Skip to main content
Springer logoLink to Springer
. 2025 Sep 11;406(10):257. doi: 10.1007/s00220-025-05414-2

Non-trivial Fixed Point of a ψd4 Fermionic Theory, II: Anomalous Exponent and Scaling Operators

Alessandro Giuliani 1,, Vieri Mastropietro 2, Slava Rychkov 3, Giuseppe Scola 4
PMCID: PMC12426140  PMID: 40949629

Abstract

We consider the Renormalization Group (RG) fixed-point theory associated with a fermionic ψd4 model in d=1,2,3 with fractional kinetic term, whose scaling dimension is fixed so that the quartic interaction is weakly relevant in the RG sense. The model is defined in terms of a Grassmann functional integral with interaction V, solving a fixed-point RG equation in the presence of external fields, and a fixed ultraviolet cutoff. We define and construct the field and density scale-invariant response functions, and prove that the critical exponent of the former is the naive one, while that of the latter is anomalous and analytic. We construct the corresponding (almost-)scaling operators, whose two point correlations are scale-invariant up to a remainder term, which decays like a stretched exponential at distances larger than the inverse of the ultraviolet cutoff. Our proof is based on constructive RG methods and, specifically, on a convergent tree expansion for the generating function of correlations, which generalizes the approach developed by three of the authors in a previous publication (Giuliani et al. in JHEP 01:026, 2021. 10.1007/JHEP01(2021)026. arXiv:2008.04361 [hep-th]).

Introduction

Since the seminal works of Kadanoff, Wilson, Fisher and others in the 1970s, renormalization group (RG) fixed points and renormalization group flows connecting them are among central objects of study of theoretical physics, with many experimental applications. In a statistical mechanics interpretation, these fixed points physically correspond to the scaling limits of interacting systems at a second order phase transition; they determine the physical properties of the system at and near criticality, in particular the power law behavior of the correlation functions at short or long distances, and the corresponding critical exponents. Only a small part of conjectures and intuitions accumulated about RG fixed points in theoretical physics have been put on rigorous mathematical footing. Pioneering results in this area were obtained by Gawedzki and Kupiainen, who in [2] showed non-perturbative stability of the Gaussian fixed point of a scalar field in four dimensions (d=4), while in [3] they could follow, non-perturbatively, renormalization group flow of the Gross-Neveu two-dimensional model from the Gaussian fixed point of the Dirac field at short distances to some intermediate distance scale where the four-fermion coupling is still small. Later on [4] they constructed a non-perturbative interacting fixed point in a fractional Gross-Neveu model, which has the fermion propagator Inline graphic replaced by Inline graphic. This ϵ serves as a small parameter which is somewhat similar to the Wilson-Fisher deviation from the integer number of dimensions. Fractional Gross-Neveu model instead lives in the integer number of dimension, but has long-ranged interactions. Analogous fractional model can be considered also for a scalar bosonic field, where they should describe critical points of the long range Ising model [57]. Fixed points in fractional bosonic models were also rigorously constructed [810].

The present paper is the second one in the series started by our recent work [1]. In [1], three of us considered a fermionic model closely related to the fractional Gross-Neveu model of Gawedzki and Kupiainen. In our fractional symplectic fermion model, the fields are spinless fermions ψa in d dimensions (d=1,2,3) with propagator Ωab/|k|d/2+ϵ where Ω is a symplectic N×N matrix, and N is assumed even. The model is symmetric with respect to the symplectic group Sp(N) and the bare potential includes the invariant mass and the quartic coupling terms. In this model, Ref. [1] demonstrated the existence of an interacting fixed point for any ϵ sufficiently small, which could be positive or negative, or in fact complex. One of the main results of Ref. [1] is that the fixed point potential depends analytically on ϵ in a small disk |ϵ|<ϵ0. See also [11], where an extension of this result to the case of a continuous RG flow à la Polchinski [12] has been recently discussed. This interesting analyticity property should be a general feature of fixed points of fermionic models, but it was overlooked in prior literature. For bosonic models no such property holds, as they are well defined only for a positive quartic coupling. For fermionic models there is no such contradiction, since the quartic interaction may have any sign for fermions.

The fractional symplectic fermion model of [1] is an excellent theoretical laboratory to study various aspects of critical properties of statistical physics models, like non mean-field critical exponents. See [1, Sec. 8] for a long list of open problems. Moreover, our model and closely related ones have direct physics applications. For example, similar fractional fermionic models in a large N limit were considered in [13] in relation to the famous SYK model. Furthermore, as discussed in [1, Section 8.1.5], the fractional symplectic fermion model is likely continuously connected to the local symplectic fermion model [14], providing a way to compute the critical exponents of the latter in an ϵ-expansions. As to the local symplectic fermion model, it is relevant e.g. for the description of polymers and loop-erased random walks [15, 16], in the context of dS/CFT correspondence [17], and has also been studied theoretically in [1822].

The model we investigate is also a perfect playground to test several properties of Conformal Field Theory (CFT) and of the conformal bootstrap program [23], which have been extremely successful in numerically computing critical exponents of interacting critical models at a precision comparable with, if not better than, the best Monte Carlo simulations. In brief, the goal of CFT is to construct a collection of scale invariant correlation functions Oj1(z1)Ojn(zn) of a complete basis of scaling operators Oj, starting from the requirement that these correlations are conformally covariant and satisfy the Operator Product Expansion (OPE) identities. Based on these assumptions, the conformal bootstrap program proposes a strategy to compute recursively the critical exponents of all the scaling operators, as well as the explicit form of their multipoint correlations functions. An outline of CFT/bootstrap axioms and a description of the results obtained in such an axiomatic approach can be found e.g. in [23] (in physics language) or in [24, 25] (in a more mathematical language). The relevance of this method for Statistical Mechanics (SM) comes from the conjecture that the correlation functions of a CFT should coincide with the scaling limit of the correlation functions of an appropriate class of SM models at a second order phase transition point: that is, CFT is expected to be an emergent description of (universality classes of) critical SM models. The theoretical foundation for this conjecture is Wilsonian RG. In this framework, CFT correlations are expected to be the same as those of the fixed point theory of the RG map, and scaling operators are expected to be the densities of eigenstates of the RG transformation linearized around the fixed point; for this reason, sometimes scaling operators are also called eigenoperators, see e.g. [26, Eq.(3.10)]. Unfortunately, rigorous results substantiating the validity of this conjecture are scarce: even the existence of scaling operators starting from a regularized functional integral or from a lattice Gibbs measure has been proved only in very few cases. Two examples are: the vertex operators of Liouville field theory, whose construction starting from a regularized functional integral has been achieved in a remarkable series of papers [2729]; the spin operator of the 2D Ising field theory, constructed as the limit as the lattice spacing goes to zero of an appropriately renormalized magnetization, whose unique limit is shown to be a conformally covariant random distribution [30]. In connection with the latter result, see also [31], where a basis of lattice local fields satisfying the Virasoro algebra is constructed: these objects can be thought of as a sort of lattice counterpart of the scaling operators; however, the very existence of these lattice objects crucially relies on the exact solvability of the 2D Ising model at the lattice level.

Motivated by these problems, in this paper we consider a theory of fractional symplectic fermions defined in terms of a Grassmann functional integral, whose bare potential is the fixed point (FP) potential of a RG transformation in the presence of external source fields, and whose reference Gaussian part has a fixed ultraviolet cutoff. The part of the FP potential independent of the external fields is the same as the one constructed in [1], and it consists of a local quartic interaction, plus higher order, ‘irrelevant’, corrections. All the large-distance critical exponents of this model are expected to be the same as the one with purely local quartic interactions, but the FP model has the advantage of being the microscopic model with the closest possible features to those of the CFT effectively describing it, thus making it possible to test directly the CFT predictions.

In this setting, we prove two main results:

  1. First, we compute the critical exponents of the field-field and density-density correlations, which, contrary to the fixed point potential studied in [1], are physically observable. We prove that, while the field-field correlation has the same critical exponent as its mean field counterpart, the density-density correlation acquires an anomalous (i.e., non-mean-field) exponent, which is analytic in a small disk |ϵ|<ϵ0. This should be contrasted with the critical exponents of the fractional ϕd4 theory [810], whose expansion in ϵ is expected to be asymptotic and conjectured to be Borel summable; note, however, that their regularity properties have not been investigated yet: current results are limited to the lowest order computation of a few non-trivial, anomalous, exponents [10].1

  2. Next, we define almost-scaling operators, whose correlation functions are scale-invariant up to remainder terms decreasing as a stretched exponential at large distances. We believe that, in the presence of a short-distance cutoff, there is no way of defining scaling operators whose correlation functions are exactly scale invariant; in this sense, almost-scaling operators are the best possible approximation to scaling operators in our setting.2 Their behavior is to be contrasted with the behavior of correlation functions of generic (non-scaling) local operators which are expected to decay like power laws at large distances, up to remainder terms decaying also like power laws, albeit with a larger power than the leading term. It appears plausible that generic local operators should be expressible as (infinite) linear combinations of almost-scaling operators, each of which contributes to the correlation function with a power law behavior with a different critical exponents. Such an expansion in operators with larger and larger scaling dimension is standard in physics considerations of critical phenomena, see e.g. [26, Eq. (3.11)] or [42, Eq. (3.7)].

Outline. The paper is structured as follows: In Sect. 2 we define the model and state our main results, summarized in Theorems 2.4 and 2.5. In Sect. 3 we describe in detail the RG map and derive the corresponding FP equation in the presence of the external source fields. In Sect. 4 we solve the FP equation for the potential with external source fields via a tree expansion, and prove its absolute convergence in a weighted L1 norm. In Sect. 5 we prove the convergence of the tree expansion in a mixed L1/L norm, required for the control of the correlation functions at fixed positions, and we conclude the proof of Theorem 2.4. In Sect. 6 we adapt the discussion of the previous section to the estimate of the remainder terms in the correlation functions of the almost-scaling operators and conclude the proof of Theorem 2.5. The lowest order computation of the anomalous critical exponent and of the two point function are collected in two appendices.

Many aspects of the proof are generalizations of the methods introduced and discussed in detail in [1]: therefore, we will often refer the reader to specific sections of our previous paper and emphasize the analogies and novelties of the present work compared to [1].

The Model and the Main Results

Generating function of the scale-invariant response functions

Let us recall that in [1] we constructed the non-trivial FP potential H=H for a d-dimensional Grassmann theory with partition function dμ0(ψ)eH(ψ), where ψa is an N-component (with N4 even and different from 8) Grassmann field in VRd with d=1,2,3 and V a cube whose side is eventually sent to , and dμ0 (denoted dμP in [1]) is a reference Gaussian integration characterized by the following two-point function, or propagator,3:

Gab(0)(x-y)=dμ0(ψ)ψa(x)ψb(y)=Ωabddk(2π)dχ(k)|k|d/2+ϵeik·(x-y)ΩabP0(x-y). 2.1

Here Ω is the standard N×N symplectic matrix in block-diagonal form (see [1, Eq.(1.3)]), and the cutoff function χ is radial, monotone decreasing in the radial direction, and such that

χ(k)=1,if|k|1/20,if|k|1. 2.2

As in [1], we assume that χ belongs to the Gevrey class Gs,s>1 [1, App. A]. The FP potential constructed in [1] reads:

H(ψ)=νddxψ2(x)+λddxψ4(x)+HIRR(ψ), 2.3

where ν,λ are non-zero real-analytic functions of ϵ, of order ϵ, for ϵ sufficiently small, ψ2(x):=a,b=1NΩabψa(x)ψb(x), ψ4(x):=(ψ2(x))2, and HIRR is an infinite sum of irrelevant terms, whose kernels are non-vanishing real-analytic functions of ϵ (see [1] for more precise claims).

In this paper, we consider the FP theory in the presence of external source fields and the corresponding generating function for correlations, formally defined as

W(ϕ,J)=logdμ0(ψ)eV(ϕ,J,ψ)dμ0(ψ)eH(ψ). 2.4

Here V is a solution of the FP equation V=RV, with R the RG map, of the form

V(ϕ,J,ψ)=H(ψ)+(ϕ,ψ)+(J,ψ2)+R(ϕ,J,ψ)+S(ϕ,J), 2.5

where (ϕ,ψ) and (J,ψ2) are shorthand notations for a=1Nddxϕa(x)ψa(x) and ddxJ(x)ψ2(x), respectively, R(ϕ,J,ψ) is a sum of irrelevant terms depending explicitly both on (ϕ,J) and on ψ, i.e., R(ϕ,J,0)=R(0,0,ψ)=0, and S(ϕ,J) is an external potential, depending only upon the external fields (ϕ,J), such that S(0,0)=0. The precise definition of the RG map and of the irrelevant part of V will be given shortly, see Definition 2.3 below. Note also that, a priori, the right side of (2.4) may be plagued by infrared divergences. Therefore, (2.4) should be interpreted as4:

W(ϕ,J):=limh-W[h,0](ϕ,J)W[h,0](ϕ,J):=logdμ[h,0](ψ)eV(ϕ,J,ψ)dμ[h,0](ψ)eH(ψ), 2.6

where dμ[h,0] is the Grassmann Gaussian integration with propagator

Gab[h,0](x-y)=Ωabddk(2π)dχ(k)-χ(γ-hk)|k|d/2+ϵeik·(x-y)ΩabP[h,0](x-y), 2.7

and γ>1 is an arbitrarily chosen rescaling parameter, which is fixed once and for all. More generally, for later reference, for any pair of integers h1<h2, we let

Gab[h1,h2](x):=Ωabddk(2π)dχ(γ-h2k)-χ(γ-h1k)|k|d/2+ϵeik·xΩabP[h1,h2](x).

We also denote

Gab(h):=limh1-Gab[h1,h](x)ΩabPh(x)Gab(h):=limh2+Gab[h,h2](x)ΩabPh(x). 2.8

In particular, if h2=h1+1h, we denote the single-scale propagator by

gab(h)(x):=Gab[h-1,h](x). 2.9

Going back to W, our main focus will be on the two-point field-field and density-density response functions5, i.e., the kernels of the contributions to W(ϕ,J) that are purely quadratic in ϕ or in J, respectively. These can be obtained from W by differentiating it twice with respect to (w.r.t.) the ϕ or J and then setting the source fields to zero. We let:

Gab(x):=δ2W(ϕ,0)δϕa(x)δϕb(0)|ϕ=0,F(x):=δ2W(0,J)δJ(x)δJ(0)|J=0, 2.10

which are the central objects of interest of this paper. These response functions are expected6 to have the same large distance asymptotic behavior, up to a finite multiplicative renormalization, as the two-point functions

ψa(x)ψb(0)H,ψ2(x);ψ2(0)H, 2.11

respectively, where H:=limh-dμ[h,0](ψ)eH(ψ)dμ[h,0](ψ)eH(ψ) (in the second expression, the semicolon indicates truncated, or connected, expectation, i.e., A;BH:=ABH-AHBH); in particular, they are expected to define the same critical exponents. However, contrary to the two-point functions in (2.11), the response functions G(x) and F(x) are scale-invariant. Our first main results can be in fact informally stated as follows (see Theorem 2.4 below for a more precise statement):

Main result, I. For ϵ small enough, the response functions G and F are analytic in ϵ and such that, under rescaling by ρ=γk (here γ is the scaling parameter in (2.7) and following equations – entering also the definition of RG map – and kZ is an integer), they behave as follows:

Ga,b(ρx)=ρ-d/2+ϵGa,b(x),F(ρx)=ρ-d+2ϵ-2η2(ϵ)F(x),

where the anomalous critical exponent η2(ϵ)=2ϵN-2N-8+O(ϵ2) is analytic in ϵ.

Scale invariance may look surprising, at first sight, due to the presence of a fixed ultraviolet cutoff in our theory; but it turns out that the very definition of fixed point potential V fixes the irrelevant terms R and the external potential S in a special way, so that the resulting response functions are, in fact, scale invariant. Even in the non-interacting theory corresponding to the Gaussian fixed point, the mechanism fixing these additional terms is not completely trivial: it is in fact instructive, as a preliminary exercise, to compute V and G,F in the non-interacting case, see Sect. 2.2.1. As explained in footnote 5, we distinguish between the notions of response functions, like F,G, defined in terms of functional derivatives of the generating function, and correlation functions, defined as the expectations of products of almost-local operators7. By its very definition, the response function F (resp. G) is equal to the two-point correlations of an almost-local operators O(1) (resp. O(2)), plus an additional contribution, equal to the expectations of the second derivative of R(ϕ,J,ψ)+S(ϕ,J) with respect to ϕ (resp. J) at ϕ=J=0. Using a Quantum Field Theory jargon, this additional term may be called a ‘Schwinger term’. Our second main result is that the Schwinger terms associated with the response functions are stretched-exponentially small at large distances: in other words, the response functions F and G are equal to the two-point functions of two almost-local operators, up to stretched exponentially small corrections. In view of the scale invariance of the response functions, the correlation functions of these almost-local operators are then scale invariant up to stretched exponentially small corrections, thus allowing us to interpret them as ‘almost-scaling operators’. In formulae, anticipating here the statement of Theorem 2.5, we have:

Main result, II. Let Oa(1)(x)=δV(ϕ,J,ψ)δϕa(x)|ϕ=J=0, and O(2)(x)=δV(ϕ,J,ψ)δJ(x)|ϕ=J=0. Then G and F can be written as

Gab(x)=Oa(1)(x)Ob(1)(0)H+[E1(x)]ab,F(x)=O(2)(x);O(2)(0)H+E2(x), 2.12

where the correction terms E1(x),E2(x) decay to zero at large distances like a stretched exponential, i.e., for |x|1 they are bounded form above by (const.)e-c|x|σ, for suitable c>0 and 0<σ<1.

In the incoming subsections, before stating our main results more formally in Sect. 2.7, we need to introduce and define a number of important concepts, such as the action of the RG map (see Sect. 2.2), and the notions of scaling dimension, relevant and irrelevant operators (see Sect. 2.3); moreover, we need to specify the way in which we intend to parameterize the generating function or the fixed point potential: as mentioned in footnote 4 potentials can be identified with infinite sequences of kernels; more specifically, we shall choose the sequence associated with the fixed point potential to belong to a space of sequences, called trimmed, such that the relevant terms are local (see Sect. 2.4); a formal definition of fixed point potential is given in Sect. 2.5, while the notion of almost-scaling operators is given in Sect. 2.6.

