Preprint
Article

This version is not peer-reviewed.

Operational Certification Horizons in Quantum Transport: Copy Time, Conservation Laws, and a Rigorous Diffusive Benchmark

Submitted:

27 March 2026

Posted:

27 March 2026

Read the latest preprint version here

Abstract

We introduce an operational transport latency, quantum information copy time: the earliesttime at which a receiver confined to a region B can certify, with prescribed advantage, whichof two global hypotheses was prepared by local operations in a distant sender region A. The benchmark quantity is information-theoretic—the Helstrom advantage on B, namely the tracedistance between the reduced states—and it also admits receiver-restricted refinements that makemeasurement constraints explicit, including few-body and moment-channel receivers. We derivethe corresponding kinematic locality constraints for Hamiltonian and Lindbladian dynamicswith Lieb–Robinson tails, as well as for circuits and quantum cellular automata with strictlight cones. We then establish the theorem-level anchor of the manuscript in the quantumsymmetric simple exclusion process (Q-SSEP): for locally prepared charge-biased hypotheses,the Helstrom copy time obeys an unconditional diffusion-limited lower bound expressed in termsof the diffusion constant D and the static susceptibility χ. For closed Hamiltonian systems,we formulate a projection-based reduction in which the operational scaling statement is made conditional on explicit, diagnostically checkable hypotheses, thereby separating what is provedmicroscopically from what is inferred in a controlled hydrodynamic window. We complement the analytical framework with exact-diagonalization diagnostics in the XXZ chain and with abundled TEBD/MPS reference protocol plus validation suite (Supplementary S2 and Code SC1),explicitly cross-validated against exact evolution at small sizes. In the strengthened submissionwe add three robustness layers beyond the original ED figures: an eight-size common-windowtransport sweep for the nonintegrable XXZ structure-factor diagnostic, an extractor-robustness check comparing first-crossing and sustained-crossing copy-time rules on the same Helstrom dataset, and a receiver-side validation dataset showing when a simple block-charge measurement saturates the Helstrom advantage in a controlled conserving reference model. Finally, we comparecopy time with scrambling diagnostics based on out-of-time-ordered correlators and show how conservation laws can delay certifiability well beyond the ballistic operator-growth front without any contradiction with locality.

Keywords: 
;  ;  ;  ;  ;  ;  

1. Introduction

Transport in quantum many-body systems is usually inferred from expectation values and correlation functions, while information-theoretic diagnostics are often framed in terms of operator growth and scrambling. This work takes a complementary, task-defined viewpoint, designed to isolate the operational content of transport claims. We ask when a localized perturbation prepared in a sender region A becomes remotely certifiable by an observer restricted to a distant region B. The resulting timescale—the quantum information copy time—is defined by binary hypothesis testing on B: it is the earliest time at which the receiver can distinguish two evolving global hypotheses with a prescribed advantage.
Two aspects make this perspective useful for transport theory. First, it cleanly separates kinematics from mechanism: locality bounds constrain when influence can begin, but they do not identify which dynamical sector controls a concrete certification task. Second, in systems with conservation laws the sector that dominates certifiability can be parametrically slower than the fastest operator-growth sector. In particular, ballistic growth of commutators (and large OTOCs) does not imply that a charge-biased hypothesis becomes certifiable at a comparable time; the bottleneck may be diffusive (or sub-/super-diffusive) transport of the conserved bias.
A central aim of this manuscript is to place this statement on a precise footing without conflating ideal receivers with experimentally accessible ones. Accordingly, we distinguish two notions throughout: (i) the Helstrom copy time, defined by the trace distance between reduced states on B (equivalently, optimal measurements on B), and (ii) restricted copy times, where the receiver is constrained to a specified measurement/observable class (few-body, moment channels, coarse-grained charge, etc.). The restricted notion is the natural object when one wants scaling claims tied to hydrodynamic transport; the Helstrom notion is the mathematically canonical benchmark.

Main contributions. 

C1. 
Operational framework. We define receiver advantage and copy time as a task-defined latency, and we provide a receiver-class refinement that makes measurement restrictions explicit (Section 2.1).
C2. 
Minimal locality constraints. For Hamiltonian/Lindbladian dynamics with Lieb–Robinson tails and for circuits/QCAs with strict light cones, we derive a kinematic lower bound on copy time that isolates the threshold dependence and constants (Section 3).
C3. 
A rigorous diffusive benchmark (Q-SSEP). In the controlled, locality-preserving quantum symmetric simple exclusion process (Q-SSEP), we prove an unconditional lower bound of the form
τ copy ( A B ; η ) C ( η , ϵ , χ , | A | , | B | ) 2 D ,
where = d ( A , B ) , D is the diffusion constant of the conserved density, and χ is the associated static susceptibility. This furnishes a theorem-level instance in which diffusion-limited Helstrom copying is established directly from microscopic dynamics (Section 6; Supplementary S3).
C4. 
Hydrodynamic reduction for unitary systems. For closed Hamiltonian dynamics we formulate a projection-based route from charge bias to receiver advantage and identify the concrete hypotheses under which a single slow transport pole controls the operational signal (Section 4 and Section 5). The resulting statement is organized so that each required ingredient admits a direct diagnostic proxy.
C5. 
Benchmarking and protocols. We provide finite-size transport diagnostics in the XXZ chain with explicit uncertainty controls, together with a detailed TEBD/MPS protocol outline and a bundled small-system TEBD-vs-ED validation suite (Section 10; Supplementary S2). The strengthened package adds an eight-size common-window transport sweep (including odd sizes), an explicit extractor-robustness diagnostic for copy-time extraction, and a receiver-side validation benchmark for a charge-measurement surrogate.
C6. 
Comparison to scrambling diagnostics and extensions. We show, in a sharp operational sense, why a ballistic OTOC front can coexist with diffusion-limited certifiability under conservation laws (Section 8), and we outline how copy time can act as an operational microscope for non-diffusive regimes such as KPZ superdiffusion, Griffiths subdiffusion, and MBL (Supplementary S4).

Logical status of the results

The manuscript is organized in three layers, and the distinction between them is part of the message rather than a caveat. At the foundational level, the definition of copy time and the locality constraints are exact. At the theorem level, the Q-SSEP benchmark yields an unconditional diffusion-limited lower bound for the Helstrom copy time in a fully microscopic model. At the Hamiltonian level, the projection-based hydrodynamic reduction is stated as a conditional theorem with explicit assumptions, explicit leakage terms, and explicit diagnostic proxies, so that the operational scaling statement is attached to a delimited dynamical regime rather than to an informal mixing narrative.

Positioning. 

Receiver advantage is the trace distance between reduced states and is standard in quantum hypothesis testing [1,2]. What is emphasized here is the hitting-time interpretation at fixed advantage and, crucially, the way conservation laws and receiver restrictions can turn transport coefficients into operational latencies. This connects naturally to the linear-response and projection-operator traditions [3,4,5,6] and to recent work on operator hydrodynamics in conserving dynamics [7,8]. The diffusive benchmark (Q-SSEP) provides a controlled setting in which the operational inequality becomes fully rigorous, while the unitary sections describe how and when similar bounds should emerge in Hamiltonian systems.

2. Operational Definition and Preliminaries

2.1. Copy Time as Receiver-Limited Hypothesis Testing

Fix disjoint lattice regions A (sender) and B (receiver). To avoid ambiguity about “support in A”, we take the hypotheses to be prepared from a common reference state ρ ref by local channels on A:
ρ ± ( 0 ) = Λ A ± ρ ref , Λ A ± = Λ A ± id A c .
This guarantees ρ + ( 0 ) and ρ ( 0 ) coincide on A c . The evolved hypotheses are ρ ± ( t ) = U t ( ρ ± ( 0 ) ) , where U t is a unitary channel (closed dynamics) or, more generally, any CPTP dynamics. For the receiver region B, let ρ ± , B ( t ) = Tr B c ρ ± ( t ) .
Definition 1
(Receiver advantage and copy times). [1,2] Fix a threshold η ( 0 , 1 ) .
(a)
Helstrom (unrestricted) advantage. The optimal receiver advantage is
Adv A B full ( t ) : = 1 2 ρ + , B ( t ) ρ , B ( t ) 1 ,
equivalently the Helstrom bias for discriminating ρ + , B ( t ) vs. ρ , B ( t ) with equal priors. The associated copy time is
τ copy full ( A B ; η ) : = inf { t 0 : Adv A B full ( t ) η } .
(b)
Restricted advantage. Let O B be an admissible observable class on B with O B 1 for all O B O B (few-body algebras, moment channels, coarse-grained charge observables,etc.). Define the restricted advantage
Adv A B O ( t ) : = 1 2 sup O B O B Tr O B ρ + , B ( t ) ρ , B ( t ) ,
and the corresponding restricted copy time τ copy O ( A B ; η ) : = inf { t 0 : Adv A B O ( t ) η } by the same hitting-time rule as in (3). Equivalently, if Φ O denotes a CPTP “measurement compression” channel whose dual maps the unit ball into O B , then Adv O ( t ) = 1 2 Φ O ( ρ + , B ( t ) ρ , B ( t ) ) 1 .
By data processing, Adv A B O ( t ) Adv A B full ( t ) and hence τ copy full ( A B ; η ) τ copy O ( A B ; η ) . Most transport-driven scaling statements in this manuscript concern restricted copy times, because conservation laws naturally constrain the evolution of coarse observables. The rigorous diffusive benchmark in Section 6 applies to the Helstrom copy time.

Operational sampling complexity (how many shots?).

“Operational” is meaningful only if the advantage can be estimated with a controlled number of experimental samples. For a fixed time t and an observable O B with eigenvalues in [ 1 , 1 ] , an empirical estimator m ^ = 1 n j = 1 n o j of m = Tr ( O B δ ρ B ( t ) ) obeys a Hoeffding bound: n = Θ δ 2 log ( 1 / α ) samples suffice to estimate m to additive error δ with failure probability α . Consequently, certifying Adv A B O ( t ) η up to slack δ requires n = O ( δ 2 log ( 1 / α ) ) shots for each candidate O B (or for the compressed measurement channel Φ O ). For the special case B = one site and charge-biased hypotheses (Section 10.2), the Helstrom-optimal measurement is a single local two-outcome measurement, so the same O ( δ 2 log ( 1 / α ) ) scaling applies without tomography. More generally, the bundled validation dataset used below shows that in a dephased U(1)-preserving reference model a simple block-charge measurement becomes essentially Helstrom-optimal after a short transient, which provides an explicit receiver-side calibration for the surrogate-measurement logic.
Preprints 205335 i001

Remark on “chemical potential tilts”.

Later we use the convenient parametrization ρ ± ( 0 ) e β H ϵ Q A in linear-response calculations. At finite β this family is not strictly supported in A unless [ H , Q A ] = 0 ; it should be regarded as an analytically tractable proxy for a locally prepared bias, with errors controlled by equilibrium clustering. Whenever strict support in A is required (for locality-limited bounds), we work with the local-channel preparation (1).

2.2. Elementary Bounds and Remarks

We record two standard inequalities used later. The first is a direct duality bound.
Lemma 1
(Standard tool: trace-norm duality). This identity is standard in quantum hypothesis testing and is included only to fix notation. For any Hermitian X and any observable O with O 1 ,
| Tr ( O X ) | X 1 .
In particular,
Adv A B full ( t ) = 1 2 sup O B 1 Tr O B ρ + , B ( t ) ρ , B ( t ) .
The second is Pinsker’s inequality. We state the required support condition explicitly.
Lemma 2
(Pinsker inequality with full-rank condition). If ρ is full rank (so that D ( σ ρ ) < for all σ), then
D tr ( σ , ρ ) 1 2 D ( σ ρ ) .
If ρ is not full rank, the inequality remains valid provided supp ( σ ) supp ( ρ ) ; otherwise D ( σ ρ ) = and (7) is vacuous.
In all numerical benchmarks reported below we work in finite-dimensional Hilbert spaces (finite spin chains) and, where thermal reference states are invoked, at finite inverse temperature β < ; consequently the reduced density matrices encountered are effectively full rank (up to machine precision), and Lemma 2 is used only in this non-vacuous regime.

