Preprint
Article

This version is not peer-reviewed.

Mathematical Rigorization of Quantum Information Ontology: Establishing a Research Program for “Quantum Information Set Theory”

Submitted:

04 September 2025

Posted:

05 September 2025

You are already at the latest version

Abstract
This paper proposes a research program aimed at exploring the possibility of establishing a rigorous mathematical foundation for quantum information ontology. We systematically study the path of incorporating the entanglement structure of κ-qubit networks into an extended set-theoretic framework. Based on the principles of Jiuzhang Constructive Math ematics (JCM), we explore the conceptual foundations of constructing a Quantum Informa tion Set Theory (QIST). This paper provides an in-depth analysis of the mathematical and physical challenges faced by this attempt, establishes close connections with fields such as quantum logic, Boolean-valued models, categorical quantum mechanics, and the holographic principle, and proposes a roadmap for its gradual realization. We pay special attention to the dual role of the κ parameter (as a mathematical scale parameter and a physical constant) and its key role in connecting mathematical structures with physical reality. Although a complete theory has not yet been established, this paper provides a systematic research framework and a clear direction for the mathematical rigorization of quantum information ontology.
Keywords: 
;  ;  ;  ;  ;  ;  ;  

1. Introduction

1.1. Research Background and Motivation

The physical ontology from the perspective of quantum information is undergoing a profound transformation, gradually shifting from a triadic framework of “matter-energy-spacetime” to a monistic framework centered on quantum information. This paradigm shift is fully reflected in cutting-edge research such as the holographic principle [1], entanglement spacetime [2], and quantum error-correcting codes [3]. However, this emerging paradigm lacks a solid mathematical foundation, especially a systematic connection to foundational mathematical frameworks such as set theory.

1.2. Contributions and Positioning

This paper aims to:
  • Propose a research program for Quantum Information Set Theory (QIST), clarifying its mathematical foundations and physical correspondences.
  • Systematically analyze the theoretical and technical challenges of incorporating quantum entanglement structures into a set-theoretic framework.
  • Establish deep connections with existing theories such as quantum logic, category theory, and topological quantum field theory.
  • Propose a gradual path and specific research directions to achieve this goal.
This paper is explicitly defined as a research program rather than a mature theory, objectively assessing current progress and future challenges.

1.3. Structure

Section 2 reviews relevant theoretical foundations; Section 3 proposes the mathematical foundation of the QIST framework; Section 4 analyzes physical correspondences; Section 5 discusses the path to realization; Section 6 summarizes future research directions.

2. Theoretical Foundations and Related Work

2.1. Quantum Logic and Quantum Set Theory

Quantum logic was pioneered by [4]. [5] developed quantum set theory on this basis, constructing mathematical models by adopting quantum logic as the underlying logic in ZFC. These works provide an important foundation for quantum information set theory:
Definition 1
(Quantum-valued Model). A quantum-valued model consists of:
  • A classical set-theoretic universe V
  • A complete Boolean algebra B
  • A valuation function · : V × V B
where x y and x = y satisfy specific definability conditions.
Compared to Takeuti’s work, the innovation of QIST lies in introducing constraints of physical operability (through JCM principles) and explicitly incorporating entanglement structures into the set-theoretic framework.

2.2. Categorical Quantum Mechanics

The categorical quantum mechanics developed by [6] provides a high-level abstraction for quantum information:
Definition 2
(Compact Closed Category). A symmetric monoidal category ( C , , I ) is compact closed if every object A has a dual A * , and satisfies:
ev A : A * A I , coev A : I A A *
with appropriate snake equations.

2.3. Holographic Principle and Quantum Error Correction

The holographic principle [7] and quantum error-correcting codes [3] provide a framework for the emergence of spacetime:
Theorem 1
(RT Formula). For a boundary subregion A, its entanglement entropy is:
S ( A ) = Area ( γ A ) 4 G N
where γ A is the minimal surface.