The RG map

In order to clarify the notion of FP potential V in (2.6), we need, first of all, to specify the action of the RG map R. Before doing this formally, let us remind the reader the logic behind the definition of the R, which maps a potential V to a new potential V as follows (this discussion parallels the one in Section 2.1 of [1]): decomposing

G(0)(x)=G(-1)(x)+g(0)(x), 2.13

see (2.8) and (2.9) for the definitions of G(-1) and g(0), we write (‘addition principle for Gaussian integrals’):

1N0dμ0(ψ)eV(ϕ,J,ψ)F(ψ)=1N0dμ-1(ψγ)dμ0(ψ)eV(ϕ,J,ψγ+ψ)F(ψγ+ψ), 2.14

where N0=dμ0(ψ)eV(0,0,ψ) is a normalization constant, and dμ-1 (resp. μ0) is the Grassmann Gaussian integration with propagator G(-1) (resp. g(0)). If F(ψ) is a ‘large scale observable’, i.e., if it does not depend on the Fourier modes ψ^(k) with k in the support of g^(0)(k), then

1N0dμ0(ψ)eV(ϕ,J,ψ)F(ψ)=1N0dμ-1(ψγ)F(ψγ)dμ0(ψ)eV(ϕ,J,ψγ+ψ)=N0N0dμ-1(ψγ)eVeff(ϕ,J,ψγ)F(ψγ), 2.15

where N0:=dμ0(ψ)eV(0,0,ψ) and Veff(ϕ,J,ψγ)=log(N0-1dμ0(ψ)eV(ϕ,J,ψγ+ψ)). Thanks to the scaling property G(-1)(x)=γ-2[ψ]G(0)(x/γ), with [ψ]=d4-ϵ2 (see [1, eqs.(2.14),(2.15)]), the random field ψγ has the same distribution as γ-[ψ]ψ(·/γ)Dψ, with D the dilatation operator, and ψ a random field with distribution dμ0, so that

(2.15)=1N0dμ0(ψ)eVeff(ϕ,J,Dψ)F(Dψ),

where N0:=dμ0(ψ)eVeff(0,0,Dψ)N0/N0. Now, if V has the same structure as (2.5), i.e.,

V(ϕ,J,ψ)=H(ψ)+(ϕ,ψ)+(J,ψ2)+R(ϕ,J,ψ)+S(ϕ,J), 2.16

with R and S two potentials in an O(ϵ) neighborhood of the non-interacting fixed point discussed in Sect. 2.2.1 below (with R a sum of irrelevant terms, in the sense discussed in Sect. 2.3 below, and S an external potential, depending only upon the external fields ϕ,J), then it turns out, see Sect. 3, that

Veff(ϕ,J,Dψ)=H(ψ)+Z~1(ϕ,Dψ)+Z~2(J,(Dψ)2)+R~(ϕ,J,Dψ)+S~(ϕ,J), 2.17

with Z~1=1+O(ϵ), Z~2=1+O(ϵ) two constants produced by the integration of the fluctuation field ψ, and R~, S~ two new potentials that are, again, O(ϵ)-close to the non-interacting fixed point, with R~ a sum of irrelevant terms. In view of (2.17), it is natural to rescale the external fields in a way similar to ψ, in such a way to recast the terms involving the external fields in a form as close as possible to the one in which they originally appeared in V: therefore, we let ϕDϕ and JDJ, with D the dilatation operator, acting on the external fields as: Dϕ(x)=γ-[ϕ]ϕ(x/γ) and DJ(x)=γ-[J]J(x/γ), with the scaling dimensions [ϕ],[J] to be fixed appropriately, in a way explained shortly. In terms of these definitions: (ϕ,Dψ)=(Dϕ,Dψ)=a=1Nγ-[ϕ]-[ψ]ddxϕa(x/γ)ψa(x/γ)=γd-[ϕ]-[ψ](ϕ,ψ), and similarly for (J,(Dψ)2). Therefore,

Veff(ϕ,J,Dψ)=Veff(Dϕ,DJ,Dψ)=H(ψ)+Z~1γd-[ϕ]-[ψ](ϕ,ψ)+Z~2γd-[J]-2[ψ](J,ψ2)+R~(Dϕ,DJ,Dψ)+S~(Dϕ,DJ)V(ϕ,J,ψ). 2.18

By definition, V is the image of V under the RG map, i.e., V=RV; more precisely, V is equivalent, in the sense of [1, Section 5.2.1], to RV: the missing ingredient, in the previous informal discussion, is the action of the trimming map T, which is an operator, equivalent to the identity, which isolates the relevant terms from the irrelevant ones, see Sect. 3.2 below.

Note that the RG map depends, among other things, upon the choice of the scaling dimensions [ϕ] and [J]. In order to fix these dimensions, we use the requirement that, at the fixed point, Z1γd-[ϕ]-[ψ]=Z2γd-[J]-2[ψ]=1, with Z1=Z~1 and Z2=Z~2 the constants as in (2.17)-(2.18) associated with the fixed point potential V. In this way, the fixed point equation (FPE) defines an unambiguous criterium for assigning a scaling dimension to the external fields, which has a simple relation with the critical exponents of the corresponding response functions (cf. (2.20) with (2.46)); once that [ϕ] and [J] are fixed, the FPE becomes an equation for R,S, of the form: R~(Dϕ,DJ,Dψ)=R(ϕ,J,ψ), S~(Dϕ,DJ)=S(ϕ,J). The uniqueness of the solution for the FPE for [ϕ],[J],R,S, proved below, see Theorem 2.4, and the fact that the critical exponent of the two-point correlations (2.11) are the same as those of the response functions G,F associated with V, proved in the next paper of this series, confirms the physical significance of the scaling dimensions [ϕ] and [J], and of the fixed point potential V.

Given these premises, let us define the RG map R a bit more formally as follows:

R:=D-(h-1)TS(h)DhDTS(0)

(independence from hZ is a consequence of the definitions of S(h),T,D below), where:

  • S(h) is the integration on scale h0, i.e.,
    S(h)V(ϕ,J,ψ)=logdμh(ψ)eV(ϕ,J,ψ+ψ)dμh(ψ)eV(0,0,ψ), 2.19
    where dμh is the Grassmann Gaussian integration with propagator gab(h)(x), see (2.9);
  • T is the trimming map, defined in detail in Sect. 3.2 below, which is equivalent to the identity: when acting on a potential V it produces an equivalent potential VV, in the sense of [1, Sect.5.2.1], of the form V=TV=LV+IV; here LV is a sum of finitely many local relevant and marginal terms (belonging to a finite dimensional subspace of the Banach space of potentials), and IV is an equivalent rewriting of TV-LV as an infinite linear combination of non-local, irrelevant, monomials in ϕ,J,ψ,ψ;

  • D is the dilatation, acting on V(ϕ,J,ψ) as DV(ϕ,J,ψ):=V(Dϕ,DJ,Dψ), with Dψ(x)=γ-[ψ]ψ(x/γ) (recall: [ψ]=d/4-ϵ/2, see [1, eqs.(2.14),(2.15)]), while Dϕ(x)=γ-[ϕ]ϕ(x/γ), DJ(x)=γ-[J]J(x/γ), where [ϕ]=d-[ψ]+O(ϵ) and [J]=d-2[ψ]+O(ϵ) are two analytic functions of ϵ, for ϵ sufficiently small, to be determined in such a way that V, of the form described in Definition 2.3 below, is a solution of the FP equation V=RV. A simple argument, spelled out in Sect. 2.8 below8 shows that 2(d-[ϕ]) and 2(d-[J]) are the critical exponents of the response functions G and F, respectively: therefore, denoting by 2Δ1 and 2Δ2 these critical exponents, we rewrite the action of the dilatation operator on the external fields in terms of Δ1:=d-[ϕ], Δ2:=d-[J]:
    Dϕ(x)=γ-d+Δ1ϕ(x/γ),DJ(x)=γ-d+Δ2J(x/γ); 2.20
    we will see that Δ1=[ψ] and Δ2=2[ψ]+η2(ϵ), with η2(ϵ)=2ϵN-2N-8+O(ϵ2).

The fixed point potential in the non-interacting case.

Before introducing the notion of relevant and irrelevant operators, and giving a more formal definition of fixed point potential V, it is instructive to discuss the ‘Gaussian’ case corresponding, in the absence of external fields, to the trivial fixed point H(ψ)=0. Even in this case, the fixed point potential in the presence of the external fields, to be denoted by V0, is not trivial, and its structure is crucial to guarantee that the response functions G and F are scale-invariant, notwithstanding the presence of an ultraviolet cutoff. For H(ψ)=0, we let Δ1=[ψ] and Δ2=2[ψ] in (2.20), so that the action of the dilatation operator reduces to:

Dψ(x)=γ-d4+ϵ2ψ(x/γ),Dϕ(x)=γ-34d-ϵ2ϕ(x/γ),DJ(x)γ-d2-ϵJ(x/γ). 2.21

The non-interacting fixed point potential V0 we consider is the one obtained as the image of the ‘naive’ potential V0(ϕ,J,ψ):=(ϕ,ψ)+(J,ψ2) under the iterated action of the RG map DS(0), in the limit as the number of iterations goes to infinity:

V0(ϕ,J,ψ)=limn(DS(0))nV0(ϕ,J,ψ). 2.22

The action of S(0) on a potential V returns (see [1, Section 5.1]):

S(0)V(ϕ,J,ψ)=s11s!V(ϕ,J,ψ+·);;V(ϕ,J,ψ+·)stimes0(0),

where A1;;As0(0) denotes connected expectation of order s with respect to (w.r.t.) the Gaussian integration dμ0 with propagator g(0) (the lower label ‘0’ indicates that the expectation is computed w.r.t. a Gaussian, non-interacting, measure, while the upper label ‘(0)’ refers to the scale of the propagator g(0)). Using the fact that the naive potential V0(ϕ,J,ψ) is invariant under the action of D, one finds that (2.22) can be re-expressed as

V0(ϕ,J,ψ)=S(1)V0(ϕ,J,ψ), 2.23

where

S(1)V(ϕ,J,ψ)=s11s!V(ϕ,J,ψ+·);;V(ϕ,J,ψ+·)stimes0(1), 2.24

and A1;;As0(1) denotes connected expectation of order s w.r.t. the Gaussian integration dμ1 with propagator G(1), see (2.8). As well known (see also [1, Appendix D.2]), connected expectations w.r.t. a Gaussian Grassmann measure can be expressed in terms of connected Feynman diagrams associated with the corresponding propagator. Using this fact, (2.24) implies that the fixed point potential in (2.22) is V0(ϕ,J,ψ)=(ϕ,ψ)+(J,ψ2)+R0(ϕ,J,ψ)+S0(ϕ,J), where, if the two terms (ϕ,ψ) and (J,ψ2) in V0 are graphically represented as in Fig. 1, then R0 and S0 are graphically represented as in Fig. 2, with the solid lines representing the propagator G(1).

Fig. 1.

Fig. 1

The graphical representations of the two vertices (ϕ,ψ) and (J,ψ2), respectively

Fig. 2.

Fig. 2

The graphical representations of R0 and S0, respectively

In formulae, recalling the definition of P1 in (2.8):

R0(ϕ,J,ψ)==m1(-2)ma=1Nddy0ddymϕa(y0)P1(y0-y1)J(y1)P1(y1-y2)J(ym)ψa(ym)+m2(-2)m-1a,b=1NΩabddy1ddymψa(y1)J(y1)P1(y1-y2)J(ym)ψb(ym)S0(ϕ,J)==m0(-2)m-1a,b=1NΩabddy0ddym+1ϕa(y0)P1(y0-y1)J(ym))P1(ym-ym+1)ϕb(ym+1)+m1(-2)m-1Nmddy1ddymJ(y1)P1(y1-y2)J(ym)P1(ym-y1) 2.25

Therefore, the non-interacting fixed point generating function is:

W0(ϕ,J)=S0(ϕ,J)+logdμ0(ψ)e(ϕ,ψ)+(J,ψ2)+R0(ϕ,J,ψ), 2.26

from which a straightforward computation shows that

G0;ab(x):=δ2W0(ϕ,0)δϕa(x)δϕb(0)|ϕ=0=Ωab[P0(x)+P1(x)],F0(x):=δ2W0(0,J)δJ(x)δJ(0)|J=0=-2N[P02(x)+2P0(x)P1(x)+P12(x)], 2.27

which are scale invariant, as anticipated above.

Scaling dimension, relevant and irrelevant operators

Let us consider a monomial in ϕ,J,ψ of the form

M(ϕ,J,ψ)=dxdydzϕa1(x1)ϕan(xn)J(y1)J(ym)··11ψb1(z1)llψbn(zl)[Hn,m,l,p(x,y,z)]a,μ,b 2.28

with x=(x1,,xn), etc., pi{0,1}, μi{0,1,,d},9n+l even, Hn,m,l,p translationally invariant and of finite L1 norm, i.e.,

Hn,m,l,p:=maxa,μ,bdxdydz|[Hn,m,l,p(x,y,z)]a,μ,b|<+ 2.29

(here the on the integral indicates that we are not integrating over one of the elements of (x,y,z), say x1).

Remark 2.1

In order to make contact with the notation used in [1, Section 4.1] and for later use, given the n-ples a,x, the m-ple y and the l-ples p,μ,z, we shall also denote [Hn,m,l,p(x,y,z)]a,μ,b by H(a,x,y,B,z), with B=((p1,μ1,b1),,(pl,μl,bl)). Moreover, we let

Φ(a,x):=ϕa1(x1)ϕan(xn),J(y):=J(y1)J(ym)Ψ(B,z):=11ψb1(z1)llψbn(zl). 2.30

Without loss of generality, we can assume, and will do so from now on, that H(a,x,y,B,z) is: anti-symmetric under simultaneous permutations of the elements of a,x, symmetric under permutations of the elements of y; anti-symmetric under simultaneous permutations of the elements of B,z.

The action of D on M(ϕ,J,ψ) is defined as DM(ϕ,J,ψ):=M(Dϕ,DJ,Dψ). After a change of variables, this can be rewritten as:

DM(ϕ,J,ψ)==dxdydzϕa1(x1)ϕan(xn)J(y1)J(ym)··11ψb1(z1)llψbn(zl)[DHn,m,l,p(x,y,z)]a,μ,b 2.31

where

DHn,m,l,p(x,y,z):=γδsc(n,m,l,p)Hn,m,l,p(γx,γy,γz), 2.32

with

δsc(n,m,l,p):=d(n+m+l)-n(d-Δ1)-m(d-Δ2)-l[ψ]-p1, 2.33

defines the action of the dilatation operator D on the kernels. Note also that the L1 norm of Hn,m,l,p rescales as follows under the action of D:

DHn,m,l,p=γDsc(n,m,l,p)Hn,m,l,p, 2.34

where

Dsc(n,m,l,p):=δsc(n,m,l,p)-d(n+m+l-1):=d-n(d-Δ1)-m(d-Δ2)-l[ψ]-p1 2.35

is the scaling dimension of Hn,m,l,p. Depending on whether Dsc(n,m,l,p) is positive, vanishing or negative, we say that the corresponding monomial is relevant, marginal or irrelevant. Note that, anticipating the fact that Δ1=[ψ] and Δ2=2[ψ]+O(ϵ), the only relevant or marginal terms10 with l>0 are those with (n,m,l,p)=(0,0,2,0), (0,0,4,0), (1,0,1,0), (0,1,2,0), and (0,0,2,p) with p1=1, for which we have Dsc(0,0,2,0)=d/2+ϵ, Dsc(0,0,4,0)=2ϵ, Dsc(1,0,1,0)=Δ1-[ψ], Dsc(0,1,2,0)=Δ2-2[ψ], and Dsc(0,0,2,(1,0))=Dsc(0,0,2,(0,1))=d/2+ϵ-1.

Trimmed sequences

A potential H(ϕ,J,ψ) is a formal infinite sum of monomials, of the form

H(ϕ,J,ψ)==(n,m,l,p)La,μ,bdxdydzΦ(a,x)J(y)Ψ(B,z)[Hn,m,l,p(x,y,z)]a,μ,b 2.36

where

L:={(n,m,l,p):p=(p1,,pl)withpi{0,1},n,m,l,|p|0,n+leven,n+m+l1}, 2.37

and, given (n,m,l,p)L, the sums over a, μ and b run over the sets {1,,N}n, {0,1}l and {1,,N}l, respectively; moreover, we used the notations of (2.30), with B=((p1,μ1,b1), , (pl,μl,bl)). The formal sum in (2.36) should just be thought of as a way of representing the collection of kernels Hn,m,l,p. Therefore, in the following, we shall equivalently write a potential H either as in (2.36) or as

H={H}L. 2.38

We shall say that a sequence {H}L, with translationally invariant kernels H of finite L1 norm, is a trimmed sequence if the relevant or marginal kernels with =(0,0,2,0), (0,0,4,0), (1,0,1,0), (0,1,2,0), and (0,0,2,p) with p1=1 have the following local structure:

[H0,0,2,0(z)]b=c1δ(z1-z2)Ωb1b2,[H0,0,2,p(z)]μ,b=0,p:p1=1,[H0,0,4,0(z)]b=c2δ(z1-z2)δ(z1-z3)δ(z1-z4)qb1b2b3b4,[H1,0,1,0(x1,z1)]a1,b1=c3δ(x1-z1)δa1,b1,[H0,1,2,0(y1,z)]b=c4δ(y1-z1)δ(z1-z2)Ωb1b2, 2.39

where c1,c2,c3,c4 are constants, and qabce=ΩabΩce-ΩacΩbe+ΩaeΩbc is the totally anti-symmetric tensor, as in [1, Eq.(4.4)].

As discussed in Sect. 3, the RG transformation R is a map from the space of trimmed sequences of kernels to itself.

Remark 2.2

The non-interacting fixed point potential V0(ϕ,J,ψ)=(ϕ,ψ)+(J,ψ2)+R0(ϕ,J,ψ)+S0(ϕ,J), constructed in Sect. 2.2.1, can be written as V0={V0;}L, where the only non-zero kernels in the sequence are the following:

[V0;(1,m,1,0)(x1,y,z1)]a1,b1|ϵ=0==(-2)mδa1,b1δ(ym-z1)i=0m-1P1(yi-yi+1),m0[V0;(0,m,2,0)(y,z)]b1,b2|ϵ=0==(-2)m-1Ωb1,b2δ(z1-y1)δ(ym-z2)i=1m-1P1(yi-yi+1),m1[V0;(2,m,0,)(x,y)]a1,a2|ϵ=0=(-2)m-1Ωa1a2i=0mP1(yi-yi+1),m0V0;(0,m,0,)(y)|ϵ=0=(-2)m-1Nmi=1mP1(yi-yi+1),m1 2.40

where: P1 was defined in (2.8); in the first two lines we dropped the μ labels; in the first line, y0 should be interpreted as x1, and, for m=0, the right side should be interpreted as that of the third line of (2.39) with c3=1; for m=1, the right side of the second line should be interpreted as that of the fourth line of (2.39) with c4=1; in the third line, y0 and ym+1 should be interpreted as x1 and x2, respectively; in the fourth line, ym+1 should be interpreted as y1.

In particular, V0 is associated with a trimmed sequence, such that c1=c2=0 and c3=c4=1.

The fixed point potential

We are now in good position to define more precisely the fixed point potential V(ϕ,J,ψ) that we construct in this paper.

Definition 2.3

V={V}L is the solution of the fixed point equation V=RV in the space of trimmed sequences, such that: (1) V0,0,l,p=Hl,p, with Hl,p the kernels of the FP potential constructed in [1]; (2) for =(1,0,1,0), (0,1,2,0), V is as in (2.39) with c3=c4=1, i.e., the local terms (ϕ,ψ) and (J,ψ2) in V have pre-factor equal to 1; (3) the scaling exponents Δ1,Δ2 entering the definition of D and, therefore, of R, are analytic in ϵ for ϵ sufficiently small, and such that Δ1-[ψ]=O(ϵ), Δ2-2[ψ]=O(ϵ); (4) the kernels V with L\{(1,0,1,0),(0,1,2,0)} are analytic in ϵ for ϵ sufficiently small and, at ϵ=0, satisfy V|ϵ=0=V0;, with V0; as in (2.39) for {(1,m,1,0)}m1{(0,m,2,0)}m2{(2,m,0,)}m0{(0,m,0,)}m1, and equal to zero otherwise.

For the explicit form of the fixed point equation V=RV as a map from the space of trimmed sequences to itself, see Sect. 3.3 below.

Note that the existence and uniqueness of the FP potential V specified in Definition 2.3 is part of the results proved in this paper. As anticipated above, we will write

V(ϕ,J,ψ)=H(ψ)+(ϕ,ψ)+(J,ψ2)+R(ϕ,J,ψ)+S(ϕ,J), 2.41

where, letting11

Lext,0:={(n,m,0,)L},Lext,f:={(n,m,l,p)L:n+m>0,l>0}, 2.42

and Lext,f:=Lext,f\{(1,0,1,0),(0,1,2,0)}, we let: R={V}Lext,f and S={V}Lext,0.

Almost-scaling operators

The response functions are not correlation functions of any local operators built out the field ψ. We can however identify two quasi-local operators O(1) and O(2), whose two point functions will end up being the same as G and F, up to corrections that decay faster than any power at large distances. Because of these correction terms, we will call these operators almost-scaling operators. We do not expect that scaling operators with exactly scale invariant two point functions exist in our theory, due to the presence of the fixed ultraviolet cutoff χ(k).

