is the firewall consistent - gedanken experiments on black hole complementarity and firewall...

Upload: forizsl

Post on 02-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    1/39

    arXiv:1210.6733v

    1

    [gr-qc]25Oct2012

    Is the firewall consistent?

    Gedanken experiments on black hole complementarity and firewall proposal

    Dong-il Hwanga,b, Bum-Hoon Leeb, and Dong-han Yeomb

    aDepartment of Physics, KAIST, Daejeon 305-701, Republic of Korea

    bCenter for Quantum Spacetime, Sogang University, Seoul 121-742, Republic of Korea

    October 26, 2012

    Abstract

    In this paper, we critically discuss black hole complementarity and the firewall proposal.

    Black hole complementarity is inevitable, if we assume the five contents: unitarity, entropy-area

    formula, existence of information observer, semi-classical quantum field theory for asymptotic

    observer, and general relativity for in-falling observer. However, large N rescaling and AMPS

    argument show that black hole complementarity is inconsistent. To rescue the basic philosophy

    of black hole complementarity, AMPS introduce a firewall around the horizon. According to

    large N rescaling, the firewall should be close to the apparent horizon.

    We investigate the consistency of the firewall regarding two conditions: the firewall should

    be near the time-like apparent horizon and the firewall should not affect to future infinity.

    Regarding this, the authors introduce a gravitational collapse with a false vacuum lump. It can

    generate a spacetime structure with disconnected apparent horizons. This reveals a situation

    that there is a firewall outside of the event horizon, while the apparent horizon is absent.

    Therefore, the firewall, if it exists, does not only modify general relativity for an in-falling

    observer, but also modify semi-classical quantum field theory for an asymptotic observer.

    [email protected]@sogang.ac.kr

    [email protected]

    1

    http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1http://arxiv.org/abs/1210.6733v1
  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    2/39

    Contents

    1 Introduction 3

    2 Black hole information loss problem 4

    2.1 Why black hole complementarity? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    2.1.1 Entropy of black holes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    2.1.2 Information emission from black holes . . . . . . . . . . . . . . . . . . . . . . 5

    2.1.3 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

    2.1.4 Duplication experiment and black hole complementarity . . . . . . . . . . . . 7

    2.2 Inconsistency of old black hole complementarity . . . . . . . . . . . . . . . . . . . . 10

    2.2.1 Large N rescaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    2.2.2 Duplication experiment outside of the event horizon . . . . . . . . . . . . . . 13

    2.2.3 AMPS argument and firewall controversy . . . . . . . . . . . . . . . . . . . . 15

    2.2.4 Is the firewall-singularity consistent? . . . . . . . . . . . . . . . . . . . . . . . 18

    3 Gravitational collapses with a false vacuum lump 19

    3.1 Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    3.1.1 Regular black hole models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    3.1.2 Justification of physical possibility . . . . . . . . . . . . . . . . . . . . . . . . 203.2 Numerical setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    3.2.1 Double-null formalism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    3.2.2 Initial conditions and integration schemes . . . . . . . . . . . . . . . . . . . . 24

    3.3 Causal structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    3.4 Gedanken experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    3.4.1 Duplication experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

    3.4.2 Where is the firewall? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    3.4.3 Violation of cosmic censorship? . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    3.4.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    4 Discussion 31

    2

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    3/39

    1 Introduction

    The black hole information loss problem [1] is the deep and important issue that is related to

    quantum gravity. From the discussion of classical [2] and semi-classical [3] analysis, we understand

    that a stationary black hole only has three information: mass M, charge Q, and angular momentum

    J. After the black hole evaporates, what will happen for the other quantum information? If it cannot

    be restored by Hawking radiation, then we see a violation of unitarity and we lose fundamental

    predictability. Otherwise, if it can be restored by Hawking radiation, how can we sure about this

    and how can we restore the information?

    After string theorists found the AdS/CFT correspondence [4], people could sure unitarity of

    black hole physics, since the bulk gravitational dynamics should correspond the boundary conformal

    field theory and the boundary conformal field theory should be unitary. However, this still remains

    a question: how Hawking radiation can contain information and is it consistent in principle?

    For this issue in fact, before the discovery of AdS/CFT some people had begun to consider

    the consistency of unitarity. Especially, Stephens, tHooft and Whiting [5] and Susskind, Thorlacius

    and Uglum [6] contributed this problem and named holographic principle and black hole comple-

    mentarity. According to black hole complementarity, it is reasonable to think that the asymptotic

    observer and the in-falling observer of a black hole should satisfy natural laws. Then semi-classical

    and unitary quantum field theory should be a good description for the asymptotic observer, whilegeneral relativity should be a good description for the in-falling observer. Then, it seems to be

    contradictory, since both observers maintain their information and hence information seemed to be

    copied: one is inside of the event horizon, while the other is outside of the event horizon. However,

    still black hole complementarity and natural laws for all observers are consistent, since two observers

    cannot communicate [7]. Therefore, although a black hole violates a natural law (the no-cloning

    theorem), if there is no witness, then it is innocent a perfect crime.

    However, recently, people asked questions on the consistency of black hole complementarity.

    The duplication of information can be observed by regular black holes [8] or charged black holes

    [9, 10, 11], if we assume a large number of scalar fields that contribute to Hawking radiation.

    Moreover, if we have a large number of scalar fields, then black hole complementarity can be

    violated even for a Schwarzschild black hole [12]. The required number of scalar field can be

    reduced to a sufficiently reasonable number, if we consider the scrambling time [13]. The asymptotic

    observer and the in-falling observer can communicate inside of the black hole and hence black hole

    complementarity seems to be inconsistent.

    Furthermore, Almheiri, Marolf, Polchinski and Sully (AMPS) [14] discussed the inconsistency

    3

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    4/39

    of black hole complementarity from a different argument. They could show that a quantum state,

    that satisfies classical general relativity for an in-falling observer and that satisfies unitary quantum

    field theory for an asymptotic observer, cannot be consistent. Therefore, it seems that black holecomplementarity is inconsistent not only inside, but also outside of the black hole. To maintain

    original philosophy of black hole complementarity, AMPS suggested the firewall proposal. Now

    there are interesting controversy regarding the firewall [15, 16, 17, 18, 19, 20, 21, 22].

    In this context, the authors suggest an interesting toy model for gedanken experiments. We

    consider a gravitational collapse with a false vacuum lump. This is inspired from regular black hole

    models [8, 23], although it does not necessarily regular (free from singularity) for our purposes.

    This model is interesting, since the singularity and horizon structures are non-trivial. We can ask

    how to define the duplication experiment, how to define the firewall, and whether the firewall can

    rescue black hole complementarity even for this complicated case.

    In Section 2, we concisely summarize the black hole information loss problem, motivations

    and assumptions of black hole complementarity, and the duplication experiment. In addition, we

    discuss two important inconsistency arguments for black hole complementarity: large N rescaling

    [12] and the AMPS argument [14]. In Section 3, we discuss gravitational collapses with a false

    vacuum lump, using the double-null numerical simulations [9, 24, 25, 26]. We analyze the details of

    causal structures and discuss some thought experiments relating black hole complementarity and

    the firewall proposal. Finally, in Section 4, we summarize and interpret our results.

    2 Black hole information loss problem

    In this section, we first discuss why people trust black hole complementarity. This is related the

    analysis with entropy and information of black holes. We clarify the assumptions of black hole

    complementarity and the consistency check through the duplication experiment. Second, we discuss

    two counter arguments on black hole complementarity: large N rescaling and the AMPS argument.

    In addition, we discuss the resolution of AMPS, the firewall proposal, and summarize the recent

    status of the controversy.

    2.1 Why black hole complementarity?

    2.1.1 Entropy of black holes

    The first remarkable issue on the information loss problem is the entropy. From the classical

    discussion of a black hole, people observed thermodynamics of black holes. From the first law of

    black hole thermodynamics [2] and the area increasing law [27], Bekenstein thought that the horizon

    4

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    5/39

    area is proportional to the thermal entropy [28]. The temperature formula came from the quantum

    effects around the horizon [3]. This entropy is just the thermal entropy, since they first calculated

    the temperature and second defined the entropy dSth = dQ/T, where dQ is the difference of heat.The natural question is then whether it is not only the thermal entropy but also the statistical

    entropy, Sst = log , where is the number of accessible states.

    Among string theorists, it is believed that the area is not only thermal entropy but also statistical

    entropy. Some authors could find a dual of a black hole using D-brane combinations [ 29]. It is known

    that for certain extreme limits with supersymmetry, the entropy of the weak coupling limit is the

    same as that of the strong coupling limit. Researchers found some combinations of D-branes that

    gives black hole solutions and could calculate the entropy of the weak coupling limit [30]. The

    entropy could be exactly matched to the entropy formula for some extreme cases.

    Therefore, although there is no formal proof on the thermal and statistical entropy relation,

    A

    4= log , (1)

    there are some evidences on this relation and hence we will accept this and see their consequences.

    2.1.2 Information emission from black holes

    Let us specify the information emission from a black hole [31, 32]. Let us consider a system with a

    number of degrees of freedom m n and divide two subsystems, A (inside of a black hole) and B(outside of a black hole), where A has a number of degrees of freedom n and B has m. Note that

    m and n can vary with time, although m n should be conserved. We think that initially m = 1and, as time goes on, n decreases and m increases.

    Here, the mutual information between A and B, that is, the information that B and A share,

    or in other words, information of A that can be seen by B, is I(B : A) = S(B) S(B|A), whereS(B) = log m is the statistical entropy of B and S(B|A) is the entanglement entropy that is definedby the formula: is the density matrix of the total system and

    B trA, (2)

    S(B|A) = trB log B . (3)

    In many contexts, people call S(A) or S(B) as coarse-grained entropy of A and B, while S(A|B)or S(B|A) as fine-grained entropy between A and B [33].

