{"id":60791,"date":"2025-08-05T18:40:14","date_gmt":"2025-08-05T18:40:14","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/60791\/"},"modified":"2025-08-05T18:40:14","modified_gmt":"2025-08-05T18:40:14","slug":"universal-quantum-computation-using-ising-anyons-from-a-non-semisimple-topological-quantum-field-theory","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/60791\/","title":{"rendered":"Universal quantum computation using Ising anyons from a non-semisimple topological quantum field theory"},"content":{"rendered":"<p>Non-semisimple anyons<\/p>\n<p>The fusion rules governing anyons in our theory are closely related to SU(2)k Chern-Simons theory at level k\u2009=\u20092, in which each quasiparticle has a half-integer \u201cq-deformed&#8221; spin quantum number, or q-spin, analogous to ordinary spin. Our fusion rules arise from the unrolled quantum group for \\({\\mathfrak{sl}}(2,{\\mathbb{C}})\\) with the quantum parameter set to an eighth root of unity<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 27\" title=\"Geer, N., Lauda, A., Patureau-Mirand, B. &amp; Sussan, J. A Hermitian TQFT from a non-semisimple category of quantum &#010;                  &#010;                    &#010;                  &#010;                  $${\\mathfrak{sl}}(2)$$&#010;                  &#010;                    sl&#010;                    &#010;                      (&#010;                      &#010;                        2&#010;                      &#010;                      )&#010;                    &#010;                  &#010;                -modules. Lett. Math. Phys. 112, 74 (2022).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR27\" id=\"ref-link-section-d34769793e1314\" rel=\"nofollow noopener\" target=\"_blank\">27<\/a>. This theory contains a vacuum state \\({\\mathbb{1}}\\), and anyon types \u03c8, \u03c3 of q-spin 0, 1\/2, and 1, respectively, as in the Ising theory, but also possesses new \u2018non-semisimple\u2019 anyon types removed in SU(2)2 Chern-Simons theory.<\/p>\n<p>The non-semisimple theory retains additional anyon types that would have been removed in the traditional semisimplification process for SU(2)2. These include new anyon types \u03b1, indexed by non-half-integer real numbers, whose q-spins are no longer restricted to have half-integer values. The Hilbert space for the theory we propose augments Ising anyons by a single \u03b1-type anyon. However, to fully understand the fusion rules and constraints on the associated F-symbols, we must also consider q-spin 3\/2 and 2 particles S3\/2, and P2, all of which have traditional quantum trace zero at level k\u2009=\u20092.<\/p>\n<p>The fusion rules relevant to our encoding are given by<\/p>\n<p>$$\\begin{array}{rl}\\alpha \\times {\\mathbb{1}}=\\alpha,&amp;\\alpha \\times \\sigma=(\\alpha+1)+(\\alpha -1),\\\\ \\sigma \\times \\sigma={\\mathbb{1}}+\\psi,&amp;\\alpha \\times \\psi=(\\alpha+2)+\\alpha+(\\alpha -2),\\\\ \\sigma \\times \\psi=\\sigma+{S}_{3\/2},&amp;\\psi \\times \\psi={\\mathbb{1}}+{P}_{2}.\\end{array}$$<\/p>\n<p>\n                    (2)\n                <\/p>\n<p>Observe that removing the anyon types S3\/2 and P2 in the last line, as in the semisimplification procedure, results in the more familiar Ising fusion rules (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ1\" rel=\"nofollow noopener\" target=\"_blank\">1<\/a>). A complete list of fusion rules can be found in ref. <a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 21\" title=\"Costantino, F., Geer, N. &amp; Patureau-Mirand, B. Some remarks on the unrolled quantum group of &#010;                  &#010;                    &#010;                  &#010;                  $${\\mathfrak{sl}}(2)$$&#010;                  &#010;                    sl&#010;                    &#010;                      (&#010;                      &#010;                        2&#010;                      &#010;                      )&#010;                    &#010;                  &#010;                . J. Pure Appl. Algebra 219, 3238&#x2013;3262 (2015).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR21\" id=\"ref-link-section-d34769793e1639\" rel=\"nofollow noopener\" target=\"_blank\">21<\/a>.<\/p>\n<p>Consider the vector space \\({{{\\mathcal{H}}}}_{n}:={{{\\mathcal{H}}}}_{\\alpha ;{\\sigma }^{2n}}\\) consisting of a single type \u03b1-anyon and 2n\u03c3-type anyons in a total q-spin state \u03b1. The fusion rules (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ2\" rel=\"nofollow noopener\" target=\"_blank\">2<\/a>) imply that the space \\({{{\\mathcal{H}}}}_{n}\\) is \\(\\left(\\begin{array}{c}2n\\\\ n\\end{array}\\right)\\)-dimensional and will contain our n-qubit topologically protected Hilbert space. The single qubit space \\({{{\\mathcal{H}}}}_{1}\\) is encoded as \\(\\left\\vert 0\\right\\rangle={({(\\alpha,\\sigma )}_{\\alpha+1},\\sigma )}_{\\alpha }\\), \\(\\left\\vert 1\\right\\rangle={({(\\alpha,\\sigma )}_{\\alpha -1},\\sigma )}_{\\alpha }\\), where we denote the fusion of a pair of anyons \u03d5 and \\({\\phi }^{{\\prime} }\\) into a type t anyon using the notation \\({(\\phi,{\\phi }^{{\\prime} })}_{t}\\). We can represent these states using fusion trees or by depicting the anyon labels grouped by ovals labeling the total q-spin.