Professional Documents
Culture Documents
Results in Physics
journal homepage: www.elsevier.com/locate/rinp
A R T I C LE I N FO A B S T R A C T
Keywords: This paper focuses on an alternative, more physically realistic model of computation than Etesi and Németi’s
Black hole computation relativistic computer in a Malament-Hogarth spacetime (2002) that uses the black hole itself combined with an
Kerr/CFT correspondence external observer equipped with a source and some method of measurement of gamma-rays, as opposed to
Holographic principle sending a classical computer into a black hole and exploiting the properties of the spacetime to achieve hy-
Information theory
percomputation. The source of output, Hawking radiation, is considered along with the constraints imposed by
Gamma-ray spectroscopy
Shannon entropy
the holographic principle which limit the number of degrees of freedom in the system and consequently the
maximum usable information. The Bekenstein-Hawking entropy is converted from the traditional form in terms
of the horizon area to that of the Shannon entropy, establishing an analogy between the physical and compu-
tational perspectives of the system. Next examples are considered to establish the approximate order of the
necessary excitation energy and the resulting gamma-ray interactions which form the input from the observer.
Finally, the Turing completeness of the language for this model is considered through a simulation of the Turing
machine. The goal is to introduce a model of computation that can later be used to study the relationship
between computability and physical systems.
In contrast to past research on computation in black holes which The AdS/CFT correspondence allows for a dual description of an
focused on the idea of sending a computer into the black hole and ex- anti-de Sitter space and a conformal field theory of one less dimension,
ploiting its relativistic properties (as in the case of [7], here it is pro- one of the most well known of which is the correspondence between the
posed that the black hole itself be used as a model of computation, AdS5 × S5 space and the D = 4, Ɲ = 4 supersymmetric SU(N) Yang-
motivated by the unique properties arising from holographic duality Mills theory. For a realistic model of a black hole we need to find the
and the greater feasibility of such a system in the real world. This is holographic dual to a Kerr solution, since we assume that the black hole
achieved by using the energy states of molecules behind the event is in an equilibrium state and has a nondegenerate event horizon [16].
horizon as the states of the computer, with the movement of the ex- This duality is called the Kerr/CFT correspondence and the associated
ternal observer measuring the system corresponding to the shifting of conformal field theory is a chiral half of a two-dimensional CFT [9].
the computer’s tape and the change in states combined with the re- The symmetry of the two-dimensional CFT is described by two co-
sulting Hawking radiation corresponding to the output. A stream of pies of the Virasoro algebra with generators that satisfy the below
photons at the appropriate energy levels is used as input to change the commutation relations, where m, n ∈ Z and c denotes the central
states of the computer. In this way a correspondence is formed between charge.
the physical and computational models of the system which may then c
contribute to a proof of its Turing completeness. [Lm , Ln] = (m − n) Lm + n + (m3 − m) δm + n,0
12
In the following sections the methods for essential components of
the computer will be developed which will then contribute to the proof [c, Ln] = 0
of the Turing completeness of this model of computation. The goal is to We only consider one copy corresponding to a chiral half of the CFT.
introduce a model of computation which can be used to investigate the Representations of the Virasoro algebra arise from the highest weight
effects of physical constraints imposed by the holographic principle and state |h > = ϕ(0)|0 > which satisfies L0|h > = h|h > , where ϕ is a
the Kerr/CFT correspondence on computation and vice versa. primary field and h denotes the conformal weight [8].
https://doi.org/10.1016/j.rinp.2019.102188
Received 19 February 2019; Accepted 9 March 2019
Available online 14 March 2019
2211-3797/ © 2019 The Author. Published by Elsevier B.V. This is an open access article under the CC BY license
(http://creativecommons.org/licenses/BY/4.0/).
G.R. Andrews Results in Physics 13 (2019) 102188
Black hole output Hawking entropy to the form of a Shannon entropy. This analogy arises
from the Bekenstein-Hawking entropy’s dependence on the horizon
The fact that particles cannot escape black holes through classical area [17]. The entanglement (or von Neumann) entropy may be written
means (arising from the second law of black hole thermodynamics [1] in similar terms to the Bekenstein-Hawking entropy, as shown below in
poses a challenge to obtaining an observable output, however Hawking the case of a ℝ1,d conformal field theory [17].
radiation circumvents this problem through quantum tunneling. Sec-
Ah
tion 2.1 considers Hawking radiation, a process described by the tun- SBH =
4GN
neling of particles out of the potential well behind the black hole hor-
izon [10,14]. A relationship between the energy of the tunneling shell A γA
and the emission rate from the black hole is also established. Section 2.2 SA = −trA ρA logρA =
considers the constraints imposed by the holographic principle on in- 4GN(d + 2)
formation density in the black hole.
