This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Boson condensation and instability in the tensor network representation of string-net states

Sujeet K. Shukla Institute of Quantum Information and Matter, California Institute of Technology, California, USA    M. Burak Şahinoğlu Vienna Center for Quantum Technology, University of Vienna, Boltzmanngasse 5, 1090 Vienna, Austria    Frank Pollmann Max-Planck-Institut fu¨\ddot{u}r Physik komplexer Systeme, D-01187 Dresden, Germany    Xie Chen Department of Physics and Institute for Quantum Information and Matter, California Institute of Technology, Pasadena, CA 91125, USA
(August 9, 2025)
Abstract

The tensor network representation of many-body quantum states, given by local tensors, provides a promising numerical tool for the study of strongly correlated topological phases in two dimension. However, the representation may be vulnerable to instabilities caused by small variations in the local tensors. For example, the topological order in the tensor network representations of the toric code ground state has been shown in Ref.Chen et al., 2010 to be unstable if the variations break certain Z2Z_{2} symmetry of the tensor. In this work, we ask whether other types of topological orders suffer from similar kinds of instability and if so, what is the underlying physical mechanism and whether we can protect the order by enforcing certain symmetries on the tensor. We answer these questions by showing that the tensor network representation of all string-net models are indeed unstable, but the matrix product operator (MPO) symmetries of the tensors identified in Ref.Şahinoğlu et al., 2014 can help to protect the order. In particular we show that a subset of variations that break the MPO symmetries lead to instability by inducing the condensation of bosonic quasi-particles which destroys the topological order in the system. Therefore, such variations must be forbidden for the encoded topological order to be reliably extracted from the local tensors. On the other hand, if a tensor network based variational algorithm is used to simulate the phase transition due to boson condensation, such variation directions may prove important to access the continuous transition correctly.

pacs:

I Introduction

The tensor network representation of quantum states (including the matrix product states in 11D)Fannes et al. (1992); White (1993); Verstraete et al. (2008); Vidal (2009) provides a generic tool for the numerical study of strongly interacting systems. As variational wave functions, the tensor network states can be used to find the ground state wave function of local Hamiltonians and identify the phase at zero temperature. In particular, it has become a powerful approach in the study of topological phases, whose long range entanglement is hard to capture with conventional methods. It has been shown that a large class of topological states, the string-net condensed states Levin and Wen (2005), can be represented exactly with simple tensors Gu et al. (2009); Buerschaper et al. (2009). Moreover, numerical studies applied to realistic models have identified nontrivial topological features in the ground state wave function (see e.g. Ref.Yan et al., 2011; Jiang et al., 2012; Depenbrock et al., 2012).

In the numerical program, the parameters in the tensors are varied so as to find the representation of the lowest energy state. After that, topological properties are extracted from these tensors in order to determine the topological phase diagram at zero temperature. However, this problem might not be numerically ‘well-posed’. That is, arbitrarily small variations in the local tensor may lead to completely different result as to what topological order it represents. In particular, Ref. Chen et al., 2010 demonstrates that this happens in the case of Z2Z_{2} toric code topological order. While this presents a serious problem for the tensor network approach to study topological phases, Ref. Chen et al., 2010 also showed that such instabilities can be avoided if certain Z2Z_{2} symmetry is preserved in the local tensor. It has been shown that the topological order in the toric code model is stable against arbitrary local perturbation to the Hamiltonian of the system Bravyi et al. (2010). The fact that a certain variation direction of the tensor network representation may induce an immediate change in the topological order indicates that such a variation corresponds to highly nonlocal changes in the ground state wave function.

Does similar problem occur for general string-net states as well? This is the question we address in this paper. In particular, we ask:

  1. 1.

    Does the tensor network representation of other string-net states also have such unstable directions of variation?

  2. 2.

    If so, can they be avoided by preserving certain symmetries in the local tensor?

  3. 3.

    What is the physical reason behind such instabilities and their prevention?

While the Z2Z_{2} symmetry requirement for toric code is naturally related to the Z2Z_{2} gauge symmetry of the theory, for more general string-nets which are not related to gauge theory, it is not clear whether similar symmetry requirement is necessary and if so what they are.

In this paper, we answer the above questions as follows:

  1. 1.

    All string-net tensors have unstable directions of variation.

  2. 2.

    To avoid such instabilities, we need to avoid ‘stand-alone’ variations that break the Matrix-Product-Operator(MPO) symmetry introduced in Ref.Şahinoğlu et al., 2014; Buerschaper, 2014. (We are going to explain in detail what ‘stand-alone’ and MPO symmetry means in the following sections).

  3. 3.

    The physical reason for the instability is that ‘stand-alone’ variations which violate these symmetries induce condensation of bosonic quasi-particles and hence destroys (totally or partially) the topological order.

To support the above claims, we calculate the topological entanglement entropy StopoS_{\text{topo}}Kitaev and Preskill (2006); Levin and Wen (2006) from the representing tensor and (partially) characterize the encoded topological order. In particular, consider a tensor network state represented by a local tensor TT. We are interested in varying the local tensor TT everywhere on the lattice, in such a way that, TT+ϵTT\rightarrow T+\epsilon T^{\prime}, where ϵ1\epsilon\ll 1. In order to study whether topological order is lost or still present after a variation in the direction TT^{\prime}, we calculate topological entanglement entropy of the original and the modified state as a function of ϵ\epsilon, Stopo(ϵ)S_{\text{topo}}(\epsilon). We say the variation is unstable in TT^{\prime} direction if

limϵ0Stopo(ϵ)Stopo(0).\displaystyle\lim_{\epsilon\rightarrow 0}S_{\text{topo}}(\epsilon)\neq S_{\text{topo}}(0). (1)

If limϵ0Stopo(ϵ)\lim_{\epsilon\rightarrow 0}S_{\text{topo}}(\epsilon) is smaller than Stopo(0)S_{\text{topo}}(0), we say that topological order is (partially) lost. If limϵ0Stopo(ϵ)=Stopo(0)\lim_{\epsilon\rightarrow 0}S_{\text{topo}}(\epsilon)=S_{\text{topo}}(0) we call that direction stable meaning that topological order is still present and remains the same. This understanding of tensor instability is important not only for the identification of topological order for a particular model, but also for the numerical study of phase transitions between topological phases. In particular, if one is to use the tensor network approach to study phase transition due to boson condensation, then the corresponding variation direction must be allowed in order for the simulation to give correct results. For example, in Ref. Gu et al., 2008, it was shown that if such variation directions are not included as variational parameters, then we see a first order transition even though in fact it is second order. We are going to elaborate more on this point later in the paper.

The paper is organized as follows. In section II, we start from the simplest string-net model – the toric code modelKitaev (2003), and study two types of tensor network representation of its ground state. The single line representation was studied in Ref. Chen et al., 2010 and here we recover the result on the instability of the tensor with respect to certain Z2Z_{2} symmetry breaking variations. While reproducing the result, we introduce a new algorithm which allows us to investigate more complicated string-net models in later parts of this paper. The second representation we study for the toric code is the double line representation, as discussed in Ref.Gu et al., 2008. While the single line representation has only one virtual Z2Z_{2} symmetry, the double line representation has multiple of them. Do they all protect the encoded topological order in the same way? To find out, we calculate, with the new algorithm, the topological entanglement entropy for the double line representation with different variations. It reveals that there are actually two kinds of symmetries, and their relation to the topological order is actually opposite to one another. That is, the only variations that change the topological order are the ones that respect the first kind of symmetry (which we call ‘stand-alone’) but actually break the second kind (MPO symmetry Şahinoğlu et al. (2014)). One of the key results of this paper is contained in the next section, III, where we first identify the source of these two symmetries and define them precisely, and make the general conjecture of TNR-instability. This conjecture says that all TNR have these two kinds of symmetries it is always the variations that respect the stand-alone but break the MPO symmetry that are unstable.

Then in section IV we put forward the physical understanding of TNR instability by systematically understanding the physical significance of the two symmetries and their interplay. This understanding concludes that the instability occurs due to condensation of topological bosons of the string-net model under consideration. In the next section we note that tensor instability actually has implications for phase transition simulations using tensor network ansatz. And hence, our result should guide the choice of tensor network anstaz in phase transition simulations. To generalize our study to generic string-net models, we study next the double semion model in section VI. We first predict instabilities using our conjecture, and then find them to be true in our numerical calculation.

We then directly apply our study to the general string-net model and its triple-line TNR in section VII. We calculate the required symmetries and conclude that our conjecture predicts that triple-line TNR of all string-net have unstable directions of variations. An analytical proof of this prediction can be found in Appendix F. Finally in section VIII we test our understanding of the general string-model on the double-Fibonacci model, which has a non-abelian topological order as opposed to toric code and double-semion. We again find our conjectures to be precisely accurate. Our results also reveal the physical meaning of the virtual tensor network symmetries for topologically ordered ground states that have been found for Kitaev quantum double models (G-injectivitySchuch et al. (2010)) and later generalized to twisted quantum doubles (twisted G-injectivityBuerschaper (2014) and MPO-injectivityŞahinoğlu et al. (2014)) and general string-net models (MPO-injectivityŞahinoğlu et al. (2014)).

Finally, a summary of the results is given in section IX and open questions are discussed. Some details of our analysis are explained in the appendices, including relations of MPO symmetries to the Wilson-loop operators, a brief review of string-net models, their tensor network representation and their transformation under the application of string-operators, proof of the existence of unstable directions in triple-line representations of general string-net ground states, and finally the dependence of topological entanglement entropy on the choice of boundary condition in our calculation.

II Instabilities in TNRs of the toric code

Refer to caption
Figure 1: Vertex and plaquate terms of the toric code Hamiltonian

We start from the simplest illustrative example of nonchiral intrinsic topological order: the toric code (Kitaev, 2003). We work on a hexagonal lattice and assign local degrees of freedom, i.e. 0-spin down- or 11-spin up, on the edges of the lattice. It is convenient to consider spin up as a presence of a string and 0 as the absence of the string. So the total Hilbert space can be thought of as the space of all string configurations on a hexagonal lattice. The toric code Hamiltonian is a sum of local commuting projectors, given as

H\displaystyle H =\displaystyle= vAvpBp\displaystyle-\sum_{v}A_{v}-\sum_{p}B_{p} (2)
=\displaystyle= vlvZlplpXl\displaystyle-\sum_{v}\prod_{l\in v}Z_{l}-\sum_{p}\prod_{l\in p}X_{l}

where vv denotes the vertices, and pp denotes the plaquettes. lvl\in v denotes the edges attached to vv and lpl\in p denotes the edges on the boundary of plaquette pp (see Fig. 1). Vertex terms restrict the ground states to closed strings of 11s and plaquette terms make all possible loop configurations of equal weight. Hence, the toric code ground state (up to normalization) can be written as

|Ψgs=Xclosed|X\displaystyle|\Psi_{\textrm{gs}}\rangle=\sum_{X\in\text{closed}}|X\rangle (3)

where XX denotes the string configurations on the lattice. So, the ground state of toric code Hamiltonian is an equal weight superposition of all closed string configurations. It has topological order and has topological entanglement entropy Stopo=log2S_{\text{topo}}=\log 2. The toric code model has 4 anyons (superselection sectors), {𝟏,e,m,em}\{\mathbf{1},e,m,em\}. 𝟏\mathbf{1} is the vacuum, ee-particle is the Z2Z_{2}-gauge charge (violates the vertex term) and mm-particle is the Z2Z_{2}-gauge flux (violates the plaquette term). Both ee and mm have a trivial topological spin, so we call them topological bosons, or simply bosons. Braiding ee with mm produces a phase factor of 1-1.

Now we look at tensor network representations (TNR) of the toric code ground state. Specifically, we will first explain the Single-line tensor representation, and then the Double-line tensor representation. We will see that different TNRs of the same state can have different kinds of instabilities.

II.1 Single-line TNR of the toric code and its instability

Refer to caption
Figure 2: Single-line TNR of the toric code state: we double the local Hilbert space on each edge and take |i|ii|i\rangle\rightarrow|ii\rangle, i=0,1i=0,1. So the state has a Z2Z_{2} topological order but on a bigger Hilbert space. We associate to each vertex the tensor product of 3 Hilbert spaces closest to it. We can now place a tensor, T0T^{0} on each vertex with 3 out of plane physical legs, i,j,ki,j,k, and 3 in-plane virtual legs, α,β,γ\alpha,\beta,\gamma with values as given in Eq. (4).

This is the simplest TNR of the toric code state. We first copy each computational basis into two, as shown in the Fig. 2. That is, the labels 0 and 11 on every edge become 0000 and 1111 on the same edge. Now the local Hilbert space neighbouring each vertex is made out of three qubits. We associate a tensor with three physical indices/legs (throughout the paper we will use “indices” and “legs” interchangeably), and three virtual indices/legs to each vertex, represented algebraically as (T0)αβγijk(T^{0})^{ijk}_{\alpha\beta\gamma} where i,j,ki,j,k are the three physical indices and α,β,γ\alpha,\beta,\gamma are the three virtual indices, as shown in Fig. 2. The components of the tensor are

(T0)αβγijk={δiαδjβδkγ if α+β+γ=even0 otherwise\displaystyle(T^{0})^{ijk}_{\alpha\beta\gamma}=\begin{cases}\delta_{i\alpha}\delta_{j\beta}\delta_{k\gamma}&\text{ if }\alpha+\beta+\gamma=\text{even}\\ 0&\text{ otherwise}\end{cases} (4)

where δ\delta is the kronecker delta function. So, physical and virtual legs are identified and an even number of indices carry label 11 out of every three edges neighbouring a vertex, i.e., we satisfy the vertex condition. The plaquette condition is also satisfied since every configuration is of equal weight. Therefore, the tensor network state constructed using the above local tensor leads to the toric code ground state given in Eq. (3).

It was shown by Chen et al. (2010) that single-line TNR of the toric code state is not stable in certain directions of variation. Before we explain what these unstable directions of variation are, we first note that the single-line TNR explained above has a virtual symmetry. If an operation on the virtual indices leaves the tensor invariant, we will call it a virtual symmetry of the tensor. Because the single-line tensor is non-zero only when virtual legs have even number of 1s, it has a natural ZZZZ\otimes Z\otimes Z virtual symmetry (see Schuch et al. (2010) for TNR virtual symmetries of the quantum double models). That is, the tensor in (4) satisfies the relation,

[Uncaptioned image].\displaystyle\centering\includegraphics[scale={0.3}]{SLTCsym}.\@add@centering (5)

where we have omitted the physical legs for visual clarity. (We would often omit physical legs from tensor diagrams throughout the paper when we are mostly concerned with the virtual space/indices.) It is a Z2Z_{2} symmetry with group elements IIII\otimes I\otimes I and ZZZZ\otimes Z\otimes Z acting on the virtual legs of the local tensor. Chen et al. (2010) showed that topological order is stable with any Z2Z_{2} respecting variations and unstable with any Z2Z_{2} violating variation. To illustrate this, we can consider two different directions of variation in single-line TNR. We can add an XX or ZZ variation on one of the virtual indices of the tensor,

[Uncaptioned image].\displaystyle\includegraphics[scale={0.3}]{SLTCpert}. (6)

More explicitly, these tensor components are given by,

Tαβγ(X)=γXγ,γTαβγ0,\displaystyle T^{(X)}_{\alpha\beta\gamma}=\sum_{\gamma^{\prime}}X_{\gamma,\gamma^{\prime}}T^{0}_{\alpha\beta\gamma}, (7)
Tαβγ(Z)=γZγ,γTαβγ0.\displaystyle T^{(Z)}_{\alpha\beta\gamma}=\sum_{\gamma^{\prime}}Z_{\gamma,\gamma^{\prime}}T^{0}_{\alpha\beta\gamma}. (8)

T(X)T^{(X)} variation violates the Z2Z_{2} symmetry while T(Z)T^{(Z)} does not. That is,

[Uncaptioned image],\displaystyle\includegraphics[scale={0.3}]{SLTCpertZ2}, (9)

and it was shown that T(X)T^{(X)} type variations cause an instability and while T(Z)T^{(Z)} type variations do not. Note that, though we chose variations only on the virtual indices for simple illustration, the same conclusion applies for any random variation including those on the physical indices. However, if a variation acts only on the physical indices, it cannot break the Z2Z_{2} virtual symmetry, and hence would always be stable.

We reproduce this known result with a new algorithm for calculating StopoS_{\text{topo}}. This algorithm allows us to calculate StopoS_{\text{topo}} in more complicated examples to be dealt with later. Before we move on to other TNRs, we would like to explain the algorithm used here. Readers can skip this section if they are not interested in the details of the algorithm.

II.2 Algorithm for calculating topological entanglement entropy

Here we explain the algorithm we use to calculate the topological entanglement entropy of any translation invariant tensor network state. We use the idea presented by Cirac et al. (2011) to calculate reduced density matrix on a region and hence its entanglement entropy. We consider honeycomb lattice, though it can easily be extended to other lattices. By translation invariant we mean that all vertices on the sublattice A and sublattice B are attached with the same tensors, TAT_{A} and TBT_{B}, respectively. First we define certain notations for convenience of later discussion. The starting objects are given tensors TαIT^{I}_{\alpha}, where II and α\alpha denote the set of physical and virtual indices, respectively: I=(i1,i2,..),α=(α1,α2,..)I=(i_{1},i_{2},..),\alpha=(\alpha_{1},\alpha_{2},..). The state represented by these tensors can be written as

|Ψ=I1,I2,..Tr(TI1TI2)|I1,I2,.\displaystyle|\Psi\rangle=\sum_{I_{1},I_{2},..}\text{Tr}(T^{I_{1}}T^{I_{2}}\ldots)|I_{1},I_{2},...\rangle. (10)

We denote the tensor resulting from contracting the virtual indices of tensors TT on a region RR as T(R)T(R). 𝕋\mathbb{T} denotes the ‘double tensor’ resulting from contracting the physical indices of TT with those of TT^{\dagger}, that is, 𝕋=TT=ITαI(TαI)\mathbb{T}=TT^{\dagger}=\sum_{I}T^{I}_{\alpha}\left(T^{I}_{\alpha^{\prime}}\right)^{*}. Similar to T(R)T(R), we denote the double tensor contracted on a region RR as 𝕋(R)\mathbb{T}(R).

Refer to caption
Figure 3: The honeycomb lattice is put on a cylinder with some boundary tensors, TrT_{r}. We calculate the topological entanglement entropy by calculating the entanglement entropy of the right half of the cylinder.

Now let us consider putting this tensor network state on a cylinder. We denote the left half of the cylinder as LL and the right half as RR. The honeycomb lattice is placed in a way so that LL and RR divide it into exact halves. So the line between the two halves goes through the middle of the plaqeuttes as shown in the Fig. 3. We denote the tensors on the left and right boundaries as TlT_{l} and TrT_{r}.

When we contract bulk double tensors with the boundary double tensors, we get a density matrix operator on the virtual indices,

σL=𝕋l(L)𝕋(L),σR=𝕋(R)𝕋r(R).\displaystyle\sigma_{L}=\mathbb{T}_{l}(\partial L)\mathbb{T}(L),\quad\sigma_{R}=\mathbb{T}(R)\mathbb{T}_{r}(\partial R). (11)

Cirac et al. (2011) showed that the physical reduced density matrix on one of these halves, let’s say the left one, is related to the density operator on the virtual indices as,

ρL=UσLTσRσLTU\displaystyle\rho_{L}=U\sqrt[]{\sigma_{L}^{T}}\sigma_{R}\sqrt{\sigma_{L}^{T}}U^{\dagger} (12)

where UU is an isometry. Hence ρL\rho_{L} and σLTσRσLT\sqrt[]{\sigma_{L}^{T}}\sigma_{R}\sqrt{\sigma_{L}^{T}} have the same spectrum. In addition, under right symmetry conditions, σLT=σR=σb\sigma_{L}^{T}=\sigma_{R}=\sigma_{b}. When this is true, up to change of basis, we find that ρLσb2\rho_{L}\propto\sigma_{b}^{2}. The normalized reduced density matrix is

ρL\displaystyle\rho_{L} =\displaystyle= σb2Tr(σb2).\displaystyle\frac{\sigma_{b}^{2}}{\textrm{Tr}(\sigma_{b}^{2})}. (13)

It is known that the Rényi entropy with any Rényi index gives the same topological entanglement entropyFlammia et al. (2009). So we calculate Rényi entropy with Rényi index 12\frac{1}{2},

S1/2(ρL)\displaystyle S_{1/2}(\rho_{L}) =\displaystyle= 111/2logTr(ρL1/2)\displaystyle\frac{1}{1-1/2}\log\textrm{Tr}(\rho_{L}^{1/2}) (14)
=\displaystyle= 2logTr(σb)logTr(σb2).\displaystyle 2\log\textrm{Tr}(\sigma_{b})-\log\textrm{Tr}(\sigma_{b}^{2}).

In the limit of large cylinder, it should behave like

S1/2(ρL)\displaystyle S_{1/2}(\rho_{L}) =\displaystyle= α0|C|Stopo\displaystyle\alpha_{0}|C|-S_{\text{topo}} (15)

where |C||C| is the circumference of the cylinder. This is how we calculate StopoS_{\text{topo}} starting with a tensor network state.

Before we move on to the next step, we would like to mention an important subtlety regarding computation of StopoS_{\text{topo}} on a cylinder. In Ref.Dong et al., 2008; Zhang et al., 2012 it has been shown that StopoS_{\text{topo}} calculated this way on a cylinder, in general, might depend on the boundary conditions. We choose a particular boundary condition for all our calculations and examine the dependence of StopoS_{\text{topo}} on boundary condition in the appendix G. Our findings are consistent with the conclusion in Ref.Zhang et al., 2012.

We first have to calculate 𝕋(R)𝕋r(R)\mathbb{T}(R)\mathbb{T}_{r}(\partial R) for the above setup. The problem is, the computational complexity of exact tensor contraction grows exponentially with the size of RR, so we need to use some approximate renormalization algorithm. We use an algorithm which is a slight modification of known tensor renormalization algorithms (Gu et al., 2008; Vidal, 2003, 2009). Consider double tensors contracted along a thin strip on the cylinder giving us a transfer matrix operator, 𝕊\mathbb{S}. If RR includes nn of such strips, we have 𝕋(R)=𝕊n\mathbb{T}(R)=\mathbb{S}^{n}. Since the tensor network state under consideration are short range correlated along the cylinder, the spectrum of 𝕊\mathbb{S} is gapped. Consequently, for large nn, only the highest eigenvalue and the corresponding eigenvector of 𝕊\mathbb{S} dominates. That is, in thermodynamic limit, 𝕋(R)\mathbb{T}(R) only depends on the highest eigenvalue/eigenvector of the transfer matrix operator, 𝕊\mathbb{S}. Moreover, we expect to approximate the eigenvector of highest eigenvalue with a Matrix Product State (MPS) with finite bond dimensions, since the tensor network state is short range correlated along the circumference of the cylinder. So we can start with a boundary MPS, apply the transfer matrix operator, and approximate the resulting state as an MPS with a fixed, finite bond dimensions. With each step, approximation to the eigenvector with highest eigenvalue improves and we do this recursively until we reach the fixed point giving us the desired eigenvector. Note that we require transfer matrix operators to be reflection symmetric for the condition σLT=σR=σbρLσb2\sigma_{L}^{T}=\sigma_{R}=\sigma_{b}\Rightarrow\rho_{L}\propto\sigma_{b}^{2} to hold true.

The recursive algorithm is as following:

  1. 1.

    Initiate the boundary double tensor 𝕋A=𝕋r,A\mathbb{T}_{A^{\prime}}=\mathbb{T}_{r,A^{\prime}} and 𝕋B=𝕋r,B\mathbb{T}_{B^{\prime}}=\mathbb{T}_{r,B^{\prime}}. The tensor network to be contracted looks as

    [Uncaptioned image] (16)
  2. 2.

    Contract the bulk double tensors, 𝕋A\mathbb{T}_{A} and 𝕋B\mathbb{T}_{B} with the boundary tensors 𝕋A\mathbb{T}_{A^{\prime}} and 𝕋B\mathbb{T}_{B^{\prime}} in the following way to make the 4 leg tensor 𝕋ABBA\mathbb{T}_{AB^{\prime}BA^{\prime}},

    (17)
  3. 3.

    Reshape the tensor 𝕋ABBA\mathbb{T}_{AB^{\prime}BA^{\prime}} into a matrix MM where Mαβ,βα=(𝕋ABBA)αββαM_{\alpha\beta^{\prime},\beta\alpha^{\prime}}=(\mathbb{T}_{AB^{\prime}BA^{\prime}})_{\alpha\beta^{\prime}\beta\alpha^{\prime}} Vidal (2003). Now we perform an SVD decomposition of MM, M=UΛVM=U\Lambda V^{\dagger} and the approximation step: we keep only the highest DcutD_{\textrm{cut}} singular values, and define the new tensors 𝕊A\mathbb{S}_{A^{\prime}} and 𝕊B\mathbb{S}_{B^{\prime}} as (SA)αβγ=Uαβ,γΛγ,γ(S_{A^{\prime}})_{\alpha\beta^{\prime}\gamma}=U_{\alpha\beta^{\prime},\gamma}\sqrt[]{\Lambda_{\gamma,\gamma}} and (SB)γβα=Λγ,γVγ,βα(S_{B^{\prime}})_{\gamma\beta\alpha^{\prime}}=\sqrt[]{\Lambda_{\gamma,\gamma}}V^{\dagger}_{\gamma,\beta\alpha^{\prime}} where γ\gamma takes values 1,2,,Dcut1,2,\ldots,D_{\textrm{cut}}. 𝕊A\mathbb{S}_{A^{\prime}} and 𝕊B\mathbb{S}_{B^{\prime}} form an approximate decomposition of 𝕋ABBA\mathbb{T}_{AB^{\prime}BA^{\prime}},

    γ=1Dcut(SA)αβγ(SB)γβα(𝕋ABBA)αββα\displaystyle\sum_{\gamma=1}^{D_{\text{cut}}}(S_{A^{\prime}})_{\alpha\beta^{\prime}\gamma}(S_{B^{\prime}}^{\dagger})_{\gamma\beta\alpha^{\prime}}\approx(\mathbb{T}_{AB^{\prime}BA^{\prime}})_{\alpha\beta^{\prime}\beta\alpha^{\prime}} (18)
    (19)
  4. 4.

    Check convergence of Λ\Lambda. η1\eta\ll 1 is the precison tolerance. Let nn denote the nnth recursion step. If ΛnΛn11<η||\Lambda_{n}-\Lambda_{n-1}||_{1}<\eta exit algorithm.

  5. 5.

    Put 𝕋A=𝕊A\mathbb{T}_{A^{\prime}}=\mathbb{S}_{A^{\prime}} and 𝕋B=𝕊B\mathbb{T}_{B^{\prime}}=\mathbb{S}_{B^{\prime}} and go to step 2.

II.3 Numerical result for single-line TNR with random variations

Refer to caption
Figure 4: Numerical calculation of topological entanglement entropy Stopo(ϵ)S_{\text{topo}}(\epsilon) of states represented by toric code fixed point single-line tensors, T0T^{0}, varied with an infinitesimal random tensor in different subspaces. ϵ\epsilon value is kept fixed at ϵ=0.01\epsilon=0.01. Blue dot corresponds to StopoS_{\text{topo}} with no variation. IV=I3I_{V}=I^{\otimes 3} is the projector on to the full virtual space. 𝕄=12(I3+Z3)\mathbb{M}=\frac{1}{2}(I^{\otimes 3}+Z^{\otimes 3}) is the projector on to the space of variations that respect the Z3Z^{\otimes 3} symmetries. So, IV𝕄I_{V}-\mathbb{M} is a projector on to the space of variations that break Z3Z^{\otimes 3} symmetries. We see that variations in IV𝕄I_{V}-\mathbb{M} subspace are unstable while variations in 𝕄\mathbb{M} are stable. Details of this numerical calculation are given in the appendix H.1

.

We use the algorithm described in the previous section to calculate StopoS_{\text{topo}} of the tensor network state constructed by a local tensor with random variations added to the fixed point tensor given in Eq. (4). IV=I3I_{V}=I^{\otimes 3} is projector onto the full virtual space. 𝕄=12(I3+Z3)\mathbb{M}=\frac{1}{2}(I^{\otimes 3}+Z^{\otimes 3}) is a projector on to the space of variations that respect the Z3Z^{\otimes 3} symmetries. So, IV𝕄I_{V}-\mathbb{M} is a projector on to the space of variations that break Z3Z^{\otimes 3} symmetries. We first calculate StopoS_{\text{topo}} in the state constructed by the fixed point tensor, T0T^{0}. Then we generate a random tensor TrT^{r} on the full space, project it on to the subspace IV𝕄I_{V}-\mathbb{M}, add it to the fixed point value, T0T0+ϵ(IV𝕄)TrT^{0}\rightarrow T^{0}+\epsilon(I_{V}-\mathbb{M})T^{r} and calculate Stopo(ϵ)S_{\textrm{topo}}(\epsilon). Similarly, we generate a random tensor TrT^{r} on the full space, project it on to Z3Z^{\otimes 3} respecting subspace 𝕄\mathbb{M}, add it to the fixed point value, T0T0+ϵ𝕄TrT^{0}\rightarrow T^{0}+\epsilon\mathbb{M}T^{r} and calculate Stopo(ϵ)S_{\textrm{topo}}(\epsilon). We keep the value of variation strength ϵ=0.01\epsilon=0.01 (low enough) to make sure it is not near any phase transition point. The results are shown in Fig. 4.

