Here’s one way to get out of a black hole!

Two weeks ago I attended an exciting workshop at Stanford, organized by the It from Qubit collaboration, which I covered enthusiastically on Twitter. Many of the talks at the workshop provided fodder for possible blog posts, but one in particular especially struck my fancy. In explaining how to recover information that has fallen into a black hole (under just the right conditions), Juan Maldacena offered a new perspective on a problem that has worried me for many years. I am eagerly awaiting Juan’s paper, with Douglas Stanford and Zhenbin Yang, which will provide more details.

juan-stanford-2017

My cell-phone photo of Juan Maldacena lecturing at Stanford, 22 March 2017.

Almost 10 years ago I visited the Perimeter Institute to attend a conference, and by chance was assigned an office shared with Patrick Hayden. Patrick was a professor at McGill at that time, but I knew him well from his years at Caltech as a Sherman Fairchild Prize Fellow, and deeply respected him. Our proximity that week ignited a collaboration which turned out to be one of the most satisfying of my career.

To my surprise, Patrick revealed he had been thinking about  black holes, a long-time passion of mine but not previously a research interest of his, and that he had already arrived at a startling insight which would be central to the paper we later wrote together. Patrick wondered what would happen if Alice possessed a black hole which happened to be highly entangled with a quantum computer held by Bob. He imagined Alice throwing a qubit into the black hole, after which Bob would collect the black hole’s Hawking radiation and feed it into his quantum computer for processing. Drawing on his knowledge about quantum communication through noisy channels, Patrick argued that  Bob would only need to grab a few qubits from the radiation in order to salvage Alice’s qubit successfully by doing an appropriate quantum computation.

black-hole-retrieval

Alice tosses a qubit into a black hole, which is entangled with Bob’s quantum computer. Bob grabs some Hawking radiation, then does a quantum computation to decode Alice’s qubit.

This idea got my adrenaline pumping, stirring a vigorous dialogue. Patrick had initially assumed that the subsystem of the black hole ejected in the Hawking radiation had been randomly chosen, but we eventually decided (based on a simple picture of the quantum computation performed by the black hole) that it should take a time scaling like M log M (where M is the black hole mass expressed in Planck units) for Alice’s qubit to get scrambled up with the rest of her black hole. Only after this scrambling time would her qubit leak out in the Hawking radiation. This time is actually shockingly short, about a millisecond for a solar mass black hole. The best previous estimate for how long it would take for Alice’s qubit to emerge (scaling like M3), had been about 1067 years.

This short time scale aroused memories of discussions with Lenny Susskind back in 1993, vividly recreated in Lenny’s engaging book The Black Hole War. Because of the black hole’s peculiar geometry, it seemed conceivable that Bob could distill a copy of Alice’s qubit from the Hawking radiation and then leap into the black hole, joining Alice, who could then toss her copy of the qubit to Bob. It disturbed me that Bob would then hold two perfect copies of Alice’s qubit; I was a quantum information novice at the time, but I knew enough to realize that making a perfect clone of a qubit would violate the rules of quantum mechanics. I proposed to Lenny a possible resolution of this “cloning puzzle”: If Bob has to wait outside the black hole for too long in order to distill Alice’s qubit, then when he finally jumps in it may be too late for Alice’s qubit to catch up to Bob inside the black hole before Bob is destroyed by the powerful gravitational forces inside. Revisiting that scenario, I realized that the scrambling time M log M, though short, was just barely long enough for the story to be self-consistent. It was gratifying that things seemed to fit together so nicely, as though a deep truth were being affirmed.

black-hole-cloning

If Bob decodes the Hawking radiation and then jumps into the black hole, can he acquire two identical copies of Alice’s qubit?

Patrick and I viewed our paper as a welcome opportunity to draw the quantum information and quantum gravity communities closer together, and we wrote it with both audiences in mind. We had fun writing it, adding rhetorical flourishes which we hoped would draw in readers who might otherwise be put off by unfamiliar ideas and terminology.

In their recent work, Juan and his collaborators propose a different way to think about the problem. They stripped down our Hawking radiation decoding scenario to a model so simple that it can be analyzed quite explicitly, yielding a pleasing result. What had worried me so much was that there seemed to be two copies of the same qubit, one carried into the black hole by Alice and the other residing outside the black hole in the Hawking radiation. I was alarmed by the prospect of a rendezvous of the two copies. Maldacena et al. argue that my concern was based on a misconception. There is just one copy, either inside the black hole or outside, but not both. In effect, as Bob extracts his copy of the qubit on the outside, he destroys Alice’s copy on the inside!