In order to identify O(1) and O(2), let us expand V(ϕ,J,ψ) as

V(ϕ,J,ψ)=H(ψ)+(ϕ,O(1))+(J,O(2))+Q(ϕ,J,ψ)+S(ϕ,J), 2.43

where Q is the part of R that is at least quadratic in (ϕ,J), and S is the same as in (2.41). In other words, Oa(1)(x)=δV(ϕ,J,ψ)δϕa(x)|ϕ=J=0, and similarly for O(2)(x). From the definition of response functions, we find

Gab(x)=Oa(1)(x)Ob(1)(0)H+[E1(x)]ab,F(x)=O(2)(x);O(2)(0)H+E2(x), 2.44

where the correction terms E1,E2 are given by

[E1(x)]ab:=δ2S(ϕ,0)δϕa(0)δϕb(x)|ϕ=0+δ2Q(ϕ,0,ψ)δϕa(0)δϕb(x)|ϕ=0H,E2(x):=δ2S(0,J)δJ(0)δJ(x)|J=0+δ2Q(0,J,ψ)δJ(0)δJ(x)|J=0H. 2.45

Main results

Theorem 2.4

(Analyticity of the anomalous critical exponent and discrete scale invariance). There exists ϵ0>0 such that, for ϵBϵ0(0):={ϵC:|ϵ|<ϵ0}, there is a unique potential V as in Definition 2.3, analytic in ϵ in Bϵ0(0). Moreover, the response functions G and F defined in (2.10) are analytic in ϵ in the same domain, and behave under rescaling xρx, with ρ=γk, kZ, as

Gab(ρx)=ρ-2Δ1Gab(x),F(ρx)=ρ-2Δ2F(x), 2.46

with Δ1=[ψ] and Δ2=2[ψ]+η2(ϵ), where η2(ϵ) is analytic in ϵ for |ϵ|<ϵ0, with

η2(ϵ)=2ϵN-2N-8+O(ϵ2). 2.47

We actually expect that G and F are exactly scale invariant, which means that Eq.(2.46) should be true for any ρ>0: this will be proved in the third paper of this series, see also the recent paper [11] for a proof of full scale invariance with a different choice of the cutoff function. In this paper, we limit ourselves to show, by an explicit lowest-order computation (see Appendix B), that the dominant contributions in ϵ to G(x) and F(x) are exactly scale-invariant terms, namely G(x)=G0(x)+Gh.o.(x), where, in the sense of distributions [43],

G0;ab(x)=Ωabddk|k|d/2+ϵeikxΩabC0|x|-2Δ1 2.48

and the higher order correction Gh.o. satisfies |Gh.o.(x)|Cϵ|x|-2Δ1, for some C>0 independent of ϵ. Similarly, F(x)=F0(x)+Fh.o.(x), where

F0(x)=-2Nddk(2π)d|k|d/2+ϵddp(2π)d|p|d/2+ϵ-2η2ei(k+p)xC0|x|-2Δ2, 2.49

and |Fh.o.(x)|Cϵ|x|-2Δ2, for some C>0 independent of ϵ.

Theorem 2.5

(Almost-scaling operators) There exist Ci,ci>0,i=1,2 such that E1(x) and E2(x) are analytic in ϵ in the same domain Bϵ0(0) as in Theorem 2.4, and bounded as follows:

|[E1(x)]ab|C1e-c1|x|σ(min{1,|x|})-2Δ1,|E2(x)|C2e-c2|x|σ(min{1,|x|})-2Δ2, 2.50

with σ=1/s and s the order of the Gevrey class Gs which the UV cutoff function χ belongs to.

Putting together Eqs. (2.44) with Theorems 2.4 and 2.5, we conclude that the two point functions Oa(1)Ob(1)H and O(2);O(2)H are discrete scale invariant up to stretched-exponentially small corrections at large distances, i.e. that O(1) and O(2) are almost-scaling operators. As mentioned, we cannot hope for anything better than that.

Remark 2.6

In the non-interacting case discussed in Sect. 2.2.1, the stretched exponential decay of the correction terms, denoted by E0,1,E0,2 (the ‘0’ label recalling the absence of interaction), is immediate. In fact, rewriting the non-interacting fixed point potential V0 as in (2.43), we see that Oa(1)(x)=ψa(x) and O(2)(x)=ψ2(x). Therefore, for H=0, the two-point functions Oa(1)(x)Ob(1)(0)H and O(2)(x);O(2)(0)H reduce to ψa(x)ψb(0)0=ΩabP1(x) and ψ2(x);ψ2(0)0=-2NP02(x), respectively. Therefore, from (2.27) and the non-interacting analogue of (2.44), that is

G0;ab(x)=ψa(x)ψb(0)0+[E0,1(x)]ab,F0(x)=ψ2(x);ψ2(0)0+E0,2(x), 2.51

we see that E0,1,E0,2 are, explicitly:

[E0,1(x)]ab=ΩabP1(x)E0,2=-2N2P0(x)P1(x)+P12(x), 2.52

which can be easily shown to satisfy the decay bounds in (2.50).

Structure of the proof

The proofs of the Theorem 2.4 and 2.5 are based on the following considerations. First of all, from (2.6) we have:

W(ϕ,J)=limh-(TS(h+1)TS(0)V)(ϕ,J,0). 2.53

Now, recalling that the RG map R=D-(h-1)TS(h)DhDTS(0), for all h0, we see that (2.53) can be written as:

W(ϕ,J)=limh-Dh(R|h|V)(ϕ,J,0)=limh-DhV(ϕ,J,0) 2.54

where in the last equality we used that V is a fixed point for the RG map, i.e. RV=V. Denote by Vn,m,l,p the kernels of V, in the sense of (2.28). Using the definitions (2.10), and recalling the action (2.32) of D on the kernels, we find, letting x=(x,0),

G(x)=2limh-DhV2,0,0,(x)=2limh-γ2hΔ1V2,0,0,(γhx), 2.55

and, letting y=(y,0),

F(y)=2limh-DhV0,2,0,(y)=2limh-γ2hΔ2V0,2,0,(γhy). 2.56

After having defined, in Sect. 3, the fixed point equation for V, in Sect. 4 we will show that the kernels Vn,m,l,p, and in particular V2,0,0,,V0,2,0,, can be written in terms of a tree expansion that is absolutely convergent in a weighted L1 norm. As a consequence, these kernels, as well as the scaling exponents Δ1,Δ2, turn out to be analytic in ϵ for ϵ small enough. In particular Δ1=[ψ] and Δ2=2[ψ]+η2(ϵ), with η2 as in (2.47) (the explicit computation of the first order contribution is deferred to Appendix A).

In Sect. 5, we will prove the pointwise existence of the limits in (2.55) and (2.56), as well as the analyticity of the limiting functions. These will require to control the absolute convergence of the tree expansion for the kernels of the fixed point potential in a pointwise norm. The ideas here generalize, and adapt to the present context, those used in [38, 4446] to estimate the n-point correlation functions. Once the pointwise existence of the limits in (2.55)-(2.56) is established, the scale invariant property (2.46) is an immediate corollary: in fact, from (2.55) one finds, renaming h+kh,

G(γkx)=2limh-γ2hΔ1V2,0,0,(γh+kx)=2γ-2kΔ1limh-γ2hΔ1V2,0,0,(γx)γ-2kΔ1G(x), 2.57

provided the limit exists, and similarly for F, thus concluding the proof of Theorem 2.4.

Finally, in Sect. 6, we derive a tree expansion for the correction terms E1,E2, and show that its convergence in a pointwise norm introduced in Sect. 5 implies Theorem 2.5.

Renormalization Map and Fixed Point Equation

In this section we describe more in detail the RG transformation introduced in Sect. 2.2. Moreover, we write down the fixed point equation for V, including the equations for the scaling exponents Δ1,Δ2. The discussion follows the analogous one in [1, Section 5], which we refer to for additional details. Note that in this section we shall write down the components of the RG fixed point equation in the form of series, see in particular (3.20)-(3.21), to be considered as formal as long as convergence in an appropriate norm is proved. Absolute convergence of these sums in a suitable weighted L1 norm, see (4.5) below, is in fact addressed and proved in Sect. 4.

Integrating out

Consider a potential H(ϕ,J,ψ)={H}L, whose sequence of kernels is trimmed, in the sense of Sect. 2.4. Let us discuss the effect of integrating out the fluctuation field on scale 0 from H(ϕ,J,ψ):

Heff(ϕ,J,ψ)=S(0)H(ϕ,J,ψ), 3.1

with S(0) the integrating-out map on scale 0 defined in (2.19). In analogy with [1, Eq.(5.3)], using the notation introduced in Remark 2.1, the kernels of the effective interaction can be written as:

Heff(a,x,y,B,zB)=Ps11s!B1,...,BsiBi=BA1,...,AsAiBia1,,asx1,,xsy1,,ys(-)dzB¯C(zB¯)i=1sH(ai,xi,yi,Ai,zAi) 3.2

where: P is the operator that anti-symmetrizes under simultaneous permutations of the elements of a and x, symmetrizes over permutations of the elements of y, and anti-symmetrizes under simultaneous permutations of the elements of B and zB (which generalizes the antisymmetrization operator A of [1, Eq.(5.3)]); the sums over Bi and Ai must be interpreted as described after [1, Eq.(5.3)]; the sum over a1,,as is over all ways to represent a as a concatenation a1++as, and similarly for the sums over x1,,xs and over y1,,ys. Finally, letting, as in [1, Eq.(5.3)], B¯i=Ai\Bi and B¯=B¯1+B¯s, we denote C(zB¯):=Ψ(B¯1,zB¯1);;Ψ(B¯n,zB¯n)0(0) where Ψ(B¯i,zB¯i) is interpreted as in (2.30), and 0(0) denotes the expectation w.r.t. dμ0(ψ).

We compactly rewrite (3.2) as

(Heff)=s1(i)i=1sS1,...,s(H1,,Hs), 3.3

where belongs to the label set L in (2.37), while 1,,s belong to the subset of L ‘with at least one fluctuation field label’, i.e., to

Lf={(n,m,l,p)L:l>0}, 3.4

the label f standing for ‘fluctuation field’.

Trimming

Even if the input potential H={H}L is trimmed, the output Heff will not in general be so. However, we can act on Heff with a linear operator, equivalent to the identity in the sense of [1, Section 5.2.1], called the trimming operator T, which returns an equivalent trimmed potential. Denoting equivalence between potentials by the symbol , the action of the trimming operator will allow us to rewrite

HeffLHeff+IHeff, 3.5

with LHeff the local, relevant, part of Heff, and IHeff the non-local, irrelevant, part of Heff. The action of T on the kernels with n=m=0 has already been described in [1, Sect.5.2 and App.C] and won’t be repeated here. The action of T on the kernels with n+m>0 is non-trivial iff (nml) equals (1, 0, 1) or (0, 1, 2); in the complementary case, we let (IHeff)n,m,l,p=(Heff)n,m,l,p and (LHeff)n,m,l,p=0.

Let us now consider the cases (n,m,l)=(1,0,1), (0, 1, 2). As in the case without source fields, trimming involves localization and interpolation: localization extracts the local parts of (Heff)1,0,1,0 and (Heff)0,1,2,0 (cf. with [1, Eq.(5.12)]), as follows:

(LHeff)1,0,1,0=T1,0,1,01,0,1,0(Heff)1,0,1,0,(LHeff)0,1,2,0=T0,1,2,00,1,2,0(Heff)0,1,2,0, 3.6

(the operators T0,1,2,01,0,1,0 and T0,1,2,00,1,2,0 are defined in the following subsections), and we let

(LHeff)1,0,1,p=(LHeff)0,1,2,p=0forp0.

On the other hand, letting P1={(0),(1)} and P2={(0,0),(1,0),(0,1),(1,1)}, interpolation rearranges the difference between {(Heff)1,0,1,p}pP1 (resp. {(Heff)0,1,2,p}pP2) and its local part {(LHeff)1,0,1,p}pP1 (resp. {(LHeff)0,1,2,p}pP2) in such a way to equivalently rewrite it as {(IHeff)1,0,1,p}pP1 (resp. {(IHeff)0,1,2,p}pP2) with (IHeff)1,0,1,0=(IHeff)0,1,2,0=0. More precisely, we let

(IHeff)1,0,1,p=0ifp=0(Heff)1,0,1,p+T1,0,1,p1,0,1,0(Heff)1,0,1,0ifp1=1,(IHeff)0,1,2,p=0ifp=0(Heff)0,1,2,p+T0,1,2,p0,1,2,0(Heff)0,1,2,0ifp1=1(Heff)0,1,2,pifp1=2. 3.7

Identifying the kernels with the corresponding Grassmann monomials as in [1, Eq.(C.1)], the manipulations equivalent to the identity lead to the definitions of T1,0,1,p1,0,1,0 and T0,1,2,p0,1,2,0 are described in the following subsections.

Case (n,m,l)=(1,0,1)

. We will use the following interpolation identity (in most cases, we drop and leave implicit the component indices of the Grassmann fields; moreover, summation over repeated indices is understood), which is the same as [1, Eq.(5.8)]:

ψ(y)=ψ(x)+(y-x)μ01dsμψ(x+s(y-x)). 3.8

This is used to split a non-local but relevant term into a local relevant term plus an irrelevant one (for te definition of relevant and irrelevant, see after (2.35)). Hence considering ddxddzϕ(x)G(x,z)ψ(z) with G translationally invariant, playing the role of (Heff)1,0,1,0, we get:

ddxddzϕ(x)G(x,z)ψ(z)=ddxϕ(x)G^(0)ψ(x)+ddxddzϕ(x)G(x,z)(z-x)μ01dsμψ(x+s(z-x))ddxϕ(x)G^(0)ψ(x)+ddxddzϕ(x)Gμ(x,z)μψ(z), 3.9

with G^(0):=ddzG(x,z) and

Gμ(x,z)=01dssd+1G(x,x+(z-x)/s)(z-x)μ. 3.10

In light of this,

(T1,0,1,01,0,1,0G)(x,z)=G^(0)δ(x-z) 3.11

and, for p=(1),

[(T1,0,1,(1)1,0,1,0G)(x,z)]μ=Gμ(x,z) 3.12

By the same considerations as in [1, Appendix C], we have that T1,0,1,p1,0,1,0 satisfies the following norm bounds:

T1,0,1,p1,0,1,0GG,T1,0,1,(1)1,0,1,0Gmaxa,bddz|[G(0,z)]a,b||z| 3.13

and similarly for the weighted L1 norms to be used below.

Case (n,m,l)=(0,1,2)

Consider now ddyddz1ddz2J(y)ψ(z1)F(y,z)ψ(z2) with F translationally invariant, playing the role of (Heff)(0,1,2,0). Proceeding analogously we find:

ddydzJ(y)ψ(z1)F(y,z)ψ(z2)==ddydzJ(y)[ψ(y)F(y,z)ψ(y)+(z1-y)μ01dsμψ(y+s(z1-y))F(y,z)ψ(y+s(z2-y))+(z2-y)μ01dsψ(y+s(z1-y))F(y,z)μψ(y+s(z2-y))]p:p11ddydzJ(y)11ψ(z1)[Fp(y,z)]μ22ψ(z2), 3.14

with F0(y,z)=δ(z1-y)δ(z2-y)d2dzF(x,z),

F(1,0)(y,z)=(z1-y)μ01dss2d+1F(y,y+(z1-y)/s,y+(z2-y)/s), 3.15

and similarly for F(0,1). Then, identifying p with the pair (p1,p2):

(T0,1,2,00,1,2,0F)(y,z)=δ(z1-y)δ(z2-y)d2dzF(0,z),(T0,1,2,p0,1,2,0F)(y,z)=Fp(y,z),ifp1=1. 3.16

In analogy with (3.134.2), we have: T0,1,2,00,1,2,0FF, while, if p=(1,0),

T0,1,2,(1,0)0,1,2,0Fmaxa,bdz|[F(0,z)]a,b||z1|, 3.17

and similarly for p=(0,1).

Fixed point equation

We are now ready to write the definition of the renormalization map HRH=DTS(0)H component-wise. Recalling (3.1)-(3.3), the definition of the trimming map in the previous subsection, and the definition of the dilatation D in (2.32), for any L, we can write

(RH)=s1(i)i=1sR1,,s(H1,,Hs), 3.18

where the sum runs over s-ples of labels in the set Lf defined in (3.4) and, letting L={(0,0,2),(0,0,4), (1,0,1),(0,1,2)},

R1,,s=DS1,,s,if=(n,m,l,p)with(n,m,l)L,Tn,m,l,0n,m,l,0S(n,m,l,0)1,,s,if=(n,m,l,0)with(n,m,l)L,pTn,m,l,pn,m,l,pS(n,m,l,p)1,,s,if=(n,m,l,p)with(n,m,l)Landp0, 3.19

and in the second and third lines the operator Tn,m,l,pn,m,l,p is defined as follows: it is the identity, if p=p0; it is the one defined in Sects. 3.2.1-3.2.2 above, if (n,m,l)=(1,0,1),(0,1,2) and either p=p=0 or p=0, p1=1; it is given by [1, eq.s (5.12),(5.13),(5.14)] if (n,m,l)=(0,0,2) and either p=p=0 or p1<p1=2, or if (n,m,l)=(0,0,4) and either p=p=0 or p=0, p1=1; it vanishes, otherwise.

In view of these definitions, and recalling the fact that we look for a fixed point potential with pre-factor in front of the local terms (ϕ,ψ) and (J,ψ2) in V equal to 1 (see item (2) of Definition 2.3), the fixed point equation (FPE) for the ‘local’ components {(n,m,l,0)}(n,m,l)L reads:

ν=γd/2+εν+s1(i)i=1sR(0,0,2,0)1,,s(H1,,Hs)λ=γ2ελ+s1(i)i=1sR(0,0,4,0)1,,s(H1,,Hs)1=γΔ1-[ψ]+s1(i)i=1sR(1,0,1,0)1,,s(H1,,Hs)γΔ1-[ψ](1+ζ1)1=γΔ2-2[ψ]+s1(i)i=1sR(0,1,2,0)1,,s(H1,,Hs)γΔ2-2[ψ](1+ζ2) 3.20

where, again, the labels i in the sums in the right hand sides are summed over Lf, and the indicates the constraint that the term with s=1 and 1= should be excluded from the corresponding sums. The FPE for the components (0,0,2,p) with p1=1 is by construction trivial, 0=0, while the FPE for all the other components reads:

H=s1(i)i=1sR1,...,s(H1,,Hs). 3.21

Note that the FPE for the components =(n,m,l,p) with n=m=0 is the same as the one studied and solved in [1], the solution being the sequence of kernels Hl,p constructed there. In particular, the first two components of (3.20) are solved by the fixed point values λ,ν of λ,ν computed in [1], and proved there to be analytic in ϵ for ϵ sufficiently small. So, from now on, we will set λ=λ and ν=ν. Moreover, we will prove below that ζ1 and ζ2 are sums of convergent series in λ,ν, for ϵ sufficiently small and this implies that they are themselves analytic in ϵ for ϵ small. Letting Z1:=1+ζ1 and Z2:=1+ζ2, the FPE requires

Δ1=[ψ]-logγZ1,Δ2=2[ψ]-logγZ22[ψ]+η2. 3.22

We will see in Sect. 4.2.1 that ζ1=0, so that Δ1=[ψ]. Moreover, in Sect. 4.2.2 and Appendix A, we will show that

Z2=1-2(N-2)N-8ϵlogγ+O(ϵ2), 3.23

which gives η2=2ϵN-2N-8+O(ϵ2).

Solution to the FPE via the Tree Expansion

Let us now discuss how to determine the solution to the FPE introduced in the previous section, satisfying the properties spelled out in Definition 2.3. We use an analogue of the tree expansion discussed in [1, App.J], which provides an explicit analytic solution. Our construction automatically proves the uniqueness of the solution within the class of analytic potentials with a prescribed form at ϵ=0. We stress that our proof of uniqueness of the fixed point potential within the class of analytic functions via the use of tree expansions does not require that the scaling parameter γ is large, as most proofs based on contraction arguments usually do (including the one in [1, Section 6]); the proof in this and following sections just requires that γ>1. A priori, the radius of convergence may depend upon the choice of γ; however, the methods in [11], also based on the tree expansion, should even allow one to prove uniformity of the analyticity region as γ1+. These are remarkable advantages of the tree expansion method as compared to the use of Banach fixed point theorem. The drawback is that uniqueness is guaranteed in a much smaller space. Uniqueness of the solution in the larger Banach space of potentials that are close enough to the prescribed unperturbed potential in the appropriate weighted L1 norm, could be proved via a contraction argument similar to the one underlying the proof of [1, Key Lemma], under more restrictive assumptions on the scaling parameter γ, but we will not belabor the details of this proof here. Of course, we do not expect that the fixed point depends upon γ at all, but this remains to be proved, and we plan to do this in a third paper of this series; see also [1, Section 6.4].

As already mentioned above, we fix λ=λ, ν=ν, the fixed point values of the quartic and quadratic interactions computed in [1], once and for all. We also recall that our ansatz for the fixed point potential V requires that the local terms (ϕ,ψ) and (J,ψ2) have pre-factor equal to 1, see condition (2) in Definition 2.3, and that the components (0,0,2,p) with p1=1 are zero, by the requirement that {V}L is trimmed, see the second line of (2.39). We first describe how to solve the FPE for the remaining components, i.e., those in

L:=L\({(n,m,l,0)}(n,m,l)L{(0,0,2,p)}p1=1), 4.1

and then we will discuss the local components =(1,0,1,0),(0,1,2,0).

