1. Introduction
Computation is a physical process. Three mature pillars constrain its cost: (i) Landauer’s principle lower-bounds dissipated heat for logically irreversible steps; (ii) quantum speed limits (QSL) lower-bound the time to traverse distinguishable quantum states given available energy; and (iii) the Bekenstein bound upper-bounds information capacity for finite-energy systems in bounded regions. We show how to combine these, with no additional heuristic approximations, into two explicit inequalities that jointly forbid the simultaneous minimization of space, time, exported entropy, and energy for nontrivial computations.
A central contribution is the introduction of three
well-defined complexity parameters for a function
at target error
: (1) the
reversible working-set , (2) the
forced erasures under S space , and (3) the
orthogonalization depth . We formalize these in
Section 2, relate them to classical/quantum complexity notions, and prove the lemmas needed to derive the main result.
Physical regime and simultaneous applicability
Our derivations hold for devices satisfying:
- (R1)
Thermal bath: Coupling to an environment at temperature
T (near equilibrium) so that Landauer applies to logically irreversible operations [
1,
5,
6,
7].
- (R2)
Quantum dynamics: The device evolution over runtime
can be modeled by a (possibly open-system) CPTP map with well-defined average energy above ground
; we use QSLs valid for closed or Markovian/non-Markovian dynamics [
8,
9,
10,
11,
12].
- (R3)
Bounded geometry and weak gravity: Degrees of freedom are essentially confined to a ball of radius
R, with total energy well below the gravitational-collapse threshold (
), so Bekenstein’s bound controls information capacity [
13,
14,
15].
These conditions are commonly met in laboratory and technological settings; therefore the three primitive bounds are consistent and simultaneously applicable.
2. Definitions of the Complexity Parameters
Let and target worst-case error . Computations are implemented by families of physical processes indexed by input acting on a working medium; mathematically, by CPTP maps over whose induced input-output relation approximates f.
Definition 1 (Reversible working-set
).
Consider all logically reversible
implementations of f with error , i.e., injective encodings and a final clean-up that restores ancillae while outputting (Bennett’s method). For each such implementation, let be the peak number of information-bearing bits
(IBBs) that are simultaneously logically live
(i.e., their value is needed by some future reversible step). Then
Remarks. This is the reversible pebbling number of a computation DAG for
f [
3,
20,
21]. It is finite for all computable
f; constructive reversible simulations ensure existence.
Definition 2 (Forced erasures under space
S:
).
Fix a space budget S (IBBs). Over all
(reversible or irreversible) implementations of f with error that never exceed S live IBBs, let G be the total number of logically irreversible bit erasures performed. Then
Definition 3 (Orthogonalization depth
).
Let be the device state (possibly mixed) at time t given input x. For a pair of inputs with , define the Bures angle
(quantum Fubini–Study distance for mixed states)
where F is the Uhlmann fidelity. Let be the minimal geodesic length (in Bures angle) a valid implementation must traverse between and some that produces an ε-accurate output and likewise for y. Then define
Remarks.
corresponds to orthogonality; thus
counts, in units of “orthogonalization-length,” how many decisively distinguishable transitions are
unavoidably required for worst-case inputs. In circuit models,
lower-bounds depth; in decision trees,
lower-bounds the number of decisive queries; in quantum models,
relates to adversary/Hybrid-argument lower bounds [
22,
23]. Well-definedness follows since
is finite for CPTP paths and the supremum is over a finite domain.
Relationships and computability (high level)
3. Key Lemmas
Lemma 1 (Space-deficit forces erasure).
For any f and ε, and space budget S, one has
Proof. Consider a reversible implementation achieving
. If
, history can be retained and uncomputed with
. If
, at some peak step at least
logically live bits must be discarded to remain within budget
S. Any such discard is a logically irreversible many-to-one map on IBBs, contributing at least one bit erasure. Taking the infimum over all implementations yields the bound. This is the standard reversible pebbling trade-off [
3,
20,
21]. □
Lemma 2 (Landauer dissipation).
