You are on page 1of 5

(1+1)D calculation provides evidence that quantum entanglement survives a firewall

Eduardo Martı́n-Martı́nez1, 2, 3 and Jorma Louko4


1
Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada
2
Department of Applied Mathematics, University of Waterloo, Waterloo, Ontario, N2L 3G1, Canada
3
Perimeter Institute for Theoretical Physics, Waterloo, Ontario, N2L 2Y5, Canada
4
School of Mathematical Sciences, University of Nottingham, Nottingham NG7 2RD, UK
(Dated: Revised June 2015)
We analyze how pre-existing entanglement between two Unruh-DeWitt particle detectors evolves
when one of the detectors falls through a Rindler firewall in (1+1)-dimensional Minkowski space. The
firewall effect is minor and does not wash out the detector-detector entanglement, in some regimes
even preserving the entanglement better than Minkowski vacuum. The absence of cataclysmic
events should continue to hold for young black hole firewalls. A firewall’s prospective ability to
resolve the information paradox must hence hinge on its detailed gravitational structure, presently
arXiv:1502.07749v2 [quant-ph] 16 Jul 2015

poorly understood.

Introduction.— If black hole evaporation preserves of the detectors goes through a Rindler firewall? A posi-
unitarity, it has been argued from preservation of corre- tive answer could be seen as indirect support of the fire-
lations that the horizon of a shrinking black hole must wall argument as given in [3].
develop a singularity even when the evaporation is still Our main conclusion runs contrary to these expecta-
slow and the black hole remains macroscopic [1–3] (for tions. The Rindler firewall turns out to have only a mod-
a selection of debate and reviews see [4–11]). Model- est effect on the decoherence between the two detectors,
ing the gravitational aspects of this proposed singularity and in certain regions of the parameter space the fire-
has remained elusive. For instance, the emergence of a wall even preserves the entanglement between the two
Planck scale shell near the horizon of an astrophysical detectors better than Minkowski vacuum. A firewall’s
black hole seems to be in tension with the gravitational prospective capability to resolve the black hole informa-
dynamics predicted by general relativity [12]. Neverthe- tion paradox must hence hinge on its detailed late time
less, the nongravitational aspects of the “firewall” version gravitational structure, at present poorly understood.
of the singularity [3] can be modeled with a quantum Formalism: evolving an inertial detector
field in Minkowski spacetime: a state in which correla- pair.— We consider a pair of Unruh-DeWitt detectors
tions across a Rindler horizon are severed can be written [16, 17] coupled to a real scalar field φ and moving in-
down by hand [13], mimicking the severing that the fire- ertially in Minkowki spacetime without relative veloc-
wall argument of [3] posits to develop dynamically during ity [20]. (For an inertial detector and an accelerated
black hole evaporation. This severing of correlations has detector, see, e.g., [21–23].) We evolve the system with
strong similarities to that which ensues on the sudden respect to the Minkowski time t in a Lorentz frame in
insertion of a reflective wall in a spacetime [14, 15]. The which the two detectors are at rest, and we denote t by
Rindler firewall state can be studied by usual quantum τ as it coincides with the detectors’ proper time. The
field theory techniques, and the conclusions should apply interaction picture Hamiltonian is
to young gravitational firewalls where the backreaction
X 
on the metric is still small. H= λν χν (τ )µν (τ )φ xν (τ ) , (1)
In this letter we analyse the correlations between two ν
particle detectors when one of them falls through a
Rindler firewall. From the quantum field theory side, where the index ν labels the two detectors, xν (τ ) are
this question is motivated by the fact that any measure- their worldlines, µν (τ ) are the monopole moment op-
ments of quantum fields are done through material par- erators and λν are the coupling constants. The real-
ticle detectors, and we may employ the Unruh-DeWitt valued switching functions χν specify how the interac-
detector model [16, 17] to capture the essential aspects tion is turned on and off. We assume that χν either have
of interactions between atoms and the electromagnetic compact support or have sufficiently strong falloff prop-
field [18, 19]. From the firewall side, focusing on the erties for the system to be treatable as asymptotically
correlations between two detectors is motivated by the uncoupled in the distant past and future.
central role of quantum correlations in the firewall argu- If the initial state (= density matrix) of the system
ment [3]. The response of a single detector falling through is ρ0 , the final state after the interaction has ceased is
the Rindler firewall is known to be sudden but finite [13]. ρT = U ρ0 U † , where U is the interaction picture time
For two detectors that are initially correlated, interaction evolution operator. Assuming that each λν is propor-
with the quantum field will decohere the two detectors: tional to a formal perturbative parameter λ, U has the
might this decoherence be drastically enhanced when one Dyson expansion U = U (0) + U (1) + U (2) + O(λ3 ) where
22