    We can further calculate by assuming that the total system is pure and random. Page conjec-

    5

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    6/39

    f

    informationcoarse-grained entropy

    fine-grained entropy

    11/2

    Figure 1: Emission of information, where f is the fraction of the escaped coarse-grained entropy to

    the original coarse-grained entropy.

    tured the following formula [31] and soon after it was proven [34]: if 1 m n, then

    S(B|A) =mn

    k=n+1

    1

    k m 1

    2n(4)

    = log m m2n

    . (5)

    Therefore, initially, information is emitted

    = m/2n, and it is negligible. If m > n, since S(B

    |A) =

    S(A|B) for a pure state,

    S(B|A) =mn

    k=m+1

    1

    k n 1

    2m(6)

    = log n n2m

    . (7)

    Therefore, after n becomes greater than m, the emitted information is = log m log n + n/2m, andit gradually increases (Figure 1).

    As a conclusion, a system A begins to emit information to B when its coarse-grained entropy

    decreases its half value (m = n). Before that time, emitted particles may not have sufficient

    information. However, after that time, the original information cannot be compressed to A and the

    information of A has to be transferred to B by the emitted particles.

    2.1.3 Assumptions

    Let us assume the following contents:

    Assumption 1. Unitarity: The black hole dynamics is unitary for the asymptotic observer.

    6

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    7/39

    Assumption 2. Entropy: A/4 = log , where A is the area of the black hole and is the number

    of accessible states.

    Assumption 3. Existence of observer: There is an observer who can read information from

    the black hole.

    In addition, we further assume the reliability of local quantum field theory and general relativity

    as methodological assumptions:

    Assumption 4. For asymptotic observer: The semi-classical method is a good description for

    the asymptotic observer.

    Assumption 5. For in-falling observer: General relativity is a good description for the in-falling observer.

    If we assume the results of the previous two subsections (Assumption 1 and Assumption 2) so

    that A/4 = log and a black hole begins to emit information when log (1/2) log , then wecan conclude that the black hole begins to emit information when its area decreases to the half of

    the initial value. This time scale is the order of the lifetime of a black hole M3: this time is calledby the information retention time [7]. In many cases, the black hole can be still semi-classical,

    i.e., even though the area of the black hole decreased to half its value, the black hole is still large

    enough. Then, the only way to take out information from the large black hole is Hawking radiation.

    Therefore, information should be emitted by Hawking radiation.

    2.1.4 Duplication experiment and black hole complementarity

    Let us think of a specific situation (Figure 2) [7] and consider a series of experiments in which a

    pair of correlated spins are created outside of the event horizon. One of the pair that falls into the

    black hole is a and the other of the pair that is outside of the black hole is b. If Hawking radiation

    contains information, then information about a can be emitted by Hawking radiation, and we call it

    h. According to Assumption 3, if there is an observer who can measure the state of h, falls into the

    black hole, and measures the state of a, then eventually we will know that the collected information

    a and h are both correlated to b. This implies that the observer sees the duplication of states,

    which is disallowed by quantum mechanics. We will call this kind of experiment as a duplication

    experiment.

    Susskind and Thorlacius [7] could answer questions on the duplication experiment. If the ob-

    server sees both a and h, the observer has to wait until the information retention time. However,

    if the original free-falling information a touches the singularity of the black hole, then there is no

    7

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    8/39

    singularity

    event horizon

    a

    b

    hobser

    ver

    messa

    ge

    t

    Figure 2: The duplication experiment. a and b are a pair of correlated spins. The observer sees h,

    which is a copy of a after the information retention time via Hawking radiation. To see a, a should

    be sent to the out-going direction after the time t. If the observer sees both a and h, since they

    are both correlated to b, it violates the no-cloning theorem and unitarity.

    hope to see the duplication. To see the duplication, the free-falling information a should be sent to

    the out-going direction during the time t.

    We can estimate the time t in the Schwarzschild space-time:

    ds2 =

    1 2Mr

    dt2 +

    1 2M

    r

    1dr2 + r2d2. (8)

    The horizon is rh = 2M and the Hawking temperature is on the order of T 1/M. Therefore, thelifetime is M3.

    For the next calculation, we will comment on a simple extension to Kruskal-Szekeres coordinates

    [7, 35]. We can neglect the angular part without loss of generality and we assume the form

    ds2 = F(R) R2d2 + dR2 . (9)

    To compare the original metric, the following definitions are reasonable:

    d2 =dt2

    r2h, (10)

    R2F(R) = r2h

    1 2M

    r

    , (11)

    F(R)dR2 =

    1 2M

    r

    1dr2. (12)

    In terms of the coordinate R, the singularity occurs at R2 =

    r2h; and the horizon occurs at R = 0.

    8

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    9/39

    Now, we can choose another metric and coordinates (U, V) by

    V = Re, (13)

    U = Re, (14)

    ds2 = F(R)dUdV. (15)

    Here, the singularity is U V = r2h.

    Now, we can state the condition of a duplication experiment in a Schwarzschild black hole. The

    first observer falls into a black hole and sends a signal to the out-going direction around time t.

    Now assume that a second observer hovers above the horizon at a distance of the order of the Planck

    length lPl and jumps into the black hole at the information retention time . Then, the initiallocation of the second observer is V = Re, where R lPl and /rh. Before touching thesingularity, the second observer will spend time (in terms ofU) around r2h/V since the singularityis U V = r2h. Therefore, the first observer should send a signal around the time t e/rh. Hence,the duplication may be observed if one can send a signal between the time

    t exp rh exp

    M, (16)

    where is the information retention time.

    Then, to send a quantum bit during t, it has to satisfy the uncertainty relation tE 1.

    The required energy to send a quantum bit of information during t is exp M2, which is greaterthan the original mass of the black hole M. Therefore, the duplication experiment seems to be

    improbable in real situations [7].

    According to Susskind and Thorlacius, although information is duplicated, if no observer can see

    the violation of the natural laws, there is no problem. In other words, there is no global description

    for both an in-falling observer and an asymptotic observer and we have to choose one of them. In

    this sense, two observers are complementary. This principle is known by black hole complementarity

    or observer complementarity [6].

    Black hole complementarity is consistent with two paradigms: the membrane paradigm [36] and

    the D-brane picture [29]. The membrane paradigm is to see a black hole as a membrane around

    the event horizon, the so-called stretched horizon. If we send an object to a black hole, the object

    is stretched and scrambled on the horizon. The outside observer cannot see the disappearance of

    the object beyond the horizon. Therefore, for the outside observer, information is on the horizon

    and eventually escapes from the black hole via Hawking radiation. The scrambling on the stretched

    horizon occurs in the following order of time:

    scr Mlog M, (17)

    9

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    10/39

    and this time is called the scrambling time. According to Hayden and Preskill [13], after a black

    hole approaches the information retention time, if one sends bits of information, this information

    will quickly escape the black hole after the scrambling time. Note that even though we considerthe scrambling time, the consistency relation still holds: from Equation 16, we find that to see the

    duplication, E M > M is required. Therefore, people believed that black hole complementarityis marginally true, even with the scrambling time.

    2.2 Inconsistency of old black hole complementarity

    Now we introduce two important arguments against the original version of black hole complemen-

    tarity. One is large N rescaling [12] and the other is the AMPS argument [14].

    2.2.1 Large N rescaling

    Let us assume that G = c = 1 and remain explicitly. Then, all length, mass, and time dimensions

    are the same. In this subsection, we will change the number of massless scalar fields N and hence

    we scale the strength of Hawking radiation. We assume that there is one field that contributes to

    form a black hole; the other N number of fields are not used to form a black hole, while they only

    contribute to Hawking radiation.

    First, let us assume N = 1. Then the semi-classical equations of motions (up to ) are as follows:

    G = 8(T + T), (18)

    ;abgab = 0, (19)

    where is a scalar field that is used to form a black hole.

    Now we define the re-scaling using the following rule: if a quantity X which does not explicitly

    depend on has a dimension [X] = L with a certain number , we define a re-scaled X by

    X =

    NX. (20)

    Then, we claim that if we re-scale all possible quantities, then the re-scaled quantities are solutions

    of the following equation:

    G = 8(T + NT), (21)

    ;abgab = 0. (22)

    This is easy to check: G has a dimension L2, T has a dimension L2, and T has a

    dimension L4 in the one-loop order. Hence, G = G/N, T = T/N, and

    T

    =

    T

    /N2.

    10

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    11/39

    Then,

    G = N G = 8(T +

    T

    ) = 8(N T + N

    2

    T

    ), (23)

    and our claim is proved. Also, it is easy to check the same relation for the Klein-Gordon equation

    for the scalar field .

    In conclusion, for given quantities of solutions of Equation (18), the re-scaled quantities are

    solutions of Equation (21) with N massless fields. Three important remarks of large N rescaling

    are noted here.

    Conformal invariance of the causal structure: The re-scaling conserves the causal structure

    of the metric, since it scales the unit length and the unit time at the same time. Therefore,

    we can use the same Penrose diagram of the N = 1 case.

    Semi-classicality: If we can prepare a sufficiently large N universe, even if a region has a large

    curvature in the N = 1 case (in Planck units), we can find a universe where the curvature

    is re-scaled to a sufficiently smaller value (in Planck units). Therefore, the large N rescaling

    makes the results trustable in the semi-classical sense.