We see that Z3Z^{\otimes 3} respecting variations lead to the same topological entanglement entropy as the fixed point state, while Z3Z^{\otimes 3} violating variations lead to zero topological entanglement entropy. This reproduces the result by Chen et al. (2010).

II.4 Double-line TNR of the toric code state and its instablities

Refer to caption
Figure 5: Double-line TNR of the toric code state. We double the local Hilbert spaces in the same way as that for single-line TNR (Fig. 2). We associate to each vertex a tensor Tα,α;β,β;γ,γi,j,kT^{i,j,k}_{\alpha,\alpha^{\prime};\beta,\beta^{\prime};\gamma,\gamma^{\prime}}, where out of plane legs, i,j,ki,j,k, correspond to the 3 physical indices, and in-plane legs α,α,β,β,γ,γ\alpha,\alpha^{\prime},\beta,\beta^{\prime},\gamma,\gamma^{\prime} are the virtual indices. Virtual indices of the tensors contract along the shared edges to produce the toric code state on the physical indices.

In the double-line TNR of the toric code state, we associate with each vertex a tensor with 3 physical legs and 6 virtual legs, Tαα;ββ;γγijkT^{ijk}_{\alpha\alpha^{\prime};\beta\beta^{\prime};\gamma\gamma^{\prime}}, (see Fig. 5). We will refer to these virtual indices as ‘plaquette indices’ or ‘plaquette legs’ sometimes, because they carry the plaquette degree of freedom that comes from the local Hamiltonian term. All indices take values 0 and 1. We denote the TNR corresponding to the RG fixed point state as T0T^{0}. (We use the same notation for different fixed point tensors, but it should be clear from the context which fixed point tensor we are discussing.) First property of T0T^{0} is that (T0)αα;ββ;γγijkδααδββδγγ(T^{0})^{ijk}_{\alpha\alpha^{\prime};\beta\beta^{\prime};\gamma\gamma^{\prime}}\propto\delta_{\alpha\alpha^{\prime}}\delta_{\beta\beta^{\prime}}\delta_{\gamma\gamma^{\prime}}, that is, indices on the same plaquette assume the same values. The second property is that the physical indices can be considered as labeling the domain wall between the virtual indices. If the two virtual indices in the same direction have the same values (both either 0000 or 1111) then the physical index in the middle has value 0, otherwise it is 11. That is, i=β+γ,j=γ+α,k=α+βi=\beta+\gamma,j=\gamma+\alpha,k=\alpha+\beta (all additions are modulo 2). So we can write T0T^{0} as

(T0)αα;ββ;γγijk=Sαβγijkδααδββδγγ,\displaystyle(T^{0})^{ijk}_{\alpha\alpha^{\prime};\beta\beta^{\prime};\gamma\gamma^{\prime}}=S^{ijk}_{\alpha\beta\gamma}\delta_{\alpha\alpha^{\prime}}\delta_{\beta\beta^{\prime}}\delta_{\gamma\gamma^{\prime}},
Sαβγijk\displaystyle S^{ijk}_{\alpha\beta\gamma} =\displaystyle= {1 if i=β+γ,j=γ+α,k=α+β0 otherwise.\displaystyle\begin{cases}1&\text{ if }i=\beta+\gamma,j=\gamma+\alpha,k=\alpha+\beta\\ 0&\text{ otherwise}\end{cases}.

We can write all non-zero components explicitly,

T00;00;00000=T11;11;11000=1,\displaystyle T^{000}_{00;00;00}=T^{000}_{11;11;11}=1,\quad T00;11;11011=T11;00;00011=1,\displaystyle T^{011}_{00;11;11}=T^{011}_{11;00;00}=1,
T11;00;11101=T00;11;00101=1,\displaystyle T^{101}_{11;00;11}=T^{101}_{00;11;00}=1,\quad T11;11;00110=T00;00;11110=1.\displaystyle T^{110}_{11;11;00}=T^{110}_{00;00;11}=1.

Is double-line TNR unstable too? We find that it is unstable as well in certain directions of variations. Similar to the single-line case, a variation is stable or unstable depending on whether or not it violates certain virtual symmetries. So let’s first look at the symmetries of the double-line TNR. It has 6 virtual indices, so the virtual space dimension is 26=642^{6}=64, while the physical space dimension is again 4. So we need a symmetry group with |G|=64/4=24|G|=64/4=2^{4}. Indeed the tensor has a Z2×Z2×Z2×Z2Z_{2}\times Z_{2}\times Z_{2}\times Z_{2} virtual symmetries. First it has a X6X^{6} symmetry. That is, if we flip all the six virtual indices, the tensor remains the same. Second, it has three ZZZ\otimes Z symmetries, where ZZZ\otimes Z are applied to the two virtual indices on the same plaquette. So the double-line tensor in (LABEL:DLTNReq) satisfies these symmetry equations:

[Uncaptioned image].\displaystyle\includegraphics[width=173.44865pt]{DLTCsym}. (21)

Single-line TNR had only one such Z2Z_{2} symmetry and it turned out that breaking it results in phase transition. For double-line we have four Z2Z_{2} symmetries. So the question is, are all of them important? That is, is it the case that breaking any of them with a variation leads to instability? Indeed many different possible kinds of variations are possible:

[Uncaptioned image].\displaystyle\includegraphics[width=151.76633pt]{DLTCpert}. (22)

A variation can violate ZZZ\otimes Z but not X6X^{\otimes 6} (for example, 22(a) ), or it can violate X6X^{\otimes 6} but not ZZZ\otimes Z (for example, 22(b) ), or it can violate both (for example, 22(c) ), or it can violate neither(for example, 22(d) ), etc. So to find out, we need to look at the unstable directions of variations of the fixed point tensor.

Our numerical calculation reveals an interesting result. We find that (see Fig. 6 )

  1. 1.

    If a variation violates any of the ZZZ\otimes Z symmetries then it is stable.

  2. 2.

    If a variation respects all ZZZ\otimes Z symmetres then there are two subcases

    1. (a)

      If it respects X6X^{\otimes 6} symmetry then it is stable.

    2. (b)

      If it breaks X6X^{\otimes 6} symmetries then it is unstable.

Refer to caption
Figure 6: Numerical calculation of topological entanglement entropy Stopo(ϵ)S_{\text{topo}}(\epsilon) of the states represented by toric code fixed point double-line tensors, T0T^{0}, varied with an infinitesimal random tensor in different subspaces. ϵ\epsilon value is kept fixed at ϵ=0.01\epsilon=0.01. Blue dot corresponds to StopoS_{\text{topo}} with no variation. IVI_{V} is projector onto the full virtual space. M0M_{0} is the projector on the stand-alone subspace. 𝕄\mathbb{M} is the MPO-injective subspace projector. We take a random tensor and apply the projectors to generate random tensors in respective subspaces. Variations in IVM0I_{V}-M_{0} violate ZZZ\otimes Z symmetry. Variations in M0𝕄M_{0}-\mathbb{M} violate X6X^{\otimes 6} but not ZZZ\otimes Z. Variations in 𝕄\mathbb{M} violate no virtual symmetry. The details of this numerical calculation are given in appendix A.2.

So we see that the relation between unstable variations and virtual symmetries of the double-line TNR is more complicated than that for single-line TNR. The X6X^{\otimes 6} symmetry looks like the Z3Z^{\otimes 3} symmetry of the single-line TNR, as they both operate as a loop operators, and unstable variations in both TNR violates these loop symmetries. However, the crucial difference in double-line is that then there are extra symmetries (the 3 Z2Z^{\otimes 2} symmetries) which have an exact opposite relation with the unstable variations: a variation is actually stable when it violates these symmetries (irrespective of whether or not it violated the loop symmetry). It indicates that the sources of these two kinds of symmetries must be different.

How can we understand this phenomena? We will now show that the sources of these symmetries are indeed different, and it is the interplay between these two symmetries that determines the tensor instability phenomena. The symmetries whose violation causes instability comes from the so-called MPO-injective subspaceŞahinoğlu et al. (2014) of the virtual space, while the symmetries whose violation causes stability comes from what we define to be stand-alone subspace. We now define these subspaces precisely and put forward the conjecture regarding their relationship to TNR instability.

III Virtual symmetries/subspaces of a TNR and Tensor-Instability Conjecture

We first give a constructive definition of stand-alone subspace of a TNR.

III.1 Stand-alone subspace

A generic tensor can be thought of as a linear map from virtual vector space to the physical vector space. Consider a generic tensor, TαIT^{I}_{\alpha} where II is the collection of all physical indices and α\alpha is the collection of all virtual indices. Double tensor 𝕋\mathbb{T} of a tensor TT is defined as 𝕋=ITαI(T)αI\mathbb{T}=\sum_{I}T^{I}_{\alpha}(T^{*})^{I}_{\alpha^{\prime}}. For example, for single-line TNR the double tensor can be represented diagrammatically as follows

(23)

In general we would think of double tensor as having two layers of virtual indices, lower and upper. Double tensor can be interpreted as a density matrix on the virtual space. Now consider the double tensor of a RG fixed point TNR, 𝕋0\mathbb{T}^{0}, contracted over some large region RR. Let’s say we remove 𝕋0\mathbb{T}^{0} from one site and replace it with some other double tensor, 𝕋\mathbb{T} as follows:

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{standalone0}. (24)

What do we get? In particular, are there tensors 𝕋\mathbb{T} such that this replacement collapses the whole tensor network? By ‘collapse’, we mean that we simply get zero upon contraction. The answer turns out to be yes for tensors that represent topological order. In fact, as we will see later, most tensors 𝕋\mathbb{T} will collapse the fixed point tensor network upon replacement. It turns out that only the tensors supported on a particular subspace of the full virtual space can replace the fix point tensor without collapsing the whole tensor network. We will call this space the stand-alone subspace of the TNR. Now we will give a systematic way of calculating this subspace for a given fixed-point TNR.

Refer to caption
Figure 7: Calculation of stand-alone space. We put the fixed point double tensor network on a large disc with a hole at the origin (one double tensor removed). This tensor network has dangling virtual indices (red legs) at the outer and inner boundaries. We trace out the virtual indices at the outer boundary, and the support space of the remaining tensor at the inner boundary gives us the stand-alone space.

Consider contracting the fixed-point double tensors 𝕋0\mathbb{T}^{0} on a large disc with an open boundary. Now we remove the tensor at the origin. We get a tensor network with dangling virtual indices at the origin and at the boundary of the disc. We want to find out the space of tensors that can be put on the origin without collapsing the tensor network. We do not care what tensor at the boundary we get. So we trace out the indices at the outer boundary (i.e. contract upper and lower virtual indices with each other). This leaves us with a tensor at the origin. The support space of this tensor will be precisely the stand-alone space. Any tensor supported on this subspace can stand alone with the surrounding tensor being the fixed-point tensors.

Note that definition of stand-alone space implies that it is a vector space. If T1T_{1} and T2T_{2} doesn’t collapse the tensor network then aT1+bT2aT_{1}+bT_{2} will also not collapse the network.

Stand-alone subspace of double-line TNR: Now let’s first calculate the stand-alone subspace of double-line TNR of toric code as it is more interesting than that of single-line TNR. The double tensor of T0T^{0} in (LABEL:DLTNReq) can be written as (ignoring an overall normalization factor)

𝕋0\displaystyle\mathbb{T}^{0} =\displaystyle= I(T0)αI(T0;)αI\displaystyle\sum_{I}(T^{0})^{I}_{\alpha}(T^{0;*})^{I}_{\alpha^{\prime}} (25)
=\displaystyle= (I2+Z2)3(I+X6),\displaystyle(I^{\otimes 2}+Z^{\otimes 2})^{\otimes 3}(I^{\otimes}+X^{\otimes 6}),

where the double tensor is written as an operator between the lower virtual indices and upper virtual indices. The Z2Z^{\otimes 2} and X6X^{\otimes 6} act in the way it is shown in Fig. 21. We need to contract this tensor on a disc with a hole at the origin. To contract two tensors given in an operator form, we need to multiply them and take a trace on the shared indices. A cumbersome but straight-forward calculation shows that double tensor contracted on a region RR give (ignoring an overall normalization factor)

𝕋0(R)\displaystyle\mathbb{T}^{0}(R) =\displaystyle= (I2+Z2)m(R)\displaystyle\left(I^{\otimes 2}+Z^{\otimes 2}\right)^{\otimes m}(\partial R) (26)
(I2m(R)+X2m(R)),\displaystyle\left(I^{\otimes 2m}(\partial R)+X^{\otimes 2m}(\partial R)\right),

where R\partial R denote the boundary of RR, and m=|R|m=|\partial R| is the length of the boundary. O(R)O(\partial R) means the operator OO is applied on the virtual legs along the boundary R\partial R. We will omit this when it is clear from the context which leg the operator is being applied on. The region we want is a disc with a vertex removed, R=D2mD6R=D_{2m}-D_{6}. DnD_{n} denotes the disc with nn virtual legs at the boundary. It has two disconnected boundaries, one the boundary of D2mD_{2m} and other the boundary of D6D_{6} (with opposite orientation).

Refer to caption
Refer to caption
Figure 8: XX and ZZ operators appear differently in the toric code double-line double tensor contracted on a disc with a hole. XX operators on inner boundary only appears with XX operators on the outer boundary, which vanishes upon taking the trace. But ZZ operators on the inner boundary appear with identity on the outer boundary. So these terms survive the trace. That is why Z2Z^{\otimes 2} symmetry is imposed on the stand-alone space but not the X6X^{\otimes 6} symmetry.
𝕋(D2mD6)\displaystyle\mathbb{T}(D_{2m}-D_{6}) =\displaystyle= (I2+Z2)m(I2+Z2)3\displaystyle\left(I^{\otimes 2}+Z^{\otimes 2}\right)^{\otimes m}\otimes\left(I^{\otimes 2}+Z^{\otimes 2}\right)^{\otimes 3} (27)
(I2mI6+X2mX6).\displaystyle\left(I^{\otimes 2m}\otimes I^{\otimes 6}+X^{\otimes 2m}\otimes X^{\otimes 6}\right).

As explained in Fig. 8, XX operators act on the two boundaries simultaneously, but ZZ operators act independently. Now to get the stand-alone space at the origin, we need to trace out the virtual legs at the boundary of D2mD_{2m}. If we expand the expression for 𝕋(D2mD6)\mathbb{T}(D_{2m}-D_{6}) above and apply trace on the operators on the outer boundary, only the terms with identity on the outer boundary survive. XX operator does not have such a term, but ZZ does. So finally, tracing out the outer boundary leaves only Z2Z^{\otimes 2} on the inner boundary. That is, we get the following tensor on the 6 virtual indices incident on a singe vertex

B0=(I2+Z2)3.\displaystyle B_{0}=\left(I^{\otimes 2}+Z^{\otimes 2}\right)^{\otimes 3}. (28)

B02=8B0B_{0}^{2}=8B_{0}, so

M0=12B0=18(I2+Z2)3\displaystyle M_{0}=\frac{1}{2}B_{0}=\frac{1}{8}\left(I^{\otimes 2}+Z^{\otimes 2}\right)^{\otimes 3} (29)

is a projector on to the support space of B0B_{0}. M0M_{0} defines the stand-alone space of double-line TNR of toric code. Any tensor TT that satisfies M0T0M_{0}T\neq 0 can ‘stand alone’. M0M_{0} will be used to denote the projector on to stand-alone space throughout the paper. So we see that only the tensors that respect the ZZZ\otimes Z symmetry can stand alone. The X6X^{\otimes 6} symmetry, however, is not required to define the stand-alone space.

Stand-alone subspace of single-line TNR: We can also calculate the stand-alone subspace of single-line TNR of toric code. One can calculate the double tensor of single-line TNR in Fig. 4 to be

𝕋0\displaystyle\mathbb{T}^{0} =\displaystyle= 12(I3+Z3).\displaystyle\frac{1}{2}(I^{\otimes 3}+Z^{\otimes 3}). (30)

This double tensor upon contraction on the disc with a hole at the origin (DmD3D_{m}-D_{3}) gives (up to an overall normalization)

𝕋0(DmD3)\displaystyle\mathbb{T}^{0}(D_{m}-D_{3}) =\displaystyle= ImI3+ZmZ3.\displaystyle I^{\otimes m}\otimes I^{\otimes 3}+Z^{\otimes m}\otimes Z^{\otimes 3}. (31)

Now contracting the outer circle gives us

B0=M0=I3.\displaystyle B_{0}=M_{0}=I^{\otimes 3}. (32)

So we see that, for single-line TNR, the stand-alone subspace is actually all of the virtual space. That is, there are no tensors that cannot stand alone.

III.2 MPO-injective subspace

Here we repeat the definition of MPO-injective subspace given in Ref. Şahinoğlu et al., 2014 for convenience.

As explained above, stand-alone subspace is the maximal virtual subspace such that any tensor supported on this subspace can be inserted into the tensor network without collapsing it. Therefore, the virtual space of the RG fixed point tensor, T0T^{0} itself must be inside the stand-alone subspace. This virtual space of T0T^{0}, which is by definition a subspace of the stand-alone space, is what we would call the MPO-injective subspace. The reason for calling it an MPO-injective space is that, as it turns out, this space is protected by symmetry operators which are Matrix Product Operators (MPO). Let’s make the notion of virtual space of (T0)αI(T^{0})^{I}_{\alpha} precise. We can think of it as a matrix with indices α\alpha and II and perform an SVD decomposition,

(T0)αI=α,IVα,αΛα,IPI,I,\displaystyle(T^{0})^{I}_{\alpha}=\sum_{\alpha^{\prime},I^{\prime}}V_{\alpha,\alpha^{\prime}}\Lambda_{\alpha^{\prime},I^{\prime}}P_{I^{\prime},I}, (33)

where VV and PP are unitary matrices in virtual and physical space, and Λ\Lambda is the diagonal matrix containing the singular values.

Definition 1.

The MPO-injective space, defined as the virtual support space of T0T^{0},is the virtual subspace spanned by columns of VV for which corresponding singular value is non-zero.

Another way to think about this is to again consider the double tensor 𝕋α,α0=I(T0)αI(T0;))Iα\mathbb{T}^{0}_{\alpha,\alpha^{\prime}}=\sum_{I}(T^{0})^{I}_{\alpha}(T^{0;*}))^{I}_{\alpha} which is a matrix in the virtual space. An equivalent but more useful definition is,

Definition 2.

The MPO-injective space is the space spanned by eigenvectors of 𝕋0\mathbb{T}^{0} with nonzero eigenvalues.

Using Eq. (33) we can write

T0\displaystyle T^{0} =\displaystyle= j;λj0λj|vjpj|\displaystyle\sum_{j;\lambda_{j}\neq 0}\lambda_{j}|v_{j}\rangle\langle p_{j}| (34)
𝕋0\displaystyle\Rightarrow\mathbb{T}^{0} =\displaystyle= j;λj0λj2|vjvj|,\displaystyle\sum_{j;\lambda_{j}\neq 0}\lambda_{j}^{2}|v_{j}\rangle\langle v_{j}|, (35)

where λj\lambda_{j} are the singular values and vjv_{j} and pjp_{j} are the corresponding vectors in virtual and physical space. MPO-injective space is the space spanned by vjv_{j}, so the projector on this space is

𝕄=j;λj0|vjvj|,\displaystyle\mathbb{M}=\sum_{j;\lambda_{j}\neq 0}|v_{j}\rangle\langle v_{j}|, (36)

The mathematical understanding of the MPO-injective space is that it is the virtual subspace which is isomorphic to the ground state physical subspace and T0T^{0} is the isomorphism. MPO-injective subspace by definition nested inside the stand-alone subspace, which by definition is nested inside the full virtual space. Similarly, the ground-state physical space is by definition a subspace of the full physical space. These spaces are represented visually in Fig. 9 for clarity.

MPO-injective subspace of single-line TNR: We can write the single-line tensor in Eq. (4) in the Eq. (33) form,

T0=|000000|+|011011|+|101101|+|110110|.\displaystyle T^{0}=|000\rangle\langle 000|+|011\rangle\langle 011|+|101\rangle\langle 101|+|110\rangle\langle 110|.

Of course, this happened to be already written in SVD decomposed form. So the MPO-injective space is spanned by vectors {|000,|011,|101,|110}\{|000\rangle,|011\rangle,|101\rangle,|110\rangle\}. So the MPO projector is

𝕄\displaystyle\mathbb{M} =\displaystyle= |000000|+|011011|+|101101|+|110110|\displaystyle|000\rangle\langle 000|+|011\rangle\langle 011|+|101\rangle\langle 101|+|110\rangle\langle 110| (38)
=\displaystyle= 12(I3+Z3).\displaystyle\frac{1}{2}\left(I^{\otimes 3}+Z^{\otimes 3}\right).

We see that this projector can be written as a translation invariant superposition of tensor product of matrices. That’s why we call it the MPO-injective subspace. Remember that stand-alone space of single-line TNR was determined to be all of virtual space, M0=IVM_{0}=I_{V}. So as expected, 𝕄M0\mathbb{M}\subset M_{0}.

MPO-injective subspace of double-line TNR: For calculation of the MPO-injective subspace of double-line tensor in Eq. (LABEL:DLTNReq) we use the second definition in 2 above to avoid a cumbersome but straight forward calculation. We already calculated the double tensor of double-line TNR in Eq. (25). We ignored the normalization factor there. If we use a normalization factor of 116\frac{1}{16} and write

𝕄=18𝕋0\displaystyle\mathbb{M}=\frac{1}{8}\mathbb{T}^{0} =\displaystyle= 116I(T0)αI(T0;)αI\displaystyle\frac{1}{16}\sum_{I}(T^{0})^{I}_{\alpha}(T^{0;*})^{I}_{\alpha^{\prime}} (39)
=\displaystyle= 116(I2+Z2)3(I+X6).\displaystyle\frac{1}{16}(I^{\otimes 2}+Z^{\otimes 2})^{\otimes 3}(I^{\otimes}+X^{\otimes 6}).

Then 𝕄\mathbb{M} is a projector, that is, it satisfies 𝕄2=𝕄\mathbb{M}^{2}=\mathbb{M}, and has the same support as 𝕋0\mathbb{T}^{0} hence this is the desired MPO projector. Remember that stand-alone projector was calculated to be M0=18(I2+Z2)3M_{0}=\frac{1}{8}(I^{\otimes 2}+Z^{\otimes 2})^{\otimes 3}, and hence 𝕄=M012(I+X6)M0\mathbb{M}=M_{0}\frac{1}{2}(I^{\otimes}+X^{\otimes 6})\subset M_{0}, as expected.

III.3 TNR instability conjecture

Refer to caption
Figure 9: A pictorial representation of relevant vector spaces. A tensor, T0T^{0}, is a linear map from the virtual space to the physical space. We denote the full virtual space as IVI_{V} and the full physical space as IPI_{P}. M0M_{0} (region in red and blue) is the stand-alone subspace of the virtual space. 𝕄\mathbb{M} (region in blue) is the MPO-injective subspace of the stand-alone space. MPO-injective subspace is isomorphic to the local ground-state physical subspace (also in blue), denoted as PGSP_{GS}, which is a subspace of the full physical space.

Now that we have defined the stand-alone and MPO-injective subspaces precisely, we are ready to state the central conjecture of this work.

Conjecture 1.

If, for a given RG fixed point TNR, T0T^{0}, of a topological state, M0M_{0} and 𝕄\mathbb{M} are the projectors onto the stand-alone and MPO-injective subspaces as defined above, then an infinitesimal tensor variation T0T0+ϵTT^{0}\rightarrow T^{0}+\epsilon T changes the topological phase of the state if and only if (M0𝕄)T0(M_{0}-\mathbb{M})T\neq 0.

It implies that the projector onto the stable space is PS=IV(M0𝕄)P_{S}=I_{V}-(M_{0}-\mathbb{M}).

Corollary 1.

An infinitesimal variation TT does not change the topological phase if and only if PST=TP_{S}T=T.

Corollary 2.

For any tensors TT, the variation T0T0+ϵPSTT^{0}\rightarrow T^{0}+\epsilon P_{S}T, with ϵ1\epsilon\ll 1 does not change the topological phase.

Or in simple words, a variation is unstable if and only if it has a component in the stand-alone space that is outside the MPO-injective subspace. A pictorial representation of the decomposition of the virtual space through these projectors is shown in Fig. 9. We will denote (M0𝕄)(M_{0}-\mathbb{M}) as PUP_{U} for convenience. Note that PUP_{U} shouldn’t be thought of as ‘the projector onto unstable subspace’ because unstable variations do not form a vector space, as opposed to stable variations that do form a vector space. It is because PUT10P_{U}T^{1}\neq 0 and PUT20P_{U}T^{2}\neq 0 does not imply PU(T1+T2)0P_{U}(T^{1}+T^{2})\neq 0.

Let’s first see how this conjecture is true for the single-line and double-line TNR of the toric code. For single-line we have already calculated the stand-alone and MPO-injective subspaces and found M0=IVM_{0}=I_{V} and 𝕄=12(I3+Z3)\mathbb{M}=\frac{1}{2}\left(I^{\otimes 3}+Z^{\otimes 3}\right). So,

PU=M0𝕄=12(I3Z3).\displaystyle P_{U}=M_{0}-\mathbb{M}=\frac{1}{2}\left(I^{\otimes 3}-Z^{\otimes 3}\right). (40)

So for a tensor PUT0P_{U}T\neq 0 if and only if it violates the Z3Z^{\otimes 3} symmetry. Indeed, this is exactly what we saw numerically in Fig 2. All variations can be summarized visually using Fig. 9 as follows:

(41)

Variations supported on the red region are unstable, while those on blue and white are stable. The dimension of each space is indicated. So we see that the space (M0𝕄)(M_{0}-\mathbb{M}) is 4 dimensional space spanned by basis

(42)

It is wrong to think that these basis set span the space of unstable variations, because unstable variations do not form a vector space. All we can say is if a variations has overlap with any of these basis, it would cause instabilty.

For double-line TNR we found,

M0\displaystyle M_{0} =\displaystyle= 18(I2+Z2)3\displaystyle\frac{1}{8}\left(I^{\otimes 2}+Z^{\otimes 2}\right)^{\otimes 3}
𝕄\displaystyle\mathbb{M} =\displaystyle= M012(I+X6)\displaystyle M_{0}\frac{1}{2}(I^{\otimes}+X^{\otimes 6}) (43)

So,

PU\displaystyle P_{U} =\displaystyle= M0𝕄\displaystyle M_{0}-\mathbb{M}
=\displaystyle= 18(I2+Z2)312(IX6)\displaystyle\frac{1}{8}\left(I^{\otimes 2}+Z^{\otimes 2}\right)^{\otimes 3}\frac{1}{2}(I^{\otimes}-X^{\otimes 6})

So PUT0P_{U}T\neq 0 if and only if TT satisfies the three Z2Z^{\otimes 2} symmetries but violates the X6X^{\otimes 6} symmetry. Indeed this is precisely what we found numerically as shown in Fig. 5. All variations can be summarized visually as follows

(44)

Variations supported on the red region are unstable, while those on blue and white are stable. The dimension of each space is indicated. So we see that the space (M0𝕄)(M_{0}-\mathbb{M}) is 4 dimensional space spanned by basis

(45)

IV Physical understanding of TNR instability

TNR-instablity conjecture would predict mathematicall exactly which variations would be unstable. But what is the physical reason behind such instabilities? To answer, we put forward the following physical conjecture, which we would justify and explain in detail in the rest of this section.

Conjecture 2.

Variations in stand-alone subspace M0M_{0} correspond to ‘bosonic excitations’ that can proliferate/condense in the given TNR. Variations in the MPO-injective subspace 𝕄\mathbb{M} are the subset of these condensable ‘bosons’ that are trivial (belong to trivial superselection sector). Hence the variations in M0𝕄M_{0}-\mathbb{M} are the non-trivial condensable bosons. So such a variation results in topological boson condensation and causes a topological phase transition of the state.

By ‘excitation’ we mean any point-like variation to the ground state, or its TNR. It should be carefully noted that the word ‘boson’ here refers to any point like excitation (not necessary an irreducible excitation) that has trivial topological spin. For example, if aa is an anyon of the given model, then composite particle aa¯a\bar{a} where aa and a¯\bar{a} are sitting next to each other is included in this definition of boson. Of course it is a topologically trivial boson. Similarly, if we apply any local operation on the topological state, we would say that the resulting state contains a boson. Though, of course, it is again a topologically trivial boson.

Now we turn to the first part of the claim, which is basically the physical significance of stand-alone space

IV.1 Physical understanding of stand-alone space M0M_{0}

As claimed, the physical significance of stand-alone space is that it contains proliferatable bosonic excitations.

