Professional Documents
Culture Documents
Generalized String-Net Models: A Thorough Exposition
Generalized String-Net Models: A Thorough Exposition
We describe how to construct generalized string-net models, a class of exactly solvable lattice
models that realize a large family of 2D topologically ordered phases of matter. The ground states of
these models can be thought of as superpositions of different “string-net configurations”, where each
string-net configuration is a trivalent graph with labeled edges, drawn in the xy plane. What makes
this construction more general than the original string-net construction is that, unlike the original
construction, tetrahedral reflection symmetry is not assumed, nor is it assumed that the ground state
arXiv:2012.14424v3 [cond-mat.str-el] 2 Jun 2021
wave function Φ is “isotropic”: i.e. in the generalized setup, two string-net configurations X1 , X2
that can be continuously deformed into one another can have different ground state amplitudes,
Φ(X1 ) 6= Φ(X2 ). As a result, generalized string-net models can realize topological phases that are
inaccessible to the original construction. In this paper, we provide a more detailed discussion of
ground state wave functions, Hamiltonians, and minimal self-consistency conditions for generalized
string-net models than what exists in the previous literature. We also show how to construct string
operators that create anyon excitations in these models, and we show how to compute the braiding
statistics of these excitations. Finally, we derive necessary and sufficient conditions for generalized
string-net models to have isotropic ground state wave functions on the plane or the sphere – a
property that may be useful in some applications.
tors that create the anyon excitations in these models. show that these conditions, together with a tetrahedral
In this paper, we fill in this gap by providing a con- reflection symmetry condition, produce string-nets that
crete and detailed discussion of all the basic aspects of are equivalent to those of Ref. 14.
generalized string-net models in the general non-Abelian One notable consequence of the lower symmetry that
case, including ground state wave functions, Hamiltoni- we require of our string-net states is that our generalized
ans, and string operators for these models. We also derive models can realize topological phases that break time
necessary and sufficient conditions for string-net models reversal symmetry. We illustrate this with several exam-
to have “isotropic” (i.e. topologically invariant) ground ples whose quasiparticle statistics are not time-reversal
state wave functions on the plane or the sphere – a prop- symmetric.
erty that may be useful in some applications. An im- The paper is organized as follows. In Sec. II, we con-
portant feature of our approach is that we derive all the struct ground state wave functions for general string-net
properties of these models using simple algebraic calcu- models. In Sec. III we construct lattice Hamiltonians.
lations that do not require any knowledge of tensor cate- We analyze the low energy quasiparticle excitations of
gory formalism. We also discuss the relationship between these models in Sec. IV. In Sec. V, we derive the ad-
generalized string-net models and the original string-net ditional constraints for isotropic string-net models. We
construction of Ref. 14 and we show that the original then discuss the relation between our construction and
string-net models correspond to a subset of the models the models of Ref. 14 in Sec. VI. We illustrate our con-
discussed in this paper. We believe that our more explicit struction with concrete examples in Sec. VII. Several
discussion may be useful in situations where exactly solv- technical details can be found in the appendices.
able models are a primary tool for studying properties of
the associated topological phases, such as how topological
order interplays with symmetry [25, 26], or the possible II. STRING-NET GROUND STATES
phase transitions into and out of these states [27–30].
To carry out our construction, we adopt a philosophy Before discussing model Hamiltonians, we will first de-
similar to that of the original string-net construction of scribe how to construct a class of ground-state wave func-
Ref. 14. Namely, we first specify the ground state for our tions which we will call generalized string-net ground
model, and then show how to construct an exactly solv- states. We require these wave functions to satisfy certain
able parent Hamiltonian for this ground state. To define conditions which, as we will show in the later sections of
our ground states, we begin by defining a “string-net” as this paper, ensure the following properties. First, they
a trivalent labeled graph, where the labels must satisfy are ground states of exactly solvable lattice Hamiltonians
certain conditions (or branching rules) at each trivalent that can be expressed as sums of commuting projectors.
vertex. Next, we specify a set of relations, expressed in Second, low-lying excitations of this Hamiltonian above
terms of a choice of parameters that we will call F , F̃ , and the string-net ground states are anyons, and this Hamil-
Y , that fix the relative coefficients of different string-net tonian describes a zero-correlation length fixed point of
configurations in our model’s ground state. By requiring a topological phase.
that our relations fix the amplitudes of the ground-state Our string-net ground states are similar to those of
wave function in a consistent manner, we then obtain a Levin and Wen [14], but with several important dif-
set of consistency conditions that the parameters F , F̃ , ferences. Both constructions lead to liquid-like ground
and Y must satisfy. These consistency conditions turn states expressed as superpositions over many different
out to force us to choose our parameters to be associated labeled trivalent graphs (i.e. string-nets). Additionally,
with a unitary pivotal fusion category F. Thus, we derive in both cases the string-net wave function is required to
the mathematical structure of unitary fusion categories, be invariant under certain transformations. For exam-
rather than assuming it from the start. ple, our string-net wave function is scale invariant, in the
The key difference between our generalized string-net sense that if two string-nets differ only by an overall scale,
models and the original string-net construction is that they appear in our string-net ground state with the same
our models relax certain restrictions that Ref. 14 im- amplitude. Unlike the string-nets of Ref. 14, however,
posed on the string-net data. As a consequence, our we do not require our ground state to be invariant under
string-nets may not be isotropic in the sense that two arbitrary bendings of the string-nets, or under rotations
string-net configurations X1 , X2 which can be continu- or reflections. This is the sense in which our string-nets
ously deformed into one another may not have the same are “generalized”; we will explore its implications in more
ground state amplitude: Φ(X1 ) 6= Φ(X2 ). We show that detail below.
some non-isotropic string-net states can be transformed
to isotropic ones via local unitary (gauge) transforma-
tions of the string-net data. However, this is not always A. String-net Hilbert space
the case, and we identify some obstructions to obtain-
ing fully isotropic string-net ground states. Finally, we A string-net is a special type of planar graph with la-
identify extra conditions on the input data F , F̃ , and Y beled edges and with vertices that are either bivalent
required to ensure that our string-nets are isotropic. We or trivalent, i.e. of degree 2 or degree 3 (Fig. 1). We
3
2
1
1 condition:
X X
2 2 δeab δdec = δfbc δdaf (3)
1 2 e f
2 2 2
2
1 where δcab is defined by
y (
2
2 1 ab 1, if (a, b : c) is allowed
δc = (4)
x 0, otherwise.
The motivation for (3) will become clear below when we
FIG. 1. A typical example of a string-net with string types define the F -symbol: we will see that Eq. 3 guarantees
{1, 2}, with dual string types defined by 1̄ = 1 and 2̄ = 2, and that (Fdabc )ef is a square matrix.
branching rules {(1, 2; 2), (2, 1; 2), (2, 2; 1), (2, 2; 2)}. Bivalent Note that the branching rules need not be symmetric
vertices are marked with dots for clarity. Note that other with respect to a, b: δcab 6= δcba in general. However, one
(unmarked) corners are not bivalent vertices, but rather kinks can show1 that the branching rules are always cyclically
in the piecewise differentiable strings. symmetric: δcab = δb̄c̄a = δābc̄ .
Expert readers may notice that our definition of string-
will often refer to the edges that make up a string- net does not allow for the possibility of fusion multiplic-
net as “strings”, and the fixed, finite set of edge la- ity, i.e. our string-nets have the property that there is a
bels {a, b, c, ...} as “string types”. What makes a string- unique way to combine the labels a and b to obtain the la-
net different from an ordinary planar graph is that it bel c. We focus on the unique fusion case throughout this
satisfies the following additional properties. First, the paper for notational simplicity, but it is straightforward
strings/edges in a string-net are piecewise differentiable to generalize all of our constructions to string-nets with
curves, drawn in the xy plane. Second, when we tra- general fusion multiplicity. In the latter case, string-nets
verse a string from one endpoint to the other, the tan- carry an additional label that lives at each vertex (see
gent vector v̂ has either a strictly positive or strictly neg- Appendix F for details).
ative y-component throughout the string, without any To see an example of a string-net, consider a string-
sign changes. Here, “y” denotes the vertical direction, net model with two string types, {1, 2}, with dual string
so we will refer to this requirement as the “no vertical types defined by 1̄ = 1 and 2̄ = 2, and branching rules
bending” property. One consequence of this property is given by {(1, 2; 2), (2, 1; 2), (2, 2; 1), (2, 2; 2)}. A typical
that each string carries a natural orientation, which we example of a string-net with this data is shown in Fig. 1.
always take to be in the +ŷ direction. Note that, unlike the original string-net construction of
Third, every trivalent vertex is of one of the two types Ref. 14, we do not draw orientations on the strings: this
shown in Eq. (2), i.e. with either one incoming and two is not necessary because we use the convention that every
outgoing strings or two incoming and one outgoing string string is oriented in the upward (+ŷ) direction so there
with respect to the ŷ direction. Similarly, every bivalent is no need to explicitly show orientations in our figures.
vertex is of one of the two types shown in Eq. (1). At this point it is useful to introduce the notion of the
The final property of string-nets is that only certain null string, which we will denote by 0 or by a dashed line.
special combinations of strings (or edges) can meet at the Formally, the null string is a special string type with the
vertices. In the case of the bivalent vertices, the allowed property that (i) 0̄ = 0 and (ii) the allowed branchings in-
branchings are determined by an additional piece of data: volving the null string are {(0, a : a), (a, 0 : a), (a, ā : 0)}.
an involution a → ā on the set of string types. We will More physically, the null string is equivalent to having
refer to the string type ā as the dual of a. Once we fix no string at all: for any string-net, we can erase or add
this definition of dual string types, the allowed bivalent null strings wherever we want and it does not change the
vertices are those of the form physical state. Thus, the null string can be thought of
as an accounting trick for treating bivalent and trivalent
_ _ . (1) vertices in a unified fashion.
a a a
a We are now ready to define the string-net Hilbert space
H: an orthonormal basis for the string-net Hilbert space
For the trivalent vertices, the allowed branchings are H is given by all possible string-net configurations which
specified by a set of branching (or fusion) rules — a collec- satisfy the branching rules and other conditions. Note
tion of (ordered) triplets {(a, b : c)}. The same branching that the spatial configuration of the string-net is impor-
rules apply to both “upward” and “downward” vertices: tant here: two string-nets that are geometrically distinct
correspond to orthogonal states whether or not they are
a b c
. (2) topologically equivalent.
c a b
1
The branching rules cannot be chosen arbitrarily: we Cyclical symmetry follows from associativity (3) together with
will require that they obey the following associativity the branching rules for the null string (defined below).