    Generalization of other matter fields: We can generalize for more complicated matter fields:

    e.g., complex scalar field, complicated potential, etc. For these cases, we have to rescale

    coupling constants when we vary the number of scalar fields. As long as the coupling constants

    are free parameters of the theory, we think that this is allowed in principle.

    Let us apply the large N rescaling to the information retention time and the scrambling time.

    Information retention time: We re-scale all length, mass, and time parameters by

    N. Now,

    the information retention time for the mass M and the single field case is re-scaled to for

    the mass M =

    N M and large N, where

    M3, (24) M

    3

    N=

    (

    NM)3

    N=

    N M3. (25)

    Here, we have to divide the lifetime by N, since there are N-independent fields that contribute

    to Hawking radiation. Note that the size rh will be re-scaled by rh =

    N rh. Therefore, under

    the large N re-scaling, the ratio between the temporal size and the spatial size is invariant:

    rh=

    rh. (26)

    11

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    12/39

    Note that, although /rh is invariant under the large N rescaling, each conformaly equivalent

    distances should be stretched via

    N factor. Therefore, in general, in the N = 1 limit, the

    duplication may be observed if one can send a signal between the time

    t exp rh exp

    M, (27)

    where is the information retention time ( M3). On the other hand, in the large N re-scaledcase,

    t

    Nexp

    rh

    Nexp M

    . (28)

    From the uncertainty relation, the required energy becomes

    E 1N

    exp

    M, (29)

    and since the consistency of complementarity requires E > M =

    N M, the consistency

    condition becomes

    exp M2 > NM. (30)

    This condition can be violated by assuming a sufficiently large N exp M2 [8, 9, 10].

    Scrambling time: The scrambling time is Mlog M Mlog S, where S is the entropy ofthe black hole [13]. Then, in fact, the re-scaling is for Mlog S/, and hence, the re-scaling is

    N MlogNM. Then, in a large N universe, the time scale becomes

    t

    Nexp

    Mlog

    N M

    M

    Nexp log

    N M

    . (31)

    From the uncertainty relation, the required energy becomes

    E 1N

    exp log

    N M. (32)

    Since the consistency of complementarity requires E > N M, the consistency conditionbecomes

    M >

    NM. (33)

    Of course, this condition can be violated by assuming a sufficiently large N [8, 12].

    In this sense, the black hole complementarity principle can be violated even if we consider a

    Schwarzschild black hole. The required number of scalar field can be reasonably small, if we

    consider the scrambling time.

    12

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    13/39

    Even though we do not consider the scrambling time and only consider the information retention

    time, still we can believe that black hole complementarity is inconsistent. Although the required

    number of scalar fields is exponentially large, it is not infinite and hence it can be allowed by stringtheory in principle [37]. There are some typical doubts due to misunderstandings on the large N

    rescaling and we can answer on them:

    1. People think that the large N induces strong Hawking radiation and hence the black hole

    evaporates too quickly to be semi-classical [37]. However, it is not true. We increase not only

    the strength of the Hawking radiation, but also the size of the black hole at the same time.

    Dvali suggested that the semi-classical black hole should be larger than

    N: in other words,

    M >

    N. In our discussions, M

    1 and, by the rescaling, M =

    NM

    N always hold.

    Therefore, for the large N limit, the back-reactions from the Hawking radiation decrease and

    the lifetime of the black hole increases.

    2. People worry the higher order quantum corrections when we include a large number of scalar

    fields. This is a reasonable concern, but our attention is not the general gravitational system,

    but a very special situation that can be allowed in principle. So, the proper worry is whether

    the large N inevitably require strong quantum correction effects or not. The answer is it

    may be not, in principle. First of all, all the curvature corrections will be suppressed via

    the rescaling. Second, higher loop corrections of the matter fields depend on their couplings.

    If we assume that N scalar fields are independent each other, then the higher order terms

    will be reasonably suppressed, since it is proportional to N2, while this can be sufficiently

    smaller compared to the term N. If this assumption is in principle possible, then it is a good

    playground to test the consistency of black hole complementarity, unless we find a fundamental

    limitation on this assumption.

    2.2.2 Duplication experiment outside of the event horizon

    Up to this paragraph, we ignored the contribution of the subexponential factor for t. Note that

    for an evaporating black hole, the apparent horizon is outside of the event horizon. Therefore, the

    duplication experiment can be done not only inside but also outside of the event horizon. To see

    the duplication outside of the black hole, the in-falling information should send the message to the

    out-going direction between the new time scale U. In general, we expect U t, and thedifference comes from the subexponential factor.

    Let us discuss the details. Let us assume that the black hole mass is initially M1 and, as time

    goes on, it shrinks to M2

    after a time scale . Now let us define a duplication observer who maintains

    13

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    14/39

    singularity

    eventhorizon

    a h

    obse

    rver

    message

    tU

    Figure 3: The duplication experiment outside of the event horizon. a is the in-going information

    and send a signal to the out-going direction. This can be both of inside and the outside of the event

    horizon. To see a inside of the event horizon, a should be sent to the out-going direction after the

    time t, while to see outside of the event horizon, a should be sent after the time U.

    its radius around r1 = 2M1 until the time and eventually falls to r2 + lPl 2M2 (still outside ofthe event horizon) along the in-going null direction around the time .

    Then, we should calculate the difference of the coordinate U between two points (V

    , r = r1)

    and (V , r r2) (Figure 3). The coordinate is approximately the same: /r2 for bothpoints. In addition, the R coordinates are

    R = M

    r 2M

    2M

    1/2exp

    r

    4M(34)

    by using a simple coordinate transformation. Therefore, U = R exp and hence approxi-mately

    U

    M2Mexp

    r2

    , (35)

    where M is the decreased mass due to the evaporation during the time .

    Note that, in Equation (16), we omit the sub-exponential factor where the factor is approxi-

    mately M22 . Of course, in principle we can restore and compare with the sub-exponential factor of

    Equation (35), and in general the latter is shorter than the former:

    U

    t

    M2M

    M22 1. (36)

    Therefore, it is easier to see the duplication not outside but inside of the black hole. However, the

    duplication experiment is dominated by the exponential factor, and two time scales share the same

    14

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    15/39

    exponential factor. Hence, the required N for the successful duplication experiment is similar for

    both cases.

    Outside of event horizon considering the information retention time: Here, M = M1M2

    2 1M2. Therefore, using the same argument of the previous part, the duplication

    experiment is possible even outside of the event horizon, as long as N exp M2 scalar fields

    are in principle possible.

    Outside of event horizon considering the scrambling time: With the scrambling time, we

    can also define the duplication experiment outside of the event horizon. Here, M scr/M22 .After the large N rescaling and apply the uncertainty relation, the required energy E is

    E 1log M2

    1N

    exp log

    N M2. (37)

    The duplication experiment is possible even outside of the event horizon, if E 1

    log M2. (38)

    Note that if we carefully compare with the previous paragraph, the condition to see a dupli-

    cation inside of the horizon was N > 1/M4. Therefore, to see the duplication outside of the

    event horizon, we need more N than the case to see inside of the event horizon; however, in

    any case, the duplication observation requires a reasonable number of scalar fields1.

    In conclusion, if there is a sufficiently large number of scalar fields, then the duplication experi-

    ment is possible not only inside but also outside of the event horizon. Therefore, to prevent such a

    duplication experiment, the in-going observer should be killed very near the apparent horizon, rather

    than the event horizon, after a certain time scale (information retention time or scrambling time).

    This gives a wisdom on the location of the firewall, where we will discuss in the next subsection.

    2.2.3 AMPS argument and firewall controversy

    Recently, Almheiri, Marolf, Polchinski, and Sully [14] suggested that the assumptions of black hole

    complementarity is inconsistent by the other arguments. Let us define two sets of quantum operators

    1Up to now, we thought that the consistency condition is E > M. However, in practice, we cannot use all the

    energy M to send a signal and there can be a certain limitation: we can use at most M to send a signal, where

    < 1. Then the required N becomes N > (M4)1 for inside of the horizon and N > ( log M2)1 for outside of

    the horizon. This implies that the required N can be greater than 1. However, it is also true that such a required

    number can be still reasonably small.

    15

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    16/39

    of the matter fields: for the initial state a, a and for the final state b, b. From Assumption 5,

    the collapsing information will be described by the ground state aa = 0. From Assumptions 1,

    2, and 3, after the information retention time, if we put a small information, then they will beemitted by Hawking radiation after the scrambling time. From Assumption 4, there is a unitary

    and semi-classical description between the initial state and the final state by

    b =

    0

    B()a + C()a

    d. (39)

    For an asymptotic observer, the quantum state | should be an eigenstate of bb, from Assump-tion 4. Note that the full state cannot satisfy a| = 0 and the eigenstate of bb at the same time.This is a contradiction.

    To resolve the contradiction, they suggested two alternatives. One is to drop Assumption 5 so

    that the in-falling observer sees a sudden change (violation of equivalence principle); they assumed

    that there is a firewall near the horizon for an in-falling observer. The other is to drop Assumption 4

    so that the asymptotic observer sees a radical non-local effects.

    Here, we briefly summarize the comment on the firewall proposal among researchers:

    Its inconsistent, so what?: Bousso [15] argued that AMPS clearly shows the potential inconsis-

    tency of black hole complementarity. However, this is not a problem, since the inconsistency

    cannot be observed in principle2

    . To notice the inconsistency, one has to compare the statefor a, a and the state for b, b, in other words, the in-falling observer and the asymptotic

    observer. However, the communication is impossible. Therefore, although it is apparently

    inconsistent, we do not have to modify black hole complementarity. This interpretation is

    consistent with Nomura, Varela and Weinberg [16] and Banks and Fischler [21], in the sense

    that the in-falling observer and the asymptotic observer correspond different detectors and

    hence cannot be compared by a naive way. Black hole complementarity is for the whole quan-

    tum states, while the in-falling observer and the asymptotic observer are only the part of the

    whole quantum states. Therefore, the comparison between two observers are not well-defined

    at the beginning.

