Abstract
We consider the Renormalization Group (RG) fixed-point theory associated with a fermionic model in with fractional kinetic term, whose scaling dimension is fixed so that the quartic interaction is weakly relevant in the RG sense. The model is defined in terms of a Grassmann functional integral with interaction , solving a fixed-point RG equation in the presence of external fields, and a fixed ultraviolet cutoff. We define and construct the field and density scale-invariant response functions, and prove that the critical exponent of the former is the naive one, while that of the latter is anomalous and analytic. We construct the corresponding (almost-)scaling operators, whose two point correlations are scale-invariant up to a remainder term, which decays like a stretched exponential at distances larger than the inverse of the ultraviolet cutoff. Our proof is based on constructive RG methods and, specifically, on a convergent tree expansion for the generating function of correlations, which generalizes the approach developed by three of the authors in a previous publication (Giuliani et al. in JHEP 01:026, 2021. 10.1007/JHEP01(2021)026. arXiv:2008.04361 [hep-th]).
Introduction
Since the seminal works of Kadanoff, Wilson, Fisher and others in the 1970s, renormalization group (RG) fixed points and renormalization group flows connecting them are among central objects of study of theoretical physics, with many experimental applications. In a statistical mechanics interpretation, these fixed points physically correspond to the scaling limits of interacting systems at a second order phase transition; they determine the physical properties of the system at and near criticality, in particular the power law behavior of the correlation functions at short or long distances, and the corresponding critical exponents. Only a small part of conjectures and intuitions accumulated about RG fixed points in theoretical physics have been put on rigorous mathematical footing. Pioneering results in this area were obtained by Gawedzki and Kupiainen, who in [2] showed non-perturbative stability of the Gaussian fixed point of a scalar field in four dimensions , while in [3] they could follow, non-perturbatively, renormalization group flow of the Gross-Neveu two-dimensional model from the Gaussian fixed point of the Dirac field at short distances to some intermediate distance scale where the four-fermion coupling is still small. Later on [4] they constructed a non-perturbative interacting fixed point in a fractional Gross-Neveu model, which has the fermion propagator
replaced by
. This serves as a small parameter which is somewhat similar to the Wilson-Fisher deviation from the integer number of dimensions. Fractional Gross-Neveu model instead lives in the integer number of dimension, but has long-ranged interactions. Analogous fractional model can be considered also for a scalar bosonic field, where they should describe critical points of the long range Ising model [5–7]. Fixed points in fractional bosonic models were also rigorously constructed [8–10].
The present paper is the second one in the series started by our recent work [1]. In [1], three of us considered a fermionic model closely related to the fractional Gross-Neveu model of Gawedzki and Kupiainen. In our fractional symplectic fermion model, the fields are spinless fermions in d dimensions () with propagator where is a symplectic matrix, and N is assumed even. The model is symmetric with respect to the symplectic group Sp(N) and the bare potential includes the invariant mass and the quartic coupling terms. In this model, Ref. [1] demonstrated the existence of an interacting fixed point for any sufficiently small, which could be positive or negative, or in fact complex. One of the main results of Ref. [1] is that the fixed point potential depends analytically on in a small disk . See also [11], where an extension of this result to the case of a continuous RG flow à la Polchinski [12] has been recently discussed. This interesting analyticity property should be a general feature of fixed points of fermionic models, but it was overlooked in prior literature. For bosonic models no such property holds, as they are well defined only for a positive quartic coupling. For fermionic models there is no such contradiction, since the quartic interaction may have any sign for fermions.
The fractional symplectic fermion model of [1] is an excellent theoretical laboratory to study various aspects of critical properties of statistical physics models, like non mean-field critical exponents. See [1, Sec. 8] for a long list of open problems. Moreover, our model and closely related ones have direct physics applications. For example, similar fractional fermionic models in a large N limit were considered in [13] in relation to the famous SYK model. Furthermore, as discussed in [1, Section 8.1.5], the fractional symplectic fermion model is likely continuously connected to the local symplectic fermion model [14], providing a way to compute the critical exponents of the latter in an -expansions. As to the local symplectic fermion model, it is relevant e.g. for the description of polymers and loop-erased random walks [15, 16], in the context of dS/CFT correspondence [17], and has also been studied theoretically in [18–22].
The model we investigate is also a perfect playground to test several properties of Conformal Field Theory (CFT) and of the conformal bootstrap program [23], which have been extremely successful in numerically computing critical exponents of interacting critical models at a precision comparable with, if not better than, the best Monte Carlo simulations. In brief, the goal of CFT is to construct a collection of scale invariant correlation functions of a complete basis of scaling operators , starting from the requirement that these correlations are conformally covariant and satisfy the Operator Product Expansion (OPE) identities. Based on these assumptions, the conformal bootstrap program proposes a strategy to compute recursively the critical exponents of all the scaling operators, as well as the explicit form of their multipoint correlations functions. An outline of CFT/bootstrap axioms and a description of the results obtained in such an axiomatic approach can be found e.g. in [23] (in physics language) or in [24, 25] (in a more mathematical language). The relevance of this method for Statistical Mechanics (SM) comes from the conjecture that the correlation functions of a CFT should coincide with the scaling limit of the correlation functions of an appropriate class of SM models at a second order phase transition point: that is, CFT is expected to be an emergent description of (universality classes of) critical SM models. The theoretical foundation for this conjecture is Wilsonian RG. In this framework, CFT correlations are expected to be the same as those of the fixed point theory of the RG map, and scaling operators are expected to be the densities of eigenstates of the RG transformation linearized around the fixed point; for this reason, sometimes scaling operators are also called eigenoperators, see e.g. [26, Eq.(3.10)]. Unfortunately, rigorous results substantiating the validity of this conjecture are scarce: even the existence of scaling operators starting from a regularized functional integral or from a lattice Gibbs measure has been proved only in very few cases. Two examples are: the vertex operators of Liouville field theory, whose construction starting from a regularized functional integral has been achieved in a remarkable series of papers [27–29]; the spin operator of the 2D Ising field theory, constructed as the limit as the lattice spacing goes to zero of an appropriately renormalized magnetization, whose unique limit is shown to be a conformally covariant random distribution [30]. In connection with the latter result, see also [31], where a basis of lattice local fields satisfying the Virasoro algebra is constructed: these objects can be thought of as a sort of lattice counterpart of the scaling operators; however, the very existence of these lattice objects crucially relies on the exact solvability of the 2D Ising model at the lattice level.
Motivated by these problems, in this paper we consider a theory of fractional symplectic fermions defined in terms of a Grassmann functional integral, whose bare potential is the fixed point (FP) potential of a RG transformation in the presence of external source fields, and whose reference Gaussian part has a fixed ultraviolet cutoff. The part of the FP potential independent of the external fields is the same as the one constructed in [1], and it consists of a local quartic interaction, plus higher order, ‘irrelevant’, corrections. All the large-distance critical exponents of this model are expected to be the same as the one with purely local quartic interactions, but the FP model has the advantage of being the microscopic model with the closest possible features to those of the CFT effectively describing it, thus making it possible to test directly the CFT predictions.
In this setting, we prove two main results:
First, we compute the critical exponents of the field-field and density-density correlations, which, contrary to the fixed point potential studied in [1], are physically observable. We prove that, while the field-field correlation has the same critical exponent as its mean field counterpart, the density-density correlation acquires an anomalous (i.e., non-mean-field) exponent, which is analytic in a small disk . This should be contrasted with the critical exponents of the fractional theory [8–10], whose expansion in is expected to be asymptotic and conjectured to be Borel summable; note, however, that their regularity properties have not been investigated yet: current results are limited to the lowest order computation of a few non-trivial, anomalous, exponents [10].1
Next, we define almost-scaling operators, whose correlation functions are scale-invariant up to remainder terms decreasing as a stretched exponential at large distances. We believe that, in the presence of a short-distance cutoff, there is no way of defining scaling operators whose correlation functions are exactly scale invariant; in this sense, almost-scaling operators are the best possible approximation to scaling operators in our setting.2 Their behavior is to be contrasted with the behavior of correlation functions of generic (non-scaling) local operators which are expected to decay like power laws at large distances, up to remainder terms decaying also like power laws, albeit with a larger power than the leading term. It appears plausible that generic local operators should be expressible as (infinite) linear combinations of almost-scaling operators, each of which contributes to the correlation function with a power law behavior with a different critical exponents. Such an expansion in operators with larger and larger scaling dimension is standard in physics considerations of critical phenomena, see e.g. [26, Eq. (3.11)] or [42, Eq. (3.7)].
Outline. The paper is structured as follows: In Sect. 2 we define the model and state our main results, summarized in Theorems 2.4 and 2.5. In Sect. 3 we describe in detail the RG map and derive the corresponding FP equation in the presence of the external source fields. In Sect. 4 we solve the FP equation for the potential with external source fields via a tree expansion, and prove its absolute convergence in a weighted norm. In Sect. 5 we prove the convergence of the tree expansion in a mixed norm, required for the control of the correlation functions at fixed positions, and we conclude the proof of Theorem 2.4. In Sect. 6 we adapt the discussion of the previous section to the estimate of the remainder terms in the correlation functions of the almost-scaling operators and conclude the proof of Theorem 2.5. The lowest order computation of the anomalous critical exponent and of the two point function are collected in two appendices.
Many aspects of the proof are generalizations of the methods introduced and discussed in detail in [1]: therefore, we will often refer the reader to specific sections of our previous paper and emphasize the analogies and novelties of the present work compared to [1].
The Model and the Main Results
Generating function of the scale-invariant response functions
Let us recall that in [1] we constructed the non-trivial FP potential for a d-dimensional Grassmann theory with partition function , where is an N-component (with even and different from 8) Grassmann field in with and a cube whose side is eventually sent to , and (denoted in [1]) is a reference Gaussian integration characterized by the following two-point function, or propagator,3:
| 2.1 |
Here is the standard symplectic matrix in block-diagonal form (see [1, Eq.(1.3)]), and the cutoff function is radial, monotone decreasing in the radial direction, and such that
| 2.2 |
As in [1], we assume that belongs to the Gevrey class [1, App. A]. The FP potential constructed in [1] reads:
| 2.3 |
where are non-zero real-analytic functions of , of order , for sufficiently small, , , and is an infinite sum of irrelevant terms, whose kernels are non-vanishing real-analytic functions of (see [1] for more precise claims).