UU(0)
(0)= 11 and
= 11 and t
ZZ∞1 1 ZZ τ⌧
ZZ ∞ T
(1)
(1)
UU ==−i i dτ d⌧H(τ (2)
(2)
H(⌧),), UU ==− dτ d⌧ dτ d⌧00H(τ )H(⌧00) .
H(⌧)H(τ
−∞1 1 −∞
−∞ 1
(2) Tf

(1) (2) Alice Bob


Henceρ⇢TT==ρ⇢00++ρ⇢(1)
Hence TT ++ρ⇢(2)
TT + O( 33),), where
+O(λ where
(1)
(1) (1) (1) ††
ρ⇢TT ==UU(1) ρ⇢00++ρ⇢00UU(1) ,, (3a)
(2) (1)†† (2)††
xA x
(2) (1) (2) R
ρ⇢TT ==UU(1) ρ⇢00UU(1) ++UU(2) ρ⇢00 + U(2)
+ρ⇢00U .. (3b)
Whenthe
When the initial
initial state
state has
has the
the form
form ρ⇢00 = = ρ⇢d,0 ⌦ ρ⇢φ,0
d,0 ⊗ ,0 , Figure 1.
Figure 1. Spacetime
Spacetimediagram
diagramofofthe
thetwo-detector
two-detectorsystems
systemwith
with
where
where ρd,0⇢d,0 and ρφ,0,0 are respectively the initial state of
and ⇢ are respectively the initial state the Rindler
the Rindler firewall.
firewall. The
The dashed
dashed line
line atat tt==xxisisthe
thefirewall.
firewall.
the two-detector subsystem andand the
the initial
initial state
state of
of the
the The solid
solid lines
lines are
are the
the worldlines
worldlines of of the
the Alice
Alice detector
detectorand
the two-detector subsystem The and
field, and assuming that ⇢ satisfies the Bob
the Bob detector,
detector, switched
switched on
on at
at tt =
=00 and
ando↵ offat
att t==TT>>0.0.
field, and assuming that ρφ,0,0 satisfies Alice crosses
 Alice crosses the
the firewall
firewall during
during the
the detectors’
detectors’operation
operation(at (at
Trφ φ(x)ρ
(x)⇢φ,0,0 == 00 ,, (4) t = Tf = xA in the diagram) but Bob does not.
Tr (4) t = Tf = xA in the diagram) but Bob does not.