The FPE for L

The FPEs for the components L are those in (3.21). We proceed in a way similar to [1, Appendix J]. For any L, we isolate from the right side of the FPE the term with s=1 and 1=, i.e. the term DH, move it to the left side, and multiply both sides by (1-D)-1. The resulting equation takes the form

H=s1(i)i=1s(1-D)-1R1,,s(H1,,Hs) 4.2

where we recall that the second sum runs over s-ples of labels in Lf, see (3.4), and denotes the constraint that, if s=1, then 1, while R1,,s is defined in (3.19). As shown below, the (diagonal in ) operator (1-D) is invertible in L1 on all the components L: this is immediate for the components such that the scaling dimension at ϵ=0 is different from zero, Dsc()|ϵ=00, see (2.35), that is, for all the indices in L but (0,2,0,). In order for (1-D) to be invertible on this component as well, we need extra information about Δ2, besides knowing that Δ2=2[ψ]+O(ϵ), as we are assuming (see condition (3) in Definition 2.3). Anticipating the fact that Δ2=2[ψ]+2ϵN-2N-8+O(ϵ2), the desired invertibility for ϵ0 follows, because this explicit expression for Δ2 implies that Dsc(0,2,0,)=2ϵN+4N-8+O(ϵ2), which is different from zero for ϵ0.

We look for a solution in the form of a sum over rooted trees,

V=τH[τ], 4.3

The value H[τ] is fixed so that the following recursive equation is satisfied:

H[τ]=(i)i=1v0(1-D)-1R1,...,sv0(H1[τ1],...,Hn[τsv0]). 4.4

where τ1,,τsv0 are the subtrees of τ rooted in the vertices v1,,vsv0 that are ‘children’ of the root vertex v0 of τ. The rooted trees (with root v0) involved in the sum (4.3) have the structure exemplified in Fig. 3.

Fig. 3.

Fig. 3

An example of a tree rooted in v0, contributing to the sum in (4.3). Here sv0=3 and the 3 children of v0 are v1,v2,v3

The iterative application of (4.4) leads to a representation of the tree value H[τ] in terms of an iterated action of the operator (1-D)-1Rvv1,,sv, one per vertex v, summed over the labels v, vi (here the labels vi at exponent refer to the vertices v1,,vsv, which are the children of v on τ; the label v0 associated with the root v0 is the only one that is kept fixed, all the others are summed over). The labels v associated with vertices vv0 that are not endpoints are summed over Lf:=LfL, while, if v is an endpoint, then v takes one of the values in {(n,m,l,0)}(n,m,l)L, depending on the nature of the endpoint, as graphically described in Fig. 4.

Fig. 4.

Fig. 4

The four types of endpoints and the corresponding labels

In the evaluation of the tree value H[τ], each of these endpoints is associated with the kernel of the corresponding ‘interaction vertex’, see Fig. 5.

Fig. 5.

Fig. 5

The four ‘interaction vertices’, graphically representing the contributions associated with the four types of endpoints depicted in Fig. 4

For example, for the tree τ represented in Fig. 3, sv0=3 and the three subtrees τ1,τ2,τ3 ‘exiting’ from the root v0 are those represented in Fig. 6 (note that τ2 is ‘trivial’, in that it consists of a single vertex, which is both the root and the endpoint of τ2).

Fig. 6.

Fig. 6

The three subtrees τ1,τ2,τ3 exiting from the root v0 of the tree τ represented in Fig.3

We now intend to use the formula for the tree values described above in order to derive norm bounds on H[τ] and to prove that the tree expansion for H is absolutely convergent in the appropriate norms. We start by discussing bounds for the following weighted L1 norm of H[τ], generalizing the definition in (2.29). Recall that H[τ](x,y,z) with =(n,m,l,p) must be understood as a tensor-valued function of components [H[τ](x,y,z)]a,μ,b, as in (2.28). For notational convenience, in some of the equations below, we will equivalently rewrite these components as H[τ](a,x,y,B,z), with B=((p1,μ1,b1),,(pl,μl,bl)), as in Remark 2.1 (the label attached to H[τ](a,x,y,B,z) is actually redundant, but we will keep it for clarity); given such a B, we shall write p(B)=p. In analogy with (2.29), we let

H[τ]w:=maxa,B:p(B)=pdxdydz|H[τ](a,x,y,B,z)|w(x,y,z) 4.5

where

w(x,y,z):=eC¯(St(x,y,z)/γ)σ, 4.6

with: St(x,y,z) the Steiner diameter, or ‘tree distance’, of (x,y,z), see [1, footnote 19]; C¯12Cχ2 with Cχ2 the positive constant in (4.14) below; and σ=1/s with s the Gevrey regularity of χ, see the line after (2.2).

In order to recursively estimate the norm (4.5) of H[τ] via (4.4), note that, from (3.2) and (3.19), if =(n,m,l,p)L with (n,m,l)L, we can write

H[τ](a,x,y,B,zB)==D1-DP1sv0!B1,,Bsv0Bi=BA1,,Asv0AiBia1,,asv0x1,,xsv0y1,,ysv0(-)dzB¯C(zB¯)··i=1sv0Hi[τi](ai,xi,yi,Ai,zAi), 4.7

where ivi, and we used that for these components the trimming map is the identity. If, instead, =(n,m,l,p)L with (n,m,l)L and p0, then trimming acts non-trivially, and the FPE reads:

Hn,m,l,p[τ](a,x,y,B,zB)=D1-DpTn,m,l,pn,m,l,pP1sv0!B1,,Bsv0Bi=BA1,,Asv0AiBia1,,asv0x1,,xsv0y1,,ysv0×(-)dzB¯C(zB¯)i=1sv0Hi[τi](ai,xi,yi,Ai,zAi), 4.8

where, given B=((p1,μ1,b1),,(pl,μl,bl)) and an l-ple p such that Tn,m,l,pn,m,l,p0, the set B appearing in the right side in the condition Bi=B is equal to: B if p=p; B0:=((0,0,b1),,(0,0,bl)) if p=0; B(1,0)=((1,μ1,b1),(0,0,b2)) if l=2, p=(1,1) and p=(1,0); and B(0,1)=((0,0,b1),(1,μ2,b2)) if l=2, p=(1,1) and p=(0,1) (these two last cases are the only ones where p0,p).

Now, in order to bound the right sides of (4.7) and (4.8) we recall a few basic bounds from [1] (or their analogues adapted to the present more general context). First of all, as in [1, (5.37)], for L,

D(H[τ])wγDsc()H[τ]w(·/γ)γDsc()H[τ]w, 4.9

with Dsc() as in (2.35). Note that, assuming Δ1 and Δ2 to be ϵ-close to [ψ] and 2[ψ], respectively, with ϵ small enough, then minL\{(0,2,0,0)}|Dsc()|=min{1,d/2}+O(ϵ). Therefore, we also have that, for L\{(0,2,0,)},

(1-D)-1(H[τ])wdγH[τ]w, 4.10

with dγ=maxL\{(0,2,0,)}|1-γDsc()|-1, which is finite and bounded from above, uniformly in ϵ. On the other hand, recalling that Δ2=2[ψ]+η2 with [ψ]=d/4-ϵ/2, as in (3.22),

(1-D)-1(H(0,2,0,0)[τ])wαγH(0,2,0,)[τ]w, 4.11

where αγ:=|1-γ-2ϵ+2η2|-1, which is finite and of order ϵ-1 iff ϵ0 and η2ϵ. From the first order computation of η2 in Appendix A, which implies η2=2ϵN-2N-8+O(ϵ2), see (2.47), we see that this condition is always verified for ϵ0 small enough.

Concerning the action of the trimming operator, for any =(n,m,l,p)L and pp such that Tn,m,l,pn,m,l,p does not vanish, we have the analogue of [1, (5.43)]:

Tn,m,l,pn,m,l,pH(n,m,l,p)w(·/γ)CRγp-p1H(n,m,l,p)w. 4.12

For the estimate of S1,,s, with L, 1,,sLf, we proceed as follows. From [1, Eq.(5.39)], we see that C(z) satisfies:

|C(z)|CGHsT(z,z)TM(z-z) 4.13

where CGH constant given by the Gram-Hadamard bound [1, Lemma D.2] and M as in [1, Eq.(4.15)], i.e., such that:

|ga,b(0)(x)|,|νga,b(0)(x)|,|μ,νga,b(0)(x)|M(x)Cχ1e-Cχ2|x/γ|σ, 4.14

where Cχ1,Cχ2 are constants depending on χ but independent of γ and σ=1/s(0,1), with s the Gevrey regularity of χ, see the line after (2.2).

Using these estimates, and proceeding as in [1, Sect. 5.6] and [1, App.E], we get, letting =(n,m,l,p) and i=(ni,mi,li,pi):

S1,,sv0(H1[τ1],,Hsv0[τsv0])wCγsv0-1C0i=1v0li-lN1,,sv0i=1sv0Hi[τi]w, 4.15

where N1,,sv0 is the number of ways in which =(n,m,l,p) can be realized, given 1,,sv0, via the action of S1,,sv0 on (H1[τ1],,Hsv0[τsv0]), which is such that

pN(n,m,l,p)1,,sv0i=1v0lil. 4.16

Moreover, Cγ=N2d2Mw=Cost·γd and C0 a constant independent of γ, see [1, Remark J.1]. Recall also that S1,,sv0 is non-zero only if i=1v0lil+2(sv0-1), i=1v0ni=n and i=1v0mi=m.

Plugging eqs.(4.9)–(4.12) and (4.15) into (4.4), with R1,,sv0 defined as in (3.19), we obtain:

H[τ]w(i)i=1v0D1-DTS1,,sv0(H1[τ1],,Hsv0[τsv0])w(αγdγ)1(=(0,2,0,))(i)i=1v0dγγDsc()CRγ2Cγsv0-1C0i=1v0li-lN1,,sv0i=1sv0Hi[τi]w, 4.17

where N1,,sv0 denotes the number of ways in which =(n,m,l,p) can be realized, given 1,,sv0, via the action of R1,,sv0 on (H1[τ1],,Hsv0[τsv0]). Recalling the definition of R1,,s in (3.19), and in the particular the definition of the components Tn,m,l,pn,m,l,p of the trimming operator given right below (3.19), as well as the bound on N1,,sv0 stated right after (4.15), we find:

pN(n,m,l,p)1,,sv0i=1v0lil·1if(n,m,l)L4if(n,m,l)L4i=1v0lil, 4.18

where p denotes the sum over the p’s such that (n,m,l,p)L, and 4 is the maximum number of different p’s for which, given (n,m,l)L and p{0,1}l, the tuple (n,m,l,p) is in L and the operator Tn,m,l,pn,m,l,p is non zero (such maximum is realized for (n,m,l)=(0,0,4) and p=0; in this case, the different p’s with the stated property are: (1, 0, 0, 0), (0, 1, 0, 0), (0, 0, 1, 0), (0, 0, 0, 1)).

By using iteratively the estimates above, and recalling that |λ|,|ν|Kϵ for some K>0, we find

H[τ]w(αγ/dγ)1(=(0,2,0,))··{v}(vnot e.p.dγCγsv-1γDsc(v)CRγ2C0i=1vlvi-lvNvv1,,vsv)·(ve.p.(Kϵ)δnv+mv,0) 4.19

where the sum over {v} in the right hand side runs over Lf=LLf for each v associated with one the vertices of the tree other than the root v0 and the endpoints; moreover, we denoted v=(nv,mv,lv,pv), and vi is the i-th child of v. Let us note that, thanks to the definition of the trimming map, Dsc(v)-lv12<0 for all vLf. If we now first sum over the choices of pv, given (nv,mv,lv), for all the vertices v of τ other than the root v0 and the endpoints, using (4.18) we get:

H[τ]w(αγ/dγ)1(=(0,2,0,))γDsc()+l/12··{lv}(vnot e.p.KCγsv-1γ-lv/12C0i=1vlvi-lvi=1slvilv)·(ve.p.(Kϵ)δnv+mv,0) 4.20

where: v0=(n,m,l,p); the sum over {lv} runs over the positive integers, lv1, for all the vertices v of τ other than the root v0 and the endpoints; and K=4dγCRγ2. Now, letting ne.p.[τ] be the number of endpoints of τ, we have that:

  1. the number of vertices of τ that are not endpoints is 2ne.p.[τ] (see [1, eq.(J.10)]);

  2. EMPTY vnot e.p.Cγsv-1=Cγne.p.[τ]-1;

  3. EMPTY vnot e.p.C0i=1vlvi-lv=C0-lve.p.C0vC04ne.p.[τ]-l;

  4. EMPTY {lv}vnot e.p.γ-lv/12i=1slvilv(1-γ-1/12)-4ne.p.[τ] (see [47, Appendix A.6.1]).

Therefore, for any γ>1,

H[τ]w(αγ/dγ)1(=(0,2,0,))γDsc()Cγ-1(γ112/C0)l(Kϵ)-(n+m)··C01-γ-1124(K)2CγKϵne.p.[τ]. 4.21

In view of (4.21), recalling that the number of the trees with k endpoints is less than 4k, see e.g. [47, Lemma A.1], the sum over trees in the right hand side of (4.3) converges absolutely for any γ>1 and ϵ small enough in the weighted L1 norm (4.5).

Remark 4.1

Note that (4.21) is increasing in C0, so that, if desired, for any prescribed ρ1, we can make the factor γDsc(n,m,l,p) (γ112/C0)l in the right and side of (4.21) smaller than Cn,mρ-l for some Cn,m>0, possibly at the cost of increasing C0, thus getting:

Hn,m,l,p[τ]w(αγ/dγ)1(=(0,2,0,))Cn,mρ-l(Cρϵ)ne.p.[τ](Kϵ)-n-m, 4.22

for any ρ1 and some ρ-independent constants Cn,m,C,K>0.

The FPE for the local terms. Analyticity of the scaling exponents

Consider now the components of the FPE associated with the local parts of the effective potential, (3.20). We focus on the last two components of the equation, the first two having been discussed and solved in [1]. Using the definition of D and the second line of (3.19), we see that in those components we can replace γ[ψ]-Δ1R(1,0,1,0)1,,s(H1,,Hs) by T1,0,1,01,0,1,0S(1,0,1,0)1,,s(H1,,Hs), and similarly for the component with =(0,1,2,0), thus getting that, at the fixed point,

ζ1=s1(i)i=1sT1,0,1,01,0,1,0S1,,s(V1,,Vs),ζ2=s1(i)i=1sT0,1,2,00,1,2,0S1,,s(V1,,Vs). 4.23

To get, out of this, a representation of ζ1,ζ2 in terms of a convergent tree expansion, we insert the rewriting (4.3) in the right sides of (4.23), so that

ζ1=τH~1,0,1,0[τ],ζ2=τH~0,1,2,0[τ], 4.24

where the tree values H~[τ] with =(1,0,1,0),(0,1,2,0) are defined essentially in the same way as in the previous subsection, with the only difference that the root vertex v0 is associated with the action of an operator TS1,,sv0 rather than (1-D)-1R1,,sv0. In other words, for =(1,0,1,0),(0,1,2,0), we have H~[τ]=(i)i=1v0TS1,,sv0(H1[τ1],,Hn[τsv0]) where, recalling that 1,,sv0Lf, the values Hi[τi] for i{1,,sv0} have been constructed and bounded in the previous subsection. On the other hand, recalling that the weighted L1 norm of T is bounded by 1, we find that for =(1,0,1,0),(0,1,2,0) the norms H~[τ]w are bounded in a way analogous to (4.21), namely:

H~[τ]wCγ(Kϵ)-1(Kϵ)ne.p.[τ], 4.25

where we can choose Cγ=Cγ-1(γ112/C0)2 and K=(C01-γ-112)4(K)2CγK. Absolute summability over τ follows by the same considerations after (4.21). In conclusion, both ζ1 and ζ2 are expressed in terms of absolutely convergent tree expansions. Recalling that, for ϵ0,δ0>0 small enough:

  • EMPTY λ=λ(ϵ) and ν=ν(ϵ) are analytic functions of ϵ of order ϵ, for |ϵ|<ϵ0;

  • the single-scale propagator g(0) depends analytically upon ϵ for |ϵ|<ϵ0; therefore, the connected expectation C(z) in (3.2) (see [1, Appendix D] for the explicit representation of C(z) in terms of g(0)), which enters the definition of the ‘integrating out’ map S(0) and, as a consequence, of the tree values themselves, is analytic in ϵ in the same domain, as well;

  • the dilatation operator D in (2.32), which enters the definition of the tree values, is analytic in the scaling exponents Δ1 and Δ2, for |Δ1-[ψ]|<δ0 and |Δ2-2[ψ]|<δ0;

all the tree values H[τ] are analytic in (ϵ,Δ1,Δ2) in the domain

D0:={(ϵ,Δ1,Δ2)C3:|ϵ|<ϵ0,|Δ1-[ψ]|<δ0,|Δ2-2[ψ]|<δ0}.

Therefore, by absolute convergence of the tree expansion, uniform in D0, analyticity of the sums in the right sides of (4.23) follows in the same domain, by Weierstrass’ theorem on the uniform convergence of sequences of analytic functions. We shall then write:

ζ1=F1(ϵ,Δ1,Δ2),ζ2=F2(ϵ,Δ1,Δ2), 4.26

with F1,F2 analytic in D0.

The scaling exponent Δ1.

From the previous considerations and inspection of perturbation theory, it follows that ζ1=0. In fact, in view of the convergence of the tree expansion τH~1,0,1,0[τ]F1(ϵ,Δ1,Δ2), in order to prove that ζ1=0 it is enough to prove that any tree contributing to F1 has vanishing value. Note that the trees contributing to F1 have one ‘white square’ endpoint (i.e., the first in the second line of Fig. 4, corresponding to the third interaction vertex in Fig. 5) and k1 additional endpoints of type ν or λ (i.e., those in the first line of Fig. 4, corresponding to the first two interaction vertices in Fig. 5). It is straightforward to check that, for any such τ, by applying the definition of tree value, [H~1,0,1,0[τ](x1,z1)]a1,b1 is local, i.e., it is equal to δx1,z1Fa1,b1(τ) for some Fa,b(τ) that is a (in general infinite, absolutely convergent) linear combination of terms of the following form:

b2ga,b2(h)(x1-z2)fb2,b(z2)dz2, 4.27

for appropriate functions fb,b (with the correct Sp(N) invariance properties, such that (4.27) is in fact proportional to δa,b and independent of a). For example, it is instructive to check that the sum of the values of the trees with one white square endpoint and one additional endpoint, either of type ν or λ, is

b2[2νga,b2(0)(x1-z2)Ωb2,b+4λb3,b4qb2b3b4bh0γ(d+Δ1-5[ψ])hgab2(h)(x1-z2)gb3b4(0)(0)]dz2, 4.28

with qabcd the totally antisymmetric tensor defined after (2.39). Now, the key remark is that (the summand over b2 in) (4.27) is proportional to g^a,b2(h)(0), which is zero, because the support of the Fourier transform of g(h) does not contain the origin. Therefore, as anticipated above, all the contributions to F1 vanishing, thus implying that ζ1=0 and, therefore, recalling (3.22), Δ1=[ψ].

Remark 4.2

The considerations above, leading to the conclusion that the scaling exponent of the external field ϕ, coupled linearly to the fluctuation field ψ, has scaling dimension [ϕ]=d-[ψ], is a general fact, valid for any infrared, critical, even, interacting theory, treatable perturbatively close to a Gaussian fixed point: it implies that, in general, the critical exponent describing the asymptotic, large distance, polynomial decay of the interacting two point function ψ(x)ψ(y) is the same as the one associated with the Gaussian part of the infrared RG fixed point. This is true, in particular, in theories where the fluctuation field ψ has an infrared anomalous scaling dimension (i.e., [ψ] differs from the naive scaling dimension associated with the bare propagator), as it is the case, for example, for models in the ‘Luttinger liquid’ universality class, in their fermionic formulation (i.e., models admitting a large distance effective description in terms of 2D spinless fermions with quartic interaction), see [47].

The scaling exponent Δ2.

Contrary to the case of ζ1, the right hand side of the equation for ζ2 does not vanish. Recalling that Δ2 is related to ζ2 via (3.22), we rewrite the second equation of (4.26) as

ζ2=f2(ϵ,ζ2), 4.29

where f2(ϵ,ζ2):=F2(ϵ,[ψ],2[ψ]-logγ(1+ζ2)) is analytic in (ϵ,ζ2) in a small complex neighborhood of the origin. An explicit computation shows that f2(ϵ,ζ2)=-2ϵN-2N-8logγ+O(ϵ2,ϵζ2), see Appendix A. Therefore, applying the analytic implicit function theorem, see e.g. [48, Section 5.11], it follows that (4.29) admits a unique analytic solution ζ2(ϵ) in a neighborhood of the origin, satisfying ζ2(ϵ)=-2ϵN-2N-8logγ+O(ϵ2).

