Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall...
Transcript of Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall...
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
1/39
arXiv:1210.6733v
1
[gr-qc]25Oct2012
Is the firewall consistent?
Gedanken experiments on black hole complementarity and firewall proposal
Dong-il Hwanga,b, Bum-Hoon Leeb, and Dong-han Yeomb
aDepartment of Physics, KAIST, Daejeon 305-701, Republic of Korea
bCenter for Quantum Spacetime, Sogang University, Seoul 121-742, Republic of Korea
October 26, 2012
Abstract
In this paper, we critically discuss black hole complementarity and the firewall proposal.
Black hole complementarity is inevitable, if we assume the five contents: unitarity, entropy-area
formula, existence of information observer, semi-classical quantum field theory for asymptotic
observer, and general relativity for in-falling observer. However, large N rescaling and AMPS
argument show that black hole complementarity is inconsistent. To rescue the basic philosophy
of black hole complementarity, AMPS introduce a firewall around the horizon. According to
large N rescaling, the firewall should be close to the apparent horizon.
We investigate the consistency of the firewall regarding two conditions: the firewall should
be near the time-like apparent horizon and the firewall should not affect to future infinity.
Regarding this, the authors introduce a gravitational collapse with a false vacuum lump. It can
generate a spacetime structure with disconnected apparent horizons. This reveals a situation
that there is a firewall outside of the event horizon, while the apparent horizon is absent.
Therefore, the firewall, if it exists, does not only modify general relativity for an in-falling
observer, but also modify semi-classical quantum field theory for an asymptotic observer.
[email protected]@sogang.ac.kr
1
http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1 -
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
2/39
Contents
1 Introduction 3
2 Black hole information loss problem 4
2.1 Why black hole complementarity? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.1 Entropy of black holes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1.2 Information emission from black holes . . . . . . . . . . . . . . . . . . . . . . 5
2.1.3 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1.4 Duplication experiment and black hole complementarity . . . . . . . . . . . . 7
2.2 Inconsistency of old black hole complementarity . . . . . . . . . . . . . . . . . . . . 10
2.2.1 Large N rescaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2.2 Duplication experiment outside of the event horizon . . . . . . . . . . . . . . 13
2.2.3 AMPS argument and firewall controversy . . . . . . . . . . . . . . . . . . . . 15
2.2.4 Is the firewall-singularity consistent? . . . . . . . . . . . . . . . . . . . . . . . 18
3 Gravitational collapses with a false vacuum lump 19
3.1 Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.1.1 Regular black hole models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.1.2 Justification of physical possibility . . . . . . . . . . . . . . . . . . . . . . . . 203.2 Numerical setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.2.1 Double-null formalism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.2.2 Initial conditions and integration schemes . . . . . . . . . . . . . . . . . . . . 24
3.3 Causal structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.4 Gedanken experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.4.1 Duplication experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.4.2 Where is the firewall? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.4.3 Violation of cosmic censorship? . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.4.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4 Discussion 31
2
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
3/39
1 Introduction
The black hole information loss problem [1] is the deep and important issue that is related to
quantum gravity. From the discussion of classical [2] and semi-classical [3] analysis, we understand
that a stationary black hole only has three information: mass M, charge Q, and angular momentum
J. After the black hole evaporates, what will happen for the other quantum information? If it cannot
be restored by Hawking radiation, then we see a violation of unitarity and we lose fundamental
predictability. Otherwise, if it can be restored by Hawking radiation, how can we sure about this
and how can we restore the information?
After string theorists found the AdS/CFT correspondence [4], people could sure unitarity of
black hole physics, since the bulk gravitational dynamics should correspond the boundary conformal
field theory and the boundary conformal field theory should be unitary. However, this still remains
a question: how Hawking radiation can contain information and is it consistent in principle?
For this issue in fact, before the discovery of AdS/CFT some people had begun to consider
the consistency of unitarity. Especially, Stephens, tHooft and Whiting [5] and Susskind, Thorlacius
and Uglum [6] contributed this problem and named holographic principle and black hole comple-
mentarity. According to black hole complementarity, it is reasonable to think that the asymptotic
observer and the in-falling observer of a black hole should satisfy natural laws. Then semi-classical
and unitary quantum field theory should be a good description for the asymptotic observer, whilegeneral relativity should be a good description for the in-falling observer. Then, it seems to be
contradictory, since both observers maintain their information and hence information seemed to be
copied: one is inside of the event horizon, while the other is outside of the event horizon. However,
still black hole complementarity and natural laws for all observers are consistent, since two observers
cannot communicate [7]. Therefore, although a black hole violates a natural law (the no-cloning
theorem), if there is no witness, then it is innocent a perfect crime.
However, recently, people asked questions on the consistency of black hole complementarity.
The duplication of information can be observed by regular black holes [8] or charged black holes
[9, 10, 11], if we assume a large number of scalar fields that contribute to Hawking radiation.
Moreover, if we have a large number of scalar fields, then black hole complementarity can be
violated even for a Schwarzschild black hole [12]. The required number of scalar field can be
reduced to a sufficiently reasonable number, if we consider the scrambling time [13]. The asymptotic
observer and the in-falling observer can communicate inside of the black hole and hence black hole
complementarity seems to be inconsistent.
Furthermore, Almheiri, Marolf, Polchinski and Sully (AMPS) [14] discussed the inconsistency
3
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
4/39
of black hole complementarity from a different argument. They could show that a quantum state,
that satisfies classical general relativity for an in-falling observer and that satisfies unitary quantum
field theory for an asymptotic observer, cannot be consistent. Therefore, it seems that black holecomplementarity is inconsistent not only inside, but also outside of the black hole. To maintain
original philosophy of black hole complementarity, AMPS suggested the firewall proposal. Now
there are interesting controversy regarding the firewall [15, 16, 17, 18, 19, 20, 21, 22].
In this context, the authors suggest an interesting toy model for gedanken experiments. We
consider a gravitational collapse with a false vacuum lump. This is inspired from regular black hole
models [8, 23], although it does not necessarily regular (free from singularity) for our purposes.
This model is interesting, since the singularity and horizon structures are non-trivial. We can ask
how to define the duplication experiment, how to define the firewall, and whether the firewall can
rescue black hole complementarity even for this complicated case.
In Section 2, we concisely summarize the black hole information loss problem, motivations
and assumptions of black hole complementarity, and the duplication experiment. In addition, we
discuss two important inconsistency arguments for black hole complementarity: large N rescaling
[12] and the AMPS argument [14]. In Section 3, we discuss gravitational collapses with a false
vacuum lump, using the double-null numerical simulations [9, 24, 25, 26]. We analyze the details of
causal structures and discuss some thought experiments relating black hole complementarity and
the firewall proposal. Finally, in Section 4, we summarize and interpret our results.
2 Black hole information loss problem
In this section, we first discuss why people trust black hole complementarity. This is related the
analysis with entropy and information of black holes. We clarify the assumptions of black hole
complementarity and the consistency check through the duplication experiment. Second, we discuss
two counter arguments on black hole complementarity: large N rescaling and the AMPS argument.
In addition, we discuss the resolution of AMPS, the firewall proposal, and summarize the recent
status of the controversy.
2.1 Why black hole complementarity?
2.1.1 Entropy of black holes
The first remarkable issue on the information loss problem is the entropy. From the classical
discussion of a black hole, people observed thermodynamics of black holes. From the first law of
black hole thermodynamics [2] and the area increasing law [27], Bekenstein thought that the horizon
4
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
5/39
area is proportional to the thermal entropy [28]. The temperature formula came from the quantum
effects around the horizon [3]. This entropy is just the thermal entropy, since they first calculated
the temperature and second defined the entropy dSth = dQ/T, where dQ is the difference of heat.The natural question is then whether it is not only the thermal entropy but also the statistical
entropy, Sst = log , where is the number of accessible states.
Among string theorists, it is believed that the area is not only thermal entropy but also statistical
entropy. Some authors could find a dual of a black hole using D-brane combinations [ 29]. It is known
that for certain extreme limits with supersymmetry, the entropy of the weak coupling limit is the
same as that of the strong coupling limit. Researchers found some combinations of D-branes that
gives black hole solutions and could calculate the entropy of the weak coupling limit [30]. The
entropy could be exactly matched to the entropy formula for some extreme cases.
Therefore, although there is no formal proof on the thermal and statistical entropy relation,
A
4= log , (1)
there are some evidences on this relation and hence we will accept this and see their consequences.
2.1.2 Information emission from black holes
Let us specify the information emission from a black hole [31, 32]. Let us consider a system with a
number of degrees of freedom m n and divide two subsystems, A (inside of a black hole) and B(outside of a black hole), where A has a number of degrees of freedom n and B has m. Note that
m and n can vary with time, although m n should be conserved. We think that initially m = 1and, as time goes on, n decreases and m increases.
Here, the mutual information between A and B, that is, the information that B and A share,
or in other words, information of A that can be seen by B, is I(B : A) = S(B) S(B|A), whereS(B) = log m is the statistical entropy of B and S(B|A) is the entanglement entropy that is definedby the formula: is the density matrix of the total system and
B trA, (2)
S(B|A) = trB log B . (3)
In many contexts, people call S(A) or S(B) as coarse-grained entropy of A and B, while S(A|B)or S(B|A) as fine-grained entropy between A and B [33].