3. Minimal Locality Bounds and What Is Genuinely nontrivial

3.1. Locality-Preserving Dynamics and Lieb–Robinson Constraints

Throughout, we assume a lattice with a metric d ( · , · ) , and we denote the distance between regions A , B by d ( A , B ) . For continuous-time local Hamiltonians or for locality-preserving circuits/QCAs, the standard consequence is a Lieb–Robinson-type bound: a local perturbation cannot influence distant observables faster than a finite velocity v LR , up to exponentially small tails.
We deliberately do not conflate different settings. When we refer to LR bounds, we mean either (i) a continuous-time Hamiltonian/Lindbladian LR bound with constants ( v , μ ) or (ii) a circuit/QCA strict light cone. In each case, the structure is an upper bound on commutators of evolved local observables.
Theorem 1
(Locality-limited copying: Hamiltonian LR tails vs. circuit/QCA light cones). Let U t be the evolution channel (unitary or CPTP) on a lattice with metric d ( · , · ) . Assume one of the following standard locality structures for Heisenberg-evolved observables.
  • (H) Continuous-time Hamiltonian/Lindbladian (Lieb–Robinson tails). There exist constants c , μ , v > 0 such that for any observables O X supported on a finite region X and O Y supported on Y,
    [ O X ( t ) , O Y ] c | X | | Y | O X O Y e μ ( d ( X , Y ) v | t | ) .
  • (C) Discrete-time range-R circuits / reversible QCAs (strict light cone). For each integer time t N , the Heisenberg image of a local algebra satisfies
    supp O X ( t ) X + R t [ O X ( t ) , O Y ] = 0 whenever d ( X , Y ) > R t .
Let the initial pair ρ ± differ only inside a sender region A and satisfy ρ + ρ 1 2 . Then for any receiver region B and any time t:
  • (H) For local Hamiltonian evolution satisfying a Lieb–Robinson bound, the receiver advantage is bounded by (A4) outside the effective cone.
  • (C) For range-R circuits or reversible QCAs, the strict light cone implies Adv A B full ( t ) = 0 whenever d ( A , B ) > R t .
In particular, in both settings the copy time obeys the kinematic lower bound
τ copy full ( A B ; η ) d ( A , B ) v 1 μ v log C LR / η , in ( H ) , d ( A , B ) / R , in ( C ) .
Remark 1
(About constants in the Lieb–Robinson bound). In case (H), one may take C LR : = 2 c | A | | B | ρ + ρ 1 for the LR prefactor c appearing in (A3) (up to harmless constants absorbed by the choice of norm convention), so that the only dependence on A , B is through the region-size factor | A | | B | . If the initial preparation is not strictly supported in A but has exponential Gibbs tails with rate κ (i.e. Tr A c δ ρ 1 decays as e κ d ), the same bound holds with an additional additive error term of order e κ ( d ( A , B ) v | t | ) ; equivalently one replaces μ by min { μ , κ } in the logarithmic correction. In case(H), the prefactor C LR comes from the standard LR “localization” estimate (A3) (denoted C 1 in the proof) and is independent of A , B , t except through bounded region-size factors. The only scaling content of (10) is therefore the kinematic term d ( A , B ) / v and the mild logarithmic threshold correction.
Remark 2
(What Theorem 1 does not do). Theorem 1 is anupper boundon how early copy can occur; it does not provide a mechanism forachievingη at times t d ( A , B ) / v . For an A-level contribution, the hard part is alower bound(or matching scaling) in physically relevant regimes. This is precisely where conservation laws and hydrodynamics enter.

3.2. Conservation Laws and an Explicit Receiver Class

Fix a (quasi-)local conserved charge Q = x q x with [ U t , Q ] = 0 . We will focus on initial perturbations that are “charge-biased” in A. Importantly, the receiver need not have access to all observables on B; in realistic settings one often restricts to a class O B (e.g., low moments of charge, or few-body observables).
To avoid circularity, we proceed in two steps: (i) we provide a theorem under minimal hypotheses that yields a general lower bound in terms of an explicitly defined susceptibility-like object, and (ii) we identify an additional single-mode hydrodynamic window under which that object becomes computable from transport data.

4. Hydrodynamic Closure: From Charge Bias to Spectral Susceptibility

4.1. Setup: Local Equilibrium Manifold and Linearization

Let ρ β be a reference Gibbs (or generalized Gibbs) state at inverse temperature β . Consider a small sender perturbation of “chemical potential” type,
ρ ± ( 0 ) = e β H ϵ Q A Tr ( e β H ϵ Q A ) ,
where Q A = x A q x and ϵ 1 . To leading order in ϵ , the difference δ ρ ( 0 ) : = ρ + ( 0 ) ρ ( 0 ) is linear in Q A in the Kubo–Mori inner product.
Table 1. Notation used in the hydrodynamic closure section.
Table 1. Notation used in the hydrodynamic closure section.
Symbol Meaning
L Liouvillian superoperator ( L ( O ) = i [ H , O ] for closed systems)
P , Q Mori projection onto the slow manifold and its complement
· , · β Kubo–Mori inner product induced by the reference state ρ β
L eff Markovianized effective slow-sector generator (Equation (13))
χ A B ( 2 ) Second-moment spectral susceptibility (Definition 2)
J B Receiver observable restricted to the slow sector
Δ fast Fast-sector mixing gap controlling memory decay (assumption)

4.2. A Principled Definition of the Second-Moment Susceptibility

Let L denote the (Heisenberg) Liouvillian superoperator L ( O ) = i [ H , O ] (or the generator of a CPTP semigroup in open settings). Let P be a projection onto the slow subspace spanned by the conserved density modes; concretely, P is the Mori projection with respect to the Kubo–Mori inner product. Define the reduced (effective) slow-sector operator using the Mori–Zwanzig projection formalism [4,5]. In Laplace space one obtains an exact identity for the projected dynamics,
z L eff ( z ) 1 = P ( z L ) 1 P , L eff ( z ) : = P L P + P L Q ( z Q L Q ) 1 Q L P .
This expression is exact but generally nonlocal in time (the z-dependence encodes a memory kernel). In closed unitary dynamics, L ( O ) = i [ H , O ] is anti-self-adjoint and L eff ( z ) is not a CPTP generator in general; it should be interpreted as a reduced linear-response operator in the Kubo–Mori geometry. In contrast, for genuinely open Markovian dynamics (Lindbladians) the same construction yields a bona fide dissipative generator on the slow manifold.
To obtain a usable closure we adopt a standard Markovianized approximation on a time window where the fast sector mixes rapidly: we replace L eff ( z ) by its low-frequency limit L eff : = L eff ( 0 ) and assume that the fast subspace Q has a spectral gap Δ fast > 0 that controls memory decay. Under these hypotheses one recovers the familiar time-local approximation
L eff P L P P L Q ( Q L Q ) 1 Q L P ,
which we use in the theorems below, with an explicit error term quantifying the leakage into Q (see Proposition 1 and Theorem 2).

Controlled hydrodynamic regime.

The Markovianized Mori closure is designed for chaotic, finite-temperature phases in which a small set of conserved slow modes is cleanly separated from a rapidly mixing fast sector. The relevant ingredients are explicit: an isolated slow pole, a nonvanishing receiver overlap, and a fast-sector relaxation scale that can be probed numerically. Integrable or near-integrable regimes, many-body-localized phases, long-time-tail dominated windows, or quasi-conserved prethermal plateaus require a modified analysis because more than one slow structure may remain active on the same time scale. Theorems 2 and 3 are therefore formulated directly around this controlled regime and paired with diagnostic proxies that identify it in practice.
Table 2. Hydrodynamic reduction checklist: assumptions, concrete diagnostic proxies, and characteristic breakdown mechanisms for the single-mode transport window discussed in this section.
Table 2. Hydrodynamic reduction checklist: assumptions, concrete diagnostic proxies, and characteristic breakdown mechanisms for the single-mode transport window discussed in this section.
Assumption Operational/diagnostic proxy Typical failure modes
Fast-sector mixing (“gap” in Q ) Rapid decay of generic local autocorrelations to their hydrodynamic tail; absence of long-lived nonconserved operators in the accessible ED window (finite-size diagnostic) (Supplementary diagnostics) Integrability, quasi-conservation (prethermal plateaus), MBL
Single isolated slow pole Γ ( k ) approximately linear in k 2 over a time window; window-to-window stability; no competing ballistic/Drude channel (Section 9, Supplementary S2) Multiple slow modes, long-time tails, Drude weight/nonzero stiffness
Nonzero receiver overlap Choose J B with provable overlap (e.g., coarse- grained charge in B); verify signal is nonzero at accessible times Symmetry mismatch; receiver observable orthogonal to slow mode
Linear-response regime Small ϵ tilt; check odd-in- ϵ scaling and absence of saturation artifacts in numerics Large perturbations, finite-size saturation, edge effects
Definition 2
(Second-moment spectral susceptibility). References [3,4,5] Let δ μ be a small chemical-potential profile supported in A, and let J B denote a receiver observable (e.g., the charge in B or its low moments) projected to the slow subspace. We define thesecond-moment spectral susceptibilityby
χ A B ( 2 ) : = J B , ( L eff ) 2 J B β δ μ 2 ,
where · , · β is the Kubo–Mori inner product and ( L eff ) 2 is understood on the orthogonal complement of the zero mode.
Remark 3
(Why (14) is the right object). The operator ( L eff ) 1 is a resolvent that weights modes by inverse decay rate; squaring it yields a second moment that controls the time at which a receiver observable can accumulate a finite signal. Definition 2 makes explicit (a) the operator being inverted, (b) the topology (Kubo–Mori norm) in which neglected modes are controlled, and (c) the receiver class through J B .
Proposition 1
(Fast-sector leakage bound in the Kubo–Mori topology). Let · , · β be the Kubo–Mori inner product induced by a full-rank reference state ρ β ,
X , Y β : = 0 1 Tr ρ β s X ρ β 1 s Y d s , X β : = X , X β .
Assume that the fast-sector generator has a spectral gap Δ fast > 0 in this topology, in the sense that for all X with P X = 0 ,
X , Q L Q X β Δ fast X β 2 .
Then the leakage of slow data into the fast sector is exponentially suppressed:
Q e t L P β β e Δ fast t .
Consequently, for any receiver observable O B with O B 1 and any slow-sector signal X Ran ( P ) ,
O B , Q e t L X β O B β Q e t L P β β X β O B β X β e Δ fast t .
This provides an explicit topology-controlled bound on the neglected-mode contribution in Theorem 2.
Remark 4
(Interpretation in closed Hamiltonian problems). For genuinely unitary microscopic dynamics, Equation (16) should not be read as a generic statement about the exact block Q L Q of the Liouvillian. In the Hamiltonian application it functions as a sufficient coarse-grained semigroup hypothesis: either it holds for a Markovianized effective generator on the fast complement, or it is replaced by an explicit memory-kernel estimate that yields the same envelope for the projected residual. Appendix B records such a resolvent-based criterion. Accordingly, the theorem below is strongest when read as “slow signal plus an explicit residual envelope” rather than as a claim of microscopic dissipativity in a closed system.