ρA = trB |Ψ > < Ψ|
Hawking radiation This entanglement entropy itself may be written in the form of the
Shannon entropy [3].
Hawking radiation provides a source of information via tunneling
that avoids the problem caused by the second law of black hole ther- ρA = ∑ λj |j > < j| → SA = − ∑ λjlogλj
j j
modynamics. Hawking presents such an argument for the emission of
particles (1975). Furthermore, Parikh and Wilczek [14] derive this The next step is to relate the Bekenstein-Hawking entropy directly
phenomenon directly from the description of it as a tunneling process. to the Shannon entropy, which intuitively follows from the previously
The exponential part of the emission rate Γ from Hawking radiation shown correspondence involving the entanglement entropy and is
is related to the mass of the black hole and the energy of the particle shown below. Let Ah denote the area of the horizon which corresponds
that will potentially escape: to the area of the holographic screen. Let Ω and β denote the inside and
ω
Γ e−8πω (M − 2 ) outside of the black hole respectively. Then we change the form of SBH
to that of the entanglement entropy, writing the density matrix μβ in
Parikh & Wilczek [14] from this relation by introducing pro- terms of an orthonormal basis |Ψi > .
portionality constant α we may obtain a graph relating Γ and ω which is
shown in Fig. 1. Ah
SBH = → SBH = −trβ μβ logμβ
According to Fig. 1 Γ may only be made large if ω is either small or 4GN
large relative to the mass M of the black hole (close to 0 in the former
μβ = trΩ |Ψ > < Ψ|
case and 2 M in the latter case). Since M < 0 is ignored we must excite
the particles to be emitted past ω = 2 M (where Γ will blow up) in order
Now we may write SBH in the form of the Shannon entropy by
to achieve arbitrarily large values of Γ (which must be large enough in
writing μβ in terms of its eigenvectors |Ψj > .
order that output from the black hole may be detected by distant ob-
servers in a reasonable amount of time). μβ = ∑ μ βj |Ψj > < Ψj|
The mass of the black hole may be calculated through its relation to j
the Hawking temperature and proper distance from the black hole in
Rindler coordinates [4]. This will involve a measurement of the tem- ⎛
perature at a sufficiently far distance from the black hole since it varies SBH = −trβ (μβ logμβ ) = −trβ
⎜
∑ μ βj |Ψj > < Ψj| ∑ logμ βi |Ψi > < Ψi|⎞⎟
inversely with the distance. ⎝ j i
⎠
= − ∑ < Ψk | ∑ μ βj |Ψj > < Ψj | ∑ logμ βi |Ψi > < Ψi| Ψk >
k j i
The Bekenstein-Hawking entropy as a Shannon entropy
= − ∑ δkj μ βj δji logμ βi δik = − ∑ μ βj logμ βj
To develop the correspondence between the physical and compu- k , j, i j
2
G.R. Andrews Results in Physics 13 (2019) 102188
3
G.R. Andrews Results in Physics 13 (2019) 102188
⎝ x∂ + i ∂ y 0 ⎠ ⎝∂ 0⎠
Set of internal states Q A more realistic field may be specified by considering the case of a
free massive Dirac fermion whose Euclidean action in d dimensions is
The internal state of the black hole may be represented by the set of given by
quasi-primary fields of the CFT2 which may be used to generate the − −
secondary fields (consisting of the derivatives of all orders of the pri- S [ψ , ψ] = ∫ ddxψ (γμ ∂μ + m) ψ
mary fields ϕi which are referred to as descendant fields). Thus we may
represent the set of internal states Q as the set of all possible config- where the γμ∂μ term is the Dirac operator alternatively represented in
urations of the set of quasi-primary fields which represent their re- Feynman slash notation [6].
spective conformal families. The energy eigenvalues of the free fermion form elements of the set
Γ as in Section 5.2.