4
B. Ground state wave function or change the orientation along any of the strings. For
example, Eq. (5a) implies
P _ _ _
The ground state |Φi = X∈H Φ(X)|Xi of our models
a
a a
a a a
is a superposition of different string-net configurations Φ b = Φ = Φ . (6)
|Xi in H. The state |Φi is described implicitly by the b b
_ c _ c _ c
following local constraint equations: c c c
In contrast,
_ _ _
a a
a
a a
Φ a = Φ (5a) a a _
Φ b 6= Φ 6= Φ . (7)
_b
b b
b
_ c c c _ c
c c
a b c X a b c
abc Here the first equality is not valid because the b string
Φ e
= Fdef Φ f
(5b)
d
f
d in the first configuration has been replaced by b̄ in the
second configuration. Likewise, the second equality is
d d
X
abc f invalid because the third configuration has two extra bi-
Φ e
c
= F̃def Φ a
(5c) valent vertices along the b string.
a b b c
f
Moving on to the next two rules (5b)-(5c), these tell
X 1 us that when evaluating an amplitude of a string-net, we
a b
Φ a b = Φ c (5d) can replace any tree-like configuration of the type shown
c
Ycab a b
on the left hand side with the corresponding configura-
abc
tion shown on the right hand side, up to factors of Fdef
c abc
Φ
a b
= δc,d Ycab Φ c . (5e) or F̃def and taking a sum over the internal index f . Sim-
d ilarly, rules (5d) and (5e) imply that we can replace the
configuration on the left hand side with the correspond-
These equations are defined in the Hilbert space H where ing configuration on the right hand side, up to factors of
the configurations on both sides of the equations satisfy 1/Ycab and Ycab δc,d , respectively.
branching rules at every vertex. Here a, b, c, . . . are arbi- The basic idea of (5) is that by applying these local
trary string types (including the null string types) and rules multiple times, one can relate the amplitude of any
the shaded regions represent arbitrary string-net con- string-net configurations to the amplitude of the vacuum
figurations which are not changed from one side of the or no-string configuration. Then, by using the conven-
equation to the other. The symbol δc,d = 1 if c = d tion3 that
abc abc
and δc,d = 0 otherwise. The parameters Fdef , F̃def are Φ(vacuum) = 1, (8)
complex numbers that depend on 6 string types a, b, .., f
obeying the appropriate branching rules: δeab = δdec = the amplitude of any configuration is fully determined.
abc abc
δfbc = δdaf = 1. Likewise, Ycab is a complex number Thus, once the parameters {Fcde , F̃def , Ycab } are given,
that depends on three string types a, b, c obeying the the rules determine the wave function completely.
branching rule δcab = 1. For the moment, the parame- An important point is that when applying the above
abc abc rules, we are allowed to freely erase null strings or draw
ters {Fdef , F̃def , Ycab } are arbitrary except for two minor
additional ones without affecting the amplitude of a
restrictions: we require that (i) Ycab 6= 0, and (ii) the ma- string-net state. (As we mentioned earlier, the null
trices defined by (Fdabc )ef and (F̃dabc )ef are invertible.2 strings are essentially a redundancy in our notation so
However, we will soon see that these parameters have to erasing them or adding them doesn’t change the physical
satisfy nontrivial algebraic equations (16) for the above state at all). This freedom is crucial because erasing the
constraints to be self-consistent. null string is the main way that we can simplify string-net
We now explain the meaning of these local constraints configurations and reduce them to the vacuum configura-
or “rules.” The first rule (5a) has been drawn schemati- tion. For example, by erasing the vacuum string we can
cally. This rule means that any two string-net configura- remove any vertex of the type shown in (2) with a = 0
tions that can be deformed continuously into one another or b = 0:
must have the same amplitude. Here, for a deformation
to qualify as “continuous”, it must be continuous in a a a a
Φ = Φ = Φ = Φ a .
geometric sense and also preserve the graph structure of
the string-net: i.e. the deformation is not allowed to in-
troduce or delete vertices (either bivalent or trivalent) (9)
We will refer to da as the quantum dimension of the string In general there are multiple ways to compute the am-
type a. plitude of each string-net configuration, since there are
multiple ways to resolve a diagram using the local rules
abc abc
(5). If we choose the data {Fcde , F̃cde , Ycab } in an arbi-
trary way then these different computations will give dif-
C. Auxiliary rules ferent answers, i.e. the rules/constraints will not be self-
consistent. Thus we must impose special conditions on
abc abc
Although the local rules (5) are sufficient, by them- {Fcde , F̃cde , Ycab } to get self-consistent rules and a well-
selves, to evaluate any string-net amplitude, it is useful defined wave function Φ. In particular, we claim that the
to introduce two auxiliary rules to simplify calculations: following conditions are both necessary and sufficient for
6
(b) parent Hamiltonian (26) that has |Φi as its ground state
a b c d
F F (see Appendix D). Conversely, violating the constraints
(a) (c)
a b c d f l a b c d (17) can sometimes lead to a |Φi that is not the ground
e
l state of any gapped Hermitian Hamiltonian [31].
f k
g
e e Eqs. (16) and (17) are the only conditions that we will
abc abc
impose on {Fcde , F̃cde , Ycab }. We will see that, for every
F a b c d a b c d F solution {Fcde , F̃cde , Ycab } to Eqs. (16) and (17), we can
abc abc
h
k
h construct both a string-net wave function Φ and an ex-
g F actly solvable Hermitian parent Hamiltonian that has Φ
(d) e e (e)
as its ground state.
abc abc
the rules to be self-consistent: Given a solution {Fdef , F̃def , Ycab } to Eqs. (16,17),
f cd abl
X we can construct an infinite class of other solutions
abc ahd bcd
Fegl Fef k = Fgf h Fegk Fkhl (16a) abc ˆ abc
{F̂def , F̃def , Ŷcab } by defining
h
Yeab Ydec feab fdec
abc
F̃def = (Fdabc )−1
fe (16b) abc
F̂def abc
= Fdef ·
Yfbc Ydaf ffbc fdaf
abc abc
Fdef = F̃def =1 if a or b or c = 0 (16c) e d
abc fab fec (18)
F̃ˆdef
abc
= F̃def · f
Ycab =1 if a or b = 0 (16d) d
fbc faf
Equation (16a) is known as the “pentagon identity” in Ŷcab = Ycab
fusion category theory. To see why it is necessary for the
rules to be self-consistent, consider the sequence of ma- c
Here fcab , fab are complex numbers that depend on a, b, c
nipulations shown in Fig. 2. We can see that the ampli- and that satisfy
tude of the string-net configurations (a) and (c) can be re-
lated to one another in two different ways: (a)→(b)→(c) 1
and (a)→(d)→(e)→(c). Clearly F must satisfy equation |fcab | = 1, c
fab = ,
fcab (19)
(16a) for these two relations to be consistent with one
another. The necessity of equation (16b) follows from a fcab = 1 if a or b = 0.
similar consistency requirement (see Appendix A). As for
equations (16c,16d), the necessity of these conditions fol- In addition, we can construct solutions by defining
lows from our convention that we can freely add or erase
a null string. Proving that equations (16) are sufficient abc
F̂def abc
= Fdef
to ensure self-consistency is harder; we discuss this issue e d
abc gab gec
in Appendix E. F̃ˆdef
abc
= F̃def · f (20)
d
gbc gaf
While the conditions (16) are sufficient to construct
a well-defined wave function, our construction aims to
Ŷcab = Ycab · gab
c
do more: we wish to construct a wave function that is
the ground state of an exactly solvable, Hermitian parent c
Hamiltonian. To do this, we impose four more conditions where gab satisfies
abc
on Fdef and Ycab :
c 0 0 ∗
|gab | = 1, gaā = (gāa ) ,
(21)
(Fdabc )−1
ef = abc ∗
(Fdf e) (17a) c
gab = 1 if a or b = 0.
r
abb̄ dc
|Fac0 |= (17b) abc abc
d d If two solutions {Fdef , F̃def , Ycab }
and
r a b ˆ
d a db
abc
{F̂def abc
, F̃def , Ŷcab }, are related by one of the above
|Ycab | = (17c)
dc transformations, we will say that they are “gauge
Y0aā = (Y0āa )∗ . (17d) equivalent”. The reason for this terminology is that
the corresponding wave functions, Φ and Φ̂, are very
Here da is defined in (12). The significance of the above closely related: there exists a local unitary transfor-
constraints (17) is that they ensure the Hermiticity of the mation U such that U |Φ̂i = |Φi. In the case of the
7
f -transformation, this local unitary is defined by For the last simplification, notice that we can always
+ + make Ycab real and positive using an appropriate g-gauge
a b a b transformation (20). After we make such a transforma-
U = fcab
c c tion, then (17c) implies that
(22) r
+ +
ab da db
c c c Yc = (25)
U = fab . dc
a b a b q
Similarly, the U associated with the g-transformation is Hence we can take Ycab = dadcdb without loss of general-
defined by ity. Notice that this choice for Ycab automatically satisfies
+ + Eqs. (17c,17d). Other convenient gauge choices for Ycab
a b a b are discussed in Appendix B.
U = abc
c c Putting this all together, we conclude that Fdef is the
(23) only quantity that needs to be determined. Thus, the
problem of solving the consistency equations reduces to
+ +
c c c abc
U = gab . finding all Fdef that obey (16a), (16c), (17a), and (17b)
a b a b where da is fixed by the branching rules as discussed
above. Finding such solutions is not trivial; see Refs.
Here, the above notation means that U multiplies each
4 and 32 for a discussion of how such solutions can be
string-net basis state by a product of fcab ’s and fabc
’s —
found in practice, as well as a discussion of many inter-
one for each of the above (trivalent) vertices.
esting examples.
It is worth noting that the f and g-gauge transfor-
mations have a different status in the fusion category
literature: while the f -gauge transformations (18) are G. Examples of solutions to consistency conditions
well-known, the g-gauge transformations (20) are largely
absent. The reason for this is that Ycab is usually chosen
We now discuss three general classes of solutions to
to have a fixed value in the fusion category literature (e.g.
the consistency conditions (16,17).
see Eq. (25) below), thus ruling out non-trivial g-gauge
transformations.