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/41467_2025_61342_Figa_HTML.png\" class=\"u-display-block\" alt=\"\"\/><\/p>\n<p>\n                    (3)\n                <\/p>\n<p>Such fusion trees give rise to bases for the Hilbert space of a collection of anyons in a fixed q-spin. An alternative single qubit Hilbert space is given by the states \\(\\left\\vert {0}^{{\\prime} }\\right\\rangle={(\\alpha,{(\\sigma,\\sigma )}_{{\\mathbb{1}}})}_{\\alpha }\\), \\(\\left\\vert {1}^{{\\prime} }\\right\\rangle=\\left.\\right({(\\alpha,{(\\sigma,\\sigma )}_{\\psi })}_{\\alpha }\\). The change of basis between these two bases is given by the matrix of F-symbols in the theory.<\/p>\n<p>For multiple qubits, we must account for the noncomputational fusion channels \\(\\left\\vert N{C}_{1}\\right\\rangle={({(\\alpha,\\sigma )}_{\\alpha+1},\\sigma )}_{\\alpha+2}\\), \\(\\left\\vert N{C}_{2}\\right\\rangle={({(\\alpha,\\sigma )}_{\\alpha -1},\\sigma )}_{\\alpha -2}\\). The computational basis of n qubits is encoded into the fusion of \u03b1\u2009\u00d7\u2009\u03c3\u00d72n by having each 0 correspond to the fusion channel \u03b1\u2009\u00d7\u2009\u03c3\u00a0\u2192\u00a0\u03b1\u2009+\u20091 and each 1 to \u03b1\u2009\u00d7\u2009\u03c3\u00a0\u2192\u00a0\u03b1\u00a0\u2212\u00a01 and each (\u03b1\u2009\u00b1\u20091)\u2009\u00d7\u2009\u03c3\u00a0\u2192\u00a0\u03b1 as illustrated below for n\u2009=\u20092,<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/41467_2025_61342_Figb_HTML.png\" class=\"u-display-block\" alt=\"\"\/><\/p>\n<p>\n                    (4)\n                <\/p>\n<p>where we encode the results of fusion as tuple (a1,\u00a0a2,\u00a0a3).<\/p>\n<p>Note that while we use three anyons (\u03b1,\u00a0\u03c3,\u00a0\u03c3) to encode a single qubit, two qubits are encoded by adding just two additional Ising anyons (\u03b1,\u00a0\u03c3,\u00a0\u03c3,\u00a0\u03c3,\u00a0\u03c3). No additional \u03b1-type anyons are required in this multi qubit encoding.<\/p>\n<p>Unlike the traditional framework of topological quantum computation, the non-semisimple theory gives rise to an inner product on the Hilbert space \\({{{\\mathcal{H}}}}_{n}\\) that is not always positive definite<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 27\" title=\"Geer, N., Lauda, A., Patureau-Mirand, B. &amp; Sussan, J. A Hermitian TQFT from a non-semisimple category of quantum &#010;                  &#010;                    &#010;                  &#010;                  $${\\mathfrak{sl}}(2)$$&#010;                  &#010;                    sl&#010;                    &#010;                      (&#010;                      &#010;                        2&#010;                      &#010;                      )&#010;                    &#010;                  &#010;                -modules. Lett. Math. Phys. 112, 74 (2022).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR27\" id=\"ref-link-section-d34769793e2622\" rel=\"nofollow noopener\" target=\"_blank\">27<\/a>. This is an inherent property of the theory. Nevertheless, there are sectors within the theory where the computational space is positive definite. For \u03b1 \u2208 (2, 3), the inner product from ref. <a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 27\" title=\"Geer, N., Lauda, A., Patureau-Mirand, B. &amp; Sussan, J. A Hermitian TQFT from a non-semisimple category of quantum &#010;                  &#010;                    &#010;                  &#010;                  $${\\mathfrak{sl}}(2)$$&#010;                  &#010;                    sl&#010;                    &#010;                      (&#010;                      &#010;                        2&#010;                      &#010;                      )&#010;                    &#010;                  &#010;                -modules. Lett. Math. Phys. 112, 74 (2022).