We can further calculate by assuming that the total system is pure and random. Page conjec-
5
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
6/39
f
informationcoarse-grained entropy
fine-grained entropy
11/2
Figure 1: Emission of information, where f is the fraction of the escaped coarse-grained entropy to
the original coarse-grained entropy.
tured the following formula [31] and soon after it was proven [34]: if 1 m n, then
S(B|A) =mn
k=n+1
1
k m 1
2n(4)
= log m m2n
. (5)
Therefore, initially, information is emitted
= m/2n, and it is negligible. If m > n, since S(B
|A) =
S(A|B) for a pure state,
S(B|A) =mn
k=m+1
1
k n 1
2m(6)
= log n n2m
. (7)
Therefore, after n becomes greater than m, the emitted information is = log m log n + n/2m, andit gradually increases (Figure 1).
As a conclusion, a system A begins to emit information to B when its coarse-grained entropy
decreases its half value (m = n). Before that time, emitted particles may not have sufficient
information. However, after that time, the original information cannot be compressed to A and the
information of A has to be transferred to B by the emitted particles.
2.1.3 Assumptions
Let us assume the following contents:
Assumption 1. Unitarity: The black hole dynamics is unitary for the asymptotic observer.
6
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
7/39
Assumption 2. Entropy: A/4 = log , where A is the area of the black hole and is the number
of accessible states.
Assumption 3. Existence of observer: There is an observer who can read information from
the black hole.
In addition, we further assume the reliability of local quantum field theory and general relativity
as methodological assumptions:
Assumption 4. For asymptotic observer: The semi-classical method is a good description for
the asymptotic observer.
Assumption 5. For in-falling observer: General relativity is a good description for the in-falling observer.
If we assume the results of the previous two subsections (Assumption 1 and Assumption 2) so
that A/4 = log and a black hole begins to emit information when log (1/2) log , then wecan conclude that the black hole begins to emit information when its area decreases to the half of
the initial value. This time scale is the order of the lifetime of a black hole M3: this time is calledby the information retention time [7]. In many cases, the black hole can be still semi-classical,
i.e., even though the area of the black hole decreased to half its value, the black hole is still large
enough. Then, the only way to take out information from the large black hole is Hawking radiation.
Therefore, information should be emitted by Hawking radiation.
2.1.4 Duplication experiment and black hole complementarity
Let us think of a specific situation (Figure 2) [7] and consider a series of experiments in which a
pair of correlated spins are created outside of the event horizon. One of the pair that falls into the
black hole is a and the other of the pair that is outside of the black hole is b. If Hawking radiation
contains information, then information about a can be emitted by Hawking radiation, and we call it
h. According to Assumption 3, if there is an observer who can measure the state of h, falls into the
black hole, and measures the state of a, then eventually we will know that the collected information
a and h are both correlated to b. This implies that the observer sees the duplication of states,
which is disallowed by quantum mechanics. We will call this kind of experiment as a duplication
experiment.
Susskind and Thorlacius [7] could answer questions on the duplication experiment. If the ob-
server sees both a and h, the observer has to wait until the information retention time. However,
if the original free-falling information a touches the singularity of the black hole, then there is no
7
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
8/39
singularity
event horizon
a
b
hobser
ver
messa
ge
t
Figure 2: The duplication experiment. a and b are a pair of correlated spins. The observer sees h,
which is a copy of a after the information retention time via Hawking radiation. To see a, a should
be sent to the out-going direction after the time t. If the observer sees both a and h, since they
are both correlated to b, it violates the no-cloning theorem and unitarity.
hope to see the duplication. To see the duplication, the free-falling information a should be sent to
the out-going direction during the time t.
We can estimate the time t in the Schwarzschild space-time:
ds2 =
1 2Mr
dt2 +
1 2M
r
1dr2 + r2d2. (8)
The horizon is rh = 2M and the Hawking temperature is on the order of T 1/M. Therefore, thelifetime is M3.
For the next calculation, we will comment on a simple extension to Kruskal-Szekeres coordinates
[7, 35]. We can neglect the angular part without loss of generality and we assume the form
ds2 = F(R) R2d2 + dR2 . (9)
To compare the original metric, the following definitions are reasonable:
d2 =dt2
r2h, (10)
R2F(R) = r2h
1 2M
r
, (11)
F(R)dR2 =
1 2M
r
1dr2. (12)
In terms of the coordinate R, the singularity occurs at R2 =
r2h; and the horizon occurs at R = 0.
8
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
9/39
Now, we can choose another metric and coordinates (U, V) by
V = Re, (13)
U = Re, (14)
ds2 = F(R)dUdV. (15)
Here, the singularity is U V = r2h.
Now, we can state the condition of a duplication experiment in a Schwarzschild black hole. The
first observer falls into a black hole and sends a signal to the out-going direction around time t.
Now assume that a second observer hovers above the horizon at a distance of the order of the Planck
length lPl and jumps into the black hole at the information retention time . Then, the initiallocation of the second observer is V = Re, where R lPl and /rh. Before touching thesingularity, the second observer will spend time (in terms ofU) around r2h/V since the singularityis U V = r2h. Therefore, the first observer should send a signal around the time t e/rh. Hence,the duplication may be observed if one can send a signal between the time
t exp rh exp
M, (16)
where is the information retention time.
Then, to send a quantum bit during t, it has to satisfy the uncertainty relation tE 1.
The required energy to send a quantum bit of information during t is exp M2, which is greaterthan the original mass of the black hole M. Therefore, the duplication experiment seems to be
improbable in real situations [7].
According to Susskind and Thorlacius, although information is duplicated, if no observer can see
the violation of the natural laws, there is no problem. In other words, there is no global description
for both an in-falling observer and an asymptotic observer and we have to choose one of them. In
this sense, two observers are complementary. This principle is known by black hole complementarity
or observer complementarity [6].
Black hole complementarity is consistent with two paradigms: the membrane paradigm [36] and
the D-brane picture [29]. The membrane paradigm is to see a black hole as a membrane around
the event horizon, the so-called stretched horizon. If we send an object to a black hole, the object
is stretched and scrambled on the horizon. The outside observer cannot see the disappearance of
the object beyond the horizon. Therefore, for the outside observer, information is on the horizon
and eventually escapes from the black hole via Hawking radiation. The scrambling on the stretched
horizon occurs in the following order of time:
scr Mlog M, (17)
9
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
10/39
and this time is called the scrambling time. According to Hayden and Preskill [13], after a black
hole approaches the information retention time, if one sends bits of information, this information
will quickly escape the black hole after the scrambling time. Note that even though we considerthe scrambling time, the consistency relation still holds: from Equation 16, we find that to see the
duplication, E M > M is required. Therefore, people believed that black hole complementarityis marginally true, even with the scrambling time.
2.2 Inconsistency of old black hole complementarity
Now we introduce two important arguments against the original version of black hole complemen-
tarity. One is large N rescaling [12] and the other is the AMPS argument [14].
2.2.1 Large N rescaling
Let us assume that G = c = 1 and remain explicitly. Then, all length, mass, and time dimensions
are the same. In this subsection, we will change the number of massless scalar fields N and hence
we scale the strength of Hawking radiation. We assume that there is one field that contributes to
form a black hole; the other N number of fields are not used to form a black hole, while they only
contribute to Hawking radiation.
First, let us assume N = 1. Then the semi-classical equations of motions (up to ) are as follows:
G = 8(T + T), (18)
;abgab = 0, (19)
where is a scalar field that is used to form a black hole.
Now we define the re-scaling using the following rule: if a quantity X which does not explicitly
depend on has a dimension [X] = L with a certain number , we define a re-scaled X by
X =
NX. (20)
Then, we claim that if we re-scale all possible quantities, then the re-scaled quantities are solutions
of the following equation:
G = 8(T + NT), (21)
;abgab = 0. (22)
This is easy to check: G has a dimension L2, T has a dimension L2, and T has a
dimension L4 in the one-loop order. Hence, G = G/N, T = T/N, and
T
=
T
/N2.
10
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
11/39
Then,
G = N G = 8(T +
T
) = 8(N T + N
2
T
), (23)
and our claim is proved. Also, it is easy to check the same relation for the Klein-Gordon equation
for the scalar field .
In conclusion, for given quantities of solutions of Equation (18), the re-scaled quantities are
solutions of Equation (21) with N massless fields. Three important remarks of large N rescaling
are noted here.
Conformal invariance of the causal structure: The re-scaling conserves the causal structure
of the metric, since it scales the unit length and the unit time at the same time. Therefore,
we can use the same Penrose diagram of the N = 1 case.
Semi-classicality: If we can prepare a sufficiently large N universe, even if a region has a large
curvature in the N = 1 case (in Planck units), we can find a universe where the curvature
is re-scaled to a sufficiently smaller value (in Planck units). Therefore, the large N rescaling
makes the results trustable in the semi-classical sense.
Generalization of other matter fields: We can generalize for more complicated matter fields:
e.g., complex scalar field, complicated potential, etc. For these cases, we have to rescale
coupling constants when we vary the number of scalar fields. As long as the coupling constants
are free parameters of the theory, we think that this is allowed in principle.