2.4. Other Related Theories

[8]’s axiomatic approach to quantum theory provides a new perspective on quantum foundations. [9]’s relational quantum mechanics offers an alternative ontological interpretation. [10]’s cellular automaton interpretation explores underlying information processing mechanisms for quantum phenomena.

3. Mathematical Framework of Quantum Information Set Theory

3.1. Basic Definitions and Axiom System

3.1.1. Strict Definition of Quantum Set

Inspired by Takeuti’s quantum set theory, we define:
Definition 3
(Quantum Set). A quantum set is a function A : V B , where B is a complete Boolean algebra, satisfying:
x V such that A ( x ) 0
Definition 4
(Quantum Elementhood Relation). For two quantum sets A, B, define:
A B = x V ( B ( x ) A = x )

3.1.2. Axiom System Based on Boolean-Valued Models

We adopt the Boolean-valued model approach to extend ZFC:
Axiom 5
(Quantum Extensionality Axiom).
x ( x A x B ) A = B
Axiom 6
(Quantum Pairing Axiom).
C x ( x C ( x = A x = B ) ) = 1
These axioms are independent and consistent with the standard ZFC axioms, maintaining mathematical rigor.

3.2. Formal Expression of JCM Principles

3.2.1. Domain Restriction Principle

Definition 7
(Physical Domain). The physical domain D κ is defined as:
D κ = { x V B complexity ( x ) exp ( κ 1 / 2 ) }
where complexity is defined using Kolmogorov complexity, measuring the minimal computational resources required to describe x.

3.2.2. Operational Finitization Principle

Theorem 2
(Operational Complexity Bound). For any physically realizable operation f : D κ D κ , its computational complexity is bounded:
T ( f ) κ 1 / 4 · size ( x )

3.3. Categorical Formulation of κ -Qubit Networks

3.3.1. Monoidal Category Formulation of Entanglement Structure

We formulate the κ -qubit network as a compact closed category:
Definition 8
( κ -Network Category). The κ-network category C κ is a compact closed category where:
  • Objects are finite-dimensional Hilbert spaces
  • Morphisms are completely positive trace-preserving maps
  • The tensor product represents spatial entanglement structure

3.3.2. Categorical Foundation of Quantum Graph Theory

Definition 9
(Quantum Graph). A quantum graph is an object G in C κ equipped with a symmetric morphism:
E : G G I
representing the entanglement relation.

3.4. Extension to Set-Theoretic Description of Many-Body Entanglement

3.4.1. Set-Theoretic Formulation of Quantum Graph States

Taking the N-qubit cluster state as an example, its quantum set formulation can be extended as: - Definition: The cluster state quantum set C N satisfies C N = i = 1 N | + i i , j C Z i , j , where C Z i , j is the controlled-Z gate. - Entanglement entropy derivation: For a subregion A, its entanglement entropy is:
S ( A ) = κ · A + κ 1 / 2 2 log 2 N A + O ( 1 )
where N A is the number of boundary qubits of A, and the correction term originates from the topological contribution of many-body boundary entanglement. - Topological order correlation: Introducing the Z 2 vortex operator W p = i p X i (where p is a lattice face), the quantum elementhood relation W p C N characterizes topological order, satisfying W p = 1 (topologically trivial) or W p = 1 (topologically non-trivial).

3.4.2. Set-Theoretic Axiom Supplement for Entanglement Topological Order

New axioms characterizing topological defects: - Axiom 3.3 (Topological Conservation Axiom): For any closed surface Σ ,
p Σ W p = ( 1 ) χ ( Σ ) = 1
where χ ( Σ ) is the Euler characteristic of Σ , ensuring conservation of topological charge. - Linkage with quantum elementhood relation: The Z 2 vortex corresponds to non-local elements of the quantum set, satisfying x W p = 1 2 ( 1 + ( 1 ) n x ) , where n x is the winding number of x around the vortex.