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR27\" id=\"ref-link-section-d34769793e2629\" rel=\"nofollow noopener\" target=\"_blank\">27<\/a> is definite on the single qubit Hilbert space \\({{{\\mathcal{H}}}}_{1}\\), but indefinite unitary more generally. For example, the two qubit space \\({{{\\mathcal{H}}}}_{2}\\) has signature (+\u00a0,\u00a0+\u00a0,\u00a0+\u00a0,\u00a0+\u00a0,\u00a0\u2212\u00a0,\u00a0+), meaning that all basis vectors from (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ4\" rel=\"nofollow noopener\" target=\"_blank\">4<\/a>) have norm \u00a0+\u00a01 except \\(\\left\\langle N{C}_{1},N{C}_{1}\\right\\rangle=-\\!1\\). Remarkably, the signature for the computational subspace is always positive definite for \u03b1 \u2208 (2, 3) in the multi-qubit encoding, with indefinite signature only occurring on a portion of the noncomputational space. Braiding of anyons acts on the Hilbert space \\({{{\\mathcal{H}}}}_{n}\\) by unitary transformations with respect to the indefinite metric. In order to preserve the Hilbert space \\({{{\\mathcal{H}}}}_{\\alpha ;{\\sigma }^{n}}\\), we consider only those braids that take the \u03b1-type anyon to itself. This subset of braids is called the affine braid group and can be regarded as braids that are allowed to wrap around a stable, unmoved pole in the first strand.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/41467_2025_61342_Figc_HTML.png\" class=\"u-display-block\" alt=\"\"\/><\/p>\n<p>Introduce real coefficients<\/p>\n<p>$${{{\\bf{B}}}}_{\\alpha+1}:=\\frac{\\sqrt{2}}{-1+\\cot \\frac{\\pi (\\alpha+1)}{4}},\\,\\,\\,{{{\\bf{B}}}}_{\\alpha -1}:=\\frac{\\sqrt{2}}{-1+\\cot \\frac{\\pi \\alpha }{4}},$$<\/p>\n<p>\n                    (5)\n                <\/p>\n<p>that arise when computing the inner product on the computational Hilbert space (see Section \u201cInner Products\u201d). The braiding matrices are given on the computational space by<\/p>\n<p>$$\\begin{array}{l}{{\\mathsf{b}}}_{1}^{2}=-q\\,{\\left({{\\mathsf{b}}}_{1}^{\\alpha \\sigma \\sigma }\\right)}^{2}=\\left(\\begin{array}{cc}{q}^{\\alpha }&amp;0\\\\ 0&amp;{q}^{-\\alpha }\\end{array}\\right),\\\\ {{\\mathsf{b}}}_{2}={q}^{-\\frac{3}{2}}\\,{{\\mathsf{b}}}_{2}^{\\alpha \\sigma \\sigma }={q}^{-1}\\left(\\begin{array}{cc}\\frac{1+{q}^{2}}{1-{q}^{2\\alpha }}&amp;{q}^{-1}\\frac{\\sqrt{{{{\\bf{B}}}}_{\\alpha+1}}}{\\sqrt{{{{\\bf{B}}}}_{\\alpha -1}}}\\\\ {q}^{-1}\\frac{\\sqrt{{{{\\bf{B}}}}_{\\alpha+1}}}{\\sqrt{{{{\\bf{B}}}}_{\\alpha -1}}}&amp;\\frac{1+{q}^{2}}{1-{q}^{-2\\alpha }}\\end{array}\\right)\\end{array}$$<\/p>\n<p>\n                    (6)\n                <\/p>\n<p>where we sometimes include the superscript to emphasize this single qubit encoding. The factors \\({q}^{-\\frac{3}{2}}\\) and \u00a0\u2212q are global phases that were manually introduced to make the matrices special unitary.<\/p>\n<p>An explicit computation shows that the matrices above satisfy the affine braid relation:<\/p>\n<p>$${{\\mathsf{b}}}_{1}^{2}{{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{1}^{2}{{\\mathsf{b}}}_{2}={{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{1}^{2}{{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{1}^{2}$$<\/p>\n<p>\n                    (7)\n                <\/p>\n<p>More generally, we have elementary braid generators \\({{\\mathsf{b}}}_{1}^{2}\\), \\({{\\mathsf{b}}}_{2}\\), \u2026, \\({{\\mathsf{b}}}_{2n}\\) acting on the space \\({{{\\mathcal{H}}}}_{n}\\) with \\({{\\mathsf{b}}}_{i}\\) swapping \u03c3\u2019s in position i and (i\u2009+\u20091) for i\u2009&gt;\u20092.<\/p>\n<p>Single qubit operations<\/p>\n<p>Universality for single qubit operations is established by showing that braiding will produce a dense subgroup of SU(2). A standard approach from ref. <a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 58\" title=\"Aharonov, D. &amp; Ben-Or, M. Fault-tolerant quantum computation with constant error rate. SIAM J. Comput. 38, 1207&#x2013;1282 (2008).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR58\" id=\"ref-link-section-d34769793e3911\" rel=\"nofollow noopener\" target=\"_blank\">58<\/a> for showing density in SU(2) is to specify two non-commuting braids b1,\u00a0b2 of infinite order.<\/p>\n<p>If \\(\\alpha \\in {\\mathbb{R}}\\setminus {\\mathbb{Q}}\\), then \\({{\\mathsf{b}}}_{1}^{2}\\) and \\({{\\mathsf{b}}}_{2}\\) are non-commuting and \\({{\\mathsf{b}}}_{1}^{2}\\) has infinite order, but \\({{\\mathsf{b}}}_{2}\\) has order four. However, \\({{\\mathsf{b}}}_{2}{b}_{1}{{\\mathsf{b}}}_{2}^{-1}\\) will have infinite order. Taking \\({b}_{1}={{\\mathsf{b}}}_{1}^{2}\\) and \\({b}_{2}={{\\mathsf{b}}}_{2}{b}_{1}{{\\mathsf{b}}}_{2}^{-1}\\) gives two non-commuting matrices of infinite order; hence, braiding anyons for any irrational \u03b1 will be dense for single qubit operations.