Exercises
ex-ch03-01
EasyState the -threshold secret-sharing problem and define perfect secrecy in information-theoretic terms.
Problem
Split secret among parties with Share and Reconstruct algorithms such that: (1) any parties reconstruct exactly; (2) any parties learn nothing about .
Perfect secrecy
for every forbidden coalition . Equivalently, the conditional distribution of the coalition's view given any candidate secret equals the marginal distribution of the view.
ex-ch03-02
EasyIn Shamir's -scheme, what is the degree of the secret- sharing polynomial, and why is this the correct choice?
Degree
.
Why
A degree- polynomial has free coefficients and is uniquely determined by evaluations (Lagrange). Fewer than evaluations leave at least one free parameter — information-theoretically unrecoverable — which gives the secret-sharing perfect-secrecy guarantee.
ex-ch03-03
EasyUsing , generate Shamir -shares of secret with random coefficient , evaluation points .
Polynomial
over .
Shares
; ; .
ex-ch03-04
EasyA scheme has . What are the ramp width and the share rate?
Ramp width
.
Share rate
. Each share is one-tenth the size of the secret — a savings over Shamir.
ex-ch03-05
MediumReconstruct the Shamir secret from shares in Exercise 3. Verify that any two of the three shares reconstruct, and that one share alone leaves the secret uniform over .
Use the Lagrange interpolation formula at .
From shares 1 and 2
; . . ✓
Perfect secrecy from 1 share
A single share satisfies over , but equally well for any with the appropriate . Since was chosen uniformly, all 11 candidate secrets are equally likely.
ex-ch03-06
MediumShow that Shamir's scheme is linear: if and are shares of secrets and (using the same evaluation points but different random polynomials), then is a share of . Discuss why this matters for MPC.
Linearity
. Then , and . So are Shamir shares of .
Relevance to MPC
Linear secret sharing permits local addition of shares without communication — a central requirement of efficient secure multi-party computation. Each party can compute its own share of a sum by adding locally-held shares, with no interaction. This is the foundation of the BGW protocol (Ben-Or–Goldwasser–Wigderson) for MPC and extends to scalar multiplication similarly.
ex-ch03-07
MediumProve that in any -threshold scheme with statistical secrecy (coalition view is within total-variation distance of uniform), the share-size bound is where .
Apply Fano's inequality to the best adversary.
Total variation distance implies bounded mutual information.
Fano-style argument
If the coalition's view is within TV distance of uniform, then by Pinsker's inequality bits. The best adversary can guess the secret with probability .
Combine with correctness
Retracing the proof of Theorem (Share-Entropy Bound, §3.1) with the statistical-secrecy inequality replacing perfect-secrecy, the bound is relaxed to .
Practical takeaway
For cryptographic-grade , is negligible, so the bound is essentially unchanged. Statistical secrecy is therefore not a useful relaxation for reducing share sizes — this is the reason ramp schemes chose a different relaxation (controlled leakage) instead.
ex-ch03-08
MediumConstruct a -ramp scheme with (i.e., ) over . Share the two-chunk secret using random coefficient . Verify that any 3 shares reconstruct; any 1 reveals nothing.
Polynomial has degree .
Use any valid encoding that places the secret chunks in two coefficients and random in the third.
Polynomial
Let over . Here the two secret chunks are the and coefficients; the coefficient is uniform random.
Shares
With : ; ; .
Reconstruction
All three shares determine the degree-2 polynomial by Vandermonde interpolation — the chunks appear as the and coefficients once is recovered.
Perfect secrecy from 1 share
A single share fixes one linear constraint on the three unknowns , leaving a 2-dimensional uniform distribution — so both secret chunks are uniform given one share. Perfect secrecy against .
ex-ch03-09
MediumExplain how Blakley's and Shamir's schemes would encode the same -threshold over , and compute the per-share storage in each.
Shamir
over . Each share is one field element . Per-share storage: bits.
Blakley
Choose the point with uniform. Each party's hyperplane is a line in passing through — equation , i.e., a pair of three field elements (two for the normal, one for the offset; one can be absorbed). Per-share storage: roughly bits — double Shamir's.
Security
Both schemes guarantee perfect -secrecy against one colluder.
ex-ch03-10
MediumIn an -additive scheme, show that any shares leave the secret uniform over the field. Interpret this as the "all or nothing" property.
Setup
Secret over , where are uniform and independent and .
$n - 1$ known
Given , the missing is the only unknown. Since is uniform (as a function of the random given any candidate ), the conditional distribution of given is uniform.