wewefind
findthat
thatthe
thefinal
finalstate
stateof
ofthe
thetwo-detector
two-detector subsystem
subsystem
isis where ∆u u= 0 0
where = uu − uu0,, ∆v
v== vv −vv 0,, the
the positive
positiveconstant
constant
(2)
O( 33)) ,, ⇤ is an infrared cuto↵, the logarithm takes its principal
ρ⇢d,T
d,T==Tr
Tr (ρ
(⇢T ) =ρ⇢d,0++ρ⇢(2)
φ T) =  d,0
+O(λ
d,T +
d,T
(5a)
(5a) Λ is an infrared cutoff, the logarithm takes its principal
branch and ✏ ! 0 . The full expression for W (x, x0 )0 is
X  ZZ 1 Z 1 Z branch and  → 0++ . The full expression for ∆W (x, x ) is
(2) X ∞ ∞
lengthy but reduces for v > 0 and v 0 > 0 to
ρ⇢d,T
(2) =
d,T= λν⌫λη⌘ d⌧
dτ d⌧00χ ⌫(τ
dτ (⌧00)χ
) ⌘(τ
(⌧ ) lengthy but reduces for v > 0 and v 0 > 0 to
1 1 ν η )
⌫,⌘ −∞ −∞
1 hh i
ν,η
⇥ 0 0
0 )⇢d,0 µ⌘ (⌧ ) W [x⌘ (⌧ ), x⌫ (⌧0 )]
i
µ ⌫ (⌧
×Zµν (τ )ρd,0 µη (τ ) W [xη (τ ), xν (τ )] W (x, x00) = 1 ⇥(u)✓( u00) + ✓( u)✓(u0 )0
Z
Z ∞ Z τ
1 ⌧ ∆W (x, x ) = 4⇡ Θ(u)θ(−u ) + θ(−u)θ(u )
4π⇣ ⇡ ⌘
− dτ
d⌧ d⌧ 0 (⌧ ) (⌧ 0 )
dτ 0 χν⌫(τ )χη⌘(τ 0 ) ⇥ log(⇤ |u u00|) + i π sgn(u u0 )0 . (9)
1 1 × log(Λ |u − u |) + i2 sgn(u − u ) . (9)
−∞ −∞ 2
⇥ µ⌫ (⌧ )µ⌘ (⌧00 )⇢d,0 W [x⌫ (⌧ ), x⌘ (⌧00 )]
Z 1 ×Zµ⌧ν (τ )µη (τ )ρd,0 W [xν (τ ), xη (τ )] In words, (8) and (9) show that when x and x0 are
Z ∞ Z τ In words, (8) and (9) show that when x and x0 are
d⌧ d⌧ 0 (⌧ ) (⌧ 0 ) to the future of the left-going Rindler horizon t = x
− dτ
1 1dτ 0 χν⌫(τ )χη⌘(τ 0 ) to the future of the left-going Rindler horizon t = −x
−∞ −∞ but on opposite sides of the right-going Rindler horizon
 but on opposite0 sides of the right-going Rindler horizon
⇥ ⇢d,0 µ⌘ (⌧0 0 )µ⌫ (⌧ ) W [x⌘ (⌧00 ), x⌫ (⌧ )] t = x, WF (x, x 0) is missing the contribution from the
× ρd,0 µη (τ )µν (τ ) W [xη (τ ), xν (τ )] tright-moving
= x, WF (x,part x ) isof missing
the field.the contribution
This absence of from the
correla-
(5b) right-moving part of the field. This
tions across the Rindler horizon models the absence of absence of correla-
(5b) tions across that
the Rindler
where W [x⌫ (⌧ ), x⌘ (⌧0 0 )] denotes the pullback of the correlations is arguedhorizon
to develop models the absence
dynamically in anof
where (τ ), xη (τon
W [xνfunction )] the
denotes the worldlines,
pullback of the correlations that is argued
evaporating black hole spacetime [3]. to develop dynamically in an
Wightman detectors’ evaporating black hole spacetime [3].
Wightman function on the detectors’ worldlines, For the detectors in the presence of the firewall, we
W [x⌫ (⌧ ), x⌘ (⌧ 0 )] = Tr x⌫ (⌧ ) x⌘ (⌧ 0 ) ⇢ ,0 . (6) Forthe
take theworldline
detectorsofindetector
the presence of the
A (Alice) firewall,
to be at x = we
W [xν (τ ), xη (τ 0 )] = Trφ φ xν (τ ) φ xη (τ 0 ) ρφ,0 . (6) take
xA >the 0 and worldline of detector
the worldline A (Alice)
of detector to betoatbexat=
B (Bob)
Detectors with a Rindler firewall.— We now x
Detectors with a Rindler firewall.— We now xA=>xA0 +and R, the
whereworldline
R > 0 isofthe detector
spatialBseparation.
(Bob) to be Theat
specialise to (1 + 1)-dimensional Minkowski spacetime, x = x + R, where R > 0 is the spatial separation. The
specialise
2 to2 (1 + 2 1)-dimensional Minkowski spacetime, detectors
A are switched on at t = 0, and they are switched
ds = dt2 +dx2 = du dv, where u = t x and v = t+x. detectors are switched on at t = 0, and they are switched
ds2 We= −dt o↵ at a time when Alice has already crossed the firewall
take+dxto = be−du dv, where
massless and u ⇢= t−x and v = t+x.
,0 to be the Rindler off
We take φ to be massless and ρ to be the function
Rindler at tat= ax time whenhas
but Bob Alice
not,has alreadyincrossed
as shown Figure the
1. firewall
firewall state described in [13]. The one-point φ,0
at Wet = ask:
x butIf Bob has not, as shown in Figure 1. how
firewall
of ⇢ ,0 state described
satisfies (4), as in [13]. by
follows The one-point
extending thefunction
Wight- Alice and Bob are initially entangled,
ofman
ρφ,0function
satisfies discussion
(4), as follows We Alice’s
does ask: If crossing
Alice andthe Bob are initially
firewall a↵ect entangled,
this entangle- how
givenby in extending
[13] to thethe Wight-
one-point
man function does
ment?Alice’s crossing the firewall affect this entangle-
function. Thediscussion
Wightmangiven functionin [13]
of ⇢ to the one-point
,0 is
function. The Wightman function of ρφ,0 is ment?
Methods.— We assume each detector to be a two-
WF (x, x0 ) = Tr (x) (x0 )⇢ ,0 Methods.—
level system. We We denote
assumethe eachrespective
detector energy
to be agaps two-
0 0
WF (x, x ) ==Tr φ(x)φ(x
Wφ0 (x, x0 ) + )ρW (x, x0 ) ,
φ,0 (7) level system. We denote the respective
by ⌦⌫ , the ground states by |g⌫ i and the excited states energy gaps
= W0 (x, x ) + ∆W (x, x0 ) ,
0
(7) by Ω |eν⌫,i.theTheground states by
monopole |gν i and
moment the excited
operators are states
then
where W0 is the Wightman function in the Minkowki vac- by |e i.
µ⌫ (⌧ )ν = ⌫ e +
Thei⌦⌫ ⌧
monopole
+ ⌫e i⌦moment
⌫⌧ operators are then
, where the nonvanishing
where W0 is and
uum |0ih0| the Wightman
W is the function
correction in due
the Minkowki vac-
to the firewall. µ ν (τ ) =
matrix σν+ eiΩνof
elements τ
theσν−
+ e−iΩν τand
raising , where the operators
lowering nonvanishing ±