<\/p>\n<p>If \\(\\alpha \\in {\\mathbb{Q}}\\), it takes more work to prove density. Here, we focus on the case \\(\\alpha=2+\\frac{2}{5}\\), where we have an explicit procedure for constructing low-leakage two-qubit entangling gates. For rational \u03b1, the braid \\({({{\\mathsf{b}}}_{1}^{\\alpha \\sigma \\sigma })}^{2}\\) no longer has infinite order, so we instead let \\({b}_{1}=({{\\mathsf{b}}}_{2}^{\\alpha \\sigma \\sigma }){({{\\mathsf{b}}}_{1}^{\\alpha \\sigma \\sigma })}^{2}{({{\\mathsf{b}}}_{2}^{\\alpha \\sigma \\sigma })}^{2}\\) and \\({b}_{2}=\\left({{\\mathsf{b}}}_{2}^{\\alpha \\sigma \\sigma }\\right){b}_{1}{({{\\mathsf{b}}}_{2}^{\\alpha \\sigma \\sigma })}^{-1}\\). b1 and b2 are not commuting, and they have infinite order if and only if b1 does. The eigenvalues of b1 at \\(\\alpha=2+\\frac{2}{5}\\) are \\({e}^{\\pm i(\\arccos -\\frac{\\varphi }{\\sqrt{2}})}\\), where \u03c6 is the golden ratio, so this generator has infinite order as long as \\(\\arccos (-\\frac{\\varphi }{\\sqrt{2}})\\) is not a rational multiple of \u03c0. But all algebraic integers of order up to 4 that are twice the cosine of a rational multiple of \u03c0 are classified in ref. <a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 59\" title=\"Tangsupphathawat, P. Algebraic trigonometric values at rational multipliers of &#x3C0;. Acta Comment. Univ. Tartu. Math. 18, 9&#x2013;18 (2014).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR59\" id=\"ref-link-section-d34769793e4859\" rel=\"nofollow noopener\" target=\"_blank\">59<\/a>. The order 4 algebraic integer \\(-\\sqrt{2}\\,\\varphi\\) (a root of x4\u2009\u2212\u20096&#215;2\u2009+\u20094) is not included in the classified values. Hence, braiding of anyons is universal for single qubit operations when \\(\\alpha=2+\\frac{2}{5}\\).<\/p>\n<p>From our encoding of multiple qubits, it is not immediately obvious that braiding will produce single qubit operations on each qubit in the multi-qubit space since we use just a single \u03b1-type anyon. However, by leveraging special braids acting locally on a single qubit, the proof of universality for single qubit operations above immediately extends to the multiqubit encoding, see Fig.\u00a0<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"figure anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Fig1\" rel=\"nofollow noopener\" target=\"_blank\">1<\/a>.<\/p>\n<p>Fig. 1: An illustration of the braid J4 that acts diagonally on a single qubit away from the initial \u03b1-type particle.<a class=\"c-article-section__figure-link\" data-test=\"img-link\" data-track=\"click\" data-track-label=\"image\" data-track-action=\"view figure\" href=\"https:\/\/www.nature.com\/articles\/s41467-025-61342-8\/figures\/1\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" aria-describedby=\"Fig1\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/41467_2025_61342_Fig1_HTML.png\" alt=\"figure 1\" loading=\"lazy\" width=\"685\" height=\"626\"\/><\/a><\/p>\n<p>Because the topology of this braid is such that it can slide through the result of all previous fusions, this braid does nothing to qubits appearing earlier in the fusion tree. Topologically, it is the same as a simple twist acting on a qubit lower in the fusion tree.<\/p>\n<p>In the basis of the two qubit space \\({{{\\mathcal{H}}}}_{2}\\) for \u03b1\u2009\u00d7\u2009\u03c3\u00d74 from (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ4\" rel=\"nofollow noopener\" target=\"_blank\">4<\/a>), single qubit operations can be performed on the first qubit using the affine braid generators<\/p>\n<p>$${{\\mathsf{b}}}_{1}^{2}={\\left({{\\mathsf{b}}}_{1}^{\\alpha \\sigma \\sigma }\\right)}^{2}\\otimes {{\\rm{Id}}}\\oplus {\\left({{\\mathsf{b}}}_{1}^{\\alpha \\sigma \\sigma }\\right)}^{2}\\\\ {{\\mathsf{b}}}_{2}={{\\mathsf{b}}}_{2}^{\\alpha \\sigma \\sigma }\\otimes {{\\rm{Id}}}\\oplus \\left({q}^{\\frac{1}{2}}\\,{{\\rm{Id}}}\\right)$$<\/p>\n<p>\n                    (8)\n                <\/p>\n<p>Where \\({{\\mathsf{b}}}^{\\alpha \\sigma \\sigma }\\) refers to the matrices in (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ6\" rel=\"nofollow noopener\" target=\"_blank\">6<\/a>). The single qubit operations on the second qubit can be achieved using<\/p>\n<p>$${J}_{4} \t={{\\rm{Id}}}\\otimes {\\left({{\\mathsf{b}}}_{1}^{\\alpha \\sigma \\sigma }\\right)}^{2}\\oplus \\left(\\begin{array}{cc}{q}^{1-\\alpha }&amp;0\\\\ 0&amp;{q}^{1+\\alpha }\\end{array}\\right)\\\\ {{\\mathsf{b}}}_{4} \t={{\\rm{Id}}}\\otimes {{\\mathsf{b}}}_{2}^{\\alpha \\sigma \\sigma }\\oplus \\left({q}^{\\frac{1}{2}}\\,{{\\rm{Id}}}\\right)$$<\/p>\n<p>\n                    (9)\n                <\/p>\n<p>where J4 is the composite braid \\({{\\mathsf{b}}}_{3}{{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{1}^{2}{{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{3}\\). The first four basis vectors from (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ4\" rel=\"nofollow noopener\" target=\"_blank\">4<\/a>) span the computational space, so J4 and b4 introduce no leakage in executing single-qubit operations.