Interpretation
All shares are needed; one missing share makes the secret completely unrecoverable. This is exactly the guarantee secure aggregation relies on in Chapter 10: as long as one user holds its share privately, the server learns nothing.
ex-ch03-11
HardProve that Shamir's scheme admits local scalar multiplication: given shares of secret and a public constant , the shares are Shamir shares of with the same threshold . Why is this useful for MPC?
Proof
If with , then , and . The polynomial still has degree , so the threshold is preserved.
Utility for MPC
Combined with linear-addition (Exercise 6), scalar multiplication gives us non-interactive computation of linear functions on secret-shared data. Every party locally computes its share of without communication. This is the foundation of the BGW protocol for MPC on arithmetic circuits.
ex-ch03-12
HardThe BGW protocol extends Shamir to secure multiplication: given shares of and , parties cooperate to compute shares of . Show that a naive "local multiplication" gives shares of degree instead of , and sketch the re-sharing step that restores the threshold.
Compute and check the polynomial degree.
Re-sharing requires parties to all participate.
Degree inflation
If and with , then is a share of a polynomial of degree . Reconstructing requires shares, not — the threshold has inflated.
Re-sharing (BGW)
Each party Shamir-shares its local product among the parties using a fresh degree- polynomial with . Party then sums its received shares using the Lagrange interpolation coefficients . The result is a share of in a degree- polynomial. Threshold restored.
Cost
The re-sharing step requires one round of communication (each party sends shares). This is where the "interaction" in MPC comes from — linear operations are local, but multiplication requires a round.
ex-ch03-13
HardProve that any -scheme with cheating detection — i.e., one that detects when colluding parties submit incorrect shares — requires share entropy for small , assuming a prime-power field.
Reed–Solomon decoding radius: where .
Detection, not correction, changes the constants.
Coding view
A -Shamir scheme is a Reed-Solomon code with minimum distance . Error detection requires , i.e., . Each extra unit of detection capability costs a reduction in the reconstruction threshold — or, equivalently, extra share size for a given .
Share-entropy lower bound
A verifiable secret-sharing scheme (Chor-Goldwasser-Micali- Awerbuch 1985, Ben-Or-Goldwasser-Wigderson 1988) adds authentication bits per share for detection, giving the stated bound. The precise constants depend on the verifiable-secret-sharing construction chosen.
Relevance
Chapter 11 of this book uses verifiable secret sharing (via vector commitments) as a primitive for Byzantine- resilient aggregation, adding exactly this bit overhead per share.
ex-ch03-14
HardFormalize and prove: in a -ramp scheme, the amount of information a coalition of size learns about the secret (for ) is exactly of the secret's entropy. Hence the leakage grows linearly and saturates at .
Information in the coalition's view
A coalition of size views shares, each being for a polynomial with uniform coefficients and fixed (secret) coefficients. After accounting for the random degrees of freedom, the remaining information is about the secret. Linear algebra over the Vandermonde matrix shows this to be exactly out of independent scalars of the secret, i.e., bits.
Formal statement
.
Saturation
At (coalition size ), all secret chunks are recoverable, so . The leakage grows linearly in the coalition size beyond and saturates at , matching the statement of Theorem 3.4.1.
ex-ch03-15
ChallengeDesign an unconditionally secure, high-rate FL aggregation primitive using ramp secret sharing. Specify (i) the ramp parameters in terms of the desired tolerance for dropouts and the tolerance for colluders , (ii) the per-user upload and download volumes, and (iii) the information- theoretic guarantees on privacy and correctness. Compare with Bonawitz et al.'s pairwise-masking protocol.
Ramp parameters should satisfy and .
Upload per user scales as .
Parameter design
To tolerate dropouts we need ; to guarantee perfect secrecy against any -sized collusion we need . Choose and . Ramp width .
Per-user upload
Each gradient coordinate produces one share per user, but with ramp the share is scalars. Total upload per user: .
Download / aggregation
Server collects shares and reconstructs the aggregate via Lagrange interpolation. Total download (the reconstruction makes up for the compression).
Comparison with Bonawitz
Bonawitz et al.'s pairwise masking is essentially a variant (no compression), with communication overhead from the pairwise graph. The ramp design reduces per-user upload by a factor of at the cost of graceful-degradation secrecy in the ramp zone . For , , , the savings factor is dramatic.
Pointer
This exercise is essentially a sketch of the ByzSecAgg protocol (Chapter 11, CommIT contribution). The full protocol additionally handles Byzantine users via coded outlier detection and vector commitments.