This concludes the proof of the part of the statement of Theorem 2.4 concerning the analyticity of V and of the scaling exponents, as well as the facts that Δ1=[ψ] and Δ2=2[ψ]+η2, with η2 as in (2.47).

Pointwise Bounds on the Response Functions

In this section, we prove the following result on the pointwise convergence of the limits in (2.55)-(2.56). Recall that the scaling exponents satisfy Δ1=[ψ] and Δ2=2[ψ]+η2, with η2 as in (2.47), as proved in the previous section. We make use of the same notations and conventions on trees, tree values, components of the renormalization map, etc., as in the previous two sections. Moreover, whenever possible, we will keep the flavor indices implicit (e.g., in the first line of (5.1) below we drop the ab indices labelling G, which should be then thought of as an N×N anti-symmetric matrix).

Proposition 5.1

There exists ϵ0>0 such that the limits in (2.55)-(2.56) exist and are analytic in |ϵ|<ϵ0, and, letting x=(x,0) and y=(y,0), they can be explicitly written as

G(x)=2τhZγ2hΔ1(i)i=1v0S2,0,0,1,,sv0(H1[τ1],,Hsv0[τsv0])(γhx),F(y)=2τhZγ2hΔ2(i)i=1v0S0,2,0,1,,sv0(H1[τ1],,Hsv0[τsv0])(γhy), 5.1

with the understanding that the sums in the right hand sides are absolutely summable in h and τ. Moreover, for any α>0 small enough, there exists Cα>0 such that

|2γ2hΔ1V2,0,0,(γhx)-G(x)|Cα|x|2Δ1(min{1,γh|x|})2[ψ]-α,|2γ2hΔ2V0,2,0,(γhy)-F(y)|Cα|y|2Δ2(min{1,γh|y|})2[ψ]-α. 5.2

As proved in (2.57), Proposition 5.1 implies the scale invariance property (2.46). Therefore, in view of the fact that the other statements of Theorem 2.4 have already been proved above, see the comment at the end of Sect. 4, Proposition 5.1 implies Theorem 2.4.

Proof of Proposition 5.1

Using the tree representation (4.3), we write:

γ2hΔ1V2,0,0,(γhx)=γ2hΔ1τH2,0,0,[τ](γhx),γ2hΔ2V0,2,0,(γhy)=γ2hΔ2τH0,2,0,[τ](γhy), 5.3

with H[τ] recursively defined as in (4.4). We emphasize that the trees τ contributing to the sum in the first line of (5.3) have two ‘white square’ endpoints, and those contributing to the second line have two ‘white rombus’ endpoints, see Fig. 4. Using (3.19), the identity (1-D)-1D=k1Dk with D as in (2.32), the definition of δsc in (2.33) (from which δsc(2,0,0,)=2Δ1 and δsc(0,2,0,)=2Δ2), and the fact that for =(2,0,0,),(0,2,0,) the trimming map is the identity, we get (after renaming h+kh):

γ2hΔ1H2,0,0,[τ](γhx)=h>hγ2hΔ1(i)i=1v0S2,0,0,1,,sv0(H1[τ1],,Hsv0[τsv0])(γx),γ2hΔ2H0,2,0,[τ](γhy)=h>hγ2hΔ2(i)i=1v0S0,2,0,1,,sv0(H1[τ1],,Hsv0[τsv0])(γy). 5.4

If we multiply by 2 both sides, sum over τ and take h-, we obtain the representations (5.1), provided that the sums in the right hand sides are absolutely summable in τ and h.

The right hand sides of (5.4) can be bounded via the following lemma that, for later purposes, is formulated in greater generality than required for the moment. In order to state the lemma, we define a mixed L1/L norm: using the same notations as in the definition of the weighted L1 norm (4.5), we let, for =(n,m,l,p)L,

H[τ](x,y):=maxa,B:p(B)dzB|H[τ](a,x,y,B,zB)| 5.5

with the understanding that, if =(n,m,0,), then Hn,m,0,[τ](x,y)] should be interpreted as being equal to maxa|Hn,m,0,[τ](a,x,y)|.

Lemma 5.2

Consider a tree τ contributing to one of the sums in the right sides of (5.3), denote by τ1,,τsv0 its subtrees rooted in v0, and by ne.p.[τ] be the number of its endpoints. Let x=(x,0) and y=(y,0). For any α>0 sufficiently small, there exists C=C(α)>0 such that, for any kZ, any l0 even and any p{0,1}l,

(i)i=1v0DkS2,0,l,p1,,sv0(H1[τ1],,Hsv0[τsv0])(x)C(Cϵ)ne.p[τ]-2γk(2Δ1-l[ψ]-p1)e-C¯2(γk-1|x|)σ(min{1,γk|x|})-α, 5.6

with D the dilatation operator and C¯ the same constant as in (4.6), and

(i)i=1v0DkS0,2,l,p1,,sv0(H1[τ1],,Hsv0[τsv0])(y)C(Cϵ)ne.p[τ]-2γk(2Δ2-l[ψ]-p1)e-C¯2(γk-1|y|)σ(min{1,γk|y|})-2Δ2+2[ψ]-α. 5.7

Assuming the validity of this lemma, the proof of Proposition 5.1 goes as follows. Let us focus, e.g., on the component with =(2,0,0,), the case =(0,2,0,) being analogous. Plugging (5.6) with k=h, l=0 and p= in the right hand side of the first line of (5.4), recalling that DS2,0,l,p1,,sv0(H1[τ1],,Hsv0[τsv0])(x) is just a rewriting of γ2hΔ1S2,0,l,p1,,sv0(H1[τ1],, Hsv0[τsv0])(γx), we find:

γ2hΔ1|H2,0,0,[τ](γhx)|C(Cϵ)ne.p[τ]-2|x|-2Δ1·h>he-C¯2(γh-1|x|)σmax{(γ|x|)2Δ1,(γ|x|)2Δ1-α}. 5.8

Now note that, for any β,κ>0, letting hx:=logγ|x|-1, (γ|x|)βe-κ(γ|x|)σ is bounded from above by γβ(h-hx)e-κγσ(h-hx-1), which is summable in h over Z. Therefore,

h>h(γ|x|)βe-κ(γ|x|)σCβ,κ:=hZγβhe-κγσ(h-1), 5.9

uniformly in h and |x|. For later purpose, let us also observe that

hh(γ|x|)βe-κ(γ|x|)σhhγβ(h-hx)e-κγσ(h-hx-1)Cβ,κifh>hxγβ(h-hx)/(1-γ-β)ifhhxCβ,κ(min{1,γh|x|})β, 5.10

for a suitable Cβ,κ>0. Using (5.9) in (5.8), we find that, for any α>0 small enough,

γ2hΔ1|H(2,0,0,[τ](γhx)|C(Cϵ)ne.p[τ]-2|x|-2Δ1, 5.11

for some C>0, uniformly in h. Since the right hand side of this inequality is summable over τ, the sum being bounded by (const.)|x|-2Δ1, this proves the absolute convergence of the sum in the right hand side of the first line of (5.1) and, therefore, as already observed after (5.4), it implies the very validity of the first line of (5.1).

Concerning the difference 2γ2hΔ1V2,0,0,(γhx)-G(x), using (5.1), (5.3), (5.4) and (5.6) with k=h, l=0 and p=, we find:

|2γ2hΔ1V2,0,0,(γhx)-G(x)|2τhhγ2hΔ1(i)i=1v0|S2,0,0,1,,sv0(H1[τ1],,Hsv0[τsv0])(γx)|2C|x|-2Δ1τ(Cϵ)ne.p[τ]-2hhe-C¯2(γh-1|x|)σmax{(γ|x|)2Δ1,(γ|x|)2Δ1-α}. 5.12

Now, using (5.10), we find that the sum over hh in the last line is bounded from above by (const.)(min{1,γh|x|})2Δ1-α. Moreover, recalling that the number of trees with k endpoints is smaller than 4k, see [47, Lemma A.1], and noting that the trees contributing to the sum in the last line have at least two endpoints (because τ has at least two ‘white square’ endpoints), we see that (Cαϵ)ne.p[τ]-2 is summable over τ, and the sum is bounded by a positive constant independent of ϵ. In conclusion,

|2γ2hΔ1V2,0,0,(γhx)-G(x)|C|x|-2Δ1(min{1,γh|x|})2Δ1-α,

which is the desired estimate in the first line of (5.2), up to a redefinition of Cα.

The proof of the second line of (5.1) and of (5.2) is completely analogous and left to the reader.

We are left with proving Lemma 5.2.

Proof of Lemma 5.2

We focus on the proof of (5.6), the one of (5.7) being analogous (we will make a few comments at the end on the minor differences between the two cases). We recall that x=(x,0).

In order to obtain a point-wise bound on the left hand side of (5.6), we intend to apply iteratively the definition of tree value, similarly to what we did in Sect. 4. We recall that the trees τ contributing to the sum in the first line of (5.3) have two ‘white square’ endpoints, which will be denoted v1 and v2. Note that the coordinates associated with these endpoints are fixed, i.e., not integrated out in the computation of the tree value: this implies that, for the purpose of recursively deriving bounds on the values of the subtrees of τ, we must be careful in proceeding slightly differently, depending on whether the subtree under consideration contains both v1 and v2, or just one of them, or none.

We define v12 to be the rightmost vertex of τ that is an ancestor both of v1 and of v2, and we let nτ be the length of the path connecting the root vertex v0 with v12, see Fig. 7 and Fig. 8 below. (Fig. 7 illustrates the case nτ=0, where v12v0, while Fig. 8 illustrates the case nτ=n>0, where v12>v0.)

Fig. 7.

Fig. 7

Proof of Lemma 5.2, the case with nτ=0. The two subtrees rooted in v1 and v2 are denoted by τ1 and τ2

Fig. 8.

Fig. 8

Proof of Lemma 5.2, the case with n=nτ1

Let us first discuss the case that nτ=0, i.e., v1 and v2 belong to two different subtrees of τ rooted in two distinct children vertices of v0v12, called v1 and v2, respectively; the two subtrees rooted in v1 and v2 will be denoted by τ1 and τ2, respectively, see Fig. 7.

In this case, recalling the definition (5.5) and proceeding as in the proof of (4.15), we get:

DkS2,0,l,p1,,sv0(H1[τ1],,Hsv0[τsv0])(x)eC¯(γk-1|x|)σ=γkδsc(2,0,l,p)γ-kldS2,0,l,p1,,sv0(H1[τ1],,Hsv0[τsv0])(γkx)eC¯(γk-1|x|)σγk(2Δ1-l[ψ]-p1)sv0!C0i=1v0li-lN(2,0,l,p)1,,sv0(T(z,z)T(z,z)0N2d2Mw)··supx{N2d2M(x)eC¯(|x|/γ)σ}i=1sv0Hi[τi]w, 5.13

where C¯ is the same as in (4.6), δsc(2,0,l,p) is given by (2.33), and γ-kld comes from the rescaling of the z variable in ·.

The summation in the right hand side of (5.13) is over the anchored trees described in [1, Appendix D.4] (see also (4.13)), 0 is an element of T, chosen arbitrarily among those in the path from the group of points associated with τ1 and the one associated with τ2 (say, the one closest to the group associated with τ1), and the factor supx{M(x)eC¯(|x|/γ)σ} comes from the factor M associated with 0. Now, recalling that M(x)=Cχ1e-Cχ2|x/γ|σ and C¯12Cχ2, bounding the sum over T as in [1, Appendix D.5], we find12

(i)i=1v0DkS2,0,l,p1,,sv0(H1[τ1],,Hsv0[τsv0])(x)N2d2Cχ1γk(2Δ1-l[ψ]-p1)e-C¯(γk-1|x|)σ··(i)i=1v0Cγsv0-2(4C0)i=1v0li-lN(2,0,l,p)1,,sv0i=1sv0Hi[τi]w. 5.14

with Cγ=N2d2Mw. Now, in the right side of (5.14) we bound N(2,0,l,p)1,,sv0 from above by i=1v0lil, see (4.16), and we bound Hi[τi]wC(ρ)-li(Cϵ)ne.p.[τi]-ni via (4.22); here ni is the first component of i=(ni,mi,li,pi) (by construction n1=n2=1 and ni=0 for i>2) and C is a ρ-dependent constant; therefore, choosing ρ1 sufficiently large, we can easily sum over (i)i=1v0, thus obtaining (noting that sv0ne.p.[τ]):

(i)i=1v0DkS2,0,l,p1,,sv0(H1[τ1],,Hsv0[τsv0])(x)C(Cϵ)ne.p.[τ]-2(4C0)-lγk(2Δ1-l[ψ]-p1)e-C¯(γk-1|x|)σ, 5.15

for some C>0, which proves (5.6) for nτ=0 (simply because 1(min{1,γk|x|})-α for α>0), provided we choose C01/4 (the freedom to choose C0 as large as desired follows, as already observed in Remark 4.1, from the monotonicity of the right hand side of (5.15) on the choice of C0: recall, in fact, that C is proportional to C04, cf. with (4.21), and that 4ne.p.[τ]l).

Let us discuss next the case nτ1, in which v1 and v2 both belong to a common subtree among those rooted in the vertices immediately following v0 on τ, say to τ1. In this case, letting nnτ, we denote by v0, v1, , vnv12 the vertices of τ in the path from v0 to v12, as shown in Fig. 8.

For later reference, we introduce (and partly recall) the following notations and definitions. For any vertex v of τ, we denote by v=(nv,mv,lv,pv) the components of the label associated with v: if v=v0, then v0(2,0,l,p); if vv0 is not an endpoint, then v is summed over Lf, while, if v is an endpoint, v takes one of the values in {(n,m,l,0)}(n,m,l)L, depending on the nature of the endpoint, see Fig. 4. Moreover, for any vertex v of τ that is not an endpoint, we denote by vi(v) the i-th child of v and, if τv is a tree rooted in v, τi(v) is the subtree of τv rooted in vi(v). Correspondingly, we let i(v)vi(v) and denote i(v)=(ni(v),mi(v),li(v),pi(v)). Note that, for v0,v1,,vn in Fig. 8, we have vi=(2,0,lvi,pvi), where, for any 1in, lvi is summed over the even, positive, integers.

We will iteratively use the following basic estimates:

  1. For the vertices vj, j=0,,n-1 in Fig. 8, we use:
    Svj1(vj),,svj(vj)(H1(vj)[τ1(vj)],,Hsvj(vj)[τsvj(vj)])(x)1svj!C0i=1vjli(vj)-lvjNvj1(vj),,svj(vj)(T(z,z)TN2d2M1)·(i=2svjHi(vj)[τi(vj)]w)H1(vj)[τ1(vj)](x), 5.16
    which is proved in the same way as (4.15) or (5.13). Bounding once again the sum over T as in [1, Appendix D.5], we further obtain
    Svj1(vj),,svj(vj)(H1(vj)[τ1(vj)],,Hsvj(vj)[τsvj(vj)])(x)Cγsvj-1(4C0)i=1vjli(vj)-lvjNvj1(vj),,svj(vj)(i=2svjHi(vj)[τi(vj)]w)H1(vj)[τ1(vj)](x), 5.17
    with Cγ=N2d2Mw.
  2. Using (4.4), with R1,,sv0=DS1,,sv0 for any of the form =(2,0,l,p), see (3.19), we rewrite and bound each of the factors Hvi[τvi](x) in the right hand side of (5.16) (note that, for j=0,,n-1, 1(vj)=vi and τ1(vj)=τvi, with i=j+1=1,,n) as follows:
    Hvi[τvi](x)kvi1(j(vi))j=1viDkviSvi1(vi),,svi(vi)(H1(vi)[τ1(vi)],,Hsvi(vi)[τsvi(vi)])(x)=kvi1γkviδsc(2,0,lvi,pvi)γ-kvidlvi··(j(vi))j=1viSvi1(vi),,svi(vi)(H1(vi)[τ1(vi)],,Hsvi(vi)[τsvi(vi)])(γkvix), 5.18
    where we used that D(1-D)-1=kvi1Dkvi together with (2.32), and γ-kvidlvi comes from the rescaling of the z variables within the definition of the · norm.

Let us now explain how to apply these estimates for bounding the left hand side of (5.6): using once again the definition of D in (2.32), the fact that δsc(2,0,l,p)-ld=2Δ1-l[ψ]-p1, and the bound (5.17) with j=0 (note that v0=(2,0,l,p) and that the labels 1,,sv0 in (5.6) must be identified with 1(v0),,sv0(v0) in (5.17)), we get

(i(v0))i=1v0DkS2,0,l,p1(v0),,sv0(v0)(H1(v0)[τ1(v0)],,Hsv0(v0)[τsv0(v0)])(x)γk(2Δ1-l[ψ]-p1)(i(v0))i=1v0Cγsv0-1(4C0)i=1v0li(v0)-lv0Nv01(v0),,sv0(v0)·(i=2sv0Hi(v0)[τi(v0)]w)H1(v0)[τ1(v0)](γkx). 5.19

In order to bound the last factor in the last line, we apply (5.18) with i=1 and v1v1(v0), thus getting:

(i(v0))i=1v0DkS2,0,l,p1(v0),,sv0(v0)(H1(v0)[τ1(v0)],,Hsv0(v0)[τsv0(v0)])(x)γk(2Δ1-l[ψ]-p1)(i(v0))i=1v0Cγsv0-1(4C0)i=1v0li(v0)-lv0Nv01(v0),,sv0(v0)·(i=2sv0Hi(v0)[τi(v0)]w)kv11γkv1(2Δ1-lv1[ψ]-pv11)·(i(v1))i=1v1Sv11(v1),,sv1(v1)(H1(v1)[τ1(v1)],,Hsv1(v1)[τsv1(v1)])(γk+kv1x), 5.20

where we used once again that δsc(2,0,lv1,pv1)-dlv1=2Δ1-lv1[ψ]-pv11.

In order to bound the last line of (5.20), we iteratively apply (5.17) and (5.18) n-1 more times, write at each step δsc(2,0,lvi,pvi)-dlvi as 2Δ1-lvi[ψ]-pvi1, thus finding:

(i(v0))i=1v0DkS2,0,l,p1(v0),,sv0(v0)(H1(v0)[τ1(v0)],,Hsv0(v0)[τsv0(v0)])(x)γk(2Δ1-l[ψ]-p1)(i(v0))i=1v0(i(vn-1))i=1vn-1kv1,,kvn1(i=1nγkvi(2Δ1-lvi[ψ]-pvi1))·(i=0n-1Cγsvi-1(4C0)j=1vilj(vi)-lviNvi1(vi),,svi(vi)j=2sviHvj(vi)[τvj(vi)]w)·(i(vn))i=1vnSvn1(vn),,svn(vn)(H1(vn)[τ1(vn)],,Hsvn(vn)[τsvn(vn)])(γk+kv1++kvnx). 5.21

In order to bound the last line, recalling that v1 and v2 belong to two different subtrees of τvn, we use the analogue of Eqs.(5.13)–(5.14), which is proved in the same way:

(i(vn))i=1vnSvn1(vn),,svn(vn)(H1(vn)[τ1(vn)],,Hsvn(vn)[τsvn(vn)])(γk+kv1++kvnx)N2d2Cχ1e-C¯(γk+kv1++kvn-1|x|)σ·(i(vn))i=1vnCγsvn-2(4C0)i=1vnli(vn)-lvnNvn1(vn),,svn(vn)i=1svnHi(vn)[τi(vn)]w. 5.22

Plugging (5.22) in (5.21), and bounding each factor Hv[τv]w as in (4.22) (with ρ replaced by ρ), we get:

(i(v0))i=1v0DkS2,0,l,p1(v0),,sv0(v0)(H1(v0)[τ1(v0)],,Hsv0(v0)[τsv0(v0)])(x)C(Cρϵ)ne.p.[τ]-2(4C0)-l(i(v0))i=1v0(i(vn))i=1vnkv1,,kvn1e-C¯(γk+i=1nkvi-1|x|)σ·Nv01(v0),,sv0(v0)γk(2Δ1-l[ψ]-p1)(i=1nNvi1(vi),,svi(vi)γkvi(2Δ1-lvi[ψ]-pvi1))·(i=0n-1j=2svi(ρ4C0)-lj(vi))(j=1svn(ρ4C0)-lj(vn)) 5.23

for some C,C>0. We are left with sums over v1=(lv1,pv1), , vn=(lvn,pvn), and over (i(v0))i=2v0, , (i(vn-1))i=2vn-1, (i(vn))i=1vn. We first sum over pv1,,pvn and, using (4.16), we get:

(i(v0))i=1v0DkS2,0,l,p1(v0),,sv0(v0)(H1(v0)[τ1(v0)],,Hsv0(v0)[τsv0(v0)])(x)C(Cρϵ)ne.p.[τ]-2(4C0)-lγk(2Δ1-l[ψ]-p1)(i(v0))i=2v0(i(vn-1))i=2vn-1(i(vn))i=1vn··(i=0n-1(j=2svi(ρ4C0)-lj(vi)))(j=1svn(ρ4C0)-lj(vn))kv1,,kvn1e-C¯(γk+i=1nkvi-1|x|)σlv1,,lvn2j=1v0lj(v0)l(i=1nj=1vilj(vi)lviγkvi(2Δ1-lvi[ψ])), 5.24

where, if svi0=1 for some i0{0,,n-1}, then (i(vi0))i=2vi0(j=2vi0(ρ4C0)-lj(vi0)) should be interpreted as being equal to 1. In the last line, we bound j=1v0lj(v0)l from above by 2j=1v0lj(v0), and, recalling that Δ1=[ψ] and kvi1, we rewrite and bound: γkvi(2Δ1-lvi[ψ])=γ-kvi(lvi-2)[ψ]γ-(lvi-2)[ψ], so that, proceeding as in [47, Appendix A.6.1], the sum over lv1,,lvn in the last line can be bounded as follows:

2j=2v0lj(v0)lv1,,lvn22lv1(i=1nj=1vilj(vi)lviγkvi(2Δ1-lvi[ψ]))γ2[ψ]n2j=2v0lj(v0)lv1,,lvn02lv1(i=1nj=1vilj(vi)lviγ-lvi[ψ])γ2[ψ]n2j=2v0lj(v0)(1+2γ-[ψ])j=2v1lj(v1)(m=0n-2γ-m[ψ]+2γ-(n-1)[ψ])j=2vn-1lj(vn-1)(m=0n-1γ-m[ψ]+2γ-n[ψ])j=1vnlj(vn)γ2[ψ]n(21-γ-[ψ])i=0n-1j=2vilj(vi)+j=1vnlj(vn), 5.25

where in the last step we bounded max{2,maxn1{m=0n-1γ-m[ψ]+2γ-n[ψ])}} by 2/(1-γ-[ψ]).