IV.1.1 Proliferatable variations of a TNR

First we explain what we mean by ‘Proliferatable variations/excitations’. (We use the term ’variation’ for any mathematical variation to the ground state tensors. ‘Excitation’ should be used for a quasi-particle excitation. But in slight abuse of the nomenclature we would often use them interchangeably. It is justified as we are only working with the wave functions and not Hamiltonians.) Let’s say T0T^{0} is the RG fixed point tensor of some topological ground state wave function |Ψ0|\Psi_{0}\rangle. Let’s say we add a variation, T0T0+ϵTT^{0}\rightarrow T^{0}+\epsilon T and the resulting wave function is |Ψ|\Psi\rangle.

|Ψ0\displaystyle|\Psi_{0}\rangle =\displaystyle= {ij}(T0)i1(T0)i2(T0)in|i1i2in,\displaystyle\sum_{\{i_{j}\}}(T^{0})^{i_{1}}(T^{0})^{i_{2}}\ldots(T^{0})^{i_{n}}|i_{1}i_{2}\ldots i_{n}\rangle,
|Ψ\displaystyle|\Psi\rangle =\displaystyle= {ij}(T0+ϵT)i1(T0+ϵT)i2×\displaystyle\sum_{\{i_{j}\}}(T^{0}+\epsilon T)^{i_{1}}(T^{0}+\epsilon T)^{i_{2}}\ldots\times (46)
(T0+ϵT)in|i1i2in\displaystyle(T^{0}+\epsilon T)^{i_{n}}|i_{1}i_{2}\ldots i_{n}\rangle
=\displaystyle= |Ψ0+ϵs1|Ψs1+ϵ2s1,s2|Ψs1,s2+,\displaystyle|\Psi_{0}\rangle+\epsilon\sum_{s_{1}}|\Psi_{s_{1}}\rangle+\epsilon^{2}\sum_{s_{1},s_{2}}|\Psi_{s_{1},s_{2}}\rangle+\ldots,

where |ψs1|\psi_{s_{1}}\rangle denotes the tensor network state similar to |Ψ0|\Psi_{0}\rangle except T0T^{0} has been replaced with TT at site s1s_{1}. Similarly, |Ψs1,s2|\Psi_{s_{1},s_{2}}\rangle denotes the tensor network state similar to |Ψ0|\Psi_{0}\rangle except T0T^{0} is replaced with TT at site s1s_{1} and s2s_{2}. Higher order terms can be understood in a similar manner. Physically, |ψs1|\psi_{s_{1}}\rangle can be interpreted as ‘excitation’ TT (which may be trivial) sitting at site s1s_{1} with probability ϵ2\epsilon^{2}. Similarly, |Ψs1,s2|\Psi_{s_{1},s_{2}}\rangle can be interpreted as excitation TT sitting at sites s1s_{1} and s2s_{2} with probability ϵ4\propto\epsilon^{4}. Higher order terms can be interpreted in a similar fashion. Though ϵ2\epsilon^{2} looks small compared to the weight of |Ψ0|\Psi_{0}\rangle, one has to bear in mind there are N\sim N such terms in the expansion, where NN is the number of sites. So after normalization they can have comparable weights.

When TT is in the stand-alone space then it can appear anywhere in the tensor network state, independent of each other, even at large scales. However when TT is outside of the stand-alone space, then it can at most appear next to other TTs. But then the distance between excitations is exponentially suppressed since each TT appears with an ϵ\epsilon weight. So such excitations do not appear at large scale and would vanish under RG process. Tensors within the stand-alone space, on the other hand, can appear at any scale and would not vanish under RG process. So we can call the new wave function as a ‘proliferation/condensate of TT’, since the variation/excitation TT proliferates and each site is in superposition of TT appearing and not appearing at all length scales. (We caution that we use the term ‘proliferation’ to denote the mathematical fact that the wave function is a superposition of a variation appearing everywhere. While the term ‘condensate’ in physics means something more specific. But, again, we would use these terms interchangeably. It is justified as we are not dealing with the Hamiltonians, rather looking at the changes in the wave functions as we vary the tensors. So the ‘condensation of variations’ doesn’t necessarily mean a phase transition. It just means a particular mathematical variations, which can be interpreted as an excitation, proliferates and the resulting wave function is a superposition of this variation appearing everywhere.)

A key point here is that v1v_{1} and v2v_{2} can be at arbitrary distance from each other but the contribution of this term in the superposition remains ϵ2\epsilon^{2}. Let’s compare this with how the ground state changes with respect to a perturbation on the Hamiltonian level. Let’s perturb the toric code Hamiltonian in (2) with XX perturbations on every link,

H=H0+ϵlXl.\displaystyle H=H_{0}+\epsilon\sum_{l}X_{l}. (47)

The ground state of this perturbed Hamiltonian is also a superposition of |Ψ0|\Psi_{0}\rangle and terms like |Ψv1,v2|\Psi_{v_{1},v_{2}}\rangle. But the weight that appears with |Ψv1,v2|\Psi_{v_{1},v_{2}}\rangle is of the order of ϵdistance(v1,v2)\epsilon^{\text{distance}(v_{1},v_{2})}, that is, the separation between two ee particles is exponentially suppressed. So, in thermodynamic limit, these excitations disappear. But this is not the case with state in Eq.  (46). That is why the state in Eq. (46) cannot be produced by infinitesimal small local perturbation of the parent Hamiltonian.

So we have argued that stand-alone space, by definition, is the space of variations that can condense. But how do we know they are ‘bosonic excitations’, that is, they have a trivial topological spin? We will show it now.

IV.1.2 Condensable excitations are ‘bosons’

Consider the tensor network state which has the fixed point tensor T0T^{0} everywhere except at sites s1s_{1} and s2s_{2}, where T0T^{0} has been replaced by stand-alone tensors TT. We denote this wave function as |Ψs1,s2|\Psi_{s_{1},s_{2}}\rangle, as above. Topological spins of quasi-particles in topological models are calculated using the string-operators that create them. So we need to first define a string-operators that create these variations. The anyonic string operators in topological models have the property that they commute with the Hamiltonian everywhere except possibly at its ends. But we are working directly with the quantum wave function and are not really concerned with the underlying Hamiltonian, whose form can change going away from the RG fixed point. We see that we can define an appropriate string-operator for tensor network states without referring to a Hamiltonian. To do that, first notice that every tensor network state has underlying gauge symmetries at the virtual level. That is, if we apply operators AA and BB on the two contracting virtual legs, such that AB=IAB=I, the tensor network state doesn’t change (though the individual tensors may change). That is,

[Uncaptioned image].\displaystyle\includegraphics[scale={0.3}]{Vgauge}. (48)

It means that if we apply a string of AA, BB on virtual levels along a path, the tensor network state would not change along the path but only at the ends. For example, on the double-line TNR we can create a stand-alone excitation AA in the following way,

[Uncaptioned image].\displaystyle\includegraphics[width=195.12767pt]{DLAAinv}. (49)

The AA and AA^{\dagger} cancel each other on each plaquette as all the 6 virtual legs are contracted. We chose double-line tensor network for illustration but of course it can be done for any tensor network. So wave functions like |Ψs1,s2|\Psi_{s_{1},s_{2}}\rangle can be created by such string operators. Note that since the tensor network didn’t change along the path, |Ψs1,s2|\Psi_{s_{1},s_{2}}\rangle is still in the ground state along the path. So this string operator can only possibly create excitations at the ends, which is what we wanted. We will call such string operators gauge-string-operators to distinguish them from the usual string operators on the physical level. Note that gauge-string-operators can only create stand-alone variations/excitations, and they are deformabale on the ground state subspace, like the physical string operators. We know that physical string-operators might not be deformed through a site that has an anyonic excitation present. Gauge-string operators also may not be be deformed through excitations. For example, there may be another operator CC present at the virtual legs such that ACBCACB\neq C. But the interesting thing to note is that they can always be deformed through a stand-alone excitation. The reason for this is simple. A stand-alone tensor is surrounded by fixed point tensor T0T^{0}. So if we consider a Wilson-loop of gauge-string operator around it, AB=IAB=I is still true, so AA and BB will simply cancel each other. So the Wilson-loop will simply disappear irrespective of what stand-alone excitation was there. So not only gauge-string operators create stand-alone excitations, they also always commute with the other stand-alone excitations. This suggests that all excitations in the stand-alone space have trivial mutual and self stastics. But to prove they are bosons, we need to do the topological spin calculation. Though again, using the same reasoning, it can readily be seen that the topological spin of stand-alone excitation is 1, as explained in Fig. 10.

Refer to caption
Figure 10: Calculation of topological spin. We create two pairs (shown as red and blue) of particle, anti-particle pairs aa¯a-\bar{a}, with aa situated at site 1 and 2. We apply the following procedure in this order: (a) Move first aa (red) from 2 to 3, (b) move second aa (blue) from 1 to 2, (c) move first aa (red) from 3 to 1. Finally, (d) we annihilate each aa with the anti-particles of the other anyon (i.e. red aa with blue a¯\bar{a} and vice versa). When the propagation of aa happens through a gauge-string operator, which disappears along the path, this order of process becomes irrelevant, as the second string-operator does not interact with the first one, and the whole process is equivalent to creating and annihilating two pairs of aa¯a-\bar{a}, which has amplitude 1. It implies aa has a trivial topological spin.

We have determined that the variations in the stand-alone space are condensable bosons. So any such variation results in a wave function which is a condensate of the boson the variation corresponds to. But this alone does not necessarily cause a phase transition, because if the boson was topologically trivial, there should be not topological phase transition. Or, mathematically speaking, the stand-alone projector projects out variations that cannot proliferate, but it doesn’t project out those stable variations that can proliferate. For example, the double-line stand-alone projector does not project out variation XXX\otimes X though it is not unstable. So to find the unstable variations, we need an additional projector to project out condensable but stable variations. We will argue now MPO-injective subspace is precisely this projector.

To find out whether a virtual variation would cause the phase transition we need to first determine what this virtual variation corresponds to on the physical level. That is, we need to ‘lift’ the variation from the virtual level to the physical level. When we do that we discover that there are two kinds of variations: The first kind is where a local virtual variation is lifted to a local physical variation, and the second kind is where the local virtual variation is lifted to a non-local physical variation. We know that a local physical variation can only correspond to a topologically trivial boson since it can be removed by a local operation. This distinction between variations further decomposes the stand-alone into two subspaces: the MPO-injective space 𝕄\mathbb{M}, which corresponds to the first kind of variation, and the unstable subspace M0𝕄M_{0}-\mathbb{M}, which corresponds to the second kind of variation. Let’s first focus on the first kind of variations.

IV.2 Physical understanding of MPO-injective subspace 𝕄\mathbb{M}

As claimed above, the physical significance of MPO-injective subspace is that the variations in this subspace are lifted to local physical variations, which have to be topologically trivial bosons since they can be removed by a local operation. Hence the physical significance of MPO-injective subspace is that it contains all the topologically trivial excitations.

To understand it better, let us look at concrete examples of variations that are lifted to local physical variation. Consider a ZZ variation on the virtual leg of the fixed point single-line TNR. If we lift it to the physical level, what do we get? Since the virtual legs are just copies of the physical legs, we get

[Uncaptioned image].\displaystyle\includegraphics[scale={0.3}]{SLZVZP}. (50)

So ZZ virtual variation is lifted to a ZZ physical variation, which is local. According to our claim, it should be in the MPO-injective subspace. And indeed it is, since it respects the MPO symmetry of the single-line TNR, Z3Z^{\otimes 3}. Also note that a ZZ physical variation corresponds to a pair of mm particles sitting next to each other, not a single mm particle. It is a trivial excitation and can be removed by applying one ZZ operation on the state, so it matches our claim. Contrast this with the XX variation on the virtual level. Can we find any local physical operator OO such that

[Uncaptioned image]?\displaystyle\includegraphics[scale={0.3}]{XO}? (51)

One can try and see that there is no such local operator OO for which this equation holds. (We will later show that XX can be lifted to the physical level, but it results in a non-local operator. )

A similar phenomena occurs in double-line TNR. The XXX\otimes X variation can be lifted to a local physical operator,

[Uncaptioned image],\displaystyle\includegraphics[scale={0.3}]{DLXVXP}, (52)

but a ZZ variation cannot be. (We will later show that ZZ can be lifted to the physical level, but it results in a non-local operator.) It is again consistent with the claim as XXX\otimes X variation respects the double-line MPO symmetry (X6)(X^{\otimes 6}) but ZZ variation breaks it. Note that XXX\otimes X variation on the physical level corresponds to a pair of ee particles sitting across a plaquette. It is a topologically trivial excitation and can be removed by an XXX\otimes X operation on the state. So again, this matches our claim.

Now we prove that these examples are no coincidence, and in fact any variation in the MPO-injective subspace is a local physical variation.

Let us repeat the definition of the MPO-injective subspace here for convenience. We SVD decomps the fixed point RG tensor T0T^{0} as a matrix between virtual and physical legs

T0=jλj|vjpj|,\displaystyle T^{0}=\sum_{j}\lambda_{j}|v_{j}\rangle\langle p_{j}|, (53)

where λj\lambda_{j} are the singular values, and vjv_{j} and pjp_{j} are orthonormal vectors in the virtual and ground-state physical spaces respectively. Then the MPO-injective subspace is the virtual subspace spanned by vectors vjv_{j} such that corresponding singular values λ0\lambda\neq 0. So the MPO projector is

𝕄=j;λj0|vjvj|.\displaystyle\mathbb{M}=\sum_{j;\lambda_{j}\neq 0}|v_{j}\rangle\langle v_{j}|. (54)

A mathematically inclined reader would note that MPO-injective subspace is nothing but the virtual subspace which is isomorphic to the image of the tensor as a map from virtual to ground state physical space. That is, if we restrict the domain of the tensor to this subspace, then tensor is an injective map from the virtual to the physical space, and a bijective map from MPO-injective subspace to ground-state physical subspace. Since these spaces are isomorphic, any operator in MPO-injective subspace can be mapped to an operator in the ground-state physical space and vice-versa, and this mapping would be bijective (one-to-one) as well. Let us make it precise,

Lemma 1.

If AA is any operator on the virtual space completely supported on 𝕄\mathbb{M} (𝕄A=A𝕄=A\mathbb{M}A=A\mathbb{M}=A) then there exists an operator BB on the ground state physical space such that AT0=T0BAT^{0}=T^{0}B and vice-versa. That is, any variation in the subspace 𝕄\mathbb{M} is equivalently a variation on the ground state physical space and vice-versa.

Proof.

Let us say an virtual operator AA is given which is completely supported on subspace 𝕄\mathbb{M}. Define pseudo-inverse of T0T^{0} as

T0;+=j;λj01λj|pjvj|.\displaystyle T^{0;+}=\sum_{j;\lambda_{j}\neq 0}\frac{1}{\lambda_{j}}|p_{j}\rangle\langle v_{j}|. (55)

It is a pseudo-inverse since

T0T0;+\displaystyle T^{0}T^{0;+} =\displaystyle= 𝕄\displaystyle\mathbb{M} (56)
T0;+T0\displaystyle T^{0;+}T^{0} =\displaystyle= PGS,\displaystyle P_{GS}, (57)

where PGSIPP_{GS}\subset I_{P} denotes projector on the ground-state physical subspace of the full physical space. IPI_{P} is the projector onto the full physical space. Now define a physical operator BB as

B=T0;+AT0,\displaystyle B=T^{0;+}AT^{0}, (58)

then

T0B=T0T0;+AT0=𝕄AT0=AT0.\displaystyle T^{0}B=T^{0}T^{0;+}AT^{0}=\mathbb{M}AT^{0}=AT^{0}. (59)

The last equality follows from the assumption that AA is completely supported on MPO-injective subspace. Similarly, given physical operator BB on the ground-state physical space, define A=T0BT0;+A=T^{0}BT^{0;+}. So we have AT0=T0BT0;+T0=T0BIP=T0BAT^{0}=T^{0}BT^{0;+}T^{0}=T^{0}BI_{P}=T^{0}B. And of course these maps are injective. So AA and BB have a one-to-one correspondence. ∎

With this lemma, we see why in general variations in the MPO-injective subspace are trivial excitations. They are nothing but a local variation on the physical level, which is a local physical operator and can be removed by another local operator. In fact notice that if AA is unitary (within the space 𝕄\mathbb{M} ) then so is BB and vice-versa. Since all trivial excitations are obtained by local unitaries, or their linear combinations, we conclude that MPO-injective subspace should contain all trivial virtual excitations as well.

This completes the study of first kind of variations (those that are lifted to local physical variations) mentioned above. Now we study the second kind of variations.

IV.3 Physical understanding of subspace M0𝕄M_{0}-\mathbb{M}

The physical significance of subspace M0𝕄M_{0}-\mathbb{M} is that it contains the second kind of variations: the virtual variations that are lifted to a non-local physical operator. So these variations cannot be removed by a local physical operation on the state, and hence represent a topologically non-trivial excitation. And this excitation has to be a boson, as all excitations in stand-alone space are. So it means that the physical significance of M0𝕄M_{0}-\mathbb{M} space is that it contains condensable excitations that are topologically non-trivial bosons, and that’s why these variations cause a topological phase transition.

Let us first look at some concrete examples to understand this phenomena. We saw how a virtual XX variation on the single-line TNR couldn’t be lifted to a local physical variation. But, the question is, can it be lifted to a non-local physical variation? The answer is, yes. To see it, first note that although a single XX variation cannot be lifted locally, two XX variations can be. That is, the fixed point single-line tensor satisfies

[Uncaptioned image].\displaystyle\includegraphics[scale={0.3}]{SLXXVP}. (60)

And also, we have the usual guage symmetry

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{SLinsertXX}. (61)

Using these two relations, we see that a single XX virtual variation on can be moved to another tensor on the same sublattice, and this transfer produces an XXX\otimes X operation on the physical level,

[Uncaptioned image].\displaystyle\includegraphics[width=173.44865pt]{SLmovingX}. (62)

In the first equality, Eq. (61) is used while in the second equality Eq. (60) is used. We see that the XX variation moved from site 1 to site 3 while leaving operator XXX\otimes X along the path (on site 2). We can repeat this process and move XX to the next tensor and so on. After XX is moved from site 1 to nn there will be an XX-string operator applied on the physical level along the path. Finally, if there is already an XX variation present at site nn, the two will cancel and we will be left with an XX-string operator only,

(63)

Of course the particular path between site 1 and nn chosen is completely arbitrary. We can choose any path between them as we like. So we have successfully shown that though a single XX variation cannot be completely lifted to the physical level, two such variations sitting far apart can be, and they are lifted to a non-local physical operator between them. It implies that a XX variation on the single-line TNR cannot be removed locally on a physical level. Only two of them can be removed by applying a non-local operator between them. In fact, it is easy to recognize what this excitation is. Since XX-string operators correspond to creation or annihilation of ee-particles in the toric code, it is clear that the XX virtual variation actually is an ee particle excitation. It is topologically non-trivial, which is in line with our claim. Condensation of XX variations is actually the condensation of ee particles, and that is why it leads to topologically phase transition.

A similar analysis can be carried out for the ZZ variation in the double-line tensor. We noted that it cannot be lifted to a local physical operator. But two ZZ operators can be lifted to a non-local physical operator,

(64)

where in the first equality, the following relation (similar to Eq. (61)) has been used,

[Uncaptioned image].\displaystyle\includegraphics[width=86.72267pt]{DLinsertZZ}. (65)

And in the second equality, the following property of the fixed point double-line tensor is used.

[Uncaptioned image].\displaystyle\includegraphics[width=108.405pt]{DLZZVP}. (66)

So we see that two ZZ variations on the virtual level, sitting far apart cannot be removed by local operations on the physical level. They can only be removed by a non-local operator, the ZZ-string operator. This suggests that the ZZ variation is a topologically non-trivial excitation. Indeed, it is easy to see that it is nothing but the mm particle excitation, since ZZ-string operator creates and annihilates mm-particles. This is in line with all our claims: ZZ variation is in the M0𝕄M_{0}-\mathbb{M} space; it cannot be removed locally, and that it is a topological boson.

IV.4 Non-trivial gauge string-operators: Zero-string operators

It may look a little puzzling that a local virtual operator in M0𝕄M_{0}-\mathbb{M} can create a non-trivial physical excitation. We analyzed what these variations correspond to by lifting them up to the physical level. To understand the phenomena better we can ask the opposite question: what happens when we ’bring down’ a non-trivial quasi-particle excitation on the physical level to the virtual level? Since such an excitation is created by a physical string-operator, the equivalent question is, what happens to string-operators of the model when we bring them down to the virtual level? We can look at the specific examples considered above. For example, if we look at Eq. (63) in the opposite way, we see that the physical XX-string operator, which creates ee-particles, becomes a gauge-string operator on the virtual level, which subsequently creates a variation in the M0𝕄M_{0}-\mathbb{M} space. Contrast this with ZZ-string operator, that creates mm-particles. This operator does not map to gauge-string operator,

[Uncaptioned image].\displaystyle\includegraphics[scale={0.3}]{SLZnongauge}. (67)

Similarly, Eq. (64) shows that that the physical ZZ-string operator, which creates mm-particles, becomes a gauge-string operator on the virtual level. So we see that if a physical anyonic string operator maps to a gauge-string operator on the virtual level, it creates an excitation in the M0𝕄M_{0}-\mathbb{M} space. This property of the tensor network state in general is the reason why a local virtual variation can actually correspond to non-local variation on the physical level. In other words, certain gauge-string operators are non-trivial because they come from a non-trivial string operator on the physical level. We would call such physical string operators that map to gauge-string operator on the virtual level a zero-string operator. The reason behind this terminology will become clearer in the next chapter. So we conclude that the mm-particle operator is the zero-string operator of the double-line TNR, while the ee-particle string operator is the zero-string operator of the single-line TNR.

Since variations in the unstable space M0𝕄M_{0}-\mathbb{M} are created by zero-string operators, it implies that, if, in a given TNR, none of the physical string operators map to a gauge-string operator then it will have no variation in M0𝕄M_{0}-\mathbb{M}. In that case, we would simply have M0=𝕄M_{0}=\mathbb{M}. Such a TNR will have no instabilities.

Before going to the physical explanation of instabilities, we would like to mention that there is one more way of decomposing the stand-alone space in trivial and non-trivial excitations: using Wilson-loops of anyonic string-operators. We can use these operators to detect whether a nontrivial excitation is sitting at a site, hence can potentially differentiate between M0𝐌M_{0}-\mathbf{M} and 𝐌\mathbf{M}. This has been explored in appendix A for readers who are interested in this perspective.

IV.5 Physical reason of instability: topological boson condensation

Now we put together the physical understanding of all the relevant subspaces (M0,𝕄M_{0},\mathbb{M} and M0𝕄M_{0}-\mathbb{M}) to make the coherent picture of why variations in the subspace M0𝕄M_{0}-\mathbb{M} are unstable, and, in particular, explain the numerical results shown in Fig. 4 and Fig. 6. The general explanation has already been stated in form of conjecture 2 but we repeat it again informally going through all possible variations one by one.

  • The variations on the physical indices are of course not stable because they are topologically trivial and can be removed with local operations.

  • Variations outside the stand-alone space, IVM0I_{V}-M_{0} are not unstable because they cannot proliferate.

  • Every variation inside M0M_{0} is ‘bosonic’ and does proliferate and the varied wave function is a condensate of that ‘boson’. But when the variations is inside 𝕄\mathbb{M}, it was a topologically trivial boson and hence does not cause a topological phase transition. Or, equivalently, every variation inside MPO-injective subspace was nothing but a variation on the physical level hence stable.

  • Finally, when the variation was inside stand-alone, but outside MPO-injective subspace then it can condense and is a topologically non-trivial boson. Hence it causes a topological phase transition, resulting in a TNR instability.

Now we explain this boson condensation specifically for the single-line and double-line TNR considering specific variation.

IV.5.1 ee-particle condensation in single-line TNR

To guide the discussion, consider two illustrative variations to single-line TNR as before

(68)
  • The TZT^{Z} variation exemplifies variations that can condense but correspond to a local physical variation, hence are trivial/elementary excitations. Such variations result in a proliferation of elementary excitation which does not cause a topological phase transition.

  • The TXT^{X} variation exemplifies variations that can condense but do not correspond to local physical variations. In fact, such variations correspond to ee-particle excitation. Hence such variation results in an ee-particle condensation and destroys the topological order of the tensor network state.

IV.5.2 mm-particle condensation in double-line TNR

Let’s consider the different variations in double-line TNR as before

(69)
  1. 1.

    Variations in (a) and (c) exemplify variations that break the stand-alone symmetry Z2Z^{\otimes 2}, hence they cannot proliferate and, therefore, are stable.

  2. 2.

    Variation in (b) exemplifies variations that can stand alone, so can proliferate. But they break the MPO symmetry, so correspond to a non-trivial boson. In fact it corresponds to an mm-particle excitation. So this variations causes mm particle condensation and results in the loss of topological order.

  3. 3.

    Finally, variation in (d) exemplifies variations that can proliferate. But they also are inside the MPO-injective subspace, so correspond to trivial/elementary excitations. So their proliferation does not cause a topological phase transition.

V Implications for the simulation of phase transitions

Projected Entangled Pair States (PEPS), one type of Tensor Network States (TNS), are often used as ansatz for different numerical simulations of gapped lattice topological models. In particular, TNS can be used to simulate phase transitions between different topological phasesGu et al. (2008). The fixed point Hamiltonian is perturbed with a local Hamiltonian H0H0+ηHlocalH_{0}\rightarrow H_{0}+\eta H_{\text{local}} and the perturbation strength, η\eta is increased slowly. At some finite value of η\eta the gap closes and the system goes through a phase transition. For many perturbations, this phase transition consists of boson condensation. For example, for the toric code Hamiltonian Eq. (2), two kinds of perturbations can be added

H1=UvlvZlgplpXlηlZl,\displaystyle H_{1}=-U\sum_{v}\prod_{l\in v}Z_{l}-g\sum_{p}\prod_{l\in p}X_{l}-\eta\sum_{l}Z_{l}, (70)
H2=UvlvZlgplpXlηlXl.\displaystyle H_{2}=-U\sum_{v}\prod_{l\in v}Z_{l}-g\sum_{p}\prod_{l\in p}X_{l}-\eta\sum_{l}X_{l}. (71)

Let’s first discuss the first kind of perturbation. In the first Hamiltonian, we keep U=U=\infty and study the ground state as the relative values of η\eta and gg change. At η=0\eta=0 the ground state is simply the fixed point toric code state given in Eq. (3). That is, it is an equal weight superposition of all closed string configuration. At g=0g=0, the state is the vacuum state, that is, all spins are 0. These two states are topologically different, hence there must be a phase transition as we change η/g\eta/g from 0 to \infty. This phase transition can be understood as a condensation of mm particles. Recall that Ψ|Bp|Ψ=1\langle\Psi|B_{p}|\Psi\rangle=1 corresponds to no mm particle and Ψ|Bp|Ψ=1\langle\Psi|B_{p}|\Psi\rangle=-1 corresponds to an mm particle excitation at a plaquette pp, where Bp=lpXlB_{p}=\prod_{l\in p}X_{l} is the plaquette term of the toric code Hamiltonian. For η=0\eta=0 ground state we have Ψ|Bp|Ψ=1,p\langle\Psi|B_{p}|\Psi\rangle=1,\forall p, while for g=0g=0 ground state we have Ψ|Bp|Ψ=0,p\langle\Psi|B_{p}|\Psi\rangle=0,\forall p. It indicates that as η/g\eta/g is increased, mm particles proliferate and at phase transition point, the system goes through a boson (mm particle) condensation and the ground state becomes a trivial state. Boson condensation phase transitions are known to be second order phase transitions. That is, ground state energy and its first order derivative as a function of η/g\eta/g are smooth functions, but its second order derivative is discontinuous at the phase transition point.

It was shown by Gu et al. (2008) that an attempt to numerically simulate this phase transition point with single-line tensor network state ansatz gives a transition that is wrong both quantitatively and qualitatively. It gives a wrong critical point value of η/g\eta/g, and it gives a first order phase transition, not a second order one. But with double-line tensor network state ansatz, it gives the correct second order phase transition with correct critical point.

This difference can be easily understood in light of our discussion on single-line and double-line TNR of toric code state. As we showed, double-line TNR is capable of condensing mm particles while single-line TNR is not. That is why double-line TNR is suitable for simulating a phase transition that involves mm particle condensation.

A similar analysis can be done for the second type of perturbation. We set g=g=\infty and change relative value of UU and η\eta. For η=0\eta=0 the ground state is the toric code ground state in Eq. (3), and for U=0U=0 the state is trivial state with all qubits aligned in +x direction. Here the phase transition involves ee particle condensation which is again a second order phase transition. Hence, to simulate this phase transition, one should use single-line TNS ansatz and not the double-line TNS ansatz.

This is one of the important point of understanding the unstable direction of variations that a particular TNR possesses. To simulate a boson condensation phase transition, one should choose the TNR that is capable of condensing that particular boson of the model.

Of course, there is also a flip side to this. If one is interested in determining the topological order of a particular TNR by calculating the topological entanglement entropy, one should make sure to keep out of the unstable space, M0𝕄M_{0}-\mathbb{M}, for numerical stability. A small numerical variation in this space will change the state globally and result in wrong results. For example, in calculations involving Tensor Entanglement Renormalization Group (TERG) Gu et al. (2008) and Tensor Network Renormalization (TNR 111not to be confused with TNR that we use for referring to tensor network representation.Evenbly and Vidal (2015) steps, we should project the resulting tensor after every RG step back to the stable space, (IV(M0𝕄)I_{V}-(M_{0}-\mathbb{M})), or naturally occurring numerical errors might gain a component in M0𝕄M_{0}-\mathbb{M} space and change the topological order of the state radically.

Now we will apply what we learned from the toric code example to analyze the TNR of another closely related model, the double semion model.