uum |0ih0| and
For W0 we have ∆W is the correction due to the firewall. matrix +
elements of the raising
are he⌫ | ⌫ |g⌫ i = hg⌫ | ⌫ |e⌫ i = 1. and lowering operators σ ±
ν
For W0 we have ⇥ ⇤ areForheνeach +
| σν |g i = the −
hgν |individual
σν |eν i = detectors
1.
1 ofνthe we may intro-
W0 (x, x0 ) = −1 log ⇤2 (✏ + i u)(✏ + i v) , (8)
Foraeach of the the individual detectorsinwe may (sup-
intro-
W0 (x, x0 ) = 4⇡ log Λ2 ( + i∆u)( + i∆v) , (8) duce two-by-two matrix representation which
4π duce a two-by-two matrix representation in which (sup-
3

pressing the detector index) We take the initial state of the Alice-Bob system to be

      the maximally entangled state |ψmax i = √12 |ggi + |eei ,
1 0 0 e−iΩτ so that
|gi = , |ei = , µ(τ ) = . (10)
0 1 eiΩτ 0

For the two-detector system we employ the Kronecker


product representation in which  
1 0 0 1
        1 0 0 0 0
1 0 0 0 ρd,0 = |ψmax ihψmax | =  . (13)
0 1 0 0 2 0 0 0 0
|ggi =        
0 , |egi = 0 , |gei = 1 , |eei = 0 , 1 0 0 1
0 0 0 1
(11)
where the first label in |iji refers to Alice and the second
label to Bob. It follows that In the final state ρd,T (5), we separate the contributions
(2)
  to ρd,T as
0 e−iΩA τ 0 0
 eiΩA τ 0 0 0 
µA (τ ) =  0

