SciPost Submission Page
Cryptographic tests of the python's lunch conjecture
by Alex May, Sabrina Pasterski, Chris Waddell, Michelle Xu
Submission summary
| Authors (as registered SciPost users): | Chris Waddell |
| Submission information | |
|---|---|
| Preprint Link: | https://arxiv.org/abs/2411.10527v4 (pdf) |
| Date accepted: | Aug. 22, 2025 |
| Date submitted: | April 15, 2025, 8:58 p.m. |
| Submitted by: | Chris Waddell |
| Submitted to: | SciPost Physics |
| Ontological classification | |
|---|---|
| Academic field: | Physics |
| Specialties: |
|
| Approach: | Theoretical |
Abstract
In the AdS/CFT correspondence, a subregion of the CFT allows for the recovery of a corresponding subregion of the bulk known as its entanglement wedge. In some cases, an entanglement wedge contains a locally but not globally minimal surface homologous to the CFT subregion, in which case it is said to contain a python's lunch. It has been proposed that python's lunch geometries should be modelled by tensor networks that feature projective operations where the wedge narrows. This model leads to the python's lunch (PL) conjecture, which asserts that reconstructing information from past the locally minimal surface is computationally difficult. In this work, we use cryptographic tools related to a primitive known as the Conditional Disclosure of Secrets (CDS) to develop consequences of the projective tensor network model that can be checked directly in AdS/CFT. We argue from the tensor network picture that the mutual information between appropriate CFT subregions is lower bounded linearly by an area difference associated with the geometry of the lunch. Recalling that the mutual information is also computed by bulk extremal surfaces, this gives a checkable geometrical consequence of the tensor network model. We prove weakened versions of this geometrical statement in asymptotically AdS$_{2+1}$ spacetimes satisfying the null energy condition, and confirm it in some example geometries, supporting the tensor network model and by proxy the PL conjecture.
Author indications on fulfilling journal expectations
- Provide a novel and synergetic link between different research areas.
- Open a new pathway in an existing or a new research direction, with clear potential for multi-pronged follow-up work
- Detail a groundbreaking theoretical/experimental/computational discovery
- Present a breakthrough on a previously-identified and long-standing research stumbling block
Published as SciPost Phys. 19, 084 (2025)
Reports on this Submission
Report #2 by Anonymous (Referee 2) on 2025-8-2 (Invited Report)
- Cite as: Anonymous, Report on arXiv:2411.10527v4, delivered 2025-08-02, doi: 10.21468/SciPost.Report.11681
Report
The paper is very clearly written, and the ideas presented here are novel, creative and of wide interest to the AdS/CFT community. Furthermore, their theorem proving the lower bound on mutual information for computational secure CDS might be of indepedent interest to the quantum information/computer science community. I strongly recommend publication of this article in Scipost.
Recommendation
Publish (easily meets expectations and criteria for this Journal; among top 50%)
Report #1 by Matthew Headrick (Referee 1) on 2025-6-10 (Invited Report)
- Cite as: Matthew Headrick, Report on arXiv:2411.10527v4, delivered 2025-06-10, doi: 10.21468/SciPost.Report.11377
Report
The explorations in this paper push against the boundary of our understanding of the role of computational complexity in holography and quantum gravity. Hopefully, in the future, the various conjectures in the paper can be proven or disproven, sharpening our understanding of this still somewhat fuzzy area.
The paper is technically correct as far as I can tell, the writing is honest and clear, and the results are novel and interesting. I recommend publication in SciPost Physics.
Requested changes
N/A
Recommendation
Publish (easily meets expectations and criteria for this Journal; among top 50%)
