Exercises

ex-ch10-01

Easy

State the threat model for the Bonawitz secure-aggregation protocol. Specify the adversary, what it observes, and what it must not learn.

ex-ch10-02

Easy

Why do pairwise masks rij\mathbf{r}_{ij} cancel in the server's aggregate?

ex-ch10-03

Easy

For the Bonawitz protocol with n=50n = 50 users, compute the per-round number of pairwise mask exchanges and the per-user upload size for d=107d = 10^7 at 32-bit precision.

ex-ch10-04

Easy

State the feasibility constraint for the Bonawitz dropout-resilient protocol with collusion threshold TT and dropout rate Ξ΄\delta on nn users.

ex-ch10-05

Medium

Why is each user's upload g~k\tilde{\mathbf{g}}_k uniform over Fqd\mathbb{F}_q^d to the server, given that pairwise seeds are independent?

ex-ch10-06

Medium

Explain why the Bonawitz protocol needs both pairwise seeds and self-mask seeds (for dropout handling).

ex-ch10-07

Medium

For n=200n = 200 users, T=30T = 30 collusion threshold, and Ξ΄=0.25\delta = 0.25 dropout rate, find a valid Shamir threshold tt.

ex-ch10-08

Medium

State the Caire et al. (2022) optimality theorem precisely and identify its scheme class.

ex-ch10-09

Medium

Why does the Caire et al. (2022) optimality result not apply to CCESA (Chapter 12)?

ex-ch10-10

Medium

Compose the Bonawitz protocol with bb-bit gradient quantization (Chapter 9 Β§9.3). What is the per-round communication cost?

ex-ch10-11

Hard

Prove (sketch) that Bonawitz's pairwise-masking protocol satisfies the privacy guarantee I(gk;serverΒ view)=I(gk;G)I (\mathbf{g}_k; \text{server view}) = I (\mathbf{g}_k; \mathbf{G}) in the ideal information-theoretic model (uniform random seeds).

ex-ch10-12

Hard

Sketch the proof of Caire et al.'s optimality theorem for T=0T = 0 (no collusion) and Ξ΄=0\delta = 0 (no dropouts). What is the lower bound and how does it arise?

ex-ch10-13

Hard

Discuss the relationship between Bonawitz's secure-aggregation protocol and Maddah-Ali / Niesen coded caching (Chapter 4 Β§4.3). Identify the structural parallels.

ex-ch10-14

Hard

Compose Bonawitz's secure aggregation with Ο΅\epsilon- differential privacy (DP). What is the resulting privacy guarantee?

ex-ch10-15

Challenge

Open problem. Bonawitz's protocol is information-theoretically optimal within uncoded groupwise keys (§10.4). CCESA (Chapter 12) achieves O(nn/log⁑n)O(n\sqrt{n/\log n}) via sparse random graphs, outside this class. Is there a deterministic sparse-key construction that achieves o(n2)o(n^2) communication while preserving Bonawitz-style information-theoretic privacy?