−iΩA τ  , (12a)
0 0 e
0 0 eiΩA τ 0 (2)
  ρd,T = λ2A ρAA + λ2B ρBB + λA λB ρAB , (14)
−iΩB τ
0 0 e 0
 0 0 0 e−iΩB τ 
µB (τ ) =  eiΩB τ
 . (12b)

0 0 0
iΩB τ
0 e 0 0 finding

 AA AA AA ∗
  BB BB BB ∗

−2 Re(J−+ ) 0 0 −J−+ − J+− −2 Re(J−+ ) 0 0 −J−+ − J+−
1 0 AA
I+− AA
I++ 0 
, ρBB = 1 
 0 BB
I−+ BB
I−− 0 
ρAA =  AA AA   BB BB
,

2 0 I−− I−+ 0 2 0 I++ I+− 0
AA AA ∗ AA BB BB ∗ BB
−J+− − J−+ 0 0 −2 Re(J+− ) −J+− − J−+ 0 0 −2 Re(J+− )
 AB BA AB BA AB ∗ BA ∗

−2 Re(J−− + J−− ) 0 0 −J−− − J−− − J++ − J++
1 0 AB
I++ BA
+ I−− AB
I+− BA
+ I−+ 0 
ρAB =  AB BA AB BA
,
 (15)
2 0 I−+ + I+− I−− + I++ 0
AB BA AB ∗ BA ∗ AB BA
−J++ − J++ − J−− − J−− 0 0 −2 Re(J++ + J++ )

where sharp switch-on and switch-off,


Z ∞Z ∞ 
ν,η 0 χA (τ ) = χB (τ ) = Θ(τ )Θ 1 − (τ /T ) , (17)
I,δ = dτ dτ 0 χν (τ 0 )χη (τ ) ei(Ων τ +δΩη τ ) W [xη (τ ), xν (τ 0 )],
−∞ −∞
Z ∞Z τ where Θ is the Heaviside function. Figure 2 shows a rep-
ν,η 0
J,δ = dτ dτ 0 χν (τ )χη (τ 0 ) ei(Ων τ +δΩη τ ) W [xν (τ ), xη (τ 0 )]. resentative plot of the negativity as a function of xA with
−∞ −∞ the other parameters fixed. When xA > T , Alice does
(16) not fall through the firewall during the operation of the
detectors (see Fig. 1) and the entanglement degradation
Finally, we characterise the entanglement in the Alice- is just that in Minkowski vacuum [20], independent of xA .
Bob final state ρd,T by the negativity N [24]. For a two- When xA < T , Alice’s falling through the firewall does
qubit system this monotone provides a strict criterion of affect the negativity. Two outcomes are apparent from
entanglement in the sense that it vanishes if and only if the figure.
a state is separable. Working perturbatively to order λ2 , First, the firewall effect on the negativity depends con-
the negativity can be computed in a straightforward way tinuously on xA and remains small in magnitude: the
from (5a) and (11)–(16). firewall does not wash up the Alice-Bob correlations as
Results.— With the detector trajectories shown in might have been expected from the gravitational firewall
Figure 1, we first consider switching functions with a debate [1–11]. As a technical point, we note that the
4

smallness of the effect gives confidence in the reliability ��������


of our perturbative analysis.
��������
Second, over most of the parameter range the fire-