In this paper, we consider the FP theory in the presence of external source fields and the corresponding generating function for correlations, formally defined as
| 2.4 |
Here is a solution of the FP equation , with R the RG map, of the form
| 2.5 |
where and are shorthand notations for and , respectively, is a sum of irrelevant terms depending explicitly both on and on , i.e., , and is an external potential, depending only upon the external fields , such that . The precise definition of the RG map and of the irrelevant part of will be given shortly, see Definition 2.3 below. Note also that, a priori, the right side of (2.4) may be plagued by infrared divergences. Therefore, (2.4) should be interpreted as4:
| 2.6 |
where is the Grassmann Gaussian integration with propagator
| 2.7 |
and is an arbitrarily chosen rescaling parameter, which is fixed once and for all. More generally, for later reference, for any pair of integers , we let
We also denote
| 2.8 |
In particular, if , we denote the single-scale propagator by
| 2.9 |
Going back to , our main focus will be on the two-point field-field and density-density response functions5, i.e., the kernels of the contributions to that are purely quadratic in or in J, respectively. These can be obtained from by differentiating it twice with respect to (w.r.t.) the or J and then setting the source fields to zero. We let:
| 2.10 |
which are the central objects of interest of this paper. These response functions are expected6 to have the same large distance asymptotic behavior, up to a finite multiplicative renormalization, as the two-point functions
| 2.11 |
respectively, where (in the second expression, the semicolon indicates truncated, or connected, expectation, i.e., ); in particular, they are expected to define the same critical exponents. However, contrary to the two-point functions in (2.11), the response functions and are scale-invariant. Our first main results can be in fact informally stated as follows (see Theorem 2.4 below for a more precise statement):
Main result, I. For small enough, the response functions and are analytic in and such that, under rescaling by (here is the scaling parameter in (2.7) and following equations – entering also the definition of RG map – and is an integer), they behave as follows:
where the anomalous critical exponent is analytic in .
Scale invariance may look surprising, at first sight, due to the presence of a fixed ultraviolet cutoff in our theory; but it turns out that the very definition of fixed point potential fixes the irrelevant terms and the external potential in a special way, so that the resulting response functions are, in fact, scale invariant. Even in the non-interacting theory corresponding to the Gaussian fixed point, the mechanism fixing these additional terms is not completely trivial: it is in fact instructive, as a preliminary exercise, to compute and in the non-interacting case, see Sect. 2.2.1. As explained in footnote 5, we distinguish between the notions of response functions, like , defined in terms of functional derivatives of the generating function, and correlation functions, defined as the expectations of products of almost-local operators7. By its very definition, the response function (resp. ) is equal to the two-point correlations of an almost-local operators (resp. ), plus an additional contribution, equal to the expectations of the second derivative of with respect to (resp. J) at . Using a Quantum Field Theory jargon, this additional term may be called a ‘Schwinger term’. Our second main result is that the Schwinger terms associated with the response functions are stretched-exponentially small at large distances: in other words, the response functions and are equal to the two-point functions of two almost-local operators, up to stretched exponentially small corrections. In view of the scale invariance of the response functions, the correlation functions of these almost-local operators are then scale invariant up to stretched exponentially small corrections, thus allowing us to interpret them as ‘almost-scaling operators’. In formulae, anticipating here the statement of Theorem 2.5, we have:
Main result, II. Let , and . Then and can be written as
| 2.12 |
where the correction terms decay to zero at large distances like a stretched exponential, i.e., for they are bounded form above by (const.), for suitable and .
In the incoming subsections, before stating our main results more formally in Sect. 2.7, we need to introduce and define a number of important concepts, such as the action of the RG map (see Sect. 2.2), and the notions of scaling dimension, relevant and irrelevant operators (see Sect. 2.3); moreover, we need to specify the way in which we intend to parameterize the generating function or the fixed point potential: as mentioned in footnote 4 potentials can be identified with infinite sequences of kernels; more specifically, we shall choose the sequence associated with the fixed point potential to belong to a space of sequences, called trimmed, such that the relevant terms are local (see Sect. 2.4); a formal definition of fixed point potential is given in Sect. 2.5, while the notion of almost-scaling operators is given in Sect. 2.6.
The RG map
In order to clarify the notion of FP potential in (2.6), we need, first of all, to specify the action of the RG map R. Before doing this formally, let us remind the reader the logic behind the definition of the R, which maps a potential V to a new potential as follows (this discussion parallels the one in Section 2.1 of [1]): decomposing
| 2.13 |
see (2.8) and (2.9) for the definitions of and , we write (‘addition principle for Gaussian integrals’):
| 2.14 |
where is a normalization constant, and (resp. ) is the Grassmann Gaussian integration with propagator (resp. ). If is a ‘large scale observable’, i.e., if it does not depend on the Fourier modes with k in the support of , then
| 2.15 |
where and . Thanks to the scaling property , with (see [1, eqs.(2.14),(2.15)]), the random field has the same distribution as , with D the dilatation operator, and a random field with distribution , so that
where . Now, if V has the same structure as (2.5), i.e.,
| 2.16 |
with and two potentials in an neighborhood of the non-interacting fixed point discussed in Sect. 2.2.1 below (with a sum of irrelevant terms, in the sense discussed in Sect. 2.3 below, and an external potential, depending only upon the external fields ), then it turns out, see Sect. 3, that
| 2.17 |
with , two constants produced by the integration of the fluctuation field , and , two new potentials that are, again, -close to the non-interacting fixed point, with a sum of irrelevant terms. In view of (2.17), it is natural to rescale the external fields in a way similar to , in such a way to recast the terms involving the external fields in a form as close as possible to the one in which they originally appeared in V: therefore, we let and , with D the dilatation operator, acting on the external fields as: and , with the scaling dimensions to be fixed appropriately, in a way explained shortly. In terms of these definitions: , and similarly for . Therefore,
| 2.18 |
By definition, is the image of V under the RG map, i.e., ; more precisely, is equivalent, in the sense of [1, Section 5.2.1], to RV: the missing ingredient, in the previous informal discussion, is the action of the trimming map T, which is an operator, equivalent to the identity, which isolates the relevant terms from the irrelevant ones, see Sect. 3.2 below.
Note that the RG map depends, among other things, upon the choice of the scaling dimensions and [J]. In order to fix these dimensions, we use the requirement that, at the fixed point, , with and the constants as in (2.17)-(2.18) associated with the fixed point potential . In this way, the fixed point equation (FPE) defines an unambiguous criterium for assigning a scaling dimension to the external fields, which has a simple relation with the critical exponents of the corresponding response functions (cf. (2.20) with (2.46)); once that and [J] are fixed, the FPE becomes an equation for , of the form: , . The uniqueness of the solution for the FPE for , proved below, see Theorem 2.4, and the fact that the critical exponent of the two-point correlations (2.11) are the same as those of the response functions associated with , proved in the next paper of this series, confirms the physical significance of the scaling dimensions and [J], and of the fixed point potential .
Given these premises, let us define the RG map R a bit more formally as follows:
(independence from is a consequence of the definitions of below), where:
- is the integration on scale , i.e.,
where is the Grassmann Gaussian integration with propagator , see (2.9);2.19 T is the trimming map, defined in detail in Sect. 3.2 below, which is equivalent to the identity: when acting on a potential V it produces an equivalent potential , in the sense of [1, Sect.5.2.1], of the form ; here is a sum of finitely many local relevant and marginal terms (belonging to a finite dimensional subspace of the Banach space of potentials), and is an equivalent rewriting of as an infinite linear combination of non-local, irrelevant, monomials in ;
- D is the dilatation, acting on as , with (recall: , see [1, eqs.(2.14),(2.15)]), while , , where and are two analytic functions of , for sufficiently small, to be determined in such a way that , of the form described in Definition 2.3 below, is a solution of the FP equation . A simple argument, spelled out in Sect. 2.8 below8 shows that and are the critical exponents of the response functions and , respectively: therefore, denoting by and these critical exponents, we rewrite the action of the dilatation operator on the external fields in terms of , :
we will see that and , with .2.20
The fixed point potential in the non-interacting case.
Before introducing the notion of relevant and irrelevant operators, and giving a more formal definition of fixed point potential , it is instructive to discuss the ‘Gaussian’ case corresponding, in the absence of external fields, to the trivial fixed point . Even in this case, the fixed point potential in the presence of the external fields, to be denoted by , is not trivial, and its structure is crucial to guarantee that the response functions and are scale-invariant, notwithstanding the presence of an ultraviolet cutoff. For , we let and in (2.20), so that the action of the dilatation operator reduces to:
| 2.21 |
The non-interacting fixed point potential we consider is the one obtained as the image of the ‘naive’ potential under the iterated action of the RG map , in the limit as the number of iterations goes to infinity:
| 2.22 |
The action of on a potential V returns (see [1, Section 5.1]):
where denotes connected expectation of order s with respect to (w.r.t.) the Gaussian integration with propagator (the lower label ‘0’ indicates that the expectation is computed w.r.t. a Gaussian, non-interacting, measure, while the upper label ‘(0)’ refers to the scale of the propagator ). Using the fact that the naive potential is invariant under the action of D, one finds that (2.22) can be re-expressed as
| 2.23 |
where
| 2.24 |
and denotes connected expectation of order s w.r.t. the Gaussian integration with propagator , see (2.8). As well known (see also [1, Appendix D.2]), connected expectations w.r.t. a Gaussian Grassmann measure can be expressed in terms of connected Feynman diagrams associated with the corresponding propagator. Using this fact, (2.24) implies that the fixed point potential in (2.22) is , where, if the two terms and in are graphically represented as in Fig. 1, then and are graphically represented as in Fig. 2, with the solid lines representing the propagator .
Fig. 1.

The graphical representations of the two vertices and , respectively
Fig. 2.
The graphical representations of and , respectively
In formulae, recalling the definition of in (2.8):
| 2.25 |
Therefore, the non-interacting fixed point generating function is:
| 2.26 |
from which a straightforward computation shows that
| 2.27 |
which are scale invariant, as anticipated above.
Scaling dimension, relevant and irrelevant operators
Let us consider a monomial in of the form
| 2.28 |
with , etc., , ,9 even, translationally invariant and of finite norm, i.e.,
| 2.29 |
(here the on the integral indicates that we are not integrating over one of the elements of , say ).
Remark 2.1
In order to make contact with the notation used in [1, Section 4.1] and for later use, given the n-ples , the m-ple and the l-ples , we shall also denote by , with . Moreover, we let
| 2.30 |
Without loss of generality, we can assume, and will do so from now on, that is: anti-symmetric under simultaneous permutations of the elements of , symmetric under permutations of the elements of ; anti-symmetric under simultaneous permutations of the elements of .
The action of D on is defined as . After a change of variables, this can be rewritten as:
| 2.31 |
where
| 2.32 |
with
| 2.33 |
defines the action of the dilatation operator D on the kernels. Note also that the norm of rescales as follows under the action of D:
| 2.34 |
where
| 2.35 |
is the scaling dimension of . Depending on whether is positive, vanishing or negative, we say that the corresponding monomial is relevant, marginal or irrelevant. Note that, anticipating the fact that and , the only relevant or marginal terms10 with are those with , , , , and with , for which we have , , , , and .
Trimmed sequences
A potential is a formal infinite sum of monomials, of the form
| 2.36 |
where
| 2.37 |
and, given , the sums over , and run over the sets , and , respectively; moreover, we used the notations of (2.30), with . The formal sum in (2.36) should just be thought of as a way of representing the collection of kernels . Therefore, in the following, we shall equivalently write a potential H either as in (2.36) or as
| 2.38 |
We shall say that a sequence , with translationally invariant kernels of finite norm, is a trimmed sequence if the relevant or marginal kernels with , , , , and with have the following local structure:
| 2.39 |
where are constants, and is the totally anti-symmetric tensor, as in [1, Eq.(4.4)].
As discussed in Sect. 3, the RG transformation R is a map from the space of trimmed sequences of kernels to itself.
