Professional Documents
Culture Documents
(1+1) D Calculation Provides Evidence That Quantum Entanglement Survives A Firewall
(1+1) D Calculation Provides Evidence That Quantum Entanglement Survives A Firewall
poorly understood.
Introduction.— If black hole evaporation preserves of the detectors goes through a Rindler firewall? A posi-
unitarity, it has been argued from preservation of corre- tive answer could be seen as indirect support of the fire-
lations that the horizon of a shrinking black hole must wall argument as given in [3].
develop a singularity even when the evaporation is still Our main conclusion runs contrary to these expecta-
slow and the black hole remains macroscopic [1–3] (for tions. The Rindler firewall turns out to have only a mod-
a selection of debate and reviews see [4–11]). Model- est effect on the decoherence between the two detectors,
ing the gravitational aspects of this proposed singularity and in certain regions of the parameter space the fire-
has remained elusive. For instance, the emergence of a wall even preserves the entanglement between the two
Planck scale shell near the horizon of an astrophysical detectors better than Minkowski vacuum. A firewall’s
black hole seems to be in tension with the gravitational prospective capability to resolve the black hole informa-
dynamics predicted by general relativity [12]. Neverthe- tion paradox must hence hinge on its detailed late time
less, the nongravitational aspects of the “firewall” version gravitational structure, at present poorly understood.
of the singularity [3] can be modeled with a quantum Formalism: evolving an inertial detector
field in Minkowski spacetime: a state in which correla- pair.— We consider a pair of Unruh-DeWitt detectors
tions across a Rindler horizon are severed can be written [16, 17] coupled to a real scalar field φ and moving in-
down by hand [13], mimicking the severing that the fire- ertially in Minkowki spacetime without relative veloc-
wall argument of [3] posits to develop dynamically during ity [20]. (For an inertial detector and an accelerated
black hole evaporation. This severing of correlations has detector, see, e.g., [21–23].) We evolve the system with
strong similarities to that which ensues on the sudden respect to the Minkowski time t in a Lorentz frame in
insertion of a reflective wall in a spacetime [14, 15]. The which the two detectors are at rest, and we denote t by
Rindler firewall state can be studied by usual quantum τ as it coincides with the detectors’ proper time. The
field theory techniques, and the conclusions should apply interaction picture Hamiltonian is
to young gravitational firewalls where the backreaction
X
on the metric is still small. H= λν χν (τ )µν (τ )φ xν (τ ) , (1)
In this letter we analyse the correlations between two ν
particle detectors when one of them falls through a
Rindler firewall. From the quantum field theory side, where the index ν labels the two detectors, xν (τ ) are
this question is motivated by the fact that any measure- their worldlines, µν (τ ) are the monopole moment op-
ments of quantum fields are done through material par- erators and λν are the coupling constants. The real-
ticle detectors, and we may employ the Unruh-DeWitt valued switching functions χν specify how the interac-
detector model [16, 17] to capture the essential aspects tion is turned on and off. We assume that χν either have
of interactions between atoms and the electromagnetic compact support or have sufficiently strong falloff prop-
field [18, 19]. From the firewall side, focusing on the erties for the system to be treatable as asymptotically
correlations between two detectors is motivated by the uncoupled in the distant past and future.
central role of quantum correlations in the firewall argu- If the initial state (= density matrix) of the system
ment [3]. The response of a single detector falling through is ρ0 , the final state after the interaction has ceased is
the Rindler firewall is known to be sudden but finite [13]. ρT = U ρ0 U † , where U is the interaction picture time
For two detectors that are initially correlated, interaction evolution operator. Assuming that each λν is propor-
with the quantum field will decohere the two detectors: tional to a formal perturbative parameter λ, U has the
might this decoherence be drastically enhanced when one Dyson expansion U = U (0) + U (1) + U (2) + O(λ3 ) where
22
UU(0)
(0)= 11 and
= 11 and t
ZZ∞1 1 ZZ τ⌧
ZZ ∞ T
(1)
(1)
UU ==−i i dτ d⌧H(τ (2)
(2)
H(⌧),), UU ==− dτ d⌧ dτ d⌧00H(τ )H(⌧00) .