����������
wall enhances the degradation of Alice-Bob entangle- ��������
ment, compared with the degradation in Minkowski vac- ��������
uum. This is what one might have expected from the
gravitational firewall debate [1–11]. However, if Alice ��������
crosses the firewall shortly before turning her detector ��������
off, the effect is the opposite: in this case the firewall
helps Alice and Bob maintain their entanglement. De- ��������
veloping a qualitative explanation for this phenomenon ��� ��� ��� ��� ��� ��� ���
could be an interesting challenge. ��
One might suspect some of the properties of the graph
in Figure 2 to be specific to, and perhaps artefacts of, the Figure 2. Negativity N of the Alice-Bob final state as a func-
sharp switch-on and switch-off. To alleviate this suspi- tion of xA with the detector trajectories shown in Figure 1 and
with the sharp switching functions (17), for R = 4, T = 1.8,
cion, Figure 3 shows results from a similar analysis with
ΩA = ΩB = 1, and Λ = 10−2  Ων and λA = λB = 0.01.
Gaussian switching functions, Before the interaction N = 12 , and the evolution causes the
2
entanglement to degrade. When xA > T , Alice does not cross
/σ 2
χA (τ ) = χB (τ ) = e−(τ −τ0 ) , (18) the firewall during her detector’s operation and the entangle-
ment degradation is identical to that in Minkowski vacuum.
where the parameters τ0 and σ are chosen as described in When xA < T , Alice does cross the firewall, and the entan-
the figure caption to provide a smooth approximation to glement degradation depends non-monotonically on xA . Note
the sharp switching of Figure 2. The detectors now oper- that the leading order contribution to N is a homogeneous
quadratic in (λA , λB ): an overall scaling of the two coupling
ate for −∞ < τ < ∞, but the tails of the Gaussians are so constants (within the perturbative approximation) leaves the
small that this noncompact support of the Gaussian does plot invariant up to a rescaling of the vertical axis.
not bring in new complications. The curve in Figure 3 is
smoother but retains the qualitative features, including a �������
regime where the firewall allows Alice and Bob maintain
their entanglement better than in Minkowski vacuum. �������
The conclusions drawn above from the sharp switching
����������

results hence apply also to the Gaussian switching. �������


Generalising our analysis from 1+1 to 3+1 dimensions
would require new technical input at two steps. First, �������
the firewall Wightman function must be evolved from
the initial data at t = 0 using the (3 + 1)-dimensional
�������
field commutator. Second, recall that while the tran-
sition probability of a pointlike Unruh-DeWitt detector
� � � � �
is well defined in 3 + 1 dimensions (an account that in-
cludes the switching effects can be found in [25, 26]), ��
the evolution of the full density operator is singular even
in Minkowski vacuum, as seen from (16) and from the Figure 3. As in Figure 2 but with the Gaussian switching
functions (18), with σ = 1 and t0 = 2, so that the Gaus-
nonintegrable coincidence limit singularity of the (3 + 1)- sian switching provides a smooth approximation to the sharp
dimensional Wightman function [27, 28]. A decoherence switching of Figure 2. The firewall effect on Alice’s detector
analysis would hence require an additional regularisation is now significant for xA . 3. The qualitative properties are
of the detector model, for example by a spatial smear- as in Figure 2, including the non-monotonicity in xA .
ing, a standard and well documented procedure [16, 29–
31]. However, crucially, the structure of (15) remains
exactly the same in all dimensions. It is hence difficult on the entanglement between two inertial Unruh-DeWitt
to see how any reasonable input at either of these techni- detectors when one of the detectors crosses the fire-
cal steps could lead to drastically enhanced singularities wall. There is even a parameter range in which the fire-
in the evolution across the firewall. In particular, correla- wall slows down the entanglement degradation, compared
tions between a firewall-crossing detector and the outside with the degradation that takes place in Minkowski vac-
world should still undergo only a modest change. uum.
Conclusions.— Our main conclusion runs contrary Given that the Rindler firewall models the quantum
to the vision of a firewall as a violently singular sur- field theory correlations in a black hole firewall [13], our
face [3]: the Rindler firewall has only a modest effect results suggest that a similar conclusion should hold for
5