1. For any finite group G, we can construct a solution
to the consistency conditions (16,17) by defining the
F. Simplifying the string-net consistency string types to be the irreducible representations of G,
conditions the dual string type ā to be the dual representation of
a, and the branching rules to be the set of all triplets
Given that our string-net modes are in one-to-one cor- {(a, b; c)} such that c appears in the tensor product
respondence with solutions {Fdef abc abc
, F̃def , Ycab } to (16,17), a ⊗ b. (Here we assume that c appears with multiplicity
abc
it is worth pausing to note some simplifications that fa- of at most 1 for simplicity). Next, we define Fdef to
cilitate finding a solution. First, notice that Eq. (16b) be the 6j p symbol corresponding to G, and we define
abc abc Ycab = da db /dc where da is the dimension of the
completely determines F̃def in terms of Fdef and Ycab .
representation a. Like any solution to the consistency
abc
This means that we can essentially forget about F̃def conditions, this solution can be used to construct an
abc ab
and focus on finding {Fdef , Yc } that obey the remain- exactly soluble lattice Hamiltonian H with anyon excita-
ing equations: (16a), (16c), (16d) and (17). tions, as we explain later. The topological order in this
Second, the quantum dimensions da are in fact com- model is identical to that of a discrete gauge theory with
pletely fixed by the branching rules. To see this, take the gauge group G – also known as the “quantum double”
square of both sides of (17b) and then sum over c. Using of G [13] (see Sec. VII A for the example G = Z2 ).
(17a) gives
X 2. For any finite group G and any cocycle
da db = δcab dc (24) ω ∈ H 3 (G, U (1)), we can set the string types to
c be group elements g ∈ G, and the dual string type ā
Eq. (24) can be thought of as an eigenvalue equation for to be the inverse a−1 , and the branching rules to be
the matrix N (a) defined by [N (a)]bc ≡ δcab : from this the set of all {(a, b; c)} such that c = ab. We define
point of view, Eq. (24) tells us that N (a) has an eigen- Ycab = 1 and Fdef abc
= ω(a, b, c) with d, e, f determined
vector v whose components are vc ≡ dc , and whose cor- by a, b, c according to d = abc, and e = ab, and f = bc.
responding eigenvalue is da . Given that N (a) is a non- In this case, the corresponding lattice model realizes a
negative matrix and vc is strictly positive, the Perron- Dijkgraaf-Witten theory with group G and cocycle ω –
Frobenius theorem implies that da is the largest eigen- also known as the “twisted quantum double” of G [15]
value of N (a)[1]. In particular, da is completely deter- (see Secs. VII A-VII C for examples).
mined by the branching rules, as we wished to show.
8
i5 i2 Bps = i5 s
_
_
s i2 . (32)
s s
e5 e3 e5 e3
We emphasize that the above expression is only valid if i4 i3 i4 i3
e4 e4
the initial and final states obey the branching rules at
each vertex; if either state violates the branching rules, Then the matrix elements in Eq. (31) can be obtained
the matrix element of Bps vanishes. by using the local rules (5) to fuse the string s onto the
We should mention that there is an alternative graph- links along the boundary of the plaquette:
e1 e1 e1
' i6 _i1 i'
* i6
* i6
*
e6 i6 i6 s s 1_i1 e2
e6 i1 i1
e2 e6 _ e2
s s
X
Bps = i5 s s i2
i5 i2 i5 s
_
_
s i2 = i'5 _ i'2 C1
i5 s s i2
s s _
e5 i4 i3
e3 e5 i4 i3
e3 i01 ,...,i06 e5 i4
i'4 i
s s i e3
i'3 3
4 i3
e4 e4 e4
e1
i6
_ i1 i '
* i6'
e6 s 1 e2
i0 e i0 e i0 s̄ i0 s̄
X _
= i5' i5
i5
s
s
s i
_ 2 i2'
s i2
[Fs̄i12 2 ]i1 i02 [F̃s̄i32 3 ]i3 i02 [Fei55is0 ]i4 i05 [F̃ei65is0 ]i6 i05 [Fi440 ]si4 [F̃i660 ]si6 C1
_ 4 6
i01 ,...,i06 e5 i4'
s i3' e3
i4 i3
e4
(33)
e1
i'6
* i'1
e6 e2
i0 e i0 e i0 s̄ i0 s̄
X
= i'5 i'2 [Fs̄i12 2 ]i1 i02 [F̃s̄i32 3 ]i3 i02 [Fei55is0 ]i4 i05 [F̃ei65is0 ]i6 i05 [Fi440 ]si4 [F̃i660 ]si6 [Fii06ii01 ]s̄e1 [F̃ii04ii03 ]s̄e4 C1 C2
4 6 6 1 4 3
i01 ,...,i06 e5
i'4 i'3
e3
e4
e1
i'6
* i'1
e6 e2
s,i1 i2···6
X
≡ i'5 i'2 Bp,i 0 i0 ...i0 (e1 e2 . . . e6 )
1 2 6
i01 ,...,i06 e5
i'4 i'3
e3
e4
C1 = (Yis̄i
0
1
Yis̄i
0
2
Yis̄i
0
3
Yii04 s Yii05 s Yii06 s )−1 The first property of the Hamiltonian (26) is that it is
1 2 3 4 5 6
(34) Hermitian. This result follows from two identities:
C2 = (Yis̄i
0
2
Yii05 s )2 Yei44 i3 Yei16 i1
2 5
Y0ss̄ Yei16 i1 Yii23 e3 Yie55 i4 In addition to being Hermitian, the Hamiltonian has
i0 s̄i
i0 i0 i0 e e i0
Fis̄i3 e3
2
4 3
4 4
e6 i6 s i6 ss̄
0 i0 i Fe i i0 Fi0 i i0 Fi i0 0 ×
5 6 (35) several other nice properties:
Ye16 1 Yi03 3 Yi0 5 4 2 3 3 5 6 6
2 5
i0 s̄i1 −1
1. The QI and Bp operators commute with each other:
1 e2 −1
(Fis̄i
0 )i2 i0 (Fii44 ss̄ )−1 e5 i4 s −1
0i0 (Fi0 )i0 i5 (Fe16 )i0 i6 .
2 1 4 5 4 1
[QI , QJ ] = 0, [QI , Bp ] = 0, [Bp , Bp0 ] = 0. (37)
Using the constraint (17a), we can rewrite (35) as
Eq. (31). 2. QI and Bp are projection operators.
10
The first two commutation relations in property 1 follow To prove that the ground state is |Φi, it suffices to show
immediately from the definitions of QI , Bp . The third re- that QI |Φi = Bp |Φi = |Φi. The first equality, QI |φi =
lation, [Bp , Bp0 ] = 0, is non-trivial and is derived in Ap- |Φi, is obvious since |Φi is a linear combination of string-
pendix C. Likewise, it is easy to see that QI is a projector, net configurations, all of which obey the branching rules.
but the fact that Bp is also a projector is non-trivial and To prove the second equality, Bp |Φi = |Φi, we use the
is derived in Appendix D. following identity which we will derive below:
The above properties allow for the exact solution of H.
To see this, note that QI , Bp commute with one another Bps |Φi = Y0ss̄ |Φi (38)
and hence we can simultaneously diagonalize them. De-
noting these simultaneous eigenstates by |{qI , bp }i where P intoss̄the definition of Bp (28)
Substituting this identity
qI , bp = 0, 1 are the eigenvalues, it is clear that |{qI , bp }i and observing that s as Y0 = 1, it follows that
is an energy eigenstate with eigenvalue Bp |Φi = |Φi. All that remains is to prove (38). To
derive this identity, we multiply both sides of Eq. (32) by
|Φi and then use the local rule (5e) to trade the type-s
X X
E=− qI − bp .
I p loop on the right hand side for an extra factor of Y0ss̄ .The
identity (38) follows immediately.
Using this expression, we can read off the complete en-
ergy spectrum of H (up to determining degeneracies). In
particular, we can see that the ground state(s) of H have IV. QUASIPARTICLE EXCITATIONS
qI = bp = 1, while the excited states have qI = 0 or
bp = 0 for at least one site I or plaquette p. It follows Having described the string-net Hamiltonian and its
that there is finite energy gap (∆ ≥ 1) separating the ground state in the previous section, we now turn to its
ground state(s) from the excited states. low-lying excitations. Specifically, we describe so-called
The only remaining task is to prove the existence of string operators which create point-like quasiparticles at
at least one state with qI = bP = 1, and determine the their endpoints – but no excitations anywhere else – when
degeneracy of these states. We focus on the simplest acting on the ground state. We show how to extract the
case: a lattice with a disk-like geometry of the type de- braiding statistics of these quasiparticles by computing
scribed in Appendix G of Ref. 19. In this case, we can certain ground-state matrix elements associated with the
show that there is exactly one state with qI = bp = 1. corresponding string operators.
To see that
Q there is at least one such state, note that
|Φi = p Bp |vacuumi has qI = bp = 1 everywhere,
and furthermore one can check that hvacuum|Φi = 6 0 so A. Finding the quasiparticle string operators
|Φi =
6 0. To see that there is at most one such state, we
use a result derived in Appendix E: there we show that
We start with finding the quasiparticles in the model
any state with qI = bp = 1 obeys a lattice version of the
(26). The basic logic is as follows. We will identify a set
local rules (5). Then, since the local rules can be used
of string operators {Wα (P )}, which act along oriented
to relate any string-net configuration in a disk geometry
paths P . We require each string operator to act on the
to the vacuum configuration, it follows that there is at
string-net ground state in a way that is path independent,
most one state with qI = bp = 1.4 More generally, the
i.e. it must give the same state for any choice of path P
ground state degeneracy depends on the global topology
connecting the same two endpoints. More formally, path
(or boundary conditions) of our lattice. This topological
independence is the requirement that
ground state degeneracy has been discussed in a num-
ber of works[14, 33], and Ref. 34 gives a prescription for
Wα (P )|Φi ∝ Wα (P 0 )|Φi . (39)
computing it on a given spatial topology.