3.5. Consistency with Standard Set Theory

Theorem 3
(Relative Consistency). If ZFC is consistent, then QIST is consistent.
Proof. 
By constructing a Boolean-valued model for QIST within ZFC, where truth values are taken in a complete Boolean algebra B. Specifically, we define:
V B = { x : V B B x is a function }
and define the corresponding elementhood and equality relations. The consistency proof relies on the completeness of B and standard model-theoretic techniques of ZFC, particularly using forcing methods to maintain the compatibility of the axiom system. □

4. Physical Correspondence and Operational Realization

4.1. Mathematical Description of Physical Phenomena

4.1.1. Derivation of Set-Theoretic Formulation of Entanglement Entropy

We derive the set-theoretic formulation of entanglement entropy starting from small-scale systems. Consider a two-qubit system with quantum sets A, B; the entanglement entropy can be derived through the following steps:
Lemma 1.
For a two-qubit system, the quantum elementhood relation satisfies:
A B = 1 2 ( 1 + ψ A | ψ B )
Proof. 
This follows directly from the definition of the quantum elementhood relation and the properties of quantum state inner products. □
Theorem 4
(Set-Theoretic Formulation of Entanglement Entropy). For a subsystem described by quantum set A, its entanglement entropy is:
S ( A ) = Tr ( ρ A ln ρ A ) = κ · A + O ( κ 1 / 2 )
where A is the truth value of quantum set A.
Derivation outline
By decomposing the system into entangled modules, each module contributes κ · A to the entropy, with the remaining terms coming from inter-module entanglement. □

4.1.2. Categorical Interpretation of Metric Emergence

Combining AdS/CFT duality and quantum error correction theory, we derive the emergence mechanism of spacetime metric from the κ -network entanglement structure:
Lemma 2.
In the AdS/CFT framework, the evolution operator U of the boundary CFT relates to the bulk spacetime metric:
U = P exp i H CFT d t
Theorem 5
(Metric Emergence Formula). The spacetime metric emerges from the κ-network entanglement structure as:
g μ ν = 2 κ Re [ tr ( U μ U · U ν U ) ] + O ( κ 3 / 2 )
where U is the unitary evolution operator of the κ-network.
Derivation outline
Using the geometric interpretation of quantum error-correcting codes, map boundary evolution to changes in bulk spacetime geometry. □

4.2. Details on Metric Emergence and Quantum Error Correction

4.2.1. Explicit Correspondence Between κ -Network and Surface Code

- Bit mapping: κ -bits map to data qubits of the surface code, with the entanglement morphism E corresponding to stabilizer measurement operators (e.g., A v = j star ( v ) X j ). - Physical meaning of metric correction: The correction term O ( κ 3 / 2 ) originates from the defect energy of the surface code:
Δ g μ ν E d κ 3 / 2 log ϵ
where E d is the defect binding energy and ϵ is the encoding error. - Threshold behavior: When κ > κ c (critical value), metric emergence is smooth; when κ < κ c , spacetime foam appears (quantum error correction fails).

4.2.2. Correspondence Between Quantum Error Correction and AdS/CFT

- Boundary-bulk correspondence: Stabilizer measurements of the surface code correspond to local operators in the CFT, and the unitary evolution U of the κ -network corresponds to the path integral of the boundary Hamiltonian H CFT . - Metric derivation steps:
  • Map the surface code to a hyperbolic disk (AdS2 space) via the Tanner graph;
  • Use the RT formula to infer the bulk metric from boundary entanglement entropy;
  • Substitute the unitary evolution operator U = e i H CFT t to obtain the explicit form of the metric.