4.3. Two Theorems: Minimal and Single-Mode

We now state two versions of the central result: an unconditional projection theorem for the reduced operational signal and a conditional single-mode hydrodynamic specialization.
Theorem 2
(Projection-operator lower bound on receiver advantage with explicit error term). Assume (i) a finite-dimensional lattice system with a full-rank reference state ρ β , (ii) a weak charge-biased perturbation of the form (11) with ϵ 1 , and (iii) a Mori projection P onto the slow manifold such that the Markovianized effective operator L eff in (13) is well-defined on Ran ( P ) . Let J B Ran ( P ) be a receiver observable supported in B with J B 1 . Then, for all times t 0 ,
Adv A B O ( t ) ϵ 2 J B , e t L eff P ( Q A ) β ϵ 2 J B , Q e t L P ( Q A ) β + O ( ϵ 3 ) .
If, in addition, the fast-sector gap hypothesis (16) of Proposition 1 holds with rate Δ fast , then the neglected-mode term admits the explicit bound
J B , Q e t L P ( Q A ) β J B β P ( Q A ) β e Δ fast t .
Thus, on any time window where e Δ fast t 1 , the receiver advantage is governed (up to explicit exponentially small leakage) by the projected slow dynamics, without assuminga priorithat the receiver “sees the slow mode”.
Corollary 1
(Explicit “slow signal minus fast leakage” form). Under the assumptions of Theorem 2 and Proposition 1, define
S A B ( t ) : = J B , e t L eff P ( Q A ) β , C fast : = J B β P ( Q A ) β .
Then, for all t 0 ,
Adv A B O ( t ) ϵ 2 S A B ( t ) ϵ 2 C fast e Δ fast t + O ( ϵ 3 ) .
In particular, once t Δ fast 1 , the advantage is controlled by the explicit slow-sector correlator S A B ( t ) up to a quantified error.
Theorem 3
(Single-mode hydrodynamic window under explicit hypotheses). Assume the hypotheses of Theorem 2 together with:
(S1) 
Single slow pole: on a wavelength band k [ k min , k max ] the slow spectrum on Ran ( P ) consists of a single nonzero mode with decay rate Γ ( k ) = D k 2 + o ( k 2 ) and a gap Δ 2 to the next slow mode on that band;
(S2) 
Receiver overlap: the projected receiver observable has nonzero overlap with that mode, quantified by the form factor F B ( k ) entering (A13);
(S3) 
Fast mixing: the fast-sector leakage is controlled by Proposition 1 with rate Δ fast on the window of interest.
Then, for a one-dimensional sender–receiver separation = d ( A , B ) and fixed threshold η ( 0 , 1 ) , the copy time satisfies the transport-limited scaling
τ copy O ( A B ; η ) = 2 4 D 1 + o ( 1 ) + O t 0 log ( C / η ) ,
where t 0 : = 1 / ( D k max 2 ) is the microscopic time associated with the upper cutoff k max of the single-mode window and C > 0 collects order-one receiver/form-factor constants (explicit in Appendix B). In the hydrodynamic window Δ fast 1 t min { L 2 / D , Δ 2 1 } , with explicitly bounded systematic errors from: (i) finite-size discretization of k (Appendix E), (ii) slow-sector multi-mode contamination O ( e Δ 2 t ) , and (iii) fast-sector leakage O ( e Δ fast t ) via (20). The prefactor can be expressed in terms of the susceptibility χ A B ( 2 ) in Definition 2.
Detailed derivations are given in Appendices Appendix AAppendix B. The projection theorem and its corollary are proved directly from Helstrom duality and linear response, while the single-mode statement is reduced to an explicit heat-kernel inversion plus controlled residual envelopes. The key point is that the nontrivial input is not the informal statement “the receiver sees the slow mode”; rather it is the explicit control of the residual term and the coupling coefficient between Q A and J B in the projected dynamics.

5. Worked Hydrodynamic Example: One-Dimensional Diffusion Kernel

To make Theorem 3 concrete, we work out the diffusion-kernel signal at the level needed to turn “diffusion implies τ 2 ” into a quantitatively checkable statement.

5.1. Linear-Response form of the Reduced-State Difference

Write ρ ± ( t ) = U t ( ρ ± ( 0 ) ) with ρ ± ( 0 ) given by (11). Expanding to first order in ϵ yields
δ ρ ( t ) : = ρ + ( t ) ρ ( t ) = ϵ U t δ ρ Q A + O ( ϵ 3 ) ,
where δ ρ Q A is the Kubo–Mori tangent vector associated to Q A at ρ β . For any receiver observable O B with O B 1 ,
Tr O B δ ρ B ( t ) = Tr O B Tr B c δ ρ ( t ) = Tr O B ( t ) δ ρ Q A + O ( ϵ 3 ) .
Thus the operational advantage is lower-bounded by any explicit choice of O B .

5.2. Diffusion Equation for the Conserved Density

Assume a single conserved density q ( x ) on a ring of length L with hydrodynamic equation
t δ q ( x , t ) = D x 2 δ q ( x , t ) ,
valid on the window t [ t 0 , t 1 ] and wavelengths λ 1 (in lattice units). On the ring, the Fourier modes k n = 2 π n L evolve as
δ q k n ( t ) = e D k n 2 t δ q k n ( 0 ) .
For a localized initial bias in A, δ q ( x , 0 ) has broad Fourier support but its long-time profile is controlled by the smallest nonzero | k n | .

5.3. Receiver Signal and a Concrete Threshold-to-Time Relation

Let Q B ( t ) = B q ( x , t ) d x be the receiver charge in an interval B centered at distance from A with width w. In the linear-response regime around ρ β , the expected receiver shift is proportional to the chemical potential profile with coefficient given by the static susceptibility χ = q / μ :
δ Q B ( t ) χ B δ μ ( x , t ) d x .
Approximating δ μ by the Gaussian heat kernel on R for times t L 2 / D ,
δ μ ( x , t ) ϵ 4 π D t exp ( x ) 2 4 D t ,
we obtain the scaling
δ Q B ( t ) ϵ χ w ( 4 π D t ) 1 / 2 exp 2 4 D t ,
up to relative corrections of order w 2 / ( D t ) and t D / L 2 . Choosing O B proportional to the centered receiver charge (normalized to O B 1 ) and using Lemma 1 gives a lower bound
Adv A B full ( t ) 1 2 | Tr ( O B δ ρ B ( t ) ) | c 0 | δ Q B ( t ) | ,
where c 0 is an explicit normalization constant. Solving Adv A B full ( t ) = η for t yields, at leading order,
τ copy ( A B ; η ) 2 4 D 1 + O log ( 1 / η ) log ( ) ,
making precise the statement that the distance dependence is 2 while η enters only logarithmically in the diffusive window.

A quantitative η – and | B | –dependence (Gaussian-kernel inversion).

Within the Gaussian-kernel approximation (30) (and keeping only the dominant -dependence), the threshold condition has the form
K B t 1 / 2 exp 2 4 D t = η eff ,
where K B | ϵ | χ | B | collects receiver-dependent prefactors and η eff is the effective threshold after mapping a chosen measurement to an advantage surrogate (e.g., in the commuting Gaussian model below, η eff erf 1 ( η ) ). Equation (33) can be inverted in closed form using the Lambert-W function:
τ copy ( A B ; η ) 2 2 D W 1 c 2 η eff 2 K B 2 1 ,
on the physical ( W 1 ) branch. This makes explicit two experimentally testable trends in the diffusive window: (i) η enters only through a slowly varying (logarithmic/Lambert-W) factor at fixed , and (ii) increasing the receiver size (larger | B | ) increases K B and therefore decreases the required copy time. We emphasize that Equation (34) is a controlled prediction only to the extent that the Gaussian-kernel approximation is valid on the fitted window; Appendix F provides a small-system ED illustration of the smooth η and | B | dependence without claiming thermodynamic scaling. A finite-volume version based on (27) and the lowest nonzero mode k min = 2 π / L yields the crossover from Gaussian kernel behavior to the ring’s exponential mode decay.

5.4. An Exactly Solvable Gaussian Diffusion Toy Model (Fully Analytic)

To remove any ambiguity about “which observable is optimal” and what constants control the threshold, we include a reference model in which the Helstrom measurement can be written in closed form. Consider commuting hypotheses in which the only receiver-relevant variable is the coarse-grained charge Q B and, conditional on either hypothesis, Q B is Gaussian with means ± m ( t ) and a common variance σ B 2 (equilibrium charge fluctuations in B). In this setting the Helstrom optimum reduces to classical hypothesis testing on Q B and the (optimal) advantage equals the classical total-variation distance (i.e., p q TV : = 1 2 p q 1 ) between two Gaussians,
Adv A B full ( t ) = N ( m ( t ) , σ B 2 ) N ( m ( t ) , σ B 2 ) TV = erf | m ( t ) | 2 σ B .
For a diffusive signal m ( t ) B G ( x , t ) d x (with heat kernel G), Equation (35) yields an explicit closed-form definition of τ copy at threshold η :
τ copy ( A B ; η ) = inf t > 0 : | m ( t ) | 2 σ B erf 1 ( η ) .
Appendix G gives the full derivation and shows how this “commuting” formula interfaces with the Kubo–Mori linear-response bounds and the moment-channel optimality statements.

6. A Rigorous Diffusive Benchmark: Helstrom Copy Time in Q-SSEP

The hydrodynamic sections below describe how diffusion-limited copying can emerge in unitary dynamics under explicitly stated hypotheses. The operational framework becomes especially compelling when it can be anchored in a fully microscopic theorem. We therefore turn to a controlled benchmark in which diffusion-limited copying can be proved without any fast-mixing assumption: the quantum symmetric simple exclusion process (Q-SSEP) [9].

6.1. Model and Hypotheses

Q-SSEP is a local, translation-invariant Lindbladian dynamics that preserves a U ( 1 ) charge (occupation number) and induces exact diffusion of that conserved density. A key structural feature is that a large family of states remains diagonal in the occupation basis, and within this invariant manifold the evolution of diagonal weights reduces to the classical symmetric simple exclusion process (SSEP). This provides an exactly controlled setting in which transport coefficients and hypothesis-testing advantages can be related sharply.
We consider locally prepared hypotheses of the form (1), chosen so that (to leading order in a small bias parameter ϵ ) the initial difference is a localized charge perturbation supported in A. The receiver B is taken at distance = d ( A , B ) . We denote by D the diffusion constant governing the macroscopic scaling of the conserved density and by χ the corresponding static susceptibility.

6.2. Main Inequality

The following theorem is the benchmark result. It is stated for the Helstrom advantage (unrestricted measurements on B).
Theorem 4
(Diffusion-limited Helstrom copying in Q-SSEP (linear-response regime)). Consider Q-SSEP dynamics in one dimension at inverse temperature β < (including β = 0 ), and assume the hypotheses are locally prepared so that their initial difference is a small, localized charge bias of amplitude ϵ supported in A. Then there exist absolute constants C 0 , C 1 > 0 such that, to leading order in the bias parameter ϵ (with corrections O ( ϵ 2 ) uniform on finite B), for any receiver region B at distance = d ( A , B ) and all t > 0 ,
Adv A B full ( t ) C 0 | ϵ | χ | B | 1 D t exp 2 C 1 D t + O ( ϵ 2 ) .
Consequently, for any threshold η not exceeding the maximal attainable advantage, the copy time obeys the lower bound
τ copy ( A B ; η ) 2 C 1 D / log C 0 | ϵ | χ | B | η ,
and in particular τ copy full ( A B ; η ) c ( η , ϵ , χ , | B | ) 2 / D .
Remark 5
(Why this matters). Theorem 4 is not a hydrodynamic closure: it is a rigorous operational inequality in a fully defined microscopic model. It shows that diffusion can impose a genuineoperational horizon for certifiabilityeven when the receiver is allowed Helstrom-optimal measurements on B. The proof does not invoke a fast-sector gap for unitary Liouvillians; instead it exploits the exactly diffusive structure of Q-SSEP and sharp heat-kernel bounds.
A detailed proof, including the reduction to SSEP on the diagonal manifold and the quantitative constants, is given in Supplementary S3.
Figure 1. Schematic illustration of the bound (37) in the Q-SSEP benchmark: for fixed separation , the advantage is exponentially suppressed until diffusive time scales t 2 / D become available.
Figure 1. Schematic illustration of the bound (37) in the Q-SSEP benchmark: for fixed separation , the advantage is exponentially suppressed until diffusive time scales t 2 / D become available.
Preprints 205335 g001

7. Moment-Channel Approximation and Operational Accessibility

The definition (3) involves full state discrimination on B, which is optimal but may be experimentally unrealistic. A practical approach is to restrict the receiver to a moment family (e.g., charge moments). This restriction should be described as an explicit map.