Let us apply the large N rescaling to the information retention time and the scrambling time.
Information retention time: We re-scale all length, mass, and time parameters by
N. Now,
the information retention time for the mass M and the single field case is re-scaled to for
the mass M =
N M and large N, where
M3, (24) M
3
N=
(
NM)3
N=
N M3. (25)
Here, we have to divide the lifetime by N, since there are N-independent fields that contribute
to Hawking radiation. Note that the size rh will be re-scaled by rh =
N rh. Therefore, under
the large N re-scaling, the ratio between the temporal size and the spatial size is invariant:
rh=
rh. (26)
11
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
12/39
Note that, although /rh is invariant under the large N rescaling, each conformaly equivalent
distances should be stretched via
N factor. Therefore, in general, in the N = 1 limit, the
duplication may be observed if one can send a signal between the time
t exp rh exp
M, (27)
where is the information retention time ( M3). On the other hand, in the large N re-scaledcase,
t
Nexp
rh
Nexp M
. (28)
From the uncertainty relation, the required energy becomes
E 1N
exp
M, (29)
and since the consistency of complementarity requires E > M =
N M, the consistency
condition becomes
exp M2 > NM. (30)
This condition can be violated by assuming a sufficiently large N exp M2 [8, 9, 10].
Scrambling time: The scrambling time is Mlog M Mlog S, where S is the entropy ofthe black hole [13]. Then, in fact, the re-scaling is for Mlog S/, and hence, the re-scaling is
N MlogNM. Then, in a large N universe, the time scale becomes
t
Nexp
Mlog
N M
M
Nexp log
N M
. (31)
From the uncertainty relation, the required energy becomes
E 1N
exp log
N M. (32)
Since the consistency of complementarity requires E > N M, the consistency conditionbecomes
M >
NM. (33)
Of course, this condition can be violated by assuming a sufficiently large N [8, 12].
In this sense, the black hole complementarity principle can be violated even if we consider a
Schwarzschild black hole. The required number of scalar field can be reasonably small, if we
consider the scrambling time.
12
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
13/39
Even though we do not consider the scrambling time and only consider the information retention
time, still we can believe that black hole complementarity is inconsistent. Although the required
number of scalar fields is exponentially large, it is not infinite and hence it can be allowed by stringtheory in principle [37]. There are some typical doubts due to misunderstandings on the large N
rescaling and we can answer on them:
1. People think that the large N induces strong Hawking radiation and hence the black hole
evaporates too quickly to be semi-classical [37]. However, it is not true. We increase not only
the strength of the Hawking radiation, but also the size of the black hole at the same time.
Dvali suggested that the semi-classical black hole should be larger than
N: in other words,
M >
N. In our discussions, M
1 and, by the rescaling, M =
NM
N always hold.
Therefore, for the large N limit, the back-reactions from the Hawking radiation decrease and
the lifetime of the black hole increases.
2. People worry the higher order quantum corrections when we include a large number of scalar
fields. This is a reasonable concern, but our attention is not the general gravitational system,
but a very special situation that can be allowed in principle. So, the proper worry is whether
the large N inevitably require strong quantum correction effects or not. The answer is it
may be not, in principle. First of all, all the curvature corrections will be suppressed via
the rescaling. Second, higher loop corrections of the matter fields depend on their couplings.
If we assume that N scalar fields are independent each other, then the higher order terms
will be reasonably suppressed, since it is proportional to N2, while this can be sufficiently
smaller compared to the term N. If this assumption is in principle possible, then it is a good
playground to test the consistency of black hole complementarity, unless we find a fundamental
limitation on this assumption.
2.2.2 Duplication experiment outside of the event horizon
Up to this paragraph, we ignored the contribution of the subexponential factor for t. Note that
for an evaporating black hole, the apparent horizon is outside of the event horizon. Therefore, the
duplication experiment can be done not only inside but also outside of the event horizon. To see
the duplication outside of the black hole, the in-falling information should send the message to the
out-going direction between the new time scale U. In general, we expect U t, and thedifference comes from the subexponential factor.
Let us discuss the details. Let us assume that the black hole mass is initially M1 and, as time
goes on, it shrinks to M2
after a time scale . Now let us define a duplication observer who maintains
13
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
14/39
singularity
eventhorizon
a h
obse
rver
message
tU
Figure 3: The duplication experiment outside of the event horizon. a is the in-going information
and send a signal to the out-going direction. This can be both of inside and the outside of the event
horizon. To see a inside of the event horizon, a should be sent to the out-going direction after the
time t, while to see outside of the event horizon, a should be sent after the time U.
its radius around r1 = 2M1 until the time and eventually falls to r2 + lPl 2M2 (still outside ofthe event horizon) along the in-going null direction around the time .
Then, we should calculate the difference of the coordinate U between two points (V
, r = r1)
and (V , r r2) (Figure 3). The coordinate is approximately the same: /r2 for bothpoints. In addition, the R coordinates are
R = M
r 2M
2M
1/2exp
r
4M(34)
by using a simple coordinate transformation. Therefore, U = R exp and hence approxi-mately
U
M2Mexp
r2
, (35)
where M is the decreased mass due to the evaporation during the time .
Note that, in Equation (16), we omit the sub-exponential factor where the factor is approxi-
mately M22 . Of course, in principle we can restore and compare with the sub-exponential factor of
Equation (35), and in general the latter is shorter than the former:
U
t
M2M
M22 1. (36)
Therefore, it is easier to see the duplication not outside but inside of the black hole. However, the
duplication experiment is dominated by the exponential factor, and two time scales share the same
14
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
15/39
exponential factor. Hence, the required N for the successful duplication experiment is similar for
both cases.
Outside of event horizon considering the information retention time: Here, M = M1M2
2 1M2. Therefore, using the same argument of the previous part, the duplication
experiment is possible even outside of the event horizon, as long as N exp M2 scalar fields
are in principle possible.
Outside of event horizon considering the scrambling time: With the scrambling time, we
can also define the duplication experiment outside of the event horizon. Here, M scr/M22 .After the large N rescaling and apply the uncertainty relation, the required energy E is
E 1log M2
1N
exp log
N M2. (37)
The duplication experiment is possible even outside of the event horizon, if E 1
log M2. (38)
Note that if we carefully compare with the previous paragraph, the condition to see a dupli-
cation inside of the horizon was N > 1/M4. Therefore, to see the duplication outside of the
event horizon, we need more N than the case to see inside of the event horizon; however, in
any case, the duplication observation requires a reasonable number of scalar fields1.
In conclusion, if there is a sufficiently large number of scalar fields, then the duplication experi-
ment is possible not only inside but also outside of the event horizon. Therefore, to prevent such a
duplication experiment, the in-going observer should be killed very near the apparent horizon, rather
than the event horizon, after a certain time scale (information retention time or scrambling time).
This gives a wisdom on the location of the firewall, where we will discuss in the next subsection.
2.2.3 AMPS argument and firewall controversy
Recently, Almheiri, Marolf, Polchinski, and Sully [14] suggested that the assumptions of black hole
complementarity is inconsistent by the other arguments. Let us define two sets of quantum operators
1Up to now, we thought that the consistency condition is E > M. However, in practice, we cannot use all the
energy M to send a signal and there can be a certain limitation: we can use at most M to send a signal, where
< 1. Then the required N becomes N > (M4)1 for inside of the horizon and N > ( log M2)1 for outside of
the horizon. This implies that the required N can be greater than 1. However, it is also true that such a required
number can be still reasonably small.
15
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
16/39
of the matter fields: for the initial state a, a and for the final state b, b. From Assumption 5,
the collapsing information will be described by the ground state aa = 0. From Assumptions 1,
2, and 3, after the information retention time, if we put a small information, then they will beemitted by Hawking radiation after the scrambling time. From Assumption 4, there is a unitary
and semi-classical description between the initial state and the final state by
b =
0
B()a + C()a
d. (39)
For an asymptotic observer, the quantum state | should be an eigenstate of bb, from Assump-tion 4. Note that the full state cannot satisfy a| = 0 and the eigenstate of bb at the same time.This is a contradiction.
To resolve the contradiction, they suggested two alternatives. One is to drop Assumption 5 so
that the in-falling observer sees a sudden change (violation of equivalence principle); they assumed
that there is a firewall near the horizon for an in-falling observer. The other is to drop Assumption 4
so that the asymptotic observer sees a radical non-local effects.
Here, we briefly summarize the comment on the firewall proposal among researchers:
Its inconsistent, so what?: Bousso [15] argued that AMPS clearly shows the potential inconsis-
tency of black hole complementarity. However, this is not a problem, since the inconsistency
cannot be observed in principle2
. To notice the inconsistency, one has to compare the statefor a, a and the state for b, b, in other words, the in-falling observer and the asymptotic
observer. However, the communication is impossible. Therefore, although it is apparently
inconsistent, we do not have to modify black hole complementarity. This interpretation is
consistent with Nomura, Varela and Weinberg [16] and Banks and Fischler [21], in the sense
that the in-falling observer and the asymptotic observer correspond different detectors and
hence cannot be compared by a naive way. Black hole complementarity is for the whole quan-
tum states, while the in-falling observer and the asymptotic observer are only the part of the
whole quantum states. Therefore, the comparison between two observers are not well-defined
at the beginning.