VI Double-semion

Double-semion model can be understood as a ‘twisted’ Z2Z_{2} quantum double modelFreedman et al. (2004); Levin and Wen (2006). Its Hamiltonian is almost the same as that of toric code, except for the phase factor associated to the plaquette term

H0=vlvZlplpXlrlegs of pi1Zr2,\displaystyle H_{0}=-\sum_{v}\prod_{l\in v}Z_{l}-\sum_{p}\prod_{l\in p}X_{l}\prod_{r\in\textrm{legs of }p}i^{\frac{1-Z_{r}}{2}}, (72)

where ‘legs of pp’ refers to the six legs attached to a plaquette. Its ground state is

|ψ=Xclosed(1)n(X)|X,\displaystyle\Ket{\psi}=\sum_{X\in\text{closed}}(-1)^{n(X)}\Ket{X}, (73)

where XX again refers to string configurations on the hexagonal lattice. n(X)n(X) denotes the number of loops in a given string configuration. The ground state, like that of toric code, is again a superposition of all closed string configurations. But it has a phase factor of (1)n(X)(-1)^{n(X)} which is 11 for even number of loops and 1-1 for odd number of loops. It has 3 quasi-particle excitations: a semion, an anti-semion, and a self-boson. So, unlike the toric code, it has only one boson. There is a known double-line TNR of this state Gu et al. (2009); Buerschaper et al. (2009), (T0)αα;ββ;γγijk(T^{0})^{ijk}_{\alpha\alpha^{\prime};\beta\beta^{\prime};\gamma\gamma^{\prime}}, with the same structure as that of toric code. So,

(T0)αα;ββ;γγijk=Sαβγδααδββδγγδi,β+γδj,α+γδk,α+β.\displaystyle(T^{0})^{ijk}_{\alpha\alpha^{\prime};\beta\beta^{\prime};\gamma\gamma^{\prime}}=S_{\alpha\beta\gamma}\delta_{\alpha\alpha^{\prime}}\delta_{\beta\beta^{\prime}}\delta_{\gamma\gamma^{\prime}}\delta_{i,\beta+\gamma}\delta_{j,\alpha+\gamma}\delta_{k,\alpha+\beta}. (74)

But now the values are

Sαβγ={1 if α+β+γ=0,3i if α+β+γ=1i if α+β+γ=2.\displaystyle S_{\alpha\beta\gamma}=\begin{cases}1&\text{ if }\alpha+\beta+\gamma=0,3\\ i&\text{ if }\alpha+\beta+\gamma=1\\ -i&\text{ if }\alpha+\beta+\gamma=2.\end{cases} (75)

Clearly, it has the same Z2Z^{\otimes 2} symmetry, as the toric code double-line TNR. That is, T0T^{0} satisfies

(76)

But it does not have the exact X6X^{\otimes 6} symmetry as that of toric code double-line TNR. By looking at the tensor values, it can be seen that it has the X6X^{\otimes 6} with an additional phase factor ω\omega between virtual legs,

(77)

where ω=i\omega=i if the virtual legs on the two sides of it take different values (that is, there is a domain wall) and ω=1\omega=1 otherwise. So T0T^{0} has Z2Z_{2} symmetry of the form (i)n(d)X6(i)^{n(d)}X^{\otimes 6} where n(d)n(d) is the number of domain walls between α,β\alpha,\beta and γ\gamma. That is,

n(d)={0 if α+β+γ=0,32 if α+β+γ=1,2.\displaystyle n(d)=\begin{cases}0&\text{ if }\alpha+\beta+\gamma=0,3\\ 2&\text{ if }\alpha+\beta+\gamma=1,2.\end{cases} (78)

To apply our conjecture we first need to calculate the stand-alone and MPO-injective subspaces of T0T^{0}. The double tensor is,

𝕋0\displaystyle\mathbb{T}^{0} =\displaystyle= (I2+Z2)3(I+in(d)X6).\displaystyle(I^{\otimes 2}+Z^{\otimes 2})^{\otimes 3}(I^{\otimes}+i^{n(d)}X^{\otimes 6}). (79)

Comparing it with the toric code double tensor in Eq. (25), we can immediately guess that the stand-alone projector is given by

M0=18(I2+Z2)3,\displaystyle M_{0}=\frac{1}{8}\left(I^{\otimes 2}+Z^{\otimes 2}\right)^{\otimes 3}, (80)

which is the same as that of toric code. And the MPO projector is,

𝕄\displaystyle\mathbb{M} =\displaystyle= 116(I2+Z2)3(I+in(d)X6).\displaystyle\frac{1}{16}(I^{\otimes 2}+Z^{\otimes 2})^{\otimes 3}(I^{\otimes}+i^{n}(d)X^{\otimes 6}). (81)

So we see that the symmetries identified in Eq. (76) are actually the stand-alone symmetries, and the symmetry identified in Eq. (77) is actually the MPO symmetry. With this information, our mathematical conjecture predicts:

  1. 1.

    If the variations breaks the ZZZ\otimes Z symmetries, then it is stable.

  2. 2.

    If the variations respects all ZZZ\otimes Z symmetries then there are two subscases

    1. (a)

      If it also respects the (i)n(d)X6(i)^{n(d)}X^{\otimes 6} symmetry then it is stable.

    2. (b)

      If it breaks the (i)n(d)X6(i)^{n(d)}X^{\otimes 6} symmetry then it is stable.

Refer to caption
Figure 11: Numerical calculation of the topological entanglement entropy Stopo(ϵ)S_{\text{topo}}(\epsilon) of the states represented by double-semion fixed point double-line tensors, T0T^{0}, varied with an infinitesimal random tensor in different subspaces. ϵ\epsilon value is kept fixed at ϵ=0.01\epsilon=0.01. Blue dot corresponds to StopoS_{\text{topo}} with no variation. IVI_{V} is projector onto the full virtual space. M0M_{0} is the projector on the stand-alone subspace. 𝕄\mathbb{M} is the MPO-injective subspace projector. We take a random tensor and apply the projectors to generate random tensors in respective subspaces. Variations in IVM0I_{V}-M_{0} violate ZZZ\otimes Z symmetry. Variations in M0𝕄M_{0}-\mathbb{M} violate in(d)X6i^{n(d)}X^{\otimes 6} but not ZZZ\otimes Z. Variations in 𝕄\mathbb{M} violate no virtual symmetry.. The details of this numerical calculations are given in appendix A.2.

We test these predictions numerically. The results are shown in Fig. 11. We conclude that the conjecture predicts the numerical observation correctly.

What about the physical conjecture? Is it compatible with the numerical observation? The answer is, yes. the double-semion model has one boson whose string operator is the ZZ-string operator, the same as that of the mm-particle in toric code. Since both also have the same stand-alone space, it means bringing down this string operator to the virtual level would again give us a gauge-string operator. Hence the string-operator corresponding to the boson in the double-semion model is a zero-strong operator, which implies that the variations in the stand-alone space corresponds to this boson. So the instability we see is due to the condensation of this topological boson. Another way to see it is to notice that the MPO symmetry in Eq. (77) actually comes from the Wilson loop operator corresponding to semion (or anti-semion). So variations that break it actually signify the presence of the boson.

Comparing double-line TNR of toric code and double-semion

So we see that the space (M0𝕄)(M_{0}-\mathbb{M}) for double-semion is 4-dimensional space spanned by basis

(82)

This looks exactly similar to the M0𝕄M_{0}-\mathbb{M} basis in double-line toric code in Eq. (45), which might lead one to believe that they both are unstable for similar variations. But one has to carefully note that the tensor T0T^{0} for both models are different, so the basis shown in Eq. (45) and in Eq. (82) are actually different. To illustrate this consider the following variation:

(83)

This variation is in stand-alone space of both toric code and double-semion, but it respects MPO symmetry of the toric code but violates the MPO symmetry of the double-semion. Indeed this variation causes phase transition in double-semion but not toric code. This variation cannot be lifted to the physical level on the double-semion tensor like it did for toric code (Eq. (52)). But one can readily see that this variation is not spanned by the basis in Eq. (82). And the reason for this is that this variation has components both in the MPO-injective subspace and the unstable subspace, which can be seen by applying the projector of the two spaces. We find that (M0𝕄)TXX0(M_{0}-\mathbb{M})T^{XX}\neq 0 and 𝕄TXX0\mathbb{M}T^{XX}\neq 0. This examples reminds us that for a variation to be unstable, all it needs is to have a non-zero component in the unstable space. So it should not be thought that only variations spanned by the unstable basis are unstable.

VII General String-net Models

The models discussed so far, the toric code model and the double semion model, are particular examples of a general class of 2D topological models known as string-net models Levin and Wen (2006). Also, the TNR discussed so far (single-line and double-line) are reduced versions of the a general triple-line TNR of the string-net statesGu et al. (2009); Buerschaper et al. (2009).

A string-net construction defines a topological model on a honeycomb lattice for any arbitrary unitary tensor fusion category Kitaev (2003); Levin and Wen (2006). The local Hilbert space has spins sitting on the edges. These spins can take i=0,1,..,N1i=0,1,..,N-1 values called string-types. i=0i=0 corresponds to the vacuum state. In general strings have orientation and for each string-type ii we have a unique strng-type ii* with opposite orientation. If i=i,i^{*}=i, then the string is called ‘unoriented’. In this paper we would assume all strings are unoriented for simplicity but we believe our results are easily generalizable to oriented links. A branching rule δi,j,k\delta_{i,j,k} defines what string-types are allowed to meet at a vertex. An FF-symbol guides how the strings fuse with each other. The FF-symbol comes from the unitary tensor category data and satisfies the so called pentagon equations. A local commuting Hamiltonian is defined, H=vAvpBpH=-\sum_{v}A_{v}-\sum_{p}B_{p}, where vv and pp denote the vertices and plaquettes of the honeycomb lattice. The vertex term projects onto the space allowed by the branching rule. The plaquette term acts by creating loops of ss-type strings which subsequently fuse with the existing string. As for any local commuting Hamiltonian, the ground state can be obtained by applying the projector Pgs=(pBp))(vAv)P_{gs}=\left(\sum_{p}B_{p})\right)\left(\sum_{v}A_{v}\right) on the vacuum state. A brief review of the string-net models has been given in the Appendix B. Readers can refer to the original papers for more details on the subject Levin and Wen (2006); Gu et al. (2009); Buerschaper et al. (2009); Şahinoğlu et al. (2014).

VII.1 Triple-line TNR of RG fixed point string-net state

As shown by Gu et al. (2009); Buerschaper et al. (2009), RG fixed point string-net states described above are known to have a triple-line TNR. We will only briefly discuss the relevant details here. A short derivation of the triple-line TNR is given in the Appendix C. An interested reader may refer to the original papers Levin and Wen (2005); Gu et al. (2009); Buerschaper et al. (2009) for more details.

A general triple-line Tensor is represented diagrammatically as:

[Uncaptioned image].\includegraphics[scale={0.4}]{triplelineabc}. (84)

A string-net fixed point state has a triple line TNR with components given by

Taa;bb;cc;ijkijk\displaystyle T^{ijk}_{aa^{\prime};bb^{\prime};cc^{\prime};i^{\prime}j^{\prime}k^{\prime}} =\displaystyle= Sabcijkδa,aδb,bδc,cδi,iδj,jδk,k\displaystyle S^{ijk}_{abc}\delta_{a,a^{\prime}}\delta_{b,b^{\prime}}\delta_{c,c^{\prime}}\delta_{i,i^{\prime}}\delta_{j,j^{\prime}}\delta_{k,k^{\prime}}
where Sabcijk\displaystyle\text{where }S^{ijk}_{abc} =\displaystyle= didjdk4Gabcijkdadbdv6.\displaystyle\sqrt[4]{d_{i}d_{j}d_{k}}G^{ijk}_{abc}\sqrt[6]{d_{a}d_{b}d_{v}}. (85)

So it would be represented diagrammatically as:

[Uncaptioned image].\includegraphics[scale={0.4}]{triplelineT0abc}. (86)

Before we discuss the properties of the triple-line TNR of the general string-net models, we would like to mention that double-line TNR and single-line TNR are actually reduced versions of the triple-line TNR, and as such, many results about the triple-line TNR apply to double-line and single-line as well. We can discard some of the legs of the triple-line tensor if fewer legs are required to encode the necessary information. For example, for abelian models, the middle leg of the triple-line tensor is redundant; it always assumes value which is a product (fusion) of the two legs on either side of it. That’s why for abelian models, double-line tensors suffice and the middle-leg can be discarded. Non-abelian models, such as the double-Fibonacci model we will study in section VIII, the middle-leg does carry essential information and cannot discarded. So one cannot have a double-line TNR of non-abelian models. Furthermore, if the ground state of a model can be written as an equal superposition of states allowed by branching rules then the ground state admits a single-line TNR. For example, toric code ground state is an equal superposition of all closes string configurations, and hence admits a single-line TNR. In fact, any quantum double model with an abelian gauge group can have a single-line TNR. The double-semion model, on the other hand, is not an equal superposition of states allowed by the branching rules (it has a phase factor in(d)i^{n(d)}), and hence it cannot admit a single-line TNR.

To apply the conjecture to the triple-line TNR of general string-net model, we now first calculate its MPO-injective and stand-alone subspaces. We will do so in the next two sections.

VII.2 Stand-alone space of triple-line TNR string-net

We find that the stand-alone space of the triple-line TNR is given by the following theorem:

Theorem 1.

The stand alone space, M0M_{0}, of the triple-line string net TNR is spanned by the orthonormal vectors

δi,b,cδj,c,aδk,a,b|a,b,c;i,j,k\displaystyle\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}|a,b,c;i,j,k\rangle (87)

where δ\delta is the branching rule of the string-net model. i,j,ki,j,k label the middle legs, and a,b,ca,b,c label the plaquette legs.

The proof of this result is rather involved and is given in Appendix D. These basis vectors can be represented as string-configurations,

|δi,b,cδj,c,aδk,a,b=[Uncaptioned image].\displaystyle\centering|\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}\rangle=\raisebox{-28.45274pt}{\includegraphics[scale={0.4}]{LSABasisabc}}\@add@centering. (88)

So we get,

dim(M0)=a,b,c;i,j,kδi,b,cδj,c,aδk,a,b.\displaystyle dim(M_{0})=\sum_{\begin{subarray}{c}a,b,c;i,j,k\end{subarray}}\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}. (89)

VII.3 MPO-injective subspace of String-net triple-line TNR

we will use definition 2 to find the MPO-injective subspace of triple-line TNR. Using the triple-line TNR T0T^{0} of string-net states given in Eq. (VII.1), the virtual density matrix is found to be

σ\displaystyle\sigma =\displaystyle= I(T0)αI(T0;)αI\displaystyle\sum_{I}(T^{0})^{I}_{\alpha}(T^{0;*})^{I}_{\alpha} (90)
=\displaystyle= {ak,bk;ik,k+1}Ga1a2a3i23i31i12Gb1b2b3i23i31i12j(daj16dbj16dij,j+112)\displaystyle\sum_{\{a_{k},b_{k};i_{k,k+1}\}}G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}G^{i_{23}i_{31}i_{12}}_{b_{1}b_{2}b_{3}}\prod_{j}(d^{\frac{1}{6}}_{a_{j}}d^{\frac{1}{6}}_{b_{j}}d^{\frac{1}{2}}_{i_{j,j+1}})
|{ak;ik,k+1}{bk;ik,k+1}|.\displaystyle|\{a_{k};i_{k,k+1}\}\rangle\langle\{b_{k};i_{k,k+1}\}|.

Clearly, this density matrix can simply be written as

σ\displaystyle\sigma =\displaystyle= i,j,k|vi,j,kvi,j,k|\displaystyle\sum_{i,j,k}|v_{i,j,k}\rangle\langle v_{i,j,k}| (91)
where|vi,j,k\displaystyle\text{where}|v_{i,j,k}\rangle =\displaystyle= (didjdk)14a1,a2,a3Ga1,a2,a3i,j,k(da1da2da3)16\displaystyle(d_{i}d_{j}d_{k})^{\frac{1}{4}}\sum_{a_{1},a_{2},a_{3}}G^{i,j,k}_{a_{1},a_{2},a_{3}}(d_{a_{1}}d_{a_{2}}d_{a_{3}})^{\frac{1}{6}} (92)
|a1,a2,a3;i,j,k.\displaystyle|a_{1},a_{2},a_{3};i,j,k\rangle.

So σ\sigma has a diagonal form in terms of vectors vi,j,kv_{i,j,k}. To get the projector on to its support space,we simply need to use the unit vectos 1Ni,j,k|vi,j,k\frac{1}{N_{i,j,k}}|v_{i,j,k}\rangle, where Ni,j,k=vi,j,k|vi,j,kN_{i,j,k}=\sqrt{\langle v_{i,j,k}|v_{i,j,k}}\rangle is the norm of vector vi,j,kv_{i,j,k}. So the string-net MPO projector is

𝕄=i,j,k1Ni,j,k2|vi,j,kvi,j,k|.\displaystyle\mathbb{M}=\sum_{i,j,k}\frac{1}{N^{2}_{i,j,k}}|v_{i,j,k}\rangle\langle v_{i,j,k}|. (93)

Note that |vi,j,k=0|v_{i,j,k}\rangle=0 if δi,j,k=0\delta_{i,j,k}=0. It means that 𝕄\mathbb{M} projects on to the physical states allowed by the branching rules, and

dim(𝕄)=i,j,kδi,j,k\displaystyle dim(\mathbb{M})=\sum_{i,j,k}\delta_{i,j,k} (94)

Comparing Eq. (89) with Eq. (94), we can see that dim(M0)>dim(𝕄)dim(M_{0})>dim(\mathbb{M}). So according to our conjecture, there must always be unstable directions of variations in the triple-line TNR of any string-net model! Indeed, we give examples of such unstable directions and will prove in section F that triple-line TNR of string-net always have instabilities.

VII.4 Tensors in the unstable space M0𝕄M_{0}-\mathbb{M}

We have determined both the stand-alone space, M0M_{0} and the MPO-injective space 𝕄\mathbb{M}. M0M_{0} space is spanned by vectors,

δi,b,cδj,c,aδk,a,b|a,b,c;i,j,k.\displaystyle\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}|a,b,c;i,j,k\rangle. (95)

And the MPO-injective space 𝕄\mathbb{M} space is spanned by |vi,j,k:δi,j,k=1|v_{i,j,k}\rangle:\delta_{i,j,k}=1, where

|vi,j,k\displaystyle|v_{i,j,k}\rangle =\displaystyle= a,b,cGa,b,ci,j,k(dadbdc)16|a,b,c;i,j,k.\displaystyle\sum_{a,b,c}G^{i,j,k}_{a,b,c}(d_{a}d_{b}d_{c})^{\frac{1}{6}}|a,b,c;i,j,k\rangle. (96)

The tensors supported on M0MM_{0}-M are precisely the tensors that cause instability. To determine the orthogonal basis of this space we simply need to find vectors orthogonal to vi,j,kv_{i,j,k} which are within the stand-alone space. First note that M0M_{0} space decomposes in orthogonal subspaces M0=i,j,k𝕍i,j,kM_{0}=\bigoplus_{i,j,k}\mathbb{V}_{i,j,k} where the subspace 𝕍i,j,k\mathbb{V}_{i,j,k} is spanned by δi,b,cδj,c,aδk,a,b|a,b,c;i,j,k\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}|a,b,c;i,j,k\rangle, that is, a,b,ca,b,c for which δi,b,cδj,c,aδk,a,b\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b} is non-zero. M0𝕄M_{0}-\mathbb{M} space can be decomposed into two subspaces,

  1. 1.

    δi,j,k=0\delta_{i,j,k}=0: This consists of all the string-configurations in Fig. 88 for which δi,j,k=0\delta_{i,j,k}=0. They are obviously orthogonal to all vi,j,kv_{i,j,k} since vi,j,k=0v_{i,j,k}=0 if δi,j,k=0\delta_{i,j,k}=0. Since these vectors violate the vertex term of the Hamiltonian we will refer to them as ‘vertex variations’.

  2. 2.

    δi,j,k=1\delta_{i,j,k}=1: This is the subspace spanned by string configurations for which δi,j,k=1\delta_{i,j,k}=1. We need to find other vectors in 𝕍i,j,k\mathbb{V}_{i,j,k} that are orthogonal to vi,j,kv_{i,j,k}. dim(𝕍i,j,k)=a,b,cδi,b,cδj,c,aδk,a,b=a,b,c[Gc,a,bi,j,k]\text{dim}(\mathbb{V}_{i,j,k})=\sum_{a,b,c}\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}=\sum_{a,b,c}[G^{i,j,k}_{c,a,b}] where [Gc,a,bi,j,k]=1[G^{i,j,k}_{c,a,b}]=1 if Gc,a,bi,j,k0G^{i,j,k}_{c,a,b}\neq 0 and 0 otherwise. Note that since 𝕍i,j,k\mathbb{V}_{i,j,k} are orthogonal for different values of i,j,ki,j,k, we just need to find vectors in individual 𝕍\mathbb{V} subspaces. To find these we will use the orthogonality of GG (135)

    cGa,b,ci,j,kGa,b,ci,j,kdc=1dkδa,b,k.\displaystyle\sum_{c}G^{i,j,k}_{a,b,c}G^{i,j,k}_{a,b,c}d_{c}=\frac{1}{d_{k}}\delta_{a,b,k}. (97)

    And the fact that matrices NkN^{k} defined by Na,bk=δa,b,kN^{k}_{a,b}=\delta_{a,b,k} can be simultaneously diagonalized k\forall k. Let’s say |sq=sq;a|a|s_{q}\rangle=s_{q;a}|a\rangle is its qth such simultaneous eigenvector. As discussed in Appendix B.1, s0;a=das_{0;a}=d_{a}, that is, the vector formed by quantum dimensions is an eigenvector to NkN^{k}. These vectors are orthogonal, sq|sq=δq,q\langle s_{q}|s_{q^{\prime}}\rangle=\delta_{q,q^{\prime}}, which also implies that sq|Nk|sq=a,bsq;aδk,a,bsq;bδq,q\langle s_{q}|N^{k}|s_{q^{\prime}}\rangle=\sum_{a,b}s_{q;a}\delta_{k,a,b}s_{q^{\prime};b}\propto\delta_{q,q^{\prime}}. Now we are ready to write down the vectors spanning 𝕍i,j,k\mathbb{V}_{i,j,k}.

Consider vectors

|vi,j,kq;a=a,b,csq;adaGa,b,ci,j,k(dadbdc)56|a,b,c;i,j,k,\displaystyle|v^{q;a}_{i,j,k}\rangle=\sum_{a,b,c}\frac{s_{q;a}}{d_{a}}G^{i,j,k}_{a,b,c}(d_{a}d_{b}d_{c})^{\frac{5}{6}}|a,b,c;i,j,k\rangle, (98)

where superscript (q;a)(q;a) indicates that the qqth eigenvector is used on leg aa. Using the orthogonality relation, we get

vi,j,k|vi,j,kq;a\displaystyle\langle v_{i,j,k}|v^{q;a}_{i,j,k}\rangle =\displaystyle= a,b,csq;adbdcGa,b,ci,j,kGa,b,ci,j,k\displaystyle\sum_{a,b,c}s_{q;a}d_{b}d_{c}G^{i,j,k}_{a,b,c}G^{i,j,k}_{a,b,c} (99)
=\displaystyle= a,bsq;aδa,b,kdb\displaystyle\sum_{a,b}s_{q;a}\delta_{a,b,k}d_{b} (100)
=\displaystyle= a,bsq;aδa,b,ks0;b\displaystyle\sum_{a,b}s_{q;a}\delta_{a,b,k}s_{0;b} (101)
\displaystyle\propto δq,0.\displaystyle\delta_{q,0}. (102)

So we see that the vector vi,j,kq;av^{q;a}_{i,j,k} is orthogonal to vi,j,kv_{i,j,k} if q0q\neq 0. Since qq takes N1N-1 non-zero values and it can be put on leg a,ba,b or cc we seem to have 3(N1)3(N-1) such vectors. However not all of them will be independent, but they span the full vector space 𝕍i,j,k\mathbb{V}_{i,j,k}. Since these kinds of variations change the plaquette leg factors, hence violating the plaquette term, we will refer to these variations as ‘plaquette variations’.

VII.5 Instability of triple-line TNR

Theorem 2.

Let T0T^{0} be the fixed point triple-line TNR of a string net ground state. There exist tensors TqT^{q} in the space M0𝕄M_{0}-\mathbb{M} (that is,(M0𝕄)Tq0(M_{0}-\mathbb{M})T^{q}\neq 0) that for the variation T0T0+ϵTqT^{0}\rightarrow T^{0}+\epsilon T^{q}, limϵ0Stopo(ϵ)Stopo(0)\lim_{\epsilon\rightarrow 0}S_{\text{topo}}(\epsilon)\neq S_{\text{topo}}(0).

The proof of this theorem is rather involved and has been included in the appendx F.

With this we have concluded the analysis of general string-net mdodels and their triple-line TNR. Now we turn to some concrete examples to understand how the conjecture in III.3 explains the instabilities in string-nets.

VII.6 Examples: Triple-line TNR of the toric code and double semion states

Refer to caption
Figure 12: Numerical calculation of topological entanglement entropy Stopo(ϵ)S_{\text{topo}}(\epsilon) of states represented by toric code fixed point triple-line tensors, T0T^{0}, varied with an infinitesimal random tensor in different subspaces. ϵ\epsilon value is kept fixed at ϵ=0.1\epsilon=0.1. Blue dot corresponds to StopoS_{\text{topo}} with no variation. IVI_{V} is projector onto the full virtual space. M0M_{0} is the projector on the stand-alone subspace. 𝕄\mathbb{M} is the MPO-injective subspace projector. We take a random tensor and apply the projectors to generate random tensors in respective subspaces. Details of this numerical calculation are given in Appendix A.2.

let’s first examine how models covered in the previous chapter, toric code and double semion, fit into triple-line TNR. One can get the triple-line TNR for them by plugging in the relevant string-net data into Eq. (VII.1). We will apply the results about general-string net models developed in previous sections to the two cases.

Toric code string-net data is,

N=1,d0=1,d1=1;\displaystyle N=1,\,d_{0}=1,\,d_{1}=1;
δ000=δ110=δ101=δ110=1;\displaystyle\delta_{000}=\delta_{110}=\delta_{101}=\delta_{110}=1;
G000000=G111000=1;\displaystyle G^{000}_{000}=G^{000}_{111}=1;
G011011=G100011=G101101=G010101=G110110=G001110=1.\displaystyle G^{011}_{011}=G^{011}_{100}=G^{101}_{101}=G^{101}_{010}=G^{110}_{110}=G^{110}_{001}=1.

The triple-line TNR of toric code can be built by plugging in this data into the general expression in Eq. (VII.1). This tensor has 9 virtual indices, each of which takes 2 values. So the full virtual space is rank(IV)=29=512\textrm{rank}(I_{V})=2^{9}=512 dimensional. The dimension of the stand-alone space is

rank(M0)\displaystyle\textrm{rank}(M_{0}) =\displaystyle= a,b,c;i,j,kδi,b,cδj,c,aδk,a,b=8,\displaystyle\sum_{a,b,c;i,j,k}\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}=8, (104)

and the dimension of the MPO-injective subspace is

rank(𝕄)\displaystyle\textrm{rank}(\mathbb{M}) =\displaystyle= i,j,kδi,j,k=4.\displaystyle\sum_{i,j,k}\delta_{i,j,k}=4. (105)

These imply that rank(IVM0)=5128=504\textrm{rank}(I_{V}-M_{0})=512-8=504 and rank(M0𝕄)=84=4\textrm{rank}(M_{0}-\mathbb{M})=8-4=4. So we reach the conclusion that out of 512 possible variations, 504 are stable since they are outside the stand-alone space. In the remaining 8 dimensional subspace, perturbations in a 4 dimensional subspace are in stable whereas the ones in the other 4 dimensional subspace are unstable. Using Fig. 9, the classification of all variations can be represented as follows

(106)

The numerical calculation supporting this conclusion is shown in Fig. 12. Also note that all unstable variations are flux variations, that is, it happens through the condensation of mm-particle. It is not possible for the ee-particle to condense in this way.

For the double semion model, the string-net data is

N=1,d0=1,d1=1;\displaystyle N=1,\,d_{0}=1,\,d_{1}=1;
δ000=δ110=δ101=δ110=1;\displaystyle\delta_{000}=\delta_{110}=\delta_{101}=\delta_{110}=1;
G000000=1;\displaystyle G^{000}_{000}=1;
G011011=G101101=G110110=1;\displaystyle G^{011}_{011}=G^{101}_{101}=G^{110}_{110}=-1;
G100011=G010101=G001110=G111000=i.\displaystyle G^{011}_{100}=G^{101}_{010}=G^{110}_{001}=G^{000}_{111}=-i.

The triple-line TNR of the double semion model can be built by plugging in this data into the general expression in Eq. (VII.1). This tensor has 9 virtual indices, each of which takes 2 values. So the full virtual space is rank(IV)=29=512\textrm{rank}(I_{V})=2^{9}=512 dimensional. Dimension of the stand-alone space is

rank(M0)\displaystyle\textrm{rank}(M_{0}) =\displaystyle= a,b,c;i,j,kδi,b,cδj,c,aδk,a,b=8,\displaystyle\sum_{a,b,c;i,j,k}\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}=8, (108)

and the dimension of the MPO-injective subspace is

rank(𝕄)\displaystyle\textrm{rank}(\mathbb{M}) =\displaystyle= i,j,kδi,j,k=4.\displaystyle\sum_{i,j,k}\delta_{i,j,k}=4. (109)

These imply that rank(IVM0)=5128=504\textrm{rank}(I_{V}-M_{0})=512-8=504 and rank(M0𝕄)=84=4\textrm{rank}(M_{0}-\mathbb{M})=8-4=4. So we reach the conclusion that out of 512 possible variations, 504 are stable since they are outside the stand-alone space. In the remaining 8, 4 are in stable and 4 are unstable. The numerical calculation supporting this conclusion is shown in Fig. 13.