Remark 2.2
The non-interacting fixed point potential , constructed in Sect. 2.2.1, can be written as , where the only non-zero kernels in the sequence are the following:
| 2.40 |
where: was defined in (2.8); in the first two lines we dropped the labels; in the first line, should be interpreted as , and, for , the right side should be interpreted as that of the third line of (2.39) with ; for , the right side of the second line should be interpreted as that of the fourth line of (2.39) with ; in the third line, and should be interpreted as and , respectively; in the fourth line, should be interpreted as .
In particular, is associated with a trimmed sequence, such that and .
The fixed point potential
We are now in good position to define more precisely the fixed point potential that we construct in this paper.
Definition 2.3
is the solution of the fixed point equation in the space of trimmed sequences, such that: (1) , with the kernels of the FP potential constructed in [1]; (2) for , , is as in (2.39) with , i.e., the local terms and in have pre-factor equal to 1; (3) the scaling exponents entering the definition of D and, therefore, of R, are analytic in for sufficiently small, and such that , ; (4) the kernels with are analytic in for sufficiently small and, at , satisfy , with as in (2.39) for , and equal to zero otherwise.
For the explicit form of the fixed point equation as a map from the space of trimmed sequences to itself, see Sect. 3.3 below.
Note that the existence and uniqueness of the FP potential specified in Definition 2.3 is part of the results proved in this paper. As anticipated above, we will write
| 2.41 |
where, letting11
| 2.42 |
and , we let: and .
Almost-scaling operators
The response functions are not correlation functions of any local operators built out the field . We can however identify two quasi-local operators and , whose two point functions will end up being the same as and , up to corrections that decay faster than any power at large distances. Because of these correction terms, we will call these operators almost-scaling operators. We do not expect that scaling operators with exactly scale invariant two point functions exist in our theory, due to the presence of the fixed ultraviolet cutoff .
In order to identify and , let us expand as
| 2.43 |
where is the part of that is at least quadratic in , and is the same as in (2.41). In other words, , and similarly for . From the definition of response functions, we find
| 2.44 |
where the correction terms are given by
| 2.45 |
Main results
Theorem 2.4
(Analyticity of the anomalous critical exponent and discrete scale invariance). There exists such that, for , there is a unique potential as in Definition 2.3, analytic in in . Moreover, the response functions and defined in (2.10) are analytic in in the same domain, and behave under rescaling , with , , as
| 2.46 |
with and , where is analytic in for , with
| 2.47 |
We actually expect that and are exactly scale invariant, which means that Eq.(2.46) should be true for any : this will be proved in the third paper of this series, see also the recent paper [11] for a proof of full scale invariance with a different choice of the cutoff function. In this paper, we limit ourselves to show, by an explicit lowest-order computation (see Appendix B), that the dominant contributions in to and are exactly scale-invariant terms, namely , where, in the sense of distributions [43],
| 2.48 |
and the higher order correction satisfies , for some independent of . Similarly, , where
| 2.49 |
and , for some independent of .
Theorem 2.5
(Almost-scaling operators) There exist such that and are analytic in in the same domain as in Theorem 2.4, and bounded as follows:
| 2.50 |
with and s the order of the Gevrey class which the UV cutoff function belongs to.
Putting together Eqs. (2.44) with Theorems 2.4 and 2.5, we conclude that the two point functions and are discrete scale invariant up to stretched-exponentially small corrections at large distances, i.e. that and are almost-scaling operators. As mentioned, we cannot hope for anything better than that.
Remark 2.6
In the non-interacting case discussed in Sect. 2.2.1, the stretched exponential decay of the correction terms, denoted by (the ‘0’ label recalling the absence of interaction), is immediate. In fact, rewriting the non-interacting fixed point potential as in (2.43), we see that and . Therefore, for , the two-point functions and reduce to and , respectively. Therefore, from (2.27) and the non-interacting analogue of (2.44), that is
| 2.51 |
we see that are, explicitly:
| 2.52 |
which can be easily shown to satisfy the decay bounds in (2.50).
Structure of the proof
The proofs of the Theorem 2.4 and 2.5 are based on the following considerations. First of all, from (2.6) we have:
| 2.53 |
Now, recalling that the RG map , for all , we see that (2.53) can be written as:
| 2.54 |
where in the last equality we used that is a fixed point for the RG map, i.e. . Denote by the kernels of , in the sense of (2.28). Using the definitions (2.10), and recalling the action (2.32) of D on the kernels, we find, letting ,
| 2.55 |
and, letting ,
| 2.56 |
After having defined, in Sect. 3, the fixed point equation for , in Sect. 4 we will show that the kernels , and in particular , can be written in terms of a tree expansion that is absolutely convergent in a weighted norm. As a consequence, these kernels, as well as the scaling exponents , turn out to be analytic in for small enough. In particular and , with as in (2.47) (the explicit computation of the first order contribution is deferred to Appendix A).
In Sect. 5, we will prove the pointwise existence of the limits in (2.55) and (2.56), as well as the analyticity of the limiting functions. These will require to control the absolute convergence of the tree expansion for the kernels of the fixed point potential in a pointwise norm. The ideas here generalize, and adapt to the present context, those used in [38, 44–46] to estimate the n-point correlation functions. Once the pointwise existence of the limits in (2.55)-(2.56) is established, the scale invariant property (2.46) is an immediate corollary: in fact, from (2.55) one finds, renaming ,
| 2.57 |
provided the limit exists, and similarly for , thus concluding the proof of Theorem 2.4.
Finally, in Sect. 6, we derive a tree expansion for the correction terms , and show that its convergence in a pointwise norm introduced in Sect. 5 implies Theorem 2.5.
Renormalization Map and Fixed Point Equation
In this section we describe more in detail the RG transformation introduced in Sect. 2.2. Moreover, we write down the fixed point equation for , including the equations for the scaling exponents . The discussion follows the analogous one in [1, Section 5], which we refer to for additional details. Note that in this section we shall write down the components of the RG fixed point equation in the form of series, see in particular (3.20)-(3.21), to be considered as formal as long as convergence in an appropriate norm is proved. Absolute convergence of these sums in a suitable weighted norm, see (4.5) below, is in fact addressed and proved in Sect. 4.
Integrating out
Consider a potential , whose sequence of kernels is trimmed, in the sense of Sect. 2.4. Let us discuss the effect of integrating out the fluctuation field on scale 0 from :
| 3.1 |
with the integrating-out map on scale 0 defined in (2.19). In analogy with [1, Eq.(5.3)], using the notation introduced in Remark 2.1, the kernels of the effective interaction can be written as:
| 3.2 |
where: is the operator that anti-symmetrizes under simultaneous permutations of the elements of and , symmetrizes over permutations of the elements of , and anti-symmetrizes under simultaneous permutations of the elements of and (which generalizes the antisymmetrization operator of [1, Eq.(5.3)]); the sums over and must be interpreted as described after [1, Eq.(5.3)]; the sum over is over all ways to represent as a concatenation , and similarly for the sums over and over . Finally, letting, as in [1, Eq.(5.3)], and , we denote where is interpreted as in (2.30), and denotes the expectation w.r.t. .
We compactly rewrite (3.2) as
| 3.3 |
where belongs to the label set L in (2.37), while belong to the subset of L ‘with at least one fluctuation field label’, i.e., to
| 3.4 |
the label f standing for ‘fluctuation field’.
Trimming
Even if the input potential is trimmed, the output will not in general be so. However, we can act on with a linear operator, equivalent to the identity in the sense of [1, Section 5.2.1], called the trimming operator T, which returns an equivalent trimmed potential. Denoting equivalence between potentials by the symbol , the action of the trimming operator will allow us to rewrite
| 3.5 |
with the local, relevant, part of , and the non-local, irrelevant, part of . The action of T on the kernels with has already been described in [1, Sect.5.2 and App.C] and won’t be repeated here. The action of T on the kernels with is non-trivial iff (n, m, l) equals (1, 0, 1) or (0, 1, 2); in the complementary case, we let and .
Let us now consider the cases , (0, 1, 2). As in the case without source fields, trimming involves localization and interpolation: localization extracts the local parts of and (cf. with [1, Eq.(5.12)]), as follows:
| 3.6 |
(the operators and are defined in the following subsections), and we let
On the other hand, letting and , interpolation rearranges the difference between (resp. ) and its local part (resp. ) in such a way to equivalently rewrite it as (resp. ) with . More precisely, we let
| 3.7 |
Identifying the kernels with the corresponding Grassmann monomials as in [1, Eq.(C.1)], the manipulations equivalent to the identity lead to the definitions of and are described in the following subsections.
Case
. We will use the following interpolation identity (in most cases, we drop and leave implicit the component indices of the Grassmann fields; moreover, summation over repeated indices is understood), which is the same as [1, Eq.(5.8)]:
| 3.8 |
This is used to split a non-local but relevant term into a local relevant term plus an irrelevant one (for te definition of relevant and irrelevant, see after (2.35)). Hence considering with G translationally invariant, playing the role of , we get:
| 3.9 |
with and
| 3.10 |
In light of this,
| 3.11 |
and, for ,
| 3.12 |
By the same considerations as in [1, Appendix C], we have that satisfies the following norm bounds:
| 3.13 |
and similarly for the weighted norms to be used below.
Case
Consider now with F translationally invariant, playing the role of . Proceeding analogously we find:
| 3.14 |
with ,
| 3.15 |
and similarly for . Then, identifying with the pair :
| 3.16 |
In analogy with (3.134.2), we have: , while, if ,
| 3.17 |
and similarly for .
Fixed point equation
We are now ready to write the definition of the renormalization map component-wise. Recalling (3.1)-(3.3), the definition of the trimming map in the previous subsection, and the definition of the dilatation D in (2.32), for any , we can write
| 3.18 |
where the sum runs over s-ples of labels in the set defined in (3.4) and, letting , ,
| 3.19 |
and in the second and third lines the operator is defined as follows: it is the identity, if ; it is the one defined in Sects. 3.2.1-3.2.2 above, if and either or , ; it is given by [1, eq.s (5.12),(5.13),(5.14)] if and either or , or if and either or , ; it vanishes, otherwise.
In view of these definitions, and recalling the fact that we look for a fixed point potential with pre-factor in front of the local terms and in equal to 1 (see item (2) of Definition 2.3), the fixed point equation (FPE) for the ‘local’ components reads:
| 3.20 |
where, again, the labels in the sums in the right hand sides are summed over , and the indicates the constraint that the term with and should be excluded from the corresponding sums. The FPE for the components with is by construction trivial, , while the FPE for all the other components reads:
| 3.21 |
Note that the FPE for the components with is the same as the one studied and solved in [1], the solution being the sequence of kernels constructed there. In particular, the first two components of (3.20) are solved by the fixed point values of computed in [1], and proved there to be analytic in for sufficiently small. So, from now on, we will set and . Moreover, we will prove below that and are sums of convergent series in , for sufficiently small and this implies that they are themselves analytic in for small. Letting and , the FPE requires
| 3.22 |
We will see in Sect. 4.2.1 that , so that . Moreover, in Sect. 4.2.2 and Appendix A, we will show that
| 3.23 |
which gives .