To reach this conclusion, several ideas are invoked. First, we analyze the problem in the case where we understand quantum gravity best, the case of a negatively curved spacetime called anti-de Sitter space.  In effect, this trick allows us to trap a black hole inside a bottle, which is very advantageous because we can study the physics of the black hole by considering what happens on the walls of the bottle. Second, we envision Bob’s quantum computer as another black hole which is entangled with Alice’s black hole. When two black holes in anti-de Sitter space are entangled, the resulting geometry has a “wormhole” which connects together the interiors of the two black holes. Third, we chose the entangled pair of black holes to be in a very special quantum state, called the “thermofield double” state. This just means that the wormhole connecting the black holes is as short as possible. Fourth, to make the analysis even simpler, we suppose there is just one spatial dimension, which makes it easier to draw a picture of the spacetime. Now each wall of the bottle is just a point in space, with the left wall lying outside Bob’s side of the wormhole, and the right wall lying outside Alice’s side.

An important property of the wormhole is that it is not traversable. That is, when Alice throws her qubit into her black hole and it enters her end of the wormhole, the qubit cannot emerge from the other end. Instead it is stuck inside, unable to get out on either Alice’s side or Bob’s side. Most ways of manipulating the black holes from the outside would just make the wormhole longer and exacerbate the situation, but in a clever recent paper Ping Gao, Daniel Jafferis, and Aron Wall pointed out an exception. We can imagine a quantum wire connecting the left wall and right wall, which simulates a process in which Bob extracts a small amount of Hawking radiation from the right wall (that is, from Alice’s black hole), and carefully deposits it on the left wall (inserting it into Bob’s quantum computer). Gao, Jafferis, and Wall find that this procedure, by altering the trajectories of Alice’s and Bob’s walls, can actually make the wormhole traversable!

wormholes

(a) A nontraversable wormhole. Alice’s qubit, thrown into the black hole, never reaches Bob. (b) Stealing some Hawking radiation from Alice’s side and inserting it on Bob’s side makes the wormhole traversable. Now Alice’s qubit reaches Bob, who can easily “decode” it.

This picture gives us a beautiful geometric interpretation of the decoding protocol that Patrick and I had described. It is the interaction between Alice’s wall and Bob’s wall that brings Alice’s qubit within Bob’s grasp. By allowing Alice’s qubit to reach Bob at the other end of the wormhole, that interaction suffices to perform Bob’s decoding task, which is especially easy in this case because Bob’s quantum computer was connected to Alice’s black hole by a short wormhole when she threw her qubit inside.

Bob-jumps-in

If, after a delay, Bob’s jumps into the black hole, he might find Alice’s qubit inside. But if he does, that qubit cannot be decoded by Bob’s quantum computer. Bob has no way to attain two copies of the qubit.

And what if Bob conducts his daring experiment, in which he decodes Alice’s qubit while still outside the black hole, and then jumps into the black hole to check whether the same qubit is also still inside? The above spacetime diagram contrasts two possible outcomes of Bob’s experiment. After entering the black hole, Alice might throw her qubit toward Bob so he can catch it inside the black hole. But if she does, then the qubit never reaches Bob’s quantum computer, and he won’t be able to decode it from the outside. On the other hand, Alice might allow her qubit to reach Bob’s quantum computer at the other end of the (now traversable) wormhole. But if she does, Bob won’t find the qubit when he enters the black hole. Either way, there is just one copy of the qubit, and no way to clone it. I shouldn’t have been so worried!

Granted, we have only described what happens in an oversimplified model of a black hole, but the lessons learned may be more broadly applicable. The case for broader applicability rests on a highly speculative idea, what Maldacena and Susskind called the ER=EPR conjecture, which I wrote about in this earlier blog post. One consequence of the conjecture is that a black hole highly entangled with a quantum computer is equivalent, after a transformation acting only on the computer, to two black holes connected by a short wormhole (though it might be difficult to actually execute that transformation). The insights of Gao-Jafferis-Wall and Maldacena-Stanford-Yang, together with the ER=EPR viewpoint, indicate that we don’t have to worry about the same quantum information being in two places at once. Quantum mechanics can survive the attack of the clones. Whew!

Thanks to Juan, Douglas, and Lenny for ongoing discussions and correspondence which have helped me to understand their ideas (including a lucid explanation from Douglas at our Caltech group meeting last Wednesday). This story is still unfolding and there will be more to say. These are exciting times!

Reporting from the ‘Frontiers of Quantum Information Science’

What am I referring to with this title? It is similar to the name of this blog–but that’s not where this particular title comes from–although there is a common denominator. Frontiers of Quantum Information Science was the theme for the 31st Jerusalem winter school in theoretical physics, which takes place annually at the Israeli Institute for Advanced Studies located on the Givat Ram campus of the Hebrew University of Jerusalem. The school took place from December 30, 2013 through January 9, 2014, but some of the attendees are still trickling back to their home institutions. The common denominator is that our very own John Preskill was the director of this school; co-directed by Michael Ben-Or and Patrick Hayden. John mentioned during a previous post and reiterated during his opening remarks that this is the first time the IIAS has chosen quantum information to be the topic for its prestigious advanced school–another sign of quantum information’s emergence as an important sub-field of physics. In this blog post, I’m going to do my best to recount these festivities while John protects his home from forest fires, prepares a talk for the Simons Institute’s workshop on Hamiltonian complexityteaches his quantum information course and celebrates his birthday 60+1.