H(⌧)H(τ
−∞1 1 −∞
−∞ 1
(2) Tf
wewefind
findthat
thatthe
thefinal
finalstate
stateof
ofthe
thetwo-detector
two-detector subsystem
subsystem
isis where ∆u u= 0 0
where = uu − uu0,, ∆v
v== vv −vv 0,, the
the positive
positiveconstant
constant
(2)
O( 33)) ,, ⇤ is an infrared cuto↵, the logarithm takes its principal
ρ⇢d,T
d,T==Tr
Tr (ρ
(⇢T ) =ρ⇢d,0++ρ⇢(2)
φ T) = d,0
+O(λ
d,T +
d,T
(5a)
(5a) Λ is an infrared cutoff, the logarithm takes its principal
branch and ✏ ! 0 . The full expression for W (x, x0 )0 is
X ZZ 1 Z 1 Z branch and → 0++ . The full expression for ∆W (x, x ) is
(2) X ∞ ∞
lengthy but reduces for v > 0 and v 0 > 0 to
ρ⇢d,T
(2) =
d,T= λν⌫λη⌘ d⌧
dτ d⌧00χ ⌫(τ
dτ (⌧00)χ
) ⌘(τ
(⌧ ) lengthy but reduces for v > 0 and v 0 > 0 to
1 1 ν η )
⌫,⌘ −∞ −∞
1 hh i
ν,η
⇥ 0 0
0 )⇢d,0 µ⌘ (⌧ ) W [x⌘ (⌧ ), x⌫ (⌧0 )]
i
µ ⌫ (⌧
×Zµν (τ )ρd,0 µη (τ ) W [xη (τ ), xν (τ )] W (x, x00) = 1 ⇥(u)✓( u00) + ✓( u)✓(u0 )0
Z
Z ∞ Z τ
1 ⌧ ∆W (x, x ) = 4⇡ Θ(u)θ(−u ) + θ(−u)θ(u )
4π⇣ ⇡ ⌘
− dτ
d⌧ d⌧ 0 (⌧ ) (⌧ 0 )
dτ 0 χν⌫(τ )χη⌘(τ 0 ) ⇥ log(⇤ |u u00|) + i π sgn(u u0 )0 . (9)
1 1 × log(Λ |u − u |) + i2 sgn(u − u ) . (9)
−∞ −∞ 2
⇥ µ⌫ (⌧ )µ⌘ (⌧00 )⇢d,0 W [x⌫ (⌧ ), x⌘ (⌧00 )]
Z 1 ×Zµ⌧ν (τ )µη (τ )ρd,0 W [xν (τ ), xη (τ )] In words, (8) and (9) show that when x and x0 are
Z ∞ Z τ In words, (8) and (9) show that when x and x0 are
d⌧ d⌧ 0 (⌧ ) (⌧ 0 ) to the future of the left-going Rindler horizon t = x
− dτ
1 1dτ 0 χν⌫(τ )χη⌘(τ 0 ) to the future of the left-going Rindler horizon t = −x
−∞ −∞ but on opposite sides of the right-going Rindler horizon
but on opposite0 sides of the right-going Rindler horizon
⇥ ⇢d,0 µ⌘ (⌧0 0 )µ⌫ (⌧ ) W [x⌘ (⌧00 ), x⌫ (⌧ )] t = x, WF (x, x 0) is missing the contribution from the
× ρd,0 µη (τ )µν (τ ) W [xη (τ ), xν (τ )] tright-moving
= x, WF (x,part x ) isof missing
the field.the contribution
This absence of from the
correla-
(5b) right-moving part of the field. This
tions across the Rindler horizon models the absence of absence of correla-
(5b) tions across that
the Rindler
where W [x⌫ (⌧ ), x⌘ (⌧0 0 )] denotes the pullback of the correlations is arguedhorizon
to develop models the absence
dynamically in anof
where (τ ), xη (τon
W [xνfunction )] the
denotes the worldlines,
pullback of the correlations that is argued
evaporating black hole spacetime [3]. to develop dynamically in an
Wightman detectors’ evaporating black hole spacetime [3].