Solution to the FPE via the Tree Expansion
Let us now discuss how to determine the solution to the FPE introduced in the previous section, satisfying the properties spelled out in Definition 2.3. We use an analogue of the tree expansion discussed in [1, App.J], which provides an explicit analytic solution. Our construction automatically proves the uniqueness of the solution within the class of analytic potentials with a prescribed form at . We stress that our proof of uniqueness of the fixed point potential within the class of analytic functions via the use of tree expansions does not require that the scaling parameter is large, as most proofs based on contraction arguments usually do (including the one in [1, Section 6]); the proof in this and following sections just requires that . A priori, the radius of convergence may depend upon the choice of ; however, the methods in [11], also based on the tree expansion, should even allow one to prove uniformity of the analyticity region as . These are remarkable advantages of the tree expansion method as compared to the use of Banach fixed point theorem. The drawback is that uniqueness is guaranteed in a much smaller space. Uniqueness of the solution in the larger Banach space of potentials that are close enough to the prescribed unperturbed potential in the appropriate weighted norm, could be proved via a contraction argument similar to the one underlying the proof of [1, Key Lemma], under more restrictive assumptions on the scaling parameter , but we will not belabor the details of this proof here. Of course, we do not expect that the fixed point depends upon at all, but this remains to be proved, and we plan to do this in a third paper of this series; see also [1, Section 6.4].
As already mentioned above, we fix , , the fixed point values of the quartic and quadratic interactions computed in [1], once and for all. We also recall that our ansatz for the fixed point potential requires that the local terms and have pre-factor equal to 1, see condition (2) in Definition 2.3, and that the components with are zero, by the requirement that is trimmed, see the second line of (2.39). We first describe how to solve the FPE for the remaining components, i.e., those in
| 4.1 |
and then we will discuss the local components .
The FPE for
The FPEs for the components are those in (3.21). We proceed in a way similar to [1, Appendix J]. For any , we isolate from the right side of the FPE the term with and , i.e. the term , move it to the left side, and multiply both sides by . The resulting equation takes the form
| 4.2 |
where we recall that the second sum runs over s-ples of labels in , see (3.4), and denotes the constraint that, if , then , while is defined in (3.19). As shown below, the (diagonal in ) operator is invertible in on all the components : this is immediate for the components such that the scaling dimension at is different from zero, , see (2.35), that is, for all the indices in but . In order for to be invertible on this component as well, we need extra information about , besides knowing that , as we are assuming (see condition (3) in Definition 2.3). Anticipating the fact that , the desired invertibility for follows, because this explicit expression for implies that , which is different from zero for .
We look for a solution in the form of a sum over rooted trees,
| 4.3 |
The value is fixed so that the following recursive equation is satisfied:
| 4.4 |
where are the subtrees of rooted in the vertices that are ‘children’ of the root vertex of . The rooted trees (with root ) involved in the sum (4.3) have the structure exemplified in Fig. 3.
Fig. 3.

An example of a tree rooted in , contributing to the sum in (4.3). Here and the 3 children of are
The iterative application of (4.4) leads to a representation of the tree value in terms of an iterated action of the operator , one per vertex v, summed over the labels , (here the labels at exponent refer to the vertices , which are the children of v on ; the label associated with the root is the only one that is kept fixed, all the others are summed over). The labels associated with vertices that are not endpoints are summed over , while, if v is an endpoint, then takes one of the values in , depending on the nature of the endpoint, as graphically described in Fig. 4.
Fig. 4.

The four types of endpoints and the corresponding labels
In the evaluation of the tree value , each of these endpoints is associated with the kernel of the corresponding ‘interaction vertex’, see Fig. 5.
Fig. 5.

The four ‘interaction vertices’, graphically representing the contributions associated with the four types of endpoints depicted in Fig. 4
For example, for the tree represented in Fig. 3, and the three subtrees ‘exiting’ from the root are those represented in Fig. 6 (note that is ‘trivial’, in that it consists of a single vertex, which is both the root and the endpoint of ).
Fig. 6.

The three subtrees exiting from the root of the tree represented in Fig.3
We now intend to use the formula for the tree values described above in order to derive norm bounds on and to prove that the tree expansion for is absolutely convergent in the appropriate norms. We start by discussing bounds for the following weighted norm of , generalizing the definition in (2.29). Recall that with must be understood as a tensor-valued function of components , as in (2.28). For notational convenience, in some of the equations below, we will equivalently rewrite these components as , with , as in Remark 2.1 (the label attached to is actually redundant, but we will keep it for clarity); given such a , we shall write . In analogy with (2.29), we let
| 4.5 |
where
| 4.6 |
with: the Steiner diameter, or ‘tree distance’, of , see [1, footnote 19]; with the positive constant in (4.14) below; and with s the Gevrey regularity of , see the line after (2.2).
In order to recursively estimate the norm (4.5) of via (4.4), note that, from (3.2) and (3.19), if with , we can write
| 4.7 |
where , and we used that for these components the trimming map is the identity. If, instead, with and , then trimming acts non-trivially, and the FPE reads:
| 4.8 |
where, given and an l-ple such that , the set appearing in the right side in the condition is equal to: if ; if ; if , and ; and if , and (these two last cases are the only ones where ).
Now, in order to bound the right sides of (4.7) and (4.8) we recall a few basic bounds from [1] (or their analogues adapted to the present more general context). First of all, as in [1, (5.37)], for ,
| 4.9 |
with as in (2.35). Note that, assuming and to be -close to and , respectively, with small enough, then . Therefore, we also have that, for ,
| 4.10 |
with , which is finite and bounded from above, uniformly in . On the other hand, recalling that with , as in (3.22),
| 4.11 |
where , which is finite and of order iff and . From the first order computation of in Appendix A, which implies , see (2.47), we see that this condition is always verified for small enough.
Concerning the action of the trimming operator, for any and such that does not vanish, we have the analogue of [1, (5.43)]:
| 4.12 |
For the estimate of , with , , we proceed as follows. From [1, Eq.(5.39)], we see that satisfies:
| 4.13 |
where constant given by the Gram-Hadamard bound [1, Lemma D.2] and M as in [1, Eq.(4.15)], i.e., such that:
| 4.14 |
where are constants depending on but independent of and , with s the Gevrey regularity of , see the line after (2.2).
Using these estimates, and proceeding as in [1, Sect. 5.6] and [1, App.E], we get, letting and :
| 4.15 |
where is the number of ways in which can be realized, given , via the action of on , which is such that
| 4.16 |
Moreover, and a constant independent of , see [1, Remark J.1]. Recall also that is non-zero only if , and .
Plugging eqs.(4.9)–(4.12) and (4.15) into (4.4), with defined as in (3.19), we obtain:
| 4.17 |
where denotes the number of ways in which can be realized, given , via the action of on . Recalling the definition of in (3.19), and in the particular the definition of the components of the trimming operator given right below (3.19), as well as the bound on stated right after (4.15), we find:
| 4.18 |
where denotes the sum over the ’s such that , and 4 is the maximum number of different ’s for which, given and , the tuple is in and the operator is non zero (such maximum is realized for and ; in this case, the different ’s with the stated property are: (1, 0, 0, 0), (0, 1, 0, 0), (0, 0, 1, 0), (0, 0, 0, 1)).
By using iteratively the estimates above, and recalling that for some , we find
| 4.19 |
where the sum over in the right hand side runs over for each associated with one the vertices of the tree other than the root and the endpoints; moreover, we denoted , and is the i-th child of v. Let us note that, thanks to the definition of the trimming map, for all . If we now first sum over the choices of , given , for all the vertices v of other than the root and the endpoints, using (4.18) we get:
| 4.20 |
where: ; the sum over runs over the positive integers, , for all the vertices v of other than the root and the endpoints; and . Now, letting be the number of endpoints of , we have that:
the number of vertices of that are not endpoints is (see [1, eq.(J.10)]);
EMPTY ;
EMPTY ;
EMPTY (see [47, Appendix A.6.1]).
Therefore, for any ,
| 4.21 |
In view of (4.21), recalling that the number of the trees with k endpoints is less than , see e.g. [47, Lemma A.1], the sum over trees in the right hand side of (4.3) converges absolutely for any and small enough in the weighted norm (4.5).
Remark 4.1
Note that (4.21) is increasing in , so that, if desired, for any prescribed , we can make the factor in the right and side of (4.21) smaller than for some , possibly at the cost of increasing , thus getting:
| 4.22 |
for any and some -independent constants .
The FPE for the local terms. Analyticity of the scaling exponents
Consider now the components of the FPE associated with the local parts of the effective potential, (3.20). We focus on the last two components of the equation, the first two having been discussed and solved in [1]. Using the definition of D and the second line of (3.19), we see that in those components we can replace by , and similarly for the component with , thus getting that, at the fixed point,
| 4.23 |
To get, out of this, a representation of in terms of a convergent tree expansion, we insert the rewriting (4.3) in the right sides of (4.23), so that
| 4.24 |
where the tree values with are defined essentially in the same way as in the previous subsection, with the only difference that the root vertex is associated with the action of an operator rather than . In other words, for , we have where, recalling that , the values for have been constructed and bounded in the previous subsection. On the other hand, recalling that the weighted norm of is bounded by 1, we find that for the norms are bounded in a way analogous to (4.21), namely:
| 4.25 |
where we can choose and . Absolute summability over follows by the same considerations after (4.21). In conclusion, both and are expressed in terms of absolutely convergent tree expansions. Recalling that, for small enough:
EMPTY and are analytic functions of of order , for ;
the single-scale propagator depends analytically upon for ; therefore, the connected expectation in (3.2) (see [1, Appendix D] for the explicit representation of in terms of ), which enters the definition of the ‘integrating out’ map and, as a consequence, of the tree values themselves, is analytic in in the same domain, as well;
the dilatation operator D in (2.32), which enters the definition of the tree values, is analytic in the scaling exponents and , for and ;
all the tree values are analytic in in the domain
Therefore, by absolute convergence of the tree expansion, uniform in , analyticity of the sums in the right sides of (4.23) follows in the same domain, by Weierstrass’ theorem on the uniform convergence of sequences of analytic functions. We shall then write:
| 4.26 |
with analytic in .
The scaling exponent .
From the previous considerations and inspection of perturbation theory, it follows that . In fact, in view of the convergence of the tree expansion , in order to prove that it is enough to prove that any tree contributing to has vanishing value. Note that the trees contributing to have one ‘white square’ endpoint (i.e., the first in the second line of Fig. 4, corresponding to the third interaction vertex in Fig. 5) and additional endpoints of type or (i.e., those in the first line of Fig. 4, corresponding to the first two interaction vertices in Fig. 5). It is straightforward to check that, for any such , by applying the definition of tree value, is local, i.e., it is equal to for some that is a (in general infinite, absolutely convergent) linear combination of terms of the following form:
| 4.27 |
for appropriate functions (with the correct Sp(N) invariance properties, such that (4.27) is in fact proportional to and independent of a). For example, it is instructive to check that the sum of the values of the trees with one white square endpoint and one additional endpoint, either of type or , is
| 4.28 |
with the totally antisymmetric tensor defined after (2.39). Now, the key remark is that (the summand over in) (4.27) is proportional to , which is zero, because the support of the Fourier transform of does not contain the origin. Therefore, as anticipated above, all the contributions to vanishing, thus implying that and, therefore, recalling (3.22), .