<\/p>\n<p>The structure of (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ8\" rel=\"nofollow noopener\" target=\"_blank\">8<\/a>) and (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ9\" rel=\"nofollow noopener\" target=\"_blank\">9<\/a>) simplifies the compilation of single-qubit gates in the multi-qubit setting; knowing how to implement a gate on the first qubit automatically gives us a way of implementing it on the second qubit. For example, if a sequence of powers of \\(({{\\mathsf{b}}}_{1}^{2})\\) and \\({{\\mathsf{b}}}_{2}\\) generates the gate U \u2297 Id, U \u2208 SU(2), then the same sequence in J4 and \\({{\\mathsf{b}}}_{4}\\) will generate the gate Id \u2297 U.<\/p>\n<p>Entangling gates<\/p>\n<p>Given the ability to efficiently perform single-qubit operations on any qubit, achieving universal quantum computation also requires the implementation of entangling gates and controlling the leakage into the non-computational subspace. In many approaches to topological quantum computation, density is established across the entire anyonic Hilbert space, which implies density on the computational subspace. However, the challenge then shifts to constructing entangling gates that minimize leakage into non-computational states.<\/p>\n<p>In our setting, it is more challenging to establish density on the full Hilbert space. In the two qubit setting, the 6-dimensional Hilbert space \\({{{\\mathcal{H}}}}_{2}\\) has signature (+,\u00a0+,\u00a0+,\u00a0+,\u00a0\u2212,\u00a0+) and braiding produces a subgroup of SU(5,\u00a01). Unlike the compact group SU(6), this group of matrices preserving an indefinite form is noncompact and the classification of its subgroups is much more complex. Very few techniques have been established for proving density in this setting<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 23\" title=\"Geer, N., Lauda, A., Patureau-Mirand, B. &amp; Sussan, J. Density and unitarity of the Burau representation from a non-semisimple TQFT. Preprint at &#010;                  https:\/\/arXiv.org\/abs\/2402.13242&#010;                  &#010;                 (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR23\" id=\"ref-link-section-d34769793e5790\" rel=\"nofollow noopener\" target=\"_blank\">23<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 60\" title=\"Aharonov, D. &amp; Arad, I. The BQP-hardness of approximating the Jones Polynomial. N. J. Phys. 13, 035019 (2011).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR60\" id=\"ref-link-section-d34769793e5793\" rel=\"nofollow noopener\" target=\"_blank\">60<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 61\" title=\"Kuperberg, G. Denseness and Zariski denseness of Jones braid representations. Geom. Topol. 15, 11&#x2013;39 (2011).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR61\" id=\"ref-link-section-d34769793e5796\" rel=\"nofollow noopener\" target=\"_blank\">61<\/a>.<\/p>\n<p>Rather than proving density for the entire Hilbert space \\({{{\\mathcal{H}}}}_{n}\\), here we establish density only for the computational space. Our approach combines two techniques developed in the context of Fibonacci anyons. The first is a technique to apply controlled braiding where the state of a control qubit determines if a braid is executed on a target qubit following ideas from refs. <a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Hormozi, L., Zikos, G., Bonesteel, N. &amp; Simon, S. Topological quantum compiling. Phys. Rev. B 75, 165310 (2007).\" href=\"#ref-CR28\" id=\"ref-link-section-d34769793e5832\">28<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Simon, S., Bonesteel, N., Freedman, M., Petrovic, N. &amp; Hormozi, L. Topological quantum computing with only one mobile quasiparticle. Phys. Rev. Lett. 96, 070503 (2006).\" href=\"#ref-CR29\" id=\"ref-link-section-d34769793e5832_1\">29<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 30\" title=\"Bonesteel, N., Hormozi, L., Zikos, G. &amp; Simon, S. Braid topologies for quantum computation. Phys. Rev. Lett. 95, 140503 (2005).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR30\" id=\"ref-link-section-d34769793e5835\" rel=\"nofollow noopener\" target=\"_blank\">30<\/a>. Second, we have a simple and efficient procedure for finding specific braids that produce diagonal phases with arbitrarily small leakage into the noncomputational space, adapting a procedure developed by Reichardt<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 31\" title=\"Reichardt, B. Systematic distillation of composite Fibonacci anyons using one mobile quasiparticle. Quantum Inf. Comput. 12, 876&#x2013;892 (2012).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR31\" id=\"ref-link-section-d34769793e5839\" rel=\"nofollow noopener\" target=\"_blank\">31<\/a> to the indefinite unitary setting. Together, these two strategies produce controlled phase gates.