So far we have shown that the Hamiltonian H has a Path independence is important because it ensures that,
unique ground state and an energy gap in a disk geom- when acting on the ground state, open string operators
etry. To complete the picture, we now argue that this only create excitations near their endpoints. More specif-
ground state is exactly the wave function |Φi defined by ically, if P is an open path oriented from i to f , then
(5), restricted to string-net configurations that live on acting on the ground state with the open string operator
the lattice. Wα (P ) creates a quasiparticle α at the string’s endpoint
f , and the corresponding antiparticle ᾱ at the string’s
starting point i. Likewise, for a closed contractible path
4
P , path independence implies that Wα (P )|Φi ∝ |Φi –
While this argument is suggestive, strictly speaking it is incom- that is, closed string operators do not create any excita-
plete since we only know that the continuum local rules are suf-
ficient for relating string-net configurations to the vacuum con- tions when acting on the ground state.
figuration. To complete the proof, we would need to establish a To construct string operators, we follow the strategy
similar result for the lattice local rules, which we will not under- of Ref. 14: we describe a general ansatz for construct-
take here. ing string operators Wα (P ) in terms of certain input
11
data (Ωα , Ω̄α , nα ), and we work out the conditions un- the constraints satisfied by Ωα , Ω̄α , which we present
der which the resulting string operators obey the path shortly.5
independence condition (39). After making the replacements in (43), we obtain the
First, we explain the input data in more detail. We action of the string operator on any string-net state as
start with the third piece of data, nα . This piece of data follows. First, we require the string labels r, s to be the
is shorthand for a collection of non-negative integers nα,s same throughout any region where the path P does not
where s runs over the different string types. Each inte- cross any edges of the initial string-net. Second, along
ger nα,s describes the “multiplicity” of the string type each such path segment we contract the corresponding
s within the string operator α. The remaining data, Ωα matrix indices σr , σs , etc.. For example,
and Ω̄α , is shorthand for two collections of complex (rect- * *
angular) matrices, (Ωa,rsb
α )σr σs and (Ω̄a,rsb
α )σr σs , parame- ↵
X v ↵ c,uvd v
t u
Ωa,stb Ωα δt,u t u .
<latexit sha1_base64="9GJQqpIxrycnmf7p5j4xsmhRYOw=">AAAB6HicbZBNS8NAEIYn9avWr6pHL4tF8FQSEfRY9OKxBfsBbSib7aRdu9mE3U2hhP4CLx4U8epP8ua/cdvmoK0vLDy8M8POvEEiuDau++0UNja3tneKu6W9/YPDo/LxSUvHqWLYZLGIVSegGgWX2DTcCOwkCmkUCGwH4/t5vT1BpXksH800QT+iQ8lDzqixVmPSL1fcqrsQWQcvhwrkqvfLX71BzNIIpWGCat313MT4GVWGM4GzUi/VmFA2pkPsWpQ0Qu1ni0Vn5MI6AxLGyj5pyML9PZHRSOtpFNjOiJqRXq3Nzf9q3dSEt37GZZIalGz5UZgKYmIyv5oMuEJmxNQCZYrbXQkbUUWZsdmUbAje6snr0LqqepYb15XaXR5HEc7gHC7BgxuowQPUoQkMEJ7hFd6cJ+fFeXc+lq0FJ585hT9yPn8A4zOM+g==</latexit>
<latexit
<latexit sha1_base64="9GJQqpIxrycnmf7p5j4xsmhRYOw=">AAAB6HicbZBNS8NAEIYn9avWr6pHL4tF8FQSEfRY9OKxBfsBbSib7aRdu9mE3U2hhP4CLx4U8epP8ua/cdvmoK0vLDy8M8POvEEiuDau++0UNja3tneKu6W9/YPDo/LxSUvHqWLYZLGIVSegGgWX2DTcCOwkCmkUCGwH4/t5vT1BpXksH800QT+iQ8lDzqixVmPSL1fcqrsQWQcvhwrkqvfLX71BzNIIpWGCat313MT4GVWGM4GzUi/VmFA2pkPsWpQ0Qu1ni0Vn5MI6AxLGyj5pyML9PZHRSOtpFNjOiJqRXq3Nzf9q3dSEt37GZZIalGz5UZgKYmIyv5oMuEJmxNQCZYrbXQkbUUWZsdmUbAje6snr0LqqepYb15XaXR5HEc7gHC7BgxuowQPUoQkMEJ7hFd6cJ+fFeXc+lq0FJ585hT9yPn8A4zOM+g==</latexit>
<latexit
= s α
<latexit sha1_base64="IPLIJyyiyGUWQMPrp67GMfbLPnc=">AAAB6HicbZBNS8NAEIYn9avWr6pHL4tF8FQSEeqx6MVjC/YD2lA220m7drMJuxuhhP4CLx4U8epP8ua/cdvmoK0vLDy8M8POvEEiuDau++0UNja3tneKu6W9/YPDo/LxSVvHqWLYYrGIVTegGgWX2DLcCOwmCmkUCOwEk7t5vfOESvNYPphpgn5ER5KHnFFjraYelCtu1V2IrIOXQwVyNQblr/4wZmmE0jBBte55bmL8jCrDmcBZqZ9qTCib0BH2LEoaofazxaIzcmGdIQljZZ80ZOH+nshopPU0CmxnRM1Yr9bm5n+1XmrCGz/jMkkNSrb8KEwFMTGZX02GXCEzYmqBMsXtroSNqaLM2GxKNgRv9eR1aF9VPcvN60r9No+jCGdwDpfgQQ3qcA8NaAEDhGd4hTfn0Xlx3p2PZWvByWdO4Y+czx/ep4z3</latexit>
<latexit
<latexit sha1_base64="q/23RjEfsJaZXEDdSc7eZ9qiFOA=">AAAB6HicbZDLSgNBEEVrfMb4irp00xgEV2FGBF0G3bhMwDwgGUJPp5K06XnQXSOEIV/gxoUibv0kd/6NnWQWmnih4XCriq66QaKkIdf9dtbWNza3tgs7xd29/YPD0tFx08SpFtgQsYp1O+AGlYywQZIUthONPAwUtoLx3azeekJtZBw90CRBP+TDSA6k4GStOvVKZbfizsVWwcuhDLlqvdJXtx+LNMSIhOLGdDw3IT/jmqRQOC12U4MJF2M+xI7FiIdo/Gy+6JSdW6fPBrG2LyI2d39PZDw0ZhIGtjPkNDLLtZn5X62T0uDGz2SUpISRWHw0SBWjmM2uZn2pUZCaWOBCS7srEyOuuSCbTdGG4C2fvArNy4pnuX5Vrt7mcRTgFM7gAjy4hircQw0aIADhGV7hzXl0Xpx352PRuubkMyfwR87nD+ArjPg=</latexit>
<latexit
<latexit sha1_base64="0ivuOvsA1zGj29z/88YG+b8aLnI=">AAAB6HicbZBNS8NAEIYn9avWr6pHL4tF8FQSEeqx6MVjC/YD2lA220m7drMJuxuhhP4CLx4U8epP8ua/cdvmoK0vLDy8M8POvEEiuDau++0UNja3tneKu6W9/YPDo/LxSVvHqWLYYrGIVTegGgWX2DLcCOwmCmkUCOwEk7t5vfOESvNYPphpgn5ER5KHnFFjrWY6KFfcqrsQWQcvhwrkagzKX/1hzNIIpWGCat3z3MT4GVWGM4GzUj/VmFA2oSPsWZQ0Qu1ni0Vn5MI6QxLGyj5pyML9PZHRSOtpFNjOiJqxXq3Nzf9qvdSEN37GZZIalGz5UZgKYmIyv5oMuUJmxNQCZYrbXQkbU0WZsdmUbAje6snr0L6qepab15X6bR5HEc7gHC7BgxrU4R4a0AIGCM/wCm/Oo/PivDsfy9aCk8+cwh85nz/hr4z5</latexit>
<latexit
<latexit sha1_base64="g0xWx7kTLY9+aMwFpWQmr9zUmXw=">AAAB+3icbZDLSsNAFIYnXmu9xbp0M1gEVyURQZdFNy4r2As0oUwmJ+3QySTMTMQS8ipuXCji1hdx59s4TbPQ1gMDH/9/zpyZP0g5U9pxvq219Y3Nre3aTn13b//g0D5q9FSSSQpdmvBEDgKigDMBXc00h0EqgcQBh34wvZ37/UeQiiXiQc9S8GMyFixilGgjjeyGV96RSwgL7BGeTsjIbjotpyy8Cm4FTVRVZ2R/eWFCsxiEppwoNXSdVPs5kZpRDkXdyxSkhE7JGIYGBYlB+Xm5t8BnRglxlEhzhMal+nsiJ7FSszgwnTHRE7XszcX/vGGmo2s/ZyLNNAi6WBRlHOsEz4PAIZNANZ8ZIFQy81ZMJ0QSqk1cdROCu/zlVehdtFzD95fN9k0VRw2doFN0jlx0hdroDnVQF1H0hJ7RK3qzCuvFerc+Fq1rVjVzjP6U9fkDQFSUjw==</latexit>
<latexit
s
<latexit sha1_base64="IPLIJyyiyGUWQMPrp67GMfbLPnc=">AAAB6HicbZBNS8NAEIYn9avWr6pHL4tF8FQSEeqx6MVjC/YD2lA220m7drMJuxuhhP4CLx4U8epP8ua/cdvmoK0vLDy8M8POvEEiuDau++0UNja3tneKu6W9/YPDo/LxSVvHqWLYYrGIVTegGgWX2DLcCOwmCmkUCOwEk7t5vfOESvNYPphpgn5ER5KHnFFjraYelCtu1V2IrIOXQwVyNQblr/4wZmmE0jBBte55bmL8jCrDmcBZqZ9qTCib0BH2LEoaofazxaIzcmGdIQljZZ80ZOH+nshopPU0CmxnRM1Yr9bm5n+1XmrCGz/jMkkNSrb8KEwFMTGZX02GXCEzYmqBMsXtroSNqaLM2GxKNgRv9eR1aF9VPcvN60r9No+jCGdwDpfgQQ3qcA8NaAEDhGd4hTfn0Xlx3p2PZWvByWdO4Y+czx/ep4z3</latexit>
<latexit
<latexit sha1_base64="q/23RjEfsJaZXEDdSc7eZ9qiFOA=">AAAB6HicbZDLSgNBEEVrfMb4irp00xgEV2FGBF0G3bhMwDwgGUJPp5K06XnQXSOEIV/gxoUibv0kd/6NnWQWmnih4XCriq66QaKkIdf9dtbWNza3tgs7xd29/YPD0tFx08SpFtgQsYp1O+AGlYywQZIUthONPAwUtoLx3azeekJtZBw90CRBP+TDSA6k4GStOvVKZbfizsVWwcuhDLlqvdJXtx+LNMSIhOLGdDw3IT/jmqRQOC12U4MJF2M+xI7FiIdo/Gy+6JSdW6fPBrG2LyI2d39PZDw0ZhIGtjPkNDLLtZn5X62T0uDGz2SUpISRWHw0SBWjmM2uZn2pUZCaWOBCS7srEyOuuSCbTdGG4C2fvArNy4pnuX5Vrt7mcRTgFM7gAjy4hircQw0aIADhGV7hzXl0Xpx352PRuubkMyfwR87nD+ArjPg=</latexit>
<latexit
<latexit sha1_base64="0ivuOvsA1zGj29z/88YG+b8aLnI=">AAAB6HicbZBNS8NAEIYn9avWr6pHL4tF8FQSEeqx6MVjC/YD2lA220m7drMJuxuhhP4CLx4U8epP8ua/cdvmoK0vLDy8M8POvEEiuDau++0UNja3tneKu6W9/YPDo/LxSVvHqWLYYrGIVTegGgWX2DLcCOwmCmkUCOwEk7t5vfOESvNYPphpgn5ER5KHnFFjrWY6KFfcqrsQWQcvhwrkagzKX/1hzNIIpWGCat3z3MT4GVWGM4GzUj/VmFA2oSPsWZQ0Qu1ni0Vn5MI6QxLGyj5pyML9PZHRSOtpFNjOiJqxXq3Nzf9qvdSEN37GZZIalGz5UZgKYmIyv5oMuUJmxNQCZYrbXQkbU0WZsdmUbAje6snr0L6qepab15X6bR5HEc7gHC7BgxrU4R4a0AIGCM/wCm/Oo/PivDsfy9aCk8+cwh85nz/hr4z5</latexit>
<latexit
Like the F -symbol, the matrix elements (Ωa,rsb α )σr σs are (44)
only defined when a, r, s, b obey certain branching rules, where the matrix product is taken along the index asso-
specifically, δbra = δbas = 1, and when nα,r and nα,s are ciated with the shared edge label t, i.e.