4.3. Theoretical Basis for Experimental Connection

Based on the QIST framework, we can propose the following testable research directions: 1. Novel entanglement measures: Develop entanglement measurement methods based on quantum set theory, predicting new violation forms of Bell’s inequality:
B QIST = 2 + ϵ ( κ )
where ϵ ( κ ) is a κ -dependent correction term that can be verified through precision measurements. 2. Spacetime fluctuation predictions: Derive observable spacetime fluctuation characteristics from the metric emergence formula:
Δ g μ ν κ 1 / 2
Compare with gravitational wave observation data (e.g., from the LISA mission). 3. Quantum computational complexity: Based on the operational finitization principle, predict fundamental complexity bounds for quantum algorithms:
T min κ 1 / 4
Verifiable through quantum processor experiments.

5. Path to Realization and Challenges

5.1. Phased Goals

5.1.1. Phase 1: Foundational Mathematics Construction (1-2 years)

  • Complete the Boolean-valued model construction of quantum set theory, integrating JCM principles.
  • Establish correspondence with existing quantum logic systems.
  • Develop a rigorous foundation for quantum graph theory.

5.1.2. Phase 2: Establishment of Physical Correspondence (2-3 years)

  • Map standard quantum mechanical phenomena to the QIST framework, verifying compatibility in the low-energy limit.
  • Develop set-theoretic descriptions of quantum gravity phenomena, including the black hole information paradox.
  • Establish mathematical formulations of experimentally observable quantities.

5.1.3. Phase 3: Full Theoretical Integration (3-5 years)

  • Achieve complete compatibility between QIST and ZFC, proving axiom independence.
  • Develop set-theoretic formulations of quantum field theory, verifying compatibility with the Standard Model.
  • Provide set-theoretic solutions to quantum gravity problems.

5.2. Refined κ Experimental Calibration Scheme

5.2.1. Superconducting Quantum Processor Experiment (Surface Code Scheme)

- Device and noise model: Use IBMQ Kolkata processor (27 qubits) with injected amplitude damping noise ( T 1 = 100 μ s ) and dephasing noise ( T 2 = 80 μ s ). - Logical error rate fitting: Measure logical error rate δ L through noise injection, fitting the formula:
δ L = δ 0 exp ( κ 1 / 3 ) + A · κ 1 / 2
where δ 0 is the physical error rate and A is the topological contribution factor. - κ inversion steps:
  • Measure δ L at different noise intensities;
  • Fit the linear relationship between log δ L and κ 1 / 3 using least squares;
  • Extract κ from the slope, with expected value κ = 118 ± 25 .

5.2.2. LISA Gravitational Wave Data Inversion Scheme

- Black hole quasinormal mode corrections: For a black hole of mass M, the quasinormal mode frequency correction is:
Im ( ω 220 ) = 1 4 π M 1 1 4 κ 1 / 2 + B · κ 1
where B is the loop quantum gravity correction term (estimated B 0.3 ). - Data inversion process:
  • Extract black hole merger ringdown signals from LVK O4 data;
  • Perform Bayesian fitting of Im ( ω 220 ) with prior κ [ 50 , 200 ] ;
  • Constrain the posterior distribution of κ by combining multiple events (e.g., GW150914, GW190521).
- Expected sensitivity: 10 events with signal-to-noise ratio > 20 can constrain Δ κ / κ < 15 % .

5.3. Decomposed Phase Targets for Set-Theoretic Quantum Field Theory

5.3.1. Free Field Theory Phase (2026 Milestone)

- Goal: Complete the set-theoretic formulation of the free scalar field ϕ ( x ) . - Key steps: - Map field modes a ^ k to quantum sets A k satisfying A k = n k (particle number expectation); - Derive the quantum elementhood relation from the commutation relation [ a ^ k , a ^ k ] = δ k k :
A k A k = δ k k + O ( κ 1 / 2 )
- Verify that the two-point function ϕ ( x ) ϕ ( y ) agrees with standard QFT.