Q = {(ϕ1, ⋯, ϕn )1, ⋯, (ϕ1, ⋯, ϕn )i}
Conclusion
Input alphabet Σ
We have shown that black holes combined with an external beam of
gamma-rays form a viable model of computation; the Turing com-
For the input we consider a free (non-interacting) boson on a CFT2.
pleteness of its associated language arises intuitively from direct ana-
With Euclidean space and time coordinates σ1 and σ0 we compactify the
logues between the Turing machine and the physical device. Although
space coordinate by σ1 = σ1 + 2π which defines a cylinder. This defines
it is currently not feasible to test such a model of computation in the
the geometry for the radial quantization procedure to take place as
real world, its unconventionality provides insights into new ways of
described in [8]. The string theory normalization for the action is given
thinking about leveraging nature for computational purposes as well as
by
analyzing physical processes from a computational perspective (since
−
S= ∫ L = 21π ∫ ∂X ∂X physical events themselves may be regarded as instances of transition
functions) and the absence of a classical computer behind the horizon
4
G.R. Andrews Results in Physics 13 (2019) 102188
renders the model more physically realistic due to the inevitable quantum entanglement. Cambridge University Press; 2006.
crushing of any such computer by the tidal forces of the black hole. [4] Bigatti D, Susskind L. TASI lectures on the holographic principle. Strings, Branes,
and Gravity. 2001. p. 883–933.
Future work should look for extensions to the Turing completeness of [5] Bousso R. The holographic principle. Rev Mod Phys 2002;74(3):825.
this model, i.e. the theoretical potential for hypercomputation as has [6] Chandrasekharan S, Wiese U-J. An introduction to chiral symmetry on the lattice.
been examined for relativistic computation in Malament-Hogarth Prog Part Nucl Phys 2004;53(1):373–418.
[7] Etesi G, Németi I. Non-Turing computations via Malament-Hogarth space-times. Int
spacetimes [7], as well as further details in the feasibility of methods for J Theor Phys 2002;41:341–70.
observer-provided gamma-ray beams and measurement of the gamma- [8] Ginsparg P. Applied conformal field theory, 1988. arXiv preprint hep-th/9108028.
rays emitted from the black hole. Additionally, the theoretical de- [9] Guica M, Hartman T, Song W, Strominger A. The kerr/cft correspondence. Phys Rev
D 2009;80(12):124008.
scription of pair production gamma-ray interactions and Hawking ra- [10] Hawking SW. Particle creation by black holes. Commun Math Phys
diation in the context of the Kerr/CFT correspondence and string theory 1975;43(3):199–220.
should be formulated in future research and stronger information [11] Hawking SW, Maldacena J, Strominger A. DeSitter entropy, quantum entanglement
and AdS/CFT. J High Energy Phys 2001;2001(05):001.
bounds must be found to better define the limitations of this model of
[12] Kneiske TM, Bretz T, Mannheim K, Hartmann DH. Implications of cosmological
computation. gamma-ray absorption – II. Modification of gamma-ray spectra. A & A
2004;413(3):807–15.
Acknowledgements [13] Linz P. An introduction to formal languages and automata. 5th ed. Jones & Bartlett
Learning; 2012.
[14] Parikh MK, Wilczek F. Hawking radiation as tunneling. Phys Rev Lett
This research did not receive any specific grant from funding 2001;85(24):5042.
agencies in the public, commercial, or not-for-profit sectors. [15] Rittersdorf I. Gamma ray spectroscopy. Nucl Eng Radiol Sci 2007:18–20.
[16] Robinson DC. Uniqueness of the Kerr black hole. Phys Rev Lett 1975;34(14):905.
[17] Ryu S, Takayanagi T. Holographic derivation of entanglement entropy from AdS/
References CFT. Phys Rev Lett 2008;96(18):181602.
[18] Solodukhin SN. Entanglement entropy of black holes. Living Rev Relativ
2011;14(1):8.
[1] Bardeen JM, Carter B, Hawking SW. The four laws of black hole mechanics.
[19] Susskind L, Uglum J. Black hole entropy in canonical quantum gravity and super-
Commun Math Phys 1973;31(2):161–70.
string theory. Phys Rev D 1994;50(4):2700.
[2] Bekenstein JD. Black holes and information theory. Contemp Phys
[20] Tipler RJ. Feynman-Weinberg quantum gravity and the extended standard model as
2003;45(1):31–43.
a theory of everything; 2007. arXiv preprint arXiv:0704.3276.
[3] Bengtsson I, Zyczkowski K. Geometry of quantum states: an introduction to