both nonzero. Likewise, the matrix elements (Ω̄a,rsb α )σr σs X
are only defined if δbar = δbsa = 1. We should also mention Ωa,stb
α Ωc,uvd
α δt,u = (Ωa,stb
α )σs ,σt (Ωc,tvd
α )σt ,σv . (45)
that we require that the matrix elements (Ωa,rsb α )σr σs and σt
(Ω̄a,rsb
α )σr σs take particular values when a = 0: in that The end result is a P superposition of new states of the
case (Ω0,rsb )σr σs = (Ω̄0,rsb )σr σs = δs,r δb,r δσr ,σs . This is form hX|Wα (P ) = 0 0 0
X 0 C(X, X )hX |, where hX | is a
α α
necessary to ensure that our string operator has a triv- string-net state everywhere except near the endpoints of
ial action when crossing a vacuum string, a = 0, as will P , and C(X, X 0 ) is a product of matrices Ωα , Ω̄α , with
become clear below. each matrix corresponding to a crossing between the path
We now explain our ansatz for constructing string op- P and a string in the string-net ket hX|.
erators, Wα (P ) from the above input data. We first spe- Finally, to define the action of the string operator on
cialize to the case that P is an upward -oriented path, the honeycomb lattice, away from the endpoints of P
which is sufficient to identify the quasiparticle types. For we use the local rules to reduce these new string-nets to
simplicity, we will work in the gauge string-nets on the honeycomb lattice, as shown for the
r plaquette operator in Eq. (33). In this way, the ansatz
da db (Ωα , Ω̄α , nα ) fully defines the lattice action of the string
Ycab = (40)
dc operator W (P ).6
Before continuing, we should clarify one point about
in the following sections. the string operator multiplicity nα,s . As discussed in
When Wα (P ) is applied to a string-net state hX|, its Appendix F, for the most general class of string-nets, ev-
action is described graphically by adding a string labeled ery vertex carries a matrix index to account for the fact
by α along the path P under the preexisting string-nets: that there may be more than one state in the string-net
Hilbert space that satisfies the branching rules. This phe-
* * nomenon is known in the mathematical literature as fu-
Wα (P ) = α
. (41) sion multiplicity. We emphasize that fusion multiplicity
should not be confused with the string operator multi-
plicity nα,s . In particular, it is possible for nα,s to be
We then replace the α-string at every crossing with a sum larger than 1 even in string-net models that do not have
over string labels r, b, and s, using the rules any fusion multiplicity (i.e. models with δcab ≤ 1 for all
a, b, c). An example where this occurs is given by the
*
a
s *
a s string-net whose labels correspond to group elements of
d the symmetric group S3 ; the resulting string-net model
√b
X
= (Ωa,rsb
α )σr σs b (42)
b,s,r
da dr ds r a contains an excitation B for which nB,0 = 2.
* s *s To proceed, we must identify which (Ωα , Ω̄α , nα ) sat-
a
α a
d isfy the path independence condition (39). Without loss
√b
X
= (Ω̄a,rsb
α )σr σs b (43)
b,s,r
da dr ds a r
of generality, we assume that the proportionality con- similar logic. To this end, we first define the downward
stant in (39) for two upward-oriented paths P , P 0 is ex- α-string operator via:
actly 1, so that the path independence condition takes s
the form:
* * s
a
d
√b
X
= (Ωa,rsb
ᾱ )σr σs b
hX|Wα (P )|Φi = hX|Wα (P 0 )|Φi (46) a
b,s,r
da dr ds r a
s (49)
where away from the end-points of P , hX| is an arbitrary
* *s a
d
√b
X
string-net state. To ensure that Eq. (46) is satisfied, it = (Ω̄a,rsb
ᾱ )σr σs b
a da dr ds
suffices to check path independence for some elementary b,s,r a r
a0 t
(48a)
* + * +
α α
0 0 Φ = Φ . (50b)
Ω̄a,rsa
α = (Ωa,sra
α )∗ (48b) a α a α
X 0 0
Ω̄a,rsa
α Ωa,sta
α = δrt (48c)
s Algebraically, this implies
We will not prove this formula here. We then determine the constraints that the data {F, Y }
Next, we compute the topological spin of our quasipar- must satisfy in order to make these amplitudes invariant
ticles, defined as the phase acquired by the wave function under such planar deformations. Finally, we consider ad-
when a quasiparticle is rotated by 2π. Here, we will not ditional requirements that must be met for full isotropy
attempt to make a concrete connection to the associated on the sphere, and find that this further restricts the data
space-time process, but rather observe that, as has been {F, Y }. At the end we comment on an additional tetra-
noted previously [18], in all known examples the topolog- hedral reflection symmetry that was also required in the
ical spin can be evaluated as the ratio of amplitudes for construction of Ref. 14.
the two processes:
α Φ = 0c Φ c = ab Φ c
X c
[F̃ab ]āc [Fc0 ]b̄c
hΦ Φi = nα,s ds . ! ! !
s c
1 c 1 c
Φ a = 0c Φ a = ab Φ b
.
b
[Fab ]āc b
[F̃c0 ]b̄c a
associated with bendings of strings is called the and thus the amplitude is invariant under changes of ori-
Frobenius-Schur indicator. It follows from (17) that entation of internal legs
Then, we can use the gauge transformation g to trans- which can be derived from (16). 8
form γ so that γa = 1 if a = ā. Finally, with full bending invariance, we can define the
Second, bending a vertex twice by (64) is equivalent to amplitude of a tetrahedron, via:
rotating the vertex: _
f
! !
b
a abc bc af dd ¯
Φ ≡Φ = Fdef Yf Yd Y0 . (75)
! ! !
c
a b 1 a b a b _ e
Φ = Φ = αabc̄ γc Φ d
c
αc̄ab γc c c
Ybāc Yacb̄
which can be expressed as with the U (1) phases obeying wa = wā , Eq. (84) further
simplifies to the following condition on our F ’s:
abc bc af dd ¯
cda da cf bb̄ ¯ ¯ ¯
Fdef Yf Yd Y0 = Fb̄ēf¯ Yf¯ Yb̄ Y0 . (78)
abc ∗ āb̄c̄
(Fdef ) = Fdē
¯ f¯. (86)
Eq. (78) holds provided that
If the model is isotropic in the plane, as well as invari-
Y0aā = Y0āa . (79) ant under 2-fold rotations and reflections of the tetrahe-
dron, in the gauge (85) we find that
To show this, we use Eq. (71), as well as the relation
r
αbēa αabē αecd¯ abc ēbf¯ de df we wf bad¯ ¯
dcb
abc
Fdef cda
= Fb̄ē
¯ Fdef = Fdāc̄ = Fc̄e f¯ = Fāēf . (87)
f¯ · (80) ¯
αaf d¯αf da da dc wa wc
¯ αbcf¯
D. Tetrahedral reflection symmetry In this section, we discuss the relationship between our
construction and the original string-net construction of
Ref. 14. Our main result is that the string-net models
The original string-net construction[14] required, in discussed in Ref. 14 correspond to a subset of the models
addition to the conditions discussed above, that ground constructed in this paper, and we discuss the properties
state amplitudes also be invariant under the tetrahedral of this subset.
reflection: The first step is to find the dictionary between the
_
f
! c !
_
input data {F, Y } that defines a string-net model in this
b b
Φ
a
c =Φ
e
_ _
. (81) paper and the input data {F̄ , d} ¯ that was used in the
_ e a f
d
d
original string-net construction of Ref. 14. To derive this
dictionary, we compare the “old” local rules in Ref. 14 to
Algebraically, this means that the “new” local rules in this paper, namely (5,13). From
¯ ¯
this comparison, it is easy to see that if a string-net state
abc bc af dd ¯
ēbf bf ēc̄ dd ¯
Fdef ¯ Yc̄ Yd¯ Y0 .