These kind of arguments relies on the fact that two observers asymptotic and in-falling
cannot communicate in the semi-classical sense. However, this is not true. Large N rescaling
shows that they can communicate each other in the semi-classical limit. Therefore, we cannot
simply avoid the potential inconsistency and one has to answer what will happen when two
2Recently, Bousso changed his opinion in the second version of [15], while this paragraph relies on the first version
of the paper.
16
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
17/39
observers meet. In this sense, we think that this opinion cannot help the problem of black
hole complementarity.
The firewall is a fuzzball: Mathur and Turton [17] and Chowdhury and Puhm [18] tried to con-
nect the firewall argument and the fuzzball conjecture. The fuzzball conjecture [38] can be a
natural realization of the firewall argument; they called approximate complementarity. Orig-
inally, the fuzzball conjecture was not entirely clear for the in-fall problem: what will happen
for the in-falling observer? However, now one can get a clear interpretation for the in-fall
problem so that the fuzzball works as a kind of firewall.
This is surely an interesting idea, although there are still some questions. First, one has
to assume that a classical black hole tunnels to a fuzzball state, and it is not entirely clear
whether it is in general possible or not. Second, the fuzzball conjecture strongly relies on string
theory and its details. However, what will happen if we cannot rely on such a structure; for
example, string theory is not the fundamental theory, or there is no hidden dimensions (e.g.,
evaporating 10-dimensional black holes). Apart from these questions (of the authors), the
fuzzball conjecture is an interesting and valuable idea for further investigation. However, in
this paper, we will not follow this direction.
One important remark is that one can distinguish the fuzzball in the macroscopic scales [20].
Therefore, if the fuzzball conjecture is true, then it modify not only Assumption 5, but also
Assumption 4.
The firewall is a new singularity: Susskind [19] discussed that if there is a firewall, then it
should be regarded as a new type of singularity. The entanglement of the black hole with
Hawking radiation causes the singularity to migrate toward the horizon and eventually inter-
sect it at the information retention time. Therefore, now we have to consider the singular
horizons firewall after the information retention time. In addition, after the information
retention time, if some information falls into the black hole, then the horizon increases alongthe space-like direction, and eventually be singularized after the scrambling time.
This interpretation is worthwhile to discuss further. We will comment in the next subsection.
In the semi-classical point of view: Ori [22] commented that it is not inconsistent to extend
semi-classical quantum field theory beyond the event horizon. In other words, there is no
good justification for the existence of the firewall. Therefore, if we accept that there is no
firewall and black hole complementarity is not true, then the next possible choice is the regular
black hole/remnant picture or the baby universe scenario. This conclusion is the same as the
17
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
18/39
killkill
Figure 4: Left: The signal from the firewall (thick red arrow) kills the in-falling information.
However, it does not affect outside, since the effects (red dotted arrow) is screened by the apparenthorizon. Right: If the apparent horizon is disconnected, then there is no screen so that the effects
(red dotted arrow) can modify asymptotic infinity.
authors [12] and probably shared by a number of general relativists.
2.2.4 Is the firewall-singularity consistent?
Let us extend the discussion of [19]. We require two conditions for the firewall:
1. It should prevent the duplication experiment.
2. We do not want to modify macroscopic scale (asymptotic) semi-classical theory.
From the first condition, we conclude that the firewall should be very close to the apparent horizon,
since the duplication experiment can be done outside of the event horizon by assuming a reasonable
number of scalar fields. Then, the firewall should be time-like, since the apparent horizon is time-like
[39]. However, because of the second condition, the time-like object should not affect to the future
infinity. Now, our question is this: is it indeed consistent?Of course, it is more natural to think that the time-like firewall should affect the future infinity.
On the other hand, if one wants to hold the conservative point of view so that one believes the
firewall does not affect future infinity, then we must require two properties at the same time: (1) the
firewall sends signals along the in-going direction (thick arrow in Left of Figure 4) and (2) although
there is a bounced effect along the out-going direction, the apparent horizon works as a screen of
any out-going effects (dotted arrow in Left of Figure 4).
These properties can be falsified if the apparent horizon is separated (Right of Figure 4). Then
the apparent horizon cannot screen the out-going effects of the firewall. Or, if the firewall is still there
18
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
19/39
even though the apparent horizon is disappeared, then the firewall becomes a naked singularity. In
any case, the firewall should affect the future infinity. In the next section, we realize such separated
horizons.
3 Gravitational collapses with a false vacuum lump
In this section, we discuss gravitational collapses with a false vacuum lump. This is motivated by
regular black hole models, but it does not necessarily be regular. We calculate using the double-null
formalism and numerical implementations. After we specify causal structures, we discuss thought
experiments on black hole complementarity and firewall proposal.
3.1 Model
3.1.1 Regular black hole models
Regular black holes are introduced to explain the problem of singularity in black holes. According
to the singularity theorem, if we assume the three things and general relativity, we cannot avoid
the existence of a singularity [40]: (1) global hyperbolicity, (2) the null energy condition, and (3)
the existence of a trapped surface.
To define a black hole, we cannot avoid the last assumption, the existence of a trapped sur-
face. Therefore, one may choose some possibilities [23]: (1) modify general relativity around the
singularity, (2) violate global hyperbolicity and introduce a Cauchy horizon, or (3) violate the null
energy condition.
Modify general relativity: Around the singularity, general relativity should be radically modi-
fied. One possibility is that the spacetime is fuzzy and not well-defined. The other possibility
is that one can still choose a good metric ansatz, although the metric should be affected
by some quantum gravitational corrections. However, it crucially depends on the details of
quantum gravity.
Violate global hyperbolicity: One may assume that a black hole solution is Schwarzschild for
large r (or, any known static solution), while there is a certain non-trivial matter core inside
of the black hole. In general, the matter core will collapse to a singularity. However, if the
matter can postpone the formation of singularity and an inner horizon can appear, then one
may construct a regular solution, even though we do not violate the null energy condition.
However, these models typically have an inner horizon and these inner horizons are Cauchy
horizons in the static limit. Therefore, global hyperbolicity is violated.
19
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
20/39
In general, if there is a Cauchy horizon, mass inflation is inevitable [ 41]. Then, even though
there is no strong singularity, a curvature singularity (with non-zero area) can be formed.
Therefore, the resolution of mass inflation is required again.
Violation of the null energy condition: If we assume a certain amount of matter that violates
the null energy condition, then it is not difficult to find a regular black hole solution, since the
matter can postpone the formation of a singularity. The problem is the origin of the matter.
One may assume a phantom matter, that is not ruled out by cosmological observations. One
trivial example that realizes the phantom matter is a ghost field.
One problem is that a ghost field makes the field theory unstable. Therefore, it is fair to say
that observations cannot rule out the existence of phantom/ghost-like matter; also, there is
no observational justification for the usage of phantom/ghost matter. On the other hand, if
a false vacuum bubble can emit negative energy flux, then this can form a negative energy
bath [25], although all the process requires many assumptions.
3.1.2 Justification of physical possibility
In this paper, in spite of the potential problems, we introduce a regular black hole model. Let
us first comment on a static solution of Frolov, Markov, and Mukhanov [42]. The metric and the
energy-momentum tensor of the massive shell are as follows:
ds2 =
1 2m(r, l)r
dt2 +
1 2m(r, l)
r
1dr2 + r2d2, (40)
where m(r, l) = m(r r0) + (r3/2l2)(r0 r), l = (/3)1/2 is the Hubble scale parameter, andr0 = (12/)
1/6(2m/l)1/3l is the radius of the false vacuum boundary (we can choose the value of
as a free parameter). Then, one can easily check that (if we choose = 12) the metric gives the
outer horizon (r+ = 2m) and the inner horizon (r = l), and usually r < r0 < r+ holds as long as
l m. If r < r0, the metric is exactly the same as a de Sitter space, and, otherwise, it is exactly
the same as a Schwarzschild black hole. We can calculate a proper shell condition [42]:
S = diag
4, 0,
+
8,
+
8
, (41)
where
=r0l2
r0l
2 1
1/2+
m
r20
2m
r0 1
1/2, (42)
=1
r0
r0l
2 1
1/2 1
r0
2m
r0 1
1/2. (43)
This regular black hole model is free from singularity since it violates global hyperbolicity. So,
it may suffer from mass inflation. This model assumes a thin-shell that mediates the inside false
20
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
21/39
vacuum region and the outside true vacuum region, and the shell is space-like. We can prove that
the space-like shell is stable for small perturbation [43]. As long as the shell is stable, we can
construct a reasonable causal structure as the black hole forms and evaporates [42, 8].However, for realistic applications, one may suggest some problems:
1. Initially, this model requires a false vacuum lump. Can it be generated by a quantum tunnel-
ing?
2. Initially, the shell of the false vacuum lump is time-like. After the shell is trapped by an
apparent horizon, it should be space-like. How can it be dynamically possible?
3. Even though a stationary solution is obtained, will the internal structure be stable, even in
the presence of mass inflation?