Wightman function on the detectors’ worldlines, For the detectors in the presence of the firewall, we
W [x⌫ (⌧ ), x⌘ (⌧ 0 )] = Tr x⌫ (⌧ ) x⌘ (⌧ 0 ) ⇢ ,0 . (6) Forthe
take theworldline
detectorsofindetector
the presence of the
A (Alice) firewall,
to be at x = we
W [xν (τ ), xη (τ 0 )] = Trφ φ xν (τ ) φ xη (τ 0 ) ρφ,0 . (6) take
xA >the 0 and worldline of detector
the worldline A (Alice)
of detector to betoatbexat=
B (Bob)
Detectors with a Rindler firewall.— We now x
Detectors with a Rindler firewall.— We now xA=>xA0 +and R, the
whereworldline
R > 0 isofthe detector
spatialBseparation.
(Bob) to be Theat
specialise to (1 + 1)-dimensional Minkowski spacetime, x = x + R, where R > 0 is the spatial separation. The
specialise
2 to2 (1 + 2 1)-dimensional Minkowski spacetime, detectors
A are switched on at t = 0, and they are switched
ds = dt2 +dx2 = du dv, where u = t x and v = t+x. detectors are switched on at t = 0, and they are switched
ds2 We= −dt o↵ at a time when Alice has already crossed the firewall
take+dxto = be−du dv, where
massless and u ⇢= t−x and v = t+x.
,0 to be the Rindler off
We take φ to be massless and ρ to be the function
Rindler at tat= ax time whenhas
but Bob Alice
not,has alreadyincrossed
as shown Figure the
1. firewall
firewall state described in [13]. The one-point φ,0
at Wet = ask:
x butIf Bob has not, as shown in Figure 1. how
firewall
of ⇢ ,0 state described
satisfies (4), as in [13]. by
follows The one-point
extending thefunction
Wight- Alice and Bob are initially entangled,
ofman
ρφ,0function
satisfies discussion
(4), as follows We Alice’s
does ask: If crossing
Alice andthe Bob are initially
firewall a↵ect entangled,
this entangle- how
givenby in extending
[13] to thethe Wight-
one-point
man function does
ment?Alice’s crossing the firewall affect this entangle-
function. Thediscussion
Wightmangiven functionin [13]
of ⇢ to the one-point
,0 is
function. The Wightman function of ρφ,0 is ment?
Methods.— We assume each detector to be a two-
WF (x, x0 ) = Tr (x) (x0 )⇢ ,0 Methods.—
level system. We We denote
assumethe eachrespective
detector energy
to be agaps two-
0 0
WF (x, x ) ==Tr φ(x)φ(x
Wφ0 (x, x0 ) + )ρW (x, x0 ) ,
φ,0 (7) level system. We denote the respective
by ⌦⌫ , the ground states by |g⌫ i and the excited states energy gaps
= W0 (x, x ) + ∆W (x, x0 ) ,
0
(7) by Ω |eν⌫,i.theTheground states by
monopole |gν i and
moment the excited
operators are states
then
where W0 is the Wightman function in the Minkowki vac- by |e i.
µ⌫ (⌧ )ν = ⌫ e +
Thei⌦⌫ ⌧
monopole
+ ⌫e i⌦moment
⌫⌧ operators are then
, where the nonvanishing
where W0 is and
uum |0ih0| the Wightman
W is the function
correction in due
the Minkowki vac-
to the firewall. µ ν (τ ) =
matrix σν+ eiΩνof
elements τ
theσν−
+ e−iΩν τand
raising , where the operators
lowering nonvanishing ±
⌫
uum |0ih0| and
For W0 we have ∆W is the correction due to the firewall. matrix +
elements of the raising
are he⌫ | ⌫ |g⌫ i = hg⌫ | ⌫ |e⌫ i = 1. and lowering operators σ ±
ν
For W0 we have ⇥ ⇤ areForheνeach +
| σν |g i = the −
hgν |individual
σν |eν i = detectors
1.