Refer to caption
Figure 13: Numerical calculation of topologiccal entanglement entropy Stopo(ϵ)S_{\text{topo}}(\epsilon) of states represented by double semion model fixed point triple-line tensors, T0T^{0}, varied with an infinitesimal random tensor in different subspaces. ϵ\epsilon value is kept fixed at ϵ=0.1\epsilon=0.1. Blue dot corresponds to StopoS_{\text{topo}} with no variation. IVI_{V} is projector onto the full virtual space. M0M_{0} is the projector on the stand-alone subspace. 𝕄\mathbb{M} is the MPO projector. We take a random tensor and apply the projectors to generate random tensors in respective subspaces. Details of this numerical calculation are given in the Appendix A.2.

Also note that all unstable variations are plaquette variations, that is, it happens through condensation of the boson of the double-semion model. The classification of all variations is the same as that for toric code shown in (106) above.

Now we are ready to discuss a concrete example of the string-net triple line TNR and its instabilities. We choose double-Fibonacci model for two main reasons: 1- Unlike the toric code and the double-semion model, it is a non-abelian model, so the general triple-line TNR, as far as we know, cannot be reduced to a double-line or single-line TNR. So it serves as a good example to test our conjecture for the general string-net TNR. 2- Unlike toric code and double-semion, its bosonic string operator is not a zero string operator, so it does not disappear along the path.

VIII A non-abelian example: Double-Fibonacci Model

Toric code and the double-semion models are abelian models. Now we will discuss a non-abelian model: the double-Fibonacci model. The Ground state of non-abelian string net models cannot be described by a single-line or the double-line TNR; it only accepts a triple line TNR (tensor in Eq. (VII.1)). Let’s first describe the model briefly. The data for this can be found in section IV.B of Levin and Wen (2005). There is one type of string (N=1N=1). Its quantum dimension is, d1=γ=1+52d_{1}=\gamma=\frac{1+\sqrt[]{5}}{2}. Its branching rules are,

δijk={0 if i+j+k=1;1otherwise.\displaystyle\delta_{ijk}=\begin{cases}0&\text{ if }i+j+k=1;\\ 1&\text{otherwise}.\end{cases}
d0\displaystyle d_{0} =1,d1=γ,where γ2=γ+1\displaystyle=1,\,d_{1}=\gamma,\quad\text{where }\,\gamma^{2}=\gamma+1 (110)
G111111\displaystyle G^{111}_{111} =1γ2;G111110=1γ;G110110=1γ;G111000=1γ;G000000=1.\displaystyle=-\frac{1}{\gamma^{2}};\,G^{110}_{111}=\frac{1}{\gamma};\,G^{110}_{110}=\frac{1}{\gamma};\,G^{000}_{111}=\frac{1}{\sqrt{\gamma}};\,G^{000}_{000}=1. (111)

The branching rules tells us that one string is allowed to branch into two, unlike the abelian models we have studied until now. First, let’s apply our conjecture to find out how many unstable directions we should expect. The triple-line TNR of the Fibonacci model can be built by plugging in this data into the general expression in Eq. (VII.1). This tensor has 9 virtual indices, each of which takes 2 values. So the full virtual space is rank(IV)=29=512\textrm{rank}(I_{V})=2^{9}=512 dimensional. The dimension of the stand-alone space is

rank(M0)\displaystyle\textrm{rank}(M_{0}) =\displaystyle= a,b,c;i,j,kδi,b,cδj,c,aδk,a,b=18,\displaystyle\sum_{a,b,c;i,j,k}\delta_{i,b,c}\delta_{j,c,a}\delta_{k,a,b}=18, (112)

which is bigger than that of the toric code and the double-semion models. The dimension of the MPO-injective subspace is

rank(𝕄)\displaystyle\textrm{rank}(\mathbb{M}) =\displaystyle= i,j,kδi,j,k=5\displaystyle\sum_{i,j,k}\delta_{i,j,k}=5 (113)

which implies that rank(IVM0)=51218=494\textrm{rank}(I_{V}-M_{0})=512-18=494 and rank(M0𝕄)=185=13\textrm{rank}(M_{0}-\mathbb{M})=18-5=13. So we reach the conclusion that out of 512 possible (virtual) variations, 494 are stable since they are outside the stand-alone space. In the remaining 18, 5 are in stable as they are in the MPO-injective subspace and remaining 13 are unstable. The classification of all variations can be represented pictorially as follows:

(114)

The numerical calculation supporting this conclusion is shown in Fig. 14.

Comparing it to the toric code and the double-semion models we see that the Fibonacci triple-line TNR is significantly more unstable. Another difference is that the stand-alone space does have vertex unstable variations in addition to plaquette ones. Out of 13 unstable variations in M0𝕄M_{0}-\mathbb{M} the following 3 are vertex variations and the rest 10 are plaquette variations:

|a,b,c;i,j,k\displaystyle|a,b,c;i,j,k\rangle =\displaystyle= |1,1,1;1,0,0,|1,1,1;0,1,0,\displaystyle|1,1,1;1,0,0\rangle,|1,1,1;0,1,0\rangle, (115)
|1,1,1;0,0,1.\displaystyle|1,1,1;0,0,1\rangle.

That is, the following 3 tensor components are allowed in the stand-alone space but not in the physical space:

[Uncaptioned image].\includegraphics[scale={0.4}]{Fibvertex}. (116)

Since δi,j,k=δ1,0,0=δ0,1,0=δ0,0,1=0\delta_{i,j,k}=\delta_{1,0,0}=\delta_{0,1,0}=\delta_{0,0,1}=0 these 3 vectors are not in the MPO-injective subspace 𝕄\mathbb{M}.

To understand the physics behind this, we need to look at the quasi-particles of the Fibonacci model. There are 3 quasi-particles excitations: τ,τ¯\tau,\bar{\tau}, and ττ¯\tau\bar{\tau}. The TT and SS matrices of the particles are as follows:

T=[10000e45πi0000e45πi00001],S=11+γ2[1γγγ2γ1γ2γγγ21γγ2γγ1].\displaystyle T=\begin{bmatrix}1&0&0&0\\ 0&e^{-\frac{4}{5}\pi i}&0&0\\ 0&0&e^{\frac{4}{5}\pi i}&0\\ 0&0&0&1\end{bmatrix},S=\frac{1}{1+\gamma^{2}}\begin{bmatrix}1&\gamma&\gamma&\gamma^{2}\\ \gamma&-1&\gamma^{2}&-\gamma\\ \gamma&\gamma^{2}&-1&-\gamma\\ \gamma^{2}&-\gamma&-\gamma&1\end{bmatrix}. (117)

It is best seen as two layers of Fibonacci model with opposite chiralities. τ\tau and τ¯\bar{\tau} are particles in the two respective layers. They have non-trivial self statistics. But, because they are in different layers, they have a trivial statistics with one another. And the boson, ττ¯\tau\bar{\tau} is the composition of the Fibonacci particles in the two layers. The string operator for these quasi-particles are given in equation (51) of Levin and Wen (2006). We are most interested in the boson of the model, so let us write its string operator (Ω\Omega matrices) explicitly:

n4,0=1,n4,1=1,Ω4,0000=1,Ω4,1101=1,\displaystyle n_{4,0}=1,n_{4,1}=1,\Omega^{0}_{4,000}=1,\Omega^{1}_{4,110}=1,
Ω4,0011=γ2,Ω4,1110=γ1,Ω4,1111=γ5/2,\displaystyle\Omega^{1}_{4,001}=-\gamma^{-2},\Omega^{0}_{4,111}=\gamma^{-1},\Omega^{1}_{4,111}=\gamma^{-5/2},
Ω4,1011=Ω4,0111=γ11/4(2e3πi/5+γe3πi/5).\displaystyle\Omega^{1}_{4,101}=\Omega^{*1}_{4,011}=\gamma^{-11/4}(2-e^{3\pi i/5}+\gamma e^{-3\pi i/5}). (118)
Refer to caption
Figure 14: Numerical calculation of topological entanglement entropy Stopo(ϵ)S_{\text{topo}}(\epsilon) of states represented by Fibonacci model fixed point triple-line tensors, T0T^{0}, varied with an infinitesimal random tensor in different subspaces. ϵ\epsilon value is kept fixed at ϵ=0.1\epsilon=0.1. Blue dot corresponds to StopoS_{\text{topo}} with no variation. IVI_{V} is projector onto the full virtual space. M0M_{0} is the projector on the stand-alone subspace. 𝕄\mathbb{M} is the MPO-injective subspace projector. We take a random tensor and apply the projectors to generate random tensors in respective subspaces. The exact numerical values on this plot can be found in Appendix A.2.

One can see that it is not a simple-string operator: when applied on the vacuum, it creates both 0-type and 1-type strings. So we see that the double-Fibonacci model is different from the above two examples in one crucial aspect: the boson string operators in the toric code and the double-semion models were zero-string operators for the given TNRs. That is, the string operator ‘disappeared’ along the path (Figs. 6364), not changing tensors along the path. This is why a single variations standing alone could be thought of as an operator sitting at the ends of an invisible string operator. But the same is not true for the double-Fibonacci model. The string operator corresponding to the boson ττ¯\tau\bar{\tau} does not disappear in the middle.

Because the bosons don’t have a zero string operator, one might conclude that there would be no unstable directions as bosons cannot condense. However, numerical calculations find that there actually are unstable directions. How can we understand that?

We look at how the boson string-operator changes the tensors along the path. In Fig. 15, one can see that a wave function corresponding to the boson sitting at two places, v1v_{1} and v2v_{2}, is actually a superposition of many wave functions:

|Ψboson\displaystyle|\Psi_{\text{boson}}\rangle =\displaystyle= t1,s,t2nsΦt1,s,t2|Ψgs\displaystyle\sum_{t_{1},s,t_{2}}n_{s}\Phi_{t_{1},s,t_{2}}|\Psi_{\text{gs}}\rangle
=\displaystyle= |Ψ0,0,0+|Ψ1,0,0+|Ψ0,0,1+|Ψ1,0,1\displaystyle|\Psi_{0,0,0}\rangle+|\Psi_{1,0,0}\rangle+|\Psi_{0,0,1}\rangle+|\Psi_{1,0,1}\rangle
+\displaystyle+ |Ψ0,1,0+|Ψ1,1,0+|Ψ0,1,1+|Ψ1,1,1,\displaystyle|\Psi_{0,1,0}\rangle+|\Psi_{1,1,0}\rangle+|\Psi_{0,1,1}\rangle+|\Psi_{1,1,1}\rangle,
Refer to caption
Figure 15: Action of a generic (simple and non-simple) open-end string operators corresponding to anyon α\alpha on tensors can be calculated in a similar fashion as that of simple-string operator Wilson loops. (a) We start with applying the string operator on the ’loop state’ on the fattened lattice. (b) The string operator becomes a superposition of operations snsΦt1st2\sum_{s}n_{s}\Phi_{t_{1}st_{2}}. Φt1st2\Phi_{t_{1}st_{2}} acts as follows: at the ends, the string operator acts as Ωα;t1s\Omega_{\alpha;t_{1}s} and ωα;st2\omega_{\alpha;st_{2}} matrices on the plaquette-loops, while in the middle, it is simply a ss-type string to be fused with the nearby plaquette loops. (c) We fuse all strings in the previous step to get the physical state. The effect of the string operator can be absorbed into redefining the tensors along the path. A generic string operator changes the tensors along its path. The only case where it doesn’t change the tensors is for simple-string operators of type 0.

where the operator Φt1,s,t2\Phi_{t_{1},s,t_{2}} is explained in Fig. 15. Φt1,s,t2\Phi_{t_{1},s,t_{2}} is equivalent to applying Ω4;t1,s,s1s1\Omega^{s^{\prime}_{1}}_{4;t_{1},s,s_{1}} and Ω¯4;s,t2,snsn\bar{\Omega}^{s^{\prime}_{n}}_{4;s,t_{2},s_{n}} on the loops at the ends of the string operator, and creating a ss type string along the path. Fusing the loops with each other and with the ss string along path PP gives the final state. The important thing to note is that, though a TNR of the full state |Ψboson|\Psi_{\text{boson}}\rangle involves changing tensors along the path, the TNR of |Ψt1,0,t2,t1,t2=0,1|\Psi_{t_{1},0,t_{2}}\rangle,\,t_{1},t_{2}=0,1, have tensors changed only on the ends. Simply putting, the zero-string component of the string operator does not change the tensors T0T^{0} in the middle, as expected. So the boson state has a finite overlap with the state where tensors are changed only at the ends. So when the variations corresponding to the ends of this zero-string component of the boson operator proliferate, it effectively condenses the bosons, as they have finite overlap with the resulting state.

So in conclusion, we see that although the boson string operator is not a zero-string operator, that is, it does not disappear in the middle for the triple-line TNR, its zero-string component still causes an instability because the resulting state has a finite overlap with the boson-condensed state.

Now we have looked through important examples of string-net TNR and their instabilities. Finally, we will give a proof of instability in the generic case.

IX Conclusions and Discussion

In this paper, we try to answer the following question: are the tensor network representation of string-net states stable? That is, if we start from the tensor network representation of a string-net state and add arbitrarily small variations to the local tensor, does the topological order of the represented state always remain the same? This is an important question because if the answer is no, then the task of determining topological order of a tensor network state may be numerically ‘ill-posed’. That is, arbitrarily small numerical error in the process may change our conclusion in a qualitative way. Previous workChen et al. (2010) has shown that this is indeed the case for the single line representation of the toric code state. While this may seem to seriously limit the applicability of tensor network methods to the study of the toric code type topological order, Ref.Chen et al., 2010 also identified an inner Z2Z_{2} symmetry by preserving which the numerical task becomes ‘well-posed’ again.

We want to know if similar problems happen for general string-net states. In particular, we asked

  1. 1.

    Does the tensor network representation of other string-net states also have unstable directions of variation?

  2. 2.

    If so, can they be avoided by preserving certain symmetries in the tensor?

  3. 3.

    What is the physical reason behind such instabilities and their prevention?

We found that

  1. 1.

    All string-net tensors have unstable directions of variation.

  2. 2.

    To avoid such instabilities, we need to avoid ‘stand-alone’ variations that break the Matrix-Product-Operator(MPO) symmetry introduced in Ref.Şahinoğlu et al., 2014; Buerschaper, 2014.

  3. 3.

    The physical reason for the instability is that ‘stand-alone’ variations which violate these symmetries induce condensation of bosonic quasi-particles and hence destroys (totally or partially) the topological order.

We demonstrated the case explicitly for the tensor network representation of the toric code (single, double, triple line), the double semion, and the double Fibonacci model, by calculating the topological entanglement entropy StopoS_{\text{topo}} of tensors with random variations. We observe that MPO symmetry preserving variations keep StopoS_{\text{topo}} invariant and MPO symmetry breaking variations lower StopoS_{\text{topo}} (to zero). While for general string-net models, we cannot prove the above claim analytically, we are able to show that 1. the fixed point tensor of any string-net has unstable directions (which break the MPO symmetry) 2. MPO breaking variations induce the condensation of bosons in the state, and therefore destroy (at least partially) the topological order. Moreover, we point out that to correctly simulate the local properties of a phase transition induced by such boson condensation, these MPO breaking variations must be allowed in the variational calculation; otherwise, one may reach the wrong conclusion about the phase transition (e.g. regarding the order of the transition). This has been observed in the case of toric code in Ref.Gu et al., 2008.

Given this result, we can ask, how to properly design the tensor network algorithm so that it can correctly simulate topological phases and phase transitions? In particular, if we want to determine whether the ground state of some Hamiltonian has topological order by calculating topological entanglement entropy in the thermodynamic limit, we need to use a variational ansatz with the proper MPO symmetry. How to do that in an efficient and unbiased way is an interesting open question.

On the other hand, if we want to properly simulate a topological phase transition induced by boson condensation, we need to put in the proper variational parameter. However, as we have seen in the case of the toric code, different representations (single line, double line, triple line) contain parameters corresponding to the condensation of different bosons (ee or mm). In fact, none of the representations contain parameters which correspond to the condensation of both bosons. Therefore, it is not possible to use any of them to correctly obtain the full phase diagram. It implies that, if we want to study a topological phase transition whose nature is unknown, we need to try different ansätze. How to do that in an efficient and unbiased way is again an interesting open problem. We leave these problems to future study.

Acknowledgements.
Sujeet Shukla would like to thank Pinaky Bhattacharyya for help with the numerical calculations. X.C. is supported by the Caltech Institute for Quantum Information and Matter and the Walter Burke Institute for Theoretical Physics.

Appendix A Decomposing stand-alone space using Wilson-loops: MPO symmetries

In sections IV.2 and IV.3, we argued how the stand alone space M0M_{0} decomposes further into two subspaces, 𝕄\mathbb{M} and 𝕄𝟘𝕄\mathbb{M_{0}}-\mathbb{M} on the basis whether a stand-alone variation can be lifted to the physical level locally or non-locally. In doing so we used the fact about topological models: anyonic excitation cannot be removed by a local operation but an elementary excitation can be.

There is another way to distinguish between trivial and non-trivial excitations. Consider the tensor network state made out of T0T^{0}, except at site s0s_{0}, T0T^{0} has been replaces by some stand-alone tensor TT. Now we want to find out whether this variation/excitation is a topologically non-trivial excitation. In topological models the way to detect the presence of anyon is by measuring Wilson-loop operators around it. We will do the same here, but on the virtual level. Doing so will reveal another interpretation of the MPO subspace/symmetries: these symmetries come from Wilson-loops of anyons of the model.

Consider the following physical process. We generate an anyon aa, anti-anyon a¯\bar{a} pair, move aa around the site s0s_{0} where TT is sitting and finally fuse it with a¯\bar{a}. Mathematically, this is equivalent to applying a Wilson loop operator Wa(C)W_{a}(C) corresponding to particle aa. CC represents the closed curve/loop around the site. If there was another anyonic excitation bb present at s0s_{0} and if aa and bb have a non-trivial braiding statistics with each other, then this process produces a phase factor. Hence application of Wa(C)W_{a}(C), where CC is a loop around a site can be used to detect if there is a topologically non-trivial excitation present at the site. Of course Wa(C)W_{a}(C) are symmetries of the ground state for all anyons aa. But more than that, it would be a symmetry of any state with a trivial local excitation sitting at s0s_{0}.

Wa(C)W_{a}(C) is an operator on the physical degrees of freedom, which induces an operator, Ma(C)M_{a}(C), on the virtual degrees of freedom. Wa(C)W_{a}(C) is guaranteed to have a representation Ma(C)M_{a}(C) on the virtual level because Wa(C)W_{a}(C) is an operator supported on the ground-state physical space of local tensors, and as we noted in Lemma 1, such an operator can be mapped to an operator on the virtual level. Hence, just as Wa(C)W_{a}(C) is a symmetry on the physical level, Ma(C)M_{a}(C) should be a symmetry of the ground state tensor T0T^{0} on the virtual level. But, in fact, any stand-alone variation TT that is topologically trivial excitation would be symmetric under Ma(C)M_{a}(C) for all aa. A tensor variation that breaks this symmetry for some aa would imply the presence of a non-trivial excitation. So the space of stand-alone tensors TT that satisfy Ma(C)M_{a}(C) symmetries for all aa has to the space of topologically trivial excitations. This precisely is the source of MPO symmetries, and 𝕄\mathbb{M} is nothing but the projector onto the Ma(C)M_{a}(C) symmetric subspace for all aa. In fact this is why the MPO projector for both double-line (Eq. (39) and single-line (Eq. (38)) could be written in terms of loop operators on the virtual level. These loop operators are nothing but the Wilson loop operators on the virtual level.

Let’s illustrate the above discussion with the single-line TNR of toric code state. Let’s say the stand-alone tensor TT is surrounded by T0T^{0}. We apply an mm-particle Wilson-loop around this stand-alone tensor. This Wilson-loop applies ZZ operators on the physical legs of the surrounding T0T^{0} tensors. We have already seen that this operation can be brought down to the virtual level (Eq. (50) in the opposite direction),

(120)

Keeping in mind that T0T^{0} also satisfies the Z3Z^{\otimes 3} symmetry of Eq. (5), we see that the mm-particle Wilson-loop finally reduces to a Z3Z^{\otimes 3} operator on the stand-alone tensor TT. That is,

(121)

In first equality, we have used relation (120) and in second equality we have used the Z2Z^{2} symmetry of the single-line Tensor. So we find that the representation of mm-particle Wilson loop, Wm(C)W_{m}(C) on the stand-alone space is, Mm(C)=Z3M_{m}(C)=Z^{\otimes 3}. So we have shown that the presence of Z3Z^{\otimes 3} symmetry constraint inside the stand-alone space actually comes from the mm-particle Wilson loop.

Now a natural question arises: why isn’t there an analogous symmetry constraint on the tensor corresponding to an ee-string operator Wilson loop? Let’s apply the ee-particle Wilson-loop, which is a loop of XX operators on the single-line TNR, and then bring it down to the virual level. We find,

(122)

where we have used the fact that XX operators on the nearby virtual legs simply cancel each other. This was already noted in the discussion of zero-string operators and in Eq. (63). So we see that the ee-particle Wilson-loop poses no extra symmetry constraint on the stand-alone tensors.

Now let’s see if the MPO symmetry of double-line TNR also comes from a Wilson-loop. Double-line case is more interesting than the single-line case because, as we have already discussed, the double-line has a stand-alone space smaller than the full virtual space. We first look at the ee-particle Wilson-loop, which is a loop of XX operators on the physical level. We have already seen that this operation can be brought down to the virtual level (Eq. (52) in the opposite direction)

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{DLXPXV}. (123)

So we find

[Uncaptioned image],\displaystyle\includegraphics[scale={0.4}]{DLTCXWilson}, (124)

where in first equality we used Eq. 123 and in the second equality we simply used the relation

[Uncaptioned image].\displaystyle\includegraphics[scale={0.3}]{4X2X}. (125)

So we have shown that the MPO symmetry, X6X^{\otimes 6}, of double-line TNR is actually a representation of the ee-particle Wilson-loop on the stand-alone space. At this point, it is important to note that relation (125) holds only when TT is in the stand-alone space, so it has the Z2Z^{\otimes 2} symmetry. If TT was outside the stand-alone space, this would not be true. This is why we say that MPO symmetries, X6X^{\otimes 6} in this particular case, are representations of the Wilson-loops on the stand-alone space, not on the full virtual space.

Now we analyze the mm-particle Wilson-loop, which is a loop of ZZ operators. Eq. (66) tells us how to bring down the ZZ operators on double-line fixed point tensor, T0T^{0}. Using this and other obvious properties of T0T^{0} and TT, we find

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{DLZWilson}. (126)

The first equality follows from Eq. (66) and the fact that ZZ operators can be slid along contracted virtual legs. The last equality follows from the fact that TT is a stand-alone tensor, so it satisfies the Z2Z^{\otimes 2} symmetries by definition. Or, in other words, the representation of the Wilson-loop operator on the stand-alone space is Mm(C)=I3M_{m}(C)=I^{\otimes 3}. That is, it is represented trivially. So we see that all stand-alone tensors satisfy the mm-particle Wilson-loop symmetry. Hence this symmetry poses no extra constraint within stand-alone space, and that is why the MPO-injective subspace had only one Z2Z_{2} symmetry. In fact, this analysis has shown what we already knew from Eq. (64): mm-string operator is a zero-string operator of the double-line TNR.

At this point, we can notice the similarity between double-line mm-particle relation and single-line ee-particle relation. But there is a crucial difference. We(C)W_{e}(C) has trivial representation on all of the virtual space of single-line TNR, but Wm(C)W_{m}(C) has trivial representation only in a subspace of the virtual space of double-line TNR.

This analysis points toward a representation theoretic way of understanding tensor instabilities. T0:VPT^{0}:V\rightarrow P is a linear map from virtual vector space to the physical vector space. This map induces a representation of operators on the physical space in the virtual space. In particular, it induces the representation of Wilson-loop operators, Wa(C)Ma(C)W_{a}(C)\rightarrow M_{a}(C). Such a representation is always possibly as is guaranteed by the MPO-injectivity (lemma 1 ). In fact, this representation would be faithful on individual tensors. But there is no guarantee that it would be faithful on the whole tensor network, because Ma(C)M_{a}(C) can be a gauge-string operator, as we have already discussed for We(C)W_{e}(C) in single-line and Wm(C)W_{m}(C) in double-line. So the string-operator algebra is not faithfully represented on the virtual level. It is this unfaithful representation of anyonic algebra that causes tensor instability.

Appendix B A brief review of string-net models

String-net models, which are Hamiltonian realizations of Turaev-Viro TQFTs, are introduced by  Levin and Wen (2005) as RG fixed point models that describe topological order in 2+12+1 spacetime dimensions. Following are the defining data of the string-net states:
1- Local Hilbert space: String-nets are lattice spin models. Spins sit on the links of hexagonal lattice. Each spin ss can be in N+1N+1 state, s=0,1,2,,Ns=0,1,2,\ldots,N. s=js=j at a link can be understood as a string of ‘type jj’ present on the link. Strings are oriented and ii^{\star} denotes string type ii with the opposite orientation. If i=ii=i^{\star} the strings are called ‘unoriented’. We have assumed the strings to be unoriented in the present paper for the sake of simplicity, though our results can easily be generalized to the oriented case.
2- Branching rules: There are branching rules denoted by δijk\delta_{ijk}. δijk=1\delta_{ijk}=1 if string type i,j,ki,j,k are allowed to meet at a point, and δijk=0\delta_{ijk}=0 otherwise.
3- Quantum dimensions: For every string type ss, there is a value dsd_{s} associated to it, called its quantum dimensions. D=sds2D=\sum_{s}d_{s}^{2} is called the ‘total quantum dimension’.
4- String-net condensed state: If we assign a particular string to each link, it forms a string-net configuration on the lattice. A string-net condensed quantum state is a superposition of these different string-net configurations on the lattice. Let’s denote the string-net configurations with XX. So a string-net condensed state is,

|Ψ=XΦX|X,\displaystyle|\Psi\rangle=\sum_{X}\Phi_{X}|X\rangle, (127)

where ΦX\Phi_{X} is the amplitude with which a configuration XX appears in the description of the state. In general, ΦX\Phi_{X} can be complicated and states belonging to the same topological phase might have different wave functions. However, if we perform an RG process, then all states in the same phase would end at the same fixed point state, which is to say that they should look the same at large distances. ΦX\Phi_{X} can be described for this fixed point state. Though their absolute values are again complicated, we can give their relative values by describing local constraints on how amplitude ΦX\Phi_{X} changes as we deform a configuration XX locally. These deformations involve rebranching, removing bubbles, fusing two strings together, etc. These constraint equations are given in equation (4)-(7) of Levin and Wen (2005). The most significant of these local constraint is the so called ’FF’-move.
5- FF-symbols: A local constraint involving rebranching of 5 strings is the following:

(128)

FF-symbol is a six indexed object and it satisfies the following properties:

Fji0ijk\displaystyle F^{ijk}_{j^{\star}i^{\star}0} =\displaystyle= dkdidjδijk,\displaystyle\frac{\sqrt[]{d_{k}}}{\sqrt[]{d_{i}}\sqrt[]{d_{j}}}\delta_{ijk}, (129)
Fklnijm=Fjinlkm\displaystyle F^{ijm}_{kln}=F^{lkm^{\star}}_{jin} =\displaystyle= Flknjim=Fknlimjdmdndjdl.\displaystyle F^{jim}_{lkn^{\star}}=F^{imj}_{k^{\star}nl}\frac{\sqrt[]{d_{m}d_{n}}}{\sqrt[]{d_{j}d_{l}}}. (130)

Properties of the FF-symbol under index permutations can be best captured by defining a new object called GG-symbol by Gklmijk=FklmijkdkdmG^{ijk}_{klm}=\frac{F^{ijk}_{klm}}{\sqrt[]{d_{k}d_{m}}}. GG-symbol can be considered as a value associated to a tetrahedron and the six indices sit on the six edges of tetrahedron. Then it is invariant under all tetrahedron symmetries. It satisfies an important equation, the so-called ‘Pentagon Identity’:

fdfGa2a1fb1b2i12Ga3a2fb2b3i23Ga1a3fb3b1i31=Ga1a2a3i23i31i12Gb1b2b3i23i31i12.\displaystyle\sum_{f}d_{f}G^{b_{1}b_{2}i_{12}}_{a_{2}a_{1}f}G^{b_{2}b_{3}i_{23}}_{a_{3}a_{2}f}G^{b_{3}b_{1}i_{31}}_{a_{1}a_{3}f}=G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}G^{i_{23}i_{31}i_{12}}_{b_{1}b_{2}b_{3}}.
(131)

Finally we describe the exactly solvable Hamiltonian such that the RG fixed point state defined as above is one of the ground states,

H=vAvpBp,\displaystyle H=-\sum_{v}A_{v}-\sum_{p}B_{p}, (132)

where vv and pp denote the vertices and plaquette of the lattice. The vertex term is

Av\displaystyle A_{v} =\displaystyle= i,j,kδijk|ijkijk|.\displaystyle\sum_{i,j,k}\delta_{ijk}|ijk\rangle\langle ijk|. (133)

So, the vertex term simply projects configurations to only the ones that contain the allowed branchings. The plaquette term is more involved:

Bp=sdsDBps,\displaystyle B_{p}=\sum_{s}\frac{d_{s}}{D}B_{p}^{s}, (134)

where BpsB_{p}^{s} is an operator that creates an ss-type string that fuses with the strings on the plaquette. Two strings can be fused together by assuming a 0-string between them and then using FF-moves.