The school was mainly targeted at physicists, but it was diversely represented. Proof of the value of this diversity came in an interaction between a computer scientist and a physicist, which led to one of the school’s most memorable moments. Both of my most memorable moments started with the talent show (I was surprised that so many talents were on display at a physics conference…) Anyways, towards the end of the show, Mateus Araújo Santos, a PhD student in Vienna, entered the stage and mentioned that he could channel “the ghost of Feynman” to serve as an oracle for NP-complete decision problems. After making this claim, people obviously turned to Scott Aaronson, hoping that he’d be able to break the oracle. However, in order for this to happen, we had to wait until Scott’s third lecture about linear optics and boson sampling the next day. You can watch Scott bombard the oracle with decision problems from 1:00-2:15 during the video from his third lecture.

oracle_aaronson

Scott Aaronson grilling the oracle with a string of NP-complete decision problems! From 1:00-2:15 during this video.

The other most memorable moment was when John briefly danced Gangnam style during Soonwon Choi‘s talent show performance. Unfortunately, I thought I had this on video, but the video didn’t record. If anyone has video evidence of this, then please share!
Continue reading

What’s inside a black hole?

I have a multiple choice question for you.

What’s inside a black hole?

(A) An unlimited amount of stuff.
(B) Nothing at all.
(C) A huge but finite amount of stuff, which is also outside the black hole.
(D) None of the above.

The first three answers all seem absurd, boosting the credibility of (D). Yet … at the “Rapid Response Workshop” on black holes I attended last week at the KITP in Santa Barbara (and which continues this week), most participants were advocating some version of (A), (B), or (C), with varying degrees of conviction.

When physicists get together to talk about black holes, someone is bound to draw a cartoon like this one:

Penrose diagram depicting the causal structure of a black hole spacetime.

Part of a Penrose diagram depicting the causal structure of a black hole spacetime.

I’m sure I’ve drawn and contemplated some version of this diagram hundreds of times over the past 25 years in the privacy of my office, and many times in public discussions (including at least five times during the talk I gave at the KITP). This picture vividly captures the defining property of a black hole, found by solving Einstein’s classical field equations for gravitation: once you go inside there is no way out. Instead you are unavoidably drawn to the dreaded singularity, where known laws of physics break down (and the picture can no longer be trusted). If taken seriously, the picture says that whatever falls into a black hole is gone forever, at least from the perspective of observers who stay outside.

But for nearly 40 years now, we have known that black holes can shed their mass by emitting radiation, and presumably this process continues until the black hole disappears completely. If we choose to, we can maintain the black hole for as long as we please by feeding it new stuff at the same rate that radiation carries energy away. What I mean by option (A) is that  the radiation is completely featureless, carrying no information about what kind of stuff fell in. That means we can hide as much information as we please inside a black hole of a given mass.

On the other hand, the beautiful theory of black hole thermodynamics indicates that the entropy of a black hole is determined by its mass. For all other systems we know of besides black holes, the entropy of the system quantifies how much information we can hide in the system. If (A) is the right answer, then black holes would be fundamentally different in this respect, able to hide an unlimited amount of information even though their entropy is finite. Maybe that’s possible, but it would be rather disgusting, a reason to dislike answer (A).

There is another way to argue that (A) is not the right answer, based on what we call AdS/CFT duality. AdS just describes a consistent way to put a black hole in a “bottle,” so we can regard the black hole together with the radiation outside it as a closed system. Now, in gravitation it is crucial to focus on properties of spacetime that do not depend on the observer’s viewpoint; otherwise we can easily get very confused. The best way to be sure we have a solid way of describing things is to pay attention to what happens at the boundary of the spacetime, the walls of the bottle — that’s what CFT refers to. AdS/CFT provides us with tools for describing what happens when a black hole forms and evaporates, phrased entirely in terms of what happens on the walls of the bottle. If we can describe the physics perfectly by sticking to the walls of the bottle, always staying far away from the black hole, there doesn’t seem to be anyplace to hide an unlimited amount of stuff.

At the KITP, both Bill Unruh and Bob Wald argued forcefully for (A). They acknowledge the challenge of understanding the meaning of black hole entropy and of explaining why the AdS/CFT argument is wrong. But neither is willing to disavow the powerful message conveyed by that telling diagram of the black hole spacetime. As Bill said: “There is all that stuff that fell in and it crashed into the singularity and that’s it. Bye-bye.”