Yf Yd Y0 = Fdāc̄ (82) ¯ then it obeys
obeys the old local rules for some {F̄ , d},
the new local rules with {F, Y } given by
By using (16), we can derive
abc b̄āe
Fdef = F̄dc̄f (88a)
abc bc eb̄ 0c eb̄f ∗ eb̄
Fdef Yf = γb̄ [F̃a0 ]ba [F̃b̄f ]bc (Fdac ) Ya . (83) abc
F̃def = F̄cabē
¯
df (88b)
ab −1
Using this, together with (70), Eq. (82) can be simplified (Yc ) = F̄bāa0 b̄c (88c)
to Ycab = F̄cbc̄a d¯ (88d)
b̄0 b̄
¯
eb̄f ∗ eb̄ af dd ēbf¯ bf¯ ēc̄ dd¯ ab
[Fcd ]ef = F̄dāce (88e)
(Fdac ) Ya Yd Y0 = Fdāc̄
¯ Yc̄ Yd¯ Y0 . (84) b̄f
ab c̄aē
[F̃cd ]ef = F̄bdf ¯ (88f)
In the gauge where
r da = |d¯a |. (88g)
da db w a w b
Ycab = (85) The above equations provide the desired dictionary be-
dc wc
¯ and the “new” data {F, Y }.
tween the “old” data {F̄ , d}
Next, we recall that Ref. 14 imposed several self-
¯ The first
consistency conditions on the old data {F̄ , d}.
10 Though we do not undertake to show that these conditions are condition is that
also sufficient for a fully isotropic wave-function on the sphere,
we expect that this is the case. abe
F̄cdf = 1 if a or b or c or d = 0. (89)
17
Substituting this condition into the dictionary in These are instructive in understanding how our construc-
Eq. (88), it follows that the new data satisfy (70). Thus tion captures models realized by the original string-net
the original string-net models are all isotropic. construction[14]. They also contain some models which
In addition to (89), Ref. 14 imposed the conditions cannot be realized by the original string-net framework
vc p because they cannot be made isotropic on the plane (Z3 ),
abc
F̄b̄ā0 = with va = vā = d¯a (90a) or on the sphere (Z4 ). Note that all of our abelian exam-
va vb
ples give topological orders that can also be realized by
b̄āe b̄eā ve vf
F̄dc̄f = F̄āc̄dē āb̄e
b̄f = F̄c̄df¯ = F̄df
¯ c̄ (90b) the twisted quantum double models of Ref. 15, as well as
va vc
X mlq jip j s̄n the string-net construction of Ref. 19. For this reason we
jip riq̄
F̄kp̄n F̄mns̄ F̄lkr̄ = F̄q̄kr̄ F̄mls̄ . (90c) do not list the quasiparticle types or string operators in
n these cases.
Substituting (90) into (88), we find that the new data We then discuss two non-abelian examples: the Fi-
satisfies the usual consistency conditions (16) as well as bonacci and T Y3 string-net models. The Fibonacci model
the following additional constraints: is an example that can be obtained from the original
string-net construction, and is included here to illustrate
va vb how our construction reduces to that of Ref. 14 in this
Ycab = (91a)
vc case. Finally, the T Y3 model is an example of a non-
ab̄b vc abelian string-net that cannot be realized without our
Fac0 = (91b)
va vb generalized construction.
abc ēbf¯ ve vf ¯
dcb bad¯
Fdef = Fdāc̄
¯ = Fāēf = Fc̄e f¯ . (91c)
va vc
A. Z2 string-net models
These equations have simple physical interpretations.
Eq. (91a) is simply
√ a special case of the gauge choice
(85), with wa da = va . Eq. (91b) follows from this The Z2 string-net models describe two string types
gauge choice, together with the conditions (70) for pla- {0, 1} where 0 is the vacuum string and 1 = 1̄ is self
nar isotropy. Eq. (91c) is exactly the condition (87) that dual with the branching rules {(0, 0 : 0), (0, 1 : 1), (1, 0 :
the string-net model is invariant under all reflections and 1), (1, 1, : 1)}. These branching rules require that the
rotations of the tetrahedron, which the original construc- strings form closed loops so the Hilbert space is the set
tion explicitly assumes. Thus the extra conditions we of all possible closed loops.
must impose on the new data amount to requiring that, Next, to construct the Hamiltonian and wave func-
in an appropriate gauge, the string-net is isotropic on the tions, we have to solve the consistency conditions (16,17)
sphere and invariant under tetrahedral reflections. for {F, Y }. There are two distinct solutions, parameter-
Finally, Ref. 14 imposed the following condition in or- ized by an integer p = 0, 1:
der to guarantee that the string-net Hamiltonian was
F 111 = (−1)p , Y 11 = 1. (94)
Hermitian:
āb̄c̄ abc ∗ where here and for our other string-net models with
F̄dē
¯ f¯ = (F̄def ) . (92)
abelian branching rules, we use the simplified notation
Substituting Eq. (92) into (88) and using (91), one can F abc ≡ F(a+b+c)(a+b)(b+c)
abc
, Y ab ≡ Ya+b
ab
. (95)
show that the new data satisfies the condition (17a)
(Fdabc )−1 abc ∗ With the solutions (94) in hand, we can construct the
f e = (Fdef ) . (93)
wave functions and Hamiltonian using (5) and (26). For
The reverse is also true. One the one hand, we have the p = 0 solution, the wave function is
(Fdabc )−1 abc abē
f e = F̃def = F̄cdf
¯ . On the other hand, we have
abc ∗ bad ∗¯ āb̄e ∗
Φ(X) = 1 (96)
(Fdef ) = (Fc̄e f¯
) = (F̄c̄d f¯
) . Thus (92) follows from
(93). Similarly, the other conditions (17b—17d) also fol- for any closed string-net configuration X. The corre-
low from (88, 91). sponding Hamiltonian realizes the the toric code topo-
Putting everything together, we conclude that the orig- logical phase[13, 14]. On the other hand, for the p = 1
inal string-net models of Ref. 14 correspond to a subset solution, we need to keep track of the vertical kinks be-
of the models discussed in this paper, namely the sub- cause γ1 = F 111 Y 11 = −1. The wave function is
set of models that obey the constraints (71) and (91), in Φ(X) = (−1)loop(X) (−1)vkink(X)/2 (97)
addition to the usual conditions (16,17).
with loop(X) meaning the total number of closed loops
in the configuration X and vkink(X) meaning the total
VII. EXAMPLES number of vertical kinks (upward and downward vertices
with c = 0 in Eq. (2)) in X. The corresponding Hamilto-
In this section, we work out some illustrative examples. nian realizes the same phase as the doubled semion model
We begin with the abelian Z2 , Z3 and Z4 string-nets. of Ref. 14.
18
While the solutions (94) are sufficient for constructing gauge transformations f, g to have simpler models if pos-
exactly soluble models, it is desirable to have solutions sible. To this end, we first apply the f -gauge transforma-
which lead to simpler models. Specifically, we can make tion with f132 = (−i)p , f233 = (−1)p followed by a g-gauge
0
γ1 = 1 using the gauge transformation g11 = (−1)p . Af- [a+b]
transformation gab 4 = F abb̄ . The result is
ter this gauge transformation we have
C. Z4 string-net model
" #
1 √1
d
[F1111 ]ef = √1
d ,
d
− d1
The string types for the Z4 model are {0, 1, 2, 3} with √
ef
0̄ = 0, 1̄ = 3, 2̄ = 2, 3̄ = 1. The branching rules are {(a, b : (103)
Y011 = d, Y111 = d, other F, Y = 1,
[a+b]4 )} with a, b ∈ {0, 1, 2, 3} and [a+b]4 = a+b mod 4 √
which takes values in {0, 1, 2, 3}. 1+ 5
d=
To construct the Hamiltonians and wave functions for 2
the Z4 models, we solve the consistency conditions for
{F, Y }. There are four distinct solutions labeled by p = where e, f = 0, 1. By using the data (103), we can con-
0, 1, 2, 3 : struct the ground state wave function and the Hamilto-
nian. Notice that (103) satisfies (71,79,84) so the corre-
2πpa
F abc = ei 16 (b+c−[b+c]4 ) , Y ab = 1. (101) sponding model is fully isotropic on the sphere, and also
obeys tetrahedral reflection symmetry. This is expected,
While it is sufficient to construct the Hamiltonians and as the Fibonacci string-net can be realized by the original
wave functions by using (101), the p = 1, 2, 3 models are construction [14].
not isotropic because the corresponding solutions (101) To find the quasiparticle excitations, we need to solve
do not satisfy (71). Thus it is desirable to find proper (48). There are four irreducible solutions to (48) which
19
a b c d
fcd
lFegl
abl
kFefk
that there are actually many variants of the pentagon
identity which follow from similar consistency require-
fcd -1 f l
a b c d g(Fe ) lg abl -1
f(Fe )kf
a b c d ments. Each of these variants can be derived graphically
e
l by relating the amplitude of two of the five configura-
f k tions in Fig. 6 by sequences of F and (F )−1 operations.
g e
e Likewise, these variants can be derived algebraically by
abc -1
f(Fg )hf bcd -1
h(F k ) lh
multiplying both sides of (16a) by appropriate (F )−1 op-
abc
hFgfh bcd erations. For example, by considering two sequences re-
lFkhl
a b c d a b c d lating the amplitude of the top configuration and the
ahd -1
g(Fe ) kg bottom left configuration in Fig. 6, we have
h h
g ahd
k
kFegk
X f cd
e e Fkhl (Feabl )−1
ahd bcd
Fegk abc −1
kf = Fegl (Fg )hf . (A5)
k
X a b
Appendix B: Gauge choices for Ycab
ab
≡ [Fcd ]ef Φ f .
c d
f In this appendix, we discuss three different gauge
choices for Ycab . The first gauge choice is to take Ycab
We use the local rules (5d,5c,5e) in the first three equal-
of the special form
ities sequentially. Thus we have (A1b).
Similarly, to derive (A1c), we follow the same logic by ya yb
Ycab = (B1)
considering the sequence yc
c d X 1
c
d with
e
Φ =
ab
Φ a ef b
Y
p
a b
f f a b ya = da eiφa (B2)
c
X 1 e b
d where da = dā is the quantum dimension of the string-
= F ceb Φ
ab f ad fd
a and φa is a U (1) phase. In this parametrization, the
f
Y f a b
condition (17d) requires
(A4)
X 1 c d
φa + φā = 0 (mod 2π). (B3a)
= F ceb Y eb Φ
ab f ad d
f
f
Y f
a b
abc
In the gauge (B1), F̃def = (Fdabc )−1
f e and the amplitude
aā
X
ab
c d of a loop-a is real: Y0 = da . A special case of (B1),
≡ [F̃cd ]ef Φ f . namely
a b
f
r
ab da db
We use the local rules (5d,5b,5e) in the first three equal- Yc = , (B4)
dc
ities sequentially. Thus we have (A1c).