Remark 4.2
The considerations above, leading to the conclusion that the scaling exponent of the external field , coupled linearly to the fluctuation field , has scaling dimension , is a general fact, valid for any infrared, critical, even, interacting theory, treatable perturbatively close to a Gaussian fixed point: it implies that, in general, the critical exponent describing the asymptotic, large distance, polynomial decay of the interacting two point function is the same as the one associated with the Gaussian part of the infrared RG fixed point. This is true, in particular, in theories where the fluctuation field has an infrared anomalous scaling dimension (i.e., differs from the naive scaling dimension associated with the bare propagator), as it is the case, for example, for models in the ‘Luttinger liquid’ universality class, in their fermionic formulation (i.e., models admitting a large distance effective description in terms of 2D spinless fermions with quartic interaction), see [47].
The scaling exponent .
Contrary to the case of , the right hand side of the equation for does not vanish. Recalling that is related to via (3.22), we rewrite the second equation of (4.26) as
| 4.29 |
where is analytic in in a small complex neighborhood of the origin. An explicit computation shows that , see Appendix A. Therefore, applying the analytic implicit function theorem, see e.g. [48, Section 5.11], it follows that (4.29) admits a unique analytic solution in a neighborhood of the origin, satisfying .
This concludes the proof of the part of the statement of Theorem 2.4 concerning the analyticity of and of the scaling exponents, as well as the facts that and , with as in (2.47).
Pointwise Bounds on the Response Functions
In this section, we prove the following result on the pointwise convergence of the limits in (2.55)-(2.56). Recall that the scaling exponents satisfy and , with as in (2.47), as proved in the previous section. We make use of the same notations and conventions on trees, tree values, components of the renormalization map, etc., as in the previous two sections. Moreover, whenever possible, we will keep the flavor indices implicit (e.g., in the first line of (5.1) below we drop the a, b indices labelling , which should be then thought of as an anti-symmetric matrix).
Proposition 5.1
There exists such that the limits in (2.55)-(2.56) exist and are analytic in , and, letting and , they can be explicitly written as
| 5.1 |
with the understanding that the sums in the right hand sides are absolutely summable in h and . Moreover, for any small enough, there exists such that
| 5.2 |
As proved in (2.57), Proposition 5.1 implies the scale invariance property (2.46). Therefore, in view of the fact that the other statements of Theorem 2.4 have already been proved above, see the comment at the end of Sect. 4, Proposition 5.1 implies Theorem 2.4.
Proof of Proposition 5.1
Using the tree representation (4.3), we write:
| 5.3 |
with recursively defined as in (4.4). We emphasize that the trees contributing to the sum in the first line of (5.3) have two ‘white square’ endpoints, and those contributing to the second line have two ‘white rombus’ endpoints, see Fig. 4. Using (3.19), the identity with D as in (2.32), the definition of in (2.33) (from which and ), and the fact that for the trimming map is the identity, we get (after renaming ):
| 5.4 |
If we multiply by 2 both sides, sum over and take , we obtain the representations (5.1), provided that the sums in the right hand sides are absolutely summable in and h.
The right hand sides of (5.4) can be bounded via the following lemma that, for later purposes, is formulated in greater generality than required for the moment. In order to state the lemma, we define a mixed norm: using the same notations as in the definition of the weighted norm (4.5), we let, for ,
| 5.5 |
with the understanding that, if , then should be interpreted as being equal to .
Lemma 5.2
Consider a tree contributing to one of the sums in the right sides of (5.3), denote by its subtrees rooted in , and by be the number of its endpoints. Let and . For any sufficiently small, there exists such that, for any , any even and any ,
| 5.6 |
with D the dilatation operator and the same constant as in (4.6), and
| 5.7 |
Assuming the validity of this lemma, the proof of Proposition 5.1 goes as follows. Let us focus, e.g., on the component with , the case being analogous. Plugging (5.6) with , and in the right hand side of the first line of (5.4), recalling that is just a rewriting of , , we find:
| 5.8 |
Now note that, for any , letting , is bounded from above by , which is summable in over . Therefore,
| 5.9 |
uniformly in h and |x|. For later purpose, let us also observe that
| 5.10 |
for a suitable . Using (5.9) in (5.8), we find that, for any small enough,
| 5.11 |
for some , uniformly in h. Since the right hand side of this inequality is summable over , the sum being bounded by (const.), this proves the absolute convergence of the sum in the right hand side of the first line of (5.1) and, therefore, as already observed after (5.4), it implies the very validity of the first line of (5.1).
Concerning the difference , using (5.1), (5.3), (5.4) and (5.6) with , and , we find:
| 5.12 |
Now, using (5.10), we find that the sum over in the last line is bounded from above by (const.). Moreover, recalling that the number of trees with k endpoints is smaller than , see [47, Lemma A.1], and noting that the trees contributing to the sum in the last line have at least two endpoints (because has at least two ‘white square’ endpoints), we see that is summable over , and the sum is bounded by a positive constant independent of . In conclusion,
which is the desired estimate in the first line of (5.2), up to a redefinition of .
The proof of the second line of (5.1) and of (5.2) is completely analogous and left to the reader.
We are left with proving Lemma 5.2.
Proof of Lemma 5.2
We focus on the proof of (5.6), the one of (5.7) being analogous (we will make a few comments at the end on the minor differences between the two cases). We recall that .
In order to obtain a point-wise bound on the left hand side of (5.6), we intend to apply iteratively the definition of tree value, similarly to what we did in Sect. 4. We recall that the trees contributing to the sum in the first line of (5.3) have two ‘white square’ endpoints, which will be denoted and . Note that the coordinates associated with these endpoints are fixed, i.e., not integrated out in the computation of the tree value: this implies that, for the purpose of recursively deriving bounds on the values of the subtrees of , we must be careful in proceeding slightly differently, depending on whether the subtree under consideration contains both and , or just one of them, or none.
We define to be the rightmost vertex of that is an ancestor both of and of , and we let be the length of the path connecting the root vertex with , see Fig. 7 and Fig. 8 below. (Fig. 7 illustrates the case , where , while Fig. 8 illustrates the case , where .)
Fig. 7.

Proof of Lemma 5.2, the case with . The two subtrees rooted in and are denoted by and
Fig. 8.

Proof of Lemma 5.2, the case with
Let us first discuss the case that , i.e., and belong to two different subtrees of rooted in two distinct children vertices of , called and , respectively; the two subtrees rooted in and will be denoted by and , respectively, see Fig. 7.
In this case, recalling the definition (5.5) and proceeding as in the proof of (4.15), we get:
| 5.13 |
where is the same as in (4.6), is given by (2.33), and comes from the rescaling of the variable in .
The summation in the right hand side of (5.13) is over the anchored trees described in [1, Appendix D.4] (see also (4.13)), is an element of , chosen arbitrarily among those in the path from the group of points associated with and the one associated with (say, the one closest to the group associated with ), and the factor comes from the factor M associated with . Now, recalling that and , bounding the sum over as in [1, Appendix D.5], we find12
| 5.14 |
with . Now, in the right side of (5.14) we bound from above by , see (4.16), and we bound via (4.22); here is the first component of (by construction and for ) and C is a -dependent constant; therefore, choosing sufficiently large, we can easily sum over , thus obtaining (noting that ):
| 5.15 |
for some , which proves (5.6) for (simply because for ), provided we choose (the freedom to choose as large as desired follows, as already observed in Remark 4.1, from the monotonicity of the right hand side of (5.15) on the choice of : recall, in fact, that is proportional to , cf. with (4.21), and that ).
Let us discuss next the case , in which and both belong to a common subtree among those rooted in the vertices immediately following on , say to . In this case, letting , we denote by , , , the vertices of in the path from to , as shown in Fig. 8.
For later reference, we introduce (and partly recall) the following notations and definitions. For any vertex v of , we denote by the components of the label associated with v: if , then ; if is not an endpoint, then is summed over , while, if v is an endpoint, takes one of the values in , depending on the nature of the endpoint, see Fig. 4. Moreover, for any vertex v of that is not an endpoint, we denote by the i-th child of v and, if is a tree rooted in v, is the subtree of rooted in . Correspondingly, we let and denote . Note that, for in Fig. 8, we have , where, for any , is summed over the even, positive, integers.
We will iteratively use the following basic estimates:
Let us now explain how to apply these estimates for bounding the left hand side of (5.6): using once again the definition of D in (2.32), the fact that , and the bound (5.17) with (note that and that the labels in (5.6) must be identified with in (5.17)), we get
| 5.19 |
In order to bound the last factor in the last line, we apply (5.18) with and , thus getting:
| 5.20 |
where we used once again that .
In order to bound the last line of (5.20), we iteratively apply (5.17) and (5.18) more times, write at each step as , thus finding:
| 5.21 |
In order to bound the last line, recalling that and belong to two different subtrees of , we use the analogue of Eqs.(5.13)–(5.14), which is proved in the same way:
| 5.22 |
Plugging (5.22) in (5.21), and bounding each factor as in (4.22) (with replaced by ), we get:
| 5.23 |
for some . We are left with sums over , , , and over , , , . We first sum over and, using (4.16), we get:
| 5.24 |
where, if for some , then should be interpreted as being equal to 1. In the last line, we bound from above by , and, recalling that and , we rewrite and bound: , so that, proceeding as in [47, Appendix A.6.1], the sum over in the last line can be bounded as follows:
| 5.25 |
where in the last step we bounded by .
Inserting this into (5.24) and noting that (the upper bound on n following from [1, Eq.(J.10)]), so that the factor can be re-absorbed in a re-definition of , we find:
| 5.26 |
As above, if for some , then should be interpreted as being equal to 1. Choosing larger than , the sums
are absolutely summable and bounded from above by , which can be also re-absorbed into a re-definition of . In conclusion, for some ,
| 5.27 |
In order to bound the sum over , we use that, for any ,
so that
| 5.28 |
where, in the last inequality, letting as in (5.9), we bounded from above by:
| 5.29 |
where was defined before (5.9). Plugging (5.28) in (5.27), and noting that (the upper bound on n following from [1, Eq.(J.10)]), we finally obtain the desired bound, (5.6), provided that is chosen larger than 1/4 (once again, we have the freedom to choose as large as desired, due to the monotonicity of the right hand side of (5.27) on : recall, in fact, that is proportional to , cf. with (4.21), and that ).
The proof of (5.7) is completely analogous, the only difference being that x must be replaced by y and by . Note that, by changing in , we get an extra factor in the analogues of the right hand side of (5.25) and of the following equations; in particular, it also reflects into the analogue of (5.27), which reads:
| 5.30 |
Bounding the sum over as explained after (5.27) and choosing larger than 1/4 implies the desired estimate, (5.7).
