Lea Krämer1, Lídia Del Rio2,3. 1. Institute for Theoretical Physics, ETH Zurich, Switzerland. 2. Institute for Theoretical Physics, ETH Zurich, Switzerland delrio@phys.ethz.ch. 3. School of Physics, University of Bristol, Bristol, UK.
Abstract
Within a global physical theory, a notion of locality allows us to find and justify information-processing primitives, like non-signalling between distant agents. Here, we propose exploring the opposite direction: to take agents as the basic building blocks through which we test a physical theory, and recover operational notions of locality from signalling conditions. First, we introduce an operational model for the effective state spaces of individual agents, as well as the range of their actions. We then formulate natural secrecy conditions between agents and identify the aspects of locality relevant for signalling. We discuss the possibility of taking commutation of transformations as a primitive of physical theories, as well as applications to quantum theory and generalized probability frameworks. This 'it from bit' approach establishes an operational connection between local actions and local observations, and gives a global interpretation to concepts like discarding a subsystem or composing local functions.This article is part of a discussion meeting issue 'Foundations of quantum mechanics and their impact on contemporary society'.
Within a global physical theory, a notion of locality allows us to find and justify information-processing primitives, like non-signalling between distant agents. Here, we propose exploring the opposite direction: to take agents as the basic building blocks through which we test a physical theory, and recover operational notions of locality from signalling conditions. First, we introduce an operational model for the effective state spaces of individual agents, as well as the range of their actions. We then formulate natural secrecy conditions between agents and identify the aspects of locality relevant for signalling. We discuss the possibility of taking commutation of transformations as a primitive of physical theories, as well as applications to quantum theory and generalized probability frameworks. This 'it from bit' approach establishes an operational connection between local actions and local observations, and gives a global interpretation to concepts like discarding a subsystem or composing local functions.This article is part of a discussion meeting issue 'Foundations of quantum mechanics and their impact on contemporary society'.
In modelling local agents acting within a global theory, the intuitive assumption is that both their actions and their knowledge are restricted to a bounded region. The canonical example is a scientist who has full control of her laboratory and can perform local tomography. In reality though, the breadth of knowledge and the range of action of agents may be decoupled. For example, prisoners can acquire global knowledge by reading the news, but their actions are limited to small subsystems. Conversely, someone locked in a control room may only have local knowledge of the shapes of different buttons, but pressing one may have global consequences. The observation that the knowledge and action do not always go hand in hand implies that in order to model agents we have to specify both (§2). This naturally leads us to search for minimal operational constraints needed to ensure that agents are truly local.Here, we motivate a notion of secrecy between agents, which captures whether actions performed by an agent (like writing a message, choosing a bit or preparing a quantum state) can be perceived by another (§3); traditional notions of non-signalling correspond to an extended secrecy between space-like separated regions (§5). This work brings together and clarifies concepts of locality used in quantum theory, generalized probabilistic theories and field theories. It highlights that the state space and transformations of a theory are but a subjective choice of representation of the underlying physical theory from a viewpoint that is convenient to a given agent, as argued by Spekkens [1]. Here, we tentatively suggest commutation of transformations as a primitive of physical theories. In particular, we show how to derive local agents (and effective descriptions of local subsystems) from commutation relations on global transformations (§4).This work draws from our ‘resource theories of knowledge’ [2], and has natural applications in multi-player settings, such as cryptographic scenarios, games or resource theories. There is yet a more exciting possible application: to recover the space–time structure of a physical theory from the primitive notion of test agents, in the spirit of Hardy’s operational general relativity [3] and of the task of localization in wireless sensor networks [4]. The idea is to send out agents (or probes) to unknown positions, see if they can communicate with each other, and use the signalling graph to define distances between agents, reconstruct their relative positions and infer properties of space–time (figure 1). For this, we must first find appropriate, theory-independent notions of agents and signalling.
Figure 1.