Adherents of (B) and (C) like to think about black hole physics from the perspective of an observer who stays outside the black hole. From that viewpoint, they say, the black hole behaves like any other system with a temperature and a finite entropy. Stuff falling in sticks to the black hole’s outer edge and gets rapidly mixed in with other stuff the black hole absorbed previously. For a black hole of a given mass, though, there is a limit to how much stuff it can hold. Eventually, what fell in comes out again, but in a form so highly scrambled as to be nearly unrecognizable.

Where the (B) and (C) camps differ concerns what happens to a brave observer who falls into a black hole. According to (C), an observer falling in crosses from the outside to the inside of a black hole peacefully, which poses a puzzle I discussed here. The puzzle arises because an uneventful crossing implies strong quantum entanglement between the region A just inside the black hole and region B just outside. On the other hand, as information leaks out of a black hole, region B should be strongly  entangled with the radiation system R emitted by the black hole long ago. Entanglement can’t be shared, so it does not make sense for B to be entangled with both A and R. What’s going on? Answer (C) resolves the puzzle by positing that A and R are not really different systems, but rather two ways to describe the same system, as I discussed here.That seems pretty crazy, because R could be far, far away from the black hole.

Answer (B) resolves the puzzle differently, by positing that region A does not actually exist, because the black hole has no interior. An observer who attempts to fall in gets a very rude surprise, striking a seething “firewall” at the last moment before passing to the inside. That seems pretty crazy, because no firewall is predicted by Einstein’s trusty equations, which are normally very successful at describing spacetime geometry.

At the workshop, Don Marolf and Raphael Bousso gave some new arguments supporting (B). Both acknowledge that we still lack a concrete picture of how firewalls are created as black holes form, but Bousso insisted that “It is time to constrain and construct the dynamics of firewalls.” Joe Polchinski emphasized that, while AdS/CFT provides a very satisfactory description of physics outside a black hole, it has not yet been able to tell us enough about the black hole interior to settle whether there are firewalls or not, at least for generic black holes formed from collapsing matter.

Lenny Susskind, Juan Maldacena, Ted Jacobson, and I all offered different perspectives on how (C) could turn out to be the right answer. We all told different stories, but perhaps each of us had at least part of the right answer. I’m not at KITP this week, but there have been further talks supporting (C) by Raju, Nomura, and the Verlindes.

I had a fun week at the KITP. If you watch the videos of the talks, you might get an occasional glimpse of me typing furiously on my laptop. It looks like I’m doing my email, but actually that’s how I take notes, which helps me to pay attention. Every once in a while I was inspired to tweet.

I have felt for a while that ideas from quantum information can help us to grasp the mysteries of quantum gravity, so I appreciated that quantum information concepts came up in many of the talks. Susskind invoked quantum error-correcting codes in discussing how sensitively the state of the Hawking radiation depends on the information it encodes, and Maldacena used tensor networks to explain how to build spacetime geometry from quantum entanglement. Scott Aaronson proposed the appropriate acronym HARD for HAwking Radiation Decoding, and argued (following Harlow and Hayden) that this task is as hard as inverting an injective one-way function, something we don’t expect quantum computers to be able to do.

In the organizational session that launched the meeting, Polchinski remarked regarding firewalls that “Nobody has the slightest idea what is going on,” and Gary Horowitz commented that “I’m still getting over the shock over how little we’ve learned in the past 30 years.” I guess that’s fair. Understanding what’s inside black holes has turned out to be remarkably subtle, making the problem more and more tantalizing. Maybe the current state of confusion regarding black hole information means that we’re on the verge of important discoveries about quantum gravity, or maybe not. In any case, invigorating discussions like what I heard last week are bound to facilitate progress.

Is Alice burning? The black hole firewall controversy

Quantum correlations are monogamous. Bob can be highly entangled with Alice or with Carrie, but not both.

Quantum correlations are monogamous. Bob can be highly entangled with Alice or with Carrie, but not both.

Back in the early 1990s, I was very interested in the quantum physics of black holes and devoted much of my research effort to thinking about how black holes process quantum information. That effort may have prepared me to appreciate Peter Shor’s spectacular breakthrough — the discovery of a quantum algorithm for factoring intergers efficiently. I told the story here of how I secretly struggled to understand Shor’s algorithm while attending a workshop on black holes in 1994.

Since the mid-1990s, quantum information has been the main focus of my research. I hope that some of the work I’ve done can help to hasten the onset of a new era in which quantum computers are used routinely to perform super-classical tasks. But I have always had another motivation for working on quantum information science — a conviction that insights gained by thinking about quantum computation can illuminate deep issues in other areas of physics, especially quantum condensed matter and quantum gravity. In recent years quantum information concepts have begun penetrating into other fields, and I expect that trend to continue.
Continue reading