5.3.2. Fermionic Field Phase (2028 Milestone)

- Goal: Extend to Dirac fields ψ ( x ) , addressing anticommutation relations. - Approach: - Introduce Grassmann-valued quantum sets Ψ satisfying Ψ i Ψ j = Ψ j Ψ i ; - Encapsulate spin statistics using super-quantum sets.

5.3.3. Gauge Field Phase (2030 Milestone)

- Goal: Achieve set-theoretic modeling of non-Abelian gauge fields (e.g., Yang-Mills fields). - Challenges: Set-theoretic formulation of gauge redundancy and ghost fields. - Alternative approaches: - Adopt BRST quantum sets, introducing ghost quantum sets C satisfying C C = 0 (Grassmann oddness); - Constrain quantum elementhood relations through gauge-fixing conditions.

5.4. Major Challenges and Countermeasures

5.4.1. Challenge 1: Mathematical Rigor

Problem: The probabilistic interpretation of the quantum elementhood relation conflicts with classical set theory. Strategy: Adopt the Boolean-valued model approach to maintain compatibility with classical set theory while developing new set-theoretic axioms suitable for quantum properties. Establish joint working groups of mathematicians and physicists to regularly review the mathematical foundations.

5.4.2. Challenge 2: Physical Realizability

Problem: Lack of a clear mechanism for the physical interpretation and numerical determination of κ . Strategy: Determine the physical meaning of κ through: - Connection with quantum computational complexity theory: κ log ( N ) , where N is the number of qubits in the quantum processor; - Relationship with the AdS radius and Planck scale via the holographic principle: κ ( L / P ) 3 ; - Derivation from quantum error correction threshold conditions: Determine κ values through surface code experiments.

5.4.3. Challenge 3: Computational Complexity

Problem: The computational complexity of quantum set operations may exceed physically realizable limits. Strategy: Introduce the JCM domain restriction principle to ensure all operations are realizable within the physical domain. Collaborate with quantum computing experimental groups to implement and verify small-scale QIST operations on superconducting quantum processors.

6. Conclusion and Outlook

6.1. Summary of Research Results

This paper proposed a research program for Quantum Information Set Theory, clarifying its mathematical foundations and physical correspondences. Main contributions include: 1. Established the mathematical foundation of quantum set theory based on the Boolean-valued model approach. 2. Provided a categorical formulation of κ -qubit networks, clarifying the dual role of the κ parameter. 3. Established deep connections with existing quantum logic and quantum information theories. 4. Proposed phased goals and paths for implementation. 5. Clarified theoretical challenges and countermeasures.

6.2. Future Research Directions

6.2.1. Mathematical Directions

1. Develop renormalization methods for quantum set theory. 2. Explore connections between quantum set theory and higher category theory. 3. Investigate applications of forcing methods in quantum set theory.

6.2.2. Physical Directions

1. Apply QIST to the black hole information paradox. 2. Develop set-theoretic formulations of quantum field theory. 3. Explore set-theoretic explanations of cosmological phenomena.

6.2.3. Computational Directions

1. Develop computational implementations of quantum set theory. 2. Investigate the computational complexity of quantum set operations. 3. Explore set-theoretic methods in quantum machine learning.

6.3. Interdisciplinary Collaboration Path

To realize the QIST research program, deep collaboration mechanisms between mathematicians (set theory, category theory) and physicists (quantum information, gravity theory) need to be established: 1. Organize annual interdisciplinary workshops focusing on specific problems in QIST. 2. Establish joint postdoctoral programs to cultivate interdisciplinary research talent. 3. Develop open-source computational tools to support numerical verification of QIST.

6.4. Potential Risks and Countermeasures

1. Mathematical contradiction risk: There may be insurmountable mathematical obstacles, such as inconsistent axiom systems. - Countermeasure: Adopt a small-scale step-by-step verification strategy, first verifying subsystem consistency. 2. Experimental verification bottleneck: Current technology may not achieve the required measurement precision. - Countermeasure: Advance synchronously with developing technologies (e.g., quantum sensing, gravitational wave detection). 3. Theoretical compatibility issues: QIST may be incompatible with existing physical theories in the low-energy limit. - Countermeasure: Establish limit correspondence theorems to ensure compatibility with quantum mechanics and general relativity.