There and back again: physical locality and signalling. On the left, the spatial location of several agents (dark dots) and their range of communication (overlapping circles) are depicted; on the right, the corresponding signalling graph. (a) In physical theories, the notion of a space–time background where agents are positioned, together with principles about the range of signalling (e.g. the finite speed of light), allows us to derive information-processing concepts like non-signalling agents. (b) Reverse direction: starting from the notion of agents that may or may not be able to communicate and minimal assumptions on the nature and range of signalling, it may be possible to deduce both the space–time structure of the theory and the position of agents in it, to a good approximation. We can take inspiration from a simple example in the field of localization in wireless sensor networks (for a review, see, for example, [4]). Forest fire prevention mechanisms can be implemented by dropping a large number of smoke-detecting sensors from a plane over the forest. The sensors (our agents) are equipped with short-range communication systems, and land at random positions. One then collects the data of which sensors can signal to each other. From the signalling graph, it is possible to reconstruct the relative positions of the sensors on the ground to high accuracy—that way, when the smoke alarm goes off in a sensor, the fire-response team can quickly locate it. (Online version in colour.)
There and back again: physical locality and signalling. On the left, the spatial location of several agents (dark dots) and their range of communication (overlapping circles) are depicted; on the right, the corresponding signalling graph. (a) In physical theories, the notion of a space–time background where agents are positioned, together with principles about the range of signalling (e.g. the finite speed of light), allows us to derive information-processing concepts like non-signalling agents. (b) Reverse direction: starting from the notion of agents that may or may not be able to communicate and minimal assumptions on the nature and range of signalling, it may be possible to deduce both the space–time structure of the theory and the position of agents in it, to a good approximation. We can take inspiration from a simple example in the field of localization in wireless sensor networks (for a review, see, for example, [4]). Forest fire prevention mechanisms can be implemented by dropping a large number of smoke-detecting sensors from a plane over the forest. The sensors (our agents) are equipped with short-range communication systems, and land at random positions. One then collects the data of which sensors can signal to each other. From the signalling graph, it is possible to reconstruct the relative positions of the sensors on the ground to high accuracy—that way, when the smoke alarm goes off in a sensor, the fire-response team can quickly locate it. (Online version in colour.)
Modelling agents
We start with a top-down approach, where we first describe a global theory (as seen by a global agent), and then model restricted agents acting within that theory.
Global theory
From the point of view of a given global agent, a global theory may be represented via a state space Ω and a set of transformations that are available to the agent [5-8]. We can think of the state space as the ‘language’ chosen by this global observer to describe nature. For example, Ω could be the set of coordinates and momenta of all celestial bodies; in quantum theory, it could be the set of valid density matrices over a global Hilbert space. It need not be a static picture: in astronomy, an alternative state space Ω′ could be the set of possible trajectories of celestial bodies, and in quantum theory it could include all global Hamiltonians that determine the free evolution of density matrices. Three observations are pertinent at this point: firstly, Ω is not the ultimate description of reality, just a convenient representation from the point of view of a global agent; secondly, different pictures, like Ω and Ω′, may be related and mapped to one another [1,2]; and thirdly, Ω need not have any special structure a priori besides being a set—indeed, the approach laid out here will allow us to find an operational subsystem structure in the set of states.The transformations in represent all actions that the theory allows the global agent to implement. We can think of them as the ways in which the agent may test a theory, by applying actions that change state parameters. For example, an explicit theory of a quantum universe may allow only for unitary operations, while a more generous theory could equip the agent with implicit large ancillas, and allow her to implement general quantum channels, state preparations and even tomography. Again the two views can be related: the latter is an effective theory derived from the unitary quantum theory, by internalizing part of the global space as belonging to the agent and her instruments, and not to the object of study (the rest of the universe) [2]. In the context of field theories, this is discussed as emerging agency [3]. In a superdeterministic theory, there is only one possible course of evolution for the universe, and consists only of functions that apply it (for example, where the global agent is given some choice of time). Formally, is a monoid of functions f:Ω→Ω: it contains the identity transformation and is closed under concatenation (an associative binary operation), such that performing two actions subsequently, f°g, is still an allowed operation. We discuss the monoidal assumption and possible relaxations in §5.