So far we have not discussed the most important self- is used in Refs. 4, 14, 17, 20, and 21.
consistency condition of all: the pentagon identity (16a). Another gauge choice that is worth mentioning is
The reason for this omission is that this identity is de-
rived in the main text. Here we would like to point out Ycab = 1 (B5)
22
which satisfies (17c,17d) trivially. This choice is appeal- To see this, one can insert (C2) into the left hand side
ing since it allows us to drop all the Y factors. How- of (C1) and simplify the expression to obtain the right
ever, this choice is not allowed in our construction as it hand side of (C1). We can show (C2) by identifying
does not satisfy (17b), and the corresponding Hamilto- Eq. (C2) as one of the variants of the pentagon identity
nian (26) is not Hermitian. (see Appendix A). This completes the proof of (C1).
The third gauge choice which we would like to men- For case (2), we need to show
tion is restricted to Abelian string-net models with the X
a1 c1 t2 −1 c3 t̄2 e
Abelian branching rules {(a, b; a + b)}. To explain this (Fba1 t̄1 c )−1
c1 a (Fb2 )c3 b Fd1 c1 e2 (Fdt̄11 ce )−1 c1 t2 t̄2 −1
dc1 (Fc1 )0c3
c1
gauge choice, it is convenient to suppress indices that can X
be deduced from the branching rules and define = (Fbact
2
)−1
c2 b (Fb2 )c3 a Fdce2 (Fcct2 t̄2 )−1
a1 t̄1 c −1 c2 t̄2 e t̄1 c2 e2 −1
0c2 (Fd1 )dc3
c2
F abc ≡ F(a+b+c)(a+b)(b+c)
abc
Y ab ≡ Ya+b
ab
. (B6) (C3)
In this notation, the gauge choice corresponds to taking To show (C3), it is sufficient to show
Ycab to be a1 c1 t2 −1
X
2 −1
(Fba1 t̄1 c )−1
c1 a (Fb2 )c3 b = (Fbact
2
)c2 b (Fba21 t̄1 c2 )−1 t̄1 ct2
c3 a Fc3 c1 c2
c2
Y ab = F abb̄ (B7)
(C4a)
which can not be factorized to the form (B1). One can
check that (B7) satisfies (17). This gauge has the advan- Fdc13ct̄12ee2 (Fcc11 t2 t̄2 )−1 t̄1 ce −1
0c3 (Fd1 )dc1 =
tage that the the Frobenius-Schur indicator γa = 1 (66), X c02 t̄2 e t̄ c02 e2 −1
Fdce2 (Fcct2 t̄2 )−1 1
0c0 (Fd1 )dc3 (Fct̄31 ct2 )−1
c02 c1
but the disadvantage that Y aā can be complex, and F̃ abc 2
c02
is no longer the inverse of F abc .
(C4b)
To see this, we insert (C4) into the left hand side of (C3)
Appendix C: Showing that Bpt11 , Bpt22 commute and simplify the expression to obtain the right hand side
of (C3). What remains is to show (C4). Eq. (C4a) is a
In this appendix, we show that the operators Bpt11 and variant of the pentagon identity. To show (C4b) we need
to do more work.
Bpt22 commute with one another for p1 6= p2 . We only
First, to show (C4b), it is sufficient to show
need to consider the case when p1 and p2 are adjacent
since two operators will commute if p1 and p2 are further (Fdc11 t2 e2 )−1 t̄1 ce −1
ec3 (Fd1 )dc1 =
apart.
t̄ c0 e
X
Let Bpt11 , Bpt22 act on two adjacent plaquettes p1 , p2 . The (Fdct2 e2 )−1 t̄1 ct2 −1
ec0 (Fc3 )c0 c1 (Fd11 2 2 )−1
dc3
2 2
two adjacent plaquettes can be in three possible rela- c02
tive positions shown in Fig. 7. We want to show the (C5a)
Bpt11 Bpt22 = Bpt22 Bpt11 in these three cases. To show this, we
Fdc13ct̄12ce2 (Fcc11 t2 t̄2 )−1 t2 t̄2 e
0c3 = Fe0e2 (Fd1
c1 t2 e2 −1
)ec3 (C5b)
compare the matrix elements of Bpt11 Bpt22 and Bpt22 Bpt11 and
c2 t̄2 e ct2 t̄2 −1 t2 t̄2 e ct2 e2 −1
show they are the same. We find that it is sufficient to Fdce2 (Fc )0c2 = Fe0e2 (Fd )ec2 (C5c)
compare the factors associated with the shared bound-
t2 t̄2 e
ary which are different. We discuss these three cases in To see this, we multiply both sides of (C5a) by Fe0e 2
order. and use (C5b,C5c) to simplify the expression to obtain
23
(C4b). What remains is to show (C5). The first equation In fact, we can also show that (17b-17d) are necessary
(C5a) is a variant of the pentagon identity and the last conditions for (D4) to hold. To see this, we consider some
two equations follow from (A7). This completes the proof simple cases. First, we consider the case when e1 = e2 =
for case (2). · · · = 0 and i1 = i2 = i3 = ī4 = ī5 = ī6 = i. In this case,
For case (3), we arrive at a similar equation as (C3) (D4) reduces to
with (F ) replaced by (F )−1 . Thus, an dentical proof as
in case (2) goes through by changing (F ) by (F )−1 in |Fīīss̄
ī0 0
|2 Y0ss̄ |Y0īi |2
= 1. (D5)
Eq. (C4,C5). This completes the proof for case (3). 0 0 0
s̄s |2 (Y s̄s )∗ |Y ī i |2
|Fīī0 ī0 0 0
a0 b0 ]
= a 0 s̄
(D1c)
[F̃ab sc [F̃a0 ]sa abb̄ |Yābc̄ |
|Fac0 |= . (D9)
Eq. (D1) follows from variants of the pentagon identity. |Y0bb̄ |
Specifically, Eq. (D1a–D1c) can be obtained respectively
Plugging (D9) and (D8) to (D7), we have
from
|Ycab ||Yfcd | = |Yfae ||Yebd |. (D10)
X f cd
abl bcd −1 abc ahd
Fegl Fef k (Fk )lh = Fgf h Fegk
l
X Similarly, by considering (D4) when e1 = e2 = e5 =
(Feabl )−1 f cd −1 abc
kf (Fe )lg Fgf h = (Fkbcd )−1 ahd −1
lh (Fe )kg (D2) e6 = 0 and e1 = e2 = e3 = e6 = 0, we obtain
f
i0 ī ī0 i
X |Ys̄ 3 3 | i0 s̄s |Ys̄ 4 4 |
(Fef cd )−1 abc ahd
lg Fgf h Fegk = abl
Fef bcd −1
k (Fk )lh |Fīī33īss̄
0 0| = , |Fi04i4 0 | = . (D11)
ī0 i0
g
3
|Y0i3 ī3 | 4
|Y0 4 4 |
by setting f = 0, l = 0, h = 0 in the first, second and From (D9,D11), we find that
third equation above.
By using (17a) and (D1), it is straightforward to show |Y0aā |
|Ycab | = |Yc̄b̄ā | = |Yābc̄ | . (D12)
that |Y0cc̄ |
s,i1 i2···6
Bp,i0 i0 ...i0 6 (e1 e2 . . . e6 )
Then, from (D10) with e = 0, d = b̄, f = a and using
1 2
s̄,i0 i02 ...i06
=
(Bi1 i12 ...i (e1 e2 . . . e6 ))∗ (D12), we find that
6
ī02 s̄s 2
r
|Fīī11īss̄ 2 ī3 ss̄ 2
0 0 | |Fī0 ī 0 | |Fī ī0 0 |
i e e i
Y0ss̄ |Yei16 i1 Yi23 3 Yi55 4 |2 ab da db ab
1 2 2 3 3 |Yc | = δ . (D13)
0
i s̄s 0
2 |F i6 s̄s |2
0 0 0 0
(Y0s̄s )∗ |Yei6 i1 Y i03 e3 Y e0 5 i4 |2 dc c
|Fi04i4 0 |2 |Fii55iss̄ 00 | i 0i 0 1 i2 i5
4 5 6 6
(D3) Combining (D13), (D8) and (D9), we derive conditions
(17b–17d). This completes our discussion of the first
Thus, to show the first property is equivalent to show property of the Hamiltonian, i.e. (Bps )† = Bps̄ .
(D3) = 1. (D4) We now move on to the second property, i.e. Bp2 = Bp .
To prove this result, we use the identity
This identity follows immediately by substituting (17b- X
17d) into the right hand side of (D3) and simplifying the Bpt1 Bpt2 = Mut1 t2 Bpu (D14)
resulting expression. u
24
with consider
_
*
which we will derive below. From (D15), we can derive
X t1 t
_1
t2 t2 _
1
= u _ u
*
X X X t1
[Ft02t̄ū1 ]t̄2 t̄1 [F̃t02t̄ū1 ]t̄2 t̄1
Mut1 t2 aū = at̄1 at̄2 d2s
t2
(D16) = u
_
u
Mut1 t2 = Mt̄ūt 1
(D17)
(F0t1 t2 ū )−1 t1 t2 ū −1
)t̄1 u [Ft02t̄ū1 ]t̄2 t̄1 [F̃t02t̄ū1 ]t̄2 t̄1
*
t̄1 u (F̃0
2 X u
t1 t2
= u
_
u
X X
Mut1 t2 at1 at2 = Mt̄ūt
2
1
at1 at2
t1 t2 t1 t2 Φ a = Φ a (E1a)
X X
= at1 at̄1 au · d2s (D21)
t1 s a b X b c
abc
Φ e c = Fdef Φ a f (E1b)
d
f d
Next, we note that
a b
X 1
Φ a b =
ab
Φ c (E1c)
!−1
c
Yc
X X a b
at1 at̄1 = d2s (D22) c
t1 s
Φ a b = Ycab Φ c (E1d)
c
Combining (D21) and (D22), we derive (D20).