Inserting this into (5.24) and noting that 1n2ne.p[τ] (the upper bound on n following from [1, Eq.(J.10)]), so that the factor γ2[ψ]n can be re-absorbed in a re-definition of C,C, we find:

(i(v0))i=1v0DkS2,0,l,p1(v0),,sv0(v0)(H1(v0)[τ1(v0)],,Hsv0(v0)[τsv0(v0)])(x)C(Cρϵ)ne.p.[τ]-2(4C0)-lγk(2Δ1-l[ψ]-p1)(i(v0))i=2v0(i(vn-1))i=2vn-1(i(vn))i=1vn··(i=0n-1(j=2svi(ρ(1-γ-[ψ])8C0)-lj(vi)))(j=1svn(ρ(1-γ-[ψ])8C0)-lj(vn))··kv1,,kvn1e-C¯(γk+i=1nkvi-1|x|)σ. 5.26

As above, if svi0=1 for some i0{0,,n-1}, then (i(vi0))i=2vi0(j=2vi0(ρ(1-γ-[ψ])8C0)-lj(vi0)) should be interpreted as being equal to 1. Choosing ρ larger than 8C0(1-γ-[ψ])-1, the sums

(i(v0))i=2v0(i(vn-1))i=2vn-1(i(vn))i=1vn(i=0n-1j=2svi(ρ(1-γ-[ψ])8C0)-lj(vi))··(j=1svn(ρ(1-γ-[ψ])8C0)-lj(vn))

are absolutely summable and bounded from above by (const.)ne.p.[τ], which can be also re-absorbed into a re-definition of C,C. In conclusion, for some C>0,

(i(v0))i=1v0DkS2,0,l,p1(v0),,sv0(v0)(H1(v0)[τ1(v0)],,Hsv0(v0)[τsv0(v0)])(x)C(Cϵ)ne.p[τ]-2(4C0)-lγk(2Δ1-l[ψ]-p1)kv1,,kvn1e-C¯(γk+i=inkvi-1|x|)σ=C(Cϵ)ne.p[τ]-2(4C0)-lγk(2Δ1-l[ψ]-p1)k¯nk¯-1n-1e-C¯(γk+k¯-1|x|)σ. 5.27

In order to bound the sum over k¯, we use that, for any α>0,

k¯-1n-1(k¯-1)n-1(n-1)!(αlogγ)1-nγ(k¯-1)α,

so that

k¯nk¯-1n-1e-C¯(γk+k¯-1|x|)σ(αlogγ)1-ne-C¯2(γk+n-1|x|)σk¯nγ(k¯-1)αe-C¯2(γk+k¯-1|x|)σ(αlogγ)1-ne-C¯2(γk+n-1|x|)σCα,C¯/2(min{1,γk|x|})-α, 5.28

where, in the last inequality, letting Cα,C¯/2 as in (5.9), we bounded k¯nγ(k¯-1)αe-C¯2(γk+k¯-1|x|)σ from above by:

k¯nγ(k¯-1)αe-C¯2(γk¯-1)σγ-αCα,C¯/2,ifγk|x|1,(γk|x|)-αk¯nγ(k+k¯-hx-1)αe-C¯2(γk+k¯-hx-2)σ(γk|x|)-αCα,C¯/2,ifγk|x|<1, 5.29

where hx was defined before (5.9). Plugging (5.28) in (5.27), and noting that 1n2ne.p[τ] (the upper bound on n following from [1, Eq.(J.10)]), we finally obtain the desired bound, (5.6), provided that C0 is chosen larger than 1/4 (once again, we have the freedom to choose C0 as large as desired, due to the monotonicity of the right hand side of (5.27) on C0: recall, in fact, that C is proportional to C04, cf. with (4.21), and that 4ne.p.[τ]l).

The proof of (5.7) is completely analogous, the only difference being that x must be replaced by y and Δ1 by Δ2. Note that, by changing Δ1 in Δ2, we get an extra factor γ(2Δ2-2[ψ])i=1nkvi in the analogues of the right hand side of (5.25) and of the following equations; in particular, it also reflects into the analogue of (5.27), which reads:

(i(v0))i=1v0S0,2,l,p1(v0),,sv0(v0)(H1(v0)[τ1(v0)],,Hsv0(v0)[τsv0(v0)])(y)C(Cϵ)ne.p[τ]-2(4C0)-lγk(2Δ2-l[ψ]-p1)k¯nk¯-1n-1γk¯(2Δ2-2[ψ])e-C¯(γk+k¯-1|y|)σ. 5.30

Bounding the sum over k¯ as explained after (5.27) and choosing C0 larger than 1/4 implies the desired estimate, (5.7).

Stretched Exponential Decay of the Correction Terms E1, E2

In this section we prove Theorem 2.5. We focus on the bound on E1, the bound on E2 being completely analogous (and, therefore, left to the reader). From the definition of E1 in (2.45), letting x=(x,0), we have:

[E1(x)]a,b=2[V2,0,0,(x)]a,b+[E1(x)]a,b, 6.1

where [E1(x)]a,b=δ2Q(ϕ,0,ψ)δϕb(0)δϕa(x)|ϕ=0H with Q(ϕ,J,ψ) defined in (2.43) and following line, i.e.,

Q={V}Lf(2,0) 6.2

(here, letting L(2,0):={(n,m,l,p)L:(n,m)=(2,0)}, we defined Lf(2,0):=L(2,0)\{(2,0,0,)}). The first term in the right hand side of (6.1) has already been analyzed in the previous sections, and proved to be analytic in ϵ for ϵ small. Moreover, as we shall see shortly, the tree representation (5.3) and the bounds derived in the preceding section on the tree values H2,0,0,[τ](x) readily imply the stretched exponential decay of V2,0,0,(x). Concerning the second term, we will prove below that it can be computed via a convergent expansion in which the kernels V2,0,l,p of Q are ‘contracted’ with those of H. Not surprisingly, E1(x) can be expressed once again in terms of a tree expansion, slightly different from the one of the preceding sections, in that it includes only a subset of the trees contributing to the scale-invariant, fixed-point, potential studied above. As we shall see, the trees contributing to E1 are characterized by a constraint on the ‘scale indices’ (called h,k1,k2, in the following), implying the desired stretched exponential decay. In order to simplify the analysis and to rely on the bounds derived in the preceding sections as much as possible, we shall define the trees contributing to E1 in terms of ‘dressed endpoints’ (rather than of the ‘bare endpoints’ in Fig. 4): these are the big white and black endpoints of, e.g., Fig. 9 below, representing the kernels V2,0,l,p and Hl,p, respectively. In order to estimate the values of the trees contributing to E1, we shall use the bounds on V2,0,l,p and Hl,p derived above and in [1], without re-expanding from scratch these kernels as sums over trees once again.

Fig. 9.

Fig. 9

A tree in T1, representing one of the contributions v[τ] in the right hand side of (6.11), with the action of the dilatation operator D associated with the root explicitly indicated. The elements of T1 consists of a root vertex v0, followed by sv01 children: the first (i.e., the topmost) one, denoted v1, is a big white dot, representing V1 (with 1 an index to be summed over Lf(2,0), such that 1), while the others are all big-black-dot endpoints, representing Hi, i=2,,sv0, where i are indices to be summed over L(0, 0)

Let us consider the first term in the right hand side of (6.1). As mentioned above, we already proved in the previous sections that it is analytic in ϵ for ϵ small. Moreover, using the first identity in (5.3) and the bound (5.8) with h=0, we have (dropping as usual the component labels):

|V2,0,0,(x)|Cα|x|-2Δ1τ(Cαϵ)ne.p[τ]-2k1e-C¯2(γk-1|x|)σ··max{(γk|x|)2Δ1,(γk|x|)2Δ1-α}Cα|x|-2Δ1e-C¯4(|x|/γ)σk1e-C¯4(γk-1|x|)σmax{(γk|x|)2Δ1,(γk|x|)2Δ1-α}, 6.3

where, in passing from the first to the second line, we performed the sum over τ of (Cαϵ)ne.p[τ]-2 (which is summable, and whose sum is bounded by an ϵ-independent constant), and we extracted part of the exponential factor from the sum over k. Now, if |x|1, the summand in the sum over k can be bounded from above by e-C¯4γσ(k-1)γ2kΔ1|x|2Δ1, so that the right hand side of (6.3) can be bounded from above by (const.)e-C¯4(|x|/γ)σ, with (const.)=Cαk1e-C¯4γσ(k-1)γ2kΔ1. On the other hand, if |x|1, the sum over k in the right hand side of (6.3) can be bounded via (5.9), so that the right hand side of (6.3) can be bounded from above by (const.)|x|-2Δ1e-C¯4(|x|/γ)σ. Putting the two cases together, we find

|V2,0,0,(x)|Ce-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1. 6.4

Note that the right hand side has the same form as that of the first inequality in (2.50). Therefore, in order to complete the proof of Theorem 2.5, we need to prove a comparable bound on E1(x), as well as its analyticity.

For this purpose, we derive a tree expansion for E1(x). We write (keeping, once again, the flavor indices implicit):

E1(x)=δ2Qeff(ϕ,0)δϕ(0)δϕ(x)|ϕ=0, 6.5

where, in analogy with (2.6) and (2.54),

Qeff(ϕ,J)=limh-logdμ[h,0](ψ)eH(ψ)+Q(ϕ,J,ψ)dμ[h,0](ψ)eH(ψ)limh-Dhv(h)(ϕ,J,0), 6.6

with

v(h)(ϕ,J,ψ):=R|h|(H+Q)(ϕ,J,ψ)-H(ψ), 6.7

and Q as in (6.2). Denoting by v(h) with L the kernels of v(h) (which are by construction non-vanishing only for indices =(n,m,l,p) such that n+m2), we can then rewrite

E1(x)=2limh-Dhv2,0,0,(h)(x)=2limh-γ2hΔ1v2,0,0,(h)(γhx). 6.8

In view of the definition (6.7) of v(h), of the fact that its kernels v(h) are non-vanishing only for indices =(n,m,l,p) such that n+m2, and of the representation (3.18) of the action of the RG map R in components, for any L(2,0)={(n,m,l,p)L:(n,m)=(2,0)}, for any h<0 we can write:

v(h)=s1s1Lf(2,0)(i)i=2sR1,,s(v1(h+1),H2,,Hs), 6.9

where we recall that Lf(2,0):=L(2,0)\{(2,0,0,)}, and the third sum in the right hand side runs over the (s-1)-ples of labels in L(0,0):={(n,m,l,p)L:(n,m)=(0,0)} (note that for any such label, of the form =(0,0,l,p), V0,0,l,pHl,p, with H the FP potential constructed in [1], see condition (1) in Definition 2.3; for this reason, with some abuse of notation, in (6.9) we wrote H in place of V). From (3.19) we see that, for any L(2,0), R1,,s=DS1,,s, so that, isolating from the right hand side of (6.9) the contribution with s=1 and 1=, we can rewrite:

v(h)=Dv(h+1)+s1s1Lf(2,0)(i)i=2sDS1,,s(v1(h+1),H2,,Hs), 6.10

where the on the second sum in the right hand side indicates the constraint that, if s=1, then 1. Note also that, by definition, for h=-1, the kernel v(0) in the right hand side is v(0)V, for all Lf(2,0), and zero otherwise. Therefore, for any L(2,0),

v(-1)=DV1Lf(2,0)+s1s1Lf(2,0)(i)i=2sDS1,,s(V1,H2,,Hs). 6.11

If we graphically represent any kernel V with L(2,0) by a big white dot, the first term in the right hand side, whenever it is there (i.e., for (2,0,0,)), can be represented as Inline graphic, while the second as a sum over trees τ of length 1 (the length being the maximal number of branches along a path from the endpoints to the root) as in Fig. 9.

We correspondingly write:

v(-1)=DV1Lf(2,0)+τT1v[τ], 6.12

where T1 is the family of trees of length 1 described in Fig. 9 and in its caption, and v[τ] is its value: if τ has sv0 endpoints, then v[τ]=sv01Lf(2,0)(i)i=2v0DS1,,sv0(V1,H2,,Hsv0).

We can easily iterate this procedure, via (6.10), thus ending up with the following tree representation for v(h):

v(h)=D|h|V1Lf(2,0)+L=1|h|kL0,k0,k1,,kL-11:k0++kL=|h|τTLv[τ,k], 6.13

where L represents the length of the tree (i.e., the number of branches crossed by the straight path from the root v0 to the big white end point, see Fig. 10), TL is the family of trees of length L described in Fig. 10 and in its caption, k:=(k0,k1,,kL) and v[τ,k]13 is the value of the tree τ, in the presence of the action of the dilatations Dk0, Dk1, , DkL associated with the vertices v0, v1, , vL, as in Fig. 10.

Fig. 10.

Fig. 10

A tree in TL with the action of the dilatations Dki associated with the vertices vi, i=0,,L explicitly indicated. For any L>1, the elements of TL are recursively characterized by the conditions that the root v0 has sv01 children, and that the first (i.e., the topmost) one, denoted v1, is the root of a tree in TL-1, while the other children are all big-black-dot endpoints. For L=1, the set T1 was described in Fig. 9. For any h such that |h|L, the integers k0,,kL satisfy: k0,,kL-11, kL0, and k0++kL=|h|; in particular, for L=1 and h-1, the vertices v0 and v1 are associated with two dilatations operators Dk0 and Dk1 with k01, k10 and k0+k1=|h|: the case depicted in Fig.9 (where v0 is associated with D, and v1 with the identity) is a special case corresponding to h=-1

Given τTL with L>1, letting τv1TL-1 be the subtree of τ rooted in v1, v[τ,(k0,,kL)], for L(2,0), is recursively defined as:

v[τ,(k0,k1,,kL)]=sv01Lf(2,0)(i)i=2v0Dk0S1,,sv0(v1[τv1,(k1,,kL)],H2,,Hsv0), 6.14

where the sums over 1 and over (i)i=1v0 must be interpreted as in (6.10), while, given τT1,

v[τ,(k0,k1)]=sv01Lf(2,0)(i)i=2v0Dk0S1,,sv0(Dk1V1,H2,,Hsv0). 6.15

The validity of the tree representation (6.13) with the tree values defined above can be straightforwardly proved by induction, and is left to the reader.

We now use this tree representation to compute and bound the right hand side of (6.8). We have:

Dhv2,0,0,(h)(x)=L=1|h|kL0,k0,k1,,kL-11:k0++kL=|h|τTLDhv2,0,0,[τ,k](x). 6.16

If τT1, using (6.15), the definition of D in (2.32), and the analogue of (5.17), we get that, for any k01, k10 such that k0+k1=|h|,

|Dhv2,0,0,[τ,(k0,k1)](x)|sv01Lf(2,0)(i)i=2v0γ2Δ1(h+k0)|S2,0,0,1,,sv0(Dk1V1,H2,,Hsv0)(γh+k0x)|sv01Lf(2,0)(i)i=2v0γ2Δ1(h+k0)Cγsv0-1(4C0)i=1v0liN(2,0,0,)1,,sv0··(i=2sv0Hiw)Dk1V1(γh+k0x). 6.17

Now, in the last line, for any i=2,,sv0, we use that

HiwτHi[τ]wCτ(Cϵ)ne.p.[τ]C(Cϵ)max{1,li2-1}, 6.18

where, in the second inequality, we used (4.22) with ρ=1 and the fact that the trees contributing to Hi, with i=(0,0,li,pi), necessarily have ne.p.[τ]max{1,li2-1}. Concerning the factor Dk1V1(γh+k0x), we rewrite it and bound it as follows: we use once again the tree representation (4.3) with H[τ] as in (4.4). Noting that for =(2,0,l,p) the trimming operator acts as the identity, and rewriting D1-D=k1Dk, with D as in (2.32), we find:

Dk1V1(γh+k0x)k1τ(i)i=1v0Dk+k1S11,,sv0(H1[τ1],,Hsv0[τsv0])(γh+k0x) 6.19

By Lemma 5.2, we thus obtain:

γ2Δ1(h+k0)Dk1V1(γh+k0x)Cτ(Cϵ)ne.p[τ]-2k1γ2Δ1(h+k0+k+k1)γ-(k+k1)(l1[ψ]+p11)·e-C¯2(γk+k1+h+k0-1|x|)σ(min{1,γk+k1+h+k0|x|})-αC(Cϵ)l12-1k1γ2Δ1kγ-(k+k1)(l1[ψ]+p11)e-C¯2(γk-1|x|)σ(min{1,γk|x|})-α, 6.20

where in the second inequality we performed the sum over τ (note that, for given l12, ne.p.[τ]-2l12-1, so that τ(Cϵ)ne.p[τ]-2(const.)(Cϵ)l12-1) and used the fact that k0+k1+h=0. By the same considerations discussed after (6.3), performing the sum over k1 we get:

γ2Δ1(h+k0)Dk1V1(γh+k0x)C(Cϵ)l12-1γ-k1(l1[ψ]+p11)e-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1. 6.21

Plugging (6.18) and (6.21) into (6.17), and using that N(2,0,0,)1,,sv02i=1v0li, gives:

|Dhv2,0,0,[τ,(k0,k1)](x)|sv0(C)sv0e-C¯4(|x|/γ)σ(min{1,|x|})-2Δ11Lf(2,0)(Cϵ)l12-1γ-k1(l1[ψ]+p11)··(i)i=2v0i=2sv0(Cϵ)max{1,li2-1}C(Cϵ)sv0-1e-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1γ-2k1[ψ]. 6.22

Remark 6.1

From (6.20), it is clear that the constraint k0+k1=|h| (or, in general, k0+k1++kL=|h| for trees τTL with L1, to be discussed in the following) is essential in proving the stretched exponential decay in (6.22). This constraint, first appearing in (6.13), has its origin in the recursive equation (6.10), which is linear in {v(h)}Lf(2,0)h0 (with v(0)V); in turn, such linearity in {v(h)}Lf(2,0)h0 originates from the fact that Q is quadratic in ϕ. In order to compare more closely the tree expansion for Dhv2,0,0,(h) in (6.13) with the one for DhV2,0,0, in the first line of (5.3) we can, if desired, re-expand the kernels V and H associated with the big white and black endpoints of the trees in TL in terms of the tree expansions discussed in Sect. 5 (for V) and in [1, Appendix J] (for H): this would lead to a new tree expansion for Dhv2,0,0,(h) (more complex, but closer to the tree expansion of the previous section) in terms of trees with ‘bare endpoints’ as those in Fig. 4. Such trees would be exactly of the same form as those contributing to DhV2,0,0,, such as those in Fig. 8, with the additional constraint on the scale labels k0+k1++kL=|h|, which was absent in the discussion in Sect. 5; in fact, the analogue of the combination h+k0+k1 in (6.20) and, more generally, of the combination h+k0+k1+kL appearing in the bounds below, is what in Sect. 5 was denoted k+kv1++kvn, see (5.22) and following equations; in those equations, the combination k+i=1nkvi could take arbitrarily negative values, and this was (rightly so) at the origin of the polynomial decay of the kernel of DhV2,0,0, in the limit h-, proved in the previous section.