Local agents
Local agents are characterized by limited knowledge: their inability to distinguish global states that appear identical in their eyes. We can formalize this by building equivalence classes of states that are indistinguishable from the perspective of an agent. For example, in quantum theory, we could have an agent Bob who only has access to a Hilbert space ; two global states are indistinguishable (or equivalent) from Bob’s perspective if they have the same marginal in . This defines an equivalence relation , where denotes a partial trace over all systems except B. The corresponding equivalence classes are
Taking the quotient over, this equivalence relation gives us a new space state Ω/∼, which is in one-to-one correspondence with the set of all reduced density matrices in . This is Bob’s effective state space, sufficient to encode all the information that he can observe about any global state (figure 2). In this case, the map from the global to the local spaces (the canonical map) is given by the partial trace
More generally, we can always build the effective state space of an agent in this way, even if we do not know anything about the structure of the global space (for instance whether it can be split into a convenient tensor form ). The construction of an agent’s effective state space Ω:=Ω/∼ is in the spirit of the Leibniz principle of identity of indiscernibles [9]. Yet, this operational procedure emphasizes that both discernibility and identity are subjective concepts (figure 2). Limitations on Bob’s perspective may have nothing to do with spatial locality. Bob might only have access to crude measurement instruments unable to distinguish microscopic details of states, or he may not be able to distinguish a global phase or gauge [3]. In generalized probability frameworks, Bob’s perspective can correspond to a grouping of individual global outcomes into events (appendix E). In algebraic quantum field theory, these equivalence classes could emerge from algebras of local observables (e.g. [10] for a review).
Figure 2.
Building an agent’s effective state space. The different states of a global space Ω are shown to an agent, who finds equivalence classes of (subjectively) indistinguishable states. Their effective state space is then the quotient space. (a) The global state space Ω consists of three bits, in the eight possible states depicted. An agent Alice can only see the first bit, therefore she cannot distinguish the states in each vertical box (her equivalence classes [000] and [100]). Her effective state space Ω=Ω/∼ has only two states, which can be relabelled as 0 and 1 for convenience. Another agent Bob identifies the equivalent classes [000] and [010], which leads us to conclude that he can only see the second bit. Note that, for example, if Alice were able to apply transformations that only change the first bit, she could not signal to Bob (because he could not detect the change). (b) Here, Ω is the space of colours, which were shown to a partly colourblind agent Marco. Marco identified the colours that he could not distinguish, which allowed us to build his reduced state space of colours Ω.
Building an agent’s effective state space. The different states of a global space Ω are shown to an agent, who finds equivalence classes of (subjectively) indistinguishable states. Their effective state space is then the quotient space. (a) The global state space Ω consists of three bits, in the eight possible states depicted. An agent Alice can only see the first bit, therefore she cannot distinguish the states in each vertical box (her equivalence classes [000] and [100]). Her effective state space Ω=Ω/∼ has only two states, which can be relabelled as 0 and 1 for convenience. Another agent Bob identifies the equivalent classes [000] and [010], which leads us to conclude that he can only see the second bit. Note that, for example, if Alice were able to apply transformations that only change the first bit, she could not signal to Bob (because he could not detect the change). (b) Here, Ω is the space of colours, which were shown to a partly colourblind agent Marco. Marco identified the colours that he could not distinguish, which allowed us to build his reduced state space of colours Ω.The other ingredient needed to define an agent, as we saw in the Introduction, is a description of the actions available to him. As his actions may have a global impact, a minimal approach is to take them to be a submonoid of the globally allowed transformations. We discuss relaxations of this definition in §5. Generalizations of this approach can be found in [2]. There, we also study explicit ways to move between global and local views (technically, related by Galois insertions), effective theories and other properties of local agents.
Definition 2.1 (Global theory and restricted agents).