<\/p>\n<p>The protocol for implementing controlled braid operations is built off the observation that \u03c3\u2009\u00d7\u2009\u03c3 can fuse into the vacuum \\({\\mathbb{1}}\\), or a \u03c8 type anyon. Thus, braiding a pair of \u03c3 anyons through other anyons will produce a trivial operation when they are in the state \\({\\mathbb{1}}\\), and a nontrivial operation when in state \u03c8.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/41467_2025_61342_Figd_HTML.png\" class=\"u-display-block\" alt=\"\"\/><\/p>\n<p>Changing basis in the control qubit to the basis \\(\\left\\vert {0}^{{\\prime} }\\right\\rangle={(\\alpha,{(\\sigma,\\sigma )}_{{\\mathbb{1}}})}_{\\alpha }\\), \\(\\left\\vert {1}^{{\\prime} }\\right\\rangle=\\left.\\right({(\\alpha,{(\\sigma,\\sigma )}_{\\psi })}_{\\alpha }\\) (see Fig.\u00a0<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"figure anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Fig2\" rel=\"nofollow noopener\" target=\"_blank\">2<\/a>), we give braids that act as the identity when the control channel is \\({\\mathbb{1}}\\) and nontrivially when it is \u03c8. The gate implemented by this protocol is, by definition, a controlled gate in this basis. Transforming back to the original basis maintains the entanglement.<\/p>\n<p>Fig. 2: An alternative basis for the two-qubit space \\({{{\\mathcal{H}}}}_{2}\\) that is well suited for performing controlled operations.<a class=\"c-article-section__figure-link\" data-test=\"img-link\" data-track=\"click\" data-track-label=\"image\" data-track-action=\"view figure\" href=\"https:\/\/www.nature.com\/articles\/s41467-025-61342-8\/figures\/2\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" aria-describedby=\"Fig2\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/41467_2025_61342_Fig2_HTML.png\" alt=\"figure 2\" loading=\"lazy\" width=\"685\" height=\"366\"\/><\/a><\/p>\n<p>The first two \u03c3-type anyons form the control pair. Braiding the pair through the other anyon types creates a controlled braiding operation that only acts nontrivially if the control pair fuses into the \u03c8 channel. The subspace \\({{{\\mathcal{H}}}}_{2}^{\\psi }\\) consisting of states where the control qubit is in state \u03c8 has basis given by the last four basis vectors that we denote by \\(\\left\\vert {\\psi }_{0}\\right\\rangle\\), \\(\\left\\vert {\\psi }_{1}\\right\\rangle\\), \\(\\left\\vert {\\psi }_{2}\\right\\rangle\\), \\(\\left\\vert {\\psi }_{3}\\right\\rangle\\).<\/p>\n<p>For controlled braiding to entangle the computational space, we must identify low-leakage braids acting on the Hilbert space \\({{{\\mathcal{H}}}}_{2}^{\\psi }\\) corresponding to the anyon configuration (\u03b1,\u00a0\u03c8,\u00a0\u03c32) in a total q-spin state \u03b1. We focus on braids that preserve this space and become topologically trivial when \u03c8 is replaced by the vacuum \\({\\mathbb{1}}\\). Fix a basis of \\({{{\\mathcal{H}}}}_{2}^{\\psi }\\) consisting of the last four basis elements in Fig.\u00a0<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"figure anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Fig2\" rel=\"nofollow noopener\" target=\"_blank\">2<\/a> containing the fusion of \u03c3\u03c3 into a \u03c8 state. We denote these by \\(\\left\\vert {\\psi }_{0}\\right\\rangle\\), \\(\\left\\vert {\\psi }_{1}\\right\\rangle\\), \\(\\left\\vert {\\psi }_{2}\\right\\rangle \\left\\vert {\\psi }_{3}\\right\\rangle\\), noting that \\(\\left\\vert {\\psi }_{0}\\right\\rangle\\) and \\(\\left\\vert {\\psi }_{3}\\right\\rangle\\) span the noncomputational space.<\/p>\n<p>Our strategy to obtain low-leakage gate acting on \\({{{\\mathcal{H}}}}_{2}^{\\psi }\\) is to start with a gate w\u2009=\u2009U \u2295 V in SU(2)\u2009\u00d7\u2009SU(1,\u00a01) and perform a sequence of braids to suppress the off-diagonal entries so that the resulting gate approximates a diagonal with a nontrivial phase on the computational subspace. Here SU(2) acts on the space spanned by \\(\\left\\vert {\\psi }_{0}\\right\\rangle\\), \\(\\left\\vert {\\psi }_{1}\\right\\rangle\\), and SU(1,\u00a01) acts on the space spanned by \\(\\left\\vert {\\psi }_{2}\\right\\rangle\\) and \\(\\left\\vert {\\psi }_{3}\\right\\rangle\\), where \\(\\left\\vert {\\psi }_{1}\\right\\rangle\\) and \\(\\left\\vert {\\psi }_{2}\\right\\rangle\\) span the computational space.<\/p>\n<p>For matrices U \u2208 SU(2), Reichardt gave a procedure for leveraging a specific diagonal matrix \\({D}_{(2)}=\\left(\\begin{array}{cc}{e}^{\\frac{i3\\pi }{5}}&amp;0\\\\ 0&amp;1\\\\ \\end{array}\\right)\\) to produce a sequence of unitaries Uk whose off-diagonal entries decrease exponentially [ref. <a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 31\" title=\"Reichardt, B. Systematic distillation of composite Fibonacci anyons using one mobile quasiparticle. Quantum Inf. Comput. 12, 876&#x2013;892 (2012).