    These kind of arguments relies on the fact that two observers asymptotic and in-falling

    cannot communicate in the semi-classical sense. However, this is not true. Large N rescaling

    shows that they can communicate each other in the semi-classical limit. Therefore, we cannot

    simply avoid the potential inconsistency and one has to answer what will happen when two

    2Recently, Bousso changed his opinion in the second version of [15], while this paragraph relies on the first version

    of the paper.

    16

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    17/39

    observers meet. In this sense, we think that this opinion cannot help the problem of black

    hole complementarity.

    The firewall is a fuzzball: Mathur and Turton [17] and Chowdhury and Puhm [18] tried to con-

    nect the firewall argument and the fuzzball conjecture. The fuzzball conjecture [38] can be a

    natural realization of the firewall argument; they called approximate complementarity. Orig-

    inally, the fuzzball conjecture was not entirely clear for the in-fall problem: what will happen

    for the in-falling observer? However, now one can get a clear interpretation for the in-fall

    problem so that the fuzzball works as a kind of firewall.

    This is surely an interesting idea, although there are still some questions. First, one has

    to assume that a classical black hole tunnels to a fuzzball state, and it is not entirely clear

    whether it is in general possible or not. Second, the fuzzball conjecture strongly relies on string

    theory and its details. However, what will happen if we cannot rely on such a structure; for

    example, string theory is not the fundamental theory, or there is no hidden dimensions (e.g.,

    evaporating 10-dimensional black holes). Apart from these questions (of the authors), the

    fuzzball conjecture is an interesting and valuable idea for further investigation. However, in

    this paper, we will not follow this direction.

    One important remark is that one can distinguish the fuzzball in the macroscopic scales [20].

    Therefore, if the fuzzball conjecture is true, then it modify not only Assumption 5, but also

    Assumption 4.

    The firewall is a new singularity: Susskind [19] discussed that if there is a firewall, then it

    should be regarded as a new type of singularity. The entanglement of the black hole with

    Hawking radiation causes the singularity to migrate toward the horizon and eventually inter-

    sect it at the information retention time. Therefore, now we have to consider the singular

    horizons firewall after the information retention time. In addition, after the information

    retention time, if some information falls into the black hole, then the horizon increases alongthe space-like direction, and eventually be singularized after the scrambling time.

    This interpretation is worthwhile to discuss further. We will comment in the next subsection.

    In the semi-classical point of view: Ori [22] commented that it is not inconsistent to extend

    semi-classical quantum field theory beyond the event horizon. In other words, there is no

    good justification for the existence of the firewall. Therefore, if we accept that there is no

    firewall and black hole complementarity is not true, then the next possible choice is the regular

    black hole/remnant picture or the baby universe scenario. This conclusion is the same as the

    17

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    18/39

    killkill

    Figure 4: Left: The signal from the firewall (thick red arrow) kills the in-falling information.

    However, it does not affect outside, since the effects (red dotted arrow) is screened by the apparenthorizon. Right: If the apparent horizon is disconnected, then there is no screen so that the effects

    (red dotted arrow) can modify asymptotic infinity.

    authors [12] and probably shared by a number of general relativists.

    2.2.4 Is the firewall-singularity consistent?

    Let us extend the discussion of [19]. We require two conditions for the firewall:

    1. It should prevent the duplication experiment.

    2. We do not want to modify macroscopic scale (asymptotic) semi-classical theory.

    From the first condition, we conclude that the firewall should be very close to the apparent horizon,

    since the duplication experiment can be done outside of the event horizon by assuming a reasonable

    number of scalar fields. Then, the firewall should be time-like, since the apparent horizon is time-like

    [39]. However, because of the second condition, the time-like object should not affect to the future

    infinity. Now, our question is this: is it indeed consistent?Of course, it is more natural to think that the time-like firewall should affect the future infinity.

    On the other hand, if one wants to hold the conservative point of view so that one believes the

    firewall does not affect future infinity, then we must require two properties at the same time: (1) the

    firewall sends signals along the in-going direction (thick arrow in Left of Figure 4) and (2) although

    there is a bounced effect along the out-going direction, the apparent horizon works as a screen of

    any out-going effects (dotted arrow in Left of Figure 4).

    These properties can be falsified if the apparent horizon is separated (Right of Figure 4). Then

    the apparent horizon cannot screen the out-going effects of the firewall. Or, if the firewall is still there

    18

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    19/39

    even though the apparent horizon is disappeared, then the firewall becomes a naked singularity. In

    any case, the firewall should affect the future infinity. In the next section, we realize such separated

    horizons.

    3 Gravitational collapses with a false vacuum lump

    In this section, we discuss gravitational collapses with a false vacuum lump. This is motivated by

    regular black hole models, but it does not necessarily be regular. We calculate using the double-null

    formalism and numerical implementations. After we specify causal structures, we discuss thought

    experiments on black hole complementarity and firewall proposal.

    3.1 Model

    3.1.1 Regular black hole models

    Regular black holes are introduced to explain the problem of singularity in black holes. According

    to the singularity theorem, if we assume the three things and general relativity, we cannot avoid

    the existence of a singularity [40]: (1) global hyperbolicity, (2) the null energy condition, and (3)

    the existence of a trapped surface.

    To define a black hole, we cannot avoid the last assumption, the existence of a trapped sur-

    face. Therefore, one may choose some possibilities [23]: (1) modify general relativity around the

    singularity, (2) violate global hyperbolicity and introduce a Cauchy horizon, or (3) violate the null

    energy condition.

    Modify general relativity: Around the singularity, general relativity should be radically modi-

    fied. One possibility is that the spacetime is fuzzy and not well-defined. The other possibility

    is that one can still choose a good metric ansatz, although the metric should be affected

    by some quantum gravitational corrections. However, it crucially depends on the details of

    quantum gravity.

    Violate global hyperbolicity: One may assume that a black hole solution is Schwarzschild for

    large r (or, any known static solution), while there is a certain non-trivial matter core inside

    of the black hole. In general, the matter core will collapse to a singularity. However, if the

    matter can postpone the formation of singularity and an inner horizon can appear, then one

    may construct a regular solution, even though we do not violate the null energy condition.

    However, these models typically have an inner horizon and these inner horizons are Cauchy

    horizons in the static limit. Therefore, global hyperbolicity is violated.

    19

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    20/39

    In general, if there is a Cauchy horizon, mass inflation is inevitable [ 41]. Then, even though

    there is no strong singularity, a curvature singularity (with non-zero area) can be formed.

    Therefore, the resolution of mass inflation is required again.

    Violation of the null energy condition: If we assume a certain amount of matter that violates

    the null energy condition, then it is not difficult to find a regular black hole solution, since the

    matter can postpone the formation of a singularity. The problem is the origin of the matter.

    One may assume a phantom matter, that is not ruled out by cosmological observations. One

    trivial example that realizes the phantom matter is a ghost field.

    One problem is that a ghost field makes the field theory unstable. Therefore, it is fair to say

    that observations cannot rule out the existence of phantom/ghost-like matter; also, there is

    no observational justification for the usage of phantom/ghost matter. On the other hand, if

    a false vacuum bubble can emit negative energy flux, then this can form a negative energy

    bath [25], although all the process requires many assumptions.

    3.1.2 Justification of physical possibility

    In this paper, in spite of the potential problems, we introduce a regular black hole model. Let

    us first comment on a static solution of Frolov, Markov, and Mukhanov [42]. The metric and the

    energy-momentum tensor of the massive shell are as follows:

    ds2 =

    1 2m(r, l)r

    dt2 +

    1 2m(r, l)

    r

    1dr2 + r2d2, (40)

    where m(r, l) = m(r r0) + (r3/2l2)(r0 r), l = (/3)1/2 is the Hubble scale parameter, andr0 = (12/)

    1/6(2m/l)1/3l is the radius of the false vacuum boundary (we can choose the value of

    as a free parameter). Then, one can easily check that (if we choose = 12) the metric gives the

    outer horizon (r+ = 2m) and the inner horizon (r = l), and usually r < r0 < r+ holds as long as

    l m. If r < r0, the metric is exactly the same as a de Sitter space, and, otherwise, it is exactly

    the same as a Schwarzschild black hole. We can calculate a proper shell condition [42]:

    S = diag

    4, 0,

    +

    8,

    +

    8

    , (41)

    where

    =r0l2

    r0l

    2 1

    1/2+

    m

    r20

    2m

    r0 1

    1/2, (42)

    =1

    r0

    r0l

    2 1

    1/2 1

    r0

    2m

    r0 1

    1/2. (43)

    This regular black hole model is free from singularity since it violates global hyperbolicity. So,

    it may suffer from mass inflation. This model assumes a thin-shell that mediates the inside false

    20

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    21/39

    vacuum region and the outside true vacuum region, and the shell is space-like. We can prove that

    the space-like shell is stable for small perturbation [43]. As long as the shell is stable, we can

    construct a reasonable causal structure as the black hole forms and evaporates [42, 8].However, for realistic applications, one may suggest some problems:

    1. Initially, this model requires a false vacuum lump. Can it be generated by a quantum tunnel-

    ing?

    2. Initially, the shell of the false vacuum lump is time-like. After the shell is trapped by an

    apparent horizon, it should be space-like. How can it be dynamically possible?

    3. Even though a stationary solution is obtained, will the internal structure be stable, even in

    the presence of mass inflation?