7.1. Definition of the Moment Channel

Let H B be the receiver Hilbert space. Fix an observable family F = { f 1 , , f m } on B (e.g., q B , q B 2 , …) and define the moment channel
Φ F ( ρ B ) : = Tr ( ρ B f 1 ) , , Tr ( ρ B f m ) R m .
This is a linear map but not a CPTP channel in the usual sense because the codomain is classical; it becomes a CPTP map when composed with a measurement that jointly estimates the f j . Operationally, restricting to Φ F yields a lower bound on Adv full via Lemma 1:
Adv A B full ( t ) 1 2 sup α : j α j f j 1 j = 1 m α j Tr ( ρ + , B ( t ) f j ) Tr ( ρ , B ( t ) f j ) .

7.2. When Moment Restriction Is Asymptotically Optimal

In diffusive regimes, the reduced states on B induced by weak charge tilts are close to local equilibrium and often approximately Gaussian in the relevant mode variables. In this case, low moments can be asymptotically sufficient statistics. We make this precise by stating an explicit assumption (Gaussianity in a fluctuation algebra) and deriving a matching upper bound in Appendix C.

8. Copy Time Versus OTOCs and Lieb–Robinson Bounds: A Sharp Separation

Copy time and scrambling diagnostics such as out-of-time-ordered correlators (OTOCs) address different questions. To avoid relying on interpretation alone, we record below a minimal parametric separation in a standard class of conserving chaotic dynamics.
Figure 2. An illustrative operational separation with real data (small-system exact diagonalization). Left: commutator-squared OTOC proxy C otoc ( , t ) (blue) and Helstrom advantage Adv full ( B = { } , t ) for copying a conserved bias (orange), both normalized by their respective thresholds C * and η . At distance = 3 the OTOC crosses its threshold at t 2.2 , while the optimal-copy advantage remains below η = 0.02 throughout the displayed window t 4 , implying τ copy ( = 3 ; η ) > 4 . Right: extracted arrival times from the same run; OTOC times are consistent with a ballistic guide line ( ) while copy times can be parametrically delayed (lower-bound markers “ > 4 ”). Parameters: periodic XXZ chain with staggered field (U(1) conserved, integrability broken), L = 8 , Δ = 1 , h stag = 0.5 , and the charge-bias hypotheses of Equation (11) in the infinite-temperature limit. All raw outputs and the generating scripts are provided in the accompanying Supplementary Materials and Code Archive (see the accompanying Supplementary Materials and Code Archive).
Figure 2. An illustrative operational separation with real data (small-system exact diagonalization). Left: commutator-squared OTOC proxy C otoc ( , t ) (blue) and Helstrom advantage Adv full ( B = { } , t ) for copying a conserved bias (orange), both normalized by their respective thresholds C * and η . At distance = 3 the OTOC crosses its threshold at t 2.2 , while the optimal-copy advantage remains below η = 0.02 throughout the displayed window t 4 , implying τ copy ( = 3 ; η ) > 4 . Right: extracted arrival times from the same run; OTOC times are consistent with a ballistic guide line ( ) while copy times can be parametrically delayed (lower-bound markers “ > 4 ”). Parameters: periodic XXZ chain with staggered field (U(1) conserved, integrability broken), L = 8 , Δ = 1 , h stag = 0.5 , and the charge-bias hypotheses of Equation (11) in the infinite-temperature limit. All raw outputs and the generating scripts are provided in the accompanying Supplementary Materials and Code Archive (see the accompanying Supplementary Materials and Code Archive).
Preprints 205335 g002

8.1. Ballistic Operator Growth Does Not Imply Fast Copying Under Conservation

In generic local dynamics, operator support typically spreads ballistically with a butterfly velocity, and OTOCs detect the resulting front [10,11,12]. However, when the sender perturbation is constrained to lie in a conserved sector (as in (11)), the receiver’s ability to certify that perturbation is controlled by the transport of the conserved density, which can be diffusive even when operator growth is ballistic.
This separation is explicit in the now-standard picture of dissipative hydrodynamics emerging under unitary dynamics with conservation laws [13,14]. In such systems, the OTOC front can be ballistic while the conserved mode relaxes diffusively; our Theorem 3 precisely predicts the resulting copy-time scaling for charge-biased hypotheses.
Proposition 2
(Parametric separation in conserving chaotic dynamics). Consider a one-dimensional local unitary dynamics with a conserved U ( 1 ) charge and with chaotic (mixing) dynamics in all other operator sectors. Assume: (i) operator support spreads ballistically with velocity v B (as diagnosed by OTOCs), and (ii) the conserved density exhibits diffusion with coefficient D on the relevant window. Then for sender/receiver separation ℓ and fixed threshold η ( 0 , 1 ) ,
τ OTOC ( ) / v B , τ copy ( A B ; η ) 2 / ( 4 D ) ,
provided the sender perturbation is a weak charge bias and the receiver is restricted to physically accessible (e.g., few-body or moment) observables. Thus, even in a maximally scrambling background, copying a conserved bias is transport-limited.

Proof sketch.

The OTOC timescale τ OTOC ( ) is governed by the ballistic spreading of generic local operators, as captured by the butterfly velocity v B  [10,11]. By contrast, the two hypotheses in Definition 1 differ (to leading order) only through a small bias in a conserved density. Linear response therefore reduces the receiver signal to a hydrodynamic correlator in the slow sector (Theorem 2), and in a single-mode diffusive window it takes the heat-kernel form exp { 2 / ( 4 D t ) } (Section 5). Inverting this threshold condition yields τ copy 2 / ( 4 D ) up to logarithmic η -dependent corrections, made explicit (with leakage/error terms) in Theorem 3.
Proposition 2 is not a new theorem of operator growth; it is a clean operational interpretation: OTOCs probe the fastest operator sector, while copy time probes the slowest sector that actually carries the hypothesis difference to the receiver.

8.2. Relation to LR Bounds

Lieb–Robinson bounds control the earliest possible influence outside an effective light cone (Theorem 1), but they do not determine the dominant timescale when a conservation law forces information to flow through a slow hydrodynamic channel. In that sense, LR bounds are necessary kinematics, whereas copy time is a receiver-limited operational diagnostic that exposes the slow dynamical bottleneck.

9. Failure Modes and Boundaries of Validity

A high-standard submission must include explicit boundaries. We summarize the main failure modes and what replaces Theorem 3:
  • Integrable / near-integrable dynamics. Ballistic channels and stable quasi-particles yield Γ ( k ) | k | or coexistence of ballistic and diffusive channels; single-mode diffusion fails. The “effective exponent” extracted from small-k finite-size data can drift and even become negative when the estimator is outside its validity window (Appendix H).
  • MBL or quasi-MBL. Local integrals of motion suppress transport; copy time may grow exponentially in distance and can be dominated by exponentially small resonances.
  • Floquet without conservation. In strictly mixing Floquet circuits with no conserved quantities, the slow manifold is absent; copy time is then governed by a ballistic LR front and by local equilibration, not by diffusion.
  • Quasi-conservation / prethermalization. Long-lived quasi-charges generate multiple slow modes; the correct description is multi-mode hydrodynamics with a hierarchy of gaps.
Figure 3. Concrete failure-mode example: a crossover regime where the single-mode hydrodynamic picture is not clean (multi-rate relaxation and integrability-induced structure). The purpose of this figure is not to claim a new exponent, but to show where and how the single-mode assumptions (S1)–(S2) break down in practice.
Figure 3. Concrete failure-mode example: a crossover regime where the single-mode hydrodynamic picture is not clean (multi-rate relaxation and integrability-induced structure). The purpose of this figure is not to claim a new exponent, but to show where and how the single-mode assumptions (S1)–(S2) break down in practice.
Preprints 205335 g003

10. Numerical Benchmarks: ED with Explicit Uncertainty Quantification

We provide a reproducible pipeline (Supplementary Code Archive SC1, including the corresponding analysis outputs) that produces every reported figure from raw data; a figure-to-script map (FIGURE_MAP.md) is included in the code archive. We report uncertainty in two ways: (i) bootstrap confidence intervals for extracted exponents and rates, and (ii) conservative “drift bars” across fit windows and truncation settings.

10.1. Exact Diagonalization Transport Extraction

We estimate the small-k decay rate Γ ( k ) from the time dependence of the spin structure factor S ( k , t ) , using linear fits of log S ( k , t ) over a window chosen by stability diagnostics.

Conservative finite-size protocol.