A global theory of agents is defined by a pair , where Ω (the state space) is a set and is a monoid of transformations f: Ω→Ω, with the concatenation operation °.A restricted agent
B acting within the theory is defined by a pair , where ∼ is an equivalence relation in Ω and is a submonoid of called the set of local operations of the agent. The quotient space Ω:=Ω/∼ is called the effective space of agent B. The reduction to the effective space is given by the canonical mapHaving defined the effective state space of a restricted agent, we can also see how such an agent perceives the outcome of her local actions. Namely, the effect of an action applied to a global state ρ is seen by agent B as [f(ρ)]. This has been explored in more detail in [2], and is not used in this work. In short, such an agent could then define a local theory of accessible states and actions, , where the transformations act on the reduced state space Ω asWe can always further coarse-grain the effective state space of a given agent B in order to obtain a more restricted agent C. For example, in renormalization group flow, lowering the cut-off corresponds to coarse-graining over more and more observables [11,12]. The following proposition formalizes this idea [2], prop. III.5. All proofs can be found in appendix A.
Proposition 2.2 (Nested agents).
Let
be a global theory, and B, C two restricted agents. Then the following are equivalent:(i) C has more restricted knowledge than B, that is, [ρ]⊆[ρ], ∀ ρ∈Ω,(ii) there exists an equivalence relation ∼
in B’s effective state space Ω
such that Ω≅Ω/∼.
Secrecy between agents
Secrecy
Having defined agents, we may study conditions for secrecy and non-signalling between them. Consider a set-up of two agents Alice and Bob, represented by and . Imagine that Alice wants to keep her actions (like writing a message or preparing a state) secret from Bob. This is achieved if Bob cannot tell whether she applied them, even after post-processing.[1]
Definition 3.1 (Secrecy).
We say that an agent A has access to secret operations
towards another agent B if
for all . If all actions in are secret towards B and those in are secret towards A, we say that the two agents are mutually secret.We may ask if this definition is robust enough, that is, whether further pre- or post-processing by Alice and Bob could destroy the secrecy of a choice of action . The next proposition shows that no matter how many ‘secret’ transformations in Alice implements, or how Bob acts in between to try and recover information, he will not detect any of the effects of Alice’s actions. In addition, it is easy to see that pre-processing with a global function (such as distributing entanglement between the two parties) cannot lift secrecy, as definition 3.1 requires it to hold for all initial states.
Proposition 3.2 (Robustness of secrecy).
If A has secret operations with respect to B (according to definition 3.1), then pre- and post-processing cannot lift the secrecy, that is,
for all states ρ∈Ω, secret operations and , and global operations and .
Extended secrecy
We may also ask whether Alice’s actions stay secret to Bob in the presence of an additional global transformation . Transformations, such as a subsystem swap or a communication channel, may break secrecy; others, like the use of a Popescu–Rohrlich box, do not.[2] For this situation, we define an extended notion of secrecy in the spirit of definition 3.1, which reduces to definition 3.1 in the case f=id. Here, Bob may try to post-process information before and after the global transformation.
Definition 3.3 (Extended secrecy).
Let A be an agent with access to secret operations towards an agent B, . We say that is in addition secret (towards B) in the presence of a global transformation
if
for all . We say that the agents are mutually secret in the presence of
f if all actions in are secret towards B in the presence of f and vice versa.We can now show that, analogously to proposition A.2, further pre- and post-processing by Alice and Bob cannot lift the secrecy.
Proposition 3.4 (Robustness of extended secrecy).
If an agent A only uses secret operations with respect to agent B in the presence of , then further pre- and post-processing cannot lift the secrecy, that is,
for all states ρ∈Ω, local operations and , and global operations and .In particular, for the case in which Bob only implements post-processing at the very end, proposition 3.4 implies that forms a monoid.
Corollary 3.5 (Secret monoid).
The set
of secret operations in the presence of a global function
forms a monoid, i.e.
andNaturally, if we further restrict the actions and knowledge of one of the agents (as in proposition 2.2), secrecy is maintained.
Corollary 3.6 (Restricted agents and secrecy).
