Exercises

ex-ch03-01

Easy

State the (t,n)(t, n)-threshold secret-sharing problem and define perfect secrecy in information-theoretic terms.

ex-ch03-02

Easy

In Shamir's (t,n)(t, n)-scheme, what is the degree of the secret- sharing polynomial, and why is this the correct choice?

ex-ch03-03

Easy

Using F11\mathbb{F}_{11}, generate Shamir (2,3)(2, 3)-shares of secret s=7s = 7 with random coefficient r1=3r_1 = 3, evaluation points α1=1,α2=2,α3=4\alpha_1 = 1, \alpha_2 = 2, \alpha_3 = 4.

ex-ch03-04

Easy

A scheme has (t1,t2,n)=(5,15,20)(t_1, t_2, n) = (5, 15, 20). What are the ramp width and the share rate?

ex-ch03-05

Medium

Reconstruct the Shamir secret from shares in Exercise 3. Verify that any two of the three shares reconstruct, and that one share alone leaves the secret uniform over F11\mathbb{F}_{11}.

ex-ch03-06

Medium

Show that Shamir's scheme is linear: if sks_k and sks_k' are shares of secrets ss and ss' (using the same evaluation points but different random polynomials), then sk+sks_k + s_k' is a share of s+ss + s'. Discuss why this matters for MPC.

ex-ch03-07

Medium

Prove that in any (t,n)(t, n)-threshold scheme with statistical secrecy (coalition view is within ϵ\epsilon total-variation distance of uniform), the share-size bound is H(sk)H(s)h(ϵ)H(s_k) \geq H(s) - h(\epsilon) where h(ϵ)=ϵlogϵ(1ϵ)log(1ϵ)h(\epsilon) = -\epsilon \log \epsilon - (1-\epsilon) \log(1-\epsilon).

ex-ch03-08

Medium

Construct a (3,3)(3, 3)-ramp scheme with g=2g = 2 (i.e., (t1,t2,n)=(1,3,3)(t_1, t_2, n) = (1, 3, 3)) over F7\mathbb{F}_7. Share the two-chunk secret s=(4,5)\mathbf{s} = (4, 5) using random coefficient r1=3r_1 = 3. Verify that any 3 shares reconstruct; any 1 reveals nothing.

ex-ch03-09

Medium

Explain how Blakley's and Shamir's schemes would encode the same (2,3)(2, 3)-threshold over F11\mathbb{F}_{11}, and compute the per-share storage in each.

ex-ch03-10

Medium

In an (n,n)(n, n)-additive scheme, show that any n1n - 1 shares leave the secret uniform over the field. Interpret this as the "all or nothing" property.

ex-ch03-11

Hard

Prove that Shamir's scheme admits local scalar multiplication: given shares sks_k of secret ss and a public constant cc, the shares cskc \cdot s_k are Shamir shares of csc \cdot s with the same threshold tt. Why is this useful for MPC?

ex-ch03-12

Hard

The BGW protocol extends Shamir to secure multiplication: given shares of aa and bb, parties cooperate to compute shares of abab. Show that a naive "local multiplication" gives shares of degree 2(t1)2(t - 1) instead of t1t - 1, and sketch the re-sharing step that restores the threshold.

ex-ch03-13

Hard

Prove that any (t,n)(t, n)-scheme with cheating detection — i.e., one that detects when e\leq e colluding parties submit incorrect shares — requires share entropy H(s)+log(n)\geq H(s) + \log(n) for small ee, assuming a prime-power field.

ex-ch03-14

Hard

Formalize and prove: in a (t1,t2,n)(t_1, t_2, n)-ramp scheme, the amount of information a coalition of size t1+it_1 + i learns about the secret (for i{1,,g}i \in \{1, \ldots, g\}) is exactly i/gi/g of the secret's entropy. Hence the leakage grows linearly and saturates at t2t_2.

ex-ch03-15

Challenge

Design an unconditionally secure, high-rate FL aggregation primitive using ramp secret sharing. Specify (i) the ramp parameters (t1,t2,n)(t_1, t_2, n) in terms of the desired tolerance for dropouts dd and the tolerance for colluders cc, (ii) the per-user upload and download volumes, and (iii) the information- theoretic guarantees on privacy and correctness. Compare with Bonawitz et al.'s pairwise-masking protocol.