At temperature T, any logically irreversible bit erasure exports at least heat to the environment. Therefore,
Lemma 3 (Quantum speed limit as step-count bound).
Let be the average available energy above ground over runtime τ. For any implementation of f with worst-case orthogonalization-depth ,
Proof. For closed systems, concatenate
minimal orthogonalizations; each requires time at least
by Margolus–Levitin; additivity yields the bound. For open systems, use mixed-state QSLs (e.g., Deffner–Lutz; Taddei et al.; del Campo et al.) on the Bures angle, noting that orthogonalization corresponds to angle
; summing
segments gives the same scaling (constants may vary but only by universal factors) [
10,
11,
12]. □
Lemma 4 (Bekenstein information-capacity).
For degrees of freedom essentially confined in radius R with total energy ,
Equivalently,
4. Deriving the Combined STEH Inequalities
We now show the algebraic steps explicitly.
Step 1: Eliminate from the QSL
Apply Lemma 4 (lower bound on
given
S and
R):
Step 2: Product bound for
This completes the explicit derivation of the two combined STEH inequalities. □
5. Examples and Sanity Checks
AND of n bits.
Reversible working set ; orthogonalization depth . For , (Lemma 1) hence and .
GEMM ().
Known I/O lower bounds imply
live tiles; the arithmetic workload gives
decisive updates [
16,
17,
18,
19]. Therefore
, matching communication-optimal scaling (up to constants and logs).
FFT (N).
and by circuit-depth arguments; thus .
6. Assumptions, Scope, and Limitations
Simultaneous applicability. Conditions (R1)–(R3) delineate when Landauer, QSL, and Bekenstein can be applied together: (i) near-equilibrium thermalization for irreversible steps; (ii) CPTP dynamics with well-defined average energy; (iii) weak gravity and effective confinement within radius R. These cover standard digital/quantum platforms (CMOS, superconducting/ion, nanomechanical).
Model idealizations. The constants in QSLs vary among formulations (Margolus–Levitin vs. Mandelstam–Tamm vs. mixed-state extensions); our constants are chosen conservatively, and any version yields the same
scaling and the same algebraic combination. Bekenstein’s bound has modern reformulations via relative entropy; any such form provides an
–
S trade-off suitable for our derivation [
15]. Landauer has repeated experimental support [
6,
7].
What is not claimed. We do not claim tightness of constants for specific hardware, nor do we assume a specific gate library. The theorem is agnostic to architecture and applies to any implementation achieving the input-output relation.
7. Conclusions
We provided precise definitions for the complexity parameters
, proved the lemmas linking them to Landauer, QSL, and Bekenstein, and derived combined STEH inequalities (
3)–(
5) step-by-step. The result formalizes the impossibility of driving
all of (space, time, exported entropy, energy) to zero in nontrivial computation, and it recovers communication lower bounds for fundamental tasks. The STEH framework offers a quantitative checklist for evaluating algorithms against absolute physical limits.
Author Contributions
Sole author: conceptualization, formal analysis, methodology, and writing.
Funding
No external funding was received for this work.
Data Availability Statement
No new data were generated or analyzed in this study.
AI Assistance Statement
Language and editorial suggestions were supported by AI tools; the author takes full responsibility for the content.
Acknowledgments
The author thanks the Octonion Group research team for valuable discussions and computational resources. Special recognition goes to the broader computational complexity and quantum computing communities whose foundational work made this synthesis possible.
Conflicts of Interest
The author declares no conflicts of interest.