Let A, B and C be three agents, such that C is more restricted than B, that is,
and [ρ]⊆[ρ], for all
ρ∈Ω.If
was secret towards A (in the presence of
), the same is true of
. If
was secret towards B (in the presence of f), it is still secret towards C (idem).
Commuting agents
Now, we explore how secrecy is affected when the actions of two agents A and B commute. This is particularly relevant in the context of the non-signalling principle, because actions at space-like separation naturally commute.
Definition 4.1 (Commuting agents).
We say that two agents A and B commute if
for all .For example, in field theory commutativity holds for measurements or field interactions at space-like separation, and this is in general how causality is recovered there [13].[3] Motivated by this, we here take the commutation of actions in space-like separated regions as a fundamental building block in deriving agents that are secret relative to each other. Note that, in particular, finding commuting sets of transformations in is something that can be done prior to definitions of local agents; this is shown explicitly in [2].[4] Commutation is also an operational property of the theory: for example, commutation is independent of the choice of reference frames in relativity and quantum field theory [13,14]. If two agents commute, secrecy follows from simpler conditions.
Proposition 4.2 (Secrecy for commuting agents).
If A and B commute, then if there exists a subset of actions
such that
,
then
is secret towards B in the presence of f. In particular, g(ρ)∼ρ for all
implies secrecy of A towards B.
Secrecy from commutation
Starting only from commutation relations on the global transformations, we can construct descriptions of local agents that have secret actions with respect to each other. More specifically, given any two commuting submonoids , we can construct equivalence relations ∼,∼ so that two agents Alice and Bob have secret actions with respect to each other.The first step is to start with transformations (‘Alice’s transformations’), and look for the most generous effective state space that is insensitive to transformations in . This will model the perspective of an agent, Bob, who cannot detect Alice’s actions.[5]
Definition 4.3 (Perspective insensitive to transformations).
Let be a submonoid of transformations. First, we define a binary relation in Ω called convergence through as
We take the transitive closure of to define the perspective insensitive to transformations
,The above construction gives us minimal restrictions for independent agents. The following theorem is adapted from [2].
Theorem 4.4 (Deriving secret agents).
Commuting submonoids
give rise to descriptions of mutually secret agentsIndeed, all agents whose actions commute with and for whom transformations in are secret must be described by a coarse-graining of (figure 3). This and related minor results can be found in appendix D. In appendix F, we generalize theorem 4.4 to extended secrecy in the presence of global functions. There, we also extend the construction of the effective spaces of two agents to the case where the two monoids of transformations do not commute: without commutation, this construction is not as simple.
Figure 3.
Three-bit example. Consider again the theory described by the state space Ω of three bits, and all transformations on those bits. (a) All operations that change the third bit (of which id and not are labelled). (b) Equivalence classes built according to definition 4.3. These correspond to the view of an agent who can only distinguish the first two bits. The equivalence relation , which coarse-grains over the functions applied to the third bit, gives us the largest effective state space relative to which functions in are secret. (c) More coarse-grained equivalence classes [x] (vertical, yellow) and [x] (horizontal, blue), corresponding to an agent A who can only distinguish the first bit and an agent B who only sees the second bit, respectively. Operations in are still secret relative to these two agents. In addition, operations on the first bit are secret towards B and vice versa. These smaller effective state spaces correspond to equivalence relations on the effective state space (as in the nested agents of proposition 2.2). The two-bit space is a common state space of A and B, including states that could be distinguished if the two agents could work together, with . (Online version in colour.)
Three-bit example. Consider again the theory described by the state space Ω of three bits, and all transformations on those bits. (a) All operations that change the third bit (of which id and not are labelled). (b) Equivalence classes built according to definition 4.3. These correspond to the view of an agent who can only distinguish the first two bits. The equivalence relation , which coarse-grains over the functions applied to the third bit, gives us the largest effective state space relative to which functions in are secret. (c) More coarse-grained equivalence classes [x] (vertical, yellow) and [x] (horizontal, blue), corresponding to an agent A who can only distinguish the first bit and an agent B who only sees the second bit, respectively. Operations in are still secret relative to these two agents. In addition, operations on the first bit are secret towards B and vice versa. These smaller effective state spaces correspond to equivalence relations on the effective state space (as in the nested agents of proposition 2.2). The two-bit space is a common state space of A and B, including states that could be distinguished if the two agents could work together, with . (Online version in colour.)
