify 23