However, we think that our numerical study is still meaningful, even though these potential prob-
lems. In this paper, we do not want to remove all the singularities. Rather, we want to postpone
the formation of the singularity. For a deeper region, we regard that eventually a Schwarzschild
black hole is formed. Our purpose is to modify horizon dynamics using false vacuum bubbles, not
to modify deeper center of the black hole. From this stance, each problem above can be relaxed by
the followings:
1. Quantum fluctuations can generate a false vacuum lump during a short time [44]. Also, there
are consensus that a buildable bubbles can be generated by unitary processes (although we
cannot construct instantons) [45]. Moreover, there is an instanton solution of a small false
vacuum bubble in modified gravity [46]. Therefore, the assumption of the false vacuum bubble
should be allowed in principle.
2. The thin-shell dynamics can be questionable, whether it is time-like or space-like. However,
by using numerical techniques [25], we can see clear dynamics of thick bubble walls.
3. There will be mass inflation. However, we can postpone the curvature cutoff of mass inflation,
by assuming sufficiently large number of scalar fields. Therefore, our analysis around the
apparent horizon can always make sense.
3.2 Numerical setup
In this subsection, we discuss a numerical model that mimics Frolov, Markov, and Mukhanovs
model.
21
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
22/39
3.2.1 Double-null formalism
We describe a Lagrangian with a scalar field , , and potential V():
L = 12
;a;bgab V() 1
2;a;bg
ab, (44)
where is used to make a false vacuum bubble and is used to make a black hole. From this
Lagrangian we can derive the equations of motion for the scalar field:
;abgab V () = 0, (45)
;abgab = 0. (46)
In addition, the energy-momentum tensor becomes
Tab = ;a;b 12
gab(;c;dgcd + 2V()) + ;a;b 1
2gab;c;dg
cd. (47)
Now, we describe our numerical setup. We start from the double-null coordinates (our convention
is [u,v,,]),
ds2 = 2(u, v)dudv + r2(u, v)d2, (48)
assuming spherical symmetry. Here u is the ingoing null direction and v is the outgoing null
direction.
We define the main functions as follows [9, 25, 26]: the metric function , the area function
r, and the scalar fields S 4 and s 4. We also use some conventions: d ,v/,h ,u/, f r,u, g r,v , W S,u, Z S,v, w s,u, z s,v.
From this setup, the following components can be calculated:
Guu = 2r
(f,u 2f h), (49)
Guv =1
2r2 4rf,v +
2 + 4f g
, (50)
Gvv = 2r
(g,v 2gd), (51)
G = 4 r2
2
d,u +
f,vr
, (52)
Tuu =1
4
W2 + w2
, (53)
Tuv =2
2V(S), (54)
Tvv =1
4
Z2 + z2
, (55)
T =r2
22 (W Z+ wz) r2V(S), (56)
22
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
23/39
where
V(S) = V()
|=S/
4. (57)
From the equations of the scalar fields, we get the following equations:
rZ,u + f Z+ gW + 2rV
(S) = 0, (58)
rz,u + f z + gw = 0. (59)
Note that, V
(S) = dV(S)/dS.
We also consider renormalized energy-momentum tensors to include semiclassical effects. The
spherical symmetry makes it reasonable to use the 1 + 1-dimensional results [47, 48] divided by
4r2 [9, 24, 25, 26]:
Tuu = P4r2
h,u h2
, (60)
Tuv = Tvu = P4r2
d,u, (61)
Tvv = P4r2
d,v d2
, (62)
with P N l2Pl/12, where N is the number of massless scalar fields and lPl is the Planck length.We use the semi-classical Einstein equation,
G = 8
T + T
. (63)
Finally, we summarize our simulation equations:
1. Einstein equations:
d,u = h,v =1
1 Pr2
f g
r2+
2
4r2 (W Z+ wz)
, (64)
g,v = 2dg r
Z2 + z2
P
r(d,v d2), (65)
g,u = f,v = f gr
2
4r+ 22rV(S) P
rd,u, (66)
f,u = 2f h r
W2 + w2 P
r(h,u h2). (67)
2. Scalar field equations:
Z,u = W,v = f Zr gW
r 2V(S), (68)
z,u = w,v = f zr gw
r. (69)
23
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
24/39
3.2.2 Initial conditions and integration schemes
We prepare a false vacuum bubble along the initial ingoing surface, where the outside is flat back-
ground. We need initial conditions for each function on initial u = ui = 0 and v = vi = 0 surfaces.
There are two kinds of information: geometry (,r,g,f,h,d) and matter (S,W,Z,s,w,z).
On the geometry side, we have gauge freedom to choose the initial function and integrate r
using equations for consistency. We choose (0, 0) = 0 and h(u, 0) = d(0, v) = 0. 0 is related
to the mass function: m(u, v) = (r/2)(1 + 4fg/2). For a fixed r(0, 0) = 10, f(0, 0) = 1/2, andg(0, 0) = 1/2, to satisfy m(0, 0) = 0, hence (0, 0) = 1 is determined automatically.
On the matter side, we fix s(u, vi) = 0 and
s(ui, v) = A sin2
v
viv
(70)
for vi v < vi + v and otherwise s(0, v) = 0. Then, one can calculate s(u, vi), w(u, vi) = s,u(u, vi),s(ui, v), and z(ui, v) = s,v(ui, v); in addition, z(u, vi) and w(ui, v) is obtained using the equation
for s,uv. In addition, we fix S(ui, v) = 0 and
S(u, vi) =
0 u < ushell,
sin2(uushell)2ushell
ushell u < ushell + ushell,
ushell + ushell u.(71)
Then, one can calculate S(u, vi), W(u, vi) = S,u(u, vi), S(ui, v), and Z(ui, v) = S,v(ui, v); in addi-
tion, Z(u, vi) and W(ui, v) is obtained using the equation for S,uv. The potential is free to choose,
but we fix the simplest form:
V(S) = Vfv
B
S
4 2 (B + 1)
S
3+ (B + 3)
S
2, (72)
so that it has the true vacuum at S = 0 and V(0) = 0 while it has the false vacuum at S = and
V() = Vfv.
Then, as one fixes s,w,z and S,W,Zfor initial surfaces, one can obtain g and f by integratingEinstein equations. And then, finally, r can be obtained by integrating g and f. This finishes to
assign the initial conditions. We observed the convergence and consistency of the simulations in
Appendix. Here, we used the 2nd order Runge-Kutta method [49].
We fix free parameters as follows: r0 = 10, 0 = 1, A = 0.025, v = 0.2, ushell = 0.005,
ushell = 13.846, B = 10, Vfv = 0.005, P = 0.1. The only remained parameter is the field value of
the false vacuum . Of course, in general, the other parameters are free to choose in principle.
24
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
25/39
2 4 6 8v
13.848
13.898
13.948
u
13.998
0.10.050
-0.05-0.1
10 12 14
crossing point bouncing point
=0.07
~Mshell
Figure 5: General global structure of gravitational collapses with a false vacuum bubble. Here,
= 0.07. Color denotes the field value S and red curves denote the apparent horizons.
25
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
26/39
singularity
eventh
oriz
onap
parent
horiz
on
shell
Figure 6: Left: A causal structure of an evaporating neutral black hole. Right: An out-going false
vacuum bubble changes the singularity structure. Red curve is an apparent horizon, blue curve is an
event horizon, yellow region is a shell, red region is a false vacuum region, and dashed rectangular
is an integration domain of our simulations.
3.3 Causal structure
Figures 5 and 6 represent a general global causal structure of the gravitational collapse with a false
vacuum bubble. It is interesting to note that this causal structure is qualitatively same as the causal
structure in [8]. There are few remarkable structures. First, there appears a closed trapped region:
outer part is an outer apparent horizon and the inner part is an inner apparent horizon. Two
horizons are emerged at a certain crossing point. The crossing point appears since the false vacuum
shell crosses there. The out-going false vacuum shell eventually turns to the in-going direction
and we call this bouncing point. Before the bouncing point appears, still there can be an apparent
horizon inside of the false vacuum region. The approximate radius difference between the crossing
point and the inside apparent horizon should be order of the false vacuum shell mass
Mshell
.
Now we discuss details of the crossing point and the bouncing point. First, Figure 7 compares
two cases, black hole with and without the false vacuum bubble. For an evaporating black hole, one
can relocate the crossing point to any place on the time-like horizon by changing the parameters.
This crossing point can be chosen around the information retention time, in principle. By tuning
the initial location of the shell ushell and the thickness of the shell ushell (this should be sufficiently
thin), one can shoot the out-going shell to hit the purposed crossing point (Figure 7). For this,
we require that the shell energy should be sufficiently large so that the bouncing point arises
sufficiently far from the crossing point and the shell does not collapse before it reaches the crossing
26
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
27/39
0.5 1 1.5v
13.818
13.838
13.858
u
13.878
2 2.5
purposed crossing point
0.10.050-0.05
-0.1
0.5 1 1.5v
u
2 2.5
crossing point
=0.07No false vacuum bubble
13.818
13.838
13.858
13.878
Figure 7: Constructing the crossing point. Black contours denote r and the difference of each
contour is 0.01. Color denotes S. Left is the case when there is no false vacuum bubble and Right
is the case = 0.07.
point. Figure 8 shows such a behavior; as the shell energy increases by tuning the field amplitude
, the bouncing point shifts right side, while the crossing point is not significantly changed.