Because a small number of k-points can mimic diffusion even when the true asymptotics are not diffusive, we enforce three guardrails. (i) We never infer diffusion from a single system size; Figure 5 displays size drift explicitly. (ii) For each L we fit Γ ( k ) only on windows where the slope is stable under shifting the time-fit window used to extract Γ from S ( k , t ) . (iii) We report only an effective finite-size diagnostic D eff ( L ) : = Γ ( k min ) / k min 2 ( k min = 2 π / L ) together with its window-to-window drift; we do not extrapolate an infinite-volume diffusion constant from L 14 . This protocol is designed to isolate reproducible finite-size transport signatures at L 14 without folding uncontrolled extrapolations into the reported quantities.
Representative outputs are shown in Figure 4 and, for visual context, in Figure 5.
Finite-size reporting. Because L 14 provides only a coarse momentum grid, we report the finite-size diagnostic D eff ( L ) = Γ ( 2 π / L ) / ( 2 π / L ) 2 together with its drift across admissible fit windows. The analysis bundle in Supplementary Code Archive SC1 (in the accompanying data archive) contains the full set of window scans, slope-stability tests, and additional integrity checks used to determine which fits are admissible, including an explicit cross-L time-window sensitivity test (see FIGURE_MAP.md). The publication-ready package additionally includes a dense-size common-window plot for the nonintegrable case that combines the archived even sizes and auxiliary odd sizes; see Figure 7 and the accompanying CSV file in the data archive.
Table 3. Conservative finite-size diagnostic D eff ( L ) = Γ ( 2 π / L ) / ( 2 π / L ) 2 extracted from ED structure-factor decay rates at the smallest nonzero momentum. We report point estimates and bootstrap 95% CIs for two representative regimes in the XXZ chain: an integrable point ( h stag = 0 ) and a symmetry-breaking perturbation ( h stag = 0.5 ). The strong size drift and inconsistent scaling at h stag = 0 (integrable) illustrate the failure of a single diffusive description at these sizes; by contrast, h stag = 0.5 shows a comparatively stable D eff ( L ) across L. Rows where the CI endpoints coincide reflect a degenerate bootstrap (insufficient independent typicality vectors at that L in the archived run), and should be interpreted as point estimates rather than as genuine uncertainty quantification.
Table 3. Conservative finite-size diagnostic D eff ( L ) = Γ ( 2 π / L ) / ( 2 π / L ) 2 extracted from ED structure-factor decay rates at the smallest nonzero momentum. We report point estimates and bootstrap 95% CIs for two representative regimes in the XXZ chain: an integrable point ( h stag = 0 ) and a symmetry-breaking perturbation ( h stag = 0.5 ). The strong size drift and inconsistent scaling at h stag = 0 (integrable) illustrate the failure of a single diffusive description at these sizes; by contrast, h stag = 0.5 shows a comparatively stable D eff ( L ) across L. Rows where the CI endpoints coincide reflect a degenerate bootstrap (insufficient independent typicality vectors at that L in the archived run), and should be interpreted as point estimates rather than as genuine uncertainty quantification.
L h stag D eff ( L ) 95% CI
8 0.0 0.242 [0.106, 0.348]
10 0.0 1.661 [1.316, 1.962]
12 0.0 1.736 [1.443, 2.118]
14 0.0 1.409 [1.409, 1.409]
8 0.5 0.303 [0.252, 0.354]
10 0.5 0.296 [0.294, 0.298]
12 0.5 0.330 [0.326, 0.334]
14 0.5 0.335 [0.335, 0.335]
Figure 4. Conservative transport summary at small sizes: the estimator D eff ( L ) = Γ ( 2 π / L ) / ( 2 π / L ) 2 plotted against 1 / L , with bootstrap 95% confidence intervals inherited from the decay-rate extraction. The pronounced drift and non-monotonicity at h stag = 0 illustrate why we avoid interpreting L 14 data as asymptotic diffusion in the integrable regime. The broken-integrability case h stag = 0.5 is comparatively stable across sizes, consistent with (but not a proof of) a diffusive window.
Figure 4. Conservative transport summary at small sizes: the estimator D eff ( L ) = Γ ( 2 π / L ) / ( 2 π / L ) 2 plotted against 1 / L , with bootstrap 95% confidence intervals inherited from the decay-rate extraction. The pronounced drift and non-monotonicity at h stag = 0 illustrate why we avoid interpreting L 14 data as asymptotic diffusion in the integrable regime. The broken-integrability case h stag = 0.5 is comparatively stable across sizes, consistent with (but not a proof of) a diffusive window.
Preprints 205335 g004
A second robustness layer is to analyze the same dense-size dataset directly against 1 / L . Using the full eight-size window envelope, a weighted linear fit of D eff ( L ) versus 1 / L still shows a residual small-size drift. However, on the pre-registered tail L 10 the slope becomes statistically compatible with zero within the window envelope, and a weighted constant fit gives D eff tail = 0.4646 ± 0.0036 on the accessible finite window. Figure 8 visualizes both the full-data trend and the L 10 constant benchmark. This does not establish a thermodynamic diffusion constant, but it materially reduces the risk that the observed transport-side window is an artifact of a single sparse size choice.
Figure 5. Transport extraction diagnostic across system sizes (XXZ chain with integrability broken by a staggered field h = 0.5 ). For each L { 8 , 10 , 12 , 14 } we estimate the decay rate Γ ( k ) for several discrete momenta k n = 2 π n / L and report Γ ( k ) vs. k 2 . Rather than relying on three-point linearity, we treat the small-k window as a size-dependent fit problem: we require stability of the slope under window shifts and propagate the resulting spread as a systematic uncertainty in D eff ( L ) and in the inferred k 2 trend (Section 10).
Figure 5. Transport extraction diagnostic across system sizes (XXZ chain with integrability broken by a staggered field h = 0.5 ). For each L { 8 , 10 , 12 , 14 } we estimate the decay rate Γ ( k ) for several discrete momenta k n = 2 π n / L and report Γ ( k ) vs. k 2 . Rather than relying on three-point linearity, we treat the small-k window as a size-dependent fit problem: we require stability of the slope under window shifts and propagate the resulting spread as a systematic uncertainty in D eff ( L ) and in the inferred k 2 trend (Section 10).
Preprints 205335 g005
Figure 6. Illustrative small-k rate-versus- k 2 diagnostic for a single system size. The plot is provided for visual context only: with few available momenta at L 14 , apparent linearity cannot be taken as asymptotic evidence for a diffusion pole. Consequently, the main text reports only the finite-size diagnostic D eff ( L ) = Γ ( 2 π / L ) / ( 2 π / L ) 2 together with window-to-window drift (Table 3), and does not extrapolate an infinite-volume diffusion constant.
Figure 6. Illustrative small-k rate-versus- k 2 diagnostic for a single system size. The plot is provided for visual context only: with few available momenta at L 14 , apparent linearity cannot be taken as asymptotic evidence for a diffusion pole. Consequently, the main text reports only the finite-size diagnostic D eff ( L ) = Γ ( 2 π / L ) / ( 2 π / L ) 2 together with window-to-window drift (Table 3), and does not extrapolate an infinite-volume diffusion constant.
Preprints 205335 g006
Figure 7. Dense-size auxiliary finite-size diagnostic for the nonintegrable XXZ chain ( h stag = 0.5 ) on a common early-time window family. Open circles are the archived even sizes L = 8 , 10 , 12 , 14 ; filled squares are auxiliary odd sizes L = 9 , 11 , 13 , 15 generated for the publication-ready package. Each vertical bar shows the full envelope of D eff ( L ) = Γ ( k min ) / k min 2 obtained by scanning admissible early-time windows, with the central marker at the median over windows. The point of the figure is not an asymptotic extrapolation, but a robustness check: the nonintegrable finite-size trend persists on a denser size grid and under explicit window variation.
Figure 7. Dense-size auxiliary finite-size diagnostic for the nonintegrable XXZ chain ( h stag = 0.5 ) on a common early-time window family. Open circles are the archived even sizes L = 8 , 10 , 12 , 14 ; filled squares are auxiliary odd sizes L = 9 , 11 , 13 , 15 generated for the publication-ready package. Each vertical bar shows the full envelope of D eff ( L ) = Γ ( k min ) / k min 2 obtained by scanning admissible early-time windows, with the central marker at the median over windows. The point of the figure is not an asymptotic extrapolation, but a robustness check: the nonintegrable finite-size trend persists on a denser size grid and under explicit window variation.
Preprints 205335 g007
Figure 8. Weighted scaling diagnostic for the dense-size common-window dataset of Figure 7. The dotted line is a weighted linear fit over all eight sizes, while the dashed line is the weighted constant fit restricted to the pre-registered tail L 10 . The vertical dash-dotted line marks 1 / L = 0.1 . The tail fit is numerically stable within the window envelope even though the smallest sizes retain visible drift.
Figure 8. Weighted scaling diagnostic for the dense-size common-window dataset of Figure 7. The dotted line is a weighted linear fit over all eight sizes, while the dashed line is the weighted constant fit restricted to the pre-registered tail L 10 . The vertical dash-dotted line marks 1 / L = 0.1 . The tail fit is numerically stable within the window envelope even though the smallest sizes retain visible drift.
Preprints 205335 g008

10.2. Direct Computation of the Helstrom Advantage and τ copy full (XXZ, B One Site)

A key objective is to measure the operational object itself, not only the diffusion diagnostic D eff ( L ) . For a one-site receiver B = { l } and infinite-temperature hypotheses ρ ± ( 0 ) = I d ± ϵ d S 0 z , the reduced-state difference on B remains diagonal in the S l z basis and the Helstrom advantage simplifies to
Adv 0 l full ( t ) = 1 2 ρ + , l ( t ) ρ , l ( t ) 1 = 2 | ϵ | C z z ( l , t ) , C z z ( l , t ) : = 1 d Tr S l z ( t ) S 0 z .
Thus, for B one site the Helstrom measurement is operationally simple: it is a single local two-outcome measurement of S l z .
Figure 9 shows Adv 0 l full ( t ) for the nonintegrable XXZ chain ( Δ = 1 , h stag = 0.5 ) at L = 12 computed by ED with typicality ( N vec = 12 ), together with the threshold η = 0.02 . We define τ copy full ( 0 l ; η ) as the first intersection time of the (bootstrap-averaged) Adv full ( t ) curve with η . To reduce sensitivity to oscillatory transients in unitary dynamics, Supplementary S2 also reports a more conservative “sustained-crossing” variant, defined as the first time at which Adv full ( t ) remains above η for a short window Δ t . Figure 10 plots the extracted τ copy full against l 2 . While the ED sizes accessible here are small and show finite-size scatter (with explicit confidence intervals), a weighted linear fit on a pre-registered window (all data with l 2 , no point excluded) is broadly consistent with diffusion-limited scaling τ copy full l 2 . This operational plot should nevertheless be read together with the supplementary robustness layers introduced above: the denser transport-side size grid and the explicit receiver-side validation reduce the chance that the observed trend is an artifact of one sparse fit or one fragile receiver surrogate. Figure 11 further shows that the extracted times vary smoothly with the threshold η . All scripts, raw data, and figure-generation commands are included in Supplementary Code Archive SC1 and the analysis folder under Data/; see Reproducibility/FIGURE_MAP.md for a direct manuscript-to-code mapping.
A third robustness layer is to compare extraction rules on the same ED dataset. Figure 12 contrasts the first-crossing and sustained-crossing definitions for η = 0.01 and 0.02 . At short distances the two extractors are close; at larger separations they can differ appreciably when the advantage curve develops a broad shoulder before a sustained threshold crossing. We therefore treat the sustained-crossing rule as the conservative default in sensitivity checks and retain the first-crossing rule in the main operational figure only when accompanied by explicit uncertainty bars and extractor-robustness reporting.

Numerical diagnostic for fast mixing.

To validate assumption (S3) in Theorem 3, we monitor an operator with negligible overlap with the conserved charge, e.g. the transverse spin S 0 x . Figure 13 shows the decay of the infinite-temperature autocorrelator | C x x ( t ) | = | 1 d Tr ( S 0 x ( t ) S 0 x ) | in the same XXZ parameters. Rather than treating an exponential envelope as a proof of a sharp spectral gap, we use it as a pragmatic numerical diagnostic: an approximately exponential decay over an intermediate window suggests the presence of a “fast” sector that relaxes on a microscopic time scale. To make this diagnostic more transparent, Figure 14 plots the effective decay rate γ eff ( t ) = t log | C x x ( t ) | , which displays an approximate plateau on the same window.

10.3. Finite-Size Drift Diagnostics and the “Negative Exponent” Issue

An effective slope estimator z ^ ( L ) constructed from finite-size trends can yield nonphysical values (including negative numbers) in regimes where the hydrodynamic single-mode assumption is violated (e.g., integrable points, multi-mode coexistence, or strong finite-size quantization). For this reason we treat z ^ strictly as a breakdown diagnostic, not as a dynamic exponent, and we relegate the corresponding plots to Appendix H where they are clearly labelled as such.

10.4. TEBD/MPS Validation and Convergence Controls

No main-text scaling claim relies on TEBD results. Nevertheless, the strengthened submission now uses the bundled lightweight TEBD code in SC1 for a validation role: we compare TEBD/OBC correlators against exact evolution for a small chain where both calculations are feasible. Figure 15 shows the best validated run, and Appendix H.2 reports the convergence summary across χ max { 32 , 64 , 128 } and d t { 0.1 , 0.2 } . On the reported window the root-mean-square error against ED stays at the 10 2 level, with no visible improvement beyond χ max = 32 for this small-system benchmark, indicating that the validation dataset is limited by the reference stochastic error rather than bond-dimension truncation. We use this suite only to audit the tensor-network implementation and extraction logic; all transport-side and copy-time inferences in the main text still come from the archived ED datasets.

10.5. One-Page Synthesis of Regimes, Scalings, and Uncertainties

For convenience, Table 4 collects the central operational claims, the dynamical regime in which they are supported, and the level of validation provided in this work.

11. Supplementary Discussion: Quantum Cellular Automata and Operational Copy-Time Distances

This section is intentionally programmatic and nonessential. The journal-suitable results of the present manuscript are the operational definition, the minimal locality bounds, and the hydrodynamic closure statements supported by reproducible numerics (Section 2, Section 3, Section 4, Section 5, Section 6, Section 7, Section 8 and Section 9). Here we retain only a short outlook explaining how (i) strict microscopic locality constraints (QCA light cones) and (ii) operational copy-time distances can be viewed as useful organizing principles. More speculative directions (index-theoretic classification, code-subspace constraints, and any speculative remarks) have been removed from the main text and deferred to the author’s separate preprints for interested readers. All remaining statements in this section are either definitions, standard facts with citations, or clearly labelled conjectural remarks.