Stretched Exponential Decay of the Correction Terms ,
In this section we prove Theorem 2.5. We focus on the bound on , the bound on being completely analogous (and, therefore, left to the reader). From the definition of in (2.45), letting , we have:
| 6.1 |
where with defined in (2.43) and following line, i.e.,
| 6.2 |
(here, letting , we defined ). The first term in the right hand side of (6.1) has already been analyzed in the previous sections, and proved to be analytic in for small. Moreover, as we shall see shortly, the tree representation (5.3) and the bounds derived in the preceding section on the tree values readily imply the stretched exponential decay of . Concerning the second term, we will prove below that it can be computed via a convergent expansion in which the kernels of are ‘contracted’ with those of . Not surprisingly, can be expressed once again in terms of a tree expansion, slightly different from the one of the preceding sections, in that it includes only a subset of the trees contributing to the scale-invariant, fixed-point, potential studied above. As we shall see, the trees contributing to are characterized by a constraint on the ‘scale indices’ (called in the following), implying the desired stretched exponential decay. In order to simplify the analysis and to rely on the bounds derived in the preceding sections as much as possible, we shall define the trees contributing to in terms of ‘dressed endpoints’ (rather than of the ‘bare endpoints’ in Fig. 4): these are the big white and black endpoints of, e.g., Fig. 9 below, representing the kernels and , respectively. In order to estimate the values of the trees contributing to , we shall use the bounds on and derived above and in [1], without re-expanding from scratch these kernels as sums over trees once again.
Fig. 9.

A tree in , representing one of the contributions in the right hand side of (6.11), with the action of the dilatation operator D associated with the root explicitly indicated. The elements of consists of a root vertex , followed by children: the first (i.e., the topmost) one, denoted , is a big white dot, representing (with an index to be summed over , such that ), while the others are all big-black-dot endpoints, representing , , where are indices to be summed over L(0, 0)
Let us consider the first term in the right hand side of (6.1). As mentioned above, we already proved in the previous sections that it is analytic in for small. Moreover, using the first identity in (5.3) and the bound (5.8) with , we have (dropping as usual the component labels):
| 6.3 |
where, in passing from the first to the second line, we performed the sum over of (which is summable, and whose sum is bounded by an -independent constant), and we extracted part of the exponential factor from the sum over k. Now, if , the summand in the sum over k can be bounded from above by , so that the right hand side of (6.3) can be bounded from above by (const.), with (const.). On the other hand, if , the sum over k in the right hand side of (6.3) can be bounded via (5.9), so that the right hand side of (6.3) can be bounded from above by (const.). Putting the two cases together, we find
| 6.4 |
Note that the right hand side has the same form as that of the first inequality in (2.50). Therefore, in order to complete the proof of Theorem 2.5, we need to prove a comparable bound on , as well as its analyticity.
For this purpose, we derive a tree expansion for . We write (keeping, once again, the flavor indices implicit):
| 6.5 |
where, in analogy with (2.6) and (2.54),
| 6.6 |
with
| 6.7 |
and as in (6.2). Denoting by with the kernels of (which are by construction non-vanishing only for indices such that ), we can then rewrite
| 6.8 |
In view of the definition (6.7) of , of the fact that its kernels are non-vanishing only for indices such that , and of the representation (3.18) of the action of the RG map R in components, for any , for any we can write:
| 6.9 |
where we recall that , and the third sum in the right hand side runs over the -ples of labels in (note that for any such label, of the form , , with the FP potential constructed in [1], see condition (1) in Definition 2.3; for this reason, with some abuse of notation, in (6.9) we wrote in place of ). From (3.19) we see that, for any , , so that, isolating from the right hand side of (6.9) the contribution with and , we can rewrite:
| 6.10 |
where the on the second sum in the right hand side indicates the constraint that, if , then . Note also that, by definition, for , the kernel in the right hand side is , for all , and zero otherwise. Therefore, for any ,
| 6.11 |
If we graphically represent any kernel with by a big white dot, the first term in the right hand side, whenever it is there (i.e., for ), can be represented as
, while the second as a sum over trees of length 1 (the length being the maximal number of branches along a path from the endpoints to the root) as in Fig. 9.
We correspondingly write:
| 6.12 |
where is the family of trees of length 1 described in Fig. 9 and in its caption, and is its value: if has endpoints, then .
We can easily iterate this procedure, via (6.10), thus ending up with the following tree representation for :
| 6.13 |
where represents the length of the tree (i.e., the number of branches crossed by the straight path from the root to the big white end point, see Fig. 10), is the family of trees of length described in Fig. 10 and in its caption, and 13 is the value of the tree , in the presence of the action of the dilatations , , , associated with the vertices , , , , as in Fig. 10.
Fig. 10.

A tree in with the action of the dilatations associated with the vertices , explicitly indicated. For any , the elements of are recursively characterized by the conditions that the root has children, and that the first (i.e., the topmost) one, denoted , is the root of a tree in , while the other children are all big-black-dot endpoints. For , the set was described in Fig. 9. For any h such that , the integers satisfy: , , and ; in particular, for and , the vertices and are associated with two dilatations operators and with , and : the case depicted in Fig.9 (where is associated with D, and with the identity) is a special case corresponding to
Given with , letting be the subtree of rooted in , , for , is recursively defined as:
| 6.14 |
where the sums over and over must be interpreted as in (6.10), while, given ,
| 6.15 |
The validity of the tree representation (6.13) with the tree values defined above can be straightforwardly proved by induction, and is left to the reader.
We now use this tree representation to compute and bound the right hand side of (6.8). We have:
| 6.16 |
If , using (6.15), the definition of D in (2.32), and the analogue of (5.17), we get that, for any , such that ,
| 6.17 |
Now, in the last line, for any , we use that
| 6.18 |
where, in the second inequality, we used (4.22) with and the fact that the trees contributing to , with , necessarily have . Concerning the factor , we rewrite it and bound it as follows: we use once again the tree representation (4.3) with as in (4.4). Noting that for the trimming operator acts as the identity, and rewriting , with D as in (2.32), we find:
| 6.19 |
By Lemma 5.2, we thus obtain:
| 6.20 |
where in the second inequality we performed the sum over (note that, for given , , so that (const.)) and used the fact that . By the same considerations discussed after (6.3), performing the sum over we get:
| 6.21 |
Plugging (6.18) and (6.21) into (6.17), and using that , gives:
| 6.22 |
Remark 6.1
From (6.20), it is clear that the constraint (or, in general, for trees with , to be discussed in the following) is essential in proving the stretched exponential decay in (6.22). This constraint, first appearing in (6.13), has its origin in the recursive equation (6.10), which is linear in (with ); in turn, such linearity in originates from the fact that is quadratic in . In order to compare more closely the tree expansion for in (6.13) with the one for in the first line of (5.3) we can, if desired, re-expand the kernels and associated with the big white and black endpoints of the trees in in terms of the tree expansions discussed in Sect. 5 (for ) and in [1, Appendix J] (for ): this would lead to a new tree expansion for (more complex, but closer to the tree expansion of the previous section) in terms of trees with ‘bare endpoints’ as those in Fig. 4. Such trees would be exactly of the same form as those contributing to , such as those in Fig. 8, with the additional constraint on the scale labels , which was absent in the discussion in Sect. 5; in fact, the analogue of the combination in (6.20) and, more generally, of the combination appearing in the bounds below, is what in Sect. 5 was denoted , see (5.22) and following equations; in those equations, the combination could take arbitrarily negative values, and this was (rightly so) at the origin of the polynomial decay of the kernel of in the limit , proved in the previous section.
We now proceed in a similar fashion, in order to bound the general term in the right hand side of (6.16). We take , , with , , and . Using the same notation introduced before (5.16), thanks to (6.14), we have:
| 6.23 |
where , and ; moreover, we recall that . Using (the analogue of) (5.19) we get:
| 6.24 |
We now apply again the recursive definition of and iterate the same procedure until we reach , thus getting:
| 6.25 |
with .
Remark 6.2
Every collection of labels contributing to the right hand side of (6.27) satisfies the following constraints (recall that we write , and ): for any , if is trivial, then (with the understanding that ), while, if is non-trivial, then . In the following, we use that the sums over are performed under these constraints.
Now, recalling that and using the analogue of (6.21), we have
| 6.26 |
Inserting (6.18) and (6.26) into (6.25), summing over and using (4.16), implies:
| 6.27 |
Now, in the last line, recalling that and , we can bound from above each factor by ; next, by proceeding as in [47, Appendix A.6.1] and in (5.25), we obtain:
| 6.28 |
Hence, plugging (6.28) in (6.27), using and , we find
| 6.29 |
for a suitable . In order to get the desired bound on , uniformly as (see (6.8)), in view of (6.16), we still need to sum the right hand side of (6.29) over , and and show that the result of the sum is the same as the right hand side of (6.4) (up, possibly, to a redefinition of the constants).
Now, for the sums over , we simply use
| 6.30 |
so that (letting be a shorthand notation for )
| 6.31 |
up to a redefinition of C. If we now performed the sums in the second line using , , by forgetting all the constraints on the indices , but and , we would find that the second line of (6.31) would be bounded by for some . By re-plugging this back into (6.31), we would be led to a bound that is summable over (i.e., over for ), but not over , and we would be in trouble. Therefore, we must take better advantage of the constraints spelled out in Remark 6.2, by proceeding as follows.
Given and , we consider the corresponding set of vertices as in Fig. 11, and rewrite it as the union of the set of ‘trivial’ vertices (i.e., those with only one child, ) and of the set of ‘non-trivial’ ones (i.e., those with ). We let be the cardinality of and, if , we denote , with . We shall think the tuple as a concatenation of the tuples , , , . We let , , , be the lengths of these tuples, and the numbers of children of . Note that the choice of the integers , (with if ) and specifies uniquely the choice of and . Therefore, we shall identify the double sum over and with that over , (with if ) and .
Fig. 11.

A tree in with . Its non trivial vertices are and , and , . The 10-ple is thought of as a concatenation of three tuples of length , , , respectively, namely of , and
Let us now use the constraints spelled out in Remark 6.2, which we recall here for the reader’s convenience: for , if is trivial, then (with ), while, if is non-trivial, then . Therefore, if , then ; while, if :
| 6.32 |
which implies, in particular, that every collection of labels contributing to the right hand side of (6.31) satisfies
| 6.33 |
Therefore, the right hand side of (6.31) can be bounded from above by
| 6.34 |
where indicates the positive part. If we now perform the sums in the second line by forgetting all the constraints on the indices , , but and , we find that the second line of (6.34) is bounded by for some . In conclusion, plugging this back into (6.31), and recalling that and , we find, up to a re-definition of C:
| 6.35 |
with the understanding that, if , the factor should be interpreted as being equal to 1. Now, the right hand side of this equation is summable over , (with if ) and , the sum being bounded from above by . In conclusion, in view of (6.16), we find
| 6.36 |
as desired. Analyticity of , uniformly in h, is a consequence of the absolute summability of its tree expansion, as well as of the uniform-in-h bounds that we just derived. A slight extension of the discussion above would also allow us to prove the existence of the limit in the right hand side of (6.8) and to derive explicit estimates on the speed of convergence to the limit. However, in order not to overwhelm an already lengthy discussion, we prefer not to discuss explicitly this point, which is left to the interested reader as a simple exercise. The bounds on and are completely analogous to those discussed above; the minor changes (mostly notational) required for adapting the previous estimates to these functions are left to the reader. The proof of Theorem 2.5 is thus concluded.