    However, we think that our numerical study is still meaningful, even though these potential prob-

    lems. In this paper, we do not want to remove all the singularities. Rather, we want to postpone

    the formation of the singularity. For a deeper region, we regard that eventually a Schwarzschild

    black hole is formed. Our purpose is to modify horizon dynamics using false vacuum bubbles, not

    to modify deeper center of the black hole. From this stance, each problem above can be relaxed by

    the followings:

    1. Quantum fluctuations can generate a false vacuum lump during a short time [44]. Also, there

    are consensus that a buildable bubbles can be generated by unitary processes (although we

    cannot construct instantons) [45]. Moreover, there is an instanton solution of a small false

    vacuum bubble in modified gravity [46]. Therefore, the assumption of the false vacuum bubble

    should be allowed in principle.

    2. The thin-shell dynamics can be questionable, whether it is time-like or space-like. However,

    by using numerical techniques [25], we can see clear dynamics of thick bubble walls.

    3. There will be mass inflation. However, we can postpone the curvature cutoff of mass inflation,

    by assuming sufficiently large number of scalar fields. Therefore, our analysis around the

    apparent horizon can always make sense.

    3.2 Numerical setup

    In this subsection, we discuss a numerical model that mimics Frolov, Markov, and Mukhanovs

    model.

    21

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    22/39

    3.2.1 Double-null formalism

    We describe a Lagrangian with a scalar field , , and potential V():

    L = 12

    ;a;bgab V() 1

    2;a;bg

    ab, (44)

    where is used to make a false vacuum bubble and is used to make a black hole. From this

    Lagrangian we can derive the equations of motion for the scalar field:

    ;abgab V () = 0, (45)

    ;abgab = 0. (46)

    In addition, the energy-momentum tensor becomes

    Tab = ;a;b 12

    gab(;c;dgcd + 2V()) + ;a;b 1

    2gab;c;dg

    cd. (47)

    Now, we describe our numerical setup. We start from the double-null coordinates (our convention

    is [u,v,,]),

    ds2 = 2(u, v)dudv + r2(u, v)d2, (48)

    assuming spherical symmetry. Here u is the ingoing null direction and v is the outgoing null

    direction.

    We define the main functions as follows [9, 25, 26]: the metric function , the area function

    r, and the scalar fields S 4 and s 4. We also use some conventions: d ,v/,h ,u/, f r,u, g r,v , W S,u, Z S,v, w s,u, z s,v.

    From this setup, the following components can be calculated:

    Guu = 2r

    (f,u 2f h), (49)

    Guv =1

    2r2 4rf,v +

    2 + 4f g

    , (50)

    Gvv = 2r

    (g,v 2gd), (51)

    G = 4 r2

    2

    d,u +

    f,vr

    , (52)

    Tuu =1

    4

    W2 + w2

    , (53)

    Tuv =2

    2V(S), (54)

    Tvv =1

    4

    Z2 + z2

    , (55)

    T =r2

    22 (W Z+ wz) r2V(S), (56)

    22

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    23/39

    where

    V(S) = V()

    |=S/

    4. (57)

    From the equations of the scalar fields, we get the following equations:

    rZ,u + f Z+ gW + 2rV

    (S) = 0, (58)

    rz,u + f z + gw = 0. (59)

    Note that, V

    (S) = dV(S)/dS.

    We also consider renormalized energy-momentum tensors to include semiclassical effects. The

    spherical symmetry makes it reasonable to use the 1 + 1-dimensional results [47, 48] divided by

    4r2 [9, 24, 25, 26]:

    Tuu = P4r2

    h,u h2

    , (60)

    Tuv = Tvu = P4r2

    d,u, (61)

    Tvv = P4r2

    d,v d2

    , (62)

    with P N l2Pl/12, where N is the number of massless scalar fields and lPl is the Planck length.We use the semi-classical Einstein equation,

    G = 8

    T + T

    . (63)

    Finally, we summarize our simulation equations:

    1. Einstein equations:

    d,u = h,v =1

    1 Pr2

    f g

    r2+

    2

    4r2 (W Z+ wz)

    , (64)

    g,v = 2dg r

    Z2 + z2

    P

    r(d,v d2), (65)

    g,u = f,v = f gr

    2

    4r+ 22rV(S) P

    rd,u, (66)

    f,u = 2f h r

    W2 + w2 P

    r(h,u h2). (67)

    2. Scalar field equations:

    Z,u = W,v = f Zr gW

    r 2V(S), (68)

    z,u = w,v = f zr gw

    r. (69)

    23

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    24/39

    3.2.2 Initial conditions and integration schemes

    We prepare a false vacuum bubble along the initial ingoing surface, where the outside is flat back-

    ground. We need initial conditions for each function on initial u = ui = 0 and v = vi = 0 surfaces.

    There are two kinds of information: geometry (,r,g,f,h,d) and matter (S,W,Z,s,w,z).

    On the geometry side, we have gauge freedom to choose the initial function and integrate r

    using equations for consistency. We choose (0, 0) = 0 and h(u, 0) = d(0, v) = 0. 0 is related

    to the mass function: m(u, v) = (r/2)(1 + 4fg/2). For a fixed r(0, 0) = 10, f(0, 0) = 1/2, andg(0, 0) = 1/2, to satisfy m(0, 0) = 0, hence (0, 0) = 1 is determined automatically.

    On the matter side, we fix s(u, vi) = 0 and

    s(ui, v) = A sin2

    v

    viv

    (70)

    for vi v < vi + v and otherwise s(0, v) = 0. Then, one can calculate s(u, vi), w(u, vi) = s,u(u, vi),s(ui, v), and z(ui, v) = s,v(ui, v); in addition, z(u, vi) and w(ui, v) is obtained using the equation

    for s,uv. In addition, we fix S(ui, v) = 0 and

    S(u, vi) =

    0 u < ushell,

    sin2(uushell)2ushell

    ushell u < ushell + ushell,

    ushell + ushell u.(71)

    Then, one can calculate S(u, vi), W(u, vi) = S,u(u, vi), S(ui, v), and Z(ui, v) = S,v(ui, v); in addi-

    tion, Z(u, vi) and W(ui, v) is obtained using the equation for S,uv. The potential is free to choose,

    but we fix the simplest form:

    V(S) = Vfv

    B

    S

    4 2 (B + 1)

    S

    3+ (B + 3)

    S

    2, (72)

    so that it has the true vacuum at S = 0 and V(0) = 0 while it has the false vacuum at S = and

    V() = Vfv.

    Then, as one fixes s,w,z and S,W,Zfor initial surfaces, one can obtain g and f by integratingEinstein equations. And then, finally, r can be obtained by integrating g and f. This finishes to

    assign the initial conditions. We observed the convergence and consistency of the simulations in

    Appendix. Here, we used the 2nd order Runge-Kutta method [49].

    We fix free parameters as follows: r0 = 10, 0 = 1, A = 0.025, v = 0.2, ushell = 0.005,

    ushell = 13.846, B = 10, Vfv = 0.005, P = 0.1. The only remained parameter is the field value of

    the false vacuum . Of course, in general, the other parameters are free to choose in principle.

    24

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    25/39

    2 4 6 8v

    13.848

    13.898

    13.948

    u

    13.998

    0.10.050

    -0.05-0.1

    10 12 14

    crossing point bouncing point

    =0.07

    ~Mshell

    Figure 5: General global structure of gravitational collapses with a false vacuum bubble. Here,

    = 0.07. Color denotes the field value S and red curves denote the apparent horizons.

    25

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    26/39

    singularity

    eventh

    oriz

    onap

    parent

    horiz

    on

    shell

    Figure 6: Left: A causal structure of an evaporating neutral black hole. Right: An out-going false

    vacuum bubble changes the singularity structure. Red curve is an apparent horizon, blue curve is an

    event horizon, yellow region is a shell, red region is a false vacuum region, and dashed rectangular

    is an integration domain of our simulations.

    3.3 Causal structure

    Figures 5 and 6 represent a general global causal structure of the gravitational collapse with a false

    vacuum bubble. It is interesting to note that this causal structure is qualitatively same as the causal

    structure in [8]. There are few remarkable structures. First, there appears a closed trapped region:

    outer part is an outer apparent horizon and the inner part is an inner apparent horizon. Two

    horizons are emerged at a certain crossing point. The crossing point appears since the false vacuum

    shell crosses there. The out-going false vacuum shell eventually turns to the in-going direction

    and we call this bouncing point. Before the bouncing point appears, still there can be an apparent

    horizon inside of the false vacuum region. The approximate radius difference between the crossing

    point and the inside apparent horizon should be order of the false vacuum shell mass

    Mshell

    .

    Now we discuss details of the crossing point and the bouncing point. First, Figure 7 compares

    two cases, black hole with and without the false vacuum bubble. For an evaporating black hole, one

    can relocate the crossing point to any place on the time-like horizon by changing the parameters.

    This crossing point can be chosen around the information retention time, in principle. By tuning

    the initial location of the shell ushell and the thickness of the shell ushell (this should be sufficiently

    thin), one can shoot the out-going shell to hit the purposed crossing point (Figure 7). For this,

    we require that the shell energy should be sufficiently large so that the bouncing point arises

    sufficiently far from the crossing point and the shell does not collapse before it reaches the crossing

    26

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    27/39

    0.5 1 1.5v

    13.818

    13.838

    13.858

    u

    13.878

    2 2.5

    purposed crossing point

    0.10.050-0.05

    -0.1

    0.5 1 1.5v

    u

    2 2.5

    crossing point

    =0.07No false vacuum bubble

    13.818

    13.838

    13.858

    13.878

    Figure 7: Constructing the crossing point. Black contours denote r and the difference of each

    contour is 0.01. Color denotes S. Left is the case when there is no false vacuum bubble and Right

    is the case = 0.07.

    point. Figure 8 shows such a behavior; as the shell energy increases by tuning the field amplitude

    , the bouncing point shifts right side, while the crossing point is not significantly changed.