11.1. Locality-Preserving QCA as a Clean Microscopic Substrate

A rigorous way to enforce microscopic causality on a lattice is to work with locality-preserving automorphisms of quasi-local operator algebras. In one dimension, this is the standard definition of a reversible QCA [15,16,17].
Definition 3
(One-dimensional reversible QCA). [15,16,17] Let A = Λ Z finite A Λ ¯ be the quasi-local C * -algebra generated by finite-region matrix algebras A Λ . Areversible QCA of range Ris a *-automorphism α : A A such that for every finite region Λ,
α ( A Λ ) A Λ + R ,
where Λ + R is the R-neighborhood of Λ in the lattice metric. Equivalently, α maps any observable supported on Λ to an observable supported on Λ + R .
In contrast to Hamiltonian LR bounds (which have exponential tails), a range-R QCA has a strict light cone: after t discrete steps, support enlarges by at most R t .
Proposition 3
(Strict light-cone constraint implies a hard copy-time lower bound). Let α be a reversible QCA of range R and let ρ ± ( 0 ) be two global states that coincide on A c . Then for any receiver region B with d ( A , B ) > R t ,
ρ + , B ( t ) = ρ , B ( t ) Adv A B full ( t ) = 0 ,
hence τ copy full ( A B ; η ) d ( A , B ) / R for any η > 0 .

11.2. Copy-time distances and an operational geometry

Given a family of regions and a fixed η , the copy time defines a directed operational “distance”
d η ( A , B ) : = τ copy ( A B ; η ) ,
with a natural symmetrization d η sym ( A , B ) : = max { d η ( A , B ) , d η ( B , A ) } . In strictly causal systems (e.g., QCAs), d η is bounded below by the light-cone distance (Proposition 3). In transport-dominated phases with conservation laws, d η instead probes the geometry of hydrodynamic modes (Section 4, Section 5 and Section 6).
A basic consistency check for any geometric interpretation is that d η sym behaves approximately like a metric at scales where the effective theory is local. Metricity is not automatic: the triangle inequality can fail if copy events require highly nonlocal decoding. A conservative stance is therefore to treat d η as an operational causal preorder rather than a metric and to ask under what dynamical restrictions it becomes approximately metric.
Table 5. How microscopic structure controls copy-time geometry (outlook).
Table 5. How microscopic structure controls copy-time geometry (outlook).
Microscopic structure Dominant control of τ copy Geometric interpretation of d η
Range-R QCA (strict cone) Hard causal delay d / R Operational causal cone; metricity requires extra mixing
Local Hamiltonian (LR tails) Exponential tail outside cone Approximate causal cone with exponentially small leakage
Conservation + diffusion Slowest mode D k 2 (Theorem 3) Transport geometry; distances can scale as 2 in a diffusive window
Integrable / ballistic channels Coexisting modes, Drude weight Breakdown of single-mode geometry; d η is model dependent
Code-subspace restriction Admissible perturbations/observables Geometry depends on code constraints and decoding locality
Figure 16. Schematic: sender region A creates a weak perturbation; receiver region B certifies it via hypothesis testing, defining τ copy ( A B ; η ) . This figure is illustrative only and does not enter any bound or numerical inference.
Figure 16. Schematic: sender region A creates a weak perturbation; receiver region B certifies it via hypothesis testing, defining τ copy ( A B ; η ) . This figure is illustrative only and does not enter any bound or numerical inference.
Preprints 205335 g016

12. Conclusions

We introduced a receiver-limited operational definition of copy time, established minimal locality bounds, and exhibited a theorem-level diffusive benchmark in Q-SSEP in which the Helstrom copy time is pinned directly to microscopic transport. This closes the main conceptual loop of the paper: locality bounds determine when influence cannot yet be certified, while the conserved slow sector determines when certification can in fact become operationally available. For closed Hamiltonian systems, we formulated the corresponding hydrodynamic statement as a conditional theorem with explicit assumptions, explicit error channels, and explicit diagnostic proxies, so that the operational scaling claim is logically matched to the regime in which it is asserted. The XXZ numerics directly probe the operational quantity itself and provide a controlled finite-size consistency check of the transport picture developed in the analytical sections. Taken together, these results identify copy time as an operational horizon for transport that is sharply distinct from ballistic operator growth, anchored by a fully microscopic theorem in Q-SSEP, and extensible to unitary many-body dynamics only through clearly stated conditions. In that precise sense, the manuscript isolates a transport question, states the exact operational observable attached to it, and closes the argument at the level supported by the proof architecture.

Supplementary Materials

Supplementary File S1: definitions, locality bounds, and technical lemmas supporting the operational setup. Supplementary File S2: TEBD/MPS protocol and convergence checklist for thermodynamic-limit copy-time tests, together with a bundled small-system TEBD-vs-ED validation suite used for implementation auditing. Supplementary File S3: rigorous Q-SSEP benchmark and additional derivations for the diffusive lower bound. Supplementary File S4: conceptual positioning relative to OTOCs and toy examples separating operator growth from receiver-limited certifiability. Supplementary File S5: extended validation package developing the framework into (i) a direct operational separation from scrambling proxies, (ii) minimal-assumption theorem statements, (iii) an experimental readout protocol with shot/readout-noise accounting, and (iv) anomalous-transport scaling templates. Supplementary Code Archive SC1: code, minimal data, and scripts to reproduce the ED diagnostics, the Helstrom-advantage figure suite, and the bundled TEBD-vs-ED validation checks reported in the manuscript and appendix. Reproducibility notes: a figure-to-script map (FIGURE_MAP.md) is included in the code archive.

Data Availability Statement

All materials needed to reproduce the reported exact-diagonalization diagnostics and the Helstrom-advantage figure suite are included in the accompanying Supplementary Materials and Code Archive: (i) Supplementary Files S1–S5 (theory, strengthened diagnostics, and protocol descriptions) and (ii) Supplementary Code Archive SC1, including the corresponding analysis outputs and scripts needed to reproduce the reported ED diagnostics. A figure-to-script map (FIGURE_MAP.md) is included in the code archive. Beyond the ED datasets, the archive also contains a bundled small-system TEBD-vs-ED validation suite used to audit the tensor-network implementation. These TEBD checks are explicitly separated from the main scaling claims. Supplementary S2 provides the broader implementation-agnostic protocol for future thermodynamic-limit checks, while Supplementary S5 adds large-separation hydrodynamic scaling templates and an experiment-ready receiver protocol.

Conflicts of Interest

The author declares no competing interests.

Appendix A. Proof Details and Technical Lemmas

Appendix A.1. Proof of Theorem 1

We treat the Hamiltonian/Lindbladian Lieb–Robinson-tail case (H); the strict circuit/QCA light-cone statement (C) follows immediately from (9) because the evolved observable remains supported in A + R t and therefore cannot influence B when d ( A , B ) > R t . Let δ ρ ( 0 ) = ρ + ( 0 ) ρ ( 0 ) and δ ρ B ( t ) = Tr B c ( U t ( δ ρ ( 0 ) ) ) . By duality of the trace norm,
2 Adv A B full ( t ) = δ ρ B ( t ) 1 = sup O B 1 Tr O B δ ρ B ( t ) = sup O B 1 Tr O B ( t ) δ ρ ( 0 ) ,
where O B ( t ) = U t ( O B ) is the Heisenberg evolution. Since δ ρ ( 0 ) is supported on A, insert an arbitrary operator O B ( A c ) ( t ) supported on A c and use Tr ( O B ( A c ) ( t ) δ ρ ( 0 ) ) = 0 :
Tr O B ( t ) δ ρ ( 0 ) = Tr ( O B ( t ) O B ( A c ) ( t ) ) δ ρ ( 0 ) .
Choosing O B ( A c ) ( t ) as the best approximation to O B ( t ) supported on A c and applying standard LR localization bounds yields
inf supp ( Y ) A c O B ( t ) Y C 1 e μ ( d ( A , B ) v t ) .
Finally, | Tr ( X δ ρ ( 0 ) ) | X δ ρ ( 0 ) 1 with δ ρ ( 0 ) 1 2 gives
2 Adv A B full ( t ) 2 C 1 e μ ( d ( A , B ) v t ) ,
which is (A4).

Appendix A.2. Proof of Theorem 2 and Corollary 1

Write the initial hypothesis difference as δ ρ ( 0 ) = ϵ δ ρ Q A + O ( ϵ 3 ) , where δ ρ Q A is the Kubo–Mori tangent vector associated with the sender bias. By Heisenberg duality and the trace-norm variational formula,
2 Adv A B O ( t ) = sup O B 1 Tr O B δ ρ B ( t ) = sup O B 1 Tr O B ( t ) δ ρ ( 0 ) .
Choosing the admissible receiver observable J B Ran ( P ) with J B 1 gives the lower bound
2 Adv A B O ( t ) Tr J B ( t ) δ ρ ( 0 ) .
Expanding to linear order in ϵ and inserting P + Q = 1 on the evolved observable side yields
Tr J B ( t ) δ ρ ( 0 ) = ϵ J B , e t L eff P ( Q A ) β ϵ J B , Q e t L P ( Q A ) β + O ( ϵ 3 ) ,
where the first term is the projected slow contribution and the second is the residual leakage term. Dividing by 2 gives Equation (19). If Proposition 1 applies, Cauchy–Schwarz in the Kubo–Mori norm together with Equation (17) gives Equation (20). The corollary follows by defining S A B ( t ) and C fast exactly as in the statement and substituting the explicit envelope into Equation (19).

Appendix B. Hydrodynamic Single-Mode Derivation

Appendix B.1. A Resolvent Criterion for Semigroup Reduction

Let U P ( t ) : = P e t L P denote the exact projected propagator and let U ^ P ( z ) = 0 e z t U P ( t ) d t for z > 0 . In the Mori–Zwanzig representation one may write
U ^ P ( z ) = z P L P K ^ ( z ) 1 P , K ^ ( z ) : = P L Q ( z Q L Q ) 1 Q L P .
Define the Markovianized effective generator L eff : = P L P + K ^ ( 0 ) whenever K ^ ( 0 ) exists on the slow sector. If, on a contour segment Σ relevant to the inverse Laplace transform, both resolvents are bounded by M Σ and
δ Σ : = sup z Σ K ^ ( z ) K ^ ( 0 ) β β
is small, then the resolvent identity gives
sup z Σ U ^ P ( z ) [ z L eff ] 1 P β β M Σ 2 δ Σ .
Inverse Laplace transformation therefore yields a projected semigroup reduction error bounded by an explicit envelope proportional to δ Σ . This is the precise sense in which the “fast-mixing” hypothesis in the main text can be implemented without asserting microscopic dissipation for the exact unitary block.
A simple sufficient condition is a finite first memory moment:
M 1 : = 0 t K ( t ) β β d t < .
Indeed, for z 0 ,
K ^ ( z ) K ^ ( 0 ) β β | z | M 1 ,
by the bound | e z t 1 | | z | t . Hence low-frequency flatness of the memory kernel follows directly from an integrable first moment, and the projected dynamics is semigroup-like on frequency windows | z | M 1 1 .

Appendix B.2. From Projected Dynamics to a Diffusion Pole

In the single-mode window, the projected Liouvillian on the conserved-density subspace is diagonal in Fourier space and has eigenvalues Γ ( k ) with Γ ( k ) = D k 2 + o ( k 2 ) . Let δ q k ( t ) denote the conserved-density mode. Then δ q k ( t ) = e Γ ( k ) t δ q k ( 0 ) . The receiver observable J B couples to these modes with form factor F B ( k ) , so the projected signal takes the form
S B ( t ) = ϵ k 0 F B ( k ) e Γ ( k ) t δ q k ( 0 ) + ( higher modes ) .
The second-moment susceptibility in Definition 2 is essentially the k-space weighted sum k 0 | F B ( k ) | 2 / Γ ( k ) 2 , which is dominated by the smallest | k | in finite volume.