Therefore, to summarize, we have three free parameters that depend on the potential and
the initial conditions: ushell, ushell, and . First, we choose a purposed crossing point (for our
purposes, around the information retention time). Then, one can estimate the required ushell and
ushell. However, these choices cannot make sure the shell hits the crossing point since it can collapse
too quickly. Now, we have to tune to set a proper tension of the shell so that the bouncing point
arises sufficiently far from the purposed crossing point. In this limit, the shell energy Mshell is
essentially determined by ushell and . It is easy to choose sufficiently large Mshell so that the
distance between the crossing point and internal horizon structures are sufficiently large. Here,
between the crossing point and the internal horizon structures, we do not have an evidence of mass
inflation, although this can be observed for the deeper inside of the expanding false vacuum bubble.
3.4 Gedanken experiments
3.4.1 Duplication experiments
In this causal structure (Figures 6), the duplication experiment is well-defined and possible (Fig-
ure 9). We use the same conventions that was used in Section 2. Here, we can assume that the
crossing point is around the information retention time. To see the duplication, the message can
be sent after t
Mshell and this can be reasonably large. If there is mass inflation, then this can
27
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
28/39
u
2 4 6 8v
10 12 14
=0.02
u
2 4 6 8v
10 12 14
=0.03
u
2 4 6 8v
10 12 14
=0.04
u
2 4 6 8v
10 12 14
=0.05
bouncing pointbouncing point
bouncing point bouncing point
13.818
13.838
13.858
13.878
13.818
13.838
13.858
13.878
13.818
13.838
13.858
13.878
13.818
13.838
13.858
13.878
Figure 8: Shifting of the bouncing point. Black contours denote r and the difference of each contour
is 0.01.
28
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
29/39
be regularized by assuming a large number of scalar fields, although there is no numerical evidence
that we need such a number.
3.4.2 Where is the firewall?
Therefore, it is inevitable to introduce the firewall, if one wants to maintain black hole complemen-
tarity. As we discussed in Section 2, the firewall should be on the apparent horizon. Note that this
situation is quite different from that of the Schwarzschild black hole, since the apparent horizon is
disconnected. Figure 9 shows possible candidates of the firewall. If the firewall is on the internal
horizon structures (Middle and Right of Figure 9), then it cannot resolve the problem of black
hole complementarity. Therefore, it should be on the outer apparent horizon after the information
retention time. However, we know that the horizon suddenly disappears.
Here, our first question is this: what will be observed by the in-falling duplication observer? The
answer is simple. If the firewall can kill the message of a, then the observer can notice the effect of
the firewall, and we interpret that the firewall can affect the causal future of the spacetime.
Note that obviously the firewall is outside of the event horizon. If we accept that the firewall
can affect the causal future, then the next question is this: does the firewall affect to asymptotic
infinity? If the apparent horizon is connected, then one can believe that any effect can be screened
by the apparent horizon. However, if the apparent horizon is not connected, there is no consistent
screen. It is fair to say that the firewall is now naked. Therefore, we conclude that the firewall
should affect the asymptotic future infinity.
Therefore, this reveals a paradox when we assume two contents: the firewall should prevent
the duplication experiment and the firewall should not affect future infinity. From the former
assumption, the firewall should be on the apparent horizon. Therefore, if the firewall is a kind
of singularity, then it should be a time-like singularity, since the outer apparent horizon is time-
like. If we only consider the Schwarzschild black hole, people could ignore this problem, since
the apparent horizon is connected, and hence the inside and the outside of the firewall was well-
separated. However, if we consider disconnected apparent horizons, it is more clearer that one
cannot ignore the effects of the firewall along the out-going direction (Figure 4). Then this requires
somehow quantum gravitational modification for the outside of the black hole. A firewall cannot
prevent the modification of semi-classical quantum field theory.
3.4.3 Violation of cosmic censorship?
Furthermore, now let us consider the case that the crossing point is slightly before the information
retention time (Figure 10). During the time evolution, the firewall grows and approaches the
29
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
30/39
a
b
h
observer
messa
ge
t
a
b
h
observer
t
a
b
h
observer
t
Figure 9: Left: To resolve the inconsistency of black hole complementarity, the firewall should exist
on the outer apparent horizon. Middle and Right: If the firewall is on the other place, then it
cannot cure the inconsistency of black hole complementarity.
apparent horizon [19]. We can tune the case such that the crossing point and the information
retention time is quite close so that the firewall can grow outside of the event horizon. Then, there
is no way to screen the effect of the firewall-singularity. Again, the firewall cannot prevent the
modification of semi-classical quantum field theory for an asymptotic observer. Then, is it a kind
of violation of strong cosmic censorship?
3.4.4 Conclusion
In conclusion, originally, the firewall was a conservative idea to maintain black hole complementarity.
However, our discussion reveals that the firewall should affect the future infinity and asymptotic
observer. Therefore, we have some possible interpretations:
1. We can include more ad hoc assumptions to maintain the firewall idea so that, we only
modify Assumption 5. For example, the Horowitz-Maldacena proposal [50] can be potentially
relevant, although the idea in itself has other potential problems [51] and can be falsified with
large N rescaling [10].
2. We may interpret that it is inevitable to assume macroscopic effects of quantum gravity, even
for semi-classical systems (Assumption 4 should be modified) [52]. This possibility can be
related to the fuzzball interpretation [17, 18, 20].
3. We may think that one of the Assumptions 1, 2, or 3 should be modified [12].
30
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
31/39
firewall
Figure 10: If the crossing point is slightly before the information retention time, during the time,
a firewall grows and approaches the apparent horizon. It is possible that the firewall is outside of
the event horizon while the apparent horizon is disappeared. Then the effect of the firewall should
be observed by an asymptotic observer.
4 Discussion
In this paper, we discussed black hole complementarity and the firewall proposal, and related
gedanken experiments.
We illustrate five assumptions: unitarity, entropy-area formula, existence of information ob-
server, semi-classical quantum field theory for asymptotic observer, and general relativity for in-
falling observer. These five assumptions require a duplication of information around the event
horizon and hence black hole complementarity for consistency. However, if there is an observer who
can see the duplication of information, then black hole complementarity can be falsified.
Black hole complementarity is indeed falsified by two arguments: large N rescaling and AMPS
argument. Especially, the former is useful to show the communication between two observers:
asymptotic and in-falling. To resolve the contradiction, AMPS introduced the firewall. If the
firewall prevents the duplication experiment, then it should be close to the apparent horizon after
a certain time scale (information retention time or scrambling time).
Now we ask that whether these two assumptions are consistent at the same time: (1) the firewall
is around the apparent horizon and (2) the firewall only affects inside of the black hole. To check the
consistency, in this paper, we considered a gravitational collapse with a false vacuum lump, which is
motivated by a regular black hole model. We could construct an example that the apparent horizon
can be disconnected. Then, one can clearly see that there can be no barrier to screen the out-going
effects from the firewall and the firewall can be naked.
31
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
32/39
From these arguments, what we can clearly conclude are as follows:
Conclusion 1: The original version of black hole complementarity is inconsistent. An in-falling
observer and an asymptotic observer can communicate.
Conclusion 2: To maintain the basic philosophy of black hole complementarity, we need a firewall
around the apparent horizon, to kill the information of the in-falling information.3
Conclusion 3: The consistent firewall should affect not only in-falling observers, but also asymp-
totic observers.
Therefore, there may be three possibilities: we need more assumptions to maintain black hole
complementarity in ad hoc ways, we have to accept macroscopic effects due to quantum gravity, orwe have to modify the traditional entropy-area formula, etc. In this paper, we cannot judge which
is the final answer and we remain as a future work.
Appendix: Consistency and convergence tests
In this appendix, we report on the convergence and consistency tests for our simulations. As a
demonstration, we consider the case = 0.07.
For consistency, we test one of the constraint functions:
C =f,u 2f h + r
W2 + w2
+ (P/r)
h,u h2
|f,u| + |2f h|+ |r (W2 + w2) | + (P/r) (|h,u|+ |h2|) (73)
around v = 5, 10, 15. Figure 11 shows that it is less than 1 % except some points, where the
denominator vanishes (f,u 0); this will not be accumulated as one integrates along u. Therefore,this shows good consistency.
For convergence, we compared finer simulations: 1 1, 2 2, and 4 4 times finer for aroundu = 13.8, 13.85, 13.9, 14.1. In Figure 12, we see that the difference between the 1 1 and 2 2
times finer cases is 4 times the difference between the 2 2 and 4 4 times finer cases, and thusour simulation converges to second order. The numerical error is 103% except for the region
near the singularity.
Acknowledgment
DY would like to thank Hanno Sahlmann for the hospitality and helpful discussions during the
visit at Erlangen-Nurnberg University. DY, DH and BHL are supported by the National Research
3Of course, if we do not trust the philosophy of black hole complementarity, we do not need to require a firewall.
32
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
33/39
1 3 . 8 0 1 3 . 8 5 1 3 . 9 0 1 3 . 9 5 1 4 . 0 0 1 4 . 0 5
L
o
g
C
v = 5
v = 1 0
v = 1 5
Figure 11: The constraint function for = 0 .07.