All that remains is to show (D15). To this end, we Our strategy for deriving these rules is to use the fact
25
that Bp |Φi = |Φi together with the following relations: With these identities, (E5) reduces to proving
0 0 0 0
d2s (Fbbss̄ )−1 bss̄ 2 b b̄ b b b̄ b −1
* *
0b0 Fbb0 0 = db0 Fb0s̄ (Fb )s̄0 (E7)
a Bp = a Bp (E2a)
To prove the above identity, we first prove the following
auxiliary identities:
a b
* *
X b c
abc
e c Bp = Fdef a f Bp (E2b) 0 0 0
(Fbb0 b̄ b )−1 bss̄ b̄ bs 0
ss̄s −1 b b̄ b −1 0 0
00 Fbb0 0 F0s̄b0 = (Fs )00 (Fb )s̄0 (E8)
f 0 0 0
d d ss̄s b0 b̄0 b b̄0 bs
Fbb0 00
b̄ b
(Fbbss̄ )−1
0b0 = Fs00 Fb0s̄ F0s̄b0 (E9)
a b
* *
X 1
a b Bp = c Bp (E2c) Once we prove these two auxiliary identities, we will be
Ycab
c a b done since multiplying them together gives the desired
* c * identity, (E7).
a b Bp = Ycab c Bp (E2d) To prove (E8), we substitute l = 0, d = b, f = e into
Eq. (A7). This gives
c
Next we use the following three variants of the pentagon Substituting (E17) into (E14), we obtain
identity: 0 0 0 0 0 0
s̄ss̄ −1 b b̄ b −1 b̄ bs
Fs̄00 (Fbb b̄ b )s̄0 bss̄
= Fbb0 0 (Fb0 )00 F0s̄b0 (E18)
ess̄ −1 ab0 s̄ −1
Feabs
0 eb0 (Fe )0e0 = (Fbbss̄ )−1
0b0 (Fe )be0
X
abc e b̄ f
0 0 0 0 0 0 This is almost the desired identity (E8): all that is left
Fdef Fdac0 (Fcb̄0 bc )−1 e b̄ b e s̄c
f s̄ = Feas̄ Fdec0 . (E6) is to show that
f
b b̄ b
Fb0s̄
0 0
(Feab s̄ )−1
0
e b̄ b ab b̄ −1 0 0 0 0 s̄ss̄
Fs̄00 = (Fsss̄s )−1 (E19)
be0 = Feas̄ (Fa )0e0 00
26
Conveniently, this follows immediately from (E11), by claims: (i) the conditions (16) are sufficient for construct-
setting a = 0, a0 = s. ing commuting projectors QI , Bp ; (ii) there is always at
We now move on to prove the second identity (E9). least one state |Φi with QI |Φi = Bp |Φi = |Φi in a disk
The proof is very similar to that of (E8). The first step geometry; (iii) any state with QI |Φi = Bp |Φi = |Φi
is to take (E10), and make the change of variables a → s, obeys the lattice local rules. In this paper we have
e → b0 . This gives sketched proofs of all three of these claims, but in some
0
of the steps we have used the Hermiticity conditions (17)
ss̄s
Fs00 = Fbb0 b0
s̄s
(Fbbss̄ )−1
0b0 (E20) in addition to (16). That said, we believe that the proofs
can be modified so that they do not use the Hermiticity
Next we take (E12) and make the change of variables conditions. Assuming this is correct, the above argument
a → b̄0 , d → b, e → s̄. This gives: can be used to prove that the self-consistency conditions
0 0 0 0 0 0 0 (16) are sufficient.
b b̄ b
Fb0s̄ (Fs̄b̄ b s̄ )−1 b̄ b b̄ −1
b0 = (Fb̄0 )00 (E21)
For fixed string types (a, b, c, d, e, f ), the F-symbol be- The self-consistency conditions (16), the Hermiticity
abc,στ conditions (17), and the Hamiltonian (26) can also be
comes a complex tensor Fdef,µν of dimension Neab ×Ndec ×
generalized straightforwardly; we will not write down the
Nfbc × Ndaf .
explicit formulas here as they are not particularly illumi-
nating.
[1] Alexei Kitaev, “Anyons in an exactly solved model and 313, 351 (2012).
beyond,” Ann. Phys. 321, 2 (2006). [18] Tian Lan and Xiao-Gang Wen, “Topological quasipar-
[2] J. Frohlich and F. Gabbiani, “Braid statistics in local ticles and the holographic bulk-edge relation in (2 + 1)-
quantum theory,” Reviews in Mathematical Physics 02, dimensional string-net models,” Phys. Rev. B 90, 115119
251–353 (1990). (2014).
[3] Z. Wang, Topological Quantum Computation, Conference [19] Chien-Hung Lin and Michael Levin, “Generalizations
Board of the Mathematical Sciences. CBMS regional con- and limitations of string-net models,” Phys. Rev. B 89,
ference series in mathematics (American Mathematical 195130 (2014).
Soc., 2010). [20] Ethan Lake and Yong-Shi Wu, “Signatures of broken par-
[4] Parsa Hassan Bonderson, Non-abelian anyons and inter- ity and time-reversal symmetry in generalized string-net
ferometry, Ph.D. thesis, California Institute of Technol- models,” Phys. Rev. B 94, 115139 (2016).
ogy (2007). [21] Alexander Hahn and Ramona Wolf, “Generalized string-
[5] Bojko Bakalov and Alexander Kirillov, Lectures on Ten- net model for unitary fusion categories without tetrahe-
sor Categories and Modular Functors, Vol. 21 (University dral symmetry,” Phys. Rev. B 102, 115154 (2020).
Lecture Series, 2001). [22] Liang Kong, “Anyon condensation and tensor cate-
[6] Liang Kong, Xiao-Gang Wen, and Hao Zheng, gories,” Nuclear Physics B 886, 436 – 482 (2014).
“Boundary-bulk relation in topological orders,” Nuclear [23] Daniel S Freed and Constantin Teleman,
Physics B 922, 62 – 76 (2017). “Gapped boundary theories in three dimensions,”
[7] Maissam Barkeshli, Parsa Bonderson, Meng Cheng, and arXiv:2006.10200 (2020).
Zhenghan Wang, “Symmetry fractionalization, defects, [24] Liang Kong, “Some universal properties of levin-
and gauging of topological phases,” Phys. Rev. B 100, wen models,” in Proceedings of XVIITH International
115147 (2019). Congress of Mathematical Physics ( 2012) (World Sci-
[8] Jeffrey CY Teo, Taylor L Hughes, and Eduardo Fradkin, entific, Singapore, 2014) pp. 444–455.
“Theory of twist liquids: gauging an anyonic symmetry,” [25] Chris Heinrich, Fiona Burnell, Lukasz Fidkowski, and
Annals of Physics 360, 349–445 (2015). Michael Levin, “Symmetry-enriched string nets: Exactly
[9] Nicolas Tarantino, Netanel H Lindner, and Lukasz Fid- solvable models for set phases,” Phys. Rev. B 94, 235136
kowski, “Symmetry fractionalization and twist defects,” (2016).
New Journal of Physics 18, 035006 (2016). [26] Meng Cheng, Zheng-Cheng Gu, Shenghan Jiang, and
[10] Tian Lan, Liang Kong, and Xiao-Gang Wen, “Clas- Yang Qi, “Exactly solvable models for symmetry-
sification of (2+1)-dimensional topological order and enriched topological phases,” Phys. Rev. B 96, 115107
symmetry-protected topological order for bosonic and (2017).
fermionic systems with on-site symmetries,” Phys. Rev. [27] F. A. Bais and J. K. Slingerland, “Condensate-induced
B 95, 235140 (2017). transitions between topologically ordered phases,” Phys.
[11] Ashvin Vishwanath and T. Senthil, “Physics of three- Rev. B 79, 045316 (2009).
dimensional bosonic topological insulators: Surface- [28] F. J. Burnell, Joost Slingerland, and Steven H. Simon,
deconfined criticality and quantized magnetoelectric ef- “Phase transitions in topological lattice models via topo-
fect,” Phys. Rev. X 3, 011016 (2013). logical symmetry breaking,” New Journal of Physics 14,
[12] Xie Chen, F. J. Burnell, Ashvin Vishwanath, and 015004 (2012).
Lukasz Fidkowski, “Anomalous symmetry fractionaliza- [29] F. J. Burnell, Steven H. Simon, and Joost Slingerland,
tion and surface topological order,” Phys. Rev. X 5, “Condensation of achiral simple currents in topological
041013 (2015). lattice models: Hamiltonian study of topological symme-
[13] Alexei Yu Kitaev, “Fault-tolerant quantum computation try breaking.” Phys. Rev. B 84, 125434 (2011).
by anyons,” Annals of Physics 303, 2–30 (2003). [30] Marc D. Schulz and Fiona J. Burnell, “Frustrated topo-
[14] Michael A. Levin and Xiao-Gang Wen, “String-net con- logical symmetry breaking: Geometrical frustration and
densation: A physical mechanism for topological phases,” anyon condensation,” Phys. Rev. B 94, 165110 (2016).
Phys. Rev. B 71, 045110 (2005). [31] M. H. Freedman, J. Gukelberger, M. B. Hastings,
[15] Yuting Hu, Yidun Wan, and Yong-Shi Wu, “Twisted S. Trebst, M. Troyer, and Z. Wang, “Galois conjugates
quantum double model of topological phases in two– of topological phases,” Phys. Rev. B 85, 045414 (2012).
dimension,” Phys. Rev. B 87, 125114 (2013). [32] Eric Rowell, Richard Stong, and Zhenghan Wang, “On
[16] Kevin Walker and Zhenghan Wang, “(3+1)-tqfts and classification of modular tensor categories,” Communica-
topological insulators,” Frontiers of Physics 7, 150–159 tions in Mathematical Physics 292, 343–389 (2009).
(2012). [33] S. B. Bravyi and A. Y. Kitaev, “Quantum codes on a
[17] Alexei Kitaev and Liang Kong, “Models for gapped lattice with boundary,” quant-ph/9811052 (1998).
boundaries and domain walls,” Commun. Math. Phys. [34] Yuting Hu, Spencer D. Stirling, and Yong-Shi Wu,
28
“Ground-state degeneracy in the levin-wen model for [37] Daisuke Tambara and Shigeru Yamagami, “Tensor cat-
topological phases,” Phys. Rev. B 85, 075107 (2012). egories with fusion rules of self-duality for finite abelian
[35] Mark de Wild Propitius, Topological interactions in bro- groups,” journal of algebra 209, 692–707 (1998).
ken gauge theories, Ph.D. thesis, University of Amster- [38] Dominic J. Williamson and Zhenghan Wang, “Hamilto-
dam (1995). nian models for topological phases of matter in three
[36] Shlomo Gelaki, Deepak Naidu, and Dmitri Nikshych, spatial dimensions,” Annals of Physics 377, 311 – 344
“Centers of graded fusion categories,” Algebra Number (2017).
Theory 3 8, 959–990 (2009).