Acknowledgements
We gratefully acknowledge support from: the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme, ERC CoG UniCoSM, grant agreement n.724939 (A.G.) and ERC StG MaMBoQ, n.802901 (G.S.); MUR, PRIN 2017 project MaQuMA cod. 2017ASFLJR (A.G., V.M., G.S.); MUR, PRIN 2022 project MaIQuFi cod. 20223J85K3; GNFM-INdAM Gruppo Nazionale per la Fisica Matematica.
First Order Computation of
In this appendix, we calculate the first order contribution in to , which implies (2.47) for . We recall that is expressed via a convergent tree expansion as in (4.24); isolating the first order from the higher order contributions implies:
| A.1 |
where and are the two trees in Fig. A.2 (the analogous trees with an endpoint of type replacing the endpoint of type give zero contribution).
In order to compute and , we recall that the kernel associated with the endpoint of type has the form in the third line of (2.39), with and (see [1, (5.30), (G.7)]):
| A.3 |
(here is the area of the unit sphere in ). An application of the definition of tree value and a straightforward computation shows that:
| A.4 |
where . Now, plugging these expressions in (A.1), using (A.3) and the fact that , we find:
| A.5 |
A computation shows that , which gives , as already announced.
Proof of (2.48) and (2.49)
Using (2.55)-(2.56) and (5.3), we write:
| B.1 |
From Proposition 5.1 and its proof we know that the limits in the right hand sides exist, and that the contribution to (resp. ) from a given tree is bounded from above by (resp. ), for some , see (5.11). Therefore, using the fact that the number of trees with k endpoints is smaller than , we find that the sum of the contributions to (resp. ) from the trees with 3 or more endpoints is bounded from above by (resp. ). Therefore, in order to prove (2.48), it is sufficient to prove that the contribution to from the tree(s) with 2 endpoints is equal to the right hand side of (2.48) up, possibly, to an error term of the order , and similarly for (2.49).
Dominant contribution to
. Direct inspection shows that there is only one tree with 2 endpoints contributing to , which is the following:
whose contribution to is , which implies (2.48).
Dominant contribution to
. Direct inspection shows that there are two trees with 2 endpoints contributing to , which are the following:
whose total contribution to is (denoting by the scalar part of , i.e., ):
| B.4 |
We let , with , and, after a relabelling of the scale indices, we rewrite (B.4) as:
| B.5 |
where we used:
| B.6 |
Now, noting that
| B.7 |
multiplying and dividing by in (B.5) we get:
| B.8 |
We will prove below that the second addend in the right hand side can be bounded as:
| B.9 |
that is, this term can be included in the error term defined and bounded in the lines preceding and following (2.49). On the other hand, the first term in the right hand side of (B.8) can be rewritten as follows: recall that the sum over in should be interpreted as the limit as of the sum over ; therefore, using the telescopic structure of the summand and, more specifically, the fact that (where the identities are in the sense of distributions), we see that the first term in the right hand side of (B.8) is equal to
| B.10 |
as desired.
We are left with proving (B.9). By adding and subtracting to the term in square brackets, we rewrite the second term in the right hand side of (B.8) as follows:
| B.11 |
where we recall that denotes the scalar part of (i.e., ) and, analogously, denotes the scalar part of , see (2.8); moreover,
| B.12 |
Now, recall that, by (4.14) and the definition of ,
| B.13 |
whose proof is given in [1, Appendix A.2]. In order to get a bound on we proceed as follows: in the integral in the right hand side of (B.12), we rescale , thus getting:
| B.14 |
The integral in the second line can be bounded by proceeding exactly as in [1, Appendix A.2] (note, in particular, that admits an analytic continuation into the polydisk centered at of radius such that the maximum of in the polydisk is bounded by : this allows us to proceed as in [1, (A.15)] and following lines); we thus get, for some :
| B.15 |
We can now bound (B.11) via (B.13) and (B.15), thus getting, for some and :
| B.16 |
where we used that . This conclude the proof of (2.49).
Funding
Open access funding provided by Università degli Studi Roma Tre within the CRUI-CARE Agreement.
Data Availability
The authors declare that the data supporting the findings of this study are available within the paper.
Declarations
Conflict of interest
The first author (A.G.) is on the editorial board of Communications in Mathematical Physics.
Footnotes
Other previous results on critical exponents of interacting field theories in the mathematical physics literature include the following. In the context of models with marginally irrelevant interactions, like theories, the large-distance asymptotic behavior of correlation functions is characterized by logarithmic corrections with specific, fractional, exponents, computed in [32–34]; similar logarithmic corrections with fractional exponents are expected to characterize the short-distance asymptotic behavior of fermionic models with marginally relevant interactions, like the Gross-Neveu model in : its exponents can be computed via a generalization of [3, 35, 36], even though they have not been explicitly worked out. In the context of 2D models with ‘marginally marginal’ interactions, i.e., marginal interactions with asymptotically vanishing beta function [37, 38], the exponents displayed by the large-distance behavior of correlation functions are analytic in the interaction strength in a small disk in the complex plane; universality for these exponents have been proved, as well, in the sense that extended scaling relations are verified [39, 40].
An alternative to our choice of keeping the ultraviolet cutoff fixed would be to send it to infinity, after appropriate rescaling of the field or density operators, thus obtaining a set of exactly scale invariant correlation functions, as done in [29, 30]. The corresponding scaling operators can in principle be obtained via a reconstruction theorem from the corresponding correlations, as done in [30], and identified with random Schwarz distributions, which the renormalized operators at finite ultraviolet cutoff converge to in suitable Sobolev norms, as the cutoff is removed. However, this strategy may be difficult, if not impossible, to work out for composite operators: e.g, in the 2D Ising setting, there is a strong indication that the energy field cannot be constructed in the limit of removed ultraviolet cutoff via a similar procedure, see [41]. In this respect, the use of a fixed ultraviolet cutoff appears to be a convenient choice for constructing (almost-)scaling operators associated to arbitrary composite fields.
In finite volume the symbol should be understood a shorthand notation for the corresponding Riemann sum of discrete allowed momenta. As discussed in [1, Appendix H] the RG map leading to the definition of can be defined in finite volume and proved to converge strongly (as an operator acting on the Banach space of interactions defined in [1, Section 4]) to a well-defined infinite volume counterpart. An analogous discussion can be repeated in the generalized setting considered in this paper, where external fields and correlation functions are considered. In the following we will always write all the relevant equations directly in the infinite volume setting and leave the details of the proof of convergence of the finite volume theory to its thermodynamic limit to the reader.
Both and should be interpreted as formal infinite sums of monomials in and J, each monomial being specified by the order in and J and by the corresponding kernel. In other words, and must be thought of as the infinite sequences of such kernels, whose physical interpretation is that of multipoint response functions. Moreover, these kernels should be thought of as the infinite volume limits of the corresponding finite volume kernels; the existence of the infinite volume limit is implicit in the proofs discussed in this paper, and is a corollary of the methods developed in [1] and here; see [1, Appendix H] for details about the non-perturbative definition of the effective potential and the existence of the infinite-volume limit.
We distinguish between response functions, defined in terms of functional derivatives of a generating function, and correlation functions, defined as expectations of products of local or almost-local operators, see below. The two notions differ by the effect of non-linear terms in the action: e.g., when deriving the generating function twice with respect to an external field, after setting it to zero we get a two-point correlation function plus an additional term due to the terms in the action that are quadratic in the external field.
In this paper, we won’t discuss how to compute the two-point functions in (2.11) and how to prove that they have the same asymptotic behavior as the response functions: this follows from a stability analysis of the RG flow in the vicinity of the fixed point potential, which is deferred to a third paper in this series. In such a third paper, we will also prove the independence of the fixed point potential from the scale parameter entering the definition of the RG map, see next section, and, most importantly, the universality of the critical exponents with respect to the choice of the ultraviolet cutoff function in (2.2).
A local operator at x is a (possibly infinite) linear combination of products of fields supported in a finite ball centered at x. An almost-local operator may depend upon fields at arbitrary large distance from x: however, the dependence upon decays stretched-exponentially to zero as .
See in particular (2.57). Note that the discussion in Sect. 2.8 is written in terms of and rather than in terms of , but this is just a matter of notation.
If , then . If , the index needs not to be specified, but, conventionally, in that case we set . If we shall often drop the label .
To be precise, the relevance or irrelevance of the term with depends upon the sign of . In any case, even if irrelevant, this term is barely so, with a scaling dimension of order . For this reason, it is convenient to treat it differently from the irrelevant terms with scaling dimensions well separated from 0, uniformly in . Moreover, the terms with with are relevant only if : in they are irrelevant, with scaling dimension equal to ; however, the treatment of these terms in does not present any significant simplification, as compared to the cases . For this reason, and for uniformity of notation, we shall treat them exactly in the same way for and for , notwithstanding this difference: in particular, the notion of of trimmed sequence and of ‘trimming’ given below, which defines the way in which we ‘localize’ and ‘interpolate’ the relevant terms, is the same in .
The rationale behind the labels ext, 0, and f in (2.42) is the following: ‘ext’ stands for ‘external field’, it refers to the fact that , i.e., there is at least one ‘external field’ or J field; ‘f’ stands for ‘fluctuation field’, it refers to the fact that , i.e., there is at least one ‘fluctuation field’ ; similarly, the label ‘0’ in the first definition indicates that , i.e., there is no fluctuation field.
The bound (5.14) is similar to (4.17) for the same value of (for which the trimming operator T in the first line of (4.17) acts as the identity and, therefore, ), the most relevant differences being that: (1) the operator in the first line of (4.17) is replaced by the action of in the left hand side of (5.14); (2) in the left hand side of (5.14) we are not integrating over the coordinate x, contrary to the case of (4.17). Correspondingly, the proof of (5.14) is similar to that (4.17), and the details are left to the reader. Let us just mention that the two differences (1) and (2) mentioned above explain the presence of the decay factor in (5.14), as well as that of the dimensional factor instead of (roughly speaking, the fact that in (5.14) we have ‘one integration less’, in combination with the presence of , comes with a dimensional factor ; on the other hand, the factor in (4.17) is a norm bound on ).
Note that for there is only one possible choice of compatible with the constraints , , indicated under the second sum in the right hand side of (6.13), that is : therefore, for , the value in the right hand side of (6.12) is the same denoted by in (6.13).