black hole firewalls at the early stages of the Hawking J. Sully, Journal of High Energy Physics 2013, 18 (2013).
evaporation where the gravitational backreaction on the [6] D. N. Page, Journal of Cosmology and Astroparticle
metric is not yet significant. As the Unruh-DeWitt de- Physics 2014, 051 (2014).
tector captures the essential features of the interaction [7] D. Marolf and J. Polchinski, Phys. Rev. Lett. 111, 171301
(2013).
between atoms and the electromagnetic field [18, 19], the [8] M. Hotta, J. Matsumoto, and K. Funo, Phys. Rev. D
conclusion should further extend to systems of matter of 89, 124023 (2014).
which we and our experimental apparatus are built. [9] A. Almheiri and J. Sully, Journal of High Energy Physics
In summary, the key message of this letter is that we 2014, 108 (2014).
cannot think of a young firewall as a surface of cata- [10] D. Harlow, (2014), arXiv:1409.1231 [hep-th].
clysmic events that erases all information about matter [11] M. Hotta, R. Schützhold, and W. G. Unruh, (2015),
that crosses the firewall. If the matter is correlated with arXiv:1503.06109 [gr-qc].
[12] M. A. Abramowicz, W. Kluźniak, and J.-P. Lasota,
the outside world, these correlations will not be signifi- Phys. Rev. Lett. 112, 091301 (2014).
cantly altered by the crossing. We may not know why [13] J. Louko, Journal of High Energy Physics 2014, 142
the chicken crossed the young firewall, but it did get to (2014).
the other side, with most of its memories intact. [14] E. G. Brown, M. del Rey, H. Westman, J. León, and
More broadly, our results push the burden of proof A. Dragan, Phys. Rev. D 91, 016005 (2015).
of the firewall’s ability to resolve the black hole infor- [15] E. G. Brown and J. Louko, (2015), arXiv:1504.05269
mation paradox into the regime in which the detailed [hep-th].
late time gravitational structure of the firewall is crucial. [16] W. G. Unruh, Phys. Rev. D 14, 870 (1976).
[17] B. S. DeWitt, General Relativity; an Einstein Centenary
This regime is at present conspicuously poorly under- Survey (Cambridge University Press, Cambridge, UK,
stood, and not exempt of problems [12] (a rare exception 1980).
is a dilaton gravity model [9] in which the paradox turns [18] E. Martı́n-Martı́nez, M. Montero, and M. del Rey, Phys.
out to be resolved by a remnant rather than by a fire- Rev. D 87, 064038 (2013).
wall). While our results do not settle the viability of the [19] A. M. Alhambra, A. Kempf, and E. Martı́n-Martı́nez,
firewall argument, they do identify the arena in which Phys. Rev. A 89, 033835 (2014).
the viability will be settled. [20] B. Reznik, A. Retzker, and J. Silman, Phys. Rev. A 71,
042104 (2005).
Acknowledgments.— The authors thank Don [21] S.-Y. Lin, C.-H. Chou, and B. L. Hu, Phys. Rev. D 78,
Marolf for asking how a detector responds in the Rindler 125025 (2008).
firewall state considered in this Letter and in Ref. [13]. [22] D. C. M. Ostapchuk, S.-Y. Lin, R. B. Mann, and B. L.
JL thanks EMM and Achim Kempf for hospitality at Hu, Journal of High Energy Physics 2012, 72 (2012).
the University of Waterloo. EMM was supported by the [23] S.-Y. Lin, C.-H. Chou, and B. L. Hu, Phys. Rev. D 91,
NSERC Discovery programme. JL was supported in part 084063 (2015).
by STFC (Theory Consolidated Grant ST/J000388/1). [24] G. Vidal and R. F. Werner, Phys. Rev. A 65, 032314
(2002).
[25] A. Satz, Class. Quant. Grav. 24, 1719 (2007).
[26] J. Louko and A. Satz, Class. Quant. Grav. 25, 055012
(2008).
[27] B. S. Kay and R. M. Wald, Phys. Repts. 207, 49 (1991).
[1] S. D. Mathur, Classical and Quantum Gravity 26, 224001 [28] Y. Décanini and A. Folacci, Phys. Rev. D 73, 044027
(2009). (2006).
[2] S. L. Braunstein, S. Pirandola, and K. Życzkowski, Phys. [29] S. Schlicht, Class. Quant. Grav. 21, 4647 (2004).
Rev. Lett. 110, 101301 (2013). [30] P. Langlois, Annals Phys. 321, 2027 (2006).
[3] A. Almheiri, D. Marolf, J. Polchinski, and J. Sully, Jour- [31] J. Louko and A. Satz, Class. Quant. Grav. 23, 6321
nal of High Energy Physics 2013, 62 (2013). (2006).
[4] L. Susskind, (2013), arXiv:1301.4505 [hep-th].
[5] A. Almheiri, D. Marolf, J. Polchinski, D. Stanford, and

You might also like