We now proceed in a similar fashion, in order to bound the general term in the right hand side of (6.16). We take 1<L|h|, τTL, k=(k0,k1,,kL) with kL0, k0,k1,,kL-11, and h+k0+k1++kL=0. Using the same notation introduced before (5.16), thanks to (6.14), we have:

Dhv2,0,0,[τ,k](x)=sv0(i(v0))i=1v0Dh+k0S2,0,0,1(v0),,sv0(v0)(vv1[τv1,kv1],H2(v0),,Hsv0(v0))(x), 6.23

where (i(v0))i=1v01(v0)Lf(2,0)(i(v0))i=2v0, and kv1:=(k1,,kL); moreover, we recall that v11(v0). Using (the analogue of) (5.19) we get:

|Dhv2,0,0,[τ,k](x)|sv0(i(v0))i=1v0|Dh+k0S2,0,0,1(v0),,sv0(v0)(vv1[τv1,kv1],H2(v0),,Hsv0(v0))(x)|γ2Δ1(h+k0)(i(v0))i=1v0sv0Cγsv0-1(4C0)i=1v0li(v0)N2,0,0,1(v0),,sv0(v0)··(i=2sv0Hi(v0)w)vv1[τv1,kv1](γh+k0x). 6.24

We now apply again the recursive definition of vv1[τv1,kv1] and iterate the same procedure until we reach vL-1, thus getting:

|Dhv2,0,0,[τ,k](x)|γ2Δ1h(i(v0))i=1v0(i(vL-1))i=1vL-1×(j=0L-1svjCγsvj-1(4C0)i=1vjli(vj)-lvjNvj1(vj),,svj(vj)γkj(2Δ1-lvj[ψ]-pvj1)··(i=2svjHi(vj)w))DkLVvL(γh+k0++kL-1x), 6.25

with v0=(nv0,mv0,lv0,pv0)(2,0,0,).

Remark 6.2

Every collection of labels {(i(vj))i=1vj}j=0,,L-1 contributing to the right hand side of (6.27) satisfies the following constraints (recall that we write i(vj)=(ni(vj),mi(vj),li(vj),pi(vj), and l1(vj)lvj+1): for any j=0,,L-1, if vj is trivial, then lvjlvj+1-2 (with the understanding that lv00), while, if vj is non-trivial, then lvjlvj+1+i=2vjli(vj)-2(svj-1). In the following, we use that the sums over {(i(vj))i=1vj}j=0,,L-1 are performed under these constraints.

Now, recalling that h+k0+k1++kL=0 and using the analogue of (6.21), we have

γ2Δ1(h+k0++kL-1)DkLVvL(γh+k0++kL-1x)C(Cϵ)lvL2-1γ-kL(lvL[ψ]+pvL1)e-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1. 6.26

Inserting (6.18) and (6.26) into (6.25), summing over pv1,,pvL and using (4.16), implies:

|Dhv2,0,0,[τ,k](x)|Cne.p.[τ]e-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1(i(v0))i=2v0(i(vL-1))i=2vL-1×(j=0L-1(i=2svj(4C0)li(vj)(Cϵ)max{1,li(vj)2-1}))lvL(Cϵ)lvL/2-1(8C0)lvLγ-kLlvL[ψ]··lv1,,lvL-1(j=1L-1i=1vjli(vj)lvjγ-kjlvj[ψ]). 6.27

Now, in the last line, recalling that lvj2 and kj1, we can bound from above each factor γ-kjlvj[ψ] by γ-2kj[ψ]γ-(lvj-2)[ψ]; next, by proceeding as in [47, Appendix A.6.1] and in (5.25), we obtain:

lv1,,lvL-1(j=1L-1i=1vjli(vj)lvjγ-kjlvj[ψ])γ2[ψ](L-1)γ-2[ψ](k1++kL-1)(1-γ-[ψ])-j=1L-1i=2vjli(vj)(1-γ-[ψ])-lvL. 6.28

Hence, plugging (6.28) in (6.27), using γ-kLlvL[ψ]γ-2kL[ψ] and j=0L-1(svj-1)=ne.p.[τ]-1, we find

|Dhv2,0,0,[τ,k](x)|(C)ne.p.[τ]e-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1γ2[ψ](L-1)γ-2[ψ](k1++kL)··(i(v0))i=2v0(i(vL-1))i=2vL-1(j=0L-1(i=2svj(Cϵ)max{1,li(vj)2-1}))lvL(Cϵ)lvL/2-1 6.29

for a suitable C>0. In order to get the desired bound on Dhv2,0,0,(h)(x), uniformly as h- (see (6.8)), in view of (6.16), we still need to sum the right hand side of (6.29) over L, k and τ and show that the result of the sum is the same as the right hand side of (6.4) (up, possibly, to a redefinition of the constants).

Now, for the sums over k, we simply use

kL0k0,,kL-11k0++kL=|h|γ-2[ψ](k1++kL-L+1)(1-γ-2[ψ])L, 6.30

so that (letting k be a shorthand notation for kL0,k0,,kL-11k0++kL=|h|)

k|Dhv2,0,0,[τ,k](x)|Cne.p.[τ]+Le-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1··(i(v0))i=2v0(i(vL-1))i=2vL-1(j=0L-1(i=2svj(Cϵ)max{1,li(vj)2-1}))lvL(Cϵ)lvL/2-1 6.31

up to a redefinition of C. If we now performed the sums in the second line using (i(vj))i=2vj, lvL, by forgetting all the constraints on the indices (i(vj))i=2vj, lvL but li(vj)2 and lvL2, we would find that the second line of (6.31) would be bounded by Cj=0L-1(Cϵ)svj-1 for some C>0. By re-plugging this back into (6.31), we would be led to a bound that is summable over τTL (i.e., over svj1 for j=0,,L-1), but not over L, and we would be in trouble. Therefore, we must take better advantage of the constraints spelled out in Remark 6.2, by proceeding as follows.

Given L1 and τTL, we consider the corresponding set of vertices {v0,,vp} as in Fig. 11, and rewrite it as the union of the set Vt(τ) of ‘trivial’ vertices (i.e., those with only one child, svj=1) and of the set Vnt(τ) of ‘non-trivial’ ones (i.e., those with svj2). We let p=p(τ) be the cardinality of Vnt(τ) and, if p1, we denote Vnt(τ){vj1,,vjp}, with j1<<jp. We shall think the tuple (v0,v1,,vL) as a concatenation of the tuples (v0,,vj1), (vj1+1,,vj2), , (vjp+1,,vL). We let n1=j1+1, n2=j2-j1, , np+1=L-jp be the lengths of these tuples, and s1=svj1,,sp=svjp the numbers of children of vj1,,vjp. Note that the choice of the integers p0, n1,,np+11 (with n12 if p=0) and s1,,sp2 specifies uniquely the choice of L and τTL. Therefore, we shall identify the double sum over L1 and τTL with that over p0, n1,,np+11 (with n12 if p=0) and s1,,sp2.

Fig. 11.

Fig. 11

A tree in TL with L=9. Its non trivial vertices are v2 and v6, and s1sv2=4, s2sv6=3. The 10-ple (v0,,v9) is thought of as a concatenation of three tuples of length n1=3, n2=4, n3=3, respectively, namely of (v0,v1,v2), (v3,v4,v5,v6) and (v7,v8,v9)

Let us now use the constraints spelled out in Remark 6.2, which we recall here for the reader’s convenience: for j=0,,L-1, if vj is trivial, then lvjlvj+1-2 (with lv00), while, if vj is non-trivial, then lvjlvj+1+i=2vjli(vj)-2(svj-1). Therefore, if p=0, then lvL2(n1-1); while, if p1:

2(n1-1)lvj1lvj1+1+i=2s1li(vj1)+2(s1-1)lvj1+1+2(n2-1)lvj2lvj2+1+i=2s2li(vj2)+2(s2-1)lvjp-1+1+2(np-1)lvjplvjp+1+i=2spli(vjp)+2(sp-1)lvjp+1+2(np+1-1)lvL, 6.32

which implies, in particular, that every collection of labels contributing to the right hand side of (6.31) satisfies

i=2s1li(vj1)++i=2spli(vjp)+lvL2(n1-1)++2(np+1-1)+2(s1-1)++2(sp-1). 6.33

Therefore, the right hand side of (6.31) can be bounded from above by

Cne.p.[τ]+Le-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1(ϵ)[n1++np+1-p-2]+··(i(vj1))i=21(i=2s1(Cϵ)max{1,li(vj1)2-1})(i(vjp))i=2p(i=2sp(Cϵ)max{1,li(vjp)2-1})··lvL(Cϵ)lvL2-1 6.34

where [·]+:=max{0,·} indicates the positive part. If we now perform the sums in the second line by forgetting all the constraints on the indices (i(vjk))i=2k, lvL, but li(vjk)2 and lvL2, we find that the second line of (6.34) is bounded by Ck=1p(Cϵ)sk-1 for some C>0. In conclusion, plugging this back into (6.31), and recalling that k=1p(sk-1)=ne.p.(τ)-1 and k=1p+1nk=L+1, we find, up to a re-definition of C:

k|Dhv2,0,0,[τ,k](x)|Cn1++np+1(ϵ)[n1++np+1-p-2]+(Cϵ)k=1p(sk-1)e-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1, 6.35

with the understanding that, if p=0, the factor (Cϵ)k=1p(sk-1) should be interpreted as being equal to 1. Now, the right hand side of this equation is summable over p0, n1,,np+11 (with n12 if p=0) and s1,,sp2, the sum being bounded from above by Ce-C¯4(|x|/γ)σ (min{1,|x|})-2Δ1. In conclusion, in view of (6.16), we find

|Dhv2,0,0,(h)(x)|Ce-C¯4(|x|/γ)σ(min{1,|x|})-2Δ1, 6.36

as desired. Analyticity of Dhv2,0,0,(h)(x), uniformly in h, is a consequence of the absolute summability of its tree expansion, as well as of the uniform-in-h bounds that we just derived. A slight extension of the discussion above would also allow us to prove the existence of the limit in the right hand side of (6.8) and to derive explicit estimates on the speed of convergence to the limit. However, in order not to overwhelm an already lengthy discussion, we prefer not to discuss explicitly this point, which is left to the interested reader as a simple exercise. The bounds on E2(y) and E2(y) are completely analogous to those discussed above; the minor changes (mostly notational) required for adapting the previous estimates to these functions are left to the reader. The proof of Theorem 2.5 is thus concluded.

Acknowledgements

We gratefully acknowledge support from: the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme, ERC CoG UniCoSM, grant agreement n.724939 (A.G.) and ERC StG MaMBoQ, n.802901 (G.S.); MUR, PRIN 2017 project MaQuMA cod. 2017ASFLJR (A.G., V.M., G.S.); MUR, PRIN 2022 project MaIQuFi cod. 20223J85K3; GNFM-INdAM Gruppo Nazionale per la Fisica Matematica.

First Order Computation of ζ2

In this appendix, we calculate the first order contribution in ϵ to ζ2=Z2-1, which implies (2.47) for η2. We recall that ζ2 is expressed via a convergent tree expansion as in (4.24); isolating the first order from the higher order contributions implies:

ζ2=H~0,1,2,0[τ0]+H~0,1,2,0[τ1]+O(ϵ2), A.1

where τ0 and τ1 are the two trees in Fig. A.2 (the analogous trees with an endpoint of type ν replacing the endpoint of type λ give zero contribution). graphic file with name 220_2025_5414_Figa_HTML.jpg In order to compute H~0,1,2,0[τ0] and H~0,1,2,0[τ1], we recall that the kernel associated with the endpoint of type λ has the form in the third line of (2.39), with c2=λ3 and (see [1, (5.30), (G.7)]):

λ=λ=-2ϵlogγI2+O(ϵ2),I2=-4(N-8)Sd(2π)dlogγ+O(ϵ(logγ)2) A.3

(here Sd is the area of the unit sphere in Rd). An application of the definition of tree value and a straightforward computation shows that:

H~0,1,2,0[τ0]=-4(N-2)λddk(2π)df0(k)2|k|d+2ϵ,H~0,1,2,0[τ1]=-8(N-2)λddk(2π)dγd+Δ2-6[ψ]f0(k)f1(k)|k|d+2ϵ, A.4

where fh(k):=χ(γ-hk)-χ(γ-h+1k). Now, plugging these expressions in (A.1), using (A.3) and the fact that d+Δ2-6[ψ]=2ϵ+η2=O(ϵ), we find:

ζ2=-2ϵN-2N-8(2π)dSdddk(2π)df02(k)+2f0(k)f1(k)|k|d+O(ϵ2). A.5

A computation shows that ddk(2π)df02(k)+2f0(k)f1(k)|k|d=Sd(2π)dlogγ, which gives ζ2=-2ϵN-2N-8logγ+O(ϵ2), as already announced.

Proof of (2.48) and (2.49)

Using (2.55)-(2.56) and (5.3), we write:

G(x)=2limh-γ2hΔ1τH2,0,0,[τ](γhx),F(y)=2limh-γ2hΔ2τH0,2,0,[τ](γhy), B.1

From Proposition 5.1 and its proof we know that the limits in the right hand sides exist, and that the contribution to G(x) (resp. F(y)) from a given tree τ is bounded from above by C(Cϵ)ne.p.[τ]-2|x|-2Δ1 (resp. C(Cϵ)ne.p.[τ]-2|y|-2Δ2), for some C,C>0, see (5.11). Therefore, using the fact that the number of trees with k endpoints is smaller than 4k, we find that the sum of the contributions to G(x) (resp. F(y)) from the trees with 3 or more endpoints is bounded from above by Cϵ|x|-2Δ1 (resp. Cϵ|y|-2Δ2). Therefore, in order to prove (2.48), it is sufficient to prove that the contribution to G(x) from the tree(s) with 2 endpoints is equal to the right hand side of (2.48) up, possibly, to an error term of the order ϵ|x|-2Δ1, and similarly for (2.49).

Dominant contribution to G(x). Direct inspection shows that there is only one tree with 2 endpoints contributing to G(x), which is the following: graphic file with name 220_2025_5414_Figb_HTML.jpg whose contribution to G(x) is limh-h>h22hΔ1g(0)(γx), which implies (2.48).

Dominant contribution to F(y). Direct inspection shows that there are two trees with 2 endpoints contributing to F(y), which are the following: graphic file with name 220_2025_5414_Figc_HTML.jpg whose total contribution to F(y) is (denoting by ph(x) the scalar part of g(h)(x), i.e., gab(h)(x)Ωabph(x)):

-2Nlimh-h>hγh(4[ψ]+2η2)p0(γy)[p0(γy)+2k>0γk(2[ψ]+2η2)p0(γh+ky)]=-2NhZph(y)[γ2hη2ph(y)+2h>hγ2hη2ph(y)]. B.4

We let fh(k):=χh(k)-χh-1(k), with χh(k):=χ(γ-hk), and, after a relabelling of the scale indices, we rewrite (B.4) as:

-2NhZγ2hη2ph2(y)+2h<hph(y)ph(y)=-2NhZγ2hη2ddk(2π)d|k|d/2+ϵddp(2π)d|p|d/2+ϵei(k+p)·yfh(p)··fh(k)+2h<hfh(k)=-2NhZγ2hη2ddk(2π)d|k|d/2+ϵ··ddp(2π)d|p|d/2+ϵei(k+p)·y[χh(p)χh(k)-χh-1(p)χh-1(k)] B.5

where we used:

fh(k)+2h<hfh(k)=χh(k)-χh-1(k)+2χh-1(k)=χh(k)+χh-1(k). B.6

Now, noting that

(γ-h|p|)-2η2=1+01dsdds(γ-h|p|)-2sη2=1-2η2log(γ-h|p|)01ds(γ-h|p|)-2sη2, B.7

multiplying and dividing by |p|-2η2 in (B.5) we get:

(B.5)=-2NhZddk(2π)d|k|d/2+ϵddp(2π)d|p|d/2+ϵ-2η2ei(k+p)·y··χh(p)χh(k)-χh-1(p)χh-1(k)+4η2NhZddk(2π)d|k|d/2+ϵddp(2π)d|p|d/2+ϵ-2η2ei(k+p)·ylog(γ-h|p|)··o1ds(γ-h|p|)-2sη2[χh(k)χh(p)-χh-1(k)χh-1(p)]. B.8

We will prove below that the second addend in the right hand side can be bounded as:

4|η2|N|hZddk(2π)d|k|d/2+ϵddp(2π)d|p|d/2+ϵ-2η2ei(k+p)·ylog(γ-h|p|)··01ds(γ-h|p|)-2sη2[χh(k)χh(p)-χh-1(k)χh-1(p)]|Cϵ|y|-2Δ2, B.9

that is, this term can be included in the error term Fh.o.(y) defined and bounded in the lines preceding and following (2.49). On the other hand, the first term in the right hand side of (B.8) can be rewritten as follows: recall that the sum over h in Z should be interpreted as the limit as h- of the sum over h>h; therefore, using the telescopic structure of the summand and, more specifically, the fact that limh-h>hχh(p)χh(k)-χh-1(p)χh-1(k)=limh-(1-χh(k)χh(p))=1 (where the identities are in the sense of distributions), we see that the first term in the right hand side of (B.8) is equal to

F0(y)=-2Nddk(2π)d|k|d/2+ϵddp(2π)d|p|d/2+ϵ-2η2ei(k+p)·y=C0|y|d-2ϵ+2η2=C0|y|2Δ2, B.10

as desired.

We are left with proving (B.9). By adding and subtracting χh-1(k)χh(p) to the term in square brackets, we rewrite the second term in the right hand side of (B.8) as follows:

4η2NhZddk(2π)d|k|d/2+ϵddp(2π)d|p|d/2+ϵ-2η2ei(k+p)·ylog(γ-h|p|)··01ds(γ-h|p|)-2sη2[fh(k)χh(p)+χh-1(k)fh(p)]=4η2NhZddk(2π)d|k|d/2+ϵeik·yfh(k)··ddp(2π)d|p|d/2+ϵ-2η2eip·ylog(γ-h|p|)01ds(γ-h|p|)-2sη2χh(p)+4η2NhZddk(2π)d|k|d/2+ϵeik·yχh-1(k)··ddp(2π)d|p|d/2+ϵ-2η2eip·ylog(γ-h|p|)01ds(γ-h|p|)-2sη2fh(p)4η2NhZ01ds[ph(y)hhp~h;s,h(y)+Ph-1(y)p~h;s,h(y)] B.11

where we recall that ph(y) denotes the scalar part of g(h)(y) (i.e., gab(h)(y)Ωabph(y)) and, analogously, Ph(y) denotes the scalar part of G(h)(y), see (2.8); moreover,

p~h;s,h(y):=ddp(2π)d|p|d/2+ϵ-2η2eip·ylog(γ-h|p|)(γ-h|p|)-2sη2fh(p). B.12

Now, recall that, by (4.14) and the definition of ph,

|ph(y)|Cχ1γh(d/2-ϵ)e-Cχ2(γh-1|y|)σ, B.13

whose proof is given in [1, Appendix A.2]. In order to get a bound on ph;s,h(y) we proceed as follows: in the integral in the right hand side of (B.12), we rescale pγhp, thus getting:

p~h;s,h(y)=γh(d/2-ϵ+2η2)γ(h-h)2sη2·ddp(2π)d|p|d/2+ϵ+2(s-1)η2×eip·γhylog|p|-(h-h)logγf0(p) B.14

The integral in the second line can be bounded by proceeding exactly as in [1, Appendix A.2] (note, in particular, that F(p):=log|p| admits an analytic continuation into the polydisk centered at p0 of radius R=12maxi|pi| such that the maximum of |F(z)| in the polydisk is bounded by C(1+|F(p)|): this allows us to proceed as in [1, (A.15)] and following lines); we thus get, for some C1,C2>0:

p~h;s,h(y)C1(1+h-h)γh(d/2-ϵ+2η2)γ(h-h)2sη2e-C2(γh-1|y|)σ. B.15

We can now bound (B.11) via (B.13) and (B.15), thus getting, for some C>0 and C¯=min{Cχ2,C2}:

|4η2NhZ01ds[ph(y)hhp~h;s,h(y)+Ph-1(y)p~h;s,h(y)]|CN|η2|hZe-C¯(γh-1|y|)σhh(γh(d/2-ϵ)γh(d/2-ϵ+2η2)(1+h-h)01dsγ2s(h-h)η2+γh(d/2-ϵ)γh(d/2-ϵ+2η2))CϵhZγ2hΔ2e-C¯(γh-1|y|)σCϵ|y|-2Δ2 B.16

where we used that η2=O(ϵ). This conclude the proof of (2.49).