Appendix B.3. Threshold Inversion and ℓ 2 Scaling

For a localized sender perturbation, δ q k ( 0 ) e i k x A and for an interval receiver B centered at x B , F B ( k ) e i k x B sinc ( k w / 2 ) . Thus the signal depends on x B x A = through an oscillatory factor e i k . In the continuum approximation, replacing the discrete sum by an integral yields the heat-kernel expression (29) and the saddle-point estimate (30), from which (23) follows. Finite-volume corrections can be bounded by Poisson summation and yield the explicit O ( log ( 1 / η ) ) threshold term quoted in Theorem 3.
We provide the diffusion-kernel computation leading to (23). In one dimension, a localized chemical potential profile evolves as δ μ ( x , t ) ( 4 π D t ) 1 / 2 exp ( x 2 / ( 4 D t ) ) in the hydrodynamic window. Evaluating its overlap with a receiver region at distance yields a signal proportional to exp ( 2 / ( 4 D t ) ) , leading to τ 2 / ( 4 D ) up to logarithmic threshold factors.

Appendix C. Moment-Channel Optimality in Gaussian Fluctuation Algebras

We show that if the induced reduced states on B are Gaussian in the relevant fluctuation variables, then low moments determine the Helstrom measurement asymptotically, and the moment-channel lower bound (40) matches Adv full to leading order.

Appendix D. QCA Locality Versus LR Tails and Index Sensitivity

Appendix D.1. From Strict Causal Cones to Operational Zero Advantage

For a range-R QCA, the strict light cone implies an exact vanishing statement: for any observable O B supported on B and any operator X A supported on A,
Tr O B α t ( X A ) = 0 whenever d ( A , B ) > R t ,
because α t ( X A ) is supported on A + R t and the local algebras commute at distance. In contrast, for Hamiltonian evolution one only obtains exponentially small commutator tails as in (8). This distinction matters operationally: in QCA dynamics, Adv A B full ( t ) is exactly zero outside the cone, whereas for Hamiltonians it is exponentially small rather than strictly vanishing and can in principle accumulate through many weak channels.

Appendix D.2. Why Copy-Time Data Might “See” the Index

The QCA index [16] is defined through support-algebra dimensions associated with the image of local algebras under α . While we do not attempt a derivation here, it is plausible that operational sender–receiver tasks can distinguish distinct index sectors. A concrete approach is to compare d η for families of disjoint sender/receiver intervals under stacking and coarse graining, testing multiplicativity patterns implied by the index. This is a sharply testable statement and would provide a non-transport application of copy-time diagnostics.

Appendix E. Finite-Size Corrections for Diffusion-Kernel Inversion

Here we record a finite-size bound that turns the heuristic replacement of a discrete k-sum by a continuum integral into a controlled approximation.
Let k n = 2 π n / L , n Z , and consider the kernel
K L ( , t ) : = 1 L n 0 e D k n 2 t e i k n .
By Poisson summation, for t D L 2 one has
K L ( , t ) = 1 4 π D t m Z exp ( + m L ) 2 4 D t 1 L ,
where the 1 / L subtracts the zero mode. The leading term m = 0 recovers the infinite-line heat kernel (29); the finite-size correction is bounded by
K L ( , t ) 1 4 π D t e 2 / ( 4 D t ) 2 4 π D t m 1 exp ( m L ) 2 4 D t + 1 L .
For L / 2 and t D κ L 2 with κ < 1 / 16 , the dominant correction is O e ( 1 2 / L ) 2 / ( 16 κ ) , exponentially small in 1 / κ . This justifies using the continuum inversion for τ copy in the pre-asymptotic window t L 2 / D .

Appendix F. Small-System ED Illustration: Threshold and Receiver- Size Dependence

This appendix provides an illustrative numerical check of the smooth dependence on the operational threshold η and on the receiver size | B | that is made explicit by the Gaussian-kernel inversion Formula (34). We emphasize the intended scope: these exact-diagonalization (ED) runs are performed at a small size ( L = 8 ) to keep the computation exact and fully reproducible within the submission bundle. They are included to demonstrate that (i) changing η changes the extracted copy time smoothly, and (ii) enlarging the receiver region increases the advantage and therefore reduces the inferred copy time, as expected in transport-limited regimes. They do not establish thermodynamic-limit scaling.
Figure A1. Threshold dependence (ED, small system). Copy-time estimates extracted from exact evolution at L = 8 as the operational threshold η is varied, for a fixed sender–receiver separation in the same model and hypothesis class as Figure 2. The dependence on η is smooth on the accessible window, consistent with the slowly varying (Lambert-W/logarithmic) threshold factor in Equation (34).
Figure A1. Threshold dependence (ED, small system). Copy-time estimates extracted from exact evolution at L = 8 as the operational threshold η is varied, for a fixed sender–receiver separation in the same model and hypothesis class as Figure 2. The dependence on η is smooth on the accessible window, consistent with the slowly varying (Lambert-W/logarithmic) threshold factor in Equation (34).
Preprints 205335 g0a1
Figure A2. Receiver-size dependence (ED, small system). Advantage and inferred copy-time trend as the receiver block size | B | is increased (same ED run family). Enlarging B increases the receiver prefactor K B in Equation (33), leading to earlier threshold crossing, consistent with Equation (34).
Figure A2. Receiver-size dependence (ED, small system). Advantage and inferred copy-time trend as the receiver block size | B | is increased (same ED run family). Enlarging B increases the receiver prefactor K B in Equation (33), leading to earlier threshold crossing, consistent with Equation (34).
Preprints 205335 g0a2

Appendix G. Gaussian Discrimination and Moment Sufficiency: An Explicit Bound

Assume that, in the hydrodynamic window, the receiver’s relevant fluctuation variable X B (e.g., coarse-grained charge in B) is approximately Gaussian under both hypotheses, with means ± m ( t ) and common variance σ 2 ( t ) . Then the optimal Helstrom measurement reduces (in the classical limit) to thresholding X B , and the resulting advantage is
Adv full ( t ) TV N ( m ( t ) , σ 2 ( t ) ) , N ( m ( t ) , σ 2 ( t ) ) = erf m ( t ) 2 σ ( t ) .
For small signal-to-noise ratio m / σ , Adv full ( t ) 2 π m ( t ) σ ( t ) . Since m ( t ) is controlled by the diffusion kernel (30) and σ ( t ) is set by equilibrium fluctuations, low moments (mean and variance) are sufficient to determine the advantage at leading order. This provides a principled route to moment-channel near-optimality in regimes where the fluctuation algebra is approximately Gaussian.

Appendix H. Additional Numerical Tables and Metadata

Finite-size “effective-exponent” diagnostics (including negative/drifting slopes at the integrable point) are provided as CSV tables in the bundled SC1 data archive (see FIGURE_MAP.md); in the main PDF we treat these quantities strictly as breakdown diagnostics rather than physical exponents.
Additional numerical diagnostics and reporting details (including window scans and stability checks) used to assess the single-mode window at the accessible sizes are included in the SC1 data archive (see FIGURE_MAP.md). Supplementary S2 is reserved for the TEBD/MPS protocol outline.
Figure A3. Selected pipeline diagnostics (Appendix). Top: a threshold-crossing diagnostic for the classical diffusive reference at η = 0.1 (dashed line), showing that for this conservative parameter set the receiver advantage stays below threshold, hence τ copy = (no crossing) while max t Adv full remains small. Middle: Gaussian approximation error (trace-distance proxy) versus receiver size. Bottom: predictor residual versus receiver size for a regression-based proxy. The full diagnostic set (including parameter sweeps) is included in the SC1 data archive (Appendix I).
Figure A3. Selected pipeline diagnostics (Appendix). Top: a threshold-crossing diagnostic for the classical diffusive reference at η = 0.1 (dashed line), showing that for this conservative parameter set the receiver advantage stays below threshold, hence τ copy = (no crossing) while max t Adv full remains small. Middle: Gaussian approximation error (trace-distance proxy) versus receiver size. Bottom: predictor residual versus receiver size for a regression-based proxy. The full diagnostic set (including parameter sweeps) is included in the SC1 data archive (Appendix I).
Preprints 205335 g0a3

Appendix H.1. Receiver-Side Calibration of a Simple Charge Surrogate

One natural concern is that an operational copy-time extraction based on a simple charge-like observable could underestimate the true Helstrom certifiability by a model-dependent amount. The publication-ready package therefore promotes an archived benchmark from the bundled validation suite: a dephased U(1)-preserving reference chain in which the reduced states on the receiver block become nearly diagonal in the block-charge basis. In that setting the projective Q B measurement approaches Helstrom optimality directly and quantitatively. Figure A4 plots the ratio of the block-charge advantage to the exact Helstrom advantage. The ratio exceeds 0.99 after a short transient and remains above that value on the reported window, with minimum ratio 0.996 and median ratio 1.000 in the archived summary file. This does not prove that the same surrogate is optimal in the interacting XXZ chain, but it provides an explicit receiver-side calibration showing that the charge-based extraction logic can be essentially tight in a controlled conserving reference model.
Figure A4. Receiver-side validation benchmark from the bundled archive: ratio of the block-charge measurement advantage to the exact Helstrom advantage in a dephased U(1)-preserving reference model. The horizontal dashed line marks 0.99 and the vertical dotted line marks the first time at which the ratio reaches this threshold. The ratio remains essentially unity on the displayed validation window, showing that a simple conserved-charge surrogate can become nearly Helstrom-optimal in a controlled reference setting.
Figure A4. Receiver-side validation benchmark from the bundled archive: ratio of the block-charge measurement advantage to the exact Helstrom advantage in a dephased U(1)-preserving reference model. The horizontal dashed line marks 0.99 and the vertical dotted line marks the first time at which the ratio reaches this threshold. The ratio remains essentially unity on the displayed validation window, showing that a simple conserved-charge surrogate can become nearly Helstrom-optimal in a controlled reference setting.
Preprints 205335 g0a4
We recommend interpreting small-L “effective exponents” only as diagnostics of hydrodynamic breakdown, not as physical exponents in integrable regimes.

Appendix H.2. TEBD Validation and Convergence Summary

The bundled SC1 archive includes a lightweight TEBD implementation together with a small-system validation suite against exact evolution. The purpose of this suite is narrow but important: it audits the tensor-network pipeline independently of the transport extraction. Table A1 summarizes the reported error levels, and Figure A5 shows that for the chosen benchmark the error is already saturated by χ max = 32 while halving the time step from 0.2 to 0.1 changes the root-mean-square error only mildly.
Table A1. TEBD-vs-ED validation summary for the bundled small-system benchmark (open chain, L = 8 , l = 2 , Δ = 1 , h stag = 0.5 ). Errors are computed on the full reported time window against the ED reference correlator.
Table A1. TEBD-vs-ED validation summary for the bundled small-system benchmark (open chain, L = 8 , l = 2 , Δ = 1 , h stag = 0.5 ). Errors are computed on the full reported time window against the ED reference correlator.
d t χ max RMSE max abs. error
0.1 32 0.01110 0.02749
0.1 64 0.01110 0.02749
0.1 128 0.01110 0.02749
0.2 64 0.01139 0.02749
Figure A5. Convergence controls for the bundled TEBD validation suite, reported as RMSE against the exact-evolution reference. The benchmark is deliberately modest: its role is to verify implementation correctness and truncation stability before any larger-L tensor-network study is attempted.
Figure A5. Convergence controls for the bundled TEBD validation suite, reported as RMSE against the exact-evolution reference. The benchmark is deliberately modest: its role is to verify implementation correctness and truncation stability before any larger-L tensor-network study is attempted.
Preprints 205335 g0a5

Appendix I. Reproducibility: Run Manifest and Code Pointers

  • definitions, locality bounds, and technical lemmas supporting the operational setup (Supplementary File S1);
  • a detailed TEBD/MPS protocol and convergence checklist for future thermodynamic-limit copy-time tests, together with a bundled small-system TEBD-vs-ED validation suite used only for implementation auditing (Supplementary File S2 and SC1);
  • the rigorous Q-SSEP benchmark and supporting derivations for the diffusive lower bound (Supplementary File S3);
  • conceptual positioning relative to OTOCs and toy examples separating receiver-limited certifiability from operator-growth diagnostics (Supplementary File S4);
  • the code, parameter registries, integrity checks, fit-window scans, and the minimal data bundle used to generate the reported ED diagnostics and Helstrom-advantage figure suite (Supplementary Code Archive SC1 together with the accompanying data archive).