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR31\" id=\"ref-link-section-d34769793e7054\" rel=\"nofollow noopener\" target=\"_blank\">31<\/a>, Eq. <a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ3\" rel=\"nofollow noopener\" target=\"_blank\">3<\/a>]. Reichardt used a slightly different definition of D(2), although the procedure works the same. The recursive sequence is given as follows:<\/p>\n<p>$${U}_{0} \t=U\\\\ {U}_{k+1} \t={U}_{k}{D}_{(2)}{U}_{k}^{{\\dagger} }{D}_{(2)}^{3}{U}_{k}{D}_{(2)}^{3}{U}_{k}^{{\\dagger} }{D}_{(2)}{U}_{k}$$<\/p>\n<p>\n                    (10)\n                <\/p>\n<p>One computes that the off-diagonal entries satisfy \u2223\u30080\u2223Uk+1\u22231\u3009\u2223\u2009=\u2009\u2223\u30080\u2223Uk\u22231\u3009\u22235, and hence that \\(| \\langle 0| {U}_{k}| 1\\rangle |=| \\langle 0| U| 1\\rangle {| }^{{5}^{k}}\\). For unitary matrices, the off-diagonal entries are less than or equal to 1, so iterating this procedure suppresses the off-diagonal entries to arbitrary accuracy. Note that, even though the sequence in (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ10\" rel=\"nofollow noopener\" target=\"_blank\">10<\/a>) has an exponential length in k, the off-diagonal terms go to zero doubly exponentially. While it is not possible to control the phases of the resulting diagonal matrix, one can still use the algorithm to produce entangling gates<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 62\" title=\"Carnahan, C., Zeuch, D. &amp; Bonesteel, N. Systematically generated two-qubit anyon braids. Phys. Rev. A 93, 052328 (2016).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR62\" id=\"ref-link-section-d34769793e7427\" rel=\"nofollow noopener\" target=\"_blank\">62<\/a>.<\/p>\n<p>Recall that matrices V in SU(1,\u00a01) have unit determinant and satisfy V\u2020JV\u2009=\u2009J where \\(J=\\left(\\begin{array}{cc}1&amp;0\\\\ 0&amp;-1\\\\ \\end{array}\\right)\\). The general form of such a matrix is \\(V=\\left(\\begin{array}{cc}\\alpha &amp;\\beta \\\\ {\\beta }^{*}&amp;{\\alpha }^{*}\\\\ \\end{array}\\right)\\) where \u2223\u03b1\u22232 \u2212 \u2223\u03b2\u22232\u2009=\u20091. Unlike the case of SU(2), the off-diagonal entries \u03b2 need not have a norm less than or equal to 1, so Reichardt\u2019s algorithm does not immediately apply. However, for V \u2208 SU(1,\u00a01) and \\({D}_{(1,1)}=\\left(\\begin{array}{cc}1&amp;0\\\\ 0&amp;{e}^{\\frac{i3\\pi }{5}}\\\\ \\end{array}\\right)\\), and setting<\/p>\n<p>$${V}_{0} \t=V\\\\ {V}_{k+1} \t={V}_{k}{D}_{(1,1)}{V}_{k}^{-1}{D}_{(1,1)}^{3}{V}_{k}{D}_{(1,1)}^{3}{V}_{k}^{-1}{D}_{(1,1)}{V}_{k}$$<\/p>\n<p>\n                    (11)\n                <\/p>\n<p>a direct computation shows that \u2223\u30080\u2223Vk+1\u22231\u3009\u2223\u2009=\u2009\u2223\u30080\u2223Vk\u22231\u3009\u22235. Thus, if V can be found with \u2223\u30080\u2223V\u22231\u3009\u2223\u2009&lt;\u20091, Reichardt\u2019s algorithm will produce a sequence of matrices in SU(1,\u00a01) with exponentially suppressed off-diagonal terms.<\/p>\n<p>Combining these two constructions, for D\u2009=\u2009D(2) \u2295 D(1,\u00a01), and W\u2009=\u2009U \u2295 V \u2208 SU(2) \u2295 SU(1,\u00a01), the recursive sequence<\/p>\n<p>$${W}_{0} \t=W\\\\ {W}_{k+1} \t={W}_{k}D{W}_{k}^{-1}{D}^{3}{W}_{k}{D}^{3}{W}_{k}^{-1}D{W}_{k}$$<\/p>\n<p>\n                    (12)\n                <\/p>\n<p>then in the ordered basis \\(\\{\\left\\vert {\\psi }_{0}\\right\\rangle,\\left\\vert {\\psi }_{1}\\right\\rangle,\\left\\vert {\\psi }_{2}\\right\\rangle,\\left\\vert {\\psi }_{3}\\right\\rangle \\}\\) we have \\(| \\langle {\\psi }_{0}| {W}_{k}| {\\psi }_{1}\\rangle |=| \\langle {\\psi }_{0}| W| {\\psi }_{1}\\rangle {| }^{{5}^{k}}\\) and \\(| \\langle {\\psi }_{2}| {W}_{k}| {\\psi }_{3}\\rangle |=| \\langle {\\psi }_{2}| W| {\\psi }_{3}\\rangle {| }^{{5}^{k}}\\). In particular, if \u2223\u3008\u03c80\u2223W\u2223\u03c81\u3009\u2223\u2009&lt;\u20091 and \u2223\u3008\u03c82\u2223W\u2223\u03c83\u3009\u2223\u2009&lt;\u20091, this recursive sequence produces reduced leakage into the noncomputational space.<\/p>\n<p>This is where our specific choice \u03b1\u2009=\u20092\u2009+\u20092\/5 enters our analysis. For this value of \u03b1, a direct computation shows that \\({({{\\mathsf{b}}}_{1}^{\\alpha \\psi \\sigma \\sigma })}^{4}={D}_{(2)}\\oplus {D}_{(1,1)}\\). It remains to identify a braid W of the form W\u2009=\u2009U \u2295 V that is topologically trivial when the strand labeled \u03c8 is removed and has small leakage term \u2223\u3008\u03c82\u2223W\u2223\u03c83\u3009\u2223\u2009&lt;\u20091. One candidate braid is \\({\\left({{\\mathsf{b}}}_{2}^{\\alpha \\psi \\sigma \\sigma }\\right)}^{2}\\) but when \u03b1\u2009=\u20092\u2009+\u20092\/5, \\({\\left({{\\mathsf{b}}}_{2}^{\\alpha \\psi \\sigma \\sigma }\\right)}^{2}\\) has non unitary leakage \u2223\u3008\u03c80\u2223W\u2223\u03c81\u3009\u2223 ~ 1.943\u2009&gt;\u20091. Another candidate is the restriction of the braid \\(W:={\\left({{\\mathsf{b}}}_{2}^{\\alpha \\psi \\sigma \\sigma }\\right)}^{2}{\\left({{\\mathsf{b}}}_{1}^{\\alpha \\psi \\sigma \\sigma }\\right)}^{2}{\\left({{\\mathsf{b}}}_{2}^{\\alpha \\psi \\sigma \\sigma }\\right)}^{2}{\\left({{\\mathsf{b}}}_{1}^{\\alpha \\psi \\sigma \\sigma }\\right)}^{2}{\\left({{\\mathsf{b}}}_{2}^{\\alpha \\psi \\sigma \\sigma }\\right)}^{-2}\\) from Fig.