    Therefore, to summarize, we have three free parameters that depend on the potential and

    the initial conditions: ushell, ushell, and . First, we choose a purposed crossing point (for our

    purposes, around the information retention time). Then, one can estimate the required ushell and

    ushell. However, these choices cannot make sure the shell hits the crossing point since it can collapse

    too quickly. Now, we have to tune to set a proper tension of the shell so that the bouncing point

    arises sufficiently far from the purposed crossing point. In this limit, the shell energy Mshell is

    essentially determined by ushell and . It is easy to choose sufficiently large Mshell so that the

    distance between the crossing point and internal horizon structures are sufficiently large. Here,

    between the crossing point and the internal horizon structures, we do not have an evidence of mass

    inflation, although this can be observed for the deeper inside of the expanding false vacuum bubble.

    3.4 Gedanken experiments

    3.4.1 Duplication experiments

    In this causal structure (Figures 6), the duplication experiment is well-defined and possible (Fig-

    ure 9). We use the same conventions that was used in Section 2. Here, we can assume that the

    crossing point is around the information retention time. To see the duplication, the message can

    be sent after t

    Mshell and this can be reasonably large. If there is mass inflation, then this can

    27

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    28/39

    u

    2 4 6 8v

    10 12 14

    =0.02

    u

    2 4 6 8v

    10 12 14

    =0.03

    u

    2 4 6 8v

    10 12 14

    =0.04

    u

    2 4 6 8v

    10 12 14

    =0.05

    bouncing pointbouncing point

    bouncing point bouncing point

    13.818

    13.838

    13.858

    13.878

    13.818

    13.838

    13.858

    13.878

    13.818

    13.838

    13.858

    13.878

    13.818

    13.838

    13.858

    13.878

    Figure 8: Shifting of the bouncing point. Black contours denote r and the difference of each contour

    is 0.01.

    28

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    29/39

    be regularized by assuming a large number of scalar fields, although there is no numerical evidence

    that we need such a number.

    3.4.2 Where is the firewall?

    Therefore, it is inevitable to introduce the firewall, if one wants to maintain black hole complemen-

    tarity. As we discussed in Section 2, the firewall should be on the apparent horizon. Note that this

    situation is quite different from that of the Schwarzschild black hole, since the apparent horizon is

    disconnected. Figure 9 shows possible candidates of the firewall. If the firewall is on the internal

    horizon structures (Middle and Right of Figure 9), then it cannot resolve the problem of black

    hole complementarity. Therefore, it should be on the outer apparent horizon after the information

    retention time. However, we know that the horizon suddenly disappears.

    Here, our first question is this: what will be observed by the in-falling duplication observer? The

    answer is simple. If the firewall can kill the message of a, then the observer can notice the effect of

    the firewall, and we interpret that the firewall can affect the causal future of the spacetime.

    Note that obviously the firewall is outside of the event horizon. If we accept that the firewall

    can affect the causal future, then the next question is this: does the firewall affect to asymptotic

    infinity? If the apparent horizon is connected, then one can believe that any effect can be screened

    by the apparent horizon. However, if the apparent horizon is not connected, there is no consistent

    screen. It is fair to say that the firewall is now naked. Therefore, we conclude that the firewall

    should affect the asymptotic future infinity.

    Therefore, this reveals a paradox when we assume two contents: the firewall should prevent

    the duplication experiment and the firewall should not affect future infinity. From the former

    assumption, the firewall should be on the apparent horizon. Therefore, if the firewall is a kind

    of singularity, then it should be a time-like singularity, since the outer apparent horizon is time-

    like. If we only consider the Schwarzschild black hole, people could ignore this problem, since

    the apparent horizon is connected, and hence the inside and the outside of the firewall was well-

    separated. However, if we consider disconnected apparent horizons, it is more clearer that one

    cannot ignore the effects of the firewall along the out-going direction (Figure 4). Then this requires

    somehow quantum gravitational modification for the outside of the black hole. A firewall cannot

    prevent the modification of semi-classical quantum field theory.

    3.4.3 Violation of cosmic censorship?

    Furthermore, now let us consider the case that the crossing point is slightly before the information

    retention time (Figure 10). During the time evolution, the firewall grows and approaches the

    29

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    30/39

    a

    b

    h

    observer

    messa

    ge

    t

    a

    b

    h

    observer

    t

    a

    b

    h

    observer

    t

    Figure 9: Left: To resolve the inconsistency of black hole complementarity, the firewall should exist

    on the outer apparent horizon. Middle and Right: If the firewall is on the other place, then it

    cannot cure the inconsistency of black hole complementarity.

    apparent horizon [19]. We can tune the case such that the crossing point and the information

    retention time is quite close so that the firewall can grow outside of the event horizon. Then, there

    is no way to screen the effect of the firewall-singularity. Again, the firewall cannot prevent the

    modification of semi-classical quantum field theory for an asymptotic observer. Then, is it a kind

    of violation of strong cosmic censorship?

    3.4.4 Conclusion

    In conclusion, originally, the firewall was a conservative idea to maintain black hole complementarity.

    However, our discussion reveals that the firewall should affect the future infinity and asymptotic

    observer. Therefore, we have some possible interpretations:

    1. We can include more ad hoc assumptions to maintain the firewall idea so that, we only

    modify Assumption 5. For example, the Horowitz-Maldacena proposal [50] can be potentially

    relevant, although the idea in itself has other potential problems [51] and can be falsified with

    large N rescaling [10].

    2. We may interpret that it is inevitable to assume macroscopic effects of quantum gravity, even

    for semi-classical systems (Assumption 4 should be modified) [52]. This possibility can be

    related to the fuzzball interpretation [17, 18, 20].

    3. We may think that one of the Assumptions 1, 2, or 3 should be modified [12].

    30

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    31/39

    firewall

    Figure 10: If the crossing point is slightly before the information retention time, during the time,

    a firewall grows and approaches the apparent horizon. It is possible that the firewall is outside of

    the event horizon while the apparent horizon is disappeared. Then the effect of the firewall should

    be observed by an asymptotic observer.

    4 Discussion

    In this paper, we discussed black hole complementarity and the firewall proposal, and related

    gedanken experiments.

    We illustrate five assumptions: unitarity, entropy-area formula, existence of information ob-

    server, semi-classical quantum field theory for asymptotic observer, and general relativity for in-

    falling observer. These five assumptions require a duplication of information around the event

    horizon and hence black hole complementarity for consistency. However, if there is an observer who

    can see the duplication of information, then black hole complementarity can be falsified.

    Black hole complementarity is indeed falsified by two arguments: large N rescaling and AMPS

    argument. Especially, the former is useful to show the communication between two observers:

    asymptotic and in-falling. To resolve the contradiction, AMPS introduced the firewall. If the

    firewall prevents the duplication experiment, then it should be close to the apparent horizon after

    a certain time scale (information retention time or scrambling time).

    Now we ask that whether these two assumptions are consistent at the same time: (1) the firewall

    is around the apparent horizon and (2) the firewall only affects inside of the black hole. To check the

    consistency, in this paper, we considered a gravitational collapse with a false vacuum lump, which is

    motivated by a regular black hole model. We could construct an example that the apparent horizon

    can be disconnected. Then, one can clearly see that there can be no barrier to screen the out-going

    effects from the firewall and the firewall can be naked.

    31

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    32/39

    From these arguments, what we can clearly conclude are as follows:

    Conclusion 1: The original version of black hole complementarity is inconsistent. An in-falling

    observer and an asymptotic observer can communicate.

    Conclusion 2: To maintain the basic philosophy of black hole complementarity, we need a firewall

    around the apparent horizon, to kill the information of the in-falling information.3

    Conclusion 3: The consistent firewall should affect not only in-falling observers, but also asymp-

    totic observers.

    Therefore, there may be three possibilities: we need more assumptions to maintain black hole

    complementarity in ad hoc ways, we have to accept macroscopic effects due to quantum gravity, orwe have to modify the traditional entropy-area formula, etc. In this paper, we cannot judge which

    is the final answer and we remain as a future work.

    Appendix: Consistency and convergence tests

    In this appendix, we report on the convergence and consistency tests for our simulations. As a

    demonstration, we consider the case = 0.07.

    For consistency, we test one of the constraint functions:

    C =f,u 2f h + r

    W2 + w2

    + (P/r)

    h,u h2

    |f,u| + |2f h|+ |r (W2 + w2) | + (P/r) (|h,u|+ |h2|) (73)

    around v = 5, 10, 15. Figure 11 shows that it is less than 1 % except some points, where the

    denominator vanishes (f,u 0); this will not be accumulated as one integrates along u. Therefore,this shows good consistency.

    For convergence, we compared finer simulations: 1 1, 2 2, and 4 4 times finer for aroundu = 13.8, 13.85, 13.9, 14.1. In Figure 12, we see that the difference between the 1 1 and 2 2

    times finer cases is 4 times the difference between the 2 2 and 4 4 times finer cases, and thusour simulation converges to second order. The numerical error is 103% except for the region

    near the singularity.

    Acknowledgment

    DY would like to thank Hanno Sahlmann for the hospitality and helpful discussions during the

    visit at Erlangen-Nurnberg University. DY, DH and BHL are supported by the National Research

    3Of course, if we do not trust the philosophy of black hole complementarity, we do not need to require a firewall.