This work was supported by Università degli Studi Roma Tre, Sapienza Università di Roma, Institut des Hautes Études Scientifiques, and SISSA.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Giuliani, A., Mastropietro, V., Rychkov, S.: Gentle introduction to rigorous Renormalization Group: a worked fermionic example. JHEP 01, 026 (2021). 10.1007/JHEP01(2021)026. arXiv:2008.04361 [hep-th] [Google Scholar]
-
2.Gawedzki, K., Kupiainen, A.: Massless lattice
theory: rigorous control of a renormalizable asymptotically free model. Commun. Math. Phys. 99(2), 197–252 (1985). 10.1007/BF01212281 [Google Scholar] - 3.Gawedzki, K., Kupiainen, A.: Gross-Neveu model through convergent perturbation expansions. Commun. Math. Phys. 102, 1 (1985). 10.1007/BF01208817 [Google Scholar]
- 4.Gawedzki, K., Kupiainen, A.: Renormalization of a nonrenormalizable quantum field theory. Nucl. Phys. B 262, 33–48 (1985). 10.1016/0550-3213(85)90062-8 [Google Scholar]
- 5.Fisher, M., Ma, S.-K., Nickel, B.: Critical exponents for long-range interactions. Phys. Rev. Lett. (1972). 10.1103/PhysRevLett.29.917 [Google Scholar]
- 6.Sak, J.: Recursion relations and fixed points for ferromagnets with long-range interactions. Phys. Rev. B 8, 281–285 (1973) [Google Scholar]
- 7.Sak, J.: Low-temperature renormalization group for ferromagnets with long-range interactions. Phys. Rev. B 15, 4344–4347 (1977). 10.1103/PhysRevB.15.4344 [Google Scholar]
-
8.Brydges, D.C., Mitter, P.K., Scoppola, B.: Critical
. Commun. Math. Phys. 240, 281–327 (2003). 10.1007/s00220-003-0895-4. arXiv:hep-th/0206040 [hep-th] [Google Scholar] - 9.Abdesselam, A.: A complete renormalization group trajectory between two fixed points. Commun. Math. Phys. 276, 727–772 (2007). 10.1007/s00220-007-0352-x. arXiv:math-ph/0610018 [math-ph] [Google Scholar]
-
10.Slade, G.: Critical exponents for long-range
models below the upper critical dimension. Commun. Math. Phys. 358(1), 343–436 (2018). 10.1007/s00220-017-3024-5. arXiv:1611.06169 [math-ph] [Google Scholar] - 11.Greenblatt, R.L.: Constructing a weakly-interacting fixed point of the Fermionic Polchinski equation. J. Math. Phys. 65, 112301 (2024). 10.1063/5.0203607. arXiv:2401.04462 [Mathematical Physics] [Google Scholar]
- 12.Polchinski, J.: Renormalization and Effective Lagrangians. Nucl. Phys. B 231, 269–295 (1984). 10.1016/0550-3213(84)90287-6 [Google Scholar]
- 13.Gross, D.J., Rosenhaus, V.: A line of CFTs: from generalized free fields to SYK. JHEP 07, 086 (2017). 10.1007/JHEP07(2017)086. arXiv:1706.07015 [hep-th] [Google Scholar]
-
14.Kausch, H.G.: Curiosities at
, arXiv:hep-th/9510149 [hep-th]
-
15.Saleur, H.: Polymers and percolation in two-dimensions and twisted
supersymmetry. Nucl. Phys. B 382, 486–531 (1992). 10.1016/0550-3213(92)90657-W. arXiv:hep-th/9111007 [hep-th] [Google Scholar] - 16.Wiese, K.J., Fedorenko, A.A.: Field theories for loop-erased random walks. Nucl. Phys. B 946, 114696 (2019). 10.1016/j.nuclphysb.2019.114696. arXiv:1802.08830 [cond-mat.stat-mech] [Google Scholar]
- 17.Anninos, D., Hartman, T., Strominger, A.: Higher spin realization of the dS/CFT correspondence. Class. Quant. Grav. 34(1), 015009 (2017). 10.1088/1361-6382/34/1/015009. arXiv:1108.5735 [hep-th] [Google Scholar]
- 18.LeClair, A.: Quantum critical spin liquids, the 3D Ising model, and conformal field theory in 2+1 dimensions, arXiv:cond-mat/0610639 [cond-mat]
- 19.LeClair, A.: 3D Ising and other models from symplectic fermions, arXiv:cond-mat/0610817v2 [cond-mat.stat-mech]
- 20.LeClair, A., Neubert, M.: Semi-Lorentz invariance, unitarity, and critical exponents of symplectic fermion models. JHEP 10, 027 (2007). 10.1088/1126-6708/2007/10/027. arXiv:0705.4657 [hep-th] [Google Scholar]
-
21.Fei, L., Giombi, S., Klebanov, I.R., Tarnopolsky, G.: Critical
models in
dimensions and higher spin dS/CFT. JHEP 09, 076 (2015). 10.1007/JHEP09(2015)076. arXiv:1502.07271 [hep-th] [Google Scholar] -
22.Stergiou, A.: Symplectic critical models in
dimensions. Phys. Lett. B 751, 184–187 (2015). 10.1016/j.physletb.2015.10.044. arXiv:1508.03639 [hep-th] [Google Scholar] - 23.Poland, D., Rychkov, S., Vichi, A.: The conformal bootstrap: theory, numerical techniques, and applications. Rev. Mod. Phys. 91, 015002 (2019). 10.1103/RevModPhys.91.015002. arXiv:1805.04405 [hep-th] [Google Scholar]
- 24.Kravchuk, P., Qiao, J., Rychkov, S.: Distributions in CFT. Part II. Minkowski space. JHEP 08, 094 (2021). 10.1007/JHEP08(2021)094. arXiv:2104.02090 [hep-th] [Google Scholar]
- 25.Rychkov, S.: 3D Ising Model: a view from the Conformal Bootstrap Island. C R Phys. 21(2), 185–198 (2020). 10.5802/crphys.23. arXiv:2007.14315 [math-ph] [Google Scholar]
- 26.Wegner, F.: The critical state, general aspects. In: Domb, C., Green, M. (eds.) Phase Transitions and Critical Phenomena, vol. 6, pp. 8–126. Academic Press (1976)
- 27.Kupiainen, A., Rhodes, R., Vargas, V.: Local conformal structure of Liouville quantum gravity. Commun. Math. Phys. 371, 1005–1069 (2019). 10.1007/s00220-018-3260-3. arXiv:1512.01802 [Probability] [Google Scholar]
- 28.Kupiainen, A., Rhodes, R., Vargas, V.: Integrability of Liouville theory: proof of the DOZZ Formula. Ann. Math. 191(1), 81–166 (2020). 10.4007/annals.2020.191.1.2. arXiv:1707.08785 [Probability] [Google Scholar]
- 29.Guillarmou, C., Kupiainen, A., Rhodes, R., Vargas, V.: Conformal bootstrap in Liouville Theory. Acta Math. 233, 33–194 (2024). 10.4310/ACTA.2024.v233.n1.a2. arXiv:2005.11530 [math probability] [Google Scholar]
- 30.Camia, F., Garban, C., Newman, C.: Planar Ising magnetization field I. Uniqueness of the critical scaling limit. Ann. Probab. 43, 528–571 (2015). 10.1214/13-AOP881. arXiv:1205.6610 [Probability] [Google Scholar]
- 31.Hongler, C., Kytölä, K., Viklund, F.: Conformal field theory at the lattice level: discrete complex analysis and Virasoro structure. Commun. Math. Phys. 395, 1–58 (2022). 10.1007/s00220-022-04475-x. arXiv:1307.4104 [DOI] [PMC free article] [PubMed] [Google Scholar]
-
32.Bauerschmidt, R., Brydges, D.C., Slade, G.: Scaling limits and critical behaviour of the
-dimensional
-component
spin model. J. Stat. Phys. 157, 692–742 (2014). 10.1007/s10955-014-1060-5. arXiv:1403.7424 [math-ph] [Google Scholar] -
33.Bauerschmidt, R., Slade, G., Tomberg, A., Wallace, B.C.: Finite-order correlation length for
-dimensional weakly self-avoiding walk and
spins. Ann. Henri Poincaré 18, 375–402 (2017). 10.1007/s00023-016-0499-0. arXiv:1511.02790 [math-ph] [Google Scholar] -
34.Slade, G., Tomberg, A.: Critical correlation functions for the
-dimensional weakly self-avoiding walk and
-component
model. Commun. Math. Phys. 342, 675–737 (2016). 10.1007/s00220-015-2488-4. arXiv:1412.2668 [math-ph] [Google Scholar] - 35.Feldman, J., Magnen, J., Rivasseau, V., Sénéor, R.: A renormalizable field theory: the massive Gross-Neveu model in two dimensions. Commun. Math. Phys. 103(1), 67–103 (1986). 10.1007/BF01464282 [Google Scholar]
- 36.Dimock, J., Yuan, C.: Structural stability of the RG flow in the Gross-Neveu model. Ann. Henri Poincaré 25, 5113–5186 (2024). 10.1007/s00023-024-01427-0. arXiv:2303.07916 [math-ph] [Google Scholar]
- 37.Benfatto, G., Mastropietro, V.: Ward Identities and Chiral Anomaly in the Luttinger Liquid. Commun. Math. Phys. 258, 609–655 (2005). 10.1007/s00220-005-1364-z. arXiv:0409049v1 [cond-mat] [Google Scholar]
- 38.Benfatto, G., Falco, P., Mastropietro, V.: Functional integral construction of the massive Thirring model: verification of axioms and massless limit. Commun. Math. Phys. 273, 67–118 (2007). 10.1007/s00220-007-0254-y. arXiv:0606177 [hep-th] [Google Scholar]
- 39.Benfatto, G., Falco, P., Mastropietro, V.: Extended scaling relations for planar lattice models. Commun. Math. Phys. 292, 569–605 (2009). 10.1007/s00220-009-0888-z. arXiv:0811.3218v1 [cond-mat] [Google Scholar]
- 40.Giuliani, A., Mastropietro, V., Toninelli, F.L.: Non-integrable dimers: Universal fluctuations of tilted height profiles. Commun. Math. Phys. 377, 1883–1959 (2020). 10.1007/s00220-020-03760-x. arXiv:1904.07526 [math-ph] [Google Scholar]
- 41.Garban, C., Kupiainen, A.: Energy field of critical Ising model and examples of singular fields in QFT. arXiv:2502.02554 [Probability]
- 42.Patashinsky, A.Z., Pokrovsky, V.N.: Fluctuation Theory of Phase Transitions, p. 321. Pergamon Pr, Oxford, England (1979) [Google Scholar]
- 43.Grubb, G.: Distributions and Operators, vol. 252. Springer (2008)
- 44.Giuliani, A., Greenblatt, R.L., Mastropietro, V.: The scaling limit of the energy correlations in non integrable Ising models. J. Math. Phys. 53, 095214 (2012). 10.1063/1.4745910. arXiv:1204.4040 [math-ph] [Google Scholar]
- 45.Antinucci, G., Giuliani, A., Greenblatt, R.L.: Non-integrable Ising models in cylindrical geometry: Grassmann representation and infinite volume limit. Ann. Henri Poincaré 23, 1061–1139 (2022). 10.1007/s00023-021-01107-3. arXiv:2104.09328 [math-ph] [Google Scholar]
- 46.Antinucci, G., Giuliani, A., Greenblatt, R.L.: Energy correlations of non-integrable Ising models: the scaling limit in the cylinder. Commun. Math. Phys. 397, 393–483 (2023). 10.1007/s00220-022-04481-z. arXiv:2006.04458 [math-ph] [Google Scholar]
- 47.Gentile, G., Mastropietro, V.: Renormalization group for one-dimensional fermions. A review on mathematical results. Phys. Rep. 352, 273–437 (2001). 10.1016/S0370-1573(01)00041-2 [Google Scholar]
- 48.Gallavotti, G.: The Elements of Mechanics. Springer (1983)
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The authors declare that the data supporting the findings of this study are available within the paper.

