Applications in Secure and Distributed Computing
Where Secret Sharing Reappears
Secret sharing is not an endpoint; it is a building block. This final section of Chapter 3 sketches how the constructions of Sections 3.2–3.4 will be used in the remainder of the book, with forward references to the relevant chapters. Reading this section with the three-way (privacy / robustness / efficiency) tradeoff of Chapter 1 in mind will make the later material feel much less surprising.
Three canonical applications cover almost all of what follows: (i) distributing sensitive data across workers for coded computing, (ii) masking gradients for secure aggregation in federated learning, and (iii) providing information-theoretic privacy in PIR.
Definition: Secret Sharing for Privacy-Aware Coded Computing
Secret Sharing for Privacy-Aware Coded Computing
In secure coded matrix multiplication (the topic of Chapter 5 with a privacy extension), the dataset rows are sensitive: we want workers to compute without any single worker learning any row of (or the corresponding row of ).
Construction. Split each row via a -Shamir scheme before distributing to workers. Each worker computes its polynomial-coded product of the share; the master reconstructs the sum via Lagrange interpolation from any responses. No single worker, and no coalition of fewer than workers, learns any row of .
The privacy parameter interacts with the recovery threshold of the coded-computing scheme: privacy costs "extra" redundant workers, which the recovery threshold inherits.
Example: Secure Coded Matrix Multiplication at ,
Illustrate how Shamir-sharing is composed with polynomial coded matrix multiplication for workers, recovery threshold , privacy threshold .
Set up
Each row is Shamir-shared as , where is a degree- polynomial with random coefficient in each coordinate. Worker receives for all .
Per-worker product
Worker computes . This is now a polynomial evaluation of degree in the shared variable, with as the constant term.
Recover
The master collects any responses and interpolates the degree- polynomial, reading off at . This is required so interpolation succeeds.
Privacy
Any single worker sees only , which is Shamir-secret-shared and hence independent of any row of . Perfect privacy against a single worker; colluding coalitions of would break the privacy, but the protocol explicitly defends against single workers in this example.
Why This Matters: Chapter 5 Develops This Compositionally
Chapter 5 builds up the secure coded-matrix-multiplication protocol from scratch, treating the Shamir part of this section as a black box. The payoff is a closed-form expression for the privacy / communication / straggler-tolerance trade-off — another instance of the golden thread from Chapter 1.
Definition: Additive Secret Sharing for Secure Aggregation
Additive Secret Sharing for Secure Aggregation
Secure aggregation (Chapter 10) lets a server compute over users' gradients without learning any individual gradient. The essential primitive is the additive -scheme from Section 3.1: each user adds pairwise random masks to its gradient, and all masks cancel in the aggregate.
More precisely, for each pair of users, let be a symmetric random mask drawn from a fresh per-round pseudorandom generator seeded by a Diffie-Hellman key exchange. User uploads The server sums: . No subset of the users can break the aggregate's privacy because the sum of masks is zero only when all are combined.
The CCESA Optimization
The full pairwise-masking protocol above uses pairwise mask exchanges — one per pair of users. In Chapter 12 we will see the CCESA (Communication-Efficient Secure Aggregation) protocol, a CommIT contribution, that replaces the complete graph of pairwise relationships with a sparse Erdős- Rényi random graph. The mask-cancellation guarantee is preserved in expectation while the communication overhead drops to . Reading Chapter 12 with the additive -scheme from Section 3.1 in mind will illuminate the construction immediately.
Definition: Secret Sharing for Private Information Retrieval
Secret Sharing for Private Information Retrieval
In private information retrieval (Chapter 13), a user wants to retrieve file from databases without revealing the index to any single database. The user constructs queries , one per database, such that:
- The joint of depends on ;
- Each individual is information-theoretically independent of (or, in the -colluding variant, any -subset is independent).
The Sun–Jafar protocol implements this using linear secret sharing: each query is a Shamir-like evaluation of a carefully- constructed polynomial whose coefficients encode the query index. Secret sharing is the primitive that hides the query from individual databases; coding theory is the primitive that keeps the download rate as close to the PIR capacity as possible.
Why This Matters: The PIR Capacity Is Made Possible by Secret Sharing
Chapter 13 derives the Sun–Jafar capacity and its coded-storage and colluding variants. Every known capacity-achieving PIR scheme uses secret sharing as the privacy primitive. The beautiful thing is that the same information-theoretic lens — query as polynomial — appears here that made Shamir and coded matrix multiplication work: share the secret index via a polynomial, use the algebraic structure to construct efficient downloads.
Key Takeaway
Secret sharing is the privacy primitive of this book. Shamir for perfect-secrecy threshold schemes, additive for secure aggregation, ramp for storage-efficient federated-learning protocols. Every privacy guarantee in Parts III–V ultimately rests on one of these constructions. Time invested in understanding Sections 3.1–3.4 pays off in every later chapter.
Which Variant Goes Where
| Variant | Used in | Why |
|---|---|---|
| Additive | Secure aggregation (Ch 10), CCESA (Ch 12), AirComp (Ch 16) | Aggregation only, no dropout tolerance, minimal overhead |
| Shamir | Coded matrix mult. w/ privacy (Ch 5), MPC wallets, threshold crypto | Perfect secrecy, any reconstruct, can drop out |
| Ramp | ByzSecAgg (Ch 11), FL with large gradients | -fold share-size savings, graceful degradation |
| Linear / coded (Sun–Jafar) | PIR (Ch 13), coded PIR (Ch 14), cache-aided PIR (Ch 15) | Privacy against colluders, capacity-matching download rate |
Quick Check
In federated learning with users and a gradient of coordinates, which secret-sharing variant is most appropriate for the per-round aggregation primitive?
Shamir with
Additive -scheme via pairwise masks (as in Bonawitz's protocol).
Blakley's hyperplane scheme
Asmuth–Bloom CRT scheme
Correct: only aggregation is needed, no threshold reconstruction is required, and the -scheme has the smallest per-user overhead — the user uploads a single masked gradient of the same size as .