    32

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    33/39

    1 3 . 8 0 1 3 . 8 5 1 3 . 9 0 1 3 . 9 5 1 4 . 0 0 1 4 . 0 5

    L

    o

    g

    C

    v = 5

    v = 1 0

    v = 1 5

    Figure 11: The constraint function for = 0 .07.

    0 2 4 6 8 1 0 1 2 1 4

    u = 1 3 . 8 , L o g | r ( 1 x 1 ) - r ( 2 x 2 ) |

    u = 1 3 . 8 , L o g 4 | r ( 2 x 2 ) ( 4 x 4 )

    u = 1 3 . 8 5 , L o g | r ( 1 x 1 ) ( 2 x 2 )

    u = 1 3 . 8 5 , L o g 4 | r ( 2 x 2 ) - r ( 4 x 4 ) |

    u = 1 3 . 9 , L o g | r ( 1 x 1 ) - r ( 2 x 2 ) |

    u = 1 3 . 9 , L o g 4 | r ( 2 x 2 ) - r ( 4 x 4 ) |

    u = 1 4 . 1 , L o g | r ( 1 x 1 ) - r ( 2 x 2 ) |

    u = 1 4 . 1 , L o g 4 | r ( 2 x 2 ) - r ( 4 x 4 ) |

    Figure 12: Convergence tests for = 0.07.

    33

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    34/39

    Foundation of Korea(NRF) grant funded by the Korea government(MEST) through the Center

    for Quantum Spacetime(CQUeST) of Sogang University with grant number 2005-0049409. DH is

    supported by Korea Research Foundation grants (KRF-313-2007-C00164, KRF-341-2007-C00010)funded by the Korean government (MOEHRD) and BK21.

    34

  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    35/39

    References

    [1] S. W. Hawking, Phys. Rev. D 14, 2460 (1976).

    [2] W. Israel, Phys. Rev. 164, 1776 (1967);

    W. Israel, Commun. Math. Phys. 8, 245 (1968);

    J. M. Bardeen, B. Carter and S. W. Hawking, Commun. Math. Phys. 31, 161 (1973).

    [3] S. W. Hawking, Nature 248, 30 (1974);

    S. W. Hawking, Commun. Math. Phys. 43, 199 (1975) [Erratum-ibid. 46, 206 (1976)].

    [4] J. M. Maldacena, Adv. Theor. Math. Phys. 2, 231 (1998) [Int. J. Theor. Phys. 38, 1113

    (1999)] [arXiv:hep-th/9711200];E. Witten, Adv. Theor. Math. Phys. 2, 253 (1998) [arXiv:hep-th/9802150];

    S. S. Gubser, I. R. Klebanov and A. M. Polyakov, Phys. Lett. B 428, 105 (1998)

    [arXiv:hep-th/9802109].

    [5] C. R. Stephens, G. t Hooft and B. F. Whiting, Class. Quant. Grav. 11, 621 (1994)

    [gr-qc/9310006].

    [6] L. Susskind, L. Thorlacius and J. Uglum, Phys. Rev. D 48, 3743 (1993)

    [arXiv:hep-th/9306069].

    [7] L. Susskind and L. Thorlacius, Phys. Rev. D 49, 966 (1994) [arXiv:hep-th/9308100].

    [8] D. Yeom and H. Zoe, Phys. Rev. D 78, 104008 (2008) [arXiv:0802.1625 [gr-qc]];

    D. Yeom, Int. J. Mod. Phys. CS 1, 311 (2011) [arXiv:0901.1929 [gr-qc]].

    [9] S. E. Hong, D. Hwang, E. D. Stewart and D. Yeom, Class. Quant. Grav. 27, 045014 (2010)

    [arXiv:0808.1709 [gr-qc]].

    [10] S. E. Hong, D. Hwang, D. Yeom and H. Zoe, JHEP 0812, 080 (2008) [arXiv:0809.1480 [gr-qc]];

    D. Yeom and H. Zoe, arXiv:0811.1637 [gr-qc].

    [11] X. H. Ge and Y. G. Shen, Class. Quant. Grav. 21, 1941 (2004);

    X. H. Ge and Y. G. Shen, Chin. Phys. Lett. 21, 1413 (2004);

    X. H. Ge and Y. G. Shen, Int. J. Mod. Phys. D 14, 1321 (2005) [arXiv:gr-qc/0503094].

    [12] D. Yeom and H. Zoe, Int. J. Mod. Phys. A 26, 3287 (2011) [arXiv:0907.0677 [hep-th]].

    35

    http://arxiv.org/abs/hep-th/9711200http://arxiv.org/abs/hep-th/9802150http://arxiv.org/abs/hep-th/9802109http://arxiv.org/abs/gr-qc/9310006http://arxiv.org/abs/hep-th/9306069http://arxiv.org/abs/hep-th/9308100http://arxiv.org/abs/0802.1625http://arxiv.org/abs/0901.1929http://arxiv.org/abs/0808.1709http://arxiv.org/abs/0809.1480http://arxiv.org/abs/0811.1637http://arxiv.org/abs/gr-qc/0503094http://arxiv.org/abs/0907.0677http://arxiv.org/abs/0907.0677http://arxiv.org/abs/gr-qc/0503094http://arxiv.org/abs/0811.1637http://arxiv.org/abs/0809.1480http://arxiv.org/abs/0808.1709http://arxiv.org/abs/0901.1929http://arxiv.org/abs/0802.1625http://arxiv.org/abs/hep-th/9308100http://arxiv.org/abs/hep-th/9306069http://arxiv.org/abs/gr-qc/9310006http://arxiv.org/abs/hep-th/9802109http://arxiv.org/abs/hep-th/9802150http://arxiv.org/abs/hep-th/9711200
  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    36/39

    [13] P. Hayden and J. Preskill, JHEP 0709, 120 (2007) [arXiv:0708.4025 [hep-th]];

    Y. Sekino and L. Susskind, JHEP 0810, 065 (2008) [arXiv:0808.2096 [hep-th]].

    [14] A. Almheiri, D. Marolf, J. Polchinski and J. Sully, arXiv:1207.3123 [hep-th].

    [15] R. Bousso, arXiv:1207.5192 [hep-th].

    [16] Y. Nomura, J. Varela and S. J. Weinberg, arXiv:1207.6626 [hep-th].

    [17] S. D. Mathur and D. Turton, arXiv:1208.2005 [hep-th].

    [18] B. D. Chowdhury and A. Puhm, arXiv:1208.2026 [hep-th].

    [19] L. Susskind, arXiv:1208.3445 [hep-th];

    L. Susskind, arXiv:1210.2098 [hep-th].

    [20] I. Bena, A. Puhm and B. Vercnocke, arXiv:1208.3468 [hep-th].

    [21] T. Banks and W. Fischler, arXiv:1208.4757 [hep-th].

    [22] A. Ori, arXiv:1208.6480 [gr-qc].

    [23] A. Borde, Phys. Rev. D 55, 7615 (1997) [arXiv:gr-qc/9612057];

    E. Ayon-Beato and A. Garcia, Phys. Lett. B 464, 25 (1999) [arXiv:hep-th/9911174];

    A. Bogojevic and D. Stojkovic, Phys. Rev. D 61, 084011 (2000) [arXiv:gr-qc/9804070];

    I. Dymnikova, Class. Quant. Grav. 19, 725 (2002) [arXiv:gr-qc/0112052];

    S. A. Hayward, Phys. Rev. Lett. 96, 031103 (2006) [arXiv:gr-qc/0506126];

    K. A. Bronnikov and J. C. Fabris, Phys. Rev. Lett. 96, 251101 (2006) [arXiv:gr-qc/0511109];

    K. A. Bronnikov, V. N. Melnikov and H. Dehnen, Gen. Rel. Grav. 39, 973 (2007)

    [arXiv:gr-qc/0611022];

    I. Dymnikova and E. Galaktionov, Phys. Lett. B 645, 358 (2007);

    S. Ansoldi, [arXiv:0802.0330].

    [24] T. Piran and A. Strominger, Phys. Rev. D 48, 4729 (1993) [arXiv:hep-th/9304148];