References
- R. Landauer, “Irreversibility and heat generation in the computing process,” IBM J. Res. Dev. 5, 183–191 (1961). [CrossRef]
- C. H. Bennett, “Logical reversibility of computation,” IBM J. Res. Dev. 17, 525–532 (1973). [CrossRef]
- C. H. Bennett, “Time/space trade-offs for reversible computation,” SIAM J. Comput. 18(4), 766–776 (1989). [CrossRef]
- Lecerf, Y. Machines de Turing réversibles. Récursivité et complexité. Comptes Rendus 1963, 257, 2597–2600. [Google Scholar]
- C. H. Bennett, “Notes on Landauer’s principle, reversible computation, and Maxwell’s Demon,” Stud. Hist. Phil. Mod. Phys. 34, 501–510 (2003). [CrossRef]
- A. Bérut et al., “Experimental verification of Landauer’s principle linking information and thermodynamics,” Nature 483, 187–189 (2012). [CrossRef]
- Y. Jun, M. Y. Jun, M. Gavrilov, and J. Bechhoefer, “High-precision test of Landauer’s principle in a feedback trap,” Phys. Rev. Lett. 113, 190601 (2014). [CrossRef]
- L. Mandelstam and I. Tamm, “The uncertainty relation between energy and time in nonrelativistic quantum mechanics,” J. Phys. (USSR) 9, 249 (1945).
- N. Margolus and L. B. Levitin, “The maximum speed of dynamical evolution,” Physica D 120, 188–195 (1998). [CrossRef]
- S. Deffner and E. Lutz, “Quantum speed limit for non-Markovian dynamics,” Phys. Rev. Lett. 111, 010402 (2013). [CrossRef]
- M. M. Taddei, B. M. Escher, L. Davidovich, and R. L. de Matos Filho, “Quantum speed limit for physical processes,” Phys. Rev. Lett. 110, 050402 (2013). [CrossRef]
- A. del Campo, I. L. Egusquiza, M. B. Plenio, and S. F. Huelga, “Quantum speed limits in open system dynamics,” Phys. Rev. Lett. 110, 050403 (2013). [CrossRef]
- J. D. Bekenstein, “Universal upper bound on the entropy-to-energy ratio for bounded systems,” Phys. Rev. D 23, 287–298 (1981). [CrossRef]
- R. Bousso, “The holographic principle,” Rev. Mod. Phys. 74, 825–874 (2002). [CrossRef]
- H. Casini, “Relative entropy and the Bekenstein bound,” Class. Quantum Grav. 25, 205021 (2008). [CrossRef]
- J. W. Hong and H. T. Kung, “I/O complexity: The red-blue pebble game,” in Proc. STOC (1981). [CrossRef]
- G. Ballard, J. Demmel, O. Holtz, and O. Schwartz, “Communication-optimal parallel and sequential Cholesky, LU, and QR factorizations,” SIAM J. Sci. Comput. 34(1), A206–A239 (2012). [CrossRef]
- D. Irony, S. Toledo, and A. Tiskin, “Communication lower bounds for distributed-memory matrix multiplication,” J. Parallel Distrib. Comput. 64(9), 1017–1026 (2004). [CrossRef]
- J. Demmel, L. Grigori, M. Hoemmen, and J. Langou, “Communication-avoiding Krylov subspace methods,” SIAM Rev. 55(1), 30–69 (2013). [CrossRef]
- H. Buhrman, P. Tromp, and P. Vitányi, “Time and space bounds for reversible simulation,” J. Comput. Syst. Sci. 63, 204–221 (2001). [CrossRef]
- K.-J. Lange, P. McKenzie, and A. Tapp, “Reversible space equals deterministic space,” J. Comput. Syst. Sci. 60(2), 354–367 (2000). [CrossRef]
- A. Ambainis, “Quantum lower bounds by quantum arguments,” J. Comput. Syst. Sci. 64(4), 750–767 (2002). [CrossRef]
- M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, 10th Anniversary Ed., Cambridge Univ. Press (2010).
- S. Lloyd, “Ultimate physical limits to computation,” Nature 406, 1047–1054 (2000). [CrossRef]
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).