Section 2.9 - Formal Schemes
نویسنده
چکیده
One feature which clearly distinguishes the theory of schemes from the older theory of varieties is the possibility of having nilpotent elements in the structure sheaf of a scheme. In particular, if Y is a closed subvariety of a variety X, defined by a sheaf of ideals I , then for any n ≥ 1 we can consider the closed subscheme Yn defined by the nth power I n of the sheaf of ideals I . For n ≥ 2, this is a scheme with nilpotent elements. It carries information about Y together with the infinitesimal properties of the embedding of Y in X.
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملar X iv : a lg - g eo m / 9 70 80 06 v 2 1 4 O ct 1 99 8 DUALITY AND FLAT BASE CHANGE ON FORMAL SCHEMES
We give several related versions of global Grothendieck Duality for unbounded complexes on noetherian formal schemes. The proofs, based on a nontrivial adaptation of Deligne’s method for the special case of ordinary schemes, are reasonably self-contained, modulo the Special Adjoint Functor Theorem. An alternative approach, inspired by Neeman and based on recent results about “Brown Representabi...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملLocal Structure Theorems for Smooth Maps of Formal Schemes
We continue our study on infinitesimal lifting properties of maps between locally noetherian formal schemes started in [3]. In this paper, we focus on some properties which arise specifically in the formal context. In this vein, we make a detailed study of the relationship between the infinitesimal lifting properties of a morphism of formal schemes and those of the corresponding maps of usual s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006