    R. Parentani and T. Piran, Phys. Rev. Lett 73, 2805 (1994) [arXiv:hep-th/9405007];

    T. Chiba and J. Soda, Prog. Theor. Phys. 96, 567 (1996) [arXiv:gr-qc/9603056];

    S. Ayal and T. Piran, Phys. Rev. D 56, 4768 (1997) [arXiv:gr-qc/9704027];

    S. Hod and T. Piran, Phys. Rev. Lett 81, 1554 (1998) [arXiv:gr-qc/9803004];

    S. Hod and T. Piran, Gen. Rel. Grav. 30, 1555 (1998) [arXiv:gr-qc/9902008];

    E. Sorkin and T. Piran, Phys. Rev. D 63, 084006 (2001) [arXiv:gr-qc/0009095];

    E. Sorkin and T. Piran, Phys. Rev. D 63, 124024 (2001) [arXiv:gr-qc/0103090];

    36

    http://arxiv.org/abs/0708.4025http://arxiv.org/abs/0808.2096http://arxiv.org/abs/1207.3123http://arxiv.org/abs/1207.5192http://arxiv.org/abs/1207.6626http://arxiv.org/abs/1208.2005http://arxiv.org/abs/1208.2026http://arxiv.org/abs/1208.3445http://arxiv.org/abs/1210.2098http://arxiv.org/abs/1208.3468http://arxiv.org/abs/1208.4757http://arxiv.org/abs/1208.6480http://arxiv.org/abs/gr-qc/9612057http://arxiv.org/abs/hep-th/9911174http://arxiv.org/abs/gr-qc/9804070http://arxiv.org/abs/gr-qc/0112052http://arxiv.org/abs/gr-qc/0506126http://arxiv.org/abs/gr-qc/0511109http://arxiv.org/abs/gr-qc/0611022http://arxiv.org/abs/0802.0330http://arxiv.org/abs/hep-th/9304148http://arxiv.org/abs/hep-th/9405007http://arxiv.org/abs/gr-qc/9603056http://arxiv.org/abs/gr-qc/9704027http://arxiv.org/abs/gr-qc/9803004http://arxiv.org/abs/gr-qc/9902008http://arxiv.org/abs/gr-qc/0009095http://arxiv.org/abs/gr-qc/0103090http://arxiv.org/abs/gr-qc/0103090http://arxiv.org/abs/gr-qc/0009095http://arxiv.org/abs/gr-qc/9902008http://arxiv.org/abs/gr-qc/9803004http://arxiv.org/abs/gr-qc/9704027http://arxiv.org/abs/gr-qc/9603056http://arxiv.org/abs/hep-th/9405007http://arxiv.org/abs/hep-th/9304148http://arxiv.org/abs/0802.0330http://arxiv.org/abs/gr-qc/0611022http://arxiv.org/abs/gr-qc/0511109http://arxiv.org/abs/gr-qc/0506126http://arxiv.org/abs/gr-qc/0112052http://arxiv.org/abs/gr-qc/9804070http://arxiv.org/abs/hep-th/9911174http://arxiv.org/abs/gr-qc/9612057http://arxiv.org/abs/1208.6480http://arxiv.org/abs/1208.4757http://arxiv.org/abs/1208.3468http://arxiv.org/abs/1210.2098http://arxiv.org/abs/1208.3445http://arxiv.org/abs/1208.2026http://arxiv.org/abs/1208.2005http://arxiv.org/abs/1207.6626http://arxiv.org/abs/1207.5192http://arxiv.org/abs/1207.3123http://arxiv.org/abs/0808.2096http://arxiv.org/abs/0708.4025
  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    37/39

    Y. Oren and T. Piran, Phys. Rev. D 68, 044013 (2003) [arXiv:gr-qc/0306078];

    J. Hansen, A. Khokhlov and I. Novikov, Phys. Rev. D 71, 064013 (2005)

    [arXiv:gr-qc/0501015];A. Doroshkevich, J. Hansen, I. Novikov and A. Shatskiy, arXiv:0812.0702 [gr-qc];

    P. P. Avelino, A. J. S. Hamilton and C. A. R. Herdeiro, Phys. Rev. D 79, 124045 (2009)

    [arXiv:0904.2669 [gr-qc]];

    A. Doroshkevich, J. Hansen, D. Novikov, I. Novikov and A. Shatskiy, Phys. Rev. D 81, 124011

    (2010) [arXiv:0908.1300 [gr-qc]];

    A. Borkowska, M. Rogatko and R. Moderski, Phys. Rev. D 83, 084007 (2011) [arXiv:1103.4808

    [hep-th]];

    A. Nakonieczna, M. Rogatko and R. Moderski, Phys. Rev. D 86, 044043 (2012)

    [arXiv:1209.1203 [hep-th]];

    A. Nakonieczna and M. Rogatko, arXiv:1209.3614 [hep-th].

    [25] J. Hansen, D. Hwang and D. Yeom, JHEP 0911, 016 (2009) [arXiv:0908.0283 [gr-qc]];

    D. Yeom, arXiv:0912.0068 [gr-qc];

    D. Hwang and D. Yeom, Class. Quant. Grav. 28, 155003 (2011) [arXiv:1010.3834 [gr-qc]];

    B. -H. Lee and D. Yeom, arXiv:1111.0139 [gr-qc].

    [26] D. Hwang and D. Yeom, Class. Quant. Grav. 27, 205002 (2010) [arXiv:1002.4246 [gr-qc]];

    D. Hwang and D. Yeom, Phys. Rev. D 84, 064020 (2011) [arXiv:1010.2585 [gr-qc]];

    D. Hwang, H. -B. Kim and D. Yeom, Class. Quant. Grav. 29, 055003 (2012) [arXiv:1105.1371

    [gr-qc]];

    D. Hwang, B. -H. Lee and D. Yeom, JCAP 1112, 006 (2011) [arXiv:1110.0928 [gr-qc]];

    D. Hwang, B. -H. Lee, W. Lee and D. Yeom, JCAP 1207, 003 (2012) [arXiv:1201.6109 [gr-qc]].

    [27] S. W. Hawking, Commun. Math. Phys. 25, 152 (1972).

    [28] J. D. Bekenstein, Phys. Rev. D 7, 2333 (1973);

    J. D. Bekenstein, Phys. Rev. D 9, 3292 (1974).

    [29] C. G. Callan and J. M. Maldacena, Nucl. Phys. B 472, 591 (1996) [arXiv:hep-th/9602043].

    [30] A. Strominger and C. Vafa, Phys. Lett. B 379, 99 (1996) [arXiv:hep-th/9601029].

    [31] D. N. Page, Phys. Rev. Lett. 71, 1291 (1993) [arXiv:gr-qc/9305007].

    [32] D. N. Page, Phys. Rev. Lett. 71, 3743 (1993) [arXiv:hep-th/9306083].

    [33] S. Lloyd and H. Pagels, Annals Phys. 188, 186 (1988).

    37

    http://arxiv.org/abs/gr-qc/0306078http://arxiv.org/abs/gr-qc/0501015http://arxiv.org/abs/0812.0702http://arxiv.org/abs/0904.2669http://arxiv.org/abs/0908.1300http://arxiv.org/abs/1103.4808http://arxiv.org/abs/1209.1203http://arxiv.org/abs/1209.3614http://arxiv.org/abs/0908.0283http://arxiv.org/abs/0912.0068http://arxiv.org/abs/1010.3834http://arxiv.org/abs/1111.0139http://arxiv.org/abs/1002.4246http://arxiv.org/abs/1010.2585http://arxiv.org/abs/1105.1371http://arxiv.org/abs/1110.0928http://arxiv.org/abs/1201.6109http://arxiv.org/abs/hep-th/9602043http://arxiv.org/abs/hep-th/9601029http://arxiv.org/abs/gr-qc/9305007http://arxiv.org/abs/hep-th/9306083http://arxiv.org/abs/hep-th/9306083http://arxiv.org/abs/gr-qc/9305007http://arxiv.org/abs/hep-th/9601029http://arxiv.org/abs/hep-th/9602043http://arxiv.org/abs/1201.6109http://arxiv.org/abs/1110.0928http://arxiv.org/abs/1105.1371http://arxiv.org/abs/1010.2585http://arxiv.org/abs/1002.4246http://arxiv.org/abs/1111.0139http://arxiv.org/abs/1010.3834http://arxiv.org/abs/0912.0068http://arxiv.org/abs/0908.0283http://arxiv.org/abs/1209.3614http://arxiv.org/abs/1209.1203http://arxiv.org/abs/1103.4808http://arxiv.org/abs/0908.1300http://arxiv.org/abs/0904.2669http://arxiv.org/abs/0812.0702http://arxiv.org/abs/gr-qc/0501015http://arxiv.org/abs/gr-qc/0306078
  • 7/27/2019 Is the Firewall Consistent - Gedanken Experiments on Black Hole Complementarity and Firewall Proposal 1210.6733

    38/39

    [34] S. Sen, Phys. Rev. Lett. 77, 1 (1996) [arXiv:hep-th/9601132].

    [35] D. A. Lowe and L. Thorlacius, Phys. Rev. D 73, 104027 (2006) [arXiv:hep-th/0601059].

    [36] K. S. Thorne, R. H. Price and D. A. Macdonald, Black holes: The membrane paradigm,

    Yale University Press (1986).

    [37] G. Dvali, Fortsch. Phys. 58, 528 (2010) [arXiv:0706.2050 [hep-th]];

    G. Dvali, M. Redi, S. Sibiryakov and A. Vainshtein, Phys. Rev. Lett. 101, 151603 (2008)

    [arXiv:0804.0769 [hep-th]];

    R. Brustein, G. Dvali and G. Veneziano, JHEP 0910, 085 (2009) [arXiv:0907.5516 [hep-th]].

    [38] S. D. Mathur, Fortsch. Phys. 53, 793 (2005) [hep-th/0502050].

    [39] A. Ashtekar and B. Krishnan, Living Rev. Rel. 7, 10 (2004) [arXiv:gr-qc/0407042].

    [40] S. W. Hawking and G. F. R. Ellis, The large scale structure of space-time, Cambridge

    University Press (1973).

    [41] E. Poisson and W. Israel, Phys. Rev. Lett. 63, 1663 (1989);

    E. Poisson and W. Israel, Phys. Rev. D 41, 1796 (1990).

    [42] V. P. Frolov, M. A. Markov and V. F. Mukhanov, Phys. Rev. D 41, 383 (1990).

    [43] R. Balbinot and E. Poisson, Phys. Rev. D 41, 395 (1990).

    [44] K. M. Lee and E. J. Weinberg, Phys. Rev. D 36, 1088 (1987).

    [45] B. Freivogel, V. E. Hubeny, A. Maloney, R. C. Myers, M. Rangamani and S. Shenker, JHEP

    0603, 007 (2006) [arXiv:hep-th/0510046].

    [46] H. Kim, B. -H. Lee, W. Lee, Y. J. Lee and D. Yeom, Phys. Rev. D 84, 023519 (2011)

    [arXiv:1011.5981 [hep-th]].

    [47] P. C. W. Davies, S. A. Fulling and W. G. Unruh