1 ofνthe we may intro-
W0 (x, x0 ) = −1 log ⇤2 (✏ + i u)(✏ + i v) , (8)
Foraeach of the the individual detectorsinwe may (sup-
intro-
W0 (x, x0 ) = 4⇡ log Λ2 ( + i∆u)( + i∆v) , (8) duce two-by-two matrix representation which
4π duce a two-by-two matrix representation in which (sup-
3
pressing the detector index) We take the initial state of the Alice-Bob system to be
the maximally entangled state |ψmax i = √12 |ggi + |eei ,
1 0 0 e−iΩτ so that
|gi = , |ei = , µ(τ ) = . (10)
0 1 eiΩτ 0
AA AA AA ∗
BB BB BB ∗
−2 Re(J−+ ) 0 0 −J−+ − J+− −2 Re(J−+ ) 0 0 −J−+ − J+−
1 0 AA
I+− AA
I++ 0
, ρBB = 1
0 BB
I−+ BB
I−− 0
ρAA = AA AA BB BB
,
2 0 I−− I−+ 0 2 0 I++ I+− 0
AA AA ∗ AA BB BB ∗ BB
−J+− − J−+ 0 0 −2 Re(J+− ) −J+− − J−+ 0 0 −2 Re(J+− )
AB BA AB BA AB ∗ BA ∗
−2 Re(J−− + J−− ) 0 0 −J−− − J−− − J++ − J++
1 0 AB
I++ BA
+ I−− AB
I+− BA
+ I−+ 0
ρAB = AB BA AB BA
,
(15)
2 0 I−+ + I+− I−− + I++ 0
AB BA AB ∗ BA ∗ AB BA
−J++ − J++ − J−− − J−− 0 0 −2 Re(J++ + J++ )
����������
wall enhances the degradation of Alice-Bob entangle- ��������
ment, compared with the degradation in Minkowski vac- ��������
uum. This is what one might have expected from the
gravitational firewall debate [1–11]. However, if Alice ��������
crosses the firewall shortly before turning her detector ��������
off, the effect is the opposite: in this case the firewall
helps Alice and Bob maintain their entanglement. De- ��������
veloping a qualitative explanation for this phenomenon ��� ��� ��� ��� ��� ��� ���
could be an interesting challenge. ��
One might suspect some of the properties of the graph
in Figure 2 to be specific to, and perhaps artefacts of, the Figure 2. Negativity N of the Alice-Bob final state as a func-
sharp switch-on and switch-off. To alleviate this suspi- tion of xA with the detector trajectories shown in Figure 1 and
with the sharp switching functions (17), for R = 4, T = 1.8,
cion, Figure 3 shows results from a similar analysis with
ΩA = ΩB = 1, and Λ = 10−2 Ων and λA = λB = 0.01.
Gaussian switching functions, Before the interaction N = 12 , and the evolution causes the
2
entanglement to degrade. When xA > T , Alice does not cross
/σ 2
χA (τ ) = χB (τ ) = e−(τ −τ0 ) , (18) the firewall during her detector’s operation and the entangle-
ment degradation is identical to that in Minkowski vacuum.
where the parameters τ0 and σ are chosen as described in When xA < T , Alice does cross the firewall, and the entan-
the figure caption to provide a smooth approximation to glement degradation depends non-monotonically on xA . Note
the sharp switching of Figure 2. The detectors now oper- that the leading order contribution to N is a homogeneous
quadratic in (λA , λB ): an overall scaling of the two coupling
ate for −∞ < τ < ∞, but the tails of the Gaussians are so constants (within the perturbative approximation) leaves the
small that this noncompact support of the Gaussian does plot invariant up to a rescaling of the vertical axis.
not bring in new complications. The curve in Figure 3 is
smoother but retains the qualitative features, including a �������
regime where the firewall allows Alice and Bob maintain
their entanglement better than in Minkowski vacuum. �������
The conclusions drawn above from the sharp switching
����������
black hole firewalls at the early stages of the Hawking J. Sully, Journal of High Energy Physics 2013, 18 (2013).
evaporation where the gravitational backreaction on the [6] D. N. Page, Journal of Cosmology and Astroparticle
metric is not yet significant. As the Unruh-DeWitt de- Physics 2014, 051 (2014).
tector captures the essential features of the interaction [7] D. Marolf and J. Polchinski, Phys. Rev. Lett. 111, 171301
(2013).
between atoms and the electromagnetic field [18, 19], the [8] M. Hotta, J. Matsumoto, and K. Funo, Phys. Rev. D
conclusion should further extend to systems of matter of 89, 124023 (2014).
which we and our experimental apparatus are built. [9] A. Almheiri and J. Sully, Journal of High Energy Physics
In summary, the key message of this letter is that we 2014, 108 (2014).
cannot think of a young firewall as a surface of cata- [10] D. Harlow, (2014), arXiv:1409.1231 [hep-th].
clysmic events that erases all information about matter [11] M. Hotta, R. Schützhold, and W. G. Unruh, (2015),
that crosses the firewall. If the matter is correlated with arXiv:1503.06109 [gr-qc].