Finally putting all of it together, we see that the data (N,di,δijk,Fklmijk)(N,d_{i},\delta_{ijk},F^{ijk}_{klm}) describes a string-net model.

B.1 Algebraic Identities

Here we enlist multiple algebraic relations regarding string-net data that are used throughout the paper. For rotational convenience, cyclic products will be simply denoted by j=1n\prod_{j=1}^{n} with a cyclic j=n+1=1j=n+1=1. One of the most important identities is the ‘Pentagon Identity’,

fdfj=13(Gaj+1ajfbjbj+1ij,j+1)=Ga1a2a3i23i31i12Gb1b2b3i23i31i12.\displaystyle\sum_{f}d_{f}\prod_{j=1}^{3}(G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f})=G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}G^{i_{23}i_{31}i_{12}}_{b_{1}b_{2}b_{3}}. (I.1)

GG symbols also satisfy an ‘orthogonality identity’,

i12Ga2a1fb1b2i12Ga2a1fb1b2i12di12=1dfδf,fδa1a2fδb1b2f.\displaystyle\sum_{i_{12}}G^{b_{1}b_{2}i_{12}}_{a_{2}a_{1}f}G^{b_{1}b_{2}i_{12}}_{a_{2}a_{1}f^{\prime}}d_{i_{12}}=\frac{1}{d_{f}}\delta_{f,f^{\prime}}\delta_{a_{1}a_{2}f}\delta_{b_{1}b_{2}f}. (135)

GG-symbols are normalized as

Ga2a10b1b2i12=δa1,b1δa2,b2δa1b1i12(da1da2)12.\displaystyle G^{b_{1}b_{2}i_{12}}_{a_{2}a_{1}0}=\delta_{a_{1},b_{1}}\delta_{a_{2},b_{2}}\delta_{a_{1}b_{1}i_{12}}(d_{a_{1}}d_{a_{2}})^{-\frac{1}{2}}. (136)

Cyclic products of GG symbols satisfy the following equation:

{bj}j=1n(Gaj+1ajfbjbj+1ij,j+1Gbj+1bjfcjcj+1ij,j+1dbj)\displaystyle\sum_{\{b_{j}\}}\prod_{j=1}^{n}(G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}G^{c_{j}c_{j+1}i_{j,j+1}}_{b_{j+1}b_{j}f}d_{b_{j}})
=sδffsj=1n(Gaj+1ajscjcj+1ij,j+1).\displaystyle=\sum_{s}\delta_{ff^{\prime}s}\prod_{j=1}^{n}(G^{c_{j}c_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}s}). (137)

Plaquette operators BpfB^{f}_{p} correspondingly satisfy

BpfBpf=sδffsBps.\displaystyle B^{f}_{p}B^{f^{\prime}}_{p}=\sum_{s}\delta_{ff^{\prime}s}B^{s}_{p}. (138)

We know that if we contract an ff-type loop we get a factor of dfd_{f}. Combining this with the last two equation, we find that quantum dimensions satisfy the same identity:

dfdf=sδffsds,\displaystyle d_{f}d_{f^{\prime}}=\sum_{s}\delta_{ff^{\prime}s}d_{s}, (139)

where dfd_{f} are nothing but the eigenvalues of the plaquette operators BfB^{f} operators where the eigenstate is the string-net ground state.

Define matrix NkN^{k} as Na,bk=δk,a,bN^{k}_{a,b}=\delta_{k,a,b}. Since NkN^{k} matrices are real symmetric matrices, and commute with each other for different values of kk, they share a complete set of orthogonal eigenvectors.We write the qqth such simultaneous eigenvector of Nk,kN^{k},\,\forall k as

|sq=asq;a|a.\displaystyle|s_{q}\rangle=\sum_{a}s_{q;a}|a\rangle. (140)

Since quantum dimensions form one such eigenvector, we fix s0;a=das_{0;a}=d_{a}. The following equations follow

sq|sq\displaystyle\langle s_{q}|s_{q^{\prime}}\rangle \displaystyle\propto δq,q,\displaystyle\delta_{q,q^{\prime}}, (141)
sq|Nk|sq\displaystyle\langle s_{q}|N^{k}|s_{q^{\prime}}\rangle =\displaystyle= a,bsq;aδk,a,bsq;bδq,q.\displaystyle\sum_{a,b}s_{q;a}\delta_{k,a,b}s_{q^{\prime};b}\propto\delta_{q,q^{\prime}}. (142)

The branching tensor δijk\delta_{ijk} is part of a fusion category data. Under the additional assumptions of braiding defined on the fusion category and braiding being sufficiently non-trivial (modularity), the ss above are just the columns of SS matrix. But we don’t really need this for our results.

Appendix C Triple-line TNR of string-net states

We now briefly describe the derivation of triple-line TNR along the lines described in the original paper by Gu et al. (2009). It is important to understand this derivation as it gives us a way to apply string-operators on triple-line TNR.

String net RG fixed point ground state can be constructed by applying plaquette operator Bp=adaBpaB_{p}=\sum_{a}d_{a}B_{p}^{a} to the vacuum state |0|0\rangle. BpaB_{p}^{a} creates an aa-type string loop on the plaquette pp.

|Ψgs\displaystyle|\Psi_{\text{gs}}\rangle =\displaystyle= pBp|0=padaBpa|0\displaystyle\prod_{p}B_{p}|0\rangle=\prod_{p}\sum_{a}d_{a}B^{a}_{p}|0\rangle (143)
=\displaystyle= a1,a2,..da1da2..|a1,a2,,\displaystyle\sum_{a_{1},a_{2},..}d_{a_{1}}d_{a_{2}}..|a_{1},a_{2},...\rangle,

where

|a1,a2,=Bp1a1Bp2a2|0.\displaystyle|a_{1},a_{2},...\rangle=B_{p_{1}}^{a_{1}}B_{p_{2}}^{a_{2}}\ldots|0\rangle. (144)

|a1,a2,|a_{1},a_{2},...\rangle is a string configuration on the ‘fattened lattice’. We will refer to da1da2..|a1,a2,d_{a_{1}}d_{a_{2}}..|a_{1},a_{2},...\rangle as the ‘loop state’. See Fig. 16.

Refer to caption
Figure 16: A loop state on the fat lattice. Fat lattice means strings are allowed to move away from the edges, as long as they dont cross the center of the plauqettes.

We need to fuse these loops together to get the physical state. We then fuse these strings together to get the final physical state,

|a1,a2,=i12,i23Φa1a2a3..i12i23..|i12,i23,...\displaystyle|a_{1},a_{2},...\rangle=\sum_{i_{12},i_{23}...}\Phi^{i_{12}i_{23}..}_{a_{1}a_{2}a_{3}..}|i_{12},i_{23},..\rangle. (145)

There are essentially 3 steps leading up to the expression of the triple-line TNR. We mention them here explicitly as we will need to refer back to them for other calculations.

Step 1: We start with the ‘loop state’ on the fattened lattice. jjth plaquette has a loop in state aja_{j}. The ground state is

|Ψ0=a1,a2,..da1da2..|a1,a2,...\displaystyle|\Psi_{0}\rangle=\sum_{a_{1},a_{2},..}d_{a_{1}}d_{a_{2}}..|a_{1},a_{2},..\rangle. (146)

So every plaquette contributes a factor of dajd_{a_{j}}. We distribute it uniformly among the 6 vertices, so each vertex gets a factor of daj1/6d_{a_{j}}^{1/6} from each vertex.

Step 2: We fuse all loops with nearby loops producing a string on the links:

(147)

We assume a 0-string between them and perform an FF-move. It produces a factor of ij,kdij,kdajdak\sum_{i_{j,k}}\sqrt{\frac{d_{i_{j,k}}}{d_{a_{j}}d_{a_{k}}}} on each link between plaquette jj and kk. A link is shared between two vertices, so each vertex gets a factor of dij,kdajdak4\sqrt[4]{\frac{d_{i_{j,k}}}{d_{a_{j}}d_{a_{k}}}}.

Step 3: After the previous step, we are left with a ‘bubble’ on the vertex. Now we remove it,

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{step3}. (148)

Removing it produces a factor of dajdakdalGajakalikliljijk\sqrt[]{d_{a_{j}}d_{a_{k}}d_{a_{l}}}G^{i_{kl}i_{lj}i_{jk}}_{a_{j}a_{k}a_{l}}.

Putting the 3 steps together, we get

(T0)slsjskijkiklilj=dijkdikldilj4Gajakalijkikliljdajdakdal6.\displaystyle(T^{0})^{i_{jk}i_{kl}i_{lj}}_{s_{l}s_{j}s_{k}}=\sqrt[4]{d_{i_{jk}}d_{i_{kl}}d_{i_{lj}}}G^{i_{jk}i_{kl}i_{lj}}_{a_{j}a_{k}a_{l}}\sqrt[6]{d_{a_{j}}d_{a_{k}}d_{a_{l}}}. (149)

A general triple-line Tensor is represented diagrammatically as:

[Uncaptioned image].\includegraphics[scale={0.4}]{tripleline}. (150)

For the specific RG fixed point tensor we have aj=aj,ij,j+1=ij,j+1,ja^{\prime}_{j}=a_{j},i^{\prime}_{j,j+1}=i_{j,j+1},\,\forall j. So it would be represented diagrammatically as:

[Uncaptioned image].\includegraphics[scale={0.4}]{triplelineT0}. (151)

Appendix D Proof of theorem 1

To calculate the stand-alone space, we need to know how to contract double-tensors on a large region. First we need to define the concept of boundary operators that show up in double-tensor contraction.

D.1 Boundary operators

It is more convenient to work with the dual lattice of honeycomb lattice. The dual lattice of honeycomb lattice is the triangular lattice. We label the vertices with an integer j=1,2,..j=1,2,... The edges are labeled by the two vertices on its ends, (j1,j2)(j_{1},j_{2}). The triple line tensor is represented as a triangle,

[Uncaptioned image]=[Uncaptioned image].\displaystyle\raisebox{-0.5pt}{\includegraphics[width=86.72267pt]{triplelineT0}}=\raisebox{-0.5pt}{\includegraphics[width=86.72267pt]{Tdual}}. (152)

The inner indices a1,a2,..a_{1},a_{2},.. sit on the vertices of the triangles, and the physical legs and the middle legs on the edges. We denote the inner index sitting on vertex jj as aja_{j}, and the physical and middle legs sitting on the edge are denoted as ij1,j2i_{j_{1},j_{2}}. With this construction, the tensor component can be written as

(T0)a1a2a3i23i31i12=j=13(dij,j+114daj16)Ga1a2a3i23i31i12.\displaystyle(T^{0})^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}=\prod_{j=1}^{3}\left(d_{i_{j,j+1}}^{\frac{1}{4}}d_{a_{j}}^{\frac{1}{6}}\right)G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}. (153)

A double tensor of a tensor TT is defined as 𝕋=ITI(T)I\mathbb{T}=\sum_{I}T^{I}(T^{*})^{I} and is denoted by 𝕋\mathbb{T}. II denotes the set of physical indices. So we get the double tensor of a tensor by contracting the physical indices between TT and its complex conjugate, TT^{\dagger}. Since the tensor TT is represented by a triangle, the double tensor 𝕋\mathbb{T} can be represented by a double layer triangle.

The edge labels are the same bottom to top, only the labels of the vertices change. We label the upper vertices as b1,b2,..b_{1},b_{2},... With this a double tensor can be written as

𝕋0\displaystyle\mathbb{T}^{0} =\displaystyle= j=1n(dij,j+112(dajdbj)16)Ga1a2a3i23i31i12Gb1b2b3i23i31i12.\displaystyle\prod_{j=1}^{n}\left(d_{i_{j,j+1}}^{\frac{1}{2}}(d_{a_{j}}d_{b_{j}})^{\frac{1}{6}}\right)G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}G^{i_{23}i_{31}i_{12}}_{b_{1}b_{2}b_{3}}. (154)

Using the pentagon equation Ga1a2a3i23i31i12Gb1b2b3i23i31i12=fdfj=13(Gaj+1ajfbjbj+1ij,j+1)G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}G^{i_{23}i_{31}i_{12}}_{b_{1}b_{2}b_{3}}=\sum_{f}d_{f}\prod_{j=1}^{3}(G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}) we get

𝕋0\displaystyle\mathbb{T}^{0} =\displaystyle= fdfBf\displaystyle\sum_{f}d_{f}B_{f} (155)
Bf\displaystyle B_{f} =\displaystyle= j=13(dij,j+112(dajdbj)16,Gaj+1ajfbjbj+1ij,j+1).\displaystyle\prod_{j=1}^{3}\left(d_{i_{j,j+1}}^{\frac{1}{2}}(d_{a_{j}}d_{b_{j}})^{\frac{1}{6}},G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}\right). (156)

BfB_{f} can be represented as the boundary of double-layer triangle,

𝕋0\displaystyle\mathbb{T}^{0} =\displaystyle= fdf[Uncaptioned image]\displaystyle\sum_{f}d_{f}\raisebox{-0.5pt}{\includegraphics[scale={0.5}]{doubleTdual}} (157)

It is useful to decompose BfB_{f} into terms that sit on the edge of the triangle and terms that sit on the vertices,

Bf\displaystyle B_{f} =\displaystyle= j=13(dij,j+112Gaj+1ajfbjbj+1ij,j+1)j=13((dajdbj)16).\displaystyle\prod_{j=1}^{3}\left(d_{i_{j,j+1}}^{\frac{1}{2}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}\right)\prod_{j=1}^{3}\left((d_{a_{j}}d_{b_{j}})^{\frac{1}{6}}\right). (158)

The first cyclic product on the RHS sits on the edges while the second term sits on the vertices. So we see that the double tensor on a triangle is (we will denote triangle as Δ\Delta)

𝕋0(Δ)\displaystyle\mathbb{T}^{0}(\Delta) =\displaystyle= fdfBf(Δ).\displaystyle\sum_{f}d_{f}B_{f}(\partial\Delta). (159)

The tensor resulting from contracting tensors 𝕋\mathbb{T} on a region RR will be denoted as 𝕋(R)\mathbb{T}(R). We call BfB_{f}, the ff-type boundary operator. It lives on the boundary R\partial R of a region RR,

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{BfRfig}. (160)

See Fig. 160. Let’s say the vertices on the boundary of a region RR on the triangluar lattice are labeled as j=1,2,..,n.j=1,2,..,n.. We associate with each vertex a factor of (ajbj)mj6(a_{j}b_{j})^{\frac{m_{j}}{6}}. mjm_{j} denotes the number of the triangles inside RR meeting at vertex jj. It can simply be written as mj=θj/(2π/6)m_{j}=\theta_{j}/(2\pi/6), where θj\theta_{j} is the angle the loop makes on vertex jj. Finally, on every edge (j,j+1)(j,j+1) we associate an operator dij,j+112Gaj+1ajfbjbj+1ij,j+1d_{i_{j,j+1}}^{\frac{1}{2}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}. With this construction, Bf(R)B_{f}(\partial R) can be written as,

Bf(R)=j=1n(dij,j+112Gaj+1ajfbjbj+1ij,j+1)j=1n((dajdbj)mj6).\displaystyle B_{f}(\partial R)=\prod_{j=1}^{n}\left(d_{i_{j,j+1}}^{\frac{1}{2}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}\right)\prod_{j=1}^{n}\left((d_{a_{j}}d_{b_{j}})^{\frac{m_{j}}{6}}\right). (161)

Now we are ready to contract tensors on individual triangles with each other in order to find the double tensor on a region RR.

D.2 Double-tensor/Virtual density matrix on a general region RR

We present the result in a lemma.

Lemma 2.

We find that the double tensor 𝕋0(R)\mathbb{T}^{0}(R) satisfies the general version of Eq. (159):

𝕋0(R)=DVfdfχRBf(R),\displaystyle\mathbb{T}^{0}(R)=D^{V}\sum_{f}d_{f}^{\chi_{R}}B_{f}(\partial R), (162)

where χR=VE+F\chi_{R}=V-E+F is the Euler characteristic of region RR. VV,EE, and FF are the number of vertices, edges, and faces that are completely inside the region RR (that is, they are inside the region where tensors have been contracted).

Proof.

There is a simple proof of this result. We have to contract 𝕋0\mathbb{T}^{0} on each triangle with each other on the common edges and vertices to get 𝕋0(R)\mathbb{T}^{0}(R),

𝕋0(R)\displaystyle\mathbb{T}^{0}(R) =\displaystyle= tTr(𝕋0(Δ1)𝕋0(Δ2))\displaystyle\textrm{tTr}\left(\mathbb{T}^{0}(\Delta_{1})\mathbb{T}^{0}(\Delta_{2})\ldots\right) (163)
=\displaystyle= f1,f2,(df1df2)Bf1(Δ1)Bf2(Δ2).\displaystyle\sum_{f_{1},f_{2},\ldots}(d_{f_{1}}d_{f_{2}}\ldots)B_{f_{1}}(\partial\Delta_{1})B_{f_{2}}(\partial\Delta_{2})\ldots.

where, as defined before, tTr denotes the operation of contracting a set of tensors along shared indices. So we basically have to see how Bf1B_{f_{1}} contracts with Bf2B_{f_{2}}. They can be contracted in two steps. First we contract all the edges, and then we contract all the vertices, and we will be left with terms sitting only on the boundary of the region. Using the orthogonality identity, Eq. (135), edge contraction on the edge (j,j+1)(j,j+1) between BfB_{f} and BfB_{f^{\prime}} gives

Ev(BfBf)\displaystyle Ev(B_{f}B_{f^{\prime}}) \displaystyle\propto ij,j+1dij,j+112Gaj+1ajfbjbj+1ij,j+1dij,j+112Gaj+1ajfbjbj+1ij,j+1\displaystyle\sum_{i_{j,j+1}}d_{i_{j,j+1}}^{\frac{1}{2}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}d_{i_{j,j+1}}^{\frac{1}{2}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f^{\prime}} (164)
=\displaystyle= 1dfδf,fδajaj+1fδbjbj+1f.\displaystyle\frac{1}{d_{f}}\delta_{f,f^{\prime}}\delta_{a_{j}a_{j+1}f}\delta_{b_{j}b_{j+1}f}.

The factor δf,f\delta_{f,f^{\prime}} implies that BfB_{f} only contracts with BfB_{f}. So the expression in Eq. (163) is only non-zero for f1=f2=ff_{1}=f_{2}=...f. So we have

𝕋0(R)=fdfFBf(Δ1)Bf(Δ2),\displaystyle\mathbb{T}^{0}(R)=\sum_{f}d_{f}^{F}B_{f}(\partial\Delta_{1})B_{f}(\partial\Delta_{2})\ldots, (165)

where FF is the number of faces in region RR. Then there are factors of δajaj+1fδbjbj+1f\delta_{a_{j}a_{j+1}f}\delta_{b_{j}b_{j+1}f} in Eq. (164) that will be used in the second step of vertex contraction. Finally note a factor of df1d_{f}^{-1} that comes out of every edge contraction. So when we are done with all the edges, we will have an overall factor of dfEd_{f}^{-E}, where EE is the number of edges.

Now we do tensor contraction on each vertex. Note that each of the six triangles around a vertex jj contribute a factor of (dajdbj)16(d_{a_{j}}d_{b_{j}})^{\frac{1}{6}}, so we have a total factor dajdbjd_{a_{j}}d_{b_{j}} on each vertex. We multiply this with the factor δajbjf\delta_{a_{j}b_{j}f} that came out of edge contraction. So, finally we have the vertex contraction using identity (139),

aj,bjdajdbjδajbjf=ajdfdajdaj=Ddf.\displaystyle\sum_{a_{j},b_{j}}d_{a_{j}}d_{b_{j}}\delta_{a_{j}b_{j}f}=\sum_{a_{j}}d_{f}d_{a_{j}}d_{a_{j}}=Dd_{f}. (166)

So we see that contraction of 6 tensors on each vertex simply produces a factor of DdfDd_{f} for every ff-type boundary operator. When we are done with all the vertex contractions, we will have an overall (Ddf)V=DVdfV(Dd_{f})^{V}=D^{V}d_{f}^{V} factor. Putting all the factors together, we get

𝕋0(R)\displaystyle\mathbb{T}^{0}(R) =\displaystyle= fdfFdfE(Ddf)VBf(R)\displaystyle\sum_{f}d_{f}^{F}d_{f}^{-E}(Dd_{f})^{V}B_{f}(\partial R) (167)
=\displaystyle= DVfdfχRBf.\displaystyle D^{V}\sum_{f}d_{f}^{\chi_{R}}B_{f}.

This completes the proof.

To calculate the stand-alone space, we need to know how these boundary operators behave on a large region. We present the result of this calculation in the following important lemma: ∎

Lemma 3.
lim|R|Tr(Bf0(R))Tr(B0(R))=0\displaystyle\lim_{|\partial R|\rightarrow\infty}\frac{\textrm{Tr}(B_{f\neq 0}(\partial R))}{\textrm{Tr}(B_{0}(\partial R))}=0 (168)
Proof.

To prove this, we would calculate StopoS_{\text{topo}} on a sphere using the virtual-density method laid out in II.2 in the previous chapter, and compare it to the known result, Stopo=logDS_{\textrm{topo}}=\log D. We divide the sphere in symmetric two halves, let’s say RR and LL, and calculate 𝕋(R)\mathbb{T}(R). We assume the state has the appropriate symmetry such that σLT=σR=σb=𝕋(R)\sigma_{L}^{T}=\sigma_{R}=\sigma_{b}=\mathbb{T}(R). Using the result by Cirac et al. (2011), we know that the physical density matrix ρR\rho_{R} has the same spectrum as σb2\sigma_{b}^{2}, that is, ρRσb2\rho_{R}\propto\sigma_{b}^{2}. Let’s say ρR=Nσb2\rho_{R}=N\sigma_{b}^{2}, where NN is the normalization factor. We first calculate NN. To do that, we first need to calculate the algebra and the trace of BfB_{f}.
Let’s put the string-net tensor network state on a sphere. Consider the left hemisphere, denoted as LL, and right hemisphere, denoted as RR. Let’s denote the indices of the vertices on the boundary R\partial R as j=1,2,,nj=1,2,\ldots,n. Then BfB_{f} on this boundary is given by,

Bf(R)=j=1n(dij,j+112(dajdbj)mj6Gaj+1ajfbjbj+1ij,j+1).\displaystyle B_{f}(\partial R)=\prod_{j=1}^{n}\left(d_{i_{j,j+1}}^{\frac{1}{2}}(d_{a_{j}}d_{b_{j}})^{\frac{m_{j}}{6}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}\right). (169)

Since RR divides the region in to exact two halves, we assume that the boundary R\partial R divides the boundary plaquette in to exact two halves, setting mj=3,jm_{j}=3,\,\forall j. So we get,

Bf(R)\displaystyle B_{f}(\partial R) =\displaystyle= j=1n(dij,j+112(dajdbj)12Gaj+1ajfbjbj+1ij,j+1).\displaystyle\prod_{j=1}^{n}\left(d_{i_{j,j+1}}^{\frac{1}{2}}(d_{a_{j}}d_{b_{j}})^{\frac{1}{2}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}\right). (170)

Note that, using relation (136)

B0(R)\displaystyle B_{0}(\partial R) =\displaystyle= j=1n(dij,j+112(dajdbj)12Gaj+1aj0bjbj+1ij,j+1)\displaystyle\prod_{j=1}^{n}\left(d_{i_{j,j+1}}^{\frac{1}{2}}(d_{a_{j}}d_{b_{j}})^{\frac{1}{2}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}0}\right) (171)
=\displaystyle= j=1n(dij,j+112)δajbj+1ij,j+1.\displaystyle\prod_{j=1}^{n}(d_{i_{j,j+1}}^{\frac{1}{2}})\delta_{a_{j}b_{j+1}i_{j,j+1}}. (172)

Now, using identity (137) the algebra of BfB_{f} operators is,

BfBf\displaystyle B_{f}B_{f^{\prime}} =\displaystyle= sδffsBs×j=1n(dij,j+112)\displaystyle\sum_{s}\delta_{ff^{\prime}s}B_{s}\times\prod_{j=1}^{n}(d_{i_{j,j+1}}^{\frac{1}{2}}) (173)
=\displaystyle= sδffsBsB0.\displaystyle\sum_{s}\delta_{ff^{\prime}s}B_{s}B_{0}. (174)

We also know how to contract BfB_{f} with each other through the calculations done previously in the privious subsection. We learned that BfB_{f} only contracts with itself, and it gives a factor of df1d_{f}^{-1} for every edge and a factor of DdfDd_{f} for every vertex. On a loop the number of vertices is equal to number of edges. So we get,

Tr(BfBf)=δf,fDn.\displaystyle\textrm{Tr}(B_{f}B_{f^{\prime}})=\delta_{f,f^{\prime}}D^{n}. (175)

If calculate Tr(Bf)\text{Tr}(B_{f}), we find

Tr(Bf)\displaystyle\text{Tr}(B_{f}) =\displaystyle= {ajij,j+1}j=1n(dij,j+112(dajdaj)12Gaj+1ajfajaj+1ij,j+1)\displaystyle\sum_{\{a_{j}i_{j,j+1}\}}\prod_{j=1}^{n}\left(d_{i_{j,j+1}}^{\frac{1}{2}}(d_{a_{j}}d_{a_{j}})^{\frac{1}{2}}G^{a_{j}a_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}\right) (176)
=\displaystyle= Tr(Afn),\displaystyle\text{Tr}(A_{f}^{n}),

where AfA_{f} is a matrix whose components Af(a,b)A_{f}(a,b) are Af(a,b)=iGbafabi(dadb)12di12A_{f}(a,b)=\sum_{i}G^{abi}_{baf}(d_{a}d_{b})^{\frac{1}{2}}d_{i}^{\frac{1}{2}}. If AfnA_{f}^{n} has a non-degenerate highest eigen-value λf\lambda_{f}, for large nn, Tr(Afn)λfn\text{Tr}(A_{f}^{n})\approx\lambda_{f}^{n}. Note that Perron-Frobenius theorem makes sure that λ0\lambda_{0}, highest eigen-value of A0A_{0}, will be non-degenerate. So we have

limnTr(B0)=λ0n.\displaystyle\lim_{n\rightarrow\infty}\textrm{Tr}(B_{0})=\lambda_{0}^{n}. (177)

For abelian models, Tr(Bf0=0\text{Tr}(B_{f\neq 0}=0 since Gbafabi=0,f0G^{abi}_{baf}=0,f\neq 0. For the double-Fibonacci model to be discussed in VIII, a simple calculation shows λ0=1+γ3/2\lambda_{0}=1+\gamma^{3/2} and λ1=1γ12\lambda_{1}=1-\gamma^{-\frac{1}{2}}, where γ=d1=1+52\gamma=d_{1}=\frac{1+\sqrt{5}}{2} is the quantum dimension of the string. Because λ1<1\lambda_{1}<1, for large nn Tr(B1)Tr(A1n)0\text{Tr}(B_{1})\approx\text{Tr}(A_{1}^{n})\approx 0.

On a hemisphere, χR=1\chi_{R}=1, so from lemma 2 we have σb=fdfBf\sigma_{b}=\sum_{f}d_{f}B_{f} and ρR=Nσb2\rho_{R}=N\sigma_{b}^{2} where NN is a normalization factor. First we calculate the normalization factor NN,

Tr(σb2)\displaystyle\text{Tr}(\sigma_{b}^{2}) =\displaystyle= Tr(fdfBf)2\displaystyle\text{Tr}(\sum_{f}d_{f}B_{f})^{2} (178)
=\displaystyle= f,fdfdfTr(BfBf)\displaystyle\sum_{f,f^{\prime}}d_{f}d_{f^{\prime}}\text{Tr}(B_{f}B_{f^{\prime}})
=\displaystyle= f,fdfdfδf,fDn\displaystyle\sum_{f,f^{\prime}}d_{f}d_{f^{\prime}}\delta_{f,f^{\prime}}D^{n}
=\displaystyle= Dn(fdf2).\displaystyle D^{n}(\sum_{f}d_{f}^{2}).

Now, calculating Renyi entropy with renyi index α=1/2\alpha=1/2, we get

S1/2(ρR)\displaystyle S_{1/2}(\rho_{R}) =\displaystyle= 111/2logTr(ρR12)\displaystyle\frac{1}{1-1/2}\log\text{Tr}(\rho_{R}^{\frac{1}{2}}) (179)
=\displaystyle= 2logTr(fdfBf)Dnfdf2\displaystyle 2\log\frac{\text{Tr}(\sum_{f}d_{f}B_{f})}{\sqrt{D^{n}\sum_{f}d_{f}^{2}}}
=\displaystyle= nlogD2logf(dfTrBf)logfdf2\displaystyle-n\log D-2\log\sum_{f}(d_{f}\textrm{Tr}B_{f})-\log\sum_{f}d_{f}^{2}
=\displaystyle= nlogD2nlogλ02log(1+f>0TrBfλ0n)\displaystyle-n\log D-2n\log\lambda_{0}-2\log\left(1+\sum_{f>0}\frac{\textrm{Tr}B_{f}}{\lambda_{0}^{n}}\right)
logfdf2.\displaystyle-\log\sum_{f}d_{f}^{2}.

