a simple test about potential uniatrity violations in the black hole firewall paradox

  • Jacquet P.

We propose a simple test designed to detect non unitary effects in the black hole evaporation. Since the effects are expected to be tiny, the test relies on information theory in order to discriminate between the non unitary hypothesis and the unitary hypothesis. We show that the modification of the (final) mass of an isolated black hole would imply a modification in the non-unitary effects within its evaporation. Thus the effect should affect any quantum measure standing on the causal past of any mass absorption event. However shooting a mass toward a black hole in our galaxy would not lead to a detectable non unitary effect since most of the matter in the galaxy would eventually end in the central black hole. Therefore the test is based on expelling flows of particles outward the galaxy. Before any mass expulsion, one creates a binary codeword from a sequence of spin measurements, and performs a protocol of mass expulsion based on the codeword. Given a fixed quantity of mass to be expelled, the protocol would maximize the likelihood of the discrimination between unitary and non unitary effect via the Kullback-Leibler divergence. In term of information theory, this is equivalent to consider the extraction of one bit of information from a received codeword, the bit corresponds to the a posteriori application of a protocol with mass expulsion versus the alternative protocol without mass expulsion. Assuming accumulation in non unitary effects, this channel has a larger capacity than classic symmetric channels.

Recent Publications

August 09, 2017

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

August 01, 2017

Modeling and simulation of RSOA with a dual-electrode configuration

  • De Valicourt G.
  • Liu Z.
  • Violas M.
  • Wang H.
  • Wu Q.

Based on the physical model of a bulk reflective semiconductor optical amplifier (RSOA) used as a modulator in radio over fiber (RoF) links, the distributions of carrier density, signal photon density, and amplified spontaneous emission photon density are demonstrated. One of limits in the use of RSOA is the lower ...

July 12, 2017

PrivApprox: Privacy-Preserving Stream Analytics

  • Chen R.
  • Christof Fetzer
  • Le D.
  • Martin Beck
  • Pramod Bhatotia
  • Thorsten Strufe

How to preserve users' privacy while supporting high-utility analytics for low-latency stream processing? To answer this question: we describe the design, implementation and evaluation of PRIVAPPROX, a data analytics system for privacy-preserving stream processing. PRIVAPPROX provides three properties: (i) Privacy: zero-knowledge privacy (ezk) guarantees for users, a privacy bound tighter ...