[12] M. A. Abramowicz, W. Kluźniak, and J.-P. Lasota,
the outside world, these correlations will not be signifi- Phys. Rev. Lett. 112, 091301 (2014).
cantly altered by the crossing. We may not know why [13] J. Louko, Journal of High Energy Physics 2014, 142
the chicken crossed the young firewall, but it did get to (2014).
the other side, with most of its memories intact. [14] E. G. Brown, M. del Rey, H. Westman, J. León, and
More broadly, our results push the burden of proof A. Dragan, Phys. Rev. D 91, 016005 (2015).
of the firewall’s ability to resolve the black hole infor- [15] E. G. Brown and J. Louko, (2015), arXiv:1504.05269
mation paradox into the regime in which the detailed [hep-th].
late time gravitational structure of the firewall is crucial. [16] W. G. Unruh, Phys. Rev. D 14, 870 (1976).
[17] B. S. DeWitt, General Relativity; an Einstein Centenary
This regime is at present conspicuously poorly under- Survey (Cambridge University Press, Cambridge, UK,
stood, and not exempt of problems [12] (a rare exception 1980).
is a dilaton gravity model [9] in which the paradox turns [18] E. Martı́n-Martı́nez, M. Montero, and M. del Rey, Phys.
out to be resolved by a remnant rather than by a fire- Rev. D 87, 064038 (2013).
wall). While our results do not settle the viability of the [19] A. M. Alhambra, A. Kempf, and E. Martı́n-Martı́nez,
firewall argument, they do identify the arena in which Phys. Rev. A 89, 033835 (2014).
the viability will be settled. [20] B. Reznik, A. Retzker, and J. Silman, Phys. Rev. A 71,
042104 (2005).
Acknowledgments.— The authors thank Don [21] S.-Y. Lin, C.-H. Chou, and B. L. Hu, Phys. Rev. D 78,
Marolf for asking how a detector responds in the Rindler 125025 (2008).
firewall state considered in this Letter and in Ref. [13]. [22] D. C. M. Ostapchuk, S.-Y. Lin, R. B. Mann, and B. L.
JL thanks EMM and Achim Kempf for hospitality at Hu, Journal of High Energy Physics 2012, 72 (2012).
the University of Waterloo. EMM was supported by the [23] S.-Y. Lin, C.-H. Chou, and B. L. Hu, Phys. Rev. D 91,
NSERC Discovery programme. JL was supported in part 084063 (2015).
by STFC (Theory Consolidated Grant ST/J000388/1). [24] G. Vidal and R. F. Werner, Phys. Rev. A 65, 032314
(2002).
[25] A. Satz, Class. Quant. Grav. 24, 1719 (2007).
[26] J. Louko and A. Satz, Class. Quant. Grav. 25, 055012
(2008).
[27] B. S. Kay and R. M. Wald, Phys. Repts. 207, 49 (1991).
[1] S. D. Mathur, Classical and Quantum Gravity 26, 224001 [28] Y. Décanini and A. Folacci, Phys. Rev. D 73, 044027
(2009). (2006).
[2] S. L. Braunstein, S. Pirandola, and K. Życzkowski, Phys. [29] S. Schlicht, Class. Quant. Grav. 21, 4647 (2004).
Rev. Lett. 110, 101301 (2013). [30] P. Langlois, Annals Phys. 321, 2027 (2006).
[3] A. Almheiri, D. Marolf, J. Polchinski, and J. Sully, Jour- [31] J. Louko and A. Satz, Class. Quant. Grav. 23, 6321
nal of High Energy Physics 2013, 62 (2013). (2006).
[4] L. Susskind, (2013), arXiv:1301.4505 [hep-th].
[5] A. Almheiri, D. Marolf, J. Polchinski, D. Stanford, and