Perceived commutation from secrecy
We can now ask if the actions of two mutually secret agents must always commute. The answer is no, not at a global level: unbeknown to the two agents, their actions could affect other degrees of freedom of the global theory. This can become relevant when the actions of two agents affect a common environment that is not directly accessible to them but could be recovered by a third party.For example, consider again the state space of three bits, where Alice can only see the first bit and Bob the second. Now imagine that Alice has access to all the transformations that change the first bit and, as a side effect, reset the third bit to 0, while Bob has access to all the actions that act on the second bit and, as a side effect, flip the third bit. From a global viewpoint, their actions do not commute. However, for someone who only had access to the combined knowledge of Alice and Bob (the first two bits), their actions would appear to commute. For such an agent, only local time ordering of Alice and Bob’s actions matters, as the two processes f°f and f°f are indistinguishable. This is yet another example of how subsystems and local descriptions represent simplified pictures of the global theory, reducing the degrees of freedom of the theory to an operational minimum for a given agent, who in this case would not need to model global time ordering.
Applications
In the previous sections, we have shown how to derive a notion of locality within a global theory starting from a primitive notion of individual agents, and their observed secrecy and commutation relations.The operational approach laid out here has the advantage of carrying very few assumptions about the underlying physical theory. For example, it goes to a higher level of abstraction than generalized probability theories by not taking for granted that all agents express their knowledge in terms of reliable (classical) statistics about the outcomes of measurements.Our notion of effective state spaces captures the concept of beables of a theory: aspects (or classes) of states that can in fact be physically observed and distinguished [3,16]. Our approach highlights that beables are observer-dependent: for example, what appears to be a gauge may turn out to be only a local gauge [3], and the same applies to ‘global’ phases of quantum states or yet-to-be-discovered microscopic details of some structure. We can never rule out the existence of a more refined underlying theory, but with effective state spaces we can tailor the descriptions used in a theory to the level of detail needed for a particular application. This goes in the direction of the work of Colbeck & Renner [17], who showed that quantum theory is complete for the task of guessing measurement outcomes, and further refinements would be irrelevant.As presented here, our framework simplifies the modelling of agents for the pedagogical purpose of highlighting the advantages of this general direction. In appendix C, we show how one could relax some of our assumptions to model agents that are limited in time or who can only approximately distinguish states. In the following, we discuss further applications and relation to other work.
Non-signalling
One natural application of our extended notion of secrecy is the traditional non-signalling condition. To see this, imagine that the two agents are cooperating, so that Alice is trying to communicate information to Bob by means of some action on her side. Bob can now either directly apply post-processing , or he can wait for some time to pass, as represented by a function that implements global time evolution over time t. If Alice and Bob are mutually secret in the presence of u, for all t≤T, we conclude that they cannot signal to each other in this time window.In appendix E, we show explicitly how our notion of extended secrecy implies traditional non-signalling in the framework of generalized probabilistic theories [18,19] for the case of two parties performing binary measurements (two inputs, two outputs on each side), where the state space consists of probability distributions over outcomes of possible measurements on physical systems. The generalization to finitely many inputs and outputs is straight forward.
Reconstructing space–time
Building on the example above, if two agents cannot signal in the presence of u for t≤T and in addition can signal in the presence of u for t>T, this can be used to define a distance between the two agents, via d∝T. The proportionality constant can be interpreted as the speed of signal propagation, for example the speed of light.The challenge to obtaining a meaningful distance is two-fold: firstly, choosing a ‘natural’ family of transformations {u} to represent time evolutions, and secondly, choosing a family of agents that do not conflate different types of coarse-grainings. For example, locality and macroscopicity each give rise to a natural notion of distance, relating to the space between agents and to precision of observation, respectively; the latter could be used to quantify chaos given a family of time evolutions.More generally, we can try to use signalling between agents to infer properties of space–time of a given theory, as illustrated in figure 1. Some steps in this direction have been given, for example, in [3,20,21]. This would be of particular interest in the context of field theories [10,22,23]. We leave the generalization of the operational approach depicted in figure 1 to reconstruct position as future work.