We know that for a string-net model topological entanglement entropy is logfdf2\log\sum_{f}d_{f}^{2}, which implies limnTrBfλ0n=0,f>0\lim_{n\rightarrow\infty}\frac{\textrm{Tr}B_{f}}{\lambda_{0}^{n}}=0,\,\forall f>0. This completes the proof. ∎

D.3 String-net stand-alone subspace

Now we combine lemma 2 and lemma 3 to prove theorem 1. That is, to prove that the stand alone space is given by The stand alone space of the triple-line string net TNR is given by

M0=δa1,a2,i12δa2,a3,i23δa3,a1,i31.\displaystyle M_{0}=\delta_{a_{1},a_{2},i_{12}}\delta_{a_{2},a_{3},i_{23}}\delta_{a_{3},a_{1},i_{31}}. (180)
Proof.

Now we are ready to calculate the stand-alone space. Consider the same tensor network but on a very large disc with one triangle removed from the origin. We will denote this space as DΔD-\Delta. This has two disconnected boundaries, one on the outer edge, one on the inner one. χR=0\chi_{R}=0 for this region, so using lemma 2

𝕋(DΔ)\displaystyle\mathbb{T}(D-\Delta) =\displaystyle= fBf((DΔ))\displaystyle\sum_{f}B_{f}(\partial(D-\Delta)) (181)
=\displaystyle= fBf(Δ)Bf(D)\displaystyle\sum_{f}B_{f}(\partial\Delta)\otimes B_{f}(\partial D) (182)

To get the stand-alone space, we simply trace out the inner indices on the outer edge. But according to lemma 3, only Tr(B0Tr(B_{0} contribute in the large disc limit. So we simply get (up to an overall normalization factor which we ignore) B0B_{0} on the triangle,

lim|D|𝕋D(DΔ)\displaystyle\lim_{|D|\rightarrow\infty}\mathbb{T}_{D}(D-\Delta) =\displaystyle= lim|D|fBf(Δ)Tr(Bf(D))\displaystyle\lim_{|D|\rightarrow\infty}\sum_{f}B_{f}(\partial\Delta)\otimes Tr(B_{f}(\partial D)) (183)
=\displaystyle= B0(Δ)λ0n.\displaystyle B_{0}(\partial\Delta)\lambda_{0}^{n}. (184)

But using (171) we get

B0(Δ)=(di12di23di31)12δa1,a2,i12δa2,a3,i23δa3,a1,i31.\displaystyle B_{0}(\partial\Delta)=(d_{i_{12}}d_{i_{23}}d_{i_{31}})^{\frac{1}{2}}\delta_{a_{1},a_{2},i_{12}}\delta_{a_{2},a_{3},i_{23}}\delta_{a_{3},a_{1},i_{31}}. (185)

Stand-alone projector, M0M_{0}, is simply the projector onto the support space of B0B_{0}, which is clearly deltaa1,a2,i12δa2,a3,i23δa3,a1,i31delta_{a_{1},a_{2},i_{12}}\delta_{a_{2},a_{3},i_{23}}\delta_{a_{3},a_{1},i_{31}}. So we have proved that M0M_{0} for triple-line TNR of general string-net is,

M0=δa1,a2,i12δa2,a3,i23δa3,a1,i31.\displaystyle M_{0}=\delta_{a_{1},a_{2},i_{12}}\delta_{a_{2},a_{3},i_{23}}\delta_{a_{3},a_{1},i_{31}}. (186)

This completes the proof. ∎

This is the projector on to the stand-alone space of triple-line TNR of general string-net models. For notational convenience we will denote these basis vectors as |{k=13δbk,bk+1,ik,k+1}|\{\prod_{k=1}^{3}\delta_{b_{k},b_{k+1},i_{k,k+1}}\}\rangle, that is,

|{k=13δbk,bk+1,ik,k+1}\displaystyle|\{\prod_{k=1}^{3}\delta_{b_{k},b_{k+1},i_{k,k+1}}\}\rangle =\displaystyle= δb1,b2,i12δb2,b3,i23δb3,b1,i31\displaystyle\delta_{b_{1},b_{2},i_{12}}\delta_{b_{2},b_{3},i_{23}}\delta_{b_{3},b_{1},i_{31}} (187)
|b1,b2,b3;i12,i23,i31\displaystyle|b_{1},b_{2},b_{3};i_{12},i_{23},i_{31}\rangle
|{k=13δbk,bk+1,ik,k+1}=[Uncaptioned image].\displaystyle\centering|\{\prod_{k=1}^{3}\delta_{b_{k},b_{k+1},i_{k,k+1}\rangle\}}=\raisebox{-42.67912pt}{\includegraphics[scale={0.4}]{TLSABasis}}\@add@centering. (188)

So we get,

dim(M0)=b1,b2,b3;i12,i23,i31δb1,b2,i12δb2,b3,i23δb3,b1,i31.\displaystyle dim(M_{0})=\sum_{\begin{subarray}{c}b_{1},b_{2},b_{3};i_{12},i_{23},i_{31}\end{subarray}}\delta_{b_{1},b_{2},i_{12}}\delta_{b_{2},b_{3},i_{23}}\delta_{b_{3},b_{1},i_{31}}.

D.4 String-net MPO symmetries from Wilson-loop operators

In last chapter, we showed how MPO symmetries or the MPO-injective subspace come from representation of anyonic Wilson-loops of the model on the stand-alone space. It is instructive to do the same with general string-net models.

When an ff-type simple string operator passes through the tensor T0T^{0} on the physical level, it induces an operation on the virtual level in the way shown in Fig. 190.

That is, it simply becomes a ff-type string which is then fused with the plaquette legs. We consider the Wilson loop that encircles the 3 plaquettes of the tensor. This Wilson loop creates an ff-type string that then fuses with the 3 plaquette loops. Remember that we need to calculate the representation of this operator on the stand-alone space. That is, we need to calculate the matrix elements {δak,ak+1,ik,k+1|Wf|{δbk,bk+1,ik,k+1}\langle\{\delta_{a_{k},a_{k+1},i_{k,k+1}}|W_{f}|\{\delta_{b_{k},b_{k+1},i_{k,k+1}}\}\rangle. So we imagine a tensor network in which the tensor in the stand-alone basis is surrounded by T0T^{0}. We now apply the Wilson loop encircling 3 plaquettes and calculate induced operator on the stand-alone basis. It can be done in a convenient way using string-net diagrams in Eq. (188).

There are essentially 3 steps:

Step 1: Since the surrounding tensors are the fixed point tensor T0T^{0}, the Wilson loop on the physical level simply becomes an ff-type string that fuses with the plaquette legs,

(190)

Since these plaquette legs are contracted with the plaquette legs of the stand-alone tensor, it is equivalent to fusing ff-string loop with the 3 plaquette legs of the stand-alone tensor,

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{snstep1}. (191)

Step 2: We fuse these strings with the three nearby strings a1,a2,a3a_{1},a_{2},a_{3},

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{snstep2}. (192)

Let’s say they fuse to make strings b1,b2,b3b_{1},b_{2},b_{3}. We gain factors Ff,f,bjaj,aj,0=dbjdfdaj,j=1,2,3F^{a_{j},a_{j},0}_{f,f,b_{j}}=\frac{\sqrt{d_{b_{j}}}}{\sqrt{d_{f}d_{a_{j}}}},\,j=1,2,3 for each fusion.

Step 3: In the last step we remove the three bubbles created in the previous step,

[Uncaptioned image].\displaystyle\includegraphics[scale={0.4}]{snstep3}. (193)

Each bubble removal produces a factor of dfdajdaj+1Gaj+1ajfbjbj+1ij,j+1,j=1,2,3\sqrt{d_{f}d_{a_{j}}d_{a_{j+1}}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f},\,j=1,2,3.

Collecting the factors from step 2 and step 3, we get

{k=13δbk,bk+1,ik,k+1|Wf|{k=13δak,ak+1,ik,k+1}\displaystyle\langle\{\prod_{k=1}^{3}\delta_{b_{k},b_{k+1},i_{k,k+1}}|W_{f}|\{\prod_{k=1}^{3}\delta_{a_{k},a_{k+1},i_{k,k+1}}\}\rangle
=j=13dbj12daj12Gaj+1ajfbjbj+1ij,j+1.\displaystyle=\prod_{j=1}^{3}d^{\frac{1}{2}}_{b_{j}}d^{\frac{1}{2}}_{a_{j}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}. (194)

This is the expression for Mf=M0WfM0M_{f}=M_{0}W_{f}M_{0}. Now considering the projector 𝕄=fdfDMf\mathbb{M}=\sum_{f}\frac{d_{f}}{D}M_{f}, we get

𝕄\displaystyle\mathbb{M} =\displaystyle= fdfDj=13dbj12daj12Gaj+1ajfbjbj+1ij,j+1\displaystyle\sum_{f}\frac{d_{f}}{D}\prod_{j=1}^{3}d^{\frac{1}{2}}_{b_{j}}d^{\frac{1}{2}}_{a_{j}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f} (195)
=\displaystyle= 1Ddbj16daj16Ga1a2a3i23i31i12Gb1b2b3i23i31i12.\displaystyle\frac{1}{D}d^{\frac{1}{6}}_{b_{j}}d^{\frac{1}{6}}_{a_{j}}G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}G^{i_{23}i_{31}i_{12}}_{b_{1}b_{2}b_{3}}.

It should be understood as an operator written in its components in the basis |{ak;ik,k+1}{bk;ik,k+1}||\{a_{k};i_{k,k+1}\}\rangle\langle\{b_{k};i_{k,k+1}\}|. We used pentagon identity in the second step. We can see that it projects on to the space with Ga1a2a3i23i31i120G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}\neq 0, that is δi23,i31,i120\delta_{i_{23},i_{31},i_{12}}\neq 0.

There is a small technical issue though. The factor dbj12daj12d^{\frac{1}{2}}_{b_{j}}d^{\frac{1}{2}}_{a_{j}} does not exactly match the factors in the TTTT^{\dagger} support space given in Eq. (92)). It is simply because we did not keep track of exactly how to distribute factors that share a plaquette while applying the Wilson loop. In fact, the Wilson loop around a single vertex is somewhat ill-defined. But we are only trying to get a symmetry condition on the individual tensors which makes sure that Wilson loop on a larger region is a symmetry of the state. We can show that this factor has to be exactly dbj16daj16d^{\frac{1}{6}}_{b_{j}}d^{\frac{1}{6}}_{a_{j}} if the Wilson loop is to be a symmetry of the state. The reason is simply, as concluded in the original string-net paper, a Wilson loop commutes with the plaquette term Bp=sasBpsB_{p}=\sum_{s}a_{s}B_{p}^{s} only when as=dsa_{s}=d_{s}. In tensor network language, it translates to the fact that every tensor must contribute a factor of ds16d_{s}^{\frac{1}{6}} for the Wilson loop to be a symmetry. Also we know that an ff-type Wilson loop applied to the ground state produces a factor of dfd_{f}. Combining all these we can write the exact Wilson loop operator on a single tensor as:

Mf\displaystyle M_{f} =\displaystyle= j=13daj(dbjdaj1)16Gaj+1ajfbjbj+1ij,j+1\displaystyle\prod_{j=1}^{3}d_{a_{j}}(d_{b_{j}}d^{-1}_{a_{j}})^{\frac{1}{6}}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f} (196)
𝕄\displaystyle\Rightarrow\mathbb{M} =\displaystyle= 1Ddaj(dbjdaj1)16Ga1a2a3i23i31i12Gb1b2b3i23i31i12.\displaystyle\frac{1}{D}d_{a_{j}}(d_{b_{j}}d^{-1}_{a_{j}})^{\frac{1}{6}}G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}}G^{i_{23}i_{31}i_{12}}_{b_{1}b_{2}b_{3}}. (197)

The fixed point triple-line tensor satisfies

MfT0\displaystyle M_{f}T^{0} =\displaystyle= dfT0,\displaystyle d_{f}T^{0}, (198)
𝕄T0\displaystyle\mathbb{M}T^{0} =\displaystyle= T0.\displaystyle T^{0}. (199)

One can check that 𝕄=fdfDMf\mathbb{M}=\sum_{f}\frac{d_{f}}{D}M_{f} is indeed a projector and it projects onto the support space of TTTT^{\dagger}.

Finally, just like boundary operators BfB_{f}, ff-type MPO can be extended to an arbitrary large region as

Mf(R)\displaystyle M_{f}(\partial R) =\displaystyle= j=1nGaj+1ajfbjbj+1ij,j+1daj(dbjdaj1)θj2π.\displaystyle\prod_{j=1}^{n}G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}f}d_{a_{j}}(d_{b_{j}}d_{a_{j}}^{-1})^{\frac{\theta_{j}}{2\pi}}. (200)

and it represents the operation induced on the virtual level by a Wilson loop applied on the boundary of the region RR.

Appendix E 0-type string operator is a zero-string operator of triple-line TNR

In last chapter we argued how the reason for instability is that some of the non-trivial anyon operators might have a trivial representation on the virtual level. That is, they disappear identically on the ground state tensor network, even in the presence of a topological hole. We saw that, for the single-line and double-line TNR of toric code, XX-string and ZZ-string operators were the zero-string operators respectively. Indeed, the general string-net also has such an operator. These are the operators that only has string-type 0 in it. Remember that string-operators on the string net model act by adding a string-type (possibly more than one) to the string-net and then fusing it with the string-net by some fusion rules. The expression of Wilson-loop operators can be used to see how a string operator with open ends would act on the tensors along the path. It would look the same as in Eq. (200) along the path with some changes at the end. But we don’t worry too much about the details of how this operator looks at its ends, since those details can always be changed using local unitary operators at its ends. Looking at the Wilson-loop operators in Eq. (200), it is immediately clear what the invisible string operators are for the triple-line TNR of general string-nets. For f=0f=0, (using identity (136))

M0(R)\displaystyle M_{0}(\partial R) =\displaystyle= j=1n(Gaj+1aj0bjbj+1ij,j+1dbj(dajdbj1)mj6)\displaystyle\prod_{j=1}^{n}\left(G^{b_{j}b_{j+1}i_{j,j+1}}_{a_{j+1}a_{j}0}d_{b_{j}}(d_{a_{j}}d_{b_{j}}^{-1})^{\frac{m_{j}}{6}}\right) (201)
=\displaystyle= j=1n(δaj,bj(dajdbj)12dbj(dajdbj1)mj6δaj,aj+1,ij,j+1)\displaystyle\prod_{j=1}^{n}\left(\delta_{a_{j},b_{j}}(d_{a_{j}}d_{b_{j}})^{-\frac{1}{2}}d_{b_{j}}(d_{a_{j}}d_{b_{j}}^{-1})^{\frac{m_{j}}{6}}\delta_{a_{j},a_{j+1},i_{j,j+1}}\right)
=\displaystyle= j=1nδaj,aj+1,ij,j+1.\displaystyle\prod_{j=1}^{n}\delta_{a_{j},a_{j+1},i_{j,j+1}}.

But the final expression is the very definition of stand-alone space itself. It means this operator will act trivially on the stand-alone space. So, a 0-type simple string operator is a non-trivial invisible string operator, that is, it is a zero-string operator. From this it should be clear why we denoted the stand-alone space M0M_{0} and why we called non-trivial invisible string-operators zero-string operators. These names come from the general string-net formalism.

It is also clear that for f0f\neq 0, MfM_{f} acts necessarily non-trivially on the tensors along the path. One should carefully note that, though non-zero-string operators change tensors along the path, it does not mean that this path is a physical observable. These paths can always be deformed as MfM_{f} passes through T0T^{0} without any phase accumulation. It is called the ‘pulling-through condition’ Şahinoğlu et al. (2014). When there is an MPO violating variation present at a tensor, MfM_{f} cannot be pulled through it. Hence our conjecture can be alternatively worded as ‘the stand-alone variations which prohibit the pulling-through property of fixed point tensors cause instability.’

Appendix F Proof of theorem 2

We will give an analytical proof of why all string-net triple-line TNR have at least one unstable direction which comes from the M0𝕄M_{0}-\mathbb{M} subspace. We will do so by directly calculating Stopo(ϵ)S_{\text{topo}}(\epsilon).

F.1 Topological entanglement entropy on a cylinder with non-RG fixed point tensor

Lemma 4.

let’s say we divide the cylinder in two halves (Fig. 3(a)). We denote the right half as RR. If any given tensor network on this cylinder satisfies,

lim|R|𝕋(R)=C|R|fcfBf(R),\displaystyle\lim_{|R|\rightarrow\infty}\mathbb{T}(R)=C^{|R|}\sum_{f}c_{f}B_{f}(\partial R), (202)

where CC is some constant, then, StopoS_{\text{topo}}, as given in Eq. (15), is

Stopo=logf(cf2c02).\displaystyle S_{\text{topo}}=\log\sum_{f}\left(\frac{c^{2}_{f}}{c^{2}_{0}}\right). (203)
Proof.

The proof is quite simple. We follow the same steps as used in the proof of lemma 3, replacing dfd_{f} with cfc_{f}. We first calculate the normalization of the density matrix.

Tr(σb2)\displaystyle\text{Tr}(\sigma_{b}^{2}) =\displaystyle= Tr(fcfBf)2\displaystyle\text{Tr}(\sum_{f}c_{f}B_{f})^{2} (204)
=\displaystyle= f,fcfcfTr(BfBf)\displaystyle\sum_{f,f^{\prime}}c_{f}c_{f^{\prime}}\text{Tr}(B_{f}B_{f^{\prime}})
=\displaystyle= f,fcfcfδf,fDn\displaystyle\sum_{f,f^{\prime}}c_{f}c_{f^{\prime}}\delta_{f,f^{\prime}}D^{n}
=\displaystyle= Dn(fcf2).\displaystyle D^{n}(\sum_{f}c_{f}^{2}).

By calculating Renyi entropy with renyi index α=1/2\alpha=1/2, we get

S1/2(ρR)\displaystyle S_{1/2}(\rho_{R}) =\displaystyle= 111/2logTr(ρR12)\displaystyle\frac{1}{1-1/2}\log\text{Tr}(\rho_{R}^{\frac{1}{2}})
=\displaystyle= 2logTr(fcfBf)Dnfcf2\displaystyle 2\log\frac{\text{Tr}(\sum_{f}c_{f}B_{f})}{\sqrt{D^{n}\sum_{f}c_{f}^{2}}}
=\displaystyle= nlogD2logf(dfTrBf)logfcf2\displaystyle-n\log D-2\log\sum_{f}(d_{f}\textrm{Tr}B_{f})-\log\sum_{f}c_{f}^{2}
=\displaystyle= nlogD+2nlogλ02log(1+f>0cfTrBfλ0n)\displaystyle-n\log D+2n\log\lambda_{0}-2\log\left(1+\sum_{f>0}c_{f}\frac{\textrm{Tr}B_{f}}{\lambda_{0}^{n}}\right)
+2logc0logfcf2.\displaystyle+2\log c_{0}-\log\sum_{f}c_{f}^{2}.

When we let nn\rightarrow\infty and using Eq. (3)

S1/2(ρR)\displaystyle S_{1/2}(\rho_{R}) =\displaystyle= nlogλ02Dlogf(cf2c02)\displaystyle n\log\frac{\lambda_{0}^{2}}{D}-\log\sum_{f}\left(\frac{c^{2}_{f}}{c^{2}_{0}}\right) (205)
Stopo\displaystyle\Rightarrow S_{\textrm{topo}} =\displaystyle= logf(cf2c02).\displaystyle\log\sum_{f}\left(\frac{c^{2}_{f}}{c^{2}_{0}}\right). (206)

This completes the the proof.

Finally we are ready to show the unstable tensor perturbations in the triple line TNR of the string-net models.

F.2 Instability in string-net

Now we give proof of theorem 2.

Proof.

Combination of the lemma 2, theorem D.3 and lemma 4 gives a clue to why T0T0+ϵTqT^{0}\rightarrow T^{0}+\epsilon T^{q}, are unstable variations. We will choose particular variations in M0𝕄M_{0}-\mathbb{M} for analytical simplicity, but it should be understood that any arbitrary variation that has a component in those directions will result in instability. We discussed in section VII.4 that there are two kinds of variations in M0𝕄M_{0}-\mathbb{M}; vertex variations (that violate the vertex term) and plaquette variations (that violate the plaquette term). We will treat them one by one.

Before we do any analytical calculation, let us describe in simple words what the reason for instability is. We saw in the proof of lemma 2 that as fixed point tensors contract, every face, every edge, and every vertex contribute a factor of dfd_{f}, df1d_{f}^{-1}, and dfd_{f} respectively. It can be visualized like this,

[Uncaptioned image] (207)

It combines to give cf=dfFE+V=dfχRc_{f}=d_{f}^{F-E+V}=d_{f}^{\chi_{R}} which is a topological invariant of the lattice. If a tensor variation changes the double tensor in such a way that one of these factors (face, edge or vertices) are changed, even infinitesimally, then the cfc_{f} we get is not a topological invariant, and StopoS_{\textrm{topo}} due to lemma 4 changes. We will now show that this is precisely what variations in M0𝕄M_{0}-\mathbb{M} do. In particular, the vertex variations change the vertex factors, and the plaquette variations change the face factors.

Let’s choose a particular tensor variation

Tq\displaystyle T^{q} =\displaystyle= j=13(dij,j+114)δajbj+1ij,j+1,\displaystyle\prod_{j=1}^{3}(d_{i_{j,j+1}}^{\frac{1}{4}})\delta_{a_{j}b_{j+1}i_{j,j+1}}, (208)

such that

𝕋q=Tq(Tq)=B0.\displaystyle\mathbb{T}^{q}=T^{q}(T^{q})^{\dagger}=B_{0}. (209)

This tensor is supported on the full M0M_{0} space and clearly has components outside the MPO-injective subspace because as we showed M0>𝕄M_{0}>\mathbb{M}. So (M0𝕄)Tq0(M_{0}-\mathbb{M})T^{q}\neq 0. Now, the double tensor for the varied tensor is

𝕋=(T0+ϵTq)(T0+ϵTq)𝕋0+ϵ2B0\displaystyle\mathbb{T}=(T^{0}+\epsilon T^{q})(T^{0}+\epsilon T^{q})^{\dagger}\approx\mathbb{T}^{0}+\epsilon^{2}B_{0} (210)
=(1+ϵ2)B0+f>0dfBf.\displaystyle=(1+\epsilon^{2})B_{0}+\sum_{f>0}d_{f}B_{f}. (211)

We have ignored the linear terms in ϵ\epsilon as they are contained within the MPO-injective subspace, and we don’t need to worry about them. This double tensor will contract with itself in exactly the same way as 𝕋0\mathbb{T}^{0} did, but the only difference is, now every face will contribute a factor of rfr_{f}, where, r0=(1+ϵ2)r_{0}=(1+\epsilon^{2}), and rf>0=dfr_{f>0}=d_{f}. The vertex factors and edge factors will remain to be dfd_{f} and df1d_{f}^{-1}, respectively. After contracting it on a large region we will get a double tensor 𝕋(R)=fcfBf(R)\mathbb{T}(R)=\sum_{f}c_{f}B_{f}(\partial R), where cf=rfFdfVEc_{f}=r_{f}^{F}d_{f}^{V-E}. So c0=(1+ϵ2)Fc_{0}=(1+\epsilon^{2})^{F} and cf>0=dfχRc_{f>0}=d_{f}^{\chi_{R}}. So we see that c0c_{0} is exponentially larger than cf>0c_{f>0} even for an infinitesimal ϵ\epsilon, hence, using Eq. (206), Stopo=0S_{\textrm{topo}}=0.

Now we look an example of plaquette variations. Consider tensors that are exactly the same as the fixed point tensors, except the plaquette factors da1/6d_{a}^{1/6} are replaced by a factor of (da+ϵsq;a)1/6(d_{a}+\epsilon s_{q;a})^{1/6}, where sq;as_{q;a} is the aath component of the qqth eigenvector of δ\delta, as explained in Eq. (140).

(Tq)=j=13(dij,j+114(daj+ϵsq;aj)16)Ga1a2a3i23i31i12\displaystyle(T^{q})=\prod_{j=1}^{3}\left(d_{i_{j,j+1}}^{\frac{1}{4}}(d_{a_{j}}+\epsilon s_{q;a_{j}})^{\frac{1}{6}}\right)G^{i_{23}i_{31}i_{12}}_{a_{1}a_{2}a_{3}} (212)

This tensor is clearly supported on the stand-alone space, and is outside the MPO-injective subspace as to be inside the MPO-injective subspace it has to have da1/6d_{a}^{1/6} factors. The double tensor will again produce a factor of dfd_{f} on the faces, and df1d_{f}^{-1} on the edges upon contraction. But now the factors on the vertices would be

a,bδa,b,f(da+ϵsq;a)(db+ϵsq;b)=D(df+eq;fϵ2),\displaystyle\sum_{a,b}\delta_{a,b,f}(d_{a}+\epsilon s_{q;a})(d_{b}+\epsilon s_{q;b})=D(d_{f}+e_{q;f}\epsilon^{2}),

where sqs_{q} is normalized to give sq|sq=D\langle s_{q}|s_{q}\rangle=D and eq;fe_{q;f} is the qqth eigenvalue of the matrix Na,bf=δa,b,fN^{f}_{a,b}=\delta_{a,b,f}. A conclusion similar to that for vertex variation case follows. cf=dfFE(df+ϵ2eq;f)V=dfχR(1+ϵ2eq;fdf)Vc_{f}=d_{f}^{F-E}(d_{f}+\epsilon^{2}e_{q;f})^{V}=d_{f}^{\chi_{R}}(1+\epsilon^{2}\frac{e_{q;f}}{d_{f}})^{V} is not a topological invariant, as it extensively depends on the number of vertices VV. As a result, the weight of one of the boundary operator in 𝕋=fcfBf\mathbb{T}=\sum_{f}c_{f}B_{f} becomes exponentially larger than the others even for an infinitesimal variation ϵ\epsilon, and hence the topological order is lost.

Result I-IV together complete the proof that triple-line TNR of general string-net states have at least one unstable direction.

Appendix G Dependence of StopoS_{\text{topo}} on boundary conditions in cylindrical geometry

Refer to caption
Figure 17: We calculate entanglement entropy of the right-half of the cylinder with a certain boundary condition 𝕋r\mathbb{T}_{r}. The entanglement cut is in the middle of the cylinder.

Topological entanglement entropy calculation is done by calculating the entanglement entropy of a subsystem AA. When the boundary of AA consists of topologically trivial loops, for example when AA has a disc geometry, StopoS_{\text{topo}} is known to depend only on the total quantum dimension DD, Stopo=logDS_{\text{topo}}=\log D. However when the boundary of AA consists of non-contractible topologically non-trivial loops, for example when a torus or cylinder is divided into two cylinders, it has been shown by Zhang et al. (2012) that StopoS_{\text{topo}} also depends on the linear combination of ground states. For a ground state wave function on a torus

|Ψ=aca|Ξa\displaystyle|\Psi\rangle=\sum_{a}c_{a}|\Xi_{a}\rangle (214)

where the sum is over the degenerate ground states labeled by quasi-particles of the model, the nnth Rényi entropy is given by

Sn\displaystyle S_{n} =\displaystyle= αnLStopo,\displaystyle\alpha_{n}L-S_{\text{topo}}, (215)
Stopo\displaystyle S_{\text{topo}} =\displaystyle= 2logD11nlog(apanda2(1n))\displaystyle 2\log D-\frac{1}{1-n}\log\left(\sum_{a}p_{a}^{n}d_{a}^{2(1-n)}\right)

where dad_{a} is the quantum dimension of aath quasi-particle and pa=|ca|2p_{a}=|c_{a}|^{2}. |Ξa|\Xi_{a}\rangle are special basis for which StopoS_{\text{topo}} is maximal, or entanglement entropy is minimal. These states are called the Minimum Entropic States (MES) . It was shown that MES correspond to eigenstates of Wilson-loop operators along the entanglement cut.

This dependence of StopoS_{\text{topo}} on the ground state is of crucial importance to us since we have used cylinder with a boundary for StopoS_{\text{topo}} calculations. So, numerically obtained StopoS_{\text{topo}} contain information about the boundary as well. For example, consider the toric code.

Stopo=2log211nlog(p1n+p2n+p3n+p4n)\displaystyle S_{\textrm{topo}}=2\log 2-\frac{1}{1-n}\log(p_{1}^{n}+p_{2}^{n}+p_{3}^{n}+p_{4}^{n})

when p1=p2=p3=p4=14p_{1}=p_{2}=p_{3}=p_{4}=\frac{1}{4} we get Stopo=0S_{\textrm{topo}}=0 although the the topological order is not lost. So one has to be careful using StopoS_{\text{topo}} as an indicator of topological order.