Appendix I.1. Reproducibility Pointers (ED Extraction and Post-Processing)

To avoid over-promising numerics that are not explicitly reported, we separate protocol descriptions from computed results. All ED-based figures and tables reported in this work can be reproduced from the bundled Supplementary Code Archive SC1 together with the accompanying analysis data archive. A concise map from each manuscript figure/table to the corresponding script, command line, and output file is provided in FIGURE_MAP.md (included in the accompanying Supplementary Materials and Code Archive). For the operational numerics in Section 10.2, the figure-generation scripts and the corresponding raw outputs are indexed in FIGURE_MAP.md within the accompanying code archive.

Appendix I.2. TEBD/MPS Protocol and Bundled Validation Code

Supplementary File S2 provides a detailed, implementation-agnostic TEBD/MPS protocol and convergence checklist intended for future thermodynamic-limit tests of copy-time scaling. No main-text scaling claim relies on TEBD. However, the strengthened SC1 archive does include a lightweight reference implementation and a small-system validation suite against exact evolution. This code is used only for implementation auditing and convergence checks; it is not used to generate the transport-side or copy-time scaling claims reported in the main text.

References

  1. Helstrom, C.W. Quantum Detection and Estimation Theory; Academic Press, 1976. [Google Scholar]
  2. Holevo, A.S. Statistical decision theory for quantum systems. Journal of Multivariate Analysis 1973, 3, 337–394. [Google Scholar] [CrossRef]
  3. Kubo, R. Statistical-Mechanical Theory of Irreversible Processes. I. General Theory and Simple Applications to Magnetic and Conduction Problems. Journal of the Physical Society of Japan 1957, 12, 570–586. [Google Scholar] [CrossRef]
  4. Mori, H. Transport, Collective Motion, and Brownian Motion. Progress of Theoretical Physics 1965, 33, 423–455. [Google Scholar] [CrossRef]
  5. Zwanzig, R. Memory Effects in Irreversible Thermodynamics. Physical Review 1961, 124, 983–992. [Google Scholar] [CrossRef]
  6. Forster, D. Hydrodynamic Fluctuations, Broken Symmetry, and Correlation Functions; Benjamin, 1975. [Google Scholar]
  7. Nahum, A.; von Keyserlingk, C.W.; Rakovszky, T.; Pollmann, F.; Sondhi, S.L. Operator hydrodynamics, OTOCs, and entanglement growth in systems with conservation laws. Physical Review X 2018, 8, 021014. [Google Scholar] [CrossRef]
  8. Khemani, V.; Vishwanath, A.; Huse, D.A. Operator spreading and the emergence of dissipative hydrodynamics under unitary dynamics with conservation laws. Physical Review X 2018, 8, 031057. [Google Scholar] [CrossRef]
  9. Bernard, D.; Jin, T. Anomalous scaling and diffusion in the quantum symmetric simple exclusion process. Communications in Mathematical Physics 2021, 383, 659–712. [Google Scholar] [CrossRef]
  10. Nahum, A.; Vijay, S.; Haah, J. Operator Spreading in Random Unitary Circuits. Physical Review X 2018, 8, 021014. [Google Scholar] [CrossRef]
  11. von Keyserlingk, C.W.; Rakovszky, T.; Pollmann, F.; Sondhi, S.L. Operator Hydrodynamics, OTOCs, and Entanglement Growth in Systems without Conservation Laws. Physical Review X 2018, arXiv:cond8, 021013. [Google Scholar] [CrossRef]
  12. Xu, S.; Swingle, B. Scrambling Dynamics and Out-of-Time-Ordered Correlators in Quantum Many-Body Systems. PRX Quantum 2024, arXiv:quant5, 010201. [Google Scholar] [CrossRef]
  13. Khemani, V.; Vishwanath, A.; Huse, D.A. Operator Spreading and the Emergence of Dissipative Hydrodynamics under Unitary Evolution with Conservation Laws. Physical Review X 2018, 8, 031057. [Google Scholar] [CrossRef]
  14. Rakovszky, T.; Pollmann, F.; von Keyserlingk, C.W. Diffusive Hydrodynamics of Out-of-Time-Ordered Correlators with Charge Conservation. Physical Review X 2018, 8, 031058, [arXiv:cond-mat.str-el/1710.09827]. [Google Scholar] [CrossRef]
  15. Schumacher, B.; Werner, R.F. Reversible quantum cellular automata. arXiv:quant-ph/0405174, 2004. Preprint.
  16. Gross, D.; Nesme, V.; Vogts, H.; Werner, R.F. Index Theory of One Dimensional Quantum Walks and Quantum Cellular Automata. Communications in Mathematical Physics 2012, 310, 419–454. [Google Scholar] [CrossRef]
  17. Arrighi, P.; Nesme, V.; Werner, R. Unitarity plus causality implies localizability. Journal of Computer and System Sciences 2019, 101, 26–40. [Google Scholar] [CrossRef]
Figure 9. Direct ED computation of the Helstrom advantage Adv 0 l full ( t ) for a one-site receiver B = { l } in the nonintegrable XXZ chain ( L = 12 , Δ = 1 , h stag = 0.5 ), using N vec = 12 typicality vectors and bootstrap 95% CIs. The dashed line is the threshold η = 0.02 . The copy time τ copy full ( 0 l ; η ) is extracted as the first intersection of the (bootstrap-averaged) curve with η .
Figure 9. Direct ED computation of the Helstrom advantage Adv 0 l full ( t ) for a one-site receiver B = { l } in the nonintegrable XXZ chain ( L = 12 , Δ = 1 , h stag = 0.5 ), using N vec = 12 typicality vectors and bootstrap 95% CIs. The dashed line is the threshold η = 0.02 . The copy time τ copy full ( 0 l ; η ) is extracted as the first intersection of the (bootstrap-averaged) curve with η .
Preprints 205335 g009
Figure 10. Extracted Helstrom copy time τ copy full ( 0 l ; η ) (bootstrap 95% CIs) plotted versus l 2 for the same ED dataset as Figure 9 ( η = 0.02 , B one site). The dashed line is a weighted linear fit on a pre-registered window (all points with l 2 ; no distance excluded), included only as a compact visualization of the overall l 2 trend at these sizes.
Figure 10. Extracted Helstrom copy time τ copy full ( 0 l ; η ) (bootstrap 95% CIs) plotted versus l 2 for the same ED dataset as Figure 9 ( η = 0.02 , B one site). The dashed line is a weighted linear fit on a pre-registered window (all points with l 2 ; no distance excluded), included only as a compact visualization of the overall l 2 trend at these sizes.
Preprints 205335 g010
Figure 11. Threshold sensitivity diagnostic extracted from the same ED dataset as Figure 9 and Figure 10: first-crossing times as a function of l 2 for η { 0.01 , 0.02 , 0.05 } . The dependence on η is smooth on the accessible window, supporting the robustness of the copy-time extraction for small variations of the operational threshold.
Figure 11. Threshold sensitivity diagnostic extracted from the same ED dataset as Figure 9 and Figure 10: first-crossing times as a function of l 2 for η { 0.01 , 0.02 , 0.05 } . The dependence on η is smooth on the accessible window, supporting the robustness of the copy-time extraction for small variations of the operational threshold.
Preprints 205335 g011
Figure 12. Extractor-robustness diagnostic on the same L = 12 ED Helstrom dataset used in Figure 9, Figure 10 and Figure 11. Solid lines show first-crossing times and dashed lines show sustained-crossing times for η = 0.01 and 0.02 . The comparison quantifies when oscillatory shoulders make the first threshold hit noticeably earlier than the first sustained certification event.
Figure 12. Extractor-robustness diagnostic on the same L = 12 ED Helstrom dataset used in Figure 9, Figure 10 and Figure 11. Solid lines show first-crossing times and dashed lines show sustained-crossing times for η = 0.01 and 0.02 . The comparison quantifies when oscillatory shoulders make the first threshold hit noticeably earlier than the first sustained certification event.
Preprints 205335 g012
Figure 13. Fast-sector relaxation diagnostic in the nonintegrable XXZ chain ( L = 12 , Δ = 1 , h stag = 0.5 ): decay of the transverse autocorrelator | C x x ( t ) | = | 1 d Tr ( S 0 x ( t ) S 0 x ) | (log scale). The dashed line is an exponential fit on a late-time window, yielding an estimated fast relaxation rate γ fast that sets a microscopic time scale t fast γ fast 1 .
Figure 13. Fast-sector relaxation diagnostic in the nonintegrable XXZ chain ( L = 12 , Δ = 1 , h stag = 0.5 ): decay of the transverse autocorrelator | C x x ( t ) | = | 1 d Tr ( S 0 x ( t ) S 0 x ) | (log scale). The dashed line is an exponential fit on a late-time window, yielding an estimated fast relaxation rate γ fast that sets a microscopic time scale t fast γ fast 1 .
Preprints 205335 g013
Figure 14. Effective decay rate extracted from the same fast-sector correlator as Figure 13: γ eff ( t ) = t log | C x x ( t ) | (computed by a centered finite difference). An approximate plateau over an intermediate-time window supports the use of a single microscopic relaxation scale t fast γ eff 1 as a diagnostic, while still allowing for finite-size and residual oscillatory features.
Figure 14. Effective decay rate extracted from the same fast-sector correlator as Figure 13: γ eff ( t ) = t log | C x x ( t ) | (computed by a centered finite difference). An approximate plateau over an intermediate-time window supports the use of a single microscopic relaxation scale t fast γ eff 1 as a diagnostic, while still allowing for finite-size and residual oscillatory features.
Preprints 205335 g014
Figure 15. Small-system validation of the bundled TEBD implementation against exact evolution (open chain, L = 8 , l = 2 , Δ = 1 , h stag = 0.5 ). Top: correlator C ( t ) from ED and TEBD for the best validated run ( d t = 0.1 , χ max = 128 ). Bottom: absolute error on the same time window. This validation is used only to audit the numerical pipeline, not to support the main scaling claim.
Figure 15. Small-system validation of the bundled TEBD implementation against exact evolution (open chain, L = 8 , l = 2 , Δ = 1 , h stag = 0.5 ). Top: correlator C ( t ) from ED and TEBD for the best validated run ( d t = 0.1 , χ max = 128 ). Bottom: absolute error on the same time window. This validation is used only to audit the numerical pipeline, not to support the main scaling claim.
Preprints 205335 g015
Table 4. Synthesis: dynamics/regime × transport diagnostic × copy-time scaling. “Supported by” indicates what in this work underwrites the stated scaling (theorem, exact toy model, or ED estimate with explicit confidence intervals).
Table 4. Synthesis: dynamics/regime × transport diagnostic × copy-time scaling. “Supported by” indicates what in this work underwrites the stated scaling (theorem, exact toy model, or ED estimate with explicit confidence intervals).
Model / dynamics Regime / structure Diagnostic τ copy scaling Supported by
Gaussian charge field (commuting) Diffusive kernel, Gaussian fluctuations Exact TV distance (35) 2 / ( 4 D ) (log- η corr.) Appendix G
Chaotic U ( 1 ) dynamics (generic) Ballistic operator growth + diffusive charge Separation Prop. 2 τ OTOC , τ copy 2 Prop. 2
XXZ chain ( h stag = 0.5 ) Nonintegrable, candidate diffusive window D eff ( L ) (bootstrap CI) Consistent with 2 window; no asymptotic claim Table 3, Figure 4
XXZ chain ( h stag = 0 ) Integrable / multimode Drift/nonmonotone D eff ( L ) Single-mode diffusion fails Figure 4, Section 10
Range-R QCA Strict light cone Hard causal delay τ copy d / R Prop. 3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated