23 references, page 1 of 3 [1] Bennett, C.H. and Brassard,G. (1984) Quantum Cryptography: Public key distribution and coin tossing, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175 (1984).

[2] B. Bakalov and A. Kirillov, Jr., Lectures on Tensor Categories and Modular Functors, University Lecture Series 21, Amer. Math. Soc., 2001.

[3] S. Bravyi and A. Kitaev, Universal Quantum Computation with ideal Clifford gates and noisy ancillas, Phys. Rev. A 71, 022316 (2005), arXiv:quantph/0403025.

[4] P. Bruillard, S. Ng, E. Rowell, and Z. Wang, On modular categories, in preparation.

[5] P. Etingof, D. Nikshych, and V. Ostrik, On fusion categories, Ann. of Math. (2) 162, 2 (2005), 581-642, arXiv:math/0203060.

[6] M. Freedman, P/NP, and the quantum field computer, Proc. Natl. Acad. Sci. USA 95, 1 (1998), 98-101.

[7] Z.-G. Gu, Z. Wang, X.-G. Wen, A classification of 2D fermionic and bosonic topological orders, arXiv:1010.1517.

[8] Hastings, M.B. (2009), Superadditivity of communication capacity using entangled inputs, Nature Physics 5, 255 - 257 (2009).

[9] M.B. Hastings, C. Nayak, and Z. Wang, Metaplectic Anyons, Majorana Zero Modes, and their Computational Power, arXiv:1210.5477.

[10] H.C. Jiang, L. Balents, and Z. Wang, Identifying topological order by entanglement entropy, Nature Physics 8, 902-905(2012), doi:10.1038/nphys2465, arXiv:1205.4289.