Section 2.9 - Formal Schemes

نویسنده

  • Daniel Murfet
چکیده

One feature which clearly distinguishes the theory of schemes from the older theory of varieties is the possibility of having nilpotent elements in the structure sheaf of a scheme. In particular, if Y is a closed subvariety of a variety X, defined by a sheaf of ideals I , then for any n ≥ 1 we can consider the closed subscheme Yn defined by the nth power I n of the sheaf of ideals I . For n ≥ 2, this is a scheme with nilpotent elements. It carries information about Y together with the infinitesimal properties of the embedding of Y in X.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

ar X iv : a lg - g eo m / 9 70 80 06 v 2 1 4 O ct 1 99 8 DUALITY AND FLAT BASE CHANGE ON FORMAL SCHEMES

We give several related versions of global Grothendieck Duality for unbounded complexes on noetherian formal schemes. The proofs, based on a nontrivial adaptation of Deligne’s method for the special case of ordinary schemes, are reasonably self-contained, modulo the Special Adjoint Functor Theorem. An alternative approach, inspired by Neeman and based on recent results about “Brown Representabi...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Local Structure Theorems for Smooth Maps of Formal Schemes

We continue our study on infinitesimal lifting properties of maps between locally noetherian formal schemes started in [3]. In this paper, we focus on some properties which arise specifically in the formal context. In this vein, we make a detailed study of the relationship between the infinitesimal lifting properties of a morphism of formal schemes and those of the corresponding maps of usual s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006