Relation to modular approaches
Our global approach complements modular, bottom-up constructions [24], like process theories based on symmetric monoidal categories [5-8,25]. For the purpose of comparison with our work, modular theories can be understood as theories of individual systems (or ‘objects’) and local actions (processes) on those systems, which allow for parallel and sequential composition of processes on different systems. Typically, they assume the following. (1) Processes with matching output and input systems can be composed sequentially. That is, a process f:A→A′ can be composed with a process g:A′→A′′, to form a new process g°f:A→A′′ satisfying
(figure 4a). (2) Any two systems A and B can be combined in parallel to form a composite system denoted by A⊗B. (3) Any two processes f:A→A′ and g:B→B′ can be composed to yield a process f⊗g:A⊗B→A′⊗B′ satisfying
(figure 4b). This last assumption implies that processes act locally without disturbing other systems, and that actions on independent systems always commute. This allows us to represent process theories in terms of diagrams that can be easily composed (figure 4).
Figure 4.
Process theories. Processes theories are modular, bottom-up constructions that can be faithfully represented by diagrams [5–8,25]. Lines represent systems (or ‘objects’) and boxes processes on systems: wires fed in from below a box can be understood as inputs to the process, while wires coming out of the top represent the outputs of the process. Diagrams can be composed due to the strong subsystem structure imposed on process theories, where actions are not seen as affecting the global space but explicitly associated with local systems. (a) Processes can be composed in sequence when their output and input systems match. (b) Processes can be composed in parallel on combined systems. (c) Discarding a subsystem (e.g. taking the partial trace) is indicated by three horizontal lines; in our approach this corresponds to coarse-graining over the relevant degrees of freedom (that is, going to a smaller effective space). Other conditions can be imposed: e.g. in [7], causal loops are forbidden, and outputs are always connected to inputs. (Online version in colour.)
Process theories. Processes theories are modular, bottom-up constructions that can be faithfully represented by diagrams [5-8,25]. Lines represent systems (or ‘objects’) and boxes processes on systems: wires fed in from below a box can be understood as inputs to the process, while wires coming out of the top represent the outputs of the process. Diagrams can be composed due to the strong subsystem structure imposed on process theories, where actions are not seen as affecting the global space but explicitly associated with local systems. (a) Processes can be composed in sequence when their output and input systems match. (b) Processes can be composed in parallel on combined systems. (c) Discarding a subsystem (e.g. taking the partial trace) is indicated by three horizontal lines; in our approach this corresponds to coarse-graining over the relevant degrees of freedom (that is, going to a smaller effective space). Other conditions can be imposed: e.g. in [7], causal loops are forbidden, and outputs are always connected to inputs. (Online version in colour.)Our approach is more general in that we do not assume the strong subsystem structure imposed by conditions (2) and (3). As such, our work strengthens Coecke et al.’s [7] argument that non-signalling can be derived from a simpler condition (appendix B). In general, our top-down view can be taken as a precursor and sanity check for process theories. In complex global theories, a strong subsystem structure may not be clear-cut from the start. The cautious researcher can first use our approach to test different reduced descriptions for independence conditions. If she succeeds in finding independent effective spaces—which is not always possible—she may then frame them as subsystems and attempt a modular construction.At a conceptual level, our approach gives a global interpretation to aspects of process theories that are more epistemic than physical. For example, if we think of subsystems as building blocks of a global space, it appears natural to see ‘discarding a subsystem’ as a physical action, like throwing away a piece of Lego (figure 4c). However, if we start from the global space and see subsystems as arbitrary restricted descriptions, then ‘discarding a subsystem’ corresponds to a coarse-graining over the relevant degrees of freedom (for example, going from Ω to an effective space Ω), a change of perspective rather than a physical transformation.