\u00a0<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"figure anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Fig3\" rel=\"nofollow noopener\" target=\"_blank\">3<\/a> to the four-dimensional space \\({{{\\mathcal{H}}}}_{2}^{\\psi }\\); it has the form W\u2009=\u2009U \u2295 V, where U \u2208 SU(2) and V \u2208 SU(1,\u00a01) and acts as the identity if the control channel is in the vacuum state.<\/p>\n<p>Fig. 3<a class=\"c-article-section__figure-link\" data-test=\"img-link\" data-track=\"click\" data-track-label=\"image\" data-track-action=\"view figure\" href=\"https:\/\/www.nature.com\/articles\/s41467-025-61342-8\/figures\/3\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" aria-describedby=\"Fig3\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/41467_2025_61342_Fig3_HTML.png\" alt=\"figure 3\" loading=\"lazy\" width=\"685\" height=\"634\"\/><\/a><\/p>\n<p>The braids W and D. Note that if the control strand (green) is the vacuum, the braids are topologically trivial.<\/p>\n<p>W has leakage terms \u2223\u3008\u03c80\u2223W\u2223\u03c81\u3009\u2223 ~0.832\u2009&lt;\u20091 and \u2223\u3008\u03c82\u2223W\u2223\u03c83\u3009\u2223 ~0.904\u2009&lt;\u20091, ensuring the convergence of Reichardt\u2019s procedure. When said procedure is applied once, the non-unitary leakage term\u2019s norm is brought down to ~0.399. A second iteration reduces it to ~0.101. Braids with lower overhead can be found through a bruteforce search:<\/p>\n<p>$${{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{1}{{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{1}^{-1}{{\\mathsf{b}}}_{2}^{-1}{{\\mathsf{b}}}_{1}{{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{1}{{\\mathsf{b}}}_{2}{{\\mathsf{b}}}_{1}^{2}{{\\mathsf{b}}}_{2}$$<\/p>\n<p>has initial unitary and non-unitary leakage terms with norms \u00a0~0.286 and \u00a0~0.285, respectively; these norms both reduce to \u00a0~1.914\u2009\u00d7\u200910\u22123 upon applying Reichardt\u2019s prescription once, and to 2.565\u2009\u00d7\u200910\u221214 after a second application. This modification of Reichardt\u2019s algorithm produces an approximate diagonal, non-leaking gate. We just have to verify that it doesn\u2019t act like (a multiple of) the identity on the computational space. This is easy to verify numerically; analyzing the third iteration of Reichardt\u2019s sequence (<a data-track=\"click\" data-track-label=\"link\" data-track-action=\"equation anchor\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#Equ12\" rel=\"nofollow noopener\" target=\"_blank\">12<\/a>) with starting braid W, we see that the diagonal gate acts on the computational space as diag\\(({e}^{i{\\theta }_{1}},{e}^{i{\\theta }_{2}})\\) where \u03b81\u00a0~\u00a0\u22121.772 and \u03b82\u00a0~\u00a0\u22121.682. The doubly exponential convergence rate ensures that further iterations will not meaningfully change these values<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 62\" title=\"Carnahan, C., Zeuch, D. &amp; Bonesteel, N. Systematically generated two-qubit anyon braids. Phys. Rev. A 93, 052328 (2016).\" href=\"http:\/\/www.nature.com\/articles\/s41467-025-61342-8#ref-CR62\" id=\"ref-link-section-d34769793e9564\" rel=\"nofollow noopener\" target=\"_blank\">62<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"Non-semisimple anyons The fusion rules governing anyons in our theory are closely related to SU(2)k Chern-Simons theory at&hellip;\n","protected":false},"author":2,"featured_media":60792,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[1159,1160,199,28542,79,35791],"class_list":{"0":"post-60791","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-physics","8":"tag-humanities-and-social-sciences","9":"tag-multidisciplinary","10":"tag-physics","11":"tag-qubits","12":"tag-science","13":"tag-topological-defects"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/60791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=60791"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/60791\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/60792"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=60791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=60791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=60791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}