0 2 4 6 8 1 0 1 2 1 4
u = 1 3 . 8 , L o g | r ( 1 x 1 ) - r ( 2 x 2 ) |
u = 1 3 . 8 , L o g 4 | r ( 2 x 2 ) ( 4 x 4 )
u = 1 3 . 8 5 , L o g | r ( 1 x 1 ) ( 2 x 2 )
u = 1 3 . 8 5 , L o g 4 | r ( 2 x 2 ) - r ( 4 x 4 ) |
u = 1 3 . 9 , L o g | r ( 1 x 1 ) - r ( 2 x 2 ) |
u = 1 3 . 9 , L o g 4 | r ( 2 x 2 ) - r ( 4 x 4 ) |
u = 1 4 . 1 , L o g | r ( 1 x 1 ) - r ( 2 x 2 ) |
u = 1 4 . 1 , L o g 4 | r ( 2 x 2 ) - r ( 4 x 4 ) |
Figure 12: Convergence tests for = 0.07.
33
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
34/39
Foundation of Korea(NRF) grant funded by the Korea government(MEST) through the Center
for Quantum Spacetime(CQUeST) of Sogang University with grant number 2005-0049409. DH is
supported by Korea Research Foundation grants (KRF-313-2007-C00164, KRF-341-2007-C00010)funded by the Korean government (MOEHRD) and BK21.
34
-
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
35/39
References
[1] S. W. Hawking, Phys. Rev. D 14, 2460 (1976).
[2] W. Israel, Phys. Rev. 164, 1776 (1967);
W. Israel, Commun. Math. Phys. 8, 245 (1968);
J. M. Bardeen, B. Carter and S. W. Hawking, Commun. Math. Phys. 31, 161 (1973).
[3] S. W. Hawking, Nature 248, 30 (1974);
S. W. Hawking, Commun. Math. Phys. 43, 199 (1975) [Erratum-ibid. 46, 206 (1976)].
[4] J. M. Maldacena, Adv. Theor. Math. Phys. 2, 231 (1998) [Int. J. Theor. Phys. 38, 1113
(1999)] [arXiv:hep-th/9711200];E. Witten, Adv. Theor. Math. Phys. 2, 253 (1998) [arXiv:hep-th/9802150];
S. S. Gubser, I. R. Klebanov and A. M. Polyakov, Phys. Lett. B 428, 105 (1998)
[arXiv:hep-th/9802109].
[5] C. R. Stephens, G. t Hooft and B. F. Whiting, Class. Quant. Grav. 11, 621 (1994)
[gr-qc/9310006].
[6] L. Susskind, L. Thorlacius and J. Uglum, Phys. Rev. D 48, 3743 (1993)
[arXiv:hep-th/9306069].
[7] L. Susskind and L. Thorlacius, Phys. Rev. D 49, 966 (1994) [arXiv:hep-th/9308100].
[8] D. Yeom and H. Zoe, Phys. Rev. D 78, 104008 (2008) [arXiv:0802.1625 [gr-qc]];
D. Yeom, Int. J. Mod. Phys. CS 1, 311 (2011) [arXiv:0901.1929 [gr-qc]].
[9] S. E. Hong, D. Hwang, E. D. Stewart and D. Yeom, Class. Quant. Grav. 27, 045014 (2010)
[arXiv:0808.1709 [gr-qc]].
[10] S. E. Hong, D. Hwang, D. Yeom and H. Zoe, JHEP 0812, 080 (2008) [arXiv:0809.1480 [gr-qc]];
D. Yeom and H. Zoe, arXiv:0811.1637 [gr-qc].
[11] X. H. Ge and Y. G. Shen, Class. Quant. Grav. 21, 1941 (2004);
X. H. Ge and Y. G. Shen, Chin. Phys. Lett. 21, 1413 (2004);
X. H. Ge and Y. G. Shen, Int. J. Mod. Phys. D 14, 1321 (2005) [arXiv:gr-qc/0503094].
[12] D. Yeom and H. Zoe, Int. J. Mod. Phys. A 26, 3287 (2011) [arXiv:0907.0677 [hep-th]].
35
http://arxiv.org/abs/hep-th/9711200http://arxiv.org/abs/hep-th/9802150http://arxiv.org/abs/hep-th/9802109http://arxiv.org/abs/gr-qc/9310006http://arxiv.org/abs/hep-th/9306069http://arxiv.org/abs/hep-th/9308100http://arxiv.org/abs/0802.1625http://arxiv.org/abs/0901.1929http://arxiv.org/abs/0808.1709http://arxiv.org/abs/0809.1480http://arxiv.org/abs/0811.1637http://arxiv.org/abs/gr-qc/0503094http://arxiv.org/abs/0907.0677http://arxiv.org/abs/0907.0677http://arxiv.org/abs/gr-qc/0503094http://arxiv.org/abs/0811.1637http://arxiv.org/abs/0809.1480http://arxiv.org/abs/0808.1709http://arxiv.org/abs/0901.1929http://arxiv.org/abs/0802.1625http://arxiv.org/abs/hep-th/9308100http://arxiv.org/abs/hep-th/9306069http://arxiv.org/abs/gr-qc/9310006http://arxiv.org/abs/hep-th/9802109http://arxiv.org/abs/hep-th/9802150http://arxiv.org/abs/hep-th/9711200 -
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
36/39
[13] P. Hayden and J. Preskill, JHEP 0709, 120 (2007) [arXiv:0708.4025 [hep-th]];
Y. Sekino and L. Susskind, JHEP 0810, 065 (2008) [arXiv:0808.2096 [hep-th]].
[14] A. Almheiri, D. Marolf, J. Polchinski and J. Sully, arXiv:1207.3123 [hep-th].
[15] R. Bousso, arXiv:1207.5192 [hep-th].
[16] Y. Nomura, J. Varela and S. J. Weinberg, arXiv:1207.6626 [hep-th].
[17] S. D. Mathur and D. Turton, arXiv:1208.2005 [hep-th].
[18] B. D. Chowdhury and A. Puhm, arXiv:1208.2026 [hep-th].
[19] L. Susskind, arXiv:1208.3445 [hep-th];
L. Susskind, arXiv:1210.2098 [hep-th].
[20] I. Bena, A. Puhm and B. Vercnocke, arXiv:1208.3468 [hep-th].
[21] T. Banks and W. Fischler, arXiv:1208.4757 [hep-th].
[22] A. Ori, arXiv:1208.6480 [gr-qc].
[23] A. Borde, Phys. Rev. D 55, 7615 (1997) [arXiv:gr-qc/9612057];
E. Ayon-Beato and A. Garcia, Phys. Lett. B 464, 25 (1999) [arXiv:hep-th/9911174];
A. Bogojevic and D. Stojkovic, Phys. Rev. D 61, 084011 (2000) [arXiv:gr-qc/9804070];
I. Dymnikova, Class. Quant. Grav. 19, 725 (2002) [arXiv:gr-qc/0112052];
S. A. Hayward, Phys. Rev. Lett. 96, 031103 (2006) [arXiv:gr-qc/0506126];
K. A. Bronnikov and J. C. Fabris, Phys. Rev. Lett. 96, 251101 (2006) [arXiv:gr-qc/0511109];
K. A. Bronnikov, V. N. Melnikov and H. Dehnen, Gen. Rel. Grav. 39, 973 (2007)
[arXiv:gr-qc/0611022];