Relation to causal structures
Our notion of secrecy between agents is analogous to causal independence between events in graphs used to study causality in physics. Causal structures [1,26-30] try to capture the causal relations between events within a larger context (figure 5). Both causality (as expressed by Reichenbach’s principle) and secrecy are guiding principles of a certain way of representing a theory (causal structures and restricted agents, respectively) that help us understand a complex situation—they are not necessarily fundamental features of the laws of Nature. How useful the representation is depends both on the guiding principle and on the choice of variables of interest (like events or agents).
Figure 5.
Causal structures. (a) In classical causal models, nodes are associated with random variables corresponding to events, while arrows carry causal influence, as specified by conditional probability distributions like P. These models and distributions may be extended if one later learns of additional causes, like λ. (b) A model for quantum causal structures proposed in [31], where each node is associated with the intervention of an agent in a local space. A node i is represented by input and output Hilbert spaces, H and , and by a quantum instrument that links the two and corresponds to the agent’s intervention (for example, could be a local measurement followed by a local preparation depending on the outcome). Causal influence is explicitly carried by quantum maps like , which acts like a channel from A to BC. (Online version in colour.)
Causal structures. (a) In classical causal models, nodes are associated with random variables corresponding to events, while arrows carry causal influence, as specified by conditional probability distributions like P. These models and distributions may be extended if one later learns of additional causes, like λ. (b) A model for quantum causal structures proposed in [31], where each node is associated with the intervention of an agent in a local space. A node i is represented by input and output Hilbert spaces, H and , and by a quantum instrument that links the two and corresponds to the agent’s intervention (for example, could be a local measurement followed by a local preparation depending on the outcome). Causal influence is explicitly carried by quantum maps like , which acts like a channel from A to BC. (Online version in colour.)Let us illustrate this. In classical causal graphs, events are represented by random variables, in principle subject to intervention (figure 5a). As we move from purely classical scenarios to more physical situations, like those involving quantum measurements, the formalism of causal structures is evolving to focus on agents and on explicit physical transformation as carriers of causal influence, similarly to our approach. For example, in the quantum causal structures of [31], events can correspond to quantum systems where agents can act locally (figure 5b). Generally speaking, ‘events’ embody a particular coarse-graining of a global picture into variables or subsystems of interest. As such, a single causal graph cannot reveal all the features of a complex theory—a different decomposition may explore new causal relations.[6] The choice of relevant nodes can be guided by https://plato.stanford.edu/entries/operationalism/: (i) we start by picking ‘variables’ that we care about (like the outcomes of an experiment, or a subsystem corresponding to the perspective and range of intervention of an agent); (ii) we then use Reichenbach’s principle and independence conditions to complete the causal graph, by identifying further nodes and constraining the channels between them.[7] This procedure is similar in spirit to how in the present work we could start with the description of a few agents and use secrecy and commutation constraints to identify other subspaces and transformations of interest, or build a notion of locality. How successful we are in this endeavour depends largely on the (subjective) starting point—a poor initial choice of events or agents could make it impossible to find a meaningful causal graph or independent agents.Even with a clever choice of initial variables, it could be that the guiding principle is not powerful enough to provide meaningful representations for all physical situations. This is likely to be the case in both approaches, which are still rooted in classical intuitions—resulting in concepts like agents, Reichenbach’s principle and time order. In trying to explain a physical scenario in terms of these classical notions, we risk running into paradoxes such as the inconsistencies between quantum agents in [32]. It remains to explore whether both our approach and causal models can handle this kind of physical challenge, and whether extensions to cover them would still be intuitive enough to help us make sense of the world.
Authors: Lluís Masanes; Markus P Müller; Remigiusz Augusiak; David Pérez-García Journal: Proc Natl Acad Sci U S A Date: 2013-09-23 Impact factor: 11.205