The -Threshold Problem
Why Secret Sharing?
Suppose you want to store a cryptographic key, a medical record, or a nuclear-launch code in a way that no single server can read it, but any authorized coalition of servers can. The requirement has two sides: robustness (some servers may crash, so the secret must still be recoverable) and privacy (some servers may be compromised, so the secret must remain hidden).
Secret sharing is the information-theoretic solution to this problem. A secret is split into shares with two properties: any shares reconstruct perfectly, and any shares reveal absolutely nothing about (not "computationally hard to guess" — literally zero mutual information).
Secret sharing is one of two pillars that support all of Parts II–V of this book (the other is network coding). The coded matrix multiplication of Chapter 5 will evaluate polynomials in exactly the same way Shamir does; the secure aggregation protocols of Chapter 10 will use additive secret sharing; ByzSecAgg (Chapter 11) uses ramp secret sharing explicitly. Spending time on Chapter 3 is the investment that makes the rest of the book readable.
Definition: -Threshold Secret-Sharing Scheme
-Threshold Secret-Sharing Scheme
A -threshold secret-sharing scheme over a finite alphabet consists of two algorithms:
- Share. A (possibly randomized) function that takes a secret and produces shares (one per party).
- Reconstruct. A deterministic function that takes any subset of shares and outputs the secret .
The scheme must satisfy two requirements:
- Correctness. For every secret and every subset with , .
- Perfect Secrecy. For every subset with , the shares are statistically independent of ; equivalently, .
Any subset of size is called authorized; any subset of size is forbidden.
-Threshold Secret Sharing
A scheme that splits a secret among parties such that any parties can reconstruct exactly, but any parties learn absolutely nothing about in an information-theoretic sense ().
Perfect Secrecy
A cryptographic guarantee that the adversary's posterior distribution on the secret equals its prior, regardless of computational power. Equivalent to . Information-theoretic, not computational.
Example: The Additive Scheme
Describe an -threshold scheme — where all parties must cooperate to reconstruct — and verify both its correctness and perfect secrecy. This scheme is used implicitly in secure aggregation (Chapter 10).
Construction
Let . Pick independent uniform random values and set
Correctness
The sum of all shares is , so any authorized coalition (the full set) reconstructs via addition.
Perfect secrecy
Any forbidden coalition of size holds of the shares. If they hold , these are — uniform and independent of . If they hold but not some other , then , and since is uniform and independent, looks uniform over — again independent of . In all cases, the coalition's view is independent of .
Application preview
This is precisely the scheme used by Bonawitz et al. in secure aggregation (Chapter 10). Users' gradients play the role of the secret, and pairwise random masks play the role of . The server (one "party") learns but no individual .
Why We Need
The additive scheme works only when every party is available. In practice, parties fail — servers crash, users drop out of a federated-learning round, Byzantine workers refuse to respond. The general problem — any of the parties suffice — is much harder, because the scheme must be simultaneously correct on every size- subset while leaking nothing to every size- subset. Shamir's scheme (Section 3.2) is the canonical solution; its elegance is that a single polynomial simultaneously satisfies all reconstruction constraints and all secrecy constraints.
Splitting a Secret Across Parties
Common Mistake: XOR Sharing is , Not
Mistake:
Treat the XOR / additive scheme as if it supported threshold reconstruction with .
Correction:
The additive scheme of the example above requires all shares to reconstruct. Dropping any one share destroys the secret completely (the "missing" share masks everything). For a threshold below , one must use a genuinely more sophisticated scheme — Shamir's polynomial construction (Section 3.2) or equivalent. A common implementation bug in federated-learning systems is to use XOR sharing and then discover that the protocol breaks under any user dropout.
Historical Note: Shamir and Blakley: Parallel Discovery in 1979
1979Adi Shamir and George Blakley independently introduced -threshold secret sharing in 1979. Shamir's scheme — which we will develop in Section 3.2 — uses polynomial evaluation over a finite field and is the version that dominates modern practice. Blakley's scheme — which we treat in Section 3.3 — uses hyperplanes in a high-dimensional vector space. The two constructions are equivalent up to the field-size overhead (Shamir needs ; Blakley uses a more cumbersome geometric encoding), but Blakley's geometric perspective remains valuable for intuition and for certain generalizations. Both schemes originated in the mathematics of polynomial interpolation but crystallized almost simultaneously — a classic example of two independent answers to the same underlying information-theoretic question.
Secret Sharing in Real Systems
Modern threshold cryptography in the cloud uses secret sharing to split private keys across hardware-security modules (HSMs) run by different providers. AWS KMS with threshold ECDSA, Google Cloud Confidential Computing, and Fireblocks' MPC wallet custody all deploy Shamir-style schemes to guarantee that the loss or compromise of any single HSM does not leak the key. On the blockchain side, threshold-ECDSA wallets in major custodial platforms use -schemes with and . The pattern is: never store a cryptographic secret as a single blob; always split.
- •
AWS KMS threshold ECDSA supports
- •
Fireblocks MPC wallets use a variant of Shamir over
- •
Multi-region HSM deployments typically target for Byzantine-fault tolerance
Quick Check
Which of the following statements about a -threshold secret-sharing scheme with perfect secrecy is TRUE?
A coalition of parties can guess the secret with high probability.
The size of each share can be made arbitrarily small by increasing the field size.
Any parties can reconstruct the secret exactly, and any parties have no information about it.
The reconstruction algorithm uses the parties' shares and some public randomness shared across the whole system.
This is exactly the definition: correctness on authorized coalitions, information-theoretic security on forbidden coalitions.