Appendix A Boolean-Valued Model Technical Details

Appendix A.1. Construction of the Boolean-Valued Universe

Define the Boolean-valued universe V B recursively as:
V α B = { x dom ( x ) V β B for some β < α , x : dom ( x ) B }

Appendix A.2. Definition of Quantum Elementhood Relation

For u , v V B , define:
u v = x dom ( v ) ( v ( x ) u = x )
u = v = x dom ( u ) ( u ( x ) x v ) y dom ( v ) ( v ( y ) y u )

Appendix B Categorical Properties of κ-Networks

Appendix B.1. Axioms of Compact Closed Categories

A symmetric monoidal category ( C , , I ) is compact closed if for each object A, there exists a dual A * and morphisms:
ev A : A * A I , coev A : I A A *
satisfying:
( 1 A ev A ) ( coev A 1 A ) = 1 A
( ev A 1 A * ) ( 1 A * coev A ) = 1 A *

Appendix B.2. Entanglement as Morphism

In the κ -network category, entanglement relations can be expressed as morphisms:
E : A A I
satisfying symmetry: E σ A , A = E , where σ is the swap morphism.

Appendix C Formal Expression of JCM Principles

Appendix C.1. Domain Restriction Principle

Define the physical domain as:
D κ = x V B α < κ 1 / 2 ( x V α B )
This restriction is consistent with state space dimension limits in quantum complexity theory, ensuring all mathematical operations are physically realizable.

Appendix C.2. Operational Finitization Principle

Any physical operation f : D κ D κ must satisfy:
depth ( f ) κ 1 / 4
where depth represents computational depth, consistent with fundamental limits of quantum circuit complexity.

References

  1. Maldacena, J. (1998). The large N limit of superconformal field theories and supergravity. Advances in Theoretical and Mathematical Physics. [CrossRef]
  2. Van Raamsdonk, M. (2010). Building up spacetime with quantum entanglement. General Relativity and Gravitation. [CrossRef]
  3. Almheiri, A., et al. (2015). Bulk locality and quantum error correction in AdS/CFT. Journal of High Energy Physics. [CrossRef]
  4. Birkhoff, G., & von Neumann, J. (1936). The logic of quantum mechanics. Annals of Mathematics. [CrossRef]
  5. Takeuti, G. (1981). Quantum set theory. In Current Issues in Quantum Logic.
  6. Abramsky, S., & Coecke, B. (2004). A categorical semantics of quantum protocols. Proceedings of the 19th IEEE Symposium on Logic in Computer Science. [CrossRef]
  7. Ryu, S., & Takayanagi, T. (2006). Holographic derivation of entanglement entropy from AdS/CFT. Physical Review Letters. [CrossRef]
  8. Hardy, L. (2001). Quantum theory from five reasonable axioms. arXiv:quant-ph/0101012. [CrossRef]
  9. Rovelli, C. (1996). Relational quantum mechanics. International Journal of Theoretical Physics. [CrossRef]
  10. ’t Hooft, G. (2016). The Cellular Automaton Interpretation of Quantum Mechanics. Springer. [CrossRef]
  11. Jech, T. (2002). Set theory: The third millennium edition. Springer. [CrossRef]
  12. Baez, J. C., & Stay, M. (2010). Physics, topology, logic and computation: A rosetta stone. In New Structures for Physics. [CrossRef]
  13. Kitaev, A. Y. 2003). Fault-tolerant quantum computation by anyons. Annals of Physics. [CrossRef]
  14. Lin, Y. (2025). Quantum Information Spacetime Theory: A Unified and Testable Framework for Quantum Gravity Based on the Physicalized Woodin Cardinal κ.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated