Part 1: Foundations of Distributed Computing
Chapter 3: Secret Sharing
Intermediate~210 min
Learning Objectives
- State the -threshold secret-sharing problem and its information-theoretic security definition
- Construct Shamir's -threshold scheme via polynomial evaluation and prove perfect secrecy
- Decode a Shamir secret from shares using Lagrange interpolation over a finite field
- Construct Blakley's hyperplane scheme and recognize its equivalence up to field size
- Analyze ramp -secret sharing as a rate-security tradeoff, and quantify the share-size savings
- Connect secret sharing to coded matrix multiplication (Ch 5) and secure aggregation (Ch 10)
Sections
💬 Discussion
Loading discussions...