Funding

Open access funding provided by Università degli Studi Roma Tre within the CRUI-CARE Agreement.

Data Availability

The authors declare that the data supporting the findings of this study are available within the paper.

Declarations

Conflict of interest

The first author (A.G.) is on the editorial board of Communications in Mathematical Physics.

Footnotes

1

Other previous results on critical exponents of interacting field theories in the mathematical physics literature include the following. In the context of models with marginally irrelevant interactions, like ϕ44 theories, the large-distance asymptotic behavior of correlation functions is characterized by logarithmic corrections with specific, fractional, exponents, computed in [3234]; similar logarithmic corrections with fractional exponents are expected to characterize the short-distance asymptotic behavior of fermionic models with marginally relevant interactions, like the Gross-Neveu model in d=2: its exponents can be computed via a generalization of [3, 35, 36], even though they have not been explicitly worked out. In the context of 2D models with ‘marginally marginal’ interactions, i.e., marginal interactions with asymptotically vanishing beta function [37, 38], the exponents displayed by the large-distance behavior of correlation functions are analytic in the interaction strength in a small disk in the complex plane; universality for these exponents have been proved, as well, in the sense that extended scaling relations are verified [39, 40].

2

An alternative to our choice of keeping the ultraviolet cutoff fixed would be to send it to infinity, after appropriate rescaling of the field or density operators, thus obtaining a set of exactly scale invariant correlation functions, as done in [29, 30]. The corresponding scaling operators can in principle be obtained via a reconstruction theorem from the corresponding correlations, as done in [30], and identified with random Schwarz distributions, which the renormalized operators at finite ultraviolet cutoff converge to in suitable Sobolev norms, as the cutoff is removed. However, this strategy may be difficult, if not impossible, to work out for composite operators: e.g, in the 2D Ising setting, there is a strong indication that the energy field cannot be constructed in the limit of removed ultraviolet cutoff via a similar procedure, see [41]. In this respect, the use of a fixed ultraviolet cutoff appears to be a convenient choice for constructing (almost-)scaling operators associated to arbitrary composite fields.

3

In finite volume V the symbol ddk(2π)d should be understood a shorthand notation for the corresponding Riemann sum of discrete allowed momenta. As discussed in [1, Appendix H] the RG map leading to the definition of H can be defined in finite volume and proved to converge strongly (as an operator acting on the Banach space of interactions defined in [1, Section 4]) to a well-defined infinite volume counterpart. An analogous discussion can be repeated in the generalized setting considered in this paper, where external fields and correlation functions are considered. In the following we will always write all the relevant equations directly in the infinite volume setting and leave the details of the proof of convergence of the finite volume theory to its thermodynamic limit to the reader.

4

Both W and W[h,0] should be interpreted as formal infinite sums of monomials in ϕ and J, each monomial being specified by the order in ϕ and J and by the corresponding kernel. In other words, W and W[h,0] must be thought of as the infinite sequences of such kernels, whose physical interpretation is that of multipoint response functions. Moreover, these kernels should be thought of as the infinite volume limits of the corresponding finite volume kernels; the existence of the infinite volume limit is implicit in the proofs discussed in this paper, and is a corollary of the methods developed in [1] and here; see [1, Appendix H] for details about the non-perturbative definition of the effective potential and the existence of the infinite-volume limit.

5

We distinguish between response functions, defined in terms of functional derivatives of a generating function, and correlation functions, defined as expectations of products of local or almost-local operators, see below. The two notions differ by the effect of non-linear terms in the action: e.g., when deriving the generating function twice with respect to an external field, after setting it to zero we get a two-point correlation function plus an additional term due to the terms in the action that are quadratic in the external field.

6

In this paper, we won’t discuss how to compute the two-point functions in (2.11) and how to prove that they have the same asymptotic behavior as the response functions: this follows from a stability analysis of the RG flow in the vicinity of the fixed point potential, which is deferred to a third paper in this series. In such a third paper, we will also prove the independence of the fixed point potential from the scale parameter γ entering the definition of the RG map, see next section, and, most importantly, the universality of the critical exponents with respect to the choice of the ultraviolet cutoff function χ in (2.2).

7

A local operator at x is a (possibly infinite) linear combination of products of fields ψ(z) supported in a finite ball centered at x. An almost-local operator may depend upon fields ψ(z) at arbitrary large distance from x: however, the dependence upon ψ(z) decays stretched-exponentially to zero as |z-x|.

8

See in particular (2.57). Note that the discussion in Sect. 2.8 is written in terms of Δ1=d-[ϕ] and Δ2=d-[J] rather than in terms of [ϕ],[J], but this is just a matter of notation.

9

If pi=1, then μi{1,,d}. If pi=0, the index μi needs not to be specified, but, conventionally, in that case we set μi=0. If p=0 we shall often drop the label μ.

10

To be precise, the relevance or irrelevance of the term with (n,m,l,p)=(0,1,2,0) depends upon the sign of η2=Δ2-2[ψ]. In any case, even if irrelevant, this term is barely so, with a scaling dimension of order O(ϵ). For this reason, it is convenient to treat it differently from the irrelevant terms with scaling dimensions well separated from 0, uniformly in ϵ. Moreover, the terms with (0,0,2,p) with p1=1 are relevant only if d=2,3: in d=1 they are irrelevant, with scaling dimension equal to -1/2+ϵ; however, the treatment of these terms in d=1 does not present any significant simplification, as compared to the cases d=2,3. For this reason, and for uniformity of notation, we shall treat them exactly in the same way for d=1 and for d=2,3, notwithstanding this difference: in particular, the notion of of trimmed sequence and of ‘trimming’ given below, which defines the way in which we ‘localize’ and ‘interpolate’ the relevant terms, is the same in d=1,2,3.

11

The rationale behind the labels ext, 0, and f in (2.42) is the following: ‘ext’ stands for ‘external field’, it refers to the fact that n+m>0, i.e., there is at least one ‘external field’ ϕ or J field; ‘f’ stands for ‘fluctuation field’, it refers to the fact that l>0, i.e., there is at least one ‘fluctuation field’ ψ; similarly, the label ‘0’ in the first definition indicates that l=0, i.e., there is no fluctuation field.

12

The bound (5.14) is similar to (4.17) for the same value of =(2,0,l,p) (for which the trimming operator T in the first line of (4.17) acts as the identity and, therefore, N1,,s=N1,,s), the most relevant differences being that: (1) the operator h1Dh=D1-D in the first line of (4.17) is replaced by the action of Dk in the left hand side of (5.14); (2) in the left hand side of (5.14) we are not integrating over the coordinate x, contrary to the case of (4.17). Correspondingly, the proof of (5.14) is similar to that (4.17), and the details are left to the reader. Let us just mention that the two differences (1) and (2) mentioned above explain the presence of the decay factor e-C¯(γk-1|x|)σ in (5.14), as well as that of the dimensional factor γk[Dsc(2,0,l,p)+d]=γk(2Δ1-l[ψ]-p1) instead of dγγDsc(2,0,l,p) (roughly speaking, the fact that in (5.14) we have ‘one integration less’, in combination with the presence of Dk, comes with a dimensional factor γkd; on the other hand, the factor dγγDsc(2,0,l,p) in (4.17) is a norm bound on D(1-D)-1).

13

Note that for h=-1 there is only one possible choice of k=(k0,k1) compatible with the constraints k01, k10, k0+k1=1 indicated under the second sum in the right hand side of (6.13), that is (k0,k1)=(1,0): therefore, for h=-1, the value v[τ] in the right hand side of (6.12) is the same denoted by v[τ,(1,0)] in (6.13).

This work was supported by Università degli Studi Roma Tre, Sapienza Università di Roma, Institut des Hautes Études Scientifiques, and SISSA.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Giuliani, A., Mastropietro, V., Rychkov, S.: Gentle introduction to rigorous Renormalization Group: a worked fermionic example. JHEP 01, 026 (2021). 10.1007/JHEP01(2021)026. arXiv:2008.04361 [hep-th] [Google Scholar]
  • 2.Gawedzki, K., Kupiainen, A.: Massless lattice Inline graphic theory: rigorous control of a renormalizable asymptotically free model. Commun. Math. Phys. 99(2), 197–252 (1985). 10.1007/BF01212281 [Google Scholar]
  • 3.Gawedzki, K., Kupiainen, A.: Gross-Neveu model through convergent perturbation expansions. Commun. Math. Phys. 102, 1 (1985). 10.1007/BF01208817 [Google Scholar]
  • 4.Gawedzki, K., Kupiainen, A.: Renormalization of a nonrenormalizable quantum field theory. Nucl. Phys. B 262, 33–48 (1985). 10.1016/0550-3213(85)90062-8 [Google Scholar]
  • 5.Fisher, M., Ma, S.-K., Nickel, B.: Critical exponents for long-range interactions. Phys. Rev. Lett. (1972). 10.1103/PhysRevLett.29.917 [Google Scholar]
  • 6.Sak, J.: Recursion relations and fixed points for ferromagnets with long-range interactions. Phys. Rev. B 8, 281–285 (1973) [Google Scholar]
  • 7.Sak, J.: Low-temperature renormalization group for ferromagnets with long-range interactions. Phys. Rev. B 15, 4344–4347 (1977). 10.1103/PhysRevB.15.4344 [Google Scholar]
  • 8.Brydges, D.C., Mitter, P.K., Scoppola, B.: Critical Inline graphic. Commun. Math. Phys. 240, 281–327 (2003). 10.1007/s00220-003-0895-4. arXiv:hep-th/0206040 [hep-th] [Google Scholar]
  • 9.Abdesselam, A.: A complete renormalization group trajectory between two fixed points. Commun. Math. Phys. 276, 727–772 (2007). 10.1007/s00220-007-0352-x. arXiv:math-ph/0610018 [math-ph] [Google Scholar]
  • 10.Slade, G.: Critical exponents for long-range Inline graphic models below the upper critical dimension. Commun. Math. Phys. 358(1), 343–436 (2018). 10.1007/s00220-017-3024-5. arXiv:1611.06169 [math-ph] [Google Scholar]
  • 11.Greenblatt, R.L.: Constructing a weakly-interacting fixed point of the Fermionic Polchinski equation. J. Math. Phys. 65, 112301 (2024). 10.1063/5.0203607. arXiv:2401.04462 [Mathematical Physics] [Google Scholar]
  • 12.Polchinski, J.: Renormalization and Effective Lagrangians. Nucl. Phys. B 231, 269–295 (1984). 10.1016/0550-3213(84)90287-6 [Google Scholar]
  • 13.Gross, D.J., Rosenhaus, V.: A line of CFTs: from generalized free fields to SYK. JHEP 07, 086 (2017). 10.1007/JHEP07(2017)086. arXiv:1706.07015 [hep-th] [Google Scholar]
  • 14.Kausch, H.G.: Curiosities at Inline graphic, arXiv:hep-th/9510149 [hep-th]
  • 15.Saleur, H.: Polymers and percolation in two-dimensions and twisted Inline graphic supersymmetry. Nucl. Phys. B 382, 486–531 (1992). 10.1016/0550-3213(92)90657-W. arXiv:hep-th/9111007 [hep-th] [Google Scholar]
  • 16.Wiese, K.J., Fedorenko, A.A.: Field theories for loop-erased random walks. Nucl. Phys. B 946, 114696 (2019). 10.1016/j.nuclphysb.2019.114696. arXiv:1802.08830 [cond-mat.stat-mech] [Google Scholar]
  • 17.Anninos, D., Hartman, T., Strominger, A.: Higher spin realization of the dS/CFT correspondence. Class. Quant. Grav. 34(1), 015009 (2017). 10.1088/1361-6382/34/1/015009. arXiv:1108.5735 [hep-th] [Google Scholar]
  • 18.LeClair, A.: Quantum critical spin liquids, the 3D Ising model, and conformal field theory in 2+1 dimensions, arXiv:cond-mat/0610639 [cond-mat]
  • 19.LeClair, A.: 3D Ising and other models from symplectic fermions, arXiv:cond-mat/0610817v2 [cond-mat.stat-mech]
  • 20.LeClair, A., Neubert, M.: Semi-Lorentz invariance, unitarity, and critical exponents of symplectic fermion models. JHEP 10, 027 (2007). 10.1088/1126-6708/2007/10/027. arXiv:0705.4657 [hep-th] [Google Scholar]
  • 21.Fei, L., Giombi, S., Klebanov, I.R., Tarnopolsky, G.: Critical Inline graphic models in Inline graphic dimensions and higher spin dS/CFT. JHEP 09, 076 (2015). 10.1007/JHEP09(2015)076. arXiv:1502.07271 [hep-th] [Google Scholar]
  • 22.Stergiou, A.: Symplectic critical models in Inline graphic dimensions. Phys. Lett. B 751, 184–187 (2015). 10.1016/j.physletb.2015.10.044. arXiv:1508.03639 [hep-th] [Google Scholar]
  • 23.Poland, D., Rychkov, S., Vichi, A.: The conformal bootstrap: theory, numerical techniques, and applications. Rev. Mod. Phys. 91, 015002 (2019). 10.1103/RevModPhys.91.015002. arXiv:1805.04405 [hep-th] [Google Scholar]
  • 24.Kravchuk, P., Qiao, J., Rychkov, S.: Distributions in CFT. Part II. Minkowski space. JHEP 08, 094 (2021). 10.1007/JHEP08(2021)094. arXiv:2104.02090 [hep-th] [Google Scholar]
  • 25.Rychkov, S.: 3D Ising Model: a view from the Conformal Bootstrap Island. C R Phys. 21(2), 185–198 (2020). 10.5802/crphys.23. arXiv:2007.14315 [math-ph] [Google Scholar]
  • 26.Wegner, F.: The critical state, general aspects. In: Domb, C., Green, M. (eds.) Phase Transitions and Critical Phenomena, vol. 6, pp. 8–126. Academic Press (1976)
  • 27.Kupiainen, A., Rhodes, R., Vargas, V.: Local conformal structure of Liouville quantum gravity. Commun. Math. Phys. 371, 1005–1069 (2019). 10.1007/s00220-018-3260-3. arXiv:1512.01802 [Probability] [Google Scholar]
  • 28.Kupiainen, A., Rhodes, R., Vargas, V.: Integrability of Liouville theory: proof of the DOZZ Formula. Ann. Math. 191(1), 81–166 (2020). 10.4007/annals.2020.191.1.2. arXiv:1707.08785 [Probability] [Google Scholar]
  • 29.Guillarmou, C., Kupiainen, A., Rhodes, R., Vargas, V.: Conformal bootstrap in Liouville Theory. Acta Math. 233, 33–194 (2024). 10.4310/ACTA.2024.v233.n1.a2. arXiv:2005.11530 [math probability] [Google Scholar]
  • 30.Camia, F., Garban, C., Newman, C.: Planar Ising magnetization field I. Uniqueness of the critical scaling limit. Ann. Probab. 43, 528–571 (2015). 10.1214/13-AOP881. arXiv:1205.6610 [Probability] [Google Scholar]
  • 31.Hongler, C., Kytölä, K., Viklund, F.: Conformal field theory at the lattice level: discrete complex analysis and Virasoro structure. Commun. Math. Phys. 395, 1–58 (2022). 10.1007/s00220-022-04475-x. arXiv:1307.4104 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 32.Bauerschmidt, R., Brydges, D.C., Slade, G.: Scaling limits and critical behaviour of the Inline graphic-dimensional Inline graphic-component Inline graphic spin model. J. Stat. Phys. 157, 692–742 (2014). 10.1007/s10955-014-1060-5. arXiv:1403.7424 [math-ph] [Google Scholar]
  • 33.Bauerschmidt, R., Slade, G., Tomberg, A., Wallace, B.C.: Finite-order correlation length for Inline graphic-dimensional weakly self-avoiding walk and Inline graphic spins. Ann. Henri Poincaré 18, 375–402 (2017). 10.1007/s00023-016-0499-0. arXiv:1511.02790 [math-ph] [Google Scholar]
  • 34.Slade, G., Tomberg, A.: Critical correlation functions for the Inline graphic-dimensional weakly self-avoiding walk and Inline graphic-component Inline graphic model. Commun. Math. Phys. 342, 675–737 (2016). 10.1007/s00220-015-2488-4. arXiv:1412.2668 [math-ph] [Google Scholar]
  • 35.Feldman, J., Magnen, J., Rivasseau, V., Sénéor, R.: A renormalizable field theory: the massive Gross-Neveu model in two dimensions. Commun. Math. Phys. 103(1), 67–103 (1986). 10.1007/BF01464282 [Google Scholar]
  • 36.Dimock, J., Yuan, C.: Structural stability of the RG flow in the Gross-Neveu model. Ann. Henri Poincaré 25, 5113–5186 (2024). 10.1007/s00023-024-01427-0. arXiv:2303.07916 [math-ph] [Google Scholar]
  • 37.Benfatto, G., Mastropietro, V.: Ward Identities and Chiral Anomaly in the Luttinger Liquid. Commun. Math. Phys. 258, 609–655 (2005). 10.1007/s00220-005-1364-z. arXiv:0409049v1 [cond-mat] [Google Scholar]
  • 38.Benfatto, G., Falco, P., Mastropietro, V.: Functional integral construction of the massive Thirring model: verification of axioms and massless limit. Commun. Math. Phys. 273, 67–118 (2007). 10.1007/s00220-007-0254-y. arXiv:0606177 [hep-th] [Google Scholar]
  • 39.Benfatto, G., Falco, P., Mastropietro, V.: Extended scaling relations for planar lattice models. Commun. Math. Phys. 292, 569–605 (2009). 10.1007/s00220-009-0888-z. arXiv:0811.3218v1 [cond-mat] [Google Scholar]
  • 40.Giuliani, A., Mastropietro, V., Toninelli, F.L.: Non-integrable dimers: Universal fluctuations of tilted height profiles. Commun. Math. Phys. 377, 1883–1959 (2020). 10.1007/s00220-020-03760-x. arXiv:1904.07526 [math-ph] [Google Scholar]
  • 41.Garban, C., Kupiainen, A.: Energy field of critical Ising model and examples of singular fields in QFT. arXiv:2502.02554 [Probability]
  • 42.Patashinsky, A.Z., Pokrovsky, V.N.: Fluctuation Theory of Phase Transitions, p. 321. Pergamon Pr, Oxford, England (1979) [Google Scholar]
  • 43.Grubb, G.: Distributions and Operators, vol. 252. Springer (2008)
  • 44.Giuliani, A., Greenblatt, R.L., Mastropietro, V.: The scaling limit of the energy correlations in non integrable Ising models. J. Math. Phys. 53, 095214 (2012). 10.1063/1.4745910. arXiv:1204.4040 [math-ph] [Google Scholar]
  • 45.Antinucci, G., Giuliani, A., Greenblatt, R.L.: Non-integrable Ising models in cylindrical geometry: Grassmann representation and infinite volume limit. Ann. Henri Poincaré 23, 1061–1139 (2022). 10.1007/s00023-021-01107-3. arXiv:2104.09328 [math-ph] [Google Scholar]
  • 46.Antinucci, G., Giuliani, A., Greenblatt, R.L.: Energy correlations of non-integrable Ising models: the scaling limit in the cylinder. Commun. Math. Phys. 397, 393–483 (2023). 10.1007/s00220-022-04481-z. arXiv:2006.04458 [math-ph] [Google Scholar]
  • 47.Gentile, G., Mastropietro, V.: Renormalization group for one-dimensional fermions. A review on mathematical results. Phys. Rep. 352, 273–437 (2001). 10.1016/S0370-1573(01)00041-2 [Google Scholar]
  • 48.Gallavotti, G.: The Elements of Mechanics. Springer (1983)

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The authors declare that the data supporting the findings of this study are available within the paper.


Articles from Communications in Mathematical Physics are provided here courtesy of Springer

RESOURCES