Exercises

ex-ch11-01

Easy

Distinguish the Byzantine adversary from the honest-but-curious adversary of Chapter 10. Give one concrete example of each.

ex-ch11-02

Easy

Why does Bonawitz's secure aggregation provide no defense against a Byzantine user?

ex-ch11-03

Easy

Name the three primitives composed in ByzSecAgg and briefly describe each role.

ex-ch11-04

Easy

For a ByzSecAgg deployment with n=100n = 100 users, T=20T = 20 colluders, and B=15B = 15 Byzantine users, compute the ramp width gg and check feasibility.

ex-ch11-05

Medium

Explain the role of the vector commitment in ByzSecAgg. What goes wrong without it?

ex-ch11-06

Medium

Describe how ByzSecAgg computes pairwise distances dij=βˆ₯giβˆ’gjβˆ₯2d_{ij} = \|\mathbf{g}_i - \mathbf{g}_j\|^2 on ramp shares, referencing Chapter 8 Β§8.3's LCC framework.

ex-ch11-07

Medium

Walk through Krum filtering for n=6n = 6 users with B=1B = 1 Byzantine. Suppose pairwise distances (in arbitrary units) are: users 1–5 have mutual distances ∼2\sim 2, user 6 has distances ∼100\sim 100 to all others. Compute Krum scores and identify the Byzantine.

ex-ch11-08

Medium

Compute the per-round communication for ByzSecAgg at n=200n = 200, B=20B = 20, d=108d = 10^8 and compare with Bonawitz alone and a naive Bonawitz + replicated Krum.

ex-ch11-09

Medium

Why does ByzSecAgg's feasibility constraint have a factor of 3? (B≀(nβˆ’Tβˆ’1)/3B \leq (n - T - 1)/3)

ex-ch11-10

Medium

Why does ByzSecAgg use ramp secret sharing instead of standard Shamir?

ex-ch11-11

Hard

Sketch the proof that ByzSecAgg preserves information-theoretic privacy against TT colluders, even in the presence of BB Byzantine users.

ex-ch11-12

Hard

Derive the communication complexity of ByzSecAgg from first principles. Specifically, what is the per-user uplink and the aggregate per-round cost?

ex-ch11-13

Hard

Describe an adaptive Byzantine attack that defeats Krum filtering in ByzSecAgg, and suggest a countermeasure.

ex-ch11-14

Hard

Discuss the composition of ByzSecAgg with differential privacy. Is the composition sound? What is the resulting privacy / utility tradeoff?

ex-ch11-15

Challenge

Open problem. ByzSecAgg achieves O(nlog⁑n+Bd)O(n \log n + Bd) communication β€” matching the information- theoretic lower bound up to a log⁑n\log n factor. Can the log⁑n\log n factor be removed? What would be required?