I. Dymnikova and E. Galaktionov, Phys. Lett. B 645, 358 (2007);
S. Ansoldi, [arXiv:0802.0330].
[24] T. Piran and A. Strominger, Phys. Rev. D 48, 4729 (1993) [arXiv:hep-th/9304148];
R. Parentani and T. Piran, Phys. Rev. Lett 73, 2805 (1994) [arXiv:hep-th/9405007];
T. Chiba and J. Soda, Prog. Theor. Phys. 96, 567 (1996) [arXiv:gr-qc/9603056];
S. Ayal and T. Piran, Phys. Rev. D 56, 4768 (1997) [arXiv:gr-qc/9704027];
S. Hod and T. Piran, Phys. Rev. Lett 81, 1554 (1998) [arXiv:gr-qc/9803004];
S. Hod and T. Piran, Gen. Rel. Grav. 30, 1555 (1998) [arXiv:gr-qc/9902008];
E. Sorkin and T. Piran, Phys. Rev. D 63, 084006 (2001) [arXiv:gr-qc/0009095];
E. Sorkin and T. Piran, Phys. Rev. D 63, 124024 (2001) [arXiv:gr-qc/0103090];
36
http://arxiv.org/abs/0708.4025http://arxiv.org/abs/0808.2096http://arxiv.org/abs/1207.3123http://arxiv.org/abs/1207.5192http://arxiv.org/abs/1207.6626http://arxiv.org/abs/1208.2005http://arxiv.org/abs/1208.2026http://arxiv.org/abs/1208.3445http://arxiv.org/abs/1210.2098http://arxiv.org/abs/1208.3468http://arxiv.org/abs/1208.4757http://arxiv.org/abs/1208.6480http://arxiv.org/abs/gr-qc/9612057http://arxiv.org/abs/hep-th/9911174http://arxiv.org/abs/gr-qc/9804070http://arxiv.org/abs/gr-qc/0112052http://arxiv.org/abs/gr-qc/0506126http://arxiv.org/abs/gr-qc/0511109http://arxiv.org/abs/gr-qc/0611022http://arxiv.org/abs/0802.0330http://arxiv.org/abs/hep-th/9304148http://arxiv.org/abs/hep-th/9405007http://arxiv.org/abs/gr-qc/9603056http://arxiv.org/abs/gr-qc/9704027http://arxiv.org/abs/gr-qc/9803004http://arxiv.org/abs/gr-qc/9902008http://arxiv.org/abs/gr-qc/0009095http://arxiv.org/abs/gr-qc/0103090http://arxiv.org/abs/gr-qc/0103090http://arxiv.org/abs/gr-qc/0009095http://arxiv.org/abs/gr-qc/9902008http://arxiv.org/abs/gr-qc/9803004http://arxiv.org/abs/gr-qc/9704027http://arxiv.org/abs/gr-qc/9603056http://arxiv.org/abs/hep-th/9405007http://arxiv.org/abs/hep-th/9304148http://arxiv.org/abs/0802.0330http://arxiv.org/abs/gr-qc/0611022http://arxiv.org/abs/gr-qc/0511109http://arxiv.org/abs/gr-qc/0506126http://arxiv.org/abs/gr-qc/0112052http://arxiv.org/abs/gr-qc/9804070http://arxiv.org/abs/hep-th/9911174http://arxiv.org/abs/gr-qc/9612057http://arxiv.org/abs/1208.6480http://arxiv.org/abs/1208.4757http://arxiv.org/abs/1208.3468http://arxiv.org/abs/1210.2098http://arxiv.org/abs/1208.3445http://arxiv.org/abs/1208.2026http://arxiv.org/abs/1208.2005http://arxiv.org/abs/1207.6626http://arxiv.org/abs/1207.5192http://arxiv.org/abs/1207.3123http://arxiv.org/abs/0808.2096http://arxiv.org/abs/0708.4025 -
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
37/39
Y. Oren and T. Piran, Phys. Rev. D 68, 044013 (2003) [arXiv:gr-qc/0306078];
J. Hansen, A. Khokhlov and I. Novikov, Phys. Rev. D 71, 064013 (2005)
[arXiv:gr-qc/0501015];A. Doroshkevich, J. Hansen, I. Novikov and A. Shatskiy, arXiv:0812.0702 [gr-qc];
P. P. Avelino, A. J. S. Hamilton and C. A. R. Herdeiro, Phys. Rev. D 79, 124045 (2009)
[arXiv:0904.2669 [gr-qc]];
A. Doroshkevich, J. Hansen, D. Novikov, I. Novikov and A. Shatskiy, Phys. Rev. D 81, 124011
(2010) [arXiv:0908.1300 [gr-qc]];
A. Borkowska, M. Rogatko and R. Moderski, Phys. Rev. D 83, 084007 (2011) [arXiv:1103.4808
[hep-th]];
A. Nakonieczna, M. Rogatko and R. Moderski, Phys. Rev. D 86, 044043 (2012)
[arXiv:1209.1203 [hep-th]];
A. Nakonieczna and M. Rogatko, arXiv:1209.3614 [hep-th].
[25] J. Hansen, D. Hwang and D. Yeom, JHEP 0911, 016 (2009) [arXiv:0908.0283 [gr-qc]];
D. Yeom, arXiv:0912.0068 [gr-qc];
D. Hwang and D. Yeom, Class. Quant. Grav. 28, 155003 (2011) [arXiv:1010.3834 [gr-qc]];
B. -H. Lee and D. Yeom, arXiv:1111.0139 [gr-qc].
[26] D. Hwang and D. Yeom, Class. Quant. Grav. 27, 205002 (2010) [arXiv:1002.4246 [gr-qc]];
D. Hwang and D. Yeom, Phys. Rev. D 84, 064020 (2011) [arXiv:1010.2585 [gr-qc]];
D. Hwang, H. -B. Kim and D. Yeom, Class. Quant. Grav. 29, 055003 (2012) [arXiv:1105.1371
[gr-qc]];
D. Hwang, B. -H. Lee and D. Yeom, JCAP 1112, 006 (2011) [arXiv:1110.0928 [gr-qc]];
D. Hwang, B. -H. Lee, W. Lee and D. Yeom, JCAP 1207, 003 (2012) [arXiv:1201.6109 [gr-qc]].
[27] S. W. Hawking, Commun. Math. Phys. 25, 152 (1972).
[28] J. D. Bekenstein, Phys. Rev. D 7, 2333 (1973);
J. D. Bekenstein, Phys. Rev. D 9, 3292 (1974).
[29] C. G. Callan and J. M. Maldacena, Nucl. Phys. B 472, 591 (1996) [arXiv:hep-th/9602043].
[30] A. Strominger and C. Vafa, Phys. Lett. B 379, 99 (1996) [arXiv:hep-th/9601029].
[31] D. N. Page, Phys. Rev. Lett. 71, 1291 (1993) [arXiv:gr-qc/9305007].
[32] D. N. Page, Phys. Rev. Lett. 71, 3743 (1993) [arXiv:hep-th/9306083].
[33] S. Lloyd and H. Pagels, Annals Phys. 188, 186 (1988).
37
http://arxiv.org/abs/gr-qc/0306078http://arxiv.org/abs/gr-qc/0501015http://arxiv.org/abs/0812.0702http://arxiv.org/abs/0904.2669http://arxiv.org/abs/0908.1300http://arxiv.org/abs/1103.4808http://arxiv.org/abs/1209.1203http://arxiv.org/abs/1209.3614http://arxiv.org/abs/0908.0283http://arxiv.org/abs/0912.0068http://arxiv.org/abs/1010.3834http://arxiv.org/abs/1111.0139http://arxiv.org/abs/1002.4246http://arxiv.org/abs/1010.2585http://arxiv.org/abs/1105.1371http://arxiv.org/abs/1110.0928http://arxiv.org/abs/1201.6109http://arxiv.org/abs/hep-th/9602043http://arxiv.org/abs/hep-th/9601029http://arxiv.org/abs/gr-qc/9305007http://arxiv.org/abs/hep-th/9306083http://arxiv.org/abs/hep-th/9306083http://arxiv.org/abs/gr-qc/9305007http://arxiv.org/abs/hep-th/9601029http://arxiv.org/abs/hep-th/9602043http://arxiv.org/abs/1201.6109http://arxiv.org/abs/1110.0928http://arxiv.org/abs/1105.1371http://arxiv.org/abs/1010.2585http://arxiv.org/abs/1002.4246http://arxiv.org/abs/1111.0139http://arxiv.org/abs/1010.3834http://arxiv.org/abs/0912.0068http://arxiv.org/abs/0908.0283http://arxiv.org/abs/1209.3614http://arxiv.org/abs/1209.1203http://arxiv.org/abs/1103.4808http://arxiv.org/abs/0908.1300http://arxiv.org/abs/0904.2669http://arxiv.org/abs/0812.0702http://arxiv.org/abs/gr-qc/0501015http://arxiv.org/abs/gr-qc/0306078 -
7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733
38/39
[34] S. Sen, Phys. Rev. Lett. 77, 1 (1996) [arXiv:hep-th/9601132].
[35] D. A. Lowe and L. Thorlacius, Phys. Rev. D 73, 104027 (2006) [arXiv:hep-th/0601059].
[36] K. S. Thorne, R. H. Price and D. A. Macdonald, Black holes: The membrane paradigm,
Yale University Press (1986).
[37] G. Dvali, Fortsch. Phys. 58, 528 (2010) [arXiv:0706.2050 [hep-th]];
G. Dvali, M. Redi, S. Sibiryakov and A. Vainshtein, Phys. Rev. Lett. 101, 151603 (2008)
[arXiv:0804.0769 [hep-th]];
R. Brustein, G. Dvali and G. Veneziano, JHEP 0910, 085 (2009) [arXiv:0907.5516 [hep-th]].
[38] S. D. Mathur, Fortsch. Phys. 53, 793 (2005) [hep-th/0502050].
[39] A. Ashtekar and B. Krishnan, Living Rev. Rel. 7, 10 (2004) [arXiv:gr-qc/0407042].
[40] S. W. Hawking and G. F. R. Ellis, The large scale structure of space-time, Cambridge
University Press (1973).
[41] E. Poisson and W. Israel, Phys. Rev. Lett. 63, 1663 (1989);
E. Poisson and W. Israel, Phys. Rev. D 41, 1796 (1990).
[42] V. P. Frolov, M. A. Markov and V. F. Mukhanov, Phys. Rev. D 41, 383 (1990).
[43] R. Balbinot and E. Poisson, Phys. Rev. D 41, 395 (1990).
[44] K. M. Lee and E. J. Weinberg, Phys. Rev. D 36, 1088 (1987).
[45] B. Freivogel, V. E. Hubeny, A. Maloney, R. C. Myers, M. Rangamani and S. Shenker, JHEP
0603, 007 (2006) [arXiv:hep-th/0510046].
[46] H. Kim, B. -H. Lee, W. Lee, Y. J. Lee and D. Yeom, Phys. Rev. D 84, 023519 (2011)
[arXiv:1011.5981 [hep-th]].
[47] P. C. W. Davies, S. A. Fulling and W. G. Unruh