Refer to caption
Figure 18: MESs are eigenstates of different Wilson loop operators at the entanglement cut. (a)For fixed point single-line TNR, the state on the cylinder is always in +1 eignestate of XX-loop, as it identically disappears. (b)The state is also in +1 eigenstate of simultaneous operation of two ZZ-loops, one at the entanglement cut, other at the right-most boundary. It implies, we can be in two MESs depending on the the boundary tensor choice. If the boundary tensor is in +1 eigenstate of the boundary ZZ loop, then the state is in +1 eigenstate of the entanglement-cut ZZ loop. Similarly, if the boundary tensor is in -1 eigenstate of the boundary ZZ loop, then the state is in -1 eigenstate of the entanglement-cut ZZ-loop.

Let’s first take the example of the single-line TNR of the toric code. See Fig. 18. We put our system on a cylinder with some boundary conditions to be determined later. The entanglement cut is in the middle of the cylinder, and the right half cylinder, denoted as RR, is the subsystem whose entanglement entropy we are calculating (see Fig. 17). The four MES correspond to four eigen states of ee and mm Wilson-loops on the entanglement cut. But, since ee-Wilson loop is a zero-string operator, the state is always in its +1+1 eigenstate (Fig. 18(a)). So we have access to only two MES corresponding to ±1\pm 1 eigenstates of mm-Wilson loop. We also know that the state is in +1+1 eigenstate of the ZR=ZecLZrLZ^{\otimes}_{\partial R}=Z^{\otimes L}_{ec}\otimes Z^{\otimes L}_{r}, where subscript ecec stands for loop at entanglement cut, and rr stands for the loop at the right boundary of RR. Since the state is in +1 eigenstate of ZecLZrLZ^{\otimes L}_{ec}\otimes Z^{\otimes L}_{r} (see Fig. 18)(b), the state can be either in +1+1 eigen-state of both ZrLZ^{\otimes L}_{r} and ZecLZ^{\otimes L}_{ec} or in 1-1 eigenstate of the both. The boundary tensor determines which eigenstate of ZrLZ^{\otimes L}_{r} the wave function is in, and consequently also which eigenstate of ZecLZ^{\otimes L}_{ec}. This is how the boundary tensors and MES are connected. Since we have access to only two MES

Stopo=log211nlog(p12+p22).\displaystyle S_{\text{topo}}=\log 2-\frac{1}{1-n}\log(p_{1}^{2}+p_{2}^{2}). (217)

A similar analysis follows in the double-line TNR, with the role of ee and mm Wilson loop operators reversed: now the state is always in the +1+1 eigen state of mm-Wilson loop and the two MES correspond to the two eigenstates of ee Wilson loop at the entanglement cut, which in turn depends on the boundary tensors.

We saw in the Appendix 4 ρR=Nσb2\rho_{R}=N\sigma_{b}^{2} where

σb=𝕋0(R)𝕋r\displaystyle\sigma_{b}=\mathbb{T}^{0}(R)\mathbb{T}_{r} (218)

where 𝕋r\mathbb{T}_{r} denotes the double tensor on the boundary. We know that, up to an irrelevant normalization constant,

𝕋0(R)\displaystyle\mathbb{T}^{0}(R) =\displaystyle= fdfχRBf(R)\displaystyle\sum_{f}d_{f}^{\chi_{R}}B_{f}(\partial R) (219)
=\displaystyle= (B0)ec(B0)r+(B1)ec(B1)r,\displaystyle(B_{0})_{ec}\otimes(B_{0})_{r}+(B_{1})_{ec}\otimes(B_{1})_{r},

where B0=ILB_{0}=I^{\otimes L} and B1=ZLB_{1}=Z^{\otimes L} for the single-line TNR and B1=XLB_{1}=X^{\otimes L} for the double-line TNR. Let’s say the boundary double tensor 𝕋r\mathbb{T}_{r} contracts with (Bf)r(B_{f})_{r} to produce the constants cfc_{f} (see Fig. 19)

Refer to caption
Figure 19: Bulk double tensor is a sum of tensor product between (Bf)ec(B_{f})_{ec} (BfB_{f} on the entanglement cut) and (Bf)r(B_{f})_{r} (BfB_{f} on the right boundary). So, when we contract a boundary tensor 𝕋r\mathbb{T}_{r} with the bulk tensor, it contract with (Bf)r(B_{f})_{r} giving a scalar cfc_{f}. So resulting tensor is Ev(𝕋(R)𝕋r)=fcf(Bf)ec\textrm{Ev}(\mathbb{T}(R)\mathbb{T}_{r})=\sum_{f}c_{f}(B_{f})_{ec}. Consequently, StopoS_{\textrm{topo}} using Eq. (206) is simply log(fcf2c02)\log\left(\sum_{f}\frac{c_{f}^{2}}{c_{0}^{2}}\right).
σb\displaystyle\sigma_{b} =\displaystyle= ((B0)ec(B0)r+(B1)ec(B1)r)𝕋r\displaystyle\left((B_{0})_{ec}\otimes(B_{0})_{r}+(B_{1})_{ec}\otimes(B_{1})_{r}\right)\mathbb{T}_{r} (220)
=\displaystyle= c0(B0)ec+c1(B1)ec\displaystyle c_{0}(B_{0})_{ec}+c_{1}(B_{1})_{ec}
=\displaystyle= cB+c+B+.\displaystyle c_{-}B_{-}+c_{+}B_{+}.

where c0=(B0)r𝕋r,c1=(B1)r𝕋rc_{0}=(B_{0})_{r}\mathbb{T}_{r},\,c_{1}=(B_{1})_{r}\mathbb{T}_{r} and B±=12(B0±B1)B_{\pm}=\frac{1}{2}(B_{0}\pm B_{1}) and c±=(c0±c1)c_{\pm}=(c_{0}\pm c_{1}). Note that B±B_{\pm} satisfy the following,

B±2=B±,Tr(B±)=2L1.\displaystyle B_{\pm}^{2}=B_{\pm},\quad\text{Tr}(B_{\pm})=2^{L-1}. (221)

With this, we get the normalized density matrix as,

ρR\displaystyle\rho_{R} =\displaystyle= 12L(c2c2+c+2B+c+2c2+c+2B+)\displaystyle\frac{1}{2^{L}}\left(\frac{c_{-}^{2}}{c_{-}^{2}+c_{+}^{2}}B_{-}+\frac{c_{+}^{2}}{c_{-}^{2}+c_{+}^{2}}B_{+}\right) (222)
=\displaystyle= 12L(pB+p+B+).\displaystyle\frac{1}{2^{L}}\left(p_{-}B_{-}+p_{+}B_{+}\right). (223)

The nnth Renyi entropy is,

Sn(ρR)\displaystyle S_{n}(\rho_{R}) =\displaystyle= 11nlogTr(ρRn)\displaystyle\frac{1}{1-n}\log\text{Tr}(\rho_{R}^{n})
=\displaystyle= 11nlogTr(12nL(pnB+p+nB+))\displaystyle\frac{1}{1-n}\log\text{Tr}\left(\frac{1}{2^{nL}}(p_{-}^{n}B_{-}+p_{+}^{n}B_{+})\right)
=\displaystyle= 11nlog(12nL(pn2L1+p+n2L1))\displaystyle\frac{1}{1-n}\log\left(\frac{1}{2^{nL}}(p_{-}^{n}2^{L-1}+p_{+}^{n}2^{L-1})\right)
=\displaystyle= Llog2(log211nlog(pn+p+n)).\displaystyle L\log 2-\left(\log 2-\frac{1}{1-n}\log(p_{-}^{n}+p_{+}^{n})\right).

Comparing it with the MES formula in Eq. (217), we see that p1=p=c0c1p_{1}=p_{-}=c_{0}-c_{1} and p2=p+=c+c+p_{2}=p_{+}=c_{-}+c_{+}. So the state is an MES if p±=0c0=±c1p_{\pm}=0\Rightarrow c_{0}=\pm c_{1} for which we get maximal topological entanglement entropy, Stopo=log2S_{\text{topo}}=\log 2. This illustrates the direct dependence of StopoS_{\text{topo}} on 𝕋r\mathbb{T}_{r}.

Refer to caption
Figure 20: Smooth boundary condition for triple-line tensor network. Tensors TbT_{b} are used on the boundary. TbT_{b} has 5 virtual legs, a1,a1,a2,a2,i12a_{1},a^{\prime}_{1},a_{2},a^{\prime}_{2},i_{12} and 1 physical leg, i12i_{12}. Physical leg and the middle leg take the same values. We assign a particular value to the components of this tensor, (Tb)i12a1a1;a2a2i12=δi12,0δa1,a1δa2,a2δa1a2i12(T_{b})^{i_{12}}_{i_{12}a_{1}a^{\prime}_{1};a_{2}a^{\prime}_{2}}=\delta_{i_{12},0}\delta_{a_{1},a^{\prime}_{1}}\delta_{a_{2},a^{\prime}_{2}}\delta_{a_{1}a_{2}i_{12}}.

Of course the above analysis is done for the RG fixed point tensors only. We have to choose a boundary double tensor 𝕋r\mathbb{T}_{r} such that StopoS_{\text{topo}} is truly indicative for topological order, or lack of it, for both RG fixed point and varied tensors. We choose the following boundary tensor for our numerical calculations: For any tensor network, fixed point or varied, We use a ‘smooth boundary condition’. It is explained in the Fig. 20. First we will explain it for the triple-line tensors. For double-line and single-line an appropriately reduced version of TbT_{b} will be used. Note that we haven’t drawn the physical index explicitly and it should be understood the same as the middle index (the index in black color). So the boundary tensor TbT_{b} has four virtual indices, and we fix its components to be,

(Tb)i12a1a1;a2a2i12=δi12,0δa1,a1δa2,a2δa1a2i12\displaystyle(T_{b})^{i_{12}}_{i_{12}a_{1}a^{\prime}_{1};a_{2}a^{\prime}_{2}}=\delta_{i_{12},0}\delta_{a_{1},a^{\prime}_{1}}\delta_{a_{2},a^{\prime}_{2}}\delta_{a_{1}a_{2}i_{12}} (225)

that is, we put the physical/middle index to zero (vacuum) and allow the plaquette legs to vary with this restriction. For double-line we don’t have a middle leg, but we can simply put the physical leg to 0. For single-line we only have the middle legs and we put them to zero.

Before we discuss why we choose this particular boundary, let us calculate what StopoS_{\textrm{topo}} we are supposed to get with this particular choice of boundary tensor. For that, we need to calculate cf=Bf𝕋rc_{f}=B_{f}\mathbb{T}_{r}. Note that δaj,aj+1,0\delta_{a_{j},a_{j+1},0} implies aj=aj+1a_{j}=a_{j+1}. So the double tensor 𝕋r\mathbb{T}_{r} is

𝕋r=a,b|a,a,a..;000..b,b,b,;000|.\displaystyle\mathbb{T}_{r}=\sum_{a,b}|a,a,a..;000..\rangle\langle b,b,b,...;000...|. (226)

So

cf\displaystyle c_{f} =\displaystyle= Ev(Bf𝕋r)\displaystyle\textrm{Ev}(B_{f}\mathbb{T}_{r}) (227)
=\displaystyle= a,bj=1mGa,a,fb,b,0(dadb)12\displaystyle\sum_{a,b}\prod_{j=1}^{m}G^{b,b,0}_{a,a,f}(d_{a}d_{b})^{\frac{1}{2}}
=\displaystyle= a,bj=1mδa,b,f\displaystyle\sum_{a,b}\prod_{j=1}^{m}\delta_{a,b,f}
=\displaystyle= a,bδa,b,f.\displaystyle\sum_{a,b}\delta_{a,b,f}.

Then using Eq. (206), StopoS_{\textrm{topo}} is simply log(fcf2c02)\log(\sum_{f}\frac{c_{f}^{2}}{c_{0}^{2}}). For the toric code, and double semion models c0=c1=2c_{0}=c_{1}=2, so we get Stopo=log2S_{\textrm{topo}}=\log 2. For the double Fibonacci model, however, we get

c0=a,bδa,b,0=δ0,0,0+δ1,1,0=2\displaystyle c_{0}=\sum_{a,b}\delta_{a,b,0}=\delta_{0,0,0}+\delta_{1,1,0}=2 (228)
c1=a,bδa,b,1=δ1,0,1+δ0,1,1+δ1,1,1=3.\displaystyle c_{1}=\sum_{a,b}\delta_{a,b,1}=\delta_{1,0,1}+\delta_{0,1,1}+\delta_{1,1,1}=3. (229)

So we get Stopo=log(1+3222)=log(1+94)S_{\textrm{topo}}=\log(1+\frac{3^{2}}{2^{2}})=\log(1+\frac{9}{4}), which is consistent with our numerical result.

There are mainly two reasons why we choose this particular boundary condition
1- This is a very simple boundary condition which gives us a precise analytical value of the topological entanglement entropy (namely, log(fcf2c02)\log(\sum_{f}\frac{c_{f}^{2}}{c_{0}^{2}}), with cfc_{f} given in Eq. (227)) against which numerical calculations can be checked.
2- Though situation for non-abelian cases is more complicated, this boundary is definitely MPO symmetric for abelian models. That is, we expect the tensor network state to be an MES with maximal StopoS_{\textrm{topo}} (=logD\log D).

Refer to caption
Figure 21: Dependence of StopoS_{\textrm{topo}} on boundary condition for toric-code double line TNR. We start with the boundary tensor, TbT_{b}, shown in Fig. 20. We add a random variation ϵbTbr\epsilon_{b}T_{b}^{r} to TbT_{b} and calculate Stopo(ϵb)S_{\textrm{topo}}(\epsilon_{b}) for random bulk variations in different subspaces. We keep TbrT_{b}^{r} fixed and increase the variation strength ϵb\epsilon_{b}. We see all classes of stable bulk variations have the same StopoS_{\textrm{topo}} for each ϵb\epsilon_{b} as the fixed point (no-variation) tensor. And the unstable class of bulk variation shows no dependence on ϵb\epsilon_{b}. It shows that stable variations indeed are in the same topological phase as the RG fixed point state, and unstable variation is a trivial phase.

Numerical calculations of StopoS_{\textrm{topo}} will be checked against the analytical result in Eq. (227). Now the remaining question is about the trustworthiness of the same calculation for varied tensor. That is, how can we deduce the conclusion about the topological order of the varied tensor by Stopo(ϵ)S_{\textrm{topo}}(\epsilon)? First point is, if Stopo(ϵ)=Stopo(0)S_{\textrm{topo}}(\epsilon)=S_{\textrm{topo}}(0), then we can definitely say that the state is in the same topological phase. But Stopo(ϵ)=0S_{\textrm{topo}}(\epsilon)=0 needs to be further verified as it might be because of the particular boundary conditions imposed. To verify, we will test for StopoS_{\text{topo}} dependence on infinitesimal variation on the boundary tensors. The reason for this is clear by looking at the dependence of StopoS_{\text{topo}} on p1,p2p_{1},p_{2} etc. So, if the state indeed has a topological order, StopoS_{\text{topo}} should sensitively depend on the c0=(B0)r𝕋r,c1=(B1)r𝕋rc_{0}=(B_{0})_{r}\mathbb{T}_{r},c_{1}=(B_{1})_{r}\mathbb{T}_{r}. If the state has lost its topological order, StopoS_{\text{topo}} will remain zero under any changes of the boundary tensor. This way, we can avoid getting any ‘accidental Stopo=0S_{\text{topo}}=0’ cases, for example when p1=p2=12p_{1}=p_{2}=\frac{1}{2}.

One such verification is shown in Fig. 21. We first fix the boundary tensor to be TbT_{b} given in Eq. (20) and calculate the StopoS_{\textrm{topo}} for variations in IVM0,M0𝕄I_{V}-M_{0},M_{0}-\mathbb{M} and 𝕄\mathbb{M} subspaces added to the fixed point bulk tensor. Now we add an infinitesimal random variation to the boundary tensor, TbTb+ϵbTbrT_{b}\rightarrow T_{b}+\epsilon_{b}T_{b}^{r}. ϵb\epsilon_{b} (different from ϵ\epsilon, which the bulk variation strength) is the strength of the boundary variation. We increase ϵb\epsilon_{b} slowly and for each value of the ϵb\epsilon_{b} we calculate Stopo(ϵ)S_{\textrm{topo}}(\epsilon) for random bulk variations in different subspaces. Fig. 21 shows StopoS_{\textrm{topo}} as a function of ϵb\epsilon_{b} for bulk variations in different subspaces. (the bulk variation strength ϵ\epsilon is kept fixed throughout). We observe that
1- The variations which are unstable (i.e. Stopo=0S_{\textrm{topo}}=0) for TbT_{b}, continue to be unstable for Tb+ϵbTbrT_{b}+\epsilon_{b}T_{b}^{r} for all values of ϵb\epsilon_{b}. It implies that we get Stopo=0S_{\textrm{topo}}=0 for these variation because the bulk topological order is indeed destroyed and not because of a specific boundary tensor chosen which gave an accidental zero.
2-The variations which are stable (i.e. Stopo=log2S_{\textrm{topo}}=\log 2) for TbT_{b}, have the same value of StopoS_{\textrm{topo}} as the fixed point tensor for all boundary tensors. It implies that tensor network state with these variations indeed have the same topological order as the fixed point tensor network state. Though this verification is shown for double-line toric code only, we find the same behavior for all numerical calculations presented in this paper.

It should be noted that any strictly positive value of StopoS_{\text{topo}} (assuming sufficiently large cylinder was considered) is a sufficient condition for topological order but it is not a necessary condition. So all we need to do is to avoid getting accidental zeros.

Appendix H Details of numerical calculations

Refer to caption
Figure 22: Calculation of StopoS_{\textrm{topo}} for single-line toric code fixed point tensor network state. We fix half cylinder length as L=500L=500. Circumference is varied from 50 to 110. SS varies linearly with CC. This line is extrapolated back to C=0C=0. Its intersection with the y-axis gives StopoS_{\textrm{topo}}. Right figure is a zoomed in version of the left figure to show the intersection point clearly. We find Stopolog(2)S_{\textrm{topo}}\approx\log(2)
Refer to caption
Figure 23: StopoS_{\textrm{topo}} was calculated for a fixed half cylinder length, L=500L=500, in Fig. 22. We now vary LL from 10 to 1000. We see that StopoS_{\textrm{topo}} is converged even for small values of LL. So one does not need to large cylinder length to get the right StopoS_{\textrm{topo}} value. It is expected as it is an RG fixed point tensor network state.

Here we will provide the various numerical details and data regarding the numerical calculations whose results were presented in the main text.

First, we will show convergence of numerical calculation of StopoS_{\textrm{topo}}. We choose the simplest case, the single-line TNR of toric code. We first repeat the algorithm described in section II.2 in simple words here for convenience. In the first step, the transfer matrix is calculated using the tensor given (fixed point or varied). Then we choose a specific boundary double tensor as explained in the Appendix G. We apply the transfer matrix on this boundary double tensor and approximate the resulting tensor as an MPS of bond dimensions Dcut=8D_{\textrm{cut}}=8. We apply transfer matrix again and approximate the resulting tensor as an MPS of bond dimension 8. We repeat this process and each repetition physically corresponds to increasing the longitudinal length of the our cylindrical subsystem by one unit. Let’s say we repeat this process until the length of the half cylinder subsystem is equal to LL. This process gives us the virtual density matrix σ\sigma, and assuming the mirror symmetry of transfer matrix, the physical reduced density matrix of the half cylinder is ρLσ2\rho_{L}\propto\sigma^{2}. With this reduced density matrix we calculate the entanglement entropy SS of the half cylinder subsystem for different circumferences CC. We plot S-S vs CC and extrapolate it to C=0C=0 which gives us the topological entanglement entropy Stopo=S(C=0)S_{\textrm{topo}}=S(C=0). In principle, one needs to take infinitely large cylinder to achieve the precise value of StopoS_{\textrm{topo}}. Practically, we need to keep increasing LL until we get a fixed point MPS and keep increasing CC until the StopoS_{topo} value converges to a fixed point.

Let’s first look at the calculation for the single-line toric code fixed point tensor in Eq. (4). Half cylinder length is fixed at L=500L=500. CC is varied from 50 to 110. Fig. 22 shows the entanglement entropy SS vs the circumference CC. We get a straight line which is extrapolated to C=0C=0. The right figure is a zoomed in version of the left figure to see clearly where the extrapolated line crosses the y-axis. We get Stopo=S(C=0)log(2)S_{\textrm{topo}}=S(C=0)\approx\log(2) as expected. Fig. 23 shows the dependence of StopoS_{\textrm{topo}} on the half cylinder length LL. We see that there is no dependence, that is, fixed point MPS is achieved immediately. It is expected as it is an RG fixed point tensor network state.

Now we look at the calculation for single-line toric code fixed point tensor varied with an MPO symmetry breaking tensor. Remember that it is claimed in the main text that this is a trivial state. The variation strength is fixed at ϵ=0.01\epsilon=0.01. Half cylinder length is fixed at L=500L=500. CC is varied from 50 to 110. Fig. 24 shows entanglement entropy SS vs the circumference CC. We get a straight line which is extrapolated to C=0C=0. The right figure is a zoomed in version of the left figure to show clearly where the extrapolated line crosses the y-axis. We see Stopo0S_{\textrm{topo}}\approx 0. To see the effect of cylinder length we calculate StopoS_{\textrm{topo}} again but with different cylinder lengths. The results are shown in Fig. 25. We see that StopoS_{\textrm{topo}} is log(2)\log(2) for small cylinders but converges to zero as the length is increased. Comparing it to Fig. 23 we see that, unlike the fixed point case, we need to consider large enough cylinder (L>600L>600 in this case) to calculate the correct StopoS_{\textrm{topo}} value for the non-fixed point tensor network state.

Finally we show the effect of variation strength, ϵ\epsilon, on the convergence. In above calculation we fixed ϵ=0.01\epsilon=0.01. Now we vary ϵ\epsilon from 0.01 to 0.02 (making sure it is well below any critical points) and calculate corresponding convergence plots similar to Fig. 25. The results are shown in Fig. 26. We see that the strength of the variation has a huge effect on convergence. Bigger variations lead to faster convergence.

Though we have presented details of calculation only for one case (single-line toric code TNR), it should be understood that similar patterns are followed in all other cases. For completeness, we present the numerical data plotted in the main text and the relevant parameters used in each case.

Refer to caption
Figure 24: Calculation of StopoS_{\textrm{topo}} for a state represented by single-line toric code fixed point tensor varied with an MPO violating tensor. The strength of the variation is fixed at ϵ=0.01\epsilon=0.01. We fix half cylinder length as L=500L=500. Circumference is varied from 50 to 110. SS varies linearly with CC. This line is extrapolated back to C=0C=0. Its intersection with the y-axis gives StopoS_{\textrm{topo}}. Right figure is a zoomed in version of the left figure to show the intersection point clearly. We find Stopo0S_{\textrm{topo}}\approx 0, that is, it is a trivial state.
Refer to caption
Figure 25: StopoS_{\textrm{topo}} was calculated for a fixed half cylinder length, L=500L=500, in Fig. 24. We now vary LL from 10 to 1000. We see that StopoS_{\textrm{topo}} is close to log(2)\log(2) for small cylinders but converges to zero cylinder length LL is increased from 1 to 1000. So it is indeed a topologically trivial state.
Refer to caption
Figure 26: The variation strength ϵ\epsilon affects convergence. Higher the variation strength (as long as it is below any critical points) faster is the convergence with the length of the size of the system.

H.1 Single-line TNR toric code

The bond dimension of the MPS is kept fixed at Dcut=8D_{\textrm{cut}}=8 at each step of the iteration. The starting MPS is as explained in the Appendix G. The strength of the variations is fixed at ϵ=0.01\epsilon=0.01. Half cylinder length is either the length at which convergence of StopoS_{\textrm{topo}} is reached (convergence is reached when StopoS_{\textrm{topo}} value in two successive steps differ by less than 10710^{-7}) or L=1000L=1000, whichever is smaller. The circumference is varied from 50 to 110.

Following table contains the exact values of the StopoS_{\textrm{topo}} plotted in Fig. 4.

No Variation 0.6931
Z3Z^{\otimes 3} respecting variations 0.6931 0.6931 0.6931 0.6931 0.6931 0.6931 0.6931 0.6931 0.6931
Z3Z^{\otimes 3} violating variations 1012×10^{-12}\times 0.9095 0 -0.4547 -0.4547 0 0 0.9095 0.4547 -0.4547

H.2 Double-line TNR toric code

The bond dimension of the MPS is kept fixed at Dcut=16D_{\textrm{cut}}=16 at each step of the iteration. The starting MPS is as explained in the Appendix G. The strength of the variations is fixed at ϵ=0.01\epsilon=0.01. Half cylinder length is either the length at which convergence of StopoS_{\textrm{topo}} is reached (convergence is reached when StopoS_{\textrm{topo}} value in two successive steps differ by less than 10710^{-7}) or L=1000L=1000, whichever is smaller. The circumference is varied from 50 to 110. Following table contains the exact values of the StopoS_{\textrm{topo}} plotted in Fig. 6.

No Variation 0.6931
ZZZ\otimes Z breaking variations 0.6931 0.6931 0.6931 0.6931 0.6931
ZZZ\otimes Z respecting, X6X^{\otimes 6} breaking variations 0.0000 0.0015 0.0000 0.0000 0.0002
ZZZ\otimes Z and X6X^{\otimes 6} respecting variations 0.6931 0.6931 0.6931 0.6931 0.6931

H.3 Double-line TNR double semion code

The bond dimension of the MPS is kept fixed at Dcut=16D_{\textrm{cut}}=16 at each step of the iteration. The starting MPS is as explained in the Appendix G. The strength of the variations is fixed at ϵ=0.01\epsilon=0.01. Half cylinder length is either the length at which convergence of StopoS_{\textrm{topo}} is reached (convergence is reached when StopoS_{\textrm{topo}} value in two successive steps differ by less than 10710^{-7}) or L=1000L=1000, whichever is smaller. The circumference is varied from 50 to 110. Following table contains the exact values of the StopoS_{\textrm{topo}} plotted in Fig. 11.

No Variation 0.6931
ZZZ\otimes Z breaking variations 0.6931 0.6931 0.6931 0.6931 0.6931
ZZZ\otimes Z respecting, X6X^{\otimes 6} breaking variations 0.0133 0.0047 0.0191 0.0086 0.0063
ZZZ\otimes Z and X6X^{\otimes 6} respecting variations 0.6931 0.6931 0.6931 0.6931 0.6931

H.4 Triple-line toric code

The bond dimension of the MPS is kept fixed at Dcut=16D_{\textrm{cut}}=16 at each step of the iteration. The starting MPS is as explained in the Appendix G. The strength of the variations is fixed at ϵ=0.2\epsilon=0.2. Half cylinder length is either the length at which convergence of StopoS_{\textrm{topo}} is reached (convergence is reached when StopoS_{\textrm{topo}} value in two successive steps differ by less than 10710^{-7}) or L=1000L=1000, whichever is smaller. The circumference is varied from 50 to 110. Following table contains the exact values of the StopoS_{\textrm{topo}} plotted in Fig. 12.

No Variation 0.6931
Variations in IVM0I_{V}-M_{0} 0.6931 0.6931 0.6931 0.6931 0.6931
Variations in M0𝕄M_{0}-\mathbb{M} 103×10^{-3}\times 0.2467 0.0986 0.2658 0.0257 0.0005
Variations in 𝕄\mathbb{M} 0.6931 0.6931 0.6931 0.6931 0.6931

H.5 Triple-line double-semion

The bond dimension of the MPS is kept fixed at Dcut=16D_{\textrm{cut}}=16 at each step of the iteration. The starting MPS is as explained in the Appendix G. The strength of the variations is fixed at ϵ=0.2\epsilon=0.2. Half cylinder length is either the length at which convergence of StopoS_{\textrm{topo}} is reached (convergence is reached when StopoS_{\textrm{topo}} value in two successive steps differ by less than 10710^{-7}) or L=1000L=1000, whichever is smaller. The circumference is varied from 50 to 110. Following table contains the exact values of the StopoS_{\textrm{topo}} plotted in Fig. 13.

No Variation 0.6931
Variations in IVM0I_{V}-M_{0} 0.6932 0.6931 0.6932 0.6931 0.6932
Variations in M0𝕄M_{0}-\mathbb{M} 107×10^{-7}\times 0.7877 0.0849 0.0003 0.0006 0.0000
Variations in 𝕄\mathbb{M} 0.6931 0.6931 0.6931 0.6931 0.6931

H.6 Triple-line Fibonacci model

The bond dimension of the MPS is kept fixed at Dcut=16D_{\textrm{cut}}=16 at each step of the iteration. The starting MPS is as explained in the Appendix G. The strength of the variations is fixed at ϵ=0.1\epsilon=0.1. Half cylinder length is either the length at which convergence of StopoS_{\textrm{topo}} is reached (convergence is reached when StopoS_{\textrm{topo}} value in two successive steps differ by less than 10710^{-7}) or L=2000L=2000, whichever is smaller. The circumference is varied from 50 to 110. Following table contains the exact values of the StopoS_{\textrm{topo}} plotted in Fig. 14.

No Variation 1.1787
Variations in IVM0I_{V}-M_{0} 1.1779 1.1776 1.1774 1.1778 1.1779
Variations in M0𝕄M_{0}-\mathbb{M} 107×10^{-7}\times -0.2330 0.2841 0.0517 0.0335 0.0299
Variations in 𝕄\mathbb{M} 1.1535 1.1623 1.1556 1.1386 1.1667

References