References & Further Reading

References

  1. A. Shamir, How to Share a Secret, 1979

    The foundational paper introducing polynomial-based secret sharing. Remarkably short and readable — still the clearest introduction to the subject 45 years later.

  2. G. R. Blakley, Safeguarding Cryptographic Keys, 1979

    Independent, near-simultaneous introduction of secret sharing using hyperplane geometry. Worth reading alongside Shamir to appreciate both perspectives on the same information-theoretic problem.

  3. E. D. Karnin, J. W. Greene, and M. E. Hellman, On Secret Sharing Systems, 1983

    Systematizes the information-theoretic framework for secret sharing, including the share-size lower bound proved in Section 3.1. Essential reference for the converse analysis.

  4. G. R. Blakley and C. Meadows, Security of Ramp Schemes, 1985

    First formal treatment of ramp secret sharing. Introduces the threshold / ramp-width trade-off and proves the basic security properties.

  5. H. Yamamoto, Secret Sharing System Using $(k, L, n)$ Threshold Scheme, 1986

    The information-theoretic characterization of ramp secret sharing, including the linear leakage formula used in Section 3.4.

  6. C. Asmuth and J. Bloom, A Modular Approach to Key Safeguarding, 1983

    Chinese Remainder Theorem–based threshold scheme. Useful when the secret is naturally an integer and when the arithmetic primitives align with existing cryptographic systems (e.g., threshold RSA).

  7. R. J. McEliece and D. V. Sarwate, On Sharing Secrets and Reed-Solomon Codes, 1981

    Identifies the equivalence between Shamir secret sharing and Reed-Solomon coding. Important perspective for Chapter 11, where we combine secret sharing with error correction.

  8. R. Cramer, I. B. Damgård, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing, Cambridge University Press, 2015

    The definitive modern textbook on secret sharing and its role in secure multi-party computation. Chapters 3–6 cover the constructions of this chapter in full generality.

  9. W.-T. Chang and R. Tandon, On the Upload versus Download Cost for Secure and Private Matrix Multiplication, 2018

    A modern reference for secure coded matrix multiplication — the composition of Shamir with polynomial codes. Anticipates the protocol developed in Chapter 5.

  10. K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H. B. McMahan, S. Patel, D. Ramage, A. Segal, and K. Seth, Practical Secure Aggregation for Privacy-Preserving Machine Learning, 2017

    The protocol that brought additive secret sharing into federated-learning production. Uses exactly the $(n, n)$-scheme of Section 3.1 with Diffie–Hellman–seeded masks.

  11. H. Sun and S. A. Jafar, The Capacity of Private Information Retrieval, 2017

    Derivation of the classical PIR capacity $C_{\\text{PIR}} = (1 + 1/N + \\cdots + 1/N^{K-1})^{-1}$. Uses linear secret sharing as the privacy primitive.

  12. K. Wan, D. Tuninetti, and G. Caire, Fundamental Limits of Caching for Demand Privacy against Colluding Users, 2021

    Representative CommIT-group contribution building on secret sharing. Tagged in Chapter 7 as the primary commit_contribution block for coded data shuffling with demand-privacy constraints.

  13. T. Jahani-Nezhad, M. A. Maddah-Ali, and G. Caire, Byzantine-Resilient Secure Aggregation for Federated Learning Based on Ramp Sharing, 2023

    The ByzSecAgg paper — one of the CommIT group's signature contributions to this book. Combines ramp secret sharing, coded outlier detection, and vector commitments. Tagged in Chapter 11 as the primary commit_contribution block.

Further Reading

Resources for readers who want to go deeper into secret sharing and its cryptographic applications.

  • Modern treatment of secret sharing and MPC

    R. Cramer, I. B. Damgård, and J. B. Nielsen, *Secure Multiparty Computation and Secret Sharing*, Cambridge UP, 2015

    The standard modern reference. Chapters 3–6 systematically develop the constructions of this book's chapter and extend them to general access structures beyond the $(t, n)$ threshold case.

  • General access structures

    J. Benaloh and J. Leichter, 'Generalized Secret Sharing and Monotone Functions,' Crypto 1988

    Introduces schemes that support more general access structures (e.g., "any two from group A, or any three from group B"). Relevant for advanced MPC wallets with multi-tier trust models.

  • Survey of verifiable secret sharing

    B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, 'Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults,' FOCS 1985

    Extends secret sharing to handle active (Byzantine) adversaries — the threat model of Chapter 11. Introduces the verifiable-secret-sharing primitive used in modern MPC.

  • Connection to error-correcting codes

    R. Cramer, C. Ding, and H. Xing, 'Linear Secret Sharing Schemes from Error-Correcting Codes and Algebraic-Geometric Codes,' 2013

    Explicit treatment of the coding-theoretic view of secret sharing, extending McEliece–Sarwate's equivalence to modern algebraic-geometric codes. Useful background for Chapter 11.